similar to: mount.cifs permissions for non-root user via sudo

Displaying 20 results from an estimated 100 matches similar to: "mount.cifs permissions for non-root user via sudo"

2008 May 29
2
Plotting a cubic line from a multiple regression
Dear all, I'm attempting to plot a cubic relationship between two variables controlling for the effects of a third variable. In this short example, I'm trying to use AGE to predict CORTEX while controlling for the effects of TIV (total intracranial volume): ######################## cortex = rnorm(100, mean=0.5, sd=0.5) age = rnorm(100, mean=10, sd=2) tiv = rnorm(100, mean=1000,
2011 Jun 16
1
Sticky bit problem
Hi We are building a Linux app under Centos 5.3, using gnu make 3.81 and gcc 4.12. The working directory is on a remote machine and is either a Samba share or a Windows 7 share. We find that in the case of a Windows 7 share the resulting executable has the sticky bit set in group: On Windows 7 share: -rwxrwSrwx 1 <snip> myapp On Samba share: -rwxrwx--x+ 1 <snip> myapp The
2010 Feb 12
2
Setuid bit always set on Vista mount
Files on my Vista mount always have the S mode (setgid bit?) set according to ls -l. This is a security hole and causes other problems. I can't clear the bit with chmod; in fact the results of doing chmod don't make any sense to me (I'll be glad to provide examples). Typical files show as -rwxrwSrwx, though not all. The smb.conf file has create mask 0666 and directory mask 0777 various
2009 Dec 02
1
CIFS and ghost files.
Hello everyone. I hope I can get some help with this problem we are having. We have a CIFS mount (from a NetApp) were we write files (php application). Then the files are being copied to a directory in the same CIFS filesystem, then a process on a Windows server picks up the file and deletes it. The thing is, later the php app, generates a new file and when it tries to copy it it says
2012 Oct 03
1
Odd Mac OSX 10.6 error on Samba share
Hi All, I've done quite a bit of research on this one and if I'm honest about the cause of this "fault" it's probably because I'm trying to do too much "outside the box" :) Nevertheless I enjoy the challenge so here is the scenario: I have a Samba Service (v3.2.5) providing file shares running on Debian 2.6. The samba server uses a Windows Domain server for
2004 May 27
2
block diagonal matrix function
Hello List I have just written a little function that takes two matrices as arguments and returns a large matrix that is composed of the two input matrices in upper-left position and lower-right position with a padding value everywhere else. (function definition and toy example below). I need nonsquare matrices and rowname() and colname() inherited appropriately. Two questions: (1) Is there a
2011 Jul 29
0
Issue with file permissions when mounting a windows share in linux
Good morning I'm migrating the folders under a Windows 2003 Standard share to a Linux Samba server. I have mounted the Windows share configuring it in /etc/fstab this way: //fitxers/personal /import/personal-antic smbfs username=domuser,password=userpassword 0 0 The mount is performed perfectly and the backup script works fine on most files, but there is a considerable percent of files
2017 Oct 11
1
[PATCH v1 01/27] x86/crypto: Adapt assembly for PIE support
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier <thgarnie at google.com> --- arch/x86/crypto/aes-x86_64-asm_64.S | 45 ++++++++----- arch/x86/crypto/aesni-intel_asm.S
2010 Dec 02
1
PXELinux + Altiris + Tivoli.
Hello All. I have few networks with Tivoli Provision Manager (http://www.ibm.com/developerworks/downloads/tiv/pmfos/?S_TACT=105AGX28&S_CMP=TRIALS ), Altiris (http://www.symantec.com/business/deployment-solution) and WDS (on W2008Stdx32). I successfully expand WDS functionally with pxelinux (4.03).I really like how pxelinux working. Server who respond on client request is on Windows 2008
1998 Sep 18
1
R-beta: undefined reference to `realpr_' ?
Hi, Win95 version, trying to build multiv. Following error (no mention in faq etc, but someone may have mentioned it recently). Appreciate any help. ------- Building multiv.dll from multiv.a -------- echo LIBRARY multiv > multiv.def echo EXPORTS >> multiv.def nm multiv.a | sed -n "/^........ [DT] _/s/^........ [BCDRT] _/ /p" >> multiv.def gcc -mdll
2009 Feb 13
4
Running Xen over NFSv3
Does anyone, is anyone running Xen on NFSv3 successfully? What are some of your pain points/success points? Have you tried a clustered file system with better results such as DRBD or GFS? TIV, Matt _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2010 Oct 01
1
XEN BUG i387.c159 at XEN4.01 on debian squeeze
Hi, we´ve got a bad problem here. We installed a new server with debian squeeze sw-raid and lvm. We´ve installed the the actual xen-linux-system-2.6.32-5-xen-amd64? system with grub2 but get an XEN BUG. We´ve tried alot, tested grub-legacy version but cannot get the XEN kernel to boot up. The XEN BUG occurs a  second after grub boots the kernel and there are no outputs at the serial console with
2014 May 08
2
compile error about 6.0.2
make -r -C /mlsyslinux -f /mlsyslinux/Makefile SRC="/mlsyslinux" \ OBJ=/mlsyslinux objdir=/mlsyslinux bios make[1]: Entering directory `/mlsyslinux' make -r -C /mlsyslinux/bios -f /mlsyslinux/Makefile SRC="/mlsyslinux" \ objdir=/mlsyslinux/bios OBJ=/mlsyslinux/bios HAVE_FIRMWARE=1 \ ARCH=i386 LDLINUX=ldlinux.c32 all make[2]:
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2018 Mar 13
32
[PATCH v2 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2017 Oct 04
28
x86: PIE support and option to extend KASLR randomization
These patches make the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below the top 2G of the virtual address space. It allows to optionally extend the KASLR randomization range from 1G to 3G. Thanks a lot to Ard Biesheuvel & Kees Cook on their feedback on compiler changes, PIE support and KASLR in general. Thanks to
2018 May 23
33
[PATCH v3 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v3: - Update on message to describe longer term PIE goal. - Minor change on ftrace if condition. - Changed code using xchgq. - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends
2017 Oct 11
32
[PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization
Changes: - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends