SoW-2020-0002: Trace Hit Counters: trigger error reporting integration
[lttng-tools.git] / src / bin / lttng-sessiond / trace-kernel.c
CommitLineData
54012638 1/*
ab5be9fa 2 * Copyright (C) 2011 David Goulet <david.goulet@polymtl.ca>
54012638 3 *
ab5be9fa 4 * SPDX-License-Identifier: GPL-2.0-only
54012638 5 *
54012638
DG
6 */
7
6c1c0768 8#define _LGPL_SOURCE
54012638
DG
9#include <stdio.h>
10#include <stdlib.h>
11#include <string.h>
c363b55d 12#include <unistd.h>
54012638 13
dcabc190
FD
14#include <lttng/event.h>
15#include <lttng/lttng-error.h>
2463b787 16#include <lttng/kernel-probe.h>
dcabc190
FD
17#include <lttng/userspace-probe.h>
18#include <lttng/userspace-probe-internal.h>
2463b787
JR
19#include <lttng/event-rule/event-rule.h>
20#include <lttng/event-rule/event-rule-internal.h>
21#include <lttng/event-rule/kprobe.h>
22#include <lttng/event-rule/kprobe-internal.h>
23#include <lttng/event-rule/syscall.h>
24#include <lttng/event-rule/syscall-internal.h>
25#include <lttng/event-rule/tracepoint.h>
26#include <lttng/event-rule/tracepoint-internal.h>
27#include <lttng/event-rule/uprobe-internal.h>
990570ed
DG
28#include <common/common.h>
29#include <common/defaults.h>
82b69413 30#include <common/trace-chunk.h>
d42266a4 31#include <common/macros.h>
1e307fab 32
00e2e675 33#include "consumer.h"
62499ad6 34#include "trace-kernel.h"
e9404c27
JG
35#include "lttng-sessiond.h"
36#include "notification-thread-commands.h"
54012638 37
19e70852 38/*
050349bb 39 * Find the channel name for the given kernel session.
19e70852 40 */
62499ad6 41struct ltt_kernel_channel *trace_kernel_get_channel_by_name(
df4f5a87 42 const char *name, struct ltt_kernel_session *session)
19e70852
DG
43{
44 struct ltt_kernel_channel *chan;
45
0525e9ae
DG
46 assert(session);
47 assert(name);
19e70852 48
85076754
MD
49 /*
50 * If we receive an empty string for channel name, it means the
51 * default channel name is requested.
52 */
53 if (name[0] == '\0')
54 name = DEFAULT_CHANNEL_NAME;
55
54d01ffb
DG
56 DBG("Trying to find channel %s", name);
57
19e70852
DG
58 cds_list_for_each_entry(chan, &session->channel_list.head, list) {
59 if (strcmp(name, chan->channel->name) == 0) {
60 DBG("Found channel by name %s", name);
61 return chan;
62 }
63 }
64
19e70852
DG
65 return NULL;
66}
67
00a62084
MD
68/*
69 * Find the event for the given channel.
70 */
71struct ltt_kernel_event *trace_kernel_find_event(
72 char *name, struct ltt_kernel_channel *channel,
73 enum lttng_event_type type,
2463b787 74 struct lttng_bytecode *filter)
00a62084
MD
75{
76 struct ltt_kernel_event *ev;
77 int found = 0;
78
79 assert(name);
80 assert(channel);
81
82 cds_list_for_each_entry(ev, &channel->events_list.head, list) {
83 if (type != LTTNG_EVENT_ALL && ev->type != type) {
84 continue;
85 }
86 if (strcmp(name, ev->event->name)) {
87 continue;
88 }
89 if ((ev->filter && !filter) || (!ev->filter && filter)) {
90 continue;
91 }
92 if (ev->filter && filter) {
93 if (ev->filter->len != filter->len ||
94 memcmp(ev->filter->data, filter->data,
95 filter->len) != 0) {
96 continue;
97 }
98 }
99 found = 1;
100 break;
101 }
102 if (found) {
103 DBG("Found event %s for channel %s", name,
104 channel->channel->name);
105 return ev;
106 } else {
107 return NULL;
108 }
109}
110
19e70852 111/*
050349bb 112 * Find the event name for the given channel.
19e70852 113 */
62499ad6 114struct ltt_kernel_event *trace_kernel_get_event_by_name(
d0ae4ea8
MD
115 char *name, struct ltt_kernel_channel *channel,
116 enum lttng_event_type type)
19e70852
DG
117{
118 struct ltt_kernel_event *ev;
00a62084 119 int found = 0;
19e70852 120
0525e9ae
DG
121 assert(name);
122 assert(channel);
19e70852
DG
123
124 cds_list_for_each_entry(ev, &channel->events_list.head, list) {
00a62084 125 if (type != LTTNG_EVENT_ALL && ev->type != type) {
d0ae4ea8 126 continue;
19e70852 127 }
00a62084
MD
128 if (strcmp(name, ev->event->name)) {
129 continue;
130 }
131 found = 1;
132 break;
133 }
134 if (found) {
135 DBG("Found event %s for channel %s", name,
136 channel->channel->name);
137 return ev;
138 } else {
139 return NULL;
19e70852 140 }
19e70852
DG
141}
142
54012638 143/*
050349bb 144 * Allocate and initialize a kernel session data structure.
54012638 145 *
050349bb 146 * Return pointer to structure or NULL.
54012638 147 */
dec56f6c 148struct ltt_kernel_session *trace_kernel_create_session(void)
54012638 149{
a4b92340 150 struct ltt_kernel_session *lks = NULL;
54012638
DG
151
152 /* Allocate a new ltt kernel session */
ba7f0ae5 153 lks = zmalloc(sizeof(struct ltt_kernel_session));
54012638 154 if (lks == NULL) {
df0f840b 155 PERROR("create kernel session zmalloc");
a4b92340 156 goto alloc_error;
54012638
DG
157 }
158
159 /* Init data structure */
03550b58
MD
160 lks->fd = -1;
161 lks->metadata_stream_fd = -1;
54012638
DG
162 lks->channel_count = 0;
163 lks->stream_count_global = 0;
164 lks->metadata = NULL;
165 CDS_INIT_LIST_HEAD(&lks->channel_list.head);
166
159b042f
JG
167 lks->tracker_pid = process_attr_tracker_create();
168 if (!lks->tracker_pid) {
55c9e7ca
JR
169 goto error;
170 }
159b042f
JG
171 lks->tracker_vpid = process_attr_tracker_create();
172 if (!lks->tracker_vpid) {
55c9e7ca
JR
173 goto error;
174 }
159b042f
JG
175 lks->tracker_uid = process_attr_tracker_create();
176 if (!lks->tracker_uid) {
55c9e7ca
JR
177 goto error;
178 }
159b042f
JG
179 lks->tracker_vuid = process_attr_tracker_create();
180 if (!lks->tracker_vuid) {
55c9e7ca
JR
181 goto error;
182 }
159b042f
JG
183 lks->tracker_gid = process_attr_tracker_create();
184 if (!lks->tracker_gid) {
55c9e7ca
JR
185 goto error;
186 }
159b042f
JG
187 lks->tracker_vgid = process_attr_tracker_create();
188 if (!lks->tracker_vgid) {
55c9e7ca
JR
189 goto error;
190 }
00e2e675
DG
191 lks->consumer = consumer_create_output(CONSUMER_DST_LOCAL);
192 if (lks->consumer == NULL) {
193 goto error;
194 }
195
54012638
DG
196 return lks;
197
198error:
159b042f
JG
199 process_attr_tracker_destroy(lks->tracker_pid);
200 process_attr_tracker_destroy(lks->tracker_vpid);
201 process_attr_tracker_destroy(lks->tracker_uid);
202 process_attr_tracker_destroy(lks->tracker_vuid);
203 process_attr_tracker_destroy(lks->tracker_gid);
204 process_attr_tracker_destroy(lks->tracker_vgid);
a4b92340
DG
205 free(lks);
206
207alloc_error:
54012638
DG
208 return NULL;
209}
210
211/*
050349bb 212 * Allocate and initialize a kernel channel data structure.
54012638 213 *
050349bb 214 * Return pointer to structure or NULL.
54012638 215 */
00e2e675 216struct ltt_kernel_channel *trace_kernel_create_channel(
fdd9eb17 217 struct lttng_channel *chan)
54012638 218{
54012638 219 struct ltt_kernel_channel *lkc;
61a5b6b1 220 struct lttng_channel_extended *extended = NULL;
54012638 221
0525e9ae
DG
222 assert(chan);
223
ba7f0ae5 224 lkc = zmalloc(sizeof(struct ltt_kernel_channel));
f3ed775e 225 if (lkc == NULL) {
df0f840b 226 PERROR("ltt_kernel_channel zmalloc");
54012638
DG
227 goto error;
228 }
229
ba7f0ae5 230 lkc->channel = zmalloc(sizeof(struct lttng_channel));
f3ed775e 231 if (lkc->channel == NULL) {
df0f840b 232 PERROR("lttng_channel zmalloc");
e9404c27
JG
233 goto error;
234 }
235
236 extended = zmalloc(sizeof(struct lttng_channel_extended));
237 if (!extended) {
238 PERROR("lttng_channel_channel zmalloc");
f3ed775e
DG
239 goto error;
240 }
241 memcpy(lkc->channel, chan, sizeof(struct lttng_channel));
e9404c27
JG
242 memcpy(extended, chan->attr.extended.ptr, sizeof(struct lttng_channel_extended));
243 lkc->channel->attr.extended.ptr = extended;
244 extended = NULL;
54012638 245
85076754
MD
246 /*
247 * If we receive an empty string for channel name, it means the
248 * default channel name is requested.
249 */
250 if (chan->name[0] == '\0') {
251 strncpy(lkc->channel->name, DEFAULT_CHANNEL_NAME,
252 sizeof(lkc->channel->name));
253 }
bd722d76 254 lkc->channel->name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0';
85076754 255
03550b58 256 lkc->fd = -1;
54012638 257 lkc->stream_count = 0;
cbbbb275 258 lkc->event_count = 0;
d36b8583 259 lkc->enabled = 1;
753873bf 260 lkc->published_to_notification_thread = false;
54012638
DG
261 /* Init linked list */
262 CDS_INIT_LIST_HEAD(&lkc->events_list.head);
263 CDS_INIT_LIST_HEAD(&lkc->stream_list.head);
645328ae 264 CDS_INIT_LIST_HEAD(&lkc->ctx_list);
54012638
DG
265
266 return lkc;
267
268error:
e9404c27
JG
269 if (lkc) {
270 free(lkc->channel);
271 }
272 free(extended);
273 free(lkc);
54012638
DG
274 return NULL;
275}
276
645328ae
DG
277/*
278 * Allocate and init a kernel context object.
279 *
280 * Return the allocated object or NULL on error.
281 */
282struct ltt_kernel_context *trace_kernel_create_context(
283 struct lttng_kernel_context *ctx)
284{
285 struct ltt_kernel_context *kctx;
286
287 kctx = zmalloc(sizeof(*kctx));
288 if (!kctx) {
289 PERROR("zmalloc kernel context");
290 goto error;
291 }
292
293 if (ctx) {
294 memcpy(&kctx->ctx, ctx, sizeof(kctx->ctx));
295 }
df3c77c8
JG
296error:
297 return kctx;
298}
645328ae 299
df3c77c8
JG
300/*
301 * Allocate and init a kernel context object from an existing kernel context
302 * object.
303 *
304 * Return the allocated object or NULL on error.
305 */
306struct ltt_kernel_context *trace_kernel_copy_context(
307 struct ltt_kernel_context *kctx)
308{
309 struct ltt_kernel_context *kctx_copy;
310
311 assert(kctx);
312 kctx_copy = zmalloc(sizeof(*kctx_copy));
313 if (!kctx_copy) {
314 PERROR("zmalloc ltt_kernel_context");
315 goto error;
316 }
317
318 memcpy(kctx_copy, kctx, sizeof(*kctx_copy));
319 memset(&kctx_copy->list, 0, sizeof(kctx_copy->list));
7b9445b3 320
645328ae 321error:
df3c77c8 322 return kctx_copy;
645328ae
DG
323}
324
54012638 325/*
050349bb 326 * Allocate and initialize a kernel event. Set name and event type.
a969e101 327 * We own filter_expression, and filter.
54012638 328 *
050349bb 329 * Return pointer to structure or NULL.
54012638 330 */
71a3bb01
FD
331enum lttng_error_code trace_kernel_create_event(
332 struct lttng_event *ev, char *filter_expression,
2463b787 333 struct lttng_bytecode *filter,
71a3bb01 334 struct ltt_kernel_event **kernel_event)
54012638 335{
71a3bb01 336 enum lttng_error_code ret;
54012638 337 struct lttng_kernel_event *attr;
71a3bb01 338 struct ltt_kernel_event *local_kernel_event;
dcabc190 339 struct lttng_userspace_probe_location *userspace_probe_location = NULL;
54012638 340
0525e9ae
DG
341 assert(ev);
342
71a3bb01 343 local_kernel_event = zmalloc(sizeof(struct ltt_kernel_event));
ba7f0ae5 344 attr = zmalloc(sizeof(struct lttng_kernel_event));
71a3bb01 345 if (local_kernel_event == NULL || attr == NULL) {
df0f840b 346 PERROR("kernel event zmalloc");
71a3bb01 347 ret = LTTNG_ERR_NOMEM;
54012638
DG
348 goto error;
349 }
350
f3ed775e 351 switch (ev->type) {
7d29a247 352 case LTTNG_EVENT_PROBE:
e6ddca71 353 attr->instrumentation = LTTNG_KERNEL_KPROBE;
7d29a247
DG
354 attr->u.kprobe.addr = ev->attr.probe.addr;
355 attr->u.kprobe.offset = ev->attr.probe.offset;
f3ed775e 356 strncpy(attr->u.kprobe.symbol_name,
dbbb3ec5
DG
357 ev->attr.probe.symbol_name, LTTNG_KERNEL_SYM_NAME_LEN);
358 attr->u.kprobe.symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0';
f3ed775e 359 break;
dcabc190
FD
360 case LTTNG_EVENT_USERSPACE_PROBE:
361 {
87597c2c
JG
362 const struct lttng_userspace_probe_location* location = NULL;
363 const struct lttng_userspace_probe_location_lookup_method *lookup = NULL;
dcabc190
FD
364
365 location = lttng_event_get_userspace_probe_location(ev);
366 if (!location) {
367 ret = LTTNG_ERR_PROBE_LOCATION_INVAL;
368 goto error;
369 }
370
371 /*
372 * From this point on, the specific term 'uprobe' is used
373 * instead of the generic 'userspace probe' because it's the
374 * technology used at the moment for this instrumentation.
375 * LTTng currently implements userspace probes using uprobes.
376 * In the interactions with the kernel tracer, we use the
377 * uprobe term.
378 */
379 attr->instrumentation = LTTNG_KERNEL_UPROBE;
380
381 /*
382 * Only the elf lookup method is supported at the moment.
