Displaying 20 results from an estimated 21 matches for "xflags".
Did you mean:
flags
2005 Sep 16
1
Bug#314473: rsync still fails badly with an "!" in .cvsignore
...f (mflags & MATCHFLG_NO_PREFIXES) {
- if (*s == '!' && mflags & MATCHFLG_CVS_IGNORE)
+ if (*s == '!' && mflags & MATCHFLG_CVS_IGNORE) {
new_mflags |= MATCHFLG_CLEAR_LIST; /* Tentative! */
+ s++;
+ }
} else if (xflags & XFLG_OLD_PREFIXES) {
if (*s == '-' && s[1] == ' ') {
new_mflags &= ~MATCHFLG_INCLUDE;
@@ -674,8 +676,10 @@
} else if (*s == '+' && s[1] == ' ') {
new_mflags |= MATCHFLG_INCLUDE;
s += 2;
- } else if (*s == '!')
+ }...
2005 Jan 31
1
[patch] add "--ignore" option
..._INCLUDE)
+ return M_INCLUDE;
+ if (ent->match_flags & MATCHFLG_IGNORE)
+ return M_IGNORE;
+ return M_EXCLUDE;
}
}
- return 0;
+ return M_NOMATCH;
}
@@ -625,7 +632,7 @@
return NULL;
/* Figure out what kind of a filter rule "s" is pointing at. */
- if (!(xflags & (XFLG_DEF_INCLUDE | XFLG_DEF_EXCLUDE))) {
+ if (!(xflags & (XFLG_DEF_INCLUDE | XFLG_DEF_EXCLUDE |
XFLG_DEF_IGNORE))) {
char *mods = "";
switch (*s) {
case ':':
@@ -695,6 +702,8 @@
} else {
if (xflags & XFLG_DEF_INCLUDE)
mflags |= MATCHFLG_INCLUDE;
+...
2019 Feb 06
2
syslinux-6.04-pre2
...= -z muldefs /' mk/efi.mk || die "sed muldefs failed"
> >
>
> Should be a trivial fix by simply omitting those from the
> syslinux-provided library functions on EFI.
Yes, but I don't know the code that well so I took the easy way :)
Also, syslinux overides/omits xFLAGS(CFLAGS, LDFLAGS etc.) so one cannot
pass own flags. Would be nice if one could disable Warnings that are harmless.
Jocke
2006 Jan 06
2
DO NOT REPLY [Bug 3382] New: hang in read() in exclude.test of testsuite
...d(...) in /usr/shlib/libc.so
#1 0x3ff80177b20 in __read_nc(...) in /usr/shlib/libc.so
#2 0x3ff800da6d4 in __filbuf(...) in /usr/shlib/libc.so
#3 0x120023574 in parse_filter_file(listp=0x140000010, fname=Info: no
allocation applies for symbol fname at the current PC
<no value>, mflags=1024, xflags=1) "exclude.c":999
#4 0x120023140 in parse_rule(listp=0x140000010, pattern=0x14000e3e7="",
mflags=0, xflags=0) "exclude.c":938
#5 0x120031140 in parse_arguments(argc=0x11fffbfd8, argv=0x11fffbfd0,
frommain=1) "options.c":749
#6 0x12002a878 in main(argc=9,...
2008 Feb 15
4
Revised flags patch
...eol_nulls;
@@ -344,6 +345,9 @@ static void send_file_entry(int f, struc
{
static time_t modtime;
static mode_t mode;
+#ifdef SUPPORT_FLAGS
+ static uint32 fileflags;
+#endif
#ifdef SUPPORT_HARD_LINKS
static int64 dev;
#endif
@@ -403,6 +407,12 @@ static void send_file_entry(int f, struc
xflags |= XMIT_SAME_MODE;
else
mode = file->mode;
+#ifdef SUPPORT_FLAGS
+ if (F_FFLAGS(file) == fileflags)
+ xflags |= XMIT_SAME_FLAGS;
+ else
+ fileflags = F_FFLAGS(file);
+#endif
if ((preserve_devices && IS_DEVICE(mode))
|| (preserve_specials && IS_SPECIAL(mode))) {
@@ -...
2004 Jun 11
1
Fatal: Unknown userdb type 'pgsql'
i build an rpm and now gets this
i builed the rpm with
rpmbuild -ta --define 'XFlags --with-mysql --with-pgsql --with-pop3' dovecot-0.99.10.5.tar.gz
?
