xref: /onnv-gate/usr/src/uts/common/fs/smbsrv/smb_delete.c (revision 9635:2f6c15d38a84)
15331Samw /*
25331Samw  * CDDL HEADER START
35331Samw  *
45331Samw  * The contents of this file are subject to the terms of the
55331Samw  * Common Development and Distribution License (the "License").
65331Samw  * You may not use this file except in compliance with the License.
75331Samw  *
85331Samw  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
95331Samw  * or http://www.opensolaris.org/os/licensing.
105331Samw  * See the License for the specific language governing permissions
115331Samw  * and limitations under the License.
125331Samw  *
135331Samw  * When distributing Covered Code, include this CDDL HEADER in each
145331Samw  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
155331Samw  * If applicable, add the following below this CDDL HEADER, with the
165331Samw  * fields enclosed by brackets "[]" replaced with your own identifying
175331Samw  * information: Portions Copyright [yyyy] [name of copyright owner]
185331Samw  *
195331Samw  * CDDL HEADER END
205331Samw  */
215331Samw /*
228670SJose.Borrego@Sun.COM  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
235331Samw  * Use is subject to license terms.
245331Samw  */
255331Samw 
265331Samw #include <smbsrv/smb_incl.h>
275331Samw #include <smbsrv/smb_fsops.h>
285331Samw #include <smbsrv/smbinfo.h>
295772Sas200622 #include <sys/nbmlock.h>
305331Samw 
317961SNatalie.Li@Sun.COM static int smb_delete_check_path(smb_request_t *, boolean_t *);
327961SNatalie.Li@Sun.COM static int smb_delete_single_file(smb_request_t *, smb_error_t *);
337961SNatalie.Li@Sun.COM static int smb_delete_multiple_files(smb_request_t *, smb_error_t *);
348670SJose.Borrego@Sun.COM static int smb_delete_find_fname(smb_request_t *, smb_odir_t *);
357961SNatalie.Li@Sun.COM static int smb_delete_check_attr(smb_request_t *, smb_error_t *);
367961SNatalie.Li@Sun.COM static int smb_delete_remove_file(smb_request_t *, smb_error_t *);
377961SNatalie.Li@Sun.COM 
387961SNatalie.Li@Sun.COM static void smb_delete_error(smb_error_t *, uint32_t, uint16_t, uint16_t);
395331Samw 
405331Samw /*
415331Samw  * smb_com_delete
425331Samw  *
435331Samw  * The delete file message is sent to delete a data file. The appropriate
445331Samw  * Tid and additional pathname are passed. Read only files may not be
455331Samw  * deleted, the read-only attribute must be reset prior to file deletion.
465331Samw  *
475331Samw  * NT supports a hidden permission known as File Delete Child (FDC). If
485331Samw  * the user has FullControl access to a directory, the user is permitted
495331Samw  * to delete any object in the directory regardless of the permissions
505331Samw  * on the object.
515331Samw  *
525331Samw  * Client Request                     Description
535331Samw  * ================================== =================================
545331Samw  * UCHAR WordCount;                   Count of parameter words = 1
555331Samw  * USHORT SearchAttributes;
565331Samw  * USHORT ByteCount;                  Count of data bytes; min = 2
575331Samw  * UCHAR BufferFormat;                0x04
585331Samw  * STRING FileName[];                 File name
595331Samw  *
605331Samw  * Multiple files may be deleted in response to a single request as
615331Samw  * SMB_COM_DELETE supports wildcards
625331Samw  *
635331Samw  * SearchAttributes indicates the attributes that the target file(s) must
645331Samw  * have. If the attribute is zero then only normal files are deleted. If
655331Samw  * the system file or hidden attributes are specified then the delete is
665331Samw  * inclusive -both the specified type(s) of files and normal files are
675331Samw  * deleted. Attributes are described in the "Attribute Encoding" section
685331Samw  * of this document.
695331Samw  *
705331Samw  * If bit0 of the Flags2 field of the SMB header is set, a pattern is
715331Samw  * passed in, and the file has a long name, then the passed pattern  much
725331Samw  * match the long file name for the delete to succeed. If bit0 is clear, a
735331Samw  * pattern is passed in, and the file has a long name, then the passed
745331Samw  * pattern must match the file's short name for the deletion to succeed.
755331Samw  *
765331Samw  * Server Response                    Description
775331Samw  * ================================== =================================
785331Samw  * UCHAR WordCount;                   Count of parameter words = 0
795331Samw  * USHORT ByteCount;                  Count of data bytes = 0
805331Samw  *
815331Samw  * 4.2.10.1  Errors
825331Samw  *
835331Samw  * ERRDOS/ERRbadpath
845331Samw  * ERRDOS/ERRbadfile
855331Samw  * ERRDOS/ERRnoaccess
865331Samw  * ERRDOS/ERRbadshare	# returned by NT for files that are already open
875331Samw  * ERRHRD/ERRnowrite
885331Samw  * ERRSRV/ERRaccess
895331Samw  * ERRSRV/ERRinvdevice
905331Samw  * ERRSRV/ERRinvid
915331Samw  * ERRSRV/ERRbaduid
925331Samw  */
936030Sjb150015 smb_sdrc_t
946139Sjb150015 smb_pre_delete(smb_request_t *sr)
955331Samw {
966139Sjb150015 	int rc;
977961SNatalie.Li@Sun.COM 	smb_fqi_t *fqi;
987961SNatalie.Li@Sun.COM 
997961SNatalie.Li@Sun.COM 	fqi = &sr->arg.dirop.fqi;
1006139Sjb150015 
1019343SAfshin.Ardakani@Sun.COM 	if ((rc = smbsr_decode_vwv(sr, "w", &fqi->fq_sattr)) == 0)
1029343SAfshin.Ardakani@Sun.COM 		rc = smbsr_decode_data(sr, "%S", sr, &fqi->fq_path.pn_path);
1036139Sjb150015 
1047961SNatalie.Li@Sun.COM 	DTRACE_SMB_2(op__Delete__start, smb_request_t *, sr, smb_fqi_t *, fqi);
1056139Sjb150015 
1066139Sjb150015 	return ((rc == 0) ? SDRC_SUCCESS : SDRC_ERROR);
1076139Sjb150015 }
1086139Sjb150015 
1096139Sjb150015 void
1106139Sjb150015 smb_post_delete(smb_request_t *sr)
1116139Sjb150015 {
1126139Sjb150015 	DTRACE_SMB_1(op__Delete__done, smb_request_t *, sr);
1136139Sjb150015 }
1146139Sjb150015 
1157348SJose.Borrego@Sun.COM /*
1167348SJose.Borrego@Sun.COM  * smb_com_delete
1177348SJose.Borrego@Sun.COM  *
1187961SNatalie.Li@Sun.COM  * 1. pre-process pathname -  smb_delete_check_path()
1197961SNatalie.Li@Sun.COM  *    checks dot, bad path syntax, wildcards in path
1207348SJose.Borrego@Sun.COM  *
1217961SNatalie.Li@Sun.COM  * 2. process the path to get directory node & last_comp,
1227961SNatalie.Li@Sun.COM  *    store these in fqi
1237961SNatalie.Li@Sun.COM  *    - If smb_pathname_reduce cannot find the specified path,
1247961SNatalie.Li@Sun.COM  *      the error (ENOTDIR) is translated to NT_STATUS_OBJECT_PATH_NOT_FOUND
1257961SNatalie.Li@Sun.COM  *      if the target is a single file (no wildcards).  If there are
1267961SNatalie.Li@Sun.COM  *      wildcards in the last_comp, NT_STATUS_OBJECT_NAME_NOT_FOUND is
1277961SNatalie.Li@Sun.COM  *      used instead.
1287961SNatalie.Li@Sun.COM  *    - If the directory node is the mount point and the last component
1297961SNatalie.Li@Sun.COM  *      is ".." NT_STATUS_OBJECT_PATH_SYNTAX_BAD is returned.
1307348SJose.Borrego@Sun.COM  *
1317961SNatalie.Li@Sun.COM  * 3. check access permissions
1327348SJose.Borrego@Sun.COM  *
1337961SNatalie.Li@Sun.COM  * 4. invoke the appropriate deletion routine to find and remove
1347961SNatalie.Li@Sun.COM  *    the specified file(s).
1357961SNatalie.Li@Sun.COM  *    - if target is a single file (no wildcards) - smb_delete_single_file
1367961SNatalie.Li@Sun.COM  *    - if the target contains wildcards - smb_delete_multiple_files
1377961SNatalie.Li@Sun.COM  *
1387961SNatalie.Li@Sun.COM  * Returns: SDRC_SUCCESS or SDRC_ERROR
1397348SJose.Borrego@Sun.COM  */
1406139Sjb150015 smb_sdrc_t
1416139Sjb150015 smb_com_delete(smb_request_t *sr)
1426139Sjb150015 {
1437348SJose.Borrego@Sun.COM 	int rc;
1447961SNatalie.Li@Sun.COM 	smb_error_t err;
1457961SNatalie.Li@Sun.COM 	uint32_t status;
1467348SJose.Borrego@Sun.COM 	boolean_t wildcards;
1477961SNatalie.Li@Sun.COM 	smb_fqi_t *fqi;
1485331Samw 
1497961SNatalie.Li@Sun.COM 	fqi = &sr->arg.dirop.fqi;
1507961SNatalie.Li@Sun.COM 
1517961SNatalie.Li@Sun.COM 	if (smb_delete_check_path(sr, &wildcards) != 0)
1526139Sjb150015 		return (SDRC_ERROR);
1535772Sas200622 
1549343SAfshin.Ardakani@Sun.COM 	rc = smb_pathname_reduce(sr, sr->user_cr, fqi->fq_path.pn_path,
1557961SNatalie.Li@Sun.COM 	    sr->tid_tree->t_snode, sr->tid_tree->t_snode,
1569343SAfshin.Ardakani@Sun.COM 	    &fqi->fq_dnode, fqi->fq_last_comp);
1577961SNatalie.Li@Sun.COM 	if (rc == 0) {
1589343SAfshin.Ardakani@Sun.COM 		if (fqi->fq_dnode->vp->v_type != VDIR) {
1599343SAfshin.Ardakani@Sun.COM 			smb_node_release(fqi->fq_dnode);
1607961SNatalie.Li@Sun.COM 			rc = ENOTDIR;
1617961SNatalie.Li@Sun.COM 		}
1627961SNatalie.Li@Sun.COM 	}
1637961SNatalie.Li@Sun.COM 	if (rc != 0) {
1647961SNatalie.Li@Sun.COM 		if (rc == ENOTDIR) {
1657961SNatalie.Li@Sun.COM 			if (wildcards)
1667961SNatalie.Li@Sun.COM 				status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
1677961SNatalie.Li@Sun.COM 			else
1687961SNatalie.Li@Sun.COM 				status = NT_STATUS_OBJECT_PATH_NOT_FOUND;
1697961SNatalie.Li@Sun.COM 			smbsr_error(sr, status, ERRDOS, ERROR_FILE_NOT_FOUND);
1707961SNatalie.Li@Sun.COM 		} else {
1717961SNatalie.Li@Sun.COM 			smbsr_errno(sr, rc);
1727348SJose.Borrego@Sun.COM 		}
1737348SJose.Borrego@Sun.COM 
1747348SJose.Borrego@Sun.COM 		return (SDRC_ERROR);
1757348SJose.Borrego@Sun.COM 	}
1767348SJose.Borrego@Sun.COM 
1779343SAfshin.Ardakani@Sun.COM 	if ((fqi->fq_dnode == sr->tid_tree->t_snode) &&
1789343SAfshin.Ardakani@Sun.COM 	    (strcmp(fqi->fq_last_comp, "..") == 0)) {
1799343SAfshin.Ardakani@Sun.COM 		smb_node_release(fqi->fq_dnode);
1807961SNatalie.Li@Sun.COM 		smbsr_error(sr, NT_STATUS_OBJECT_PATH_SYNTAX_BAD,
1817961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_BAD_PATHNAME);
1827961SNatalie.Li@Sun.COM 		return (SDRC_ERROR);
1837961SNatalie.Li@Sun.COM 	}
1847961SNatalie.Li@Sun.COM 
1859343SAfshin.Ardakani@Sun.COM 	rc = smb_fsop_access(sr, sr->user_cr, fqi->fq_dnode,
1867961SNatalie.Li@Sun.COM 	    FILE_LIST_DIRECTORY);
1877961SNatalie.Li@Sun.COM 	if (rc != 0) {
1889343SAfshin.Ardakani@Sun.COM 		smb_node_release(fqi->fq_dnode);
1897961SNatalie.Li@Sun.COM 		smbsr_error(sr, NT_STATUS_ACCESS_DENIED,
1907961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_ACCESS_DENIED);
1917961SNatalie.Li@Sun.COM 		return (SDRC_ERROR);
1927961SNatalie.Li@Sun.COM 	}
1937961SNatalie.Li@Sun.COM 
1947961SNatalie.Li@Sun.COM 	if (wildcards)
1957961SNatalie.Li@Sun.COM 		rc = smb_delete_multiple_files(sr, &err);
1967961SNatalie.Li@Sun.COM 	else
1977961SNatalie.Li@Sun.COM 		rc = smb_delete_single_file(sr, &err);
1987961SNatalie.Li@Sun.COM 
1999343SAfshin.Ardakani@Sun.COM 	smb_node_release(fqi->fq_dnode);
2008026SJoyce.McIntosh@Sun.COM 
2017961SNatalie.Li@Sun.COM 	if (rc != 0)
2027961SNatalie.Li@Sun.COM 		smbsr_set_error(sr, &err);
2037961SNatalie.Li@Sun.COM 	else
2047961SNatalie.Li@Sun.COM 		rc = smbsr_encode_empty_result(sr);
2055331Samw 
2067961SNatalie.Li@Sun.COM 	return (rc == 0 ? SDRC_SUCCESS : SDRC_ERROR);
2077961SNatalie.Li@Sun.COM }
2087961SNatalie.Li@Sun.COM 
2097961SNatalie.Li@Sun.COM /*
2107961SNatalie.Li@Sun.COM  * smb_delete_single_file
2117961SNatalie.Li@Sun.COM  *
2127961SNatalie.Li@Sun.COM  * Find the specified file and, if its attributes match the search
2137961SNatalie.Li@Sun.COM  * criteria, delete it.
2147961SNatalie.Li@Sun.COM  *
2157961SNatalie.Li@Sun.COM  * Returns 0 - success (file deleted)
2167961SNatalie.Li@Sun.COM  *        -1 - error, err is populated with error details
2177961SNatalie.Li@Sun.COM  */
2187961SNatalie.Li@Sun.COM static int
2197961SNatalie.Li@Sun.COM smb_delete_single_file(smb_request_t *sr, smb_error_t *err)
2207961SNatalie.Li@Sun.COM {
2217961SNatalie.Li@Sun.COM 	smb_fqi_t *fqi;
2227961SNatalie.Li@Sun.COM 	smb_attr_t ret_attr;
2238334SJose.Borrego@Sun.COM 	uint32_t status;
2247961SNatalie.Li@Sun.COM 
2257961SNatalie.Li@Sun.COM 	fqi = &sr->arg.dirop.fqi;
2267961SNatalie.Li@Sun.COM 
2279343SAfshin.Ardakani@Sun.COM 	smb_pathname_setup(sr, &fqi->fq_path);
2289343SAfshin.Ardakani@Sun.COM 	status = smb_validate_object_name(&fqi->fq_path);
2298334SJose.Borrego@Sun.COM 	if (status != NT_STATUS_SUCCESS) {
2308334SJose.Borrego@Sun.COM 		smb_delete_error(err, status, ERRDOS, ERROR_INVALID_NAME);
2318334SJose.Borrego@Sun.COM 		return (-1);
2328334SJose.Borrego@Sun.COM 	}
2338334SJose.Borrego@Sun.COM 
2347961SNatalie.Li@Sun.COM 	if (smb_fsop_lookup_name(sr, sr->user_cr, 0, sr->tid_tree->t_snode,
2359343SAfshin.Ardakani@Sun.COM 	    fqi->fq_dnode, fqi->fq_last_comp, &fqi->fq_fnode, &ret_attr) != 0) {
2367961SNatalie.Li@Sun.COM 		smb_delete_error(err, NT_STATUS_OBJECT_NAME_NOT_FOUND,
2377961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_FILE_NOT_FOUND);
2387961SNatalie.Li@Sun.COM 		return (-1);
2397961SNatalie.Li@Sun.COM 	}
2405331Samw 
2417961SNatalie.Li@Sun.COM 	if (smb_delete_check_attr(sr, err) != 0) {
2429343SAfshin.Ardakani@Sun.COM 		smb_node_release(fqi->fq_fnode);
2437961SNatalie.Li@Sun.COM 		return (-1);
2447961SNatalie.Li@Sun.COM 	}
2457961SNatalie.Li@Sun.COM 
2467961SNatalie.Li@Sun.COM 	if (smb_delete_remove_file(sr, err) != 0) {
2479343SAfshin.Ardakani@Sun.COM 		smb_node_release(fqi->fq_fnode);
2487961SNatalie.Li@Sun.COM 		return (-1);
2497961SNatalie.Li@Sun.COM 	}
2507961SNatalie.Li@Sun.COM 
2519343SAfshin.Ardakani@Sun.COM 	smb_node_release(fqi->fq_fnode);
2527961SNatalie.Li@Sun.COM 	return (0);
2537961SNatalie.Li@Sun.COM }
2547961SNatalie.Li@Sun.COM 
2557961SNatalie.Li@Sun.COM /*
2567961SNatalie.Li@Sun.COM  * smb_delete_multiple_files
2577961SNatalie.Li@Sun.COM  *
2588670SJose.Borrego@Sun.COM  * For each matching file found by smb_delete_find_fname:
2597961SNatalie.Li@Sun.COM  * 1. lookup file
2607961SNatalie.Li@Sun.COM  * 2. check the file's attributes
2617961SNatalie.Li@Sun.COM  *    - The search ends with an error if a readonly file
2627961SNatalie.Li@Sun.COM  *      (NT_STATUS_CANNOT_DELETE) is matched.
