Print this page
NEX-13644 File access audit logging
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Reviewed by: Saso Kiselkov <saso.kiselkov@nexenta.com>
Reviewed by: Rick McNeal <rick.mcneal@nexenta.com>
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com>
NEX-9808 SMB3 persistent handles
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-9808 SMB3 persistent handles
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-3553 SMB2/3 durable handles
Reviewed by: Gordon Ross <gwr@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
NEX-3776 SMB should handle PreviousSessionID
Reviewed by: Gordon Ross <gwr@nexenta.com>
SMB-50 User-mode SMB server
 Includes work by these authors:
 Thomas Keiser <thomas.keiser@nexenta.com>
 Albert Lee <trisk@nexenta.com>
        
*** 18,28 ****
   *
   * CDDL HEADER END
   */
  /*
   * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
!  * Copyright 2013 Nexenta Systems, Inc.  All rights reserved.
   */
  
  #include <sys/types.h>
  #include <sys/sid.h>
  #include <sys/priv_names.h>
--- 18,28 ----
   *
   * CDDL HEADER END
   */
  /*
   * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
!  * Copyright 2018 Nexenta Systems, Inc.  All rights reserved.
   */
  
  #include <sys/types.h>
  #include <sys/sid.h>
  #include <sys/priv_names.h>
*** 36,52 ****
  /*
   * Kind of a hack here.  In this user-space test implementation,
   * we don't bother with real credential.  Everything here uses
   * the ordinary credentials of the process running this.
   */
  cred_t *
! smb_cred_create(smb_token_t *token)
  {
          cred_t *cr;
!         cr = (cred_t *)token;   /* hack */
          return (cr);
  }
  
  void
  smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges)
  {
          user->u_cred = cr;
--- 36,67 ----
  /*
   * Kind of a hack here.  In this user-space test implementation,
   * we don't bother with real credential.  Everything here uses
   * the ordinary credentials of the process running this.
   */
+ 
+ /*
+  * This library does not implement real credentials. All contexts
+  * use an opaque cred_t object, and all activity happens in the
+  * context of the user who runs the program.
+  */
+ /* ARGSUSED */
  cred_t *
! smb_cred_create(smb_token_t *token, smb_session_t *s)
  {
          cred_t *cr;
!         cr = CRED();
          return (cr);
  }
+ 
+ cred_t *
+ smb_kcred_create(void)
+ {
+         cred_t *cr;
+         cr = CRED();
+         return (cr);
+ }
  
  void
  smb_user_setcred(smb_user_t *user, cred_t *cr, uint32_t privileges)
  {
          user->u_cred = cr;