[or-cvs] r10014: backport r9918: - Fix a memory leak when we ask for "all" ne (in tor/branches/tor-0_1_2-patches: . src/or)

arma at seul.org arma at seul.org
Tue Apr 24 05:04:25 UTC 2007


Author: arma
Date: 2007-04-24 01:04:21 -0400 (Tue, 24 Apr 2007)
New Revision: 10014

Modified:
   tor/branches/tor-0_1_2-patches/ChangeLog
   tor/branches/tor-0_1_2-patches/src/or/routerlist.c
Log:
backport r9918:
- Fix a memory leak when we ask for "all" networkstatuses and we
  get one we don't recognize.


Modified: tor/branches/tor-0_1_2-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_1_2-patches/ChangeLog	2007-04-24 01:26:13 UTC (rev 10013)
+++ tor/branches/tor-0_1_2-patches/ChangeLog	2007-04-24 05:04:21 UTC (rev 10014)
@@ -1,3 +1,11 @@
+Changes in version 0.1.2.13 - 2007-04-24
+  o Minor fixes:
+    - Fix a memory leak when we ask for "all" networkstatuses and we
+      get one we don't recognize.
+    - Add more asserts to hunt down bug 417.
+    - Disable kqueue on OS X 10.3 and earlier, to fix bug 371.
+
+
 Changes in version 0.1.2.12-rc - 2007-03-16
   o Major bugfixes:
     - Fix an infinite loop introduced in 0.1.2.7-alpha when we serve
@@ -410,7 +418,7 @@
 
   o Minor features (directory):
     - Authorities now specify server versions in networkstatus. This adds
-      about 2% to the side of compressed networkstatus docs, and allows
+      about 2% to the size of compressed networkstatus docs, and allows
       clients to tell which servers support BEGIN_DIR and which don't.
       The implementation is forward-compatible with a proposed future
       protocol version scheme not tied to Tor versions.

Modified: tor/branches/tor-0_1_2-patches/src/or/routerlist.c
===================================================================
--- tor/branches/tor-0_1_2-patches/src/or/routerlist.c	2007-04-24 01:26:13 UTC (rev 10013)
+++ tor/branches/tor-0_1_2-patches/src/or/routerlist.c	2007-04-24 05:04:21 UTC (rev 10014)
@@ -2490,9 +2490,9 @@
     if (smartlist_string_isin(requested_fingerprints, fp)) {
       smartlist_string_remove(requested_fingerprints, fp);
     } else {
-      char *requested =
-        smartlist_join_strings(requested_fingerprints," ",0,NULL);
       if (source != NS_FROM_DIR_ALL) {
+        char *requested =
+          smartlist_join_strings(requested_fingerprints," ",0,NULL);
         log_warn(LD_DIR,
                "We received a network status with a fingerprint (%s) that we "
                "never requested. (We asked for: %s.) Dropping.",



More information about the tor-commits mailing list