Are you ready for Telkom's 10-digit dialling? To find out how this will affect your Internet connection in the not too distant future, go to www.mweb.co.za/ten
-------------- next part --------------
An HTML attachment was...
2009 Feb 16
2
rsync 3.0.5 - ERROR: buffer overflow in recv_file_entry [generator]
...a nested directory - relatively depth but still it should work. It
fails instead.
sending daemon args: --server --sender -vvlWHogDtpre.is --ignore-errors
--numeric-ids --inplace . TEST/
receiving incremental file list
delta-transmission disabled for local transfer or --whole-file
[...]
overflow: xflags=0x7a l1=255 l2=779
lastname=XXXX/ZZZZZ/c/OOOOOOO/www/sigs
etc/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animations/animat...
2009 Jul 17
2
Rsnapshot/rsync buffer overflow
...sr/bin/rsync -a --delete --numeric-ids --relative --delete-excluded \
--exclude=mtab --exclude=core --rsh="/usr/bin/ssh -i \
/Users/kurt/.ssh/id_rsa" root at home.thisisnotajoke.com:/home \
/Volumes/Backup/.sync/server/
root at home.thisisnotajoke.com's password:
overflow: xflags=0x7a l1=255 l2=784
lastname=/home/cpanelBackup/cpbackup/daily/haspixie/homedir/public_html/wp-c
ontent/cache/supercache/icanhaspixiedust.com/category/characters-and-stars/m
ickey-mouse/http%3A/icanhaspixiedust.com/category/characters-and-stars/micke
y-mouse/&r=http%3A/images.google.com/imgres%3...
2016 Dec 28
2
certificates keys on pkcs11 devices
Hi,
I have not found any way to use a Certificate with ssh-agent when my Key is
stored on a pkcs11 device. I can add my key with
ssh-add -s /usr/local/lib/opensc-pkcs11.so
but
ssh-add -s /usr/local/lib/opensc-pkcs11.so ~/.ssh/mykey-cert.pub
does not add the certificate to my agent. As far as I undestand, in
ssh-add.c line 580
if (pkcs11provider != NULL) {
if (update_card(agent_fd,
2019 Feb 07
0
syslinux-6.04-pre2
...die "sed muldefs failed"
>>>
>>
>> Should be a trivial fix by simply omitting those from the
>> syslinux-provided library functions on EFI.
>
> Yes, but I don't know the code that well so I took the easy way :)
>
> Also, syslinux overides/omits xFLAGS(CFLAGS, LDFLAGS etc.) so one cannot
> pass own flags. Would be nice if one could disable Warnings that are harmless.
>
Should be easy enough with some changes to the *.mk files which are
fortunately enough relatively centralized now.
There is some annoying redundancy between com32/lib/Mak...
2009 Sep 01
0
rsync 3.0.6 overflow question
Hello list,
I'm running rsync from a FreeBSD 6.3 server to another FreeBSD 6.3
server. Both are running rsync 3.0.6. The transfer keeps dying with the
following errors.
On the receiver I'm getting the following error
2009/09/01 11:27:58 [23670] overflow: xflags=0x546 l1=0 l2=10376
lastname= [generator]
2009/09/01 11:27:58 [23670] ERROR: buffer overflow in recv_file_entry
[generator]
2009/09/01 11:27:58 [23670] rsync error: error allocating core memory
buffers (code 22) at util.c(123) [generator=3.0.6]
On the sender I get
2009/09/01 11:50:10 [13901]...
2011 Mar 10
3
[Bug 8001] New: buffer overflow in recv_file_entry (maxpathlen doesn't works)
...n.com
QAContact: rsync-qa at samba.org
I'm trying to do a backup from a synology product (NAS diskstation) to a
FreeBSD server, with a 3.0.8pre1
All works well since I get this messages (from log):
2011/03/10 09:15:30 [27378] receiving file list
2011/03/10 09:15:30 [27378] overflow: xflags=0xfa l1=255 l2=774
lastname=@dominis@/ECRYPTFS_FNEK_ENCRYPTED.FWZ0AjypU3Tk-kbJfmwSC9.1Zd.xFP0LS7ysNgXs..gGt8G95MfnVXLBFU--/ECRYPTFS_FNEK_ENCRYPTED.FWZ0AjypU3Tk-kbJfmwSC9.1Zd.xFP0LS7ysVjTftHWkNlQYxEKm0znW3---/ECRYPTFS_FNEK_ENCRYPTED.FWZ0AjypU3Tk-kbJfmwSC9.1Zd.xFP0LS7ysFroUSTkNzwzY4Zko.kOIjE--/ECRYPT...
