2007-12-12 22:09:01 +01:00
|
|
|
/* Copyright (c) 2001, Matej Pfajfar.
|
2006-02-09 06:46:49 +01:00
|
|
|
* Copyright (c) 2001-2004, Roger Dingledine.
|
2007-12-12 22:09:01 +01:00
|
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
2008-02-07 06:31:47 +01:00
|
|
|
* Copyright (c) 2007-2008, The Tor Project, Inc. */
|
2002-11-24 09:45:13 +01:00
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
/* $Id$ */
|
2004-11-29 23:25:31 +01:00
|
|
|
const char log_c_id[] = "$Id$";
|
2002-06-27 00:45:49 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/**
|
|
|
|
* \file log.c
|
|
|
|
* \brief Functions to send messages to log files or the console.
|
2005-06-11 07:31:17 +02:00
|
|
|
**/
|
2004-05-10 05:53:24 +02:00
|
|
|
|
2004-11-14 18:21:32 +01:00
|
|
|
#include "orconfig.h"
|
2004-04-03 04:40:30 +02:00
|
|
|
#include <stdarg.h>
|
2004-04-03 06:05:12 +02:00
|
|
|
#include <assert.h>
|
2006-12-03 00:08:55 +01:00
|
|
|
#include <stdio.h>
|
2004-04-03 06:05:12 +02:00
|
|
|
#include <stdlib.h>
|
2004-05-19 22:07:08 +02:00
|
|
|
#include <string.h>
|
2005-08-12 19:24:53 +02:00
|
|
|
#ifdef HAVE_SYS_TIME_H
|
|
|
|
#include <sys/time.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_TIME_H
|
|
|
|
#include <time.h>
|
|
|
|
#endif
|
2008-03-05 23:31:39 +01:00
|
|
|
#include "util.h"
|
2008-03-13 23:18:38 +01:00
|
|
|
#define LOG_PRIVATE
|
2008-03-05 23:31:39 +01:00
|
|
|
#include "log.h"
|
|
|
|
#include "container.h"
|
2004-04-03 06:05:12 +02:00
|
|
|
|
2005-04-01 04:37:40 +02:00
|
|
|
#include <event.h>
|
|
|
|
|
2004-08-18 13:21:50 +02:00
|
|
|
#define TRUNCATED_STR "[...truncated]"
|
|
|
|
#define TRUNCATED_STR_LEN 14
|
2004-08-15 22:13:07 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Information for a single logfile; only used in log.c */
|
2003-09-16 19:58:36 +02:00
|
|
|
typedef struct logfile_t {
|
2004-05-10 12:27:54 +02:00
|
|
|
struct logfile_t *next; /**< Next logfile_t in the linked list. */
|
2004-05-20 21:47:28 +02:00
|
|
|
char *filename; /**< Filename to open. */
|
2004-05-10 12:27:54 +02:00
|
|
|
FILE *file; /**< Stream to receive log messages. */
|
2007-05-29 20:21:00 +02:00
|
|
|
int seems_dead; /**< Boolean: true if the stream seems to be kaput. */
|
2004-05-10 05:53:24 +02:00
|
|
|
int needs_close; /**< Boolean: true if the stream gets closed on shutdown. */
|
2004-05-20 21:47:28 +02:00
|
|
|
int is_temporary; /**< Boolean: close after initializing logging subsystem.*/
|
2004-10-26 23:48:41 +02:00
|
|
|
int is_syslog; /**< Boolean: send messages to syslog. */
|
2004-11-03 22:53:12 +01:00
|
|
|
log_callback callback; /**< If not NULL, send messages to this function. */
|
2008-03-05 23:31:39 +01:00
|
|
|
log_severity_list_t *severities; /**< DOCDOC */
|
2003-09-16 19:58:36 +02:00
|
|
|
} logfile_t;
|
|
|
|
|
2008-03-05 23:31:39 +01:00
|
|
|
static void log_free(logfile_t *victim);
|
|
|
|
|
2004-05-10 12:27:54 +02:00
|
|
|
/** Helper: map a log severity to descriptive string. */
|
2005-09-30 03:09:52 +02:00
|
|
|
static INLINE const char *
|
|
|
|
sev_to_string(int severity)
|
|
|
|
{
|
2004-11-28 10:05:49 +01:00
|
|
|
switch (severity) {
|
2003-06-25 06:47:54 +02:00
|
|
|
case LOG_DEBUG: return "debug";
|
|
|
|
case LOG_INFO: return "info";
|
2004-03-30 05:15:23 +02:00
|
|
|
case LOG_NOTICE: return "notice";
|
2003-10-10 03:48:03 +02:00
|
|
|
case LOG_WARN: return "warn";
|
2003-06-25 06:47:54 +02:00
|
|
|
case LOG_ERR: return "err";
|
2008-03-11 19:56:41 +01:00
|
|
|
default: /* Call assert, not tor_assert, since tor_assert
|
|
|
|
* calls log on failure. */
|
|
|
|
assert(0); return "UNKNOWN";
|
2002-09-04 02:39:33 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-09-29 20:13:37 +02:00
|
|
|
/** Helper: decide whether to include the function name in the log message. */
|
2006-09-29 20:13:29 +02:00
|
|
|
static INLINE int
|
2008-03-05 23:31:39 +01:00
|
|
|
should_log_function_name(log_domain_mask_t domain, int severity)
|
2006-09-29 20:13:29 +02:00
|
|
|
{
|
|
|
|
switch (severity) {
|
|
|
|
case LOG_DEBUG:
|
|
|
|
case LOG_INFO:
|
|
|
|
/* All debugging messages occur in interesting places. */
|
|
|
|
return 1;
|
|
|
|
case LOG_NOTICE:
|
2008-03-05 23:31:39 +01:00
|
|
|
case LOG_WARN:
|
2006-09-29 20:13:29 +02:00
|
|
|
case LOG_ERR:
|
|
|
|
/* We care about places where bugs occur. */
|
|
|
|
return (domain == LD_BUG);
|
|
|
|
default:
|
2008-03-11 19:56:41 +01:00
|
|
|
/* Call assert, not tor_assert, since tor_assert calls log on failure. */
|
2006-09-29 20:13:29 +02:00
|
|
|
assert(0); return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-01-02 06:38:53 +01:00
|
|
|
#define USE_LOG_MUTEX
|
|
|
|
|
|
|
|
#ifdef USE_LOG_MUTEX
|
|
|
|
/** A mutex to guard changes to logfiles and logging. */
|
|
|
|
static tor_mutex_t *log_mutex = NULL;
|
|
|
|
#endif
|
2004-05-10 12:27:54 +02:00
|
|
|
/** Linked list of logfile_t. */
|
2003-09-16 19:58:36 +02:00
|
|
|
static logfile_t *logfiles = NULL;
|
2004-10-26 23:48:41 +02:00
|
|
|
#ifdef HAVE_SYSLOG_H
|
|
|
|
static int syslog_count = 0;
|
|
|
|
#endif
|
2003-06-21 21:03:22 +02:00
|
|
|
|
2008-01-02 06:38:53 +01:00
|
|
|
#ifdef USE_LOG_MUTEX
|
|
|
|
#define LOCK_LOGS() STMT_BEGIN \
|
|
|
|
tor_mutex_acquire(log_mutex); \
|
|
|
|
STMT_END
|
|
|
|
#define UNLOCK_LOGS() STMT_BEGIN tor_mutex_release(log_mutex); STMT_END
|
|
|
|
#else
|
|
|
|
#define LOCK_LOGS() STMT_NIL
|
|
|
|
#define UNLOCK_LOGS() STMT_NIL
|
|
|
|
#endif
|
|
|
|
|
2007-02-21 06:57:12 +01:00
|
|
|
/* What's the lowest log level anybody cares about? */
|
|
|
|
int _log_global_min_severity = LOG_NOTICE;
|
|
|
|
|
2004-09-23 06:59:02 +02:00
|
|
|
static void delete_log(logfile_t *victim);
|
2004-10-26 23:48:41 +02:00
|
|
|
static void close_log(logfile_t *victim);
|
2004-09-23 06:59:02 +02:00
|
|
|
|
2007-05-29 19:31:13 +02:00
|
|
|
/** Name of the application: used to generate the message we write at the
|
|
|
|
* start of each new log. */
|
2007-05-22 17:48:46 +02:00
|
|
|
static char *appname = NULL;
|
|
|
|
|
2007-05-29 19:31:13 +02:00
|
|
|
/** Set the "application name" for the logs to <b>name</b>: we'll use this
|
|
|
|
* name in the message we write when starting up, and at the start of each new
|
|
|
|
* log.
