trace_kernel_create_event() now returns an error code
[lttng-tools.git] / src / bin / lttng-sessiond / event.c
CommitLineData
54d01ffb
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
71a559f8 3 * Copyright (C) 2016 - Jérémie Galarneau <jeremie.galarneau@efficios.com>
54d01ffb 4 *
d14d33bf
AM
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2 only,
7 * as published by the Free Software Foundation.
54d01ffb 8 *
d14d33bf
AM
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
54d01ffb 13 *
d14d33bf
AM
14 * You should have received a copy of the GNU General Public License along
15 * with this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
54d01ffb
DG
17 */
18
6c1c0768 19#define _LGPL_SOURCE
d87bfb32 20#include <errno.h>
54d01ffb 21#include <urcu/list.h>
2bdd86d4 22#include <string.h>
54d01ffb
DG
23
24#include <lttng/lttng.h>
db758600 25#include <common/error.h>
10a8a223 26#include <common/sessiond-comm/sessiond-comm.h>
71a559f8
JG
27#include <common/filter.h>
28#include <common/context.h>
54d01ffb
DG
29
30#include "channel.h"
31#include "event.h"
4771f025 32#include "kernel.h"
be6a6276 33#include "lttng-sessiond.h"
9df8df5e 34#include "ust-ctl.h"
edb67388
DG
35#include "ust-app.h"
36#include "trace-kernel.h"
37#include "trace-ust.h"
7c1d2758 38#include "agent.h"
54d01ffb 39
025faf73
DG
40/*
41 * Add unique UST event based on the event name, filter bytecode and loglevel.
42 */
18eace3b
DG
43static void add_unique_ust_event(struct lttng_ht *ht,
44 struct ltt_ust_event *event)
45{
46 struct cds_lfht_node *node_ptr;
47 struct ltt_ust_ht_key key;
48
49 assert(ht);
50 assert(ht->ht);
51 assert(event);
52
53 key.name = event->attr.name;
54 key.filter = (struct lttng_filter_bytecode *) event->filter;
b953b8cd
PP
55 key.loglevel_type = event->attr.loglevel_type;
56 key.loglevel_value = event->attr.loglevel;
4031e53e 57 key.exclusion = event->exclusion;
18eace3b
DG
58
59 node_ptr = cds_lfht_add_unique(ht->ht,
60 ht->hash_fct(event->node.key, lttng_ht_seed),
61 trace_ust_ht_match_event, &key, &event->node.node);
62 assert(node_ptr == &event->node.node);
63}
64
54d01ffb 65/*
9550ee81
JR
66 * Disable kernel tracepoint events for a channel from the kernel session of
67 * a specified event_name and event type.
68 * On type LTTNG_EVENT_ALL all events with event_name are disabled.
69 * If event_name is NULL all events of the specified type are disabled.
54d01ffb 70 */
d0ae4ea8 71int event_kernel_disable_event(struct ltt_kernel_channel *kchan,
9550ee81 72 char *event_name, enum lttng_event_type type)
54d01ffb 73{
9550ee81 74 int ret, error = 0, found = 0;
54d01ffb
DG
75 struct ltt_kernel_event *kevent;
76
0525e9ae
DG
77 assert(kchan);
78
54d01ffb
DG
79 /* For each event in the kernel session */
80 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
d0ae4ea8
MD
81 if (type != LTTNG_EVENT_ALL && kevent->type != type)
82 continue;
9550ee81
JR
83 if (event_name != NULL && strcmp(event_name, kevent->event->name)) {
84 continue;
85 }
86 found++;
54d01ffb
DG
87 ret = kernel_disable_event(kevent);
88 if (ret < 0) {
9550ee81 89 error = 1;
54d01ffb
DG
90 continue;
91 }
92 }
9550ee81
JR
93 DBG("Disable kernel event: found %d events with name: %s and type: %d",
94 found, event_name ? event_name : "NULL", type);
7a3d1328 95
9550ee81
JR
96 if (event_name != NULL && !found) {
97 ret = LTTNG_ERR_NO_EVENT;
98 } else {
99 ret = error ? LTTNG_ERR_KERN_DISABLE_FAIL : LTTNG_OK;
100 }
101
102 return ret;
54d01ffb
DG
103}
104
105/*
7a3d1328 106 * Enable kernel tracepoint event for a channel from the kernel session.
49d21f93 107 * We own filter_expression and filter.
54d01ffb 108 */
d0ae4ea8 109int event_kernel_enable_event(struct ltt_kernel_channel *kchan,
00a62084
MD
110 struct lttng_event *event, char *filter_expression,
111 struct lttng_filter_bytecode *filter)
54d01ffb
DG
112{
113 int ret;
114 struct ltt_kernel_event *kevent;
115
0525e9ae
DG
116 assert(kchan);
117 assert(event);
118
00a62084
MD
119 kevent = trace_kernel_find_event(event->name, kchan,
120 event->type, filter);
54d01ffb 121 if (kevent == NULL) {
71a3bb01 122 ret = kernel_create_event(event, kchan, filter_expression, filter);
a969e101
MD
123 /* We have passed ownership */
124 filter_expression = NULL;
125 filter = NULL;
71a3bb01 126 if (ret) {
7a3d1328 127 goto end;
54d01ffb
DG
128 }
129 } else if (kevent->enabled == 0) {
130 ret = kernel_enable_event(kevent);
131 if (ret < 0) {
f73fabfd 132 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
7a3d1328 133 goto end;
54d01ffb 134 }
42224349
DG
135 } else {
136 /* At this point, the event is considered enabled */
f73fabfd 137 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349 138 goto end;
54d01ffb 139 }
42224349 140
f73fabfd 141 ret = LTTNG_OK;
7a3d1328 142end:
a969e101
MD
143 free(filter_expression);
144 free(filter);
54d01ffb
DG
145 return ret;
146}
147
7f79d3a1
DG
148/*
149 * ============================
150 * UST : The Ultimate Frontier!
151 * ============================
152 */
153
2bdd86d4
MD
154/*
155 * Enable UST tracepoint event for a channel from a UST session.
49d21f93 156 * We own filter_expression, filter, and exclusion.
2bdd86d4 157 */
7972aab2 158int event_ust_enable_tracepoint(struct ltt_ust_session *usess,
025faf73 159 struct ltt_ust_channel *uchan, struct lttng_event *event,
6b453b5e 160 char *filter_expression,
f1613f52 161 struct lttng_filter_bytecode *filter,
88f06f15
JG
162 struct lttng_event_exclusion *exclusion,
163 bool internal_event)
2bdd86d4 164{
f73fabfd 165 int ret = LTTNG_OK, to_create = 0;
edb67388
DG
166 struct ltt_ust_event *uevent;
167
0525e9ae
DG
168 assert(usess);
169 assert(uchan);
170 assert(event);
171
18eace3b
DG
172 rcu_read_lock();
173
025faf73 174 uevent = trace_ust_find_event(uchan->events, event->name, filter,
b953b8cd 175 event->loglevel_type, event->loglevel, exclusion);
87c6e328 176 if (!uevent) {
6b453b5e 177 uevent = trace_ust_create_event(event, filter_expression,
87c6e328 178 filter, exclusion, internal_event);
49d21f93
MD
179 /* We have passed ownership */
180 filter_expression = NULL;
181 filter = NULL;
182 exclusion = NULL;
edb67388 183 if (uevent == NULL) {
95a82664 184 ret = LTTNG_ERR_UST_ENABLE_FAIL;
edb67388
DG
185 goto error;
186 }
025faf73 187
fc34caaa 188 /* Valid to set it after the goto error since uevent is still NULL */
edb67388
DG
189 to_create = 1;
190 }
2bdd86d4 191
7f79d3a1
DG
192 if (uevent->enabled) {
193 /* It's already enabled so everything is OK */
5bcdda4f 194 ret = LTTNG_ERR_UST_EVENT_ENABLED;
7f79d3a1
DG
195 goto end;
196 }
197
fc34caaa
DG
198 uevent->enabled = 1;
199
7972aab2
DG
200 if (to_create) {
201 /* Create event on all UST registered apps for session */
202 ret = ust_app_create_event_glb(usess, uchan, uevent);
203 } else {
204 /* Enable event on all UST registered apps for session */
205 ret = ust_app_enable_event_glb(usess, uchan, uevent);
206 }
48842b30 207
7972aab2
DG
208 if (ret < 0) {
209 if (ret == -LTTNG_UST_ERR_EXIST) {
210 ret = LTTNG_ERR_UST_EVENT_EXIST;
211 goto end;
212 } else {
213 ret = LTTNG_ERR_UST_ENABLE_FAIL;
214 goto error;
edb67388 215 }
2bdd86d4 216 }
48842b30 217
7f79d3a1 218 if (to_create) {
fc34caaa 219 /* Add ltt ust event to channel */
18eace3b 220 add_unique_ust_event(uchan->events, uevent);
7f79d3a1 221 }
edb67388 222
7f79d3a1
DG
223 DBG("Event UST %s %s in channel %s", uevent->attr.name,
224 to_create ? "created" : "enabled", uchan->name);
225
f73fabfd 226 ret = LTTNG_OK;
fc34caaa 227
fb89d070 228end:
18eace3b 229 rcu_read_unlock();
49d21f93
MD
230 free(filter_expression);
231 free(filter);
232 free(exclusion);
fc34caaa 233 return ret;
edb67388
DG
234
235error:
fc34caaa
DG
236 /*
237 * Only destroy event on creation time (not enabling time) because if the
238 * event is found in the channel (to_create == 0), it means that at some
239 * point the enable_event worked and it's thus valid to keep it alive.
240 * Destroying it also implies that we also destroy it's shadow copy to sync
241 * everyone up.
242 */
243 if (to_create) {
244 /* In this code path, the uevent was not added to the hash table */
245 trace_ust_destroy_event(uevent);
246 }
18eace3b 247 rcu_read_unlock();
49d21f93
MD
248 free(filter_expression);
249 free(filter);
250 free(exclusion);
2bdd86d4
MD
251 return ret;
252}
253
7f79d3a1
DG
254/*
255 * Disable UST tracepoint of a channel from a UST session.
256 */
7972aab2 257int event_ust_disable_tracepoint(struct ltt_ust_session *usess,
7f79d3a1 258 struct ltt_ust_channel *uchan, char *event_name)
2bdd86d4
MD
259{
260 int ret;
7f79d3a1 261 struct ltt_ust_event *uevent;
18eace3b
DG
262 struct lttng_ht_node_str *node;
263 struct lttng_ht_iter iter;
18eace3b 264 struct lttng_ht *ht;
2bdd86d4 265
0525e9ae
DG
266 assert(usess);
267 assert(uchan);
268 assert(event_name);
269
18eace3b
DG
270 ht = uchan->events;
271
18eace3b 272 rcu_read_lock();
025faf73
DG
273
274 /*
275 * We use a custom lookup since we need the iterator for the next_duplicate
276 * call in the do while loop below.
277 */
278 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed),
279 trace_ust_ht_match_event_by_name, event_name, &iter.iter);
18eace3b
DG
280 node = lttng_ht_iter_get_node_str(&iter);
281 if (node == NULL) {
282 DBG2("Trace UST event NOT found by name %s", event_name);
f73fabfd 283 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
7f79d3a1 284 goto error;
2bdd86d4 285 }
7f79d3a1 286
18eace3b
DG
287 do {
288 uevent = caa_container_of(node, struct ltt_ust_event, node);
025faf73
DG
289 assert(uevent);
290
18eace3b
DG
291 if (uevent->enabled == 0) {
292 /* It's already disabled so everything is OK */
a1dcaf0f 293 goto next;
7f79d3a1 294 }
18eace3b 295
7972aab2
DG
296 ret = ust_app_disable_event_glb(usess, uchan, uevent);
297 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
298 ret = LTTNG_ERR_UST_DISABLE_FAIL;
18eace3b
DG
299 goto error;
300 }
18eace3b
DG
301 uevent->enabled = 0;
302
025faf73
DG
303 DBG2("Event UST %s disabled in channel %s", uevent->attr.name,
304 uchan->name);
305
a1dcaf0f 306next:
18eace3b
DG
307 /* Get next duplicate event by name. */
308 cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name,
309 event_name, &iter.iter);
310 node = lttng_ht_iter_get_node_str(&iter);
311 } while (node);
7f79d3a1 312
f73fabfd 313 ret = LTTNG_OK;
7f79d3a1 314
7f79d3a1 315error:
18eace3b 316 rcu_read_unlock();
7f79d3a1
DG
317 return ret;
318}
319
b1e7fe2d
JR
320/*
321 * Disable all UST tracepoints for a channel from a UST session.
322 */
323int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess,
324 struct ltt_ust_channel *uchan)
325{
3e81c0f2 326 int ret, i, size, error = 0;
b1e7fe2d
JR
327 struct lttng_ht_iter iter;
328 struct ltt_ust_event *uevent = NULL;
329 struct lttng_event *events = NULL;
330
331 assert(usess);
332 assert(uchan);
333
334 rcu_read_lock();
335
336 /* Disabling existing events */
337 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
338 node.node) {
339 if (uevent->enabled == 1) {
340 ret = event_ust_disable_tracepoint(usess, uchan,
341 uevent->attr.name);
342 if (ret < 0) {
3e81c0f2 343 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
344 continue;
345 }
346 }
347 }
348
349 /* Get all UST available events */
350 size = ust_app_list_events(&events);
351 if (size < 0) {
352 ret = LTTNG_ERR_UST_LIST_FAIL;
353 goto error;
354 }
355
356 for (i = 0; i < size; i++) {
357 ret = event_ust_disable_tracepoint(usess, uchan,
358 events[i].name);
3e81c0f2 359 if (ret < 0) {
b1e7fe2d 360 /* Continue to disable the rest... */
3e81c0f2 361 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
362 continue;
363 }
364 }
365
3e81c0f2 366 ret = error ? error : LTTNG_OK;
b1e7fe2d
JR
367error:
368 rcu_read_unlock();
369 free(events);
370 return ret;
371}
372
f20baf8e 373/*
022d91ba 374 * Enable all agent event for a given UST session.
f20baf8e
DG
375 *
376 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
377 */
022d91ba 378int event_agent_enable_all(struct ltt_ust_session *usess,
fefd409b 379 struct agent *agt, struct lttng_event *event,
51755dc8 380 struct lttng_filter_bytecode *filter ,char *filter_expression)
f20baf8e
DG
381{
382 int ret;
fefd409b 383 struct agent_event *aevent;
f20baf8e
DG
384 struct lttng_ht_iter iter;
385
386 assert(usess);
387
022d91ba 388 DBG("Event agent enabling ALL events for session %" PRIu64, usess->id);
f20baf8e 389
022d91ba 390 /* Enable event on agent application through TCP socket. */
8404118c 391 ret = event_agent_enable(usess, agt, event, filter, filter_expression);
f20baf8e
DG
392 if (ret != LTTNG_OK) {
393 goto error;
394 }
395
396 /* Flag every event that they are now enabled. */
397 rcu_read_lock();
fefd409b 398 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 399 node.node) {
fefd409b 400 aevent->enabled = 1;
f20baf8e
DG
401 }
402 rcu_read_unlock();
403
404 ret = LTTNG_OK;
405
406error:
407 return ret;
408}
409
71a559f8
JG
410/*
411 * Check if this event's filter requires the activation of application contexts
412 * and enable them in the agent.
b4bc01f7
MD
413 * TODO: bytecode iterator does not support non-legacy application
414 * contexts yet. Not an issue for now, since they are not generated by
415 * the lttng-ctl library.
71a559f8
JG
416 */
417static int add_filter_app_ctx(struct lttng_filter_bytecode *bytecode,
418 const char *filter_expression, struct agent *agt)
419{
420 int ret = LTTNG_OK;
421 char *provider_name = NULL, *ctx_name = NULL;
422 struct bytecode_symbol_iterator *it =
423 bytecode_symbol_iterator_create(bytecode);
424
425 if (!it) {
426 ret = LTTNG_ERR_NOMEM;
427 goto end;
428 }
429
430 do {
431 struct lttng_event_context ctx;
432 const char *symbol_name =
433 bytecode_symbol_iterator_get_name(it);
434
435 if (parse_application_context(symbol_name, &provider_name,
436 &ctx_name)) {
437 /* Not an application context. */
438 continue;
439 }
440
441 ctx.ctx = LTTNG_EVENT_CONTEXT_APP_CONTEXT;
442 ctx.u.app_ctx.provider_name = provider_name;
443 ctx.u.app_ctx.ctx_name = ctx_name;
444
445 /* Recognized an application context. */
446 DBG("Enabling event with filter expression \"%s\" requires enabling the %s:%s application context.",
447 filter_expression, provider_name, ctx_name);
448
449 ret = agent_add_context(&ctx, agt);
450 if (ret != LTTNG_OK) {
451 ERR("Failed to add application context %s:%s.",
452 provider_name, ctx_name);
453 goto end;
454 }
455
456 ret = agent_enable_context(&ctx, agt->domain);
457 if (ret != LTTNG_OK) {
458 ERR("Failed to enable application context %s:%s.",
459 provider_name, ctx_name);
460 goto end;
461 }
462
463 free(provider_name);
464 free(ctx_name);
465 provider_name = ctx_name = NULL;
466 } while (bytecode_symbol_iterator_next(it) == 0);
467end:
468 free(provider_name);
469 free(ctx_name);
470 bytecode_symbol_iterator_destroy(it);
471 return ret;
472}
473
f20baf8e 474/*
022d91ba 475 * Enable a single agent event for a given UST session.
f20baf8e
DG
476 *
477 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
478 */
fefd409b
DG
479int event_agent_enable(struct ltt_ust_session *usess,
480 struct agent *agt, struct lttng_event *event,
8404118c
JG
481 struct lttng_filter_bytecode *filter,
482 char *filter_expression)
f20baf8e
DG
483{
484 int ret, created = 0;
fefd409b 485 struct agent_event *aevent;
f20baf8e
DG
486
487 assert(usess);
488 assert(event);
fefd409b 489 assert(agt);
f20baf8e 490
022d91ba 491 DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d "
51755dc8
JG
492 ", loglevel %d and filter \"%s\"", event->name,
493 usess->id, event->loglevel_type, event->loglevel,
494 filter_expression ? filter_expression : "NULL");
f20baf8e 495
a9319624 496 aevent = agent_find_event(event->name, event->loglevel_type,
71a559f8 497 event->loglevel, filter_expression, agt);
fefd409b 498 if (!aevent) {
a9319624
PP
499 aevent = agent_create_event(event->name, event->loglevel_type,
500 event->loglevel, filter,
51755dc8 501 filter_expression);
fefd409b 502 if (!aevent) {
f20baf8e
DG
503 ret = LTTNG_ERR_NOMEM;
504 goto error;
505 }
71a559f8 506
f20baf8e
DG
507 created = 1;
508 }
509
510 /* Already enabled? */
fefd409b 511 if (aevent->enabled) {
f20baf8e
DG
512 goto end;
513 }
514
71a559f8
JG
515 if (created && filter) {
516 ret = add_filter_app_ctx(filter, filter_expression, agt);
517 if (ret != LTTNG_OK) {
518 goto error;
519 }
520 }
521
fefd409b 522 ret = agent_enable_event(aevent, agt->domain);
f20baf8e
DG
523 if (ret != LTTNG_OK) {
524 goto error;
525 }
526
527 /* If the event was created prior to the enable, add it to the domain. */
528 if (created) {
fefd409b 529 agent_add_event(aevent, agt);
f20baf8e
DG
530 }
531
532end:
533 return LTTNG_OK;
534
535error:
536 if (created) {
fefd409b 537 agent_destroy_event(aevent);
f20baf8e
DG
538 }
539 return ret;
540}
541
da6c3a50 542/*
d1ec8e20
JG
543 * Return the default event name associated with the provided UST domain. Return
544 * NULL on error.
da6c3a50
DG
545 */
546const char *event_get_default_agent_ust_name(enum lttng_domain_type domain)
547{
548 const char *default_event_name = NULL;
549
0e115563
DG
550 switch (domain) {
551 case LTTNG_DOMAIN_LOG4J:
d1ec8e20 552 default_event_name = DEFAULT_LOG4J_EVENT_NAME;
0e115563
DG
553 break;
554 case LTTNG_DOMAIN_JUL:
d1ec8e20 555 default_event_name = DEFAULT_JUL_EVENT_NAME;
0e115563
DG
556 break;
557 case LTTNG_DOMAIN_PYTHON:
e7c82272 558 default_event_name = DEFAULT_PYTHON_EVENT_NAME;
0e115563
DG
559 break;
560 default:
da6c3a50
DG
561 assert(0);
562 }
563
564 return default_event_name;
565}
566
f20baf8e 567/*
e261a6cc 568 * Disable a given agent event for a given UST session.
f20baf8e 569 *
e261a6cc 570 * Must be called with the RCU read lock held.
f20baf8e
DG
571 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
572 */
e261a6cc
PP
573static int event_agent_disable_one(struct ltt_ust_session *usess,
574 struct agent *agt, struct agent_event *aevent)
f20baf8e
DG
575{
576 int ret;
be6a6276
DG
577 struct ltt_ust_event *uevent = NULL;
578 struct ltt_ust_channel *uchan = NULL;
71aecbf8 579 const char *ust_event_name, *ust_channel_name;
f20baf8e 580
fefd409b 581 assert(agt);
f20baf8e 582 assert(usess);
e261a6cc 583 assert(aevent);
f20baf8e 584
e261a6cc
PP
585 DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for session %" PRIu64,
586 aevent->name, aevent->loglevel_type, aevent->loglevel_value,
587 usess->id);
f20baf8e
DG
588
589 /* Already disabled? */
fefd409b 590 if (!aevent->enabled) {
f20baf8e
DG
591 goto end;
592 }
593
71aecbf8
DG
594 if (agt->domain == LTTNG_DOMAIN_JUL) {
595 ust_channel_name = DEFAULT_JUL_CHANNEL_NAME;
596 } else if (agt->domain == LTTNG_DOMAIN_LOG4J) {
597 ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME;
0e115563
DG
598 } else if (agt->domain == LTTNG_DOMAIN_PYTHON) {
599 ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME;
71aecbf8
DG
600 } else {
601 ret = LTTNG_ERR_INVALID;
602 goto error;
603 }
604
be6a6276
DG
605 /*
606 * Disable it on the UST side. First get the channel reference then find
607 * the event and finally disable it.
608 */
609 uchan = trace_ust_find_channel_by_name(usess->domain_global.channels,
71aecbf8 610 (char *) ust_channel_name);
be6a6276
DG
611 if (!uchan) {
612 ret = LTTNG_ERR_UST_CHAN_NOT_FOUND;
613 goto error;
614 }
615
da6c3a50
DG
616 ust_event_name = event_get_default_agent_ust_name(agt->domain);
617 if (!ust_event_name) {
618 ret = LTTNG_ERR_FATAL;
619 goto error;
be6a6276
DG
620 }
621
622 /*
b953b8cd
PP
623 * Agent UST event has its loglevel type forced to
624 * LTTNG_UST_LOGLEVEL_ALL. The actual loglevel type/value filtering
625 * happens thanks to an UST filter. The following -1 is actually
626 * ignored since the type is LTTNG_UST_LOGLEVEL_ALL.
