The branch, master has been updated
       via  5a33e906f651ea84ec909fd6453e13a9489bd391 (commit)
       via  8315677ca3ca9eed62fe6e24bac333b9b5dc763b (commit)
       via  7a35506bb87fd784a4a7a5b81c2d2ab5c32b233b (commit)
       via  8637dd12325369e0056d77924cac577a67f2a0ab (commit)
       via  807ad174b288e4c3d36ed02e5ef02cd7a848ce0e (commit)
       via  52958ea115ab3d1d8cebaad47b5ffff7fc86a4cd (commit)
       via  5e2956557b06b5b55dc8810b51bdbcf3e7f03c98 (commit)
       via  87d4138d095bd6554ded80a94fb706bb754ae4c6 (commit)
      from  8d4aaefd86915309cf0674afecfad8e923e80522 (commit)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 5a33e906f651ea84ec909fd6453e13a9489bd391
Author: Volker Lendecke <[EMAIL PROTECTED]>
Date:   Fri Nov 7 21:02:11 2008 +0100

    Make "construct_reply_common" static

commit 8315677ca3ca9eed62fe6e24bac333b9b5dc763b
Author: Volker Lendecke <[EMAIL PROTECTED]>
Date:   Fri Nov 7 20:38:05 2008 +0100

    Do not write into inbuf for the transs request
    
    Instead, fix up the outbuf in send_xx_reply. In those routines, we know
    what we are returning.

commit 7a35506bb87fd784a4a7a5b81c2d2ab5c32b233b
Author: Volker Lendecke <[EMAIL PROTECTED]>
Date:   Fri Nov 7 12:29:24 2008 +0100

    Remove direct inbuf refs from send_trans_reply

commit 8637dd12325369e0056d77924cac577a67f2a0ab
Author: Volker Lendecke <[EMAIL PROTECTED]>
Date:   Thu Nov 6 20:16:04 2008 +0100

    change CHECK_READ to use smb_request instead of inbuf

commit 807ad174b288e4c3d36ed02e5ef02cd7a848ce0e
Author: Volker Lendecke <[EMAIL PROTECTED]>
Date:   Thu Nov 6 12:14:08 2008 +0100

    Remove a direct inbuf reference from reply_nttrans()

commit 52958ea115ab3d1d8cebaad47b5ffff7fc86a4cd
Author: Volker Lendecke <[EMAIL PROTECTED]>
Date:   Wed Nov 5 19:19:17 2008 +0100

    Remove a direct inbuf reference (should have been removed with 8987641d...)

commit 5e2956557b06b5b55dc8810b51bdbcf3e7f03c98
Author: Volker Lendecke <[EMAIL PROTECTED]>
Date:   Wed Nov 5 19:16:06 2008 +0100

    Remove the change to the user context in process_blocking_lock_queue()

commit 87d4138d095bd6554ded80a94fb706bb754ae4c6
Author: Volker Lendecke <[EMAIL PROTECTED]>
Date:   Tue Nov 4 22:04:58 2008 +0100

    Converting notify.c to store a request, not an inbuf

-----------------------------------------------------------------------

Summary of changes:
 source3/include/proto.h      |    5 +-
 source3/include/smb_macros.h |    4 +-
 source3/smbd/aio.c           |    2 +-
 source3/smbd/blocking.c      |   85 ++++------------------------------------
 source3/smbd/ipc.c           |   90 ++++++++++++++++++++++--------------------
 source3/smbd/notify.c        |   83 +++++++++++++-------------------------
 source3/smbd/nttrans.c       |   17 ++++----
 source3/smbd/process.c       |    4 +-
 source3/smbd/reply.c         |    6 +-
 source3/smbd/trans2.c        |   12 +++---
 10 files changed, 108 insertions(+), 200 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source3/include/proto.h b/source3/include/proto.h
index 482027e..5f9203a 100644
--- a/source3/include/proto.h
+++ b/source3/include/proto.h
@@ -7973,11 +7973,11 @@ void reply_negprot(struct smb_request *req);
 /* The following definitions come from smbd/notify.c  */
 
 void change_notify_reply(connection_struct *conn,
-                       const uint8 *request_buf, uint32 max_param,
+                        struct smb_request *req, uint32 max_param,
                         struct notify_change_buf *notify_buf);
 NTSTATUS change_notify_create(struct files_struct *fsp, uint32 filter,
                              bool recursive);
-NTSTATUS change_notify_add_request(const struct smb_request *req,
+NTSTATUS change_notify_add_request(struct smb_request *req,
                                uint32 max_param,
                                uint32 filter, bool recursive,
                                struct files_struct *fsp);
@@ -8233,7 +8233,6 @@ void reply_outbuf(struct smb_request *req, uint8 
num_words, uint32 num_bytes);
 const char *smb_fn_name(int type);
 void add_to_common_flags2(uint32 v);
 void remove_from_common_flags2(uint32 v);
-void construct_reply_common(const char *inbuf, char *outbuf);
 void construct_reply_common_req(struct smb_request *req, char *outbuf);
 void chain_reply(struct smb_request *req);
 void check_reload(time_t t);
diff --git a/source3/include/smb_macros.h b/source3/include/smb_macros.h
index 46ca236..119ceeb 100644
--- a/source3/include/smb_macros.h
+++ b/source3/include/smb_macros.h
@@ -52,8 +52,8 @@
                                return ERROR_NT(NT_STATUS_INVALID_HANDLE); \
                        } while(0)
 
-#define CHECK_READ(fsp,inbuf) (((fsp)->fh->fd != -1) && ((fsp)->can_read || \
-                       ((SVAL((inbuf),smb_flg2) & FLAGS2_READ_PERMIT_EXECUTE) 
&& \
+#define CHECK_READ(fsp,req) (((fsp)->fh->fd != -1) && ((fsp)->can_read || \
+                       ((req->flags2 & FLAGS2_READ_PERMIT_EXECUTE) && \
                         (fsp->access_mask & FILE_EXECUTE))))
 
 #define CHECK_WRITE(fsp) ((fsp)->can_write && ((fsp)->fh->fd != -1))
diff --git a/source3/smbd/aio.c b/source3/smbd/aio.c
index fd553c3..8beed07 100644
--- a/source3/smbd/aio.c
+++ b/source3/smbd/aio.c
@@ -506,7 +506,7 @@ static int handle_aio_write_complete(struct aio_extra 
*aio_ex)
                ERROR_BOTH(map_nt_error_from_unix(ret), ERRHRD, ERRdiskfull);
                srv_set_message(outbuf,0,0,true);
         } else {
-               bool write_through = BITSETW(aio_ex->req->inbuf+smb_vwv7,0);
+               bool write_through = BITSETW(aio_ex->req->vwv+7,0);
                NTSTATUS status;
 
                SSVAL(outbuf,smb_vwv2,nwritten);
diff --git a/source3/smbd/blocking.c b/source3/smbd/blocking.c
index 555033b..2237a89 100644
--- a/source3/smbd/blocking.c
+++ b/source3/smbd/blocking.c
@@ -505,7 +505,6 @@ static bool process_trans2(blocking_lock_record *blr)
 
        /* We finally got the lock, return success. */
 
-       SCVAL(blr->req->inbuf, smb_com, SMBtrans2);
        SSVAL(params,0,0);
        /* Fake up max_data_bytes here - we know it fits. */
        send_trans2_replies(blr->fsp->conn, blr->req, params, 2, NULL, 0, 
0xffff);
@@ -666,86 +665,18 @@ static void process_blocking_lock_queue(void)
         */
 
        for (blr = blocking_lock_queue; blr; blr = next) {
-               connection_struct *conn = NULL;
-               uint16 vuid;
-               files_struct *fsp = NULL;
 
                next = blr->next;
 
                /*
-                * Ensure we don't have any old chain_fsp values
-                * sitting around....
-                */
-               chain_size = 0;
-               fsp = blr->fsp;
-
-               conn = conn_find(blr->req->tid);
-               vuid = (lp_security() == SEC_SHARE)
-                       ? UID_FIELD_INVALID : blr->req->vuid;
-
-               DEBUG(5,("process_blocking_lock_queue: examining pending lock 
fnum = %d for file %s\n",
-                       fsp->fnum, fsp->fsp_name ));
-
-               if(!change_to_user(conn,vuid)) {
-                       struct byte_range_lock *br_lck = 
brl_get_locks(talloc_tos(), fsp);
-
-                       /*
-                        * Remove the entry and return an error to the client.
-                        */
-
-                       if (br_lck) {
-                               brl_lock_cancel(br_lck,
-                                       blr->lock_pid,
-                                       procid_self(),
-                                       blr->offset,
-                                       blr->count,
-                                       blr->lock_flav);
-                               TALLOC_FREE(br_lck);
-                       }
-
-                       DEBUG(0,("process_blocking_lock_queue: Unable to become 
user vuid=%d.\n",
-                               vuid ));
-                       blocking_lock_reply_error(blr,NT_STATUS_ACCESS_DENIED);
-                       DLIST_REMOVE(blocking_lock_queue, blr);
-                       TALLOC_FREE(blr);
-                       recalc_timeout = True;
-                       continue;
-               }
-
-               
if(!set_current_service(conn,SVAL(blr->req->inbuf,smb_flg),True)) {
-                       struct byte_range_lock *br_lck = 
brl_get_locks(talloc_tos(), fsp);
-
-                       /*
-                        * Remove the entry and return an error to the client.
-                        */
-
-                       if (br_lck) {
-                               brl_lock_cancel(br_lck,
-                                       blr->lock_pid,
-                                       procid_self(),
-                                       blr->offset,
-                                       blr->count,
-                                       blr->lock_flav);
-                               TALLOC_FREE(br_lck);
-                       }
-
-                       DEBUG(0,("process_blocking_lock_queue: Unable to become 
service Error was %s.\n", strerror(errno) ));
-                       blocking_lock_reply_error(blr,NT_STATUS_ACCESS_DENIED);
-                       DLIST_REMOVE(blocking_lock_queue, blr);
-                       TALLOC_FREE(blr);
-                       recalc_timeout = True;
-                       change_to_root_user();
-                       continue;
-               }
-
-               /*
                 * Go through the remaining locks and try and obtain them.
                 * The call returns True if all locks were obtained successfully
                 * and False if we still need to wait.
                 */
 
                if(blocking_lock_record_process(blr)) {
-                       struct byte_range_lock *br_lck = 
brl_get_locks(talloc_tos(), fsp);
+                       struct byte_range_lock *br_lck = brl_get_locks(
+                               talloc_tos(), blr->fsp);
 
                        if (br_lck) {
                                brl_lock_cancel(br_lck,
@@ -760,19 +691,17 @@ static void process_blocking_lock_queue(void)
                        DLIST_REMOVE(blocking_lock_queue, blr);
                        TALLOC_FREE(blr);
                        recalc_timeout = True;
-                       change_to_root_user();
                        continue;
                }
 
-               change_to_root_user();
-
                /*
                 * We couldn't get the locks for this record on the list.
                 * If the time has expired, return a lock error.
                 */
 
                if (!timeval_is_zero(&blr->expire_time) && 
timeval_compare(&blr->expire_time, &tv_curr) <= 0) {
-                       struct byte_range_lock *br_lck = 
brl_get_locks(talloc_tos(), fsp);
+                       struct byte_range_lock *br_lck = brl_get_locks(
+                               talloc_tos(), blr->fsp);
 
                        /*
                         * Lock expired - throw away all previously
@@ -780,8 +709,10 @@ static void process_blocking_lock_queue(void)
                         */
 
                        if (br_lck) {
-                               DEBUG(5,("process_blocking_lock_queue: pending 
lock fnum = %d for file %s timed out.\n",
-                                       fsp->fnum, fsp->fsp_name ));
+                               DEBUG(5,("process_blocking_lock_queue: "
+                                        "pending lock fnum = %d for file %s "
+                                        "timed out.\n", blr->fsp->fnum,
+                                        blr->fsp->fsp_name ));
 
                                brl_lock_cancel(br_lck,
                                        blr->lock_pid,
diff --git a/source3/smbd/ipc.c b/source3/smbd/ipc.c
index b9460e5..26a4212 100644
--- a/source3/smbd/ipc.c
+++ b/source3/smbd/ipc.c
@@ -91,7 +91,6 @@ void send_trans_reply(connection_struct *conn,
        int tot_data_sent = 0;
        int tot_param_sent = 0;
        int align;
-       char *outbuf;
 
        int ldata  = rdata  ? rdata_len : 0;
        int lparam = rparam ? rparam_len : 0;
@@ -104,38 +103,43 @@ void send_trans_reply(connection_struct *conn,
 
        align = ((this_lparam)%4);
 
-       if (!create_outbuf(talloc_tos(), (char *)req->inbuf, &outbuf,
-                          10, 1+align+this_ldata+this_lparam)) {
-               smb_panic("could not allocate outbuf");
-       }
+       reply_outbuf(req, 10, 1+align+this_ldata+this_lparam);
+
+       /*
+        * We might have SMBtranss in req which was transferred to the outbuf,
+        * fix that.
+        */
+       SCVAL(req->outbuf, smb_com, SMBtrans);
 
-       copy_trans_params_and_data(outbuf, align,
+       copy_trans_params_and_data((char *)req->outbuf, align,
                                rparam, tot_param_sent, this_lparam,
                                rdata, tot_data_sent, this_ldata);
 
-       SSVAL(outbuf,smb_vwv0,lparam);
-       SSVAL(outbuf,smb_vwv1,ldata);
-       SSVAL(outbuf,smb_vwv3,this_lparam);
-       SSVAL(outbuf,smb_vwv4,smb_offset(smb_buf(outbuf)+1,outbuf));
-       SSVAL(outbuf,smb_vwv5,0);
-       SSVAL(outbuf,smb_vwv6,this_ldata);
-       SSVAL(outbuf,smb_vwv7,smb_offset(smb_buf(outbuf)+1+this_lparam+align,
-                                        outbuf));
-       SSVAL(outbuf,smb_vwv8,0);
-       SSVAL(outbuf,smb_vwv9,0);
+       SSVAL(req->outbuf,smb_vwv0,lparam);
+       SSVAL(req->outbuf,smb_vwv1,ldata);
+       SSVAL(req->outbuf,smb_vwv3,this_lparam);
+       SSVAL(req->outbuf,smb_vwv4,
+             smb_offset(smb_buf(req->outbuf)+1, req->outbuf));
+       SSVAL(req->outbuf,smb_vwv5,0);
+       SSVAL(req->outbuf,smb_vwv6,this_ldata);
+       SSVAL(req->outbuf,smb_vwv7,
+             smb_offset(smb_buf(req->outbuf)+1+this_lparam+align,
+                        req->outbuf));
+       SSVAL(req->outbuf,smb_vwv8,0);
+       SSVAL(req->outbuf,smb_vwv9,0);
 
        if (buffer_too_large) {
-               error_packet_set((char *)outbuf, ERRDOS, ERRmoredata,
+               error_packet_set((char *)req->outbuf, ERRDOS, ERRmoredata,
                                 STATUS_BUFFER_OVERFLOW, __LINE__, __FILE__);
        }
 
-       show_msg(outbuf);
-       if (!srv_send_smb(smbd_server_fd(), (char *)outbuf,
+       show_msg((char *)req->outbuf);
+       if (!srv_send_smb(smbd_server_fd(), (char *)req->outbuf,
                          IS_CONN_ENCRYPTED(conn))) {
                exit_server_cleanly("send_trans_reply: srv_send_smb failed.");
        }
 
-       TALLOC_FREE(outbuf);
+       TALLOC_FREE(req->outbuf);
 
        tot_data_sent = this_ldata;
        tot_param_sent = this_lparam;
@@ -155,39 +159,45 @@ void send_trans_reply(connection_struct *conn,
 
                align = (this_lparam%4);
 
-               if (!create_outbuf(talloc_tos(), (char *)req->inbuf, &outbuf,
-                                  10, 1+align+this_ldata+this_lparam)) {
-                       smb_panic("could not allocate outbuf");
-               }
+               reply_outbuf(req, 10, 1+align+this_ldata+this_lparam);
+
+               /*
+                * We might have SMBtranss in req which was transferred to the
+                * outbuf, fix that.
+                */
+               SCVAL(req->outbuf, smb_com, SMBtrans);
 
-               copy_trans_params_and_data(outbuf, align,
+               copy_trans_params_and_data((char *)req->outbuf, align,
                                           rparam, tot_param_sent, this_lparam,
                                           rdata, tot_data_sent, this_ldata);
 
-               SSVAL(outbuf,smb_vwv3,this_lparam);
-               SSVAL(outbuf,smb_vwv4,smb_offset(smb_buf(outbuf)+1,outbuf));
-               SSVAL(outbuf,smb_vwv5,tot_param_sent);
-               SSVAL(outbuf,smb_vwv6,this_ldata);
-               SSVAL(outbuf,smb_vwv7,
-                     smb_offset(smb_buf(outbuf)+1+this_lparam+align, outbuf));
-               SSVAL(outbuf,smb_vwv8,tot_data_sent);
-               SSVAL(outbuf,smb_vwv9,0);
+               SSVAL(req->outbuf,smb_vwv3,this_lparam);
+               SSVAL(req->outbuf,smb_vwv4,
+                     smb_offset(smb_buf(req->outbuf)+1,req->outbuf));
+               SSVAL(req->outbuf,smb_vwv5,tot_param_sent);
+               SSVAL(req->outbuf,smb_vwv6,this_ldata);
+               SSVAL(req->outbuf,smb_vwv7,
+                     smb_offset(smb_buf(req->outbuf)+1+this_lparam+align,
+                                req->outbuf));
+               SSVAL(req->outbuf,smb_vwv8,tot_data_sent);
+               SSVAL(req->outbuf,smb_vwv9,0);
 
                if (buffer_too_large) {
-                       error_packet_set(outbuf, ERRDOS, ERRmoredata,
+                       error_packet_set((char *)req->outbuf,
+                                        ERRDOS, ERRmoredata,
                                         STATUS_BUFFER_OVERFLOW,
                                         __LINE__, __FILE__);
                }
 
-               show_msg(outbuf);
-               if (!srv_send_smb(smbd_server_fd(), outbuf,
+               show_msg((char *)req->outbuf);
+               if (!srv_send_smb(smbd_server_fd(), (char *)req->outbuf,
                                  IS_CONN_ENCRYPTED(conn)))
                        exit_server_cleanly("send_trans_reply: srv_send_smb "
                                            "failed.");
 
                tot_data_sent  += this_ldata;
                tot_param_sent += this_lparam;
-               TALLOC_FREE(outbuf);
+               TALLOC_FREE(req->outbuf);
        }
 }
 
@@ -776,12 +786,6 @@ void reply_transs(struct smb_request *req)
                return;
        }
 
-        /*
-        * construct_reply_common will copy smb_com from inbuf to
-        * outbuf. SMBtranss is wrong here.
-         */
-        SCVAL(req->inbuf,smb_com,SMBtrans);
-
        handle_trans(conn, req, state);
 
        DLIST_REMOVE(conn->pending_trans, state);
diff --git a/source3/smbd/notify.c b/source3/smbd/notify.c
index b2d0f20..5a51765 100644
--- a/source3/smbd/notify.c
+++ b/source3/smbd/notify.c
@@ -24,7 +24,7 @@
 struct notify_change_request {
        struct notify_change_request *prev, *next;
        struct files_struct *fsp;       /* backpointer for cancel by mid */
-       uint8 request_buf[smb_size];
+       struct smb_request *req;
        uint32 filter;
        uint32 max_param;
        struct notify_mid_map *mid_map;
@@ -133,40 +133,33 @@ static bool notify_marshall_changes(int num_changes,
 *****************************************************************************/
 
 static void change_notify_reply_packet(connection_struct *conn,
-                               const uint8 *request_buf,
+                                      struct smb_request *req,
                                       NTSTATUS error_code)
 {
-       char outbuf[smb_size+38];
+       reply_outbuf(req, 18, 0);
 
-       memset(outbuf, '\0', sizeof(outbuf));
-       construct_reply_common((char *)request_buf, outbuf);
-
-       ERROR_NT(error_code);
-
-       /*
-        * Seems NT needs a transact command with an error code
-        * in it. This is a longer packet than a simple error.
-        */
-       srv_set_message(outbuf,18,0,False);
+       if (!NT_STATUS_IS_OK(error_code)) {
+               error_packet_set((char *)req->outbuf, 0, 0, error_code,
+                                __LINE__,__FILE__);
+       }
 
-       show_msg(outbuf);
-       if (!srv_send_smb(smbd_server_fd(),
-                       outbuf,
-                       IS_CONN_ENCRYPTED(conn)))
+       show_msg((char *)req->outbuf);
+       if (!srv_send_smb(smbd_server_fd(), (char *)req->outbuf,
+                         req->encrypted)) {
                exit_server_cleanly("change_notify_reply_packet: srv_send_smb "
                                    "failed.");
+       }
+       TALLOC_FREE(req->outbuf);
 }
 
 void change_notify_reply(connection_struct *conn,
-                       const uint8 *request_buf, uint32 max_param,
+                        struct smb_request *req, uint32 max_param,
                         struct notify_change_buf *notify_buf)
 {
        prs_struct ps;
-       struct smb_request *req = NULL;
-       uint8 tmp_request[smb_size];
 
        if (notify_buf->num_changes == -1) {
-               change_notify_reply_packet(conn, request_buf, NT_STATUS_OK);
+               change_notify_reply_packet(conn, req, NT_STATUS_OK);
                notify_buf->num_changes = 0;
                return;
        }
@@ -179,32 +172,14 @@ void change_notify_reply(connection_struct *conn,
                 * We exceed what the client is willing to accept. Send
                 * nothing.
                 */
-               change_notify_reply_packet(conn, request_buf, NT_STATUS_OK);
-               goto done;
-       }
-
-       if (!(req = talloc(talloc_tos(), struct smb_request))) {
-               change_notify_reply_packet(conn, request_buf, 
NT_STATUS_NO_MEMORY);
+               change_notify_reply_packet(conn, req, NT_STATUS_OK);
                goto done;
        }
 
-       memcpy(tmp_request, request_buf, smb_size);
-
-       /*
-        * We're only interested in the header fields here
-        */
-
-       smb_setlen((char *)tmp_request, smb_size);
-       SCVAL(tmp_request, smb_wct, 0);
-
-       init_smb_request(req, tmp_request,0, conn->encrypted_tid);
-       req->inbuf = tmp_request;
-
        send_nt_replies(conn, req, NT_STATUS_OK, prs_data_p(&ps),
                        prs_offset(&ps), NULL, 0);
 
  done:
-       TALLOC_FREE(req);
        prs_mem_free(&ps);
 
        TALLOC_FREE(notify_buf->changes);
@@ -252,7 +227,7 @@ NTSTATUS change_notify_create(struct files_struct *fsp, 
uint32 filter,
        return status;
 }
 
-NTSTATUS change_notify_add_request(const struct smb_request *req,
+NTSTATUS change_notify_add_request(struct smb_request *req,
                                uint32 max_param,
                                uint32 filter, bool recursive,
                                struct files_struct *fsp)
@@ -263,16 +238,16 @@ NTSTATUS change_notify_add_request(const struct 
smb_request *req,
        DEBUG(10, ("change_notify_add_request: Adding request for %s: "
                   "max_param = %d\n", fsp->fsp_name, (int)max_param));
 
-       if (!(request = SMB_MALLOC_P(struct notify_change_request))
-           || !(map = SMB_MALLOC_P(struct notify_mid_map))) {
-               SAFE_FREE(request);
+       if (!(request = talloc(NULL, struct notify_change_request))
+           || !(map = talloc(request, struct notify_mid_map))) {
+               TALLOC_FREE(request);
                return NT_STATUS_NO_MEMORY;
        }
 
        request->mid_map = map;
        map->req = request;
 
-       memcpy(request->request_buf, req->inbuf, sizeof(request->request_buf));
+       request->req = talloc_move(request, &req);
        request->max_param = max_param;
        request->filter = filter;
        request->fsp = fsp;
@@ -281,11 +256,11 @@ NTSTATUS change_notify_add_request(const struct 
smb_request *req,
        DLIST_ADD_END(fsp->notify->requests, request,
                      struct notify_change_request *);
 
-       map->mid = SVAL(req->inbuf, smb_mid);
+       map->mid = request->req->mid;
        DLIST_ADD(notify_changes_by_mid, map);
 
        /* Push the MID of this packet on the signing queue. */
-       srv_defer_sign_response(SVAL(req->inbuf,smb_mid));
+       srv_defer_sign_response(request->req->mid);
 
        return NT_STATUS_OK;
 }
@@ -315,9 +290,7 @@ static void change_notify_remove_request(struct 
notify_change_request *remove_re
 
        DLIST_REMOVE(fsp->notify->requests, req);
        DLIST_REMOVE(notify_changes_by_mid, req->mid_map);
-       SAFE_FREE(req->mid_map);
-       TALLOC_FREE(req->backend_data);
-       SAFE_FREE(req);
+       TALLOC_FREE(req);
 }
 
 /****************************************************************************
@@ -338,8 +311,8 @@ void remove_pending_change_notify_requests_by_mid(uint16 
mid)
                return;
        }


-- 
Samba Shared Repository

Reply via email to