Commit | Line | Data |
---|---|---|
b7cdc182 | 1 | /* SPDX-License-Identifier: (GPL-2.0-only or LGPL-2.1-only) |
a6cf40a4 MJ |
2 | * |
3 | * lttng-context-mnt-ns.c | |
4 | * | |
5 | * LTTng mount namespace context. | |
6 | * | |
7 | * Copyright (C) 2009-2012 Mathieu Desnoyers <mathieu.desnoyers@efficios.com> | |
8 | * 2019 Michael Jeanson <mjeanson@efficios.com> | |
9 | * | |
10 | */ | |
11 | ||
12 | #include <linux/module.h> | |
13 | #include <linux/slab.h> | |
14 | #include <linux/sched.h> | |
2df37e95 | 15 | #include <lttng/events.h> |
437d5aa5 | 16 | #include <lttng/events-internal.h> |
7b1edb4c | 17 | #include <linux/nsproxy.h> |
24591303 | 18 | #include <ringbuffer/frontend_types.h> |
a6cf40a4 | 19 | #include <wrapper/vmalloc.h> |
2df37e95 | 20 | #include <lttng/tracer.h> |
a6cf40a4 MJ |
21 | |
22 | #if !defined(LTTNG_MNT_NS_MISSING_HEADER) && \ | |
5f4c791e | 23 | (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(3,8,0)) |
a6cf40a4 MJ |
24 | |
25 | #include <../fs/mount.h> | |
26 | ||
27 | static | |
a92e844e | 28 | size_t mnt_ns_get_size(void *priv, struct lttng_kernel_probe_ctx *probe_ctx, size_t offset) |
a6cf40a4 MJ |
29 | { |
30 | size_t size = 0; | |
31 | ||
32 | size += lib_ring_buffer_align(offset, lttng_alignof(unsigned int)); | |
33 | size += sizeof(unsigned int); | |
34 | return size; | |
35 | } | |
36 | ||
37 | static | |
a92e844e | 38 | void mnt_ns_record(void *priv, struct lttng_kernel_probe_ctx *probe_ctx, |
8a57ec02 | 39 | struct lttng_kernel_ring_buffer_ctx *ctx, |
f7d06400 | 40 | struct lttng_kernel_channel_buffer *chan) |
a6cf40a4 MJ |
41 | { |
42 | unsigned int mnt_ns_inum = 0; | |
43 | ||
44 | /* | |
45 | * nsproxy can be NULL when scheduled out of exit. | |
46 | * | |
47 | * As documented in 'linux/nsproxy.h' namespaces access rules, no | |
48 | * precautions should be taken when accessing the current task's | |
49 | * namespaces, just dereference the pointers. | |
50 | */ | |
51 | if (current->nsproxy) | |
93e5bcec | 52 | mnt_ns_inum = current->nsproxy->mnt_ns->ns.inum; |
a6cf40a4 | 53 | |
f5ffbd77 | 54 | chan->ops->event_write(ctx, &mnt_ns_inum, sizeof(mnt_ns_inum), lttng_alignof(mnt_ns_inum)); |
a6cf40a4 MJ |
55 | } |
56 | ||
57 | static | |
2dc781e0 | 58 | void mnt_ns_get_value(void *priv, |
a92e844e | 59 | struct lttng_kernel_probe_ctx *lttng_probe_ctx, |
2dc781e0 | 60 | struct lttng_ctx_value *value) |
a6cf40a4 MJ |
61 | { |
62 | unsigned int mnt_ns_inum = 0; | |
63 | ||
64 | /* | |
65 | * nsproxy can be NULL when scheduled out of exit. | |
66 | * | |
67 | * As documented in 'linux/nsproxy.h' namespaces access rules, no | |
68 | * precautions should be taken when accessing the current task's | |
69 | * namespaces, just dereference the pointers. | |
70 | */ | |
71 | if (current->nsproxy) | |
93e5bcec | 72 | mnt_ns_inum = current->nsproxy->mnt_ns->ns.inum; |
a6cf40a4 | 73 | |
2dc781e0 | 74 | value->u.s64 = mnt_ns_inum; |
a6cf40a4 MJ |
75 | } |
76 | ||
437d5aa5 MD |
77 | static const struct lttng_kernel_ctx_field *ctx_field = lttng_kernel_static_ctx_field( |
78 | lttng_kernel_static_event_field("mnt_ns", | |
79 | lttng_kernel_static_type_integer_from_type(unsigned int, __BYTE_ORDER, 10), | |
4697aac7 | 80 | false, false), |
437d5aa5 | 81 | mnt_ns_get_size, |
437d5aa5 MD |
82 | mnt_ns_record, |
83 | mnt_ns_get_value, | |
84 | NULL, NULL); | |
85 | ||
86 | int lttng_add_mnt_ns_to_ctx(struct lttng_kernel_ctx **ctx) | |
a6cf40a4 | 87 | { |
437d5aa5 | 88 | int ret; |
a6cf40a4 | 89 | |
437d5aa5 | 90 | if (lttng_kernel_find_context(*ctx, ctx_field->event_field->name)) |
a6cf40a4 | 91 | return -EEXIST; |
437d5aa5 | 92 | ret = lttng_kernel_context_append(ctx, ctx_field); |
263b6c88 | 93 | wrapper_vmalloc_sync_mappings(); |
437d5aa5 | 94 | return ret; |
a6cf40a4 MJ |
95 | } |
96 | EXPORT_SYMBOL_GPL(lttng_add_mnt_ns_to_ctx); | |
97 | ||
98 | #endif |