Print this page
NEX-13644 File access audit logging
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Reviewed by: Saso Kiselkov <saso.kiselkov@nexenta.com>
Reviewed by: Rick McNeal <rick.mcneal@nexenta.com>
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com>
NEX-9808 SMB3 persistent handles
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-9808 SMB3 persistent handles
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-3553 SMB2/3 durable handles
Reviewed by: Gordon Ross <gwr@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
NEX-3776 SMB should handle PreviousSessionID
Reviewed by: Gordon Ross <gwr@nexenta.com>
SMB-50 User-mode SMB server
Includes work by these authors:
Thomas Keiser <thomas.keiser@nexenta.com>
Albert Lee <trisk@nexenta.com>
*** 18,28 ****
*
* CDDL HEADER END
*/
/*
* Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
! * Copyright 2013 Nexenta Systems, Inc. All rights reserved.
*/
#include <sys/types.h>
#include <sys/sid.h>
#include <sys/priv_names.h>
--- 18,28 ----
*
* CDDL HEADER END
*/
/*
* Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
! * Copyright 2018 Nexenta Systems, Inc. All rights reserved.
*/
#include <sys/types.h>
#include <sys/sid.h>
#include <sys/priv_names.h>
*** 36,52 ****
/*
* Kind of a hack here. In this user-space test implementation,
* we don't bother with real credential. Everything here uses
* the ordinary credentials of the process running this.
*/
cred_t *
! smb_cred_create(smb_token_t *token)
{
cred_t *cr;
! cr = (cred_t *)token; /* hack */
return (cr);
}
void
smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges)
{
user->u_cred = cr;
--- 36,67 ----
/*
* Kind of a hack here. In this user-space test implementation,
* we don't bother with real credential. Everything here uses
* the ordinary credentials of the process running this.
*/
+
+ /*
+ * This library does not implement real credentials. All contexts
+ * use an opaque cred_t object, and all activity happens in the
+ * context of the user who runs the program.
+ */
+ /* ARGSUSED */
cred_t *
! smb_cred_create(smb_token_t *token, smb_session_t *s)
{
cred_t *cr;
! cr = CRED();
return (cr);
}
+
+ cred_t *
+ smb_kcred_create(void)
+ {
+ cred_t *cr;
+ cr = CRED();
+ return (cr);
+ }
void
smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges)
{
user->u_cred = cr;