Hi Daniel :)
Quoting Daniel de Castro (2013-08-24 03:08:02)
I'd like to work on this project, but I'd like to discuss the idea with
someone
more familiar to Valgrind and Hurd itself. This project is listed as an idea
project for GSOC but I'd like to work on it during the upcoming Fall, if
Justus Winter, le Sun 25 Aug 2013 11:11:10 +0200, a écrit :
I think (but please correct me if I'm wrong here) that valgrind on
Hurd would have to do the same thing as rpctrace (i.e. intercepting
and parsing messages from the target program)
It won't need to intercept, since in valgrind the
Both applied, thanks!
Samuel
Justus Winter 4win...@informatik.uni-hamburg.de writes:
[…]
* utils/fakeroot.sh: Escape arguments handed to /bin/sh so that they
are not evaluated prematurely.
[…]
exec /bin/settrans --chroot \
- /bin/fakeauth /bin/sh -c cd `pwd`; $* \
+ /bin/fakeauth /bin/sh -c cd `pwd`;
Quoting Ivan Shmakov (2013-08-25 17:55:39)
Justus Winter 4win...@informatik.uni-hamburg.de writes:
[…]
* utils/fakeroot.sh: Escape arguments handed to /bin/sh so that they
are not evaluated prematurely.
[…]
exec /bin/settrans --chroot \
- /bin/fakeauth /bin/sh -c cd
Justus Winter 4win...@informatik.uni-hamburg.de writes:
Quoting Ivan Shmakov (2013-08-25 17:55:39)
[…]
/bin/fakeauth /bin/sh \
-c 'cd $1 || exit ; shift ; exec $@' \
dummy.sh $(pwd) $@ \
?
The essential point is that using -c doesn’t prevent one
Hey guys,
Thanks for your replies.
I actually have installed the Hurd (its Debian distribution, to be precise)
on a VM Box for now. And I actually dropped by the #hurd last night, but
it was awfully quiet. But it seems that most of you guys seem to be in
Europe, so it's expected as it was