Fix: tests: fix unused-but-set warning in test_fd_tracker.c
[lttng-tools.git] / src / bin / lttng-sessiond / event.c
1 /*
2 * Copyright (C) 2011 David Goulet <david.goulet@polymtl.ca>
3 * Copyright (C) 2016 Jérémie Galarneau <jeremie.galarneau@efficios.com>
4 *
5 * SPDX-License-Identifier: GPL-2.0-only
6 *
7 */
8
9 #define _LGPL_SOURCE
10 #include <urcu/list.h>
11 #include <string.h>
12
13 #include <common/compat/errno.h>
14 #include <lttng/lttng.h>
15 #include <lttng/condition/condition.h>
16 #include <lttng/condition/event-rule-matches.h>
17 #include <lttng/event-rule/event-rule.h>
18 #include <lttng/event-rule/event-rule-internal.h>
19 #include <common/bytecode/bytecode.h>
20 #include <common/error.h>
21 #include <common/sessiond-comm/sessiond-comm.h>
22 #include <common/filter.h>
23 #include <common/context.h>
24
25 #include "channel.h"
26 #include "event.h"
27 #include "kernel.h"
28 #include "lttng-sessiond.h"
29 #include "lttng-ust-ctl.h"
30 #include "lttng-ust-error.h"
31 #include "ust-app.h"
32 #include "trace-kernel.h"
33 #include "trace-ust.h"
34 #include "agent.h"
35 #include "utils.h"
36
37 /*
38 * Add unique UST event based on the event name, filter bytecode and loglevel.
39 */
40 static void add_unique_ust_event(struct lttng_ht *ht,
41 struct ltt_ust_event *event)
42 {
43 struct cds_lfht_node *node_ptr;
44 struct ltt_ust_ht_key key;
45
46 LTTNG_ASSERT(ht);
47 LTTNG_ASSERT(ht->ht);
48 LTTNG_ASSERT(event);
49
50 key.name = event->attr.name;
51 key.filter = (struct lttng_bytecode *) event->filter;
52 key.loglevel_type = event->attr.loglevel_type;
53 key.loglevel_value = event->attr.loglevel;
54 key.exclusion = event->exclusion;
55
56 node_ptr = cds_lfht_add_unique(ht->ht,
57 ht->hash_fct(event->node.key, lttng_ht_seed),
58 trace_ust_ht_match_event, &key, &event->node.node);
59 LTTNG_ASSERT(node_ptr == &event->node.node);
60 }
61
62 /*
63 * Disable kernel tracepoint events for a channel from the kernel session of
64 * a specified event_name and event type.
65 * On type LTTNG_EVENT_ALL all events with event_name are disabled.
66 * If event_name is NULL all events of the specified type are disabled.
67 */
68 int event_kernel_disable_event(struct ltt_kernel_channel *kchan,
69 const char *event_name, enum lttng_event_type type)
70 {
71 int ret, error = 0, found = 0;
72 struct ltt_kernel_event *kevent;
73
74 LTTNG_ASSERT(kchan);
75
76 /* For each event in the kernel session */
77 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
78 if (type != LTTNG_EVENT_ALL && kevent->type != type)
79 continue;
80 if (event_name != NULL && strcmp(event_name, kevent->event->name)) {
81 continue;
82 }
83 found++;
84 ret = kernel_disable_event(kevent);
85 if (ret < 0) {
86 error = 1;
87 continue;
88 }
89 }
90 DBG("Disable kernel event: found %d events with name: %s and type: %d",
91 found, event_name ? event_name : "NULL", type);
92
93 if (event_name != NULL && !found) {
94 ret = LTTNG_ERR_NO_EVENT;
95 } else {
96 ret = error ? LTTNG_ERR_KERN_DISABLE_FAIL : LTTNG_OK;
97 }
98
99 return ret;
100 }
101
102 /*
103 * Enable kernel tracepoint event for a channel from the kernel session.
104 * We own filter_expression and filter.
