From: Tom Tromey <tromey@redhat.com>
To: Eli Zaretskii <eliz@gnu.org>
Cc: gdb-patches@sourceware.org
Subject: Re: RFA: close-on-exec internal file descriptors
Date: Sat, 06 Dec 2008 15:58:00 -0000 [thread overview]
Message-ID: <m3bpvpwb1w.fsf@fleche.redhat.com> (raw)
In-Reply-To: <umyf9n2la.fsf@gnu.org> (Eli Zaretskii's message of "Sat\, 06 Dec 2008 10\:13\:21 +0200")
>>>>> "Eli" == Eli Zaretskii <eliz@gnu.org> writes:
>> I believe those 'pipe' entries are from the call to pipe in
>> linux-nat.c:linux_nat_set_async.
Eli> Are you saying that the problem is specific to Linux native targets?
No. That was an example.
>> I chose to take advantage of the new glibc flags like O_CLOEXEC when
>> they are available.
Eli> Relying on glibc is OK for GNU/Linux, but you seem to be modifying
Eli> files that have no relation to the Linux native builds. Does that
Eli> mean the non-glibc builds that don't have the support you are relying
Eli> on will still leak descriptors?
No. In each case, if O_CLOEXEC is not available, we fall back to the
fcntl-based method. That is what the calls to "close_on_exec" do in
the patch.
>> + char new_mode[20];
>> + strcpy (new_mode, mode);
>> + strcat (new_mode, "e");
>> + return fopen (path, new_mode);
Eli> Can we do something more safe than this arbitrary [20] limitation?
I don't think there is any point, because the mode argument to fopen
is never longer than 4 characters or so. However, if you really want
this, I will change it to a malloc.
Tom
next prev parent reply other threads:[~2008-12-06 15:58 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-12-06 0:39 Tom Tromey
2008-12-06 8:14 ` Eli Zaretskii
2008-12-06 15:58 ` Tom Tromey [this message]
2008-12-06 16:52 ` Daniel Jacobowitz
2008-12-06 17:05 ` Eli Zaretskii
2008-12-06 16:54 ` Eli Zaretskii
2008-12-06 15:26 ` Daniel Jacobowitz
2008-12-06 15:59 ` Tom Tromey
2008-12-06 15:42 ` Mark Kettenis
2008-12-06 22:06 ` Tom Tromey
2008-12-07 19:26 ` Mark Kettenis
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=m3bpvpwb1w.fsf@fleche.redhat.com \
--to=tromey@redhat.com \
--cc=eliz@gnu.org \
--cc=gdb-patches@sourceware.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox