Cope with cumulative permissions sets. This code is #ifdef'ed out at the
[ira/wip.git] / source / smbd / posix_acls.c
index 0d020a8ebbed9ac254e310132fff0fbd556d17a6..3824afe3c4770821fbb877b192635481eb80fc06 100644 (file)
@@ -1,8 +1,8 @@
 /*
-   Unix SMB/Netbios implementation.
-   Version 1.9.
+   Unix SMB/CIFS implementation.
    SMB NT Security Descriptor / Unix permission conversion.
-   Copyright (C) Jeremy Allison 1994-2000
+   Copyright (C) Jeremy Allison 1994-2000.
+   Copyright (C) Andreas Gruenbacher 2002.
 
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
@@ -38,7 +38,7 @@ typedef struct canon_ace {
        struct canon_ace *next, *prev;
        SMB_ACL_TAG_T type;
        mode_t perms; /* Only use S_I(R|W|X)USR mode bits here. */
-       DOM_SID sid;
+       DOM_SID trustee;
        enum ace_owner owner_type;
        enum ace_attribute attr;
        posix_id unix_ug; 
@@ -74,7 +74,7 @@ static void free_canon_ace_list( canon_ace *list_head )
        while (list_head) {
                canon_ace *old_head = list_head;
                DLIST_REMOVE(list_head, list_head);
-               free(old_head);
+               SAFE_FREE(old_head);
        }
 }
 
@@ -103,13 +103,13 @@ static void print_canon_ace(canon_ace *pace, int num)
        fstring str;
 
        dbgtext( "canon_ace index %d. Type = %s ", num, pace->attr == ALLOW_ACE ? "allow" : "deny" );
-    dbgtext( "SID = %s ", sid_to_string( str, &pace->sid));
+       dbgtext( "SID = %s ", sid_to_string( str, &pace->trustee));
        if (pace->owner_type == UID_ACE) {
-               struct passwd *pass = sys_getpwuid(pace->unix_ug.uid);
-               dbgtext( "uid %u (%s) ", (unsigned int)pace->unix_ug.uid, pass ? pass->pw_name : "UNKNOWN");
+               const char *u_name = uidtoname(pace->unix_ug.uid);
+               dbgtext( "uid %u (%s) ", (unsigned int)pace->unix_ug.uid, u_name);
        } else if (pace->owner_type == GID_ACE) {
-               struct group *grp = getgrgid(pace->unix_ug.gid);
-               dbgtext( "gid %u (%s) ", (unsigned int)pace->unix_ug.gid, grp ? grp->gr_name : "UNKNOWN");
+               char *g_name = gidtoname(pace->unix_ug.gid);
+               dbgtext( "gid %u (%s) ", (unsigned int)pace->unix_ug.gid, g_name);
        } else
                dbgtext( "other ");
        switch (pace->type) {
@@ -154,13 +154,13 @@ static void print_canon_ace_list(const char *name, canon_ace *ace_list)
  Map POSIX ACL perms to canon_ace permissions (a mode_t containing only S_(R|W|X)USR bits).
 ****************************************************************************/
 
-static mode_t convert_permset_to_mode_t(SMB_ACL_PERMSET_T permset)
+static mode_t convert_permset_to_mode_t(connection_struct *conn, SMB_ACL_PERMSET_T permset)
 {
        mode_t ret = 0;
 
-       ret |= (sys_acl_get_perm(permset, SMB_ACL_READ) ? S_IRUSR : 0);
-       ret |= (sys_acl_get_perm(permset, SMB_ACL_WRITE) ? S_IWUSR : 0);
-       ret |= (sys_acl_get_perm(permset, SMB_ACL_EXECUTE) ? S_IXUSR : 0);
+       ret |= (SMB_VFS_SYS_ACL_GET_PERM(conn, permset, SMB_ACL_READ) ? S_IRUSR : 0);
+       ret |= (SMB_VFS_SYS_ACL_GET_PERM(conn, permset, SMB_ACL_WRITE) ? S_IWUSR : 0);
+       ret |= (SMB_VFS_SYS_ACL_GET_PERM(conn, permset, SMB_ACL_EXECUTE) ? S_IXUSR : 0);
 
        return ret;
 }
@@ -188,20 +188,20 @@ static mode_t unix_perms_to_acl_perms(mode_t mode, int r_mask, int w_mask, int x
  an SMB_ACL_PERMSET_T.
 ****************************************************************************/
 
-static int map_acl_perms_to_permset(mode_t mode, SMB_ACL_PERMSET_T *p_permset)
+static int map_acl_perms_to_permset(connection_struct *conn, mode_t mode, SMB_ACL_PERMSET_T *p_permset)
 {
-       if (sys_acl_clear_perms(*p_permset) ==  -1)
+       if (SMB_VFS_SYS_ACL_CLEAR_PERMS(conn, *p_permset) ==  -1)
                return -1;
        if (mode & S_IRUSR) {
-               if (sys_acl_add_perm(*p_permset, SMB_ACL_READ) == -1)
+               if (SMB_VFS_SYS_ACL_ADD_PERM(conn, *p_permset, SMB_ACL_READ) == -1)
                        return -1;
        }
        if (mode & S_IWUSR) {
-               if (sys_acl_add_perm(*p_permset, SMB_ACL_WRITE) == -1)
+               if (SMB_VFS_SYS_ACL_ADD_PERM(conn, *p_permset, SMB_ACL_WRITE) == -1)
                        return -1;
        }
        if (mode & S_IXUSR) {
-               if (sys_acl_add_perm(*p_permset, SMB_ACL_EXECUTE) == -1)
+               if (SMB_VFS_SYS_ACL_ADD_PERM(conn, *p_permset, SMB_ACL_EXECUTE) == -1)
                        return -1;
        }
        return 0;
@@ -243,7 +243,7 @@ static void merge_aces( canon_ace **pp_list_head )
 
                        curr_ace_next = curr_ace->next; /* Save the link in case of delete. */
 
-                       if (sid_equal(&curr_ace->sid, &curr_ace_outer->sid) &&
+                       if (sid_equal(&curr_ace->trustee, &curr_ace_outer->trustee) &&
                                (curr_ace->attr == curr_ace_outer->attr)) {
 
                                if( DEBUGLVL( 10 )) {
@@ -256,7 +256,7 @@ static void merge_aces( canon_ace **pp_list_head )
 
                                curr_ace_outer->perms |= curr_ace->perms;
                                DLIST_REMOVE(list_head, curr_ace);
-                               free(curr_ace);
+                               SAFE_FREE(curr_ace);
                                curr_ace_outer_next = curr_ace_outer->next; /* We may have deleted the link. */
                        }
                }
@@ -283,7 +283,7 @@ static void merge_aces( canon_ace **pp_list_head )
                         * we've put on the ACL, we know the deny must be the first one.
                         */
 
-                       if (sid_equal(&curr_ace->sid, &curr_ace_outer->sid) &&
+                       if (sid_equal(&curr_ace->trustee, &curr_ace_outer->trustee) &&
                                (curr_ace_outer->attr == DENY_ACE) && (curr_ace->attr == ALLOW_ACE)) {
 
                                if( DEBUGLVL( 10 )) {
@@ -301,7 +301,7 @@ static void merge_aces( canon_ace **pp_list_head )
                                         */
 
                                        DLIST_REMOVE(list_head, curr_ace);
-                                       free(curr_ace);
+                                       SAFE_FREE(curr_ace);
                                        curr_ace_outer_next = curr_ace_outer->next; /* We may have deleted the link. */
 
                                } else {
@@ -317,7 +317,8 @@ static void merge_aces( canon_ace **pp_list_head )
                                         */
 
                                        DLIST_REMOVE(list_head, curr_ace_outer);
-                                       free(curr_ace_outer);
+                                       SAFE_FREE(curr_ace_outer);
+                                       break;
                                }
                        }
 
@@ -329,6 +330,24 @@ static void merge_aces( canon_ace **pp_list_head )
        *pp_list_head = list_head;
 }
 
+/****************************************************************************
+ Check if we need to return NT4.x compatible ACL entries.
+****************************************************************************/
+
+static BOOL nt4_compatible_acls(void)
+{
+       const char *compat = lp_acl_compatibility();
+
+       if (*compat == '\0') {
+               enum remote_arch_types ra_type = get_remote_arch();
+
+               /* Automatically adapt to client */
+               return (ra_type <= RA_WINNT);
+       } else
+               return (strequal(compat, "winnt"));
+}
+
+
 /****************************************************************************
  Map canon_ace perms to permission bits NT.
  The attr element is not used here - we only process deny entries on set,
@@ -345,7 +364,19 @@ static SEC_ACCESS map_canon_ace_perms(int *pacl_type, DOM_SID *powner_sid, canon
        if ((ace->perms & ALL_ACE_PERMS) == ALL_ACE_PERMS) {
                        nt_mask = UNIX_ACCESS_RWX;
        } else if ((ace->perms & ALL_ACE_PERMS) == (mode_t)0) {
-               nt_mask = UNIX_ACCESS_NONE;
+               /*
+                * Windows NT refuses to display ACEs with no permissions in them (but
+                * they are perfectly legal with Windows 2000). If the ACE has empty
+                * permissions we cannot use 0, so we use the otherwise unused
+                * WRITE_OWNER permission, which we ignore when we set an ACL.
+                * We abstract this into a #define of UNIX_ACCESS_NONE to allow this
+                * to be changed in the future.
+                */
+
+               if (nt4_compatible_acls())
+                       nt_mask = UNIX_ACCESS_NONE;
+               else
+                       nt_mask = 0;
        } else {
                nt_mask |= ((ace->perms & S_IRUSR) ? UNIX_ACCESS_R : 0 );
                nt_mask |= ((ace->perms & S_IWUSR) ? UNIX_ACCESS_W : 0 );
@@ -412,14 +443,13 @@ static BOOL unpack_nt_owners(SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp,
 {
        DOM_SID owner_sid;
        DOM_SID grp_sid;
-       enum SID_NAME_USE sid_type;
 
        *puser = (uid_t)-1;
        *pgrp = (gid_t)-1;
 
        if(security_info_sent == 0) {
                DEBUG(0,("unpack_nt_owners: no security info sent !\n"));
-               return False;
+               return True;
        }
 
        /*
@@ -438,8 +468,17 @@ static BOOL unpack_nt_owners(SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp,
 
        if (security_info_sent & OWNER_SECURITY_INFORMATION) {
                sid_copy(&owner_sid, psd->owner_sid);
-               if (!sid_to_uid( &owner_sid, puser, &sid_type))
-                       DEBUG(3,("unpack_nt_owners: unable to validate owner sid.\n"));
+               if (NT_STATUS_IS_ERR(sid_to_uid(&owner_sid, puser))) {
+#if ACL_FORCE_UNMAPPABLE
+                       /* this allows take ownership to work reasonably */
+                       extern struct current_user current_user;
+                       *puser = current_user.uid;
+#else
+                       DEBUG(3,("unpack_nt_owners: unable to validate owner sid for %s\n",
+                                sid_string_static(&owner_sid)));
+                       return False;
+#endif
+               }
        }
 
        /*
@@ -449,8 +488,16 @@ static BOOL unpack_nt_owners(SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp,
 
        if (security_info_sent & GROUP_SECURITY_INFORMATION) {
                sid_copy(&grp_sid, psd->grp_sid);
-               if (!sid_to_gid( &grp_sid, pgrp, &sid_type))
+               if (NT_STATUS_IS_ERR(sid_to_gid( &grp_sid, pgrp))) {
+#if ACL_FORCE_UNMAPPABLE
+                       /* this allows take group ownership to work reasonably */
+                       extern struct current_user current_user;
+                       *pgrp = current_user.gid;
+#else
                        DEBUG(3,("unpack_nt_owners: unable to validate group sid.\n"));
+                       return False;
+#endif
+               }
        }
 
        DEBUG(5,("unpack_nt_owners: owner_sids validated.\n"));
@@ -462,28 +509,29 @@ static BOOL unpack_nt_owners(SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp,
  Ensure the enforced permissions for this share apply.
 ****************************************************************************/
 
-static mode_t apply_default_perms(files_struct *fsp, mode_t perms, mode_t type)
+static void apply_default_perms(files_struct *fsp, canon_ace *pace, mode_t type)
 {
        int snum = SNUM(fsp->conn);
        mode_t and_bits = (mode_t)0;
        mode_t or_bits = (mode_t)0;
 
-       if (!lp_restrict_acl_with_mask(snum))
-               return perms;
-
        /* Get the initial bits to apply. */
 
        if (fsp->is_directory) {
-               and_bits = lp_dir_mask(snum);
-               or_bits = lp_force_dir_mode(snum);
+               and_bits = lp_dir_security_mask(snum);
+               or_bits = lp_force_dir_security_mode(snum);
        } else {
-               and_bits = lp_create_mask(snum);
-               or_bits = lp_force_create_mode(snum);
+               and_bits = lp_security_mask(snum);
+               or_bits = lp_force_security_mode(snum);
        }
 
        /* Now bounce them into the S_USR space. */     
        switch(type) {
        case S_IRUSR:
+               /* Ensure owner has read access. */
+               pace->perms |= S_IRUSR;
+               if (fsp->is_directory)
+                       pace->perms |= (S_IWUSR|S_IXUSR);
                and_bits = unix_perms_to_acl_perms(and_bits, S_IRUSR, S_IWUSR, S_IXUSR);
                or_bits = unix_perms_to_acl_perms(or_bits, S_IRUSR, S_IWUSR, S_IXUSR);
                break;
@@ -497,7 +545,40 @@ static mode_t apply_default_perms(files_struct *fsp, mode_t perms, mode_t type)
                break;
        }
 
-       return ((perms & and_bits)|or_bits);
+       pace->perms = ((pace->perms & and_bits)|or_bits);
+}
+
+/****************************************************************************
+ Check if a given uid/SID is in a group gid/SID. This is probably very
+ expensive and will need optimisation. A *lot* of optimisation :-). JRA.
+****************************************************************************/
+
+static BOOL uid_entry_in_group( canon_ace *uid_ace, canon_ace *group_ace )
+{
+       extern DOM_SID global_sid_World;
+       fstring u_name;
+       fstring g_name;
+       extern struct current_user current_user;
+
+       /* "Everyone" always matches every uid. */
+
+       if (sid_equal(&group_ace->trustee, &global_sid_World))
+               return True;
+
+       /* Assume that the current user is in the current group (force group) */
+
+       if (uid_ace->unix_ug.uid == current_user.uid && group_ace->unix_ug.gid == current_user.gid)
+               return True;
+
+       fstrcpy(u_name, uidtoname(uid_ace->unix_ug.uid));
+       fstrcpy(g_name, gidtoname(group_ace->unix_ug.gid));
+
+       /*
+        * Due to the winbind interfaces we need to do this via names,
+        * not uids/gids.
+        */
+
+       return user_in_group_list(u_name, g_name, NULL, 0);
 }
 
 /****************************************************************************
@@ -522,24 +603,24 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
        BOOL got_user = False;
        BOOL got_grp = False;
        BOOL got_other = False;
+       canon_ace *pace_other = NULL;
+       canon_ace *pace_group = NULL;
+       connection_struct *conn = fsp->conn;
+       SMB_ACL_T current_posix_acl = NULL;
+       mode_t current_user_perms = 0;
+       mode_t current_grp_perms = 0;
+       mode_t current_other_perms = 0;
+       BOOL got_current_user = False;
+       BOOL got_current_grp = False;
+       BOOL got_current_other = False;
 
        for (pace = *pp_ace; pace; pace = pace->next) {
                if (pace->type == SMB_ACL_USER_OBJ) {
 
-                       if (setting_acl) {
-                               /* Ensure owner has read access. */
-                               pace->perms |= S_IRUSR;
-                               if (fsp->is_directory)
-                                       pace->perms |= (S_IWUSR|S_IXUSR);
-
-                               /*
-                                * Ensure create mask/force create mode is respected on set.
-                                */
-
-                               pace->perms = apply_default_perms(fsp, pace->perms, S_IRUSR);
-                       }
-
+                       if (setting_acl)
+                               apply_default_perms(fsp, pace, S_IRUSR);
                        got_user = True;
+
                } else if (pace->type == SMB_ACL_GROUP_OBJ) {
 
                        /*
@@ -547,8 +628,10 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
                         */
 
                        if (setting_acl)
-                               pace->perms = apply_default_perms(fsp, pace->perms, S_IRGRP);
+                               apply_default_perms(fsp, pace, S_IRGRP);
                        got_grp = True;
+                       pace_group = pace;
+
                } else if (pace->type == SMB_ACL_OTHER) {
 
                        /*
@@ -556,8 +639,65 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
                         */
 
                        if (setting_acl)
-                               pace->perms = apply_default_perms(fsp, pace->perms, S_IROTH);
+                               apply_default_perms(fsp, pace, S_IROTH);
                        got_other = True;
+                       pace_other = pace;
+               }
+       }
+
+       /*
+        * When setting ACLs and missing one out of SMB_ACL_USER_OBJ,
+        * SMB_ACL_GROUP_OBJ, SMB_ACL_OTHER, try to retrieve current
+        * values. For user and other a simple SMB_VFS_STAT would do, but
+        * we would get mask instead of group. Let's do it via ACL.
+        */
+
+       if (setting_acl && (!got_user || !got_grp || !got_other)) {
+
+               SMB_ACL_ENTRY_T entry;
+               int entry_id = SMB_ACL_FIRST_ENTRY;
+
+               if(fsp->is_directory || fsp->fd == -1) {
+                       current_posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fsp->fsp_name, SMB_ACL_TYPE_ACCESS);
+               } else {
+                       current_posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp, fsp->fd);
+               }
+
+               if (current_posix_acl) {
+                       while (SMB_VFS_SYS_ACL_GET_ENTRY(conn, current_posix_acl, entry_id, &entry) == 1) {
+                               SMB_ACL_TAG_T tagtype;
+                               SMB_ACL_PERMSET_T permset;
+
+                               /* get_next... */
+                               if (entry_id == SMB_ACL_FIRST_ENTRY)
+                                       entry_id = SMB_ACL_NEXT_ENTRY;
+
+                               /* Is this a MASK entry ? */
+                               if (SMB_VFS_SYS_ACL_GET_TAG_TYPE(conn, entry, &tagtype) == -1)
+                                       continue;
+
+                               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, entry, &permset) == -1)
+                                       continue;
+
+                               switch(tagtype) {
+                                       case SMB_ACL_USER_OBJ:
+                                               current_user_perms = convert_permset_to_mode_t(conn, permset);
+                                               got_current_user = True;
+                                               break;
+                                       case SMB_ACL_GROUP_OBJ:
+                                               current_grp_perms = convert_permset_to_mode_t(conn, permset);
+                                               got_current_grp = True;
+                                               break;
+                                       case SMB_ACL_OTHER:
+                                               current_other_perms = convert_permset_to_mode_t(conn, permset);
+                                               got_current_other = True;
+                                               break;
+                               }
+                       }
+                       SMB_VFS_SYS_ACL_FREE_ACL(conn, current_posix_acl);
+               } else {
+                       DEBUG(10,("ensure_canon_entry_valid: failed to retrieve current ACL of %s\n",
+                               fsp->fsp_name));
                }
        }
 
@@ -571,10 +711,28 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
                pace->type = SMB_ACL_USER_OBJ;
                pace->owner_type = UID_ACE;
                pace->unix_ug.uid = pst->st_uid;
-               pace->sid = *pfile_owner_sid;
-               pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRUSR, S_IWUSR, S_IXUSR);
+               pace->trustee = *pfile_owner_sid;
                pace->attr = ALLOW_ACE;
 
+               if (setting_acl) {
+                       if (got_current_user) {
+                               pace->perms = current_user_perms;
+                       } else {
+                               /* If we only got an "everyone" perm, just use that. */
+                               if (!got_grp && got_other)
+                                       pace->perms = pace_other->perms;
+                               else if (got_grp && uid_entry_in_group(pace, pace_group))
+                                       pace->perms = pace_group->perms;
+                               else
+                                       pace->perms = 0;
+
+                       }
+
+                       apply_default_perms(fsp, pace, S_IRUSR);
+               } else {
+                       pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRUSR, S_IWUSR, S_IXUSR);
+               }
+
                DLIST_ADD(*pp_ace, pace);
        }
 
@@ -588,9 +746,22 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
                pace->type = SMB_ACL_GROUP_OBJ;
                pace->owner_type = GID_ACE;
                pace->unix_ug.uid = pst->st_gid;
-               pace->sid = *pfile_grp_sid;
-               pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRGRP, S_IWGRP, S_IXGRP);
+               pace->trustee = *pfile_grp_sid;
                pace->attr = ALLOW_ACE;
+               if (setting_acl) {
+                       if (got_current_grp) {
+                               pace->perms = current_grp_perms;
+                       } else {
+                               /* If we only got an "everyone" perm, just use that. */
+                               if (got_other)
+                                       pace->perms = pace_other->perms;
+                               else
+                                       pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRGRP, S_IWGRP, S_IXGRP);
+                       }
+                       apply_default_perms(fsp, pace, S_IRGRP);
+               } else {
+                       pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRGRP, S_IWGRP, S_IXGRP);
+               }
 
                DLIST_ADD(*pp_ace, pace);
        }
@@ -605,9 +776,16 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
                pace->type = SMB_ACL_OTHER;
                pace->owner_type = WORLD_ACE;
                pace->unix_ug.world = -1;
-               pace->sid = global_sid_World;
-               pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IROTH, S_IWOTH, S_IXOTH);
+               pace->trustee = global_sid_World;
                pace->attr = ALLOW_ACE;
+               if (setting_acl) {
+                       if (got_current_other)
+                               pace->perms = current_other_perms;
+                       else
+                               pace->perms = 0;
+                       apply_default_perms(fsp, pace, S_IROTH);
+               } else
+                       pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IROTH, S_IWOTH, S_IXOTH);
 
                DLIST_ADD(*pp_ace, pace);
        }
@@ -615,6 +793,51 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
        return True;
 }
 
+/****************************************************************************
+ Check if a POSIX ACL has the required SMB_ACL_USER_OBJ and SMB_ACL_GROUP_OBJ entries.
+ If it does not have them, check if there are any entries where the trustee is the
+ file owner or the owning group, and map these to SMB_ACL_USER_OBJ and SMB_ACL_GROUP_OBJ.
+****************************************************************************/
+
+static void check_owning_objs(canon_ace *ace, DOM_SID *pfile_owner_sid, DOM_SID *pfile_grp_sid)
+{
+       BOOL got_user_obj, got_group_obj;
+       canon_ace *current_ace;
+       int i, entries;
+
+       entries = count_canon_ace_list(ace);
+       got_user_obj = False;
+       got_group_obj = False;
+
+       for (i=0, current_ace = ace; i < entries; i++, current_ace = current_ace->next) {
+               if (current_ace->type == SMB_ACL_USER_OBJ)
+                       got_user_obj = True;
+               else if (current_ace->type == SMB_ACL_GROUP_OBJ)
+                       got_group_obj = True;
+       }
+       if (got_user_obj && got_group_obj) {
+               DEBUG(10,("check_owning_objs: ACL had owning user/group entries.\n"));
+               return;
+       }
+
+       for (i=0, current_ace = ace; i < entries; i++, current_ace = current_ace->next) {
+               if (!got_user_obj && current_ace->owner_type == UID_ACE &&
+                               sid_equal(&current_ace->trustee, pfile_owner_sid)) {
+                       current_ace->type = SMB_ACL_USER_OBJ;
+                       got_user_obj = True;
+               }
+               if (!got_group_obj && current_ace->owner_type == GID_ACE &&
+                               sid_equal(&current_ace->trustee, pfile_grp_sid)) {
+                       current_ace->type = SMB_ACL_GROUP_OBJ;
+                       got_group_obj = True;
+               }
+       }
+       if (!got_user_obj)
+               DEBUG(10,("check_owning_objs: ACL is missing an owner entry.\n"));
+       if (!got_group_obj)
+               DEBUG(10,("check_owning_objs: ACL is missing an owning group entry.\n"));
+}
+
 /****************************************************************************
  Unpack a SEC_DESC into two canonical ace lists.
 ****************************************************************************/
@@ -625,6 +848,8 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
                                                        canon_ace **ppfile_ace, canon_ace **ppdir_ace,
                                                        SEC_ACL *dacl)
 {
+       extern DOM_SID global_sid_Creator_Owner;
+       extern DOM_SID global_sid_Creator_Group;
        extern DOM_SID global_sid_World;
        extern struct generic_mapping file_generic_mapping;
        BOOL all_aces_are_inherit_only = (fsp->is_directory ? True : False);
@@ -634,39 +859,96 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
        canon_ace *current_ace = NULL;
        BOOL got_dir_allow = False;
        BOOL got_file_allow = False;
-       int i;
+       int i, j;
 
        *ppfile_ace = NULL;
        *ppdir_ace = NULL;
 
+       /*
+        * Convert the incoming ACL into a more regular form.
+        */
+
        for(i = 0; i < dacl->num_aces; i++) {
-               enum SID_NAME_USE sid_type;
                SEC_ACE *psa = &dacl->ace[i];
 
                if((psa->type != SEC_ACE_TYPE_ACCESS_ALLOWED) && (psa->type != SEC_ACE_TYPE_ACCESS_DENIED)) {
-                       free_canon_ace_list(file_ace);
-                       free_canon_ace_list(dir_ace);
                        DEBUG(3,("create_canon_ace_lists: unable to set anything but an ALLOW or DENY ACE.\n"));
                        return False;
                }
 
-               /*
-                * The security mask may be UNIX_ACCESS_NONE which should map into
-                * no permissions (we overload the WRITE_OWNER bit for this) or it
-                * should be one of the ALL/EXECUTE/READ/WRITE bits. Arrange for this
-                * to be so. Any other bits override the UNIX_ACCESS_NONE bit.
-                */
+               if (nt4_compatible_acls()) {
+                       /*
+                        * The security mask may be UNIX_ACCESS_NONE which should map into
+                        * no permissions (we overload the WRITE_OWNER bit for this) or it
+                        * should be one of the ALL/EXECUTE/READ/WRITE bits. Arrange for this
+                        * to be so. Any other bits override the UNIX_ACCESS_NONE bit.
+                        */
 
-               /*
-                * Convert GENERIC bits to specific bits.
-                */
+                       /*
+                        * Convert GENERIC bits to specific bits.
+                        */
  
-               se_map_generic(&psa->info.mask, &file_generic_mapping);
+                       se_map_generic(&psa->info.mask, &file_generic_mapping);
+
+                       psa->info.mask &= (UNIX_ACCESS_NONE|FILE_ALL_ACCESS);
+
+                       if(psa->info.mask != UNIX_ACCESS_NONE)
+                               psa->info.mask &= ~UNIX_ACCESS_NONE;
+               }
+       }
+
+       /*
+        * Deal with the fact that NT 4.x re-writes the canonical format
+        * that we return for default ACLs. If a directory ACE is identical
+        * to a inherited directory ACE then NT changes the bits so that the
+        * first ACE is set to OI|IO and the second ACE for this SID is set
+        * to CI. We need to repair this. JRA.
+        */
+
+       for(i = 0; i < dacl->num_aces; i++) {
+               SEC_ACE *psa1 = &dacl->ace[i];
+
+               for (j = i + 1; j < dacl->num_aces; j++) {
+                       SEC_ACE *psa2 = &dacl->ace[j];
+
+                       if (psa1->info.mask != psa2->info.mask)
+                               continue;
+
+                       if (!sid_equal(&psa1->trustee, &psa2->trustee))
+                               continue;
+
+                       /*
+                        * Ok - permission bits and SIDs are equal.
+                        * Check if flags were re-written.
+                        */
 
-               psa->info.mask &= (UNIX_ACCESS_NONE|FILE_ALL_ACCESS);
+                       if (psa1->flags & SEC_ACE_FLAG_INHERIT_ONLY) {
 
-               if(psa->info.mask != UNIX_ACCESS_NONE)
-                       psa->info.mask &= ~UNIX_ACCESS_NONE;
+                               psa1->flags |= (psa2->flags & (SEC_ACE_FLAG_CONTAINER_INHERIT|SEC_ACE_FLAG_OBJECT_INHERIT));
+                               psa2->flags &= ~(SEC_ACE_FLAG_CONTAINER_INHERIT|SEC_ACE_FLAG_OBJECT_INHERIT);
+                               
+                       } else if (psa2->flags & SEC_ACE_FLAG_INHERIT_ONLY) {
+
+                               psa2->flags |= (psa1->flags & (SEC_ACE_FLAG_CONTAINER_INHERIT|SEC_ACE_FLAG_OBJECT_INHERIT));
+                               psa1->flags &= ~(SEC_ACE_FLAG_CONTAINER_INHERIT|SEC_ACE_FLAG_OBJECT_INHERIT);
+                               
+                       }
+               }
+       }
+
+       for(i = 0; i < dacl->num_aces; i++) {
+               SEC_ACE *psa = &dacl->ace[i];
+
+               /*
+                * Ignore non-mappable SIDs (NT Authority, BUILTIN etc).
+                */
+
+               if (non_mappable_sid(&psa->trustee)) {
+                       fstring str;
+                       DEBUG(10,("create_canon_ace_lists: ignoring non-mappable SID %s\n",
+                               sid_to_string(str, &psa->trustee) ));
+                       continue;
+               }
 
                /*
                 * Create a cannon_ace entry representing this NT DACL ACE.
@@ -681,28 +963,58 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
 
                ZERO_STRUCTP(current_ace);
 
-               sid_copy(&current_ace->sid, &psa->sid);
+               sid_copy(&current_ace->trustee, &psa->trustee);
 
                /*
                 * Try and work out if the SID is a user or group
                 * as we need to flag these differently for POSIX.
+                * Note what kind of a POSIX ACL this should map to.
                 */
 
-               if( sid_equal(&current_ace->sid, &global_sid_World)) {
+               if( sid_equal(&current_ace->trustee, &global_sid_World)) {
                        current_ace->owner_type = WORLD_ACE;
                        current_ace->unix_ug.world = -1;
-               } else if (sid_to_uid( &current_ace->sid, &current_ace->unix_ug.uid, &sid_type)) {
+                       current_ace->type = SMB_ACL_OTHER;
+               } else if (sid_equal(&current_ace->trustee, &global_sid_Creator_Owner)) {
                        current_ace->owner_type = UID_ACE;
-               } else if (sid_to_gid( &current_ace->sid, &current_ace->unix_ug.gid, &sid_type)) {
+                       current_ace->unix_ug.world = -1;
+                       current_ace->type = SMB_ACL_USER_OBJ;
+
+                       /*
+                        * The Creator Owner entry only specifies inheritable permissions,
+                        * never access permissions. WinNT doesn't always set the ACE to
+                        *INHERIT_ONLY, though.
+                        */
+
+                       if (nt4_compatible_acls())
+                               psa->flags |= SEC_ACE_FLAG_INHERIT_ONLY;
+               } else if (sid_equal(&current_ace->trustee, &global_sid_Creator_Group)) {
+                       current_ace->owner_type = GID_ACE;
+                       current_ace->unix_ug.world = -1;
+                       current_ace->type = SMB_ACL_GROUP_OBJ;
+
+                       /*
+                        * The Creator Group entry only specifies inheritable permissions,
+                        * never access permissions. WinNT doesn't always set the ACE to
+                        *INHERIT_ONLY, though.
+                        */
+                       if (nt4_compatible_acls())
+                               psa->flags |= SEC_ACE_FLAG_INHERIT_ONLY;
+
+               } else if (NT_STATUS_IS_OK(sid_to_gid( &current_ace->trustee, &current_ace->unix_ug.gid))) {
                        current_ace->owner_type = GID_ACE;
+                       current_ace->type = SMB_ACL_GROUP;
+               } else if (NT_STATUS_IS_OK(sid_to_uid( &current_ace->trustee, &current_ace->unix_ug.uid))) {
+                       current_ace->owner_type = UID_ACE;
+                       current_ace->type = SMB_ACL_USER;
                } else {
                        fstring str;
 
                        free_canon_ace_list(file_ace);
                        free_canon_ace_list(dir_ace);
-                       free(current_ace);
                        DEBUG(0,("create_canon_ace_lists: unable to map SID %s to uid or gid.\n",
-                               sid_to_string(str, &current_ace->sid) ));
+                               sid_to_string(str, &current_ace->trustee) ));
+                       SAFE_FREE(current_ace);
                        return False;
                }
 
@@ -714,31 +1026,6 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
                current_ace->perms |= map_nt_perms( psa->info, S_IRUSR);
                current_ace->attr = (psa->type == SEC_ACE_TYPE_ACCESS_ALLOWED) ? ALLOW_ACE : DENY_ACE;
 
-               /*
-                * Now note what kind of a POSIX ACL this should map to.
-                */
-
-               if(sid_equal(&current_ace->sid, pfile_owner_sid)) {
-
-                       current_ace->type = SMB_ACL_USER_OBJ;
-
-               } else if( sid_equal(&current_ace->sid, pfile_grp_sid)) {
-
-                       current_ace->type = SMB_ACL_GROUP_OBJ;
-
-               } else if( sid_equal(&current_ace->sid, &global_sid_World)) {
-
-                       current_ace->type = SMB_ACL_OTHER;
-
-               } else {
-                       /*
-                        * Could be a SMB_ACL_USER or SMB_ACL_GROUP. Check by
-                        * looking at owner_type.
-                        */
-
-                       current_ace->type = (current_ace->owner_type == UID_ACE) ? SMB_ACL_USER : SMB_ACL_GROUP;
-               }
-
                /*
                 * Now add the created ace to either the file list, the directory
                 * list, or both. We *MUST* preserve the order here (hence we use
@@ -770,7 +1057,7 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
 Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
                                        free_canon_ace_list(file_ace);
                                        free_canon_ace_list(dir_ace);
-                                       free(current_ace);
+                                       SAFE_FREE(current_ace);
                                        return False;
                                }       
 
@@ -794,8 +1081,16 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
                                                return False;
                                        }
 
+                                       /*
+                                        * We must not free current_ace here as its
+                                        * pointer is now owned by the dir_ace list.
+                                        */
                                        current_ace = dup_ace;
                                } else {
+                                       /*
+                                        * We must not free current_ace here as its
+                                        * pointer is now owned by the dir_ace list.
+                                        */
                                        current_ace = NULL;
                                }
                        }
@@ -821,7 +1116,7 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
 Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
                                free_canon_ace_list(file_ace);
                                free_canon_ace_list(dir_ace);
-                               free(current_ace);
+                               SAFE_FREE(current_ace);
                                return False;
                        }       
 
@@ -830,6 +1125,10 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
                                print_canon_ace( current_ace, 0);
                        }
                        all_aces_are_inherit_only = False;
+                       /*
+                        * We must not free current_ace here as its
+                        * pointer is now owned by the file_ace list.
+                        */
                        current_ace = NULL;
                }
 
@@ -837,8 +1136,7 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
                 * Free if ACE was not added.
                 */
 
-               if (current_ace)
-                       free(current_ace);
+               SAFE_FREE(current_ace);
        }
 
        if (fsp->is_directory && all_aces_are_inherit_only) {
@@ -853,6 +1151,15 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
                free_canon_ace_list(dir_ace);
                file_ace = NULL;
                dir_ace = NULL;
+       } else {
+               /*
+                * Check if we have SMB_ACL_USER_OBJ and SMB_ACL_GROUP_OBJ entries in each
+                * ACL. If we don't have them, check if any SMB_ACL_USER/SMB_ACL_GROUP
+                * entries can be converted to *_OBJ. Usually we will already have these
+                * entries in the Default ACL, and the Access ACL will not have them.
+                */
+               check_owning_objs(file_ace, pfile_owner_sid, pfile_grp_sid);
+               check_owning_objs(dir_ace, pfile_owner_sid, pfile_grp_sid);
        }
 
        *ppfile_ace = file_ace;
@@ -861,40 +1168,10 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
        return True;
 }
 
-/****************************************************************************
- Check if a given uid/SID is in a group gid/SID. This is probably very
- expensive and will need optimisation. A *lot* of optimisation :-). JRA.
-****************************************************************************/
-
-static BOOL uid_entry_in_group( canon_ace *uid_ace, canon_ace *group_ace )
-{
-       extern DOM_SID global_sid_World;
-       struct passwd *pass = NULL;
-       struct group *gptr = NULL;
-
-       /* "Everyone" always matches every uid. */
-
-       if (sid_equal(&group_ace->sid, &global_sid_World))
-               return True;
-
-       if (!(pass = sys_getpwuid(uid_ace->unix_ug.uid)))
-               return False;
-
-       if (!(gptr = getgrgid(group_ace->unix_ug.gid)))
-               return False;
-
-       /*
-        * Due to the winbind interfaces we need to do this via names,
-        * not uids/gids.
-        */
-
-       return user_in_group_list(pass->pw_name, gptr->gr_name );
-}
-
 /****************************************************************************
  ASCII art time again... JRA :-).
 
- We have 3 cases to process when moving from an NT ACL to a POSIX ACL. Firstly,
+ We have 4 cases to process when moving from an NT ACL to a POSIX ACL. Firstly,
  we insist the ACL is in canonical form (ie. all DENY entries preceede ALLOW
  entries). Secondly, the merge code has ensured that all duplicate SID entries for
  allow or deny have been merged, so the same SID can only appear once in the deny
@@ -967,6 +1244,15 @@ static BOOL uid_entry_in_group( canon_ace *uid_ace, canon_ace *group_ace )
  best we can do and has the advantage of failing closed rather
  than open.
  ---------------------------------------------------------------------------
+ Fourth pass - cope with cumulative permissions.
+
+ for all allow user entries, if there exists an allow group entry with
+ more permissive permissions, and the user is in that group, rewrite the
+ allow user permissions to contain both sets of permissions.
+
+ Currently the code for this is #ifdef'ed out as these semantics make
+ no sense to me. JRA.
+ ---------------------------------------------------------------------------
 
  Note we *MUST* do the deny user pass first as this will convert deny user
  entries into allow user entries which can then be processed by the deny
@@ -1011,7 +1297,7 @@ static void process_deny_list( canon_ace **pp_ace_list )
                        continue;
                }
 
-               if (!sid_equal(&curr_ace->sid, &global_sid_World))
+               if (!sid_equal(&curr_ace->trustee, &global_sid_World))
                        continue;
 
                /* JRATEST - assert. */
@@ -1156,6 +1442,45 @@ static void process_deny_list( canon_ace **pp_ace_list )
 
        }
 
+       /* Doing this fourth pass allows Windows semantics to be layered
+        * on top of POSIX semantics. I'm not sure if this is desirable.
+        * For example, in W2K ACLs there is no way to say, "Group X no
+        * access, user Y full access" if user Y is a member of group X.
+        * This seems completely broken semantics to me.... JRA.
+        */
+
+#if 0
+       /* Pass 4 above - deal with allow entries. */
+
+       for (curr_ace = ace_list; curr_ace; curr_ace = curr_ace_next) {
+               canon_ace *allow_ace_p;
+
+               curr_ace_next = curr_ace->next; /* So we can't lose the link. */
+
+               if (curr_ace->attr != ALLOW_ACE)
+                       continue;
+
+               if (curr_ace->owner_type != UID_ACE)
+                       continue;
+
+               for (allow_ace_p = ace_list; allow_ace_p; allow_ace_p = allow_ace_p->next) {
+
+                       if (allow_ace_p->attr != ALLOW_ACE)
+                               continue;
+
+                       /* We process GID_ACE entries only. */
+
+                       if (allow_ace_p->owner_type != GID_ACE)
+                               continue;
+
+                       /* OR in the group perms. */
+
+                       if (uid_entry_in_group( curr_ace, allow_ace_p))
+                               curr_ace->perms |= allow_ace_p->perms;
+               }
+       }
+#endif
+
        *pp_ace_list = ace_list;
 }
 
@@ -1174,20 +1499,17 @@ static mode_t create_default_mode(files_struct *fsp, BOOL interitable_mode)
        if (fsp->is_directory)
                mode |= (S_IWUSR|S_IXUSR);
 
-       if (!lp_restrict_acl_with_mask(snum))
-               return mode;
-
        /*
         * Now AND with the create mode/directory mode bits then OR with the
         * force create mode/force directory mode bits.
         */
 
        if (fsp->is_directory) {
-               and_bits = lp_dir_mask(snum);
-               or_bits = lp_force_dir_mode(snum);
+               and_bits = lp_dir_security_mask(snum);
+               or_bits = lp_force_dir_security_mode(snum);
        } else {
-               and_bits = lp_create_mask(snum);
-               or_bits = lp_force_create_mode(snum);
+               and_bits = lp_security_mask(snum);
+               or_bits = lp_force_security_mode(snum);
        }
 
        return ((mode & and_bits)|or_bits);
@@ -1291,7 +1613,7 @@ static BOOL unpack_canon_ace(files_struct *fsp,
 
        pst->st_mode = create_default_mode(fsp, True);
 
-       if (!ensure_canon_entry_valid(&dir_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst, True)) {
+       if (dir_ace && !ensure_canon_entry_valid(&dir_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst, True)) {
                free_canon_ace_list(file_ace);
                free_canon_ace_list(dir_ace);
                return False;
@@ -1314,14 +1636,13 @@ static BOOL unpack_canon_ace(files_struct *fsp,
 
  Note that this doesn't exactly match the NT semantics for an ACL. As POSIX entries
  are not ordered, and match on the most specific entry rather than walking a list,
- then a simple POSIX permission of rw-r--r-- should really map to 6 entries,
+ then a simple POSIX permission of rw-r--r-- should really map to 5 entries,
 
  Entry 0: owner : deny all except read and write.
  Entry 1: group : deny all except read.
- Entry 2: Everyone : deny all except read.
- Entry 3: owner : allow read and write.
- Entry 4: group : allow read.
- Entry 5: Everyone : allow read.
+ Entry 2: owner : allow read and write.
+ Entry 3: group : allow read.
+ Entry 4: Everyone : allow read.
 
  But NT cannot display this in their ACL editor !
 ********************************************************************************/
@@ -1371,9 +1692,10 @@ static void arrange_posix_perms( char *filename, canon_ace **pp_list_head)
 ****************************************************************************/
 
 static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_STRUCT_STAT *psbuf,
-                                                                       DOM_SID *powner, DOM_SID *pgroup)
+                                       DOM_SID *powner, DOM_SID *pgroup, SMB_ACL_TYPE_T the_acl_type)
 {
        extern DOM_SID global_sid_World;
+       connection_struct *conn = fsp->conn;
        mode_t acl_mask = (S_IRUSR|S_IWUSR|S_IXUSR);
        canon_ace *list_head = NULL;
        canon_ace *ace = NULL;
@@ -1382,7 +1704,7 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
        SMB_ACL_ENTRY_T entry;
        size_t ace_count;
 
-       while ( posix_acl && (sys_acl_get_entry(posix_acl, entry_id, &entry) == 1)) {
+       while ( posix_acl && (SMB_VFS_SYS_ACL_GET_ENTRY(conn, posix_acl, entry_id, &entry) == 1)) {
                SMB_ACL_TAG_T tagtype;
                SMB_ACL_PERMSET_T permset;
                DOM_SID sid;
@@ -1394,42 +1716,51 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
                        entry_id = SMB_ACL_NEXT_ENTRY;
 
                /* Is this a MASK entry ? */
-               if (sys_acl_get_tag_type(entry, &tagtype) == -1)
+               if (SMB_VFS_SYS_ACL_GET_TAG_TYPE(conn, entry, &tagtype) == -1)
                        continue;
 
-               if (sys_acl_get_permset(entry, &permset) == -1)
+               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, entry, &permset) == -1)
                        continue;
 
                /* Decide which SID to use based on the ACL type. */
                switch(tagtype) {
                        case SMB_ACL_USER_OBJ:
                                /* Get the SID from the owner. */
-                               uid_to_sid( &sid, psbuf->st_uid );
+                               sid_copy(&sid, powner);
                                unix_ug.uid = psbuf->st_uid;
                                owner_type = UID_ACE;
                                break;
                        case SMB_ACL_USER:
                                {
-                                       uid_t *puid = (uid_t *)sys_acl_get_qualifier(entry);
+                                       uid_t *puid = (uid_t *)SMB_VFS_SYS_ACL_GET_QUALIFIER(conn, entry);
                                        if (puid == NULL) {
                                                DEBUG(0,("canonicalise_acl: Failed to get uid.\n"));
                                                continue;
                                        }
+                                       /*
+                                        * A SMB_ACL_USER entry for the owner is shadowed by the
+                                        * SMB_ACL_USER_OBJ entry and Windows also cannot represent
+                                        * that entry, so we ignore it. We also don't create such
+                                        * entries out of the blue when setting ACLs, so a get/set
+                                        * cycle will drop them.
+                                        */
+                                       if (the_acl_type == SMB_ACL_TYPE_ACCESS && *puid == psbuf->st_uid)
+                                               continue;
                                        uid_to_sid( &sid, *puid);
                                        unix_ug.uid = *puid;
                                        owner_type = UID_ACE;
-                                       sys_acl_free_qualifier((void *)puid);
+                                       SMB_VFS_SYS_ACL_FREE_QUALIFIER(conn, (void *)puid,tagtype);
                                        break;
                                }
                        case SMB_ACL_GROUP_OBJ:
                                /* Get the SID from the owning group. */
-                               gid_to_sid( &sid, psbuf->st_gid );
+                               sid_copy(&sid, pgroup);
                                unix_ug.gid = psbuf->st_gid;
                                owner_type = GID_ACE;
                                break;
                        case SMB_ACL_GROUP:
                                {
-                                       gid_t *pgid = (gid_t *)sys_acl_get_qualifier(entry);
+                                       gid_t *pgid = (gid_t *)SMB_VFS_SYS_ACL_GET_QUALIFIER(conn, entry);
                                        if (pgid == NULL) {
                                                DEBUG(0,("canonicalise_acl: Failed to get gid.\n"));
                                                continue;
@@ -1437,11 +1768,11 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
                                        gid_to_sid( &sid, *pgid);
                                        unix_ug.gid = *pgid;
                                        owner_type = GID_ACE;
-                                       sys_acl_free_qualifier((void *)pgid);
+                                       SMB_VFS_SYS_ACL_FREE_QUALIFIER(conn, (void *)pgid,tagtype);
                                        break;
                                }
                        case SMB_ACL_MASK:
-                               acl_mask = convert_permset_to_mode_t(permset);
+                               acl_mask = convert_permset_to_mode_t(conn, permset);
                                continue; /* Don't count the mask as an entry. */
                        case SMB_ACL_OTHER:
                                /* Use the Everyone SID */
@@ -1463,9 +1794,9 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
 
                ZERO_STRUCTP(ace);
                ace->type = tagtype;
-               ace->perms = convert_permset_to_mode_t(permset);
+               ace->perms = convert_permset_to_mode_t(conn, permset);
                ace->attr = ALLOW_ACE;
-               ace->sid = sid;
+               ace->trustee = sid;
                ace->unix_ug = unix_ug;
                ace->owner_type = owner_type;
 
@@ -1520,13 +1851,22 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
 
 static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL default_ace, BOOL *pacl_set_support)
 {
+       connection_struct *conn = fsp->conn;
        BOOL ret = False;
-       SMB_ACL_T the_acl = sys_acl_init((int)count_canon_ace_list(the_ace) + 1);
+       SMB_ACL_T the_acl = SMB_VFS_SYS_ACL_INIT(conn, (int)count_canon_ace_list(the_ace) + 1);
        canon_ace *p_ace;
        int i;
        SMB_ACL_ENTRY_T mask_entry;
+       BOOL got_mask_entry = False;
        SMB_ACL_PERMSET_T mask_permset;
        SMB_ACL_TYPE_T the_acl_type = (default_ace ? SMB_ACL_TYPE_DEFAULT : SMB_ACL_TYPE_ACCESS);
+       BOOL needs_mask = False;
+       mode_t mask_perms = 0;
+
+#if defined(POSIX_ACL_NEEDS_MASK)
+       /* HP-UX always wants to have a mask (called "class" there). */
+       needs_mask = True;
+#endif
 
        if (the_acl == NULL) {
 
@@ -1542,20 +1882,46 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                return False;
        }
 
+       if( DEBUGLVL( 10 )) {
+               dbgtext("set_canon_ace_list: setting ACL:\n");
+               for (i = 0, p_ace = the_ace; p_ace; p_ace = p_ace->next, i++ ) {
+                       print_canon_ace( p_ace, i);
+               }
+       }
+
        for (i = 0, p_ace = the_ace; p_ace; p_ace = p_ace->next, i++ ) {
                SMB_ACL_ENTRY_T the_entry;
                SMB_ACL_PERMSET_T the_permset;
 
+               /*
+                * ACLs only "need" an ACL_MASK entry if there are any named user or
+                * named group entries. But if there is an ACL_MASK entry, it applies
+                * to ACL_USER, ACL_GROUP, and ACL_GROUP_OBJ entries. Set the mask
+                * so that it doesn't deny (i.e., mask off) any permissions.
+                */
+
+               if (p_ace->type == SMB_ACL_USER || p_ace->type == SMB_ACL_GROUP) {
+                       needs_mask = True;
+                       mask_perms |= p_ace->perms;
+               } else if (p_ace->type == SMB_ACL_GROUP_OBJ) {
+                       mask_perms |= p_ace->perms;
+               }
+
                /*
                 * Get the entry for this ACE.
                 */
 
-               if (sys_acl_create_entry( &the_acl, &the_entry) == -1) {
+               if (SMB_VFS_SYS_ACL_CREATE_ENTRY(conn, &the_acl, &the_entry) == -1) {
                        DEBUG(0,("set_canon_ace_list: Failed to create entry %d. (%s)\n",
                                i, strerror(errno) ));
                        goto done;
                }
 
+               if (p_ace->type == SMB_ACL_MASK) {
+                       mask_entry = the_entry;
+                       got_mask_entry = True;
+               }
+
                /*
                 * Ok - we now know the ACL calls should be working, don't
                 * allow fallback to chmod.
@@ -1571,7 +1937,7 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                 * First tell the entry what type of ACE this is.
                 */
 
-               if (sys_acl_set_tag_type(the_entry, p_ace->type) == -1) {
+               if (SMB_VFS_SYS_ACL_SET_TAG_TYPE(conn, the_entry, p_ace->type) == -1) {
                        DEBUG(0,("set_canon_ace_list: Failed to set tag type on entry %d. (%s)\n",
                                i, strerror(errno) ));
                        goto done;
@@ -1583,7 +1949,7 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                 */
 
                if ((p_ace->type == SMB_ACL_USER) || (p_ace->type == SMB_ACL_GROUP)) {
-                       if (sys_acl_set_qualifier(the_entry,(void *)&p_ace->unix_ug.uid) == -1) {
+                       if (SMB_VFS_SYS_ACL_SET_QUALIFIER(conn, the_entry,(void *)&p_ace->unix_ug.uid) == -1) {
                                DEBUG(0,("set_canon_ace_list: Failed to set qualifier on entry %d. (%s)\n",
                                        i, strerror(errno) ));
                                goto done;
@@ -1594,13 +1960,13 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                 * Convert the mode_t perms in the canon_ace to a POSIX permset.
                 */
 
-               if (sys_acl_get_permset(the_entry, &the_permset) == -1) {
+               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, the_entry, &the_permset) == -1) {
                        DEBUG(0,("set_canon_ace_list: Failed to get permset on entry %d. (%s)\n",
                                i, strerror(errno) ));
                        goto done;
                }
 
-               if (map_acl_perms_to_permset(p_ace->perms, &the_permset) == -1) {
+               if (map_acl_perms_to_permset(conn, p_ace->perms, &the_permset) == -1) {
                        DEBUG(0,("set_canon_ace_list: Failed to create permset for mode (%u) on entry %d. (%s)\n",
                                (unsigned int)p_ace->perms, i, strerror(errno) ));
                        goto done;
@@ -1610,7 +1976,7 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                 * ..and apply them to the entry.
                 */
 
-               if (sys_acl_set_permset(the_entry, the_permset) == -1) {
+               if (SMB_VFS_SYS_ACL_SET_PERMSET(conn, the_entry, the_permset) == -1) {
                        DEBUG(0,("set_canon_ace_list: Failed to add permset on entry %d. (%s)\n",
                                i, strerror(errno) ));
                        goto done;
@@ -1620,40 +1986,38 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                        print_canon_ace( p_ace, i);
        }
 
-       /*
-        * Add in a mask of rwx.
-        */
-
-       if (sys_acl_create_entry( &the_acl, &mask_entry) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to create mask entry. (%s)\n", strerror(errno) ));
-               goto done;
-       }
+       if (needs_mask && !got_mask_entry) {
+               if (SMB_VFS_SYS_ACL_CREATE_ENTRY(conn, &the_acl, &mask_entry) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to create mask entry. (%s)\n", strerror(errno) ));
+                       goto done;
+               }
 
-       if (sys_acl_set_tag_type(mask_entry, SMB_ACL_MASK) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to set tag type on mask entry. (%s)\n",strerror(errno) ));
-               goto done;
-       }
+               if (SMB_VFS_SYS_ACL_SET_TAG_TYPE(conn, mask_entry, SMB_ACL_MASK) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to set tag type on mask entry. (%s)\n",strerror(errno) ));
+                       goto done;
+               }
 
-       if (sys_acl_get_permset(mask_entry, &mask_permset) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to get mask permset. (%s)\n", strerror(errno) ));
-               goto done;
-       }
+               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, mask_entry, &mask_permset) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to get mask permset. (%s)\n", strerror(errno) ));
+                       goto done;
+               }
 
-       if (map_acl_perms_to_permset(S_IRUSR|S_IWUSR|S_IXUSR, &mask_permset) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to create mask permset. (%s)\n", strerror(errno) ));
-               goto done;
-       }
+               if (map_acl_perms_to_permset(conn, S_IRUSR|S_IWUSR|S_IXUSR, &mask_permset) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to create mask permset. (%s)\n", strerror(errno) ));
+                       goto done;
+               }
 
-       if (sys_acl_set_permset(mask_entry, mask_permset) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to add mask permset. (%s)\n", strerror(errno) ));
-               goto done;
+               if (SMB_VFS_SYS_ACL_SET_PERMSET(conn, mask_entry, mask_permset) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to add mask permset. (%s)\n", strerror(errno) ));
+                       goto done;
+               }
        }
 
        /*
         * Check if the ACL is valid.
         */
 
-       if (sys_acl_valid(the_acl) == -1) {
+       if (SMB_VFS_SYS_ACL_VALID(conn, the_acl) == -1) {
                DEBUG(0,("set_canon_ace_list: ACL type (%s) is invalid for set (%s).\n",
                                the_acl_type == SMB_ACL_TYPE_DEFAULT ? "directory default" : "file",
                                strerror(errno) ));
@@ -1665,15 +2029,39 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
         */
 
        if(default_ace || fsp->is_directory || fsp->fd == -1) {
-               if (sys_acl_set_file(dos_to_unix(fsp->fsp_name,False), the_acl_type, the_acl) == -1) {
-                       DEBUG(0,("set_canon_ace_list: sys_acl_set_file type %s failed for file %s (%s).\n",
+               if (SMB_VFS_SYS_ACL_SET_FILE(conn, fsp->fsp_name, the_acl_type, the_acl) == -1) {
+                       /*
+                        * Some systems allow all the above calls and only fail with no ACL support
+                        * when attempting to apply the acl. HPUX with HFS is an example of this. JRA.
+                        */
+                       if (errno == ENOSYS)
+                               *pacl_set_support = False;
+
+#ifdef ENOTSUP
+                       if (errno == ENOTSUP)
+                               *pacl_set_support = False;
+#endif
+
+                       DEBUG(2,("set_canon_ace_list: sys_acl_set_file type %s failed for file %s (%s).\n",
                                        the_acl_type == SMB_ACL_TYPE_DEFAULT ? "directory default" : "file",
                                        fsp->fsp_name, strerror(errno) ));
                        goto done;
                }
        } else {
-               if (sys_acl_set_fd(fsp->fd, the_acl) == -1) {
-                       DEBUG(0,("set_canon_ace_list: sys_acl_set_file failed for file %s (%s).\n",
+               if (SMB_VFS_SYS_ACL_SET_FD(fsp, fsp->fd, the_acl) == -1) {
+                       /*
+                        * Some systems allow all the above calls and only fail with no ACL support
+                        * when attempting to apply the acl. HPUX with HFS is an example of this. JRA.
+                        */
+                       if (errno == ENOSYS)
+                               *pacl_set_support = False;
+
+#ifdef ENOTSUP
+                       if (errno == ENOTSUP)
+                               *pacl_set_support = False;
+#endif
+
+                       DEBUG(2,("set_canon_ace_list: sys_acl_set_file failed for file %s (%s).\n",
                                        fsp->fsp_name, strerror(errno) ));
                        goto done;
                }
@@ -1684,11 +2072,44 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
   done:
 
        if (the_acl != NULL)
-           sys_acl_free_acl(the_acl);
+           SMB_VFS_SYS_ACL_FREE_ACL(conn, the_acl);
 
        return ret;
 }
 
+/****************************************************************************
+ Find a particular canon_ace entry.
+****************************************************************************/
+
+static struct canon_ace *canon_ace_entry_for(struct canon_ace *list, SMB_ACL_TAG_T type, posix_id *id)
+{
+       while (list) {
+               if (list->type == type && ((type != SMB_ACL_USER && type != SMB_ACL_GROUP) ||
+                               (type == SMB_ACL_USER  && id && id->uid == list->unix_ug.uid) ||
+                               (type == SMB_ACL_GROUP && id && id->gid == list->unix_ug.gid)))
+                       break;
+               list = list->next;
+       }
+       return list;
+}
+
+/****************************************************************************
+****************************************************************************/
+
+SMB_ACL_T free_empty_sys_acl(connection_struct *conn, SMB_ACL_T acl)
+{
+       SMB_ACL_ENTRY_T entry;
+
+       if (!acl)
+               return NULL;
+       if (SMB_VFS_SYS_ACL_GET_ENTRY(conn, acl, SMB_ACL_FIRST_ENTRY, &entry) != 1) {
+               SMB_VFS_SYS_ACL_FREE_ACL(conn, acl);
+               return NULL;
+       }
+       return acl;
+}
+
 /****************************************************************************
  Convert a canon_ace to a generic 3 element permission - if possible.
 ****************************************************************************/
@@ -1703,6 +2124,8 @@ static BOOL convert_canon_ace_to_posix_perms( files_struct *fsp, canon_ace *file
        canon_ace *owner_ace = NULL;
        canon_ace *group_ace = NULL;
        canon_ace *other_ace = NULL;
+       mode_t and_bits;
+       mode_t or_bits;
 
        if (ace_count != 3) {
                DEBUG(3,("convert_canon_ace_to_posix_perms: Too many ACE entries for file %s to convert to \
@@ -1743,24 +2166,18 @@ posix perms.\n", fsp->fsp_name ));
 
        /* If requested apply the masks. */
 
-       if (lp_restrict_acl_with_mask(snum)) {
-               mode_t and_bits;
-               mode_t or_bits;
-
-               /* Get the initial bits to apply. */
-
-               if (fsp->is_directory) {
-                       and_bits = lp_dir_mask(snum);
-                       or_bits = lp_force_dir_mode(snum);
-               } else {
-                       and_bits = lp_create_mask(snum);
-                       or_bits = lp_force_create_mode(snum);
-               }
-
-               *posix_perms = (((*posix_perms) & and_bits)|or_bits);
+       /* Get the initial bits to apply. */
 
+       if (fsp->is_directory) {
+               and_bits = lp_dir_security_mask(snum);
+               or_bits = lp_force_dir_security_mode(snum);
+       } else {
+               and_bits = lp_security_mask(snum);
+               or_bits = lp_force_security_mode(snum);
        }
 
+       *posix_perms = (((*posix_perms) & and_bits)|or_bits);
+
        DEBUG(10,("convert_canon_ace_to_posix_perms: converted u=%o,g=%o,w=%o to perm=0%o for file %s.\n",
                (int)owner_ace->perms, (int)group_ace->perms, (int)other_ace->perms, (int)*posix_perms,
                fsp->fsp_name ));
@@ -1778,6 +2195,45 @@ static int nt_ace_comp( SEC_ACE *a1, SEC_ACE *a2)
        return 1;
 }
 
+/****************************************************************************
+  Incoming NT ACLs on a directory can be split into a default POSIX acl (CI|OI|IO) and
+  a normal POSIX acl. Win2k needs these split acls re-merging into one ACL
+  with CI|OI set so it is inherited and also applies to the directory.
+  Based on code from "Jim McDonough" <jmcd@us.ibm.com>.
+****************************************************************************/
+
+static size_t merge_default_aces( SEC_ACE *nt_ace_list, size_t num_aces)
+{
+       size_t i, j;
+
+       for (i = 0; i < num_aces; i++) {
+               for (j = i+1; j < num_aces; j++) {
+                       /* We know the lower number ACE's are file entries. */
+                       if ((nt_ace_list[i].type == nt_ace_list[j].type) &&
+                               (nt_ace_list[i].size == nt_ace_list[j].size) &&
+                               (nt_ace_list[i].info.mask == nt_ace_list[j].info.mask) &&
+                               sid_equal(&nt_ace_list[i].trustee, &nt_ace_list[j].trustee) &&
+                               (nt_ace_list[i].flags == 0) &&
+                               (nt_ace_list[j].flags == (SEC_ACE_FLAG_OBJECT_INHERIT|
+                                                         SEC_ACE_FLAG_CONTAINER_INHERIT|
+                                                         SEC_ACE_FLAG_INHERIT_ONLY))) {
+                               /*
+                                * These are identical except for the flags.
+                                * Merge the inherited ACE onto the non-inherited ACE.
+                                */
+
+                               nt_ace_list[i].flags = SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT;
+                               if (num_aces - j - 1 > 0)
+                                       memmove(&nt_ace_list[j], &nt_ace_list[j+1], (num_aces-j-1) *
+                                                       sizeof(SEC_ACE));
+                               num_aces--;
+                               break;
+                       }
+               }
+       }
+
+       return num_aces;
+}
 /****************************************************************************
  Reply to query a security descriptor from an fsp. If it succeeds it allocates
  the space for the return elements and returns the size needed to return the
@@ -1787,6 +2243,11 @@ static int nt_ace_comp( SEC_ACE *a1, SEC_ACE *a2)
 
 size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
 {
+       extern DOM_SID global_sid_Builtin_Administrators;
+       extern DOM_SID global_sid_Builtin_Users;
+       extern DOM_SID global_sid_Creator_Owner;
+       extern DOM_SID global_sid_Creator_Group;
+       connection_struct *conn = fsp->conn;
        SMB_STRUCT_STAT sbuf;
        SEC_ACE *nt_ace_list = NULL;
        DOM_SID owner_sid;
@@ -1800,6 +2261,7 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
        SMB_ACL_T dir_acl = NULL;
        canon_ace *file_ace = NULL;
        canon_ace *dir_ace = NULL;
+       size_t num_profile_acls = 0;
  
        *ppdesc = NULL;
 
@@ -1808,32 +2270,34 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
        if(fsp->is_directory || fsp->fd == -1) {
 
                /* Get the stat struct for the owner info. */
-               if(vfs_stat(fsp->conn,fsp->fsp_name, &sbuf) != 0) {
+               if(SMB_VFS_STAT(fsp->conn,fsp->fsp_name, &sbuf) != 0) {
                        return 0;
                }
                /*
                 * Get the ACL from the path.
                 */
 
-               posix_acl = sys_acl_get_file( dos_to_unix(fsp->fsp_name, False), SMB_ACL_TYPE_ACCESS);
+               posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fsp->fsp_name, SMB_ACL_TYPE_ACCESS);
 
                /*
                 * If it's a directory get the default POSIX ACL.
                 */
 
-               if(fsp->is_directory)
-                       dir_acl = sys_acl_get_file( dos_to_unix(fsp->fsp_name, False), SMB_ACL_TYPE_DEFAULT);
+               if(fsp->is_directory) {
+                       dir_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fsp->fsp_name, SMB_ACL_TYPE_DEFAULT);
+                       dir_acl = free_empty_sys_acl(conn, dir_acl);
+               }
 
        } else {
 
                /* Get the stat struct for the owner info. */
-               if(vfs_fstat(fsp,fsp->fd,&sbuf) != 0) {
+               if(SMB_VFS_FSTAT(fsp,fsp->fd,&sbuf) != 0) {
                        return 0;
                }
                /*
                 * Get the ACL from the fd.
                 */
-               posix_acl = sys_acl_get_fd(fsp->fd);
+               posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp, fsp->fd);
        }
 
        DEBUG(5,("get_nt_acl : file ACL %s, directory ACL %s\n",
@@ -1844,37 +2308,40 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
         * Get the owner, group and world SIDs.
         */
 
-       create_file_sids(&sbuf, &owner_sid, &group_sid);
+       if (lp_profile_acls(SNUM(fsp->conn))) {
+               /* For WXP SP1 the owner must be administrators. */
+               sid_copy(&owner_sid, &global_sid_Builtin_Administrators);
+               sid_copy(&group_sid, &global_sid_Builtin_Users);
+               num_profile_acls = 2;
+       } else {
+               create_file_sids(&sbuf, &owner_sid, &group_sid);
+       }
+
+       /*
+        * In the optimum case Creator Owner and Creator Group would be used for
+        * the ACL_USER_OBJ and ACL_GROUP_OBJ entries, respectively, but this
+        * would lead to usability problems under Windows: The Creator entries
+        * are only available in browse lists of directories and not for files;
+        * additionally the identity of the owning group couldn't be determined.
+        * We therefore use those identities only for Default ACLs. 
+        */
 
        /* Create the canon_ace lists. */
-       file_ace = canonicalise_acl( fsp, posix_acl, &sbuf,  &owner_sid, &group_sid);
-       num_acls = count_canon_ace_list(file_ace);
+       file_ace = canonicalise_acl( fsp, posix_acl, &sbuf, &owner_sid, &group_sid, SMB_ACL_TYPE_ACCESS );
 
        /* We must have *some* ACLS. */
 
-       if (num_acls == 0) {
+       if (count_canon_ace_list(file_ace) == 0) {
                DEBUG(0,("get_nt_acl : No ACLs on file (%s) !\n", fsp->fsp_name ));
                return 0;
        }
 
-       if (fsp->is_directory) { 
-               /*
-                * If we have to fake a default ACL then this is the mode to use.
-                */
-               sbuf.st_mode = unix_mode( fsp->conn, FILE_ATTRIBUTE_ARCHIVE, fsp->fsp_name);
-
-               dir_ace = canonicalise_acl(fsp, dir_acl, &sbuf, &owner_sid, &group_sid);
-               num_dir_acls = count_canon_ace_list(dir_ace);
-       }
-
-       /* Allocate the ace list. */
-       if ((nt_ace_list = (SEC_ACE *)malloc((num_acls + num_dir_acls)* sizeof(SEC_ACE))) == NULL) {
-               DEBUG(0,("get_nt_acl: Unable to malloc space for nt_ace_list.\n"));
-               goto done;
+       if (fsp->is_directory && dir_acl) {
+               dir_ace = canonicalise_acl(fsp, dir_acl, &sbuf,
+                               &global_sid_Creator_Owner,
+                               &global_sid_Creator_Group, SMB_ACL_TYPE_DEFAULT );
        }
 
-       memset(nt_ace_list, '\0', (num_acls + num_dir_acls) * sizeof(SEC_ACE) );
-
        /*
         * Create the NT ACE list from the canonical ace lists.
         */
@@ -1884,30 +2351,153 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
                int nt_acl_type;
                int i;
 
+               if (nt4_compatible_acls()) {
+                       /*
+                        * NT 4 chokes if an ACL contains an INHERIT_ONLY entry
+                        * but no non-INHERIT_ONLY entry for one SID. So we only
+                        * remove entries from the Access ACL if the
+                        * corresponding Default ACL entries have also been
+                        * removed. ACEs for CREATOR-OWNER and CREATOR-GROUP
+                        * are exceptions. We can do nothing
+                        * intelligent if the Default ACL contains entries that
+                        * are not also contained in the Access ACL, so this
+                        * case will still fail under NT 4.
+                        */
+
+                       if (!dir_ace)
+                               goto simplify_file_ace_only;
+
+                       ace = canon_ace_entry_for(dir_ace, SMB_ACL_OTHER, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(dir_ace, ace);
+                               SAFE_FREE(ace);
+
+                               ace = canon_ace_entry_for(file_ace, SMB_ACL_OTHER, NULL);
+                               if (ace && !ace->perms) {
+                                       DLIST_REMOVE(file_ace, ace);
+                                       SAFE_FREE(ace);
+                               }
+                       }
+
+                       /*
+                        * WinNT doesn't usually have Creator Group
+                        * in browse lists, so we send this entry to
+                        * WinNT even if it contains no relevant
+                        * permissions. Once we can add
+                        * Creator Group to browse lists we can
+                        * re-enable this.
+                        */
+
+#if 0
+                       ace = canon_ace_entry_for(dir_ace, SMB_ACL_GROUP_OBJ, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(dir_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+#endif
+
+                       ace = canon_ace_entry_for(file_ace, SMB_ACL_GROUP_OBJ, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(file_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+               } else {
+
+                       ace = canon_ace_entry_for(dir_ace, SMB_ACL_OTHER, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(dir_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+                       ace = canon_ace_entry_for(dir_ace, SMB_ACL_GROUP_OBJ, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(dir_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+
+ simplify_file_ace_only:
+
+                       ace = canon_ace_entry_for(file_ace, SMB_ACL_OTHER, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(file_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+
+                       ace = canon_ace_entry_for(file_ace, SMB_ACL_GROUP_OBJ, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(file_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+               }
+
+               num_acls = count_canon_ace_list(file_ace);
+               num_dir_acls = count_canon_ace_list(dir_ace);
+
+               /* Allocate the ace list. */
+               if ((nt_ace_list = (SEC_ACE *)malloc((num_acls + num_profile_acls + num_dir_acls)* sizeof(SEC_ACE))) == NULL) {
+                       DEBUG(0,("get_nt_acl: Unable to malloc space for nt_ace_list.\n"));
+                       goto done;
+               }
+
+               memset(nt_ace_list, '\0', (num_acls + num_dir_acls) * sizeof(SEC_ACE) );
+                                                                                               
+               /*
+                * Create the NT ACE list from the canonical ace lists.
+                */
+
                ace = file_ace;
 
                for (i = 0; i < num_acls; i++, ace = ace->next) {
-                       SEC_ACCESS acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
-                       init_sec_ace(&nt_ace_list[num_aces++], &ace->sid, nt_acl_type, acc, 0);
+                       SEC_ACCESS acc;
+
+                       acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
+                       init_sec_ace(&nt_ace_list[num_aces++], &ace->trustee, nt_acl_type, acc, 0);
+               }
+
+               /* The User must have access to a profile share - even if we can't map the SID. */
+               if (lp_profile_acls(SNUM(fsp->conn))) {
+                       SEC_ACCESS acc;
+
+                       init_sec_access(&acc,FILE_GENERIC_ALL);
+                       init_sec_ace(&nt_ace_list[num_aces++], &global_sid_Builtin_Users, SEC_ACE_TYPE_ACCESS_ALLOWED, acc, 0);
                }
 
                ace = dir_ace;
 
                for (i = 0; i < num_dir_acls; i++, ace = ace->next) {
-                       SEC_ACCESS acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
-                       init_sec_ace(&nt_ace_list[num_aces++], &ace->sid, nt_acl_type, acc, 
+                       SEC_ACCESS acc;
+
+                       acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
+                       init_sec_ace(&nt_ace_list[num_aces++], &ace->trustee, nt_acl_type, acc,
                                        SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT|SEC_ACE_FLAG_INHERIT_ONLY);
                }
 
+               /* The User must have access to a profile share - even if we can't map the SID. */
+               if (lp_profile_acls(SNUM(fsp->conn))) {
+                       SEC_ACCESS acc;
+                       
+                       init_sec_access(&acc,FILE_GENERIC_ALL);
+                       init_sec_ace(&nt_ace_list[num_aces++], &global_sid_Builtin_Users, SEC_ACE_TYPE_ACCESS_ALLOWED, acc,
+                                       SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT|
+                                       SEC_ACE_FLAG_INHERIT_ONLY);
+               }
+
+               /*
+                * Merge POSIX default ACLs and normal ACLs into one NT ACE.
+                * Win2K needs this to get the inheritance correct when replacing ACLs
+                * on a directory tree. Based on work by Jim @ IBM.
+                */
+
+               num_aces = merge_default_aces(nt_ace_list, num_aces);
+
                /*
                 * Sort to force deny entries to the front.
                 */
 
-               if (num_acls + num_dir_acls)
-                       qsort( nt_ace_list, num_acls + num_dir_acls, sizeof(nt_ace_list[0]), QSORT_CAST nt_ace_comp);
+               if (num_aces)
+                       qsort( nt_ace_list, num_aces, sizeof(nt_ace_list[0]), QSORT_CAST nt_ace_comp);
        }
 
-       if (num_acls) {
+       if (num_aces) {
                if((psa = make_sec_acl( main_loop_talloc_get(), ACL_REVISION, num_aces, nt_ace_list)) == NULL) {
                        DEBUG(0,("get_nt_acl: Unable to malloc space for acl.\n"));
                        goto done;
@@ -1919,22 +2509,78 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
        if(!*ppdesc) {
                DEBUG(0,("get_nt_acl: Unable to malloc space for security descriptor.\n"));
                sd_size = 0;
+       } else {
+               /*
+                * Windows 2000: The DACL_PROTECTED flag in the security
+                * descriptor marks the ACL as non-inheriting, i.e., no
+                * ACEs from higher level directories propagate to this
+                * ACL. In the POSIX ACL model permissions are only
+                * inherited at file create time, so ACLs never contain
+                * any ACEs that are inherited dynamically. The DACL_PROTECTED
+                * flag doesn't seem to bother Windows NT.
+                */
+               (*ppdesc)->type |= SE_DESC_DACL_PROTECTED;
        }
 
 done:
+ done:
 
-       if (posix_acl)  
-               sys_acl_free_acl(posix_acl);
+       if (posix_acl)
+               SMB_VFS_SYS_ACL_FREE_ACL(conn, posix_acl);
        if (dir_acl)
-               sys_acl_free_acl(dir_acl);
+               SMB_VFS_SYS_ACL_FREE_ACL(conn, dir_acl);
        free_canon_ace_list(file_ace);
        free_canon_ace_list(dir_ace);
-       if (nt_ace_list)
-               free(nt_ace_list);
+       SAFE_FREE(nt_ace_list);
 
        return sd_size;
 }
 
+/****************************************************************************
+ Try to chown a file. We will be able to chown it under the following conditions.
+
+  1) If we have root privileges, then it will just work.
+  2) If we have write permission to the file and dos_filemodes is set
+     then allow chown to the currently authenticated user.
+****************************************************************************/
+
+static int try_chown(connection_struct *conn, const char *fname, uid_t uid, gid_t gid)
+{
+       int ret;
+       extern struct current_user current_user;
+       files_struct *fsp;
+       SMB_STRUCT_STAT st;
+
+       /* try the direct way first */
+       ret = SMB_VFS_CHOWN(conn, fname, uid, gid);
+       if (ret == 0)
+               return 0;
+
+       if(!CAN_WRITE(conn) || !lp_dos_filemode(SNUM(conn)))
+               return -1;
+
+       if (SMB_VFS_STAT(conn,fname,&st))
+               return -1;
+
+       fsp = open_file_fchmod(conn,fname,&st);
+       if (!fsp)
+               return -1;
+
+       /* only allow chown to the current user. This is more secure,
+          and also copes with the case where the SID in a take ownership ACL is
+          a local SID on the users workstation 
+       */
+       uid = current_user.uid;
+
+       become_root();
+       /* Keep the current file gid the same. */
+       ret = SMB_VFS_FCHOWN(fsp, fsp->fd, uid, (gid_t)-1);
+       unbecome_root();
+
+       close_file_fchmod(fsp);
+
+       return ret;
+}
+
 /****************************************************************************
  Reply to set a security descriptor on an fsp. security_info_sent is the
  description of the following NT ACL.
@@ -1952,21 +2598,36 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
        canon_ace *file_ace_list = NULL;
        canon_ace *dir_ace_list = NULL;
        BOOL acl_perms = False;
+       mode_t orig_mode = (mode_t)0;
+       uid_t orig_uid;
+       gid_t orig_gid;
+       BOOL need_chown = False;
+       extern struct current_user current_user;
 
        DEBUG(10,("set_nt_acl: called for file %s\n", fsp->fsp_name ));
 
+       if (!CAN_WRITE(conn)) {
+               DEBUG(10,("set acl rejected on read-only share\n"));
+               return False;
+       }
+
        /*
         * Get the current state of the file.
         */
 
        if(fsp->is_directory || fsp->fd == -1) {
-               if(vfs_stat(fsp->conn,fsp->fsp_name, &sbuf) != 0)
+               if(SMB_VFS_STAT(fsp->conn,fsp->fsp_name, &sbuf) != 0)
                        return False;
        } else {
-               if(vfs_fstat(fsp,fsp->fd,&sbuf) != 0)
+               if(SMB_VFS_FSTAT(fsp,fsp->fd,&sbuf) != 0)
                        return False;
        }
 
+       /* Save the original elements we check against. */
+       orig_mode = sbuf.st_mode;
+       orig_uid = sbuf.st_uid;
+       orig_gid = sbuf.st_gid;
+
        /*
         * Unpack the user/group/world id's.
         */
@@ -1978,12 +2639,21 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
         * Do we need to chown ?
         */
 
-       if((user != (uid_t)-1 || grp != (uid_t)-1) && (sbuf.st_uid != user || sbuf.st_gid != grp)) {
+       if (((user != (uid_t)-1) && (orig_uid != user)) || (( grp != (gid_t)-1) && (orig_gid != grp)))
+               need_chown = True;
+
+       /*
+        * Chown before setting ACL only if we don't change the user, or
+        * if we change to the current user, but not if we want to give away
+        * the file.
+        */
+
+       if (need_chown && (user == (uid_t)-1 || user == current_user.uid)) {
 
                DEBUG(3,("set_nt_acl: chown %s. uid = %u, gid = %u.\n",
                                fsp->fsp_name, (unsigned int)user, (unsigned int)grp ));
 
-               if(vfs_chown( fsp->conn, fsp->fsp_name, user, grp) == -1) {
+               if(try_chown( fsp->conn, fsp->fsp_name, user, grp) == -1) {
                        DEBUG(3,("set_nt_acl: chown %s, %u, %u failed. Error = %s.\n",
                                fsp->fsp_name, (unsigned int)user, (unsigned int)grp, strerror(errno) ));
                        return False;
@@ -1995,7 +2665,7 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
                 */
 
                if(fsp->is_directory) {
-                       if(vfs_stat(fsp->conn, fsp->fsp_name, &sbuf) != 0) {
+                       if(SMB_VFS_STAT(fsp->conn, fsp->fsp_name, &sbuf) != 0) {
                                return False;
                        }
                } else {
@@ -2003,13 +2673,21 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
                        int ret;
     
                        if(fsp->fd == -1)
-                               ret = vfs_stat(fsp->conn, fsp->fsp_name, &sbuf);
+                               ret = SMB_VFS_STAT(fsp->conn, fsp->fsp_name, &sbuf);
                        else
-                               ret = vfs_fstat(fsp,fsp->fd,&sbuf);
+                               ret = SMB_VFS_FSTAT(fsp,fsp->fd,&sbuf);
   
                        if(ret != 0)
                                return False;
                }
+
+               /* Save the original elements we check against. */
+               orig_mode = sbuf.st_mode;
+               orig_uid = sbuf.st_uid;
+               orig_gid = sbuf.st_gid;
+
+               /* We did it, don't try again */
+               need_chown = False;
        }
 
        create_file_sids(&sbuf, &file_owner_sid, &file_grp_sid);
@@ -2017,84 +2695,110 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
        acl_perms = unpack_canon_ace( fsp, &sbuf, &file_owner_sid, &file_grp_sid,
                                                                        &file_ace_list, &dir_ace_list, security_info_sent, psd);
 
-       if ((file_ace_list == NULL) && (dir_ace_list == NULL)) {
-               /* W2K traverse DACL set - ignore. */
-               return True;
-    }
-
-       if (!acl_perms) {
-               DEBUG(3,("set_nt_acl: cannot set permissions\n"));
-               free_canon_ace_list(file_ace_list);
-               free_canon_ace_list(dir_ace_list); 
-               return False;
-       }
-
-       /*
-        * Only change security if we got a DACL.
-        */
-
-       if((security_info_sent & DACL_SECURITY_INFORMATION) && (psd->dacl != NULL)) {
+       /* Ignore W2K traverse DACL set. */
+       if (file_ace_list || dir_ace_list) {
 
-               BOOL acl_set_support = False;
-               BOOL ret = False;
+               if (!acl_perms) {
+                       DEBUG(3,("set_nt_acl: cannot set permissions\n"));
+                       free_canon_ace_list(file_ace_list);
+                       free_canon_ace_list(dir_ace_list); 
+                       return False;
+               }
 
                /*
-                * Try using the POSIX ACL set first. Fall back to chmod if
-                * we have no ACL support on this filesystem.
+                * Only change security if we got a DACL.
                 */
 
-               if (acl_perms && file_ace_list) {
-                       ret = set_canon_ace_list(fsp, file_ace_list, False, &acl_set_support);
-                       if (acl_set_support && ret == False) {
-                               DEBUG(3,("set_nt_acl: failed to set file acl on file %s (%s).\n", fsp->fsp_name, strerror(errno) ));
-                               free_canon_ace_list(file_ace_list);
-                               free_canon_ace_list(dir_ace_list); 
-                               return False;
-                       }
-               }
+               if((security_info_sent & DACL_SECURITY_INFORMATION) && (psd->dacl != NULL)) {
 
-               if (acl_perms && acl_set_support && fsp->is_directory && dir_ace_list) {
-                       if (!set_canon_ace_list(fsp, dir_ace_list, True, &acl_set_support)) {
-                               DEBUG(3,("set_nt_acl: failed to set default acl on directory %s (%s).\n", fsp->fsp_name, strerror(errno) ));
-                               free_canon_ace_list(file_ace_list);
-                               free_canon_ace_list(dir_ace_list); 
-                               return False;
+                       BOOL acl_set_support = False;
+                       BOOL ret = False;
+
+                       /*
+                        * Try using the POSIX ACL set first. Fall back to chmod if
+                        * we have no ACL support on this filesystem.
+                        */
+
+                       if (acl_perms && file_ace_list) {
+                               ret = set_canon_ace_list(fsp, file_ace_list, False, &acl_set_support);
+                               if (acl_set_support && ret == False) {
+                                       DEBUG(3,("set_nt_acl: failed to set file acl on file %s (%s).\n", fsp->fsp_name, strerror(errno) ));
+                                       free_canon_ace_list(file_ace_list);
+                                       free_canon_ace_list(dir_ace_list); 
+                                       return False;
+                               }
                        }
-               }
 
