Implement kernel filter support
[lttng-tools.git] / src / bin / lttng-sessiond / event.c
CommitLineData
54d01ffb
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 *
d14d33bf
AM
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
54d01ffb 7 *
d14d33bf
AM
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
54d01ffb 12 *
d14d33bf
AM
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
54d01ffb
DG
16 */
17
be040666 18#define _GNU_SOURCE
6c1c0768 19#define _LGPL_SOURCE
d87bfb32 20#include <errno.h>
54d01ffb 21#include <urcu/list.h>
2bdd86d4 22#include <string.h>
54d01ffb
DG
23
24#include <lttng/lttng.h>
db758600 25#include <common/error.h>
10a8a223 26#include <common/sessiond-comm/sessiond-comm.h>
54d01ffb
DG
27
28#include "channel.h"
29#include "event.h"
4771f025 30#include "kernel.h"
be6a6276 31#include "lttng-sessiond.h"
9df8df5e 32#include "ust-ctl.h"
edb67388
DG
33#include "ust-app.h"
34#include "trace-kernel.h"
35#include "trace-ust.h"
54d01ffb 36
025faf73
DG
37/*
38 * Add unique UST event based on the event name, filter bytecode and loglevel.
39 */
18eace3b
DG
40static void add_unique_ust_event(struct lttng_ht *ht,
41 struct ltt_ust_event *event)
42{
43 struct cds_lfht_node *node_ptr;
44 struct ltt_ust_ht_key key;
45
46 assert(ht);
47 assert(ht->ht);
48 assert(event);
49
50 key.name = event->attr.name;
51 key.filter = (struct lttng_filter_bytecode *) event->filter;
52 key.loglevel = event->attr.loglevel;
4031e53e 53 key.exclusion = event->exclusion;
18eace3b
DG
54
55 node_ptr = cds_lfht_add_unique(ht->ht,
56 ht->hash_fct(event->node.key, lttng_ht_seed),
57 trace_ust_ht_match_event, &key, &event->node.node);
58 assert(node_ptr == &event->node.node);
59}
60
54d01ffb 61/*
7a3d1328 62 * Disable kernel tracepoint event for a channel from the kernel session.
54d01ffb 63 */
d0ae4ea8 64int event_kernel_disable_event(struct ltt_kernel_channel *kchan,
d3a56674 65 char *event_name)
54d01ffb
DG
66{
67 int ret;
68 struct ltt_kernel_event *kevent;
69
0525e9ae
DG
70 assert(kchan);
71
d0ae4ea8
MD
72 kevent = trace_kernel_get_event_by_name(event_name, kchan,
73 LTTNG_EVENT_ALL);
54d01ffb 74 if (kevent == NULL) {
f73fabfd 75 ret = LTTNG_ERR_NO_EVENT;
54d01ffb
DG
76 goto error;
77 }
78
79 ret = kernel_disable_event(kevent);
80 if (ret < 0) {
f73fabfd 81 ret = LTTNG_ERR_KERN_DISABLE_FAIL;
54d01ffb
DG
82 goto error;
83 }
84
85 DBG("Kernel event %s disable for channel %s.",
86 kevent->event->name, kchan->channel->name);
87
f73fabfd 88 ret = LTTNG_OK;
54d01ffb
DG
89
90error:
91 return ret;
92}
93
94/*
7a3d1328 95 * Disable kernel tracepoint events for a channel from the kernel session.
54d01ffb 96 */
d0ae4ea8
MD
97int event_kernel_disable_event_type(struct ltt_kernel_channel *kchan,
98 enum lttng_event_type type)
54d01ffb
DG
99{
100 int ret;
101 struct ltt_kernel_event *kevent;
102
0525e9ae
DG
103 assert(kchan);
104
54d01ffb
DG
105 /* For each event in the kernel session */
106 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
d0ae4ea8
MD
107 if (type != LTTNG_EVENT_ALL && kevent->type != type)
108 continue;
54d01ffb
DG
109 ret = kernel_disable_event(kevent);
110 if (ret < 0) {
111 /* We continue disabling the rest */
112 continue;
113 }
114 }
f73fabfd 115 ret = LTTNG_OK;
7a3d1328
MD
116 return ret;
117}
118
7a3d1328
MD
119/*
120 * Disable all kernel event for a channel from the kernel session.
