Displaying 20 results from an estimated 83 matches for "pflags".
Did you mean:
flags
2003 Oct 30
2
sftp client reget reput
we have implemented this function for 3.1p1, and have been using it in
production sense may 2002. The patch has been ported to 3.7.1p2, we have
been using it in 3.7.1p2 for awhile, if anyone is interested, here it is.
This is the same patch David Bradford talked about on 2002-06-05
Regards,
Greg Hayes
diff -u -r openssh-3.7.1p2/sftp-client.c openssh-3.7.1p2_sftp/sftp-client.c
---
2003 Oct 01
1
3.7.1p2 sftp recurse patch
This patch is against OpenSSH 3.7.1p2 sources. It adds recursive
(directory) downloading and uploading. Criticism/suggestions welcome.
I would imagine the time official support is added, recursive operations
will be handled on a per-command basis as a flag as opposed to a global
toggle command (such as get -r)?
diff -ru openssh-3.7.1p2/sftp-int.c openssh-3.7.1p2-patched/sftp-int.c
---
2013 Oct 14
0
[PATCH-resend] Implement SSH2_FXF_APPEND
...==============================================================
RCS file: /cvs/openssh/sftp-server.c,v
retrieving revision 1.114
diff -u -p -r1.114 sftp-server.c
--- sftp-server.c 1 Jun 2013 21:31:19 -0000 1.114
+++ sftp-server.c 30 Sep 2013 08:16:57 -0000
@@ -130,6 +130,8 @@ flags_from_portable(int pflags)
} else if (pflags & SSH2_FXF_WRITE) {
flags = O_WRONLY;
}
+ if (pflags & SSH2_FXF_APPEND)
+ flags |= O_APPEND;
if (pflags & SSH2_FXF_CREAT)
flags |= O_CREAT;
if (pflags & SSH2_FXF_TRUNC)
@@ -156,6 +158,8 @@ string_from_portable(int pflags)
PAPPEND("READ"...
2013 Sep 10
2
[Bug 2151] New: Call to upload_dir() has pflag and printflag swapped
https://bugzilla.mindrot.org/show_bug.cgi?id=2151
Bug ID: 2151
Summary: Call to upload_dir() has pflag and printflag swapped
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Other
Status: NEW
Severity: trivial
Priority: P5
Component: sftp
Assignee:
2002 Feb 06
2
SFTP Status Bar..
This is the LAST version I plan on doing.. If I hear no feed back good
or bad. Then I'll assume I've wasted my time on a feature that people
whine about but don't care to try. This is against 3.0.2pX so it
should be VERY easy for anyone to test.
- Ben
diff -ur openssh-3.0.2p1/misc.c openssh/misc.c
--- openssh-3.0.2p1/misc.c Tue Jul 3 23:46:58 2001
+++ openssh/misc.c Wed Feb 6
2001 Jun 20
1
SFTP Logging Redux.
...formation. */
+#define CUNAME cuname ? cuname : "UNKNOWN"
+struct passwd *upw;
+uid_t cuid;
+pid_t ppid;
+char *cuname;
+/* portable attibutes, etc. */
typedef struct Stat Stat;
struct Stat {
@@ -115,6 +121,28 @@
return flags;
}
+void
+sflags_from_portable(char *psflags, int pflags)
+{
+ if (pflags & SSH2_FXF_READ)
+ *psflags = 'r';
+ psflags++;
+ if (pflags & SSH2_FXF_WRITE)
+ *psflags = 'w';
+ psflags++;
+ if (pflags & SSH2_FXF_APPEND)
+ *psflags = 'a';
+ psflags++;
+ if (pflags & SSH2_FXF_CREAT)
+ *psflags = 'c';
+ psflag...
2002 Feb 02
0
Version two of progressbar for scp/sftp
Again, this has been lightly tested. I think there still are a few glitchs.
1. stole progressmeter() from scp.c - clean up and simplified a little
to remove the 'flag' status. It now understands how to initialize itself
and how to terminate itself. Along with a malloced status bar instead
of the original fix width bar.
2. removed all initialization code from scp.c for progressmeter()
2002 Nov 05
2
[PATCH] fix sftp to preserve permissions and uid/gid
Sftp fails to correctly preserve permissions when fetching a file. It adds
write permission for the owner (presumably so it can write the file).
Sftp also fails to preserve the uid/gid. Added code so that if is running
as root, uid and gid are preserved.
patch is based on Openssh 3.4p1.
*** sftp-client.c@@\main\1 Tue Oct 1 17:26:20 2002
--- sftp-client.c Tue Nov 5 10:22:52 2002
2002 Mar 15
4
PATCH: sftp-server logging.
...n "No such file or directory";
+ case SSH2_FX_PERMISSION_DENIED:
+ return "Permission denied.";
+ case SSH2_FX_BAD_MESSAGE:
+ return "Bad message";
+ default:
+ return "Unknown error";
+ }
+ }
+ #endif
+
static int
flags_from_portable(int pflags)
{
***************
*** 115,120 ****
--- 143,173 ----
return flags;
}
+ #ifdef SFTP_LOGGING
+ void
+ sflags_from_portable(char *psflags, int pflags)
+ {
+ if (pflags & SSH2_FXF_READ)
+ *psflags = 'r';
+ psflags++;
+ if (pflags & SSH2_FXF_WRITE)
+ *psflags = 'w...
2013 Jun 27
0
[LLVMdev] Proposal: extended MDString syntax
On Jun 26, 2013, at 4:18 PM, Eric Christopher <echristo at gmail.com> wrote:
> So inverting it so that MI contains LLVM IR instead of the other way
> around? Then we'd need a serialization format for MI that happened to
> include a way of serializing LLVM IR within. From a quick "hey, this
> seems reasonable" the idea of embedding the MI into the IR rather than
2002 Jan 03
3
[PATCH] Improving sftp client performance
The included patch for openssh 3.0.2p1 implements overlapping read
requests for the sftp client. It should be able to handle weird cases
such as shriking files and reordered responses. This is only the first
shot, and I'd be happy for any comments. I plan to implement something
similar for the write path if this works out well.
The maximum number of outstanding requests is quite high at
2018 Dec 06
0
[PATCH 1/3] drm/qxl: allow both PRIV and VRAM placement for QXL_GEM_DOMAIN_SURFACE
qxl surfaces (used for framebuffers and gem objects) can live in both
VRAM and PRIV ttm domains. Update placement setup to include both. Put
PRIV first in the list so it is preferred, so VRAM will have more room
for objects which must be allocated there.
Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>
---
drivers/gpu/drm/qxl/qxl_object.c | 4 ++--
1 file changed, 2 insertions(+), 2
2018 Dec 12
0
[PATCH v2 07/18] drm/qxl: allow both PRIV and VRAM placement for QXL_GEM_DOMAIN_SURFACE
qxl surfaces (used for framebuffers and gem objects) can live in both
VRAM and PRIV ttm domains. Update placement setup to include both.
Put PRIV first in the list so it is preferred, so VRAM will have more
room for objects which must be allocated there.
Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>
---
drivers/gpu/drm/qxl/qxl_object.c | 4 +++-
1 file changed, 3 insertions(+), 1
2019 Oct 17
0
[PATCH 5/5] drm/qxl: allocate small objects top-down
qxl uses small buffer objects for qxl commands.
Allocate them top-down to reduce fragmentation.
Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>
---
drivers/gpu/drm/qxl/qxl_object.c | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/drivers/gpu/drm/qxl/qxl_object.c b/drivers/gpu/drm/qxl/qxl_object.c
index 927ab917b834..ad336c98a0cf 100644
---
2006 Oct 09
0
ReconRefFrames() - Possible Bug?
Hi All,
I'm just debugging my current implementation of Theora, and while
nothing is crashing I noticed the following bit of code in the
ReconRefFrames() function:
around line 1133 lib\dct_decode.c
fn[0]=i-1;
fn[1]=i-FragsAcross-1;
fn[2]=i-FragsAcross;
fn[3]=i-FragsAcross+1;
/* fragment valid for prediction use if coded and it comes
from same frame as the one we are
2000 Aug 18
0
[PATCH] Support symlinks in scp of openssh 2
I'm fond of the "-a" (archive) option of cp, and I'm a heavy user of
scp, so I guess it's inevitable that I would eventually add support
for "-a" to scp. :-) Actually, it's a "-L" flag for preserving
symlinks, and a "-a" flag that is shorthand for "-Lpr".
Please let me know if I'm not doing this right.... I made a great
2010 Sep 17
3
ZFS Dataset lost structure
...gid 60001
atime Sun Oct 18 00:49:05 2009
mtime Thu Sep 9 16:22:14 2010
ctime Thu Sep 9 16:22:14 2010
crtime Sun Oct 18 00:49:05 2009
gen 444453
mode 100777
size 274877906945
parent 3
links 1
pflags 40800000104
xattr 0
rdev 0x0000000000000000
if i further investigate:
zdb -ddddd dataset 7
Dataset store/nfs/ICLOS/prod/mail-cts [ZPL], ID 4525, cr_txg 91826, 149G, 5 objects, rootbp DVA[0]=<0:6654f24000:200> DVA[1]=<1:1a1e3c3600:200> [L0 D
MU objset] fletcher4...
2002 Jan 06
3
sftp/scp performance testing
Folks, I've noticed poor performance using sftp. If anyone has any
advice on how to improve performance, I'd like to hear it. Test simply
involved transferring a single 143MB MP3 file using defaults for all the
program configs. The opensshd 3.0.2p1 server is used in all tests.
Software:
openssh suite 3.0.2p1
psftp (putty sftp client) latest dev snapshot
pscp (putty scp client) latest
2004 Aug 31
1
[PATCH] supporting a remote scp path option in scp
Hi there,
I've written some enhancements to scp.c and pathnames.h to enable the scp
to arbitrarily set the remote scp path.
(eg $ scp -e /usr/bin/scp foo user at bar:foo)
I did read the "scp: command not found" FAQ entry but I'm not quite sure
why we can't do this, unless it's because enhancements to scp are no
longer a priority. Any other reason why it "is the
2002 Dec 05
2
[Bug 452] sftp does not abort when commands given via -b fail
http://bugzilla.mindrot.org/show_bug.cgi?id=452
------- Additional Comments From spin at avalon.net 2002-12-06 03:15 -------
Forgot to mention that this is 3.1p1-6 RedHat RPM.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.