Displaying 7 results from an estimated 7 matches for "pbkac".
Did you mean:
pebkac
2014 Aug 12
3
doveadm pw with SHA512-CRYPT won't roundtrip
Hi,
Not sure if this is a PBKAC or not:-
root at ds3:/usr/share/postfixadmin# doveadm pw -s SHA512-CRYPT -p password
{SHA512-CRYPT}$6$aUgGXP0UshkMj7hY$9JV4yMRsjIe/98CzmglYrMjf.9NJ.FXzxcLE9B0v3doCRUWo2wRncc6hg6VCs0DCUHQbeC/bRDZdGCge/nB/h/
root at ds3:/usr/share/postfixadmin# doveadm pw -t {SHA512-CRYPT}$6$aUgGXP0UshkMj7hY$9JV4yM...
2018 Feb 07
0
retpoline mitigation and 6.0
On Wed, 2018-02-07 at 10:11 -0800, Guenter Roeck wrote:
> On Wed, Feb 07, 2018 at 10:49:25AM +0000, David Woodhouse wrote:
> > Hm, please could we also have the %V asm constraint modifier? That
> > allows us to emit calls to the thunks from inline asm using the
> > register that the compiler chose for us:
> >
> > asm volatile ("call
2018 Feb 07
3
retpoline mitigation and 6.0
...> care about CET compatibility there, so I'm OK to implement the bare
> ret-equivalent __x86_indirect_thunk.
>
> The former... wtf? Can you show me the code that actually *calls* that.
> I am having difficulty imagining any situation in which that's sane.
Turns out this was PBKAC. That was with chromeos-4.14, which does not yet
include the upstream patch removing __x86_indirect_thunk_esp. I don't
see it with ToT. The "U" was from ./arch/x86/lib/lib-ksyms.o, meaning it
was internally generated. Sorry for the noise.
Guenter
2007 Jun 21
8
feature request - prevent user stupidity (eg mine)
I foolishly made the following typo:
"
disk = [ ''phy:/dev/vg00/virt-smtp1-root,0301,w'',
''phy:/dev/vg00/virt-smtp1-root,0302,w'' ]
"
instead of:
"
disk = [ ''phy:/dev/vg00/virt-smtp1-root,0301,w'',
''phy:/dev/vg00/virt-smtp1-swap,0302,w'' ]"
(the type was that the same Dom0 block device is used twice in the
2018 Feb 07
0
retpoline mitigation and 6.0
...lity there, so I'm OK to implement the bare
> > ret-equivalent __x86_indirect_thunk.
> >
> > The former... wtf? Can you show me the code that actually *calls* that.
> > I am having difficulty imagining any situation in which that's sane.
>
> Turns out this was PBKAC. That was with chromeos-4.14, which does not yet
> include the upstream patch removing __x86_indirect_thunk_esp. I don't
> see it with ToT. The "U" was from ./arch/x86/lib/lib-ksyms.o, meaning it
> was internally generated. Sorry for the noise.
OK... which __x86_indirect_thu...
2018 Feb 07
2
retpoline mitigation and 6.0
On Wed, Feb 07, 2018 at 10:49:25AM +0000, David Woodhouse wrote:
> On Wed, 2018-02-07 at 06:20 +0000, Chandler Carruth wrote:
> > I've landed the patch in r324449.
> >
> > Before we merge this into two different Clang release branches and
> > almost immediately release one of them, I would really like someone
> > to confirm that this patch works well with the
2003 Oct 27
92
Help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
dragen@pbsi.org ?rta:
| I am hacing trouble. I can see my linux box from my windows box, I can
connect
| and browse but I cant delete or modify files. Do I have something wrong?
|
| The is my smb.conf
|
| [global]
| netbios name = dragenlinux
| server string = "DragenLinux"
| workgroup = WORKGROUP
| security = share
| log file =