Displaying 4 results from an estimated 4 matches for "auth_fields_rollback".
2014 May 11
1
Segfault with passwd as a second userdb at auth_fields_rollback
...field value
If passwd-file had the user, check went fine; otherwise it segfaulted.
The crash has been accompanied by a syslog message:
kernel: auth[9788]: segfault at 18 ip 0000000000416391 sp 00007fffd11a3d90
error 4 in auth[400000+44000]
Translating address lead me to:
0000000000416390 <auth_fields_rollback>:
416390: 53 push %rbx
416391: 48 83 7f 18 00 cmpq $0x0,0x18(%rdi)
I was using packages from http://packages.atrpms.net/dist/el6/dovecot/
To be precise, dovecot-2.2.10-1_14.el6.x86_64.rpm
I tampered with the src.rpm, upgraded spec&sources t...
2015 Aug 06
3
question on autch cache parameters
...s_snapshot(request->extra_fields);
+ request->snapshot_have_userdb_prefetch_set =
+ request->userdb_prefetch_set;
+ if (request->userdb_reply != NULL)
+ auth_fields_snapshot(request->userdb_reply);
+ } else {
+ /* this passdb lookup failed, remove any extra fields it set */
+ auth_fields_rollback(request->extra_fields);
+ if (request->userdb_reply != NULL) {
+ auth_fields_rollback(request->userdb_reply);
+ request->userdb_prefetch_set =
+ request->snapshot_have_userdb_prefetch_set;
+ }
+ }
+
if (passdb_continue && next_passdb != NULL) {
/* try next passd...
2015 Aug 27
0
question on autch cache parameters
...);
> + request->snapshot_have_userdb_prefetch_set =
> + request->userdb_prefetch_set;
> + if (request->userdb_reply != NULL)
> + auth_fields_snapshot(request->userdb_reply);
> + } else {
> + /* this passdb lookup failed, remove any extra fields it set */
> + auth_fields_rollback(request->extra_fields);
> + if (request->userdb_reply != NULL) {
> + auth_fields_rollback(request->userdb_reply);
> + request->userdb_prefetch_set =
> + request->snapshot_have_userdb_prefetch_set;
> + }
> + }
> +
> if (passdb_continue && nex...
2015 Aug 05
3
question on autch cache parameters
Hi list,
I have a question on auth caching in 2.2.18.
I am using acl_groups for a master user, appended in a static userdb file
# snip ###############################
master at uma:{SHA}XXXX=::::::userdb_acl_groups=umareadmaster
allow_nets=127.0.0.1
# snap ###############################
and use this group in a global ACL file.
I discovered this only works on first NOT-cached login