Filter: add FILTER_OP_RETURN_S64 instruction
[lttng-tools.git] / src / bin / lttng-sessiond / event.c
CommitLineData
54d01ffb
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
71a559f8 3 * Copyright (C) 2016 - Jérémie Galarneau <jeremie.galarneau@efficios.com>
54d01ffb 4 *
d14d33bf
AM
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2 only,
7 * as published by the Free Software Foundation.
54d01ffb 8 *
d14d33bf
AM
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
54d01ffb 13 *
d14d33bf
AM
14 * You should have received a copy of the GNU General Public License along
15 * with this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
54d01ffb
DG
17 */
18
6c1c0768 19#define _LGPL_SOURCE
d87bfb32 20#include <errno.h>
54d01ffb 21#include <urcu/list.h>
2bdd86d4 22#include <string.h>
54d01ffb
DG
23
24#include <lttng/lttng.h>
db758600 25#include <common/error.h>
10a8a223 26#include <common/sessiond-comm/sessiond-comm.h>
71a559f8
JG
27#include <common/filter.h>
28#include <common/context.h>
54d01ffb
DG
29
30#include "channel.h"
31#include "event.h"
4771f025 32#include "kernel.h"
be6a6276 33#include "lttng-sessiond.h"
9df8df5e 34#include "ust-ctl.h"
edb67388
DG
35#include "ust-app.h"
36#include "trace-kernel.h"
37#include "trace-ust.h"
7c1d2758 38#include "agent.h"
54d01ffb 39
025faf73
DG
40/*
41 * Add unique UST event based on the event name, filter bytecode and loglevel.
42 */
18eace3b
DG
43static void add_unique_ust_event(struct lttng_ht *ht,
44 struct ltt_ust_event *event)
45{
46 struct cds_lfht_node *node_ptr;
47 struct ltt_ust_ht_key key;
48
49 assert(ht);
50 assert(ht->ht);
51 assert(event);
52
53 key.name = event->attr.name;
54 key.filter = (struct lttng_filter_bytecode *) event->filter;
b953b8cd
PP
55 key.loglevel_type = event->attr.loglevel_type;
56 key.loglevel_value = event->attr.loglevel;
4031e53e 57 key.exclusion = event->exclusion;
18eace3b
DG
58
59 node_ptr = cds_lfht_add_unique(ht->ht,
60 ht->hash_fct(event->node.key, lttng_ht_seed),
61 trace_ust_ht_match_event, &key, &event->node.node);
62 assert(node_ptr == &event->node.node);
63}
64
54d01ffb 65/*
9550ee81
JR
66 * Disable kernel tracepoint events for a channel from the kernel session of
67 * a specified event_name and event type.
68 * On type LTTNG_EVENT_ALL all events with event_name are disabled.
69 * If event_name is NULL all events of the specified type are disabled.
54d01ffb 70 */
d0ae4ea8 71int event_kernel_disable_event(struct ltt_kernel_channel *kchan,
9550ee81 72 char *event_name, enum lttng_event_type type)
54d01ffb 73{
9550ee81 74 int ret, error = 0, found = 0;
54d01ffb
DG
75 struct ltt_kernel_event *kevent;
76
0525e9ae
DG
77 assert(kchan);
78
54d01ffb
DG
79 /* For each event in the kernel session */
80 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
d0ae4ea8
MD
81 if (type != LTTNG_EVENT_ALL && kevent->type != type)
82 continue;
9550ee81
JR
83 if (event_name != NULL && strcmp(event_name, kevent->event->name)) {
84 continue;
85 }
86 found++;
54d01ffb
DG
87 ret = kernel_disable_event(kevent);
88 if (ret < 0) {
9550ee81 89 error = 1;
54d01ffb
DG
90 continue;
91 }
92 }
9550ee81
JR
93 DBG("Disable kernel event: found %d events with name: %s and type: %d",
94 found, event_name ? event_name : "NULL", type);
7a3d1328 95
9550ee81
JR
96 if (event_name != NULL && !found) {
97 ret = LTTNG_ERR_NO_EVENT;
98 } else {
99 ret = error ? LTTNG_ERR_KERN_DISABLE_FAIL : LTTNG_OK;
100 }
101
102 return ret;
54d01ffb
DG
103}
104
105/*
7a3d1328 106 * Enable kernel tracepoint event for a channel from the kernel session.
49d21f93 107 * We own filter_expression and filter.
54d01ffb 108 */
d0ae4ea8 109int event_kernel_enable_event(struct ltt_kernel_channel *kchan,
00a62084
MD
110 struct lttng_event *event, char *filter_expression,
111 struct lttng_filter_bytecode *filter)
54d01ffb
DG
112{
113 int ret;
114 struct ltt_kernel_event *kevent;
115
0525e9ae
DG
116 assert(kchan);
117 assert(event);
118
00a62084
MD
119 kevent = trace_kernel_find_event(event->name, kchan,
120 event->type, filter);
54d01ffb 121 if (kevent == NULL) {
00a62084
MD
122 ret = kernel_create_event(event, kchan,
123 filter_expression, filter);
a969e101
MD
124 /* We have passed ownership */
125 filter_expression = NULL;
126 filter = NULL;
54d01ffb 127 if (ret < 0) {
bd29c13d
DG
128 switch (-ret) {
129 case EEXIST:
f73fabfd 130 ret = LTTNG_ERR_KERN_EVENT_EXIST;
bd29c13d
DG
131 break;
132 case ENOSYS:
f73fabfd 133 ret = LTTNG_ERR_KERN_EVENT_ENOSYS;
bd29c13d
DG
134 break;
135 default:
f73fabfd 136 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
bd29c13d 137 break;
d87bfb32 138 }
7a3d1328 139 goto end;
54d01ffb
DG
140 }
141 } else if (kevent->enabled == 0) {
142 ret = kernel_enable_event(kevent);
143 if (ret < 0) {
f73fabfd 144 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
7a3d1328 145 goto end;
54d01ffb 146 }
42224349
DG
147 } else {
148 /* At this point, the event is considered enabled */
f73fabfd 149 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349 150 goto end;
54d01ffb 151 }
42224349 152
f73fabfd 153 ret = LTTNG_OK;
7a3d1328 154end:
a969e101
MD
155 free(filter_expression);
156 free(filter);
54d01ffb
DG
157 return ret;
158}
159
7f79d3a1
DG
160/*
161 * ============================
162 * UST : The Ultimate Frontier!
163 * ============================
164 */
165
2bdd86d4
MD
166/*
167 * Enable UST tracepoint event for a channel from a UST session.
49d21f93 168 * We own filter_expression, filter, and exclusion.
2bdd86d4 169 */
7972aab2 170int event_ust_enable_tracepoint(struct ltt_ust_session *usess,
025faf73 171 struct ltt_ust_channel *uchan, struct lttng_event *event,
6b453b5e 172 char *filter_expression,
f1613f52 173 struct lttng_filter_bytecode *filter,
88f06f15
JG
174 struct lttng_event_exclusion *exclusion,
175 bool internal_event)
2bdd86d4 176{
f73fabfd 177 int ret = LTTNG_OK, to_create = 0;
edb67388
DG
178 struct ltt_ust_event *uevent;
179
0525e9ae
DG
180 assert(usess);
181 assert(uchan);
182 assert(event);
183
18eace3b
DG
184 rcu_read_lock();
185
025faf73 186 uevent = trace_ust_find_event(uchan->events, event->name, filter,
b953b8cd 187 event->loglevel_type, event->loglevel, exclusion);
87c6e328 188 if (!uevent) {
6b453b5e 189 uevent = trace_ust_create_event(event, filter_expression,
87c6e328 190 filter, exclusion, internal_event);
49d21f93
MD
191 /* We have passed ownership */
192 filter_expression = NULL;
193 filter = NULL;
194 exclusion = NULL;
