search for: debug_flag

Displaying 20 results from an estimated 54 matches for "debug_flag".

Did you mean: debug_flags
2019 Dec 12
9
[PATCH nbdkit 0/7] server: Allow datapath debug messages to be suppressed.
The immediate reason for this patch is to reduce the amount of debugging in virt-v2v with using the virt-v2v -v option (because this implies running nbdkit in verbose mode too). Most of the messages are datapath ones about pread/pwrite requests, and in fact as we've added more filters on top of nbdkit these messages have got more and more verbose. However they are not particularly
2003 May 16
4
[RFC] report options
...be the near equivalent of "-v --stats --progress". For backward compatability and because -v is intuitive the existing options would be preserved and mapped into the bitmasks. INTERNAL USAGE The use of verbose, do_stats and do_progress are replaced with two bitmasks: report_flags and debug_flags. Two bitmasks were chosen because debugging and verbosity should be considered separate issues. To facilitate using these two macros are created. Everywhere you have something like "if (verbose)" or "if (verbose >= n)" It would be replaced by something like "if (repo...
2019 Jan 01
2
[PATCH nbdkit] server: Use bool for types which are really booleans.
...ain.c | 67 ++++++++++++++++++++++---------------------- server/plugins.c | 2 +- 5 files changed, 59 insertions(+), 58 deletions(-) diff --git a/server/internal.h b/server/internal.h index b13685e..76d3a6d 100644 --- a/server/internal.h +++ b/server/internal.h @@ -79,7 +79,7 @@ struct debug_flag { char *name; /* plugin or filter name */ char *flag; /* flag name */ int value; /* value of flag */ - int used; /* if flag was successfully set */ + bool used; /* if flag was successfully set *...
2019 Aug 27
1
[PATCH nbdkit] server: Try hard to maintain invariant that fds 0, 1 and 2 are always open.
...b/server/main.c @@ -60,6 +60,7 @@ static struct backend *open_filter_so (struct backend *next, size_t i, const cha static void start_serving (void); static void write_pidfile (void); static bool is_config_key (const char *key, size_t len); +static void open_std_file_descriptors (void); struct debug_flag *debug_flags; /* -D */ bool exit_with_parent; /* --exit-with-parent */ @@ -149,6 +150,13 @@ main (int argc, char *argv[]) size_t i; const char *magic_config_key; + /* Ensures that fds 0, 1 and 2 are open (on /dev/null if nothing + * else). This is so that nbdkit and plugins ca...
2020 Jul 22
2
[nbdkit PATCH] server: Reinstate limited use of -e/-exportname.
...r FILTER ...] [-f|--foreground] [-g|--group GROUP] [-i|--ipaddr IPADDR] [--log stderr|syslog|null] diff --git a/server/internal.h b/server/internal.h index 4911a49b..1acbbb06 100644 --- a/server/internal.h +++ b/server/internal.h @@ -108,6 +108,7 @@ enum log_to { }; extern struct debug_flag *debug_flags; +extern const char *export_name; extern bool foreground; extern const char *ipaddr; extern enum log_to log_to; diff --git a/server/captive.c b/server/captive.c index 53b82782..a8947d7c 100644 --- a/server/captive.c +++ b/server/captive.c @@ -61,6 +61,9 @@ run_command (void) if (...
2020 Jun 01
3
[PATCH v2v 0/2] v2v: nbdkit: Don't use password=- parameter.
Part 2 fix for: https://bugzilla.redhat.com/show_bug.cgi?id=1842440 Actually this fix on its own should be sufficient, but probably we want the nbdkit fixes too. Note this uses actual OCaml 4.05 features! ("let open" and the Unix.tcgetattr functions). I checked that both features are available on RHEL 7's OCaml. Rich.
2002 Nov 05
2
[Bug 414] sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414 ------- Additional Comments From markus at openbsd.org 2002-11-06 07:01 ------- Created an attachment (id=164) --> (http://bugzilla.mindrot.org/attachment.cgi?id=164&action=view) proposed patch what about this? (more in line with the rest of the code). ------- You are receiving this mail because: ------- You are the assignee for the
2018 Sep 08
0
[PATCH nbdkit v2 2/6] main: Tighten up characters permitted in config keys.
...100644 --- a/src/main.c +++ b/src/main.c @@ -72,6 +72,7 @@ static void fork_into_background (void); static uid_t parseuser (const char *); static gid_t parsegroup (const char *); static unsigned int get_socket_activation (void); +static int is_config_key (const char *key, size_t len); struct debug_flag *debug_flags; /* -D */ int exit_with_parent; /* --exit-with-parent */ @@ -694,7 +695,7 @@ main (int argc, char *argv[]) magic_config_key = backend->magic_config_key (backend); for (i = 0; optind < argc; ++i, ++optind) { p = strchr (argv[optind], '='); - if (p)...
2007 Dec 26
1
sshd's -e doesn't work as expected
...================================================================= RCS file: /cvsroot/src/crypto/dist/ssh/sshd.c,v retrieving revision 1.42 diff -u -p -r1.42 sshd.c --- sshd.c 18 Dec 2007 02:35:33 -0000 1.42 +++ sshd.c 26 Dec 2007 20:12:22 -0000 @@ -1485,8 +1485,16 @@ main(int ac, char **av) if (!(debug_flag || inetd_flag || no_daemon_flag)) { int fd; - if (daemon(0, 0) < 0) + if (daemon(0, 1) < 0) fatal("daemon() failed: %.200s", strerror(errno)); + close(STDIN_FILENO); + open(_PATH_DEVNULL, O_RDONLY); + close(STDOUT_FILENO); + open(_PATH_DEVNULL, O_WRONLY); + if (!log_...
2018 Sep 10
0
[PATCH nbdkit v3 2/6] main: Tighten up characters permitted in config keys.
...100644 --- a/src/main.c +++ b/src/main.c @@ -72,6 +72,7 @@ static void fork_into_background (void); static uid_t parseuser (const char *); static gid_t parsegroup (const char *); static unsigned int get_socket_activation (void); +static int is_config_key (const char *key, size_t len); struct debug_flag *debug_flags; /* -D */ int exit_with_parent; /* --exit-with-parent */ @@ -694,7 +695,7 @@ main (int argc, char *argv[]) magic_config_key = backend->magic_config_key (backend); for (i = 0; optind < argc; ++i, ++optind) { p = strchr (argv[optind], '='); - if (p)...
2019 Aug 29
2
[PATCH] p2v: Ignore gtk2 deprecated declarations.
This patch is against libguestfs's old copy of p2v, but the same patch ought to also apply against virt-p2v. Rich.
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
...;& !inetd_flag && getppid() != 1); /* Read server configuration options from the configuration file. */ read_server_config(&options, config_file_name); *************** *** 633,639 **** } /* Initialize the log (it is reinitialized below in case we forked). */ ! if (debug_flag && !inetd_flag) log_stderr = 1; log_init(av0, options.log_level, options.log_facility, log_stderr); --- 633,639 ---- } /* Initialize the log (it is reinitialized below in case we forked). */ ! if (debug_flag && !inetd_flag && getppid() != 1) log_stder...
2005 Mar 23
1
system-config-samba, error
...When i try to run the GUI of samba server, it doesnt load, when i try to do it by shell [root@mty00 ~]# system-config-samba I got these errors: Traceback (most recent call last): File "/usr/share/system-config-samba/system-config-samba.py", line 41, in ? mainWindow.MainWindow(debug_flag) File "/usr/share/system-config-samba/mainWindow.py", line 79, in __init__ self.samba_data = sambaParser.SambaParser(self) File "/usr/share/system-config-samba/sambaParser.py", line 177, in __init__ self.parseFile() File "/usr/share/system-config-samba/sa...
