Displaying 20 results from an estimated 420 matches for "uid_ts".
Did you mean:
uid_t
2023 Nov 21
0
is it safe to encode/decode uid_t/gid_t in 4 bytes?
Hi,
Samba internally uses 8 bytes to encode/decode uid_t/gid_t, e.g.,
_PUBLIC_ enum ndr_err_code ndr_push_uid_t(struct ndr_push *ndr, int
ndr_flags, uid_t u)
{
NDR_PUSH_CHECK_FLAGS(ndr, ndr_flags);
return ndr_push_hyper(ndr, NDR_SCALARS, (uint64_t)u);
}
I want to know if it is safe to use 4 bytes to reduce the size in storing
security_info in tdb.
I am not aware of if there is
2015 Aug 17
3
[PATCH] Expand tilde for UNIX domain socket forwards.
On Mon, 17 Aug 2015, Todd C. Miller wrote:
> I like the idea but tilde_expand_filename() calls fatal() if it
> cannot resolve ~foo. This is not terrible when using -L and -R on
> the normal command line but it seems pretty harsh to exit when -L
> or -R are used via the ~C escape or the streamlocal-forward at openssh.com
> request.
> Message-Id: <aea6cdc1d1b42d07 at
2001 Apr 05
0
HP-UX 9 problems (hangs on logout; tty isn't sane)
I'm trying to get OpenSSH 2.5.2p2 to run on HP-UX 9.05. I've had some
decent results, but I'm also seeing some problems.
I'm using the EGD (I configured with --with-prngd-socket=/tmp/entropy).
* Compiling required some changes, which I've attached. Two of the
changes are "hackish", and not at all suited to inclusion in the
source tree, but they might point
2015 Sep 27
2
v2.2.19 release candidate released
Timo,
I have to test something on one of the BSD, namely related to src/lib/net.c .
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
God,Queen and country!Never Satan President Republic!Beware AntiChrist rising!
http://www.fullyfollow.me/rootnl2k Look at Psalms 14 and 53 on Atheism
Time for Stephen to move on on Oct 19 2015!!
2020 Mar 26
3
Rebuilding and re-checking of downstream dependencies on CRAN Mac build machines
I have two questions about the CRAN machines that build binary
packages for Mac. When a new version of a package is released,
(A) Do the downstream dependencies get re-checked?
(B) Do the downstream dependencies get re-built?
I have heard (but do not know for sure) that the answer to (A) is no,
the downstream dependencies do not get rechecked.
>From publicly available information on the
2013 Nov 12
0
[klibc:master] syscalls: Fixup some of the -at syscall declarations
Commit-ID: 0c7359e8787c60b7143b3e366d31b2c2409cba3a
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=0c7359e8787c60b7143b3e366d31b2c2409cba3a
Author: Steve Capper <steve.capper at linaro.org>
AuthorDate: Mon, 11 Nov 2013 17:04:10 +0000
Committer: H. Peter Anvin <hpa at zytor.com>
CommitDate: Mon, 11 Nov 2013 19:30:11 -0800
[klibc] syscalls: Fixup some of the
2013 Nov 21
2
[LLVMdev] [compiler-rt] Problem with asm/stat.h on openSUSE PPC64
Hi,
This I believe is a bug in kernel headers on openSUSE PPC64 but maybe there
is some workaround.
compiler-rt/lib/sanitizer_common/sanitizer_platform_limits_linux.cc
includes asm/stat.h which ends up with errors:
/usr/include/asm/stat.h:31:2: error: unknown type name 'ino_t'
ino_t st_ino;
^
/usr/include/asm/stat.h:34:2: error: unknown type name
2002 Jun 07
4
openssh for UWIN
I am enclosing a context diff of the changes that I made to get
openssh working on UWIN. UWIN is a UNIX operating system layer
that runs on Win32 systems. For more information on UWIN
go to http://www.research.att.com/sw/tools/uwin/.
I also ran configure using -with-cppflags=-D_BSDCOMP=2. I don't
know where that information would go with the source code.
Let me know if you need more
2001 Sep 28
1
openssh-2.9.9p2 assumes pid_t, uid_t, etc. are not 'long'
openssh-2.9.9p2 assumes that pid_t, uid_t, gid_t, and mode_t are no
wider than int. GCC complains about this assumption on 32-bit Solaris
8 sparc, where these types are 'long', not 'int'. This isn't an
actual problem at runtime on this host, as long and int are the same
width, but it is a problem on other hosts where pid_t is wider than
int. E.g., I've heard that 64-bit
2000 Oct 03
1
Various platforms
Hello,
I've been compiling OpenSSH up on just about every platform that I can
get my hands on. I am not certain of the best way of building my
'fixes' into the source tree, not least of all since I didn't worry about
#ifdef's or the configure scripts. However hopefully this will be of use
to you. This is all for openssh-2.2.0p1 compiled alongside
openssl-0.9.5a and
2001 Jun 07
0
Patch for systems with no setreuid()
Sorry if I'm duplicating an existing patch, but...
