The Samba-Bugzilla – Attachment 16431 Details for
Bug 14631
Ensure vfs_acl_xattr sets SEC_DESC_DACL_AUTO_INHERITED on the share root in a sane way
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Correct log
log copy.smbd (text/plain), 9.01 KB, created by
Andrew Walker
on 2021-02-04 22:16:23 UTC
(
hide
)
Description:
Correct log
Filename:
MIME Type:
Creator:
Andrew Walker
Created:
2021-02-04 22:16:23 UTC
Size:
9.01 KB
patch
obsolete
>[2021/02/04 21:46:06.802959, 10, pid=72257, effective(1002, 1002), real(0, 0)] ../../source3/smbd/open.c:5083(inherit_new_acl) > inherit_new_acl: parent acl for testfile is: >[2021/02/04 21:46:06.802993, 1, pid=72257, effective(1002, 1002), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > parent_desc: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x8004 (32772) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 0: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-22-1-0 > group_sid : * > group_sid : S-1-22-2-0 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0070 (112) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x13 (19) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 1: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2152865990-1588067200-718635612-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001e01ff (1966591) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-1-0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-2-0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 >[2021/02/04 21:46:06.804387, 5, pid=72257, effective(1002, 1002), real(0, 0)] ../../libcli/security/secdesc.c:561(se_create_child_secdesc) > se_create_child_secdesc(): S-1-5-21-2152865990-1588067200-718635612-1000:0/0x13/0x001f01ff inherited as S-1-5-21-2152865990-1588067200-718635612-1000:0/0x00/0x001f01ff >[2021/02/04 21:46:06.804430, 10, pid=72257, effective(1002, 1002), real(0, 0)] ../../source3/smbd/open.c:5209(inherit_new_acl) > inherit_new_acl: child acl for testfile is: >[2021/02/04 21:46:06.804464, 1, pid=72257, effective(1002, 1002), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x8004 (32772) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 0: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-2152865990-1588067200-718635612-1000 > group_sid : * > group_sid : S-1-5-21-2152865990-1588067200-718635612-1002 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x002c (44) > num_aces : 0x00000001 (1) > aces: ARRAY(1) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2152865990-1588067200-718635612-1000 >[2021/02/04 21:46:06.805153, 10, pid=72257, effective(1002, 1002), real(0, 0), class=acls] ../../source3/modules/nfs4_acls.c:987(smb_set_nt_acl_nfs4) > smb_set_nt_acl_nfs4 invoked for testfile
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 14631
:
16430
| 16431 |
16432
|
16433
|
16438