commit 162a3984a3e1c069c366676cc7fdd0d4bc8a0586
Author: Nicolas Vigier <boklm(a)torproject.org>
Date: Tue Mar 29 17:27:41 2016 +0200
Bug 18127: fix base-vm file name when using KVM
The base-vm file name is different if we are using LXC or KVM.
---
gitian/make-vms.sh | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/gitian/make-vms.sh b/gitian/make-vms.sh
index 554cc27..089865b 100755
--- a/gitian/make-vms.sh
+++ b/gitian/make-vms.sh
@@ -25,7 +25,8 @@ …
[View More]build_and_test_vm() {
local arch="$1"; shift
local bits="$1"; shift
- if [ ! -f ./base-$dist-$arch ];
+ if [ "z$USE_LXC" = "z1" -a ! -f ./base-$dist-$arch ] \
+ || [ "z$USE_LXC" != "z1" -a ! -f ./base-$dist-$arch.qcow2 ];
then
if [ "z$USE_LXC" = "z1" ];
then
[View Less]
commit bd87d37a861c541afbeb660b4d8dd62df14d5b45
Author: Andrea Shepard <andrea(a)torproject.org>
Date: Tue Mar 15 07:40:19 2016 +0000
Make sure channel_t queues its own copy of incoming cells
---
src/or/channel.c | 38 ++++++++++++++++++++++++++++++++++----
src/or/channeltls.c | 11 +++++++++++
src/or/connection_or.c | 35 +++++++++++++++++++++++++++++++++++
src/or/connection_or.h | 1 +
4 files changed, 81 insertions(+), 4 deletions(-)
diff --git a/src/or/channel.c b/…
[View More]src/or/channel.c
index 21522a5..62a21be 100644
--- a/src/or/channel.c
+++ b/src/or/channel.c
@@ -2652,6 +2652,11 @@ channel_process_cells(channel_t *chan)
/*
* Process cells until we're done or find one we have no current handler
* for.
+ *
+ * We must free the cells here after calling the handler, since custody
+ * of the buffer was given to the channel layer when they were queued;
+ * see comments on memory management in channel_queue_cell() and in
+ * channel_queue_var_cell() below.
*/
while (NULL != (q = TOR_SIMPLEQ_FIRST(&chan->incoming_queue))) {
tor_assert(q);
@@ -2669,6 +2674,7 @@ channel_process_cells(channel_t *chan)
q->u.fixed.cell, chan,
U64_PRINTF_ARG(chan->global_identifier));
chan->cell_handler(chan, q->u.fixed.cell);
+ tor_free(q->u.fixed.cell);
tor_free(q);
} else if (q->type == CELL_QUEUE_VAR &&
chan->var_cell_handler) {
@@ -2681,6 +2687,7 @@ channel_process_cells(channel_t *chan)
q->u.var.var_cell, chan,
U64_PRINTF_ARG(chan->global_identifier));
chan->var_cell_handler(chan, q->u.var.var_cell);
+ tor_free(q->u.var.var_cell);
tor_free(q);
} else {
/* Can't handle this one */
@@ -2701,6 +2708,7 @@ channel_queue_cell(channel_t *chan, cell_t *cell)
{
int need_to_queue = 0;
cell_queue_entry_t *q;
+ cell_t *cell_copy = NULL;
tor_assert(chan);
tor_assert(cell);
@@ -2728,8 +2736,19 @@ channel_queue_cell(channel_t *chan, cell_t *cell)
U64_PRINTF_ARG(chan->global_identifier));
chan->cell_handler(chan, cell);
} else {
- /* Otherwise queue it and then process the queue if possible. */
- q = cell_queue_entry_new_fixed(cell);
+ /*
+ * Otherwise queue it and then process the queue if possible.
+ *
+ * We queue a copy, not the original pointer - it might have been on the
+ * stack in connection_or_process_cells_from_inbuf() (or another caller
+ * if we ever have a subclass other than channel_tls_t), or be freed
+ * there after we return. This is the uncommon case; the non-copying
+ * fast path occurs in the if (!need_to_queue) case above when the
+ * upper layer has installed cell handlers.
