Cope with cumulative permissions sets. This code is #ifdef'ed out at the
[ira/wip.git] / source / smbd / posix_acls.c
index 9ab904b47dfc8aadf74684cb5ed57b64bfefc06c..3824afe3c4770821fbb877b192635481eb80fc06 100644 (file)
@@ -1,7 +1,8 @@
 /*
    Unix SMB/CIFS implementation.
    SMB NT Security Descriptor / Unix permission conversion.
-   Copyright (C) Jeremy Allison 1994-2000
+   Copyright (C) Jeremy Allison 1994-2000.
+   Copyright (C) Andreas Gruenbacher 2002.
 
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
@@ -104,7 +105,7 @@ static void print_canon_ace(canon_ace *pace, int num)
        dbgtext( "canon_ace index %d. Type = %s ", num, pace->attr == ALLOW_ACE ? "allow" : "deny" );
        dbgtext( "SID = %s ", sid_to_string( str, &pace->trustee));
        if (pace->owner_type == UID_ACE) {
-               char *u_name = uidtoname(pace->unix_ug.uid);
+               const char *u_name = uidtoname(pace->unix_ug.uid);
                dbgtext( "uid %u (%s) ", (unsigned int)pace->unix_ug.uid, u_name);
        } else if (pace->owner_type == GID_ACE) {
                char *g_name = gidtoname(pace->unix_ug.gid);
@@ -157,9 +158,9 @@ static mode_t convert_permset_to_mode_t(connection_struct *conn, SMB_ACL_PERMSET
 {
        mode_t ret = 0;
 
-       ret |= (conn->vfs_ops.sys_acl_get_perm(conn, permset, SMB_ACL_READ) ? S_IRUSR : 0);
-       ret |= (conn->vfs_ops.sys_acl_get_perm(conn, permset, SMB_ACL_WRITE) ? S_IWUSR : 0);
-       ret |= (conn->vfs_ops.sys_acl_get_perm(conn, permset, SMB_ACL_EXECUTE) ? S_IXUSR : 0);
+       ret |= (SMB_VFS_SYS_ACL_GET_PERM(conn, permset, SMB_ACL_READ) ? S_IRUSR : 0);
+       ret |= (SMB_VFS_SYS_ACL_GET_PERM(conn, permset, SMB_ACL_WRITE) ? S_IWUSR : 0);
+       ret |= (SMB_VFS_SYS_ACL_GET_PERM(conn, permset, SMB_ACL_EXECUTE) ? S_IXUSR : 0);
 
        return ret;
 }
@@ -189,18 +190,18 @@ static mode_t unix_perms_to_acl_perms(mode_t mode, int r_mask, int w_mask, int x
 
 static int map_acl_perms_to_permset(connection_struct *conn, mode_t mode, SMB_ACL_PERMSET_T *p_permset)
 {
-       if (conn->vfs_ops.sys_acl_clear_perms(conn, *p_permset) ==  -1)
+       if (SMB_VFS_SYS_ACL_CLEAR_PERMS(conn, *p_permset) ==  -1)
                return -1;
        if (mode & S_IRUSR) {
-               if (conn->vfs_ops.sys_acl_add_perm(conn, *p_permset, SMB_ACL_READ) == -1)
+               if (SMB_VFS_SYS_ACL_ADD_PERM(conn, *p_permset, SMB_ACL_READ) == -1)
                        return -1;
        }
        if (mode & S_IWUSR) {
-               if (conn->vfs_ops.sys_acl_add_perm(conn, *p_permset, SMB_ACL_WRITE) == -1)
+               if (SMB_VFS_SYS_ACL_ADD_PERM(conn, *p_permset, SMB_ACL_WRITE) == -1)
                        return -1;
        }
        if (mode & S_IXUSR) {
-               if (conn->vfs_ops.sys_acl_add_perm(conn, *p_permset, SMB_ACL_EXECUTE) == -1)
+               if (SMB_VFS_SYS_ACL_ADD_PERM(conn, *p_permset, SMB_ACL_EXECUTE) == -1)
                        return -1;
        }
        return 0;
@@ -329,6 +330,24 @@ static void merge_aces( canon_ace **pp_list_head )
        *pp_list_head = list_head;
 }
 
+/****************************************************************************
+ Check if we need to return NT4.x compatible ACL entries.
+****************************************************************************/
+
+static BOOL nt4_compatible_acls(void)
+{
+       const char *compat = lp_acl_compatibility();
+
+       if (*compat == '\0') {
+               enum remote_arch_types ra_type = get_remote_arch();
+
+               /* Automatically adapt to client */
+               return (ra_type <= RA_WINNT);
+       } else
+               return (strequal(compat, "winnt"));
+}
+
+
 /****************************************************************************
  Map canon_ace perms to permission bits NT.
  The attr element is not used here - we only process deny entries on set,
@@ -345,7 +364,19 @@ static SEC_ACCESS map_canon_ace_perms(int *pacl_type, DOM_SID *powner_sid, canon
        if ((ace->perms & ALL_ACE_PERMS) == ALL_ACE_PERMS) {
                        nt_mask = UNIX_ACCESS_RWX;
        } else if ((ace->perms & ALL_ACE_PERMS) == (mode_t)0) {
-               nt_mask = UNIX_ACCESS_NONE;
+               /*
+                * Windows NT refuses to display ACEs with no permissions in them (but
+                * they are perfectly legal with Windows 2000). If the ACE has empty
+                * permissions we cannot use 0, so we use the otherwise unused
+                * WRITE_OWNER permission, which we ignore when we set an ACL.
+                * We abstract this into a #define of UNIX_ACCESS_NONE to allow this
+                * to be changed in the future.
+                */
+
+               if (nt4_compatible_acls())
+                       nt_mask = UNIX_ACCESS_NONE;
+               else
+                       nt_mask = 0;
        } else {
                nt_mask |= ((ace->perms & S_IRUSR) ? UNIX_ACCESS_R : 0 );
                nt_mask |= ((ace->perms & S_IWUSR) ? UNIX_ACCESS_W : 0 );
@@ -412,7 +443,6 @@ static BOOL unpack_nt_owners(SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp,
 {
        DOM_SID owner_sid;
        DOM_SID grp_sid;
-       enum SID_NAME_USE sid_type;
 
        *puser = (uid_t)-1;
        *pgrp = (gid_t)-1;
@@ -438,7 +468,7 @@ static BOOL unpack_nt_owners(SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp,
 
        if (security_info_sent & OWNER_SECURITY_INFORMATION) {
                sid_copy(&owner_sid, psd->owner_sid);
-               if (!sid_to_uid( &owner_sid, puser, &sid_type)) {
+               if (NT_STATUS_IS_ERR(sid_to_uid(&owner_sid, puser))) {
 #if ACL_FORCE_UNMAPPABLE
                        /* this allows take ownership to work reasonably */
                        extern struct current_user current_user;
@@ -458,7 +488,7 @@ static BOOL unpack_nt_owners(SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp,
 
        if (security_info_sent & GROUP_SECURITY_INFORMATION) {
                sid_copy(&grp_sid, psd->grp_sid);
-               if (!sid_to_gid( &grp_sid, pgrp, &sid_type)) {
+               if (NT_STATUS_IS_ERR(sid_to_gid( &grp_sid, pgrp))) {
 #if ACL_FORCE_UNMAPPABLE
                        /* this allows take group ownership to work reasonably */
                        extern struct current_user current_user;
@@ -528,12 +558,18 @@ static BOOL uid_entry_in_group( canon_ace *uid_ace, canon_ace *group_ace )
        extern DOM_SID global_sid_World;
        fstring u_name;
        fstring g_name;
+       extern struct current_user current_user;
 
        /* "Everyone" always matches every uid. */
 
        if (sid_equal(&group_ace->trustee, &global_sid_World))
                return True;
 
+       /* Assume that the current user is in the current group (force group) */
+
+       if (uid_ace->unix_ug.uid == current_user.uid && group_ace->unix_ug.gid == current_user.gid)
+               return True;
+
        fstrcpy(u_name, uidtoname(uid_ace->unix_ug.uid));
        fstrcpy(g_name, gidtoname(group_ace->unix_ug.gid));
 
@@ -542,7 +578,7 @@ static BOOL uid_entry_in_group( canon_ace *uid_ace, canon_ace *group_ace )
         * not uids/gids.
         */
 
-       return user_in_group_list(u_name, g_name );
+       return user_in_group_list(u_name, g_name, NULL, 0);
 }
 
 /****************************************************************************
@@ -569,6 +605,14 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
        BOOL got_other = False;
        canon_ace *pace_other = NULL;
        canon_ace *pace_group = NULL;
+       connection_struct *conn = fsp->conn;
+       SMB_ACL_T current_posix_acl = NULL;
+       mode_t current_user_perms = 0;
+       mode_t current_grp_perms = 0;
+       mode_t current_other_perms = 0;
+       BOOL got_current_user = False;
+       BOOL got_current_grp = False;
+       BOOL got_current_other = False;
 
        for (pace = *pp_ace; pace; pace = pace->next) {
                if (pace->type == SMB_ACL_USER_OBJ) {
@@ -601,6 +645,62 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
                }
        }
 
+       /*
+        * When setting ACLs and missing one out of SMB_ACL_USER_OBJ,
+        * SMB_ACL_GROUP_OBJ, SMB_ACL_OTHER, try to retrieve current
+        * values. For user and other a simple SMB_VFS_STAT would do, but
+        * we would get mask instead of group. Let's do it via ACL.
+        */
+
+       if (setting_acl && (!got_user || !got_grp || !got_other)) {
+
+               SMB_ACL_ENTRY_T entry;
+               int entry_id = SMB_ACL_FIRST_ENTRY;
+
+               if(fsp->is_directory || fsp->fd == -1) {
+                       current_posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fsp->fsp_name, SMB_ACL_TYPE_ACCESS);
+               } else {
+                       current_posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp, fsp->fd);
+               }
+
+               if (current_posix_acl) {
+                       while (SMB_VFS_SYS_ACL_GET_ENTRY(conn, current_posix_acl, entry_id, &entry) == 1) {
+                               SMB_ACL_TAG_T tagtype;
+                               SMB_ACL_PERMSET_T permset;
+
+                               /* get_next... */
+                               if (entry_id == SMB_ACL_FIRST_ENTRY)
+                                       entry_id = SMB_ACL_NEXT_ENTRY;
+
+                               /* Is this a MASK entry ? */
+                               if (SMB_VFS_SYS_ACL_GET_TAG_TYPE(conn, entry, &tagtype) == -1)
+                                       continue;
+
+                               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, entry, &permset) == -1)
+                                       continue;
+
+                               switch(tagtype) {
+                                       case SMB_ACL_USER_OBJ:
+                                               current_user_perms = convert_permset_to_mode_t(conn, permset);
+                                               got_current_user = True;
+                                               break;
+                                       case SMB_ACL_GROUP_OBJ:
+                                               current_grp_perms = convert_permset_to_mode_t(conn, permset);
+                                               got_current_grp = True;
+                                               break;
+                                       case SMB_ACL_OTHER:
+                                               current_other_perms = convert_permset_to_mode_t(conn, permset);
+                                               got_current_other = True;
+                                               break;
+                               }
+                       }
+                       SMB_VFS_SYS_ACL_FREE_ACL(conn, current_posix_acl);
+               } else {
+                       DEBUG(10,("ensure_canon_entry_valid: failed to retrieve current ACL of %s\n",
+                               fsp->fsp_name));
+               }
+       }
+
        if (!got_user) {
                if ((pace = (canon_ace *)malloc(sizeof(canon_ace))) == NULL) {
                        DEBUG(0,("ensure_canon_entry_valid: malloc fail.\n"));
@@ -615,13 +715,19 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
                pace->attr = ALLOW_ACE;
 
                if (setting_acl) {
-                       /* If we only got an "everyone" perm, just use that. */
-                       if (!got_grp && got_other)
-                               pace->perms = pace_other->perms;
-                       else if (got_grp && uid_entry_in_group(pace, pace_group))
-                               pace->perms = pace_group->perms;
-                       else
-                               pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRUSR, S_IWUSR, S_IXUSR);
+                       if (got_current_user) {
+                               pace->perms = current_user_perms;
+                       } else {
+                               /* If we only got an "everyone" perm, just use that. */
+                               if (!got_grp && got_other)
+                                       pace->perms = pace_other->perms;
+                               else if (got_grp && uid_entry_in_group(pace, pace_group))
+                                       pace->perms = pace_group->perms;
+                               else
+                                       pace->perms = 0;
+
+                       }
+
                        apply_default_perms(fsp, pace, S_IRUSR);
                } else {
                        pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRUSR, S_IWUSR, S_IXUSR);
@@ -643,11 +749,15 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
                pace->trustee = *pfile_grp_sid;
                pace->attr = ALLOW_ACE;
                if (setting_acl) {
-                       /* If we only got an "everyone" perm, just use that. */
-                       if (got_other)
-                               pace->perms = pace_other->perms;
-                       else
-                               pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRGRP, S_IWGRP, S_IXGRP);
+                       if (got_current_grp) {
+                               pace->perms = current_grp_perms;
+                       } else {
+                               /* If we only got an "everyone" perm, just use that. */
+                               if (got_other)
+                                       pace->perms = pace_other->perms;
+                               else
+                                       pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRGRP, S_IWGRP, S_IXGRP);
+                       }
                        apply_default_perms(fsp, pace, S_IRGRP);
                } else {
                        pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRGRP, S_IWGRP, S_IXGRP);
@@ -668,8 +778,14 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
                pace->unix_ug.world = -1;
                pace->trustee = global_sid_World;
                pace->attr = ALLOW_ACE;
-               pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IROTH, S_IWOTH, S_IXOTH);
-               apply_default_perms(fsp, pace, S_IROTH);
+               if (setting_acl) {
+                       if (got_current_other)
+                               pace->perms = current_other_perms;
+                       else
+                               pace->perms = 0;
+                       apply_default_perms(fsp, pace, S_IROTH);
+               } else
+                       pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IROTH, S_IWOTH, S_IXOTH);
 
                DLIST_ADD(*pp_ace, pace);
        }
@@ -677,6 +793,51 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
        return True;
 }
 
+/****************************************************************************
+ Check if a POSIX ACL has the required SMB_ACL_USER_OBJ and SMB_ACL_GROUP_OBJ entries.
+ If it does not have them, check if there are any entries where the trustee is the
+ file owner or the owning group, and map these to SMB_ACL_USER_OBJ and SMB_ACL_GROUP_OBJ.
+****************************************************************************/
+
+static void check_owning_objs(canon_ace *ace, DOM_SID *pfile_owner_sid, DOM_SID *pfile_grp_sid)
+{
+       BOOL got_user_obj, got_group_obj;
+       canon_ace *current_ace;
+       int i, entries;
+
+       entries = count_canon_ace_list(ace);
+       got_user_obj = False;
+       got_group_obj = False;
+
+       for (i=0, current_ace = ace; i < entries; i++, current_ace = current_ace->next) {
+               if (current_ace->type == SMB_ACL_USER_OBJ)
+                       got_user_obj = True;
+               else if (current_ace->type == SMB_ACL_GROUP_OBJ)
+                       got_group_obj = True;
+       }
+       if (got_user_obj && got_group_obj) {
+               DEBUG(10,("check_owning_objs: ACL had owning user/group entries.\n"));
+               return;
+       }
+
+       for (i=0, current_ace = ace; i < entries; i++, current_ace = current_ace->next) {
+               if (!got_user_obj && current_ace->owner_type == UID_ACE &&
+                               sid_equal(&current_ace->trustee, pfile_owner_sid)) {
+                       current_ace->type = SMB_ACL_USER_OBJ;
+                       got_user_obj = True;
+               }
+               if (!got_group_obj && current_ace->owner_type == GID_ACE &&
+                               sid_equal(&current_ace->trustee, pfile_grp_sid)) {
+                       current_ace->type = SMB_ACL_GROUP_OBJ;
+                       got_group_obj = True;
+               }
+       }
+       if (!got_user_obj)
+               DEBUG(10,("check_owning_objs: ACL is missing an owner entry.\n"));
+       if (!got_group_obj)
+               DEBUG(10,("check_owning_objs: ACL is missing an owning group entry.\n"));
+}
+
 /****************************************************************************
  Unpack a SEC_DESC into two canonical ace lists.
 ****************************************************************************/
@@ -687,6 +848,8 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
                                                        canon_ace **ppfile_ace, canon_ace **ppdir_ace,
                                                        SEC_ACL *dacl)
 {
+       extern DOM_SID global_sid_Creator_Owner;
+       extern DOM_SID global_sid_Creator_Group;
        extern DOM_SID global_sid_World;
        extern struct generic_mapping file_generic_mapping;
        BOOL all_aces_are_inherit_only = (fsp->is_directory ? True : False);
@@ -713,23 +876,25 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
                        return False;
                }
 
-               /*
-                * The security mask may be UNIX_ACCESS_NONE which should map into
-                * no permissions (we overload the WRITE_OWNER bit for this) or it
-                * should be one of the ALL/EXECUTE/READ/WRITE bits. Arrange for this
-                * to be so. Any other bits override the UNIX_ACCESS_NONE bit.
-                */
+               if (nt4_compatible_acls()) {
+                       /*
+                        * The security mask may be UNIX_ACCESS_NONE which should map into
+                        * no permissions (we overload the WRITE_OWNER bit for this) or it
+                        * should be one of the ALL/EXECUTE/READ/WRITE bits. Arrange for this
+                        * to be so. Any other bits override the UNIX_ACCESS_NONE bit.
+                        */
 
-               /*
-                * Convert GENERIC bits to specific bits.
-                */
+                       /*
+                        * Convert GENERIC bits to specific bits.
+                        */
  
-               se_map_generic(&psa->info.mask, &file_generic_mapping);
+                       se_map_generic(&psa->info.mask, &file_generic_mapping);
 
-               psa->info.mask &= (UNIX_ACCESS_NONE|FILE_ALL_ACCESS);
+                       psa->info.mask &= (UNIX_ACCESS_NONE|FILE_ALL_ACCESS);
 
-               if(psa->info.mask != UNIX_ACCESS_NONE)
-                       psa->info.mask &= ~UNIX_ACCESS_NONE;
+                       if(psa->info.mask != UNIX_ACCESS_NONE)
+                               psa->info.mask &= ~UNIX_ACCESS_NONE;
+               }
        }
 
        /*
@@ -772,7 +937,6 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
        }
 
        for(i = 0; i < dacl->num_aces; i++) {
-               enum SID_NAME_USE sid_type;
                SEC_ACE *psa = &dacl->ace[i];
 
                /*
@@ -804,15 +968,45 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
                /*
                 * Try and work out if the SID is a user or group
                 * as we need to flag these differently for POSIX.
+                * Note what kind of a POSIX ACL this should map to.
                 */
 
                if( sid_equal(&current_ace->trustee, &global_sid_World)) {
                        current_ace->owner_type = WORLD_ACE;
                        current_ace->unix_ug.world = -1;
-               } else if (sid_to_uid( &current_ace->trustee, &current_ace->unix_ug.uid, &sid_type)) {
+                       current_ace->type = SMB_ACL_OTHER;
+               } else if (sid_equal(&current_ace->trustee, &global_sid_Creator_Owner)) {
                        current_ace->owner_type = UID_ACE;
-               } else if (sid_to_gid( &current_ace->trustee, &current_ace->unix_ug.gid, &sid_type)) {
+                       current_ace->unix_ug.world = -1;
+                       current_ace->type = SMB_ACL_USER_OBJ;
+
+                       /*
+                        * The Creator Owner entry only specifies inheritable permissions,
+                        * never access permissions. WinNT doesn't always set the ACE to
+                        *INHERIT_ONLY, though.
+                        */
+
+                       if (nt4_compatible_acls())
+                               psa->flags |= SEC_ACE_FLAG_INHERIT_ONLY;
+               } else if (sid_equal(&current_ace->trustee, &global_sid_Creator_Group)) {
+                       current_ace->owner_type = GID_ACE;
+                       current_ace->unix_ug.world = -1;
+                       current_ace->type = SMB_ACL_GROUP_OBJ;
+
+                       /*
+                        * The Creator Group entry only specifies inheritable permissions,
+                        * never access permissions. WinNT doesn't always set the ACE to
+                        *INHERIT_ONLY, though.
+                        */
+                       if (nt4_compatible_acls())
+                               psa->flags |= SEC_ACE_FLAG_INHERIT_ONLY;
+
+               } else if (NT_STATUS_IS_OK(sid_to_gid( &current_ace->trustee, &current_ace->unix_ug.gid))) {
                        current_ace->owner_type = GID_ACE;
+                       current_ace->type = SMB_ACL_GROUP;
+               } else if (NT_STATUS_IS_OK(sid_to_uid( &current_ace->trustee, &current_ace->unix_ug.uid))) {
+                       current_ace->owner_type = UID_ACE;
+                       current_ace->type = SMB_ACL_USER;
                } else {
                        fstring str;
 
@@ -832,31 +1026,6 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
                current_ace->perms |= map_nt_perms( psa->info, S_IRUSR);
                current_ace->attr = (psa->type == SEC_ACE_TYPE_ACCESS_ALLOWED) ? ALLOW_ACE : DENY_ACE;
 
-               /*
-                * Now note what kind of a POSIX ACL this should map to.
-                */
-
-               if(sid_equal(&current_ace->trustee, pfile_owner_sid)) {
-
-                       current_ace->type = SMB_ACL_USER_OBJ;
-
-               } else if( sid_equal(&current_ace->trustee, pfile_grp_sid)) {
-
-                       current_ace->type = SMB_ACL_GROUP_OBJ;
-
-               } else if( sid_equal(&current_ace->trustee, &global_sid_World)) {
-
-                       current_ace->type = SMB_ACL_OTHER;
-
-               } else {
-                       /*
-                        * Could be a SMB_ACL_USER or SMB_ACL_GROUP. Check by
-                        * looking at owner_type.
-                        */
-
-                       current_ace->type = (current_ace->owner_type == UID_ACE) ? SMB_ACL_USER : SMB_ACL_GROUP;
-               }
-
                /*
                 * Now add the created ace to either the file list, the directory
                 * list, or both. We *MUST* preserve the order here (hence we use
@@ -912,8 +1081,16 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
                                                return False;
                                        }
 
+                                       /*
+                                        * We must not free current_ace here as its
+                                        * pointer is now owned by the dir_ace list.
+                                        */
                                        current_ace = dup_ace;
                                } else {
+                                       /*
+                                        * We must not free current_ace here as its
+                                        * pointer is now owned by the dir_ace list.
+                                        */
                                        current_ace = NULL;
                                }
                        }
@@ -948,6 +1125,10 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
                                print_canon_ace( current_ace, 0);
                        }
                        all_aces_are_inherit_only = False;
+                       /*
+                        * We must not free current_ace here as its
+                        * pointer is now owned by the file_ace list.
+                        */
                        current_ace = NULL;
                }
 
@@ -970,6 +1151,15 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
                free_canon_ace_list(dir_ace);
                file_ace = NULL;
                dir_ace = NULL;
+       } else {
+               /*
+                * Check if we have SMB_ACL_USER_OBJ and SMB_ACL_GROUP_OBJ entries in each
+                * ACL. If we don't have them, check if any SMB_ACL_USER/SMB_ACL_GROUP
+                * entries can be converted to *_OBJ. Usually we will already have these
+                * entries in the Default ACL, and the Access ACL will not have them.
+                */
+               check_owning_objs(file_ace, pfile_owner_sid, pfile_grp_sid);
+               check_owning_objs(dir_ace, pfile_owner_sid, pfile_grp_sid);
        }
 
        *ppfile_ace = file_ace;
@@ -981,7 +1171,7 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
 /****************************************************************************
  ASCII art time again... JRA :-).
 
- We have 3 cases to process when moving from an NT ACL to a POSIX ACL. Firstly,
+ We have 4 cases to process when moving from an NT ACL to a POSIX ACL. Firstly,
  we insist the ACL is in canonical form (ie. all DENY entries preceede ALLOW
  entries). Secondly, the merge code has ensured that all duplicate SID entries for
  allow or deny have been merged, so the same SID can only appear once in the deny
@@ -1054,6 +1244,15 @@ Deny entry after Allow entry. Failing to set on file %s.\n", fsp->fsp_name ));
  best we can do and has the advantage of failing closed rather
  than open.
  ---------------------------------------------------------------------------
+ Fourth pass - cope with cumulative permissions.
+
+ for all allow user entries, if there exists an allow group entry with
+ more permissive permissions, and the user is in that group, rewrite the
+ allow user permissions to contain both sets of permissions.
+
+ Currently the code for this is #ifdef'ed out as these semantics make
+ no sense to me. JRA.
+ ---------------------------------------------------------------------------
 
  Note we *MUST* do the deny user pass first as this will convert deny user
  entries into allow user entries which can then be processed by the deny
@@ -1243,6 +1442,45 @@ static void process_deny_list( canon_ace **pp_ace_list )
 
        }
 
+       /* Doing this fourth pass allows Windows semantics to be layered
+        * on top of POSIX semantics. I'm not sure if this is desirable.
+        * For example, in W2K ACLs there is no way to say, "Group X no
+        * access, user Y full access" if user Y is a member of group X.
+        * This seems completely broken semantics to me.... JRA.
+        */
+
+#if 0
+       /* Pass 4 above - deal with allow entries. */
+
+       for (curr_ace = ace_list; curr_ace; curr_ace = curr_ace_next) {
+               canon_ace *allow_ace_p;
+
+               curr_ace_next = curr_ace->next; /* So we can't lose the link. */
+
+               if (curr_ace->attr != ALLOW_ACE)
+                       continue;
+
+               if (curr_ace->owner_type != UID_ACE)
+                       continue;
+
+               for (allow_ace_p = ace_list; allow_ace_p; allow_ace_p = allow_ace_p->next) {
+
+                       if (allow_ace_p->attr != ALLOW_ACE)
+                               continue;
+
+                       /* We process GID_ACE entries only. */
+
+                       if (allow_ace_p->owner_type != GID_ACE)
+                               continue;
+
+                       /* OR in the group perms. */
+
+                       if (uid_entry_in_group( curr_ace, allow_ace_p))
+                               curr_ace->perms |= allow_ace_p->perms;
+               }
+       }
+#endif
+
        *pp_ace_list = ace_list;
 }
 
@@ -1375,7 +1613,7 @@ static BOOL unpack_canon_ace(files_struct *fsp,
 
        pst->st_mode = create_default_mode(fsp, True);
 
-       if (!ensure_canon_entry_valid(&dir_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst, True)) {
+       if (dir_ace && !ensure_canon_entry_valid(&dir_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst, True)) {
                free_canon_ace_list(file_ace);
                free_canon_ace_list(dir_ace);
                return False;
@@ -1398,14 +1636,13 @@ static BOOL unpack_canon_ace(files_struct *fsp,
 
  Note that this doesn't exactly match the NT semantics for an ACL. As POSIX entries
  are not ordered, and match on the most specific entry rather than walking a list,
- then a simple POSIX permission of rw-r--r-- should really map to 6 entries,
+ then a simple POSIX permission of rw-r--r-- should really map to 5 entries,
 
  Entry 0: owner : deny all except read and write.
  Entry 1: group : deny all except read.
- Entry 2: Everyone : deny all except read.
- Entry 3: owner : allow read and write.
- Entry 4: group : allow read.
- Entry 5: Everyone : allow read.
+ Entry 2: owner : allow read and write.
+ Entry 3: group : allow read.
+ Entry 4: Everyone : allow read.
 
  But NT cannot display this in their ACL editor !
 ********************************************************************************/
@@ -1455,7 +1692,7 @@ static void arrange_posix_perms( char *filename, canon_ace **pp_list_head)
 ****************************************************************************/
 
 static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_STRUCT_STAT *psbuf,
-                                                                       DOM_SID *powner, DOM_SID *pgroup)
+                                       DOM_SID *powner, DOM_SID *pgroup, SMB_ACL_TYPE_T the_acl_type)
 {
        extern DOM_SID global_sid_World;
        connection_struct *conn = fsp->conn;
@@ -1467,7 +1704,7 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
        SMB_ACL_ENTRY_T entry;
        size_t ace_count;
 
-       while ( posix_acl && (conn->vfs_ops.sys_acl_get_entry(conn, posix_acl, entry_id, &entry) == 1)) {
+       while ( posix_acl && (SMB_VFS_SYS_ACL_GET_ENTRY(conn, posix_acl, entry_id, &entry) == 1)) {
                SMB_ACL_TAG_T tagtype;
                SMB_ACL_PERMSET_T permset;
                DOM_SID sid;
@@ -1479,42 +1716,51 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
                        entry_id = SMB_ACL_NEXT_ENTRY;
 
                /* Is this a MASK entry ? */
-               if (conn->vfs_ops.sys_acl_get_tag_type(conn, entry, &tagtype) == -1)
+               if (SMB_VFS_SYS_ACL_GET_TAG_TYPE(conn, entry, &tagtype) == -1)
                        continue;
 
-               if (conn->vfs_ops.sys_acl_get_permset(conn, entry, &permset) == -1)
+               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, entry, &permset) == -1)
                        continue;
 
