summaryrefslogtreecommitdiff
path: root/source3
AgeCommit message (Collapse)AuthorFilesLines
2009-09-24Revert 918b5a7e057bd91289ec06b3ef8d95da43a50ede. This codeJeremy Allison1-6/+6
should *not* return const. Jeremy.
2009-09-24s3: Fix up various string "const" warningsMatthias Dieter Wallnöfer4-25/+25
My changed introduced some warnings. Fix them.
2009-09-24s3:util_str "str_list_make_v3" - introduce also here the "const" resultMatthias Dieter Wallnöfer2-10/+10
I did this to match with the default util strlist library.
2009-09-24s3:vfs_default - correct function parametersMatthias Dieter Wallnöfer1-1/+2
2009-09-24s3-winbindd: no reason to call winbindd_can_contact_domain() three times in ↵Günther Deschner1-12/+0
query_user(). Guenther
2009-09-24s3: remove unused printing macros.Günther Deschner1-11/+0
Guenther
2009-09-24s3 onefs: Fix 1 second share mode delay handlingSteven Danneman1-3/+33
When racing to the open and loosing we may get a share_mode violation. In this case handle the 1-second delay via a defferred open properly. This requires us to retrieve the share_mode_lock before deferring open so we don't dereference a NULL pointer assuming we already had the lck because we were the first opener.
2009-09-24s3 onefs: Fix a race condition exists in onefs_open.c between multiple opens ↵Steven Danneman1-5/+19
to the same file. Two openers can stat a file at the same time, see that it doesn't exist, and then both race to open it first. The loser will enter onefs_open_file_ntcreate believing that the file doesnt exist, and thus skip any current state lookups for that file. This includes setting the file_id, and having a valid stat buffer. Normally on first create the file_id will be set during the open, but the second opener in this scenario may fail the open (oplock/share mode) and file_id will not be set, nor will the stat buffer be valid. In the error paths of this patch, we now double check that the file_id and the stat buffer are valid before doing other operations.
2009-09-24s3 onefs: Add some debugging/asserts to give more info when there is bad ↵Zack Kirsch2-9/+26
deferred open state. Signed-off-by: Tim Prouty <tprouty@samba.org>
2009-09-24s3: Add more helpful debugging to some of the streams codeTim Prouty3-2/+25
2009-09-24vfs catia: Fix a NULL dereference when CATIA is loaded with no mappings ↵Aravind Srinivasan1-1/+8
specified. When we use the CATIA vfs module and don't have any mapping specified, we return NULL for the mapped_name, thereby resulting in segfaults. When we don't have catia mapping, we should just use the old name instead of returning NULL for the mapped_name. Signed-off-by: Tim Prouty <tprouty@samba.org>
2009-09-24vfs catia: Fix the double translation that was happening with createfile and ↵Aravind Srinivasan6-101/+78
open. Since the catia translation is implemented for open, it should not also be done in createfile. By removing createfile from catia, translation is now done correctly for the primary open path. In order to support systems that have custom createfile implementations that don't eventually call SMB_VFS_OPEN, SMB_VFS_TRANSLATE_NAME has been expanded to take an additional argument that specifies direction. Signed-off-by: Tim Prouty <tprouty@samba.org>
2009-09-24vfs catia: Fix a possible NULL dereferenceAravind Srinivasan1-2/+9
Also free some unfreed memory. Signed-off-by: Tim Prouty <tprouty@samba.org>
2009-09-24s3: Forgot to check in one build failure for vfs_gpfs.cVolker Lendecke1-1/+1
2009-09-24s3: Remove an unused variableVolker Lendecke1-1/+0
2009-09-24s3: Make the vfs_gpfs compile at leastVolker Lendecke1-19/+23
Not sure whether it works in this state :-)
2009-09-24Revert "s3:winbindd: use a tcp connection for lsa in case ↵Stefan Metzmacher1-9/+0
lookup_names/lookup_sids doesn't work over ncacn_np" This reverts commit f23691cffd39e5df81b7b075e61ed1def6cce9f6. This should not have been commited... metze
2009-09-24s3:rpc_server: we need to make a copy of my_name in serverinfo_to_SamInfo_base()Stefan Metzmacher1-1/+1
This is important for the case the server_info already contains a logon_server. metze
2009-09-24s3:winbindd: use a tcp connection for lsa in case lookup_names/lookup_sids ↵Günther Deschner1-0/+9
doesn't work over ncacn_np metze
2009-09-23s3:gencache: Make gencache_del() return success for expired entriesVolker Lendecke1-4/+13
This fixes nasty error messages from "net cache flush"
2009-09-23s3:gencache: Remove some over-paranoid lockingVolker Lendecke1-6/+0
2009-09-23s3:gencache: Add a "was_expired" argument to gencache_get_data_blobVolker Lendecke4-14/+23
This is set to true if the routine returns failure due to an existing but expired entry.
2009-09-23s3:winbind: Fix an uninitialized variableVolker Lendecke1-1/+1
2009-09-23build: use AS_HELP_STRING() for --with-localedirMichael Adam1-1/+1
Michael
2009-09-23build: add switch "--with-codepagedir=DIR" to configure.Michael Adam1-0/+16
This is to address bug #6444. Michael
2009-09-23build: add datadir to "make showlayout"Michael Adam1-0/+1
Michael
2009-09-22s3-winbindd: Fix Bug #6711: trusts to windows 2008 (2008 r2) not working.Günther Deschner3-5/+63
Winbindd should always try to use LSA via an schannel authenticated ncacn_ip_tcp connection when talking to AD for LSA lookup calls. In Samba <-> W2k8 interdomain trust scenarios, LookupSids3 and LookupNames4 via an schannel ncacn_ip_tcp LSA connection are the *only* options to successfully resolve sids and names. Guenther
2009-09-22s3-winbindd: add cm_connect_lsa_tcp().Günther Deschner3-0/+63
Guenther
2009-09-21s3:secrets_schannel: revert to using version 1Stefan Metzmacher1-3/+9
It doesn't really matter if the entries have invalid context in it. Older versions of samba refuse to open the file if the version doesn't match. If we can't parse individual records, we'll fail schannel binds, but the clients are supposed to reestablish the netlogon secure channel by doing ServerReqChallenge/ServerAuthenticate* again. This will just overwrite the old record. metze
2009-09-21s3:winbindd: avoid writing to a closed connection and generate SIGPIPEStefan Metzmacher1-12/+13
metze
2009-09-21s3:lib/select: don't overwrite errno in the signal handlerStefan Metzmacher1-0/+4
metze
2009-09-19libcli:nbt move prototypes of lmhosts functions to libnbt.hAndrew Bartlett1-4/+0
2009-09-18s3-rpc_client: fix non initialized structure in rpccli_lsa_lookup_sids_noalloc.Günther Deschner1-0/+2
Guenther
2009-09-18s3-smbd: fix get_ea_names_from_file() and check for pnames pointer.Günther Deschner1-1/+3
This fixes smbd from crashing all the time. Jeremy, Volker, please check. Guenther
2009-09-18s3: Fix Coverity ID 581 -- NEGATIVE_RETURNSVolker Lendecke1-0/+4
2009-09-18s3:smbstatus: Fix bug 6703, allow smbstatus as non-rootVolker Lendecke1-11/+13
We only require a ctdb connection when clustering is enabled. This limits the restriction for only-root smbstatus to the clustering case.
2009-09-18s3:smbstatus: Fix some nonempty blank linesVolker Lendecke1-19/+19
2009-09-17s3-rpc: samba3 needs the DCERPC_NDR64 defineAndrew Tridgell1-0/+3
2009-09-18s3:smbd: Attempt to fix the build on HP/UXVolker Lendecke1-0/+1
2009-09-18s3:smbd: Fix an inappropriate pointer return in a bool fnVolker Lendecke1-1/+1
2009-09-18s3:winbind: Fix some enum type mismatches found by the Solaris compilerVolker Lendecke3-3/+3
2009-09-17s3: build with pam support when possibleBjörn Jacke1-3/+3
2009-09-17Check in modified generated files for systems where pidl can't run.Jeremy Allison1-52/+54
Jeremy.
2009-09-17spnego: Support ASN.1 BIT STRING and use it in SPNEGO.Kouhei Sutou1-2/+4
Signed-off-by: Günther Deschner <gd@samba.org>
2009-09-17void functions can't return a value. Found by the Solaris compiler.Jeremy Allison1-1/+1
Jeremy.
2009-09-17void functions can't return a value. Found by the Solaris compiler.Jeremy Allison1-1/+1
Jeremy.
2009-09-17void functions can't return a value. Found by the Solaris compiler.Jeremy Allison1-1/+1
Jeremy.
2009-09-17We now pass the Microsoft SMB2 fileio test with EA's and streams...Jeremy Allison5-5/+69
Jeremy.
2009-09-13Port the Samba 3 shm_setup to QNX.Matt Kraai1-0/+18
2009-09-17s3-winbindd: add and use winbindd_lookup_names().Günther Deschner2-20/+47
Guenther