Change check_path_syntax() to use the new next_mb_char_size() function
[ira/wip.git] / source3 / smbd / reply.c
index 9577375475d8074852a636e8310c317362bda633..0fe73cddc28f6e08a795baef25c643799b82ede3 100644 (file)
@@ -3,6 +3,7 @@
    Main SMB reply routines
    Copyright (C) Andrew Tridgell 1992-1998
    Copyright (C) Andrew Bartlett      2001
+   Copyright (C) Jeremy Allison 1992-2004.
 
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
@@ -39,18 +40,119 @@ unsigned int smb_echo_count = 0;
 extern BOOL global_encrypted_passwords_negotiated;
 
 /****************************************************************************
- Ensure we check the path in the same way as W2K.
+ Ensure we check the path in *exactly* the same way as W2K.
+ We're assuming here that '/' is not the second byte in any multibyte char
+ set (a safe assumption). '\\' *may* be the second byte in a multibyte char
+ set.
 ****************************************************************************/
 
-static NTSTATUS check_path_syntax(const char *name)
+NTSTATUS check_path_syntax(pstring destname, const pstring srcname)
 {
-       while (*name == '\\')
-               name++;
-       if (strequal(name, "."))
-               return NT_STATUS_OBJECT_NAME_INVALID;
-       else if (strequal(name, ".."))
-               return NT_STATUS_OBJECT_PATH_SYNTAX_BAD;
-       return NT_STATUS_OK;
+       char *d = destname;
+       const char *s = srcname;
+       NTSTATUS ret = NT_STATUS_OK;
+
+       while (*s) {
+               if (IS_DIRECTORY_SEP(*s)) {
+                       /*
+                        * Safe to assume is not the second part of a mb char as this is handled below.
+                        */
+                       /* Eat multiple '/' or '\\' */
+                       while (IS_DIRECTORY_SEP(*s)) {
+                               s++;
+                       }
+                       if ((d != destname) && (*s != '\0')) {
+                               /* We only care about non-leading or trailing '/' or '\\' */
+                               *d++ = '/';
+                       }
+               } else if ((s[0] == '.') && (s[1] == '.') && (IS_DIRECTORY_SEP(s[2]) || s[2] == '\0')) {
+                       /* Uh oh - "../" or "..\\"  or "..\0" ! */
+
+                       /*
+                        * No mb char starts with '.' so we're safe checking the directory separator here.
+                        */
+
+                       /* If we just added a '/', delete it. */
+
+                       if ((d > destname) && (*(d-1) == '/')) {
+                               *(d-1) = '\0';
+                               if (d == (destname + 1)) {
+                                       d--;
+                               } else {
+                                       d -= 2;
+                               }
+                       }
+                       /* Are we at the start ? Can't go back further if so. */
+                       if (d == destname) {
+                               return NT_STATUS_OBJECT_PATH_SYNTAX_BAD;
+                       }
+                       /* Go back one level... */
+                       /* We know this is safe as '/' cannot be part of a mb sequence. */
+                       /* NOTE - if this assumption is invalid we are not in good shape... */
+                       while (d > destname) {
+                               if (*d == '/')
+                                       break;
+                               d--;
+                       }
+                       s += 3;
+               } else if ((s[0] == '.') && IS_DIRECTORY_SEP(s[1])) {
+
+                       /*
+                        * No mb char starts with '.' so we're safe checking the directory separator here.
+                        */
+
+                       /* "./" or ".\\" fails with a different error depending on where it is... */
+
+                       if (s == srcname) {
+                               ret = NT_STATUS_OBJECT_NAME_INVALID;
+                       } else {
+                               if (s[2] == '\0') {
+                                       return NT_STATUS_INVALID_PARAMETER;
+                               }
+                               ret = NT_STATUS_OBJECT_PATH_NOT_FOUND;
+                       }
+                       s++;
+               } else {
+                       switch(next_mb_char_size(s)) {
+                               case 4:
+                                       *d++ = *s++;
+                               case 3:
+                                       *d++ = *s++;
+                               case 2:
+                                       *d++ = *s++;
+                               case 1:
+                                       *d++ = *s++;
+                                       break;
+                               default:
+                                       DEBUG(0,("check_path_syntax: character length assumptions invalid !\n"));
+                                       return NT_STATUS_INVALID_PARAMETER;
+                       }
+               }
+       }
+       *d = '\0';
+       return ret;
+}
+
+/****************************************************************************
+ Pull a string and check the path - provide for error return.
+****************************************************************************/
+
+size_t srvstr_get_path(char *inbuf, char *dest, const char *src, size_t dest_len, size_t src_len, int flags, NTSTATUS *err)
+{
+       pstring tmppath;
+       char *tmppath_ptr = tmppath;
+       size_t ret;
+#ifdef DEVELOPER
+       SMB_ASSERT(dest_len == sizeof(pstring));
+#endif
+
+       if (src_len == 0) {
+               ret = srvstr_pull_buf( inbuf, tmppath_ptr, src, dest_len, flags);
+       } else {
+               ret = srvstr_pull( inbuf, tmppath_ptr, src, dest_len, src_len, flags);
+       }
+       *err = check_path_syntax(dest, tmppath);
+       return ret;
 }
 
 /****************************************************************************
@@ -62,7 +164,7 @@ int reply_special(char *inbuf,char *outbuf)
        int outsize = 4;
        int msg_type = CVAL(inbuf,0);
        int msg_flags = CVAL(inbuf,1);
-       pstring name1,name2;
+       fstring name1,name2;
        char name_type = 0;
        
        static BOOL already_got_session = False;
@@ -348,7 +450,6 @@ int reply_ioctl(connection_struct *conn,
        uint32 ioctl_code = (device << 16) + function;
        int replysize, outsize;
        char *p;
-       files_struct *fsp = file_fsp(inbuf,smb_vwv0);
        START_PROFILE(SMBioctl);
 
        DEBUG(4, ("Received IOCTL (code 0x%x)\n", ioctl_code));
@@ -371,6 +472,11 @@ int reply_ioctl(connection_struct *conn,
        switch (ioctl_code) {
                case IOCTL_QUERY_JOB_INFO:                  
                {
+                       files_struct *fsp = file_fsp(inbuf,smb_vwv0);
+                       if (!fsp) {
+                               END_PROFILE(SMBioctl);
+                               return(UNIXERROR(ERRDOS,ERRbadfid));
+                       }
                        SSVAL(p,0,fsp->rap_print_jobid);             /* Job number */
                        srvstr_push(outbuf, p+2, global_myname(), 15, STR_TERMINATE|STR_ASCII);
                        srvstr_push(outbuf, p+18, lp_servicename(SNUM(conn)), 13, STR_TERMINATE|STR_ASCII);
@@ -398,11 +504,11 @@ int reply_chkpth(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
 
        START_PROFILE(SMBchkpth);
 
-       srvstr_pull_buf(inbuf, name, smb_buf(inbuf) + 1, sizeof(name), STR_TERMINATE);
-
-       status = check_path_syntax(name);
-       if (!NT_STATUS_IS_OK(status))
+       srvstr_get_path(inbuf, name, smb_buf(inbuf) + 1, sizeof(name), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBchkpth);
                return ERROR_NT(status);
+       }
 
        RESOLVE_DFSPATH(name, conn, inbuf, outbuf);
 
@@ -412,8 +518,10 @@ int reply_chkpth(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
 
        if (check_name(name,conn)) {
                if (VALID_STAT(sbuf) || SMB_VFS_STAT(conn,name,&sbuf) == 0)
-                       if (!(ok = S_ISDIR(sbuf.st_mode)))
-                               errno = ENOTDIR;
+                       if (!(ok = S_ISDIR(sbuf.st_mode))) {
+                               END_PROFILE(SMBchkpth);
+                               return ERROR_BOTH(NT_STATUS_NOT_A_DIRECTORY,ERRDOS,ERRbadpath);
+                       }
        }
 
        if (!ok) {
@@ -431,13 +539,18 @@ int reply_chkpth(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
                         * if the path is invalid.
                         */
                        if (bad_path) {
+                               END_PROFILE(SMBchkpth);
                                return ERROR_NT(NT_STATUS_OBJECT_PATH_NOT_FOUND);
                        } else {
+                               END_PROFILE(SMBchkpth);
                                return ERROR_NT(NT_STATUS_OBJECT_NAME_NOT_FOUND);
                        }
-               } else if (errno == ENOTDIR)
+               } else if (errno == ENOTDIR) {
+                       END_PROFILE(SMBchkpth);
                        return ERROR_NT(NT_STATUS_NOT_A_DIRECTORY);
+               }
 
+               END_PROFILE(SMBchkpth);
                return(UNIXERROR(ERRDOS,ERRbadpath));
        }
 
@@ -464,10 +577,16 @@ int reply_getatr(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
        time_t mtime=0;
        BOOL bad_path = False;
        char *p;
+       NTSTATUS status;
+
        START_PROFILE(SMBgetatr);
 
        p = smb_buf(inbuf) + 1;
-       p += srvstr_pull_buf(inbuf, fname, p, sizeof(fname), STR_TERMINATE);
+       p += srvstr_get_path(inbuf, fname, p, sizeof(fname), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBgetatr);
+               return ERROR_NT(status);
+       }
 
        RESOLVE_DFSPATH(fname, conn, inbuf, outbuf);
   
@@ -533,11 +652,17 @@ int reply_setatr(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
        SMB_STRUCT_STAT sbuf;
        BOOL bad_path = False;
        char *p;
+       NTSTATUS status;
 
        START_PROFILE(SMBsetatr);
 
        p = smb_buf(inbuf) + 1;
-       p += srvstr_pull_buf(inbuf, fname, p, sizeof(fname), STR_TERMINATE);
+       p += srvstr_get_path(inbuf, fname, p, sizeof(fname), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBsetatr);
+               return ERROR_NT(status);
+       }
+
        unix_convert(fname,conn,0,&bad_path,&sbuf);
 
        mode = SVAL(inbuf,smb_vwv0);
@@ -634,10 +759,9 @@ int reply_search(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
        time_t date;
        int dirtype;
        int outsize = 0;
-       int numentries = 0;
+       unsigned int numentries = 0;
+       unsigned int maxentries = 0;
        BOOL finished = False;
-       int maxentries;
-       int i;
        char *p;
        BOOL ok = False;
        int status_len;
@@ -648,6 +772,7 @@ int reply_search(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
        BOOL expect_close = False;
        BOOL can_open = True;
        BOOL bad_path = False;
+       NTSTATUS nt_status;
        START_PROFILE(SMBsearch);
 
        *mask = *directory = *fname = 0;
@@ -660,7 +785,11 @@ int reply_search(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
        maxentries = SVAL(inbuf,smb_vwv0); 
        dirtype = SVAL(inbuf,smb_vwv1);
        p = smb_buf(inbuf) + 1;
-       p += srvstr_pull_buf(inbuf, path, p, sizeof(path), STR_TERMINATE);
+       p += srvstr_get_path(inbuf, path, p, sizeof(path), 0, STR_TERMINATE, &nt_status);
+       if (!NT_STATUS_IS_OK(nt_status)) {
+               END_PROFILE(SMBsearch);
+               return ERROR_NT(nt_status);
+       }
        p++;
        status_len = SVAL(p, 0);
        p += 2;
@@ -746,6 +875,9 @@ int reply_search(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
                                        numentries = 0;
                                p += DIR_STRUCT_SIZE;
                        } else {
+                               unsigned int i;
+                               maxentries = MIN(maxentries, ((BUFFER_SIZE - (p - outbuf))/DIR_STRUCT_SIZE));
+
                                DEBUG(8,("dirpath=<%s> dontdescend=<%s>\n",
                                conn->dirpath,lp_dontdescend(SNUM(conn))));
                                if (in_list(conn->dirpath, lp_dontdescend(SNUM(conn)),True))
@@ -805,7 +937,7 @@ int reply_search(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
        if ((! *directory) && dptr_path(dptr_num))
                slprintf(directory, sizeof(directory)-1, "(%s)",dptr_path(dptr_num));
 
-       DEBUG( 4, ( "%s mask=%s path=%s dtype=%d nument=%d of %d\n",
+       DEBUG( 4, ( "%s mask=%s path=%s dtype=%d nument=%u of %u\n",
                smb_fn_name(CVAL(inbuf,smb_com)), 
                mask, directory, dirtype, numentries, maxentries ) );
 
@@ -825,12 +957,17 @@ int reply_fclose(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
        char status[21];
        int dptr_num= -2;
        char *p;
+       NTSTATUS err;
 
        START_PROFILE(SMBfclose);
 
        outsize = set_message(outbuf,1,0,True);
        p = smb_buf(inbuf) + 1;
-       p += srvstr_pull_buf(inbuf, path, p, sizeof(path), STR_TERMINATE);
+       p += srvstr_get_path(inbuf, path, p, sizeof(path), 0, STR_TERMINATE, &err);
+       if (!NT_STATUS_IS_OK(err)) {
+               END_PROFILE(SMBfclose);
+               return ERROR_NT(err);
+       }
        p++;
        status_len = SVAL(p,0);
        p += 2;
@@ -873,11 +1010,16 @@ int reply_open(connection_struct *conn, char *inbuf,char *outbuf, int dum_size,
        BOOL bad_path = False;
        files_struct *fsp;
        int oplock_request = CORE_OPLOCK_REQUEST(inbuf);
+       NTSTATUS status;
        START_PROFILE(SMBopen);
  
        share_mode = SVAL(inbuf,smb_vwv0);
 
-       srvstr_pull_buf(inbuf, fname, smb_buf(inbuf)+1, sizeof(fname), STR_TERMINATE);
+       srvstr_get_path(inbuf, fname, smb_buf(inbuf)+1, sizeof(fname), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBopen);
+               return ERROR_NT(status);
+       }
 
        RESOLVE_DFSPATH(fname, conn, inbuf, outbuf);
 
@@ -950,6 +1092,7 @@ int reply_open_and_X(connection_struct *conn, char *inbuf,char *outbuf,int lengt
        int smb_action = 0;
        BOOL bad_path = False;
        files_struct *fsp;
+       NTSTATUS status;
        START_PROFILE(SMBopenX);
 
        /* If it's an IPC, pass off the pipe handler. */
@@ -964,7 +1107,11 @@ int reply_open_and_X(connection_struct *conn, char *inbuf,char *outbuf,int lengt
        }
 
        /* XXXX we need to handle passed times, sattr and flags */
-       srvstr_pull_buf(inbuf, fname, smb_buf(inbuf), sizeof(fname), STR_TERMINATE);
+       srvstr_get_path(inbuf, fname, smb_buf(inbuf), sizeof(fname), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBopenX);
+               return ERROR_NT(status);
+       }
 
        RESOLVE_DFSPATH(fname, conn, inbuf, outbuf);
 
@@ -1070,12 +1217,17 @@ int reply_mknew(connection_struct *conn, char *inbuf,char *outbuf, int dum_size,
        files_struct *fsp;
        int oplock_request = CORE_OPLOCK_REQUEST(inbuf);
        SMB_STRUCT_STAT sbuf;
+       NTSTATUS status;
        START_PROFILE(SMBcreate);
  
        com = SVAL(inbuf,smb_com);
 
        createmode = SVAL(inbuf,smb_vwv0);
-       srvstr_pull_buf(inbuf, fname, smb_buf(inbuf) + 1, sizeof(fname), STR_TERMINATE);
+       srvstr_get_path(inbuf, fname, smb_buf(inbuf) + 1, sizeof(fname), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBcreate);
+               return ERROR_NT(status);
+       }
 
        RESOLVE_DFSPATH(fname, conn, inbuf, outbuf);
 
@@ -1135,11 +1287,16 @@ int reply_ctemp(connection_struct *conn, char *inbuf,char *outbuf, int dum_size,
        int tmpfd;
        SMB_STRUCT_STAT sbuf;
        char *p, *s;
+       NTSTATUS status;
 
        START_PROFILE(SMBctemp);
 
        createmode = SVAL(inbuf,smb_vwv0);
-       srvstr_pull_buf(inbuf, fname, smb_buf(inbuf)+1, sizeof(fname), STR_TERMINATE);
+       srvstr_get_path(inbuf, fname, smb_buf(inbuf)+1, sizeof(fname), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBctemp);
+               return ERROR_NT(status);
+       }
        pstrcat(fname,"\\TMXXXXXX");
 
        RESOLVE_DFSPATH(fname, conn, inbuf, outbuf);
@@ -1231,6 +1388,7 @@ static NTSTATUS can_rename(char *fname,connection_struct *conn, SMB_STRUCT_STAT
                        ret = NT_STATUS_SHARING_VIOLATION;
                unix_ERR_class = 0;
                unix_ERR_code = 0;
+               unix_ERR_ntstatus = NT_STATUS_OK;
                return ret;
        }
        close_file(fsp,False);
@@ -1241,7 +1399,7 @@ static NTSTATUS can_rename(char *fname,connection_struct *conn, SMB_STRUCT_STAT
  Check if a user is allowed to delete a file.
 ********************************************************************/
 
-static NTSTATUS can_delete(char *fname,connection_struct *conn, int dirtype)
+static NTSTATUS can_delete(char *fname,connection_struct *conn, int dirtype, BOOL bad_path)
 {
        SMB_STRUCT_STAT sbuf;
        int fmode;
@@ -1255,8 +1413,15 @@ static NTSTATUS can_delete(char *fname,connection_struct *conn, int dirtype)
        if (!CAN_WRITE(conn))
                return NT_STATUS_MEDIA_WRITE_PROTECTED;
 
-       if (SMB_VFS_LSTAT(conn,fname,&sbuf) != 0)
-               return NT_STATUS_OBJECT_NAME_NOT_FOUND;
+       if (SMB_VFS_LSTAT(conn,fname,&sbuf) != 0) {
+               if(errno == ENOENT) {
+                       if (bad_path)
+                               return NT_STATUS_OBJECT_PATH_NOT_FOUND;
+                       else
+                               return NT_STATUS_OBJECT_NAME_NOT_FOUND;
+               }
+               return map_nt_error_from_unix(errno);
+       }
 
        fmode = dos_mode(conn,fname,&sbuf);
 
@@ -1353,7 +1518,7 @@ NTSTATUS unlink_internals(connection_struct *conn, int dirtype, char *name)
        if (!has_wild) {
                pstrcat(directory,"/");
                pstrcat(directory,mask);
-               error = can_delete(directory,conn,dirtype);
+               error = can_delete(directory,conn,dirtype,bad_path);
                if (!NT_STATUS_IS_OK(error))
                        return error;
 
@@ -1380,13 +1545,30 @@ NTSTATUS unlink_internals(connection_struct *conn, int dirtype, char *name)
 
                        while ((dname = ReadDirName(dirptr))) {
                                pstring fname;
+                               BOOL sys_direntry = False;
                                pstrcpy(fname,dname);
-                               
+
+                               /* Quick check for "." and ".." */
+                               if (fname[0] == '.') {
+                                       if (!fname[1] || (fname[1] == '.' && !fname[2])) {
+                                               if ((dirtype & aDIR)) {
+                                                       sys_direntry = True;
+                                               } else {
+                                                       continue;
+                                               }
+                                       }
+                               }
+
                                if(!mask_match(fname, mask, case_sensitive))
                                        continue;
                                
+                               if (sys_direntry) {
+                                       error = NT_STATUS_OBJECT_NAME_INVALID;
+                                       continue;
+                               }
+
                                slprintf(fname,sizeof(fname)-1, "%s/%s",directory,dname);
-                               error = can_delete(fname,conn,dirtype);
+                               error = can_delete(fname,conn,dirtype,bad_path);
                                if (!NT_STATUS_IS_OK(error))
                                        continue;
                                if (SMB_VFS_UNLINK(conn,fname) == 0)
@@ -1419,12 +1601,12 @@ int reply_unlink(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
        
        dirtype = SVAL(inbuf,smb_vwv0);
        
-       srvstr_pull_buf(inbuf, name, smb_buf(inbuf) + 1, sizeof(name), STR_TERMINATE);
-       
-       status = check_path_syntax(name);
-       if (!NT_STATUS_IS_OK(status))
+       srvstr_get_path(inbuf, name, smb_buf(inbuf) + 1, sizeof(name), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBunlink);
                return ERROR_NT(status);
-
+       }
+       
        RESOLVE_DFSPATH(name, conn, inbuf, outbuf);
        
        DEBUG(3,("reply_unlink : %s\n",name));
@@ -1501,8 +1683,13 @@ void send_file_readbraw(connection_struct *conn, files_struct *fsp, SMB_OFF_T st
 
        if (nread > 0) {
                ret = read_file(fsp,outbuf+4,startpos,nread);
+#if 0 /* mincount appears to be ignored in a W2K server. JRA. */
                if (ret < mincount)
                        ret = 0;
+#else
+               if (ret < nread)
+                       ret = 0;
+#endif
        }
 
        _smb_setlen(outbuf,ret);
@@ -1602,7 +1789,6 @@ int reply_readbraw(connection_struct *conn, char *inbuf, char *outbuf, int dum_s
 
        /* ensure we don't overrun the packet size */
        maxcount = MIN(65535,maxcount);
-       maxcount = MAX(mincount,maxcount);
 
        if (!is_locked(fsp,conn,(SMB_BIG_UINT)maxcount,(SMB_BIG_UINT)startpos, READ_LOCK,False)) {
                SMB_OFF_T size = fsp->size;
@@ -1622,8 +1808,10 @@ int reply_readbraw(connection_struct *conn, char *inbuf, char *outbuf, int dum_s
                        nread = MIN(maxcount,(size - startpos));          
        }
 
+#if 0 /* mincount appears to be ignored in a W2K server. JRA. */
        if (nread < mincount)
                nread = 0;
+#endif
   
        DEBUG( 3, ( "readbraw fnum=%d start=%.0f max=%d min=%d nread=%d\n", fsp->fnum, (double)startpos,
                                (int)maxcount, (int)mincount, (int)nread ) );
@@ -1648,6 +1836,7 @@ int reply_lockread(connection_struct *conn, char *inbuf,char *outbuf, int length
        size_t numtoread;
        NTSTATUS status;
        files_struct *fsp = file_fsp(inbuf,smb_vwv0);
+       BOOL my_lock_ctx = False;
        START_PROFILE(SMBlockread);
 
        CHECK_FSP(fsp,conn);
@@ -1667,13 +1856,21 @@ int reply_lockread(connection_struct *conn, char *inbuf,char *outbuf, int length
         * protocol request that predates the read/write lock concept. 
         * Thus instead of asking for a read lock here we need to ask
         * for a write lock. JRA.
+        * Note that the requested lock size is unaffected by max_recv.
         */
        
        status = do_lock_spin(fsp, conn, SVAL(inbuf,smb_pid), 
-                        (SMB_BIG_UINT)numtoread, (SMB_BIG_UINT)startpos, WRITE_LOCK);
+                        (SMB_BIG_UINT)numtoread, (SMB_BIG_UINT)startpos, WRITE_LOCK, &my_lock_ctx);
 
        if (NT_STATUS_V(status)) {
-               if (lp_blocking_locks(SNUM(conn)) && ERROR_WAS_LOCK_DENIED(status)) {
+#if 0
+               /*
+                * We used to make lockread a blocking lock. It turns out
+                * that this isn't on W2k. Found by the Samba 4 RAW-READ torture
+                * tester. JRA.
+                */
+
+               if (lp_blocking_locks(SNUM(conn)) && !my_lock_ctx && ERROR_WAS_LOCK_DENIED(status)) {
                        /*
                         * A blocking lock was requested. Package up
                         * this smb into a queued request and push it
@@ -1685,10 +1882,21 @@ int reply_lockread(connection_struct *conn, char *inbuf,char *outbuf, int length
                                return -1;
                        }
                }
+#endif
                END_PROFILE(SMBlockread);
                return ERROR_NT(status);
        }
 
+       /*
+        * However the requested READ size IS affected by max_recv. Insanity.... JRA.
+        */
+
+       if (numtoread > max_recv) {
+               DEBUG(0,("reply_lockread: requested read size (%u) is greater than maximum allowed (%u). \
+Returning short read of maximum allowed for compatibility with Windows 2000.\n",
+                       (unsigned int)numtoread, (unsigned int)max_recv ));
+               numtoread = MIN(numtoread,max_recv);
+       }
        nread = read_file(fsp,data,startpos,numtoread);
 
        if (nread < 0) {
@@ -1730,6 +1938,16 @@ int reply_read(connection_struct *conn, char *inbuf,char *outbuf, int size, int
 
        outsize = set_message(outbuf,5,3,True);
        numtoread = MIN(BUFFER_SIZE-outsize,numtoread);
+       /*
+        * The requested read size cannot be greater than max_recv. JRA.
+        */
+       if (numtoread > max_recv) {
+               DEBUG(0,("reply_read: requested read size (%u) is greater than maximum allowed (%u). \
+Returning short read of maximum allowed for compatibility with Windows 2000.\n",
+                       (unsigned int)numtoread, (unsigned int)max_recv ));
+               numtoread = MIN(numtoread,max_recv);
+       }
+
        data = smb_buf(outbuf) + 3;
   
        if (is_locked(fsp,conn,(SMB_BIG_UINT)numtoread,(SMB_BIG_UINT)startpos, READ_LOCK,False)) {
@@ -1797,6 +2015,7 @@ int send_file_readX(connection_struct *conn, char *inbuf,char *outbuf,int length
                 * correct amount of data).
                 */
 
+               SSVAL(outbuf,smb_vwv2,0xFFFF); /* Remaining - must be -1. */
                SSVAL(outbuf,smb_vwv5,smb_maxcnt);
                SSVAL(outbuf,smb_vwv6,smb_offset(data,outbuf));
                SSVAL(smb_buf(outbuf),-2,smb_maxcnt);
@@ -1835,6 +2054,7 @@ int send_file_readX(connection_struct *conn, char *inbuf,char *outbuf,int length
                return(UNIXERROR(ERRDOS,ERRnoaccess));
        }
 
+       SSVAL(outbuf,smb_vwv2,0xFFFF); /* Remaining - must be -1. */
        SSVAL(outbuf,smb_vwv5,nread);
        SSVAL(outbuf,smb_vwv6,smb_offset(data,outbuf));
        SSVAL(smb_buf(outbuf),-2,nread);
@@ -1927,7 +2147,7 @@ int reply_writebraw(connection_struct *conn, char *inbuf,char *outbuf, int size,
        START_PROFILE(SMBwritebraw);
 
        if (srv_is_signing_active()) {
-               exit_server("reply_readbraw: SMB signing is active - raw reads/writes are disallowed.");
+               exit_server("reply_writebraw: SMB signing is active - raw reads/writes are disallowed.");
        }
 
        CHECK_FSP(fsp,conn);
@@ -2055,7 +2275,7 @@ int reply_writeunlock(connection_struct *conn, char *inbuf,char *outbuf,
        size_t numtowrite;
        SMB_OFF_T startpos;
        char *data;
-       NTSTATUS status;
+       NTSTATUS status = NT_STATUS_OK;
        files_struct *fsp = file_fsp(inbuf,smb_vwv0);
        int outsize = 0;
        START_PROFILE(SMBwriteunlock);
@@ -2067,7 +2287,7 @@ int reply_writeunlock(connection_struct *conn, char *inbuf,char *outbuf,
        startpos = IVAL_TO_SMB_OFF_T(inbuf,smb_vwv2);
        data = smb_buf(inbuf) + 3;
   
-       if (is_locked(fsp,conn,(SMB_BIG_UINT)numtowrite,(SMB_BIG_UINT)startpos, 
+       if (numtowrite && is_locked(fsp,conn,(SMB_BIG_UINT)numtowrite,(SMB_BIG_UINT)startpos, 
                      WRITE_LOCK,False)) {
                END_PROFILE(SMBwriteunlock);
                return ERROR_DOS(ERRDOS,ERRlock);
@@ -2089,11 +2309,13 @@ int reply_writeunlock(connection_struct *conn, char *inbuf,char *outbuf,
                return(UNIXERROR(ERRHRD,ERRdiskfull));
        }
 
-       status = do_unlock(fsp, conn, SVAL(inbuf,smb_pid), (SMB_BIG_UINT)numtowrite, 
-                          (SMB_BIG_UINT)startpos);
-       if (NT_STATUS_V(status)) {
-               END_PROFILE(SMBwriteunlock);
-               return ERROR_NT(status);
+       if (numtowrite) {
+               status = do_unlock(fsp, conn, SVAL(inbuf,smb_pid), (SMB_BIG_UINT)numtowrite, 
+                                  (SMB_BIG_UINT)startpos);
+               if (NT_STATUS_V(status)) {
+                       END_PROFILE(SMBwriteunlock);
+                       return ERROR_NT(status);
+               }
        }
        
        outsize = set_message(outbuf,1,0,True);
@@ -2394,6 +2616,9 @@ int reply_exit(connection_struct *conn,
 {
        int outsize;
        START_PROFILE(SMBexit);
+
+       file_close_pid(SVAL(inbuf,smb_pid));
+
        outsize = set_message(outbuf,0,0,True);
 
        DEBUG(3,("exit\n"));
@@ -2513,7 +2738,7 @@ int reply_writeclose(connection_struct *conn,
        mtime = make_unix_date3(inbuf+smb_vwv4);
        data = smb_buf(inbuf) + 1;
   
-       if (is_locked(fsp,conn,(SMB_BIG_UINT)numtowrite,(SMB_BIG_UINT)startpos, WRITE_LOCK,False)) {
+       if (numtowrite && is_locked(fsp,conn,(SMB_BIG_UINT)numtowrite,(SMB_BIG_UINT)startpos, WRITE_LOCK,False)) {
                END_PROFILE(SMBwriteclose);
                return ERROR_DOS(ERRDOS,ERRlock);
        }
@@ -2522,7 +2747,16 @@ int reply_writeclose(connection_struct *conn,
 
        set_filetime(conn, fsp->fsp_name,mtime);
   
-       close_err = close_file(fsp,True);
+       /*
+        * More insanity. W2K only closes the file if writelen > 0.
+        * JRA.
+        */
+
+       if (numtowrite) {
+               DEBUG(3,("reply_writeclose: zero length write doesn't close file %s\n",
+                       fsp->fsp_name ));
+               close_err = close_file(fsp,True);
+       }
 
        DEBUG(3,("writeclose fnum=%d num=%d wrote=%d (numopen=%d)\n",
                 fsp->fnum, (int)numtowrite, (int)nwritten,
@@ -2557,6 +2791,8 @@ int reply_lock(connection_struct *conn,
        SMB_BIG_UINT count,offset;
        NTSTATUS status;
        files_struct *fsp = file_fsp(inbuf,smb_vwv0);
+       BOOL my_lock_ctx = False;
+
        START_PROFILE(SMBlock);
 
        CHECK_FSP(fsp,conn);
@@ -2569,9 +2805,11 @@ int reply_lock(connection_struct *conn,
        DEBUG(3,("lock fd=%d fnum=%d offset=%.0f count=%.0f\n",
                 fsp->fd, fsp->fnum, (double)offset, (double)count));
 
-       status = do_lock_spin(fsp, conn, SVAL(inbuf,smb_pid), count, offset, WRITE_LOCK);
+       status = do_lock_spin(fsp, conn, SVAL(inbuf,smb_pid), count, offset, WRITE_LOCK, &my_lock_ctx);
        if (NT_STATUS_V(status)) {
-               if (lp_blocking_locks(SNUM(conn)) && ERROR_WAS_LOCK_DENIED(status)) {
+#if 0
+               /* Tests using Samba4 against W2K show this call never creates a blocking lock. */
+               if (lp_blocking_locks(SNUM(conn)) && !my_lock_ctx && ERROR_WAS_LOCK_DENIED(status)) {
                        /*
                         * A blocking lock was requested. Package up
                         * this smb into a queued request and push it
@@ -2582,6 +2820,7 @@ int reply_lock(connection_struct *conn,
                                return -1;
                        }
                }
+#endif
                END_PROFILE(SMBlock);
                return ERROR_NT(status);
        }
@@ -2661,7 +2900,11 @@ int reply_echo(connection_struct *conn,
        int outsize = set_message(outbuf,1,data_len,True);
        START_PROFILE(SMBecho);
 
-       data_len = MIN(data_len, (sizeof(inbuf)-(smb_buf(inbuf)-inbuf)));
+       if (data_len > BUFFER_SIZE) {
+               DEBUG(0,("reply_echo: data_len too large.\n"));
+               END_PROFILE(SMBecho);
+               return -1;
+       }
 
        /* copy any incoming data back out */
        if (data_len > 0)
@@ -2876,6 +3119,10 @@ NTSTATUS mkdir_internal(connection_struct *conn, pstring directory)
        
        unix_convert(directory,conn,0,&bad_path,&sbuf);
 
+       if( strchr_m(directory, ':')) {
+               return NT_STATUS_NOT_A_DIRECTORY;
+       }
+
        if (ms_has_wild(directory)) {
                return NT_STATUS_OBJECT_NAME_INVALID;
        }
@@ -2884,19 +3131,12 @@ NTSTATUS mkdir_internal(connection_struct *conn, pstring directory)
                ret = vfs_MkDir(conn,directory,unix_mode(conn,aDIR,directory));
        
        if (ret == -1) {
-               NTSTATUS nterr = NT_STATUS_OK;
                if(errno == ENOENT) {
-                       unix_ERR_class = ERRDOS;
-                       if (bad_path) {
-                               unix_ERR_code = ERRbadpath;
-                               nterr = NT_STATUS_OBJECT_PATH_NOT_FOUND;
-                       } else {
-                               unix_ERR_code = ERRbadfile;
-                               nterr = NT_STATUS_OBJECT_NAME_NOT_FOUND;
-                       }
+                       if (bad_path)
+                               return NT_STATUS_OBJECT_PATH_NOT_FOUND;
+                       else
+                               return NT_STATUS_OBJECT_NAME_NOT_FOUND;
                }
-               if (!NT_STATUS_IS_OK(nterr))
-                       return nterr;
                return map_nt_error_from_unix(errno);
        }
        
@@ -2914,13 +3154,19 @@ int reply_mkdir(connection_struct *conn, char *inbuf,char *outbuf, int dum_size,
        NTSTATUS status;
        START_PROFILE(SMBmkdir);
  
-       srvstr_pull_buf(inbuf, directory, smb_buf(inbuf) + 1, sizeof(directory), STR_TERMINATE);
+       srvstr_get_path(inbuf, directory, smb_buf(inbuf) + 1, sizeof(directory), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBmkdir);
+               return ERROR_NT(status);
+       }
 
        RESOLVE_DFSPATH(directory, conn, inbuf, outbuf);
 
        status = mkdir_internal(conn, directory);
-       if (!NT_STATUS_IS_OK(status))
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBmkdir);
                return ERROR_NT(status);
+       }
 
        outsize = set_message(outbuf,0,0,True);
 
@@ -3075,9 +3321,14 @@ int reply_rmdir(connection_struct *conn, char *inbuf,char *outbuf, int dum_size,
        BOOL ok = False;
        BOOL bad_path = False;
        SMB_STRUCT_STAT sbuf;
+       NTSTATUS status;
        START_PROFILE(SMBrmdir);
 
-       srvstr_pull_buf(inbuf, directory, smb_buf(inbuf) + 1, sizeof(directory), STR_TERMINATE);
+       srvstr_get_path(inbuf, directory, smb_buf(inbuf) + 1, sizeof(directory), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBrmdir);
+               return ERROR_NT(status);
+       }
 
        RESOLVE_DFSPATH(directory, conn, inbuf, outbuf)
 
@@ -3103,14 +3354,18 @@ int reply_rmdir(connection_struct *conn, char *inbuf,char *outbuf, int dum_size,
 
 /*******************************************************************
  Resolve wildcards in a filename rename.
+ Note that name is in UNIX charset and thus potentially can be more
+ than fstring buffer (255 bytes) especially in default UTF-8 case.
+ Therefore, we use pstring inside and all calls should ensure that
+ name2 is at least pstring-long (they do already)
 ********************************************************************/
 
 static BOOL resolve_wildcards(const char *name1, char *name2)
 {
-       fstring root1,root2;
-       fstring ext1,ext2;
+       pstring root1,root2;
+       pstring ext1,ext2;
        char *p,*p2, *pname1, *pname2;
-       int available_space;
+       int available_space, actual_space;
        
 
        pname1 = strrchr_m(name1,'/');
@@ -3119,21 +3374,21 @@ static BOOL resolve_wildcards(const char *name1, char *name2)
        if (!pname1 || !pname2)
                return(False);
   
-       fstrcpy(root1,pname1);
-       fstrcpy(root2,pname2);
+       pstrcpy(root1,pname1);
+       pstrcpy(root2,pname2);
        p = strrchr_m(root1,'.');
        if (p) {
                *p = 0;
-               fstrcpy(ext1,p+1);
+               pstrcpy(ext1,p+1);
        } else {
-               fstrcpy(ext1,"");    
+               pstrcpy(ext1,"");    
        }
        p = strrchr_m(root2,'.');
        if (p) {
                *p = 0;
-               fstrcpy(ext2,p+1);
+               pstrcpy(ext2,p+1);
        } else {
-               fstrcpy(ext2,"");    
+               pstrcpy(ext2,"");    
        }
 
        p = root1;
@@ -3165,7 +3420,11 @@ static BOOL resolve_wildcards(const char *name1, char *name2)
        available_space = sizeof(pstring) - PTR_DIFF(pname2, name2);
        
        if (ext2[0]) {
-               snprintf(pname2, available_space - 1, "%s.%s", root2, ext2);
+               actual_space = snprintf(pname2, available_space - 1, "%s.%s", root2, ext2);
+               if (actual_space >= available_space - 1) {
+                       DEBUG(1,("resolve_wildcards: can't fit resolved name into specified buffer (overrun by %d bytes)\n",
+                               actual_space - available_space));
+               }
        } else {
                pstrcpy_base(pname2, root2, name2);
        }
@@ -3206,9 +3465,20 @@ NTSTATUS rename_internals_fsp(connection_struct *conn, files_struct *fsp, char *
        pstring newname_last_component;
        NTSTATUS error = NT_STATUS_OK;
        BOOL dest_exists;
+       BOOL rcdest = True;
 
        ZERO_STRUCT(sbuf);
-       unix_convert(newname,conn,newname_last_component,&bad_path,&sbuf);
+       rcdest = unix_convert(newname,conn,newname_last_component,&bad_path,&sbuf);
+
+       /* Quick check for "." and ".." */
+       if (!bad_path && newname_last_component[0] == '.') {
+               if (!newname_last_component[1] || (newname_last_component[1] == '.' && !newname_last_component[2])) {
+                       return NT_STATUS_ACCESS_DENIED;
+               }
+       }
+       if (!rcdest && bad_path) {
+               return NT_STATUS_OBJECT_PATH_NOT_FOUND;
+       }
 
        /* Ensure newname contains a '/' */
        if(strrchr_m(newname,'/') == 0) {
@@ -3302,26 +3572,49 @@ NTSTATUS rename_internals_fsp(connection_struct *conn, files_struct *fsp, char *
  code. 
 ****************************************************************************/
 
-NTSTATUS rename_internals(connection_struct *conn, char *name, char *newname, BOOL replace_if_exists)
+NTSTATUS rename_internals(connection_struct *conn, char *name, char *newname, uint16 attrs, BOOL replace_if_exists)
 {
        pstring directory;
        pstring mask;
-       pstring newname_last_component;
+       pstring last_component_src;
+       pstring last_component_dest;
        char *p;
        BOOL has_wild;
-       BOOL bad_path1 = False;
-       BOOL bad_path2 = False;
+       BOOL bad_path_src = False;
+       BOOL bad_path_dest = False;
        int count=0;
        NTSTATUS error = NT_STATUS_OK;
        BOOL rc = True;
+       BOOL rcdest = True;
        SMB_STRUCT_STAT sbuf1, sbuf2;
 
        *directory = *mask = 0;
 
        ZERO_STRUCT(sbuf1);
        ZERO_STRUCT(sbuf2);
-       rc = unix_convert(name,conn,0,&bad_path1,&sbuf1);
-       unix_convert(newname,conn,newname_last_component,&bad_path2,&sbuf2);
+
+       rc = unix_convert(name,conn,last_component_src,&bad_path_src,&sbuf1);
+       if (!rc && bad_path_src) {
+               if (ms_has_wild(last_component_src))
+                       return NT_STATUS_OBJECT_NAME_NOT_FOUND;
+               return NT_STATUS_OBJECT_PATH_NOT_FOUND;
+       }
+
+       /* Quick check for "." and ".." */
+       if (last_component_src[0] == '.') {
+               if (!last_component_src[1] || (last_component_src[1] == '.' && !last_component_src[2])) {
+                       return NT_STATUS_OBJECT_NAME_INVALID;
+               }
+       }
+
+       rcdest = unix_convert(newname,conn,last_component_dest,&bad_path_dest,&sbuf2);
+
+       /* Quick check for "." and ".." */
+       if (last_component_dest[0] == '.') {
+               if (!last_component_dest[1] || (last_component_dest[1] == '.' && !last_component_dest[2])) {
+                       return NT_STATUS_OBJECT_NAME_INVALID;
+               }
+       }
 
        /*
         * Split the old name into directory and last component
@@ -3331,7 +3624,7 @@ NTSTATUS rename_internals(connection_struct *conn, char *name, char *newname, BO
         * name and newname contain a / character or neither of them do
         * as this is checked in resolve_wildcards().
         */
-       
+
        p = strrchr_m(name,'/');
        if (!p) {
                pstrcpy(directory,".");
@@ -3377,9 +3670,9 @@ NTSTATUS rename_internals(connection_struct *conn, char *name, char *newname, BO
                }
                
                DEBUG(3,("rename_internals: case_sensitive = %d, case_preserve = %d, short case preserve = %d, \
-directory = %s, newname = %s, newname_last_component = %s, is_8_3 = %d\n", 
+directory = %s, newname = %s, last_component_dest = %s, is_8_3 = %d\n", 
                         case_sensitive, case_preserve, short_case_preserve, directory, 
-                        newname, newname_last_component, is_short_name));
+                        newname, last_component_dest, is_short_name));
 
                /*
                 * Check for special case with case preserving and not
@@ -3395,7 +3688,7 @@ directory = %s, newname = %s, newname_last_component = %s, is_8_3 = %d\n",
                    ((short_case_preserve == True) && 
                     (is_short_name == True))) &&
                   strcsequal(directory, newname)) {
-                       pstring newname_modified_last_component;
+                       pstring modified_last_component;
 
                        /*
                         * Get the last component of the modified name.
@@ -3403,15 +3696,15 @@ directory = %s, newname = %s, newname_last_component = %s, is_8_3 = %d\n",
                         * character above.
                         */
                        p = strrchr_m(newname,'/');
-                       pstrcpy(newname_modified_last_component,p+1);
+                       pstrcpy(modified_last_component,p+1);
                        
-                       if(strcsequal(newname_modified_last_component, 
-                                     newname_last_component) == False) {
+                       if(strcsequal(modified_last_component, 
+                                     last_component_dest) == False) {
                                /*
                                 * Replace the modified last component with
                                 * the original.
                                 */
-                               pstrcpy(p+1, newname_last_component);
+                               pstrcpy(p+1, last_component_dest);
                        }
                }
        
@@ -3446,6 +3739,12 @@ directory = %s, newname = %s, newname_last_component = %s, is_8_3 = %d\n",
                        return error;
                }
 
+               if (!rcdest && bad_path_dest) {
+                       if (ms_has_wild(last_component_dest))
+                               return NT_STATUS_OBJECT_NAME_INVALID;
+                       return NT_STATUS_OBJECT_PATH_NOT_FOUND;
+               }
+
                error = can_rename(directory,conn,&sbuf1);
 
                if (!NT_STATUS_IS_OK(error)) {
@@ -3499,19 +3798,37 @@ directory = %s, newname = %s, newname_last_component = %s, is_8_3 = %d\n",
                        dirptr = OpenDir(conn, directory, True);
                
                if (dirptr) {
-                       error = NT_STATUS_OBJECT_NAME_NOT_FOUND;
+                       error = NT_STATUS_NO_SUCH_FILE;
+/*                     Was error = NT_STATUS_OBJECT_NAME_NOT_FOUND; - gentest fix. JRA */
                        
                        if (strequal(mask,"????????.???"))
                                pstrcpy(mask,"*");
                        
                        while ((dname = ReadDirName(dirptr))) {
                                pstring fname;
+                               BOOL sysdir_entry = False;
 
                                pstrcpy(fname,dname);
                                
+                               /* Quick check for "." and ".." */
+                               if (fname[0] == '.') {
+                                       if (!fname[1] || (fname[1] == '.' && !fname[2])) {
+                                               if (attrs & aDIR) {
+                                                       sysdir_entry = True;
+                                               } else {
+                                                       continue;
+                                               }
+                                       }
+                               }
+
                                if(!mask_match(fname, mask, case_sensitive))
                                        continue;
                                
+                               if (sysdir_entry) {
+                                       error = NT_STATUS_OBJECT_NAME_INVALID;
+                                       continue;
+                               }
+
                                error = NT_STATUS_ACCESS_DENIED;
                                slprintf(fname,sizeof(fname)-1,"%s/%s",directory,dname);
                                if (!vfs_object_exist(conn, fname, &sbuf1)) {
@@ -3542,11 +3859,20 @@ directory = %s, newname = %s, newname_last_component = %s, is_8_3 = %d\n",
                                if (!SMB_VFS_RENAME(conn,fname,destname)) {
                                        rename_open_files(conn, sbuf1.st_dev, sbuf1.st_ino, newname);
                                        count++;
+                                       error = NT_STATUS_OK;
                                }
                                DEBUG(3,("rename_internals: doing rename on %s -> %s\n",fname,destname));
                        }
                        CloseDir(dirptr);
                }
+
+               if (!NT_STATUS_EQUAL(error,NT_STATUS_NO_SUCH_FILE)) {
+                       if (!rcdest && bad_path_dest) {
+                               if (ms_has_wild(last_component_dest))
+                                       return NT_STATUS_OBJECT_NAME_INVALID;
+                               return NT_STATUS_OBJECT_PATH_NOT_FOUND;
+                       }
+               }
        }
        
        if (count == 0 && NT_STATUS_IS_OK(error)) {
@@ -3567,22 +3893,32 @@ int reply_mv(connection_struct *conn, char *inbuf,char *outbuf, int dum_size,
        pstring name;
        pstring newname;
        char *p;
+       uint16 attrs = SVAL(inbuf,smb_vwv0);
        NTSTATUS status;
 
        START_PROFILE(SMBmv);
 
        p = smb_buf(inbuf) + 1;
-       p += srvstr_pull_buf(inbuf, name, p, sizeof(name), STR_TERMINATE);
+       p += srvstr_get_path(inbuf, name, p, sizeof(name), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBmv);
+               return ERROR_NT(status);
+       }
        p++;
-       p += srvstr_pull_buf(inbuf, newname, p, sizeof(newname), STR_TERMINATE);
+       p += srvstr_get_path(inbuf, newname, p, sizeof(newname), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBmv);
+               return ERROR_NT(status);
+       }
        
        RESOLVE_DFSPATH(name, conn, inbuf, outbuf);
        RESOLVE_DFSPATH(newname, conn, inbuf, outbuf);
        
        DEBUG(3,("reply_mv : %s -> %s\n",name,newname));
        
-       status = rename_internals(conn, name, newname, False);
+       status = rename_internals(conn, name, newname, attrs, False);
        if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBmv);
                return ERROR_NT(status);
        }
 
@@ -3700,14 +4036,23 @@ int reply_copy(connection_struct *conn, char *inbuf,char *outbuf, int dum_size,
        BOOL bad_path2 = False;
        BOOL rc = True;
        SMB_STRUCT_STAT sbuf1, sbuf2;
+       NTSTATUS status;
 
        START_PROFILE(SMBcopy);
 
        *directory = *mask = 0;
 
        p = smb_buf(inbuf);
-       p += srvstr_pull_buf(inbuf, name, p, sizeof(name), STR_TERMINATE);
-       p += srvstr_pull_buf(inbuf, newname, p, sizeof(newname), STR_TERMINATE);
+       p += srvstr_get_path(inbuf, name, p, sizeof(name), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBcopy);
+               return ERROR_NT(status);
+       }
+       p += srvstr_get_path(inbuf, newname, p, sizeof(newname), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(SMBcopy);
+               return ERROR_NT(status);
+       }
    
        DEBUG(3,("reply_copy : %s -> %s\n",name,newname));
    
@@ -3853,6 +4198,7 @@ int reply_setdir(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
        int outsize = 0;
        BOOL ok = False;
        pstring newdir;
+       NTSTATUS status;
 
        START_PROFILE(pathworks_setdir);
   
@@ -3862,7 +4208,11 @@ int reply_setdir(connection_struct *conn, char *inbuf,char *outbuf, int dum_size
                return ERROR_DOS(ERRDOS,ERRnoaccess);
        }
 
-       srvstr_pull_buf(inbuf, newdir, smb_buf(inbuf) + 1, sizeof(newdir), STR_TERMINATE);
+       srvstr_get_path(inbuf, newdir, smb_buf(inbuf) + 1, sizeof(newdir), 0, STR_TERMINATE, &status);
+       if (!NT_STATUS_IS_OK(status)) {
+               END_PROFILE(pathworks_setdir);
+               return ERROR_NT(status);
+       }
   
        if (strlen(newdir) == 0) {
                ok = True;
@@ -4037,6 +4387,7 @@ int reply_lockingX(connection_struct *conn, char *inbuf,char *outbuf,int length,
        char *data;
        BOOL large_file_format = (locktype & LOCKING_ANDX_LARGE_FILES)?True:False;
        BOOL err;
+       BOOL my_lock_ctx = False;
        NTSTATUS status;
 
        START_PROFILE(SMBlockingX);
@@ -4131,7 +4482,7 @@ no oplock granted on this file (%s).\n", fsp->fnum, fsp->fsp_name));
 
        /* Setup the timeout in seconds. */
 
-       lock_timeout = ((lock_timeout == -1) ? -1 : (lock_timeout+499)/500);
+       lock_timeout = ((lock_timeout == -1) ? -1 : (lock_timeout+999)/1000);
        
        /* Now do any requested locks */
        data += ((large_file_format ? 20 : 10)*num_ulocks);
@@ -4157,8 +4508,15 @@ no oplock granted on this file (%s).\n", fsp->fnum, fsp->fsp_name));
                        fsp->fsp_name, (int)lock_timeout ));
                
                status = do_lock_spin(fsp,conn,lock_pid, count,offset, 
-                                ((locktype & 1) ? READ_LOCK : WRITE_LOCK));
+                                ((locktype & 1) ? READ_LOCK : WRITE_LOCK), &my_lock_ctx);
                if (NT_STATUS_V(status)) {
+                       /*
+                        * Interesting fact found by IFSTEST /t LockOverlappedTest...
+                        * Even if it's our own lock context, we need to wait here as
+                        * there may be an unlock on the way.
+                        * So I removed a "&& !my_lock_ctx" from the following
+                        * if statement. JRA.
+                        */
                        if ((lock_timeout != 0) && lp_blocking_locks(SNUM(conn)) && ERROR_WAS_LOCK_DENIED(status)) {
                                /*
                                 * A blocking lock was requested. Package up