1 /* Copyright (C) 2009 Pierre-Marc Fournier, Philippe Proulx-Barrette
2 * Copyright (C) 2011 Ericsson AB
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
29 #include "ust/ustctl.h"
32 static int do_cmd(int sock
,
33 const struct ustcomm_header
*req_header
,
35 struct ustcomm_header
*res_header
,
38 int result
, saved_errno
= 0;
41 recv_buf
= zmalloc(USTCOMM_BUFFER_SIZE
);
47 result
= ustcomm_req(sock
, req_header
, req_data
, res_header
, recv_buf
);
49 saved_errno
= -res_header
->result
;
50 if (res_header
->size
== 0 || saved_errno
> 0) {
60 ERR("ustcomm req failed");
62 saved_errno
= ENOTCONN
;
64 saved_errno
= -result
;
78 int ustctl_connect_pid(pid_t pid
)
82 if (ustcomm_connect_app(pid
, &sock
)) {
83 ERR("could not connect to PID %u", (unsigned int) pid
);
91 pid_t
*ustctl_get_online_pids(void)
93 struct dirent
*dirent
;
95 unsigned int ret_size
= 1 * sizeof(pid_t
), i
= 0;
97 dir
= opendir(SOCK_DIR
);
102 pid_t
*ret
= (pid_t
*) malloc(ret_size
);
104 while ((dirent
= readdir(dir
))) {
105 if (!strcmp(dirent
->d_name
, ".") ||
106 !strcmp(dirent
->d_name
, "..")) {
111 if (dirent
->d_type
!= DT_DIR
&&
112 !!strcmp(dirent
->d_name
, "ust-consumer")) {
114 sscanf(dirent
->d_name
, "%u", (unsigned int *) &ret
[i
]);
115 /* FIXME: Here we previously called pid_is_online, which
116 * always returned 1, now I replaced it with just 1.
117 * We need to figure out an intelligent way of solving
118 * this, maybe connect-disconnect.
121 ret_size
+= sizeof(pid_t
);
122 ret
= (pid_t
*) realloc(ret
, ret_size
);
128 ret
[i
] = 0; /* Array end */
141 * Sets marker state (USTCTL_MS_ON or USTCTL_MS_OFF).
143 * @param mn Marker name
144 * @param state Marker's new state
145 * @param pid Traced process ID
146 * @return 0 if successful, or errors {USTCTL_ERR_GEN, USTCTL_ERR_ARG}
148 int ustctl_set_marker_state(int sock
, const char *trace
, const char *channel
,
149 const char *marker
, int state
)
151 struct ustcomm_header req_header
, res_header
;
152 struct ustcomm_marker_info marker_inf
;
155 result
= ustcomm_pack_marker_info(&req_header
,
165 req_header
.command
= state
? ENABLE_MARKER
: DISABLE_MARKER
;
167 return do_cmd(sock
, &req_header
, (char *)&marker_inf
,
172 * Set subbuffer size.
174 * @param channel_size Channel name and size
175 * @param pid Traced process ID
176 * @return 0 if successful, or error
178 int ustctl_set_subbuf_size(int sock
, const char *trace
, const char *channel
,
179 unsigned int subbuf_size
)
181 struct ustcomm_header req_header
, res_header
;
182 struct ustcomm_channel_info ch_inf
;
185 result
= ustcomm_pack_channel_info(&req_header
,
194 req_header
.command
= SET_SUBBUF_SIZE
;
195 ch_inf
.subbuf_size
= subbuf_size
;
197 return do_cmd(sock
, &req_header
, (char *)&ch_inf
,
204 * @param channel_num Channel name and num
205 * @param pid Traced process ID
206 * @return 0 if successful, or error
208 int ustctl_set_subbuf_num(int sock
, const char *trace
, const char *channel
,
211 struct ustcomm_header req_header
, res_header
;
212 struct ustcomm_channel_info ch_inf
;
215 result
= ustcomm_pack_channel_info(&req_header
,
224 req_header
.command
= SET_SUBBUF_NUM
;
225 ch_inf
.subbuf_num
= num
;
227 return do_cmd(sock
, &req_header
, (char *)&ch_inf
,
233 static int ustctl_get_subbuf_num_size(int sock
, const char *trace
, const char *channel
,
236 struct ustcomm_header req_header
, res_header
;
237 struct ustcomm_channel_info ch_inf
, *ch_inf_res
;
241 result
= ustcomm_pack_channel_info(&req_header
,
250 req_header
.command
= GET_SUBBUF_NUM_SIZE
;
252 result
= do_cmd(sock
, &req_header
, (char *)&ch_inf
,
253 &res_header
, (char **)&ch_inf_res
);
258 *num
= ch_inf_res
->subbuf_num
;
259 *size
= ch_inf_res
->subbuf_size
;
269 * @param channel Channel name
270 * @param pid Traced process ID
271 * @return subbuf cnf if successful, or error
273 int ustctl_get_subbuf_num(int sock
, const char *trace
, const char *channel
)
275 int num
, size
, result
;
277 result
= ustctl_get_subbuf_num_size(sock
, trace
, channel
,
288 * Get subbuffer size.
