Fix: ust: segfault on lttng start on filter bytecode copy
[lttng-tools.git] / src / bin / lttng-sessiond / event.c
CommitLineData
54d01ffb
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
71a559f8 3 * Copyright (C) 2016 - Jérémie Galarneau <jeremie.galarneau@efficios.com>
54d01ffb 4 *
d14d33bf
AM
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2 only,
7 * as published by the Free Software Foundation.
54d01ffb 8 *
d14d33bf
AM
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
54d01ffb 13 *
d14d33bf
AM
14 * You should have received a copy of the GNU General Public License along
15 * with this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
54d01ffb
DG
17 */
18
6c1c0768 19#define _LGPL_SOURCE
d87bfb32 20#include <errno.h>
54d01ffb 21#include <urcu/list.h>
2bdd86d4 22#include <string.h>
54d01ffb
DG
23
24#include <lttng/lttng.h>
db758600 25#include <common/error.h>
10a8a223 26#include <common/sessiond-comm/sessiond-comm.h>
71a559f8
JG
27#include <common/filter.h>
28#include <common/context.h>
54d01ffb
DG
29
30#include "channel.h"
31#include "event.h"
4771f025 32#include "kernel.h"
be6a6276 33#include "lttng-sessiond.h"
b7340b1d
JG
34#include "lttng-ust-ctl.h"
35#include "lttng-ust-error.h"
edb67388
DG
36#include "ust-app.h"
37#include "trace-kernel.h"
38#include "trace-ust.h"
7c1d2758 39#include "agent.h"
54d01ffb 40
025faf73
DG
41/*
42 * Add unique UST event based on the event name, filter bytecode and loglevel.
43 */
18eace3b
DG
44static void add_unique_ust_event(struct lttng_ht *ht,
45 struct ltt_ust_event *event)
46{
47 struct cds_lfht_node *node_ptr;
48 struct ltt_ust_ht_key key;
49
50 assert(ht);
51 assert(ht->ht);
52 assert(event);
53
54 key.name = event->attr.name;
55 key.filter = (struct lttng_filter_bytecode *) event->filter;
b953b8cd
PP
56 key.loglevel_type = event->attr.loglevel_type;
57 key.loglevel_value = event->attr.loglevel;
4031e53e 58 key.exclusion = event->exclusion;
18eace3b
DG
59
60 node_ptr = cds_lfht_add_unique(ht->ht,
61 ht->hash_fct(event->node.key, lttng_ht_seed),
62 trace_ust_ht_match_event, &key, &event->node.node);
63 assert(node_ptr == &event->node.node);
64}
65
54d01ffb 66/*
9550ee81
JR
67 * Disable kernel tracepoint events for a channel from the kernel session of
68 * a specified event_name and event type.
69 * On type LTTNG_EVENT_ALL all events with event_name are disabled.
70 * If event_name is NULL all events of the specified type are disabled.
54d01ffb 71 */
d0ae4ea8 72int event_kernel_disable_event(struct ltt_kernel_channel *kchan,
6938db9c 73 const char *event_name, enum lttng_event_type type)
54d01ffb 74{
9550ee81 75 int ret, error = 0, found = 0;
54d01ffb
DG
76 struct ltt_kernel_event *kevent;
77
0525e9ae
DG
78 assert(kchan);
79
54d01ffb
DG
80 /* For each event in the kernel session */
81 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
d0ae4ea8
MD
82 if (type != LTTNG_EVENT_ALL && kevent->type != type)
83 continue;
9550ee81
JR
84 if (event_name != NULL && strcmp(event_name, kevent->event->name)) {
85 continue;
86 }
87 found++;
54d01ffb
DG
88 ret = kernel_disable_event(kevent);
89 if (ret < 0) {
9550ee81 90 error = 1;
54d01ffb
DG
91 continue;
92 }
93 }
9550ee81
JR
94 DBG("Disable kernel event: found %d events with name: %s and type: %d",
95 found, event_name ? event_name : "NULL", type);
7a3d1328 96
9550ee81
JR
97 if (event_name != NULL && !found) {
98 ret = LTTNG_ERR_NO_EVENT;
99 } else {
100 ret = error ? LTTNG_ERR_KERN_DISABLE_FAIL : LTTNG_OK;
101 }
102
103 return ret;
54d01ffb
DG
104}
105
106/*
7a3d1328 107 * Enable kernel tracepoint event for a channel from the kernel session.
49d21f93 108 * We own filter_expression and filter.
54d01ffb 109 */
d0ae4ea8 110int event_kernel_enable_event(struct ltt_kernel_channel *kchan,
00a62084
MD
111 struct lttng_event *event, char *filter_expression,
112 struct lttng_filter_bytecode *filter)
54d01ffb
DG
113{
114 int ret;
115 struct ltt_kernel_event *kevent;
116
0525e9ae
DG
117 assert(kchan);
118 assert(event);
119
00a62084
MD
120 kevent = trace_kernel_find_event(event->name, kchan,
121 event->type, filter);
54d01ffb 122 if (kevent == NULL) {
71a3bb01 123 ret = kernel_create_event(event, kchan, filter_expression, filter);
a969e101
MD
124 /* We have passed ownership */
125 filter_expression = NULL;
126 filter = NULL;
71a3bb01 127 if (ret) {
7a3d1328 128 goto end;
54d01ffb
DG
129 }
130 } else if (kevent->enabled == 0) {
131 ret = kernel_enable_event(kevent);
132 if (ret < 0) {
f73fabfd 133 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
7a3d1328 134 goto end;
54d01ffb 135 }
42224349
DG
136 } else {
137 /* At this point, the event is considered enabled */
f73fabfd 138 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349 139 goto end;
54d01ffb 140 }
42224349 141
f73fabfd 142 ret = LTTNG_OK;
7a3d1328 143end:
a969e101
MD
144 free(filter_expression);
145 free(filter);
54d01ffb
DG
146 return ret;
147}
148
7f79d3a1
DG
149/*
150 * ============================
151 * UST : The Ultimate Frontier!
152 * ============================
153 */
154
2bdd86d4
MD
155/*
156 * Enable UST tracepoint event for a channel from a UST session.
49d21f93 157 * We own filter_expression, filter, and exclusion.
2bdd86d4 158 */
7972aab2 159int event_ust_enable_tracepoint(struct ltt_ust_session *usess,
025faf73 160 struct ltt_ust_channel *uchan, struct lttng_event *event,
6b453b5e 161 char *filter_expression,
f1613f52 162 struct lttng_filter_bytecode *filter,
88f06f15
JG
163 struct lttng_event_exclusion *exclusion,
164 bool internal_event)
2bdd86d4 165{
0ce9aa93 166 int ret = LTTNG_OK, to_create = 0;
edb67388
DG
167 struct ltt_ust_event *uevent;
168
0525e9ae
DG
169 assert(usess);
170 assert(uchan);
171 assert(event);
172
18eace3b
DG
173 rcu_read_lock();
174
025faf73 175 uevent = trace_ust_find_event(uchan->events, event->name, filter,
466fafb8
JG
176 (enum lttng_ust_loglevel_type) event->loglevel_type,
177 event->loglevel, exclusion);
87c6e328 178 if (!uevent) {
39687410
FD
179 ret = trace_ust_create_event(event, filter_expression,
180 filter, exclusion, internal_event, &uevent);
49d21f93
MD
181 /* We have passed ownership */
182 filter_expression = NULL;
183 filter = NULL;
184 exclusion = NULL;
39687410 185 if (ret != LTTNG_OK) {
b77e9a3d 186 goto end;
edb67388 187 }
025faf73 188
fc34caaa 189 /* Valid to set it after the goto error since uevent is still NULL */
edb67388
DG
190 to_create = 1;
191 }
2bdd86d4 192
7f79d3a1
DG
193 if (uevent->enabled) {
194 /* It's already enabled so everything is OK */
39543064 195 assert(!to_create);
5bcdda4f 196 ret = LTTNG_ERR_UST_EVENT_ENABLED;
7f79d3a1
DG
197 goto end;
198 }
199
fc34caaa 200 uevent->enabled = 1;
0ce9aa93
JG
201 if (to_create) {
202 /* Add ltt ust event to channel */
203 add_unique_ust_event(uchan->events, uevent);
204 }
205
206 if (!usess->active) {
207 goto end;
208 }
fc34caaa 209
7972aab2
DG
210 if (to_create) {
211 /* Create event on all UST registered apps for session */
212 ret = ust_app_create_event_glb(usess, uchan, uevent);
213 } else {
214 /* Enable event on all UST registered apps for session */
215 ret = ust_app_enable_event_glb(usess, uchan, uevent);
216 }
48842b30 217
7972aab2
DG
218 if (ret < 0) {
219 if (ret == -LTTNG_UST_ERR_EXIST) {
220 ret = LTTNG_ERR_UST_EVENT_EXIST;
7972aab2
DG
221 } else {
222 ret = LTTNG_ERR_UST_ENABLE_FAIL;
edb67388 223 }
b77e9a3d 224 goto end;
2bdd86d4 225 }
48842b30 226
7f79d3a1
DG
227 DBG("Event UST %s %s in channel %s", uevent->attr.name,
228 to_create ? "created" : "enabled", uchan->name);
229
f73fabfd 230 ret = LTTNG_OK;
fc34caaa 231
fb89d070 232end:
18eace3b 233 rcu_read_unlock();
49d21f93
MD
234 free(filter_expression);
235 free(filter);
236 free(exclusion);
fc34caaa 237 return ret;
2bdd86d4
MD
238}
239
7f79d3a1
DG
240/*
241 * Disable UST tracepoint of a channel from a UST session.
242 */
7972aab2 243int event_ust_disable_tracepoint(struct ltt_ust_session *usess,
6938db9c 244 struct ltt_ust_channel *uchan, const char *event_name)
2bdd86d4
MD
245{
246 int ret;
7f79d3a1 247 struct ltt_ust_event *uevent;
18eace3b
DG
248 struct lttng_ht_node_str *node;
249 struct lttng_ht_iter iter;
18eace3b 250 struct lttng_ht *ht;
2bdd86d4 251
0525e9ae
DG
252 assert(usess);
253 assert(uchan);
254 assert(event_name);
255
18eace3b
DG
256 ht = uchan->events;
257
18eace3b 258 rcu_read_lock();
025faf73
DG
259
260 /*
261 * We use a custom lookup since we need the iterator for the next_duplicate
262 * call in the do while loop below.
263 */
264 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed),
265 trace_ust_ht_match_event_by_name, event_name, &iter.iter);
18eace3b
DG
266 node = lttng_ht_iter_get_node_str(&iter);
267 if (node == NULL) {
268 DBG2("Trace UST event NOT found by name %s", event_name);
f73fabfd 269 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
7f79d3a1 270 goto error;
2bdd86d4 271 }
7f79d3a1 272
18eace3b
DG
273 do {
274 uevent = caa_container_of(node, struct ltt_ust_event, node);
025faf73
DG
275 assert(uevent);
276
18eace3b
DG
277 if (uevent->enabled == 0) {
278 /* It's already disabled so everything is OK */
a1dcaf0f 279 goto next;
7f79d3a1 280 }
0ce9aa93
JG
281 uevent->enabled = 0;
282 DBG2("Event UST %s disabled in channel %s", uevent->attr.name,
283 uchan->name);
18eace3b 284
0ce9aa93
JG
285 if (!usess->active) {
286 goto next;
287 }
7972aab2
DG
288 ret = ust_app_disable_event_glb(usess, uchan, uevent);
289 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
290 ret = LTTNG_ERR_UST_DISABLE_FAIL;
18eace3b
DG
291 goto error;
292 }
a1dcaf0f 293next:
18eace3b
DG
294 /* Get next duplicate event by name. */
295 cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name,
296 event_name, &iter.iter);
297 node = lttng_ht_iter_get_node_str(&iter);
298 } while (node);
7f79d3a1 299
f73fabfd 300 ret = LTTNG_OK;
7f79d3a1 301
7f79d3a1 302error:
18eace3b 303 rcu_read_unlock();
7f79d3a1
DG
304 return ret;
305}
306
b1e7fe2d
JR
307/*
308 * Disable all UST tracepoints for a channel from a UST session.
309 */
310int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess,
311 struct ltt_ust_channel *uchan)
312{
3e81c0f2 313 int ret, i, size, error = 0;
b1e7fe2d
JR
314 struct lttng_ht_iter iter;
315 struct ltt_ust_event *uevent = NULL;
316 struct lttng_event *events = NULL;
317
318 assert(usess);
319 assert(uchan);
320
321 rcu_read_lock();
322
323 /* Disabling existing events */
324 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
325 node.node) {
326 if (uevent->enabled == 1) {
327 ret = event_ust_disable_tracepoint(usess, uchan,
328 uevent->attr.name);
329 if (ret < 0) {
3e81c0f2 330 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
331 continue;
332 }
333 }
334 }
335
336 /* Get all UST available events */
337 size = ust_app_list_events(&events);
338 if (size < 0) {
339 ret = LTTNG_ERR_UST_LIST_FAIL;
340 goto error;
341 }
342
343 for (i = 0; i < size; i++) {
344 ret = event_ust_disable_tracepoint(usess, uchan,
345 events[i].name);
3e81c0f2 346 if (ret < 0) {
b1e7fe2d 347 /* Continue to disable the rest... */
3e81c0f2 348 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
349 continue;
350 }
351 }
352
3e81c0f2 353 ret = error ? error : LTTNG_OK;
b1e7fe2d
JR
354error:
355 rcu_read_unlock();
356 free(events);
357 return ret;
358}
359
f20baf8e 360/*
022d91ba 361 * Enable all agent event for a given UST session.
f20baf8e
DG
362 *
363 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
364 */
022d91ba 365int event_agent_enable_all(struct ltt_ust_session *usess,
fefd409b 366 struct agent *agt, struct lttng_event *event,
51755dc8 367 struct lttng_filter_bytecode *filter ,char *filter_expression)
f20baf8e
DG
368{
369 int ret;
fefd409b 370 struct agent_event *aevent;
f20baf8e
DG
371 struct lttng_ht_iter iter;
372
373 assert(usess);
374
022d91ba 375 DBG("Event agent enabling ALL events for session %" PRIu64, usess->id);
f20baf8e 376
022d91ba 377 /* Enable event on agent application through TCP socket. */
8404118c 378 ret = event_agent_enable(usess, agt, event, filter, filter_expression);
f20baf8e
DG
379 if (ret != LTTNG_OK) {
380 goto error;
381 }
382
383 /* Flag every event that they are now enabled. */
384 rcu_read_lock();
fefd409b 385 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 386 node.node) {
fefd409b 387 aevent->enabled = 1;
f20baf8e
DG
388 }
389 rcu_read_unlock();
390
391 ret = LTTNG_OK;
392
393error:
394 return ret;
395}
396
71a559f8
JG
397/*
398 * Check if this event's filter requires the activation of application contexts
399 * and enable them in the agent.
b4bc01f7
MD
400 * TODO: bytecode iterator does not support non-legacy application
401 * contexts yet. Not an issue for now, since they are not generated by
402 * the lttng-ctl library.
