Fix: trace_ust_destroy_metadata should check for NULL pointer
[lttng-tools.git] / src / bin / lttng / commands / enable_events.c
CommitLineData
f3ed775e
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 *
d14d33bf
AM
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
f3ed775e
DG
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
d14d33bf
AM
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
f3ed775e
DG
16 */
17
18#define _GNU_SOURCE
19#include <popt.h>
20#include <stdio.h>
21#include <stdlib.h>
22#include <string.h>
23#include <sys/stat.h>
24#include <sys/types.h>
25#include <unistd.h>
5a0de755 26#include <inttypes.h>
8f0d098b 27#include <ctype.h>
f3ed775e 28
c399183f 29#include "../command.h"
f3ed775e
DG
30
31static char *opt_event_list;
32static int opt_event_type;
0cda4f28
MD
33static const char *opt_loglevel;
34static int opt_loglevel_type;
6181537c 35static int opt_kernel;
5440dc42 36static char *opt_session_name;
f3ed775e
DG
37static int opt_userspace;
38static int opt_enable_all;
cf0e5467 39static char *opt_probe;
8f0d098b
MD
40static char *opt_function;
41static char *opt_function_entry_symbol;
f3ed775e 42static char *opt_channel_name;
d78d6610
DG
43#if 0
44/* Not implemented yet */
45static char *opt_cmd_name;
46static pid_t opt_pid;
47#endif
f3ed775e
DG
48
49enum {
50 OPT_HELP = 1,
f3ed775e 51 OPT_TRACEPOINT,
cf0e5467 52 OPT_PROBE,
f3ed775e 53 OPT_FUNCTION,
8f0d098b 54 OPT_FUNCTION_ENTRY,
a54bd42d 55 OPT_SYSCALL,
eeac7d46 56 OPT_USERSPACE,
0cda4f28
MD
57 OPT_LOGLEVEL,
58 OPT_LOGLEVEL_ONLY,
679b4943 59 OPT_LIST_OPTIONS,
f3ed775e
DG
60};
61
cd80958d
DG
62static struct lttng_handle *handle;
63
f3ed775e
DG
64static struct poptOption long_options[] = {
65 /* longName, shortName, argInfo, argPtr, value, descrip, argDesc */
66 {"help", 'h', POPT_ARG_NONE, 0, OPT_HELP, 0, 0},
5440dc42 67 {"session", 's', POPT_ARG_STRING, &opt_session_name, 0, 0, 0},
e14f64a8 68 {"all", 'a', POPT_ARG_VAL, &opt_enable_all, 1, 0, 0},
f3ed775e
DG
69 {"channel", 'c', POPT_ARG_STRING, &opt_channel_name, 0, 0, 0},
70 {"kernel", 'k', POPT_ARG_VAL, &opt_kernel, 1, 0, 0},
d78d6610
DG
71#if 0
72 /* Not implemented yet */
40e9d5d3 73 {"userspace", 'u', POPT_ARG_STRING | POPT_ARGFLAG_OPTIONAL, &opt_cmd_name, OPT_USERSPACE, 0, 0},
f3ed775e 74 {"pid", 'p', POPT_ARG_INT, &opt_pid, 0, 0, 0},
d78d6610
DG
75#else
76 {"userspace", 'u', POPT_ARG_NONE, 0, OPT_USERSPACE, 0, 0},
77#endif
f3ed775e 78 {"tracepoint", 0, POPT_ARG_NONE, 0, OPT_TRACEPOINT, 0, 0},
7ebae521 79 {"probe", 0, POPT_ARG_STRING, &opt_probe, OPT_PROBE, 0, 0},
40e9d5d3 80 {"function", 0, POPT_ARG_STRING, &opt_function, OPT_FUNCTION, 0, 0},
b213d387
MD
81#if 0
82 /*
83 * Currently removed from lttng kernel tracer. Removed from
84 * lttng UI to discourage its use.
85 */
40e9d5d3 86 {"function:entry", 0, POPT_ARG_STRING, &opt_function_entry_symbol, OPT_FUNCTION_ENTRY, 0, 0},
b213d387 87#endif
7ebae521 88 {"syscall", 0, POPT_ARG_NONE, 0, OPT_SYSCALL, 0, 0},
0cda4f28
MD
89 {"loglevel", 0, POPT_ARG_STRING, 0, OPT_LOGLEVEL, 0, 0},
90 {"loglevel-only", 0, POPT_ARG_STRING, 0, OPT_LOGLEVEL_ONLY, 0, 0},
679b4943 91 {"list-options", 0, POPT_ARG_NONE, NULL, OPT_LIST_OPTIONS, NULL, NULL},
f3ed775e
DG
92 {0, 0, 0, 0, 0, 0, 0}
93};
94
95/*
96 * usage
97 */
98static void usage(FILE *ofp)
99{
100 fprintf(ofp, "usage: lttng enable-event NAME[,NAME2,...] [options] [event_options]\n");
101 fprintf(ofp, "\n");
102 fprintf(ofp, " -h, --help Show this help\n");
679b4943 103 fprintf(ofp, " --list-options Simple listing of options\n");
27221701
DG
104 fprintf(ofp, " -s, --session Apply to session name\n");
105 fprintf(ofp, " -c, --channel Apply to this channel\n");
e08bff8d 106 fprintf(ofp, " -a, --all Enable all tracepoints and syscalls\n");
f3ed775e 107 fprintf(ofp, " -k, --kernel Apply for the kernel tracer\n");
d78d6610 108#if 0
27221701 109 fprintf(ofp, " -u, --userspace [CMD] Apply to the user-space tracer\n");
e14f64a8
DG
110 fprintf(ofp, " If no CMD, the domain used is UST global\n");
111 fprintf(ofp, " or else the domain is UST EXEC_NAME\n");
112 fprintf(ofp, " -p, --pid PID If -u, apply to specific PID (domain: UST PID)\n");
d78d6610 113#else
27221701 114 fprintf(ofp, " -u, --userspace Apply to the user-space tracer\n");
d78d6610 115#endif
f3ed775e
DG
116 fprintf(ofp, "\n");
117 fprintf(ofp, "Event options:\n");
118 fprintf(ofp, " --tracepoint Tracepoint event (default)\n");
be49af1e
MD
119 fprintf(ofp, " - userspace tracer supports wildcards at end of string.\n");
120 fprintf(ofp, " Don't forget to quote to deal with bash expansion.\n");
121 fprintf(ofp, " e.g.:\n");
122 fprintf(ofp, " \"*\"\n");
123 fprintf(ofp, " \"app_component:na*\"\n");
8f0d098b 124 fprintf(ofp, " --probe [addr | symbol | symbol+offset]\n");
cf0e5467
MD
125 fprintf(ofp, " Dynamic probe.\n");
126 fprintf(ofp, " Addr and offset can be octal (0NNN...),\n");
127 fprintf(ofp, " decimal (NNN...) or hexadecimal (0xNNN...)\n");
8f0d098b
MD
128 fprintf(ofp, " --function [addr | symbol | symbol+offset]\n");
129 fprintf(ofp, " Dynamic function entry/return probe.\n");
130 fprintf(ofp, " Addr and offset can be octal (0NNN...),\n");
131 fprintf(ofp, " decimal (NNN...) or hexadecimal (0xNNN...)\n");
b213d387 132#if 0
8f0d098b
MD
133 fprintf(ofp, " --function:entry symbol\n");
134 fprintf(ofp, " Function tracer event\n");
b213d387 135#endif
a54bd42d 136 fprintf(ofp, " --syscall System call event\n");
f3ed775e 137 fprintf(ofp, "\n");
300b8fd5
MD
138 fprintf(ofp, " --loglevel name\n");
139 fprintf(ofp, " Tracepoint loglevel range from 0 to loglevel\n");
140 fprintf(ofp, " --loglevel-only name\n");
141 fprintf(ofp, " Tracepoint loglevel (only this loglevel)\n");
142 fprintf(ofp, "\n");
0c8477c8
MD
143 fprintf(ofp, " The loglevel or loglevel-only options should be\n");
144 fprintf(ofp, " combined with a tracepoint name or tracepoint\n");
145 fprintf(ofp, " wildcard.\n");
146 fprintf(ofp, " Available loglevels:\n");
147 fprintf(ofp, " (higher value is more verbose)\n");
46839cc2
MD
148 fprintf(ofp, " TRACE_EMERG = 0\n");
149 fprintf(ofp, " TRACE_ALERT = 1\n");
150 fprintf(ofp, " TRACE_CRIT = 2\n");
151 fprintf(ofp, " TRACE_ERR = 3\n");
152 fprintf(ofp, " TRACE_WARNING = 4\n");
153 fprintf(ofp, " TRACE_NOTICE = 5\n");
154 fprintf(ofp, " TRACE_INFO = 6\n");
155 fprintf(ofp, " TRACE_DEBUG_SYSTEM = 7\n");
156 fprintf(ofp, " TRACE_DEBUG_PROGRAM = 8\n");
157 fprintf(ofp, " TRACE_DEBUG_PROCESS = 9\n");
158 fprintf(ofp, " TRACE_DEBUG_MODULE = 10\n");
159 fprintf(ofp, " TRACE_DEBUG_UNIT = 11\n");
160 fprintf(ofp, " TRACE_DEBUG_FUNCTION = 12\n");
161 fprintf(ofp, " TRACE_DEBUG_LINE = 13\n");
162 fprintf(ofp, " TRACE_DEBUG = 14\n");
163 fprintf(ofp, " (shortcuts such as \"system\" are allowed)\n");
300b8fd5 164 fprintf(ofp, "\n");
f3ed775e
DG
165}
166
0d63dd19 167/*
6181537c 168 * Parse probe options.
0d63dd19 169 */
cf0e5467 170static int parse_probe_opts(struct lttng_event *ev, char *opt)
0d63dd19
DG
171{
172 int ret;
8ff0bbd0 173 char s_hex[19];
0d63dd19
DG
174 char name[LTTNG_SYMBOL_NAME_LEN];
175
176 if (opt == NULL) {
177 ret = -1;
8f0d098b 178 goto end;
0d63dd19
DG
179 }
180
181 /* Check for symbol+offset */
8ff0bbd0 182 ret = sscanf(opt, "%[^'+']+%s", name, s_hex);
0d63dd19 183 if (ret == 2) {
7d29a247 184 strncpy(ev->attr.probe.symbol_name, name, LTTNG_SYMBOL_NAME_LEN);
99497cd0 185 ev->attr.probe.symbol_name[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
cf0e5467 186 DBG("probe symbol %s", ev->attr.probe.symbol_name);
8ff0bbd0
DG
187 if (strlen(s_hex) == 0) {
188 ERR("Invalid probe offset %s", s_hex);
0d63dd19 189 ret = -1;
8f0d098b 190 goto end;
0d63dd19 191 }
8ff0bbd0 192 ev->attr.probe.offset = strtoul(s_hex, NULL, 0);
cf0e5467 193 DBG("probe offset %" PRIu64, ev->attr.probe.offset);
3000dc78 194 ev->attr.probe.addr = 0;
8f0d098b
MD
195 goto end;
196 }
197
198 /* Check for symbol */
199 if (isalpha(name[0])) {
200 ret = sscanf(opt, "%s", name);
201 if (ret == 1) {
202 strncpy(ev->attr.probe.symbol_name, name, LTTNG_SYMBOL_NAME_LEN);
99497cd0 203 ev->attr.probe.symbol_name[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
8f0d098b
MD
204 DBG("probe symbol %s", ev->attr.probe.symbol_name);
205 ev->attr.probe.offset = 0;
206 DBG("probe offset %" PRIu64, ev->attr.probe.offset);
207 ev->attr.probe.addr = 0;
208 goto end;
209 }
0d63dd19
DG
210 }
211
212 /* Check for address */
8ff0bbd0 213 ret = sscanf(opt, "%s", s_hex);
0d63dd19 214 if (ret > 0) {
8ff0bbd0
DG
215 if (strlen(s_hex) == 0) {
216 ERR("Invalid probe address %s", s_hex);
0d63dd19 217 ret = -1;
8f0d098b 218 goto end;
0d63dd19 219 }
8ff0bbd0 220 ev->attr.probe.addr = strtoul(s_hex, NULL, 0);
cf0e5467 221 DBG("probe addr %" PRIu64, ev->attr.probe.addr);
3000dc78
DG
222 ev->attr.probe.offset = 0;
223 memset(ev->attr.probe.symbol_name, 0, LTTNG_SYMBOL_NAME_LEN);
8f0d098b 224 goto end;
0d63dd19
DG
225 }
226
227 /* No match */
228 ret = -1;
229
8f0d098b 230end:
0d63dd19
DG
231 return ret;
232}
233
8005f29a 234/*
0c8477c8 235 * Maps loglevel from string to value
8005f29a
MD
236 */
237static
46839cc2 238int loglevel_str_to_value(const char *inputstr)
8005f29a 239{
46839cc2
MD
240 int i = 0;
241 char str[LTTNG_SYMBOL_NAME_LEN];
242
243 while (inputstr[i] != '\0' && i < LTTNG_SYMBOL_NAME_LEN) {
244 str[i] = toupper(inputstr[i]);
245 i++;
246 }
247 str[i] = '\0';
248 if (!strcmp(str, "TRACE_EMERG") || !strcmp(str, "EMERG")) {
249 return LTTNG_LOGLEVEL_EMERG;
250 } else if (!strcmp(str, "TRACE_ALERT") || !strcmp(str, "ALERT")) {
251 return LTTNG_LOGLEVEL_ALERT;
252 } else if (!strcmp(str, "TRACE_CRIT") || !strcmp(str, "CRIT")) {
253 return LTTNG_LOGLEVEL_CRIT;
254 } else if (!strcmp(str, "TRACE_ERR") || !strcmp(str, "ERR")) {
255 return LTTNG_LOGLEVEL_ERR;
256 } else if (!strcmp(str, "TRACE_WARNING") || !strcmp(str, "WARNING")) {
257 return LTTNG_LOGLEVEL_WARNING;
258 } else if (!strcmp(str, "TRACE_NOTICE") || !strcmp(str, "NOTICE")) {
259 return LTTNG_LOGLEVEL_NOTICE;
260 } else if (!strcmp(str, "TRACE_INFO") || !strcmp(str, "INFO")) {
261 return LTTNG_LOGLEVEL_INFO;
262 } else if (!strcmp(str, "TRACE_DEBUG_SYSTEM") || !strcmp(str, "DEBUG_SYSTEM") || !strcmp(str, "SYSTEM")) {
263 return LTTNG_LOGLEVEL_DEBUG_SYSTEM;
264 } else if (!strcmp(str, "TRACE_DEBUG_PROGRAM") || !strcmp(str, "DEBUG_PROGRAM") || !strcmp(str, "PROGRAM")) {
265 return LTTNG_LOGLEVEL_DEBUG_PROGRAM;
266 } else if (!strcmp(str, "TRACE_DEBUG_PROCESS") || !strcmp(str, "DEBUG_PROCESS") || !strcmp(str, "PROCESS")) {
267 return LTTNG_LOGLEVEL_DEBUG_PROCESS;
268 } else if (!strcmp(str, "TRACE_DEBUG_MODULE") || !strcmp(str, "DEBUG_MODULE") || !strcmp(str, "MODULE")) {
269 return LTTNG_LOGLEVEL_DEBUG_MODULE;
270 } else if (!strcmp(str, "TRACE_DEBUG_UNIT") || !strcmp(str, "DEBUG_UNIT") || !strcmp(str, "UNIT")) {
271 return LTTNG_LOGLEVEL_DEBUG_UNIT;
272 } else if (!strcmp(str, "TRACE_DEBUG_FUNCTION") || !strcmp(str, "DEBUG_FUNCTION") || !strcmp(str, "FUNCTION")) {
273 return LTTNG_LOGLEVEL_DEBUG_FUNCTION;
274 } else if (!strcmp(str, "TRACE_DEBUG_LINE") || !strcmp(str, "DEBUG_LINE") || !strcmp(str, "LINE")) {
275 return LTTNG_LOGLEVEL_DEBUG_LINE;
276 } else if (!strcmp(str, "TRACE_DEBUG") || !strcmp(str, "DEBUG")) {
277 return LTTNG_LOGLEVEL_DEBUG;
8005f29a
MD
278 } else {
279 return -1;
280 }
281}
282
f3ed775e 283/*
6181537c 284 * Enabling event using the lttng API.
f3ed775e 285 */
cd80958d 286static int enable_events(char *session_name)
f3ed775e 287{
ae856491 288 int err, ret = CMD_SUCCESS, warn = 0;
b73d0b29 289 char *event_name, *channel_name = NULL;
f3ed775e 290 struct lttng_event ev;
7d29a247 291 struct lttng_domain dom;
f3ed775e 292
441c16a7
MD
293 memset(&ev, 0, sizeof(ev));
294 memset(&dom, 0, sizeof(dom));
295
7d29a247
DG
296 /* Create lttng domain */
297 if (opt_kernel) {
298 dom.type = LTTNG_DOMAIN_KERNEL;
d78d6610 299 } else if (opt_userspace) {
2bdd86d4 300 dom.type = LTTNG_DOMAIN_UST;
6181537c 301 } else {
e14f64a8 302 ERR("Please specify a tracer (-k/--kernel or -u/--userspace)");
d16c1a4c 303 ret = CMD_ERROR;
6181537c 304 goto error;
2bdd86d4 305 }
7d29a247 306
ae856491
DG
307 if (opt_channel_name == NULL) {
308 err = asprintf(&channel_name, DEFAULT_CHANNEL_NAME);
309 if (err < 0) {
310 ret = CMD_FATAL;
311 goto error;
312 }
313 } else {
314 channel_name = opt_channel_name;
315 }
316
cd80958d
DG
317 handle = lttng_create_handle(session_name, &dom);
318 if (handle == NULL) {
319 ret = -1;
320 goto error;
321 }
1aef21b6 322
cd80958d 323 if (opt_enable_all) {
8c9ae521 324 /* Default setup for enable all */
75e8c5ab
MD
325 if (opt_kernel) {
326 ev.type = opt_event_type;
327 ev.name[0] = '\0';
300b8fd5
MD
328 /* kernel loglevels not implemented */
329 ev.loglevel_type = LTTNG_EVENT_LOGLEVEL_ALL;
75e8c5ab
MD
330 } else {
331 ev.type = LTTNG_EVENT_TRACEPOINT;
332 strcpy(ev.name, "*");
300b8fd5
MD
333 ev.loglevel_type = opt_loglevel_type;
334 if (opt_loglevel) {
335 ev.loglevel = loglevel_str_to_value(opt_loglevel);
336 if (ev.loglevel == -1) {
337 ERR("Unknown loglevel %s", opt_loglevel);
338 ret = -1;
339 goto error;
340 }
22e25b71
MD
341 } else {
342 ev.loglevel = -1;
300b8fd5 343 }
75e8c5ab 344 }
8c9ae521
DG
345
346 ret = lttng_enable_event(handle, &ev, channel_name);
347 if (ret < 0) {
348 goto error;
349 }
350
0133c199
MD
351 switch (opt_event_type) {
352 case LTTNG_EVENT_TRACEPOINT:
57064ada
MD
353 if (opt_loglevel) {
354 MSG("All %s tracepoints are enabled in channel %s for loglevel %s",
355 opt_kernel ? "kernel" : "UST", channel_name,
356 opt_loglevel);
357 } else {
358 MSG("All %s tracepoints are enabled in channel %s",
359 opt_kernel ? "kernel" : "UST", channel_name);
360
361 }
0133c199 362 break;
a54bd42d 363 case LTTNG_EVENT_SYSCALL:
0133c199 364 if (opt_kernel) {
8c9ae521
DG
365 MSG("All kernel system calls are enabled in channel %s",
366 channel_name);
c93d9daf 367 }
0133c199 368 break;
7a3d1328 369 case LTTNG_EVENT_ALL:
57064ada
MD
370 if (opt_loglevel) {
371 MSG("All %s events are enabled in channel %s for loglevel %s",
372 opt_kernel ? "kernel" : "UST", channel_name,
373 opt_loglevel);
374 } else {
375 MSG("All %s events are enabled in channel %s",
376 opt_kernel ? "kernel" : "UST", channel_name);
377 }
7a3d1328 378 break;
0133c199 379 default:
8c9ae521 380 /*
6181537c
DG
381 * We should not be here since lttng_enable_event should have
382 * failed on the event type.
8c9ae521 383 */
f3ed775e
DG
384 goto error;
385 }
8c9ae521 386 goto end;
f3ed775e
DG
387 }
388
389 /* Strip event list */
390 event_name = strtok(opt_event_list, ",");
391 while (event_name != NULL) {
6181537c
DG
392 /* Copy name and type of the event */
393 strncpy(ev.name, event_name, LTTNG_SYMBOL_NAME_LEN);
394 ev.name[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
395 ev.type = opt_event_type;
396
f3ed775e
DG
397 /* Kernel tracer action */
398 if (opt_kernel) {
399 DBG("Enabling kernel event %s for channel %s",
400 event_name, channel_name);
f3ed775e
DG
401
402 switch (opt_event_type) {
7a3d1328
MD
403 case LTTNG_EVENT_ALL: /* Default behavior is tracepoint */
404 ev.type = LTTNG_EVENT_TRACEPOINT;
405 /* Fall-through */
e6ddca71 406 case LTTNG_EVENT_TRACEPOINT:
f3ed775e 407 break;
7d29a247 408 case LTTNG_EVENT_PROBE:
cf0e5467 409 ret = parse_probe_opts(&ev, opt_probe);
0d63dd19 410 if (ret < 0) {
cf0e5467 411 ERR("Unable to parse probe options");
0d63dd19
DG
412 ret = 0;
413 goto error;
414 }
f3ed775e
DG
415 break;
416 case LTTNG_EVENT_FUNCTION:
8f0d098b
MD
417 ret = parse_probe_opts(&ev, opt_function);
418 if (ret < 0) {
419 ERR("Unable to parse function probe options");
420 ret = 0;
421 goto error;
422 }
423 break;
424 case LTTNG_EVENT_FUNCTION_ENTRY:
6181537c
DG
425 strncpy(ev.attr.ftrace.symbol_name, opt_function_entry_symbol,
426 LTTNG_SYMBOL_NAME_LEN);
99497cd0 427 ev.attr.ftrace.symbol_name[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
f3ed775e 428 break;
a54bd42d 429 case LTTNG_EVENT_SYSCALL:
6181537c
DG
430 MSG("per-syscall selection not supported yet. Use \"-a\" "
431 "for all syscalls.");
f3ed775e 432 default:
1ab1ea0b 433 ret = CMD_UNDEFINED;
f3ed775e
DG
434 goto error;
435 }
0cda4f28 436
ed7f4083 437 if (opt_loglevel) {
0cda4f28
MD
438 MSG("Kernel loglevels are not supported.");
439 ret = CMD_UNDEFINED;
440 goto error;
441 }
442
443 /* kernel loglevels not implemented */
8005f29a 444 ev.loglevel_type = LTTNG_EVENT_LOGLEVEL_ALL;
f3ed775e 445 } else if (opt_userspace) { /* User-space tracer action */
d78d6610 446#if 0
e14f64a8
DG
447 if (opt_cmd_name != NULL || opt_pid) {
448 MSG("Only supporting tracing all UST processes (-u) for now.");
1ab1ea0b 449 ret = CMD_UNDEFINED;
2bdd86d4
MD
450 goto error;
451 }
d78d6610 452#endif
6181537c 453
300b8fd5
MD
454 DBG("Enabling UST event %s for channel %s, loglevel %s", event_name,
455 channel_name, opt_loglevel ? : "<all>");
2bdd86d4
MD
456
457 switch (opt_event_type) {
458 case LTTNG_EVENT_ALL: /* Default behavior is tracepoint */
2bdd86d4
MD
459 /* Fall-through */
460 case LTTNG_EVENT_TRACEPOINT:
e4baff1e
MD
461 /* Copy name and type of the event */
462 ev.type = LTTNG_EVENT_TRACEPOINT;
463 strncpy(ev.name, event_name, LTTNG_SYMBOL_NAME_LEN);
464 ev.name[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
2bdd86d4
MD
465 break;
466 case LTTNG_EVENT_PROBE:
467 case LTTNG_EVENT_FUNCTION:
468 case LTTNG_EVENT_FUNCTION_ENTRY:
469 case LTTNG_EVENT_SYSCALL:
470 default:
cc62c0c0 471 ERR("Event type not available for user-space tracing");
1ab1ea0b 472 ret = CMD_UNDEFINED;
2bdd86d4
MD
473 goto error;
474 }
0cda4f28
MD
475
476 ev.loglevel_type = opt_loglevel_type;
ed7f4083 477 if (opt_loglevel) {
8005f29a
MD
478 ev.loglevel = loglevel_str_to_value(opt_loglevel);
479 if (ev.loglevel == -1) {
480 ERR("Unknown loglevel %s", opt_loglevel);
300b8fd5 481 ret = -1;
8005f29a
MD
482 goto error;
483 }
22e25b71
MD
484 } else {
485 ev.loglevel = -1;
ed7f4083 486 }
f3ed775e 487 } else {
e14f64a8 488 ERR("Please specify a tracer (-k/--kernel or -u/--userspace)");
300b8fd5 489 ret = CMD_ERROR;
f3ed775e
DG
490 goto error;
491 }
492
6181537c 493 ret = lttng_enable_event(handle, &ev, channel_name);
ae856491
DG
494 if (ret < 0) {
495 ERR("Event %s: %s (channel %s, session %s)", event_name,
496 lttng_strerror(ret), channel_name, session_name);
497 warn = 1;
498 } else {
6181537c
DG
499 MSG("%s event %s created in channel %s",
500 opt_kernel ? "kernel": "UST", event_name, channel_name);
501 }
502
f3ed775e
DG
503 /* Next event */
504 event_name = strtok(NULL, ",");
505 }
506
8c9ae521 507end:
f3ed775e 508error:
ae856491
DG
509 if (warn) {
510 ret = CMD_WARNING;
511 }
b73d0b29
MD
512 if (opt_channel_name == NULL) {
513 free(channel_name);
514 }
cd80958d
DG
515 lttng_destroy_handle(handle);
516
f3ed775e
DG
517 return ret;
518}
519
520/*
6181537c 521 * Add event to trace session
f3ed775e
DG
522 */
523int cmd_enable_events(int argc, const char **argv)
524{
ca1c3607 525 int opt, ret = CMD_SUCCESS;
f3ed775e 526 static poptContext pc;
cd80958d 527 char *session_name = NULL;
f3ed775e
DG
528
529 pc = poptGetContext(NULL, argc, argv, long_options, 0);
530 poptReadDefaultConfig(pc, 0);
531
532 /* Default event type */
7a3d1328 533 opt_event_type = LTTNG_EVENT_ALL;
f3ed775e
DG
534
535 while ((opt = poptGetNextOpt(pc)) != -1) {
536 switch (opt) {
537 case OPT_HELP:
ca1c3607 538 usage(stdout);
f3ed775e 539 goto end;
f3ed775e 540 case OPT_TRACEPOINT:
e6ddca71 541 opt_event_type = LTTNG_EVENT_TRACEPOINT;
f3ed775e 542 break;
cf0e5467 543 case OPT_PROBE:
7d29a247 544 opt_event_type = LTTNG_EVENT_PROBE;
f3ed775e
DG
545 break;
546 case OPT_FUNCTION:
547 opt_event_type = LTTNG_EVENT_FUNCTION;
8f0d098b
MD
548 break;
549 case OPT_FUNCTION_ENTRY:
550 opt_event_type = LTTNG_EVENT_FUNCTION_ENTRY;
f3ed775e 551 break;
a54bd42d
MD
552 case OPT_SYSCALL:
553 opt_event_type = LTTNG_EVENT_SYSCALL;
0133c199 554 break;
eeac7d46
MD
555 case OPT_USERSPACE:
556 opt_userspace = 1;
eeac7d46 557 break;
0cda4f28 558 case OPT_LOGLEVEL:
8005f29a 559 opt_loglevel_type = LTTNG_EVENT_LOGLEVEL_RANGE;
0cda4f28
MD
560 opt_loglevel = poptGetOptArg(pc);
561 break;
562 case OPT_LOGLEVEL_ONLY:
8005f29a 563 opt_loglevel_type = LTTNG_EVENT_LOGLEVEL_SINGLE;
0cda4f28 564 opt_loglevel = poptGetOptArg(pc);
13dce3b7 565 break;
679b4943
SM
566 case OPT_LIST_OPTIONS:
567 list_cmd_options(stdout, long_options);
679b4943 568 goto end;
f3ed775e
DG
569 default:
570 usage(stderr);
571 ret = CMD_UNDEFINED;
572 goto end;
573 }
574 }
575
576 opt_event_list = (char*) poptGetArg(pc);
577 if (opt_event_list == NULL && opt_enable_all == 0) {
578 ERR("Missing event name(s).\n");
579 usage(stderr);
ca1c3607 580 ret = CMD_ERROR;
f3ed775e
DG
581 goto end;
582 }
583
cd80958d
DG
584 if (!opt_session_name) {
585 session_name = get_session_name();
586 if (session_name == NULL) {
ca1c3607 587 ret = CMD_ERROR;
cd80958d
DG
588 goto end;
589 }
590 } else {
591 session_name = opt_session_name;
592 }
593
594 ret = enable_events(session_name);
f3ed775e
DG
595
596end:
cd80958d
DG
597 if (opt_session_name == NULL) {
598 free(session_name);
599 }
600
ca1c3607 601 poptFreeContext(pc);
f3ed775e
DG
602 return ret;
603}
This page took 0.063172 seconds and 5 git commands to generate.