/*
+ * liblttngctl.c
+ *
+ * Linux Trace Toolkit Control Library
+ *
* Copyright (C) 2011 David Goulet <david.goulet@polymtl.ca>
*
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License
- * as published by the Free Software Foundation; either version 2
- * of the License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; only
+ * version 2.1 of the License.
+ *
+ * This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*/
#define _GNU_SOURCE
#include "liblttsessiondcomm.h"
#include "lttngerr.h"
+#include "lttng-share.h"
/* Socket to session daemon for communication */
static int sessiond_socket;
}
/*
- * ask_sessiond
- *
- * Ask the session daemon a specific command and put the data into buf.
- *
- * Return size of data (only payload, not header).
- */
-static int ask_sessiond(enum lttcomm_sessiond_command lct, void **buf)
-{
- int ret;
- size_t size;
- void *data = NULL;
-
- ret = lttng_connect_sessiond();
- if (ret < 0) {
- goto end;
- }
-
- lsm.cmd_type = lct;
-
- /* Send command to session daemon */
- ret = send_data_sessiond();
- if (ret < 0) {
- goto end;
- }
-
- /* Get header from data transmission */
- ret = recv_data_sessiond(&llm, sizeof(llm));
- if (ret < 0) {
- goto end;
- }
-
- /* Check error code if OK */
- if (llm.ret_code != LTTCOMM_OK) {
- ret = -llm.ret_code;
- goto end;
- }
-
- size = llm.trace_name_offset + llm.data_size;
- if (size == 0) {
- goto end;
- }
-
- data = (void*) malloc(size);
-
- /* Get payload data */
- ret = recv_data_sessiond(data, size);
- if (ret < 0) {
- free(data);
- goto end;
- }
-
- *buf = data;
- ret = size;
-
-end:
- lttng_disconnect_sessiond();
- return ret;
-}
-
-/*
- * check_tracing_group
- *
* Check if the specified group name exist.
- * If yes, 0, else -1
+ *
+ * If yes return 0, else return -1.
*/
static int check_tracing_group(const char *grp_name)
{
}
/*
- * set_session_daemon_path
- *
- * Set sessiond socket path by putting it in
- * the global sessiond_sock_path variable.
+ * Set sessiond socket path by putting it in the global sessiond_sock_path
+ * variable.
*/
static int set_session_daemon_path(void)
{
}
/*
- * BEGIN KERNEL CONTROL
- */
-
-/*
- * lttng_kernel_enable_event
+ * Connect to the LTTng session daemon.
*
- * Enable an event in the kernel tracer.
+ * On success, return 0. On error, return -1.
*/
-int lttng_kernel_enable_event(char *event_name)
+static int connect_sessiond(void)
{
- strncpy(lsm.u.event.event_name, event_name, NAME_MAX);
- return ask_sessiond(KERNEL_ENABLE_EVENT, NULL);
-}
+ int ret;
-/*
- * lttng_kernel_disable_event
- *
- * Disable an event in the kernel tracer.
- */
-int lttng_kernel_disable_event(char *event_name)
-{
- strncpy(lsm.u.event.event_name, event_name, NAME_MAX);
- return ask_sessiond(KERNEL_DISABLE_EVENT, NULL);
-}
+ ret = set_session_daemon_path();
+ if (ret < 0) {
+ return ret;
+ }
-/*
- * lttng_kernel_create_session
- *
- * Create a session in the kernel tracer.
- */
-int lttng_kernel_create_session(void)
-{
- return ask_sessiond(KERNEL_CREATE_SESSION, NULL);
+ /* Connect to the sesssion daemon */
+ ret = lttcomm_connect_unix_sock(sessiond_sock_path);
+ if (ret < 0) {
+ return ret;
+ }
+
+ sessiond_socket = ret;
+ connected = 1;
+
+ return 0;
}
/*
- * lttng_kernel_create_channel
- *
- * Create a channel in the kernel tracer.
+ * Clean disconnect the session daemon.
*/
-int lttng_kernel_create_channel(void)
+static int disconnect_sessiond(void)
{
- return ask_sessiond(KERNEL_CREATE_CHANNEL, NULL);
+ int ret = 0;
+
+ if (connected) {
+ ret = lttcomm_close_unix_sock(sessiond_socket);
+ sessiond_socket = 0;
+ connected = 0;
+ }
+
+ return ret;
}
/*
- * lttng_kernel_open_metadata
+ * ask_sessiond
+ *
+ * Ask the session daemon a specific command and put the data into buf.
*
- * Open metadata in the kernel tracer.
+ * Return size of data (only payload, not header).
*/
-int lttng_kernel_open_metadata(void)
+static int ask_sessiond(enum lttcomm_sessiond_command lct, void **buf)
{
- return ask_sessiond(KERNEL_OPEN_METADATA, NULL);
+ int ret;
+ size_t size;
+ void *data = NULL;
+
+ ret = connect_sessiond();
+ if (ret < 0) {
+ goto end;
+ }
+
+ lsm.cmd_type = lct;
+
+ /* Send command to session daemon */
+ ret = send_data_sessiond();
+ if (ret < 0) {
+ goto end;
+ }
+
+ /* Get header from data transmission */
+ ret = recv_data_sessiond(&llm, sizeof(llm));
+ if (ret < 0) {
+ goto end;
+ }
+
+ /* Check error code if OK */
+ if (llm.ret_code != LTTCOMM_OK) {
+ ret = -llm.ret_code;
+ goto end;
+ }
+
+ size = llm.data_size;
+ if (size == 0) {
+ ret = 0;
+ goto end;
+ }
+
+ data = (void*) malloc(size);
+
+ /* Get payload data */
+ ret = recv_data_sessiond(data, size);
+ if (ret < 0) {
+ free(data);
+ goto end;
+ }
+
+ *buf = data;
+ ret = size;
+
+end:
+ disconnect_sessiond();
+ return ret;
}
/*
- * lttng_kernel_create_stream
- *
- * Create stream in the kernel tracer.
+ * Start tracing for all trace of the session.
*/
-int lttng_kernel_create_stream(void)
+int lttng_start_tracing(const char *session_name)
{
- return ask_sessiond(KERNEL_CREATE_STREAM, NULL);
+ strncpy(lsm.session_name, session_name, NAME_MAX);
+ return ask_sessiond(LTTNG_START_TRACE, NULL);
}
/*
- * lttng_kernel_start_tracing
- *
- * Start kernel tracing.
+ * Stop tracing for all trace of the session.
*/
-int lttng_kernel_start_tracing(void)
+int lttng_stop_tracing(const char *session_name)
{
- return ask_sessiond(KERNEL_START_TRACE, NULL);
+ strncpy(lsm.session_name, session_name, NAME_MAX);
+ return ask_sessiond(LTTNG_STOP_TRACE, NULL);
}
/*
- * lttng_kernel_stop_tracing
- *
- * Stop kernel tracing.
+ * lttng_add_context
*/
-int lttng_kernel_stop_tracing(void)
+int lttng_add_context(struct lttng_domain *domain,
+ struct lttng_event_context *ctx, const char *event_name,
+ const char *channel_name)
{
- return ask_sessiond(KERNEL_STOP_TRACE, NULL);
-}
+ int ret;
-/*
- * END KERNEL CONTROL
- */
+ if (channel_name != NULL) {
+ strncpy(lsm.u.context.channel_name, channel_name, NAME_MAX);
+ }
-/*
- * lttng_get_readable_code
- *
- * Return a human readable string of code
- */
-const char *lttng_get_readable_code(int code)
-{
- if (code > -LTTCOMM_OK) {
- return "Ended with errors";
+ if (event_name != NULL) {
+ strncpy(lsm.u.context.event_name, event_name, NAME_MAX);
}
- return lttcomm_get_readable_code(code);
+ memcpy(&lsm.u.context.ctx, ctx, sizeof(struct lttng_event_context));
+
+ switch (domain->type) {
+ case LTTNG_DOMAIN_KERNEL:
+ ret = ask_sessiond(LTTNG_KERNEL_ADD_CONTEXT, NULL);
+ break;
+ case LTTNG_DOMAIN_UST:
+ ret = LTTCOMM_NOT_IMPLEMENTED;
+ break;
+ default:
+ ret = LTTCOMM_UNKNOWN_DOMAIN;
+ break;
+ };
+
+ return ret;
}
/*
- * lttng_ust_start_trace
- *
- * Request a trace start for pid.
+ * lttng_enable_event
*/
-int lttng_ust_start_trace(pid_t pid)
+int lttng_enable_event(struct lttng_domain *domain,
+ struct lttng_event *ev, const char *channel_name)
{
- lsm.pid = pid;
- return ask_sessiond(UST_START_TRACE, NULL);
+ int ret;
+
+ if (channel_name == NULL) {
+ strncpy(lsm.u.enable.channel_name, DEFAULT_CHANNEL_NAME, NAME_MAX);
+ } else {
+ strncpy(lsm.u.enable.channel_name, channel_name, NAME_MAX);
+ }
+
+ switch (domain->type) {
+ case LTTNG_DOMAIN_KERNEL:
+ if (ev == NULL) {
+ ret = ask_sessiond(LTTNG_KERNEL_ENABLE_ALL_EVENT, NULL);
+ } else {
+ memcpy(&lsm.u.enable.event, ev, sizeof(struct lttng_event));
+ ret = ask_sessiond(LTTNG_KERNEL_ENABLE_EVENT, NULL);
+ }
+ break;
+ case LTTNG_DOMAIN_UST:
+ ret = LTTCOMM_NOT_IMPLEMENTED;
+ break;
+ default:
+ ret = LTTCOMM_UNKNOWN_DOMAIN;
+ break;
+ };
+
+ return ret;
}
/*
- * lttng_ust_stop_trace
- *
- * Request a trace stop for pid.
+ * Disable an event in the kernel tracer.
*/
-int lttng_ust_stop_trace(pid_t pid)
+int lttng_disable_event(struct lttng_domain *domain, const char *name,
+ const char *channel_name)
{
- lsm.pid = pid;
- return ask_sessiond(UST_STOP_TRACE, NULL);
+ int ret;
+
+ if (channel_name == NULL) {
+ strncpy(lsm.u.disable.channel_name, DEFAULT_CHANNEL_NAME, NAME_MAX);
+ } else {
+ strncpy(lsm.u.disable.channel_name, channel_name, NAME_MAX);
+ }
+
+ switch (domain->type) {
+ case LTTNG_DOMAIN_KERNEL:
+ if (name == NULL) {
+ ret = ask_sessiond(LTTNG_KERNEL_DISABLE_ALL_EVENT, NULL);
+ } else {
+ strncpy(lsm.u.disable.name, name, NAME_MAX);
+ ret = ask_sessiond(LTTNG_KERNEL_DISABLE_EVENT, NULL);
+ }
+ break;
+ case LTTNG_DOMAIN_UST:
+ ret = LTTCOMM_NOT_IMPLEMENTED;
+ break;
+ default:
+ ret = LTTCOMM_UNKNOWN_DOMAIN;
+ break;
+ };
+
+ return ret;
}
/*
- * lttng_ust_create_trace
- *
- * Request a trace creation for pid.
+ * Enable recording for a channel for the kernel tracer.
*/
-int lttng_ust_create_trace(pid_t pid)
+int lttng_enable_channel(struct lttng_domain *domain,
+ struct lttng_channel *chan)
{
- lsm.pid = pid;
- return ask_sessiond(UST_CREATE_TRACE, NULL);
+ int ret;
+
+ memcpy(&lsm.u.channel.chan, chan, sizeof(struct lttng_channel));
+
+ switch (domain->type) {
+ case LTTNG_DOMAIN_KERNEL:
+ ret = ask_sessiond(LTTNG_KERNEL_ENABLE_CHANNEL, NULL);
+ break;
+ case LTTNG_DOMAIN_UST:
+ ret = LTTCOMM_NOT_IMPLEMENTED;
+ break;
+ default:
+ ret = LTTCOMM_UNKNOWN_DOMAIN;
+ break;
+ };
+
+ return ret;
}
/*
- * lttng_ust_list_apps
- *
- * Ask the session daemon for all UST traceable applications.
- *
- * Return the number of pids.
- * On error, return negative value.
+ * Disable recording for the channel for the kernel tracer.
