Commit | Line | Data |
---|---|---|
54d01ffb DG |
1 | /* |
2 | * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca> | |
71a559f8 | 3 | * Copyright (C) 2016 - Jérémie Galarneau <jeremie.galarneau@efficios.com> |
54d01ffb | 4 | * |
d14d33bf AM |
5 | * This program is free software; you can redistribute it and/or modify |
6 | * it under the terms of the GNU General Public License, version 2 only, | |
7 | * as published by the Free Software Foundation. | |
54d01ffb | 8 | * |
d14d33bf AM |
9 | * This program is distributed in the hope that it will be useful, |
10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | * GNU General Public License for more details. | |
54d01ffb | 13 | * |
d14d33bf AM |
14 | * You should have received a copy of the GNU General Public License along |
15 | * with this program; if not, write to the Free Software Foundation, Inc., | |
16 | * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. | |
54d01ffb DG |
17 | */ |
18 | ||
6c1c0768 | 19 | #define _LGPL_SOURCE |
d87bfb32 | 20 | #include <errno.h> |
54d01ffb | 21 | #include <urcu/list.h> |
2bdd86d4 | 22 | #include <string.h> |
54d01ffb DG |
23 | |
24 | #include <lttng/lttng.h> | |
db758600 | 25 | #include <common/error.h> |
10a8a223 | 26 | #include <common/sessiond-comm/sessiond-comm.h> |
71a559f8 JG |
27 | #include <common/filter.h> |
28 | #include <common/context.h> | |
54d01ffb DG |
29 | |
30 | #include "channel.h" | |
31 | #include "event.h" | |
4771f025 | 32 | #include "kernel.h" |
be6a6276 | 33 | #include "lttng-sessiond.h" |
c57c2c74 JG |
34 | #include "lttng-ust-ctl.h" |
35 | #include "lttng-ust-error.h" | |
edb67388 DG |
36 | #include "ust-app.h" |
37 | #include "trace-kernel.h" | |
38 | #include "trace-ust.h" | |
7c1d2758 | 39 | #include "agent.h" |
54d01ffb | 40 | |
025faf73 DG |
41 | /* |
42 | * Add unique UST event based on the event name, filter bytecode and loglevel. | |
43 | */ | |
18eace3b DG |
44 | static void add_unique_ust_event(struct lttng_ht *ht, |
45 | struct ltt_ust_event *event) | |
46 | { | |
47 | struct cds_lfht_node *node_ptr; | |
48 | struct ltt_ust_ht_key key; | |
49 | ||
50 | assert(ht); | |
51 | assert(ht->ht); | |
52 | assert(event); | |
53 | ||
54 | key.name = event->attr.name; | |
55 | key.filter = (struct lttng_filter_bytecode *) event->filter; | |
b953b8cd PP |
56 | key.loglevel_type = event->attr.loglevel_type; |
57 | key.loglevel_value = event->attr.loglevel; | |
4031e53e | 58 | key.exclusion = event->exclusion; |
18eace3b DG |
59 | |
60 | node_ptr = cds_lfht_add_unique(ht->ht, | |
61 | ht->hash_fct(event->node.key, lttng_ht_seed), | |
62 | trace_ust_ht_match_event, &key, &event->node.node); | |
63 | assert(node_ptr == &event->node.node); | |
64 | } | |
65 | ||
54d01ffb | 66 | /* |
9550ee81 JR |
67 | * Disable kernel tracepoint events for a channel from the kernel session of |
68 | * a specified event_name and event type. | |
69 | * On type LTTNG_EVENT_ALL all events with event_name are disabled. | |
70 | * If event_name is NULL all events of the specified type are disabled. | |
54d01ffb | 71 | */ |
d0ae4ea8 | 72 | int event_kernel_disable_event(struct ltt_kernel_channel *kchan, |
9550ee81 | 73 | char *event_name, enum lttng_event_type type) |
54d01ffb | 74 | { |
9550ee81 | 75 | int ret, error = 0, found = 0; |
54d01ffb DG |
76 | struct ltt_kernel_event *kevent; |
77 | ||
0525e9ae DG |
78 | assert(kchan); |
79 | ||
54d01ffb DG |
80 | /* For each event in the kernel session */ |
81 | cds_list_for_each_entry(kevent, &kchan->events_list.head, list) { | |
d0ae4ea8 MD |
82 | if (type != LTTNG_EVENT_ALL && kevent->type != type) |
83 | continue; | |
9550ee81 JR |
84 | if (event_name != NULL && strcmp(event_name, kevent->event->name)) { |
85 | continue; | |
86 | } | |
87 | found++; | |
54d01ffb DG |
88 | ret = kernel_disable_event(kevent); |
89 | if (ret < 0) { | |
9550ee81 | 90 | error = 1; |
54d01ffb DG |
91 | continue; |
92 | } | |
93 | } | |
9550ee81 JR |
94 | DBG("Disable kernel event: found %d events with name: %s and type: %d", |
95 | found, event_name ? event_name : "NULL", type); | |
7a3d1328 | 96 | |
9550ee81 JR |
97 | if (event_name != NULL && !found) { |
98 | ret = LTTNG_ERR_NO_EVENT; | |
99 | } else { | |
100 | ret = error ? LTTNG_ERR_KERN_DISABLE_FAIL : LTTNG_OK; | |
101 | } | |
102 | ||
103 | return ret; | |
54d01ffb DG |
104 | } |
105 | ||
106 | /* | |
7a3d1328 | 107 | * Enable kernel tracepoint event for a channel from the kernel session. |
49d21f93 | 108 | * We own filter_expression and filter. |
54d01ffb | 109 | */ |
d0ae4ea8 | 110 | int event_kernel_enable_event(struct ltt_kernel_channel *kchan, |
00a62084 MD |
111 | struct lttng_event *event, char *filter_expression, |
112 | struct lttng_filter_bytecode *filter) | |
54d01ffb DG |
113 | { |
114 | int ret; | |
115 | struct ltt_kernel_event *kevent; | |
116 | ||
0525e9ae DG |
117 | assert(kchan); |
118 | assert(event); | |
119 | ||
00a62084 MD |
120 | kevent = trace_kernel_find_event(event->name, kchan, |
121 | event->type, filter); | |
54d01ffb | 122 | if (kevent == NULL) { |
00a62084 MD |
123 | ret = kernel_create_event(event, kchan, |
124 | filter_expression, filter); | |
a969e101 MD |
125 | /* We have passed ownership */ |
126 | filter_expression = NULL; | |
127 | filter = NULL; | |
54d01ffb | 128 | if (ret < 0) { |
bd29c13d DG |
129 | switch (-ret) { |
130 | case EEXIST: | |
f73fabfd | 131 | ret = LTTNG_ERR_KERN_EVENT_EXIST; |
bd29c13d DG |
132 | break; |
133 | case ENOSYS: | |
f73fabfd | 134 | ret = LTTNG_ERR_KERN_EVENT_ENOSYS; |
bd29c13d DG |
135 | break; |
136 | default: | |
f73fabfd | 137 | ret = LTTNG_ERR_KERN_ENABLE_FAIL; |
bd29c13d | 138 | break; |
d87bfb32 | 139 | } |
7a3d1328 | 140 | goto end; |
54d01ffb DG |
141 | } |
142 | } else if (kevent->enabled == 0) { | |
143 | ret = kernel_enable_event(kevent); | |
144 | if (ret < 0) { | |
f73fabfd | 145 | ret = LTTNG_ERR_KERN_ENABLE_FAIL; |
7a3d1328 | 146 | goto end; |
54d01ffb | 147 | } |
42224349 DG |
148 | } else { |
149 | /* At this point, the event is considered enabled */ | |
f73fabfd | 150 | ret = LTTNG_ERR_KERN_EVENT_EXIST; |
42224349 | 151 | goto end; |
54d01ffb | 152 | } |
42224349 | 153 | |
f73fabfd | 154 | ret = LTTNG_OK; |
7a3d1328 | 155 | end: |
a969e101 MD |
156 | free(filter_expression); |
157 | free(filter); | |
54d01ffb DG |
158 | return ret; |
159 | } | |
160 | ||
7f79d3a1 DG |
161 | /* |
162 | * ============================ | |
163 | * UST : The Ultimate Frontier! | |
164 | * ============================ | |
165 | */ | |
166 | ||
2bdd86d4 MD |
167 | /* |
168 | * Enable UST tracepoint event for a channel from a UST session. | |
49d21f93 | 169 | * We own filter_expression, filter, and exclusion. |
2bdd86d4 | 170 | */ |
7972aab2 | 171 | int event_ust_enable_tracepoint(struct ltt_ust_session *usess, |
025faf73 | 172 | struct ltt_ust_channel *uchan, struct lttng_event *event, |
6b453b5e | 173 | char *filter_expression, |
f1613f52 | 174 | struct lttng_filter_bytecode *filter, |
88f06f15 JG |
175 | struct lttng_event_exclusion *exclusion, |
176 | bool internal_event) | |
2bdd86d4 | 177 | { |
f73fabfd | 178 | int ret = LTTNG_OK, to_create = 0; |
edb67388 DG |
179 | struct ltt_ust_event *uevent; |
180 | ||
0525e9ae DG |
181 | assert(usess); |
182 | assert(uchan); | |
183 | assert(event); | |
184 | ||
18eace3b DG |
185 | rcu_read_lock(); |
186 | ||
025faf73 | 187 | uevent = trace_ust_find_event(uchan->events, event->name, filter, |
b953b8cd | 188 | event->loglevel_type, event->loglevel, exclusion); |
87c6e328 | 189 | if (!uevent) { |
6b453b5e | 190 | uevent = trace_ust_create_event(event, filter_expression, |
87c6e328 | 191 | filter, exclusion, internal_event); |
49d21f93 MD |
192 | /* We have passed ownership */ |
193 | filter_expression = NULL; | |
194 | filter = NULL; | |
195 | exclusion = NULL; | |
edb67388 | 196 | if (uevent == NULL) { |
95a82664 | 197 | ret = LTTNG_ERR_UST_ENABLE_FAIL; |
edb67388 DG |
198 | goto error; |
199 | } | |
025faf73 | 200 | |
fc34caaa | 201 | /* Valid to set it after the goto error since uevent is still NULL */ |
edb67388 DG |
202 | to_create = 1; |
203 | } | |
2bdd86d4 | 204 | |
7f79d3a1 DG |
205 | if (uevent->enabled) { |
206 | /* It's already enabled so everything is OK */ | |
5bcdda4f | 207 | ret = LTTNG_ERR_UST_EVENT_ENABLED; |
7f79d3a1 DG |
208 | goto end; |
209 | } | |
210 | ||
fc34caaa DG |
211 | uevent->enabled = 1; |
212 | ||
7972aab2 DG |
213 | if (to_create) { |
214 | /* Create event on all UST registered apps for session */ | |
215 | ret = ust_app_create_event_glb(usess, uchan, uevent); | |
216 | } else { | |
217 | /* Enable event on all UST registered apps for session */ | |
218 | ret = ust_app_enable_event_glb(usess, uchan, uevent); | |
219 | } | |
48842b30 | 220 | |
7972aab2 DG |
221 | if (ret < 0) { |
222 | if (ret == -LTTNG_UST_ERR_EXIST) { | |
223 | ret = LTTNG_ERR_UST_EVENT_EXIST; | |
224 | goto end; | |
225 | } else { | |
226 | ret = LTTNG_ERR_UST_ENABLE_FAIL; | |
227 | goto error; | |
edb67388 | 228 | } |
2bdd86d4 | 229 | } |
48842b30 | 230 | |
7f79d3a1 | 231 | if (to_create) { |
fc34caaa | 232 | /* Add ltt ust event to channel */ |
18eace3b | 233 | add_unique_ust_event(uchan->events, uevent); |
7f79d3a1 | 234 | } |
edb67388 | 235 | |
7f79d3a1 DG |
236 | DBG("Event UST %s %s in channel %s", uevent->attr.name, |
237 | to_create ? "created" : "enabled", uchan->name); | |
238 | ||
f73fabfd | 239 | ret = LTTNG_OK; |
fc34caaa | 240 | |
fb89d070 | 241 | end: |
18eace3b | 242 | rcu_read_unlock(); |
49d21f93 MD |
243 | free(filter_expression); |
244 | free(filter); | |
245 | free(exclusion); | |
fc34caaa | 246 | return ret; |
edb67388 DG |
247 | |
248 | error: | |
fc34caaa DG |
249 | /* |
250 | * Only destroy event on creation time (not enabling time) because if the | |
251 | * event is found in the channel (to_create == 0), it means that at some | |
252 | * point the enable_event worked and it's thus valid to keep it alive. | |
253 | * Destroying it also implies that we also destroy it's shadow copy to sync | |
254 | * everyone up. | |
255 | */ | |
256 | if (to_create) { | |
257 | /* In this code path, the uevent was not added to the hash table */ | |
258 | trace_ust_destroy_event(uevent); | |
259 | } | |
18eace3b | 260 | rcu_read_unlock(); |
49d21f93 MD |
261 | free(filter_expression); |
262 | free(filter); | |
263 | free(exclusion); | |
2bdd86d4 MD |
264 | return ret; |
265 | } | |
266 | ||
7f79d3a1 DG |
267 | /* |
268 | * Disable UST tracepoint of a channel from a UST session. | |
269 | */ | |
7972aab2 | 270 | int event_ust_disable_tracepoint(struct ltt_ust_session *usess, |
7f79d3a1 | 271 | struct ltt_ust_channel *uchan, char *event_name) |
2bdd86d4 MD |
272 | { |
273 | int ret; | |
7f79d3a1 | 274 | struct ltt_ust_event *uevent; |
18eace3b DG |
275 | struct lttng_ht_node_str *node; |
276 | struct lttng_ht_iter iter; | |
18eace3b | 277 | struct lttng_ht *ht; |
2bdd86d4 | 278 | |
0525e9ae DG |
279 | assert(usess); |
280 | assert(uchan); | |
281 | assert(event_name); | |
282 | ||
18eace3b DG |
283 | ht = uchan->events; |
284 | ||
18eace3b | 285 | rcu_read_lock(); |
025faf73 DG |
286 | |
287 | /* | |
288 | * We use a custom lookup since we need the iterator for the next_duplicate | |
289 | * call in the do while loop below. | |
290 | */ | |
291 | cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed), | |
292 | trace_ust_ht_match_event_by_name, event_name, &iter.iter); | |
18eace3b DG |
293 | node = lttng_ht_iter_get_node_str(&iter); |
294 | if (node == NULL) { | |
295 | DBG2("Trace UST event NOT found by name %s", event_name); | |
f73fabfd | 296 | ret = LTTNG_ERR_UST_EVENT_NOT_FOUND; |
7f79d3a1 | 297 | goto error; |
2bdd86d4 | 298 | } |
7f79d3a1 | 299 | |
18eace3b DG |
300 | do { |
301 | uevent = caa_container_of(node, struct ltt_ust_event, node); | |
025faf73 DG |
302 | assert(uevent); |
303 | ||
18eace3b DG |
304 | if (uevent->enabled == 0) { |
305 | /* It's already disabled so everything is OK */ | |
a1dcaf0f | 306 | goto next; |
7f79d3a1 | 307 | } |
18eace3b | 308 | |
7972aab2 DG |
309 | ret = ust_app_disable_event_glb(usess, uchan, uevent); |
310 | if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) { | |
311 | ret = LTTNG_ERR_UST_DISABLE_FAIL; | |
18eace3b DG |
312 | goto error; |
313 | } | |
18eace3b DG |
314 | uevent->enabled = 0; |
315 | ||
025faf73 DG |
316 | DBG2("Event UST %s disabled in channel %s", uevent->attr.name, |
317 | uchan->name); | |
318 | ||
a1dcaf0f | 319 | next: |
18eace3b DG |
320 | /* Get next duplicate event by name. */ |
321 | cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name, | |
322 | event_name, &iter.iter); | |
323 | node = lttng_ht_iter_get_node_str(&iter); | |
324 | } while (node); | |
7f79d3a1 | 325 | |
f73fabfd | 326 | ret = LTTNG_OK; |
7f79d3a1 | 327 | |
7f79d3a1 | 328 | error: |
18eace3b | 329 | rcu_read_unlock(); |
7f79d3a1 DG |
330 | return ret; |
331 | } | |
332 | ||
b1e7fe2d JR |
333 | /* |
334 | * Disable all UST tracepoints for a channel from a UST session. | |
335 | */ | |
336 | int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess, | |
337 | struct ltt_ust_channel *uchan) | |
338 | { | |
3e81c0f2 | 339 | int ret, i, size, error = 0; |
b1e7fe2d JR |
340 | struct lttng_ht_iter iter; |
341 | struct ltt_ust_event *uevent = NULL; | |
342 | struct lttng_event *events = NULL; | |
343 | ||
344 | assert(usess); | |
345 | assert(uchan); | |
346 | ||
347 | rcu_read_lock(); | |
348 | ||
349 | /* Disabling existing events */ | |
350 | cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent, | |
351 | node.node) { | |
352 | if (uevent->enabled == 1) { | |
353 | ret = event_ust_disable_tracepoint(usess, uchan, | |
354 | uevent->attr.name); | |
355 | if (ret < 0) { | |
3e81c0f2 | 356 | error = LTTNG_ERR_UST_DISABLE_FAIL; |
b1e7fe2d JR |
357 | continue; |
358 | } | |
359 | } | |
360 | } | |
361 | ||
362 | /* Get all UST available events */ | |
363 | size = ust_app_list_events(&events); | |
364 | if (size < 0) { | |
365 | ret = LTTNG_ERR_UST_LIST_FAIL; | |
366 | goto error; | |
367 | } | |
368 | ||
