[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] Switch remaining files to new log interface.
Update of /home/or/cvsroot/tor/src/or
In directory moria:/tmp/cvs-serv4237/src/or
Modified Files:
dirserv.c dns.c hibernate.c
Log Message:
Switch remaining files to new log interface.
Index: dirserv.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/dirserv.c,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -d -r1.258 -r1.259
--- dirserv.c 24 Oct 2005 03:25:12 -0000 1.258
+++ dirserv.c 25 Oct 2005 17:52:14 -0000 1.259
@@ -4,6 +4,7 @@
/* $Id$ */
const char dirserv_c_id[] = "$Id$";
+#define NEW_LOG_INTERFACE
#include "or.h"
/**
@@ -135,7 +136,7 @@
{
char fp[FINGERPRINT_LEN+1];
if (crypto_pk_get_fingerprint(pk, fp, 0)<0) {
- log_fn(LOG_ERR, "Error computing fingerprint");
+ err(LD_BUG, "Error computing fingerprint");
return -1;
}
if (!fingerprint_list)
@@ -161,13 +162,13 @@
cf = read_file_to_str(fname, 0);
if (!cf) {
- log_fn(LOG_WARN, "Cannot open fingerprint file %s", fname);
+ warn(LD_FS, "Cannot open fingerprint file %s", fname);
return -1;
}
result = config_get_lines(cf, &front);
tor_free(cf);
if (result < 0) {
- log_fn(LOG_WARN, "Error reading from fingerprint file");
+ warn(LD_CONFIG, "Error reading from fingerprint file");
return -1;
}
@@ -176,31 +177,34 @@
for (list=front; list; list=list->next) {
nickname = list->key; fingerprint = list->value;
if (strlen(nickname) > MAX_NICKNAME_LEN) {
- log(LOG_NOTICE, "Nickname '%s' too long in fingerprint file. Skipping.", nickname);
+ notice(LD_CONFIG,
+ "Nickname '%s' too long in fingerprint file. Skipping.", nickname);
continue;
}
if (!is_legal_nickname(nickname) &&
strcasecmp(nickname, "!reject") &&
strcasecmp(nickname, "!invalid")) {
- log(LOG_NOTICE, "Invalid nickname '%s' in fingerprint file. Skipping.", nickname);
+ notice(LD_CONFIG,
+ "Invalid nickname '%s' in fingerprint file. Skipping.", nickname);
continue;
}
if (strlen(fingerprint) != FINGERPRINT_LEN ||
!crypto_pk_check_fingerprint_syntax(fingerprint)) {
- log_fn(LOG_NOTICE, "Invalid fingerprint (nickname '%s', fingerprint %s). Skipping.",
+ notice(LD_CONFIG,
+ "Invalid fingerprint (nickname '%s', fingerprint %s). Skipping.",
nickname, fingerprint);
continue;
}
if (0==strcasecmp(nickname, DEFAULT_CLIENT_NICKNAME)) {
/* If you approved an OR called "client", then clients who use
* the default nickname could all be rejected. That's no good. */
- log(LOG_NOTICE,
+ notice(LD_CONFIG,
"Authorizing a nickname '%s' would break many clients; skipping.",
DEFAULT_CLIENT_NICKNAME);
continue;
}
if (add_fingerprint_to_dir(nickname, fingerprint, fingerprint_list_new) != 0)
- log(LOG_NOTICE, "Duplicate nickname '%s'.", nickname);
+ notice(LD_CONFIG, "Duplicate nickname '%s'.", nickname);
}
config_free_lines(front);
@@ -228,11 +232,11 @@
fingerprint_list = smartlist_create();
if (crypto_pk_get_fingerprint(router->identity_pkey, fp, 0)) {
- log_fn(LOG_WARN,"Error computing fingerprint");
+ warn(LD_BUG,"Error computing fingerprint");
return -1;
}
- log_fn(LOG_DEBUG, "%d fingerprints known.", smartlist_len(fingerprint_list));
+ debug(LD_DIRSERV, "%d fingerprints known.", smartlist_len(fingerprint_list));
SMARTLIST_FOREACH(fingerprint_list, fingerprint_entry_t *, ent,
{
if (!strcasecmp(fp,ent->fingerprint))
@@ -260,32 +264,32 @@
router->addr, router->or_port, authdir_invalid_policy);
if (rej == ADDR_POLICY_PROBABLY_REJECTED || rej == ADDR_POLICY_REJECTED) {
- log_fn(LOG_INFO, "Rejecting '%s' because of address %s",
- router->nickname, router->address);
+ info(LD_DIRSERV, "Rejecting '%s' because of address %s",
+ router->nickname, router->address);
if (msg)
*msg = "Authdir is rejecting routers in this range.";
return FP_REJECT;
}
if (inv == ADDR_POLICY_PROBABLY_REJECTED || inv == ADDR_POLICY_REJECTED) {
- log_fn(LOG_INFO, "Not marking '%s' valid because of address %s",
- router->nickname, router->address);
+ info(LD_DIRSERV, "Not marking '%s' valid because of address %s",
+ router->nickname, router->address);
return FP_INVALID;
}
if (tor_version_as_new_as(router->platform,"0.1.0.2-rc"))
return FP_VALID;
else
return FP_INVALID;
- log_fn(LOG_INFO,"No fingerprint found for '%s'",router->nickname);
+ info(LD_DIRSERV,"No fingerprint found for '%s'",router->nickname);
return 0;
}
if (0==strcasecmp(nn_ent->fingerprint, fp)) {
- log_fn(LOG_DEBUG,"Good fingerprint for '%s'",router->nickname);
+ debug(LD_DIRSERV,"Good fingerprint for '%s'",router->nickname);
return FP_NAMED; /* Right fingerprint. */
} else {
- log_fn(LOG_WARN,"Mismatched fingerprint for '%s': expected '%s' got '%s'. ContactInfo '%s', platform '%s'.)",
- router->nickname, nn_ent->fingerprint, fp,
- router->contact_info ? router->contact_info : "",
- router->platform ? router->platform : "");
+ warn(LD_DIRSERV,"Mismatched fingerprint for '%s': expected '%s' got '%s'. ContactInfo '%s', platform '%s'.)",
+ router->nickname, nn_ent->fingerprint, fp,
+ router->contact_info ? router->contact_info : "",
+ router->platform ? router->platform : "");
if (msg)
*msg = "Rejected: There is already a verified server with this nickname and a different fingerprint.";
return FP_REJECT; /* Wrong fingerprint. */
@@ -342,13 +346,14 @@
if (get_options()->DirAllowPrivateAddresses)
return 0; /* whatever it is, we're fine with it */
if (!tor_inet_aton(ri->address, &iaddr)) {
- log_fn(LOG_INFO,"Router '%s' published non-IP address '%s'. Refusing.",
- ri->nickname, ri->address);
+ info(LD_DIRSERV,"Router '%s' published non-IP address '%s'. Refusing.",
+ ri->nickname, ri->address);
return -1;
}
if (is_internal_IP(ntohl(iaddr.s_addr))) {
- log_fn(LOG_INFO,"Router '%s' published internal IP address '%s'. Refusing.",
- ri->nickname, ri->address);
+ info(LD_DIRSERV,
+ "Router '%s' published internal IP address '%s'. Refusing.",
+ ri->nickname, ri->address);
return -1; /* it's a private IP, we should reject it */
}
return 0;
@@ -373,7 +378,7 @@
/* Is there too much clock skew? */
now = time(NULL);
if (ri->published_on > now+ROUTER_ALLOW_SKEW) {
- log_fn(LOG_NOTICE, "Publication time for nickname '%s' is too far (%d minutes) in the future; possible clock skew. Not adding (ContactInfo '%s', platform '%s').",
+ notice(LD_DIRSERV, "Publication time for nickname '%s' is too far (%d minutes) in the future; possible clock skew. Not adding (ContactInfo '%s', platform '%s').",
ri->nickname, (int)((ri->published_on-now)/60),
ri->contact_info ? ri->contact_info : "",
ri->platform ? ri->platform : "");
@@ -381,7 +386,7 @@
return -1;
}
if (ri->published_on < now-ROUTER_MAX_AGE) {
- log_fn(LOG_NOTICE, "Publication time for router with nickname '%s' is too far (%d minutes) in the past. Not adding (ContactInfo '%s', platform '%s').",
+ notice(LD_DIRSERV, "Publication time for router with nickname '%s' is too far (%d minutes) in the past. Not adding (ContactInfo '%s', platform '%s').",
ri->nickname, (int)((now-ri->published_on)/60),
ri->contact_info ? ri->contact_info : "",
ri->platform ? ri->platform : "");
@@ -389,7 +394,7 @@
return -1;
}
if (dirserv_router_has_valid_address(ri) < 0) {
- log_fn(LOG_NOTICE, "Router with nickname '%s' has invalid address '%s'. Not adding (ContactInfo '%s', platform '%s').",
+ notice(LD_DIRSERV, "Router with nickname '%s' has invalid address '%s'. Not adding (ContactInfo '%s', platform '%s').",
ri->nickname, ri->address,
ri->contact_info ? ri->contact_info : "",
ri->platform ? ri->platform : "");
@@ -436,7 +441,7 @@
/* Check: is the descriptor syntactically valid? */
ri = router_parse_entry_from_string(desc, NULL);
if (!ri) {
- log(LOG_WARN, "Couldn't parse descriptor");
+ warn(LD_DIRSERV, "Couldn't parse uploaded server descriptor");
*msg = "Rejected: Couldn't parse server descriptor.";
return -2;
}
@@ -447,9 +452,9 @@
ri_old = router_get_by_digest(ri->identity_digest);
if (ri_old && ri_old->published_on < ri->published_on &&
router_differences_are_cosmetic(ri_old, ri)) {
- log_fn(LOG_INFO,
- "Not replacing descriptor from '%s'; differences are cosmetic.",
- ri->nickname);
+ info(LD_DIRSERV,
+ "Not replacing descriptor from '%s'; differences are cosmetic.",
+ ri->nickname);
*msg = "Not replacing router descriptor; no information has changed since the last one with this identity.";
return 0;
}
@@ -485,7 +490,7 @@
router_status_t r = dirserv_router_get_status(ent, &msg);
switch (r) {
case FP_REJECT:
- log(LOG_INFO, "Router '%s' is now rejected: %s",
+ info(LD_DIRSERV, "Router '%s' is now rejected: %s",
ent->nickname, msg?msg:"");
routerlist_remove(rl, ent, i--);
routerinfo_free(ent);
@@ -493,14 +498,15 @@
break;
case FP_NAMED:
if (!ent->is_verified || !ent->is_named) {
- log(LOG_INFO, "Router '%s' is now verified and named.", ent->nickname);
+ info(LD_DIRSERV,
+ "Router '%s' is now verified and named.", ent->nickname);
ent->is_verified = ent->is_named = 1;
changed = 1;
}
break;
case FP_VALID:
if (!ent->is_verified || ent->is_named) {
- log(LOG_INFO, "Router '%s' is now verified.", ent->nickname);
+ info(LD_DIRSERV, "Router '%s' is now verified.", ent->nickname);
ent->is_verified = 1;
ent->is_named = 0;
changed = 1;
@@ -508,7 +514,8 @@
break;
case FP_INVALID:
if (ent->is_verified || ent->is_named) {
- log(LOG_INFO, "Router '%s' is no longer verified.", ent->nickname);
+ info(LD_DIRSERV,
+ "Router '%s' is no longer verified.", ent->nickname);
ent->is_verified = ent->is_named = 0;
changed = 1;
}
@@ -745,7 +752,7 @@
if (crypto_pk_write_public_key_to_string(private_key,&identity_pkey,
&identity_pkey_len)<0) {
- log_fn(LOG_WARN,"write identity_pkey to string failed!");
+ warn(LD_BUG,"write identity_pkey to string failed!");
return -1;
}
@@ -800,7 +807,7 @@
goto truncated;
if (router_get_dir_hash(buf,digest)) {
- log_fn(LOG_WARN,"couldn't compute digest");
+ warn(LD_BUG,"couldn't compute digest");
tor_free(buf);
return -1;
}
@@ -812,7 +819,7 @@
*dir_out = buf;
return 0;
truncated:
- log_fn(LOG_WARN,"tried to exceed string length.");
+ warn(LD_BUG,"tried to exceed string length.");
tor_free(buf);
return -1;
}
@@ -840,21 +847,21 @@
{
time_t now = time(NULL);
if (when<=d->published) {
- log_fn(LOG_INFO, "Ignoring old directory; not caching.");
+ info(LD_DIRSERV, "Ignoring old directory; not caching.");
tor_free(directory);
} else if (when>=now+ROUTER_MAX_AGE) {
- log_fn(LOG_INFO, "Ignoring future directory; not caching.");
+ info(LD_DIRSERV, "Ignoring future directory; not caching.");
tor_free(directory);
} else {
/* if (when>d->published && when<now+ROUTER_MAX_AGE) */
- log_fn(LOG_DEBUG, "Caching directory.");
+ debug(LD_DIRSERV, "Caching directory.");
tor_free(d->dir);
d->dir = directory;
d->dir_len = strlen(directory);
tor_free(d->dir_z);
if (tor_gzip_compress(&(d->dir_z), &(d->dir_z_len), d->dir, d->dir_len,
ZLIB_METHOD)) {
- log_fn(LOG_WARN,"Error compressing cached directory");
+ warn(LD_BUG,"Error compressing cached directory");
}
d->published = when;
}
@@ -943,11 +950,11 @@
if (regenerate != NULL) {
if (dirty && dirty + DIR_REGEN_SLACK_TIME < time(NULL)) {
if (regenerate()) {
- log_fn(LOG_ERR, "Couldn't generate %s?", name);
+ err(LD_BUG, "Couldn't generate %s?", name);
exit(1);
}
} else {
- log_fn(LOG_INFO, "The %s is still clean; reusing.", name);
+ info(LD_DIRSERV, "The %s is still clean; reusing.", name);
}
}
return auth_src ? auth_src : cache_src;
@@ -1011,13 +1018,13 @@
if (dirserv_dump_directory_to_string(&new_directory,
get_identity_key())) {
- log(LOG_WARN, "Error creating directory.");
+ warn(LD_BUG, "Error creating directory.");
tor_free(new_directory);
return -1;
}
set_cached_dir(&the_directory, new_directory, time(NULL));
- log_fn(LOG_INFO,"New directory (size %d) has been built.",(int)the_directory.dir_len);
- log_fn(LOG_DEBUG,"New directory (size %d):\n%s",(int)the_directory.dir_len,
+ info(LD_DIRSERV,"New directory (size %d) has been built.",(int)the_directory.dir_len);
+ debug(LD_DIRSERV,"New directory (size %d):\n%s",(int)the_directory.dir_len,
the_directory.dir);
the_directory_is_dirty = 0;
@@ -1051,7 +1058,7 @@
}
if (crypto_pk_write_public_key_to_string(private_key,&identity_pkey,
&identity_pkey_len)<0) {
- log_fn(LOG_WARN,"write identity_pkey to string failed!");
+ warn(LD_BUG,"write identity_pkey to string failed!");
goto err;
}
format_iso_time(published, time(NULL));
@@ -1068,7 +1075,7 @@
tor_free(router_status);
tor_free(identity_pkey);
if (router_get_runningrouters_hash(s,digest)) {
- log_fn(LOG_WARN,"couldn't compute digest");
+ warn(LD_BUG,"couldn't compute digest");
goto err;
}
if (router_append_dirobj_signature(s, len, digest, private_key)<0)
@@ -1162,7 +1169,7 @@
const char *contact;
if (resolve_my_address(options, &addr, &hostname)<0) {
- log_fn(LOG_WARN, "Couldn't resolve my hostname");
+ warn(LD_NET, "Couldn't resolve my hostname");
goto done;
}
in.s_addr = htonl(addr);
@@ -1175,12 +1182,12 @@
if (crypto_pk_write_public_key_to_string(private_key, &identity_pkey,
&identity_pkey_len)<0) {
- log_fn(LOG_WARN,"Writing public key to string failed.");
+ warn(LD_BUG,"Writing public key to string failed.");
goto done;
}
if (crypto_pk_get_fingerprint(private_key, fingerprint, 0)<0) {
- log_fn(LOG_ERR, "Error computing fingerprint");
+ err(LD_BUG, "Error computing fingerprint");
goto done;
}
@@ -1254,25 +1261,25 @@
f_stable?" Stable":"",
f_running?" Running":"",
f_valid?" Valid":"")<0) {
- log_fn(LOG_WARN, "Unable to print router status.");
+ warn(LD_BUG, "Unable to print router status.");
goto done;
- }
+ }
outp += strlen(outp);
});
if (tor_snprintf(outp, endp-outp, "directory-signature %s\n",
get_options()->Nickname)<0) {
- log_fn(LOG_WARN, "Unable to write signature line.");
+ warn(LD_BUG, "Unable to write signature line.");
goto done;
}
if (router_get_networkstatus_v2_hash(status, digest)<0) {
- log_fn(LOG_WARN, "Unable to hash network status");
+ warn(LD_BUG, "Unable to hash network status");
goto done;
}
if (router_append_dirobj_signature(outp,endp-outp,digest,private_key)<0) {
- log_fn(LOG_WARN, "Unable to sign router status.");
+ warn(LD_BUG, "Unable to sign router status.");
goto done;
}
@@ -1320,7 +1327,7 @@
if (d)
smartlist_add(result, d);
else
- log_fn(LOG_WARN,"Unable to generate an authoritative network status.");
+ warn(LD_BUG,"Unable to generate an authoritative network status.");
}
} else if (!strcmp(key, "all")) {
digestmap_iter_t *iter = digestmap_iter_init(cached_v2_networkstatus);
@@ -1332,7 +1339,8 @@
iter = digestmap_iter_next(cached_v2_networkstatus, iter);
}
if (smartlist_len(result) == 0)
- log_fn(LOG_WARN, "Client requested 'all' network status objects; we have none.");
+ warn(LD_DIRSERV,
+ "Client requested 'all' network status objects; we have none.");
} else if (!strcmpstart(key, "fp/")) {
smartlist_t *digests = smartlist_create();
dir_split_resource_into_fingerprints(key+3, digests, NULL, 1);
@@ -1351,7 +1359,7 @@
} else {
char hexbuf[HEX_DIGEST_LEN+1];
base16_encode(hexbuf, sizeof(hexbuf), cp, DIGEST_LEN);
- log_fn(LOG_INFO, "Don't know about any network status with fingerprint '%s'", hexbuf);
+ info(LD_DIRSERV, "Don't know about any network status with fingerprint '%s'", hexbuf);
}
tor_free(cp);
});
@@ -1460,11 +1468,11 @@
if (!ri->is_verified) {
/* We have a router at the same address! */
if (strcasecmp(ri->nickname, nickname_rcvd)) {
- log_fn(LOG_NOTICE, "Dropping descriptor: nickname '%s' does not match nickname '%s' in cert from %s:%d",
