Displaying 3 results from an estimated 3 matches for "wolery".
2000 Aug 22
0
Work around Linux kernel bug provoked by nchan.c (fwd)
I always forget those CC's :((
---------- Forwarded message ----------
Date: Tue, 22 Aug 2000 18:39:14 +0200 (CEST)
From: Igmar Palsenberg <i.palsenberg at jdimedia.nl>
To: zack at wolery.cumb.org
Subject: Re: Work around Linux kernel bug provoked by nchan.c
Hi,
Regarding this bug :
the man page states :
On success, zero is returned. On error, -1 is returned and errno is set
appropriately.
Errors :
ENOTCONN
The specified socket is not connected.
If the other side had clo...
2000 Aug 23
14
Test snapshot
...edhat RPMs. Generate keys at runtime rather than install
time, spec file cleanup.
20000807
- (djm) Set 0755 on binaries during install. Report from Lutz Jaenicke
- (djm) Suppress error messages on channel close shutdown() failurs
works around Linux bug. Patch from Zack Weinberg <zack at wolery.cumb.org>
- (djm) Add some more entropy collection commands from Lutz Jaenicke
20000725
- (djm) Fix autoconf typo: HAVE_BINRESVPORT_AF -> HAVE_BINDRESVPORT_AF
20000721
- (djm) OpenBSD CVS updates:
- markus at cvs.openbsd.org 2000/07/16 02:27:22
[authfd.c authfd.h channels.c clie...
2000 Jul 23
2
Work around Linux kernel bug provoked by nchan.c
The Linux implementation of TCP sockets has a bug which causes
shutdown(sock, SHUT_RD) to fail spuriously (ENOTCONN) if the write
side of the socket has already been shut down. If you are using SSH
port forwarding to tunnel HTTP through a firewall, nchan.c will tickle
this bug once for every HTTP exchange. You will therefore get lots of
useless, annoying error messages:
channel 2: