Similar to a reported issue (check the commit b33fb5b801c6 ("net: qualcomm: rmnet: fix global oob in rmnet_policy"), my local fuzzer finds another global out-of-bounds read for policy ksmbd_nl_policy. See bug trace below: ================================================================== BUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:386 [inline] BUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600 Read of size 1 at addr ffffffff8f24b100 by task syz-executor.1/62810 CPU: 0 PID: 62810 Comm: syz-executor.1 Tainted: G N 6.1.0 #3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x8b/0xb3 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:284 [inline] print_report+0x172/0x475 mm/kasan/report.c:395 kasan_report+0xbb/0x1c0 mm/kasan/report.c:495 validate_nla lib/nlattr.c:386 [inline] __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600 __nla_parse+0x3e/0x50 lib/nlattr.c:697 __nlmsg_parse include/net/netlink.h:748 [inline] genl_family_rcv_msg_attrs_parse.constprop.0+0x1b0/0x290 net/netlink/genetlink.c:565 genl_family_rcv_msg_doit+0xda/0x330 net/netlink/genetlink.c:734 genl_family_rcv_msg net/netlink/genetlink.c:833 [inline] genl_rcv_msg+0x441/0x780 net/netlink/genetlink.c:850 netlink_rcv_skb+0x14f/0x410 net/netlink/af_netlink.c:2540 genl_rcv+0x24/0x40 net/netlink/genetlink.c:861 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline] netlink_unicast+0x54e/0x800 net/netlink/af_netlink.c:1345 netlink_sendmsg+0x930/0xe50 net/netlink/af_netlink.c:1921 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg+0x154/0x190 net/socket.c:734 ____sys_sendmsg+0x6df/0x840 net/socket.c:2482 ___sys_sendmsg+0x110/0x1b0 net/socket.c:2536 __sys_sendmsg+0xf3/0x1c0 net/socket.c:2565 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fdd66a8f359 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fdd65e00168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fdd66bbcf80 RCX: 00007fdd66a8f359 RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000003 RBP: 00007fdd66ada493 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc84b81aff R14: 00007fdd65e00300 R15: 0000000000022000 </TASK> The buggy address belongs to the variable: ksmbd_nl_policy+0x100/0xa80 The buggy address belongs to the physical page: page:0000000034f47940 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ccc4b flags: 0x200000000001000(reserved|node=0|zone=2) raw: 0200000000001000 ffffea00073312c8 ffffea00073312c8 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffffffff8f24b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffffffff8f24b080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffffff8f24b100: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 07 f9 ^ ffffffff8f24b180: f9 f9 f9 f9 00 05 f9 f9 f9 f9 f9 f9 00 00 00 05 ffffffff8f24b200: f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9 00 00 04 f9 ================================================================== To fix it, add a placeholder named __KSMBD_EVENT_MAX and let KSMBD_EVENT_MAX to be its original value - 1 according to what other netlink families do. Also change two sites that refer the KSMBD_EVENT_MAX to correct value. Cc: stable@vger.kernel.org Fixes: 0626e6641f6b ("cifsd: add server handler for central processing and tranport layers") Signed-off-by: Lin Ma <linma@zju.edu.cn> Acked-by: Namjae Jeon <linkinjeon@kernel.org> Signed-off-by: Steve French <stfrench@microsoft.com>
416 lines
12 KiB
C
416 lines
12 KiB
C
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
|
/*
|
|
* Copyright (C) 2018 Samsung Electronics Co., Ltd.
|
|
*
|
|
* linux-ksmbd-devel@lists.sourceforge.net
|
|
*/
|
|
|
|
#ifndef _LINUX_KSMBD_SERVER_H
|
|
#define _LINUX_KSMBD_SERVER_H
|
|
|
|
#include <linux/types.h>
|
|
|
|
/*
|
|
* This is a userspace ABI to communicate data between ksmbd and user IPC
|
|
* daemon using netlink. This is added to track and cache user account DB
|
|
* and share configuration info from userspace.
|
|
*
|
|
* - KSMBD_EVENT_HEARTBEAT_REQUEST(ksmbd_heartbeat)
|
|
* This event is to check whether user IPC daemon is alive. If user IPC
|
|
* daemon is dead, ksmbd keep existing connection till disconnecting and
|
|
* new connection will be denied.
|
|
*
|
|
* - KSMBD_EVENT_STARTING_UP(ksmbd_startup_request)
|
|
* This event is to receive the information that initializes the ksmbd
|
|
* server from the user IPC daemon and to start the server. The global
|
|
* section parameters are given from smb.conf as initialization
|
|
* information.
|
|
*
|
|
* - KSMBD_EVENT_SHUTTING_DOWN(ksmbd_shutdown_request)
|
|
* This event is to shutdown ksmbd server.
|
|
*
|
|
* - KSMBD_EVENT_LOGIN_REQUEST/RESPONSE(ksmbd_login_request/response)
|
|
* This event is to get user account info to user IPC daemon.
|
|
*
|
|
* - KSMBD_EVENT_SHARE_CONFIG_REQUEST/RESPONSE(ksmbd_share_config_request/response)
|
|
* This event is to get net share configuration info.
|
|
*
|
|
* - KSMBD_EVENT_TREE_CONNECT_REQUEST/RESPONSE(ksmbd_tree_connect_request/response)
|
|
* This event is to get session and tree connect info.
|
|
*
|
|
* - KSMBD_EVENT_TREE_DISCONNECT_REQUEST(ksmbd_tree_disconnect_request)
|
|
* This event is to send tree disconnect info to user IPC daemon.
|
|
*
|
|
* - KSMBD_EVENT_LOGOUT_REQUEST(ksmbd_logout_request)
|
|
* This event is to send logout request to user IPC daemon.
|
|
*
|
|
* - KSMBD_EVENT_RPC_REQUEST/RESPONSE(ksmbd_rpc_command)
|
|
* This event is to make DCE/RPC request like srvsvc, wkssvc, lsarpc,
|
|
* samr to be processed in userspace.
|
|
*
|
|
* - KSMBD_EVENT_SPNEGO_AUTHEN_REQUEST/RESPONSE(ksmbd_spnego_authen_request/response)
|
|
* This event is to make kerberos authentication to be processed in
|
|
* userspace.
|
|
*/
|
|
|
|
#define KSMBD_GENL_NAME "SMBD_GENL"
|
|
#define KSMBD_GENL_VERSION 0x01
|
|
|
|
#define KSMBD_REQ_MAX_ACCOUNT_NAME_SZ 48
|
|
#define KSMBD_REQ_MAX_HASH_SZ 18
|
|
#define KSMBD_REQ_MAX_SHARE_NAME 64
|
|
|
|
/*
|
|
* IPC heartbeat frame to check whether user IPC daemon is alive.
|
|
*/
|
|
struct ksmbd_heartbeat {
|
|
__u32 handle;
|
|
};
|
|
|
|
/*
|
|
* Global config flags.
|
|
*/
|
|
#define KSMBD_GLOBAL_FLAG_INVALID (0)
|
|
#define KSMBD_GLOBAL_FLAG_SMB2_LEASES BIT(0)
|
|
#define KSMBD_GLOBAL_FLAG_SMB2_ENCRYPTION BIT(1)
|
|
#define KSMBD_GLOBAL_FLAG_SMB3_MULTICHANNEL BIT(2)
|
|
#define KSMBD_GLOBAL_FLAG_SMB2_ENCRYPTION_OFF BIT(3)
|
|
|
|
/*
|
|
* IPC request for ksmbd server startup
|
|
*/
|
|
struct ksmbd_startup_request {
|
|
__u32 flags; /* Flags for global config */
|
|
__s32 signing; /* Signing enabled */
|
|
__s8 min_prot[16]; /* The minimum SMB protocol version */
|
|
__s8 max_prot[16]; /* The maximum SMB protocol version */
|
|
__s8 netbios_name[16];
|
|
__s8 work_group[64]; /* Workgroup */
|
|
__s8 server_string[64]; /* Server string */
|
|
__u16 tcp_port; /* tcp port */
|
|
__u16 ipc_timeout; /*
|
|
* specifies the number of seconds
|
|
* server will wait for the userspace to
|
|
* reply to heartbeat frames.
