summaryrefslogtreecommitdiffstats
path: root/python/samba/netcmd/ldapcmp.py
diff options
context:
space:
mode:
authorJeremy Allison <jra@samba.org>2014-05-01 11:01:03 -0700
committerJeremy Allison <jra@samba.org>2014-05-02 21:27:07 +0200
commit580eb9424c5a9645c44b933e2ef144301af035cb (patch)
treec3b389c7952ccb256c86a045a512b73dee06d5c5 /python/samba/netcmd/ldapcmp.py
parentbed323cebcfcf3298002ea8bc2eb6787419043b6 (diff)
downloadsamba-580eb9424c5a9645c44b933e2ef144301af035cb.tar.gz
samba-580eb9424c5a9645c44b933e2ef144301af035cb.tar.xz
samba-580eb9424c5a9645c44b933e2ef144301af035cb.zip
s3: smbd : Ensure file_new doesn't call into smbXsrv_open_create() for INTERNAL_OPEN_ONLY.
This causes deadlocks which cause smbd to crash if the locking database has already been locked for a compound operation we need to be atomic (as in the file rename case). Ensure INTERNAL_OPEN_ONLY opens are synonymous with req==NULL. INTERNAL_OPEN_ONLY opens leave a NO_OPLOCK record in the share mode database, so they can be detected by other processes for share mode violation purposes (because they're doing an operation on the file that may include reads or writes they need to have real state inside the locking database) but have an fnum of FNUM_FIELD_INVALID and a local share_file_id of zero, as they will never be seen on the wire. Ensure validate_my_share_entries() ignores INTERNAL_OPEN_ONLY records (share_file_id == 0). Bug 10564 - Lock order violation and file lost https://bugzilla.samba.org/show_bug.cgi?id=10564 Signed-off-by: Jeremy Allison <jra@samba.org> Signed-off-by: Volker Lendecke <vl@samba.org>
Diffstat (limited to 'python/samba/netcmd/ldapcmp.py')
0 files changed, 0 insertions, 0 deletions