Commit | Line | Data |
---|---|---|
54012638 | 1 | /* |
ab5be9fa | 2 | * Copyright (C) 2011 David Goulet <david.goulet@polymtl.ca> |
54012638 | 3 | * |
ab5be9fa | 4 | * SPDX-License-Identifier: GPL-2.0-only |
54012638 | 5 | * |
54012638 DG |
6 | */ |
7 | ||
6c1c0768 | 8 | #define _LGPL_SOURCE |
54012638 DG |
9 | #include <stdio.h> |
10 | #include <stdlib.h> | |
11 | #include <string.h> | |
c363b55d | 12 | #include <unistd.h> |
54012638 | 13 | |
dcabc190 FD |
14 | #include <lttng/event.h> |
15 | #include <lttng/lttng-error.h> | |
2463b787 | 16 | #include <lttng/kernel-probe.h> |
dcabc190 FD |
17 | #include <lttng/userspace-probe.h> |
18 | #include <lttng/userspace-probe-internal.h> | |
2463b787 JR |
19 | #include <lttng/event-rule/event-rule.h> |
20 | #include <lttng/event-rule/event-rule-internal.h> | |
21 | #include <lttng/event-rule/kprobe.h> | |
22 | #include <lttng/event-rule/kprobe-internal.h> | |
23 | #include <lttng/event-rule/syscall.h> | |
24 | #include <lttng/event-rule/syscall-internal.h> | |
25 | #include <lttng/event-rule/tracepoint.h> | |
26 | #include <lttng/event-rule/tracepoint-internal.h> | |
27 | #include <lttng/event-rule/uprobe-internal.h> | |
990570ed DG |
28 | #include <common/common.h> |
29 | #include <common/defaults.h> | |
82b69413 | 30 | #include <common/trace-chunk.h> |
d42266a4 | 31 | #include <common/macros.h> |
1e307fab | 32 | |
00e2e675 | 33 | #include "consumer.h" |
62499ad6 | 34 | #include "trace-kernel.h" |
e9404c27 JG |
35 | #include "lttng-sessiond.h" |
36 | #include "notification-thread-commands.h" | |
54012638 | 37 | |
19e70852 | 38 | /* |
050349bb | 39 | * Find the channel name for the given kernel session. |
19e70852 | 40 | */ |
62499ad6 | 41 | struct ltt_kernel_channel *trace_kernel_get_channel_by_name( |
df4f5a87 | 42 | const char *name, struct ltt_kernel_session *session) |
19e70852 DG |
43 | { |
44 | struct ltt_kernel_channel *chan; | |
45 | ||
0525e9ae DG |
46 | assert(session); |
47 | assert(name); | |
19e70852 | 48 | |
85076754 MD |
49 | /* |
50 | * If we receive an empty string for channel name, it means the | |
51 | * default channel name is requested. | |
52 | */ | |
53 | if (name[0] == '\0') | |
54 | name = DEFAULT_CHANNEL_NAME; | |
55 | ||
54d01ffb DG |
56 | DBG("Trying to find channel %s", name); |
57 | ||
19e70852 DG |
58 | cds_list_for_each_entry(chan, &session->channel_list.head, list) { |
59 | if (strcmp(name, chan->channel->name) == 0) { | |
60 | DBG("Found channel by name %s", name); | |
61 | return chan; | |
62 | } | |
63 | } | |
64 | ||
19e70852 DG |
65 | return NULL; |
66 | } | |
67 | ||
00a62084 MD |
68 | /* |
69 | * Find the event for the given channel. | |
70 | */ | |
71 | struct ltt_kernel_event *trace_kernel_find_event( | |
72 | char *name, struct ltt_kernel_channel *channel, | |
73 | enum lttng_event_type type, | |
2463b787 | 74 | struct lttng_bytecode *filter) |
00a62084 MD |
75 | { |
76 | struct ltt_kernel_event *ev; | |
77 | int found = 0; | |
78 | ||
79 | assert(name); | |
80 | assert(channel); | |
81 | ||
82 | cds_list_for_each_entry(ev, &channel->events_list.head, list) { | |
83 | if (type != LTTNG_EVENT_ALL && ev->type != type) { | |
84 | continue; | |
85 | } | |
86 | if (strcmp(name, ev->event->name)) { | |
87 | continue; | |
88 | } | |
89 | if ((ev->filter && !filter) || (!ev->filter && filter)) { | |
90 | continue; | |
91 | } | |
92 | if (ev->filter && filter) { | |
93 | if (ev->filter->len != filter->len || | |
94 | memcmp(ev->filter->data, filter->data, | |
95 | filter->len) != 0) { | |
96 | continue; | |
97 | } | |
98 | } | |
99 | found = 1; | |
100 | break; | |
101 | } | |
102 | if (found) { | |
103 | DBG("Found event %s for channel %s", name, | |
104 | channel->channel->name); | |
105 | return ev; | |
106 | } else { | |
107 | return NULL; | |
108 | } | |
109 | } | |
110 | ||
19e70852 | 111 | /* |
050349bb | 112 | * Find the event name for the given channel. |
19e70852 | 113 | */ |
62499ad6 | 114 | struct ltt_kernel_event *trace_kernel_get_event_by_name( |
d0ae4ea8 MD |
115 | char *name, struct ltt_kernel_channel *channel, |
116 | enum lttng_event_type type) | |
19e70852 DG |
117 | { |
118 | struct ltt_kernel_event *ev; | |
00a62084 | 119 | int found = 0; |
19e70852 | 120 | |
0525e9ae DG |
121 | assert(name); |
122 | assert(channel); | |
19e70852 DG |
123 | |
124 | cds_list_for_each_entry(ev, &channel->events_list.head, list) { | |
00a62084 | 125 | if (type != LTTNG_EVENT_ALL && ev->type != type) { |
d0ae4ea8 | 126 | continue; |
19e70852 | 127 | } |
00a62084 MD |
128 | if (strcmp(name, ev->event->name)) { |
129 | continue; | |
130 | } | |
131 | found = 1; | |
132 | break; | |
133 | } | |
134 | if (found) { | |
135 | DBG("Found event %s for channel %s", name, | |
136 | channel->channel->name); | |
137 | return ev; | |
138 | } else { | |
139 | return NULL; | |
19e70852 | 140 | } |
19e70852 DG |
141 | } |
142 | ||
54012638 | 143 | /* |
050349bb | 144 | * Allocate and initialize a kernel session data structure. |
54012638 | 145 | * |
050349bb | 146 | * Return pointer to structure or NULL. |
54012638 | 147 | */ |
dec56f6c | 148 | struct ltt_kernel_session *trace_kernel_create_session(void) |
54012638 | 149 | { |
a4b92340 | 150 | struct ltt_kernel_session *lks = NULL; |
54012638 DG |
151 | |
152 | /* Allocate a new ltt kernel session */ | |
ba7f0ae5 | 153 | lks = zmalloc(sizeof(struct ltt_kernel_session)); |
54012638 | 154 | if (lks == NULL) { |
df0f840b | 155 | PERROR("create kernel session zmalloc"); |
a4b92340 | 156 | goto alloc_error; |
54012638 DG |
157 | } |
158 | ||
159 | /* Init data structure */ | |
03550b58 MD |
160 | lks->fd = -1; |
161 | lks->metadata_stream_fd = -1; | |
54012638 DG |
162 | lks->channel_count = 0; |
163 | lks->stream_count_global = 0; | |
164 | lks->metadata = NULL; | |
165 | CDS_INIT_LIST_HEAD(&lks->channel_list.head); | |
166 | ||
159b042f JG |
167 | lks->tracker_pid = process_attr_tracker_create(); |
168 | if (!lks->tracker_pid) { | |
55c9e7ca JR |
169 | goto error; |
170 | } | |
159b042f JG |
171 | lks->tracker_vpid = process_attr_tracker_create(); |
172 | if (!lks->tracker_vpid) { | |
55c9e7ca JR |
173 | goto error; |
174 | } | |
159b042f JG |
175 | lks->tracker_uid = process_attr_tracker_create(); |
176 | if (!lks->tracker_uid) { | |
55c9e7ca JR |
177 | goto error; |
178 | } | |
159b042f JG |
179 | lks->tracker_vuid = process_attr_tracker_create(); |
180 | if (!lks->tracker_vuid) { | |
55c9e7ca JR |
181 | goto error; |
182 | } | |
159b042f JG |
183 | lks->tracker_gid = process_attr_tracker_create(); |
184 | if (!lks->tracker_gid) { | |
55c9e7ca JR |
185 | goto error; |
186 | } | |
159b042f JG |
187 | lks->tracker_vgid = process_attr_tracker_create(); |
188 | if (!lks->tracker_vgid) { | |
55c9e7ca JR |
189 | goto error; |
190 | } | |
00e2e675 DG |
191 | lks->consumer = consumer_create_output(CONSUMER_DST_LOCAL); |
192 | if (lks->consumer == NULL) { | |
193 | goto error; | |
194 | } | |
195 | ||
54012638 DG |
196 | return lks; |
197 | ||
198 | error: | |
159b042f JG |
199 | process_attr_tracker_destroy(lks->tracker_pid); |
200 | process_attr_tracker_destroy(lks->tracker_vpid); | |
201 | process_attr_tracker_destroy(lks->tracker_uid); | |
202 | process_attr_tracker_destroy(lks->tracker_vuid); | |
203 | process_attr_tracker_destroy(lks->tracker_gid); | |
204 | process_attr_tracker_destroy(lks->tracker_vgid); | |
a4b92340 DG |
205 | free(lks); |
206 | ||
207 | alloc_error: | |
54012638 DG |
208 | return NULL; |
209 | } | |
210 | ||
211 | /* | |
050349bb | 212 | * Allocate and initialize a kernel channel data structure. |
54012638 | 213 | * |
050349bb | 214 | * Return pointer to structure or NULL. |
54012638 | 215 | */ |
00e2e675 | 216 | struct ltt_kernel_channel *trace_kernel_create_channel( |
fdd9eb17 | 217 | struct lttng_channel *chan) |
54012638 | 218 | { |
54012638 | 219 | struct ltt_kernel_channel *lkc; |
61a5b6b1 | 220 | struct lttng_channel_extended *extended = NULL; |
54012638 | 221 | |
0525e9ae DG |
222 | assert(chan); |
223 | ||
ba7f0ae5 | 224 | lkc = zmalloc(sizeof(struct ltt_kernel_channel)); |
f3ed775e | 225 | if (lkc == NULL) { |
df0f840b | 226 | PERROR("ltt_kernel_channel zmalloc"); |
54012638 DG |
227 | goto error; |
228 | } | |
229 | ||
ba7f0ae5 | 230 | lkc->channel = zmalloc(sizeof(struct lttng_channel)); |
f3ed775e | 231 | if (lkc->channel == NULL) { |
df0f840b | 232 | PERROR("lttng_channel zmalloc"); |
e9404c27 JG |
233 | goto error; |
234 | } | |
235 | ||
236 | extended = zmalloc(sizeof(struct lttng_channel_extended)); | |
237 | if (!extended) { | |
238 | PERROR("lttng_channel_channel zmalloc"); | |
f3ed775e DG |
239 | goto error; |
240 | } | |
241 | memcpy(lkc->channel, chan, sizeof(struct lttng_channel)); | |
e9404c27 JG |
242 | memcpy(extended, chan->attr.extended.ptr, sizeof(struct lttng_channel_extended)); |
243 | lkc->channel->attr.extended.ptr = extended; | |
244 | extended = NULL; | |
54012638 | 245 | |
85076754 MD |
246 | /* |
247 | * If we receive an empty string for channel name, it means the | |
248 | * default channel name is requested. | |
249 | */ | |
250 | if (chan->name[0] == '\0') { | |
251 | strncpy(lkc->channel->name, DEFAULT_CHANNEL_NAME, | |
252 | sizeof(lkc->channel->name)); | |
253 | } | |
bd722d76 | 254 | lkc->channel->name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; |
85076754 | 255 | |
03550b58 | 256 | lkc->fd = -1; |
54012638 | 257 | lkc->stream_count = 0; |
cbbbb275 | 258 | lkc->event_count = 0; |
d36b8583 | 259 | lkc->enabled = 1; |
753873bf | 260 | lkc->published_to_notification_thread = false; |
54012638 DG |
261 | /* Init linked list */ |
262 | CDS_INIT_LIST_HEAD(&lkc->events_list.head); | |
263 | CDS_INIT_LIST_HEAD(&lkc->stream_list.head); | |
645328ae | 264 | CDS_INIT_LIST_HEAD(&lkc->ctx_list); |
54012638 DG |
265 | |
266 | return lkc; | |
267 | ||
268 | error: | |
e9404c27 JG |
269 | if (lkc) { |
270 | free(lkc->channel); | |
271 | } | |
272 | free(extended); | |
273 | free(lkc); | |
54012638 DG |
274 | return NULL; |
275 | } | |
276 | ||
645328ae DG |
277 | /* |
278 | * Allocate and init a kernel context object. | |
279 | * | |
280 | * Return the allocated object or NULL on error. | |
281 | */ | |
282 | struct ltt_kernel_context *trace_kernel_create_context( | |
283 | struct lttng_kernel_context *ctx) | |
284 | { | |
285 | struct ltt_kernel_context *kctx; | |
286 | ||
287 | kctx = zmalloc(sizeof(*kctx)); | |
288 | if (!kctx) { | |
289 | PERROR("zmalloc kernel context"); | |
290 | goto error; | |
291 | } | |
292 | ||
293 | if (ctx) { | |
294 | memcpy(&kctx->ctx, ctx, sizeof(kctx->ctx)); | |
295 | } | |
df3c77c8 JG |
296 | error: |
297 | return kctx; | |
298 | } | |
645328ae | 299 | |
df3c77c8 JG |
300 | /* |
301 | * Allocate and init a kernel context object from an existing kernel context | |
302 | * object. | |
303 | * | |
304 | * Return the allocated object or NULL on error. | |
305 | */ | |
306 | struct ltt_kernel_context *trace_kernel_copy_context( | |
307 | struct ltt_kernel_context *kctx) | |
308 | { | |
309 | struct ltt_kernel_context *kctx_copy; | |
310 | ||
311 | assert(kctx); | |
312 | kctx_copy = zmalloc(sizeof(*kctx_copy)); | |
313 | if (!kctx_copy) { | |
314 | PERROR("zmalloc ltt_kernel_context"); | |
315 | goto error; | |
316 | } | |
317 | ||
318 | memcpy(kctx_copy, kctx, sizeof(*kctx_copy)); | |
319 | memset(&kctx_copy->list, 0, sizeof(kctx_copy->list)); | |
7b9445b3 | 320 | |
645328ae | 321 | error: |
df3c77c8 | 322 | return kctx_copy; |
645328ae DG |
323 | } |
324 | ||
54012638 | 325 | /* |
050349bb | 326 | * Allocate and initialize a kernel event. Set name and event type. |
a969e101 | 327 | * We own filter_expression, and filter. |
54012638 | 328 | * |
050349bb | 329 | * Return pointer to structure or NULL. |
54012638 | 330 | */ |
71a3bb01 FD |
331 | enum lttng_error_code trace_kernel_create_event( |
332 | struct lttng_event *ev, char *filter_expression, | |
2463b787 | 333 | struct lttng_bytecode *filter, |
71a3bb01 | 334 | struct ltt_kernel_event **kernel_event) |
54012638 | 335 | { |
71a3bb01 | 336 | enum lttng_error_code ret; |
54012638 | 337 | struct lttng_kernel_event *attr; |
71a3bb01 | 338 | struct ltt_kernel_event *local_kernel_event; |
dcabc190 | 339 | struct lttng_userspace_probe_location *userspace_probe_location = NULL; |
54012638 | 340 | |
0525e9ae DG |
341 | assert(ev); |
342 | ||
71a3bb01 | 343 | local_kernel_event = zmalloc(sizeof(struct ltt_kernel_event)); |
ba7f0ae5 | 344 | attr = zmalloc(sizeof(struct lttng_kernel_event)); |
71a3bb01 | 345 | if (local_kernel_event == NULL || attr == NULL) { |
df0f840b | 346 | PERROR("kernel event zmalloc"); |
71a3bb01 | 347 | ret = LTTNG_ERR_NOMEM; |
54012638 DG |
348 | goto error; |
349 | } | |
350 | ||
f3ed775e | 351 | switch (ev->type) { |
7d29a247 | 352 | case LTTNG_EVENT_PROBE: |
e6ddca71 | 353 | attr->instrumentation = LTTNG_KERNEL_KPROBE; |
7d29a247 DG |
354 | attr->u.kprobe.addr = ev->attr.probe.addr; |
355 | attr->u.kprobe.offset = ev->attr.probe.offset; | |
f3ed775e | 356 | strncpy(attr->u.kprobe.symbol_name, |
dbbb3ec5 DG |
357 | ev->attr.probe.symbol_name, LTTNG_KERNEL_SYM_NAME_LEN); |
358 | attr->u.kprobe.symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; | |
f3ed775e | 359 | break; |
dcabc190 FD |
360 | case LTTNG_EVENT_USERSPACE_PROBE: |
361 | { | |
87597c2c JG |
362 | const struct lttng_userspace_probe_location* location = NULL; |
363 | const struct lttng_userspace_probe_location_lookup_method *lookup = NULL; | |
dcabc190 FD |
364 | |
365 | location = lttng_event_get_userspace_probe_location(ev); | |
366 | if (!location) { | |
367 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
368 | goto error; | |
369 | } | |
370 | ||
371 | /* | |
372 | * From this point on, the specific term 'uprobe' is used | |
373 | * instead of the generic 'userspace probe' because it's the | |
374 | * technology used at the moment for this instrumentation. | |
375 | * LTTng currently implements userspace probes using uprobes. | |
376 | * In the interactions with the kernel tracer, we use the | |
377 | * uprobe term. | |
378 | */ | |
379 | attr->instrumentation = LTTNG_KERNEL_UPROBE; | |
380 | ||
381 | /* | |
382 | * Only the elf lookup method is supported at the moment. | |
383 | */ | |
384 | lookup = lttng_userspace_probe_location_get_lookup_method( | |