105 */
106 int event_kernel_enable_event(struct ltt_kernel_channel *kchan,
107 struct lttng_event *event, char *filter_expression,
108 struct lttng_bytecode *filter)
109 {
110 int ret;
111 struct ltt_kernel_event *kevent;
112
113 LTTNG_ASSERT(kchan);
114 LTTNG_ASSERT(event);
115
116 kevent = trace_kernel_find_event(event->name, kchan,
117 event->type, filter);
118 if (kevent == NULL) {
119 ret = kernel_create_event(event, kchan, filter_expression, filter);
120 /* We have passed ownership */
121 filter_expression = NULL;
122 filter = NULL;
123 if (ret) {
124 goto end;
125 }
126 } else if (kevent->enabled == 0) {
127 ret = kernel_enable_event(kevent);
128 if (ret < 0) {
129 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
130 goto end;
131 }
132 } else {
133 /* At this point, the event is considered enabled */
134 ret = LTTNG_ERR_KERN_EVENT_EXIST;
135 goto end;
136 }
137
138 ret = LTTNG_OK;
139 end:
140 free(filter_expression);
141 free(filter);
142 return ret;
143 }
144
145 /*
146 * ============================
147 * UST : The Ultimate Frontier!
148 * ============================
149 */
150
151 /*
152 * Enable UST tracepoint event for a channel from a UST session.
153 * We own filter_expression, filter, and exclusion.
154 */
155 int event_ust_enable_tracepoint(struct ltt_ust_session *usess,
156 struct ltt_ust_channel *uchan, struct lttng_event *event,
157 char *filter_expression,
158 struct lttng_bytecode *filter,
159 struct lttng_event_exclusion *exclusion,
160 bool internal_event)
161 {
162 int ret = LTTNG_OK, to_create = 0;
163 struct ltt_ust_event *uevent;
164
165 LTTNG_ASSERT(usess);
166 LTTNG_ASSERT(uchan);
167 LTTNG_ASSERT(event);
168
169 rcu_read_lock();
170
171 uevent = trace_ust_find_event(uchan->events, event->name, filter,
172 (enum lttng_ust_abi_loglevel_type) event->loglevel_type,
173 event->loglevel, exclusion);
174 if (!uevent) {
175 ret = trace_ust_create_event(event, filter_expression,
176 filter, exclusion, internal_event, &uevent);
177 /* We have passed ownership */
178 filter_expression = NULL;
179 filter = NULL;
180 exclusion = NULL;
181 if (ret != LTTNG_OK) {
182 goto end;
183 }
184
185 /* Valid to set it after the goto error since uevent is still NULL */
186 to_create = 1;
187 }
188
189 if (uevent->enabled) {
190 /* It's already enabled so everything is OK */
191 LTTNG_ASSERT(!to_create);
192 ret = LTTNG_ERR_UST_EVENT_ENABLED;
193 goto end;
194 }
195
196 uevent->enabled = 1;
197 if (to_create) {
198 /* Add ltt ust event to channel */
199 add_unique_ust_event(uchan->events, uevent);
200 }
201
202 if (!usess->active) {
203 goto end;
204 }
205
206 if (to_create) {
207 /* Create event on all UST registered apps for session */
208 ret = ust_app_create_event_glb(usess, uchan, uevent);
209 } else {
210 /* Enable event on all UST registered apps for session */
211 ret = ust_app_enable_event_glb(usess, uchan, uevent);
212 }
213
214 if (ret < 0) {
215 if (ret == -LTTNG_UST_ERR_EXIST) {
216 ret = LTTNG_ERR_UST_EVENT_EXIST;
217 } else {
218 ret = LTTNG_ERR_UST_ENABLE_FAIL;
219 }
220 goto end;
221 }
222
223 DBG("Event UST %s %s in channel %s", uevent->attr.name,
224 to_create ? "created" : "enabled", uchan->name);
225
226 ret = LTTNG_OK;
227
228 end:
229 rcu_read_unlock();
230 free(filter_expression);
231 free(filter);
232 free(exclusion);
233 return ret;
234 }
235
236 /*
237 * Disable UST tracepoint of a channel from a UST session.
238 */
239 int event_ust_disable_tracepoint(struct ltt_ust_session *usess,
240 struct ltt_ust_channel *uchan, const char *event_name)
241 {
242 int ret;
243 struct ltt_ust_event *uevent;
244 struct lttng_ht_node_str *node;
245 struct lttng_ht_iter iter;
246 struct lttng_ht *ht;
247
248 LTTNG_ASSERT(usess);
249 LTTNG_ASSERT(uchan);
250 LTTNG_ASSERT(event_name);
251
252 ht = uchan->events;
253
254 rcu_read_lock();
255
256 /*
257 * We use a custom lookup since we need the iterator for the next_duplicate
258 * call in the do while loop below.