290 * @param channel Channel name
291 * @param pid Traced process ID
292 * @return subbuf size if successful, or error
294 int ustctl_get_subbuf_size(int sock
, const char *trace
, const char *channel
)
296 int num
, size
, result
;
298 result
= ustctl_get_subbuf_num_size(sock
, trace
, channel
,
308 static int do_trace_cmd(int sock
, const char *trace
, int command
)
310 struct ustcomm_header req_header
, res_header
;
311 struct ustcomm_single_field trace_inf
;
314 result
= ustcomm_pack_single_field(&req_header
,
322 req_header
.command
= command
;
324 return do_cmd(sock
, &req_header
, (char *)&trace_inf
, &res_header
, NULL
);
328 * Destroys an UST trace according to a PID.
330 * @param pid Traced process ID
331 * @return 0 if successful, or error USTCTL_ERR_GEN
333 int ustctl_destroy_trace(int sock
, const char *trace
)
335 return do_trace_cmd(sock
, trace
, DESTROY_TRACE
);
339 * Starts an UST trace (and setups it) according to a PID.
341 * @param pid Traced process ID
342 * @return 0 if successful, or error USTCTL_ERR_GEN
344 int ustctl_setup_and_start(int sock
, const char *trace
)
346 return do_trace_cmd(sock
, trace
, START
);
350 * Creates an UST trace according to a PID.
352 * @param pid Traced process ID
353 * @return 0 if successful, or error USTCTL_ERR_GEN
355 int ustctl_create_trace(int sock
, const char *trace
)
357 return do_trace_cmd(sock
, trace
, CREATE_TRACE
);
361 * Starts an UST trace according to a PID.
363 * @param pid Traced process ID
364 * @return 0 if successful, or error USTCTL_ERR_GEN
366 int ustctl_start_trace(int sock
, const char *trace
)
368 return do_trace_cmd(sock
, trace
, START_TRACE
);
372 * Alloc an UST trace according to a PID.
374 * @param pid Traced process ID
375 * @return 0 if successful, or error USTCTL_ERR_GEN
377 int ustctl_alloc_trace(int sock
, const char *trace
)
379 return do_trace_cmd(sock
, trace
, ALLOC_TRACE
);
383 int ustctl_force_switch(int sock
, const char *trace
)
385 return do_trace_cmd(sock
, trace
, FORCE_SUBBUF_SWITCH
);
389 * Stops an UST trace according to a PID.
391 * @param pid Traced process ID
392 * @return 0 if successful, or error USTCTL_ERR_GEN
394 int ustctl_stop_trace(int sock
, const char *trace
)
396 return do_trace_cmd(sock
, trace
, STOP_TRACE
);
400 * Counts newlines ('\n') in a string.
402 * @param str String to search in
403 * @return Total newlines count
405 unsigned int ustctl_count_nl(const char *str
)
407 unsigned int i
= 0, tot
= 0;
409 while (str
[i
] != '\0') {
410 if (str
[i
] == '\n') {
420 * Frees a CMSF array.
422 * @param cmsf CMSF array to free
423 * @return 0 if successful, or error USTCTL_ERR_ARG
425 int ustctl_free_cmsf(struct marker_status
*cmsf
)
428 return USTCTL_ERR_ARG
;
432 while (cmsf
[i
].channel
!= NULL
) {
433 free(cmsf
[i
].channel
);
434 free(cmsf
[i
].marker
);
444 * Gets channel/marker/state/format string for a given PID.