edb67388 195 if (uevent == NULL) {
95a82664 196 ret = LTTNG_ERR_UST_ENABLE_FAIL;
edb67388
DG
197 goto error;
198 }
025faf73 199
fc34caaa 200 /* Valid to set it after the goto error since uevent is still NULL */
edb67388
DG
201 to_create = 1;
202 }
2bdd86d4 203
7f79d3a1
DG
204 if (uevent->enabled) {
205 /* It's already enabled so everything is OK */
5bcdda4f 206 ret = LTTNG_ERR_UST_EVENT_ENABLED;
7f79d3a1
DG
207 goto end;
208 }
209
fc34caaa
DG
210 uevent->enabled = 1;
211
7972aab2
DG
212 if (to_create) {
213 /* Create event on all UST registered apps for session */
214 ret = ust_app_create_event_glb(usess, uchan, uevent);
215 } else {
216 /* Enable event on all UST registered apps for session */
217 ret = ust_app_enable_event_glb(usess, uchan, uevent);
218 }
48842b30 219
7972aab2
DG
220 if (ret < 0) {
221 if (ret == -LTTNG_UST_ERR_EXIST) {
222 ret = LTTNG_ERR_UST_EVENT_EXIST;
223 goto end;
224 } else {
225 ret = LTTNG_ERR_UST_ENABLE_FAIL;
226 goto error;
edb67388 227 }
2bdd86d4 228 }
48842b30 229
7f79d3a1 230 if (to_create) {
fc34caaa 231 /* Add ltt ust event to channel */
18eace3b 232 add_unique_ust_event(uchan->events, uevent);
7f79d3a1 233 }
edb67388 234
7f79d3a1
DG
235 DBG("Event UST %s %s in channel %s", uevent->attr.name,
236 to_create ? "created" : "enabled", uchan->name);
237
f73fabfd 238 ret = LTTNG_OK;
fc34caaa 239
fb89d070 240end:
18eace3b 241 rcu_read_unlock();
49d21f93
MD
242 free(filter_expression);
243 free(filter);
244 free(exclusion);
fc34caaa 245 return ret;
edb67388
DG
246
247error:
fc34caaa
DG
248 /*
249 * Only destroy event on creation time (not enabling time) because if the
250 * event is found in the channel (to_create == 0), it means that at some
251 * point the enable_event worked and it's thus valid to keep it alive.
252 * Destroying it also implies that we also destroy it's shadow copy to sync
253 * everyone up.
254 */
255 if (to_create) {
256 /* In this code path, the uevent was not added to the hash table */
257 trace_ust_destroy_event(uevent);
258 }
18eace3b 259 rcu_read_unlock();
49d21f93
MD
260 free(filter_expression);
261 free(filter);
262 free(exclusion);
2bdd86d4
MD
263 return ret;
264}
265
7f79d3a1
DG
266/*
267 * Disable UST tracepoint of a channel from a UST session.
268 */
7972aab2 269int event_ust_disable_tracepoint(struct ltt_ust_session *usess,
7f79d3a1 270 struct ltt_ust_channel *uchan, char *event_name)
2bdd86d4
MD
271{
272 int ret;
7f79d3a1 273 struct ltt_ust_event *uevent;
18eace3b
DG
274 struct lttng_ht_node_str *node;
275 struct lttng_ht_iter iter;
18eace3b 276 struct lttng_ht *ht;
2bdd86d4 277
0525e9ae
DG
278 assert(usess);
279 assert(uchan);
280 assert(event_name);
281
18eace3b
DG
282 ht = uchan->events;
283
18eace3b 284 rcu_read_lock();
025faf73
DG
285
286 /*
287 * We use a custom lookup since we need the iterator for the next_duplicate
288 * call in the do while loop below.
289 */
290 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed),
291 trace_ust_ht_match_event_by_name, event_name, &iter.iter);
18eace3b
DG
292 node = lttng_ht_iter_get_node_str(&iter);
293 if (node == NULL) {
294 DBG2("Trace UST event NOT found by name %s", event_name);
f73fabfd 295 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
7f79d3a1 296 goto error;
2bdd86d4 297 }
7f79d3a1 298
18eace3b
DG
299 do {
300 uevent = caa_container_of(node, struct ltt_ust_event, node);
025faf73
DG
301 assert(uevent);
302
18eace3b
DG
303 if (uevent->enabled == 0) {
304 /* It's already disabled so everything is OK */
a1dcaf0f 305 goto next;
7f79d3a1 306 }
18eace3b 307
7972aab2
DG
308 ret = ust_app_disable_event_glb(usess, uchan, uevent);
309 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
310 ret = LTTNG_ERR_UST_DISABLE_FAIL;
18eace3b
DG
311 goto error;
312 }
18eace3b
DG
313 uevent->enabled = 0;
314
025faf73
DG
315 DBG2("Event UST %s disabled in channel %s", uevent->attr.name,
316 uchan->name);
317
a1dcaf0f 318next:
18eace3b
DG
319 /* Get next duplicate event by name. */
320 cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name,
321 event_name, &iter.iter);
322 node = lttng_ht_iter_get_node_str(&iter);
323 } while (node);
7f79d3a1 324
f73fabfd 325 ret = LTTNG_OK;
7f79d3a1 326
7f79d3a1 327error:
18eace3b 328 rcu_read_unlock();
7f79d3a1
DG
329 return ret;
330}
331
b1e7fe2d
JR
332/*
333 * Disable all UST tracepoints for a channel from a UST session.
334 */
335int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess,
336 struct ltt_ust_channel *uchan)
337{
3e81c0f2 338 int ret, i, size, error = 0;
b1e7fe2d
JR
339 struct lttng_ht_iter iter;
340 struct ltt_ust_event *uevent = NULL;
341 struct lttng_event *events = NULL;
342
343 assert(usess);
344 assert(uchan);
345
346 rcu_read_lock();
347
348 /* Disabling existing events */
349 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
350 node.node) {
351 if (uevent->enabled == 1) {
352 ret = event_ust_disable_tracepoint(usess, uchan,
353 uevent->attr.name);
354 if (ret < 0) {
3e81c0f2 355 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
356 continue;
357 }
358 }
359 }
360
361 /* Get all UST available events */
362 size = ust_app_list_events(&events);
363 if (size < 0) {
364 ret = LTTNG_ERR_UST_LIST_FAIL;
365 goto error;
366 }
367
368 for (i = 0; i < size; i++) {
369 ret = event_ust_disable_tracepoint(usess, uchan,
370 events[i].name);
3e81c0f2 371 if (ret < 0) {
b1e7fe2d 372 /* Continue to disable the rest... */
3e81c0f2 373 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
374 continue;
375 }
376 }
377
3e81c0f2 378 ret = error ? error : LTTNG_OK;
b1e7fe2d
JR
379error:
380 rcu_read_unlock();
381 free(events);
382 return ret;
383}
384
f20baf8e 385/*
022d91ba 386 * Enable all agent event for a given UST session.
f20baf8e
DG
387 *
388 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
389 */
022d91ba 390int event_agent_enable_all(struct ltt_ust_session *usess,
fefd409b 391 struct agent *agt, struct lttng_event *event,
51755dc8 392 struct lttng_filter_bytecode *filter ,char *filter_expression)
f20baf8e
DG
393{
394 int ret;
fefd409b 395 struct agent_event *aevent;
f20baf8e
DG
396 struct lttng_ht_iter iter;
397
398 assert(usess);
399
022d91ba 400 DBG("Event agent enabling ALL events for session %" PRIu64, usess->id);
f20baf8e 401
022d91ba 402 /* Enable event on agent application through TCP socket. */
8404118c 403 ret = event_agent_enable(usess, agt, event, filter, filter_expression);
f20baf8e
DG
404 if (ret != LTTNG_OK) {
405 goto error;
406 }
407
408 /* Flag every event that they are now enabled. */
409 rcu_read_lock();
fefd409b 410 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 411 node.node) {
fefd409b 412 aevent->enabled = 1;
f20baf8e
DG
413 }
414 rcu_read_unlock();
415
416 ret = LTTNG_OK;
417
418error:
419 return ret;
420}
421
71a559f8
JG
422/*
423 * Check if this event's filter requires the activation of application contexts
424 * and enable them in the agent.
