Age | Commit message (Collapse) | Author |
|
|
|
Found by coverity scan; this is CID 1362983
|
|
|
|
|
|
|
|
This also fixes an issue where bridge clients may have found a
routerstatus for a directory mirror, and connected to it directly.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Also, a const.
|
|
|
|
|
|
|
|
sandbox_init() runs rather late in the startup process
|
|
startup too
|
|
|
|
|
|
|
|
gcc warnings
|
|
descriptors at startup
|
|
|
|
|
|
overflows in the loop in dump_desc_fifo_add_and_clean()
|
|
|
|
|
|
|
|
|
|
|
|
bump-to-head-of-queue for repeated unparseable descriptors, rename config variable
|
|
bug 18322
|
|
|
|
|
|
Some compilers are smart enough to work out that comparisons to
LONG_MAX are a no-op on L64.
|
|
|
|
|
|
Validate that tv_usec inputs to tv_udiff and tv_mdiff are in range.
Do internal calculations in tv_udiff and tv_mdiff in 64-bit,
which makes the function less prone to integer overflow,
particularly on platforms where long and time_t are 32-bit,
but tv_sec is 64-bit, like some BSD configurations.
Check every addition and subtraction that could overflow.
|