search for: who_am_i

Displaying 13 results from an estimated 13 matches for "who_am_i".

2004 Jan 27
1
Differentiating debug messages from both sides
...orks at any verbose level. Here's a patch. Let me know what you think. ..wayne.. -------------- next part -------------- --- exclude.c 20 Jan 2004 04:53:59 -0000 1.58 +++ exclude.c 27 Jan 2004 07:36:35 -0000 @@ -27,6 +27,7 @@ #include "rsync.h" extern int verbose; +extern char *who_am_i; struct exclude_struct **exclude_list; struct exclude_struct **local_exclude_list; @@ -102,7 +103,7 @@ void free_exclude_list(struct exclude_st struct exclude_struct **list = *listp; if (verbose > 2) - rprintf(FINFO,"clearing exclude list\n"); + rprintf(FINFO, "[%c] cl...
2020 Jun 14
1
[Bug 14407] New: link_stat ... failed: No such file or directory: should mention which end of the connection it is talking about
https://bugzilla.samba.org/show_bug.cgi?id=14407 Bug ID: 14407 Summary: link_stat ... failed: No such file or directory: should mention which end of the connection it is talking about Product: rsync Version: 3.2.0 Hardware: All OS: All Status: NEW Severity: normal
2014 Dec 01
2
[Bug 10977] New: Rsync path spoofing attack vulnerability (rsync 3.1.1 tested)
...line:405 /* if (iflags & ITEM_TRANSFER) { int i = ndx - cur_flist->ndx_start; if (i < 0 || !S_ISREG(cur_flist->files[i]->mode)) { rprintf(FERROR, "received request to transfer non-regular file: %d [%s]\n", ndx, who_am_i()); exit_cleanup(RERR_PROTOCOL); } } */ Vulnerability Demo : Online test: rsync -avvzP 106.185.33.114::yaseng /tmp/yaseng -- You are receiving this mail because: You are the QA Contact for the bug.
2005 Jan 31
1
[patch] add "--ignore" option
...follow-up. Cheers, Matthew. diff -ur ../rsync-HEAD-20050125-1221GMT.orig/exclude.c ./exclude.c --- ../rsync-HEAD-20050125-1221GMT.orig/exclude.c Tue Jan 25 12:21:14 2005 +++ ./exclude.c Thu Jan 27 16:52:33 2005 @@ -117,7 +117,8 @@ rprintf(FINFO, "[%s] make_filter(%.*s, %s%s)\n", who_am_i(), (int)pat_len, pat, mflags & MATCHFLG_PERDIR_MERGE ? "per-dir-merge" - : mflags & MATCHFLG_INCLUDE ? "include" : "exclude", + : mflags & MATCHFLG_INCLUDE ? "include" + : mflags & MATCHFLG_IGNORE ? "ignore" : "exclude...
2014 Nov 14
6
[Bug 10936] New: Rsync path hijacking attack vulnerability
...e:405? /* if (iflags & ITEM_TRANSFER) { int i = ndx - cur_flist->ndx_start; if (i < 0 || !S_ISREG(cur_flist->files[i]->mode)) { rprintf(FERROR, "received request to transfer non-regular file: %d [%s]\n", ndx, who_am_i()); exit_cleanup(RERR_PROTOCOL); } } */ The file "pwned" will be downloaded into forged path(/root/pwned.test). -- You are receiving this mail because: You are the QA Contact for the bug.
2004 May 10
2
read error produces null-byte-filled destination file
I've run into a bug in the IO handling when reading a file. Suppose I have a file that lives on an NFS filesystem. That filesystem is NOT being exported with auth=0 permissions. So, if I try to access a file as root, it successfully opens the file, but subsequent reads fail with EACCES. This produces a destination file full of null bytes. I noticed this with 2.5.7, but checked 2.6.2 as
2010 Jun 15
3
about rsyncing of block devices
...EG(cur_flist->files[i]->mode)) { + struct file_struct *file = cur_flist->files[i]; + if (i < 0 || !(S_ISREG(file->mode) || (copy_devices && IS_DEVICE(file->mode)))) { rprintf(FERROR, "received request to transfer non-regular file: %d [%s]\n", ndx, who_am_i()); diff -pur rsync-3.0.7/sender.c rsync-3.0.7.new/sender.c --- rsync-3.0.7/sender.c 2009-12-13 01:23:03.000000000 +0000 +++ rsync-3.0.7.new/sender.c 2010-06-15 15:09:50.657553229 +0100 @@ -309,6 +309,20 @@ void send_files(int f_in, int f_out) exit_cleanup(RERR_PROTOCOL); } + /* On Linux...
2017 Apr 10
3
error allocating core memory buffers (code 22) at util2.c(106) [sender=3.1.2]
Hi: I'm in the middle of recoverying from a tactical error copying around an Mac OS X 10.10.5 Time Machine backup (turns out Apple's instructions aren't great...), and I had rsync running for the past 6 hours repairing permissions/acls on 1.5 TB of data (not copying the data), and then it just died in the middle with: .L....og.... 2015-03-11-094807/platinum-bar2/usr/local/mysql
2004 Feb 17
0
[patch] Add `--link-by-hash' option (rev 3).
...over real file */ if (robust_rename(fnametmp,fname) != 0) { rprintf(FERROR,"rename %s -> \"%s\": %s\n", full_fname(fnametmp), fname, strerror(errno)); - } else { - set_perms(fname,file,NULL,0); - } + return; + } + + set_perms(fname,file,NULL,0); } const char *who_am_i(void) patchwork diff rsync.h --- rsync.h 2004-02-17 10:36:44.000000000 -0500 +++ rsync.h 2004-02-17 10:36:44.000000000 -0500 @@ -513,6 +513,14 @@ int current_file_index; }; +struct hashfile_struct { + struct hashfile_struct *next; + struct hashfile_struct *prev; + char *name; + int fd; + uint3...
2004 Feb 16
1
[patch] Add `--link-by-hash' option (rev 2).
...fname, strerror(errno)); + error = 1; } - do_unlink(fnametmp); - } else { - set_perms(fname,file,NULL,0); } + + do_unlink(fnametmp); + if (error) + return; + +#ifdef HAVE_LINK + if (link_by_hash_dir) + link_by_hash(fname,file); +#endif + + set_perms(fname,file,NULL,0); } const char *who_am_i(void) patchwork diff rsync.h --- rsync.h 2004-02-16 10:24:41.000000000 -0500 +++ rsync.h 2004-02-16 10:18:59.000000000 -0500 @@ -513,6 +513,13 @@ int current_file_index; }; +struct hashfile_struct { + struct hashfile_struct *next; + struct hashfile_struct *prev; + char *name; + int fd; +}; +...
2004 Apr 09
3
include/exclude bug in rsync 2.6.0/2.6.1pre1
...match only directories, * then it is stripped out by make_exclude. So as a special * case we add it back in here. */ if (verbose >= 2) { - rprintf(FINFO, "[%s] %s %s %s because of pattern %s%s\n", + rprintf(FINFO, "[%s] %s %s %s because of %s pattern %s%s\n", who_am_i(), ent->include ? "including" : "excluding", name_is_dir ? "directory" : "file", - name, ent->pattern, + name, type, ent->pattern, ent->directory ? "/" : ""); } } /* - * Return true if file NAME is defin...
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...reak; - } case CSUM_MD4: case CSUM_MD4_OLD: case CSUM_MD4_BUSTED: @@ -190,6 +215,51 @@ void get_checksum2(char *buf, int32 len, char *sum) } } +static NORETURN void openssl_failure(const char *str) +{ + rprintf(FERROR, "ERROR: An OpenSSL function failed %s [%s]\n", str, who_am_i()); + exit_cleanup(RERR_UNSUPPORTED); +} + +static void compute_lib_hash(struct map_struct *buf, OFF_T len, void *sum) +{ + MDLIB_MD_CTX *mdctx; + OFF_T i; + int remainder; + int ret; + + mdctx = mdlib_new_ctx(); + if (!mdctx) + out_of_memory("HERE"); + + if (checksum_type == CSUM_MD5) +...
2007 Sep 22
0
rsync build on IA64 using icc
...on in primary source file extern unsigned int curr_dir_len; ^ exclude.c(44): remark #1419: external declaration in primary source file extern unsigned int module_dirlen; ^ exclude.c(128): remark #981: operands are evaluated in unspecified order who_am_i(), get_rule_prefix(mflags, pat, 0, NULL), ^ exclude.c(127): remark #981: operands are evaluated in unspecified order rprintf(FINFO, "[%s] add_rule(%s%.*s%s)%s\n", ^ exclude.c(1027): remark #810: conversion from "int" to "char" may lose signif...