- Oct 06, 2021
-
-
David Goulet authored
Closes #40469 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Closes #40474 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Closes #40474 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Oct 05, 2021
-
-
David Goulet authored
Coverity report: CID 1492322 ________________________________________________________________________________________________________ *** CID 1492322: Integer handling issues (OVERFLOW_BEFORE_WIDEN) /src/core/or/congestion_control_flow.c: 399 in circuit_process_stream_xon() 393 } 394 395 log_info(LD_EDGE, "Got XON: %d", xon->kbps_ewma); 396 397 /* Adjust the token bucket of this edge connection with the drain rate in 398 * the XON. Rate is in bytes from kilobit (kpbs). */ >>> CID 1492322: Integer handling issues (OVERFLOW_BEFORE_WIDEN) >>> Potentially overflowing expression "xon_cell_get_kbps_ewma(xon) * 1000U" with type "unsigned int" (32 bits, unsigned) is evaluated using 32-bit arithmetic, and then used in a context that expects an expression of type "uint64_t" (64 bits, unsigned). 399 uint64_t rate = xon_cell_get_kbps_ewma(xon) * 1000; 400 if (rate == 0 || INT32_MAX < rate) { 401 /* No rate. */ 402 rate = INT32_MAX; 403 } 404 token_bucket_rw_adjust(&conn->bucket, (uint32_t) rate, (uint32_t) rate); Fixes #40478 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Oct 04, 2021
-
-
Fixes issue #22469 where port strings such as '0x00' get accepted, not because the string gets converted to hex, but because the string is silently truncated past the invalid character 'x'. This also causes issues for strings such as '0x01-0x02' which look like a hex port range, but in reality gets truncated to '0', which is definitely not what a user intends. Warn and reject such port strings as invalid. Also, since we're throwing that "malformed port" warning a lot in the function, wrap it up in a nice goto. Fixes #22469
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Closes #40450 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
This allows us to have quicker reaction to blocked orconns as a congestion signal.
-
-
Tuning these may reduce memory usage and latency.
-
This will assist tuning of CircEWMA in Shadow and Live.
-
Since we no longer use stream SENDMEs for congestion control, we must now use time to decide when data should stop arriving on a half-closed stream.
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
-
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
We only need to rate limit reading on edges for flow control, as per the rate that comes in the XON from the other side. When we rate limit reading from the edge source to this rate, we will only deliver that fast to the other side, thus satisfying its rate request. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
-
- Sep 28, 2021
-
-
Mike Perry authored
-
Mike Perry authored
Monotime clock functionality is a global property, and flow control also needs to know if it can trust the clock.
-
Mike Perry authored
-
Simon South authored
-
Simon South authored
Allow conditional compilation based on whether the "--enable-coverage" configure option was specified.
-
Simon South authored
When building with --enable-fragile-hardening, add or relax Linux seccomp rules to allow AddressSanitizer to execute normally if the process terminates with the sandbox active. Further resolves issue 11477.
-
- Sep 27, 2021
-
-
Simon South authored
Allow conditional compilation based on whether the "--enable-fragile-hardening" configure option was specified.
-
- Sep 17, 2021
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
- Sep 16, 2021
-
-
Nick Mathewson authored
-
- Sep 15, 2021
-
-
skaluzka authored
Add few missing periods, convert tabs to spaces. No new significant content added. Signed-off-by:
skaluzka <skaluzka@protonmail.com>
-
- Sep 14, 2021
-
-
Neel Chauhan authored
-