Displaying 20 results from an estimated 54 matches for "debug_flags".
2019 Dec 12
9
[PATCH nbdkit 0/7] server: Allow datapath debug messages to be suppressed.
The immediate reason for this patch is to reduce the amount of
debugging in virt-v2v with using the virt-v2v -v option (because this
implies running nbdkit in verbose mode too). Most of the messages are
datapath ones about pread/pwrite requests, and in fact as we've added
more filters on top of nbdkit these messages have got more and more
verbose. However they are not particularly
2003 May 16
4
[RFC] report options
...be the
near equivalent of "-v --stats --progress".
For backward compatability and because -v is intuitive the
existing options would be preserved and mapped into the
bitmasks.
INTERNAL USAGE
The use of verbose, do_stats and do_progress are replaced
with two bitmasks: report_flags and debug_flags. Two
bitmasks were chosen because debugging and verbosity should
be considered separate issues. To facilitate using these
two macros are created. Everywhere you have something like
"if (verbose)" or "if (verbose >= n)" It would be replaced
by something like "if (repor...
2019 Jan 01
2
[PATCH nbdkit] server: Use bool for types which are really booleans.
...ar *flag; /* flag name */
int value; /* value of flag */
- int used; /* if flag was successfully set */
+ bool used; /* if flag was successfully set */
};
enum log_to {
@@ -94,22 +94,22 @@ extern struct debug_flag *debug_flags;
extern const char *exportname;
extern const char *ipaddr;
extern enum log_to log_to;
-extern int newstyle;
+extern bool newstyle;
extern const char *port;
-extern int readonly;
+extern bool readonly;
extern const char *selinux_label;
+extern int threads;
extern int tls;
extern const char *t...
2019 Aug 27
1
[PATCH nbdkit] server: Try hard to maintain invariant that fds 0, 1 and 2 are always open.
...n.c
@@ -60,6 +60,7 @@ static struct backend *open_filter_so (struct backend *next, size_t i, const cha
static void start_serving (void);
static void write_pidfile (void);
static bool is_config_key (const char *key, size_t len);
+static void open_std_file_descriptors (void);
struct debug_flag *debug_flags; /* -D */
bool exit_with_parent; /* --exit-with-parent */
@@ -149,6 +150,13 @@ main (int argc, char *argv[])
size_t i;
const char *magic_config_key;
+ /* Ensures that fds 0, 1 and 2 are open (on /dev/null if nothing
+ * else). This is so that nbdkit and plugins can assume thes...
2020 Jul 22
2
[nbdkit PATCH] server: Reinstate limited use of -e/-exportname.
...] [-f|--foreground]
[-g|--group GROUP] [-i|--ipaddr IPADDR]
[--log stderr|syslog|null]
diff --git a/server/internal.h b/server/internal.h
index 4911a49b..1acbbb06 100644
--- a/server/internal.h
+++ b/server/internal.h
@@ -108,6 +108,7 @@ enum log_to {
};
extern struct debug_flag *debug_flags;
+extern const char *export_name;
extern bool foreground;
extern const char *ipaddr;
extern enum log_to log_to;
diff --git a/server/captive.c b/server/captive.c
index 53b82782..a8947d7c 100644
--- a/server/captive.c
+++ b/server/captive.c
@@ -61,6 +61,9 @@ run_command (void)
if (!run)
re...
2020 Jun 01
3
[PATCH v2v 0/2] v2v: nbdkit: Don't use password=- parameter.
Part 2 fix for:
https://bugzilla.redhat.com/show_bug.cgi?id=1842440
Actually this fix on its own should be sufficient, but probably we
want the nbdkit fixes too.
Note this uses actual OCaml 4.05 features! ("let open" and the
Unix.tcgetattr functions). I checked that both features are available
on RHEL 7's OCaml.
Rich.
2002 Nov 05
2
[Bug 414] sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414
------- Additional Comments From markus at openbsd.org 2002-11-06 07:01 -------
Created an attachment (id=164)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=164&action=view)
proposed patch
what about this? (more in line with the rest of the code).
------- You are receiving this mail because: -------
You are the assignee for the
2018 Sep 08
0
[PATCH nbdkit v2 2/6] main: Tighten up characters permitted in config keys.
...a/src/main.c
+++ b/src/main.c
@@ -72,6 +72,7 @@ static void fork_into_background (void);
static uid_t parseuser (const char *);
static gid_t parsegroup (const char *);
static unsigned int get_socket_activation (void);
+static int is_config_key (const char *key, size_t len);
struct debug_flag *debug_flags; /* -D */
int exit_with_parent; /* --exit-with-parent */
@@ -694,7 +695,7 @@ main (int argc, char *argv[])
magic_config_key = backend->magic_config_key (backend);
for (i = 0; optind < argc; ++i, ++optind) {
p = strchr (argv[optind], '=');
- if (p) {...
2007 Dec 26
1
sshd's -e doesn't work as expected
Hello,
I'm running a sshd server using the -e flag so that I can capture its
whole output and later send it to the user. I'm also setting LogLevel
to DEBUG1 in the configuration file and I don't want to disturb syslogd.
But the problem is that it doesn't work as expected (or as I expect,
which I think should be the correct behavior). The log file ends up
being empty because the
2018 Sep 10
0
[PATCH nbdkit v3 2/6] main: Tighten up characters permitted in config keys.
...a/src/main.c
+++ b/src/main.c
@@ -72,6 +72,7 @@ static void fork_into_background (void);
static uid_t parseuser (const char *);
static gid_t parsegroup (const char *);
static unsigned int get_socket_activation (void);
+static int is_config_key (const char *key, size_t len);
struct debug_flag *debug_flags; /* -D */
int exit_with_parent; /* --exit-with-parent */
@@ -694,7 +695,7 @@ main (int argc, char *argv[])
magic_config_key = backend->magic_config_key (backend);
for (i = 0; optind < argc; ++i, ++optind) {
p = strchr (argv[optind], '=');
- if (p) {...
2019 Aug 29
2
[PATCH] p2v: Ignore gtk2 deprecated declarations.
This patch is against libguestfs's old copy of p2v, but the same patch
ought to also apply against virt-p2v.
Rich.
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
The following patch allows OpenSSH 2.2.0-p1 to be started (and managed)
from /etc/inittab (by "init") on systems which support that. This is
useful when you *really* want SSHD to always run since it will be
automatically restarted by "init" if it dies (and if "init" dies the
the systems dies :-).
I use a line (in /etc/inittab) like this on Solaris systems:
2005 Mar 23
1
system-config-samba, error
Hello i am new using samba, and i need some help.
First this is my system:
Fedora C3 (2.6.10-1.770_FC3)
Samba-3.0.10-1.fc3
system-config-samba-1.2.28-0.fc3.1
Well i started to use samba, and everything worked fine, but u updated
my system and there samba stop working, i cant access to the paths
that before i used to access, i looked to the smb.conf , and
everything is ok, as well the smbpasswd
2005 Feb 24
3
Suggestion: SSHD pseudo/fake mode. Source available.
Hi,
SSH brute force attacks seem to enjoy increasing popularity. Call me an
optimist or a misrouted kind of contributer to the community, but on our
company server I actually go through the logs and report extreme cases
to the providers of the originating IP's. With the increasing number of
these attacks, however, I have now decided that it's better to move the
SSHd to a different
2010 Feb 27
8
[Bug 1719] New: Debug server prints debug messages on client
https://bugzilla.mindrot.org/show_bug.cgi?id=1719
Summary: Debug server prints debug messages on client
Product: Portable OpenSSH
Version: 5.4p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2020 Jul 21
3
[PATCH nbdkit] server: Deprecate the -e/--exportname parameter.
...[-f|--foreground]
[-g|--group GROUP] [-i|--ipaddr IPADDR]
[--log stderr|syslog|null]
diff --git a/server/internal.h b/server/internal.h
index 68c53366..ebc63a52 100644
--- a/server/internal.h
+++ b/server/internal.h
@@ -108,7 +108,6 @@ enum log_to {
};
extern struct debug_flag *debug_flags;
-extern const char *exportname;
extern bool foreground;
extern const char *ipaddr;
extern enum log_to log_to;
diff --git a/server/captive.c b/server/captive.c
index f8107604..aa717870 100644
--- a/server/captive.c
+++ b/server/captive.c
@@ -61,8 +61,6 @@ run_command (void)
if (!run)
ret...
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
In the past 2 months another change occurred in the CVS code that
broke my ssh-keyscan patch. Here's an updated version that tweaks the
changed name (in the Kex struct) and also causes an attempt to grab an
ssh2 key from an older server (without ssh2 support) to fail earlier
and without an error message (Stuart Pearlman emailed me some code for
this).
This patch is based on the BSD CVS
2001 Nov 27
1
[PATCH] tcp-wrappers support extended to x11 forwards
Hi!
Here is the patch to support tcp wrappers with x11-forwarded connections.
The patch is for openssh-3.0.1p1 but it works fine with 2.9.9p2 too.
I've understood that this will not be included in the official version
because it adds complexity (?!) to openssh.
Binding the forwarded port to localhost doesn't solve all problems. I've
understood that you should also implement
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
Please find enclosed two patches for OpenSSH 3.1p1.
The first patch solves a problem where sessions will be left "hanging"
when you normally exit from a ssh shell (for example by logging out from
the remote host via "exit" or "logout"). The problem seems to be that sshd
(and some other parts of OpenSSH) doesn't check the return code and errno
from waitpid() for
2019 Aug 29
0
[PATCH] p2v: Ignore gtk2 deprecated declarations.
...e/gtk-2.0/gtk/gtkaboutdialog.h:32,
from /usr/include/gtk-2.0/gtk/gtk.h:33,
from gui.c:82:
/usr/include/gtk-2.0/gtk/gtktypeutils.h:236:1: warning: ‘GTypeDebugFlags’ is deprecated [-Wdeprecated-declarations]
236 | void gtk_type_init (GTypeDebugFlags debug_flags);
| ^~~~
In file included from /usr/include/glib-2.0/gobject/gobject.h:24,
from /usr/include/glib-2.0/gobject/gbinding.h:29,
from /usr/include/glib-2.0/glib-object.h:23,
from /usr/include/glib-2.0/gio/gioenums.h:28,
from /usr...