2009-06-05 19:32:58 +04:00
/*
Unix SMB / CIFS implementation .
Core SMB2 server
Copyright ( C ) Stefan Metzmacher 2009
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
2011-03-22 18:57:01 +03:00
# include "smbd/smbd.h"
2009-06-05 19:32:58 +04:00
# include "smbd/globals.h"
2009-08-12 19:52:55 +04:00
# include "../libcli/smb/smb_common.h"
2011-04-28 19:38:09 +04:00
# include "../lib/util/tevent_ntstatus.h"
2011-04-30 01:32:28 +04:00
# include "rpc_server/srv_pipe_hnd.h"
2011-05-30 19:14:56 +04:00
# include "include/ntioctl.h"
2009-06-05 19:32:58 +04:00
static struct tevent_req * smbd_smb2_ioctl_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
uint32_t in_ctl_code ,
uint64_t in_file_id_volatile ,
DATA_BLOB in_input ,
uint32_t in_max_output ,
uint32_t in_flags ) ;
static NTSTATUS smbd_smb2_ioctl_recv ( struct tevent_req * req ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * out_output ) ;
static void smbd_smb2_request_ioctl_done ( struct tevent_req * subreq ) ;
NTSTATUS smbd_smb2_request_process_ioctl ( struct smbd_smb2_request * req )
{
const uint8_t * inhdr ;
const uint8_t * inbody ;
int i = req - > current_idx ;
size_t expected_body_size = 0x39 ;
size_t body_size ;
uint32_t in_ctl_code ;
uint64_t in_file_id_persistent ;
uint64_t in_file_id_volatile ;
uint32_t in_input_offset ;
uint32_t in_input_length ;
DATA_BLOB in_input_buffer ;
uint32_t in_max_output_length ;
uint32_t in_flags ;
struct tevent_req * subreq ;
inhdr = ( const uint8_t * ) req - > in . vector [ i + 0 ] . iov_base ;
if ( req - > in . vector [ i + 1 ] . iov_len ! = ( expected_body_size & 0xFFFFFFFE ) ) {
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
inbody = ( const uint8_t * ) req - > in . vector [ i + 1 ] . iov_base ;
body_size = SVAL ( inbody , 0x00 ) ;
if ( body_size ! = expected_body_size ) {
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
in_ctl_code = IVAL ( inbody , 0x04 ) ;
in_file_id_persistent = BVAL ( inbody , 0x08 ) ;
in_file_id_volatile = BVAL ( inbody , 0x10 ) ;
in_input_offset = IVAL ( inbody , 0x18 ) ;
in_input_length = IVAL ( inbody , 0x1C ) ;
in_max_output_length = IVAL ( inbody , 0x2C ) ;
in_flags = IVAL ( inbody , 0x30 ) ;
if ( in_input_offset ! = ( SMB2_HDR_BODY + ( body_size & 0xFFFFFFFE ) ) ) {
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
if ( in_input_length > req - > in . vector [ i + 2 ] . iov_len ) {
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
in_input_buffer . data = ( uint8_t * ) req - > in . vector [ i + 2 ] . iov_base ;
in_input_buffer . length = in_input_length ;
2009-06-09 20:47:26 +04:00
if ( req - > compat_chain_fsp ) {
/* skip check */
} else if ( in_file_id_persistent = = UINT64_MAX & &
in_file_id_volatile = = UINT64_MAX ) {
2009-06-05 19:32:58 +04:00
/* without a handle */
2010-05-20 06:28:26 +04:00
} else if ( in_file_id_persistent ! = in_file_id_volatile ) {
2009-06-05 19:32:58 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_FILE_CLOSED ) ;
}
subreq = smbd_smb2_ioctl_send ( req ,
2009-08-07 17:21:07 +04:00
req - > sconn - > smb2 . event_ctx ,
2009-06-05 19:32:58 +04:00
req ,
in_ctl_code ,
in_file_id_volatile ,
in_input_buffer ,
in_max_output_length ,
in_flags ) ;
if ( subreq = = NULL ) {
return smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
}
tevent_req_set_callback ( subreq , smbd_smb2_request_ioctl_done , req ) ;
2009-06-10 00:34:14 +04:00
2009-08-15 12:01:38 +04:00
return smbd_smb2_request_pending_queue ( req , subreq ) ;
2009-06-05 19:32:58 +04:00
}
static void smbd_smb2_request_ioctl_done ( struct tevent_req * subreq )
{
struct smbd_smb2_request * req = tevent_req_callback_data ( subreq ,
struct smbd_smb2_request ) ;
2009-06-06 12:25:10 +04:00
const uint8_t * inbody ;
2009-06-05 19:32:58 +04:00
int i = req - > current_idx ;
uint8_t * outhdr ;
DATA_BLOB outbody ;
DATA_BLOB outdyn ;
2009-06-06 12:25:10 +04:00
uint32_t in_ctl_code ;
uint64_t in_file_id_persistent ;
uint64_t in_file_id_volatile ;
uint32_t out_input_offset ;
2009-06-05 19:32:58 +04:00
uint32_t out_output_offset ;
2009-07-24 18:21:07 +04:00
DATA_BLOB out_output_buffer = data_blob_null ;
2009-06-05 19:32:58 +04:00
NTSTATUS status ;
NTSTATUS error ; /* transport error */
status = smbd_smb2_ioctl_recv ( subreq , req , & out_output_buffer ) ;
2010-04-28 04:07:44 +04:00
DEBUG ( 10 , ( " smbd_smb2_request_ioctl_done: smbd_smb2_ioctl_recv returned "
" %u status %s \n " ,
( unsigned int ) out_output_buffer . length ,
nt_errstr ( status ) ) ) ;
2009-06-05 19:32:58 +04:00
TALLOC_FREE ( subreq ) ;
2009-06-05 22:14:17 +04:00
if ( NT_STATUS_EQUAL ( status , STATUS_BUFFER_OVERFLOW ) ) {
/* also ok */
} else if ( ! NT_STATUS_IS_OK ( status ) ) {
2009-06-05 19:32:58 +04:00
error = smbd_smb2_request_error ( req , status ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2009-08-07 17:21:07 +04:00
smbd_server_connection_terminate ( req - > sconn ,
2009-06-05 19:32:58 +04:00
nt_errstr ( error ) ) ;
return ;
}
return ;
}
2009-06-06 12:25:10 +04:00
out_input_offset = SMB2_HDR_BODY + 0x30 ;
2009-06-05 19:32:58 +04:00
out_output_offset = SMB2_HDR_BODY + 0x30 ;
2009-06-06 12:25:10 +04:00
inbody = ( const uint8_t * ) req - > in . vector [ i + 1 ] . iov_base ;
in_ctl_code = IVAL ( inbody , 0x04 ) ;
in_file_id_persistent = BVAL ( inbody , 0x08 ) ;
in_file_id_volatile = BVAL ( inbody , 0x10 ) ;
2009-06-05 19:32:58 +04:00
outhdr = ( uint8_t * ) req - > out . vector [ i ] . iov_base ;
outbody = data_blob_talloc ( req - > out . vector , NULL , 0x30 ) ;
if ( outbody . data = = NULL ) {
error = smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2009-08-07 17:21:07 +04:00
smbd_server_connection_terminate ( req - > sconn ,
2009-06-05 19:32:58 +04:00
nt_errstr ( error ) ) ;
return ;
}
return ;
}
SSVAL ( outbody . data , 0x00 , 0x30 + 1 ) ; /* struct size */
SSVAL ( outbody . data , 0x02 , 0 ) ; /* reserved */
2009-06-06 12:25:10 +04:00
SIVAL ( outbody . data , 0x04 ,
in_ctl_code ) ; /* ctl code */
SBVAL ( outbody . data , 0x08 ,
in_file_id_persistent ) ; /* file id (persistent) */
SBVAL ( outbody . data , 0x10 ,
in_file_id_volatile ) ; /* file id (volatile) */
SIVAL ( outbody . data , 0x18 ,
out_input_offset ) ; /* input offset */
2009-06-05 19:32:58 +04:00
SIVAL ( outbody . data , 0x1C , 0 ) ; /* input count */
SIVAL ( outbody . data , 0x20 ,
out_output_offset ) ; /* output offset */
SIVAL ( outbody . data , 0x24 ,
out_output_buffer . length ) ; /* output count */
SIVAL ( outbody . data , 0x28 , 0 ) ; /* flags */
SIVAL ( outbody . data , 0x2C , 0 ) ; /* reserved */
/*
2009-06-06 12:25:10 +04:00
* Note : Windows Vista and 2008 send back also the
* input from the request . But it was fixed in
* Windows 7.
2009-06-05 19:32:58 +04:00
*/
outdyn = out_output_buffer ;
2009-06-05 22:14:17 +04:00
error = smbd_smb2_request_done_ex ( req , status , outbody , & outdyn ,
__location__ ) ;
2009-06-05 19:32:58 +04:00
if ( ! NT_STATUS_IS_OK ( error ) ) {
2009-08-07 17:21:07 +04:00
smbd_server_connection_terminate ( req - > sconn ,
2009-06-05 19:32:58 +04:00
nt_errstr ( error ) ) ;
return ;
}
}
struct smbd_smb2_ioctl_state {
struct smbd_smb2_request * smb2req ;
struct smb_request * smbreq ;
files_struct * fsp ;
DATA_BLOB in_input ;
uint32_t in_max_output ;
DATA_BLOB out_output ;
} ;
2009-06-05 19:48:28 +04:00
static void smbd_smb2_ioctl_pipe_write_done ( struct tevent_req * subreq ) ;
static void smbd_smb2_ioctl_pipe_read_done ( struct tevent_req * subreq ) ;
2009-06-05 19:32:58 +04:00
static struct tevent_req * smbd_smb2_ioctl_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
uint32_t in_ctl_code ,
uint64_t in_file_id_volatile ,
DATA_BLOB in_input ,
uint32_t in_max_output ,
uint32_t in_flags )
{
struct tevent_req * req ;
struct smbd_smb2_ioctl_state * state ;
struct smb_request * smbreq ;
files_struct * fsp = NULL ;
struct tevent_req * subreq ;
req = tevent_req_create ( mem_ctx , & state ,
struct smbd_smb2_ioctl_state ) ;
if ( req = = NULL ) {
return NULL ;
}
state - > smb2req = smb2req ;
state - > smbreq = NULL ;
state - > fsp = NULL ;
state - > in_input = in_input ;
state - > in_max_output = in_max_output ;
state - > out_output = data_blob_null ;
2011-05-30 13:38:24 +04:00
DEBUG ( 10 , ( " smbd_smb2_ioctl: ctl_code[0x%08x] file_id[0x%016llX] \n " ,
( unsigned ) in_ctl_code ,
( unsigned long long ) in_file_id_volatile ) ) ;
2009-06-05 19:32:58 +04:00
smbreq = smbd_smb2_fake_smb_request ( smb2req ) ;
if ( tevent_req_nomem ( smbreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
state - > smbreq = smbreq ;
if ( in_file_id_volatile ! = UINT64_MAX ) {
fsp = file_fsp ( smbreq , ( uint16_t ) in_file_id_volatile ) ;
if ( fsp = = NULL ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
if ( smbreq - > conn ! = fsp - > conn ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
if ( smb2req - > session - > vuid ! = fsp - > vuid ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
state - > fsp = fsp ;
}
switch ( in_ctl_code ) {
2009-06-05 20:38:20 +04:00
case 0x00060194 : /* FSCTL_DFS_GET_REFERRALS */
{
uint16_t in_max_referral_level ;
DATA_BLOB in_file_name_buffer ;
char * in_file_name_string ;
size_t in_file_name_string_size ;
bool ok ;
bool overflow = false ;
NTSTATUS status ;
int dfs_size ;
char * dfs_data = NULL ;
if ( ! IS_IPC ( smbreq - > conn ) ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_DEVICE_REQUEST ) ;
return tevent_req_post ( req , ev ) ;
}
if ( ! lp_host_msdfs ( ) ) {
tevent_req_nterror ( req , NT_STATUS_FS_DRIVER_REQUIRED ) ;
return tevent_req_post ( req , ev ) ;
}
if ( in_input . length < ( 2 + 2 ) ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_PARAMETER ) ;
return tevent_req_post ( req , ev ) ;
}
in_max_referral_level = SVAL ( in_input . data , 0 ) ;
in_file_name_buffer . data = in_input . data + 2 ;
in_file_name_buffer . length = in_input . length - 2 ;
ok = convert_string_talloc ( state , CH_UTF16 , CH_UNIX ,
in_file_name_buffer . data ,
in_file_name_buffer . length ,
& in_file_name_string ,
2011-03-24 02:59:41 +03:00
& in_file_name_string_size ) ;
2009-06-05 20:38:20 +04:00
if ( ! ok ) {
tevent_req_nterror ( req , NT_STATUS_ILLEGAL_CHARACTER ) ;
return tevent_req_post ( req , ev ) ;
}
dfs_size = setup_dfs_referral ( smbreq - > conn ,
in_file_name_string ,
in_max_referral_level ,
& dfs_data , & status ) ;
if ( dfs_size < 0 ) {
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
if ( dfs_size > in_max_output ) {
/*
* TODO : we need a testsuite for this
*/
overflow = true ;
dfs_size = in_max_output ;
}
state - > out_output = data_blob_talloc ( state ,
( uint8_t * ) dfs_data ,
dfs_size ) ;
SAFE_FREE ( dfs_data ) ;
if ( dfs_size > 0 & &
tevent_req_nomem ( state - > out_output . data , req ) ) {
return tevent_req_post ( req , ev ) ;
}
if ( overflow ) {
2009-06-05 23:04:37 +04:00
tevent_req_nterror ( req , STATUS_BUFFER_OVERFLOW ) ;
2009-06-05 20:38:20 +04:00
} else {
tevent_req_done ( req ) ;
}
return tevent_req_post ( req , ev ) ;
}
2009-06-05 19:48:28 +04:00
case 0x0011C017 : /* FSCTL_PIPE_TRANSCEIVE */
if ( ! IS_IPC ( smbreq - > conn ) ) {
2009-06-06 12:36:42 +04:00
tevent_req_nterror ( req , NT_STATUS_NOT_SUPPORTED ) ;
2009-06-05 19:48:28 +04:00
return tevent_req_post ( req , ev ) ;
}
if ( fsp = = NULL ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
if ( ! fsp_is_np ( fsp ) ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
2010-04-28 04:07:44 +04:00
DEBUG ( 10 , ( " smbd_smb2_ioctl_send: np_write_send of size %u \n " ,
( unsigned int ) in_input . length ) ) ;
2009-06-05 19:48:28 +04:00
subreq = np_write_send ( state , ev ,
fsp - > fake_file_handle ,
in_input . data ,
in_input . length ) ;
if ( tevent_req_nomem ( subreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
tevent_req_set_callback ( subreq ,
smbd_smb2_ioctl_pipe_write_done ,
req ) ;
return req ;
2011-05-30 19:14:56 +04:00
case 0x00144064 : /* FSCTL_SRV_ENUMERATE_SNAPSHOTS */
{
/*
* This is called to retrieve the number of Shadow Copies ( a . k . a . snapshots )
* and return their volume names . If max_data_count is 16 , then it is just
* asking for the number of volumes and length of the combined names .
*
* pdata is the data allocated by our caller , but that uses
* total_data_count ( which is 0 in our case ) rather than max_data_count .
* Allocate the correct amount and return the pointer to let
* it be deallocated when we return .
*/
struct shadow_copy_data * shadow_data = NULL ;
bool labels = False ;
uint32_t labels_data_count = 0 ;
uint32_t data_count ;
uint32_t i ;
char * pdata ;
NTSTATUS status ;
2011-06-19 21:23:47 +04:00
if ( fsp = = NULL ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
2011-05-30 19:14:56 +04:00
if ( in_max_output < 16 ) {
DEBUG ( 0 , ( " FSCTL_GET_SHADOW_COPY_DATA: "
" in_max_output(%u) < 16 is invalid! \n " ,
in_max_output ) ) ;
tevent_req_nterror ( req , NT_STATUS_INVALID_PARAMETER ) ;
return tevent_req_post ( req , ev ) ;
}
if ( in_max_output > 16 ) {
labels = True ;
}
2011-06-07 05:44:43 +04:00
shadow_data = talloc_zero ( talloc_tos ( ) ,
2011-05-30 19:14:56 +04:00
struct shadow_copy_data ) ;
if ( tevent_req_nomem ( shadow_data , req ) ) {
DEBUG ( 0 , ( " TALLOC_ZERO() failed! \n " ) ) ;
return tevent_req_post ( req , ev ) ;
}
/*
* Call the VFS routine to actually do the work .
*/
if ( SMB_VFS_GET_SHADOW_COPY_DATA ( fsp , shadow_data , labels )
! = 0 ) {
if ( errno = = ENOSYS ) {
DEBUG ( 5 , ( " FSCTL_GET_SHADOW_COPY_DATA: "
" connectpath %s, not supported. \n " ,
smbreq - > conn - > connectpath ) ) ;
status = NT_STATUS_NOT_SUPPORTED ;
} else {
DEBUG ( 0 , ( " FSCTL_GET_SHADOW_COPY_DATA: "
" connectpath %s, failed. \n " ,
smbreq - > conn - > connectpath ) ) ;
status = map_nt_error_from_unix ( errno ) ;
}
TALLOC_FREE ( shadow_data ) ;
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
labels_data_count =
( shadow_data - > num_volumes * 2 * sizeof ( SHADOW_COPY_LABEL ) )
+ 2 ;
if ( labels ) {
data_count = 12 + labels_data_count + 4 ;
} else {
data_count = 16 ;
}
if ( labels & & ( in_max_output < data_count ) ) {
DEBUG ( 0 , ( " FSCTL_GET_SHADOW_COPY_DATA: "
" in_max_output(%u) too small (%u) bytes "
" needed! \n " , in_max_output , data_count ) ) ;
TALLOC_FREE ( shadow_data ) ;
tevent_req_nterror ( req , NT_STATUS_BUFFER_TOO_SMALL ) ;
return tevent_req_post ( req , ev ) ;
}
state - > out_output = data_blob_talloc ( state , NULL , data_count ) ;
if ( tevent_req_nomem ( state - > out_output . data , req ) ) {
return tevent_req_post ( req , ev ) ;
}
pdata = ( char * ) state - > out_output . data ;
/* num_volumes 4 bytes */
SIVAL ( pdata , 0 , shadow_data - > num_volumes ) ;
if ( labels ) {
/* num_labels 4 bytes */
SIVAL ( pdata , 4 , shadow_data - > num_volumes ) ;
}
/* needed_data_count 4 bytes */
SIVAL ( pdata , 8 , labels_data_count + 4 ) ;
pdata + = 12 ;
DEBUG ( 10 , ( " FSCTL_GET_SHADOW_COPY_DATA: %u volumes for "
" path[%s]. \n " ,
shadow_data - > num_volumes , fsp_str_dbg ( fsp ) ) ) ;
if ( labels & & shadow_data - > labels ) {
for ( i = 0 ; i < shadow_data - > num_volumes ; i + + ) {
srvstr_push ( pdata , smbreq - > flags2 ,
pdata , shadow_data - > labels [ i ] ,
2 * sizeof ( SHADOW_COPY_LABEL ) ,
STR_UNICODE | STR_TERMINATE ) ;
pdata + = 2 * sizeof ( SHADOW_COPY_LABEL ) ;
DEBUGADD ( 10 , ( " Label[%u]: '%s' \n " , i ,
shadow_data - > labels [ i ] ) ) ;
}
}
TALLOC_FREE ( shadow_data ) ;
tevent_req_done ( req ) ;
return tevent_req_post ( req , ev ) ;
}
2009-06-05 19:32:58 +04:00
default :
if ( IS_IPC ( smbreq - > conn ) ) {
tevent_req_nterror ( req , NT_STATUS_FS_DRIVER_REQUIRED ) ;
return tevent_req_post ( req , ev ) ;
}
tevent_req_nterror ( req , NT_STATUS_INVALID_DEVICE_REQUEST ) ;
return tevent_req_post ( req , ev ) ;
}
tevent_req_nterror ( req , NT_STATUS_INTERNAL_ERROR ) ;
return tevent_req_post ( req , ev ) ;
}
2009-06-05 19:48:28 +04:00
static void smbd_smb2_ioctl_pipe_write_done ( struct tevent_req * subreq )
{
struct tevent_req * req = tevent_req_callback_data ( subreq ,
struct tevent_req ) ;
struct smbd_smb2_ioctl_state * state = tevent_req_data ( req ,
struct smbd_smb2_ioctl_state ) ;
NTSTATUS status ;
ssize_t nwritten = - 1 ;
status = np_write_recv ( subreq , & nwritten ) ;
2010-04-28 04:07:44 +04:00
