X-Git-Url: https://git.lttng.org/?p=lttng-tools.git;a=blobdiff_plain;f=src%2Fcommon%2Fkernel-ctl%2Fkernel-ctl.h;h=5f2e014d19c0b3cc984bdf2a8b2f6fb95894a227;hp=7c5f8bebefb55b2156b7214b9ef59476aef927a6;hb=a5dfbb9db7ba31913657ed921006b13977b7b426;hpb=d3e2ba59faddb31870e2ce29b6a881f7ad5ad883 diff --git a/src/common/kernel-ctl/kernel-ctl.h b/src/common/kernel-ctl/kernel-ctl.h index 7c5f8bebe..5f2e014d1 100644 --- a/src/common/kernel-ctl/kernel-ctl.h +++ b/src/common/kernel-ctl/kernel-ctl.h @@ -36,10 +36,33 @@ int kernctl_start_session(int fd); int kernctl_stop_session(int fd); int kernctl_tracepoint_list(int fd); +int kernctl_syscall_list(int fd); int kernctl_tracer_version(int fd, struct lttng_kernel_tracer_version *v); +int kernctl_tracer_abi_version(int fd, struct lttng_kernel_tracer_abi_version *v); int kernctl_wait_quiescent(int fd); int kernctl_calibrate(int fd, struct lttng_kernel_calibrate *calibrate); +int kernctl_enable_syscall(int fd, const char *syscall_name); +int kernctl_disable_syscall(int fd, const char *syscall_name); + +/* + * kernctl_syscall_mask - Get syscall mask associated to a channel FD. + * + * The parameter @syscall_mask should initially be either NULL or point + * to memory allocated with malloc(3) or realloc(3). When the function + * returns, it will point to a memory area of the size required for the + * bitmask (using realloc(3) to resize the memory). + * + * It returns 0 if OK, -1 on error. In all cases (error and OK), + * @syscall_mask should be freed by the caller with free(3). + */ +int kernctl_syscall_mask(int fd, char **syscall_mask, + uint32_t *nr_bits); + +/* Process ID tracking can be applied to session FD */ +int kernctl_track_pid(int fd, int pid); +int kernctl_untrack_pid(int fd, int pid); +int kernctl_list_tracker_pids(int fd); /* Buffer operations */