2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
20 #include <urcu/list.h>
23 #include <lttng/lttng.h>
24 #include <common/error.h>
25 #include <common/sessiond-comm/sessiond-comm.h>
30 #include "lttng-sessiond.h"
33 #include "trace-kernel.h"
34 #include "trace-ust.h"
37 * Add unique UST event based on the event name, filter bytecode and loglevel.
39 static void add_unique_ust_event(struct lttng_ht
*ht
,
40 struct ltt_ust_event
*event
)
42 struct cds_lfht_node
*node_ptr
;
43 struct ltt_ust_ht_key key
;
49 key
.name
= event
->attr
.name
;
50 key
.filter
= (struct lttng_filter_bytecode
*) event
->filter
;
51 key
.loglevel
= event
->attr
.loglevel
;
52 key
.exclusion
= event
->exclusion
;
54 node_ptr
= cds_lfht_add_unique(ht
->ht
,
55 ht
->hash_fct(event
->node
.key
, lttng_ht_seed
),
56 trace_ust_ht_match_event
, &key
, &event
->node
.node
);
57 assert(node_ptr
== &event
->node
.node
);
61 * Setup a lttng_event used to enable *all* syscall tracing.
63 static void init_syscalls_kernel_event(struct lttng_event
*event
)
67 event
->name
[0] = '\0';
69 * We use LTTNG_EVENT* here since the trace kernel creation will make the
70 * right changes for the kernel.
72 event
->type
= LTTNG_EVENT_SYSCALL
;
76 * Disable kernel tracepoint event for a channel from the kernel session.
78 int event_kernel_disable_tracepoint(struct ltt_kernel_channel
*kchan
,
82 struct ltt_kernel_event
*kevent
;
86 kevent
= trace_kernel_get_event_by_name(event_name
, kchan
);
88 ret
= LTTNG_ERR_NO_EVENT
;
92 ret
= kernel_disable_event(kevent
);
94 ret
= LTTNG_ERR_KERN_DISABLE_FAIL
;
98 DBG("Kernel event %s disable for channel %s.",
99 kevent
->event
->name
, kchan
->channel
->name
);
108 * Disable kernel tracepoint events for a channel from the kernel session.
110 int event_kernel_disable_all_tracepoints(struct ltt_kernel_channel
*kchan
)
113 struct ltt_kernel_event
*kevent
;
117 /* For each event in the kernel session */
118 cds_list_for_each_entry(kevent
, &kchan
->events_list
.head
, list
) {
119 ret
= kernel_disable_event(kevent
);
121 /* We continue disabling the rest */
130 * Disable kernel syscall events for a channel from the kernel session.
132 int event_kernel_disable_all_syscalls(struct ltt_kernel_channel
*kchan
)
134 ERR("Cannot disable syscall tracing for existing session. Please destroy session instead.");
135 return LTTNG_OK
; /* Return OK so disable all succeeds */
139 * Disable all kernel event for a channel from the kernel session.
141 int event_kernel_disable_all(struct ltt_kernel_channel
*kchan
)
147 ret
= event_kernel_disable_all_tracepoints(kchan
);
150 ret
= event_kernel_disable_all_syscalls(kchan
);
155 * Enable kernel tracepoint event for a channel from the kernel session.
157 int event_kernel_enable_tracepoint(struct ltt_kernel_channel
*kchan
,
158 struct lttng_event
*event
)
161 struct ltt_kernel_event
*kevent
;
166 kevent
= trace_kernel_get_event_by_name(event
->name
, kchan
);
167 if (kevent
== NULL
) {
168 ret
= kernel_create_event(event
, kchan
);
172 ret
= LTTNG_ERR_KERN_EVENT_EXIST
;
175 ret
= LTTNG_ERR_KERN_EVENT_ENOSYS
;
178 ret
= LTTNG_ERR_KERN_ENABLE_FAIL
;
183 } else if (kevent
->enabled
== 0) {
184 ret
= kernel_enable_event(kevent
);
186 ret
= LTTNG_ERR_KERN_ENABLE_FAIL
;
190 /* At this point, the event is considered enabled */
191 ret
= LTTNG_ERR_KERN_EVENT_EXIST
;
201 * Enable all kernel tracepoint events of a channel of the kernel session.
203 int event_kernel_enable_all_tracepoints(struct ltt_kernel_channel
*kchan
,
204 int kernel_tracer_fd
)
207 struct ltt_kernel_event
*kevent
;
208 struct lttng_event
*event_list
= NULL
;
212 /* For each event in the kernel session */
213 cds_list_for_each_entry(kevent
, &kchan
->events_list
.head
, list
) {
214 if (kevent
->enabled
== 0) {
215 ret
= kernel_enable_event(kevent
);
217 /* Enable failed but still continue */
223 size
= kernel_list_events(kernel_tracer_fd
, &event_list
);
225 ret
= LTTNG_ERR_KERN_LIST_FAIL
;
229 for (i
= 0; i
< size
; i
++) {
230 kevent
= trace_kernel_get_event_by_name(event_list
[i
].name
, kchan
);
231 if (kevent
== NULL
) {
232 /* Default event type for enable all */
233 event_list
[i
].type
= LTTNG_EVENT_TRACEPOINT
;
234 /* Enable each single tracepoint event */
235 ret
= kernel_create_event(&event_list
[i
], kchan
);
237 /* Ignore error here and continue */
249 * Enable all kernel sycalls events of a channel of the kernel session.
251 int event_kernel_enable_all_syscalls(struct ltt_kernel_channel
*kchan
,
252 int kernel_tracer_fd
)
255 struct lttng_event event
;
259 init_syscalls_kernel_event(&event
);
261 DBG("Enabling all syscall tracing");
263 ret
= kernel_create_event(&event
, kchan
);
265 if (ret
== -EEXIST
) {
266 ret
= LTTNG_ERR_KERN_EVENT_EXIST
;
268 ret
= LTTNG_ERR_KERN_ENABLE_FAIL
;
279 * Enable all kernel events of a channel of the kernel session.
281 int event_kernel_enable_all(struct ltt_kernel_channel
*kchan
,
282 int kernel_tracer_fd
)
288 tp_ret
= event_kernel_enable_all_tracepoints(kchan
, kernel_tracer_fd
);
289 if (tp_ret
!= LTTNG_OK
) {
294 * Reaching this code path means that all tracepoints were enabled without
295 * errors so we ignore the error value of syscalls.
297 * At the moment, failing to enable syscalls on "lttng enable-event -a -k"
298 * is not considered an error that need to be returned to the client since
299 * tracepoints did not fail. Future work will allow us to send back
300 * multiple errors to the client in one API call.
302 (void) event_kernel_enable_all_syscalls(kchan
, kernel_tracer_fd
);
309 * ============================
310 * UST : The Ultimate Frontier!
311 * ============================
315 * Enable all UST tracepoints for a channel from a UST session.
317 int event_ust_enable_all_tracepoints(struct ltt_ust_session
*usess
,
318 struct ltt_ust_channel
*uchan
, struct lttng_filter_bytecode
*filter
)
321 struct lttng_ht_iter iter
;
322 struct ltt_ust_event
*uevent
= NULL
;
323 struct lttng_event
*events
= NULL
;
330 /* Enable existing events */
331 cds_lfht_for_each_entry(uchan
->events
->ht
, &iter
.iter
, uevent
,
333 if (uevent
->enabled
== 0) {
334 ret
= ust_app_enable_event_glb(usess
, uchan
, uevent
);
342 /* Get all UST available events */
343 size
= ust_app_list_events(&events
);
345 ret
= LTTNG_ERR_UST_LIST_FAIL
;
349 for (i
= 0; i
< size
; i
++) {
351 * Check if event exist and if so, continue since it was enable
354 uevent
= trace_ust_find_event(uchan
->events
, events
[i
].name
, filter
,
355 events
[i
].loglevel
, NULL
);
356 if (uevent
!= NULL
) {
357 ret
= ust_app_enable_event_pid(usess
, uchan
, uevent
,
360 if (ret
!= -LTTNG_UST_ERR_EXIST
) {
361 ret
= LTTNG_ERR_UST_ENABLE_FAIL
;
368 /* Create ust event */
369 uevent
= trace_ust_create_event(&events
[i
], filter
, NULL
);
370 if (uevent
== NULL
) {
371 ret
= LTTNG_ERR_FATAL
;
375 /* Create event for the specific PID */
376 ret
= ust_app_enable_event_pid(usess
, uchan
, uevent
,
379 if (ret
== -LTTNG_UST_ERR_EXIST
) {
380 ret
= LTTNG_ERR_UST_EVENT_EXIST
;
383 ret
= LTTNG_ERR_UST_ENABLE_FAIL
;
389 /* Add ltt ust event to channel */
391 add_unique_ust_event(uchan
->events
, uevent
);
400 trace_ust_destroy_event(uevent
);
409 * Enable UST tracepoint event for a channel from a UST session.
