Fix (most) lintChanges warnings on master.

This commit is contained in:
Nick Mathewson 2016-03-21 11:14:57 -04:00
parent 3a547076b6
commit 52bc921402
14 changed files with 22 additions and 19 deletions

View File

@ -1,4 +1,4 @@
o Minor bugfixes (sandbox): o Minor bugfixes (sandbox):
- Allow the setrlimit syscall, and the prlimit and prlimit64 syscalls, - Allow the setrlimit syscall, and the prlimit and prlimit64 syscalls,
which some libc implementations which some libc implementations
use under the hood. Fixes bug 15221. Bugfix on 0.2.5.1-alpha. use under the hood. Fixes bug 15221; bugfix on 0.2.5.1-alpha.

View File

@ -1,7 +1,7 @@
o Minor bug fix (hidden service client): o Minor bugfixes (hidden service client):
- Seven very fast consecutive requests to the same .onion address - Seven very fast consecutive requests to the same .onion address
triggers 7 descriptor fetches. The first six each pick a directory triggers 7 descriptor fetches. The first six each pick a directory
(there are 6 overall) and the seventh one wasn't able to pick one (there are 6 overall) and the seventh one wasn't able to pick one
which was triggering a close on all current directory connections. It which was triggering a close on all current directory connections. It
has been fixed by not closing them if we have pending directory fetch. has been fixed by not closing them if we have pending directory fetch.
Fixes #15937; Bugfix on tor-0.2.7.1-alpha. Fixes bug 15937; bugfix on tor-0.2.7.1-alpha.

View File

@ -1,4 +1,4 @@
o Minor feature (hidden service, control port) o Minor bugfixes (hidden service, control port):
- Add the onion address to the HS_DESC event for the UPLOADED action - Add the onion address to the HS_DESC event for the UPLOADED action
both on success or failure. It was previously hardcoded with UNKNOWN. both on success or failure. It was previously hardcoded with UNKNOWN.
Fixes #16023; Fixes bug 16023; bugfix on 0.2.7.2-alpha.

View File

@ -1,5 +1,5 @@
o Major bugfixes (dns proxy mode, crash): o Major bugfixes (dns proxy mode, crash):
- Avoid crashing when running as a DNS proxy. Closes bug 16248; bugfix on - Avoid crashing when running as a DNS proxy. Fixes bug 16248; bugfix on
0.2.0.1-alpha. Patch from 'cypherpunks'. 0.2.0.1-alpha. Patch from 'cypherpunks'.
o Minor features (bug-resistance): o Minor features (bug-resistance):

View File

@ -1,4 +1,4 @@
o Minor bugfixes: o Minor bugfixes (client):
- Count receipt of new microdescriptors as progress towards - Count receipt of new microdescriptors as progress towards
bootstrapping. Now, when a user who has set EntryNodes finishes bootstrapping. Now, when a user who has set EntryNodes finishes
bootstrapping, Tor automatically repopulates the guard set based bootstrapping, Tor automatically repopulates the guard set based

View File

@ -1,4 +1,5 @@
o Minor bugfixes: o Minor bugfixes (directory):
- When generating a URL for a directory server on an IPv6 address, - When generating a URL for a directory server on an IPv6 address,
wrap the IPv6 address in square brackets. Fixes bug 18051; wrap the IPv6 address in square brackets. Fixes bug 18051;
bugfix on ?. Patch from Malek. bugfix on 0.2.3.9-alpha. Patch from Malek.

View File

@ -1,3 +1,4 @@
o Major bugfixes: o Major bugfixes (crash on shutdown):
- Correctly handle detaching circuits from cmuxes when doing - Correctly handle detaching circuits from cmuxes when doing
circuit_free_all() on shutdown again; fixes bug #18116. circuit_free_all() on shutdown. Fixes bug 18116; bugfix on
0.2.8.1-alpha.

View File

@ -1,4 +1,4 @@
o Removed platform support: o New system requirements:
- Tor no longer attempts to support platforms where the "time_t" type - Tor no longer attempts to support platforms where the "time_t" type
is unsigned. (To the best of our knowledge, only OpenVMS does this, is unsigned. (To the best of our knowledge, only OpenVMS does this,
and Tor has never actually built on OpenVMS.) Closes ticket 18184. and Tor has never actually built on OpenVMS.) Closes ticket 18184.

View File

@ -1,5 +1,5 @@
o Minor bug fixes (exit policies, security): o Minor bugfixes (exit policies, security):
- Refresh an exit relay's exit policy when interface addresses change. - Refresh an exit relay's exit policy when interface addresses change.
Previously, tor only refreshed the exit policy when the configured Previously, tor only refreshed the exit policy when the configured
external address changed. external address changed.
Closes ticket 18208 on tor 0.2.7.3. Patch by "teor". Fixes bug 18208; bugfix on tor 0.2.7.3. Patch by "teor".

View File

@ -1,4 +1,4 @@
o Major bug fixes (relays, bridge clients): o Major bugfixes (relays, bridge clients):
- Ensure relays always allow IPv4 OR and Dir connections. - Ensure relays always allow IPv4 OR and Dir connections.
Ensure bridge clients use the address configured in the bridge line. Ensure bridge clients use the address configured in the bridge line.
Fixes bug 18348; bugfix on 0.2.8.1-alpha. Fixes bug 18348; bugfix on 0.2.8.1-alpha.

View File

@ -1,4 +1,4 @@
o Minor features: o Minor features (unix domain sockets):
- Since some operating systems do not consider the actual modes on a - Since some operating systems do not consider the actual modes on a
UNIX domain socket itself, tor does not allow creating such a UNIX domain socket itself, tor does not allow creating such a
socket in a directory that is group or world accessible if it is socket in a directory that is group or world accessible if it is
@ -6,4 +6,4 @@
accessible sockets in a world accessible directory. accessible sockets in a world accessible directory.
However, on some operating systems this is unnecessary, so However, on some operating systems this is unnecessary, so
add a per-socket option called RelaxDirModeCheck. add a per-socket option called RelaxDirModeCheck.
Fixes bug 18458. Patch by weasel. Closes ticket 18458. Patch by weasel.

View File

@ -1,4 +1,4 @@
o Removed code: o Removed features:
- We no longer maintain an internal freelist in memarea.c. Allocators - We no longer maintain an internal freelist in memarea.c. Allocators
should be good enough to make this code unnecessary, and it's doubtful should be good enough to make this code unnecessary, and it's doubtful
that it ever had any performance benefit. that it ever had any performance benefit.

View File

@ -1,5 +1,5 @@
o Minor bugfixes (code correctness): o Minor bugfixes (code correctness):
- Update to the latest version of Trunnel, which tries harder - Update to the latest version of Trunnel, which tries harder
to avoid generating code that can invoke memcpy(p,NULL,0). to avoid generating code that can invoke memcpy(p,NULL,0).
Bug found by clang address sanitizer. Fixes bug 18373. Bugfix Bug found by clang address sanitizer. Fixes bug 18373; bugfix
on 0.2.7.2-alpha. on 0.2.7.2-alpha.

View File

@ -16,6 +16,7 @@ KNOWN_GROUPS=set([
"Minor features", "Minor features",
"Major feature", "Major feature",
"Major features", "Major features",
"New system requirements",
"Testing", "Testing",
"Documentation", "Documentation",
"Code simplification and refactoring", "Code simplification and refactoring",