-               /*
-                * If we cannot set using POSIX ACLs we fall back to checking if we need to chmod.
-                */
+                       if (acl_perms && acl_set_support && fsp->is_directory) {
+                               if (dir_ace_list) {
+                                       if (!set_canon_ace_list(fsp, dir_ace_list, True, &acl_set_support)) {
+                                               DEBUG(3,("set_nt_acl: failed to set default acl on directory %s (%s).\n", fsp->fsp_name, strerror(errno) ));
+                                               free_canon_ace_list(file_ace_list);
+                                               free_canon_ace_list(dir_ace_list); 
+                                               return False;
+                                       }
+                               } else {
 
-               if(!acl_set_support && acl_perms) {
-                       mode_t posix_perms;
+                                       /*
+                                        * No default ACL - delete one if it exists.
+                                        */
 
-                       if (!convert_canon_ace_to_posix_perms( fsp, file_ace_list, &posix_perms)) {
-                               free_canon_ace_list(file_ace_list);
-                               free_canon_ace_list(dir_ace_list);
-                               DEBUG(3,("set_nt_acl: failed to convert file acl to posix permissions for file %s.\n",
-                                       fsp->fsp_name ));
-                               return False;
+                                       if (SMB_VFS_SYS_ACL_DELETE_DEF_FILE(conn, fsp->fsp_name) == -1) {
+                                               DEBUG(3,("set_nt_acl: sys_acl_delete_def_file failed (%s)\n", strerror(errno)));
+                                               free_canon_ace_list(file_ace_list);
+                                               free_canon_ace_list(dir_ace_list);
+                                               return False;
+                                       }
+                               }
                        }
 
-                       if (sbuf.st_mode != posix_perms) {
+                       /*
+                        * If we cannot set using POSIX ACLs we fall back to checking if we need to chmod.
+                        */
 
-                               DEBUG(3,("set_nt_acl: chmod %s. perms = 0%o.\n",
-                                       fsp->fsp_name, (unsigned int)posix_perms ));
+                       if(!acl_set_support && acl_perms) {
+                               mode_t posix_perms;
 
-                               if(conn->vfs_ops.chmod(conn,dos_to_unix(fsp->fsp_name, False), posix_perms) == -1) {
-                                       DEBUG(3,("set_nt_acl: chmod %s, 0%o failed. Error = %s.\n",
-                                                       fsp->fsp_name, (unsigned int)posix_perms, strerror(errno) ));
+                               if (!convert_canon_ace_to_posix_perms( fsp, file_ace_list, &posix_perms)) {
                                        free_canon_ace_list(file_ace_list);
                                        free_canon_ace_list(dir_ace_list);
+                                       DEBUG(3,("set_nt_acl: failed to convert file acl to posix permissions for file %s.\n",
+                                               fsp->fsp_name ));
                                        return False;
                                }
+
+                               if (orig_mode != posix_perms) {
+
+                                       DEBUG(3,("set_nt_acl: chmod %s. perms = 0%o.\n",
+                                               fsp->fsp_name, (unsigned int)posix_perms ));
+
+                                       if(SMB_VFS_CHMOD(conn,fsp->fsp_name, posix_perms) == -1) {
+                                               DEBUG(3,("set_nt_acl: chmod %s, 0%o failed. Error = %s.\n",
+                                                               fsp->fsp_name, (unsigned int)posix_perms, strerror(errno) ));
+                                               free_canon_ace_list(file_ace_list);
+                                               free_canon_ace_list(dir_ace_list);
+                                               return False;
+                                       }
+                               }
                        }
                }
+
+               free_canon_ace_list(file_ace_list);
+               free_canon_ace_list(dir_ace_list); 
        }
 
-       free_canon_ace_list(file_ace_list);
-       free_canon_ace_list(dir_ace_list); 
+       /* Any chown pending? */
+       if (need_chown) {
+
+               DEBUG(3,("set_nt_acl: chown %s. uid = %u, gid = %u.\n",
+                       fsp->fsp_name, (unsigned int)user, (unsigned int)grp ));
+
+               if(try_chown( fsp->conn, fsp->fsp_name, user, grp) == -1) {
+                       DEBUG(3,("set_nt_acl: chown %s, %u, %u failed. Error = %s.\n",
+                               fsp->fsp_name, (unsigned int)user, (unsigned int)grp, strerror(errno) ));
+                       return False;
+               }
+       }
 
        return True;
 }
@@ -2104,13 +2808,13 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
  and set the mask to rwx. Needed to preserve complex ACLs set by NT.
 ****************************************************************************/
 
-static int chmod_acl_internals( SMB_ACL_T posix_acl, mode_t mode)
+static int chmod_acl_internals( connection_struct *conn, SMB_ACL_T posix_acl, mode_t mode)
 {
        int entry_id = SMB_ACL_FIRST_ENTRY;
        SMB_ACL_ENTRY_T entry;
        int num_entries = 0;
 
-       while ( sys_acl_get_entry(posix_acl, entry_id, &entry) == 1) {
+       while ( SMB_VFS_SYS_ACL_GET_ENTRY(conn, posix_acl, entry_id, &entry) == 1) {
                SMB_ACL_TAG_T tagtype;
                SMB_ACL_PERMSET_T permset;
                mode_t perms;
@@ -2119,10 +2823,10 @@ static int chmod_acl_internals( SMB_ACL_T posix_acl, mode_t mode)
                if (entry_id == SMB_ACL_FIRST_ENTRY)
                        entry_id = SMB_ACL_NEXT_ENTRY;
 
-               if (sys_acl_get_tag_type(entry, &tagtype) == -1)
+               if (SMB_VFS_SYS_ACL_GET_TAG_TYPE(conn, entry, &tagtype) == -1)
                        return -1;
 
-               if (sys_acl_get_permset(entry, &permset) == -1)
+               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, entry, &permset) == -1)
                        return -1;
 
                num_entries++;
@@ -2130,11 +2834,17 @@ static int chmod_acl_internals( SMB_ACL_T posix_acl, mode_t mode)
                switch(tagtype) {
                        case SMB_ACL_USER_OBJ:
                                perms = unix_perms_to_acl_perms(mode, S_IRUSR, S_IWUSR, S_IXUSR);
-                break;
+                               break;
                        case SMB_ACL_GROUP_OBJ:
                                perms = unix_perms_to_acl_perms(mode, S_IRGRP, S_IWGRP, S_IXGRP);
                                break;
                        case SMB_ACL_MASK:
+                               /*
+                                * FIXME: The ACL_MASK entry permissions should really be set to
+                                * the union of the permissions of all ACL_USER,
+                                * ACL_GROUP_OBJ, and ACL_GROUP entries. That's what
+                                * acl_calc_mask() does, but Samba ACLs doesn't provide it.
+                                */
                                perms = S_IRUSR|S_IWUSR|S_IXUSR;
                                break;
                        case SMB_ACL_OTHER:
@@ -2144,69 +2854,115 @@ static int chmod_acl_internals( SMB_ACL_T posix_acl, mode_t mode)
                                continue;
                }
 
-               if (map_acl_perms_to_permset(perms, &permset) == -1)
+               if (map_acl_perms_to_permset(conn, perms, &permset) == -1)
                        return -1;
 
-               if (sys_acl_set_permset(entry, permset) == -1)
+               if (SMB_VFS_SYS_ACL_SET_PERMSET(conn, entry, permset) == -1)
                        return -1;
        }
 
        /*
-        * If this is a simple 3 element ACL then it's a standard
+        * If this is a simple 3 element ACL or no elements then it's a standard
         * UNIX permission set. Just use chmod...       
         */
 
-       if (num_entries == 3)
+       if ((num_entries == 3) || (num_entries == 0))
                return -1;
 
        return 0;
 }
 
 /****************************************************************************
- Do a chmod by setting the ACL USER_OBJ, GROUP_OBJ and OTHER bits in an ACL
- and set the mask to rwx. Needed to preserve complex ACLs set by NT.
- Note that name is in UNIX character set.
+ Get the access ACL of FROM, do a chmod by setting the ACL USER_OBJ,
+ GROUP_OBJ and OTHER bits in an ACL and set the mask to rwx. Set the
resulting ACL on TO.  Note that name is in UNIX character set.
 ****************************************************************************/
 
-int chmod_acl(char *name, mode_t mode)
+static int copy_access_acl(connection_struct *conn, const char *from, const char *to, mode_t mode)
 {
        SMB_ACL_T posix_acl = NULL;
        int ret = -1;
 
-       if ((posix_acl = sys_acl_get_file(name, SMB_ACL_TYPE_ACCESS)) == NULL)
+       if ((posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, from, SMB_ACL_TYPE_ACCESS)) == NULL)
                return -1;
 
-       if ((ret = chmod_acl_internals(posix_acl, mode)) == -1)
+       if ((ret = chmod_acl_internals(conn, posix_acl, mode)) == -1)
                goto done;
 
-       ret = sys_acl_set_file(name, SMB_ACL_TYPE_ACCESS, posix_acl);
+       ret = SMB_VFS_SYS_ACL_SET_FILE(conn, to, SMB_ACL_TYPE_ACCESS, posix_acl);
 
 done:
+ done:
 
-       sys_acl_free_acl(posix_acl);
+       SMB_VFS_SYS_ACL_FREE_ACL(conn, posix_acl);
        return ret;
 }
 
+/****************************************************************************
+ Do a chmod by setting the ACL USER_OBJ, GROUP_OBJ and OTHER bits in an ACL
+ and set the mask to rwx. Needed to preserve complex ACLs set by NT.
+ Note that name is in UNIX character set.
+****************************************************************************/
+
+int chmod_acl(connection_struct *conn, const char *name, mode_t mode)
+{
+       return copy_access_acl(conn, name, name, mode);
+}
+
+/****************************************************************************
+ If "inherit permissions" is set and the parent directory has no default
+ ACL but it does have an Access ACL, inherit this Access ACL to file name.
+****************************************************************************/
+
+int inherit_access_acl(connection_struct *conn, const char *name, mode_t mode)
+{
+       pstring dirname;
+       pstrcpy(dirname, parent_dirname(name));
+
+       if (!lp_inherit_perms(SNUM(conn)) || directory_has_default_acl(conn, dirname))
+               return 0;
+
+       return copy_access_acl(conn, dirname, name, mode);
+}
+
 /****************************************************************************
  Do an fchmod by setting the ACL USER_OBJ, GROUP_OBJ and OTHER bits in an ACL
  and set the mask to rwx. Needed to preserve complex ACLs set by NT.
 ****************************************************************************/
 
-int fchmod_acl(int fd, mode_t mode)
+int fchmod_acl(files_struct *fsp, int fd, mode_t mode)
 {
+       connection_struct *conn = fsp->conn;
        SMB_ACL_T posix_acl = NULL;
        int ret = -1;
 
-       if ((posix_acl = sys_acl_get_fd(fd)) == NULL)
+       if ((posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp, fd)) == NULL)
                return -1;
 
-       if ((ret = chmod_acl_internals(posix_acl, mode)) == -1)
+       if ((ret = chmod_acl_internals(conn, posix_acl, mode)) == -1)
                goto done;
 
-       ret = sys_acl_set_fd(fd, posix_acl);
+       ret = SMB_VFS_SYS_ACL_SET_FD(fsp, fd, posix_acl);
 
   done:
 
-       sys_acl_free_acl(posix_acl);
+       SMB_VFS_SYS_ACL_FREE_ACL(conn, posix_acl);
        return ret;
 }
+
+/****************************************************************************
+ Check for an existing default POSIX ACL on a directory.
+****************************************************************************/
+
+BOOL directory_has_default_acl(connection_struct *conn, const char *fname)
+{
+        SMB_ACL_T dir_acl = SMB_VFS_SYS_ACL_GET_FILE( conn, fname, SMB_ACL_TYPE_DEFAULT);
+        BOOL has_acl = False;
+        SMB_ACL_ENTRY_T entry;
+
+        if (dir_acl != NULL && (SMB_VFS_SYS_ACL_GET_ENTRY(conn, dir_acl, SMB_ACL_FIRST_ENTRY, &entry) == 1))
+                has_acl = True;
+
+       if (dir_acl)
+               SMB_VFS_SYS_ACL_FREE_ACL(conn, dir_acl);
+        return has_acl;
+}