                /* Decide which SID to use based on the ACL type. */
                switch(tagtype) {
                        case SMB_ACL_USER_OBJ:
                                /* Get the SID from the owner. */
-                               uid_to_sid( &sid, psbuf->st_uid );
+                               sid_copy(&sid, powner);
                                unix_ug.uid = psbuf->st_uid;
                                owner_type = UID_ACE;
                                break;
                        case SMB_ACL_USER:
                                {
-                                       uid_t *puid = (uid_t *)conn->vfs_ops.sys_acl_get_qualifier(conn, entry);
+                                       uid_t *puid = (uid_t *)SMB_VFS_SYS_ACL_GET_QUALIFIER(conn, entry);
                                        if (puid == NULL) {
                                                DEBUG(0,("canonicalise_acl: Failed to get uid.\n"));
                                                continue;
                                        }
+                                       /*
+                                        * A SMB_ACL_USER entry for the owner is shadowed by the
+                                        * SMB_ACL_USER_OBJ entry and Windows also cannot represent
+                                        * that entry, so we ignore it. We also don't create such
+                                        * entries out of the blue when setting ACLs, so a get/set
+                                        * cycle will drop them.
+                                        */
+                                       if (the_acl_type == SMB_ACL_TYPE_ACCESS && *puid == psbuf->st_uid)
+                                               continue;
                                        uid_to_sid( &sid, *puid);
                                        unix_ug.uid = *puid;
                                        owner_type = UID_ACE;
-                                       conn->vfs_ops.sys_acl_free_qualifier(conn, (void *)puid,tagtype);
+                                       SMB_VFS_SYS_ACL_FREE_QUALIFIER(conn, (void *)puid,tagtype);
                                        break;
                                }
                        case SMB_ACL_GROUP_OBJ:
                                /* Get the SID from the owning group. */
-                               gid_to_sid( &sid, psbuf->st_gid );
+                               sid_copy(&sid, pgroup);
                                unix_ug.gid = psbuf->st_gid;
                                owner_type = GID_ACE;
                                break;
                        case SMB_ACL_GROUP:
                                {
-                                       gid_t *pgid = (gid_t *)conn->vfs_ops.sys_acl_get_qualifier(conn, entry);
+                                       gid_t *pgid = (gid_t *)SMB_VFS_SYS_ACL_GET_QUALIFIER(conn, entry);
                                        if (pgid == NULL) {
                                                DEBUG(0,("canonicalise_acl: Failed to get gid.\n"));
                                                continue;
@@ -1522,7 +1768,7 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
                                        gid_to_sid( &sid, *pgid);
                                        unix_ug.gid = *pgid;
                                        owner_type = GID_ACE;
-                                       conn->vfs_ops.sys_acl_free_qualifier(conn, (void *)pgid,tagtype);
+                                       SMB_VFS_SYS_ACL_FREE_QUALIFIER(conn, (void *)pgid,tagtype);
                                        break;
                                }
                        case SMB_ACL_MASK:
@@ -1607,12 +1853,20 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
 {
        connection_struct *conn = fsp->conn;
        BOOL ret = False;
-       SMB_ACL_T the_acl = conn->vfs_ops.sys_acl_init(conn, (int)count_canon_ace_list(the_ace) + 1);
+       SMB_ACL_T the_acl = SMB_VFS_SYS_ACL_INIT(conn, (int)count_canon_ace_list(the_ace) + 1);
        canon_ace *p_ace;
        int i;
        SMB_ACL_ENTRY_T mask_entry;
+       BOOL got_mask_entry = False;
        SMB_ACL_PERMSET_T mask_permset;
        SMB_ACL_TYPE_T the_acl_type = (default_ace ? SMB_ACL_TYPE_DEFAULT : SMB_ACL_TYPE_ACCESS);
+       BOOL needs_mask = False;
+       mode_t mask_perms = 0;
+
+#if defined(POSIX_ACL_NEEDS_MASK)
+       /* HP-UX always wants to have a mask (called "class" there). */
+       needs_mask = True;
+#endif
 
        if (the_acl == NULL) {
 
@@ -1628,20 +1882,46 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                return False;
        }
 
+       if( DEBUGLVL( 10 )) {
+               dbgtext("set_canon_ace_list: setting ACL:\n");
+               for (i = 0, p_ace = the_ace; p_ace; p_ace = p_ace->next, i++ ) {
+                       print_canon_ace( p_ace, i);
+               }
+       }
+
        for (i = 0, p_ace = the_ace; p_ace; p_ace = p_ace->next, i++ ) {
                SMB_ACL_ENTRY_T the_entry;
                SMB_ACL_PERMSET_T the_permset;
 
+               /*
+                * ACLs only "need" an ACL_MASK entry if there are any named user or
+                * named group entries. But if there is an ACL_MASK entry, it applies
+                * to ACL_USER, ACL_GROUP, and ACL_GROUP_OBJ entries. Set the mask
+                * so that it doesn't deny (i.e., mask off) any permissions.
+                */
+
+               if (p_ace->type == SMB_ACL_USER || p_ace->type == SMB_ACL_GROUP) {
+                       needs_mask = True;
+                       mask_perms |= p_ace->perms;
+               } else if (p_ace->type == SMB_ACL_GROUP_OBJ) {
+                       mask_perms |= p_ace->perms;
+               }
+
                /*
                 * Get the entry for this ACE.
                 */
 
-               if (conn->vfs_ops.sys_acl_create_entry(conn, &the_acl, &the_entry) == -1) {
+               if (SMB_VFS_SYS_ACL_CREATE_ENTRY(conn, &the_acl, &the_entry) == -1) {
                        DEBUG(0,("set_canon_ace_list: Failed to create entry %d. (%s)\n",
                                i, strerror(errno) ));
                        goto done;
                }
 
+               if (p_ace->type == SMB_ACL_MASK) {
+                       mask_entry = the_entry;
+                       got_mask_entry = True;
+               }
+
                /*
                 * Ok - we now know the ACL calls should be working, don't
                 * allow fallback to chmod.
@@ -1657,7 +1937,7 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                 * First tell the entry what type of ACE this is.
                 */
 
-               if (conn->vfs_ops.sys_acl_set_tag_type(conn, the_entry, p_ace->type) == -1) {
+               if (SMB_VFS_SYS_ACL_SET_TAG_TYPE(conn, the_entry, p_ace->type) == -1) {
                        DEBUG(0,("set_canon_ace_list: Failed to set tag type on entry %d. (%s)\n",
                                i, strerror(errno) ));
                        goto done;
@@ -1669,7 +1949,7 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                 */
 
                if ((p_ace->type == SMB_ACL_USER) || (p_ace->type == SMB_ACL_GROUP)) {
-                       if (conn->vfs_ops.sys_acl_set_qualifier(conn, the_entry,(void *)&p_ace->unix_ug.uid) == -1) {
+                       if (SMB_VFS_SYS_ACL_SET_QUALIFIER(conn, the_entry,(void *)&p_ace->unix_ug.uid) == -1) {
                                DEBUG(0,("set_canon_ace_list: Failed to set qualifier on entry %d. (%s)\n",
                                        i, strerror(errno) ));
                                goto done;
@@ -1680,7 +1960,7 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                 * Convert the mode_t perms in the canon_ace to a POSIX permset.
                 */
 
-               if (conn->vfs_ops.sys_acl_get_permset(conn, the_entry, &the_permset) == -1) {
+               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, the_entry, &the_permset) == -1) {
                        DEBUG(0,("set_canon_ace_list: Failed to get permset on entry %d. (%s)\n",
                                i, strerror(errno) ));
                        goto done;
@@ -1696,7 +1976,7 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                 * ..and apply them to the entry.
                 */
 
-               if (conn->vfs_ops.sys_acl_set_permset(conn, the_entry, the_permset) == -1) {
+               if (SMB_VFS_SYS_ACL_SET_PERMSET(conn, the_entry, the_permset) == -1) {
                        DEBUG(0,("set_canon_ace_list: Failed to add permset on entry %d. (%s)\n",
                                i, strerror(errno) ));
                        goto done;
@@ -1706,40 +1986,38 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
                        print_canon_ace( p_ace, i);
        }
 
-       /*
-        * Add in a mask of rwx.
-        */
-
-       if (conn->vfs_ops.sys_acl_create_entry( conn, &the_acl, &mask_entry) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to create mask entry. (%s)\n", strerror(errno) ));
-               goto done;
-       }
+       if (needs_mask && !got_mask_entry) {
+               if (SMB_VFS_SYS_ACL_CREATE_ENTRY(conn, &the_acl, &mask_entry) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to create mask entry. (%s)\n", strerror(errno) ));
+                       goto done;
+               }
 
-       if (conn->vfs_ops.sys_acl_set_tag_type(conn, mask_entry, SMB_ACL_MASK) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to set tag type on mask entry. (%s)\n",strerror(errno) ));
-               goto done;
-       }
+               if (SMB_VFS_SYS_ACL_SET_TAG_TYPE(conn, mask_entry, SMB_ACL_MASK) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to set tag type on mask entry. (%s)\n",strerror(errno) ));
+                       goto done;
+               }
 
-       if (conn->vfs_ops.sys_acl_get_permset(conn, mask_entry, &mask_permset) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to get mask permset. (%s)\n", strerror(errno) ));
-               goto done;
-       }
+               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, mask_entry, &mask_permset) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to get mask permset. (%s)\n", strerror(errno) ));
+                       goto done;
+               }
 
-       if (map_acl_perms_to_permset(conn, S_IRUSR|S_IWUSR|S_IXUSR, &mask_permset) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to create mask permset. (%s)\n", strerror(errno) ));
-               goto done;
-       }
+               if (map_acl_perms_to_permset(conn, S_IRUSR|S_IWUSR|S_IXUSR, &mask_permset) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to create mask permset. (%s)\n", strerror(errno) ));
+                       goto done;
+               }
 
-       if (conn->vfs_ops.sys_acl_set_permset(conn, mask_entry, mask_permset) == -1) {
-               DEBUG(0,("set_canon_ace_list: Failed to add mask permset. (%s)\n", strerror(errno) ));
-               goto done;
+               if (SMB_VFS_SYS_ACL_SET_PERMSET(conn, mask_entry, mask_permset) == -1) {
+                       DEBUG(0,("set_canon_ace_list: Failed to add mask permset. (%s)\n", strerror(errno) ));
+                       goto done;
+               }
        }
 
        /*
         * Check if the ACL is valid.
         */
 
-       if (conn->vfs_ops.sys_acl_valid(conn, the_acl) == -1) {
+       if (SMB_VFS_SYS_ACL_VALID(conn, the_acl) == -1) {
                DEBUG(0,("set_canon_ace_list: ACL type (%s) is invalid for set (%s).\n",
                                the_acl_type == SMB_ACL_TYPE_DEFAULT ? "directory default" : "file",
                                strerror(errno) ));
@@ -1751,26 +2029,38 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
         */
 
        if(default_ace || fsp->is_directory || fsp->fd == -1) {
-               if (conn->vfs_ops.sys_acl_set_file(conn, fsp->fsp_name, the_acl_type, the_acl) == -1) {
+               if (SMB_VFS_SYS_ACL_SET_FILE(conn, fsp->fsp_name, the_acl_type, the_acl) == -1) {
                        /*
                         * Some systems allow all the above calls and only fail with no ACL support
                         * when attempting to apply the acl. HPUX with HFS is an example of this. JRA.
                         */
                        if (errno == ENOSYS)
                                *pacl_set_support = False;
+
+#ifdef ENOTSUP
+                       if (errno == ENOTSUP)
+                               *pacl_set_support = False;
+#endif
+
                        DEBUG(2,("set_canon_ace_list: sys_acl_set_file type %s failed for file %s (%s).\n",
                                        the_acl_type == SMB_ACL_TYPE_DEFAULT ? "directory default" : "file",
                                        fsp->fsp_name, strerror(errno) ));
                        goto done;
                }
        } else {
-               if (conn->vfs_ops.sys_acl_set_fd(fsp, fsp->fd, the_acl) == -1) {
+               if (SMB_VFS_SYS_ACL_SET_FD(fsp, fsp->fd, the_acl) == -1) {
                        /*
                         * Some systems allow all the above calls and only fail with no ACL support
                         * when attempting to apply the acl. HPUX with HFS is an example of this. JRA.
                         */
                        if (errno == ENOSYS)
                                *pacl_set_support = False;
+
+#ifdef ENOTSUP
+                       if (errno == ENOTSUP)
+                               *pacl_set_support = False;
+#endif
+
                        DEBUG(2,("set_canon_ace_list: sys_acl_set_file failed for file %s (%s).\n",
                                        fsp->fsp_name, strerror(errno) ));
                        goto done;
@@ -1782,11 +2072,44 @@ static BOOL set_canon_ace_list(files_struct *fsp, canon_ace *the_ace, BOOL defau
   done:
 
        if (the_acl != NULL)
-           conn->vfs_ops.sys_acl_free_acl(conn, the_acl);
+           SMB_VFS_SYS_ACL_FREE_ACL(conn, the_acl);
 
        return ret;
 }
 
+/****************************************************************************
+ Find a particular canon_ace entry.
+****************************************************************************/
+
+static struct canon_ace *canon_ace_entry_for(struct canon_ace *list, SMB_ACL_TAG_T type, posix_id *id)
+{
+       while (list) {
+               if (list->type == type && ((type != SMB_ACL_USER && type != SMB_ACL_GROUP) ||
+                               (type == SMB_ACL_USER  && id && id->uid == list->unix_ug.uid) ||
+                               (type == SMB_ACL_GROUP && id && id->gid == list->unix_ug.gid)))
+                       break;
+               list = list->next;
+       }
+       return list;
+}
+
+/****************************************************************************
+****************************************************************************/
+
+SMB_ACL_T free_empty_sys_acl(connection_struct *conn, SMB_ACL_T acl)
+{
+       SMB_ACL_ENTRY_T entry;
+
+       if (!acl)
+               return NULL;
+       if (SMB_VFS_SYS_ACL_GET_ENTRY(conn, acl, SMB_ACL_FIRST_ENTRY, &entry) != 1) {
+               SMB_VFS_SYS_ACL_FREE_ACL(conn, acl);
+               return NULL;
+       }
+       return acl;
+}
+
 /****************************************************************************
  Convert a canon_ace to a generic 3 element permission - if possible.
 ****************************************************************************/
@@ -1872,6 +2195,45 @@ static int nt_ace_comp( SEC_ACE *a1, SEC_ACE *a2)
        return 1;
 }
 
+/****************************************************************************
+  Incoming NT ACLs on a directory can be split into a default POSIX acl (CI|OI|IO) and
+  a normal POSIX acl. Win2k needs these split acls re-merging into one ACL
+  with CI|OI set so it is inherited and also applies to the directory.
+  Based on code from "Jim McDonough" <jmcd@us.ibm.com>.
+****************************************************************************/
+
+static size_t merge_default_aces( SEC_ACE *nt_ace_list, size_t num_aces)
+{
+       size_t i, j;
+
+       for (i = 0; i < num_aces; i++) {
+               for (j = i+1; j < num_aces; j++) {
+                       /* We know the lower number ACE's are file entries. */
+                       if ((nt_ace_list[i].type == nt_ace_list[j].type) &&
+                               (nt_ace_list[i].size == nt_ace_list[j].size) &&
+                               (nt_ace_list[i].info.mask == nt_ace_list[j].info.mask) &&
+                               sid_equal(&nt_ace_list[i].trustee, &nt_ace_list[j].trustee) &&
+                               (nt_ace_list[i].flags == 0) &&
+                               (nt_ace_list[j].flags == (SEC_ACE_FLAG_OBJECT_INHERIT|
+                                                         SEC_ACE_FLAG_CONTAINER_INHERIT|
+                                                         SEC_ACE_FLAG_INHERIT_ONLY))) {
+                               /*
+                                * These are identical except for the flags.
+                                * Merge the inherited ACE onto the non-inherited ACE.
+                                */
+
+                               nt_ace_list[i].flags = SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT;
+                               if (num_aces - j - 1 > 0)
+                                       memmove(&nt_ace_list[j], &nt_ace_list[j+1], (num_aces-j-1) *
+                                                       sizeof(SEC_ACE));
+                               num_aces--;
+                               break;
+                       }
+               }
+       }
+
+       return num_aces;
+}
 /****************************************************************************
  Reply to query a security descriptor from an fsp. If it succeeds it allocates
  the space for the return elements and returns the size needed to return the
@@ -1881,6 +2243,10 @@ static int nt_ace_comp( SEC_ACE *a1, SEC_ACE *a2)
 
 size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
 {
+       extern DOM_SID global_sid_Builtin_Administrators;
+       extern DOM_SID global_sid_Builtin_Users;
+       extern DOM_SID global_sid_Creator_Owner;
+       extern DOM_SID global_sid_Creator_Group;
        connection_struct *conn = fsp->conn;
        SMB_STRUCT_STAT sbuf;
        SEC_ACE *nt_ace_list = NULL;
@@ -1895,6 +2261,7 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
        SMB_ACL_T dir_acl = NULL;
        canon_ace *file_ace = NULL;
        canon_ace *dir_ace = NULL;
+       size_t num_profile_acls = 0;
  
        *ppdesc = NULL;
 
@@ -1903,32 +2270,34 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
        if(fsp->is_directory || fsp->fd == -1) {
 
                /* Get the stat struct for the owner info. */
-               if(vfs_stat(fsp->conn,fsp->fsp_name, &sbuf) != 0) {
+               if(SMB_VFS_STAT(fsp->conn,fsp->fsp_name, &sbuf) != 0) {
                        return 0;
                }
                /*
                 * Get the ACL from the path.
                 */
 
-               posix_acl = conn->vfs_ops.sys_acl_get_file(conn, fsp->fsp_name, SMB_ACL_TYPE_ACCESS);
+               posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fsp->fsp_name, SMB_ACL_TYPE_ACCESS);
 
                /*
                 * If it's a directory get the default POSIX ACL.
                 */
 
-               if(fsp->is_directory)
-                       dir_acl = conn->vfs_ops.sys_acl_get_file(conn, fsp->fsp_name, SMB_ACL_TYPE_DEFAULT);
+               if(fsp->is_directory) {
+                       dir_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fsp->fsp_name, SMB_ACL_TYPE_DEFAULT);
+                       dir_acl = free_empty_sys_acl(conn, dir_acl);
+               }
 
        } else {
 
                /* Get the stat struct for the owner info. */
-               if(vfs_fstat(fsp,fsp->fd,&sbuf) != 0) {
+               if(SMB_VFS_FSTAT(fsp,fsp->fd,&sbuf) != 0) {
                        return 0;
                }
                /*
                 * Get the ACL from the fd.
                 */
-               posix_acl = conn->vfs_ops.sys_acl_get_fd(fsp, fsp->fd);
+               posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp, fsp->fd);
        }
 
        DEBUG(5,("get_nt_acl : file ACL %s, directory ACL %s\n",
@@ -1939,37 +2308,40 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
         * Get the owner, group and world SIDs.
         */
 
-       create_file_sids(&sbuf, &owner_sid, &group_sid);
+       if (lp_profile_acls(SNUM(fsp->conn))) {
+               /* For WXP SP1 the owner must be administrators. */
+               sid_copy(&owner_sid, &global_sid_Builtin_Administrators);
+               sid_copy(&group_sid, &global_sid_Builtin_Users);
+               num_profile_acls = 2;
+       } else {
+               create_file_sids(&sbuf, &owner_sid, &group_sid);
+       }
+
+       /*
+        * In the optimum case Creator Owner and Creator Group would be used for
+        * the ACL_USER_OBJ and ACL_GROUP_OBJ entries, respectively, but this
+        * would lead to usability problems under Windows: The Creator entries
+        * are only available in browse lists of directories and not for files;
+        * additionally the identity of the owning group couldn't be determined.
+        * We therefore use those identities only for Default ACLs. 
+        */
 
        /* Create the canon_ace lists. */
-       file_ace = canonicalise_acl( fsp, posix_acl, &sbuf,  &owner_sid, &group_sid);
-       num_acls = count_canon_ace_list(file_ace);
+       file_ace = canonicalise_acl( fsp, posix_acl, &sbuf, &owner_sid, &group_sid, SMB_ACL_TYPE_ACCESS );
 
