mirror of
https://github.com/servalproject/serval-dna.git
synced 2024-12-19 13:17:56 +00:00
62f8d223ea
Replace "..." quoting with `...` quoting in output, to avoid slosh-escaping the common double-quote character (") in log output. Introduce alloca_str_toprint() function that produces an entire null-terminated string in printable form. Change various toprint strbuf helper functions to take two optional quote chars instead of one mandatory.
524 lines
16 KiB
C
524 lines
16 KiB
C
/*
|
|
Serval logging.
|
|
Copyright (C) 2012 Serval Project Inc.
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License
|
|
as published by the Free Software Foundation; either version 2
|
|
of the License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <ctype.h>
|
|
#include <sys/time.h>
|
|
#include <sys/types.h>
|
|
#include <sys/wait.h>
|
|
#include <sys/param.h>
|
|
#include <time.h>
|
|
#ifdef __APPLE__
|
|
#include <mach-o/dyld.h>
|
|
#endif
|
|
#include <unistd.h>
|
|
#include <sys/stat.h>
|
|
#include <fcntl.h>
|
|
#include <stdint.h>
|
|
|
|
#include "log.h"
|
|
#include "net.h"
|
|
#include "conf.h"
|
|
#include "strbuf.h"
|
|
#include "strbuf_helpers.h"
|
|
|
|
unsigned int debug = 0;
|
|
|
|
static FILE *logfile = NULL;
|
|
static int flag_show_pid = -1;
|
|
static int flag_show_time = -1;
|
|
|
|
/* The logbuf is used to accumulate log messages before the log file is open and ready for
|
|
writing.
|
|
*/
|
|
static char _log_buf[8192];
|
|
static struct strbuf logbuf = STRUCT_STRBUF_EMPTY;
|
|
|
|
#ifdef ANDROID
|
|
#include <android/log.h>
|
|
#endif
|
|
|
|
void set_logging(FILE *f)
|
|
{
|
|
logfile = f;
|
|
if (f == stdout)
|
|
INFO("Logging to stdout");
|
|
else if (f == stderr)
|
|
INFO("Logging to stderr");
|
|
else if (f != NULL)
|
|
INFOF("Logging to stream with fd=%d", fileno(f));
|
|
}
|
|
|
|
FILE *open_logging()
|
|
{
|
|
#ifdef ANDROID
|
|
return NULL;
|
|
#endif
|
|
if (!logfile) {
|
|
const char *logpath = getenv("SERVALD_LOG_FILE");
|
|
if (!logpath) {
|
|
// If the configuration is locked (eg, it called WHY() or DEBUG() while initialising, which
|
|
// led back to here) then return NULL to indicate the message cannot be logged.
|
|
if (confLocked())
|
|
return NULL;
|
|
logpath = confValueGet("log.file", NULL);
|
|
}
|
|
if (!logpath) {
|
|
logfile = stderr;
|
|
INFO("No logfile configured -- logging to stderr");
|
|
} else if ((logfile = fopen(logpath, "a"))) {
|
|
setlinebuf(logfile);
|
|
INFOF("Logging to %s (fd %d)", logpath, fileno(logfile));
|
|
} else {
|
|
logfile = stderr;
|
|
WARN_perror("fopen");
|
|
WARNF("Cannot append to %s -- falling back to stderr", logpath);
|
|
}
|
|
}
|
|
return logfile;
|
|
}
|
|
|
|
static int show_pid()
|
|
{
|
|
if (flag_show_pid < 0 && !confLocked())
|
|
flag_show_pid = confValueGetBoolean("log.show_pid", 0);
|
|
return flag_show_pid;
|
|
}
|
|
|
|
static int show_time()
|
|
{
|
|
if (flag_show_time < 0 && !confLocked())
|
|
flag_show_time = confValueGetBoolean("log.show_time", 0);
|
|
return flag_show_time;
|
|
}
|
|
|
|
void close_logging()
|
|
{
|
|
if (logfile) {
|
|
fclose(logfile);
|
|
logfile = NULL;
|
|
}
|
|
}
|
|
|
|
static const char *_trimbuildpath(const char *path)
|
|
{
|
|
/* Remove common path prefix */
|
|
int lastsep = 0;
|
|
int i;
|
|
for (i = 0; __FILE__[i] && path[i]; ++i) {
|
|
if (i && path[i - 1] == '/')
|
|
lastsep = i;
|
|
if (__FILE__[i] != path[i])
|
|
break;
|
|
}
|
|
return &path[lastsep];
|
|
}
|
|
|
|
static int _log_prepare(int level, struct __sourceloc where)
|
|
{
|
|
if (level == LOG_LEVEL_SILENT)
|
|
return 0;
|
|
if (strbuf_is_empty(&logbuf))
|
|
strbuf_init(&logbuf, _log_buf, sizeof _log_buf);
|
|
open_logging(); // Put initial INFO message at start of log file
|
|
#ifndef ANDROID
|
|
const char *levelstr = "UNKWN:";
|
|
switch (level) {
|
|
case LOG_LEVEL_FATAL: levelstr = "FATAL:"; break;
|
|
case LOG_LEVEL_ERROR: levelstr = "ERROR:"; break;
|
|
case LOG_LEVEL_INFO: levelstr = "INFO:"; break;
|
|
case LOG_LEVEL_WARN: levelstr = "WARN:"; break;
|
|
case LOG_LEVEL_DEBUG: levelstr = "DEBUG:"; break;
|
|
}
|
|
strbuf_sprintf(&logbuf, "%-6.6s ", levelstr);
|
|
#endif
|
|
if (show_pid())
|
|
strbuf_sprintf(&logbuf, "[%5u] ", getpid());
|
|
if (show_time()) {
|
|
struct timeval tv;
|
|
if (gettimeofday(&tv, NULL) == -1) {
|
|
strbuf_puts(&logbuf, "NOTIME______ ");
|
|
} else {
|
|
struct tm tm;
|
|
char buf[20];
|
|
if (strftime(buf, sizeof buf, "%T", localtime_r(&tv.tv_sec, &tm)) == 0)
|
|
strbuf_puts(&logbuf, "EMPTYTIME___ ");
|
|
else
|
|
strbuf_sprintf(&logbuf, "%s.%03u ", buf, tv.tv_usec / 1000);
|
|
}
|
|
}
|
|
if (where.file) {
|
|
strbuf_sprintf(&logbuf, "%s", _trimbuildpath(where.file));
|
|
if (where.line)
|
|
strbuf_sprintf(&logbuf, ":%u", where.line);
|
|
if (where.function)
|
|
strbuf_sprintf(&logbuf, ":%s()", where.function);
|
|
strbuf_putc(&logbuf, ' ');
|
|
} else if (where.function) {
|
|
strbuf_sprintf(&logbuf, "%s() ", where.function);
|
|
}
|
|
strbuf_putc(&logbuf, ' ');
|
|
return 1;
|
|
}
|
|
|
|
static void _log_internal(int level, struct strbuf *buf)
|
|
{
|
|
#ifdef ANDROID
|
|
int alevel = ANDROID_LOG_UNKNOWN;
|
|
switch (level) {
|
|
case LOG_LEVEL_FATAL: alevel = ANDROID_LOG_FATAL; break;
|
|
case LOG_LEVEL_ERROR: alevel = ANDROID_LOG_ERROR; break;
|
|
case LOG_LEVEL_INFO: alevel = ANDROID_LOG_INFO; break;
|
|
case LOG_LEVEL_WARN: alevel = ANDROID_LOG_WARN; break;
|
|
case LOG_LEVEL_DEBUG: alevel = ANDROID_LOG_DEBUG; break;
|
|
}
|
|
__android_log_print(alevel, "servald", "%s", strbuf_str(buf));
|
|
strbuf_reset(buf);
|
|
#else
|
|
FILE *logf = open_logging();
|
|
if (logf) {
|
|
