Displaying 8 results from an estimated 8 matches for "pdesc_next".
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
...le_struct *handle,
> uint8_t sys_acl_hash[XATTR_SD_HASH_SIZE];
> uint8_t hash_tmp[XATTR_SD_HASH_SIZE];
> uint8_t sys_acl_hash_tmp[XATTR_SD_HASH_SIZE];
> - struct security_descriptor *psd = NULL;
> + struct security_descriptor *psd_blob = NULL;
> struct security_descriptor *pdesc_next = NULL;
> const struct smb_filename *smb_fname = NULL;
> bool ignore_file_system_acl = lp_parm_bool(SNUM(handle->conn),
> @@ -509,25 +509,25 @@ static NTSTATUS get_nt_acl_internal(vfs_handle_struct *handle,
> if (!NT_STATUS_IS_OK(status)) {
> DEBUG(10, ("get_nt_acl_i...
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 06:33:26PM +0200, Ralph Böhme via samba wrote:
> On Thu, Aug 25, 2016 at 12:14:00PM -0700, Jeremy Allison wrote:
> > On Wed, Aug 24, 2016 at 04:06:42PM +0200, Ralph Böhme via samba wrote:
> > >
> > > Yeah, as much as I'd like to avoid adding a new option, I guess we
> > > have to do something about it, my latest take on this is
>
2016 Aug 29
1
Issue with acl_xattr:ignore system acls in 4.5rc2
...le_struct *handle,
> uint8_t sys_acl_hash[XATTR_SD_HASH_SIZE];
> uint8_t hash_tmp[XATTR_SD_HASH_SIZE];
> uint8_t sys_acl_hash_tmp[XATTR_SD_HASH_SIZE];
> - struct security_descriptor *psd = NULL;
> + struct security_descriptor *psd_blob = NULL;
> struct security_descriptor *pdesc_next = NULL;
> const struct smb_filename *smb_fname = NULL;
> bool ignore_file_system_acl = lp_parm_bool(SNUM(handle->conn),
> @@ -509,25 +509,25 @@ static NTSTATUS get_nt_acl_internal(vfs_handle_struct *handle,
> if (!NT_STATUS_IS_OK(status)) {
> DEBUG(10, ("get_nt_acl_i...
2016 Aug 27
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 04:03:49PM -0700, Jeremy Allison wrote:
> On Fri, Aug 26, 2016 at 02:46:19PM -0700, Jeremy Allison via samba wrote:
> > On Fri, Aug 26, 2016 at 06:44:05PM +0200, Ralph Böhme wrote:
> > >
> > > Cheerio!
> > > -slow
> >
> > Still reviewing this - but a few things that will need changing:
> >
> > When adding the
2016 Jan 08
2
Security permissions issues after changing idmap backend from RID to AUTORID
...2, 0), class=vfs]
> ../source3/modules/vfs_acl_common.c:554(get_nt_acl_internal)
> get_nt_acl_internal: acl for blob hash for . is:
> [2016/01/04 15:08:21.484352, 1, pid=10718, effective(110007232,
> 110000513), real(110007232, 0)] ../librpc/ndr/ndr.c:296(ndr_print_debug)
> pdesc_next: struct security_descriptor
> revision : SECURITY_DESCRIPTOR_REVISION_1 (1)
> type : 0x9004 (36868)
> 0: SEC_DESC_OWNER_DEFAULTED
> 0: SEC_DESC_GROUP_DEFAULTED
> 1: SEC_DESC_DAC...
2016 Jan 10
2
Security permissions issues after changing idmap backend from RID to AUTORID
...modules/vfs_acl_common.c:554(get_nt_acl_internal)
>>> get_nt_acl_internal: acl for blob hash for . is:
>>> [2016/01/04 15:08:21.484352, 1, pid=10718, effective(110007232,
>>> 110000513), real(110007232, 0)] ../librpc/ndr/ndr.c:296(ndr_print_debug)
>>> pdesc_next: struct security_descriptor
>>> revision : SECURITY_DESCRIPTOR_REVISION_1 (1)
>>> type : 0x9004 (36868)
>>> 0: SEC_DESC_OWNER_DEFAULTED
>>> 0: SEC_DESC_GROUP_DEFAULTED
&...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
...> ../source3/modules/vfs_acl_common.c:554(get_nt_acl_internal)
>> get_nt_acl_internal: acl for blob hash for . is:
>> [2016/01/04 15:08:21.484352, 1, pid=10718, effective(110007232,
>> 110000513), real(110007232, 0)] ../librpc/ndr/ndr.c:296(ndr_print_debug)
>> pdesc_next: struct security_descriptor
>> revision : SECURITY_DESCRIPTOR_REVISION_1 (1)
>> type : 0x9004 (36868)
>> 0: SEC_DESC_OWNER_DEFAULTED
>> 0: SEC_DESC_GROUP_DEFAULTED
>>...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
...> get_nt_acl_internal: acl for blob hash for . is:
> [2016/01/04 15:08:21.484352, 1, pid=10718,
> effective(110007232,
> 110000513), real(110007232, 0)]
> ../librpc/ndr/ndr.c:296(ndr_print_debug)
> pdesc_next: struct security_descriptor
> revision :
> SECURITY_DESCRIPTOR_REVISION_1 (1)
> type : 0x9004 (36868)
> 0: SEC_DESC_OWNER_DEFAULTED
>...