Don't allow asynchronous creates to be canceled in SMB2.
[kai/samba.git] / source3 / smbd / open.c
index 17d9f6f8fb69cce4bf69abe3a6880365d4a71857..c2bf8edb7a6b7a45b60f75d80538614c6ed95d6c 100644 (file)
@@ -35,13 +35,14 @@ extern const struct generic_mapping file_generic_mapping;
 
 struct deferred_open_record {
         bool delayed_for_oplocks;
+       bool async_open;
         struct file_id id;
 };
 
 /****************************************************************************
  If the requester wanted DELETE_ACCESS and was rejected because
  the file ACL didn't include DELETE_ACCESS, see if the parent ACL
- ovverrides this.
+ overrides this.
 ****************************************************************************/
 
 static bool parent_override_delete(connection_struct *conn,
@@ -69,7 +70,7 @@ NTSTATUS smbd_check_access_rights(struct connection_struct *conn,
        NTSTATUS status;
        struct security_descriptor *sd = NULL;
        uint32_t rejected_share_access;
-       uint32_t rejected_mask = 0;
+       uint32_t rejected_mask = access_mask;
 
        rejected_share_access = access_mask & ~(conn->share_access);
 
@@ -99,7 +100,9 @@ NTSTATUS smbd_check_access_rights(struct connection_struct *conn,
                return NT_STATUS_OK;
        }
 
-       if (access_mask == DELETE_ACCESS && S_ISLNK(smb_fname->st.st_ex_mode)) {
+       if (access_mask == DELETE_ACCESS &&
+                       VALID_STAT(smb_fname->st) &&
+                       S_ISLNK(smb_fname->st.st_ex_mode)) {
                /* We can always delete a symlink. */
                DEBUG(10,("smbd_check_access_rights: not checking ACL "
                        "on DELETE_ACCESS on symlink %s.\n",
@@ -117,6 +120,11 @@ NTSTATUS smbd_check_access_rights(struct connection_struct *conn,
                        "on %s: %s\n",
                        smb_fname_str_dbg(smb_fname),
                        nt_errstr(status)));
+
+               if (NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
+                       goto access_denied;
+               }
+
                return status;
        }
 
@@ -152,8 +160,12 @@ NTSTATUS smbd_check_access_rights(struct connection_struct *conn,
        }
 
        /* Here we know status == NT_STATUS_ACCESS_DENIED. */
+
+  access_denied:
+
        if ((access_mask & FILE_WRITE_ATTRIBUTES) &&
                        (rejected_mask & FILE_WRITE_ATTRIBUTES) &&
+                       !lp_store_dos_attributes(SNUM(conn)) &&
                        (lp_map_readonly(SNUM(conn)) ||
                        lp_map_archive(SNUM(conn)) ||
                        lp_map_hidden(SNUM(conn)) ||
@@ -190,15 +202,13 @@ NTSTATUS smbd_check_access_rights(struct connection_struct *conn,
 
        if (rejected_mask != 0) {
                return NT_STATUS_ACCESS_DENIED;
-       } else {
-               return NT_STATUS_OK;
        }
+       return NT_STATUS_OK;
 }
 
 static NTSTATUS check_parent_access(struct connection_struct *conn,
                                struct smb_filename *smb_fname,
-                               uint32_t access_mask,
-                               char **pp_parent_dir)
+                               uint32_t access_mask)
 {
        NTSTATUS status;
        char *parent_dir = NULL;
@@ -212,10 +222,6 @@ static NTSTATUS check_parent_access(struct connection_struct *conn,
                return NT_STATUS_NO_MEMORY;
        }
 
-       if (pp_parent_dir) {
-               *pp_parent_dir = parent_dir;
-       }
-
        if (get_current_uid(conn) == (uid_t)0) {
                /* I'm sorry sir, I didn't know you were root... */
                DEBUG(10,("check_parent_access: root override "
@@ -286,7 +292,26 @@ static NTSTATUS fd_open(struct connection_struct *conn,
 
        fsp->fh->fd = SMB_VFS_OPEN(conn, smb_fname, fsp, flags, mode);
        if (fsp->fh->fd == -1) {
-               status = map_nt_error_from_unix(errno);
+               int posix_errno = errno;
+#ifdef O_NOFOLLOW
+#if defined(ENOTSUP) && defined(OSF1)
+               /* handle special Tru64 errno */
+               if (errno == ENOTSUP) {
+                       posix_errno = ELOOP;
+               }
+#endif /* ENOTSUP */
+#ifdef EFTYPE
+               /* fix broken NetBSD errno */
+               if (errno == EFTYPE) {
+                       posix_errno = ELOOP;
+               }
+#endif /* EFTYPE */
+               /* fix broken FreeBSD errno */
+               if (errno == EMLINK) {
+                       posix_errno = ELOOP;
+               }
+#endif /* O_NOFOLLOW */
+               status = map_nt_error_from_unix(posix_errno);
                if (errno == EMFILE) {
                        static time_t last_warned = 0L;
 
@@ -626,8 +651,7 @@ static NTSTATUS open_file(files_struct *fsp,
                        } else if (local_flags & O_CREAT){
                                status = check_parent_access(conn,
                                                smb_fname,
-                                               SEC_DIR_ADD_FILE,
-                                               NULL);
+                                               SEC_DIR_ADD_FILE);
                        } else {
                                /* File didn't exist and no O_CREAT. */
                                return NT_STATUS_OBJECT_NAME_NOT_FOUND;
@@ -768,18 +792,14 @@ static NTSTATUS open_file(files_struct *fsp,
                return NT_STATUS_FILE_IS_A_DIRECTORY;
        }
 
-       fsp->mode = smb_fname->st.st_ex_mode;
        fsp->file_id = vfs_file_id_from_sbuf(conn, &smb_fname->st);
        fsp->vuid = req ? req->vuid : UID_FIELD_INVALID;
        fsp->file_pid = req ? req->smbpid : 0;
        fsp->can_lock = True;
-       fsp->can_read = (access_mask & (FILE_READ_DATA)) ? True : False;
-       if (!CAN_WRITE(conn)) {
-               fsp->can_write = False;
-       } else {
-               fsp->can_write = (access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) ?
-                       True : False;
-       }
+       fsp->can_read = ((access_mask & FILE_READ_DATA) != 0);
+       fsp->can_write =
+               CAN_WRITE(conn) &&
+               ((access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) != 0);
        fsp->print_file = NULL;
        fsp->modified = False;
        fsp->sent_oplock_break = NO_BREAK_SENT;
@@ -891,9 +911,10 @@ static void validate_my_share_entries(struct smbd_server_connection *sconn,
                                      int num,
                                      struct share_mode_entry *share_entry)
 {
+       struct server_id self = messaging_server_id(sconn->msg_ctx);
        files_struct *fsp;
 
-       if (!procid_is_me(&share_entry->pid)) {
+       if (!serverid_equal(&self, &share_entry->pid)) {
                return;
        }
 
@@ -977,16 +998,27 @@ static NTSTATUS open_mode_check(connection_struct *conn,
 {
        int i;
 
-       if(lck->num_share_modes == 0) {
+       if(lck->data->num_share_modes == 0) {
                return NT_STATUS_OK;
        }
 
-       *file_existed = True;
-
        /* A delete on close prohibits everything */
 
        if (is_delete_on_close_set(lck, name_hash)) {
-               return NT_STATUS_DELETE_PENDING;
+               /*
+                * Check the delete on close token
+                * is valid. It could have been left
+                * after a server crash.
+                */
+               for(i = 0; i < lck->data->num_share_modes; i++) {
+                       if (!share_mode_stale_pid(lck->data, i)) {
+
+                               *file_existed = true;
+
+                               return NT_STATUS_DELETE_PENDING;
+                       }
+               }
+               return NT_STATUS_OK;
        }
 
        if (is_stat_open(access_mask)) {
@@ -1000,9 +1032,9 @@ static NTSTATUS open_mode_check(connection_struct *conn,
         */
 
 #if defined(DEVELOPER)
-       for(i = 0; i < lck->num_share_modes; i++) {
+       for(i = 0; i < lck->data->num_share_modes; i++) {
                validate_my_share_entries(conn->sconn, i,
-                                         &lck->share_modes[i]);
+                                         &lck->data->share_modes[i]);
        }
 #endif
 
@@ -1011,20 +1043,31 @@ static NTSTATUS open_mode_check(connection_struct *conn,
        }
 
        /* Now we check the share modes, after any oplock breaks. */
-       for(i = 0; i < lck->num_share_modes; i++) {
+       for(i = 0; i < lck->data->num_share_modes; i++) {
 
-               if (!is_valid_share_mode_entry(&lck->share_modes[i])) {
+               if (!is_valid_share_mode_entry(&lck->data->share_modes[i])) {
                        continue;
                }
 
                /* someone else has a share lock on it, check to see if we can
                 * too */
-               if (share_conflict(&lck->share_modes[i],
+               if (share_conflict(&lck->data->share_modes[i],
                                   access_mask, share_access)) {
+
+                       if (share_mode_stale_pid(lck->data, i)) {
+                               continue;
+                       }
+
+                       *file_existed = true;
+
                        return NT_STATUS_SHARING_VIOLATION;
                }
        }
 
+       if (lck->data->num_share_modes != 0) {
+               *file_existed = true;
+       }
+
        return NT_STATUS_OK;
 }
 
@@ -1084,7 +1127,7 @@ static NTSTATUS send_break_message(files_struct *fsp,
 
 static void find_oplock_types(files_struct *fsp,
                                int oplock_request,
-                               struct share_mode_lock *lck,
+                               const struct share_mode_lock *lck,
                                struct share_mode_entry **pp_batch,
                                struct share_mode_entry **pp_ex_or_batch,
                                bool *got_level2,
@@ -1105,44 +1148,62 @@ static void find_oplock_types(files_struct *fsp,
                return;
        }
 
