Add UST uid/gid contexts
[lttng-tools.git] / src / bin / lttng-sessiond / trace-ust.c
1 /*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 * Copyright (C) 2016 - Jérémie Galarneau <jeremie.galarneau@efficios.com>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2 only,
7 * as published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License along
15 * with this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
17 */
18
19 #define _LGPL_SOURCE
20 #include <stdio.h>
21 #include <stdlib.h>
22 #include <string.h>
23 #include <unistd.h>
24 #include <inttypes.h>
25
26 #include <common/common.h>
27 #include <common/defaults.h>
28
29 #include "buffer-registry.h"
30 #include "trace-ust.h"
31 #include "utils.h"
32 #include "ust-app.h"
33 #include "agent.h"
34
35 /*
36 * Match function for the events hash table lookup.
37 *
38 * Matches by name only. Used by the disable command.
39 */
40 int trace_ust_ht_match_event_by_name(struct cds_lfht_node *node,
41 const void *_key)
42 {
43 struct ltt_ust_event *event;
44 const char *name;
45
46 assert(node);
47 assert(_key);
48
49 event = caa_container_of(node, struct ltt_ust_event, node.node);
50 name = _key;
51
52 /* Event name */
53 if (strncmp(event->attr.name, name, sizeof(event->attr.name)) != 0) {
54 goto no_match;
55 }
56
57 /* Match */
58 return 1;
59
60 no_match:
61 return 0;
62 }
63
64 /*
65 * Match function for the hash table lookup.
66 *
67 * It matches an ust event based on three attributes which are the event name,
68 * the filter bytecode and the loglevel.
69 */
70 int trace_ust_ht_match_event(struct cds_lfht_node *node, const void *_key)
71 {
72 struct ltt_ust_event *event;
73 const struct ltt_ust_ht_key *key;
74 int ev_loglevel_value;
75 int ll_match;
76
77 assert(node);
78 assert(_key);
79
80 event = caa_container_of(node, struct ltt_ust_event, node.node);
81 key = _key;
82 ev_loglevel_value = event->attr.loglevel;
83
84 /* Match the 4 elements of the key: name, filter, loglevel, exclusions. */
85
86 /* Event name */
87 if (strncmp(event->attr.name, key->name, sizeof(event->attr.name)) != 0) {
88 goto no_match;
89 }
90
91 /* Event loglevel value and type. */
92 ll_match = loglevels_match(event->attr.loglevel_type,
93 ev_loglevel_value, key->loglevel_type,
94 key->loglevel_value, LTTNG_UST_LOGLEVEL_ALL);
95
96 if (!ll_match) {
97 goto no_match;
98 }
99
100 /* Only one of the filters is NULL, fail. */
101 if ((key->filter && !event->filter) || (!key->filter && event->filter)) {
102 goto no_match;
103 }
104
105 if (key->filter && event->filter) {
106 /* Both filters exists, check length followed by the bytecode. */
107 if (event->filter->len != key->filter->len ||
108 memcmp(event->filter->data, key->filter->data,
109 event->filter->len) != 0) {
110 goto no_match;
111 }
112 }
113
114 /* If only one of the exclusions is NULL, fail. */
115 if ((key->exclusion && !event->exclusion) || (!key->exclusion && event->exclusion)) {
116 goto no_match;
117 }
118
119 if (key->exclusion && event->exclusion) {
120 size_t i;
121
122 /* Check exclusion counts first. */
123 if (event->exclusion->count != key->exclusion->count) {
124 goto no_match;
125 }
126
127 /* Compare names individually. */
128 for (i = 0; i < event->exclusion->count; ++i) {
129 size_t j;
130 bool found = false;
131 const char *name_ev =
132 LTTNG_EVENT_EXCLUSION_NAME_AT(
133 event->exclusion, i);
134
135 /*
136 * Compare this exclusion name to all the key's
137 * exclusion names.
138 */
139 for (j = 0; j < key->exclusion->count; ++j) {
140 const char *name_key =
141 LTTNG_EVENT_EXCLUSION_NAME_AT(
142 key->exclusion, j);
143
144 if (!strncmp(name_ev, name_key,
145 LTTNG_SYMBOL_NAME_LEN)) {
146 /* Names match! */
147 found = true;
148 break;
149 }
150 }
151
152 /*
153 * If the current exclusion name was not found amongst
154 * the key's exclusion names, then there's no match.
155 */
156 if (!found) {
157 goto no_match;
158 }
159 }
160 }
161 /* Match. */
162 return 1;
163
164 no_match:
165 return 0;
166 }
167
168 /*
169 * Find the channel in the hashtable and return channel pointer. RCU read side
170 * lock MUST be acquired before calling this.
171 */
172 struct ltt_ust_channel *trace_ust_find_channel_by_name(struct lttng_ht *ht,
173 char *name)
174 {
175 struct lttng_ht_node_str *node;
176 struct lttng_ht_iter iter;
177
178 /*
179 * If we receive an empty string for channel name, it means the
180 * default channel name is requested.
181 */
182 if (name[0] == '\0')
183 name = DEFAULT_CHANNEL_NAME;
184
185 lttng_ht_lookup(ht, (void *)name, &iter);
186 node = lttng_ht_iter_get_node_str(&iter);
187 if (node == NULL) {
188 goto error;
189 }
190
191 DBG2("Trace UST channel %s found by name", name);
192
193 return caa_container_of(node, struct ltt_ust_channel, node);
194
195 error:
196 DBG2("Trace UST channel %s not found by name", name);
197 return NULL;
198 }
199
200 /*
201 * Find the event in the hashtable and return event pointer. RCU read side lock
202 * MUST be acquired before calling this.
203 */
204 struct ltt_ust_event *trace_ust_find_event(struct lttng_ht *ht,
205 char *name, struct lttng_filter_bytecode *filter,
206 enum lttng_ust_loglevel_type loglevel_type, int loglevel_value,
207 struct lttng_event_exclusion *exclusion)
208 {
209 struct lttng_ht_node_str *node;
210 struct lttng_ht_iter iter;
211 struct ltt_ust_ht_key key;
212
213 assert(name);
214 assert(ht);
215
216 key.name = name;
217 key.filter = filter;
218 key.loglevel_type = loglevel_type;
219 key.loglevel_value = loglevel_value;
220 key.exclusion = exclusion;
221
222 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) name, lttng_ht_seed),
223 trace_ust_ht_match_event, &key, &iter.iter);
224 node = lttng_ht_iter_get_node_str(&iter);
225 if (node == NULL) {
226 goto error;
227 }
228
229 DBG2("Trace UST event %s found", key.name);
230
231 return caa_container_of(node, struct ltt_ust_event, node);
232
233 error:
234 DBG2("Trace UST event %s NOT found", key.name);
235 return NULL;
236 }
237
238 /*
239 * Lookup an agent in the session agents hash table by domain type and return
240 * the object if found else NULL.
241 *
242 * RCU read side lock must be acquired before calling and only released
243 * once the agent is no longer in scope or being used.
244 */
245 struct agent *trace_ust_find_agent(struct ltt_ust_session *session,
246 enum lttng_domain_type domain_type)
247 {
248 struct agent *agt = NULL;
249 struct lttng_ht_node_u64 *node;
250 struct lttng_ht_iter iter;
251 uint64_t key;
252
253 assert(session);
254
255 DBG3("Trace ust agent lookup for domain %d", domain_type);
256
257 key = domain_type;
258
259 lttng_ht_lookup(session->agents, &key, &iter);
260 node = lttng_ht_iter_get_node_u64(&iter);
261 if (!node) {
262 goto end;
263 }
264 agt = caa_container_of(node, struct agent, node);
265
266 end:
267 return agt;
268 }
269
270 /*
271 * Allocate and initialize a ust session data structure.
272 *
273 * Return pointer to structure or NULL.
274 */
275 struct ltt_ust_session *trace_ust_create_session(uint64_t session_id)
276 {
277 struct ltt_ust_session *lus;
278
279 /* Allocate a new ltt ust session */
280 lus = zmalloc(sizeof(struct ltt_ust_session));
281 if (lus == NULL) {
282 PERROR("create ust session zmalloc");
283 goto error;
284 }
285
286 /* Init data structure */
287 lus->id = session_id;
288 lus->active = 0;
289
290 /* Set default metadata channel attribute. */
291 lus->metadata_attr.overwrite = DEFAULT_CHANNEL_OVERWRITE;
292 lus->metadata_attr.subbuf_size = default_get_metadata_subbuf_size();
293 lus->metadata_attr.num_subbuf = DEFAULT_METADATA_SUBBUF_NUM;
294 lus->metadata_attr.switch_timer_interval = DEFAULT_METADATA_SWITCH_TIMER;
295 lus->metadata_attr.read_timer_interval = DEFAULT_METADATA_READ_TIMER;
296 lus->metadata_attr.output = LTTNG_UST_MMAP;
297
298 /*
299 * Default buffer type. This can be changed through an enable channel
300 * requesting a different type. Note that this can only be changed once
301 * during the session lifetime which is at the first enable channel and
302 * only before start. The flag buffer_type_changed indicates the status.
303 */
304 lus->buffer_type = LTTNG_BUFFER_PER_UID;
305 /* Once set to 1, the buffer_type is immutable for the session. */
306 lus->buffer_type_changed = 0;
307 /* Init it in case it get used after allocation. */
308 CDS_INIT_LIST_HEAD(&lus->buffer_reg_uid_list);
309
310 /* Alloc UST global domain channels' HT */
311 lus->domain_global.channels = lttng_ht_new(0, LTTNG_HT_TYPE_STRING);
312 /* Alloc agent hash table. */
313 lus->agents = lttng_ht_new(0, LTTNG_HT_TYPE_U64);
314
315 lus->consumer = consumer_create_output(CONSUMER_DST_LOCAL);
316 if (lus->consumer == NULL) {
317 goto error_consumer;
318 }
319
320 DBG2("UST trace session create successful");
321
322 return lus;
323
324 error_consumer:
325 ht_cleanup_push(lus->domain_global.channels);
326 ht_cleanup_push(lus->agents);
327 free(lus);
328 error:
329 return NULL;
330 }
331
332 /*
333 * Allocate and initialize a ust channel data structure.
334 *
335 * Return pointer to structure or NULL.
336 */
337 struct ltt_ust_channel *trace_ust_create_channel(struct lttng_channel *chan,
338 enum lttng_domain_type domain)
339 {
340 struct ltt_ust_channel *luc;
341
342 assert(chan);
343
344 luc = zmalloc(sizeof(struct ltt_ust_channel));
345 if (luc == NULL) {
346 PERROR("ltt_ust_channel zmalloc");
347 goto error;
348 }
349
350 luc->domain = domain;
351
352 /* Copy UST channel attributes */
353 luc->attr.overwrite = chan->attr.overwrite;
354 luc->attr.subbuf_size = chan->attr.subbuf_size;
355 luc->attr.num_subbuf = chan->attr.num_subbuf;
356 luc->attr.switch_timer_interval = chan->attr.switch_timer_interval;
357 luc->attr.read_timer_interval = chan->attr.read_timer_interval;
358 luc->attr.output = (enum lttng_ust_output) chan->attr.output;
359 luc->monitor_timer_interval = ((struct lttng_channel_extended *)
360 chan->attr.extended.ptr)->monitor_timer_interval;
361 luc->attr.u.s.blocking_timeout = ((struct lttng_channel_extended *)
362 chan->attr.extended.ptr)->blocking_timeout;
363
364 /* Translate to UST output enum */
365 switch (luc->attr.output) {
366 default:
367 luc->attr.output = LTTNG_UST_MMAP;
368 break;
369 }
370
371 /*
372 * If we receive an empty string for channel name, it means the
373 * default channel name is requested.
374 */
375 if (chan->name[0] == '\0') {
376 strncpy(luc->name, DEFAULT_CHANNEL_NAME, sizeof(luc->name));
377 } else {
378 /* Copy channel name */
379 strncpy(luc->name, chan->name, sizeof(luc->name));
380 }
381 luc->name[LTTNG_UST_SYM_NAME_LEN - 1] = '\0';
382
383 /* Init node */
384 lttng_ht_node_init_str(&luc->node, luc->name);
385 CDS_INIT_LIST_HEAD(&luc->ctx_list);
386
387 /* Alloc hash tables */
388 luc->events = lttng_ht_new(0, LTTNG_HT_TYPE_STRING);
389 luc->ctx = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
390
391 /* On-disk circular buffer parameters */
392 luc->tracefile_size = chan->attr.tracefile_size;
393 luc->tracefile_count = chan->attr.tracefile_count;
394
395 DBG2("Trace UST channel %s created", luc->name);
396
397 error:
398 return luc;
399 }
400
401 /*
402 * Validates an exclusion list.
403 *
404 * Returns 0 if valid, negative value if invalid.
405 */
406 static int validate_exclusion(struct lttng_event_exclusion *exclusion)
407 {
408 size_t i;
409 int ret = 0;
410
411 assert(exclusion);
412
413 for (i = 0; i < exclusion->count; ++i) {
414 size_t j;
415 const char *name_a =
416 LTTNG_EVENT_EXCLUSION_NAME_AT(exclusion, i);
417
418 for (j = 0; j < i; ++j) {
419 const char *name_b =
420 LTTNG_EVENT_EXCLUSION_NAME_AT(exclusion, j);
421
422 if (!strncmp(name_a, name_b, LTTNG_SYMBOL_NAME_LEN)) {
423 /* Match! */
424 ret = -1;
425 goto end;
426 }
427 }
428 }
429
430 end:
431 return ret;
432 }
433
434 /*
435 * Allocate and initialize a ust event. Set name and event type.
436 * We own filter_expression, filter, and exclusion.
437 *
438 * Return an lttng_error_code
439 */
440 enum lttng_error_code trace_ust_create_event(struct lttng_event *ev,
441 char *filter_expression,
442 struct lttng_filter_bytecode *filter,
443 struct lttng_event_exclusion *exclusion,
444 bool internal_event,
445 struct ltt_ust_event **ust_event)
446 {
447 struct ltt_ust_event *local_ust_event;
448 enum lttng_error_code ret = LTTNG_OK;
449
450 assert(ev);
451
452 if (exclusion && validate_exclusion(exclusion)) {
453 ret = LTTNG_ERR_INVALID;
454 goto error;
455 }
456
457 local_ust_event = zmalloc(sizeof(struct ltt_ust_event));
458 if (local_ust_event == NULL) {
459 PERROR("ust event zmalloc");
460 ret = LTTNG_ERR_NOMEM;
461 goto error;
462 }
463
464 local_ust_event->internal = internal_event;
465
466 switch (ev->type) {
467 case LTTNG_EVENT_PROBE:
468 local_ust_event->attr.instrumentation = LTTNG_UST_PROBE;
469 break;
470 case LTTNG_EVENT_FUNCTION:
471 local_ust_event->attr.instrumentation = LTTNG_UST_FUNCTION;
472 break;
473 case LTTNG_EVENT_FUNCTION_ENTRY:
474 local_ust_event->attr.instrumentation = LTTNG_UST_FUNCTION;
475 break;
476 case LTTNG_EVENT_TRACEPOINT:
477 local_ust_event->attr.instrumentation = LTTNG_UST_TRACEPOINT;
478 break;
479 default:
480 ERR("Unknown ust instrumentation type (%d)", ev->type);
481 ret = LTTNG_ERR_INVALID;
482 goto error_free_event;
483 }
484
485 /* Copy event name */
486 strncpy(local_ust_event->attr.name, ev->name, LTTNG_UST_SYM_NAME_LEN);
487 local_ust_event->attr.name[LTTNG_UST_SYM_NAME_LEN - 1] = '\0';
488
489 switch (ev->loglevel_type) {
490 case LTTNG_EVENT_LOGLEVEL_ALL:
491 local_ust_event->attr.loglevel_type = LTTNG_UST_LOGLEVEL_ALL;
492 local_ust_event->attr.loglevel = -1; /* Force to -1 */
493 break;
494 case LTTNG_EVENT_LOGLEVEL_RANGE:
495 local_ust_event->attr.loglevel_type = LTTNG_UST_LOGLEVEL_RANGE;
496 local_ust_event->attr.loglevel = ev->loglevel;
497 break;
498 case LTTNG_EVENT_LOGLEVEL_SINGLE:
499 local_ust_event->attr.loglevel_type = LTTNG_UST_LOGLEVEL_SINGLE;
500 local_ust_event->attr.loglevel = ev->loglevel;
501 break;
502 default:
503 ERR("Unknown ust loglevel type (%d)", ev->loglevel_type);
504 ret = LTTNG_ERR_INVALID;
505 goto error_free_event;
506 }
507
508 /* Same layout. */
509 local_ust_event->filter_expression = filter_expression;
510 local_ust_event->filter = filter;
511 local_ust_event->exclusion = exclusion;
512
513 /* Init node */
514 lttng_ht_node_init_str(&local_ust_event->node, local_ust_event->attr.name);
515
516 DBG2("Trace UST event %s, loglevel (%d,%d) created",
517 local_ust_event->attr.name, local_ust_event->attr.loglevel_type,
518 local_ust_event->attr.loglevel);
519
520 *ust_event = local_ust_event;
521
522 return ret;
523
524 error_free_event:
525 free(local_ust_event);
526 error:
527 free(filter_expression);
528 free(filter);
529 free(exclusion);
530 return ret;
531 }
532
533 static
534 int trace_ust_context_type_event_to_ust(
535 enum lttng_event_context_type type)
536 {
537 int utype;
538
539 switch (type) {
540 case LTTNG_EVENT_CONTEXT_VTID:
541 utype = LTTNG_UST_CONTEXT_VTID;
542 break;
543 case LTTNG_EVENT_CONTEXT_VPID:
544 utype = LTTNG_UST_CONTEXT_VPID;
545 break;
546 case LTTNG_EVENT_CONTEXT_PTHREAD_ID:
547 utype = LTTNG_UST_CONTEXT_PTHREAD_ID;
548 break;
549 case LTTNG_EVENT_CONTEXT_PROCNAME:
550 utype = LTTNG_UST_CONTEXT_PROCNAME;
551 break;
552 case LTTNG_EVENT_CONTEXT_IP:
553 utype = LTTNG_UST_CONTEXT_IP;
554 break;
555 case LTTNG_EVENT_CONTEXT_PERF_THREAD_COUNTER:
556 if (!ustctl_has_perf_counters()) {
557 utype = -1;
558 WARN("Perf counters not implemented in UST");
559 } else {
560 utype = LTTNG_UST_CONTEXT_PERF_THREAD_COUNTER;
561 }
562 break;
563 case LTTNG_EVENT_CONTEXT_APP_CONTEXT:
564 utype = LTTNG_UST_CONTEXT_APP_CONTEXT;
565 break;
566 case LTTNG_EVENT_CONTEXT_CGROUP_NS:
567 utype = LTTNG_UST_CONTEXT_CGROUP_NS;
568 break;
569 case LTTNG_EVENT_CONTEXT_IPC_NS:
570 utype = LTTNG_UST_CONTEXT_IPC_NS;
571 break;
572 case LTTNG_EVENT_CONTEXT_MNT_NS:
573 utype = LTTNG_UST_CONTEXT_MNT_NS;
574 break;
575 case LTTNG_EVENT_CONTEXT_NET_NS:
576 utype = LTTNG_UST_CONTEXT_NET_NS;
577 break;
578 case LTTNG_EVENT_CONTEXT_PID_NS:
579 utype = LTTNG_UST_CONTEXT_PID_NS;
580 break;
581 case LTTNG_EVENT_CONTEXT_USER_NS:
582 utype = LTTNG_UST_CONTEXT_USER_NS;
583 break;
584 case LTTNG_EVENT_CONTEXT_UTS_NS:
585 utype = LTTNG_UST_CONTEXT_UTS_NS;
586 break;
587 case LTTNG_EVENT_CONTEXT_VUID:
588 utype = LTTNG_UST_CONTEXT_VUID;
589 break;
590 case LTTNG_EVENT_CONTEXT_VEUID:
591 utype = LTTNG_UST_CONTEXT_VEUID;
592 break;
593 case LTTNG_EVENT_CONTEXT_VSUID:
594 utype = LTTNG_UST_CONTEXT_VSUID;
595 break;
596 case LTTNG_EVENT_CONTEXT_VGID:
597 utype = LTTNG_UST_CONTEXT_VGID;
598 break;
599 case LTTNG_EVENT_CONTEXT_VEGID:
600 utype = LTTNG_UST_CONTEXT_VEGID;
601 break;
602 case LTTNG_EVENT_CONTEXT_VSGID:
603 utype = LTTNG_UST_CONTEXT_VSGID;
604 break;
605 default:
606 utype = -1;
607 break;
608 }
609 return utype;
610 }
611
612 /*
613 * Return 1 if contexts match, 0 otherwise.
614 */
615 int trace_ust_match_context(struct ltt_ust_context *uctx,
616 struct lttng_event_context *ctx)
617 {
618 int utype;
619
620 utype = trace_ust_context_type_event_to_ust(ctx->ctx);
621 if (utype < 0) {
622 return 0;
623 }
624 if (uctx->ctx.ctx != utype) {
625 return 0;
626 }
627 switch (utype) {
628 case LTTNG_UST_CONTEXT_PERF_THREAD_COUNTER:
629 if (uctx->ctx.u.perf_counter.type
630 != ctx->u.perf_counter.type) {
631 return 0;
632 }
633 if (uctx->ctx.u.perf_counter.config
634 != ctx->u.perf_counter.config) {
635 return 0;
636 }
637 if (strncmp(uctx->ctx.u.perf_counter.name,
638 ctx->u.perf_counter.name,
639 LTTNG_UST_SYM_NAME_LEN)) {
640 return 0;
641 }
642 break;
643 case LTTNG_UST_CONTEXT_APP_CONTEXT:
644 assert(uctx->ctx.u.app_ctx.provider_name);
645 assert(uctx->ctx.u.app_ctx.ctx_name);
646 if (strcmp(uctx->ctx.u.app_ctx.provider_name,
647 ctx->u.app_ctx.provider_name) ||
648 strcmp(uctx->ctx.u.app_ctx.ctx_name,
649 ctx->u.app_ctx.ctx_name)) {
650 return 0;
651 }
652 default:
653 break;
654
655 }
656 return 1;
657 }
658
659 /*
660 * Allocate and initialize an UST context.
661 *
662 * Return pointer to structure or NULL.
663 */
664 struct ltt_ust_context *trace_ust_create_context(
665 struct lttng_event_context *ctx)
666 {
667 struct ltt_ust_context *uctx = NULL;
668 int utype;
669
670 assert(ctx);
671
672 utype = trace_ust_context_type_event_to_ust(ctx->ctx);
673 if (utype < 0) {
674 ERR("Invalid UST context");
675 goto end;
676 }
677
678 uctx = zmalloc(sizeof(struct ltt_ust_context));
679 if (!uctx) {
680 PERROR("zmalloc ltt_ust_context");
681 goto end;
682 }
683
684 uctx->ctx.ctx = (enum lttng_ust_context_type) utype;
685 switch (utype) {
686 case LTTNG_UST_CONTEXT_PERF_THREAD_COUNTER:
687 uctx->ctx.u.perf_counter.type = ctx->u.perf_counter.type;
688 uctx->ctx.u.perf_counter.config = ctx->u.perf_counter.config;
689 strncpy(uctx->ctx.u.perf_counter.name, ctx->u.perf_counter.name,
690 LTTNG_UST_SYM_NAME_LEN);
691 uctx->ctx.u.perf_counter.name[LTTNG_UST_SYM_NAME_LEN - 1] = '\0';
692 break;
693 case LTTNG_UST_CONTEXT_APP_CONTEXT:
694 {
695 char *provider_name = NULL, *ctx_name = NULL;
696
697 provider_name = strdup(ctx->u.app_ctx.provider_name);
698 if (!provider_name) {
699 goto error;
700 }
701 uctx->ctx.u.app_ctx.provider_name = provider_name;
702
703 ctx_name = strdup(ctx->u.app_ctx.ctx_name);
704 if (!ctx_name) {
705 goto error;
706 }
707 uctx->ctx.u.app_ctx.ctx_name = ctx_name;
708 break;
709 }
710 default:
711 break;
712 }
713 lttng_ht_node_init_ulong(&uctx->node, (unsigned long) uctx->ctx.ctx);
714 end:
715 return uctx;
716 error:
717 trace_ust_destroy_context(uctx);
718 return NULL;
719 }
720
721 static
722 void destroy_pid_tracker_node_rcu(struct rcu_head *head)
723 {
724 struct ust_pid_tracker_node *tracker_node =
725 caa_container_of(head, struct ust_pid_tracker_node, node.head);
726 free(tracker_node);
727 }
728
729 static
730 void destroy_pid_tracker_node(struct ust_pid_tracker_node *tracker_node)
731 {
732
733 call_rcu(&tracker_node->node.head, destroy_pid_tracker_node_rcu);
734 }
735
736 static
737 int init_pid_tracker(struct ust_pid_tracker *pid_tracker)
738 {
739 int ret = 0;
740
741 pid_tracker->ht = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
742 if (!pid_tracker->ht) {
743 ret = -1;
744 goto end;
745 }
746
747 end:
748 return ret;
749 }
750
751 /*
752 * Teardown pid tracker content, but don't free pid_tracker object.
753 */
754 static
755 void fini_pid_tracker(struct ust_pid_tracker *pid_tracker)
756 {
757 struct ust_pid_tracker_node *tracker_node;
758 struct lttng_ht_iter iter;
759
760 if (!pid_tracker->ht) {
761 return;
762 }
763 rcu_read_lock();
764 cds_lfht_for_each_entry(pid_tracker->ht->ht,
765 &iter.iter, tracker_node, node.node) {
766 int ret = lttng_ht_del(pid_tracker->ht, &iter);
767
768 assert(!ret);
769 destroy_pid_tracker_node(tracker_node);
770 }
771 rcu_read_unlock();
772 ht_cleanup_push(pid_tracker->ht);
773 pid_tracker->ht = NULL;
774 }
775
776 static
777 struct ust_pid_tracker_node *pid_tracker_lookup(
778 struct ust_pid_tracker *pid_tracker, int pid,
779 struct lttng_ht_iter *iter)
780 {
781 unsigned long _pid = (unsigned long) pid;
782 struct lttng_ht_node_ulong *node;
783
784 lttng_ht_lookup(pid_tracker->ht, (void *) _pid, iter);
785 node = lttng_ht_iter_get_node_ulong(iter);
786 if (node) {
787 return caa_container_of(node, struct ust_pid_tracker_node,
788 node);
789 } else {
790 return NULL;
791 }
792 }
793
794 static
795 int pid_tracker_add_pid(struct ust_pid_tracker *pid_tracker, int pid)
796 {
797 int retval = LTTNG_OK;
798 struct ust_pid_tracker_node *tracker_node;
799 struct lttng_ht_iter iter;
800
801 if (pid < 0) {
802 retval = LTTNG_ERR_INVALID;
803 goto end;
804 }
805 tracker_node = pid_tracker_lookup(pid_tracker, pid, &iter);
806 if (tracker_node) {
807 /* Already exists. */
808 retval = LTTNG_ERR_PID_TRACKED;
809 goto end;
810 }
811 tracker_node = zmalloc(sizeof(*tracker_node));
812 if (!tracker_node) {
813 retval = LTTNG_ERR_NOMEM;
814 goto end;
815 }
816 lttng_ht_node_init_ulong(&tracker_node->node, (unsigned long) pid);
817 lttng_ht_add_unique_ulong(pid_tracker->ht, &tracker_node->node);
818 end:
819 return retval;
820 }
821
822 static
823 int pid_tracker_del_pid(struct ust_pid_tracker *pid_tracker, int pid)
824 {
825 int retval = LTTNG_OK, ret;
826 struct ust_pid_tracker_node *tracker_node;
827 struct lttng_ht_iter iter;
828
829 if (pid < 0) {
830 retval = LTTNG_ERR_INVALID;
831 goto end;
832 }
833 tracker_node = pid_tracker_lookup(pid_tracker, pid, &iter);
834 if (!tracker_node) {
835 /* Not found */
836 retval = LTTNG_ERR_PID_NOT_TRACKED;
837 goto end;
838 }
839 ret = lttng_ht_del(pid_tracker->ht, &iter);
840 assert(!ret);
841
842 destroy_pid_tracker_node(tracker_node);
843 end:
844 return retval;
845 }
846
847 /*
848 * The session lock is held when calling this function.
849 */
850 int trace_ust_pid_tracker_lookup(struct ltt_ust_session *session, int pid)
851 {
852 struct lttng_ht_iter iter;
853
854 if (!session->pid_tracker.ht) {
855 return 1;
856 }
857 if (pid_tracker_lookup(&session->pid_tracker, pid, &iter)) {
858 return 1;
859 }
860 return 0;
861 }
862
863 /*
864 * Called with the session lock held.
865 */
866 int trace_ust_track_pid(struct ltt_ust_session *session, int pid)
867 {
868 int retval = LTTNG_OK;
869 bool should_update_apps = false;
870
871 if (pid == -1) {
872 /* Track all pids: destroy tracker if exists. */
873 if (session->pid_tracker.ht) {
874 fini_pid_tracker(&session->pid_tracker);
875 /* Ensure all apps have session. */
876 should_update_apps = true;
877 }
878 } else {
879 int ret;
880
881 if (!session->pid_tracker.ht) {
882 /* Create tracker. */
883 if (init_pid_tracker(&session->pid_tracker)) {
884 ERR("Error initializing PID tracker");
885 retval = LTTNG_ERR_NOMEM;
886 goto end;
887 }
888 ret = pid_tracker_add_pid(&session->pid_tracker, pid);
889 if (ret != LTTNG_OK) {
890 retval = ret;
891 fini_pid_tracker(&session->pid_tracker);
892 goto end;
893 }
894 /* Remove all apps from session except pid. */
895 should_update_apps = true;
896 } else {
897 struct ust_app *app;
898
899 ret = pid_tracker_add_pid(&session->pid_tracker, pid);
900 if (ret != LTTNG_OK) {
901 retval = ret;
902 goto end;
903 }
904 /* Add session to application */
905 app = ust_app_find_by_pid(pid);
906 if (app) {
907 should_update_apps = true;
908 }
909 }
910 }
911 if (should_update_apps && session->active) {
912 ust_app_global_update_all(session);
913 }
914 end:
915 return retval;
916 }
917
918 /*
919 * Called with the session lock held.
920 */
921 int trace_ust_untrack_pid(struct ltt_ust_session *session, int pid)
922 {
923 int retval = LTTNG_OK;
924
925 if (pid == -1) {
926 /* Create empty tracker, replace old tracker. */
927 struct ust_pid_tracker tmp_tracker;
928
929 tmp_tracker = session->pid_tracker;
930 if (init_pid_tracker(&session->pid_tracker)) {
931 ERR("Error initializing PID tracker");
932 retval = LTTNG_ERR_NOMEM;
933 /* Rollback operation. */
934 session->pid_tracker = tmp_tracker;
935 goto end;
936 }
937 fini_pid_tracker(&tmp_tracker);
938
939 /* Remove session from all applications */
940 ust_app_global_update_all(session);
941 } else {
942 int ret;
943 struct ust_app *app;
944
945 if (!session->pid_tracker.ht) {
946 /* No PID being tracked. */
947 retval = LTTNG_ERR_PID_NOT_TRACKED;
948 goto end;
949 }
950 /* Remove PID from tracker */
951 ret = pid_tracker_del_pid(&session->pid_tracker, pid);
952 if (ret != LTTNG_OK) {
953 retval = ret;
954 goto end;
955 }
956 /* Remove session from application. */
957 app = ust_app_find_by_pid(pid);
958 if (app) {
959 ust_app_global_update(session, app);
960 }
961 }
962 end:
963 return retval;
964 }
965
966 /*
967 * Called with session lock held.
968 */
969 ssize_t trace_ust_list_tracker_pids(struct ltt_ust_session *session,
970 int32_t **_pids)
971 {
972 struct ust_pid_tracker_node *tracker_node;
973 struct lttng_ht_iter iter;
974 unsigned long count, i = 0;
975 long approx[2];
976 int32_t *pids;
977 int ret = 0;
978
979 if (!session->pid_tracker.ht) {
980 /* Tracker disabled. Set first entry to -1. */
981 pids = zmalloc(sizeof(*pids));
982 if (!pids) {
983 ret = -1;
984 goto end;
985 }
986 pids[0] = -1;
987 *_pids = pids;
988 return 1;
989 }
990
991 rcu_read_lock();
992 cds_lfht_count_nodes(session->pid_tracker.ht->ht,
993 &approx[0], &count, &approx[1]);
994 pids = zmalloc(sizeof(*pids) * count);
995 if (!pids) {
996 ret = -1;
997 goto end;
998 }
999 cds_lfht_for_each_entry(session->pid_tracker.ht->ht,
1000 &iter.iter, tracker_node, node.node) {
1001 pids[i++] = tracker_node->node.key;
1002 }
1003 *_pids = pids;
1004 ret = count;
1005 end:
1006 rcu_read_unlock();
1007 return ret;
1008 }
1009
1010 /*
1011 * RCU safe free context structure.
1012 */
1013 static void destroy_context_rcu(struct rcu_head *head)
1014 {
1015 struct lttng_ht_node_ulong *node =
1016 caa_container_of(head, struct lttng_ht_node_ulong, head);
1017 struct ltt_ust_context *ctx =
1018 caa_container_of(node, struct ltt_ust_context, node);
1019
1020 trace_ust_destroy_context(ctx);
1021 }
1022
1023 /*
1024 * Cleanup UST context hash table.
1025 */
1026 static void destroy_contexts(struct lttng_ht *ht)
1027 {
1028 int ret;
1029 struct lttng_ht_node_ulong *node;
1030 struct lttng_ht_iter iter;
1031 struct ltt_ust_context *ctx;
1032
1033 assert(ht);
1034
1035 rcu_read_lock();
1036 cds_lfht_for_each_entry(ht->ht, &iter.iter, node, node) {
1037 /* Remove from ordered list. */
1038 ctx = caa_container_of(node, struct ltt_ust_context, node);
1039 cds_list_del(&ctx->list);
1040 /* Remove from channel's hash table. */
1041 ret = lttng_ht_del(ht, &iter);
1042 if (!ret) {
1043 call_rcu(&node->head, destroy_context_rcu);
1044 }
1045 }
1046 rcu_read_unlock();
1047
1048 ht_cleanup_push(ht);
1049 }
1050
1051 /*
1052 * Cleanup ust event structure.
1053 */
1054 void trace_ust_destroy_event(struct ltt_ust_event *event)
1055 {
1056 assert(event);
1057
1058 DBG2("Trace destroy UST event %s", event->attr.name);
1059 free(event->filter_expression);
1060 free(event->filter);
1061 free(event->exclusion);
1062 free(event);
1063 }
1064
1065 /*
1066 * Cleanup ust context structure.
1067 */
1068 void trace_ust_destroy_context(struct ltt_ust_context *ctx)
1069 {
1070 assert(ctx);
1071
1072 if (ctx->ctx.ctx == LTTNG_UST_CONTEXT_APP_CONTEXT) {
1073 free(ctx->ctx.u.app_ctx.provider_name);
1074 free(ctx->ctx.u.app_ctx.ctx_name);
1075 }
1076 free(ctx);
1077 }
1078
1079 /*
1080 * URCU intermediate call to complete destroy event.
1081 */
1082 static void destroy_event_rcu(struct rcu_head *head)
1083 {
1084 struct lttng_ht_node_str *node =
1085 caa_container_of(head, struct lttng_ht_node_str, head);
1086 struct ltt_ust_event *event =
1087 caa_container_of(node, struct ltt_ust_event, node);
1088
1089 trace_ust_destroy_event(event);
1090 }
1091
1092 /*
1093 * Cleanup UST events hashtable.
1094 */
1095 static void destroy_events(struct lttng_ht *events)
1096 {
1097 int ret;
1098 struct lttng_ht_node_str *node;
1099 struct lttng_ht_iter iter;
1100
1101 assert(events);
1102
1103 rcu_read_lock();
1104 cds_lfht_for_each_entry(events->ht, &iter.iter, node, node) {
1105 ret = lttng_ht_del(events, &iter);
1106 assert(!ret);
1107 call_rcu(&node->head, destroy_event_rcu);
1108 }
1109 rcu_read_unlock();
1110
1111 ht_cleanup_push(events);
1112 }
1113
1114 /*
1115 * Cleanup ust channel structure.
1116 *
1117 * Should _NOT_ be called with RCU read lock held.
1118 */
1119 static void _trace_ust_destroy_channel(struct ltt_ust_channel *channel)
1120 {
1121 assert(channel);
1122
1123 DBG2("Trace destroy UST channel %s", channel->name);
1124
1125 free(channel);
1126 }
1127
1128 /*
1129 * URCU intermediate call to complete destroy channel.
1130 */
1131 static void destroy_channel_rcu(struct rcu_head *head)
1132 {
1133 struct lttng_ht_node_str *node =
1134 caa_container_of(head, struct lttng_ht_node_str, head);
1135 struct ltt_ust_channel *channel =
1136 caa_container_of(node, struct ltt_ust_channel, node);
1137
1138 _trace_ust_destroy_channel(channel);
1139 }
1140
1141 void trace_ust_destroy_channel(struct ltt_ust_channel *channel)
1142 {
1143 /* Destroying all events of the channel */
1144 destroy_events(channel->events);
1145 /* Destroying all context of the channel */
1146 destroy_contexts(channel->ctx);
1147
1148 call_rcu(&channel->node.head, destroy_channel_rcu);
1149 }
1150
1151 /*
1152 * Remove an UST channel from a channel HT.
1153 */
1154 void trace_ust_delete_channel(struct lttng_ht *ht,
1155 struct ltt_ust_channel *channel)
1156 {
1157 int ret;
1158 struct lttng_ht_iter iter;
1159
1160 assert(ht);
1161 assert(channel);
1162
1163 iter.iter.node = &channel->node.node;
1164 ret = lttng_ht_del(ht, &iter);
1165 assert(!ret);
1166 }
1167
1168 /*
1169 * Iterate over a hash table containing channels and cleanup safely.
1170 */
1171 static void destroy_channels(struct lttng_ht *channels)
1172 {
1173 struct lttng_ht_node_str *node;
1174 struct lttng_ht_iter iter;
1175
1176 assert(channels);
1177
1178 rcu_read_lock();
1179 cds_lfht_for_each_entry(channels->ht, &iter.iter, node, node) {
1180 struct ltt_ust_channel *chan =
1181 caa_container_of(node, struct ltt_ust_channel, node);
1182
1183 trace_ust_delete_channel(channels, chan);
1184 trace_ust_destroy_channel(chan);
1185 }
1186 rcu_read_unlock();
1187
1188 ht_cleanup_push(channels);
1189 }
1190
1191 /*
1192 * Cleanup UST global domain.
1193 */
1194 static void destroy_domain_global(struct ltt_ust_domain_global *dom)
1195 {
1196 assert(dom);
1197
1198 destroy_channels(dom->channels);
1199 }
1200
1201 /*
1202 * Cleanup ust session structure
1203 *
1204 * Should *NOT* be called with RCU read-side lock held.
1205 */
1206 void trace_ust_destroy_session(struct ltt_ust_session *session)
1207 {
1208 struct agent *agt;
1209 struct buffer_reg_uid *reg, *sreg;
1210 struct lttng_ht_iter iter;
1211
1212 assert(session);
1213
1214 DBG2("Trace UST destroy session %" PRIu64, session->id);
1215
1216 /* Cleaning up UST domain */
1217 destroy_domain_global(&session->domain_global);
1218
1219 rcu_read_lock();
1220 cds_lfht_for_each_entry(session->agents->ht, &iter.iter, agt, node.node) {
1221 int ret = lttng_ht_del(session->agents, &iter);
1222
1223 assert(!ret);
1224 agent_destroy(agt);
1225 }
1226 rcu_read_unlock();
1227
1228 ht_cleanup_push(session->agents);
1229
1230 /* Cleanup UID buffer registry object(s). */
1231 cds_list_for_each_entry_safe(reg, sreg, &session->buffer_reg_uid_list,
1232 lnode) {
1233 cds_list_del(&reg->lnode);
1234 buffer_reg_uid_remove(reg);
1235 buffer_reg_uid_destroy(reg, session->consumer);
1236 }
1237
1238 consumer_output_put(session->consumer);
1239
1240 fini_pid_tracker(&session->pid_tracker);
1241
1242 free(session);
1243 }
This page took 0.093081 seconds and 5 git commands to generate.