Displaying 20 results from an estimated 168 matches for "fsp".
Did you mean:
esp
2004 Feb 17
0
VFS module programmieren
...for all operations.
struct vfs_ops {
struct vfs_fn_pointers {
...
/* File operations */
int (*open)(struct vfs_handle_struct *handle,
struct connection_struct *conn,
const char *fname, int flags, mode_t mode);
int (*close)(struct vfs_handle_struct *handle,
struct files_struct *fsp, int fd);
ssize_t (*read)(struct vfs_handle_struct *handle,
struct files_struct *fsp, int fd, void *data, size_t n);
ssize_t (*write)(struct vfs_handle_struct *handle,
struct files_struct *fsp, int fd,
const void *data, size_t n);
SMB_OFF_T (*lseek)(struct vfs_handle_struct *handle,...
2008 Dec 23
0
[jra@samba.org: Patch to improve Samba write speeds on Linux ext3 with 3.2.x]
...RTIAL=2
+};
+
#endif /* _SMB_H */
diff --git a/source/modules/vfs_default.c b/source/modules/vfs_default.c
index 88c7237..8a724ad 100644
--- a/source/modules/vfs_default.c
+++ b/source/modules/vfs_default.c
@@ -745,10 +745,14 @@ static int vfswrap_ftruncate(vfs_handle_struct *handle, files_struct *fsp, SMB_O
SMB_STRUCT_STAT st;
char c = 0;
SMB_OFF_T currpos;
+ enum smb_strict_allocate_options sa_options = lp_strict_allocate(SNUM(fsp->conn));
START_PROFILE(syscall_ftruncate);
- if (lp_strict_allocate(SNUM(fsp->conn))) {
+ /* Only use allocation truncate if strict allocate
+ *...
2007 Mar 24
2
Subtle bug in do_basename
Hello,
I've been wondering why my no-optimization R-devel builds have been
hanging during "building/updating package indices ...". I tracked it
down with gdb to this line from do_basename in utils.c:
while ( *(p = buf + strlen(buf) - 1) == fsp ) *p = '\0';
Now, imagine if your compiler places the variable fsp immediately before
buf on the stack, and strlen(buf) is 0. Yup, you get an infinite loop
because p will always be assigned the address of fsp. I'm not quite sure
what happens when the stack variables are ordered in a...
2016 Mar 09
0
mkdir-dup test flapping
...ed code
*really* carefully :-). The open code can
be really tricky (as you've already found).
Thanks !
Jeremy.
> The issue appears to be in this call:
>
> 3638 /* Ensure there was no race condition. */
> 3639 if (!check_same_stat(&smb_dname->st, &fsp->fsp_name->st)) {
> 3640 samba_start_debugger();
> 3641 DEBUG(5,("open_directory: stat struct differs for "
> 3642 "directory %s.\n",
> 3643 smb_fname_str_dbg(smb_dname)...
2013 Oct 18
0
[RFC/PATCH 3/3] Wire up MultiFS support.
...return it.
+ * 4) Subsequent accesses to the same disk and partition will get
+ * fs_info from the queue.
+ *
+ * It handles the important stuff to get the MultiFS support working.
+ */
+static struct fs_info *get_fs_info(const char **path)
+{
+ const struct fs_ops **ops;
+ struct fs_info *fsp;
+ struct disk_info diskinfo;
+ struct part_iter *iter = NULL;
+ struct device *dev = NULL;
+ void *private;
+ int blk_shift = -1;
+ uint8_t disk_devno, hdd, partition;
+
+ if (parse_multifs_path(path, &hdd, &partition)) {
+ printf("MultiFS: Syntax invalid: %s\n&qu...
2005 Sep 21
2
locking.tdb: expand_file ftruncate to 8192 failed (Permission denied)
..., real(4019, 0)] smbd/trans2.c:set_delete_on_close(3533)
set_delete_on_close: failed to change delete on close flag for file testspampure~
Turning on more debugging one sees that set_delete_on_close returns
NT_STATUS_ACCESS_DENIED. According to the code in 3.0.20 this is
because lock_share_entry_fsp(fsp) returned False. At the time
locking.tdb is being tried to be expanded and later used for locking,
smbd has already become the user and has no permissions to perform the
tasks.