2637961SNatalie.Li@Sun.COM  *    - The search ends (but not an error) if a directory is
2647961SNatalie.Li@Sun.COM  *      matched and the request's search did not include
2657961SNatalie.Li@Sun.COM  *      directories.
2667961SNatalie.Li@Sun.COM  *    - Otherwise, if smb_delete_check_attr fails the file
2677961SNatalie.Li@Sun.COM  *      is skipped and the search continues (at step 1)
2687961SNatalie.Li@Sun.COM  * 3. delete the file
2697961SNatalie.Li@Sun.COM  *
2707961SNatalie.Li@Sun.COM  * Returns 0 - success
2717961SNatalie.Li@Sun.COM  *        -1 - error, err is populated with error details
2727961SNatalie.Li@Sun.COM  */
2737961SNatalie.Li@Sun.COM static int
2747961SNatalie.Li@Sun.COM smb_delete_multiple_files(smb_request_t *sr, smb_error_t *err)
2757961SNatalie.Li@Sun.COM {
2767961SNatalie.Li@Sun.COM 	int rc, deleted = 0;
2777961SNatalie.Li@Sun.COM 	smb_fqi_t *fqi;
2787961SNatalie.Li@Sun.COM 	smb_attr_t ret_attr;
2798670SJose.Borrego@Sun.COM 	uint16_t odid;
2808670SJose.Borrego@Sun.COM 	smb_odir_t *od;
2817961SNatalie.Li@Sun.COM 
2827961SNatalie.Li@Sun.COM 	fqi = &sr->arg.dirop.fqi;
2837961SNatalie.Li@Sun.COM 
2848670SJose.Borrego@Sun.COM 	/*
2858670SJose.Borrego@Sun.COM 	 * Specify all search attributes (SMB_SEARCH_ATTRIBUTES) so that
2868670SJose.Borrego@Sun.COM 	 * delete-specific checking can be done (smb_delete_check_attr).
2878670SJose.Borrego@Sun.COM 	 */
2889343SAfshin.Ardakani@Sun.COM 	odid = smb_odir_open(sr, fqi->fq_path.pn_path,
2899343SAfshin.Ardakani@Sun.COM 	    SMB_SEARCH_ATTRIBUTES, 0);
2909343SAfshin.Ardakani@Sun.COM 	if (odid == 0)
2918670SJose.Borrego@Sun.COM 		return (-1);
2929343SAfshin.Ardakani@Sun.COM 
2938670SJose.Borrego@Sun.COM 	if ((od = smb_tree_lookup_odir(sr->tid_tree, odid)) == NULL)
2948670SJose.Borrego@Sun.COM 		return (-1);
2958670SJose.Borrego@Sun.COM 
2967961SNatalie.Li@Sun.COM 	for (;;) {
2978670SJose.Borrego@Sun.COM 		rc = smb_delete_find_fname(sr, od);
2987961SNatalie.Li@Sun.COM 		if (rc != 0)
2997961SNatalie.Li@Sun.COM 			break;
3007961SNatalie.Li@Sun.COM 
3017961SNatalie.Li@Sun.COM 		rc = smb_fsop_lookup_name(sr, sr->user_cr, 0,
3029343SAfshin.Ardakani@Sun.COM 		    sr->tid_tree->t_snode, fqi->fq_dnode,
3039343SAfshin.Ardakani@Sun.COM 		    fqi->fq_od_name, &fqi->fq_fnode, &ret_attr);
3047961SNatalie.Li@Sun.COM 		if (rc != 0)
3057961SNatalie.Li@Sun.COM 			break;
3067961SNatalie.Li@Sun.COM 
3077961SNatalie.Li@Sun.COM 		if (smb_delete_check_attr(sr, err) != 0) {
3089343SAfshin.Ardakani@Sun.COM 			smb_node_release(fqi->fq_fnode);
3097961SNatalie.Li@Sun.COM 			if (err->status == NT_STATUS_CANNOT_DELETE) {
310*9635SJoyce.McIntosh@Sun.COM 				smb_odir_close(od);
3118670SJose.Borrego@Sun.COM 				smb_odir_release(od);
3127961SNatalie.Li@Sun.COM 				return (-1);
3137348SJose.Borrego@Sun.COM 			}
3147961SNatalie.Li@Sun.COM 			if ((err->status == NT_STATUS_FILE_IS_A_DIRECTORY) &&
3159343SAfshin.Ardakani@Sun.COM 			    (SMB_SEARCH_DIRECTORY(fqi->fq_sattr) != 0))
3167961SNatalie.Li@Sun.COM 				break;
3177961SNatalie.Li@Sun.COM 			continue;
3185772Sas200622 		}
3195772Sas200622 
3207961SNatalie.Li@Sun.COM 		if (smb_delete_remove_file(sr, err) == 0) {
3217961SNatalie.Li@Sun.COM 			++deleted;
3229343SAfshin.Ardakani@Sun.COM 			smb_node_release(fqi->fq_fnode);
3237961SNatalie.Li@Sun.COM 			continue;
3247961SNatalie.Li@Sun.COM 		}
3257961SNatalie.Li@Sun.COM 		if (err->status == NT_STATUS_OBJECT_NAME_NOT_FOUND) {
3269343SAfshin.Ardakani@Sun.COM 			smb_node_release(fqi->fq_fnode);
3277961SNatalie.Li@Sun.COM 			continue;
3285331Samw 		}
3295331Samw 
330*9635SJoyce.McIntosh@Sun.COM 		smb_odir_close(od);
3318670SJose.Borrego@Sun.COM 		smb_odir_release(od);
3329343SAfshin.Ardakani@Sun.COM 		smb_node_release(fqi->fq_fnode);
3337961SNatalie.Li@Sun.COM 		return (-1);
3345331Samw 	}
3355331Samw 
336*9635SJoyce.McIntosh@Sun.COM 	smb_odir_close(od);
3378670SJose.Borrego@Sun.COM 	smb_odir_release(od);
3387961SNatalie.Li@Sun.COM 
3395331Samw 	if ((rc != 0) && (rc != ENOENT)) {
3407961SNatalie.Li@Sun.COM 		smbsr_map_errno(rc, err);
3417961SNatalie.Li@Sun.COM 		return (-1);
3425331Samw 	}
3435331Samw 
3445331Samw 	if (deleted == 0) {
3457961SNatalie.Li@Sun.COM 		smb_delete_error(err, NT_STATUS_NO_SUCH_FILE,
3467961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_FILE_NOT_FOUND);
3477961SNatalie.Li@Sun.COM 		return (-1);
3487961SNatalie.Li@Sun.COM 	}
3497961SNatalie.Li@Sun.COM 
3507961SNatalie.Li@Sun.COM 	return (0);
3517961SNatalie.Li@Sun.COM }
3527961SNatalie.Li@Sun.COM 
3537961SNatalie.Li@Sun.COM /*
3547961SNatalie.Li@Sun.COM  * smb_delete_find_fname
3557961SNatalie.Li@Sun.COM  *
3569343SAfshin.Ardakani@Sun.COM  * Find next filename that matches search pattern (fqi->fq_last_comp)
3579343SAfshin.Ardakani@Sun.COM  * and save it in fqi->fq_od_name.
3587961SNatalie.Li@Sun.COM  *
3598670SJose.Borrego@Sun.COM  * Case insensitivity note:
3608670SJose.Borrego@Sun.COM  * If the tree is case insensitive and there's a case conflict
3618670SJose.Borrego@Sun.COM  * with the name returned from smb_odir_read, smb_delete_find_fname
3628670SJose.Borrego@Sun.COM  * performs case conflict name mangling to produce a unique filename.
3638670SJose.Borrego@Sun.COM  * This ensures that any subsequent smb_fsop_lookup, (which will
3648670SJose.Borrego@Sun.COM  * find the first case insensitive match) will find the correct file.
3658670SJose.Borrego@Sun.COM  *
3667961SNatalie.Li@Sun.COM  * Returns: 0 - success
3677961SNatalie.Li@Sun.COM  *          errno
3687961SNatalie.Li@Sun.COM  */
3697961SNatalie.Li@Sun.COM static int
3708670SJose.Borrego@Sun.COM smb_delete_find_fname(smb_request_t *sr, smb_odir_t *od)
3717961SNatalie.Li@Sun.COM {
3728670SJose.Borrego@Sun.COM 	int		rc;
3738670SJose.Borrego@Sun.COM 	smb_odirent_t	*odirent;
3748670SJose.Borrego@Sun.COM 	boolean_t	eos;
3758670SJose.Borrego@Sun.COM 	char		*name;
3768670SJose.Borrego@Sun.COM 	char		shortname[SMB_SHORTNAMELEN];
3778670SJose.Borrego@Sun.COM 	char		name83[SMB_SHORTNAMELEN];
3788670SJose.Borrego@Sun.COM 	smb_fqi_t	*fqi;
3797961SNatalie.Li@Sun.COM 
3807961SNatalie.Li@Sun.COM 	fqi = &sr->arg.dirop.fqi;
3818670SJose.Borrego@Sun.COM 	odirent = kmem_alloc(sizeof (smb_odirent_t), KM_SLEEP);
3827961SNatalie.Li@Sun.COM 
3838670SJose.Borrego@Sun.COM 	rc = smb_odir_read(sr, od, odirent, &eos);
3848670SJose.Borrego@Sun.COM 	if (rc != 0) {
3858670SJose.Borrego@Sun.COM 		kmem_free(odirent, sizeof (smb_odirent_t));
3868670SJose.Borrego@Sun.COM 		return (rc);
3878670SJose.Borrego@Sun.COM 	}
3888670SJose.Borrego@Sun.COM 	if (eos) {
3898670SJose.Borrego@Sun.COM 		kmem_free(odirent, sizeof (smb_odirent_t));
3908670SJose.Borrego@Sun.COM 		return (ENOENT);
3918670SJose.Borrego@Sun.COM 	}
3927961SNatalie.Li@Sun.COM 
3938670SJose.Borrego@Sun.COM 	/* if case conflict, force mangle and use shortname */
3949231SAfshin.Ardakani@Sun.COM 	if ((od->d_flags & SMB_ODIR_FLAG_IGNORE_CASE) &&
3959231SAfshin.Ardakani@Sun.COM 	    (odirent->od_eflags & ED_CASE_CONFLICT)) {
3968670SJose.Borrego@Sun.COM 		(void) smb_mangle_name(odirent->od_ino, odirent->od_name,
3978670SJose.Borrego@Sun.COM 		    shortname, name83, 1);
3988670SJose.Borrego@Sun.COM 		name = shortname;
3998670SJose.Borrego@Sun.COM 	} else {
4008670SJose.Borrego@Sun.COM 		name = odirent->od_name;
4018670SJose.Borrego@Sun.COM 	}
4029343SAfshin.Ardakani@Sun.COM 	(void) strlcpy(fqi->fq_od_name, name, sizeof (fqi->fq_od_name));
4037961SNatalie.Li@Sun.COM 
4048670SJose.Borrego@Sun.COM 	kmem_free(odirent, sizeof (smb_odirent_t));
4058670SJose.Borrego@Sun.COM 	return (0);
4067961SNatalie.Li@Sun.COM }
4077961SNatalie.Li@Sun.COM 
4087961SNatalie.Li@Sun.COM /*
4097961SNatalie.Li@Sun.COM  * smb_delete_check_attr
4107961SNatalie.Li@Sun.COM  *
4117961SNatalie.Li@Sun.COM  * Check file's dos atributes to ensure that
4127961SNatalie.Li@Sun.COM  * 1. the file is not a directory - NT_STATUS_FILE_IS_A_DIRECTORY
4137961SNatalie.Li@Sun.COM  * 2. the file is not readonly - NT_STATUS_CANNOT_DELETE
4147961SNatalie.Li@Sun.COM  * 3. the file's dos attributes comply with the specified search attributes
4157961SNatalie.Li@Sun.COM  *     If the file is either hidden or system and those attributes
4167961SNatalie.Li@Sun.COM  *     are not specified in the search attributes - NT_STATUS_NO_SUCH_FILE
4177961SNatalie.Li@Sun.COM  *
4187961SNatalie.Li@Sun.COM  * Returns: 0 - file's attributes pass all checks
4197961SNatalie.Li@Sun.COM  *         -1 - err populated with error details
4207961SNatalie.Li@Sun.COM  */
4217961SNatalie.Li@Sun.COM static int
4227961SNatalie.Li@Sun.COM smb_delete_check_attr(smb_request_t *sr, smb_error_t *err)
4237961SNatalie.Li@Sun.COM {
4247961SNatalie.Li@Sun.COM 	smb_fqi_t *fqi;
4257961SNatalie.Li@Sun.COM 	smb_node_t *node;
4267961SNatalie.Li@Sun.COM 	uint16_t dosattr, sattr;
4277961SNatalie.Li@Sun.COM 
4287961SNatalie.Li@Sun.COM 	fqi = &sr->arg.dirop.fqi;
4299343SAfshin.Ardakani@Sun.COM 	sattr = fqi->fq_sattr;
4309343SAfshin.Ardakani@Sun.COM 	node = fqi->fq_fnode;
4317961SNatalie.Li@Sun.COM 	dosattr = smb_node_get_dosattr(node);
4327961SNatalie.Li@Sun.COM 
4337961SNatalie.Li@Sun.COM 	if (dosattr & FILE_ATTRIBUTE_DIRECTORY) {
4347961SNatalie.Li@Sun.COM 		smb_delete_error(err, NT_STATUS_FILE_IS_A_DIRECTORY,
4357961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_ACCESS_DENIED);
4367961SNatalie.Li@Sun.COM 		return (-1);
4375331Samw 	}
4385331Samw 
4397961SNatalie.Li@Sun.COM 	if (SMB_PATHFILE_IS_READONLY(sr, node)) {
4407961SNatalie.Li@Sun.COM 		smb_delete_error(err, NT_STATUS_CANNOT_DELETE,
4417961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_ACCESS_DENIED);
4427961SNatalie.Li@Sun.COM 		return (-1);
4437961SNatalie.Li@Sun.COM 	}
4446030Sjb150015 
4457961SNatalie.Li@Sun.COM 	if ((dosattr & FILE_ATTRIBUTE_HIDDEN) && !(SMB_SEARCH_HIDDEN(sattr))) {
4467961SNatalie.Li@Sun.COM 		smb_delete_error(err, NT_STATUS_NO_SUCH_FILE,
4477961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_FILE_NOT_FOUND);
4487961SNatalie.Li@Sun.COM 		return (-1);
4497961SNatalie.Li@Sun.COM 	}
4507961SNatalie.Li@Sun.COM 
4517961SNatalie.Li@Sun.COM 	if ((dosattr & FILE_ATTRIBUTE_SYSTEM) && !(SMB_SEARCH_SYSTEM(sattr))) {
4527961SNatalie.Li@Sun.COM 		smb_delete_error(err, NT_STATUS_NO_SUCH_FILE,
4537961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_FILE_NOT_FOUND);
4547961SNatalie.Li@Sun.COM 		return (-1);
4557961SNatalie.Li@Sun.COM 	}
4567961SNatalie.Li@Sun.COM 
4577961SNatalie.Li@Sun.COM 	return (0);
4587961SNatalie.Li@Sun.COM }
4595331Samw 
4607961SNatalie.Li@Sun.COM /*
4617961SNatalie.Li@Sun.COM  * smb_delete_remove_file
4627961SNatalie.Li@Sun.COM  *
4637961SNatalie.Li@Sun.COM  * For consistency with Windows 2000, the range check should be done
4647961SNatalie.Li@Sun.COM  * after checking for sharing violations.  Attempting to delete a
4657961SNatalie.Li@Sun.COM  * locked file will result in sharing violation, which is the same
4667961SNatalie.Li@Sun.COM  * thing that will happen if you try to delete a non-locked open file.
4677961SNatalie.Li@Sun.COM  *
4687961SNatalie.Li@Sun.COM  * Note that windows 2000 rejects lock requests on open files that
4697961SNatalie.Li@Sun.COM  * have been opened with metadata open modes.  The error is
4707961SNatalie.Li@Sun.COM  * STATUS_ACCESS_DENIED.
4717961SNatalie.Li@Sun.COM  *
4727961SNatalie.Li@Sun.COM  * NT does not always close a file immediately, which can cause the
4737961SNatalie.Li@Sun.COM  * share and access checking to fail (the node refcnt is greater
4747961SNatalie.Li@Sun.COM  * than one), and the file doesn't get deleted. Breaking the oplock
4757961SNatalie.Li@Sun.COM  * before share and access checking gives the client a chance to
4767961SNatalie.Li@Sun.COM  * close the file.
