log.h 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292
  1. /* Copyright (c) 2001, Matej Pfajfar.
  2. * Copyright (c) 2001-2004, Roger Dingledine.
  3. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  4. * Copyright (c) 2007-2019, The Tor Project, Inc. */
  5. /* See LICENSE for licensing information */
  6. /**
  7. * \file log.h
  8. *
  9. * \brief Headers for log.c
  10. **/
  11. #ifndef TOR_TORLOG_H
  12. #define TOR_TORLOG_H
  13. #include <stdarg.h>
  14. #include "lib/cc/torint.h"
  15. #include "lib/cc/compat_compiler.h"
  16. #include "lib/testsupport/testsupport.h"
  17. #ifdef HAVE_SYSLOG_H
  18. #include <syslog.h>
  19. #define LOG_WARN LOG_WARNING
  20. #if LOG_DEBUG < LOG_ERR
  21. #error "Your syslog.h thinks high numbers are more important. " \
  22. "We aren't prepared to deal with that."
  23. #endif
  24. #else /* !(defined(HAVE_SYSLOG_H)) */
  25. /* Note: Syslog's logging code refers to priorities, with 0 being the most
  26. * important. Thus, all our comparisons needed to be reversed when we added
  27. * syslog support.
  28. *
  29. * The upshot of this is that comments about log levels may be messed up: for
  30. * "maximum severity" read "most severe" and "numerically *lowest* severity".
  31. */
  32. /** Debug-level severity: for hyper-verbose messages of no interest to
  33. * anybody but developers. */
  34. #define LOG_DEBUG 7
  35. /** Info-level severity: for messages that appear frequently during normal
  36. * operation. */
  37. #define LOG_INFO 6
  38. /** Notice-level severity: for messages that appear infrequently
  39. * during normal operation; that the user will probably care about;
  40. * and that are not errors.
  41. */
  42. #define LOG_NOTICE 5
  43. /** Warn-level severity: for messages that only appear when something has gone
  44. * wrong. */
  45. #define LOG_WARN 4
  46. /** Error-level severity: for messages that only appear when something has gone
  47. * very wrong, and the Tor process can no longer proceed. */
  48. #define LOG_ERR 3
  49. #endif /* defined(HAVE_SYSLOG_H) */
  50. /* Logging domains */
  51. /** Catch-all for miscellaneous events and fatal errors. */
  52. #define LD_GENERAL (1u<<0)
  53. /** The cryptography subsystem. */
  54. #define LD_CRYPTO (1u<<1)
  55. /** Networking. */
  56. #define LD_NET (1u<<2)
  57. /** Parsing and acting on our configuration. */
  58. #define LD_CONFIG (1u<<3)
  59. /** Reading and writing from the filesystem. */
  60. #define LD_FS (1u<<4)
  61. /** Other servers' (non)compliance with the Tor protocol. */
  62. #define LD_PROTOCOL (1u<<5)
  63. /** Memory management. */
  64. #define LD_MM (1u<<6)
  65. /** HTTP implementation. */
  66. #define LD_HTTP (1u<<7)
  67. /** Application (socks) requests. */
  68. #define LD_APP (1u<<8)
  69. /** Communication via the controller protocol. */
  70. #define LD_CONTROL (1u<<9)
  71. /** Building, using, and managing circuits. */
  72. #define LD_CIRC (1u<<10)
  73. /** Hidden services. */
  74. #define LD_REND (1u<<11)
  75. /** Internal errors in this Tor process. */
  76. #define LD_BUG (1u<<12)
  77. /** Learning and using information about Tor servers. */
  78. #define LD_DIR (1u<<13)
  79. /** Learning and using information about Tor servers. */
  80. #define LD_DIRSERV (1u<<14)
  81. /** Onion routing protocol. */
  82. #define LD_OR (1u<<15)
  83. /** Generic edge-connection functionality. */
  84. #define LD_EDGE (1u<<16)
  85. #define LD_EXIT LD_EDGE
  86. /** Bandwidth accounting. */
  87. #define LD_ACCT (1u<<17)
  88. /** Router history */
  89. #define LD_HIST (1u<<18)
  90. /** OR handshaking */
  91. #define LD_HANDSHAKE (1u<<19)
  92. /** Heartbeat messages */
  93. #define LD_HEARTBEAT (1u<<20)
  94. /** Abstract channel_t code */
  95. #define LD_CHANNEL (1u<<21)
  96. /** Scheduler */
  97. #define LD_SCHED (1u<<22)
  98. /** Guard nodes */
  99. #define LD_GUARD (1u<<23)
  100. /** Generation and application of consensus diffs. */