The (ugly) workarround is to make locking.tdb 0666. I've seen similar
reports in google w/o any resolution. Shoul...
2016 Mar 09
4
mkdir-dup test flapping
...and and wrote
the attached patch.
>
> We got the logs by forcing smbd to run with -d10 by patching
> file_server/fileserver.c.
The issue appears to be in this call:
3638 /* Ensure there was no race condition. */
3639 if (!check_same_stat(&smb_dname->st, &fsp->fsp_name->st)) {
3640 samba_start_debugger();
3641 DEBUG(5,("open_directory: stat struct differs for "
3642 "directory %s.\n",
3643 smb_fname_str_dbg(smb_dname)));
3644...
2002 Mar 01
1
PATCH - smbd/trans2.c to support writing to Unix named pipes(FIFO)
...ns2.c:1603
----------------------------------------------------------------------
call_trans2qfilepathinfo:
----------------------------------------------------------------------
/*
* Original code - this is an open file.
*/
CHECK_FSP(fsp,conn);
fname = fsp->fsp_name;
if (vfs_fstat(fsp,fsp->fd,&sbuf) != 0) {
DEBUG(3,("fstat of fnum %d failed (%s)\n",fsp->fnum,
strerror(errno)));
return(UNIXERROR(ERRDOS,ER...
2003 Sep 05
1
Problem with Win95 + DFS clients (fwd)
Hi,
I've found a problem with samba when printing from a client running win95
+ DFS. The print fails with a segmentation fault. The problem is that
Win95 does not return the proper file_fsp( smb_vwv0) when doing an IOCTL
request.This causes the file_fsp call in reply_ioctl (smbd/reply.c) to
fail cause a segmentation fault.
I do not understand how samba work, but here is my working patch for this. I
just copied the fid from the last open_And_X call and write it into inbuf
if the...
2017 Jan 07
2
frequent core dumps (invalid lock_order?)
...smb_fname=<optimized out>)
at ../source3/modules/vfs_acl_tdb.c:269
#11 0x00007fc58d759802 in smb_full_audit_unlink (handle=0x7fc5a895c2c0,
smb_fname=0x7fc5a896ed90)
at ../source3/modules/vfs_full_audit.c:1333
#12 0x00007fc5a683540c in close_remove_share_mode (close_type=NORMAL_CLOSE,
fsp=0x7fc5a896e3c0)
at ../source3/smbd/close.c:440
#13 close_normal_file (close_type=NORMAL_CLOSE, fsp=0x7fc5a896e3c0,
req=0x7fc5a893e330)
at ../source3/smbd/close.c:747
#14 close_file (req=req at entry=0x7fc5a893e330, fsp=fsp at entry=0x7fc5a896e3c0,
close_type=close_type at entry=NORMAL_C...
2015 Jul 22
13
[PULL 0/8] MultiFS suppport for BIOS and EFI
So last week I was wondering if XFS was still working -- even with its
last on-disk structure changes -- and it _suprisingly_ worked as
expected. Right, now I can finally get rid of GRUB and use Syslinux to
boot my Linux on EFI from a rootfs with xfs. Shit, I have two
partitions (the first one being the required ESP) so there is no way to
access the other partitions since because Syslinux does not
2010 Apr 15
1
FSP UPS not listed as supported, but seems to work... at least a little...
Hi!
Using this guide:
http://blog.shadypixel.com/monitoring-a-ups-with-nut-on-debian-or-ubuntu-linux/
and systematically testing the usb capable driver on your site I managed
to get my FSP EP650 (by http://www.fspgroupusa.com/ ) working (after
reboot). Im running Ubuntu 9.10 desktop x64 standard install.
This is the output from running "upsc ups1"
-----
battery.voltage: 13.50
battery.voltage.nominal: 12.0
beeper.status: enabled
driver.name: blazer_usb
driver.parameter.pol...
1999 Jul 02
1
preexec: return code not used? (PR#18576)
T.D.Lee@durham.ac.uk wrote:
>
>
> But we'd like to go one step further and have the return code from preexec
> be used to continue or abort the connection being established. The script
> above would be modified to generate this return code.
