summaryrefslogtreecommitdiff
path: root/source3/smbd/nttrans.c
AgeCommit message (Collapse)AuthorFilesLines
2010-11-03s3: Align nttrans replies the same way Windows does itVolker Lendecke1-1/+1
If you look at traces of "smbcacls" reading a secdesc from Samba and from W2k3 shows this difference in the querysecdesc nttrans reply. This patch is necessary to enable viewing previous versions via the shadow copy modules from Windows 2008. The other client versions seem not to care, but W2k8 does. Signed-off-by: Michael Adam <obnox@samba.org> Autobuild-User: Volker Lendecke <vlendec@samba.org> Autobuild-Date: Wed Nov 3 17:04:28 UTC 2010 on sn-devel-104
2010-10-21Add code to implement SeSecurityPrivilege in net rpc rights, and in theJeremy Allison1-0/+10
open and get/set NT security descriptor code. Jeremy. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Thu Oct 21 00:15:57 UTC 2010 on sn-devel-104
2010-10-12libcli/security Provide a common, top level libcli/security/security.hAndrew Bartlett1-0/+1
This will reduce the noise from merges of the rest of the libcli/security code, without this commit changing what code is actually used. This includes (along with other security headers) dom_sid.h and security_token.h Andrew Bartlett Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Tue Oct 12 05:54:10 UTC 2010 on sn-devel-104
2010-10-11Canonicalize incoming and outgoing ACLs.Jeremy Allison1-4/+55
Jeremy.
2010-10-01s3:smbd: Increase unsupported IOCTL debug message to 2Steven Danneman1-2/+4
Even printing once per connection, level 0 was too spammy with Windows clients frequently sending FSCTL_GET_OBJECT_ID which is unsupported.
2010-09-15Fix all sid_parse returns to be checked. Tidy up some checks and errorJeremy Allison1-5/+12
messages. Jeremy.
2010-09-16s3-smbd: prevent call_nt_transact_ioctl() crash in FSCTL_FIND_FILES_BY_SID case.Günther Deschner1-1/+4
Jeremy, please check. Guenther
2010-09-15Add check for invalid data size.Jeremy Allison1-1/+8
Jeremy.
2010-09-09More paranoia to ensure SD's can't be set on read-only shares.Jeremy Allison1-0/+4
Jeremy.
2010-09-08Don't rely on the underlying ACL modules to enforce share levelJeremy Allison1-0/+5
security when setting ACLs, check at the call level as well. Jeremy.
2010-08-26s3-build: only include "fake_file.h" where needed.Günther Deschner1-0/+1
Guenther
2010-08-24s3: Make srv_send_smb take an sconn instead of a sock fdVolker Lendecke1-2/+2
2010-08-16s3: Remove smbd_server_fd from send_nt_repliesVolker Lendecke1-2/+2
2010-06-13s3: Remove fsp_belongs_connVolker Lendecke1-4/+4
check_open_fsp does exactly the same
2010-06-12s3: Explicitly pass sconn to remove_pending_lock_requests_by_mid_smb1Volker Lendecke1-1/+1
2010-06-12s3: Explicitly pass sconn to the remove_pending_change_notify_request_by_midVolker Lendecke1-1/+1
2010-06-12s3: change_notify_reply() does not need its "conn" argumentVolker Lendecke1-1/+1
2010-06-12s3: Remove smbd_server_conn from reply_ntcancelVolker Lendecke1-1/+1
2010-06-12s3: Remove smbd_server_conn from send_nt_repliesVolker Lendecke1-1/+1
2010-06-03s3-security: use shared SECINFO_DACL define.Günther Deschner1-1/+1
Guenther
2010-06-03s3-security: use shared SECINFO_SACL define.Günther Deschner1-1/+1
Guenther
2010-06-03s3-security: use shared SECINFO_GROUP define.Günther Deschner1-1/+1
Guenther
2010-06-03s3-security: use shared SECINFO_OWNER define.Günther Deschner1-1/+1
Guenther
2010-05-31s3-build: only use ndr_security.h where needed.Günther Deschner1-0/+1
Guenther
2010-05-21s3:dom_sid Global replace of DOM_SID with struct dom_sidAndrew Bartlett1-3/+3
This matches the structure that new code is being written to, and removes one more of the old-style named structures, and the need to know that is is just an alias for struct dom_sid. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-05-18Implement missing info level SMB_FILE_LINK_INFORMATION.Jeremy Allison1-0/+2
Fix bug #7435 - SMB2 hardlink fails (invalid level). Found at the Microsoft plugsharing plugfest. Jeremy.
2010-05-18s3-secdesc: remove "typedef struct security_descriptor SEC_DESC".Günther Deschner1-3/+3
Guenther
2010-05-18s3-build: fix the build.Günther Deschner1-1/+1
Guenther
2010-05-18s3: Remove use of iconv_convenience.Jelmer Vernooij1-1/+1
2010-04-29Carefully label SMB1-specific locking calls.Jeremy Allison1-1/+1
Jeremy.
2010-04-28Connect set security descriptor into SMB2 code.Jeremy Allison1-2/+2
Jeremy.
2010-04-26Plumb in get_nt_acl into SMB2.Jeremy Allison1-40/+91
Jeremy.
2010-04-12Move to using 64-bit mid values in our internal open file database.Jeremy Allison1-1/+2
This will allow us to share logic much easier between SMB1 and SMB2 servers. Jeremy
2010-04-07s3: add comment about what the FSCTL_QUERY_ALLOCATED_RANGES currently doesBjörn Jacke1-0/+6
2010-04-05Add FSCTL_QUERY_ALLOCATED_RANGES to the list of Windows ioctls we support.Jeremy Allison1-0/+52
Based on a patch reported and tested by Ira Cooper <samba@ira.wakeful.net>. Jeremy.
2010-03-30Second part of fix for bug #6494 - Incorrect FileStatus returned in ↵Jeremy Allison1-1/+19
NT_CREATE_ANDX. Ensure we do this in nttrans create too. Jeremy.
2010-03-05Fix for bug #7189 - Open txt files with notepad on samba shares creates problem.Jeremy Allison1-0/+4
Ensure we don't use any of the create_options for Samba private use. Add a new parameter to the VFS_CREATE call (private_flags) which is only used internally. Renumber NTCREATEX_OPTIONS_PRIVATE_DENY_DOS and NTCREATEX_OPTIONS_PRIVATE_DENY_FCB to match the S4 code). Rev. the VFS interface to version 28. Jeremy.
2009-12-21Remove all calls to reply_doserror - turn them intoJeremy Allison1-42/+42
correct reply_nterror calls. Next rename reply_doserror -> reply_force_doserror and plumb in when NT_STATUS_DOS is used. Jeremy.
2009-12-17Vector correctly through reply_openerror() (which uses the same logic).Jeremy Allison1-6/+1
Jeremy.
2009-11-24Fix make test. Only do POSIX case conversion if FILE_FLAG_POSIX_SEMANTICS ↵Jeremy Allison1-8/+12
set. Doh ! Jeremy.
2009-11-23Restore NtCreateX case handling with FILE_FLAG_POSIX_SEMANTICS to the wayJeremy Allison1-5/+68
it worked in 3.3.x and 3.2.x. UCF_POSIX_PATHNAMES may no longer be needed, as lp_posix_pathnames() being set isn't the same as case handling from NtCreateX (lp_posix_pathnames() changes the STAT calls to LSTAT, not the case semantics). Jeremy.
2009-11-23Proper fix for #6898 - Samba duplicates file content on appending. Pointed ↵Jeremy Allison1-12/+18
out by Volker.Restores the pathname handling for FILE_FLAG_POSIX_SEMANTICS but still prevents the O_APPEND problems. Jeremy.
2009-11-23Fix bug #6898 - Samba duplicates file content on appendingJeremy Allison1-0/+10
Clients using a Windows open call should not be able to set FILE_FLAG_POSIX_SEMANTICS in an open. Jeremy.
2009-11-23Revert "s3: Move the global variable Protocol to struct smbd_server_connection"Volker Lendecke1-1/+1
This reverts commit c85a4c9ba4a7de65a7850f6f9708df66bd24deea.
2009-11-21s3: Move the global variable Protocol to struct smbd_server_connectionVolker Lendecke1-1/+1
2009-11-17Remove "store create time" code, cause create time to be storedJeremy Allison1-8/+10
in the "user.DOSATTRIB" EA. From the docs: In Samba 3.5.0 and above the "user.DOSATTRIB" extended attribute has been extended to store the create time for a file as well as the DOS attributes. This is done in a backwards compatible way so files created by Samba 3.5.0 and above can still have the DOS attribute read from this extended attribute by earlier versions of Samba, but they will not be able to read the create time stored there. Storing the create time separately from the normal filesystem meta-data allows Samba to faithfully reproduce NTFS semantics on top of a POSIX filesystem. Passes make test but will need more testing. Jeremy.
2009-11-05Got the logic simplification worked out so we still passJeremy Allison1-1/+1
BASE-DELAYWRITE and also RAW-CLOSE. Jeremy.
2009-11-05Revert commit "0551284dc08eb93ef7b2b2227a45e5ec21d482fb" - simplifyJeremy Allison1-1/+1
the logic. This was incorrect (I'll revisit this tomorrow). Jeremy.
2009-11-05Simplify the logic - remove extraneous argument and calls to ↵Jeremy Allison1-1/+1
set_close_write_time(). We were treating a file time set on close as a sticky write time set, and I don't think it is. I will add a torture test later to RAW-CLOSE to confirm this. Jeremy.
2009-11-05Get closer to an accurate model of Windows timestamp changes.Jeremy Allison1-1/+1
"Normal" non truncate writes always cause the timestamp to be set on close. Once a close is done on a handle this can reset the sticky write time to current time also. Updated smbtorture4 confirms this. Jeremy.