Age | Commit message (Collapse) | Author | Files | Lines |
|
Reviewed by: Garrett D'Amore <garrett@damore.org>
Reviewed by: Albert Lee <alee@racktopsystems.com>
Reviewed by: Matt Barden <mbarden@tintri.com>
Approved by: Dan McDonald <danmcd@mnx.io>
|
|
Reviewed by: Matt Barden <mbarden@tintri.com>
Reviewed by: Garrett D'Amore <gdamore@damore.org>
Reviewed by: Andy Stormont <astormont@racktopsystems.com>
Reviewed-by: Jim Johnson <jjohnson@racktopsystems.com>
Approved by: Garrett D'Amore <gdamore@damore.org>
|
|
Reviewed by: Prashanth Badari <prbadari@tintri.com>
Reviewed by: Gordon Ross <gordon.w.ross@gmail.com>
Approved by: Patrick Mooney <pmooney@pfmooney.com>
|
|
Reviewed by: Toomas Soome <tsoome@me.com>
Reviewed by: Robert Mustacchi <rm@fingolfin.org>
Reviewed by: Peter Tribble <peter.tribble@gmail.com>
Reviewed by: Andy Fiddaman <andy@omnios.org>
Approved by: Dan McDonald <danmcd@joyent.com>
|
|
Reviewed by: Joyce McIntosh <jmcintosh@tintri.com>
Reviewed by: Evan Layton <elayton@tintri.com>
Reviewed by: Gordon Ross <gordon.ross@tintri.com>
Reviewed by: Prashanth Badari <prbadari@tintri.com>
Reviewed by: Andy Fiddaman <andy@omnios.org>
Reviewed by: C Fraire <cfraire@me.com>
Approved by: Robert Mustacchi <rm@fingolfin.org>
|
|
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Andrew Stormont <astormont@racktopsystems.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Reviewed by: Andrew Stormont <astormont@racktopsystems.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Albert Lee <alee@racktopsystems.com>
Reviewed by: Garrett D'Amore <gdamore@racktopsystems.com>
Reviewed by: Vitaliy Gusev <vgusev@racktopsystems.com>
Reviewed by: Toomas Soome <tsoome@me.com>
Reviewed by: Gordon Ross <gwr@nexenta.com>
Approved by: Gordon Ross <gwr@nexenta.com>
|
|
smb_getdataset for default mount points
Reviewed by: Sanjay Nadkarni <sanjay.nadkarni@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Jean McCormack <jean.mccormack@nexenta.com>
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Garrett D'Amore <garrett@damore.org>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com>
Reviewed by: Joyce McIntosh <joyce.mcintosh@nexenta.com>
Reviewed by: Jason King <jason.king@joyent.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
share to offline
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Rob Gittins <rob.gittins@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Joyce McIntosh <joyce.mcintosh@nexenta.com>
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com>
Approved by: Richard Lowe <richlowe@richlowe.net>
|
|
Reviewed by: Dan Fields <dan.fields@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Yuri Pankov <yuripv@yuripv.net>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Alek Pinchuk <alek@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Sanjay Nadkarni <sanjay.nadkarni@nexent.com>
Reviewed by: Saso Kiselkov <saso.kiselkov@nexenta.com>
Reviewed by: Rick McNeal <rick.mcneal@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Rick McNeal <rick.mcneal@nexenta.com>
Reviewed by: Saso Kiselkov <saso.kiselkov@nexenta.com>
Reviewed by: Joyce McIntosh <joyce.mcintosh@nexenta.com>
Approved by: Joshua M. Clulow <josh@sysmgr.org>
|
|
Reviewed by: Jason King <jason.king@joyent.com>
Reviewed by: Peter Tribble <peter.tribble@gmail.com>
Reviewed by: Frederik Wessels <wessels147@gmail.com>
Approved by: Dan McDonald <danmcd@joyent.com>
|
|
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Garrett D'Amore <garrett@damore.org>
Approved by: Dan McDonald <danmcd@joyent.com>
|
|
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
Reviewed by: Toomas Soome <tsoome@me.com>
Approved by: Richard Lowe <richlowe@richlowe.net>
|
|
Reviewed by: Matt Ahrens <mahrens@delphix.com>
Reviewed by: Prakash Surya <prakash.surya@delphix.com>
Reviewed by: Steve Gonczi <steve.gonczi@delphix.com>
Reviewed by: Chris Williamson <chris.williamson@delphix.com>
Reviewed by: George Wilson <george.wilson@delphix.com>
Reviewed by: Igor Kozhukhov <igor@dilos.org>
Reviewed by: Dan McDonald <danmcd@omniti.com>
Reviewed by: Robert Mustacchi <rm@joyent.com>
Approved by: Richard Lowe <richlowe@richlowe.net>
|
|
Portions contributed by: Alek Pinchuk <alek@nexenta.com>
Portions contributed by: Kevin Crowe <kevin.crowe@nexenta.com>
Portions contributed by: Matt Barden <Matt.Barden@nexenta.com>
Reviewed by: Alek Pinchuk <alek@nexenta.com>
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Dan Fields <dan.fields@nexenta.com>
Reviewed by: Daniel Borek <daniel.borek@nexenta.com>
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Yuri Pankov <Yuri.Pankov@nexenta.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Portions contributed by: Matt Barden <Matt.Barden@nexenta.com>
Portions contributed by: Kevin Crowe <kevin.crowe@nexenta.com>
Portions contributed by: Alek Pinchuk <alek@nexenta.com>
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Alek Pinchuk <alek.pinchuk@nexenta.com>
Reviewed by: Rick McNeal <rick.mcneal@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Tony Nguyen <tony.nguyen@nexenta.com>
Approved by: Robert Mustacchi <rm@joyent.com>
|
|
Portions contributed by: Matt Barden <Matt.Barden@nexenta.com>
Portions contributed by: Kevin Crowe <kevin.crowe@nexenta.com>
Portions contributed by: Alek Pinchuk <alek@nexenta.com>
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Dan Fields <dan.fields@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
Approved by: Robert Mustacchi <rm@joyent.com>
|
|
Reviewed by: Alek Pinchuk <alek@nexenta.com>
Reviewed by: Andy Stormont <astormont@racktopsystems.com>
Reviewed by: Dan McDonald <danmcd@omniti.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Alek Pinchuk <alek.pinchuk@nexenta.com>
Reviewed by: Andy Stormont <astormont@racktopsystems.com>
Reviewed by: Dan McDonald <danmcd@omniti.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Gordon Ross <gwr@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Dan McDonald <danmcd@omniti.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Saso Kiselkov <saso.kiselkov@nexenta.com>
Reviewed by: Andy Stormont <astormont@racktopsystems.com>
Reviewed by: Dan McDonald <danmcd@omniti.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
Reviewed by: Dan McDonald <danmcd@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Thomas Keiser <thomas.keiser@nexenta.com>
Reviewed by: Igor Kozhukhov <ikozhukhov@gmail.com>
Approved by: Robert Mustacchi <rm@joyent.com>
|
|
Authored by: Thomas Keiser <thomas.keiser@nexenta.com>
Authored by: Albert Lee <trisk@nexenta.com>
Reviewed by: Igor Kozhukhov <ikozhukhov@gmail.com>
Reviewed by: Richard Lowe <richlowe@richlowe.net>
Reviewed by: Albert Lee <trisk@omniti.com>
Approved by: Dan McDonald <danmcd@omniti.com>
|
|
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Dan McDonald <danmcd@nexenta.com>
Reviewed by: Thomas Keiser <thomas.keiser@nexenta.com>
Reviewed by: Matthew Ahrens <mahrens@delphix.com>
Approved by: Robert Mustacchi <rm@joyent.com>
|
|
Reviewed by: Gordon Ross <gwr@nexenta.com>
Reviewed by: Marcel Telka <marcel.telka@nexenta.com>
Reviewed by: Dan McDonald <danmcd@nexenta.com>
Reviewed by: Albert Lee <trisk@nexenta.com>
Approved by: Robert Mustacchi <rm@joyent.com>
|
|
Reviewed by: Garrett D'Amore <garrett@damore.org>
Reviewed by: Richard Lowe <richlowe@richlowe.net>
Approved by: Richard Lowe <richlowe@richlowe.net>
|
|
Reviewed by: Bill Pijewski <wdp@joyent.com>
Reviewed by: Jason King <jason.brian.king@gmail.com>
Approved by: Garrett D'Amore <garrett@damore.org>
|
|
1554 SMB has no concept of IPv6 host access lists
1592 NFS access checks shouldn't fail if client address can't be resolved
Reviewed by: Gordon Ross <gordon.w.ross@gmail.com>
Reviewed by: Dan McDonald <danmcd@nexenta.com>
Approved by: Richard Lowe <richlowe@richlowe.net>
|
|
Reviewed by: Albert Lee <trisk@nexenta.com>
Reviewed by: Garrett D'Amore <garrett@nexenta.com>
Reviewed by: Robert Gordon <rbg@openrbg.com>
Approved by: Garrett D'Amore <garrett@nexenta.com>
|
|
Reviewed by: Albert Lee <trisk@nexenta.com>
Reviewed by: Garrett D'Amore <garrett@nexenta.com>
Reviewed by: Richard Lowe <richlowe@richlowe.net>
Approved by: Richard Lowe <richlowe@richlowe.net>
|
|
6971047 smbd hang during FVT regression test
6711195 Sparc:Get error "Windows Explorer has stopped working" once click on Details fr Properties on Vista
PSARC/2009/464 Offline attribute
6972515 Offline attribute - PSARC 2009/464
PSARC/2010/037 Windows Sparse Attribute
6972519 Windows Sparse Attribute - PSARC 2010/037
6719444 [CLI] - idmap help's output is not consistent with man pages's
6975449 idmap test suite needs idmap_cache_get_data() from libidmap
6974351 OpenSSL still taking smbd down
--HG--
rename : usr/src/lib/libidmap/common/idmap_priv.h => usr/src/cmd/idmap/idmap/namemaps.h
|
|
6970986 Level II oplocks - smb_oplock_grant_t shouldn't be dynamically allocated
6971031 Unable add ACL on the share which has only the default owner tab by ZFS
6971899 OpenSSL not MT-safe and takes down smbd
6936762 libidmap should transparently handle interruption in connection to idmapd
6954902 mapping to unknown type does not use directory-based mapping information
--HG--
rename : usr/src/lib/libidmap/common/idmap_priv.h => usr/src/cmd/idmap/idmap/namemaps.h
|
|
6958322 Should allow setting and returning target priority info for DFS root target
6955030 assertion failed in thread_join() from smb_server_delete()
6950891 No "no matching rule" trace point for pid->sid
6957520 Sparc - System panics when running smbstat
6950103 Failed to open group database due to too many open files
6961197 SAMR requests failed due to context mismatch
6960835 Need to pass the share type to smbsrv
6952831 SMB level II oplocks
6955337 "Found in AD" tracepoint bogus for U->W with directory-based mapping
6960038 CIFS file ownership problem
6915527 libidmap should not export memdup()
