The Samba-Bugzilla – Attachment 9095 Details for
Bug 9678
Windows 8 Roaming profiles fail
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
patch for 3.6, 4.0 and master
roaming_profiles.patch (text/plain), 2.15 KB, created by
Gregor Beck (550 Unknown user)
on 2013-08-01 12:34:58 UTC
(
hide
)
Description:
patch for 3.6, 4.0 and master
Filename:
MIME Type:
Creator:
Gregor Beck (550 Unknown user)
Created:
2013-08-01 12:34:58 UTC
Size:
2.15 KB
patch
obsolete
>From c9f4715e3fbeee26b16b04ea0072201e9b3e37f3 Mon Sep 17 00:00:00 2001 >From: Gregor Beck <gbeck@sernet.de> >Date: Wed, 31 Jul 2013 15:28:51 +0200 >Subject: [PATCH 1/2] security.idl: add new security_secinfo bits > >[MS-DTYP].pdf 2.4.7 > >Signed-off-by: Gregor Beck <gbeck@sernet.de> >--- > librpc/idl/security.idl | 3 +++ > 1 file changed, 3 insertions(+) > >diff --git a/librpc/idl/security.idl b/librpc/idl/security.idl >index 00bb6e6..381d6e5 100644 >--- a/librpc/idl/security.idl >+++ b/librpc/idl/security.idl >@@ -621,6 +621,9 @@ interface security > SECINFO_DACL = 0x00000004, > SECINFO_SACL = 0x00000008, > SECINFO_LABEL = 0x00000010, >+ SECINFO_ATTRIBUTE = 0x00000020, >+ SECINFO_SCOPE = 0x00000040, >+ SECINFO_BACKUP = 0x00010000, > SECINFO_UNPROTECTED_SACL = 0x10000000, > SECINFO_UNPROTECTED_DACL = 0x20000000, > SECINFO_PROTECTED_SACL = 0x40000000, >-- >1.7.9.5 > > >From b290608d0cb39a3146e389f67dc676072ec16985 Mon Sep 17 00:00:00 2001 >From: Gregor Beck <gbeck@sernet.de> >Date: Thu, 1 Aug 2013 14:16:24 +0200 >Subject: [PATCH 2/2] Fix bug 9678 - Windows 8 Roaming profiles fail > >Windows 8 tries to set 'ATTRIBUTE_SECURITY_INFORMATION' on some >dirs. Ignoring it makes roaming profiles work again. >Just like w2k3 gracefully ignore all the other bits. > >Signed-off-by: Gregor Beck <gbeck@sernet.de> >--- > source3/smbd/nttrans.c | 9 ++------- > 1 file changed, 2 insertions(+), 7 deletions(-) > >diff --git a/source3/smbd/nttrans.c b/source3/smbd/nttrans.c >index c8116b0..800e2fd 100644 >--- a/source3/smbd/nttrans.c >+++ b/source3/smbd/nttrans.c >@@ -891,13 +891,8 @@ NTSTATUS set_sd(files_struct *fsp, struct security_descriptor *psd, > > /* Ensure we have at least one thing set. */ > if ((security_info_sent & (SECINFO_OWNER|SECINFO_GROUP|SECINFO_DACL|SECINFO_SACL)) == 0) { >- if (security_info_sent & SECINFO_LABEL) { >- /* Only consider SECINFO_LABEL if no other >- bits are set. Just like W2K3 we don't >- store this. */ >- return NT_STATUS_OK; >- } >- return NT_STATUS_INVALID_PARAMETER; >+ /* Just like W2K3 */ >+ return NT_STATUS_OK; > } > > /* Ensure we have the rights to do this. */ >-- >1.7.9.5 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Flags:
metze
:
review+
jra
:
review+
Actions:
View
Attachments on
bug 9678
:
8582
|
9091
|
9092
|
9093
| 9095 |
9101
|
9102
|
9103