>
> Looking through the source code (smbd/service.c), it doesn't seem to check
> the return code (calling smbrun to do the
2016 Aug 29
1
Issue with acl_xattr:ignore system acls in 4.5rc2
...ndex 2163a75..870e6da 100644
--- a/source3/modules/vfs_acl_common.c
+++ b/source3/modules/vfs_acl_common.c
@@ -625,7 +625,7 @@ static NTSTATUS validate_nt_acl_blob(TALLOC_CTX *mem_ctx,
vfs_handle_struct *handle,
files_struct *fsp,
const struct smb_filename *smb_fname,
- DATA_BLOB *blob,
+ const DATA_BLOB *blob,
struct security_descriptor **ppsd,...
2020 Jun 19
0
HCL <FSP> <Champ Tower 1k> supported by <blazer_usb>
Hi everybody,
following UPS is successfuly tested.
Model: FSP Champ Tower 1k
https://www.fsp-europe.com/CS/champ-tower-series-1k2k3k/
lsusb:
Bus 002 Device 004: ID 0665:5161 Cypress Semiconductor USB to Serial
ups.conf:
[powerpal]
driver = blazer_usb
port = /dev/hidraw0
Mode = standalone
Distro = CentOS 8
What I did to get UPS communicate....
2016 Aug 27
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 04:03:49PM -0700, Jeremy Allison wrote:
> On Fri, Aug 26, 2016 at 02:46:19PM -0700, Jeremy Allison via samba wrote:
> > On Fri, Aug 26, 2016 at 06:44:05PM +0200, Ralph Böhme wrote:
> > >
> > > Cheerio!
> > > -slow
> >
> > Still reviewing this - but a few things that will need changing:
> >
> > When adding the
2003 Apr 04
2
2.2.1a / 2.2.2 bug is back in 2.2.8
Hello,
Back when 2.2.2 was the current samba release I came across the following problem when deleting folders in Windows 2000 which I'll repost again below. After I finally got his attention with a few very wordy messages to the samba mailing list, Jeremy fixed it blazingly fast and wrote me back:
"I just found the problem and fixed it in 2.2 CVS and HEAD CVS. It was
to do with the
2012 May 28
1
FSP EP 850 doesn't work
Hi all,
I've bought UPS FSP EP 850 because I have similar UPS, FSP EP 1000. It
is working on my other server with with Fedora 14, kernel
2.6.35.14-106.fc14.x86_64 and installed nut-2.6.2-1. My new UPS is
detected by kernel (see below lsusb output) and is partially detected by
blazer_usb driver also. But it doesn't com...
2017 Jan 07
0
frequent core dumps (invalid lock_order?)
...t;)
> at ../source3/modules/vfs_acl_tdb.c:269
> #11 0x00007fc58d759802 in smb_full_audit_unlink
> (handle=0x7fc5a895c2c0, smb_fname=0x7fc5a896ed90)
> at ../source3/modules/vfs_full_audit.c:1333
> #12 0x00007fc5a683540c in close_remove_share_mode
> (close_type=NORMAL_CLOSE, fsp=0x7fc5a896e3c0)
> at ../source3/smbd/close.c:440
> #13 close_normal_file (close_type=NORMAL_CLOSE, fsp=0x7fc5a896e3c0,
> req=0x7fc5a893e330)
> at ../source3/smbd/close.c:747
> #14 close_file (req=req at entry=0x7fc5a893e330,
> fsp=fsp at entry=0x7fc5a896e3c0,
> close_ty...
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
...ruct security_descriptor *psd_fs = NULL;
> const struct smb_filename *smb_fname = NULL;
> bool ignore_file_system_acl = lp_parm_bool(SNUM(handle->conn),
> ACL_MODULE_NAME,
> @@ -618,13 +618,13 @@ static NTSTATUS get_nt_acl_internal(vfs_handle_struct *handle,
> fsp,
> HASH_SECURITY_INFO,
> mem_ctx,
> - &pdesc_next);
> + &psd_fs);
> } else {
> status = SMB_VFS_NEXT_GET_NT_ACL(handle,
> smb_fname,
> HASH_SECURITY_INFO,
> mem_ctx,
> - &pdesc_nex...