summaryrefslogtreecommitdiff
path: root/source3
AgeCommit message (Collapse)AuthorFilesLines
2009-02-19s3 OneFS: Fixes "inherit permissions" and "nt acl support" for Onefs.Zack Kirsch1-1/+11
2009-02-19S3: Dumb down debug spew in perfcount module codetodd stecher1-4/+4
2009-02-19S3: Make changes to perfcount API set for when a single request leads to ↵todd stecher4-16/+120
multiple replies (e.g. reply_echo). Change test and onefs modules to match new api set (thanks Volker!).
2009-02-18s3: Fix bug opening streams with truncating dispositionTim Prouty1-1/+1
Do not attempt to delete streams on a truncating open, if the name we're opening is itself a stream. Port 176e8857203944bc332844b700749120ce90c891 to standard open path
2009-02-18s3: OneFS: Pass in the client's fnum to the ifs_cbrl syscall.Zack Kirsch1-3/+4
2009-02-18s3: Fix OneFS bug opening streams with truncating dispositionAravind Srinivasan1-1/+1
Do not attempt to delete streams on a truncating open, if the name we're opening is itself a stream
2009-02-18s3: Fix streams enumeration bug in OneFS implementationAravind Srinivasan3-18/+68
Previously, we didn’t call SMB_VFS_OPEN_DIR from the streams module, instead we called fdopendir(). As a result we failed to populate the dir_state list in the readdirplus module. So when we tried to view the stream data, we will always returned NULL. To solve this I separated onefs_opendir() and the initialization of the dir_state list. This is done by introducing a new utility function “onefs_rdp_add_dir_state()”, which initializes the dir_state structure and adds it to the dir_state list. This function is called from the streams module before calling readdir().
2009-02-18S3: Log warning in smbstatus about lack of pid in anonymous mode.todd stecher1-0/+4
2009-02-18S3: Stop creating SMBD cores when failing to create a pipe.todd stecher3-4/+22
This was uncovered when the MAX FD limit was hit, causing an instant core and invoking error reporting. This fix causes SMBD to exit, but without building a core.
2009-02-18S3: Allow SMBD processes to survive in low memory condidtionstodd stecher3-0/+39
This commit adds a configure argument which allows for setting MADV_PROTECT in the madvise() API. With this enabled the kernel won't kill SMBD when it's running low on memory.
2009-02-19s3-spoolss: remove old spoolss_GetPrinterDriverDirectory.Günther Deschner4-256/+0
Guenther
2009-02-19s3-spoolss: use pidl for _spoolss_GetPrinterDriverDirectory.Günther Deschner3-95/+38
Guenther
2009-02-19s3-rpcclient: use rpccli_spoolss_GetPrinterDriverDirectory in rpcclient.Günther Deschner1-17/+37
Guenther
2009-02-19s3-spoolss: add support for "AddPort" via _spoolss_XcvData for Vista.Günther Deschner1-9/+68
Guenther
2009-02-19Interesting C compiler you have there... :-)Volker Lendecke1-1/+1
2009-02-18Fix coverity CID-602. Possible use of uninitialized var.Jeremy Allison1-1/+1
Jeremy.
2009-02-18s3-spoolss: remove old spoolss_XcvData.Günther Deschner4-234/+0
Guenther
2009-02-18s3-spoolss: use pidl for _spoolss_XcvData.Günther Deschner3-84/+113
Guenther
2009-02-17Don't miss an absolute pathname as a kerberos keytab path. From Glenn Machin ↵Jeremy Allison1-0/+5
<gmachin@sandia.gov>. Jeremy.
2009-02-17Fix bug #6117 - Samba 3.3.0: pdbedit -a core dumps.Jeremy Allison1-1/+12
Jeremy.
2009-02-17Fix warning about missmatch of uint32_t and size_t.Jeremy Allison1-1/+1
Jeremy.
