Cleanup: Move patches.i to include/generated/
[lttng-modules.git] / lttng-statedump-impl.c
CommitLineData
b7cdc182 1/* SPDX-License-Identifier: (GPL-2.0-only or LGPL-2.1-only)
9f36eaed 2 *
886d51a3
MD
3 * lttng-statedump.c
4 *
c337ddc2
MD
5 * Linux Trace Toolkit Next Generation Kernel State Dump
6 *
7 * Copyright 2005 Jean-Hugues Deschenes <jean-hugues.deschenes@polymtl.ca>
8 * Copyright 2006-2012 Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
9 *
10 * Changes:
11 * Eric Clement: Add listing of network IP interface
12 * 2006, 2007 Mathieu Desnoyers Fix kernel threads
13 * Various updates
c337ddc2
MD
14 */
15
16#include <linux/init.h>
17#include <linux/module.h>
18#include <linux/netlink.h>
19#include <linux/inet.h>
20#include <linux/ip.h>
21#include <linux/kthread.h>
22#include <linux/proc_fs.h>
23#include <linux/file.h>
24#include <linux/interrupt.h>
25#include <linux/irqnr.h>
26#include <linux/cpu.h>
27#include <linux/netdevice.h>
28#include <linux/inetdevice.h>
29#include <linux/sched.h>
30#include <linux/mm.h>
c337ddc2
MD
31#include <linux/swap.h>
32#include <linux/wait.h>
33#include <linux/mutex.h>
f0dbdefb 34#include <linux/device.h>
c337ddc2 35
2df37e95
MD
36#include <lttng/events.h>
37#include <lttng/tracer.h>
241ae9a8 38#include <wrapper/irqdesc.h>
241ae9a8 39#include <wrapper/fdtable.h>
1965e6b4 40#include <wrapper/namespace.h>
241ae9a8
MD
41#include <wrapper/irq.h>
42#include <wrapper/tracepoint.h>
43#include <wrapper/genhd.h>
44#include <wrapper/file.h>
c07dca48 45#include <wrapper/fdtable.h>
c337ddc2 46
29784493 47#ifdef CONFIG_LTTNG_HAS_LIST_IRQ
c337ddc2
MD
48#include <linux/irq.h>
49#endif
50
51/* Define the tracepoints, but do not build the probes */
52#define CREATE_TRACE_POINTS
4f47ccf0 53#define TRACE_INCLUDE_PATH instrumentation/events
c337ddc2 54#define TRACE_INCLUDE_FILE lttng-statedump
3bc29f0a 55#define LTTNG_INSTRUMENTATION
4f47ccf0 56#include <instrumentation/events/lttng-statedump.h>
c337ddc2 57
f0dbdefb 58DEFINE_TRACE(lttng_statedump_block_device);
20591cf7
MD
59DEFINE_TRACE(lttng_statedump_end);
60DEFINE_TRACE(lttng_statedump_interrupt);
61DEFINE_TRACE(lttng_statedump_file_descriptor);
62DEFINE_TRACE(lttng_statedump_start);
63DEFINE_TRACE(lttng_statedump_process_state);
1965e6b4
MJ
64DEFINE_TRACE(lttng_statedump_process_pid_ns);
65#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4,6,0))
66DEFINE_TRACE(lttng_statedump_process_cgroup_ns);
67#endif
68DEFINE_TRACE(lttng_statedump_process_ipc_ns);
69#ifndef LTTNG_MNT_NS_MISSING_HEADER
70DEFINE_TRACE(lttng_statedump_process_mnt_ns);
71#endif
72DEFINE_TRACE(lttng_statedump_process_net_ns);
73DEFINE_TRACE(lttng_statedump_process_user_ns);
74DEFINE_TRACE(lttng_statedump_process_uts_ns);
20591cf7 75DEFINE_TRACE(lttng_statedump_network_interface);
d0b55e4c 76#ifdef LTTNG_HAVE_STATEDUMP_CPU_TOPOLOGY
502e4132
JD
77DEFINE_TRACE(lttng_statedump_cpu_topology);
78#endif
20591cf7 79
361c023a
MD
80struct lttng_fd_ctx {
81 char *page;
82 struct lttng_session *session;
d561ecfb 83 struct files_struct *files;
361c023a
MD
84};
85
c337ddc2
MD
86/*
87 * Protected by the trace lock.
88 */
89static struct delayed_work cpu_work[NR_CPUS];
90static DECLARE_WAIT_QUEUE_HEAD(statedump_wq);
91static atomic_t kernel_threads_to_run;
92
93enum lttng_thread_type {
94 LTTNG_USER_THREAD = 0,
95 LTTNG_KERNEL_THREAD = 1,
96};
97
98enum lttng_execution_mode {
99 LTTNG_USER_MODE = 0,
100 LTTNG_SYSCALL = 1,
101 LTTNG_TRAP = 2,
102 LTTNG_IRQ = 3,
103 LTTNG_SOFTIRQ = 4,
104 LTTNG_MODE_UNKNOWN = 5,
105};
106
107enum lttng_execution_submode {
108 LTTNG_NONE = 0,
109 LTTNG_UNKNOWN = 1,
110};
111
112enum lttng_process_status {
113 LTTNG_UNNAMED = 0,
114 LTTNG_WAIT_FORK = 1,
115 LTTNG_WAIT_CPU = 2,
116 LTTNG_EXIT = 3,
117 LTTNG_ZOMBIE = 4,
118 LTTNG_WAIT = 5,
119 LTTNG_RUN = 6,
120 LTTNG_DEAD = 7,
121};
122
f0dbdefb
HD
123static
124int lttng_enumerate_block_devices(struct lttng_session *session)
125{
126 struct class *ptr_block_class;
127 struct device_type *ptr_disk_type;
128 struct class_dev_iter iter;
129 struct device *dev;
130
131 ptr_block_class = wrapper_get_block_class();
132 if (!ptr_block_class)
133 return -ENOSYS;
134 ptr_disk_type = wrapper_get_disk_type();
135 if (!ptr_disk_type) {
136 return -ENOSYS;
137 }
138 class_dev_iter_init(&iter, ptr_block_class, NULL, ptr_disk_type);
139 while ((dev = class_dev_iter_next(&iter))) {
140 struct disk_part_iter piter;
141 struct gendisk *disk = dev_to_disk(dev);
142 struct hd_struct *part;
143
5a91f3df
MD
144 /*
145 * Don't show empty devices or things that have been
146 * suppressed
147 */
148 if (get_capacity(disk) == 0 ||
149 (disk->flags & GENHD_FL_SUPPRESS_PARTITION_INFO))
150 continue;
151
f0dbdefb
HD
152 disk_part_iter_init(&piter, disk, DISK_PITER_INCL_PART0);
153 while ((part = disk_part_iter_next(&piter))) {
154 char name_buf[BDEVNAME_SIZE];
155 char *p;
156
157 p = wrapper_disk_name(disk, part->partno, name_buf);
158 if (!p) {
159 disk_part_iter_exit(&piter);
160 class_dev_iter_exit(&iter);
161 return -ENOSYS;
162 }
163 trace_lttng_statedump_block_device(session,
164 part_devt(part), name_buf);
165 }
166 disk_part_iter_exit(&piter);
167 }
168 class_dev_iter_exit(&iter);
169 return 0;
170}
171
c337ddc2 172#ifdef CONFIG_INET
f0dbdefb 173
c337ddc2
MD
174static
175void lttng_enumerate_device(struct lttng_session *session,
176 struct net_device *dev)
177{
178 struct in_device *in_dev;
179 struct in_ifaddr *ifa;
180
181 if (dev->flags & IFF_UP) {
182 in_dev = in_dev_get(dev);
183 if (in_dev) {
184 for (ifa = in_dev->ifa_list; ifa != NULL;
185 ifa = ifa->ifa_next) {
186 trace_lttng_statedump_network_interface(
187 session, dev, ifa);
188 }
189 in_dev_put(in_dev);
190 }
191 } else {
192 trace_lttng_statedump_network_interface(
193 session, dev, NULL);
194 }
195}
196
197static
198int lttng_enumerate_network_ip_interface(struct lttng_session *session)
199{
200 struct net_device *dev;
201
202 read_lock(&dev_base_lock);
203 for_each_netdev(&init_net, dev)
204 lttng_enumerate_device(session, dev);
205 read_unlock(&dev_base_lock);
206
207 return 0;
208}
209#else /* CONFIG_INET */
210static inline
211int lttng_enumerate_network_ip_interface(struct lttng_session *session)
212{
213 return 0;
214}
215#endif /* CONFIG_INET */
216
361c023a
MD
217static
218int lttng_dump_one_fd(const void *p, struct file *file, unsigned int fd)
219{
220 const struct lttng_fd_ctx *ctx = p;
221 const char *s = d_path(&file->f_path, ctx->page, PAGE_SIZE);
29021503 222 unsigned int flags = file->f_flags;
d561ecfb 223 struct fdtable *fdt;
361c023a 224
29021503
MD
225 /*
226 * We don't expose kernel internal flags, only userspace-visible
227 * flags.
228 */
229 flags &= ~FMODE_NONOTIFY;
d561ecfb
MD
230 fdt = files_fdtable(ctx->files);
231 /*
232 * We need to check here again whether fd is within the fdt
233 * max_fds range, because we might be seeing a different
234 * files_fdtable() than iterate_fd(), assuming only RCU is
235 * protecting the read. In reality, iterate_fd() holds
236 * file_lock, which should ensure the fdt does not change while
237 * the lock is taken, but we are not aware whether this is
238 * guaranteed or not, so play safe.
239 */
aa29f2d3 240 if (fd < fdt->max_fds && lttng_close_on_exec(fd, fdt))
29021503 241 flags |= O_CLOEXEC;
361c023a
MD
242 if (IS_ERR(s)) {
243 struct dentry *dentry = file->f_path.dentry;
244
245 /* Make sure we give at least some info */
246 spin_lock(&dentry->d_lock);
e7a0ca72
MD
247 trace_lttng_statedump_file_descriptor(ctx->session,
248 ctx->files, fd, dentry->d_name.name, flags,
249 file->f_mode);
361c023a
MD
250 spin_unlock(&dentry->d_lock);
251 goto end;
252 }
e7a0ca72
MD
253 trace_lttng_statedump_file_descriptor(ctx->session,
254 ctx->files, fd, s, flags, file->f_mode);
361c023a
MD
255end:
256 return 0;
257}
c337ddc2 258
e7a0ca72 259/* Called with task lock held. */
c337ddc2 260static
e7a0ca72
MD
261void lttng_enumerate_files(struct lttng_session *session,
262 struct files_struct *files,
263 char *tmp)
c337ddc2 264{
e7a0ca72 265 struct lttng_fd_ctx ctx = { .page = tmp, .session = session, .files = files, };
c337ddc2 266
d561ecfb 267 lttng_iterate_fd(files, 0, lttng_dump_one_fd, &ctx);
c337ddc2
MD
268}
269
d0b55e4c 270#ifdef LTTNG_HAVE_STATEDUMP_CPU_TOPOLOGY
502e4132
JD
271static
272int lttng_enumerate_cpu_topology(struct lttng_session *session)
273{
274 int cpu;
275 const cpumask_t *cpumask = cpu_possible_mask;
276
277 for (cpu = cpumask_first(cpumask); cpu < nr_cpu_ids;
278 cpu = cpumask_next(cpu, cpumask)) {
279 trace_lttng_statedump_cpu_topology(session, &cpu_data(cpu));
280 }
281
282 return 0;
283}
284#else
285static
286int lttng_enumerate_cpu_topology(struct lttng_session *session)
287{
288 return 0;
289}
290#endif
291
0658bdda
MD
292#if 0
293/*
294 * FIXME: we cannot take a mmap_sem while in a RCU read-side critical section
295 * (scheduling in atomic). Normally, the tasklist lock protects this kind of
296 * iteration, but it is not exported to modules.
297 */
c337ddc2
MD
298static
299void lttng_enumerate_task_vm_maps(struct lttng_session *session,
300 struct task_struct *p)
301{
302 struct mm_struct *mm;
303 struct vm_area_struct *map;
304 unsigned long ino;
305
306 /* get_task_mm does a task_lock... */
307 mm = get_task_mm(p);
308 if (!mm)
309 return;
310
311 map = mm->mmap;
312 if (map) {
313 down_read(&mm->mmap_sem);
314 while (map) {
315 if (map->vm_file)
b06ed645 316 ino = map->vm_file->lttng_f_dentry->d_inode->i_ino;
c337ddc2
MD
317 else
318 ino = 0;
319 trace_lttng_statedump_vm_map(session, p, map, ino);
320 map = map->vm_next;
321 }
322 up_read(&mm->mmap_sem);
323 }
324 mmput(mm);
325}
326
327static
328int lttng_enumerate_vm_maps(struct lttng_session *session)
329{
330 struct task_struct *p;
331
332 rcu_read_lock();
333 for_each_process(p)
334 lttng_enumerate_task_vm_maps(session, p);
335 rcu_read_unlock();
336 return 0;
337}
0658bdda 338#endif
c337ddc2 339
29784493 340#ifdef CONFIG_LTTNG_HAS_LIST_IRQ
47faec4b 341
c337ddc2 342static
cfcee1c7 343int lttng_list_interrupts(struct lttng_session *session)
c337ddc2
MD
344{
345 unsigned int irq;
346 unsigned long flags = 0;
347 struct irq_desc *desc;
348
349#define irq_to_desc wrapper_irq_to_desc
350 /* needs irq_desc */
351 for_each_irq_desc(irq, desc) {
352 struct irqaction *action;
353 const char *irq_chip_name =
354 irq_desc_get_chip(desc)->name ? : "unnamed_irq_chip";
355
356 local_irq_save(flags);
fc94c945 357 raw_spin_lock(&desc->lock);
c337ddc2
MD
358 for (action = desc->action; action; action = action->next) {
359 trace_lttng_statedump_interrupt(session,
360 irq, irq_chip_name, action);
361 }
fc94c945 362 raw_spin_unlock(&desc->lock);
c337ddc2
MD
363 local_irq_restore(flags);
364 }
cfcee1c7 365 return 0;
c337ddc2
MD
366#undef irq_to_desc
367}
368#else
369static inline
cfcee1c7 370int lttng_list_interrupts(struct lttng_session *session)
c337ddc2 371{
cfcee1c7 372 return 0;
c337ddc2
MD
373}
374#endif
375
4ba1f53c 376/*
1965e6b4
MJ
377 * Statedump the task's namespaces using the proc filesystem inode number as
378 * the unique identifier. The user and pid ns are nested and will be dumped
379 * recursively.
380 *
4ba1f53c
MD
381 * Called with task lock held.
382 */
73e8ba37
JD
383static
384void lttng_statedump_process_ns(struct lttng_session *session,
385 struct task_struct *p,
386 enum lttng_thread_type type,
387 enum lttng_execution_mode mode,
388 enum lttng_execution_submode submode,
389 enum lttng_process_status status)
390{
1965e6b4 391 struct nsproxy *proxy;
73e8ba37 392 struct pid_namespace *pid_ns;
1965e6b4 393 struct user_namespace *user_ns;
73e8ba37 394
1965e6b4
MJ
395 /*
396 * The pid and user namespaces are special, they are nested and
397 * accessed with specific functions instead of the nsproxy struct
398 * like the other namespaces.
399 */
887bcdac
MJ
400 pid_ns = task_active_pid_ns(p);
401 do {
1965e6b4 402 trace_lttng_statedump_process_pid_ns(session, p, pid_ns);
adcc8b5e 403 pid_ns = pid_ns ? pid_ns->parent : NULL;
887bcdac 404 } while (pid_ns);
1965e6b4
MJ
405
406
407 user_ns = task_cred_xxx(p, user_ns);
408 do {
409 trace_lttng_statedump_process_user_ns(session, p, user_ns);
1964cccb
MD
410 /*
411 * trace_lttng_statedump_process_user_ns() internally
412 * checks whether user_ns is NULL. While this does not
413 * appear to be a possible return value for
414 * task_cred_xxx(), err on the safe side and check
415 * for NULL here as well to be consistent with the
416 * paranoid behavior of
417 * trace_lttng_statedump_process_user_ns().
418 */
419 user_ns = user_ns ? user_ns->lttng_user_ns_parent : NULL;
1965e6b4
MJ
420 } while (user_ns);
421
422 /*
423 * Back and forth on locking strategy within Linux upstream for nsproxy.
424 * See Linux upstream commit 728dba3a39c66b3d8ac889ddbe38b5b1c264aec3
425 * "namespaces: Use task_lock and not rcu to protect nsproxy"
426 * for details.
427 */
428#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3,17,0) || \
429 LTTNG_UBUNTU_KERNEL_RANGE(3,13,11,36, 3,14,0,0) || \
430 LTTNG_UBUNTU_KERNEL_RANGE(3,16,1,11, 3,17,0,0) || \
431 LTTNG_RHEL_KERNEL_RANGE(3,10,0,229,13,0, 3,11,0,0,0,0))
432 proxy = p->nsproxy;
433#else
434 rcu_read_lock();
435 proxy = task_nsproxy(p);
436#endif
437 if (proxy) {
438#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4,6,0))
439 trace_lttng_statedump_process_cgroup_ns(session, p, proxy->cgroup_ns);
440#endif
441 trace_lttng_statedump_process_ipc_ns(session, p, proxy->ipc_ns);
442#ifndef LTTNG_MNT_NS_MISSING_HEADER
443 trace_lttng_statedump_process_mnt_ns(session, p, proxy->mnt_ns);
444#endif
445 trace_lttng_statedump_process_net_ns(session, p, proxy->net_ns);
446 trace_lttng_statedump_process_uts_ns(session, p, proxy->uts_ns);
447 }
448#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3,17,0) || \
449 LTTNG_UBUNTU_KERNEL_RANGE(3,13,11,36, 3,14,0,0) || \
450 LTTNG_UBUNTU_KERNEL_RANGE(3,16,1,11, 3,17,0,0) || \
451 LTTNG_RHEL_KERNEL_RANGE(3,10,0,229,13,0, 3,11,0,0,0,0))
452 /* (nothing) */
453#else
454 rcu_read_unlock();
455#endif
73e8ba37
JD
456}
457
c337ddc2
MD
458static
459int lttng_enumerate_process_states(struct lttng_session *session)
460{
461 struct task_struct *g, *p;
e7a0ca72
MD
462 char *tmp;
463
464 tmp = (char *) __get_free_page(GFP_KERNEL);
465 if (!tmp)
466 return -ENOMEM;
c337ddc2
MD
467
468 rcu_read_lock();
469 for_each_process(g) {
e7a0ca72
MD
470 struct files_struct *prev_files = NULL;
471
c337ddc2
MD
472 p = g;
473 do {
474 enum lttng_execution_mode mode =
475 LTTNG_MODE_UNKNOWN;
476 enum lttng_execution_submode submode =
477 LTTNG_UNKNOWN;
478 enum lttng_process_status status;
479 enum lttng_thread_type type;
e7a0ca72 480 struct files_struct *files;
c337ddc2
MD
481
482 task_lock(p);
483 if (p->exit_state == EXIT_ZOMBIE)
484 status = LTTNG_ZOMBIE;
485 else if (p->exit_state == EXIT_DEAD)
486 status = LTTNG_DEAD;
487 else if (p->state == TASK_RUNNING) {
488 /* Is this a forked child that has not run yet? */
489 if (list_empty(&p->rt.run_list))
490 status = LTTNG_WAIT_FORK;
491 else
492 /*
493 * All tasks are considered as wait_cpu;
494 * the viewer will sort out if the task
495 * was really running at this time.
496 */
497 status = LTTNG_WAIT_CPU;
498 } else if (p->state &
499 (TASK_INTERRUPTIBLE | TASK_UNINTERRUPTIBLE)) {
500 /* Task is waiting for something to complete */
501 status = LTTNG_WAIT;
502 } else
503 status = LTTNG_UNNAMED;
504 submode = LTTNG_NONE;
505
506 /*
507 * Verification of t->mm is to filter out kernel
508 * threads; Viewer will further filter out if a
509 * user-space thread was in syscall mode or not.
510 */
511 if (p->mm)
512 type = LTTNG_USER_THREAD;
513 else
514 type = LTTNG_KERNEL_THREAD;
e7a0ca72 515 files = p->files;
d2a927ac
MJ
516
517 trace_lttng_statedump_process_state(session,
e7a0ca72 518 p, type, mode, submode, status, files);
73e8ba37 519 lttng_statedump_process_ns(session,
c337ddc2 520 p, type, mode, submode, status);
e7a0ca72
MD
521 /*
522 * As an optimisation for the common case, do not
523 * repeat information for the same files_struct in
524 * two consecutive threads. This is the common case
525 * for threads sharing the same fd table. RCU guarantees
526 * that the same files_struct pointer is not re-used
527 * throughout processes/threads iteration.
