Commit | Line | Data |
---|---|---|
54d01ffb DG |
1 | /* |
2 | * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca> | |
71a559f8 | 3 | * Copyright (C) 2016 - Jérémie Galarneau <jeremie.galarneau@efficios.com> |
54d01ffb | 4 | * |
d14d33bf AM |
5 | * This program is free software; you can redistribute it and/or modify |
6 | * it under the terms of the GNU General Public License, version 2 only, | |
7 | * as published by the Free Software Foundation. | |
54d01ffb | 8 | * |
d14d33bf AM |
9 | * This program is distributed in the hope that it will be useful, |
10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | * GNU General Public License for more details. | |
54d01ffb | 13 | * |
d14d33bf AM |
14 | * You should have received a copy of the GNU General Public License along |
15 | * with this program; if not, write to the Free Software Foundation, Inc., | |
16 | * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. | |
54d01ffb DG |
17 | */ |
18 | ||
6c1c0768 | 19 | #define _LGPL_SOURCE |
d87bfb32 | 20 | #include <errno.h> |
54d01ffb | 21 | #include <urcu/list.h> |
2bdd86d4 | 22 | #include <string.h> |
54d01ffb DG |
23 | |
24 | #include <lttng/lttng.h> | |
db758600 | 25 | #include <common/error.h> |
10a8a223 | 26 | #include <common/sessiond-comm/sessiond-comm.h> |
71a559f8 JG |
27 | #include <common/filter.h> |
28 | #include <common/context.h> | |
54d01ffb DG |
29 | |
30 | #include "channel.h" | |
31 | #include "event.h" | |
4771f025 | 32 | #include "kernel.h" |
be6a6276 | 33 | #include "lttng-sessiond.h" |
75018ab6 JG |
34 | #include "lttng-ust-ctl.h" |
35 | #include "lttng-ust-error.h" | |
edb67388 DG |
36 | #include "ust-app.h" |
37 | #include "trace-kernel.h" | |
38 | #include "trace-ust.h" | |
7c1d2758 | 39 | #include "agent.h" |
54d01ffb | 40 | |
025faf73 DG |
41 | /* |
42 | * Add unique UST event based on the event name, filter bytecode and loglevel. | |
43 | */ | |
18eace3b DG |
44 | static void add_unique_ust_event(struct lttng_ht *ht, |
45 | struct ltt_ust_event *event) | |
46 | { | |
47 | struct cds_lfht_node *node_ptr; | |
48 | struct ltt_ust_ht_key key; | |
49 | ||
50 | assert(ht); | |
51 | assert(ht->ht); | |
52 | assert(event); | |
53 | ||
54 | key.name = event->attr.name; | |
55 | key.filter = (struct lttng_filter_bytecode *) event->filter; | |
b953b8cd PP |
56 | key.loglevel_type = event->attr.loglevel_type; |
57 | key.loglevel_value = event->attr.loglevel; | |
4031e53e | 58 | key.exclusion = event->exclusion; |
18eace3b DG |
59 | |
60 | node_ptr = cds_lfht_add_unique(ht->ht, | |
61 | ht->hash_fct(event->node.key, lttng_ht_seed), | |
62 | trace_ust_ht_match_event, &key, &event->node.node); | |
63 | assert(node_ptr == &event->node.node); | |
64 | } | |
65 | ||
54d01ffb | 66 | /* |
9550ee81 JR |
67 | * Disable kernel tracepoint events for a channel from the kernel session of |
68 | * a specified event_name and event type. | |
69 | * On type LTTNG_EVENT_ALL all events with event_name are disabled. | |
70 | * If event_name is NULL all events of the specified type are disabled. | |
54d01ffb | 71 | */ |
d0ae4ea8 | 72 | int event_kernel_disable_event(struct ltt_kernel_channel *kchan, |
df4f5a87 | 73 | const char *event_name, enum lttng_event_type type) |
54d01ffb | 74 | { |
9550ee81 | 75 | int ret, error = 0, found = 0; |
54d01ffb DG |
76 | struct ltt_kernel_event *kevent; |
77 | ||
0525e9ae DG |
78 | assert(kchan); |
79 | ||
54d01ffb DG |
80 | /* For each event in the kernel session */ |
81 | cds_list_for_each_entry(kevent, &kchan->events_list.head, list) { | |
d0ae4ea8 MD |
82 | if (type != LTTNG_EVENT_ALL && kevent->type != type) |
83 | continue; | |
9550ee81 JR |
84 | if (event_name != NULL && strcmp(event_name, kevent->event->name)) { |
85 | continue; | |
86 | } | |
87 | found++; | |
54d01ffb DG |
88 | ret = kernel_disable_event(kevent); |
89 | if (ret < 0) { | |
9550ee81 | 90 | error = 1; |
54d01ffb DG |
91 | continue; |
92 | } | |
93 | } | |
9550ee81 JR |
94 | DBG("Disable kernel event: found %d events with name: %s and type: %d", |
95 | found, event_name ? event_name : "NULL", type); | |
7a3d1328 | 96 | |
9550ee81 JR |
97 | if (event_name != NULL && !found) { |
98 | ret = LTTNG_ERR_NO_EVENT; | |
99 | } else { | |
100 | ret = error ? LTTNG_ERR_KERN_DISABLE_FAIL : LTTNG_OK; | |
101 | } | |
102 | ||
103 | return ret; | |
54d01ffb DG |
104 | } |
105 | ||
106 | /* | |
7a3d1328 | 107 | * Enable kernel tracepoint event for a channel from the kernel session. |
49d21f93 | 108 | * We own filter_expression and filter. |
54d01ffb | 109 | */ |
d0ae4ea8 | 110 | int event_kernel_enable_event(struct ltt_kernel_channel *kchan, |
00a62084 MD |
111 | struct lttng_event *event, char *filter_expression, |
112 | struct lttng_filter_bytecode *filter) | |
54d01ffb DG |
113 | { |
114 | int ret; | |
115 | struct ltt_kernel_event *kevent; | |
116 | ||
0525e9ae DG |
117 | assert(kchan); |
118 | assert(event); | |
119 | ||
00a62084 MD |
120 | kevent = trace_kernel_find_event(event->name, kchan, |
121 | event->type, filter); | |
54d01ffb | 122 | if (kevent == NULL) { |
71a3bb01 | 123 | ret = kernel_create_event(event, kchan, filter_expression, filter); |
a969e101 MD |
124 | /* We have passed ownership */ |
125 | filter_expression = NULL; | |
126 | filter = NULL; | |
71a3bb01 | 127 | if (ret) { |
7a3d1328 | 128 | goto end; |
54d01ffb DG |
129 | } |
130 | } else if (kevent->enabled == 0) { | |
131 | ret = kernel_enable_event(kevent); | |
132 | if (ret < 0) { | |
f73fabfd | 133 | ret = LTTNG_ERR_KERN_ENABLE_FAIL; |
7a3d1328 | 134 | goto end; |
54d01ffb | 135 | } |
42224349 DG |
136 | } else { |
137 | /* At this point, the event is considered enabled */ | |
f73fabfd | 138 | ret = LTTNG_ERR_KERN_EVENT_EXIST; |
42224349 | 139 | goto end; |
54d01ffb | 140 | } |
42224349 | 141 | |
f73fabfd | 142 | ret = LTTNG_OK; |
7a3d1328 | 143 | end: |
a969e101 MD |
144 | free(filter_expression); |
145 | free(filter); | |
54d01ffb DG |
146 | return ret; |
147 | } | |
148 | ||
7f79d3a1 DG |
149 | /* |
150 | * ============================ | |
151 | * UST : The Ultimate Frontier! | |
152 | * ============================ | |
153 | */ | |
154 | ||
2bdd86d4 MD |
155 | /* |
156 | * Enable UST tracepoint event for a channel from a UST session. | |
49d21f93 | 157 | * We own filter_expression, filter, and exclusion. |
2bdd86d4 | 158 | */ |
7972aab2 | 159 | int event_ust_enable_tracepoint(struct ltt_ust_session *usess, |
025faf73 | 160 | struct ltt_ust_channel *uchan, struct lttng_event *event, |
6b453b5e | 161 | char *filter_expression, |
f1613f52 | 162 | struct lttng_filter_bytecode *filter, |
88f06f15 JG |
163 | struct lttng_event_exclusion *exclusion, |
164 | bool internal_event) | |
2bdd86d4 | 165 | { |
88e3c2f5 | 166 | int ret = LTTNG_OK, to_create = 0; |
edb67388 DG |
167 | struct ltt_ust_event *uevent; |
168 | ||
0525e9ae DG |
169 | assert(usess); |
170 | assert(uchan); | |
171 | assert(event); | |
172 | ||
18eace3b DG |
173 | rcu_read_lock(); |
174 | ||
025faf73 | 175 | uevent = trace_ust_find_event(uchan->events, event->name, filter, |
