Use a 64-bit mask for log domains, and fix a conflict

When we added LD_MESG, we created a conflict with the LD_NO_MOCK
flag.  We now need 64 bits for log domains in order to fix this
issue.

Fixes bug 31080; bugfix on 0.4.1.1-alpha.
This commit is contained in:
Nick Mathewson 2019-07-08 13:32:45 -04:00
parent d972f29d8d
commit 09c692e72b
4 changed files with 43 additions and 38 deletions

4
changes/bug31080_041 Normal file
View File

@ -0,0 +1,4 @@
o Minor bugfixes (logging):
- Fix a conflict between the flag used for messaging-domain
log messages, and the LD_NO_MOCK testing flag. Fixes bug 31080;
bugfix on 0.4.1.1-alpha.

View File

@ -115,7 +115,7 @@ clean_backtrace(void **stack, size_t depth, const ucontext_t *ctx)
* that with a backtrace log. Send messages via the tor_log function at
* logger". */
void
log_backtrace_impl(int severity, int domain, const char *msg,
log_backtrace_impl(int severity, uint64_t domain, const char *msg,
tor_log_fn logger)
{
size_t depth;
@ -240,7 +240,7 @@ remove_bt_handler(void)
#ifdef NO_BACKTRACE_IMPL
void
log_backtrace_impl(int severity, int domain, const char *msg,
log_backtrace_impl(int severity, uint64_t domain, const char *msg,
tor_log_fn logger)
{
logger(severity, domain, "%s. (Stack trace not available)", msg);

View File

@ -12,11 +12,12 @@
#include "orconfig.h"
#include "lib/cc/compat_compiler.h"
#include "lib/cc/torint.h"
typedef void (*tor_log_fn)(int, unsigned, const char *fmt, ...)
typedef void (*tor_log_fn)(int, uint64_t, const char *fmt, ...)
CHECK_PRINTF(3,4);
void log_backtrace_impl(int severity, int domain, const char *msg,
void log_backtrace_impl(int severity, uint64_t domain, const char *msg,
tor_log_fn logger);
int configure_backtrace_handler(const char *tor_version);
void clean_up_backtrace_handler(void);

View File

@ -56,82 +56,82 @@
/* Logging domains */
/** Catch-all for miscellaneous events and fatal errors. */
#define LD_GENERAL (1u<<0)
#define LD_GENERAL (UINT64_C(1)<<0)
/** The cryptography subsystem. */
#define LD_CRYPTO (1u<<1)
#define LD_CRYPTO (UINT64_C(1)<<1)
/** Networking. */
#define LD_NET (1u<<2)
#define LD_NET (UINT64_C(1)<<2)
/** Parsing and acting on our configuration. */
#define LD_CONFIG (1u<<3)
#define LD_CONFIG (UINT64_C(1)<<3)
/** Reading and writing from the filesystem. */
#define LD_FS (1u<<4)
#define LD_FS (UINT64_C(1)<<4)
/** Other servers' (non)compliance with the Tor protocol. */
#define LD_PROTOCOL (1u<<5)
#define LD_PROTOCOL (UINT64_C(1)<<5)
/** Memory management. */
#define LD_MM (1u<<6)
#define LD_MM (UINT64_C(1)<<6)
/** HTTP implementation. */
#define LD_HTTP (1u<<7)
#define LD_HTTP (UINT64_C(1)<<7)
/** Application (socks) requests. */
#define LD_APP (1u<<8)
#define LD_APP (UINT64_C(1)<<8)
/** Communication via the controller protocol. */
#define LD_CONTROL (1u<<9)
#define LD_CONTROL (UINT64_C(1)<<9)
/** Building, using, and managing circuits. */
#define LD_CIRC (1u<<10)
#define LD_CIRC (UINT64_C(1)<<10)
/** Hidden services. */
#define LD_REND (1u<<11)
#define LD_REND (UINT64_C(1)<<11)
/** Internal errors in this Tor process. */
#define LD_BUG (1u<<12)
#define LD_BUG (UINT64_C(1)<<12)
/** Learning and using information about Tor servers. */
#define LD_DIR (1u<<13)
#define LD_DIR (UINT64_C(1)<<13)
/** Learning and using information about Tor servers. */
#define LD_DIRSERV (1u<<14)
#define LD_DIRSERV (UINT64_C(1)<<14)
/** Onion routing protocol. */
#define LD_OR (1u<<15)
#define LD_OR (UINT64_C(1)<<15)
/** Generic edge-connection functionality. */
#define LD_EDGE (1u<<16)
#define LD_EDGE (UINT64_C(1)<<16)
#define LD_EXIT LD_EDGE
/** Bandwidth accounting. */
#define LD_ACCT (1u<<17)
#define LD_ACCT (UINT64_C(1)<<17)
/** Router history */
#define LD_HIST (1u<<18)
#define LD_HIST (UINT64_C(1)<<18)
/** OR handshaking */
#define LD_HANDSHAKE (1u<<19)
#define LD_HANDSHAKE (UINT64_C(1)<<19)
/** Heartbeat messages */
#define LD_HEARTBEAT (1u<<20)
#define LD_HEARTBEAT (UINT64_C(1)<<20)
/** Abstract channel_t code */
#define LD_CHANNEL (1u<<21)
#define LD_CHANNEL (UINT64_C(1)<<21)
/** Scheduler */
#define LD_SCHED (1u<<22)
#define LD_SCHED (UINT64_C(1)<<22)
/** Guard nodes */
#define LD_GUARD (1u<<23)
#define LD_GUARD (UINT64_C(1)<<23)
/** Generation and application of consensus diffs. */
#define LD_CONSDIFF (1u<<24)
#define LD_CONSDIFF (UINT64_C(1)<<24)
/** Denial of Service mitigation. */
#define LD_DOS (1u<<25)
#define LD_DOS (UINT64_C(1)<<25)
/** Processes */
#define LD_PROCESS (1u<<26)
#define LD_PROCESS (UINT64_C(1)<<26)
/** Pluggable Transports. */
#define LD_PT (1u<<27)
#define LD_PT (UINT64_C(1)<<27)
/** Bootstrap tracker. */
#define LD_BTRACK (1u<<28)
#define LD_BTRACK (UINT64_C(1)<<28)
/** Message-passing backend. */
#define LD_MESG (1u<<29)
#define LD_MESG (UINT64_C(1)<<29)
#define N_LOGGING_DOMAINS 30
#ifdef TOR_UNIT_TESTS
/** This log message should not be intercepted by mock_saving_logv */
#define LD_NO_MOCK (1u<<29)
#define LD_NO_MOCK (UINT64_C(1)<<61)
#endif
/** This log message is not safe to send to a callback-based logger
* immediately. Used as a flag, not a log domain. */
#define LD_NOCB (1u<<31)
#define LD_NOCB (UINT64_C(1)<<62)
/** This log message should not include a function name, even if it otherwise
* would. Used as a flag, not a log domain. */
#define LD_NOFUNCNAME (1u<<30)
#define LD_NOFUNCNAME (UINT64_C(1)<<63)
/** Mask of zero or more log domains, OR'd together. */
typedef uint32_t log_domain_mask_t;
typedef uint64_t log_domain_mask_t;
/** Configures which severities are logged for each logging domain for a given
* log target. */