2019 Feb 06
4
syslinux-6.04-pre2
On Wed, 2019-02-06 at 11:34 -0800, H. Peter Anvin wrote:
> On 2/6/19 9:17 AM, Joakim Tjernlund via Syslinux wrote:
> > On Wed, 2019-02-06 at 16:00 +0100, Joakim Tjernlund wrote:
> > > On Tue, 2019-02-05 at 14:07 -0800, H. Peter Anvin via Syslinux wrote:
> > > > CAUTION: This email originated from outside of the organization. Do not click links or open attachments
2020 Mar 28
0
[klibc:update-dash] dash: eval: Replace with listsetvar with mklocal/setvareq
Commit-ID: cbf6b9e61bc7e49b8863901ef0bf85483af5861f
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=cbf6b9e61bc7e49b8863901ef0bf85483af5861f
Author: Herbert Xu <herbert at gondor.apana.org.au>
AuthorDate: Sat, 19 May 2018 02:39:55 +0800
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Sat, 28 Mar 2020 21:42:55 +0000
[klibc] dash: eval: Replace
2020 Mar 28
0
[klibc:update-dash] dash: eval: Add assignment built-in support again
Commit-ID: 166a88f4568067378ddce23b91be7b4ec9a9dfb4
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=166a88f4568067378ddce23b91be7b4ec9a9dfb4
Author: Herbert Xu <herbert at gondor.apana.org.au>
AuthorDate: Sat, 19 May 2018 02:39:52 +0800
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Sat, 28 Mar 2020 21:42:55 +0000
[klibc] dash: eval: Add
2015 Jul 26
2
[PATCH] ssh-agent: Add support to load additional certificates
Add support to load additional certificates
for already loaded private keys. Useful
if the private key is on a PKCS#11 hardware token.
The private keys inside ssh-agent are now using a refcount
to share the private parts between "Identities".
The reason for this change was that the PKCS#11 code
might have redirected ("wrap") the RSA functions to a hardware token.
We don't
2017 Oct 26
3
[RFC 0/2] add engine based keys
Engine keys are private key files which are only understood by openssl
external engines. ?The problem is they can't be loaded with the usual
openssl methods, they have to be loaded via ENGINE_load_private_key().
?Because they're files, they fit well into openssh pub/private file
structure, so they're not very appropriately handled by the pkcs11
interface because it assumes the private
2015 Feb 28
3
SAP-2015-3-1 issues
BSD/OS issues
with 1.0.2a dev
make tests
[ -d `pwd`/regress ] || mkdir -p `pwd`/regress
[ -d `pwd`/regress/unittests ] || mkdir -p `pwd`/regress/unittests
[ -d `pwd`/regress/unittests/test_helper ] || mkdir -p `pwd`/regress/unittests/test_helper
[ -d `pwd`/regress/unittests/sshbuf ] || mkdir -p `pwd`/regress/unittests/sshbuf
[ -d `pwd`/regress/unittests/sshkey ] || mkdir -p
2020 Jan 30
6
[PATCH 1/2] Add support for openssl engine based keys
Engine keys are keys whose file format is understood by a specific
engine rather than by openssl itself. Since these keys are file
based, the pkcs11 interface isn't appropriate for them because they
don't actually represent tokens. The current most useful engine for
openssh keys are the TPM engines, which allow all private keys to be
stored in a form only the TPM hardware can decode,
2012 Sep 03
1
[GIT-PULL] XFS filesystem driver
...ffset
+ * alignment.
+ */
+struct dioattr {
+ uint32_t d_mem; /* data buffer memory alignment */
+ uint32_t d_miniosz; /* min xfer size */
+ uint32_t d_maxiosz; /* max xfer size */
+};
+
+/*
+ * Structure for XFS_IOC_FSGETXATTR[A] and XFS_IOC_FSSETXATTR.
+ */
+struct fsxattr {
+ uint32_t fsx_xflags; /* xflags field value (get/set) */
+ uint32_t fsx_extsize; /* extsize field value (get/set)*/
+ uint32_t fsx_nextents; /* nextents field value (get) */
+ uint32_t fsx_projid; /* project identifier (get/set) */
+ unsigned char fsx_pad[12];
+};
+
+/*
+ * Flags for the bs_xflags/fsx_xflags field
+...