2 * Copyright (C) 2011 David Goulet <david.goulet@polymtl.ca>
4 * SPDX-License-Identifier: GPL-2.0-only
14 #include <lttng/event.h>
15 #include <lttng/lttng-error.h>
16 #include <lttng/kernel-probe.h>
17 #include <lttng/userspace-probe.h>
18 #include <lttng/userspace-probe-internal.h>
19 #include <lttng/event-rule/event-rule.h>
20 #include <lttng/event-rule/event-rule-internal.h>
21 #include <lttng/event-rule/kprobe.h>
22 #include <lttng/event-rule/kprobe-internal.h>
23 #include <lttng/event-rule/syscall.h>
24 #include <lttng/event-rule/syscall-internal.h>
25 #include <lttng/event-rule/tracepoint.h>
26 #include <lttng/event-rule/tracepoint-internal.h>
27 #include <lttng/event-rule/uprobe-internal.h>
28 #include <common/common.h>
29 #include <common/defaults.h>
30 #include <common/trace-chunk.h>
31 #include <common/macros.h>
34 #include "trace-kernel.h"
35 #include "lttng-sessiond.h"
36 #include "notification-thread-commands.h"
39 * Find the channel name for the given kernel session.
41 struct ltt_kernel_channel
*trace_kernel_get_channel_by_name(
42 const char *name
, struct ltt_kernel_session
*session
)
44 struct ltt_kernel_channel
*chan
;
50 * If we receive an empty string for channel name, it means the
51 * default channel name is requested.
54 name
= DEFAULT_CHANNEL_NAME
;
56 DBG("Trying to find channel %s", name
);
58 cds_list_for_each_entry(chan
, &session
->channel_list
.head
, list
) {
59 if (strcmp(name
, chan
->channel
->name
) == 0) {
60 DBG("Found channel by name %s", name
);
69 * Find the event for the given channel.
71 struct ltt_kernel_event
*trace_kernel_find_event(
72 char *name
, struct ltt_kernel_channel
*channel
,
73 enum lttng_event_type type
,
74 struct lttng_bytecode
*filter
)
76 struct ltt_kernel_event
*ev
;
82 cds_list_for_each_entry(ev
, &channel
->events_list
.head
, list
) {
83 if (type
!= LTTNG_EVENT_ALL
&& ev
->type
!= type
) {
86 if (strcmp(name
, ev
->event
->name
)) {
89 if ((ev
->filter
&& !filter
) || (!ev
->filter
&& filter
)) {
92 if (ev
->filter
&& filter
) {
93 if (ev
->filter
->len
!= filter
->len
||
94 memcmp(ev
->filter
->data
, filter
->data
,
103 DBG("Found event %s for channel %s", name
,
104 channel
->channel
->name
);
112 * Find the event name for the given channel.
114 struct ltt_kernel_event
*trace_kernel_get_event_by_name(
115 char *name
, struct ltt_kernel_channel
*channel
,
116 enum lttng_event_type type
)
118 struct ltt_kernel_event
*ev
;
124 cds_list_for_each_entry(ev
, &channel
->events_list
.head
, list
) {
125 if (type
!= LTTNG_EVENT_ALL
&& ev
->type
!= type
) {
128 if (strcmp(name
, ev
->event
->name
)) {
135 DBG("Found event %s for channel %s", name
,
136 channel
->channel
->name
);
144 * Allocate and initialize a kernel session data structure.
146 * Return pointer to structure or NULL.
148 struct ltt_kernel_session
*trace_kernel_create_session(void)
150 struct ltt_kernel_session
*lks
= NULL
;
152 /* Allocate a new ltt kernel session */
153 lks
= zmalloc(sizeof(struct ltt_kernel_session
));
155 PERROR("create kernel session zmalloc");
159 /* Init data structure */
161 lks
->metadata_stream_fd
= -1;
162 lks
->channel_count
= 0;
163 lks
->stream_count_global
= 0;
164 lks
->metadata
= NULL
;
165 CDS_INIT_LIST_HEAD(&lks
->channel_list
.head
);
167 lks
->tracker_pid
= process_attr_tracker_create();
168 if (!lks
->tracker_pid
) {
171 lks
->tracker_vpid
= process_attr_tracker_create();
172 if (!lks
->tracker_vpid
) {
175 lks
->tracker_uid
= process_attr_tracker_create();
176 if (!lks
->tracker_uid
) {
179 lks
->tracker_vuid
= process_attr_tracker_create();
180 if (!lks
->tracker_vuid
) {
183 lks
->tracker_gid
= process_attr_tracker_create();
184 if (!lks
->tracker_gid
) {
187 lks
->tracker_vgid
= process_attr_tracker_create();
188 if (!lks
->tracker_vgid
) {
191 lks
->consumer
= consumer_create_output(CONSUMER_DST_LOCAL
);
192 if (lks
->consumer
== NULL
) {
199 process_attr_tracker_destroy(lks
->tracker_pid
);
200 process_attr_tracker_destroy(lks
->tracker_vpid
);
201 process_attr_tracker_destroy(lks
->tracker_uid
);
202 process_attr_tracker_destroy(lks
->tracker_vuid
);
203 process_attr_tracker_destroy(lks
->tracker_gid
);
204 process_attr_tracker_destroy(lks
->tracker_vgid
);
212 * Allocate and initialize a kernel channel data structure.
214 * Return pointer to structure or NULL.
216 struct ltt_kernel_channel
*trace_kernel_create_channel(
217 struct lttng_channel
*chan
)
219 struct ltt_kernel_channel
*lkc
;
220 struct lttng_channel_extended
*extended
= NULL
;
224 lkc
= zmalloc(sizeof(struct ltt_kernel_channel
));
226 PERROR("ltt_kernel_channel zmalloc");
230 lkc
->channel
= zmalloc(sizeof(struct lttng_channel
));
231 if (lkc
->channel
== NULL
) {
232 PERROR("lttng_channel zmalloc");
236 extended
= zmalloc(sizeof(struct lttng_channel_extended
));
238 PERROR("lttng_channel_channel zmalloc");
241 memcpy(lkc
->channel
, chan
, sizeof(struct lttng_channel
));
242 memcpy(extended
, chan
->attr
.extended
.ptr
, sizeof(struct lttng_channel_extended
));
243 lkc
->channel
->attr
.extended
.ptr
= extended
;
247 * If we receive an empty string for channel name, it means the
248 * default channel name is requested.
250 if (chan
->name
[0] == '\0') {
251 strncpy(lkc
->channel
->name
, DEFAULT_CHANNEL_NAME
,
252 sizeof(lkc
->channel
->name
));
254 lkc
->channel
->name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
257 lkc
->stream_count
= 0;
258 lkc
->event_count
= 0;
260 lkc
->published_to_notification_thread
= false;
261 /* Init linked list */
262 CDS_INIT_LIST_HEAD(&lkc
->events_list
.head
);
263 CDS_INIT_LIST_HEAD(&lkc
->stream_list
.head
);
264 CDS_INIT_LIST_HEAD(&lkc
->ctx_list
);
278 * Allocate and init a kernel context object.
280 * Return the allocated object or NULL on error.
282 struct ltt_kernel_context
*trace_kernel_create_context(
283 struct lttng_kernel_context
*ctx
)
285 struct ltt_kernel_context
*kctx
;
287 kctx
= zmalloc(sizeof(*kctx
));
289 PERROR("zmalloc kernel context");
294 memcpy(&kctx
->ctx
, ctx
, sizeof(kctx
->ctx
));
301 * Allocate and init a kernel context object from an existing kernel context
304 * Return the allocated object or NULL on error.
306 struct ltt_kernel_context
*trace_kernel_copy_context(
307 struct ltt_kernel_context
*kctx
)
309 struct ltt_kernel_context
*kctx_copy
;
312 kctx_copy
= zmalloc(sizeof(*kctx_copy
));
314 PERROR("zmalloc ltt_kernel_context");
318 memcpy(kctx_copy
, kctx
, sizeof(*kctx_copy
));
319 memset(&kctx_copy
->list
, 0, sizeof(kctx_copy
->list
));
326 * Allocate and initialize a kernel event. Set name and event type.
327 * We own filter_expression, and filter.
329 * Return pointer to structure or NULL.
331 enum lttng_error_code
trace_kernel_create_event(
332 struct lttng_event
*ev
, char *filter_expression
,
333 struct lttng_bytecode
*filter
,
334 struct ltt_kernel_event
**kernel_event
)
336 enum lttng_error_code ret
;
337 struct lttng_kernel_event
*attr
;
338 struct ltt_kernel_event
*local_kernel_event
;
339 struct lttng_userspace_probe_location
*userspace_probe_location
= NULL
;
343 local_kernel_event
= zmalloc(sizeof(struct ltt_kernel_event
));
344 attr
= zmalloc(sizeof(struct lttng_kernel_event
));
345 if (local_kernel_event
== NULL
|| attr
== NULL
) {
346 PERROR("kernel event zmalloc");
347 ret
= LTTNG_ERR_NOMEM
;
352 case LTTNG_EVENT_PROBE
:
353 attr
->instrumentation
= LTTNG_KERNEL_KPROBE
;
354 attr
->u
.kprobe
.addr
= ev
->attr
.probe
.addr
;
355 attr
->u
.kprobe
.offset
= ev
->attr
.probe
.offset
;
356 strncpy(attr
->u
.kprobe
.symbol_name
,
357 ev
->attr
.probe
.symbol_name
, LTTNG_KERNEL_SYM_NAME_LEN
);
358 attr
->u
.kprobe
.symbol_name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
360 case LTTNG_EVENT_USERSPACE_PROBE
:
362 const struct lttng_userspace_probe_location
* location
= NULL
;
363 const struct lttng_userspace_probe_location_lookup_method
*lookup
= NULL
;
365 location
= lttng_event_get_userspace_probe_location(ev
);
367 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
372 * From this point on, the specific term 'uprobe' is used
373 * instead of the generic 'userspace probe' because it's the
374 * technology used at the moment for this instrumentation.
375 * LTTng currently implements userspace probes using uprobes.
376 * In the interactions with the kernel tracer, we use the
379 attr
->instrumentation
= LTTNG_KERNEL_UPROBE
;
382 * Only the elf lookup method is supported at the moment.
384 lookup
= lttng_userspace_probe_location_get_lookup_method(
387 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
392 * From the kernel tracer's perspective, all userspace probe
393 * event types are all the same: a file and an offset.
395 switch (lttng_userspace_probe_location_lookup_method_get_type(lookup
)) {
396 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_FUNCTION_ELF
:
397 /* Get the file descriptor on the target binary. */
399 lttng_userspace_probe_location_function_get_binary_fd(location
);
402 * Save a reference to the probe location used during
403 * the listing of events.
405 userspace_probe_location
=
406 lttng_userspace_probe_location_copy(location
);
408 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_TRACEPOINT_SDT
:
409 /* Get the file descriptor on the target binary. */
411 lttng_userspace_probe_location_tracepoint_get_binary_fd(location
);
414 * Save a reference to the probe location used during the listing of
417 userspace_probe_location
=
418 lttng_userspace_probe_location_copy(location
);
421 DBG("Unsupported lookup method type");
422 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
427 case LTTNG_EVENT_FUNCTION
:
428 attr
->instrumentation
= LTTNG_KERNEL_KRETPROBE
;
429 attr
->u
.kretprobe
.addr
= ev
->attr
.probe
.addr
;
430 attr
->u
.kretprobe
.offset
= ev
->attr
.probe
.offset
;
431 strncpy(attr
->u
.kretprobe
.symbol_name
,
432 ev
->attr
.probe