259 */
260 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed),
261 trace_ust_ht_match_event_by_name, event_name, &iter.iter);
262 node = lttng_ht_iter_get_node_str(&iter);
263 if (node == NULL) {
264 DBG2("Trace UST event NOT found by name %s", event_name);
265 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
266 goto error;
267 }
268
269 do {
270 uevent = caa_container_of(node, struct ltt_ust_event, node);
271 LTTNG_ASSERT(uevent);
272
273 if (uevent->enabled == 0) {
274 /* It's already disabled so everything is OK */
275 goto next;
276 }
277 uevent->enabled = 0;
278 DBG2("Event UST %s disabled in channel %s", uevent->attr.name,
279 uchan->name);
280
281 if (!usess->active) {
282 goto next;
283 }
284 ret = ust_app_disable_event_glb(usess, uchan, uevent);
285 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
286 ret = LTTNG_ERR_UST_DISABLE_FAIL;
287 goto error;
288 }
289 next:
290 /* Get next duplicate event by name. */
291 cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name,
292 event_name, &iter.iter);
293 node = lttng_ht_iter_get_node_str(&iter);
294 } while (node);
295
296 ret = LTTNG_OK;
297
298 error:
299 rcu_read_unlock();
300 return ret;
301 }
302
303 /*
304 * Disable all UST tracepoints for a channel from a UST session.
305 */
306 int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess,
307 struct ltt_ust_channel *uchan)
308 {
309 int ret, i, size, error = 0;
310 struct lttng_ht_iter iter;
311 struct ltt_ust_event *uevent = NULL;
312 struct lttng_event *events = NULL;
313
314 LTTNG_ASSERT(usess);
315 LTTNG_ASSERT(uchan);
316
317 rcu_read_lock();
318
319 /* Disabling existing events */
320 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
321 node.node) {
322 if (uevent->enabled == 1) {
323 ret = event_ust_disable_tracepoint(usess, uchan,
324 uevent->attr.name);
325 if (ret < 0) {
326 error = LTTNG_ERR_UST_DISABLE_FAIL;
327 continue;
328 }
329 }
330 }
331
332 /* Get all UST available events */
333 size = ust_app_list_events(&events);
334 if (size < 0) {
335 ret = LTTNG_ERR_UST_LIST_FAIL;
336 goto error;
337 }
338
339 for (i = 0; i < size; i++) {
340 ret = event_ust_disable_tracepoint(usess, uchan,
341 events[i].name);
342 if (ret < 0) {
343 /* Continue to disable the rest... */
344 error = LTTNG_ERR_UST_DISABLE_FAIL;
345 continue;
346 }
347 }
348
349 ret = error ? error : LTTNG_OK;
350 error:
351 rcu_read_unlock();
352 free(events);
353 return ret;
354 }
355
356 static void agent_enable_all(struct agent *agt)
357 {
358 struct agent_event *aevent;
359 struct lttng_ht_iter iter;
360
361 /* Flag every event as enabled. */
362 rcu_read_lock();
363 cds_lfht_for_each_entry (
364 agt->events->ht, &iter.iter, aevent, node.node) {
365 aevent->enabled_count++;
366 }
367 rcu_read_unlock();
368 }
369
370 /*
371 * Enable all agent event for a given UST session.
372 *
373 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
374 */
375 int event_agent_enable_all(struct ltt_ust_session *usess,
376 struct agent *agt, struct lttng_event *event,
377 struct lttng_bytecode *filter ,char *filter_expression)
378 {
379 int ret;
380
381 LTTNG_ASSERT(usess);
382
383 DBG("Event agent enabling ALL events for session %" PRIu64, usess->id);
384
385 /* Enable event on agent application through TCP socket. */
386 ret = event_agent_enable(usess, agt, event, filter, filter_expression);
387 if (ret != LTTNG_OK) {
388 goto error;
389 }
390
391 agent_enable_all(agt);
392
393 ret = LTTNG_OK;
394
395 error:
396 return ret;
397 }
398
399 /*
400 * Check if this event's filter requires the activation of application contexts
401 * and enable them in the agent.
