loadparm: make the source3/ lp_ functions take an explicit TALLOC_CTX *.
[kai/samba.git] / source3 / smbd / open.c
1 /* 
2    Unix SMB/CIFS implementation.
3    file opening and share modes
4    Copyright (C) Andrew Tridgell 1992-1998
5    Copyright (C) Jeremy Allison 2001-2004
6    Copyright (C) Volker Lendecke 2005
7
8    This program is free software; you can redistribute it and/or modify
9    it under the terms of the GNU General Public License as published by
10    the Free Software Foundation; either version 3 of the License, or
11    (at your option) any later version.
12
13    This program is distributed in the hope that it will be useful,
14    but WITHOUT ANY WARRANTY; without even the implied warranty of
15    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16    GNU General Public License for more details.
17
18    You should have received a copy of the GNU General Public License
19    along with this program.  If not, see <http://www.gnu.org/licenses/>.
20 */
21
22 #include "includes.h"
23 #include "system/filesys.h"
24 #include "printing.h"
25 #include "smbd/smbd.h"
26 #include "smbd/globals.h"
27 #include "fake_file.h"
28 #include "../libcli/security/security.h"
29 #include "../librpc/gen_ndr/ndr_security.h"
30 #include "../librpc/gen_ndr/open_files.h"
31 #include "auth.h"
32 #include "messages.h"
33
34 extern const struct generic_mapping file_generic_mapping;
35
36 struct deferred_open_record {
37         bool delayed_for_oplocks;
38         bool async_open;
39         struct file_id id;
40 };
41
42 /****************************************************************************
43  If the requester wanted DELETE_ACCESS and was rejected because
44  the file ACL didn't include DELETE_ACCESS, see if the parent ACL
45  overrides this.
46 ****************************************************************************/
47
48 static bool parent_override_delete(connection_struct *conn,
49                                         const struct smb_filename *smb_fname,
50                                         uint32_t access_mask,
51                                         uint32_t rejected_mask)
52 {
53         if ((access_mask & DELETE_ACCESS) &&
54                     (rejected_mask & DELETE_ACCESS) &&
55                     can_delete_file_in_directory(conn, smb_fname)) {
56                 return true;
57         }
58         return false;
59 }
60
61 /****************************************************************************
62  Check if we have open rights.
63 ****************************************************************************/
64
65 NTSTATUS smbd_check_access_rights(struct connection_struct *conn,
66                                 const struct smb_filename *smb_fname,
67                                 uint32_t access_mask)
68 {
69         /* Check if we have rights to open. */
70         NTSTATUS status;
71         struct security_descriptor *sd = NULL;
72         uint32_t rejected_share_access;
73         uint32_t rejected_mask = access_mask;
74
75         rejected_share_access = access_mask & ~(conn->share_access);
76
77         if (rejected_share_access) {
78                 DEBUG(10, ("smbd_check_access_rights: rejected share access 0x%x "
79                         "on %s (0x%x)\n",
80                         (unsigned int)access_mask,
81                         smb_fname_str_dbg(smb_fname),
82                         (unsigned int)rejected_share_access ));
83                 return NT_STATUS_ACCESS_DENIED;
84         }
85
86         if (get_current_uid(conn) == (uid_t)0) {
87                 /* I'm sorry sir, I didn't know you were root... */
88                 DEBUG(10,("smbd_check_access_rights: root override "
89                         "on %s. Granting 0x%x\n",
90                         smb_fname_str_dbg(smb_fname),
91                         (unsigned int)access_mask ));
92                 return NT_STATUS_OK;
93         }
94
95         if ((access_mask & DELETE_ACCESS) && !lp_acl_check_permissions(SNUM(conn))) {
96                 DEBUG(10,("smbd_check_access_rights: not checking ACL "
97                         "on DELETE_ACCESS on file %s. Granting 0x%x\n",
98                         smb_fname_str_dbg(smb_fname),
99                         (unsigned int)access_mask ));
100                 return NT_STATUS_OK;
101         }
102
103         if (access_mask == DELETE_ACCESS &&
104                         VALID_STAT(smb_fname->st) &&
105                         S_ISLNK(smb_fname->st.st_ex_mode)) {
106                 /* We can always delete a symlink. */
107                 DEBUG(10,("smbd_check_access_rights: not checking ACL "
108                         "on DELETE_ACCESS on symlink %s.\n",
109                         smb_fname_str_dbg(smb_fname) ));
110                 return NT_STATUS_OK;
111         }
112
113         status = SMB_VFS_GET_NT_ACL(conn, smb_fname->base_name,
114                         (SECINFO_OWNER |
115                         SECINFO_GROUP |
116                         SECINFO_DACL),&sd);
117
118         if (!NT_STATUS_IS_OK(status)) {
119                 DEBUG(10, ("smbd_check_access_rights: Could not get acl "
120                         "on %s: %s\n",
121                         smb_fname_str_dbg(smb_fname),
122                         nt_errstr(status)));
123
124                 if (NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
125                         goto access_denied;
126                 }
127
128                 return status;
129         }
130
131         /*
132          * Never test FILE_READ_ATTRIBUTES. se_access_check() also takes care of
133          * owner WRITE_DAC and READ_CONTROL.
134          */
135         status = se_access_check(sd,
136                                 get_current_nttok(conn),
137                                 (access_mask & ~FILE_READ_ATTRIBUTES),
138                                 &rejected_mask);
139
140         DEBUG(10,("smbd_check_access_rights: file %s requesting "
141                 "0x%x returning 0x%x (%s)\n",
142                 smb_fname_str_dbg(smb_fname),
143                 (unsigned int)access_mask,
144                 (unsigned int)rejected_mask,
145                 nt_errstr(status) ));
146
147         if (!NT_STATUS_IS_OK(status)) {
148                 if (DEBUGLEVEL >= 10) {
149                         DEBUG(10,("smbd_check_access_rights: acl for %s is:\n",
150                                 smb_fname_str_dbg(smb_fname) ));
151                         NDR_PRINT_DEBUG(security_descriptor, sd);
152                 }
153         }
154
155         TALLOC_FREE(sd);
156
157         if (NT_STATUS_IS_OK(status) ||
158                         !NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
159                 return status;
160         }
161
162         /* Here we know status == NT_STATUS_ACCESS_DENIED. */
163
164   access_denied:
165
166         if ((access_mask & FILE_WRITE_ATTRIBUTES) &&
167                         (rejected_mask & FILE_WRITE_ATTRIBUTES) &&
168                         !lp_store_dos_attributes(SNUM(conn)) &&
169                         (lp_map_readonly(SNUM(conn)) ||
170                         lp_map_archive(SNUM(conn)) ||
171                         lp_map_hidden(SNUM(conn)) ||
172                         lp_map_system(SNUM(conn)))) {
173                 rejected_mask &= ~FILE_WRITE_ATTRIBUTES;
174
175                 DEBUG(10,("smbd_check_access_rights: "
176                         "overrode "
177                         "FILE_WRITE_ATTRIBUTES "
178                         "on file %s\n",
179                         smb_fname_str_dbg(smb_fname)));
180         }
181
182         if (parent_override_delete(conn,
183                                 smb_fname,
184                                 access_mask,
185                                 rejected_mask)) {
186                 /* Were we trying to do an open
187                  * for delete and didn't get DELETE
188                  * access (only) ? Check if the
189                  * directory allows DELETE_CHILD.
190                  * See here:
191                  * http://blogs.msdn.com/oldnewthing/archive/2004/06/04/148426.aspx
192                  * for details. */
193
194                 rejected_mask &= ~DELETE_ACCESS;
195
196                 DEBUG(10,("smbd_check_access_rights: "
197                         "overrode "
198                         "DELETE_ACCESS on "
199                         "file %s\n",
200                         smb_fname_str_dbg(smb_fname)));
201         }
202
203         if (rejected_mask != 0) {
204                 return NT_STATUS_ACCESS_DENIED;
205         }
206         return NT_STATUS_OK;
207 }
208
209 static NTSTATUS check_parent_access(struct connection_struct *conn,
210                                 struct smb_filename *smb_fname,
211                                 uint32_t access_mask)
212 {
213         NTSTATUS status;
214         char *parent_dir = NULL;
215         struct security_descriptor *parent_sd = NULL;
216         uint32_t access_granted = 0;
217
218         if (!parent_dirname(talloc_tos(),
219                                 smb_fname->base_name,
220                                 &parent_dir,
221                                 NULL)) {
222                 return NT_STATUS_NO_MEMORY;
223         }
224
225         if (get_current_uid(conn) == (uid_t)0) {
226                 /* I'm sorry sir, I didn't know you were root... */
227                 DEBUG(10,("check_parent_access: root override "
228                         "on %s. Granting 0x%x\n",
229                         smb_fname_str_dbg(smb_fname),
230                         (unsigned int)access_mask ));
231                 return NT_STATUS_OK;
232         }
233
234         status = SMB_VFS_GET_NT_ACL(conn,
235                                 parent_dir,
236                                 SECINFO_DACL,
237                                 &parent_sd);
238
239         if (!NT_STATUS_IS_OK(status)) {
240                 DEBUG(5,("check_parent_access: SMB_VFS_GET_NT_ACL failed for "
241                         "%s with error %s\n",
242                         parent_dir,
243                         nt_errstr(status)));
244                 return status;
245         }
246
247         /*
248          * Never test FILE_READ_ATTRIBUTES. se_access_check() also takes care of
249          * owner WRITE_DAC and READ_CONTROL.
250          */
251         status = se_access_check(parent_sd,
252                                 get_current_nttok(conn),
253                                 (access_mask & ~FILE_READ_ATTRIBUTES),
254                                 &access_granted);
255         if(!NT_STATUS_IS_OK(status)) {
256                 DEBUG(5,("check_parent_access: access check "
257                         "on directory %s for "
258                         "path %s for mask 0x%x returned (0x%x) %s\n",
259                         parent_dir,
260                         smb_fname->base_name,
261                         access_mask,
262                         access_granted,
263                         nt_errstr(status) ));
264                 return status;
265         }
266
267         return NT_STATUS_OK;
268 }
269
270 /****************************************************************************
271  fd support routines - attempt to do a dos_open.
272 ****************************************************************************/
273
274 static NTSTATUS fd_open(struct connection_struct *conn,
275                     files_struct *fsp,
276                     int flags,
277                     mode_t mode)
278 {
279         struct smb_filename *smb_fname = fsp->fsp_name;
280         NTSTATUS status = NT_STATUS_OK;
281
282 #ifdef O_NOFOLLOW
283         /* 
284          * Never follow symlinks on a POSIX client. The
285          * client should be doing this.
286          */
287
288         if (fsp->posix_open || !lp_symlinks(SNUM(conn))) {
289                 flags |= O_NOFOLLOW;
290         }
291 #endif
292
293         fsp->fh->fd = SMB_VFS_OPEN(conn, smb_fname, fsp, flags, mode);
294         if (fsp->fh->fd == -1) {
295                 int posix_errno = errno;
296 #ifdef O_NOFOLLOW
297 #if defined(ENOTSUP) && defined(OSF1)
298                 /* handle special Tru64 errno */
299                 if (errno == ENOTSUP) {
300                         posix_errno = ELOOP;
301                 }
302 #endif /* ENOTSUP */
303 #ifdef EFTYPE
304                 /* fix broken NetBSD errno */
305                 if (errno == EFTYPE) {
306                         posix_errno = ELOOP;
307                 }
308 #endif /* EFTYPE */
309                 /* fix broken FreeBSD errno */
310                 if (errno == EMLINK) {
311                         posix_errno = ELOOP;
312                 }
313 #endif /* O_NOFOLLOW */
314                 status = map_nt_error_from_unix(posix_errno);
315                 if (errno == EMFILE) {
316                         static time_t last_warned = 0L;
317
318                         if (time((time_t *) NULL) > last_warned) {
319                                 DEBUG(0,("Too many open files, unable "
320                                         "to open more!  smbd's max "
321                                         "open files = %d\n",
322                                         lp_max_open_files()));
323                                 last_warned = time((time_t *) NULL);
324                         }
325                 }
326
327         }
328
329         DEBUG(10,("fd_open: name %s, flags = 0%o mode = 0%o, fd = %d. %s\n",
330                   smb_fname_str_dbg(smb_fname), flags, (int)mode, fsp->fh->fd,
331                 (fsp->fh->fd == -1) ? strerror(errno) : "" ));
332
333         return status;
334 }
335
336 /****************************************************************************
337  Close the file associated with a fsp.
338 ****************************************************************************/
339
340 NTSTATUS fd_close(files_struct *fsp)
341 {
342         int ret;
343
344         if (fsp->dptr) {
345                 dptr_CloseDir(fsp);
346         }
347         if (fsp->fh->fd == -1) {
348                 return NT_STATUS_OK; /* What we used to call a stat open. */
349         }
350         if (fsp->fh->ref_count > 1) {
351                 return NT_STATUS_OK; /* Shared handle. Only close last reference. */
352         }
353
354         ret = SMB_VFS_CLOSE(fsp);
355         fsp->fh->fd = -1;
356         if (ret == -1) {
357                 return map_nt_error_from_unix(errno);
358         }
359         return NT_STATUS_OK;
360 }
361
362 /****************************************************************************
363  Change the ownership of a file to that of the parent directory.
364  Do this by fd if possible.
365 ****************************************************************************/
366
367 void change_file_owner_to_parent(connection_struct *conn,
368                                         const char *inherit_from_dir,
369                                         files_struct *fsp)
370 {
371         struct smb_filename *smb_fname_parent = NULL;
372         NTSTATUS status;
373         int ret;
374
375         status = create_synthetic_smb_fname(talloc_tos(), inherit_from_dir,
376                                             NULL, NULL, &smb_fname_parent);
377         if (!NT_STATUS_IS_OK(status)) {
378                 return;
379         }
380
381         ret = SMB_VFS_STAT(conn, smb_fname_parent);
382         if (ret == -1) {
383                 DEBUG(0,("change_file_owner_to_parent: failed to stat parent "
384                          "directory %s. Error was %s\n",
385                          smb_fname_str_dbg(smb_fname_parent),
386                          strerror(errno)));
387                 TALLOC_FREE(smb_fname_parent);
388                 return;
389         }
390
391         if (smb_fname_parent->st.st_ex_uid == fsp->fsp_name->st.st_ex_uid) {
392                 /* Already this uid - no need to change. */
393                 DEBUG(10,("change_file_owner_to_parent: file %s "
394                         "is already owned by uid %d\n",
395                         fsp_str_dbg(fsp),
396                         (int)fsp->fsp_name->st.st_ex_uid ));
397                 TALLOC_FREE(smb_fname_parent);
398                 return;
399         }
400
401         become_root();
402         ret = SMB_VFS_FCHOWN(fsp, smb_fname_parent->st.st_ex_uid, (gid_t)-1);
403         unbecome_root();
404         if (ret == -1) {
405                 DEBUG(0,("change_file_owner_to_parent: failed to fchown "
406                          "file %s to parent directory uid %u. Error "
407                          "was %s\n", fsp_str_dbg(fsp),
408                          (unsigned int)smb_fname_parent->st.st_ex_uid,
409                          strerror(errno) ));
410         } else {
411                 DEBUG(10,("change_file_owner_to_parent: changed new file %s to "
412                         "parent directory uid %u.\n", fsp_str_dbg(fsp),
413                         (unsigned int)smb_fname_parent->st.st_ex_uid));
414                 /* Ensure the uid entry is updated. */
415                 fsp->fsp_name->st.st_ex_uid = smb_fname_parent->st.st_ex_uid;
416         }
417
418         TALLOC_FREE(smb_fname_parent);
419 }
420
421 NTSTATUS change_dir_owner_to_parent(connection_struct *conn,
422                                        const char *inherit_from_dir,
423                                        const char *fname,
424                                        SMB_STRUCT_STAT *psbuf)
425 {
426         struct smb_filename *smb_fname_parent = NULL;
427         struct smb_filename *smb_fname_cwd = NULL;
428         char *saved_dir = NULL;
429         TALLOC_CTX *ctx = talloc_tos();
430         NTSTATUS status = NT_STATUS_OK;
431         int ret;
432
433         status = create_synthetic_smb_fname(ctx, inherit_from_dir, NULL, NULL,
434                                             &smb_fname_parent);
435         if (!NT_STATUS_IS_OK(status)) {
436                 return status;
437         }
438
439         ret = SMB_VFS_STAT(conn, smb_fname_parent);
440         if (ret == -1) {
441                 status = map_nt_error_from_unix(errno);
442                 DEBUG(0,("change_dir_owner_to_parent: failed to stat parent "
443                          "directory %s. Error was %s\n",
444                          smb_fname_str_dbg(smb_fname_parent),
445                          strerror(errno)));
446                 goto out;
447         }
448
449         /* We've already done an lstat into psbuf, and we know it's a
450            directory. If we can cd into the directory and the dev/ino
451            are the same then we can safely chown without races as
452            we're locking the directory in place by being in it.  This
453            should work on any UNIX (thanks tridge :-). JRA.
