Fix: lttng-sessiond: cpu hotplug stream number mismatch
[lttng-tools.git] / src / bin / lttng-sessiond / kernel.c
CommitLineData
20fe2104
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 *
d14d33bf
AM
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
20fe2104
DG
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
d14d33bf
AM
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
20fe2104
DG
16 */
17
6c1c0768 18#define _LGPL_SOURCE
20fe2104 19#include <errno.h>
7b395890 20#include <fcntl.h>
20fe2104
DG
21#include <stdlib.h>
22#include <stdio.h>
f34daff7 23#include <string.h>
8c0faa1d 24#include <unistd.h>
77c7c900 25#include <inttypes.h>
20fe2104 26
990570ed 27#include <common/common.h>
db758600 28#include <common/kernel-ctl/kernel-ctl.h>
c052142c 29#include <common/kernel-ctl/kernel-ioctl.h>
42224349 30#include <common/sessiond-comm/sessiond-comm.h>
1e307fab 31
2f77fc4b 32#include "consumer.h"
4771f025 33#include "kernel.h"
6dc3064a 34#include "kernel-consumer.h"
096102bd 35#include "kern-modules.h"
834978fd 36#include "utils.h"
20fe2104 37
d65106b1 38/*
050349bb 39 * Add context on a kernel channel.
d65106b1
DG
40 */
41int kernel_add_channel_context(struct ltt_kernel_channel *chan,
645328ae 42 struct ltt_kernel_context *ctx)
d65106b1
DG
43{
44 int ret;
45
0525e9ae
DG
46 assert(chan);
47 assert(ctx);
48
d65106b1 49 DBG("Adding context to channel %s", chan->channel->name);
645328ae 50 ret = kernctl_add_context(chan->fd, &ctx->ctx);
d65106b1 51 if (ret < 0) {
1ae5e83e
JD
52 switch (errno) {
53 case ENOSYS:
54 /* Exists but not available for this kernel */
55 ret = LTTNG_ERR_KERN_CONTEXT_UNAVAILABLE;
56 goto error;
57 case EEXIST:
b579acd9
DG
58 /* If EEXIST, we just ignore the error */
59 ret = 0;
1ae5e83e
JD
60 goto end;
61 default:
62 PERROR("add context ioctl");
63 ret = LTTNG_ERR_KERN_CONTEXT_FAIL;
64 goto error;
b579acd9 65 }
d65106b1
DG
66 }
67
1ae5e83e 68end:
645328ae 69 cds_list_add_tail(&ctx->list, &chan->ctx_list);
d65106b1
DG
70 return 0;
71
72error:
73 return ret;
74}
75
20fe2104 76/*
050349bb
DG
77 * Create a new kernel session, register it to the kernel tracer and add it to
78 * the session daemon session.
20fe2104 79 */
8c0faa1d 80int kernel_create_session(struct ltt_session *session, int tracer_fd)
20fe2104
DG
81{
82 int ret;
83 struct ltt_kernel_session *lks;
84
0525e9ae
DG
85 assert(session);
86
54012638 87 /* Allocate data structure */
dec56f6c 88 lks = trace_kernel_create_session();
20fe2104 89 if (lks == NULL) {
54012638 90 ret = -1;
20fe2104
DG
91 goto error;
92 }
93
54012638 94 /* Kernel tracer session creation */
20fe2104
DG
95 ret = kernctl_create_session(tracer_fd);
96 if (ret < 0) {
df0f840b 97 PERROR("ioctl kernel create session");
20fe2104
DG
98 goto error;
99 }
100
20fe2104 101 lks->fd = ret;
7b395890
DG
102 /* Prevent fd duplication after execlp() */
103 ret = fcntl(lks->fd, F_SETFD, FD_CLOEXEC);
104 if (ret < 0) {
df0f840b 105 PERROR("fcntl session fd");
7b395890
DG
106 }
107
53632229 108 lks->id = session->id;
3bd1e081 109 lks->consumer_fds_sent = 0;
8c0faa1d 110 session->kernel_session = lks;
8c0faa1d
DG
111
112 DBG("Kernel session created (fd: %d)", lks->fd);
20fe2104
DG
113
114 return 0;
115
116error:
5f62c685
DG
117 if (lks) {
118 trace_kernel_destroy_session(lks);
119 }
20fe2104
DG
120 return ret;
121}
122
123/*
050349bb
DG
124 * Create a kernel channel, register it to the kernel tracer and add it to the
125 * kernel session.
20fe2104 126 */
050349bb 127int kernel_create_channel(struct ltt_kernel_session *session,
fdd9eb17 128 struct lttng_channel *chan)
20fe2104
DG
129{
130 int ret;
131 struct ltt_kernel_channel *lkc;
20fe2104 132
0525e9ae
DG
133 assert(session);
134 assert(chan);
0525e9ae 135
54012638 136 /* Allocate kernel channel */
fdd9eb17 137 lkc = trace_kernel_create_channel(chan);
54012638 138 if (lkc == NULL) {
20fe2104
DG
139 goto error;
140 }
141
ecc48a90 142 DBG3("Kernel create channel %s with attr: %d, %" PRIu64 ", %" PRIu64 ", %u, %u, %d, %d",
fdd9eb17 143 chan->name, lkc->channel->attr.overwrite,
173af62f
DG
144 lkc->channel->attr.subbuf_size, lkc->channel->attr.num_subbuf,
145 lkc->channel->attr.switch_timer_interval, lkc->channel->attr.read_timer_interval,
ecc48a90 146 lkc->channel->attr.live_timer_interval, lkc->channel->attr.output);
173af62f 147
54012638 148 /* Kernel tracer channel creation */
f3ed775e 149 ret = kernctl_create_channel(session->fd, &lkc->channel->attr);
20fe2104 150 if (ret < 0) {
df0f840b 151 PERROR("ioctl kernel create channel");
20fe2104
DG
152 goto error;
153 }
154
54012638 155 /* Setup the channel fd */
20fe2104 156 lkc->fd = ret;
7b395890
DG
157 /* Prevent fd duplication after execlp() */
158 ret = fcntl(lkc->fd, F_SETFD, FD_CLOEXEC);
159 if (ret < 0) {
df0f840b 160 PERROR("fcntl session fd");
7b395890
DG
161 }
162
54012638 163 /* Add channel to session */
8c0faa1d
DG
164 cds_list_add(&lkc->list, &session->channel_list.head);
165 session->channel_count++;
fb5f35b6 166 lkc->session = session;
20fe2104 167
00e2e675 168 DBG("Kernel channel %s created (fd: %d)", lkc->channel->name, lkc->fd);
20fe2104
DG
169
170 return 0;
171
172error:
5f62c685
DG
173 if (lkc) {
174 free(lkc->channel);
175 free(lkc);
176 }
54012638 177 return -1;
20fe2104 178}
f34daff7
DG
179
180/*
050349bb
DG
181 * Create a kernel event, enable it to the kernel tracer and add it to the
182 * channel event list of the kernel session.
49d21f93 183 * We own filter_expression and filter.
f34daff7 184 */
050349bb 185int kernel_create_event(struct lttng_event *ev,
00a62084
MD
186 struct ltt_kernel_channel *channel,
187 char *filter_expression,
188 struct lttng_filter_bytecode *filter)
f34daff7
DG
189{
190 int ret;
191 struct ltt_kernel_event *event;
f34daff7 192
0525e9ae
DG
193 assert(ev);
194 assert(channel);
195
a969e101 196 /* We pass ownership of filter_expression and filter */
00a62084
MD
197 event = trace_kernel_create_event(ev, filter_expression,
198 filter);
54012638 199 if (event == NULL) {
d87bfb32 200 ret = -1;
f34daff7
DG
201 goto error;
202 }
203
f3ed775e
DG
204 ret = kernctl_create_event(channel->fd, event->event);
205 if (ret < 0) {
bd29c13d
DG
206 switch (errno) {
207 case EEXIST:
208 break;
209 case ENOSYS:
210 WARN("Event type not implemented");
211 break;
8197a339
DG
212 case ENOENT:
213 WARN("Event %s not found!", ev->name);
214 break;
bd29c13d 215 default:
d87bfb32
DG
216 PERROR("create event ioctl");
217 }
218 ret = -errno;
e953ef25 219 goto free_event;
8c0faa1d 220 }
f34daff7 221
d0ae4ea8 222 event->type = ev->type;
f3ed775e 223 event->fd = ret;
7b395890
DG
224 /* Prevent fd duplication after execlp() */
225 ret = fcntl(event->fd, F_SETFD, FD_CLOEXEC);
226 if (ret < 0) {
df0f840b 227 PERROR("fcntl session fd");
7b395890
DG
228 }
229
00a62084
MD
230 if (filter) {
231 ret = kernctl_filter(event->fd, filter);
232 if (ret) {
233 goto filter_error;
234 }
235 }
236
237 ret = kernctl_enable(event->fd);
238 if (ret < 0) {
239 switch (errno) {
240 case EEXIST:
241 ret = LTTNG_ERR_KERN_EVENT_EXIST;
242 break;
243 default:
244 PERROR("enable kernel event");
245 break;
246 }
247 goto enable_error;
248 }
249
f3ed775e
DG
250 /* Add event to event list */
251 cds_list_add(&event->list, &channel->events_list.head);
cbbbb275
DG
252 channel->event_count++;
253
e953ef25
DG
254 DBG("Event %s created (fd: %d)", ev->name, event->fd);
255
256 return 0;
257
00a62084
MD
258enable_error:
259filter_error:
260 {
261 int closeret;
262
263 closeret = close(event->fd);
264 if (closeret) {
265 PERROR("close event fd");
266 }
267 }
e953ef25
DG
268free_event:
269 free(event);
270error:
d87bfb32 271 return ret;
e953ef25
DG
272}
273
26cc6b4e 274/*
050349bb 275 * Disable a kernel channel.
26cc6b4e
DG
276 */
277int kernel_disable_channel(struct ltt_kernel_channel *chan)
278{
279 int ret;
280
0525e9ae
DG
281 assert(chan);
282
26cc6b4e
DG
283 ret = kernctl_disable(chan->fd);
284 if (ret < 0) {
df0f840b 285 PERROR("disable chan ioctl");
26cc6b4e
DG
286 ret = errno;
287 goto error;
288 }
289
290 chan->enabled = 0;
291 DBG("Kernel channel %s disabled (fd: %d)", chan->channel->name, chan->fd);
292
293 return 0;
294
295error:
296 return ret;
297}
298
d36b8583 299/*
050349bb 300 * Enable a kernel channel.
d36b8583
DG
301 */
302int kernel_enable_channel(struct ltt_kernel_channel *chan)
303{
304 int ret;
305
0525e9ae
DG
306 assert(chan);
307
d36b8583 308 ret = kernctl_enable(chan->fd);
54d01ffb 309 if (ret < 0 && errno != EEXIST) {
df0f840b 310 PERROR("Enable kernel chan");
d36b8583
DG
311 goto error;
312 }
313
314 chan->enabled = 1;
315 DBG("Kernel channel %s enabled (fd: %d)", chan->channel->name, chan->fd);
316
317 return 0;
318
319error:
320 return ret;
321}
322
19e70852 323/*
050349bb 324 * Enable a kernel event.
19e70852
DG
325 */
326int kernel_enable_event(struct ltt_kernel_event *event)
327{
328 int ret;
329
0525e9ae
DG
330 assert(event);
331
19e70852 332 ret = kernctl_enable(event->fd);
42224349
DG
333 if (ret < 0) {
334 switch (errno) {
335 case EEXIST:
f73fabfd 336 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349
DG
337 break;
338 default:
339 PERROR("enable kernel event");
340 break;
341 }
19e70852
DG
342 goto error;
343 }
344
345 event->enabled = 1;
346 DBG("Kernel event %s enabled (fd: %d)", event->event->name, event->fd);
347
348 return 0;
349
350error:
d36b8583 351 return ret;
19e70852
DG
352}
353
e953ef25 354/*
050349bb 355 * Disable a kernel event.
e953ef25 356 */
19e70852 357int kernel_disable_event(struct ltt_kernel_event *event)
e953ef25
DG
358{
359 int ret;
19e70852 360
0525e9ae
DG
361 assert(event);
362
19e70852 363 ret = kernctl_disable(event->fd);
42224349
DG
364 if (ret < 0) {
365 switch (errno) {
366 case EEXIST:
f73fabfd 367 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349
DG
368 break;
369 default:
370 PERROR("disable kernel event");
371 break;
372 }
19e70852 373 goto error;
e953ef25 374 }
f3ed775e 375
19e70852
DG
376 event->enabled = 0;
377 DBG("Kernel event %s disabled (fd: %d)", event->event->name, event->fd);
378
f34daff7
DG
379 return 0;
380
381error:
d36b8583 382 return ret;
f34daff7 383}
aaf26714 384
6e911cad 385
ccf10263
MD
386int kernel_track_pid(struct ltt_kernel_session *session, int pid)
387{
7c493d31
MD
388 int ret;
389
ccf10263
MD
390 DBG("Kernel track PID %d for session id %" PRIu64 ".",
391 pid, session->id);
7c493d31
MD
392 ret = kernctl_track_pid(session->fd, pid);
393 if (!ret) {
394 return LTTNG_OK;
395 }
396 switch (errno) {
397 case EINVAL:
398 return LTTNG_ERR_INVALID;
399 case ENOMEM:
400 return LTTNG_ERR_NOMEM;
401 case EEXIST:
402 return LTTNG_ERR_PID_TRACKED;
403 default:
404 return LTTNG_ERR_UNK;
405 }
ccf10263
MD
406}
407
408int kernel_untrack_pid(struct ltt_kernel_session *session, int pid)
409{
7c493d31
MD
410 int ret;
411
ccf10263
MD
412 DBG("Kernel untrack PID %d for session id %" PRIu64 ".",
413 pid, session->id);
7c493d31
MD
414 ret = kernctl_untrack_pid(session->fd, pid);
415 if (!ret) {
416 return LTTNG_OK;
417 }
418 switch (errno) {
419 case EINVAL:
420 return LTTNG_ERR_INVALID;
421 case ENOMEM:
422 return LTTNG_ERR_NOMEM;
423 case ENOENT:
424 return LTTNG_ERR_PID_NOT_TRACKED;
425 default:
426 return LTTNG_ERR_UNK;
427 }
ccf10263
MD
428}
429
a5dfbb9d
MD
430ssize_t kernel_list_tracker_pids(struct ltt_kernel_session *session,
431 int **_pids)
432{
433 int fd, ret;
434 int pid;
435 ssize_t nbmem, count = 0;
436 FILE *fp;
437 int *pids;
438
439 fd = kernctl_list_tracker_pids(session->fd);
440 if (fd < 0) {
441 PERROR("kernel tracker pids list");
442 goto error;
443 }
444
445 fp = fdopen(fd, "r");
446 if (fp == NULL) {
447 PERROR("kernel tracker pids list fdopen");
448 goto error_fp;
449 }
450
451 nbmem = KERNEL_TRACKER_PIDS_INIT_LIST_SIZE;
452 pids = zmalloc(sizeof(*pids) * nbmem);
453 if (pids == NULL) {
454 PERROR("alloc list pids");
455 count = -ENOMEM;
456 goto end;
457 }
458
459 while (fscanf(fp, "process { pid = %u; };\n", &pid) == 1) {
460 if (count >= nbmem) {
461 int *new_pids;
462 size_t new_nbmem;
463
464 new_nbmem = nbmem << 1;
465 DBG("Reallocating pids list from %zu to %zu entries",
466 nbmem, new_nbmem);
467 new_pids = realloc(pids, new_nbmem * sizeof(*new_pids));
468 if (new_pids == NULL) {
469 PERROR("realloc list events");
470 free(pids);
471 count = -ENOMEM;
472 goto end;
473 }
474 /* Zero the new memory */
475 memset(new_pids + nbmem, 0,
476 (new_nbmem - nbmem) * sizeof(*new_pids));
477 nbmem = new_nbmem;
478 pids = new_pids;
479 }
480 pids[count++] = pid;
481 }
482
483 *_pids = pids;
484 DBG("Kernel list tracker pids done (%zd pids)", count);
485end:
486 ret = fclose(fp); /* closes both fp and fd */
487 if (ret) {
488 PERROR("fclose");
489 }
490 return count;
491
492error_fp:
493 ret = close(fd);
494 if (ret) {
495 PERROR("close");
496 }
497error:
498 return -1;
499}
500
aaf26714 501/*
050349bb
DG
502 * Create kernel metadata, open from the kernel tracer and add it to the
503 * kernel session.
aaf26714 504 */
a4b92340 505int kernel_open_metadata(struct ltt_kernel_session *session)
aaf26714
DG
506{
507 int ret;
74024a21 508 struct ltt_kernel_metadata *lkm = NULL;
aaf26714 509
0525e9ae
DG
510 assert(session);
511
54012638 512 /* Allocate kernel metadata */
a4b92340 513 lkm = trace_kernel_create_metadata();
54012638 514 if (lkm == NULL) {
aaf26714
DG
515 goto error;
516 }
517
54012638 518 /* Kernel tracer metadata creation */
f3ed775e 519 ret = kernctl_open_metadata(session->fd, &lkm->conf->attr);
aaf26714 520 if (ret < 0) {
74024a21 521 goto error_open;
aaf26714
DG
522 }
523
8c0faa1d 524 lkm->fd = ret;
7b395890
DG
525 /* Prevent fd duplication after execlp() */
526 ret = fcntl(lkm->fd, F_SETFD, FD_CLOEXEC);
527 if (ret < 0) {
df0f840b 528 PERROR("fcntl session fd");
7b395890
DG
529 }
530
aaf26714 531 session->metadata = lkm;
8c0faa1d 532
00e2e675 533 DBG("Kernel metadata opened (fd: %d)", lkm->fd);
8c0faa1d
DG
534
535 return 0;
536
74024a21
DG
537error_open:
538 trace_kernel_destroy_metadata(lkm);
8c0faa1d 539error:
54012638 540 return -1;
8c0faa1d
DG
541}
542
543/*
050349bb 544 * Start tracing session.
8c0faa1d
DG
545 */
546int kernel_start_session(struct ltt_kernel_session *session)
547{
548 int ret;
549
0525e9ae
DG
550 assert(session);
551
8c0faa1d
DG
552 ret = kernctl_start_session(session->fd);
553 if (ret < 0) {
df0f840b 554 PERROR("ioctl start session");
8c0faa1d
DG
555 goto error;
556 }
557
558 DBG("Kernel session started");
559
560 return 0;
561
562error:
563 return ret;
564}
565
f3ed775e 566/*
050349bb 567 * Make a kernel wait to make sure in-flight probe have completed.
f3ed775e
DG
568 */
569void kernel_wait_quiescent(int fd)
570{
571 int ret;
572
573 DBG("Kernel quiescent wait on %d", fd);
574
575 ret = kernctl_wait_quiescent(fd);
576 if (ret < 0) {
df0f840b 577 PERROR("wait quiescent ioctl");
f3ed775e
DG
578 ERR("Kernel quiescent wait failed");
579 }
580}
581
d0254c7c 582/*
050349bb 583 * Kernel calibrate
d0254c7c
MD
584 */
585int kernel_calibrate(int fd, struct lttng_kernel_calibrate *calibrate)
586{
587 int ret;
588
0525e9ae
DG
589 assert(calibrate);
590
d0254c7c
MD
591 ret = kernctl_calibrate(fd, calibrate);
592 if (ret < 0) {
df0f840b 593 PERROR("calibrate ioctl");
d0254c7c
MD
594 return -1;
595 }
596
597 return 0;
598}
599
600
f3ed775e 601/*
f3ed775e
DG
602 * Force flush buffer of metadata.
603 */
604int kernel_metadata_flush_buffer(int fd)
605{
606 int ret;
607
169d2cb7
DG
608 DBG("Kernel flushing metadata buffer on fd %d", fd);
609
f3ed775e
DG
610 ret = kernctl_buffer_flush(fd);
611 if (ret < 0) {
00e2e675 612 ERR("Fail to flush metadata buffers %d (ret: %d)", fd, ret);
f3ed775e
DG
613 }
614
615 return 0;
616}
617
618/*
050349bb 619 * Force flush buffer for channel.
f3ed775e
DG
620 */
621int kernel_flush_buffer(struct ltt_kernel_channel *channel)
622{
623 int ret;
624 struct ltt_kernel_stream *stream;
625
0525e9ae
DG
626 assert(channel);
627
f3ed775e
DG
628 DBG("Flush buffer for channel %s", channel->channel->name);
629
630 cds_list_for_each_entry(stream, &channel->stream_list.head, list) {
631 DBG("Flushing channel stream %d", stream->fd);
632 ret = kernctl_buffer_flush(stream->fd);
633 if (ret < 0) {
df0f840b 634 PERROR("ioctl");
f3ed775e
DG
635 ERR("Fail to flush buffer for stream %d (ret: %d)",
636 stream->fd, ret);
637 }
638 }
639
640 return 0;
641}
642
8c0faa1d 643/*
050349bb 644 * Stop tracing session.
8c0faa1d
DG
645 */
646int kernel_stop_session(struct ltt_kernel_session *session)
647{
648 int ret;
649
0525e9ae
DG
650 assert(session);
651
8c0faa1d
DG
652 ret = kernctl_stop_session(session->fd);
653 if (ret < 0) {
654 goto error;
655 }
656
657 DBG("Kernel session stopped");
658
659 return 0;
660
661error:
662 return ret;
663}
664
665/*
050349bb
DG
666 * Open stream of channel, register it to the kernel tracer and add it
667 * to the stream list of the channel.
8c0faa1d 668 *
a2d808db
MD
669 * Note: given that the streams may appear in random order wrt CPU
670 * number (e.g. cpu hotplug), the index value of the stream number in
671 * the stream name is not necessarily linked to the CPU number.
672 *
050349bb 673 * Return the number of created stream. Else, a negative value.
8c0faa1d 674 */
f3ed775e 675int kernel_open_channel_stream(struct ltt_kernel_channel *channel)
8c0faa1d 676{
a2d808db 677 int ret;
8c0faa1d
DG
678 struct ltt_kernel_stream *lks;
679
0525e9ae
DG
680 assert(channel);
681
5a47c6a2 682 while ((ret = kernctl_create_stream(channel->fd)) >= 0) {
a2d808db
MD
683 lks = trace_kernel_create_stream(channel->channel->name,
684 channel->stream_count);
8c0faa1d 685 if (lks == NULL) {
799e2c4f
MD
686 ret = close(ret);
687 if (ret) {
688 PERROR("close");
689 }
8c0faa1d
DG
690 goto error;
691 }
692
693 lks->fd = ret;
7b395890
DG
694 /* Prevent fd duplication after execlp() */
695 ret = fcntl(lks->fd, F_SETFD, FD_CLOEXEC);
696 if (ret < 0) {
df0f840b 697 PERROR("fcntl session fd");
7b395890
DG
698 }
699
1624d5b7
JD
700 lks->tracefile_size = channel->channel->attr.tracefile_size;
701 lks->tracefile_count = channel->channel->attr.tracefile_count;
702
a2d808db 703 /* Add stream to channel stream list */
8c0faa1d
DG
704 cds_list_add(&lks->list, &channel->stream_list.head);
705 channel->stream_count++;
8c0faa1d 706
00e2e675
DG
707 DBG("Kernel stream %s created (fd: %d, state: %d)", lks->name, lks->fd,
708 lks->state);
54012638 709 }
8c0faa1d
DG
710
711 return channel->stream_count;
712
713error:
54012638 714 return -1;
8c0faa1d
DG
715}
716
717/*
050349bb 718 * Open the metadata stream and set it to the kernel session.
8c0faa1d 719 */
f3ed775e 720int kernel_open_metadata_stream(struct ltt_kernel_session *session)
8c0faa1d
DG
721{
722 int ret;
723
0525e9ae
DG
724 assert(session);
725
8c0faa1d
DG
726 ret = kernctl_create_stream(session->metadata->fd);
727 if (ret < 0) {
df0f840b 728 PERROR("kernel create metadata stream");
8c0faa1d
DG
729 goto error;
730 }
731
732 DBG("Kernel metadata stream created (fd: %d)", ret);
733 session->metadata_stream_fd = ret;
7b395890
DG
734 /* Prevent fd duplication after execlp() */
735 ret = fcntl(session->metadata_stream_fd, F_SETFD, FD_CLOEXEC);
736 if (ret < 0) {
df0f840b 737 PERROR("fcntl session fd");
7b395890 738 }
aaf26714
DG
739
740 return 0;
741
742error:
54012638 743 return -1;
aaf26714 744}
2ef84c95
DG
745
746/*
9f19cc17 747 * Get the event list from the kernel tracer and return the number of elements.
2ef84c95 748 */
9f19cc17 749ssize_t kernel_list_events(int tracer_fd, struct lttng_event **events)
2ef84c95 750{
53efb85a 751 int fd, ret;
9f19cc17
DG
752 char *event;
753 size_t nbmem, count = 0;
2ef84c95 754 FILE *fp;
9f19cc17 755 struct lttng_event *elist;
2ef84c95 756
0525e9ae
DG
757 assert(events);
758
2ef84c95
DG
759 fd = kernctl_tracepoint_list(tracer_fd);
760 if (fd < 0) {
df0f840b 761 PERROR("kernel tracepoint list");
2ef84c95
DG
762 goto error;
763 }
764
765 fp = fdopen(fd, "r");
766 if (fp == NULL) {
df0f840b 767 PERROR("kernel tracepoint list fdopen");
61b73b12 768 goto error_fp;
2ef84c95
DG
769 }
770
771 /*
772 * Init memory size counter
773 * See kernel-ctl.h for explanation of this value
774 */
6725fe19 775 nbmem = KERNEL_EVENT_INIT_LIST_SIZE;
ba7f0ae5 776 elist = zmalloc(sizeof(struct lttng_event) * nbmem);
3b870559
MD
777 if (elist == NULL) {
778 PERROR("alloc list events");
779 count = -ENOMEM;
780 goto end;
781 }
2ef84c95 782
53efb85a 783 while (fscanf(fp, "event { name = %m[^;]; };\n", &event) == 1) {
6725fe19 784 if (count >= nbmem) {
3b870559 785 struct lttng_event *new_elist;
53efb85a 786 size_t new_nbmem;
3b870559 787
53efb85a
MD
788 new_nbmem = nbmem << 1;
789 DBG("Reallocating event list from %zu to %zu bytes",
790 nbmem, new_nbmem);
791 new_elist = realloc(elist, new_nbmem * sizeof(struct lttng_event));
3b870559 792 if (new_elist == NULL) {
df0f840b 793 PERROR("realloc list events");
3b870559
MD
794 free(event);
795 free(elist);
61b73b12
MD
796 count = -ENOMEM;
797 goto end;
2ef84c95 798 }
53efb85a
MD
799 /* Zero the new memory */
800 memset(new_elist + nbmem, 0,
801 (new_nbmem - nbmem) * sizeof(struct lttng_event));
802 nbmem = new_nbmem;
3b870559 803 elist = new_elist;
2ef84c95 804 }
99497cd0
MD
805 strncpy(elist[count].name, event, LTTNG_SYMBOL_NAME_LEN);
806 elist[count].name[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
67b9d018 807 elist[count].enabled = -1;
9f19cc17 808 count++;
3b870559 809 free(event);
2ef84c95
DG
810 }
811
9f19cc17 812 *events = elist;
ced2f820 813 DBG("Kernel list events done (%zu events)", count);
61b73b12 814end:
799e2c4f
MD
815 ret = fclose(fp); /* closes both fp and fd */
816 if (ret) {
817 PERROR("fclose");
818 }
9f19cc17 819 return count;
2ef84c95 820
61b73b12 821error_fp:
799e2c4f
MD
822 ret = close(fd);
823 if (ret) {
824 PERROR("close");
825 }
2ef84c95
DG
826error:
827 return -1;
828}
096102bd
DG
829
830/*
831 * Get kernel version and validate it.
832 */
833int kernel_validate_version(int tracer_fd)
834{
835 int ret;
836 struct lttng_kernel_tracer_version version;
c052142c 837 struct lttng_kernel_tracer_abi_version abi_version;
096102bd
DG
838
839 ret = kernctl_tracer_version(tracer_fd, &version);
840 if (ret < 0) {
eeea8714 841 ERR("Failed to retrieve the lttng-modules version");
096102bd
DG
842 goto error;
843 }
844
845 /* Validate version */
c052142c
MD
846 if (version.major != VERSION_MAJOR) {
847 ERR("Kernel tracer major version (%d) is not compatible with lttng-tools major version (%d)",
848 version.major, VERSION_MAJOR);
096102bd 849 goto error_version;
096102bd 850 }
c052142c
MD
851 ret = kernctl_tracer_abi_version(tracer_fd, &abi_version);
852 if (ret < 0) {
eeea8714 853 ERR("Failed to retrieve lttng-modules ABI version");
c052142c
MD
854 goto error;
855 }
856 if (abi_version.major != LTTNG_MODULES_ABI_MAJOR_VERSION) {
eeea8714 857 ERR("Kernel tracer ABI version (%d.%d) does not match the expected ABI major version (%d.*)",
c052142c
MD
858 abi_version.major, abi_version.minor,
859 LTTNG_MODULES_ABI_MAJOR_VERSION);
860 goto error;
861 }
862 DBG2("Kernel tracer version validated (%d.%d, ABI %d.%d)",
863 version.major, version.minor,
864 abi_version.major, abi_version.minor);
096102bd
DG
865 return 0;
866
867error_version:
096102bd
DG
868 ret = -1;
869
870error:
eeea8714 871 ERR("Kernel tracer version check failed; kernel tracing will not be available");
096102bd
DG
872 return ret;
873}
335a95b7
MD
874
875/*
876 * Kernel work-arounds called at the start of sessiond main().
