search for: pselect6

Displaying 17 results from an estimated 17 matches for "pselect6".

2023 Jan 26
0
[klibc:time64] select: Make all select calls wrappers for pselect6()
...it;h=567944d04b7a94c7518857f518378191f6bb4046 Author: Ben Hutchings <ben at decadent.org.uk> AuthorDate: Sat, 14 Jan 2023 02:10:01 +0100 Committer: Ben Hutchings <ben at decadent.org.uk> CommitDate: Sun, 15 Jan 2023 21:28:18 +0100 [klibc] select: Make all select calls wrappers for pselect6() select() and pselect() don't have direct replacements that use 64-bit time on 32-bit architectures. Instead, we have to use the pselect6() system call which uses a different buffer structure. In preparation for using 64-bit time everywhere: - Make pselect6() a required system call - Make...
2023 Jun 13
1
Upssched 100% CPU after updating Debian 12
...ms that lack `usleep()`. With `select()` in your capture posting an array of FDs `[7 10]` I'd say it is the parent loop, and one of those is the `pipefd` and another is the FD for socket connection to talk to a particular child on the other side of the pipe. Here I must guess that either the `pselect6()` implementation behaves differently which would be surprising after decades worth of expected behavior, or that it for some reason decides that the FD #7 (whoever that is) raised the hand but was then silent (0 bytes read). The next clue is 128 reads, which leads to https://github.com/networkups...
2023 Jun 13
1
Upssched 100% CPU after updating Debian 12
...ms that lack `usleep()`. With `select()` in your capture posting an array of FDs `[7 10]` I'd say it is the parent loop, and one of those is the `pipefd` and another is the FD for socket connection to talk to a particular child on the other side of the pipe. Here I must guess that either the `pselect6()` implementation behaves differently which would be surprising after decades worth of expected behavior, or that it for some reason decides that the FD #7 (whoever that is) raised the hand but was then silent (0 bytes read). The next clue is 128 reads, which leads to https://github.com/networkups...
2023 Jun 13
1
Upssched 100% CPU after updating Debian 12
Hi, I ran the strace command while upssched was 100% CPU hungry. This is what I got: 1686633611.702798 read(7, "", 1) = 0 <0.000004> 1686633611.702816 read(7, "", 1) = 0 <0.000004> 1686633611.702834 pselect6(11, [7 10], NULL, NULL, {tv_sec=1, tv_nsec=0}, NULL) = 1 (in [7], left {tv_sec=0, tv_nsec=999998800}) <0.000006> 1686633611.702862 read(7, "", 1) = 0 <0.000004> 1686633611.702880 read(7, "", 1) = 0 <0.000004> . . . 1686633611.705206 read(7, "...
2023 Jun 13
1
Upssched 100% CPU after updating Debian 12
Hi, I ran the strace command while upssched was 100% CPU hungry. This is what I got: 1686633611.702798 read(7, "", 1) = 0 <0.000004> 1686633611.702816 read(7, "", 1) = 0 <0.000004> 1686633611.702834 pselect6(11, [7 10], NULL, NULL, {tv_sec=1, tv_nsec=0}, NULL) = 1 (in [7], left {tv_sec=0, tv_nsec=999998800}) <0.000006> 1686633611.702862 read(7, "", 1) = 0 <0.000004> 1686633611.702880 read(7, "", 1) = 0 <0.000004> . . . 1686633611.705206 read(7, "...
2015 Mar 05
31
[Bug 2361] New: seccomp filter (not only) for aarch64
...t exist openssh will not build) * open is not on aarch64, openat exists also on primary architectures * stat is never used, x86_64 is using fstat, ix86 and arm is using fstat64 and stat64 => whitelisting, aarch64 is using fstat and newfstatat * poll, select are not available on aarch64 * pselect6 is used instead of select (see attached patch) This patch was tested and is currently used in Fedora. We plan to add support for other architectures sooner or later. Further discussion welcome. I'm also appending table with syscall names and numbers I collected during my testing and which...
2023 Jun 13
2
Upssched 100% CPU after updating Debian 12
...; With `select()` in your capture posting an array of FDs `[7 10]` I'd say > it is the parent loop, and one of those is the `pipefd` and another is the > FD for socket connection to talk to a particular child on the other side of > the pipe. > > Here I must guess that either the `pselect6()` implementation behaves > differently which would be surprising after decades worth of expected > behavior, or that it for some reason decides that the FD #7 (whoever that > is) raised the hand but was then silent (0 bytes read). > > The next clue is 128 reads, which leads to >...
2023 Jun 13
2
Upssched 100% CPU after updating Debian 12
...; With `select()` in your capture posting an array of FDs `[7 10]` I'd say > it is the parent loop, and one of those is the `pipefd` and another is the > FD for socket connection to talk to a particular child on the other side of > the pipe. > > Here I must guess that either the `pselect6()` implementation behaves > differently which would be surprising after decades worth of expected > behavior, or that it for some reason decides that the FD #7 (whoever that > is) raised the hand but was then silent (0 bytes read). > > The next clue is 128 reads, which leads to >...
2023 Jan 14
1
[klibc:time64] time: Use 64-bit time types on all architectures
...int inotify_init(); <?> int inotify_add_watch(int, const char *, __u32); <?> int inotify_rm_watch(int, __u32); @@ -165,9 +166,11 @@ int dup3(int, int, int); <!i386,ppc64> int fcntl64,fcntl::fcntl(int, int, unsigned long); int ioctl(int, int, void *); int flock(int, int); -int pselect6::__pselect6(int, fd_set *, fd_set *, fd_set *, struct timespec *, const struct __pselect6 *); +<32> int pselect6_time64::__pselect6(int, fd_set *, fd_set *, fd_set *, struct timespec *, const struct __pselect6 *); +<64> int pselect6::__pselect6(int, fd_set *, fd_set *, fd_set *, struct...
2020 Oct 14
2
Connection hang, can't stop SSH
...ity) a Rekey. Now I can see my TCP side hanging with about 4KB in the socket buffers - but the SSH process (that previously reacted fine upon my EscapeChar) now is completely dead. - EscapeChar doesn't work - Ctrl-Z doesn't work - Ctrl-C doesn't work strace shows ssh hanging in pselect6(8, [3], [], NULL, NULL, NULL... So yeah, my fault for trying a rekey on a broken connection... but I'd have thought that my EscapeChar stays available, so that I can easily get my terminal back! (Yeah, I can just kill ssh from another. But what if it was my last terminal after breaking the ss...
2019 Oct 31
37
[Bug 3085] New: seccomp issue after upgrading openssl
https://bugzilla.mindrot.org/show_bug.cgi?id=3085 Bug ID: 3085 Summary: seccomp issue after upgrading openssl Product: Portable OpenSSH Version: 8.1p1 Hardware: Other OS: Linux Status: NEW Severity: critical Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org
2013 Nov 08
0
[PATCH 2/3] syscalls: Add syscalls needed by arm64
...#if defined(__NR_pselect) && !_KLIBC_USE_RT_SIG int pselect(int, fd_set *, fd_set *, fd_set *, const struct timespec *, const sigset_t *); #elif defined(__NR_pselect7) @@ -181,7 +182,7 @@ int pselect7::__pselect7(int, fd_set *, fd_set *, fd_set *, struct timespec *, c #elif defined(__NR_pselect6) int pselect6::__pselect6(int, fd_set *, fd_set *, fd_set *, struct timespec *, const struct __pselect6 *); #endif -int poll(struct pollfd *, nfds_t, long); +<?> int poll(struct pollfd *, nfds_t, long); <?> int ppoll::__ppoll(struct pollfd *, nfds_t, struct timespec *, const sigset_t...
2013 Nov 12
0
[klibc:master] syscalls: Add syscalls needed by arm64
...#if defined(__NR_pselect) && !_KLIBC_USE_RT_SIG int pselect(int, fd_set *, fd_set *, fd_set *, const struct timespec *, const sigset_t *); #elif defined(__NR_pselect7) @@ -181,7 +182,7 @@ int pselect7::__pselect7(int, fd_set *, fd_set *, fd_set *, struct timespec *, c #elif defined(__NR_pselect6) int pselect6::__pselect6(int, fd_set *, fd_set *, fd_set *, struct timespec *, const struct __pselect6 *); #endif -int poll(struct pollfd *, nfds_t, long); +<?> int poll(struct pollfd *, nfds_t, long); <?> int ppoll::__ppoll(struct pollfd *, nfds_t, struct timespec *, const sigset_t...
2013 Nov 11
5
[PATCH V2 0/3] Introduce arm64 support
Hello, Here is V2 of the arm64 support for klibc patch set. Notable changes since the original series: * fp regs dropped from setjmp/longjmp * chmod, lstat and stat re-implemented with *at functions. * open64 merged into open. As with the original, this series is to be applied against the latest klibc, just after 25a66fa README.klibc: update build information V2 has been tested on x86_64
2013 Nov 08
9
[PATCH 0/3] Introduce arm64 support
Hello, This series introduces arm64 support to klibc. I've rebased the work from Neil Williams and Anil Singhar into the following three patches. Most of the code changes are due to new syscall implementations being needed for arm64 as a only a minimal set of syscalls are defined in the arm64 kernel. This series is to be applied against the latest klibc, just after 25a66fa README.klibc:
2013 Aug 21
0
Build problems: klibc with Linux 3.10.7
...D: rt_sigaction SYSCALL FOUND: timer_delete SYSCALL FOUND: munmap SYSCALL FOUND: mremap SYSCALL FOUND: shutdown SYSCALL FOUND: epoll_create1 SYSCALL FOUND: readlinkat SYSCALL FOUND: fchmodat SYSCALL FOUND: chroot SYSCALL FOUND: lgetxattr SYSCALL FOUND: preadv SYSCALL FOUND: getresgid SYSCALL FOUND: pselect6 SYSCALL FOUND: pciconfig_write SYSCALL FOUND: getsockname SYSCALL FOUND: eventfd SYSCALL FOUND: setitimer SYSCALL FOUND: sched_get_priority_max SYSCALL FOUND: getcpu SYSCALL FOUND: sendfile SYSCALL FOUND: pipe2 SYSCALL FOUND: acct SYSCALL FOUND: afs_syscall SYSCALL FOUND: get_mempolicy SYSCALL FOUN...
2013 Aug 21
5
Build problems: klibc with Linux 3.10.7
On Tue, Aug 20, 2013 at 07:44:39AM +0200, leroy christophe wrote: > > > Find attached two patches I have in order to build klibc 2.0.2 > against kernel 3.8.13 > We had to introduce those patches when going from kernel 3.6 to kernel 3.7 > Hope it helps. > those patches are wrong and again very brittle. just use the way it is described in `make help': A) cd ~/src/linux