be6a6276 627 */
da6c3a50 628 uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name,
b953b8cd 629 aevent->filter, LTTNG_UST_LOGLEVEL_ALL, -1, NULL);
022d91ba 630 /* If the agent event exists, it must be available on the UST side. */
be6a6276
DG
631 assert(uevent);
632
633 ret = ust_app_disable_event_glb(usess, uchan, uevent);
634 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
635 ret = LTTNG_ERR_UST_DISABLE_FAIL;
636 goto error;
637 }
638
0dcfcf94
DG
639 /*
640 * Flag event that it's disabled so the shadow copy on the ust app side
641 * will disable it if an application shows up.
642 */
643 uevent->enabled = 0;
644
fefd409b 645 ret = agent_disable_event(aevent, agt->domain);
f20baf8e
DG
646 if (ret != LTTNG_OK) {
647 goto error;
648 }
649
650end:
651 return LTTNG_OK;
652
653error:
654 return ret;
655}
e261a6cc
PP
656
657/*
658 * Disable all agent events matching a given name for a given UST session.
659 *
660 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
661 */
662int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt,
663 char *event_name)
664{
665 int ret = LTTNG_OK;
666 struct agent_event *aevent;
667 struct lttng_ht_iter iter;
668 struct lttng_ht_node_str *node;
669
670 assert(agt);
671 assert(usess);
672 assert(event_name);
673
674 DBG("Event agent disabling %s (all loglevels) for session %" PRIu64, event_name, usess->id);
675
676 rcu_read_lock();
677 agent_find_events_by_name(event_name, agt, &iter);
678 node = lttng_ht_iter_get_node_str(&iter);
679
680 if (node == NULL) {
681 DBG2("Event agent NOT found by name %s", event_name);
682 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
683 goto end;
684 }
685
686 do {
687 aevent = caa_container_of(node, struct agent_event, node);
688 ret = event_agent_disable_one(usess, agt, aevent);
689
690 if (ret != LTTNG_OK) {
691 goto end;
692 }
693
694 /* Get next duplicate agent event by name. */
695 agent_event_next_duplicate(event_name, agt, &iter);
696 node = lttng_ht_iter_get_node_str(&iter);
697 } while (node);
698end:
699 rcu_read_unlock();
700 return ret;
701}
f20baf8e 702/*
022d91ba 703 * Disable all agent event for a given UST session.
f20baf8e
DG
704 *
705 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
706 */
fefd409b
DG
707int event_agent_disable_all(struct ltt_ust_session *usess,
708 struct agent *agt)
f20baf8e 709{
0dcfcf94 710 int ret;
fefd409b 711 struct agent_event *aevent;
f20baf8e
DG
712 struct lttng_ht_iter iter;
713
fefd409b 714 assert(agt);
f20baf8e
DG
715 assert(usess);
716
0dcfcf94
DG
717 /*
718 * Disable event on agent application. Continue to disable all other events
719 * if the * event is not found.
720 */
fefd409b 721 ret = event_agent_disable(usess, agt, "*");
0dcfcf94
DG
722 if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) {
723 goto error;
f20baf8e
DG
724 }
725
b9866e08 726 /* Disable every event. */
f20baf8e 727 rcu_read_lock();
fefd409b 728 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 729 node.node) {
0dcfcf94
DG
730 if (!aevent->enabled) {
731 continue;
732 }
733
734 ret = event_agent_disable(usess, agt, aevent->name);
735 if (ret != LTTNG_OK) {
b9866e08 736 goto error_unlock;
f20baf8e 737 }
f20baf8e 738 }
f20baf8e
DG
739 ret = LTTNG_OK;
740
b9866e08
JG
741error_unlock:
742 rcu_read_unlock();
f20baf8e
DG
743error:
744 return ret;
745}
This page took 0.085854 seconds and 4 git commands to generate.