Displaying 13 results from an estimated 13 matches for "who_am_i".
2004 Jan 27
1
Differentiating debug messages from both sides
...orks at any verbose level. Here's a
patch. Let me know what you think.
..wayne..
-------------- next part --------------
--- exclude.c 20 Jan 2004 04:53:59 -0000 1.58
+++ exclude.c 27 Jan 2004 07:36:35 -0000
@@ -27,6 +27,7 @@
#include "rsync.h"
extern int verbose;
+extern char *who_am_i;
struct exclude_struct **exclude_list;
struct exclude_struct **local_exclude_list;
@@ -102,7 +103,7 @@ void free_exclude_list(struct exclude_st
struct exclude_struct **list = *listp;
if (verbose > 2)
- rprintf(FINFO,"clearing exclude list\n");
+ rprintf(FINFO, "[%c] cl...
2020 Jun 14
1
[Bug 14407] New: link_stat ... failed: No such file or directory: should mention which end of the connection it is talking about
https://bugzilla.samba.org/show_bug.cgi?id=14407
Bug ID: 14407
Summary: link_stat ... failed: No such file or directory:
should mention which end of the connection it is
talking about
Product: rsync
Version: 3.2.0
Hardware: All
OS: All
Status: NEW
Severity: normal
2014 Dec 01
2
[Bug 10977] New: Rsync path spoofing attack vulnerability (rsync 3.1.1 tested)
...line:405
/* if (iflags & ITEM_TRANSFER) {
int i = ndx - cur_flist->ndx_start;
if (i < 0 || !S_ISREG(cur_flist->files[i]->mode)) {
rprintf(FERROR,
"received request to transfer non-regular file: %d [%s]\n",
ndx, who_am_i());
exit_cleanup(RERR_PROTOCOL);
}
}
*/
Vulnerability Demo :
Online test:
rsync -avvzP 106.185.33.114::yaseng /tmp/yaseng
--
You are receiving this mail because:
You are the QA Contact for the bug.
2005 Jan 31
1
[patch] add "--ignore" option
...follow-up.
Cheers,
Matthew.
diff -ur ../rsync-HEAD-20050125-1221GMT.orig/exclude.c ./exclude.c
--- ../rsync-HEAD-20050125-1221GMT.orig/exclude.c Tue Jan 25 12:21:14
2005
+++ ./exclude.c Thu Jan 27 16:52:33 2005
@@ -117,7 +117,8 @@
rprintf(FINFO, "[%s] make_filter(%.*s, %s%s)\n",
who_am_i(), (int)pat_len, pat,
mflags & MATCHFLG_PERDIR_MERGE ? "per-dir-merge"
- : mflags & MATCHFLG_INCLUDE ? "include" : "exclude",
+ : mflags & MATCHFLG_INCLUDE ? "include"
+ : mflags & MATCHFLG_IGNORE ? "ignore" : "exclude...
2014 Nov 14
6
[Bug 10936] New: Rsync path hijacking attack vulnerability
...e:405?
/*
if (iflags & ITEM_TRANSFER) {
int i = ndx - cur_flist->ndx_start;
if (i < 0 || !S_ISREG(cur_flist->files[i]->mode)) {
rprintf(FERROR,
"received request to transfer non-regular file: %d [%s]\n",
ndx, who_am_i());
exit_cleanup(RERR_PROTOCOL);
}
}
*/
The file "pwned" will be downloaded into forged path(/root/pwned.test).
--
You are receiving this mail because:
You are the QA Contact for the bug.
2004 May 10
2
read error produces null-byte-filled destination file
I've run into a bug in the IO handling when reading a file. Suppose I
have a file that lives on an NFS filesystem. That filesystem is NOT
being exported with auth=0 permissions. So, if I try to access a file
as root, it successfully opens the file, but subsequent reads fail with
EACCES. This produces a destination file full of null bytes. I
noticed this with 2.5.7, but checked 2.6.2 as
2010 Jun 15
3
about rsyncing of block devices
...EG(cur_flist->files[i]->mode)) {
+ struct file_struct *file = cur_flist->files[i];
+ if (i < 0 || !(S_ISREG(file->mode) || (copy_devices && IS_DEVICE(file->mode)))) {
rprintf(FERROR,
"received request to transfer non-regular file: %d [%s]\n",
ndx, who_am_i());
diff -pur rsync-3.0.7/sender.c rsync-3.0.7.new/sender.c
--- rsync-3.0.7/sender.c 2009-12-13 01:23:03.000000000 +0000
+++ rsync-3.0.7.new/sender.c 2010-06-15 15:09:50.657553229 +0100
@@ -309,6 +309,20 @@ void send_files(int f_in, int f_out)
exit_cleanup(RERR_PROTOCOL);
}
+ /* On Linux...
