3accde269509e0e8b66c3b25c35b86a90289fb5b
[lttng-tools.git] / src / bin / lttng-sessiond / ust-app.c
1 /*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
16 */
17
18 #define _GNU_SOURCE
19 #include <errno.h>
20 #include <pthread.h>
21 #include <stdio.h>
22 #include <stdlib.h>
23 #include <string.h>
24 #include <sys/stat.h>
25 #include <sys/types.h>
26 #include <unistd.h>
27 #include <urcu/compiler.h>
28 #include <lttng/ust-error.h>
29
30 #include <common/common.h>
31 #include <common/sessiond-comm/sessiond-comm.h>
32
33 #include "fd-limit.h"
34 #include "health.h"
35 #include "ust-app.h"
36 #include "ust-consumer.h"
37 #include "ust-ctl.h"
38
39 /*
40 * Match function for the hash table lookup.
41 *
42 * It matches an ust app event based on three attributes which are the event
43 * name, the filter bytecode and the loglevel.
44 */
45 static int ht_match_ust_app_event(struct cds_lfht_node *node, const void *_key)
46 {
47 struct ust_app_event *event;
48 const struct ust_app_ht_key *key;
49
50 assert(node);
51 assert(_key);
52
53 event = caa_container_of(node, struct ust_app_event, node.node);
54 key = _key;
55
56 /* Match the 3 elements of the key: name, filter and loglevel. */
57
58 /* Event name */
59 if (strncmp(event->attr.name, key->name, sizeof(event->attr.name)) != 0) {
60 goto no_match;
61 }
62
63 /* Event loglevel. */
64 if (event->attr.loglevel != key->loglevel) {
65 if (event->attr.loglevel_type == LTTNG_UST_LOGLEVEL_ALL
66 && key->loglevel == 0 && event->attr.loglevel == -1) {
67 /*
68 * Match is accepted. This is because on event creation, the
69 * loglevel is set to -1 if the event loglevel type is ALL so 0 and
70 * -1 are accepted for this loglevel type since 0 is the one set by
71 * the API when receiving an enable event.
72 */
73 } else {
74 goto no_match;
75 }
76 }
77
78 /* One of the filters is NULL, fail. */
79 if ((key->filter && !event->filter) || (!key->filter && event->filter)) {
80 goto no_match;
81 }
82
83 if (key->filter && event->filter) {
84 /* Both filters exists, check length followed by the bytecode. */
85 if (event->filter->len != key->filter->len ||
86 memcmp(event->filter->data, key->filter->data,
87 event->filter->len) != 0) {
88 goto no_match;
89 }
90 }
91
92 /* Match. */
93 return 1;
94
95 no_match:
96 return 0;
97 }
98
99 /*
100 * Unique add of an ust app event in the given ht. This uses the custom
101 * ht_match_ust_app_event match function and the event name as hash.
102 */
103 static void add_unique_ust_app_event(struct lttng_ht *ht,
104 struct ust_app_event *event)
105 {
106 struct cds_lfht_node *node_ptr;
107 struct ust_app_ht_key key;
108
109 assert(ht);
110 assert(ht->ht);
111 assert(event);
112
113 key.name = event->attr.name;
114 key.filter = event->filter;
115 key.loglevel = event->attr.loglevel;
116
117 node_ptr = cds_lfht_add_unique(ht->ht,
118 ht->hash_fct(event->node.key, lttng_ht_seed),
119 ht_match_ust_app_event, &key, &event->node.node);
120 assert(node_ptr == &event->node.node);
121 }
122
123 /*
124 * Delete ust context safely. RCU read lock must be held before calling
125 * this function.
126 */
127 static
128 void delete_ust_app_ctx(int sock, struct ust_app_ctx *ua_ctx)
129 {
130 if (ua_ctx->obj) {
131 ustctl_release_object(sock, ua_ctx->obj);
132 free(ua_ctx->obj);
133 }
134 free(ua_ctx);
135 }
136
137 /*
138 * Delete ust app event safely. RCU read lock must be held before calling
139 * this function.
140 */
141 static
142 void delete_ust_app_event(int sock, struct ust_app_event *ua_event)
143 {
144 free(ua_event->filter);
145
146 if (ua_event->obj != NULL) {
147 ustctl_release_object(sock, ua_event->obj);
148 free(ua_event->obj);
149 }
150 free(ua_event);
151 }
152
153 /*
154 * Delete ust app stream safely. RCU read lock must be held before calling
155 * this function.
156 */
157 static
158 void delete_ust_app_stream(int sock, struct ltt_ust_stream *stream)
159 {
160 if (stream->obj) {
161 ustctl_release_object(sock, stream->obj);
162 lttng_fd_put(LTTNG_FD_APPS, 2);
163 free(stream->obj);
164 }
165 free(stream);
166 }
167
168 /*
169 * Delete ust app channel safely. RCU read lock must be held before calling
170 * this function.
171 */
172 static
173 void delete_ust_app_channel(int sock, struct ust_app_channel *ua_chan)
174 {
175 int ret;
176 struct lttng_ht_iter iter;
177 struct ust_app_event *ua_event;
178 struct ust_app_ctx *ua_ctx;
179 struct ltt_ust_stream *stream, *stmp;
180
181 /* Wipe stream */
182 cds_list_for_each_entry_safe(stream, stmp, &ua_chan->streams.head, list) {
183 cds_list_del(&stream->list);
184 delete_ust_app_stream(sock, stream);
185 }
186
187 /* Wipe context */
188 cds_lfht_for_each_entry(ua_chan->ctx->ht, &iter.iter, ua_ctx, node.node) {
189 ret = lttng_ht_del(ua_chan->ctx, &iter);
190 assert(!ret);
191 delete_ust_app_ctx(sock, ua_ctx);
192 }
193 lttng_ht_destroy(ua_chan->ctx);
194
195 /* Wipe events */
196 cds_lfht_for_each_entry(ua_chan->events->ht, &iter.iter, ua_event,
197 node.node) {
198 ret = lttng_ht_del(ua_chan->events, &iter);
199 assert(!ret);
200 delete_ust_app_event(sock, ua_event);
201 }
202 lttng_ht_destroy(ua_chan->events);
203
204 if (ua_chan->obj != NULL) {
205 ustctl_release_object(sock, ua_chan->obj);
206 lttng_fd_put(LTTNG_FD_APPS, 2);
207 free(ua_chan->obj);
208 }
209 free(ua_chan);
210 }
211
212 /*
213 * Delete ust app session safely. RCU read lock must be held before calling
214 * this function.
215 */
216 static
217 void delete_ust_app_session(int sock, struct ust_app_session *ua_sess)
218 {
219 int ret;
220 struct lttng_ht_iter iter;
221 struct ust_app_channel *ua_chan;
222
223 if (ua_sess->metadata) {
224 if (ua_sess->metadata->stream_obj) {
225 ustctl_release_object(sock, ua_sess->metadata->stream_obj);
226 lttng_fd_put(LTTNG_FD_APPS, 2);
227 free(ua_sess->metadata->stream_obj);
228 }
229 if (ua_sess->metadata->obj) {
230 ustctl_release_object(sock, ua_sess->metadata->obj);
231 lttng_fd_put(LTTNG_FD_APPS, 2);
232 free(ua_sess->metadata->obj);
233 }
234 trace_ust_destroy_metadata(ua_sess->metadata);
235 }
236
237 cds_lfht_for_each_entry(ua_sess->channels->ht, &iter.iter, ua_chan,
238 node.node) {
239 ret = lttng_ht_del(ua_sess->channels, &iter);
240 assert(!ret);
241 delete_ust_app_channel(sock, ua_chan);
242 }
243 lttng_ht_destroy(ua_sess->channels);
244
245 if (ua_sess->handle != -1) {
246 ustctl_release_handle(sock, ua_sess->handle);
247 }
248 free(ua_sess);
249 }
250
251 /*
252 * Delete a traceable application structure from the global list. Never call
253 * this function outside of a call_rcu call.
254 */
255 static
256 void delete_ust_app(struct ust_app *app)
257 {
258 int ret, sock;
259 struct ust_app_session *ua_sess, *tmp_ua_sess;
260
261 rcu_read_lock();
262
263 /* Delete ust app sessions info */
264 sock = app->sock;
265 app->sock = -1;
266
267 lttng_ht_destroy(app->sessions);
268
269 /* Wipe sessions */
270 cds_list_for_each_entry_safe(ua_sess, tmp_ua_sess, &app->teardown_head,
271 teardown_node) {
272 /* Free every object in the session and the session. */
273 delete_ust_app_session(sock, ua_sess);
274 }
275
276 /*
277 * Wait until we have deleted the application from the sock hash table
278 * before closing this socket, otherwise an application could re-use the
279 * socket ID and race with the teardown, using the same hash table entry.
280 *
281 * It's OK to leave the close in call_rcu. We want it to stay unique for
282 * all RCU readers that could run concurrently with unregister app,
283 * therefore we _need_ to only close that socket after a grace period. So
284 * it should stay in this RCU callback.
285 *
286 * This close() is a very important step of the synchronization model so
287 * every modification to this function must be carefully reviewed.
288 */
289 ret = close(sock);
290 if (ret) {
291 PERROR("close");
292 }
293 lttng_fd_put(LTTNG_FD_APPS, 1);
294
295 DBG2("UST app pid %d deleted", app->pid);
296 free(app);
297
298 rcu_read_unlock();
299 }
300
301 /*
302 * URCU intermediate call to delete an UST app.
303 */
304 static
305 void delete_ust_app_rcu(struct rcu_head *head)
306 {
307 struct lttng_ht_node_ulong *node =
308 caa_container_of(head, struct lttng_ht_node_ulong, head);
309 struct ust_app *app =
310 caa_container_of(node, struct ust_app, pid_n);
311
312 DBG3("Call RCU deleting app PID %d", app->pid);
313 delete_ust_app(app);
314 }
315
316 /*
317 * Alloc new UST app session.
318 */
319 static
320 struct ust_app_session *alloc_ust_app_session(void)
321 {
322 struct ust_app_session *ua_sess;
323
324 /* Init most of the default value by allocating and zeroing */
325 ua_sess = zmalloc(sizeof(struct ust_app_session));
326 if (ua_sess == NULL) {
327 PERROR("malloc");
328 goto error;
329 }
330
331 ua_sess->handle = -1;
332 ua_sess->channels = lttng_ht_new(0, LTTNG_HT_TYPE_STRING);
333
334 return ua_sess;
335
336 error:
337 return NULL;
338 }
339
340 /*
341 * Alloc new UST app channel.
342 */
343 static
344 struct ust_app_channel *alloc_ust_app_channel(char *name,
345 struct lttng_ust_channel *attr)
346 {
347 struct ust_app_channel *ua_chan;
348
349 /* Init most of the default value by allocating and zeroing */
350 ua_chan = zmalloc(sizeof(struct ust_app_channel));
351 if (ua_chan == NULL) {
352 PERROR("malloc");
353 goto error;
354 }
355
356 /* Setup channel name */
357 strncpy(ua_chan->name, name, sizeof(ua_chan->name));
358 ua_chan->name[sizeof(ua_chan->name) - 1] = '\0';
359
360 ua_chan->enabled = 1;
361 ua_chan->handle = -1;
362 ua_chan->ctx = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
363 ua_chan->events = lttng_ht_new(0, LTTNG_HT_TYPE_STRING);
364 lttng_ht_node_init_str(&ua_chan->node, ua_chan->name);
365
366 CDS_INIT_LIST_HEAD(&ua_chan->streams.head);
367
368 /* Copy attributes */
369 if (attr) {
370 memcpy(&ua_chan->attr, attr, sizeof(ua_chan->attr));
371 }
372
373 DBG3("UST app channel %s allocated", ua_chan->name);
374
375 return ua_chan;
376
377 error:
378 return NULL;
379 }
380
381 /*
382 * Alloc new UST app event.
383 */
384 static
385 struct ust_app_event *alloc_ust_app_event(char *name,
386 struct lttng_ust_event *attr)
387 {
388 struct ust_app_event *ua_event;
389
390 /* Init most of the default value by allocating and zeroing */
391 ua_event = zmalloc(sizeof(struct ust_app_event));
392 if (ua_event == NULL) {
393 PERROR("malloc");
394 goto error;
395 }
396
397 ua_event->enabled = 1;
398 strncpy(ua_event->name, name, sizeof(ua_event->name));
399 ua_event->name[sizeof(ua_event->name) - 1] = '\0';
400 lttng_ht_node_init_str(&ua_event->node, ua_event->name);
401
402 /* Copy attributes */
403 if (attr) {
404 memcpy(&ua_event->attr, attr, sizeof(ua_event->attr));
405 }
406
407 DBG3("UST app event %s allocated", ua_event->name);
408
409 return ua_event;
410
411 error:
412 return NULL;
413 }
414
415 /*
416 * Alloc new UST app context.
417 */
418 static
419 struct ust_app_ctx *alloc_ust_app_ctx(struct lttng_ust_context *uctx)
420 {
421 struct ust_app_ctx *ua_ctx;
422
423 ua_ctx = zmalloc(sizeof(struct ust_app_ctx));
424 if (ua_ctx == NULL) {
425 goto error;
426 }
427
428 if (uctx) {
429 memcpy(&ua_ctx->ctx, uctx, sizeof(ua_ctx->ctx));
430 }
431
432 DBG3("UST app context %d allocated", ua_ctx->ctx.ctx);
433
434 error:
435 return ua_ctx;
436 }
437
438 /*
439 * Allocate a filter and copy the given original filter.
440 *
441 * Return allocated filter or NULL on error.
442 */
443 static struct lttng_ust_filter_bytecode *alloc_copy_ust_app_filter(
444 struct lttng_ust_filter_bytecode *orig_f)
445 {
446 struct lttng_ust_filter_bytecode *filter = NULL;
447
448 /* Copy filter bytecode */
449 filter = zmalloc(sizeof(*filter) + orig_f->len);
450 if (!filter) {
451 PERROR("zmalloc alloc ust app filter");
452 goto error;
453 }
454
455 memcpy(filter, orig_f, sizeof(*filter) + orig_f->len);
456
457 error:
458 return filter;
459 }
460
461 /*
462 * Find an ust_app using the sock and return it. RCU read side lock must be
463 * held before calling this helper function.
464 */
465 static
466 struct ust_app *find_app_by_sock(int sock)
467 {
468 struct lttng_ht_node_ulong *node;
469 struct lttng_ht_iter iter;
470
471 lttng_ht_lookup(ust_app_ht_by_sock, (void *)((unsigned long) sock), &iter);
472 node = lttng_ht_iter_get_node_ulong(&iter);
473 if (node == NULL) {
474 DBG2("UST app find by sock %d not found", sock);
475 goto error;
476 }
477
478 return caa_container_of(node, struct ust_app, sock_n);
479
480 error:
481 return NULL;
482 }
483
484 /*
485 * Lookup for an ust app event based on event name, filter bytecode and the
486 * event loglevel.
487 *
488 * Return an ust_app_event object or NULL on error.
489 */
490 static struct ust_app_event *find_ust_app_event(struct lttng_ht *ht,
491 char *name, struct lttng_ust_filter_bytecode *filter, int loglevel)
492 {
493 struct lttng_ht_iter iter;
494 struct lttng_ht_node_str *node;
495 struct ust_app_event *event = NULL;
496 struct ust_app_ht_key key;
497
498 assert(name);
499 assert(ht);
500
501 /* Setup key for event lookup. */
502 key.name = name;
503 key.filter = filter;
504 key.loglevel = loglevel;
505
506 /* Lookup using the event name as hash and a custom match fct. */
507 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) name, lttng_ht_seed),
508 ht_match_ust_app_event, &key, &iter.iter);
509 node = lttng_ht_iter_get_node_str(&iter);
510 if (node == NULL) {
511 goto end;
512 }
513
514 event = caa_container_of(node, struct ust_app_event, node);
515
516 end:
517 return event;
518 }
519
520 /*
521 * Create the channel context on the tracer.
522 */
523 static
524 int create_ust_channel_context(struct ust_app_channel *ua_chan,
525 struct ust_app_ctx *ua_ctx, struct ust_app *app)
526 {
527 int ret;
528
529 health_code_update(&health_thread_cmd);
530
531 ret = ustctl_add_context(app->sock, &ua_ctx->ctx,
532 ua_chan->obj, &ua_ctx->obj);
533 if (ret < 0) {
534 goto error;
535 }
536
537 ua_ctx->handle = ua_ctx->obj->handle;
538
539 DBG2("UST app context created successfully for channel %s", ua_chan->name);
540
541 error:
542 health_code_update(&health_thread_cmd);
543 return ret;
544 }
545
546 /*
547 * Set the filter on the tracer.
548 */
549 static
550 int set_ust_event_filter(struct ust_app_event *ua_event,
551 struct ust_app *app)
552 {
553 int ret;
554
555 health_code_update(&health_thread_cmd);
556
557 if (!ua_event->filter) {
558 ret = 0;
559 goto error;
560 }
561
562 ret = ustctl_set_filter(app->sock, ua_event->filter,
563 ua_event->obj);
564 if (ret < 0) {
565 goto error;
566 }
567
568 DBG2("UST filter set successfully for event %s", ua_event->name);
569
570 error:
571 health_code_update(&health_thread_cmd);
572 return ret;
573 }
574
575 /*
576 * Disable the specified event on to UST tracer for the UST session.
577 */
578 static int disable_ust_event(struct ust_app *app,
579 struct ust_app_session *ua_sess, struct ust_app_event *ua_event)
580 {
581 int ret;
582
583 health_code_update(&health_thread_cmd);
584
585 ret = ustctl_disable(app->sock, ua_event->obj);
586 if (ret < 0) {
587 ERR("UST app event %s disable failed for app (pid: %d) "
588 "and session handle %d with ret %d",
589 ua_event->attr.name, app->pid, ua_sess->handle, ret);
590 goto error;
591 }
592
593 DBG2("UST app event %s disabled successfully for app (pid: %d)",
594 ua_event->attr.name, app->pid);
595
596 error:
597 health_code_update(&health_thread_cmd);
598 return ret;
599 }
600
601 /*
602 * Disable the specified channel on to UST tracer for the UST session.
603 */
604 static int disable_ust_channel(struct ust_app *app,
605 struct ust_app_session *ua_sess, struct ust_app_channel *ua_chan)
606 {
607 int ret;
608
609 health_code_update(&health_thread_cmd);
610
611 ret = ustctl_disable(app->sock, ua_chan->obj);
612 if (ret < 0) {
613 ERR("UST app channel %s disable failed for app (pid: %d) "
614 "and session handle %d with ret %d",
615 ua_chan->name, app->pid, ua_sess->handle, ret);
616 goto error;
617 }
618
619 DBG2("UST app channel %s disabled successfully for app (pid: %d)",
620 ua_chan->name, app->pid);
621
622 error:
623 health_code_update(&health_thread_cmd);
624 return ret;
625 }
626
627 /*
628 * Enable the specified channel on to UST tracer for the UST session.
629 */
630 static int enable_ust_channel(struct ust_app *app,
631 struct ust_app_session *ua_sess, struct ust_app_channel *ua_chan)
632 {
633 int ret;
634
635 health_code_update(&health_thread_cmd);
636
637 ret = ustctl_enable(app->sock, ua_chan->obj);
638 if (ret < 0) {
639 ERR("UST app channel %s enable failed for app (pid: %d) "
640 "and session handle %d with ret %d",
641 ua_chan->name, app->pid, ua_sess->handle, ret);
642 goto error;
643 }
644
645 ua_chan->enabled = 1;
646
647 DBG2("UST app channel %s enabled successfully for app (pid: %d)",
648 ua_chan->name, app->pid);
649
650 error:
651 health_code_update(&health_thread_cmd);
652 return ret;
653 }
654
655 /*
656 * Enable the specified event on to UST tracer for the UST session.
657 */
658 static int enable_ust_event(struct ust_app *app,
659 struct ust_app_session *ua_sess, struct ust_app_event *ua_event)
660 {
661 int ret;
662
663 health_code_update(&health_thread_cmd);
664
665 ret = ustctl_enable(app->sock, ua_event->obj);
666 if (ret < 0) {
667 ERR("UST app event %s enable failed for app (pid: %d) "
668 "and session handle %d with ret %d",
669 ua_event->attr.name, app->pid, ua_sess->handle, ret);
670 goto error;
671 }
672
673 DBG2("UST app event %s enabled successfully for app (pid: %d)",
674 ua_event->attr.name, app->pid);
675
676 error:
677 health_code_update(&health_thread_cmd);
678 return ret;
679 }
680
681 /*
682 * Open metadata onto the UST tracer for a UST session.
683 */
684 static int open_ust_metadata(struct ust_app *app,
685 struct ust_app_session *ua_sess)
686 {
687 int ret;
688 struct lttng_ust_channel_attr uattr;
689
690 health_code_update(&health_thread_cmd);
691
692 uattr.overwrite = ua_sess->metadata->attr.overwrite;
693 uattr.subbuf_size = ua_sess->metadata->attr.subbuf_size;
694 uattr.num_subbuf = ua_sess->metadata->attr.num_subbuf;
695 uattr.switch_timer_interval =
696 ua_sess->metadata->attr.switch_timer_interval;
697 uattr.read_timer_interval =
698 ua_sess->metadata->attr.read_timer_interval;
699 uattr.output = ua_sess->metadata->attr.output;
700
701 /* We are going to receive 2 fds, we need to reserve them. */
702 ret = lttng_fd_get(LTTNG_FD_APPS, 2);
703 if (ret < 0) {
704 ERR("Exhausted number of available FD upon metadata open");
705 goto error;
706 }
707 /* UST tracer metadata creation */
708 ret = ustctl_open_metadata(app->sock, ua_sess->handle, &uattr,
709 &ua_sess->metadata->obj);
710 if (ret < 0) {
711 ERR("UST app open metadata failed for app pid:%d with ret %d",
712 app->pid, ret);
713 goto error;
714 }
715
716 ua_sess->metadata->handle = ua_sess->metadata->obj->handle;
717
718 error:
719 health_code_update(&health_thread_cmd);
720 return ret;
721 }
722
723 /*
724 * Create stream onto the UST tracer for a UST session.
725 */
726 static int create_ust_stream(struct ust_app *app,
727 struct ust_app_session *ua_sess)
728 {
729 int ret;
730
731 health_code_update(&health_thread_cmd);
732
733 /* We are going to receive 2 fds, we need to reserve them. */
734 ret = lttng_fd_get(LTTNG_FD_APPS, 2);
735 if (ret < 0) {
736 ERR("Exhausted number of available FD upon metadata stream create");
737 goto error;
738 }
739 ret = ustctl_create_stream(app->sock, ua_sess->metadata->obj,
740 &ua_sess->metadata->stream_obj);
741 if (ret < 0) {
742 ERR("UST create metadata stream failed");
743 goto error;
744 }
745
746 error:
747 health_code_update(&health_thread_cmd);
748 return ret;
749 }
750
751 /*
752 * Create the specified channel onto the UST tracer for a UST session.
753 */
754 static int create_ust_channel(struct ust_app *app,
755 struct ust_app_session *ua_sess, struct ust_app_channel *ua_chan)
756 {
757 int ret;
758
759 health_code_update(&health_thread_cmd);
760
761 /* TODO: remove cast and use lttng-ust-abi.h */
762
763 /* We are going to receive 2 fds, we need to reserve them. */
764 ret = lttng_fd_get(LTTNG_FD_APPS, 2);
765 if (ret < 0) {
766 ERR("Exhausted number of available FD upon create channel");
767 goto error;
768 }
769
770 health_code_update(&health_thread_cmd);
771
772 ret = ustctl_create_channel(app->sock, ua_sess->handle,
773 (struct lttng_ust_channel_attr *)&ua_chan->attr, &ua_chan->obj);
774 if (ret < 0) {
775 ERR("Creating channel %s for app (pid: %d, sock: %d) "
776 "and session handle %d with ret %d",
777 ua_chan->name, app->pid, app->sock,
778 ua_sess->handle, ret);
779 lttng_fd_put(LTTNG_FD_APPS, 2);
780 goto error;
781 }
782
783 ua_chan->handle = ua_chan->obj->handle;
784
785 DBG2("UST app channel %s created successfully for pid:%d and sock:%d",
786 ua_chan->name, app->pid, app->sock);
787
788 health_code_update(&health_thread_cmd);
789
790 /* If channel is not enabled, disable it on the tracer */
791 if (!ua_chan->enabled) {
792 ret = disable_ust_channel(app, ua_sess, ua_chan);
793 if (ret < 0) {
794 goto error;
795 }
796 }
797
798 error:
799 health_code_update(&health_thread_cmd);
800 return ret;
801 }
802
803 /*
804 * Create the specified event onto the UST tracer for a UST session.
805 */
806 static
807 int create_ust_event(struct ust_app *app, struct ust_app_session *ua_sess,
808 struct ust_app_channel *ua_chan, struct ust_app_event *ua_event)
809 {
810 int ret = 0;
811
812 health_code_update(&health_thread_cmd);
813
814 /* Create UST event on tracer */
815 ret = ustctl_create_event(app->sock, &ua_event->attr, ua_chan->obj,
816 &ua_event->obj);
817 if (ret < 0) {
818 ERR("Error ustctl create event %s for app pid: %d with ret %d",
819 ua_event->attr.name, app->pid, ret);
820 goto error;
821 }
822
823 ua_event->handle = ua_event->obj->handle;
824
825 DBG2("UST app event %s created successfully for pid:%d",
826 ua_event->attr.name, app->pid);
827
828 health_code_update(&health_thread_cmd);
829
830 /* Set filter if one is present. */
831 if (ua_event->filter) {
832 ret = set_ust_event_filter(ua_event, app);
833 if (ret < 0) {
834 goto error;
835 }
836 }
837
838 /* If event not enabled, disable it on the tracer */
839 if (ua_event->enabled == 0) {
840 ret = disable_ust_event(app, ua_sess, ua_event);
841 if (ret < 0) {
842 /*
843 * If we hit an EPERM, something is wrong with our disable call. If
844 * we get an EEXIST, there is a problem on the tracer side since we
845 * just created it.
846 */
847 switch (ret) {
848 case -LTTNG_UST_ERR_PERM:
849 /* Code flow problem */
850 assert(0);
851 case -LTTNG_UST_ERR_EXIST:
852 /* It's OK for our use case. */
853 ret = 0;
854 break;
855 default:
856 break;
857 }
858 goto error;
859 }
860 }
861
862 error:
863 health_code_update(&health_thread_cmd);
864 return ret;
865 }
866
867 /*
868 * Copy data between an UST app event and a LTT event.
869 */
870 static void shadow_copy_event(struct ust_app_event *ua_event,
871 struct ltt_ust_event *uevent)
872 {
873 strncpy(ua_event->name, uevent->attr.name, sizeof(ua_event->name));
874 ua_event->name[sizeof(ua_event->name) - 1] = '\0';
875
876 ua_event->enabled = uevent->enabled;
877
878 /* Copy event attributes */
879 memcpy(&ua_event->attr, &uevent->attr, sizeof(ua_event->attr));
880
881 /* Copy filter bytecode */
882 if (uevent->filter) {
883 ua_event->filter = alloc_copy_ust_app_filter(uevent->filter);
884 /* Filter might be NULL here in case of ENONEM. */
885 }
886 }
887
888 /*
889 * Copy data between an UST app channel and a LTT channel.
890 */
891 static void shadow_copy_channel(struct ust_app_channel *ua_chan,
892 struct ltt_ust_channel *uchan)
893 {
894 struct lttng_ht_iter iter;
895 struct ltt_ust_event *uevent;
896 struct ltt_ust_context *uctx;
897 struct ust_app_event *ua_event;
898 struct ust_app_ctx *ua_ctx;
899
900 DBG2("UST app shadow copy of channel %s started", ua_chan->name);
901
902 strncpy(ua_chan->name, uchan->name, sizeof(ua_chan->name));
903 ua_chan->name[sizeof(ua_chan->name) - 1] = '\0';
904 /* Copy event attributes */
905 memcpy(&ua_chan->attr, &uchan->attr, sizeof(ua_chan->attr));
906
907 ua_chan->enabled = uchan->enabled;
908
909 cds_lfht_for_each_entry(uchan->ctx->ht, &iter.iter, uctx, node.node) {
910 ua_ctx = alloc_ust_app_ctx(&uctx->ctx);
911 if (ua_ctx == NULL) {
912 continue;
913 }
914 lttng_ht_node_init_ulong(&ua_ctx->node,
915 (unsigned long) ua_ctx->ctx.ctx);
916 lttng_ht_add_unique_ulong(ua_chan->ctx, &ua_ctx->node);
917 }
918
919 /* Copy all events from ltt ust channel to ust app channel */
920 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent, node.node) {
921 ua_event = find_ust_app_event(ua_chan->events, uevent->attr.name,
922 uevent->filter, uevent->attr.loglevel);
923 if (ua_event == NULL) {
924 DBG2("UST event %s not found on shadow copy channel",
925 uevent->attr.name);
926 ua_event = alloc_ust_app_event(uevent->attr.name, &uevent->attr);
927 if (ua_event == NULL) {
928 continue;
929 }
930 shadow_copy_event(ua_event, uevent);
931 add_unique_ust_app_event(ua_chan->events, ua_event);
932 }
933 }
934
935 DBG3("UST app shadow copy of channel %s done", ua_chan->name);
936 }
937
938 /*
939 * Copy data between a UST app session and a regular LTT session.
940 */
941 static void shadow_copy_session(struct ust_app_session *ua_sess,
942 struct ltt_ust_session *usess, struct ust_app *app)
943 {
944 struct lttng_ht_node_str *ua_chan_node;
945 struct lttng_ht_iter iter;
946 struct ltt_ust_channel *uchan;
947 struct ust_app_channel *ua_chan;
948 time_t rawtime;
949 struct tm *timeinfo;
950 char datetime[16];
951 int ret;
952
953 /* Get date and time for unique app path */
954 time(&rawtime);
955 timeinfo = localtime(&rawtime);
956 strftime(datetime, sizeof(datetime), "%Y%m%d-%H%M%S", timeinfo);
957
958 DBG2("Shadow copy of session handle %d", ua_sess->handle);
959
960 ua_sess->id = usess->id;
961 ua_sess->uid = usess->uid;
962 ua_sess->gid = usess->gid;
963
964 ret = snprintf(ua_sess->path, PATH_MAX, "%s-%d-%s/", app->name, app->pid,
965 datetime);
966 if (ret < 0) {
967 PERROR("asprintf UST shadow copy session");
968 /* TODO: We cannot return an error from here.. */
969 assert(0);
970 }
971
972 /* TODO: support all UST domain */
973
974 /* Iterate over all channels in global domain. */
975 cds_lfht_for_each_entry(usess->domain_global.channels->ht, &iter.iter,
976 uchan, node.node) {
977 struct lttng_ht_iter uiter;
978
979 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
980 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
981 if (ua_chan_node != NULL) {
982 /* Session exist. Contiuing. */
983 continue;
984 }
985
986 DBG2("Channel %s not found on shadow session copy, creating it",
987 uchan->name);
988 ua_chan = alloc_ust_app_channel(uchan->name, &uchan->attr);
989 if (ua_chan == NULL) {
990 /* malloc failed FIXME: Might want to do handle ENOMEM .. */
991 continue;
992 }
993
994 shadow_copy_channel(ua_chan, uchan);
995 lttng_ht_add_unique_str(ua_sess->channels, &ua_chan->node);
996 }
997 }
998
999 /*
1000 * Lookup sesison wrapper.
1001 */
1002 static
1003 void __lookup_session_by_app(struct ltt_ust_session *usess,
1004 struct ust_app *app, struct lttng_ht_iter *iter)
1005 {
1006 /* Get right UST app session from app */
1007 lttng_ht_lookup(app->sessions, (void *)((unsigned long) usess->id), iter);
1008 }
1009
1010 /*
1011 * Return ust app session from the app session hashtable using the UST session
1012 * id.
1013 */
1014 static struct ust_app_session *lookup_session_by_app(
1015 struct ltt_ust_session *usess, struct ust_app *app)
1016 {
1017 struct lttng_ht_iter iter;
1018 struct lttng_ht_node_ulong *node;
1019
1020 __lookup_session_by_app(usess, app, &iter);
1021 node = lttng_ht_iter_get_node_ulong(&iter);
1022 if (node == NULL) {
1023 goto error;
1024 }
1025
1026 return caa_container_of(node, struct ust_app_session, node);
1027
1028 error:
1029 return NULL;
1030 }
1031
1032 /*
1033 * Create a UST session onto the tracer of app and add it the session
1034 * hashtable.
1035 *
1036 * Return ust app session or NULL on error.
1037 */
1038 static struct ust_app_session *create_ust_app_session(
1039 struct ltt_ust_session *usess, struct ust_app *app)
1040 {
1041 int ret;
1042 struct ust_app_session *ua_sess;
1043
1044 health_code_update(&health_thread_cmd);
1045
1046 ua_sess = lookup_session_by_app(usess, app);
1047 if (ua_sess == NULL) {
1048 DBG2("UST app pid: %d session id %d not found, creating it",
1049 app->pid, usess->id);
1050 ua_sess = alloc_ust_app_session();
1051 if (ua_sess == NULL) {
1052 /* Only malloc can failed so something is really wrong */
1053 goto end;
1054 }
1055 shadow_copy_session(ua_sess, usess, app);
1056 }
1057
1058 health_code_update(&health_thread_cmd);
1059
1060 if (ua_sess->handle == -1) {
1061 ret = ustctl_create_session(app->sock);
1062 if (ret < 0) {
1063 ERR("Creating session for app pid %d", app->pid);
1064 delete_ust_app_session(-1, ua_sess);
1065 /* This means that the tracer is gone... */
1066 ua_sess = (void*) -1UL;
1067 goto end;
1068 }
1069
1070 ua_sess->handle = ret;
1071
1072 /* Add ust app session to app's HT */
1073 lttng_ht_node_init_ulong(&ua_sess->node, (unsigned long) ua_sess->id);
1074 lttng_ht_add_unique_ulong(app->sessions, &ua_sess->node);
1075
1076 DBG2("UST app session created successfully with handle %d", ret);
1077 }
1078
1079 end:
1080 health_code_update(&health_thread_cmd);
1081 return ua_sess;
1082 }
1083
1084 /*
1085 * Create a context for the channel on the tracer.
1086 */
1087 static
1088 int create_ust_app_channel_context(struct ust_app_session *ua_sess,
1089 struct ust_app_channel *ua_chan, struct lttng_ust_context *uctx,
1090 struct ust_app *app)
1091 {
1092 int ret = 0;
1093 struct lttng_ht_iter iter;
1094 struct lttng_ht_node_ulong *node;
1095 struct ust_app_ctx *ua_ctx;
1096
1097 DBG2("UST app adding context to channel %s", ua_chan->name);
1098
1099 lttng_ht_lookup(ua_chan->ctx, (void *)((unsigned long)uctx->ctx), &iter);
1100 node = lttng_ht_iter_get_node_ulong(&iter);
1101 if (node != NULL) {
1102 ret = -EEXIST;
1103 goto error;
1104 }
1105
1106 ua_ctx = alloc_ust_app_ctx(uctx);
1107 if (ua_ctx == NULL) {
1108 /* malloc failed */
1109 ret = -1;
1110 goto error;
1111 }
1112
1113 lttng_ht_node_init_ulong(&ua_ctx->node, (unsigned long) ua_ctx->ctx.ctx);
1114 lttng_ht_add_unique_ulong(ua_chan->ctx, &ua_ctx->node);
1115
1116 ret = create_ust_channel_context(ua_chan, ua_ctx, app);
1117 if (ret < 0) {
1118 goto error;
1119 }
1120
1121 error:
1122 return ret;
1123 }
1124
1125 /*
1126 * Enable on the tracer side a ust app event for the session and channel.
1127 */
1128 static
1129 int enable_ust_app_event(struct ust_app_session *ua_sess,
1130 struct ust_app_event *ua_event, struct ust_app *app)
1131 {
1132 int ret;
1133
1134 ret = enable_ust_event(app, ua_sess, ua_event);
1135 if (ret < 0) {
1136 goto error;
1137 }
1138
1139 ua_event->enabled = 1;
1140
1141 error:
1142 return ret;
1143 }
1144
1145 /*
1146 * Disable on the tracer side a ust app event for the session and channel.
1147 */
1148 static int disable_ust_app_event(struct ust_app_session *ua_sess,
1149 struct ust_app_event *ua_event, struct ust_app *app)
1150 {
1151 int ret;
1152
1153 ret = disable_ust_event(app, ua_sess, ua_event);
1154 if (ret < 0) {
1155 goto error;
1156 }
1157
1158 ua_event->enabled = 0;
1159
1160 error:
1161 return ret;
1162 }
1163
1164 /*
1165 * Lookup ust app channel for session and disable it on the tracer side.
1166 */
1167 static
1168 int disable_ust_app_channel(struct ust_app_session *ua_sess,
1169 struct ust_app_channel *ua_chan, struct ust_app *app)
1170 {
1171 int ret;
1172
1173 ret = disable_ust_channel(app, ua_sess, ua_chan);
1174 if (ret < 0) {
1175 goto error;
1176 }
1177
1178 ua_chan->enabled = 0;
1179
1180 error:
1181 return ret;
1182 }
1183
1184 /*
1185 * Lookup ust app channel for session and enable it on the tracer side.
1186 */
1187 static int enable_ust_app_channel(struct ust_app_session *ua_sess,
1188 struct ltt_ust_channel *uchan, struct ust_app *app)
1189 {
1190 int ret = 0;
1191 struct lttng_ht_iter iter;
1192 struct lttng_ht_node_str *ua_chan_node;
1193 struct ust_app_channel *ua_chan;
1194
1195 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &iter);
1196 ua_chan_node = lttng_ht_iter_get_node_str(&iter);
1197 if (ua_chan_node == NULL) {
1198 DBG2("Unable to find channel %s in ust session id %u",
1199 uchan->name, ua_sess->id);
1200 goto error;
1201 }
1202
1203 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1204
1205 ret = enable_ust_channel(app, ua_sess, ua_chan);
1206 if (ret < 0) {
1207 goto error;
1208 }
1209
1210 error:
1211 return ret;
1212 }
1213
1214 /*
1215 * Create UST app channel and create it on the tracer.
1216 */
1217 static struct ust_app_channel *create_ust_app_channel(
1218 struct ust_app_session *ua_sess, struct ltt_ust_channel *uchan,
1219 struct ust_app *app)
1220 {
1221 int ret = 0;
1222 struct lttng_ht_iter iter;
1223 struct lttng_ht_node_str *ua_chan_node;
1224 struct ust_app_channel *ua_chan;
1225
1226 /* Lookup channel in the ust app session */
1227 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &iter);
1228 ua_chan_node = lttng_ht_iter_get_node_str(&iter);
1229 if (ua_chan_node != NULL) {
1230 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1231 goto end;
1232 }
1233
1234 ua_chan = alloc_ust_app_channel(uchan->name, &uchan->attr);
1235 if (ua_chan == NULL) {
1236 /* Only malloc can fail here */
1237 goto error;
1238 }
1239 shadow_copy_channel(ua_chan, uchan);
1240
1241 ret = create_ust_channel(app, ua_sess, ua_chan);
1242 if (ret < 0) {
1243 /* Not found previously means that it does not exist on the tracer */
1244 assert(ret != -LTTNG_UST_ERR_EXIST);
1245 goto error;
1246 }
1247
1248 lttng_ht_add_unique_str(ua_sess->channels, &ua_chan->node);
1249
1250 DBG2("UST app create channel %s for PID %d completed", ua_chan->name,
1251 app->pid);
1252
1253 end:
1254 return ua_chan;
1255
1256 error:
1257 delete_ust_app_channel(-1, ua_chan);
1258 return NULL;
1259 }
1260
1261 /*
1262 * Create UST app event and create it on the tracer side.
1263 */
1264 static
1265 int create_ust_app_event(struct ust_app_session *ua_sess,
1266 struct ust_app_channel *ua_chan, struct ltt_ust_event *uevent,
1267 struct ust_app *app)
1268 {
1269 int ret = 0;
1270 struct ust_app_event *ua_event;
1271
1272 /* Get event node */
1273 ua_event = find_ust_app_event(ua_chan->events, uevent->attr.name,
1274 uevent->filter, uevent->attr.loglevel);
1275 if (ua_event != NULL) {
1276 ret = -EEXIST;
1277 goto end;
1278 }
1279
1280 /* Does not exist so create one */
1281 ua_event = alloc_ust_app_event(uevent->attr.name, &uevent->attr);
1282 if (ua_event == NULL) {
1283 /* Only malloc can failed so something is really wrong */
1284 ret = -ENOMEM;
1285 goto end;
1286 }
1287 shadow_copy_event(ua_event, uevent);
1288
1289 /* Create it on the tracer side */
1290 ret = create_ust_event(app, ua_sess, ua_chan, ua_event);
1291 if (ret < 0) {
1292 /* Not found previously means that it does not exist on the tracer */
1293 assert(ret != -LTTNG_UST_ERR_EXIST);
1294 goto error;
1295 }
1296
1297 add_unique_ust_app_event(ua_chan->events, ua_event);
1298
1299 DBG2("UST app create event %s for PID %d completed", ua_event->name,
1300 app->pid);
1301
1302 end:
1303 return ret;
1304
1305 error:
1306 /* Valid. Calling here is already in a read side lock */
1307 delete_ust_app_event(-1, ua_event);
1308 return ret;
1309 }
1310
1311 /*
1312 * Create UST metadata and open it on the tracer side.
1313 */
1314 static int create_ust_app_metadata(struct ust_app_session *ua_sess,
1315 char *pathname, struct ust_app *app)
1316 {
1317 int ret = 0;
1318
1319 if (ua_sess->metadata == NULL) {
1320 /* Allocate UST metadata */
1321 ua_sess->metadata = trace_ust_create_metadata(pathname);
1322 if (ua_sess->metadata == NULL) {
1323 /* malloc() failed */
1324 goto error;
1325 }
1326
1327 ret = open_ust_metadata(app, ua_sess);
1328 if (ret < 0) {
1329 DBG3("Opening metadata failed. Cleaning up memory");
1330
1331 /* Cleanup failed metadata struct */
1332 free(ua_sess->metadata);
1333 /*
1334 * This is very important because delete_ust_app_session check if
1335 * the pointer is null or not in order to delete the metadata.
1336 */
1337 ua_sess->metadata = NULL;
1338 goto error;
1339 }
1340
1341 DBG2("UST metadata opened for app pid %d", app->pid);
1342 }
1343
1344 /* Open UST metadata stream */
1345 if (ua_sess->metadata->stream_obj == NULL) {
1346 ret = create_ust_stream(app, ua_sess);
1347 if (ret < 0) {
1348 goto error;
1349 }
1350
1351 ret = snprintf(ua_sess->metadata->pathname, PATH_MAX,
1352 "%s/metadata", ua_sess->path);
1353 if (ret < 0) {
1354 PERROR("asprintf UST create stream");
1355 goto error;
1356 }
1357
1358 DBG2("UST metadata stream object created for app pid %d",
1359 app->pid);
1360 } else {
1361 ERR("Attempting to create stream without metadata opened");
1362 goto error;
1363 }
1364
1365 return 0;
1366
1367 error:
1368 return -1;
1369 }
1370
1371 /*
1372 * Return pointer to traceable apps list.
1373 */
1374 struct lttng_ht *ust_app_get_ht(void)
1375 {
1376 return ust_app_ht;
1377 }
1378
1379 /*
1380 * Return ust app pointer or NULL if not found.
1381 */
1382 struct ust_app *ust_app_find_by_pid(pid_t pid)
1383 {
1384 struct lttng_ht_node_ulong *node;
1385 struct lttng_ht_iter iter;
1386
1387 rcu_read_lock();
1388 lttng_ht_lookup(ust_app_ht, (void *)((unsigned long) pid), &iter);
1389 node = lttng_ht_iter_get_node_ulong(&iter);
1390 if (node == NULL) {
1391 DBG2("UST app no found with pid %d", pid);
1392 goto error;
1393 }
1394 rcu_read_unlock();
1395
1396 DBG2("Found UST app by pid %d", pid);
1397
1398 return caa_container_of(node, struct ust_app, pid_n);
1399
1400 error:
1401 rcu_read_unlock();
1402 return NULL;
1403 }
1404
1405 /*
1406 * Using pid and uid (of the app), allocate a new ust_app struct and
1407 * add it to the global traceable app list.
1408 *
1409 * On success, return 0, else return malloc -ENOMEM, or -EINVAL if app
1410 * bitness is not supported.
1411 */
1412 int ust_app_register(struct ust_register_msg *msg, int sock)
1413 {
1414 struct ust_app *lta;
1415 int ret;
1416
1417 if ((msg->bits_per_long == 64 &&
1418 (uatomic_read(&ust_consumerd64_fd) == -EINVAL))
1419 || (msg->bits_per_long == 32 &&
1420 (uatomic_read(&ust_consumerd32_fd) == -EINVAL))) {
1421 ERR("Registration failed: application \"%s\" (pid: %d) has "
1422 "%d-bit long, but no consumerd for this long size is available.\n",
1423 msg->name, msg->pid, msg->bits_per_long);
1424 ret = close(sock);
1425 if (ret) {
1426 PERROR("close");
1427 }
1428 lttng_fd_put(LTTNG_FD_APPS, 1);
1429 return -EINVAL;
1430 }
1431 if (msg->major != LTTNG_UST_COMM_MAJOR) {
1432 ERR("Registration failed: application \"%s\" (pid: %d) has "
1433 "communication protocol version %u.%u, but sessiond supports 2.x.\n",
1434 msg->name, msg->pid, msg->major, msg->minor);
1435 ret = close(sock);
1436 if (ret) {
1437 PERROR("close");
1438 }
1439 lttng_fd_put(LTTNG_FD_APPS, 1);
1440 return -EINVAL;
1441 }
1442 lta = zmalloc(sizeof(struct ust_app));
1443 if (lta == NULL) {
1444 PERROR("malloc");
1445 return -ENOMEM;
1446 }
1447
1448 lta->ppid = msg->ppid;
1449 lta->uid = msg->uid;
1450 lta->gid = msg->gid;
1451 lta->compatible = 0; /* Not compatible until proven */
1452 lta->bits_per_long = msg->bits_per_long;
1453 lta->v_major = msg->major;
1454 lta->v_minor = msg->minor;
1455 strncpy(lta->name, msg->name, sizeof(lta->name));
1456 lta->name[16] = '\0';
1457 lta->sessions = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
1458
1459 lta->pid = msg->pid;
1460 lttng_ht_node_init_ulong(&lta->pid_n, (unsigned long)lta->pid);
1461 lta->sock = sock;
1462 lttng_ht_node_init_ulong(&lta->sock_n, (unsigned long)lta->sock);
1463
1464 CDS_INIT_LIST_HEAD(&lta->teardown_head);
1465
1466 rcu_read_lock();
1467
1468 /*
1469 * On a re-registration, we want to kick out the previous registration of
1470 * that pid
1471 */
1472 lttng_ht_add_replace_ulong(ust_app_ht, &lta->pid_n);
1473
1474 /*
1475 * The socket _should_ be unique until _we_ call close. So, a add_unique
1476 * for the ust_app_ht_by_sock is used which asserts fail if the entry was
1477 * already in the table.
1478 */
1479 lttng_ht_add_unique_ulong(ust_app_ht_by_sock, &lta->sock_n);
1480
1481 rcu_read_unlock();
1482
1483 DBG("App registered with pid:%d ppid:%d uid:%d gid:%d sock:%d name:%s"
1484 " (version %d.%d)", lta->pid, lta->ppid, lta->uid, lta->gid,
1485 lta->sock, lta->name, lta->v_major, lta->v_minor);
1486
1487 return 0;
1488 }
1489
1490 /*
1491 * Unregister app by removing it from the global traceable app list and freeing
1492 * the data struct.
1493 *
1494 * The socket is already closed at this point so no close to sock.
1495 */
1496 void ust_app_unregister(int sock)
1497 {
1498 struct ust_app *lta;
1499 struct lttng_ht_node_ulong *node;
1500 struct lttng_ht_iter iter;
1501 struct ust_app_session *ua_sess;
1502 int ret;
1503
1504 rcu_read_lock();
1505
1506 /* Get the node reference for a call_rcu */
1507 lttng_ht_lookup(ust_app_ht_by_sock, (void *)((unsigned long) sock), &iter);
1508 node = lttng_ht_iter_get_node_ulong(&iter);
1509 if (node == NULL) {
1510 ERR("Unable to find app by sock %d", sock);
1511 goto error;
1512 }
1513
1514 lta = caa_container_of(node, struct ust_app, sock_n);
1515
1516 DBG("PID %d unregistering with sock %d", lta->pid, sock);
1517
1518 /* Remove application from PID hash table */
1519 ret = lttng_ht_del(ust_app_ht_by_sock, &iter);
1520 assert(!ret);
1521
1522 /* Assign second node for deletion */
1523 iter.iter.node = &lta->pid_n.node;
1524
1525 /*
1526 * Ignore return value since the node might have been removed before by an
1527 * add replace during app registration because the PID can be reassigned by
1528 * the OS.
1529 */
1530 ret = lttng_ht_del(ust_app_ht, &iter);
1531 if (ret) {
1532 DBG3("Unregister app by PID %d failed. This can happen on pid reuse",
1533 lta->pid);
1534 }
1535
1536 /* Remove sessions so they are not visible during deletion.*/
1537 cds_lfht_for_each_entry(lta->sessions->ht, &iter.iter, ua_sess,
1538 node.node) {
1539 ret = lttng_ht_del(lta->sessions, &iter);
1540 if (ret) {
1541 /* The session was already removed so scheduled for teardown. */
1542 continue;
1543 }
1544
1545 /*
1546 * Add session to list for teardown. This is safe since at this point we
1547 * are the only one using this list.
1548 */
1549 cds_list_add(&ua_sess->teardown_node, &lta->teardown_head);
1550 }
1551
1552 /* Free memory */
1553 call_rcu(&lta->pid_n.head, delete_ust_app_rcu);
1554
1555 error:
1556 rcu_read_unlock();
1557 return;
1558 }
1559
1560 /*
1561 * Return traceable_app_count
1562 */
1563 unsigned long ust_app_list_count(void)
1564 {
1565 unsigned long count;
1566
1567 rcu_read_lock();
1568 count = lttng_ht_get_count(ust_app_ht);
1569 rcu_read_unlock();
1570
1571 return count;
1572 }
1573
1574 /*
1575 * Fill events array with all events name of all registered apps.
1576 */
1577 int ust_app_list_events(struct lttng_event **events)
1578 {
1579 int ret, handle;
1580 size_t nbmem, count = 0;
1581 struct lttng_ht_iter iter;
1582 struct ust_app *app;
1583 struct lttng_event *tmp;
1584
1585 nbmem = UST_APP_EVENT_LIST_SIZE;
1586 tmp = zmalloc(nbmem * sizeof(struct lttng_event));
1587 if (tmp == NULL) {
1588 PERROR("zmalloc ust app events");
1589 ret = -ENOMEM;
1590 goto error;
1591 }
1592
1593 rcu_read_lock();
1594
1595 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1596 struct lttng_ust_tracepoint_iter uiter;
1597
1598 health_code_update(&health_thread_cmd);
1599
1600 if (!app->compatible) {
1601 /*
1602 * TODO: In time, we should notice the caller of this error by
1603 * telling him that this is a version error.
1604 */
1605 continue;
1606 }
1607 handle = ustctl_tracepoint_list(app->sock);
1608 if (handle < 0) {
1609 ERR("UST app list events getting handle failed for app pid %d",
1610 app->pid);
1611 continue;
1612 }
1613
1614 while ((ret = ustctl_tracepoint_list_get(app->sock, handle,
1615 &uiter)) != -LTTNG_UST_ERR_NOENT) {
1616 health_code_update(&health_thread_cmd);
1617 if (count >= nbmem) {
1618 /* In case the realloc fails, we free the memory */
1619 void *tmp_ptr = (void *) tmp;
1620 DBG2("Reallocating event list from %zu to %zu entries", nbmem,
1621 2 * nbmem);
1622 nbmem *= 2;
1623 tmp = realloc(tmp, nbmem * sizeof(struct lttng_event));
1624 if (tmp == NULL) {
1625 PERROR("realloc ust app events");
1626 free(tmp_ptr);
1627 ret = -ENOMEM;
1628 goto rcu_error;
1629 }
1630 }
1631 memcpy(tmp[count].name, uiter.name, LTTNG_UST_SYM_NAME_LEN);
1632 tmp[count].loglevel = uiter.loglevel;
1633 tmp[count].type = (enum lttng_event_type) LTTNG_UST_TRACEPOINT;
1634 tmp[count].pid = app->pid;
1635 tmp[count].enabled = -1;
1636 count++;
1637 }
1638 }
1639
1640 ret = count;
1641 *events = tmp;
1642
1643 DBG2("UST app list events done (%zu events)", count);
1644
1645 rcu_error:
1646 rcu_read_unlock();
1647 error:
1648 health_code_update(&health_thread_cmd);
1649 return ret;
1650 }
1651
1652 /*
1653 * Fill events array with all events name of all registered apps.
1654 */
1655 int ust_app_list_event_fields(struct lttng_event_field **fields)
1656 {
1657 int ret, handle;
1658 size_t nbmem, count = 0;
1659 struct lttng_ht_iter iter;
1660 struct ust_app *app;
1661 struct lttng_event_field *tmp;
1662
1663 nbmem = UST_APP_EVENT_LIST_SIZE;
1664 tmp = zmalloc(nbmem * sizeof(struct lttng_event_field));
1665 if (tmp == NULL) {
1666 PERROR("zmalloc ust app event fields");
1667 ret = -ENOMEM;
1668 goto error;
1669 }
1670
1671 rcu_read_lock();
1672
1673 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1674 struct lttng_ust_field_iter uiter;
1675
1676 health_code_update(&health_thread_cmd);
1677
1678 if (!app->compatible) {
1679 /*
1680 * TODO: In time, we should notice the caller of this error by
1681 * telling him that this is a version error.
1682 */
1683 continue;
1684 }
1685 handle = ustctl_tracepoint_field_list(app->sock);
1686 if (handle < 0) {
1687 ERR("UST app list event fields getting handle failed for app pid %d",
1688 app->pid);
1689 continue;
1690 }
1691
1692 while ((ret = ustctl_tracepoint_field_list_get(app->sock, handle,
1693 &uiter)) != -LTTNG_UST_ERR_NOENT) {
1694 health_code_update(&health_thread_cmd);
1695 if (count >= nbmem) {
1696 /* In case the realloc fails, we free the memory */
1697 void *tmp_ptr = (void *) tmp;
1698 DBG2("Reallocating event field list from %zu to %zu entries", nbmem,
1699 2 * nbmem);
1700 nbmem *= 2;
1701 tmp = realloc(tmp, nbmem * sizeof(struct lttng_event_field));
1702 if (tmp == NULL) {
1703 PERROR("realloc ust app event fields");
1704 free(tmp_ptr);
1705 ret = -ENOMEM;
1706 goto rcu_error;
1707 }
1708 }
1709
1710 memcpy(tmp[count].field_name, uiter.field_name, LTTNG_UST_SYM_NAME_LEN);
1711 tmp[count].type = uiter.type;
1712 tmp[count].nowrite = uiter.nowrite;
1713
1714 memcpy(tmp[count].event.name, uiter.event_name, LTTNG_UST_SYM_NAME_LEN);
1715 tmp[count].event.loglevel = uiter.loglevel;
1716 tmp[count].event.type = LTTNG_UST_TRACEPOINT;
1717 tmp[count].event.pid = app->pid;
1718 tmp[count].event.enabled = -1;
1719 count++;
1720 }
1721 }
1722
1723 ret = count;
1724 *fields = tmp;
1725
1726 DBG2("UST app list event fields done (%zu events)", count);
1727
1728 rcu_error:
1729 rcu_read_unlock();
1730 error:
1731 health_code_update(&health_thread_cmd);
1732 return ret;
1733 }
1734
1735 /*
1736 * Free and clean all traceable apps of the global list.
1737 */
1738 void ust_app_clean_list(void)
1739 {
1740 int ret;
1741 struct ust_app *app;
1742 struct lttng_ht_iter iter;
1743
1744 DBG2("UST app cleaning registered apps hash table");
1745
1746 rcu_read_lock();
1747
1748 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1749 ret = lttng_ht_del(ust_app_ht, &iter);
1750 assert(!ret);
1751 call_rcu(&app->pid_n.head, delete_ust_app_rcu);
1752 }
1753
1754 /* Cleanup socket hash table */
1755 cds_lfht_for_each_entry(ust_app_ht_by_sock->ht, &iter.iter, app,
1756 sock_n.node) {
1757 ret = lttng_ht_del(ust_app_ht_by_sock, &iter);
1758 assert(!ret);
1759 }
1760
1761 /* Destroy is done only when the ht is empty */
1762 lttng_ht_destroy(ust_app_ht);
1763 lttng_ht_destroy(ust_app_ht_by_sock);
1764
1765 rcu_read_unlock();
1766 }
1767
1768 /*
1769 * Init UST app hash table.
1770 */
1771 void ust_app_ht_alloc(void)
1772 {
1773 ust_app_ht = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
1774 ust_app_ht_by_sock = lttng_ht_new(0, LTTNG_HT_TYPE_ULONG);
1775 }
1776
1777 /*
1778 * For a specific UST session, disable the channel for all registered apps.
1779 */
1780 int ust_app_disable_channel_glb(struct ltt_ust_session *usess,
1781 struct ltt_ust_channel *uchan)
1782 {
1783 int ret = 0;
1784 struct lttng_ht_iter iter;
1785 struct lttng_ht_node_str *ua_chan_node;
1786 struct ust_app *app;
1787 struct ust_app_session *ua_sess;
1788 struct ust_app_channel *ua_chan;
1789
1790 if (usess == NULL || uchan == NULL) {
1791 ERR("Disabling UST global channel with NULL values");
1792 ret = -1;
1793 goto error;
1794 }
1795
1796 DBG2("UST app disabling channel %s from global domain for session id %d",
1797 uchan->name, usess->id);
1798
1799 rcu_read_lock();
1800
1801 /* For every registered applications */
1802 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1803 struct lttng_ht_iter uiter;
1804 if (!app->compatible) {
1805 /*
1806 * TODO: In time, we should notice the caller of this error by
1807 * telling him that this is a version error.
