-
**Describe the bug**
The sandbox should probably hide some parts of /proc ?
**Steps To Reproduce**
build the following derivation:
```nix
with import {}; stdenv.mkDerivation {
name = "pro…
-
# Feature request
### What new feature do you want?
The ability to specify where the procfs can be found. ie --procfs=/mnt/host/proc
Ideally this same logic would apply for any "hard coded" path…
-
`procfs::process::Process::myself().unwrap().fd().unwrap().next()` fails with `signal: 31, SIGSYS: bad system call` in Android
-
### Motivation
As `procfs` already using `parseX(io.Reader)` functions for parsing proc filesystem files, some functions also _do_ syscall to _read_ the target file' content. The main pitfall of th…
-
### Describe the bug
There is a reachable unwrap panic in `handle_alloc_error()` at ostd/src/mm/heap_allocator.rs:26 when make a `preadv` syscall with specific argument.
https://github.com/asterin…
-
## Proposal
I just discovered the that `node_md_blocks_synced` metric, which is currently parsed from `/proc/mdstat` is not very useful in trying to determine resync / check progress percentage of an…
-
While adding `RESOLVE_NO_XDEV` support to the `openat2(2)` backend is incredibly trivial (add the `RESOLVE_NO_XDEV` flag), for the emulated backend it appears to be an open problem to detect a mount-p…
-
**Output of the info page (if this is a bug)**
```
Getting the status from the agent.
==============
Agent (v6.0.3)
==============
Status date: 2018-03-22 20:00:31.502576 UTC
Pid: 171
…
-
http://gnats.netbsd.org/46584
再現する。
コード
```
#include
#include
#include
#include
void *dummy(void *p) {
sleep(100);
return NULL;
}
int main(void) {
int i;
DIR *dirp;
struct d…
-
**Motivation**
There are so many attacking tricks overwriting sensitive files for gaining control, like `~/.ssh/authorized_keys`, `/etc/crontab`, `~/.bashrc`, etc.
Sometimes, getting the conten…