Fix: sessiond: use system LTTng-UST headers when available
[lttng-tools.git] / src / bin / lttng-sessiond / event.c
CommitLineData
54d01ffb
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
71a559f8 3 * Copyright (C) 2016 - Jérémie Galarneau <jeremie.galarneau@efficios.com>
54d01ffb 4 *
d14d33bf
AM
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2 only,
7 * as published by the Free Software Foundation.
54d01ffb 8 *
d14d33bf
AM
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
54d01ffb 13 *
d14d33bf
AM
14 * You should have received a copy of the GNU General Public License along
15 * with this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
54d01ffb
DG
17 */
18
6c1c0768 19#define _LGPL_SOURCE
d87bfb32 20#include <errno.h>
54d01ffb 21#include <urcu/list.h>
2bdd86d4 22#include <string.h>
54d01ffb
DG
23
24#include <lttng/lttng.h>
db758600 25#include <common/error.h>
10a8a223 26#include <common/sessiond-comm/sessiond-comm.h>
71a559f8
JG
27#include <common/filter.h>
28#include <common/context.h>
54d01ffb
DG
29
30#include "channel.h"
31#include "event.h"
4771f025 32#include "kernel.h"
be6a6276 33#include "lttng-sessiond.h"
c57c2c74
JG
34#include "lttng-ust-ctl.h"
35#include "lttng-ust-error.h"
edb67388
DG
36#include "ust-app.h"
37#include "trace-kernel.h"
38#include "trace-ust.h"
7c1d2758 39#include "agent.h"
54d01ffb 40
025faf73
DG
41/*
42 * Add unique UST event based on the event name, filter bytecode and loglevel.
43 */
18eace3b
DG
44static void add_unique_ust_event(struct lttng_ht *ht,
45 struct ltt_ust_event *event)
46{
47 struct cds_lfht_node *node_ptr;
48 struct ltt_ust_ht_key key;
49
50 assert(ht);
51 assert(ht->ht);
52 assert(event);
53
54 key.name = event->attr.name;
55 key.filter = (struct lttng_filter_bytecode *) event->filter;
b953b8cd
PP
56 key.loglevel_type = event->attr.loglevel_type;
57 key.loglevel_value = event->attr.loglevel;
4031e53e 58 key.exclusion = event->exclusion;
18eace3b
DG
59
60 node_ptr = cds_lfht_add_unique(ht->ht,
61 ht->hash_fct(event->node.key, lttng_ht_seed),
62 trace_ust_ht_match_event, &key, &event->node.node);
63 assert(node_ptr == &event->node.node);
64}
65
54d01ffb 66/*
9550ee81
JR
67 * Disable kernel tracepoint events for a channel from the kernel session of
68 * a specified event_name and event type.
69 * On type LTTNG_EVENT_ALL all events with event_name are disabled.
70 * If event_name is NULL all events of the specified type are disabled.
54d01ffb 71 */
d0ae4ea8 72int event_kernel_disable_event(struct ltt_kernel_channel *kchan,
9550ee81 73 char *event_name, enum lttng_event_type type)
54d01ffb 74{
9550ee81 75 int ret, error = 0, found = 0;
54d01ffb
DG
76 struct ltt_kernel_event *kevent;
77
0525e9ae
DG
78 assert(kchan);
79
54d01ffb
DG
80 /* For each event in the kernel session */
81 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
d0ae4ea8
MD
82 if (type != LTTNG_EVENT_ALL && kevent->type != type)
83 continue;
9550ee81
JR
84 if (event_name != NULL && strcmp(event_name, kevent->event->name)) {
85 continue;
86 }
87 found++;
54d01ffb
DG
88 ret = kernel_disable_event(kevent);
89 if (ret < 0) {
9550ee81 90 error = 1;
54d01ffb
DG
91 continue;
92 }
93 }
9550ee81
JR
94 DBG("Disable kernel event: found %d events with name: %s and type: %d",
95 found, event_name ? event_name : "NULL", type);
7a3d1328 96
9550ee81
JR
97 if (event_name != NULL && !found) {
98 ret = LTTNG_ERR_NO_EVENT;
99 } else {
100 ret = error ? LTTNG_ERR_KERN_DISABLE_FAIL : LTTNG_OK;
101 }
102
103 return ret;
54d01ffb
DG
104}
105
106/*
7a3d1328 107 * Enable kernel tracepoint event for a channel from the kernel session.
49d21f93 108 * We own filter_expression and filter.
54d01ffb 109 */
d0ae4ea8 110int event_kernel_enable_event(struct ltt_kernel_channel *kchan,
00a62084
MD
111 struct lttng_event *event, char *filter_expression,
112 struct lttng_filter_bytecode *filter)
54d01ffb
DG
113{
114 int ret;
115 struct ltt_kernel_event *kevent;
116
0525e9ae
DG
117 assert(kchan);
118 assert(event);
119
00a62084
MD
120 kevent = trace_kernel_find_event(event->name, kchan,
121 event->type, filter);
54d01ffb 122 if (kevent == NULL) {
00a62084
MD
123 ret = kernel_create_event(event, kchan,
124 filter_expression, filter);
a969e101
MD
125 /* We have passed ownership */
126 filter_expression = NULL;
127 filter = NULL;
54d01ffb 128 if (ret < 0) {
bd29c13d
DG
129 switch (-ret) {
130 case EEXIST:
f73fabfd 131 ret = LTTNG_ERR_KERN_EVENT_EXIST;
bd29c13d
DG
132 break;
133 case ENOSYS:
f73fabfd 134 ret = LTTNG_ERR_KERN_EVENT_ENOSYS;
bd29c13d
DG
135 break;
136 default:
f73fabfd 137 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
bd29c13d 138 break;
d87bfb32 139 }
7a3d1328 140 goto end;
54d01ffb
DG
141 }
142 } else if (kevent->enabled == 0) {
143 ret = kernel_enable_event(kevent);
144 if (ret < 0) {
f73fabfd 145 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
7a3d1328 146 goto end;
54d01ffb 147 }
42224349
DG
148 } else {
149 /* At this point, the event is considered enabled */
f73fabfd 150 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349 151 goto end;
54d01ffb 152 }
42224349 153
f73fabfd 154 ret = LTTNG_OK;
7a3d1328 155end:
a969e101
MD
156 free(filter_expression);
157 free(filter);
54d01ffb
DG
158 return ret;
159}
160
7f79d3a1
DG
161/*
162 * ============================
163 * UST : The Ultimate Frontier!
164 * ============================
165 */
166
2bdd86d4
MD
167/*
168 * Enable UST tracepoint event for a channel from a UST session.
49d21f93 169 * We own filter_expression, filter, and exclusion.
2bdd86d4 170 */
7972aab2 171int event_ust_enable_tracepoint(struct ltt_ust_session *usess,
025faf73 172 struct ltt_ust_channel *uchan, struct lttng_event *event,
6b453b5e 173 char *filter_expression,
f1613f52 174 struct lttng_filter_bytecode *filter,
88f06f15
JG
175 struct lttng_event_exclusion *exclusion,
176 bool internal_event)
2bdd86d4 177{
f73fabfd 178 int ret = LTTNG_OK, to_create = 0;
edb67388
DG
179 struct ltt_ust_event *uevent;
180
0525e9ae
DG
181 assert(usess);
182 assert(uchan);
183 assert(event);
184
18eace3b
DG
185 rcu_read_lock();
186
025faf73 187 uevent = trace_ust_find_event(uchan->events, event->name, filter,
b953b8cd 188 event->loglevel_type, event->loglevel, exclusion);
87c6e328 189 if (!uevent) {
6b453b5e 190 uevent = trace_ust_create_event(event, filter_expression,
87c6e328 191 filter, exclusion, internal_event);
49d21f93
MD
192 /* We have passed ownership */
193 filter_expression = NULL;
194 filter = NULL;
195 exclusion = NULL;