402 * TODO: bytecode iterator does not support non-legacy application
403 * contexts yet. Not an issue for now, since they are not generated by
404 * the lttng-ctl library.
405 */
406 static int add_filter_app_ctx(struct lttng_bytecode *bytecode,
407 const char *filter_expression, struct agent *agt)
408 {
409 int ret = LTTNG_OK;
410 char *provider_name = NULL, *ctx_name = NULL;
411 struct bytecode_symbol_iterator *it =
412 bytecode_symbol_iterator_create(bytecode);
413
414 if (!it) {
415 ret = LTTNG_ERR_NOMEM;
416 goto end;
417 }
418
419 do {
420 struct lttng_event_context ctx;
421 const char *symbol_name =
422 bytecode_symbol_iterator_get_name(it);
423
424 if (parse_application_context(symbol_name, &provider_name,
425 &ctx_name)) {
426 /* Not an application context. */
427 continue;
428 }
429
430 ctx.ctx = LTTNG_EVENT_CONTEXT_APP_CONTEXT;
431 ctx.u.app_ctx.provider_name = provider_name;
432 ctx.u.app_ctx.ctx_name = ctx_name;
433
434 /* Recognized an application context. */
435 DBG("Enabling event with filter expression \"%s\" requires enabling the %s:%s application context.",
436 filter_expression, provider_name, ctx_name);
437
438 ret = agent_add_context(&ctx, agt);
439 if (ret != LTTNG_OK) {
440 ERR("Failed to add application context %s:%s.",
441 provider_name, ctx_name);
442 goto end;
443 }
444
445 ret = agent_enable_context(&ctx, agt->domain);
446 if (ret != LTTNG_OK) {
447 ERR("Failed to enable application context %s:%s.",
448 provider_name, ctx_name);
449 goto end;
450 }
451
452 free(provider_name);
453 free(ctx_name);
454 provider_name = ctx_name = NULL;
455 } while (bytecode_symbol_iterator_next(it) == 0);
456 end:
457 free(provider_name);
458 free(ctx_name);
459 bytecode_symbol_iterator_destroy(it);
460 return ret;
461 }
462
463 static int agent_enable(struct agent *agt,
464 struct lttng_event *event,
465 struct lttng_bytecode *filter,
466 char *filter_expression)
467 {
468 int ret, created = 0;
469 struct agent_event *aevent;
470
471 LTTNG_ASSERT(event);
472 LTTNG_ASSERT(agt);
473
474 aevent = agent_find_event(event->name, event->loglevel_type,
475 event->loglevel, filter_expression, agt);
476 if (!aevent) {
477 aevent = agent_create_event(event->name, event->loglevel_type,
478 event->loglevel, filter,
479 filter_expression);
480 if (!aevent) {
481 ret = LTTNG_ERR_NOMEM;
482 goto error;
483 }
484 filter = NULL;
485 filter_expression = NULL;
486 created = 1;
487 LTTNG_ASSERT(!AGENT_EVENT_IS_ENABLED(aevent));
488 }
489
490 if (created && aevent->filter) {
491 ret = add_filter_app_ctx(
492 aevent->filter, aevent->filter_expression, agt);
493 if (ret != LTTNG_OK) {
494 goto error;
495 }
496 }
497
498 /* Already enabled? */
499 if (AGENT_EVENT_IS_ENABLED(aevent)) {
500 ret = LTTNG_OK;
501 goto end;
502 }
503
504 ret = agent_enable_event(aevent, agt->domain);
505 if (ret != LTTNG_OK) {
506 goto error;
507 }
508
509 /* If the event was created prior to the enable, add it to the domain. */
510 if (created) {
511 agent_add_event(aevent, agt);
512 }
513
514 ret = LTTNG_OK;
515 goto end;
516
517 error:
518 if (created) {
519 agent_destroy_event(aevent);
520 }
521 end:
522 free(filter);
523 free(filter_expression);
524 return ret;
525 }
526
527 /*
528 * Enable a single agent event for a given UST session.
