Displaying 20 results from an estimated 200 matches similar to: "getpgrp"
2001 Sep 17
1
autoconf cleanup for AC_FUNC_GETPGRP and GETPGRP_VOID
> From: Akim Demaille <akim at epita.fr>
> Date: 17 Sep 2001 11:22:19 +0200
>
> | 2001-09-16 Tim Van Holder <tim.van.holder at pandora.be>
> | * lib/autoconf/functions.m4: (AC_FUNC_GETPGRP) Don't rely on
> | setpgrp() being present.
I looked into that problem a bit more. Several programs use
AC_FUNC_GETPGRP and GETPGRP_VOID, including Bash, Gawk, and
2015 Jun 29
3
[Bug 2419] New: SECCOMP filter does not accept getpgid syscall
https://bugzilla.mindrot.org/show_bug.cgi?id=2419
Bug ID: 2419
Summary: SECCOMP filter does not accept getpgid syscall
Product: Portable OpenSSH
Version: 6.8p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2023 Aug 03
20
[Bug 3598] New: Dead lock of sshd and Defunct of sshd
https://bugzilla.mindrot.org/show_bug.cgi?id=3598
Bug ID: 3598
Summary: Dead lock of sshd and Defunct of sshd
Product: Portable OpenSSH
Version: 9.1p1
Hardware: ix86
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2024 May 12
5
[Bug 3690] New: sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690
Bug ID: 3690
Summary: sshd: root [priv] process sleeping leads to
unprivileged child proc zombie
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component:
2000 Sep 05
3
[2.2.0p1] patch: generic detection of correct getpgrp() invocation
Hi.
Several OSes have a getpgrp() function that takes an argument, unlike
what POSIX mandates. NeXT was covered, but SunOS wasn't. This
provides a generic solution through autoconf.
Charles
========================================================================
--- configure.in.orig-2.2.0p1 Wed Aug 30 18:20:05 2000
+++ configure.in Tue Sep 5 10:48:20 2000
@@ -284,6 +284,8 @@
)
fi
2008 Nov 20
1
Stopping bdrb from another process gets the process killed
Hi, I''ve been having some issues integrating bdrb on a cruisecontrolrb
server
It''s related to the way we stop the bdrb server. The thing is, right now
when we stop the process we are killing the parent of the group of the
process. This is ok if you''re running script/backgroundrb stop directly from
the console, but if I''m running this from another process,
2002 Jan 31
4
signal transmission in ssh2
does somebody like this?
Index: Makefile.inc
===================================================================
RCS file: /cvs/src/usr.bin/ssh/Makefile.inc,v
retrieving revision 1.21
diff -u -r1.21 Makefile.inc
--- Makefile.inc 30 Oct 2001 20:32:31 -0000 1.21
+++ Makefile.inc 16 Nov 2001 12:07:22 -0000
@@ -10,7 +10,7 @@
CDIAGFLAGS+= -Wmissing-prototypes
CDIAGFLAGS+= -Wunused
-#DEBUG=-g
2020 Jul 27
3
[PATCH] Add syscall wrappers required by libkeyutils
On Saturday, 25 July 2020, 23:36:33 CEST, Ben Hutchings wrote:
> On Wed, 2020-07-08 at 08:37 +0200, Christian Eggers wrote:
> > ...
> > libkeyutils usually invokes syscall() directly. As syscall() is not
> > provided by klibc, libkeyutils has to be slightly modified for using the
> > klibc wrappers.
>
> Wouldn't it be more useful for klibc to implement
2008 Jan 03
5
Start script not working when run via Rake
Hi there
I''m using the latest release (r300) and ''script/backgroundrb start'' works
perfectly when executed on the server, but when put inside a Rake task, it
doesn''t launch the worker processes.
The Rake task is as follows:
task :start_backgroundrb do
run "cd #{current_path} && ./script/backgroundrb start"
end
When I run this task, the
2018 Aug 01
2
trying to resurrect discussion about "Cannot signal a process over a channel (rfc 4254, section 6.9)"
FWIW, now that privsep is mandatory I have no objection to including
signal support in sshd.
On Wed, 25 Jul 2018, Yonathan Bleyfuesz wrote:
> Hi all,
>
> I would like to propose some ideas to revivify this subject.