1808 */
1809 continue;
1810 }
1811 ua_sess = lookup_session_by_app(usess, app);
1812 if (ua_sess == NULL) {
1813 continue;
1814 }
1815
1816 /* Get channel */
1817 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
1818 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
1819 /* If the session if found for the app, the channel must be there */
1820 assert(ua_chan_node);
1821
1822 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1823 /* The channel must not be already disabled */
1824 assert(ua_chan->enabled == 1);
1825
1826 /* Disable channel onto application */
1827 ret = disable_ust_app_channel(ua_sess, ua_chan, app);
1828 if (ret < 0) {
1829 /* XXX: We might want to report this error at some point... */
1830 continue;
1831 }
1832 }
1833
1834 rcu_read_unlock();
1835
1836 error:
1837 return ret;
1838 }
1839
1840 /*
1841 * For a specific UST session, enable the channel for all registered apps.
1842 */
1843 int ust_app_enable_channel_glb(struct ltt_ust_session *usess,
1844 struct ltt_ust_channel *uchan)
1845 {
1846 int ret = 0;
1847 struct lttng_ht_iter iter;
1848 struct ust_app *app;
1849 struct ust_app_session *ua_sess;
1850
1851 if (usess == NULL || uchan == NULL) {
1852 ERR("Adding UST global channel to NULL values");
1853 ret = -1;
1854 goto error;
1855 }
1856
1857 DBG2("UST app enabling channel %s to global domain for session id %d",
1858 uchan->name, usess->id);
1859
1860 rcu_read_lock();
1861
1862 /* For every registered applications */
1863 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1864 if (!app->compatible) {
1865 /*
1866 * TODO: In time, we should notice the caller of this error by
1867 * telling him that this is a version error.
1868 */
1869 continue;
1870 }
1871 ua_sess = lookup_session_by_app(usess, app);
1872 if (ua_sess == NULL) {
1873 continue;
1874 }
1875
1876 /* Enable channel onto application */
1877 ret = enable_ust_app_channel(ua_sess, uchan, app);
1878 if (ret < 0) {
1879 /* XXX: We might want to report this error at some point... */
1880 continue;
1881 }
1882 }
1883
1884 rcu_read_unlock();
1885
1886 error:
1887 return ret;
1888 }
1889
1890 /*
1891 * Disable an event in a channel and for a specific session.
1892 */
1893 int ust_app_disable_event_glb(struct ltt_ust_session *usess,
1894 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent)
1895 {
1896 int ret = 0;
1897 struct lttng_ht_iter iter, uiter;
1898 struct lttng_ht_node_str *ua_chan_node, *ua_event_node;
1899 struct ust_app *app;
1900 struct ust_app_session *ua_sess;
1901 struct ust_app_channel *ua_chan;
1902 struct ust_app_event *ua_event;
1903
1904 DBG("UST app disabling event %s for all apps in channel "
1905 "%s for session id %d", uevent->attr.name, uchan->name, usess->id);
1906
1907 rcu_read_lock();
1908
1909 /* For all registered applications */
1910 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1911 if (!app->compatible) {
1912 /*
1913 * TODO: In time, we should notice the caller of this error by
1914 * telling him that this is a version error.
1915 */
1916 continue;
1917 }
1918 ua_sess = lookup_session_by_app(usess, app);
1919 if (ua_sess == NULL) {
1920 /* Next app */
1921 continue;
1922 }
1923
1924 /* Lookup channel in the ust app session */
1925 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
1926 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
1927 if (ua_chan_node == NULL) {
1928 DBG2("Channel %s not found in session id %d for app pid %d."
1929 "Skipping", uchan->name, usess->id, app->pid);
1930 continue;
1931 }
1932 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1933
1934 lttng_ht_lookup(ua_chan->events, (void *)uevent->attr.name, &uiter);
1935 ua_event_node = lttng_ht_iter_get_node_str(&uiter);
1936 if (ua_event_node == NULL) {
1937 DBG2("Event %s not found in channel %s for app pid %d."
1938 "Skipping", uevent->attr.name, uchan->name, app->pid);
1939 continue;
1940 }
1941 ua_event = caa_container_of(ua_event_node, struct ust_app_event, node);
1942
1943 ret = disable_ust_app_event(ua_sess, ua_event, app);
1944 if (ret < 0) {
1945 /* XXX: Report error someday... */
1946 continue;
1947 }
1948 }
1949
1950 rcu_read_unlock();
1951
1952 return ret;
1953 }
1954
1955 /*
1956 * For a specific UST session and UST channel, the event for all
1957 * registered apps.
1958 */
1959 int ust_app_disable_all_event_glb(struct ltt_ust_session *usess,
1960 struct ltt_ust_channel *uchan)
1961 {
1962 int ret = 0;
1963 struct lttng_ht_iter iter, uiter;
1964 struct lttng_ht_node_str *ua_chan_node;
1965 struct ust_app *app;
1966 struct ust_app_session *ua_sess;
1967 struct ust_app_channel *ua_chan;
1968 struct ust_app_event *ua_event;
1969
1970 DBG("UST app disabling all event for all apps in channel "
1971 "%s for session id %d", uchan->name, usess->id);
1972
1973 rcu_read_lock();
1974
1975 /* For all registered applications */
1976 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
1977 if (!app->compatible) {
1978 /*
1979 * TODO: In time, we should notice the caller of this error by
1980 * telling him that this is a version error.
1981 */
1982 continue;
1983 }
1984 ua_sess = lookup_session_by_app(usess, app);
1985 if (!ua_sess) {
1986 /* The application has problem or is probably dead. */
1987 continue;
1988 }
1989
1990 /* Lookup channel in the ust app session */
1991 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
1992 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
1993 /* If the channel is not found, there is a code flow error */
1994 assert(ua_chan_node);
1995
1996 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
1997
1998 /* Disable each events of channel */
1999 cds_lfht_for_each_entry(ua_chan->events->ht, &uiter.iter, ua_event,
2000 node.node) {
2001 ret = disable_ust_app_event(ua_sess, ua_event, app);
2002 if (ret < 0) {
2003 /* XXX: Report error someday... */
2004 continue;
2005 }
2006 }
2007 }
2008
2009 rcu_read_unlock();
2010
2011 return ret;
2012 }
2013
2014 /*
2015 * For a specific UST session, create the channel for all registered apps.
2016 */
2017 int ust_app_create_channel_glb(struct ltt_ust_session *usess,
2018 struct ltt_ust_channel *uchan)
2019 {
2020 int ret = 0;
2021 struct lttng_ht_iter iter;
2022 struct ust_app *app;
2023 struct ust_app_session *ua_sess;
2024 struct ust_app_channel *ua_chan;
2025
2026 /* Very wrong code flow */
2027 assert(usess);
2028 assert(uchan);
2029
2030 DBG2("UST app adding channel %s to global domain for session id %d",
2031 uchan->name, usess->id);
2032
2033 rcu_read_lock();
2034
2035 /* For every registered applications */
2036 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2037 if (!app->compatible) {
2038 /*
2039 * TODO: In time, we should notice the caller of this error by
2040 * telling him that this is a version error.
2041 */
2042 continue;
2043 }
2044 /*
2045 * Create session on the tracer side and add it to app session HT. Note
2046 * that if session exist, it will simply return a pointer to the ust
2047 * app session.
2048 */
2049 ua_sess = create_ust_app_session(usess, app);
2050 if (ua_sess == NULL) {
2051 /* The malloc() failed. */
2052 ret = -1;
2053 goto error;
2054 } else if (ua_sess == (void *) -1UL) {
2055 /* The application's socket is not valid. Contiuing */
2056 ret = -1;
2057 continue;
2058 }
2059
2060 /* Create channel onto application */
2061 ua_chan = create_ust_app_channel(ua_sess, uchan, app);
2062 if (ua_chan == NULL) {
2063 /* Major problem here and it's maybe the tracer or malloc() */
2064 ret = -1;
2065 goto error;
2066 }
2067 }
2068
2069 rcu_read_unlock();
2070
2071 error:
2072 return ret;
2073 }
2074
2075 /*
2076 * Enable event for a specific session and channel on the tracer.
2077 */
2078 int ust_app_enable_event_glb(struct ltt_ust_session *usess,
2079 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent)
2080 {
2081 int ret = 0;
2082 struct lttng_ht_iter iter, uiter;
2083 struct lttng_ht_node_str *ua_chan_node;
2084 struct ust_app *app;
2085 struct ust_app_session *ua_sess;
2086 struct ust_app_channel *ua_chan;
2087 struct ust_app_event *ua_event;
2088
2089 DBG("UST app enabling event %s for all apps for session id %d",
2090 uevent->attr.name, usess->id);
2091
2092 /*
2093 * NOTE: At this point, this function is called only if the session and
2094 * channel passed are already created for all apps. and enabled on the
2095 * tracer also.
2096 */
2097
2098 rcu_read_lock();
2099
2100 /* For all registered applications */
2101 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2102 if (!app->compatible) {
2103 /*
2104 * TODO: In time, we should notice the caller of this error by
2105 * telling him that this is a version error.
2106 */
2107 continue;
2108 }
2109 ua_sess = lookup_session_by_app(usess, app);
2110 if (!ua_sess) {
2111 /* The application has problem or is probably dead. */
2112 continue;
2113 }
2114
2115 /* Lookup channel in the ust app session */
2116 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
2117 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
2118 /* If the channel is not found, there is a code flow error */
2119 assert(ua_chan_node);
2120
2121 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
2122
2123 /* Get event node */
2124 ua_event = find_ust_app_event(ua_chan->events, uevent->attr.name,
2125 uevent->filter, uevent->attr.loglevel);
2126 if (ua_event == NULL) {
2127 DBG3("UST app enable event %s not found for app PID %d."
2128 "Skipping app", uevent->attr.name, app->pid);
2129 continue;
2130 }
2131
2132 ret = enable_ust_app_event(ua_sess, ua_event, app);
2133 if (ret < 0) {
2134 goto error;
2135 }
2136 }
2137
2138 error:
2139 rcu_read_unlock();
2140 return ret;
2141 }
2142
2143 /*
2144 * For a specific existing UST session and UST channel, creates the event for
2145 * all registered apps.
2146 */
2147 int ust_app_create_event_glb(struct ltt_ust_session *usess,
2148 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent)
2149 {
2150 int ret = 0;
2151 struct lttng_ht_iter iter, uiter;
2152 struct lttng_ht_node_str *ua_chan_node;
2153 struct ust_app *app;
2154 struct ust_app_session *ua_sess;
2155 struct ust_app_channel *ua_chan;
2156
2157 DBG("UST app creating event %s for all apps for session id %d",
2158 uevent->attr.name, usess->id);
2159
2160 rcu_read_lock();
2161
2162 /* For all registered applications */
2163 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2164 if (!app->compatible) {
2165 /*
2166 * TODO: In time, we should notice the caller of this error by
2167 * telling him that this is a version error.
2168 */
2169 continue;
2170 }
2171 ua_sess = lookup_session_by_app(usess, app);
2172 if (!ua_sess) {
2173 /* The application has problem or is probably dead. */
2174 continue;
2175 }
2176
2177 /* Lookup channel in the ust app session */
2178 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
2179 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
2180 /* If the channel is not found, there is a code flow error */
2181 assert(ua_chan_node);
2182
2183 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
2184
2185 ret = create_ust_app_event(ua_sess, ua_chan, uevent, app);
2186 if (ret < 0) {
2187 if (ret != -LTTNG_UST_ERR_EXIST) {
2188 /* Possible value at this point: -ENOMEM. If so, we stop! */
2189 break;
2190 }
2191 DBG2("UST app event %s already exist on app PID %d",
2192 uevent->attr.name, app->pid);
2193 continue;
2194 }
2195 }
2196
2197 rcu_read_unlock();
2198
2199 return ret;
2200 }
2201
2202 /*
2203 * Start tracing for a specific UST session and app.
2204 */
2205 int ust_app_start_trace(struct ltt_ust_session *usess, struct ust_app *app)
2206 {
2207 int ret = 0;
2208 struct lttng_ht_iter iter;
2209 struct ust_app_session *ua_sess;
2210 struct ust_app_channel *ua_chan;
2211 struct ltt_ust_stream *ustream;
2212 struct consumer_socket *socket;
2213
2214 DBG("Starting tracing for ust app pid %d", app->pid);
2215
2216 rcu_read_lock();
2217
2218 if (!app->compatible) {
2219 goto end;
2220 }
2221
2222 ua_sess = lookup_session_by_app(usess, app);
2223 if (ua_sess == NULL) {
2224 /* The session is in teardown process. Ignore and continue. */
2225 goto end;
2226 }
2227
2228 /* Upon restart, we skip the setup, already done */
2229 if (ua_sess->started) {
2230 goto skip_setup;
2231 }
2232
2233 /* Create directories if consumer is LOCAL and has a path defined. */
2234 if (usess->consumer->type == CONSUMER_DST_LOCAL &&
2235 strlen(usess->consumer->dst.trace_path) > 0) {
2236 ret = run_as_mkdir_recursive(usess->consumer->dst.trace_path,
2237 S_IRWXU | S_IRWXG, usess->uid, usess->gid);
2238 if (ret < 0) {
2239 if (ret != -EEXIST) {
2240 ERR("Trace directory creation error");
2241 ret = -1;
2242 goto error_rcu_unlock;
2243 }
2244 }
2245 }
2246
2247 /* Indicate that the session has been started once */
2248 ua_sess->started = 1;
2249
2250 ret = create_ust_app_metadata(ua_sess, usess->pathname, app);
2251 if (ret < 0) {
2252 ret = LTTNG_ERR_UST_META_FAIL;
2253 goto error_rcu_unlock;
2254 }
2255
2256 /* For each channel */
2257 cds_lfht_for_each_entry(ua_sess->channels->ht, &iter.iter, ua_chan,
2258 node.node) {
2259 /* Create all streams */
2260 while (1) {
2261 /* Create UST stream */
2262 ustream = zmalloc(sizeof(*ustream));
2263 if (ustream == NULL) {
2264 PERROR("zmalloc ust stream");
2265 goto error_rcu_unlock;
2266 }
2267
2268 /* We are going to receive 2 fds, we need to reserve them. */
2269 ret = lttng_fd_get(LTTNG_FD_APPS, 2);
2270 if (ret < 0) {
2271 ERR("Exhausted number of available FD upon stream create");
2272 free(ustream);
2273 goto error_rcu_unlock;
2274 }
2275
2276 health_code_update(&health_thread_cmd);
2277
2278 ret = ustctl_create_stream(app->sock, ua_chan->obj,
2279 &ustream->obj);
2280 if (ret < 0) {
2281 /* Got all streams */
2282 lttng_fd_put(LTTNG_FD_APPS, 2);
2283 free(ustream);
2284 ret = LTTNG_ERR_UST_STREAM_FAIL;
2285 break;
2286 }
2287 ustream->handle = ustream->obj->handle;
2288
2289 health_code_update(&health_thread_cmd);
2290
2291 /* Order is important */
2292 cds_list_add_tail(&ustream->list, &ua_chan->streams.head);
2293 ret = snprintf(ustream->name, sizeof(ustream->name), "%s_%u",
2294 ua_chan->name, ua_chan->streams.count);
2295 ua_chan->streams.count++;
2296 if (ret < 0) {
2297 PERROR("asprintf UST create stream");
2298 /*
2299 * XXX what should we do here with the
2300 * stream ?
2301 */
2302 continue;
2303 }
2304 DBG2("UST stream %d ready (handle: %d)", ua_chan->streams.count,
2305 ustream->handle);
2306 }
2307
2308 health_code_update(&health_thread_cmd);
2309 }
2310
2311 switch (app->bits_per_long) {
2312 case 64:
2313 socket = consumer_find_socket(uatomic_read(&ust_consumerd64_fd),
2314 usess->consumer);
2315 if (socket == NULL) {
2316 goto skip_setup;
2317 }
2318 break;
2319 case 32:
2320 socket = consumer_find_socket(uatomic_read(&ust_consumerd32_fd),
2321 usess->consumer);
2322 if (socket == NULL) {
2323 goto skip_setup;
2324 }
2325 break;
2326 default:
2327 ret = -EINVAL;
2328 goto error_rcu_unlock;
2329 }
2330
2331 /* Setup UST consumer socket and send fds to it */
2332 ret = ust_consumer_send_session(ua_sess, usess->consumer, socket);
2333 if (ret < 0) {
2334 goto error_rcu_unlock;
2335 }
2336
2337 health_code_update(&health_thread_cmd);
2338
2339 skip_setup:
2340 /* This start the UST tracing */
2341 ret = ustctl_start_session(app->sock, ua_sess->handle);
2342 if (ret < 0) {
2343 ERR("Error starting tracing for app pid: %d", app->pid);
2344 goto error_rcu_unlock;
2345 }
2346
2347 health_code_update(&health_thread_cmd);
2348
2349 /* Quiescent wait after starting trace */
2350 ustctl_wait_quiescent(app->sock);
2351
2352 end:
2353 rcu_read_unlock();
2354 health_code_update(&health_thread_cmd);
2355 return 0;
2356
2357 error_rcu_unlock:
2358 rcu_read_unlock();
2359 health_code_update(&health_thread_cmd);
2360 return -1;
2361 }
2362
2363 /*
2364 * Stop tracing for a specific UST session and app.
2365 */
2366 int ust_app_stop_trace(struct ltt_ust_session *usess, struct ust_app *app)
2367 {
2368 int ret = 0;
2369 struct lttng_ht_iter iter;
2370 struct ust_app_session *ua_sess;
2371 struct ust_app_channel *ua_chan;
2372
2373 DBG("Stopping tracing for ust app pid %d", app->pid);
2374
2375 rcu_read_lock();
2376
2377 if (!app->compatible) {
2378 goto end;
2379 }
2380
2381 ua_sess = lookup_session_by_app(usess, app);
2382 if (ua_sess == NULL) {
2383 goto end;
2384 }
2385
2386 /*
2387 * If started = 0, it means that stop trace has been called for a session
2388 * that was never started. This is a code flow error and should never
2389 * happen.
2390 */
2391 assert(ua_sess->started == 1);
2392
2393 health_code_update(&health_thread_cmd);
2394
2395 /* This inhibits UST tracing */
2396 ret = ustctl_stop_session(app->sock, ua_sess->handle);
2397 if (ret < 0) {
2398 ERR("Error stopping tracing for app pid: %d", app->pid);
2399 goto error_rcu_unlock;
2400 }
2401
2402 health_code_update(&health_thread_cmd);
2403
2404 /* Quiescent wait after stopping trace */
2405 ustctl_wait_quiescent(app->sock);
2406
2407 health_code_update(&health_thread_cmd);
2408
2409 /* Flushing buffers */
2410 cds_lfht_for_each_entry(ua_sess->channels->ht, &iter.iter, ua_chan,
2411 node.node) {
2412 health_code_update(&health_thread_cmd);
2413 ret = ustctl_sock_flush_buffer(app->sock, ua_chan->obj);
2414 if (ret < 0) {
2415 ERR("UST app PID %d channel %s flush failed with ret %d",
2416 app->pid, ua_chan->name, ret);
2417 /* Continuing flushing all buffers */
2418 continue;
2419 }
2420 }
2421
2422 health_code_update(&health_thread_cmd);
2423
2424 /* Flush all buffers before stopping */
2425 ret = ustctl_sock_flush_buffer(app->sock, ua_sess->metadata->obj);
2426 if (ret < 0) {
2427 ERR("UST app PID %d metadata flush failed with ret %d", app->pid,
2428 ret);
2429 }
2430
2431 end:
2432 rcu_read_unlock();
2433 health_code_update(&health_thread_cmd);
2434 return 0;
2435
2436 error_rcu_unlock:
2437 rcu_read_unlock();
2438 health_code_update(&health_thread_cmd);
2439 return -1;
2440 }
2441
2442 /*
2443 * Destroy a specific UST session in apps.
2444 */
2445 int ust_app_destroy_trace(struct ltt_ust_session *usess, struct ust_app *app)
2446 {
2447 struct ust_app_session *ua_sess;
2448 struct lttng_ust_object_data obj;
2449 struct lttng_ht_iter iter;
2450 struct lttng_ht_node_ulong *node;
2451 int ret;
2452
2453 DBG("Destroy tracing for ust app pid %d", app->pid);
2454
2455 rcu_read_lock();
2456
2457 if (!app->compatible) {
2458 goto end;
2459 }
2460
2461 __lookup_session_by_app(usess, app, &iter);
2462 node = lttng_ht_iter_get_node_ulong(&iter);
2463 if (node == NULL) {
2464 /* Session is being or is deleted. */
2465 goto end;
2466 }
2467 ua_sess = caa_container_of(node, struct ust_app_session, node);
2468 ret = lttng_ht_del(app->sessions, &iter);
2469 if (ret) {
2470 /* Already scheduled for teardown. */
2471 goto end;
2472 }
2473
2474 obj.handle = ua_sess->handle;
2475 obj.shm_fd = -1;
2476 obj.wait_fd = -1;
2477 obj.memory_map_size = 0;
2478 health_code_update(&health_thread_cmd);
2479 ustctl_release_object(app->sock, &obj);
2480
2481 health_code_update(&health_thread_cmd);
2482 delete_ust_app_session(app->sock, ua_sess);
2483
2484 /* Quiescent wait after stopping trace */
2485 ustctl_wait_quiescent(app->sock);
2486
2487 end:
2488 rcu_read_unlock();
2489 health_code_update(&health_thread_cmd);
2490 return 0;
2491 }
2492
2493 /*
2494 * Start tracing for the UST session.
2495 */
2496 int ust_app_start_trace_all(struct ltt_ust_session *usess)
2497 {
2498 int ret = 0;
2499 struct lttng_ht_iter iter;
2500 struct ust_app *app;
2501
2502 DBG("Starting all UST traces");
2503
2504 rcu_read_lock();
2505
2506 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2507 ret = ust_app_start_trace(usess, app);
2508 if (ret < 0) {
2509 /* Continue to next apps even on error */
2510 continue;
2511 }
2512 }
2513
2514 rcu_read_unlock();
2515
2516 return 0;
2517 }
2518
2519 /*
2520 * Start tracing for the UST session.
2521 */
2522 int ust_app_stop_trace_all(struct ltt_ust_session *usess)
2523 {
2524 int ret = 0;
2525 struct lttng_ht_iter iter;
2526 struct ust_app *app;
2527
2528 DBG("Stopping all UST traces");
2529
2530 rcu_read_lock();
2531
2532 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2533 ret = ust_app_stop_trace(usess, app);
2534 if (ret < 0) {
2535 /* Continue to next apps even on error */
2536 continue;
2537 }
2538 }
2539
2540 rcu_read_unlock();
2541
2542 return 0;
2543 }
2544
2545 /*
2546 * Destroy app UST session.
2547 */
2548 int ust_app_destroy_trace_all(struct ltt_ust_session *usess)
2549 {
2550 int ret = 0;
2551 struct lttng_ht_iter iter;
2552 struct ust_app *app;
2553
2554 DBG("Destroy all UST traces");
2555
2556 rcu_read_lock();
2557
2558 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2559 ret = ust_app_destroy_trace(usess, app);
2560 if (ret < 0) {
2561 /* Continue to next apps even on error */
2562 continue;
2563 }
2564 }
2565
2566 rcu_read_unlock();
2567
2568 return 0;
2569 }
2570
2571 /*
2572 * Add channels/events from UST global domain to registered apps at sock.
2573 */
2574 void ust_app_global_update(struct ltt_ust_session *usess, int sock)
2575 {
2576 int ret = 0;
2577 struct lttng_ht_iter iter, uiter, iter_ctx;
2578 struct ust_app *app;
2579 struct ust_app_session *ua_sess;
2580 struct ust_app_channel *ua_chan;
2581 struct ust_app_event *ua_event;
2582 struct ust_app_ctx *ua_ctx;
2583
2584 if (usess == NULL) {
2585 ERR("No UST session on global update. Returning");
2586 goto error;
2587 }
2588
2589 DBG2("UST app global update for app sock %d for session id %d", sock,
2590 usess->id);
2591
2592 rcu_read_lock();
2593
2594 app = find_app_by_sock(sock);
2595 if (app == NULL) {
2596 ERR("Failed to update app sock %d", sock);
2597 goto error;
2598 }
2599
2600 if (!app->compatible) {
2601 goto error;
2602 }
2603
2604 ua_sess = create_ust_app_session(usess, app);
2605 if (ua_sess == NULL || ua_sess == (void *) -1UL) {
2606 /* Tracer is gone for this session and has been freed */
2607 goto error;
2608 }
2609
2610 /*
2611 * We can iterate safely here over all UST app session sicne the create ust
2612 * app session above made a shadow copy of the UST global domain from the
2613 * ltt ust session.
2614 */
2615 cds_lfht_for_each_entry(ua_sess->channels->ht, &iter.iter, ua_chan,
2616 node.node) {
2617 ret = create_ust_channel(app, ua_sess, ua_chan);
2618 if (ret < 0) {
2619 /* FIXME: Should we quit here or continue... */
2620 continue;
2621 }
2622
2623 cds_lfht_for_each_entry(ua_chan->ctx->ht, &iter_ctx.iter, ua_ctx,
2624 node.node) {
2625 ret = create_ust_channel_context(ua_chan, ua_ctx, app);
2626 if (ret < 0) {
2627 /* FIXME: Should we quit here or continue... */
2628 continue;
2629 }
2630 }
2631
2632
2633 /* For each events */
2634 cds_lfht_for_each_entry(ua_chan->events->ht, &uiter.iter, ua_event,
2635 node.node) {
2636 ret = create_ust_event(app, ua_sess, ua_chan, ua_event);
2637 if (ret < 0) {
2638 /* FIXME: Should we quit here or continue... */
2639 continue;
2640 }
2641
2642 ret = set_ust_event_filter(ua_event, app);
2643 if (ret < 0) {
2644 /* FIXME: Should we quit here or continue... */
2645 continue;
2646 }
2647 }
2648 }
2649
2650 if (usess->start_trace) {
2651 ret = ust_app_start_trace(usess, app);
2652 if (ret < 0) {
2653 goto error;
2654 }
2655
2656 DBG2("UST trace started for app pid %d", app->pid);
2657 }
2658
2659 error:
2660 rcu_read_unlock();
2661 return;
2662 }
2663
2664 /*
2665 * Add context to a specific channel for global UST domain.
2666 */
2667 int ust_app_add_ctx_channel_glb(struct ltt_ust_session *usess,
2668 struct ltt_ust_channel *uchan, struct ltt_ust_context *uctx)
2669 {
2670 int ret = 0;
2671 struct lttng_ht_node_str *ua_chan_node;
2672 struct lttng_ht_iter iter, uiter;
2673 struct ust_app_channel *ua_chan = NULL;
2674 struct ust_app_session *ua_sess;
2675 struct ust_app *app;
2676
2677 rcu_read_lock();
2678
2679 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2680 if (!app->compatible) {
2681 /*
2682 * TODO: In time, we should notice the caller of this error by
2683 * telling him that this is a version error.
2684 */
2685 continue;
2686 }
2687 ua_sess = lookup_session_by_app(usess, app);
2688 if (ua_sess == NULL) {
2689 continue;
2690 }
2691
2692 /* Lookup channel in the ust app session */
2693 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &uiter);
2694 ua_chan_node = lttng_ht_iter_get_node_str(&uiter);
2695 if (ua_chan_node == NULL) {
2696 continue;
2697 }
2698 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel,
2699 node);
2700
2701 ret = create_ust_app_channel_context(ua_sess, ua_chan, &uctx->ctx, app);
2702 if (ret < 0) {
2703 continue;
2704 }
2705 }
2706
2707 rcu_read_unlock();
2708 return ret;
2709 }
2710
2711 /*
2712 * Enable event for a channel from a UST session for a specific PID.
2713 */
2714 int ust_app_enable_event_pid(struct ltt_ust_session *usess,
2715 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent, pid_t pid)
2716 {
2717 int ret = 0;
2718 struct lttng_ht_iter iter;
2719 struct lttng_ht_node_str *ua_chan_node;
2720 struct ust_app *app;
2721 struct ust_app_session *ua_sess;
2722 struct ust_app_channel *ua_chan;
2723 struct ust_app_event *ua_event;
2724
2725 DBG("UST app enabling event %s for PID %d", uevent->attr.name, pid);
2726
2727 rcu_read_lock();
2728
2729 app = ust_app_find_by_pid(pid);
2730 if (app == NULL) {
2731 ERR("UST app enable event per PID %d not found", pid);
2732 ret = -1;
2733 goto error;
2734 }
2735
2736 if (!app->compatible) {
2737 ret = 0;
2738 goto error;
2739 }
2740
2741 ua_sess = lookup_session_by_app(usess, app);
2742 if (!ua_sess) {
2743 /* The application has problem or is probably dead. */
2744 goto error;
2745 }
2746
2747 /* Lookup channel in the ust app session */
2748 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &iter);
2749 ua_chan_node = lttng_ht_iter_get_node_str(&iter);
2750 /* If the channel is not found, there is a code flow error */
2751 assert(ua_chan_node);
2752
2753 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
2754
2755 ua_event = find_ust_app_event(ua_chan->events, uevent->attr.name,
2756 uevent->filter, uevent->attr.loglevel);
2757 if (ua_event == NULL) {
2758 ret = create_ust_app_event(ua_sess, ua_chan, uevent, app);
2759 if (ret < 0) {
2760 goto error;
2761 }
2762 } else {
2763 ret = enable_ust_app_event(ua_sess, ua_event, app);
2764 if (ret < 0) {
2765 goto error;
2766 }
2767 }
2768
2769 error:
2770 rcu_read_unlock();
2771 return ret;
2772 }
2773
2774 /*
2775 * Disable event for a channel from a UST session for a specific PID.
2776 */
2777 int ust_app_disable_event_pid(struct ltt_ust_session *usess,
2778 struct ltt_ust_channel *uchan, struct ltt_ust_event *uevent, pid_t pid)
2779 {
2780 int ret = 0;
2781 struct lttng_ht_iter iter;
2782 struct lttng_ht_node_str *ua_chan_node, *ua_event_node;
2783 struct ust_app *app;
2784 struct ust_app_session *ua_sess;
2785 struct ust_app_channel *ua_chan;
2786 struct ust_app_event *ua_event;
2787
2788 DBG("UST app disabling event %s for PID %d", uevent->attr.name, pid);
2789
2790 rcu_read_lock();
2791
2792 app = ust_app_find_by_pid(pid);
2793 if (app == NULL) {
2794 ERR("UST app disable event per PID %d not found", pid);
2795 ret = -1;
2796 goto error;
2797 }
2798
2799 if (!app->compatible) {
2800 ret = 0;
2801 goto error;
2802 }
2803
2804 ua_sess = lookup_session_by_app(usess, app);
2805 if (!ua_sess) {
2806 /* The application has problem or is probably dead. */
2807 goto error;
2808 }
2809
2810 /* Lookup channel in the ust app session */
2811 lttng_ht_lookup(ua_sess->channels, (void *)uchan->name, &iter);
2812 ua_chan_node = lttng_ht_iter_get_node_str(&iter);
2813 if (ua_chan_node == NULL) {
2814 /* Channel does not exist, skip disabling */
2815 goto error;
2816 }
2817 ua_chan = caa_container_of(ua_chan_node, struct ust_app_channel, node);
2818
2819 lttng_ht_lookup(ua_chan->events, (void *)uevent->attr.name, &iter);
2820 ua_event_node = lttng_ht_iter_get_node_str(&iter);
2821 if (ua_event_node == NULL) {
2822 /* Event does not exist, skip disabling */
2823 goto error;
2824 }
2825 ua_event = caa_container_of(ua_event_node, struct ust_app_event, node);
2826
2827 ret = disable_ust_app_event(ua_sess, ua_event, app);
2828 if (ret < 0) {
2829 goto error;
2830 }
2831
2832 error:
2833 rcu_read_unlock();
2834 return ret;
2835 }
2836
2837 /*
2838 * Validate version of UST apps and set the compatible bit.
2839 */
2840 int ust_app_validate_version(int sock)
2841 {
2842 int ret;
2843 struct ust_app *app;
2844
2845 rcu_read_lock();
2846
2847 app = find_app_by_sock(sock);
2848 assert(app);
2849
2850 health_code_update(&health_thread_cmd);
2851
2852 ret = ustctl_tracer_version(sock, &app->version);
2853 if (ret < 0) {
2854 goto error;
2855 }
2856
2857 /* Validate version */
2858 if (app->version.major != UST_APP_MAJOR_VERSION) {
2859 goto error;
2860 }
2861
2862 DBG2("UST app PID %d is compatible with internal major version %d "
2863 "(supporting == %d)", app->pid, app->version.major,
2864 UST_APP_MAJOR_VERSION);
2865 app->compatible = 1;
2866 rcu_read_unlock();
2867 health_code_update(&health_thread_cmd);
2868 return 0;
2869
2870 error:
2871 DBG2("UST app PID %d is not compatible with internal major version %d "
2872 "(supporting == %d)", app->pid, app->version.major,
2873 UST_APP_MAJOR_VERSION);
2874 app->compatible = 0;
2875 rcu_read_unlock();
2876 health_code_update(&health_thread_cmd);
2877 return -1;
2878 }
2879
2880 /*
2881 * Calibrate registered applications.
2882 */
2883 int ust_app_calibrate_glb(struct lttng_ust_calibrate *calibrate)
2884 {
2885 int ret = 0;
2886 struct lttng_ht_iter iter;
2887 struct ust_app *app;
2888
2889 rcu_read_lock();
2890
2891 cds_lfht_for_each_entry(ust_app_ht->ht, &iter.iter, app, pid_n.node) {
2892 if (!app->compatible) {
2893 /*
2894 * TODO: In time, we should notice the caller of this error by
2895 * telling him that this is a version error.
2896 */
2897 continue;
2898 }
2899
2900 health_code_update(&health_thread_cmd);
2901
2902 ret = ustctl_calibrate(app->sock, calibrate);
2903 if (ret < 0) {
2904 switch (ret) {
2905 case -ENOSYS:
2906 /* Means that it's not implemented on the tracer side. */
2907 ret = 0;
2908 break;
2909 default:
2910 /* TODO: Report error to user */
2911 DBG2("Calibrate app PID %d returned with error %d",
2912 app->pid, ret);
2913 break;
2914 }
2915 }
2916 }
2917
2918 DBG("UST app global domain calibration finished");
2919
2920 rcu_read_unlock();
2921
2922 health_code_update(&health_thread_cmd);
2923
2924 return ret;
2925 }
This page took 0.143451 seconds and 3 git commands to generate.