2009-06-05 17:32:58 +02:00
/*
Unix SMB / CIFS implementation .
Core SMB2 server
Copyright ( C ) Stefan Metzmacher 2009
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
# include "smbd/globals.h"
# include "../source4/libcli/smb2/smb2_constants.h"
static struct tevent_req * smbd_smb2_ioctl_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
uint32_t in_ctl_code ,
uint64_t in_file_id_volatile ,
DATA_BLOB in_input ,
uint32_t in_max_output ,
uint32_t in_flags ) ;
static NTSTATUS smbd_smb2_ioctl_recv ( struct tevent_req * req ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * out_output ) ;
static void smbd_smb2_request_ioctl_done ( struct tevent_req * subreq ) ;
NTSTATUS smbd_smb2_request_process_ioctl ( struct smbd_smb2_request * req )
{
const uint8_t * inhdr ;
const uint8_t * inbody ;
int i = req - > current_idx ;
size_t expected_body_size = 0x39 ;
size_t body_size ;
uint32_t in_ctl_code ;
uint64_t in_file_id_persistent ;
uint64_t in_file_id_volatile ;
uint32_t in_input_offset ;
uint32_t in_input_length ;
DATA_BLOB in_input_buffer ;
uint32_t in_max_output_length ;
uint32_t in_flags ;
struct tevent_req * subreq ;
inhdr = ( const uint8_t * ) req - > in . vector [ i + 0 ] . iov_base ;
if ( req - > in . vector [ i + 1 ] . iov_len ! = ( expected_body_size & 0xFFFFFFFE ) ) {
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
inbody = ( const uint8_t * ) req - > in . vector [ i + 1 ] . iov_base ;
body_size = SVAL ( inbody , 0x00 ) ;
if ( body_size ! = expected_body_size ) {
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
in_ctl_code = IVAL ( inbody , 0x04 ) ;
in_file_id_persistent = BVAL ( inbody , 0x08 ) ;
in_file_id_volatile = BVAL ( inbody , 0x10 ) ;
in_input_offset = IVAL ( inbody , 0x18 ) ;
in_input_length = IVAL ( inbody , 0x1C ) ;
in_max_output_length = IVAL ( inbody , 0x2C ) ;
in_flags = IVAL ( inbody , 0x30 ) ;
if ( in_input_offset ! = ( SMB2_HDR_BODY + ( body_size & 0xFFFFFFFE ) ) ) {
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
if ( in_input_length > req - > in . vector [ i + 2 ] . iov_len ) {
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
in_input_buffer . data = ( uint8_t * ) req - > in . vector [ i + 2 ] . iov_base ;
in_input_buffer . length = in_input_length ;
2009-06-09 18:47:26 +02:00
if ( req - > compat_chain_fsp ) {
/* skip check */
} else if ( in_file_id_persistent = = UINT64_MAX & &
in_file_id_volatile = = UINT64_MAX ) {
2009-06-05 17:32:58 +02:00
/* without a handle */
} else if ( in_file_id_persistent ! = 0 ) {
return smbd_smb2_request_error ( req , NT_STATUS_FILE_CLOSED ) ;
}
subreq = smbd_smb2_ioctl_send ( req ,
req - > conn - > smb2 . event_ctx ,
req ,
in_ctl_code ,
in_file_id_volatile ,
in_input_buffer ,
in_max_output_length ,
in_flags ) ;
if ( subreq = = NULL ) {
return smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
}
tevent_req_set_callback ( subreq , smbd_smb2_request_ioctl_done , req ) ;
2009-06-09 22:34:14 +02:00
if ( tevent_req_is_in_progress ( subreq ) ) {
return smbd_smb2_request_pending_queue ( req ) ;
}
2009-06-05 17:32:58 +02:00
return NT_STATUS_OK ;
}
static void smbd_smb2_request_ioctl_done ( struct tevent_req * subreq )
{
struct smbd_smb2_request * req = tevent_req_callback_data ( subreq ,
struct smbd_smb2_request ) ;
2009-06-06 10:25:10 +02:00
const uint8_t * inbody ;
2009-06-05 17:32:58 +02:00
int i = req - > current_idx ;
uint8_t * outhdr ;
DATA_BLOB outbody ;
DATA_BLOB outdyn ;
2009-06-06 10:25:10 +02:00
uint32_t in_ctl_code ;
uint64_t in_file_id_persistent ;
uint64_t in_file_id_volatile ;
uint32_t out_input_offset ;
2009-06-05 17:32:58 +02:00
uint32_t out_output_offset ;
DATA_BLOB out_output_buffer ;
NTSTATUS status ;
NTSTATUS error ; /* transport error */
status = smbd_smb2_ioctl_recv ( subreq , req , & out_output_buffer ) ;
TALLOC_FREE ( subreq ) ;
2009-06-05 20:14:17 +02:00
if ( NT_STATUS_EQUAL ( status , STATUS_BUFFER_OVERFLOW ) ) {
/* also ok */
} else if ( ! NT_STATUS_IS_OK ( status ) ) {
2009-06-05 17:32:58 +02:00
error = smbd_smb2_request_error ( req , status ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
smbd_server_connection_terminate ( req - > conn ,
nt_errstr ( error ) ) ;
return ;
}
return ;
}
2009-06-06 10:25:10 +02:00
out_input_offset = SMB2_HDR_BODY + 0x30 ;
2009-06-05 17:32:58 +02:00
out_output_offset = SMB2_HDR_BODY + 0x30 ;
2009-06-06 10:25:10 +02:00
inbody = ( const uint8_t * ) req - > in . vector [ i + 1 ] . iov_base ;
in_ctl_code = IVAL ( inbody , 0x04 ) ;
in_file_id_persistent = BVAL ( inbody , 0x08 ) ;
in_file_id_volatile = BVAL ( inbody , 0x10 ) ;
2009-06-05 17:32:58 +02:00
outhdr = ( uint8_t * ) req - > out . vector [ i ] . iov_base ;
outbody = data_blob_talloc ( req - > out . vector , NULL , 0x30 ) ;
if ( outbody . data = = NULL ) {
error = smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
smbd_server_connection_terminate ( req - > conn ,
nt_errstr ( error ) ) ;
return ;
}
return ;
}
SSVAL ( outbody . data , 0x00 , 0x30 + 1 ) ; /* struct size */
SSVAL ( outbody . data , 0x02 , 0 ) ; /* reserved */
2009-06-06 10:25:10 +02:00
SIVAL ( outbody . data , 0x04 ,
in_ctl_code ) ; /* ctl code */
SBVAL ( outbody . data , 0x08 ,
in_file_id_persistent ) ; /* file id (persistent) */
SBVAL ( outbody . data , 0x10 ,
in_file_id_volatile ) ; /* file id (volatile) */
SIVAL ( outbody . data , 0x18 ,
out_input_offset ) ; /* input offset */
2009-06-05 17:32:58 +02:00
SIVAL ( outbody . data , 0x1C , 0 ) ; /* input count */
SIVAL ( outbody . data , 0x20 ,
out_output_offset ) ; /* output offset */
SIVAL ( outbody . data , 0x24 ,
out_output_buffer . length ) ; /* output count */
SIVAL ( outbody . data , 0x28 , 0 ) ; /* flags */
SIVAL ( outbody . data , 0x2C , 0 ) ; /* reserved */
/*
2009-06-06 10:25:10 +02:00
* Note : Windows Vista and 2008 send back also the
* input from the request . But it was fixed in
* Windows 7.
2009-06-05 17:32:58 +02:00
*/
outdyn = out_output_buffer ;
2009-06-05 20:14:17 +02:00
error = smbd_smb2_request_done_ex ( req , status , outbody , & outdyn ,
__location__ ) ;
2009-06-05 17:32:58 +02:00
if ( ! NT_STATUS_IS_OK ( error ) ) {
smbd_server_connection_terminate ( req - > conn ,
nt_errstr ( error ) ) ;
return ;
}
}
struct smbd_smb2_ioctl_state {
struct smbd_smb2_request * smb2req ;
struct smb_request * smbreq ;
files_struct * fsp ;
DATA_BLOB in_input ;
uint32_t in_max_output ;
DATA_BLOB out_output ;
} ;
2009-06-05 17:48:28 +02:00
static void smbd_smb2_ioctl_pipe_write_done ( struct tevent_req * subreq ) ;
static void smbd_smb2_ioctl_pipe_read_done ( struct tevent_req * subreq ) ;
2009-06-05 17:32:58 +02:00
static struct tevent_req * smbd_smb2_ioctl_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
uint32_t in_ctl_code ,
uint64_t in_file_id_volatile ,
DATA_BLOB in_input ,
uint32_t in_max_output ,
uint32_t in_flags )
{
struct tevent_req * req ;
struct smbd_smb2_ioctl_state * state ;
struct smb_request * smbreq ;
files_struct * fsp = NULL ;
struct tevent_req * subreq ;
req = tevent_req_create ( mem_ctx , & state ,
struct smbd_smb2_ioctl_state ) ;
if ( req = = NULL ) {
return NULL ;
}
state - > smb2req = smb2req ;
state - > smbreq = NULL ;
state - > fsp = NULL ;
state - > in_input = in_input ;
state - > in_max_output = in_max_output ;
state - > out_output = data_blob_null ;
DEBUG ( 10 , ( " smbd_smb2_ioctl: file_id[0x%016llX] \n " ,
( unsigned long long ) in_file_id_volatile ) ) ;
smbreq = smbd_smb2_fake_smb_request ( smb2req ) ;
if ( tevent_req_nomem ( smbreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
state - > smbreq = smbreq ;
if ( in_file_id_volatile ! = UINT64_MAX ) {
fsp = file_fsp ( smbreq , ( uint16_t ) in_file_id_volatile ) ;
if ( fsp = = NULL ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
if ( smbreq - > conn ! = fsp - > conn ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
if ( smb2req - > session - > vuid ! = fsp - > vuid ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
state - > fsp = fsp ;
}
switch ( in_ctl_code ) {
2009-06-05 18:38:20 +02:00
case 0x00060194 : /* FSCTL_DFS_GET_REFERRALS */
{
uint16_t in_max_referral_level ;
DATA_BLOB in_file_name_buffer ;
char * in_file_name_string ;
size_t in_file_name_string_size ;
bool ok ;
bool overflow = false ;
NTSTATUS status ;
int dfs_size ;
char * dfs_data = NULL ;
if ( ! IS_IPC ( smbreq - > conn ) ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_DEVICE_REQUEST ) ;
return tevent_req_post ( req , ev ) ;
}
if ( ! lp_host_msdfs ( ) ) {
tevent_req_nterror ( req , NT_STATUS_FS_DRIVER_REQUIRED ) ;
return tevent_req_post ( req , ev ) ;
}
if ( in_input . length < ( 2 + 2 ) ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_PARAMETER ) ;
return tevent_req_post ( req , ev ) ;
}
in_max_referral_level = SVAL ( in_input . data , 0 ) ;
in_file_name_buffer . data = in_input . data + 2 ;
in_file_name_buffer . length = in_input . length - 2 ;
ok = convert_string_talloc ( state , CH_UTF16 , CH_UNIX ,
in_file_name_buffer . data ,
in_file_name_buffer . length ,
& in_file_name_string ,
& in_file_name_string_size , false ) ;
if ( ! ok ) {
tevent_req_nterror ( req , NT_STATUS_ILLEGAL_CHARACTER ) ;
return tevent_req_post ( req , ev ) ;
}
dfs_size = setup_dfs_referral ( smbreq - > conn ,
in_file_name_string ,
in_max_referral_level ,
& dfs_data , & status ) ;
if ( dfs_size < 0 ) {
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
if ( dfs_size > in_max_output ) {
/*
* TODO : we need a testsuite for this
*/
overflow = true ;
dfs_size = in_max_output ;
}
state - > out_output = data_blob_talloc ( state ,
( uint8_t * ) dfs_data ,
dfs_size ) ;
SAFE_FREE ( dfs_data ) ;
if ( dfs_size > 0 & &
tevent_req_nomem ( state - > out_output . data , req ) ) {
return tevent_req_post ( req , ev ) ;
}
if ( overflow ) {
2009-06-05 21:04:37 +02:00
tevent_req_nterror ( req , STATUS_BUFFER_OVERFLOW ) ;
2009-06-05 18:38:20 +02:00
} else {
tevent_req_done ( req ) ;
}
return tevent_req_post ( req , ev ) ;
}
2009-06-05 17:48:28 +02:00
case 0x0011C017 : /* FSCTL_PIPE_TRANSCEIVE */
if ( ! IS_IPC ( smbreq - > conn ) ) {
2009-06-06 10:36:42 +02:00
tevent_req_nterror ( req , NT_STATUS_NOT_SUPPORTED ) ;
2009-06-05 17:48:28 +02:00
return tevent_req_post ( req , ev ) ;
}
if ( fsp = = NULL ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
if ( ! fsp_is_np ( fsp ) ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
subreq = np_write_send ( state , ev ,
fsp - > fake_file_handle ,
in_input . data ,
in_input . length ) ;
if ( tevent_req_nomem ( subreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
tevent_req_set_callback ( subreq ,
smbd_smb2_ioctl_pipe_write_done ,
req ) ;
return req ;
2009-06-05 17:32:58 +02:00
default :
if ( IS_IPC ( smbreq - > conn ) ) {
tevent_req_nterror ( req , NT_STATUS_FS_DRIVER_REQUIRED ) ;
return tevent_req_post ( req , ev ) ;
}
tevent_req_nterror ( req , NT_STATUS_INVALID_DEVICE_REQUEST ) ;
return tevent_req_post ( req , ev ) ;
}
tevent_req_nterror ( req , NT_STATUS_INTERNAL_ERROR ) ;
return tevent_req_post ( req , ev ) ;
}
2009-06-05 17:48:28 +02:00
static void smbd_smb2_ioctl_pipe_write_done ( struct tevent_req * subreq )
{
struct tevent_req * req = tevent_req_callback_data ( subreq ,
struct tevent_req ) ;
struct smbd_smb2_ioctl_state * state = tevent_req_data ( req ,
struct smbd_smb2_ioctl_state ) ;
NTSTATUS status ;
ssize_t nwritten = - 1 ;
status = np_write_recv ( subreq , & nwritten ) ;
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
tevent_req_nterror ( req , status ) ;
return ;
}
if ( nwritten ! = state - > in_input . length ) {
tevent_req_nterror ( req , NT_STATUS_PIPE_NOT_AVAILABLE ) ;
return ;
}
state - > out_output = data_blob_talloc ( state , NULL , state - > in_max_output ) ;
if ( state - > in_max_output > 0 & &
tevent_req_nomem ( state - > out_output . data , req ) ) {
return ;
}
subreq = np_read_send ( state - > smbreq - > conn ,
state - > smb2req - > conn - > smb2 . event_ctx ,
state - > fsp - > fake_file_handle ,
state - > out_output . data ,
state - > out_output . length ) ;
if ( tevent_req_nomem ( subreq , req ) ) {
return ;
}
tevent_req_set_callback ( subreq , smbd_smb2_ioctl_pipe_read_done , req ) ;
}
static void smbd_smb2_ioctl_pipe_read_done ( struct tevent_req * subreq )
{
struct tevent_req * req = tevent_req_callback_data ( subreq ,
struct tevent_req ) ;
struct smbd_smb2_ioctl_state * state = tevent_req_data ( req ,
struct smbd_smb2_ioctl_state ) ;
NTSTATUS status ;
ssize_t nread ;
bool is_data_outstanding ;
status = np_read_recv ( subreq , & nread , & is_data_outstanding ) ;
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
tevent_req_nterror ( req , status ) ;
return ;
}
state - > out_output . length = nread ;
tevent_req_done ( req ) ;
}
2009-06-05 17:32:58 +02:00
static NTSTATUS smbd_smb2_ioctl_recv ( struct tevent_req * req ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * out_output )
{
NTSTATUS status ;
struct smbd_smb2_ioctl_state * state = tevent_req_data ( req ,
struct smbd_smb2_ioctl_state ) ;
if ( tevent_req_is_nterror ( req , & status ) ) {
2009-06-05 20:14:17 +02:00
if ( ! NT_STATUS_EQUAL ( status , STATUS_BUFFER_OVERFLOW ) ) {
tevent_req_received ( req ) ;
return status ;
}
2009-06-05 17:32:58 +02:00
}
* out_output = state - > out_output ;
talloc_steal ( mem_ctx , out_output - > data ) ;
tevent_req_received ( req ) ;
2009-06-05 20:14:17 +02:00
return status ;
2009-06-05 17:32:58 +02:00
}