454         */
455
456         saved_dir = vfs_GetWd(ctx,conn);
457         if (!saved_dir) {
458                 status = map_nt_error_from_unix(errno);
459                 DEBUG(0,("change_dir_owner_to_parent: failed to get "
460                          "current working directory. Error was %s\n",
461                          strerror(errno)));
462                 goto out;
463         }
464
465         /* Chdir into the new path. */
466         if (vfs_ChDir(conn, fname) == -1) {
467                 status = map_nt_error_from_unix(errno);
468                 DEBUG(0,("change_dir_owner_to_parent: failed to change "
469                          "current working directory to %s. Error "
470                          "was %s\n", fname, strerror(errno) ));
471                 goto chdir;
472         }
473
474         status = create_synthetic_smb_fname(ctx, ".", NULL, NULL,
475                                             &smb_fname_cwd);
476         if (!NT_STATUS_IS_OK(status)) {
477                 return status;
478         }
479
480         ret = SMB_VFS_STAT(conn, smb_fname_cwd);
481         if (ret == -1) {
482                 status = map_nt_error_from_unix(errno);
483                 DEBUG(0,("change_dir_owner_to_parent: failed to stat "
484                          "directory '.' (%s) Error was %s\n",
485                          fname, strerror(errno)));
486                 goto chdir;
487         }
488
489         /* Ensure we're pointing at the same place. */
490         if (smb_fname_cwd->st.st_ex_dev != psbuf->st_ex_dev ||
491             smb_fname_cwd->st.st_ex_ino != psbuf->st_ex_ino) {
492                 DEBUG(0,("change_dir_owner_to_parent: "
493                          "device/inode on directory %s changed. "
494                          "Refusing to chown !\n", fname ));
495                 status = NT_STATUS_ACCESS_DENIED;
496                 goto chdir;
497         }
498
499         if (smb_fname_parent->st.st_ex_uid == smb_fname_cwd->st.st_ex_uid) {
500                 /* Already this uid - no need to change. */
501                 DEBUG(10,("change_dir_owner_to_parent: directory %s "
502                         "is already owned by uid %d\n",
503                         fname,
504                         (int)smb_fname_cwd->st.st_ex_uid ));
505                 status = NT_STATUS_OK;
506                 goto chdir;
507         }
508
509         become_root();
510         ret = SMB_VFS_LCHOWN(conn, ".", smb_fname_parent->st.st_ex_uid,
511                             (gid_t)-1);
512         unbecome_root();
513         if (ret == -1) {
514                 status = map_nt_error_from_unix(errno);
515                 DEBUG(10,("change_dir_owner_to_parent: failed to chown "
516                           "directory %s to parent directory uid %u. "
517                           "Error was %s\n", fname,
518                           (unsigned int)smb_fname_parent->st.st_ex_uid,
519                           strerror(errno) ));
520         } else {
521                 DEBUG(10,("change_dir_owner_to_parent: changed ownership of new "
522                         "directory %s to parent directory uid %u.\n",
523                         fname, (unsigned int)smb_fname_parent->st.st_ex_uid ));
524                 /* Ensure the uid entry is updated. */
525                 psbuf->st_ex_uid = smb_fname_parent->st.st_ex_uid;
526         }
527
528  chdir:
529         vfs_ChDir(conn,saved_dir);
530  out:
531         TALLOC_FREE(smb_fname_parent);
532         TALLOC_FREE(smb_fname_cwd);
533         return status;
534 }
535
536 /****************************************************************************
537  Open a file - returning a guaranteed ATOMIC indication of if the
538  file was created or not.
539 ****************************************************************************/
540
541 static NTSTATUS fd_open_atomic(struct connection_struct *conn,
542                         files_struct *fsp,
543                         int flags,
544                         mode_t mode,
545                         bool *file_created)
546 {
547         NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
548         bool file_existed = VALID_STAT(fsp->fsp_name->st);
549
550         *file_created = false;
551
552         if (!(flags & O_CREAT)) {
553                 /*
554                  * We're not creating the file, just pass through.
555                  */
556                 return fd_open(conn, fsp, flags, mode);
557         }
558
559         if (flags & O_EXCL) {
560                 /*
561                  * Fail if already exists, just pass through.
562                  */
563                 status = fd_open(conn, fsp, flags, mode);
564                 if (NT_STATUS_IS_OK(status)) {
565                         /*
566                          * Here we've opened with O_CREAT|O_EXCL
567                          * and got success. We *know* we created
568                          * this file.
569                          */
570                         *file_created = true;
571                 }
572                 return status;
573         }
574
575         /*
576          * Now it gets tricky. We have O_CREAT, but not O_EXCL.
577          * To know absolutely if we created the file or not,
578          * we can never call O_CREAT without O_EXCL. So if
579          * we think the file existed, try without O_CREAT|O_EXCL.
580          * If we think the file didn't exist, try with
581          * O_CREAT|O_EXCL. Keep bouncing between these two
582          * requests until either the file is created, or
583          * opened. Either way, we keep going until we get
584          * a returnable result (error, or open/create).
585          */
586
587         while(1) {
588                 int curr_flags = flags;
589
590                 if (file_existed) {
591                         /* Just try open, do not create. */
592                         curr_flags &= ~(O_CREAT);
593                         status = fd_open(conn, fsp, curr_flags, mode);
594                         if (NT_STATUS_EQUAL(status,
595                                         NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
596                                 /*
597                                  * Someone deleted it in the meantime.
598                                  * Retry with O_EXCL.
599                                  */
600                                 file_existed = false;
601                                 DEBUG(10,("fd_open_atomic: file %s existed. "
602                                         "Retry.\n",
603                                         smb_fname_str_dbg(fsp->fsp_name)));
604                                         continue;
605                         }
606                 } else {
607                         /* Try create exclusively, fail if it exists. */
608                         curr_flags |= O_EXCL;
609                         status = fd_open(conn, fsp, curr_flags, mode);
610                         if (NT_STATUS_EQUAL(status,
611                                         NT_STATUS_OBJECT_NAME_COLLISION)) {
612                                 /*
613                                  * Someone created it in the meantime.
614                                  * Retry without O_CREAT.
615                                  */
616                                 file_existed = true;
617                                 DEBUG(10,("fd_open_atomic: file %s "
618                                         "did not exist. Retry.\n",
619                                         smb_fname_str_dbg(fsp->fsp_name)));
620                                 continue;
621                         }
622                         if (NT_STATUS_IS_OK(status)) {
623                                 /*
624                                  * Here we've opened with O_CREAT|O_EXCL
625                                  * and got success. We *know* we created
626                                  * this file.
627                                  */
628                                 *file_created = true;
629                         }
630                 }
631                 /* Create is done, or failed. */
632                 break;
633         }
634         return status;
635 }
636
637 /****************************************************************************
638  Open a file.
639 ****************************************************************************/
640
641 static NTSTATUS open_file(files_struct *fsp,
642                           connection_struct *conn,
643                           struct smb_request *req,
644                           const char *parent_dir,
645                           int flags,
646                           mode_t unx_mode,
647                           uint32 access_mask, /* client requested access mask. */
648                           uint32 open_access_mask, /* what we're actually using in the open. */
649                           bool *p_file_created)
650 {
651         struct smb_filename *smb_fname = fsp->fsp_name;
652         NTSTATUS status = NT_STATUS_OK;
653         int accmode = (flags & O_ACCMODE);
654         int local_flags = flags;
655         bool file_existed = VALID_STAT(fsp->fsp_name->st);
656
657         fsp->fh->fd = -1;
658         errno = EPERM;
659
660         /* Check permissions */
661
662         /*
663          * This code was changed after seeing a client open request 
664          * containing the open mode of (DENY_WRITE/read-only) with
665          * the 'create if not exist' bit set. The previous code
666          * would fail to open the file read only on a read-only share
667          * as it was checking the flags parameter  directly against O_RDONLY,
668          * this was failing as the flags parameter was set to O_RDONLY|O_CREAT.
669          * JRA.
670          */
671
672         if (!CAN_WRITE(conn)) {
673                 /* It's a read-only share - fail if we wanted to write. */
674                 if(accmode != O_RDONLY || (flags & O_TRUNC) || (flags & O_APPEND)) {
675                         DEBUG(3,("Permission denied opening %s\n",
676                                  smb_fname_str_dbg(smb_fname)));
677                         return NT_STATUS_ACCESS_DENIED;
678                 } else if(flags & O_CREAT) {
679                         /* We don't want to write - but we must make sure that
680                            O_CREAT doesn't create the file if we have write
681                            access into the directory.
682                         */
683                         flags &= ~(O_CREAT|O_EXCL);
684                         local_flags &= ~(O_CREAT|O_EXCL);
685                 }
686         }
687
688         /*
689          * This little piece of insanity is inspired by the
690          * fact that an NT client can open a file for O_RDONLY,
691          * but set the create disposition to FILE_EXISTS_TRUNCATE.
692          * If the client *can* write to the file, then it expects to
693          * truncate the file, even though it is opening for readonly.
694          * Quicken uses this stupid trick in backup file creation...
695          * Thanks *greatly* to "David W. Chapman Jr." <dwcjr@inethouston.net>
696          * for helping track this one down. It didn't bite us in 2.0.x
697          * as we always opened files read-write in that release. JRA.
698          */
699
700         if ((accmode == O_RDONLY) && ((flags & O_TRUNC) == O_TRUNC)) {
701                 DEBUG(10,("open_file: truncate requested on read-only open "
702                           "for file %s\n", smb_fname_str_dbg(smb_fname)));
703                 local_flags = (flags & ~O_ACCMODE)|O_RDWR;
704         }
705
706         if ((open_access_mask & (FILE_READ_DATA|FILE_WRITE_DATA|FILE_APPEND_DATA|FILE_EXECUTE)) ||
707             (!file_existed && (local_flags & O_CREAT)) ||
708             ((local_flags & O_TRUNC) == O_TRUNC) ) {
709                 const char *wild;
710                 int ret;
711
712                 /*
713                  * We can't actually truncate here as the file may be locked.
714                  * open_file_ntcreate will take care of the truncate later. JRA.
715                  */
716
717                 local_flags &= ~O_TRUNC;
718
719 #if defined(O_NONBLOCK) && defined(S_ISFIFO)
720                 /*
721                  * We would block on opening a FIFO with no one else on the
722                  * other end. Do what we used to do and add O_NONBLOCK to the
723                  * open flags. JRA.
724                  */
725
726                 if (file_existed && S_ISFIFO(smb_fname->st.st_ex_mode)) {
727                         local_flags |= O_NONBLOCK;
728                 }
729 #endif
730
731                 /* Don't create files with Microsoft wildcard characters. */
732                 if (fsp->base_fsp) {
733                         /*
734                          * wildcard characters are allowed in stream names
735                          * only test the basefilename
736                          */
737                         wild = fsp->base_fsp->fsp_name->base_name;
738                 } else {
739                         wild = smb_fname->base_name;
740                 }
741                 if ((local_flags & O_CREAT) && !file_existed &&
742                     ms_has_wild(wild))  {
743                         return NT_STATUS_OBJECT_NAME_INVALID;
744                 }
745
746                 /* Can we access this file ? */
747                 if (!fsp->base_fsp) {
748                         /* Only do this check on non-stream open. */
749                         if (file_existed) {
750                                 status = smbd_check_access_rights(conn,
751                                                 smb_fname,
752                                                 access_mask);
753                         } else if (local_flags & O_CREAT){
754                                 status = check_parent_access(conn,
755                                                 smb_fname,
756                                                 SEC_DIR_ADD_FILE);
757                         } else {
758                                 /* File didn't exist and no O_CREAT. */
759                                 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
760                         }
761                         if (!NT_STATUS_IS_OK(status)) {
762                                 DEBUG(10,("open_file: "
763                                         "%s on file "
764                                         "%s returned %s\n",
765                                         file_existed ?
766                                                 "smbd_check_access_rights" :
767                                                 "check_parent_access",
768                                         smb_fname_str_dbg(smb_fname),
769                                         nt_errstr(status) ));
770                                 return status;
771                         }
772                 }
773
774                 /* Actually do the open */
775                 status = fd_open_atomic(conn, fsp, local_flags,
776                                 unx_mode, p_file_created);
777                 if (!NT_STATUS_IS_OK(status)) {
778                         DEBUG(3,("Error opening file %s (%s) (local_flags=%d) "
779                                  "(flags=%d)\n", smb_fname_str_dbg(smb_fname),
780                                  nt_errstr(status),local_flags,flags));
781                         return status;
782                 }
783
784                 ret = SMB_VFS_FSTAT(fsp, &smb_fname->st);
785                 if (ret == -1) {
786                         /* If we have an fd, this stat should succeed. */
787                         DEBUG(0,("Error doing fstat on open file %s "
788                                 "(%s)\n",
789                                 smb_fname_str_dbg(smb_fname),
790                                 strerror(errno) ));
791                         status = map_nt_error_from_unix(errno);
792                         fd_close(fsp);
793                         return status;
794                 }
795
796                 if (*p_file_created) {
797                         /* We created this file. */
798
799                         bool need_re_stat = false;
800                         /* Do all inheritance work after we've
801                            done a successful fstat call and filled
802                            in the stat struct in fsp->fsp_name. */
803
804                         /* Inherit the ACL if required */
805                         if (lp_inherit_perms(SNUM(conn))) {
806                                 inherit_access_posix_acl(conn, parent_dir,
807                                                          smb_fname->base_name,
808                                                          unx_mode);
809                                 need_re_stat = true;
810                         }
811
812                         /* Change the owner if required. */
813                         if (lp_inherit_owner(SNUM(conn))) {
814                                 change_file_owner_to_parent(conn, parent_dir,
815                                                             fsp);
816                                 need_re_stat = true;
817                         }
818
819                         if (need_re_stat) {
820                                 ret = SMB_VFS_FSTAT(fsp, &smb_fname->st);
821                                 /* If we have an fd, this stat should succeed. */
822                                 if (ret == -1) {
823                                         DEBUG(0,("Error doing fstat on open file %s "
824                                                  "(%s)\n",
825                                                  smb_fname_str_dbg(smb_fname),
826                                                  strerror(errno) ));
827                                 }
828                         }
829
830                         notify_fname(conn, NOTIFY_ACTION_ADDED,
831                                      FILE_NOTIFY_CHANGE_FILE_NAME,
832                                      smb_fname->base_name);
833                 }
834         } else {
835                 fsp->fh->fd = -1; /* What we used to call a stat open. */
836                 if (!file_existed) {
837                         /* File must exist for a stat open. */
838                         return NT_STATUS_OBJECT_NAME_NOT_FOUND;
839                 }
840
841                 status = smbd_check_access_rights(conn,
842                                 smb_fname,
843                                 access_mask);
844
845                 if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND) &&
846                                 fsp->posix_open &&
847                                 S_ISLNK(smb_fname->st.st_ex_mode)) {
848                         /* This is a POSIX stat open for delete
849                          * or rename on a symlink that points
850                          * nowhere. Allow. */
851                         DEBUG(10,("open_file: allowing POSIX "
852                                   "open on bad symlink %s\n",
853                                   smb_fname_str_dbg(smb_fname)));
854                         status = NT_STATUS_OK;
855                 }
856
857                 if (!NT_STATUS_IS_OK(status)) {
858                         DEBUG(10,("open_file: "
859                                 "smbd_check_access_rights on file "
860                                 "%s returned %s\n",
861                                 smb_fname_str_dbg(smb_fname),
862                                 nt_errstr(status) ));
863                         return status;
864                 }
865         }
866
867         /*
868          * POSIX allows read-only opens of directories. We don't
869          * want to do this (we use a different code path for this)
870          * so catch a directory open and return an EISDIR. JRA.
