Tests: Fix sleep interruption in health stall test
[lttng-tools.git] / src / bin / lttng-sessiond / ust-app.c
1 /*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
16 */
17
18 #define _GNU_SOURCE
19 #include <errno.h>
20 #include <pthread.h>
21 #include <stdio.h>
22 #include <stdlib.h>
23 #include <string.h>
24 #include <sys/stat.h>
25 #include <sys/types.h>
26 #include <unistd.h>
27 #include <urcu/compiler.h>
28 #include <lttng/ust-error.h>
29
30 #include <common/common.h>
31 #include <common/sessiond-comm/sessiond-comm.h>
32
33 #include "fd-limit.h"
34 #include "health.h"
35 #include "ust-app.h"
36 #include "ust-consumer.h"
37 #include "ust-ctl.h"
38
39 /*
40 * Match function for the hash table lookup.
41 *
42 * It matches an ust app event based on three attributes which are the event
43 * name, the filter bytecode and the loglevel.
44 */
45 static int ht_match_ust_app_event(struct cds_lfht_node *node, const void *_key)
46 {
47 struct ust_app_event *event;
48 const struct ust_app_ht_key *key;
49
50 assert(node);
51 assert(_key);
52
53 event = caa_container_of(node, struct ust_app_event, node.node);
54 key = _key;
55
56 /* Match the 3 elements of the key: name, filter and loglevel. */
57
58 /* Event name */
59 if (strncmp(event->attr.name, key->name, sizeof(event->attr.name)) != 0) {
60 goto no_match;
61 }
62
63 /* Event loglevel. */
64 if (event->attr.loglevel != key->loglevel) {
65 if (event->attr.loglevel_type == LTTNG_UST_LOGLEVEL_ALL
66 && key->loglevel == 0 && event->attr.loglevel == -1) {
67 /*
68 * Match is accepted. This is because on event creation, the
69 * loglevel is set to -1 if the event loglevel type is ALL so 0 and
70 * -1 are accepted for this loglevel type since 0 is the one set by
71 * the API when receiving an enable event.
72 */
73 } else {
74 goto no_match;
75 }
76 }
77
78 /* One of the filters is NULL, fail. */
79 if ((key->filter && !event->filter) || (!key->filter && event->filter)) {
80 goto no_match;
81 }
82
83 if (key->filter && event->filter) {
84 /* Both filters exists, check length followed by the bytecode. */
85 if (event->filter->len != key->filter->len ||
86 memcmp(event->filter->data, key->filter->data,
87 event->filter->len) != 0) {
88 goto no_match;
89 }
90 }
91
92 /* Match. */
93 return 1;
94
95 no_match:
96 return 0;
97 }
98
99 /*
100 * Unique add of an ust app event in the given ht. This uses the custom
101 * ht_match_ust_app_event match function and the event name as hash.
102 */
103 static void add_unique_ust_app_event(struct lttng_ht *ht,
104 struct ust_app_event *event)
105 {
106 struct cds_lfht_node *node_ptr;
107 struct ust_app_ht_key key;
108
109 assert(ht);
110 assert(ht->ht);
111 assert(event);
112
113 key.name = event->attr.name;
114 key.filter = event->filter;
115 key.loglevel = event->attr.loglevel;
116
117 node_ptr = cds_lfht_add_unique(ht->ht,
118 ht->hash_fct(event->node.key, lttng_ht_seed),
119 ht_match_ust_app_event, &key, &event->node.node);
120 assert(node_ptr == &event->node.node);
121 }
122
123 /*
124 * Delete ust context safely. RCU read lock must be held before calling
125 * this function.
126 */
127 static
128 void delete_ust_app_ctx(int sock, struct ust_app_ctx *ua_ctx)
129 {
130 if (ua_ctx->obj) {
131 ustctl_release_object(sock, ua_ctx->obj);
132 free(ua_ctx->obj);
133 }
134 free(ua_ctx);
135 }
136
137 /*
138 * Delete ust app event safely. RCU read lock must be held before calling
139 * this function.
140 */
141 static
142 void delete_ust_app_event(int sock, struct ust_app_event *ua_event)
143 {
144 free(ua_event->filter);
145
146 if (ua_event->obj != NULL) {
147 ustctl_release_object(sock, ua_event->obj);
148 free(ua_event->obj);
149 }
150 free(ua_event);
151 }
152
153 /*
154 * Delete ust app stream safely. RCU read lock must be held before calling
155 * this function.
156 */
157 static
158 void delete_ust_app_stream(int sock, struct ltt_ust_stream *stream)
159 {
160 if (stream->obj) {
161 ustctl_release_object(sock, stream->obj);
162 lttng_fd_put(LTTNG_FD_APPS, 2);
163 free(stream->obj);
164 }
165 free(stream);
166 }
167
168 /*
169 * Delete ust app channel safely. RCU read lock must be held before calling
170 * this function.
171 */
172 static
173 void delete_ust_app_channel(int sock, struct ust_app_channel *ua_chan)
174 {
175 int ret;
176 struct lttng_ht_iter iter;
177 struct ust_app_event *ua_event;
178 struct ust_app_ctx *ua_ctx;
179 struct ltt_ust_stream *stream, *stmp;
180
181 /* Wipe stream */
182 cds_list_for_each_entry_safe(stream, stmp, &ua_chan->streams.head, list) {
183 cds_list_del(&stream->list);
184 delete_ust_app_stream(sock, stream);
185 }
186
187 /* Wipe context */
188 cds_lfht_for_each_entry(ua_chan->ctx->ht, &iter.iter, ua_ctx, node.node) {
189 ret = lttng_ht_del(ua_chan->ctx, &iter);
190 assert(!ret);
191 delete_ust_app_ctx(sock, ua_ctx);
192 }
193 lttng_ht_destroy(ua_chan->ctx);
194
195 /* Wipe events */
196 cds_lfht_for_each_entry(ua_chan->events->ht, &iter.iter, ua_event,
197 node.node) {
198 ret = lttng_ht_del(ua_chan->events, &iter);
199 assert(!ret);
200 delete_ust_app_event(sock, ua_event);
201 }
202 lttng_ht_destroy(ua_chan->events);
203
204 if (ua_chan->obj != NULL) {
205 ustctl_release_object(sock, ua_chan->obj);
206 lttng_fd_put(LTTNG_FD_APPS, 2);
207 free(ua_chan->obj);
208 }
209 free(ua_chan);
210 }
211
212 /*
213 * Delete ust app session safely. RCU read lock must be held before calling
214 * this function.
215 */
216 static
217 void delete_ust_app_session(int sock, struct ust_app_session *ua_sess)
218 {
219 int ret;
220 struct lttng_ht_iter iter;
221 struct ust_app_channel *ua_chan;
222
223 if (ua_sess->metadata) {
224 if (ua_sess->metadata->stream_obj) {
225 ustctl_release_object(sock, ua_sess->metadata->stream_obj);
226 lttng_fd_put(LTTNG_FD_APPS, 2);
227 free(ua_sess->metadata->stream_obj);
228 }
229 if (ua_sess->metadata->obj) {
230 ustctl_release_object(sock, ua_sess->metadata->obj);
231 lttng_fd_put(LTTNG_FD_APPS, 2);
232 free(ua_sess->metadata->obj);
233 }
234 trace_ust_destroy_metadata(ua_sess->metadata);
235 }
236
237 cds_lfht_for_each_entry(ua_sess->channels->ht, &iter.iter, ua_chan,
238 node.node) {
239 ret = lttng_ht_del(ua_sess->channels, &iter);
240 assert(!ret);
241 delete_ust_app_channel(sock, ua_chan);
242 }
243 lttng_ht_destroy(ua_sess->channels);
244
245 if (ua_sess->handle != -1) {
246 ustctl_release_handle(sock, ua_sess->handle);
247 }
248 free(ua_sess);
249 }
250
251 /*
252 * Delete a traceable application structure from the global list. Never call
253 * this function outside of a call_rcu call.
254 */
255 static
256 void delete_ust_app(struct ust_app *app)
257 {
258 int ret, sock;
259 struct ust_app_session *ua_sess, *tmp_ua_sess;
260
261 rcu_read_lock();
262
263 /* Delete ust app sessions info */
264 sock = app->sock;
265 app->sock = -1;
266
267 lttng_ht_destroy(app->sessions);
268
269 /* Wipe sessions */
270 cds_list_for_each_entry_safe(ua_sess, tmp_ua_sess, &app->teardown_head,
271 teardown_node) {
272 /* Free every object in the session and the session. */
273 delete_ust_app_session(sock, ua_sess);
274 }
275
276 /*
277 * Wait until we have deleted the application from the sock hash table
278 * before closing this socket, otherwise an application could re-use the
279 * socket ID and race with the teardown, using the same hash table entry.
280 *
281 * It's OK to leave the close in call_rcu. We want it to stay unique for
282 * all RCU readers that could run concurrently with unregister app,
283 * therefore we _need_ to only close that socket after a grace period. So
284 * it should stay in this RCU callback.
285 *
286 * This close() is a very important step of the synchronization model so
287 * every modification to this function must be carefully reviewed.
288 */
289 ret = close(sock);
290 if (ret) {
291 PERROR("close");
292 }
293 lttng_fd_put(LTTNG_FD_APPS, 1);
294
295 DBG2("UST app pid %d deleted", app->pid);
296 free(app);
297
298 rcu_read_unlock();
299 }
300
301 /*
302 * URCU intermediate call to delete an UST app.
303 */
304 static
305 void delete_ust_app_rcu(struct rcu_head *head)
306 {
307 struct lttng_ht_node_ulong *node =
308 caa_container_of(head, struct lttng_ht_node_ulong, head);
309 struct ust_app *app =
310 caa_container_of(node, struct ust_app, pid_n);
311
312 DBG3("Call RCU deleting app PID %d", app->pid);
313 delete_ust_app(app);
314 }
315
316 /*
317 * Alloc new UST app session.
318 */
319 static
320 struct ust_app_session *alloc_ust_app_session(void)
321 {
322 struct ust_app_session *ua_sess;
323
324 /* Init most of the default value by allocating and zeroing */
325 ua_sess = zmalloc(sizeof(struct ust_app_session));
326 if (ua_sess == NULL) {
327 PERROR("malloc");
328 goto error;
329 }
330
331 ua_sess->handle = -1;
332 ua_sess->channels = lttng_ht_new(0, LTTNG_HT_TYPE_STRING);
333
334 return ua_sess;
335
336 error:
337 return NULL;
338 }
339
340 /*
341 * Alloc new UST app channel.
342 */
343 static
344 struct ust_app_channel *alloc_ust_app_channel(char *name,
345 struct lttng_ust_channel *attr)
346 {
347 struct ust_app_channel *ua_chan;
348
349 /* Init most of the default value by allocating and zeroing */
350 ua_chan = zmalloc(sizeof(struct ust_app_channel));
351 if (ua_chan == NULL) {
352 PERROR("malloc");
353 goto error;
354 }
355
356 /* Setup channel name */
357 strncpy(ua_chan->name, name, sizeof(ua_chan->name));
358 ua_chan->name[sizeof(ua_chan->name) - 1] = '\0';
359
360 ua_chan->enabled = 1;
361 ua_chan->handle = -1;
362 ua_chan->ctx = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
363 ua_chan->events = lttng_ht_new(0, LTTNG_HT_TYPE_STRING);
364 lttng_ht_node_init_str(&ua_chan->node, ua_chan->name);
365
366 CDS_INIT_LIST_HEAD(&ua_chan->streams.head);
367
368 /* Copy attributes */
369 if (attr) {
370 memcpy(&ua_chan->attr, attr, sizeof(ua_chan->attr));
371 }
372
373 DBG3("UST app channel %s allocated", ua_chan->name);
374
375 return ua_chan;
376
377 error:
378 return NULL;
379 }
380
381 /*
382 * Alloc new UST app event.
383 */
384 static
385 struct ust_app_event *alloc_ust_app_event(char *name,
386 struct lttng_ust_event *attr)
387 {
388 struct ust_app_event *ua_event;
389
390 /* Init most of the default value by allocating and zeroing */
391 ua_event = zmalloc(sizeof(struct ust_app_event));
392 if (ua_event == NULL) {
393 PERROR("malloc");
394 goto error;
395 }
396
397 ua_event->enabled = 1;
398 strncpy(ua_event->name, name, sizeof(ua_event->name));
399 ua_event->name[sizeof(ua_event->name) - 1] = '\0';
400 lttng_ht_node_init_str(&ua_event->node, ua_event->name);
401
402 /* Copy attributes */
403 if (attr) {
404 memcpy(&ua_event->attr, attr, sizeof(ua_event->attr));
405 }
406
407 DBG3("UST app event %s allocated", ua_event->name);
408
409 return ua_event;
410
411 error:
412 return NULL;
413 }
414
415 /*
416 * Alloc new UST app context.
417 */
418 static
419 struct ust_app_ctx *alloc_ust_app_ctx(struct lttng_ust_context *uctx)
420 {
421 struct ust_app_ctx *ua_ctx;
422
423 ua_ctx = zmalloc(sizeof(struct ust_app_ctx));
424 if (ua_ctx == NULL) {
425 goto error;
426 }
427
428 if (uctx) {
429 memcpy(&ua_ctx->ctx, uctx, sizeof(ua_ctx->ctx));
430 }
431
432 DBG3("UST app context %d allocated", ua_ctx->ctx.ctx);
433
434 error:
435 return ua_ctx;
436 }
437
438 /*
439 * Allocate a filter and copy the given original filter.
440 *
441 * Return allocated filter or NULL on error.
442 */
443 static struct lttng_ust_filter_bytecode *alloc_copy_ust_app_filter(
444 struct lttng_ust_filter_bytecode *orig_f)
445 {
446 struct lttng_ust_filter_bytecode *filter = NULL;
447
448 /* Copy filter bytecode */
449 filter = zmalloc(sizeof(*filter) + orig_f->len);
450 if (!filter) {
451 PERROR("zmalloc alloc ust app filter");
452 goto error;
453 }
454
455 memcpy(filter, orig_f, sizeof(*filter) + orig_f->len);
456
457 error:
458 return filter;
459 }
460
461 /*
462 * Find an ust_app using the sock and return it. RCU read side lock must be
463 * held before calling this helper function.
464 */
465 static
466 struct ust_app *find_app_by_sock(int sock)
467 {
468 struct lttng_ht_node_ulong *node;
469 struct lttng_ht_iter iter;
470
471 lttng_ht_lookup(ust_app_ht_by_sock, (void *)((unsigned long) sock), &iter);
472 node = lttng_ht_iter_get_node_ulong(&iter);
473 if (node == NULL) {
474 DBG2("UST app find by sock %d not found", sock);
475 goto error;
476 }
477
478 return caa_container_of(node, struct ust_app, sock_n);
479
480 error:
481 return NULL;
482 }
483
484 /*
485 * Lookup for an ust app event based on event name, filter bytecode and the
486 * event loglevel.
487 *
488 * Return an ust_app_event object or NULL on error.
489 */
490 static struct ust_app_event *find_ust_app_event(struct lttng_ht *ht,
491 char *name, struct lttng_ust_filter_bytecode *filter, int loglevel)
492 {
493 struct lttng_ht_iter iter;
494 struct lttng_ht_node_str *node;
495 struct ust_app_event *event = NULL;
496 struct ust_app_ht_key key;
497
498 assert(name);
499 assert(ht);
500
501 /* Setup key for event lookup. */
502 key.name = name;
503 key.filter = filter;
504 key.loglevel = loglevel;
505
506 /* Lookup using the event name as hash and a custom match fct. */
507 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) name, lttng_ht_seed),
508 ht_match_ust_app_event, &key, &iter.iter);
509 node = lttng_ht_iter_get_node_str(&iter);
510 if (node == NULL) {
511 goto end;
512 }
513
514 event = caa_container_of(node, struct ust_app_event, node);
515
516 end:
517 return event;
518 }
519
520 /*
521 * Create the channel context on the tracer.
522 */
523 static
524 int create_ust_channel_context(struct ust_app_channel *ua_chan,
525 struct ust_app_ctx *ua_ctx, struct ust_app *app)
526 {
527 int ret;
528
529 health_code_update(&health_thread_cmd);
530
531 ret = ustctl_add_context(app->sock, &ua_ctx->ctx,
532 ua_chan->obj, &ua_ctx->obj);
533 if (ret < 0) {
534 goto error;
535 }
536
537 ua_ctx->handle = ua_ctx->obj->handle;
538
539 DBG2("UST app context created successfully for channel %s", ua_chan->name);
540
541 error:
542 health_code_update(&health_thread_cmd);
543 return ret;
544 }
545
546 /*
547 * Set the filter on the tracer.
548 */
549 static
550 int set_ust_event_filter(struct ust_app_event *ua_event,
551 struct ust_app *app)
552 {
553 int ret;
554
555 health_code_update(&health_thread_cmd);
556
557 if (!ua_event->filter) {
558 ret = 0;
559 goto error;
560 }
561
562 ret = ustctl_set_filter(app->sock, ua_event->filter,
563 ua_event->obj);
564 if (ret < 0) {
565 goto error;
566 }
567
568 DBG2("UST filter set successfully for event %s", ua_event->name);
569
570 error:
571 health_code_update(&health_thread_cmd);
572 return ret;
573 }
574
575 /*
576 * Disable the specified event on to UST tracer for the UST session.
577 */
578 static int disable_ust_event(struct ust_app *app,
579 struct ust_app_session *ua_sess, struct ust_app_event *ua_event)
580 {
581 int ret;
582
583 health_code_update(&health_thread_cmd);
584
585 ret = ustctl_disable(app->sock, ua_event->obj);
586 if (ret < 0) {
587 ERR("UST app event %s disable failed for app (pid: %d) "
588 "and session handle %d with ret %d",
589 ua_event->attr.name, app->pid, ua_sess->handle, ret);
590 goto error;
591 }
592
593 DBG2("UST app event %s disabled successfully for app (pid: %d)",
594 ua_event->attr.name, app->pid);
595
596 error:
597 health_code_update(&health_thread_cmd);
598 return ret;
599 }
600
601 /*
602 * Disable the specified channel on to UST tracer for the UST session.
603 */
604 static int disable_ust_channel(struct ust_app *app,
605 struct ust_app_session *ua_sess, struct ust_app_channel *ua_chan)
606 {
607 int ret;
608
609 health_code_update(&health_thread_cmd);
610
611 ret = ustctl_disable(app->sock, ua_chan->obj);
612 if (ret < 0) {
613 ERR("UST app channel %s disable failed for app (pid: %d) "
614 "and session handle %d with ret %d",
615 ua_chan->name, app->pid, ua_sess->handle, ret);
616 goto error;
617 }
618
619 DBG2("UST app channel %s disabled successfully for app (pid: %d)",
620 ua_chan->name, app->pid);
621
622 error:
623 health_code_update(&health_thread_cmd);
624 return ret;
625 }
626
627 /*
628 * Enable the specified channel on to UST tracer for the UST session.
629 */
630 static int enable_ust_channel(struct ust_app *app,
631 struct ust_app_session *ua_sess, struct ust_app_channel *ua_chan)
632 {
633 int ret;
634
635 health_code_update(&health_thread_cmd);
636
637 ret = ustctl_enable(app->sock, ua_chan->obj);
638 if (ret < 0) {
639 ERR("UST app channel %s enable failed for app (pid: %d) "
640 "and session handle %d with ret %d",
641 ua_chan->name, app->pid, ua_sess->handle, ret);
642 goto error;
643 }
644
645 ua_chan->enabled = 1;
646
647 DBG2("UST app channel %s enabled successfully for app (pid: %d)",
648 ua_chan->name, app->pid);
649
650 error:
651 health_code_update(&health_thread_cmd);
652 return ret;
653 }
654
655 /*
656 * Enable the specified event on to UST tracer for the UST session.
657 */
658 static int enable_ust_event(struct ust_app *app,
659 struct ust_app_session *ua_sess, struct ust_app_event *ua_event)
660 {
661 int ret;
662
663 health_code_update(&health_thread_cmd);
664
665 ret = ustctl_enable(app->sock, ua_event->obj);
666 if (ret < 0) {
667 ERR("UST app event %s enable failed for app (pid: %d) "
668 "and session handle %d with ret %d",
669 ua_event->attr.name, app->pid, ua_sess->handle, ret);
670 goto error;
671 }
672
673 DBG2("UST app event %s enabled successfully for app (pid: %d)",
674 ua_event->attr.name, app->pid);
675
676 error:
677 health_code_update(&health_thread_cmd);
678 return ret;
679 }
680
681 /*
682 * Open metadata onto the UST tracer for a UST session.
683 */
684 static int open_ust_metadata(struct ust_app *app,
685 struct ust_app_session *ua_sess)
686 {
687 int ret;
688 struct lttng_ust_channel_attr uattr;
689
690 health_code_update(&health_thread_cmd);
691
692 uattr.overwrite = ua_sess->metadata->attr.overwrite;
693 uattr.subbuf_size = ua_sess->metadata->attr.subbuf_size;
694 uattr.num_subbuf = ua_sess->metadata->attr.num_subbuf;
695 uattr.switch_timer_interval =
696 ua_sess->metadata->attr.switch_timer_interval;
697 uattr.read_timer_interval =
698 ua_sess->metadata->attr.read_timer_interval;
699 uattr.output = ua_sess->metadata->attr.output;
700
701 /* We are going to receive 2 fds, we need to reserve them. */
702 ret = lttng_fd_get(LTTNG_FD_APPS, 2);
703 if (ret < 0) {
704 ERR("Exhausted number of available FD upon metadata open");
705 goto error;
706 }
707 /* UST tracer metadata creation */
708 ret = ustctl_open_metadata(app->sock, ua_sess->handle, &uattr,
709 &ua_sess->metadata->obj);
710 if (ret < 0) {
711 ERR("UST app open metadata failed for app pid:%d with ret %d",
712 app->pid, ret);
713 goto error;
714 }
715
716 ua_sess->metadata->handle = ua_sess->metadata->obj->handle;
717
718 error:
719 health_code_update(&health_thread_cmd);
720 return ret;
721 }
722
723 /*
724 * Create stream onto the UST tracer for a UST session.
725 */
726 static int create_ust_stream(struct ust_app *app,
727 struct ust_app_session *ua_sess)
728 {
729 int ret;
730
731 health_code_update(&health_thread_cmd);
732
733 /* We are going to receive 2 fds, we need to reserve them. */
734 ret = lttng_fd_get(LTTNG_FD_APPS, 2);
735 if (ret < 0) {
736 ERR("Exhausted number of available FD upon metadata stream create");
737 goto error;
738 }
739 ret = ustctl_create_stream(app->sock, ua_sess->metadata->obj,
740 &ua_sess->metadata->stream_obj);
741 if (ret < 0) {
742 ERR("UST create metadata stream failed");
743 goto error;
744 }
745
746 error:
747 health_code_update(&health_thread_cmd);
748 return ret;
749 }
750
751 /*
752 * Create the specified channel onto the UST tracer for a UST session.
