mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-30 23:53:32 +01:00
Merge remote-tracking branch 'public/bug12985_024' into bug12984_025
This commit is contained in:
commit
b0138cd055
4
changes/bug12985
Normal file
4
changes/bug12985
Normal file
@ -0,0 +1,4 @@
|
||||
o Minor bugfixes (shutdown):
|
||||
- When shutting down, always call event_del() on lingering read or
|
||||
write events before freeing them. Fixes bug 12985; bugfix on
|
||||
0.1.0.2-rc.
|
@ -146,13 +146,25 @@ tor_evsignal_new(struct event_base * base, int sig,
|
||||
{
|
||||
return tor_event_new(base, sig, EV_SIGNAL|EV_PERSIST, cb, arg);
|
||||
}
|
||||
/** Work-alike replacement for event_free() on pre-Libevent-2.0 systems. */
|
||||
/** Work-alike replacement for event_free() on pre-Libevent-2.0 systems,
|
||||
* except tolerate tor_event_free(NULL). */
|
||||
void
|
||||
tor_event_free(struct event *ev)
|
||||
{
|
||||
if (ev == NULL)
|
||||
return;
|
||||
event_del(ev);
|
||||
tor_free(ev);
|
||||
}
|
||||
#else
|
||||
/* Wrapper for event_free() that tolerates tor_event_free(NULL) */
|
||||
void
|
||||
tor_event_free(struct event *ev)
|
||||
{
|
||||
if (ev == NULL)
|
||||
return;
|
||||
event_free(ev);
|
||||
}
|
||||
#endif
|
||||
|
||||
/** Global event base for use by the main thread. */
|
||||
|
@ -28,11 +28,9 @@ void suppress_libevent_log_msg(const char *msg);
|
||||
#define tor_event_new event_new
|
||||
#define tor_evtimer_new evtimer_new
|
||||
#define tor_evsignal_new evsignal_new
|
||||
#define tor_event_free event_free
|
||||
#define tor_evdns_add_server_port(sock, tcp, cb, data) \
|
||||
evdns_add_server_port_with_base(tor_libevent_get_base(), \
|
||||
(sock),(tcp),(cb),(data));
|
||||
|
||||
#else
|
||||
struct event *tor_event_new(struct event_base * base, evutil_socket_t sock,
|
||||
short what, void (*cb)(evutil_socket_t, short, void *), void *arg);
|
||||
@ -40,10 +38,11 @@ struct event *tor_evtimer_new(struct event_base * base,
|
||||
void (*cb)(evutil_socket_t, short, void *), void *arg);
|
||||
struct event *tor_evsignal_new(struct event_base * base, int sig,
|
||||
void (*cb)(evutil_socket_t, short, void *), void *arg);
|
||||
void tor_event_free(struct event *ev);
|
||||
#define tor_evdns_add_server_port evdns_add_server_port
|
||||
#endif
|
||||
|
||||
void tor_event_free(struct event *ev);
|
||||
|
||||
typedef struct periodic_timer_t periodic_timer_t;
|
||||
|
||||
periodic_timer_t *periodic_timer_new(struct event_base *base,
|
||||
|
@ -575,8 +575,17 @@ connection_free_(connection_t *conn)
|
||||
tor_free(control_conn->incoming_cmd);
|
||||
}
|
||||
|
||||
tor_free(conn->read_event); /* Probably already freed by connection_free. */
|
||||
tor_free(conn->write_event); /* Probably already freed by connection_free. */
|
||||
#ifdef TOR_IS_MULTITHREADED
|
||||
/* Probably already freed by connection_free. */
|
||||
/* We don't do these frees on the multiprocess case, since in that case we
|
||||
* don't want to call event_del() postfork or it's likely to mess up.
|
||||
* Multiprocess builds are deprecated, so let's just have a one-time memory
|
||||
* leak here.
|
||||
*/
|
||||
tor_event_free(conn->read_event);
|
||||
tor_event_free(conn->write_event);
|
||||
conn->read_event = conn->write_event = NULL;
|
||||
#endif
|
||||
IF_HAS_BUFFEREVENT(conn, {
|
||||
/* This was a workaround to handle bugs in some old versions of libevent
|
||||
* where callbacks can occur after calling bufferevent_free(). Setting
|
||||
|
Loading…
Reference in New Issue
Block a user