1. 13 2月, 2013 2 次提交
    • E
      cifs: Use kuids and kgids SID to uid/gid mapping · 8abf2775
      Eric W. Biederman 提交于
      Update id_mode_to_cifs_acl to take a kuid_t and a kgid_t.
      
      Replace NO_CHANGE_32 with INVALID_UID and INVALID_GID, and tests for
      NO_CHANGE_32 with uid_valid and gid_valid.
      
      Carefully unpack the value returned from request_key.  memcpy the
      value into the expected type.  The convert the uid/gid into a
      kuid/kgid.  And then only if the result is a valid kuid or kgid update
      fuid/fgid.
      
      Cc: Steve French <smfrench@gmail.com>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      8abf2775
    • E
      cifs: Override unmappable incoming uids and gids · 46bbc25f
      Eric W. Biederman 提交于
      The cifs protocol has a 64bit space for uids and gids, while linux
      only supports a 32bit space today.  Instead of silently truncating
      64bit cifs ids, replace cifs ids that do not fit in the 32bit linux
      id space with the default uid and gids for the cifs mount.
      
      Cc: Steve French <smfrench@gmail.com>
      Signed-off-by: N"Eric W. Biederman" <ebiederm@xmission.com>
      46bbc25f
  2. 06 12月, 2012 1 次提交
  3. 29 9月, 2012 1 次提交
  4. 25 9月, 2012 7 次提交
  5. 20 8月, 2012 1 次提交
  6. 28 7月, 2012 3 次提交
  7. 25 7月, 2012 3 次提交
  8. 24 7月, 2012 1 次提交
  9. 14 7月, 2012 1 次提交
  10. 27 2月, 2012 1 次提交
    • P
      CIFS: Fix mkdir/rmdir bug for the non-POSIX case · 6de2ce42
      Pavel Shilovsky 提交于
      Currently we do inc/drop_nlink for a parent directory for every
      mkdir/rmdir calls. That's wrong when Unix extensions are disabled
      because in this case a server doesn't follow the same semantic and
      returns the old value on the next QueryInfo request. As the result,
      we update our value with the server one and then decrement it on
      every rmdir call - go to negative nlink values.
      
      Fix this by removing inc/drop_nlink for the parent directory from
      mkdir/rmdir, setting it for a revalidation and ignoring NumberOfLinks
      for directories when Unix extensions are disabled.
      Signed-off-by: NPavel Shilovsky <piastry@etersoft.ru>
      Reviewed-by: NJeff Layton <jlayton@samba.org>
      Signed-off-by: NSteve French <smfrench@gmail.com>
      6de2ce42
  11. 04 1月, 2012 1 次提交
  12. 02 11月, 2011 1 次提交
  13. 23 10月, 2011 1 次提交
  14. 17 10月, 2011 1 次提交
    • S
      cifs: Call id to SID mapping functions to change owner/group (try #4 repost) · a5ff3769
      Shirish Pargaonkar 提交于
      Now build security descriptor to change either owner or group at the
      server.  Initially security descriptor was built to change only
      (D)ACL, that functionality has been extended.
      
      When either an Owner or a Group of a file object at the server is changed,
      rest of security descriptor remains same (DACL etc.).
      
      To set security descriptor, it is necessary to open that file
      with permission bits of either WRITE_DAC if DACL is being modified or
      WRITE_OWNER (Take Ownership) if Owner or Group is being changed.
      
      It is the server that decides whether a set security descriptor with
      either owner or group change succeeds or not.
      Signed-off-by: NShirish Pargaonkar <shirishpargaonkar@gmail.com>
      Signed-off-by: NSteve French <smfrench@gmail.com>
      a5ff3769
  15. 05 8月, 2011 1 次提交
  16. 27 5月, 2011 4 次提交
  17. 26 5月, 2011 3 次提交
  18. 21 5月, 2011 1 次提交
  19. 19 5月, 2011 3 次提交
  20. 21 1月, 2011 1 次提交
  21. 16 1月, 2011 1 次提交
  22. 13 1月, 2011 1 次提交