71a559f8
JG
403 */
404static int add_filter_app_ctx(struct lttng_filter_bytecode *bytecode,
405 const char *filter_expression, struct agent *agt)
406{
407 int ret = LTTNG_OK;
408 char *provider_name = NULL, *ctx_name = NULL;
409 struct bytecode_symbol_iterator *it =
410 bytecode_symbol_iterator_create(bytecode);
411
412 if (!it) {
413 ret = LTTNG_ERR_NOMEM;
414 goto end;
415 }
416
417 do {
418 struct lttng_event_context ctx;
419 const char *symbol_name =
420 bytecode_symbol_iterator_get_name(it);
421
422 if (parse_application_context(symbol_name, &provider_name,
423 &ctx_name)) {
424 /* Not an application context. */
425 continue;
426 }
427
428 ctx.ctx = LTTNG_EVENT_CONTEXT_APP_CONTEXT;
429 ctx.u.app_ctx.provider_name = provider_name;
430 ctx.u.app_ctx.ctx_name = ctx_name;
431
432 /* Recognized an application context. */
433 DBG("Enabling event with filter expression \"%s\" requires enabling the %s:%s application context.",
434 filter_expression, provider_name, ctx_name);
435
436 ret = agent_add_context(&ctx, agt);
437 if (ret != LTTNG_OK) {
438 ERR("Failed to add application context %s:%s.",
439 provider_name, ctx_name);
440 goto end;
441 }
442
443 ret = agent_enable_context(&ctx, agt->domain);
444 if (ret != LTTNG_OK) {
445 ERR("Failed to enable application context %s:%s.",
446 provider_name, ctx_name);
447 goto end;
448 }
449
450 free(provider_name);
451 free(ctx_name);
452 provider_name = ctx_name = NULL;
453 } while (bytecode_symbol_iterator_next(it) == 0);
454end:
455 free(provider_name);
456 free(ctx_name);
457 bytecode_symbol_iterator_destroy(it);
458 return ret;
459}
460
f20baf8e 461/*
022d91ba 462 * Enable a single agent event for a given UST session.
f20baf8e
DG
463 *
464 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
465 */
fefd409b
DG
466int event_agent_enable(struct ltt_ust_session *usess,
467 struct agent *agt, struct lttng_event *event,
8404118c
JG
468 struct lttng_filter_bytecode *filter,
469 char *filter_expression)
f20baf8e
DG
470{
471 int ret, created = 0;
fefd409b 472 struct agent_event *aevent;
f20baf8e
DG
473
474 assert(usess);
475 assert(event);
fefd409b 476 assert(agt);
f20baf8e 477
022d91ba 478 DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d "
51755dc8
JG
479 ", loglevel %d and filter \"%s\"", event->name,
480 usess->id, event->loglevel_type, event->loglevel,
481 filter_expression ? filter_expression : "NULL");
f20baf8e 482
a9319624 483 aevent = agent_find_event(event->name, event->loglevel_type,
71a559f8 484 event->loglevel, filter_expression, agt);
fefd409b 485 if (!aevent) {
a9319624
PP
486 aevent = agent_create_event(event->name, event->loglevel_type,
487 event->loglevel, filter,
51755dc8 488 filter_expression);
fefd409b 489 if (!aevent) {
f20baf8e
DG
490 ret = LTTNG_ERR_NOMEM;
491 goto error;
492 }
c3cf3d2b
JG
493 filter = NULL;
494 filter_expression = NULL;
f20baf8e 495 created = 1;
e7bd0fbb 496 assert(!aevent->enabled);
f20baf8e
DG
497 }
498
6a007bc6
JR
499 if (created && aevent->filter) {
500 ret = add_filter_app_ctx(
501 aevent->filter, aevent->filter_expression, agt);
71a559f8
JG
502 if (ret != LTTNG_OK) {
503 goto error;
504 }
505 }
506
0ce9aa93
JG
507 /* Already enabled? */
508 if (aevent->enabled) {
509 ret = LTTNG_OK;
510 goto end;
511 }
512
fefd409b 513 ret = agent_enable_event(aevent, agt->domain);
f20baf8e
DG
514 if (ret != LTTNG_OK) {
515 goto error;
516 }
517
518 /* If the event was created prior to the enable, add it to the domain. */
519 if (created) {
fefd409b 520 agent_add_event(aevent, agt);
f20baf8e
DG
521 }
522
c3cf3d2b
JG
523 ret = LTTNG_OK;
524 goto end;
f20baf8e
DG
525
526error:
527 if (created) {
fefd409b 528 agent_destroy_event(aevent);
f20baf8e 529 }
c3cf3d2b
JG
530end:
531 free(filter);
532 free(filter_expression);
f20baf8e
DG
533 return ret;
534}
535
da6c3a50 536/*
d1ec8e20
JG
537 * Return the default event name associated with the provided UST domain. Return
538 * NULL on error.