fprintf(logf, "%s\n%s", strbuf_str(buf), strbuf_overrun(buf) ? "LOG OVERRUN\n" : "");
|
|
strbuf_reset(buf);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
void (*_log_implementation)(int level, struct strbuf *buf) = _log_internal;
|
|
|
|
static void _log_finish(int level)
|
|
{
|
|
if (_log_implementation)
|
|
_log_implementation(level, &logbuf);
|
|
}
|
|
|
|
void set_log_implementation(void (*log_function)(int level, struct strbuf *buf))
|
|
{
|
|
_log_implementation=log_function;
|
|
}
|
|
|
|
void logArgv(int level, struct __sourceloc where, const char *label, int argc, const char *const *argv)
|
|
{
|
|
if (_log_prepare(level, where)) {
|
|
if (label) {
|
|
strbuf_puts(&logbuf, label);
|
|
strbuf_putc(&logbuf, ' ');
|
|
}
|
|
int i;
|
|
for (i = 0; i < argc; ++i) {
|
|
if (i)
|
|
strbuf_putc(&logbuf, ' ');
|
|
if (argv[i])
|
|
strbuf_toprint_quoted(&logbuf, "\"\"", argv[i]);
|
|
else
|
|
strbuf_puts(&logbuf, "NULL");
|
|
}
|
|
_log_finish(level);
|
|
}
|
|
}
|
|
|
|
void logString(int level, struct __sourceloc where, const char *str)
|
|
{
|
|
const char *s = str;
|
|
const char *p;
|
|
for (p = str; *p; ++p) {
|
|
if (*p == '\n') {
|
|
if (_log_prepare(level, where)) {
|
|
strbuf_ncat(&logbuf, s, p - s);
|
|
_log_finish(level);
|
|
}
|
|
s = p + 1;
|
|
}
|
|
}
|
|
if (p > s && _log_prepare(level, where)) {
|
|
strbuf_ncat(&logbuf, s, p - s);
|
|
_log_finish(level);
|
|
}
|
|
}
|
|
|
|
void logMessage(int level, struct __sourceloc where, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
va_start(ap, fmt);
|
|
vlogMessage(level, where, fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
|
|
void vlogMessage(int level, struct __sourceloc where, const char *fmt, va_list ap)
|
|
{
|
|
if (_log_prepare(level, where)) {
|
|
strbuf_vsprintf(&logbuf, fmt, ap);
|
|
_log_finish(level);
|
|
}
|
|
}
|
|
|
|
int logDump(int level, struct __sourceloc where, char *name, unsigned char *addr, size_t len)
|
|
{
|
|
char buf[100];
|
|
size_t i;
|
|
if (name)
|
|
logMessage(level, where, "Dump of %s", name);
|
|
for(i = 0; i < len; i += 16) {
|
|
strbuf b = strbuf_local(buf, sizeof buf);
|
|
strbuf_sprintf(b, " %04x :", i);
|
|
int j;
|
|
for (j = 0; j < 16 && i + j < len; j++)
|
|
strbuf_sprintf(b, " %02x", addr[i + j]);
|
|
for (; j < 16; j++)
|
|
strbuf_puts(b, " ");
|
|
strbuf_puts(b, " ");
|
|
for (j = 0; j < 16 && i + j < len; j++)
|
|
strbuf_sprintf(b, "%c", addr[i+j] >= ' ' && addr[i+j] < 0x7f ? addr[i+j] : '.');
|
|
logMessage(level, where, "%s", strbuf_str(b));
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
unsigned int debugFlagMask(const char *flagname) {
|
|
if (!strcasecmp(flagname,"all")) return DEBUG_ALL;
|
|
else if (!strcasecmp(flagname,"interfaces")) return DEBUG_OVERLAYINTERFACES;
|
|
else if (!strcasecmp(flagname,"rx")) return DEBUG_PACKETRX;
|
|
else if (!strcasecmp(flagname,"tx")) return DEBUG_PACKETTX;
|
|
else if (!strcasecmp(flagname,"verbose")) return DEBUG_VERBOSE;
|
|
else if (!strcasecmp(flagname,"verbio")) return DEBUG_VERBOSE_IO;
|
|
else if (!strcasecmp(flagname,"peers")) return DEBUG_PEERS;
|
|
else if (!strcasecmp(flagname,"dnaresponses")) return DEBUG_DNARESPONSES;
|
|
else if (!strcasecmp(flagname,"dnahelper")) return DEBUG_DNAHELPER;
|
|
else if (!strcasecmp(flagname,"vomp")) return DEBUG_VOMP;
|
|
else if (!strcasecmp(flagname,"packetformats")) return DEBUG_PACKETFORMATS;
|
|
else if (!strcasecmp(flagname,"packetconstruction")) return DEBUG_PACKETCONSTRUCTION;
|
|
else if (!strcasecmp(flagname,"gateway")) return DEBUG_GATEWAY;
|
|
else if (!strcasecmp(flagname,"keyring")) return DEBUG_KEYRING;
|
|
else if (!strcasecmp(flagname,"sockio")) return DEBUG_IO;
|
|
else if (!strcasecmp(flagname,"frames")) return DEBUG_OVERLAYFRAMES;
|
|
else if (!strcasecmp(flagname,"abbreviations")) return DEBUG_OVERLAYABBREVIATIONS;
|
|
else if (!strcasecmp(flagname,"routing")) return DEBUG_OVERLAYROUTING;
|
|
else if (!strcasecmp(flagname,"security")) return DEBUG_SECURITY;
|
|
else if (!strcasecmp(flagname,"rhizome")) return DEBUG_RHIZOME;
|
|
else if (!strcasecmp(flagname,"rhizometx")) return DEBUG_RHIZOME_TX;
|
|
else if (!strcasecmp(flagname,"rhizomerx")) return DEBUG_RHIZOME_RX;
|
|
else if (!strcasecmp(flagname,"monitorroutes")) return DEBUG_OVERLAYROUTEMONITOR;
|
|
else if (!strcasecmp(flagname,"queues")) return DEBUG_QUEUES;
|
|
else if (!strcasecmp(flagname,"broadcasts")) return DEBUG_BROADCASTS;
|
|
else if (!strcasecmp(flagname,"manifests")) return DEBUG_MANIFESTS;
|
|
else if (!strcasecmp(flagname,"mdprequests")) return DEBUG_MDPREQUESTS;
|
|
else if (!strcasecmp(flagname,"timing")) return DEBUG_TIMING;
|
|
return 0;
|
|
}
|
|
|
|
/* Format a buffer of data as a printable representation, eg: "Abc\x0b\n\0", for display
|
|
in log messages.
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
char *toprint(char *dstStr, ssize_t dstBufSiz, const char *srcBuf, size_t srcBytes, const char quotes[2])
|
|
{
|
|
strbuf b = strbuf_local(dstStr, dstBufSiz);
|
|
strbuf_toprint_quoted_len(b, quotes, srcBuf, srcBytes);
|
|
return dstStr;
|
|
}
|
|
|
|
/* Compute the length of the string produced by toprint(). If dstStrLen == -1 then returns the
|
|
exact number of characters in the printable representation (excluding the terminating nul),
|
|
otherwise returns dstStrLen.
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
size_t toprint_len(const char *srcBuf, size_t srcBytes, const char quotes[2])
|
|
{
|
|
return strbuf_count(strbuf_toprint_quoted_len(strbuf_local(NULL, 0), quotes, srcBuf, srcBytes));
|
|
}
|
|
|
|
/* Format a null-terminated string as a printable representation, eg: "Abc\x0b\n", for display
|
|
in log messages.
