blob: e4964d0ecf2d10343e0cfdacce5f8d3254660c4d [file] [log] [blame]
// Licensed to the Apache Software Foundation (ASF) under one
// or more contributor license agreements. See the NOTICE file
// distributed with this work for additional information
// regarding copyright ownership. The ASF licenses this file
// to you under the Apache License, Version 2.0 (the
// "License"); you may not use this file except in compliance
// with the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
// Date: 2012-10-08 23:53:50
#include "butil/logging.h"
#include <gflags/gflags.h>
DEFINE_bool(log_as_json, false, "Print log as a valid JSON");
DEFINE_bool(escape_log, false, "Escape log content before printing");
#if !BRPC_WITH_GLOG
#if defined(OS_WIN)
#include <io.h>
#include <windows.h>
typedef HANDLE FileHandle;
typedef HANDLE MutexHandle;
// Windows warns on using write(). It prefers _write().
#define write(fd, buf, count) _write(fd, buf, static_cast<unsigned int>(count))
// Windows doesn't define STDERR_FILENO. Define it here.
#define STDERR_FILENO 2
#elif defined(OS_MACOSX)
#include <mach/mach.h>
#include <mach/mach_time.h>
#include <mach-o/dyld.h>
#elif defined(OS_POSIX)
#if defined(OS_NACL) || defined(OS_LINUX)
#include <sys/time.h> // timespec doesn't seem to be in <time.h>
#else
#include <sys/syscall.h>
#endif
#include <time.h>
#endif
#if defined(OS_POSIX)
#include <errno.h>
#include <pthread.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#define MAX_PATH PATH_MAX
typedef FILE* FileHandle;
typedef pthread_mutex_t* MutexHandle;
#endif
#include <algorithm>
#include <cstring>
#include <ctime>
#include <iomanip>
#include <ostream>
#include <string>
#include "butil/file_util.h"
#include "butil/debug/alias.h"
#include "butil/debug/debugger.h"
#include "butil/debug/stack_trace.h"
#include "butil/posix/eintr_wrapper.h"
#include "butil/strings/string_util.h"
#include "butil/strings/stringprintf.h"
#include "butil/strings/utf_string_conversions.h"
#include "butil/synchronization/condition_variable.h"
#include "butil/threading/platform_thread.h"
#include "butil/threading/simple_thread.h"
#include "butil/object_pool.h"
#if defined(OS_POSIX)
#include "butil/errno.h"
#include "butil/fd_guard.h"
#endif
#if defined(OS_LINUX)
#include <fcntl.h>
#endif
#if defined(OS_ANDROID)
#include <android/log.h>
#endif
#include <map>
#include <vector>
#include <deque>
#include <limits>
#include "butil/atomicops.h"
#include "butil/thread_local.h"
#include "butil/scoped_lock.h" // BAIDU_SCOPED_LOCK
#include "butil/string_splitter.h"
#include "butil/time.h"
#include "butil/containers/doubly_buffered_data.h"
#include "butil/memory/singleton.h"
#include "butil/endpoint.h"
#include "butil/reloadable_flags.h"
#ifdef BAIDU_INTERNAL
#include "butil/comlog_sink.h"
#endif
extern "C" {
uint64_t BAIDU_WEAK bthread_self();
typedef struct {
uint32_t index; // index in KeyTable
uint32_t version; // ABA avoidance
} bthread_key_t;
int BAIDU_WEAK bthread_key_create(bthread_key_t* key,
void (*destructor)(void* data));
int BAIDU_WEAK bthread_setspecific(bthread_key_t key, void* data);
void* BAIDU_WEAK bthread_getspecific(bthread_key_t key);
}
namespace logging {
DEFINE_bool(crash_on_fatal_log, false,
"Crash process when a FATAL log is printed");
BUTIL_VALIDATE_GFLAG(crash_on_fatal_log, butil::PassValidate);
DEFINE_bool(print_stack_on_check, true,
"Print the stack trace when a CHECK was failed");
BUTIL_VALIDATE_GFLAG(print_stack_on_check, butil::PassValidate);
DEFINE_int32(v, 0, "Show all VLOG(m) messages for m <= this."
" Overridable by --vmodule.");
DEFINE_string(vmodule, "", "per-module verbose level."
" Argument is a comma-separated list of MODULE_NAME=LOG_LEVEL."
" MODULE_NAME is a glob pattern, matched against the filename base"
" (that is, name ignoring .cpp/.h)."
" LOG_LEVEL overrides any value given by --v.");
DEFINE_bool(log_pid, false, "Log process id");
DEFINE_bool(log_bid, true, "Log bthread id");
DEFINE_int32(minloglevel, 0, "Any log at or above this level will be "
"displayed. Anything below this level will be silently ignored. "
"0=INFO 1=NOTICE 2=WARNING 3=ERROR 4=FATAL");
BUTIL_VALIDATE_GFLAG(minloglevel, butil::NonNegativeInteger);
DEFINE_bool(log_hostname, false, "Add host after pid in each log so"
" that we know where logs came from when using aggregation tools"
" like ELK.");
DEFINE_bool(log_year, false, "Log year in datetime part in each log");
DEFINE_bool(log_func_name, false, "[DEPRECATED]Log function name in each log. "
"Now DefaultLogSink logs function names by default. "
"Customized LogSink can also log function names through "
"corresponding OnLogMessage.");
DEFINE_bool(async_log, false, "Use async log");
DEFINE_bool(async_log_in_background_always, false, "Async log written in background always.");
DEFINE_int32(max_async_log_queue_size, 100000, "Max async log size. "
"If current log count of async log > max_async_log_size, "
"Use sync log to protect process.");
DEFINE_int32(sleep_to_flush_async_log_s, 0,
"If the value > 0, sleep before atexit to flush async log");
namespace {
LoggingDestination logging_destination = LOG_DEFAULT;
// For BLOG_ERROR and above, always print to stderr.
const int kAlwaysPrintErrorLevel = BLOG_ERROR;
// Which log file to use? This is initialized by InitLogging or
// will be lazily initialized to the default value when it is
// first needed.
#if defined(OS_WIN)
typedef std::wstring PathString;
#else
typedef std::string PathString;
#endif
PathString* log_file_name = NULL;
// this file is lazily opened and the handle may be NULL
FileHandle log_file = NULL;
// Should we pop up fatal debug messages in a dialog?
bool show_error_dialogs = false;
// An assert handler override specified by the client to be called instead of
// the debug message dialog and process termination.
LogAssertHandler log_assert_handler = NULL;
// Helper functions to wrap platform differences.
int32_t CurrentProcessId() {
#if defined(OS_WIN)
return GetCurrentProcessId();
#elif defined(OS_POSIX)
return getpid();
#endif
}
void DeleteFilePath(const PathString& log_name) {
#if defined(OS_WIN)
DeleteFile(log_name.c_str());
#elif defined (OS_NACL)
// Do nothing; unlink() isn't supported on NaCl.
#else
unlink(log_name.c_str());
#endif
}
#if defined(OS_LINUX)
static PathString GetProcessName() {
butil::fd_guard fd(open("/proc/self/cmdline", O_RDONLY));
if (fd < 0) {
return "unknown";
}
char buf[512];
const ssize_t len = read(fd, buf, sizeof(buf) - 1);
if (len <= 0) {
return "unknown";
}
buf[len] = '\0';
// Not string(buf, len) because we needs to buf to be truncated at first \0.
