Changeset 587 for vendor/current/source3/smbd/open.c
- Timestamp:
- Jun 29, 2011, 7:36:41 AM (14 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/source3/smbd/open.c
r414 r587 50 50 ****************************************************************************/ 51 51 52 NTSTATUS smb1_file_se_access_check(const struct security_descriptor *sd, 52 NTSTATUS smb1_file_se_access_check(connection_struct *conn, 53 const struct security_descriptor *sd, 53 54 const NT_USER_TOKEN *token, 54 55 uint32_t access_desired, 55 56 uint32_t *access_granted) 56 57 { 58 *access_granted = 0; 59 60 if (conn->server_info->utok.uid == 0 || conn->admin_user) { 61 /* I'm sorry sir, I didn't know you were root... */ 62 *access_granted = access_desired; 63 if (access_desired & SEC_FLAG_MAXIMUM_ALLOWED) { 64 *access_granted |= FILE_GENERIC_ALL; 65 } 66 return NT_STATUS_OK; 67 } 68 57 69 return se_access_check(sd, 58 70 token, … … 74 86 struct security_descriptor *sd = NULL; 75 87 76 *access_granted = 0;77 78 if (conn->server_info->utok.uid == 0 || conn->admin_user) {79 /* I'm sorry sir, I didn't know you were root... */80 *access_granted = access_mask;81 if (access_mask & SEC_FLAG_MAXIMUM_ALLOWED) {82 *access_granted |= FILE_GENERIC_ALL;83 }84 return NT_STATUS_OK;85 }86 87 88 status = SMB_VFS_GET_NT_ACL(conn, smb_fname->base_name, 88 89 (OWNER_SECURITY_INFORMATION | … … 98 99 } 99 100 100 status = smb1_file_se_access_check(sd, 101 status = smb1_file_se_access_check(conn, 102 sd, 101 103 conn->server_info->ptok, 102 104 access_mask, … … 1413 1415 } 1414 1416 1415 status = smb1_file_se_access_check(sd, 1417 status = smb1_file_se_access_check(conn, 1418 sd, 1416 1419 conn->server_info->ptok, 1417 1420 access_mask,
Note:
See TracChangeset
for help on using the changeset viewer.