>
> -First, we could add support on the client to send signal thanks to the escape characters.
> (code :
2017 Jan 25
2
parallel::mc*: Is it possible for a child process to know it is a fork?
When using multicore-forking of the parallel package, is it possible
for a child process to know that it is a fork? Something like:
parallel::mclapply(1:10, FUN = function(i) { test_if_running_in_a_fork() })
I'm looking into ways to protect against further parallel processes
(including threads), which not necessarily are created via the
parallel:mc* API, are being spawned off recursively.
2018 Jul 13
2
trying to resurrect discussion about "Cannot signal a process over a channel (rfc 4254, section 6.9)"
Hi,
>>> It would be nice to know what the precise technical issues are that have
>>> prevented support for this from being added. From what I recall, it
>>> seemed like the delay was largely due to details of the client
>>> behaviour, and possibly some feature creep.
It would indeed be really great to have some details on this point.
Concerning the test of
2004 Aug 06
2
icecast2 launch problem
I've downloaded and successfully installed onto slackware 8.1 the
following cvs packages:
icecast2, ices, libshout, ogg, vorbis
I copied the conf file called icecast.xml to /usr/local/bin
I launch icecast with ./icecast -c ./icecast.xml
but then the server gets a sigdie, signal 2 and terminates.
I don't know what is the problem
Any suggestions?
<p>greetings
marco
--- >8 ----
2008 Jun 05
14
Why not ignore stale PID files?
Hi,
I have an application which is dying horrible deaths
(i.e. segmentation faults) in mid-flight, in production... And of
course, I should fix it. But while I find and fix the bugs, I found
something I think should be different - I can work on submitting a
patch, as it is quite simple, but I might be losing something on my
rationale.
When Mongrel segfaults, it does not -obviously- get to clean
2001 Dec 10
10
hang on exit bug under Linux
>From what I understand, the problem is due to people's disagreement about what the "correct" behavior should be. I'm pretty sure that the following is the correct behavior from running rsh and ssh often (both fsecure and openssh).
Lets say you have a stupid script that does
while 1
do
sleep 1
done
Called foreverSleep on your remote host:
rsh remotehost
2017 Jan 25
0
parallel::mc*: Is it possible for a child process to know it is a fork?
On Tue, Jan 24, 2017 at 7:06 PM, Henrik Bengtsson
<henrik.bengtsson at gmail.com> wrote:
> When using multicore-forking of the parallel package, is it possible
> for a child process to know that it is a fork?
R internally uses R_isForkedChild to prevent certain operations within
the fork. However I don't think this is exported anywhere. You could
do something like:
extern
2020 Jul 27
0
[PATCH] Add syscall wrappers required by libkeyutils
On July 27, 2020 2:43:36 AM PDT, Christian Eggers <ceggers at arri.de> wrote:
>On Saturday, 25 July 2020, 23:36:33 CEST, Ben Hutchings wrote:
>> On Wed, 2020-07-08 at 08:37 +0200, Christian Eggers wrote:
>> > ...
>> > libkeyutils usually invokes syscall() directly. As syscall() is not
>> > provided by klibc, libkeyutils has to be slightly modified for
2013 Feb 26
16
Call for testing: OpenSSH-6.2
Hi,
It's that time again...
OpenSSH 6.2 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release contains
some substantial new features and a number of bugfixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
2004 Aug 06
4
strange way of forwarding to another stream.
Just a kinda question on a random thought I was having.
Would it make sense, or be concievably plausible to write a plugin for winamp, or other Icecast2 client to read a comment in the Ogg Vorbis file to automatically open a new stream when the stream/file has finished playing- eg, client starts/downloads the ad stream/file for the server broadcasting the stream, vorbis file contains tag along the
2018 Sep 09
1
Type enforcement / mechanism not clear
On 09/09/2018 07:19 AM, Daniel Walsh wrote:
> sesearch -A -s httpd_t -t system_conf_t -p read
>
> If you feel that these files should not be part of the base_ro_files
> then we should open that for discussion.
I think the question was how users would know that the policy allowed
access, as he was printing rules affecting httpd_t's file read access,
and looking for