abda88ad JG |
176 | (enum lttng_ust_loglevel_type) event->loglevel_type, |
177 | event->loglevel, exclusion); | |
87c6e328 | 178 | if (!uevent) { |
39687410 FD |
179 | ret = trace_ust_create_event(event, filter_expression, |
180 | filter, exclusion, internal_event, &uevent); | |
49d21f93 MD |
181 | /* We have passed ownership */ |
182 | filter_expression = NULL; | |
183 | filter = NULL; | |
184 | exclusion = NULL; | |
39687410 | 185 | if (ret != LTTNG_OK) { |
edb67388 DG |
186 | goto error; |
187 | } | |
025faf73 | 188 | |
fc34caaa | 189 | /* Valid to set it after the goto error since uevent is still NULL */ |
edb67388 DG |
190 | to_create = 1; |
191 | } | |
2bdd86d4 | 192 | |
7f79d3a1 DG |
193 | if (uevent->enabled) { |
194 | /* It's already enabled so everything is OK */ | |
0359fdbc | 195 | assert(!to_create); |
5bcdda4f | 196 | ret = LTTNG_ERR_UST_EVENT_ENABLED; |
7f79d3a1 DG |
197 | goto end; |
198 | } | |
199 | ||
fc34caaa | 200 | uevent->enabled = 1; |
88e3c2f5 JG |
201 | if (to_create) { |
202 | /* Add ltt ust event to channel */ | |
203 | add_unique_ust_event(uchan->events, uevent); | |
204 | } | |
205 | ||
206 | if (!usess->active) { | |
207 | goto end; | |
208 | } | |
fc34caaa | 209 | |
7972aab2 DG |
210 | if (to_create) { |
211 | /* Create event on all UST registered apps for session */ | |
212 | ret = ust_app_create_event_glb(usess, uchan, uevent); | |
213 | } else { | |
214 | /* Enable event on all UST registered apps for session */ | |
215 | ret = ust_app_enable_event_glb(usess, uchan, uevent); | |
216 | } | |
48842b30 | 217 | |
7972aab2 DG |
218 | if (ret < 0) { |
219 | if (ret == -LTTNG_UST_ERR_EXIST) { | |
220 | ret = LTTNG_ERR_UST_EVENT_EXIST; | |
221 | goto end; | |
222 | } else { | |
223 | ret = LTTNG_ERR_UST_ENABLE_FAIL; | |
224 | goto error; | |
edb67388 | 225 | } |
2bdd86d4 | 226 | } |
48842b30 | 227 | |
7f79d3a1 DG |
228 | DBG("Event UST %s %s in channel %s", uevent->attr.name, |
229 | to_create ? "created" : "enabled", uchan->name); | |
230 | ||
f73fabfd | 231 | ret = LTTNG_OK; |
fc34caaa | 232 | |
fb89d070 | 233 | end: |
18eace3b | 234 | rcu_read_unlock(); |
49d21f93 MD |
235 | free(filter_expression); |
236 | free(filter); | |
237 | free(exclusion); | |
fc34caaa | 238 | return ret; |
edb67388 DG |
239 | |
240 | error: | |
fc34caaa DG |
241 | /* |
242 | * Only destroy event on creation time (not enabling time) because if the | |
243 | * event is found in the channel (to_create == 0), it means that at some | |
244 | * point the enable_event worked and it's thus valid to keep it alive. | |
245 | * Destroying it also implies that we also destroy it's shadow copy to sync | |
246 | * everyone up. | |
247 | */ | |
248 | if (to_create) { | |
249 | /* In this code path, the uevent was not added to the hash table */ | |
250 | trace_ust_destroy_event(uevent); | |
251 | } | |
18eace3b | 252 | rcu_read_unlock(); |
49d21f93 MD |
253 | free(filter_expression); |
254 | free(filter); | |
255 | free(exclusion); | |
2bdd86d4 MD |
256 | return ret; |
257 | } | |
258 | ||
7f79d3a1 DG |
259 | /* |
260 | * Disable UST tracepoint of a channel from a UST session. | |
261 | */ | |
7972aab2 | 262 | int event_ust_disable_tracepoint(struct ltt_ust_session *usess, |
df4f5a87 | 263 | struct ltt_ust_channel *uchan, const char *event_name) |
2bdd86d4 MD |
264 | { |
265 | int ret; | |
7f79d3a1 | 266 | struct ltt_ust_event *uevent; |
18eace3b DG |
267 | struct lttng_ht_node_str *node; |
268 | struct lttng_ht_iter iter; | |
18eace3b | 269 | struct lttng_ht *ht; |