DEBUG ( 10 , ( " smbd_smb2_ioctl_pipe_write_done: received %ld \n " ,
( long int ) nwritten ) ) ;
2009-06-05 19:48:28 +04:00
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
tevent_req_nterror ( req , status ) ;
return ;
}
if ( nwritten ! = state - > in_input . length ) {
tevent_req_nterror ( req , NT_STATUS_PIPE_NOT_AVAILABLE ) ;
return ;
}
state - > out_output = data_blob_talloc ( state , NULL , state - > in_max_output ) ;
if ( state - > in_max_output > 0 & &
tevent_req_nomem ( state - > out_output . data , req ) ) {
return ;
}
2010-04-28 04:07:44 +04:00
DEBUG ( 10 , ( " smbd_smb2_ioctl_pipe_write_done: issuing np_read_send "
" of size %u \n " ,
( unsigned int ) state - > out_output . length ) ) ;
TALLOC_FREE ( subreq ) ;
2009-06-05 19:48:28 +04:00
subreq = np_read_send ( state - > smbreq - > conn ,
2009-08-07 17:21:07 +04:00
state - > smb2req - > sconn - > smb2 . event_ctx ,
2009-06-05 19:48:28 +04:00
state - > fsp - > fake_file_handle ,
state - > out_output . data ,
state - > out_output . length ) ;
if ( tevent_req_nomem ( subreq , req ) ) {
return ;
}
tevent_req_set_callback ( subreq , smbd_smb2_ioctl_pipe_read_done , req ) ;
}
static void smbd_smb2_ioctl_pipe_read_done ( struct tevent_req * subreq )
{
struct tevent_req * req = tevent_req_callback_data ( subreq ,
struct tevent_req ) ;
struct smbd_smb2_ioctl_state * state = tevent_req_data ( req ,
struct smbd_smb2_ioctl_state ) ;
NTSTATUS status ;
2010-04-28 04:07:44 +04:00
ssize_t nread = - 1 ;
bool is_data_outstanding = false ;
2009-06-05 19:48:28 +04:00
status = np_read_recv ( subreq , & nread , & is_data_outstanding ) ;
2010-04-28 04:07:44 +04:00
DEBUG ( 10 , ( " smbd_smb2_ioctl_pipe_read_done: np_read_recv nread = %d "
" is_data_outstanding = %d, status = %s \n " ,
( int ) nread ,
( int ) is_data_outstanding ,
nt_errstr ( status ) ) ) ;
2009-06-05 19:48:28 +04:00
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
tevent_req_nterror ( req , status ) ;
return ;
}
state - > out_output . length = nread ;
2011-06-24 10:54:02 +04:00
if ( is_data_outstanding ) {
tevent_req_nterror ( req , STATUS_BUFFER_OVERFLOW ) ;
return ;
}
2009-06-05 19:48:28 +04:00
tevent_req_done ( req ) ;
}
2009-06-05 19:32:58 +04:00
static NTSTATUS smbd_smb2_ioctl_recv ( struct tevent_req * req ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * out_output )
{
2010-04-28 04:09:40 +04:00
NTSTATUS status = NT_STATUS_OK ;
2009-06-05 19:32:58 +04:00
struct smbd_smb2_ioctl_state * state = tevent_req_data ( req ,
struct smbd_smb2_ioctl_state ) ;
if ( tevent_req_is_nterror ( req , & status ) ) {
2009-06-05 22:14:17 +04:00
if ( ! NT_STATUS_EQUAL ( status , STATUS_BUFFER_OVERFLOW ) ) {
tevent_req_received ( req ) ;
return status ;
}
2009-06-05 19:32:58 +04:00
}
* out_output = state - > out_output ;
talloc_steal ( mem_ctx , out_output - > data ) ;
tevent_req_received ( req ) ;
2009-06-05 22:14:17 +04:00
return status ;
2009-06-05 19:32:58 +04:00
}