369 | for (i = 0; i < size; i++) { | |
370 | ret = event_ust_disable_tracepoint(usess, uchan, | |
371 | events[i].name); | |
3e81c0f2 | 372 | if (ret < 0) { |
b1e7fe2d | 373 | /* Continue to disable the rest... */ |
3e81c0f2 | 374 | error = LTTNG_ERR_UST_DISABLE_FAIL; |
b1e7fe2d JR |
375 | continue; |
376 | } | |
377 | } | |
378 | ||
3e81c0f2 | 379 | ret = error ? error : LTTNG_OK; |
b1e7fe2d JR |
380 | error: |
381 | rcu_read_unlock(); | |
382 | free(events); | |
383 | return ret; | |
384 | } | |
385 | ||
f20baf8e | 386 | /* |
022d91ba | 387 | * Enable all agent event for a given UST session. |
f20baf8e DG |
388 | * |
389 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. | |
390 | */ | |
022d91ba | 391 | int event_agent_enable_all(struct ltt_ust_session *usess, |
fefd409b | 392 | struct agent *agt, struct lttng_event *event, |
51755dc8 | 393 | struct lttng_filter_bytecode *filter ,char *filter_expression) |
f20baf8e DG |
394 | { |
395 | int ret; | |
fefd409b | 396 | struct agent_event *aevent; |
f20baf8e DG |
397 | struct lttng_ht_iter iter; |
398 | ||
399 | assert(usess); | |
400 | ||
022d91ba | 401 | DBG("Event agent enabling ALL events for session %" PRIu64, usess->id); |
f20baf8e | 402 | |
022d91ba | 403 | /* Enable event on agent application through TCP socket. */ |
8404118c | 404 | ret = event_agent_enable(usess, agt, event, filter, filter_expression); |
f20baf8e DG |
405 | if (ret != LTTNG_OK) { |
406 | goto error; | |
407 | } | |
408 | ||
409 | /* Flag every event that they are now enabled. */ | |
410 | rcu_read_lock(); | |
fefd409b | 411 | cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent, |
f20baf8e | 412 | node.node) { |
fefd409b | 413 | aevent->enabled = 1; |
f20baf8e DG |
414 | } |
415 | rcu_read_unlock(); | |
416 | ||
417 | ret = LTTNG_OK; | |
418 | ||
419 | error: | |
420 | return ret; | |
421 | } | |
422 | ||
71a559f8 JG |
423 | /* |
424 | * Check if this event's filter requires the activation of application contexts | |
425 | * and enable them in the agent. | |
426 | */ | |
427 | static int add_filter_app_ctx(struct lttng_filter_bytecode *bytecode, | |
428 | const char *filter_expression, struct agent *agt) | |
429 | { | |
430 | int ret = LTTNG_OK; | |
431 | char *provider_name = NULL, *ctx_name = NULL; | |
432 | struct bytecode_symbol_iterator *it = | |
433 | bytecode_symbol_iterator_create(bytecode); | |
434 | ||
435 | if (!it) { | |
436 | ret = LTTNG_ERR_NOMEM; | |
437 | goto end; | |
438 | } | |
439 | ||
440 | do { | |
441 | struct lttng_event_context ctx; | |
442 | const char *symbol_name = | |
443 | bytecode_symbol_iterator_get_name(it); | |
444 | ||
445 | if (parse_application_context(symbol_name, &provider_name, | |
446 | &ctx_name)) { | |
447 | /* Not an application context. */ | |
448 | continue; | |
449 | } | |
450 | ||
451 | ctx.ctx = LTTNG_EVENT_CONTEXT_APP_CONTEXT; | |
452 | ctx.u.app_ctx.provider_name = provider_name; | |
453 | ctx.u.app_ctx.ctx_name = ctx_name; | |
454 | ||
455 | /* Recognized an application context. */ | |
456 | DBG("Enabling event with filter expression \"%s\" requires enabling the %s:%s application context.", | |
457 | filter_expression, provider_name, ctx_name); | |
458 | ||
459 | ret = agent_add_context(&ctx, agt); | |
460 | if (ret != LTTNG_OK) { | |
461 | ERR("Failed to add application context %s:%s.", | |
462 | provider_name, ctx_name); | |
463 | goto end; | |
464 | } | |
465 | ||
466 | ret = agent_enable_context(&ctx, agt->domain); | |
467 | if (ret != LTTNG_OK) { | |
