search for: s_iwoth

Displaying 20 results from an estimated 28 matches for "s_iwoth".

Did you mean: s_iroth
2002 Jun 26
3
OpenSSH 3.4 released
OpenSSH 3.4 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support and encouragement. Changes since OpenSSH 3.3: ============================
2003 Nov 23
1
[PATCH] dd O_CREAT permission
...f(x) / sizeof(x[0])) @@ -483,7 +485,7 @@ int main(int argc, char *argv[]) * Open the output file, if specified. */ if (OPT_OF->str) { - wr_fd = open(OPT_OF->str, O_RDWR|O_CREAT); + wr_fd = open(OPT_OF->str, O_RDWR|O_CREAT,~umask(0) & (S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP|S_IROTH|S_IWOTH)); if (wr_fd == -1) { perror("open output file"); return 1; -- USB is for mice, FireWire is for men! sUse lINUX ag, n?RNBERG
2014 Aug 27
1
pty_setowner and tty permissions
...are this open. Turns out, sshd sets them like this: /* Determine the group to make the owner of the tty. */ grp = getgrnam("tty"); if (grp) { gid = grp->gr_gid; mode = S_IRUSR | S_IWUSR | S_IWGRP; } else { gid = pw->pw_gid; mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH; } On Windows no group called "tty" exists, so sshd always sets the permissions to 0622 on Cygwin. My question is, isn't that a security problem? Shouldn't the permissions set to 0600 if a "tty" group doesn't exist, otherwise everyone can write to the user's...
1999 Feb 02
1
Unix permission problems with 'attrib'
Hi, I'm been using Samba for some time and I have been bugged by a problem with SourceSafe. I finally took some time to see what is going on and found the source of the problem (well, not in the source code though). I'm partially responsible, I have Unix files with the following rights "r--rw---" and Samba does not deal with these very well. I am now makind sure that this case
2020 Sep 25
0
[RFC PATCH 01/19] tools/virtiofsd: add support for --socket-group
.../* * Unfortunately bind doesn't let you set the mask on the socket, - * so set umask to 077 and restore it later. + * so set umask appropriately and restore it later. */ - old_umask = umask(0077); + if (se->vu_socket_group) { + old_umask = umask(S_IROTH | S_IWOTH | S_IXOTH); + } else { + old_umask = umask(S_IRGRP | S_IWGRP | S_IXGRP | S_IROTH | S_IWOTH | S_IXOTH); + } if (bind(listen_sock, (struct sockaddr *)&un, addr_len) == -1) { fuse_log(FUSE_LOG_ERR, "vhost socket bind: %m\n"); close(listen_sock);...
2003 Feb 08
1
compare st_mode & 07777, or Aix dirs always differ
...if +#ifndef S_IRWXG +#define S_IRWXG 00070 +#endif +#ifndef S_IRGRP +#define S_IRGRP 00040 +#endif +#ifndef S_IWGRP +#define S_IWGRP 00020 +#endif +#ifndef S_IXGRP +#define S_IXGRP 00010 +#endif +#ifndef S_IRWXO +#define S_IRWXO 00007 +#endif +#ifndef S_IROTH +#define S_IROTH 00004 +#endif +#ifndef S_IWOTH +#define S_IWOTH 00002 +#endif +#ifndef S_IXOTH +#define S_IXOTH 00001 #endif + +#define CHMOD_BITS (S_ISUID | S_ISGID | S_ISVTX | S_IRWXU | S_IRWXG | S_IRWXO) #ifndef _S_IFMT #define _S_IFMT 0170000 -- Roderick Schertler roderick@argon.org
2005 Mar 23
1
Problems with Excel & MS Word files (still)
Problem is apparently with locking issues, disabled oplocks in the [general] section, and the problem actually got worse... Here's what happens: User-A part of group1, opens Excel file off of share, saves, exits... User-B (or even User-A for that matter) tries to re-open same file, get error stating it's locked and can only open for read-only access... Both users in the same group, and
2014 Jun 12
2
[PATCH] fuse: UID 0 should override all permissions checks (RHBZ#1106548).
...? statbuf.st_mode & S_IRGRP - : statbuf.st_mode & S_IROTH); - if (mask & W_OK) - ok = ok && - ( fuse->uid == statbuf.st_uid ? statbuf.st_mode & S_IWUSR - : fuse->gid == statbuf.st_gid ? statbuf.st_mode & S_IWGRP - : statbuf.st_mode & S_IWOTH); - if (mask & X_OK) - ok = ok && - ( fuse->uid == statbuf.st_uid ? statbuf.st_mode & S_IXUSR - : fuse->gid == statbuf.st_gid ? statbuf.st_mode & S_IXGRP - : statbuf.st_mode & S_IXOTH); + /* Root user should be able to access everything, so only...
2006 Oct 30
0
File Store permissions
...stat stt; Store *new_store = store_new(); new_store->dir.path = estrdup(pathname); + + new_store->file_mode = S_IRUSR | S_IWUSR; + if (!stat(new_store->dir.path, &stt) && + stt.st_gid == getgid()) { + if (stt.st_mode & S_IWGRP) + umask(S_IWOTH); + new_store->file_mode |= stt.st_mode & (S_IRGRP | S_IWGRP); + } + new_store->touch = &fs_touch; new_store->exists = &fs_exists; new_store->remove = &fs_remove;
2010 Jun 21
0
would like more detail when /tmp directory is missing. patch for linux/syslinux.c
...[]) Make a temp dir and pass all the gunky options to mount. */ if (chdir(_PATH_TMP)) { - perror(program); + fprintf(stderr, "%s: Cannot access the %s directory.\n", + program, _PATH_TMP); exit(1); } #define TMP_MODE (S_IXUSR|S_IWUSR|S_IXGRP|S_IWGRP|S_IWOTH|S_IXOTH|S_ISVTX)
2007 Apr 18
1
Linux Equivalent of SetFilePerm() api
Hi everyone, We are trying to port our own windows application to SUSE linux.Our application uses SetFilePerm() api defined in commondll.dll.We would like to know whether there is a linux equivalent of windows commondll.dll in wine... If not then what could be the possible alternative to make this api function exactly as it does in windows. Waiting for an early reply, Thanks and Regards,
2001 Dec 18
1
Question about default ACL
Hello samba guys and XFS guys, I am now using Linux-2.4.5-1.0.1_XFS and Samba 2.2.2. Try to create a samba share on a XFS volume, for example, we create a directory named 'public', and set its default acl on 'public' as 'u::rwx,g::rw-,o::r--,m::rwx', . Under Linux box, try to create a file named 'file_linux' under directory 'public', On Samba client (Win2K)
1999 Jul 02
1
preexec: return code not used? (PR#18576)
T.D.Lee@durham.ac.uk wrote: > > > But we'd like to go one step further and have the return code from preexec > be used to continue or abort the connection being established. The script > above would be modified to generate this return code. > > Looking through the source code (smbd/service.c), it doesn't seem to check > the return code (calling smbrun to do the
2009 May 29
1
[PATCH v2] klibc-utils: add simple ls
...S_IWGRP) ? 'w' : '-'); + + !STAT_ISSET(st->st_mode, S_ISGID) ? + putchar(STAT_ISSET(st->st_mode, S_IXGRP) ? 'x' : '-') : + putchar('S'); + + putchar(STAT_ISSET(st->st_mode, S_IROTH) ? 'r' : '-'); + putchar(STAT_ISSET(st->st_mode, S_IWOTH) ? 'w' : '-'); + + !STAT_ISSET(st->st_mode, S_ISVTX) ? + putchar(STAT_ISSET(st->st_mode, S_IXOTH) ? 'x' : '-') : + putchar(S_ISDIR(st->st_mode) ? 't' : 'T'); + + if (S_ISCHR(st->st_mode) || S_ISBLK(st->st_mode)) { + rc = asprintf(&am...
2002 Jul 27
6
mode=777 does not work as fstab option
I need to mount a samba share as mode 777, so all users can read/write/delete/create. I have this as fstab entry //host/public /mnt/home smbfs auto,uid=user,umask=000,defaults,username=Perkins,password= see, i've had to put uid=user just to get it owned by user user, so i could edit files i put mode=777, but it does nothing. i want to let all users read/write/create/delete
2009 May 28
1
[PATCH] klibc-utils: add minils
...T(st->st_mode, S_ISGID) ? + printf ("%s", STAT_ISSET(st->st_mode, S_IXGRP) ? "x" : "-") : + printf ("S"); + + printf ("%s%s", + STAT_ISSET(st->st_mode, S_IROTH) ? "r" : "-", + STAT_ISSET(st->st_mode, S_IWOTH) ? "w" : "-"); + + !STAT_ISSET(st->st_mode, S_ISVTX) ? + printf ("%s", STAT_ISSET(st->st_mode, S_IXOTH) ? "x" : "-") : + printf ("%s", S_ISDIR(st->st_mode) ? "t" : "T"); + + sz = snprintf(NULL, 0, " %%%d...
1998 Dec 08
1
Can't connect to shares w/2.0beta3 on OSF1
I was running 1.9.18p10 on a test DEC Unix 4.0d box here and I decided to give 2.0beta3 a try. For some reason, I cannot connect to any of the server's shares or even get a list of it's services (via Start->Run->\\server) from Win95 clients. It asks for a password and no matter what I put in there I get "The password is not correct. Try again." I configured Beta3 a la:
1997 Apr 29
9
Yet Another DIP Exploit?
I seem to have stumbled across another vulnerability in DIP. It appears to allow any user to gain control of arbitrary devices in /dev. For instance, I have successfully stolen keystrokes from a root login as follows... (I could also dump characters to the root console) $ whoami cesaro $ cat < /dev/tty1 <------ root login here bash: /dev/tty1: Permission denied
2009 Mar 05
0
[PATCH 5/5] COM32/rosh: Improvements
...lace of st_mode to a ls-style string + * st_mode Mode in other to analyze + * st_mode_str string to hold converted string + */ +void rosh_st_mode_am2str(mode_t st_mode, char *st_mode_str) +{ + st_mode_str[0] = ((st_mode & S_IROTH) ? 'r' : '-'); + st_mode_str[1] = ((st_mode & S_IWOTH) ? 'w' : '-'); + st_mode_str[2] = ((st_mode & S_IXOTH) ? 'x' : '-'); +} + +/* Converts st_mode to an ls-style string + * st_mode mode to convert + * st_mode_str string to hold converted string + */ +void rosh_st_mode2str(mode_t st_mode, char *st_mode_str) +{ + st...
2010 Jun 27
1
[PATCH] ROSH: Upgraded
...f st_mode to a ls-style string + * st_mode Mode in other to analyze + * st_mode_str string to hold converted string + */ +void rosh_st_mode_am2str(mode_t st_mode, char *st_mode_str) +{ + st_mode_str[0] = ((st_mode & S_IROTH) ? 'r' : '-'); + st_mode_str[1] = ((st_mode & S_IWOTH) ? 'w' : '-'); + st_mode_str[2] = ((st_mode & S_IXOTH) ? 'x' : '-'); +} + +/* Converts st_mode to an ls-style string + * st_mode mode to convert + * st_mode_str string to hold converted string + */ +void rosh_st_mode2str(mode_t st_mode, char *st_mode_str) +{ +...