Displaying 20 results from an estimated 1000 matches similar to: "Explication for ast_safe_system"
2019 Aug 27
2
[PATCH nbdkit] sh: Remove assert and replace with smarter file descriptor duplication. (was: Re: [nbdkit PATCH v2 14/17] sh: Use pipe2 with CLOEXEC when possible)
On Fri, Aug 02, 2019 at 02:26:15PM -0500, Eric Blake wrote:
> + /* Ensure that stdin/out/err of the current process were not empty
> + * before we started creating pipes (otherwise, the close and dup2
> + * calls below become more complex to juggle fds around correctly).
> + */
> + assert (in_fd[0] > STDERR_FILENO && in_fd[1] > STDERR_FILENO &&
> +
2023 Feb 15
1
[libnbd PATCH v3 07/29] lib/utils: add async-signal-safe assert()
On Wed, Feb 15, 2023 at 03:11:36PM +0100, Laszlo Ersek wrote:
> Add an assert() variant that we may call between fork() and exec*().
>
> Signed-off-by: Laszlo Ersek <lersek at redhat.com>
> ---
>
> +++ b/lib/internal.h
> +
> +#ifdef NDEBUG
> +#define NBD_INTERNAL_FORK_SAFE_ASSERT(expression) ((void)0)
May be affected by outcome of side discussion on 01/29
2019 Aug 27
1
Re: [PATCH nbdkit] sh: Remove assert and replace with smarter file descriptor duplication. (was: Re: [nbdkit PATCH v2 14/17] sh: Use pipe2 with CLOEXEC when possible)
On 8/27/19 7:55 AM, Eric Blake wrote:
> On 8/27/19 6:47 AM, Richard W.M. Jones wrote:
>> On Fri, Aug 02, 2019 at 02:26:15PM -0500, Eric Blake wrote:
>>> + /* Ensure that stdin/out/err of the current process were not empty
>>> + * before we started creating pipes (otherwise, the close and dup2
>>> + * calls below become more complex to juggle fds around
2023 Feb 20
2
[libnbd PATCH v3 07/29] lib/utils: add async-signal-safe assert()
On 2/15/23 21:57, Eric Blake wrote:
> On Wed, Feb 15, 2023 at 03:11:36PM +0100, Laszlo Ersek wrote:
>> Add an assert() variant that we may call between fork() and exec*().
>>
>> Signed-off-by: Laszlo Ersek <lersek at redhat.com>
>> ---
>>
>
>> +++ b/lib/internal.h
>
>> +
>> +#ifdef NDEBUG
>> +#define
2011 Aug 07
2
[PATCH] kinit minor checkpatch cleanup
coding style fixes.
FIXME: check that compiled bin the same1!!
---
usr/kinit/initrd.c | 3 ++-
usr/kinit/kinit.c | 12 ++++--------
usr/kinit/kinit.h | 20 ++++++++++----------
usr/kinit/name_to_dev.c | 6 +++---
usr/kinit/nfsroot.c | 5 ++---
5 files changed, 21 insertions(+), 25 deletions(-)
diff --git a/usr/kinit/initrd.c b/usr/kinit/initrd.c
index
2023 Feb 21
1
[libnbd PATCH v3 07/29] lib/utils: add async-signal-safe assert()
On 2/20/23 19:21, Laszlo Ersek wrote:
> On 2/15/23 21:57, Eric Blake wrote:
>> On Wed, Feb 15, 2023 at 03:11:36PM +0100, Laszlo Ersek wrote:
>>> +
>>> + xwrite (STDERR_FILENO, file, strlen (file));
>>> + xwrite (STDERR_FILENO, ":", 1);
>>
>> Presumably, if our first best-effort xwrite() fails to produce full
>> output, all later
2023 Feb 24
1
[libnbd PATCH v3 07/29] lib/utils: add async-signal-safe assert()
On 2/21/23 07:33, Laszlo Ersek wrote:
> On 2/20/23 19:21, Laszlo Ersek wrote:
>> On 2/15/23 21:57, Eric Blake wrote:
>>> On Wed, Feb 15, 2023 at 03:11:36PM +0100, Laszlo Ersek wrote:
>
>>>> +
>>>> + xwrite (STDERR_FILENO, file, strlen (file));
>>>> + xwrite (STDERR_FILENO, ":", 1);
>>>
>>> Presumably, if our
2017 Oct 09
5
Why dup()?
Hello all,
My scripts, which read stdout from ssh, weren't seeing EOF from the
remote session.? It was being sent, but lost.? I tracked it down to the
following code, in ssh.c, at ssh_session2_open:
??????? if (stdin_null_flag) {
??????????????? in = open(_PATH_DEVNULL, O_RDONLY);
??????? } else {
??????????????? in = dup(STDIN_FILENO);
??????? }
??????? out = dup(STDOUT_FILENO);
2019 Aug 27
1
[PATCH nbdkit] server: Try hard to maintain invariant that fds 0, 1 and 2 are always open.
https://www.redhat.com/archives/libguestfs/2019-August/thread.html#00347
Thanks: Eric Blake and Daniel P. Berrangé
---
common/utils/utils.h | 1 +
server/connections.c | 4 ++--
server/crypto.c | 5 +++--
server/main.c | 23 +++++++++++++++++++++++
common/utils/utils.c | 29 +++++++++++++++++++++++++++++
5 files changed, 58 insertions(+), 4 deletions(-)
diff --git
2020 Apr 14
3
Re: [nbdkit PATCH v2 1/3] server: Add nbdkit_stdio_safe
On Mon, Apr 13, 2020 at 07:28:59PM -0500, Eric Blake wrote:
[...]
This patch is fine and can be pushed if you want, but I've got some
small comments.
> +If C<nbdkit_stdio_safe> returns true, the value of the configuration
> +parameter may be used to trigger reading additional data through stdin
> +(such as a password or inline script).
I wonder if we want to say "returns
2011 Jan 06
1
Dovecot 2.0.7 doesn't disassociate STDERR when it daemonizes.
At least it appears that way on my FreeBSD 8.1 system. This is probably
unnoticeable in regular use but I happen to use CFengine(v2) for system
configuration & monitoring. If it notices dovecot not running it tries
to start it and hangs.
I believe cfengine (cfagent) has created a pipe to monitor the start
commmand's stderr and is waiting for this pipe to close. This never
happens
2017 Oct 20
3
Why dup()?
I've been using ssh without it duping stdout and stderr, and had no
problems.? I think this change should be made to the master source.
WHAT IS THE PROBLEM WITH SSH RIGHT NOW?
It duplicates FILENO_STDOUT and FILENO_STDERR, thus there are two
descriptors for each of these files.? When the remote program closes its
stdout or stderr, the remote sshd sends the appropriate message to the
local
2011 Feb 07
1
[PATCH] ssh: set proctitle for mux master
Preserving the command line from the invoking ssh command doesn't
make much sense, so use setproctitle() to hide the arguments.
---
ssh.c | 20 +++++++++++++++++---
1 files changed, 17 insertions(+), 3 deletions(-)
diff --git a/ssh.c b/ssh.c
index d32ef78..8ebcc88 100644
--- a/ssh.c
+++ b/ssh.c
@@ -230,12 +230,25 @@ main(int ac, char **av)
struct servent *sp;
Forward fwd;
- /* Ensure
2019 Aug 27
0
Re: [PATCH nbdkit] sh: Remove assert and replace with smarter file descriptor duplication. (was: Re: [nbdkit PATCH v2 14/17] sh: Use pipe2 with CLOEXEC when possible)
On 8/27/19 6:47 AM, Richard W.M. Jones wrote:
> On Fri, Aug 02, 2019 at 02:26:15PM -0500, Eric Blake wrote:
>> + /* Ensure that stdin/out/err of the current process were not empty
>> + * before we started creating pipes (otherwise, the close and dup2
>> + * calls below become more complex to juggle fds around correctly).
>> + */
>> + assert (in_fd[0] >
2015 Dec 02
3
[PATCH] daemon: improve internal commandrvf
- add a flag to request chroot for the process, which is done only as
very last (before chdir) operation before exec'ing the process in the
child: this avoids using CHROOT_IN & CHROOT_OUT around command*
invocations, and reduces the code spent in chroot mode
- add failure checks for dup2 and open done in child, not proceeding to
executing the process if they fail
- open /dev/null
2012 Sep 18
3
ommoting rows
Hi I have an output data Data.csv
this style:
,"V1","V2","V3" 1,"-9552","9552","C" 2,"0","9653","0"
3,"9614","9614","V" 4,"0","9527","0" 5,"-9752","9752","C"
6,"0","9883","0"
2019 Nov 07
0
net ads join explication ?
In addition to Rowland's comment.
What i dont get here.
Your running Debian Bullseye. (i hope not in production)
You didnt update it. ( samba 4.9.13 is set and not the current one for bullseye (samba 4.11.1-2)
Bullseye = testing, and believe me, testing has more problems then unstable..
So would start with running :
apt-get dist-upgrade
Then you configs, these dont look bad, but you
2019 Nov 07
2
net ads join explication ?
My Dc is under linux - my version of linux is 5.2.0-3-amd64
My client os is also under linux et the version is 5.2.0-2-amd64. I have
also client windows10.
I put the result of the test
Collected config? --- 2019-11-07-13:14 -----------
Hostname: clientblues2
DNS Domain: sambadom.calais.fr
FQDN: clientblues2.sambadom.calais.fr
ipaddress: 192.168.xx.233
-----------
Kerberos SRV
2007 Dec 26
1
sshd's -e doesn't work as expected
Hello,
I'm running a sshd server using the -e flag so that I can capture its
whole output and later send it to the user. I'm also setting LogLevel
to DEBUG1 in the configuration file and I don't want to disturb syslogd.
But the problem is that it doesn't work as expected (or as I expect,
which I think should be the correct behavior). The log file ends up
being empty because the
2019 Aug 27
0
[nbdkit PATCH] server: Enforce sane stdin/out/err
Refuse to run if stdin/out/err start life closed. stdin/out are
essential when using -s (if they aren't present, we want to fail
fast), and should remain unused otherwise (but ensuring they are open
means we don't have to worry about other fd creation events
accidentally colliding). We also want to ensure that nothing opens
into the slot for stderr, as any error message we produce might