|
|
|
|
*
|
|
|
|
* Tor uses this string to write the version number to the log file. */
|
2007-05-22 17:48:46 +02:00
|
|
|
void
|
|
|
|
log_set_application_name(const char *name)
|
|
|
|
{
|
|
|
|
tor_free(appname);
|
|
|
|
appname = name ? tor_strdup(name) : NULL;
|
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/** Helper: Write the standard prefix for log lines to a
|
|
|
|
* <b>buf_len</b> character buffer in <b>buf</b>.
|
|
|
|
*/
|
2004-09-23 06:59:02 +02:00
|
|
|
static INLINE size_t
|
2007-03-04 22:08:26 +01:00
|
|
|
_log_prefix(char *buf, size_t buf_len, int severity)
|
2002-06-27 00:45:49 +02:00
|
|
|
{
|
2002-09-04 02:39:33 +02:00
|
|
|
time_t t;
|
2002-11-24 09:45:13 +01:00
|
|
|
struct timeval now;
|
2005-02-22 08:03:03 +01:00
|
|
|
struct tm tm;
|
2004-03-09 23:01:17 +01:00
|
|
|
size_t n;
|
2004-10-27 08:37:34 +02:00
|
|
|
int r;
|
2003-09-16 19:58:36 +02:00
|
|
|
|
2003-10-04 05:29:09 +02:00
|
|
|
tor_gettimeofday(&now);
|
2003-09-16 19:58:36 +02:00
|
|
|
t = (time_t)now.tv_sec;
|
2003-12-14 10:58:43 +01:00
|
|
|
|
2005-02-22 08:03:03 +01:00
|
|
|
n = strftime(buf, buf_len, "%b %d %H:%M:%S", tor_localtime_r(&t, &tm));
|
2007-05-13 11:25:06 +02:00
|
|
|
r = tor_snprintf(buf+n, buf_len-n, ".%.3ld [%s] ",
|
2007-03-04 21:11:46 +01:00
|
|
|
(long)now.tv_usec / 1000, sev_to_string(severity));
|
2004-10-27 08:37:34 +02:00
|
|
|
if (r<0)
|
|
|
|
return buf_len-1;
|
|
|
|
else
|
|
|
|
return n+r;
|
2004-06-21 06:37:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/** If lf refers to an actual file that we have just opened, and the file
|
2004-11-20 07:52:13 +01:00
|
|
|
* contains no data, log an "opening new logfile" message at the top.
|
|
|
|
*
|
|
|
|
* Return -1 if the log is broken and needs to be deleted, else return 0.
|
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
static int
|
|
|
|
log_tor_version(logfile_t *lf, int reset)
|
2004-06-21 06:37:27 +02:00
|
|
|
{
|
|
|
|
char buf[256];
|
|
|
|
size_t n;
|
2004-06-30 18:35:11 +02:00
|
|
|
int is_new;
|
2004-06-21 06:37:27 +02:00
|
|
|
|
|
|
|
if (!lf->needs_close)
|
|
|
|
/* If it doesn't get closed, it isn't really a file. */
|
2004-11-20 07:52:13 +01:00
|
|
|
return 0;
|
2004-06-21 06:37:27 +02:00
|
|
|
if (lf->is_temporary)
|
|
|
|
/* If it's temporary, it isn't really a file. */
|
2004-11-20 07:52:13 +01:00
|
|
|
return 0;
|
2004-11-14 10:48:54 +01:00
|
|
|
#ifdef HAVE_FTELLO
|
2004-11-12 06:05:41 +01:00
|
|
|
is_new = (ftello(lf->file) == 0);
|
|
|
|
#else
|
2004-06-30 18:35:11 +02:00
|
|
|
is_new = (ftell(lf->file) == 0);
|
2004-11-12 06:05:41 +01:00
|
|
|
#endif
|
2004-06-30 18:35:11 +02:00
|
|
|
if (reset && !is_new)
|
|
|
|
/* We are resetting, but we aren't at the start of the file; no
|
|
|
|
* need to log again. */
|
2004-11-20 07:52:13 +01:00
|
|
|
return 0;
|
2007-03-04 22:08:26 +01:00
|
|
|
n = _log_prefix(buf, sizeof(buf), LOG_NOTICE);
|
2007-05-22 17:48:46 +02:00
|
|
|
if (appname) {
|
|
|
|
tor_snprintf(buf+n, sizeof(buf)-n,
|
|
|
|
"%s opening %slog file.\n", appname, is_new?"new ":"");
|
|
|
|
} else {
|
|
|
|
tor_snprintf(buf+n, sizeof(buf)-n,
|
|
|
|
"Tor %s opening %slog file.\n", VERSION, is_new?"new ":"");
|
|
|
|
}
|
2004-11-24 09:42:06 +01:00
|
|
|
if (fputs(buf, lf->file) == EOF ||
|
2004-11-28 12:39:53 +01:00
|
|
|
fflush(lf->file) == EOF) /* error */
|
2004-11-20 07:52:13 +01:00
|
|
|
return -1; /* failed */
|
|
|
|
return 0;
|
2004-06-21 06:37:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/** Helper: Format a log message into a fixed-sized buffer. (This is
|
|
|
|
* factored out of <b>logv</b> so that we never format a message more
|
2004-10-26 23:48:41 +02:00
|
|
|
* than once.) Return a pointer to the first character of the message
|
|
|
|
* portion of the formatted string.