411 int event_ust_enable_tracepoint(struct ltt_ust_session
*usess
,
412 struct ltt_ust_channel
*uchan
, struct lttng_event
*event
,
413 struct lttng_filter_bytecode
*filter
,
414 struct lttng_event_exclusion
*exclusion
)
416 int ret
= LTTNG_OK
, to_create
= 0;
417 struct ltt_ust_event
*uevent
;
425 uevent
= trace_ust_find_event(uchan
->events
, event
->name
, filter
,
426 event
->loglevel
, exclusion
);
427 if (uevent
== NULL
) {
428 uevent
= trace_ust_create_event(event
, filter
, exclusion
);
429 if (uevent
== NULL
) {
430 ret
= LTTNG_ERR_UST_ENABLE_FAIL
;
434 /* Valid to set it after the goto error since uevent is still NULL */
438 if (uevent
->enabled
) {
439 /* It's already enabled so everything is OK */
440 ret
= LTTNG_ERR_UST_EVENT_ENABLED
;
447 /* Create event on all UST registered apps for session */
448 ret
= ust_app_create_event_glb(usess
, uchan
, uevent
);
450 /* Enable event on all UST registered apps for session */
451 ret
= ust_app_enable_event_glb(usess
, uchan
, uevent
);
455 if (ret
== -LTTNG_UST_ERR_EXIST
) {
456 ret
= LTTNG_ERR_UST_EVENT_EXIST
;
459 ret
= LTTNG_ERR_UST_ENABLE_FAIL
;
465 /* Add ltt ust event to channel */
466 add_unique_ust_event(uchan
->events
, uevent
);
469 DBG("Event UST %s %s in channel %s", uevent
->attr
.name
,
470 to_create
? "created" : "enabled", uchan
->name
);
480 * Only destroy event on creation time (not enabling time) because if the
481 * event is found in the channel (to_create == 0), it means that at some
482 * point the enable_event worked and it's thus valid to keep it alive.
483 * Destroying it also implies that we also destroy it's shadow copy to sync
487 /* In this code path, the uevent was not added to the hash table */
488 trace_ust_destroy_event(uevent
);
495 * Disable UST tracepoint of a channel from a UST session.
497 int event_ust_disable_tracepoint(struct ltt_ust_session
*usess
,
498 struct ltt_ust_channel
*uchan
, char *event_name
)
501 struct ltt_ust_event
*uevent
;
502 struct lttng_ht_node_str
*node
;
503 struct lttng_ht_iter iter
;
515 * We use a custom lookup since we need the iterator for the next_duplicate
516 * call in the do while loop below.
518 cds_lfht_lookup(ht
->ht
, ht
->hash_fct((void *) event_name
, lttng_ht_seed
),
519 trace_ust_ht_match_event_by_name
, event_name
, &iter
.iter
);
520 node
= lttng_ht_iter_get_node_str(&iter
);
522 DBG2("Trace UST event NOT found by name %s", event_name
);
523 ret
= LTTNG_ERR_UST_EVENT_NOT_FOUND
;
528 uevent
= caa_container_of(node
, struct ltt_ust_event
, node
);
531 if (uevent
->enabled
== 0) {
532 /* It's already disabled so everything is OK */
536 ret
= ust_app_disable_event_glb(usess
, uchan
, uevent
);
537 if (ret
< 0 && ret
!= -LTTNG_UST_ERR_EXIST
) {
538 ret
= LTTNG_ERR_UST_DISABLE_FAIL
;
543 DBG2("Event UST %s disabled in channel %s", uevent
->attr
.name
,
547 /* Get next duplicate event by name. */
548 cds_lfht_next_duplicate(ht
->ht
, trace_ust_ht_match_event_by_name
,
549 event_name
, &iter
.iter
);
550 node
= lttng_ht_iter_get_node_str(&iter
);
561 * Disable all UST tracepoints for a channel from a UST session.
563 int event_ust_disable_all_tracepoints(struct ltt_ust_session
*usess
,
564 struct ltt_ust_channel
*uchan
)
567 struct lttng_ht_iter iter
;
568 struct ltt_ust_event
*uevent
= NULL
;
569 struct lttng_event
*events
= NULL
;
576 /* Disabling existing events */
577 cds_lfht_for_each_entry(uchan
->events
->ht
, &iter
.iter
, uevent
,
579 if (uevent
->enabled
== 1) {
580 ret
= event_ust_disable_tracepoint(usess
, uchan
,
588 /* Get all UST available events */
589 size
= ust_app_list_events(&events
);
591 ret
= LTTNG_ERR_UST_LIST_FAIL
;
595 for (i
= 0; i
< size
; i
++) {
596 ret
= event_ust_disable_tracepoint(usess
, uchan
,
598 if (ret
!= LTTNG_OK
) {
599 /* Continue to disable the rest... */
615 * Enable all JUL event for a given UST session.