-       for (i=0; i<lck->num_share_modes; i++) {
-               if (!is_valid_share_mode_entry(&lck->share_modes[i])) {
+       for (i=0; i<lck->data->num_share_modes; i++) {
+               if (!is_valid_share_mode_entry(&lck->data->share_modes[i])) {
                        continue;
                }
 
-               if (lck->share_modes[i].op_type == NO_OPLOCK &&
-                               is_stat_open(lck->share_modes[i].access_mask)) {
+               if (lck->data->share_modes[i].op_type == NO_OPLOCK &&
+                               is_stat_open(lck->data->share_modes[i].access_mask)) {
                        /* We ignore stat opens in the table - they
                           always have NO_OPLOCK and never get or
                           cause breaks. JRA. */
                        continue;
                }
 
-               if (BATCH_OPLOCK_TYPE(lck->share_modes[i].op_type)) {
+               if (BATCH_OPLOCK_TYPE(lck->data->share_modes[i].op_type)) {
                        /* batch - can only be one. */
+                       if (share_mode_stale_pid(lck->data, i)) {
+                               DEBUG(10, ("Found stale batch oplock\n"));
+                               continue;
+                       }
                        if (*pp_ex_or_batch || *pp_batch || *got_level2 || *got_no_oplock) {
                                smb_panic("Bad batch oplock entry.");
                        }
-                       *pp_batch = &lck->share_modes[i];
+                       *pp_batch = &lck->data->share_modes[i];
                }
 
-               if (EXCLUSIVE_OPLOCK_TYPE(lck->share_modes[i].op_type)) {
+               if (EXCLUSIVE_OPLOCK_TYPE(lck->data->share_modes[i].op_type)) {
+                       if (share_mode_stale_pid(lck->data, i)) {
+                               DEBUG(10, ("Found stale duplicate oplock\n"));
+                               continue;
+                       }
                        /* Exclusive or batch - can only be one. */
                        if (*pp_ex_or_batch || *got_level2 || *got_no_oplock) {
                                smb_panic("Bad exclusive or batch oplock entry.");
                        }
-                       *pp_ex_or_batch = &lck->share_modes[i];
+                       *pp_ex_or_batch = &lck->data->share_modes[i];
                }
 
-               if (LEVEL_II_OPLOCK_TYPE(lck->share_modes[i].op_type)) {
+               if (LEVEL_II_OPLOCK_TYPE(lck->data->share_modes[i].op_type)) {
                        if (*pp_batch || *pp_ex_or_batch) {
+                               if (share_mode_stale_pid(lck->data, i)) {
+                                       DEBUG(10, ("Found stale LevelII "
+                                                  "oplock\n"));
+                                       continue;
+                               }
                                smb_panic("Bad levelII oplock entry.");
                        }
                        *got_level2 = true;
                }
 
-               if (lck->share_modes[i].op_type == NO_OPLOCK) {
+               if (lck->data->share_modes[i].op_type == NO_OPLOCK) {
                        if (*pp_batch || *pp_ex_or_batch) {
+                               if (share_mode_stale_pid(lck->data, i)) {
+                                       DEBUG(10, ("Found stale NO_OPLOCK "
+                                                  "entry\n"));
+                                       continue;
+                               }
                                smb_panic("Bad no oplock entry.");
                        }
                        *got_no_oplock = true;
@@ -1194,8 +1255,18 @@ static bool delay_for_exclusive_oplocks(files_struct *fsp,
        return true;
 }
 
+static bool file_has_brlocks(files_struct *fsp)
+{
+       struct byte_range_lock *br_lck;
+
+       br_lck = brl_get_locks_readonly(fsp);
+       if (!br_lck)
+               return false;
+
+       return br_lck->num_locks > 0 ? true : false;
+}
+
 static void grant_fsp_oplock_type(files_struct *fsp,
-                               const struct byte_range_lock *br_lck,
                                int oplock_request,
                                bool got_level2_oplock,
                                bool got_a_none_oplock)
@@ -1213,7 +1284,9 @@ static void grant_fsp_oplock_type(files_struct *fsp,
                DEBUG(10,("grant_fsp_oplock_type: oplock type 0x%x on file %s\n",
                        fsp->oplock_type, fsp_str_dbg(fsp)));
                return;
-       } else if (br_lck && br_lck->num_locks > 0) {
+       }
+
+       if (lp_locking(fsp->conn->params) && file_has_brlocks(fsp)) {
                DEBUG(10,("grant_fsp_oplock_type: file %s has byte range locks\n",
                        fsp_str_dbg(fsp)));
                fsp->oplock_type = NO_OPLOCK;
@@ -1282,20 +1355,24 @@ static void defer_open(struct share_mode_lock *lck,
                       struct smb_request *req,
                       struct deferred_open_record *state)
 {
-       int i;
+       struct server_id self = messaging_server_id(req->sconn->msg_ctx);
 
        /* Paranoia check */
 
-       for (i=0; i<lck->num_share_modes; i++) {
-               struct share_mode_entry *e = &lck->share_modes[i];
+       if (lck) {
+               int i;
+
+               for (i=0; i<lck->data->num_share_modes; i++) {
+                       struct share_mode_entry *e = &lck->data->share_modes[i];
 
-               if (is_deferred_open_entry(e) &&
-                   procid_is_me(&e->pid) &&
-                   (e->op_mid == req->mid)) {
-                       DEBUG(0, ("Trying to defer an already deferred "
-                               "request: mid=%llu, exiting\n",
-                               (unsigned long long)req->mid));
-                       exit_server("attempt to defer a deferred request");
+                       if (is_deferred_open_entry(e) &&
+                           serverid_equal(&self, &e->pid) &&
+                           (e->op_mid == req->mid)) {
+                               DEBUG(0, ("Trying to defer an already deferred "
+                                       "request: mid=%llu, exiting\n",
+                                       (unsigned long long)req->mid));
+                               exit_server("attempt to defer a deferred request");
+                       }
                }
        }
 
@@ -1311,8 +1388,9 @@ static void defer_open(struct share_mode_lock *lck,
                                       state->id, (char *)state, sizeof(*state))) {
                exit_server("push_deferred_open_message_smb failed");
        }
-       add_deferred_open(lck, req->mid, request_time,
-                         sconn_server_id(req->sconn), state->id);
+       if (lck) {
+               add_deferred_open(lck, req->mid, request_time, self, state->id);
+       }
 }
 
 
@@ -1368,16 +1446,16 @@ bool open_match_attributes(connection_struct *conn,
  Try and find a duplicated file handle.
 ****************************************************************************/
 
-NTSTATUS fcb_or_dos_open(struct smb_request *req,
-                                    connection_struct *conn,
-                                    files_struct *fsp_to_dup_into,
-                                    const struct smb_filename *smb_fname,
-                                    struct file_id id,
-                                    uint16 file_pid,
-                                    uint16 vuid,
-                                    uint32 access_mask,
-                                    uint32 share_access,
-                                    uint32 create_options)
+static NTSTATUS fcb_or_dos_open(struct smb_request *req,
+                               connection_struct *conn,
+                               files_struct *fsp_to_dup_into,
+                               const struct smb_filename *smb_fname,
+                               struct file_id id,
+                               uint16 file_pid,
+                               uint64_t vuid,
+                               uint32 access_mask,
+                               uint32 share_access,
+                               uint32 create_options)
 {
        files_struct *fsp;
 
@@ -1388,9 +1466,9 @@ NTSTATUS fcb_or_dos_open(struct smb_request *req,
            fsp = file_find_di_next(fsp)) {
 
                DEBUG(10,("fcb_or_dos_open: checking file %s, fd = %d, "
-                         "vuid = %u, file_pid = %u, private_options = 0x%x "
+                         "vuid = %llu, file_pid = %u, private_options = 0x%x "
                          "access_mask = 0x%x\n", fsp_str_dbg(fsp),
-                         fsp->fh->fd, (unsigned int)fsp->vuid,
+                         fsp->fh->fd, (unsigned long long)fsp->vuid,
                          (unsigned int)fsp->file_pid,
                          (unsigned int)fsp->fh->private_options,
                          (unsigned int)fsp->access_mask ));
@@ -1455,20 +1533,97 @@ static void schedule_defer_open(struct share_mode_lock *lck,
           a 1 second delay for share mode conflicts. */
 
        state.delayed_for_oplocks = True;
-       state.id = lck->id;
+       state.async_open = false;
+       state.id = lck->data->id;
 
        if (!request_timed_out(request_time, timeout)) {
                defer_open(lck, request_time, timeout, req, &state);
        }
 }
 
+/****************************************************************************
+ Reschedule an open call that went asynchronous.
+****************************************************************************/
+
+static void schedule_async_open(struct timeval request_time,
+                               struct smb_request *req)
+{
+       struct deferred_open_record state;
+       struct timeval timeout;
+
+       timeout = timeval_set(20, 0);
+
+       ZERO_STRUCT(state);
+       state.delayed_for_oplocks = false;
+       state.async_open = true;
+
+       if (!request_timed_out(request_time, timeout)) {
+               defer_open(NULL, request_time, timeout, req, &state);
+       }
+}
+
 /****************************************************************************
  Work out what access_mask to use from what the client sent us.
 ****************************************************************************/
 