877 */
878int init_kernel_workarounds(void)
879{
8936c33a 880 int ret;
335a95b7
MD
881 FILE *fp;
882
883 /*
884 * boot_id needs to be read once before being used concurrently
885 * to deal with a Linux kernel race. A fix is proposed for
886 * upstream, but the work-around is needed for older kernels.
887 */
888 fp = fopen("/proc/sys/kernel/random/boot_id", "r");
889 if (!fp) {
890 goto end_boot_id;
891 }
892 while (!feof(fp)) {
893 char buf[37] = "";
894
8936c33a
DG
895 ret = fread(buf, 1, sizeof(buf), fp);
896 if (ret < 0) {
897 /* Ignore error, we don't really care */
898 }
335a95b7 899 }
799e2c4f
MD
900 ret = fclose(fp);
901 if (ret) {
902 PERROR("fclose");
903 }
335a95b7 904end_boot_id:
335a95b7
MD
905 return 0;
906}
2f77fc4b
DG
907
908/*
909 * Complete teardown of a kernel session.
910 */
911void kernel_destroy_session(struct ltt_kernel_session *ksess)
912{
913 if (ksess == NULL) {
914 DBG3("No kernel session when tearing down session");
915 return;
916 }
917
918 DBG("Tearing down kernel session");
919
07b86b52 920 /*
15dc512a
DG
921 * Destroy channels on the consumer if at least one FD has been sent and we
922 * are in no output mode because the streams are in *no* monitor mode so we
923 * have to send a command to clean them up or else they leaked.
07b86b52 924 */
15dc512a 925 if (!ksess->output_traces && ksess->consumer_fds_sent) {
07b86b52
JD
926 int ret;
927 struct consumer_socket *socket;
928 struct lttng_ht_iter iter;
929
930 /* For each consumer socket. */
d069d577 931 rcu_read_lock();
07b86b52
JD
932 cds_lfht_for_each_entry(ksess->consumer->socks->ht, &iter.iter,
933 socket, node.node) {
934 struct ltt_kernel_channel *chan;
935
936 /* For each channel, ask the consumer to destroy it. */
937 cds_list_for_each_entry(chan, &ksess->channel_list.head, list) {
938 ret = kernel_consumer_destroy_channel(socket, chan);
939 if (ret < 0) {
940 /* Consumer is probably dead. Use next socket. */
941 continue;
942 }
943 }
944 }
d069d577 945 rcu_read_unlock();
07b86b52
JD
946 }
947
2f77fc4b
DG
948 /* Close any relayd session */
949 consumer_output_send_destroy_relayd(ksess->consumer);
950
951 trace_kernel_destroy_session(ksess);
952}
fb5f35b6
DG
953
954/*
955 * Destroy a kernel channel object. It does not do anything on the tracer side.
956 */
957void kernel_destroy_channel(struct ltt_kernel_channel *kchan)
958{
959 struct ltt_kernel_session *ksess = NULL;
960
961 assert(kchan);
962 assert(kchan->channel);
963
964 DBG3("Kernel destroy channel %s", kchan->channel->name);
965
966 /* Update channel count of associated session. */
967 if (kchan->session) {
968 /* Keep pointer reference so we can update it after the destroy. */
969 ksess = kchan->session;
970 }
971
972 trace_kernel_destroy_channel(kchan);
973
974 /*
975 * At this point the kernel channel is not visible anymore. This is safe
976 * since in order to work on a visible kernel session, the tracing session
977 * lock (ltt_session.lock) MUST be acquired.
978 */
979 if (ksess) {
980 ksess->channel_count--;
981 }
982}
6dc3064a
DG
983
984/*
985 * Take a snapshot for a given kernel session.
986 *
2a06df8d 987 * Return 0 on success or else return a LTTNG_ERR code.
6dc3064a
DG
988 */
989int kernel_snapshot_record(struct ltt_kernel_session *ksess,
d07ceecd
MD
990 struct snapshot_output *output, int wait,
991 uint64_t nb_packets_per_stream)
6dc3064a 992{
2a06df8d 993 int err, ret, saved_metadata_fd;
6dc3064a
DG
994 struct consumer_socket *socket;
995 struct lttng_ht_iter iter;
996 struct ltt_kernel_metadata *saved_metadata;
997
998 assert(ksess);
999 assert(ksess->consumer);
1000 assert(output);
1001
1002 DBG("Kernel snapshot record started");
1003
1004 /* Save current metadata since the following calls will change it. */
1005 saved_metadata = ksess->metadata;
1006 saved_metadata_fd = ksess->metadata_stream_fd;
1007
1008 rcu_read_lock();
1009
1010 ret = kernel_open_metadata(ksess);
1011 if (ret < 0) {
1012 ret = LTTNG_ERR_KERN_META_FAIL;
1013 goto error;
1014 }
1015
1016 ret = kernel_open_metadata_stream(ksess);
1017 if (ret < 0) {
1018 ret = LTTNG_ERR_KERN_META_FAIL;
1019 goto error_open_stream;
1020 }
1021
1022 /* Send metadata to consumer and snapshot everything. */
1023 cds_lfht_for_each_entry(ksess->consumer->socks->ht, &iter.iter,
1024 socket, node.node) {
1025 struct consumer_output *saved_output;
1026 struct ltt_kernel_channel *chan;
6dc3064a
DG
1027
1028 /*
1029 * Temporarly switch consumer output for our snapshot output. As long
1030 * as the session lock is taken, this is safe.
1031 */
1032 saved_output = ksess->consumer;
1033 ksess->consumer = output->consumer;
1034
1035 pthread_mutex_lock(socket->lock);
1036 /* This stream must not be monitored by the consumer. */
07b86b52 1037 ret = kernel_consumer_add_metadata(socket, ksess, 0);
6dc3064a 1038 pthread_mutex_unlock(socket->lock);
07b86b52 1039 /* Put back the saved consumer output into the session. */
6dc3064a
DG
1040 ksess->consumer = saved_output;
1041 if (ret < 0) {
1042 ret = LTTNG_ERR_KERN_CONSUMER_FAIL;
1043 goto error_consumer;
1044 }
1045
1046 /* For each channel, ask the consumer to snapshot it. */
1047 cds_list_for_each_entry(chan, &ksess->channel_list.head, list) {
07b86b52 1048 pthread_mutex_lock(socket->lock);
6dc3064a 1049 ret = consumer_snapshot_channel(socket, chan->fd, output, 0,
5c786ded
JD
1050 ksess->uid, ksess->gid,
1051 DEFAULT_KERNEL_TRACE_DIR, wait,
d07ceecd 1052 nb_packets_per_stream);
07b86b52 1053 pthread_mutex_unlock(socket->lock);
6dc3064a
DG
1054 if (ret < 0) {
1055 ret = LTTNG_ERR_KERN_CONSUMER_FAIL;
2a06df8d
DG
1056 (void) kernel_consumer_destroy_metadata(socket,
1057 ksess->metadata);
6dc3064a
DG
1058 goto error_consumer;
1059 }
1060 }
1061
1062 /* Snapshot metadata, */
07b86b52 1063 pthread_mutex_lock(socket->lock);
6dc3064a 1064 ret = consumer_snapshot_channel(socket, ksess->metadata->fd, output,
5c786ded 1065 1, ksess->uid, ksess->gid,
d07ceecd 1066 DEFAULT_KERNEL_TRACE_DIR, wait, 0);
07b86b52 1067 pthread_mutex_unlock(socket->lock);
6dc3064a
DG
1068 if (ret < 0) {
1069 ret = LTTNG_ERR_KERN_CONSUMER_FAIL;
1070 goto error_consumer;
1071 }
07b86b52
JD
1072
1073 /*
1074 * The metadata snapshot is done, ask the consumer to destroy it since
1075 * it's not monitored on the consumer side.
1076 */
1077 (void) kernel_consumer_destroy_metadata(socket, ksess->metadata);
6dc3064a
DG
1078 }
1079
fac41e72
DG
1080 ret = LTTNG_OK;
1081
6dc3064a
DG
1082error_consumer:
1083 /* Close newly opened metadata stream. It's now on the consumer side. */
2a06df8d
DG
1084 err = close(ksess->metadata_stream_fd);
1085 if (err < 0) {
6dc3064a
DG
1086 PERROR("close snapshot kernel");
1087 }
1088
1089error_open_stream:
1090 trace_kernel_destroy_metadata(ksess->metadata);
1091error:
1092 /* Restore metadata state.*/
1093 ksess->metadata = saved_metadata;
1094 ksess->metadata_stream_fd = saved_metadata_fd;
1095
1096 rcu_read_unlock();
1097 return ret;
1098}
834978fd
DG
1099
1100/*
1101 * Get the syscall mask array from the kernel tracer.
1102 *
1103 * Return 0 on success else a negative value. In both case, syscall_mask should
1104 * be freed.
1105 */
1106int kernel_syscall_mask(int chan_fd, char **syscall_mask, uint32_t *nr_bits)
1107{
1108 assert(syscall_mask);
1109 assert(nr_bits);
1110
1111 return kernctl_syscall_mask(chan_fd, syscall_mask, nr_bits);
1112}
This page took 0.11411 seconds and 4 git commands to generate.