- 24 Feb, 2016 1 commit
-
-
Danil Mikhailov authored
-
- 08 Oct, 2013 2 commits
-
-
Danil Mikhailov authored
-
-
- 24 Jul, 2013 1 commit
-
-
Reda NOUSHI authored
Signed-off-by:
Julius Plenz <julius@plenz.com>
-
- 15 Jul, 2013 2 commits
-
-
Danil Mikhailov authored
-
Danil Mikhailov authored
-
- 08 Jul, 2013 2 commits
-
-
Danil Mikhailov authored
-
Danil Mikhailov authored
-
- 30 May, 2013 1 commit
-
-
Julius Plenz authored
(See issue #14.)
-
- 29 May, 2013 3 commits
-
-
Julius Plenz authored
* makefile-improvement: Adjust README for Makefile update. GNU Make best practice (Closes issue #14.)
-
Julius Plenz authored
-
Dmitry Smirnov authored
-
- 20 May, 2013 6 commits
-
-
Julius Plenz authored
The friendly folks at #musl again: 21:34 < dalias> the cheap way around this problem is to block signals for the entire duration of the unsafe operation 21:35 < dalias> formally (by the rules of the standard) this is not sufficient 21:35 < dalias> because formally it's not just calling pthread_mutex_lock again on the same mutex while the first call is interrupted that's undefined 21:36 < dalias> it's calling ANY unsafe function while ANY unsafe function (the same or otherwise) with any argument (e.g. not necessarily the same mutex) that gives undefined behavior 21:38 < dalias> but real-world-implementations don't have this maximum theoretical degree of unsafety 21:38 < dalias> so the approach i described (just ensuring your functions don't interrupt themselves or each other) should be enough to make them safe
-
Julius Plenz authored
The friendly folks at #musl again: 21:17 < dalias> if you init the pointers both from the ctor and the "lazy init", then the assertion-failure/abort would happen during construction (either your ctor or somebody else's ctor calling your functions) 21:17 < dalias> so the program would exit "before it even gets started" 21:17 < dalias> and this is not so bad 21:18 < dalias> normally i consider it really bad practice for a library to abort the program 21:18 < dalias> but this happens during ctors, and there truely is no way to proceed 21:18 < dalias> if you've already replaced the program's library functions (open, etc.) with your copies, and then find that you can't actually supply working ones
-
Julius Plenz authored
The friendly folks at #musl say: 20:52 < dalias> i think it's good to have both that and the ctor 20:52 < Feh> This should increase robustness if it is in every function. 20:52 < dalias> because... 20:52 < dalias> several of these functions are required to be async-signal-safe 20:53 < dalias> so if the first call happened to be from a signal handler, you'd be in trouble if you didn't already have the ctor 20:54 < dalias> in theory another ctor in another lib or the app could run before yours and install and run a signal handler :-p but that's pretty unlikely and pathological 20:54 < dalias> so i think having both the ctor and the lazy-init keeps you safe in situations that will arise in the real world
-
Julius Plenz authored
-
Julius Plenz authored
-
Aleksandr authored
(This fixes issue #3.)
-
- 10 May, 2013 2 commits
-
-
Julius Plenz authored
(See Issue #12.)
-
Julius Plenz authored
This reverts commit 0a214bdb. Apparently, building nocache on kfreebsd still fails, and anyway the linker warns that posix_fadvise will always fail. So so wait until kfreebsd is up-to-date with the POSIX standard. (See issue #12.)
-
- 06 May, 2013 1 commit
-
-
Reda NOUSHI authored
-
- 02 May, 2013 4 commits
-
-
Julius Plenz authored
-
git://github.com/onlyjob/nocacheJulius Plenz authored
* 'master' of git://github.com/onlyjob/nocache: minor man pages corrections (lintianisation): "hyphen-used-as-minus-sign"
-
git://github.com/noushi/nocacheJulius Plenz authored
* 'behavior_mods' of git://github.com/noushi/nocache: added -n option to nocache.global added BASEDIR to nocache.global (modifiable by sed) simplified LD_PRELOAD declaration
-
Dmitry Smirnov authored
-
- 29 Apr, 2013 6 commits
-
-
Reda NOUSHI authored
added BASEDIR to nocache.global (modifiable by sed) simplified LD_PRELOAD declaration
-
Julius Plenz authored
(Otherwise `prove` would complain about “out of sequence” tests.)
-
Julius Plenz authored
* n-times-fadvise: Update man pages to reflect "-n" option Only do multi-fadvise if previous call was successful Add explanation of -n flag / NOCACHE_NR_FADVISE env variable Implement "-n <n>" flag for repeated posix_fadvise() There was a trivial-to-solve merge conflict in nocache.c
-
Julius Plenz authored
-
Julius Plenz authored
Reported-by:
Reda Noushi <reda@logzilla.pro> > one remark: what should nocache do if a non-zero value is returned by posix_fadvise()? > 1. is it okay to continue executing it and returning the last value? > 2. or stop execution and return the last non-zero value of fadv()?
-
Julius Plenz authored
* noushi/behavior_mods: nocache retrieves max fds from actual process limits.
-
- 27 Apr, 2013 1 commit
-
-
Reda NOUSHI authored
-
- 24 Apr, 2013 1 commit
-
-
Julius Plenz authored
-
- 23 Apr, 2013 1 commit
-
-
Julius Plenz authored
-
- 22 Apr, 2013 2 commits
-
-
git://github.com/paulharris/nocacheJulius Plenz authored
* 'master' of git://github.com/paulharris/nocache: Adjusted script so it will preload the .so from the script's directory
-
Paul Harris authored
-
- 09 Apr, 2013 1 commit
-
-
Julius Plenz authored
Thanks again, kocmo, for noticing.
-
- 05 Apr, 2013 1 commit
-
-
Julius Plenz authored
Thanks to kocmo for the patch.
-
- 20 Mar, 2013 2 commits
-
-
Julius Plenz authored
man pages
-
Dmitry Smirnov authored
-