Change lttng.h API char to const char
[lttng-tools.git] / liblttngctl / liblttngctl.c
index eb606166c214c9bd850ca7889d961547974ab4cf..e693123b9c1c384b5d18f8f9eaa1d64984fe991d 100644 (file)
@@ -28,6 +28,7 @@
 
 #include "liblttsessiondcomm.h"
 #include "lttngerr.h"
+#include "lttng-share.h"
 
 /* Socket to session daemon for communication */
 static int sessiond_socket;
@@ -88,70 +89,9 @@ end:
 }
 
 /*
- *  ask_sessiond
- *
- *  Ask the session daemon a specific command and put the data into buf.
- *
- *  Return size of data (only payload, not header).
- */
-static int ask_sessiond(enum lttcomm_sessiond_command lct, void **buf)
-{
-       int ret;
-       size_t size;
-       void *data = NULL;
-
-       ret = lttng_connect_sessiond();
-       if (ret < 0) {
-               goto end;
-       }
-
-       lsm.cmd_type = lct;
-
-       /* Send command to session daemon */
-       ret = send_data_sessiond();
-       if (ret < 0) {
-               goto end;
-       }
-
-       /* Get header from data transmission */
-       ret = recv_data_sessiond(&llm, sizeof(llm));
-       if (ret < 0) {
-               goto end;
-       }
-
-       /* Check error code if OK */
-       if (llm.ret_code != LTTCOMM_OK) {
-               ret = -llm.ret_code;
-               goto end;
-       }
-
-       size = llm.trace_name_offset + llm.data_size;
-       if (size == 0) {
-               goto end;
-       }
-
-       data = (void*) malloc(size);
-
-       /* Get payload data */
-       ret = recv_data_sessiond(data, size);
-       if (ret < 0) {
-               free(data);
-               goto end;
-       }
-
-       *buf = data;
-       ret = size;
-
-end:
-       lttng_disconnect_sessiond();
-       return ret;
-}
-
-/*
- *  check_tracing_group
- *
  *  Check if the specified group name exist.
- *  If yes, 0, else -1
+ *
+ *  If yes return 0, else return -1.
  */
 static int check_tracing_group(const char *grp_name)
 {
@@ -200,10 +140,8 @@ end:
 }
 
 /*
- *  set_session_daemon_path
- *
- *  Set sessiond socket path by putting it in 
- *  the global sessiond_sock_path variable.
+ *  Set sessiond socket path by putting it in the global sessiond_sock_path
+ *  variable.
  */
 static int set_session_daemon_path(void)
 {
@@ -225,231 +163,334 @@ static int set_session_daemon_path(void)
 }
 
 /*
- * BEGIN KERNEL CONTROL
- */
-
-/*
- *  lttng_kernel_enable_event
+ *  Connect to the LTTng session daemon.
  *
- *  Enable an event in the kernel tracer.
+ *  On success, return 0. On error, return -1.
  */
-int lttng_kernel_enable_event(char *event_name)
+static int connect_sessiond(void)
 {
        int ret;
 
-       if (event_name == NULL) {
-               ret = ask_sessiond(KERNEL_ENABLE_ALL_EVENT, NULL);
-       } else {
-               strncpy(lsm.u.event.event_name, event_name, NAME_MAX);
-               ret = ask_sessiond(KERNEL_ENABLE_EVENT, NULL);
+       ret = set_session_daemon_path();
+       if (ret < 0) {
+               return ret;
        }
 
-       return ret;
-}
+       /* Connect to the sesssion daemon */
+       ret = lttcomm_connect_unix_sock(sessiond_sock_path);
+       if (ret < 0) {
+               return ret;
+       }
 
-/*
- *  lttng_kernel_disable_event
- *
- *  Disable an event in the kernel tracer.
- */
-int lttng_kernel_disable_event(char *event_name)
-{
-       strncpy(lsm.u.event.event_name, event_name, NAME_MAX);
-       return ask_sessiond(KERNEL_DISABLE_EVENT, NULL);
-}
+       sessiond_socket = ret;
+       connected = 1;
 
-/*
- *  lttng_kernel_create_session
- *
- *  Create a session in the kernel tracer.
- */
-int lttng_kernel_create_session(void)
-{
-       return ask_sessiond(KERNEL_CREATE_SESSION, NULL);
+       return 0;
 }
 
 /*
- *  lttng_kernel_create_channel
- *
- *  Create a channel in the kernel tracer.
+ *  Clean disconnect the session daemon.
  */
-int lttng_kernel_create_channel(void)
+static int disconnect_sessiond(void)
 {
-       return ask_sessiond(KERNEL_CREATE_CHANNEL, NULL);
-}
+       int ret = 0;
 
-/*
- *  lttng_kernel_open_metadata
- *
- *  Open metadata in the kernel tracer.
- */
-int lttng_kernel_open_metadata(void)
-{
-       return ask_sessiond(KERNEL_OPEN_METADATA, NULL);
-}
+       if (connected) {
+               ret = lttcomm_close_unix_sock(sessiond_socket);
+               sessiond_socket = 0;
+               connected = 0;
+       }
 
-/*
- *  lttng_kernel_create_stream
- *
- *  Create stream in the kernel tracer.
- */
-int lttng_kernel_create_stream(void)
-{
-       return ask_sessiond(KERNEL_CREATE_STREAM, NULL);
+       return ret;
 }
 
 /*
- *  lttng_kernel_list_events
+ *  ask_sessiond
  *
- *  List all available events in the kernel.
+ *  Ask the session daemon a specific command and put the data into buf.
  *
- *  Return the size (bytes) of the list and set the event_list array.
- *  On error, return negative value.
+ *  Return size of data (only payload, not header).
  */
-int lttng_kernel_list_events(char **event_list)
+static int ask_sessiond(enum lttcomm_sessiond_command lct, void **buf)
 {
-       return ask_sessiond(KERNEL_LIST_EVENTS, (void **) event_list);
+       int ret;
+       size_t size;
+       void *data = NULL;
+
+       ret = connect_sessiond();
+       if (ret < 0) {
+               goto end;
+       }
+
+       lsm.cmd_type = lct;
+
+       /* Send command to session daemon */
+       ret = send_data_sessiond();
+       if (ret < 0) {
+               goto end;
+       }
+
+       /* Get header from data transmission */
+       ret = recv_data_sessiond(&llm, sizeof(llm));
+       if (ret < 0) {
+               goto end;
+       }
+
+       /* Check error code if OK */
+       if (llm.ret_code != LTTCOMM_OK) {
+               ret = -llm.ret_code;
+               goto end;
+       }
+
+       size = llm.data_size;
+       if (size == 0) {
+               ret = 0;
+               goto end;
+       }
+
+       data = (void*) malloc(size);
+
+       /* Get payload data */
+       ret = recv_data_sessiond(data, size);
+       if (ret < 0) {
+               free(data);
+               goto end;
+       }
+
+       *buf = data;
+       ret = size;
+
+end:
+       disconnect_sessiond();
+       return ret;
 }
 
 /*
- *  lttng_kernel_start_tracing
- *
- *  Start kernel tracing.
+ *  Start tracing for all trace of the session.
  */
-int lttng_kernel_start_tracing(void)
+int lttng_start_tracing(const char *session_name)
 {
-       return ask_sessiond(KERNEL_START_TRACE, NULL);
+       strncpy(lsm.session_name, session_name, NAME_MAX);
+       return ask_sessiond(LTTNG_START_TRACE, NULL);
 }
 
 /*
- *  lttng_kernel_stop_tracing
- *
- *  Stop kernel tracing.
+ *  Stop tracing for all trace of the session.
  */
-int lttng_kernel_stop_tracing(void)
+int lttng_stop_tracing(const char *session_name)
 {
-       return ask_sessiond(KERNEL_STOP_TRACE, NULL);
+       strncpy(lsm.session_name, session_name, NAME_MAX);
+       return ask_sessiond(LTTNG_STOP_TRACE, NULL);
 }
 
 /*
- * END KERNEL CONTROL
+ *  lttng_add_context
  */
-
-/*
- *  lttng_get_readable_code
- *
- *  Return a human readable string of code
- */
-const char *lttng_get_readable_code(int code)
+int lttng_add_context(struct lttng_domain *domain,
+               struct lttng_event_context *ctx, const char *event_name,
+               const char *channel_name)
 {
-       if (code > -LTTCOMM_OK) {
-               return "Ended with errors";
+       int ret;
+
+       if (channel_name != NULL) {
+               strncpy(lsm.u.context.channel_name, channel_name, NAME_MAX);
        }
 
-       return lttcomm_get_readable_code(code);
+       if (event_name != NULL) {
+               strncpy(lsm.u.context.event_name, event_name, NAME_MAX);
+       }
+
+       memcpy(&lsm.u.context.ctx, ctx, sizeof(struct lttng_event_context));
+
+       switch (domain->type) {
+       case LTTNG_DOMAIN_KERNEL:
+               ret = ask_sessiond(LTTNG_KERNEL_ADD_CONTEXT, NULL);
+               break;
+       case LTTNG_DOMAIN_UST:
+               ret = LTTCOMM_NOT_IMPLEMENTED;
+               break;
+       default:
+               ret = LTTCOMM_UNKNOWN_DOMAIN;
+               break;
+       };
+
+       return ret;
 }
 