871          */
872
873         if(S_ISDIR(smb_fname->st.st_ex_mode)) {
874                 fd_close(fsp);
875                 errno = EISDIR;
876                 return NT_STATUS_FILE_IS_A_DIRECTORY;
877         }
878
879         fsp->file_id = vfs_file_id_from_sbuf(conn, &smb_fname->st);
880         fsp->vuid = req ? req->vuid : UID_FIELD_INVALID;
881         fsp->file_pid = req ? req->smbpid : 0;
882         fsp->can_lock = True;
883         fsp->can_read = ((access_mask & FILE_READ_DATA) != 0);
884         fsp->can_write =
885                 CAN_WRITE(conn) &&
886                 ((access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) != 0);
887         fsp->print_file = NULL;
888         fsp->modified = False;
889         fsp->sent_oplock_break = NO_BREAK_SENT;
890         fsp->is_directory = False;
891         if (conn->aio_write_behind_list &&
892             is_in_path(smb_fname->base_name, conn->aio_write_behind_list,
893                        conn->case_sensitive)) {
894                 fsp->aio_write_behind = True;
895         }
896
897         fsp->wcp = NULL; /* Write cache pointer. */
898
899         DEBUG(2,("%s opened file %s read=%s write=%s (numopen=%d)\n",
900                  conn->session_info->unix_info->unix_name,
901                  smb_fname_str_dbg(smb_fname),
902                  BOOLSTR(fsp->can_read), BOOLSTR(fsp->can_write),
903                  conn->num_files_open));
904
905         errno = 0;
906         return NT_STATUS_OK;
907 }
908
909 /****************************************************************************
910  Check if we can open a file with a share mode.
911  Returns True if conflict, False if not.
912 ****************************************************************************/
913
914 static bool share_conflict(struct share_mode_entry *entry,
915                            uint32 access_mask,
916                            uint32 share_access)
917 {
918         DEBUG(10,("share_conflict: entry->access_mask = 0x%x, "
919                   "entry->share_access = 0x%x, "
920                   "entry->private_options = 0x%x\n",
921                   (unsigned int)entry->access_mask,
922                   (unsigned int)entry->share_access,
923                   (unsigned int)entry->private_options));
924
925         DEBUG(10,("share_conflict: access_mask = 0x%x, share_access = 0x%x\n",
926                   (unsigned int)access_mask, (unsigned int)share_access));
927
928         if ((entry->access_mask & (FILE_WRITE_DATA|
929                                    FILE_APPEND_DATA|
930                                    FILE_READ_DATA|
931                                    FILE_EXECUTE|
932                                    DELETE_ACCESS)) == 0) {
933                 DEBUG(10,("share_conflict: No conflict due to "
934                           "entry->access_mask = 0x%x\n",
935                           (unsigned int)entry->access_mask ));
936                 return False;
937         }
938
939         if ((access_mask & (FILE_WRITE_DATA|
940                             FILE_APPEND_DATA|
941                             FILE_READ_DATA|
942                             FILE_EXECUTE|
943                             DELETE_ACCESS)) == 0) {
944                 DEBUG(10,("share_conflict: No conflict due to "
945                           "access_mask = 0x%x\n",
946                           (unsigned int)access_mask ));
947                 return False;
948         }
949
950 #if 1 /* JRA TEST - Superdebug. */
951 #define CHECK_MASK(num, am, right, sa, share) \
952         DEBUG(10,("share_conflict: [%d] am (0x%x) & right (0x%x) = 0x%x\n", \
953                 (unsigned int)(num), (unsigned int)(am), \
954                 (unsigned int)(right), (unsigned int)(am)&(right) )); \
955         DEBUG(10,("share_conflict: [%d] sa (0x%x) & share (0x%x) = 0x%x\n", \
956                 (unsigned int)(num), (unsigned int)(sa), \
957                 (unsigned int)(share), (unsigned int)(sa)&(share) )); \
958         if (((am) & (right)) && !((sa) & (share))) { \
959                 DEBUG(10,("share_conflict: check %d conflict am = 0x%x, right = 0x%x, \
960 sa = 0x%x, share = 0x%x\n", (num), (unsigned int)(am), (unsigned int)(right), (unsigned int)(sa), \
961                         (unsigned int)(share) )); \
962                 return True; \
963         }
964 #else
965 #define CHECK_MASK(num, am, right, sa, share) \
966         if (((am) & (right)) && !((sa) & (share))) { \
967                 DEBUG(10,("share_conflict: check %d conflict am = 0x%x, right = 0x%x, \
968 sa = 0x%x, share = 0x%x\n", (num), (unsigned int)(am), (unsigned int)(right), (unsigned int)(sa), \
969                         (unsigned int)(share) )); \
970                 return True; \
971         }
972 #endif
973
974         CHECK_MASK(1, entry->access_mask, FILE_WRITE_DATA | FILE_APPEND_DATA,
975                    share_access, FILE_SHARE_WRITE);
976         CHECK_MASK(2, access_mask, FILE_WRITE_DATA | FILE_APPEND_DATA,
977                    entry->share_access, FILE_SHARE_WRITE);
978
979         CHECK_MASK(3, entry->access_mask, FILE_READ_DATA | FILE_EXECUTE,
980                    share_access, FILE_SHARE_READ);
981         CHECK_MASK(4, access_mask, FILE_READ_DATA | FILE_EXECUTE,
982                    entry->share_access, FILE_SHARE_READ);
983
984         CHECK_MASK(5, entry->access_mask, DELETE_ACCESS,
985                    share_access, FILE_SHARE_DELETE);
986         CHECK_MASK(6, access_mask, DELETE_ACCESS,
987                    entry->share_access, FILE_SHARE_DELETE);
988
989         DEBUG(10,("share_conflict: No conflict.\n"));
990         return False;
991 }
992
993 #if defined(DEVELOPER)
994 static void validate_my_share_entries(struct smbd_server_connection *sconn,
995                                       int num,
996                                       struct share_mode_entry *share_entry)
997 {
998         struct server_id self = messaging_server_id(sconn->msg_ctx);
999         files_struct *fsp;
1000
1001         if (!serverid_equal(&self, &share_entry->pid)) {
1002                 return;
1003         }
1004
1005         if (is_deferred_open_entry(share_entry) &&
1006             !open_was_deferred(sconn, share_entry->op_mid)) {
1007                 char *str = talloc_asprintf(talloc_tos(),
1008                         "Got a deferred entry without a request: "
1009                         "PANIC: %s\n",
1010                         share_mode_str(talloc_tos(), num, share_entry));
1011                 smb_panic(str);
1012         }
1013
1014         if (!is_valid_share_mode_entry(share_entry)) {
1015                 return;
1016         }
1017
1018         fsp = file_find_dif(sconn, share_entry->id,
1019                             share_entry->share_file_id);
1020         if (!fsp) {
1021                 DEBUG(0,("validate_my_share_entries: PANIC : %s\n",
1022                          share_mode_str(talloc_tos(), num, share_entry) ));
1023                 smb_panic("validate_my_share_entries: Cannot match a "
1024                           "share entry with an open file\n");
1025         }
1026
1027         if (is_deferred_open_entry(share_entry)) {
1028                 goto panic;
1029         }
1030
1031         if ((share_entry->op_type == NO_OPLOCK) &&
1032             (fsp->oplock_type == FAKE_LEVEL_II_OPLOCK)) {
1033                 /* Someone has already written to it, but I haven't yet
1034                  * noticed */
1035                 return;
1036         }
1037
1038         if (((uint16)fsp->oplock_type) != share_entry->op_type) {
1039                 goto panic;
1040         }
1041
1042         return;
1043
1044  panic:
1045         {
1046                 char *str;
1047                 DEBUG(0,("validate_my_share_entries: PANIC : %s\n",
1048                          share_mode_str(talloc_tos(), num, share_entry) ));
1049                 str = talloc_asprintf(talloc_tos(),
1050                         "validate_my_share_entries: "
1051                         "file %s, oplock_type = 0x%x, op_type = 0x%x\n",
1052                          fsp->fsp_name->base_name,
1053                          (unsigned int)fsp->oplock_type,
1054                          (unsigned int)share_entry->op_type );
1055                 smb_panic(str);
1056         }
1057 }
1058 #endif
1059
1060 bool is_stat_open(uint32 access_mask)
1061 {
1062         return (access_mask &&
1063                 ((access_mask & ~(SYNCHRONIZE_ACCESS| FILE_READ_ATTRIBUTES|
1064                                   FILE_WRITE_ATTRIBUTES))==0) &&
1065                 ((access_mask & (SYNCHRONIZE_ACCESS|FILE_READ_ATTRIBUTES|
1066                                  FILE_WRITE_ATTRIBUTES)) != 0));
1067 }
1068
1069 /****************************************************************************
1070  Deal with share modes
1071  Invarient: Share mode must be locked on entry and exit.
1072  Returns -1 on error, or number of share modes on success (may be zero).
1073 ****************************************************************************/
1074
1075 static NTSTATUS open_mode_check(connection_struct *conn,
1076                                 struct share_mode_lock *lck,
1077                                 uint32_t name_hash,
1078                                 uint32 access_mask,
1079                                 uint32 share_access,
1080                                 uint32 create_options,
1081                                 bool *file_existed)
1082 {
1083         int i;
1084
1085         if(lck->data->num_share_modes == 0) {
1086                 return NT_STATUS_OK;
1087         }
1088
1089         /* A delete on close prohibits everything */
1090
1091         if (is_delete_on_close_set(lck, name_hash)) {
1092                 /*
1093                  * Check the delete on close token
1094                  * is valid. It could have been left
1095                  * after a server crash.
1096                  */
1097                 for(i = 0; i < lck->data->num_share_modes; i++) {
1098                         if (!share_mode_stale_pid(lck->data, i)) {
1099
1100                                 *file_existed = true;
1101
1102                                 return NT_STATUS_DELETE_PENDING;
1103                         }
1104                 }
1105                 return NT_STATUS_OK;
1106         }
1107
1108         if (is_stat_open(access_mask)) {
1109                 /* Stat open that doesn't trigger oplock breaks or share mode
1110                  * checks... ! JRA. */
1111                 return NT_STATUS_OK;
1112         }
1113
1114         /*
1115          * Check if the share modes will give us access.
1116          */
1117
1118 #if defined(DEVELOPER)
1119         for(i = 0; i < lck->data->num_share_modes; i++) {
1120                 validate_my_share_entries(conn->sconn, i,
1121                                           &lck->data->share_modes[i]);
1122         }
1123 #endif
1124
1125         /* Now we check the share modes, after any oplock breaks. */
1126         for(i = 0; i < lck->data->num_share_modes; i++) {
1127
1128                 if (!is_valid_share_mode_entry(&lck->data->share_modes[i])) {
1129                         continue;
1130                 }
1131
1132                 /* someone else has a share lock on it, check to see if we can
1133                  * too */
1134                 if (share_conflict(&lck->data->share_modes[i],
1135                                    access_mask, share_access)) {
1136
1137                         if (share_mode_stale_pid(lck->data, i)) {
1138                                 continue;
1139                         }
1140
1141                         *file_existed = true;
1142
1143                         return NT_STATUS_SHARING_VIOLATION;
1144                 }
1145         }
1146
1147         if (lck->data->num_share_modes != 0) {
1148                 *file_existed = true;
1149         }
1150
1151         return NT_STATUS_OK;
1152 }
1153
1154 static bool is_delete_request(files_struct *fsp) {
1155         return ((fsp->access_mask == DELETE_ACCESS) &&
1156                 (fsp->oplock_type == NO_OPLOCK));
1157 }
1158
1159 /*
1160  * Send a break message to the oplock holder and delay the open for
1161  * our client.
1162  */
1163
1164 static NTSTATUS send_break_message(files_struct *fsp,
1165                                         struct share_mode_entry *exclusive,
1166                                         uint64_t mid,
1167                                         int oplock_request)
1168 {
1169         NTSTATUS status;
1170         char msg[MSG_SMB_SHARE_MODE_ENTRY_SIZE];
1171
1172         DEBUG(10, ("Sending break request to PID %s\n",
1173                    procid_str_static(&exclusive->pid)));
1174         exclusive->op_mid = mid;
1175
1176         /* Create the message. */
1177         share_mode_entry_to_message(msg, exclusive);
1178
1179         /* Add in the FORCE_OPLOCK_BREAK_TO_NONE bit in the message if set. We
1180            don't want this set in the share mode struct pointed to by lck. */
1181
1182         if (oplock_request & FORCE_OPLOCK_BREAK_TO_NONE) {
1183                 SSVAL(msg,OP_BREAK_MSG_OP_TYPE_OFFSET,
1184                         exclusive->op_type | FORCE_OPLOCK_BREAK_TO_NONE);
1185         }
1186
1187         status = messaging_send_buf(fsp->conn->sconn->msg_ctx, exclusive->pid,
1188                                     MSG_SMB_BREAK_REQUEST,
1189                                     (uint8 *)msg,
1190                                     MSG_SMB_SHARE_MODE_ENTRY_SIZE);
1191         if (!NT_STATUS_IS_OK(status)) {
1192                 DEBUG(3, ("Could not send oplock break message: %s\n",
1193                           nt_errstr(status)));
1194         }
1195
1196         return status;
1197 }
1198
1199 /*
1200  * Return share_mode_entry pointers for :
1201  * 1). Batch oplock entry.
1202  * 2). Batch or exclusive oplock entry (may be identical to #1).
1203  * bool have_level2_oplock
1204  * bool have_no_oplock.
1205  * Do internal consistency checks on the share mode for a file.
1206  */
1207
1208 static void find_oplock_types(files_struct *fsp,
1209                                 int oplock_request,
1210                                 const struct share_mode_lock *lck,
1211                                 struct share_mode_entry **pp_batch,
1212                                 struct share_mode_entry **pp_ex_or_batch,
1213                                 bool *got_level2,
1214                                 bool *got_no_oplock)
1215 {
1216         int i;
1217
1218         *pp_batch = NULL;
1219         *pp_ex_or_batch = NULL;
1220         *got_level2 = false;
1221         *got_no_oplock = false;
1222
1223         /* Ignore stat or internal opens, as is done in
1224                 delay_for_batch_oplocks() and
1225                 delay_for_exclusive_oplocks().
1226          */
1227         if ((oplock_request & INTERNAL_OPEN_ONLY) || is_stat_open(fsp->access_mask)) {
1228                 return;
1229         }
1230
1231         for (i=0; i<lck->data->num_share_modes; i++) {
1232                 if (!is_valid_share_mode_entry(&lck->data->share_modes[i])) {
1233                         continue;
1234                 }
1235
1236                 if (lck->data->share_modes[i].op_type == NO_OPLOCK &&
1237                                 is_stat_open(lck->data->share_modes[i].access_mask)) {
1238                         /* We ignore stat opens in the table - they
1239                            always have NO_OPLOCK and never get or
1240                            cause breaks. JRA. */
1241                         continue;
1242                 }
1243
1244                 if (BATCH_OPLOCK_TYPE(lck->data->share_modes[i].op_type)) {
1245                         /* batch - can only be one. */
1246                         if (share_mode_stale_pid(lck->data, i)) {
1247                                 DEBUG(10, ("Found stale batch oplock\n"));
1248                                 continue;
1249                         }
1250                         if (*pp_ex_or_batch || *pp_batch || *got_level2 || *got_no_oplock) {
1251                                 smb_panic("Bad batch oplock entry.");
1252                         }
1253                         *pp_batch = &lck->data->share_modes[i];
1254                 }
1255
1256                 if (EXCLUSIVE_OPLOCK_TYPE(lck->data->share_modes[i].op_type)) {
1257                         if (share_mode_stale_pid(lck->data, i)) {
1258                                 DEBUG(10, ("Found stale duplicate oplock\n"));
1259                                 continue;
1260                         }
1261                         /* Exclusive or batch - can only be one. */
1262                         if (*pp_ex_or_batch || *got_level2 || *got_no_oplock) {
1263                                 smb_panic("Bad exclusive or batch oplock entry.");
1264                         }
1265                         *pp_ex_or_batch = &lck->data->share_modes[i];
1266                 }
1267
1268                 if (LEVEL_II_OPLOCK_TYPE(lck->data->share_modes[i].op_type)) {
1269                         if (*pp_batch || *pp_ex_or_batch) {
1270                                 if (share_mode_stale_pid(lck->data, i)) {
1271                                         DEBUG(10, ("Found stale LevelII "
1272                                                    "oplock\n"));
1273                                         continue;
1274                                 }
1275                                 smb_panic("Bad levelII oplock entry.");
1276                         }
1277                         *got_level2 = true;
1278                 }
1279
1280                 if (lck->data->share_modes[i].op_type == NO_OPLOCK) {
1281                         if (*pp_batch || *pp_ex_or_batch) {
1282                                 if (share_mode_stale_pid(lck->data, i)) {
1283                                         DEBUG(10, ("Found stale NO_OPLOCK "
1284                                                    "entry\n"));
1285                                         continue;
1286                                 }
1287                                 smb_panic("Bad no oplock entry.");
1288                         }
1289                         *got_no_oplock = true;
1290                 }
1291         }
1292 }
1293
1294 static bool delay_for_batch_oplocks(files_struct *fsp,
1295                                         uint64_t mid,
1296                                         int oplock_request,
1297                                         struct share_mode_entry *batch_entry)
1298 {
1299         if ((oplock_request & INTERNAL_OPEN_ONLY) || is_stat_open(fsp->access_mask)) {
1300                 return false;
1301         }
1302         if (batch_entry == NULL) {
1303                 return false;
1304         }
1305
1306         /* Found a batch oplock */
1307         send_break_message(fsp, batch_entry, mid, oplock_request);
1308         return true;
1309 }
1310
1311 static bool delay_for_exclusive_oplocks(files_struct *fsp,
1312                                         uint64_t mid,
1313                                         int oplock_request,
1314                                         struct share_mode_entry *ex_entry)
1315 {
1316         bool delay_it;
1317
1318         if ((oplock_request & INTERNAL_OPEN_ONLY) || is_stat_open(fsp->access_mask)) {
1319                 return false;
1320         }
1321         if (ex_entry == NULL) {
1322                 return false;
1323         }
1324
1325         /* Found an exclusive or batch oplock */
1326
1327         delay_it = is_delete_request(fsp) ?
1328                 BATCH_OPLOCK_TYPE(ex_entry->op_type) : true;
1329
1330         if (!delay_it) {
1331                 return false;
1332         }
1333
1334         send_break_message(fsp, ex_entry, mid, oplock_request);
1335         return true;
1336 }
1337
1338 static bool file_has_brlocks(files_struct *fsp)
1339 {
1340         struct byte_range_lock *br_lck;
1341
1342         br_lck = brl_get_locks_readonly(fsp);
1343         if (!br_lck)
1344                 return false;
1345
1346         return br_lck->num_locks > 0 ? true : false;
1347 }
1348
1349 static void grant_fsp_oplock_type(files_struct *fsp,
1350                                 int oplock_request,
1351                                 bool got_level2_oplock,
1352                                 bool got_a_none_oplock)
1353 {
1354         bool allow_level2 = (global_client_caps & CAP_LEVEL_II_OPLOCKS) &&
1355                             lp_level2_oplocks(SNUM(fsp->conn));
1356
1357         /* Start by granting what the client asked for,
1358            but ensure no SAMBA_PRIVATE bits can be set. */
1359         fsp->oplock_type = (oplock_request & ~SAMBA_PRIVATE_OPLOCK_MASK);
1360
1361         if (oplock_request & INTERNAL_OPEN_ONLY) {
1362                 /* No oplocks on internal open. */
1363                 fsp->oplock_type = NO_OPLOCK;
1364                 DEBUG(10,("grant_fsp_oplock_type: oplock type 0x%x on file %s\n",
1365                         fsp->oplock_type, fsp_str_dbg(fsp)));
1366                 return;
1367         }
1368
1369         if (lp_locking(fsp->conn->params) && file_has_brlocks(fsp)) {
1370                 DEBUG(10,("grant_fsp_oplock_type: file %s has byte range locks\n",
1371                         fsp_str_dbg(fsp)));
1372                 fsp->oplock_type = NO_OPLOCK;
1373         }
1374
1375         if (is_stat_open(fsp->access_mask)) {
1376                 /* Leave the value already set. */
1377                 DEBUG(10,("grant_fsp_oplock_type: oplock type 0x%x on file %s\n",
1378                         fsp->oplock_type, fsp_str_dbg(fsp)));
1379                 return;
1380         }
1381
1382         /*
1383          * Match what was requested (fsp->oplock_type) with
1384          * what was found in the existing share modes.
1385          */
1386
1387         if (got_a_none_oplock) {
1388                 fsp->oplock_type = NO_OPLOCK;
1389         } else if (got_level2_oplock) {
1390                 if (fsp->oplock_type == NO_OPLOCK ||
1391                                 fsp->oplock_type == FAKE_LEVEL_II_OPLOCK) {
1392                         /* Store a level2 oplock, but don't tell the client */
1393                         fsp->oplock_type = FAKE_LEVEL_II_OPLOCK;
1394                 } else {
1395                         fsp->oplock_type = LEVEL_II_OPLOCK;
1396                 }
1397         } else {
1398                 /* All share_mode_entries are placeholders or deferred.
1399                  * Silently upgrade to fake levelII if the client didn't
1400                  * ask for an oplock. */
1401                 if (fsp->oplock_type == NO_OPLOCK) {
1402                         /* Store a level2 oplock, but don't tell the client */
1403                         fsp->oplock_type = FAKE_LEVEL_II_OPLOCK;
1404                 }
1405         }
1406
1407         /*
1408          * Don't grant level2 to clients that don't want them
1409          * or if we've turned them off.
1410          */
1411         if (fsp->oplock_type == LEVEL_II_OPLOCK && !allow_level2) {
1412                 fsp->oplock_type = FAKE_LEVEL_II_OPLOCK;
1413         }
1414
1415         DEBUG(10,("grant_fsp_oplock_type: oplock type 0x%x on file %s\n",
1416                   fsp->oplock_type, fsp_str_dbg(fsp)));
1417 }
1418
1419 bool request_timed_out(struct timeval request_time,
1420                        struct timeval timeout)
1421 {
1422         struct timeval now, end_time;
1423         GetTimeOfDay(&now);
1424         end_time = timeval_sum(&request_time, &timeout);
1425         return (timeval_compare(&end_time, &now) < 0);
1426 }
1427
1428 /****************************************************************************
1429  Handle the 1 second delay in returning a SHARING_VIOLATION error.
1430 ****************************************************************************/
1431
1432 static void defer_open(struct share_mode_lock *lck,
1433                        struct timeval request_time,
1434                        struct timeval timeout,
1435                        struct smb_request *req,
1436                        struct deferred_open_record *state)
1437 {
1438         struct server_id self = messaging_server_id(req->sconn->msg_ctx);
1439
1440         /* Paranoia check */
1441
1442         if (lck) {
1443                 int i;
1444
1445                 for (i=0; i<lck->data->num_share_modes; i++) {
1446                         struct share_mode_entry *e = &lck->data->share_modes[i];
1447
1448                         if (is_deferred_open_entry(e) &&
1449                             serverid_equal(&self, &e->pid) &&
1450                             (e->op_mid == req->mid)) {
1451                                 DEBUG(0, ("Trying to defer an already deferred "
1452                                         "request: mid=%llu, exiting\n",
1453                                         (unsigned long long)req->mid));
1454                                 exit_server("attempt to defer a deferred request");
1455                         }
1456                 }
1457         }
1458
1459         /* End paranoia check */
1460
1461         DEBUG(10,("defer_open_sharing_error: time [%u.%06u] adding deferred "
1462                   "open entry for mid %llu\n",
1463                   (unsigned int)request_time.tv_sec,
1464                   (unsigned int)request_time.tv_usec,
1465                   (unsigned long long)req->mid));
1466
1467         if (!push_deferred_open_message_smb(req, request_time, timeout,
1468                                        state->id, (char *)state, sizeof(*state))) {
1469                 exit_server("push_deferred_open_message_smb failed");
1470         }
1471         if (lck) {
1472                 add_deferred_open(lck, req->mid, request_time, self, state->id);
1473         }
1474 }
1475
1476
1477 /****************************************************************************
1478  On overwrite open ensure that the attributes match.
1479 ****************************************************************************/
1480
1481 bool open_match_attributes(connection_struct *conn,
1482                            uint32 old_dos_attr,
1483                            uint32 new_dos_attr,
1484                            mode_t existing_unx_mode,
1485                            mode_t new_unx_mode,
1486                            mode_t *returned_unx_mode)
1487 {
1488         uint32 noarch_old_dos_attr, noarch_new_dos_attr;
1489
1490         noarch_old_dos_attr = (old_dos_attr & ~FILE_ATTRIBUTE_ARCHIVE);
1491         noarch_new_dos_attr = (new_dos_attr & ~FILE_ATTRIBUTE_ARCHIVE);
1492
1493         if((noarch_old_dos_attr == 0 && noarch_new_dos_attr != 0) || 
1494            (noarch_old_dos_attr != 0 && ((noarch_old_dos_attr & noarch_new_dos_attr) == noarch_old_dos_attr))) {
1495                 *returned_unx_mode = new_unx_mode;
1496         } else {
1497                 *returned_unx_mode = (mode_t)0;
1498         }
1499
1500         DEBUG(10,("open_match_attributes: old_dos_attr = 0x%x, "
1501                   "existing_unx_mode = 0%o, new_dos_attr = 0x%x "
1502                   "returned_unx_mode = 0%o\n",
1503                   (unsigned int)old_dos_attr,
1504                   (unsigned int)existing_unx_mode,
1505                   (unsigned int)new_dos_attr,
1506                   (unsigned int)*returned_unx_mode ));
1507
1508         /* If we're mapping SYSTEM and HIDDEN ensure they match. */
1509         if (lp_map_system(SNUM(conn)) || lp_store_dos_attributes(SNUM(conn))) {
1510                 if ((old_dos_attr & FILE_ATTRIBUTE_SYSTEM) &&
1511                     !(new_dos_attr & FILE_ATTRIBUTE_SYSTEM)) {
1512                         return False;
1513                 }
1514         }
1515         if (lp_map_hidden(SNUM(conn)) || lp_store_dos_attributes(SNUM(conn))) {
1516                 if ((old_dos_attr & FILE_ATTRIBUTE_HIDDEN) &&
1517                     !(new_dos_attr & FILE_ATTRIBUTE_HIDDEN)) {
1518                         return False;
1519                 }
1520         }
1521         return True;
1522 }
1523
1524 /****************************************************************************
1525  Special FCB or DOS processing in the case of a sharing violation.
1526  Try and find a duplicated file handle.
1527 ****************************************************************************/
1528
1529 static NTSTATUS fcb_or_dos_open(struct smb_request *req,
1530                                 connection_struct *conn,
1531                                 files_struct *fsp_to_dup_into,
1532                                 const struct smb_filename *smb_fname,
1533                                 struct file_id id,
1534                                 uint16 file_pid,
1535                                 uint64_t vuid,
1536                                 uint32 access_mask,
1537                                 uint32 share_access,
1538                                 uint32 create_options)
1539 {
1540         files_struct *fsp;
1541
1542         DEBUG(5,("fcb_or_dos_open: attempting old open semantics for "
1543                  "file %s.\n", smb_fname_str_dbg(smb_fname)));
1544
1545         for(fsp = file_find_di_first(conn->sconn, id); fsp;
1546             fsp = file_find_di_next(fsp)) {
1547
1548                 DEBUG(10,("fcb_or_dos_open: checking file %s, fd = %d, "
1549                           "vuid = %llu, file_pid = %u, private_options = 0x%x "
1550                           "access_mask = 0x%x\n", fsp_str_dbg(fsp),
1551                           fsp->fh->fd, (unsigned long long)fsp->vuid,
1552                           (unsigned int)fsp->file_pid,
1553                           (unsigned int)fsp->fh->private_options,
1554                           (unsigned int)fsp->access_mask ));
1555
1556                 if (fsp->fh->fd != -1 &&
1557                     fsp->vuid == vuid &&
1558                     fsp->file_pid == file_pid &&
1559                     (fsp->fh->private_options & (NTCREATEX_OPTIONS_PRIVATE_DENY_DOS |
1560                                                  NTCREATEX_OPTIONS_PRIVATE_DENY_FCB)) &&
1561                     (fsp->access_mask & FILE_WRITE_DATA) &&
1562                     strequal(fsp->fsp_name->base_name, smb_fname->base_name) &&
1563                     strequal(fsp->fsp_name->stream_name,
1564                              smb_fname->stream_name)) {
1565                         DEBUG(10,("fcb_or_dos_open: file match\n"));
1566                         break;
1567                 }
1568         }
1569
1570         if (!fsp) {
1571                 return NT_STATUS_NOT_FOUND;
1572         }
1573
1574         /* quite an insane set of semantics ... */
1575         if (is_executable(smb_fname->base_name) &&
1576             (fsp->fh->private_options & NTCREATEX_OPTIONS_PRIVATE_DENY_DOS)) {
1577                 DEBUG(10,("fcb_or_dos_open: file fail due to is_executable.\n"));
1578                 return NT_STATUS_INVALID_PARAMETER;
1579         }
1580
1581         /* We need to duplicate this fsp. */
1582         return dup_file_fsp(req, fsp, access_mask, share_access,
1583                             create_options, fsp_to_dup_into);
1584 }
1585
1586 static void schedule_defer_open(struct share_mode_lock *lck,
1587                                 struct timeval request_time,
1588                                 struct smb_request *req)
1589 {
1590         struct deferred_open_record state;
1591
1592         /* This is a relative time, added to the absolute
1593            request_time value to get the absolute timeout time.
1594            Note that if this is the second or greater time we enter
1595            this codepath for this particular request mid then
1596            request_time is left as the absolute time of the *first*
1597            time this request mid was processed. This is what allows
1598            the request to eventually time out. */
1599
1600         struct timeval timeout;
1601
1602         /* Normally the smbd we asked should respond within
1603          * OPLOCK_BREAK_TIMEOUT seconds regardless of whether
1604          * the client did, give twice the timeout as a safety
1605          * measure here in case the other smbd is stuck
1606          * somewhere else. */
1607
1608         timeout = timeval_set(OPLOCK_BREAK_TIMEOUT*2, 0);
1609
1610         /* Nothing actually uses state.delayed_for_oplocks
1611            but it's handy to differentiate in debug messages
1612            between a 30 second delay due to oplock break, and
1613            a 1 second delay for share mode conflicts. */
1614
1615         state.delayed_for_oplocks = True;
1616         state.async_open = false;
1617         state.id = lck->data->id;
1618
1619         if (!request_timed_out(request_time, timeout)) {
1620                 defer_open(lck, request_time, timeout, req, &state);
1621         }
1622 }
1623
1624 /****************************************************************************
1625  Reschedule an open call that went asynchronous.
1626 ****************************************************************************/
1627
1628 static void schedule_async_open(struct timeval request_time,
1629                                 struct smb_request *req)
1630 {
1631         struct deferred_open_record state;
1632         struct timeval timeout;
1633
1634         timeout = timeval_set(20, 0);
1635
1636         ZERO_STRUCT(state);
1637         state.delayed_for_oplocks = false;
1638         state.async_open = true;
1639
1640         if (!request_timed_out(request_time, timeout)) {
1641                 defer_open(NULL, request_time, timeout, req, &state);
1642         }
1643 }
1644
1645 /****************************************************************************
1646  Work out what access_mask to use from what the client sent us.
1647 ****************************************************************************/
1648
1649 static NTSTATUS smbd_calculate_maximum_allowed_access(
1650         connection_struct *conn,
1651         const struct smb_filename *smb_fname,
1652         uint32_t *p_access_mask)
1653 {
1654         struct security_descriptor *sd;
1655         uint32_t access_granted;
1656         NTSTATUS status;
1657
1658         if (get_current_uid(conn) == (uid_t)0) {
1659                 *p_access_mask |= FILE_GENERIC_ALL;
1660                 return NT_STATUS_OK;
1661         }
1662
1663         status = SMB_VFS_GET_NT_ACL(conn, smb_fname->base_name,
1664                                     (SECINFO_OWNER |
1665                                      SECINFO_GROUP |
1666                                      SECINFO_DACL),&sd);
1667
1668         if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1669                 /*
1670                  * File did not exist
1671                  */
1672                 *p_access_mask = FILE_GENERIC_ALL;
1673                 return NT_STATUS_OK;
1674         }
1675         if (!NT_STATUS_IS_OK(status)) {
1676                 DEBUG(10,("smbd_calculate_access_mask: "
1677                           "Could not get acl on file %s: %s\n",
1678                           smb_fname_str_dbg(smb_fname),
1679                           nt_errstr(status)));
1680                 return NT_STATUS_ACCESS_DENIED;
1681         }
1682
1683         /*
1684          * Never test FILE_READ_ATTRIBUTES. se_access_check()
1685          * also takes care of owner WRITE_DAC and READ_CONTROL.
1686          */
1687         status = se_access_check(sd,
1688                                  get_current_nttok(conn),
1689                                  (*p_access_mask & ~FILE_READ_ATTRIBUTES),
1690                                  &access_granted);
1691
1692         TALLOC_FREE(sd);
1693
1694         if (!NT_STATUS_IS_OK(status)) {
1695                 DEBUG(10, ("smbd_calculate_access_mask: "
1696                            "Access denied on file %s: "
1697                            "when calculating maximum access\n",
1698                            smb_fname_str_dbg(smb_fname)));
1699                 return NT_STATUS_ACCESS_DENIED;
1700         }
1701         *p_access_mask = (access_granted | FILE_READ_ATTRIBUTES);
1702         return NT_STATUS_OK;
1703 }
1704
1705 NTSTATUS smbd_calculate_access_mask(connection_struct *conn,
1706                                     const struct smb_filename *smb_fname,
1707                                     uint32_t access_mask,
1708                                     uint32_t *access_mask_out)
1709 {
1710         NTSTATUS status;
1711         uint32_t orig_access_mask = access_mask;
1712         uint32_t rejected_share_access;
1713
1714         /*
1715          * Convert GENERIC bits to specific bits.
1716          */
1717
1718         se_map_generic(&access_mask, &file_generic_mapping);
1719
1720         /* Calculate MAXIMUM_ALLOWED_ACCESS if requested. */
1721         if (access_mask & MAXIMUM_ALLOWED_ACCESS) {
1722
1723                 status = smbd_calculate_maximum_allowed_access(
1724                         conn, smb_fname, &access_mask);
1725
1726                 if (!NT_STATUS_IS_OK(status)) {
1727                         return status;
1728                 }
1729
1730                 access_mask &= conn->share_access;
1731         }
1732
1733         rejected_share_access = access_mask & ~(conn->share_access);
1734
1735         if (rejected_share_access) {
1736                 DEBUG(10, ("smbd_calculate_access_mask: Access denied on "
1737                         "file %s: rejected by share access mask[0x%08X] "
1738                         "orig[0x%08X] mapped[0x%08X] reject[0x%08X]\n",
1739                         smb_fname_str_dbg(smb_fname),
1740                         conn->share_access,
1741                         orig_access_mask, access_mask,
1742                         rejected_share_access));
1743                 return NT_STATUS_ACCESS_DENIED;
1744         }
1745
1746         *access_mask_out = access_mask;
1747         return NT_STATUS_OK;
1748 }
1749
1750 /****************************************************************************
1751  Remove the deferred open entry under lock.
1752 ****************************************************************************/
1753
1754 void remove_deferred_open_entry(struct file_id id, uint64_t mid,
1755                                 struct server_id pid)
1756 {
1757         struct share_mode_lock *lck = get_existing_share_mode_lock(
1758                 talloc_tos(), id);
1759         if (lck == NULL) {
1760                 DEBUG(0, ("could not get share mode lock\n"));
1761                 return;
1762         }
1763         del_deferred_open_entry(lck, mid, pid);
1764         TALLOC_FREE(lck);
1765 }
1766
1767 /****************************************************************************
1768  Return true if this is a state pointer to an asynchronous create.
1769 ****************************************************************************/
1770
1771 bool is_deferred_open_async(const void *ptr)
1772 {
1773         const struct deferred_open_record *state = (const struct deferred_open_record *)ptr;
1774
1775         return state->async_open;
1776 }
1777
1778 /****************************************************************************
1779  Open a file with a share mode. Passed in an already created files_struct *.
1780 ****************************************************************************/
1781
1782 static NTSTATUS open_file_ntcreate(connection_struct *conn,
1783                             struct smb_request *req,
1784                             uint32 access_mask,         /* access bits (FILE_READ_DATA etc.) */
1785                             uint32 share_access,        /* share constants (FILE_SHARE_READ etc) */
1786                             uint32 create_disposition,  /* FILE_OPEN_IF etc. */
1787                             uint32 create_options,      /* options such as delete on close. */
1788                             uint32 new_dos_attributes,  /* attributes used for new file. */
1789                             int oplock_request,         /* internal Samba oplock codes. */
1790                                                         /* Information (FILE_EXISTS etc.) */
1791                             uint32_t private_flags,     /* Samba specific flags. */
1792                             int *pinfo,
1793                             files_struct *fsp)
1794 {
1795         struct smb_filename *smb_fname = fsp->fsp_name;
1796         int flags=0;
1797         int flags2=0;
1798         bool file_existed = VALID_STAT(smb_fname->st);
1799         bool def_acl = False;
1800         bool posix_open = False;
1801         bool new_file_created = False;
1802         bool clear_ads = false;
1803         NTSTATUS fsp_open = NT_STATUS_ACCESS_DENIED;
1804         mode_t new_unx_mode = (mode_t)0;
1805         mode_t unx_mode = (mode_t)0;
1806         int info;
1807         uint32 existing_dos_attributes = 0;
1808         struct timeval request_time = timeval_zero();
1809         struct share_mode_lock *lck = NULL;
1810         uint32 open_access_mask = access_mask;
1811         NTSTATUS status;
1812         char *parent_dir;
1813         SMB_STRUCT_STAT saved_stat = smb_fname->st;
1814
1815         if (conn->printer) {
1816                 /*
1817                  * Printers are handled completely differently.
1818                  * Most of the passed parameters are ignored.
1819                  */
1820
1821                 if (pinfo) {
1822                         *pinfo = FILE_WAS_CREATED;
1823                 }
1824
1825                 DEBUG(10, ("open_file_ntcreate: printer open fname=%s\n",
1826                            smb_fname_str_dbg(smb_fname)));
1827
1828                 if (!req) {
1829                         DEBUG(0,("open_file_ntcreate: printer open without "
1830                                 "an SMB request!\n"));
1831                         return NT_STATUS_INTERNAL_ERROR;
1832                 }
1833
1834                 return print_spool_open(fsp, smb_fname->base_name,
1835                                         req->vuid);
1836         }
1837
1838         if (!parent_dirname(talloc_tos(), smb_fname->base_name, &parent_dir,
1839                             NULL)) {
1840                 return NT_STATUS_NO_MEMORY;
1841         }
1842
1843         if (new_dos_attributes & FILE_FLAG_POSIX_SEMANTICS) {
1844                 posix_open = True;
1845                 unx_mode = (mode_t)(new_dos_attributes & ~FILE_FLAG_POSIX_SEMANTICS);
1846                 new_dos_attributes = 0;
1847         } else {
1848                 /* Windows allows a new file to be created and
1849                    silently removes a FILE_ATTRIBUTE_DIRECTORY
1850                    sent by the client. Do the same. */
1851
1852                 new_dos_attributes &= ~FILE_ATTRIBUTE_DIRECTORY;
1853
1854                 /* We add FILE_ATTRIBUTE_ARCHIVE to this as this mode is only used if the file is
1855                  * created new. */
1856                 unx_mode = unix_mode(conn, new_dos_attributes | FILE_ATTRIBUTE_ARCHIVE,
1857                                      smb_fname, parent_dir);
1858         }
1859
1860         DEBUG(10, ("open_file_ntcreate: fname=%s, dos_attrs=0x%x "
1861                    "access_mask=0x%x share_access=0x%x "
1862                    "create_disposition = 0x%x create_options=0x%x "
1863                    "unix mode=0%o oplock_request=%d private_flags = 0x%x\n",
1864                    smb_fname_str_dbg(smb_fname), new_dos_attributes,
1865                    access_mask, share_access, create_disposition,
1866                    create_options, (unsigned int)unx_mode, oplock_request,
1867                    (unsigned int)private_flags));
1868
1869         if ((req == NULL) && ((oplock_request & INTERNAL_OPEN_ONLY) == 0)) {
1870                 DEBUG(0, ("No smb request but not an internal only open!\n"));
1871                 return NT_STATUS_INTERNAL_ERROR;
1872         }
1873
1874         /*
1875          * Only non-internal opens can be deferred at all
1876          */
1877
1878         if (req) {
1879                 void *ptr;
1880                 if (get_deferred_open_message_state(req,
1881                                 &request_time,
1882                                 &ptr)) {
1883                         /* Remember the absolute time of the original
1884                            request with this mid. We'll use it later to
1885                            see if this has timed out. */
1886
1887                         /* If it was an async create retry, the file
1888                            didn't exist. */
1889
1890                         if (is_deferred_open_async(ptr)) {
1891                                 SET_STAT_INVALID(smb_fname->st);
1892                                 file_existed = false;
1893                         } else {
1894                                 struct deferred_open_record *state = (struct deferred_open_record *)ptr;
1895                                 /* Remove the deferred open entry under lock. */
1896                                 remove_deferred_open_entry(
1897                                         state->id, req->mid,
1898                                         messaging_server_id(req->sconn->msg_ctx));
1899                         }
1900
1901                         /* Ensure we don't reprocess this message. */
1902                         remove_deferred_open_message_smb(req->sconn, req->mid);
1903                 }
1904         }
1905
1906         if (!posix_open) {
1907                 new_dos_attributes &= SAMBA_ATTRIBUTES_MASK;
1908                 if (file_existed) {
1909                         existing_dos_attributes = dos_mode(conn, smb_fname);
1910                 }
1911         }
1912
1913         /* ignore any oplock requests if oplocks are disabled */
1914         if (!lp_oplocks(SNUM(conn)) ||
1915             IS_VETO_OPLOCK_PATH(conn, smb_fname->base_name)) {
1916                 /* Mask off everything except the private Samba bits. */
1917                 oplock_request &= SAMBA_PRIVATE_OPLOCK_MASK;
1918         }
1919
1920         /* this is for OS/2 long file names - say we don't support them */
1921         if (!lp_posix_pathnames() && strstr(smb_fname->base_name,".+,;=[].")) {
1922                 /* OS/2 Workplace shell fix may be main code stream in a later
1923                  * release. */
1924                 DEBUG(5,("open_file_ntcreate: OS/2 long filenames are not "
1925                          "supported.\n"));
1926                 if (use_nt_status()) {
1927                         return NT_STATUS_OBJECT_NAME_NOT_FOUND;
1928                 }
1929                 return NT_STATUS_DOS(ERRDOS, ERRcannotopen);
1930         }
1931
1932         switch( create_disposition ) {
1933                 /*
1934                  * Currently we're using FILE_SUPERSEDE as the same as
1935                  * FILE_OVERWRITE_IF but they really are
1936                  * different. FILE_SUPERSEDE deletes an existing file
1937                  * (requiring delete access) then recreates it.
1938                  */
1939                 case FILE_SUPERSEDE:
1940                         /* If file exists replace/overwrite. If file doesn't
1941                          * exist create. */
1942                         flags2 |= (O_CREAT | O_TRUNC);
1943                         clear_ads = true;
1944                         break;
1945
1946                 case FILE_OVERWRITE_IF:
1947                         /* If file exists replace/overwrite. If file doesn't
1948                          * exist create. */
1949                         flags2 |= (O_CREAT | O_TRUNC);
1950                         clear_ads = true;
1951                         break;
1952
1953                 case FILE_OPEN:
1954                         /* If file exists open. If file doesn't exist error. */
1955                         if (!file_existed) {
1956                                 DEBUG(5,("open_file_ntcreate: FILE_OPEN "
1957                                          "requested for file %s and file "
1958                                          "doesn't exist.\n",
1959                                          smb_fname_str_dbg(smb_fname)));
1960                                 errno = ENOENT;
1961                                 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
1962                         }
1963                         break;
1964
1965                 case FILE_OVERWRITE:
1966                         /* If file exists overwrite. If file doesn't exist
1967                          * error. */
1968                         if (!file_existed) {
1969                                 DEBUG(5,("open_file_ntcreate: FILE_OVERWRITE "
1970                                          "requested for file %s and file "
1971                                          "doesn't exist.\n",
1972                                          smb_fname_str_dbg(smb_fname) ));
1973                                 errno = ENOENT;
1974                                 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
1975                         }
1976                         flags2 |= O_TRUNC;
1977                         clear_ads = true;
1978                         break;
1979
1980                 case FILE_CREATE:
1981                         /* If file exists error. If file doesn't exist
1982                          * create. */
1983                         if (file_existed) {
1984                                 DEBUG(5,("open_file_ntcreate: FILE_CREATE "
1985                                          "requested for file %s and file "
1986                                          "already exists.\n",
1987                                          smb_fname_str_dbg(smb_fname)));
1988                                 if (S_ISDIR(smb_fname->st.st_ex_mode)) {
1989                                         errno = EISDIR;
1990                                 } else {
1991                                         errno = EEXIST;
1992                                 }
1993                                 return map_nt_error_from_unix(errno);
1994                         }
1995                         flags2 |= (O_CREAT|O_EXCL);
1996                         break;
1997
1998                 case FILE_OPEN_IF:
1999                         /* If file exists open. If file doesn't exist
2000                          * create. */
2001                         flags2 |= O_CREAT;
2002                         break;
2003
2004                 default:
2005                         return NT_STATUS_INVALID_PARAMETER;
2006         }
2007
2008         /* We only care about matching attributes on file exists and
2009          * overwrite. */
2010
2011         if (!posix_open && file_existed && ((create_disposition == FILE_OVERWRITE) ||
2012                              (create_disposition == FILE_OVERWRITE_IF))) {
2013                 if (!open_match_attributes(conn, existing_dos_attributes,
2014                                            new_dos_attributes,
2015                                            smb_fname->st.st_ex_mode,
2016                                            unx_mode, &new_unx_mode)) {
2017                         DEBUG(5,("open_file_ntcreate: attributes missmatch "
2018                                  "for file %s (%x %x) (0%o, 0%o)\n",
2019                                  smb_fname_str_dbg(smb_fname),
2020                                  existing_dos_attributes,
2021                                  new_dos_attributes,
2022                                  (unsigned int)smb_fname->st.st_ex_mode,
2023                                  (unsigned int)unx_mode ));
2024                         errno = EACCES;
2025                         return NT_STATUS_ACCESS_DENIED;
2026                 }
2027         }
2028
2029         status = smbd_calculate_access_mask(conn, smb_fname,
2030                                         access_mask,
2031                                         &access_mask); 
2032         if (!NT_STATUS_IS_OK(status)) {
2033                 DEBUG(10, ("open_file_ntcreate: smbd_calculate_access_mask "
2034                         "on file %s returned %s\n",
2035                         smb_fname_str_dbg(smb_fname), nt_errstr(status)));
2036                 return status;
2037         }
2038
2039         open_access_mask = access_mask;
2040
2041         if ((flags2 & O_TRUNC) || (oplock_request & FORCE_OPLOCK_BREAK_TO_NONE)) {
2042                 open_access_mask |= FILE_WRITE_DATA; /* This will cause oplock breaks. */
2043         }
2044
2045         DEBUG(10, ("open_file_ntcreate: fname=%s, after mapping "
2046                    "access_mask=0x%x\n", smb_fname_str_dbg(smb_fname),
2047                     access_mask));
2048
2049         /*
2050          * Note that we ignore the append flag as append does not
2051          * mean the same thing under DOS and Unix.
2052          */
2053
2054         if ((access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) ||
2055                         (oplock_request & FORCE_OPLOCK_BREAK_TO_NONE)) {
2056                 /* DENY_DOS opens are always underlying read-write on the
2057                    file handle, no matter what the requested access mask
2058                     says. */
2059                 if ((private_flags & NTCREATEX_OPTIONS_PRIVATE_DENY_DOS) ||
2060                         access_mask & (FILE_READ_ATTRIBUTES|FILE_READ_DATA|FILE_READ_EA|FILE_EXECUTE)) {
2061                         flags = O_RDWR;
2062                 } else {
2063                         flags = O_WRONLY;
2064                 }
2065         } else {
2066                 flags = O_RDONLY;
2067         }
2068
2069         /*
2070          * Currently we only look at FILE_WRITE_THROUGH for create options.
2071          */
2072
2073 #if defined(O_SYNC)
2074         if ((create_options & FILE_WRITE_THROUGH) && lp_strict_sync(SNUM(conn))) {
2075                 flags2 |= O_SYNC;
2076         }
2077 #endif /* O_SYNC */
2078
2079         if (posix_open && (access_mask & FILE_APPEND_DATA)) {
2080                 flags2 |= O_APPEND;
2081         }
2082
2083         if (!posix_open && !CAN_WRITE(conn)) {
2084                 /*
2085                  * We should really return a permission denied error if either
2086                  * O_CREAT or O_TRUNC are set, but for compatibility with
2087                  * older versions of Samba we just AND them out.
2088                  */
2089                 flags2 &= ~(O_CREAT|O_TRUNC);
2090         }
2091
2092         /*
2093          * Ensure we can't write on a read-only share or file.
2094          */
2095
2096         if (flags != O_RDONLY && file_existed &&
2097             (!CAN_WRITE(conn) || IS_DOS_READONLY(existing_dos_attributes))) {
2098                 DEBUG(5,("open_file_ntcreate: write access requested for "
2099                          "file %s on read only %s\n",
2100                          smb_fname_str_dbg(smb_fname),
2101                          !CAN_WRITE(conn) ? "share" : "file" ));
2102                 errno = EACCES;
2103                 return NT_STATUS_ACCESS_DENIED;
2104         }
2105
2106         fsp->file_id = vfs_file_id_from_sbuf(conn, &smb_fname->st);
2107         fsp->share_access = share_access;
2108         fsp->fh->private_options = private_flags;
2109         fsp->access_mask = open_access_mask; /* We change this to the
2110                                               * requested access_mask after
2111                                               * the open is done. */
2112         fsp->posix_open = posix_open;
2113
2114         /* Ensure no SAMBA_PRIVATE bits can be set. */
2115         fsp->oplock_type = (oplock_request & ~SAMBA_PRIVATE_OPLOCK_MASK);
2116
2117         if (timeval_is_zero(&request_time)) {
2118                 request_time = fsp->open_time;
2119         }
2120
2121         if (file_existed) {
2122                 struct share_mode_entry *batch_entry = NULL;
2123                 struct share_mode_entry *exclusive_entry = NULL;
2124                 bool got_level2_oplock = false;
2125                 bool got_a_none_oplock = false;
2126                 struct file_id id;
2127
2128                 struct timespec old_write_time = smb_fname->st.st_ex_mtime;
2129                 id = vfs_file_id_from_sbuf(conn, &smb_fname->st);
2130
2131                 lck = get_share_mode_lock(talloc_tos(), id,
2132                                           conn->connectpath,
2133                                           smb_fname, &old_write_time);
2134                 if (lck == NULL) {
2135                         DEBUG(0, ("Could not get share mode lock\n"));
2136                         return NT_STATUS_SHARING_VIOLATION;
2137                 }
2138
2139                 /* Get the types we need to examine. */
2140                 find_oplock_types(fsp,
2141                                 oplock_request,
2142                                 lck,
2143                                 &batch_entry,
2144                                 &exclusive_entry,
2145                                 &got_level2_oplock,
2146                                 &got_a_none_oplock);
2147
2148                 /* First pass - send break only on batch oplocks. */
2149                 if ((req != NULL) &&
2150                                 delay_for_batch_oplocks(fsp,
2151                                         req->mid,
2152                                         oplock_request,
2153                                         batch_entry)) {
2154                         schedule_defer_open(lck, request_time, req);
2155                         TALLOC_FREE(lck);
2156                         return NT_STATUS_SHARING_VIOLATION;
2157                 }
2158
2159                 /* Use the client requested access mask here, not the one we
2160                  * open with. */
2161                 status = open_mode_check(conn, lck, fsp->name_hash,
2162                                         access_mask, share_access,
2163                                          create_options, &file_existed);
2164
2165                 if (NT_STATUS_IS_OK(status)) {
2166                         /* We might be going to allow this open. Check oplock
2167                          * status again. */
2168                         /* Second pass - send break for both batch or
2169                          * exclusive oplocks. */
2170                         if ((req != NULL) &&
2171                                         delay_for_exclusive_oplocks(
2172                                                 fsp,
2173                                                 req->mid,
2174                                                 oplock_request,
2175                                                 exclusive_entry)) {
2176                                 schedule_defer_open(lck, request_time, req);
2177                                 TALLOC_FREE(lck);
2178                                 return NT_STATUS_SHARING_VIOLATION;
2179                         }
2180                 }
2181
2182                 if (NT_STATUS_EQUAL(status, NT_STATUS_DELETE_PENDING)) {
2183                         /* DELETE_PENDING is not deferred for a second */
2184                         TALLOC_FREE(lck);
2185                         return status;
2186                 }
2187
2188                 grant_fsp_oplock_type(fsp,
2189                                 oplock_request,
2190                                 got_level2_oplock,
2191                                 got_a_none_oplock);
2192
2193                 if (!NT_STATUS_IS_OK(status)) {
2194                         uint32 can_access_mask;
2195                         bool can_access = True;
2196
2197                         SMB_ASSERT(NT_STATUS_EQUAL(status, NT_STATUS_SHARING_VIOLATION));
2198
2199                         /* Check if this can be done with the deny_dos and fcb
2200                          * calls. */
2201                         if (private_flags &
2202                             (NTCREATEX_OPTIONS_PRIVATE_DENY_DOS|
2203                              NTCREATEX_OPTIONS_PRIVATE_DENY_FCB)) {
2204                                 if (req == NULL) {
2205                                         DEBUG(0, ("DOS open without an SMB "
2206                                                   "request!\n"));
2207                                         TALLOC_FREE(lck);
2208                                         return NT_STATUS_INTERNAL_ERROR;
2209                                 }
2210
2211                                 /* Use the client requested access mask here,
2212                                  * not the one we open with. */
2213                                 status = fcb_or_dos_open(req,
2214                                                         conn,
2215                                                         fsp,
2216                                                         smb_fname,
2217                                                         id,
2218                                                         req->smbpid,
2219                                                         req->vuid,
2220                                                         access_mask,
2221                                                         share_access,
2222                                                         create_options);
2223
2224                                 if (NT_STATUS_IS_OK(status)) {
2225                                         TALLOC_FREE(lck);
2226                                         if (pinfo) {
2227                                                 *pinfo = FILE_WAS_OPENED;
2228                                         }
2229                                         return NT_STATUS_OK;
2230                                 }
2231                         }
2232
2233                         /*
2234                          * This next line is a subtlety we need for
2235                          * MS-Access. If a file open will fail due to share
2236                          * permissions and also for security (access) reasons,
2237                          * we need to return the access failed error, not the
2238                          * share error. We can't open the file due to kernel
2239                          * oplock deadlock (it's possible we failed above on
2240                          * the open_mode_check()) so use a userspace check.
2241                          */
2242
2243                         if (flags & O_RDWR) {
2244                                 can_access_mask = FILE_READ_DATA|FILE_WRITE_DATA;
2245                         } else if (flags & O_WRONLY) {
2246                                 can_access_mask = FILE_WRITE_DATA;
2247                         } else {
2248                                 can_access_mask = FILE_READ_DATA;
2249                         }
2250
2251                         if (((can_access_mask & FILE_WRITE_DATA) &&
2252                                 !CAN_WRITE(conn)) ||
2253                                 !NT_STATUS_IS_OK(smbd_check_access_rights(conn,
2254                                                 smb_fname, can_access_mask))) {
2255                                 can_access = False;
2256                         }
2257
2258                         /*
2259                          * If we're returning a share violation, ensure we
2260                          * cope with the braindead 1 second delay.
2261                          */
2262
2263                         if (!(oplock_request & INTERNAL_OPEN_ONLY) &&
2264                             lp_defer_sharing_violations()) {
2265                                 struct timeval timeout;
2266                                 struct deferred_open_record state;
2267                                 int timeout_usecs;
2268
2269                                 /* this is a hack to speed up torture tests
2270                                    in 'make test' */
2271                                 timeout_usecs = lp_parm_int(SNUM(conn),
2272                                                             "smbd","sharedelay",
2273                                                             SHARING_VIOLATION_USEC_WAIT);
2274
2275                                 /* This is a relative time, added to the absolute
2276                                    request_time value to get the absolute timeout time.
2277                                    Note that if this is the second or greater time we enter
2278                                    this codepath for this particular request mid then
2279                                    request_time is left as the absolute time of the *first*
2280                                    time this request mid was processed. This is what allows
2281                                    the request to eventually time out. */
2282
2283                                 timeout = timeval_set(0, timeout_usecs);
2284
2285                                 /* Nothing actually uses state.delayed_for_oplocks
2286                                    but it's handy to differentiate in debug messages
2287                                    between a 30 second delay due to oplock break, and
2288                                    a 1 second delay for share mode conflicts. */
2289
2290                                 state.delayed_for_oplocks = False;
2291                                 state.async_open = false;
2292                                 state.id = id;
2293
2294                                 if ((req != NULL)
2295                                     && !request_timed_out(request_time,
2296                                                           timeout)) {
2297                                         defer_open(lck, request_time, timeout,
2298                                                    req, &state);
2299                                 }
2300                         }
2301
2302                         TALLOC_FREE(lck);
2303                         if (can_access) {
2304                                 /*
2305                                  * We have detected a sharing violation here
2306                                  * so return the correct error code
2307                                  */
2308                                 status = NT_STATUS_SHARING_VIOLATION;
2309                         } else {
2310                                 status = NT_STATUS_ACCESS_DENIED;
2311                         }
2312                         return status;
2313                 }
2314
2315                 /*
2316                  * We exit this block with the share entry *locked*.....
2317                  */
2318         }
2319
2320         SMB_ASSERT(!file_existed || (lck != NULL));
2321
2322         /*
2323          * Ensure we pay attention to default ACLs on directories if required.
2324          */
2325
2326         if ((flags2 & O_CREAT) && lp_inherit_acls(SNUM(conn)) &&
2327             (def_acl = directory_has_default_acl(conn, parent_dir))) {
2328                 unx_mode = (0777 & lp_create_mask(SNUM(conn)));
2329         }
2330
2331         DEBUG(4,("calling open_file with flags=0x%X flags2=0x%X mode=0%o, "
2332                 "access_mask = 0x%x, open_access_mask = 0x%x\n",
2333                  (unsigned int)flags, (unsigned int)flags2,
2334                  (unsigned int)unx_mode, (unsigned int)access_mask,
2335                  (unsigned int)open_access_mask));
2336
2337         /*
2338          * open_file strips any O_TRUNC flags itself.
2339          */
2340
2341         fsp_open = open_file(fsp, conn, req, parent_dir,
2342                              flags|flags2, unx_mode, access_mask,
2343                              open_access_mask, &new_file_created);
2344
2345         if (!NT_STATUS_IS_OK(fsp_open)) {
2346                 if (NT_STATUS_EQUAL(fsp_open, NT_STATUS_RETRY)) {
2347                         schedule_async_open(request_time, req);
2348                 }
2349                 TALLOC_FREE(lck);
2350                 return fsp_open;
2351         }
2352
2353         if (file_existed && !check_same_dev_ino(&saved_stat, &smb_fname->st)) {
2354                 /*
2355                  * The file did exist, but some other (local or NFS)
2356                  * process either renamed/unlinked and re-created the
2357                  * file with different dev/ino after we walked the path,
2358                  * but before we did the open. We could retry the
2359                  * open but it's a rare enough case it's easier to
2360                  * just fail the open to prevent creating any problems
2361                  * in the open file db having the wrong dev/ino key.
2362                  */
2363                 TALLOC_FREE(lck);
2364                 fd_close(fsp);
2365                 DEBUG(1,("open_file_ntcreate: file %s - dev/ino mismatch. "
2366                         "Old (dev=0x%llu, ino =0x%llu). "
2367                         "New (dev=0x%llu, ino=0x%llu). Failing open "
2368                         " with NT_STATUS_ACCESS_DENIED.\n",
2369                          smb_fname_str_dbg(smb_fname),
2370                          (unsigned long long)saved_stat.st_ex_dev,
2371                          (unsigned long long)saved_stat.st_ex_ino,
2372                          (unsigned long long)smb_fname->st.st_ex_dev,
2373                          (unsigned long long)smb_fname->st.st_ex_ino));
2374                 return NT_STATUS_ACCESS_DENIED;
2375         }
2376
2377         if (!file_existed) {
2378                 struct share_mode_entry *batch_entry = NULL;
2379                 struct share_mode_entry *exclusive_entry = NULL;
2380                 bool got_level2_oplock = false;
2381                 bool got_a_none_oplock = false;
2382                 struct timespec old_write_time = smb_fname->st.st_ex_mtime;
2383                 struct file_id id;
2384                 /*
2385                  * Deal with the race condition where two smbd's detect the
2386                  * file doesn't exist and do the create at the same time. One
2387                  * of them will win and set a share mode, the other (ie. this
2388                  * one) should check if the requested share mode for this
2389                  * create is allowed.
2390                  */
2391
2392                 /*
2393                  * Now the file exists and fsp is successfully opened,
2394                  * fsp->dev and fsp->inode are valid and should replace the
2395                  * dev=0,inode=0 from a non existent file. Spotted by
2396                  * Nadav Danieli <nadavd@exanet.com>. JRA.
2397                  */
2398
2399                 id = fsp->file_id;
2400
2401                 lck = get_share_mode_lock(talloc_tos(), id,
2402                                           conn->connectpath,
2403                                           smb_fname, &old_write_time);
2404
2405                 if (lck == NULL) {
2406                         DEBUG(0, ("open_file_ntcreate: Could not get share "
2407                                   "mode lock for %s\n",
2408                                   smb_fname_str_dbg(smb_fname)));
2409                         fd_close(fsp);
2410                         return NT_STATUS_SHARING_VIOLATION;
2411                 }
2412
2413                 /* Get the types we need to examine. */
2414                 find_oplock_types(fsp,
2415                                 oplock_request,
2416                                 lck,
2417                                 &batch_entry,
2418                                 &exclusive_entry,
2419                                 &got_level2_oplock,
2420                                 &got_a_none_oplock);
2421
2422                 /* First pass - send break only on batch oplocks. */
2423                 if ((req != NULL) &&
2424                                 delay_for_batch_oplocks(fsp,
2425                                         req->mid,
2426                                         oplock_request,
2427                                         batch_entry)) {
2428                         schedule_defer_open(lck, request_time, req);
2429                         TALLOC_FREE(lck);
2430                         fd_close(fsp);
2431                         return NT_STATUS_SHARING_VIOLATION;
2432                 }
2433
2434                 status = open_mode_check(conn, lck, fsp->name_hash,
2435                                         access_mask, share_access,
2436                                          create_options, &file_existed);
2437
2438                 if (NT_STATUS_IS_OK(status)) {
2439                         /* We might be going to allow this open. Check oplock
2440                          * status again. */
2441                         /* Second pass - send break for both batch or
2442                          * exclusive oplocks. */
2443                         if ((req != NULL) &&
2444                                         delay_for_exclusive_oplocks(
2445                                                 fsp,
2446                                                 req->mid,
2447                                                 oplock_request,
2448                                                 exclusive_entry)) {
2449                                 schedule_defer_open(lck, request_time, req);
2450                                 TALLOC_FREE(lck);
2451                                 fd_close(fsp);
2452                                 return NT_STATUS_SHARING_VIOLATION;
2453                         }
2454                 }
2455
2456                 if (!NT_STATUS_IS_OK(status)) {
2457                         struct deferred_open_record state;
2458
2459                         state.delayed_for_oplocks = False;
2460                         state.async_open = false;
2461                         state.id = id;
2462
2463                         /* Do it all over again immediately. In the second
2464                          * round we will find that the file existed and handle
2465                          * the DELETE_PENDING and FCB cases correctly. No need
2466                          * to duplicate the code here. Essentially this is a
2467                          * "goto top of this function", but don't tell
2468                          * anybody... */
2469
2470                         if (req != NULL) {
2471                                 defer_open(lck, request_time, timeval_zero(),
2472                                            req, &state);
2473                         }
2474                         TALLOC_FREE(lck);
2475                         fd_close(fsp);
2476                         return status;
2477                 }
2478
2479                 grant_fsp_oplock_type(fsp,
2480                                 oplock_request,
2481                                 got_level2_oplock,
2482                                 got_a_none_oplock);
2483
2484                 /*
2485                  * We exit this block with the share entry *locked*.....
2486                  */
2487
2488         }
2489
2490         SMB_ASSERT(lck != NULL);
2491
2492         /* Delete streams if create_disposition requires it */
2493         if (!new_file_created && clear_ads &&
2494             !is_ntfs_stream_smb_fname(smb_fname)) {
2495                 status = delete_all_streams(conn, smb_fname->base_name);
2496                 if (!NT_STATUS_IS_OK(status)) {
2497                         TALLOC_FREE(lck);
2498                         fd_close(fsp);
2499                         return status;
2500                 }
2501         }
2502
2503         /* note that we ignore failure for the following. It is
2504            basically a hack for NFS, and NFS will never set one of
2505            these only read them. Nobody but Samba can ever set a deny
2506            mode and we have already checked our more authoritative
2507            locking database for permission to set this deny mode. If
2508            the kernel refuses the operations then the kernel is wrong.
2509            note that GPFS supports it as well - jmcd */
2510
2511         if (fsp->fh->fd != -1) {
2512                 int ret_flock;
2513                 ret_flock = SMB_VFS_KERNEL_FLOCK(fsp, share_access, access_mask);
2514                 if(ret_flock == -1 ){
2515
2516                         TALLOC_FREE(lck);
2517                         fd_close(fsp);
2518
2519                         return NT_STATUS_SHARING_VIOLATION;
2520                 }
2521         }
2522
2523         /*
2524          * At this point onwards, we can guarentee that the share entry
2525          * is locked, whether we created the file or not, and that the
2526          * deny mode is compatible with all current opens.
2527          */
2528
2529         /*
2530          * If requested, truncate the file.
2531          */
2532
2533         if (!new_file_created && (flags2&O_TRUNC)) {
2534                 /*
2535                  * We are modifying the file after open - update the stat
2536                  * struct..
2537                  */
2538                 if ((SMB_VFS_FTRUNCATE(fsp, 0) == -1) ||
2539                     (SMB_VFS_FSTAT(fsp, &smb_fname->st)==-1)) {
2540                         status = map_nt_error_from_unix(errno);
2541                         TALLOC_FREE(lck);
2542                         fd_close(fsp);
2543                         return status;
2544                 }
2545         }
2546
2547         /*
2548          * According to Samba4, SEC_FILE_READ_ATTRIBUTE is always granted,
2549          * but we don't have to store this - just ignore it on access check.
2550          */
2551         if (conn->sconn->using_smb2) {
2552                 /*
2553                  * SMB2 doesn't return it (according to Microsoft tests).
2554                  * Test Case: TestSuite_ScenarioNo009GrantedAccessTestS0
2555                  * File created with access = 0x7 (Read, Write, Delete)
2556                  * Query Info on file returns 0x87 (Read, Write, Delete, Read Attributes)
2557                  */
2558                 fsp->access_mask = access_mask;
2559         } else {
2560                 /* But SMB1 does. */
2561                 fsp->access_mask = access_mask | FILE_READ_ATTRIBUTES;
2562         }
2563
2564         if (file_existed) {
2565                 /* stat opens on existing files don't get oplocks. */
2566                 if (is_stat_open(open_access_mask)) {
2567                         fsp->oplock_type = NO_OPLOCK;
2568                 }
2569         }
2570
2571         if (new_file_created) {
2572                 info = FILE_WAS_CREATED;
2573         } else {
2574                 if (flags2 & O_TRUNC) {
2575                         info = FILE_WAS_OVERWRITTEN;
2576                 } else {
2577                         info = FILE_WAS_OPENED;
2578                 }
2579         }
2580
2581         if (pinfo) {
2582                 *pinfo = info;
2583         }
2584
2585         /*
2586          * Setup the oplock info in both the shared memory and
2587          * file structs.
2588          */
2589
2590         status = set_file_oplock(fsp, fsp->oplock_type);
2591         if (!NT_STATUS_IS_OK(status)) {
2592                 /*
2593                  * Could not get the kernel oplock or there are byte-range
2594                  * locks on the file.
2595                  */
2596                 fsp->oplock_type = NO_OPLOCK;
2597         }
2598
2599         set_share_mode(lck, fsp, get_current_uid(conn),
2600                         req ? req->mid : 0,
2601                        fsp->oplock_type);
2602
2603         /* Handle strange delete on close create semantics. */
2604         if (create_options & FILE_DELETE_ON_CLOSE) {
2605
2606                 status = can_set_delete_on_close(fsp, new_dos_attributes);
2607
2608                 if (!NT_STATUS_IS_OK(status)) {
2609                         /* Remember to delete the mode we just added. */
2610                         del_share_mode(lck, fsp);
2611                         TALLOC_FREE(lck);
2612                         fd_close(fsp);
2613                         return status;
2614                 }
2615                 /* Note that here we set the *inital* delete on close flag,
2616                    not the regular one. The magic gets handled in close. */
2617                 fsp->initial_delete_on_close = True;
2618         }
2619
2620         if (info != FILE_WAS_OPENED) {
2621                 /* Files should be initially set as archive */
2622                 if (lp_map_archive(SNUM(conn)) ||
2623                     lp_store_dos_attributes(SNUM(conn))) {
2624                         if (!posix_open) {
2625                                 if (file_set_dosmode(conn, smb_fname,
2626                                             new_dos_attributes | FILE_ATTRIBUTE_ARCHIVE,
2627                                             parent_dir, true) == 0) {
2628                                         unx_mode = smb_fname->st.st_ex_mode;
2629                                 }
2630                         }
2631                 }
2632         }
2633
2634         /* Determine sparse flag. */
2635         if (posix_open) {
2636                 /* POSIX opens are sparse by default. */
2637                 fsp->is_sparse = true;
2638         } else {
2639                 fsp->is_sparse = (file_existed &&
2640                         (existing_dos_attributes & FILE_ATTRIBUTE_SPARSE));
2641         }
2642
2643         /*
2644          * Take care of inherited ACLs on created files - if default ACL not
2645          * selected.
2646          */
2647
2648         if (!posix_open && new_file_created && !def_acl) {
2649
2650                 int saved_errno = errno; /* We might get ENOSYS in the next
2651                                           * call.. */
2652
2653                 if (SMB_VFS_FCHMOD_ACL(fsp, unx_mode) == -1 &&
2654                     errno == ENOSYS) {
2655                         errno = saved_errno; /* Ignore ENOSYS */
2656                 }
2657
2658         } else if (new_unx_mode) {
2659
2660                 int ret = -1;
2661
2662                 /* Attributes need changing. File already existed. */
2663
2664                 {
2665                         int saved_errno = errno; /* We might get ENOSYS in the
2666                                                   * next call.. */
2667                         ret = SMB_VFS_FCHMOD_ACL(fsp, new_unx_mode);
2668
2669                         if (ret == -1 && errno == ENOSYS) {
2670                                 errno = saved_errno; /* Ignore ENOSYS */
2671                         } else {
2672                                 DEBUG(5, ("open_file_ntcreate: reset "
2673                                           "attributes of file %s to 0%o\n",
2674                                           smb_fname_str_dbg(smb_fname),
2675                                           (unsigned int)new_unx_mode));
2676                                 ret = 0; /* Don't do the fchmod below. */
2677                         }
2678                 }
2679
2680                 if ((ret == -1) &&
2681                     (SMB_VFS_FCHMOD(fsp, new_unx_mode) == -1))
2682                         DEBUG(5, ("open_file_ntcreate: failed to reset "
2683                                   "attributes of file %s to 0%o\n",
2684                                   smb_fname_str_dbg(smb_fname),
2685                                   (unsigned int)new_unx_mode));
2686         }
2687
2688         /* If this is a successful open, we must remove any deferred open
2689          * records. */
2690         if (req != NULL) {
2691                 del_deferred_open_entry(lck, req->mid,
2692                                         messaging_server_id(req->sconn->msg_ctx));
2693         }
2694         TALLOC_FREE(lck);
2695
2696         return NT_STATUS_OK;
2697 }
2698
2699
2700 /****************************************************************************
2701  Open a file for for write to ensure that we can fchmod it.
2702 ****************************************************************************/
2703
2704 NTSTATUS open_file_fchmod(connection_struct *conn,
2705                           struct smb_filename *smb_fname,
2706                           files_struct **result)
2707 {
2708         if (!VALID_STAT(smb_fname->st)) {
2709                 return NT_STATUS_INVALID_PARAMETER;
2710         }
2711
2712         return SMB_VFS_CREATE_FILE(
2713                 conn,                                   /* conn */
2714                 NULL,                                   /* req */
2715                 0,                                      /* root_dir_fid */
2716                 smb_fname,                              /* fname */
2717                 FILE_WRITE_DATA,                        /* access_mask */
2718                 (FILE_SHARE_READ | FILE_SHARE_WRITE |   /* share_access */
2719                     FILE_SHARE_DELETE),
2720                 FILE_OPEN,                              /* create_disposition*/
2721                 0,                                      /* create_options */
2722                 0,                                      /* file_attributes */
2723                 INTERNAL_OPEN_ONLY,                     /* oplock_request */
2724                 0,                                      /* allocation_size */
2725                 0,                                      /* private_flags */
2726                 NULL,                                   /* sd */
2727                 NULL,                                   /* ea_list */
2728                 result,                                 /* result */
2729                 NULL);                                  /* pinfo */
2730 }
2731
2732 static NTSTATUS mkdir_internal(connection_struct *conn,
2733                                struct smb_filename *smb_dname,
2734                                uint32 file_attributes)
2735 {
2736         mode_t mode;
2737         char *parent_dir = NULL;
2738         NTSTATUS status;
2739         bool posix_open = false;
2740         bool need_re_stat = false;
2741         uint32_t access_mask = SEC_DIR_ADD_SUBDIR;
2742
2743         if(access_mask & ~(conn->share_access)) {
2744                 DEBUG(5,("mkdir_internal: failing share access "
2745                          "%s\n", lp_servicename(talloc_tos(), SNUM(conn))));
2746                 return NT_STATUS_ACCESS_DENIED;
2747         }
2748
2749         if (!parent_dirname(talloc_tos(), smb_dname->base_name, &parent_dir,
2750                             NULL)) {
2751                 return NT_STATUS_NO_MEMORY;
2752         }
2753
2754         if (file_attributes & FILE_FLAG_POSIX_SEMANTICS) {
2755                 posix_open = true;
2756                 mode = (mode_t)(file_attributes & ~FILE_FLAG_POSIX_SEMANTICS);
2757         } else {
2758                 mode = unix_mode(conn, FILE_ATTRIBUTE_DIRECTORY, smb_dname, parent_dir);
2759         }
2760
2761         status = check_parent_access(conn,
2762                                         smb_dname,
2763                                         access_mask);
2764         if(!NT_STATUS_IS_OK(status)) {
2765                 DEBUG(5,("mkdir_internal: check_parent_access "
2766                         "on directory %s for path %s returned %s\n",
2767                         parent_dir,
2768                         smb_dname->base_name,
2769                         nt_errstr(status) ));
2770                 return status;
2771         }
2772
2773         if (SMB_VFS_MKDIR(conn, smb_dname->base_name, mode) != 0) {
2774                 return map_nt_error_from_unix(errno);
2775         }
2776
2777         /* Ensure we're checking for a symlink here.... */
2778         /* We don't want to get caught by a symlink racer. */
2779
2780         if (SMB_VFS_LSTAT(conn, smb_dname) == -1) {
2781                 DEBUG(2, ("Could not stat directory '%s' just created: %s\n",
2782                           smb_fname_str_dbg(smb_dname), strerror(errno)));
2783                 return map_nt_error_from_unix(errno);
2784         }
2785
2786         if (!S_ISDIR(smb_dname->st.st_ex_mode)) {
2787                 DEBUG(0, ("Directory '%s' just created is not a directory !\n",
2788                           smb_fname_str_dbg(smb_dname)));
2789                 return NT_STATUS_NOT_A_DIRECTORY;
2790         }
2791
2792         if (lp_store_dos_attributes(SNUM(conn))) {
2793                 if (!posix_open) {
2794                         file_set_dosmode(conn, smb_dname,
2795                                          file_attributes | FILE_ATTRIBUTE_DIRECTORY,
2796                                          parent_dir, true);
2797                 }
2798         }
2799
2800         if (lp_inherit_perms(SNUM(conn))) {
2801                 inherit_access_posix_acl(conn, parent_dir,
2802                                          smb_dname->base_name, mode);
2803                 need_re_stat = true;
2804         }
2805
2806         if (!posix_open) {
2807                 /*
2808                  * Check if high bits should have been set,
2809                  * then (if bits are missing): add them.
2810                  * Consider bits automagically set by UNIX, i.e. SGID bit from parent
2811                  * dir.
2812                  */
2813                 if ((mode & ~(S_IRWXU|S_IRWXG|S_IRWXO)) &&
2814                     (mode & ~smb_dname->st.st_ex_mode)) {
2815                         SMB_VFS_CHMOD(conn, smb_dname->base_name,
2816                                       (smb_dname->st.st_ex_mode |
2817                                           (mode & ~smb_dname->st.st_ex_mode)));
2818                         need_re_stat = true;
2819                 }
2820         }
2821
2822         /* Change the owner if required. */
2823         if (lp_inherit_owner(SNUM(conn))) {
2824                 change_dir_owner_to_parent(conn, parent_dir,
2825                                            smb_dname->base_name,
2826                                            &smb_dname->st);
2827                 need_re_stat = true;
2828         }
2829
2830         if (need_re_stat) {
2831                 if (SMB_VFS_LSTAT(conn, smb_dname) == -1) {
2832                         DEBUG(2, ("Could not stat directory '%s' just created: %s\n",
2833                           smb_fname_str_dbg(smb_dname), strerror(errno)));
2834                         return map_nt_error_from_unix(errno);
2835                 }
2836         }
2837
2838         notify_fname(conn, NOTIFY_ACTION_ADDED, FILE_NOTIFY_CHANGE_DIR_NAME,
2839                      smb_dname->base_name);
2840
2841         return NT_STATUS_OK;
2842 }
2843
2844 /****************************************************************************
2845  Open a directory from an NT SMB call.
2846 ****************************************************************************/
2847
2848 static NTSTATUS open_directory(connection_struct *conn,
2849                                struct smb_request *req,
2850                                struct smb_filename *smb_dname,
2851                                uint32 access_mask,
2852                                uint32 share_access,
2853                                uint32 create_disposition,
2854                                uint32 create_options,
2855                                uint32 file_attributes,
2856                                int *pinfo,
2857                                files_struct **result)
2858 {
2859         files_struct *fsp = NULL;
2860         bool dir_existed = VALID_STAT(smb_dname->st) ? True : False;
2861         struct share_mode_lock *lck = NULL;
2862         NTSTATUS status;
2863         struct timespec mtimespec;
2864         int info = 0;
2865
2866         if (is_ntfs_stream_smb_fname(smb_dname)) {
2867                 DEBUG(2, ("open_directory: %s is a stream name!\n",
2868                           smb_fname_str_dbg(smb_dname)));
2869                 return NT_STATUS_NOT_A_DIRECTORY;
2870         }
2871
2872         if (!(file_attributes & FILE_FLAG_POSIX_SEMANTICS)) {
2873                 /* Ensure we have a directory attribute. */
2874                 file_attributes |= FILE_ATTRIBUTE_DIRECTORY;
2875         }
2876
2877         DEBUG(5,("open_directory: opening directory %s, access_mask = 0x%x, "
2878                  "share_access = 0x%x create_options = 0x%x, "
2879                  "create_disposition = 0x%x, file_attributes = 0x%x\n",
2880                  smb_fname_str_dbg(smb_dname),
2881                  (unsigned int)access_mask,
2882                  (unsigned int)share_access,
2883                  (unsigned int)create_options,
2884                  (unsigned int)create_disposition,
2885                  (unsigned int)file_attributes));
2886
2887         status = smbd_calculate_access_mask(conn, smb_dname,
2888                                             access_mask, &access_mask);
2889         if (!NT_STATUS_IS_OK(status)) {
2890                 DEBUG(10, ("open_directory: smbd_calculate_access_mask "
2891                         "on file %s returned %s\n",
2892                         smb_fname_str_dbg(smb_dname),
2893                         nt_errstr(status)));
2894                 return status;
2895         }
2896
2897         if ((access_mask & SEC_FLAG_SYSTEM_SECURITY) &&
2898                         !security_token_has_privilege(get_current_nttok(conn),
2899                                         SEC_PRIV_SECURITY)) {
2900                 DEBUG(10, ("open_directory: open on %s "
2901                         "failed - SEC_FLAG_SYSTEM_SECURITY denied.\n",
2902                         smb_fname_str_dbg(smb_dname)));
2903                 return NT_STATUS_PRIVILEGE_NOT_HELD;
2904         }
2905
2906         switch( create_disposition ) {
2907                 case FILE_OPEN:
2908
2909                         if (!dir_existed) {
2910                                 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
2911                         }
2912
2913                         info = FILE_WAS_OPENED;
2914                         break;
2915
2916                 case FILE_CREATE:
2917
2918                         /* If directory exists error. If directory doesn't
2919                          * exist create. */
2920
2921                         if (dir_existed) {
2922                                 status = NT_STATUS_OBJECT_NAME_COLLISION;
2923                                 DEBUG(2, ("open_directory: unable to create "
2924                                           "%s. Error was %s\n",
2925                                           smb_fname_str_dbg(smb_dname),
2926                                           nt_errstr(status)));
2927                                 return status;
2928                         }
2929
2930                         status = mkdir_internal(conn, smb_dname,
2931                                                 file_attributes);
2932
2933                         if (!NT_STATUS_IS_OK(status)) {
2934                                 DEBUG(2, ("open_directory: unable to create "
2935                                           "%s. Error was %s\n",
2936                                           smb_fname_str_dbg(smb_dname),
2937                                           nt_errstr(status)));
2938                                 return status;
2939                         }
2940
2941                         info = FILE_WAS_CREATED;
2942                         break;
2943
2944                 case FILE_OPEN_IF:
2945                         /*
2946                          * If directory exists open. If directory doesn't
2947                          * exist create.
2948                          */
2949
2950                         if (dir_existed) {
2951                                 status = NT_STATUS_OK;
2952                                 info = FILE_WAS_OPENED;
2953                         } else {
2954                                 status = mkdir_internal(conn, smb_dname,
2955                                                 file_attributes);
2956
2957                                 if (NT_STATUS_IS_OK(status)) {
2958                                         info = FILE_WAS_CREATED;
2959                                 } else {
2960                                         /* Cope with create race. */
2961                                         if (!NT_STATUS_EQUAL(status,
2962                                                         NT_STATUS_OBJECT_NAME_COLLISION)) {
2963                                                 DEBUG(2, ("open_directory: unable to create "
2964                                                         "%s. Error was %s\n",
2965                                                         smb_fname_str_dbg(smb_dname),
2966                                                         nt_errstr(status)));
2967                                                 return status;
2968                                         }
2969                                         info = FILE_WAS_OPENED;
2970                                 }
2971                         }
2972
2973                         break;
2974
2975                 case FILE_SUPERSEDE:
2976                 case FILE_OVERWRITE:
2977                 case FILE_OVERWRITE_IF:
2978                 default:
2979                         DEBUG(5,("open_directory: invalid create_disposition "
2980                                  "0x%x for directory %s\n",
2981                                  (unsigned int)create_disposition,
2982                                  smb_fname_str_dbg(smb_dname)));
2983                         return NT_STATUS_INVALID_PARAMETER;
2984         }
2985
2986         if(!S_ISDIR(smb_dname->st.st_ex_mode)) {
2987                 DEBUG(5,("open_directory: %s is not a directory !\n",
2988                          smb_fname_str_dbg(smb_dname)));
2989                 return NT_STATUS_NOT_A_DIRECTORY;
2990         }
2991
2992         if (info == FILE_WAS_OPENED) {
2993                 status = smbd_check_access_rights(conn, smb_dname, access_mask);
2994                 if (!NT_STATUS_IS_OK(status)) {
2995                         DEBUG(10, ("open_directory: smbd_check_access_rights on "
2996                                 "file %s failed with %s\n",
2997                                 smb_fname_str_dbg(smb_dname),
2998                                 nt_errstr(status)));
2999                         return status;
3000                 }
3001         }
3002
3003         status = file_new(req, conn, &fsp);
3004         if(!NT_STATUS_IS_OK(status)) {
3005                 return status;
3006         }
3007
3008         /*
3009          * Setup the files_struct for it.
