Add safety assert() in session daemon
[lttng-tools.git] / src / bin / lttng-sessiond / event.c
CommitLineData
54d01ffb
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 *
d14d33bf
AM
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
54d01ffb 7 *
d14d33bf
AM
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
54d01ffb 12 *
d14d33bf
AM
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
54d01ffb
DG
16 */
17
be040666 18#define _GNU_SOURCE
d87bfb32 19#include <errno.h>
54d01ffb 20#include <urcu/list.h>
2bdd86d4 21#include <string.h>
54d01ffb
DG
22
23#include <lttng/lttng.h>
db758600 24#include <common/error.h>
10a8a223 25#include <common/sessiond-comm/sessiond-comm.h>
54d01ffb
DG
26
27#include "channel.h"
28#include "event.h"
4771f025 29#include "kernel.h"
9df8df5e 30#include "ust-ctl.h"
edb67388
DG
31#include "ust-app.h"
32#include "trace-kernel.h"
33#include "trace-ust.h"
54d01ffb 34
025faf73
DG
35/*
36 * Add unique UST event based on the event name, filter bytecode and loglevel.
37 */
18eace3b
DG
38static void add_unique_ust_event(struct lttng_ht *ht,
39 struct ltt_ust_event *event)
40{
41 struct cds_lfht_node *node_ptr;
42 struct ltt_ust_ht_key key;
43
44 assert(ht);
45 assert(ht->ht);
46 assert(event);
47
48 key.name = event->attr.name;
49 key.filter = (struct lttng_filter_bytecode *) event->filter;
50 key.loglevel = event->attr.loglevel;
51
52 node_ptr = cds_lfht_add_unique(ht->ht,
53 ht->hash_fct(event->node.key, lttng_ht_seed),
54 trace_ust_ht_match_event, &key, &event->node.node);
55 assert(node_ptr == &event->node.node);
56}
57
8c9ae521
DG
58/*
59 * Setup a lttng_event used to enable *all* syscall tracing.
60 */
61static void init_syscalls_kernel_event(struct lttng_event *event)
62{
0525e9ae
DG
63 assert(event);
64
8c9ae521
DG
65 event->name[0] = '\0';
66 /*
67 * We use LTTNG_EVENT* here since the trace kernel creation will make the
68 * right changes for the kernel.
69 */
70 event->type = LTTNG_EVENT_SYSCALL;
71}
72
54d01ffb 73/*
7a3d1328 74 * Disable kernel tracepoint event for a channel from the kernel session.
54d01ffb 75 */
7a3d1328 76int event_kernel_disable_tracepoint(struct ltt_kernel_session *ksession,
54d01ffb
DG
77 struct ltt_kernel_channel *kchan, char *event_name)
78{
79 int ret;
80 struct ltt_kernel_event *kevent;
81
0525e9ae
DG
82 assert(kchan);
83
54d01ffb
DG
84 kevent = trace_kernel_get_event_by_name(event_name, kchan);
85 if (kevent == NULL) {
f73fabfd 86 ret = LTTNG_ERR_NO_EVENT;
54d01ffb
DG
87 goto error;
88 }
89
90 ret = kernel_disable_event(kevent);
91 if (ret < 0) {
f73fabfd 92 ret = LTTNG_ERR_KERN_DISABLE_FAIL;
54d01ffb
DG
93 goto error;
94 }
95
96 DBG("Kernel event %s disable for channel %s.",
97 kevent->event->name, kchan->channel->name);
98
f73fabfd 99 ret = LTTNG_OK;
54d01ffb
DG
100
101error:
102 return ret;
103}
104
105/*
7a3d1328 106 * Disable kernel tracepoint events for a channel from the kernel session.
54d01ffb 107 */
7a3d1328 108int event_kernel_disable_all_tracepoints(struct ltt_kernel_session *ksession,
54d01ffb
DG
109 struct ltt_kernel_channel *kchan)
110{
111 int ret;
112 struct ltt_kernel_event *kevent;
113
0525e9ae
DG
114 assert(kchan);
115
54d01ffb
DG
116 /* For each event in the kernel session */
117 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
118 ret = kernel_disable_event(kevent);
119 if (ret < 0) {
120 /* We continue disabling the rest */
121 continue;
122 }
123 }
f73fabfd 124 ret = LTTNG_OK;
7a3d1328
MD
125 return ret;
126}
127
128/*
129 * Disable kernel syscall events for a channel from the kernel session.
130 */
131int event_kernel_disable_all_syscalls(struct ltt_kernel_session *ksession,
132 struct ltt_kernel_channel *kchan)
133{
134 ERR("Cannot disable syscall tracing for existing session. Please destroy session instead.");
f73fabfd 135 return LTTNG_OK; /* Return OK so disable all succeeds */
7a3d1328 136}
54d01ffb 137
7a3d1328
MD
138/*
139 * Disable all kernel event for a channel from the kernel session.
140 */
141int event_kernel_disable_all(struct ltt_kernel_session *ksession,
142 struct ltt_kernel_channel *kchan)
143{
144 int ret;
145
0525e9ae
DG
146 assert(ksession);
147 assert(kchan);
148
7a3d1328 149 ret = event_kernel_disable_all_tracepoints(ksession, kchan);
f73fabfd 150 if (ret != LTTNG_OK)
7a3d1328
MD
151 return ret;
152 ret = event_kernel_disable_all_syscalls(ksession, kchan);
54d01ffb
DG
153 return ret;
154}
155
156/*
7a3d1328 157 * Enable kernel tracepoint event for a channel from the kernel session.
54d01ffb 158 */
7a3d1328 159int event_kernel_enable_tracepoint(struct ltt_kernel_session *ksession,
54d01ffb
DG
160 struct ltt_kernel_channel *kchan, struct lttng_event *event)
161{
162 int ret;
163 struct ltt_kernel_event *kevent;
164
0525e9ae
DG
165 assert(kchan);
166 assert(event);
167
54d01ffb
DG
168 kevent = trace_kernel_get_event_by_name(event->name, kchan);
169 if (kevent == NULL) {
170 ret = kernel_create_event(event, kchan);
171 if (ret < 0) {
bd29c13d
DG
172 switch (-ret) {
173 case EEXIST:
f73fabfd 174 ret = LTTNG_ERR_KERN_EVENT_EXIST;
bd29c13d
DG
175 break;
176 case ENOSYS:
f73fabfd 177 ret = LTTNG_ERR_KERN_EVENT_ENOSYS;
bd29c13d
DG
178 break;
179 default:
f73fabfd 180 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
bd29c13d 181 break;
d87bfb32 182 }
7a3d1328 183 goto end;
54d01ffb
DG
184 }
185 } else if (kevent->enabled == 0) {
186 ret = kernel_enable_event(kevent);
187 if (ret < 0) {
f73fabfd 188 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
7a3d1328 189 goto end;
54d01ffb 190 }
42224349
DG
191 } else {
192 /* At this point, the event is considered enabled */
f73fabfd 193 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349 194 goto end;
54d01ffb 195 }
42224349 196
f73fabfd 197 ret = LTTNG_OK;
7a3d1328 198end:
54d01ffb
DG
199 return ret;
200}
201
202/*
7a3d1328 203 * Enable all kernel tracepoint events of a channel of the kernel session.
54d01ffb 204 */
7a3d1328 205int event_kernel_enable_all_tracepoints(struct ltt_kernel_session *ksession,
54d01ffb
DG
206 struct ltt_kernel_channel *kchan, int kernel_tracer_fd)
207{
208 int size, i, ret;
209 struct ltt_kernel_event *kevent;
8f69e5eb 210 struct lttng_event *event_list = NULL;
54d01ffb 211
0525e9ae
DG
212 assert(kchan);
213
54d01ffb
DG
214 /* For each event in the kernel session */
215 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
8f69e5eb
DG
216 if (kevent->enabled == 0) {
217 ret = kernel_enable_event(kevent);
218 if (ret < 0) {
219 /* Enable failed but still continue */
220 continue;
221 }
54d01ffb
DG
222 }
223 }
224
225 size = kernel_list_events(kernel_tracer_fd, &event_list);
226 if (size < 0) {
f73fabfd 227 ret = LTTNG_ERR_KERN_LIST_FAIL;
7a3d1328 228 goto end;
54d01ffb
DG
229 }
230
231 for (i = 0; i < size; i++) {
232 kevent = trace_kernel_get_event_by_name(event_list[i].name, kchan);
233 if (kevent == NULL) {
234 /* Default event type for enable all */
235 event_list[i].type = LTTNG_EVENT_TRACEPOINT;
236 /* Enable each single tracepoint event */
237 ret = kernel_create_event(&event_list[i], kchan);
238 if (ret < 0) {
239 /* Ignore error here and continue */
240 }
241 }
242 }
54d01ffb 243 free(event_list);
8f69e5eb 244
f73fabfd 245 ret = LTTNG_OK;
7a3d1328 246end:
54d01ffb
DG
247 return ret;
248}
8c9ae521
DG
249
250/*
7a3d1328 251 * Enable all kernel tracepoint events of a channel of the kernel session.
