1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
Commit Graph

15 Commits

Author SHA1 Message Date
Jelmer Vernooij
6230eb94af Update copies of config.guess and config.sub. 2009-05-16 04:03:12 +02:00
Michael Adam
384c1aaa8e s3:config.sub: clean some space/tab mixup that git complains about
Michael
2009-05-01 01:18:01 +02:00
Michael Adam
f3308b91d7 s3:config.sub: replace old FSF address by the web site url.
Michael
2009-05-01 01:18:00 +02:00
Michael Adam
62a69994f2 s3:config.sub: move to GPLv3
Michael
2009-05-01 01:18:00 +02:00
Michael Adam
f81c02c3f3 s3:update config.sub from gnu.org (2009-04-17)
as requested in bug #6292.

This is taken from
http://git.savannah.gnu.org/gitweb/?p=config.git;a=blob_plain;f=config.sub;hb=HEAD

Michael
2009-05-01 01:17:59 +02:00
Andrew Tridgell
674b835241 r23799: updated old Franklin Street FSF addresses to new URL
(This used to be commit 43cd589773)
2007-10-10 12:28:26 -05:00
Jeremy Allison
2a9b4da0fa r23780: Find and fix more GPL2 -> GPL3.
Jeremy.
(This used to be commit c2f7ab1c17)
2007-10-10 12:28:21 -05:00
Paul Green
e47e121317 r11375: Update to the latest config.guess and config.sub files.
(This used to be commit eee397ea15)
2007-10-10 11:05:14 -05:00
Jeremy Allison
15b61c6d18 r3819: Updated config.guess/config.sub from
ftp://ftp.gnu.org/pub/gnu/config/config.guess
ftp://ftp.gnu.org/pub/gnu/config/config.sub
as requested in bugid #2048.
Jeremy.
(This used to be commit 2201981d69)
2007-10-10 10:53:19 -05:00
Andrew Bartlett
a211fde02b By popular demand: a new config.guess and config.sub
(I hope I did this right)

Andrew Bartlett
(This used to be commit 75d0f4cf19)
2001-12-08 17:37:59 +00:00
Jeremy Allison
75601664bd Updated to latest from gnu.org.
Jeremy.
(This used to be commit 03e1d4428e)
2001-07-03 18:34:41 +00:00
Andrew Tridgell
b9886077a6 latest config.guess and config.sub from gnu.org
(This used to be commit f65166b36e)
2001-05-09 01:29:44 +00:00
Jeremy Allison
d1a672b596 Fix from "Jim McDonough" <jmcd@us.ibm.com> for s390 Linux.
Jeremy.
(This used to be commit 493c31729f)
2001-02-15 00:36:23 +00:00
Jeremy Allison
6259f51dd9 This is a *big* checkin that may break some things, but implements the
new open mechanism Andrew & I discussed.

config.sub:
configure: Included the QNX patch.

include/vfs.h:
smbd/vfs-wrap.c:
smbd/vfs.c: Added ftruncate vfs call (needed).

Note that we will also need locking calls in the vfs (to be added).

lib/util_unistr.c:
nmbd/nmbd_processlogon.c: Fix for NT domain logons causing nmbd to core dump.
                          Also fix for sidsize DOS bug.

locking/locking.c: Check value of ret before using it for memdup.

printing/printing.c: Convert print_fsp_open to return an allocated fsp.

rpc_server/srv_lsa.c: Fix for NT domain logons.

I have removed all use of lp_share_modes() from the code (although I
left the parameter in the table for backwards compatibility). It no longer makes
sense for this to exist.

smbd/close.c: Removed lp_share_modes().
smbd/fileio.c: Fixed parameters to unlock_share_entry call in panic code.
smbd/files.c: Correctly set the unix_ERR_code to ERRnofids on fsp allocation fail.

smbd/nttrans.c:
smbd/reply.c:
smbd/trans2.c: Changed all occurrences of open_file_shared/open_directory/
               open_file_stat to return an fsp from the call.

smbd/open.c: Changed all occurrences of open_file_shared/open_directory/
             open_file_stat to return an fsp from the call.

In addition I have fixed a long standing race condition in the deny mode
processing w.r.t. two smbd's creating a file. Andrew, please note that
your original idea of using open with O_EXCL in this case would not work
(I went over the races very carefully) and so we must re-check deny modes
*after* the open() call returns. This is because there is a race between
the open with O_EXCL and the lock of the share mode entry. Imagine the
case where the first smbd does the open with O_EXCL and a deny mode of DENY_ALL,
but is pre-empted before it locks the share modes and creates the deny
mode entry for DENY_ALL. A second smbd could then come in with O_RDONLY
and a deny mode of DENY_NONE and the two opens would be allowed.

The *only* way to fix this race is to lock the share modes after the
open and then do the deny mode checks *after* this lock in the case
where the file did not originally exist.

This code will need extensive testing but seems to initially work.

Jeremy.
(This used to be commit ab0ecc39d6)
2000-04-22 00:33:16 +00:00
Andrew Tridgell
8d42ee0f2c some merge cleanups
(This used to be commit 1d655b7c64)
1998-07-29 03:15:02 +00:00