Displaying 10 results from an estimated 10 matches for "timeout_".
Did you mean:
timeout
2020 May 14
1
system(timeout=) may timeout with 0 exit code
...EMERGENCY_TIMEOUT 20
kicked in, adding 20 seconds.
I don't have a reproducible example, but following code, and output
file below should be enough to ensure that there is a problem there
(exit code 0 despite timeout).
warn = NULL
p = proc.time()[[3L]]
tryCatch(
ret <- system(cmd, timeout=timeout_s),
warning = function(w) {
warn <<- w[["message"]]
}
)
if (length(warn) && ret==0L)
cat(sprintf("command '%s' timed out(?) but still exited with 0 code,
timeout %ss, took %ss, warning '%s'\n",
cmd, timeout_s, proc.time()[[3L]...
2015 May 23
5
Name based SSH proxy
...h-6.6p1/roaming_client.c
--- openssh-6.6p1/roaming_client.c.original 2014-01-10 00:58:53.000000000 +0100
+++ openssh-6.6p1/roaming_client.c 2015-05-23 12:58:12.193450191 +0200
@@ -147,7 +147,7 @@ roaming_resume(void)
resume_in_progress = 1;
/* Exchange banners */
- ssh_exchange_identification(timeout_ms);
+ ssh_exchange_identification(timeout_ms, "");
packet_set_nonblocking();
/* Send a kexinit message with resume at appgate.com as only kex algo */
diff -up openssh-6.6p1/sshconnect.c.original openssh-6.6p1/sshconnect.c
--- openssh-6.6p1/sshconnect.c.original 2015-05-23 11:56:55.2...
2019 Jul 17
1
Re: [PATCH libnbd] examples: Include an example of integrating with the glib main loop.
...| 9 +
> examples/Makefile.am | 22 ++
> examples/glib-main-loop.c | 501 ++++++++++++++++++++++++++++++++++++++
> 5 files changed, 535 insertions(+)
>
Rough review (since I've never used a glib main loop before)...
> +static gboolean
> +prepare (GSource *sp, gint *timeout_)
> +{
> + struct NBDSource *source = (struct NBDSource *) sp;
> +
> + /* When the NBD handle moves out of the created state (which means
> + * that it first has a socket associated with it) we must initialize
> + * and register the pollfd.
> + */
> + if (!source->...
2019 Jul 15
0
[PATCH libnbd] examples: Include an example of integrating with the glib main loop.
...rom_nbd (struct nbd_handle *nbd)
+{
+ int dir = nbd_aio_get_direction (nbd);
+ int r = 0;
+
+ if ((dir & LIBNBD_AIO_DIRECTION_READ) != 0)
+ r |= G_IO_IN;
+ if ((dir & LIBNBD_AIO_DIRECTION_WRITE) != 0)
+ r |= G_IO_OUT;
+ return r;
+}
+
+static gboolean
+prepare (GSource *sp, gint *timeout_)
+{
+ struct NBDSource *source = (struct NBDSource *) sp;
+
+ /* When the NBD handle moves out of the created state (which means
+ * that it first has a socket associated with it) we must initialize
+ * and register the pollfd.
+ */
+ if (!source->poll_registered && !nbd_aio_is_...
2019 Jul 15
2
[PATCH libnbd] examples: Include an example of integrating with the glibc main loop.
** NOT WORKING **
This patch shows how to integrate libnbd and the glib main loop.
Posted mainly as a point of discussion as it doesn't quite work yet.
Rich.
2019 Jul 17
0
[PATCH libnbd v2] examples: Include an example of integrating with the glib main loop.
...rom_nbd (struct nbd_handle *nbd)
+{
+ int dir = nbd_aio_get_direction (nbd);
+ int r = 0;
+
+ if ((dir & LIBNBD_AIO_DIRECTION_READ) != 0)
+ r |= G_IO_IN;
+ if ((dir & LIBNBD_AIO_DIRECTION_WRITE) != 0)
+ r |= G_IO_OUT;
+ return r;
+}
+
+static gboolean
+prepare (GSource *sp, gint *timeout_)
+{
+ struct NBDSource *source = (struct NBDSource *) sp;
+ int new_fd;
+ int events;
+
+ /* The poll file descriptor can change or become invalid at any
+ * time.
+ */
+ new_fd = nbd_aio_get_fd (source->nbd);
+ if (source->fd != new_fd) {
+ if (source->tag != NULL) {
+ g...
2019 Jul 17
2
[PATCH libnbd v2] examples: Include an example of integrating with glib main loop.
This is working now, and incorporates all of the changes in Eric's
review, *except* that it still doesn't retire commands (although this
seems to make no obvious difference, except possibly a performance and
memory impact).
Rich.
2015 May 26
2
Name based SSH proxy
...achieve what I
am looking for.
diff -up openssh-6.6p1/sshconnect.c.original openssh-6.6p1/sshconnect.c
--- openssh-6.6p1/sshconnect.c.original 2015-05-23 11:56:55.235217137 +0200
+++ openssh-6.6p1/sshconnect.c 2015-05-27 01:14:02.563652677 +0200
@@ -560,6 +560,9 @@ ssh_exchange_identification(int timeout_
if (options.protocol == SSH_PROTO_2) {
enable_compat20();
send_client_banner(connection_out, 0);
+ packet_send_ignore(0);
+ packet_send();
+ packet_write_wait();
client_banner_sent = 1;
}
The question then is, would the security implications of
adding these three lines be much wors...
2015 May 26
6
Name based SSH proxy
On 26/05/15 15.50, Daniel Kahn Gillmor wrote:
> The argument that the DNS lookup leaks this metadata is a bad argument:
> if we followed this line of reasoning, then every problem that has
> multiple contributors could never be solved (A says "but my fixing
> things is useless if B does nothing", while B says "but my fixing things
> is useless if A does nothing"
2020 Feb 04
0
Always Be Conferencing v16e - pure AEL-based dial plan solution
...${type_},,,,,);
return;
}
/* PUBLIC */
/* SMH but IANAL */
macro pngnpbx-abc-tincan(type_) {
&pngnpbx-abc-init(${type_},,,,,tincan);
return;
}
/* PUBLIC */
/* The "init" macro (re)sets up several things for the conference room. */
macro pngnpbx-abc-init(type_,record_,conftimeout_,abcid_,announce_,tincan_) {
Set(LOCAL(startstamp)=${STRFTIME(,UTC,%F %H:%M:%S.%3q)} UTC);
local cnftmt=;
DumpChan(5);
if( ${LEN(${type_})} > 0 ) {
Set(pngnpbx_abc_type=${type_});
} else {
Set(pngnpbx_abc_type=default);
}
Set(CHANNEL(accountcode)=${pngn...