425 */
426static int add_filter_app_ctx(struct lttng_filter_bytecode *bytecode,
427 const char *filter_expression, struct agent *agt)
428{
429 int ret = LTTNG_OK;
430 char *provider_name = NULL, *ctx_name = NULL;
431 struct bytecode_symbol_iterator *it =
432 bytecode_symbol_iterator_create(bytecode);
433
434 if (!it) {
435 ret = LTTNG_ERR_NOMEM;
436 goto end;
437 }
438
439 do {
440 struct lttng_event_context ctx;
441 const char *symbol_name =
442 bytecode_symbol_iterator_get_name(it);
443
444 if (parse_application_context(symbol_name, &provider_name,
445 &ctx_name)) {
446 /* Not an application context. */
447 continue;
448 }
449
450 ctx.ctx = LTTNG_EVENT_CONTEXT_APP_CONTEXT;
451 ctx.u.app_ctx.provider_name = provider_name;
452 ctx.u.app_ctx.ctx_name = ctx_name;
453
454 /* Recognized an application context. */
455 DBG("Enabling event with filter expression \"%s\" requires enabling the %s:%s application context.",
456 filter_expression, provider_name, ctx_name);
457
458 ret = agent_add_context(&ctx, agt);
459 if (ret != LTTNG_OK) {
460 ERR("Failed to add application context %s:%s.",
461 provider_name, ctx_name);
462 goto end;
463 }
464
465 ret = agent_enable_context(&ctx, agt->domain);
466 if (ret != LTTNG_OK) {
467 ERR("Failed to enable application context %s:%s.",
468 provider_name, ctx_name);
469 goto end;
470 }
471
472 free(provider_name);
473 free(ctx_name);
474 provider_name = ctx_name = NULL;
475 } while (bytecode_symbol_iterator_next(it) == 0);
476end:
477 free(provider_name);
478 free(ctx_name);
479 bytecode_symbol_iterator_destroy(it);
480 return ret;
481}
482
f20baf8e 483/*
022d91ba 484 * Enable a single agent event for a given UST session.
f20baf8e
DG
485 *
486 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
487 */
fefd409b
DG
488int event_agent_enable(struct ltt_ust_session *usess,
489 struct agent *agt, struct lttng_event *event,
8404118c
JG
490 struct lttng_filter_bytecode *filter,
491 char *filter_expression)
f20baf8e
DG
492{
493 int ret, created = 0;
fefd409b 494 struct agent_event *aevent;
f20baf8e
DG
495
496 assert(usess);
497 assert(event);
fefd409b 498 assert(agt);
f20baf8e 499
022d91ba 500 DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d "
51755dc8
JG
501 ", loglevel %d and filter \"%s\"", event->name,
502 usess->id, event->loglevel_type, event->loglevel,
503 filter_expression ? filter_expression : "NULL");
f20baf8e 504
a9319624 505 aevent = agent_find_event(event->name, event->loglevel_type,
71a559f8 506 event->loglevel, filter_expression, agt);
fefd409b 507 if (!aevent) {
a9319624
PP
508 aevent = agent_create_event(event->name, event->loglevel_type,
509 event->loglevel, filter,
51755dc8 510 filter_expression);
fefd409b 511 if (!aevent) {
f20baf8e
DG
512 ret = LTTNG_ERR_NOMEM;
513 goto error;
514 }
71a559f8 515
f20baf8e
DG
516 created = 1;
517 }
518
519 /* Already enabled? */
fefd409b 520 if (aevent->enabled) {
f20baf8e
DG
521 goto end;
522 }
523
71a559f8
JG
524 if (created && filter) {
525 ret = add_filter_app_ctx(filter, filter_expression, agt);
526 if (ret != LTTNG_OK) {
527 goto error;
528 }
529 }
530
fefd409b 531 ret = agent_enable_event(aevent, agt->domain);
f20baf8e
DG
532 if (ret != LTTNG_OK) {
533 goto error;
534 }
535
536 /* If the event was created prior to the enable, add it to the domain. */
537 if (created) {
fefd409b 538 agent_add_event(aevent, agt);
f20baf8e
DG
539 }
540
541end:
542 return LTTNG_OK;
543
544error:
545 if (created) {
fefd409b 546 agent_destroy_event(aevent);
f20baf8e
DG
547 }
548 return ret;
549}
550
da6c3a50 551/*
d1ec8e20
JG
552 * Return the default event name associated with the provided UST domain. Return
553 * NULL on error.
