dlist: remove unneeded argument from DLIST_DEMOTE()
[vlendec/samba-autobuild/.git] / source3 / smbd / posix_acls.c
index c45003defd1302447b734fe7b2932681a5c42aa2..660c0e4e0d3a073a151005fdfc6804bfc55c9a7c 100644 (file)
@@ -27,6 +27,7 @@
 #include "passdb/lookup_sid.h"
 #include "auth.h"
 #include "../librpc/gen_ndr/idmap.h"
+#include "../librpc/gen_ndr/ndr_smb_acl.h"
 #include "lib/param/loadparm.h"
 
 extern const struct generic_mapping file_generic_mapping;
@@ -129,7 +130,7 @@ struct pai_val {
 };
 
 /************************************************************************
- Return a uint32 of the pai_entry principal.
+ Return a uint32_t of the pai_entry principal.
 ************************************************************************/
 
 static uint32_t get_pai_entry_val(struct pai_entry *paie)
@@ -149,7 +150,7 @@ static uint32_t get_pai_entry_val(struct pai_entry *paie)
 }
 
 /************************************************************************
- Return a uint32 of the entry principal.
+ Return a uint32_t of the entry principal.
 ************************************************************************/
 
 static uint32_t get_entry_val(canon_ace *ace_entry)
@@ -337,8 +338,8 @@ static uint16_t get_pai_flags(struct pai_val *pal, canon_ace *ace_entry, bool de
 
 static bool check_pai_ok_v1(const char *pai_buf, size_t pai_buf_data_size)
 {
-       uint16 num_entries;
-       uint16 num_def_entries;
+       uint16_t num_entries;
+       uint16_t num_def_entries;
 
        if (pai_buf_data_size < PAI_V1_ENTRIES_BASE) {
                /* Corrupted - too small. */
@@ -369,8 +370,8 @@ static bool check_pai_ok_v1(const char *pai_buf, size_t pai_buf_data_size)
 
 static bool check_pai_ok_v2(const char *pai_buf, size_t pai_buf_data_size)
 {
-       uint16 num_entries;
-       uint16 num_def_entries;
+       uint16_t num_entries;
+       uint16_t num_def_entries;
 
        if (pai_buf_data_size < PAI_V2_ENTRIES_BASE) {
                /* Corrupted - too small. */
@@ -1057,24 +1058,6 @@ static void merge_aces( canon_ace **pp_list_head, bool dir_acl)
        *pp_list_head = l_head;
 }
 
-/****************************************************************************
- Check if we need to return NT4.x compatible ACL entries.
-****************************************************************************/
-
-bool nt4_compatible_acls(void)
-{
-       int compat = lp_acl_compatibility();
-
-       if (compat == ACL_COMPAT_AUTO) {
-               enum remote_arch_types ra_type = get_remote_arch();
-
-               /* Automatically adapt to client */
-               return (ra_type <= RA_WINNT);
-       } else
-               return (compat == ACL_COMPAT_WINNT);
-}
-
-
 /****************************************************************************
  Map canon_ace perms to permission bits NT.
  The attr element is not used here - we only process deny entries on set,
@@ -1106,10 +1089,7 @@ uint32_t map_canon_ace_perms(int snum,
                 * to be changed in the future.
                 */
 
-               if (nt4_compatible_acls())
-                       nt_mask = UNIX_ACCESS_NONE;
-               else
-                       nt_mask = 0;
+               nt_mask = 0;
        } else {
                if (directory_ace) {
                        nt_mask |= ((perms & S_IRUSR) ? UNIX_DIRECTORY_ACCESS_R : 0 );
@@ -1140,7 +1120,7 @@ uint32_t map_canon_ace_perms(int snum,
 #define FILE_SPECIFIC_WRITE_BITS (FILE_WRITE_DATA|FILE_APPEND_DATA|FILE_WRITE_EA)
 #define FILE_SPECIFIC_EXECUTE_BITS (FILE_EXECUTE)
 
-static mode_t map_nt_perms( uint32 *mask, int type)
+static mode_t map_nt_perms( uint32_t *mask, int type)
 {
        mode_t mode = 0;
 
@@ -1183,12 +1163,9 @@ static mode_t map_nt_perms( uint32 *mask, int type)
 
 NTSTATUS unpack_nt_owners(struct connection_struct *conn,
                        uid_t *puser, gid_t *pgrp,
-                       uint32 security_info_sent, const struct
+                       uint32_t security_info_sent, const struct
                        security_descriptor *psd)
 {
-       struct dom_sid owner_sid;
-       struct dom_sid grp_sid;
-
        *puser = (uid_t)-1;
        *pgrp = (gid_t)-1;
 
@@ -1201,9 +1178,6 @@ NTSTATUS unpack_nt_owners(struct connection_struct *conn,
         * Validate the owner and group SID's.
         */
 
-       memset(&owner_sid, '\0', sizeof(owner_sid));
-       memset(&grp_sid, '\0', sizeof(grp_sid));
-
        DEBUG(5,("unpack_nt_owners: validating owner_sids.\n"));
 
        /*
@@ -1212,8 +1186,7 @@ NTSTATUS unpack_nt_owners(struct connection_struct *conn,
         */
 
        if (security_info_sent & SECINFO_OWNER) {
-               sid_copy(&owner_sid, psd->owner_sid);
-               if (!sid_to_uid(&owner_sid, puser)) {
+               if (!sid_to_uid(psd->owner_sid, puser)) {
                        if (lp_force_unknown_acl_user(SNUM(conn))) {
                                /* this allows take ownership to work
                                 * reasonably */
@@ -1221,7 +1194,7 @@ NTSTATUS unpack_nt_owners(struct connection_struct *conn,
                        } else {
                                DEBUG(3,("unpack_nt_owners: unable to validate"
                                         " owner sid for %s\n",
-                                        sid_string_dbg(&owner_sid)));
+                                        sid_string_dbg(psd->owner_sid)));
                                return NT_STATUS_INVALID_OWNER;
                        }
                }
@@ -1235,8 +1208,7 @@ NTSTATUS unpack_nt_owners(struct connection_struct *conn,
         */
 
        if (security_info_sent & SECINFO_GROUP) {
-               sid_copy(&grp_sid, psd->group_sid);
-               if (!sid_to_gid( &grp_sid, pgrp)) {
+               if (!sid_to_gid(psd->group_sid, pgrp)) {
                        if (lp_force_unknown_acl_user(SNUM(conn))) {
                                /* this allows take group ownership to work
                                 * reasonably */
@@ -1256,48 +1228,19 @@ NTSTATUS unpack_nt_owners(struct connection_struct *conn,
        return NT_STATUS_OK;
 }
 
-/****************************************************************************
- Ensure the enforced permissions for this share apply.
-****************************************************************************/
 
-static void apply_default_perms(const struct share_params *params,
-                               const bool is_directory, canon_ace *pace,
-                               mode_t type)
+static void trim_ace_perms(canon_ace *pace)
 {
-       mode_t and_bits = (mode_t)0;
-       mode_t or_bits = (mode_t)0;
-
-       /* Get the initial bits to apply. */
+       pace->perms = pace->perms & (S_IXUSR|S_IWUSR|S_IRUSR);
+}
 
+static void ensure_minimal_owner_ace_perms(const bool is_directory,
+                                          canon_ace *pace)
+{
+       pace->perms |= S_IRUSR;
        if (is_directory) {
-               and_bits = lp_dir_security_mask(params->service);
-               or_bits = lp_force_dir_security_mode(params->service);
-       } else {
-               and_bits = lp_security_mask(params->service);
-               or_bits = lp_force_security_mode(params->service);
-       }
-
-       /* Now bounce them into the S_USR space. */     
-       switch(type) {
-       case S_IRUSR:
-               /* Ensure owner has read access. */
-               pace->perms |= S_IRUSR;
-               if (is_directory)
-                       pace->perms |= (S_IWUSR|S_IXUSR);
-               and_bits = unix_perms_to_acl_perms(and_bits, S_IRUSR, S_IWUSR, S_IXUSR);
-               or_bits = unix_perms_to_acl_perms(or_bits, S_IRUSR, S_IWUSR, S_IXUSR);
-               break;
-       case S_IRGRP:
-               and_bits = unix_perms_to_acl_perms(and_bits, S_IRGRP, S_IWGRP, S_IXGRP);
-               or_bits = unix_perms_to_acl_perms(or_bits, S_IRGRP, S_IWGRP, S_IXGRP);
-               break;
-       case S_IROTH:
-               and_bits = unix_perms_to_acl_perms(and_bits, S_IROTH, S_IWOTH, S_IXOTH);
-               or_bits = unix_perms_to_acl_perms(or_bits, S_IROTH, S_IWOTH, S_IXOTH);
-               break;
+               pace->perms |= (S_IWUSR|S_IXUSR);
        }
-
-       pace->perms = ((pace->perms & and_bits)|or_bits);
 }
 
 /****************************************************************************
@@ -1342,61 +1285,131 @@ static bool uid_entry_in_group(connection_struct *conn, canon_ace *uid_ace, cano
 }
 