383 */
384 lookup = lttng_userspace_probe_location_get_lookup_method(
385 location);
386 if (!lookup) {
387 ret = LTTNG_ERR_PROBE_LOCATION_INVAL;
388 goto error;
389 }
390
391 /*
392 * From the kernel tracer's perspective, all userspace probe
393 * event types are all the same: a file and an offset.
394 */
395 switch (lttng_userspace_probe_location_lookup_method_get_type(lookup)) {
396 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_FUNCTION_ELF:
397 /* Get the file descriptor on the target binary. */
398 attr->u.uprobe.fd =
399 lttng_userspace_probe_location_function_get_binary_fd(location);
400
401 /*
402 * Save a reference to the probe location used during
e368fb43 403 * the listing of events.
dcabc190
FD
404 */
405 userspace_probe_location =
406 lttng_userspace_probe_location_copy(location);
dcabc190
FD
407 break;
408 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_TRACEPOINT_SDT:
409 /* Get the file descriptor on the target binary. */
410 attr->u.uprobe.fd =
411 lttng_userspace_probe_location_tracepoint_get_binary_fd(location);
412
413 /*
414 * Save a reference to the probe location used during the listing of
e368fb43 415 * events.
dcabc190
FD
416 */
417 userspace_probe_location =
418 lttng_userspace_probe_location_copy(location);
dcabc190
FD
419 break;
420 default:
421 DBG("Unsupported lookup method type");
422 ret = LTTNG_ERR_PROBE_LOCATION_INVAL;
423 goto error;
424 }
425 break;
426 }
f3ed775e 427 case LTTNG_EVENT_FUNCTION:
8f0d098b
MD
428 attr->instrumentation = LTTNG_KERNEL_KRETPROBE;
429 attr->u.kretprobe.addr = ev->attr.probe.addr;
430 attr->u.kretprobe.offset = ev->attr.probe.offset;
8f0d098b 431 strncpy(attr->u.kretprobe.symbol_name,
dbbb3ec5
DG
432 ev->attr.probe.symbol_name, LTTNG_KERNEL_SYM_NAME_LEN);
433 attr->u.kretprobe.symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0';
8f0d098b
MD
434 break;
435 case LTTNG_EVENT_FUNCTION_ENTRY:
f3ed775e
DG
436 attr->instrumentation = LTTNG_KERNEL_FUNCTION;
437 strncpy(attr->u.ftrace.symbol_name,
dbbb3ec5
DG
438 ev->attr.ftrace.symbol_name, LTTNG_KERNEL_SYM_NAME_LEN);
439 attr->u.ftrace.symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0';
f3ed775e 440 break;
e6ddca71
DG
441 case LTTNG_EVENT_TRACEPOINT:
442 attr->instrumentation = LTTNG_KERNEL_TRACEPOINT;
f3ed775e 443 break;
a54bd42d
MD
444 case LTTNG_EVENT_SYSCALL:
445 attr->instrumentation = LTTNG_KERNEL_SYSCALL;
0133c199 446 break;
7a3d1328
MD
447 case LTTNG_EVENT_ALL:
448 attr->instrumentation = LTTNG_KERNEL_ALL;
449 break;
f3ed775e
DG
450 default:
451 ERR("Unknown kernel instrumentation type (%d)", ev->type);
71a3bb01 452 ret = LTTNG_ERR_INVALID;
f3ed775e
DG
453 goto error;
454 }
455
456 /* Copy event name */
dbbb3ec5
DG
457 strncpy(attr->name, ev->name, LTTNG_KERNEL_SYM_NAME_LEN);
458 attr->name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0';
f3ed775e 459
54012638 460 /* Setting up a kernel event */
71a3bb01
FD
461 local_kernel_event->fd = -1;
462 local_kernel_event->event = attr;
463 local_kernel_event->enabled = 1;
464 local_kernel_event->filter_expression = filter_expression;
465 local_kernel_event->filter = filter;
dcabc190 466 local_kernel_event->userspace_probe_location = userspace_probe_location;
54012638 467
71a3bb01
FD
468 *kernel_event = local_kernel_event;
469
470 return LTTNG_OK;
54012638
DG
471
472error:
a969e101
MD
473 free(filter_expression);
474 free(filter);
71a3bb01 475 free(local_kernel_event);
a2c0da86 476 free(attr);
71a3bb01 477 return ret;
54012638
DG
478}
479
2463b787
JR
480/*
481 * Allocate and initialize a kernel token event rule.
482 *
483 * Return pointer to structure or NULL.
484 */
485enum lttng_error_code trace_kernel_create_token_event_rule(
486 struct lttng_trigger *trigger,
487 uint64_t token,
488 uint64_t trigger_error_counter_index,
489 struct ltt_kernel_token_event_rule **kernel_token_event_rule)
490{
491 enum lttng_error_code ret = LTTNG_OK;
492 struct ltt_kernel_token_event_rule *local_kernel_token_event_rule;
493 const struct lttng_condition *condition = NULL;
494 const struct lttng_event_rule *event_rule = NULL;
495
496 assert(kernel_token_event_rule);
497
498 condition = lttng_trigger_get_condition(trigger);
499 assert(condition);
500 assert(lttng_condition_get_type(condition) == LTTNG_CONDITION_TYPE_EVENT_RULE_HIT);
501
502 assert(lttng_condition_event_rule_get_rule(condition, &event_rule) == LTTNG_CONDITION_STATUS_OK);
503 assert(event_rule);
504 assert(lttng_event_rule_get_type(event_rule) != LTTNG_EVENT_RULE_TYPE_UNKNOWN);
505
506 local_kernel_token_event_rule = zmalloc(sizeof(struct ltt_kernel_token_event_rule));
507 if (local_kernel_token_event_rule == NULL) {
508 PERROR("Failed to allocate ltt_kernel_token_event_rule structure");
509 ret = LTTNG_ERR_NOMEM;
510 goto error;
511 }
512
513 local_kernel_token_event_rule->fd = -1;
514 local_kernel_token_event_rule->enabled = 1;
515 local_kernel_token_event_rule->token = token;
516 local_kernel_token_event_rule->error_counter_index = trigger_error_counter_index;
517
518 /* Get the reference of the event rule */
519 lttng_trigger_get(trigger);
520
521 local_kernel_token_event_rule->trigger = trigger;
522 /* The event rule still own the filter and bytecode */
523 local_kernel_token_event_rule->filter = lttng_event_rule_get_filter_bytecode(event_rule);
524
525 DBG3("[trace] Kernel token event rule %" PRIu64 " allocated", local_kernel_token_event_rule->token);
526error:
527 *kernel_token_event_rule = local_kernel_token_event_rule;
528 return ret;
529}
530
531/*
532 * Initialize a kernel trigger from an event rule.
533 */
534enum lttng_error_code trace_kernel_init_trigger_from_event_rule(const struct lttng_event_rule *rule,
535 struct lttng_kernel_trigger *kernel_trigger)
536{
537 enum lttng_error_code ret;
538 enum lttng_event_rule_status status;
539 const char *name = NULL;
540
541 /* TODO: do this for now but have disucssion on if this could be the
542 * responsability of the event_rule itself ala
543 * "lttng_even_rule_generate_kernel_trigger"
544 */
545 switch (lttng_event_rule_get_type(rule)) {
546 case LTTNG_EVENT_RULE_TYPE_KPROBE:
547 {
548 uint64_t address = 0, offset = 0;
549 const char *symbol_name = NULL;
550 const struct lttng_kernel_probe_location *location = NULL;
551 enum lttng_kernel_probe_location_status k_status;
552
553 status = lttng_event_rule_kprobe_get_location(rule, &location);
554 if (status != LTTNG_EVENT_RULE_STATUS_OK) {
555 ret = LTTNG_ERR_PROBE_LOCATION_INVAL;
556 goto error;
557 }
558
559 switch (lttng_kernel_probe_location_get_type(location)) {
560 case LTTNG_KERNEL_PROBE_LOCATION_TYPE_ADDRESS:
561 {
562 k_status = lttng_kernel_probe_location_address_get_address(
563 location, &address);
564 if (k_status != LTTNG_KERNEL_PROBE_LOCATION_STATUS_OK) {
565 ERR("Getting kernel probe address failed.");
566 }
567
568 break;
569 }
570 case LTTNG_KERNEL_PROBE_LOCATION_TYPE_SYMBOL_OFFSET:
571 {
572 k_status = lttng_kernel_probe_location_symbol_get_offset(
573 location, &offset);
574 if (k_status != LTTNG_KERNEL_PROBE_LOCATION_STATUS_OK) {
575 ERR("Getting kernel probe symbol offset failed.");
576 }
577
578 symbol_name = lttng_kernel_probe_location_symbol_get_name(
579 location);
580 break;
581 }
582 default:
583 ERR("Unknown kernel probe location type (%d)",
584 lttng_kernel_probe_location_get_type(
585 location));
586 ret = LTTNG_ERR_INVALID;
587 goto error;
588 }
589
590 kernel_trigger->instrumentation = LTTNG_KERNEL_KPROBE;
591 kernel_trigger->u.kprobe.addr = address;
592 kernel_trigger->u.kprobe.offset = offset;
593 if (symbol_name) {
594 strncpy(kernel_trigger->u.kprobe.symbol_name,
595 symbol_name, LTTNG_KERNEL_SYM_NAME_LEN);
596 }
597 kernel_trigger->u.kprobe
598 .symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] =
599 '\0';
600 (void) lttng_event_rule_kprobe_get_name(rule, &name);
601 ret = LTTNG_OK;
602 break;
603 }
604 case LTTNG_EVENT_RULE_TYPE_UPROBE:
605 {
606 const struct lttng_userspace_probe_location* location = NULL;
607 const struct lttng_userspace_probe_location_lookup_method *lookup = NULL;
608
609 status = lttng_event_rule_uprobe_get_location(rule, &location);
610 if (status != LTTNG_EVENT_RULE_STATUS_OK) {
611 ret = LTTNG_ERR_PROBE_LOCATION_INVAL;
612 goto error;
613 }
614
615 kernel_trigger->instrumentation = LTTNG_KERNEL_UPROBE;
616
617 /*
618 * Only the elf lookup method is supported at the moment.
619 */
620 lookup = lttng_userspace_probe_location_get_lookup_method(
621 location);
622 if (!lookup) {
623 ret = LTTNG_ERR_PROBE_LOCATION_INVAL;
624 goto error;
625 }
626
627 /*
628 * From the kernel tracer's perspective, all userspace probe
629 * event types are all the same: a file and an offset.
630 */
631 switch (lttng_userspace_probe_location_lookup_method_get_type(lookup)) {
632 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_FUNCTION_ELF:
633 /* Get the file descriptor on the target binary. */
634 kernel_trigger->u.uprobe.fd =
635 lttng_userspace_probe_location_function_get_binary_fd(location);
636
637 break;
638 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_TRACEPOINT_SDT:
639 /* Get the file descriptor on the target binary. */
640 kernel_trigger->u.uprobe.fd =
641 lttng_userspace_probe_location_tracepoint_get_binary_fd(location);
642 break;
643 default:
644 DBG("Unsupported lookup method type");
645 ret = LTTNG_ERR_PROBE_LOCATION_INVAL;
646 goto error;
647 }
648
649 (void) lttng_event_rule_uprobe_get_name(rule, &name);
650
651 ret = LTTNG_OK;
652 break;
653 }
654 case LTTNG_EVENT_RULE_TYPE_KRETPROBE:
655 assert("Not supported" && 0);
656 ret = LTTNG_OK;
657 break;
658 case LTTNG_EVENT_RULE_TYPE_TRACEPOINT:
659 /* TODO: assert his is a kernel domain event-rule */
660 kernel_trigger->instrumentation = LTTNG_KERNEL_TRACEPOINT;
661 (void) lttng_event_rule_tracepoint_get_pattern(rule, &name);
662 ret = LTTNG_OK;
663 break;
664 case LTTNG_EVENT_RULE_TYPE_SYSCALL:
665 kernel_trigger->instrumentation = LTTNG_KERNEL_SYSCALL;
666 (void) lttng_event_rule_syscall_get_pattern(rule, &name);
667 ret = LTTNG_OK;
668 break;
669 default:
670 ERR("Unknown kernel event rule instrumentation type (%d)", lttng_event_rule_get_type(rule));
671 ret = LTTNG_ERR_INVALID;
672 goto error;
673 }
674
675 /*
676 * WTF is LTTNG_EVENT_ALL??? and LTTNG_EVENT_FUNTION_ENTRY?????
677 */
678
679 /* Copy event name */
680 strncpy(kernel_trigger->name, name, LTTNG_KERNEL_SYM_NAME_LEN);
681 kernel_trigger->name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0';
682
683error:
684 return ret;
685}
54012638 686/*
050349bb 687 * Allocate and initialize a kernel metadata.
54012638 688 *
050349bb 689 * Return pointer to structure or NULL.
54012638 690 */
a4b92340 691struct ltt_kernel_metadata *trace_kernel_create_metadata(void)
54012638 692{
d42266a4 693 int ret;
54012638 694 struct ltt_kernel_metadata *lkm;
f3ed775e 695 struct lttng_channel *chan;
54012638 696
ba7f0ae5
DG
697 lkm = zmalloc(sizeof(struct ltt_kernel_metadata));
698 chan = zmalloc(sizeof(struct lttng_channel));
f3ed775e 699 if (lkm == NULL || chan == NULL) {
df0f840b 700 PERROR("kernel metadata zmalloc");
54012638
DG
701 goto error;
702 }
703
d42266a4
JG
704 ret = lttng_strncpy(
705 chan->name, DEFAULT_METADATA_NAME, sizeof(chan->name));
706 if (ret) {
707 ERR("Failed to initialize metadata channel name to `%s`",
708 DEFAULT_METADATA_NAME);
709 goto error;
710 }
711
54012638 712 /* Set default attributes */
d42266a4 713 chan->attr.overwrite = DEFAULT_METADATA_OVERWRITE;
3e230f92 714 chan->attr.subbuf_size = default_get_metadata_subbuf_size();
b389abbe 715 chan->attr.num_subbuf = DEFAULT_METADATA_SUBBUF_NUM;
d42266a4
JG
716 chan->attr.switch_timer_interval = DEFAULT_METADATA_SWITCH_TIMER;
717 chan->attr.read_timer_interval = DEFAULT_METADATA_READ_TIMER;;
718
719
720 /*
721 * The metadata channel of kernel sessions must use the "mmap"
722 * back-end since the consumer daemon accumulates complete
723 * metadata units before sending them to the relay daemon in
724 * live mode. The consumer daemon also needs to extract the contents
725 * of the metadata cache when computing a rotation position.
726 *
727 * In both cases, it is not possible to rely on the splice
728 * back-end as the consumer daemon may need to accumulate more
729 * content than can be backed by the ring buffer's underlying
730 * pages.
731 */
732 chan->attr.output = LTTNG_EVENT_MMAP;
733 chan->attr.tracefile_size = 0;
734 chan->attr.tracefile_count = 0;
735 chan->attr.live_timer_interval = 0;
54012638
DG
736
737 /* Init metadata */
03550b58 738 lkm->fd = -1;
f3ed775e 739 lkm->conf = chan;
54012638
DG
740
741 return lkm;
742
743error:
a2c0da86
MD
744 free(lkm);
745 free(chan);
54012638
DG
746 return NULL;
747}
748
749/*
050349bb
DG
750 * Allocate and initialize a kernel stream. The stream is set to ACTIVE_FD by
751 * default.
54012638 752 *
050349bb 753 * Return pointer to structure or NULL.
54012638 754 */
00e2e675
DG
755struct ltt_kernel_stream *trace_kernel_create_stream(const char *name,
756 unsigned int count)
54012638 757{
00e2e675 758 int ret;
54012638
DG
759 struct ltt_kernel_stream *lks;
760
0525e9ae
DG
761 assert(name);
762
ba7f0ae5 763 lks = zmalloc(sizeof(struct ltt_kernel_stream));
54012638 764 if (lks == NULL) {
df0f840b 765 PERROR("kernel stream zmalloc");
54012638
DG
766 goto error;
767 }
768
00e2e675 769 /* Set name */
535b8ff4 770 ret = snprintf(lks->name, sizeof(lks->name), "%s_%u", name, count);
00e2e675
DG
771 if (ret < 0) {
772 PERROR("snprintf stream name");
773 goto error;
774 }
775 lks->name[sizeof(lks->name) - 1] = '\0';
776
54012638 777 /* Init stream */
03550b58 778 lks->fd = -1;
54012638 779 lks->state = 0;
ffe60014 780 lks->cpu = count;
54012638
DG
781
782 return lks;
783
784error:
785 return NULL;
786}
c363b55d 787
050349bb
DG
788/*
789 * Cleanup kernel stream structure.
790 */
62499ad6 791void trace_kernel_destroy_stream(struct ltt_kernel_stream *stream)
c363b55d 792{
0525e9ae
DG
793 assert(stream);
794
33a2b854 795 DBG("[trace] Closing stream fd %d", stream->fd);
c363b55d 796 /* Close kernel fd */
03550b58 797 if (stream->fd >= 0) {
c617c0c6
MD
798 int ret;
799
03550b58
MD
800 ret = close(stream->fd);
801 if (ret) {
802 PERROR("close");
803 }
799e2c4f 804 }
c363b55d
DG
805 /* Remove from stream list */
806 cds_list_del(&stream->list);
f9815039 807
c363b55d
DG
808 free(stream);
809}
810
050349bb
DG
811/*
812 * Cleanup kernel event structure.
813 */
62499ad6 814void trace_kernel_destroy_event(struct ltt_kernel_event *event)
c363b55d 815{
0525e9ae
DG
816 assert(event);
817
87eb4ab8 818 if (event->fd >= 0) {
c617c0c6
MD
819 int ret;
820
87eb4ab8
MD
821 DBG("[trace] Closing event fd %d", event->fd);
822 /* Close kernel fd */
799e2c4f
MD
823 ret = close(event->fd);
824 if (ret) {
825 PERROR("close");
826 }
87eb4ab8
MD
827 } else {
828 DBG("[trace] Tearing down event (no associated fd)");
829 }
c363b55d
DG
830
831 /* Remove from event list */
832 cds_list_del(&event->list);
f9815039 833
00a62084
MD
834 free(event->filter_expression);
835 free(event->filter);
836
f9815039 837 free(event->event);
c363b55d
DG
838 free(event);
839}
840
2463b787
JR
841/*
842 * Cleanup kernel event structure.
843 */
844void trace_kernel_destroy_token_event_rule(struct ltt_kernel_token_event_rule *event)
845{
846 /* TODO: review in depth to ensure adequate disposing */
847 assert(event);
848
849 if (event->fd >= 0) {
850 int ret;
851
852 DBG("[trace] Closing ,token event rule fd %d", event->fd);
853 /* Close kernel fd */
854 ret = close(event->fd);
855 if (ret) {
856 PERROR("close");
857 }
858 } else {
859 DBG("[trace] Tearing down token event rule (no associated fd)");
860 }
861
862 lttng_trigger_put(event->trigger);
863 free(event);
864}
645328ae
DG
865/*
866 * Cleanup kernel context structure.
867 */
868void trace_kernel_destroy_context(struct ltt_kernel_context *ctx)
869{
870 assert(ctx);
871
ba985c3a
JG
872 if (ctx->in_list) {
873 cds_list_del(&ctx->list);
874 }
645328ae
DG
875 free(ctx);
876}
877
050349bb
DG
878/*
879 * Cleanup kernel channel structure.
880 */
62499ad6 881void trace_kernel_destroy_channel(struct ltt_kernel_channel *channel)
c363b55d 882{
af9737e9
DG
883 struct ltt_kernel_stream *stream, *stmp;
884 struct ltt_kernel_event *event, *etmp;
645328ae 885 struct ltt_kernel_context *ctx, *ctmp;
799e2c4f 886 int ret;
e9404c27 887 enum lttng_error_code status;
c363b55d 888
0525e9ae
DG
889 assert(channel);
890
33a2b854 891 DBG("[trace] Closing channel fd %d", channel->fd);
c363b55d 892 /* Close kernel fd */
03550b58
MD
893 if (channel->fd >= 0) {
894 ret = close(channel->fd);
895 if (ret) {
896 PERROR("close");
897 }
799e2c4f 898 }
c363b55d
DG
899
900 /* For each stream in the channel list */
af9737e9 901 cds_list_for_each_entry_safe(stream, stmp, &channel->stream_list.head, list) {
62499ad6 902 trace_kernel_destroy_stream(stream);
c363b55d
DG
903 }
904
905 /* For each event in the channel list */
af9737e9 906 cds_list_for_each_entry_safe(event, etmp, &channel->events_list.head, list) {
62499ad6 907 trace_kernel_destroy_event(event);
c363b55d
DG
908 }
909
645328ae
DG
910 /* For each context in the channel list */
911 cds_list_for_each_entry_safe(ctx, ctmp, &channel->ctx_list, list) {
912 trace_kernel_destroy_context(ctx);
913 }
914
c363b55d
DG
915 /* Remove from channel list */
916 cds_list_del(&channel->list);
f9815039 917
753873bf
JR
918 if (notification_thread_handle
919 && channel->published_to_notification_thread) {
63aaa3dc
JG
920 status = notification_thread_command_remove_channel(
921 notification_thread_handle,
e1f3997a 922 channel->key, LTTNG_DOMAIN_KERNEL);
63aaa3dc
JG
923 assert(status == LTTNG_OK);
924 }
e9404c27 925 free(channel->channel->attr.extended.ptr);
f9815039 926 free(channel->channel);
c363b55d
DG
927 free(channel);
928}
929
050349bb
DG
930/*
931 * Cleanup kernel metadata structure.
932 */
62499ad6 933void trace_kernel_destroy_metadata(struct ltt_kernel_metadata *metadata)
c363b55d 934{
0525e9ae
DG
935 assert(metadata);
936
33a2b854 937 DBG("[trace] Closing metadata fd %d", metadata->fd);
c363b55d 938 /* Close kernel fd */
03550b58 939 if (metadata->fd >= 0) {
c617c0c6
MD
940 int ret;
941
03550b58
MD
942 ret = close(metadata->fd);
943 if (ret) {
944 PERROR("close");
945 }
799e2c4f 946 }
c363b55d 947
f9815039 948 free(metadata->conf);
c363b55d
DG
949 free(metadata);
950}
951
050349bb 952/*
62499ad6 953 * Cleanup kernel session structure
36b588ed
MD
954 *
955 * Should *NOT* be called with RCU read-side lock held.
050349bb 956 */
62499ad6 957void trace_kernel_destroy_session(struct ltt_kernel_session *session)
c363b55d 958{
af9737e9 959 struct ltt_kernel_channel *channel, *ctmp;
799e2c4f 960 int ret;
c363b55d 961
0525e9ae
DG
962 assert(session);
963
33a2b854 964 DBG("[trace] Closing session fd %d", session->fd);
c363b55d 965 /* Close kernel fds */
03550b58
MD
966 if (session->fd >= 0) {
967 ret = close(session->fd);
968 if (ret) {
969 PERROR("close");
970 }
799e2c4f 971 }
f9815039 972
03550b58 973 if (session->metadata_stream_fd >= 0) {
70dc1c34 974 DBG("[trace] Closing metadata stream fd %d", session->metadata_stream_fd);
799e2c4f
MD
975 ret = close(session->metadata_stream_fd);
976 if (ret) {
977 PERROR("close");
978 }
70dc1c34 979 }
c363b55d 980
d36b8583 981 if (session->metadata != NULL) {
62499ad6 982 trace_kernel_destroy_metadata(session->metadata);
d36b8583 983 }
c363b55d 984
af9737e9 985 cds_list_for_each_entry_safe(channel, ctmp, &session->channel_list.head, list) {
62499ad6 986 trace_kernel_destroy_channel(channel);
c363b55d 987 }
d070c424 988}
c363b55d 989
d070c424
MD
990/* Free elements needed by destroy notifiers. */
991void trace_kernel_free_session(struct ltt_kernel_session *session)
992{
00e2e675 993 /* Wipe consumer output object */
6addfa37 994 consumer_output_put(session->consumer);
00e2e675 995
159b042f
JG
996 process_attr_tracker_destroy(session->tracker_pid);
997 process_attr_tracker_destroy(session->tracker_vpid);
998 process_attr_tracker_destroy(session->tracker_uid);
999 process_attr_tracker_destroy(session->tracker_vuid);
1000 process_attr_tracker_destroy(session->tracker_gid);
1001 process_attr_tracker_destroy(session->tracker_vgid);
55c9e7ca 1002
c363b55d
DG
1003 free(session);
1004}
This page took 0.141073 seconds and 5 git commands to generate.