Displaying 17 results from an estimated 17 matches for "pselect6".
2023 Jan 26
0
[klibc:time64] select: Make all select calls wrappers for pselect6()
...it;h=567944d04b7a94c7518857f518378191f6bb4046
Author: Ben Hutchings <ben at decadent.org.uk>
AuthorDate: Sat, 14 Jan 2023 02:10:01 +0100
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Sun, 15 Jan 2023 21:28:18 +0100
[klibc] select: Make all select calls wrappers for pselect6()
select() and pselect() don't have direct replacements that use 64-bit
time on 32-bit architectures. Instead, we have to use the pselect6()
system call which uses a different buffer structure.
In preparation for using 64-bit time everywhere:
- Make pselect6() a required system call
- Make...
2023 Jun 13
1
Upssched 100% CPU after updating Debian 12
...ms that lack `usleep()`.
With `select()` in your capture posting an array of FDs `[7 10]` I'd say it
is the parent loop, and one of those is the `pipefd` and another is the FD
for socket connection to talk to a particular child on the other side of
the pipe.
Here I must guess that either the `pselect6()` implementation behaves
differently which would be surprising after decades worth of expected
behavior, or that it for some reason decides that the FD #7 (whoever that
is) raised the hand but was then silent (0 bytes read).
The next clue is 128 reads, which leads to
https://github.com/networkups...
2023 Jun 13
1
Upssched 100% CPU after updating Debian 12
...ms that lack `usleep()`.
With `select()` in your capture posting an array of FDs `[7 10]` I'd say it
is the parent loop, and one of those is the `pipefd` and another is the FD
for socket connection to talk to a particular child on the other side of
the pipe.
Here I must guess that either the `pselect6()` implementation behaves
differently which would be surprising after decades worth of expected
behavior, or that it for some reason decides that the FD #7 (whoever that
is) raised the hand but was then silent (0 bytes read).
The next clue is 128 reads, which leads to
https://github.com/networkups...
2023 Jun 13
1
Upssched 100% CPU after updating Debian 12
Hi,
I ran the strace command while upssched was 100% CPU hungry. This is what I got:
1686633611.702798 read(7, "", 1) = 0 <0.000004>
1686633611.702816 read(7, "", 1) = 0 <0.000004>
1686633611.702834 pselect6(11, [7 10], NULL, NULL, {tv_sec=1, tv_nsec=0}, NULL) = 1 (in [7], left {tv_sec=0, tv_nsec=999998800}) <0.000006>
1686633611.702862 read(7, "", 1) = 0 <0.000004>
1686633611.702880 read(7, "", 1) = 0 <0.000004>
.
.
.
1686633611.705206 read(7, "...
2023 Jun 13
1
Upssched 100% CPU after updating Debian 12
Hi,
I ran the strace command while upssched was 100% CPU hungry. This is what I got:
1686633611.702798 read(7, "", 1) = 0 <0.000004>
1686633611.702816 read(7, "", 1) = 0 <0.000004>
1686633611.702834 pselect6(11, [7 10], NULL, NULL, {tv_sec=1, tv_nsec=0}, NULL) = 1 (in [7], left {tv_sec=0, tv_nsec=999998800}) <0.000006>
1686633611.702862 read(7, "", 1) = 0 <0.000004>
1686633611.702880 read(7, "", 1) = 0 <0.000004>
.
.
.
1686633611.705206 read(7, "...
2015 Mar 05
31
[Bug 2361] New: seccomp filter (not only) for aarch64
...t exist openssh will not build)
* open is not on aarch64, openat exists also on primary architectures
* stat is never used, x86_64 is using fstat, ix86 and arm is using
fstat64 and stat64 => whitelisting, aarch64 is using fstat and
newfstatat
* poll, select are not available on aarch64
* pselect6 is used instead of select
(see attached patch)
This patch was tested and is currently used in Fedora.
We plan to add support for other architectures sooner or later. Further
discussion welcome.
I'm also appending table with syscall names and numbers I collected
during my testing and which...
2023 Jun 13
2
Upssched 100% CPU after updating Debian 12
...; With `select()` in your capture posting an array of FDs `[7 10]` I'd say
> it is the parent loop, and one of those is the `pipefd` and another is the
> FD for socket connection to talk to a particular child on the other side of
> the pipe.
>
> Here I must guess that either the `pselect6()` implementation behaves
> differently which would be surprising after decades worth of expected
> behavior, or that it for some reason decides that the FD #7 (whoever that
> is) raised the hand but was then silent (0 bytes read).
>
> The next clue is 128 reads, which leads to
>...
2023 Jun 13
2
Upssched 100% CPU after updating Debian 12
...; With `select()` in your capture posting an array of FDs `[7 10]` I'd say
> it is the parent loop, and one of those is the `pipefd` and another is the
> FD for socket connection to talk to a particular child on the other side of
> the pipe.
>
> Here I must guess that either the `pselect6()` implementation behaves
> differently which would be surprising after decades worth of expected
> behavior, or that it for some reason decides that the FD #7 (whoever that
> is) raised the hand but was then silent (0 bytes read).
>
> The next clue is 128 reads, which leads to
>...
2023 Jan 14
1
[klibc:time64] time: Use 64-bit time types on all architectures
...int inotify_init();
<?> int inotify_add_watch(int, const char *, __u32);
<?> int inotify_rm_watch(int, __u32);
@@ -165,9 +166,11 @@ int dup3(int, int, int);
<!i386,ppc64> int fcntl64,fcntl::fcntl(int, int, unsigned long);
int ioctl(int, int, void *);
int flock(int, int);
-int pselect6::__pselect6(int, fd_set *, fd_set *, fd_set *, struct timespec *, const struct __pselect6 *);
+<32> int pselect6_time64::__pselect6(int, fd_set *, fd_set *, fd_set *, struct timespec *, const struct __pselect6 *);
+<64> int pselect6::__pselect6(int, fd_set *, fd_set *, fd_set *, struct...
2020 Oct 14
2
Connection hang, can't stop SSH
...ity) a Rekey.
Now I can see my TCP side hanging with about 4KB in the socket buffers -
but the SSH process (that previously reacted fine upon my EscapeChar)
now is completely dead.
- EscapeChar doesn't work
- Ctrl-Z doesn't work
- Ctrl-C doesn't work
strace shows ssh hanging in
pselect6(8, [3], [], NULL, NULL, NULL...
So yeah, my fault for trying a rekey on a broken connection... but I'd
have thought that my EscapeChar stays available, so that I can easily
get my terminal back!
(Yeah, I can just kill ssh from another. But what if it was my last
terminal after breaking the ss...
2019 Oct 31
37
[Bug 3085] New: seccomp issue after upgrading openssl
https://bugzilla.mindrot.org/show_bug.cgi?id=3085
Bug ID: 3085
Summary: seccomp issue after upgrading openssl
Product: Portable OpenSSH
Version: 8.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: critical
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2013 Nov 08
0
[PATCH 2/3] syscalls: Add syscalls needed by arm64
...#if defined(__NR_pselect) && !_KLIBC_USE_RT_SIG
int pselect(int, fd_set *, fd_set *, fd_set *, const struct timespec *, const sigset_t *);
#elif defined(__NR_pselect7)
@@ -181,7 +182,7 @@ int pselect7::__pselect7(int, fd_set *, fd_set *, fd_set *, struct timespec *, c
#elif defined(__NR_pselect6)
int pselect6::__pselect6(int, fd_set *, fd_set *, fd_set *, struct timespec *, const struct __pselect6 *);
#endif
-int poll(struct pollfd *, nfds_t, long);
+<?> int poll(struct pollfd *, nfds_t, long);
<?> int ppoll::__ppoll(struct pollfd *, nfds_t, struct timespec *, const sigset_t...
2013 Nov 12
0
[klibc:master] syscalls: Add syscalls needed by arm64
...#if defined(__NR_pselect) && !_KLIBC_USE_RT_SIG
int pselect(int, fd_set *, fd_set *, fd_set *, const struct timespec *, const sigset_t *);
#elif defined(__NR_pselect7)
@@ -181,7 +182,7 @@ int pselect7::__pselect7(int, fd_set *, fd_set *, fd_set *, struct timespec *, c
#elif defined(__NR_pselect6)
int pselect6::__pselect6(int, fd_set *, fd_set *, fd_set *, struct timespec *, const struct __pselect6 *);
#endif
-int poll(struct pollfd *, nfds_t, long);
+<?> int poll(struct pollfd *, nfds_t, long);
<?> int ppoll::__ppoll(struct pollfd *, nfds_t, struct timespec *, const sigset_t...
2013 Nov 11
5
[PATCH V2 0/3] Introduce arm64 support
Hello,
Here is V2 of the arm64 support for klibc patch set.
Notable changes since the original series:
* fp regs dropped from setjmp/longjmp
* chmod, lstat and stat re-implemented with *at functions.
* open64 merged into open.
As with the original, this series is to be applied against the latest
klibc, just after
25a66fa README.klibc: update build information
V2 has been tested on x86_64
2013 Nov 08
9
[PATCH 0/3] Introduce arm64 support
Hello,
This series introduces arm64 support to klibc.
I've rebased the work from Neil Williams and Anil Singhar into the
following three patches. Most of the code changes are due to new
syscall implementations being needed for arm64 as a only a minimal set
of syscalls are defined in the arm64 kernel.
This series is to be applied against the latest klibc, just after
25a66fa README.klibc:
2013 Aug 21
0
Build problems: klibc with Linux 3.10.7
...D: rt_sigaction
SYSCALL FOUND: timer_delete
SYSCALL FOUND: munmap
SYSCALL FOUND: mremap
SYSCALL FOUND: shutdown
SYSCALL FOUND: epoll_create1
SYSCALL FOUND: readlinkat
SYSCALL FOUND: fchmodat
SYSCALL FOUND: chroot
SYSCALL FOUND: lgetxattr
SYSCALL FOUND: preadv
SYSCALL FOUND: getresgid
SYSCALL FOUND: pselect6
SYSCALL FOUND: pciconfig_write
SYSCALL FOUND: getsockname
SYSCALL FOUND: eventfd
SYSCALL FOUND: setitimer
SYSCALL FOUND: sched_get_priority_max
SYSCALL FOUND: getcpu
SYSCALL FOUND: sendfile
SYSCALL FOUND: pipe2
SYSCALL FOUND: acct
SYSCALL FOUND: afs_syscall
SYSCALL FOUND: get_mempolicy
SYSCALL FOUN...
2013 Aug 21
5
Build problems: klibc with Linux 3.10.7
On Tue, Aug 20, 2013 at 07:44:39AM +0200, leroy christophe wrote:
> >
> Find attached two patches I have in order to build klibc 2.0.2
> against kernel 3.8.13
> We had to introduce those patches when going from kernel 3.6 to kernel 3.7
> Hope it helps.
>
those patches are wrong and again very brittle.
just use the way it is described in `make help':
A) cd ~/src/linux