|
2004-06-21 06:37:27 +02:00
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
static INLINE char *
|
|
|
|
format_msg(char *buf, size_t buf_len,
|
2008-03-05 23:31:39 +01:00
|
|
|
log_domain_mask_t domain, int severity, const char *funcname,
|
2005-09-30 03:09:52 +02:00
|
|
|
const char *format, va_list ap)
|
2004-06-21 06:37:27 +02:00
|
|
|
{
|
|
|
|
size_t n;
|
2004-10-27 08:37:34 +02:00
|
|
|
int r;
|
2004-10-26 23:48:41 +02:00
|
|
|
char *end_of_prefix;
|
2004-11-29 09:40:24 +01:00
|
|
|
|
2008-03-11 19:56:41 +01:00
|
|
|
assert(buf_len >= 2); /* prevent integer underflow */
|
2004-06-21 06:37:27 +02:00
|
|
|
buf_len -= 2; /* subtract 2 characters so we have room for \n\0 */
|
|
|
|
|
2007-03-04 22:08:26 +01:00
|
|
|
n = _log_prefix(buf, buf_len, severity);
|
2004-10-26 23:48:41 +02:00
|
|
|
end_of_prefix = buf+n;
|
2003-09-25 12:42:07 +02:00
|
|
|
|
2006-09-29 20:13:29 +02:00
|
|
|
if (funcname && should_log_function_name(domain, severity)) {
|
2004-10-27 08:37:34 +02:00
|
|
|
r = tor_snprintf(buf+n, buf_len-n, "%s(): ", funcname);
|
|
|
|
if (r<0)
|
|
|
|
n = strlen(buf);
|
|
|
|
else
|
|
|
|
n += r;
|
2003-09-19 11:30:34 +02:00
|
|
|
}
|
2004-11-09 21:04:00 +01:00
|
|
|
|
2007-03-04 21:11:46 +01:00
|
|
|
if (domain == LD_BUG && buf_len-n > 6) {
|
|
|
|
memcpy(buf+n, "Bug: ", 6);
|
|
|
|
n += 5;
|
|
|
|
}
|
|
|
|
|
2004-10-27 23:14:11 +02:00
|
|
|
r = tor_vsnprintf(buf+n,buf_len-n,format,ap);
|
2004-11-28 10:05:49 +01:00
|
|
|
if (r < 0) {
|
2004-11-29 21:39:55 +01:00
|
|
|
/* The message was too long; overwrite the end of the buffer with
|
|
|
|
* "[...truncated]" */
|
|
|
|
if (buf_len >= TRUNCATED_STR_LEN) {
|
2008-02-21 22:57:42 +01:00
|
|
|
size_t offset = buf_len-TRUNCATED_STR_LEN;
|
2004-11-30 07:15:06 +01:00
|
|
|
/* We have an extra 2 characters after buf_len to hold the \n\0,
|
|
|
|
* so it's safe to add 1 to the size here. */
|
|
|
|
strlcpy(buf+offset, TRUNCATED_STR, buf_len-offset+1);
|
2004-11-29 21:39:55 +01:00
|
|
|
}
|
|
|
|
/* Set 'n' to the end of the buffer, where we'll be writing \n\0.
|
|
|
|
* Since we already subtracted 2 from buf_len, this is safe.*/
|
|
|
|
n = buf_len;
|
2004-10-27 23:14:11 +02:00
|
|
|
} else {
|
|
|
|
n += r;
|
2004-08-15 22:13:07 +02:00
|
|
|
}
|
2003-09-16 19:58:36 +02:00
|
|
|
buf[n]='\n';
|
|
|
|
buf[n+1]='\0';
|
2004-10-26 23:48:41 +02:00
|
|
|
return end_of_prefix;
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Helper: sends a message to the appropriate logfiles, at loglevel
|
|
|
|
* <b>severity</b>. If provided, <b>funcname</b> is prepended to the
|
2004-10-27 08:37:34 +02:00
|
|
|
* message. The actual message is derived as from tor_snprintf(format,ap).
|
2004-05-10 05:53:24 +02:00
|
|
|
*/
|
2003-12-17 22:14:13 +01:00
|
|
|
static void
|
2008-03-05 23:31:39 +01:00
|
|
|
logv(int severity, log_domain_mask_t domain, const char *funcname,
|
|
|
|
const char *format, va_list ap)
|
2003-09-16 19:58:36 +02:00
|
|
|
{
|
2003-09-30 21:53:25 +02:00
|
|
|
char buf[10024];
|
2003-09-16 19:58:36 +02:00
|
|
|
int formatted = 0;
|
|
|
|
logfile_t *lf;
|
2004-10-26 23:48:41 +02:00
|
|
|
char *end_of_prefix=NULL;
|
2003-12-14 10:58:43 +01:00
|
|
|
|
2008-03-11 19:56:41 +01:00
|
|
|
/* Call assert, not tor_assert, since tor_assert calls log on failure. */
|
2003-06-21 21:03:22 +02:00
|
|
|
assert(format);
|
2008-03-13 17:56:14 +01:00
|
|
|
/* check that severity is sane. Overrunning the masks array leads to
|
|
|
|
* interesting and hard to diagnose effects */
|
|
|
|
assert(severity >= LOG_ERR && severity <= LOG_DEBUG);
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2004-09-23 05:51:45 +02:00
|
|
|
lf = logfiles;
|
2004-11-28 10:05:49 +01:00
|
|
|
while (lf) {
|
2008-03-05 23:31:39 +01:00
|
|
|
if (! (lf->severities->masks[SEVERITY_MASK_IDX(severity)] & domain)) {
|
2004-09-23 05:51:45 +02:00
|
|
|
lf = lf->next;
|
2003-09-16 19:58:36 +02:00
|
|
|
continue;
|
2004-09-23 05:51:45 +02:00
|
|
|
}
|
2004-11-03 19:27:19 +01:00
|
|
|
if (! (lf->file || lf->is_syslog || lf->callback)) {
|
2004-09-23 05:51:45 +02:00
|
|
|
lf = lf->next;
|
2003-09-16 19:58:36 +02:00
|
|
|
continue;
|
2004-09-23 05:51:45 +02:00
|
|
|
}
|
2007-05-29 20:21:00 +02:00
|
|
|
if (lf->seems_dead) {
|
|
|
|
lf = lf->next;
|
|
|
|
continue;
|
|
|
|
}
|
2002-07-12 20:14:17 +02:00
|
|
|
|
2003-09-16 19:58:36 +02:00
|
|
|
if (!formatted) {
|
2004-10-26 23:48:41 +02:00
|
|
|
end_of_prefix =
|
2006-09-29 20:13:29 +02:00
|
|
|
format_msg(buf, sizeof(buf), domain, severity, funcname, format, ap);
|
2003-09-16 19:58:36 +02:00
|
|
|
formatted = 1;
|
|
|
|
}
|
2004-10-26 23:48:41 +02:00
|
|
|
if (lf->is_syslog) {
|
|
|
|
#ifdef HAVE_SYSLOG_H
|
2007-02-01 19:33:02 +01:00
|
|
|
/* XXXX Some syslog implementations have scary limits on the length of
|
|
|
|
* what you can pass them. Can/should we detect this? */
|
2004-10-26 23:48:41 +02:00
|
|
|
syslog(severity, "%s", end_of_prefix);
|
|
|
|
#endif
|
|
|
|
lf = lf->next;
|
|
|
|
continue;
|
2004-11-03 19:27:19 +01:00
|
|
|
} else if (lf->callback) {
|
2005-10-18 23:58:19 +02:00
|
|
|
lf->callback(severity, domain, end_of_prefix);
|
2004-11-03 19:27:19 +01:00
|
|
|
lf = lf->next;
|
|
|
|
continue;
|
2004-10-26 23:48:41 +02:00
|
|
|
}
|
2004-11-28 10:05:49 +01:00
|
|
|
if (fputs(buf, lf->file) == EOF ||
|
2004-11-28 12:39:53 +01:00
|
|
|
fflush(lf->file) == EOF) { /* error */
|
2007-05-29 20:21:00 +02:00
|
|
|
/* don't log the error! mark this log entry to be blown away, and
|
|
|
|
* continue. */
|
|
|
|
lf->seems_dead = 1;
|
2004-03-14 16:50:00 +01:00
|
|
|
}
|
2007-05-29 20:21:00 +02:00
|
|
|
lf = lf->next;
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2003-06-21 21:03:22 +02:00
|
|
|
}
|
2003-06-17 23:36:44 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Output a message to the log. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log(int severity, log_domain_mask_t domain, const char *format, ...)
|
2003-06-17 23:36:44 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (severity > _log_global_min_severity)
|
|
|
|
return;
|
2003-06-17 23:36:44 +02:00
|
|
|
va_start(ap,format);
|
2005-10-18 23:58:19 +02:00
|
|
|
logv(severity, domain, NULL, format, ap);
|
2003-06-17 23:36:44 +02:00
|
|
|
va_end(ap);
|
2002-06-27 00:45:49 +02:00
|
|
|
}
|
2002-09-04 02:39:33 +02:00
|
|
|
|
2004-05-10 12:27:54 +02:00
|
|
|
/** Output a message to the log, prefixed with a function name <b>fn</b>. */
|
2004-11-15 22:18:07 +01:00
|
|
|
#ifdef __GNUC__
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_fn(int severity, log_domain_mask_t domain, const char *fn,
|
|
|
|
const char *format, ...)
|
2003-06-17 23:36:44 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (severity > _log_global_min_severity)
|
|
|
|
return;
|
2003-06-17 23:36:44 +02:00
|
|
|
va_start(ap,format);
|
2005-10-18 23:58:19 +02:00
|
|
|
logv(severity, domain, fn, format, ap);
|
2003-06-17 23:36:44 +02:00
|
|
|
va_end(ap);
|
|
|
|
}
|
2004-11-15 22:18:07 +01:00
|
|
|
#else
|
|
|
|
const char *_log_fn_function_name=NULL;
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_fn(int severity, log_domain_mask_t domain, const char *format, ...)
|
2004-11-15 22:18:07 +01:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (severity > _log_global_min_severity)
|
|
|
|
return;
|
2004-11-15 22:18:07 +01:00
|
|
|
va_start(ap,format);
|
2005-10-18 23:58:19 +02:00
|
|
|
logv(severity, domain, _log_fn_function_name, format, ap);
|
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_debug(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
/* For GCC we do this check in the macro. */
|
|
|
|
if (PREDICT_LIKELY(LOG_DEBUG > _log_global_min_severity))
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_DEBUG, domain, _log_fn_function_name, format, ap);
|
2005-10-18 23:58:19 +02:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_info(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (LOG_INFO > _log_global_min_severity)
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_INFO, domain, _log_fn_function_name, format, ap);
|
2005-10-18 23:58:19 +02:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_notice(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (LOG_NOTICE > _log_global_min_severity)
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_NOTICE, domain, _log_fn_function_name, format, ap);
|
2005-10-18 23:58:19 +02:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_warn(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (LOG_WARN > _log_global_min_severity)
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_WARN, domain, _log_fn_function_name, format, ap);
|
2005-10-18 23:58:19 +02:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
_log_err(log_domain_mask_t domain, const char *format, ...)
|
2005-10-18 23:58:19 +02:00
|
|
|
{
|
|
|
|
va_list ap;
|
2008-01-02 06:38:53 +01:00
|
|
|
if (LOG_ERR > _log_global_min_severity)
|
|
|
|
return;
|
2005-10-18 23:58:19 +02:00
|
|
|
va_start(ap,format);
|
2006-02-18 08:18:14 +01:00
|
|
|
logv(LOG_ERR, domain, _log_fn_function_name, format, ap);
|
2004-11-15 22:18:07 +01:00
|
|
|
va_end(ap);
|
|
|
|
_log_fn_function_name = NULL;
|
|
|
|
}
|
|
|
|
#endif
|
2003-06-17 23:36:44 +02:00
|
|
|
|
2008-03-05 23:31:39 +01:00
|
|
|
/** DOCDOC */
|
|
|
|
static void
|
|
|
|
log_free(logfile_t *victim)
|
|
|
|
{
|
|
|
|
tor_free(victim->severities);
|
|
|
|
tor_free(victim->filename);
|
|
|
|
tor_free(victim);
|
|
|
|
}
|
|
|
|
|
2007-07-16 06:33:47 +02:00
|
|
|
/** Close all open log files, and free other static memory. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2007-07-16 06:33:47 +02:00
|
|
|
logs_free_all(void)
|
2003-09-16 19:58:36 +02:00
|
|
|
{
|
2006-03-13 01:54:21 +01:00
|
|
|
logfile_t *victim, *next;
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2006-03-13 01:54:21 +01:00
|
|
|
next = logfiles;
|
|
|
|
logfiles = NULL;
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2006-03-13 01:54:21 +01:00
|
|
|
while (next) {
|
|
|
|
victim = next;
|
|
|
|
next = next->next;
|
2004-10-26 23:48:41 +02:00
|
|
|
close_log(victim);
|
2008-03-05 23:31:39 +01:00
|
|
|
log_free(victim);
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
2007-07-16 06:33:47 +02:00
|
|
|
tor_free(appname);
|
2008-03-27 16:05:28 +01:00
|
|
|
tor_mutex_free(log_mutex);
|
|
|
|
log_mutex = NULL;
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
2003-06-17 23:36:44 +02:00
|
|
|
|
2004-09-23 06:59:02 +02:00
|
|
|
/** Remove and free the log entry <b>victim</b> from the linked-list
|
2006-06-09 08:35:45 +02:00
|
|
|
* logfiles (it is probably present, but it might not be due to thread
|
|
|
|
* racing issues). After this function is called, the caller shouldn't
|
|
|
|
* refer to <b>victim</b> anymore.
|
|
|
|
*
|
|
|
|
* Long-term, we need to do something about races in the log subsystem
|
|
|
|
* in general. See bug 222 for more details.
|
2004-09-23 06:59:02 +02:00
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
static void
|
|
|
|
delete_log(logfile_t *victim)
|
|
|
|
{
|
2004-09-23 06:59:02 +02:00
|
|
|
logfile_t *tmpl;
|
2004-11-28 10:05:49 +01:00
|
|
|
if (victim == logfiles)
|
2004-09-23 06:59:02 +02:00
|
|
|
logfiles = victim->next;
|
|
|
|
else {
|
2004-11-28 10:05:49 +01:00
|
|
|
for (tmpl = logfiles; tmpl && tmpl->next != victim; tmpl=tmpl->next) ;
|
2006-06-09 08:35:45 +02:00
|
|
|
// tor_assert(tmpl);
|
|
|
|
// tor_assert(tmpl->next == victim);
|
|
|
|
if (!tmpl)
|
|
|
|
return;
|
2004-09-23 06:59:02 +02:00
|
|
|
tmpl->next = victim->next;
|
|
|
|
}
|
2008-03-05 23:31:39 +01:00
|
|
|
log_free(victim);
|
2004-09-23 06:59:02 +02:00
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/** Helper: release system resources (but not memory) held by a single
|
|
|
|
* logfile_t. */
|
2005-09-30 03:09:52 +02:00
|
|
|
static void
|
|
|
|
close_log(logfile_t *victim)
|
2004-10-26 23:48:41 +02:00
|
|
|
{
|
|
|
|
if (victim->needs_close && victim->file) {
|
|
|
|
fclose(victim->file);
|
|
|
|
} else if (victim->is_syslog) {
|
|
|
|
#ifdef HAVE_SYSLOG_H
|
2005-08-08 19:31:57 +02:00
|
|
|
if (--syslog_count == 0) {
|
2004-10-26 23:48:41 +02:00
|
|
|
/* There are no other syslogs; close the logging facility. */
|
|
|
|
closelog();
|
2005-08-08 19:31:57 +02:00
|
|
|
}
|
2004-10-26 23:48:41 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-03-13 23:18:38 +01:00
|
|
|
/** Adjust a log severity configuration in <b>severity_out</b> to contain
|
|
|
|
* every domain between <b>loglevelMin</b> and <b>loglevelMax</b>, inclusive.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
set_log_severity_config(int loglevelMin, int loglevelMax,
|
|
|
|
log_severity_list_t *severity_out)
|
2008-03-05 23:31:39 +01:00
|
|
|
{
|
|
|
|
int i;
|
2008-03-13 23:18:38 +01:00
|
|
|
tor_assert(loglevelMin >= loglevelMax);
|
|
|
|
tor_assert(loglevelMin >= LOG_ERR && loglevelMin <= LOG_DEBUG);
|
|
|
|
tor_assert(loglevelMax >= LOG_ERR && loglevelMax <= LOG_DEBUG);
|
|
|
|
memset(severity_out, 0, sizeof(log_severity_list_t));
|
2008-03-05 23:31:39 +01:00
|
|
|
for (i = loglevelMin; i >= loglevelMax; --i) {
|
2008-03-13 23:18:38 +01:00
|
|
|
severity_out->masks[SEVERITY_MASK_IDX(i)] = ~0u;
|
2008-03-05 23:31:39 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Add a log handler named <b>name</b> to send all messages in <b>severity</b>
|
2008-03-08 02:11:54 +01:00
|
|
|
* to <b>stream</b>. Copies <b>severity</b>. Helper: does no locking. */
|
2008-01-02 06:38:53 +01:00
|
|
|
static void
|
2008-03-05 23:31:39 +01:00
|
|
|
add_stream_log_impl(log_severity_list_t *severity,
|
2008-01-02 06:38:53 +01:00
|
|
|
const char *name, FILE *stream)
|
2003-09-16 19:58:36 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2004-10-26 23:48:41 +02:00
|
|
|
lf = tor_malloc_zero(sizeof(logfile_t));
|
2004-05-20 21:47:28 +02:00
|
|
|
lf->filename = tor_strdup(name);
|
2008-03-08 02:11:54 +01:00
|
|
|
lf->severities = tor_memdup(severity, sizeof(log_severity_list_t));
|
2003-09-16 19:58:36 +02:00
|
|
|
lf->file = stream;
|
|
|
|
lf->next = logfiles;
|
2007-02-21 06:57:12 +01:00
|
|
|
|
2008-01-02 06:38:53 +01:00
|
|
|
logfiles = lf;
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
|
|
|
|
2008-03-05 23:31:39 +01:00
|
|
|
/** Add a log handler named <b>name</b> to send all messages in <b>severity</b>
|
|
|
|
* to <b>stream</b>. Steals a reference to <b>severity</b>; the caller must
|
|
|
|
* not use it after calling this function. */
|
2008-01-02 06:38:53 +01:00
|
|
|
void
|
2008-03-05 23:31:39 +01:00
|
|
|
add_stream_log(log_severity_list_t *severity,
|
2008-01-02 06:38:53 +01:00
|
|
|
const char *name, FILE *stream)
|
|
|
|
{
|
|
|
|
LOCK_LOGS();
|
2008-03-05 23:31:39 +01:00
|
|
|
add_stream_log_impl(severity, name, stream);
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Initialize the global logging facility */
|
|
|
|
void
|
|
|
|
init_logging(void)
|
|
|
|
{
|
|
|
|
if (!log_mutex)
|
|
|
|
log_mutex = tor_mutex_new();
|
|
|
|
}
|
|
|
|
|
2004-05-20 21:47:28 +02:00
|
|
|
/** Add a log handler to receive messages during startup (before the real
|
|
|
|
* logs are initialized).
|
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
2008-03-27 18:25:49 +01:00
|
|
|
add_temp_log(int min_severity)
|
2004-05-20 21:47:28 +02:00
|
|
|
{
|
2008-03-13 23:18:38 +01:00
|
|
|
log_severity_list_t *s = tor_malloc_zero(sizeof(log_severity_list_t));
|
2008-03-27 18:25:49 +01:00
|
|
|
set_log_severity_config(min_severity, LOG_ERR, s);
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2008-03-13 23:18:38 +01:00
|
|
|
add_stream_log_impl(s, "<temp>", stdout);
|
2008-03-26 19:59:45 +01:00
|
|
|
tor_free(s);
|
2004-05-20 21:47:28 +02:00
|
|
|
logfiles->is_temporary = 1;
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-05-20 21:47:28 +02:00
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/**
|
2008-03-05 23:31:39 +01:00
|
|
|
* Add a log handler to send messages in <b>severity</b>
|
|
|
|
* to the function <b>cb</b>.
|
2005-03-17 13:38:37 +01:00
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
2008-03-05 23:31:39 +01:00
|
|
|
add_callback_log(log_severity_list_t *severity, log_callback cb)
|
2004-11-03 19:27:19 +01:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
|
|
|
lf = tor_malloc_zero(sizeof(logfile_t));
|
2008-03-08 02:11:54 +01:00
|
|
|
lf->severities = tor_memdup(severity, sizeof(log_severity_list_t));
|
2004-11-03 22:53:12 +01:00
|
|
|
lf->filename = tor_strdup("<callback>");
|
2004-11-03 19:27:19 +01:00
|
|
|
lf->callback = cb;
|
|
|
|
lf->next = logfiles;
|
2007-02-21 06:57:12 +01:00
|
|
|
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
|
|
|
logfiles = lf;
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-11-03 19:27:19 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-09-29 20:13:37 +02:00
|
|
|
/** Adjust the configured severity of any logs whose callback function is
|
|
|
|
* <b>cb</b>. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
change_callback_log_severity(int loglevelMin, int loglevelMax,
|
|
|
|
log_callback cb)
|
2005-04-06 00:56:17 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-03-17 04:37:52 +01:00
|
|
|
log_severity_list_t severities;
|
|
|
|
set_log_severity_config(loglevelMin, loglevelMax, &severities);
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2005-04-06 00:56:17 +02:00
|
|
|
for (lf = logfiles; lf; lf = lf->next) {
|
|
|
|
if (lf->callback == cb) {
|
2008-03-17 04:37:52 +01:00
|
|
|
memcpy(lf->severities, &severities, sizeof(severities));
|
2005-04-06 00:56:17 +02:00
|
|
|
}
|
|
|
|
}
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2005-04-06 00:56:17 +02:00
|
|
|
}
|
|
|
|
|
2008-03-26 19:59:45 +01:00
|
|
|
/** Close any log handlers added by add_temp_log() or marked by
|
|
|
|
* mark_logs_temp(). */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
close_temp_logs(void)
|
2004-05-20 21:47:28 +02:00
|
|
|
{
|
2004-11-20 13:16:47 +01:00
|
|
|
logfile_t *lf, **p;
|
2008-01-02 06:38:53 +01:00
|
|
|
|
|
|
|
LOCK_LOGS();
|
2004-11-20 13:16:47 +01:00
|
|
|
for (p = &logfiles; *p; ) {
|
|
|
|
if ((*p)->is_temporary) {
|
|
|
|
lf = *p;
|
2004-11-20 13:17:19 +01:00
|
|
|
/* we use *p here to handle the edge case of the head of the list */
|
2004-11-20 13:16:47 +01:00
|
|
|
*p = (*p)->next;
|
|
|
|
close_log(lf);
|
2008-03-05 23:31:39 +01:00
|
|
|
log_free(lf);
|
2004-05-20 21:47:28 +02:00
|
|
|
} else {
|
2004-11-20 13:16:47 +01:00
|
|
|
p = &((*p)->next);
|
2004-05-20 21:47:28 +02:00
|
|
|
}
|
|
|
|
}
|
2007-02-21 06:57:12 +01:00
|
|
|
|
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-05-20 21:47:28 +02:00
|
|
|
}
|
|
|
|
|
2006-01-11 20:40:14 +01:00
|
|
|
/** Make all currently temporary logs (set to be closed by close_temp_logs)
|
|
|
|
* live again, and close all non-temporary logs. */
|
|
|
|
void
|
|
|
|
rollback_log_changes(void)
|
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2006-01-11 20:40:14 +01:00
|
|
|
for (lf = logfiles; lf; lf = lf->next)
|
|
|
|
lf->is_temporary = ! lf->is_temporary;
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2006-01-11 20:40:14 +01:00
|
|
|
close_temp_logs();
|
|
|
|
}
|
|
|
|
|
2008-03-26 19:59:45 +01:00
|
|
|
/** Configure all log handles to be closed by close_temp_logs(). */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
mark_logs_temp(void)
|
2004-06-02 21:18:37 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2004-06-02 21:18:37 +02:00
|
|
|
for (lf = logfiles; lf; lf = lf->next)
|
|
|
|
lf->is_temporary = 1;
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-06-02 21:18:37 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/**
|
|
|
|
* Add a log handler to send messages to <b>filename</b>. If opening
|
|
|
|
* the logfile fails, -1 is returned and errno is set appropriately
|
2004-05-10 12:27:54 +02:00
|
|
|
* (by fopen).
|
2003-11-19 03:09:43 +01:00
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
2008-03-05 23:31:39 +01:00
|
|
|
add_file_log(log_severity_list_t *severity, const char *filename)
|
2003-09-16 19:58:36 +02:00
|
|
|
{
|
|
|
|
FILE *f;
|
2008-01-02 06:38:53 +01:00
|
|
|
logfile_t *lf;
|
2003-09-16 19:58:36 +02:00
|
|
|
f = fopen(filename, "a");
|
2003-10-15 20:38:38 +02:00
|
|
|
if (!f) return -1;
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2008-03-05 23:31:39 +01:00
|
|
|
add_stream_log_impl(severity, filename, f);
|
2003-09-16 19:58:36 +02:00
|
|
|
logfiles->needs_close = 1;
|
2008-01-02 06:38:53 +01:00
|
|
|
lf = logfiles;
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
|
|
|
|
|
|
|
if (log_tor_version(lf, 0) < 0) {
|
|
|
|
LOCK_LOGS();
|
|
|
|
delete_log(lf);
|
|
|
|
UNLOCK_LOGS();
|
|
|
|
}
|
|
|
|
|
2003-10-15 20:38:38 +02:00
|
|
|
return 0;
|
2003-09-16 19:58:36 +02:00
|
|
|
}
|
2003-09-27 00:27:24 +02:00
|
|
|
|
2004-10-26 23:48:41 +02:00
|
|
|
#ifdef HAVE_SYSLOG_H
|
|
|
|
/**
|
|
|
|
* Add a log handler to send messages to they system log facility.
|
|
|
|
*/
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
2008-03-05 23:31:39 +01:00
|
|
|
add_syslog_log(log_severity_list_t *severity)
|
2004-10-26 23:48:41 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
|
|
|
if (syslog_count++ == 0)
|
2004-11-09 02:24:10 +01:00
|
|
|
/* This is the first syslog. */
|
2006-02-01 03:15:44 +01:00
|
|
|
openlog("Tor", LOG_PID | LOG_NDELAY, LOGFACILITY);
|
2004-10-26 23:48:41 +02:00
|
|
|
|
|
|
|
lf = tor_malloc_zero(sizeof(logfile_t));
|
2008-03-08 02:11:54 +01:00
|
|
|
lf->severities = tor_memdup(severity, sizeof(log_severity_list_t));
|
2004-10-26 23:48:41 +02:00
|
|
|
lf->filename = tor_strdup("<syslog>");
|
2008-03-05 23:31:39 +01:00
|
|
|
|
2004-10-26 23:48:41 +02:00
|
|
|
lf->is_syslog = 1;
|
2008-01-02 06:38:53 +01:00
|
|
|
|
|
|
|
LOCK_LOGS();
|
2004-10-26 23:48:41 +02:00
|
|
|
lf->next = logfiles;
|
|
|
|
logfiles = lf;
|
2007-02-21 06:57:12 +01:00
|
|
|
_log_global_min_severity = get_min_log_level();
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-10-26 23:48:41 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2004-05-19 22:07:08 +02:00
|
|
|
/** If <b>level</b> is a valid log severity, return the corresponding
|
|
|
|
* numeric value. Otherwise, return -1. */
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
|
|
|
parse_log_level(const char *level)
|
|
|
|
{
|
2004-05-19 22:07:08 +02:00
|
|
|
if (!strcasecmp(level, "err"))
|
|
|
|
return LOG_ERR;
|
2004-05-21 14:38:52 +02:00
|
|
|
if (!strcasecmp(level, "warn"))
|
|
|
|
return LOG_WARN;
|
|
|
|
if (!strcasecmp(level, "notice"))
|
2004-05-19 22:07:08 +02:00
|
|
|
return LOG_NOTICE;
|
2004-05-21 14:38:52 +02:00
|
|
|
if (!strcasecmp(level, "info"))
|
2004-05-19 22:07:08 +02:00
|
|
|
return LOG_INFO;
|
2004-05-21 14:38:52 +02:00
|
|
|
if (!strcasecmp(level, "debug"))
|
2004-05-19 22:07:08 +02:00
|
|
|
return LOG_DEBUG;
|
2004-05-21 14:38:52 +02:00
|
|
|
return -1;
|
2004-05-19 22:07:08 +02:00
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/** Return the string equivalent of a given log level. */
|
2005-09-30 03:09:52 +02:00
|
|
|
const char *
|
|
|
|
log_level_to_string(int level)
|
2004-11-05 06:50:35 +01:00
|
|
|
{
|
|
|
|
return sev_to_string(level);
|
|
|
|
}
|
|
|
|
|
2008-03-05 23:31:39 +01:00
|
|
|
/** DOCDOC */
|
|
|
|
static const char *domain_list[] = {
|
|
|
|
"GENERAL", "CRYPTO", "NET", "CONFIG", "FS", "PROTOCOL", "MM",
|
|
|
|
"HTTP", "APP", "CONTROL", "CIRC", "REND", "BUG", "DIR", "DIRSERV",
|
|
|
|
"OR", "EDGE", "ACCT", NULL
|
|
|
|
};
|
|
|
|
|
|
|
|
/** DOCDOC */
|
|
|
|
static log_domain_mask_t
|
|
|
|
parse_log_domain(const char *domain)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for (i=0; domain_list[i]; ++i) {
|
|
|
|
if (!strcasecmp(domain, domain_list[i]))
|
|
|
|
return (1u<<i);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#if 0
|
|
|
|
/** DOCDOC */
|
|
|
|
static const char *
|
|
|
|
domain_to_string(log_domain_mask_t domain)
|
|
|
|
{
|
|
|
|
int bit = tor_log2(domain);
|
|
|
|
if ((bit == 0 && domain == 0) || bit >= N_LOGGING_DOMAINS)
|
|
|
|
return NULL;
|
|
|
|
return domain_list[bit];
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/** Parse a log severity pattern in *<b>cfg_ptr</b>. Advance cfg_ptr after
|
|
|
|
* the end of the severityPattern. Set the value of <b>severity_out</b> to
|
|
|
|
* the parsed pattern. Return 0 on success, -1 on failure.
|
|
|
|
*
|
|
|
|
* The syntax for a SeverityPattern is:
|
|
|
|
* <pre>
|
|
|
|
* SeverityPattern = *(DomainSeverity SP)* DomainSeverity
|
|
|
|
* DomainSeverity = (DomainList SP)? SeverityRange
|
|
|
|
* SeverityRange = MinSeverity ("-" MaxSeverity )?
|
|
|
|
* DomainList = "[" (SP? DomainSpec SP? ",") SP? DomainSpec "]"
|
|
|
|
* DomainSpec = "*" | Domain | "~" Domain
|
|
|
|
* </pre>
|
|
|
|
* A missing MaxSeverity defaults to ERR. Severities and domains are
|
|
|
|
* case-insensitive. "~" indicates negation for a domain; negation happens
|
|
|
|
* last inside a DomainList. Only one SeverityRange without a DomainList is
|
|
|
|
* allowed per line.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
parse_log_severity_config(const char **cfg_ptr,
|
|
|
|
log_severity_list_t *severity_out)
|
|
|
|
{
|
|
|
|
const char *cfg = *cfg_ptr;
|
|
|
|
int got_anything = 0;
|
|
|
|
int got_an_unqualified_range = 0;
|
|
|
|
memset(severity_out, 0, sizeof(*severity_out));
|
|
|
|
|
|
|
|
cfg = eat_whitespace(cfg);
|
|
|
|
while (*cfg) {
|
|
|
|
const char *dash, *space;
|
|
|
|
char *sev_lo, *sev_hi;
|
|
|
|
int low, high, i;
|
|
|
|
log_domain_mask_t domains = ~0u;
|
|
|
|
|
|
|
|
if (*cfg == '[') {
|
|
|
|
int err = 0;
|
|
|
|
char *domains_str;
|
|
|
|
smartlist_t *domains_list;
|
|
|
|
log_domain_mask_t neg_domains = 0;
|
|
|
|
const char *closebracket = strchr(cfg, ']');
|
|
|
|
if (!closebracket)
|
|
|
|
return -1;
|
|
|
|
domains = 0;
|
|
|
|
domains_str = tor_strndup(cfg+1, closebracket-cfg-1);
|
|
|
|
domains_list = smartlist_create();
|
|
|
|
smartlist_split_string(domains_list, domains_str, ",", SPLIT_SKIP_SPACE,
|
|
|
|
-1);
|
|
|
|
tor_free(domains_str);
|
|
|
|
SMARTLIST_FOREACH(domains_list, const char *, domain,
|
|
|
|
{
|
|
|
|
if (!strcmp(domain, "*")) {
|
|
|
|
domains = ~0u;
|
|
|
|
} else {
|
|
|
|
int d;
|
|
|
|
int negate=0;
|
|
|
|
if (*domain == '~') {
|
|
|
|
negate = 1;
|
|
|
|
++domain;
|
|
|
|
}
|
|
|
|
d = parse_log_domain(domain);
|
|
|
|
if (!d) {
|
|
|
|
log_warn(LD_CONFIG, "No such loggging domain as %s", domain);
|
|
|
|
err = 1;
|
|
|
|
} else {
|
|
|
|
if (negate)
|
|
|
|
neg_domains |= d;
|
|
|
|
else
|
|
|
|
domains |= d;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
SMARTLIST_FOREACH(domains_list, char *, d, tor_free(d));
|
|
|
|
smartlist_free(domains_list);
|
|
|
|
if (err)
|
|
|
|
return -1;
|
|
|
|
domains &= ~neg_domains;
|
|
|
|
cfg = eat_whitespace(closebracket+1);
|
|
|
|
} else {
|
|
|
|
++got_an_unqualified_range;
|
|
|
|
}
|
|
|
|
if (!strcasecmpstart(cfg, "file") ||
|
|
|
|
!strcasecmpstart(cfg, "stderr") ||
|
|
|
|
!strcasecmpstart(cfg, "stdout") ||
|
|
|
|
!strcasecmpstart(cfg, "syslog")) {
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
if (got_an_unqualified_range > 1)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
space = strchr(cfg, ' ');
|
|
|
|
dash = strchr(cfg, '-');
|
|
|
|
if (!space)
|
|
|
|
space = strchr(cfg, '\0');
|
|
|
|
if (dash && dash < space) {
|
|
|
|
sev_lo = tor_strndup(cfg, dash-cfg);
|
|
|
|
sev_hi = tor_strndup(dash+1, space-(dash+1));
|
|
|
|
} else {
|
|
|
|
sev_lo = tor_strndup(cfg, space-cfg);
|
|
|
|
sev_hi = tor_strdup("ERR");
|
|
|
|
}
|
2008-03-26 19:36:46 +01:00
|
|
|
low = parse_log_level(sev_lo);
|
|
|
|
high = parse_log_level(sev_hi);
|
|
|
|
tor_free(sev_lo);
|
|
|
|
tor_free(sev_hi);
|
|
|
|
if (low == -1)
|
2008-03-05 23:31:39 +01:00
|
|
|
return -1;
|
2008-03-26 19:36:46 +01:00
|
|
|
if (high == -1)
|
2008-03-05 23:31:39 +01:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
got_anything = 1;
|
|
|
|
for (i=low; i >= high; --i)
|
|
|
|
severity_out->masks[SEVERITY_MASK_IDX(i)] |= domains;
|
|
|
|
|
|
|
|
cfg = eat_whitespace(space);
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
*cfg_ptr = cfg;
|
|
|
|
return got_anything ? 0 : -1;
|
|
|
|
}
|
|
|
|
|
2005-03-17 13:38:37 +01:00
|
|
|
/** Return the least severe log level that any current log is interested in. */
|
2005-09-30 03:09:52 +02:00
|
|
|
int
|
|
|
|
get_min_log_level(void)
|
2004-05-19 22:07:08 +02:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-03-05 23:31:39 +01:00
|
|
|
int i;
|
2004-05-19 22:07:08 +02:00
|
|
|
int min = LOG_ERR;
|
|
|
|
for (lf = logfiles; lf; lf = lf->next) {
|
2008-03-05 23:31:39 +01:00
|
|
|
for (i = LOG_DEBUG; i > min; --i)
|
|
|
|
if (lf->severities->masks[SEVERITY_MASK_IDX(i)])
|
|
|
|
min = i;
|
2004-05-19 22:07:08 +02:00
|
|
|
}
|
|
|
|
return min;
|
|
|
|
}
|
|
|
|
|
2004-11-20 08:33:55 +01:00
