summaryrefslogtreecommitdiff
path: root/source3/smbd/nttrans.c
AgeCommit message (Collapse)AuthorFilesLines
2010-12-19s3: Reply correctly to FSCTL_IS_VOLUME_DIRTYVolker Lendecke1-0/+9
2010-12-17Move checks inside file_set_sparse() to allow it to be called from anywhere.Jeremy Allison1-18/+0
Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Fri Dec 17 21:56:38 CET 2010 on sn-devel-104
2010-12-17file_set_sparse needs to be a handle based call.Jeremy Allison1-1/+1
2010-12-17s3:smbd: implement FSCTL_SET_SPARSE more correctlyBjörn Jacke1-5/+43
this is a port of a patch from metze for 3.3: We don't do the "strict allocation" when the sparse bit isn't set, but that shouldn't matter. We now allow windows applications to set and unset the sparse bit. Note that in order to implement this 100% like described in [MS-FSA], we'd have to change our data model and support the sparse flag per stream.
2010-11-24Add in fsp->access_mask checks. Not required (underlying system does this)Jeremy Allison1-2/+4
but makes logic cleaner. Pointed out by Metze. Jeremy. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Wed Nov 24 01:47:13 CET 2010 on sn-devel-104
2010-11-03s3: Align nttrans replies the same way Windows does itVolker Lendecke1-1/+1
If you look at traces of "smbcacls" reading a secdesc from Samba and from W2k3 shows this difference in the querysecdesc nttrans reply. This patch is necessary to enable viewing previous versions via the shadow copy modules from Windows 2008. The other client versions seem not to care, but W2k8 does. Signed-off-by: Michael Adam <obnox@samba.org> Autobuild-User: Volker Lendecke <vlendec@samba.org> Autobuild-Date: Wed Nov 3 17:04:28 UTC 2010 on sn-devel-104
2010-10-21Add code to implement SeSecurityPrivilege in net rpc rights, and in theJeremy Allison1-0/+10
open and get/set NT security descriptor code. Jeremy. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Thu Oct 21 00:15:57 UTC 2010 on sn-devel-104
2010-10-12libcli/security Provide a common, top level libcli/security/security.hAndrew Bartlett1-0/+1
This will reduce the noise from merges of the rest of the libcli/security code, without this commit changing what code is actually used. This includes (along with other security headers) dom_sid.h and security_token.h Andrew Bartlett Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Tue Oct 12 05:54:10 UTC 2010 on sn-devel-104
2010-10-11Canonicalize incoming and outgoing ACLs.Jeremy Allison1-4/+55
Jeremy.
2010-10-01s3:smbd: Increase unsupported IOCTL debug message to 2Steven Danneman1-2/+4
Even printing once per connection, level 0 was too spammy with Windows clients frequently sending FSCTL_GET_OBJECT_ID which is unsupported.
2010-09-15Fix all sid_parse returns to be checked. Tidy up some checks and errorJeremy Allison1-5/+12
messages. Jeremy.
2010-09-16s3-smbd: prevent call_nt_transact_ioctl() crash in FSCTL_FIND_FILES_BY_SID case.Günther Deschner1-1/+4
Jeremy, please check. Guenther
2010-09-15Add check for invalid data size.Jeremy Allison1-1/+8
Jeremy.
2010-09-09More paranoia to ensure SD's can't be set on read-only shares.Jeremy Allison1-0/+4
Jeremy.
2010-09-08Don't rely on the underlying ACL modules to enforce share levelJeremy Allison1-0/+5
security when setting ACLs, check at the call level as well. Jeremy.
2010-08-26s3-build: only include "fake_file.h" where needed.Günther Deschner1-0/+1
Guenther
2010-08-24s3: Make srv_send_smb take an sconn instead of a sock fdVolker Lendecke1-2/+2
2010-08-16s3: Remove smbd_server_fd from send_nt_repliesVolker Lendecke1-2/+2
2010-06-13s3: Remove fsp_belongs_connVolker Lendecke1-4/+4
check_open_fsp does exactly the same
2010-06-12s3: Explicitly pass sconn to remove_pending_lock_requests_by_mid_smb1Volker Lendecke1-1/+1
2010-06-12s3: Explicitly pass sconn to the remove_pending_change_notify_request_by_midVolker Lendecke1-1/+1
2010-06-12s3: change_notify_reply() does not need its "conn" argumentVolker Lendecke1-1/+1
2010-06-12s3: Remove smbd_server_conn from reply_ntcancelVolker Lendecke1-1/+1
2010-06-12s3: Remove smbd_server_conn from send_nt_repliesVolker Lendecke1-1/+1
2010-06-03s3-security: use shared SECINFO_DACL define.Günther Deschner1-1/+1
Guenther
2010-06-03s3-security: use shared SECINFO_SACL define.Günther Deschner1-1/+1
Guenther
2010-06-03s3-security: use shared SECINFO_GROUP define.Günther Deschner1-1/+1
Guenther
2010-06-03s3-security: use shared SECINFO_OWNER define.Günther Deschner1-1/+1
Guenther
2010-05-31s3-build: only use ndr_security.h where needed.Günther Deschner1-0/+1
Guenther
2010-05-21s3:dom_sid Global replace of DOM_SID with struct dom_sidAndrew Bartlett1-3/+3
This matches the structure that new code is being written to, and removes one more of the old-style named structures, and the need to know that is is just an alias for struct dom_sid. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-05-18Implement missing info level SMB_FILE_LINK_INFORMATION.Jeremy Allison1-0/+2
Fix bug #7435 - SMB2 hardlink fails (invalid level). Found at the Microsoft plugsharing plugfest. Jeremy.
