similar to: adding samba passwds

Displaying 20 results from an estimated 1000 matches similar to: "adding samba passwds"

2000 Jun 26
4
connecting to network remotely with pppd
Does anyone have any tips on getting hooked up to a local network from win95 client through a linux ppp server? I'm close to getting it working. I've logged on remotely and can ping or telnet to the linux ppp server but I cannot ping to any other machine on the local network. Do I need to add some route commands? This is what my routing table looks like after my ppp connection is started.
2018 Jun 30
4
Developed an issue with Samba File Server integrated with Samba-AD
Hi, We have been using Samba File Server (Version 4.3.11 Ubuntu 14.04 LTS) for quite sometime now. We recently installed Samba-AD (Samba AD Version 4.7.6) and made the file server a member of the Domain. Everything was fine till around 11:15 am yesterday. We just added one more share folder and gave access to three users and restarted Samba File Server services - smbd, nmbd and winbindd -
2015 Apr 22
0
Availability of the 1.1.1 stable version
Hi Looks like 1.1 version is sensitive to the system architecture/compiler/kernel version. Below is my observation in various linux system I have. As you mentioned, you are not observed the crash in your system, can you please share your system details. And also please comment on the below table/observations. *Machine IP* *optimization flags* *RHEL version* *kernel version* *gcc version*
2015 Apr 21
0
Availability of the 1.1.1 stable version
I just tried decoding with v1.1: ./opus_demo -d 48000 2 opus_encoded_crash.opus out.pcm and I see no issue (including with valgrind). Does the same command-line create problems for you? What compile flags did you use? fixed-point or float, any assembly, ...? Could be assembly here, or even a compiler bug wouldn't be unheard of. Cheers, Jean-Marc On 20/04/15 07:27 AM, Suresh Thiriveedi
2015 Apr 21
0
Availability of the 1.1.1 stable version
Still can't reproduce. What OS and compiler version? Jean-Marc On 21/04/15 02:48 AM, Suresh Thiriveedi wrote: > Hi, > > There is no change in the compiler flags. I'm using as it is from the > original code. No change in the Makefile and I believe it is using the > floating point only by default. > > We are using 8k samples and mono so the commands is as follows.
2019 Jun 21
2
Expected behavior of lld during LTO for global symbols (Attr Internal/Common)
Thanks for the info Teresa, Regards M Suresh From: Teresa Johnson <tejohnson at google.com> Sent: Thursday, June 20, 2019 7:15 PM To: Mani, Suresh <Suresh.Mani at amd.com> Cc: Rui Ueyama <ruiu at google.com>; llvm-dev <llvm-dev at lists.llvm.org> Subject: Re: [llvm-dev] Expected behavior of lld during LTO for global symbols (Attr Internal/Common) [CAUTION: External
2015 Apr 16
0
Availability of the 1.1.1 stable version
This is observed on a live call between webRTC browser client and another legacy client. Our server is there in between and transcoding from opus to another codec and this is observed while decoding the opus. Anyway, I'll try to capture/dump the packets in the server before feeding to the opus_decode and share with you. But this will not have the first 8 bytes (length+enc range) to directly
2006 Nov 06
1
rule seems to be matching all but last occurrence
Every hour I get a mail from logcheck with a line like Nov 6 12:08:34 wheat fetchnews[13617]: clamping maxage for comp.os.linux.admin to global expire 50 The strange thing is that syslog is filled with similar lines, but this is the only one I get in the report. It is the last such line in each group: # many similar lines deleted Nov 6 12:08:32 wheat fetchnews[13617]: comp.std.c++: considering
2015 Apr 20
1
Availability of the 1.1.1 stable version
Hi, We are able to reproduce the issue with the 1.1 opus_demo (sample file). We captured the frames in our server just before the opus_decode and fed the file to opus_demo (1.1) and it is crashing. Same file is tested with 1.1.1 and it is fine. So this is in line with our server testing observation and I think here we can conclude that the 1.1 library is crashing while handling a specific mode
2009 Aug 03
3
help - batch account creation
Hello guys I have a new Centos 5.3 running, and I have a text file with a bunch of accounts (more than 100) that I should create . File format is like this user1 pasword1 user2 passwrd2 .... How can I do this task easier than creating user one by one by hand? Need some help for building an script to achieve this task Thanks David
2015 Apr 16
2
Availability of the 1.1.1 stable version
To be decodable by opus_demo, you'll have to add the 8-byte "header". Just put in the length of the packet followed by "0" for the encoder range (0 means "not present"). That being said, from previous experience, the most likely cause of the crash is a bug in your software causing a corruption in Opus. So it's safe to assume that if you can't reproduce
2015 Apr 16
0
Availability of the 1.1.1 stable version
Hi Jean-Marc, Could you please update if you got a chance to look into. As I mentioned, I don't see the same issue in 1.1.1, but I don't see any difference in 1.1.1 other than optimization based on the architecture. This optimization could have fixed some stack overflow issue in some specific cases? Thanks Suresh On 13 April 2015 at 12:39, Suresh Thiriveedi <sthiriveedi at
2020 May 15
2
Issues with new Attributor (replaceAllUses fails with type mismatch)
Hi Suresh, thanks for reporting this! I thought I fixed this with 8d94d3c3b44c3a27a69b153cef9be4b8e481150e. Did you run before or after that commit? Cheers, Johannes On 5/15/20 7:17 AM, Mani, Suresh via llvm-dev wrote: > [AMD Public Use] > > Hi , > > Please ignore the earlier header of Internal and Official use only. > > Thanks > M Suresh > > From: llvm-dev
2010 Jul 30
0
ANNOUNCE: cifs-utils release 4.6 available for download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 It has been a while since I've cut a new release for cifs-utils. This one has more visible changes than were in the last few releases. Major highlights: - - documentation additions for the fsc option - - mount.cifs deals with _netdev, mand and nomand options correctly now - - a change in how mount.cifs handles the MS_MANDLOCK flag. It used to
2015 Apr 21
3
Availability of the 1.1.1 stable version
Red Hat Enterprise Linux Server release 6.4 (Santiago) gcc version 4.4.7 20120313 (Red Hat 4.4.7-3) (GCC) We see the issue in all our Intel based Linux servers. Thanks Suresh On 21 April 2015 at 12:41, Jean-Marc Valin <jmvalin at jmvalin.ca> wrote: > Still can't reproduce. What OS and compiler version? > > Jean-Marc > > On 21/04/15 02:48 AM, Suresh Thiriveedi
2011 Jun 17
1
[LLVMdev] Loop Unroll Factor
Devang, I meant as an end user. -Suresh On Thu, Jun 16, 2011 at 11:00 PM, Devang Patel <dpatel at apple.com> wrote: > Suresh, > > > On Jun 15, 2011, at 9:13 PM, Suresh Purini wrote: > >> Dear all, >> >> What is the default loop-unroll factor in llvm? How can we specify >> our own unroll-factor? > > Here "we" means end user or a
2015 Apr 21
2
Availability of the 1.1.1 stable version
Hi, There is no change in the compiler flags. I'm using as it is from the original code. No change in the Makefile and I believe it is using the floating point only by default. We are using 8k samples and mono so the commands is as follows. [root at MEDIA opus-1.1]# ./opus_demo -d 8000 1 opus_encoded_crash.opus opus_encoded_crash.pcm *And segmentation is as below..*. ............ Calling
2019 Jun 24
4
Expected behavior of lld during LTO for global symbols (Attr Internal/Common)
The direct cause of this issue is that, previously lld converted common symbols to defined symbols before passing input files to LTO, and after r360841 they are passed as common symbols to LTO. Making lld to work as before is easy, as we can convert common symbols to defined symbols as before. Here is a patch to do that, and I confirmed that that restores the original behavior for the reported
2011 Dec 10
0
ANNOUNCE: cifs-utils release 5.2 available for download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Things have been relatively quiet lately. Time for a release! Highlights: * A lot of manpage updates, additions and corrections * cifs.idmap can now map uid/gid to SID in addition to the other way around * getcifsacl/setcifsacl are now installed by default in /usr/bin instead of /usr/sbin. The manpages are now in section 1. * cifs.upcall has a
2015 Apr 16
3
Availability of the 1.1.1 stable version
Please provide the input file that produces this with opus_demo. On 16/04/15 03:24 AM, Suresh Thiriveedi wrote: > Hi Jean-Marc, > > Could you please update if you got a chance to look into. As I > mentioned, I don't see the same issue in 1.1.1, but I don't see any > difference in 1.1.1 other than optimization based on the architecture. > This optimization could have