Branch :
| Author | Commit | Date | CI | Message |
|---|---|---|---|---|
| 80faee9f | 2015-05-13 00:52:40 | Update README.md | ||
| ad4a897a | 2015-05-13 00:51:07 | Update README.md | ||
| a2b2e1e6 | 2015-05-13 00:49:08 | Update README.md | ||
| 37453aba | 2015-05-12 15:43:03 | Update travis config for status updates | ||
| 0dfa5dc6 | 2015-05-12 15:33:26 | Update README.md | ||
| 1cc2e295 | 2015-05-12 00:27:01 | Use autotools for appveyor until cmake is fixed. | ||
| e84e269b | 2015-05-11 22:53:05 | Commented out a WIN32 threading / timing test for now - seems as if windows has some time scale issues which I am looking into. For now I am commenting out the regression test until it is fixed. | ||
| 37bb3f9f | 2015-05-11 16:27:15 | Merge pull request #241 from ellzey/21_fix_appveyor_ssl_link Fix download link for appveyor SSL | ||
| 107d565d | 2015-05-11 12:47:40 | Fix the link for appveyor OpenSSL installer (WIN32) * change and move the openssl self installer off to a site we own - the old link was 404, probably due to being replaced with a newer non-vuln version. But since we are only using this installer to auto-build with on appveyor (not as a release), then having a file we don't change and own seems to be a better solution. * reduce verbosity | ||
| f1b3a1e0 | 2015-05-09 02:44:13 | Merge pull request #242 from ellzey/pullRequest118 expose bufferevent_incref/decref (with fewer modifications) | ||
| 1ed6718d | 2015-05-06 14:56:31 | expose bufferevent_incref/decref (with fewer modifications) | ||
| a695a720 | 2015-04-27 22:43:04 | Fix potential fd leak in listener_read_cb() As pointed out by harlan_ in #libevent after running a coverity sweep. If the listener is free'd, 'new_fd' is never closed. | ||
| 6e7a580c | 2015-03-24 17:45:52 | tab | ||
| 38cef641 | 2015-03-24 17:29:40 | fix the return value of event_deferred_cb_schedule_ | ||
| 31c6d45f | 2015-02-17 12:37:30 | Merge pull request #220 from miniupnp/fix_warnings Fix warnings | ||
| 0c7f2178 | 2015-02-16 23:42:54 | Fix mixed declarations and code (forbidden by ISO C90) | ||
| 746d2c50 | 2015-02-16 23:41:53 | Fix "function declaration isn’t a prototype" add "void" to argument list | ||
| d59113a4 | 2015-02-05 15:24:55 | Merge pull request #214 from JoakimSoderberg/appveyor Forgot to install OpenSSL for appveyor | ||
| 26164a56 | 2015-02-05 20:21:04 | Forgot to install OpenSSL for appveyor | ||
| 874ea871 | 2015-02-05 13:37:24 | Merge pull request #117 from JoakimSoderberg/appveyor Add support for appveyor.com windows CI | ||
| 5f89c37e | 2015-02-05 19:24:19 | Add support for appveyor.com windows CI This does the same thing as Travis-CI but for windows. @nmathewson Go to: https://ci.appveyor.com/login -> Login using Github Click **+New Project** -> Choose **Github** to the left -> Find **Libevent** in the list and click **Add** | ||
| deca354c | 2015-02-05 12:14:16 | Merge pull request #116 from JoakimSoderberg/fix_build_tree_cmake_config This fixes a bug introduced in 27bd9faf498b91923296cc91643e03ec4055c230 | ||
| 19ba4543 | 2015-02-05 00:56:58 | This fixes a bug introduced in 27bd9faf498b91923296cc91643e03ec4055c230 CMake configuration files are intended to be used by other projects to find the library. Specifically the CMake find_package command can use it to find all files related to the project. The idea is to support 2 different CMake configuration files for Libevent. One if you simply build libevent that is generated for the build tree. And a second one that is generated for an install target that will be installed on the system and point to where on the system the lib files and such can be find. So for instance, in the build tree the config would set the cmake variable `LIBEVENT_INCLUDE_DIRS` to `/path/to/libevent/build/include`. And for the system config it would be set to `/usr/local/include` (or whatever target the user chose when running cmake). 27bd9faf498b91923296cc91643e03ec4055c230 changed this behavior so that both configs would point to the system wide path `/usr/local/include` This meant that projects just wanting to import directly for the build tree would fail. | ||
| a77a82a0 | 2015-02-04 08:37:32 | Merge remote-tracking branch 'azat/be-pair-fix-freeing-shared-lock-v5' | ||
| 51821e20 | 2015-02-04 08:33:42 | Merge pull request #207 from azat/avoid-leaking-of-event_debug_map_HT_GROW Avoid leaking of event_debug_map_HT_GROW | ||
| 4472ec68 | 2015-02-03 15:57:31 | Merge pull request #212 from xbao/master changed strtotimeval signature to avoid conflict with Android NDK sys/time.h header (#211) | ||
| 1cae3ae1 | 2015-02-02 13:57:50 | Merge remote-tracking branch 'public/master' | ||
| 537177d3 | 2015-02-02 13:57:22 | New function to get address for nameserver. | ||
| bdbc823f | 2015-01-28 17:17:02 | changed strtotimeval signature as per #211 | ||
| 62eaa889 | 2015-01-27 10:07:22 | Merge pull request #210 from mc-server/master Added cmake-generated files to ignore list. | ||
| 6c12bfec | 2015-01-27 15:30:52 | Added cmake-generated files to ignore list. These are generated by cmake on Windows with MSVC. | ||
| a558fcdb | 2015-01-26 00:31:23 | be_pair/regress: cover use of shared lock (lock/unlock/free) For more info look at 92a359ee3adf4636db508e6c6d7179d4d59eaafc ("be_pair: release shared lock with the latest of bufferevent_pair") | ||
| e5c87d18 | 2015-01-26 00:29:15 | event_free_debug_globals_locks(): disable lock debugging This will allow to use library event after event_free_debug_globals_locks()/libevent_global_shutdown() without invalid read/write's. | ||
| ccc55937 | 2015-01-26 00:28:46 | evthread: evthreadimpl_disable_lock_debugging_() for libevent_global_shutdown() | ||
| c0b34f6f | 2015-01-26 00:27:41 | evthread: add evthread_get_{lock,condition}_callbacks() helpers | ||
| 92a359ee | 2015-01-03 19:37:15 | be_pair: release shared lock with the latest of bufferevent_pair Then next code sample will use free'd lock: evthread_use_pthreads(); ... assert(!bufferevent_pair_new(base, BEV_OPT_THREADSAFE, pair)); ... bufferevent_free(pair[0]); # refcnt == 0 -> unlink bufferevent_free(pair[1]); # refcnt == 0 -> unlink ... event_base_free() -> finalizers -> EVTHREAD_FREE_LOCK(bev1->lock) -> BEV_LOCK(bev2->lock) <-- *already freed* While if you will reverse the order: bufferevent_free(pair[1]); # refcnt == 0 -> unlink bufferevent_free(pair[0]); # refcnt == 0 -> unlink ... event_base_free() -> finalizers -> BEV_LOCK(bev2->lock)/!own_lock/BEV_UNLOCK(bev2->lock) -> EVTHREAD_FREE_LOCK(bev1->lock) (own_lock) It is ok now, but I guess that it will be better to relax order of freeing pairs. | ||
| 4d66552a | 2015-01-22 12:15:01 | Merge pull request #115 from jer-gentoo/master EVBUFFER_PTR_SET -> EVBUFFER_PTR_ADD | ||
| 8674e4fb | 2015-01-21 11:24:23 | EVBUFFER_PTR_SET -> EVBUFFER_PTR_ADD Looks like EVBUFFER_PTR_ADD should have been used instead of EVBUFFER_PTR_SET. | ||
| 3540a193 | 2015-01-08 04:45:49 | regress_dns: drop hack for event_debug_map_HT_GROW in leak tests | ||
| 941faaed | 2015-01-08 04:45:27 | event: call event_disable_debug_mode() in libevent_global_shutdown() This will avoid leaking of event_debug_map_HT_GROW I buildin it into libevent_glboal_shutdown() because event_disable_debug_mode() -> event_free_debug_globals() -> event_free_debug_globals_locks() will clean event_debug_map_lock_ that used in event_disable_debug_mode(). | ||
| 597c7b25 | 2015-01-08 04:43:37 | ht-internal: don't reset hth_table_length explicitly in name_##HT_CLEAR name_##HT_CLEAR calls name_##HT_INIT that reset hth_table_length to 0. | ||
| 0b49ae34 | 2015-01-05 09:33:48 | Update changelog | ||
| 2c827e76 | 2015-01-05 09:33:02 | Merge branch '21_cve_2014_6272_v2' | ||
| 841ecbd9 | 2015-01-05 09:32:53 | Fix CVE-2014-6272 in Libevent 2.1 For this fix, we need to make sure that passing too-large inputs to the evbuffer functions can't make us do bad things with the heap. Also, lower the maximum chunk size to the lower of off_t, size_t maximum. This is necessary since otherwise we could get into an infinite loop if we make a chunk that 'misalign' cannot index into. | ||
| 683f5568 | 2015-01-05 09:16:12 | Increment version to 2.1.5-beta | ||
| 0eb39194 | 2015-01-05 08:50:30 | work on changelog for 2.1.5-alpah | ||
| 8a29f3b3 | 2015-01-04 10:27:02 | Merge pull request #201 from nsuke/cmake-shared-build Fix CMake shared library build | ||
| e69d9109 | 2015-01-03 02:22:31 | Fix CMake shared library build This fixes following problems in shared library build: * visibility=hidden was not enabled for gcc because of incorrect variable name * test programs that need internal APIs caused link errors | ||
| f05a0d53 | 2014-12-23 09:35:40 | Merge pull request #197 from JohnOhl/fix-clang-compile-warnings Fix warnings when compiling with clang 3.5 | ||
| f5b47657 | 2014-12-22 00:46:56 | Fix warnings when compiling with clang 3.5 | ||
| cb737041 | 2014-12-15 12:50:11 | Fix annoying heisenbug in test-time.c | ||
| 37df827a | 2014-12-08 10:26:01 | Merge pull request #192 from miniupnp/master Fix mixed declarations and code (forbidden by ISO C90) | ||
| 8afbdbc4 | 2014-12-08 10:21:00 | Fix mixed declarations and code (forbidden by ISO C90) | ||
| f2645f80 | 2014-11-19 12:18:05 | Implement new/free for struct evutil_monotonic_timer and export monotonic time functions | ||
| 6ae44b5d | 2014-12-01 08:32:23 | Merge remote-tracking branch 'origin/patches-2.0' | ||
| fb7e76ae | 2014-11-30 11:05:40 | Fix evbuffer_peek() with len==-1 and start_at non-NULL. | ||
| 37145c56 | 2014-11-30 21:07:55 | Merge remote-tracking branch 'public/patches-2.0' Conflicts: ChangeLog event.c | ||
| 1da2f42b | 2014-11-30 21:02:25 | Merge branch 'patches-2.0' of github.com:libevent/libevent into patches-2.0 | ||
| d9469d39 | 2014-11-30 21:02:06 | Start on 2.1.5-alpha/beta changelog | ||
| 5ae52872 | 2014-11-30 19:38:23 | Work on the changelog for 2.0.22 | ||
| 7fd49414 | 2014-11-30 19:26:20 | Merge remote-tracking branch 'origin/pr/182' | ||
| 23133cac | 2014-11-30 19:25:21 | Merge remote-tracking branch 'origin/pr/180' | ||
| 3c7d6fca | 2014-09-22 12:19:37 | Fix race caused by event_active There is a race between manual event_active and natural event activation. If both happen at the same time on the same FD, they would both be protected by the same event base lock except for 1 LoC where the fields of struct event are read without any kind of lock. This commit does those reads into local variables inside the lock and then invokes the callback with those local arguments outside the lock. In 2.0-stable, none of this is inside the lock; in HEAD, only the callback is read inside the lock. This gets the callback and all 3 arguments inside the lock before calling it outside the lock. | ||
| c51c85d3 | 2014-11-30 11:11:33 | Merge remote-tracking branch 'origin/pr/175' | ||
| a5d43cf4 | 2014-11-30 11:09:50 | Merge branch 'evbufer_peek_fix_v3' | ||
| 154006ad | 2014-11-30 11:09:28 | More evbuffer_peek() test cases | ||
| e2d139dd | 2014-11-11 14:25:47 | test/evbuffer_peek: add regress in case we have first buffer greater | ||
| ba59923a | 2014-11-30 11:05:40 | Fix evbuffer_peek() with len==-1 and start_at non-NULL. | ||
| 4f360f89 | 2014-11-30 10:23:39 | Merge remote-tracking branch 'origin/pr/186' | ||
| befbd130 | 2014-09-20 15:25:53 | Fix cmake error when the Module path has more than one entry. CMAKE_MODULE_PATH is usually a list instead of single entry. Especially for projects contain sub cmake projects. My patch replace the CMAKE_MODULE_PATH with fixed path, to locate the `.in` file. | ||
| 5ebad45e | 2014-11-24 01:09:13 | Merge pull request #189 from azat/be_async-avoid-doule-close be async: avoid double close() | ||
| f133b869 | 2014-11-21 09:00:12 | be async: avoid double close() In case when between this two close (close(F), close(F)) some open() will be executed, than we will close newly opened fd. Reported-by: xujiezhige@163.com | ||
| 10fe4ef3 | 2014-11-16 23:40:16 | Prevent duplicate event_del on fd | ||
| 61262a0f | 2014-11-12 20:16:18 | evdns: avoid read-after-free in evdns_request_timeout_callback() In evdns_request_timeout_callback() in case we a giving up, we call request_finished() which will free() req structure, however we ns from it to fail it, so save pointer to ns to call nameserver_failed() on them. Founded with valgrind: $ valgrind regress dns/retry ==10497== Memcheck, a memory error detector ==10497== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==10497== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info ==10497== Command: regress dns/retry ==10497== dns/retry: [forking] ==10498== Invalid read of size 8 ==10498== at 0x4C309D: evdns_request_timeout_callback (evdns.c:2179) ==10498== by 0x49EA95: event_process_active_single_queue (event.c:1576) ==10498== by 0x49EFDD: event_process_active (event.c:1668) ==10498== by 0x49F6DD: event_base_loop (event.c:1891) ==10498== by 0x49F063: event_base_dispatch (event.c:1702) ==10498== by 0x44C7F1: dns_retry_test_impl (regress_dns.c:724) ==10498== by 0x44CF60: dns_retry_test (regress_dns.c:749) ==10498== by 0x48A8A1: testcase_run_bare_ (tinytest.c:105) ==10498== by 0x48A94E: testcase_run_forked_ (tinytest.c:189) ==10498== by 0x48AB73: testcase_run_one (tinytest.c:247) ==10498== by 0x48B4C2: tinytest_main (tinytest.c:434) ==10498== by 0x477FC7: main (regress_main.c:459) ==10498== Address 0x6176ef8 is 40 bytes inside a block of size 342 free'd ==10498== at 0x4C29E90: free (vg_replace_malloc.c:473) ==10498== by 0x4A4411: event_mm_free_ (event.c:3443) ==10498== by 0x4BE8C5: request_finished (evdns.c:702) ==10498== by 0x4C3098: evdns_request_timeout_callback (evdns.c:2178) ==10498== by 0x49EA95: event_process_active_single_queue (event.c:1576) ==10498== by 0x49EFDD: event_process_active (event.c:1668) ==10498== by 0x49F6DD: event_base_loop (event.c:1891) ==10498== by 0x49F063: event_base_dispatch (event.c:1702) ==10498== by 0x44C7F1: dns_retry_test_impl (regress_dns.c:724) ==10498== by 0x44CF60: dns_retry_test (regress_dns.c:749) ==10498== by 0x48A8A1: testcase_run_bare_ (tinytest.c:105) ==10498== by 0x48A94E: testcase_run_forked_ (tinytest.c:189) ==10498== ==10498== ==10498== HEAP SUMMARY: ==10498== in use at exit: 0 bytes in 0 blocks ==10498== total heap usage: 83 allocs, 83 frees, 10,020 bytes allocated ==10498== ==10498== All heap blocks were freed -- no leaks are possible ==10498== ==10498== For counts of detected and suppressed errors, rerun with: -v ==10498== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) OK 1 tests ok. (0 skipped) ==10497== ==10497== HEAP SUMMARY: ==10497== in use at exit: 0 bytes in 0 blocks ==10497== total heap usage: 3 allocs, 3 frees, 96 bytes allocated ==10497== ==10497== All heap blocks were freed -- no leaks are possible ==10497== ==10497== For counts of detected and suppressed errors, rerun with: -v ==10497== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) Bug was introduced in 97c750d6602517f22a1100f16592b421c38f2a45 ("evdns: fail ns after we are failing/retrasmitting request"). | ||
| b0e99244 | 2014-10-29 03:40:44 | Add test for evhttp_connection_free_on_completion | ||
| 2b9ec4c1 | 2014-10-26 01:18:10 | Implement interface that provides the ability to have an outbound evhttp_connection free itself once all requests have completed | ||
| b361b8a6 | 2014-10-16 22:56:49 | remove trailing comma from enum makes being included from something with -std=c89 happy | ||
| 6dba1694 | 2014-10-13 17:59:32 | Merge pull request #179 from pysiak/master Provide support for SO_REUSEPORT through LEV_OPT_REUSABLE_PORT | ||
| b625361a | 2014-10-13 17:28:14 | Provide support for SO_REUSEPORT through LEV_OPT_REUSABLE_PORT | ||
| c750c704 | 2014-10-09 11:48:38 | Merge pull request #174 from azat/dns-fail-disable-when-inactive-fix-v3 Dns fail disable when inactive fix v3 | ||
| e69f3908 | 2014-10-09 11:30:01 | Merge pull request #171 from azat/bufferevent-openssl-fixes-v4 bufferevent_openssl: reset fd_is_set when setfd with -1 is called | ||
| 2e2d18bc | 2014-10-09 11:29:17 | Merge pull request #170 from azat/https-client-retries https-client: add -retries argument, for connection retries | ||
| 163df09b | 2014-10-09 10:42:20 | Merge pull request #108 from JoakimSoderberg/minor_issues Fix compilation for older OpenSSL versions. | ||
| 0fb71c35 | 2014-10-09 10:14:30 | Merge remote-tracking branch 'origin/patches-2.0' | ||
| be1aeff2 | 2014-10-09 10:14:12 | Fix a typo in a doxygen comment. Reported by 亦得. | ||
| bc79cc5c | 2014-09-27 21:29:45 | http: reset connection before installing retry timer (fix http retries handling) This will fix some invalid read/write: ==556== Invalid read of size 8 ==556== at 0x4E4EEC6: event_queue_remove_timeout (minheap-internal.h:178) ==556== by 0x4E508AA: event_del_nolock_ (event.c:2764) ==556== by 0x4E53535: event_base_loop (event.c:3088) ==556== by 0x406FCFA: dispatch (libcrawl.c:271) ==556== by 0x402863: main (crawler.c:49) ==556== Address 0x68a3f18 is 152 bytes inside a block of size 400 free'd ==556== at 0x4C29C97: free (in /usr/local/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==556== by 0x406F140: renew (libcrawl.c:625) ==556== by 0x4E6CDE9: evhttp_connection_cb_cleanup (http.c:1331) ==556== by 0x4E6E2B2: evhttp_connection_cb (http.c:1424) ==556== by 0x4E4DF2D: bufferevent_writecb (bufferevent_sock.c:310) ==556== by 0x4E52D1D: event_process_active_single_queue (event.c:1584) ==556== by 0x4E53676: event_base_loop (event.c:1676) ==556== by 0x406FCFA: dispatch (libcrawl.c:271) ==556== by 0x402863: main (crawler.c:49) But this one because of some invalid write before (I guess). It is 100% reproduced during massive crawling (because this process has many different servers), but after spending some time for trying to reproduce this using some simple tests/utils I gave up for a few days (I have a lot of work to do), but I'm sending this patch as a reminder. Just in case, I've tried next tests: - mixing timeouts/retries - shutdown http server and return it back - slow dns server for first request - sleep before accept - hacking libevent sources to change the behaviour of http layer (so it will go into that function which I'm insterested in). | ||
| 97c750d6 | 2014-09-30 01:34:04 | evdns: fail ns after we are failing/retrasmitting request In case we are failing request (evdns_request_timeout_callback()), we delete timeout_event in request_finished(), while just before calling request_finished() (for failing request) there was a call to nameserver_failed(), that add event for timeout_event, IOW we must fail ns after request because otherwise we will not have timeout_event actived, and we will waiting forever. Before this patch the dns/retry_disable_when_inactive will wait forever, after - OK. | ||
| 3ca9d43d | 2014-04-10 19:33:45 | evdns: add retry/reissue tests for EVDNS_BASE_DISABLE_WHEN_INACTIVE | ||
| 74d0eee8 | 2014-04-10 19:30:47 | evdns: fix EVDNS_BASE_DISABLE_WHEN_INACTIVE in case retransmit/retry | ||
| 5c7282f7 | 2014-09-24 13:46:09 | Fix compilation for older OpenSSL versions. For instance OpenSSL 0.9.7 does not have SSL_set_tlsext_host_name. Also add the missing EVENT__DISABLE_SAMPLES CMake option. | ||
| 3da84c29 | 2014-09-21 18:29:17 | bufferevent_openssl: reset fd_is_set when setfd with -1 is called Otherwise we will use old fd after close(2) called on it: (Traces trimmed, to minimize it) $ strace -keclose,open,socket,epoll_ctl https-client -url https://libevent.org socket(PF_INET, SOCK_STREAM|SOCK_NONBLOCK, IPPROTO_IP) = 5 > /lib/x86_64-linux-gnu/libc-2.19.so(socket+0x7) [0xe6da7] > /usr/lib/libevent-2.1.so.4.0.0(evutil_socket_+0x25) [0x27835] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_socket_connect+0xe9) [0x1b1a9] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_socket_connect+0x21f) [0x1b2df] > /usr/lib/libevent-2.1.so.4.0.0(evutil_getaddrinfo_async_+0x65) [0x271a5] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_socket_connect_hostname+0x106) [0x1b416] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_connect_+0xe7) [0x39f07] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_make_request+0xb8) [0x3a218] epoll_ctl(3, EPOLL_CTL_ADD, 5, {EPOLLIN, {u32=5, u64=5}}) = 0 > ... > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xfdd) [0x2ced] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_setfd+0x3b) [0x16d9b] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_socket_connect+0x75) [0x1b135] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_socket_connect+0x21f) [0x1b2df] > /usr/lib/libevent-2.1.so.4.0.0(evutil_getaddrinfo_async_+0x65) [0x271a5] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_socket_connect_hostname+0x106) [0x1b416] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_connect_+0xe7) [0x39f07] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_make_request+0xb8) [0x3a218] epoll_ctl(3, EPOLL_CTL_MOD, 5, {EPOLLIN|EPOLLOUT, {u32=5, u64=5}}) = 0 > ... > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xfee) [0x2cfe] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_setfd+0x3b) [0x16d9b] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_socket_connect+0x75) [0x1b135] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_socket_connect+0x21f) [0x1b2df] > /usr/lib/libevent-2.1.so.4.0.0(evutil_getaddrinfo_async_+0x65) [0x271a5] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_socket_connect_hostname+0x106) [0x1b416] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_connect_+0xe7) [0x39f07] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_make_request+0xb8) [0x3a218] epoll_ctl(3, EPOLL_CTL_MOD, 5, {EPOLLOUT, {u32=5, u64=5}}) = 0 > ... > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xbbc) [0x28cc] > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xd96) [0x2aa6] > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xeb8) [0x2bc8] > /usr/lib/libevent-2.1.so.4.0.0(event_free+0x3fe) [0x1fd1e] > /usr/lib/libevent-2.1.so.4.0.0(event_base_loop+0x407) [0x20677] epoll_ctl(3, EPOLL_CTL_DEL, 5, 7fffa1f841e0) = 0 > ... > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xbc4) [0x28d4] > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xd96) [0x2aa6] > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xeb8) [0x2bc8] > /usr/lib/libevent-2.1.so.4.0.0(event_free+0x3fe) [0x1fd1e] > /usr/lib/libevent-2.1.so.4.0.0(event_base_loop+0x407) [0x20677] close(5) = 0 > /lib/x86_64-linux-gnu/libpthread-2.19.so(__close_nocancel+0x7) [0xeb20] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_reset_+0x55) [0x373f5] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_connect_+0x1d) [0x39e3d] > /usr/lib/libevent-2.1.so.4.0.0(event_free+0x3fe) [0x1fd1e] > /usr/lib/libevent-2.1.so.4.0.0(event_base_loop+0x407) [0x20677] epoll_ctl(3, EPOLL_CTL_ADD, 5, {EPOLLIN, {u32=5, u64=5}}) = -1 EBADF (Bad file descriptor) ) = -1 EBADF (Bad file descriptor) /src/oss/strace-code/strace: Can't initiate libunwind: No such process > ... > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xfdd) [0x2ced] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_setfd+0x3b) [0x16d9b] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_connect_+0x14c) [0x39f6c] > /usr/lib/libevent-2.1.so.4.0.0(event_free+0x3fe) [0x1fd1e] > /usr/lib/libevent-2.1.so.4.0.0(event_base_loop+0x407) [0x20677] /src/oss/strace-code/strace: Exit of unknown pid 28185 seen [warn] Epoll ADD(1) on fd 5 failed. Old events were 0; read change was 1 (add); write change was 0 (none); close change was 0 (none): Bad file descriptor epoll_ctl(3, EPOLL_CTL_ADD, 5, {EPOLLOUT, {u32=5, u64=5}}) = -1 EBADF (Bad file descriptor) ) = -1 EBADF (Bad file descriptor) /src/oss/strace-code/strace: Can't initiate libunwind: No such process > ... > /usr/lib/libevent_openssl-2.1.so.4.0.0(_init+0xfee) [0x2cfe] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_setfd+0x3b) [0x16d9b] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_connect_+0x14c) [0x39f6c] > /usr/lib/libevent-2.1.so.4.0.0(event_free+0x3fe) [0x1fd1e] > /usr/lib/libevent-2.1.so.4.0.0(event_base_loop+0x407) [0x20677] /src/oss/strace-code/strace: Exit of unknown pid 28186 seen [warn] Epoll ADD(4) on fd 5 failed. Old events were 0; read change was 0 (none); write change was 1 (add); close change was 0 (none): Bad file descriptor <getaddrinfo traces trimmed> close(5) = -1 EBADF (Bad file descriptor) ) = -1 EBADF (Bad file descriptor) /src/oss/strace-code/strace: Can't initiate libunwind: No such process > /lib/x86_64-linux-gnu/libpthread-2.19.so(__close_nocancel+0x7) [0xeb20] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_reset_+0x55) [0x373f5] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_fail_+0xc1) [0x3aed1] > /usr/lib/libevent-2.1.so.4.0.0(evhttp_connection_fail_+0x4a3) [0x3b2b3] > /usr/lib/libevent-2.1.so.4.0.0(bufferevent_enable+0x192) [0x16722] > /usr/lib/libevent-2.1.so.4.0.0(event_free+0x5df) [0x1feff] > /usr/lib/libevent-2.1.so.4.0.0(event_base_loop+0x407) [0x20677] /src/oss/strace-code/strace: Exit of unknown pid 28187 seen some request failed - no idea which one though! socket error = Bad file descriptor (9) Before this patch: $ sample/https-client -retries 1 -url https://libevent.org [warn] Epoll ADD(1) on fd 6 failed. Old events were 0; read change was 1 (add); write change was 0 (none); close change was 0 (none): Bad file descriptor [warn] Epoll ADD(4) on fd 6 failed. Old events were 0; read change was 0 (none); write change was 1 (add); close change was 0 (none): Bad file descriptor some request failed - no idea which one though! socket error = Bad file descriptor (9) After this patch: $ sample/https-client -retries 1 -url https://libevent.org Response line: 0 (null) Reported-by: gerkenjohannes@web.de | ||
| d9da8443 | 2014-09-21 18:36:29 | https-client: add -retries argument, for connection retries Using evhttp_connection_set_retries() API. | ||
| 07b5e45b | 2014-09-18 15:08:57 | Merge remote-tracking branch 'origin/patches-2.0' | ||
| b34e4ac3 | 2014-09-12 14:19:14 | [Bugfix] fix bufferevent setwatermark suspend_read | ||
| 89c1a3b7 | 2014-09-18 12:40:38 | Fix several memory leaks in the unit tests. Also add a comment to buffer.c about why we call evbuffer_file_segment_free on failure to add the segment. | ||
| 364c1106 | 2014-09-18 12:12:36 | Fix for a677b72bd6d9d378daf9775966aa8ca574e26e67 | ||
| fb57b8ba | 2014-09-18 12:08:50 | Make a buffer larger in the tests to avoid a scary evbuffer_copyout_from() The call was safe, but coverity couldn't tell. CID 1239294. | ||
| ca5b5c7d | 2014-09-18 12:04:16 | Use a more precise calculation for max in time-ratelim.c CID 1239297 | ||
| a677b72b | 2014-09-18 12:02:13 | Use evutil_weakrand() in unit tests. (Coverity doesn't like random() or rand(). We don't care; this is for unit tests.) Fixes CID 1239298, 1239296, 1239295, 1239293. | ||
| 76643dd0 | 2014-09-18 11:54:39 | Fix a c90 warning |