dbus/dbus dbus-connection.c, 1.130, 1.131 dbus-keyring.c, 1.32, 1.33 dbus-pending-call.c, 1.19, 1.20 dbus-server.c, 1.44, 1.45 dbus-sysdeps-unix.c, 1.1, 1.2 dbus-sysdeps-util-unix.c, 1.2, 1.3 dbus-sysdeps.c, 1.112, 1.113

John Palmieri johnp at kemper.freedesktop.org
Mon Sep 11 10:41:23 PDT 2006


Update of /cvs/dbus/dbus/dbus
In directory kemper:/tmp/cvs-serv13440/dbus

Modified Files:
	dbus-connection.c dbus-keyring.c dbus-pending-call.c 
	dbus-server.c dbus-sysdeps-unix.c dbus-sysdeps-util-unix.c 
	dbus-sysdeps.c 
Log Message:
* remove a bunch of todo items from the 1.0 list


Index: dbus-connection.c
===================================================================
RCS file: /cvs/dbus/dbus/dbus/dbus-connection.c,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -d -r1.130 -r1.131
--- dbus-connection.c	8 Sep 2006 17:21:37 -0000	1.130
+++ dbus-connection.c	11 Sep 2006 17:41:21 -0000	1.131
@@ -446,8 +446,6 @@
  * @param connection the connection.
  * @param link the list node and message to queue.
  *
- * @todo 1.0? This needs to wake up the mainloop if it is in
- * a poll/select and this is a multithreaded app.
  */
 void
 _dbus_connection_queue_synthesized_message_link (DBusConnection *connection,

Index: dbus-keyring.c
===================================================================
RCS file: /cvs/dbus/dbus/dbus/dbus-keyring.c,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -d -r1.32 -r1.33
--- dbus-keyring.c	6 Sep 2006 00:14:06 -0000	1.32
+++ dbus-keyring.c	11 Sep 2006 17:41:21 -0000	1.33
@@ -44,7 +44,7 @@
  * by a single server instance for a fixed period of time, then
  * discarded). Also, the keys are not sent over the wire.
  *
- * @todo 1.0? there's a memory leak on some codepath in here, I saw it once
+ * @todo there's a memory leak on some codepath in here, I saw it once
  * when running make check - probably some specific initial cookies
  * present in the cookie file, then depending on what we do with them.
  */

Index: dbus-pending-call.c
===================================================================
RCS file: /cvs/dbus/dbus/dbus/dbus-pending-call.c,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -d -r1.19 -r1.20
--- dbus-pending-call.c	6 Sep 2006 00:14:06 -0000	1.19
+++ dbus-pending-call.c	11 Sep 2006 17:41:21 -0000	1.20
@@ -624,8 +624,9 @@
  * If the pending call is already completed, this function returns
  * immediately.
  *
- * @todo 1.0? when you start blocking, the timeout is reset, but it should
+ * @todo when you start blocking, the timeout is reset, but it should
  * really only use time remaining since the pending call was created.
+ * This requires storing timestamps instead of intervals in the timeout
  *
  * @param pending the pending call
  */

Index: dbus-server.c
===================================================================
RCS file: /cvs/dbus/dbus/dbus/dbus-server.c,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -d -r1.44 -r1.45
--- dbus-server.c	6 Sep 2006 00:14:06 -0000	1.44
+++ dbus-server.c	11 Sep 2006 17:41:21 -0000	1.45
@@ -558,13 +558,6 @@
                   goto out;
                 }
               
-              /* FIXME 1.0 - we will unconditionally unlink() the path if
-               * we don't support abstract namespace.  unlink() does
-               * not follow symlinks, but would like independent
-               * confirmation this is safe enough. See also
-               * _dbus_listen_unix_socket() and comments therein.
-               */
-
               /* Always use abstract namespace if possible with tmpdir */
               
               server =

Index: dbus-sysdeps-unix.c
===================================================================
RCS file: /cvs/dbus/dbus/dbus/dbus-sysdeps-unix.c,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -d -r1.1 -r1.2
--- dbus-sysdeps-unix.c	10 Sep 2006 21:37:10 -0000	1.1
+++ dbus-sysdeps-unix.c	11 Sep 2006 17:41:21 -0000	1.2
@@ -455,7 +455,7 @@
     }
   else
     {
-      /* FIXME discussed security implications of this with Nalin,
+      /* Discussed security implications of this with Nalin,
        * and we couldn't think of where it would kick our ass, but
        * it still seems a bit sucky. It also has non-security suckage;
        * really we'd prefer to exit if the socket is already in use.

Index: dbus-sysdeps-util-unix.c
===================================================================
RCS file: /cvs/dbus/dbus/dbus/dbus-sysdeps-util-unix.c,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -d -r1.2 -r1.3
--- dbus-sysdeps-util-unix.c	6 Sep 2006 00:14:06 -0000	1.2
+++ dbus-sysdeps-util-unix.c	11 Sep 2006 17:41:21 -0000	1.3
@@ -252,7 +252,8 @@
   /* setgroups() only works if we are a privileged process,
    * so we don't return error on failure; the only possible
    * failure is that we don't have perms to do it.
-   * FIXME 1.0 not sure this is right, maybe if setuid()
+   *
+   * not sure this is right, maybe if setuid()
    * is going to work then setgroups() should also work.
    */
   if (setgroups (0, NULL) < 0)

Index: dbus-sysdeps.c
===================================================================
RCS file: /cvs/dbus/dbus/dbus/dbus-sysdeps.c,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -d -r1.112 -r1.113
--- dbus-sysdeps.c	10 Sep 2006 21:37:10 -0000	1.112
+++ dbus-sysdeps.c	11 Sep 2006 17:41:21 -0000	1.113
@@ -75,8 +75,10 @@
  * Wrapper for setenv(). If the value is #NULL, unsets
  * the environment variable.
  *
- * @todo 1.0 if someone can verify it's safe, we could avoid the
- * memleak when doing an unset.
+ * There is an unfixable memleak in that it is unsafe to
+ * free memory malloced for use with setenv. This is because
+ * we can not rely on internal implementation details of
+ * the underlying libc library.
  *
  * @param varname name of environment variable
  * @param value value of environment variable



More information about the dbus-commit mailing list