  101. #define LD_CONSDIFF (1u<<24)
  102. /** Denial of Service mitigation. */
  103. #define LD_DOS (1u<<25)
  104. /** Processes */
  105. #define LD_PROCESS (1u<<26)
  106. /** Pluggable Transports. */
  107. #define LD_PT (1u<<27)
  108. /** Bootstrap tracker. */
  109. #define LD_BTRACK (1u<<28)
  110. /** Message-passing backend. */
  111. #define LD_MESG (1u<<29)
  112. #define N_LOGGING_DOMAINS 30
  113. /** This log message is not safe to send to a callback-based logger
  114. * immediately. Used as a flag, not a log domain. */
  115. #define LD_NOCB (1u<<31)
  116. /** This log message should not include a function name, even if it otherwise
  117. * would. Used as a flag, not a log domain. */
  118. #define LD_NOFUNCNAME (1u<<30)
  119. #ifdef TOR_UNIT_TESTS
  120. /** This log message should not be intercepted by mock_saving_logv */
  121. #define LD_NO_MOCK (1u<<29)
  122. #endif
  123. /** Mask of zero or more log domains, OR'd together. */
  124. typedef uint32_t log_domain_mask_t;
  125. /** Configures which severities are logged for each logging domain for a given
  126. * log target. */
  127. typedef struct log_severity_list_t {
  128. /** For each log severity, a bitmask of which domains a given logger is
  129. * logging. */
  130. log_domain_mask_t masks[LOG_DEBUG-LOG_ERR+1];
  131. } log_severity_list_t;
  132. /** Callback type used for add_callback_log. */
  133. typedef void (*log_callback)(int severity, uint32_t domain, const char *msg);
  134. void init_logging(int disable_startup_queue);
  135. int parse_log_level(const char *level);
  136. const char *log_level_to_string(int level);
  137. int parse_log_severity_config(const char **cfg,
  138. log_severity_list_t *severity_out);
  139. void set_log_severity_config(int minSeverity, int maxSeverity,
  140. log_severity_list_t *severity_out);
  141. void add_stream_log(const log_severity_list_t *severity, const char *name,
  142. int fd);
  143. int add_file_log(const log_severity_list_t *severity,
  144. const char *filename,
  145. int fd);
  146. #ifdef HAVE_SYSLOG_H
  147. int add_syslog_log(const log_severity_list_t *severity,
  148. const char* syslog_identity_tag);
  149. #endif // HAVE_SYSLOG_H.
  150. #ifdef HAVE_ANDROID_LOG_H
  151. int add_android_log(const log_severity_list_t *severity,
  152. const char *android_identity_tag);
  153. #endif // HAVE_ANDROID_LOG_H.
  154. int add_callback_log(const log_severity_list_t *severity, log_callback cb);
  155. typedef void (*pending_callback_callback)(void);
  156. void logs_set_pending_callback_callback(pending_callback_callback cb);
  157. void logs_set_domain_logging(int enabled);
  158. int get_min_log_level(void);
  159. void switch_logs_debug(void);
  160. void logs_free_all(void);
  161. void add_temp_log(int min_severity);
  162. void close_temp_logs(void);
  163. void rollback_log_changes(void);
  164. void mark_logs_temp(void);
  165. void change_callback_log_severity(int loglevelMin, int loglevelMax,
  166. log_callback cb);
  167. void flush_pending_log_callbacks(void);
  168. void flush_log_messages_from_startup(void);
  169. void log_set_application_name(const char *name);
  170. void set_log_time_granularity(int granularity_msec);
  171. void truncate_logs(void);
  172. void tor_log(int severity, log_domain_mask_t domain, const char *format, ...)
  173. CHECK_PRINTF(3,4);
  174. void tor_log_update_sigsafe_err_fds(void);
  175. struct smartlist_t;
  176. void tor_log_get_logfile_names(struct smartlist_t *out);
  177. extern int log_global_min_severity_;
  178. static inline bool debug_logging_enabled(void);
  179. /**
  180. * Return true iff debug logging is enabled for at least one domain.
  181. */
  182. static inline bool debug_logging_enabled(void)
  183. {
  184. return PREDICT_UNLIKELY(log_global_min_severity_ == LOG_DEBUG);
  185. }
  186. void log_fn_(int severity, log_domain_mask_t domain,
  187. const char *funcname, const char *format, ...)
  188. CHECK_PRINTF(4,5);
  189. struct ratelim_t;
  190. void log_fn_ratelim_(struct ratelim_t *ratelim, int severity,
  191. log_domain_mask_t domain, const char *funcname,
  192. const char *format, ...)
  193. CHECK_PRINTF(5,6);
  194. int log_message_is_interesting(int severity, log_domain_mask_t domain);
  195. void tor_log_string(int severity, log_domain_mask_t domain,
  196. const char *function, const char *string);
  197. #if defined(__GNUC__) && __GNUC__ <= 3
  198. /* These are the GCC varidaic macros, so that older versions of GCC don't
  199. * break. */
  200. /** Log a message at level <b>severity</b>, using a pretty-printed version
  201. * of the current function name. */
  202. #define log_fn(severity, domain, args...) \
  203. log_fn_(severity, domain, __FUNCTION__, args)
  204. /** As log_fn, but use <b>ratelim</b> (an instance of ratelim_t) to control
  205. * the frequency at which messages can appear.
  206. */
  207. #define log_fn_ratelim(ratelim, severity, domain, args...) \
  208. log_fn_ratelim_(ratelim, severity, domain, __FUNCTION__, args)
  209. #define log_debug(domain, args...) \
  210. STMT_BEGIN \
  211. if (debug_logging_enabled()) \
  212. log_fn_(LOG_DEBUG, domain, __FUNCTION__, args); \
  213. STMT_END
  214. #define log_info(domain, args...) \
  215. log_fn_(LOG_INFO, domain, __FUNCTION__, args)
  216. #define log_notice(domain, args...) \
  217. log_fn_(LOG_NOTICE, domain, __FUNCTION__, args)
  218. #define log_warn(domain, args...) \
  219. log_fn_(LOG_WARN, domain, __FUNCTION__, args)
  220. #define log_err(domain, args...) \
  221. log_fn_(LOG_ERR, domain, __FUNCTION__, args)
  222. #else /* !(defined(__GNUC__) && __GNUC__ <= 3) */
  223. /* Here are the c99 variadic macros, to work with non-GCC compilers */
  224. #define log_debug(domain, args, ...) \
  225. STMT_BEGIN \
  226. if (debug_logging_enabled()) \
  227. log_fn_(LOG_DEBUG, domain, __FUNCTION__, args, ##__VA_ARGS__); \
  228. STMT_END
  229. #define log_info(domain, args,...) \
  230. log_fn_(LOG_INFO, domain, __FUNCTION__, args, ##__VA_ARGS__)
  231. #define log_notice(domain, args,...) \
  232. log_fn_(LOG_NOTICE, domain, __FUNCTION__, args, ##__VA_ARGS__)
  233. #define log_warn(domain, args,...) \
  234. log_fn_(LOG_WARN, domain, __FUNCTION__, args, ##__VA_ARGS__)
  235. #define log_err(domain, args,...) \
  236. log_fn_(LOG_ERR, domain, __FUNCTION__, args, ##__VA_ARGS__)
  237. /** Log a message at level <b>severity</b>, using a pretty-printed version
  238. * of the current function name. */
  239. #define log_fn(severity, domain, args,...) \
  240. log_fn_(severity, domain, __FUNCTION__, args, ##__VA_ARGS__)
  241. /** As log_fn, but use <b>ratelim</b> (an instance of ratelim_t) to control
  242. * the frequency at which messages can appear.
  243. */
  244. #define log_fn_ratelim(ratelim, severity, domain, args,...) \
  245. log_fn_ratelim_(ratelim, severity, domain, __FUNCTION__, \
  246. args, ##__VA_ARGS__)
  247. #endif /* defined(__GNUC__) && __GNUC__ <= 3 */
  248. /** This defines log levels that are linked in the Rust log module, rather
  249. * than re-defining these in both Rust and C.
  250. *
  251. * C_RUST_COUPLED src/rust/tor_log LogSeverity, LogDomain
  252. */
  253. extern const int LOG_WARN_;
  254. extern const int LOG_NOTICE_;
  255. extern const log_domain_mask_t LD_NET_;
  256. extern const log_domain_mask_t LD_GENERAL_;
  257. #ifdef LOG_PRIVATE
  258. MOCK_DECL(STATIC void, logv, (int severity, log_domain_mask_t domain,
  259. const char *funcname, const char *suffix, const char *format,
  260. va_list ap) CHECK_PRINTF(5,0));
  261. #endif
  262. #endif /* !defined(TOR_TORLOG_H) */