diff options
author | Stefan Metzmacher <metze@samba.org> | 2012-05-03 15:52:41 +0200 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2012-05-23 12:47:37 +0200 |
commit | 37866df4ee51e2bf62d26be9d87a22d94106a95a (patch) | |
tree | 22b84f5f4d14e733f099fdd8ea84ac38b4aa146a | |
parent | 42b2026a83983ad17bfd1651f2256b38e9fe8dad (diff) | |
download | samba-37866df4ee51e2bf62d26be9d87a22d94106a95a.tar.gz samba-37866df4ee51e2bf62d26be9d87a22d94106a95a.tar.bz2 samba-37866df4ee51e2bf62d26be9d87a22d94106a95a.zip |
s3:smbd: use reply_force_doserror(req, ERRSRV, ERRbaduid) on SMBulogoff
We don't support security = share anymore, so we should always have
a valid session.
Found by the raw.context test.
metze
Autobuild-User: Stefan Metzmacher <metze@samba.org>
Autobuild-Date: Wed May 23 12:47:37 CEST 2012 on sn-devel-104
-rw-r--r-- | source3/smbd/reply.c | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/source3/smbd/reply.c b/source3/smbd/reply.c index b93052ade2..d01ff905a3 100644 --- a/source3/smbd/reply.c +++ b/source3/smbd/reply.c @@ -2085,6 +2085,11 @@ void reply_ulogoffX(struct smb_request *req) if(vuser == NULL) { DEBUG(3,("ulogoff, vuser id %d does not map to user.\n", req->vuid)); + + req->vuid = UID_FIELD_INVALID; + reply_force_doserror(req, ERRSRV, ERRbaduid); + END_PROFILE(SMBulogoffX); + return; } /* in user level security we are supposed to close any files |