search for: pdesc_next

Displaying 8 results from an estimated 8 matches for "pdesc_next".

2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
...le_struct *handle, > uint8_t sys_acl_hash[XATTR_SD_HASH_SIZE]; > uint8_t hash_tmp[XATTR_SD_HASH_SIZE]; > uint8_t sys_acl_hash_tmp[XATTR_SD_HASH_SIZE]; > - struct security_descriptor *psd = NULL; > + struct security_descriptor *psd_blob = NULL; > struct security_descriptor *pdesc_next = NULL; > const struct smb_filename *smb_fname = NULL; > bool ignore_file_system_acl = lp_parm_bool(SNUM(handle->conn), > @@ -509,25 +509,25 @@ static NTSTATUS get_nt_acl_internal(vfs_handle_struct *handle, > if (!NT_STATUS_IS_OK(status)) { > DEBUG(10, ("get_nt_acl_i...
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 06:33:26PM +0200, Ralph Böhme via samba wrote: > On Thu, Aug 25, 2016 at 12:14:00PM -0700, Jeremy Allison wrote: > > On Wed, Aug 24, 2016 at 04:06:42PM +0200, Ralph Böhme via samba wrote: > > > > > > Yeah, as much as I'd like to avoid adding a new option, I guess we > > > have to do something about it, my latest take on this is >
2016 Aug 29
1
Issue with acl_xattr:ignore system acls in 4.5rc2
...le_struct *handle, > uint8_t sys_acl_hash[XATTR_SD_HASH_SIZE]; > uint8_t hash_tmp[XATTR_SD_HASH_SIZE]; > uint8_t sys_acl_hash_tmp[XATTR_SD_HASH_SIZE]; > - struct security_descriptor *psd = NULL; > + struct security_descriptor *psd_blob = NULL; > struct security_descriptor *pdesc_next = NULL; > const struct smb_filename *smb_fname = NULL; > bool ignore_file_system_acl = lp_parm_bool(SNUM(handle->conn), > @@ -509,25 +509,25 @@ static NTSTATUS get_nt_acl_internal(vfs_handle_struct *handle, > if (!NT_STATUS_IS_OK(status)) { > DEBUG(10, ("get_nt_acl_i...
2016 Aug 27
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 04:03:49PM -0700, Jeremy Allison wrote: > On Fri, Aug 26, 2016 at 02:46:19PM -0700, Jeremy Allison via samba wrote: > > On Fri, Aug 26, 2016 at 06:44:05PM +0200, Ralph Böhme wrote: > > > > > > Cheerio! > > > -slow > > > > Still reviewing this - but a few things that will need changing: > > > > When adding the
2016 Jan 08
2
Security permissions issues after changing idmap backend from RID to AUTORID
...2, 0), class=vfs] > ../source3/modules/vfs_acl_common.c:554(get_nt_acl_internal) > get_nt_acl_internal: acl for blob hash for . is: > [2016/01/04 15:08:21.484352, 1, pid=10718, effective(110007232, > 110000513), real(110007232, 0)] ../librpc/ndr/ndr.c:296(ndr_print_debug) > pdesc_next: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DAC...
2016 Jan 10
2
Security permissions issues after changing idmap backend from RID to AUTORID
...modules/vfs_acl_common.c:554(get_nt_acl_internal) >>> get_nt_acl_internal: acl for blob hash for . is: >>> [2016/01/04 15:08:21.484352, 1, pid=10718, effective(110007232, >>> 110000513), real(110007232, 0)] ../librpc/ndr/ndr.c:296(ndr_print_debug) >>> pdesc_next: struct security_descriptor >>> revision : SECURITY_DESCRIPTOR_REVISION_1 (1) >>> type : 0x9004 (36868) >>> 0: SEC_DESC_OWNER_DEFAULTED >>> 0: SEC_DESC_GROUP_DEFAULTED &...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
...> ../source3/modules/vfs_acl_common.c:554(get_nt_acl_internal) >> get_nt_acl_internal: acl for blob hash for . is: >> [2016/01/04 15:08:21.484352, 1, pid=10718, effective(110007232, >> 110000513), real(110007232, 0)] ../librpc/ndr/ndr.c:296(ndr_print_debug) >> pdesc_next: struct security_descriptor >> revision : SECURITY_DESCRIPTOR_REVISION_1 (1) >> type : 0x9004 (36868) >> 0: SEC_DESC_OWNER_DEFAULTED >> 0: SEC_DESC_GROUP_DEFAULTED >>...
2016 Jan 10
0
Security permissions issues after changing idmap backend from RID to AUTORID
...> get_nt_acl_internal: acl for blob hash for . is: > [2016/01/04 15:08:21.484352, 1, pid=10718, > effective(110007232, > 110000513), real(110007232, 0)] > ../librpc/ndr/ndr.c:296(ndr_print_debug) > pdesc_next: struct security_descriptor > revision : > SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED >...