r4403: - added ACL inheritance in the pvfs backend. ACLs are now inherited on
[samba.git] / source4 / ntvfs / posix / pvfs_open.c
index cfd2b0f159b7d71f70a30871693edd404328fdb9..1695d8e1d9bb50dd703e13d492922cfc953c9081 100644 (file)
@@ -26,6 +26,7 @@
 #include "system/filesys.h"
 #include "dlinklist.h"
 #include "messages.h"
+#include "librpc/gen_ndr/ndr_xattr.h"
 
 /*
   create file handles with convenient numbers for sniffers
@@ -69,6 +70,11 @@ static int pvfs_dir_handle_destructor(void *p)
        struct pvfs_file_handle *h = p;
 
        if (h->create_options & NTCREATEX_OPTIONS_DELETE_ON_CLOSE) {
+               NTSTATUS status = pvfs_xattr_unlink_hook(h->pvfs, h->name->full_name);
+               if (!NT_STATUS_IS_OK(status)) {
+                       DEBUG(0,("Warning: xattr rmdir hook failed for '%s' - %s\n",
+                                h->name->full_name, nt_errstr(status)));
+               }
                if (rmdir(h->name->full_name) != 0) {
                        DEBUG(0,("pvfs_close: failed to rmdir '%s' - %s\n", 
                                 h->name->full_name, strerror(errno)));
@@ -89,6 +95,43 @@ static int pvfs_dir_fnum_destructor(void *p)
        return 0;
 }
 
+/*
+  setup any EAs and the ACL on newly created files/directories
+*/
+static NTSTATUS pvfs_open_setup_eas_acl(struct pvfs_state *pvfs,
+                                       struct smbsrv_request *req,
+                                       struct pvfs_filename *name,
+                                       int fd, int fnum,
+                                       union smb_open *io)
+{
+       NTSTATUS status;
+
+       /* setup any EAs that were asked for */
+       if (io->ntcreatex.in.ea_list) {
+               status = pvfs_setfileinfo_ea_set(pvfs, name, fd, 
+                                                io->ntcreatex.in.ea_list->num_eas,
+                                                io->ntcreatex.in.ea_list->eas);
+               if (!NT_STATUS_IS_OK(status)) {
+                       return status;
+               }
+       }
+
+       /* setup an initial sec_desc if requested */
+       if (io->ntcreatex.in.sec_desc) {
+               union smb_setfileinfo set;
+
+               set.set_secdesc.file.fnum = fnum;
+               set.set_secdesc.in.secinfo_flags = SECINFO_DACL;
+               set.set_secdesc.in.sd = io->ntcreatex.in.sec_desc;
+
+               status = pvfs_acl_set(pvfs, req, name, fd, &set);
+       } else {
+               /* otherwise setup an inherited acl from the parent */
+               status = pvfs_acl_inherit(pvfs, req, name, fd);
+       }
+
+       return status;
+}
 
 /*
   open a directory
@@ -102,6 +145,11 @@ static NTSTATUS pvfs_open_directory(struct pvfs_state *pvfs,
        int fnum;
        NTSTATUS status;
        uint32_t create_action;
+       uint32_t access_mask = io->generic.in.access_mask;
+
+       if (name->stream_name) {
+               return NT_STATUS_NOT_A_DIRECTORY;
+       }
 
        /* if the client says it must be a directory, and it isn't,
           then fail */
@@ -147,6 +195,15 @@ static NTSTATUS pvfs_open_directory(struct pvfs_state *pvfs,
                return NT_STATUS_TOO_MANY_OPENED_FILES;
        }
 
+       if (name->exists) {
+               /* check the security descriptor */
+               status = pvfs_access_check(pvfs, req, name, &access_mask);
+               if (!NT_STATUS_IS_OK(status)) {
+                       idr_remove(pvfs->idtree_fnum, fnum);
+                       return status;
+               }
+       }
+
        f->fnum          = fnum;
        f->session       = req->session;
        f->smbpid        = req->smbpid;
@@ -155,15 +212,18 @@ static NTSTATUS pvfs_open_directory(struct pvfs_state *pvfs,
        f->lock_count    = 0;
        f->share_access  = io->generic.in.share_access;
        f->impersonation = io->generic.in.impersonation;
+       f->access_mask   = access_mask;
 