4777961SNatalie.Li@Sun.COM  *
4787961SNatalie.Li@Sun.COM  * Returns: 0 - success
4797961SNatalie.Li@Sun.COM  *         -1 - error, err populated with error details
4807961SNatalie.Li@Sun.COM  */
4817961SNatalie.Li@Sun.COM static int
4827961SNatalie.Li@Sun.COM smb_delete_remove_file(smb_request_t *sr, smb_error_t *err)
4837961SNatalie.Li@Sun.COM {
4847961SNatalie.Li@Sun.COM 	int rc;
4857961SNatalie.Li@Sun.COM 	uint32_t status;
4867961SNatalie.Li@Sun.COM 	smb_fqi_t *fqi;
4877961SNatalie.Li@Sun.COM 	smb_node_t *node;
4889231SAfshin.Ardakani@Sun.COM 	uint32_t flags = 0;
4897961SNatalie.Li@Sun.COM 
4907961SNatalie.Li@Sun.COM 	fqi = &sr->arg.dirop.fqi;
4919343SAfshin.Ardakani@Sun.COM 	node = fqi->fq_fnode;
4927961SNatalie.Li@Sun.COM 
4939021Samw@Sun.COM 	(void) smb_oplock_break(node, sr->session, B_FALSE);
4947961SNatalie.Li@Sun.COM 
4957961SNatalie.Li@Sun.COM 	smb_node_start_crit(node, RW_READER);
4967961SNatalie.Li@Sun.COM 
4977961SNatalie.Li@Sun.COM 	status = smb_node_delete_check(node);
4987961SNatalie.Li@Sun.COM 	if (status != NT_STATUS_SUCCESS) {
4997961SNatalie.Li@Sun.COM 		smb_delete_error(err, NT_STATUS_SHARING_VIOLATION,
5007961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_SHARING_VIOLATION);
5017961SNatalie.Li@Sun.COM 		smb_node_end_crit(node);
5027961SNatalie.Li@Sun.COM 		return (-1);
5037961SNatalie.Li@Sun.COM 	}
5047961SNatalie.Li@Sun.COM 
5057961SNatalie.Li@Sun.COM 	status = smb_range_check(sr, node, 0, UINT64_MAX, B_TRUE);
5067961SNatalie.Li@Sun.COM 	if (status != NT_STATUS_SUCCESS) {
5077961SNatalie.Li@Sun.COM 		smb_delete_error(err, NT_STATUS_ACCESS_DENIED,
5087961SNatalie.Li@Sun.COM 		    ERRDOS, ERROR_ACCESS_DENIED);
5097961SNatalie.Li@Sun.COM 		smb_node_end_crit(node);
5107961SNatalie.Li@Sun.COM 		return (-1);
5117961SNatalie.Li@Sun.COM 	}
5127961SNatalie.Li@Sun.COM 
5139231SAfshin.Ardakani@Sun.COM 	if (SMB_TREE_SUPPORTS_CATIA(sr))
5149231SAfshin.Ardakani@Sun.COM 		flags |= SMB_CATIA;
5159231SAfshin.Ardakani@Sun.COM 
5167961SNatalie.Li@Sun.COM 	rc = smb_fsop_remove(sr, sr->user_cr, node->dir_snode,
5179231SAfshin.Ardakani@Sun.COM 	    node->od_name, flags);
5187961SNatalie.Li@Sun.COM 	if (rc != 0) {
5197961SNatalie.Li@Sun.COM 		if (rc == ENOENT)
5207961SNatalie.Li@Sun.COM 			smb_delete_error(err, NT_STATUS_OBJECT_NAME_NOT_FOUND,
5217961SNatalie.Li@Sun.COM 			    ERRDOS, ERROR_FILE_NOT_FOUND);
5227961SNatalie.Li@Sun.COM 		else
5237961SNatalie.Li@Sun.COM 			smbsr_map_errno(rc, err);
5247961SNatalie.Li@Sun.COM 
5257961SNatalie.Li@Sun.COM 		smb_node_end_crit(node);
5267961SNatalie.Li@Sun.COM 		return (-1);
5277961SNatalie.Li@Sun.COM 	}
5287961SNatalie.Li@Sun.COM 
5297961SNatalie.Li@Sun.COM 	smb_node_end_crit(node);
5307961SNatalie.Li@Sun.COM 	return (0);
5315331Samw }
5325331Samw 
5337961SNatalie.Li@Sun.COM 
5346139Sjb150015 /*
5357348SJose.Borrego@Sun.COM  * smb_delete_check_path
5367348SJose.Borrego@Sun.COM  *
5377961SNatalie.Li@Sun.COM  * Perform initial validation on the pathname and last_comp.
5387348SJose.Borrego@Sun.COM  *
5397961SNatalie.Li@Sun.COM  * wildcards in path:
5407961SNatalie.Li@Sun.COM  * Wildcards in the path (excluding the last_comp) should result
5417961SNatalie.Li@Sun.COM  * in NT_STATUS_OBJECT_NAME_INVALID.
5427348SJose.Borrego@Sun.COM  *
5437348SJose.Borrego@Sun.COM  * bad path syntax:
5447348SJose.Borrego@Sun.COM  * On unix .. at the root of a file system links to the root. Thus
5457348SJose.Borrego@Sun.COM  * an attempt to lookup "/../../.." will be the same as looking up "/"
5467348SJose.Borrego@Sun.COM  * CIFs clients expect the above to result in
5477348SJose.Borrego@Sun.COM  * NT_STATUS_OBJECT_PATH_SYNTAX_BAD. It is currently not possible
5487348SJose.Borrego@Sun.COM  * (and questionable if it's desirable) to deal with all cases
5497348SJose.Borrego@Sun.COM  * but paths beginning with \\.. are handled. See bad_paths[].
5507961SNatalie.Li@Sun.COM  * Cases like "\\dir\\..\\.." will be caught and handled after the
5517961SNatalie.Li@Sun.COM  * pnreduce.  Cases like "\\dir\\..\\..\\filename" will still result
5527961SNatalie.Li@Sun.COM  * in "\\filename" which is contrary to windows behavior.
5537348SJose.Borrego@Sun.COM  *
5547961SNatalie.Li@Sun.COM  * dot:
5557961SNatalie.Li@Sun.COM  * A filename of '.' should result in NT_STATUS_OBJECT_NAME_INVALID
5567961SNatalie.Li@Sun.COM  * Any wildcard filename that resolves to '.' should result in
5577961SNatalie.Li@Sun.COM  * NT_STATUS_OBJECT_NAME_INVALID if the search attributes include
5587961SNatalie.Li@Sun.COM  * FILE_ATTRIBUTE_DIRECTORY
5597348SJose.Borrego@Sun.COM  *
5607348SJose.Borrego@Sun.COM  * Returns:
5617961SNatalie.Li@Sun.COM  *   0:  path is valid. Sets *wildcard to TRUE if wildcard delete
5627348SJose.Borrego@Sun.COM  *	         i.e. if wildcards in last component
5637961SNatalie.Li@Sun.COM  *  -1: path is invalid. Sets error information in sr.
5647348SJose.Borrego@Sun.COM  */
5657961SNatalie.Li@Sun.COM static int
5667348SJose.Borrego@Sun.COM smb_delete_check_path(smb_request_t *sr, boolean_t *wildcard)
5677348SJose.Borrego@Sun.COM {
5687961SNatalie.Li@Sun.COM 	smb_fqi_t *fqi = &sr->arg.dirop.fqi;
5697961SNatalie.Li@Sun.COM 	char *p, *last_comp;
5707348SJose.Borrego@Sun.COM 	int i, wildcards;
5719343SAfshin.Ardakani@Sun.COM 	smb_pathname_t *pn = &fqi->fq_path;
5727348SJose.Borrego@Sun.COM 
5737348SJose.Borrego@Sun.COM 	struct {
5747348SJose.Borrego@Sun.COM 		char *name;
5757348SJose.Borrego@Sun.COM 		int len;
5767348SJose.Borrego@Sun.COM 	} *bad, bad_paths[] = {
5777348SJose.Borrego@Sun.COM 		{"\\..\0", 4},
5787348SJose.Borrego@Sun.COM 		{"\\..\\", 4},
5797348SJose.Borrego@Sun.COM 		{"..\0", 3},
5807348SJose.Borrego@Sun.COM 		{"..\\", 3}
5817348SJose.Borrego@Sun.COM 	};
5827348SJose.Borrego@Sun.COM 
5837348SJose.Borrego@Sun.COM 	/* find last component, strip trailing '\\' */
5849343SAfshin.Ardakani@Sun.COM 	p = pn->pn_path + strlen(pn->pn_path) - 1;
5857348SJose.Borrego@Sun.COM 	while (*p == '\\') {
5867348SJose.Borrego@Sun.COM 		*p = '\0';
5877348SJose.Borrego@Sun.COM 		--p;
5887348SJose.Borrego@Sun.COM 	}
5898938Samw@Sun.COM 
5909343SAfshin.Ardakani@Sun.COM 	if ((p = strrchr(pn->pn_path, '\\')) == NULL)
5919343SAfshin.Ardakani@Sun.COM 		last_comp = pn->pn_path;
5928938Samw@Sun.COM 	else
5937961SNatalie.Li@Sun.COM 		last_comp = ++p;
5947348SJose.Borrego@Sun.COM 
5958938Samw@Sun.COM 	wildcards = smb_convert_wildcards(last_comp);
5968938Samw@Sun.COM 
5979343SAfshin.Ardakani@Sun.COM 	if (last_comp != pn->pn_path) {
5988938Samw@Sun.COM 		/*
5998938Samw@Sun.COM 		 * Wildcards are only allowed in the last component.
6008938Samw@Sun.COM 		 * Check for additional wildcards in the path.
6018938Samw@Sun.COM 		 */
6029343SAfshin.Ardakani@Sun.COM 		if (smb_convert_wildcards(pn->pn_path) != wildcards) {
6037348SJose.Borrego@Sun.COM 			smbsr_error(sr, NT_STATUS_OBJECT_NAME_INVALID,
6047348SJose.Borrego@Sun.COM 			    ERRDOS, ERROR_INVALID_NAME);
6057961SNatalie.Li@Sun.COM 			return (-1);
6067348SJose.Borrego@Sun.COM 		}
6077348SJose.Borrego@Sun.COM 	}
6087348SJose.Borrego@Sun.COM 
6097961SNatalie.Li@Sun.COM 	/* path above the mount point */
6107348SJose.Borrego@Sun.COM 	for (i = 0; i < sizeof (bad_paths) / sizeof (bad_paths[0]); ++i) {
6117348SJose.Borrego@Sun.COM 		bad = &bad_paths[i];
6129343SAfshin.Ardakani@Sun.COM 		if (strncmp(pn->pn_path, bad->name, bad->len) == 0) {
6137348SJose.Borrego@Sun.COM 			smbsr_error(sr, NT_STATUS_OBJECT_PATH_SYNTAX_BAD,
6147348SJose.Borrego@Sun.COM 			    ERRDOS, ERROR_BAD_PATHNAME);
6157961SNatalie.Li@Sun.COM 			return (-1);
6167348SJose.Borrego@Sun.COM 		}
6177348SJose.Borrego@Sun.COM 	}
6187348SJose.Borrego@Sun.COM 
6197961SNatalie.Li@Sun.COM 	/* last component is, or resolves to, '.' (dot) */
6207961SNatalie.Li@Sun.COM 	if ((strcmp(last_comp, ".") == 0) ||
6219343SAfshin.Ardakani@Sun.COM 	    (SMB_SEARCH_DIRECTORY(fqi->fq_sattr) &&
6227961SNatalie.Li@Sun.COM 	    (smb_match(last_comp, ".")))) {
6237348SJose.Borrego@Sun.COM 		smbsr_error(sr, NT_STATUS_OBJECT_NAME_INVALID,
6247348SJose.Borrego@Sun.COM 		    ERRDOS, ERROR_INVALID_NAME);
6257961SNatalie.Li@Sun.COM 		return (-1);
6267348SJose.Borrego@Sun.COM 	}
6277348SJose.Borrego@Sun.COM 
6287348SJose.Borrego@Sun.COM 	*wildcard = (wildcards != 0);
6297961SNatalie.Li@Sun.COM 	return (0);
6307348SJose.Borrego@Sun.COM }
6317348SJose.Borrego@Sun.COM 
6327348SJose.Borrego@Sun.COM /*
6337961SNatalie.Li@Sun.COM  * smb_delete_error
6346139Sjb150015  */
6357961SNatalie.Li@Sun.COM static void
6367961SNatalie.Li@Sun.COM smb_delete_error(smb_error_t *err,
6377961SNatalie.Li@Sun.COM     uint32_t status, uint16_t errcls, uint16_t errcode)
6385331Samw {
6397961SNatalie.Li@Sun.COM 	err->severity = ERROR_SEVERITY_ERROR;
6407961SNatalie.Li@Sun.COM 	err->status = status;
6417961SNatalie.Li@Sun.COM 	err->errcls = errcls;
6427961SNatalie.Li@Sun.COM 	err->errcode = errcode;
6435331Samw }
644