[PATCH] Resend: getsockopt TCP_NODELAY: Socket operation on non-socket
David Woodhouse
dwmw2 at infradead.org
Tue Oct 28 07:57:24 EST 2003
On Sun, 2003-10-26 at 10:50 +0000, David Woodhouse wrote:
> We get the warning above whenever we use a ProxyCommand. We _know_ it's
> a pipe, so we can't use sockopts on it. So we shouldn't bitch about it.
>
> This breaks all kinds of things which use SSH transparently; including
> pine, which really wants the first thing it receives from an IMAP server
> to be a valid imap greeting... which $subject is not.
>
> $ ssh -o "proxycommand sh -c '( echo CONNECT %h:%p HTTP/1.0; echo; cat ) | nc 192.168.0.1 3128'" pentafluge.infradead.org exec bin/courier-imap.sh
> getsockopt TCP_NODELAY: Socket operation on non-socket
> * PREAUTH Ready.
>
> In fact, it's probably never necessary to bitch about it, so let's make
> it a debug message only...
Index: misc.c
===================================================================
RCS file: /cvs/openssh/misc.c,v
retrieving revision 1.37
diff -u -p -r1.37 misc.c
--- misc.c 22 Sep 2003 11:04:23 -0000 1.37
+++ misc.c 26 Oct 2003 10:48:35 -0000
@@ -97,7 +97,7 @@ set_nodelay(int fd)
optlen = sizeof opt;
if (getsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &opt, &optlen) == -1) {
- error("getsockopt TCP_NODELAY: %.100s", strerror(errno));
+ debug("getsockopt TCP_NODELAY: %.100s", strerror(errno));
return;
}
if (opt == 1) {
--
dwmw2
More information about the openssh-unix-dev
mailing list