 /****************************************************************************
- A well formed POSIX file or default ACL has at least 3 entries, a 
+ A well formed POSIX file or default ACL has at least 3 entries, a
  SMB_ACL_USER_OBJ, SMB_ACL_GROUP_OBJ, SMB_ACL_OTHER_OBJ.
  In addition, the owner must always have at least read access.
  When using this call on get_acl, the pst struct is valid and contains
- the mode of the file. When using this call on set_acl, the pst struct has
+ the mode of the file.
+****************************************************************************/
+
+static bool ensure_canon_entry_valid_on_get(connection_struct *conn,
+                                       canon_ace **pp_ace,
+                                       const struct dom_sid *pfile_owner_sid,
+                                       const struct dom_sid *pfile_grp_sid,
+                                       const SMB_STRUCT_STAT *pst)
+{
+       canon_ace *pace;
+       bool got_user = false;
+       bool got_group = false;
+       bool got_other = false;
+
+       for (pace = *pp_ace; pace; pace = pace->next) {
+               if (pace->type == SMB_ACL_USER_OBJ) {
+                       got_user = true;
+               } else if (pace->type == SMB_ACL_GROUP_OBJ) {
+                       got_group = true;
+               } else if (pace->type == SMB_ACL_OTHER) {
+                       got_other = true;
+               }
+       }
+
+       if (!got_user) {
+               if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
+                       DEBUG(0,("malloc fail.\n"));
+                       return false;
+               }
+
+               ZERO_STRUCTP(pace);
+               pace->type = SMB_ACL_USER_OBJ;
+               pace->owner_type = UID_ACE;
+               pace->unix_ug.type = ID_TYPE_UID;
+               pace->unix_ug.id = pst->st_ex_uid;
+               pace->trustee = *pfile_owner_sid;
+               pace->attr = ALLOW_ACE;
+               pace->perms = unix_perms_to_acl_perms(pst->st_ex_mode, S_IRUSR, S_IWUSR, S_IXUSR);
+               DLIST_ADD(*pp_ace, pace);
+       }
+
+       if (!got_group) {
+               if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
+                       DEBUG(0,("malloc fail.\n"));
+                       return false;
+               }
+
+               ZERO_STRUCTP(pace);
+               pace->type = SMB_ACL_GROUP_OBJ;
+               pace->owner_type = GID_ACE;
+               pace->unix_ug.type = ID_TYPE_GID;
+               pace->unix_ug.id = pst->st_ex_gid;
+               pace->trustee = *pfile_grp_sid;
+               pace->attr = ALLOW_ACE;
+               pace->perms = unix_perms_to_acl_perms(pst->st_ex_mode, S_IRGRP, S_IWGRP, S_IXGRP);
+               DLIST_ADD(*pp_ace, pace);
+       }
+
+       if (!got_other) {
+               if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
+                       DEBUG(0,("malloc fail.\n"));
+                       return false;
+               }
+
+               ZERO_STRUCTP(pace);
+               pace->type = SMB_ACL_OTHER;
+               pace->owner_type = WORLD_ACE;
+               pace->unix_ug.type = ID_TYPE_NOT_SPECIFIED;
+               pace->unix_ug.id = -1;
+               pace->trustee = global_sid_World;
+               pace->attr = ALLOW_ACE;
+               pace->perms = unix_perms_to_acl_perms(pst->st_ex_mode, S_IROTH, S_IWOTH, S_IXOTH);
+               DLIST_ADD(*pp_ace, pace);
+       }
+
+       return true;
+}
+
+/****************************************************************************
+ A well formed POSIX file or default ACL has at least 3 entries, a
+ SMB_ACL_USER_OBJ, SMB_ACL_GROUP_OBJ, SMB_ACL_OTHER_OBJ.
+ In addition, the owner must always have at least read access.
+ When using this call on set_acl, the pst struct has
  been modified to have a mode containing the default for this file or directory
  type.
 ****************************************************************************/
 
-static bool ensure_canon_entry_valid(connection_struct *conn, canon_ace **pp_ace,
-                                    const struct share_params *params,
-                                    const bool is_directory,
-                                                       const struct dom_sid *pfile_owner_sid,
-                                                       const struct dom_sid *pfile_grp_sid,
-                                                       const SMB_STRUCT_STAT *pst,
-                                                       bool setting_acl)
+static bool ensure_canon_entry_valid_on_set(connection_struct *conn,
+                                       canon_ace **pp_ace,
+                                       bool is_default_acl,
+                                       const struct share_params *params,
+                                       const bool is_directory,
+                                       const struct dom_sid *pfile_owner_sid,
+                                       const struct dom_sid *pfile_grp_sid,
+                                       const SMB_STRUCT_STAT *pst)
 {
        canon_ace *pace;
        canon_ace *pace_user = NULL;
        canon_ace *pace_group = NULL;
        canon_ace *pace_other = NULL;
+       bool got_duplicate_user = false;
+       bool got_duplicate_group = false;
 
        for (pace = *pp_ace; pace; pace = pace->next) {
+               trim_ace_perms(pace);
                if (pace->type == SMB_ACL_USER_OBJ) {
-
-                       if (setting_acl)
-                               apply_default_perms(params, is_directory, pace, S_IRUSR);
+                       ensure_minimal_owner_ace_perms(is_directory, pace);
                        pace_user = pace;
-
                } else if (pace->type == SMB_ACL_GROUP_OBJ) {
-
-                       /*
-                        * Ensure create mask/force create mode is respected on set.
-                        */
-
-                       if (setting_acl)
-                               apply_default_perms(params, is_directory, pace, S_IRGRP);
                        pace_group = pace;
-
                } else if (pace->type == SMB_ACL_OTHER) {
-
-                       /*
-                        * Ensure create mask/force create mode is respected on set.
-                        */
-
-                       if (setting_acl)
-                               apply_default_perms(params, is_directory, pace, S_IROTH);
                        pace_other = pace;
                }
        }
 
        if (!pace_user) {
+               canon_ace *pace_iter;
+
                if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
-                       DEBUG(0,("ensure_canon_entry_valid: malloc fail.\n"));
-                       return False;
+                       DEBUG(0,("talloc fail.\n"));
+                       return false;
                }
 
                ZERO_STRUCTP(pace);
@@ -1406,50 +1419,49 @@ static bool ensure_canon_entry_valid(connection_struct *conn, canon_ace **pp_ace
                pace->unix_ug.id = pst->st_ex_uid;
                pace->trustee = *pfile_owner_sid;
                pace->attr = ALLOW_ACE;
-               /* Start with existing permissions, principle of least
+               /* Start with existing user permissions, principle of least
                   surprises for the user. */
-               pace->perms = pst->st_ex_mode;
+               pace->perms = unix_perms_to_acl_perms(pst->st_ex_mode, S_IRUSR, S_IWUSR, S_IXUSR);
 
-               if (setting_acl) {
-                       /* See if the owning user is in any of the other groups in
-                          the ACE, or if there's a matching user entry (by uid
-                          or in the case of ID_TYPE_BOTH by SID).
-                          If so, OR in the permissions from that entry. */
+               /* See if the owning user is in any of the other groups in
+                  the ACE, or if there's a matching user entry (by uid
+                  or in the case of ID_TYPE_BOTH by SID).
+                  If so, OR in the permissions from that entry. */
 
-                       canon_ace *pace_iter;
 
-                       for (pace_iter = *pp_ace; pace_iter; pace_iter = pace_iter->next) {
-                               if (pace_iter->type == SMB_ACL_USER &&
-                                               pace_iter->unix_ug.id == pace->unix_ug.id) {
+               for (pace_iter = *pp_ace; pace_iter; pace_iter = pace_iter->next) {
+                       if (pace_iter->type == SMB_ACL_USER &&
+                                       pace_iter->unix_ug.id == pace->unix_ug.id) {
+                               pace->perms |= pace_iter->perms;
+                       } else if (pace_iter->type == SMB_ACL_GROUP_OBJ || pace_iter->type == SMB_ACL_GROUP) {
+                               if (dom_sid_equal(&pace->trustee, &pace_iter->trustee)) {
+                                       pace->perms |= pace_iter->perms;
+                               } else if (uid_entry_in_group(conn, pace, pace_iter)) {
                                        pace->perms |= pace_iter->perms;
-                               } else if (pace_iter->type == SMB_ACL_GROUP_OBJ || pace_iter->type == SMB_ACL_GROUP) {
-                                       if (dom_sid_equal(&pace->trustee, &pace_iter->trustee)) {
-                                               pace->perms |= pace_iter->perms;
-                                       } else if (uid_entry_in_group(conn, pace, pace_iter)) {
-                                               pace->perms |= pace_iter->perms;
-                                       }
                                }
                        }
+               }
 
-                       if (pace->perms == 0) {
-                               /* If we only got an "everyone" perm, just use that. */
-                               if (pace_other)
-                                       pace->perms = pace_other->perms;
-                       }
-
-                       apply_default_perms(params, is_directory, pace, S_IRUSR);
-               } else {
-                       pace->perms = unix_perms_to_acl_perms(pst->st_ex_mode, S_IRUSR, S_IWUSR, S_IXUSR);
+               if (pace->perms == 0) {
+                       /* If we only got an "everyone" perm, just use that. */
+                       if (pace_other)
+                               pace->perms = pace_other->perms;
                }
 
+               /*
+                * Ensure we have default parameters for the
+                * user (owner) even on default ACLs.
+                */
+               ensure_minimal_owner_ace_perms(is_directory, pace);
+
                DLIST_ADD(*pp_ace, pace);
                pace_user = pace;
        }
 
        if (!pace_group) {
                if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
-                       DEBUG(0,("ensure_canon_entry_valid: malloc fail.\n"));
-                       return False;
+                       DEBUG(0,("talloc fail.\n"));
+                       return false;
                }
 
                ZERO_STRUCTP(pace);
@@ -1459,15 +1471,12 @@ static bool ensure_canon_entry_valid(connection_struct *conn, canon_ace **pp_ace
                pace->unix_ug.id = pst->st_ex_gid;
                pace->trustee = *pfile_grp_sid;
                pace->attr = ALLOW_ACE;
-               if (setting_acl) {
-                       /* If we only got an "everyone" perm, just use that. */
-                       if (pace_other)
-                               pace->perms = pace_other->perms;
-                       else
-                               pace->perms = 0;
-                       apply_default_perms(params, is_directory, pace, S_IRGRP);
+
+               /* If we only got an "everyone" perm, just use that. */
+               if (pace_other) {
+                       pace->perms = pace_other->perms;
                } else {
-                       pace->perms = unix_perms_to_acl_perms(pst->st_ex_mode, S_IRGRP, S_IWGRP, S_IXGRP);
+                       pace->perms = 0;
                }
 
                DLIST_ADD(*pp_ace, pace);
@@ -1476,8 +1485,8 @@ static bool ensure_canon_entry_valid(connection_struct *conn, canon_ace **pp_ace
 
        if (!pace_other) {
                if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
-                       DEBUG(0,("ensure_canon_entry_valid: malloc fail.\n"));
-                       return False;
+                       DEBUG(0,("talloc fail.\n"));
+                       return false;
                }
 
                ZERO_STRUCTP(pace);
@@ -1487,124 +1496,115 @@ static bool ensure_canon_entry_valid(connection_struct *conn, canon_ace **pp_ace
                pace->unix_ug.id = -1;
                pace->trustee = global_sid_World;
                pace->attr = ALLOW_ACE;
-               if (setting_acl) {
-                       pace->perms = 0;
-                       apply_default_perms(params, is_directory, pace, S_IROTH);
-               } else
-                       pace->perms = unix_perms_to_acl_perms(pst->st_ex_mode, S_IROTH, S_IWOTH, S_IXOTH);
+               pace->perms = 0;
 
                DLIST_ADD(*pp_ace, pace);
                pace_other = pace;
        }
 
-       if (setting_acl) {
-               /* Ensure when setting a POSIX ACL, that the uid for a
-                  SMB_ACL_USER_OBJ ACE (the owner ACE entry) has a duplicate
-                  permission entry as an SMB_ACL_USER, and a gid for a
-                  SMB_ACL_GROUP_OBJ ACE (the primary group ACE entry) also has
-                  a duplicate permission entry as an SMB_ACL_GROUP. If not,
-                  then if the ownership or group ownership of this file or
-                  directory gets changed, the user or group can lose their
-                  access. */
-               bool got_duplicate_user = false;
-               bool got_duplicate_group = false;
-
-               for (pace = *pp_ace; pace; pace = pace->next) {
-                       if (pace->type == SMB_ACL_USER &&
-                                       pace->unix_ug.id == pace_user->unix_ug.id) {
-                               /* Already got one. */
-                               got_duplicate_user = true;
-                       } else if (pace->type == SMB_ACL_GROUP &&
-                                       pace->unix_ug.id == pace_user->unix_ug.id) {
-                               /* Already got one. */
-                               got_duplicate_group = true;
-                       } else if ((pace->type == SMB_ACL_GROUP)
-                                  && (dom_sid_equal(&pace->trustee, &pace_user->trustee))) {
-                               /* If the SID owning the file appears
-                                * in a group entry, then we have
-                                * enough duplication, they will still
-                                * have access */
-                               got_duplicate_user = true;
-                       }
-               }
-
-               /* If the SID is equal for the user and group that we need
-                  to add the duplicate for, add only the group */
-               if (!got_duplicate_user && !got_duplicate_group
-                               && dom_sid_equal(&pace_group->trustee,
-                                               &pace_user->trustee)) {
-                       /* Add a duplicate SMB_ACL_GROUP entry, this
-                        * will cover the owning SID as well, as it
-                        * will always be mapped to both a uid and
-                        * gid. */
-
-                       if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
-                               DEBUG(0,("ensure_canon_entry_valid: talloc fail.\n"));
-                               return false;
-                       }
+       /* Ensure when setting a POSIX ACL, that the uid for a
+          SMB_ACL_USER_OBJ ACE (the owner ACE entry) has a duplicate
+          permission entry as an SMB_ACL_USER, and a gid for a
+          SMB_ACL_GROUP_OBJ ACE (the primary group ACE entry) also has
+          a duplicate permission entry as an SMB_ACL_GROUP. If not,
+          then if the ownership or group ownership of this file or
+          directory gets changed, the user or group can lose their
+          access. */
 
-                       ZERO_STRUCTP(pace);
-                       pace->type = SMB_ACL_GROUP;;
-                       pace->owner_type = GID_ACE;
-                       pace->unix_ug.type = ID_TYPE_GID;
-                       pace->unix_ug.id = pace_group->unix_ug.id;
-                       pace->trustee = pace_group->trustee;
-                       pace->attr = pace_group->attr;
-                       pace->perms = pace_group->perms;
-
-                       DLIST_ADD(*pp_ace, pace);
-
-                       /* We're done here, make sure the
-                          statements below are not executed. */
+       for (pace = *pp_ace; pace; pace = pace->next) {
+               if (pace->type == SMB_ACL_USER &&
+                               pace->unix_ug.id == pace_user->unix_ug.id) {
+                       /* Already got one. */
                        got_duplicate_user = true;
+               } else if (pace->type == SMB_ACL_GROUP &&
+                               pace->unix_ug.id == pace_group->unix_ug.id) {
+                       /* Already got one. */
                        got_duplicate_group = true;
+               } else if ((pace->type == SMB_ACL_GROUP)
+                          && (dom_sid_equal(&pace->trustee, &pace_user->trustee))) {
+                       /* If the SID owning the file appears
+                        * in a group entry, then we have
+                        * enough duplication, they will still
+                        * have access */
+                       got_duplicate_user = true;
                }
+       }
 
-               if (!got_duplicate_user) {
-                       /* Add a duplicate SMB_ACL_USER entry. */
-                       if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
-                               DEBUG(0,("ensure_canon_entry_valid: talloc fail.\n"));
-                               return false;
-                       }
+       /* If the SID is equal for the user and group that we need
+          to add the duplicate for, add only the group */
+       if (!got_duplicate_user && !got_duplicate_group
+                       && dom_sid_equal(&pace_group->trustee,
+                                       &pace_user->trustee)) {
+               /* Add a duplicate SMB_ACL_GROUP entry, this
+                * will cover the owning SID as well, as it
+                * will always be mapped to both a uid and
+                * gid. */
+
+               if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
+                       DEBUG(0,("talloc fail.\n"));
+                       return false;
+               }
 
-                       ZERO_STRUCTP(pace);
-                       pace->type = SMB_ACL_USER;;
-                       pace->owner_type = UID_ACE;
-                       pace->unix_ug.type = ID_TYPE_UID;
-                       pace->unix_ug.id = pace_user->unix_ug.id;
-                       pace->trustee = pace_user->trustee;
-                       pace->attr = pace_user->attr;
-                       pace->perms = pace_user->perms;
+               ZERO_STRUCTP(pace);
+               pace->type = SMB_ACL_GROUP;;
+               pace->owner_type = GID_ACE;
+               pace->unix_ug.type = ID_TYPE_GID;
+               pace->unix_ug.id = pace_group->unix_ug.id;
+               pace->trustee = pace_group->trustee;
+               pace->attr = pace_group->attr;
+               pace->perms = pace_group->perms;
 
-                       DLIST_ADD(*pp_ace, pace);
+               DLIST_ADD(*pp_ace, pace);
 
-                       got_duplicate_user = true;
+               /* We're done here, make sure the
+                  statements below are not executed. */
+               got_duplicate_user = true;
+               got_duplicate_group = true;
+       }
+
+       if (!got_duplicate_user) {
+               /* Add a duplicate SMB_ACL_USER entry. */
+               if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
+                       DEBUG(0,("talloc fail.\n"));
+                       return false;
                }
 
-               if (!got_duplicate_group) {
-                       /* Add a duplicate SMB_ACL_GROUP entry. */
-                       if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
-                               DEBUG(0,("ensure_canon_entry_valid: talloc fail.\n"));
-                               return false;
-                       }
+               ZERO_STRUCTP(pace);
+               pace->type = SMB_ACL_USER;;
+               pace->owner_type = UID_ACE;
+               pace->unix_ug.type = ID_TYPE_UID;
+               pace->unix_ug.id = pace_user->unix_ug.id;
+               pace->trustee = pace_user->trustee;
+               pace->attr = pace_user->attr;
+               pace->perms = pace_user->perms;
 
-                       ZERO_STRUCTP(pace);
-                       pace->type = SMB_ACL_GROUP;;
-                       pace->owner_type = GID_ACE;
-                       pace->unix_ug.type = ID_TYPE_GID;
-                       pace->unix_ug.id = pace_group->unix_ug.id;
-                       pace->trustee = pace_group->trustee;
-                       pace->attr = pace_group->attr;
-                       pace->perms = pace_group->perms;
+               DLIST_ADD(*pp_ace, pace);
 
-                       DLIST_ADD(*pp_ace, pace);
+               got_duplicate_user = true;
+       }
 
-                       got_duplicate_group = true;
+       if (!got_duplicate_group) {
+               /* Add a duplicate SMB_ACL_GROUP entry. */
+               if ((pace = talloc(talloc_tos(), canon_ace)) == NULL) {
+                       DEBUG(0,("talloc fail.\n"));
+                       return false;
                }
 
+               ZERO_STRUCTP(pace);
+               pace->type = SMB_ACL_GROUP;;
+               pace->owner_type = GID_ACE;
+               pace->unix_ug.type = ID_TYPE_GID;
+               pace->unix_ug.id = pace_group->unix_ug.id;
+               pace->trustee = pace_group->trustee;
+               pace->attr = pace_group->attr;
+               pace->perms = pace_group->perms;
+
+               DLIST_ADD(*pp_ace, pace);
+
+               got_duplicate_group = true;
        }
 
-       return True;
+       return true;
 }
 
 /****************************************************************************
@@ -1688,7 +1688,7 @@ static bool add_current_ace_to_acl(files_struct *fsp, struct security_ace *psa,
                    (SEC_ACE_FLAG_OBJECT_INHERIT|SEC_ACE_FLAG_CONTAINER_INHERIT)) {
 
                        canon_ace *current_dir_ace = current_ace;
-                       DLIST_ADD_END(*dir_ace, current_ace, canon_ace *);
+                       DLIST_ADD_END(*dir_ace, current_ace);
 
                        /*
                         * Note if this was an allow ace. We can't process
@@ -1790,7 +1790,7 @@ static bool add_current_ace_to_acl(files_struct *fsp, struct security_ace *psa,
         */
 
        if (current_ace && !(psa->flags & SEC_ACE_FLAG_INHERIT_ONLY)) {
-               DLIST_ADD_END(*file_ace, current_ace, canon_ace *);
+               DLIST_ADD_END(*file_ace, current_ace);
 
                /*
                 * Note if this was an allow ace. We can't process
@@ -1800,7 +1800,7 @@ static bool add_current_ace_to_acl(files_struct *fsp, struct security_ace *psa,
                if (current_ace->attr == ALLOW_ACE)
                        *got_file_allow = True;
 
-               if ((current_ace->attr == DENY_ACE) && got_file_allow) {
+               if ((current_ace->attr == DENY_ACE) && *got_file_allow) {
                        DEBUG(0,("add_current_ace_to_acl: malformed "
                                 "ACL in file ACL ! Deny entry after "
                                 "Allow entry. Failing to set on file "
@@ -1862,26 +1862,6 @@ static bool create_canon_ace_lists(files_struct *fsp,
                        DEBUG(3,("create_canon_ace_lists: unable to set anything but an ALLOW or DENY ACE.\n"));
                        return False;
                }
-
-               if (nt4_compatible_acls()) {
-                       /*
-                        * The security mask may be UNIX_ACCESS_NONE which should map into
-                        * no permissions (we overload the WRITE_OWNER bit for this) or it
-                        * should be one of the ALL/EXECUTE/READ/WRITE bits. Arrange for this
-                        * to be so. Any other bits override the UNIX_ACCESS_NONE bit.
-                        */
-
-                       /*
-                        * Convert GENERIC bits to specific bits.
-                        */
-                       se_map_generic(&psa->access_mask, &file_generic_mapping);
-
-                       psa->access_mask &= (UNIX_ACCESS_NONE|FILE_ALL_ACCESS);
-
-                       if(psa->access_mask != UNIX_ACCESS_NONE)
-                               psa->access_mask &= ~UNIX_ACCESS_NONE;
-               }
        }
 
        /*
@@ -1993,47 +1973,50 @@ static bool create_canon_ace_lists(files_struct *fsp,
                        }
 
                        if (unixid.type == ID_TYPE_BOTH) {
-                               /* If it's the owning user, this is a
-                                * user_obj, not a user.  This way, we
-                                * get a valid ACL for groups that own
-                                * files, without putting user ACL
-                                * entries in for groups otherwise */
-                               if (unixid.id == pst->st_ex_uid) {
-                                       current_ace->owner_type = UID_ACE;
-                                       current_ace->unix_ug.type = ID_TYPE_UID;
-                                       current_ace->unix_ug.id = unixid.id;
-                                       current_ace->type = SMB_ACL_USER_OBJ;
-
-                                       /* Add the user object to the posix ACL,
-                                          and proceed to the group mapping
-                                          below. This handles the talloc_free
-                                          of current_ace if not added for some
-                                          reason */
-                                       if (!add_current_ace_to_acl(fsp,
-                                                       psa,
-                                                       &file_ace,
-                                                       &dir_ace,
-                                                       &got_file_allow,
-                                                       &got_dir_allow,
-                                                       &all_aces_are_inherit_only,
-                                                       current_ace)) {
-                                               free_canon_ace_list(file_ace);
-                                               free_canon_ace_list(dir_ace);
-                                               return false;
-                                       }
-
-                                       if ((current_ace = talloc(talloc_tos(),
-                                                       canon_ace)) == NULL) {
-                                               free_canon_ace_list(file_ace);
-                                               free_canon_ace_list(dir_ace);
-                                               DEBUG(0,("create_canon_ace_lists: "
-                                                       "malloc fail.\n"));
-                                               return False;
-                                       }
+                               /*
+                                * We must add both a user and group
+                                * entry POSIX_ACL.
+                                * This is due to the fact that in POSIX
+                                * user entries are more specific than
+                                * groups.
+                                */
+                               current_ace->owner_type = UID_ACE;
+                               current_ace->unix_ug.type = ID_TYPE_UID;
+                               current_ace->unix_ug.id = unixid.id;
+                               current_ace->type =
+                                       (unixid.id == pst->st_ex_uid) ?
+                                               SMB_ACL_USER_OBJ :
+                                               SMB_ACL_USER;
+
+                               /* Add the user object to the posix ACL,
+                                  and proceed to the group mapping
+                                  below. This handles the talloc_free
+                                  of current_ace if not added for some
+                                  reason */
+                               if (!add_current_ace_to_acl(fsp,
+                                               psa,
+                                               &file_ace,
+                                               &dir_ace,
+                                               &got_file_allow,
+                                               &got_dir_allow,
+                                               &all_aces_are_inherit_only,
+                                               current_ace)) {
+                                       free_canon_ace_list(file_ace);
+                                       free_canon_ace_list(dir_ace);
+                                       return false;
+                               }
 
-                                       ZERO_STRUCTP(current_ace);
+                               if ((current_ace = talloc(talloc_tos(),
+                                               canon_ace)) == NULL) {
+                                       free_canon_ace_list(file_ace);
+                                       free_canon_ace_list(dir_ace);
+                                       DEBUG(0,("create_canon_ace_lists: "
+                                               "malloc fail.\n"));
+                                       return False;
                                }
 
+                               ZERO_STRUCTP(current_ace);
+
                                sid_copy(&current_ace->trustee, &psa->trustee);
 
                                current_ace->unix_ug.type = ID_TYPE_GID;
@@ -2128,7 +2111,7 @@ static bool create_canon_ace_lists(files_struct *fsp,
                 * the file ACL. If we don't have them, check if any SMB_ACL_USER/SMB_ACL_GROUP
                 * entries can be converted to *_OBJ. Don't do this for the default
                 * ACL, we will create them separately for this if needed inside
-                * ensure_canon_entry_valid().
+                * ensure_canon_entry_valid_on_set().
                 */
                if (file_ace) {
                        check_owning_objs(file_ace, pfile_owner_sid, pfile_grp_sid);
@@ -2336,7 +2319,7 @@ static void process_deny_list(connection_struct *conn, canon_ace **pp_ace_list )
 
                        curr_ace->attr = ALLOW_ACE;
                        curr_ace->perms = (mode_t)0;
-                       DLIST_DEMOTE(ace_list, curr_ace, canon_ace *);
+                       DLIST_DEMOTE(ace_list, curr_ace);
                        continue;
                }
 
@@ -2361,7 +2344,7 @@ static void process_deny_list(connection_struct *conn, canon_ace **pp_ace_list )
 
                curr_ace->attr = ALLOW_ACE;
                curr_ace->perms = (new_perms & ~curr_ace->perms);
-               DLIST_DEMOTE(ace_list, curr_ace, canon_ace *);
+               DLIST_DEMOTE(ace_list, curr_ace);
        }
 
        /* Pass 3 above - deal with deny group entries. */
@@ -2408,7 +2391,7 @@ static void process_deny_list(connection_struct *conn, canon_ace **pp_ace_list )
                        curr_ace->perms = allow_everyone_p->perms & ~curr_ace->perms;
                else
                        curr_ace->perms = (mode_t)0;
-               DLIST_DEMOTE(ace_list, curr_ace, canon_ace *);
+               DLIST_DEMOTE(ace_list, curr_ace);
        }
 
        /* Doing this fourth pass allows Windows semantics to be layered
@@ -2464,7 +2447,7 @@ static bool unpack_canon_ace(files_struct *fsp,
                                struct dom_sid *pfile_grp_sid,
                                canon_ace **ppfile_ace,
                                canon_ace **ppdir_ace,
-                               uint32 security_info_sent,
+                               uint32_t security_info_sent,
                                const struct security_descriptor *psd)
 {
        canon_ace *file_ace = NULL;
@@ -2530,8 +2513,8 @@ static bool unpack_canon_ace(files_struct *fsp,
 
        print_canon_ace_list( "file ace - before valid", file_ace);
 
-       if (!ensure_canon_entry_valid(fsp->conn, &file_ace, fsp->conn->params,
-                       fsp->is_directory, pfile_owner_sid, pfile_grp_sid, pst, True)) {
+       if (!ensure_canon_entry_valid_on_set(fsp->conn, &file_ace, false, fsp->conn->params,
+                       fsp->is_directory, pfile_owner_sid, pfile_grp_sid, pst)) {
                free_canon_ace_list(file_ace);
                free_canon_ace_list(dir_ace);
                return False;
@@ -2539,8 +2522,8 @@ static bool unpack_canon_ace(files_struct *fsp,
 
        print_canon_ace_list( "dir ace - before valid", dir_ace);
 
-       if (dir_ace && !ensure_canon_entry_valid(fsp->conn, &dir_ace, fsp->conn->params,
-                       fsp->is_directory, pfile_owner_sid, pfile_grp_sid, pst, True)) {
+       if (dir_ace && !ensure_canon_entry_valid_on_set(fsp->conn, &dir_ace, true, fsp->conn->params,
+                       fsp->is_directory, pfile_owner_sid, pfile_grp_sid, pst)) {
                free_canon_ace_list(file_ace);
                free_canon_ace_list(dir_ace);
                return False;
@@ -2606,7 +2589,7 @@ static void arrange_posix_perms(const char *filename, canon_ace **pp_list_head)
        }
 
        if (other_ace) {
-               DLIST_DEMOTE(l_head, other_ace, canon_ace *);
+               DLIST_DEMOTE(l_head, other_ace);
        }
 
        /* We have probably changed the head of the list. */
@@ -2628,6 +2611,7 @@ static canon_ace *canonicalise_acl(struct connection_struct *conn,
        canon_ace *ace = NULL;
        canon_ace *next_ace = NULL;
        int entry_id = SMB_ACL_FIRST_ENTRY;
+       bool is_default_acl = (the_acl_type == SMB_ACL_TYPE_DEFAULT);
        SMB_ACL_ENTRY_T entry;
        size_t ace_count;
 
@@ -2640,7 +2624,6 @@ static canon_ace *canonicalise_acl(struct connection_struct *conn,
 
                entry_id = SMB_ACL_NEXT_ENTRY;
 
-               /* Is this a MASK entry ? */
                if (sys_acl_get_tag_type(entry, &tagtype) == -1)
                        continue;
 
@@ -2711,14 +2694,15 @@ static canon_ace *canonicalise_acl(struct connection_struct *conn,
                if ((ace = talloc(talloc_tos(), canon_ace)) == NULL)
                        goto fail;
 