617 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
619 int event_jul_enable_all(struct ltt_ust_session
*usess
,
620 struct lttng_event
*event
, struct lttng_filter_bytecode
*filter
)
623 struct jul_event
*jevent
;
624 struct lttng_ht_iter iter
;
628 DBG("Event JUL enabling ALL events for session %" PRIu64
, usess
->id
);
630 /* Enable event on JUL application through TCP socket. */
631 ret
= event_jul_enable(usess
, event
, filter
);
632 if (ret
!= LTTNG_OK
) {
636 /* Flag every event that they are now enabled. */
638 cds_lfht_for_each_entry(usess
->domain_jul
.events
->ht
, &iter
.iter
, jevent
,
651 * Enable a single JUL event for a given UST session.
653 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
655 int event_jul_enable(struct ltt_ust_session
*usess
, struct lttng_event
*event
,
656 struct lttng_filter_bytecode
*filter
)
658 int ret
, created
= 0;
659 struct jul_event
*jevent
;
664 DBG("Event JUL enabling %s for session %" PRIu64
" with loglevel type %d "
665 "and loglevel %d", event
->name
, usess
->id
, event
->loglevel_type
,
668 jevent
= jul_find_event(event
->name
, event
->loglevel
, &usess
->domain_jul
);
670 jevent
= jul_create_event(event
->name
);
672 ret
= LTTNG_ERR_NOMEM
;
675 jevent
->loglevel
= event
->loglevel
;
676 jevent
->loglevel_type
= event
->loglevel_type
;
677 jevent
->filter
= filter
;
681 /* Already enabled? */
682 if (jevent
->enabled
) {
686 ret
= jul_enable_event(jevent
);
687 if (ret
!= LTTNG_OK
) {
691 /* If the event was created prior to the enable, add it to the domain. */
693 jul_add_event(jevent
, &usess
->domain_jul
);
701 jul_destroy_event(jevent
);
707 * Disable a single JUL event for a given UST session.
709 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
711 int event_jul_disable(struct ltt_ust_session
*usess
, char *event_name
)
714 char *ust_event_name
;
715 struct jul_event
*jevent
;
716 struct ltt_ust_event
*uevent
= NULL
;
717 struct ltt_ust_channel
*uchan
= NULL
;
722 DBG("Event JUL disabling %s for session %" PRIu64
, event_name
, usess
->id
);
724 jevent
= jul_find_event_by_name(event_name
, &usess
->domain_jul
);
726 ret
= LTTNG_ERR_UST_EVENT_NOT_FOUND
;
730 /* Already disabled? */
731 if (!jevent
->enabled
) {
736 * Disable it on the UST side. First get the channel reference then find
737 * the event and finally disable it.
739 uchan
= trace_ust_find_channel_by_name(usess
->domain_global
.channels
,
740 DEFAULT_JUL_CHANNEL_NAME
);
742 ret
= LTTNG_ERR_UST_CHAN_NOT_FOUND
;
747 ust_event_name
= DEFAULT_SYS_JUL_EVENT_NAME
;
749 ust_event_name
= DEFAULT_USER_JUL_EVENT_NAME
;
753 * The loglevel is hardcoded with 0 here since the agent ust event is set
754 * with the loglevel type to ALL thus the loglevel stays 0. The event's
755 * filter is the one handling the loglevel for agent.
757 uevent
= trace_ust_find_event(uchan
->events
, ust_event_name
,
758 jevent
->filter
, 0, NULL
);
759 /* If the agent event exists, it must be available on the UST side. */
762 ret
= ust_app_disable_event_glb(usess
, uchan
, uevent
);
763 if (ret
< 0 && ret
!= -LTTNG_UST_ERR_EXIST
) {
764 ret
= LTTNG_ERR_UST_DISABLE_FAIL
;
769 ret
= jul_disable_event(jevent
);
770 if (ret
!= LTTNG_OK
) {
782 * Disable all JUL event for a given UST session.
784 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
786 int event_jul_disable_all(struct ltt_ust_session
*usess
)
789 struct jul_event
*jevent
;
790 struct lttng_ht_iter iter
;
794 /* Enable event on JUL application through TCP socket. */
795 ret
= event_jul_disable(usess
, "*");
796 if (ret
!= LTTNG_OK
&& ret
!= LTTNG_ERR_UST_EVENT_NOT_FOUND
) {
800 /* Flag every event that they are now enabled. */
802 cds_lfht_for_each_entry(usess
->domain_jul
.events
->ht
, &iter
.iter
, jevent
,
804 if (!jevent
->enabled
) {
808 ret
= event_jul_disable(usess
, jevent
->name
);
809 if (ret
!= LTTNG_OK
) {