2bdd86d4 | 270 | |
0525e9ae DG |
271 | assert(usess); |
272 | assert(uchan); | |
273 | assert(event_name); | |
274 | ||
18eace3b DG |
275 | ht = uchan->events; |
276 | ||
18eace3b | 277 | rcu_read_lock(); |
025faf73 DG |
278 | |
279 | /* | |
280 | * We use a custom lookup since we need the iterator for the next_duplicate | |
281 | * call in the do while loop below. | |
282 | */ | |
283 | cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed), | |
284 | trace_ust_ht_match_event_by_name, event_name, &iter.iter); | |
18eace3b DG |
285 | node = lttng_ht_iter_get_node_str(&iter); |
286 | if (node == NULL) { | |
287 | DBG2("Trace UST event NOT found by name %s", event_name); | |
f73fabfd | 288 | ret = LTTNG_ERR_UST_EVENT_NOT_FOUND; |
7f79d3a1 | 289 | goto error; |
2bdd86d4 | 290 | } |
7f79d3a1 | 291 | |
18eace3b DG |
292 | do { |
293 | uevent = caa_container_of(node, struct ltt_ust_event, node); | |
025faf73 DG |
294 | assert(uevent); |
295 | ||
18eace3b DG |
296 | if (uevent->enabled == 0) { |
297 | /* It's already disabled so everything is OK */ | |
a1dcaf0f | 298 | goto next; |
7f79d3a1 | 299 | } |
88e3c2f5 JG |
300 | uevent->enabled = 0; |
301 | DBG2("Event UST %s disabled in channel %s", uevent->attr.name, | |
302 | uchan->name); | |
18eace3b | 303 | |
88e3c2f5 JG |
304 | if (!usess->active) { |
305 | goto next; | |
306 | } | |
7972aab2 DG |
307 | ret = ust_app_disable_event_glb(usess, uchan, uevent); |
308 | if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) { | |
309 | ret = LTTNG_ERR_UST_DISABLE_FAIL; | |
18eace3b DG |
310 | goto error; |
311 | } | |
a1dcaf0f | 312 | next: |
18eace3b DG |
313 | /* Get next duplicate event by name. */ |
314 | cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name, | |
315 | event_name, &iter.iter); | |
316 | node = lttng_ht_iter_get_node_str(&iter); | |
317 | } while (node); | |
7f79d3a1 | 318 | |
f73fabfd | 319 | ret = LTTNG_OK; |
7f79d3a1 | 320 | |
7f79d3a1 | 321 | error: |
18eace3b | 322 | rcu_read_unlock(); |
7f79d3a1 DG |
323 | return ret; |
324 | } | |
325 | ||
b1e7fe2d JR |
326 | /* |
327 | * Disable all UST tracepoints for a channel from a UST session. | |
328 | */ | |
329 | int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess, | |
330 | struct ltt_ust_channel *uchan) | |
331 | { | |
3e81c0f2 | 332 | int ret, i, size, error = 0; |
b1e7fe2d JR |
333 | struct lttng_ht_iter iter; |
334 | struct ltt_ust_event *uevent = NULL; | |
335 | struct lttng_event *events = NULL; | |
336 | ||
337 | assert(usess); | |
338 | assert(uchan); | |
339 | ||
340 | rcu_read_lock(); | |
341 | ||
342 | /* Disabling existing events */ | |
343 | cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent, | |
344 | node.node) { | |
345 | if (uevent->enabled == 1) { | |
346 | ret = event_ust_disable_tracepoint(usess, uchan, | |
347 | uevent->attr.name); | |
348 | if (ret < 0) { | |
3e81c0f2 | 349 | error = LTTNG_ERR_UST_DISABLE_FAIL; |
b1e7fe2d JR |
350 | continue; |
351 | } | |
352 | } | |
353 | } | |
354 | ||
355 | /* Get all UST available events */ | |
356 | size = ust_app_list_events(&events); | |
357 | if (size < 0) { | |
358 | ret = LTTNG_ERR_UST_LIST_FAIL; | |
359 | goto error; | |
360 | } | |
361 | ||
362 | for (i = 0; i < size; i++) { | |
363 | ret = event_ust_disable_tracepoint(usess, uchan, | |
364 | events[i].name); | |
3e81c0f2 | 365 | if (ret < 0) { |
b1e7fe2d | 366 | /* Continue to disable the rest... */ |
3e81c0f2 | 367 | error = LTTNG_ERR_UST_DISABLE_FAIL; |
b1e7fe2d JR |
368 | continue; |
369 | } | |
370 | } | |
371 | ||
3e81c0f2 | 372 | ret = error ? error : LTTNG_OK; |
b1e7fe2d JR |
373 | error: |
374 | rcu_read_unlock(); | |
375 | free(events); | |
376 | return ret; | |
377 | } | |
378 | ||
f20baf8e | 379 | /* |
022d91ba | 380 | * Enable all agent event for a given UST session. |
f20baf8e DG |
381 | * |
382 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. | |
383 | */ | |
022d91ba | 384 | int event_agent_enable_all(struct ltt_ust_session *usess, |
fefd409b | 385 | struct agent *agt, struct lttng_event *event, |
51755dc8 | 386 | struct lttng_filter_bytecode *filter ,char *filter_expression) |
f20baf8e DG |
387 | { |
388 | int ret; | |
fefd409b | 389 | struct agent_event *aevent; |
f20baf8e DG |
390 | struct lttng_ht_iter iter; |
391 | ||
392 | assert(usess); | |
393 | ||
022d91ba | 394 | DBG("Event agent enabling ALL events for session %" PRIu64, usess->id); |
f20baf8e | 395 | |
022d91ba | 396 | /* Enable event on agent application through TCP socket. */ |
8404118c | 397 | ret = event_agent_enable(usess, agt, event, filter, filter_expression); |
f20baf8e DG |
398 | if (ret != LTTNG_OK) { |
399 | goto error; | |
400 | } | |
401 | ||
402 | /* Flag every event that they are now enabled. */ | |
403 | rcu_read_lock(); | |
fefd409b | 404 | cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent, |
f20baf8e | 405 | node.node) { |
fefd409b | 406 | aevent->enabled = 1; |
f20baf8e DG |
407 | } |
408 | rcu_read_unlock(); | |
409 | ||
410 | ret = LTTNG_OK; | |
411 | ||
412 | error: | |
413 | return ret; | |
414 | } | |
415 | ||
71a559f8 JG |
416 | /* |
417 | * Check if this event's filter requires the activation of application contexts | |
418 | * and enable them in the agent. | |
b4bc01f7 MD |
419 | * TODO: bytecode iterator does not support non-legacy application |
420 | * contexts yet. Not an issue for now, since they are not generated by | |
421 | * the lttng-ctl library. | |
71a559f8 JG |
422 | */ |
423 | static int add_filter_app_ctx(struct lttng_filter_bytecode *bytecode, | |
424 | const char *filter_expression, struct agent *agt) | |
425 | { | |
426 | int ret = LTTNG_OK; | |
427 | char *provider_name = NULL, *ctx_name = NULL; | |
428 | struct bytecode_symbol_iterator *it = | |
429 | bytecode_symbol_iterator_create(bytecode); | |
430 | ||
431 | if (!it) { | |
432 | ret = LTTNG_ERR_NOMEM; | |
433 | goto end; | |
434 | } | |
435 | ||
436 | do { | |
437 | struct lttng_event_context ctx; | |
438 | const char *symbol_name = | |
439 | bytecode_symbol_iterator_get_name(it); | |
440 | ||
441 | if (parse_application_context(symbol_name, &provider_name, | |
442 | &ctx_name)) { | |
443 | /* Not an application context. */ | |
444 | continue; | |
445 | } | |
446 | ||
447 | ctx.ctx = LTTNG_EVENT_CONTEXT_APP_CONTEXT; | |
448 | ctx.u.app_ctx.provider_name = provider_name; | |
449 | ctx.u.app_ctx.ctx_name = ctx_name; | |
450 | ||
451 | /* Recognized an application context. */ | |
452 | DBG("Enabling event with filter expression \"%s\" requires enabling the %s:%s application context.", | |
453 | filter_expression, provider_name, ctx_name); | |
454 | ||
455 | ret = agent_add_context(&ctx, agt); | |
456 | if (ret != LTTNG_OK) { | |
457 | ERR("Failed to add application context %s:%s.", | |
458 | provider_name, ctx_name); | |
459 | goto end; | |
460 | } | |
461 | ||
462 | ret = agent_enable_context(&ctx, agt->domain); | |
463 | if (ret != LTTNG_OK) { | |
464 | ERR("Failed to enable application context %s:%s.", | |
465 | provider_name, ctx_name); | |
