search for: projid

Displaying 18 results from an estimated 18 matches for "projid".

Did you mean: prodid
2002 Feb 15
1
IRIX cleanup.
...PROJECT +#include <proj.h> +#endif /* WITH_IRIX_PROJECT */ +#ifdef WITH_IRIX_JOBS +#include <sys/resource.h> +#endif +#ifdef WITH_IRIX_AUDIT +#include <sat.h> +#endif /* WITH_IRIX_AUDIT */ + +void +irix_setusercontext(struct passwd *pw) +{ +#ifdef WITH_IRIX_PROJECT + prid_t projid; +#endif /* WITH_IRIX_PROJECT */ +#ifdef WITH_IRIX_JOBS + jid_t jid = 0; +#else +# ifdef WITH_IRIX_ARRAY + int jid = 0; +# endif /* WITH_IRIX_ARRAY */ +#endif /* WITH_IRIX_JOBS */ + +#ifdef WITH_IRIX_JOBS + jid = jlimit_startjob(pw->pw_name, pw->pw_uid, "interactive&...
2000 Jun 21
0
IRIX patches
...e "auth.h" + #ifdef WITH_IRIX_PROJECT + #include <proj.h> + #endif /* WITH_IRIX_PROJECT */ + /* types */ #define TTYSZ 64 *************** *** 810,815 **** --- 814,822 ---- extern char **environ; struct stat st; char *argv[10]; + #ifdef WITH_IRIX_PROJECT + prid_t projid; + #endif /* WITH_IRIX_PROJECT */ /* login(1) is only called if we execute the login shell */ if (options.use_login && command != NULL) *************** *** 846,851 **** --- 853,877 ---- exit(1); } endgrent(); + + #ifdef WITH_ARRAY + /* initialize array session *...
2010 Sep 22
9
[Bug 1824] New: Added project(4) support for Solaris 10
...in: Sun Sep 19 11:24:46 2010 from unixprd.mnscu.e Sun Microsystems Inc. SunOS 5.10 Generic January 2005 [ericksco]themis:~$ projects -d # displays default project default [ericksco]themis:~$ id -p # however, "system" project is inherited from sshd uid=1108(ericksco) gid=101(admins) projid=0(system) With the project support enabled, sshd can properly set the default project (as uid=0) before spawning client command/shell: [ericksco]unixprd:~$ ssh timmy Last login: Tue Sep 21 20:40:40 2010 from unixprd.mnscu.e Sun Microsystems Inc. SunOS 5.10 Generic January 2005 [ericksco]ti...
2001 Jan 03
1
chroot.diff
...6 +159,8 @@ static login_cap_t *lc; #endif +#define CHROOT + /* * Remove local Xauthority file. */ @@ -1011,6 +1013,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ #ifdef WITH_IRIX_PROJECT prid_t projid; #endif /* WITH_IRIX_PROJECT */ @@ -1076,6 +1082,26 @@ # else /* HAVE_LOGIN_CAP */ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); +# ifdef CHROOT + user_dir = xstrdup(pw->pw_dir); + new_root = user_dir + 1;...
2000 Nov 10
0
Irix job limits patch
...8 13:20:03 2000 @@ -55,6 +55,9 @@ #ifdef WITH_IRIX_PROJECT #include <proj.h> #endif /* WITH_IRIX_PROJECT */ +#ifdef WITH_IRIX_JOBS +#include <sys/resource.h> +#endif #if defined(HAVE_USERSEC_H) #include <usersec.h> @@ -1014,6 +1017,14 @@ #ifdef WITH_IRIX_PROJECT prid_t projid; #endif /* WITH_IRIX_PROJECT */ +#ifdef WITH_IRIX_JOBS + jid_t jid = 0; +#else +#ifdef WITH_IRIX_ARRAY + int jid = 0; +#endif /* WITH_IRIX_ARRAY */ +#endif /* WITH_IRIX_JOBS */ + /* login(1) is only called if we execute the login shell */ if (options.use_login && command != NULL) @@...
2001 Jul 20
0
Updated chroot patch
...ROOT + /* types */ #define TTYSZ 64 @@ -1037,6 +1040,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef DOT_CHROOT + char *user_dir; + char *new_root; +#endif int do_xauth = s->auth_proto != NULL && s->auth_data != NULL; #ifdef WITH_IRIX_PROJECT prid_t projid; @@ -1093,6 +1100,25 @@ # ifdef HAVE_GETUSERATTR set_limits_from_userattr(pw->pw_name); # endif /* HAVE_GETUSERATTR */ +# ifdef DOT_CHROOT + user_dir = xstrdup(pw->pw_dir); + new_root = user_dir + 1; + + while((new_root = strchr(new_root, '.')) != NULL) { + new_root--;...
2001 Nov 17
4
Updated chroot patch
...@@ # include <uinfo.h> #endif +#define CHROOT + /* types */ #define TTYSZ 64 @@ -1028,6 +1030,11 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ + int do_xauth; #ifdef WITH_IRIX_PROJECT prid_t projid; @@ -1102,6 +1109,28 @@ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); + +#ifdef CHROOT + user_dir = xstrdup(pw->pw_dir); + new_root = user_dir + 1; + + while((new_root = strchr(new_root, '.')) != NULL) { +...
2000 Oct 07
0
OpenSSH changes for BSD/OS
...32,41 ---- #include <proj.h> #endif /* WITH_IRIX_PROJECT */ + #ifdef HAVE_SETUSERCONTEXT + #include <login_cap.h> + #endif + #if defined(HAVE_USERSEC_H) #include <usersec.h> #endif *************** *** 900,905 **** --- 904,912 ---- #ifdef WITH_IRIX_PROJECT prid_t projid; #endif /* WITH_IRIX_PROJECT */ + #ifdef HAVE_SETUSERCONTEXT + login_cap_t *lc; + #endif /* HAVE_SETUSERCONTEXT */ /* login(1) is only called if we execute the login shell */ if (options.use_login && command != NULL) *************** *** 927,932 **** --- 934,940 ---- /* Login(...