// Under gdb, the first part of cmdline may include path.
return butil::FilePath(std::string(buf)).BaseName().value();
}
#endif
PathString GetDefaultLogFile() {
#if defined(OS_WIN)
// On Windows we use the same path as the exe.
wchar_t module_name[MAX_PATH];
GetModuleFileName(NULL, module_name, MAX_PATH);
PathString log_file = module_name;
PathString::size_type last_backslash =
log_file.rfind('\\', log_file.size());
if (last_backslash != PathString::npos)
log_file.erase(last_backslash + 1);
log_file += L"debug.log";
return log_file;
#elif defined(OS_LINUX)
return GetProcessName() + ".log";
#elif defined(OS_POSIX)
// On other platforms we just use the current directory.
return PathString("debug.log");
#endif
}
// This class acts as a wrapper for locking the logging files.
// LoggingLock::Init() should be called from the main thread before any logging
// is done. Then whenever logging, be sure to have a local LoggingLock
// instance on the stack. This will ensure that the lock is unlocked upon
// exiting the frame.
// LoggingLocks can not be nested.
class LoggingLock {
public:
LoggingLock() {
LockLogging();
}
~LoggingLock() {
UnlockLogging();
}
static void Init(LogLockingState lock_log, const LogChar* new_log_file) {
if (initialized)
return;
lock_log_file = lock_log;
if (lock_log_file == LOCK_LOG_FILE) {
#if defined(OS_WIN)
if (!log_mutex) {
std::wstring safe_name;
if (new_log_file)
safe_name = new_log_file;
else
safe_name = GetDefaultLogFile();
// \ is not a legal character in mutex names so we replace \ with /
std::replace(safe_name.begin(), safe_name.end(), '\\', '/');
std::wstring t(L"Global\\");
t.append(safe_name);
log_mutex = ::CreateMutex(NULL, FALSE, t.c_str());
if (log_mutex == NULL) {
#if DEBUG
// Keep the error code for debugging
int error = GetLastError(); // NOLINT
butil::debug::BreakDebugger();
#endif
// Return nicely without putting initialized to true.
return;
}
}
#endif
} else {
log_lock = new butil::Mutex;
}
initialized = true;
}
private:
static void LockLogging() {
if (lock_log_file == LOCK_LOG_FILE) {
#if defined(OS_WIN)
::WaitForSingleObject(log_mutex, INFINITE);
// WaitForSingleObject could have returned WAIT_ABANDONED. We don't
// abort the process here. UI tests might be crashy sometimes,
// and aborting the test binary only makes the problem worse.
// We also don't use LOG macros because that might lead to an infinite
// loop. For more info see http://crbug.com/18028.
#elif defined(OS_POSIX)
pthread_mutex_lock(&log_mutex);
#endif
} else {
// use the lock
log_lock->lock();
}
}
static void UnlockLogging() {
if (lock_log_file == LOCK_LOG_FILE) {
#if defined(OS_WIN)
ReleaseMutex(log_mutex);
#elif defined(OS_POSIX)
pthread_mutex_unlock(&log_mutex);
#endif
} else {
log_lock->unlock();
}
}
// The lock is used if log file locking is false. It helps us avoid problems
// with multiple threads writing to the log file at the same time.
static butil::Mutex* log_lock;
// When we don't use a lock, we are using a global mutex. We need to do this
// because LockFileEx is not thread safe.
#if defined(OS_WIN)
static MutexHandle log_mutex;
#elif defined(OS_POSIX)
static pthread_mutex_t log_mutex;
#endif
static bool initialized;
static LogLockingState lock_log_file;
};
// static
bool LoggingLock::initialized = false;
// static
butil::Mutex* LoggingLock::log_lock = NULL;
// static
LogLockingState LoggingLock::lock_log_file = LOCK_LOG_FILE;
#if defined(OS_WIN)
// static
MutexHandle LoggingLock::log_mutex = NULL;
#elif defined(OS_POSIX)
pthread_mutex_t LoggingLock::log_mutex = PTHREAD_MUTEX_INITIALIZER;
#endif
// Called by logging functions to ensure that debug_file is initialized
// and can be used for writing. Returns false if the file could not be
// initialized. debug_file will be NULL in this case.
bool InitializeLogFileHandle() {
if (log_file)
return true;
if (!log_file_name) {
// Nobody has called InitLogging to specify a debug log file, so here we
// initialize the log file name to a default.
log_file_name = new PathString(GetDefaultLogFile());
}
if ((logging_destination & LOG_TO_FILE) != 0) {
#if defined(OS_WIN)
log_file = CreateFile(log_file_name->c_str(), GENERIC_WRITE,
FILE_SHARE_READ | FILE_SHARE_WRITE, NULL,
OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
if (log_file == INVALID_HANDLE_VALUE || log_file == NULL) {
// try the current directory
log_file = CreateFile(L".\\debug.log", GENERIC_WRITE,
FILE_SHARE_READ | FILE_SHARE_WRITE, NULL,
OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
if (log_file == INVALID_HANDLE_VALUE || log_file == NULL) {
log_file = NULL;
return false;
}
}
SetFilePointer(log_file, 0, 0, FILE_END);
#elif defined(OS_POSIX)
log_file = fopen(log_file_name->c_str(), "a");
if (log_file == NULL) {
fprintf(stderr, "Fail to fopen %s: %s", log_file_name->c_str(), berror());
return false;
}
#endif
}
return true;
}
void CloseFile(FileHandle log) {
#if defined(OS_WIN)
CloseHandle(log);
#else
fclose(log);
#endif
}
void CloseLogFileUnlocked() {
if (!log_file)
return;
CloseFile(log_file);
log_file = NULL;
}
void Log2File(const std::string& log) {
// We can have multiple threads and/or processes, so try to prevent them
// from clobbering each other's writes.
// If the client app did not call InitLogging, and the lock has not
// been created do it now. We do this on demand, but if two threads try
// to do this at the same time, there will be a race condition to create
// the lock. This is why InitLogging should be called from the main
// thread at the beginning of execution.
LoggingLock::Init(LOCK_LOG_FILE, NULL);
LoggingLock logging_lock;
if (InitializeLogFileHandle()) {
#if defined(OS_WIN)
SetFilePointer(log_file, 0, 0, SEEK_END);
DWORD num_written;
WriteFile(log_file, static_cast<const void*>(log.data()),
static_cast<DWORD>(log.size()), &num_written, NULL);
#else
fwrite(log.data(), log.size(), 1, log_file);
fflush(log_file);
#endif
}
}
} // namespace
#if defined(OS_LINUX) || defined(OS_MACOSX)
typedef timeval TimeVal;
#else
struct TimeVal {
time_t tv_sec;
};
#endif
TimeVal GetTimestamp() {
#if defined(OS_LINUX) || defined(OS_MACOSX)
timeval tv;
gettimeofday(&tv, NULL);
return tv;
#else
return { time(NULL) };
#endif
}
struct BAIDU_CACHELINE_ALIGNMENT LogInfo {
~LogInfo() = default;
void clear() {
file.clear();
func.clear();
content.clear();
}
std::string file;
std::string func;
std::string content;
TimeVal timestamp{};
int severity{0};
int line{0};
// If `raw' is false, content has been a complete log.
// If raw is true, a complete log consists of all properties of LogInfo.
bool raw{false};
};
struct BAIDU_CACHELINE_ALIGNMENT LogRequest {
static LogRequest* const UNCONNECTED;
LogRequest* next{NULL};
LogInfo log_info;
};
LogRequest* const LogRequest::UNCONNECTED = (LogRequest*)(intptr_t)-1;
class AsyncLogger : public butil::SimpleThread {
public:
static AsyncLogger* GetInstance();
void Log(const LogInfo& log_info);
void Log(LogInfo&& log_info);
void StopAndJoin();
private:
friend struct DefaultSingletonTraits<AsyncLogger>;
static LogRequest _stop_req;
AsyncLogger();
~AsyncLogger() override;
static void AtExit() {
GetInstance()->StopAndJoin();
if (FLAGS_sleep_to_flush_async_log_s > 0) {
::sleep(FLAGS_sleep_to_flush_async_log_s);
}
}
void LogImpl(LogRequest* log_req);
void Run() override;
void LogTask(LogRequest* req);
bool IsLogComplete(LogRequest* old_head);
void DoLog(LogRequest* req);
void DoLog(const LogInfo& log_info);
butil::atomic<LogRequest*> _log_head;
butil::Mutex _mutex;
butil::ConditionVariable _cond;
LogRequest* _current_log_request;
butil::atomic<int32_t> _log_request_count;
butil::atomic<bool> _stop;
};
AsyncLogger* AsyncLogger::GetInstance() {
return Singleton<AsyncLogger,
LeakySingletonTraits<AsyncLogger>>::get();
}
AsyncLogger::AsyncLogger()
: butil::SimpleThread("async_log_thread")
, _log_head(NULL)
, _cond(&_mutex)
, _current_log_request(NULL)
, _stop(false) {
Start();
// We need to stop async logger and
// flush all async log before exit.
atexit(AtExit);
}
AsyncLogger::~AsyncLogger() {
StopAndJoin();
}
std::string LogInfoToLogStr(int severity, butil::StringPiece file,
int line, butil::StringPiece func,
butil::StringPiece content) {
// There's a copy here to concatenate prefix and content. Since
// DefaultLogSink is hardly used right now, the copy is irrelevant.
// A LogSink focused on performance should also be able to handle
// non-continuous inputs which is a must to maximize performance.
std::ostringstream os;
PrintLog(os, severity, file.data(), line, func.data(), content);
os << '\n';
return os.str();
}
std::string LogInfo2LogStr(const LogInfo& log_info) {
return LogInfoToLogStr(log_info.severity, log_info.file, log_info.line,
log_info.func, log_info.content);
}
void AsyncLogger::Log(const LogInfo& log_info) {
if (log_info.content.empty()) {
return;
}
bool is_full = FLAGS_max_async_log_queue_size > 0 &&
_log_request_count.fetch_add(1, butil::memory_order_relaxed) >
FLAGS_max_async_log_queue_size;
if (is_full || _stop.load(butil::memory_order_relaxed)) {
// Async logger is full or stopped, fallback to sync log.
DoLog(log_info);
return;
}
auto log_req = butil::get_object<LogRequest>();
if (!log_req) {
// Async log failed, fallback to sync log.
DoLog(log_info);
return;
}
log_req->log_info = log_info;
LogImpl(log_req);
}
void AsyncLogger::Log(LogInfo&& log_info) {
if (log_info.content.empty()) {
return;
}
bool is_full = FLAGS_max_async_log_queue_size > 0 &&
_log_request_count.fetch_add(1, butil::memory_order_relaxed) >
FLAGS_max_async_log_queue_size;
if (is_full || _stop.load(butil::memory_order_relaxed)) {
// Async logger is full or stopped, fallback to sync log.
DoLog(log_info);
return;
}
auto log_req = butil::get_object<LogRequest>();
if (!log_req) {
// Async log failed, fallback to sync log.
DoLog(log_info);
return;
}
log_req->log_info = std::move(log_info);
LogImpl(log_req);
}
void AsyncLogger::LogImpl(LogRequest* log_req) {
log_req->next = LogRequest::UNCONNECTED;
// Release fence makes sure the thread getting request sees *req
LogRequest* const prev_head =
_log_head.exchange(log_req, butil::memory_order_release);
if (prev_head != NULL) {
// Someone is logging. The async_log_thread thread may spin
// until req->next to be non-UNCONNECTED. This process is not
// lock-free, but the duration is so short(1~2 instructions,
// depending on compiler) that the spin rarely occurs in practice
// (I've not seen any spin in highly contended tests).
log_req->next = prev_head;
return;
}
// We've got the right to write.
log_req->next = NULL;
if (!FLAGS_async_log_in_background_always) {
// Use sync log for the LogRequest
// which has got the right to write.
DoLog(log_req);
// Return when there's no more LogRequests.
if (IsLogComplete(log_req)) {
butil::return_object(log_req);
return;
}
}
BAIDU_SCOPED_LOCK(_mutex);
if (_stop.load(butil::memory_order_relaxed)) {
// Async logger is stopped, fallback to sync log.
LogTask(log_req);
} else {
// Wake up async logger.
_current_log_request = log_req;
_cond.Signal();
}
}
void AsyncLogger::StopAndJoin() {
if (!_stop.exchange(true, butil::memory_order_relaxed)) {
BAIDU_SCOPED_LOCK(_mutex);
_cond.Signal();
}
if (!HasBeenJoined()) {
Join();
}
}
void AsyncLogger::Run() {
while (true) {
BAIDU_SCOPED_LOCK(_mutex);
while (!_stop.load(butil::memory_order_relaxed) &&
!_current_log_request) {
_cond.Wait();
}
if (_stop.load(butil::memory_order_relaxed) &&
!_current_log_request) {
break;
}
LogTask(_current_log_request);
_current_log_request = NULL;
}
}
void AsyncLogger::LogTask(LogRequest* req) {
do {
// req was logged, skip it.
if (req->next != NULL && req->log_info.content.empty()) {
LogRequest* const saved_req = req;
req = req->next;
butil::return_object(saved_req);
}
// Log all requests to file.
while (req->next != NULL) {
LogRequest* const saved_req = req;
req = req->next;
if (!saved_req->log_info.content.empty()) {
DoLog(saved_req);
}
// Release LogRequests until last request.
butil::return_object(saved_req);
}
if (!req->log_info.content.empty()) {
DoLog(req);
}
// Return when there's no more LogRequests.
if (IsLogComplete(req)) {
butil::return_object(req);
return;
}
} while (true);
}
bool AsyncLogger::IsLogComplete(LogRequest* old_head) {
if (old_head->next) {
fprintf(stderr, "old_head->next should be NULL\n");
}
LogRequest* new_head = old_head;
LogRequest* desired = NULL;
if (_log_head.compare_exchange_strong(
new_head, desired, butil::memory_order_acquire)) {
// No one added new requests.
return true;
}
if (new_head == old_head) {
fprintf(stderr, "new_head should not be equal to old_head\n");
}
// Above acquire fence pairs release fence of exchange in Log() to make
// sure that we see all fields of requests set.
// Someone added new requests.
// Reverse the list until old_head.
LogRequest* tail = NULL;
LogRequest* p = new_head;
do {
while (p->next == LogRequest::UNCONNECTED) {
sched_yield();
}
LogRequest* const saved_next = p->next;
p->next = tail;
tail = p;
p = saved_next;
if (!p) {
fprintf(stderr, "p should not be NULL\n");
}
} while (p != old_head);
// Link old list with new list.
old_head->next = tail;
return false;
}
void AsyncLogger::DoLog(LogRequest* req) {
DoLog(req->log_info);
req->log_info.clear();
}
void AsyncLogger::DoLog(const LogInfo& log_info) {
if (log_info.raw) {
Log2File(LogInfo2LogStr(log_info));
} else {
Log2File(log_info.content);
}
_log_request_count.fetch_sub(1, butil::memory_order_relaxed);
}
LoggingSettings::LoggingSettings()
: logging_dest(LOG_DEFAULT),
log_file(NULL),
lock_log(LOCK_LOG_FILE),
delete_old(APPEND_TO_OLD_LOG_FILE) {}
bool BaseInitLoggingImpl(const LoggingSettings& settings) {
#if defined(OS_NACL)
// Can log only to the system debug log.
CHECK_EQ(settings.logging_dest & ~LOG_TO_SYSTEM_DEBUG_LOG, 0);
#endif
logging_destination = settings.logging_dest;
// ignore file options unless logging to file is set.
if ((logging_destination & LOG_TO_FILE) == 0)
return true;
LoggingLock::Init(settings.lock_log, settings.log_file);
LoggingLock logging_lock;
// Calling InitLogging twice or after some log call has already opened the
// default log file will re-initialize to the new options.
CloseLogFileUnlocked();
if (!log_file_name)
log_file_name = new PathString();
if (settings.log_file) {
*log_file_name = settings.log_file;
} else {
*log_file_name = GetDefaultLogFile();
}
if (settings.delete_old == DELETE_OLD_LOG_FILE)
DeleteFilePath(*log_file_name);
return InitializeLogFileHandle();
}
void SetMinLogLevel(int level) {
FLAGS_minloglevel = std::min(BLOG_FATAL, level);
}
int GetMinLogLevel() {
return FLAGS_minloglevel;
}
void SetShowErrorDialogs(bool enable_dialogs) {
show_error_dialogs = enable_dialogs;
}
void SetLogAssertHandler(LogAssertHandler handler) {
log_assert_handler = handler;
}
const char* const log_severity_names[LOG_NUM_SEVERITIES] = {
"INFO", "NOTICE", "WARNING", "ERROR", "FATAL" };
static void PrintLogSeverity(std::ostream& os, int severity) {
if (severity < 0) {
// Add extra space to separate from following datetime.
os << 'V' << -severity << ' ';
} else if (severity < LOG_NUM_SEVERITIES) {
os << log_severity_names[severity][0];
} else {
os << 'U';
}
}
void PrintLogPrefix(std::ostream& os, int severity,
butil::StringPiece file, int line,
butil::StringPiece func, TimeVal tv) {
PrintLogSeverity(os, severity);
time_t t = tv.tv_sec;
struct tm local_tm = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, NULL};
#if _MSC_VER >= 1400
localtime_s(&local_tm, &t);
#else
localtime_r(&t, &local_tm);
#endif
const char prev_fill = os.fill('0');
if (FLAGS_log_year) {
os << std::setw(4) << local_tm.tm_year + 1900;
}
os << std::setw(2) << local_tm.tm_mon + 1
<< std::setw(2) << local_tm.tm_mday << ' '
<< std::setw(2) << local_tm.tm_hour << ':'
<< std::setw(2) << local_tm.tm_min << ':'
<< std::setw(2) << local_tm.tm_sec;
#if defined(OS_LINUX) || defined(OS_MACOSX)
os << '.' << std::setw(6) << tv.tv_usec;
#endif
if (FLAGS_log_pid) {
os << ' ' << std::setfill(' ') << std::setw(5) << CurrentProcessId();
}
os << ' ' << std::setfill(' ') << std::setw(5)
<< butil::PlatformThread::CurrentId() << std::setfill('0');
if (FLAGS_log_bid && bthread_self) {
os << ' ' << std::setfill(' ') << std::setw(5) << bthread_self();
}
if (FLAGS_log_hostname) {
butil::StringPiece hostname(butil::my_hostname());
if (hostname.ends_with(".baidu.com")) { // make it shorter
hostname.remove_suffix(10);
}
os << ' ' << hostname;
}
os << ' ' << file << ':' << line;
if (!func.empty()) {
os << " " << func;
}
os << "] ";
os.fill(prev_fill);
}
void PrintLogPrefix(std::ostream& os, int severity,
const char* file, int line) {
PrintLogPrefix(os, severity, file, line, "", GetTimestamp());
}
static void PrintLogPrefixAsJSON(std::ostream& os, int severity,
butil::StringPiece file,
butil::StringPiece func,
int line, TimeVal tv) {
// severity
os << "\"L\":\"";
if (severity < 0) {
os << 'V' << -severity;
} else if (severity < LOG_NUM_SEVERITIES) {
os << log_severity_names[severity][0];
} else {
os << 'U';
}
// time
os << "\",\"T\":\"";
time_t t = tv.tv_sec;
struct tm local_tm = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, NULL};
#if _MSC_VER >= 1400
localtime_s(&local_tm, &t);
#else
localtime_r(&t, &local_tm);
#endif
const char prev_fill = os.fill('0');
if (FLAGS_log_year) {
os << std::setw(4) << local_tm.tm_year + 1900;
}
os << std::setw(2) << local_tm.tm_mon + 1
<< std::setw(2) << local_tm.tm_mday << ' '
<< std::setw(2) << local_tm.tm_hour << ':'
<< std::setw(2) << local_tm.tm_min << ':'
<< std::setw(2) << local_tm.tm_sec;
#if defined(OS_LINUX) || defined(OS_MACOSX)
os << '.' << std::setw(6) << tv.tv_usec;
#endif
os << "\",";
os.fill(prev_fill);
if (FLAGS_log_pid) {
os << "\"pid\":\"" << CurrentProcessId() << "\",";
}
os << "\"tid\":\"" << butil::PlatformThread::CurrentId() << "\",";
if (FLAGS_log_hostname) {
butil::StringPiece hostname(butil::my_hostname());
if (hostname.ends_with(".baidu.com")) { // make it shorter
hostname.remove_suffix(10);
}
os << "\"host\":\"" << hostname << "\",";
}
os << "\"C\":\"" << file << ':' << line;
if (!func.empty()) {
os << " " << func;
}
os << "\"";
}
void EscapeJson(std::ostream& os, const butil::StringPiece& s) {
for (auto it = s.begin(); it != s.end(); it++) {
auto c = *it;
switch (c) {
case '"': os << "\\\""; break;
case '\\': os << "\\\\"; break;
case '\b': os << "\\b"; break;
case '\f': os << "\\f"; break;
case '\n': os << "\\n"; break;
case '\r': os << "\\r"; break;
case '\t': os << "\\t"; break;
default: os << c;
}
}
}
inline void OutputLog(std::ostream& os, const butil::StringPiece& s) {
if (FLAGS_escape_log) {
EscapeJson(os, s);
} else {
os.write(s.data(), s.length());
}
}
void PrintLog(std::ostream& os, int severity, const char* file, int line,
const char* func, const butil::StringPiece& content) {
if (!FLAGS_log_as_json) {
PrintLogPrefix(os, severity, file, line, func, GetTimestamp());
OutputLog(os, content);
} else {
os << '{';
PrintLogPrefixAsJSON(os, severity, file, func, line, GetTimestamp());
bool pair_quote = false;
if (content.empty() || content[0] != '"') {
// not a json, add a 'M' field
os << ",\"M\":\"";
pair_quote = true;
} else {
os << ',';
}
OutputLog(os, content);
if (pair_quote) {
os << '"';
} else if (!content.empty() && content[content.size() -1 ] != '"') {
// Controller may write `"M":"...` which misses the last quote
os << '"';
}
os << '}';
}
}
void PrintLog(std::ostream& os,
int severity, const char* file, int line,
const butil::StringPiece& content) {
PrintLog(os, severity, file, line, "", content);
}
// A log message handler that gets notified of every log message we process.
class DoublyBufferedLogSink : public butil::DoublyBufferedData<LogSink*> {
public:
DoublyBufferedLogSink() {}
static DoublyBufferedLogSink* GetInstance();
private:
friend struct DefaultSingletonTraits<DoublyBufferedLogSink>;
DISALLOW_COPY_AND_ASSIGN(DoublyBufferedLogSink);
};
DoublyBufferedLogSink* DoublyBufferedLogSink::GetInstance() {
return Singleton<DoublyBufferedLogSink,
LeakySingletonTraits<DoublyBufferedLogSink> >::get();
}
struct SetLogSinkFn {
LogSink* new_sink;
LogSink* old_sink;
bool operator()(LogSink*& ptr) {
old_sink = ptr;
ptr = new_sink;
return true;
}
};
LogSink* SetLogSink(LogSink* sink) {
SetLogSinkFn fn = { sink, NULL };
CHECK(DoublyBufferedLogSink::GetInstance()->Modify(fn));
return fn.old_sink;
}
// MSVC doesn't like complex extern templates and DLLs.
#if !defined(COMPILER_MSVC)
// Explicit instantiations for commonly used comparisons.
template std::string* MakeCheckOpString<int, int>(
const int&, const int&, const char* names);
template std::string* MakeCheckOpString<unsigned long, unsigned long>(
const unsigned long&, const unsigned long&, const char* names);
template std::string* MakeCheckOpString<unsigned long, unsigned int>(
const unsigned long&, const unsigned int&, const char* names);
template std::string* MakeCheckOpString<unsigned int, unsigned long>(
const unsigned int&, const unsigned long&, const char* names);
template std::string* MakeCheckOpString<std::string, std::string>(
const std::string&, const std::string&, const char* name);
#endif
#if !defined(NDEBUG)
// Displays a message box to the user with the error message in it.
// Used for fatal messages, where we close the app simultaneously.
// This is for developers only; we don't use this in circumstances
// (like release builds) where users could see it, since users don't
// understand these messages anyway.
void DisplayDebugMessageInDialog(const std::string& str) {
if (str.empty())
return;
if (!show_error_dialogs)
return;
#if defined(OS_WIN)
// For Windows programs, it's possible that the message loop is
// messed up on a fatal error, and creating a MessageBox will cause
// that message loop to be run. Instead, we try to spawn another
// process that displays its command line. We look for "Debug
// Message.exe" in the same directory as the application. If it
// exists, we use it, otherwise, we use a regular message box.
wchar_t prog_name[MAX_PATH];
GetModuleFileNameW(NULL, prog_name, MAX_PATH);
wchar_t* backslash = wcsrchr(prog_name, '\\');
if (backslash)
backslash[1] = 0;
wcscat_s(prog_name, MAX_PATH, L"debug_message.exe");
std::wstring cmdline = butil::UTF8ToWide(str);
if (cmdline.empty())
return;
STARTUPINFO startup_info;
memset(&startup_info, 0, sizeof(startup_info));
startup_info.cb = sizeof(startup_info);
PROCESS_INFORMATION process_info;
if (CreateProcessW(prog_name, &cmdline[0], NULL, NULL, false, 0, NULL,
NULL, &startup_info, &process_info)) {
WaitForSingleObject(process_info.hProcess, INFINITE);
CloseHandle(process_info.hThread);
CloseHandle(process_info.hProcess);
} else {
// debug process broken, let's just do a message box
MessageBoxW(NULL, &cmdline[0], L"Fatal error",
MB_OK | MB_ICONHAND | MB_TOPMOST);
}
#else
// We intentionally don't implement a dialog on other platforms.
// You can just look at stderr.
#endif
}
#endif // !defined(NDEBUG)
bool StringSink::OnLogMessage(int severity, const char* file, int line,
const butil::StringPiece& content) {
return OnLogMessage(severity, file, line, "", content);
}
bool StringSink::OnLogMessage(int severity, const char* file,
int line, const char* func,
const butil::StringPiece& content) {
std::ostringstream os;
PrintLog(os, severity, file, line, func, content);
const std::string msg = os.str();
{
butil::AutoLock lock_guard(_lock);
append(msg);
}
return true;
}
CharArrayStreamBuf::~CharArrayStreamBuf() {
free(_data);
}
int CharArrayStreamBuf::overflow(int ch) {
if (ch == std::streambuf::traits_type::eof()) {
return ch;
}
size_t new_size = std::max(_size * 3 / 2, (size_t)64);
char* new_data = (char*)malloc(new_size);
if (BAIDU_UNLIKELY(new_data == NULL)) {
setp(NULL, NULL);
return std::streambuf::traits_type::eof();
}
memcpy(new_data, _data, _size);
free(_data);
_data = new_data;
const size_t old_size = _size;
_size = new_size;
setp(_data, _data + new_size);
pbump(old_size);
// if size == 1, this function will call overflow again.
return sputc(ch);
}
int CharArrayStreamBuf::sync() {
// data are already there.
return 0;
}
void CharArrayStreamBuf::reset() {
setp(_data, _data + _size);
}
LogStream& LogStream::SetPosition(const LogChar* file, int line,
LogSeverity severity) {
_file = file;
_line = line;
_severity = severity;
return *this;
}
LogStream& LogStream::SetPosition(const LogChar* file, int line,
const LogChar* func,
LogSeverity severity) {
_file = file;
_line = line;
_func = func;
_severity = severity;
return *this;
}
#if defined(__GNUC__)
static bthread_key_t stream_bkey;
static pthread_key_t stream_pkey;
static pthread_once_t create_stream_key_once = PTHREAD_ONCE_INIT;
inline bool is_bthread_linked() { return bthread_key_create != NULL; }
static void destroy_tls_streams(void* data) {
if (data == NULL) {
return;
}
LogStream** a = (LogStream**)data;
for (int i = 0; i <= LOG_NUM_SEVERITIES; ++i) {
delete a[i];
}
delete[] a;
}
static void create_stream_key_or_die() {
if (is_bthread_linked()) {
int rc = bthread_key_create(&stream_bkey, destroy_tls_streams);
if (rc) {
fprintf(stderr, "Fail to bthread_key_create");
exit(1);
}
} else {
int rc = pthread_key_create(&stream_pkey, destroy_tls_streams);
if (rc) {
fprintf(stderr, "Fail to pthread_key_create");
exit(1);
}
}
}
static LogStream** get_tls_stream_array() {
pthread_once(&create_stream_key_once, create_stream_key_or_die);
if (is_bthread_linked()) {
return (LogStream**)bthread_getspecific(stream_bkey);
} else {
return (LogStream**)pthread_getspecific(stream_pkey);
}
}
static LogStream** get_or_new_tls_stream_array() {
LogStream** a = get_tls_stream_array();
if (a == NULL) {
a = new LogStream*[LOG_NUM_SEVERITIES + 1];
memset(a, 0, sizeof(LogStream*) * (LOG_NUM_SEVERITIES + 1));
if (is_bthread_linked()) {
bthread_setspecific(stream_bkey, a);
} else {
pthread_setspecific(stream_pkey, a);
}
}
return a;
}
inline LogStream* CreateLogStream(const LogChar* file,
int line,
const LogChar* func,
LogSeverity severity) {
int slot = 0;
if (severity >= 0) {
DCHECK_LT(severity, LOG_NUM_SEVERITIES);
slot = severity + 1;
} // else vlog
LogStream** stream_array = get_or_new_tls_stream_array();
LogStream* stream = stream_array[slot];
if (stream == NULL) {
stream = new LogStream;
stream_array[slot] = stream;
}
if (stream->empty()) {
stream->SetPosition(file, line, func, severity);
}
return stream;
}
inline LogStream* CreateLogStream(const LogChar* file,
int line,
LogSeverity severity) {
return CreateLogStream(file, line, "", severity);
}
inline void DestroyLogStream(LogStream* stream) {
if (stream != NULL) {
stream->Flush();
}
}
#else
inline LogStream* CreateLogStream(const LogChar* file, int line,
LogSeverity severity) {
return CreateLogStream(file, line, "", severity);
}
inline LogStream* CreateLogStream(const LogChar* file, int line,
const LogChar* func,
LogSeverity severity) {
LogStream* stream = new LogStream;
stream->SetPosition(file, line, func, severity);
return stream;
}
inline void DestroyLogStream(LogStream* stream) {
delete stream;
}
#endif // __GNUC__
class DefaultLogSink : public LogSink {
public:
static DefaultLogSink* GetInstance() {
return Singleton<DefaultLogSink,
LeakySingletonTraits<DefaultLogSink> >::get();
}
bool OnLogMessage(int severity, const char* file, int line,
const butil::StringPiece& content) override {
return OnLogMessage(severity, file, line, "", content);
}
bool OnLogMessage(int severity, const char* file,
int line, const char* func,
const butil::StringPiece& content) override {
std::string log;
if ((logging_destination & LOG_TO_SYSTEM_DEBUG_LOG) != 0 ||
severity >= kAlwaysPrintErrorLevel) {
log = LogInfoToLogStr(severity, file, line, func, content);
// When we're only outputting to a log file, above a certain log level, we
// should still output to stderr so that we can better detect and diagnose
// problems with unit tests, especially on the buildbots.
fwrite(log.data(), log.size(), 1, stderr);
fflush(stderr);
}
// write to log file
if ((logging_destination & LOG_TO_FILE) != 0) {
if ((FLAGS_crash_on_fatal_log && severity == BLOG_FATAL) ||
!FLAGS_async_log) {
if (log.empty()) {
log = LogInfoToLogStr(severity, file, line, func, content);
}
Log2File(log);
} else {
LogInfo info;
if (log.empty()) {
info.severity = severity;
info.timestamp = GetTimestamp();
info.file = file;
info.func = func;
info.line = line;
info.content = content.as_string();
info.raw = true;
} else {
info.content = std::move(log);
info.raw = false;
}
AsyncLogger::GetInstance()->Log(std::move(info));
}
}
return true;
}
private:
DefaultLogSink() = default;
~DefaultLogSink() override = default;
friend struct DefaultSingletonTraits<DefaultLogSink>;
};
void LogStream::FlushWithoutReset() {
if (empty()) {
// Nothing to flush.
return;
}
#if !defined(OS_NACL) && !defined(__UCLIBC__)
if ((FLAGS_print_stack_on_check && _is_check && _severity == BLOG_FATAL) || _backtrace) {
// Include a stack trace on a fatal.
butil::debug::StackTrace trace;
size_t count = 0;
const void* const* addrs = trace.Addresses(&count);
*this << std::endl; // Newline to separate from log message.
if (count > 3) {
// Remove top 3 frames which are useless to users.
// #2 may be ~LogStream
// #0 0x00000059ccae butil::debug::StackTrace::StackTrace()
// #1 0x0000005947c7 logging::LogStream::FlushWithoutReset()
// #2 0x000000594b88 logging::LogMessage::~LogMessage()
butil::debug::StackTrace trace_stripped(addrs + 3, count - 3);
trace_stripped.OutputToStream(this);
} else {
trace.OutputToStream(this);
}
}
#endif
// End the data with zero because sink is likely to assume this.
*this << std::ends;
// Move back one step because we don't want to count the zero.
pbump(-1);
// Give any logsink first dibs on the message.
#ifdef BAIDU_INTERNAL
// If the logsink fails and it's not comlog, try comlog. stderr on last try.
bool tried_comlog = false;
#endif
bool tried_default = false;
{
DoublyBufferedLogSink::ScopedPtr ptr;
if (DoublyBufferedLogSink::GetInstance()->Read(&ptr) == 0 &&
(*ptr) != NULL) {
bool result = (*ptr)->OnLogMessage(
_severity, _file, _line, _func, content());
if (result) {
goto FINISH_LOGGING;
}
#ifdef BAIDU_INTERNAL
tried_comlog = (*ptr == ComlogSink::GetInstance());
#endif
tried_default = (*ptr == DefaultLogSink::GetInstance());
}
}
#ifdef BAIDU_INTERNAL
if (!tried_comlog) {
if (ComlogSink::GetInstance()->OnLogMessage(
_severity, _file, _line, _func, content())) {
goto FINISH_LOGGING;
}
}
#endif
if (!tried_default) {
DefaultLogSink::GetInstance()->OnLogMessage(
_severity, _file, _line, _func, content());
}
FINISH_LOGGING:
if (FLAGS_crash_on_fatal_log && _severity == BLOG_FATAL) {
// Ensure the first characters of the string are on the stack so they
// are contained in minidumps for diagnostic purposes.
butil::StringPiece str = content();
char str_stack[1024];
str.copy(str_stack, arraysize(str_stack));
butil::debug::Alias(str_stack);
if (log_assert_handler) {
// Make a copy of the string for the handler out of paranoia.
log_assert_handler(str.as_string());
} else {
// Don't use the string with the newline, get a fresh version to send to
// the debug message process. We also don't display assertions to the
// user in release mode. The enduser can't do anything with this
// information, and displaying message boxes when the application is
// hosed can cause additional problems.
#ifndef NDEBUG
DisplayDebugMessageInDialog(str.as_string());
#endif
// Crash the process to generate a dump.
butil::debug::BreakDebugger();
}
}
}
LogMessage::LogMessage(const char* file, int line, LogSeverity severity)
: LogMessage(file, line, "", severity) {}
LogMessage::LogMessage(const char* file, int line,
const char* func, LogSeverity severity) {
_stream = CreateLogStream(file, line, func, severity);
}
LogMessage::LogMessage(const char* file, int line, std::string* result)
: LogMessage(file, line, "", result) {}
LogMessage::LogMessage(const char* file, int line,
const char* func, std::string* result) {
_stream = CreateLogStream(file, line, func, BLOG_FATAL);
*_stream << "Check failed: " << *result;
delete result;
}
LogMessage::LogMessage(const char* file, int line, LogSeverity severity,
std::string* result)
: LogMessage(file, line, "", severity, result) {}
LogMessage::LogMessage(const char* file, int line, const char* func,
LogSeverity severity, std::string* result) {
_stream = CreateLogStream(file, line, func, severity);
*_stream << "Check failed: " << *result;
delete result;
}
LogMessage::~LogMessage() {
DestroyLogStream(_stream);
}
#if defined(OS_WIN)
// This has already been defined in the header, but defining it again as DWORD
// ensures that the type used in the header is equivalent to DWORD. If not,
// the redefinition is a compile error.
typedef DWORD SystemErrorCode;
#endif
SystemErrorCode GetLastSystemErrorCode() {
#if defined(OS_WIN)
return ::GetLastError();
#elif defined(OS_POSIX)
return errno;
#else
#error Not implemented
#endif
}
void SetLastSystemErrorCode(SystemErrorCode err) {
#if defined(OS_WIN)
::SetLastError(err);
#elif defined(OS_POSIX)
errno = err;
#else
#error Not implemented
#endif
}
#if defined(OS_WIN)
BUTIL_EXPORT std::string SystemErrorCodeToString(SystemErrorCode error_code) {
const int error_message_buffer_size = 256;
char msgbuf[error_message_buffer_size];
DWORD flags = FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS;
DWORD len = FormatMessageA(flags, NULL, error_code, 0, msgbuf,
arraysize(msgbuf), NULL);
if (len) {
// Messages returned by system end with line breaks.
return butil::CollapseWhitespaceASCII(msgbuf, true) +
butil::StringPrintf(" (0x%X)", error_code);
}
return butil::StringPrintf("Error (0x%X) while retrieving error. (0x%X)",
GetLastError(), error_code);
}
#elif defined(OS_POSIX)
BUTIL_EXPORT std::string SystemErrorCodeToString(SystemErrorCode error_code) {
return berror(error_code);
}
#else
#error Not implemented
#endif
#if defined(OS_WIN)
Win32ErrorLogMessage::Win32ErrorLogMessage(const char* file,
int line,
LogSeverity severity,
SystemErrorCode err)
: Win32ErrorLogMessage(file, line, "", severity, err) {
}
Win32ErrorLogMessage::Win32ErrorLogMessage(const char* file,
int line,
const char* func,
LogSeverity severity,
SystemErrorCode err)
: err_(err)
, log_message_(file, line, func, severity) {
}
Win32ErrorLogMessage::~Win32ErrorLogMessage() {
stream() << ": " << SystemErrorCodeToString(err_);
// We're about to crash (CHECK). Put |err_| on the stack (by placing it in a
// field) and use Alias in hopes that it makes it into crash dumps.
DWORD last_error = err_;
butil::debug::Alias(&last_error);
}
#elif defined(OS_POSIX)
ErrnoLogMessage::ErrnoLogMessage(const char* file,
int line,
LogSeverity severity,
SystemErrorCode err)
: ErrnoLogMessage(file, line, "", severity, err) {}
ErrnoLogMessage::ErrnoLogMessage(const char* file,
int line,
const char* func,
LogSeverity severity,
SystemErrorCode err)
: err_(err)
, log_message_(file, line, func, severity) {}
ErrnoLogMessage::~ErrnoLogMessage() {
stream() << ": " << SystemErrorCodeToString(err_);
}
#endif // OS_WIN
void CloseLogFile() {
LoggingLock logging_lock;
CloseLogFileUnlocked();
}
void RawLog(int level, const char* message) {
if (level >= FLAGS_minloglevel) {
size_t bytes_written = 0;
const size_t message_len = strlen(message);
int rv;
while (bytes_written < message_len) {
rv = HANDLE_EINTR(
write(STDERR_FILENO, message + bytes_written,
message_len - bytes_written));
if (rv < 0) {
// Give up, nothing we can do now.
break;
}
bytes_written += rv;
}
if (message_len > 0 && message[message_len - 1] != '\n') {
do {
rv = HANDLE_EINTR(write(STDERR_FILENO, "\n", 1));
if (rv < 0) {
// Give up, nothing we can do now.
break;
}
} while (rv != 1);
}
}
if (FLAGS_crash_on_fatal_log && level == BLOG_FATAL)
butil::debug::BreakDebugger();
}
// This was defined at the beginning of this file.
#undef write
#if defined(OS_WIN)
std::wstring GetLogFileFullPath() {
if (log_file_name)
return *log_file_name;
return std::wstring();
}
#endif
// ----------- VLOG stuff -----------------
struct VLogSite;
struct VModuleList;
extern const int VLOG_UNINITIALIZED = std::numeric_limits<int>::max();
static pthread_mutex_t vlog_site_list_mutex = PTHREAD_MUTEX_INITIALIZER;
static VLogSite* vlog_site_list = NULL;
static VModuleList* vmodule_list = NULL;
static pthread_mutex_t reset_vmodule_and_v_mutex = PTHREAD_MUTEX_INITIALIZER;
static const int64_t DELAY_DELETION_SEC = 10;
static std::deque<std::pair<VModuleList*, int64_t> >*
deleting_vmodule_list = NULL;
struct VLogSite {
VLogSite(const char* filename, int required_v, int line_no)
: _next(0), _v(0), _required_v(required_v), _line_no(line_no) {
// Remove dirname/extname.
butil::StringPiece s(filename);
size_t pos = s.find_last_of("./");
if (pos != butil::StringPiece::npos) {
if (s[pos] == '.') {
s.remove_suffix(s.size() - pos);
_full_module.assign(s.data(), s.size());
size_t pos2 = s.find_last_of('/');
if (pos2 != butil::StringPiece::npos) {
s.remove_prefix(pos2 + 1);
}
} else {
_full_module.assign(s.data(), s.size());
s.remove_prefix(pos + 1);
}
} // else keep _full_module empty when it equals _module
_module.assign(s.data(), s.size());
std::transform(_module.begin(), _module.end(),
_module.begin(), ::tolower);
if (!_full_module.empty()) {
std::transform(_full_module.begin(), _full_module.end(),
_full_module.begin(), ::tolower);
}
}
// The consume/release fence makes the iteration outside lock see
// newly added VLogSite correctly.
VLogSite* next() { return (VLogSite*)butil::subtle::Acquire_Load(&_next); }
const VLogSite* next() const
{ return (VLogSite*)butil::subtle::Acquire_Load(&_next); }
void set_next(VLogSite* next)
{ butil::subtle::Release_Store(&_next, (butil::subtle::AtomicWord)next); }
int v() const { return _v; }
int& v() { return _v; }
int required_v() const { return _required_v; }
int line_no() const { return _line_no; }
const std::string& module() const { return _module; }
const std::string& full_module() const { return _full_module; }
private:
// Next site in the list. NULL means no next.
butil::subtle::AtomicWord _next;
// --vmodule > --v
int _v;
// vlog is on iff _v >= _required_v
int _required_v;
// line nubmer of the vlog.
int _line_no;
// Lowered, dirname & extname removed.
std::string _module;
// Lowered, extname removed. Empty when it equals to _module.
std::string _full_module;
};
// Written by Jack Handy
// <A href="mailto:jakkhandy@hotmail.com">jakkhandy@hotmail.com</A>
bool wildcmp(const char* wild, const char* str) {
const char* cp = NULL;
const char* mp = NULL;
while (*str && *wild != '*') {
if (*wild != *str && *wild != '?') {
return false;
}
++wild;
++str;
}
while (*str) {
if (*wild == '*') {
if (!*++wild) {
return true;
}
mp = wild;
cp = str+1;
} else if (*wild == *str || *wild == '?') {
++wild;
++str;
} else {
wild = mp;
str = cp++;
}
}
while (*wild == '*') {
++wild;
}
return !*wild;
}
struct VModuleList {
VModuleList() {}
int init(const char* vmodules) {
_exact_names.clear();
_wild_names.clear();
for (butil::StringSplitter sp(vmodules, ','); sp; ++sp) {
int verbose_level = std::numeric_limits<int>::max();
size_t off = 0;
for (; off < sp.length() && sp.field()[off] != '='; ++off) {}
if (off + 1 < sp.length()) {
verbose_level = strtol(sp.field() + off + 1, NULL, 10);
}
const char* name_begin = sp.field();
const char* name_end = sp.field() + off - 1;
for (; isspace(*name_begin) && name_begin < sp.field() + off;
++name_begin) {}
for (; isspace(*name_end) && name_end >= sp.field(); --name_end) {}
if (name_begin > name_end) { // only has spaces
continue;
}
std::string name(name_begin, name_end - name_begin + 1);
std::transform(name.begin(), name.end(), name.begin(), ::tolower);
if (name.find_first_of("*?") == std::string::npos) {
_exact_names[name] = verbose_level;
} else {
_wild_names.emplace_back(name, verbose_level);
}
}
// Reverse _wild_names so that latter wild cards override former ones.
if (!_wild_names.empty()) {
std::reverse(_wild_names.begin(), _wild_names.end());
}
return 0;
}
bool find_verbose_level(const std::string& module,
const std::string& full_module, int* v) const {
if (!_exact_names.empty()) {
std::map<std::string, int>::const_iterator
it = _exact_names.find(module);
if (it != _exact_names.end()) {
*v = it->second;
return true;
}
if (!full_module.empty()) {
it = _exact_names.find(full_module);
if (it != _exact_names.end()) {
*v = it->second;
return true;
}
}
}
for (size_t i = 0; i < _wild_names.size(); ++i) {
if (wildcmp(_wild_names[i].first.c_str(), module.c_str())) {
*v = _wild_names[i].second;
return true;
}
if (!full_module.empty() &&
wildcmp(_wild_names[i].first.c_str(), full_module.c_str())) {
*v = _wild_names[i].second;
return true;
}
}
return false;
}
void print(std::ostream& os) const {
os << "exact:";
for (std::map<std::string, int>::const_iterator
it = _exact_names.begin(); it != _exact_names.end(); ++it) {
os << ' ' << it->first << '=' << it->second;
}
os << ", wild:";
for (size_t i = 0; i < _wild_names.size(); ++i) {
os << ' ' << _wild_names[i].first << '=' << _wild_names[i].second;
}
}
private:
std::map<std::string, int> _exact_names;
std::vector<std::pair<std::string, int> > _wild_names;
};
// [ The idea ]
// Each callsite creates a VLogSite and inserts the site into singly-linked
// vlog_site_list. To keep the critical area small, we use optimistic
// locking : Assign local site w/o locking, then insert the site into
// global list w/ locking, if local_module_list != global_vmodule_list or
// local_default_v != FLAGS_v, repeat the assigment.
// An important property of vlog_site_list is that: It does not remove sites.
// When we need to iterate the list, we don't have to hold the lock. What we
// do is to get the head of the list inside lock and iterate the list w/o
// lock. If new sites is inserted during the iteration, it should see and
// use the updated vmodule_list and FLAGS_v, nothing will be missed.
static int vlog_site_list_add(VLogSite* site,
VModuleList** expected_module_list,
int* expected_default_v) {
BAIDU_SCOPED_LOCK(vlog_site_list_mutex);
if (vmodule_list != *expected_module_list) {
*expected_module_list = vmodule_list;
return -1;
}
if (*expected_default_v != FLAGS_v) {
*expected_default_v = FLAGS_v;
return -1;
}
site->set_next(vlog_site_list);
vlog_site_list = site;
return 0;
}
bool add_vlog_site(const int** v, const char* filename, int line_no,
int required_v) {
VLogSite* site = new (std::nothrow) VLogSite(filename, required_v, line_no);
if (site == NULL) {
return false;
}
VModuleList* module_list = vmodule_list;
int default_v = FLAGS_v;
do {
site->v() = default_v;
if (module_list) {
module_list->find_verbose_level(
site->module(), site->full_module(), &site->v());
}
} while (vlog_site_list_add(site, &module_list, &default_v) != 0);
*v = &site->v();
return site->v() >= required_v;
}
void print_vlog_sites(VLogSitePrinter* printer) {
VLogSite* head = NULL;
{
BAIDU_SCOPED_LOCK(vlog_site_list_mutex);
head = vlog_site_list;
}
VLogSitePrinter::Site site;
for (const VLogSite* p = head; p; p = p->next()) {
site.current_verbose_level = p->v();
site.required_verbose_level = p->required_v();
site.line_no = p->line_no();
site.full_module = p->full_module();
printer->print(site);
}
}
// [Thread-safe] Reset FLAGS_vmodule.
static int on_reset_vmodule(const char* vmodule) {
// resetting must be serialized.
BAIDU_SCOPED_LOCK(reset_vmodule_and_v_mutex);
VModuleList* module_list = new (std::nothrow) VModuleList;
if (NULL == module_list) {
LOG(FATAL) << "Fail to new VModuleList";
return -1;
}
if (module_list->init(vmodule) != 0) {
delete module_list;
LOG(FATAL) << "Fail to init VModuleList";
return -1;
}
VModuleList* old_module_list = NULL;
VLogSite* old_vlog_site_list = NULL;
{
{
BAIDU_SCOPED_LOCK(vlog_site_list_mutex);
old_module_list = vmodule_list;
vmodule_list = module_list;
old_vlog_site_list = vlog_site_list;
}
for (VLogSite* p = old_vlog_site_list; p; p = p->next()) {
p->v() = FLAGS_v;
module_list->find_verbose_level(
p->module(), p->full_module(), &p->v());
}
}
if (old_module_list) {
//delay the deletion.
if (NULL == deleting_vmodule_list) {
deleting_vmodule_list =
new std::deque<std::pair<VModuleList*, int64_t> >;
}
deleting_vmodule_list->push_back(
std::make_pair(old_module_list,
butil::gettimeofday_us() + DELAY_DELETION_SEC * 1000000L));
while (!deleting_vmodule_list->empty() &&
deleting_vmodule_list->front().second <= butil::gettimeofday_us()) {
delete deleting_vmodule_list->front().first;
deleting_vmodule_list->pop_front();
}
}
return 0;
}
static bool validate_vmodule(const char*, const std::string& vmodule) {
return on_reset_vmodule(vmodule.c_str()) == 0;
}
const bool ALLOW_UNUSED validate_vmodule_dummy = GFLAGS_NAMESPACE::RegisterFlagValidator(
&FLAGS_vmodule, &validate_vmodule);
// [Thread-safe] Reset FLAGS_v.
static void on_reset_verbose(int default_v) {
VModuleList* cur_module_list = NULL;
VLogSite* cur_vlog_site_list = NULL;
{
// resetting must be serialized.
BAIDU_SCOPED_LOCK(reset_vmodule_and_v_mutex);
{
BAIDU_SCOPED_LOCK(vlog_site_list_mutex);
cur_module_list = vmodule_list;
cur_vlog_site_list = vlog_site_list;
}
for (VLogSite* p = cur_vlog_site_list; p; p = p->next()) {
p->v() = default_v;
if (cur_module_list) {
cur_module_list->find_verbose_level(
p->module(), p->full_module(), &p->v());
}
}
}
}
static bool validate_v(const char*, int32_t v) {
on_reset_verbose(v);
return true;
}
BUTIL_VALIDATE_GFLAG(v, validate_v);
} // namespace logging
std::ostream& operator<<(std::ostream& out, const wchar_t* wstr) {
return out << butil::WideToUTF8(std::wstring(wstr));
}
#endif // BRPC_WITH_GLOG