Fix: statedump: consistently check task_cred_xxx() return value for NULL
[deliverable/lttng-modules.git] / lttng-statedump-impl.c
CommitLineData
9f36eaed
MJ
1/* SPDX-License-Identifier: (GPL-2.0 or LGPL-2.1)
2 *
886d51a3
MD
3 * lttng-statedump.c
4 *
c337ddc2
MD
5 * Linux Trace Toolkit Next Generation Kernel State Dump
6 *
7 * Copyright 2005 Jean-Hugues Deschenes <jean-hugues.deschenes@polymtl.ca>
8 * Copyright 2006-2012 Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
9 *
10 * Changes:
11 * Eric Clement: Add listing of network IP interface
12 * 2006, 2007 Mathieu Desnoyers Fix kernel threads
13 * Various updates
c337ddc2
MD
14 */
15
16#include <linux/init.h>
17#include <linux/module.h>
18#include <linux/netlink.h>
19#include <linux/inet.h>
20#include <linux/ip.h>
21#include <linux/kthread.h>
22#include <linux/proc_fs.h>
23#include <linux/file.h>
24#include <linux/interrupt.h>
25#include <linux/irqnr.h>
26#include <linux/cpu.h>
27#include <linux/netdevice.h>
28#include <linux/inetdevice.h>
29#include <linux/sched.h>
30#include <linux/mm.h>
31#include <linux/fdtable.h>
32#include <linux/swap.h>
33#include <linux/wait.h>
34#include <linux/mutex.h>
f0dbdefb 35#include <linux/device.h>
c337ddc2 36
241ae9a8
MD
37#include <lttng-events.h>
38#include <lttng-tracer.h>
39#include <wrapper/irqdesc.h>
241ae9a8 40#include <wrapper/fdtable.h>
1965e6b4 41#include <wrapper/namespace.h>
241ae9a8
MD
42#include <wrapper/irq.h>
43#include <wrapper/tracepoint.h>
44#include <wrapper/genhd.h>
45#include <wrapper/file.h>
46#include <wrapper/time.h>
c337ddc2 47
29784493 48#ifdef CONFIG_LTTNG_HAS_LIST_IRQ
c337ddc2
MD
49#include <linux/irq.h>
50#endif
51
52/* Define the tracepoints, but do not build the probes */
53#define CREATE_TRACE_POINTS
241ae9a8 54#define TRACE_INCLUDE_PATH instrumentation/events/lttng-module
c337ddc2 55#define TRACE_INCLUDE_FILE lttng-statedump
3bc29f0a 56#define LTTNG_INSTRUMENTATION
241ae9a8 57#include <instrumentation/events/lttng-module/lttng-statedump.h>
c337ddc2 58
f0dbdefb 59DEFINE_TRACE(lttng_statedump_block_device);
20591cf7
MD
60DEFINE_TRACE(lttng_statedump_end);
61DEFINE_TRACE(lttng_statedump_interrupt);
62DEFINE_TRACE(lttng_statedump_file_descriptor);
63DEFINE_TRACE(lttng_statedump_start);
64DEFINE_TRACE(lttng_statedump_process_state);
1965e6b4
MJ
65DEFINE_TRACE(lttng_statedump_process_pid_ns);
66#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4,6,0))
67DEFINE_TRACE(lttng_statedump_process_cgroup_ns);
68#endif
69DEFINE_TRACE(lttng_statedump_process_ipc_ns);
70#ifndef LTTNG_MNT_NS_MISSING_HEADER
71DEFINE_TRACE(lttng_statedump_process_mnt_ns);
72#endif
73DEFINE_TRACE(lttng_statedump_process_net_ns);
74DEFINE_TRACE(lttng_statedump_process_user_ns);
75DEFINE_TRACE(lttng_statedump_process_uts_ns);
20591cf7 76DEFINE_TRACE(lttng_statedump_network_interface);
d0b55e4c 77#ifdef LTTNG_HAVE_STATEDUMP_CPU_TOPOLOGY
502e4132
JD
78DEFINE_TRACE(lttng_statedump_cpu_topology);
79#endif
20591cf7 80
361c023a
MD
81struct lttng_fd_ctx {
82 char *page;
83 struct lttng_session *session;
84 struct task_struct *p;
d561ecfb 85 struct files_struct *files;
361c023a
MD
86};
87
c337ddc2
MD
88/*
89 * Protected by the trace lock.
90 */
91static struct delayed_work cpu_work[NR_CPUS];
92static DECLARE_WAIT_QUEUE_HEAD(statedump_wq);
93static atomic_t kernel_threads_to_run;
94
95enum lttng_thread_type {
96 LTTNG_USER_THREAD = 0,
97 LTTNG_KERNEL_THREAD = 1,
98};
99
100enum lttng_execution_mode {
101 LTTNG_USER_MODE = 0,
102 LTTNG_SYSCALL = 1,
103 LTTNG_TRAP = 2,
104 LTTNG_IRQ = 3,
105 LTTNG_SOFTIRQ = 4,
106 LTTNG_MODE_UNKNOWN = 5,
107};
108
109enum lttng_execution_submode {
110 LTTNG_NONE = 0,
111 LTTNG_UNKNOWN = 1,
112};
113
114enum lttng_process_status {
115 LTTNG_UNNAMED = 0,
116 LTTNG_WAIT_FORK = 1,
117 LTTNG_WAIT_CPU = 2,
118 LTTNG_EXIT = 3,
119 LTTNG_ZOMBIE = 4,
120 LTTNG_WAIT = 5,
121 LTTNG_RUN = 6,
122 LTTNG_DEAD = 7,
123};
124
f0dbdefb
HD
125static
126int lttng_enumerate_block_devices(struct lttng_session *session)
127{
128 struct class *ptr_block_class;
129 struct device_type *ptr_disk_type;
130 struct class_dev_iter iter;
131 struct device *dev;
132
133 ptr_block_class = wrapper_get_block_class();
134 if (!ptr_block_class)
135 return -ENOSYS;
136 ptr_disk_type = wrapper_get_disk_type();
137 if (!ptr_disk_type) {
138 return -ENOSYS;
139 }
140 class_dev_iter_init(&iter, ptr_block_class, NULL, ptr_disk_type);
141 while ((dev = class_dev_iter_next(&iter))) {
142 struct disk_part_iter piter;
143 struct gendisk *disk = dev_to_disk(dev);
144 struct hd_struct *part;
145
5a91f3df
MD
146 /*
147 * Don't show empty devices or things that have been
148 * suppressed
149 */
150 if (get_capacity(disk) == 0 ||
151 (disk->flags & GENHD_FL_SUPPRESS_PARTITION_INFO))
152 continue;
153
f0dbdefb
HD
154 disk_part_iter_init(&piter, disk, DISK_PITER_INCL_PART0);
155 while ((part = disk_part_iter_next(&piter))) {
156 char name_buf[BDEVNAME_SIZE];
157 char *p;
158
159 p = wrapper_disk_name(disk, part->partno, name_buf);
160 if (!p) {
161 disk_part_iter_exit(&piter);
162 class_dev_iter_exit(&iter);
163 return -ENOSYS;
164 }
165 trace_lttng_statedump_block_device(session,
166 part_devt(part), name_buf);
167 }
168 disk_part_iter_exit(&piter);
169 }
170 class_dev_iter_exit(&iter);
171 return 0;
172}
173
c337ddc2 174#ifdef CONFIG_INET
f0dbdefb 175
c337ddc2
MD
176static
177void lttng_enumerate_device(struct lttng_session *session,
178 struct net_device *dev)
179{
180 struct in_device *in_dev;
181 struct in_ifaddr *ifa;
182
183 if (dev->flags & IFF_UP) {
184 in_dev = in_dev_get(dev);
185 if (in_dev) {
186 for (ifa = in_dev->ifa_list; ifa != NULL;
187 ifa = ifa->ifa_next) {
188 trace_lttng_statedump_network_interface(
189 session, dev, ifa);
190 }
191 in_dev_put(in_dev);
192 }
193 } else {
194 trace_lttng_statedump_network_interface(
195 session, dev, NULL);
196 }
197}
198
199static
200int lttng_enumerate_network_ip_interface(struct lttng_session *session)
201{
202 struct net_device *dev;
203
204 read_lock(&dev_base_lock);
205 for_each_netdev(&init_net, dev)
206 lttng_enumerate_device(session, dev);
207 read_unlock(&dev_base_lock);
208
209 return 0;
210}
211#else /* CONFIG_INET */
212static inline
213int lttng_enumerate_network_ip_interface(struct lttng_session *session)
214{
215 return 0;
216}
217#endif /* CONFIG_INET */
218
361c023a
MD
219static
220int lttng_dump_one_fd(const void *p, struct file *file, unsigned int fd)
221{
222 const struct lttng_fd_ctx *ctx = p;
223 const char *s = d_path(&file->f_path, ctx->page, PAGE_SIZE);
29021503 224 unsigned int flags = file->f_flags;
d561ecfb 225 struct fdtable *fdt;
361c023a 226
29021503
MD
227 /*
228 * We don't expose kernel internal flags, only userspace-visible
229 * flags.
230 */
231 flags &= ~FMODE_NONOTIFY;
d561ecfb
MD
232 fdt = files_fdtable(ctx->files);
233 /*
234 * We need to check here again whether fd is within the fdt
235 * max_fds range, because we might be seeing a different
236 * files_fdtable() than iterate_fd(), assuming only RCU is
237 * protecting the read. In reality, iterate_fd() holds
238 * file_lock, which should ensure the fdt does not change while
239 * the lock is taken, but we are not aware whether this is
240 * guaranteed or not, so play safe.
241 */
aa29f2d3 242 if (fd < fdt->max_fds && lttng_close_on_exec(fd, fdt))
29021503 243 flags |= O_CLOEXEC;
361c023a
MD
244 if (IS_ERR(s)) {
245 struct dentry *dentry = file->f_path.dentry;
246
247 /* Make sure we give at least some info */
248 spin_lock(&dentry->d_lock);
249 trace_lttng_statedump_file_descriptor(ctx->session, ctx->p, fd,
29021503 250 dentry->d_name.name, flags, file->f_mode);
361c023a
MD
251 spin_unlock(&dentry->d_lock);
252 goto end;
253 }
29021503
MD
254 trace_lttng_statedump_file_descriptor(ctx->session, ctx->p, fd, s,
255 flags, file->f_mode);
361c023a
MD
256end:
257 return 0;
258}
c337ddc2
MD
259
260static
261void lttng_enumerate_task_fd(struct lttng_session *session,
262 struct task_struct *p, char *tmp)
263{
361c023a 264 struct lttng_fd_ctx ctx = { .page = tmp, .session = session, .p = p };
d561ecfb 265 struct files_struct *files;
c337ddc2
MD
266
267 task_lock(p);
d561ecfb
MD
268 files = p->files;
269 if (!files)
270 goto end;
271 ctx.files = files;
272 lttng_iterate_fd(files, 0, lttng_dump_one_fd, &ctx);
273end:
c337ddc2
MD
274 task_unlock(p);
275}
276
277static
278int lttng_enumerate_file_descriptors(struct lttng_session *session)
279{
280 struct task_struct *p;
cfcee1c7
MD
281 char *tmp;
282
283 tmp = (char *) __get_free_page(GFP_KERNEL);
284 if (!tmp)
285 return -ENOMEM;
c337ddc2
MD
286
287 /* Enumerate active file descriptors */
288 rcu_read_lock();
289 for_each_process(p)
290 lttng_enumerate_task_fd(session, p, tmp);
291 rcu_read_unlock();
292 free_page((unsigned long) tmp);
293 return 0;
294}
295
d0b55e4c 296#ifdef LTTNG_HAVE_STATEDUMP_CPU_TOPOLOGY
502e4132
JD
297static
298int lttng_enumerate_cpu_topology(struct lttng_session *session)
299{
300 int cpu;
301 const cpumask_t *cpumask = cpu_possible_mask;
302
303 for (cpu = cpumask_first(cpumask); cpu < nr_cpu_ids;
304 cpu = cpumask_next(cpu, cpumask)) {
305 trace_lttng_statedump_cpu_topology(session, &cpu_data(cpu));
306 }
307
308 return 0;
309}
310#else
311static
312int lttng_enumerate_cpu_topology(struct lttng_session *session)
313{
314 return 0;
315}
316#endif
317
0658bdda
MD
318#if 0
319/*
320 * FIXME: we cannot take a mmap_sem while in a RCU read-side critical section
321 * (scheduling in atomic). Normally, the tasklist lock protects this kind of
322 * iteration, but it is not exported to modules.
323 */
c337ddc2
MD
324static
325void lttng_enumerate_task_vm_maps(struct lttng_session *session,
326 struct task_struct *p)
327{
328 struct mm_struct *mm;
329 struct vm_area_struct *map;
330 unsigned long ino;
331
332 /* get_task_mm does a task_lock... */
333 mm = get_task_mm(p);
334 if (!mm)
335 return;
336
337 map = mm->mmap;
338 if (map) {
339 down_read(&mm->mmap_sem);
340 while (map) {
341 if (map->vm_file)
b06ed645 342 ino = map->vm_file->lttng_f_dentry->d_inode->i_ino;
c337ddc2
MD
343 else
344 ino = 0;
345 trace_lttng_statedump_vm_map(session, p, map, ino);
346 map = map->vm_next;
347 }
348 up_read(&mm->mmap_sem);
349 }
350 mmput(mm);
351}
352
353static
354int lttng_enumerate_vm_maps(struct lttng_session *session)
355{
356 struct task_struct *p;
357
358 rcu_read_lock();
359 for_each_process(p)
360 lttng_enumerate_task_vm_maps(session, p);
361 rcu_read_unlock();
362 return 0;
363}
0658bdda 364#endif
c337ddc2 365
29784493 366#ifdef CONFIG_LTTNG_HAS_LIST_IRQ
47faec4b 367
c337ddc2 368static
cfcee1c7 369int lttng_list_interrupts(struct lttng_session *session)
c337ddc2
MD
370{
371 unsigned int irq;
372 unsigned long flags = 0;
373 struct irq_desc *desc;
374
375#define irq_to_desc wrapper_irq_to_desc
376 /* needs irq_desc */
377 for_each_irq_desc(irq, desc) {
378 struct irqaction *action;
379 const char *irq_chip_name =
380 irq_desc_get_chip(desc)->name ? : "unnamed_irq_chip";
381
382 local_irq_save(flags);
fc94c945 383 raw_spin_lock(&desc->lock);
c337ddc2
MD
384 for (action = desc->action; action; action = action->next) {
385 trace_lttng_statedump_interrupt(session,
386 irq, irq_chip_name, action);
387 }
fc94c945 388 raw_spin_unlock(&desc->lock);
c337ddc2
MD
389 local_irq_restore(flags);
390 }
cfcee1c7 391 return 0;
c337ddc2
MD
392#undef irq_to_desc
393}
394#else
395static inline
cfcee1c7 396int lttng_list_interrupts(struct lttng_session *session)
c337ddc2 397{
cfcee1c7 398 return 0;
c337ddc2
MD
399}
400#endif
401
4ba1f53c 402/*
1965e6b4
MJ
403 * Statedump the task's namespaces using the proc filesystem inode number as
404 * the unique identifier. The user and pid ns are nested and will be dumped
405 * recursively.
406 *
4ba1f53c
MD
407 * Called with task lock held.
408 */
73e8ba37
JD
409static
410void lttng_statedump_process_ns(struct lttng_session *session,
411 struct task_struct *p,
412 enum lttng_thread_type type,
413 enum lttng_execution_mode mode,
414 enum lttng_execution_submode submode,
415 enum lttng_process_status status)
416{
1965e6b4 417 struct nsproxy *proxy;
73e8ba37 418 struct pid_namespace *pid_ns;
1965e6b4 419 struct user_namespace *user_ns;
73e8ba37 420
1965e6b4
MJ
421 /*
422 * The pid and user namespaces are special, they are nested and
423 * accessed with specific functions instead of the nsproxy struct
424 * like the other namespaces.
425 */
887bcdac
MJ
426 pid_ns = task_active_pid_ns(p);
427 do {
1965e6b4 428 trace_lttng_statedump_process_pid_ns(session, p, pid_ns);
adcc8b5e 429 pid_ns = pid_ns ? pid_ns->parent : NULL;
887bcdac 430 } while (pid_ns);
1965e6b4
MJ
431
432
433 user_ns = task_cred_xxx(p, user_ns);
434 do {
435 trace_lttng_statedump_process_user_ns(session, p, user_ns);
1964cccb
MD
436 /*
437 * trace_lttng_statedump_process_user_ns() internally
438 * checks whether user_ns is NULL. While this does not
439 * appear to be a possible return value for
440 * task_cred_xxx(), err on the safe side and check
441 * for NULL here as well to be consistent with the
442 * paranoid behavior of
443 * trace_lttng_statedump_process_user_ns().
444 */
445 user_ns = user_ns ? user_ns->lttng_user_ns_parent : NULL;
1965e6b4
MJ
446 } while (user_ns);
447
448 /*
449 * Back and forth on locking strategy within Linux upstream for nsproxy.
450 * See Linux upstream commit 728dba3a39c66b3d8ac889ddbe38b5b1c264aec3
451 * "namespaces: Use task_lock and not rcu to protect nsproxy"
452 * for details.
453 */
454#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3,17,0) || \
455 LTTNG_UBUNTU_KERNEL_RANGE(3,13,11,36, 3,14,0,0) || \
456 LTTNG_UBUNTU_KERNEL_RANGE(3,16,1,11, 3,17,0,0) || \
457 LTTNG_RHEL_KERNEL_RANGE(3,10,0,229,13,0, 3,11,0,0,0,0))
458 proxy = p->nsproxy;
459#else
460 rcu_read_lock();
461 proxy = task_nsproxy(p);
462#endif
463 if (proxy) {
464#if (LINUX_VERSION_CODE >= KERNEL_VERSION(4,6,0))
465 trace_lttng_statedump_process_cgroup_ns(session, p, proxy->cgroup_ns);
466#endif
467 trace_lttng_statedump_process_ipc_ns(session, p, proxy->ipc_ns);
468#ifndef LTTNG_MNT_NS_MISSING_HEADER
469 trace_lttng_statedump_process_mnt_ns(session, p, proxy->mnt_ns);
470#endif
471 trace_lttng_statedump_process_net_ns(session, p, proxy->net_ns);
472 trace_lttng_statedump_process_uts_ns(session, p, proxy->uts_ns);
473 }
474#if (LINUX_VERSION_CODE >= KERNEL_VERSION(3,17,0) || \
475 LTTNG_UBUNTU_KERNEL_RANGE(3,13,11,36, 3,14,0,0) || \
476 LTTNG_UBUNTU_KERNEL_RANGE(3,16,1,11, 3,17,0,0) || \
477 LTTNG_RHEL_KERNEL_RANGE(3,10,0,229,13,0, 3,11,0,0,0,0))
478 /* (nothing) */
479#else
480 rcu_read_unlock();
481#endif
73e8ba37
JD
482}
483
c337ddc2
MD
484static
485int lttng_enumerate_process_states(struct lttng_session *session)
486{
487 struct task_struct *g, *p;
488
489 rcu_read_lock();
490 for_each_process(g) {
491 p = g;
492 do {
493 enum lttng_execution_mode mode =
494 LTTNG_MODE_UNKNOWN;
495 enum lttng_execution_submode submode =
496 LTTNG_UNKNOWN;
497 enum lttng_process_status status;
498 enum lttng_thread_type type;
499
500 task_lock(p);
501 if (p->exit_state == EXIT_ZOMBIE)
502 status = LTTNG_ZOMBIE;
503 else if (p->exit_state == EXIT_DEAD)
504 status = LTTNG_DEAD;
505 else if (p->state == TASK_RUNNING) {
506 /* Is this a forked child that has not run yet? */
507 if (list_empty(&p->rt.run_list))
508 status = LTTNG_WAIT_FORK;
509 else
510 /*
511 * All tasks are considered as wait_cpu;
512 * the viewer will sort out if the task
513 * was really running at this time.
514 */
515 status = LTTNG_WAIT_CPU;
516 } else if (p->state &
517 (TASK_INTERRUPTIBLE | TASK_UNINTERRUPTIBLE)) {
518 /* Task is waiting for something to complete */
519 status = LTTNG_WAIT;
520 } else
521 status = LTTNG_UNNAMED;
522 submode = LTTNG_NONE;
523
524 /*
525 * Verification of t->mm is to filter out kernel
526 * threads; Viewer will further filter out if a
527 * user-space thread was in syscall mode or not.
528 */
529 if (p->mm)
530 type = LTTNG_USER_THREAD;
531 else
532 type = LTTNG_KERNEL_THREAD;
d2a927ac
MJ
533
534 trace_lttng_statedump_process_state(session,
535 p, type, mode, submode, status);
73e8ba37 536 lttng_statedump_process_ns(session,
c337ddc2
MD
537 p, type, mode, submode, status);
538 task_unlock(p);
539 } while_each_thread(g, p);
540 }
541 rcu_read_unlock();
542
543 return 0;
544}
545
546static
547void lttng_statedump_work_func(struct work_struct *work)
548{
549 if (atomic_dec_and_test(&kernel_threads_to_run))
550 /* If we are the last thread, wake up do_lttng_statedump */
551 wake_up(&statedump_wq);
552}
553
554static
555int do_lttng_statedump(struct lttng_session *session)
556{
cfcee1c7 557 int cpu, ret;
c337ddc2 558
c337ddc2 559 trace_lttng_statedump_start(session);
cfcee1c7
MD
560 ret = lttng_enumerate_process_states(session);
561 if (ret)
562 return ret;
563 ret = lttng_enumerate_file_descriptors(session);
564 if (ret)
565 return ret;
566 /*
567 * FIXME
568 * ret = lttng_enumerate_vm_maps(session);
569 * if (ret)
570 * return ret;
571 */
572 ret = lttng_list_interrupts(session);
573 if (ret)
574 return ret;
575 ret = lttng_enumerate_network_ip_interface(session);
576 if (ret)
577 return ret;
578 ret = lttng_enumerate_block_devices(session);
579 switch (ret) {
84c7055e
MD
580 case 0:
581 break;
cfcee1c7
MD
582 case -ENOSYS:
583 printk(KERN_WARNING "LTTng: block device enumeration is not supported by kernel\n");
584 break;
585 default:
586 return ret;
587 }
502e4132
JD
588 ret = lttng_enumerate_cpu_topology(session);
589 if (ret)
590 return ret;
c337ddc2
MD
591
592 /* TODO lttng_dump_idt_table(session); */
593 /* TODO lttng_dump_softirq_vec(session); */
594 /* TODO lttng_list_modules(session); */
595 /* TODO lttng_dump_swap_files(session); */
596
597 /*
598 * Fire off a work queue on each CPU. Their sole purpose in life
599 * is to guarantee that each CPU has been in a state where is was in
600 * syscall mode (i.e. not in a trap, an IRQ or a soft IRQ).
601 */
602 get_online_cpus();
603 atomic_set(&kernel_threads_to_run, num_online_cpus());
604 for_each_online_cpu(cpu) {
605 INIT_DELAYED_WORK(&cpu_work[cpu], lttng_statedump_work_func);
606 schedule_delayed_work_on(cpu, &cpu_work[cpu], 0);
607 }
608 /* Wait for all threads to run */
7a7128e0 609 __wait_event(statedump_wq, (atomic_read(&kernel_threads_to_run) == 0));
c337ddc2
MD
610 put_online_cpus();
611 /* Our work is done */
c337ddc2
MD
612 trace_lttng_statedump_end(session);
613 return 0;
614}
615
616/*
617 * Called with session mutex held.
618 */
619int lttng_statedump_start(struct lttng_session *session)
620{
c337ddc2
MD
621 return do_lttng_statedump(session);
622}
623EXPORT_SYMBOL_GPL(lttng_statedump_start);
624
dd8d5afb
MD
625static
626int __init lttng_statedump_init(void)
627{
d16aa9c9
MD
628 /*
629 * Allow module to load even if the fixup cannot be done. This
630 * will allow seemless transition when the underlying issue fix
631 * is merged into the Linux kernel, and when tracepoint.c
632 * "tracepoint_module_notify" is turned into a static function.
633 */
634 (void) wrapper_lttng_fixup_sig(THIS_MODULE);
635 return 0;
dd8d5afb
MD
636}
637
638module_init(lttng_statedump_init);
639
461277e7
MD
640static
641void __exit lttng_statedump_exit(void)
642{
643}
644
645module_exit(lttng_statedump_exit);
646
c337ddc2
MD
647MODULE_LICENSE("GPL and additional rights");
648MODULE_AUTHOR("Jean-Hugues Deschenes");
1c124020 649MODULE_DESCRIPTION("LTTng statedump provider");
13ab8b0a
MD
650MODULE_VERSION(__stringify(LTTNG_MODULES_MAJOR_VERSION) "."
651 __stringify(LTTNG_MODULES_MINOR_VERSION) "."
652 __stringify(LTTNG_MODULES_PATCHLEVEL_VERSION)
653 LTTNG_MODULES_EXTRAVERSION);
This page took 0.063971 seconds and 5 git commands to generate.