528 */
529 if (files && files != prev_files) {
530 lttng_enumerate_files(session, files, tmp);
531 prev_files = files;
532 }
c337ddc2
MD
533 task_unlock(p);
534 } while_each_thread(g, p);
535 }
536 rcu_read_unlock();
537
e7a0ca72
MD
538 free_page((unsigned long) tmp);
539
c337ddc2
MD
540 return 0;
541}
542
543static
544void lttng_statedump_work_func(struct work_struct *work)
545{
546 if (atomic_dec_and_test(&kernel_threads_to_run))
547 /* If we are the last thread, wake up do_lttng_statedump */
548 wake_up(&statedump_wq);
549}
550
551static
552int do_lttng_statedump(struct lttng_session *session)
553{
cfcee1c7 554 int cpu, ret;
c337ddc2 555
c337ddc2 556 trace_lttng_statedump_start(session);
cfcee1c7 557 ret = lttng_enumerate_process_states(session);
cfcee1c7
MD
558 if (ret)
559 return ret;
560 /*
561 * FIXME
562 * ret = lttng_enumerate_vm_maps(session);
563 * if (ret)
564 * return ret;
565 */
566 ret = lttng_list_interrupts(session);
567 if (ret)
568 return ret;
569 ret = lttng_enumerate_network_ip_interface(session);
570 if (ret)
571 return ret;
572 ret = lttng_enumerate_block_devices(session);
573 switch (ret) {
84c7055e
MD
574 case 0:
575 break;
cfcee1c7
MD
576 case -ENOSYS:
577 printk(KERN_WARNING "LTTng: block device enumeration is not supported by kernel\n");
578 break;
579 default:
580 return ret;
581 }
502e4132
JD
582 ret = lttng_enumerate_cpu_topology(session);
583 if (ret)
584 return ret;
c337ddc2
MD
585
586 /* TODO lttng_dump_idt_table(session); */
587 /* TODO lttng_dump_softirq_vec(session); */
588 /* TODO lttng_list_modules(session); */
589 /* TODO lttng_dump_swap_files(session); */
590
591 /*
592 * Fire off a work queue on each CPU. Their sole purpose in life
593 * is to guarantee that each CPU has been in a state where is was in
594 * syscall mode (i.e. not in a trap, an IRQ or a soft IRQ).
595 */
596 get_online_cpus();
597 atomic_set(&kernel_threads_to_run, num_online_cpus());
598 for_each_online_cpu(cpu) {
599 INIT_DELAYED_WORK(&cpu_work[cpu], lttng_statedump_work_func);
600 schedule_delayed_work_on(cpu, &cpu_work[cpu], 0);
601 }
602 /* Wait for all threads to run */
7a7128e0 603 __wait_event(statedump_wq, (atomic_read(&kernel_threads_to_run) == 0));
c337ddc2
MD
604 put_online_cpus();
605 /* Our work is done */
c337ddc2
MD
606 trace_lttng_statedump_end(session);
607 return 0;
608}
609
610/*
611 * Called with session mutex held.
612 */
613int lttng_statedump_start(struct lttng_session *session)
614{
c337ddc2
MD
615 return do_lttng_statedump(session);
616}
617EXPORT_SYMBOL_GPL(lttng_statedump_start);
618
dd8d5afb
MD
619static
620int __init lttng_statedump_init(void)
621{
d16aa9c9
MD
622 /*
623 * Allow module to load even if the fixup cannot be done. This
624 * will allow seemless transition when the underlying issue fix
625 * is merged into the Linux kernel, and when tracepoint.c
626 * "tracepoint_module_notify" is turned into a static function.
627 */
628 (void) wrapper_lttng_fixup_sig(THIS_MODULE);
629 return 0;
dd8d5afb
MD
630}
631
632module_init(lttng_statedump_init);
633
461277e7
MD
634static
635void __exit lttng_statedump_exit(void)
636{
637}
638
639module_exit(lttng_statedump_exit);
640
c337ddc2
MD
641MODULE_LICENSE("GPL and additional rights");
642MODULE_AUTHOR("Jean-Hugues Deschenes");
1c124020 643MODULE_DESCRIPTION("LTTng statedump provider");
13ab8b0a
MD
644MODULE_VERSION(__stringify(LTTNG_MODULES_MAJOR_VERSION) "."
645 __stringify(LTTNG_MODULES_MINOR_VERSION) "."
646 __stringify(LTTNG_MODULES_PATCHLEVEL_VERSION)
647 LTTNG_MODULES_EXTRAVERSION);
This page took 0.064656 seconds and 4 git commands to generate.