|
|
|
/** Switch all logs to output at most verbose level. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
switch_logs_debug(void)
|
2004-11-20 08:33:55 +01:00
|
|
|
{
|
|
|
|
logfile_t *lf;
|
2008-03-05 23:31:39 +01:00
|
|
|
int i;
|
2008-01-02 06:38:53 +01:00
|
|
|
LOCK_LOGS();
|
2004-11-20 08:33:55 +01:00
|
|
|
for (lf = logfiles; lf; lf=lf->next) {
|
2008-03-05 23:31:39 +01:00
|
|
|
for (i = LOG_DEBUG; i >= LOG_ERR; --i)
|
2008-03-13 23:18:36 +01:00
|
|
|
lf->severities->masks[SEVERITY_MASK_IDX(i)] = ~0u;
|
2004-11-20 08:33:55 +01:00
|
|
|
}
|
2008-01-02 06:38:53 +01:00
|
|
|
UNLOCK_LOGS();
|
2004-11-20 08:33:55 +01:00
|
|
|
}
|
|
|
|
|
2005-04-01 04:37:40 +02:00
|
|
|
#ifdef HAVE_EVENT_SET_LOG_CALLBACK
|
2006-09-29 20:13:37 +02:00
|
|
|
/** A string which, if it appears in a libevent log, should be ignored. */
|
2005-04-01 09:05:21 +02:00
|
|
|
static const char *suppress_msg = NULL;
|
2006-09-29 20:13:37 +02:00
|
|
|
/** Callback function passed to event_set_log() so we can intercept
|
|
|
|
* log messages from libevent. */
|
2005-04-08 05:47:18 +02:00
|
|
|
static void
|
|
|
|
libevent_logging_callback(int severity, const char *msg)
|
2005-04-01 04:37:40 +02:00
|
|
|
{
|
2005-06-08 19:41:32 +02:00
|
|
|
char buf[1024];
|
|
|
|
size_t n;
|
2005-04-01 09:05:21 +02:00
|
|
|
if (suppress_msg && strstr(msg, suppress_msg))
|
|
|
|
return;
|
2005-06-08 19:41:32 +02:00
|
|
|
n = strlcpy(buf, msg, sizeof(buf));
|
|
|
|
if (n && n < sizeof(buf) && buf[n-1] == '\n') {
|
|
|
|
buf[n-1] = '\0';
|
|
|
|
}
|
2005-04-01 04:37:40 +02:00
|
|
|
switch (severity) {
|
|
|
|
case _EVENT_LOG_DEBUG:
|
2005-10-18 23:58:19 +02:00
|
|
|
log(LOG_DEBUG, LD_NET, "Message from libevent: %s", buf);
|
2005-04-01 04:37:40 +02:00
|
|
|
break;
|
|
|
|
case _EVENT_LOG_MSG:
|
2005-10-18 23:58:19 +02:00
|
|
|
log(LOG_INFO, LD_NET, "Message from libevent: %s", buf);
|
2005-04-01 04:37:40 +02:00
|
|
|
break;
|
|
|
|
case _EVENT_LOG_WARN:
|
2005-10-18 23:58:19 +02:00
|
|
|
log(LOG_WARN, LD_GENERAL, "Warning from libevent: %s", buf);
|
2005-04-01 04:37:40 +02:00
|
|
|
break;
|
|
|
|
case _EVENT_LOG_ERR:
|
2005-10-18 23:58:19 +02:00
|
|
|
log(LOG_ERR, LD_GENERAL, "Error from libevent: %s", buf);
|
2005-04-01 04:37:40 +02:00
|
|
|
break;
|
|
|
|
default:
|
2005-10-18 23:58:19 +02:00
|
|
|
log(LOG_WARN, LD_GENERAL, "Message [%d] from libevent: %s",
|
|
|
|
severity, buf);
|
2005-04-01 04:37:40 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2006-09-29 20:13:37 +02:00
|
|
|
/** Set hook to intercept log messages from libevent. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
configure_libevent_logging(void)
|
2005-04-01 04:37:40 +02:00
|
|
|
{
|
|
|
|
event_set_log_callback(libevent_logging_callback);
|
|
|
|
}
|
2006-10-07 08:28:50 +02:00
|
|
|
/** Ignore any libevent log message that contains <b>msg</b>. */
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
suppress_libevent_log_msg(const char *msg)
|
2005-04-01 09:05:21 +02:00
|
|
|
{
|
|
|
|
suppress_msg = msg;
|
|
|
|
}
|
2005-04-01 04:37:40 +02:00
|
|
|
#else
|
2005-09-30 03:09:52 +02:00
|
|
|
void
|
|
|
|
configure_libevent_logging(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
void
|
|
|
|
suppress_libevent_log_msg(const char *msg)
|
|
|
|
{
|
2007-05-01 03:36:32 +02:00
|
|
|
(void)msg;
|
2005-09-30 03:09:52 +02:00
|
|
|
}
|
2005-04-01 04:37:40 +02:00
|
|
|
#endif
|
2005-06-09 21:03:31 +02:00
|
|
|
|
2006-01-11 20:40:14 +01:00
|
|
|
#if 0
|
|
|
|
static void
|
|
|
|
dump_log_info(logfile_t *lf)
|
|
|
|
{
|
|
|
|
const char *tp;
|
|
|
|
|
|
|
|
if (lf->filename) {
|
|
|
|
printf("=== log into \"%s\" (%s-%s) (%stemporary)\n", lf->filename,
|
|
|
|
sev_to_string(lf->min_loglevel),
|
|
|
|
sev_to_string(lf->max_loglevel),
|
|
|
|
lf->is_temporary?"":"not ");
|
|
|
|
} else if (lf->is_syslog) {
|
|
|
|
printf("=== syslog (%s-%s) (%stemporary)\n",
|
|
|
|
sev_to_string(lf->min_loglevel),
|
|
|
|
sev_to_string(lf->max_loglevel),
|
|
|
|
lf->is_temporary?"":"not ");
|
|
|
|
} else {
|
|
|
|
printf("=== log (%s-%s) (%stemporary)\n",
|
|
|
|
sev_to_string(lf->min_loglevel),
|
|
|
|
sev_to_string(lf->max_loglevel),
|
|
|
|
lf->is_temporary?"":"not ");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
describe_logs(void)
|
|
|
|
{
|
|
|
|
logfile_t *lf;
|
|
|
|
printf("==== BEGIN LOGS ====\n");
|
|
|
|
for (lf = logfiles; lf; lf = lf->next)
|
|
|
|
dump_log_info(lf);
|
|
|
|
printf("==== END LOGS ====\n");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|