8c9ae521 252 */
7a3d1328 253int event_kernel_enable_all_syscalls(struct ltt_kernel_session *ksession,
8c9ae521
DG
254 struct ltt_kernel_channel *kchan, int kernel_tracer_fd)
255{
256 int ret;
257 struct lttng_event event;
258
0525e9ae
DG
259 assert(kchan);
260
8c9ae521
DG
261 init_syscalls_kernel_event(&event);
262
263 DBG("Enabling all syscall tracing");
264
265 ret = kernel_create_event(&event, kchan);
266 if (ret < 0) {
8f69e5eb 267 if (ret == -EEXIST) {
f73fabfd 268 ret = LTTNG_ERR_KERN_EVENT_EXIST;
8f69e5eb 269 } else {
f73fabfd 270 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
8f69e5eb 271 }
7a3d1328 272 goto end;
8c9ae521 273 }
8f69e5eb 274
f73fabfd 275 ret = LTTNG_OK;
7a3d1328
MD
276end:
277 return ret;
278}
8c9ae521 279
7a3d1328
MD
280/*
281 * Enable all kernel events of a channel of the kernel session.
282 */
283int event_kernel_enable_all(struct ltt_kernel_session *ksession,
284 struct ltt_kernel_channel *kchan, int kernel_tracer_fd)
285{
6bd8707a 286 int tp_ret;
7a3d1328 287
0525e9ae
DG
288 assert(ksession);
289 assert(kchan);
290
291 tp_ret = event_kernel_enable_all_tracepoints(ksession, kchan,
292 kernel_tracer_fd);
f73fabfd 293 if (tp_ret != LTTNG_OK) {
7a3d1328
MD
294 goto end;
295 }
bd29c13d
DG
296
297 /*
298 * Reaching this code path means that all tracepoints were enabled without
299 * errors so we ignore the error value of syscalls.
300 *
301 * At the moment, failing to enable syscalls on "lttng enable-event -a -k"
302 * is not considered an error that need to be returned to the client since
303 * tracepoints did not fail. Future work will allow us to send back
304 * multiple errors to the client in one API call.
305 */
6bd8707a 306 (void) event_kernel_enable_all_syscalls(ksession, kchan, kernel_tracer_fd);
bd29c13d 307
7a3d1328 308end:
bd29c13d 309 return tp_ret;
8c9ae521 310}
2bdd86d4 311
7f79d3a1
DG
312/*
313 * ============================
314 * UST : The Ultimate Frontier!
315 * ============================
316 */
317
76d45b40
DG
318/*
319 * Enable all UST tracepoints for a channel from a UST session.
320 */
321int event_ust_enable_all_tracepoints(struct ltt_ust_session *usess, int domain,
025faf73 322 struct ltt_ust_channel *uchan, struct lttng_filter_bytecode *filter)
76d45b40 323{
6775595e 324 int ret, i, size;
bec39940 325 struct lttng_ht_iter iter;
76d45b40 326 struct ltt_ust_event *uevent = NULL;
7f79d3a1 327 struct lttng_event *events = NULL;
76d45b40 328
0525e9ae
DG
329 assert(usess);
330 assert(uchan);
331
025faf73
DG
332 rcu_read_lock();
333
76d45b40
DG
334 switch (domain) {
335 case LTTNG_DOMAIN_UST:
336 {
337 /* Enable existing events */
bec39940
DG
338 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
339 node.node) {
76d45b40
DG
340 if (uevent->enabled == 0) {
341 ret = ust_app_enable_event_glb(usess, uchan, uevent);
342 if (ret < 0) {
343 continue;
344 }
345 uevent->enabled = 1;
346 }
347 }
348
349 /* Get all UST available events */
350 size = ust_app_list_events(&events);
351 if (size < 0) {
f73fabfd 352 ret = LTTNG_ERR_UST_LIST_FAIL;
76d45b40
DG
353 goto error;
354 }
355
356 for (i = 0; i < size; i++) {
357 /*
358 * Check if event exist and if so, continue since it was enable
359 * previously.
