2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
20 #include <urcu/list.h>
23 #include <lttng/lttng.h>
24 #include <common/error.h>
25 #include <common/sessiond-comm/sessiond-comm.h>
32 #include "trace-kernel.h"
33 #include "trace-ust.h"
36 * Setup a lttng_event used to enable *all* syscall tracing.
38 static void init_syscalls_kernel_event(struct lttng_event
*event
)
40 event
->name
[0] = '\0';
42 * We use LTTNG_EVENT* here since the trace kernel creation will make the
43 * right changes for the kernel.
45 event
->type
= LTTNG_EVENT_SYSCALL
;
49 * Return 1 if loglevels match or 0 on failure.
51 static int loglevel_match(struct ltt_ust_event
*uevent
,
52 enum lttng_ust_loglevel_type log_type
, int loglevel
)
54 if (uevent
== NULL
|| uevent
->attr
.loglevel_type
!= log_type
||
55 uevent
->attr
.loglevel
!= loglevel
) {
66 * Disable kernel tracepoint event for a channel from the kernel session.
68 int event_kernel_disable_tracepoint(struct ltt_kernel_session
*ksession
,
69 struct ltt_kernel_channel
*kchan
, char *event_name
)
72 struct ltt_kernel_event
*kevent
;
74 kevent
= trace_kernel_get_event_by_name(event_name
, kchan
);
76 ret
= LTTCOMM_NO_EVENT
;
80 ret
= kernel_disable_event(kevent
);
82 ret
= LTTCOMM_KERN_DISABLE_FAIL
;
86 DBG("Kernel event %s disable for channel %s.",
87 kevent
->event
->name
, kchan
->channel
->name
);
96 * Disable kernel tracepoint events for a channel from the kernel session.
98 int event_kernel_disable_all_tracepoints(struct ltt_kernel_session
*ksession
,
99 struct ltt_kernel_channel
*kchan
)
102 struct ltt_kernel_event
*kevent
;
104 /* For each event in the kernel session */
105 cds_list_for_each_entry(kevent
, &kchan
->events_list
.head
, list
) {
106 ret
= kernel_disable_event(kevent
);
108 /* We continue disabling the rest */
117 * Disable kernel syscall events for a channel from the kernel session.
119 int event_kernel_disable_all_syscalls(struct ltt_kernel_session
*ksession
,
120 struct ltt_kernel_channel
*kchan
)
122 ERR("Cannot disable syscall tracing for existing session. Please destroy session instead.");
123 return LTTCOMM_OK
; /* Return OK so disable all succeeds */
127 * Disable all kernel event for a channel from the kernel session.
129 int event_kernel_disable_all(struct ltt_kernel_session
*ksession
,
130 struct ltt_kernel_channel
*kchan
)
134 ret
= event_kernel_disable_all_tracepoints(ksession
, kchan
);
135 if (ret
!= LTTCOMM_OK
)
137 ret
= event_kernel_disable_all_syscalls(ksession
, kchan
);
142 * Enable kernel tracepoint event for a channel from the kernel session.
144 int event_kernel_enable_tracepoint(struct ltt_kernel_session
*ksession
,
145 struct ltt_kernel_channel
*kchan
, struct lttng_event
*event
)
148 struct ltt_kernel_event
*kevent
;
150 kevent
= trace_kernel_get_event_by_name(event
->name
, kchan
);
151 if (kevent
== NULL
) {
152 ret
= kernel_create_event(event
, kchan
);
156 ret
= LTTCOMM_KERN_EVENT_EXIST
;
159 ret
= LTTCOMM_KERN_EVENT_ENOSYS
;
162 ret
= LTTCOMM_KERN_ENABLE_FAIL
;
167 } else if (kevent
->enabled
== 0) {
168 ret
= kernel_enable_event(kevent
);
170 ret
= LTTCOMM_KERN_ENABLE_FAIL
;
174 /* At this point, the event is considered enabled */
175 ret
= LTTCOMM_KERN_EVENT_EXIST
;
185 * Enable all kernel tracepoint events of a channel of the kernel session.
187 int event_kernel_enable_all_tracepoints(struct ltt_kernel_session
*ksession
,
188 struct ltt_kernel_channel
*kchan
, int kernel_tracer_fd
)
191 struct ltt_kernel_event
*kevent
;
192 struct lttng_event
*event_list
= NULL
;
194 /* For each event in the kernel session */
195 cds_list_for_each_entry(kevent
, &kchan
->events_list
.head
, list
) {
196 if (kevent
->enabled
== 0) {
197 ret
= kernel_enable_event(kevent
);
199 /* Enable failed but still continue */
205 size
= kernel_list_events(kernel_tracer_fd
, &event_list
);
207 ret
= LTTCOMM_KERN_LIST_FAIL
;
211 for (i
= 0; i
< size
; i
++) {
212 kevent
= trace_kernel_get_event_by_name(event_list
[i
].name
, kchan
);
213 if (kevent
== NULL
) {
214 /* Default event type for enable all */
215 event_list
[i
].type
= LTTNG_EVENT_TRACEPOINT
;
216 /* Enable each single tracepoint event */
217 ret
= kernel_create_event(&event_list
[i
], kchan
);
219 /* Ignore error here and continue */
232 * Enable all kernel tracepoint events of a channel of the kernel session.
