Fix: disable kernel event based on name and event type
[lttng-tools.git] / src / bin / lttng-sessiond / event.c
CommitLineData
54d01ffb
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 *
d14d33bf
AM
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
54d01ffb 7 *
d14d33bf
AM
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
54d01ffb 12 *
d14d33bf
AM
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
54d01ffb
DG
16 */
17
be040666 18#define _GNU_SOURCE
6c1c0768 19#define _LGPL_SOURCE
d87bfb32 20#include <errno.h>
54d01ffb 21#include <urcu/list.h>
2bdd86d4 22#include <string.h>
54d01ffb
DG
23
24#include <lttng/lttng.h>
db758600 25#include <common/error.h>
10a8a223 26#include <common/sessiond-comm/sessiond-comm.h>
54d01ffb
DG
27
28#include "channel.h"
29#include "event.h"
4771f025 30#include "kernel.h"
be6a6276 31#include "lttng-sessiond.h"
9df8df5e 32#include "ust-ctl.h"
edb67388
DG
33#include "ust-app.h"
34#include "trace-kernel.h"
35#include "trace-ust.h"
7c1d2758 36#include "agent.h"
54d01ffb 37
025faf73
DG
38/*
39 * Add unique UST event based on the event name, filter bytecode and loglevel.
40 */
18eace3b
DG
41static void add_unique_ust_event(struct lttng_ht *ht,
42 struct ltt_ust_event *event)
43{
44 struct cds_lfht_node *node_ptr;
45 struct ltt_ust_ht_key key;
46
47 assert(ht);
48 assert(ht->ht);
49 assert(event);
50
51 key.name = event->attr.name;
52 key.filter = (struct lttng_filter_bytecode *) event->filter;
b953b8cd
PP
53 key.loglevel_type = event->attr.loglevel_type;
54 key.loglevel_value = event->attr.loglevel;
4031e53e 55 key.exclusion = event->exclusion;
18eace3b
DG
56
57 node_ptr = cds_lfht_add_unique(ht->ht,
58 ht->hash_fct(event->node.key, lttng_ht_seed),
59 trace_ust_ht_match_event, &key, &event->node.node);
60 assert(node_ptr == &event->node.node);
61}
62
54d01ffb 63/*
9550ee81
JR
64 * Disable kernel tracepoint events for a channel from the kernel session of
65 * a specified event_name and event type.
66 * On type LTTNG_EVENT_ALL all events with event_name are disabled.
67 * If event_name is NULL all events of the specified type are disabled.
54d01ffb 68 */
d0ae4ea8 69int event_kernel_disable_event(struct ltt_kernel_channel *kchan,
9550ee81 70 char *event_name, enum lttng_event_type type)
54d01ffb 71{
9550ee81 72 int ret, error = 0, found = 0;
54d01ffb
DG
73 struct ltt_kernel_event *kevent;
74
0525e9ae
DG
75 assert(kchan);
76
54d01ffb
DG
77 /* For each event in the kernel session */
78 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
d0ae4ea8
MD
79 if (type != LTTNG_EVENT_ALL && kevent->type != type)
80 continue;
9550ee81
JR
81 if (event_name != NULL && strcmp(event_name, kevent->event->name)) {
82 continue;
83 }
84 found++;
54d01ffb
DG
85 ret = kernel_disable_event(kevent);
86 if (ret < 0) {
9550ee81 87 error = 1;
54d01ffb
DG
88 continue;
89 }
90 }
9550ee81
JR
91 DBG("Disable kernel event: found %d events with name: %s and type: %d",
92 found, event_name ? event_name : "NULL", type);
7a3d1328 93
9550ee81
JR
94 if (event_name != NULL && !found) {
95 ret = LTTNG_ERR_NO_EVENT;
96 } else {
97 ret = error ? LTTNG_ERR_KERN_DISABLE_FAIL : LTTNG_OK;
98 }
99
100 return ret;
54d01ffb
DG
101}
102
103/*
7a3d1328 104 * Enable kernel tracepoint event for a channel from the kernel session.
49d21f93 105 * We own filter_expression and filter.
54d01ffb 106 */
d0ae4ea8 107int event_kernel_enable_event(struct ltt_kernel_channel *kchan,
00a62084
MD
108 struct lttng_event *event, char *filter_expression,
109 struct lttng_filter_bytecode *filter)
54d01ffb
DG
110{
111 int ret;
112 struct ltt_kernel_event *kevent;
113
0525e9ae
DG
114 assert(kchan);
115 assert(event);
116
00a62084
MD
117 kevent = trace_kernel_find_event(event->name, kchan,
118 event->type, filter);
54d01ffb 119 if (kevent == NULL) {
00a62084
MD
120 ret = kernel_create_event(event, kchan,
121 filter_expression, filter);
a969e101
MD
122 /* We have passed ownership */
123 filter_expression = NULL;
124 filter = NULL;
54d01ffb 125 if (ret < 0) {
bd29c13d
DG
126 switch (-ret) {
127 case EEXIST:
f73fabfd 128 ret = LTTNG_ERR_KERN_EVENT_EXIST;
bd29c13d
DG
129 break;
130 case ENOSYS:
f73fabfd 131 ret = LTTNG_ERR_KERN_EVENT_ENOSYS;
bd29c13d
DG
132 break;
133 default:
f73fabfd 134 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
bd29c13d 135 break;
d87bfb32 136 }
7a3d1328 137 goto end;
54d01ffb
DG
138 }
139 } else if (kevent->enabled == 0) {
140 ret = kernel_enable_event(kevent);
141 if (ret < 0) {
f73fabfd 142 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
7a3d1328 143 goto end;
54d01ffb 144 }
42224349
DG
145 } else {
146 /* At this point, the event is considered enabled */
f73fabfd 147 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349 148 goto end;
54d01ffb 149 }
42224349 150
f73fabfd 151 ret = LTTNG_OK;
7a3d1328 152end:
a969e101
MD
153 free(filter_expression);
154 free(filter);
54d01ffb
DG
155 return ret;
156}
157
7f79d3a1
DG
158/*
159 * ============================
160 * UST : The Ultimate Frontier!
161 * ============================
162 */
163
2bdd86d4
MD
164/*
165 * Enable UST tracepoint event for a channel from a UST session.
49d21f93 166 * We own filter_expression, filter, and exclusion.
2bdd86d4 167 */
7972aab2 168int event_ust_enable_tracepoint(struct ltt_ust_session *usess,
025faf73 169 struct ltt_ust_channel *uchan, struct lttng_event *event,
6b453b5e 170 char *filter_expression,
f1613f52 171 struct lttng_filter_bytecode *filter,
88f06f15
JG
172 struct lttng_event_exclusion *exclusion,
173 bool internal_event)
2bdd86d4 174{
f73fabfd 175 int ret = LTTNG_OK, to_create = 0;
edb67388
DG
176 struct ltt_ust_event *uevent;
177
0525e9ae
DG
178 assert(usess);
179 assert(uchan);
180 assert(event);
181
18eace3b
DG
182 rcu_read_lock();
183
025faf73 184 uevent = trace_ust_find_event(uchan->events, event->name, filter,
b953b8cd 185 event->loglevel_type, event->loglevel, exclusion);
87c6e328 186 if (!uevent) {
6b453b5e 187 uevent = trace_ust_create_event(event, filter_expression,
87c6e328 188 filter, exclusion, internal_event);
49d21f93
MD
189 /* We have passed ownership */
190 filter_expression = NULL;
191 filter = NULL;
192 exclusion = NULL;
edb67388 193 if (uevent == NULL) {
95a82664 194 ret = LTTNG_ERR_UST_ENABLE_FAIL;
edb67388
DG
195 goto error;
196 }
025faf73 197
fc34caaa 198 /* Valid to set it after the goto error since uevent is still NULL */
edb67388
DG
199 to_create = 1;
200 }
2bdd86d4 201
7f79d3a1
DG
202 if (uevent->enabled) {
203 /* It's already enabled so everything is OK */
5bcdda4f 204 ret = LTTNG_ERR_UST_EVENT_ENABLED;
7f79d3a1
DG
205 goto end;
206 }
207
fc34caaa
DG
208 uevent->enabled = 1;
209
7972aab2
DG
210 if (to_create) {
211 /* Create event on all UST registered apps for session */
212 ret = ust_app_create_event_glb(usess, uchan, uevent);
213 } else {
214 /* Enable event on all UST registered apps for session */
215 ret = ust_app_enable_event_glb(usess, uchan, uevent);
216 }
48842b30 217
7972aab2
DG
218 if (ret < 0) {
219 if (ret == -LTTNG_UST_ERR_EXIST) {
220 ret = LTTNG_ERR_UST_EVENT_EXIST;
221 goto end;
222 } else {
223 ret = LTTNG_ERR_UST_ENABLE_FAIL;
224 goto error;
edb67388 225 }
2bdd86d4 226 }
48842b30 227
7f79d3a1 228 if (to_create) {
fc34caaa 229 /* Add ltt ust event to channel */
18eace3b 230 add_unique_ust_event(uchan->events, uevent);
7f79d3a1 231 }
edb67388 232
7f79d3a1
DG
233 DBG("Event UST %s %s in channel %s", uevent->attr.name,
234 to_create ? "created" : "enabled", uchan->name);
235
f73fabfd 236 ret = LTTNG_OK;
fc34caaa 237
fb89d070 238end:
18eace3b 239 rcu_read_unlock();
49d21f93
MD
240 free(filter_expression);
241 free(filter);
242 free(exclusion);
fc34caaa 243 return ret;
edb67388
DG
244
245error:
fc34caaa
DG
246 /*
247 * Only destroy event on creation time (not enabling time) because if the
248 * event is found in the channel (to_create == 0), it means that at some
249 * point the enable_event worked and it's thus valid to keep it alive.
250 * Destroying it also implies that we also destroy it's shadow copy to sync
251 * everyone up.
252 */
253 if (to_create) {
254 /* In this code path, the uevent was not added to the hash table */
255 trace_ust_destroy_event(uevent);
256 }
18eace3b 257 rcu_read_unlock();
49d21f93
MD
258 free(filter_expression);
259 free(filter);
260 free(exclusion);
2bdd86d4
MD
261 return ret;
262}
263
7f79d3a1
DG
264/*
265 * Disable UST tracepoint of a channel from a UST session.
266 */
7972aab2 267int event_ust_disable_tracepoint(struct ltt_ust_session *usess,
7f79d3a1 268 struct ltt_ust_channel *uchan, char *event_name)
2bdd86d4
MD
269{
270 int ret;
7f79d3a1 271 struct ltt_ust_event *uevent;
18eace3b
DG
272 struct lttng_ht_node_str *node;
273 struct lttng_ht_iter iter;
18eace3b 274 struct lttng_ht *ht;
2bdd86d4 275
0525e9ae
DG
276 assert(usess);
277 assert(uchan);
278 assert(event_name);
279
18eace3b
DG
280 ht = uchan->events;
281
18eace3b 282 rcu_read_lock();
025faf73
DG
283
284 /*
285 * We use a custom lookup since we need the iterator for the next_duplicate
286 * call in the do while loop below.
287 */
288 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed),
289 trace_ust_ht_match_event_by_name, event_name, &iter.iter);
18eace3b
DG
290 node = lttng_ht_iter_get_node_str(&iter);
291 if (node == NULL) {
292 DBG2("Trace UST event NOT found by name %s", event_name);
f73fabfd 293 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
7f79d3a1 294 goto error;
2bdd86d4 295 }
7f79d3a1 296
18eace3b
DG
297 do {
298 uevent = caa_container_of(node, struct ltt_ust_event, node);
025faf73
DG
299 assert(uevent);
300
18eace3b
DG
301 if (uevent->enabled == 0) {
302 /* It's already disabled so everything is OK */
a1dcaf0f 303 goto next;
7f79d3a1 304 }
18eace3b 305
7972aab2
DG
306 ret = ust_app_disable_event_glb(usess, uchan, uevent);
307 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
308 ret = LTTNG_ERR_UST_DISABLE_FAIL;
18eace3b
DG
309 goto error;
310 }
18eace3b
DG
311 uevent->enabled = 0;
312
025faf73
DG
313 DBG2("Event UST %s disabled in channel %s", uevent->attr.name,
314 uchan->name);
315
a1dcaf0f 316next:
18eace3b
DG
317 /* Get next duplicate event by name. */
318 cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name,
319 event_name, &iter.iter);
320 node = lttng_ht_iter_get_node_str(&iter);
321 } while (node);
7f79d3a1 322
f73fabfd 323 ret = LTTNG_OK;
7f79d3a1 324
7f79d3a1 325error:
18eace3b 326 rcu_read_unlock();
7f79d3a1
DG
327 return ret;
328}
329
b1e7fe2d
JR
330/*
331 * Disable all UST tracepoints for a channel from a UST session.
332 */
333int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess,
334 struct ltt_ust_channel *uchan)
335{
3e81c0f2 336 int ret, i, size, error = 0;
b1e7fe2d
JR
337 struct lttng_ht_iter iter;
338 struct ltt_ust_event *uevent = NULL;
339 struct lttng_event *events = NULL;
340
341 assert(usess);
342 assert(uchan);
343
344 rcu_read_lock();
345
346 /* Disabling existing events */
347 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
348 node.node) {
349 if (uevent->enabled == 1) {
350 ret = event_ust_disable_tracepoint(usess, uchan,
351 uevent->attr.name);
352 if (ret < 0) {
3e81c0f2 353 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
354 continue;
355 }
356 }
357 }
358
359 /* Get all UST available events */
360 size = ust_app_list_events(&events);
361 if (size < 0) {
362 ret = LTTNG_ERR_UST_LIST_FAIL;
363 goto error;
364 }
365
366 for (i = 0; i < size; i++) {
367 ret = event_ust_disable_tracepoint(usess, uchan,
368 events[i].name);
3e81c0f2 369 if (ret < 0) {
b1e7fe2d 370 /* Continue to disable the rest... */
3e81c0f2 371 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
372 continue;
373 }
374 }
375
3e81c0f2 376 ret = error ? error : LTTNG_OK;
b1e7fe2d
JR
377error:
378 rcu_read_unlock();
379 free(events);
380 return ret;
381}
382
f20baf8e 383/*
022d91ba 384 * Enable all agent event for a given UST session.
f20baf8e
DG
385 *
386 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
387 */
022d91ba 388int event_agent_enable_all(struct ltt_ust_session *usess,
fefd409b 389 struct agent *agt, struct lttng_event *event,
51755dc8 390 struct lttng_filter_bytecode *filter ,char *filter_expression)
f20baf8e
DG
391{
392 int ret;
fefd409b 393 struct agent_event *aevent;
f20baf8e
DG
394 struct lttng_ht_iter iter;
395
396 assert(usess);
397
022d91ba 398 DBG("Event agent enabling ALL events for session %" PRIu64, usess->id);
f20baf8e 399
022d91ba 400 /* Enable event on agent application through TCP socket. */
8404118c 401 ret = event_agent_enable(usess, agt, event, filter, filter_expression);
f20baf8e
DG
402 if (ret != LTTNG_OK) {
403 goto error;
404 }
405
406 /* Flag every event that they are now enabled. */
407 rcu_read_lock();
fefd409b 408 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 409 node.node) {
fefd409b 410 aevent->enabled = 1;
f20baf8e
DG
411 }
412 rcu_read_unlock();
413
414 ret = LTTNG_OK;
415
416error:
417 return ret;
418}
419
420/*
022d91ba 421 * Enable a single agent event for a given UST session.
f20baf8e
DG
422 *
423 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
424 */
fefd409b
DG
425int event_agent_enable(struct ltt_ust_session *usess,
426 struct agent *agt, struct lttng_event *event,
8404118c
JG
427 struct lttng_filter_bytecode *filter,
428 char *filter_expression)
f20baf8e
DG
429{
430 int ret, created = 0;
fefd409b 431 struct agent_event *aevent;
f20baf8e
DG
432
433 assert(usess);
434 assert(event);
fefd409b 435 assert(agt);
f20baf8e 436
022d91ba 437 DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d "
51755dc8
JG
438 ", loglevel %d and filter \"%s\"", event->name,
439 usess->id, event->loglevel_type, event->loglevel,
440 filter_expression ? filter_expression : "NULL");
f20baf8e 441
a9319624
PP
442 aevent = agent_find_event(event->name, event->loglevel_type,
443 event->loglevel, agt);
fefd409b 444 if (!aevent) {
a9319624
PP
445 aevent = agent_create_event(event->name, event->loglevel_type,
446 event->loglevel, filter,
51755dc8 447 filter_expression);
fefd409b 448 if (!aevent) {
f20baf8e
DG
449 ret = LTTNG_ERR_NOMEM;
450 goto error;
451 }
452 created = 1;
453 }
454
455 /* Already enabled? */
fefd409b 456 if (aevent->enabled) {
f20baf8e
DG
457 goto end;
458 }
459
fefd409b 460 ret = agent_enable_event(aevent, agt->domain);
f20baf8e
DG
461 if (ret != LTTNG_OK) {
462 goto error;
463 }
464
465 /* If the event was created prior to the enable, add it to the domain. */
466 if (created) {
fefd409b 467 agent_add_event(aevent, agt);
f20baf8e
DG
468 }
469
470end:
471 return LTTNG_OK;
472
473error:
474 if (created) {
fefd409b 475 agent_destroy_event(aevent);
f20baf8e
DG
476 }
477 return ret;
478}
479
da6c3a50 480/*
d1ec8e20
JG
481 * Return the default event name associated with the provided UST domain. Return
482 * NULL on error.
da6c3a50
DG
483 */
484const char *event_get_default_agent_ust_name(enum lttng_domain_type domain)
485{
486 const char *default_event_name = NULL;
487
0e115563
DG
488 switch (domain) {
489 case LTTNG_DOMAIN_LOG4J:
d1ec8e20 490 default_event_name = DEFAULT_LOG4J_EVENT_NAME;
0e115563
DG
491 break;
492 case LTTNG_DOMAIN_JUL:
d1ec8e20 493 default_event_name = DEFAULT_JUL_EVENT_NAME;
0e115563
DG
494 break;
495 case LTTNG_DOMAIN_PYTHON:
e7c82272 496 default_event_name = DEFAULT_PYTHON_EVENT_NAME;
0e115563
DG
497 break;
498 default:
da6c3a50
DG
499 assert(0);
500 }
501
502 return default_event_name;
503}
504
f20baf8e 505/*
e261a6cc 506 * Disable a given agent event for a given UST session.
f20baf8e 507 *
e261a6cc 508 * Must be called with the RCU read lock held.
f20baf8e
DG
509 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
510 */
e261a6cc
PP
511static int event_agent_disable_one(struct ltt_ust_session *usess,
512 struct agent *agt, struct agent_event *aevent)
f20baf8e
DG
513{
514 int ret;
be6a6276
DG
515 struct ltt_ust_event *uevent = NULL;
516 struct ltt_ust_channel *uchan = NULL;
71aecbf8 517 const char *ust_event_name, *ust_channel_name;
f20baf8e 518
fefd409b 519 assert(agt);
f20baf8e 520 assert(usess);
e261a6cc 521 assert(aevent);
f20baf8e 522
e261a6cc
PP
523 DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for session %" PRIu64,
524 aevent->name, aevent->loglevel_type, aevent->loglevel_value,
525 usess->id);
f20baf8e
DG
526
527 /* Already disabled? */
fefd409b 528 if (!aevent->enabled) {
f20baf8e
DG
529 goto end;
530 }
531
71aecbf8
DG
532 if (agt->domain == LTTNG_DOMAIN_JUL) {
533 ust_channel_name = DEFAULT_JUL_CHANNEL_NAME;
534 } else if (agt->domain == LTTNG_DOMAIN_LOG4J) {
535 ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME;
0e115563
DG
536 } else if (agt->domain == LTTNG_DOMAIN_PYTHON) {
537 ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME;
71aecbf8
DG
538 } else {
539 ret = LTTNG_ERR_INVALID;
540 goto error;
541 }
542
be6a6276
DG
543 /*
544 * Disable it on the UST side. First get the channel reference then find
545 * the event and finally disable it.