+static NTSTATUS smbd_calculate_maximum_allowed_access(
+       connection_struct *conn,
+       const struct smb_filename *smb_fname,
+       uint32_t *p_access_mask)
+{
+       struct security_descriptor *sd;
+       uint32_t access_granted;
+       NTSTATUS status;
+
+       if (get_current_uid(conn) == (uid_t)0) {
+               *p_access_mask |= FILE_GENERIC_ALL;
+               return NT_STATUS_OK;
+       }
+
+       status = SMB_VFS_GET_NT_ACL(conn, smb_fname->base_name,
+                                   (SECINFO_OWNER |
+                                    SECINFO_GROUP |
+                                    SECINFO_DACL),&sd);
+
+       if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
+               /*
+                * File did not exist
+                */
+               *p_access_mask = FILE_GENERIC_ALL;
+               return NT_STATUS_OK;
+       }
+       if (!NT_STATUS_IS_OK(status)) {
+               DEBUG(10,("smbd_calculate_access_mask: "
+                         "Could not get acl on file %s: %s\n",
+                         smb_fname_str_dbg(smb_fname),
+                         nt_errstr(status)));
+               return NT_STATUS_ACCESS_DENIED;
+       }
+
+       /*
+        * Never test FILE_READ_ATTRIBUTES. se_access_check()
+        * also takes care of owner WRITE_DAC and READ_CONTROL.
+        */
+       status = se_access_check(sd,
+                                get_current_nttok(conn),
+                                (*p_access_mask & ~FILE_READ_ATTRIBUTES),
+                                &access_granted);
+
+       TALLOC_FREE(sd);
+
+       if (!NT_STATUS_IS_OK(status)) {
+               DEBUG(10, ("smbd_calculate_access_mask: "
+                          "Access denied on file %s: "
+                          "when calculating maximum access\n",
+                          smb_fname_str_dbg(smb_fname)));
+               return NT_STATUS_ACCESS_DENIED;
+       }
+       *p_access_mask = (access_granted | FILE_READ_ATTRIBUTES);
+       return NT_STATUS_OK;
+}
+
 NTSTATUS smbd_calculate_access_mask(connection_struct *conn,
                                    const struct smb_filename *smb_fname,
-                                   bool file_existed,
                                    uint32_t access_mask,
                                    uint32_t *access_mask_out)
 {
@@ -1484,48 +1639,12 @@ NTSTATUS smbd_calculate_access_mask(connection_struct *conn,
 
        /* Calculate MAXIMUM_ALLOWED_ACCESS if requested. */
        if (access_mask & MAXIMUM_ALLOWED_ACCESS) {
-               if (get_current_uid(conn) == (uid_t)0) {
-                       access_mask  |= FILE_GENERIC_ALL;
-               } else if (file_existed) {
-
-                       struct security_descriptor *sd;
-                       uint32_t access_granted = 0;
-
-                       status = SMB_VFS_GET_NT_ACL(conn, smb_fname->base_name,
-                                       (SECINFO_OWNER |
-                                       SECINFO_GROUP |
-                                       SECINFO_DACL),&sd);
-
-                       if (!NT_STATUS_IS_OK(status)) {
-                               DEBUG(10,("smbd_calculate_access_mask: "
-                                       "Could not get acl on file %s: %s\n",
-                                       smb_fname_str_dbg(smb_fname),
-                                       nt_errstr(status)));
-                               return NT_STATUS_ACCESS_DENIED;
-                       }
 
-                       /*
-                        * Never test FILE_READ_ATTRIBUTES. se_access_check()
-                        * also takes care of owner WRITE_DAC and READ_CONTROL.
-                        */
-                       status = se_access_check(sd,
-                                       get_current_nttok(conn),
-                                       (access_mask & ~FILE_READ_ATTRIBUTES),
-                                       &access_granted);
+               status = smbd_calculate_maximum_allowed_access(
+                       conn, smb_fname, &access_mask);
 
-                       TALLOC_FREE(sd);
-
-                       if (!NT_STATUS_IS_OK(status)) {
-                               DEBUG(10, ("smbd_calculate_access_mask: "
-                                       "Access denied on file %s: "
-                                       "when calculating maximum access\n",
-                                       smb_fname_str_dbg(smb_fname)));
-                               return NT_STATUS_ACCESS_DENIED;
-                       }
-
-                       access_mask = (access_granted | FILE_READ_ATTRIBUTES);
-               } else {
-                       access_mask = FILE_GENERIC_ALL;
+               if (!NT_STATUS_IS_OK(status)) {
+                       return status;
                }
 
                access_mask &= conn->share_access;
@@ -1555,8 +1674,8 @@ NTSTATUS smbd_calculate_access_mask(connection_struct *conn,
 void remove_deferred_open_entry(struct file_id id, uint64_t mid,
                                struct server_id pid)
 {
-       struct share_mode_lock *lck = get_share_mode_lock(talloc_tos(), id,
-                       NULL, NULL, NULL);
+       struct share_mode_lock *lck = get_existing_share_mode_lock(
+               talloc_tos(), id);
        if (lck == NULL) {
                DEBUG(0, ("could not get share mode lock\n"));
                return;
@@ -1565,53 +1684,15 @@ void remove_deferred_open_entry(struct file_id id, uint64_t mid,
        TALLOC_FREE(lck);
 }
 
