diff options
| author | Pali Rohár <pali@kernel.org> | 2024-10-14 13:43:23 +0200 |
|---|---|---|
| committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2025-02-08 09:58:10 +0100 |
| commit | 281244ab427152a50ad862db582bfa1808b277ba (patch) | |
| tree | e00e52fda7835124dc4adf50517f7ccda48c37c6 /scripts | |
| parent | 077f372585b610784bea86bfc31e365066153989 (diff) | |
| download | linux-281244ab427152a50ad862db582bfa1808b277ba.tar.gz linux-281244ab427152a50ad862db582bfa1808b277ba.tar.bz2 linux-281244ab427152a50ad862db582bfa1808b277ba.zip | |
cifs: Fix getting and setting SACLs over SMB1
[ Upstream commit 8b19dfb34d17e77a0809d433cc128b779282131b ]
SMB1 callback get_cifs_acl_by_fid() currently ignores its last argument and
therefore ignores request for SACL_SECINFO. Fix this issue by correctly
propagating info argument from get_cifs_acl() and get_cifs_acl_by_fid() to
CIFSSMBGetCIFSACL() function and pass SACL_SECINFO when requested.
For accessing SACLs it is needed to open object with SYSTEM_SECURITY
access. Pass this flag when trying to get or set SACLs.
Same logic is in the SMB2+ code path.
This change fixes getting and setting of "system.cifs_ntsd_full" and
"system.smb3_ntsd_full" xattrs over SMB1 as currently it silentely ignored
SACL part of passed xattr buffer.
Fixes: 3970acf7ddb9 ("SMB3: Add support for getting and setting SACLs")
Signed-off-by: Pali Rohár <pali@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'scripts')
0 files changed, 0 insertions, 0 deletions