121 */
d0ae4ea8 122int event_kernel_disable_event_all(struct ltt_kernel_channel *kchan)
7a3d1328 123{
d0ae4ea8 124 return event_kernel_disable_event_type(kchan, LTTNG_EVENT_ALL);
54d01ffb
DG
125}
126
127/*
7a3d1328 128 * Enable kernel tracepoint event for a channel from the kernel session.
49d21f93 129 * We own filter_expression and filter.
54d01ffb 130 */
d0ae4ea8 131int event_kernel_enable_event(struct ltt_kernel_channel *kchan,
00a62084
MD
132 struct lttng_event *event, char *filter_expression,
133 struct lttng_filter_bytecode *filter)
54d01ffb
DG
134{
135 int ret;
136 struct ltt_kernel_event *kevent;
137
0525e9ae
DG
138 assert(kchan);
139 assert(event);
140
00a62084
MD
141 kevent = trace_kernel_find_event(event->name, kchan,
142 event->type, filter);
54d01ffb 143 if (kevent == NULL) {
00a62084
MD
144 ret = kernel_create_event(event, kchan,
145 filter_expression, filter);
54d01ffb 146 if (ret < 0) {
bd29c13d
DG
147 switch (-ret) {
148 case EEXIST:
f73fabfd 149 ret = LTTNG_ERR_KERN_EVENT_EXIST;
bd29c13d
DG
150 break;
151 case ENOSYS:
f73fabfd 152 ret = LTTNG_ERR_KERN_EVENT_ENOSYS;
bd29c13d
DG
153 break;
154 default:
f73fabfd 155 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
bd29c13d 156 break;
d87bfb32 157 }
7a3d1328 158 goto end;
54d01ffb
DG
159 }
160 } else if (kevent->enabled == 0) {
161 ret = kernel_enable_event(kevent);
162 if (ret < 0) {
f73fabfd 163 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
7a3d1328 164 goto end;
54d01ffb 165 }
42224349
DG
166 } else {
167 /* At this point, the event is considered enabled */
f73fabfd 168 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349 169 goto end;
54d01ffb 170 }
42224349 171
f73fabfd 172 ret = LTTNG_OK;
7a3d1328 173end:
54d01ffb
DG
174 return ret;
175}
176
7f79d3a1
DG
177/*
178 * ============================
179 * UST : The Ultimate Frontier!
180 * ============================
181 */
182
76d45b40
DG
183/*
184 * Enable all UST tracepoints for a channel from a UST session.
185 */
7972aab2 186int event_ust_enable_all_tracepoints(struct ltt_ust_session *usess,
6b453b5e
JG
187 struct ltt_ust_channel *uchan,
188 char *filter_expression,
189 struct lttng_filter_bytecode *filter)
76d45b40 190{
6775595e 191 int ret, i, size;
bec39940 192 struct lttng_ht_iter iter;
76d45b40 193 struct ltt_ust_event *uevent = NULL;
7f79d3a1 194 struct lttng_event *events = NULL;
76d45b40 195
0525e9ae
DG
196 assert(usess);
197 assert(uchan);
198
025faf73
DG
199 rcu_read_lock();
200
7972aab2
DG
201 /* Enable existing events */
202 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
203 node.node) {
204 if (uevent->enabled == 0) {
205 ret = ust_app_enable_event_glb(usess, uchan, uevent);
206 if (ret < 0) {
76d45b40
DG
207 continue;
208 }
7972aab2
DG
209 uevent->enabled = 1;
210 }
211 }
76d45b40 212
7972aab2
DG
213 /* Get all UST available events */
214 size = ust_app_list_events(&events);
215 if (size < 0) {
216 ret = LTTNG_ERR_UST_LIST_FAIL;
217 goto error;
218 }
76d45b40 219
7972aab2
DG
220 for (i = 0; i < size; i++) {
221 /*
222 * Check if event exist and if so, continue since it was enable
223 * previously.