-/****************************************************************
- Ensure we get the brlock lock followed by the share mode lock
- in the correct order to prevent deadlocks if other smbd's are
- using the brlock database on this file simultaneously with this open
- (that code also gets the locks in brlock -> share mode lock order).
-****************************************************************/
-
-static bool acquire_ordered_locks(TALLOC_CTX *mem_ctx,
-                               files_struct *fsp,
-                               const struct file_id id,
-                               const char *connectpath,
-                               const struct smb_filename *smb_fname,
-                               const struct timespec *p_old_write_time,
-                               struct share_mode_lock **p_lck,
-                               struct byte_range_lock **p_br_lck)
+/****************************************************************************
+ Return true if this is a state pointer to an asynchronous create.
+****************************************************************************/
+
+bool is_deferred_open_async(const void *ptr)
 {
-       /* Ordering - we must get the br_lck for this
-          file before the share mode. */
-       if (lp_locking(fsp->conn->params)) {
-               *p_br_lck = brl_get_locks_readonly(fsp);
-               if (*p_br_lck == NULL) {
-                       DEBUG(0, ("Could not get br_lock\n"));
-                       return false;
-               }
-               /* Note - we don't need to free the returned
-                  br_lck explicitly as it was allocated on talloc_tos()
-                  and so will be autofreed (and release the lock)
-                  once the frame context disappears.
-
-                  If it was set to fsp->brlock_rec then it was
-                  talloc_move'd to hang off the fsp pointer and
-                  in this case is guarenteed to not be holding the
-                  lock on the brlock database. */
-       }
-
-       *p_lck = get_share_mode_lock(mem_ctx,
-                               id,
-                               connectpath,
-                               smb_fname,
-                               p_old_write_time);
+       const struct deferred_open_record *state = (const struct deferred_open_record *)ptr;
 
-       if (*p_lck == NULL) {
-               DEBUG(0, ("Could not get share mode lock\n"));
-               TALLOC_FREE(*p_br_lck);
-               return false;
-       }
-       return true;
+       return state->async_open;
 }
 
 /****************************************************************************
@@ -1639,7 +1720,6 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
        bool posix_open = False;
        bool new_file_created = False;
        bool clear_ads = false;
-       struct file_id id;
        NTSTATUS fsp_open = NT_STATUS_ACCESS_DENIED;
        mode_t new_unx_mode = (mode_t)0;
        mode_t unx_mode = (mode_t)0;
@@ -1651,8 +1731,6 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
        NTSTATUS status;
        char *parent_dir;
 
-       ZERO_STRUCT(id);
-
        if (conn->printer) {
                /*
                 * Printers are handled completely differently.
@@ -1721,16 +1799,23 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
                if (get_deferred_open_message_state(req,
                                &request_time,
                                &ptr)) {
-
-                       struct deferred_open_record *state = (struct deferred_open_record *)ptr;
                        /* Remember the absolute time of the original
                           request with this mid. We'll use it later to
                           see if this has timed out. */
 
-                       /* Remove the deferred open entry under lock. */
-                       remove_deferred_open_entry(
-                               state->id, req->mid,
-                               sconn_server_id(req->sconn));
+                       /* If it was an async create retry, the file
+                          didn't exist. */
+
+                       if (is_deferred_open_async(ptr)) {
+                               SET_STAT_INVALID(smb_fname->st);
+                               file_existed = false;
+                       } else {
+                               struct deferred_open_record *state = (struct deferred_open_record *)ptr;
+                               /* Remove the deferred open entry under lock. */
+                               remove_deferred_open_entry(
+                                       state->id, req->mid,
+                                       messaging_server_id(req->sconn->msg_ctx));
+                       }
 
                        /* Ensure we don't reprocess this message. */
                        remove_deferred_open_message_smb(req->sconn, req->mid);
@@ -1860,7 +1945,7 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
                }
        }
 
-       status = smbd_calculate_access_mask(conn, smb_fname, file_existed,
+       status = smbd_calculate_access_mask(conn, smb_fname,
                                        access_mask,
                                        &access_mask); 
        if (!NT_STATUS_IS_OK(status)) {
@@ -1953,23 +2038,20 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
        }
 
        if (file_existed) {
-               struct byte_range_lock *br_lck = NULL;
                struct share_mode_entry *batch_entry = NULL;
                struct share_mode_entry *exclusive_entry = NULL;
                bool got_level2_oplock = false;
                bool got_a_none_oplock = false;
+               struct file_id id;
 
                struct timespec old_write_time = smb_fname->st.st_ex_mtime;
                id = vfs_file_id_from_sbuf(conn, &smb_fname->st);
 
