- Sep 18, 2017
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
David Goulet authored
It is highly unlikely to happen but if so, we need to know and why. The warning with the next_run values could help. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
When the KIST schedule() is called, it computes a diff value between the last scheduler run and the current monotonic time. If tha value is below the run interval, the libevent even is updated else the event is run. It turned out that casting to int32_t the returned int64_t value for the very first scheduler run (which is set to 0) was creating an overflow on the 32 bit value leading to adding the event with a gigantic usec value. The scheduler was simply never running for a while. First of all, a BUG() is added for a diff value < 0 because if the time is really monotonic, we should never have a now time that is lower than the last scheduler run time. And we will try to recover with a diff value to 0. Second, the diff value is changed to int64_t so we avoid this "bootstrap overflow" and future casting overflow problems. Fixes #23558 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This is an "ours" merge to avoid the conflict from the 0.2.8 version of the fix for TROVE-2017-008.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Fixes bug 23490; bugfix on 0.2.7.2-alpha. TROVE-2017-008 CVE-2017-0380
-
Nick Mathewson authored
Fixes bug 23490; bugfix on 0.2.7.2-alpha. TROVE-2017-008 CVE-2017-0380
-
Nick Mathewson authored
This was introduced in 4ff170d7, and is probably unreachable, but coverity complained about it (CID 1417761). Bug not in any released Tor, so no changes file.
-
Nick Mathewson authored
- Sep 15, 2017
-
-
Nick Mathewson authored
So, remove it.
-
Nick Mathewson authored
I don't know where these came from.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Resolve conflict with 23532 code.
-
Nick Mathewson authored
-
Nick Mathewson authored
Otherwise integer overflows can happen. Remember, doing a i32xi32 multiply doesn't actually produce a 64-bit output. You need to do i64xi32 or i64xi64. Coverity found this as CID 1417753
-
Nick Mathewson authored
-
Nick Mathewson authored
Catalyst points out that using pw_uid for two different purposes here is likely to be confusing.
-
Nick Mathewson authored
-