search for: acllist

Displaying 12 results from an estimated 12 matches for "acllist".

2018 Jan 29
1
Panic: data stack: Out of memory when allocating bytes
..._cur_id = 4 > ??????? backend = 0x7f73f255c498 > ??????? aclobj = 0x7f73f25b5420 > ??????? dir = <value optimized out> > ??????? vname = 0x7f73ebdcee68 > "shared/bill at tutech.de/bla_blub/foo_bar/John Doe" > ??????? error = 0x0 > #18 0x00007f73f0b20740 in acllist_append (backend=0x7f73f255c498) at > acl-backend-vfile-acllist.c:187 > ??????? iter = 0x0 > ??????? ret = <value optimized out> > ??????? aclobj = 0x0 > ??????? rights = {id_type = ACL_ID_USER, identifier = 0x7f73f25c7930 > "betty at tutech.de", rights = 0x7f...
2018 Jan 24
2
Panic: data stack: Out of memory when allocating bytes
On Wed, Jan 24, 2018 at 18:55:47 +0100, Thomas Robers wrote: > Am 23.01.2018 um 20:07 schrieb Josef 'Jeff' Sipek: > > On Tue, Jan 23, 2018 at 14:03:27 -0500, Josef 'Jeff' Sipek wrote: > > > On Tue, Jan 23, 2018 at 18:21:38 +0100, Thomas Robers wrote: ... > > > 1. Do you have any idea what the imap process was doing at the time of the > > >
2015 Mar 18
0
Bug 3831: basic_ncsa_auth Blowfish and SHA support, really fixed?
...atched=0 async=0 finished=0 2015/03/18 17:21:02.637 kid1| Checklist.cc(299) matchNode: 0x7f217e8baca8 simple mismatch 2015/03/18 17:21:02.637 kid1| Checklist.cc(160) checkAccessList: 0x7f217e8baca8 checking 'http_access allow squid_access' 2015/03/18 17:21:02.637 kid1| Acl.cc(336) matches: ACLList::matches: checking squid_access 2015/03/18 17:21:02.637 kid1| Acl.cc(319) checklistMatches: ACL::checklistMatches: checking 'squid_access' 2015/03/18 17:21:02.637 kid1| Acl.cc(281) aclCacheMatchFlush: aclCacheMatchFlush called for cache 0x7f217e9b8cc8 2015/03/18 17:21:02.637 kid1| Acl.cc(61...
2018 Jan 25
0
Panic: data stack: Out of memory when allocating bytes
...nd-vfile.c:169 _data_stack_cur_id = 4 backend = 0x7f73f255c498 aclobj = 0x7f73f25b5420 dir = <value optimized out> vname = 0x7f73ebdcee68 "shared/bill at tutech.de/bla_blub/foo_bar/John Doe" error = 0x0 #18 0x00007f73f0b20740 in acllist_append (backend=0x7f73f255c498) at acl-backend-vfile-acllist.c:187 iter = 0x0 ret = <value optimized out> aclobj = 0x0 rights = {id_type = ACL_ID_USER, identifier = 0x7f73f25c7930 "betty at tutech.de", rights = 0x7f73f25c7948, neg_rights = 0x0,...
2013 Feb 26
2
(no subject)
...gt; /m/sw/dc/2.2-20130226/lib/dovecot/lib01_acl_plugin.so'acl_list_get_root_dir+0x25 [0xffff80ff94c6e3f6] -> /m/sw/dc/2.2-20130226/lib/dovecot/lib01_acl_plugin.so'acl_list_get_path+0x1f [0xffff80ff94c6e4a4] -> /m/sw/dc/2.2-20130226/lib/dovecot/lib01_acl_plugin.so'acl_backend_vfile_acllist_read+0x40 [0xffff80ff94c6e4ff] -> /m/sw/dc/2.2-20130226/lib/dovecot/lib01_acl_plugin.so'acl_backend_vfile_acllist_refresh+0x87 [0xffff80ff94c6e904] -> /m/sw/dc/2.2-20130226/lib/dovecot/lib01_acl_plugin.so'acl_backend_vfile_acllist_verify+0x44 [0xffff80ff94c6f0a0] -> /m/sw/dc/2.2-20...
2018 Nov 28
3
Error logs with virtual folder after upgrading to 2.3.4
2012 Sep 19
5
Dovecot deliver Segmentation fault when arrive the first message
Hi, I have found this strange problem. I'm working with Debian 6, dovecot 2.1.9 and vpopmail-auth. LDA is configured and works fine but the problem is when the first message arrive "dovecot-lda" return a "Segmentation fault", the message is written to the user's Mailbox but the message remains, also, in the queue of qmail (deferral: Segmentation_fault/) and at the
2018 Nov 28
0
Error logs with virtual folder after upgrading to 2.3.4
...; wrote: > > > Since I upgraded to 2.3.4 I have lots of line in logs like these: > > Nov 28 17:35:48 buzalum_rhel7 dovecot: imap(iniramgon at mydomain)<udqWKLx7HN/AqAFh>: Error: unlink(/etc/dovecot/virtual/dovecot-acl-list) failed: Read-only file system (in acl-backend-vfile-acllist.c:338) > Nov 28 17:35:48 buzalum_rhel7 dovecot: imap(iniramgon at mydomain)<udqWKLx7HN/AqAFh>: Error: dovecot-acl-list creation failed: safe_mkstemp(/etc/dovecot/virtual/.temp.buzalum_rhel7.6469.) failed: Read-only file system > > These lines did not happen with Dovecot 2.3.2.1. dov...
2008 Oct 28
4
patch: list shared namespace
Hi, I've been working on a patch for dovecot 1.2 from the Kolab branch (http://hg.intevation.org/kolab/dovecot-1.2_kolab-branch/) that implements listing of shared namespaces. I've got something that works in some basic way but is still missing some pieces. See the attached patch, which also contains some installation and configuration notes. Implementation notes: One of the main
2018 Feb 07
4
BUG: panic when using fs:posix as dict for acl_shared_dict
....so.0(dict_iterate_init_multiple+0x4d) [0x7f0e4a47cadd] -> /usr/lib64/dovecot/libdovecot.so.0(dict_iterate_init+0x29) [0x7f0e4a47cb89] -> /usr/lib64/dovecot/lib01_acl_plugin.so(acl_lookup_dict_rebuild+0x3e1) [0x7f0e49a40371] -> /usr/lib64/dovecot/lib01_acl_plugin.so(acl_backend_vfile_acllist_rebuild+0x488) [0x7f0e49a3dd18] -> /usr/lib64/dovecot/lib01_acl_plugin.so(acl_backend_vfile_object_update+0x3c7) [0x7f0e49a3e867] -> /usr/lib64/dovecot/lib01_acl_plugin.so(acl_mailbox_update_acl+0x68) [0x7f0e49a41e28] -> /usr/lib64/dovecot/doveadm/lib10_doveadm_acl_plugin.so(+0x2c11)...
2007 Jan 06
1
Re: [nut-commits] svn commit r710 - in trunk: . clients server
...:39:08 2007 > @@ -290,7 +290,11 @@ > users = NULL; > } > > +#ifndef HAVE_IPV6 > +static int user_matchacl(ulist_t *user, const struct sockaddr_in *addr) > +#else > static int user_matchacl(ulist_t *user, const struct sockaddr_storage *addr) > +#endif > { > acllist *tmp; > > @@ -328,7 +332,11 @@ > return 0; /* fail */ > } > > +#ifndef HAVE_IPV6 > +int user_checkinstcmd(const struct sockaddr_in *addr, > +#else > int user_checkinstcmd(const struct sockaddr_storage *addr, > +#endif > const char *un, const char *pw, co...
2007 Jan 06
3
Re: [nut-commits] svn commit r708 - in trunk: . clients server
...iginal) > +++ trunk/server/user.c Fri Jan 5 21:06:59 2007 > @@ -290,7 +290,7 @@ > users = NULL; > } > > -static int user_matchacl(ulist_t *user, const struct sockaddr_in *addr) > +static int user_matchacl(ulist_t *user, const struct sockaddr_storage *addr) > { > acllist *tmp; > > @@ -328,7 +328,7 @@ > return 0; /* fail */ > } > > -int user_checkinstcmd(const struct sockaddr_in *addr, > +int user_checkinstcmd(const struct sockaddr_storage *addr, > const char *un, const char *pw, const char *cmd) > { > ulist_t *tmp = users...