466 | goto end; | |
467 | } | |
468 | ||
469 | free(provider_name); | |
470 | free(ctx_name); | |
471 | provider_name = ctx_name = NULL; | |
472 | } while (bytecode_symbol_iterator_next(it) == 0); | |
473 | end: | |
474 | free(provider_name); | |
475 | free(ctx_name); | |
476 | bytecode_symbol_iterator_destroy(it); | |
477 | return ret; | |
478 | } | |
479 | ||
f20baf8e | 480 | /* |
022d91ba | 481 | * Enable a single agent event for a given UST session. |
f20baf8e DG |
482 | * |
483 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. | |
484 | */ | |
fefd409b DG |
485 | int event_agent_enable(struct ltt_ust_session *usess, |
486 | struct agent *agt, struct lttng_event *event, | |
8404118c JG |
487 | struct lttng_filter_bytecode *filter, |
488 | char *filter_expression) | |
f20baf8e DG |
489 | { |
490 | int ret, created = 0; | |
fefd409b | 491 | struct agent_event *aevent; |
f20baf8e DG |
492 | |
493 | assert(usess); | |
494 | assert(event); | |
fefd409b | 495 | assert(agt); |
f20baf8e | 496 | |
022d91ba | 497 | DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d " |
51755dc8 JG |
498 | ", loglevel %d and filter \"%s\"", event->name, |
499 | usess->id, event->loglevel_type, event->loglevel, | |
500 | filter_expression ? filter_expression : "NULL"); | |
f20baf8e | 501 | |
a9319624 | 502 | aevent = agent_find_event(event->name, event->loglevel_type, |
71a559f8 | 503 | event->loglevel, filter_expression, agt); |
fefd409b | 504 | if (!aevent) { |
a9319624 PP |
505 | aevent = agent_create_event(event->name, event->loglevel_type, |
506 | event->loglevel, filter, | |
51755dc8 | 507 | filter_expression); |
fefd409b | 508 | if (!aevent) { |
f20baf8e DG |
509 | ret = LTTNG_ERR_NOMEM; |
510 | goto error; | |
511 | } | |
b0a23296 JG |
512 | filter = NULL; |
513 | filter_expression = NULL; | |
f20baf8e | 514 | created = 1; |
6fe2a7d0 | 515 | assert(!aevent->enabled); |
f20baf8e DG |
516 | } |
517 | ||
bf7886d8 JR |
518 | if (created && aevent->filter) { |
519 | ret = add_filter_app_ctx( | |
520 | aevent->filter, aevent->filter_expression, agt); | |
71a559f8 JG |
521 | if (ret != LTTNG_OK) { |
522 | goto error; | |
523 | } | |
524 | } | |
525 | ||
88e3c2f5 JG |
526 | /* Already enabled? */ |
527 | if (aevent->enabled) { | |
528 | ret = LTTNG_OK; | |
529 | goto end; | |
530 | } | |
531 | ||
fefd409b | 532 | ret = agent_enable_event(aevent, agt->domain); |
f20baf8e DG |
533 | if (ret != LTTNG_OK) { |
534 | goto error; | |
535 | } | |
536 | ||
537 | /* If the event was created prior to the enable, add it to the domain. */ | |
538 | if (created) { | |
fefd409b | 539 | agent_add_event(aevent, agt); |
f20baf8e DG |
540 | } |
541 | ||
b0a23296 JG |
542 | ret = LTTNG_OK; |
543 | goto end; | |
f20baf8e DG |
544 | |
545 | error: | |
546 | if (created) { | |
fefd409b | 547 | agent_destroy_event(aevent); |
f20baf8e | 548 | } |
b0a23296 JG |
549 | end: |
550 | free(filter); | |
551 | free(filter_expression); | |
f20baf8e DG |
552 | return ret; |
553 | } | |
554 | ||
da6c3a50 | 555 | /* |
d1ec8e20 JG |
556 | * Return the default event name associated with the provided UST domain. Return |
557 | * NULL on error. | |
da6c3a50 DG |
558 | */ |
559 | const char *event_get_default_agent_ust_name(enum lttng_domain_type domain) | |
560 | { | |
561 | const char *default_event_name = NULL; | |
562 | ||
0e115563 DG |
563 | switch (domain) { |
564 | case LTTNG_DOMAIN_LOG4J: | |
d1ec8e20 | 565 | default_event_name = DEFAULT_LOG4J_EVENT_NAME; |
0e115563 DG |
566 | break; |
