[SCM] Samba Shared Repository - branch v4-0-test updated - release-4-0-0alpha2-1247-g0641a43

2008-03-08 Thread Stefan Metzmacher
The branch, v4-0-test has been updated
   via  0641a43cd6fd081cac0275f5bde2ad70fa6a71bb (commit)
   via  5b13a564b8459c3134a43e1d4b4a791e33108b1b (commit)
   via  4afd4058e30e0754a56100e691486139f149e3a3 (commit)
  from  5fdca988c687f58fe2fddd3c8eff5f461207065b (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v4-0-test


- Log -
commit 0641a43cd6fd081cac0275f5bde2ad70fa6a71bb
Author: Stefan Metzmacher [EMAIL PROTECTED]
Date:   Sat Mar 8 08:55:12 2008 +0100

opendb_tdb: keep struct opendb_file arround for the lifetime of struct 
odb_lock

That means we only have to parse the record once
and as the tdb record is locked the in memory copy
is always the same as the one in the tdb.

metze

commit 5b13a564b8459c3134a43e1d4b4a791e33108b1b
Author: Stefan Metzmacher [EMAIL PROTECTED]
Date:   Sat Mar 8 08:58:41 2008 +0100

opendb_tdb: correctly initialize modified to false

Otherwise this variable would never change its value...

metze

commit 4afd4058e30e0754a56100e691486139f149e3a3
Author: Stefan Metzmacher [EMAIL PROTECTED]
Date:   Sat Mar 8 09:20:55 2008 +0100

we now define PACKAGE_BUGREPORT in config.h

metze

---

Summary of changes:
 source/heimdal_build/print_version.h |2 +-
 source/ntvfs/common/opendb_tdb.c |  246 +++---
 2 files changed, 111 insertions(+), 137 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source/heimdal_build/print_version.h 
b/source/heimdal_build/print_version.h
index 0e0c6d7..e4790c5 100644
--- a/source/heimdal_build/print_version.h
+++ b/source/heimdal_build/print_version.h
@@ -1 +1 @@
-#define PACKAGE_BUGREPORT 
+/* this should be empty */
diff --git a/source/ntvfs/common/opendb_tdb.c b/source/ntvfs/common/opendb_tdb.c
index f71416e..17fcdfb 100644
--- a/source/ntvfs/common/opendb_tdb.c
+++ b/source/ntvfs/common/opendb_tdb.c
@@ -64,6 +64,8 @@ struct odb_lock {
struct odb_context *odb;
TDB_DATA key;
 
+   struct opendb_file file;
+
struct {
struct opendb_entry *e;
bool attrs_only;
@@ -108,6 +110,8 @@ static int odb_lock_destructor(struct odb_lock *lck)
return 0;
 }
 
+static NTSTATUS odb_pull_record(struct odb_lock *lck, struct opendb_file 
*file);
+
 /*
   get a lock on a entry in the odb. This call returns a lock handle,
   which the caller should unlock using talloc_free().
@@ -116,6 +120,7 @@ static struct odb_lock *odb_tdb_lock(TALLOC_CTX *mem_ctx,
 struct odb_context *odb, DATA_BLOB 
*file_key)
 {
struct odb_lock *lck;
+   NTSTATUS status;
 
lck = talloc(mem_ctx, struct odb_lock);
if (lck == NULL) {
@@ -138,6 +143,15 @@ static struct odb_lock *odb_tdb_lock(TALLOC_CTX *mem_ctx,
ZERO_STRUCT(lck-can_open);
 
talloc_set_destructor(lck, odb_lock_destructor);
+
+   status = odb_pull_record(lck, lck-file);
+   if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
+   /* initialise a blank structure */
+   ZERO_STRUCT(lck-file);
+   } else if (!NT_STATUS_IS_OK(status)) {
+   talloc_free(lck);
+   return NULL;
+   }

return lck;
 }
@@ -432,8 +446,6 @@ static NTSTATUS odb_tdb_open_file(struct odb_lock *lck,
  uint32_t oplock_level, uint32_t 
*oplock_granted)
 {
struct odb_context *odb = lck-odb;
-   struct opendb_file file;
-   NTSTATUS status;
 
if (!lck-can_open.e) {
return NT_STATUS_INTERNAL_ERROR;
@@ -447,13 +459,9 @@ static NTSTATUS odb_tdb_open_file(struct odb_lock *lck,
oplock_level = OPLOCK_NONE;
}
 
-   status = odb_pull_record(lck, file);
-   if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
-   /* initialise a blank structure */
-   ZERO_STRUCT(file);
-   file.path = path;
-   } else {
-   NT_STATUS_NOT_OK_RETURN(status);
+   if (lck-file.path == NULL) {
+   lck-file.path = talloc_strdup(lck, path);
+   NT_STATUS_HAVE_NO_MEMORY(lck-file.path);
}
 
/*
@@ -462,7 +470,7 @@ static NTSTATUS odb_tdb_open_file(struct odb_lock *lck,
if (lck-can_open.attrs_only) {
oplock_level= OPLOCK_NONE;
} else if (oplock_level == OPLOCK_EXCLUSIVE) {
-   if (file.num_entries == 0) {
+   if (lck-file.num_entries == 0) {
oplock_level= OPLOCK_EXCLUSIVE;
} else if (allow_level_II_oplock) {
oplock_level= OPLOCK_LEVEL_II;
@@ -470,7 +478,7 @@ static NTSTATUS odb_tdb_open_file(struct odb_lock *lck,
oplock_level= OPLOCK_NONE;

[SCM] Samba Shared Repository - branch v3-0-test updated - release-3-0-28-146-g4861aef

2008-03-08 Thread Volker Lendecke
The branch, v3-0-test has been updated
   via  4861aef29f84a051b4592b1616e40f010b612420 (commit)
  from  29df57a5aadc208514f82875ef489e42cffad471 (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-0-test


- Log -
commit 4861aef29f84a051b4592b1616e40f010b612420
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 8 10:27:03 2008 +0100

Work around a handle leak in XP 64 bit

We have to tell XP64 that we store unicode, otherwise some library will to a
findfirst before each createfile, leaking a directory handle each time.

---

Summary of changes:
 source/smbd/trans2.c |1 +
 1 files changed, 1 insertions(+), 0 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source/smbd/trans2.c b/source/smbd/trans2.c
index 623117b..a60f306 100644
--- a/source/smbd/trans2.c
+++ b/source/smbd/trans2.c
@@ -2365,6 +2365,7 @@ cBytesSector=%u, cUnitTotal=%u, cUnitAvail=%d\n, 
(unsigned int)st.st_dev, (unsi
 

SIVAL(pdata,0,FILE_CASE_PRESERVED_NAMES|FILE_CASE_SENSITIVE_SEARCH|
(lp_nt_acl_support(SNUM(conn)) ? 
FILE_PERSISTENT_ACLS : 0)|
+   FILE_UNICODE_ON_DISK|
quota_flag); /* FS ATTRIBUTES */
 
SIVAL(pdata,4,255); /* Max filename component length */


-- 
Samba Shared Repository


[SCM] Samba Shared Repository - branch v3-0-stable updated - release-3-0-28-148-ge357326

2008-03-08 Thread Gerald Carter
The branch, v3-0-stable has been updated
   via  e3573261c079bf4e0d4642d4520a5e6eaea41b13 (commit)
   via  a49084cad39daa07d3b45eea5d33240e58f919c8 (commit)
  from  4861aef29f84a051b4592b1616e40f010b612420 (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-0-stable


- Log -
commit e3573261c079bf4e0d4642d4520a5e6eaea41b13
Author: Gerald W. Carter [EMAIL PROTECTED]
Date:   Sat Mar 8 09:31:49 2008 -0600

Mark version as 3.0.28a

commit a49084cad39daa07d3b45eea5d33240e58f919c8
Author: Gerald W. Carter [EMAIL PROTECTED]
Date:   Sat Mar 8 09:30:20 2008 -0600

Updating release notes for 3.0.28a

---

Summary of changes:
 WHATSNEW.txt   |  204 +++-
 source/VERSION |4 +-
 2 files changed, 204 insertions(+), 4 deletions(-)


Changeset truncated at 500 lines:

diff --git a/WHATSNEW.txt b/WHATSNEW.txt
index 9e023d1..71d3c3a 100644
--- a/WHATSNEW.txt
+++ b/WHATSNEW.txt
@@ -1,3 +1,205 @@
+   ===
+   Release Notes for Samba 3.0.28a
+Mar 8, 2008
+   ===
+
+This is the second production release of the Samba 3.0.28 code 
+base and is the version that servers should be run for for all 
+current bug fixes.  
+
+Major bug fixes included in Samba 3.0.28a are:
+
+  o Failure to join Windows 2008 domains
+  o Windows Vista (including SP1 RC) interop issues
+
+
+
+##
+Changes
+###
+
+smb.conf changes
+
+
+Parameter Name  Description Default
+--  --- ---
+administrative shareNew No
+ldap debug levelNew 0
+ldap debug thresholdNew 10
+
+
+Changes since 3.0.28
+
+
+o   Michael Adam [EMAIL PROTECTED]
+* Fix bug in version string's vendor tag.
+* Prevent net getdomainsid from crashing when called as non-root.
+* BUG 4801: Correctly implement LSA lookup levels for LookupNames.
+* Fixes for internal LookupNames() calls for unqualified users and 
+  groups.
+* Remove unnecessary functions when managing domain trust 
+  passwords.
+* Fix winbindd on a Samba DC talking to a trusted domain DC
+  (again).
+* Consolidate the detection of the machine_account_name when
+  obtaining trust credentials from the local database.
+* Refactor trust account database routines and session key
+  management.
+* Fix retrieval of trusted domain password policies when
+  authenticating a user (only when WBFLAG_PAM_GET_PWD is config
+  flags is set).
+* Refactor Winbind's cm_connect_sam().
+* Enable building the notify_fam module.
+* Add ldap debug level and ldap debug threshold smb.conf options.
+
+
+o   Jeremy Allison [EMAIL PROTECTED]
+* Fix cut-n-paste bug when filling in form values for Printer
+  info.
+* Fix SMB signing bug found by Volker.
+* Create locking.tdb when running smbstatus before smbd to avoid
+  confusing error messages.
+* Add a portable version of strlcpy and strlcat.
+* BUG 4780: Cause user mounts to inherit uid= and gid= from the
+  calling user when called as non-root, except when overridden on
+  the command line.  Original patch by Steve Langasek.
+* BUG 5802: Recent versions of Linux-PAM support localization of
+  user prompts, so Samba must use the C locale when invoking PAM
+* Merge Vista principal detection changes by Andreas Schneider
+  from 3.2 branch.
+* BUG 5121: Fix problems running unix passwd sync on streams based 
+  systems.
+* BUG 4612: Fix smbd crash when connecting from an OS/2 client.
+* Back port Volker's ACL fixes on newly create files form 3.2.
+* Ensure that send_getdc_request() matches the 3.2 code base.
+* BUG 3617: Fix crash in nmbd caused by referencing freed memory.
+* Fixes for issues reported by IBM checker.
+* Fixes for issues reported by Coverity.
+* Back port Volker's fix for nlink count.
+* Back port SAMR flag fixes from Matt Geddes
+  [EMAIL PROTECTED].
+* BUG 4929: Cope with protected ACL set correctly (based on work
+  from Jim McDonough).
+* Fix ACL set bug when group being set is the primary group.
+* Ensure NDR wire-reads of string types are always null
+  terminated.
+* BUG 5247: Fix mget wildcard expansion in smbclient.
+* Fix bug in SPNEGO negotiation.
+* BUG 3617: Fix Invalid read of size 4 errors.
+* BUG 5267: Prevent nmbd from shutting down when no network
+  interfaces can be located.
+
+
+o   Kai Blin [EMAIL PROTECTED]
+* libsmb: Do not upper-case 

svn commit: samba-web r1175 - in trunk: . history

2008-03-08 Thread jerry
Author: jerry
Date: 2008-03-08 16:58:05 + (Sat, 08 Mar 2008)
New Revision: 1175

WebSVN: 
http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=revroot=samba-webrev=1175

Log:
Announcing 3.0.28a
Added:
   trunk/history/samba-3.0.28a.html
Modified:
   trunk/header_columns.html
   trunk/history/header_history.html
   trunk/index.html


Changeset:
Modified: trunk/header_columns.html
===
--- trunk/header_columns.html   2008-03-05 15:33:56 UTC (rev 1174)
+++ trunk/header_columns.html   2008-03-08 16:58:05 UTC (rev 1175)
@@ -130,9 +130,9 @@
   div class=releases
 h4Current Stable Release/h4
 ul
-lia href=/samba/ftp/stable/samba-3.0.28.tar.gzSamba 3.0.28 
(gzipped)/a/li
-lia href=/samba/history/samba-3.0.28.htmlRelease Notes/a/li
-lia href=/samba/ftp/stable/samba-3.0.28.tar.ascSignature/a/li
+lia href=/samba/ftp/stable/samba-3.0.28a.tar.gzSamba 3.0.28a 
(gzipped)/a/li
+lia href=/samba/history/samba-3.0.28a.htmlRelease Notes/a/li
+lia href=/samba/ftp/stable/samba-3.0.28a.tar.ascSignature/a/li
 /ul
 
 h4Historical/h4

Modified: trunk/history/header_history.html
===
--- trunk/history/header_history.html   2008-03-05 15:33:56 UTC (rev 1174)
+++ trunk/history/header_history.html   2008-03-08 16:58:05 UTC (rev 1175)
@@ -77,11 +77,11 @@
   div class=notes
 h6Release Notes/h6
 ul
+lia href=samba-3.0.28a.htmlsamba-3.0.28/a/li
 lia href=samba-3.0.28.htmlsamba-3.0.28/a/li
 lia href=samba-3.0.27a.htmlsamba-3.0.27a/a/li
 lia href=samba-3.0.27.htmlsamba-3.0.27/a/li
 lia href=samba-3.0.26a.htmlsamba-3.0.26a/a/li
-lia href=samba-3.0.26.htmlsamba-3.0.26/a/li
 lia href=samba-3.0.25c.htmlsamba-3.0.25c/a/li
 lia href=samba-3.0.25b.htmlsamba-3.0.25b/a/li
 lia href=samba-3.0.25a.htmlsamba-3.0.25a/a/li

Added: trunk/history/samba-3.0.28a.html
===
--- trunk/history/samba-3.0.28a.html2008-03-05 15:33:56 UTC (rev 1174)
+++ trunk/history/samba-3.0.28a.html2008-03-08 16:58:05 UTC (rev 1175)
@@ -0,0 +1,217 @@
+!DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN
+http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd;
+html xmlns=http://www.w3.org/1999/xhtml;
+
+head
+titleSamba - Release Notes Archive/title
+/head
+
+body
+
+   H2Samba 3.0.28a Available for Download/H2
+
+p
+pre
+   ===
+   Release Notes for Samba 3.0.28a
+Mar 8, 2008
+   ===
+
+This is the second production release of the Samba 3.0.28 code 
+base and is the version that servers should be run for for all 
+current bug fixes.  
+
+Major bug fixes included in Samba 3.0.28a are:
+
+  o Failure to join Windows 2008 domains
+  o Windows Vista (including SP1 RC) interop issues
+
+
+
+##
+Changes
+###
+
+smb.conf changes
+
+
+Parameter Name  Description Default
+--  --- ---
+administrative shareNew No
+ldap debug levelNew 0
+ldap debug thresholdNew 10
+
+
+Changes since 3.0.28
+
+
+o   Michael Adam [EMAIL PROTECTED]
+* Fix bug in version string's vendor tag.
+* Prevent net getdomainsid from crashing when called as non-root.
+* BUG 4801: Correctly implement LSA lookup levels for LookupNames.
+* Fixes for internal LookupNames() calls for unqualified users and 
+  groups.
+* Remove unnecessary functions when managing domain trust 
+  passwords.
+* Fix winbindd on a Samba DC talking to a trusted domain DC
+  (again).
+* Consolidate the detection of the machine_account_name when
+  obtaining trust credentials from the local database.
+* Refactor trust account database routines and session key
+  management.
+* Fix retrieval of trusted domain password policies when
+  authenticating a user (only when WBFLAG_PAM_GET_PWD is config
+  flags is set).
+* Refactor Winbind's cm_connect_sam().
+* Enable building the notify_fam module.
+* Add ldap debug level and ldap debug threshold smb.conf options.
+
+
+o   Jeremy Allison [EMAIL PROTECTED]
+* Fix cut-n-paste bug when filling in form values for Printer
+  info.
+* Fix SMB signing bug found by Volker.
+* Create locking.tdb when running smbstatus before smbd to avoid
+  confusing error messages.
+* Add a portable version of strlcpy and strlcat.
+* BUG 4780: Cause user mounts to inherit uid= and gid= from the
+  calling user when called as non-root, except when overridden on
+  the command line.  Original patch by Steve Langasek.

[SCM] Samba Shared Repository - branch v3-2-test updated - release-3-2-0pre2-160-g26d64d2

2008-03-08 Thread Volker Lendecke
The branch, v3-2-test has been updated
   via  26d64d22d65938023a4e45c3893e7021e51f4d9c (commit)
   via  f556c9e162e2bc0d16710e994a00edc33a146cd5 (commit)
   via  0aa195b5d623e1f26f2a1b9e91323a5ddd3ff282 (commit)
   via  eb8b6f2404e49d6a837935c5b411d78fb6ff23ef (commit)
   via  cfa1b838144800c0758969921b8904fd62e46c07 (commit)
   via  fdf4cd99ccb59e126391253d2091707bc8daee43 (commit)
  from  85007cf3f2e3df67c524cc67442396c114f6b784 (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-2-test


- Log -
commit 26d64d22d65938023a4e45c3893e7021e51f4d9c
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 8 22:29:35 2008 +0100

Print out the used seed in smbtorture

commit f556c9e162e2bc0d16710e994a00edc33a146cd5
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 8 22:28:01 2008 +0100

Correctly calculate the max read size

commit 0aa195b5d623e1f26f2a1b9e91323a5ddd3ff282
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Fri Mar 7 15:03:20 2008 +0100

Move inbuf handling to before the PDU handling

In an error case, correctly discard the offending PDU

commit eb8b6f2404e49d6a837935c5b411d78fb6ff23ef
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sun Mar 2 09:43:19 2008 +0100

Pass specific packets to build_nmb and build_dgram

To me it was not clear what parts of struct packet_struct are actually used 
in
build_packet(). This makes it a bit more clear that only the specific parts 
are
used.

commit cfa1b838144800c0758969921b8904fd62e46c07
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 1 19:54:17 2008 +0100

Fix some typos

commit fdf4cd99ccb59e126391253d2091707bc8daee43
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 1 10:22:04 2008 +0100

Build aio_fork by default

... only when --with-aio-support and we can pass file descriptors

---

Summary of changes:
 source/configure.in  |7 +++
 source/libsmb/async_smb.c|  117 +-
 source/libsmb/clireadwrite.c |2 +-
 source/libsmb/nmblib.c   |   10 ++--
 source/libsmb/unexpected.c   |4 +-
 source/smbd/trans2.c |2 +-
 source/torture/torture.c |9 ++-
 7 files changed, 80 insertions(+), 71 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source/configure.in b/source/configure.in
index f884d93..2e6c109 100644
--- a/source/configure.in
+++ b/source/configure.in
@@ -5341,6 +5341,13 @@ int main() { struct aiocb a; return aio_suspend64(a, 1, 
NULL); }],
   AC_MSG_RESULT(no)
 )
 
+if test x$samba_cv_HAVE_AIO = xyes; then
+   if test x$samba_cv_msghdr_msg_control = xyes -o \
+   x$samba_cv_msghdr_msg_acctright = xyes; then
+   default_shared_modules=$default_shared_modules vfs_aio_fork
+   fi
+fi
+
 #
 # check for sendfile support
 
diff --git a/source/libsmb/async_smb.c b/source/libsmb/async_smb.c
index 21bcd5b..04c22a9 100644
--- a/source/libsmb/async_smb.c
+++ b/source/libsmb/async_smb.c
@@ -174,24 +174,72 @@ static void handle_incoming_pdu(struct cli_state *cli)
 {
struct cli_request *req;
uint16_t mid;
-   size_t raw_pdu_len, buf_len, pdu_len;
-   size_t rest_len;
+   size_t raw_pdu_len, buf_len, pdu_len, rest_len;
+   char *pdu;
NTSTATUS status;
 
/*
 * The encrypted PDU len might differ from the unencrypted one
 */
raw_pdu_len = smb_len(cli-evt_inbuf) + 4;
+   buf_len = talloc_get_size(cli-evt_inbuf);
+   rest_len = buf_len - raw_pdu_len;
+
+   if (buf_len == raw_pdu_len) {
+   /*
+* Optimal case: Exactly one PDU was in the socket buffer
+*/
+   pdu = cli-evt_inbuf;
+   cli-evt_inbuf = NULL;
+   }
+   else {
+   DEBUG(11, (buf_len = %d, raw_pdu_len = %d, splitting 
+  buffer\n, (int)buf_len, (int)raw_pdu_len));
+
+   if (raw_pdu_len  rest_len) {
+   /*
+* The PDU is shorter, talloc_memdup that one.
+*/
+   pdu = (char *)talloc_memdup(
+   cli, cli-evt_inbuf, raw_pdu_len);
+
+   memmove(cli-evt_inbuf, cli-evt_inbuf + raw_pdu_len,
+   buf_len - raw_pdu_len);
+
+   cli-evt_inbuf = TALLOC_REALLOC_ARRAY(
+   NULL, cli-evt_inbuf, char, rest_len);
+
+   if (pdu == NULL) {
+   status = NT_STATUS_NO_MEMORY;
+   goto invalidate_requests;
+   }
+   }
+   else {
+   /*
+* The PDU 

[SCM] Samba Shared Repository - branch v3-2-test updated - release-3-2-0pre2-161-g8c2c175

2008-03-08 Thread Günther Deschner
The branch, v3-2-test has been updated
   via  8c2c17573c179c774d093d780716e95833cb992f (commit)
  from  26d64d22d65938023a4e45c3893e7021e51f4d9c (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-2-test


- Log -
commit 8c2c17573c179c774d093d780716e95833cb992f
Author: Günther Deschner [EMAIL PROTECTED]
Date:   Sat Mar 8 23:00:09 2008 +0100

Add netfilegetsec command to rpcclient.

Guenther

---

Summary of changes:
 source/rpcclient/cmd_srvsvc.c |   31 +++
 1 files changed, 31 insertions(+), 0 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source/rpcclient/cmd_srvsvc.c b/source/rpcclient/cmd_srvsvc.c
index 8c85372..25a33ba 100644
--- a/source/rpcclient/cmd_srvsvc.c
+++ b/source/rpcclient/cmd_srvsvc.c
@@ -604,6 +604,36 @@ static WERROR cmd_srvsvc_net_name_validate(struct 
rpc_pipe_client *cli,
return result;
 }
 
+static WERROR cmd_srvsvc_net_file_get_sec(struct rpc_pipe_client *cli,
+ TALLOC_CTX *mem_ctx,
+ int argc, const char **argv)
+{
+   WERROR result;
+   NTSTATUS status;
+   struct sec_desc_buf *sd_buf = NULL;
+
+   if (argc  2 || argc  4) {
+   printf(Usage: %s [sharename] [file]\n, argv[0]);
+   return WERR_OK;
+   }
+
+   status = rpccli_srvsvc_NetGetFileSecurity(cli, mem_ctx,
+ cli-cli-desthost,
+ argv[1],
+ argv[2],
+ SECINFO_DACL,
+ sd_buf,
+ result);
+
+   if (!NT_STATUS_IS_OK(status) || !W_ERROR_IS_OK(result)) {
+   goto done;
+   }
+
+   display_sec_desc(sd_buf-sd);
+
+ done:
+   return result;
+}
 
 /* List of commands exported by this module */
 
@@ -619,6 +649,7 @@ struct cmd_set srvsvc_commands[] = {
{ netfileenum, RPC_RTYPE_WERROR, NULL, cmd_srvsvc_net_file_enum,  
PI_SRVSVC, NULL, Enumerate open files,  },
{ netremotetod,RPC_RTYPE_WERROR, NULL, cmd_srvsvc_net_remote_tod, 
PI_SRVSVC, NULL, Fetch remote time of day,  },
{ netnamevalidate, RPC_RTYPE_WERROR, NULL, 
cmd_srvsvc_net_name_validate, PI_SRVSVC, NULL, Validate sharename,  },
+   { netfilegetsec, RPC_RTYPE_WERROR, NULL, cmd_srvsvc_net_file_get_sec, 
PI_SRVSVC, NULL, Get File security,  },
 
{ NULL }
 };


-- 
Samba Shared Repository


[SCM] Samba Shared Repository - branch v3-2-test updated - release-3-2-0pre2-164-g776e210

2008-03-08 Thread Günther Deschner
The branch, v3-2-test has been updated
   via  776e21075b31db605e45f91b6ccefd11412d7773 (commit)
   via  8b016efeb0bb4cd5d91928952a258fce1b6f97d0 (commit)
   via  64a121c147c825259a06a8cd8de85ec31dd5b4a4 (commit)
  from  8c2c17573c179c774d093d780716e95833cb992f (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-2-test


- Log -
commit 776e21075b31db605e45f91b6ccefd11412d7773
Author: Günther Deschner [EMAIL PROTECTED]
Date:   Sat Mar 8 01:02:54 2008 +0100

Remove unused marshalling for SRV_NET_FILE_SET_SECDESC and 
SRV_R_NET_FILE_GET_SECDESC.

Guenther

commit 8b016efeb0bb4cd5d91928952a258fce1b6f97d0
Author: Günther Deschner [EMAIL PROTECTED]
Date:   Sat Mar 8 00:57:52 2008 +0100

Use pidl for _srvsvc_NetGetFileSecurity.

Guenther

commit 64a121c147c825259a06a8cd8de85ec31dd5b4a4
Author: Günther Deschner [EMAIL PROTECTED]
Date:   Sat Mar 8 00:42:40 2008 +0100

Use pidl for _srvsvc_NetSetFileSecurity.

Guenther

---

Summary of changes:
 source/include/rpc_srvsvc.h   |   46 --
 source/rpc_parse/parse_srv.c  |  165 -
 source/rpc_server/srv_srvsvc.c|   46 +--
 source/rpc_server/srv_srvsvc_nt.c |  120 ++-
 4 files changed, 64 insertions(+), 313 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source/include/rpc_srvsvc.h b/source/include/rpc_srvsvc.h
index 3ea55bd..60ad23e 100644
--- a/source/include/rpc_srvsvc.h
+++ b/source/include/rpc_srvsvc.h
@@ -652,50 +652,4 @@ typedef struct {
WERROR status;  
 } SRV_R_NET_FILE_ENUM;
 
-/* SRV_Q_NET_FILE_QUERY_SECDESC */
-typedef struct q_net_file_query_secdesc
-{
-   uint32  ptr_srv_name;
-   UNISTR2 uni_srv_name;
-   uint32  ptr_qual_name;
-   UNISTR2 uni_qual_name;
-   UNISTR2 uni_file_name;
-   uint32  unknown1;
-   uint32  unknown2;
-   uint32  unknown3;
-} SRV_Q_NET_FILE_QUERY_SECDESC;
-
-/* SRV_R_NET_FILE_QUERY_SECDESC */
-typedef struct r_net_file_query_secdesc
-{
-   uint32 ptr_response;
-   uint32 size_response;
-   uint32 ptr_secdesc;
-   uint32 size_secdesc;
-   SEC_DESC *sec_desc;
-   WERROR status;
-} SRV_R_NET_FILE_QUERY_SECDESC;
-
-/* SRV_Q_NET_FILE_SET_SECDESC */
-typedef struct q_net_file_set_secdesc
-{
-   uint32  ptr_srv_name;
-   UNISTR2 uni_srv_name;
-   uint32  ptr_qual_name;
-   UNISTR2 uni_qual_name;
-   UNISTR2 uni_file_name;
-   uint32  sec_info;
-   uint32  size_set;
-   uint32  ptr_secdesc;
-   uint32  size_secdesc;
-   SEC_DESC *sec_desc;
-} SRV_Q_NET_FILE_SET_SECDESC;
-
-/* SRV_R_NET_FILE_SET_SECDESC */
-typedef struct r_net_file_set_secdesc
-{
-   WERROR status;
-} SRV_R_NET_FILE_SET_SECDESC;
-
-
 #endif /* _RPC_SRVSVC_H */
diff --git a/source/rpc_parse/parse_srv.c b/source/rpc_parse/parse_srv.c
index b4cc087..9e42ef6 100644
--- a/source/rpc_parse/parse_srv.c
+++ b/source/rpc_parse/parse_srv.c
@@ -2692,168 +2692,3 @@ bool srv_io_r_net_disk_enum(const char *desc, 
SRV_R_NET_DISK_ENUM *r_n, prs_stru
 