 /*
- *  lttng_ust_start_trace
- *
- *  Request a trace start for pid.
+ *  lttng_enable_event
  */
-int lttng_ust_start_trace(pid_t pid)
+int lttng_enable_event(struct lttng_domain *domain,
+               struct lttng_event *ev, const char *channel_name)
 {
-       lsm.pid = pid;
-       return ask_sessiond(UST_START_TRACE, NULL);
+       int ret;
+
+       if (channel_name == NULL) {
+               strncpy(lsm.u.enable.channel_name, DEFAULT_CHANNEL_NAME, NAME_MAX);
+       } else {
+               strncpy(lsm.u.enable.channel_name, channel_name, NAME_MAX);
+       }
+
+       switch (domain->type) {
+               case LTTNG_DOMAIN_KERNEL:
+                       if (ev == NULL) {
+                               ret = ask_sessiond(LTTNG_KERNEL_ENABLE_ALL_EVENT, NULL);
+                       } else {
+                               memcpy(&lsm.u.enable.event, ev, sizeof(struct lttng_event));
+                               ret = ask_sessiond(LTTNG_KERNEL_ENABLE_EVENT, NULL);
+                       }
+                       break;
+               case LTTNG_DOMAIN_UST:
+                       ret = LTTCOMM_NOT_IMPLEMENTED;
+                       break;
+               default:
+                       ret = LTTCOMM_UNKNOWN_DOMAIN;
+                       break;
+       };
+
+       return ret;
 }
 
 /*
- *  lttng_ust_stop_trace
- *
- *  Request a trace stop for pid.
+ * Disable an event in the kernel tracer.
  */
-int lttng_ust_stop_trace(pid_t pid)
+int lttng_disable_event(struct lttng_domain *domain, const char *name,
+               const char *channel_name)
 {
-       lsm.pid = pid;
-       return ask_sessiond(UST_STOP_TRACE, NULL);
+       int ret;
+
+       if (channel_name == NULL) {
+               strncpy(lsm.u.disable.channel_name, DEFAULT_CHANNEL_NAME, NAME_MAX);
+       } else {
+               strncpy(lsm.u.disable.channel_name, channel_name, NAME_MAX);
+       }
+
+       switch (domain->type) {
+               case LTTNG_DOMAIN_KERNEL:
+                       if (name == NULL) {
+                               ret = ask_sessiond(LTTNG_KERNEL_DISABLE_ALL_EVENT, NULL);
+                       } else {
+                               strncpy(lsm.u.disable.name, name, NAME_MAX);
+                               ret = ask_sessiond(LTTNG_KERNEL_DISABLE_EVENT, NULL);
+                       }
+                       break;
+               case LTTNG_DOMAIN_UST:
+                       ret = LTTCOMM_NOT_IMPLEMENTED;
+                       break;
+               default:
+                       ret = LTTCOMM_UNKNOWN_DOMAIN;
+                       break;
+       };
+
+       return ret;
 }
 
 /*
- *  lttng_ust_create_trace
- *
- *  Request a trace creation for pid.
+ * Enable recording for a channel for the kernel tracer.
  */
-int lttng_ust_create_trace(pid_t pid)
+int lttng_enable_channel(struct lttng_domain *domain,
+               struct lttng_channel *chan)
 {
-       lsm.pid = pid;
-       return ask_sessiond(UST_CREATE_TRACE, NULL);
+       int ret;
+
+       memcpy(&lsm.u.channel.chan, chan, sizeof(struct lttng_channel));
+
+       switch (domain->type) {
+               case LTTNG_DOMAIN_KERNEL:
+                       ret = ask_sessiond(LTTNG_KERNEL_ENABLE_CHANNEL, NULL);
+                       break;
+               case LTTNG_DOMAIN_UST:
+                       ret = LTTCOMM_NOT_IMPLEMENTED;
+                       break;
+               default:
+                       ret = LTTCOMM_UNKNOWN_DOMAIN;
+                       break;
+       };
+
+       return ret;
 }
 
 /*
- *  lttng_ust_list_apps
- *
- *  Ask the session daemon for all UST traceable applications.
- *
- *  Return the number of pids.
- *  On error, return negative value.
+ * Disable recording for the channel for the kernel tracer.
  */
-int lttng_ust_list_apps(pid_t **pids)
+int lttng_disable_channel(struct lttng_domain *domain, const char *name)
 {
        int ret;
 
-       ret = ask_sessiond(UST_LIST_APPS, (void**) pids);
-       if (ret < 0) {
-               return ret;
-       }
+       strncpy(lsm.u.disable.channel_name, name, NAME_MAX);
 
