2007-12-12 22:09:01 +01:00
|
|
|
/* Copyright (c) 2001, Matej Pfajfar.
|
2006-02-09 06:46:49 +01:00
|
|
|
* Copyright (c) 2001-2004, Roger Dingledine.
|
2007-12-12 22:09:01 +01:00
|
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
2011-01-03 17:50:39 +01:00
|
|
|
* Copyright (c) 2007-2011, The Tor Project, Inc. */
|
2002-11-24 09:45:13 +01:00
|
|
|
/* See LICENSE for licensing information */
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/**
|
|
|
|
* \file log.c
|
|
|
|
* \brief Functions to send messages to log files or the console.
|
2005-06-11 07:31:17 +02:00
|
|
|
**/
|
2004-05-10 05:53:24 +02:00
|
|
|
|
2004-11-14 18:21:32 +01:00
|
|
|
#include "orconfig.h"
|
2004-04-03 04:40:30 +02:00
|
|
|
#include <stdarg.h>
|
2004-04-03 06:05:12 +02:00
|
|
|
#include <assert.h>
|
2008-12-03 00:36:58 +01:00
|
|
|
// #include <stdio.h>
|
2004-04-03 06:05:12 +02:00
|
|
|
#include <stdlib.h>
|
2004-05-19 22:07:08 +02:00
|
|
|
#include <string.h>
|
2005-08-12 19:24:53 +02:00
|
|
|
#ifdef HAVE_SYS_TIME_H
|
|
|
|
#include <sys/time.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_TIME_H
|
|
|
|
#include <time.h>
|
|
|
|
#endif
|
2008-12-03 00:36:58 +01:00
|
|
|
#ifdef HAVE_UNISTD_H
|
|
|
|
#include <unistd.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_TYPES_H
|
|
|
|
#include <sys/types.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_FCNTL_H
|
|
|
|
#include <fcntl.h>
|
|
|
|
#endif
|
|
|
|
#include "compat.h"
|
2008-03-05 23:31:39 +01:00
|
|
|
#include "util.h"
|
2008-03-13 23:18:38 +01:00
|
|
|
#define LOG_PRIVATE
|
2010-07-10 03:52:20 +02:00
|
|
|
#include "torlog.h"
|
2008-03-05 23:31:39 +01:00
|
|
|
#include "container.h"
|
2004-04-03 06:05:12 +02:00
|
|
|
|
2004-08-18 13:21:50 +02:00
|
|
|
#define TRUNCATED_STR "[...truncated]"
|
|
|
|
#define TRUNCATED_STR_LEN 14
|
2004-08-15 22:13:07 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Information for a single logfile; only used in log.c */
|
2003-09-16 19:58:36 +02:00
|
|
|
typedef struct logfile_t {
|
2004-05-10 12:27:54 +02:00
|
|
|
struct logfile_t *next; /**< Next logfile_t in the linked list. */
|
2004-05-20 21:47:28 +02:00
|
|
|
char *filename; /**< Filename to open. */
|
2008-12-03 00:36:58 +01:00
|
|
|
int fd; /**< fd to receive log messages, or -1 for none. */
|
2007-05-29 20:21:00 +02:00
|
|
|
int seems_dead; /**< Boolean: true if the stream seems to be kaput. */
|
2004-05-10 05:53:24 +02:00
|
|
|
int needs_close; /**< Boolean: true if the stream gets closed on shutdown. */
|
2004-05-20 21:47:28 +02:00
|
|
|
int is_temporary; /**< Boolean: close after initializing logging subsystem.*/
|
2004-10-26 23:48:41 +02:00
|
|
|
int is_syslog; /**< Boolean: send messages to syslog. */
|
2004-11-03 22:53:12 +01:00
|
|
|
log_callback callback; /**< If not NULL, send messages to this function. */
|
2008-12-17 23:58:20 +01:00
|
|
|
log_severity_list_t *severities; /**< Which severity of messages should we
|
|
|
|
* log for each log domain? */
|
2003-09-16 19:58:36 +02:00
|
|
|
} logfile_t;
|
|
|
|
|
2008-03-05 23:31:39 +01:00
|
|
|
static void log_free(logfile_t *victim);
|
|
|
|
|
2004-05-10 12:27:54 +02:00
|
|
|
/** Helper: map a log severity to descriptive string. */
|
2005-09-30 03:09:52 +02:00
|
|
|
static INLINE const char *
|
|
|
|
sev_to_string(int severity)
|
|
|
|
{
|
2004-11-28 10:05:49 +01:00
|
|
|
switch (severity) {
|
2003-06-25 06:47:54 +02:00
|
|
|
case LOG_DEBUG: return "debug";
|
|
|
|
case LOG_INFO: return "info";
|
2004-03-30 05:15:23 +02:00
|
|
|
case LOG_NOTICE: return "notice";
|
2003-10-10 03:48:03 +02:00
|
|
|
case LOG_WARN: return "warn";
|
2003-06-25 06:47:54 +02:00
|
|
|
case LOG_ERR: return "err";
|
2008-03-11 19:56:41 +01:00
|
|
|
default: /* Call assert, not tor_assert, since tor_assert
|
|
|
|
* calls log on failure. */
|
|
|
|
assert(0); return "UNKNOWN";
|
2002-09-04 02:39:33 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-09-29 20:13:37 +02:00
|
|
|
/** Helper: decide whether to include the function name in the log message. */
|
2006-09-29 20:13:29 +02:00
|
|
|
static INLINE int
|
2008-03-05 23:31:39 +01:00
|
|
|
should_log_function_name(log_domain_mask_t domain, int severity)
|
2006-09-29 20:13:29 +02:00
|
|
|
{
|
|
|
|
switch (severity) {
|
|
|
|
case LOG_DEBUG:
|
|
|
|
case LOG_INFO:
|
|
|
|
/* All debugging messages occur in interesting places. */
|
|
|
|
return 1;
|
|
|
|
case LOG_NOTICE:
|
2009-11-22 13:15:30 +01:00
|
|
|
case LOG_WARN:
|
2006-09-29 20:13:29 +02:00
|
|
|
case LOG_ERR:
|
|
|
|
/* We care about places where bugs occur. */
|
|
|
|
return (domain == LD_BUG);
|
|
|
|
default:
|
2008-03-11 19:56:41 +01:00
|
|
|
/* Call assert, not tor_assert, since tor_assert calls log on failure. */
|
2006-09-29 20:13:29 +02:00
|
|
|
assert(0); return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-01-02 06:38:53 +01:00
|
|
|
/** A mutex to guard changes to logfiles and logging. */
|
2009-08-20 17:51:34 +02:00
|
|
|
static tor_mutex_t log_mutex;
|
|
|
|
static int log_mutex_initialized = 0;
|
2008-12-30 05:16:49 +01:00
|
|
|
|
2004-05-10 12:27:54 +02:00
|
|
|
/** Linked list of logfile_t. */
|
2003-09-16 19:58:36 +02:00
|
|
|
static logfile_t *logfiles = NULL;
|
2011-01-25 21:53:15 +01:00
|
|
|
/** Boolean: do we report logging domains? */
|
|
|
|
static int log_domains_are_logged = 0;
|
|
|
|
|
2004-10-26 23:48:41 +02:00
|
|
|
#ifdef HAVE_SYSLOG_H
|
2008-12-22 20:14:08 +01:00
|
|
|
/** The number of open syslog log handlers that we have. When this reaches 0,
|
|
|
|
* we can close our connection to the syslog facility. */
|
2004-10-26 23:48:41 +02:00
|
|
|
static int syslog_count = 0;
|
|
|
|
#endif
|
2003-06-21 21:03:22 +02:00
|
|
|
|
2010-11-20 04:52:32 +01:00
|
|
|
/** Represents a log message that we are going to send to callback-driven
|
|
|
|
* loggers once we can do so in a non-reentrant way. */
|
|
|
|
typedef struct pending_cb_message_t {
|
|
|
|
int severity;
|
|
|
|
log_domain_mask_t domain;
|
|
|
|
char *msg;
|
|
|
|
} pending_cb_message_t;
|
|
|
|
|
|
|
|
/** Log messages waiting to be replayed onto callback-based logs */
|
|
|
|
static smartlist_t *pending_cb_messages = NULL;
|
|
|
|
|
2008-01-02 06:38:53 +01:00
|
|
|
#define LOCK_LOGS() STMT_BEGIN \
|
2009-08-20 17:51:34 +02:00
|
|
|
tor_mutex_acquire(&log_mutex); \
|
2008-01-02 06:38:53 +01:00
|
|
|
STMT_END
|
2009-08-20 17:51:34 +02:00
|
|
|
#define UNLOCK_LOGS() STMT_BEGIN tor_mutex_release(&log_mutex); STMT_END
|
2008-01-02 06:38:53 +01:00
|
|
|
|
2008-12-22 20:14:08 +01:00
|
|
|
/** What's the lowest log level anybody cares about? Checking this lets us
|
|
|
|
* bail out early from log_debug if we aren't debugging. */
|
2007-02-21 06:57:12 +01:00
|
|
|
int _log_global_min_severity = LOG_NOTICE;
|
|
|
|
|
2004-09-23 06:59:02 +02:00
|
|
|
static void delete_log(logfile_t *victim);
|
2004-10-26 23:48:41 +02:00
|
|
|
static void close_log(logfile_t *victim);
|
2004-09-23 06:59:02 +02:00
|
|
|
|
2011-01-25 21:53:15 +01:00
|
|
|
static char *domain_to_string(log_domain_mask_t domain,
|
|
|
|
char *buf, size_t buflen);
|
|
|
|
|
2007-05-29 19:31:13 +02:00
|
|
|
/** Name of the application: used to generate the message we write at the
|
|
|
|
* start of each new log. */
|
2007-05-22 17:48:46 +02:00
|
|
|
static char *appname = NULL;
|
|
|
|
|
2007-05-29 19:31:13 +02:00
|
|
|
/** Set the "application name" for the logs to <b>name</b>: we'll use this
|
|
|
|
* name in the message we write when starting up, and at the start of each new
|
|
|
|
* log.
|
|
|
|
*
|
|
|
|
* Tor uses this string to write the version number to the log file. */
|
2007-05-22 17:48:46 +02:00
|
|
|
void
|
|
|
|
log_set_application_name(const char *name)
|
|
|
|
{
|
|
|
|
tor_free(appname);
|
|
|
|
appname = name ? tor_strdup(name) : NULL;
|
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/** Helper: Write the standard prefix for log lines to a
|
|
|
|
* <b>buf_len</b> character buffer in <b>buf</b>.
|
|
|
|
*/
|
2004-09-23 06:59:02 +02:00
|
|
|
static INLINE size_t
|
2007-03-04 22:08:26 +01:00
|
|
|
_log_prefix(char *buf, size_t buf_len, int severity)
|
2002-06-27 00:45:49 +02:00
|
|
|
{
|
2002-09-04 02:39:33 +02:00
|
|
|
time_t t;
|
2002-11-24 09:45:13 +01:00
|
|
|
struct timeval now;
|
2005-02-22 08:03:03 +01:00
|
|
|
struct tm tm;
|
2004-03-09 23:01:17 +01:00
|
|
|
size_t n;
|
2004-10-27 08:37:34 +02:00
|
|
|
int r;
|
2003-09-16 19:58:36 +02:00
|
|
|
|
2003-10-04 05:29:09 +02:00
|
|
|
tor_gettimeofday(&now);
|
2003-09-16 19:58:36 +02:00
|
|
|
t = (time_t)now.tv_sec;
|
2003-12-14 10:58:43 +01:00
|
|
|
|
2005-02-22 08:03:03 +01:00
|
|
|
n = strftime(buf, buf_len, "%b %d %H:%M:%S", tor_localtime_r(&t, &tm));
|
2009-09-01 05:23:47 +02:00
|
|
|
r = tor_snprintf(buf+n, buf_len-n, ".%.3i [%s] ",
|
|
|
|
(int)now.tv_usec / 1000, sev_to_string(severity));
|
2004-10-27 08:37:34 +02:00
|
|
|
if (r<0)
|
|
|
|
return buf_len-1;
|
|
|
|
else
|
|
|
|
return n+r;
|
2004-06-21 06:37:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/** If lf refers to an actual file that we have just opened, and the file
|
2004-11-20 07:52:13 +01:00
|
|
|
* contains no data, log an "opening new logfile" message at the top.
|
|
|
|
*
|
|
|
|
* Return -1 if the log is broken and needs to be deleted, else return 0.
|
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
static int
|
|
|
|
log_tor_version(logfile_t *lf, int reset)
|
2004-06-21 06:37:27 +02:00
|
|
|
{
|
|
|
|
char buf[256];
|
|
|
|
size_t n;
|
2004-06-30 18:35:11 +02:00
|
|
|
int is_new;
|
2004-06-21 06:37:27 +02:00
|
|
|
|
|
|
|
if (!lf->needs_close)
|
|
|
|
/* If it doesn't get closed, it isn't really a file. */
|
2004-11-20 07:52:13 +01:00
|
|
|
return 0;
|
2004-06-21 06:37:27 +02:00
|
|
|
if (lf->is_temporary)
|
|
|
|
/* If it's temporary, it isn't really a file. */
|
2004-11-20 07:52:13 +01:00
|
|
|
return 0;
|
2008-12-03 00:36:58 +01:00
|
|
|
|
|
|
|
is_new = lf->fd >= 0 && tor_fd_getpos(lf->fd) == 0;
|
|
|
|
|
2004-06-30 18:35:11 +02:00
|
|
|
if (reset && !is_new)
|
|
|
|
/* We are resetting, but we aren't at the start of the file; no
|
|
|
|
* need to log again. */
|
2004-11-20 07:52:13 +01:00
|
|
|
return 0;
|
2007-03-04 22:08:26 +01:00
|
|
|
n = _log_prefix(buf, sizeof(buf), LOG_NOTICE);
|
2007-05-22 17:48:46 +02:00
|
|
|
if (appname) {
|
|
|
|
tor_snprintf(buf+n, sizeof(buf)-n,
|
|
|
|
"%s opening %slog file.\n", appname, is_new?"new ":"");
|
|
|
|
} else {
|
|
|
|
tor_snprintf(buf+n, sizeof(buf)-n,
|
|
|
|
"Tor %s opening %slog file.\n", VERSION, is_new?"new ":"");
|
|
|
|
}
|
2008-12-03 00:36:58 +01:00
|
|
|
if (write_all(lf->fd, buf, strlen(buf), 0) < 0) /* error */
|
2004-11-20 07:52:13 +01:00
|
|
|
return -1; /* failed */
|
|
|
|
return 0;
|
2004-06-21 06:37:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/** Helper: Format a log message into a fixed-sized buffer. (This is
|
|
|
|
* factored out of <b>logv</b> so that we never format a message more
|
2004-10-26 23:48:41 +02:00
|
|
|
* than once.) Return a pointer to the first character of the message
|
|
|
|
* portion of the formatted string.
|
2004-06-21 06:37:27 +02:00
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
static INLINE char *
|
|
|
|
format_msg(char *buf, size_t buf_len,
|
2008-03-05 23:31:39 +01:00
|
|
|
log_domain_mask_t domain, int severity, const char *funcname,
|
2008-12-03 00:36:58 +01:00
|
|
|
const char *format, va_list ap, size_t *msg_len_out)
|
2004-06-21 06:37:27 +02:00
|
|
|
{
|
|
|
|
size_t n;
|
2004-10-27 08:37:34 +02:00
|
|
|
int r;
|
2004-10-26 23:48:41 +02:00
|
|
|
char *end_of_prefix;
|
2011-02-04 14:50:44 +01:00
|
|
|
char *buf_end;
|
2004-11-29 09:40:24 +01:00
|
|
|
|
2011-01-25 21:53:15 +01:00
|
|
|
assert(buf_len >= 16); /* prevent integer underflow and general stupidity */
|
2004-06-21 06:37:27 +02:00
|
|
|
buf_len -= 2; /* subtract 2 characters so we have room for \n\0 */
|
2011-02-04 14:50:44 +01:00
|
|
|
buf_end = buf+buf_len; /* point *after* the last char we can write to */
|
2004-06-21 06:37:27 +02:00
|
|
|
|
2007-03-04 22:08:26 +01:00
|
|
|
n = _log_prefix(buf, buf_len, severity);
|
2004-10-26 23:48:41 +02:00
|
|
|
end_of_prefix = buf+n;
|
2003-09-25 12:42:07 +02:00
|
|
|
|
2011-01-25 21:53:15 +01:00
|
|
|
if (log_domains_are_logged) {
|
|
|
|
char *cp = buf+n;
|
2011-02-04 14:50:44 +01:00
|
|
|
if (cp == buf_end) goto format_msg_no_room_for_domains;
|
2011-01-25 21:53:15 +01:00
|
|
|
*cp++ = '{';
|
2011-02-04 14:50:44 +01:00
|
|
|
if (cp == buf_end) goto format_msg_no_room_for_domains;
|
2011-01-25 21:53:15 +01:00
|
|
|
cp = domain_to_string(domain, cp, (buf+buf_len-cp));
|
2011-02-04 14:50:44 +01:00
|
|
|
if (cp == buf_end) goto format_msg_no_room_for_domains;
|
2011-01-25 21:53:15 +01:00
|
|
|
*cp++ = '}';
|
2011-02-04 14:50:44 +01:00
|
|
|
if (cp == buf_end) goto format_msg_no_room_for_domains;
|
2011-01-25 21:53:15 +01:00
|
|
|
*cp++ = ' ';
|
2011-02-04 14:50:44 +01:00
|
|
|
if (cp == buf_end) goto format_msg_no_room_for_domains;
|
2011-01-25 21:53:15 +01:00
|
|
|
end_of_prefix = cp;
|
|
|
|
n = cp-buf;
|
2011-02-04 14:50:44 +01:00
|
|
|
format_msg_no_room_for_domains:
|
|
|
|
/* This will leave end_of_prefix and n unchanged, and thus cause
|
|
|
|
* whatever log domain string we had written to be clobbered. */
|
2011-02-22 18:52:52 +01:00
|
|
|
;
|
2011-01-25 21:53:15 +01:00
|
|
|
}
|
|
|
|
|
2006-09-29 20:13:29 +02:00
|
|
|
if (funcname && should_log_function_name(domain, severity)) {
|
2004-10-27 08:37:34 +02:00
|
|
|
r = tor_snprintf(buf+n, buf_len-n, "%s(): ", funcname);
|
|
|
|
if (r<0)
|
|
|
|
n = strlen(buf);
|
|
|
|
else
|
|
|
|
n += r;
|
2003-09-19 11:30:34 +02:00
|
|
|
}
|
2004-11-09 21:04:00 +01:00
|
|
|
|
2007-03-04 21:11:46 +01:00
|
|
|
if (domain == LD_BUG && buf_len-n > 6) {
|
|
|
|
memcpy(buf+n, "Bug: ", 6);
|
|
|
|
n += 5;
|
|
|
|
}
|
|
|
|
|
2004-10-27 23:14:11 +02:00
|
|
|
r = tor_vsnprintf(buf+n,buf_len-n,format,ap);
|
2004-11-28 10:05:49 +01:00
|
|
|
if (r < 0) {
|
2004-11-29 21:39:55 +01:00
|
|
|
/* The message was too long; overwrite the end of the buffer with
|
|
|
|
* "[...truncated]" */
|
|
|
|
if (buf_len >= TRUNCATED_STR_LEN) {
|
2008-02-21 22:57:42 +01:00
|
|
|
size_t offset = buf_len-TRUNCATED_STR_LEN;
|
2004-11-30 07:15:06 +01:00
|
|
|
/* We have an extra 2 characters after buf_len to hold the \n\0,
|
|
|
|
* so it's safe to add 1 to the size here. */
|
|
|
|
strlcpy(buf+offset, TRUNCATED_STR, buf_len-offset+1);
|
2004-11-29 21:39:55 +01:00
|
|
|
}
|
|
|
|
/* Set 'n' to the end of the buffer, where we'll be writing \n\0.
|
|
|
|
* Since we already subtracted 2 from buf_len, this is safe.*/
|
|
|
|
n = buf_len;
|
2004-10-27 23:14:11 +02:00
|
|
|
} else {
|
|
|
|
n += r;
|
2004-08-15 22:13:07 +02:00
|
|
|
}
|
2003-09-16 19:58:36 +02:00
|
|
|
buf[n]='\n';
|
|
|
|
buf[n+1]='\0';
|
2008-12-03 00:36:58 +01:00
|
|
|
*msg_len_out = n+1;
|
2004-10-26 23:48:41 +02:00
|
|
|
return end_of_prefix;
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Helper: sends a message to the appropriate logfiles, at loglevel
|
|
|
|
* <b>severity</b>. If provided, <b>funcname</b> is prepended to the
|
2004-10-27 08:37:34 +02:00
|
|
|
* message. The actual message is derived as from tor_snprintf(format,ap).
|
2004-05-10 05:53:24 +02:00
|
|
|
*/
|
2003-12-17 22:14:13 +01:00
|
|
|
static void
|
2008-03-05 23:31:39 +01:00
|
|
|
logv(int severity, log_domain_mask_t domain, const char *funcname,
|
|
|
|
const char *format, va_list ap)
|
2003-09-16 19:58:36 +02:00
|
|
|
{
|
2003-09-30 21:53:25 +02:00
|
|
|
char buf[10024];
|
2008-12-03 00:36:58 +01:00
|
|
|
size_t msg_len = 0;
|
2003-09-16 19:58:36 +02:00
|
|
|
int formatted = 0;
|
|
|
|
logfile_t *lf;
|
2004-10-26 23:48:41 +02:00
|
|
|
char *end_of_prefix=NULL;
|
2010-12-11 14:26:36 +01:00
|
|
|
int callbacks_deferred = 0;
|
2003-12-14 10:58:43 +01:00
|
|
|
|
2008-03-11 19:56:41 +01:00
|
|
|
/* Call assert, not tor_assert, since tor_assert calls log on failure. */
|
2003-06-21 21:03:22 +02:00
|
|
|
assert(format);
|
2008-03-13 17:56:14 +01:00
|
|
|
/* check that severity is sane. Overrunning the masks array leads to
|
|
|
|
* interesting and hard to diagnose effects */
|
|
|
|
assert(severity >= LOG_ERR && severity <= LOG_DEBUG);
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2010-11-20 04:52:32 +01:00
|
|
|
|
2010-12-11 13:41:35 +01:00
|
|
|
if ((! (domain & LD_NOCB)) && smartlist_len(pending_cb_messages))
|
2010-11-20 04:52:32 +01:00
|
|
|
flush_pending_log_callbacks();
|
|
|
|
|
2004-09-23 05:51:45 +02:00
|
|
|
lf = logfiles;
|
2004-11-28 10:05:49 +01:00
|
|
|
while (lf) {
|
2008-03-05 23:31:39 +01:00
|
|
|
if (! (lf->severities->masks[SEVERITY_MASK_IDX(severity)] & domain)) {
|
2004-09-23 05:51:45 +02:00
|
|
|
lf = lf->next;
|
2003-09-16 19:58:36 +02:00
|
|
|
continue;
|
2004-09-23 05:51:45 +02:00
|
|
|
}
|
2008-12-03 00:36:58 +01:00
|
|
|
if (! (lf->fd >= 0 || lf->is_syslog || lf->callback)) {
|
2004-09-23 05:51:45 +02:00
|
|
|
lf = lf->next;
|
2003-09-16 19:58:36 +02:00
|
|
|
continue;
|
2004-09-23 05:51:45 +02:00
|
|
|
}
|
2007-05-29 20:21:00 +02:00
|
|
|
if (lf->seems_dead) {
|
|
|
|
lf = lf->next;
|
|
|
|
continue;
|
|
|
|
}
|
2002-07-12 20:14:17 +02:00
|
|
|
|
2003-09-16 19:58:36 +02:00
|
|
|
if (!formatted) {
|
2004-10-26 23:48:41 +02:00
|
|
|
end_of_prefix =
|
2008-12-03 00:36:58 +01:00
|
|
|
format_msg(buf, sizeof(buf), domain, severity, funcname, format, ap,
|
|
|
|
&msg_len);
|
2003-09-16 19:58:36 +02:00
|
|
|
formatted = 1;
|
|
|
|
}
|
2011-01-25 21:53:15 +01:00
|
|
|
|
2004-10-26 23:48:41 +02:00
|
|
|
if (lf->is_syslog) {
|
|
|
|
#ifdef HAVE_SYSLOG_H
|
2008-12-18 18:18:06 +01:00
|
|
|
char *m = end_of_prefix;
|
|
|
|
#ifdef MAXLINE
|
|
|
|
/* Some syslog implementations have limits on the length of what you can
|
|
|
|
* pass them, and some very old ones do not detect overflow so well.
|
|
|
|
* Regrettably, they call their maximum line length MAXLINE. */
|
|
|
|
#if MAXLINE < 64
|
|
|
|
#warn "MAXLINE is a very low number; it might not be from syslog.h after all"
|
|
|
|
#endif
|
|
|
|
if (msg_len >= MAXLINE)
|
|
|
|
m = tor_strndup(end_of_prefix, MAXLINE-1);
|
|
|
|
#endif
|
|
|
|
syslog(severity, "%s", m);
|
|
|
|
#ifdef MAXLINE
|
|
|
|
if (m != end_of_prefix) {
|
|
|
|
tor_free(m);
|
|
|
|
}
|
|
|
|
#endif
|
2004-10-26 23:48:41 +02:00
|
|
|
#endif
|
|
|
|
lf = lf->next;
|
|
|
|
continue;
|
2004-11-03 19:27:19 +01:00
|
|
|
} else if (lf->callback) {
|
2010-11-20 04:52:32 +01:00
|
|
|
if (domain & LD_NOCB) {
|
2010-12-11 14:26:36 +01:00
|
|
|
if (!callbacks_deferred) {
|
|
|
|
pending_cb_message_t *msg = tor_malloc(sizeof(pending_cb_message_t));
|
|
|
|
msg->severity = severity;
|
|
|
|
msg->domain = domain;
|
|
|
|
msg->msg = tor_strdup(end_of_prefix);
|
|
|
|
smartlist_add(pending_cb_messages, msg);
|
|
|
|
|
|
|
|
callbacks_deferred = 1;
|
|
|
|
}
|
2010-11-20 04:52:32 +01:00
|
|
|
} else {
|
|
|
|
lf->callback(severity, domain, end_of_prefix);
|
|
|
|
}
|
2004-11-03 19:27:19 +01:00
|
|
|
lf = lf->next;
|
|
|
|
continue;
|
2004-10-26 23:48:41 +02:00
|
|
|
}
|
2008-12-03 00:36:58 +01:00
|
|
|
if (write_all(lf->fd, buf, msg_len, 0) < 0) { /* error */
|
2007-05-29 20:21:00 +02:00
|
|
|
/* don't log the error! mark this log entry to be blown away, and
|
|
|
|
* continue. */
|
|
|
|
lf->seems_dead = 1;
|
2004-03-14 16:50:00 +01:00
|
|
|
}
|
2007-05-29 20:21:00 +02:00
|
|
|
lf = lf->next;
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2003-06-21 21:03:22 +02:00
|
|
|
}
|
2003-06-17 23:36:44 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Output a message to the log. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2009-12-15 20:32:55 +01:00
|
|
|
tor_log(int severity, log_domain_mask_t domain, const char *format, ...)
|
2003-06-17 23:36:44 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (severity > _log_global_min_severity)
|
|
|
|
return;
|
2003-06-17 23:36:44 +02:00
|
|
|
va_start(ap,format);
|
2005-10-18 23:58:19 +02:00
|
|
|
logv(severity, domain, NULL, format, ap);
|
2003-06-17 23:36:44 +02:00
|
|
|
va_end(ap);
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
2002-09-04 02:39:33 +02:00
|
|
|
|
2004-05-10 12:27:54 +02:00
|
|
|
/** Output a message to the log, prefixed with a function name <b>fn</b>. */
|
2004-11-15 22:18:07 +01:00
|
|
|
#ifdef __GNUC__
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_fn(int severity, log_domain_mask_t domain, const char *fn,
|
|
|
|
const char *format, ...)
|
2003-06-17 23:36:44 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (severity > _log_global_min_severity)
|
|
|
|
return;
|
2003-06-17 23:36:44 +02:00
|
|
|
va_start(ap,format);
|
2005-10-18 23:58:19 +02:00
|
|
|
logv(severity, domain, fn, format, ap);
|
2003-06-17 23:36:44 +02:00
|
|
|
va_end(ap);
|
|
|
|
}
|
2004-11-15 22:18:07 +01:00
|
|
|
#else
|
|
|
|
const char *_log_fn_function_name=NULL;
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_fn(int severity, log_domain_mask_t domain, const char *format, ...)
|
2004-11-15 22:18:07 +01:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (severity > _log_global_min_severity)
|
|
|
|
return;
|
2004-11-15 22:18:07 +01:00
|
|
|
va_start(ap,format);
|
2005-10-18 23:58:19 +02:00
|
|
|
logv(severity, domain, _log_fn_function_name, format, ap);
|
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_debug(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
/* For GCC we do this check in the macro. */
|
|
|
|
if (PREDICT_LIKELY(LOG_DEBUG > _log_global_min_severity))
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_DEBUG, domain, _log_fn_function_name, format, ap);
|
2005-10-18 23:58:19 +02:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_info(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (LOG_INFO > _log_global_min_severity)
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_INFO, domain, _log_fn_function_name, format, ap);
|
2005-10-18 23:58:19 +02:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_notice(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (LOG_NOTICE > _log_global_min_severity)
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_NOTICE, domain, _log_fn_function_name, format, ap);
|
2005-10-18 23:58:19 +02:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_warn(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (LOG_WARN > _log_global_min_severity)
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_WARN, domain, _log_fn_function_name, format, ap);
|
2005-10-18 23:58:19 +02:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_err(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (LOG_ERR > _log_global_min_severity)
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_ERR, domain, _log_fn_function_name, format, ap);
|
2004-11-15 22:18:07 +01:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
#endif
|
2003-06-17 23:36:44 +02:00
|
|
|
|
2008-12-17 23:58:20 +01:00
|
|
|
/** Free all storage held by <b>victim</b>. */
|
2008-03-05 23:31:39 +01:00
|
|
|
static void
|
|
|
|
log_free(logfile_t *victim)
|
|
|
|
{
|
2009-09-28 16:37:01 +02:00
|
|
|
if (!victim)
|
|
|
|
return;
|
2008-03-05 23:31:39 +01:00
|
|
|
tor_free(victim->severities);
|
|
|
|
tor_free(victim->filename);
|
|
|
|
tor_free(victim);
|
|
|
|
}
|
|
|
|
|
2007-07-16 06:33:47 +02:00
|
|
|
/** Close all open log files, and free other static memory. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2007-07-16 06:33:47 +02:00
|
|
|
logs_free_all(void)
|
2003-09-16 19:58:36 +02:00
|
|
|
{
|
2006-03-13 01:54:21 +01:00
|
|
|
logfile_t *victim, *next;
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2006-03-13 01:54:21 +01:00
|
|
|
next = logfiles;
|
|
|
|
logfiles = NULL;
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2006-03-13 01:54:21 +01:00
|
|
|
while (next) {
|
|
|
|
victim = next;
|
|
|
|
next = next->next;
|
2004-10-26 23:48:41 +02:00
|
|
|
close_log(victim);
|
2008-03-05 23:31:39 +01:00
|
|
|
log_free(victim);
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
2007-07-16 06:33:47 +02:00
|
|
|
tor_free(appname);
|
2009-08-20 17:51:34 +02:00
|
|
|
|
|
|
|
/* We _could_ destroy the log mutex here, but that would screw up any logs
|
|
|
|
* that happened between here and the end of execution. */
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
2003-06-17 23:36:44 +02:00
|
|
|
|
2004-09-23 06:59:02 +02:00
|
|
|
/** Remove and free the log entry <b>victim</b> from the linked-list
|
2006-06-09 08:35:45 +02:00
|
|
|
* logfiles (it is probably present, but it might not be due to thread
|
|
|
|
* racing issues). After this function is called, the caller shouldn't
|
|
|
|
* refer to <b>victim</b> anymore.
|
|
|
|
*
|
|
|
|
* Long-term, we need to do something about races in the log subsystem
|
|
|
|
* in general. See bug 222 for more details.
|
2004-09-23 06:59:02 +02:00
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
static void
|
|
|
|
delete_log(logfile_t *victim)
|
|
|
|
{
|
2004-09-23 06:59:02 +02:00
|
|
|
logfile_t *tmpl;
|
2004-11-28 10:05:49 +01:00
|
|
|
if (victim == logfiles)
|
2004-09-23 06:59:02 +02:00
|
|
|
logfiles = victim->next;
|
|
|
|
else {
|
2004-11-28 10:05:49 +01:00
|
|
|
for (tmpl = logfiles; tmpl && tmpl->next != victim; tmpl=tmpl->next) ;
|
2006-06-09 08:35:45 +02:00
|
|
|
// tor_assert(tmpl);
|
|
|
|
// tor_assert(tmpl->next == victim);
|
|
|
|
if (!tmpl)
|
|
|
|
return;
|
2004-09-23 06:59:02 +02:00
|
|
|
tmpl->next = victim->next;
|
|
|
|
}
|
2008-03-05 23:31:39 +01:00
|
|
|
log_free(victim);
|
2004-09-23 06:59:02 +02:00
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/** Helper: release system resources (but not memory) held by a single
|
|
|
|
* logfile_t. */
|
2005-09-30 03:09:52 +02:00
|
|
|
static void
|
|
|
|
close_log(logfile_t *victim)
|
2004-10-26 23:48:41 +02:00
|
|
|
{
|
2008-12-03 00:36:58 +01:00
|
|
|
if (victim->needs_close && victim->fd >= 0) {
|
|
|
|
close(victim->fd);
|
|
|
|
victim->fd = -1;
|
2004-10-26 23:48:41 +02:00
|
|
|
} else if (victim->is_syslog) {
|
|
|
|
#ifdef HAVE_SYSLOG_H
|
2005-08-08 19:31:57 +02:00
|
|
|
if (--syslog_count == 0) {
|
2004-10-26 23:48:41 +02:00
|
|
|
/* There are no other syslogs; close the logging facility. */
|
|
|
|
closelog();
|
2005-08-08 19:31:57 +02:00
|
|
|
}
|
2004-10-26 23:48:41 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-03-13 23:18:38 +01:00
|
|
|
/** Adjust a log severity configuration in <b>severity_out</b> to contain
|
|
|
|
* every domain between <b>loglevelMin</b> and <b>loglevelMax</b>, inclusive.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
set_log_severity_config(int loglevelMin, int loglevelMax,
|
|
|
|
log_severity_list_t *severity_out)
|
2008-03-05 23:31:39 +01:00
|
|
|
{
|
|
|
|
int i;
|
2008-03-13 23:18:38 +01:00
|
|
|
tor_assert(loglevelMin >= loglevelMax);
|
|
|
|
tor_assert(loglevelMin >= LOG_ERR && loglevelMin <= LOG_DEBUG);
|
|
|
|
tor_assert(loglevelMax >= LOG_ERR && loglevelMax <= LOG_DEBUG);
|
|
|
|
memset(severity_out, 0, sizeof(log_severity_list_t));
|
2008-03-05 23:31:39 +01:00
|
|
|
for (i = loglevelMin; i >= loglevelMax; --i) {
|
2008-03-13 23:18:38 +01:00
|
|
|
severity_out->masks[SEVERITY_MASK_IDX(i)] = ~0u;
|
2008-03-05 23:31:39 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Add a log handler named <b>name</b> to send all messages in <b>severity</b>
|
2008-12-03 00:36:58 +01:00
|
|
|
* to <b>fd</b>. Copies <b>severity</b>. Helper: does no locking. */
|
2008-01-02 06:38:53 +01:00
|
|
|
static void
|
2008-09-05 21:52:44 +02:00
|
|
|
add_stream_log_impl(const log_severity_list_t *severity,
|
2008-12-03 00:36:58 +01:00
|
|
|
const char *name, int fd)
|
2003-09-16 19:58:36 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2004-10-26 23:48:41 +02:00
|
|
|
lf = tor_malloc_zero(sizeof(logfile_t));
|
2008-12-03 00:36:58 +01:00
|
|
|
lf->fd = fd;
|
2004-05-20 21:47:28 +02:00
|
|
|
lf->filename = tor_strdup(name);
|
2008-03-08 02:11:54 +01:00
|
|
|
lf->severities = tor_memdup(severity, sizeof(log_severity_list_t));
|
2003-09-16 19:58:36 +02:00
|
|
|
lf->next = logfiles;
|
2007-02-21 06:57:12 +01:00
|
|
|
|
2008-01-02 06:38:53 +01:00
|
|
|
logfiles = lf;
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
|
|
|
|
2008-03-05 23:31:39 +01:00
|
|
|
/** Add a log handler named <b>name</b> to send all messages in <b>severity</b>
|
2008-12-03 00:36:58 +01:00
|
|
|
* to <b>fd</b>. Steals a reference to <b>severity</b>; the caller must
|
2008-03-05 23:31:39 +01:00
|
|
|
* not use it after calling this function. */
|
2008-01-02 06:38:53 +01:00
|
|
|
void
|
2011-01-25 21:53:15 +01:00
|
|
|
add_stream_log(const log_severity_list_t *severity, const char *name, int fd)
|
2008-01-02 06:38:53 +01:00
|
|
|
{
|
|
|
|
LOCK_LOGS();
|
2008-12-03 00:36:58 +01:00
|
|
|
add_stream_log_impl(severity, name, fd);
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Initialize the global logging facility */
|
|
|
|
void
|
|
|
|
init_logging(void)
|
|
|
|
{
|
2009-08-20 17:51:34 +02:00
|
|
|
if (!log_mutex_initialized) {
|
|
|
|
tor_mutex_init(&log_mutex);
|
|
|
|
log_mutex_initialized = 1;
|
|
|
|
}
|
2010-11-20 04:52:32 +01:00
|
|
|
if (pending_cb_messages == NULL)
|
|
|
|
pending_cb_messages = smartlist_create();
|
2008-01-02 06:38:53 +01:00
|
|
|
}
|
|
|
|
|
2011-01-25 21:53:15 +01:00
|
|
|
/** Set whether we report logging domains as a part of our log messages.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
logs_set_domain_logging(int enabled)
|
|
|
|
{
|
|
|
|
LOCK_LOGS();
|
|
|
|
log_domains_are_logged = enabled;
|
|
|
|
UNLOCK_LOGS();
|
|
|
|
}
|
|
|
|
|
2004-05-20 21:47:28 +02:00
|
|
|
/** Add a log handler to receive messages during startup (before the real
|
|
|
|
* logs are initialized).
