- 07 Nov, 2017 1 commit
-
-
Kenton Varda authored
Improve stack trace accuracy by subtracting 1 from each return address.
-
- 06 Nov, 2017 3 commits
-
-
Kenton Varda authored
This should prevent stack traces from spurriously pointing at the line after the one where the call actually happened.
-
Kenton Varda authored
-
Kenton Varda authored
This leaks due to the old compiler bug: http://gcc.gnu.org/bugzilla/show_bug.cgi?id=33799 http://llvm.org/bugs/show_bug.cgi?id=12286
-
- 27 Oct, 2017 1 commit
-
-
Kenton Varda authored
Previously we only closed immediately after a response finished.
-
- 25 Oct, 2017 2 commits
-
-
Kenton Varda authored
Add TaskSet.onEmpty() to wait until all tasks have completed
-
Kenton Varda authored
Fixes #286.
-
- 24 Oct, 2017 1 commit
-
-
Kenton Varda authored
I intended to do this, like, 4 years ago.
-
- 23 Oct, 2017 3 commits
-
-
Kenton Varda authored
-
Kenton Varda authored
Revert "avoid passing invalid reference to Array<T> constructor"
-
Kenton Varda authored
-
- 14 Oct, 2017 1 commit
-
-
Kenton Varda authored
Memcpy null src
-
- 12 Oct, 2017 10 commits
-
-
Kenton Varda authored
Revert "Don't read past the end of the base64 decode out buffer."
-
Kenton Varda authored
-
Kenton Varda authored
Don't read past the end of the base64 decode out buffer.
-
Kenton Varda authored
Don't bind Header reference to a null pointer.
-
Kenton Varda authored
Variable-length arrays must have positive bound.
-
Edward Catmur authored
-
Edward Catmur authored
It is invalid to pass null as a pointer argument to memcpy/memcmp/memset, even if the count argument is zero: > Where an argument declared as size_t n specifies the length of the array for a function, n can have the value zero on a call to that function. Unless explicitly stated otherwise in the description of a particular function in this subclause, pointer arguments on such a call shall still have valid values [...] Detected by -fsanitize=nonnull-attribute.
-
Edward Catmur authored
If we finish decoding in step_a state, there is no current output character, so reading *plainchar will either be an uninitialized read or (if the output buffer is minimally sized) a past-the-end read. Detected by -fsanitize=address.
-
Edward Catmur authored
If recvData is empty, recvData.begin() is a null pointer and binding a Header reference to it is invalid. Detected by -fsanitize=null.
-
Edward Catmur authored
Detected by -fsanitize=vla-bound
-
- 03 Oct, 2017 2 commits
-
-
Kenton Varda authored
Generate ASLR-friendly numeric stack traces.
-
Kenton Varda authored
-
- 30 Sep, 2017 3 commits
-
-
Kenton Varda authored
Add Own<T>::attach() which is much like Promise<T>::attach()
-
Kenton Varda authored
-
Kenton Varda authored
-
- 26 Sep, 2017 2 commits
-
-
-
Kenton Varda authored
-
- 24 Sep, 2017 4 commits
-
-
Kenton Varda authored
-
Kenton Varda authored
-
Kenton Varda authored
-
Kenton Varda authored
We don't support any extensions currently, but it's important that when acting as a proxy, we don't pass through this header, since it could result in the client and server negotiating extensions that the proxy doesn't understand and will botch.
-
- 23 Sep, 2017 1 commit
-
-
Kenton Varda authored
-
- 22 Sep, 2017 6 commits
-
-
Kenton Varda authored
-
Kenton Varda authored
This is definitely wrong, because it makes the read/write tasks impossible to cancel and possibly makes them outlive the buffers they are reading from / writing to. I have no idea why I wrote the code this way, TBQH.
-
Kenton Varda authored
Don't reuse HTTP client connections if the previous request didn't read the entire response.
-
Kenton Varda authored
-
Kenton Varda authored
(Or if it didn't send the entire request body.)
-
Kenton Varda authored
This un-breaks code which previously relied upon an implicit cast from AutoCloseFd to int to call the non-ownership-passing versions of the methods.
-