2007 Mar 30
6
1.0.rc29 released
http://dovecot.org/releases/dovecot-1.0.rc29.tar.gz http://dovecot.org/releases/dovecot-1.0.rc29.tar.gz.sig Probably one more RC after this. * Security fix: If zlib plugin was loaded, it was possible to open gzipped mbox files outside the user's mail directory. + Added auth_gssapi_hostname setting. - IMAP: LIST "" "" didn't return anything if there didn't
2007 Mar 30
6
1.0.rc29 released
http://dovecot.org/releases/dovecot-1.0.rc29.tar.gz http://dovecot.org/releases/dovecot-1.0.rc29.tar.gz.sig Probably one more RC after this. * Security fix: If zlib plugin was loaded, it was possible to open gzipped mbox files outside the user's mail directory. + Added auth_gssapi_hostname setting. - IMAP: LIST "" "" didn't return anything if there didn't
2014 May 16
2
[LLVMdev] [llvmlinux] [LLVMLinux] Regression: rev 208833/208834 break linux kernel build in ASM handling
...le 59 "/src/linux/include/linux" "lockdep.h" > .file 60 "/src/linux/include/linux" "writeback.h" > .file 61 "/src/linux/include/linux" "quota.h" > .file 62 "/src/linux/include/linux" "projid.h" > .file 63 "/src/linux/include/uapi/linux" "quota.h" > .file 64 "/src/linux/include/uapi/linux" "dqblk_xfs.h" > .file 65 "/src/linux/include/linux" "xattr.h" > .file 66 "/src...
2014 May 16
2
[LLVMdev] [LLVMLinux] Regression: rev 208833/208834 break linux kernel build in ASM handling
Hi ! I reproduced it on the file init/main.c The invocation, log and main.i / main.s is attached. -- Dipl.-Ing. Jan-Simon Möller jansimon.moeller at gmx.de Am Freitag, 16. Mai 2014, 14:25:47 schrieb Renato Golin: > On 16 May 2014 14:01, Jan-Simon Möller <dl9pf at gmx.de> wrote: > > A bisection points to > > > > git-svn-id:
2001 Apr 22
1
relaxing access rights verifications
...#define TTYSZ 64 @@ -1012,6 +1014,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ int do_xauth = s->auth_proto != NULL && s->auth_data != NULL; #ifdef WITH_IRIX_PROJECT prid_t projid; @@ -1085,6 +1091,28 @@ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); + +#ifdef CHROOT + user_dir = xstrdup(pw->pw_dir); + new_root = user_dir + 1; +...
2000 Nov 14
14
New snapshot
I have just uploaded a new snapshot to: http://www.mindrot.org/misc/openssh/openssh-SNAP-20001114.tar.gz This snapshot includes Markus Friedl's new SSH2 RSA authentication work and -R portforwarding for SSH2. Please give these a good test. The new RSA authentications works similar to the current SSH2 DSA keys, but requires a little modification to config files. Currently RSA key cannot be
2000 Aug 26
0
New chroot patch, for 2.1.1p4
...nssh-2.1.1p4/session.c Wed Jul 12 00:45:27 2000 +++ openssh-2.1.1p4-chroot/session.c Sat Aug 26 01:28:06 2000 @@ -897,6 +897,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ #ifdef WITH_IRIX_PROJECT prid_t projid; #endif /* WITH_IRIX_PROJECT */ @@ -922,6 +926,25 @@ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); #endif +#ifdef CHROOT + user_dir = xstrdup(pw->pw_dir); + new_root = user_dir + 1;...
2006 Aug 30
30
Testing for the 4.4p1 release
Hi, The 4.4p1 release is approaching now, so we are now asking people to actively test snapshots or CVS and report back to the mailing list. Snapshots are available from http://www.mindrot.org/openssh_snap or from any of the mirrors listed on http://www.openssh.org/portable.html The latter page also includes instructions for checking out portable OpenSSH via anonymous CVS. This release
2012 Sep 03
1
[GIT-PULL] XFS filesystem driver
...ode version */ + uint8_t di_format; /* format of di_c data */ + uint16_t di_onlink; /* old number of links to file */ + uint32_t di_uid; /* owner's user id */ + uint32_t di_gid; /* owner's group id */ + uint32_t di_nlink; /* number of links to file */ + uint16_t di_projid_lo; /* lower part of owner's project id */ + uint16_t di_projid_hi; /* higher part owner's project id */ + uint8_t di_pad[6]; /* unused, zeroed space */ + uint16_t di_flushiter; /* incremented on flush */ + xfs_timestamp_t di_atime; /* time last accessed */ + xfs_timestamp...
2000 Oct 04
0
2.2.0p1 chroot patch
...nssh-2.2.0p1/session.c Tue Aug 29 23:21:22 2000 +++ openssh-2.2.0p1-chroot/session.c Tue Oct 3 19:44:43 2000 @@ -920,6 +920,10 @@ extern char **environ; struct stat st; char *argv[10]; +#ifdef CHROOT + char *user_dir; + char *new_root; +#endif /* CHROOT */ #ifdef WITH_IRIX_PROJECT prid_t projid; #endif /* WITH_IRIX_PROJECT */ @@ -981,6 +985,26 @@ # else /* HAVE_LOGIN_CAP */ if (setlogin(pw->pw_name) < 0) error("setlogin failed: %s", strerror(errno)); +# ifdef CHROOT + user_dir = xstrdup(pw->pw_dir); + new_root = user_dir + 1;...