Print this page
NEX-13644 File access audit logging
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Reviewed by: Saso Kiselkov <saso.kiselkov@nexenta.com>
Reviewed by: Rick McNeal <rick.mcneal@nexenta.com>
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com>
NEX-9808 SMB3 persistent handles
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-9808 SMB3 persistent handles
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-3553 SMB2/3 durable handles
Reviewed by: Gordon Ross <gwr@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
NEX-3776 SMB should handle PreviousSessionID
Reviewed by: Gordon Ross <gwr@nexenta.com>
SMB-50 User-mode SMB server
 Includes work by these authors:
 Thomas Keiser <thomas.keiser@nexenta.com>
 Albert Lee <trisk@nexenta.com>

*** 18,28 **** * * CDDL HEADER END */ /* * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved. ! * Copyright 2013 Nexenta Systems, Inc. All rights reserved. */ #include <sys/types.h> #include <sys/sid.h> #include <sys/priv_names.h> --- 18,28 ---- * * CDDL HEADER END */ /* * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved. ! * Copyright 2018 Nexenta Systems, Inc. All rights reserved. */ #include <sys/types.h> #include <sys/sid.h> #include <sys/priv_names.h>
*** 36,52 **** /* * Kind of a hack here. In this user-space test implementation, * we don't bother with real credential. Everything here uses * the ordinary credentials of the process running this. */ cred_t * ! smb_cred_create(smb_token_t *token) { cred_t *cr; ! cr = (cred_t *)token; /* hack */ return (cr); } void smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) { user->u_cred = cr; --- 36,67 ---- /* * Kind of a hack here. In this user-space test implementation, * we don't bother with real credential. Everything here uses * the ordinary credentials of the process running this. */ + + /* + * This library does not implement real credentials. All contexts + * use an opaque cred_t object, and all activity happens in the + * context of the user who runs the program. + */ + /* ARGSUSED */ cred_t * ! smb_cred_create(smb_token_t *token, smb_session_t *s) { cred_t *cr; ! cr = CRED(); return (cr); } + + cred_t * + smb_kcred_create(void) + { + cred_t *cr; + cr = CRED(); + return (cr); + } void smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges) { user->u_cred = cr;