[PATCH] Avoid a segfault in TLS socket code in Samba4

Andrew Bartlett abartlet at samba.org
Tue Aug 4 23:11:14 MDT 2009


Metze,

See the attached patch, reverting your recent work in source4/lib/tls.  

I'm sure you can come up with a way to avoid the segfault and avoid
talloc_reference(), but in the meantime, can you or I apply this?

Thanks,

Andrew Bartlett
-- 
Andrew Bartlett
http://samba.org/~abartlet/
Authentication Developer, Samba Team           http://samba.org
Samba Developer, Cisco Inc.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-s4-tls-take-a-reference-to-the-event-context-again-i.patch
Type: text/x-patch
Size: 3265 bytes
Desc: not available
URL: <http://lists.samba.org/pipermail/samba-technical/attachments/20090805/0bb0dd64/attachment.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://lists.samba.org/pipermail/samba-technical/attachments/20090805/0bb0dd64/attachment.pgp>


More information about the samba-technical mailing list