+ notice(LD_DIRSERV, "Dropping descriptor: nickname '%s' does not match nickname '%s' in cert from %s:%d",
ri->nickname, nickname_rcvd, address, or_port);
drop = 1;
} else if (memcmp(ri->identity_digest, digest_rcvd, DIGEST_LEN)) {
- log_fn(LOG_NOTICE, "Dropping descriptor: identity key does not match key in cert from %s:%d",
+ notice(LD_DIRSERV, "Dropping descriptor: identity key does not match key in cert from %s:%d",
address, or_port);
drop = 1;
}
@@ -1474,7 +1482,7 @@
routerinfo_free(ri);
directory_set_dirty();
} else { /* correct nickname and digest. mark this router reachable! */
- log_fn(LOG_INFO,"Found router %s to be reachable. Yay.", ri->nickname);
+ info(LD_DIRSERV,"Found router %s to be reachable. Yay.", ri->nickname);
ri->last_reachable = time(NULL);
ri->num_unreachable_notifications = 0;
}
Index: dns.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/dns.c,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -d -r1.170 -r1.171
--- dns.c 30 Sep 2005 01:09:52 -0000 1.170
+++ dns.c 25 Oct 2005 17:52:14 -0000 1.171
@@ -17,6 +17,7 @@
* them becomes more commonly available.
*/
+#define NEW_LOG_INTERFACE
#include "or.h"
#include "tree.h"
@@ -149,14 +150,14 @@
*/
while (oldest_cached_resolve && (oldest_cached_resolve->expire < now)) {
resolve = oldest_cached_resolve;
- log(LOG_DEBUG,"Forgetting old cached resolve (address %s, expires %lu)",
+ debug(LD_EXIT,"Forgetting old cached resolve (address %s, expires %lu)",
safe_str(resolve->address), (unsigned long)resolve->expire);
if (resolve->state == CACHE_STATE_PENDING) {
- log_fn(LOG_WARN,"Bug: Expiring a dns resolve ('%s') that's still pending. Forgot to cull it?", safe_str(resolve->address));
+ debug(LD_EXIT,"Bug: Expiring a dns resolve ('%s') that's still pending. Forgot to cull it?", safe_str(resolve->address));
tor_fragile_assert();
}
if (resolve->pending_connections) {
- log_fn(LOG_WARN, "Closing pending connections on expiring DNS resolve!");
+ debug(LD_EXIT, "Closing pending connections on expiring DNS resolve!");
tor_fragile_assert();
while (resolve->pending_connections) {
pend = resolve->pending_connections;
@@ -283,19 +284,19 @@
pending_connection->conn = exitconn;
pending_connection->next = resolve->pending_connections;
resolve->pending_connections = pending_connection;
- log_fn(LOG_DEBUG,"Connection (fd %d) waiting for pending DNS resolve of '%s'",
+ debug(LD_EXIT,"Connection (fd %d) waiting for pending DNS resolve of '%s'",
exitconn->s, safe_str(exitconn->address));
exitconn->state = EXIT_CONN_STATE_RESOLVING;
return 0;
case CACHE_STATE_VALID:
exitconn->addr = resolve->addr;
- log_fn(LOG_DEBUG,"Connection (fd %d) found cached answer for '%s'",
+ debug(LD_EXIT,"Connection (fd %d) found cached answer for '%s'",
exitconn->s, safe_str(exitconn->address));
if (exitconn->purpose == EXIT_PURPOSE_RESOLVE)
send_resolved_cell(exitconn, RESOLVED_TYPE_IPV4);
return 1;
case CACHE_STATE_FAILED:
- log_fn(LOG_DEBUG,"Connection (fd %d) found cached error for '%s'",
+ debug(LD_EXIT,"Connection (fd %d) found cached error for '%s'",
exitconn->s, safe_str(exitconn->address));
if (exitconn->purpose == EXIT_PURPOSE_RESOLVE)
send_resolved_cell(exitconn, RESOLVED_TYPE_ERROR);
@@ -344,14 +345,15 @@
dnsconn = connection_get_by_type_state(CONN_TYPE_DNSWORKER, DNSWORKER_STATE_IDLE);
if (!dnsconn) {
- log_fn(LOG_WARN,"no idle dns workers. Failing.");
+ warn(LD_EXIT,"no idle dns workers. Failing.");
if (exitconn->purpose == EXIT_PURPOSE_RESOLVE)
send_resolved_cell(exitconn, RESOLVED_TYPE_ERROR_TRANSIENT);
goto err;
}
- log_fn(LOG_DEBUG, "Connection (fd %d) needs to resolve '%s'; assigning to DNSWorker (fd %d)",
- exitconn->s, safe_str(exitconn->address), dnsconn->s);
+ debug(LD_EXIT,
+ "Connection (fd %d) needs to resolve '%s'; assigning to DNSWorker (fd %d)",
+ exitconn->s, safe_str(exitconn->address), dnsconn->s);
tor_free(dnsconn->address);
dnsconn->address = tor_strdup(exitconn->address);
@@ -384,7 +386,8 @@
resolve = SPLAY_FIND(cache_tree, &cache_root, &search);
if (!resolve) {
- log_fn(LOG_NOTICE,"Address '%s' is not pending. Dropping.", safe_str(conn->address));
+ /* XXXX RD This *is* a bug, right? -NM */
+ notice(LD_BUG,"Address '%s' is not pending. Dropping.", safe_str(conn->address));
return;
}
@@ -396,7 +399,7 @@
if (pend->conn == conn) {
resolve->pending_connections = pend->next;
tor_free(pend);
- log_fn(LOG_DEBUG, "First connection (fd %d) no longer waiting for resolve of '%s'",
+ debug(LD_EXIT, "First connection (fd %d) no longer waiting for resolve of '%s'",
conn->s, safe_str(conn->address));
return;
} else {
@@ -405,7 +408,7 @@
victim = pend->next;
pend->next = victim->next;
tor_free(victim);
- log_fn(LOG_DEBUG, "Connection (fd %d) no longer waiting for resolve of '%s'",
+ debug(LD_EXIT, "Connection (fd %d) no longer waiting for resolve of '%s'",
conn->s, safe_str(conn->address));
return; /* more are pending */
}
@@ -467,13 +470,14 @@
resolve = SPLAY_FIND(cache_tree, &cache_root, &search);
if (!resolve) {
- log_fn(LOG_NOTICE,"Address '%s' is not pending. Dropping.", safe_str(address));
+ /* XXXX RD This *is* a bug, right? -NM */
+ notice(LD_BUG,"Address '%s' is not pending. Dropping.", safe_str(address));
return;
}
if (!resolve->pending_connections) {
/* XXX this should never trigger, but sometimes it does */
- log_fn(LOG_WARN,"Bug: Address '%s' is pending but has no pending connections!",
+ warn(LD_BUG,"Bug: Address '%s' is pending but has no pending connections!",
safe_str(address));
tor_fragile_assert();
return;
@@ -481,8 +485,8 @@
tor_assert(resolve->pending_connections);
/* mark all pending connections to fail */
- log_fn(LOG_DEBUG, "Failing all connections waiting on DNS resolve of '%s'",
- safe_str(address));
+ debug(LD_EXIT, "Failing all connections waiting on DNS resolve of '%s'",
+ safe_str(address));
while (resolve->pending_connections) {
pend = resolve->pending_connections;
pend->conn->state = EXIT_CONN_STATE_RESOLVEFAILED;
@@ -551,8 +555,8 @@
resolve = SPLAY_FIND(cache_tree, &cache_root, &search);
if (!resolve) {
- log_fn(LOG_INFO,"Resolved unasked address '%s'; caching anyway.",
- safe_str(address));
+ info(LD_EXIT,"Resolved unasked address '%s'; caching anyway.",
+ safe_str(address));
resolve = tor_malloc_zero(sizeof(cached_resolve_t));
resolve->state = (outcome == DNS_RESOLVE_SUCCEEDED) ?
CACHE_STATE_VALID : CACHE_STATE_FAILED;
@@ -565,7 +569,7 @@
if (resolve->state != CACHE_STATE_PENDING) {
/* XXXX Maybe update addr? or check addr for consistency? Or let
* VALID replace FAILED? */
- log_fn(LOG_NOTICE, "Resolved '%s' which was already resolved; ignoring",
+ notice(LD_EXIT, "Resolved '%s' which was already resolved; ignoring",
safe_str(address));
tor_assert(resolve->pending_connections == NULL);
return;
@@ -656,7 +660,7 @@
int
connection_dns_reached_eof(connection_t *conn)
{
- log_fn(LOG_WARN,"Read eof. Worker died unexpectedly.");
+ warn(LD_EXIT,"Read eof. Worker died unexpectedly.");
if (conn->state == DNSWORKER_STATE_BUSY) {
/* don't cancel the resolve here -- it would be cancelled in
* connection_about_to_close_connection(), since conn is still
@@ -682,8 +686,8 @@
tor_assert(conn->type == CONN_TYPE_DNSWORKER);
if (conn->state != DNSWORKER_STATE_BUSY && buf_datalen(conn->inbuf)) {
- log_fn(LOG_WARN,"Bug: read data (%d bytes) from an idle dns worker (fd %d, address '%s'). Please report.",
- (int)buf_datalen(conn->inbuf), conn->s, safe_str(conn->address));
+ warn(LD_BUG,"Bug: read data (%d bytes) from an idle dns worker (fd %d, address '%s'). Please report.",
+ (int)buf_datalen(conn->inbuf), conn->s, safe_str(conn->address));
tor_fragile_assert();
/* Pull it off the buffer anyway, or it will just stay there.
@@ -692,7 +696,7 @@
while (buf_datalen(conn->inbuf)) {
connection_fetch_from_buf(&success,1,conn);
connection_fetch_from_buf((char *)&addr,sizeof(uint32_t),conn);
- log_fn(LOG_WARN,"Discarding idle dns answer (success %d, addr %d.)",
+ warn(LD_EXIT,"Discarding idle dns answer (success %d, addr %d.)",
success, addr); // XXX safe_str
}
return 0;
@@ -705,8 +709,8 @@
connection_fetch_from_buf(&success,1,conn);
connection_fetch_from_buf((char *)&addr,sizeof(uint32_t),conn);
- log_fn(LOG_DEBUG, "DNSWorker (fd %d) returned answer for '%s'",
- conn->s, safe_str(conn->address));
+ debug(LD_EXIT, "DNSWorker (fd %d) returned answer for '%s'",
+ conn->s, safe_str(conn->address));
tor_assert(success >= DNS_RESOLVE_FAILED_TRANSIENT);
tor_assert(success <= DNS_RESOLVE_SUCCEEDED);
@@ -784,17 +788,17 @@
if ((r = recv(fd, &address_len, 1, 0)) != 1) {
if (r == 0) {
- log_fn(LOG_INFO,"DNS worker exiting because Tor process closed connection (either pruned idle dnsworker or died).");
+ info(LD_EXIT,"DNS worker exiting because Tor process closed connection (either pruned idle dnsworker or died).");
} else {
- log_fn(LOG_INFO,"DNS worker exiting because of error on connection to Tor process.");
- log_fn(LOG_INFO,"(Error on %d was %s)", fd, tor_socket_strerror(tor_socket_errno(fd)));
+ info(LD_EXIT,"DNS worker exiting because of error on connection to Tor process.");
+ info(LD_EXIT,"(Error on %d was %s)", fd, tor_socket_strerror(tor_socket_errno(fd)));
}
tor_close_socket(fd);
spawn_exit();
}
if (address_len && read_all(fd, address, address_len, 1) != address_len) {
- log_fn(LOG_ERR,"read hostname failed. Child exiting.");
+ err(LD_BUG,"read hostname failed. Child exiting.");
tor_close_socket(fd);
spawn_exit();
}
@@ -807,21 +811,21 @@
switch (result) {
case 1:
/* XXX result can never be 1, because we set it to -1 above on error */
- log_fn(LOG_INFO,"Could not resolve dest addr %s (transient).",safe_str(address));
+ info(LD_NET,"Could not resolve dest addr %s (transient).",safe_str(address));
answer[0] = DNS_RESOLVE_FAILED_TRANSIENT;
break;
case -1:
- log_fn(LOG_INFO,"Could not resolve dest addr %s (permanent).",safe_str(address));
+ info(LD_NET,"Could not resolve dest addr %s (permanent).",safe_str(address));
answer[0] = DNS_RESOLVE_FAILED_PERMANENT;
break;
case 0:
- log_fn(LOG_INFO,"Resolved address '%s'.",safe_str(address));
+ info(LD_NET,"Resolved address '%s'.",safe_str(address));
answer[0] = DNS_RESOLVE_SUCCEEDED;
break;
}
set_uint32(answer+1, ip);
if (write_all(fd, answer, 5, 1) != 5) {
- log_fn(LOG_ERR,"writing answer failed. Child exiting.");
+ err(LD_NET,"writing answer failed. Child exiting.");
tor_close_socket(fd);
spawn_exit();
}
@@ -841,7 +845,7 @@
fdarray = tor_malloc(sizeof(int)*2);
if ((err = tor_socketpair(AF_UNIX, SOCK_STREAM, 0, fdarray)) < 0) {
- log(LOG_WARN, "Couldn't construct socketpair: %s", tor_socket_strerror(-err));
+ warn(LD_NET, "Couldn't construct socketpair: %s", tor_socket_strerror(-err));
tor_free(fdarray);
return -1;
}
@@ -850,7 +854,7 @@
fd = fdarray[0]; /* We copy this out here, since dnsworker_main may free fdarray */
spawn_func(dnsworker_main, (void*)fdarray);
- log_fn(LOG_DEBUG,"just spawned a worker.");
+ debug(LD_EXIT,"just spawned a worker.");
#ifndef TOR_IS_MULTITHREADED
tor_close_socket(fdarray[1]); /* we don't need the worker's side of the pipe */
tor_free(fdarray);
@@ -865,7 +869,7 @@
conn->address = tor_strdup("<unused>");
if (connection_add(conn) < 0) { /* no space, forget it */
- log_fn(LOG_WARN,"connection_add failed. Giving up.");
+ warn(LD_NET,"connection_add failed. Giving up.");
connection_free(conn); /* this closes fd */
return -1;
}
@@ -903,8 +907,8 @@
DNSWORKER_STATE_BUSY);
tor_assert(dnsconn);
- log_fn(LOG_WARN, "%d DNS workers are spawned; all are busy. Killing one.",
- MAX_DNSWORKERS);
+ warn(LD_EXIT, "%d DNS workers are spawned; all are busy. Killing one.",
+ MAX_DNSWORKERS);
connection_mark_for_close(dnsconn);
num_dnsworkers_busy--;
@@ -918,7 +922,7 @@
while (num_dnsworkers < num_dnsworkers_needed) {
if (spawn_dnsworker() < 0) {
- log_fn(LOG_WARN,"Spawn failed. Will try again later.");
+ warn(LD_EXIT,"Spawn failed. Will try again later.");
return -1;
}
num_dnsworkers++;
@@ -927,7 +931,7 @@
while (num_dnsworkers > num_dnsworkers_busy+MAX_IDLE_DNSWORKERS) {
/* too many idle? */
/* cull excess workers */
- log_fn(LOG_INFO,"%d of %d dnsworkers are idle. Killing one.",
+ info(LD_EXIT,"%d of %d dnsworkers are idle. Killing one.",
num_dnsworkers-num_dnsworkers_busy, num_dnsworkers);
dnsconn = connection_get_by_type_state(CONN_TYPE_DNSWORKER, DNSWORKER_STATE_IDLE);
tor_assert(dnsconn);
Index: hibernate.c
===================================================================
RCS file: /home/or/cvsroot/tor/src/or/hibernate.c,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -d -r1.60 -r1.61
--- hibernate.c 13 Sep 2005 21:24:51 -0000 1.60
+++ hibernate.c 25 Oct 2005 17:52:14 -0000 1.61
@@ -22,6 +22,7 @@
- close all OR/AP/exit conns)
*/
+#define NEW_LOG_INTERFACE
#include "or.h"
#define HIBERNATE_STATE_LIVE 1
@@ -128,7 +129,7 @@
smartlist_split_string(items, v, NULL,
SPLIT_SKIP_SPACE|SPLIT_IGNORE_BLANK,0);
if (smartlist_len(items)<2) {
- log_fn(LOG_WARN, "Too few arguments to AccountingStart");
+ warn(LD_CONFIG, "Too few arguments to AccountingStart");
goto err;
}
s = smartlist_get(items,0);
@@ -139,7 +140,7 @@
} else if (0==strcasecmp(s, "day")) {
unit = UNIT_DAY;
} else {
- log_fn(LOG_WARN, "Unrecognized accounting unit '%s': only 'month', 'week', and 'day' are supported.", s);
+ warn(LD_CONFIG, "Unrecognized accounting unit '%s': only 'month', 'week', and 'day' are supported.", s);
goto err;
}
@@ -147,14 +148,14 @@
case UNIT_WEEK:
d = tor_parse_long(smartlist_get(items,1), 10, 1, 7, &ok, NULL);
if (!ok) {
- log_fn(LOG_WARN, "Weekly accounting must start begin on a day between 1(Monday) and 7 (Sunday)");
+ warn(LD_CONFIG, "Weekly accounting must start begin on a day between 1(Monday) and 7 (Sunday)");
goto err;
}
break;
case UNIT_MONTH:
d = tor_parse_long(smartlist_get(items,1), 10, 1, 28, &ok, NULL);
if (!ok) {
- log_fn(LOG_WARN, "Monthly accounting must start begin on a day between 1 and 28");
+ warn(LD_CONFIG, "Monthly accounting must start begin on a day between 1 and 28");
goto err;
}
break;
@@ -167,27 +168,27 @@
idx = unit==UNIT_DAY?1:2;
if (smartlist_len(items) != (idx+1)) {
- log_fn(LOG_WARN, "Accounting unit '%s' requires %d arguments",
+ warn(LD_CONFIG,"Accounting unit '%s' requires %d arguments",
s, idx+1);
goto err;
}
s = smartlist_get(items, idx);
h = tor_parse_long(s, 10, 0, 23, &ok, &cp);
if (!ok) {
- log_fn(LOG_WARN, "Accounting start time not parseable: bad hour.");
+ warn(LD_CONFIG,"Accounting start time not parseable: bad hour.");
goto err;
}
if (!cp || *cp!=':') {
- log_fn(LOG_WARN,"Accounting start time not parseable: not in HH:MM format");
+ warn(LD_CONFIG,"Accounting start time not parseable: not in HH:MM format");
goto err;
}
m = tor_parse_long(cp+1, 10, 0, 59, &ok, &cp);
if (!ok) {
- log_fn(LOG_WARN, "Accounting start time not parseable: bad minute");
+ warn(LD_CONFIG, "Accounting start time not parseable: bad minute");
goto err;
}
if (!cp || *cp!='\0') {
- log_fn(LOG_WARN,"Accounting start time not parseable: not in HH:MM format");
+ warn(LD_CONFIG,"Accounting start time not parseable: not in HH:MM format");
goto err;
}
@@ -321,15 +322,15 @@
start_of_accounting_period_after(interval_start_time) <= now) {
/* We didn't have recorded usage, or we don't have recorded usage
* for this interval. Start a new interval. */
- log_fn(LOG_INFO, "Starting new accounting interval.");
+ info(LD_ACCT, "Starting new accounting interval.");
reset_accounting(now);
} else if (interval_start_time ==
start_of_accounting_period_containing(interval_start_time)) {
- log_fn(LOG_INFO, "Continuing accounting interval.");
+ info(LD_ACCT, "Continuing accounting interval.");
/* We are in the interval we thought we were in. Do nothing.*/
interval_end_time = start_of_accounting_period_after(interval_start_time);
} else {
- log_fn(LOG_WARN, "Mismatched accounting interval; starting a fresh one.");
+ warn(LD_ACCT, "Mismatched accounting interval; starting a fresh one.");
reset_accounting(now);
}
accounting_set_wakeup_time();
@@ -370,7 +371,7 @@
static void
reset_accounting(time_t now)
{
- log_fn(LOG_INFO, "Starting new accounting interval.");
+ info(LD_ACCT, "Starting new accounting interval.");
update_expected_bandwidth();
interval_start_time = start_of_accounting_period_containing(now);
interval_end_time = start_of_accounting_period_after(interval_start_time);
@@ -413,7 +414,7 @@
}
if (time_to_record_bandwidth_usage(now)) {
if (accounting_record_bandwidth_usage(now)) {
- log_fn(LOG_ERR, "Couldn't record bandwidth usage to disk; exiting.");
+ err(LD_FS, "Couldn't record bandwidth usage to disk; exiting.");
/* This can fail when we're out of fd's, causing a crash.
* The current answer is to reserve 32 more than we need, in
* set_max_file_descriptors(). */
@@ -436,7 +437,7 @@
if (! identity_key_is_set()) {
if (init_keys() < 0) {
- log_fn(LOG_ERR, "Error initializing keys");
+ err(LD_BUG, "Error initializing keys");
tor_assert(0);
}
}
@@ -458,7 +459,7 @@
time_to_exhaust_bw = 24*60*60;
interval_wakeup_time = interval_start_time;
- log_fn(LOG_NOTICE, "Configured hibernation. This interval begins at %s "
+ notice(LD_ACCT, "Configured hibernation. This interval begins at %s "
"and ends at %s. We have no prior estimate for bandwidth, so "
"we will start out awake and hibernate when we exhaust our quota.",
buf1, buf2);
@@ -500,7 +501,7 @@
down_time<interval_end_time?down_time:interval_end_time);
format_local_iso_time(buf4, interval_end_time);
- log_fn(LOG_NOTICE, "Configured hibernation. This interval began at %s; "
+ notice(LD_ACCT, "Configured hibernation. This interval began at %s; "
"the scheduled wake-up time %s %s; "
"we expect%s to exhaust our quota for this interval around %s; "
"the next interval begins at %s (all times local)",
@@ -566,45 +567,45 @@
if (smartlist_len(elts)<1 ||
atoi(smartlist_get(elts,0)) != BW_ACCOUNTING_VERSION) {
- log_fn(LOG_WARN, "Unrecognized bw_accounting file version: %s",
+ warn(LD_ACCT, "Unrecognized bw_accounting file version: %s",
(const char*)smartlist_get(elts,0));
goto err;
}
if (smartlist_len(elts) < 7) {
- log_fn(LOG_WARN, "Corrupted bw_accounting file: %d lines",
+ warn(LD_ACCT, "Corrupted bw_accounting file: %d lines",
smartlist_len(elts));
goto err;
}
if (parse_iso_time(smartlist_get(elts,1), &t1)) {
- log_fn(LOG_WARN, "Error parsing bandwidth usage start time.");
+ warn(LD_ACCT, "Error parsing bandwidth usage start time.");
goto err;
}
if (parse_iso_time(smartlist_get(elts,2), &t2)) {
- log_fn(LOG_WARN, "Error parsing bandwidth usage last-written time");
+ warn(LD_ACCT, "Error parsing bandwidth usage last-written time");
goto err;
}
n_read = tor_parse_uint64(smartlist_get(elts,3), 10, 0, UINT64_MAX,
&ok, NULL);
if (!ok) {
- log_fn(LOG_WARN, "Error parsing number of bytes read");
+ warn(LD_ACCT, "Error parsing number of bytes read");
goto err;
}
n_written = tor_parse_uint64(smartlist_get(elts,4), 10, 0, UINT64_MAX,
&ok, NULL);
if (!ok) {
- log_fn(LOG_WARN, "Error parsing number of bytes read");
+ warn(LD_ACCT, "Error parsing number of bytes read");
goto err;
}
n_seconds = (uint32_t)tor_parse_ulong(smartlist_get(elts,5), 10,0,ULONG_MAX,
&ok, NULL);
if (!ok) {
- log_fn(LOG_WARN, "Error parsing number of seconds live");
+ warn(LD_ACCT, "Error parsing number of seconds live");
goto err;
}
expected_bw =(uint32_t)tor_parse_ulong(smartlist_get(elts,6), 10,0,ULONG_MAX,
&ok, NULL);
if (!ok) {
- log_fn(LOG_WARN, "Error parsing expected bandwidth");
+ warn(LD_ACCT, "Error parsing expected bandwidth");
goto err;
}
@@ -614,7 +615,7 @@
interval_start_time = t1;
expected_bandwidth_usage = expected_bw;
- log_fn(LOG_INFO, "Successfully read bandwidth accounting file written at %s for interval starting at %s. We have been active for %lu seconds in this interval. At the start of the interval, we expected to use about %lu KB per second. ("U64_FORMAT" bytes read so far, "U64_FORMAT" bytes written so far)",
+ info(LD_ACCT, "Successfully read bandwidth accounting file written at %s for interval starting at %s. We have been active for %lu seconds in this interval. At the start of the interval, we expected to use about %lu KB per second. ("U64_FORMAT" bytes read so far, "U64_FORMAT" bytes written so far)",
(char*)smartlist_get(elts,2),
(char*)smartlist_get(elts,1),
(unsigned long)n_seconds_active_in_interval,
@@ -666,7 +667,7 @@
if (new_state == HIBERNATE_STATE_EXITING &&
hibernate_state != HIBERNATE_STATE_LIVE) {
- log(LOG_NOTICE,"Sigint received %s; exiting now.",
+ notice(LD_GENERAL,"Sigint received %s; exiting now.",
hibernate_state == HIBERNATE_STATE_EXITING ?
"a second time" : "while hibernating");
tor_cleanup();
@@ -677,7 +678,7 @@
while ((conn = connection_get_by_type(CONN_TYPE_OR_LISTENER)) ||
(conn = connection_get_by_type(CONN_TYPE_AP_LISTENER)) ||
(conn = connection_get_by_type(CONN_TYPE_DIR_LISTENER))) {
- log_fn(LOG_INFO,"Closing listener type %d", conn->type);
+ info(LD_NET,"Closing listener type %d", conn->type);
connection_mark_for_close(conn);
}
@@ -685,7 +686,7 @@
/* XXX upload rendezvous service descriptors with no intro points */
if (new_state == HIBERNATE_STATE_EXITING) {
- log(LOG_NOTICE,"Interrupt: will shut down in %d seconds. Interrupt again to exit now.", options->ShutdownWaitLength);
+ notice(LD_GENERAL,"Interrupt: will shut down in %d seconds. Interrupt again to exit now.", options->ShutdownWaitLength);
hibernate_end_time = time(NULL) + options->ShutdownWaitLength;
} else { /* soft limit reached */
hibernate_end_time = interval_end_time;
@@ -703,7 +704,7 @@
hibernate_state == HIBERNATE_STATE_DORMANT);
/* listeners will be relaunched in run_scheduled_events() in main.c */
- log_fn(LOG_NOTICE,"Hibernation period ended. Resuming normal activity.");
+ notice(LD_ACCT,"Hibernation period ended. Resuming normal activity.");
hibernate_state = new_state;
hibernate_end_time = 0; /* no longer hibernating */
@@ -738,7 +739,7 @@
else
hibernate_begin(HIBERNATE_STATE_DORMANT, now);
- log_fn(LOG_NOTICE,"Going dormant. Blowing away remaining connections.");
+ notice(LD_ACCT,"Going dormant. Blowing away remaining connections.");
/* Close all OR/AP/exit conns. Leave dir conns because we still want
* to be able to upload server descriptors so people know we're still
@@ -751,7 +752,7 @@
if (CONN_IS_EDGE(conn))
connection_edge_end(conn, END_STREAM_REASON_HIBERNATING,
conn->cpath_layer);
- log_fn(LOG_INFO,"Closing conn type %d", conn->type);
+ info(LD_NET,"Closing conn type %d", conn->type);
if (conn->type == CONN_TYPE_AP) /* send socks failure if needed */
connection_mark_unattached_ap(conn, END_STREAM_REASON_HIBERNATING);
else
@@ -780,10 +781,10 @@
format_iso_time(buf,interval_wakeup_time);
if (hibernate_state != HIBERNATE_STATE_DORMANT) {
/* We weren't sleeping before; we should sleep now. */
- log_fn(LOG_NOTICE, "Accounting period ended. Commencing hibernation until %s GMT",buf);
+ notice(LD_ACCT, "Accounting period ended. Commencing hibernation until %s GMT",buf);
hibernate_go_dormant(now);
} else {
- log_fn(LOG_NOTICE, "Accounting period ended. This period, we will hibernate until %s GMT",buf);
+ notice(LD_ACCT, "Accounting period ended. This period, we will hibernate until %s GMT",buf);
}
}
}
@@ -802,7 +803,7 @@
if (hibernate_state == HIBERNATE_STATE_EXITING) {
tor_assert(hibernate_end_time);
if (hibernate_end_time <= now) {
- log(LOG_NOTICE,"Clean shutdown finished. Exiting.");
+ notice(LD_GENERAL, "Clean shutdown finished. Exiting.");
tor_cleanup();
exit(0);
}
@@ -825,11 +826,11 @@
* go dormant. */
if (hibernate_state == HIBERNATE_STATE_LIVE) {
if (hibernate_soft_limit_reached()) {
- log_fn(LOG_NOTICE,"Bandwidth soft limit reached; commencing hibernation.");
+ notice(LD_ACCT,"Bandwidth soft limit reached; commencing hibernation.");
hibernate_begin(HIBERNATE_STATE_LOWBANDWIDTH, now);
} else if (accounting_enabled && now < interval_wakeup_time) {
format_iso_time(buf,interval_wakeup_time);
- log_fn(LOG_NOTICE, "Commencing hibernation. We will wake up at %s GMT",buf);
+ notice(LD_ACCT,"Commencing hibernation. We will wake up at %s GMT",buf);
hibernate_go_dormant(now);
}
}