360 */
025faf73 361 uevent = trace_ust_find_event(uchan->events, events[i].name, filter,
18eace3b 362 events[i].loglevel);
76d45b40
DG
363 if (uevent != NULL) {
364 ret = ust_app_enable_event_pid(usess, uchan, uevent,
365 events[i].pid);
366 if (ret < 0) {
49c336c1 367 if (ret != -LTTNG_UST_ERR_EXIST) {
f73fabfd 368 ret = LTTNG_ERR_UST_ENABLE_FAIL;
76d45b40
DG
369 goto error;
370 }
371 }
372 continue;
373 }
374
375 /* Create ust event */
025faf73 376 uevent = trace_ust_create_event(&events[i], filter);
76d45b40 377 if (uevent == NULL) {
f73fabfd 378 ret = LTTNG_ERR_FATAL;
7f79d3a1 379 goto error_destroy;
76d45b40
DG
380 }
381
382 /* Create event for the specific PID */
383 ret = ust_app_enable_event_pid(usess, uchan, uevent,
384 events[i].pid);
385 if (ret < 0) {
49c336c1 386 if (ret == -LTTNG_UST_ERR_EXIST) {
f73fabfd 387 ret = LTTNG_ERR_UST_EVENT_EXIST;
7f79d3a1 388 goto error;
76d45b40 389 } else {
f73fabfd 390 ret = LTTNG_ERR_UST_ENABLE_FAIL;
7f79d3a1 391 goto error_destroy;
76d45b40 392 }
76d45b40
DG
393 }
394
395 uevent->enabled = 1;
396 /* Add ltt ust event to channel */
397 rcu_read_lock();
18eace3b 398 add_unique_ust_event(uchan->events, uevent);
76d45b40
DG
399 rcu_read_unlock();
400 }
401
402 free(events);
403 break;
404 }
d78d6610 405#if 0
76d45b40
DG
406 case LTTNG_DOMAIN_UST_EXEC_NAME:
407 case LTTNG_DOMAIN_UST_PID:
408 case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN:
d78d6610 409#endif
76d45b40 410 default:
f73fabfd 411 ret = LTTNG_ERR_UND;
76d45b40
DG
412 goto error;
413 }
414
025faf73 415 rcu_read_unlock();
f73fabfd 416 return LTTNG_OK;
76d45b40 417
7f79d3a1 418error_destroy:
76d45b40 419 trace_ust_destroy_event(uevent);
7f79d3a1
DG
420
421error:
422 free(events);
025faf73 423 rcu_read_unlock();
76d45b40
DG
424 return ret;
425}
426
2bdd86d4
MD
427/*
428 * Enable UST tracepoint event for a channel from a UST session.
429 */
edb67388 430int event_ust_enable_tracepoint(struct ltt_ust_session *usess, int domain,
025faf73
DG
431 struct ltt_ust_channel *uchan, struct lttng_event *event,
432 struct lttng_filter_bytecode *filter)
2bdd86d4 433{
f73fabfd 434 int ret = LTTNG_OK, to_create = 0;
edb67388
DG
435 struct ltt_ust_event *uevent;
436
0525e9ae
DG
437 assert(usess);
438 assert(uchan);
439 assert(event);
440
18eace3b
DG
441 rcu_read_lock();
442
025faf73 443 uevent = trace_ust_find_event(uchan->events, event->name, filter,
18eace3b 444 event->loglevel);
edb67388 445 if (uevent == NULL) {
025faf73 446 uevent = trace_ust_create_event(event, filter);
edb67388 447 if (uevent == NULL) {
95a82664 448 ret = LTTNG_ERR_UST_ENABLE_FAIL;
edb67388
DG
449 goto error;
450 }
025faf73 451
fc34caaa 452 /* Valid to set it after the goto error since uevent is still NULL */
edb67388
DG
453 to_create = 1;
454 }
2bdd86d4 455
7f79d3a1
DG
456 if (uevent->enabled) {
457 /* It's already enabled so everything is OK */
5bcdda4f 458 ret = LTTNG_ERR_UST_EVENT_ENABLED;
7f79d3a1
DG
459 goto end;
460 }
461
fc34caaa
DG
462 uevent->enabled = 1;
463
edb67388
DG
464 switch (domain) {
465 case LTTNG_DOMAIN_UST:
466 {
467 if (to_create) {
468 /* Create event on all UST registered apps for session */
35a9059d 469 ret = ust_app_create_event_glb(usess, uchan, uevent);
edb67388
DG
470 } else {
471 /* Enable event on all UST registered apps for session */
35a9059d 472 ret = ust_app_enable_event_glb(usess, uchan, uevent);
edb67388 473 }
48842b30 474
edb67388 475 if (ret < 0) {
49c336c1 476 if (ret == -LTTNG_UST_ERR_EXIST) {
f73fabfd 477 ret = LTTNG_ERR_UST_EVENT_EXIST;
7f79d3a1 478 goto end;
edb67388 479 } else {
f73fabfd 480 ret = LTTNG_ERR_UST_ENABLE_FAIL;
7f79d3a1 481 goto error;
edb67388 482 }
edb67388 483 }
edb67388
DG
484 break;
485 }
d78d6610 486#if 0
edb67388
DG
487 case LTTNG_DOMAIN_UST_EXEC_NAME:
488 case LTTNG_DOMAIN_UST_PID:
489 case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN:
d78d6610 490#endif
edb67388 491 default:
f73fabfd 492 ret = LTTNG_ERR_UND;
7f79d3a1 493 goto end;
2bdd86d4 494 }
48842b30 495
7f79d3a1 496 if (to_create) {
fc34caaa 497 /* Add ltt ust event to channel */
18eace3b 498 add_unique_ust_event(uchan->events, uevent);
7f79d3a1 499 }
edb67388 500
7f79d3a1
DG
501 DBG("Event UST %s %s in channel %s", uevent->attr.name,
502 to_create ? "created" : "enabled", uchan->name);
503
f73fabfd 504 ret = LTTNG_OK;
fc34caaa 505
fb89d070 506end:
18eace3b 507 rcu_read_unlock();
fc34caaa 508 return ret;
edb67388
DG
509
510error:
fc34caaa
DG
511 /*
512 * Only destroy event on creation time (not enabling time) because if the
513 * event is found in the channel (to_create == 0), it means that at some
514 * point the enable_event worked and it's thus valid to keep it alive.
515 * Destroying it also implies that we also destroy it's shadow copy to sync
516 * everyone up.
517 */
518 if (to_create) {
519 /* In this code path, the uevent was not added to the hash table */
520 trace_ust_destroy_event(uevent);
521 }
18eace3b 522 rcu_read_unlock();
2bdd86d4
MD
523 return ret;
524}
525
7f79d3a1
DG
526/*
527 * Disable UST tracepoint of a channel from a UST session.
528 */
529int event_ust_disable_tracepoint(struct ltt_ust_session *usess, int domain,
530 struct ltt_ust_channel *uchan, char *event_name)
2bdd86d4
MD
531{
532 int ret;
7f79d3a1 533 struct ltt_ust_event *uevent;
18eace3b
DG
534 struct lttng_ht_node_str *node;
535 struct lttng_ht_iter iter;
18eace3b 536 struct lttng_ht *ht;
2bdd86d4 537
0525e9ae
DG
538 assert(usess);
539 assert(uchan);
540 assert(event_name);
541
18eace3b
DG
542 ht = uchan->events;
543
18eace3b 544 rcu_read_lock();
025faf73
DG
545
546 /*
547 * We use a custom lookup since we need the iterator for the next_duplicate
548 * call in the do while loop below.
549 */
550 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed),
551 trace_ust_ht_match_event_by_name, event_name, &iter.iter);
18eace3b
DG
552 node = lttng_ht_iter_get_node_str(&iter);
553 if (node == NULL) {
554 DBG2("Trace UST event NOT found by name %s", event_name);
f73fabfd 555 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
7f79d3a1 556 goto error;
2bdd86d4 557 }
7f79d3a1 558
18eace3b
DG
559 do {
560 uevent = caa_container_of(node, struct ltt_ust_event, node);
025faf73
DG
561 assert(uevent);
562
18eace3b
DG
563 if (uevent->enabled == 0) {
564 /* It's already disabled so everything is OK */
565 ret = LTTNG_OK;
566 continue;
7f79d3a1 567 }
18eace3b
DG
568
569 switch (domain) {
570 case LTTNG_DOMAIN_UST:
571 ret = ust_app_disable_event_glb(usess, uchan, uevent);
572 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
573 ret = LTTNG_ERR_UST_DISABLE_FAIL;
574 goto error;
575 }
576 break;
d78d6610 577#if 0
18eace3b
DG
578 case LTTNG_DOMAIN_UST_EXEC_NAME:
579 case LTTNG_DOMAIN_UST_PID:
580 case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN:
d78d6610 581#endif
18eace3b
DG
582 default:
583 ret = LTTNG_ERR_UND;
584 goto error;
585 }
586
587 uevent->enabled = 0;
588
025faf73
DG
589 DBG2("Event UST %s disabled in channel %s", uevent->attr.name,
590 uchan->name);
591
18eace3b
DG
592 /* Get next duplicate event by name. */
593 cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name,
594 event_name, &iter.iter);
595 node = lttng_ht_iter_get_node_str(&iter);
596 } while (node);
7f79d3a1 597
f73fabfd 598 ret = LTTNG_OK;
7f79d3a1 599
7f79d3a1 600error:
18eace3b 601 rcu_read_unlock();
7f79d3a1
DG
602 return ret;
603}
604
605/*
606 * Disable all UST tracepoints for a channel from a UST session.
607 */
608int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess, int domain,
609 struct ltt_ust_channel *uchan)
610{
6775595e 611 int ret, i, size;
bec39940 612 struct lttng_ht_iter iter;
7f79d3a1
DG
613 struct ltt_ust_event *uevent = NULL;
614 struct lttng_event *events = NULL;
615
0525e9ae
DG
616 assert(usess);
617 assert(uchan);
618
025faf73
DG
619 rcu_read_lock();
620
7f79d3a1
DG
621 switch (domain) {
622 case LTTNG_DOMAIN_UST:
623 {
624 /* Disabling existing events */
bec39940
DG
625 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
626 node.node) {
7f79d3a1 627 if (uevent->enabled == 1) {
025faf73
DG
628 ret = event_ust_disable_tracepoint(usess, domain, uchan,
629 uevent->attr.name);
7f79d3a1
DG
630 if (ret < 0) {
631 continue;
632 }
7f79d3a1
DG
633 }
634 }
635
636 /* Get all UST available events */
637 size = ust_app_list_events(&events);
638 if (size < 0) {
f73fabfd 639 ret = LTTNG_ERR_UST_LIST_FAIL;
7f79d3a1
DG
640 goto error;
641 }
642
643 for (i = 0; i < size; i++) {
18eace3b 644 ret = event_ust_disable_tracepoint(usess, domain, uchan,
7f79d3a1 645 events[i].name);
18eace3b
DG
646 if (ret != LTTNG_OK) {
647 /* Continue to disable the rest... */
7f79d3a1
DG
648 continue;
649 }
650 }
651
652 free(events);
653 break;
654 }
d78d6610 655#if 0
7f79d3a1
DG
656 case LTTNG_DOMAIN_UST_EXEC_NAME:
657 case LTTNG_DOMAIN_UST_PID:
658 case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN:
d78d6610 659#endif
7f79d3a1 660 default:
f73fabfd 661 ret = LTTNG_ERR_UND;
7f79d3a1
DG
662 goto error;
663 }
664
025faf73 665 rcu_read_unlock();
f73fabfd 666 return LTTNG_OK;
7f79d3a1
DG
667
668error:
669 free(events);
025faf73 670 rcu_read_unlock();
2bdd86d4
MD
671 return ret;
672}
This page took 0.06208 seconds and 4 git commands to generate.