-               ZERO_STRUCTP(ace);
-               ace->type = tagtype;
-               ace->perms = convert_permset_to_mode_t(permset);
-               ace->attr = ALLOW_ACE;
-               ace->trustee = sid;
-               ace->unix_ug = unix_ug;
-               ace->owner_type = owner_type;
-               ace->ace_flags = get_pai_flags(pal, ace, (the_acl_type == SMB_ACL_TYPE_DEFAULT));
+               *ace = (canon_ace) {
+                       .type = tagtype,
+                       .perms = convert_permset_to_mode_t(permset),
+                       .attr = ALLOW_ACE,
+                       .trustee = sid,
+                       .unix_ug = unix_ug,
+                       .owner_type = owner_type,
+                       .ace_flags = get_pai_flags(pal, ace, is_default_acl)
+               };
 
                DLIST_ADD(l_head, ace);
        }
@@ -2727,9 +2711,9 @@ static canon_ace *canonicalise_acl(struct connection_struct *conn,
         * This next call will ensure we have at least a user/group/world set.
         */
 
-       if (!ensure_canon_entry_valid(conn, &l_head, conn->params,
-                                     S_ISDIR(psbuf->st_ex_mode), powner, pgroup,
-                                     psbuf, False))
+       if (!ensure_canon_entry_valid_on_get(conn, &l_head,
+                                     powner, pgroup,
+                                     psbuf))
                goto fail;
 
        /*
@@ -2737,7 +2721,7 @@ static canon_ace *canonicalise_acl(struct connection_struct *conn,
         * acl_mask. Ensure all DENY Entries are at the start of the list.
         */
 
-       DEBUG(10,("canonicalise_acl: %s ace entries before arrange :\n", the_acl_type == SMB_ACL_TYPE_ACCESS ? "Access" : "Default" ));
+       DEBUG(10,("canonicalise_acl: %s ace entries before arrange :\n", is_default_acl ?  "Default" : "Access"));
 
        for ( ace_count = 0, ace = l_head; ace; ace = next_ace, ace_count++) {
                next_ace = ace->next;
@@ -2823,7 +2807,7 @@ static bool set_canon_ace_list(files_struct *fsp,
 {
        connection_struct *conn = fsp->conn;
        bool ret = False;
-       SMB_ACL_T the_acl = sys_acl_init(count_canon_ace_list(the_ace) + 1);
+       SMB_ACL_T the_acl = sys_acl_init(talloc_tos());
        canon_ace *p_ace;
        int i;
        SMB_ACL_ENTRY_T mask_entry;
@@ -2844,17 +2828,8 @@ static bool set_canon_ace_list(files_struct *fsp,
 #endif
 
        if (the_acl == NULL) {
-
-               if (!no_acl_syscall_error(errno)) {
-                       /*
-                        * Only print this error message if we have some kind of ACL
-                        * support that's not working. Otherwise we would always get this.
-                        */
-                       DEBUG(0,("set_canon_ace_list: Unable to init %s ACL. (%s)\n",
-                               default_ace ? "default" : "file", strerror(errno) ));
-               }
-               *pacl_set_support = False;
-               goto fail;
+               DEBUG(0, ("sys_acl_init failed to allocate an ACL\n"));
+               return false;
        }
 
        if( DEBUGLVL( 10 )) {
@@ -3079,22 +3054,6 @@ static bool set_canon_ace_list(files_struct *fsp,
        return ret;
 }
 
-/****************************************************************************
- Find a particular canon_ace entry.
-****************************************************************************/
-
-static struct canon_ace *canon_ace_entry_for(struct canon_ace *list, SMB_ACL_TAG_T type, struct unixid *id)
-{
-       while (list) {
-               if (list->type == type && ((type != SMB_ACL_USER && type != SMB_ACL_GROUP) ||
-                               (type == SMB_ACL_USER  && id && id->id == list->unix_ug.id) ||
-                               (type == SMB_ACL_GROUP && id && id->id == list->unix_ug.id)))
-                       break;
-               list = list->next;
-       }
-       return list;
-}
-
 /****************************************************************************
  
 ****************************************************************************/
@@ -3120,14 +3079,11 @@ SMB_ACL_T free_empty_sys_acl(connection_struct *conn, SMB_ACL_T the_acl)
 
 static bool convert_canon_ace_to_posix_perms( files_struct *fsp, canon_ace *file_ace_list, mode_t *posix_perms)
 {
-       int snum = SNUM(fsp->conn);
        size_t ace_count = count_canon_ace_list(file_ace_list);
        canon_ace *ace_p;
        canon_ace *owner_ace = NULL;
        canon_ace *group_ace = NULL;
        canon_ace *other_ace = NULL;
-       mode_t and_bits;
-       mode_t or_bits;
 
        if (ace_count != 3) {
                DEBUG(3,("convert_canon_ace_to_posix_perms: Too many ACE "
@@ -3167,20 +3123,6 @@ static bool convert_canon_ace_to_posix_perms( files_struct *fsp, canon_ace *file
        if (fsp->is_directory)
                *posix_perms |= (S_IWUSR|S_IXUSR);
 
-       /* If requested apply the masks. */
-
-       /* Get the initial bits to apply. */
-
-       if (fsp->is_directory) {
-               and_bits = lp_dir_security_mask(snum);
-               or_bits = lp_force_dir_security_mode(snum);
-       } else {
-               and_bits = lp_security_mask(snum);
-               or_bits = lp_force_security_mode(snum);
-       }
-
-       *posix_perms = (((*posix_perms) & and_bits)|or_bits);
-
        DEBUG(10,("convert_canon_ace_to_posix_perms: converted u=%o,g=%o,w=%o "
                  "to perm=0%o for file %s.\n", (int)owner_ace->perms,
                  (int)group_ace->perms, (int)other_ace->perms,
@@ -3202,8 +3144,8 @@ static size_t merge_default_aces( struct security_ace *nt_ace_list, size_t num_a
 
        for (i = 0; i < num_aces; i++) {
                for (j = i+1; j < num_aces; j++) {
-                       uint32 i_flags_ni = (nt_ace_list[i].flags & ~SEC_ACE_FLAG_INHERITED_ACE);
-                       uint32 j_flags_ni = (nt_ace_list[j].flags & ~SEC_ACE_FLAG_INHERITED_ACE);
+                       uint32_t i_flags_ni = (nt_ace_list[i].flags & ~SEC_ACE_FLAG_INHERITED_ACE);
+                       uint32_t j_flags_ni = (nt_ace_list[j].flags & ~SEC_ACE_FLAG_INHERITED_ACE);
                        bool i_inh = (nt_ace_list[i].flags & SEC_ACE_FLAG_INHERITED_ACE) ? True : False;
                        bool j_inh = (nt_ace_list[j].flags & SEC_ACE_FLAG_INHERITED_ACE) ? True : False;
 
@@ -3306,6 +3248,7 @@ static NTSTATUS posix_get_nt_acl_common(struct connection_struct *conn,
                                      SMB_ACL_T posix_acl,
                                      SMB_ACL_T def_acl,
                                      uint32_t security_info,
+                                     TALLOC_CTX *mem_ctx,
                                      struct security_descriptor **ppdesc)
 {
        struct dom_sid owner_sid;
@@ -3337,7 +3280,7 @@ static NTSTATUS posix_get_nt_acl_common(struct connection_struct *conn,
                num_profile_acls = 3;
        }
 
-       if ((security_info & SECINFO_DACL) && !(security_info & SECINFO_PROTECTED_DACL)) {
+       if (security_info & SECINFO_DACL) {
 
                /*
                 * In the optimum case Creator Owner and Creator Group would be used for
@@ -3376,55 +3319,6 @@ static NTSTATUS posix_get_nt_acl_common(struct connection_struct *conn,
                        canon_ace *ace;
                        enum security_ace_type nt_acl_type;
 
-                       if (nt4_compatible_acls() && dir_ace) {
-                               /*
-                                * NT 4 chokes if an ACL contains an INHERIT_ONLY entry
-                                * but no non-INHERIT_ONLY entry for one SID. So we only
-                                * remove entries from the Access ACL if the
-                                * corresponding Default ACL entries have also been
-                                * removed. ACEs for CREATOR-OWNER and CREATOR-GROUP
-                                * are exceptions. We can do nothing
-                                * intelligent if the Default ACL contains entries that
-                                * are not also contained in the Access ACL, so this
-                                * case will still fail under NT 4.
-                                */
-
-                               ace = canon_ace_entry_for(dir_ace, SMB_ACL_OTHER, NULL);
-                               if (ace && !ace->perms) {
-                                       DLIST_REMOVE(dir_ace, ace);
-                                       TALLOC_FREE(ace);
-
-                                       ace = canon_ace_entry_for(file_ace, SMB_ACL_OTHER, NULL);
-                                       if (ace && !ace->perms) {
-                                               DLIST_REMOVE(file_ace, ace);
-                                               TALLOC_FREE(ace);
-                                       }
-                               }
-
-                               /*
-                                * WinNT doesn't usually have Creator Group
-                                * in browse lists, so we send this entry to
-                                * WinNT even if it contains no relevant
-                                * permissions. Once we can add
-                                * Creator Group to browse lists we can
-                                * re-enable this.
-                                */
-
-#if 0
-                               ace = canon_ace_entry_for(dir_ace, SMB_ACL_GROUP_OBJ, NULL);
-                               if (ace && !ace->perms) {
-                                       DLIST_REMOVE(dir_ace, ace);
-                                       TALLOC_FREE(ace);
-                               }
-#endif
-
-                               ace = canon_ace_entry_for(file_ace, SMB_ACL_GROUP_OBJ, NULL);
-                               if (ace && !ace->perms) {
-                                       DLIST_REMOVE(file_ace, ace);
-                                       TALLOC_FREE(ace);
-                               }
-                       }
-
                        num_acls = count_canon_ace_list(file_ace);
                        num_def_acls = count_canon_ace_list(dir_ace);
 
@@ -3518,7 +3412,7 @@ static NTSTATUS posix_get_nt_acl_common(struct connection_struct *conn,
                }
        } /* security_info & SECINFO_DACL */
 
-       psd = make_standard_sec_desc( talloc_tos(),
+       psd = make_standard_sec_desc(mem_ctx,
                        (security_info & SECINFO_OWNER) ? &owner_sid : NULL,
                        (security_info & SECINFO_GROUP) ? &group_sid : NULL,
                        psa,
@@ -3569,11 +3463,14 @@ static NTSTATUS posix_get_nt_acl_common(struct connection_struct *conn,
 }
 
 NTSTATUS posix_fget_nt_acl(struct files_struct *fsp, uint32_t security_info,
+                          TALLOC_CTX *mem_ctx,
                           struct security_descriptor **ppdesc)
 {
        SMB_STRUCT_STAT sbuf;
        SMB_ACL_T posix_acl = NULL;
        struct pai_val *pal;
+       TALLOC_CTX *frame = talloc_stackframe();
+       NTSTATUS status;
 
        *ppdesc = NULL;
 
@@ -3582,33 +3479,42 @@ NTSTATUS posix_fget_nt_acl(struct files_struct *fsp, uint32_t security_info,
 
        /* can it happen that fsp_name == NULL ? */
        if (fsp->is_directory ||  fsp->fh->fd == -1) {
-               return posix_get_nt_acl(fsp->conn, fsp->fsp_name->base_name,
-                                       security_info, ppdesc);
+               status = posix_get_nt_acl(fsp->conn, fsp->fsp_name->base_name,
+                                         security_info, mem_ctx, ppdesc);
+               TALLOC_FREE(frame);
+               return status;
        }
 
        /* Get the stat struct for the owner info. */
        if(SMB_VFS_FSTAT(fsp, &sbuf) != 0) {
+               TALLOC_FREE(frame);
                return map_nt_error_from_unix(errno);
        }
 
        /* Get the ACL from the fd. */
-       posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp);
+       posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp, frame);
 
        pal = fload_inherited_info(fsp);
 
-       return posix_get_nt_acl_common(fsp->conn, fsp->fsp_name->base_name,
-                                      &sbuf, pal, posix_acl, NULL,
-                                      security_info, ppdesc);
+       status = posix_get_nt_acl_common(fsp->conn, fsp->fsp_name->base_name,
+                                        &sbuf, pal, posix_acl, NULL,
+                                        security_info, mem_ctx, ppdesc);
+       TALLOC_FREE(frame);
+       return status;
 }
 
 NTSTATUS posix_get_nt_acl(struct connection_struct *conn, const char *name,
-                         uint32_t security_info, struct security_descriptor **ppdesc)
+                         uint32_t security_info,
+                         TALLOC_CTX *mem_ctx,
+                         struct security_descriptor **ppdesc)
 {
        SMB_ACL_T posix_acl = NULL;
        SMB_ACL_T def_acl = NULL;
        struct pai_val *pal;
        struct smb_filename smb_fname;
        int ret;
+       TALLOC_CTX *frame = talloc_stackframe();
+       NTSTATUS status;
 
        *ppdesc = NULL;
 
@@ -3625,23 +3531,29 @@ NTSTATUS posix_get_nt_acl(struct connection_struct *conn, const char *name,
        }
 
        if (ret == -1) {
+               TALLOC_FREE(frame);
                return map_nt_error_from_unix(errno);
        }
 
        /* Get the ACL from the path. */
-       posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, name, SMB_ACL_TYPE_ACCESS);
+       posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, name,
+                                            SMB_ACL_TYPE_ACCESS, frame);
 
        /* If it's a directory get the default POSIX ACL. */
        if(S_ISDIR(smb_fname.st.st_ex_mode)) {
-               def_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, name, SMB_ACL_TYPE_DEFAULT);
+               def_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, name,
+                                                  SMB_ACL_TYPE_DEFAULT, frame);
                def_acl = free_empty_sys_acl(conn, def_acl);
        }
 
        pal = load_inherited_info(conn, name);
 
-       return posix_get_nt_acl_common(conn, name, &smb_fname.st, pal,
-                                      posix_acl, def_acl, security_info,
-                                      ppdesc);
+       status = posix_get_nt_acl_common(conn, name, &smb_fname.st, pal,
+                                        posix_acl, def_acl, security_info,
+                                        mem_ctx,
+                                        ppdesc);
+       TALLOC_FREE(frame);
+       return status;
 }
 
 /****************************************************************************
@@ -3717,207 +3629,6 @@ NTSTATUS try_chown(files_struct *fsp, uid_t uid, gid_t gid)
        return status;
 }
 
-#if 0
-/* Disable this - prevents ACL inheritance from the ACL editor. JRA. */
-
-/****************************************************************************
- Take care of parent ACL inheritance.
-****************************************************************************/
-
-NTSTATUS append_parent_acl(files_struct *fsp,
-                               const struct security_descriptor *pcsd,
-                               struct security_descriptor **pp_new_sd)
-{
-       struct smb_filename *smb_dname = NULL;
-       struct security_descriptor *parent_sd = NULL;
-       files_struct *parent_fsp = NULL;
-       TALLOC_CTX *mem_ctx = talloc_tos();
-       char *parent_name = NULL;
-       struct security_ace *new_ace = NULL;
-       unsigned int num_aces = pcsd->dacl->num_aces;
-       NTSTATUS status;
-       int info;
-       unsigned int i, j;
-       struct security_descriptor *psd = dup_sec_desc(talloc_tos(), pcsd);
-       bool is_dacl_protected = (pcsd->type & SEC_DESC_DACL_PROTECTED);
-
-       if (psd == NULL) {
-               return NT_STATUS_NO_MEMORY;
-       }
-
-       if (!parent_dirname(mem_ctx, fsp->fsp_name->base_name, &parent_name,
-                           NULL)) {
-               return NT_STATUS_NO_MEMORY;
-       }
-
-       status = create_synthetic_smb_fname(mem_ctx, parent_name, NULL, NULL,
-                                           &smb_dname);
-       if (!NT_STATUS_IS_OK(status)) {
-               goto fail;
-       }
-
-       status = SMB_VFS_CREATE_FILE(
-               fsp->conn,                              /* conn */
-               NULL,                                   /* req */
-               0,                                      /* root_dir_fid */
-               smb_dname,                              /* fname */
-               FILE_READ_ATTRIBUTES,                   /* access_mask */
-               FILE_SHARE_NONE,                        /* share_access */
-               FILE_OPEN,                              /* create_disposition*/
-               FILE_DIRECTORY_FILE,                    /* create_options */
-               0,                                      /* file_attributes */
-               INTERNAL_OPEN_ONLY,                     /* oplock_request */
-               0,                                      /* allocation_size */
-               NULL,                                   /* sd */
-               NULL,                                   /* ea_list */
-               &parent_fsp,                            /* result */
-               &info);                                 /* pinfo */
-
-       if (!NT_STATUS_IS_OK(status)) {
-               TALLOC_FREE(smb_dname);
-               return status;
-       }
-
-       status = SMB_VFS_GET_NT_ACL(parent_fsp->conn, smb_dname->base_name,
-                                   SECINFO_DACL, &parent_sd );
-
-       close_file(NULL, parent_fsp, NORMAL_CLOSE);
-       TALLOC_FREE(smb_dname);
-
-       if (!NT_STATUS_IS_OK(status)) {
-               return status;
-       }
-
-       /*
-        * Make room for potentially all the ACLs from
-        * the parent. We used to add the ugw triple here,
-        * as we knew we were dealing with POSIX ACLs.
-        * We no longer need to do so as we can guarentee
-        * that a default ACL from the parent directory will
-        * be well formed for POSIX ACLs if it came from a
-        * POSIX ACL source, and if we're not writing to a
-        * POSIX ACL sink then we don't care if it's not well
-        * formed. JRA.
-        */
-
-       num_aces += parent_sd->dacl->num_aces;
-
-       if((new_ace = talloc_zero_array(mem_ctx, struct security_ace,
-                                       num_aces)) == NULL) {
-               return NT_STATUS_NO_MEMORY;
-       }
-
-       /* Start by copying in all the given ACE entries. */
-       for (i = 0; i < psd->dacl->num_aces; i++) {
-               sec_ace_copy(&new_ace[i], &psd->dacl->aces[i]);
-       }
-
-       /*
-        * Note that we're ignoring "inherit permissions" here
-        * as that really only applies to newly created files. JRA.
-        */
-
-       /* Finally append any inherited ACEs. */
-       for (j = 0; j < parent_sd->dacl->num_aces; j++) {
-               struct security_ace *se = &parent_sd->dacl->aces[j];
-
-               if (fsp->is_directory) {
-                       if (!(se->flags & SEC_ACE_FLAG_CONTAINER_INHERIT)) {
-                               /* Doesn't apply to a directory - ignore. */
-                               DEBUG(10,("append_parent_acl: directory %s "
-                                       "ignoring non container "
-                                       "inherit flags %u on ACE with sid %s "
-                                       "from parent %s\n",
-                                       fsp_str_dbg(fsp),
-                                       (unsigned int)se->flags,
-                                       sid_string_dbg(&se->trustee),
-                                       parent_name));
-                               continue;
-                       }
-               } else {
-                       if (!(se->flags & SEC_ACE_FLAG_OBJECT_INHERIT)) {
-                               /* Doesn't apply to a file - ignore. */
-                               DEBUG(10,("append_parent_acl: file %s "
-                                       "ignoring non object "
-                                       "inherit flags %u on ACE with sid %s "
-                                       "from parent %s\n",
-                                       fsp_str_dbg(fsp),
-                                       (unsigned int)se->flags,
-                                       sid_string_dbg(&se->trustee),
-                                       parent_name));
-                               continue;
-                       }
-               }
-
-               if (is_dacl_protected) {
-                       /* If the DACL is protected it means we must
-                        * not overwrite an existing ACE entry with the
-                        * same SID. This is order N^2. Ouch :-(. JRA. */
-                       unsigned int k;
-                       for (k = 0; k < psd->dacl->num_aces; k++) {
-                               if (dom_sid_equal(&psd->dacl->aces[k].trustee,
-                                               &se->trustee)) {
-                                       break;
-                               }
-                       }
-                       if (k < psd->dacl->num_aces) {
-                               /* SID matched. Ignore. */
-                               DEBUG(10,("append_parent_acl: path %s "
-                                       "ignoring ACE with protected sid %s "
-                                       "from parent %s\n",
-                                       fsp_str_dbg(fsp),
-                                       sid_string_dbg(&se->trustee),
-                                       parent_name));
-                               continue;
-                       }
-               }
-
-               sec_ace_copy(&new_ace[i], se);
-               if (se->flags & SEC_ACE_FLAG_NO_PROPAGATE_INHERIT) {
-                       new_ace[i].flags &= ~(SEC_ACE_FLAG_VALID_INHERIT);
-               }
-               new_ace[i].flags |= SEC_ACE_FLAG_INHERITED_ACE;
-
-               if (fsp->is_directory) {
-                       /*
-                        * Strip off any inherit only. It's applied.
-                        */
-                       new_ace[i].flags &= ~(SEC_ACE_FLAG_INHERIT_ONLY);
-                       if (se->flags & SEC_ACE_FLAG_NO_PROPAGATE_INHERIT) {
-                               /* No further inheritance. */
-                               new_ace[i].flags &=
-                                       ~(SEC_ACE_FLAG_CONTAINER_INHERIT|
-                                       SEC_ACE_FLAG_OBJECT_INHERIT);
-                       }
-               } else {
-                       /*
-                        * Strip off any container or inherit
-                        * flags, they can't apply to objects.
-                        */
-                       new_ace[i].flags &= ~(SEC_ACE_FLAG_CONTAINER_INHERIT|
-                                               SEC_ACE_FLAG_INHERIT_ONLY|
-                                               SEC_ACE_FLAG_NO_PROPAGATE_INHERIT);
-               }
-               i++;
-
-               DEBUG(10,("append_parent_acl: path %s "
-                       "inheriting ACE with sid %s "
-                       "from parent %s\n",
-                       fsp_str_dbg(fsp),
-                       sid_string_dbg(&se->trustee),
-                       parent_name));
-       }
-
-       psd->dacl->aces = new_ace;
-       psd->dacl->num_aces = i;
-       psd->type &= ~(SEC_DESC_DACL_AUTO_INHERITED|
-                         SEC_DESC_DACL_AUTO_INHERIT_REQ);
-
-       *pp_new_sd = psd;
-       return status;
-}
-#endif
-
 /****************************************************************************
  Reply to set a security descriptor on an fsp. security_info_sent is the
  description of the following NT ACL.
@@ -3926,7 +3637,7 @@ NTSTATUS append_parent_acl(files_struct *fsp,
  it, even though it's a const pointer.
 ****************************************************************************/
 