468 | ERR("Failed to enable application context %s:%s.", | |
469 | provider_name, ctx_name); | |
470 | goto end; | |
471 | } | |
472 | ||
473 | free(provider_name); | |
474 | free(ctx_name); | |
475 | provider_name = ctx_name = NULL; | |
476 | } while (bytecode_symbol_iterator_next(it) == 0); | |
477 | end: | |
478 | free(provider_name); | |
479 | free(ctx_name); | |
480 | bytecode_symbol_iterator_destroy(it); | |
481 | return ret; | |
482 | } | |
483 | ||
f20baf8e | 484 | /* |
022d91ba | 485 | * Enable a single agent event for a given UST session. |
f20baf8e DG |
486 | * |
487 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. | |
488 | */ | |
fefd409b DG |
489 | int event_agent_enable(struct ltt_ust_session *usess, |
490 | struct agent *agt, struct lttng_event *event, | |
8404118c JG |
491 | struct lttng_filter_bytecode *filter, |
492 | char *filter_expression) | |
f20baf8e DG |
493 | { |
494 | int ret, created = 0; | |
fefd409b | 495 | struct agent_event *aevent; |
f20baf8e DG |
496 | |
497 | assert(usess); | |
498 | assert(event); | |
fefd409b | 499 | assert(agt); |
f20baf8e | 500 | |
022d91ba | 501 | DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d " |
51755dc8 JG |
502 | ", loglevel %d and filter \"%s\"", event->name, |
503 | usess->id, event->loglevel_type, event->loglevel, | |
504 | filter_expression ? filter_expression : "NULL"); | |
f20baf8e | 505 | |
a9319624 | 506 | aevent = agent_find_event(event->name, event->loglevel_type, |
71a559f8 | 507 | event->loglevel, filter_expression, agt); |
fefd409b | 508 | if (!aevent) { |
a9319624 PP |
509 | aevent = agent_create_event(event->name, event->loglevel_type, |
510 | event->loglevel, filter, | |
51755dc8 | 511 | filter_expression); |
fefd409b | 512 | if (!aevent) { |
f20baf8e DG |
513 | ret = LTTNG_ERR_NOMEM; |
514 | goto error; | |
515 | } | |
5e28af38 JG |
516 | filter = NULL; |
517 | filter_expression = NULL; | |
f20baf8e DG |
518 | created = 1; |
519 | } | |
520 | ||
521 | /* Already enabled? */ | |
fefd409b | 522 | if (aevent->enabled) { |
5e28af38 | 523 | ret = LTTNG_OK; |
f20baf8e DG |
524 | goto end; |
525 | } | |
526 | ||
b7085e53 JR |
527 | if (created && aevent->filter) { |
528 | ret = add_filter_app_ctx( | |
529 | aevent->filter, aevent->filter_expression, agt); | |
71a559f8 JG |
530 | if (ret != LTTNG_OK) { |
531 | goto error; | |
532 | } | |
533 | } | |
534 | ||
fefd409b | 535 | ret = agent_enable_event(aevent, agt->domain); |
f20baf8e DG |
536 | if (ret != LTTNG_OK) { |
537 | goto error; | |
538 | } | |
539 | ||
540 | /* If the event was created prior to the enable, add it to the domain. */ | |
541 | if (created) { | |
fefd409b | 542 | agent_add_event(aevent, agt); |
f20baf8e DG |
543 | } |
544 | ||
5e28af38 JG |
545 | ret = LTTNG_OK; |
546 | goto end; | |
f20baf8e DG |
547 | |
548 | error: | |
549 | if (created) { | |
fefd409b | 550 | agent_destroy_event(aevent); |
f20baf8e | 551 | } |
5e28af38 JG |
552 | end: |
553 | free(filter); | |
554 | free(filter_expression); | |
f20baf8e DG |
555 | return ret; |
556 | } | |
557 | ||
da6c3a50 | 558 | /* |
d1ec8e20 JG |
559 | * Return the default event name associated with the provided UST domain. Return |
560 | * NULL on error. | |
da6c3a50 DG |
561 | */ |
562 | const char *event_get_default_agent_ust_name(enum lttng_domain_type domain) | |
563 | { | |
564 | const char *default_event_name = NULL; | |
565 | ||
0e115563 DG |
566 | switch (domain) { |
567 | case LTTNG_DOMAIN_LOG4J: | |
d1ec8e20 | 568 | default_event_name = DEFAULT_LOG4J_EVENT_NAME; |
0e115563 DG |
569 | break; |
570 | case LTTNG_DOMAIN_JUL: | |
d1ec8e20 | 571 | default_event_name = DEFAULT_JUL_EVENT_NAME; |
0e115563 DG |
572 | break; |
573 | case LTTNG_DOMAIN_PYTHON: | |
e7c82272 | 574 | default_event_name = DEFAULT_PYTHON_EVENT_NAME; |
0e115563 DG |
575 | break; |
576 | default: | |
da6c3a50 DG |
577 | assert(0); |
578 | } | |
579 | ||
580 | return default_event_name; | |
581 | } | |
582 | ||
f20baf8e | 583 | /* |
e261a6cc | 584 | * Disable a given agent event for a given UST session. |
f20baf8e | 585 | * |
e261a6cc | 586 | * Must be called with the RCU read lock held. |
f20baf8e DG |
587 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. |
588 | */ | |
e261a6cc PP |
589 | static int event_agent_disable_one(struct ltt_ust_session *usess, |
590 | struct agent *agt, struct agent_event *aevent) | |
f20baf8e DG |
591 | { |
592 | int ret; | |
be6a6276 DG |
593 | struct ltt_ust_event *uevent = NULL; |
594 | struct ltt_ust_channel *uchan = NULL; | |
71aecbf8 | 595 | const char *ust_event_name, *ust_channel_name; |
f20baf8e | 596 | |
fefd409b | 597 | assert(agt); |
f20baf8e | 598 | assert(usess); |
e261a6cc | 599 | assert(aevent); |
f20baf8e | 600 | |
e261a6cc PP |
601 | DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for session %" PRIu64, |
602 | aevent->name, aevent->loglevel_type, aevent->loglevel_value, | |
603 | usess->id); | |
f20baf8e DG |
604 | |
605 | /* Already disabled? */ | |
fefd409b | 606 | if (!aevent->enabled) { |
f20baf8e DG |
607 | goto end; |
608 | } | |
609 | ||
71aecbf8 DG |
610 | if (agt->domain == LTTNG_DOMAIN_JUL) { |
611 | ust_channel_name = DEFAULT_JUL_CHANNEL_NAME; | |
612 | } else if (agt->domain == LTTNG_DOMAIN_LOG4J) { | |
613 | ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME; | |
0e115563 DG |
614 | } else if (agt->domain == LTTNG_DOMAIN_PYTHON) { |
615 | ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME; | |
71aecbf8 DG |
616 | } else { |
617 | ret = LTTNG_ERR_INVALID; | |
618 | goto error; | |
619 | } | |
620 | ||
be6a6276 DG |
621 | /* |
622 | * Disable it on the UST side. First get the channel reference then find | |
623 | * the event and finally disable it. | |
624 | */ | |
625 | uchan = trace_ust_find_channel_by_name(usess->domain_global.channels, | |
71aecbf8 | 626 | (char *) ust_channel_name); |
be6a6276 DG |
627 | if (!uchan) { |
628 | ret = LTTNG_ERR_UST_CHAN_NOT_FOUND; | |
629 | goto error; | |
630 | } | |
631 | ||
da6c3a50 DG |
632 | ust_event_name = event_get_default_agent_ust_name(agt->domain); |
633 | if (!ust_event_name) { | |
634 | ret = LTTNG_ERR_FATAL; | |
635 | goto error; | |
be6a6276 DG |
636 | } |
637 | ||
638 | /* | |
b953b8cd PP |
639 | * Agent UST event has its loglevel type forced to |
640 | * LTTNG_UST_LOGLEVEL_ALL. The actual loglevel type/value filtering | |
641 | * happens thanks to an UST filter. The following -1 is actually | |
642 | * ignored since the type is LTTNG_UST_LOGLEVEL_ALL. | |
be6a6276 | 643 | */ |
da6c3a50 | 644 | uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name, |
b953b8cd | 645 | aevent->filter, LTTNG_UST_LOGLEVEL_ALL, -1, NULL); |
022d91ba | 646 | /* If the agent event exists, it must be available on the UST side. */ |
be6a6276 DG |
647 | assert(uevent); |
648 | ||
649 | ret = ust_app_disable_event_glb(usess, uchan, uevent); | |
650 | if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) { | |
651 | ret = LTTNG_ERR_UST_DISABLE_FAIL; | |
652 | goto error; | |
653 | } | |
654 | ||
0dcfcf94 DG |
655 | /* |
656 | * Flag event that it's disabled so the shadow copy on the ust app side | |
657 | * will disable it if an application shows up. | |
658 | */ | |
659 | uevent->enabled = 0; | |
660 | ||
fefd409b | 661 | ret = agent_disable_event(aevent, agt->domain); |
f20baf8e DG |
662 | if (ret != LTTNG_OK) { |
663 | goto error; | |
664 | } | |
665 | ||
666 | end: | |
667 | return LTTNG_OK; | |
668 | ||
669 | error: | |
670 | return ret; | |
671 | } | |
e261a6cc PP |
672 | |
673 | /* | |
674 | * Disable all agent events matching a given name for a given UST session. | |
675 | * | |
676 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. | |
677 | */ | |
678 | int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt, | |
679 | char *event_name) | |
680 | { | |
681 | int ret = LTTNG_OK; | |
682 | struct agent_event *aevent; | |
683 | struct lttng_ht_iter iter; | |
684 | struct lttng_ht_node_str *node; | |
685 | ||
686 | assert(agt); | |
687 | assert(usess); | |
688 | assert(event_name); | |
689 | ||
690 | DBG("Event agent disabling %s (all loglevels) for session %" PRIu64, event_name, usess->id); | |
691 | ||
692 | rcu_read_lock(); | |
693 | agent_find_events_by_name(event_name, agt, &iter); | |
694 | node = lttng_ht_iter_get_node_str(&iter); | |
695 | ||
696 | if (node == NULL) { | |
697 | DBG2("Event agent NOT found by name %s", event_name); | |
698 | ret = LTTNG_ERR_UST_EVENT_NOT_FOUND; | |
699 | goto end; | |
700 | } | |
701 | ||
702 | do { | |
703 | aevent = caa_container_of(node, struct agent_event, node); | |
704 | ret = event_agent_disable_one(usess, agt, aevent); | |
705 | ||
706 | if (ret != LTTNG_OK) { | |
707 | goto end; | |
708 | } | |
709 | ||
710 | /* Get next duplicate agent event by name. */ | |
711 | agent_event_next_duplicate(event_name, agt, &iter); | |
712 | node = lttng_ht_iter_get_node_str(&iter); | |
713 | } while (node); | |
714 | end: | |
715 | rcu_read_unlock(); | |
716 | return ret; | |
717 | } | |
f20baf8e | 718 | /* |
022d91ba | 719 | * Disable all agent event for a given UST session. |
f20baf8e DG |
720 | * |
721 | * Return LTTNG_OK on success or else a LTTNG_ERR* code. | |
722 | */ | |
fefd409b DG |
723 | int event_agent_disable_all(struct ltt_ust_session *usess, |
724 | struct agent *agt) | |
f20baf8e | 725 | { |
0dcfcf94 | 726 | int ret; |
fefd409b | 727 | struct agent_event *aevent; |
f20baf8e DG |
728 | struct lttng_ht_iter iter; |
729 | ||
fefd409b | 730 | assert(agt); |
f20baf8e DG |
731 | assert(usess); |
732 | ||
0dcfcf94 DG |
733 | /* |
734 | * Disable event on agent application. Continue to disable all other events | |
735 | * if the * event is not found. | |
736 | */ | |
fefd409b | 737 | ret = event_agent_disable(usess, agt, "*"); |
0dcfcf94 DG |
738 | if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) { |
739 | goto error; | |
f20baf8e DG |
740 | } |
741 | ||
b9866e08 | 742 | /* Disable every event. */ |
f20baf8e | 743 | rcu_read_lock(); |
fefd409b | 744 | cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent, |
f20baf8e | 745 | node.node) { |
0dcfcf94 DG |
746 | if (!aevent->enabled) { |
747 | continue; | |
748 | } | |
749 | ||
750 | ret = event_agent_disable(usess, agt, aevent->name); | |
751 | if (ret != LTTNG_OK) { | |
b9866e08 | 752 | goto error_unlock; |
f20baf8e | 753 | } |
f20baf8e | 754 | } |
f20baf8e DG |
755 | ret = LTTNG_OK; |
756 | ||
b9866e08 JG |
757 | error_unlock: |
758 | rcu_read_unlock(); | |
f20baf8e DG |
759 | error: |
760 | return ret; | |
761 | } |