        /* We must have *some* ACLS. */
 
-       if (num_acls == 0) {
+       if (count_canon_ace_list(file_ace) == 0) {
                DEBUG(0,("get_nt_acl : No ACLs on file (%s) !\n", fsp->fsp_name ));
                return 0;
        }
 
-       if (fsp->is_directory) { 
-               /*
-                * If we have to fake a default ACL then this is the mode to use.
-                */
-               sbuf.st_mode = unix_mode( fsp->conn, FILE_ATTRIBUTE_ARCHIVE, fsp->fsp_name);
-
-               dir_ace = canonicalise_acl(fsp, dir_acl, &sbuf, &owner_sid, &group_sid);
-               num_dir_acls = count_canon_ace_list(dir_ace);
-       }
-
-       /* Allocate the ace list. */
-       if ((nt_ace_list = (SEC_ACE *)malloc((num_acls + num_dir_acls)* sizeof(SEC_ACE))) == NULL) {
-               DEBUG(0,("get_nt_acl: Unable to malloc space for nt_ace_list.\n"));
-               goto done;
+       if (fsp->is_directory && dir_acl) {
+               dir_ace = canonicalise_acl(fsp, dir_acl, &sbuf,
+                               &global_sid_Creator_Owner,
+                               &global_sid_Creator_Group, SMB_ACL_TYPE_DEFAULT );
        }
 
-       memset(nt_ace_list, '\0', (num_acls + num_dir_acls) * sizeof(SEC_ACE) );
-
        /*
         * Create the NT ACE list from the canonical ace lists.
         */
@@ -1979,30 +2351,153 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
                int nt_acl_type;
                int i;
 
+               if (nt4_compatible_acls()) {
+                       /*
+                        * NT 4 chokes if an ACL contains an INHERIT_ONLY entry
+                        * but no non-INHERIT_ONLY entry for one SID. So we only
+                        * remove entries from the Access ACL if the
+                        * corresponding Default ACL entries have also been
+                        * removed. ACEs for CREATOR-OWNER and CREATOR-GROUP
+                        * are exceptions. We can do nothing
+                        * intelligent if the Default ACL contains entries that
+                        * are not also contained in the Access ACL, so this
+                        * case will still fail under NT 4.
+                        */
+
+                       if (!dir_ace)
+                               goto simplify_file_ace_only;
+
+                       ace = canon_ace_entry_for(dir_ace, SMB_ACL_OTHER, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(dir_ace, ace);
+                               SAFE_FREE(ace);
+
+                               ace = canon_ace_entry_for(file_ace, SMB_ACL_OTHER, NULL);
+                               if (ace && !ace->perms) {
+                                       DLIST_REMOVE(file_ace, ace);
+                                       SAFE_FREE(ace);
+                               }
+                       }
+
+                       /*
+                        * WinNT doesn't usually have Creator Group
+                        * in browse lists, so we send this entry to
+                        * WinNT even if it contains no relevant
+                        * permissions. Once we can add
+                        * Creator Group to browse lists we can
+                        * re-enable this.
+                        */
+
+#if 0
+                       ace = canon_ace_entry_for(dir_ace, SMB_ACL_GROUP_OBJ, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(dir_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+#endif
+
+                       ace = canon_ace_entry_for(file_ace, SMB_ACL_GROUP_OBJ, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(file_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+               } else {
+
+                       ace = canon_ace_entry_for(dir_ace, SMB_ACL_OTHER, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(dir_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+                       ace = canon_ace_entry_for(dir_ace, SMB_ACL_GROUP_OBJ, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(dir_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+
+ simplify_file_ace_only:
+
+                       ace = canon_ace_entry_for(file_ace, SMB_ACL_OTHER, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(file_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+
+                       ace = canon_ace_entry_for(file_ace, SMB_ACL_GROUP_OBJ, NULL);
+                       if (ace && !ace->perms) {
+                               DLIST_REMOVE(file_ace, ace);
+                               SAFE_FREE(ace);
+                       }
+               }
+
+               num_acls = count_canon_ace_list(file_ace);
+               num_dir_acls = count_canon_ace_list(dir_ace);
+
+               /* Allocate the ace list. */
+               if ((nt_ace_list = (SEC_ACE *)malloc((num_acls + num_profile_acls + num_dir_acls)* sizeof(SEC_ACE))) == NULL) {
+                       DEBUG(0,("get_nt_acl: Unable to malloc space for nt_ace_list.\n"));
+                       goto done;
+               }
+
+               memset(nt_ace_list, '\0', (num_acls + num_dir_acls) * sizeof(SEC_ACE) );
+                                                                                               
+               /*
+                * Create the NT ACE list from the canonical ace lists.
+                */
+
                ace = file_ace;
 
                for (i = 0; i < num_acls; i++, ace = ace->next) {
-                       SEC_ACCESS acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
+                       SEC_ACCESS acc;
+
+                       acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
                        init_sec_ace(&nt_ace_list[num_aces++], &ace->trustee, nt_acl_type, acc, 0);
                }
 
+               /* The User must have access to a profile share - even if we can't map the SID. */
+               if (lp_profile_acls(SNUM(fsp->conn))) {
+                       SEC_ACCESS acc;
+
+                       init_sec_access(&acc,FILE_GENERIC_ALL);
+                       init_sec_ace(&nt_ace_list[num_aces++], &global_sid_Builtin_Users, SEC_ACE_TYPE_ACCESS_ALLOWED, acc, 0);
+               }
+
                ace = dir_ace;
 
                for (i = 0; i < num_dir_acls; i++, ace = ace->next) {
-                       SEC_ACCESS acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
-                       init_sec_ace(&nt_ace_list[num_aces++], &ace->trustee, nt_acl_type, acc, 
+                       SEC_ACCESS acc;
+
+                       acc = map_canon_ace_perms(&nt_acl_type, &owner_sid, ace );
+                       init_sec_ace(&nt_ace_list[num_aces++], &ace->trustee, nt_acl_type, acc,
                                        SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT|SEC_ACE_FLAG_INHERIT_ONLY);
                }
 
+               /* The User must have access to a profile share - even if we can't map the SID. */
+               if (lp_profile_acls(SNUM(fsp->conn))) {
+                       SEC_ACCESS acc;
+                       
+                       init_sec_access(&acc,FILE_GENERIC_ALL);
+                       init_sec_ace(&nt_ace_list[num_aces++], &global_sid_Builtin_Users, SEC_ACE_TYPE_ACCESS_ALLOWED, acc,
+                                       SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT|
+                                       SEC_ACE_FLAG_INHERIT_ONLY);
+               }
+
+               /*
+                * Merge POSIX default ACLs and normal ACLs into one NT ACE.
+                * Win2K needs this to get the inheritance correct when replacing ACLs
+                * on a directory tree. Based on work by Jim @ IBM.
+                */
+
+               num_aces = merge_default_aces(nt_ace_list, num_aces);
+
                /*
                 * Sort to force deny entries to the front.
                 */
 
-               if (num_acls + num_dir_acls)
-                       qsort( nt_ace_list, num_acls + num_dir_acls, sizeof(nt_ace_list[0]), QSORT_CAST nt_ace_comp);
+               if (num_aces)
+                       qsort( nt_ace_list, num_aces, sizeof(nt_ace_list[0]), QSORT_CAST nt_ace_comp);
        }
 
-       if (num_acls) {
+       if (num_aces) {
                if((psa = make_sec_acl( main_loop_talloc_get(), ACL_REVISION, num_aces, nt_ace_list)) == NULL) {
                        DEBUG(0,("get_nt_acl: Unable to malloc space for acl.\n"));
                        goto done;
@@ -2014,14 +2509,25 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
        if(!*ppdesc) {
                DEBUG(0,("get_nt_acl: Unable to malloc space for security descriptor.\n"));
                sd_size = 0;
+       } else {
+               /*
+                * Windows 2000: The DACL_PROTECTED flag in the security
+                * descriptor marks the ACL as non-inheriting, i.e., no
+                * ACEs from higher level directories propagate to this
+                * ACL. In the POSIX ACL model permissions are only
+                * inherited at file create time, so ACLs never contain
+                * any ACEs that are inherited dynamically. The DACL_PROTECTED
+                * flag doesn't seem to bother Windows NT.
+                */
+               (*ppdesc)->type |= SE_DESC_DACL_PROTECTED;
        }
 
 done:
+ done:
 
-       if (posix_acl)  
-               conn->vfs_ops.sys_acl_free_acl(conn, posix_acl);
+       if (posix_acl)
+               SMB_VFS_SYS_ACL_FREE_ACL(conn, posix_acl);
        if (dir_acl)
-               conn->vfs_ops.sys_acl_free_acl(conn, dir_acl);
+               SMB_VFS_SYS_ACL_FREE_ACL(conn, dir_acl);
        free_canon_ace_list(file_ace);
        free_canon_ace_list(dir_ace);
        SAFE_FREE(nt_ace_list);
@@ -2029,14 +2535,14 @@ size_t get_nt_acl(files_struct *fsp, SEC_DESC **ppdesc)
        return sd_size;
 }
 
-/*
-  try to chown a file. We will be able to chown it under the following conditions
+/****************************************************************************
+ Try to chown a file. We will be able to chown it under the following conditions.
 
-  1) if we have root privileges, then it will just work
-  2) if we have write permission to the file and dos_filemodes is set
+  1) If we have root privileges, then it will just work.
+  2) If we have write permission to the file and dos_filemodes is set
      then allow chown to the currently authenticated user.
+****************************************************************************/
 
- */
 static int try_chown(connection_struct *conn, const char *fname, uid_t uid, gid_t gid)
 {
        int ret;
@@ -2045,29 +2551,29 @@ static int try_chown(connection_struct *conn, const char *fname, uid_t uid, gid_
        SMB_STRUCT_STAT st;
 
        /* try the direct way first */
-       ret = vfs_chown(conn, fname, uid, gid);
-       if (ret == 0) return 0;
+       ret = SMB_VFS_CHOWN(conn, fname, uid, gid);
+       if (ret == 0)
+               return 0;
 
        if(!CAN_WRITE(conn) || !lp_dos_filemode(SNUM(conn)))
                return -1;
 
-       if (vfs_stat(conn,fname,&st)) {
+       if (SMB_VFS_STAT(conn,fname,&st))
                return -1;
-       }
 
        fsp = open_file_fchmod(conn,fname,&st);
-       if (!fsp) {
+       if (!fsp)
                return -1;
-       }
 
        /* only allow chown to the current user. This is more secure,
           and also copes with the case where the SID in a take ownership ACL is
           a local SID on the users workstation 
        */
        uid = current_user.uid;
-       
+
        become_root();
-       ret = vfswrap_fchown(fsp, fsp->fd, uid, gid);
+       /* Keep the current file gid the same. */
+       ret = SMB_VFS_FCHOWN(fsp, fsp->fd, uid, (gid_t)-1);
        unbecome_root();
 
        close_file_fchmod(fsp);
@@ -2095,18 +2601,25 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
        mode_t orig_mode = (mode_t)0;
        uid_t orig_uid;
        gid_t orig_gid;
+       BOOL need_chown = False;
+       extern struct current_user current_user;
 
        DEBUG(10,("set_nt_acl: called for file %s\n", fsp->fsp_name ));
 
+       if (!CAN_WRITE(conn)) {
+               DEBUG(10,("set acl rejected on read-only share\n"));
+               return False;
+       }
+
        /*
         * Get the current state of the file.
         */
 
        if(fsp->is_directory || fsp->fd == -1) {
-               if(vfs_stat(fsp->conn,fsp->fsp_name, &sbuf) != 0)
+               if(SMB_VFS_STAT(fsp->conn,fsp->fsp_name, &sbuf) != 0)
                        return False;
        } else {
-               if(vfs_fstat(fsp,fsp->fd,&sbuf) != 0)
+               if(SMB_VFS_FSTAT(fsp,fsp->fd,&sbuf) != 0)
                        return False;
        }
 
@@ -2126,7 +2639,16 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
         * Do we need to chown ?
         */
 
-       if((user != (uid_t)-1 || grp != (uid_t)-1) && (orig_uid != user || orig_gid != grp)) {
+       if (((user != (uid_t)-1) && (orig_uid != user)) || (( grp != (gid_t)-1) && (orig_gid != grp)))
+               need_chown = True;
+
+       /*
+        * Chown before setting ACL only if we don't change the user, or
+        * if we change to the current user, but not if we want to give away
+        * the file.
+        */
+
+       if (need_chown && (user == (uid_t)-1 || user == current_user.uid)) {
 
                DEBUG(3,("set_nt_acl: chown %s. uid = %u, gid = %u.\n",
                                fsp->fsp_name, (unsigned int)user, (unsigned int)grp ));
@@ -2143,7 +2665,7 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
                 */
 
                if(fsp->is_directory) {
-                       if(vfs_stat(fsp->conn, fsp->fsp_name, &sbuf) != 0) {
+                       if(SMB_VFS_STAT(fsp->conn, fsp->fsp_name, &sbuf) != 0) {
                                return False;
                        }
                } else {
@@ -2151,9 +2673,9 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
                        int ret;
     
                        if(fsp->fd == -1)
-                               ret = vfs_stat(fsp->conn, fsp->fsp_name, &sbuf);
+                               ret = SMB_VFS_STAT(fsp->conn, fsp->fsp_name, &sbuf);
                        else
-                               ret = vfs_fstat(fsp,fsp->fd,&sbuf);
+                               ret = SMB_VFS_FSTAT(fsp,fsp->fd,&sbuf);
   
                        if(ret != 0)
                                return False;
@@ -2163,6 +2685,9 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
                orig_mode = sbuf.st_mode;
                orig_uid = sbuf.st_uid;
                orig_gid = sbuf.st_gid;
+
+               /* We did it, don't try again */
+               need_chown = False;
        }
 
        create_file_sids(&sbuf, &file_owner_sid, &file_grp_sid);
@@ -2170,97 +2695,110 @@ BOOL set_nt_acl(files_struct *fsp, uint32 security_info_sent, SEC_DESC *psd)
        acl_perms = unpack_canon_ace( fsp, &sbuf, &file_owner_sid, &file_grp_sid,
                                                                        &file_ace_list, &dir_ace_list, security_info_sent, psd);
 
-       if ((file_ace_list == NULL) && (dir_ace_list == NULL)) {
-               /* W2K traverse DACL set - ignore. */
-               return True;
-    }
-
-       if (!acl_perms) {
-               DEBUG(3,("set_nt_acl: cannot set permissions\n"));
-               free_canon_ace_list(file_ace_list);
-               free_canon_ace_list(dir_ace_list); 
-               return False;
-       }
-
-       /*
-        * Only change security if we got a DACL.
-        */
-
-       if((security_info_sent & DACL_SECURITY_INFORMATION) && (psd->dacl != NULL)) {
+       /* Ignore W2K traverse DACL set. */
+       if (file_ace_list || dir_ace_list) {
 
-               BOOL acl_set_support = False;
-               BOOL ret = False;
+               if (!acl_perms) {
+                       DEBUG(3,("set_nt_acl: cannot set permissions\n"));
+                       free_canon_ace_list(file_ace_list);
+                       free_canon_ace_list(dir_ace_list); 
+                       return False;
+               }
 
                /*
-                * Try using the POSIX ACL set first. Fall back to chmod if
-                * we have no ACL support on this filesystem.
+                * Only change security if we got a DACL.
                 */
 
-               if (acl_perms && file_ace_list) {
-                       ret = set_canon_ace_list(fsp, file_ace_list, False, &acl_set_support);
-                       if (acl_set_support && ret == False) {
-                               DEBUG(3,("set_nt_acl: failed to set file acl on file %s (%s).\n", fsp->fsp_name, strerror(errno) ));
-                               free_canon_ace_list(file_ace_list);
-                               free_canon_ace_list(dir_ace_list); 
-                               return False;
-                       }
-               }
+               if((security_info_sent & DACL_SECURITY_INFORMATION) && (psd->dacl != NULL)) {
 
-               if (acl_perms && acl_set_support && fsp->is_directory) {
-                       if (dir_ace_list) {
-                               if (!set_canon_ace_list(fsp, dir_ace_list, True, &acl_set_support)) {
-                                       DEBUG(3,("set_nt_acl: failed to set default acl on directory %s (%s).\n", fsp->fsp_name, strerror(errno) ));
-                                       free_canon_ace_list(file_ace_list);
-                                       free_canon_ace_list(dir_ace_list); 
-                                       return False;
-                               }
-                       } else {
+                       BOOL acl_set_support = False;
+                       BOOL ret = False;
 
-                               /*
-                                * No default ACL - delete one if it exists.
-                                */
+                       /*
+                        * Try using the POSIX ACL set first. Fall back to chmod if
+                        * we have no ACL support on this filesystem.
+                        */
 
-                               if (conn->vfs_ops.sys_acl_delete_def_file(conn, fsp->fsp_name) == -1) {
-                                       DEBUG(3,("set_nt_acl: sys_acl_delete_def_file failed (%s)\n", strerror(errno)));
+                       if (acl_perms && file_ace_list) {
+                               ret = set_canon_ace_list(fsp, file_ace_list, False, &acl_set_support);
+                               if (acl_set_support && ret == False) {
+                                       DEBUG(3,("set_nt_acl: failed to set file acl on file %s (%s).\n", fsp->fsp_name, strerror(errno) ));
                                        free_canon_ace_list(file_ace_list);
+                                       free_canon_ace_list(dir_ace_list); 
                                        return False;
                                }
                        }
-               }
 
-               /*
-                * If we cannot set using POSIX ACLs we fall back to checking if we need to chmod.
-                */
+                       if (acl_perms && acl_set_support && fsp->is_directory) {
+                               if (dir_ace_list) {
+                                       if (!set_canon_ace_list(fsp, dir_ace_list, True, &acl_set_support)) {
+                                               DEBUG(3,("set_nt_acl: failed to set default acl on directory %s (%s).\n", fsp->fsp_name, strerror(errno) ));
+                                               free_canon_ace_list(file_ace_list);
+                                               free_canon_ace_list(dir_ace_list); 
+                                               return False;
+                                       }
+                               } else {
 
-               if(!acl_set_support && acl_perms) {
-                       mode_t posix_perms;
+                                       /*
+                                        * No default ACL - delete one if it exists.
+                                        */
 
-                       if (!convert_canon_ace_to_posix_perms( fsp, file_ace_list, &posix_perms)) {
-                               free_canon_ace_list(file_ace_list);
-                               free_canon_ace_list(dir_ace_list);
-                               DEBUG(3,("set_nt_acl: failed to convert file acl to posix permissions for file %s.\n",
-                                       fsp->fsp_name ));
-                               return False;
+                                       if (SMB_VFS_SYS_ACL_DELETE_DEF_FILE(conn, fsp->fsp_name) == -1) {
+                                               DEBUG(3,("set_nt_acl: sys_acl_delete_def_file failed (%s)\n", strerror(errno)));
+                                               free_canon_ace_list(file_ace_list);
+                                               free_canon_ace_list(dir_ace_list);
+                                               return False;
+                                       }
+                               }
                        }
 
-                       if (orig_mode != posix_perms) {
+                       /*
+                        * If we cannot set using POSIX ACLs we fall back to checking if we need to chmod.
+                        */
 
-                               DEBUG(3,("set_nt_acl: chmod %s. perms = 0%o.\n",
-                                       fsp->fsp_name, (unsigned int)posix_perms ));
+                       if(!acl_set_support && acl_perms) {
+                               mode_t posix_perms;
 
-                               if(conn->vfs_ops.chmod(conn,fsp->fsp_name, posix_perms) == -1) {
-                                       DEBUG(3,("set_nt_acl: chmod %s, 0%o failed. Error = %s.\n",
-                                                       fsp->fsp_name, (unsigned int)posix_perms, strerror(errno) ));
+                               if (!convert_canon_ace_to_posix_perms( fsp, file_ace_list, &posix_perms)) {
                                        free_canon_ace_list(file_ace_list);
                                        free_canon_ace_list(dir_ace_list);
+                                       DEBUG(3,("set_nt_acl: failed to convert file acl to posix permissions for file %s.\n",
+                                               fsp->fsp_name ));
                                        return False;
                                }
+
+                               if (orig_mode != posix_perms) {
+
+                                       DEBUG(3,("set_nt_acl: chmod %s. perms = 0%o.\n",
+                                               fsp->fsp_name, (unsigned int)posix_perms ));
+
+                                       if(SMB_VFS_CHMOD(conn,fsp->fsp_name, posix_perms) == -1) {
+                                               DEBUG(3,("set_nt_acl: chmod %s, 0%o failed. Error = %s.\n",
+                                                               fsp->fsp_name, (unsigned int)posix_perms, strerror(errno) ));
+                                               free_canon_ace_list(file_ace_list);
+                                               free_canon_ace_list(dir_ace_list);
+                                               return False;
+                                       }
+                               }
                        }
                }
+
+               free_canon_ace_list(file_ace_list);
+               free_canon_ace_list(dir_ace_list); 
        }
 
-       free_canon_ace_list(file_ace_list);
-       free_canon_ace_list(dir_ace_list); 
+       /* Any chown pending? */
+       if (need_chown) {
+
+               DEBUG(3,("set_nt_acl: chown %s. uid = %u, gid = %u.\n",
+                       fsp->fsp_name, (unsigned int)user, (unsigned int)grp ));
+
+               if(try_chown( fsp->conn, fsp->fsp_name, user, grp) == -1) {
+                       DEBUG(3,("set_nt_acl: chown %s, %u, %u failed. Error = %s.\n",
+                               fsp->fsp_name, (unsigned int)user, (unsigned int)grp, strerror(errno) ));
+                       return False;
+               }
+       }
 
        return True;
 }
@@ -2276,7 +2814,7 @@ static int chmod_acl_internals( connection_struct *conn, SMB_ACL_T posix_acl, mo
        SMB_ACL_ENTRY_T entry;
        int num_entries = 0;
 
-       while ( conn->vfs_ops.sys_acl_get_entry(conn, posix_acl, entry_id, &entry) == 1) {
+       while ( SMB_VFS_SYS_ACL_GET_ENTRY(conn, posix_acl, entry_id, &entry) == 1) {
                SMB_ACL_TAG_T tagtype;
                SMB_ACL_PERMSET_T permset;
                mode_t perms;
@@ -2285,10 +2823,10 @@ static int chmod_acl_internals( connection_struct *conn, SMB_ACL_T posix_acl, mo
                if (entry_id == SMB_ACL_FIRST_ENTRY)
                        entry_id = SMB_ACL_NEXT_ENTRY;
 
-               if (conn->vfs_ops.sys_acl_get_tag_type(conn, entry, &tagtype) == -1)
+               if (SMB_VFS_SYS_ACL_GET_TAG_TYPE(conn, entry, &tagtype) == -1)
                        return -1;
 
-               if (conn->vfs_ops.sys_acl_get_permset(conn, entry, &permset) == -1)
+               if (SMB_VFS_SYS_ACL_GET_PERMSET(conn, entry, &permset) == -1)
                        return -1;
 
                num_entries++;
@@ -2296,11 +2834,17 @@ static int chmod_acl_internals( connection_struct *conn, SMB_ACL_T posix_acl, mo
                switch(tagtype) {
                        case SMB_ACL_USER_OBJ:
                                perms = unix_perms_to_acl_perms(mode, S_IRUSR, S_IWUSR, S_IXUSR);
-                break;
+                               break;
                        case SMB_ACL_GROUP_OBJ:
                                perms = unix_perms_to_acl_perms(mode, S_IRGRP, S_IWGRP, S_IXGRP);
                                break;
                        case SMB_ACL_MASK:
+                               /*
+                                * FIXME: The ACL_MASK entry permissions should really be set to
+                                * the union of the permissions of all ACL_USER,
+                                * ACL_GROUP_OBJ, and ACL_GROUP entries. That's what
+                                * acl_calc_mask() does, but Samba ACLs doesn't provide it.
+                                */
                                perms = S_IRUSR|S_IWUSR|S_IXUSR;
                                break;
                        case SMB_ACL_OTHER:
@@ -2313,7 +2857,7 @@ static int chmod_acl_internals( connection_struct *conn, SMB_ACL_T posix_acl, mo
                if (map_acl_perms_to_permset(conn, perms, &permset) == -1)
                        return -1;
 
-               if (conn->vfs_ops.sys_acl_set_permset(conn, entry, permset) == -1)
+               if (SMB_VFS_SYS_ACL_SET_PERMSET(conn, entry, permset) == -1)
                        return -1;
        }
 
@@ -2329,30 +2873,57 @@ static int chmod_acl_internals( connection_struct *conn, SMB_ACL_T posix_acl, mo
 }
 
 /****************************************************************************
- Do a chmod by setting the ACL USER_OBJ, GROUP_OBJ and OTHER bits in an ACL
- and set the mask to rwx. Needed to preserve complex ACLs set by NT.
- Note that name is in UNIX character set.
+ Get the access ACL of FROM, do a chmod by setting the ACL USER_OBJ,
+ GROUP_OBJ and OTHER bits in an ACL and set the mask to rwx. Set the
resulting ACL on TO.  Note that name is in UNIX character set.
 ****************************************************************************/
 
-int chmod_acl(connection_struct *conn, const char *name, mode_t mode)
+static int copy_access_acl(connection_struct *conn, const char *from, const char *to, mode_t mode)
 {
        SMB_ACL_T posix_acl = NULL;
        int ret = -1;
 
-       if ((posix_acl = conn->vfs_ops.sys_acl_get_file(conn, name, SMB_ACL_TYPE_ACCESS)) == NULL)
+       if ((posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, from, SMB_ACL_TYPE_ACCESS)) == NULL)
                return -1;
 
        if ((ret = chmod_acl_internals(conn, posix_acl, mode)) == -1)
                goto done;
 
-       ret = conn->vfs_ops.sys_acl_set_file(conn, name, SMB_ACL_TYPE_ACCESS, posix_acl);
+       ret = SMB_VFS_SYS_ACL_SET_FILE(conn, to, SMB_ACL_TYPE_ACCESS, posix_acl);
 
 done:
+ done:
 
-       conn->vfs_ops.sys_acl_free_acl(conn, posix_acl);
+       SMB_VFS_SYS_ACL_FREE_ACL(conn, posix_acl);
        return ret;
 }
 
+/****************************************************************************
+ Do a chmod by setting the ACL USER_OBJ, GROUP_OBJ and OTHER bits in an ACL
+ and set the mask to rwx. Needed to preserve complex ACLs set by NT.
+ Note that name is in UNIX character set.
+****************************************************************************/
+
+int chmod_acl(connection_struct *conn, const char *name, mode_t mode)
+{
+       return copy_access_acl(conn, name, name, mode);
+}
+
+/****************************************************************************
+ If "inherit permissions" is set and the parent directory has no default
+ ACL but it does have an Access ACL, inherit this Access ACL to file name.
+****************************************************************************/
+
+int inherit_access_acl(connection_struct *conn, const char *name, mode_t mode)
+{
+       pstring dirname;
+       pstrcpy(dirname, parent_dirname(name));
+
+       if (!lp_inherit_perms(SNUM(conn)) || directory_has_default_acl(conn, dirname))
+               return 0;
+
+       return copy_access_acl(conn, dirname, name, mode);
+}
+
 /****************************************************************************
  Do an fchmod by setting the ACL USER_OBJ, GROUP_OBJ and OTHER bits in an ACL
  and set the mask to rwx. Needed to preserve complex ACLs set by NT.
@@ -2364,29 +2935,34 @@ int fchmod_acl(files_struct *fsp, int fd, mode_t mode)
        SMB_ACL_T posix_acl = NULL;
        int ret = -1;
 
-       if ((posix_acl = conn->vfs_ops.sys_acl_get_fd(fsp, fd)) == NULL)
+       if ((posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp, fd)) == NULL)
                return -1;
 
        if ((ret = chmod_acl_internals(conn, posix_acl, mode)) == -1)
                goto done;
 
-       ret = conn->vfs_ops.sys_acl_set_fd(fsp, fd, posix_acl);
+       ret = SMB_VFS_SYS_ACL_SET_FD(fsp, fd, posix_acl);
 
   done:
 
-       conn->vfs_ops.sys_acl_free_acl(conn, posix_acl);
+       SMB_VFS_SYS_ACL_FREE_ACL(conn, posix_acl);
        return ret;
 }
 
+/****************************************************************************
+ Check for an existing default POSIX ACL on a directory.
+****************************************************************************/
+
 BOOL directory_has_default_acl(connection_struct *conn, const char *fname)
 {
-        SMB_ACL_T dir_acl = conn->vfs_ops.sys_acl_get_file( conn, fname, SMB_ACL_TYPE_DEFAULT);
+        SMB_ACL_T dir_acl = SMB_VFS_SYS_ACL_GET_FILE( conn, fname, SMB_ACL_TYPE_DEFAULT);
         BOOL has_acl = False;
         SMB_ACL_ENTRY_T entry;
 
-        if (dir_acl != NULL && (conn->vfs_ops.sys_acl_get_entry(conn, dir_acl, SMB_ACL_FIRST_ENTRY, &entry) == 1))
+        if (dir_acl != NULL && (SMB_VFS_SYS_ACL_GET_ENTRY(conn, dir_acl, SMB_ACL_FIRST_ENTRY, &entry) == 1))
                 has_acl = True;
 
-        conn->vfs_ops.sys_acl_free_acl(conn, dir_acl);
+       if (dir_acl)
+               SMB_VFS_SYS_ACL_FREE_ACL(conn, dir_acl);
         return has_acl;
 }