753 */
754 static int create_ust_channel(struct ust_app *app,
755 struct ust_app_session *ua_sess, struct ust_app_channel *ua_chan)
756 {
757 int ret;
758
759 health_code_update(&health_thread_cmd);
760
761 /* TODO: remove cast and use lttng-ust-abi.h */
762
763 /* We are going to receive 2 fds, we need to reserve them. */
764 ret = lttng_fd_get(LTTNG_FD_APPS, 2);
765 if (ret < 0) {
766 ERR("Exhausted number of available FD upon create channel");
767 goto error;
768 }
769
770 health_code_update(&health_thread_cmd);
771
772 ret = ustctl_create_channel(app->sock, ua_sess->handle,
773 (struct lttng_ust_channel_attr *)&ua_chan->attr, &ua_chan->obj);
774 if (ret < 0) {
775 ERR("Creating channel %s for app (pid: %d, sock: %d) "
776 "and session handle %d with ret %d",
777 ua_chan->name, app->pid, app->sock,
778 ua_sess->handle, ret);
779 lttng_fd_put(LTTNG_FD_APPS, 2);
780 goto error;
781 }
782
783 ua_chan->handle = ua_chan->obj->handle;
784
785 DBG2("UST app channel %s created successfully for pid:%d and sock:%d",
786 ua_chan->name, app->pid, app->sock);
787
788 health_code_update(&health_thread_cmd);
789
790 /* If channel is not enabled, disable it on the tracer */
791 if (!ua_chan->enabled) {
792 ret = disable_ust_channel(app, ua_sess, ua_chan);
793 if (ret < 0) {
794 goto error;
795 }
796 }
797
798 error:
799 health_code_update(&health_thread_cmd);
800 return ret;
801 }
802
803 /*
804 * Create the specified event onto the UST tracer for a UST session.
805 */
806 static
807 int create_ust_event(struct ust_app *app, struct ust_app_session *ua_sess,
808 struct ust_app_channel *ua_chan, struct ust_app_event *ua_event)
809 {
810 int ret = 0;
811
812 health_code_update(&health_thread_cmd);
813
814 /* Create UST event on tracer */
815 ret = ustctl_create_event(app->sock, &ua_event->attr, ua_chan->obj,
816 &ua_event->obj);
817 if (ret < 0) {
818 ERR("Error ustctl create event %s for app pid: %d with ret %d",
819 ua_event->attr.name, app->pid, ret);
820 goto error;
821 }
822
823 ua_event->handle = ua_event->obj->handle;
824
825 DBG2("UST app event %s created successfully for pid:%d",
826 ua_event->attr.name, app->pid);
827
828 health_code_update(&health_thread_cmd);
829
830 /* Set filter if one is present. */
831 if (ua_event->filter) {
832 ret = set_ust_event_filter(ua_event, app);
833 if (ret < 0) {
834 goto error;
835 }
836 }
837
838 /* If event not enabled, disable it on the tracer */
839 if (ua_event->enabled == 0) {
840 ret = disable_ust_event(app, ua_sess, ua_event);
841 if (ret < 0) {
842 /*
843 * If we hit an EPERM, something is wrong with our disable call. If
844 * we get an EEXIST, there is a problem on the tracer side since we
845 * just created it.
846 */
847 switch (ret) {
848 case -LTTNG_UST_ERR_PERM:
849 /* Code flow problem */
850 assert(0);
851 case -LTTNG_UST_ERR_EXIST:
852 /* It's OK for our use case. */
853 ret = 0;
854 break;
855 default:
856 break;
857 }
858 goto error;
859 }
860 }
861
862 error:
863 health_code_update(&health_thread_cmd);
864 return ret;
865 }
866
867 /*
868 * Copy data between an UST app event and a LTT event.
869 */
870 static void shadow_copy_event(struct ust_app_event *ua_event,
871 struct ltt_ust_event *uevent)
872 {
873 strncpy(ua_event->name, uevent->attr.name, sizeof(ua_event->name));
874 ua_event->name[sizeof(ua_event->name) - 1] = '\0';
875
876 ua_event->enabled = uevent->enabled;
877
878 /* Copy event attributes */
879 memcpy(&ua_event->attr, &uevent->attr, sizeof(ua_event->attr));
880
881 /* Copy filter bytecode */
882 if (uevent->filter) {
883 ua_event->filter = alloc_copy_ust_app_filter(uevent->filter);
884 /* Filter might be NULL here in case of ENONEM. */
885 }
886 }
887
888 /*
889 * Copy data between an UST app channel and a LTT channel.
890 */
891 static void shadow_copy_channel(struct ust_app_channel *ua_chan,
892 struct ltt_ust_channel *uchan)
893 {
894 struct lttng_ht_iter iter;
895 struct ltt_ust_event *uevent;
896 struct ltt_ust_context *uctx;
897 struct ust_app_event *ua_event;
898 struct ust_app_ctx *ua_ctx;
899
900 DBG2("UST app shadow copy of channel %s started", ua_chan->name);
901
902 strncpy(ua_chan->name, uchan->name, sizeof(ua_chan->name));
903 ua_chan->name[sizeof(ua_chan->name) - 1] = '\0';
904 /* Copy event attributes */
905 memcpy(&ua_chan->attr, &uchan->attr, sizeof(ua_chan->attr));
906
907 ua_chan->enabled = uchan->enabled;
908
909 cds_lfht_for_each_entry(uchan->ctx->ht, &iter.iter, uctx, node.node) {
910 ua_ctx = alloc_ust_app_ctx(&uctx->ctx);
911 if (ua_ctx == NULL) {
912 continue;
913 }
914 lttng_ht_node_init_ulong(&ua_ctx->node,
915 (unsigned long) ua_ctx->ctx.ctx);
916 lttng_ht_add_unique_ulong(ua_chan->ctx, &ua_ctx->node);
917 }
918
919 /* Copy all events from ltt ust channel to ust app channel */
920 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent, node.node) {
921 ua_event = find_ust_app_event(ua_chan->events, uevent->attr.name,
922 uevent->filter, uevent->attr.loglevel);
923 if (ua_event == NULL) {
924 DBG2("UST event %s not found on shadow copy channel",
925 uevent->attr.name);
926 ua_event = alloc_ust_app_event(uevent->attr.name, &uevent->attr);
927 if (ua_event == NULL) {
928 continue;
929 }
930 shadow_copy_event(ua_event, uevent);
931 add_unique_ust_app_event(ua_chan->events, ua_event);
932 }
933 }
934
935 DBG3("UST app shadow copy of channel %s done", ua_chan->name);
936 }
937
938 /*
939 * Copy data between a UST app session and a regular LTT session.
940 */
941 static void shadow_copy_session(struct ust_app_session *ua_sess,
942 struct ltt_ust_session *usess, struct ust_app *app)
943 {
944 struct lttng_ht_node_str *ua_chan_node;
945 struct lttng_ht_iter iter;
946 struct ltt_ust_channel *uchan;
947 struct ust_app_channel *ua_chan;
948 time_t rawtime;
949 struct tm *timeinfo;
950 char datetime[16];
951 int ret;
952
953 /* Get date and time for unique app path */
954 time(&rawtime);
955 timeinfo = localtime(&rawtime);
956 strftime(datetime, sizeof(datetime), "%Y%m%d-%H%M%S", timeinfo);
957
958 DBG2("Shadow copy of session handle %d", ua_sess->handle);
959
960 ua_sess->id = usess->id;
961 ua_sess->uid = usess->uid;
962 ua_sess->gid = usess->gid;
963
964 ret = snprintf(ua_sess->path, PATH_MAX, "%s-%d-%s/", app->name, app->pid,
965 datetime);
966 if (ret < 0) {
967 PERROR("asprintf UST shadow copy session");
968 /* TODO: We cannot return an error from here.. */
969 assert(0);
970 }
971
972 /* TODO: support all UST domain */
973
974 /* Iterate over all channels in global domain. */
975 cds_lfht_for_each_entry(usess->domain_global.channels->ht, &iter.iter,
976 uchan, node.node) {
977 struct lttng_ht_iter uiter;
978
979 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
980 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
981 if (ua_chan_node != NULL) {
982 /* Session exist. Contiuing. */
983 continue;
984 }
985
986 DBG2("Channel %s not found on shadow session copy, creating it",
987 uchan->name);
988 ua_chan = alloc_ust_app_channel(uchan->name, &uchan->attr);
989 if (ua_chan == NULL) {
990 /* malloc failed FIXME: Might want to do handle ENOMEM .. */
991 continue;
992 }
993
994 shadow_copy_channel(ua_chan, uchan);
995 lttng_ht_add_unique_str(ua_sess->channels, &ua_chan->node);
996 }
997 }
998
999 /*
1000 * Lookup sesison wrapper.
1001 */
1002 static
1003 void __lookup_session_by_app(struct ltt_ust_session *usess,
1004 struct ust_app *app, struct lttng_ht_iter *iter)
1005 {
1006 /* Get right UST app session from app */
1007 lttng_ht_lookup(app->sessions, (void *)((unsigned long) usess->id), iter);
1008 }
1009
1010 /*
1011 * Return ust app session from the app session hashtable using the UST session
1012 * id.
1013 */
1014 static struct ust_app_session *lookup_session_by_app(
1015 struct ltt_ust_session *usess, struct ust_app *app)
1016 {
1017 struct lttng_ht_iter iter;
1018 struct lttng_ht_node_ulong *node;
1019
1020 __lookup_session_by_app(usess, app, &iter);
1021 node = lttng_ht_iter_get_node_ulong(&iter);
1022 if (node == NULL) {
1023 goto error;
1024 }
1025
1026 return caa_container_of(node, struct ust_app_session, node);
1027
1028 error:
1029 return NULL;
1030 }
1031
1032 /*
1033 * Create a UST session onto the tracer of app and add it the session
1034 * hashtable.
1035 *
1036 * Return ust app session or NULL on error.
1037 */
1038 static struct ust_app_session *create_ust_app_session(
1039 struct ltt_ust_session *usess, struct ust_app *app)
1040 {
1041 int ret;
1042 struct ust_app_session *ua_sess;
1043
1044 health_code_update(&health_thread_cmd);
1045
1046 ua_sess = lookup_session_by_app(usess, app);
1047 if (ua_sess == NULL) {
1048 DBG2("UST app pid: %d session id %d not found, creating it",
1049 app->pid, usess->id);
1050 ua_sess = alloc_ust_app_session();
1051 if (ua_sess == NULL) {
1052 /* Only malloc can failed so something is really wrong */
1053 goto end;
1054 }
1055 shadow_copy_session(ua_sess, usess, app);
1056 }
1057
1058 health_code_update(&health_thread_cmd);
1059
1060 if (ua_sess->handle == -1) {
1061 ret = ustctl_create_session(app->sock);
1062 if (ret < 0) {
1063 ERR("Creating session for app pid %d", app->pid);
1064 delete_ust_app_session(-1, ua_sess);
1065 /* This means that the tracer is gone... */
1066 ua_sess = (void*) -1UL;
1067 goto end;
1068 }
1069
1070 ua_sess->handle = ret;
1071
1072 /* Add ust app session to app's HT */
1073 lttng_ht_node_init_ulong(&ua_sess->node, (unsigned long) ua_sess->id);
1074 lttng_ht_add_unique_ulong(app->sessions, &ua_sess->node);
1075
1076 DBG2("UST app session created successfully with handle %d", ret);
1077 }
1078
1079 end:
1080 health_code_update(&health_thread_cmd);
1081 return ua_sess;
1082 }
1083
1084 /*
1085 * Create a context for the channel on the tracer.