2010-05-18s3-secdesc: remove "typedef struct security_descriptor SEC_DESC".Günther Deschner1-3/+3
Guenther
2010-05-18s3-build: fix the build.Günther Deschner1-1/+1
Guenther
2010-05-18s3: Remove use of iconv_convenience.Jelmer Vernooij1-1/+1
2010-04-29Carefully label SMB1-specific locking calls.Jeremy Allison1-1/+1
Jeremy.
2010-04-28Connect set security descriptor into SMB2 code.Jeremy Allison1-2/+2
Jeremy.
2010-04-26Plumb in get_nt_acl into SMB2.Jeremy Allison1-40/+91
Jeremy.
2010-04-12Move to using 64-bit mid values in our internal open file database.Jeremy Allison1-1/+2
This will allow us to share logic much easier between SMB1 and SMB2 servers. Jeremy
2010-04-07s3: add comment about what the FSCTL_QUERY_ALLOCATED_RANGES currently doesBjörn Jacke1-0/+6
2010-04-05Add FSCTL_QUERY_ALLOCATED_RANGES to the list of Windows ioctls we support.Jeremy Allison1-0/+52
Based on a patch reported and tested by Ira Cooper <samba@ira.wakeful.net>. Jeremy.
2010-03-30Second part of fix for bug #6494 - Incorrect FileStatus returned in ↵Jeremy Allison1-1/+19
NT_CREATE_ANDX. Ensure we do this in nttrans create too. Jeremy.
2010-03-05Fix for bug #7189 - Open txt files with notepad on samba shares creates problem.Jeremy Allison1-0/+4
Ensure we don't use any of the create_options for Samba private use. Add a new parameter to the VFS_CREATE call (private_flags) which is only used internally. Renumber NTCREATEX_OPTIONS_PRIVATE_DENY_DOS and NTCREATEX_OPTIONS_PRIVATE_DENY_FCB to match the S4 code). Rev. the VFS interface to version 28. Jeremy.
2009-12-21Remove all calls to reply_doserror - turn them intoJeremy Allison1-42/+42
correct reply_nterror calls. Next rename reply_doserror -> reply_force_doserror and plumb in when NT_STATUS_DOS is used. Jeremy.
2009-12-17Vector correctly through reply_openerror() (which uses the same logic).Jeremy Allison1-6/+1
Jeremy.
2009-11-24Fix make test. Only do POSIX case conversion if FILE_FLAG_POSIX_SEMANTICS ↵Jeremy Allison1-8/+12
set. Doh ! Jeremy.
2009-11-23Restore NtCreateX case handling with FILE_FLAG_POSIX_SEMANTICS to the wayJeremy Allison1-5/+68
it worked in 3.3.x and 3.2.x. UCF_POSIX_PATHNAMES may no longer be needed, as lp_posix_pathnames() being set isn't the same as case handling from NtCreateX (lp_posix_pathnames() changes the STAT calls to LSTAT, not the case semantics). Jeremy.
2009-11-23Proper fix for #6898 - Samba duplicates file content on appending. Pointed ↵Jeremy Allison1-12/+18
out by Volker.Restores the pathname handling for FILE_FLAG_POSIX_SEMANTICS but still prevents the O_APPEND problems. Jeremy.
2009-11-23Fix bug #6898 - Samba duplicates file content on appendingJeremy Allison1-0/+10
Clients using a Windows open call should not be able to set FILE_FLAG_POSIX_SEMANTICS in an open. Jeremy.
2009-11-23Revert "s3: Move the global variable Protocol to struct smbd_server_connection"Volker Lendecke1-1/+1
This reverts commit c85a4c9ba4a7de65a7850f6f9708df66bd24deea.
2009-11-21s3: Move the global variable Protocol to struct smbd_server_connectionVolker Lendecke1-1/+1