da6c3a50
DG
539 */
540const char *event_get_default_agent_ust_name(enum lttng_domain_type domain)
541{
542 const char *default_event_name = NULL;
543
0e115563
DG
544 switch (domain) {
545 case LTTNG_DOMAIN_LOG4J:
d1ec8e20 546 default_event_name = DEFAULT_LOG4J_EVENT_NAME;
0e115563
DG
547 break;
548 case LTTNG_DOMAIN_JUL:
d1ec8e20 549 default_event_name = DEFAULT_JUL_EVENT_NAME;
0e115563
DG
550 break;
551 case LTTNG_DOMAIN_PYTHON:
e7c82272 552 default_event_name = DEFAULT_PYTHON_EVENT_NAME;
0e115563
DG
553 break;
554 default:
da6c3a50
DG
555 assert(0);
556 }
557
558 return default_event_name;
559}
560
f20baf8e 561/*
e261a6cc 562 * Disable a given agent event for a given UST session.
f20baf8e 563 *
e261a6cc 564 * Must be called with the RCU read lock held.
f20baf8e
DG
565 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
566 */
e261a6cc
PP
567static int event_agent_disable_one(struct ltt_ust_session *usess,
568 struct agent *agt, struct agent_event *aevent)
f20baf8e
DG
569{
570 int ret;
be6a6276
DG
571 struct ltt_ust_event *uevent = NULL;
572 struct ltt_ust_channel *uchan = NULL;
71aecbf8 573 const char *ust_event_name, *ust_channel_name;
f20baf8e 574
fefd409b 575 assert(agt);
f20baf8e 576 assert(usess);
e261a6cc 577 assert(aevent);
f20baf8e 578
e261a6cc
PP
579 DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for session %" PRIu64,
580 aevent->name, aevent->loglevel_type, aevent->loglevel_value,
581 usess->id);
f20baf8e
DG
582
583 /* Already disabled? */
fefd409b 584 if (!aevent->enabled) {
f20baf8e
DG
585 goto end;
586 }
587
71aecbf8
DG
588 if (agt->domain == LTTNG_DOMAIN_JUL) {
589 ust_channel_name = DEFAULT_JUL_CHANNEL_NAME;
590 } else if (agt->domain == LTTNG_DOMAIN_LOG4J) {
591 ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME;
0e115563
DG
592 } else if (agt->domain == LTTNG_DOMAIN_PYTHON) {
593 ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME;
71aecbf8
DG
594 } else {
595 ret = LTTNG_ERR_INVALID;
596 goto error;
597 }
598
be6a6276
DG
599 /*
600 * Disable it on the UST side. First get the channel reference then find
601 * the event and finally disable it.
602 */
603 uchan = trace_ust_find_channel_by_name(usess->domain_global.channels,
71aecbf8 604 (char *) ust_channel_name);
be6a6276
DG
605 if (!uchan) {
606 ret = LTTNG_ERR_UST_CHAN_NOT_FOUND;
607 goto error;
608 }
609
da6c3a50
DG
610 ust_event_name = event_get_default_agent_ust_name(agt->domain);
611 if (!ust_event_name) {
612 ret = LTTNG_ERR_FATAL;
613 goto error;
be6a6276
DG
614 }
615
616 /*
b953b8cd
PP
617 * Agent UST event has its loglevel type forced to
618 * LTTNG_UST_LOGLEVEL_ALL. The actual loglevel type/value filtering
619 * happens thanks to an UST filter. The following -1 is actually
620 * ignored since the type is LTTNG_UST_LOGLEVEL_ALL.
