search for: s_iwgrp

Displaying 20 results from an estimated 32 matches for "s_iwgrp".

Did you mean: s_irgrp
2014 Aug 27
1
pty_setowner and tty permissions
...n sets the permissions more tight to begin with, I was wondering why the permissions are this open. Turns out, sshd sets them like this: /* Determine the group to make the owner of the tty. */ grp = getgrnam("tty"); if (grp) { gid = grp->gr_gid; mode = S_IRUSR | S_IWUSR | S_IWGRP; } else { gid = pw->pw_gid; mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH; } On Windows no group called "tty" exists, so sshd always sets the permissions to 0622 on Cygwin. My question is, isn't that a security problem? Shouldn't the permissions set to 0600 if a &qu...
2002 Jun 26
3
OpenSSH 3.4 released
OpenSSH 3.4 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support and encouragement. Changes since OpenSSH 3.3: ============================
2006 Oct 30
0
File Store permissions
...pathname) { + struct stat stt; Store *new_store = store_new(); new_store->dir.path = estrdup(pathname); + + new_store->file_mode = S_IRUSR | S_IWUSR; + if (!stat(new_store->dir.path, &stt) && + stt.st_gid == getgid()) { + if (stt.st_mode & S_IWGRP) + umask(S_IWOTH); + new_store->file_mode |= stt.st_mode & (S_IRGRP | S_IWGRP); + } + new_store->touch = &fs_touch; new_store->exists = &fs_exists; new_store->remove = &fs_remove;
2003 Nov 23
1
[PATCH] dd O_CREAT permission
...Y_SIZE(x) (sizeof(x) / sizeof(x[0])) @@ -483,7 +485,7 @@ int main(int argc, char *argv[]) * Open the output file, if specified. */ if (OPT_OF->str) { - wr_fd = open(OPT_OF->str, O_RDWR|O_CREAT); + wr_fd = open(OPT_OF->str, O_RDWR|O_CREAT,~umask(0) & (S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP|S_IROTH|S_IWOTH)); if (wr_fd == -1) { perror("open output file"); return 1; -- USB is for mice, FireWire is for men! sUse lINUX ag, n?RNBERG
1999 Feb 02
1
Unix permission problems with 'attrib'
Hi, I'm been using Samba for some time and I have been bugged by a problem with SourceSafe. I finally took some time to see what is going on and found the source of the problem (well, not in the source code though). I'm partially responsible, I have Unix files with the following rights "r--rw---" and Samba does not deal with these very well. I am now makind sure that this case
2003 Feb 08
1
compare st_mode & 07777, or Aix dirs always differ
...define S_IRWXU 00700 +#endif +#ifndef S_IRUSR +#define S_IRUSR 00400 +#endif #ifndef S_IWUSR -#define S_IWUSR 0200 +#define S_IWUSR 00200 +#endif +#ifndef S_IXUSR +#define S_IXUSR 00100 +#endif +#ifndef S_IRWXG +#define S_IRWXG 00070 +#endif +#ifndef S_IRGRP +#define S_IRGRP 00040 +#endif +#ifndef S_IWGRP +#define S_IWGRP 00020 +#endif +#ifndef S_IXGRP +#define S_IXGRP 00010 +#endif +#ifndef S_IRWXO +#define S_IRWXO 00007 +#endif +#ifndef S_IROTH +#define S_IROTH 00004 +#endif +#ifndef S_IWOTH +#define S_IWOTH 00002 +#endif +#ifndef S_IXOTH +#define S_IXOTH 00001 #endif + +#define CHMOD_BITS (S_ISU...
2009 Sep 09
3
DO NOT REPLY [Bug 6701] New: permission of attributes are not preserved
...diff --git a/lib/sysxattrs.c b/lib/sysxattrs.c index d55ee0c..c9a38cd 100644 --- a/lib/sysxattrs.c +++ b/lib/sysxattrs.c @@ -191,7 +191,7 @@ int sys_lsetxattr(const char *path, const char *name, const { int attrfd; size_t bufpos; - mode_t mode = S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP; + mode_t mode = S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH; if ((attrfd = attropen(path, name, O_CREAT|O_TRUNC|O_WRONLY, mode)) < 0) return -1; -- Configure bugmail: https://bugzilla.samba.org/userprefs.cgi?tab=email ------- You are receiving this mail bec...
2014 Jun 12
2
[PATCH] fuse: UID 0 should override all permissions checks (RHBZ#1106548).
...: fuse->gid == statbuf.st_gid ? statbuf.st_mode & S_IRGRP - : statbuf.st_mode & S_IROTH); - if (mask & W_OK) - ok = ok && - ( fuse->uid == statbuf.st_uid ? statbuf.st_mode & S_IWUSR - : fuse->gid == statbuf.st_gid ? statbuf.st_mode & S_IWGRP - : statbuf.st_mode & S_IWOTH); - if (mask & X_OK) - ok = ok && - ( fuse->uid == statbuf.st_uid ? statbuf.st_mode & S_IXUSR - : fuse->gid == statbuf.st_gid ? statbuf.st_mode & S_IXGRP - : statbuf.st_mode & S_IXOTH); + /* Root user shoul...
2010 Jun 21
0
would like more detail when /tmp directory is missing. patch for linux/syslinux.c
...ar *argv[]) Make a temp dir and pass all the gunky options to mount. */ if (chdir(_PATH_TMP)) { - perror(program); + fprintf(stderr, "%s: Cannot access the %s directory.\n", + program, _PATH_TMP); exit(1); } #define TMP_MODE (S_IXUSR|S_IWUSR|S_IXGRP|S_IWGRP|S_IWOTH|S_IXOTH|S_ISVTX)
2007 Apr 18
1
Linux Equivalent of SetFilePerm() api
Hi everyone, We are trying to port our own windows application to SUSE linux.Our application uses SetFilePerm() api defined in commondll.dll.We would like to know whether there is a linux equivalent of windows commondll.dll in wine... If not then what could be the possible alternative to make this api function exactly as it does in windows. Waiting for an early reply, Thanks and Regards,
2001 Dec 18
1
Question about default ACL
Hello samba guys and XFS guys, I am now using Linux-2.4.5-1.0.1_XFS and Samba 2.2.2. Try to create a samba share on a XFS volume, for example, we create a directory named 'public', and set its default acl on 'public' as 'u::rwx,g::rw-,o::r--,m::rwx', . Under Linux box, try to create a file named 'file_linux' under directory 'public', On Samba client (Win2K)
1999 Jul 02
1
preexec: return code not used? (PR#18576)
T.D.Lee@durham.ac.uk wrote: > > > But we'd like to go one step further and have the return code from preexec > be used to continue or abort the connection being established. The script > above would be modified to generate this return code. > > Looking through the source code (smbd/service.c), it doesn't seem to check > the return code (calling smbrun to do the
2020 Sep 25
0
[RFC PATCH 01/19] tools/virtiofsd: add support for --socket-group
...he socket, - * so set umask to 077 and restore it later. + * so set umask appropriately and restore it later. */ - old_umask = umask(0077); + if (se->vu_socket_group) { + old_umask = umask(S_IROTH | S_IWOTH | S_IXOTH); + } else { + old_umask = umask(S_IRGRP | S_IWGRP | S_IXGRP | S_IROTH | S_IWOTH | S_IXOTH); + } if (bind(listen_sock, (struct sockaddr *)&un, addr_len) == -1) { fuse_log(FUSE_LOG_ERR, "vhost socket bind: %m\n"); close(listen_sock); umask(old_umask); return -1; } + if (se->vu_sock...
2006 Jul 26
5
linux-2.6-xen.hg
Hi, Is the http://xenbits.xensource.com/linux-2.6-xen.hg tree still being updated? if not, what''s the preferred Linux tree to track that has all of the Xen bits? Thanks, Muli _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2009 Jul 27
1
supporting --fake-super on opensolaris (zfs) destination
...reak; + + if(r<0) { + return -errno; + } + bufpos+=r; + } + + +close(attrfd); +return (bufpos); + +} + +int sys_lsetxattr(const char *path, const char *name, const void *value, size_t size) +{ + int attrfd; + size_t bufpos,w; + + STRUCT_STAT fst; + + mode_t mode = S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP; + + do_lstat(path,&fst); + + if(S_ISLNK(fst.st_mode)) { + errno=EPERM; + return(-1); + } + + attrfd = attropen(path, name, AT_SYMLINK_NOFOLLOW|O_CREAT|O_RDWR,mode); + + if(attrfd>0) { + + for(bufpos=0;bufpos<size;) { + w = write(attrfd, value+bufpos, size); + if(w<0) return -errno...
2009 May 29
1
[PATCH v2] klibc-utils: add simple ls
...S_IWUSR) ? 'w' : '-'); + + !STAT_ISSET(st->st_mode, S_ISUID) ? + putchar(STAT_ISSET(st->st_mode, S_IXUSR) ? 'x' : '-') : + putchar('S'); + + putchar(STAT_ISSET(st->st_mode, S_IRGRP) ? 'r' : '-'); + putchar(STAT_ISSET(st->st_mode, S_IWGRP) ? 'w' : '-'); + + !STAT_ISSET(st->st_mode, S_ISGID) ? + putchar(STAT_ISSET(st->st_mode, S_IXGRP) ? 'x' : '-') : + putchar('S'); + + putchar(STAT_ISSET(st->st_mode, S_IROTH) ? 'r' : '-'); + putchar(STAT_ISSET(st->st_mode, S_IWOTH...
2002 Jul 27
6
mode=777 does not work as fstab option
I need to mount a samba share as mode 777, so all users can read/write/delete/create. I have this as fstab entry //host/public /mnt/home smbfs auto,uid=user,umask=000,defaults,username=Perkins,password= see, i've had to put uid=user just to get it owned by user user, so i could edit files i put mode=777, but it does nothing. i want to let all users read/write/create/delete
2009 May 28
1
[PATCH] klibc-utils: add minils
...T(st->st_mode, S_ISUID) ? + printf ("%s", STAT_ISSET(st->st_mode, S_IXUSR) ? "x" : "-") : + printf ("S"); + + printf ("%s%s", + STAT_ISSET(st->st_mode, S_IRGRP) ? "r" : "-", + STAT_ISSET(st->st_mode, S_IWGRP) ? "w" : "-"); + + !STAT_ISSET(st->st_mode, S_ISGID) ? + printf ("%s", STAT_ISSET(st->st_mode, S_IXGRP) ? "x" : "-") : + printf ("S"); + + printf ("%s%s", + STAT_ISSET(st->st_mode, S_IROTH) ? "r" : &q...
1998 Dec 08
1
Can't connect to shares w/2.0beta3 on OSF1
I was running 1.9.18p10 on a test DEC Unix 4.0d box here and I decided to give 2.0beta3 a try. For some reason, I cannot connect to any of the server's shares or even get a list of it's services (via Start->Run->\\server) from Win95 clients. It asks for a password and no matter what I put in there I get "The password is not correct. Try again." I configured Beta3 a la:
2005 Mar 23
1
Problems with Excel & MS Word files (still)
Problem is apparently with locking issues, disabled oplocks in the [general] section, and the problem actually got worse... Here's what happens: User-A part of group1, opens Excel file off of share, saves, exits... User-B (or even User-A for that matter) tries to re-open same file, get error stating it's locked and can only open for read-only access... Both users in the same group, and