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
char *toprint_str(char *dstStr, ssize_t dstBufSiz, const char *srcStr, const char quotes[2])
|
|
{
|
|
strbuf b = strbuf_local(dstStr, dstBufSiz);
|
|
strbuf_toprint_quoted(b, quotes, srcStr);
|
|
return dstStr;
|
|
}
|
|
|
|
/* Compute the length of the string produced by toprint_str(). If dstStrLen == -1 then returns the
|
|
exact number of characters in the printable representation (excluding the terminating nul),
|
|
otherwise returns dstStrLen.
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
size_t toprint_str_len(const char *srcStr, const char quotes[2])
|
|
{
|
|
return strbuf_count(strbuf_toprint_quoted(strbuf_local(NULL, 0), quotes, srcStr));
|
|
}
|
|
|
|
/* Read the symbolic link into the supplied buffer and add a terminating nul. Return -1 if the
|
|
* buffer is too short to hold the link content and the nul. If readlink(2) returns an error, then
|
|
* logs it and returns -1. Otherwise, returns the number of bytes read, including the terminating
|
|
* nul, ie, returns what readlink(2) returns plus one. If the 'len' argument is given as zero, then
|
|
* returns the number of bytes that would be read, by calling lstat(2) instead of readlink(2), plus
|
|
* one for the terminating nul. Beware of the following race condition: a symbolic link may be
|
|
* altered between calling the lstat(2) and readlink(2), so the following apparently overflow-proof
|
|
* code may still fail from a buffer overflow in the second call to read_symlink():
|
|
*
|
|
* char *readlink_malloc(const char *path) {
|
|
* ssize_t len = read_symlink(path, NULL, 0);
|
|
* if (len == -1)
|
|
* return NULL;
|
|
* char *buf = malloc(len);
|
|
* if (buf == NULL)
|
|
* return NULL;
|
|
* if (read_symlink(path, buf, len) == -1) {
|
|
* free(buf);
|
|
* return NULL;
|
|
* }
|
|
* return buf;
|
|
* }
|
|
*
|
|
* @author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
ssize_t read_symlink(const char *path, char *buf, size_t len)
|
|
{
|
|
if (len == 0) {
|
|
struct stat stat;
|
|
if (lstat(path, &stat) == -1)
|
|
return WHYF_perror("lstat(%s)", path);
|
|
return stat.st_size;
|
|
}
|
|
ssize_t nr = readlink(path, buf, len);
|
|
if (nr == -1)
|
|
return WHYF_perror("readlink(%s)", path);
|
|
if (nr >= len)
|
|
return WHYF("buffer overrun from readlink(%s, len=%lu)", path, (unsigned long) len);
|
|
buf[nr] = '\0';
|
|
return nr;
|
|
}
|
|
|
|
ssize_t get_self_executable_path(char *buf, size_t len)
|
|
{
|
|
#if defined(linux)
|
|
return read_symlink("/proc/self/exe", buf, len);
|
|
#elif defined (__sun__)
|
|
return read_symlink("/proc/self/path/a.out", buf, len);
|
|
#elif defined (__APPLE__)
|
|
uint32_t bufsize = len;
|
|
return _NSGetExecutablePath(buf, &bufsize) == -1 && len ? -1 : bufsize;
|
|
#else
|
|
#error Unable to find executable path
|
|
#endif
|
|
}
|
|
|
|
int log_backtrace(struct __sourceloc where)
|
|
{
|
|
open_logging();