3010          */
3011
3012         fsp->file_id = vfs_file_id_from_sbuf(conn, &smb_dname->st);
3013         fsp->vuid = req ? req->vuid : UID_FIELD_INVALID;
3014         fsp->file_pid = req ? req->smbpid : 0;
3015         fsp->can_lock = False;
3016         fsp->can_read = False;
3017         fsp->can_write = False;
3018
3019         fsp->share_access = share_access;
3020         fsp->fh->private_options = 0;
3021         /*
3022          * According to Samba4, SEC_FILE_READ_ATTRIBUTE is always granted,
3023          */
3024         fsp->access_mask = access_mask | FILE_READ_ATTRIBUTES;
3025         fsp->print_file = NULL;
3026         fsp->modified = False;
3027         fsp->oplock_type = NO_OPLOCK;
3028         fsp->sent_oplock_break = NO_BREAK_SENT;
3029         fsp->is_directory = True;
3030         fsp->posix_open = (file_attributes & FILE_FLAG_POSIX_SEMANTICS) ? True : False;
3031         status = fsp_set_smb_fname(fsp, smb_dname);
3032         if (!NT_STATUS_IS_OK(status)) {
3033                 file_free(req, fsp);
3034                 return status;
3035         }
3036
3037         mtimespec = smb_dname->st.st_ex_mtime;
3038
3039 #ifdef O_DIRECTORY
3040         status = fd_open(conn, fsp, O_RDONLY|O_DIRECTORY, 0);
3041 #else
3042         /* POSIX allows us to open a directory with O_RDONLY. */
3043         status = fd_open(conn, fsp, O_RDONLY, 0);
3044 #endif
3045         if (!NT_STATUS_IS_OK(status)) {
3046                 DEBUG(5, ("open_directory: Could not open fd for "
3047                         "%s (%s)\n",
3048                         smb_fname_str_dbg(smb_dname),
3049                         nt_errstr(status)));
3050                 file_free(req, fsp);
3051                 return status;
3052         }
3053
3054         status = vfs_stat_fsp(fsp);
3055         if (!NT_STATUS_IS_OK(status)) {
3056                 fd_close(fsp);
3057                 file_free(req, fsp);
3058                 return status;
3059         }
3060
3061         /* Ensure there was no race condition. */
3062         if (!check_same_stat(&smb_dname->st, &fsp->fsp_name->st)) {
3063                 DEBUG(5,("open_directory: stat struct differs for "
3064                         "directory %s.\n",
3065                         smb_fname_str_dbg(smb_dname)));
3066                 fd_close(fsp);
3067                 file_free(req, fsp);
3068                 return NT_STATUS_ACCESS_DENIED;
3069         }
3070
3071         lck = get_share_mode_lock(talloc_tos(), fsp->file_id,
3072                                   conn->connectpath, smb_dname,
3073                                   &mtimespec);
3074
3075         if (lck == NULL) {
3076                 DEBUG(0, ("open_directory: Could not get share mode lock for "
3077                           "%s\n", smb_fname_str_dbg(smb_dname)));
3078                 fd_close(fsp);
3079                 file_free(req, fsp);
3080                 return NT_STATUS_SHARING_VIOLATION;
3081         }
3082
3083         status = open_mode_check(conn, lck, fsp->name_hash,
3084                                 access_mask, share_access,
3085                                  create_options, &dir_existed);
3086
3087         if (!NT_STATUS_IS_OK(status)) {
3088                 TALLOC_FREE(lck);
3089                 fd_close(fsp);
3090                 file_free(req, fsp);
3091                 return status;
3092         }
3093
3094         set_share_mode(lck, fsp, get_current_uid(conn),
3095                         req ? req->mid : 0, NO_OPLOCK);
3096
3097         /* For directories the delete on close bit at open time seems
3098            always to be honored on close... See test 19 in Samba4 BASE-DELETE. */
3099         if (create_options & FILE_DELETE_ON_CLOSE) {
3100                 status = can_set_delete_on_close(fsp, 0);
3101                 if (!NT_STATUS_IS_OK(status) && !NT_STATUS_EQUAL(status, NT_STATUS_DIRECTORY_NOT_EMPTY)) {
3102                         TALLOC_FREE(lck);
3103                         fd_close(fsp);
3104                         file_free(req, fsp);
3105                         return status;
3106                 }
3107
3108                 if (NT_STATUS_IS_OK(status)) {
3109                         /* Note that here we set the *inital* delete on close flag,
3110                            not the regular one. The magic gets handled in close. */
3111                         fsp->initial_delete_on_close = True;
3112                 }
3113         }
3114
3115         TALLOC_FREE(lck);
3116
3117         if (pinfo) {
3118                 *pinfo = info;
3119         }
3120
3121         *result = fsp;
3122         return NT_STATUS_OK;
3123 }
3124
3125 NTSTATUS create_directory(connection_struct *conn, struct smb_request *req,
3126                           struct smb_filename *smb_dname)
3127 {
3128         NTSTATUS status;
3129         files_struct *fsp;
3130
3131         status = SMB_VFS_CREATE_FILE(
3132                 conn,                                   /* conn */
3133                 req,                                    /* req */
3134                 0,                                      /* root_dir_fid */
3135                 smb_dname,                              /* fname */
3136                 FILE_READ_ATTRIBUTES,                   /* access_mask */
3137                 FILE_SHARE_NONE,                        /* share_access */
3138                 FILE_CREATE,                            /* create_disposition*/
3139                 FILE_DIRECTORY_FILE,                    /* create_options */
3140                 FILE_ATTRIBUTE_DIRECTORY,               /* file_attributes */
3141                 0,                                      /* oplock_request */
3142                 0,                                      /* allocation_size */
3143                 0,                                      /* private_flags */
3144                 NULL,                                   /* sd */
3145                 NULL,                                   /* ea_list */
3146                 &fsp,                                   /* result */
3147                 NULL);                                  /* pinfo */
3148
3149         if (NT_STATUS_IS_OK(status)) {
3150                 close_file(req, fsp, NORMAL_CLOSE);
3151         }
3152
3153         return status;
3154 }
3155
3156 /****************************************************************************
3157  Receive notification that one of our open files has been renamed by another
3158  smbd process.
3159 ****************************************************************************/
3160
3161 void msg_file_was_renamed(struct messaging_context *msg,
3162                           void *private_data,
3163                           uint32_t msg_type,
3164                           struct server_id server_id,
3165                           DATA_BLOB *data)
3166 {
3167         files_struct *fsp;
3168         char *frm = (char *)data->data;
3169         struct file_id id;
3170         const char *sharepath;
3171         const char *base_name;
3172         const char *stream_name;
3173         struct smb_filename *smb_fname = NULL;
3174         size_t sp_len, bn_len;
3175         NTSTATUS status;
3176         struct smbd_server_connection *sconn =
3177                 talloc_get_type_abort(private_data,
3178                 struct smbd_server_connection);
3179
3180         if (data->data == NULL
3181             || data->length < MSG_FILE_RENAMED_MIN_SIZE + 2) {
3182                 DEBUG(0, ("msg_file_was_renamed: Got invalid msg len %d\n",
3183                           (int)data->length));
3184                 return;
3185         }
3186
3187         /* Unpack the message. */
3188         pull_file_id_24(frm, &id);
3189         sharepath = &frm[24];
3190         sp_len = strlen(sharepath);
3191         base_name = sharepath + sp_len + 1;
3192         bn_len = strlen(base_name);
3193         stream_name = sharepath + sp_len + 1 + bn_len + 1;
3194
3195         /* stream_name must always be NULL if there is no stream. */
3196         if (stream_name[0] == '\0') {
3197                 stream_name = NULL;
3198         }
3199
3200         status = create_synthetic_smb_fname(talloc_tos(), base_name,
3201                                             stream_name, NULL, &smb_fname);
3202         if (!NT_STATUS_IS_OK(status)) {
3203                 return;
3204         }
3205
3206         DEBUG(10,("msg_file_was_renamed: Got rename message for sharepath %s, new name %s, "
3207                 "file_id %s\n",
3208                 sharepath, smb_fname_str_dbg(smb_fname),
3209                 file_id_string_tos(&id)));
3210
3211         for(fsp = file_find_di_first(sconn, id); fsp;
3212             fsp = file_find_di_next(fsp)) {
3213                 if (memcmp(fsp->conn->connectpath, sharepath, sp_len) == 0) {
3214
3215                         DEBUG(10,("msg_file_was_renamed: renaming file %s from %s -> %s\n",
3216                                 fsp_fnum_dbg(fsp), fsp_str_dbg(fsp),
3217                                 smb_fname_str_dbg(smb_fname)));
3218                         status = fsp_set_smb_fname(fsp, smb_fname);
3219                         if (!NT_STATUS_IS_OK(status)) {
3220                                 goto out;
3221                         }
3222                 } else {
3223                         /* TODO. JRA. */
3224                         /* Now we have the complete path we can work out if this is
3225                            actually within this share and adjust newname accordingly. */
3226                         DEBUG(10,("msg_file_was_renamed: share mismatch (sharepath %s "
3227                                 "not sharepath %s) "
3228                                 "%s from %s -> %s\n",
3229                                 fsp->conn->connectpath,
3230                                 sharepath,
3231                                 fsp_fnum_dbg(fsp),
3232                                 fsp_str_dbg(fsp),
3233                                 smb_fname_str_dbg(smb_fname)));
3234                 }
3235         }
3236  out:
3237         TALLOC_FREE(smb_fname);
3238         return;
3239 }
3240
3241 /*
3242  * If a main file is opened for delete, all streams need to be checked for
3243  * !FILE_SHARE_DELETE. Do this by opening with DELETE_ACCESS.
3244  * If that works, delete them all by setting the delete on close and close.
3245  */
3246
3247 NTSTATUS open_streams_for_delete(connection_struct *conn,
3248                                         const char *fname)
3249 {
3250         struct stream_struct *stream_info = NULL;
3251         files_struct **streams = NULL;
3252         int i;
3253         unsigned int num_streams = 0;
3254         TALLOC_CTX *frame = talloc_stackframe();
3255         NTSTATUS status;
3256
3257         status = vfs_streaminfo(conn, NULL, fname, talloc_tos(),
3258                                 &num_streams, &stream_info);
3259
3260         if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_IMPLEMENTED)
3261             || NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
3262                 DEBUG(10, ("no streams around\n"));
3263                 TALLOC_FREE(frame);
3264                 return NT_STATUS_OK;
3265         }
3266
3267         if (!NT_STATUS_IS_OK(status)) {
3268                 DEBUG(10, ("vfs_streaminfo failed: %s\n",
3269                            nt_errstr(status)));
3270                 goto fail;
3271         }
3272
3273         DEBUG(10, ("open_streams_for_delete found %d streams\n",
3274                    num_streams));
3275
3276         if (num_streams == 0) {
3277                 TALLOC_FREE(frame);
3278                 return NT_STATUS_OK;
3279         }
3280
3281         streams = talloc_array(talloc_tos(), files_struct *, num_streams);
3282         if (streams == NULL) {
3283                 DEBUG(0, ("talloc failed\n"));
3284                 status = NT_STATUS_NO_MEMORY;
3285                 goto fail;
3286         }
3287
3288         for (i=0; i<num_streams; i++) {
3289                 struct smb_filename *smb_fname = NULL;
3290
3291                 if (strequal(stream_info[i].name, "::$DATA")) {
3292                         streams[i] = NULL;
3293                         continue;
3294                 }
3295
3296                 status = create_synthetic_smb_fname(talloc_tos(), fname,
3297                                                     stream_info[i].name,
3298                                                     NULL, &smb_fname);
3299                 if (!NT_STATUS_IS_OK(status)) {
3300                         goto fail;
3301                 }
3302
3303                 if (SMB_VFS_STAT(conn, smb_fname) == -1) {
3304                         DEBUG(10, ("Unable to stat stream: %s\n",
3305                                    smb_fname_str_dbg(smb_fname)));
3306                 }
3307
3308                 status = SMB_VFS_CREATE_FILE(
3309                          conn,                  /* conn */
3310                          NULL,                  /* req */
3311                          0,                     /* root_dir_fid */
3312                          smb_fname,             /* fname */
3313                          DELETE_ACCESS,         /* access_mask */
3314                          (FILE_SHARE_READ |     /* share_access */
3315                              FILE_SHARE_WRITE | FILE_SHARE_DELETE),
3316                          FILE_OPEN,             /* create_disposition*/
3317                          0,                     /* create_options */
3318                          FILE_ATTRIBUTE_NORMAL, /* file_attributes */
3319                          0,                     /* oplock_request */
3320                          0,                     /* allocation_size */
3321                          NTCREATEX_OPTIONS_PRIVATE_STREAM_DELETE, /* private_flags */
3322                          NULL,                  /* sd */
3323                          NULL,                  /* ea_list */
3324                          &streams[i],           /* result */
3325                          NULL);                 /* pinfo */
3326
3327                 if (!NT_STATUS_IS_OK(status)) {
3328                         DEBUG(10, ("Could not open stream %s: %s\n",
3329                                    smb_fname_str_dbg(smb_fname),
3330                                    nt_errstr(status)));
3331
3332                         TALLOC_FREE(smb_fname);
3333                         break;
3334                 }
3335                 TALLOC_FREE(smb_fname);
3336         }
3337
3338         /*
3339          * don't touch the variable "status" beyond this point :-)
3340          */
3341
3342         for (i -= 1 ; i >= 0; i--) {
3343                 if (streams[i] == NULL) {
3344                         continue;
3345                 }
3346
3347                 DEBUG(10, ("Closing stream # %d, %s\n", i,
3348                            fsp_str_dbg(streams[i])));
3349                 close_file(NULL, streams[i], NORMAL_CLOSE);
3350         }
3351
3352  fail:
3353         TALLOC_FREE(frame);
3354         return status;
3355 }
3356
3357 /*********************************************************************
3358  Create a default ACL by inheriting from the parent. If no inheritance
3359  from the parent available, don't set anything. This will leave the actual
3360  permissions the new file or directory already got from the filesystem
3361  as the NT ACL when read.
3362 *********************************************************************/
3363
3364 static NTSTATUS inherit_new_acl(files_struct *fsp)
3365 {
3366         TALLOC_CTX *ctx = talloc_tos();
3367         char *parent_name = NULL;
3368         struct security_descriptor *parent_desc = NULL;
3369         NTSTATUS status = NT_STATUS_OK;
3370         struct security_descriptor *psd = NULL;
3371         struct dom_sid *owner_sid = NULL;
3372         struct dom_sid *group_sid = NULL;
3373         uint32_t security_info_sent = (SECINFO_OWNER | SECINFO_GROUP | SECINFO_DACL);
3374         bool inherit_owner = lp_inherit_owner(SNUM(fsp->conn));
3375         bool inheritable_components = false;
3376         size_t size = 0;
3377
3378         if (!parent_dirname(ctx, fsp->fsp_name->base_name, &parent_name, NULL)) {
3379                 return NT_STATUS_NO_MEMORY;
3380         }
3381
3382         status = SMB_VFS_GET_NT_ACL(fsp->conn,
3383                                 parent_name,
3384                                 (SECINFO_OWNER | SECINFO_GROUP | SECINFO_DACL),
3385                                 &parent_desc);
3386         if (!NT_STATUS_IS_OK(status)) {
3387                 return status;
3388         }
3389
3390         inheritable_components = sd_has_inheritable_components(parent_desc,
3391                                         fsp->is_directory);
3392
3393         if (!inheritable_components && !inherit_owner) {
3394                 /* Nothing to inherit and not setting owner. */
3395                 return NT_STATUS_OK;
3396         }
3397
3398         /* Create an inherited descriptor from the parent. */
3399
3400         if (DEBUGLEVEL >= 10) {
3401                 DEBUG(10,("inherit_new_acl: parent acl for %s is:\n",
3402                         fsp_str_dbg(fsp) ));
3403                 NDR_PRINT_DEBUG(security_descriptor, parent_desc);
3404         }
3405
3406         /* Inherit from parent descriptor if "inherit owner" set. */
3407         if (inherit_owner) {
3408                 owner_sid = parent_desc->owner_sid;
3409                 group_sid = parent_desc->group_sid;
3410         }
3411
3412         if (owner_sid == NULL) {
3413                 owner_sid = &fsp->conn->session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
3414         }
3415         if (group_sid == NULL) {
3416                 group_sid = &fsp->conn->session_info->security_token->sids[PRIMARY_GROUP_SID_INDEX];
3417         }
3418
3419         status = se_create_child_secdesc(ctx,
3420                         &psd,
3421                         &size,
3422                         parent_desc,
3423                         owner_sid,
3424                         group_sid,
3425                         fsp->is_directory);