search for: acl_mask

Displaying 15 results from an estimated 15 matches for "acl_mask".

2012 Feb 16
1
Samba LDAP passthrough authentication to another openLDAP
...authentication: Feb 16 20:47:05 sglabldap slapd[1393]: => access_allowed: read access to "uid=fajar,ou=people,dc=example,dc=com" "userPassword" requested Feb 16 20:47:05 sglabldap slapd[1393]: => acl_get: [1] attr userPassword Feb 16 20:47:05 sglabldap slapd[1393]: => acl_mask: access to entry "uid=fajar,ou=people,dc=example,dc=com", attr "userPassword" requested Feb 16 20:47:05 sglabldap slapd[1393]: => acl_mask: to value by "", (=0) Feb 16 20:47:05 sglabldap slapd[1393]: <= check a_dn_pat: cn=admin,dc=example,dc=com Feb 16 20:47:05 s...
2010 Jul 20
1
acl and chmod interaction
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 #$ setfacl -m u:mf:r bla #$ getfacl bla # file: bla # owner: root # group: root user::rw- user:mf:r-- group::r-- mask::r-- other::r-- It is readable by mf like intended. #$ chmod go-rwx bla #$ getfacl bla # file: bla # owner: root # group: root user::rw- user:mf:r-- #effective:--- group::r-- #effective:--- mask::--- other::--- It is not
2004 Apr 29
0
smbpasswd - Samba and LDAP
...atric I get a DB_KEYEXIST error (excerpt) from slapd.log: => access_allowed: write access to "uid=shpatric,ou=People,dc=sv,dc=vt,dc=edu" "entry" requested => acl_get: [1] check attr entry <= acl_get: [1] acl uid=shpatric,ou=People,dc=sv,dc=vt,dc=edu attr: entry => acl_mask: access to entry "uid=shpatric,ou=People,dc=sv,dc=vt,dc=edu", attr "entry" requested => acl_mask: to all values by "cn=smbadmin,ou=people,dc=sv,dc=vt,dc=edu", (=n) <= check a_dn_pat: * <= acl_mask: [1] applying write(=wrscx) (stop) <= acl_mask: [1] mask: wr...
2006 Dec 04
1
make errors, rsync 2.6.9 with acls patch
...ed (first use in this function) acls.c:295: error: 'ACL_USER' undeclared (first use in this function) acls.c:297: error: 'ACL_GROUP_OBJ' undeclared (first use in this function) acls.c:303: error: 'ACL_GROUP' undeclared (first use in this function) acls.c:305: error: 'ACL_MASK' undeclared (first use in this function) acls.c:311: error: 'ACL_OTHER' undeclared (first use in this function) acls.c: In function 'store_access_in_entry': acls.c:381: error: 'ACL_READ' undeclared (first use in this function) acls.c:383: error: 'ACL_WRITE' undec...
2020 May 14
2
Default ACL inheritance question
A bit of a minor off-topic issue, but on the off-chance that someone understands how ACLs work ... I've been trying to see if using default ACLs would help with the following issue: I have a third party application that is running as a non-root user ('user-a') and creating log files with mode 0600 (read/write only to the owner) in a log directory I have another application that
2020 May 14
0
Default ACL inheritance question
...#39;ll see that the ACCESS CHECK ALGORITH starts: IF the effective user ID of the process matches the user ID of the file object owner ... ELSE IF the effective user ID of the process matches the qualifier of any entry of type ACL_USER, THEN IF the matching ACL_USER entry and the ACL_MASK entry contain the requested permissions, access is granted, ELSE access is denied. ELSE ... The effective user ID is <user-b>. This matches an ACL_USER entry (user:user-b:r--) so therefore consider the ACL_MASK. It is "---" so does NOT contain the requested permission...
2004 Feb 24
1
(no subject)
...access to "cn=replicator,dc=tuluc,dc=com" "userPassword" requested Feb 23 17:44:36 localhost slapd[8287]: daemon: select: listen=6 active_threads=1 tvp=NULL Feb 23 17:44:36 localhost slapd[8287]: => acl_get: [1] check attr userPassword Feb 23 17:44:36 localhost slapd[8287]: acl_mask: access to entry "cn=replicator or,dc=tuluc,dc=com", attr "userPassword" requested Feb 23 17:44:36 localhost slapd[8287]: => acl_mask: to all values by "", (=n) Feb 23 17:44:36 localhost slapd[8287]: string_expand: pattern: cn=Manager,dc=tuluc,dc=com Feb 23 17:44:...
2015 Feb 26
2
Permission masks
On 24/02/15 20:35, Rowland Penny wrote: > On 24/02/15 20:23, John wrote: >> I apologise for asking a basic question but I haven't been able to >> determine a sensible answer. >> >> I am using 4.1.17 as AD-DC. All configured and working with user home >> directories via [homes] and some other specific shares. >> >> Windows 7 client jointed to domain,
2004 Dec 11
1
dovecot/openldap auth problems?