-               if (!acquire_ordered_locks(talloc_tos(),
-                                       fsp,
-                                       id,
-                                       conn->connectpath,
-                                       smb_fname,
-                                       &old_write_time,
-                                       &lck,
-                                       &br_lck)) {
+               lck = get_share_mode_lock(talloc_tos(), id,
+                                         conn->connectpath,
+                                         smb_fname, &old_write_time);
+               if (lck == NULL) {
+                       DEBUG(0, ("Could not get share mode lock\n"));
                        return NT_STATUS_SHARING_VIOLATION;
                }
 
@@ -2023,7 +2105,6 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
                }
 
                grant_fsp_oplock_type(fsp,
-                               br_lck,
                                 oplock_request,
                                 got_level2_oplock,
                                 got_a_none_oplock);
@@ -2126,6 +2207,7 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
                                   a 1 second delay for share mode conflicts. */
 
                                state.delayed_for_oplocks = False;
+                               state.async_open = false;
                                state.id = id;
 
                                if ((req != NULL)
@@ -2180,17 +2262,20 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
                             open_access_mask);
 
        if (!NT_STATUS_IS_OK(fsp_open)) {
+               if (NT_STATUS_EQUAL(fsp_open, NT_STATUS_RETRY)) {
+                       schedule_async_open(request_time, req);
+               }
                TALLOC_FREE(lck);
                return fsp_open;
        }
 
        if (!file_existed) {
-               struct byte_range_lock *br_lck = NULL;
                struct share_mode_entry *batch_entry = NULL;
                struct share_mode_entry *exclusive_entry = NULL;
                bool got_level2_oplock = false;
                bool got_a_none_oplock = false;
                struct timespec old_write_time = smb_fname->st.st_ex_mtime;
+               struct file_id id;
                /*
                 * Deal with the race condition where two smbd's detect the
                 * file doesn't exist and do the create at the same time. One
@@ -2208,14 +2293,15 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
 
                id = fsp->file_id;
 
-               if (!acquire_ordered_locks(talloc_tos(),
-                                       fsp,
-                                       id,
-                                       conn->connectpath,
-                                       smb_fname,
-                                       &old_write_time,
-                                       &lck,
-                                       &br_lck)) {
+               lck = get_share_mode_lock(talloc_tos(), id,
+                                         conn->connectpath,
+                                         smb_fname, &old_write_time);
+
+               if (lck == NULL) {
+                       DEBUG(0, ("open_file_ntcreate: Could not get share "
+                                 "mode lock for %s\n",
+                                 smb_fname_str_dbg(smb_fname)));
+                       fd_close(fsp);
                        return NT_STATUS_SHARING_VIOLATION;
                }
 
@@ -2266,6 +2352,7 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
                        struct deferred_open_record state;
 
                        state.delayed_for_oplocks = False;
+                       state.async_open = false;
                        state.id = id;
 
                        /* Do it all over again immediately. In the second
@@ -2285,7 +2372,6 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
                }
 
                grant_fsp_oplock_type(fsp,
-                               br_lck,
                                 oplock_request,
                                 got_level2_oplock,
                                 got_a_none_oplock);
@@ -2341,7 +2427,7 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
 
        if (file_existed && (flags2&O_TRUNC)) {
                /*
-                * We are modifing the file after open - update the stat
+                * We are modifying the file after open - update the stat
                 * struct..
                 */
                if ((SMB_VFS_FTRUNCATE(fsp, 0) == -1) ||
@@ -2394,7 +2480,8 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
         * file structs.
         */
 
-       if (!set_file_oplock(fsp, fsp->oplock_type)) {
+       status = set_file_oplock(fsp, fsp->oplock_type);
+       if (!NT_STATUS_IS_OK(status)) {
                /*
                 * Could not get the kernel oplock or there are byte-range
                 * locks on the file.
@@ -2501,7 +2588,7 @@ static NTSTATUS open_file_ntcreate(connection_struct *conn,
         * records. */
        if (req != NULL) {
                del_deferred_open_entry(lck, req->mid,
-                                       sconn_server_id(req->sconn));
+                                       messaging_server_id(req->sconn->msg_ctx));
        }
        TALLOC_FREE(lck);
 
@@ -2558,11 +2645,6 @@ static NTSTATUS mkdir_internal(connection_struct *conn,
                return NT_STATUS_ACCESS_DENIED;
        }
 
-       status = check_name(conn, smb_dname->base_name);
-       if (!NT_STATUS_IS_OK(status)) {
-               return status;
-       }
-
        if (!parent_dirname(talloc_tos(), smb_dname->base_name, &parent_dir,
                            NULL)) {
                return NT_STATUS_NO_MEMORY;
@@ -2577,8 +2659,7 @@ static NTSTATUS mkdir_internal(connection_struct *conn,
 
        status = check_parent_access(conn,
                                        smb_dname,
-                                       access_mask,
-                                       &parent_dir);
+                                       access_mask);
        if(!NT_STATUS_IS_OK(status)) {
                DEBUG(5,("mkdir_internal: check_parent_access "
                        "on directory %s for path %s returned %s\n",
@@ -2697,10 +2778,16 @@ static NTSTATUS open_directory(connection_struct *conn,
        struct timespec mtimespec;
        int info = 0;
 