|
|
*/
|
|
__u32 deadtime; /* Number of minutes of inactivity */
|
|
__u32 file_max; /* Limits the maximum number of open files */
|
|
__u32 smb2_max_write; /* MAX write size */
|
|
__u32 smb2_max_read; /* MAX read size */
|
|
__u32 smb2_max_trans; /* MAX trans size */
|
|
__u32 share_fake_fscaps; /*
|
|
* Support some special application that
|
|
* makes QFSINFO calls to check whether
|
|
* we set the SPARSE_FILES bit (0x40).
|
|
*/
|
|
__u32 sub_auth[3]; /* Subauth value for Security ID */
|
|
__u32 smb2_max_credits; /* MAX credits */
|
|
__u32 smbd_max_io_size; /* smbd read write size */
|
|
__u32 max_connections; /* Number of maximum simultaneous connections */
|
|
__u32 reserved[126]; /* Reserved room */
|
|
__u32 ifc_list_sz; /* interfaces list size */
|
|
__s8 ____payload[];
|
|
};
|
|
|
|
#define KSMBD_STARTUP_CONFIG_INTERFACES(s) ((s)->____payload)
|
|
|
|
/*
|
|
* IPC request to shutdown ksmbd server.
|
|
*/
|
|
struct ksmbd_shutdown_request {
|
|
__s32 reserved[16];
|
|
};
|
|
|
|
/*
|
|
* IPC user login request.
|
|
*/
|
|
struct ksmbd_login_request {
|
|
__u32 handle;
|
|
__s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */
|
|
__u32 reserved[16]; /* Reserved room */
|
|
};
|
|
|
|
/*
|
|
* IPC user login response.
|
|
*/
|
|
struct ksmbd_login_response {
|
|
__u32 handle;
|
|
__u32 gid; /* group id */
|
|
__u32 uid; /* user id */
|
|
__s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */
|
|
__u16 status;
|
|
__u16 hash_sz; /* hash size */
|
|
__s8 hash[KSMBD_REQ_MAX_HASH_SZ]; /* password hash */
|
|
__u32 reserved[16]; /* Reserved room */
|
|
};
|
|
|
|
/*
|
|
* IPC request to fetch net share config.
|
|
*/
|
|
struct ksmbd_share_config_request {
|
|
__u32 handle;
|
|
__s8 share_name[KSMBD_REQ_MAX_SHARE_NAME]; /* share name */
|
|
__u32 reserved[16]; /* Reserved room */
|
|
};
|
|
|
|
/*
|
|
* IPC response to the net share config request.
|
|
*/
|
|
struct ksmbd_share_config_response {
|
|
__u32 handle;
|
|
__u32 flags;
|
|
__u16 create_mask;
|
|
__u16 directory_mask;
|
|
__u16 force_create_mode;
|
|
__u16 force_directory_mode;
|
|
__u16 force_uid;
|
|
__u16 force_gid;
|
|
__s8 share_name[KSMBD_REQ_MAX_SHARE_NAME];
|
|
__u32 reserved[112]; /* Reserved room */
|
|
__u32 veto_list_sz;
|
|
__s8 ____payload[];
|
|
};
|
|
|
|
#define KSMBD_SHARE_CONFIG_VETO_LIST(s) ((s)->____payload)
|
|
|
|
static inline char *
|
|
ksmbd_share_config_path(struct ksmbd_share_config_response *sc)
|
|
{
|
|
char *p = sc->____payload;
|
|
|
|
if (sc->veto_list_sz)
|
|
p += sc->veto_list_sz + 1;
|
|
|
|
return p;
|
|
}
|
|
|
|
/*
|
|
* IPC request for tree connection. This request include session and tree
|
|
* connect info from client.
|
|
*/
|
|
struct ksmbd_tree_connect_request {
|
|
__u32 handle;
|
|
__u16 account_flags;
|
|
__u16 flags;
|
|
__u64 session_id;
|
|
__u64 connect_id;
|
|
__s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ];
|
|
__s8 share[KSMBD_REQ_MAX_SHARE_NAME];
|
|
__s8 peer_addr[64];
|
|
__u32 reserved[16]; /* Reserved room */
|
|
};
|
|
|
|
/*
|
|
* IPC Response structure for tree connection.
|
|
*/
|
|
struct ksmbd_tree_connect_response {
|
|
__u32 handle;
|
|
__u16 status;
|
|
__u16 connection_flags;
|
|
__u32 reserved[16]; /* Reserved room */
|
|
};
|
|
|
|
/*
|
|
* IPC Request struture to disconnect tree connection.
|
|
*/
|
|
struct ksmbd_tree_disconnect_request {
|
|
__u64 session_id; /* session id */
|
|
__u64 connect_id; /* tree connection id */
|
|
__u32 reserved[16]; /* Reserved room */
|
|
};
|
|
|
|
/*
|
|
* IPC Response structure to logout user account.
|
|
*/
|
|
struct ksmbd_logout_request {
|
|
__s8 account[KSMBD_REQ_MAX_ACCOUNT_NAME_SZ]; /* user account name */
|
|
__u32 account_flags;
|
|
__u32 reserved[16]; /* Reserved room */
|
|
};
|
|
|
|
/*
|
|
* RPC command structure to send rpc request like srvsvc or wkssvc to
|
|
* IPC user daemon.
|
|
*/
|
|
struct ksmbd_rpc_command {
|
|
__u32 handle;
|
|
__u32 flags;
|
|
__u32 payload_sz;
|
|
__u8 payload[];
|
|
};
|
|
|
|
/*
|
|
* IPC Request Kerberos authentication
|
|
*/
|
|
struct ksmbd_spnego_authen_request {
|
|
__u32 handle;
|
|
__u16 spnego_blob_len; /* the length of spnego_blob */
|
|
__u8 spnego_blob[]; /*
|
|
* the GSS token from SecurityBuffer of
|
|
* SMB2 SESSION SETUP request
|
|
*/
|
|
};
|
|
|
|
/*
|
|
* Response data which includes the GSS token and the session key generated by
|
|
* user daemon.
|
|
*/
|
|
struct ksmbd_spnego_authen_response {
|
|
__u32 handle;
|
|
struct ksmbd_login_response login_response; /*
|
|
* the login response with
|
|
* a user identified by the
|
|
* GSS token from a client
|
|
*/
|
|
__u16 session_key_len; /* the length of the session key */
|
|
__u16 spnego_blob_len; /*
|
|
* the length of the GSS token which will be
|
|
* stored in SecurityBuffer of SMB2 SESSION
|
|
* SETUP response
|
|
*/
|
|
__u8 payload[]; /* session key + AP_REP */
|
|
};
|
|
|
|
/*
|
|
* This also used as NETLINK attribute type value.
|
|
*
|
|
* NOTE:
|
|
* Response message type value should be equal to
|
|
* request message type value + 1.
|
|
*/
|
|
enum ksmbd_event {
|
|
KSMBD_EVENT_UNSPEC = 0,
|
|
KSMBD_EVENT_HEARTBEAT_REQUEST,
|
|
|
|
KSMBD_EVENT_STARTING_UP,
|
|
KSMBD_EVENT_SHUTTING_DOWN,
|
|
|
|
KSMBD_EVENT_LOGIN_REQUEST,
|
|
KSMBD_EVENT_LOGIN_RESPONSE = 5,
|
|
|
|
KSMBD_EVENT_SHARE_CONFIG_REQUEST,
|
|
KSMBD_EVENT_SHARE_CONFIG_RESPONSE,
|
|
|
|
KSMBD_EVENT_TREE_CONNECT_REQUEST,
|
|
KSMBD_EVENT_TREE_CONNECT_RESPONSE,
|
|
|
|
KSMBD_EVENT_TREE_DISCONNECT_REQUEST = 10,
|
|
|
|
KSMBD_EVENT_LOGOUT_REQUEST,
|
|
|
|
KSMBD_EVENT_RPC_REQUEST,
|
|
KSMBD_EVENT_RPC_RESPONSE,
|
|
|
|
KSMBD_EVENT_SPNEGO_AUTHEN_REQUEST,
|
|
KSMBD_EVENT_SPNEGO_AUTHEN_RESPONSE = 15,
|
|
|
|
__KSMBD_EVENT_MAX,
|
|
KSMBD_EVENT_MAX = __KSMBD_EVENT_MAX - 1
|
|
};
|
|
|
|
/*
|
|
* Enumeration for IPC tree connect status.
|
|
*/
|
|
enum KSMBD_TREE_CONN_STATUS {
|
|
KSMBD_TREE_CONN_STATUS_OK = 0,
|
|
KSMBD_TREE_CONN_STATUS_NOMEM,
|
|
KSMBD_TREE_CONN_STATUS_NO_SHARE,
|
|
KSMBD_TREE_CONN_STATUS_NO_USER,
|
|
KSMBD_TREE_CONN_STATUS_INVALID_USER,
|
|
KSMBD_TREE_CONN_STATUS_HOST_DENIED = 5,
|
|
KSMBD_TREE_CONN_STATUS_CONN_EXIST,
|
|
KSMBD_TREE_CONN_STATUS_TOO_MANY_CONNS,
|
|
KSMBD_TREE_CONN_STATUS_TOO_MANY_SESSIONS,
|
|
KSMBD_TREE_CONN_STATUS_ERROR,
|
|
};
|
|
|
|
/*
|
|
* User config flags.
|
|
*/
|
|
#define KSMBD_USER_FLAG_INVALID (0)
|
|
#define KSMBD_USER_FLAG_OK BIT(0)
|
|
#define KSMBD_USER_FLAG_BAD_PASSWORD BIT(1)
|
|
#define KSMBD_USER_FLAG_BAD_UID BIT(2)
|
|
#define KSMBD_USER_FLAG_BAD_USER BIT(3)
|
|
#define KSMBD_USER_FLAG_GUEST_ACCOUNT BIT(4)
|
|
#define KSMBD_USER_FLAG_DELAY_SESSION BIT(5)
|
|
|
|
/*
|
|
* Share config flags.
|
|
*/
|
|
#define KSMBD_SHARE_FLAG_INVALID (0)
|
|
#define KSMBD_SHARE_FLAG_AVAILABLE BIT(0)
|
|
#define KSMBD_SHARE_FLAG_BROWSEABLE BIT(1)
|
|
#define KSMBD_SHARE_FLAG_WRITEABLE BIT(2)
|
|
#define KSMBD_SHARE_FLAG_READONLY BIT(3)
|
|
#define KSMBD_SHARE_FLAG_GUEST_OK BIT(4)
|
|
#define KSMBD_SHARE_FLAG_GUEST_ONLY BIT(5)
|
|
#define KSMBD_SHARE_FLAG_STORE_DOS_ATTRS BIT(6)
|
|
#define KSMBD_SHARE_FLAG_OPLOCKS BIT(7)
|
|
#define KSMBD_SHARE_FLAG_PIPE BIT(8)
|
|
#define KSMBD_SHARE_FLAG_HIDE_DOT_FILES BIT(9)
|
|
#define KSMBD_SHARE_FLAG_INHERIT_OWNER BIT(10)
|
|
#define KSMBD_SHARE_FLAG_STREAMS BIT(11)
|
|
#define KSMBD_SHARE_FLAG_FOLLOW_SYMLINKS BIT(12)
|
|
#define KSMBD_SHARE_FLAG_ACL_XATTR BIT(13)
|
|
#define KSMBD_SHARE_FLAG_UPDATE BIT(14)
|
|
#define KSMBD_SHARE_FLAG_CROSSMNT BIT(15)
|
|
|
|
/*
|
|
* Tree connect request flags.
|
|
*/
|
|
#define KSMBD_TREE_CONN_FLAG_REQUEST_SMB1 (0)
|
|
#define KSMBD_TREE_CONN_FLAG_REQUEST_IPV6 BIT(0)
|
|
#define KSMBD_TREE_CONN_FLAG_REQUEST_SMB2 BIT(1)
|
|
|
|
/*
|
|
* Tree connect flags.