546 */
547 uchan = trace_ust_find_channel_by_name(usess->domain_global.channels,
71aecbf8 548 (char *) ust_channel_name);
be6a6276
DG
549 if (!uchan) {
550 ret = LTTNG_ERR_UST_CHAN_NOT_FOUND;
551 goto error;
552 }
553
da6c3a50
DG
554 ust_event_name = event_get_default_agent_ust_name(agt->domain);
555 if (!ust_event_name) {
556 ret = LTTNG_ERR_FATAL;
557 goto error;
be6a6276
DG
558 }
559
560 /*
b953b8cd
PP
561 * Agent UST event has its loglevel type forced to
562 * LTTNG_UST_LOGLEVEL_ALL. The actual loglevel type/value filtering
563 * happens thanks to an UST filter. The following -1 is actually
564 * ignored since the type is LTTNG_UST_LOGLEVEL_ALL.
be6a6276 565 */
da6c3a50 566 uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name,
b953b8cd 567 aevent->filter, LTTNG_UST_LOGLEVEL_ALL, -1, NULL);
022d91ba 568 /* If the agent event exists, it must be available on the UST side. */
be6a6276
DG
569 assert(uevent);
570
571 ret = ust_app_disable_event_glb(usess, uchan, uevent);
572 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
573 ret = LTTNG_ERR_UST_DISABLE_FAIL;
574 goto error;
575 }
576
0dcfcf94
DG
577 /*
578 * Flag event that it's disabled so the shadow copy on the ust app side
579 * will disable it if an application shows up.
580 */
581 uevent->enabled = 0;
582
fefd409b 583 ret = agent_disable_event(aevent, agt->domain);
f20baf8e
DG
584 if (ret != LTTNG_OK) {
585 goto error;
586 }
587
588end:
589 return LTTNG_OK;
590
591error:
592 return ret;
593}
e261a6cc
PP
594
595/*
596 * Disable all agent events matching a given name for a given UST session.
597 *
598 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
599 */
600int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt,
601 char *event_name)
602{
603 int ret = LTTNG_OK;
604 struct agent_event *aevent;
605 struct lttng_ht_iter iter;
606 struct lttng_ht_node_str *node;
607
608 assert(agt);
609 assert(usess);
610 assert(event_name);
611
612 DBG("Event agent disabling %s (all loglevels) for session %" PRIu64, event_name, usess->id);
613
614 rcu_read_lock();
615 agent_find_events_by_name(event_name, agt, &iter);
616 node = lttng_ht_iter_get_node_str(&iter);
617
618 if (node == NULL) {
619 DBG2("Event agent NOT found by name %s", event_name);
620 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
621 goto end;
622 }
623
624 do {
625 aevent = caa_container_of(node, struct agent_event, node);
626 ret = event_agent_disable_one(usess, agt, aevent);
627
628 if (ret != LTTNG_OK) {
629 goto end;
630 }
631
632 /* Get next duplicate agent event by name. */
633 agent_event_next_duplicate(event_name, agt, &iter);
634 node = lttng_ht_iter_get_node_str(&iter);
635 } while (node);
636end:
637 rcu_read_unlock();
638 return ret;
639}
f20baf8e 640/*
022d91ba 641 * Disable all agent event for a given UST session.
f20baf8e
DG
642 *
643 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
644 */
fefd409b
DG
645int event_agent_disable_all(struct ltt_ust_session *usess,
646 struct agent *agt)
f20baf8e 647{
0dcfcf94 648 int ret;
fefd409b 649 struct agent_event *aevent;
f20baf8e
DG
650 struct lttng_ht_iter iter;
651
fefd409b 652 assert(agt);
f20baf8e
DG
653 assert(usess);
654
0dcfcf94
DG
655 /*
656 * Disable event on agent application. Continue to disable all other events
657 * if the * event is not found.
658 */
fefd409b 659 ret = event_agent_disable(usess, agt, "*");
0dcfcf94
DG
660 if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) {
661 goto error;
f20baf8e
DG
662 }
663
b9866e08 664 /* Disable every event. */
f20baf8e 665 rcu_read_lock();
fefd409b 666 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 667 node.node) {
0dcfcf94
DG
668 if (!aevent->enabled) {
669 continue;
670 }
671
672 ret = event_agent_disable(usess, agt, aevent->name);
673 if (ret != LTTNG_OK) {
b9866e08 674 goto error_unlock;
f20baf8e 675 }
f20baf8e 676 }
f20baf8e
DG
677 ret = LTTNG_OK;
678
b9866e08
JG
679error_unlock:
680 rcu_read_unlock();
f20baf8e
DG
681error:
682 return ret;
683}
This page took 0.087446 seconds and 5 git commands to generate.