.symbol_name
, LTTNG_KERNEL_SYM_NAME_LEN
);
433 attr
->u
.kretprobe
.symbol_name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
435 case LTTNG_EVENT_FUNCTION_ENTRY
:
436 attr
->instrumentation
= LTTNG_KERNEL_FUNCTION
;
437 strncpy(attr
->u
.ftrace
.symbol_name
,
438 ev
->attr
.ftrace
.symbol_name
, LTTNG_KERNEL_SYM_NAME_LEN
);
439 attr
->u
.ftrace
.symbol_name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
441 case LTTNG_EVENT_TRACEPOINT
:
442 attr
->instrumentation
= LTTNG_KERNEL_TRACEPOINT
;
444 case LTTNG_EVENT_SYSCALL
:
445 attr
->instrumentation
= LTTNG_KERNEL_SYSCALL
;
447 case LTTNG_EVENT_ALL
:
448 attr
->instrumentation
= LTTNG_KERNEL_ALL
;
451 ERR("Unknown kernel instrumentation type (%d)", ev
->type
);
452 ret
= LTTNG_ERR_INVALID
;
456 /* Copy event name */
457 strncpy(attr
->name
, ev
->name
, LTTNG_KERNEL_SYM_NAME_LEN
);
458 attr
->name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
460 /* Setting up a kernel event */
461 local_kernel_event
->fd
= -1;
462 local_kernel_event
->event
= attr
;
463 local_kernel_event
->enabled
= 1;
464 local_kernel_event
->filter_expression
= filter_expression
;
465 local_kernel_event
->filter
= filter
;
466 local_kernel_event
->userspace_probe_location
= userspace_probe_location
;
468 *kernel_event
= local_kernel_event
;
473 free(filter_expression
);
475 free(local_kernel_event
);
481 * Allocate and initialize a kernel token event rule.
483 * Return pointer to structure or NULL.
485 enum lttng_error_code
trace_kernel_create_token_event_rule(
486 struct lttng_trigger
*trigger
,
488 uint64_t trigger_error_counter_index
,
489 struct ltt_kernel_token_event_rule
**kernel_token_event_rule
)
491 enum lttng_error_code ret
= LTTNG_OK
;
492 struct ltt_kernel_token_event_rule
*local_kernel_token_event_rule
;
493 const struct lttng_condition
*condition
= NULL
;
494 const struct lttng_event_rule
*event_rule
= NULL
;
496 assert(kernel_token_event_rule
);
498 condition
= lttng_trigger_get_condition(trigger
);
500 assert(lttng_condition_get_type(condition
) == LTTNG_CONDITION_TYPE_EVENT_RULE_HIT
);
502 assert(lttng_condition_event_rule_get_rule(condition
, &event_rule
) == LTTNG_CONDITION_STATUS_OK
);
504 assert(lttng_event_rule_get_type(event_rule
) != LTTNG_EVENT_RULE_TYPE_UNKNOWN
);
506 local_kernel_token_event_rule
= zmalloc(sizeof(struct ltt_kernel_token_event_rule
));
507 if (local_kernel_token_event_rule
== NULL
) {
508 PERROR("Failed to allocate ltt_kernel_token_event_rule structure");
509 ret
= LTTNG_ERR_NOMEM
;
513 local_kernel_token_event_rule
->fd
= -1;
514 local_kernel_token_event_rule
->enabled
= 1;
515 local_kernel_token_event_rule
->token
= token
;
516 local_kernel_token_event_rule
->error_counter_index
= trigger_error_counter_index
;
518 /* Get the reference of the event rule */
519 lttng_trigger_get(trigger
);
521 local_kernel_token_event_rule
->trigger
= trigger
;
522 /* The event rule still own the filter and bytecode */
523 local_kernel_token_event_rule
->filter
= lttng_event_rule_get_filter_bytecode(event_rule
);
525 DBG3("[trace] Kernel token event rule %" PRIu64
" allocated", local_kernel_token_event_rule
->token
);
527 *kernel_token_event_rule
= local_kernel_token_event_rule
;
532 * Initialize a kernel trigger from an event rule.
534 enum lttng_error_code
trace_kernel_init_trigger_from_event_rule(const struct lttng_event_rule
*rule
,
535 struct lttng_kernel_trigger
*kernel_trigger
)
537 enum lttng_error_code ret
;
538 enum lttng_event_rule_status status
;
539 const char *name
= NULL
;
541 /* TODO: do this for now but have disucssion on if this could be the
542 * responsability of the event_rule itself ala
543 * "lttng_even_rule_generate_kernel_trigger"
545 switch (lttng_event_rule_get_type(rule
)) {
546 case LTTNG_EVENT_RULE_TYPE_KPROBE
:
548 uint64_t address
= 0, offset
= 0;
549 const char *symbol_name
= NULL
;
550 const struct lttng_kernel_probe_location
*location
= NULL
;
551 enum lttng_kernel_probe_location_status k_status
;
553 status
= lttng_event_rule_kprobe_get_location(rule
, &location
);
554 if (status
!= LTTNG_EVENT_RULE_STATUS_OK
) {
555 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
559 switch (lttng_kernel_probe_location_get_type(location
)) {
560 case LTTNG_KERNEL_PROBE_LOCATION_TYPE_ADDRESS
:
562 k_status
= lttng_kernel_probe_location_address_get_address(
564 if (k_status
!= LTTNG_KERNEL_PROBE_LOCATION_STATUS_OK
) {
565 ERR("Getting kernel probe address failed.");
570 case LTTNG_KERNEL_PROBE_LOCATION_TYPE_SYMBOL_OFFSET
:
572 k_status
= lttng_kernel_probe_location_symbol_get_offset(
574 if (k_status
!= LTTNG_KERNEL_PROBE_LOCATION_STATUS_OK
) {
575 ERR("Getting kernel probe symbol offset failed.");
578 symbol_name
= lttng_kernel_probe_location_symbol_get_name(
583 ERR("Unknown kernel probe location type (%d)",
584 lttng_kernel_probe_location_get_type(
586 ret
= LTTNG_ERR_INVALID
;
590 kernel_trigger
->instrumentation
= LTTNG_KERNEL_KPROBE
;
591 kernel_trigger
->u
.kprobe
.addr
= address
;
592 kernel_trigger
->u
.kprobe
.offset
= offset
;
594 strncpy(kernel_trigger
->u
.kprobe
.symbol_name
,
595 symbol_name
, LTTNG_KERNEL_SYM_NAME_LEN
);
597 kernel_trigger
->u
.kprobe
598 .symbol_name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] =
600 (void) lttng_event_rule_kprobe_get_name(rule
, &name
);
604 case LTTNG_EVENT_RULE_TYPE_UPROBE
:
606 const struct lttng_userspace_probe_location
* location
= NULL
;
607 const struct lttng_userspace_probe_location_lookup_method
*lookup
= NULL
;
609 status
= lttng_event_rule_uprobe_get_location(rule
, &location
);
610 if (status
!= LTTNG_EVENT_RULE_STATUS_OK
) {
611 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
615 kernel_trigger
->instrumentation
= LTTNG_KERNEL_UPROBE
;
618 * Only the elf lookup method is supported at the moment.
620 lookup
= lttng_userspace_probe_location_get_lookup_method(
623 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
628 * From the kernel tracer's perspective, all userspace probe
629 * event types are all the same: a file and an offset.
631 switch (lttng_userspace_probe_location_lookup_method_get_type(lookup
)) {
632 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_FUNCTION_ELF
:
633 /* Get the file descriptor on the target binary. */
634 kernel_trigger
->u
.uprobe
.fd
=
635 lttng_userspace_probe_location_function_get_binary_fd(location
);
638 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_TRACEPOINT_SDT
:
639 /* Get the file descriptor on the target binary. */
640 kernel_trigger
->u
.uprobe
.fd
=
641 lttng_userspace_probe_location_tracepoint_get_binary_fd(location
);
644 DBG("Unsupported lookup method type");
645 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
649 (void) lttng_event_rule_uprobe_get_name(rule
, &name
);
654 case LTTNG_EVENT_RULE_TYPE_KRETPROBE
:
655 assert("Not supported" && 0);
658 case LTTNG_EVENT_RULE_TYPE_TRACEPOINT
:
659 /* TODO: assert his is a kernel domain event-rule */
660 kernel_trigger
->instrumentation
= LTTNG_KERNEL_TRACEPOINT
;
661 (void) lttng_event_rule_tracepoint_get_pattern(rule
, &name
);
664 case LTTNG_EVENT_RULE_TYPE_SYSCALL
:
665 kernel_trigger
->instrumentation
= LTTNG_KERNEL_SYSCALL
;
666 (void) lttng_event_rule_syscall_get_pattern(rule
, &name
);
670 ERR("Unknown kernel event rule instrumentation type (%d)", lttng_event_rule_get_type(rule
));
671 ret
= LTTNG_ERR_INVALID
;
676 * WTF is LTTNG_EVENT_ALL??? and LTTNG_EVENT_FUNTION_ENTRY?????
679 /* Copy event name */
680 strncpy(kernel_trigger
->name
, name
, LTTNG_KERNEL_SYM_NAME_LEN
);
681 kernel_trigger
->name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
687 * Allocate and initialize a kernel metadata.
689 * Return pointer to structure or NULL.
691 struct ltt_kernel_metadata
*trace_kernel_create_metadata(void)
694 struct ltt_kernel_metadata
*lkm
;
695 struct lttng_channel
*chan
;
697 lkm
= zmalloc(sizeof(struct ltt_kernel_metadata
));
698 chan
= zmalloc(sizeof(struct lttng_channel
));
699 if (lkm
== NULL
|| chan
== NULL
) {
700 PERROR("kernel metadata zmalloc");
705 chan
->name
, DEFAULT_METADATA_NAME
, sizeof(chan
->name
));
707 ERR("Failed to initialize metadata channel name to `%s`",
708 DEFAULT_METADATA_NAME
);
712 /* Set default attributes */
713 chan
->attr
.overwrite
= DEFAULT_METADATA_OVERWRITE
;
714 chan
->attr
.subbuf_size
= default_get_metadata_subbuf_size();
715 chan
->attr
.num_subbuf
= DEFAULT_METADATA_SUBBUF_NUM
;
716 chan
->attr
.switch_timer_interval
= DEFAULT_METADATA_SWITCH_TIMER
;
717 chan
->attr
.read_timer_interval
= DEFAULT_METADATA_READ_TIMER
;;
721 * The metadata channel of kernel sessions must use the "mmap"
722 * back-end since the consumer daemon accumulates complete
723 * metadata units before sending them to the relay daemon in
724 * live mode. The consumer daemon also needs to extract the contents
725 * of the metadata cache when computing a rotation position.
727 * In both cases, it is not possible to rely on the splice
728 * back-end as the consumer daemon may need to accumulate more
729 * content than can be backed by the ring buffer's underlying
732 chan
->attr
.output
= LTTNG_EVENT_MMAP
;
733 chan
->attr
.tracefile_size
= 0;
734 chan
->attr
.tracefile_count
= 0;
735 chan
->attr
.live_timer_interval
= 0;
750 * Allocate and initialize a kernel stream. The stream is set to ACTIVE_FD by
753 * Return pointer to structure or NULL.
755 struct ltt_kernel_stream
*trace_kernel_create_stream(const char *name
,
759 struct ltt_kernel_stream
*lks
;
763 lks
= zmalloc(sizeof(struct ltt_kernel_stream
));
765 PERROR("kernel stream zmalloc");
770 ret
= snprintf(lks
->name
, sizeof(lks
->name
), "%s_%u", name
, count
);
772 PERROR("snprintf stream name");
775 lks
->name
[sizeof(lks
->name
) - 1] = '\0';
789 * Cleanup kernel stream structure.
791 void trace_kernel_destroy_stream(struct ltt_kernel_stream
*stream
)
795 DBG("[trace] Closing stream fd %d", stream
->fd
);
796 /* Close kernel fd */
797 if (stream
->fd
>= 0) {
800 ret
= close(stream
->fd
);
805 /* Remove from stream list */
806 cds_list_del(&stream
->list
);
812 * Cleanup kernel event structure.
814 void trace_kernel_destroy_event(struct ltt_kernel_event
*event
)
818 if (event
->fd
>= 0) {
821 DBG("[trace] Closing event fd %d", event
->fd
);
822 /* Close kernel fd */
823 ret
= close(event
->fd
);
828 DBG("[trace] Tearing down event (no associated fd)");
831 /* Remove from event list */
832 cds_list_del(&event
->list
);
834 free(event
->filter_expression
);
842 * Cleanup kernel event structure.
844 void trace_kernel_destroy_token_event_rule(struct ltt_kernel_token_event_rule
*event
)
846 /* TODO: review in depth to ensure adequate disposing */
849 if (event
->fd
>= 0) {
852 DBG("[trace] Closing ,token event rule fd %d", event
->fd
);
853 /* Close kernel fd */
854 ret
= close(event
->fd
);
859 DBG("[trace] Tearing down token event rule (no associated fd)");
862 lttng_trigger_put(event
->trigger
);
866 * Cleanup kernel context structure.
868 void trace_kernel_destroy_context(struct ltt_kernel_context
*ctx
)
873 cds_list_del(&ctx
->list
);
879 * Cleanup kernel channel structure.
881 void trace_kernel_destroy_channel(struct ltt_kernel_channel
*channel
)
883 struct ltt_kernel_stream
*stream
, *stmp
;
884 struct ltt_kernel_event
*event
, *etmp
;
885 struct ltt_kernel_context
*ctx
, *ctmp
;
887 enum lttng_error_code status
;
891 DBG("[trace] Closing channel fd %d", channel
->fd
);
892 /* Close kernel fd */
893 if (channel
->fd
>= 0) {
894 ret
= close(channel
->fd
);
900 /* For each stream in the channel list */
901 cds_list_for_each_entry_safe(stream
, stmp
, &channel
->stream_list
.head
, list
) {
902 trace_kernel_destroy_stream(stream
);
905 /* For each event in the channel list */
906 cds_list_for_each_entry_safe(event
, etmp
, &channel
->events_list
.head
, list
) {
907 trace_kernel_destroy_event(event
);
910 /* For each context in the channel list */
911 cds_list_for_each_entry_safe(ctx
, ctmp
, &channel
->ctx_list
, list
) {
912 trace_kernel_destroy_context(ctx
);
915 /* Remove from channel list */
916 cds_list_del(&channel
->list
);
918 if (notification_thread_handle
919 && channel
->published_to_notification_thread
) {
920 status
= notification_thread_command_remove_channel(
921 notification_thread_handle
,
922 channel
->key
, LTTNG_DOMAIN_KERNEL
);
923 assert(status
== LTTNG_OK
);
925 free(channel
->channel
->attr
.extended
.ptr
);
926 free(channel
->channel
);
931 * Cleanup kernel metadata structure.
933 void trace_kernel_destroy_metadata(struct ltt_kernel_metadata
*metadata
)
937 DBG("[trace] Closing metadata fd %d", metadata
->fd
);
938 /* Close kernel fd */
939 if (metadata
->fd
>= 0) {
942 ret
= close(metadata
->fd
);
948 free(metadata
->conf
);
953 * Cleanup kernel session structure
955 * Should *NOT* be called with RCU read-side lock held.
957 void trace_kernel_destroy_session(struct ltt_kernel_session
*session
)
959 struct ltt_kernel_channel
*channel
, *ctmp
;
964 DBG("[trace] Closing session fd %d", session
->fd
);
965 /* Close kernel fds */
966 if (session
->fd
>= 0) {
967 ret
= close(session
->fd
);
973 if (session
->metadata_stream_fd
>= 0) {
974 DBG("[trace] Closing metadata stream fd %d", session
->metadata_stream_fd
);
975 ret
= close(session
->metadata_stream_fd
);
981 if (session
->metadata
!= NULL
) {
982 trace_kernel_destroy_metadata(session
->metadata
);
985 cds_list_for_each_entry_safe(channel
, ctmp
, &session
->channel_list
.head
, list
) {
986 trace_kernel_destroy_channel(channel
);
990 /* Free elements needed by destroy notifiers. */
991 void trace_kernel_free_session(struct ltt_kernel_session
*session
)
993 /* Wipe consumer output object */
994 consumer_output_put(session
->consumer
);
996 process_attr_tracker_destroy(session
->tracker_pid
);
997 process_attr_tracker_destroy(session
->tracker_vpid
);
998 process_attr_tracker_destroy(session
->tracker_uid
);
999 process_attr_tracker_destroy(session
->tracker_vuid
);
1000 process_attr_tracker_destroy(session
->tracker_gid
);
1001 process_attr_tracker_destroy(session
->tracker_vgid
);