529 *
530 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
531 */
532 int event_agent_enable(struct ltt_ust_session *usess,
533 struct agent *agt,
534 struct lttng_event *event,
535 struct lttng_bytecode *filter,
536 char *filter_expression)
537 {
538 LTTNG_ASSERT(usess);
539 LTTNG_ASSERT(event);
540 LTTNG_ASSERT(agt);
541
542 DBG("Enabling agent event: event pattern = '%s', session id = %" PRIu64 ", loglevel type = %d, loglevel = %d, filter expression = '%s'",
543 event->name, usess->id, event->loglevel_type,
544 event->loglevel,
545 filter_expression ? filter_expression : "(none)");
546
547 return agent_enable(agt, event, filter, filter_expression);
548 }
549
550 /*
551 * Enable a single agent event for a trigger.
552 *
553 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
554 */
555 int trigger_agent_enable(const struct lttng_trigger *trigger, struct agent *agt)
556 {
557 int ret;
558 enum lttng_condition_status c_status;
559 enum lttng_trigger_status t_status;
560 enum lttng_domain_type d_type;
561 const struct lttng_condition *condition;
562 const struct lttng_event_rule *rule;
563 const char *filter_expression;
564 char *filter_expression_copy = NULL;
565 const struct lttng_bytecode *filter_bytecode;
566 struct lttng_bytecode *filter_bytecode_copy = NULL;
567 struct lttng_event *event = NULL;
568 uid_t trigger_owner_uid = 0;
569 const char *trigger_name;
570
571 LTTNG_ASSERT(trigger);
572 LTTNG_ASSERT(agt);
573
574 t_status = lttng_trigger_get_name(trigger, &trigger_name);
575 if (t_status != LTTNG_TRIGGER_STATUS_OK) {
576 trigger_name = "(anonymous)";
577 }
578
579 t_status = lttng_trigger_get_owner_uid(trigger, &trigger_owner_uid);
580 LTTNG_ASSERT(t_status == LTTNG_TRIGGER_STATUS_OK);
581
582 condition = lttng_trigger_get_const_condition(trigger);
583
584 LTTNG_ASSERT(lttng_condition_get_type(condition) ==
585 LTTNG_CONDITION_TYPE_EVENT_RULE_MATCHES);
586
587 c_status = lttng_condition_event_rule_matches_get_rule(
588 condition, &rule);
589 LTTNG_ASSERT(c_status == LTTNG_CONDITION_STATUS_OK);
590
591 switch (lttng_event_rule_get_type(rule)) {
592 case LTTNG_EVENT_RULE_TYPE_JUL_LOGGING:
593 case LTTNG_EVENT_RULE_TYPE_LOG4J_LOGGING:
594 case LTTNG_EVENT_RULE_TYPE_PYTHON_LOGGING:
595 break;
596 default:
597 abort();
598 break;
599 }
600
601 d_type = lttng_event_rule_get_domain_type(rule);
602 LTTNG_ASSERT(d_type == agt->domain);
603
604 event = lttng_event_rule_generate_lttng_event(rule);
605 if (!event) {
606 ret = LTTNG_ERR_NOMEM;
607 goto end;
608 }
609
610 /* Get the internal filter expression and bytecode. */
611 filter_expression = lttng_event_rule_get_filter(rule);
612 if (filter_expression) {
613 filter_expression_copy = strdup(filter_expression);
614 if (!filter_expression_copy) {
615 ret = LTTNG_ERR_NOMEM;
616 goto end;
617 }
618
619 /* Get the filter bytecode */
620 filter_bytecode = lttng_event_rule_get_filter_bytecode(rule);
621 if (filter_bytecode) {
622 filter_bytecode_copy =
623 lttng_bytecode_copy(filter_bytecode);
624 if (!filter_bytecode_copy) {
625 ret = LTTNG_ERR_NOMEM;
626 goto end;
627 }
628 }
629 }
630
631 DBG("Enabling agent event from trigger: trigger name = '%s', trigger owner uid = %d, token = %" PRIu64,
632 trigger_name, trigger_owner_uid,
633 lttng_trigger_get_tracer_token(trigger));
634
635 ret = agent_enable(agt, event, filter_bytecode_copy,
636 filter_expression_copy);
637 /* Ownership was passed even in case of error. */
638 filter_expression_copy = NULL;
639 filter_bytecode_copy = NULL;
640
641 end:
642 free(filter_expression_copy);
643 free(filter_bytecode_copy);
644 free(event);
645 return ret;
646 }
647
648 /*
649 * Return the default event name associated with the provided UST domain. Return
650 * NULL on error.
651 */
652 const char *event_get_default_agent_ust_name(enum lttng_domain_type domain)
653 {
654 const char *default_event_name = NULL;
655
656 switch (domain) {
657 case LTTNG_DOMAIN_LOG4J:
658 default_event_name = DEFAULT_LOG4J_EVENT_NAME;
659 break;
660 case LTTNG_DOMAIN_JUL:
661 default_event_name = DEFAULT_JUL_EVENT_NAME;
662 break;
663 case LTTNG_DOMAIN_PYTHON:
664 default_event_name = DEFAULT_PYTHON_EVENT_NAME;
665 break;
666 default:
667 abort();
668 }
669
670 return default_event_name;
671 }
672
673 static int trigger_agent_disable_one(const struct lttng_trigger *trigger,
674 struct agent *agt,
675 struct agent_event *aevent)
676
677 {
678 int ret;
679
680 LTTNG_ASSERT(agt);
681 LTTNG_ASSERT(trigger);
682 LTTNG_ASSERT(aevent);
683
684 /*
685 * Actual ust event un-registration happens on the trigger
686 * un-registration at that point.
687 */
688
689 DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for trigger %" PRIu64,
690 aevent->name, aevent->loglevel_type,
691 aevent->loglevel_value, lttng_trigger_get_tracer_token(trigger));
692
693 /* Already disabled? */
694 if (!AGENT_EVENT_IS_ENABLED(aevent)) {
695 goto end;
696 }
697
698 ret = agent_disable_event(aevent, agt->domain);
699 if (ret != LTTNG_OK) {
700 goto error;
701 }
702
703 end:
704 return LTTNG_OK;
705
706 error:
707 return ret;
708 }
709
710 /*
711 * Disable a given agent event for a given UST session.
712 *
713 * Must be called with the RCU read lock held.
714 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
715 */
716 static int event_agent_disable_one(struct ltt_ust_session *usess,
717 struct agent *agt, struct agent_event *aevent)
718 {
719 int ret;
720 struct ltt_ust_event *uevent = NULL;
721 struct ltt_ust_channel *uchan = NULL;
722 const char *ust_event_name, *ust_channel_name;
723
724 LTTNG_ASSERT(agt);
725 LTTNG_ASSERT(usess);
726 LTTNG_ASSERT(aevent);
727
728 DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for session %" PRIu64,
729 aevent->name, aevent->loglevel_type, aevent->loglevel_value,
730 usess->id);
731
732 /* Already disabled? */
733 if (!AGENT_EVENT_IS_ENABLED(aevent)) {
734 goto end;
735 }
736
737 if (agt->domain == LTTNG_DOMAIN_JUL) {
738 ust_channel_name = DEFAULT_JUL_CHANNEL_NAME;
739 } else if (agt->domain == LTTNG_DOMAIN_LOG4J) {
740 ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME;
741 } else if (agt->domain == LTTNG_DOMAIN_PYTHON) {
742 ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME;
743 } else {
744 ret = LTTNG_ERR_INVALID;
745 goto error;
746 }
747
748 /*
749 * Disable it on the UST side. First get the channel reference then find
750 * the event and finally disable it.
751 */
752 uchan = trace_ust_find_channel_by_name(usess->domain_global.channels,
753 (char *) ust_channel_name);
754 if (!uchan) {
755 ret = LTTNG_ERR_UST_CHAN_NOT_FOUND;
756 goto error;
757 }
758
759 ust_event_name = event_get_default_agent_ust_name(agt->domain);
760 if (!ust_event_name) {
761 ret = LTTNG_ERR_FATAL;
762 goto error;
763 }
764
765 /*
766 * Agent UST event has its loglevel type forced to
767 * LTTNG_UST_LOGLEVEL_ALL. The actual loglevel type/value filtering
768 * happens thanks to an UST filter. The following -1 is actually
769 * ignored since the type is LTTNG_UST_LOGLEVEL_ALL.