return True;
 }
-
-/***
- Reads or writes a structure.
-/
-
-bool srv_io_q_net_file_query_secdesc(const char *desc, 
SRV_Q_NET_FILE_QUERY_SECDESC *q_n, prs_struct *ps, int depth)
-{
-   if (q_n == NULL)
-   return False;
-
-   prs_debug(ps, depth, desc, srv_io_q_net_file_query_secdesc);
-   depth++;
-
-   if(!prs_align(ps))
-   return False;
-
-   if(!prs_uint32(ptr_srv_name, ps, depth, q_n-ptr_srv_name))
-   return False;
-
-   if(!smb_io_unistr2(, q_n-uni_srv_name, True, ps, depth))
-   return False;
-
-   if(!prs_align(ps))
-   return False;
-
-   if(!prs_uint32(ptr_qual_name, ps, depth, q_n-ptr_qual_name))
-   return False;
-
-   if(!smb_io_unistr2(, q_n-uni_qual_name, True, ps, depth))
-   return False;
-
-   if(!prs_align(ps))
-   return False;
-
-   if(!smb_io_unistr2(, q_n-uni_file_name, True, ps, depth))
-   return False;
-
-   if(!prs_uint32(unknown1, ps, depth, q_n-unknown1))
-   return False;
-
-   if(!prs_uint32(unknown2, ps, depth, q_n-unknown2))
-   return False;
-
-   if(!prs_uint32(unknown3, ps, depth, q_n-unknown3))
-   return False;
-
-   return True;
-}
-
-/***
- Reads or writes a structure.
-/
-
-bool srv_io_r_net_file_query_secdesc(const char *desc, 
SRV_R_NET_FILE_QUERY_SECDESC *r_n, prs_struct *ps, int depth)
-{
-   if (r_n == NULL)
- 

[SCM] Samba Shared Repository - branch v3-2-test updated - release-3-2-0pre2-165-gc240181

2008-03-08 Thread Volker Lendecke
The branch, v3-2-test has been updated
   via  c2401811aa3d02a9e27969687b9ea035407000c3 (commit)
  from  776e21075b31db605e45f91b6ccefd11412d7773 (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-2-test


- Log -
commit c2401811aa3d02a9e27969687b9ea035407000c3
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 8 23:48:12 2008 +0100

Fix Coverity ID 551

Correctly return if we can't create the temporary krb5.conf

Jeremy, please check!

---

Summary of changes:
 source/libads/kerberos.c |2 ++
 1 files changed, 2 insertions(+), 0 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source/libads/kerberos.c b/source/libads/kerberos.c
index b37b9a5..ee25fb5 100644
--- a/source/libads/kerberos.c
+++ b/source/libads/kerberos.c
@@ -894,6 +894,8 @@ bool create_local_private_krb5_conf_for_domain(const char 
*realm,
DEBUG(0,(create_local_private_krb5_conf_for_domain: 
smb_mkstemp failed,
 for file %s. Errno %s\n,
tmpname, strerror(errno) ));
+   TALLOC_FREE(dname);
+   return false;
}
 
if (fchmod(fd, 0644)==-1) {


-- 
Samba Shared Repository


Build status as of Sun Mar 9 00:00:02 2008

2008-03-08 Thread build
URL: http://build.samba.org/

--- /home/build/master/cache/broken_results.txt.old 2008-03-08 
00:00:50.0 +
+++ /home/build/master/cache/broken_results.txt 2008-03-09 00:00:50.0 
+
@@ -1,22 +1,22 @@
-Build status as of Sat Mar  8 00:00:02 2008
+Build status as of Sun Mar  9 00:00:02 2008
 
 Build counts:
 Tree Total  Broken Panic 
 build_farm   0  0  0 
-ccache   30 8  0 
+ccache   29 8  0 
 ctdb 0  0  0 
 distcc   1  0  0 
-ldb  30 30 0 
-libreplace   29 9  0 
-lorikeet-heimdal 23 22 0 
-pidl 17 4  0 
-ppp  10 0  0 
-rsync30 13 0 
+ldb  29 29 0 
+libreplace   28 9  0 
+lorikeet-heimdal 22 21 0 
+pidl 16 4  0 
+ppp  9  0  0 
+rsync29 13 0 
 samba-docs   0  0  0 
-samba-gtk4  4  0 
-samba_3_2_test 29 15 0 
-samba_4_0_test 27 24 1 
-smb-build28 3  0 
-talloc   30 8  0 
-tdb  30 15 0 
+samba-gtk3  3  0 
+samba_3_2_test 28 14 0 
+samba_4_0_test 26 24 0 
+smb-build27 3  0 
+talloc   29 7  0 
+tdb  29 14 0 
 


[SCM] Samba Shared Repository - branch v3-2-stable updated - release-3-2-0pre2-38-gac10927

2008-03-08 Thread Karolin Seeger
The branch, v3-2-stable has been updated
   via  ac10927ca6b480274b15a29962caa9b81b77185a (commit)
   via  1767533ee0ea4d82632d873595cfe2aa4ea4c9b7 (commit)
   via  1c888f1726bcbbf73eb0f039eb16264ebddea39f (commit)
   via  de3f3311631df2002cb19308d5249ddbb8a76e0b (commit)
   via  6c0fbf8bf459bd5c38d9dd907a4211e69288920c (commit)
   via  436d51a64f98ef1a79a82a7a4e3c3aad900f56ef (commit)
  from  1acab453875c2189b685d766e404159b741ebca8 (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-2-stable


- Log -
commit ac10927ca6b480274b15a29962caa9b81b77185a
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 8 22:29:35 2008 +0100

Print out the used seed in smbtorture
(cherry picked from commit 26d64d22d65938023a4e45c3893e7021e51f4d9c)

commit 1767533ee0ea4d82632d873595cfe2aa4ea4c9b7
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 8 22:28:01 2008 +0100

Correctly calculate the max read size
(cherry picked from commit f556c9e162e2bc0d16710e994a00edc33a146cd5)

commit 1c888f1726bcbbf73eb0f039eb16264ebddea39f
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Fri Mar 7 15:03:20 2008 +0100

Move inbuf handling to before the PDU handling

In an error case, correctly discard the offending PDU
(cherry picked from commit 0aa195b5d623e1f26f2a1b9e91323a5ddd3ff282)

commit de3f3311631df2002cb19308d5249ddbb8a76e0b
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sun Mar 2 09:43:19 2008 +0100

Pass specific packets to build_nmb and build_dgram

To me it was not clear what parts of struct packet_struct are actually used 
in
build_packet(). This makes it a bit more clear that only the specific parts 
are
used.
(cherry picked from commit eb8b6f2404e49d6a837935c5b411d78fb6ff23ef)

commit 6c0fbf8bf459bd5c38d9dd907a4211e69288920c
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 1 19:54:17 2008 +0100

Fix some typos
(cherry picked from commit cfa1b838144800c0758969921b8904fd62e46c07)

commit 436d51a64f98ef1a79a82a7a4e3c3aad900f56ef
Author: Volker Lendecke [EMAIL PROTECTED]
Date:   Sat Mar 1 10:22:04 2008 +0100

Build aio_fork by default

... only when --with-aio-support and we can pass file descriptors
(cherry picked from commit fdf4cd99ccb59e126391253d2091707bc8daee43)

---

Summary of changes:
 source/configure.in  |7 +++
 source/libsmb/async_smb.c|  117 +-
 source/libsmb/clireadwrite.c |2 +-
 source/libsmb/nmblib.c   |   10 ++--
 source/libsmb/unexpected.c   |4 +-
 source/smbd/trans2.c |2 +-
 source/torture/torture.c |9 ++-
 7 files changed, 80 insertions(+), 71 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source/configure.in b/source/configure.in
index f481a30..213e897 100644
--- a/source/configure.in
+++ b/source/configure.in
@@ -5313,6 +5313,13 @@ int main() { struct aiocb a; return aio_suspend64(a, 1, 
NULL); }],
   AC_MSG_RESULT(no)
 )
 
+if test x$samba_cv_HAVE_AIO = xyes; then
+   if test x$samba_cv_msghdr_msg_control = xyes -o \
+   x$samba_cv_msghdr_msg_acctright = xyes; then
+   default_shared_modules=$default_shared_modules vfs_aio_fork
+   fi
+fi
+
 #
 # check for sendfile support
 
diff --git a/source/libsmb/async_smb.c b/source/libsmb/async_smb.c
index 21bcd5b..04c22a9 100644
--- a/source/libsmb/async_smb.c
+++ b/source/libsmb/async_smb.c
@@ -174,24 +174,72 @@ static void handle_incoming_pdu(struct cli_state *cli)
 {
struct cli_request *req;
uint16_t mid;
-   size_t raw_pdu_len, buf_len, pdu_len;
-   size_t rest_len;
+   size_t raw_pdu_len, buf_len, pdu_len, rest_len;
+   char *pdu;
NTSTATUS status;
 
/*
 * The encrypted PDU len might differ from the unencrypted one
 */
raw_pdu_len = smb_len(cli-evt_inbuf) + 4;
+   buf_len = talloc_get_size(cli-evt_inbuf);
+   rest_len = buf_len - raw_pdu_len;
+
+   if (buf_len == raw_pdu_len) {
+   /*
+* Optimal case: Exactly one PDU was in the socket buffer
+*/
+   pdu = cli-evt_inbuf;
+   cli-evt_inbuf = NULL;
+   }
+   else {
+   DEBUG(11, (buf_len = %d, raw_pdu_len = %d, splitting 
+  buffer\n, (int)buf_len, (int)raw_pdu_len));
+
+   if (raw_pdu_len  rest_len) {
+   /*
+* The PDU is shorter, talloc_memdup that one.
+*/
+   pdu = (char *)talloc_memdup(
+   cli, cli-evt_inbuf, raw_pdu_len);
+
+   memmove(cli-evt_inbuf, cli-evt_inbuf + raw_pdu_len,
+   buf_len -