Displaying 15 results from an estimated 15 matches for "smb_struct_stat".
2011 Apr 03
1
Scannedonly: Unable to compile on Samba v3.5.8 [scannedonly.so] Error 1
...nction ?scannedonly_allow_access?:
vfs_scannedonly.c:414: error: ?SMB_VFS_NEXT_STAT? undeclared (first use
in this function)
vfs_scannedonly.c:414: error: (Each undeclared identifier is reported
only once
vfs_scannedonly.c:414: error: for each function it appears in.)
vfs_scannedonly.c:423: error: ?SMB_STRUCT_STAT? has no member named
?st_mode?
vfs_scannedonly.c:424: error: ?SMB_STRUCT_STAT? has no member named
?st_mode?
vfs_scannedonly.c:430: error: ?SMB_STRUCT_STAT? has no member named
?st_mode?
vfs_scannedonly.c:432: error: ?SMB_STRUCT_STAT? has no member named
?st_size?
vfs_scannedonly.c:441:54: error: m...
2005 Mar 23
1
Problems with Excel & MS Word files (still)
Problem is apparently with locking issues, disabled oplocks in the [general]
section, and the problem actually got worse...
Here's what happens:
User-A part of group1, opens Excel file off of share, saves, exits...
User-B (or even User-A for that matter) tries to re-open same file, get
error stating it's locked and can only open for read-only access...
Both users in the same group, and
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
...rame, psd_fs);
> + psd_blob = psd_fs;
> }
>
> - if (psd_blob != pdesc_next) {
> + if (psd_blob != psd_fs) {
> /* We're returning the blob, throw
> * away the filesystem SD. */
> - TALLOC_FREE(pdesc_next);
> + TALLOC_FREE(psd_fs);
> } else {
> SMB_STRUCT_STAT sbuf;
> SMB_STRUCT_STAT *psbuf = &sbuf;
> @@ -760,7 +760,7 @@ static NTSTATUS get_nt_acl_internal(vfs_handle_struct *handle,
> is_directory = S_ISDIR(psbuf->st_ex_mode);
>
> if (ignore_file_system_acl) {
> - TALLOC_FREE(pdesc_next);
> + TALLOC_FREE(psd_fs)...
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 06:33:26PM +0200, Ralph Böhme via samba wrote:
> On Thu, Aug 25, 2016 at 12:14:00PM -0700, Jeremy Allison wrote:
> > On Wed, Aug 24, 2016 at 04:06:42PM +0200, Ralph Böhme via samba wrote:
> > >
> > > Yeah, as much as I'd like to avoid adding a new option, I guess we
> > > have to do something about it, my latest take on this is
>
2008 Dec 23
0
[jra@samba.org: Patch to improve Samba write speeds on Linux ext3 with 3.2.x]
...#endif /* _SMB_H */
diff --git a/source/modules/vfs_default.c b/source/modules/vfs_default.c
index 88c7237..8a724ad 100644
--- a/source/modules/vfs_default.c
+++ b/source/modules/vfs_default.c
@@ -745,10 +745,14 @@ static int vfswrap_ftruncate(vfs_handle_struct *handle, files_struct *fsp, SMB_O
SMB_STRUCT_STAT st;
char c = 0;
SMB_OFF_T currpos;
+ enum smb_strict_allocate_options sa_options = lp_strict_allocate(SNUM(fsp->conn));
START_PROFILE(syscall_ftruncate);
- if (lp_strict_allocate(SNUM(fsp->conn))) {
+ /* Only use allocation truncate if strict allocate
+ * is set "on", no...
2009 Mar 25
2
Dotfiles with multiple dots not marked as hidden
I have "hide dot files" on, but I have noticed that while files with a
single dot are hidden, files with multiple dots are not:
".foo" - hidden
"...foo" - not hidden
Is this by design? *nix certainly hide such files by default...
-- Barry
--
http://barrkel.blogspot.com/
2016 Aug 29
1
Issue with acl_xattr:ignore system acls in 4.5rc2
...rame, psd_fs);
> + psd_blob = psd_fs;
> }
>
> - if (psd_blob != pdesc_next) {
> + if (psd_blob != psd_fs) {
> /* We're returning the blob, throw
> * away the filesystem SD. */
> - TALLOC_FREE(pdesc_next);
> + TALLOC_FREE(psd_fs);
> } else {
> SMB_STRUCT_STAT sbuf;
> SMB_STRUCT_STAT *psbuf = &sbuf;
> @@ -760,7 +760,7 @@ static NTSTATUS get_nt_acl_internal(vfs_handle_struct *handle,
> is_directory = S_ISDIR(psbuf->st_ex_mode);
>
> if (ignore_file_system_acl) {
> - TALLOC_FREE(pdesc_next);
> + TALLOC_FREE(psd_fs)...
2016 Aug 27
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 04:03:49PM -0700, Jeremy Allison wrote:
> On Fri, Aug 26, 2016 at 02:46:19PM -0700, Jeremy Allison via samba wrote:
> > On Fri, Aug 26, 2016 at 06:44:05PM +0200, Ralph Böhme wrote:
> > >
> > > Cheerio!
> > > -slow
> >
> > Still reviewing this - but a few things that will need changing:
> >
> > When adding the
1999 Jul 02
1
preexec: return code not used? (PR#18576)
T.D.Lee@durham.ac.uk wrote:
>
>
> But we'd like to go one step further and have the return code from preexec
> be used to continue or abort the connection being established. The script
> above would be modified to generate this return code.
>
> Looking through the source code (smbd/service.c), it doesn't seem to check
> the return code (calling smbrun to do the
2000 Aug 21
3
2.0.7: inherit permissions = yes breaks setting read-only on files
Hi,
While testing the upgrade from 2.0.6 to 2.0.7 I found some kind of
misbehaviour of inherit permissions.
It was already known that the SGID bit on directories is only useable
with "inherit permissions = yes". Most of my shares depend heavily on
this (unix) feature.
Today I found out I cannot change a file attribute to read-only from NT
while "inherit permissions" is set
2005 Mar 21
3
File copying under WIN98
with the Samba3.0.12 release i encountered the following problem :
when i try to copy a file from a samba share to the local disk then the
process hangs with the windows-message
"Preparing to copy" (my translation from the german message).
In a WIN98-DOS-Windows the copy command hangs too, but the file is created.
The copying from my WIN-XP HOME works.
My previous installed version
2002 Aug 13
2
AW: Unable to open configuration file "/etc/smb.conf" (or whereve r i specify)
...the read returns 0 instead of 1243 (strace).
This code is not verry complex but I really can't see how this can fail...
May be your filesystem is broken. Can you "strace cat /etc/samba/smb.conf"
and compare the open fstat and read calls?
char *fd_load(int fd, size_t *size)
{
SMB_STRUCT_STAT sbuf;
char *p;
if (sys_fstat(fd, &sbuf) != 0) return NULL;
p = (char *)malloc(sbuf.st_size+1);
if (!p) return NULL;
if (read(fd, p, sbuf.st_size) != sbuf.st_size) {
SAFE_FREE(p);
return NULL;
}
p[sbuf.st_...
2007 Feb 05
0
[SAMBA-SECURITY] CVE-2007-0452: Potential DoS against smbd in Samba 3.0.6 - 3.0.23d
...*************************************************/
-NTSTATUS can_delete(connection_struct *conn, char *fname, uint32 dirtype, BOOL bad_path, BOOL check_is_at_open)
+NTSTATUS can_delete(connection_struct *conn, char *fname, uint32 dirtype, BOOL bad_path, BOOL check_is_at_open, BOOL can_defer)
{
SMB_STRUCT_STAT sbuf;
uint32 fattr;
@@ -1938,7 +1938,7 @@
FILE_OPEN,
0,
FILE_ATTRIBUTE_NORMAL,
- 0,
+ can_defer ? 0 : INTERNAL_OPEN_ONLY,
NULL);
if (!fsp) {
@@ -1960,7 +1960,7 @@
code.
****************************************************************************/
-NTSTATU...
2007 Feb 05
0
[SAMBA-SECURITY] CVE-2007-0452: Potential DoS against smbd in Samba 3.0.6 - 3.0.23d
...*************************************************/
-NTSTATUS can_delete(connection_struct *conn, char *fname, uint32 dirtype, BOOL bad_path, BOOL check_is_at_open)
+NTSTATUS can_delete(connection_struct *conn, char *fname, uint32 dirtype, BOOL bad_path, BOOL check_is_at_open, BOOL can_defer)
{
SMB_STRUCT_STAT sbuf;
uint32 fattr;
@@ -1938,7 +1938,7 @@
FILE_OPEN,
0,
FILE_ATTRIBUTE_NORMAL,
- 0,
+ can_defer ? 0 : INTERNAL_OPEN_ONLY,
NULL);
if (!fsp) {
@@ -1960,7 +1960,7 @@
code.
****************************************************************************/
-NTSTATU...
2000 May 22
1
Inherit Permissions addition
...orced group settings.
+ * Hence, the 'inherit permissions' option should be used
+ * on a share-by-share basis and not as a global setting.
+ */
+
+ inheritnewgid = 0;
+ if(lp_inherit_perms(SNUM(conn)))
+ {
+ pstring path;
+ SMB_STRUCT_STAT sbuf;
+
+ DEBUG(3, ("connectpath (%s), dirpath (%s)\n", conn->connectpath, conn->dirpath));
+
+ safe_strcpy(path, conn->connectpath, sizeof(path));
+ if(*(conn->dirpath) != '\0')
+ {
+ safe_s...