770 */
771 uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name,
772 aevent->filter, LTTNG_UST_ABI_LOGLEVEL_ALL, -1, NULL);
773 /* If the agent event exists, it must be available on the UST side. */
774 LTTNG_ASSERT(uevent);
775
776 if (usess->active) {
777 ret = ust_app_disable_event_glb(usess, uchan, uevent);
778 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
779 ret = LTTNG_ERR_UST_DISABLE_FAIL;
780 goto error;
781 }
782 }
783
784 /*
785 * Flag event that it's disabled so the shadow copy on the ust app side
786 * will disable it if an application shows up.
787 */
788 uevent->enabled = 0;
789
790 ret = agent_disable_event(aevent, agt->domain);
791 if (ret != LTTNG_OK) {
792 goto error;
793 }
794
795 end:
796 return LTTNG_OK;
797
798 error:
799 return ret;
800 }
801
802 /*
803 * Disable agent event matching a given trigger.
804 *
805 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
806 */
807 int trigger_agent_disable(
808 const struct lttng_trigger *trigger, struct agent *agt)
809 {
810 int ret = LTTNG_OK;
811 struct agent_event *aevent;
812
813 LTTNG_ASSERT(trigger);
814 LTTNG_ASSERT(agt);
815
816 DBG("Event agent disabling for trigger %" PRIu64,
817 lttng_trigger_get_tracer_token(trigger));
818
819 rcu_read_lock();
820 aevent = agent_find_event_by_trigger(trigger, agt);
821
822 if (aevent == NULL) {
823 DBG2("Event agent NOT found by trigger %" PRIu64,
824 lttng_trigger_get_tracer_token(trigger));
825 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
826 goto end;
827 }
828
829 ret = trigger_agent_disable_one(trigger, agt, aevent);
830
831 if (ret != LTTNG_OK) {
832 goto end;
833 }
834
835 end:
836 rcu_read_unlock();
837 return ret;
838 }
839
840 /*
841 * Disable all agent events matching a given name for a given UST session.
842 *
843 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
844 */
845 int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt,
846 const char *event_name)
847 {
848 int ret = LTTNG_OK;
849 struct agent_event *aevent;
850 struct lttng_ht_iter iter;
851 struct lttng_ht_node_str *node;
852
853 LTTNG_ASSERT(agt);
854 LTTNG_ASSERT(usess);
855 LTTNG_ASSERT(event_name);
856
857 DBG("Event agent disabling %s (all loglevels) for session %" PRIu64, event_name, usess->id);
858
859 rcu_read_lock();
860 agent_find_events_by_name(event_name, agt, &iter);
861 node = lttng_ht_iter_get_node_str(&iter);
862
863 if (node == NULL) {
864 DBG2("Event agent NOT found by name %s", event_name);
865 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
866 goto end;
867 }
868
869 do {
870 aevent = caa_container_of(node, struct agent_event, node);
871 ret = event_agent_disable_one(usess, agt, aevent);
872
873 if (ret != LTTNG_OK) {
874 goto end;
875 }
876
877 /* Get next duplicate agent event by name. */
878 agent_event_next_duplicate(event_name, agt, &iter);
879 node = lttng_ht_iter_get_node_str(&iter);
880 } while (node);
881 end:
882 rcu_read_unlock();
883 return ret;
884 }
885 /*
886 * Disable all agent event for a given UST session.
887 *
888 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
889 */
890 int event_agent_disable_all(struct ltt_ust_session *usess,
891 struct agent *agt)
892 {
893 int ret;
894 struct agent_event *aevent;
895 struct lttng_ht_iter iter;
896
897 LTTNG_ASSERT(agt);
898 LTTNG_ASSERT(usess);
899
900 /*
901 * Disable event on agent application. Continue to disable all other events
902 * if the * event is not found.
903 */
904 ret = event_agent_disable(usess, agt, "*");
905 if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) {
906 goto error;
907 }
908
909 /* Disable every event. */
910 rcu_read_lock();
911 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
912 node.node) {
913 if (!AGENT_EVENT_IS_ENABLED(aevent)) {
914 continue;
915 }
916
917 ret = event_agent_disable(usess, agt, aevent->name);
918 if (ret != LTTNG_OK) {
919 goto error_unlock;
920 }
921 }
922 ret = LTTNG_OK;
923
924 error_unlock:
925 rcu_read_unlock();
926 error:
927 return ret;
928 }
This page took 0.047734 seconds and 4 git commands to generate.