385 | location); | |
386 | if (!lookup) { | |
387 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
388 | goto error; | |
389 | } | |
390 | ||
391 | /* | |
392 | * From the kernel tracer's perspective, all userspace probe | |
393 | * event types are all the same: a file and an offset. | |
394 | */ | |
395 | switch (lttng_userspace_probe_location_lookup_method_get_type(lookup)) { | |
396 | case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_FUNCTION_ELF: | |
397 | /* Get the file descriptor on the target binary. */ | |
398 | attr->u.uprobe.fd = | |
399 | lttng_userspace_probe_location_function_get_binary_fd(location); | |
400 | ||
401 | /* | |
402 | * Save a reference to the probe location used during | |
e368fb43 | 403 | * the listing of events. |
dcabc190 FD |
404 | */ |
405 | userspace_probe_location = | |
406 | lttng_userspace_probe_location_copy(location); | |
dcabc190 FD |
407 | break; |
408 | case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_TRACEPOINT_SDT: | |
409 | /* Get the file descriptor on the target binary. */ | |
410 | attr->u.uprobe.fd = | |
411 | lttng_userspace_probe_location_tracepoint_get_binary_fd(location); | |
412 | ||
413 | /* | |
414 | * Save a reference to the probe location used during the listing of | |
e368fb43 | 415 | * events. |
dcabc190 FD |
416 | */ |
417 | userspace_probe_location = | |
418 | lttng_userspace_probe_location_copy(location); | |
dcabc190 FD |
419 | break; |
420 | default: | |
421 | DBG("Unsupported lookup method type"); | |
422 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
423 | goto error; | |
424 | } | |
425 | break; | |
426 | } | |
f3ed775e | 427 | case LTTNG_EVENT_FUNCTION: |
8f0d098b MD |
428 | attr->instrumentation = LTTNG_KERNEL_KRETPROBE; |
429 | attr->u.kretprobe.addr = ev->attr.probe.addr; | |
430 | attr->u.kretprobe.offset = ev->attr.probe.offset; | |
8f0d098b | 431 | strncpy(attr->u.kretprobe.symbol_name, |
dbbb3ec5 DG |
432 | ev->attr.probe.symbol_name, LTTNG_KERNEL_SYM_NAME_LEN); |
433 | attr->u.kretprobe.symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; | |
8f0d098b MD |
434 | break; |
435 | case LTTNG_EVENT_FUNCTION_ENTRY: | |
f3ed775e DG |
436 | attr->instrumentation = LTTNG_KERNEL_FUNCTION; |
437 | strncpy(attr->u.ftrace.symbol_name, | |
dbbb3ec5 DG |
438 | ev->attr.ftrace.symbol_name, LTTNG_KERNEL_SYM_NAME_LEN); |
439 | attr->u.ftrace.symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; | |
f3ed775e | 440 | break; |
e6ddca71 DG |
441 | case LTTNG_EVENT_TRACEPOINT: |
442 | attr->instrumentation = LTTNG_KERNEL_TRACEPOINT; | |
f3ed775e | 443 | break; |
a54bd42d MD |
444 | case LTTNG_EVENT_SYSCALL: |
445 | attr->instrumentation = LTTNG_KERNEL_SYSCALL; | |
0133c199 | 446 | break; |
7a3d1328 MD |
447 | case LTTNG_EVENT_ALL: |
448 | attr->instrumentation = LTTNG_KERNEL_ALL; | |
449 | break; | |
f3ed775e DG |
450 | default: |
451 | ERR("Unknown kernel instrumentation type (%d)", ev->type); | |
71a3bb01 | 452 | ret = LTTNG_ERR_INVALID; |
f3ed775e DG |
453 | goto error; |
454 | } | |
455 | ||
456 | /* Copy event name */ | |
dbbb3ec5 DG |
457 | strncpy(attr->name, ev->name, LTTNG_KERNEL_SYM_NAME_LEN); |
458 | attr->name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; | |
f3ed775e | 459 | |
54012638 | 460 | /* Setting up a kernel event */ |
71a3bb01 FD |
461 | local_kernel_event->fd = -1; |
462 | local_kernel_event->event = attr; | |
463 | local_kernel_event->enabled = 1; | |
464 | local_kernel_event->filter_expression = filter_expression; | |
465 | local_kernel_event->filter = filter; | |
dcabc190 | 466 | local_kernel_event->userspace_probe_location = userspace_probe_location; |
54012638 | 467 | |
71a3bb01 FD |
468 | *kernel_event = local_kernel_event; |
469 | ||
470 | return LTTNG_OK; | |
54012638 DG |
471 | |
472 | error: | |
a969e101 MD |
473 | free(filter_expression); |
474 | free(filter); | |
71a3bb01 | 475 | free(local_kernel_event); |
a2c0da86 | 476 | free(attr); |
71a3bb01 | 477 | return ret; |
54012638 DG |
478 | } |
479 | ||
2463b787 JR |
480 | /* |
481 | * Allocate and initialize a kernel token event rule. | |
482 | * | |
483 | * Return pointer to structure or NULL. | |
484 | */ | |
485 | enum lttng_error_code trace_kernel_create_token_event_rule( | |
486 | struct lttng_trigger *trigger, | |
487 | uint64_t token, | |
488 | uint64_t trigger_error_counter_index, | |
489 | struct ltt_kernel_token_event_rule **kernel_token_event_rule) | |
490 | { | |
491 | enum lttng_error_code ret = LTTNG_OK; | |
492 | struct ltt_kernel_token_event_rule *local_kernel_token_event_rule; | |
493 | const struct lttng_condition *condition = NULL; | |
494 | const struct lttng_event_rule *event_rule = NULL; | |
495 | ||
496 | assert(kernel_token_event_rule); | |
497 | ||
498 | condition = lttng_trigger_get_condition(trigger); | |
499 | assert(condition); | |
500 | assert(lttng_condition_get_type(condition) == LTTNG_CONDITION_TYPE_EVENT_RULE_HIT); | |
501 | ||
502 | assert(lttng_condition_event_rule_get_rule(condition, &event_rule) == LTTNG_CONDITION_STATUS_OK); | |
503 | assert(event_rule); | |
504 | assert(lttng_event_rule_get_type(event_rule) != LTTNG_EVENT_RULE_TYPE_UNKNOWN); | |
505 | ||
506 | local_kernel_token_event_rule = zmalloc(sizeof(struct ltt_kernel_token_event_rule)); | |
507 | if (local_kernel_token_event_rule == NULL) { | |
508 | PERROR("Failed to allocate ltt_kernel_token_event_rule structure"); | |
509 | ret = LTTNG_ERR_NOMEM; | |
510 | goto error; | |
511 | } | |
512 | ||
513 | local_kernel_token_event_rule->fd = -1; | |
514 | local_kernel_token_event_rule->enabled = 1; | |
515 | local_kernel_token_event_rule->token = token; | |
516 | local_kernel_token_event_rule->error_counter_index = trigger_error_counter_index; | |
517 | ||
518 | /* Get the reference of the event rule */ | |
519 | lttng_trigger_get(trigger); | |
520 | ||
521 | local_kernel_token_event_rule->trigger = trigger; | |
522 | /* The event rule still own the filter and bytecode */ | |
523 | local_kernel_token_event_rule->filter = lttng_event_rule_get_filter_bytecode(event_rule); | |
524 | ||
525 | DBG3("[trace] Kernel token event rule %" PRIu64 " allocated", local_kernel_token_event_rule->token); | |
526 | error: | |
527 | *kernel_token_event_rule = local_kernel_token_event_rule; | |
528 | return ret; | |
529 | } | |
530 | ||
531 | /* | |
532 | * Initialize a kernel trigger from an event rule. | |
533 | */ | |
534 | enum lttng_error_code trace_kernel_init_trigger_from_event_rule(const struct lttng_event_rule *rule, | |
535 | struct lttng_kernel_trigger *kernel_trigger) | |
536 | { | |
537 | enum lttng_error_code ret; | |
538 | enum lttng_event_rule_status status; | |
539 | const char *name = NULL; | |
540 | ||
541 | /* TODO: do this for now but have disucssion on if this could be the | |
542 | * responsability of the event_rule itself ala | |
543 | * "lttng_even_rule_generate_kernel_trigger" | |
544 | */ | |
545 | switch (lttng_event_rule_get_type(rule)) { | |
546 | case LTTNG_EVENT_RULE_TYPE_KPROBE: | |
547 | { | |
548 | uint64_t address = 0, offset = 0; | |
549 | const char *symbol_name = NULL; | |
550 | const struct lttng_kernel_probe_location *location = NULL; | |
551 | enum lttng_kernel_probe_location_status k_status; | |
552 | ||
553 | status = lttng_event_rule_kprobe_get_location(rule, &location); | |
554 | if (status != LTTNG_EVENT_RULE_STATUS_OK) { | |
555 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
556 | goto error; | |
557 | } | |
558 | ||
559 | switch (lttng_kernel_probe_location_get_type(location)) { | |
560 | case LTTNG_KERNEL_PROBE_LOCATION_TYPE_ADDRESS: | |
561 | { | |
562 | k_status = lttng_kernel_probe_location_address_get_address( | |
563 | location, &address); | |
564 | if (k_status != LTTNG_KERNEL_PROBE_LOCATION_STATUS_OK) { | |
565 | ERR("Getting kernel probe address failed."); | |
566 | } | |
567 | ||
568 | break; | |
569 | } | |
570 | case LTTNG_KERNEL_PROBE_LOCATION_TYPE_SYMBOL_OFFSET: | |
571 | { | |
572 | k_status = lttng_kernel_probe_location_symbol_get_offset( | |
573 | location, &offset); | |
574 | if (k_status != LTTNG_KERNEL_PROBE_LOCATION_STATUS_OK) { | |
575 | ERR("Getting kernel probe symbol offset failed."); | |
576 | } | |
577 | ||
578 | symbol_name = lttng_kernel_probe_location_symbol_get_name( | |
579 | location); | |
580 | break; | |
581 | } | |
582 | default: | |
583 | ERR("Unknown kernel probe location type (%d)", | |
584 | lttng_kernel_probe_location_get_type( | |
585 | location)); | |
586 | ret = LTTNG_ERR_INVALID; | |
587 | goto error; | |
588 | } | |
589 | ||
590 | kernel_trigger->instrumentation = LTTNG_KERNEL_KPROBE; | |
591 | kernel_trigger->u.kprobe.addr = address; | |
592 | kernel_trigger->u.kprobe.offset = offset; | |
593 | if (symbol_name) { | |
594 | strncpy(kernel_trigger->u.kprobe.symbol_name, | |
595 | symbol_name, LTTNG_KERNEL_SYM_NAME_LEN); | |
596 | } | |
597 | kernel_trigger->u.kprobe | |
598 | .symbol_name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = | |
599 | '\0'; | |
600 | (void) lttng_event_rule_kprobe_get_name(rule, &name); | |
601 | ret = LTTNG_OK; | |
602 | break; | |
603 | } | |
604 | case LTTNG_EVENT_RULE_TYPE_UPROBE: | |
605 | { | |
606 | const struct lttng_userspace_probe_location* location = NULL; | |
607 | const struct lttng_userspace_probe_location_lookup_method *lookup = NULL; | |
608 | ||
609 | status = lttng_event_rule_uprobe_get_location(rule, &location); | |
610 | if (status != LTTNG_EVENT_RULE_STATUS_OK) { | |
611 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
612 | goto error; | |
613 | } | |
614 | ||
615 | kernel_trigger->instrumentation = LTTNG_KERNEL_UPROBE; | |
616 | ||
617 | /* | |
618 | * Only the elf lookup method is supported at the moment. | |
619 | */ | |
620 | lookup = lttng_userspace_probe_location_get_lookup_method( | |
621 | location); | |
622 | if (!lookup) { | |
623 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
624 | goto error; | |
625 | } | |
626 | ||
627 | /* | |
628 | * From the kernel tracer's perspective, all userspace probe | |
629 | * event types are all the same: a file and an offset. | |
630 | */ | |
631 | switch (lttng_userspace_probe_location_lookup_method_get_type(lookup)) { | |
632 | case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_FUNCTION_ELF: | |
633 | /* Get the file descriptor on the target binary. */ | |
634 | kernel_trigger->u.uprobe.fd = | |
635 | lttng_userspace_probe_location_function_get_binary_fd(location); | |
636 | ||
637 | break; | |
638 | case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_TRACEPOINT_SDT: | |
639 | /* Get the file descriptor on the target binary. */ | |
640 | kernel_trigger->u.uprobe.fd = | |
641 | lttng_userspace_probe_location_tracepoint_get_binary_fd(location); | |
642 | break; | |
643 | default: | |
644 | DBG("Unsupported lookup method type"); | |
645 | ret = LTTNG_ERR_PROBE_LOCATION_INVAL; | |
646 | goto error; | |
647 | } | |
648 | ||
649 | (void) lttng_event_rule_uprobe_get_name(rule, &name); | |
650 | ||
651 | ret = LTTNG_OK; | |
652 | break; | |
653 | } | |
654 | case LTTNG_EVENT_RULE_TYPE_KRETPROBE: | |
655 | assert("Not supported" && 0); | |
656 | ret = LTTNG_OK; | |
657 | break; | |
658 | case LTTNG_EVENT_RULE_TYPE_TRACEPOINT: | |
659 | /* TODO: assert his is a kernel domain event-rule */ | |
660 | kernel_trigger->instrumentation = LTTNG_KERNEL_TRACEPOINT; | |
661 | (void) lttng_event_rule_tracepoint_get_pattern(rule, &name); | |
662 | ret = LTTNG_OK; | |
663 | break; | |
664 | case LTTNG_EVENT_RULE_TYPE_SYSCALL: | |
665 | kernel_trigger->instrumentation = LTTNG_KERNEL_SYSCALL; | |
666 | (void) lttng_event_rule_syscall_get_pattern(rule, &name); | |
667 | ret = LTTNG_OK; | |
668 | break; | |
669 | default: | |
670 | ERR("Unknown kernel event rule instrumentation type (%d)", lttng_event_rule_get_type(rule)); | |
671 | ret = LTTNG_ERR_INVALID; | |
672 | goto error; | |
673 | } | |
674 | ||
675 | /* | |
676 | * WTF is LTTNG_EVENT_ALL??? and LTTNG_EVENT_FUNTION_ENTRY????? | |
677 | */ | |
678 | ||
679 | /* Copy event name */ | |
680 | strncpy(kernel_trigger->name, name, LTTNG_KERNEL_SYM_NAME_LEN); | |
681 | kernel_trigger->name[LTTNG_KERNEL_SYM_NAME_LEN - 1] = '\0'; | |
682 | ||
683 | error: | |
684 | return ret; | |
685 | } | |
54012638 | 686 | /* |
050349bb | 687 | * Allocate and initialize a kernel metadata. |
54012638 | 688 | * |
050349bb | 689 | * Return pointer to structure or NULL. |
54012638 | 690 | */ |
a4b92340 | 691 | struct ltt_kernel_metadata *trace_kernel_create_metadata(void) |
54012638 | 692 | { |
d42266a4 | 693 | int ret; |
54012638 | 694 | struct ltt_kernel_metadata *lkm; |
f3ed775e | 695 | struct lttng_channel *chan; |
54012638 | 696 | |
ba7f0ae5 DG |
697 | lkm = zmalloc(sizeof(struct ltt_kernel_metadata)); |
698 | chan = zmalloc(sizeof(struct lttng_channel)); | |
f3ed775e | 699 | if (lkm == NULL || chan == NULL) { |
df0f840b | 700 | PERROR("kernel metadata zmalloc"); |
54012638 DG |
701 | goto error; |
702 | } | |
703 | ||
d42266a4 JG |
704 | ret = lttng_strncpy( |
705 | chan->name, DEFAULT_METADATA_NAME, sizeof(chan->name)); | |
706 | if (ret) { | |
707 | ERR("Failed to initialize metadata channel name to `%s`", | |
708 | DEFAULT_METADATA_NAME); | |
709 | goto error; | |
710 | } | |
711 | ||
54012638 | 712 | /* Set default attributes */ |
d42266a4 | 713 | chan->attr.overwrite = DEFAULT_METADATA_OVERWRITE; |
3e230f92 | 714 | chan->attr.subbuf_size = default_get_metadata_subbuf_size(); |
b389abbe | 715 | chan->attr.num_subbuf = DEFAULT_METADATA_SUBBUF_NUM; |
d42266a4 JG |
716 | chan->attr.switch_timer_interval = DEFAULT_METADATA_SWITCH_TIMER; |
717 | chan->attr.read_timer_interval = DEFAULT_METADATA_READ_TIMER;; | |
718 | ||
719 | ||
720 | /* | |
721 | * The metadata channel of kernel sessions must use the "mmap" | |
722 | * back-end since the consumer daemon accumulates complete | |
723 | * metadata units before sending them to the relay daemon in | |
724 | * live mode. The consumer daemon also needs to extract the contents | |
725 | * of the metadata cache when computing a rotation position. | |
726 | * | |
727 | * In both cases, it is not possible to rely on the splice | |
728 | * back-end as the consumer daemon may need to accumulate more | |
729 | * content than can be backed by the ring buffer's underlying | |
730 | * pages. | |
731 | */ | |
732 | chan->attr.output = LTTNG_EVENT_MMAP; | |
733 | chan->attr.tracefile_size = 0; | |
734 | chan->attr.tracefile_count = 0; | |
735 | chan->attr.live_timer_interval = 0; | |
54012638 DG |
736 | |
737 | /* Init metadata */ | |
03550b58 | 738 | lkm->fd = -1; |
f3ed775e | 739 | lkm->conf = chan; |
54012638 DG |
740 | |
741 | return lkm; | |
742 | ||
743 | error: | |
a2c0da86 MD |
744 | free(lkm); |
745 | free(chan); | |
54012638 DG |
746 | return NULL; |
747 | } | |
748 | ||
749 | /* | |
050349bb DG |
750 | * Allocate and initialize a kernel stream. The stream is set to ACTIVE_FD by |
751 | * default. | |
54012638 | 752 | * |
050349bb | 753 | * Return pointer to structure or NULL. |
54012638 | 754 | */ |
00e2e675 DG |
755 | struct ltt_kernel_stream *trace_kernel_create_stream(const char *name, |
756 | unsigned int count) | |
54012638 | 757 | { |
00e2e675 | 758 | int ret; |
54012638 DG |
759 | struct ltt_kernel_stream *lks; |
760 | ||
0525e9ae DG |
761 | assert(name); |
762 | ||
ba7f0ae5 | 763 | lks = zmalloc(sizeof(struct ltt_kernel_stream)); |
54012638 | 764 | if (lks == NULL) { |
df0f840b | 765 | PERROR("kernel stream zmalloc"); |
54012638 DG |
766 | goto error; |
767 | } | |
768 | ||
00e2e675 | 769 | /* Set name */ |
535b8ff4 | 770 | ret = snprintf(lks->name, sizeof(lks->name), "%s_%u", name, count); |
00e2e675 DG |
771 | if (ret < 0) { |
772 | PERROR("snprintf stream name"); | |
773 | goto error; | |
774 | } | |
775 | lks->name[sizeof(lks->name) - 1] = '\0'; | |
776 | ||
54012638 | 777 | /* Init stream */ |
03550b58 | 778 | lks->fd = -1; |
54012638 | 779 | lks->state = 0; |
ffe60014 | 780 | lks->cpu = count; |
54012638 DG |
781 | |
782 | return lks; | |
783 | ||
784 | error: | |
785 | return NULL; | |
786 | } | |
c363b55d | 787 | |
050349bb DG |
788 | /* |
789 | * Cleanup kernel stream structure. | |
790 | */ | |
62499ad6 | 791 | void trace_kernel_destroy_stream(struct ltt_kernel_stream *stream) |
c363b55d | 792 | { |
0525e9ae DG |
793 | assert(stream); |
794 | ||
33a2b854 | 795 | DBG("[trace] Closing stream fd %d", stream->fd); |
c363b55d | 796 | /* Close kernel fd */ |
03550b58 | 797 | if (stream->fd >= 0) { |
c617c0c6 MD |
798 | int ret; |
799 | ||
03550b58 MD |
800 | ret = close(stream->fd); |
801 | if (ret) { | |
802 | PERROR("close"); | |
803 | } | |
799e2c4f | 804 | } |
c363b55d DG |
805 | /* Remove from stream list */ |
806 | cds_list_del(&stream->list); | |
f9815039 | 807 | |
c363b55d DG |
808 | free(stream); |
809 | } | |
810 | ||
050349bb DG |
811 | /* |
812 | * Cleanup kernel event structure. | |
813 | */ | |
62499ad6 | 814 | void trace_kernel_destroy_event(struct ltt_kernel_event *event) |
c363b55d | 815 | { |
0525e9ae DG |
816 | assert(event); |
817 | ||
87eb4ab8 | 818 | if (event->fd >= 0) { |
c617c0c6 MD |
819 | int ret; |
820 | ||
87eb4ab8 MD |
821 | DBG("[trace] Closing event fd %d", event->fd); |
822 | /* Close kernel fd */ | |
799e2c4f MD |
823 | ret = close(event->fd); |
824 | if (ret) { | |
825 | PERROR("close"); | |
826 | } | |
87eb4ab8 MD |
827 | } else { |
828 | DBG("[trace] Tearing down event (no associated fd)"); | |
829 | } | |
c363b55d DG |
830 | |
831 | /* Remove from event list */ | |
832 | cds_list_del(&event->list); | |
f9815039 | 833 | |
00a62084 MD |
834 | free(event->filter_expression); |
835 | free(event->filter); | |
836 | ||
f9815039 | 837 | free(event->event); |
c363b55d DG |
838 | free(event); |
839 | } | |
840 | ||
2463b787 JR |
841 | /* |
842 | * Cleanup kernel event structure. | |
843 | */ | |
844 | void trace_kernel_destroy_token_event_rule(struct ltt_kernel_token_event_rule *event) | |
845 | { | |
846 | /* TODO: review in depth to ensure adequate disposing */ | |
847 | assert(event); | |
848 | ||
849 | if (event->fd >= 0) { | |
850 | int ret; | |
851 | ||
852 | DBG("[trace] Closing ,token event rule fd %d", event->fd); | |
853 | /* Close kernel fd */ | |
854 | ret = close(event->fd); | |
855 | if (ret) { | |
856 | PERROR("close"); | |
857 | } | |
858 | } else { | |
859 | DBG("[trace] Tearing down token event rule (no associated fd)"); | |
860 | } | |
861 | ||
862 | lttng_trigger_put(event->trigger); | |
863 | free(event); | |
864 | } | |
645328ae DG |
865 | /* |
866 | * Cleanup kernel context structure. | |
867 | */ | |
868 | void trace_kernel_destroy_context(struct ltt_kernel_context *ctx) | |
869 | { | |
870 | assert(ctx); | |
871 | ||
ba985c3a JG |
872 | if (ctx->in_list) { |
873 | cds_list_del(&ctx->list); | |
874 | } | |
645328ae DG |
875 | free(ctx); |
876 | } | |
877 | ||
050349bb DG |
878 | /* |
879 | * Cleanup kernel channel structure. | |
880 | */ | |
62499ad6 | 881 | void trace_kernel_destroy_channel(struct ltt_kernel_channel *channel) |
c363b55d | 882 | { |
af9737e9 DG |
883 | struct ltt_kernel_stream *stream, *stmp; |
884 | struct ltt_kernel_event *event, *etmp; | |
645328ae | 885 | struct ltt_kernel_context *ctx, *ctmp; |
799e2c4f | 886 | int ret; |
e9404c27 | 887 | enum lttng_error_code status; |
c363b55d | 888 | |
0525e9ae DG |
889 | assert(channel); |
890 | ||
33a2b854 | 891 | DBG("[trace] Closing channel fd %d", channel->fd); |
c363b55d | 892 | /* Close kernel fd */ |
03550b58 MD |
893 | if (channel->fd >= 0) { |
894 | ret = close(channel->fd); | |
895 | if (ret) { | |
896 | PERROR("close"); | |
897 | } | |
799e2c4f | 898 | } |
c363b55d DG |
899 | |
900 | /* For each stream in the channel list */ | |
af9737e9 | 901 | cds_list_for_each_entry_safe(stream, stmp, &channel->stream_list.head, list) { |
62499ad6 | 902 | trace_kernel_destroy_stream(stream); |
c363b55d DG |
903 | } |
904 | ||
905 | /* For each event in the channel list */ | |
af9737e9 | 906 | cds_list_for_each_entry_safe(event, etmp, &channel->events_list.head, list) { |
62499ad6 | 907 | trace_kernel_destroy_event(event); |
c363b55d DG |
908 | } |
909 | ||
645328ae DG |
910 | /* For each context in the channel list */ |
911 | cds_list_for_each_entry_safe(ctx, ctmp, &channel->ctx_list, list) { | |
912 | trace_kernel_destroy_context(ctx); | |
913 | } | |
914 | ||
c363b55d DG |
915 | /* Remove from channel list */ |
916 | cds_list_del(&channel->list); | |
f9815039 | 917 | |
753873bf JR |
918 | if (notification_thread_handle |
919 | && channel->published_to_notification_thread) { | |
63aaa3dc JG |
920 | status = notification_thread_command_remove_channel( |
921 | notification_thread_handle, | |
e1f3997a | 922 | channel->key, LTTNG_DOMAIN_KERNEL); |
63aaa3dc JG |
923 | assert(status == LTTNG_OK); |
924 | } | |
e9404c27 | 925 | free(channel->channel->attr.extended.ptr); |
f9815039 | 926 | free(channel->channel); |
c363b55d DG |
927 | free(channel); |
928 | } | |
929 | ||
050349bb DG |
930 | /* |
931 | * Cleanup kernel metadata structure. | |
932 | */ | |
62499ad6 | 933 | void trace_kernel_destroy_metadata(struct ltt_kernel_metadata *metadata) |
c363b55d | 934 | { |
0525e9ae DG |
935 | assert(metadata); |
936 | ||
33a2b854 | 937 | DBG("[trace] Closing metadata fd %d", metadata->fd); |
c363b55d | 938 | /* Close kernel fd */ |
03550b58 | 939 | if (metadata->fd >= 0) { |
c617c0c6 MD |
940 | int ret; |
941 | ||
03550b58 MD |
942 | ret = close(metadata->fd); |
943 | if (ret) { | |
944 | PERROR("close"); | |
945 | } | |
799e2c4f | 946 | } |
c363b55d | 947 | |
f9815039 | 948 | free(metadata->conf); |
c363b55d DG |
949 | free(metadata); |
950 | } | |
951 | ||
050349bb | 952 | /* |
62499ad6 | 953 | * Cleanup kernel session structure |
36b588ed MD |
954 | * |
955 | * Should *NOT* be called with RCU read-side lock held. | |
050349bb | 956 | */ |
62499ad6 | 957 | void trace_kernel_destroy_session(struct ltt_kernel_session *session) |
c363b55d | 958 | { |
af9737e9 | 959 | struct ltt_kernel_channel *channel, *ctmp; |
799e2c4f | 960 | int ret; |
c363b55d | 961 | |
0525e9ae DG |
962 | assert(session); |
963 | ||
33a2b854 | 964 | DBG("[trace] Closing session fd %d", session->fd); |
c363b55d | 965 | /* Close kernel fds */ |
03550b58 MD |
966 | if (session->fd >= 0) { |
967 | ret = close(session->fd); | |
968 | if (ret) { | |
969 | PERROR("close"); | |
970 | } | |
799e2c4f | 971 | } |
f9815039 | 972 | |
03550b58 | 973 | if (session->metadata_stream_fd >= 0) { |
70dc1c34 | 974 | DBG("[trace] Closing metadata stream fd %d", session->metadata_stream_fd); |
799e2c4f MD |
975 | ret = close(session->metadata_stream_fd); |
976 | if (ret) { | |
977 | PERROR("close"); | |
978 | } | |
70dc1c34 | 979 | } |
c363b55d | 980 | |
d36b8583 | 981 | if (session->metadata != NULL) { |
62499ad6 | 982 | trace_kernel_destroy_metadata(session->metadata); |
d36b8583 | 983 | } |
c363b55d | 984 | |
af9737e9 | 985 | cds_list_for_each_entry_safe(channel, ctmp, &session->channel_list.head, list) { |
62499ad6 | 986 | trace_kernel_destroy_channel(channel); |
c363b55d | 987 | } |
d070c424 | 988 | } |
c363b55d | 989 | |
d070c424 MD |
990 | /* Free elements needed by destroy notifiers. */ |
991 | void trace_kernel_free_session(struct ltt_kernel_session *session) | |
992 | { | |
00e2e675 | 993 | /* Wipe consumer output object */ |
6addfa37 | 994 | consumer_output_put(session->consumer); |
00e2e675 | 995 | |
159b042f JG |
996 | process_attr_tracker_destroy(session->tracker_pid); |
997 | process_attr_tracker_destroy(session->tracker_vpid); | |
998 | process_attr_tracker_destroy(session->tracker_uid); | |
999 | process_attr_tracker_destroy(session->tracker_vuid); | |
1000 | process_attr_tracker_destroy(session->tracker_gid); | |
1001 | process_attr_tracker_destroy(session->tracker_vgid); | |
55c9e7ca | 1002 | |
c363b55d DG |
1003 | free(session); |
1004 | } |