search for: gr_gid

Displaying 20 results from an estimated 21 matches for "gr_gid".

2006 Aug 10
6
3.0.20 -> 3.0.23 SID/group error?? Won't connect.
Gerry, all: HELP! On mandriva, I compiled samba from source and got it running, but I cannot connect from windows. (see my post from earlier "[Samba] Compiling and Configuring Samba for Mandrival") I think this relates to the group/SID changes discussed in the release notes. However, I'm not smart enough to figure it out. The tarball compiled and installed fine. It
2014 Aug 27
1
pty_setowner and tty permissions
...2 Aug 27 13:06 /dev/pty2 Since Cygwin sets the permissions more tight to begin with, I was wondering why the permissions are this open. Turns out, sshd sets them like this: /* Determine the group to make the owner of the tty. */ grp = getgrnam("tty"); if (grp) { gid = grp->gr_gid; mode = S_IRUSR | S_IWUSR | S_IWGRP; } else { gid = pw->pw_gid; mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH; } On Windows no group called "tty" exists, so sshd always sets the permissions to 0622 on Cygwin. My question is, isn't that a security problem? Shouldn'...
2004 Jan 21
0
AD Primary Group Masked by Local Primary Group
..."localgrp", is returned. [ 932]: nss_winbind: Initialized nss_winbind group backend [ 932]: nss_winbind: _nss_winbind_setgrent_solwrap [ 932]: setgrent ... [ 932]: getgrent group.gr_name = Domain Users group.gr_passwd = x group.gr_gid = 10000 group.gr_mem = 0x25afc (user1a) 0x25b00 (user2a) [ 932]: nss_winbind: _nss_winbind_getgrent_solwrap: Returning group: Domain Users ... [ 932]: getgrent group.gr_name = globalgrp group.gr_pas...
2020 Sep 25
0
[RFC PATCH 01/19] tools/virtiofsd: add support for --socket-group
...OG_ERR, "vhost socket bind: %m\n"); close(listen_sock); umask(old_umask); return -1; } + if (se->vu_socket_group) { + struct group *g = getgrnam(se->vu_socket_group); + if (g) { + if (!chown(se->vu_socket_path, -1, g->gr_gid)) { + fuse_log(FUSE_LOG_WARNING, + "vhost socket failed to set group to %s (%d)\n", + se->vu_socket_group, g->gr_gid); + } + } + } umask(old_umask); if (listen(listen_sock, 1) == -1) { --...
2004 Aug 06
6
[PATCH] Icecast2 - chroot, setuid/gid...
Hi all again... I did a chroot patch with ability to change uid and gid. I dunno if you all approve with the current implementation but the patch is small and it works here. remember to CC, since i'm not on this ml... //Ian Kumlien PS. To anyone on vorbis-dev, I'm *REALLY* sorry must be tired or something.. =) DS. <p><p><p> -------------- next part -------------- A
2017 Mar 14
1
[PATCH] lib: libvirt: If root, run qemu as root.root.
...); - goto cleanup; - } - - if (chmod (data->console_path, 0660) == -1) { - perrorf (g, "chmod: %s", data->console_path); - goto cleanup; - } - - grp = getgrnam ("qemu"); - if (grp != NULL) { - if (chown (data->guestfsd_path, 0, grp->gr_gid) == -1) { - perrorf (g, "chown: %s", data->guestfsd_path); - goto cleanup; - } - if (chown (data->console_path, 0, grp->gr_gid) == -1) { - perrorf (g, "chown: %s", data->console_path); - goto cleanup; - } - } else -...
2018 May 21
2
[PATCH for discussion only] lib: libvirt: If root, run qemu subprocess as root.root.
libvirt doesn't have a concept of "session qemu" for root: https://bugzilla.redhat.com/show_bug.cgi?id=890291 When a libguestfs-using process runs as root, and libvirt runs a qemu subprocess, the qemu subprocess is run as a non-root user (typically qemu.qemu). This causes various problems, for example if we try to open a file which is readable by root but unreadable by qemu.qemu
2016 Jan 29
7
[PATCH 1/6] launch: unix: check for length of sockets
Error out early if the path to the socket will not fit into sockaddr_un::sun_path, as we will not be able to connect to it. --- src/launch-unix.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/src/launch-unix.c b/src/launch-unix.c index 740c554..973e14b 100644 --- a/src/launch-unix.c +++ b/src/launch-unix.c @@ -47,6 +47,12 @@ launch_unix (guestfs_h *g, void *datav, const char
2009 Aug 02
0
Disable networking
...t" #endif int main(int argc, char *argv[]) { struct group *gr; if (argc <= 1) { fprintf(stderr, "Usage: %s command [ arg ... ]\n", argv[0]); exit(1); } if (!(gr = getgrnam(_NONET_GROUP))) { perror("getgrnam"); exit(1); } if (setgid(gr->gr_gid) == -1) { perror("setgid"); exit(1); } if (setuid(getuid()) == -1) { perror("setuid"); exit(1); } argv++; argc--; if (execvp(*argv, argv) == -1) { perror("execvp"); exit(1); } exit(0); /* not reached */ } (compile and make...
2003 Jun 13
0
Problem with large NIS groups - Samba 2.2.8
...a lookup by gid, but this involves a sequential search and it turns out to be unacceptably expensive: struct sys_userlist *get_users_in_group_by_gid(gid_t gid) { struct sys_userlist *list_head = NULL; struct group *gptr; setgrent(); while((gptr = getgrent()) != NULL) { if (gid == gptr->gr_gid) { list_head = add_members_to_userlist(list_head, gptr); if (list_head == NULL) return NULL; } } endgrent(); return list_head; } It all comes down to the fact that matches are not done against an instantiated user context with all groups mapped to GIDs. Is there any way oth...
2006 Jul 14
1
Samba 3.0.23 winbind use default domain = yes behaviour
Hello list, I encountered a problem in Samba 3.0.23 regarding the winbind use default domain = yes behaviour. It only works for the users an NOT anymore for the Group. So this make getent group to show NETBIOSDOMAINNAME/group which course mail squid configuration to fail. My squid configuration allowed access based on the AD groups, which are provided by Winbindd. Tested distribution: SuSE
2015 Mar 04
1
IP drop list
On 03/04/2015 09:45 PM, Dave McGuire wrote: > On 03/04/2015 03:37 PM, Oliver Welter wrote: >> Am 04.03.2015 um 21:03 schrieb Dave McGuire: >>> Am 04.03.2015 um 20:12 schrieb Michael Orlitzky: >>>> Please add [DNSBL] support to iptables instead of Dovecot. It's a waste of >>>> effort to code it into every application that listens on the network.
2013 Mar 07
3
[PATCH 0/3] protocol: Abstract out socket operations.
I've been taking a long hard look at the protocol layer. It has evolved over a long time without any particular direction, and the result is, to say the least, not very organized. These patches take a first step at cleaning up the mess by abstracting out socket operations from the rest of the code. The purpose of this is to allow us to slot in a different connection layer under the
2017 Jan 31
0
[PATCH nbdkit] Add support for socket activation.
...t_incoming_connections (socks, nr_socks); + free_listening_sockets (socks, nr_socks); /* also closes them */ + return; + } + /* Handling a single connection on stdin/stdout. */ if (listen_stdin) { change_user (); @@ -752,3 +806,60 @@ parsegroup (const char *id) return grp->gr_gid; } + +/* Returns 0 if no socket activation, or the number of FDs. + * See also virGetListenFDs in libvirt.org:src/util/virutil.c + */ +static unsigned int +get_socket_activation (void) +{ + const char *s; + unsigned int pid; + unsigned int nr_fds; + unsigned int i; + int fd; + + s = getenv (...
2019 Jan 14
6
[PATCH nbdkit incomplete 0/5] Port to Windows.
This is an incomplete port to Windows. Currently the server compiles and starts up successfully, but goes into an infinite loop when you connect to it. Nevertheless I think the approach is ready for feedback. This being Windows the changes go quite deep. Rich.
2020 Aug 15
3
[PATCH EXPERIMENTAL nbdkit 0/2] Port to Windows using mingw.
The patches following do indeed allow you to compile nbdkit.exe, but it does not actually work yet. I'm posting this experimental series more as a work in progress and to get feedback. Note this does not require Windows itself to build or test. You can cross-compile it using mingw64-* packages on Fedora or Debian, and test it [spoiler alert: it fails] using Wine. Rich.
2020 Sep 25
20
[RFC PATCH 00/19] vhost-user-rpmb (Replay Protected Memory Block)
Hi, This is an initial implementation of a vhost-user backend for the VirtIO RPMB device. The device is currently in the draft of the next VirtIO specification and describes block device which uses combination of a key, nonce, hashing and a persistent write counter to prevent replay attacks (hence Replay Protected Memory Block). It is implemented as a vhost-user device because we want to
2020 Aug 18
15
[PATCH nbdkit 0/9] Port to Windows.
Also available here: https://github.com/rwmjones/nbdkit/tree/2020-windows-mingw This is the port to Windows using native Windows APIs (not MSYS or Cygwin). This patch series is at the point where it basically now works. I can run the server with the memory plugin, and access it remotely using guestfish, creating filesystems and so on without any apparent problems. Nevertheless there are many
2012 Sep 17
9
[PATCH] Upgrade vtpmd to berlios version 0.7.4
...case ''g'': ++ grp = getgrnam(optarg); ++ if (grp == NULL) { ++ error("invalid group name ''%s''\n", optarg); ++ exit(EXIT_FAILURE); ++ } ++ opt_gid = grp->gr_gid; ++ break; ++ case ''c'': ++ tpm_config = strtol(optarg, NULL, 0); ++ debug("tpm_config = %04x", tpm_config); ++ break; ++ case ''?'': ++ error("unknown op...
2020 Aug 20
15
[PATCH nbdkit 0/13] Port to Windows without using a separate library.
Also available here: https://github.com/rwmjones/nbdkit/tree/2020-windows-mingw-nolib After a lot of work I have made the port to Windows work without using a separate library. Instead, on Windows only, we build an "import library" (library of stubs) which resolves references to nbdkit_* functions in the main program and fixes up the plugin, basically the first technique outlined in