summaryrefslogtreecommitdiff
path: root/source3/smbd
AgeCommit message (Collapse)AuthorFilesLines
2012-06-06s3:include: change connection_struct->cnum to uint32_tMichael Adam2-2/+2
Pair-Programmed-With: Stefan Metzmacher <metze@samba.org>
2012-06-06s3:smb: introduce a name TID_FIELD_INVALID for the invalid value for a cnum/tidMichael Adam2-2/+2
Pair-Programmed-With: Stefan Metzmacher <metze@samba.org>
2012-06-06s3:connections: add a CNUM_OFFSET for mapping between cnum and the bitmap indexMichael Adam1-4/+10
This moves the start of the range of valid cnum values up from 0 to CNUM_OFFSET (currently 1), so that in a later step we can use 0 as invalid cnum value instead of the current -1. This will allow us to change the type of cnum to uint32_t from a mix of int and unsigned. Pair-Programmed-With: Stefan Metzmacher <metze@samba.org>
2012-06-06s3:smbd: change user_struct->vuid to uint64_tStefan Metzmacher7-34/+36
Only sconn->smb1.sessions.next_vuid remains as uint16_t, so that we do not generate larger values yet. metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed Jun 6 12:07:33 CEST 2012 on sn-devel-104
2012-06-06s3:smbd: let file_close_pid/file_close_user take a uint64_t vuidStefan Metzmacher2-4/+4
metze
2012-06-06s3:smbd: pass down vuid as uint64_t in lanman.cStefan Metzmacher2-37/+37
metze
2012-06-06s3:smbd: pass down vuid as uint64_t in ipc.cStefan Metzmacher1-4/+4
metze
2012-06-06s3:smbd: change vuid to uint64_t in uid.cStefan Metzmacher2-14/+14
metze
2012-06-06s3:smbd: let fcb_or_dos_open() take a uint64_t vuidStefan Metzmacher1-1/+1
metze
2012-06-06s3:smbd: let close_cnum() take a uint64_t vuidStefan Metzmacher2-2/+2
metze
2012-06-06s3:smbd: use UID_FIELD_INVALID (0) instead of (uint16)-1 when calling ↵Stefan Metzmacher1-1/+1
close_cnum() The only thing that's important is that the value is invalid. metze
2012-06-06s3:smbd: let make_connection() take a uint64_t vuidStefan Metzmacher2-2/+2
metze
2012-06-06s3:smbd: let conn_clear_vuid_caches() take a uint64_t vuidStefan Metzmacher2-3/+3
metze
2012-06-06s3:smbd: let open_fake_file() take a uint64_t vuidStefan Metzmacher1-1/+1
metze
2012-06-06s3:smbd: change conn_ctx->vuid to uint64_tStefan Metzmacher1-1/+1
metze
2012-06-06s3:smbd: change trans_state->vuid to uint64_tStefan Metzmacher1-1/+1
metze
2012-06-06s3:include: change smb_request->vuid to uint64_tStefan Metzmacher1-3/+4
metze
2012-06-06s3:include: change files_struct->vuid to uint64_tStefan Metzmacher2-3/+4
metze
2012-06-06s3:smbd: move struct user_struct to globals.hStefan Metzmacher1-0/+14
metze
2012-06-06s3:smbd: use 'struct user_struct' instead of typedef'ed 'user_struct'Stefan Metzmacher12-28/+28
metze
2012-06-06s3:smbd: move forward declaration of struct aio_extra to smbd.hStefan Metzmacher1-0/+1
metze
2012-06-06s3:include: move some prototypes (e.g. smb_register_vfs) to vfs.hStefan Metzmacher1-9/+0
These are called from vfs modules, which should not depend on smbd/proto.h metze
2012-06-06s3:smbd: move UCF_ defines to smbd.hStefan Metzmacher1-0/+9
metze
2012-06-06s3:include: move struct connection_struct (and sub structs) to vfs.hStefan Metzmacher1-0/+2
metze
2012-06-06s3:smbd: move struct trans_state to smbd.hStefan Metzmacher1-0/+30
metze
2012-06-06s3:smbd: move struct privilege_paths to smbd.hStefan Metzmacher1-0/+9
metze
2012-06-06s3:smbd: make struct notify_change_buf private to notify.cStefan Metzmacher1-0/+20
metze
2012-06-06s3:smbd: make use of change_notify_fsp_has_changes()Stefan Metzmacher2-2/+2
metze
2012-06-06s3:smbd: add change_notify_fsp_has_changes()Stefan Metzmacher2-0/+18
metze
2012-06-06s3:smbd: use print_spool_rap_jobid() in call_trans2ioctl()Stefan Metzmacher1-5/+3
metze
2012-06-06s3:smbd: use print_spool_rap_jobid() in reply_ioctl()Stefan Metzmacher1-5/+2
metze
2012-06-06s3:smbd: fcb_or_dos_open() can be staticStefan Metzmacher2-20/+10
metze
2012-06-06s3:smbd: dup_file_fsp() never gets called for print filesStefan Metzmacher1-8/+3
metze
2012-06-06s3:smbd: make struct vfs_fsp_data private to vfs.cStefan Metzmacher1-0/+10
metze
2012-06-06s3:smbd: make use of vfs_remove_all_fsp_extensions() in file_free()Stefan Metzmacher1-3/+1
metze
2012-06-06s3:smbd: add vfs_remove_all_fsp_extensions()Stefan Metzmacher2-0/+22
metze
2012-06-06s3:smbd: remove typedef for struct write_cacheStefan Metzmacher1-9/+9
metze
2012-06-06s3:smbd: make typedef write_cache private to fileio.cStefan Metzmacher1-0/+8
metze
2012-06-06build: Rationalise AIO support in configure, ensure on by defaultAndrew Bartlett3-3/+3
With this change, the define to check for AIO is HAVE_AIO, consistant with other subsystems. It is now also on by default in the autoconf build, as it has been for waf. Andrew Bartlett
2012-06-05s3:lib: split things into a conn_tdb.hStefan Metzmacher3-0/+3
metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Tue Jun 5 19:28:35 CEST 2012 on sn-devel-104
2012-06-05s3-smbd: Remove support for protocols before LANMAN1Andrew Bartlett1-35/+0
This falls out of the removal of security=share, because we now require that a session setup has been performed before (essentially) all other operations. Andrew Bartlett
2012-06-05Fix bug #8972 - Directory group write permission bit is set if unix ↵Jeremy Allison1-2/+4
extensions are enabled We can't manipulate file_attributes if it's a posix call. I'll look at adding a test for this asap. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Tue Jun 5 04:26:11 CEST 2012 on sn-devel-104
2012-06-03s3:smbd: make conn_close_all() a void functionStefan Metzmacher3-8/+3
metze
2012-06-03s3:smbd/close: call del_share_mode() directly before TALLOC_FREE(lck)Stefan Metzmacher1-5/+15
metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Sun Jun 3 21:08:19 CEST 2012 on sn-devel-104
2012-06-03s3:smbd/close: remove unused goto out from close_directory()Stefan Metzmacher1-3/+1
metze
2012-06-03s3:smbd/close: do an early return in close_directory()Stefan Metzmacher1-2/+1
metze
2012-06-03s3: Fix an assert to trigger in close_remove_share_modeStefan Metzmacher1-6/+17
In case we have a left-over entry in the share mode entry array, the SMB_ASSERT(got_tokens) is likely to kick in. It happens when we are about to delete a file with initial delete on close. We don't have a delete on close token set in the locking.tdb record. We see the fsp->initial_delete_on_close set, add the delete_on_close token to lck. Then "delete_file" is being set to true. Then later on we do the notify_deferred_opens. This walks the list, also checking for share_mode_stale_pid. We have already deleted our own share mode entry, share_mode_stale_pid() sees the left-over entry. It not also deletes that one but also the delete on close token. This leads to a different view of "delete_file" a.k.a. "got_tokens" further down in close_remove_share_mode, leading the SMB_ASSERT to fire. This patch attempts to fix the issue by keeping around our own share mode entry for almost the whole routine, preventing share_mode_stale_pid() from removing the delete tokens. Pair-Programmed-With: Volker Lendecke <vl@samba.org>
2012-06-03s3: Do an early return in close_remove_share_modeVolker Lendecke1-2/+1
Without "lck" we don't have much to clean up Signed-off-by: Stefan Metzmacher <metze@samba.org>
2012-06-03s3: Make close_remove_share_mode a bit more readableVolker Lendecke1-2/+4
by introducing a variable simplifying a boolean expression Signed-off-by: Stefan Metzmacher <metze@samba.org>
2012-06-03s3: Slightly simplify close_remove_share_modeVolker Lendecke1-10/+15
Remove a level of indentation by more use of "continue;" Signed-off-by: Stefan Metzmacher <metze@samba.org>