234 int event_kernel_enable_all_syscalls(struct ltt_kernel_session
*ksession
,
235 struct ltt_kernel_channel
*kchan
, int kernel_tracer_fd
)
238 struct lttng_event event
;
240 init_syscalls_kernel_event(&event
);
242 DBG("Enabling all syscall tracing");
244 ret
= kernel_create_event(&event
, kchan
);
246 if (ret
== -EEXIST
) {
247 ret
= LTTCOMM_KERN_EVENT_EXIST
;
249 ret
= LTTCOMM_KERN_ENABLE_FAIL
;
260 * Enable all kernel events of a channel of the kernel session.
262 int event_kernel_enable_all(struct ltt_kernel_session
*ksession
,
263 struct ltt_kernel_channel
*kchan
, int kernel_tracer_fd
)
267 tp_ret
= event_kernel_enable_all_tracepoints(ksession
, kchan
, kernel_tracer_fd
);
268 if (tp_ret
!= LTTCOMM_OK
) {
273 * Reaching this code path means that all tracepoints were enabled without
274 * errors so we ignore the error value of syscalls.
276 * At the moment, failing to enable syscalls on "lttng enable-event -a -k"
277 * is not considered an error that need to be returned to the client since
278 * tracepoints did not fail. Future work will allow us to send back
279 * multiple errors to the client in one API call.
281 (void) event_kernel_enable_all_syscalls(ksession
, kchan
, kernel_tracer_fd
);
288 * ============================
289 * UST : The Ultimate Frontier!
290 * ============================
294 * Enable all UST tracepoints for a channel from a UST session.
296 int event_ust_enable_all_tracepoints(struct ltt_ust_session
*usess
, int domain
,
297 struct ltt_ust_channel
*uchan
)
300 struct lttng_ht_iter iter
;
301 struct ltt_ust_event
*uevent
= NULL
;
302 struct lttng_event
*events
= NULL
;
305 case LTTNG_DOMAIN_UST
:
307 /* Enable existing events */
308 cds_lfht_for_each_entry(uchan
->events
->ht
, &iter
.iter
, uevent
,
310 if (uevent
->enabled
== 0) {
311 ret
= ust_app_enable_event_glb(usess
, uchan
, uevent
);
319 /* Get all UST available events */
320 size
= ust_app_list_events(&events
);
322 ret
= LTTCOMM_UST_LIST_FAIL
;
326 for (i
= 0; i
< size
; i
++) {
328 * Check if event exist and if so, continue since it was enable
331 uevent
= trace_ust_find_event_by_name(uchan
->events
,
333 if (uevent
!= NULL
) {
334 ret
= ust_app_enable_event_pid(usess
, uchan
, uevent
,
337 if (ret
!= -EEXIST
) {
338 ret
= LTTCOMM_UST_ENABLE_FAIL
;
345 /* Create ust event */
346 uevent
= trace_ust_create_event(&events
[i
]);
347 if (uevent
== NULL
) {
352 /* Create event for the specific PID */
353 ret
= ust_app_enable_event_pid(usess
, uchan
, uevent
,
356 if (ret
== -EEXIST
) {
357 ret
= LTTCOMM_UST_EVENT_EXIST
;
360 ret
= LTTCOMM_UST_ENABLE_FAIL
;
366 /* Add ltt ust event to channel */
368 lttng_ht_add_unique_str(uchan
->events
, &uevent
->node
);
376 case LTTNG_DOMAIN_UST_EXEC_NAME
:
377 case LTTNG_DOMAIN_UST_PID
:
378 case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN
:
388 trace_ust_destroy_event(uevent
);
396 * Enable UST tracepoint event for a channel from a UST session.
398 int event_ust_enable_tracepoint(struct ltt_ust_session
*usess
, int domain
,
399 struct ltt_ust_channel
*uchan
, struct lttng_event
*event
)
401 int ret
= LTTCOMM_OK
, to_create
= 0;
402 struct ltt_ust_event
*uevent
;
404 uevent
= trace_ust_find_event_by_name(uchan
->events
, event
->name
);
405 if (uevent
== NULL
) {
406 uevent
= trace_ust_create_event(event
);
407 if (uevent
== NULL
) {
411 /* Valid to set it after the goto error since uevent is still NULL */
415 /* Check loglevels */
416 ret
= loglevel_match(uevent
, event
->loglevel_type
, event
->loglevel
);
419 * No match meaning that the user tried to enable a known event but
420 * with a different loglevel.
422 DBG("Enable event %s does not match existing event %s with loglevel "
423 "respectively of %d and %d", event
->name
, uevent
->attr
.name
,
424 uevent
->attr
.loglevel
, event
->loglevel
);
425 ret
= LTTCOMM_EVENT_EXIST_LOGLEVEL
;
429 if (uevent
->enabled
) {
430 /* It's already enabled so everything is OK */
438 case LTTNG_DOMAIN_UST
:
441 /* Create event on all UST registered apps for session */
442 ret
= ust_app_create_event_glb(usess
, uchan
, uevent
);
444 /* Enable event on all UST registered apps for session */
445 ret
= ust_app_enable_event_glb(usess
, uchan
, uevent
);
449 if (ret
== -EEXIST
) {
450 ret
= LTTCOMM_UST_EVENT_EXIST
;
453 ret
= LTTCOMM_UST_ENABLE_FAIL
;
460 case LTTNG_DOMAIN_UST_EXEC_NAME
:
461 case LTTNG_DOMAIN_UST_PID
:
462 case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN
:
471 /* Add ltt ust event to channel */
472 lttng_ht_add_unique_str(uchan
->events
, &uevent
->node
);
476 DBG("Event UST %s %s in channel %s", uevent
->attr
.name
,
477 to_create
? "created" : "enabled", uchan
->name
);
486 * Only destroy event on creation time (not enabling time) because if the
487 * event is found in the channel (to_create == 0), it means that at some
488 * point the enable_event worked and it's thus valid to keep it alive.
489 * Destroying it also implies that we also destroy it's shadow copy to sync
493 /* In this code path, the uevent was not added to the hash table */
494 trace_ust_destroy_event(uevent
);
500 * Disable UST tracepoint of a channel from a UST session.
502 int event_ust_disable_tracepoint(struct ltt_ust_session
*usess
, int domain
,
503 struct ltt_ust_channel
*uchan
, char *event_name
)
506 struct ltt_ust_event
*uevent
;
508 uevent
= trace_ust_find_event_by_name(uchan
->events
, event_name
);
509 if (uevent
== NULL
) {
510 ret
= LTTCOMM_UST_EVENT_NOT_FOUND
;
514 if (uevent
->enabled
== 0) {
515 /* It's already enabled so everything is OK */
521 case LTTNG_DOMAIN_UST
:
522 ret
= ust_app_disable_event_glb(usess
, uchan
, uevent
);
523 if (ret
< 0 && ret
!= -EEXIST
) {
524 ret
= LTTCOMM_UST_DISABLE_FAIL
;
529 case LTTNG_DOMAIN_UST_EXEC_NAME
:
530 case LTTNG_DOMAIN_UST_PID
:
531 case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN
:
542 DBG2("Event UST %s disabled in channel %s", uevent
->attr
.name
,
550 * Disable all UST tracepoints for a channel from a UST session.
552 int event_ust_disable_all_tracepoints(struct ltt_ust_session
*usess
, int domain
,
553 struct ltt_ust_channel
*uchan
)
556 struct lttng_ht_iter iter
;
557 struct ltt_ust_event
*uevent
= NULL
;
558 struct lttng_event
*events
= NULL
;
561 case LTTNG_DOMAIN_UST
:
563 /* Disabling existing events */
564 cds_lfht_for_each_entry(uchan
->events
->ht
, &iter
.iter
, uevent
,
566 if (uevent
->enabled
== 1) {
567 ret
= ust_app_disable_event_glb(usess
, uchan
, uevent
);
575 /* Get all UST available events */
576 size
= ust_app_list_events(&events
);
578 ret
= LTTCOMM_UST_LIST_FAIL
;
582 for (i
= 0; i
< size
; i
++) {
583 uevent
= trace_ust_find_event_by_name(uchan
->events
,
585 if (uevent
!= NULL
&& uevent
->enabled
== 1) {
586 ret
= ust_app_disable_event_pid(usess
, uchan
, uevent
,
588 if (ret
< 0 && ret
!= -EEXIST
) {
589 ret
= LTTCOMM_UST_DISABLE_FAIL
;
601 case LTTNG_DOMAIN_UST_EXEC_NAME
:
602 case LTTNG_DOMAIN_UST_PID
:
603 case LTTNG_DOMAIN_UST_PID_FOLLOW_CHILDREN
: