1 ////////////////////////////////////////////////////////////////////
4 // E V E N T L O G G I N G F U N C T I O N S
7 ////////////////////////////////////////////////////////////////////
14 #include <WINNT/afsreg.h>
16 #include "afsd_eventlog.h"
18 static BOOL GetServicePath(LPTSTR lpPathBuf, PDWORD pdwPathBufSize);
19 static BOOL AddEventSource(void);
22 GetServicePath(LPTSTR lpPathBuf, PDWORD pdwPathBufSize)
30 if ( RegOpenKeyEx( HKEY_LOCAL_MACHINE, AFSREG_CLT_SVC_SUBKEY, 0, KEY_QUERY_VALUE, &hKey ) )
36 // prepare user's buffer and read into it
37 dwData = *pdwPathBufSize;
38 memset(lpPathBuf, '\0', dwData);
39 if ( RegQueryValueEx( hKey, // handle to key
40 "ImagePath", // value name
43 (LPBYTE) lpPathBuf, // data buffer
44 &dwData)) // size of data buffer
50 *pdwPathBufSize = dwData;
61 // Ensure name for message file is in proper location in Registry.
66 HKEY hKey = NULL, hLogKey;
67 UCHAR szBuf[MAX_PATH];
68 DWORD dwData, dwDisposition;
72 if ( RegOpenKeyEx( HKEY_LOCAL_MACHINE, AFSREG_APPLOG_SUBKEY, 0,
73 KEY_QUERY_VALUE, &hLogKey ) )
76 if ( RegCreateKeyEx(HKEY_LOCAL_MACHINE, AFSREG_APPLOG_SUBKEY, 0,
77 NULL, REG_OPTION_NON_VOLATILE,
78 KEY_ALL_ACCESS, NULL, &hLogKey,
86 // Let's see if key already exists as a subkey under the
87 // Application key in the EventLog registry key. If not,
89 if ( RegOpenKeyEx( hLogKey, AFSREG_CLT_APPLOG_SUBKEY, 0,
90 KEY_QUERY_VALUE, &hKey ) )
93 if ( RegCreateKeyEx(hLogKey, AFSREG_CLT_APPLOG_SUBKEY, 0,
94 NULL, REG_OPTION_NON_VOLATILE,
95 KEY_ALL_ACCESS, NULL, &hKey,
102 // Set the name of the message file
103 // Get "ImagePath" from TransarcAFSDaemon service
104 memset(szBuf, '\0', MAX_PATH);
106 GetServicePath(szBuf, &dwData);
108 // Add the name to the EventMessageFile subkey.
109 if ( RegSetValueEx( hKey, // subkey handle
110 AFSREG_APPLOG_MSGFILE_VALUE, // value name
112 REG_EXPAND_SZ, // value type
113 (LPBYTE) szBuf, // pointer to value data
114 (DWORD)strlen(szBuf) + 1)) // length of value data
120 // Set the supported event types in the TypesSupported subkey.
121 dwData = EVENTLOG_ERROR_TYPE | EVENTLOG_WARNING_TYPE |
122 EVENTLOG_INFORMATION_TYPE;
124 if ( RegSetValueEx( hKey, // subkey handle
125 AFSREG_APPLOG_MSGTYPE_VALUE, // value name
127 REG_DWORD, // value type
128 (LPBYTE) &dwData, // pointer to value data
129 sizeof(DWORD))) // length of value data
137 // key was opened - read it
138 memset(szBuf, '\0', MAX_PATH);
140 if ( RegQueryValueEx( hKey, // handle to key
141 AFSREG_APPLOG_MSGFILE_VALUE, // value name
144 (LPBYTE) szBuf, // data buffer
145 &dwData)) // size of data buffer
157 RegCloseKey(hLogKey);
162 // Log an event with a formatted system message as the (only) substitution
163 // string, from the given message ID.
165 LogEventMessage(WORD wEventType, DWORD dwEventID, DWORD dwMessageID)
169 FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_ALLOCATE_BUFFER,
170 NULL, dwMessageID, 0, (LPTSTR)&msgBuf, 0, NULL);
171 LogEvent(wEventType, dwEventID, msgBuf, NULL);
176 // Use the ReportEvent API to write an entry to the system event log.
181 LogEvent(WORD wEventType, DWORD dwEventID, ...)
185 LPTSTR lpArgs[MAXARGS];
186 CHAR lpStrings[MAXARGS][STRLEN];
188 WORD wNumStrings = 0;
191 // Ensure that our event source is properly initialized.
192 if (!AddEventSource())
195 // Get a handle to the event log.
196 hEventSource = RegisterEventSource(NULL, AFS_DAEMON_EVENT_NAME);
197 if (hEventSource == NULL)
200 // Construct the array of substitution strings.
201 va_start(listArgs, dwEventID);
203 switch ( dwEventID ) {
204 case MSG_FLUSH_NO_SHARE_NAME:
205 case MSG_FLUSH_NO_MEMORY:
206 case MSG_FLUSH_IMPERSONATE_ERROR:
207 case MSG_FLUSH_UNEXPECTED_EVENT:
208 case MSG_UNHANDLED_EXCEPTION:
209 case MSG_SMB_ZERO_TRANSACTION_COUNT:
210 case MSG_SERVICE_START_PENDING:
211 case MSG_SERVICE_INCORRECT_VERSIONS:
212 case MSG_SERVICE_RUNNING:
213 case MSG_SERVICE_STOPPING:
214 case MSG_SERVICE_ERROR_STOP:
218 case MSG_FLUSH_BAD_SHARE_NAME:
219 case MSG_FLUSH_OPEN_ENUM_ERROR:
220 case MSG_FLUSH_ENUM_ERROR:
221 case MSG_FLUSH_FAILED:
222 case MSG_RX_HARD_DEAD_TIME_EXCEEDED:
223 case MSG_SERVICE_ERROR_STOP_WITH_MSG:
224 case MSG_SMB_SEND_PACKET_FAILURE:
225 case MSG_UNEXPECTED_SMB_SESSION_CLOSE:
227 lpArgs[0] = va_arg(listArgs, LPTSTR);
229 case MSG_TIME_FLUSH_PER_VOLUME:
230 case MSG_TIME_FLUSH_TOTAL:
232 lpArgs[0] = va_arg(listArgs, LPTSTR);
233 lpArgs[1] = va_arg(listArgs, LPTSTR);
235 case MSG_SERVER_REPORTS_VNOVOL:
236 case MSG_SERVER_REPORTS_VMOVED:
237 case MSG_SERVER_REPORTS_VOFFLINE:
238 case MSG_SERVER_REPORTS_VSALVAGE:
239 case MSG_SERVER_REPORTS_VNOSERVICE:
240 case MSG_SERVER_REPORTS_VIO:
242 lpArgs[0] = va_arg(listArgs, LPTSTR);
243 StringCbPrintf(lpStrings[1],STRLEN,"%d",va_arg(listArgs,afs_int32));
244 lpArgs[1] = lpStrings[1];
246 case MSG_BAD_SMB_PARAM:
248 lpArgs[0] = va_arg(listArgs, LPTSTR);
249 StringCbPrintf(lpStrings[1],STRLEN,"%d",va_arg(listArgs,int));
250 StringCbPrintf(lpStrings[2],STRLEN,"%d",va_arg(listArgs,int));
251 StringCbPrintf(lpStrings[3],STRLEN,"%d",va_arg(listArgs,int));
252 StringCbPrintf(lpStrings[4],STRLEN,"%d",va_arg(listArgs,WORD));
253 lpArgs[1] = lpStrings[1];
254 lpArgs[2] = lpStrings[2];
255 lpArgs[3] = lpStrings[3];
256 lpArgs[4] = lpStrings[4];
258 case MSG_BAD_SMB_PARAM_WITH_OFFSET:
260 lpArgs[0] = va_arg(listArgs, LPTSTR);
261 StringCbPrintf(lpStrings[1],STRLEN,"%d",va_arg(listArgs,int));
262 StringCbPrintf(lpStrings[2],STRLEN,"%d",va_arg(listArgs,int));
263 StringCbPrintf(lpStrings[3],STRLEN,"%d",va_arg(listArgs,int));
264 StringCbPrintf(lpStrings[4],STRLEN,"%d",va_arg(listArgs,int));
265 StringCbPrintf(lpStrings[5],STRLEN,"%d",va_arg(listArgs,WORD));
266 lpArgs[1] = lpStrings[1];
267 lpArgs[2] = lpStrings[2];
268 lpArgs[3] = lpStrings[3];
269 lpArgs[4] = lpStrings[4];
270 lpArgs[5] = lpStrings[5];
272 case MSG_BAD_SMB_TOO_SHORT:
273 case MSG_BAD_SMB_INVALID:
274 case MSG_BAD_SMB_INCOMPLETE:
276 StringCbPrintf(lpStrings[0],STRLEN,"%d",va_arg(listArgs,WORD));
277 lpArgs[0] = lpStrings[0];
279 case MSG_SMB_SESSION_START:
281 StringCbPrintf(lpStrings[0],STRLEN,"%d",va_arg(listArgs,long));
282 lpArgs[0] = lpStrings[0];
284 case MSG_BAD_SMB_WRONG_SESSION:
286 StringCbPrintf(lpStrings[0],STRLEN,"%d",va_arg(listArgs,DWORD));
287 StringCbPrintf(lpStrings[1],STRLEN,"%d",va_arg(listArgs,WORD));
288 lpArgs[0] = lpStrings[0];
289 lpArgs[1] = lpStrings[1];
293 StringCbPrintf(lpStrings[0],STRLEN,"%d",va_arg(listArgs,UCHAR));
294 StringCbPrintf(lpStrings[1],STRLEN,"%d",va_arg(listArgs,UCHAR));
295 StringCbPrintf(lpStrings[2],STRLEN,"%d",va_arg(listArgs,UCHAR));
296 StringCbPrintf(lpStrings[3],STRLEN,"%d",va_arg(listArgs,UCHAR));
297 lpArgs[0] = lpStrings[0];
298 lpArgs[1] = lpStrings[1];
299 lpArgs[2] = lpStrings[2];
300 lpArgs[3] = lpStrings[3];
302 case MSG_SERVICE_ERROR_STOP_WITH_MSG_AND_LOCATION:
304 lpArgs[0] = va_arg(listArgs, LPTSTR);
305 StringCbPrintf(lpStrings[1],STRLEN,"%d",va_arg(listArgs,int));
306 lpArgs[1] = lpStrings[1];
307 lpArgs[2] = va_arg(listArgs,LPTSTR);
312 // Make sure we were not given too many args.
313 if (wNumArgs >= MAXARGS)
317 code = ReportEvent(hEventSource, // handle of event source
318 wEventType, // event type
320 dwEventID, // event ID
321 NULL, // current user's SID
322 wNumArgs, // strings in lpszArgs
323 0, // no bytes of raw data
324 wNumArgs ? lpArgs : NULL, // array of error strings
325 NULL); // no raw data
328 DeregisterEventSource(hEventSource);