2 * Copyright (C) 2011 David Goulet <david.goulet@polymtl.ca>
4 * SPDX-License-Identifier: GPL-2.0-only
14 #include <lttng/event.h>
15 #include <lttng/lttng-error.h>
16 #include <lttng/userspace-probe.h>
17 #include <lttng/userspace-probe-internal.h>
18 #include <lttng/event-rule/event-rule.h>
19 #include <lttng/event-rule/event-rule-internal.h>
20 #include <lttng/event-rule/kprobe.h>
21 #include <lttng/event-rule/kprobe-internal.h>
22 #include <lttng/event-rule/kretprobe.h>
23 #include <lttng/event-rule/kretprobe-internal.h>
24 #include <lttng/event-rule/syscall.h>
25 #include <lttng/event-rule/syscall-internal.h>
26 #include <lttng/event-rule/tracepoint.h>
27 #include <lttng/event-rule/tracepoint-internal.h>
28 #include <lttng/event-rule/uprobe-internal.h>
29 #include <common/common.h>
30 #include <common/defaults.h>
31 #include <common/trace-chunk.h>
34 #include "trace-kernel.h"
35 #include "lttng-sessiond.h"
36 #include "notification-thread-commands.h"
39 * Find the channel name for the given kernel session.
41 struct ltt_kernel_channel
*trace_kernel_get_channel_by_name(
42 const char *name
, struct ltt_kernel_session
*session
)
44 struct ltt_kernel_channel
*chan
;
50 * If we receive an empty string for channel name, it means the
51 * default channel name is requested.
54 name
= DEFAULT_CHANNEL_NAME
;
56 DBG("Trying to find channel %s", name
);
58 cds_list_for_each_entry(chan
, &session
->channel_list
.head
, list
) {
59 if (strcmp(name
, chan
->channel
->name
) == 0) {
60 DBG("Found channel by name %s", name
);
69 * Find the event for the given channel.
71 struct ltt_kernel_event
*trace_kernel_find_event(
72 char *name
, struct ltt_kernel_channel
*channel
,
73 enum lttng_event_type type
,
74 struct lttng_filter_bytecode
*filter
)
76 struct ltt_kernel_event
*ev
;
82 cds_list_for_each_entry(ev
, &channel
->events_list
.head
, list
) {
83 if (type
!= LTTNG_EVENT_ALL
&& ev
->type
!= type
) {
86 if (strcmp(name
, ev
->event
->name
)) {
89 if ((ev
->filter
&& !filter
) || (!ev
->filter
&& filter
)) {
92 if (ev
->filter
&& filter
) {
93 if (ev
->filter
->len
!= filter
->len
||
94 memcmp(ev
->filter
->data
, filter
->data
,
103 DBG("Found event %s for channel %s", name
,
104 channel
->channel
->name
);
112 * Find the event name for the given channel.
114 struct ltt_kernel_event
*trace_kernel_get_event_by_name(
115 char *name
, struct ltt_kernel_channel
*channel
,
116 enum lttng_event_type type
)
118 struct ltt_kernel_event
*ev
;
124 cds_list_for_each_entry(ev
, &channel
->events_list
.head
, list
) {
125 if (type
!= LTTNG_EVENT_ALL
&& ev
->type
!= type
) {
128 if (strcmp(name
, ev
->event
->name
)) {
135 DBG("Found event %s for channel %s", name
,
136 channel
->channel
->name
);
143 struct ltt_kernel_token_event_rule
*trace_kernel_find_trigger_by_token(
144 struct ltt_kernel_token_event_rule_list
*list
,
147 struct ltt_kernel_token_event_rule
*token_event_rule
;
152 cds_list_for_each_entry(token_event_rule
, &list
->head
, list
) {
153 if (token_event_rule
->token
== token
) {
159 DBG("Found token event rule %" PRIu64
, token
);
160 return token_event_rule
;
167 * Allocate and initialize a kernel session data structure.
169 * Return pointer to structure or NULL.
171 struct ltt_kernel_session
*trace_kernel_create_session(void)
173 struct ltt_kernel_session
*lks
= NULL
;
175 /* Allocate a new ltt kernel session */
176 lks
= zmalloc(sizeof(struct ltt_kernel_session
));
178 PERROR("create kernel session zmalloc");
182 /* Init data structure */
184 lks
->metadata_stream_fd
= -1;
185 lks
->channel_count
= 0;
186 lks
->stream_count_global
= 0;
187 lks
->metadata
= NULL
;
188 CDS_INIT_LIST_HEAD(&lks
->channel_list
.head
);
190 lks
->tracker_list_pid
= lttng_tracker_list_create();
191 if (!lks
->tracker_list_pid
) {
194 lks
->tracker_list_vpid
= lttng_tracker_list_create();
195 if (!lks
->tracker_list_vpid
) {
198 lks
->tracker_list_uid
= lttng_tracker_list_create();
199 if (!lks
->tracker_list_uid
) {
202 lks
->tracker_list_vuid
= lttng_tracker_list_create();
203 if (!lks
->tracker_list_vuid
) {
206 lks
->tracker_list_gid
= lttng_tracker_list_create();
207 if (!lks
->tracker_list_gid
) {
210 lks
->tracker_list_vgid
= lttng_tracker_list_create();
211 if (!lks
->tracker_list_vgid
) {
214 lks
->consumer
= consumer_create_output(CONSUMER_DST_LOCAL
);
215 if (lks
->consumer
== NULL
) {
222 lttng_tracker_list_destroy(lks
->tracker_list_pid
);
223 lttng_tracker_list_destroy(lks
->tracker_list_vpid
);
224 lttng_tracker_list_destroy(lks
->tracker_list_uid
);
225 lttng_tracker_list_destroy(lks
->tracker_list_vuid
);
226 lttng_tracker_list_destroy(lks
->tracker_list_gid
);
227 lttng_tracker_list_destroy(lks
->tracker_list_vgid
);
235 * Allocate and initialize a kernel channel data structure.
237 * Return pointer to structure or NULL.
239 struct ltt_kernel_channel
*trace_kernel_create_channel(
240 struct lttng_channel
*chan
)
242 struct ltt_kernel_channel
*lkc
;
243 struct lttng_channel_extended
*extended
= NULL
;
247 lkc
= zmalloc(sizeof(struct ltt_kernel_channel
));
249 PERROR("ltt_kernel_channel zmalloc");
253 lkc
->channel
= zmalloc(sizeof(struct lttng_channel
));
254 if (lkc
->channel
== NULL
) {
255 PERROR("lttng_channel zmalloc");
259 extended
= zmalloc(sizeof(struct lttng_channel_extended
));
261 PERROR("lttng_channel_channel zmalloc");
264 memcpy(lkc
->channel
, chan
, sizeof(struct lttng_channel
));
265 memcpy(extended
, chan
->attr
.extended
.ptr
, sizeof(struct lttng_channel_extended
));
266 lkc
->channel
->attr
.extended
.ptr
= extended
;
270 * If we receive an empty string for channel name, it means the
271 * default channel name is requested.
273 if (chan
->name
[0] == '\0') {
274 strncpy(lkc
->channel
->name
, DEFAULT_CHANNEL_NAME
,
275 sizeof(lkc
->channel
->name
));
277 lkc
->channel
->name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
280 lkc
->stream_count
= 0;
281 lkc
->event_count
= 0;
283 lkc
->published_to_notification_thread
= false;
284 /* Init linked list */
285 CDS_INIT_LIST_HEAD(&lkc
->events_list
.head
);
286 CDS_INIT_LIST_HEAD(&lkc
->stream_list
.head
);
287 CDS_INIT_LIST_HEAD(&lkc
->ctx_list
);
301 * Allocate and init a kernel context object.
303 * Return the allocated object or NULL on error.
305 struct ltt_kernel_context
*trace_kernel_create_context(
306 struct lttng_kernel_context
*ctx
)
308 struct ltt_kernel_context
*kctx
;
310 kctx
= zmalloc(sizeof(*kctx
));
312 PERROR("zmalloc kernel context");
317 memcpy(&kctx
->ctx
, ctx
, sizeof(kctx
->ctx
));
324 * Allocate and init a kernel context object from an existing kernel context
327 * Return the allocated object or NULL on error.
329 struct ltt_kernel_context
*trace_kernel_copy_context(
330 struct ltt_kernel_context
*kctx
)
332 struct ltt_kernel_context
*kctx_copy
;
335 kctx_copy
= zmalloc(sizeof(*kctx_copy
));
337 PERROR("zmalloc ltt_kernel_context");
341 memcpy(kctx_copy
, kctx
, sizeof(*kctx_copy
));
342 memset(&kctx_copy
->list
, 0, sizeof(kctx_copy
->list
));
349 * Allocate and initialize a kernel event. Set name and event type.
350 * We own filter_expression, and filter.
352 * Return pointer to structure or NULL.
354 enum lttng_error_code
trace_kernel_create_event(
355 struct lttng_event
*ev
, char *filter_expression
,
356 struct lttng_filter_bytecode
*filter
,
357 struct ltt_kernel_event
**kernel_event
)
359 enum lttng_error_code ret
;
360 struct lttng_kernel_event
*attr
;
361 struct ltt_kernel_event
*local_kernel_event
;
362 struct lttng_userspace_probe_location
*userspace_probe_location
= NULL
;
366 local_kernel_event
= zmalloc(sizeof(struct ltt_kernel_event
));
367 attr
= zmalloc(sizeof(struct lttng_kernel_event
));
368 if (local_kernel_event
== NULL
|| attr
== NULL
) {
369 PERROR("kernel event zmalloc");
370 ret
= LTTNG_ERR_NOMEM
;
375 case LTTNG_EVENT_PROBE
:
376 attr
->instrumentation
= LTTNG_KERNEL_KPROBE
;
377 attr
->u
.kprobe
.addr
= ev
->attr
.probe
.addr
;
378 attr
->u
.kprobe
.offset
= ev
->attr
.probe
.offset
;
379 strncpy(attr
->u
.kprobe
.symbol_name
,
380 ev
->attr
.probe
.symbol_name
, LTTNG_KERNEL_SYM_NAME_LEN
);
381 attr
->u
.kprobe
.symbol_name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
383 case LTTNG_EVENT_USERSPACE_PROBE
:
385 const struct lttng_userspace_probe_location
* location
= NULL
;
386 const struct lttng_userspace_probe_location_lookup_method
*lookup
= NULL
;
388 location
= lttng_event_get_userspace_probe_location(ev
);
390 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
395 * From this point on, the specific term 'uprobe' is used
396 * instead of the generic 'userspace probe' because it's the
397 * technology used at the moment for this instrumentation.
398 * LTTng currently implements userspace probes using uprobes.
399 * In the interactions with the kernel tracer, we use the
402 attr
->instrumentation
= LTTNG_KERNEL_UPROBE
;
405 * Only the elf lookup method is supported at the moment.
407 lookup
= lttng_userspace_probe_location_get_lookup_method(
410 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
415 * From the kernel tracer's perspective, all userspace probe
416 * event types are all the same: a file and an offset.
418 switch (lttng_userspace_probe_location_lookup_method_get_type(lookup
)) {
419 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_FUNCTION_ELF
:
420 /* Get the file descriptor on the target binary. */
422 lttng_userspace_probe_location_function_get_binary_fd(location
);
425 * Save a reference to the probe location used during
426 * the listing of events. Close its FD since it won't
427 * be needed for listing.
429 userspace_probe_location
=
430 lttng_userspace_probe_location_copy(location
);
431 ret
= lttng_userspace_probe_location_function_set_binary_fd(
432 userspace_probe_location
, -1);
437 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_TRACEPOINT_SDT
:
438 /* Get the file descriptor on the target binary. */
440 lttng_userspace_probe_location_tracepoint_get_binary_fd(location
);
443 * Save a reference to the probe location used during the listing of
444 * events. Close its FD since it won't be needed for listing.
446 userspace_probe_location
=
447 lttng_userspace_probe_location_copy(location
);
448 ret
= lttng_userspace_probe_location_tracepoint_set_binary_fd(
449 userspace_probe_location
, -1);
455 DBG("Unsupported lookup method type");
456 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
461 case LTTNG_EVENT_FUNCTION
:
462 attr
->instrumentation
= LTTNG_KERNEL_KRETPROBE
;
463 attr
->u
.kretprobe
.addr
= ev
->attr
.probe
.addr
;
464 attr
->u
.kretprobe
.offset
= ev
->attr
.probe
.offset
;
465 strncpy(attr
->u
.kretprobe
.symbol_name
,
466 ev
->attr
.probe
.symbol_name
, LTTNG_KERNEL_SYM_NAME_LEN
);
467 attr
->u
.kretprobe
.symbol_name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
469 case LTTNG_EVENT_FUNCTION_ENTRY
:
470 attr
->instrumentation
= LTTNG_KERNEL_FUNCTION
;
471 strncpy(attr
->u
.ftrace
.symbol_name
,
472 ev
->attr
.ftrace
.symbol_name
, LTTNG_KERNEL_SYM_NAME_LEN
);
473 attr
->u
.ftrace
.symbol_name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
475 case LTTNG_EVENT_TRACEPOINT
:
476 attr
->instrumentation
= LTTNG_KERNEL_TRACEPOINT
;
478 case LTTNG_EVENT_SYSCALL
:
479 attr
->instrumentation
= LTTNG_KERNEL_SYSCALL
;
481 case LTTNG_EVENT_ALL
:
482 attr
->instrumentation
= LTTNG_KERNEL_ALL
;
485 ERR("Unknown kernel instrumentation type (%d)", ev
->type
);
486 ret
= LTTNG_ERR_INVALID
;
490 /* Copy event name */
491 strncpy(attr
->name
, ev
->name
, LTTNG_KERNEL_SYM_NAME_LEN
);
492 attr
->name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
494 /* Setting up a kernel event */
495 local_kernel_event
->fd
= -1;
496 local_kernel_event
->event
= attr
;
497 local_kernel_event
->enabled
= 1;
498 local_kernel_event
->filter_expression
= filter_expression
;
499 local_kernel_event
->filter
= filter
;
500 local_kernel_event
->userspace_probe_location
= userspace_probe_location
;
502 *kernel_event
= local_kernel_event
;
507 free(filter_expression
);
509 free(local_kernel_event
);
515 * Allocate and initialize a kernel token event rule.
517 * Return pointer to structure or NULL.
519 enum lttng_error_code
trace_kernel_create_token_event_rule(
520 struct lttng_event_rule
*event_rule
,
522 struct ltt_kernel_token_event_rule
**kernel_token_event_rule
)
524 enum lttng_error_code ret
= LTTNG_OK
;
525 struct ltt_kernel_token_event_rule
*local_kernel_token_event_rule
;
527 assert(kernel_token_event_rule
);
529 local_kernel_token_event_rule
= zmalloc(sizeof(struct ltt_kernel_token_event_rule
));
530 if (local_kernel_token_event_rule
== NULL
) {
531 PERROR("Failed to allocate ltt_kernel_token_event_rule structure");
532 ret
= LTTNG_ERR_NOMEM
;
536 local_kernel_token_event_rule
->fd
= -1;
537 local_kernel_token_event_rule
->enabled
= 1;
538 local_kernel_token_event_rule
->token
= token
;
540 /* Get the reference of the event rule */
541 if (!lttng_event_rule_get(event_rule
)) {
545 local_kernel_token_event_rule
->event_rule
= event_rule
;
546 /* The event rule still own the filter and bytecode */
547 local_kernel_token_event_rule
->filter
= lttng_event_rule_get_filter_bytecode(event_rule
);
549 DBG3("[trace] Kernel token event rule %" PRIu64
" allocated", local_kernel_token_event_rule
->token
);
551 *kernel_token_event_rule
= local_kernel_token_event_rule
;
557 * Initialize a kernel trigger from an event rule.
559 enum lttng_error_code
trace_kernel_init_trigger_from_event_rule(const struct lttng_event_rule
*rule
,
560 struct lttng_kernel_trigger
*kernel_trigger
)
562 enum lttng_error_code ret
;
563 enum lttng_event_rule_status status
;
564 const char *name
= NULL
;
566 /* TODO: do this for now but have disucssion on if this could be the
567 * responsability of the event_rule itself ala
568 * "lttng_even_rule_generate_kernel_trigger"
570 switch (lttng_event_rule_get_type(rule
)) {
571 case LTTNG_EVENT_RULE_TYPE_KPROBE
:
572 kernel_trigger
->instrumentation
= LTTNG_KERNEL_KPROBE
;
573 kernel_trigger
->u
.kprobe
.addr
= lttng_event_rule_kprobe_get_address(rule
);
574 kernel_trigger
->u
.kprobe
.offset
= lttng_event_rule_kprobe_get_offset(rule
);
575 strncpy(kernel_trigger
->u
.kprobe
.symbol_name
,
576 lttng_event_rule_kprobe_get_symbol_name(rule
), LTTNG_KERNEL_SYM_NAME_LEN
);
577 kernel_trigger
->u
.kprobe
.symbol_name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
578 (void) lttng_event_rule_kprobe_get_name(rule
, &name
);
581 case LTTNG_EVENT_RULE_TYPE_UPROBE
:
583 const struct lttng_userspace_probe_location
* location
= NULL
;
584 const struct lttng_userspace_probe_location_lookup_method
*lookup
= NULL
;
586 status
= lttng_event_rule_uprobe_get_location(rule
, &location
);
587 if (status
!= LTTNG_EVENT_RULE_STATUS_OK
) {
588 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
592 kernel_trigger
->instrumentation
= LTTNG_KERNEL_UPROBE
;
595 * Only the elf lookup method is supported at the moment.
597 lookup
= lttng_userspace_probe_location_get_lookup_method(
600 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
605 * From the kernel tracer's perspective, all userspace probe
606 * event types are all the same: a file and an offset.
608 switch (lttng_userspace_probe_location_lookup_method_get_type(lookup
)) {
609 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_FUNCTION_ELF
:
610 /* Get the file descriptor on the target binary. */
611 kernel_trigger
->u
.uprobe
.fd
=
612 lttng_userspace_probe_location_function_get_binary_fd(location
);
615 case LTTNG_USERSPACE_PROBE_LOCATION_LOOKUP_METHOD_TYPE_TRACEPOINT_SDT
:
616 /* Get the file descriptor on the target binary. */
617 kernel_trigger
->u
.uprobe
.fd
=
618 lttng_userspace_probe_location_tracepoint_get_binary_fd(location
);
621 DBG("Unsupported lookup method type");
622 ret
= LTTNG_ERR_PROBE_LOCATION_INVAL
;
626 (void) lttng_event_rule_uprobe_get_name(rule
, &name
);
631 case LTTNG_EVENT_RULE_TYPE_KRETPROBE
:
632 assert("Not supported" && 0);
633 kernel_trigger
->instrumentation
= LTTNG_KERNEL_KRETPROBE
;
634 kernel_trigger
->u
.kretprobe
.addr
= lttng_event_rule_kretprobe_get_address(rule
);
635 kernel_trigger
->u
.kretprobe
.offset
= lttng_event_rule_kretprobe_get_offset(rule
);
636 strncpy(kernel_trigger
->u
.kretprobe
.symbol_name
,
637 lttng_event_rule_kretprobe_get_symbol_name(rule
), LTTNG_KERNEL_SYM_NAME_LEN
);
638 kernel_trigger
->u
.kretprobe
.symbol_name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
639 (void) lttng_event_rule_kretprobe_get_name(rule
, &name
);
642 case LTTNG_EVENT_RULE_TYPE_TRACEPOINT
:
643 /* TODO: assert his is a kernel domain event-rule */
644 kernel_trigger
->instrumentation
= LTTNG_KERNEL_TRACEPOINT
;
645 (void) lttng_event_rule_tracepoint_get_pattern(rule
, &name
);
648 case LTTNG_EVENT_RULE_TYPE_SYSCALL
:
649 kernel_trigger
->instrumentation
= LTTNG_KERNEL_SYSCALL
;
650 (void) lttng_event_rule_syscall_get_pattern(rule
, &name
);
654 ERR("Unknown kernel event rule instrumentation type (%d)", lttng_event_rule_get_type(rule
));
655 ret
= LTTNG_ERR_INVALID
;
660 * WTF is LTTNG_EVENT_ALL??? and LTTNG_EVENT_FUNTION_ENTRY?????
663 /* Copy event name */
664 strncpy(kernel_trigger
->name
, name
, LTTNG_KERNEL_SYM_NAME_LEN
);
665 kernel_trigger
->name
[LTTNG_KERNEL_SYM_NAME_LEN
- 1] = '\0';
671 * Allocate and initialize a kernel metadata.
673 * Return pointer to structure or NULL.
675 struct ltt_kernel_metadata
*trace_kernel_create_metadata(void)
677 struct ltt_kernel_metadata
*lkm
;
678 struct lttng_channel
*chan
;
680 lkm
= zmalloc(sizeof(struct ltt_kernel_metadata
));
681 chan
= zmalloc(sizeof(struct lttng_channel
));
682 if (lkm
== NULL
|| chan
== NULL
) {
683 PERROR("kernel metadata zmalloc");
687 /* Set default attributes */
688 chan
->attr
.overwrite
= DEFAULT_CHANNEL_OVERWRITE
;
689 chan
->attr
.subbuf_size
= default_get_metadata_subbuf_size();
690 chan
->attr
.num_subbuf
= DEFAULT_METADATA_SUBBUF_NUM
;
691 chan
->attr
.switch_timer_interval
= DEFAULT_KERNEL_CHANNEL_SWITCH_TIMER
;
692 chan
->attr
.read_timer_interval
= DEFAULT_KERNEL_CHANNEL_READ_TIMER
;
693 chan
->attr
.output
= DEFAULT_KERNEL_CHANNEL_OUTPUT
;
708 * Allocate and initialize a kernel stream. The stream is set to ACTIVE_FD by
711 * Return pointer to structure or NULL.
713 struct ltt_kernel_stream
*trace_kernel_create_stream(const char *name
,
717 struct ltt_kernel_stream
*lks
;
721 lks
= zmalloc(sizeof(struct ltt_kernel_stream
));
723 PERROR("kernel stream zmalloc");
728 ret
= snprintf(lks
->name
, sizeof(lks
->name
), "%s_%u", name
, count
);
730 PERROR("snprintf stream name");
733 lks
->name
[sizeof(lks
->name
) - 1] = '\0';
747 * Cleanup kernel stream structure.
749 void trace_kernel_destroy_stream(struct ltt_kernel_stream
*stream
)
753 DBG("[trace] Closing stream fd %d", stream
->fd
);
754 /* Close kernel fd */
755 if (stream
->fd
>= 0) {
758 ret
= close(stream
->fd
);
763 /* Remove from stream list */
764 cds_list_del(&stream
->list
);
770 * Cleanup kernel event structure.
772 void trace_kernel_destroy_event(struct ltt_kernel_event
*event
)
776 if (event
->fd
>= 0) {
779 DBG("[trace] Closing event fd %d", event
->fd
);
780 /* Close kernel fd */
781 ret
= close(event
->fd
);
786 DBG("[trace] Tearing down event (no associated fd)");
789 /* Remove from event list */
790 cds_list_del(&event
->list
);
792 free(event
->filter_expression
);
800 * Cleanup kernel event structure.
802 void trace_kernel_destroy_token_event_rule(struct ltt_kernel_token_event_rule
*event
)
804 /* TODO: review in depth to ensure adequate disposing */
807 /* Remove from event list */
808 cds_list_del(&event
->list
);
810 if (event
->fd
>= 0) {
813 DBG("[trace] Closing ,token event rule fd %d", event
->fd
);
814 /* Close kernel fd */
815 ret
= close(event
->fd
);
820 DBG("[trace] Tearing down token event rule (no associated fd)");
823 lttng_event_rule_put(event
->event_rule
);
827 * Cleanup kernel context structure.
829 void trace_kernel_destroy_context(struct ltt_kernel_context
*ctx
)
834 cds_list_del(&ctx
->list
);
840 * Cleanup kernel channel structure.
842 void trace_kernel_destroy_channel(struct ltt_kernel_channel
*channel
)
844 struct ltt_kernel_stream
*stream
, *stmp
;
845 struct ltt_kernel_event
*event
, *etmp
;
846 struct ltt_kernel_context
*ctx
, *ctmp
;
848 enum lttng_error_code status
;
852 DBG("[trace] Closing channel fd %d", channel
->fd
);
853 /* Close kernel fd */
854 if (channel
->fd
>= 0) {
855 ret
= close(channel
->fd
);
861 /* For each stream in the channel list */
862 cds_list_for_each_entry_safe(stream
, stmp
, &channel
->stream_list
.head
, list
) {
863 trace_kernel_destroy_stream(stream
);
866 /* For each event in the channel list */
867 cds_list_for_each_entry_safe(event
, etmp
, &channel
->events_list
.head
, list
) {
868 trace_kernel_destroy_event(event
);
871 /* For each context in the channel list */
872 cds_list_for_each_entry_safe(ctx
, ctmp
, &channel
->ctx_list
, list
) {
873 trace_kernel_destroy_context(ctx
);
876 /* Remove from channel list */
877 cds_list_del(&channel
->list
);
879 if (notification_thread_handle
880 && channel
->published_to_notification_thread
) {
881 status
= notification_thread_command_remove_channel(
882 notification_thread_handle
,
883 channel
->key
, LTTNG_DOMAIN_KERNEL
);
884 assert(status
== LTTNG_OK
);
886 free(channel
->channel
->attr
.extended
.ptr
);
887 free(channel
->channel
);
892 * Cleanup kernel metadata structure.
894 void trace_kernel_destroy_metadata(struct ltt_kernel_metadata
*metadata
)
898 DBG("[trace] Closing metadata fd %d", metadata
->fd
);
899 /* Close kernel fd */
900 if (metadata
->fd
>= 0) {
903 ret
= close(metadata
->fd
);
909 free(metadata
->conf
);
914 * Cleanup kernel session structure
916 * Should *NOT* be called with RCU read-side lock held.
918 void trace_kernel_destroy_session(struct ltt_kernel_session
*session
)
920 struct ltt_kernel_channel
*channel
, *ctmp
;
925 DBG("[trace] Closing session fd %d", session
->fd
);
926 /* Close kernel fds */
927 if (session
->fd
>= 0) {
928 ret
= close(session
->fd
);
934 if (session
->metadata_stream_fd
>= 0) {
935 DBG("[trace] Closing metadata stream fd %d", session
->metadata_stream_fd
);
936 ret
= close(session
->metadata_stream_fd
);
942 if (session
->metadata
!= NULL
) {
943 trace_kernel_destroy_metadata(session
->metadata
);
946 cds_list_for_each_entry_safe(channel
, ctmp
, &session
->channel_list
.head
, list
) {
947 trace_kernel_destroy_channel(channel
);
951 /* Free elements needed by destroy notifiers. */
952 void trace_kernel_free_session(struct ltt_kernel_session
*session
)
954 /* Wipe consumer output object */
955 consumer_output_put(session
->consumer
);
957 lttng_tracker_list_destroy(session
->tracker_list_pid
);
958 lttng_tracker_list_destroy(session
->tracker_list_vpid
);
959 lttng_tracker_list_destroy(session
->tracker_list_uid
);
960 lttng_tracker_list_destroy(session
->tracker_list_vuid
);
961 lttng_tracker_list_destroy(session
->tracker_list_gid
);
962 lttng_tracker_list_destroy(session
->tracker_list_vgid
);