+ */
+ cell_copy = tor_malloc_zero(sizeof(cell_t));
+ memcpy(cell_copy, cell, sizeof(cell_t));
+ q = cell_queue_entry_new_fixed(cell_copy);
log_debug(LD_CHANNEL,
"Queueing incoming cell_t %p for channel %p "
"(global ID " U64_FORMAT ")",
@@ -2755,6 +2774,7 @@ channel_queue_var_cell(channel_t *chan, var_cell_t *var_cell)
{
int need_to_queue = 0;
cell_queue_entry_t *q;
+ var_cell_t *cell_copy = NULL;
tor_assert(chan);
tor_assert(var_cell);
@@ -2783,8 +2803,18 @@ channel_queue_var_cell(channel_t *chan, var_cell_t *var_cell)
U64_PRINTF_ARG(chan->global_identifier));
chan->var_cell_handler(chan, var_cell);
} else {
- /* Otherwise queue it and then process the queue if possible. */
- q = cell_queue_entry_new_var(var_cell);
+ /*
+ * Otherwise queue it and then process the queue if possible.
+ *
+ * We queue a copy, not the original pointer - it might have been on the
+ * stack in connection_or_process_cells_from_inbuf() (or another caller
+ * if we ever have a subclass other than channel_tls_t), or be freed
+ * there after we return. This is the uncommon case; the non-copying
+ * fast path occurs in the if (!need_to_queue) case above when the
+ * upper layer has installed cell handlers.
+ */
+ cell_copy = var_cell_copy(var_cell);
+ q = cell_queue_entry_new_var(cell_copy);
log_debug(LD_CHANNEL,
"Queueing incoming var_cell_t %p for channel %p "
"(global ID " U64_FORMAT ")",
diff --git a/src/or/channeltls.c b/src/or/channeltls.c
index c90f569..2a84514 100644
--- a/src/or/channeltls.c
+++ b/src/or/channeltls.c
@@ -1009,6 +1009,11 @@ channel_tls_time_process_cell(cell_t *cell, channel_tls_t *chan, int *time,
* for cell types specific to the handshake for this transport protocol and
* handles them, and queues all other cells to the channel_t layer, which
* eventually will hand them off to command.c.
+ *
+ * The channel layer itself decides whether the cell should be queued or
+ * can be handed off immediately to the upper-layer code. It is responsible
+ * for copying in the case that it queues; we merely pass pointers through
+ * which we get from connection_or_process_cells_from_inbuf().
*/
void
@@ -1106,6 +1111,12 @@ channel_tls_handle_cell(cell_t *cell, or_connection_t *conn)
* related and live below the channel_t layer, so no variable-length
* cells ever get delivered in the current implementation, but I've left
* the mechanism in place for future use.
+ *
+ * If we were handing them off to the upper layer, the channel_t queueing
+ * code would be responsible for memory management, and we'd just be passing
+ * pointers through from connection_or_process_cells_from_inbuf(). That
+ * caller always frees them after this function returns, so this function
+ * should never free var_cell.
*/
void
diff --git a/src/or/connection_or.c b/src/or/connection_or.c
index a967c93..9944494 100644
--- a/src/or/connection_or.c
+++ b/src/or/connection_or.c
@@ -488,6 +488,28 @@ var_cell_new(uint16_t payload_len)
return cell;
}
+/**
+ * Copy a var_cell_t
+ */
+
+var_cell_t *
+var_cell_copy(const var_cell_t *src)
+{
+ var_cell_t *copy = NULL;
+ size_t size = 0;
+
+ if (src != NULL) {
+ size = STRUCT_OFFSET(var_cell_t, payload) + src->payload_len;
+ copy = tor_malloc_zero(size);
+ copy->payload_len = src->payload_len;
+ copy->command = src->command;
+ copy->circ_id = src->circ_id;
+ memcpy(copy->payload, src->payload, copy->payload_len);
+ }
+
+ return copy;
+}
+
/** Release all space held by <b>cell</b>. */
void
var_cell_free(var_cell_t *cell)
@@ -2060,6 +2082,19 @@ connection_or_process_cells_from_inbuf(or_connection_t *conn)
{
var_cell_t *var_cell;
+ /*
+ * Note on memory management for incoming cells: below the channel layer,
+ * we shouldn't need to consider its internal queueing/copying logic. It
+ * is safe to pass cells to it on the stack or on the heap, but in the
+ * latter case we must be sure we free them later.
+ *
+ * The incoming cell queue code in channel.c will (in the common case)
+ * decide it can pass them to the upper layer immediately, in which case
+ * those functions may run directly on the cell pointers we pass here, or
+ * it may decide to queue them, in which case it will allocate its own
+ * buffer and copy the cell.
+ */
+
while (1) {
log_debug(LD_OR,
TOR_SOCKET_T_FORMAT": starting, inbuf_datalen %d "
diff --git a/src/or/connection_or.h b/src/or/connection_or.h
index 3877fd5..0bd8567 100644
--- a/src/or/connection_or.h
+++ b/src/or/connection_or.h
@@ -97,6 +97,7 @@ void cell_pack(packed_cell_t *dest, const cell_t *src, int wide_circ_ids);
int var_cell_pack_header(const var_cell_t *cell, char *hdr_out,
int wide_circ_ids);
var_cell_t *var_cell_new(uint16_t payload_len);
+var_cell_t *var_cell_copy(const var_cell_t *src);
void var_cell_free(var_cell_t *cell);
/** DOCDOC */
[View Less]
commit 72ebf4160412f64fb6ae0cd97dd89d01d89c075a
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Mon Mar 21 10:19:07 2016 -0400
changes file for bug18570
---
changes/bug18570 | 7 +++++++
1 file changed, 7 insertions(+)
diff --git a/changes/bug18570 b/changes/bug18570
new file mode 100644
index 0000000..04f72f4
--- /dev/null
+++ b/changes/bug18570
@@ -0,0 +1,7 @@
+ o Minor bugfixes (correctness):
+ - Fix a bad memory handling bug that would occur if we had queued
+ …
[View More]a cell on a channel's incoming queue. Fortunately, we can't actually
+ queue a cell like that as our code is constructed today, but it's best
+ to avoid this kind of error, even if there isn't any code that triggers
+ it today. Fixes bug 18570; bugfix on 0.2.4.4-alpha.
+
[View Less]
commit 93c311daa8e7fd7021efbf3e58c1b66a3e791666
Author: Roger Dingledine <arma(a)torproject.org>
Date: Tue Mar 29 10:57:01 2016 -0400
majority of four is, alas, three
---
doc/HACKING/ReleasingTor.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/doc/HACKING/ReleasingTor.md b/doc/HACKING/ReleasingTor.md
index 85f3ba8..5cfd238 100644
--- a/doc/HACKING/ReleasingTor.md
+++ b/doc/HACKING/ReleasingTor.md
@@ -6,7 +6,7 @@ Here are the steps Roger takes when putting …
[View More]out a new Tor release:
=== 0. Preliminaries
-1. Get at least two of weasel/arma/Sebastian/Sina to put the new
+1. Get at least three of weasel/arma/Sebastian/Sina to put the new
version number in their approved versions list.
[View Less]
commit 1103d8249253889a270bc0891d1cad9647da65dd
Author: Roger Dingledine <arma(a)torproject.org>
Date: Tue Mar 29 10:56:26 2016 -0400
fix typo in comment
---
src/or/onion.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/or/onion.c b/src/or/onion.c
index d6ef367..4bed7ae 100644
--- a/src/or/onion.c
+++ b/src/or/onion.c
@@ -527,7 +527,7 @@ onion_skin_server_handshake(int type,
* <b>rend_authenticator_out</b> to the "KH" field that can be used …
[View More]to
* establish introduction points at this hop, and return 0. On failure,
* return -1, and set *msg_out to an error message if this is worth
- * complaining to the usre about. */
+ * complaining to the user about. */
int
onion_skin_client_handshake(int type,
const onion_handshake_state_t *handshake_state,
[View Less]
commit e79da62645925f3286deb21740bbe91de9dafacc
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Fri Mar 11 10:33:19 2016 -0500
If we start/stop reading on a dnsserv connection, don't assert.
Fixes bug 16248. Patch from cypherpunks. Bugfix on 0.2.0.1-alpha.
---
src/or/main.c | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/src/or/main.c b/src/or/main.c
index 534a6ac..3fb80e1 100644
--- a/src/or/main.c
+++ b/src/or/main.c
@@ -578,6 +578,12 @@ …
[View More]connection_stop_reading,(connection_t *conn))
return;
});
+ /* if dummy conn then no socket and no event, nothing to do here */
+ if (conn->type == CONN_TYPE_AP && TO_EDGE_CONN(conn)->is_dns_request) {
+ tor_assert(!conn->read_event);
+ return;
+ }
+
tor_assert(conn->read_event);
if (conn->linked) {
@@ -603,6 +609,12 @@ connection_start_reading,(connection_t *conn))
return;
});
+ /* if dummy conn then no socket and no event, nothing to do here */
+ if (conn->type == CONN_TYPE_AP && TO_EDGE_CONN(conn)->is_dns_request) {
+ tor_assert(!conn->read_event);
+ return;
+ }
+
tor_assert(conn->read_event);
if (conn->linked) {
[View Less]