edb67388 196 if (uevent == NULL) {
95a82664 197 ret = LTTNG_ERR_UST_ENABLE_FAIL;
edb67388
DG
198 goto error;
199 }
025faf73 200
fc34caaa 201 /* Valid to set it after the goto error since uevent is still NULL */
edb67388
DG
202 to_create = 1;
203 }
2bdd86d4 204
7f79d3a1
DG
205 if (uevent->enabled) {
206 /* It's already enabled so everything is OK */
5bcdda4f 207 ret = LTTNG_ERR_UST_EVENT_ENABLED;
7f79d3a1
DG
208 goto end;
209 }
210
fc34caaa
DG
211 uevent->enabled = 1;
212
7972aab2
DG
213 if (to_create) {
214 /* Create event on all UST registered apps for session */
215 ret = ust_app_create_event_glb(usess, uchan, uevent);
216 } else {
217 /* Enable event on all UST registered apps for session */
218 ret = ust_app_enable_event_glb(usess, uchan, uevent);
219 }
48842b30 220
7972aab2
DG
221 if (ret < 0) {
222 if (ret == -LTTNG_UST_ERR_EXIST) {
223 ret = LTTNG_ERR_UST_EVENT_EXIST;
224 goto end;
225 } else {
226 ret = LTTNG_ERR_UST_ENABLE_FAIL;
227 goto error;
edb67388 228 }
2bdd86d4 229 }
48842b30 230
7f79d3a1 231 if (to_create) {
fc34caaa 232 /* Add ltt ust event to channel */
18eace3b 233 add_unique_ust_event(uchan->events, uevent);
7f79d3a1 234 }
edb67388 235
7f79d3a1
DG
236 DBG("Event UST %s %s in channel %s", uevent->attr.name,
237 to_create ? "created" : "enabled", uchan->name);
238
f73fabfd 239 ret = LTTNG_OK;
fc34caaa 240
fb89d070 241end:
18eace3b 242 rcu_read_unlock();
49d21f93
MD
243 free(filter_expression);
244 free(filter);
245 free(exclusion);
fc34caaa 246 return ret;
edb67388
DG
247
248error:
fc34caaa
DG
249 /*
250 * Only destroy event on creation time (not enabling time) because if the
251 * event is found in the channel (to_create == 0), it means that at some
252 * point the enable_event worked and it's thus valid to keep it alive.
253 * Destroying it also implies that we also destroy it's shadow copy to sync
254 * everyone up.
255 */
256 if (to_create) {
257 /* In this code path, the uevent was not added to the hash table */
258 trace_ust_destroy_event(uevent);
259 }
18eace3b 260 rcu_read_unlock();
49d21f93
MD
261 free(filter_expression);
262 free(filter);
263 free(exclusion);
2bdd86d4
MD
264 return ret;
265}
266
7f79d3a1
DG
267/*
268 * Disable UST tracepoint of a channel from a UST session.
269 */
7972aab2 270int event_ust_disable_tracepoint(struct ltt_ust_session *usess,
7f79d3a1 271 struct ltt_ust_channel *uchan, char *event_name)
2bdd86d4
MD
272{
273 int ret;
7f79d3a1 274 struct ltt_ust_event *uevent;
18eace3b
DG
275 struct lttng_ht_node_str *node;
276 struct lttng_ht_iter iter;
18eace3b 277 struct lttng_ht *ht;
2bdd86d4 278
0525e9ae
DG
279 assert(usess);
280 assert(uchan);
281 assert(event_name);
282
18eace3b
DG
283 ht = uchan->events;
284
18eace3b 285 rcu_read_lock();
025faf73
DG
286
287 /*
288 * We use a custom lookup since we need the iterator for the next_duplicate
289 * call in the do while loop below.
290 */
291 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed),
292 trace_ust_ht_match_event_by_name, event_name, &iter.iter);
18eace3b
DG
293 node = lttng_ht_iter_get_node_str(&iter);
294 if (node == NULL) {
295 DBG2("Trace UST event NOT found by name %s", event_name);
f73fabfd 296 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
7f79d3a1 297 goto error;
2bdd86d4 298 }
7f79d3a1 299
18eace3b
DG
300 do {
301 uevent = caa_container_of(node, struct ltt_ust_event, node);
025faf73
DG
302 assert(uevent);
303
18eace3b
DG
304 if (uevent->enabled == 0) {
305 /* It's already disabled so everything is OK */
a1dcaf0f 306 goto next;
7f79d3a1 307 }
18eace3b 308
7972aab2
DG
309 ret = ust_app_disable_event_glb(usess, uchan, uevent);
310 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
311 ret = LTTNG_ERR_UST_DISABLE_FAIL;
18eace3b
DG
312 goto error;
313 }
18eace3b
DG
314 uevent->enabled = 0;
315
025faf73
DG
316 DBG2("Event UST %s disabled in channel %s", uevent->attr.name,
317 uchan->name);
318
a1dcaf0f 319next:
18eace3b
DG
320 /* Get next duplicate event by name. */
321 cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name,
322 event_name, &iter.iter);
323 node = lttng_ht_iter_get_node_str(&iter);
324 } while (node);
7f79d3a1 325
f73fabfd 326 ret = LTTNG_OK;
7f79d3a1 327
7f79d3a1 328error:
18eace3b 329 rcu_read_unlock();
7f79d3a1
DG
330 return ret;
331}
332
b1e7fe2d
JR
333/*
334 * Disable all UST tracepoints for a channel from a UST session.
335 */
336int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess,
337 struct ltt_ust_channel *uchan)
338{
3e81c0f2 339 int ret, i, size, error = 0;
b1e7fe2d
JR
340 struct lttng_ht_iter iter;
341 struct ltt_ust_event *uevent = NULL;
342 struct lttng_event *events = NULL;
343
344 assert(usess);
345 assert(uchan);
346
347 rcu_read_lock();
348
349 /* Disabling existing events */
350 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
351 node.node) {
352 if (uevent->enabled == 1) {
353 ret = event_ust_disable_tracepoint(usess, uchan,
354 uevent->attr.name);
355 if (ret < 0) {
3e81c0f2 356 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
357 continue;
358 }
359 }
360 }
361
362 /* Get all UST available events */
363 size = ust_app_list_events(&events);
364 if (size < 0) {
365 ret = LTTNG_ERR_UST_LIST_FAIL;
366 goto error;
367 }
368
369 for (i = 0; i < size; i++) {
370 ret = event_ust_disable_tracepoint(usess, uchan,
371 events[i].name);
3e81c0f2 372 if (ret < 0) {
b1e7fe2d 373 /* Continue to disable the rest... */
3e81c0f2 374 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
375 continue;
376 }
377 }
378
3e81c0f2 379 ret = error ? error : LTTNG_OK;
b1e7fe2d
JR
380error:
381 rcu_read_unlock();
382 free(events);
383 return ret;
384}
385
f20baf8e 386/*
022d91ba 387 * Enable all agent event for a given UST session.
f20baf8e
DG
388 *
389 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
390 */
022d91ba 391int event_agent_enable_all(struct ltt_ust_session *usess,
fefd409b 392 struct agent *agt, struct lttng_event *event,
51755dc8 393 struct lttng_filter_bytecode *filter ,char *filter_expression)
f20baf8e
DG
394{
395 int ret;
fefd409b 396 struct agent_event *aevent;
f20baf8e
DG
397 struct lttng_ht_iter iter;
398
399 assert(usess);
400
022d91ba 401 DBG("Event agent enabling ALL events for session %" PRIu64, usess->id);
f20baf8e 402
022d91ba 403 /* Enable event on agent application through TCP socket. */
8404118c 404 ret = event_agent_enable(usess, agt, event, filter, filter_expression);
f20baf8e
DG
405 if (ret != LTTNG_OK) {
406 goto error;
407 }
408
409 /* Flag every event that they are now enabled. */
410 rcu_read_lock();
fefd409b 411 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 412 node.node) {
fefd409b 413 aevent->enabled = 1;
f20baf8e
DG
414 }
415 rcu_read_unlock();
416
417 ret = LTTNG_OK;
418
419error:
420 return ret;
421}
422
71a559f8
JG
423/*
424 * Check if this event's filter requires the activation of application contexts
425 * and enable them in the agent.
426 */
427static int add_filter_app_ctx(struct lttng_filter_bytecode *bytecode,
428 const char *filter_expression, struct agent *agt)
429{
430 int ret = LTTNG_OK;
431 char *provider_name = NULL, *ctx_name = NULL;
432 struct bytecode_symbol_iterator *it =
433 bytecode_symbol_iterator_create(bytecode);
434
435 if (!it) {
436 ret = LTTNG_ERR_NOMEM;
437 goto end;
438 }
439
440 do {
441 struct lttng_event_context ctx;
442 const char *symbol_name =
443 bytecode_symbol_iterator_get_name(it);
444
445 if (parse_application_context(symbol_name, &provider_name,
446 &ctx_name)) {
447 /* Not an application context. */
448 continue;
449 }
450
451 ctx.ctx = LTTNG_EVENT_CONTEXT_APP_CONTEXT;
452 ctx.u.app_ctx.provider_name = provider_name;
453 ctx.u.app_ctx.ctx_name = ctx_name;
454
455 /* Recognized an application context. */
456 DBG("Enabling event with filter expression \"%s\" requires enabling the %s:%s application context.",
457 filter_expression, provider_name, ctx_name);
458
459 ret = agent_add_context(&ctx, agt);
460 if (ret != LTTNG_OK) {
461 ERR("Failed to add application context %s:%s.",
462 provider_name, ctx_name);
463 goto end;
464 }
465
466 ret = agent_enable_context(&ctx, agt->domain);
467 if (ret != LTTNG_OK) {
468 ERR("Failed to enable application context %s:%s.",
469 provider_name, ctx_name);
470 goto end;
471 }
472
473 free(provider_name);
474 free(ctx_name);
475 provider_name = ctx_name = NULL;
476 } while (bytecode_symbol_iterator_next(it) == 0);
477end:
478 free(provider_name);
479 free(ctx_name);
480 bytecode_symbol_iterator_destroy(it);
481 return ret;
482}
483
f20baf8e 484/*
022d91ba 485 * Enable a single agent event for a given UST session.
f20baf8e
DG
486 *
487 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
488 */
fefd409b
DG
489int event_agent_enable(struct ltt_ust_session *usess,
490 struct agent *agt, struct lttng_event *event,
8404118c
JG
491 struct lttng_filter_bytecode *filter,
492 char *filter_expression)
f20baf8e
DG
493{
494 int ret, created = 0;
fefd409b 495 struct agent_event *aevent;
f20baf8e
DG
496
497 assert(usess);
498 assert(event);
fefd409b 499 assert(agt);
f20baf8e 500
022d91ba 501 DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d "
51755dc8
JG
502 ", loglevel %d and filter \"%s\"", event->name,
503 usess->id, event->loglevel_type, event->loglevel,
504 filter_expression ? filter_expression : "NULL");
f20baf8e 505
a9319624 506 aevent = agent_find_event(event->name, event->loglevel_type,
71a559f8 507 event->loglevel, filter_expression, agt);
fefd409b 508 if (!aevent) {
a9319624
PP
509 aevent = agent_create_event(event->name, event->loglevel_type,
510 event->loglevel, filter,
51755dc8 511 filter_expression);
fefd409b 512 if (!aevent) {
f20baf8e
DG
513 ret = LTTNG_ERR_NOMEM;
514 goto error;
515 }
5e28af38
JG
516 filter = NULL;
517 filter_expression = NULL;
f20baf8e
DG
518 created = 1;
519 }
520
521 /* Already enabled? */
fefd409b 522 if (aevent->enabled) {
5e28af38 523 ret = LTTNG_OK;
f20baf8e
DG
524 goto end;
525 }
526
b7085e53
JR
527 if (created && aevent->filter) {
528 ret = add_filter_app_ctx(
529 aevent->filter, aevent->filter_expression, agt);
71a559f8
JG
530 if (ret != LTTNG_OK) {
531 goto error;
532 }
533 }
534
fefd409b 535 ret = agent_enable_event(aevent, agt->domain);
f20baf8e
DG
536 if (ret != LTTNG_OK) {
537 goto error;
538 }
539
540 /* If the event was created prior to the enable, add it to the domain. */
541 if (created) {
fefd409b 542 agent_add_event(aevent, agt);
f20baf8e
DG
543 }
544
5e28af38
JG
545 ret = LTTNG_OK;
546 goto end;
f20baf8e
DG
547
548error:
549 if (created) {
fefd409b 550 agent_destroy_event(aevent);
f20baf8e 551 }
5e28af38
JG
552end:
553 free(filter);
554 free(filter_expression);
f20baf8e
DG
555 return ret;
556}
557
da6c3a50 558/*
d1ec8e20
JG
559 * Return the default event name associated with the provided UST domain. Return
560 * NULL on error.
da6c3a50
DG
561 */
562const char *event_get_default_agent_ust_name(enum lttng_domain_type domain)
563{
564 const char *default_event_name = NULL;
565
0e115563
DG
566 switch (domain) {
567 case LTTNG_DOMAIN_LOG4J:
d1ec8e20 568 default_event_name = DEFAULT_LOG4J_EVENT_NAME;
0e115563
DG
569 break;
570 case LTTNG_DOMAIN_JUL:
d1ec8e20 571 default_event_name = DEFAULT_JUL_EVENT_NAME;
0e115563
DG
572 break;
573 case LTTNG_DOMAIN_PYTHON:
e7c82272 574 default_event_name = DEFAULT_PYTHON_EVENT_NAME;
0e115563
DG
575 break;
576 default:
da6c3a50
DG
577 assert(0);
578 }
579
580 return default_event_name;
581}
582
f20baf8e 583/*
e261a6cc 584 * Disable a given agent event for a given UST session.
f20baf8e 585 *
e261a6cc 586 * Must be called with the RCU read lock held.
f20baf8e
DG
587 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
588 */
e261a6cc
PP
589static int event_agent_disable_one(struct ltt_ust_session *usess,
590 struct agent *agt, struct agent_event *aevent)
f20baf8e
DG
591{
592 int ret;
be6a6276
DG
593 struct ltt_ust_event *uevent = NULL;
594 struct ltt_ust_channel *uchan = NULL;
71aecbf8 595 const char *ust_event_name, *ust_channel_name;
f20baf8e 596
fefd409b 597 assert(agt);
f20baf8e 598 assert(usess);
e261a6cc 599 assert(aevent);
f20baf8e 600
e261a6cc
PP
601 DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for session %" PRIu64,
602 aevent->name, aevent->loglevel_type, aevent->loglevel_value,
603 usess->id);
f20baf8e
DG
604
605 /* Already disabled? */
fefd409b 606 if (!aevent->enabled) {
f20baf8e
DG
607 goto end;
608 }
609
71aecbf8
DG
610 if (agt->domain == LTTNG_DOMAIN_JUL) {
611 ust_channel_name = DEFAULT_JUL_CHANNEL_NAME;
612 } else if (agt->domain == LTTNG_DOMAIN_LOG4J) {
613 ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME;
0e115563
DG
614 } else if (agt->domain == LTTNG_DOMAIN_PYTHON) {
615 ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME;
71aecbf8
DG
616 } else {
617 ret = LTTNG_ERR_INVALID;
618 goto error;
619 }
620
be6a6276
DG
621 /*
622 * Disable it on the UST side. First get the channel reference then find
623 * the event and finally disable it.
624 */
625 uchan = trace_ust_find_channel_by_name(usess->domain_global.channels,
71aecbf8 626 (char *) ust_channel_name);
be6a6276
DG
627 if (!uchan) {
628 ret = LTTNG_ERR_UST_CHAN_NOT_FOUND;
629 goto error;
630 }
631
da6c3a50
DG
632 ust_event_name = event_get_default_agent_ust_name(agt->domain);
633 if (!ust_event_name) {
634 ret = LTTNG_ERR_FATAL;
635 goto error;
be6a6276
DG
636 }
637
638 /*
b953b8cd
PP
639 * Agent UST event has its loglevel type forced to
640 * LTTNG_UST_LOGLEVEL_ALL. The actual loglevel type/value filtering
641 * happens thanks to an UST filter. The following -1 is actually
642 * ignored since the type is LTTNG_UST_LOGLEVEL_ALL.