446 * @param cmsf Pointer to CMSF array to be filled (callee allocates, caller
447 * frees with `ustctl_free_cmsf')
448 * @param pid Targeted PID
449 * @return 0 if successful, or -1 on error
451 int ustctl_get_cmsf(int sock
, struct marker_status
**cmsf
)
453 struct ustcomm_header req_header
, res_header
;
454 char *big_str
= NULL
;
456 struct marker_status
*tmp_cmsf
= NULL
;
457 unsigned int i
= 0, cmsf_ind
= 0;
463 req_header
.command
= LIST_MARKERS
;
466 result
= ustcomm_send(sock
, &req_header
, NULL
);
468 PERROR("error while requesting markers list");
472 result
= ustcomm_recv_alloc(sock
, &res_header
, &big_str
);
474 ERR("error while receiving markers list");
478 tmp_cmsf
= (struct marker_status
*) zmalloc(sizeof(struct marker_status
) *
479 (ustctl_count_nl(big_str
) + 1));
480 if (tmp_cmsf
== NULL
) {
481 ERR("Failed to allocate CMSF array");
485 /* Parse received reply string (format: "[chan]/[mark] [st] [fs]"): */
486 while (big_str
[i
] != '\0') {
489 sscanf(big_str
+ i
, "marker: %a[^/]/%a[^ ] %c %a[^\n]",
490 &tmp_cmsf
[cmsf_ind
].channel
,
491 &tmp_cmsf
[cmsf_ind
].marker
,
493 &tmp_cmsf
[cmsf_ind
].fs
);
494 tmp_cmsf
[cmsf_ind
].state
= (state
== USTCTL_MS_CHR_ON
?
495 USTCTL_MS_ON
: USTCTL_MS_OFF
); /* Marker state */
497 while (big_str
[i
] != '\n') {
498 ++i
; /* Go to next '\n' */
500 ++i
; /* Skip current pointed '\n' */
503 tmp_cmsf
[cmsf_ind
].channel
= NULL
;
504 tmp_cmsf
[cmsf_ind
].marker
= NULL
;
505 tmp_cmsf
[cmsf_ind
].fs
= NULL
;
516 * @param tes TES array to free
517 * @return 0 if successful, or error USTCTL_ERR_ARG
519 int ustctl_free_tes(struct trace_event_status
*tes
)
522 return USTCTL_ERR_ARG
;
526 while (tes
[i
].name
!= NULL
) {
536 * Gets trace_events string for a given PID.
538 * @param tes Pointer to TES array to be filled (callee allocates, caller
539 * frees with `ustctl_free_tes')
540 * @param pid Targeted PID
541 * @return 0 if successful, or -1 on error
543 int ustctl_get_tes(int sock
, struct trace_event_status
**tes
)
545 struct ustcomm_header req_header
, res_header
;
546 char *big_str
= NULL
;
548 struct trace_event_status
*tmp_tes
= NULL
;
549 unsigned int i
= 0, tes_ind
= 0;
555 req_header
.command
= LIST_TRACE_EVENTS
;
558 result
= ustcomm_send(sock
, &req_header
, NULL
);
560 ERR("error while requesting trace_event list");
564 result
= ustcomm_recv_alloc(sock
, &res_header
, &big_str
);
566 ERR("error while receiving markers list");
570 tmp_tes
= (struct trace_event_status
*)
571 zmalloc(sizeof(struct trace_event_status
) *
572 (ustctl_count_nl(big_str
) + 1));
573 if (tmp_tes
== NULL
) {
574 ERR("Failed to allocate TES array");
578 /* Parse received reply string (format: "[name]"): */
579 while (big_str
[i
] != '\0') {
580 sscanf(big_str
+ i
, "trace_event: %a[^\n]",
581 &tmp_tes
[tes_ind
].name
);
582 while (big_str
[i
] != '\n') {
583 ++i
; /* Go to next '\n' */
585 ++i
; /* Skip current pointed '\n' */
588 tmp_tes
[tes_ind
].name
= NULL
;
599 * @param sock_path Sock path
600 * @param pid Traced process ID
601 * @return 0 if successful, or error
603 int ustctl_set_sock_path(int sock
, const char *sock_path
)
606 struct ustcomm_header req_header
, res_header
;
607 struct ustcomm_single_field sock_path_msg
;
609 result
= ustcomm_pack_single_field(&req_header
,
617 req_header
.command
= SET_SOCK_PATH
;
619 return do_cmd(sock
, &req_header
, (char *)&sock_path_msg
,
626 * @param sock_path Pointer to where the sock path will be returned
627 * @param pid Traced process ID
628 * @return 0 if successful, or error
630 int ustctl_get_sock_path(int sock
, char **sock_path
)
633 struct ustcomm_header req_header
, res_header
;
634 struct ustcomm_single_field
*sock_path_msg
;
636 req_header
.command
= GET_SOCK_PATH
;
639 result
= do_cmd(sock
, &req_header
, NULL
, &res_header
,
640 (char **)&sock_path_msg
);
645 result
= ustcomm_unpack_single_field(sock_path_msg
);
650 *sock_path
= strdup(sock_path_msg
->field
);