be6a6276 621 */
da6c3a50 622 uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name,
b953b8cd 623 aevent->filter, LTTNG_UST_LOGLEVEL_ALL, -1, NULL);
022d91ba 624 /* If the agent event exists, it must be available on the UST side. */
be6a6276
DG
625 assert(uevent);
626
0ce9aa93
JG
627 if (usess->active) {
628 ret = ust_app_disable_event_glb(usess, uchan, uevent);
629 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
630 ret = LTTNG_ERR_UST_DISABLE_FAIL;
631 goto error;
632 }
be6a6276
DG
633 }
634
0dcfcf94
DG
635 /*
636 * Flag event that it's disabled so the shadow copy on the ust app side
637 * will disable it if an application shows up.
638 */
639 uevent->enabled = 0;
640
fefd409b 641 ret = agent_disable_event(aevent, agt->domain);
f20baf8e
DG
642 if (ret != LTTNG_OK) {
643 goto error;
644 }
645
646end:
647 return LTTNG_OK;
648
649error:
650 return ret;
651}
e261a6cc
PP
652
653/*
654 * Disable all agent events matching a given name for a given UST session.
655 *
656 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
657 */
658int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt,
6938db9c 659 const char *event_name)
e261a6cc
PP
660{
661 int ret = LTTNG_OK;
662 struct agent_event *aevent;
663 struct lttng_ht_iter iter;
664 struct lttng_ht_node_str *node;
665
666 assert(agt);
667 assert(usess);
668 assert(event_name);
669
670 DBG("Event agent disabling %s (all loglevels) for session %" PRIu64, event_name, usess->id);
671
672 rcu_read_lock();
673 agent_find_events_by_name(event_name, agt, &iter);
674 node = lttng_ht_iter_get_node_str(&iter);
675
676 if (node == NULL) {
677 DBG2("Event agent NOT found by name %s", event_name);
678 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
679 goto end;
680 }
681
682 do {
683 aevent = caa_container_of(node, struct agent_event, node);
684 ret = event_agent_disable_one(usess, agt, aevent);
685
686 if (ret != LTTNG_OK) {
687 goto end;
688 }
689
690 /* Get next duplicate agent event by name. */
691 agent_event_next_duplicate(event_name, agt, &iter);
692 node = lttng_ht_iter_get_node_str(&iter);
693 } while (node);
694end:
695 rcu_read_unlock();
696 return ret;
697}
f20baf8e 698/*
022d91ba 699 * Disable all agent event for a given UST session.
f20baf8e
DG
700 *
701 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
702 */
fefd409b
DG
703int event_agent_disable_all(struct ltt_ust_session *usess,
704 struct agent *agt)
f20baf8e 705{
0dcfcf94 706 int ret;
fefd409b 707 struct agent_event *aevent;
f20baf8e
DG
708 struct lttng_ht_iter iter;
709
fefd409b 710 assert(agt);
f20baf8e
DG
711 assert(usess);
712
0dcfcf94
DG
713 /*
714 * Disable event on agent application. Continue to disable all other events
715 * if the * event is not found.
716 */
fefd409b 717 ret = event_agent_disable(usess, agt, "*");
0dcfcf94
DG
718 if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) {
719 goto error;
f20baf8e
DG
720 }
721
b9866e08 722 /* Disable every event. */
f20baf8e 723 rcu_read_lock();
fefd409b 724 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 725 node.node) {
0dcfcf94
DG
726 if (!aevent->enabled) {
727 continue;
728 }
729
730 ret = event_agent_disable(usess, agt, aevent->name);
731 if (ret != LTTNG_OK) {
b9866e08 732 goto error_unlock;
f20baf8e 733 }
f20baf8e 734 }
f20baf8e
DG
735 ret = LTTNG_OK;
736
b9866e08
JG
737error_unlock:
738 rcu_read_unlock();
f20baf8e
DG
739error:
740 return ret;
741}
This page took 0.093977 seconds and 4 git commands to generate.