|
|
*/
|
|
#define KSMBD_TREE_CONN_FLAG_GUEST_ACCOUNT BIT(0)
|
|
#define KSMBD_TREE_CONN_FLAG_READ_ONLY BIT(1)
|
|
#define KSMBD_TREE_CONN_FLAG_WRITABLE BIT(2)
|
|
#define KSMBD_TREE_CONN_FLAG_ADMIN_ACCOUNT BIT(3)
|
|
#define KSMBD_TREE_CONN_FLAG_UPDATE BIT(4)
|
|
|
|
/*
|
|
* RPC over IPC.
|
|
*/
|
|
#define KSMBD_RPC_METHOD_RETURN BIT(0)
|
|
#define KSMBD_RPC_SRVSVC_METHOD_INVOKE BIT(1)
|
|
#define KSMBD_RPC_SRVSVC_METHOD_RETURN (KSMBD_RPC_SRVSVC_METHOD_INVOKE | KSMBD_RPC_METHOD_RETURN)
|
|
#define KSMBD_RPC_WKSSVC_METHOD_INVOKE BIT(2)
|
|
#define KSMBD_RPC_WKSSVC_METHOD_RETURN (KSMBD_RPC_WKSSVC_METHOD_INVOKE | KSMBD_RPC_METHOD_RETURN)
|
|
#define KSMBD_RPC_IOCTL_METHOD (BIT(3) | KSMBD_RPC_METHOD_RETURN)
|
|
#define KSMBD_RPC_OPEN_METHOD BIT(4)
|
|
#define KSMBD_RPC_WRITE_METHOD BIT(5)
|
|
#define KSMBD_RPC_READ_METHOD (BIT(6) | KSMBD_RPC_METHOD_RETURN)
|
|
#define KSMBD_RPC_CLOSE_METHOD BIT(7)
|
|
#define KSMBD_RPC_RAP_METHOD (BIT(8) | KSMBD_RPC_METHOD_RETURN)
|
|
#define KSMBD_RPC_RESTRICTED_CONTEXT BIT(9)
|
|
#define KSMBD_RPC_SAMR_METHOD_INVOKE BIT(10)
|
|
#define KSMBD_RPC_SAMR_METHOD_RETURN (KSMBD_RPC_SAMR_METHOD_INVOKE | KSMBD_RPC_METHOD_RETURN)
|
|
#define KSMBD_RPC_LSARPC_METHOD_INVOKE BIT(11)
|
|
#define KSMBD_RPC_LSARPC_METHOD_RETURN (KSMBD_RPC_LSARPC_METHOD_INVOKE | KSMBD_RPC_METHOD_RETURN)
|
|
|
|
/*
|
|
* RPC status definitions.
|
|
*/
|
|
#define KSMBD_RPC_OK 0
|
|
#define KSMBD_RPC_EBAD_FUNC 0x00000001
|
|
#define KSMBD_RPC_EACCESS_DENIED 0x00000005
|
|
#define KSMBD_RPC_EBAD_FID 0x00000006
|
|
#define KSMBD_RPC_ENOMEM 0x00000008
|
|
#define KSMBD_RPC_EBAD_DATA 0x0000000D
|
|
#define KSMBD_RPC_ENOTIMPLEMENTED 0x00000040
|
|
#define KSMBD_RPC_EINVALID_PARAMETER 0x00000057
|
|
#define KSMBD_RPC_EMORE_DATA 0x000000EA
|
|
#define KSMBD_RPC_EINVALID_LEVEL 0x0000007C
|
|
#define KSMBD_RPC_SOME_NOT_MAPPED 0x00000107
|
|
|
|
#define KSMBD_CONFIG_OPT_DISABLED 0
|
|
#define KSMBD_CONFIG_OPT_ENABLED 1
|
|
#define KSMBD_CONFIG_OPT_AUTO 2
|
|
#define KSMBD_CONFIG_OPT_MANDATORY 3
|
|
|
|
#endif /* _LINUX_KSMBD_SERVER_H */
|