6960283 Windows client dir /R option not listing NTFS named stream
6808472 SMB name space caching on clients
6966183 SMB/CIFS print service CUPS support
6966490 Validation support for NetrDfsSetInfo method, level 105
6962887 Restore kstats for SMB commands
6969600 ::smblist -r[v] crashed mdb
6968451 panic: smbsrv:smb_odir_open
6957572 Cifs server panics at ffffff000c895ad0 smbsrv:smb_user_delete+82 () with smbtorture test.
--HG--
rename : usr/src/lib/libidmap/common/idmap_priv.h => usr/src/cmd/idmap/idmap/namemaps.h
rename : usr/src/lib/libidmap/common/miscutils.c => usr/src/lib/libuutil/common/uu_string.c
|
|
--HG--
rename : usr/src/cmd/sgs/libelf/common/mapfile-common => usr/src/cmd/sgs/libelf/common/mapfile-vers
rename : usr/src/cmd/sgs/link_audit/i386/mapfile-vers-bindings => usr/src/cmd/sgs/link_audit/common/mapfile-vers-bindings
rename : usr/src/cmd/sgs/link_audit/i386/mapfile-vers-perfcnt => usr/src/cmd/sgs/link_audit/common/mapfile-vers-perfcnt
rename : usr/src/cmd/sgs/link_audit/i386/mapfile-vers-symbindrep => usr/src/cmd/sgs/link_audit/common/mapfile-vers-symbindrep
rename : usr/src/cmd/sgs/link_audit/i386/mapfile-vers-truss => usr/src/cmd/sgs/link_audit/common/mapfile-vers-truss
rename : usr/src/cmd/sgs/link_audit/i386/mapfile-vers-who => usr/src/cmd/sgs/link_audit/common/mapfile-vers-who
rename : usr/src/common/mapfiles/i386/map.noexdata => usr/src/common/mapfiles/common/map.noexdata
rename : usr/src/lib/libaio/sparc/mapfile-vers => usr/src/lib/libaio/common/mapfile-vers
rename : usr/src/lib/libelfsign/common/mapfile.map => usr/src/lib/libelfsign/common/mapfile-vers
rename : usr/src/lib/libpthread/sparc/mapfile-vers => usr/src/lib/libpthread/common/mapfile-vers
rename : usr/src/lib/librt/amd64/mapfile-vers => usr/src/lib/librt/common/mapfile-vers
rename : usr/src/lib/libsys/sparc/mapfile-vers => usr/src/lib/libsys/common/mapfile-vers
rename : usr/src/lib/libthread/sparc/mapfile-vers => usr/src/lib/libthread/common/mapfile-vers
|
|
PSARC 2010/120 SMB/CIFS Statistics
6893904 The statistics of the CIFS server must be improved
6947373 only calculate pathname for query fileinfo levels which require it
PSARC 2010/097 idmap: default unresolvable SID mapping to true
6864900 Enable unresolvable SID mapping by default
6923504 Need detailed tracing for idmap mapping requests
6928157 Need detailed tracing for idmap discovery operations
6949333 Panic in smb_pre_open_print_file
6795069 Commonize error codes between CIFS client and server
6941787 Spurious message "DC discovery failed" upon refresh
6941349 Update shortname support to remove name83 format
6941382 smbsrv should use smb_node_getpath functions instead of vnodetopath
6939494 smb_authenticate() doesn't check for smb_user_login() return
6944226 Need to keep the list of shares in smbsrv
6942697 open file lock count is incorrect on MMC
6941227 On addition of SMB local group, add corresponding POSIX group
6948109 Add ability to manage shares in ZFS group via Windows MMC
6948143 Add ability to set additional properties on Autohome shares
6903260 two "ID type" enumerations
6946940 smb_sid_tostr/fromstr input arguments should be const
6949088 CIFS continuously refresh when one of the interfaces won't properly initialize
6946075 Filebench IO errors when signing property enabled on Solaris CIFS Server
6951169 idmap reports "no such file or directory" when looking up krb5.conf, even when not a domain member
6813063 degraded operation message should occur only when appropriate
6644872 idmapd is too whiny in workgroup mode
6813268 idmapd bangs on DNS server when in workgroup mode
6883800 Trusted domain members won't map to a UID when the trust is one-way
6891704 Cross-forest trust discovery may not work in multi-domain forest
6933937 idmapd doesn't map out trusted domains properly when joined to a domain that isn't the forest root.
6923908 smbadm join CLI doesn't always report Kerberos change password failure
6926930 smbsrv libraries should use krb5_get_error_messsage()
6943528 Unable to update Windows 2008 dynamic dns record with cifs hostname > 15 characters.
6953259 Can't map remote-forest users when IDMU is enabled
6953688 Should allow only one standalone DFS namespace in a cluster system
6952292 smb_find_ads_server() deferences string one too many times
6950070 Share is not getting correct access based on host access control list
6950820 Host-based access control list does not work properly with ipv6_enable=true
--HG--
rename : usr/src/lib/libidmap/common/idmap_priv.h => usr/src/cmd/idmap/idmap/namemaps.h
rename : usr/src/lib/smbsrv/libsmb/common/smb_nicmon.c => usr/src/cmd/smbsrv/smbd/smbd_nicmon.c
rename : usr/src/lib/smbsrv/libmlsvc/common/eventlog_syslog.c => usr/src/lib/smbsrv/libmlsvc/common/eventlog_log.c
rename : usr/src/common/smbsrv/smb_status_xlat.c => usr/src/lib/smbsrv/libsmb/common/smb_status_tbl.c
rename : usr/src/uts/common/smbsrv/doserror.h => usr/src/uts/common/smb/doserror.h
rename : usr/src/uts/common/smbsrv/lmerr.h => usr/src/uts/common/smb/lmerr.h
rename : usr/src/uts/common/smbsrv/nterror.h => usr/src/uts/common/smb/nterror.h
rename : usr/src/uts/common/smbsrv/ntstatus.h => usr/src/uts/common/smb/ntstatus.h
|
|
6875358 NDR support for Serialization Types
6811350 Autohome wildcard rule fails with mixed case (or upper case) user name
6932967 Add local group manipulation functions to SAMR service
6801203 libidmap should not link with bunch of libraries
6928764 Diagnostic noise on "idmap get-namemap" and "idmap set-namemap"
6885923 idmapd loops infinitely, leaking memory
6936722 Sparc : Unable to destroy zpool, sharemgr locks up.
6937163 smbd door operations should initialize XDR decode data
6937814 Memory corruption while running stress test
6913525 smb_ads_decode_host_ip doesn't step over IPv6 address
6939430 queryfileinfo should only use vnodetopath for directory nodes
6938318 Unable to save files with Save As
--HG--
rename : usr/src/lib/libidmap/common/namemaps.c => usr/src/cmd/idmap/idmap/namemaps.c
rename : usr/src/lib/libidmap/common/idmap_priv.h => usr/src/cmd/idmap/idmap/namemaps.h
|
|
PSARC/2010/052 idmap flush
6711751 SMB/CIFS Distributed File System (DFS)
6650858 cache flush sub-command could be useful
6916379 share modes should be checked for directories as well as files
6906874 Automatic primary group mapping based on user mapping
6879236 No error report when ad-container refers to nonexistent container
6919087 Intermittent smbd crash during share access
6853811 Kerberized applications fail even after a successful domain join via smbadm
6907640 Current algorithm of anonymous authentication is not correct
6888813 SMB/CIFS support for ZFS user and group quotas
6921142 Guest issues with idmap rule and with workgroup mode
6924843 smb_sam_lookup_sid() leaks memory
6919600 Unable to delete ACE from ACL on a share
6915463 smb_nic interface needs LOG_ERR syslog entries and proper return codes
6926137 WritePrinter requires multi-fragment NDR RPC support
6926211 smbd could report clock skew
6925697 Quota usage does not decrease after deleting files from Mac Snow Leopard 10.6
6849962 smbadm show cannot display all groups with error 'cannot obtain a SID'
6926265 SMB watch tree change notification
6811424 must restart smb/server when idmapd restarts
6927745 Consolidate file system query/set information handlers
6924281 SMB_WRITE_RAW_COM doesn't work.
6925618 idmap show -v gets type of UNIX ID wrong in "Rule" output
6807651 rule changes do not flush cache
6928550 libsmbrdr doesn't cleanup stale sessions
6861058 MMC: Error message printed on log entries
6817392 smbd will not exit
6931027 core file due to NULL zpool handle in zfs_open()
--HG--
rename : usr/src/common/smbsrv/smb_common_door_decode.c => usr/src/common/smbsrv/smb_door_legacy.c
rename : usr/src/common/smbsrv/smb_xdr_utils.c => usr/src/common/smbsrv/smb_xdr.c
rename : usr/src/lib/smbsrv/libmlsvc/common/mlsvc_wkssvc.c => usr/src/lib/smbsrv/libmlsvc/common/wkssvc_svc.c
rename : usr/src/uts/common/fs/smbsrv/smb_trans2_query_fs_information.c => usr/src/uts/common/fs/smbsrv/smb_fsinfo.c
rename : usr/src/uts/common/fs/smbsrv/smb_kdoor_clnt.c => usr/src/uts/common/fs/smbsrv/smb_kdoor.c
rename : usr/src/uts/common/fs/smbsrv/smb_util.c => usr/src/uts/common/fs/smbsrv/smb_kutil.c
rename : usr/src/uts/common/smbsrv/smb_common_door.h => usr/src/uts/common/smbsrv/smb_door.h
|