2009-02-17s3:winbindd: make do_async_domain() static.Michael Adam2-12/+6
Michael
2009-02-17s3:build: improve the check for a working krb5-config.Michael Adam1-1/+1
Not only check if it exists and is executable, but also check whether it accepts the command line "krb5-config --libs gssapi". Chris Hoogendyk <hoogendyk@bio.umass.edu> has reported configure failing on a Solaris machine due to krb5-config raising errors on these options. Michael
2009-02-17s3-spoolss: remove old spoolss_ResetPrinter.Günther Deschner3-62/+0
Guenther
2009-02-17s3-spoolss: use pidl for _spoolss_ResetPrinter.Günther Deschner2-38/+10
Guenther
2009-02-17s3-netapi: fix Coverity #881 and #882.Günther Deschner1-7/+56
Guenther
2009-02-17Fix an invalid typecastingVolker Lendecke1-1/+7
entry->num_of_strings is a uint16_t. Casting it with (int *)&entry->num_of_strings is wrong, because it gives add_string_to_array the illusion that the object "num" points to is an int, which it is not. In case we are running on a machine where "int" is 32 or 64 bits long, what happens with that cast? "add_string_to_array" interprets the byte field that starts where "num_of_strings" starts as an int. Under very particular circumstances this might work in a limited number of cases: When the byte order of an int is such that the lower order bits of the int are stored first, the subsequent bytes which do not belong to the uint16_t anymore happen to be 0 and the result of the increment still fits into the first 2 bytes of that int, i.e. the result is < 65536. The correct solution to this problem is to use the implicit type conversion that happens when an assignment is done. BTW, this bug is found if you compile with -O3 -Wall, it shows up as a warning: rpc_server/srv_eventlog_lib.c:574: warning: dereferencing type-punned pointer will break strict-aliasing rules Thanks, Volker
2009-02-17s3-rpcclient: use rpccli_spoolss_RemoteFindFirstPrinterChangeNotifyEx.Günther Deschner1-20/+29
Guenther
2009-02-16Fix bug 5920Yasuma Takeda1-1/+1
The length of the memcpy was calculated wrong, r->out.return_authenticator is a pointer
2009-02-16s3:netlogon: implement _netr_LogonGetCapabilities() with ↵Stefan Metzmacher1-4/+3
NT_STATUS_NOT_IMPLEMENTED This hopefully fixes bug #6100. metze
2009-02-16s3 auth: Add parameter that forces every user through an NSS lookupZach Loafman3-4/+35
When set to yes, "force username map" forces every user, even AD users, through an NSS lookup. This allows the token to be overridden with information from NSS in certain broken environments.
2009-02-16s3 perfcount: Fix segfault with smbclient 'echo 3 foo'Tim Prouty1-33/+11
2009-02-16s3 OneFS: Add defaults to the fake timestamp parametersTim Prouty2-8/+19
2009-02-16make receive_smb_raw_talloc more readableTim Prouty1-4/+4
2009-02-15Attempt to fix bug #6099. According to MicrosoftJeremy Allison1-17/+26
Windows 7 looks at the negotiate_flags returned in this structure *even if the call fails with access denied ! So in order to allow Win7 to connect to a Samba NT style PDC we set the flags before we know if it's an error or not. Jeremy.
2009-02-14remove accidental white spaceDerrell Lipman1-1/+0
2009-02-14enums are traditionally signed. Avoid use of high bit in bit flags.Derrell Lipman1-3/+3
2009-02-14Get rid of the warnings I had for testingDerrell Lipman1-5/+0
2009-02-14It seems some systems use f_flags instead of f_flag. Use the appropriate one.Derrell Lipman2-4/+28
2009-02-14Remove a pointless NULL checkVolker Lendecke1-3/+0
2009-02-14Fix some nonempty blank linesVolker Lendecke1-22/+22
2009-02-14Rename lp_smb_perfcount_module() to lp_perfcount_module() to match the ↵Volker Lendecke3-3/+3
parameter name
2009-02-14Replace a // style comment with a /* */ oneVolker Lendecke1-1/+1
2009-02-14Fix some C++ warningsVolker Lendecke1-7/+14
2009-02-14Make smb_load_perfcount_module staticVolker Lendecke1-1/+1
2009-02-14f_frsize field is not ubiquitous. Check for it.Derrell Lipman1-0/+4
2009-02-14The f_fsid field is not always an integer type. Don't set it in that case.Derrell Lipman1-0/+5
2009-02-14Ensure consistency of values on stack (caught by AIX compiler)Derrell Lipman1-16/+16
2009-02-14Check for the right error return valueDerrell Lipman1-2/+3
2009-02-14[Bug 6069] Add a fstatvfs function for libsmbclientDerrell Lipman4-26/+11
- Revert Tim's changes for the moment. I need to see what the issue is and arrange to use "struct statvfs" if at all possible. Derrell