search for: notreach

Displaying 20 results from an estimated 91 matches for "notreach".

Did you mean: netreach
2016 Jan 27
4
[PATCH] lvm: support lvm2 older than 2.02.107
...t;, + "--separator", ":", NULL); + if (r == -1) { + reply_with_error ("%s", err); + free (out); + return NULL; + } + + return filter_convert_old_lvs_output (out); } - return convert_lvm_output (out, "/dev/"); + /*NOTREACHED*/ + assert (false); + return NULL; } /* These were so complex to implement that I ended up auto-generating -- 2.5.0
2016 Jan 28
0
Re: [PATCH] lvm: support lvm2 older than 2.02.107
...> CLEANUP_FREE char *err = NULL; > int r; > + int has_S = test_lvs_has_S_opt (); > + if (has_S < 0) > return NULL; I think this doesn't do the right thing on the second failing call to test_lvs_has_S_opt, because it won't return a protocol error? > + /*NOTREACHED*/ > + assert (false); > + return NULL; > } What's this bit for? It is indeed NOTREACHED, but it seems as if the 3 lines could just be removed. Rest looks fine, so ACK with those fixed. Rich. -- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones Rea...
2002 Apr 22
0
[Bug 101] session.c modifications for correct UNICOS behavior
...perror("dup2 stderr"); #endif /* USE_PIPES */ +#ifdef _CRAY + cray_init_job(s->pw); /* set up cray jid and tmpdir */ +#endif /* _CRAY */ /* Do processing for the child (exec command etc). */ do_child(s, command); /* NOTREACHED */ } +#ifdef _CRAY + signal(WJSIGNAL, cray_job_termination_handler); +#endif /* _CRAY */ #ifdef HAVE_CYGWIN if (is_winnt) cygwin_set_impersonation_token(INVALID_HANDLE_VALUE); @@ -517,7 +527,12 @@ /* record login, etc. similar to login(1) */...
2012 Aug 29
0
PATCH: Log the PID of executed commands
...d the user child sshd processes. This patch adds logging the PID of invoked commands for completeness. diff --git a/session.c b/session.c index f3baea2..dd1d0e8 100644 --- a/session.c +++ b/session.c @@ -579,6 +579,7 @@ do_exec_no_pty(Session *s, const char *command) do_child(s, command); /* NOTREACHED */ default: + verbose("command is on pid %ld", (long)pid); break; } @@ -729,6 +730,7 @@ do_exec_pty(Session *s, const char *command) do_child(s, command); /* NOTREACHED */ default: + verbose("command is on pid %ld", (long)pid); break; } -- Bruce Gue...
2002 Feb 04
0
[Bug 101] New: session.c modifications for correct UNICOS behavior
...perror("dup2 stderr"); #endif /* USE_PIPES */ - +#ifdef _CRAY + cray_init_job(s->pw); /* set up cray jid and tmpdir */ +#endif /* Do processing for the child (exec command etc). */ do_child(s, command); /* NOTREACHED */ } +#ifdef _CRAY + signal(WJSIGNAL, cray_job_termination_handler); +#endif /* _CRAY */ #ifdef HAVE_CYGWIN if (is_winnt) cygwin_set_impersonation_token(INVALID_HANDLE_VALUE); @@ -586,7 +595,12 @@ /* record login, etc. similar to login(1) */...
2020 Mar 28
0
[klibc:update-dash] dash: eval: Add vfork support
...cess if necessary. */ if (!(flags & EV_EXIT) || have_traps()) { INTOFF; - jp = makejob(cmd, 1); - if (forkshell(jp, cmd, FORK_FG) != 0) - break; - FORCEINTON; + jp = vforkexec(cmd, argv, path, cmdentry.u.index); + break; } shellexec(argv, path, cmdentry.u.index); /* NOTREACHED */ diff --git a/usr/dash/exec.h b/usr/dash/exec.h index 2b318257..423b07e6 100644 --- a/usr/dash/exec.h +++ b/usr/dash/exec.h @@ -58,6 +58,8 @@ struct cmdentry { #define DO_ALTPATH 0x08 /* using alternate path */ #define DO_REGBLTIN 0x10 /* regular built-ins and functions only */ +union node;...
2012 Jul 02
0
[klibc:master] [EVAL] Remove unused EV_BACKCMD flag
...*jp; - - if (pipe(pip) < 0) - sh_error("Pipe call failed"); - jp = makejob(n, 1); - if (forkshell(jp, n, FORK_NOJOB) == 0) { - FORCEINTON; - close(pip[0]); - if (pip[1] != 1) { - dup2(pip[1], 1); - close(pip[1]); - } - ifsfree(); - evaltreenr(n, EV_EXIT); - /* NOTREACHED */ + if (pipe(pip) < 0) + sh_error("Pipe call failed"); + jp = makejob(n, 1); + if (forkshell(jp, n, FORK_NOJOB) == 0) { + FORCEINTON; + close(pip[0]); + if (pip[1] != 1) { + dup2(pip[1], 1); + close(pip[1]); } - close(pip[1]); - result->fd = pip[0]; - result->jp...