-       SMB_ASSERT(!is_ntfs_stream_smb_fname(smb_dname));
+       if (is_ntfs_stream_smb_fname(smb_dname)) {
+               DEBUG(2, ("open_directory: %s is a stream name!\n",
+                         smb_fname_str_dbg(smb_dname)));
+               return NT_STATUS_NOT_A_DIRECTORY;
+       }
 
-       /* Ensure we have a directory attribute. */
-       file_attributes |= FILE_ATTRIBUTE_DIRECTORY;
+       if (!(file_attributes & FILE_FLAG_POSIX_SEMANTICS)) {
+               /* Ensure we have a directory attribute. */
+               file_attributes |= FILE_ATTRIBUTE_DIRECTORY;
+       }
 
        DEBUG(5,("open_directory: opening directory %s, access_mask = 0x%x, "
                 "share_access = 0x%x create_options = 0x%x, "
@@ -2712,15 +2799,7 @@ static NTSTATUS open_directory(connection_struct *conn,
                 (unsigned int)create_disposition,
                 (unsigned int)file_attributes));
 
-       if (!(file_attributes & FILE_FLAG_POSIX_SEMANTICS) &&
-                       (conn->fs_capabilities & FILE_NAMED_STREAMS) &&
-                       is_ntfs_stream_smb_fname(smb_dname)) {
-               DEBUG(2, ("open_directory: %s is a stream name!\n",
-                         smb_fname_str_dbg(smb_dname)));
-               return NT_STATUS_NOT_A_DIRECTORY;
-       }
-
-       status = smbd_calculate_access_mask(conn, smb_dname, dir_existed,
+       status = smbd_calculate_access_mask(conn, smb_dname,
                                            access_mask, &access_mask);
        if (!NT_STATUS_IS_OK(status)) {
                DEBUG(10, ("open_directory: smbd_calculate_access_mask "
@@ -2845,7 +2924,6 @@ static NTSTATUS open_directory(connection_struct *conn,
         * Setup the files_struct for it.
         */
 
-       fsp->mode = smb_dname->st.st_ex_mode;
        fsp->file_id = vfs_file_id_from_sbuf(conn, &smb_dname->st);
        fsp->vuid = req ? req->vuid : UID_FIELD_INVALID;
        fsp->file_pid = req ? req->smbpid : 0;
@@ -2906,7 +2984,8 @@ static NTSTATUS open_directory(connection_struct *conn,
        }
 
        lck = get_share_mode_lock(talloc_tos(), fsp->file_id,
-                                 conn->connectpath, smb_dname, &mtimespec);
+                                 conn->connectpath, smb_dname,
+                                 &mtimespec);
 
        if (lck == NULL) {
                DEBUG(0, ("open_directory: Could not get share mode lock for "
@@ -3048,8 +3127,8 @@ void msg_file_was_renamed(struct messaging_context *msg,
            fsp = file_find_di_next(fsp)) {
                if (memcmp(fsp->conn->connectpath, sharepath, sp_len) == 0) {
 
-                       DEBUG(10,("msg_file_was_renamed: renaming file fnum %d from %s -> %s\n",
-                               fsp->fnum, fsp_str_dbg(fsp),
+                       DEBUG(10,("msg_file_was_renamed: renaming file %s from %s -> %s\n",
+                               fsp_fnum_dbg(fsp), fsp_str_dbg(fsp),
                                smb_fname_str_dbg(smb_fname)));
                        status = fsp_set_smb_fname(fsp, smb_fname);
                        if (!NT_STATUS_IS_OK(status)) {
@@ -3061,10 +3140,10 @@ void msg_file_was_renamed(struct messaging_context *msg,
                           actually within this share and adjust newname accordingly. */
                        DEBUG(10,("msg_file_was_renamed: share mismatch (sharepath %s "
                                "not sharepath %s) "
-                               "fnum %d from %s -> %s\n",
+                               "%s from %s -> %s\n",
                                fsp->conn->connectpath,
                                sharepath,
-                               fsp->fnum,
+                               fsp_fnum_dbg(fsp),
                                fsp_str_dbg(fsp),
                                smb_fname_str_dbg(smb_fname)));
                }
@@ -3857,7 +3936,7 @@ NTSTATUS create_file_default(connection_struct *conn,
                }
        }
 
-       if (stream_name && is_ntfs_default_stream_smb_fname(smb_fname)) {
+       if (is_ntfs_default_stream_smb_fname(smb_fname)) {
                int ret;
                smb_fname->stream_name = NULL;
                /* We have to handle this error here. */