be6a6276 643 */
da6c3a50 644 uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name,
b953b8cd 645 aevent->filter, LTTNG_UST_LOGLEVEL_ALL, -1, NULL);
022d91ba 646 /* If the agent event exists, it must be available on the UST side. */
be6a6276
DG
647 assert(uevent);
648
649 ret = ust_app_disable_event_glb(usess, uchan, uevent);
650 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
651 ret = LTTNG_ERR_UST_DISABLE_FAIL;
652 goto error;
653 }
654
0dcfcf94
DG
655 /*
656 * Flag event that it's disabled so the shadow copy on the ust app side
657 * will disable it if an application shows up.
658 */
659 uevent->enabled = 0;
660
fefd409b 661 ret = agent_disable_event(aevent, agt->domain);
f20baf8e
DG
662 if (ret != LTTNG_OK) {
663 goto error;
664 }
665
666end:
667 return LTTNG_OK;
668
669error:
670 return ret;
671}
e261a6cc
PP
672
673/*
674 * Disable all agent events matching a given name for a given UST session.
675 *
676 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
677 */
678int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt,
679 char *event_name)
680{
681 int ret = LTTNG_OK;
682 struct agent_event *aevent;
683 struct lttng_ht_iter iter;
684 struct lttng_ht_node_str *node;
685
686 assert(agt);
687 assert(usess);
688 assert(event_name);
689
690 DBG("Event agent disabling %s (all loglevels) for session %" PRIu64, event_name, usess->id);
691
692 rcu_read_lock();
693 agent_find_events_by_name(event_name, agt, &iter);
694 node = lttng_ht_iter_get_node_str(&iter);
695
696 if (node == NULL) {
697 DBG2("Event agent NOT found by name %s", event_name);
698 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
699 goto end;
700 }
701
702 do {
703 aevent = caa_container_of(node, struct agent_event, node);
704 ret = event_agent_disable_one(usess, agt, aevent);
705
706 if (ret != LTTNG_OK) {
707 goto end;
708 }
709
710 /* Get next duplicate agent event by name. */
711 agent_event_next_duplicate(event_name, agt, &iter);
712 node = lttng_ht_iter_get_node_str(&iter);
713 } while (node);
714end:
715 rcu_read_unlock();
716 return ret;
717}
f20baf8e 718/*
022d91ba 719 * Disable all agent event for a given UST session.
f20baf8e
DG
720 *
721 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
722 */
fefd409b
DG
723int event_agent_disable_all(struct ltt_ust_session *usess,
724 struct agent *agt)
f20baf8e 725{
0dcfcf94 726 int ret;
fefd409b 727 struct agent_event *aevent;
f20baf8e
DG
728 struct lttng_ht_iter iter;
729
fefd409b 730 assert(agt);
f20baf8e
DG
731 assert(usess);
732
0dcfcf94
DG
733 /*
734 * Disable event on agent application. Continue to disable all other events
735 * if the * event is not found.
736 */
fefd409b 737 ret = event_agent_disable(usess, agt, "*");
0dcfcf94
DG
738 if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) {
739 goto error;
f20baf8e
DG
740 }
741
b9866e08 742 /* Disable every event. */
f20baf8e 743 rcu_read_lock();
fefd409b 744 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 745 node.node) {
0dcfcf94
DG
746 if (!aevent->enabled) {
747 continue;
748 }
749
750 ret = event_agent_disable(usess, agt, aevent->name);
751 if (ret != LTTNG_OK) {
b9866e08 752 goto error_unlock;
f20baf8e 753 }
f20baf8e 754 }
f20baf8e
DG
755 ret = LTTNG_OK;
756
b9866e08
JG
757error_unlock:
758 rcu_read_unlock();
f20baf8e
DG
759error:
760 return ret;
761}
This page took 0.111115 seconds and 4 git commands to generate.