2020 Mar 28
0
[klibc:update-dash] dash: eval: Only restore exit status on exit/return
...argv, const char *path, int idx) exitstatus = exerrno; TRACE(("shellexec failed for %s, errno %d, suppressint %d\n", argv[0], e, suppressint )); - exerror(EXEXIT, "%s: %s", argv[0], errmsg(e, E_EXEC)); + exerror(EXEND, "%s: %s", argv[0], errmsg(e, E_EXEC)); /* NOTREACHED */ } diff --git a/usr/dash/main.c b/usr/dash/main.c index 6d53e009..6b3a0909 100644 --- a/usr/dash/main.c +++ b/usr/dash/main.c @@ -111,7 +111,7 @@ main(int argc, char **argv) e = exception; s = state; - if (e == EXEXIT || s == 0 || iflag == 0 || shlvl) + if (e == EXEND || e == EXEXI...
2019 Jan 25
0
[klibc:update-dash] [BUILTIN] Exit without arguments in a trap should use status outside traps
...39,8 +339,15 @@ exitcmd(int argc, char **argv) { if (stoppedjobs()) return 0; - if (argc > 1) - exitstatus = number(argv[1]); + + if (argc > 1) { + int status = number(argv[1]); + + exitstatus = status; + if (savestatus >= 0) + savestatus = status; + } + exraise(EXEXIT); /* NOTREACHED */ } diff --git a/usr/dash/trap.c b/usr/dash/trap.c index 3ff45318..7dd8342f 100644 --- a/usr/dash/trap.c +++ b/usr/dash/trap.c @@ -313,12 +313,17 @@ void dotrap(void) char *p; char *q; int i; - int savestatus; + int status, last_status; if (!pendingsigs) return; - savestatus = ex...
2020 Mar 28
0
[klibc:update-dash] dash: [BUILTIN] Exit without arguments in a trap should use status outside traps
...39,8 +339,15 @@ exitcmd(int argc, char **argv) { if (stoppedjobs()) return 0; - if (argc > 1) - exitstatus = number(argv[1]); + + if (argc > 1) { + int status = number(argv[1]); + + exitstatus = status; + if (savestatus >= 0) + savestatus = status; + } + exraise(EXEXIT); /* NOTREACHED */ } diff --git a/usr/dash/trap.c b/usr/dash/trap.c index 3ff45318..7dd8342f 100644 --- a/usr/dash/trap.c +++ b/usr/dash/trap.c @@ -313,12 +313,17 @@ void dotrap(void) char *p; char *q; int i; - int savestatus; + int status, last_status; if (!pendingsigs) return; - savestatus = ex...
2002 Feb 12
1
openssh + pam errors (fwd)
...quired()) packet_disconnect("Password change required but no " @@ -494,6 +493,9 @@ #endif /* USE_PIPES */ /* Do processing for the child (exec command etc). */ +#if defined(USE_PAM) + do_pam_session(s->pw->pw_name, NULL); +#endif /* USE_PAM */ do_child(s, command); /* NOTREACHED */ } @@ -555,7 +557,6 @@ ttyfd = s->ttyfd; #if defined(USE_PAM) - do_pam_session(s->pw->pw_name, s->tty); do_pam_setcred(1); #endif @@ -580,6 +581,9 @@ /* Close the extra descriptor for the pseudo tty. */ close(ttyfd); +#if defined(USE_PAM) + do_pam_session(s->pw-...
2003 Sep 16
1
OpenSSH Security Advisory: buffer.adv
...if (newlen > 0xa00000) fatal("buffer_append_space: alloc %u not supported", - buffer->alloc); - buffer->buf = xrealloc(buffer->buf, buffer->alloc); + newlen); + buffer->buf = xrealloc(buffer->buf, newlen); + buffer->alloc = newlen; goto restart; /* NOTREACHED */ }
2004 Jun 22
3
[Q] GET_DIM() crash on Windows only
...ROTECT(1); return nX; } SEXP getdim(SEXP vntX) { SEXP vntOut; int m, n; #ifdef DEBUG_GETDIM REprintf("In getdim(x)...\n"); #endif if (GetMatrixDimen(vntX, &m, &n) != 2) { error("'x' is not a two dimensional matrix"); /*NOTREACHED*/ } #ifdef DEBUG_GETDIM REprintf("\tm = %d\n", m); REprintf("\tn = %d\n", n); #endif PROTECT(vntOut = NEW_INTEGER(2)); INTEGER(vntOut)[0] = m; INTEGER(vntOut)[1] = n; UNPROTECT(1); return vntOut; } tests/getdim.R -------------- library(getd...
2002 Jul 17
2
[Patch] SSH through HTTP proxy using CONNECT
...usage(); - if (strchr("eilcmpLRDo", opt)) { /* options with arguments */ + if (strchr("eilcmpLRDor", opt)) { /* options with arguments */ optarg = av[optind] + 2; if (strcmp(optarg, "") == 0) { if (optind >= ac - 1) @@ -481,6 +482,15 @@ /* NOTREACHED */ } add_local_forward(&options, fwd_port, buf, fwd_host_port); + break; + case 'r': + if (sscanf(optarg, "%255[^:]:%u", buf, + &options.proxy_port) != 2) { + fprintf(stderr, "Bad HTTP proxy '%s'.\n", optarg); + usage(); + /*...
2003 Sep 16
5
OpenSSH Security Advisory: buffer.adv
...if (newlen > 0xa00000) fatal("buffer_append_space: alloc %u not supported", - buffer->alloc); - buffer->buf = xrealloc(buffer->buf, buffer->alloc); + newlen); + buffer->buf = xrealloc(buffer->buf, newlen); + buffer->alloc = newlen; goto restart; /* NOTREACHED */ }
2019 Feb 20
3
[PATCH 0/2] Cygwin: allow user and group case-insensitive Unicode strings
Windows usernames are case-insensitive and almost any Unicode character is allowed in a username. The user should be able to login with her username given in any case and not be refused. However, this opens up a security problem in terms of the sshd_config Match rules. The match rules for user and group names have to operate case-insensitive as well, otherwise the user can override her settings
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
...ouldn't fork: %s", strerror(errno)); + + if (pid == 0) { + permanently_set_uid(pw); + if (geteuid() == 0) + execl(PASSWD_PROGRAM_PATH, PASSWD_PROGRAM_PATH, + pw->pw_name, (char *)NULL); + else + execl(PASSWD_PROGRAM_PATH, PASSWD_PROGRAM_PATH, + (char *)NULL); + + /* NOTREACHED: execl shouldn't return */ + fatal("Couldn't exec %s", PASSWD_PROGRAM_PATH); + exit(1); + } + + if (waitpid(pid, &status, 0) == -1) + fatal("Couldn't wait for child: %s", strerror(errno)); + mysignal(SIGCHLD, old_signal); + + if (WIFEXITED(status) &&...
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
...ouldn't fork: %s", strerror(errno)); + + if (pid == 0) { + permanently_set_uid(pw); + if (geteuid() == 0) + execl(PASSWD_PROGRAM_PATH, PASSWD_PROGRAM_PATH, + pw->pw_name, (char *)NULL); + else + execl(PASSWD_PROGRAM_PATH, PASSWD_PROGRAM_PATH, + (char *)NULL); + + /* NOTREACHED: execl shouldn't return */ + fatal("Couldn't exec %s", PASSWD_PROGRAM_PATH); + exit(1); + } + + if (waitpid(pid, &status, 0) == -1) + fatal("Couldn't wait for child: %s", strerror(errno)); + mysignal(SIGCHLD, old_signal); + + if (WIFEXITED(status) &&...
2002 May 22
0
[PATCH] connect() timeout
...lforwardings", oClearAllForwardings }, { "nohostauthenticationforlocalhost", oNoHostAuthenticationForLocalhost }, + { "connecttimeout", oConnectTimeout }, { NULL, oBadOption } }; @@ -294,6 +296,19 @@ /* don't panic, but count bad options */ return -1; /* NOTREACHED */ + + case oConnectTimeout: + intptr = &options->connection_timeout; +parse_time: + arg = strdelim(&s); + if (!arg || *arg == '\0') + fatal("%.200s line %d: Missing time argument.", filename, linenum); + if ((value = convtime(arg)) == -1) + fatal("%.200s...
2002 Feb 18
1
fixes for bugs in error handling in rsync-2.5.2; and updates for rsync3.txt
...tart_client(argc, argv); if (ret == -1) ! exit_cleanup(RERR_STARTCLIENT); else ! exit_cleanup(ret); ! return ret; } --- 880,889 ---- ret = start_client(argc, argv); if (ret == -1) ! exit_cleanup(RERR_STARTCLIENT); else ! exit_cleanup(ret); ! ! exit(ret); ! /* NOTREACHED */ } Index: rsync3.txt =================================================================== RCS file: /cvsroot/rsync/rsync3.txt,v retrieving revision 1.3 diff -c -r1.3 rsync3.txt *** rsync3.txt 12 Sep 2001 14:35:39 -0000 1.3 --- rsync3.txt 18 Feb 2002 00:39:34 -0000 *************** *** 192,199 *...