...22 salcha slapd[15734]: => dnpat: [4] o=hosting,dc=akforecast nsub: 0 Dec 11 13:59:22 salcha slapd[15734]: => acl_get: [5] check attr userPassword Dec 11 13:59:22 salcha slapd[15734]: <= acl_get: [5] acl cn=dovecot,dc=akforecast attr: userPassword Dec 11 13:59:22 salcha slapd[15734]: => acl_mask: access to entry "cn=dovecot,dc=akforecast", attr " userPassword" requested Dec 11 13:59:22 salcha slapd[15734]: => acl_mask: to all values by "", (=n) Dec 11 13:59:22 salcha slapd[15734]: <= check a_dn_pat: * Dec 11 13:59:22 salcha slapd[15734]: <= acl_mask...
2013 Apr 02
1
v2.2 getting NULL pointer reference with shared namespace in mailbox_tree?
...xffff80ffbffff0b8) at acl-backend.c:68 No locals. #12 0xffff80ffb71d4ba7 in acl_mailbox_try_list_fast (ctx=0x4fcdb0) at acl-mailbox-list.c:63 alist = (struct acl_mailbox_list *) 0x4b9ad0 backend = (struct acl_backend *) 0x4cad10 idxp = (const unsigned int *) 0x4b9ba0 acl_mask = (const struct acl_mask *) 0xffff80ffb76717e7 nonowner_list_ctx = (struct acl_mailbox_list_context *) 0xffff80ffbffff100 ns = (struct mail_namespace *) 0x4b9770 update_ctx = {iter_ctx = 0x4fce60, tree_ctx = 0x4fce40, glob = 0xffff80ffbffff0b0, leaf_flags = 3077123268, paren...
2013 Jun 07
1
v2.2.2 (e5bd0a7c6a1e) Core Dump
...lt;optimized out> #5 0x00007fecd7cf9c51 in acl_mailbox_try_list_fast (ctx=0x221b4b0) at acl-mailbox-list.c:107 alist = 0x21cf1a8 nonowner_list_ctx = <optimized out> ret = <optimized out> backend = <optimized out> idxp = 0x21cf278 acl_mask = 0x0 ns = 0x21ca6d0 update_ctx = {iter_ctx = 0x1, tree_ctx = 0x7fecd90aa548, glob = 0x6, leaf_flags = 35726664, parent_flags = 0, update_only = 0, match_parents = 0} name = <optimized out> #6 acl_mailbox_list_iter_init (list=0x21ceec0, patterns=0x21d92f8, flags=49152...
2013 Feb 26
2
(no subject)
...xffff80ffbfffec98) at acl-backend.c:68 No locals. #15 0xffff80ff94c72a6b in acl_mailbox_try_list_fast (ctx=0x513f50) at acl-mailbox-list.c:63 alist = (struct acl_mailbox_list *) 0x4b33e0 backend = (struct acl_backend *) 0x4c4050 idxp = (const unsigned int *) 0x4b34b0 acl_mask = (const struct acl_mask *) 0xffff80ff94f708cf nonowner_list_ctx = (struct acl_mailbox_list_context *) 0xffff80ffbfffece0 ns = (struct mail_namespace *) 0x4b3080 update_ctx = {iter_ctx = 0x514000, tree_ctx = 0x513fe0, glob = 0xffff80ffbfffec90, leaf_flags = 2499353844, paren...
2010 Mar 20
2
[PATCH 4/4] btrfs-convert: split into convert/.
...- src_entry = (ext2_acl_entry *)src; - if (src + sizeof(ext2_acl_entry_short) > end) - goto fail; - dst_entry->e_tag = src_entry->e_tag; - dst_entry->e_perm = src_entry->e_perm; - switch (le16_to_cpu(src_entry->e_tag)) { - case ACL_USER_OBJ: - case ACL_GROUP_OBJ: - case ACL_MASK: - case ACL_OTHER: - src += sizeof(ext2_acl_entry_short); - dst_entry->e_id = cpu_to_le32(ACL_UNDEFINED_ID); - break; - case ACL_USER: - case ACL_GROUP: - src += sizeof(ext2_acl_entry); - if (src > end) - goto fail; - dst_entry->e_id = src_entry->e_id; - break; - de...
2010 May 28
1
samba 3.5.3: loads of errors copying some simple ACLs with robocopy
Maybe I'm doing somthing really stupid, but while copying some windows share onto a samba server, on some random subdirectory robocopy says ERROR 87 (0x00000057) Copying NTFS Security to Destination Directory... The samba logfile has lots of these lines. modules/vfs_posixacl.c:349(smb_acl_to_posix) smb_acl_to_posix: ACL is invalid for set (Das Argument ist ung?ltig) The strange thing is
2020 Sep 09
17
[trivial PATCH] treewide: Convert switch/case fallthrough; to break;
...; + break; case 0: break; case -NFS4ERR_DELAY: diff --git a/fs/nfs_common/nfsacl.c b/fs/nfs_common/nfsacl.c index d056ad2fdefd..009c1e434aa5 100644 --- a/fs/nfs_common/nfsacl.c +++ b/fs/nfs_common/nfsacl.c @@ -237,7 +237,7 @@ posix_acl_from_nfsacl(struct posix_acl *acl) break; case ACL_MASK: mask = pa; - fallthrough; + break; case ACL_OTHER: break; } diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 86fdebb5ffd8..c88c7a7d77fb 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -5334,7 +5334,7 @@ static int adjust_ptr_min_max_vals(str...