2005 Feb 24
3
Suggestion: SSHD pseudo/fake mode. Source available.
Hi, SSH brute force attacks seem to enjoy increasing popularity. Call me an optimist or a misrouted kind of contributer to the community, but on our company server I actually go through the logs and report extreme cases to the providers of the originating IP's. With the increasing number of these attacks, however, I have now decided that it's better to move the SSHd to a different
2010 Feb 27
8
[Bug 1719] New: Debug server prints debug messages on client
https://bugzilla.mindrot.org/show_bug.cgi?id=1719 Summary: Debug server prints debug messages on client Product: Portable OpenSSH Version: 5.4p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: unassigned-bugs at mindrot.org ReportedBy:
2020 Jul 21
3
[PATCH nbdkit] server: Deprecate the -e/--exportname parameter.
...FILTER ...] [-f|--foreground] [-g|--group GROUP] [-i|--ipaddr IPADDR] [--log stderr|syslog|null] diff --git a/server/internal.h b/server/internal.h index 68c53366..ebc63a52 100644 --- a/server/internal.h +++ b/server/internal.h @@ -108,7 +108,6 @@ enum log_to { }; extern struct debug_flag *debug_flags; -extern const char *exportname; extern bool foreground; extern const char *ipaddr; extern enum log_to log_to; diff --git a/server/captive.c b/server/captive.c index f8107604..aa717870 100644 --- a/server/captive.c +++ b/server/captive.c @@ -61,8 +61,6 @@ run_command (void) if (!...
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...e(void) { - fatal("usage: %s [-t timeout] { [--] host | -f file } ...", __progname); + fatal("usage: %s [-v46] [-T timeout] { [-t type] [--] host | -f file } ...", + __progname); return; } @@ -570,27 +721,53 @@ main(int argc, char **argv) { char *host = NULL; + int debug_flag = 0, log_level = SYSLOG_LEVEL_INFO; TAILQ_INIT(&tq); if (argc <= argno) usage(); - if (argv[1][0] == '-' && argv[1][1] == 't') { - argno++; - if (argv[1][2]) - timeout = atoi(&argv[1][2]); - else { - if (argno >= argc) - usage(); - time...
2001 Nov 27
1
[PATCH] tcp-wrappers support extended to x11 forwards
Hi! Here is the patch to support tcp wrappers with x11-forwarded connections. The patch is for openssh-3.0.1p1 but it works fine with 2.9.9p2 too. I've understood that this will not be included in the official version because it adds complexity (?!) to openssh. Binding the forwarded port to localhost doesn't solve all problems. I've understood that you should also implement
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
...SET ? SYSLOG_FACILITY_AUTH : options.log_facility, ! !inetd_flag && !init_flag); #ifdef _CRAY /* Cray can define user privs drop all prives now! *************** *** 814,820 **** #endif /* Initialize the log (it is reinitialized below in case we forked). */ ! if (debug_flag && !inetd_flag) log_stderr = 1; log_init(__progname, options.log_level, options.log_facility, log_stderr); --- 821,827 ---- #endif /* Initialize the log (it is reinitialized below in case we forked). */ ! if (debug_flag && !inetd_flag && !init_flag) lo...
2019 Aug 29
0
[PATCH] p2v: Ignore gtk2 deprecated declarations.
...e/gtk-2.0/gtk/gtkaboutdialog.h:32, from /usr/include/gtk-2.0/gtk/gtk.h:33, from gui.c:82: /usr/include/gtk-2.0/gtk/gtktypeutils.h:236:1: warning: ‘GTypeDebugFlags’ is deprecated [-Wdeprecated-declarations] 236 | void gtk_type_init (GTypeDebugFlags debug_flags); | ^~~~ In file included from /usr/include/glib-2.0/gobject/gobject.h:24, from /usr/include/glib-2.0/gobject/gbinding.h:29, from /usr/include/glib-2.0/glib-object.h:23, from /usr/include/glib-2.0/gio/gioenums.h:28, from /us...