Displaying 20 results from an estimated 20000 matches similar to: "tracking user actions"
2003 Jan 13
1
List access to rsyncd.conf modules
I've seen this question asked in the archives, but not really answered.
I would like to limit the rsync operation to modules listed in the
rsyncd.conf file and hence disallow any command line syncs.
Is there any way of doing this?
Thanks in advance
regards,
Dal
************************************************************************************************************
More
2009 Jun 16
1
file delete problem
Using samba v3.3.5 with winbind. 'force user' parameter is set on share.
- upload files to share work fine
- create subfolders on share work fine
- delete subfolders on share work fine
Problem is when trying to delete files. Get the error (on vista client)
"Destination Folder Access Denied:You need permission to perform this
action"
I can delete the file fine as the user
2010 Jun 02
2
Prevent --max-delete from deleting any files?
Is there a way to prevent rsync from deleting any files if --max-delete is exceeded?
I want to avoid having my hourly cron job inadvertently destroy my backup a chunk
at a time. By morning, the damage would already be done. Ideally, it should just
stop and not sync or delete anything since something is horribly wrong.
The only way I could see to do it is by running rsync twice - something
2014 Mar 19
5
[PATCH] virtio-blk: make the queue depth configurable
Joe Perches <joe at perches.com> writes:
> On Sun, 2014-03-16 at 22:00 -0700, Joe Perches wrote:
>> On Mon, 2014-03-17 at 14:25 +1030, Rusty Russell wrote:
>>
>> > Erk, our tests are insufficient. Testbuilding an allmodconfig with this
>> > now:
>>
>> Good idea.
>>
>> > diff --git a/include/linux/moduleparam.h
2014 Mar 19
5
[PATCH] virtio-blk: make the queue depth configurable
Joe Perches <joe at perches.com> writes:
> On Sun, 2014-03-16 at 22:00 -0700, Joe Perches wrote:
>> On Mon, 2014-03-17 at 14:25 +1030, Rusty Russell wrote:
>>
>> > Erk, our tests are insufficient. Testbuilding an allmodconfig with this
>> > now:
>>
>> Good idea.
>>
>> > diff --git a/include/linux/moduleparam.h
2004 Jul 26
4
More Logging and Actions
I managed to inadvertently purge my ''Shorewall'' email folder recently
:-( so I''m unable to reply directly to Ian''s last post on this
subject.
One of the complicating aspects of actions is that an action can (and
often does) invoke other actions. The current algorithm for processing
actions is:
a) read /etc/shorewall/actions and /usr/share/shorewall/actions.std
2016 Jul 23
2
permission problem with vfs object recycle:directory_mode
Well,
Despite I've recently answered about vfs object recycle on this list,
it seems that it isn't working as excepted.
Using Samba 4.4.5, compiled from sources
Here is the conf for a share:
[musique]
path = /media/data/musique
read only = No
vfs objects = acl_xattr recycle
recycle:directory_mode = 0770
recycle:subdir_mode = 0700
2014 Mar 17
2
[PATCH] virtio-blk: make the queue depth configurable
On Mon, 2014-03-17 at 14:25 +1030, Rusty Russell wrote:
> Erk, our tests are insufficient. Testbuilding an allmodconfig with this
> now:
Good idea.
> diff --git a/include/linux/moduleparam.h b/include/linux/moduleparam.h
[]
> @@ -188,6 +188,9 @@ struct kparam_array
> /* Default value instead of permissions? */ \
> static int __param_perm_check_##name
2014 Mar 17
2
[PATCH] virtio-blk: make the queue depth configurable
On Mon, 2014-03-17 at 14:25 +1030, Rusty Russell wrote:
> Erk, our tests are insufficient. Testbuilding an allmodconfig with this
> now:
Good idea.
> diff --git a/include/linux/moduleparam.h b/include/linux/moduleparam.h
[]
> @@ -188,6 +188,9 @@ struct kparam_array
> /* Default value instead of permissions? */ \
> static int __param_perm_check_##name
2015 Feb 10
2
[PATCH] x86 spinlock: Fix memory corruption on completing completions
On Tue, Feb 10, 2015 at 10:30 AM, Raghavendra K T
<raghavendra.kt at linux.vnet.ibm.com> wrote:
> On 02/10/2015 06:23 AM, Linus Torvalds wrote:
>> add_smp(&lock->tickets.head, TICKET_LOCK_INC);
>> if (READ_ONCE(lock->tickets.tail) & TICKET_SLOWPATH_FLAG) ..
>>
>> into something like
>>
>> val =
2015 Feb 10
2
[PATCH] x86 spinlock: Fix memory corruption on completing completions
On Tue, Feb 10, 2015 at 10:30 AM, Raghavendra K T
<raghavendra.kt at linux.vnet.ibm.com> wrote:
> On 02/10/2015 06:23 AM, Linus Torvalds wrote:
>> add_smp(&lock->tickets.head, TICKET_LOCK_INC);
>> if (READ_ONCE(lock->tickets.tail) & TICKET_SLOWPATH_FLAG) ..
>>
>> into something like
>>
>> val =
2005 Mar 04
1
'profiles' command with WinXP Profiles
Hi all,
I have gotten the 'profiles' command to work for NT and Win2K profiles very
well. In Windows XP, I am able to change the 'owner' but not the 'group'
SID. It gives no errors but it just doesn't change them. A snippet of the
profile in question is below:
furnsrv:/data/samba/profiles/jon # profiles NTUSER.DAT |grep S-1-5
Owner SID: S-1-5-32-544
Group
2008 Apr 06
3
Multiset Permutations
Dear R users,
I want to perform an exact permutation of multisets. I have looked at the
coin package, but it doesn't seem to offer what I am looking for. I want to
perform permutations (exact - without duplications) on multisets of scalars
(e.g., the multiset 0,0,1,2,2). I want to output all the possible
permutations into a data frame so that each multiset permutation occupies a
row (or
2011 Mar 30
2
[PATCH] xenstore-stat v2
The entries in xenstore have permission attributes. The
attributes can be easily altered by xenstore-chmod, however,
I cannot find a easy way to see them.
I''ve modified xenstore_client.c to raise a new utility.
The utility checks the permission and makes an easy-look output.
Please tell me any suggestions.
Thanks.
Signed-off-by: Frank Pan <frankpzh@gmail.com>
---
2020 Apr 06
4
Missing permissions
Hi,
Dovecot version 2.2.36
In log files I get this error:
dovecot: imap(test): Namespace '': mkdir(/home/mail/domain/test/Maildir)
failed: Permission denied (euid=1005(vmail) egid=1005(vmail) missing +w
perm: /home/mail/domain, UNIX perms appear ok (ACL/MAC wrong?))
My authentication configuration is this:
passdb {
driver = passwd-file
args = username_format=%n /etc/dovecot/users
}
2003 Mar 01
3
Samba and LinuxMDK 9 file perms oddities?
Hi all
I noticed a pretty strange behaviour regarding file permissions that
sometimes change without any reason. I need to share the following two
directories:
/home/public (owner=root, group=root, perms=0777)
/home/users (owner=root, group=users, perms=0770)
the /home directory is owned by root, the group is root and permissions
are set in this way: 0755.
The above dirs are shared
2014 Nov 01
3
No sound hardware detected for other users
Hey Y'all,
This morning my wife complained that she had no sound when she was
logged on to my machine. I logged on to her account and brought up
System/Preferences/Sound to see if she had inadvertently selected some
other sound output device. Hey, it happens. There was no sound
hardware detected. I have a USB microphone and an integrated on board
sound card. Neither of these sound
2020 Mar 12
2
Would you expect --perms -M--fake-super to set the file mode to the original one?
Thank you for the feedback, I'm glad to see that different people see the
issue
differently. As a followup question, what would you expect this to do:
rsync --perms --chmod g+rX -M--fake-super src dst
I would expect it to store the original permissions in the xattr, while
modifying the real file mode according to the chmod.
On Thursday, March 12, 2020 6:06:34 PM CET, Kevin Korb via rsync
2002 Nov 26
1
permutation
The gregmisc package contains a function 'perumutations' which generates all
permutations of n choose r. It also contains 'combinations' which generates
all combinations, and which appears to match your example:
> library(gregmisc)
Loading required package: MASS
Attaching package `gregmisc':
The following object(s) are masked from package:base :
2020 Mar 12
2
Would you expect --perms -M--fake-super to set the file mode to the original one?
rsync --perms -M--fake-super src dst
For me, this command means that rsync should save the original perms in the
xattr, and leave the real file mode to the umask default. Currently it also
modifies the real file mode, and there is no way to store something
different
in the xattr.
According to an old bug report that I found, more people would like
--fake-super to be a complete attribute