similar to: Recognizing trusted domain users

Displaying 20 results from an estimated 7000 matches similar to: "Recognizing trusted domain users"

2004 Feb 23
1
wbinfo -u sometimes returns only nontrusted users
Hello I have experienced numerously (but not experiencing them anymore, maybe because already not restarting winbindd so often) that wbinfo -u returned only local users, omitting the trusted domains. This often happens after restart of winbindd. When I issue wbinfo -m it fixes itself. It looks like waiting alone doesn't help. Is this a bug? Cl<
2016 Oct 25
2
noveau: emergency shutdown handling is overcomplex and broken
diff --git a/drivers/gpu/drm/nouveau/nvkm/subdev/therm/temp.c b/drivers/gpu/drm/nouveau/nvkm/subdev/therm/temp.c index b9703c0..adb1deb 100644 --- a/drivers/gpu/drm/nouveau/nvkm/subdev/therm/temp.c +++ b/drivers/gpu/drm/nouveau/nvkm/subdev/therm/temp.c @@ -120,6 +120,11 @@ nvkm_therm_sensor_event(struct nvkm_therm *therm, enum nvkm_therm_thrs thrs, struct work_struct *work; work =
2001 Mar 27
1
username doesn't work
Hello. I've got samba 2.0.6. My smb.conf file contains: --------- [myhome] comment = My Home path = /home/myhome username = mary, jack read only = No -------- When I run: smbclient '//mycomputer/myhome' and type valid password for mary or jack. The answer is: -------- Password: session setup failed: ERRSRV - ERRbadpw (Bad password - name/password
2018 May 24
2
[PATCH v3 11/27] x86/power/64: Adapt assembly for PIE support
On Wed 2018-05-23 12:54:05, Thomas Garnier wrote: > Change the assembly code to use only relative references of symbols for the > kernel to be PIE compatible. > > Position Independent Executable (PIE) support will allow to extended the > KASLR randomization range below the -2G memory limit. > > Signed-off-by: Thomas Garnier <thgarnie at google.com> Again, was this
2018 May 24
2
[PATCH v3 11/27] x86/power/64: Adapt assembly for PIE support
On Wed 2018-05-23 12:54:05, Thomas Garnier wrote: > Change the assembly code to use only relative references of symbols for the > kernel to be PIE compatible. > > Position Independent Executable (PIE) support will allow to extended the > KASLR randomization range below the -2G memory limit. > > Signed-off-by: Thomas Garnier <thgarnie at google.com> Again, was this
2018 May 24
2
[PATCH v3 09/27] x86/acpi: Adapt assembly for PIE support
On Wed 2018-05-23 12:54:03, Thomas Garnier wrote: > Change the assembly code to use only relative references of symbols for the > kernel to be PIE compatible. > > Position Independent Executable (PIE) support will allow to extended the > KASLR randomization range below the -2G memory limit. What testing did this get? > diff --git a/arch/x86/kernel/acpi/wakeup_64.S
2018 May 24
2
[PATCH v3 09/27] x86/acpi: Adapt assembly for PIE support
On Wed 2018-05-23 12:54:03, Thomas Garnier wrote: > Change the assembly code to use only relative references of symbols for the > kernel to be PIE compatible. > > Position Independent Executable (PIE) support will allow to extended the > KASLR randomization range below the -2G memory limit. What testing did this get? > diff --git a/arch/x86/kernel/acpi/wakeup_64.S
2018 May 25
2
[PATCH v3 09/27] x86/acpi: Adapt assembly for PIE support
On Thu 2018-05-24 09:35:42, Thomas Garnier wrote: > On Thu, May 24, 2018 at 4:03 AM Pavel Machek <pavel at ucw.cz> wrote: > > > On Wed 2018-05-23 12:54:03, Thomas Garnier wrote: > > > Change the assembly code to use only relative references of symbols for > the > > > kernel to be PIE compatible. > > > > > > Position Independent Executable
2018 May 25
2
[PATCH v3 09/27] x86/acpi: Adapt assembly for PIE support
On Thu 2018-05-24 09:35:42, Thomas Garnier wrote: > On Thu, May 24, 2018 at 4:03 AM Pavel Machek <pavel at ucw.cz> wrote: > > > On Wed 2018-05-23 12:54:03, Thomas Garnier wrote: > > > Change the assembly code to use only relative references of symbols for > the > > > kernel to be PIE compatible. > > > > > > Position Independent Executable
2003 Mar 11
1
Data replication/migration
Hello. Does Samba or the CIFS protocol support files replication/migration? Regards Brain -------------------------------- Petr `Brain' Kulhavy <brain@artax.karlin.mff.cuni.cz> http://artax.karlin.mff.cuni.cz/~brain Faculty of Mathematics and Physics, Charles University Prague, Czech Republic --- A man without a woman is like a statue without pigeons.
2018 May 29
1
[PATCH v3 09/27] x86/acpi: Adapt assembly for PIE support
On Fri 2018-05-25 10:00:04, Thomas Garnier wrote: > On Fri, May 25, 2018 at 2:14 AM Pavel Machek <pavel at ucw.cz> wrote: > > > On Thu 2018-05-24 09:35:42, Thomas Garnier wrote: > > > On Thu, May 24, 2018 at 4:03 AM Pavel Machek <pavel at ucw.cz> wrote: > > > > > > > On Wed 2018-05-23 12:54:03, Thomas Garnier wrote: > > > > >
2004 Jan 16
1
Reloading in usrmgr.exe
usrmgr.exe administration works for me. However, sometimes it is necessary to reopen the domain up to couple of times until the administration starts working. Allegedly also it's not necessary to press F5-reload after adding an user on Windows NT. However didn't test it, never used Windows NT for adding users on an Windows NT DC :) With Samba, I always have to press F5-reload in
2020 Jul 07
3
[RFC]: mm,power: introduce MADV_WIPEONSUSPEND
On Tue 07-07-20 10:07:26, Pavel Machek wrote: > Hi! > > > > > > This patch adds logic to the kernel power code to zero out contents of > > > > > all MADV_WIPEONSUSPEND VMAs present in the system during its transition > > > > > to any suspend state equal or greater/deeper than Suspend-to-memory, > > > > > known as S3. > > >
2020 Jul 07
3
[RFC]: mm,power: introduce MADV_WIPEONSUSPEND
On Tue 07-07-20 10:07:26, Pavel Machek wrote: > Hi! > > > > > > This patch adds logic to the kernel power code to zero out contents of > > > > > all MADV_WIPEONSUSPEND VMAs present in the system during its transition > > > > > to any suspend state equal or greater/deeper than Suspend-to-memory, > > > > > known as S3. > > >
2004 Feb 16
1
Documentation bug? domadm privileges
Hello I have been solving a problem how to make a nonroot user able to administer the domain (add users, groups, modify them etc.) from Windows workstation using usrmgr.exe It looks like what is stated in Samba HOWTO collection as prerequisites is not enough. First I found Chapter 12 cxl "How to make Samba PDC users member of the Domain Admins group" - made the nonroot user member of
2009 Jan 13
28
Warning and BUG with btrfs and corrupted image
Hi, when mounting an intentionally corrupted btrfs filesystem i get the following warning and bug message. The image can be found here www.cccmz.de/~snakebyte/btrfs.2.img.bck.bz2 [ 297.406152] device fsid e14cf01de423381a-4bd40b603870018a <6>devid 2147483649 transid 9 /dev/loop0 [ 297.411937] ------------[ cut here ]------------ [ 297.412207] WARNING: at fs/btrfs/disk-io.c:805
2020 Jul 03
5
[RFC]: mm,power: introduce MADV_WIPEONSUSPEND
On Fri 03-07-20 10:34:09, Catangiu, Adrian Costin wrote: > This patch adds logic to the kernel power code to zero out contents of > all MADV_WIPEONSUSPEND VMAs present in the system during its transition > to any suspend state equal or greater/deeper than Suspend-to-memory, > known as S3. How does the application learn that its memory got wiped? S2disk is an async operation and it can
2020 Jul 03
5
[RFC]: mm,power: introduce MADV_WIPEONSUSPEND
On Fri 03-07-20 10:34:09, Catangiu, Adrian Costin wrote: > This patch adds logic to the kernel power code to zero out contents of > all MADV_WIPEONSUSPEND VMAs present in the system during its transition > to any suspend state equal or greater/deeper than Suspend-to-memory, > known as S3. How does the application learn that its memory got wiped? S2disk is an async operation and it can
2020 Jul 03
5
[RFC]: mm,power: introduce MADV_WIPEONSUSPEND
Hi! > Cryptographic libraries carry pseudo random number generators to > quickly provide randomness when needed. If such a random pool gets > cloned, secrets may get revealed, as the same random number may get > used multiple times. For fork, this was fixed using the WIPEONFORK > madvise flag [1]. > Unfortunately, the same problem surfaces when a virtual machine gets >
2020 Jul 03
5
[RFC]: mm,power: introduce MADV_WIPEONSUSPEND
Hi! > Cryptographic libraries carry pseudo random number generators to > quickly provide randomness when needed. If such a random pool gets > cloned, secrets may get revealed, as the same random number may get > used multiple times. For fork, this was fixed using the WIPEONFORK > madvise flag [1]. > Unfortunately, the same problem surfaces when a virtual machine gets >