-NTSTATUS set_nt_acl(files_struct *fsp, uint32 security_info_sent, const struct security_descriptor *psd_orig)
+NTSTATUS set_nt_acl(files_struct *fsp, uint32_t security_info_sent, const struct security_descriptor *psd_orig)
 {
        connection_struct *conn = fsp->conn;
        uid_t user = (uid_t)-1;
@@ -3951,12 +3662,22 @@ NTSTATUS set_nt_acl(files_struct *fsp, uint32 security_info_sent, const struct s
                return NT_STATUS_MEDIA_WRITE_PROTECTED;
        }
 
-       if (!psd_orig) {
+       if (psd_orig == NULL) {
                return NT_STATUS_INVALID_PARAMETER;
        }
 
-       psd = dup_sec_desc(talloc_tos(), psd_orig);
-       if (!psd) {
+       /*
+        * MS NFS mode, here's the deal: the client merely wants to
+        * modify the mode, but roundtripping get_acl/set/acl would
+        * add additional POSIX ACEs.  So in case we get a request
+        * containing a MS NFS mode SID, we do nothing here.
+        */
+       if (security_descriptor_with_ms_nfs(psd_orig)) {
+               return NT_STATUS_OK;
+       }
+
+       psd = security_descriptor_copy(talloc_tos(), psd_orig);
+       if (psd == NULL) {
                return NT_STATUS_NO_MEMORY;
        }
 
@@ -4270,7 +3991,8 @@ int get_acl_group_bits( connection_struct *conn, const char *fname, mode_t *mode
        SMB_ACL_T posix_acl;
        int result = -1;
 
-       posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fname, SMB_ACL_TYPE_ACCESS);
+       posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fname,
+                                            SMB_ACL_TYPE_ACCESS, talloc_tos());
        if (posix_acl == (SMB_ACL_T)NULL)
                return -1;
 
@@ -4378,7 +4100,9 @@ static int copy_access_posix_acl(connection_struct *conn, const char *from, cons
        SMB_ACL_T posix_acl = NULL;
        int ret = -1;
 
-       if ((posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, from, SMB_ACL_TYPE_ACCESS)) == NULL)
+       if ((posix_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, from,
+                                                 SMB_ACL_TYPE_ACCESS,
+                                                 talloc_tos())) == NULL)
                return -1;
 
        if ((ret = chmod_acl_internals(conn, posix_acl, mode)) == -1)
@@ -4409,7 +4133,9 @@ int chmod_acl(connection_struct *conn, const char *name, mode_t mode)
 
 static bool directory_has_default_posix_acl(connection_struct *conn, const char *fname)
 {
-       SMB_ACL_T def_acl = SMB_VFS_SYS_ACL_GET_FILE( conn, fname, SMB_ACL_TYPE_DEFAULT);
+       SMB_ACL_T def_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fname,
+                                                    SMB_ACL_TYPE_DEFAULT,
+                                                    talloc_tos());
        bool has_acl = False;
        SMB_ACL_ENTRY_T entry;
 
@@ -4448,7 +4174,7 @@ int fchmod_acl(files_struct *fsp, mode_t mode)
        SMB_ACL_T posix_acl = NULL;
        int ret = -1;
 
-       if ((posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp)) == NULL)
+       if ((posix_acl = SMB_VFS_SYS_ACL_GET_FD(fsp, talloc_tos())) == NULL)
                return -1;
 
        if ((ret = chmod_acl_internals(conn, posix_acl, mode)) == -1)
@@ -4530,10 +4256,13 @@ static bool unix_ex_wire_to_tagtype(unsigned char wire_tt, SMB_ACL_TAG_T *p_tt)
  FIXME ! How does the share mask/mode fit into this.... ?
 ****************************************************************************/
 
-static SMB_ACL_T create_posix_acl_from_wire(connection_struct *conn, uint16 num_acls, const char *pdata)
+static SMB_ACL_T create_posix_acl_from_wire(connection_struct *conn,
+                                           uint16_t num_acls,
+                                           const char *pdata,
+                                           TALLOC_CTX *mem_ctx)
 {
        unsigned int i;
-       SMB_ACL_T the_acl = sys_acl_init(num_acls);
+       SMB_ACL_T the_acl = sys_acl_init(mem_ctx);
 
        if (the_acl == NULL) {
                return NULL;
@@ -4584,7 +4313,7 @@ static SMB_ACL_T create_posix_acl_from_wire(connection_struct *conn, uint16 num_
                }
 
                if (tag_type == SMB_ACL_USER) {
-                       uint32 uidval = IVAL(pdata,(i*SMB_POSIX_ACL_ENTRY_SIZE)+2);
+                       uint32_t uidval = IVAL(pdata,(i*SMB_POSIX_ACL_ENTRY_SIZE)+2);
                        uid_t uid = (uid_t)uidval;
                        if (sys_acl_set_qualifier(the_entry,(void *)&uid) == -1) {
                                DEBUG(0,("create_posix_acl_from_wire: Failed to set uid %u on entry %u. (%s)\n",
@@ -4594,7 +4323,7 @@ static SMB_ACL_T create_posix_acl_from_wire(connection_struct *conn, uint16 num_
                }
 
                if (tag_type == SMB_ACL_GROUP) {
-                       uint32 gidval = IVAL(pdata,(i*SMB_POSIX_ACL_ENTRY_SIZE)+2);
+                       uint32_t gidval = IVAL(pdata,(i*SMB_POSIX_ACL_ENTRY_SIZE)+2);
                        gid_t gid = (uid_t)gidval;
                        if (sys_acl_set_qualifier(the_entry,(void *)&gid) == -1) {
                                DEBUG(0,("create_posix_acl_from_wire: Failed to set gid %u on entry %u. (%s)\n",
@@ -4622,7 +4351,7 @@ static SMB_ACL_T create_posix_acl_from_wire(connection_struct *conn, uint16 num_
 ****************************************************************************/
 
 bool set_unix_posix_default_acl(connection_struct *conn, const char *fname, const SMB_STRUCT_STAT *psbuf,
-                               uint16 num_def_acls, const char *pdata)
+                               uint16_t num_def_acls, const char *pdata)
 {
        SMB_ACL_T def_acl = NULL;
 
@@ -4646,7 +4375,9 @@ bool set_unix_posix_default_acl(connection_struct *conn, const char *fname, cons
                return True;
        }
 
-       if ((def_acl = create_posix_acl_from_wire(conn, num_def_acls, pdata)) == NULL) {
+       if ((def_acl = create_posix_acl_from_wire(conn, num_def_acls,
+                                                 pdata,
+                                                 talloc_tos())) == NULL) {
                return False;
        }
 
@@ -4677,7 +4408,7 @@ static bool remove_posix_acl(connection_struct *conn, files_struct *fsp, const c
        SMB_ACL_ENTRY_T entry;
        bool ret = False;
        /* Create a new ACL with only 3 entries, u/g/w. */
-       SMB_ACL_T new_file_acl = sys_acl_init(3);
+       SMB_ACL_T new_file_acl = sys_acl_init(talloc_tos());
        SMB_ACL_ENTRY_T user_ent = NULL;
        SMB_ACL_ENTRY_T group_ent = NULL;
        SMB_ACL_ENTRY_T other_ent = NULL;
@@ -4723,9 +4454,11 @@ static bool remove_posix_acl(connection_struct *conn, files_struct *fsp, const c
 
        /* Get the current file ACL. */
        if (fsp && fsp->fh->fd != -1) {
-               file_acl = SMB_VFS_SYS_ACL_GET_FD(fsp);
+               file_acl = SMB_VFS_SYS_ACL_GET_FD(fsp, talloc_tos());
        } else {
-               file_acl = SMB_VFS_SYS_ACL_GET_FILE( conn, fname, SMB_ACL_TYPE_ACCESS);
+               file_acl = SMB_VFS_SYS_ACL_GET_FILE(conn, fname,
+                                                   SMB_ACL_TYPE_ACCESS,
+                                                   talloc_tos());
        }
 
        if (file_acl == NULL) {
@@ -4806,7 +4539,7 @@ static bool remove_posix_acl(connection_struct *conn, files_struct *fsp, const c
  except SMB_ACL_USER_OBJ, SMB_ACL_GROUP_OBJ, SMB_ACL_OTHER.
 ****************************************************************************/
 
-bool set_unix_posix_acl(connection_struct *conn, files_struct *fsp, const char *fname, uint16 num_acls, const char *pdata)
+bool set_unix_posix_acl(connection_struct *conn, files_struct *fsp, const char *fname, uint16_t num_acls, const char *pdata)
 {
        SMB_ACL_T file_acl = NULL;
 
@@ -4815,7 +4548,9 @@ bool set_unix_posix_acl(connection_struct *conn, files_struct *fsp, const char *
                return remove_posix_acl(conn, fsp, fname);
        }
 
-       if ((file_acl = create_posix_acl_from_wire(conn, num_acls, pdata)) == NULL) {
+       if ((file_acl = create_posix_acl_from_wire(conn, num_acls,
+                                                  pdata,
+                                                  talloc_tos())) == NULL) {
                return False;
        }
 
@@ -4846,69 +4581,48 @@ bool set_unix_posix_acl(connection_struct *conn, files_struct *fsp, const char *
  check.  Caller is responsible for freeing the returned security
  descriptor via TALLOC_FREE().  This is designed for dealing with 
  user space access checks in smbd outside of the VFS.  For example,
- checking access rights in OpenEventlog().
+ checking access rights in OpenEventlog() or from python.
 
- Assume we are dealing with files (for now)
 ********************************************************************/
 
-struct security_descriptor *get_nt_acl_no_snum( TALLOC_CTX *ctx, const char *fname)
+NTSTATUS get_nt_acl_no_snum(TALLOC_CTX *ctx, const char *fname,
+                               uint32_t security_info_wanted,
+                               struct security_descriptor **sd)
 {
-       struct security_descriptor *psd, *ret_sd;
+       TALLOC_CTX *frame = talloc_stackframe();
        connection_struct *conn;
-       files_struct finfo;
-       struct fd_handle fh;
-       NTSTATUS status;
-
-       conn = talloc_zero(ctx, connection_struct);
-       if (conn == NULL) {
-               DEBUG(0, ("talloc failed\n"));
-               return NULL;
-       }
+       NTSTATUS status = NT_STATUS_OK;
 
-       if (!(conn->params = talloc(conn, struct share_params))) {
-               DEBUG(0,("get_nt_acl_no_snum: talloc() failed!\n"));
-               TALLOC_FREE(conn);
-               return NULL;
+       if (!posix_locking_init(false)) {
+               TALLOC_FREE(frame);
+               return NT_STATUS_NO_MEMORY;
        }
 
-       conn->params->service = -1;
-
-       set_conn_connectpath(conn, "/");
-
-       if (!smbd_vfs_init(conn)) {
-               DEBUG(0,("get_nt_acl_no_snum: Unable to create a fake connection struct!\n"));
-               conn_free(conn);
-               return NULL;
-        }
-
-       ZERO_STRUCT( finfo );
-       ZERO_STRUCT( fh );
+       status = create_conn_struct(ctx,
+                               server_event_context(),
+                               server_messaging_context(),
+                               &conn,
+                               -1,
+                               "/",
+                               NULL);
 
-       finfo.fnum = FNUM_FIELD_INVALID;
-       finfo.conn = conn;
-       finfo.fh = &fh;
-       finfo.fh->fd = -1;
-
-       status = create_synthetic_smb_fname(talloc_tos(), fname, NULL, NULL,
-                                           &finfo.fsp_name);
        if (!NT_STATUS_IS_OK(status)) {
-               conn_free(conn);
-               return NULL;
+               DEBUG(0,("create_conn_struct returned %s.\n",
+                       nt_errstr(status)));
+               TALLOC_FREE(frame);
+               return status;
        }
 
-       if (!NT_STATUS_IS_OK(SMB_VFS_FGET_NT_ACL( &finfo, SECINFO_DACL, &psd))) {
-               DEBUG(0,("get_nt_acl_no_snum: get_nt_acl returned zero.\n"));
-               TALLOC_FREE(finfo.fsp_name);
-               conn_free(conn);
-               return NULL;
+       status = SMB_VFS_GET_NT_ACL(conn, fname, security_info_wanted, ctx, sd);
+       if (!NT_STATUS_IS_OK(status)) {
+               DEBUG(0, ("get_nt_acl_no_snum: SMB_VFS_GET_NT_ACL returned %s.\n",
+                         nt_errstr(status)));
        }
 
-       ret_sd = dup_sec_desc( ctx, psd );
-
-       TALLOC_FREE(finfo.fsp_name);
        conn_free(conn);
+       TALLOC_FREE(frame);
 
-       return ret_sd;
+       return status;
 }
 
 /* Stolen shamelessly from pvfs_default_acl() in source4 :-). */
@@ -5020,3 +4734,119 @@ NTSTATUS make_default_filesystem_acl(TALLOC_CTX *ctx,
        }
        return NT_STATUS_OK;
 }
+
+int posix_sys_acl_blob_get_file(vfs_handle_struct *handle,
+                               const char *path_p,
+                               TALLOC_CTX *mem_ctx,
+                               char **blob_description,
+                               DATA_BLOB *blob)
+{
+       int ret;
+       TALLOC_CTX *frame = talloc_stackframe();
+       /* Initialise this to zero, in a portable way */
+       struct smb_acl_wrapper acl_wrapper = {
+               NULL
+       };
+       struct smb_filename *smb_fname;
+
+       smb_fname = synthetic_smb_fname(frame, path_p, NULL, NULL);
+       if (smb_fname == NULL) {
+               TALLOC_FREE(frame);
+               errno = ENOMEM;
+               return -1;
+       }
+
+       acl_wrapper.access_acl
+               = smb_vfs_call_sys_acl_get_file(handle,
+                                               path_p,
+                                               SMB_ACL_TYPE_ACCESS,
+                                               frame);
+
+       ret = smb_vfs_call_stat(handle, smb_fname);
+       if (ret == -1) {
+               TALLOC_FREE(frame);
+               return -1;
+       }
+
+       if (S_ISDIR(smb_fname->st.st_ex_mode)) {
+               acl_wrapper.default_acl
+                       = smb_vfs_call_sys_acl_get_file(handle,
+                                                       path_p,
+                                                       SMB_ACL_TYPE_DEFAULT,
+                                                       frame);
+       }
+
+       acl_wrapper.owner = smb_fname->st.st_ex_uid;
+       acl_wrapper.group = smb_fname->st.st_ex_gid;
+       acl_wrapper.mode = smb_fname->st.st_ex_mode;
+
+       if (!NDR_ERR_CODE_IS_SUCCESS(ndr_push_struct_blob(blob, mem_ctx,
+                                                         &acl_wrapper,
+                                                         (ndr_push_flags_fn_t)ndr_push_smb_acl_wrapper))) {
+               errno = EINVAL;
+               TALLOC_FREE(frame);
+               return -1;
+       }
+
+       *blob_description = talloc_strdup(mem_ctx, "posix_acl");
+       if (!*blob_description) {
+               errno = EINVAL;
+               TALLOC_FREE(frame);
+               return -1;
+       }
+
+       TALLOC_FREE(frame);
+       return 0;
+}
+
+int posix_sys_acl_blob_get_fd(vfs_handle_struct *handle,
+                             files_struct *fsp,
+                             TALLOC_CTX *mem_ctx,
+                             char **blob_description,
+                             DATA_BLOB *blob)
+{
+       SMB_STRUCT_STAT sbuf;
+       TALLOC_CTX *frame;
+       struct smb_acl_wrapper acl_wrapper;
+       int ret;
+
+       /* This ensures that we also consider the default ACL */
+       if (fsp->is_directory ||  fsp->fh->fd == -1) {
+               return posix_sys_acl_blob_get_file(handle, fsp->fsp_name->base_name,
+                                                  mem_ctx, blob_description, blob);
+       }
+       frame = talloc_stackframe();
+
+       acl_wrapper.default_acl = NULL;
+
+       acl_wrapper.access_acl = smb_vfs_call_sys_acl_get_file(handle, fsp->fsp_name->base_name,
+                                                              SMB_ACL_TYPE_ACCESS, frame);
+
+       ret = smb_vfs_call_fstat(handle, fsp, &sbuf);
+       if (ret == -1) {
+               TALLOC_FREE(frame);
+               return -1;
+       }
+
+       acl_wrapper.owner = sbuf.st_ex_uid;
+       acl_wrapper.group = sbuf.st_ex_gid;
+       acl_wrapper.mode = sbuf.st_ex_mode;
+
+       if (!NDR_ERR_CODE_IS_SUCCESS(ndr_push_struct_blob(blob, mem_ctx,
+                                                         &acl_wrapper,
+                                                         (ndr_push_flags_fn_t)ndr_push_smb_acl_wrapper))) {
+               errno = EINVAL;
+               TALLOC_FREE(frame);
+               return -1;
+       }
+
+       *blob_description = talloc_strdup(mem_ctx, "posix_acl");
+       if (!*blob_description) {
+               errno = EINVAL;
+               TALLOC_FREE(frame);
+               return -1;
+       }
+
+       TALLOC_FREE(frame);
+       return 0;
+}