224 */
225 uevent = trace_ust_find_event(uchan->events, events[i].name, filter,
10646003 226 events[i].loglevel, NULL);
7972aab2 227 if (uevent != NULL) {
76d45b40
DG
228 ret = ust_app_enable_event_pid(usess, uchan, uevent,
229 events[i].pid);
230 if (ret < 0) {
7972aab2 231 if (ret != -LTTNG_UST_ERR_EXIST) {
f73fabfd 232 ret = LTTNG_ERR_UST_ENABLE_FAIL;
7972aab2 233 goto error;
76d45b40 234 }
76d45b40 235 }
7972aab2
DG
236 continue;
237 }
76d45b40 238
7972aab2 239 /* Create ust event */
6b453b5e
JG
240 uevent = trace_ust_create_event(&events[i], filter_expression,
241 filter, NULL);
7972aab2
DG
242 if (uevent == NULL) {
243 ret = LTTNG_ERR_FATAL;
244 goto error_destroy;
76d45b40
DG
245 }
246
7972aab2
DG
247 /* Create event for the specific PID */
248 ret = ust_app_enable_event_pid(usess, uchan, uevent,
249 events[i].pid);
250 if (ret < 0) {
251 if (ret == -LTTNG_UST_ERR_EXIST) {
252 ret = LTTNG_ERR_UST_EVENT_EXIST;
253 goto error;
254 } else {
255 ret = LTTNG_ERR_UST_ENABLE_FAIL;
256 goto error_destroy;
257 }
258 }
259
260 uevent->enabled = 1;
261 /* Add ltt ust event to channel */
262 rcu_read_lock();
263 add_unique_ust_event(uchan->events, uevent);
264 rcu_read_unlock();
76d45b40 265 }
7972aab2 266 free(events);
76d45b40 267
025faf73 268 rcu_read_unlock();
f73fabfd 269 return LTTNG_OK;
76d45b40 270
7f79d3a1 271error_destroy:
76d45b40 272 trace_ust_destroy_event(uevent);
7f79d3a1
DG
273
274error:
275 free(events);
025faf73 276 rcu_read_unlock();
76d45b40
DG
277 return ret;
278}
279
2bdd86d4
MD
280/*
281 * Enable UST tracepoint event for a channel from a UST session.
49d21f93 282 * We own filter_expression, filter, and exclusion.
2bdd86d4 283 */
7972aab2 284int event_ust_enable_tracepoint(struct ltt_ust_session *usess,
025faf73 285 struct ltt_ust_channel *uchan, struct lttng_event *event,
6b453b5e 286 char *filter_expression,
f1613f52
JI
287 struct lttng_filter_bytecode *filter,
288 struct lttng_event_exclusion *exclusion)
2bdd86d4 289{
f73fabfd 290 int ret = LTTNG_OK, to_create = 0;
edb67388
DG
291 struct ltt_ust_event *uevent;
292
0525e9ae
DG
293 assert(usess);
294 assert(uchan);
295 assert(event);
296
18eace3b
DG
297 rcu_read_lock();
298
025faf73 299 uevent = trace_ust_find_event(uchan->events, event->name, filter,
10646003 300 event->loglevel, exclusion);
edb67388 301 if (uevent == NULL) {
6b453b5e
JG
302 uevent = trace_ust_create_event(event, filter_expression,
303 filter, exclusion);
49d21f93
MD
304 /* We have passed ownership */
305 filter_expression = NULL;
306 filter = NULL;
307 exclusion = NULL;
edb67388 308 if (uevent == NULL) {
95a82664 309 ret = LTTNG_ERR_UST_ENABLE_FAIL;
edb67388
DG
310 goto error;
311 }
025faf73 312
fc34caaa 313 /* Valid to set it after the goto error since uevent is still NULL */
edb67388
DG
314 to_create = 1;
315 }
2bdd86d4 316
7f79d3a1
DG
317 if (uevent->enabled) {
318 /* It's already enabled so everything is OK */
5bcdda4f 319 ret = LTTNG_ERR_UST_EVENT_ENABLED;
7f79d3a1
DG
320 goto end;
321 }
322
fc34caaa
DG
323 uevent->enabled = 1;
324
7972aab2
DG
325 if (to_create) {
326 /* Create event on all UST registered apps for session */
327 ret = ust_app_create_event_glb(usess, uchan, uevent);
328 } else {
329 /* Enable event on all UST registered apps for session */
330 ret = ust_app_enable_event_glb(usess, uchan, uevent);
331 }
48842b30 332
7972aab2
DG
333 if (ret < 0) {
334 if (ret == -LTTNG_UST_ERR_EXIST) {
335 ret = LTTNG_ERR_UST_EVENT_EXIST;
336 goto end;
337 } else {
338 ret = LTTNG_ERR_UST_ENABLE_FAIL;
339 goto error;
edb67388 340 }
2bdd86d4 341 }
48842b30 342
7f79d3a1 343 if (to_create) {
fc34caaa 344 /* Add ltt ust event to channel */
18eace3b 345 add_unique_ust_event(uchan->events, uevent);
7f79d3a1 346 }
edb67388 347
7f79d3a1
DG
348 DBG("Event UST %s %s in channel %s", uevent->attr.name,
349 to_create ? "created" : "enabled", uchan->name);
350
f73fabfd 351 ret = LTTNG_OK;
fc34caaa 352
fb89d070 353end:
18eace3b 354 rcu_read_unlock();
49d21f93
MD
355 free(filter_expression);
356 free(filter);
357 free(exclusion);
fc34caaa 358 return ret;
edb67388
DG
359
360error:
fc34caaa
DG
361 /*
362 * Only destroy event on creation time (not enabling time) because if the
363 * event is found in the channel (to_create == 0), it means that at some
364 * point the enable_event worked and it's thus valid to keep it alive.
365 * Destroying it also implies that we also destroy it's shadow copy to sync
366 * everyone up.
367 */
368 if (to_create) {
369 /* In this code path, the uevent was not added to the hash table */
370 trace_ust_destroy_event(uevent);
371 }
18eace3b 372 rcu_read_unlock();
49d21f93
MD
373 free(filter_expression);
374 free(filter);
375 free(exclusion);
2bdd86d4
MD
376 return ret;
377}
378
7f79d3a1
DG
379/*
380 * Disable UST tracepoint of a channel from a UST session.
381 */
7972aab2 382int event_ust_disable_tracepoint(struct ltt_ust_session *usess,
7f79d3a1 383 struct ltt_ust_channel *uchan, char *event_name)
2bdd86d4
MD
384{
385 int ret;
7f79d3a1 386 struct ltt_ust_event *uevent;
18eace3b
DG
387 struct lttng_ht_node_str *node;
388 struct lttng_ht_iter iter;
18eace3b 389 struct lttng_ht *ht;
2bdd86d4 390
0525e9ae
DG
391 assert(usess);
392 assert(uchan);
393 assert(event_name);
394
18eace3b
DG
395 ht = uchan->events;
396
18eace3b 397 rcu_read_lock();
025faf73
DG
398
399 /*
400 * We use a custom lookup since we need the iterator for the next_duplicate
401 * call in the do while loop below.
402 */
403 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed),
404 trace_ust_ht_match_event_by_name, event_name, &iter.iter);
18eace3b
DG
405 node = lttng_ht_iter_get_node_str(&iter);
406 if (node == NULL) {
407 DBG2("Trace UST event NOT found by name %s", event_name);
f73fabfd 408 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
7f79d3a1 409 goto error;
2bdd86d4 410 }
7f79d3a1 411
18eace3b
DG
412 do {
413 uevent = caa_container_of(node, struct ltt_ust_event, node);
025faf73
DG
414 assert(uevent);
415
18eace3b
DG
416 if (uevent->enabled == 0) {
417 /* It's already disabled so everything is OK */
a1dcaf0f 418 goto next;
7f79d3a1 419 }
18eace3b 420
7972aab2
DG
421 ret = ust_app_disable_event_glb(usess, uchan, uevent);
422 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
423 ret = LTTNG_ERR_UST_DISABLE_FAIL;
18eace3b
DG
424 goto error;
425 }
18eace3b
DG
426 uevent->enabled = 0;
427
025faf73
DG
428 DBG2("Event UST %s disabled in channel %s", uevent->attr.name,
429 uchan->name);
430
a1dcaf0f 431next:
18eace3b
DG
432 /* Get next duplicate event by name. */
433 cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name,
434 event_name, &iter.iter);
435 node = lttng_ht_iter_get_node_str(&iter);
436 } while (node);
7f79d3a1 437
f73fabfd 438 ret = LTTNG_OK;
7f79d3a1 439
7f79d3a1 440error:
18eace3b 441 rcu_read_unlock();
7f79d3a1
DG
442 return ret;
443}
444
445/*
446 * Disable all UST tracepoints for a channel from a UST session.
447 */
7972aab2 448int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess,
7f79d3a1
DG
449 struct ltt_ust_channel *uchan)
450{
6775595e 451 int ret, i, size;
bec39940 452 struct lttng_ht_iter iter;
7f79d3a1
DG
453 struct ltt_ust_event *uevent = NULL;
454 struct lttng_event *events = NULL;
455
0525e9ae
DG
456 assert(usess);
457 assert(uchan);
458
025faf73
DG
459 rcu_read_lock();
460
7972aab2
DG
461 /* Disabling existing events */
462 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
463 node.node) {
464 if (uevent->enabled == 1) {
465 ret = event_ust_disable_tracepoint(usess, uchan,
466 uevent->attr.name);
467 if (ret < 0) {
7f79d3a1
DG
468 continue;
469 }
470 }
7f79d3a1 471 }
7972aab2
DG
472
473 /* Get all UST available events */
474 size = ust_app_list_events(&events);
475 if (size < 0) {
476 ret = LTTNG_ERR_UST_LIST_FAIL;
7f79d3a1
DG
477 goto error;
478 }
479
7972aab2
DG
480 for (i = 0; i < size; i++) {
481 ret = event_ust_disable_tracepoint(usess, uchan,
482 events[i].name);
483 if (ret != LTTNG_OK) {
484 /* Continue to disable the rest... */
485 continue;
486 }
487 }
488 free(events);
489
025faf73 490 rcu_read_unlock();
f73fabfd 491 return LTTNG_OK;
7f79d3a1
DG
492
493error:
494 free(events);
025faf73 495 rcu_read_unlock();
2bdd86d4
MD
496 return ret;
497}
f20baf8e
DG
498
499/*
022d91ba 500 * Enable all agent event for a given UST session.
f20baf8e
DG
501 *
502 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
503 */
022d91ba 504int event_agent_enable_all(struct ltt_ust_session *usess,
fefd409b
DG
505 struct agent *agt, struct lttng_event *event,
506 struct lttng_filter_bytecode *filter)
f20baf8e
DG
507{
508 int ret;
fefd409b 509 struct agent_event *aevent;
f20baf8e
DG
510 struct lttng_ht_iter iter;
511
512 assert(usess);
513
022d91ba 514 DBG("Event agent enabling ALL events for session %" PRIu64, usess->id);
f20baf8e 515
022d91ba 516 /* Enable event on agent application through TCP socket. */
fefd409b 517 ret = event_agent_enable(usess, agt, event, filter);
f20baf8e
DG
518 if (ret != LTTNG_OK) {
519 goto error;
520 }
521
522 /* Flag every event that they are now enabled. */
523 rcu_read_lock();
fefd409b 524 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 525 node.node) {
fefd409b 526 aevent->enabled = 1;
f20baf8e
DG
527 }
528 rcu_read_unlock();
529
530 ret = LTTNG_OK;
531
532error:
533 return ret;
534}
535
536/*
022d91ba 537 * Enable a single agent event for a given UST session.
f20baf8e
DG
538 *
539 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
540 */
fefd409b
DG
541int event_agent_enable(struct ltt_ust_session *usess,
542 struct agent *agt, struct lttng_event *event,
be6a6276 543 struct lttng_filter_bytecode *filter)
f20baf8e
DG
544{
545 int ret, created = 0;
fefd409b 546 struct agent_event *aevent;
f20baf8e
DG
547
548 assert(usess);
549 assert(event);
fefd409b 550 assert(agt);
f20baf8e 551
022d91ba 552 DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d "
b2064f54
DG
553 "and loglevel %d", event->name, usess->id, event->loglevel_type,
554 event->loglevel);
f20baf8e 555
fefd409b
DG
556 aevent = agent_find_event(event->name, event->loglevel, agt);
557 if (!aevent) {
558 aevent = agent_create_event(event->name, filter);
559 if (!aevent) {
f20baf8e
DG
560 ret = LTTNG_ERR_NOMEM;
561 goto error;
562 }
fefd409b
DG
563 aevent->loglevel = event->loglevel;
564 aevent->loglevel_type = event->loglevel_type;
f20baf8e
DG
565 created = 1;
566 }
567
568 /* Already enabled? */
fefd409b 569 if (aevent->enabled) {
f20baf8e
DG
570 goto end;
571 }
572
fefd409b 573 ret = agent_enable_event(aevent, agt->domain);
f20baf8e
DG
574 if (ret != LTTNG_OK) {
575 goto error;
576 }
577
578 /* If the event was created prior to the enable, add it to the domain. */
579 if (created) {
fefd409b 580 agent_add_event(aevent, agt);
f20baf8e
DG
581 }
582
583end:
584 return LTTNG_OK;
585
586error:
587 if (created) {
fefd409b 588 agent_destroy_event(aevent);
f20baf8e
DG
589 }
590 return ret;
591}
592
da6c3a50
DG
593/*
594 * Return the agent default event name to use by testing if the process is root
595 * or not. Return NULL on error.
596 */
597const char *event_get_default_agent_ust_name(enum lttng_domain_type domain)
598{
599 const char *default_event_name = NULL;
600
0e115563
DG
601 switch (domain) {
602 case LTTNG_DOMAIN_LOG4J:
da6c3a50 603 if (is_root) {
0e115563 604 default_event_name = DEFAULT_SYS_LOG4J_EVENT_NAME;
da6c3a50 605 } else {
0e115563 606 default_event_name = DEFAULT_USER_LOG4J_EVENT_NAME;
da6c3a50 607 }
0e115563
DG
608 break;
609 case LTTNG_DOMAIN_JUL:
da6c3a50 610 if (is_root) {
0e115563 611 default_event_name = DEFAULT_SYS_JUL_EVENT_NAME;
da6c3a50 612 } else {
0e115563 613 default_event_name = DEFAULT_USER_JUL_EVENT_NAME;
da6c3a50 614 }
0e115563
DG
615 break;
616 case LTTNG_DOMAIN_PYTHON:
617 default_event_name = DEFAULT_USER_PYTHON_EVENT_NAME;
618 break;
619 default:
da6c3a50
DG
620 assert(0);
621 }
622
623 return default_event_name;
624}
625
f20baf8e 626/*
022d91ba 627 * Disable a single agent event for a given UST session.
f20baf8e
DG
628 *
629 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
630 */
fefd409b
DG
631int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt,
632 char *event_name)
f20baf8e
DG
633{
634 int ret;
fefd409b 635 struct agent_event *aevent;
be6a6276
DG
636 struct ltt_ust_event *uevent = NULL;
637 struct ltt_ust_channel *uchan = NULL;
71aecbf8 638 const char *ust_event_name, *ust_channel_name;
f20baf8e 639
fefd409b 640 assert(agt);
f20baf8e
DG
641 assert(usess);
642 assert(event_name);
643
022d91ba 644 DBG("Event agent disabling %s for session %" PRIu64, event_name, usess->id);
f20baf8e 645
fefd409b
DG
646 aevent = agent_find_event_by_name(event_name, agt);
647 if (!aevent) {
f20baf8e
DG
648 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
649 goto error;
650 }
651
652 /* Already disabled? */
fefd409b 653 if (!aevent->enabled) {
f20baf8e
DG
654 goto end;
655 }
656
71aecbf8
DG
657 if (agt->domain == LTTNG_DOMAIN_JUL) {
658 ust_channel_name = DEFAULT_JUL_CHANNEL_NAME;
659 } else if (agt->domain == LTTNG_DOMAIN_LOG4J) {
660 ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME;
0e115563
DG
661 } else if (agt->domain == LTTNG_DOMAIN_PYTHON) {
662 ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME;
71aecbf8
DG
663 } else {
664 ret = LTTNG_ERR_INVALID;
665 goto error;
666 }
667
be6a6276
DG
668 /*
669 * Disable it on the UST side. First get the channel reference then find
670 * the event and finally disable it.
671 */
672 uchan = trace_ust_find_channel_by_name(usess->domain_global.channels,
71aecbf8 673 (char *) ust_channel_name);
be6a6276
DG
674 if (!uchan) {
675 ret = LTTNG_ERR_UST_CHAN_NOT_FOUND;
676 goto error;
677 }
678
da6c3a50
DG
679 ust_event_name = event_get_default_agent_ust_name(agt->domain);
680 if (!ust_event_name) {
681 ret = LTTNG_ERR_FATAL;
682 goto error;
be6a6276
DG
683 }
684
685 /*
022d91ba 686 * The loglevel is hardcoded with 0 here since the agent ust event is set
be6a6276 687 * with the loglevel type to ALL thus the loglevel stays 0. The event's
022d91ba 688 * filter is the one handling the loglevel for agent.
be6a6276 689 */
da6c3a50 690 uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name,
fefd409b 691 aevent->filter, 0, NULL);
022d91ba 692 /* If the agent event exists, it must be available on the UST side. */
be6a6276
DG
693 assert(uevent);
694
695 ret = ust_app_disable_event_glb(usess, uchan, uevent);
696 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
697 ret = LTTNG_ERR_UST_DISABLE_FAIL;
698 goto error;
699 }
700
0dcfcf94
DG
701 /*
702 * Flag event that it's disabled so the shadow copy on the ust app side
703 * will disable it if an application shows up.
704 */
705 uevent->enabled = 0;
706
fefd409b 707 ret = agent_disable_event(aevent, agt->domain);
f20baf8e
DG
708 if (ret != LTTNG_OK) {
709 goto error;
710 }
711
712end:
713 return LTTNG_OK;
714
715error:
716 return ret;
717}
718/*
022d91ba 719 * Disable all agent event for a given UST session.
f20baf8e
DG
720 *
721 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
722 */
fefd409b
DG
723int event_agent_disable_all(struct ltt_ust_session *usess,
724 struct agent *agt)
f20baf8e 725{
0dcfcf94 726 int ret;
fefd409b 727 struct agent_event *aevent;
f20baf8e
DG
728 struct lttng_ht_iter iter;
729
fefd409b 730 assert(agt);
f20baf8e
DG
731 assert(usess);
732
0dcfcf94
DG
733 /*
734 * Disable event on agent application. Continue to disable all other events
735 * if the * event is not found.
736 */
fefd409b 737 ret = event_agent_disable(usess, agt, "*");
0dcfcf94
DG
738 if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) {
739 goto error;
f20baf8e
DG
740 }
741
742 /* Flag every event that they are now enabled. */
743 rcu_read_lock();
fefd409b 744 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 745 node.node) {
0dcfcf94
DG
746 if (!aevent->enabled) {
747 continue;
748 }
749
750 ret = event_agent_disable(usess, agt, aevent->name);
751 if (ret != LTTNG_OK) {
752 rcu_read_unlock();
753 goto error;
f20baf8e 754 }
f20baf8e
DG
755 }
756 rcu_read_unlock();
757
758 ret = LTTNG_OK;
759
760error:
761 return ret;
762}
This page took 0.075846 seconds and 4 git commands to generate.