--- /dev/null
+From 3432aafbf86b4d3a559838d81b3ebc039e72a412 Mon Sep 17 00:00:00 2001
+From: Jeremy Allison <jra@samba.org>
+Date: Tue, 10 Jun 2014 14:41:45 -0700
+Subject: [PATCH 1/2] s3: smbd - SMB[2|3]. Ensure a \ or / can't be found
+ anywhere in a search path, not just at the start.
+
+Signed-off-by: Jeremy Allison <jra@samba.org>
+---
+ source3/smbd/smb2_find.c | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/source3/smbd/smb2_find.c b/source3/smbd/smb2_find.c
+index 59e5b66..b0ab7a8 100644
+--- a/source3/smbd/smb2_find.c
++++ b/source3/smbd/smb2_find.c
+@@ -255,11 +255,11 @@ static struct tevent_req *smbd_smb2_find_send(TALLOC_CTX *mem_ctx,
+ tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_INVALID);
+ return tevent_req_post(req, ev);
+ }
+- if (strcmp(in_file_name, "\\") == 0) {
++ if (strchr_m(in_file_name, '\\') != NULL) {
+ tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_INVALID);
+ return tevent_req_post(req, ev);
+ }
+- if (strcmp(in_file_name, "/") == 0) {
++ if (strchr_m(in_file_name, '/') != NULL) {
+ tevent_req_nterror(req, NT_STATUS_OBJECT_NAME_INVALID);
+ return tevent_req_post(req, ev);
+ }
+--
+1.9.3
+
+
+From 190d0f39bb400a373c8f4d6847e2980c0df8da2b Mon Sep 17 00:00:00 2001
+From: Jeremy Allison <jra@samba.org>
+Date: Tue, 10 Jun 2014 15:58:15 -0700
+Subject: [PATCH 2/2] s3: smbd : SMB2 - fix SMB2_SEARCH when searching non
+ wildcard string with a case-canonicalized share.
+
+We need to go through filename_convert() in order for the filename
+canonicalization to be done on a non-wildcard search string (as is
+done in the SMB1 findfirst code path).
+
+Fixes Bug #10650 - "case sensitive = True" option doesn't work with "max protocol = SMB2" or higher in large directories.
+
+https://bugzilla.samba.org/show_bug.cgi?id=10650
+
+Signed-off-by: Jeremy Allison <jra@samba.org>
+---
+ source3/smbd/smb2_find.c | 38 +++++++++++++++++++++++++++++++++++---
+ 1 file changed, 35 insertions(+), 3 deletions(-)
+
+diff --git a/source3/smbd/smb2_find.c b/source3/smbd/smb2_find.c
+index b0ab7a8..6fe6545 100644
+--- a/source3/smbd/smb2_find.c
++++ b/source3/smbd/smb2_find.c
+@@ -229,6 +229,7 @@ static struct tevent_req *smbd_smb2_find_send(TALLOC_CTX *mem_ctx,
+ uint32_t dirtype = FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_DIRECTORY;
+ bool dont_descend = false;
+ bool ask_sharemode = true;
++ bool wcard_has_wild;
+
+ req = tevent_req_create(mem_ctx, &state,
+ struct smbd_smb2_find_state);
+@@ -303,16 +304,47 @@ static struct tevent_req *smbd_smb2_find_send(TALLOC_CTX *mem_ctx,
+ dptr_CloseDir(fsp);
+ }
+
++ wcard_has_wild = ms_has_wild(in_file_name);
++
++ /* Ensure we've canonicalized any search path if not a wildcard. */
++ if (!wcard_has_wild) {
++ struct smb_filename *smb_fname = NULL;
++ const char *fullpath;
++
++ if (ISDOT(fsp->fsp_name->base_name)) {
++ fullpath = in_file_name;
++ } else {
++ fullpath = talloc_asprintf(state,
++ "%s/%s",
++ fsp->fsp_name->base_name,
++ in_file_name);
++ }
++ if (tevent_req_nomem(fullpath, req)) {
++ return tevent_req_post(req, ev);
++ }
++ status = filename_convert(state,
++ conn,
++ false, /* Not a DFS path. */
++ fullpath,
++ UCF_SAVE_LCOMP | UCF_ALWAYS_ALLOW_WCARD_LCOMP,
++ &wcard_has_wild,
++ &smb_fname);
++
++ if (!NT_STATUS_IS_OK(status)) {
++ tevent_req_nterror(req, status);
++ return tevent_req_post(req, ev);
++ }
++
++ in_file_name = smb_fname->original_lcomp;
++ }
++
+ if (fsp->dptr == NULL) {
+- bool wcard_has_wild;
+
+ if (!(fsp->access_mask & SEC_DIR_LIST)) {
+ tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+ return tevent_req_post(req, ev);
+ }
+
+- wcard_has_wild = ms_has_wild(in_file_name);
+-
+ status = dptr_create(conn,
+ fsp,
+ fsp->fsp_name->base_name,
+--
+1.9.3
+