while IFS= read -r pid ; do
# /proc/pid/cmdline is null separated.
- if full_command_no_argument=$(cut -d '' -f 1 < /proc/"$pid"/cmdline); then
+ if full_command_no_argument=$(cut -d '' -f 1 2>/dev/null < /proc/"$pid"/cmdline); then
command_basename=$(basename "$full_command_no_argument")
if grep -q "$pattern" <<< "$command_basename"; then
echo "$pid"
lttng_disable_kernel_syscall 1 "$@"
}
+function lttng_enable_kernel_function_event ()
+{
+ local expected_to_fail="$1"
+ local sess_name="$2"
+ local target="$3"
+ local event_name="$4"
+
+ "$TESTDIR/../src/bin/lttng/$LTTNG_BIN" enable-event --kernel --function="$target" "$event_name" -s "$sess_name" > "$OUTPUT_DEST" 2> "$ERROR_OUTPUT_DEST"
+ ret=$?
+ if [[ $expected_to_fail -eq "1" ]]; then
+ test $ret -ne "0"
+ ok $? "Enable kernel function event for session $sess_name failed as expected"
+ else
+ ok $ret "Enable kernel function event for session $sess_name"
+ fi
+}
+
+function lttng_enable_kernel_function_event_ok ()
+{
+ lttng_enable_kernel_function_event 0 "$@"
+}
+
function lttng_enable_kernel_userspace_probe_event ()
{
local expected_to_fail="$1"
if [ -z "$pids" ]; then
if [ "$withtap" -eq "1" ]; then
- pass "No session daemon to kill"
+ fail "No session daemon to kill"
+ else
+ BAIL_OUT "No session daemon to kill"
fi
return 0
fi