-       f->handle->pvfs           = pvfs;
-       f->handle->name           = talloc_steal(f->handle, name);
-       f->handle->fd             = -1;
-       f->handle->locking_key    = data_blob(NULL, 0);
-       f->handle->create_options = io->generic.in.create_options;
-       f->handle->seek_offset    = 0;
-       f->handle->position       = 0;
-       f->handle->mode           = 0;
+       f->handle->pvfs              = pvfs;
+       f->handle->name              = talloc_steal(f->handle, name);
+       f->handle->fd                = -1;
+       f->handle->odb_locking_key   = data_blob(NULL, 0);
+       f->handle->brl_locking_key   = data_blob(NULL, 0);
+       f->handle->create_options    = io->generic.in.create_options;
+       f->handle->seek_offset       = 0;
+       f->handle->position          = 0;
+       f->handle->mode              = 0;
+       f->handle->sticky_write_time = False;
 
        DLIST_ADD(pvfs->open_files, f);
 
@@ -178,26 +238,36 @@ static NTSTATUS pvfs_open_directory(struct pvfs_state *pvfs,
                uint32_t attrib = io->generic.in.file_attr | FILE_ATTRIBUTE_DIRECTORY;
                mode_t mode = pvfs_fileperms(pvfs, attrib);
                if (mkdir(name->full_name, mode) == -1) {
+                       idr_remove(pvfs->idtree_fnum, fnum);
                        return pvfs_map_errno(pvfs,errno);
                }
-               status = pvfs_resolve_name(pvfs, req, io->ntcreatex.in.fname,
-                                          PVFS_RESOLVE_NO_WILDCARD, &name);
+
+               pvfs_xattr_unlink_hook(pvfs, name->full_name);
+
+               status = pvfs_resolve_name(pvfs, req, io->ntcreatex.in.fname, 0, &name);
+               if (!NT_STATUS_IS_OK(status)) {
+                       goto cleanup_delete;
+               }
+
+               status = pvfs_open_setup_eas_acl(pvfs, req, name, -1, fnum, io);
                if (!NT_STATUS_IS_OK(status)) {
-                       return status;
+                       goto cleanup_delete;
                }
+
                create_action = NTCREATEX_ACTION_CREATED;
        } else {
                create_action = NTCREATEX_ACTION_EXISTED;
        }
 
        if (!name->exists) {
+               idr_remove(pvfs->idtree_fnum, fnum);
                return NT_STATUS_OBJECT_NAME_NOT_FOUND;
        }
 
        /* the open succeeded, keep this handle permanently */
        talloc_steal(pvfs, f);
 
-       io->generic.out.oplock_level  = NO_OPLOCK;
+       io->generic.out.oplock_level  = OPLOCK_NONE;
        io->generic.out.fnum          = f->fnum;
        io->generic.out.create_action = create_action;
        io->generic.out.create_time   = name->dos.create_time;
@@ -212,6 +282,11 @@ static NTSTATUS pvfs_open_directory(struct pvfs_state *pvfs,
        io->generic.out.is_directory  = 1;
 
        return NT_STATUS_OK;
+
+cleanup_delete:
+       idr_remove(pvfs->idtree_fnum, fnum);
+       rmdir(name->full_name);
+       return status;
 }
 
 /*
@@ -221,6 +296,26 @@ static int pvfs_handle_destructor(void *p)
 {
        struct pvfs_file_handle *h = p;
 
+       /* the write time is no longer sticky */
+       if (h->sticky_write_time) {
+               NTSTATUS status;
+               status = pvfs_dosattrib_load(h->pvfs, h->name, h->fd);
+               if (NT_STATUS_IS_OK(status)) {
+                       h->name->dos.flags &= ~XATTR_ATTRIB_FLAG_STICKY_WRITE_TIME;
+                       pvfs_dosattrib_save(h->pvfs, h->name, h->fd);
+               }
+       }
+       
+       if ((h->create_options & NTCREATEX_OPTIONS_DELETE_ON_CLOSE) &&
+           h->name->stream_name) {
+               NTSTATUS status;
+               status = pvfs_stream_delete(h->pvfs, h->name, h->fd);
+               if (!NT_STATUS_IS_OK(status)) {
+                       DEBUG(0,("Failed to delete stream '%s' on close of '%s'\n",
+                                h->name->stream_name, h->name->full_name));
+               }
+       }
+
        if (h->fd != -1) {
                if (close(h->fd) != 0) {
                        DEBUG(0,("pvfs_handle_destructor: close(%d) failed for %s - %s\n",
@@ -229,7 +324,14 @@ static int pvfs_handle_destructor(void *p)
                h->fd = -1;
        }
 
-       if (h->create_options & NTCREATEX_OPTIONS_DELETE_ON_CLOSE) {
+       if ((h->create_options & NTCREATEX_OPTIONS_DELETE_ON_CLOSE) &&
+           h->name->stream_name == NULL) {
+               NTSTATUS status;
+               status = pvfs_xattr_unlink_hook(h->pvfs, h->name->full_name);
+               if (!NT_STATUS_IS_OK(status)) {
+                       DEBUG(0,("Warning: xattr unlink hook failed for '%s' - %s\n",
+                                h->name->full_name, nt_errstr(status)));
+               }
                if (unlink(h->name->full_name) != 0) {
                        DEBUG(0,("pvfs_close: failed to delete '%s' - %s\n", 
                                 h->name->full_name, strerror(errno)));
@@ -240,7 +342,7 @@ static int pvfs_handle_destructor(void *p)
                struct odb_lock *lck;
                NTSTATUS status;
 
-               lck = odb_lock(h, h->pvfs->odb_context, &h->locking_key);
+               lck = odb_lock(h, h->pvfs->odb_context, &h->odb_locking_key);
                if (lck == NULL) {
                        DEBUG(0,("Unable to lock opendb for close\n"));
                        return 0;
@@ -275,9 +377,8 @@ static int pvfs_fnum_destructor(void *p)
 
 
 /*
-  form the lock context used for byte range locking and opendb
-  locking. Note that we must zero here to take account of
-  possible padding on some architectures
+  form the lock context used for opendb locking. Note that we must
+  zero here to take account of possible padding on some architectures
 */
 static NTSTATUS pvfs_locking_key(struct pvfs_filename *name, 
                                 TALLOC_CTX *mem_ctx, DATA_BLOB *key)
@@ -299,6 +400,37 @@ static NTSTATUS pvfs_locking_key(struct pvfs_filename *name,
        return NT_STATUS_OK;
 }
 
+/*
+  form the lock context used for byte range locking. This is separate
+  from the locking key used for opendb locking as it needs to take
+  account of file streams (each stream is a separate byte range
+  locking space)
+*/
+static NTSTATUS pvfs_brl_locking_key(struct pvfs_filename *name, 
+                                    TALLOC_CTX *mem_ctx, DATA_BLOB *key)
+{
+       DATA_BLOB odb_key;
+       NTSTATUS status;
+       status = pvfs_locking_key(name, mem_ctx, &odb_key);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+       if (name->stream_name == NULL) {
+               *key = odb_key;
+               return NT_STATUS_OK;
+       }
+       *key = data_blob_talloc(mem_ctx, NULL, 
+                               odb_key.length + strlen(name->stream_name) + 1);
+       if (key->data == NULL) {
+               return NT_STATUS_NO_MEMORY;
+       }
+       memcpy(key->data, odb_key.data, odb_key.length);
+       memcpy(key->data + odb_key.length, 
+              name->stream_name, strlen(name->stream_name)+1);
+       data_blob_free(&odb_key);
+       return NT_STATUS_OK;
+}
+
 
 /*
   create a new file
@@ -323,11 +455,11 @@ static NTSTATUS pvfs_create_file(struct pvfs_state *pvfs,
                return NT_STATUS_CANNOT_DELETE;
        }
        
-       if (access_mask & SEC_RIGHT_MAXIMUM_ALLOWED) {
-               access_mask = GENERIC_RIGHTS_FILE_READ | GENERIC_RIGHTS_FILE_WRITE;
+       if (access_mask & SEC_FLAG_MAXIMUM_ALLOWED) {
+               access_mask = SEC_RIGHTS_FILE_READ | SEC_RIGHTS_FILE_WRITE;
        }
 
-       if (access_mask & SA_RIGHT_FILE_WRITE_APPEND) {
+       if (access_mask & (SEC_FILE_WRITE_DATA | SEC_FILE_APPEND_DATA)) {
                flags = O_RDWR;
        } else {
                flags = O_RDONLY;
@@ -358,6 +490,18 @@ static NTSTATUS pvfs_create_file(struct pvfs_state *pvfs,
                return pvfs_map_errno(pvfs, errno);
        }
 
+       pvfs_xattr_unlink_hook(pvfs, name->full_name);
+
+       /* if this was a stream create then create the stream as well */
+       if (name->stream_name) {
+               status = pvfs_stream_create(pvfs, name, fd);
+               if (!NT_STATUS_IS_OK(status)) {
+                       idr_remove(pvfs->idtree_fnum, fnum);
+                       close(fd);
+                       return status;
+               }
+       }
+
        /* re-resolve the open fd */
        status = pvfs_resolve_name_fd(pvfs, fd, name);
        if (!NT_STATUS_IS_OK(status)) {
@@ -369,37 +513,45 @@ static NTSTATUS pvfs_create_file(struct pvfs_state *pvfs,
        name->dos.attrib = attrib;
        status = pvfs_dosattrib_save(pvfs, name, fd);
        if (!NT_STATUS_IS_OK(status)) {
-               idr_remove(pvfs->idtree_fnum, fnum);
-               close(fd);
-               return status;
+               goto cleanup_delete;
+       }
+
+
+       status = pvfs_open_setup_eas_acl(pvfs, req, name, fd, fnum, io);
+       if (!NT_STATUS_IS_OK(status)) {
+               goto cleanup_delete;
        }
 
        /* form the lock context used for byte range locking and
           opendb locking */
-       status = pvfs_locking_key(name, f->handle, &f->handle->locking_key);
+       status = pvfs_locking_key(name, f->handle, &f->handle->odb_locking_key);
        if (!NT_STATUS_IS_OK(status)) {
-               idr_remove(pvfs->idtree_fnum, fnum);
-               close(fd);
-               return status;
+               goto cleanup_delete;
+       }
+
+       status = pvfs_brl_locking_key(name, f->handle, &f->handle->brl_locking_key);
+       if (!NT_STATUS_IS_OK(status)) {
+               goto cleanup_delete;
        }
 
        /* grab a lock on the open file record */
-       lck = odb_lock(req, pvfs->odb_context, &f->handle->locking_key);
+       lck = odb_lock(req, pvfs->odb_context, &f->handle->odb_locking_key);
        if (lck == NULL) {
                DEBUG(0,("pvfs_open: failed to lock file '%s' in opendb\n",
                         name->full_name));
                /* we were supposed to do a blocking lock, so something
                   is badly wrong! */
-               idr_remove(pvfs->idtree_fnum, fnum);
-               close(fd);
-               return NT_STATUS_INTERNAL_DB_CORRUPTION;
+               status = NT_STATUS_INTERNAL_DB_CORRUPTION;
+               goto cleanup_delete;
        }
 
-       status = odb_open_file(lck, f->handle, 
+       status = odb_open_file(lck, f->handle, name->stream_id,
                               share_access, create_options, access_mask);
        talloc_free(lck);
        if (!NT_STATUS_IS_OK(status)) {
-               /* bad news, we must have hit a race */
+               /* bad news, we must have hit a race - we don't delete the file
+                  here as the most likely scenario is that someone else created 
+                  the file at the same time */
                idr_remove(pvfs->idtree_fnum, fnum);
                close(fd);
                return status;
@@ -423,6 +575,7 @@ static NTSTATUS pvfs_create_file(struct pvfs_state *pvfs,
        f->handle->position          = 0;
        f->handle->mode              = 0;
        f->handle->have_opendb_entry = True;
+       f->handle->sticky_write_time = False;
 
        DLIST_ADD(pvfs->open_files, f);
 
@@ -431,7 +584,12 @@ static NTSTATUS pvfs_create_file(struct pvfs_state *pvfs,
        talloc_set_destructor(f, pvfs_fnum_destructor);
        talloc_set_destructor(f->handle, pvfs_handle_destructor);
 
-       io->generic.out.oplock_level  = NO_OPLOCK;
+       
+       if (pvfs->flags & PVFS_FLAG_FAKE_OPLOCKS) {
+               io->generic.out.oplock_level  = OPLOCK_EXCLUSIVE;
+       } else {
+               io->generic.out.oplock_level  = OPLOCK_NONE;
+       }
        io->generic.out.fnum          = f->fnum;
        io->generic.out.create_action = NTCREATEX_ACTION_CREATED;
        io->generic.out.create_time   = name->dos.create_time;
@@ -449,6 +607,12 @@ static NTSTATUS pvfs_create_file(struct pvfs_state *pvfs,
        talloc_steal(pvfs, f);
 
        return NT_STATUS_OK;
+
+cleanup_delete:
+       idr_remove(pvfs->idtree_fnum, fnum);
+       close(fd);
+       unlink(name->full_name);
+       return status;
 }
 
 
@@ -460,7 +624,7 @@ struct pvfs_open_retry {
        struct smbsrv_request *req;
        union smb_open *io;
        void *wait_handle;
-       DATA_BLOB locking_key;
+       DATA_BLOB odb_locking_key;
 };
 
 /* destroy a pending open request */
@@ -468,9 +632,9 @@ static int pvfs_retry_destructor(void *ptr)
 {
        struct pvfs_open_retry *r = ptr;
        struct pvfs_state *pvfs = r->ntvfs->private_data;
-       if (r->locking_key.data) {
+       if (r->odb_locking_key.data) {
                struct odb_lock *lck;
-               lck = odb_lock(r->req, pvfs->odb_context, &r->locking_key);
+               lck = odb_lock(r->req, pvfs->odb_context, &r->odb_locking_key);
                if (lck != NULL) {
                        odb_remove_pending(lck, r);
                }
@@ -509,7 +673,7 @@ static void pvfs_open_retry(void *private, enum pvfs_wait_notice reason)
 
        /* the pending odb entry is already removed. We use a null locking
           key to indicate this */
-       data_blob_free(&r->locking_key);
+       data_blob_free(&r->odb_locking_key);
        talloc_free(r);
 
        /* try the open again, which could trigger another retry setup
@@ -566,7 +730,7 @@ static NTSTATUS pvfs_open_deny_dos(struct ntvfs_module_context *ntvfs,
                    (f2->handle->create_options & 
                     (NTCREATEX_OPTIONS_PRIVATE_DENY_DOS |
                      NTCREATEX_OPTIONS_PRIVATE_DENY_FCB)) &&
-                   (f2->access_mask & SA_RIGHT_FILE_WRITE_DATA) &&
+                   (f2->access_mask & SEC_FILE_WRITE_DATA) &&
                    StrCaseCmp(f2->handle->name->original_name, 
                               io->generic.in.fname)==0) {
                        break;
@@ -593,7 +757,7 @@ static NTSTATUS pvfs_open_deny_dos(struct ntvfs_module_context *ntvfs,
 
        name = f->handle->name;
 
-       io->generic.out.oplock_level  = NO_OPLOCK;
+       io->generic.out.oplock_level  = OPLOCK_NONE;
        io->generic.out.fnum          = f->fnum;
        io->generic.out.create_action = NTCREATEX_ACTION_EXISTED;
        io->generic.out.create_time   = name->dos.create_time;
@@ -646,9 +810,9 @@ static NTSTATUS pvfs_open_setup_retry(struct ntvfs_module_context *ntvfs,
        r->ntvfs = ntvfs;
        r->req = req;
        r->io = io;
-       r->locking_key = data_blob_talloc(r, 
-                                         f->handle->locking_key.data, 
-                                         f->handle->locking_key.length);
+       r->odb_locking_key = data_blob_talloc(r, 
+                                             f->handle->odb_locking_key.data, 
+                                             f->handle->odb_locking_key.length);
 
        end_time = timeval_add(&req->request_time, 0, pvfs->sharing_violation_delay);
 
@@ -669,40 +833,9 @@ static NTSTATUS pvfs_open_setup_retry(struct ntvfs_module_context *ntvfs,
                return NT_STATUS_NO_MEMORY;
        }
 
-       return NT_STATUS_OK;
-}
+       talloc_steal(pvfs, r);
 
-/*
-  special handling for t2open
-*/
-static NTSTATUS pvfs_open_t2open(struct ntvfs_module_context *ntvfs,
-                                struct smbsrv_request *req, union smb_open *io)
-{
-       struct pvfs_state *pvfs = ntvfs->private_data;
-       struct pvfs_filename *name;
-       NTSTATUS status;
-
-       status = pvfs_resolve_name(pvfs, req, io->t2open.in.fname,
-                                  PVFS_RESOLVE_NO_WILDCARD, &name);
-       if (!NT_STATUS_IS_OK(status)) {
-               return status;
-       }
-
-       if (io->t2open.in.open_func & OPENX_OPEN_FUNC_CREATE) {
-               if (!name->exists) return NT_STATUS_ACCESS_DENIED;
-       }
-       if (io->t2open.in.open_func & OPENX_OPEN_FUNC_TRUNC) {
-               if (name->exists) return NT_STATUS_ACCESS_DENIED;
-               return NT_STATUS_OBJECT_NAME_NOT_FOUND;
-       }
-       if ((io->t2open.in.open_func & 0xF) == OPENX_OPEN_FUNC_FAIL) {
-               if (!name->exists) return NT_STATUS_ACCESS_DENIED;
-               return NT_STATUS_OBJECT_NAME_COLLISION;
-       }
-
-       talloc_free(name);
-
-       return ntvfs_map_open(req, io, ntvfs);
+       return NT_STATUS_OK;
 }
 
 /*
@@ -721,20 +854,18 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
        uint32_t create_options;
        uint32_t share_access;
        uint32_t access_mask;
-
-       if (io->generic.level == RAW_OPEN_T2OPEN) {
-               return pvfs_open_t2open(ntvfs, req, io);
-       }
+       BOOL stream_existed;
 
        /* use the generic mapping code to avoid implementing all the
           different open calls. */
-       if (io->generic.level != RAW_OPEN_GENERIC) {
+       if (io->generic.level != RAW_OPEN_GENERIC &&
+           io->generic.level != RAW_OPEN_NTTRANS_CREATE) {
                return ntvfs_map_open(req, io, ntvfs);
        }
 
        /* resolve the cifs name to a posix name */
-       status = pvfs_resolve_name(pvfs, req, io->ntcreatex.in.fname,
-                                  PVFS_RESOLVE_NO_WILDCARD, &name);
+       status = pvfs_resolve_name(pvfs, req, io->ntcreatex.in.fname, 
+                                  PVFS_RESOLVE_STREAMS, &name);
        if (!NT_STATUS_IS_OK(status)) {
                return status;
        }
@@ -745,21 +876,17 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
                return pvfs_open_directory(pvfs, req, name, io);
        }
 
+       /* FILE_ATTRIBUTE_DIRECTORY is ignored if the above test for directory
+          open doesn't match */
+       io->generic.in.file_attr &= ~FILE_ATTRIBUTE_DIRECTORY;
+
        create_options = io->generic.in.create_options;
        share_access   = io->generic.in.share_access;
        access_mask    = io->generic.in.access_mask;
 
-       if (access_mask & SEC_RIGHT_MAXIMUM_ALLOWED) {
-               if (name->exists && (name->dos.attrib & FILE_ATTRIBUTE_READONLY)) {
-                       access_mask = GENERIC_RIGHTS_FILE_READ;
-               } else {
-                       access_mask = GENERIC_RIGHTS_FILE_READ | GENERIC_RIGHTS_FILE_WRITE;
-               }
-       }
-
        /* certain create options are not allowed */
        if ((create_options & NTCREATEX_OPTIONS_DELETE_ON_CLOSE) &&
-           !(access_mask & STD_RIGHT_DELETE_ACCESS)) {
+           !(access_mask & SEC_STD_DELETE)) {
                return NT_STATUS_INVALID_PARAMETER;
        }
 
@@ -773,21 +900,21 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
                break;
 
        case NTCREATEX_DISP_OPEN:
-               if (!name->exists) {
+               if (!name->stream_exists) {
                        return NT_STATUS_OBJECT_NAME_NOT_FOUND;
                }
                flags = 0;
                break;
 
        case NTCREATEX_DISP_OVERWRITE:
-               if (!name->exists) {
+               if (!name->stream_exists) {
                        return NT_STATUS_OBJECT_NAME_NOT_FOUND;
                }
                flags = O_TRUNC;
                break;
 
        case NTCREATEX_DISP_CREATE:
-               if (name->exists) {
+               if (name->stream_exists) {
                        return NT_STATUS_OBJECT_NAME_COLLISION;
                }
                flags = 0;
@@ -801,12 +928,6 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
                return NT_STATUS_INVALID_PARAMETER;
        }
 
-       if (access_mask & SA_RIGHT_FILE_WRITE_APPEND) {
-               flags |= O_RDWR;
-       } else {
-               flags |= O_RDONLY;
-       }
-
        /* handle creating a new file separately */
        if (!name->exists) {
                status = pvfs_create_file(pvfs, req, name, io);
@@ -820,8 +941,7 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
                }
 
                /* try re-resolving the name */
-               status = pvfs_resolve_name(pvfs, req, io->ntcreatex.in.fname,
-                                          PVFS_RESOLVE_NO_WILDCARD, &name);
+               status = pvfs_resolve_name(pvfs, req, io->ntcreatex.in.fname, 0, &name);
                if (!NT_STATUS_IS_OK(status)) {
                        return status;
                }
@@ -833,6 +953,12 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
                return NT_STATUS_CANNOT_DELETE;
        }
 
+       /* check the security descriptor */
+       status = pvfs_access_check(pvfs, req, name, &access_mask);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
        f = talloc_p(req, struct pvfs_file);
        if (f == NULL) {
                return NT_STATUS_NO_MEMORY;
@@ -865,18 +991,26 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
        f->handle->create_options    = io->generic.in.create_options;
        f->handle->seek_offset       = 0;
        f->handle->position          = 0;
+       f->handle->mode              = 0;
        f->handle->have_opendb_entry = False;
+       f->handle->sticky_write_time = False;
 
        /* form the lock context used for byte range locking and
           opendb locking */
-       status = pvfs_locking_key(name, f->handle, &f->handle->locking_key);
+       status = pvfs_locking_key(name, f->handle, &f->handle->odb_locking_key);
+       if (!NT_STATUS_IS_OK(status)) {
+               idr_remove(pvfs->idtree_fnum, f->fnum);
+               return status;
+       }
+
+       status = pvfs_brl_locking_key(name, f->handle, &f->handle->brl_locking_key);
        if (!NT_STATUS_IS_OK(status)) {
                idr_remove(pvfs->idtree_fnum, f->fnum);
                return status;
        }
 
        /* get a lock on this file before the actual open */
-       lck = odb_lock(req, pvfs->odb_context, &f->handle->locking_key);
+       lck = odb_lock(req, pvfs->odb_context, &f->handle->odb_locking_key);
        if (lck == NULL) {
                DEBUG(0,("pvfs_open: failed to lock file '%s' in opendb\n",
                         name->full_name));
@@ -895,7 +1029,7 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
 
 
        /* see if we are allowed to open at the same time as existing opens */
-       status = odb_open_file(lck, f->handle, 
+       status = odb_open_file(lck, f->handle, f->handle->name->stream_id,
                               share_access, create_options, access_mask);
 
        /* on a sharing violation we need to retry when the file is closed by 
@@ -912,6 +1046,12 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
 
        f->handle->have_opendb_entry = True;
 
+       if (access_mask & (SEC_FILE_WRITE_DATA | SEC_FILE_APPEND_DATA)) {
+               flags |= O_RDWR;
+       } else {
+               flags |= O_RDONLY;
+       }
+
        /* do the actual open */
        fd = open(f->handle->name->full_name, flags);
        if (fd == -1) {
@@ -921,6 +1061,17 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
 
        f->handle->fd = fd;
 
+       stream_existed = name->stream_exists;
+
+       /* if this was a stream create then create the stream as well */
+       if (!name->stream_exists) {
+               status = pvfs_stream_create(pvfs, f->handle->name, fd);
+               if (!NT_STATUS_IS_OK(status)) {
+                       talloc_free(lck);
+                       return status;
+               }
+       }
+
        /* re-resolve the open fd */
        status = pvfs_resolve_name_fd(f->pvfs, fd, f->handle->name);
        if (!NT_STATUS_IS_OK(status)) {
@@ -928,14 +1079,15 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
                return status;
        }
 
-       if (io->generic.in.open_disposition == NTCREATEX_DISP_OVERWRITE ||
-           io->generic.in.open_disposition == NTCREATEX_DISP_OVERWRITE_IF) {
+       if (f->handle->name->stream_id == 0 &&
+           (io->generic.in.open_disposition == NTCREATEX_DISP_OVERWRITE ||
+            io->generic.in.open_disposition == NTCREATEX_DISP_OVERWRITE_IF)) {
                /* for overwrite we need to replace file permissions */
                uint32_t attrib = io->ntcreatex.in.file_attr | FILE_ATTRIBUTE_ARCHIVE;
                mode_t mode = pvfs_fileperms(pvfs, attrib);
                if (fchmod(fd, mode) == -1) {
                        talloc_free(lck);
-                       return map_nt_error_from_unix(errno);
+                       return pvfs_map_errno(pvfs, errno);
                }
                name->dos.attrib = attrib;
                status = pvfs_dosattrib_save(pvfs, name, fd);
@@ -947,9 +1099,14 @@ NTSTATUS pvfs_open(struct ntvfs_module_context *ntvfs,
            
        talloc_free(lck);
 
-       io->generic.out.oplock_level  = NO_OPLOCK;
+       if (pvfs->flags & PVFS_FLAG_FAKE_OPLOCKS) {
+               io->generic.out.oplock_level  = OPLOCK_EXCLUSIVE;
+       } else {
+               io->generic.out.oplock_level  = OPLOCK_NONE;
+       }
        io->generic.out.fnum          = f->fnum;
-       io->generic.out.create_action = NTCREATEX_ACTION_EXISTED;
+       io->generic.out.create_action = stream_existed?
+               NTCREATEX_ACTION_EXISTED:NTCREATEX_ACTION_CREATED;
        io->generic.out.create_time   = name->dos.create_time;
        io->generic.out.access_time   = name->dos.access_time;
        io->generic.out.write_time    = name->dos.write_time;
@@ -995,8 +1152,12 @@ NTSTATUS pvfs_close(struct ntvfs_module_context *ntvfs,
                unix_times.actime = 0;
                unix_times.modtime = io->close.in.write_time;
                utime(f->handle->name->full_name, &unix_times);
+       } else if (f->handle->sticky_write_time) {
+               unix_times.actime = 0;
+               unix_times.modtime = nt_time_to_unix(f->handle->name->dos.write_time);
+               utime(f->handle->name->full_name, &unix_times);
        }
-       
+
        talloc_free(f);
 
        return NT_STATUS_OK;
@@ -1062,7 +1223,7 @@ NTSTATUS pvfs_change_create_options(struct pvfs_state *pvfs,
                return NT_STATUS_CANNOT_DELETE;
        }
 
-       lck = odb_lock(req, pvfs->odb_context, &f->handle->locking_key);
+       lck = odb_lock(req, pvfs->odb_context, &f->handle->odb_locking_key);
        if (lck == NULL) {
                return NT_STATUS_INTERNAL_DB_CORRUPTION;
        }
@@ -1080,7 +1241,9 @@ NTSTATUS pvfs_change_create_options(struct pvfs_state *pvfs,
   determine if a file can be deleted, or if it is prevented by an
   already open file
 */
-NTSTATUS pvfs_can_delete(struct pvfs_state *pvfs, struct pvfs_filename *name)
+NTSTATUS pvfs_can_delete(struct pvfs_state *pvfs, 
+                        struct smbsrv_request *req,
+                        struct pvfs_filename *name)
 {
        NTSTATUS status;
        DATA_BLOB key;
@@ -1095,7 +1258,11 @@ NTSTATUS pvfs_can_delete(struct pvfs_state *pvfs, struct pvfs_filename *name)
                              NTCREATEX_SHARE_ACCESS_WRITE | 
                              NTCREATEX_SHARE_ACCESS_DELETE, 
                              NTCREATEX_OPTIONS_DELETE_ON_CLOSE, 
-                             STD_RIGHT_DELETE_ACCESS);
+                             SEC_STD_DELETE);
+
+       if (NT_STATUS_IS_OK(status)) {
+               status = pvfs_access_check_simple(pvfs, req, name, SEC_STD_DELETE);
+       }
 
        return status;
 }
@@ -1116,10 +1283,9 @@ NTSTATUS pvfs_can_rename(struct pvfs_state *pvfs, struct pvfs_filename *name)
 
        status = odb_can_open(pvfs->odb_context, &key, 
                              NTCREATEX_SHARE_ACCESS_READ |
-                             NTCREATEX_SHARE_ACCESS_WRITE | 
-                             NTCREATEX_SHARE_ACCESS_DELETE, 
+                             NTCREATEX_SHARE_ACCESS_WRITE,
                              0,
-                             STD_RIGHT_DELETE_ACCESS);
+                             SEC_STD_DELETE);
 
        return status;
 }