-       return ret / sizeof(pid_t);
+       switch (domain->type) {
+               case LTTNG_DOMAIN_KERNEL:
+                       ret = ask_sessiond(LTTNG_KERNEL_DISABLE_CHANNEL, NULL);
+                       break;
+               case LTTNG_DOMAIN_UST:
+                       ret = LTTCOMM_NOT_IMPLEMENTED;
+                       break;
+               default:
+                       ret = LTTCOMM_UNKNOWN_DOMAIN;
+                       break;
+       };
+
+       return ret;
 }
 
 /*
- *  lttng_list_traces
+ * List all available events in the kernel.
  *
- *  Ask the session daemon for all traces (kernel and ust) for the session
- *  identified by uuid.
- *
- *  Return the number of traces.
- *  On error, return negative value.
+ * Return the size (bytes) of the list and set the event_list array.
+ * On error, return negative value.
  */
-int lttng_list_traces(uuid_t *uuid, struct lttng_trace **traces)
+int lttng_list_events(struct lttng_domain *domain, char **event_list)
 {
        int ret;
 
-       uuid_copy(lsm.session_uuid, *uuid);
+       switch (domain->type) {
+               case LTTNG_DOMAIN_KERNEL:
+                       ret = ask_sessiond(LTTNG_KERNEL_LIST_EVENTS, (void **) event_list);
+                       break;
+               case LTTNG_DOMAIN_UST:
+                       ret = LTTCOMM_NOT_IMPLEMENTED;
+                       break;
+               default:
+                       ret = LTTCOMM_UNKNOWN_DOMAIN;
+                       break;
+       };
+
+       return ret;
+}
 
-       ret = ask_sessiond(LTTNG_LIST_TRACES, (void **) traces);
-       if (ret < 0) {
-               return ret;
+/*
+ *  Return a human readable string of code
+ */
+const char *lttng_get_readable_code(int code)
+{
+       if (code > -LTTCOMM_OK) {
+               return "Ended with errors";
        }
 
-       return ret / sizeof(struct lttng_trace);
+       return lttcomm_get_readable_code(code);
 }
 
 /*
- *  lttng_create_session
- *
  *  Create a brand new session using name.
  */
-int lttng_create_session(char *name)
+int lttng_create_session(const char *name, const char *path)
 {
        strncpy(lsm.session_name, name, NAME_MAX);
+       strncpy(lsm.path, path, PATH_MAX);
        return ask_sessiond(LTTNG_CREATE_SESSION, NULL);
 }
 
 /*
- *  lttng_destroy_session
- *
  *  Destroy session using name.
  */
-int lttng_destroy_session(uuid_t *uuid)
+int lttng_destroy_session(const char *name)
 {
-       uuid_copy(lsm.session_uuid, *uuid);
+       strncpy(lsm.session_name, name, NAME_MAX);
        return ask_sessiond(LTTNG_DESTROY_SESSION, NULL);
 }
 
 /*
- *  lttng_list_sessions
- *
  *  Ask the session daemon for all available sessions.
  *
  *  Return number of session.
@@ -468,59 +509,11 @@ int lttng_list_sessions(struct lttng_session **sessions)
 }
 
 /*
- *  lttng_connect_sessiond
- *
- *  Connect to the LTTng session daemon.
- *  On success, return 0
- *  On error, return a negative value
- */
-int lttng_connect_sessiond(void)
-{
-       int ret;
-
-       ret = set_session_daemon_path();
-       if (ret < 0) {
-               return ret;
-       }
-
-       /* Connect to the sesssion daemon */
-       ret = lttcomm_connect_unix_sock(sessiond_sock_path);
-       if (ret < 0) {
-               return ret;
-       }
-
-       sessiond_socket = ret;
-       connected = 1;
-
-       return 0;
-}
-
-/*
- *  lttng_disconnect_sessiond
- *
- *  Clean disconnect the session daemon.
+ * Set session name for the current lsm.
  */
-int lttng_disconnect_sessiond(void)
+void lttng_set_session_name(const char *name)
 {
-       int ret = 0;
-
-       if (connected) {
-               ret = lttcomm_close_unix_sock(sessiond_socket);
-               sessiond_socket = 0;
-               connected = 0;
-       }
-
-       return ret;
-}
-
-/*
- *  lttng_set_current_session_uuid
- *
- *  Set the session uuid for current lsm.
- */
-void lttng_set_current_session_uuid(uuid_t *uuid)
-{
-       uuid_copy(lsm.session_uuid, *uuid);
+       strncpy(lsm.session_name, name, NAME_MAX);
 }
 
 /*
This page took 0.029584 seconds and 4 git commands to generate.