567 | case LTTNG_DOMAIN_JUL: | |
d1ec8e20 | 568 | default_event_name = DEFAULT_JUL_EVENT_NAME; |
0e115563 DG |
569 | break; |
570 | case LTTNG_DOMAIN_PYTHON: | |
e7c82272 | 571 | default_event_name = DEFAULT_PYTHON_EVENT_NAME; |
0e115563 DG |
572 | break; |
573 | default: | |
da6c3a50 DG |
574 | assert(0); |
575 | } | |
576 | ||
577 | return default_event_name; | |
578 | } | |
579 | ||
f20baf8e | 580 | /* |
e261a6cc | 581 | * Disable a given agent event for a given UST session. |
f20baf8e | 582 | * |
e261a6cc | 583 | * Must be called with the RCU read lock held. |
f20baf8e DG |
584 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. |
585 | */ | |
e261a6cc PP |
586 | static int event_agent_disable_one(struct ltt_ust_session *usess, |
587 | struct agent *agt, struct agent_event *aevent) | |
f20baf8e DG |
588 | { |
589 | int ret; | |
be6a6276 DG |
590 | struct ltt_ust_event *uevent = NULL; |
591 | struct ltt_ust_channel *uchan = NULL; | |
71aecbf8 | 592 | const char *ust_event_name, *ust_channel_name; |
f20baf8e | 593 | |
fefd409b | 594 | assert(agt); |
f20baf8e | 595 | assert(usess); |
e261a6cc | 596 | assert(aevent); |
f20baf8e | 597 | |
e261a6cc PP |
598 | DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for session %" PRIu64, |
599 | aevent->name, aevent->loglevel_type, aevent->loglevel_value, | |
600 | usess->id); | |
f20baf8e DG |
601 | |
602 | /* Already disabled? */ | |
fefd409b | 603 | if (!aevent->enabled) { |
f20baf8e DG |
604 | goto end; |
605 | } | |
606 | ||
71aecbf8 DG |
607 | if (agt->domain == LTTNG_DOMAIN_JUL) { |
608 | ust_channel_name = DEFAULT_JUL_CHANNEL_NAME; | |
609 | } else if (agt->domain == LTTNG_DOMAIN_LOG4J) { | |
610 | ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME; | |
0e115563 DG |
611 | } else if (agt->domain == LTTNG_DOMAIN_PYTHON) { |
612 | ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME; | |
71aecbf8 DG |
613 | } else { |
614 | ret = LTTNG_ERR_INVALID; | |
615 | goto error; | |
616 | } | |
617 | ||
be6a6276 DG |
618 | /* |
619 | * Disable it on the UST side. First get the channel reference then find | |
620 | * the event and finally disable it. | |
621 | */ | |
622 | uchan = trace_ust_find_channel_by_name(usess->domain_global.channels, | |
71aecbf8 | 623 | (char *) ust_channel_name); |
be6a6276 DG |
624 | if (!uchan) { |
625 | ret = LTTNG_ERR_UST_CHAN_NOT_FOUND; | |
626 | goto error; | |
627 | } | |
628 | ||
da6c3a50 DG |
629 | ust_event_name = event_get_default_agent_ust_name(agt->domain); |
630 | if (!ust_event_name) { | |
631 | ret = LTTNG_ERR_FATAL; | |
632 | goto error; | |
be6a6276 DG |
633 | } |
634 | ||
635 | /* | |
b953b8cd PP |
636 | * Agent UST event has its loglevel type forced to |
637 | * LTTNG_UST_LOGLEVEL_ALL. The actual loglevel type/value filtering | |
638 | * happens thanks to an UST filter. The following -1 is actually | |
639 | * ignored since the type is LTTNG_UST_LOGLEVEL_ALL. | |
be6a6276 | 640 | */ |
da6c3a50 | 641 | uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name, |
b953b8cd | 642 | aevent->filter, LTTNG_UST_LOGLEVEL_ALL, -1, NULL); |
022d91ba | 643 | /* If the agent event exists, it must be available on the UST side. */ |
be6a6276 DG |
644 | assert(uevent); |
645 | ||
88e3c2f5 JG |
646 | if (usess->active) { |
647 | ret = ust_app_disable_event_glb(usess, uchan, uevent); | |
648 | if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) { | |
649 | ret = LTTNG_ERR_UST_DISABLE_FAIL; | |
650 | goto error; | |
651 | } | |
be6a6276 DG |
652 | } |
653 | ||
0dcfcf94 DG |
654 | /* |
655 | * Flag event that it's disabled so the shadow copy on the ust app side | |
656 | * will disable it if an application shows up. | |
657 | */ | |
658 | uevent->enabled = 0; | |
659 | ||
fefd409b | 660 | ret = agent_disable_event(aevent, agt->domain); |
f20baf8e DG |
661 | if (ret != LTTNG_OK) { |
662 | goto error; | |
663 | } | |
664 | ||
665 | end: | |
666 | return LTTNG_OK; | |
667 | ||
668 | error: | |
669 | return ret; | |
670 | } | |
e261a6cc PP |
671 | |
672 | /* | |
673 | * Disable all agent events matching a given name for a given UST session. | |
674 | * | |
675 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. | |
676 | */ | |
677 | int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt, | |
df4f5a87 | 678 | const char *event_name) |
e261a6cc PP |
679 | { |
680 | int ret = LTTNG_OK; | |
681 | struct agent_event *aevent; | |
682 | struct lttng_ht_iter iter; | |
683 | struct lttng_ht_node_str *node; | |
684 | ||
685 | assert(agt); | |
686 | assert(usess); | |
687 | assert(event_name); | |
688 | ||
689 | DBG("Event agent disabling %s (all loglevels) for session %" PRIu64, event_name, usess->id); | |
690 | ||
691 | rcu_read_lock(); | |
692 | agent_find_events_by_name(event_name, agt, &iter); | |
693 | node = lttng_ht_iter_get_node_str(&iter); | |
694 | ||
695 | if (node == NULL) { | |
696 | DBG2("Event agent NOT found by name %s", event_name); | |
697 | ret = LTTNG_ERR_UST_EVENT_NOT_FOUND; | |
698 | goto end; | |
699 | } | |
700 | ||
701 | do { | |
702 | aevent = caa_container_of(node, struct agent_event, node); | |
703 | ret = event_agent_disable_one(usess, agt, aevent); | |
704 | ||
705 | if (ret != LTTNG_OK) { | |
706 | goto end; | |
707 | } | |
708 | ||
709 | /* Get next duplicate agent event by name. */ | |
710 | agent_event_next_duplicate(event_name, agt, &iter); | |
711 | node = lttng_ht_iter_get_node_str(&iter); | |
712 | } while (node); | |
713 | end: | |
714 | rcu_read_unlock(); | |
715 | return ret; | |
716 | } | |
f20baf8e | 717 | /* |
022d91ba | 718 | * Disable all agent event for a given UST session. |
f20baf8e DG |
719 | * |
720 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. | |
721 | */ | |
fefd409b DG |
722 | int event_agent_disable_all(struct ltt_ust_session *usess, |
723 | struct agent *agt) | |
f20baf8e | 724 | { |
0dcfcf94 | 725 | int ret; |
fefd409b | 726 | struct agent_event *aevent; |
f20baf8e DG |
727 | struct lttng_ht_iter iter; |
728 | ||
fefd409b | 729 | assert(agt); |
f20baf8e DG |
730 | assert(usess); |
731 | ||
0dcfcf94 DG |
732 | /* |
733 | * Disable event on agent application. Continue to disable all other events | |
734 | * if the * event is not found. | |
735 | */ | |
fefd409b | 736 | ret = event_agent_disable(usess, agt, "*"); |
0dcfcf94 DG |
737 | if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) { |
738 | goto error; | |
f20baf8e DG |
739 | } |
740 | ||
b9866e08 | 741 | /* Disable every event. */ |
f20baf8e | 742 | rcu_read_lock(); |
fefd409b | 743 | cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent, |
f20baf8e | 744 | node.node) { |
0dcfcf94 DG |
745 | if (!aevent->enabled) { |
746 | continue; | |
747 | } | |
748 | ||
749 | ret = event_agent_disable(usess, agt, aevent->name); | |
750 | if (ret != LTTNG_OK) { | |
b9866e08 | 751 | goto error_unlock; |
f20baf8e | 752 | } |
f20baf8e | 753 | } |
f20baf8e DG |
754 | ret = LTTNG_OK; |
755 | ||
b9866e08 JG |
756 | error_unlock: |
757 | rcu_read_unlock(); | |
f20baf8e DG |
758 | error: |
759 | return ret; | |
760 | } |