|
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2008-03-27 18:25:49 +01:00
|
|
|
add_temp_log(int min_severity)
|
2004-05-20 21:47:28 +02:00
|
|
|
{
|
2008-03-13 23:18:38 +01:00
|
|
|
log_severity_list_t *s = tor_malloc_zero(sizeof(log_severity_list_t));
|
2008-03-27 18:25:49 +01:00
|
|
|
set_log_severity_config(min_severity, LOG_ERR, s);
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2008-12-03 00:36:58 +01:00
|
|
|
add_stream_log_impl(s, "<temp>", fileno(stdout));
|
2008-03-26 19:59:45 +01:00
|
|
|
tor_free(s);
|
2004-05-20 21:47:28 +02:00
|
|
|
logfiles->is_temporary = 1;
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-05-20 21:47:28 +02:00
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/**
|
2008-03-05 23:31:39 +01:00
|
|
|
* Add a log handler to send messages in <b>severity</b>
|
|
|
|
* to the function <b>cb</b>.
|
2005-03-17 13:38:37 +01:00
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
2008-09-05 21:52:44 +02:00
|
|
|
add_callback_log(const log_severity_list_t *severity, log_callback cb)
|
2004-11-03 19:27:19 +01:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
|
|
|
lf = tor_malloc_zero(sizeof(logfile_t));
|
2008-12-03 00:36:58 +01:00
|
|
|
lf->fd = -1;
|
2008-03-08 02:11:54 +01:00
|
|
|
lf->severities = tor_memdup(severity, sizeof(log_severity_list_t));
|
2004-11-03 22:53:12 +01:00
|
|
|
lf->filename = tor_strdup("<callback>");
|
2004-11-03 19:27:19 +01:00
|
|
|
lf->callback = cb;
|
|
|
|
lf->next = logfiles;
|
2007-02-21 06:57:12 +01:00
|
|
|
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
|
|
|
logfiles = lf;
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-11-03 19:27:19 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-09-29 20:13:37 +02:00
|
|
|
/** Adjust the configured severity of any logs whose callback function is
|
|
|
|
* <b>cb</b>. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
change_callback_log_severity(int loglevelMin, int loglevelMax,
|
|
|
|
log_callback cb)
|
2005-04-06 00:56:17 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-03-17 04:37:52 +01:00
|
|
|
log_severity_list_t severities;
|
|
|
|
set_log_severity_config(loglevelMin, loglevelMax, &severities);
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2005-04-06 00:56:17 +02:00
|
|
|
for (lf = logfiles; lf; lf = lf->next) {
|
|
|
|
if (lf->callback == cb) {
|
2008-03-17 04:37:52 +01:00
|
|
|
memcpy(lf->severities, &severities, sizeof(severities));
|
2005-04-06 00:56:17 +02:00
|
|
|
}
|
|
|
|
}
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2005-04-06 00:56:17 +02:00
|
|
|
}
|
|
|
|
|
2010-11-20 04:52:32 +01:00
|
|
|
/** If there are any log messages that were genered with LD_NOCB waiting to
|
|
|
|
* be sent to callback-based loggers, send them now. */
|
|
|
|
void
|
|
|
|
flush_pending_log_callbacks(void)
|
|
|
|
{
|
|
|
|
logfile_t *lf;
|
|
|
|
smartlist_t *messages, *messages_tmp;
|
|
|
|
|
|
|
|
LOCK_LOGS();
|
|
|
|
if (0 == smartlist_len(pending_cb_messages)) {
|
|
|
|
UNLOCK_LOGS();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
messages = pending_cb_messages;
|
|
|
|
pending_cb_messages = smartlist_create();
|
|
|
|
do {
|
|
|
|
SMARTLIST_FOREACH_BEGIN(messages, pending_cb_message_t *, msg) {
|
|
|
|
const int severity = msg->severity;
|
|
|
|
const int domain = msg->domain;
|
|
|
|
for (lf = logfiles; lf; lf = lf->next) {
|
|
|
|
if (! lf->callback || lf->seems_dead ||
|
|
|
|
! (lf->severities->masks[SEVERITY_MASK_IDX(severity)] & domain)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
lf->callback(severity, domain, msg->msg);
|
|
|
|
}
|
|
|
|
tor_free(msg->msg);
|
|
|
|
tor_free(msg);
|
|
|
|
} SMARTLIST_FOREACH_END(msg);
|
|
|
|
smartlist_clear(messages);
|
|
|
|
|
|
|
|
messages_tmp = pending_cb_messages;
|
|
|
|
pending_cb_messages = messages;
|
|
|
|
messages = messages_tmp;
|
|
|
|
} while (smartlist_len(messages));
|
|
|
|
|
|
|
|
smartlist_free(messages);
|
|
|
|
|
|
|
|
UNLOCK_LOGS();
|
|
|
|
}
|
|
|
|
|
2008-03-26 19:59:45 +01:00
|
|
|
/** Close any log handlers added by add_temp_log() or marked by
|
|
|
|
* mark_logs_temp(). */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
close_temp_logs(void)
|
2004-05-20 21:47:28 +02:00
|
|
|
{
|
2004-11-20 13:16:47 +01:00
|
|
|
logfile_t *lf, **p;
|
2008-01-02 06:38:53 +01:00
|
|
|
|
|
|
|
LOCK_LOGS();
|
2004-11-20 13:16:47 +01:00
|
|
|
for (p = &logfiles; *p; ) {
|
|
|
|
if ((*p)->is_temporary) {
|
|
|
|
lf = *p;
|
2004-11-20 13:17:19 +01:00
|
|
|
/* we use *p here to handle the edge case of the head of the list */
|
2004-11-20 13:16:47 +01:00
|
|
|
*p = (*p)->next;
|
|
|
|
close_log(lf);
|
2008-03-05 23:31:39 +01:00
|
|
|
log_free(lf);
|
2004-05-20 21:47:28 +02:00
|
|
|
} else {
|
2004-11-20 13:16:47 +01:00
|
|
|
p = &((*p)->next);
|
2004-05-20 21:47:28 +02:00
|
|
|
}
|
|
|
|
}
|
2007-02-21 06:57:12 +01:00
|
|
|
|
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-05-20 21:47:28 +02:00
|
|
|
}
|
|
|
|
|
2006-01-11 20:40:14 +01:00
|
|
|
/** Make all currently temporary logs (set to be closed by close_temp_logs)
|
|
|
|
* live again, and close all non-temporary logs. */
|
|
|
|
void
|
|
|
|
rollback_log_changes(void)
|
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2006-01-11 20:40:14 +01:00
|
|
|
for (lf = logfiles; lf; lf = lf->next)
|
|
|
|
lf->is_temporary = ! lf->is_temporary;
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2006-01-11 20:40:14 +01:00
|
|
|
close_temp_logs();
|
|
|
|
}
|
|
|
|
|
2008-03-26 19:59:45 +01:00
|
|
|
/** Configure all log handles to be closed by close_temp_logs(). */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
mark_logs_temp(void)
|
2004-06-02 21:18:37 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2004-06-02 21:18:37 +02:00
|
|
|
for (lf = logfiles; lf; lf = lf->next)
|
|
|
|
lf->is_temporary = 1;
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-06-02 21:18:37 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/**
|
2008-12-03 00:36:58 +01:00
|
|
|
* Add a log handler to send messages to <b>filename</b>. If opening the
|
|
|
|
* logfile fails, -1 is returned and errno is set appropriately (by open(2)).
|
2003-11-19 03:09:43 +01:00
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
2008-09-05 21:52:44 +02:00
|
|
|
add_file_log(const log_severity_list_t *severity, const char *filename)
|
2003-09-16 19:58:36 +02:00
|
|
|
{
|
2008-12-03 00:36:58 +01:00
|
|
|
int fd;
|
2008-01-02 06:38:53 +01:00
|
|
|
logfile_t *lf;
|
2008-12-03 00:36:58 +01:00
|
|
|
|
|
|
|
fd = open(filename, O_WRONLY|O_CREAT|O_APPEND, 0644);
|
|
|
|
if (fd<0)
|
|
|
|
return -1;
|
|
|
|
if (tor_fd_seekend(fd)<0)
|
|
|
|
return -1;
|
|
|
|
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2008-12-03 00:36:58 +01:00
|
|
|
add_stream_log_impl(severity, filename, fd);
|
2003-09-16 19:58:36 +02:00
|
|
|
logfiles->needs_close = 1;
|
2008-01-02 06:38:53 +01:00
|
|
|
lf = logfiles;
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
|
|
|
|
if (log_tor_version(lf, 0) < 0) {
|
|
|
|
delete_log(lf);
|
|
|
|
}
|
2010-01-25 20:09:18 +01:00
|
|
|
UNLOCK_LOGS();
|
2008-01-02 06:38:53 +01:00
|
|
|
|
2003-10-15 20:38:38 +02:00
|
|
|
return 0;
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
2003-09-27 00:27:24 +02:00
|
|
|
|
2004-10-26 23:48:41 +02:00
|
|
|
#ifdef HAVE_SYSLOG_H
|
|
|
|
/**
|
|
|
|
* Add a log handler to send messages to they system log facility.
|
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
2008-09-05 21:52:44 +02:00
|
|
|
add_syslog_log(const log_severity_list_t *severity)
|
2004-10-26 23:48:41 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
|
|
|
if (syslog_count++ == 0)
|
2004-11-09 02:24:10 +01:00
|
|
|
/* This is the first syslog. */
|
2006-02-01 03:15:44 +01:00
|
|
|
openlog("Tor", LOG_PID | LOG_NDELAY, LOGFACILITY);
|
2004-10-26 23:48:41 +02:00
|
|
|
|
|
|
|
lf = tor_malloc_zero(sizeof(logfile_t));
|
2008-12-03 00:36:58 +01:00
|
|
|
lf->fd = -1;
|
2008-03-08 02:11:54 +01:00
|
|
|
lf->severities = tor_memdup(severity, sizeof(log_severity_list_t));
|
2004-10-26 23:48:41 +02:00
|
|
|
lf->filename = tor_strdup("<syslog>");
|
|
|
|
lf->is_syslog = 1;
|
2008-01-02 06:38:53 +01:00
|
|
|
|
|
|
|
LOCK_LOGS();
|
2004-10-26 23:48:41 +02:00
|
|
|
lf->next = logfiles;
|
|
|
|
logfiles = lf;
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-10-26 23:48:41 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2004-05-19 22:07:08 +02:00
|
|
|
/** If <b>level</b> is a valid log severity, return the corresponding
|
|
|
|
* numeric value. Otherwise, return -1. */
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
|
|
|
parse_log_level(const char *level)
|
|
|
|
{
|
2004-05-19 22:07:08 +02:00
|
|
|
if (!strcasecmp(level, "err"))
|
|
|
|
return LOG_ERR;
|
2004-05-21 14:38:52 +02:00
|
|
|
if (!strcasecmp(level, "warn"))
|
|
|
|
return LOG_WARN;
|
|
|
|
if (!strcasecmp(level, "notice"))
|
2004-05-19 22:07:08 +02:00
|
|
|
return LOG_NOTICE;
|
2004-05-21 14:38:52 +02:00
|
|
|
if (!strcasecmp(level, "info"))
|
2004-05-19 22:07:08 +02:00
|
|
|
return LOG_INFO;
|
2004-05-21 14:38:52 +02:00
|
|
|
if (!strcasecmp(level, "debug"))
|
2004-05-19 22:07:08 +02:00
|
|
|
return LOG_DEBUG;
|
2004-05-21 14:38:52 +02:00
|
|
|
return -1;
|
2004-05-19 22:07:08 +02:00
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/** Return the string equivalent of a given log level. */
|
2005-09-30 03:09:52 +02:00
|
|
|
const char *
|
|
|
|
log_level_to_string(int level)
|
2004-11-05 06:50:35 +01:00
|
|
|
{
|
|
|
|
return sev_to_string(level);
|
|
|
|
}
|
|
|
|
|
2008-12-17 23:58:20 +01:00
|
|
|
/** NULL-terminated array of names for log domains such that domain_list[dom]
|
|
|
|
* is a description of <b>dom</b>. */
|
2008-03-05 23:31:39 +01:00
|
|
|
static const char *domain_list[] = {
|
|
|
|
"GENERAL", "CRYPTO", "NET", "CONFIG", "FS", "PROTOCOL", "MM",
|
|
|
|
"HTTP", "APP", "CONTROL", "CIRC", "REND", "BUG", "DIR", "DIRSERV",
|
2009-09-24 18:31:22 +02:00
|
|
|
"OR", "EDGE", "ACCT", "HIST", "HANDSHAKE", NULL
|
2008-03-05 23:31:39 +01:00
|
|
|
};
|
|
|
|
|
2008-12-18 18:18:06 +01:00
|
|
|
/** Return a bitmask for the log domain for which <b>domain</b> is the name,
|
|
|
|
* or 0 if there is no such name. */
|
2008-03-05 23:31:39 +01:00
|
|
|
static log_domain_mask_t
|
|
|
|
parse_log_domain(const char *domain)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for (i=0; domain_list[i]; ++i) {
|
|
|
|
if (!strcasecmp(domain, domain_list[i]))
|
|
|
|
return (1u<<i);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2011-01-25 21:53:15 +01:00
|
|
|
|
|
|
|
/** Translate a bitmask of log domains to a string. */
|
|
|
|
static char *
|
|
|
|
domain_to_string(log_domain_mask_t domain, char *buf, size_t buflen)
|
2008-03-05 23:31:39 +01:00
|
|
|
{
|
2011-01-25 21:53:15 +01:00
|
|
|
char *cp = buf;
|
|
|
|
char *eos = buf+buflen;
|
|
|
|
|
|
|
|
buf[0] = '\0';
|
|
|
|
if (! domain)
|
|
|
|
return buf;
|
|
|
|
while (1) {
|
|
|
|
const char *d;
|
|
|
|
int bit = tor_log2(domain);
|
|
|
|
size_t n;
|
|
|
|
if (bit >= N_LOGGING_DOMAINS) {
|
|
|
|
tor_snprintf(buf, buflen, "<BUG:Unknown domain %lx>", (long)domain);
|
|
|
|
return buf+strlen(buf);
|
|
|
|
}
|
|
|
|
d = domain_list[bit];
|
|
|
|
n = strlcpy(cp, d, eos-cp);
|
|
|
|
if (n >= buflen) {
|
|
|
|
tor_snprintf(buf, buflen, "<BUG:Truncating domain %lx>", (long)domain);
|
|
|
|
return buf+strlen(buf);
|
|
|
|
}
|
|
|
|
cp += n;
|
|
|
|
domain &= ~(1<<bit);
|
|
|
|
|
|
|
|
if (domain == 0 || (eos-cp) < 2)
|
|
|
|
return cp;
|
|
|
|
|
|
|
|
memcpy(cp, ",", 2); /*Nul-terminated ,"*/
|
|
|
|
cp++;
|
|
|
|
}
|
2008-03-05 23:31:39 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/** Parse a log severity pattern in *<b>cfg_ptr</b>. Advance cfg_ptr after
|
|
|
|
* the end of the severityPattern. Set the value of <b>severity_out</b> to
|
|
|
|
* the parsed pattern. Return 0 on success, -1 on failure.
|
|
|
|
*
|
|
|
|
* The syntax for a SeverityPattern is:
|
|
|
|
* <pre>
|
|
|
|
* SeverityPattern = *(DomainSeverity SP)* DomainSeverity
|
|
|
|
* DomainSeverity = (DomainList SP)? SeverityRange
|
|
|
|
* SeverityRange = MinSeverity ("-" MaxSeverity )?
|
|
|
|
* DomainList = "[" (SP? DomainSpec SP? ",") SP? DomainSpec "]"
|
|
|
|
* DomainSpec = "*" | Domain | "~" Domain
|
|
|
|
* </pre>
|
|
|
|
* A missing MaxSeverity defaults to ERR. Severities and domains are
|
|
|
|
* case-insensitive. "~" indicates negation for a domain; negation happens
|
|
|
|
* last inside a DomainList. Only one SeverityRange without a DomainList is
|
|
|
|
* allowed per line.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
parse_log_severity_config(const char **cfg_ptr,
|
|
|
|
log_severity_list_t *severity_out)
|
|
|
|
{
|
|
|
|
const char *cfg = *cfg_ptr;
|
|
|
|
int got_anything = 0;
|
|
|
|
int got_an_unqualified_range = 0;
|
|
|
|
memset(severity_out, 0, sizeof(*severity_out));
|
|
|
|
|
|
|
|
cfg = eat_whitespace(cfg);
|
|
|
|
while (*cfg) {
|
|
|
|
const char *dash, *space;
|
|
|
|
char *sev_lo, *sev_hi;
|
|
|
|
int low, high, i;
|
|
|
|
log_domain_mask_t domains = ~0u;
|
|
|
|
|
|
|
|
if (*cfg == '[') {
|
|
|
|
int err = 0;
|
|
|
|
char *domains_str;
|
|
|
|
smartlist_t *domains_list;
|
|
|
|
log_domain_mask_t neg_domains = 0;
|
|
|
|
const char *closebracket = strchr(cfg, ']');
|
|
|
|
if (!closebracket)
|
|
|
|
return -1;
|
|
|
|
domains = 0;
|
|
|
|
domains_str = tor_strndup(cfg+1, closebracket-cfg-1);
|
|
|
|
domains_list = smartlist_create();
|
|
|
|
smartlist_split_string(domains_list, domains_str, ",", SPLIT_SKIP_SPACE,
|
|
|
|
-1);
|
|
|
|
tor_free(domains_str);
|
|
|
|
SMARTLIST_FOREACH(domains_list, const char *, domain,
|
|
|
|
{
|
|
|
|
if (!strcmp(domain, "*")) {
|
|
|
|
domains = ~0u;
|
|
|
|
} else {
|
|
|
|
int d;
|
|
|
|
int negate=0;
|
|
|
|
if (*domain == '~') {
|
|
|
|
negate = 1;
|
|
|
|
++domain;
|
|
|
|
}
|
|
|
|
d = parse_log_domain(domain);
|
|
|
|
if (!d) {
|
2009-01-23 23:45:08 +01:00
|
|
|
log_warn(LD_CONFIG, "No such logging domain as %s", domain);
|
2008-03-05 23:31:39 +01:00
|
|
|
err = 1;
|
|
|
|
} else {
|
|
|
|
if (negate)
|
|
|
|
neg_domains |= d;
|
|
|
|
else
|
|
|
|
domains |= d;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
SMARTLIST_FOREACH(domains_list, char *, d, tor_free(d));
|
|
|
|
smartlist_free(domains_list);
|
|
|
|
if (err)
|
|
|
|
return -1;
|
2011-01-25 21:03:36 +01:00
|
|
|
if (domains == 0 && neg_domains)
|
|
|
|
domains = ~neg_domains;
|
|
|
|
else
|
|
|
|
domains &= ~neg_domains;
|
2008-03-05 23:31:39 +01:00
|
|
|
cfg = eat_whitespace(closebracket+1);
|
|
|
|
} else {
|
|
|
|
++got_an_unqualified_range;
|
|
|
|
}
|
|
|
|
if (!strcasecmpstart(cfg, "file") ||
|
|
|
|
!strcasecmpstart(cfg, "stderr") ||
|
|
|
|
!strcasecmpstart(cfg, "stdout") ||
|
|
|
|
!strcasecmpstart(cfg, "syslog")) {
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
if (got_an_unqualified_range > 1)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
space = strchr(cfg, ' ');
|
|
|
|
dash = strchr(cfg, '-');
|
|
|
|
if (!space)
|
|
|
|
space = strchr(cfg, '\0');
|
|
|
|
if (dash && dash < space) {
|
|
|
|
sev_lo = tor_strndup(cfg, dash-cfg);
|
|
|
|
sev_hi = tor_strndup(dash+1, space-(dash+1));
|
|
|
|
} else {
|
|
|
|
sev_lo = tor_strndup(cfg, space-cfg);
|
|
|
|
sev_hi = tor_strdup("ERR");
|
|
|
|
}
|
2008-03-26 19:36:46 +01:00
|
|
|
low = parse_log_level(sev_lo);
|
|
|
|
high = parse_log_level(sev_hi);
|
|
|
|
tor_free(sev_lo);
|
|
|
|
tor_free(sev_hi);
|
|
|
|
if (low == -1)
|
2008-03-05 23:31:39 +01:00
|
|
|
return -1;
|
2008-03-26 19:36:46 +01:00
|
|
|
if (high == -1)
|
2008-03-05 23:31:39 +01:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
got_anything = 1;
|
|
|
|
for (i=low; i >= high; --i)
|
|
|
|
severity_out->masks[SEVERITY_MASK_IDX(i)] |= domains;
|
|
|
|
|
|
|
|
cfg = eat_whitespace(space);
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
*cfg_ptr = cfg;
|
|
|
|
return got_anything ? 0 : -1;
|
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/** Return the least severe log level that any current log is interested in. */
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
|
|
|
get_min_log_level(void)
|
2004-05-19 22:07:08 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-03-05 23:31:39 +01:00
|
|
|
int i;
|
2004-05-19 22:07:08 +02:00
|
|
|
int min = LOG_ERR;
|
|
|
|
for (lf = logfiles; lf; lf = lf->next) {
|
2008-03-05 23:31:39 +01:00
|
|
|
for (i = LOG_DEBUG; i > min; --i)
|
|
|
|
if (lf->severities->masks[SEVERITY_MASK_IDX(i)])
|
|
|
|
min = i;
|
2004-05-19 22:07:08 +02:00
|
|
|
}
|
|
|
|
return min;
|
|
|
|
}
|
|
|
|
|
2004-11-20 08:33:55 +01:00
|
|
|
/** Switch all logs to output at most verbose level. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
switch_logs_debug(void)
|
2004-11-20 08:33:55 +01:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-03-05 23:31:39 +01:00
|
|
|
int i;
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2004-11-20 08:33:55 +01:00
|
|
|
for (lf = logfiles; lf; lf=lf->next) {
|
2008-03-05 23:31:39 +01:00
|
|
|
for (i = LOG_DEBUG; i >= LOG_ERR; --i)
|
2008-03-13 23:18:36 +01:00
|
|
|
lf->severities->masks[SEVERITY_MASK_IDX(i)] = ~0u;
|
2004-11-20 08:33:55 +01:00
|
|
|
}
|
2008-11-17 20:58:51 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-11-20 08:33:55 +01:00
|
|
|
}
|
|
|
|
|
2006-01-11 20:40:14 +01:00
|
|
|
#if 0
|
|
|
|
static void
|
|
|
|
dump_log_info(logfile_t *lf)
|
|
|
|
{
|
|
|
|
const char *tp;
|
|
|
|
|
|
|
|
if (lf->filename) {
|
|
|
|
printf("=== log into \"%s\" (%s-%s) (%stemporary)\n", lf->filename,
|
|
|
|
sev_to_string(lf->min_loglevel),
|
|
|
|
sev_to_string(lf->max_loglevel),
|
|
|
|
lf->is_temporary?"":"not ");
|
|
|
|
} else if (lf->is_syslog) {
|
|
|
|
printf("=== syslog (%s-%s) (%stemporary)\n",
|
|
|
|
sev_to_string(lf->min_loglevel),
|
|
|
|
sev_to_string(lf->max_loglevel),
|
|
|
|
lf->is_temporary?"":"not ");
|
|
|
|
} else {
|
|
|
|
printf("=== log (%s-%s) (%stemporary)\n",
|
|
|
|
sev_to_string(lf->min_loglevel),
|
|
|
|
sev_to_string(lf->max_loglevel),
|
|
|
|
lf->is_temporary?"":"not ");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
describe_logs(void)
|
|
|
|
{
|
|
|
|
logfile_t *lf;
|
|
|
|
printf("==== BEGIN LOGS ====\n");
|
|
|
|
for (lf = logfiles; lf; lf = lf->next)
|
|
|
|
dump_log_info(lf);
|
|
|
|
printf("==== END LOGS ====\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|