|
|
char execpath[MAXPATHLEN];
|
|
if (get_self_executable_path(execpath, sizeof execpath) == -1)
|
|
return WHY("cannot log backtrace: own executable path unknown");
|
|
char tempfile[MAXPATHLEN];
|
|
if (!FORM_SERVAL_INSTANCE_PATH(tempfile, "servalgdb.XXXXX"))
|
|
return -1;
|
|
int tmpfd = mkstemp(tempfile);
|
|
if (tmpfd == -1)
|
|
return WHY_perror("mkstemp");
|
|
if (write_str(tmpfd, "backtrace\n") == -1) {
|
|
close(tmpfd);
|
|
unlink(tempfile);
|
|
return -1;
|
|
}
|
|
if (close(tmpfd) == -1) {
|
|
WHY_perror("close");
|
|
unlink(tempfile);
|
|
return -1;
|
|
}
|
|
char pidstr[12];
|
|
snprintf(pidstr, sizeof pidstr, "%jd", (intmax_t)getpid());
|
|
int stdout_fds[2];
|
|
if (pipe(stdout_fds) == -1)
|
|
return WHY_perror("pipe");
|
|
pid_t child_pid;
|
|
switch (child_pid = fork()) {
|
|
case -1: // error
|
|
WHY_perror("fork");
|
|
close(stdout_fds[0]);
|
|
close(stdout_fds[1]);
|
|
return WHY("cannot log backtrace: fork failed");
|
|
case 0: // child
|
|
if (dup2(stdout_fds[1], 1) == -1 || dup2(stdout_fds[1], 2) == -1) {
|
|
perror("dup2");
|
|
_exit(-1);
|
|
}
|
|
close(0);
|
|
if (open("/dev/null", O_RDONLY) != 0) {
|
|
perror("open(\"/dev/null\")");
|
|
_exit(-2);
|
|
}
|
|
close(stdout_fds[0]);
|
|
/* XXX: Need the cast on Solaris because it defins NULL as 0L and gcc doesn't
|
|
* see it as a sentinal */
|
|
execlp("gdb", "gdb", "-n", "-batch", "-x", tempfile, execpath, pidstr, (void*)NULL);
|
|
perror("execlp(\"gdb\")");
|
|
do { _exit(-3); } while (1);
|
|
break;
|
|
}
|
|
// parent
|
|
close(stdout_fds[1]);
|
|
logMessage(LOG_LEVEL_DEBUG, where, "GDB BACKTRACE");
|
|
char buf[1024];
|
|
char *const bufe = buf + sizeof buf;
|
|
char *linep = buf;
|
|
char *readp = buf;
|
|
ssize_t nr;
|
|
while ((nr = read(stdout_fds[0], readp, bufe - readp)) > 0) {
|
|
char *p = readp;
|
|
readp = readp + nr;
|
|
for (; p < readp; ++p)
|
|
if (*p == '\n' || *p == '\0') {
|
|
*p = '\0';
|
|
logMessage(LOG_LEVEL_DEBUG, __NOWHERE__, "%s", linep);
|
|
linep = p + 1;
|
|
}
|
|
if (readp >= bufe && linep == buf) {
|
|
// Line does not fit into buffer.
|
|
char t = bufe[-1];
|
|
bufe[-1] = '\0';
|
|
logMessage(LOG_LEVEL_DEBUG, __NOWHERE__, "%s", buf);
|
|
buf[0] = t;
|
|
readp = buf + 1;
|
|
} else if (readp + 120 >= bufe && linep != buf) {
|
|
// Buffer low on space.
|
|
if (linep < readp)
|
|
memmove(buf, linep, readp - linep);
|
|
readp -= linep - buf;
|
|
linep = buf;
|
|
}
|
|
// Invariant: readp < bufe
|
|
}
|
|
if (nr == -1)
|
|
WHY_perror("read");
|
|
if (readp > linep) {
|
|
*readp = '\0';
|
|
logMessage(LOG_LEVEL_DEBUG, __NOWHERE__, "%s", linep);
|
|
}
|
|
close(stdout_fds[0]);
|
|
int status = 0;
|
|
if (waitpid(child_pid, &status, 0) == -1)
|
|
WHY_perror("waitpid");
|
|
strbuf b = strbuf_local(buf, sizeof buf);
|
|
strbuf_append_exit_status(b, status);
|
|
logMessage(LOG_LEVEL_DEBUG, __NOWHERE__, "gdb %s", buf);
|
|
unlink(tempfile);
|
|
return 0;
|
|
}
|