1086 */
1087 static
1088 int create_ust_app_channel_context(struct ust_app_session *ua_sess,
1089 struct ust_app_channel *ua_chan, struct lttng_ust_context *uctx,
1090 struct ust_app *app)
1091 {
1092 int ret = 0;
1093 struct lttng_ht_iter iter;
1094 struct lttng_ht_node_ulong *node;
1095 struct ust_app_ctx *ua_ctx;
1096
1097 DBG2("UST app adding context to channel %s", ua_chan->name);
1098
1099 lttng_ht_lookup(ua_chan->ctx, (void *)((unsigned long)uctx->ctx), &iter);
1100 node = lttng_ht_iter_get_node_ulong(&iter);
1101 if (node != NULL) {
1102 ret = -EEXIST;
1103 goto error;
1104 }
1105
1106 ua_ctx = alloc_ust_app_ctx(uctx);
1107 if (ua_ctx == NULL) {
1108 /* malloc failed */
1109 ret = -1;
1110 goto error;
1111 }
1112
1113 lttng_ht_node_init_ulong(&ua_ctx->node, (unsigned long) ua_ctx->ctx.ctx);
1114 lttng_ht_add_unique_ulong(ua_chan->ctx, &ua_ctx->node);
1115
1116 ret = create_ust_channel_context(ua_chan, ua_ctx, app);
1117 if (ret < 0) {
1118 goto error;
1119 }
1120
1121 error:
1122 return ret;
1123 }
1124
1125 /*
1126 * Enable on the tracer side a ust app event for the session and channel.
1127 */
1128 static
1129 int enable_ust_app_event(struct ust_app_session *ua_sess,
1130 struct ust_app_event *ua_event, struct ust_app *app)
1131 {
1132 int ret;
1133
1134 ret = enable_ust_event(app, ua_sess, ua_event);
1135 if (ret < 0) {
1136 goto error;
1137 }
1138
1139 ua_event->enabled = 1;
1140
1141 error:
1142 return ret;
1143 }
1144
1145 /*
1146 * Disable on the tracer side a ust app event for the session and channel.
1147 */
1148 static int disable_ust_app_event(struct ust_app_session *ua_sess,
1149 struct ust_app_event *ua_event, struct ust_app *app)
1150 {
1151 int ret;
1152
1153 ret = disable_ust_event(app, ua_sess, ua_event);
1154 if (ret < 0) {
1155 goto error;
1156 }
1157
1158 ua_event->enabled = 0;
1159
1160 error:
1161 return ret;
1162 }
1163
1164 /*
1165 * Lookup ust app channel for session and disable it on the tracer side.
1166 */
1167 static
1168 int disable_ust_app_channel(struct ust_app_session *ua_sess,
1169 struct ust_app_channel *ua_chan, struct ust_app *app)
1170 {
1171 int ret;
1172
1173 ret = disable_ust_channel(app, ua_sess, ua_chan);
1174 if (ret < 0) {
1175 goto error;
1176 }
1177
1178 ua_chan->enabled = 0;
1179
1180 error:
1181 return ret;
1182 }
1183
1184 /*
1185 * Lookup ust app channel for session and enable it on the tracer side.
1186 */
1187 static int enable_ust_app_channel(struct ust_app_session *ua_sess,
1188 struct ltt_ust_channel *uchan, struct ust_app *app)
1189 {
1190 int ret = 0;
1191 struct lttng_ht_iter iter;
1192 struct lttng_ht_node_str *ua_chan_node;
1193 struct ust_app_channel *ua_chan;
1194
1195 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &iter);
1196 ua_chan_node = lttng_ht_iter_get_node_str(&iter);
1197 if (ua_chan_node == NULL) {
1198 DBG2("Unable to find channel %s in ust session id %u",
1199 uchan->name, ua_sess->id);
1200 goto error;
1201 }
1202
1203 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1204
1205 ret = enable_ust_channel(app, ua_sess, ua_chan);
1206 if (ret < 0) {
1207 goto error;
1208 }
1209
1210 error:
1211 return ret;
1212 }
1213
1214 /*
1215 * Create UST app channel and create it on the tracer.
1216 */
1217 static struct ust_app_channel *create_ust_app_channel(
1218 struct ust_app_session *ua_sess, struct ltt_ust_channel *uchan,
1219 struct ust_app *app)
1220 {
1221 int ret = 0;
1222 struct lttng_ht_iter iter;
1223 struct lttng_ht_node_str *ua_chan_node;
1224 struct ust_app_channel *ua_chan;
1225
1226 /* Lookup channel in the ust app session */
1227 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &iter);
1228 ua_chan_node = lttng_ht_iter_get_node_str(&iter);
1229 if (ua_chan_node != NULL) {
1230 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1231 goto end;
1232 }
1233
1234 ua_chan = alloc_ust_app_channel(uchan->name, &uchan->attr);
1235 if (ua_chan == NULL) {
1236 /* Only malloc can fail here */
1237 goto error;
1238 }
1239 shadow_copy_channel(ua_chan, uchan);
1240
1241 ret = create_ust_channel(app, ua_sess, ua_chan);
1242 if (ret < 0) {
1243 /* Not found previously means that it does not exist on the tracer */
1244 assert(ret != -LTTNG_UST_ERR_EXIST);
1245 goto error;
1246 }
1247
1248 lttng_ht_add_unique_str(ua_sess->channels, &ua_chan->node);
1249
1250 DBG2("UST app create channel %s for PID %d completed", ua_chan->name,
1251 app->pid);
1252
1253 end:
1254 return ua_chan;
1255
1256 error:
1257 delete_ust_app_channel(-1, ua_chan);
1258 return NULL;
1259 }
1260
1261 /*
1262 * Create UST app event and create it on the tracer side.
1263 */
1264 static
1265 int create_ust_app_event(struct ust_app_session *ua_sess,
1266 struct ust_app_channel *ua_chan, struct ltt_ust_event *uevent,
1267 struct ust_app *app)
1268 {
1269 int ret = 0;
1270 struct ust_app_event *ua_event;
1271
1272 /* Get event node */
1273 ua_event = find_ust_app_event(ua_chan->events, uevent->attr.name,
1274 uevent->filter, uevent->attr.loglevel);
1275 if (ua_event != NULL) {
1276 ret = -EEXIST;
1277 goto end;
1278 }
1279
1280 /* Does not exist so create one */
1281 ua_event = alloc_ust_app_event(uevent->attr.name, &uevent->attr);
1282 if (ua_event == NULL) {
1283 /* Only malloc can failed so something is really wrong */
1284 ret = -ENOMEM;
1285 goto end;
1286 }
1287 shadow_copy_event(ua_event, uevent);
1288
1289 /* Create it on the tracer side */
1290 ret = create_ust_event(app, ua_sess, ua_chan, ua_event);
1291 if (ret < 0) {
1292 /* Not found previously means that it does not exist on the tracer */
1293 assert(ret != -LTTNG_UST_ERR_EXIST);
1294 goto error;
1295 }
1296
1297 add_unique_ust_app_event(ua_chan->events, ua_event);
1298
1299 DBG2("UST app create event %s for PID %d completed", ua_event->name,
1300 app->pid);
1301
1302 end:
1303 return ret;
1304
1305 error:
1306 /* Valid. Calling here is already in a read side lock */
1307 delete_ust_app_event(-1, ua_event);
1308 return ret;
1309 }
1310
1311 /*
1312 * Create UST metadata and open it on the tracer side.
1313 */
1314 static int create_ust_app_metadata(struct ust_app_session *ua_sess,
1315 char *pathname, struct ust_app *app)
1316 {
1317 int ret = 0;
1318
1319 if (ua_sess->metadata == NULL) {
1320 /* Allocate UST metadata */
1321 ua_sess->metadata = trace_ust_create_metadata(pathname);
1322 if (ua_sess->metadata == NULL) {
1323 /* malloc() failed */
1324 goto error;
1325 }
1326
1327 ret = open_ust_metadata(app, ua_sess);
1328 if (ret < 0) {
1329 DBG3("Opening metadata failed. Cleaning up memory");
1330
1331 /* Cleanup failed metadata struct */
1332 free(ua_sess->metadata);
1333 /*
1334 * This is very important because delete_ust_app_session check if
1335 * the pointer is null or not in order to delete the metadata.
1336 */
1337 ua_sess->metadata = NULL;
1338 goto error;
1339 }
1340
1341 DBG2("UST metadata opened for app pid %d", app->pid);
1342 }
1343
1344 /* Open UST metadata stream */
1345 if (ua_sess->metadata->stream_obj == NULL) {
1346 ret = create_ust_stream(app, ua_sess);
1347 if (ret < 0) {
1348 goto error;
1349 }
1350
1351 ret = snprintf(ua_sess->metadata->pathname, PATH_MAX,
1352 "%s/metadata", ua_sess->path);
1353 if (ret < 0) {
1354 PERROR("asprintf UST create stream");
1355 goto error;
1356 }
1357
1358 DBG2("UST metadata stream object created for app pid %d",
1359 app->pid);
1360 } else {
1361 ERR("Attempting to create stream without metadata opened");
1362 goto error;
1363 }
1364
1365 return 0;
1366
1367 error:
1368 return -1;
1369 }
1370
1371 /*
1372 * Return pointer to traceable apps list.
1373 */
1374 struct lttng_ht *ust_app_get_ht(void)
1375 {
1376 return ust_app_ht;
1377 }
1378
1379 /*
1380 * Return ust app pointer or NULL if not found.
1381 */
1382 struct ust_app *ust_app_find_by_pid(pid_t pid)
1383 {
1384 struct lttng_ht_node_ulong *node;
1385 struct lttng_ht_iter iter;
1386
1387 rcu_read_lock();
1388 lttng_ht_lookup(ust_app_ht, (void *)((unsigned long) pid), &iter);
1389 node = lttng_ht_iter_get_node_ulong(&iter);
1390 if (node == NULL) {
1391 DBG2("UST app no found with pid %d", pid);
1392 goto error;
1393 }
1394 rcu_read_unlock();
1395
1396 DBG2("Found UST app by pid %d", pid);
1397
1398 return caa_container_of(node, struct ust_app, pid_n);
1399
1400 error:
1401 rcu_read_unlock();
1402 return NULL;
1403 }
1404
1405 /*
1406 * Using pid and uid (of the app), allocate a new ust_app struct and
1407 * add it to the global traceable app list.
1408 *
1409 * On success, return 0, else return malloc -ENOMEM, or -EINVAL if app
1410 * bitness is not supported.
1411 */
1412 int ust_app_register(struct ust_register_msg *msg, int sock)
1413 {
1414 struct ust_app *lta;
1415 int ret;
1416
1417 if ((msg->bits_per_long == 64 &&
1418 (uatomic_read(&ust_consumerd64_fd) == -EINVAL))
1419 || (msg->bits_per_long == 32 &&
1420 (uatomic_read(&ust_consumerd32_fd) == -EINVAL))) {
1421 ERR("Registration failed: application \"%s\" (pid: %d) has "
1422 "%d-bit long, but no consumerd for this long size is available.\n",
1423 msg->name, msg->pid, msg->bits_per_long);
1424 ret = close(sock);
1425 if (ret) {
1426 PERROR("close");
1427 }
1428 lttng_fd_put(LTTNG_FD_APPS, 1);
1429 return -EINVAL;
1430 }
1431 if (msg->major != LTTNG_UST_COMM_MAJOR) {
1432 ERR("Registration failed: application \"%s\" (pid: %d) has "
1433 "communication protocol version %u.%u, but sessiond supports 2.x.\n",
1434 msg->name, msg->pid, msg->major, msg->minor);
1435 ret = close(sock);
1436 if (ret) {
1437 PERROR("close");
1438 }
1439 lttng_fd_put(LTTNG_FD_APPS, 1);
1440 return -EINVAL;
1441 }
1442 lta = zmalloc(sizeof(struct ust_app));
1443 if (lta == NULL) {
1444 PERROR("malloc");
1445 return -ENOMEM;
1446 }
1447
1448 lta->ppid = msg->ppid;
1449 lta->uid = msg->uid;
1450 lta->gid = msg->gid;
1451 lta->compatible = 0; /* Not compatible until proven */
1452 lta->bits_per_long = msg->bits_per_long;
1453 lta->v_major = msg->major;
1454 lta->v_minor = msg->minor;
1455 strncpy(lta->name, msg->name, sizeof(lta->name));
1456 lta->name[16] = '\0';
1457 lta->sessions = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
1458
1459 lta->pid = msg->pid;
1460 lttng_ht_node_init_ulong(&lta->pid_n, (unsigned long)lta->pid);
1461 lta->sock = sock;
1462 lttng_ht_node_init_ulong(&lta->sock_n, (unsigned long)lta->sock);
1463
1464 CDS_INIT_LIST_HEAD(&lta->teardown_head);
1465
1466 rcu_read_lock();
1467
1468 /*
1469 * On a re-registration, we want to kick out the previous registration of
1470 * that pid
1471 */
1472 lttng_ht_add_replace_ulong(ust_app_ht, &lta->pid_n);
1473
1474 /*
1475 * The socket _should_ be unique until _we_ call close. So, a add_unique
1476 * for the ust_app_ht_by_sock is used which asserts fail if the entry was
1477 * already in the table.
1478 */
1479 lttng_ht_add_unique_ulong(ust_app_ht_by_sock, &lta->sock_n);
1480
1481 rcu_read_unlock();
1482
1483 DBG("App registered with pid:%d ppid:%d uid:%d gid:%d sock:%d name:%s"
1484 " (version %d.%d)", lta->pid, lta->ppid, lta->uid, lta->gid,
1485 lta->sock, lta->name, lta->v_major, lta->v_minor);
1486
1487 return 0;
1488 }
1489
1490 /*
1491 * Unregister app by removing it from the global traceable app list and freeing
1492 * the data struct.
1493 *
1494 * The socket is already closed at this point so no close to sock.
1495 */
1496 void ust_app_unregister(int sock)
1497 {
1498 struct ust_app *lta;
1499 struct lttng_ht_node_ulong *node;
1500 struct lttng_ht_iter iter;
1501 struct ust_app_session *ua_sess;
1502 int ret;
1503
1504 rcu_read_lock();
1505
1506 /* Get the node reference for a call_rcu */
1507 lttng_ht_lookup(ust_app_ht_by_sock, (void *)((unsigned long) sock), &iter);
1508 node = lttng_ht_iter_get_node_ulong(&iter);
1509 if (node == NULL) {
1510 ERR("Unable to find app by sock %d", sock);
1511 goto error;
1512 }
1513
1514 lta = caa_container_of(node, struct ust_app, sock_n);
1515
1516 DBG("PID %d unregistering with sock %d", lta->pid, sock);
1517
1518 /* Remove application from PID hash table */
1519 ret = lttng_ht_del(ust_app_ht_by_sock, &iter);
1520 assert(!ret);
1521
1522 /* Assign second node for deletion */
1523 iter.iter.node = &lta->pid_n.node;
1524
1525 /*
1526 * Ignore return value since the node might have been removed before by an
1527 * add replace during app registration because the PID can be reassigned by
1528 * the OS.
1529 */
1530 ret = lttng_ht_del(ust_app_ht, &iter);
1531 if (ret) {
1532 DBG3("Unregister app by PID %d failed. This can happen on pid reuse",
1533 lta->pid);
1534 }
1535
1536 /* Remove sessions so they are not visible during deletion.*/
1537 cds_lfht_for_each_entry(lta->sessions->ht, &iter.iter, ua_sess,
1538 node.node) {
1539 ret = lttng_ht_del(lta->sessions, &iter);
1540 if (ret) {
1541 /* The session was already removed so scheduled for teardown. */
1542 continue;
1543 }
1544
1545 /*
1546 * Add session to list for teardown. This is safe since at this point we
1547 * are the only one using this list.
1548 */
1549 cds_list_add(&ua_sess->teardown_node, &lta->teardown_head);
1550 }
1551
1552 /* Free memory */
1553 call_rcu(&lta->pid_n.head, delete_ust_app_rcu);
1554
1555 error:
1556 rcu_read_unlock();
1557 return;
1558 }
1559
1560 /*
1561 * Return traceable_app_count
1562 */
1563 unsigned long ust_app_list_count(void)
1564 {
1565 unsigned long count;
1566
1567 rcu_read_lock();
1568 count = lttng_ht_get_count(ust_app_ht);
1569 rcu_read_unlock();
1570
1571 return count;
1572 }
1573
1574 /*
1575 * Fill events array with all events name of all registered apps.
1576 */
1577 int ust_app_list_events(struct lttng_event **events)
1578 {
1579 int ret, handle;
1580 size_t nbmem, count = 0;
1581 struct lttng_ht_iter iter;
1582 struct ust_app *app;
1583 struct lttng_event *tmp;
1584
1585 nbmem = UST_APP_EVENT_LIST_SIZE;
1586 tmp = zmalloc(nbmem * sizeof(struct lttng_event));
1587 if (tmp == NULL) {
1588 PERROR("zmalloc ust app events");
1589 ret = -ENOMEM;
1590 goto error;
1591 }
1592
1593 rcu_read_lock();
1594
1595 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1596 struct lttng_ust_tracepoint_iter uiter;
1597
1598 health_code_update(&health_thread_cmd);
1599
1600 if (!app->compatible) {
1601 /*
1602 * TODO: In time, we should notice the caller of this error by
1603 * telling him that this is a version error.
1604 */
1605 continue;
1606 }
1607 handle = ustctl_tracepoint_list(app->sock);
1608 if (handle < 0) {
1609 ERR("UST app list events getting handle failed for app pid %d",
1610 app->pid);
1611 continue;
1612 }
1613
1614 while ((ret = ustctl_tracepoint_list_get(app->sock, handle,
1615 &uiter)) != -LTTNG_UST_ERR_NOENT) {
1616 health_code_update(&health_thread_cmd);
1617 if (count >= nbmem) {
1618 /* In case the realloc fails, we free the memory */
1619 void *tmp_ptr = (void *) tmp;
1620 DBG2("Reallocating event list from %zu to %zu entries", nbmem,
1621 2 * nbmem);
1622 nbmem *= 2;
1623 tmp = realloc(tmp, nbmem * sizeof(struct lttng_event));
1624 if (tmp == NULL) {
1625 PERROR("realloc ust app events");
1626 free(tmp_ptr);
1627 ret = -ENOMEM;
1628 goto rcu_error;
1629 }
1630 }
1631 memcpy(tmp[count].name, uiter.name, LTTNG_UST_SYM_NAME_LEN);
1632 tmp[count].loglevel = uiter.loglevel;
1633 tmp[count].type = (enum lttng_event_type) LTTNG_UST_TRACEPOINT;
1634 tmp[count].pid = app->pid;
1635 tmp[count].enabled = -1;
1636 count++;
1637 }
1638 }
1639
1640 ret = count;
1641 *events = tmp;
1642
1643 DBG2("UST app list events done (%zu events)", count);
1644
1645 rcu_error:
1646 rcu_read_unlock();
1647 error:
1648 health_code_update(&health_thread_cmd);
1649 return ret;
1650 }
1651
1652 /*
1653 * Fill events array with all events name of all registered apps.
1654 */
1655 int ust_app_list_event_fields(struct lttng_event_field **fields)
1656 {
1657 int ret, handle;
1658 size_t nbmem, count = 0;
1659 struct lttng_ht_iter iter;
1660 struct ust_app *app;
1661 struct lttng_event_field *tmp;
1662
1663 nbmem = UST_APP_EVENT_LIST_SIZE;
1664 tmp = zmalloc(nbmem * sizeof(struct lttng_event_field));
1665 if (tmp == NULL) {
1666 PERROR("zmalloc ust app event fields");
1667 ret = -ENOMEM;
1668 goto error;
1669 }
1670
1671 rcu_read_lock();
1672
1673 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1674 struct lttng_ust_field_iter uiter;
1675
1676 health_code_update(&health_thread_cmd);
1677
1678 if (!app->compatible) {
1679 /*
1680 * TODO: In time, we should notice the caller of this error by
1681 * telling him that this is a version error.
1682 */
1683 continue;
1684 }
1685 handle = ustctl_tracepoint_field_list(app->sock);
1686 if (handle < 0) {
1687 ERR("UST app list event fields getting handle failed for app pid %d",
1688 app->pid);
1689 continue;
1690 }
1691
1692 while ((ret = ustctl_tracepoint_field_list_get(app->sock, handle,
1693 &uiter)) != -LTTNG_UST_ERR_NOENT) {
1694 health_code_update(&health_thread_cmd);
1695 if (count >= nbmem) {
1696 /* In case the realloc fails, we free the memory */
1697 void *tmp_ptr = (void *) tmp;
1698 DBG2("Reallocating event field list from %zu to %zu entries", nbmem,
1699 2 * nbmem);
1700 nbmem *= 2;
1701 tmp = realloc(tmp, nbmem * sizeof(struct lttng_event_field));
1702 if (tmp == NULL) {
1703 PERROR("realloc ust app event fields");
1704 free(tmp_ptr);
1705 ret = -ENOMEM;
1706 goto rcu_error;
1707 }
1708 }
1709
1710 memcpy(tmp[count].field_name, uiter.field_name, LTTNG_UST_SYM_NAME_LEN);
1711 tmp[count].type = uiter.type;
1712 tmp[count].nowrite = uiter.nowrite;
1713
1714 memcpy(tmp[count].event.name, uiter.event_name, LTTNG_UST_SYM_NAME_LEN);
1715 tmp[count].event.loglevel = uiter.loglevel;
1716 tmp[count].event.type = LTTNG_UST_TRACEPOINT;
1717 tmp[count].event.pid = app->pid;
1718 tmp[count].event.enabled = -1;
1719 count++;
1720 }
1721 }
1722
1723 ret = count;
1724 *fields = tmp;
1725
1726 DBG2("UST app list event fields done (%zu events)", count);
1727
1728 rcu_error:
1729 rcu_read_unlock();
1730 error:
1731 health_code_update(&health_thread_cmd);
1732 return ret;
1733 }
1734
1735 /*
1736 * Free and clean all traceable apps of the global list.
1737 */
1738 void ust_app_clean_list(void)
1739 {
1740 int ret;
1741 struct ust_app *app;
1742 struct lttng_ht_iter iter;
1743
1744 DBG2("UST app cleaning registered apps hash table");
1745
1746 rcu_read_lock();
1747
1748 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1749 ret = lttng_ht_del(ust_app_ht, &iter);
1750 assert(!ret);
1751 call_rcu(&app->pid_n.head, delete_ust_app_rcu);
1752 }
1753
1754 /* Cleanup socket hash table */
1755 cds_lfht_for_each_entry(ust_app_ht_by_sock->ht, &iter.iter, app,
1756 sock_n.node) {
1757 ret = lttng_ht_del(ust_app_ht_by_sock, &iter);
1758 assert(!ret);
1759 }
1760
1761 /* Destroy is done only when the ht is empty */
1762 lttng_ht_destroy(ust_app_ht);
1763 lttng_ht_destroy(ust_app_ht_by_sock);
1764
1765 rcu_read_unlock();
1766 }
1767
1768 /*
1769 * Init UST app hash table.
1770 */
1771 void ust_app_ht_alloc(void)
1772 {
1773 ust_app_ht = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
1774 ust_app_ht_by_sock = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
1775 }
1776
1777 /*
1778 * For a specific UST session, disable the channel for all registered apps.
1779 */
1780 int ust_app_disable_channel_glb(struct ltt_ust_session *usess,
1781 struct ltt_ust_channel *uchan)
1782 {
1783 int ret = 0;
1784 struct lttng_ht_iter iter;
1785 struct lttng_ht_node_str *ua_chan_node;
1786 struct ust_app *app;
1787 struct ust_app_session *ua_sess;
1788 struct ust_app_channel *ua_chan;
1789
1790 if (usess == NULL || uchan == NULL) {
1791 ERR("Disabling UST global channel with NULL values");
1792 ret = -1;
1793 goto error;
1794 }
1795
1796 DBG2("UST app disabling channel %s from global domain for session id %d",
1797 uchan->name, usess->id);
1798
1799 rcu_read_lock();
1800
1801 /* For every registered applications */
1802 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1803 struct lttng_ht_iter uiter;
1804 if (!app->compatible) {
1805 /*
1806 * TODO: In time, we should notice the caller of this error by
1807 * telling him that this is a version error.
1808 */
1809 continue;
1810 }
1811 ua_sess = lookup_session_by_app(usess, app);
1812 if (ua_sess == NULL) {
1813 continue;
1814 }
1815
1816 /* Get channel */
1817 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
1818 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
1819 /* If the session if found for the app, the channel must be there */
1820 assert(ua_chan_node);
1821
1822 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1823 /* The channel must not be already disabled */
1824 assert(ua_chan->enabled == 1);
1825
1826 /* Disable channel onto application */
1827 ret = disable_ust_app_channel(ua_sess, ua_chan, app);
1828 if (ret < 0) {
1829 /* XXX: We might want to report this error at some point... */
1830 continue;
1831 }
1832 }
1833
1834 rcu_read_unlock();
1835
1836 error:
1837 return ret;
1838 }
1839
1840 /*
1841 * For a specific UST session, enable the channel for all registered apps.
1842 */
1843 int ust_app_enable_channel_glb(struct ltt_ust_session *usess,
1844 struct ltt_ust_channel *uchan)
1845 {
1846 int ret = 0;
1847 struct lttng_ht_iter iter;
1848 struct ust_app *app;
1849 struct ust_app_session *ua_sess;
1850
1851 if (usess == NULL || uchan == NULL) {
1852 ERR("Adding UST global channel to NULL values");
1853 ret = -1;
1854 goto error;
1855 }
1856
1857 DBG2("UST app enabling channel %s to global domain for session id %d",
1858 uchan->name, usess->id);
1859
1860 rcu_read_lock();
1861
1862 /* For every registered applications */
1863 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1864 if (!app->compatible) {
1865 /*
1866 * TODO: In time, we should notice the caller of this error by
1867 * telling him that this is a version error.
1868 */
1869 continue;
1870 }
1871 ua_sess = lookup_session_by_app(usess, app);
1872 if (ua_sess == NULL) {
1873 continue;
1874 }
1875
1876 /* Enable channel onto application */
1877 ret = enable_ust_app_channel(ua_sess, uchan, app);
1878 if (ret < 0) {
1879 /* XXX: We might want to report this error at some point... */
1880 continue;
1881 }
1882 }
1883
1884 rcu_read_unlock();
1885
1886 error:
1887 return ret;
1888 }
1889
1890 /*
1891 * Disable an event in a channel and for a specific session.
1892 */
1893 int ust_app_disable_event_glb(struct ltt_ust_session *usess,
1894 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent)
1895 {
1896 int ret = 0;
1897 struct lttng_ht_iter iter, uiter;
1898 struct lttng_ht_node_str *ua_chan_node, *ua_event_node;
1899 struct ust_app *app;
1900 struct ust_app_session *ua_sess;
1901 struct ust_app_channel *ua_chan;
1902 struct ust_app_event *ua_event;
1903
1904 DBG("UST app disabling event %s for all apps in channel "
1905 "%s for session id %d", uevent->attr.name, uchan->name, usess->id);
1906
1907 rcu_read_lock();
1908
1909 /* For all registered applications */
1910 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1911 if (!app->compatible) {
1912 /*
1913 * TODO: In time, we should notice the caller of this error by
1914 * telling him that this is a version error.
1915 */
1916 continue;
1917 }
1918 ua_sess = lookup_session_by_app(usess, app);
1919 if (ua_sess == NULL) {
1920 /* Next app */
1921 continue;
1922 }
1923
1924 /* Lookup channel in the ust app session */
1925 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
1926 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
1927 if (ua_chan_node == NULL) {
1928 DBG2("Channel %s not found in session id %d for app pid %d."
1929 "Skipping", uchan->name, usess->id, app->pid);
1930 continue;
1931 }
1932 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1933
1934 lttng_ht_lookup(ua_chan->events, (void *)uevent->attr.name, &uiter);
1935 ua_event_node = lttng_ht_iter_get_node_str(&uiter);
1936 if (ua_event_node == NULL) {
1937 DBG2("Event %s not found in channel %s for app pid %d."
1938 "Skipping", uevent->attr.name, uchan->name, app->pid);
1939 continue;
1940 }
1941 ua_event = caa_container_of(ua_event_node, struct ust_app_event, node);
1942
1943 ret = disable_ust_app_event(ua_sess, ua_event, app);
1944 if (ret < 0) {
1945 /* XXX: Report error someday... */
1946 continue;
1947 }
1948 }
1949
1950 rcu_read_unlock();
1951
1952 return ret;
1953 }
1954
1955 /*
1956 * For a specific UST session and UST channel, the event for all
1957 * registered apps.
1958 */
1959 int ust_app_disable_all_event_glb(struct ltt_ust_session *usess,
1960 struct ltt_ust_channel *uchan)
1961 {
1962 int ret = 0;
1963 struct lttng_ht_iter iter, uiter;
1964 struct lttng_ht_node_str *ua_chan_node;
1965 struct ust_app *app;
1966 struct ust_app_session *ua_sess;
1967 struct ust_app_channel *ua_chan;
1968 struct ust_app_event *ua_event;
1969
1970 DBG("UST app disabling all event for all apps in channel "
1971 "%s for session id %d", uchan->name, usess->id);
1972
1973 rcu_read_lock();
1974
1975 /* For all registered applications */
1976 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1977 if (!app->compatible) {
1978 /*
1979 * TODO: In time, we should notice the caller of this error by
1980 * telling him that this is a version error.
1981 */
1982 continue;
1983 }
1984 ua_sess = lookup_session_by_app(usess, app);
1985 if (!ua_sess) {
1986 /* The application has problem or is probably dead. */
1987 continue;
1988 }
1989
1990 /* Lookup channel in the ust app session */
1991 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
1992 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
1993 /* If the channel is not found, there is a code flow error */
1994 assert(ua_chan_node);
1995
1996 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1997
1998 /* Disable each events of channel */
1999 cds_lfht_for_each_entry(ua_chan->events->ht, &uiter.iter, ua_event,
2000 node.node) {
2001 ret = disable_ust_app_event(ua_sess, ua_event, app);
2002 if (ret < 0) {
2003 /* XXX: Report error someday... */
2004 continue;
2005 }
2006 }
2007 }
2008
2009 rcu_read_unlock();
2010
2011 return ret;
2012 }
2013
2014 /*
2015 * For a specific UST session, create the channel for all registered apps.
2016 */
2017 int ust_app_create_channel_glb(struct ltt_ust_session *usess,
2018 struct ltt_ust_channel *uchan)
2019 {
2020 int ret = 0;
2021 struct lttng_ht_iter iter;
2022 struct ust_app *app;
2023 struct ust_app_session *ua_sess;
2024 struct ust_app_channel *ua_chan;
2025
2026 /* Very wrong code flow */
2027 assert(usess);
2028 assert(uchan);
2029
2030 DBG2("UST app adding channel %s to global domain for session id %d",
2031 uchan->name, usess->id);
2032
2033 rcu_read_lock();
2034
2035 /* For every registered applications */
2036 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2037 if (!app->compatible) {
2038 /*
2039 * TODO: In time, we should notice the caller of this error by
2040 * telling him that this is a version error.
2041 */
2042 continue;
2043 }
2044 /*
2045 * Create session on the tracer side and add it to app session HT. Note
2046 * that if session exist, it will simply return a pointer to the ust
2047 * app session.
2048 */
2049 ua_sess = create_ust_app_session(usess, app);
2050 if (ua_sess == NULL) {
2051 /* The malloc() failed. */
2052 ret = -1;
2053 goto error_rcu_unlock;
2054 } else if (ua_sess == (void *) -1UL) {
2055 /* The application's socket is not valid. Contiuing */
2056 ret = -1;
2057 continue;
2058 }
2059
2060 /* Create channel onto application */
2061 ua_chan = create_ust_app_channel(ua_sess, uchan, app);
2062 if (ua_chan == NULL) {
2063 /* Major problem here and it's maybe the tracer or malloc() */
2064 ret = -1;
2065 goto error_rcu_unlock;
2066 }
2067 }
2068
2069 error_rcu_unlock:
2070 rcu_read_unlock();
2071 return ret;
2072 }
2073
2074 /*
2075 * Enable event for a specific session and channel on the tracer.
2076 */
2077 int ust_app_enable_event_glb(struct ltt_ust_session *usess,
2078 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent)
2079 {
2080 int ret = 0;
2081 struct lttng_ht_iter iter, uiter;
2082 struct lttng_ht_node_str *ua_chan_node;
2083 struct ust_app *app;
2084 struct ust_app_session *ua_sess;
2085 struct ust_app_channel *ua_chan;
2086 struct ust_app_event *ua_event;
2087
2088 DBG("UST app enabling event %s for all apps for session id %d",
2089 uevent->attr.name, usess->id);
2090
2091 /*
2092 * NOTE: At this point, this function is called only if the session and
2093 * channel passed are already created for all apps. and enabled on the
2094 * tracer also.
2095 */
2096
2097 rcu_read_lock();
2098
2099 /* For all registered applications */
2100 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2101 if (!app->compatible) {
2102 /*
2103 * TODO: In time, we should notice the caller of this error by
2104 * telling him that this is a version error.
2105 */
2106 continue;
2107 }
2108 ua_sess = lookup_session_by_app(usess, app);
2109 if (!ua_sess) {
2110 /* The application has problem or is probably dead. */
2111 continue;
2112 }
2113
2114 /* Lookup channel in the ust app session */
2115 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
2116 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
2117 /* If the channel is not found, there is a code flow error */
2118 assert(ua_chan_node);
2119
2120 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
2121
2122 /* Get event node */
2123 ua_event = find_ust_app_event(ua_chan->events, uevent->attr.name,
2124 uevent->filter, uevent->attr.loglevel);
2125 if (ua_event == NULL) {
2126 DBG3("UST app enable event %s not found for app PID %d."
2127 "Skipping app", uevent->attr.name, app->pid);
2128 continue;
2129 }
2130
2131 ret = enable_ust_app_event(ua_sess, ua_event, app);
2132 if (ret < 0) {
2133 goto error;
2134 }
2135 }
2136
2137 error:
2138 rcu_read_unlock();
2139 return ret;
2140 }
2141
2142 /*
2143 * For a specific existing UST session and UST channel, creates the event for
2144 * all registered apps.
2145 */
2146 int ust_app_create_event_glb(struct ltt_ust_session *usess,
2147 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent)
2148 {
2149 int ret = 0;
2150 struct lttng_ht_iter iter, uiter;
2151 struct lttng_ht_node_str *ua_chan_node;
2152 struct ust_app *app;
2153 struct ust_app_session *ua_sess;
2154 struct ust_app_channel *ua_chan;
2155
2156 DBG("UST app creating event %s for all apps for session id %d",
2157 uevent->attr.name, usess->id);
2158
2159 rcu_read_lock();
2160
2161 /* For all registered applications */
2162 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2163 if (!app->compatible) {
2164 /*
2165 * TODO: In time, we should notice the caller of this error by
2166 * telling him that this is a version error.
2167 */
2168 continue;
2169 }
2170 ua_sess = lookup_session_by_app(usess, app);
2171 if (!ua_sess) {
2172 /* The application has problem or is probably dead. */
2173 continue;
2174 }
2175
2176 /* Lookup channel in the ust app session */
2177 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
2178 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
2179 /* If the channel is not found, there is a code flow error */
2180 assert(ua_chan_node);
2181
2182 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
2183
2184 ret = create_ust_app_event(ua_sess, ua_chan, uevent, app);
2185 if (ret < 0) {
2186 if (ret != -LTTNG_UST_ERR_EXIST) {
2187 /* Possible value at this point: -ENOMEM. If so, we stop! */
2188 break;
2189 }
2190 DBG2("UST app event %s already exist on app PID %d",
2191 uevent->attr.name, app->pid);
2192 continue;
2193 }
2194 }
2195
2196 rcu_read_unlock();
2197
2198 return ret;
2199 }
2200
2201 /*
2202 * Start tracing for a specific UST session and app.
2203 */
2204 int ust_app_start_trace(struct ltt_ust_session *usess, struct ust_app *app)
2205 {
2206 int ret = 0;
2207 struct lttng_ht_iter iter;
2208 struct ust_app_session *ua_sess;
2209 struct ust_app_channel *ua_chan;
2210 struct ltt_ust_stream *ustream;
2211 struct consumer_socket *socket;
2212
2213 DBG("Starting tracing for ust app pid %d", app->pid);
2214
2215 rcu_read_lock();
2216
2217 if (!app->compatible) {
2218 goto end;
2219 }
2220
2221 ua_sess = lookup_session_by_app(usess, app);
2222 if (ua_sess == NULL) {
2223 /* The session is in teardown process. Ignore and continue. */
2224 goto end;
2225 }
2226
2227 /* Upon restart, we skip the setup, already done */
2228 if (ua_sess->started) {
2229 goto skip_setup;
2230 }
2231
2232 /* Create directories if consumer is LOCAL and has a path defined. */
2233 if (usess->consumer->type == CONSUMER_DST_LOCAL &&
2234 strlen(usess->consumer->dst.trace_path) > 0) {
2235 ret = run_as_mkdir_recursive(usess->consumer->dst.trace_path,
2236 S_IRWXU | S_IRWXG, usess->uid, usess->gid);
2237 if (ret < 0) {
2238 if (ret != -EEXIST) {
2239 ERR("Trace directory creation error");
2240 ret = -1;
2241 goto error_rcu_unlock;
2242 }
2243 }
2244 }
2245
2246 /* Indicate that the session has been started once */
2247 ua_sess->started = 1;
2248
2249 ret = create_ust_app_metadata(ua_sess, usess->pathname, app);
2250 if (ret < 0) {
2251 ret = LTTNG_ERR_UST_META_FAIL;
2252 goto error_rcu_unlock;
2253 }
2254
2255 /* For each channel */
2256 cds_lfht_for_each_entry(ua_sess->channels->ht, &iter.iter, ua_chan,
2257 node.node) {
2258 /* Create all streams */
2259 while (1) {
2260 /* Create UST stream */
2261 ustream = zmalloc(sizeof(*ustream));
2262 if (ustream == NULL) {
2263 PERROR("zmalloc ust stream");
2264 goto error_rcu_unlock;
2265 }
2266
2267 /* We are going to receive 2 fds, we need to reserve them. */
2268 ret = lttng_fd_get(LTTNG_FD_APPS, 2);
2269 if (ret < 0) {
2270 ERR("Exhausted number of available FD upon stream create");
2271 free(ustream);
2272 goto error_rcu_unlock;
2273 }
2274
2275 health_code_update(&health_thread_cmd);
2276
2277 ret = ustctl_create_stream(app->sock, ua_chan->obj,
2278 &ustream->obj);
2279 if (ret < 0) {
2280 /* Got all streams */
2281 lttng_fd_put(LTTNG_FD_APPS, 2);
2282 free(ustream);
2283 ret = LTTNG_ERR_UST_STREAM_FAIL;
2284 break;
2285 }
2286 ustream->handle = ustream->obj->handle;
2287
2288 health_code_update(&health_thread_cmd);
2289
2290 /* Order is important */
2291 cds_list_add_tail(&ustream->list, &ua_chan->streams.head);
2292 ret = snprintf(ustream->name, sizeof(ustream->name), "%s_%u",
2293 ua_chan->name, ua_chan->streams.count);
2294 ua_chan->streams.count++;
2295 if (ret < 0) {
2296 PERROR("asprintf UST create stream");
2297 /*
2298 * XXX what should we do here with the
2299 * stream ?
2300 */
2301 continue;
2302 }
2303 DBG2("UST stream %d ready (handle: %d)", ua_chan->streams.count,
2304 ustream->handle);
2305 }
2306
2307 health_code_update(&health_thread_cmd);
2308 }
2309
2310 switch (app->bits_per_long) {
2311 case 64:
2312 socket = consumer_find_socket(uatomic_read(&ust_consumerd64_fd),
2313 usess->consumer);
2314 if (socket == NULL) {
2315 goto skip_setup;
2316 }
2317 break;
2318 case 32:
2319 socket = consumer_find_socket(uatomic_read(&ust_consumerd32_fd),
2320 usess->consumer);
2321 if (socket == NULL) {
2322 goto skip_setup;
2323 }
2324 break;
2325 default:
2326 ret = -EINVAL;
2327 goto error_rcu_unlock;
2328 }
2329
2330 /* Setup UST consumer socket and send fds to it */
2331 ret = ust_consumer_send_session(ua_sess, usess->consumer, socket);
2332 if (ret < 0) {
2333 goto error_rcu_unlock;
2334 }
2335
2336 health_code_update(&health_thread_cmd);
2337
2338 skip_setup:
2339 /* This start the UST tracing */
2340 ret = ustctl_start_session(app->sock, ua_sess->handle);
2341 if (ret < 0) {
2342 ERR("Error starting tracing for app pid: %d", app->pid);
2343 goto error_rcu_unlock;
2344 }
2345
2346 health_code_update(&health_thread_cmd);
2347
2348 /* Quiescent wait after starting trace */
2349 ustctl_wait_quiescent(app->sock);
2350
2351 end:
2352 rcu_read_unlock();
2353 health_code_update(&health_thread_cmd);
2354 return 0;
2355
2356 error_rcu_unlock:
2357 rcu_read_unlock();
2358 health_code_update(&health_thread_cmd);
2359 return -1;
2360 }
2361
2362 /*
2363 * Stop tracing for a specific UST session and app.
2364 */
2365 int ust_app_stop_trace(struct ltt_ust_session *usess, struct ust_app *app)
2366 {
2367 int ret = 0;
2368 struct lttng_ht_iter iter;
2369 struct ust_app_session *ua_sess;
2370 struct ust_app_channel *ua_chan;
2371
2372 DBG("Stopping tracing for ust app pid %d", app->pid);
2373
2374 rcu_read_lock();
2375
2376 if (!app->compatible) {
2377 goto end;
2378 }
2379
2380 ua_sess = lookup_session_by_app(usess, app);
2381 if (ua_sess == NULL) {
2382 goto end;
2383 }
2384
2385 /*
2386 * If started = 0, it means that stop trace has been called for a session
2387 * that was never started. This is a code flow error and should never
2388 * happen.
2389 */
2390 assert(ua_sess->started == 1);
2391
2392 health_code_update(&health_thread_cmd);
2393
2394 /* This inhibits UST tracing */
2395 ret = ustctl_stop_session(app->sock, ua_sess->handle);
2396 if (ret < 0) {
2397 ERR("Error stopping tracing for app pid: %d", app->pid);
2398 goto error_rcu_unlock;
2399 }
2400
2401 health_code_update(&health_thread_cmd);
2402
2403 /* Quiescent wait after stopping trace */
2404 ustctl_wait_quiescent(app->sock);
2405
2406 health_code_update(&health_thread_cmd);
2407
2408 /* Flushing buffers */
2409 cds_lfht_for_each_entry(ua_sess->channels->ht, &iter.iter, ua_chan,
2410 node.node) {
2411 health_code_update(&health_thread_cmd);
2412 ret = ustctl_sock_flush_buffer(app->sock, ua_chan->obj);
2413 if (ret < 0) {
2414 ERR("UST app PID %d channel %s flush failed with ret %d",
2415 app->pid, ua_chan->name, ret);
2416 /* Continuing flushing all buffers */
2417 continue;
2418 }
2419 }
2420
2421 health_code_update(&health_thread_cmd);
2422
2423 /* Flush all buffers before stopping */
2424 ret = ustctl_sock_flush_buffer(app->sock, ua_sess->metadata->obj);
2425 if (ret < 0) {
2426 ERR("UST app PID %d metadata flush failed with ret %d", app->pid,
2427 ret);
2428 }
2429
2430 end:
2431 rcu_read_unlock();
2432 health_code_update(&health_thread_cmd);
2433 return 0;
2434
2435 error_rcu_unlock:
2436 rcu_read_unlock();
2437 health_code_update(&health_thread_cmd);
2438 return -1;
2439 }
2440
2441 /*
2442 * Destroy a specific UST session in apps.
2443 */
2444 static int destroy_trace(struct ltt_ust_session *usess, struct ust_app *app)
2445 {
2446 struct ust_app_session *ua_sess;
2447 struct lttng_ust_object_data obj;
2448 struct lttng_ht_iter iter;
2449 struct lttng_ht_node_ulong *node;
2450 int ret;
2451
2452 DBG("Destroy tracing for ust app pid %d", app->pid);
2453
2454 rcu_read_lock();
2455
2456 if (!app->compatible) {
2457 goto end;
2458 }
2459
2460 __lookup_session_by_app(usess, app, &iter);
2461 node = lttng_ht_iter_get_node_ulong(&iter);
2462 if (node == NULL) {
2463 /* Session is being or is deleted. */
2464 goto end;
2465 }
2466 ua_sess = caa_container_of(node, struct ust_app_session, node);
2467 ret = lttng_ht_del(app->sessions, &iter);
2468 if (ret) {
2469 /* Already scheduled for teardown. */
2470 goto end;
2471 }
2472
2473 obj.handle = ua_sess->handle;
2474 obj.shm_fd = -1;
2475 obj.wait_fd = -1;
2476 obj.memory_map_size = 0;
2477 health_code_update(&health_thread_cmd);
2478 ustctl_release_object(app->sock, &obj);
2479
2480 health_code_update(&health_thread_cmd);
2481 delete_ust_app_session(app->sock, ua_sess);
2482
2483 /* Quiescent wait after stopping trace */
2484 ustctl_wait_quiescent(app->sock);
2485
2486 end:
2487 rcu_read_unlock();
2488 health_code_update(&health_thread_cmd);
2489 return 0;
2490 }
2491
2492 /*
2493 * Start tracing for the UST session.
2494 */
2495 int ust_app_start_trace_all(struct ltt_ust_session *usess)
2496 {
2497 int ret = 0;
2498 struct lttng_ht_iter iter;
2499 struct ust_app *app;
2500
2501 DBG("Starting all UST traces");
2502
2503 rcu_read_lock();
2504
2505 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2506 ret = ust_app_start_trace(usess, app);
2507 if (ret < 0) {
2508 /* Continue to next apps even on error */
2509 continue;
2510 }
2511 }
2512
2513 rcu_read_unlock();
2514
2515 return 0;
2516 }
2517
2518 /*
2519 * Start tracing for the UST session.
2520 */
2521 int ust_app_stop_trace_all(struct ltt_ust_session *usess)
2522 {
2523 int ret = 0;
2524 struct lttng_ht_iter iter;
2525 struct ust_app *app;
2526
2527 DBG("Stopping all UST traces");
2528
2529 rcu_read_lock();
2530
2531 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2532 ret = ust_app_stop_trace(usess, app);
2533 if (ret < 0) {
2534 /* Continue to next apps even on error */
2535 continue;
2536 }
2537 }
2538
2539 rcu_read_unlock();
2540
2541 return 0;
2542 }
2543
2544 /*
2545 * Destroy app UST session.
2546 */
2547 int ust_app_destroy_trace_all(struct ltt_ust_session *usess)
2548 {
2549 int ret = 0;
2550 struct lttng_ht_iter iter;
2551 struct ust_app *app;
2552
2553 DBG("Destroy all UST traces");
2554
2555 rcu_read_lock();
2556
2557 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2558 ret = destroy_trace(usess, app);
2559 if (ret < 0) {
2560 /* Continue to next apps even on error */
2561 continue;
2562 }
2563 }
2564
2565 rcu_read_unlock();
2566
2567 return 0;
2568 }
2569
2570 /*
2571 * Add channels/events from UST global domain to registered apps at sock.
2572 */
2573 void ust_app_global_update(struct ltt_ust_session *usess, int sock)
2574 {
2575 int ret = 0;
2576 struct lttng_ht_iter iter, uiter, iter_ctx;
2577 struct ust_app *app;
2578 struct ust_app_session *ua_sess;
2579 struct ust_app_channel *ua_chan;
2580 struct ust_app_event *ua_event;
2581 struct ust_app_ctx *ua_ctx;
2582
2583 assert(usess);
2584
2585 DBG2("UST app global update for app sock %d for session id %d", sock,
2586 usess->id);
2587
2588 rcu_read_lock();
2589
2590 app = find_app_by_sock(sock);
2591 if (app == NULL) {
2592 ERR("Failed to update app sock %d", sock);
2593 goto error;
2594 }
2595
2596 if (!app->compatible) {
2597 goto error;
2598 }
2599
2600 ua_sess = create_ust_app_session(usess, app);
2601 if (ua_sess == NULL || ua_sess == (void *) -1UL) {
2602 /* Tracer is gone for this session and has been freed */
2603 goto error;
2604 }
2605
2606 /*
2607 * We can iterate safely here over all UST app session sicne the create ust
2608 * app session above made a shadow copy of the UST global domain from the
2609 * ltt ust session.
2610 */
2611 cds_lfht_for_each_entry(ua_sess->channels->ht, &iter.iter, ua_chan,
2612 node.node) {
2613 ret = create_ust_channel(app, ua_sess, ua_chan);
2614 if (ret < 0) {
2615 /* FIXME: Should we quit here or continue... */
2616 continue;
2617 }
2618
2619 cds_lfht_for_each_entry(ua_chan->ctx->ht, &iter_ctx.iter, ua_ctx,
2620 node.node) {
2621 ret = create_ust_channel_context(ua_chan, ua_ctx, app);
2622 if (ret < 0) {
2623 /* FIXME: Should we quit here or continue... */
2624 continue;
2625 }
2626 }
2627
2628
2629 /* For each events */
2630 cds_lfht_for_each_entry(ua_chan->events->ht, &uiter.iter, ua_event,
2631 node.node) {
2632 ret = create_ust_event(app, ua_sess, ua_chan, ua_event);
2633 if (ret < 0) {
2634 /* FIXME: Should we quit here or continue... */
2635 continue;
2636 }
2637
2638 ret = set_ust_event_filter(ua_event, app);
2639 if (ret < 0) {
2640 /* FIXME: Should we quit here or continue... */
2641 continue;
2642 }
2643 }
2644 }
2645
2646 if (usess->start_trace) {
2647 ret = ust_app_start_trace(usess, app);
2648 if (ret < 0) {
2649 goto error;
2650 }
2651
2652 DBG2("UST trace started for app pid %d", app->pid);
2653 }
2654
2655 error:
2656 rcu_read_unlock();
2657 return;
2658 }
2659
2660 /*
2661 * Add context to a specific channel for global UST domain.
2662 */
2663 int ust_app_add_ctx_channel_glb(struct ltt_ust_session *usess,
2664 struct ltt_ust_channel *uchan, struct ltt_ust_context *uctx)
2665 {
2666 int ret = 0;
2667 struct lttng_ht_node_str *ua_chan_node;
2668 struct lttng_ht_iter iter, uiter;
2669 struct ust_app_channel *ua_chan = NULL;
2670 struct ust_app_session *ua_sess;
2671 struct ust_app *app;
2672
2673 rcu_read_lock();
2674
2675 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2676 if (!app->compatible) {
2677 /*
2678 * TODO: In time, we should notice the caller of this error by
2679 * telling him that this is a version error.
2680 */
2681 continue;
2682 }
2683 ua_sess = lookup_session_by_app(usess, app);
2684 if (ua_sess == NULL) {
2685 continue;
2686 }
2687
2688 /* Lookup channel in the ust app session */
2689 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
2690 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
2691 if (ua_chan_node == NULL) {
2692 continue;
2693 }
2694 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel,
2695 node);
2696
2697 ret = create_ust_app_channel_context(ua_sess, ua_chan, &uctx->ctx, app);
2698 if (ret < 0) {
2699 continue;
2700 }
2701 }
2702
2703 rcu_read_unlock();
2704 return ret;
2705 }
2706
2707 /*
2708 * Enable event for a channel from a UST session for a specific PID.
2709 */
2710 int ust_app_enable_event_pid(struct ltt_ust_session *usess,
2711 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent, pid_t pid)
2712 {
2713 int ret = 0;
2714 struct lttng_ht_iter iter;
2715 struct lttng_ht_node_str *ua_chan_node;
2716 struct ust_app *app;
2717 struct ust_app_session *ua_sess;
2718 struct ust_app_channel *ua_chan;
2719 struct ust_app_event *ua_event;
2720
2721 DBG("UST app enabling event %s for PID %d", uevent->attr.name, pid);
2722
2723 rcu_read_lock();
2724
2725 app = ust_app_find_by_pid(pid);
2726 if (app == NULL) {
2727 ERR("UST app enable event per PID %d not found", pid);
2728 ret = -1;
2729 goto error;
2730 }
2731
2732 if (!app->compatible) {
2733 ret = 0;
2734 goto error;
2735 }
2736
2737 ua_sess = lookup_session_by_app(usess, app);
2738 if (!ua_sess) {
2739 /* The application has problem or is probably dead. */
2740 goto error;
2741 }
2742
2743 /* Lookup channel in the ust app session */
2744 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &iter);
2745 ua_chan_node = lttng_ht_iter_get_node_str(&iter);
2746 /* If the channel is not found, there is a code flow error */
2747 assert(ua_chan_node);
2748
2749 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
2750
2751 ua_event = find_ust_app_event(ua_chan->events, uevent->attr.name,
2752 uevent->filter, uevent->attr.loglevel);
2753 if (ua_event == NULL) {
2754 ret = create_ust_app_event(ua_sess, ua_chan, uevent, app);
2755 if (ret < 0) {
2756 goto error;
2757 }
2758 } else {
2759 ret = enable_ust_app_event(ua_sess, ua_event, app);
2760 if (ret < 0) {
2761 goto error;
2762 }
2763 }
2764
2765 error:
2766 rcu_read_unlock();
2767 return ret;
2768 }
2769
2770 /*
2771 * Disable event for a channel from a UST session for a specific PID.
2772 */
2773 int ust_app_disable_event_pid(struct ltt_ust_session *usess,
2774 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent, pid_t pid)
2775 {
2776 int ret = 0;
2777 struct lttng_ht_iter iter;
2778 struct lttng_ht_node_str *ua_chan_node, *ua_event_node;
2779 struct ust_app *app;
2780 struct ust_app_session *ua_sess;
2781 struct ust_app_channel *ua_chan;
2782 struct ust_app_event *ua_event;
2783
2784 DBG("UST app disabling event %s for PID %d", uevent->attr.name, pid);
2785
2786 rcu_read_lock();
2787
2788 app = ust_app_find_by_pid(pid);
2789 if (app == NULL) {
2790 ERR("UST app disable event per PID %d not found", pid);
2791 ret = -1;
2792 goto error;
2793 }
2794
2795 if (!app->compatible) {
2796 ret = 0;
2797 goto error;
2798 }
2799
2800 ua_sess = lookup_session_by_app(usess, app);
2801 if (!ua_sess) {
2802 /* The application has problem or is probably dead. */
2803 goto error;
2804 }
2805
2806 /* Lookup channel in the ust app session */
2807 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &iter);
2808 ua_chan_node = lttng_ht_iter_get_node_str(&iter);
2809 if (ua_chan_node == NULL) {
2810 /* Channel does not exist, skip disabling */
2811 goto error;
2812 }
2813 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
2814
2815 lttng_ht_lookup(ua_chan->events, (void *)uevent->attr.name, &iter);
2816 ua_event_node = lttng_ht_iter_get_node_str(&iter);
2817 if (ua_event_node == NULL) {
2818 /* Event does not exist, skip disabling */
2819 goto error;
2820 }
2821 ua_event = caa_container_of(ua_event_node, struct ust_app_event, node);
2822
2823 ret = disable_ust_app_event(ua_sess, ua_event, app);
2824 if (ret < 0) {
2825 goto error;
2826 }
2827
2828 error:
2829 rcu_read_unlock();
2830 return ret;
2831 }
2832
2833 /*
2834 * Validate version of UST apps and set the compatible bit.
2835 */
2836 int ust_app_validate_version(int sock)
2837 {
2838 int ret;
2839 struct ust_app *app;
2840
2841 rcu_read_lock();
2842
2843 app = find_app_by_sock(sock);
2844 assert(app);
2845
2846 health_code_update(&health_thread_cmd);
2847
2848 ret = ustctl_tracer_version(sock, &app->version);
2849 if (ret < 0) {
2850 goto error;
2851 }
2852
2853 /* Validate version */
2854 if (app->version.major != UST_APP_MAJOR_VERSION) {
2855 goto error;
2856 }
2857
2858 DBG2("UST app PID %d is compatible with internal major version %d "
2859 "(supporting == %d)", app->pid, app->version.major,
2860 UST_APP_MAJOR_VERSION);
2861 app->compatible = 1;
2862 rcu_read_unlock();
2863 health_code_update(&health_thread_cmd);
2864 return 0;
2865
2866 error:
2867 DBG2("UST app PID %d is not compatible with internal major version %d "
2868 "(supporting == %d)", app->pid, app->version.major,
2869 UST_APP_MAJOR_VERSION);
2870 app->compatible = 0;
2871 rcu_read_unlock();
2872 health_code_update(&health_thread_cmd);
2873 return -1;
2874 }
2875
2876 /*
2877 * Calibrate registered applications.
2878 */
2879 int ust_app_calibrate_glb(struct lttng_ust_calibrate *calibrate)
2880 {
2881 int ret = 0;
2882 struct lttng_ht_iter iter;
2883 struct ust_app *app;
2884
2885 rcu_read_lock();
2886
2887 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2888 if (!app->compatible) {
2889 /*
2890 * TODO: In time, we should notice the caller of this error by
2891 * telling him that this is a version error.
2892 */
2893 continue;
2894 }
2895
2896 health_code_update(&health_thread_cmd);
2897
2898 ret = ustctl_calibrate(app->sock, calibrate);
2899 if (ret < 0) {
2900 switch (ret) {
2901 case -ENOSYS:
2902 /* Means that it's not implemented on the tracer side. */
2903 ret = 0;
2904 break;
2905 default:
2906 /* TODO: Report error to user */
2907 DBG2("Calibrate app PID %d returned with error %d",
2908 app->pid, ret);
2909 break;
2910 }
2911 }
2912 }
2913
2914 DBG("UST app global domain calibration finished");
2915
2916 rcu_read_unlock();
2917
2918 health_code_update(&health_thread_cmd);
2919
2920 return ret;
2921 }
This page took 0.097416 seconds and 5 git commands to generate.