similar to: [Fwd: HP-UX 11.00 samba 2.2.* smbd SIGSYS in pread]

Displaying 20 results from an estimated 200 matches similar to: "[Fwd: HP-UX 11.00 samba 2.2.* smbd SIGSYS in pread]"

2001 Oct 26
0
HP-UX 11.00 samba 2.2.* smbd SIGSYS in pread
configure determines that my HP-UX 11.00 box has pread (and pwrite) because the linker resolves them to symbols in my libc. however, i don't believe that this system call is implemented in my version of the kernel because smbd dies with a SIGSYS (bad arg to sys call) in libc:pread. my workaround was to override what configure automatically determines ac_cv_func_pread=no \
2001 Mar 14
3
OpenSSH 2.3.0p1: HP-UX 11.00 64-bit
I have encountered a problem with using OpenSSH 2.3.0p1 on 64-bit HP-UX 11.00 systems. This bug does not exhibit itself on any 32-bit HP-UX 11.00 or HP-UX 10.20 systems that I have built 2.3.0p1 on. OpenSSH 2.3.0p1 was built with HPs ANSI C compiler with OpenSSL 0.9.6 and zlib 1.1.3. The problem is with the call to vhangup(2) in sshd when interactive sessions are started. The problem does not
2009 Apr 19
0
crash on 7.2-RC1 when inserting an empty DVD: supervisor write, page not present
Hi there, from time to time my PC panics when I insert an empty DVD or CD-R. The kernel locks up instantly after the DVD writer's tray is closed. It seems burning the first DVD isn't critical but inserting the second one seems susceptible. I use k3b as software, which polls the hardware while the tray is open, maybe it's something with hald. Don't know, just use this. I
2015 Feb 25
2
[openssh with openssl cryptodev engine] sshd killed by seccomp filter
Hello I have a server with an hardware crypto accelator. For giving userspace access to it I use the cryptodev module (http://cryptodev-linux.org/) I have also the cryptodev engine compiled in openssl. When I modprobe the cryptodev module, I cannot login with ssh on the server. The symptom can be found with dmesg: audit: type=1326 audit(1424784807.257:3): auid=4294967295 uid=22 gid=22
2020 Aug 27
0
[klibc:master] alpha: Fix definitions of _NSIG and struct sigaction
Commit-ID: 1cd11aaed1dece773c6b1ce2e99a0fe98b51321e Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=1cd11aaed1dece773c6b1ce2e99a0fe98b51321e Author: Ben Hutchings <ben at decadent.org.uk> AuthorDate: Thu, 27 Aug 2020 01:58:19 +0100 Committer: Ben Hutchings <ben at decadent.org.uk> CommitDate: Thu, 27 Aug 2020 03:51:11 +0100 [klibc] alpha: Fix definitions of
2010 Jan 11
0
[PATCH] Fix arm signals
Following example from usr/include/arch/i386/klibc/archsignal.h: The in-kernel headers for arm still have libc5 crap in them. Reconsider using <asm/signal.h> when/if it gets cleaned up; for now, duplicate the definitions here. Signed-off-by: Jon Ringle <jon at ringle.org> --- usr/include/arch/arm/klibc/archsignal.h | 112 ++++++++++++++++++++++++++++++- 1 files changed, 110
2022 Dec 20
33
[Bug 3512] New: net-misc/openssh-9.1_p1: stopped accepting connections after upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation: unexpected system call)
https://bugzilla.mindrot.org/show_bug.cgi?id=3512 Bug ID: 3512 Summary: net-misc/openssh-9.1_p1: stopped accepting connections after upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation: unexpected system call) Product: Portable OpenSSH Version: 9.1p1 Hardware: amd64 OS: Linux
2010 Sep 03
1
TinycoreLinux Install
Trying to build xapian+omega on tinycorelinux. I followed the install guide and get pass configure/make/make install/omindex, but when I try to run omega "P=search term", I received the following message: # ./omega.cgi 'P=small' Content-Type: text/html; charset=utf-8 Illegal instruction # Attached is the config.log . Make check in omega-core/tests/ shows a lot of failed
2014 Sep 05
0
pread and pwrite syscalls fix for 32bit arches, patch attached
Source: klibc Version: 2.0.2 Severity: important Tags: Patch On the hppa arch (32bit userspace and 32 or 64bit kernel), the fstype program fails to detect the filesystem. The reason for this failure is, that fstype calls the pread() syscall, which has on some architectures with 32bit userspace a different calling syntax. I noticed this bug on hppa, but I assume s390 (32bit) and others might run
2009 Nov 25
1
[PATCH] daemon/Win32: Replace pread on platforms that don't have this function.
-- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones libguestfs lets you edit virtual machines. Supports shell scripting, bindings from many languages. http://et.redhat.com/~rjones/libguestfs/ See what it can do: http://et.redhat.com/~rjones/libguestfs/recipes.html -------------- next part -------------- >From 81982306dd5e8beb56e193ed69d840a1cb976d62 Mon Sep 17
2018 Dec 07
0
[PATCH] v2v: -o rhv-upload: Fix request headers in pread
headers was initialized with a set literal {"key", "value"} instead of dict literal {"key": "value"}. Calling pread() will fail with: AttributeError: 'set' object has no attribute 'items' I did not test the changed code, but it was not tested before, so it is unlikely to be worse. Detected by pylint. --- v2v/rhv-upload-plugin.py | 2
2019 Apr 23
0
[PATCH nbdkit 2/2] server: Zero the read buffer before passing it to plugin .pread method.
If the plugin .pread method did not fill the buffer with data then the contents of the heap could be leaked back to the client. The simplest way to avoid any possibility of this happening is to zero the buffer before passing it to the .pread method. I have checked plugins shipped with nbdkit and none of them are vulnerable in this way. They all do one of these things: - They fully set the
2019 Apr 23
0
[PATCH nbdkit 1/2] ocaml: Initialize pread buffer with zeroes to avoid leaking heap memory.
In the C part of the OCaml plugin we create a ‘bytes’ [byte array] and pass it to the OCaml pread method. The plugin should overwrite the array with the returned data. However if (eg. because of a bug) the plugin does not fill the array then whatever was in the OCaml or possibly even the C heap before the allocation is returned to the client, possibly resulting in a leak of sensitive data. We
2019 Apr 23
0
Re: [PATCH nbdkit 2/2] server: Zero the read buffer before passing it to plugin .pread method.
I agree we should only be zeroing this buffer on NBD_CMD_READ, so the patch is wrong as it stands. Having an "I promise not to be bad!" flag I think just adds more complexity to plugins. It would be nice to do the best thing automatically. If we have a per-thread buffer then we're still (potentially) leaking data between clients, even if that data only consists of previously read
2019 Jun 18
0
[libnbd PATCH 3/8] pread: Reject server SR read response with no data chunks
The NBD spec requires that a server doing structured reads must not succeed unless it covers the entire buffer with reply chunks. In the general case, this requires a lot of bookkeeping to check whether offsets were non-overlapping and sufficient, and we'd rather defer such checking to an optional callback function. But a callback function will only be reached per chunk, while we still want to
2019 Nov 23
1
[PATCH] python: Support buffer protocol for pread() result
pread() can return now any object supporting the buffer protocol[1] such as bytearray, bytes, or memoryview. [1] https://docs.python.org/3/c-api/buffer.html --- When the new python tests will be in master we can add some automated tests. For now I tested this manually using the example plugin as is and with these changes:  def pread(h, count, offset):      global disk     return
2003 Feb 26
0
performance problem with Samba built with pread/pwrite on HP-UX 1 1.11
Hi everyone, One of my teammates here at HP uncovered this, and I thought it deserved proactive mention on the list: It covers non-HP builds of Samba, so HP CIFS Server (HP's version of Samba bundled with all 11.0 and above OS'es) customers are not directly affected but those of you on the list who might build Samba yourselves on 11.11 could be affected. Customers building their own
2019 May 28
0
[libnbd PATCH 4/4] api: Add DF flag support for pread
When structured replies are negotiated, the server may advertise support for the DF flag (the server promises to return at most one data/hole chunk, or to fail with EOVERFLOW if the chunk would be too large). As both nbdkit and qemu-nbd support this flag (the former only trivially, but the latter by not compressing holes over the wire), it is worth exposing to clients. While most clients will
2012 Jan 19
2
[PATCH 1/3] daemon: pwrite/pread: Don't double close on error path.
From: "Richard W.M. Jones" <rjones at redhat.com> In Linux, close (fd) closes the file descriptor even if it returns an error. --- daemon/file.c | 2 -- 1 files changed, 0 insertions(+), 2 deletions(-) diff --git a/daemon/file.c b/daemon/file.c index e0f8794..91746e0 100644 --- a/daemon/file.c +++ b/daemon/file.c @@ -483,7 +483,6 @@ pread_fd (int fd, int count, int64_t
2019 May 28
0
Re: [libnbd PATCH 4/4] api: Add DF flag support for pread
On 5/28/19 4:26 AM, Richard W.M. Jones wrote: > On Mon, May 27, 2019 at 09:01:01PM -0500, Eric Blake wrote: >> diff --git a/lib/rw.c b/lib/rw.c >> index feaf468..343c340 100644 >> --- a/lib/rw.c >> +++ b/lib/rw.c >> @@ -234,11 +234,17 @@ int64_t >> nbd_unlocked_aio_pread (struct nbd_handle *h, void *buf, >> size_t count,