search for: kstart

Displaying 12 results from an estimated 12 matches for "kstart".

Did you mean: start
2013 Jan 06
0
How to use predict function from R2OpenBUGS results
...osetime[1],units="hours"),difftime(dosetime[3],dosetime[2],units="hours"),difftime(dosetime[4],dosetime[3],units="hours"),difftime(dosetime[5],dosetime[4],units="hours"),difftime(dosetime[6],dosetime[5],units="hours"))) times[ is.na(times) ] <- 0 KSTART <-0.06 dosetotal <-matrix(c(dosetotal[1],dosetotal[2],dosetotal[3],dosetotal[4],dosetotal[5])) dosetotal[ is.na(dosetotal) ] <- 0 initc <-if (times[1,]==0) 0 else dosetotal[1]*exp(-KSTART*(times[1]+times[2]+times[3]+times[4]+times[5]))+dosetotal[2]*exp(-KSTART*(times[2]+times[3]+times[4...
2024 Feb 26
1
'Scripted' machine account renewal?!
...and keytab for authentication, no >> hassle with passwords at all... > Interesting... i supposed that still Kerberos ticket have to be 'upgraded', > so... there's really a way to generate a 'permanent' kerberos ticket? > > Some info on how to do this? Thanks. kstart do exactly that, it manages and refreshes the ticket for long running processes. On Debian it is available as a package, the home page is here https://www.eyrie.org/~eagle/software/kstart/ - Kees. >
2024 Feb 26
1
'Scripted' machine account renewal?!
Mandi! Kees van Vloten via samba In chel di` si favelave... >> For a sake of simplicity i'm thinking to use machine account (-P). > There is "net changetrustpw" to do this. Ok, i've missed that. Thanks. > If you just have a service that does LDAP-queries, I would create an > ordinary user-account for it (and start it's name e.g. with "svc_").
2020 Jun 22
2
Winbind help - with domain migration.
Hello guys I need some lights to migrate a Winbind/Samba share to a new AD. My scenario is: I have an old AD running on a Debian 9 and Samba 4.5.16 with many replication issues. Then I decided to create a new one from the scratch using Debian 10 and Samba 4.12.2 (and everything is working perfectly). I have migrated all the accounts/machines/etc from old to new domain without any problem. Both the
2013 Aug 28
2
nslcd: kerberos vs. simple bind
Hello, I took this out of the "OpenSSH auth in SAMBA4 LDAP" thread, because it was drifting away from it's origin question :-) I played this afternoon a bit with nslcd and kerberos for extending my Wiki HowTo. But as more as I read, one question comes bigger and bigger: What are the advantages of kerberos against simple bind with DN and password? Simple bind method: Create a
2015 Mar 04
2
Is there a listprincs equivalent?
I joined a machine. net ads testjoin says OK. The join exported a keytab, which among others contains MACHINE$@REALM. However, trying k5start I get "Client not found in Kerberos database". Also kinit -t /etc/krb5.keytab MACHINE\$@REALM claims that the client was not found. But then, how did it come into the keytab? Is there a tool to list the principals in AD? Kind regards, -
2020 Jun 22
0
Winbind help - with domain migration.
...?? passwd? uid??????????????? sAMAccountName map???? passwd? homeDirectory????? unixHomeDirectory map???? passwd? gecos????????????? displayName # Uncomment the following line to use Domain Users as the users primary group #map???? passwd? gidNumber????????? primaryGroupID I also used to use 'kstart' to keep the kerberos ticket valid. Rowland
2020 Jun 22
2
Winbind help - with domain migration.
...AccountName > map passwd homeDirectory unixHomeDirectory > map passwd gecos displayName > # Uncomment the following line to use Domain Users as the users primary > group > #map passwd gidNumber primaryGroupID > > I also used to use 'kstart' to keep the kerberos ticket valid. > > Rowland > > > I will try to correct this line as you pointed me. Thanks > -- > To unsubscribe from this list go to the following URL and read the > instructions: https://lists.samba.org/mailman/options/samba > -- Daniel...
2014 Nov 08
7
[Bug 2310] New: functionality to start process before ssh and/or to "wrap" such command around ssh
...on of kerberos credentials, than all further connections could accidentally inherit the credentials from the first one, started with k5start wrapped around. Cheers, Chris. [0] https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-October/033082.html [1] http://www.eyrie.org/~eagle/software/kstart/ -- You are receiving this mail because: You are watching the assignee of the bug.
2023 Jun 29
3
[PATCH drm-next v6 02/13] drm: manager to keep track of GPUs VA mappings
...64 end = addr + range; + u64 mm_start = mgr->mm_start; + u64 mm_end = mm_start + mgr->mm_range; + + return addr >= mm_start && end <= mm_end; +} + +static inline bool +drm_gpuva_in_kernel_node(struct drm_gpuva_manager *mgr, u64 addr, u64 range) +{ + u64 end = addr + range; + u64 kstart = mgr->kernel_alloc_node.va.addr; + u64 krange = mgr->kernel_alloc_node.va.range; + u64 kend = kstart + krange; + + return krange && addr < kend && kstart < end; +} + +static inline bool +drm_gpuva_range_valid(struct drm_gpuva_manager *mgr, + u64 addr, u64 range)...
2023 Jul 13
1
[PATCH drm-next v7 02/13] drm: manager to keep track of GPUs VA mappings
...+{ + u64 end = addr + range; + u64 mm_start = mgr->mm_start; + u64 mm_end = mm_start + mgr->mm_range; + + return addr >= mm_start && end <= mm_end; +} + +static bool +drm_gpuva_in_kernel_node(struct drm_gpuva_manager *mgr, u64 addr, u64 range) +{ + u64 end = addr + range; + u64 kstart = mgr->kernel_alloc_node.va.addr; + u64 krange = mgr->kernel_alloc_node.va.range; + u64 kend = kstart + krange; + + return krange && addr < kend && kstart < end; +} + +static bool +drm_gpuva_range_valid(struct drm_gpuva_manager *mgr, + u64 addr, u64 range) +{ + +...
2023 Jul 20
2
[PATCH drm-misc-next v8 01/12] drm: manager to keep track of GPUs VA mappings
...+{ + u64 end = addr + range; + u64 mm_start = mgr->mm_start; + u64 mm_end = mm_start + mgr->mm_range; + + return addr >= mm_start && end <= mm_end; +} + +static bool +drm_gpuva_in_kernel_node(struct drm_gpuva_manager *mgr, u64 addr, u64 range) +{ + u64 end = addr + range; + u64 kstart = mgr->kernel_alloc_node.va.addr; + u64 krange = mgr->kernel_alloc_node.va.range; + u64 kend = kstart + krange; + + return krange && addr < kend && kstart < end; +} + +static bool +drm_gpuva_range_valid(struct drm_gpuva_manager *mgr, + u64 addr, u64 range) +{ + +...