2017 Apr 10
3
error allocating core memory buffers (code 22) at util2.c(106) [sender=3.1.2]
Hi:
I'm in the middle of recoverying from a tactical error copying
around an Mac OS X 10.10.5 Time Machine backup (turns out Apple's
instructions aren't great...), and I had rsync running for the past 6
hours repairing permissions/acls on 1.5 TB of data (not copying the
data), and then it just died in the middle with:
.L....og.... 2015-03-11-094807/platinum-bar2/usr/local/mysql
2004 Feb 17
0
[patch] Add `--link-by-hash' option (rev 3).
...over real file */
if (robust_rename(fnametmp,fname) != 0) {
rprintf(FERROR,"rename %s -> \"%s\": %s\n",
full_fname(fnametmp), fname, strerror(errno));
- } else {
- set_perms(fname,file,NULL,0);
- }
+ return;
+ }
+
+ set_perms(fname,file,NULL,0);
}
const char *who_am_i(void)
patchwork diff rsync.h
--- rsync.h 2004-02-17 10:36:44.000000000 -0500
+++ rsync.h 2004-02-17 10:36:44.000000000 -0500
@@ -513,6 +513,14 @@
int current_file_index;
};
+struct hashfile_struct {
+ struct hashfile_struct *next;
+ struct hashfile_struct *prev;
+ char *name;
+ int fd;
+ uint3...
2004 Feb 16
1
[patch] Add `--link-by-hash' option (rev 2).
...fname, strerror(errno));
+ error = 1;
}
- do_unlink(fnametmp);
- } else {
- set_perms(fname,file,NULL,0);
}
+
+ do_unlink(fnametmp);
+ if (error)
+ return;
+
+#ifdef HAVE_LINK
+ if (link_by_hash_dir)
+ link_by_hash(fname,file);
+#endif
+
+ set_perms(fname,file,NULL,0);
}
const char *who_am_i(void)
patchwork diff rsync.h
--- rsync.h 2004-02-16 10:24:41.000000000 -0500
+++ rsync.h 2004-02-16 10:18:59.000000000 -0500
@@ -513,6 +513,13 @@
int current_file_index;
};
+struct hashfile_struct {
+ struct hashfile_struct *next;
+ struct hashfile_struct *prev;
+ char *name;
+ int fd;
+};
+...
2004 Apr 09
3
include/exclude bug in rsync 2.6.0/2.6.1pre1
...match only directories,
* then it is stripped out by make_exclude. So as a special
* case we add it back in here. */
if (verbose >= 2) {
- rprintf(FINFO, "[%s] %s %s %s because of pattern %s%s\n",
+ rprintf(FINFO, "[%s] %s %s %s because of %s pattern %s%s\n",
who_am_i(),
ent->include ? "including" : "excluding",
name_is_dir ? "directory" : "file",
- name, ent->pattern,
+ name, type, ent->pattern,
ent->directory ? "/" : "");
}
}
/*
- * Return true if file NAME is defin...
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...reak;
- }
case CSUM_MD4:
case CSUM_MD4_OLD:
case CSUM_MD4_BUSTED:
@@ -190,6 +215,51 @@ void get_checksum2(char *buf, int32 len, char *sum)
}
}
+static NORETURN void openssl_failure(const char *str)
+{
+ rprintf(FERROR, "ERROR: An OpenSSL function failed %s [%s]\n", str, who_am_i());
+ exit_cleanup(RERR_UNSUPPORTED);
+}
+
+static void compute_lib_hash(struct map_struct *buf, OFF_T len, void *sum)
+{
+ MDLIB_MD_CTX *mdctx;
+ OFF_T i;
+ int remainder;
+ int ret;
+
+ mdctx = mdlib_new_ctx();
+ if (!mdctx)
+ out_of_memory("HERE");
+
+ if (checksum_type == CSUM_MD5)
+...
2007 Sep 22
0
rsync build on IA64 using icc
...on in primary source file
extern unsigned int curr_dir_len;
^
exclude.c(44): remark #1419: external declaration in primary source file
extern unsigned int module_dirlen;
^
exclude.c(128): remark #981: operands are evaluated in unspecified order
who_am_i(), get_rule_prefix(mflags, pat, 0, NULL),
^
exclude.c(127): remark #981: operands are evaluated in unspecified order
rprintf(FINFO, "[%s] add_rule(%s%.*s%s)%s\n",
^
exclude.c(1027): remark #810: conversion from "int" to "char" may lose signif...