*/
-int lttng_ust_list_apps(pid_t **pids)
+int lttng_disable_channel(struct lttng_domain *domain, const char *name)
{
int ret;
- ret = ask_sessiond(UST_LIST_APPS, (void**) pids);
- if (ret < 0) {
- return ret;
- }
+ strncpy(lsm.u.disable.channel_name, name, NAME_MAX);
- return ret / sizeof(pid_t);
+ switch (domain->type) {
+ case LTTNG_DOMAIN_KERNEL:
+ ret = ask_sessiond(LTTNG_KERNEL_DISABLE_CHANNEL, NULL);
+ break;
+ case LTTNG_DOMAIN_UST:
+ ret = LTTCOMM_NOT_IMPLEMENTED;
+ break;
+ default:
+ ret = LTTCOMM_UNKNOWN_DOMAIN;
+ break;
+ };
+
+ return ret;
}
/*
- * lttng_list_traces
+ * List all available events in the kernel.
*
- * Ask the session daemon for all traces (kernel and ust) for the session
- * identified by uuid.
- *
- * Return the number of traces.
- * On error, return negative value.
+ * Return the size (bytes) of the list and set the event_list array.
+ * On error, return negative value.
*/
-int lttng_list_traces(uuid_t *uuid, struct lttng_trace **traces)
+int lttng_list_events(struct lttng_domain *domain, char **event_list)
{
int ret;
- uuid_copy(lsm.session_uuid, *uuid);
+ switch (domain->type) {
+ case LTTNG_DOMAIN_KERNEL:
+ ret = ask_sessiond(LTTNG_KERNEL_LIST_EVENTS, (void **) event_list);
+ break;
+ case LTTNG_DOMAIN_UST:
+ ret = LTTCOMM_NOT_IMPLEMENTED;
+ break;
+ default:
+ ret = LTTCOMM_UNKNOWN_DOMAIN;
+ break;
+ };
+
+ return ret;
+}
- ret = ask_sessiond(LTTNG_LIST_TRACES, (void **) traces);
- if (ret < 0) {
- return ret;
+/*
+ * Return a human readable string of code
+ */
+const char *lttng_get_readable_code(int code)
+{
+ if (code > -LTTCOMM_OK) {
+ return "Ended with errors";
}
- return ret / sizeof(struct lttng_trace);
+ return lttcomm_get_readable_code(code);
}
/*
- * lttng_create_session
- *
* Create a brand new session using name.
*/
-int lttng_create_session(char *name)
+int lttng_create_session(const char *name, const char *path)
{
strncpy(lsm.session_name, name, NAME_MAX);
+ strncpy(lsm.path, path, PATH_MAX);
return ask_sessiond(LTTNG_CREATE_SESSION, NULL);
}
/*
- * lttng_destroy_session
- *
* Destroy session using name.
*/
-int lttng_destroy_session(uuid_t *uuid)
+int lttng_destroy_session(const char *name)
{
- uuid_copy(lsm.session_uuid, *uuid);
+ strncpy(lsm.session_name, name, NAME_MAX);
return ask_sessiond(LTTNG_DESTROY_SESSION, NULL);
}
/*
- * lttng_list_sessions
- *
* Ask the session daemon for all available sessions.
*
* Return number of session.
}
/*
- * lttng_connect_sessiond
- *
- * Connect to the LTTng session daemon.
- * On success, return 0
- * On error, return a negative value
- */
-int lttng_connect_sessiond(void)
-{
- int ret;
-
- ret = set_session_daemon_path();
- if (ret < 0) {
- return ret;
- }
-
- /* Connect to the sesssion daemon */
- ret = lttcomm_connect_unix_sock(sessiond_sock_path);
- if (ret < 0) {
- return ret;
- }
-
- sessiond_socket = ret;
- connected = 1;
-
- return 0;
-}
-
-/*
- * lttng_disconnect_sessiond
- *
- * Clean disconnect the session daemon.
+ * Set session name for the current lsm.
*/
-int lttng_disconnect_sessiond(void)
+void lttng_set_session_name(const char *name)
{
- int ret = 0;
-
- if (connected) {
- ret = lttcomm_close_unix_sock(sessiond_socket);
- sessiond_socket = 0;
- connected = 0;
- }
-
- return ret;
-}
-
-/*
- * lttng_set_current_session_uuid
- *
- * Set the session uuid for current lsm.
- */
-void lttng_set_current_session_uuid(uuid_t *uuid)
-{
- uuid_copy(lsm.session_uuid, *uuid);
+ strncpy(lsm.session_name, name, NAME_MAX);
}
/*