da6c3a50
DG
554 */
555const char *event_get_default_agent_ust_name(enum lttng_domain_type domain)
556{
557 const char *default_event_name = NULL;
558
0e115563
DG
559 switch (domain) {
560 case LTTNG_DOMAIN_LOG4J:
d1ec8e20 561 default_event_name = DEFAULT_LOG4J_EVENT_NAME;
0e115563
DG
562 break;
563 case LTTNG_DOMAIN_JUL:
d1ec8e20 564 default_event_name = DEFAULT_JUL_EVENT_NAME;
0e115563
DG
565 break;
566 case LTTNG_DOMAIN_PYTHON:
e7c82272 567 default_event_name = DEFAULT_PYTHON_EVENT_NAME;
0e115563
DG
568 break;
569 default:
da6c3a50
DG
570 assert(0);
571 }
572
573 return default_event_name;
574}
575
f20baf8e 576/*
e261a6cc 577 * Disable a given agent event for a given UST session.
f20baf8e 578 *
e261a6cc 579 * Must be called with the RCU read lock held.
f20baf8e
DG
580 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
581 */
e261a6cc
PP
582static int event_agent_disable_one(struct ltt_ust_session *usess,
583 struct agent *agt, struct agent_event *aevent)
f20baf8e
DG
584{
585 int ret;
be6a6276
DG
586 struct ltt_ust_event *uevent = NULL;
587 struct ltt_ust_channel *uchan = NULL;
71aecbf8 588 const char *ust_event_name, *ust_channel_name;
f20baf8e 589
fefd409b 590 assert(agt);
f20baf8e 591 assert(usess);
e261a6cc 592 assert(aevent);
f20baf8e 593
e261a6cc
PP
594 DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for session %" PRIu64,
595 aevent->name, aevent->loglevel_type, aevent->loglevel_value,
596 usess->id);
f20baf8e
DG
597
598 /* Already disabled? */
fefd409b 599 if (!aevent->enabled) {
f20baf8e
DG
600 goto end;
601 }
602
71aecbf8
DG
603 if (agt->domain == LTTNG_DOMAIN_JUL) {
604 ust_channel_name = DEFAULT_JUL_CHANNEL_NAME;
605 } else if (agt->domain == LTTNG_DOMAIN_LOG4J) {
606 ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME;
0e115563
DG
607 } else if (agt->domain == LTTNG_DOMAIN_PYTHON) {
608 ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME;
71aecbf8
DG
609 } else {
610 ret = LTTNG_ERR_INVALID;
611 goto error;
612 }
613
be6a6276
DG
614 /*
615 * Disable it on the UST side. First get the channel reference then find
616 * the event and finally disable it.
617 */
618 uchan = trace_ust_find_channel_by_name(usess->domain_global.channels,
71aecbf8 619 (char *) ust_channel_name);
be6a6276
DG
620 if (!uchan) {
621 ret = LTTNG_ERR_UST_CHAN_NOT_FOUND;
622 goto error;
623 }
624
da6c3a50
DG
625 ust_event_name = event_get_default_agent_ust_name(agt->domain);
626 if (!ust_event_name) {
627 ret = LTTNG_ERR_FATAL;
628 goto error;
be6a6276
DG
629 }
630
631 /*
b953b8cd
PP
632 * Agent UST event has its loglevel type forced to
633 * LTTNG_UST_LOGLEVEL_ALL. The actual loglevel type/value filtering
634 * happens thanks to an UST filter. The following -1 is actually
635 * ignored since the type is LTTNG_UST_LOGLEVEL_ALL.
be6a6276 636 */
da6c3a50 637 uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name,
b953b8cd 638 aevent->filter, LTTNG_UST_LOGLEVEL_ALL, -1, NULL);
022d91ba 639 /* If the agent event exists, it must be available on the UST side. */
be6a6276
DG
640 assert(uevent);
641
642 ret = ust_app_disable_event_glb(usess, uchan, uevent);
643 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
644 ret = LTTNG_ERR_UST_DISABLE_FAIL;
645 goto error;
646 }
647
0dcfcf94
DG
648 /*
649 * Flag event that it's disabled so the shadow copy on the ust app side
650 * will disable it if an application shows up.
651 */
652 uevent->enabled = 0;
653
fefd409b 654 ret = agent_disable_event(aevent, agt->domain);
f20baf8e
DG
655 if (ret != LTTNG_OK) {
656 goto error;
657 }
658
659end:
660 return LTTNG_OK;
661
662error:
663 return ret;
664}
e261a6cc
PP
665
666/*
667 * Disable all agent events matching a given name for a given UST session.
668 *
669 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
670 */
671int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt,
672 char *event_name)
673{
674 int ret = LTTNG_OK;
675 struct agent_event *aevent;
676 struct lttng_ht_iter iter;
677 struct lttng_ht_node_str *node;
678
679 assert(agt);
680 assert(usess);
681 assert(event_name);
682
683 DBG("Event agent disabling %s (all loglevels) for session %" PRIu64, event_name, usess->id);
684
685 rcu_read_lock();
686 agent_find_events_by_name(event_name, agt, &iter);
687 node = lttng_ht_iter_get_node_str(&iter);
688
689 if (node == NULL) {
690 DBG2("Event agent NOT found by name %s", event_name);
691 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
692 goto end;
693 }
694
695 do {
696 aevent = caa_container_of(node, struct agent_event, node);
697 ret = event_agent_disable_one(usess, agt, aevent);
698
699 if (ret != LTTNG_OK) {
700 goto end;
701 }
702
703 /* Get next duplicate agent event by name. */
704 agent_event_next_duplicate(event_name, agt, &iter);
705 node = lttng_ht_iter_get_node_str(&iter);
706 } while (node);
707end:
708 rcu_read_unlock();
709 return ret;
710}
f20baf8e 711/*
022d91ba 712 * Disable all agent event for a given UST session.
f20baf8e
DG
713 *
714 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
715 */
fefd409b
DG
716int event_agent_disable_all(struct ltt_ust_session *usess,
717 struct agent *agt)
f20baf8e 718{
0dcfcf94 719 int ret;
fefd409b 720 struct agent_event *aevent;
f20baf8e
DG
721 struct lttng_ht_iter iter;
722
fefd409b 723 assert(agt);
f20baf8e
DG
724 assert(usess);
725
0dcfcf94
DG
726 /*
727 * Disable event on agent application. Continue to disable all other events
728 * if the * event is not found.
729 */
fefd409b 730 ret = event_agent_disable(usess, agt, "*");
0dcfcf94
DG
731 if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) {
732 goto error;
f20baf8e
DG
733 }
734
b9866e08 735 /* Disable every event. */
f20baf8e 736 rcu_read_lock();
fefd409b 737 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 738 node.node) {
0dcfcf94
DG
739 if (!aevent->enabled) {
740 continue;
741 }
742
743 ret = event_agent_disable(usess, agt, aevent->name);
744 if (ret != LTTNG_OK) {
b9866e08 745 goto error_unlock;
f20baf8e 746 }
f20baf8e 747 }
f20baf8e
DG
748 ret = LTTNG_OK;
749
b9866e08
JG
750error_unlock:
751 rcu_read_unlock();
f20baf8e
DG
752error:
753 return ret;
754}
This page took 0.085879 seconds and 4 git commands to generate.