On systems with no seteuid() that have setreuid() there is an
emulation, but if both are lacking (but we do have setresuid()),
nothing is done. The following seems to be right, but I've only got
one machine (running an ancient version of HP-UX) which needs this so
it may not be general:
--cut-here--
--- config.h.in.orig Thu Jun 7
2003 Apr 15
1
PATCH allow_zero_gid option
Hey,
Well, that was easy :-) Patch against CVS follows:
Summary:
Created a boolean option allow_zero_gid, when set to yes it will allow
logins from users whose group id is zero. Tested with KMail 3.1.1 on
FreeBSD 4.8. I'm not sure if my method for passing the boolean via the
environment is correct, it looks a little on the ugly side.
Index: src/lib/restrict-access.c
2016 May 12
0
[PATCH 3/4] appliance: Move code for creating supermin appliance directory to tmpdirs.c.
This is largely code motion.
---
src/appliance.c | 40 +++++++-----------------------------
src/guestfs-internal.h | 1 +
src/tmpdirs.c | 55 ++++++++++++++++++++++++++++++++++++++++++++++++++
3 files changed, 63 insertions(+), 33 deletions(-)
diff --git a/src/appliance.c b/src/appliance.c
index 2cf6374..d293c2b 100644
--- a/src/appliance.c
+++ b/src/appliance.c
@@ -48,7 +48,7
2013 Nov 08
0
[PATCH 2/3] syscalls: Add syscalls needed by arm64
arm64 uses generic syscalls, and does not include the "noat",
"noflags", and "deprecated" syscalls.
i.e. __ARCH_WANT_SYSCALL_{NO_AT|NO_FLAGS|DEPRECATED}
This patch adds the syscalls needed for klibc to run on arm64.
Signed-off-by: Steve Capper <steve.capper at linaro.org>
---
usr/klibc/Kbuild | 3 +++
usr/klibc/SYSCALLS.def | 33
2004 Mar 30
1
[Bug 565] gcc 3.2.3 compiler warnings for openssh-3.6.1p2 on Solaris 7
http://bugzilla.mindrot.org/show_bug.cgi?id=565
------- Additional Comments From dtucker at zip.com.au 2004-03-30 14:54 -------
(From update of attachment 337)
I re-tested -current (post-3.8p1) on Solaris 2.5.1 w/gcc 3.3.1.
>authfd.c:95: warning: implicit declaration of function `strlcpy'
These are gone.
>authfile.c: In function `key_perm_ok':
>authfile.c:517: warning:
2007 Apr 18
1
Linux Equivalent of SetFilePerm() api
Hi everyone,
We are trying to port our own windows application to SUSE linux.Our
application uses SetFilePerm() api defined in commondll.dll.We would like
to know whether there is a linux equivalent of windows commondll.dll in
wine...
If not then what could be the possible alternative to make this api
function exactly as it does in windows.
Waiting for an early reply,
Thanks and Regards,
2013 Nov 12
0
[klibc:master] syscalls: Add syscalls needed by arm64
Commit-ID: 8858e8319655ef38398e0833b71d65b0e620a061
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=8858e8319655ef38398e0833b71d65b0e620a061
Author: Steve Capper <steve.capper at linaro.org>
AuthorDate: Mon, 11 Nov 2013 17:04:11 +0000
Committer: H. Peter Anvin <hpa at zytor.com>
CommitDate: Mon, 11 Nov 2013 19:31:13 -0800
[klibc] syscalls: Add syscalls
2013 Sep 06
1
[PATCH] arm: appliance: Add support for device trees (dtb's).
This is the libguestfs companion patch to:
https://www.redhat.com/archives/libguestfs/2013-September/msg00045.html
Rich.
2006 Aug 25
2
RFC: non-root ssh tun access
The attached patch is against openssh-4.3_p2 to allow non-root users to
vpn in over ssh. root access is still needed on client side (or an sudo
solution). Currently, I have it working with an sudo command to
configure a tap interface on the server side. eg to ssh into my gentoo
server:
# ssh -fw any:any user at ssh_server.box "sudo /etc/init.d/net.tap0 restart"
Then, configure the
2020 Oct 05
1
Re: [PATCH nbdkit v2 1/3] server: Add new APIs for reading the client’s SO_PEERCRED.
On Mon, Oct 05, 2020 at 02:38:37PM +0100, Daniel P. Berrangé wrote:
> On Mon, Oct 05, 2020 at 08:21:50AM -0500, Eric Blake wrote:
> > On 10/3/20 1:50 PM, Richard W.M. Jones wrote:
> > > New nbdkit_peer_pid, nbdkit_peer_uid and nbdkit_peer_gid calls can be
> > > used on Linux (only) to read the peer PID, UID and GID from clients
> > > connected over a Unix domain