mirror of
https://github.com/samba-team/samba.git
synced 2025-02-01 05:47:28 +03:00
5b929860e2
We need to detach dcesrv_iface_state from dcesrv_assoc_group, if dcesrv_assoc_group is free'ed first. ==381007==ERROR: AddressSanitizer: heap-use-after-free on address 0x50d000004f80 at pc 0x7f15fc12e0ac bp 0x7ffe43267780 sp 0x7ffe43267778 READ of size 8 at 0x50d000004f80 thread T0 #0 0x7f15fc12e0ab in dcesrv_iface_state_destructor ../../librpc/rpc/dcesrv_handles.c:166 #1 0x7f15fc0f7d76 in _tc_free_internal ../../lib/talloc/talloc.c:1158 #2 0x7f15fc0f7acd in _tc_free_children_internal ../../lib/talloc/talloc.c:1669 #3 0x7f15fc0f7acd in _tc_free_internal ../../lib/talloc/talloc.c:1184 #4 0x7f15fc0f7acd in _tc_free_children_internal ../../lib/talloc/talloc.c:1669 #5 0x7f15fc0f7acd in _tc_free_internal ../../lib/talloc/talloc.c:1184 #6 0x7f15fc0f7acd in _tc_free_children_internal ../../lib/talloc/talloc.c:1669 #7 0x7f15fc0f7acd in _tc_free_internal ../../lib/talloc/talloc.c:1184 #8 0x7f15fc0f924c in _talloc_free_internal ../../lib/talloc/talloc.c:1248 #9 0x7f15fc0f924c in _talloc_free ../../lib/talloc/talloc.c:1792 #10 0x7f15fadac024 in ncacn_terminate_connection ../../source3/rpc_server/rpc_server.c:263 #11 0x7f15fadac024 in dcesrv_transport_terminate_connection ../../source3/rpc_server/rpc_server.c:251 #12 0x7f15fc11e5ef in dcesrv_terminate_connection ../../librpc/rpc/dcesrv_core.c:2968 #13 0x7f15fc125446 in dcesrv_read_fragment_done ../../librpc/rpc/dcesrv_core.c:3196 #14 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #15 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #16 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #17 0x7f15fb4f69a1 in _tevent_req_nterror ../../lib/util/tevent_ntstatus.c:46 #18 0x7f15fabda2f4 in dcerpc_read_ncacn_packet_done ../../librpc/rpc/dcerpc_util.c:612 #19 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #20 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #21 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #22 0x7f15fbff4228 in tstream_readv_pdu_readv_done ../../lib/tsocket/tsocket_helpers.c:313 #23 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #24 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #25 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #26 0x7f15fbff1800 in tstream_readv_done ../../lib/tsocket/tsocket.c:593 #27 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #28 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #29 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #30 0x7f15fadbc1a3 in tstream_npa_readv_msg_mode_handler ../../libcli/named_pipe_auth/npa_tstream.c:697 #31 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #32 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #33 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #34 0x7f15fbff4228 in tstream_readv_pdu_readv_done ../../lib/tsocket/tsocket_helpers.c:313 #35 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #36 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #37 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #38 0x7f15fbff1800 in tstream_readv_done ../../lib/tsocket/tsocket.c:593 #39 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #40 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #41 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #42 0x7f15fbff9691 in tstream_bsd_readv_handler ../../lib/tsocket/tsocket_bsd.c:2080 #43 0x7f15fbff6f85 in tstream_bsd_fde_handler ../../lib/tsocket/tsocket_bsd.c:1764 #44 0x7f15fb7d9ac1 in tevent_common_invoke_fd_handler ../../lib/tevent/tevent_fd.c:174 #45 0x7f15fb7ef185 in epoll_event_loop ../../lib/tevent/tevent_epoll.c:696 #46 0x7f15fb7ef185 in epoll_event_loop_once ../../lib/tevent/tevent_epoll.c:926 #47 0x7f15fb7e77b8 in std_event_loop_once ../../lib/tevent/tevent_standard.c:110 #48 0x7f15fb7d7549 in _tevent_loop_once ../../lib/tevent/tevent.c:820 #49 0x7f15fc936b7c in rpc_worker_main ../../source3/rpc_server/rpc_worker.c:1249 #50 0x5632ae1e1ec3 in main ../../source3/rpc_server/rpcd_lsad.c:132 #51 0x7f15f7c2a2ad in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #52 0x7f15f7c2a378 in __libc_start_main_impl ../csu/libc-start.c:360 #53 0x5632ae162e64 in _start ../sysdeps/x86_64/start.S:115 0x50d000004f80 is located 112 bytes inside of 136-byte region [0x50d000004f10,0x50d000004f98) freed by thread T0 here: #0 0x7f15fcefb418 in free ../../../../libsanitizer/asan/asan_malloc_linux.cpp:52 #1 0x7f15fc0f857d in _tc_free_internal ../../lib/talloc/talloc.c:1222 #2 0x7f15fc0f8d0f in _talloc_free_internal ../../lib/talloc/talloc.c:1248 #3 0x7f15fc0f8d0f in talloc_unlink ../../lib/talloc/talloc.c:1473 #4 0x7f15fc934580 in rpc_worker_connection_terminated ../../source3/rpc_server/rpc_worker.c:143 #5 0x7f15fc9310bd in dcesrv_connection_destructor ../../source3/rpc_server/rpc_worker.c:175 #6 0x7f15fc0f7d76 in _tc_free_internal ../../lib/talloc/talloc.c:1158 #7 0x7f15fc0f7acd in _tc_free_children_internal ../../lib/talloc/talloc.c:1669 #8 0x7f15fc0f7acd in _tc_free_internal ../../lib/talloc/talloc.c:1184 #9 0x7f15fc0f924c in _talloc_free_internal ../../lib/talloc/talloc.c:1248 #10 0x7f15fc0f924c in _talloc_free ../../lib/talloc/talloc.c:1792 #11 0x7f15fadac024 in ncacn_terminate_connection ../../source3/rpc_server/rpc_server.c:263 #12 0x7f15fadac024 in dcesrv_transport_terminate_connection ../../source3/rpc_server/rpc_server.c:251 #13 0x7f15fc11e5ef in dcesrv_terminate_connection ../../librpc/rpc/dcesrv_core.c:2968 #14 0x7f15fc125446 in dcesrv_read_fragment_done ../../librpc/rpc/dcesrv_core.c:3196 #15 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #16 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #17 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #18 0x7f15fb4f69a1 in _tevent_req_nterror ../../lib/util/tevent_ntstatus.c:46 #19 0x7f15fabda2f4 in dcerpc_read_ncacn_packet_done ../../librpc/rpc/dcerpc_util.c:612 #20 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #21 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #22 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #23 0x7f15fbff4228 in tstream_readv_pdu_readv_done ../../lib/tsocket/tsocket_helpers.c:313 #24 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #25 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #26 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #27 0x7f15fbff1800 in tstream_readv_done ../../lib/tsocket/tsocket.c:593 #28 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #29 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 #30 0x7f15fb7dcdb7 in _tevent_req_error ../../lib/tevent/tevent_req.c:252 #31 0x7f15fadbc1a3 in tstream_npa_readv_msg_mode_handler ../../libcli/named_pipe_auth/npa_tstream.c:697 #32 0x7f15fb7dcae5 in _tevent_req_notify_callback ../../lib/tevent/tevent_req.c:177 #33 0x7f15fb7dcd1c in tevent_req_finish ../../lib/tevent/tevent_req.c:234 previously allocated by thread T0 here: #0 0x7f15fcefc777 in malloc ../../../../libsanitizer/asan/asan_malloc_linux.cpp:69 #1 0x7f15fc0fbc57 in __talloc_with_prefix ../../lib/talloc/talloc.c:783 #2 0x7f15fc0fd8cf in __talloc ../../lib/talloc/talloc.c:825 #3 0x7f15fc0fd8cf in _talloc_named_const ../../lib/talloc/talloc.c:982 #4 0x7f15fc0fd8cf in _talloc_zero ../../lib/talloc/talloc.c:2421 #5 0x7f15fc93156e in rpc_worker_assoc_group_new ../../source3/rpc_server/rpc_worker.c:681 #6 0x7f15fc93156e in rpc_worker_assoc_group_find ../../source3/rpc_server/rpc_worker.c:730 #7 0x7f15fc120a18 in dcesrv_bind ../../librpc/rpc/dcesrv_core.c:1158 #8 0x7f15fc120a18 in dcesrv_process_ncacn_packet ../../librpc/rpc/dcesrv_core.c:2324 #9 0x7f15fc120a18 in dcesrv_loop_next_packet ../../librpc/rpc/dcesrv_core.c:3222 #10 0x7f15fc933722 in rpc_worker_new_client ../../source3/rpc_server/rpc_worker.c:489 #11 0x7f15fc933722 in rpc_worker_new_client_filter ../../source3/rpc_server/rpc_worker.c:558 #12 0x7f15fbef95ca in messaging_dispatch_waiters ../../source3/lib/messages.c:1343 #13 0x7f15fbefb589 in messaging_dispatch_rec ../../source3/lib/messages.c:1371 #14 0x7f15fbefb589 in messaging_recv_cb ../../source3/lib/messages.c:431 #15 0x7f15faddba9e in msg_dgm_ref_recv ../../lib/messaging/messages_dgm_ref.c:144 #16 0x7f15fadd6cc3 in messaging_dgm_recv ../../lib/messaging/messages_dgm.c:1426 #17 0x7f15fadd7618 in messaging_dgm_read_handler ../../lib/messaging/messages_dgm.c:1316 #18 0x7f15fb7d9ac1 in tevent_common_invoke_fd_handler ../../lib/tevent/tevent_fd.c:174 #19 0x7f15fb7ef185 in epoll_event_loop ../../lib/tevent/tevent_epoll.c:696 #20 0x7f15fb7ef185 in epoll_event_loop_once ../../lib/tevent/tevent_epoll.c:926 #21 0x7f15fb7e77b8 in std_event_loop_once ../../lib/tevent/tevent_standard.c:110 #22 0x7f15fb7d7549 in _tevent_loop_once ../../lib/tevent/tevent.c:820 #23 0x7f15fc936b7c in rpc_worker_main ../../source3/rpc_server/rpc_worker.c:1249 #24 0x5632ae1e1ec3 in main ../../source3/rpc_server/rpcd_lsad.c:132 #25 0x7f15f7c2a2ad in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 BUG: https://bugzilla.samba.org/show_bug.cgi?id=15765 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Andreas Schneider <asn@samba.org>
388 lines
9.1 KiB
C
388 lines
9.1 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
server side dcerpc handle code
|
|
|
|
Copyright (C) Andrew Tridgell 2003
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "lib/util/dlinklist.h"
|
|
#include "rpc_server/dcerpc_server.h"
|
|
#include "libcli/security/security.h"
|
|
#include "librpc/gen_ndr/auth.h"
|
|
|
|
/*
|
|
destroy a rpc handle
|
|
*/
|
|
static int dcesrv_handle_destructor(struct dcesrv_handle *h)
|
|
{
|
|
DLIST_REMOVE(h->assoc_group->handles, h);
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*
|
|
allocate a new rpc handle
|
|
*/
|
|
_PUBLIC_
|
|
struct dcesrv_handle *dcesrv_handle_create(struct dcesrv_call_state *call,
|
|
uint8_t handle_type)
|
|
{
|
|
struct dcesrv_connection_context *context = call->context;
|
|
struct auth_session_info *session_info =
|
|
dcesrv_call_session_info(call);
|
|
struct dcesrv_handle *h;
|
|
struct dom_sid *sid;
|
|
|
|
/*
|
|
* For simplicity, ensure we abort here for an interface that
|
|
* has no handles (programmer error)
|
|
*/
|
|
SMB_ASSERT((context->iface->flags & DCESRV_INTERFACE_FLAGS_HANDLES_NOT_USED) == 0);
|
|
|
|
sid = &session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
|
|
|
|
h = talloc_zero(context->conn->assoc_group, struct dcesrv_handle);
|
|
if (!h) {
|
|
return NULL;
|
|
}
|
|
h->data = NULL;
|
|
sid_copy(&h->sid, sid);
|
|
h->min_auth_level = call->auth_state->auth_level;
|
|
h->assoc_group = context->conn->assoc_group;
|
|
h->iface = context->iface;
|
|
h->wire_handle.handle_type = handle_type;
|
|
h->wire_handle.uuid = GUID_random();
|
|
|
|
DLIST_ADD(context->conn->assoc_group->handles, h);
|
|
|
|
talloc_set_destructor(h, dcesrv_handle_destructor);
|
|
|
|
return h;
|
|
}
|
|
|
|
/**
|
|
find an internal handle given a wire handle. If the wire handle is NULL then
|
|
allocate a new handle
|
|
*/
|
|
|
|
_PUBLIC_
|
|
struct dcesrv_handle *dcesrv_handle_lookup(struct dcesrv_call_state *call,
|
|
const struct policy_handle *p,
|
|
uint8_t handle_type)
|
|
{
|
|
struct dcesrv_connection_context *context = call->context;
|
|
struct auth_session_info *session_info =
|
|
dcesrv_call_session_info(call);
|
|
struct dcesrv_handle *h;
|
|
struct dom_sid *sid;
|
|
|
|
/*
|
|
* For simplicity, ensure we abort here for an interface that
|
|
* has no handles (programmer error)
|
|
*/
|
|
SMB_ASSERT((context->iface->flags & DCESRV_INTERFACE_FLAGS_HANDLES_NOT_USED) == 0);
|
|
|
|
sid = &session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
|
|
|
|
if (ndr_policy_handle_empty(p)) {
|
|
/* TODO: we should probably return a NULL handle here */
|
|
return dcesrv_handle_create(call, handle_type);
|
|
}
|
|
|
|
if (handle_type != DCESRV_HANDLE_ANY &&
|
|
p->handle_type != handle_type) {
|
|
DBG_WARNING("client gave us the wrong handle type "
|
|
"(%"PRIu32" should be %"PRIu8")\n",
|
|
p->handle_type,
|
|
handle_type);
|
|
return NULL;
|
|
}
|
|
|
|
for (h=context->conn->assoc_group->handles; h; h=h->next) {
|
|
if (h->wire_handle.handle_type == p->handle_type &&
|
|
GUID_equal(&p->uuid, &h->wire_handle.uuid)) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (h == NULL) {
|
|
/* not found */
|
|
return NULL;
|
|
}
|
|
|
|
if (!dom_sid_equal(&h->sid, sid)) {
|
|
struct dom_sid_buf buf1, buf2;
|
|
DBG_ERR("Attempt to use invalid sid %s - %s\n",
|
|
dom_sid_str_buf(&h->sid, &buf1),
|
|
dom_sid_str_buf(sid, &buf2));
|
|
return NULL;
|
|
}
|
|
|
|
if (call->auth_state->auth_level < h->min_auth_level) {
|
|
DBG_ERR("Attempt to use invalid auth_level %u < %u\n",
|
|
call->auth_state->auth_level,
|
|
h->min_auth_level);
|
|
return NULL;
|
|
}
|
|
|
|
if (h->iface != context->iface) {
|
|
DBG_ERR("Attempt to use invalid iface\n");
|
|
return NULL;
|
|
}
|
|
|
|
return h;
|
|
}
|
|
|
|
struct dcesrv_iface_state {
|
|
struct dcesrv_iface_state *prev, *next;
|
|
struct dcesrv_assoc_group *assoc;
|
|
const struct dcesrv_interface *iface;
|
|
struct dom_sid owner;
|
|
const struct dcesrv_connection *conn;
|
|
const struct dcesrv_auth *auth;
|
|
const struct dcesrv_connection_context *pres;
|
|
uint64_t magic;
|
|
void *ptr;
|
|
const char *location;
|
|
};
|
|
|
|
static int dcesrv_iface_state_destructor(struct dcesrv_iface_state *istate)
|
|
{
|
|
if (istate->assoc != NULL) {
|
|
DLIST_REMOVE(istate->assoc->iface_states, istate);
|
|
istate->assoc = NULL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void dcesrv_assoc_group_common_destructor(struct dcesrv_assoc_group *assoc_group)
|
|
{
|
|
struct dcesrv_iface_state *cur = NULL;
|
|
struct dcesrv_iface_state *next = NULL;
|
|
|
|
for (cur = assoc_group->iface_states; cur != NULL; cur = next) {
|
|
next = cur->next;
|
|
cur->assoc = NULL;
|
|
DLIST_REMOVE(assoc_group->iface_states, cur);
|
|
}
|
|
}
|
|
|
|
static void *dcesrv_iface_state_find(struct dcesrv_assoc_group *assoc,
|
|
const struct dcesrv_interface *iface,
|
|
const struct dom_sid *owner,
|
|
const struct dcesrv_connection *conn,
|
|
const struct dcesrv_auth *auth,
|
|
const struct dcesrv_connection_context *pres,
|
|
uint64_t magic,
|
|
const void *ptr)
|
|
{
|
|
struct dcesrv_iface_state *cur = NULL;
|
|
|
|
for (cur = assoc->iface_states; cur != NULL; cur = cur->next) {
|
|
bool match;
|
|
|
|
SMB_ASSERT(cur->assoc == assoc);
|
|
|
|
if (cur->ptr == ptr) {
|
|
return cur->ptr;
|
|
}
|
|
|
|
if (cur->iface != iface) {
|
|
continue;
|
|
}
|
|
|
|
match = dom_sid_equal(&cur->owner, owner);
|
|
if (!match) {
|
|
continue;
|
|
}
|
|
|
|
if (cur->conn != conn) {
|
|
continue;
|
|
}
|
|
|
|
if (cur->auth != auth) {
|
|
continue;
|
|
}
|
|
|
|
if (cur->pres != pres) {
|
|
continue;
|
|
}
|
|
|
|
if (cur->magic != magic) {
|
|
continue;
|
|
}
|
|
|
|
return cur->ptr;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static NTSTATUS dcesrv_iface_state_store(struct dcesrv_assoc_group *assoc,
|
|
const struct dcesrv_interface *iface,
|
|
const struct dom_sid *owner,
|
|
const struct dcesrv_connection *conn,
|
|
const struct dcesrv_auth *auth,
|
|
const struct dcesrv_connection_context *pres,
|
|
uint64_t magic,
|
|
TALLOC_CTX *mem_ctx,
|
|
void *ptr,
|
|
const char *location)
|
|
{
|
|
struct dcesrv_iface_state *istate = NULL;
|
|
void *optr = NULL;
|
|
|
|
optr = dcesrv_iface_state_find(assoc,
|
|
iface,
|
|
owner,
|
|
conn,
|
|
auth,
|
|
pres,
|
|
magic,
|
|
ptr);
|
|
if (optr != NULL) {
|
|
return NT_STATUS_OBJECTID_EXISTS;
|
|
}
|
|
|
|
istate = talloc_zero(ptr, struct dcesrv_iface_state);
|
|
if (istate == NULL) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
*istate = (struct dcesrv_iface_state) {
|
|
.assoc = assoc,
|
|
.iface = iface,
|
|
.owner = *owner,
|
|
.conn = conn,
|
|
.auth = auth,
|
|
.pres = pres,
|
|
.magic = magic,
|
|
.location = location,
|
|
};
|
|
|
|
istate->ptr = talloc_steal(mem_ctx, ptr);
|
|
|
|
talloc_set_destructor(istate, dcesrv_iface_state_destructor);
|
|
|
|
DLIST_ADD_END(assoc->iface_states, istate);
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
NTSTATUS _dcesrv_iface_state_store_assoc(struct dcesrv_call_state *call,
|
|
uint64_t magic,
|
|
void *ptr,
|
|
const char *location)
|
|
{
|
|
struct auth_session_info *session_info =
|
|
dcesrv_call_session_info(call);
|
|
const struct dom_sid *owner =
|
|
&session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
|
|
NTSTATUS status;
|
|
|
|
status = dcesrv_iface_state_store(call->conn->assoc_group,
|
|
call->context->iface,
|
|
owner,
|
|
NULL, /* conn */
|
|
NULL, /* auth */
|
|
NULL, /* pres */
|
|
magic,
|
|
call->conn->assoc_group, /* mem_ctx */
|
|
ptr,
|
|
location);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
void *_dcesrv_iface_state_find_assoc(struct dcesrv_call_state *call, uint64_t magic)
|
|
{
|
|
struct auth_session_info *session_info =
|
|
dcesrv_call_session_info(call);
|
|
const struct dom_sid *owner =
|
|
&session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
|
|
void *ptr = NULL;
|
|
|
|
ptr = dcesrv_iface_state_find(call->conn->assoc_group,
|
|
call->context->iface,
|
|
owner,
|
|
NULL, /* conn */
|
|
NULL, /* auth */
|
|
NULL, /* pres */
|
|
magic,
|
|
NULL); /* ptr */
|
|
if (ptr == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
return ptr;
|
|
}
|
|
|
|
NTSTATUS _dcesrv_iface_state_store_conn(struct dcesrv_call_state *call,
|
|
uint64_t magic,
|
|
void *ptr,
|
|
const char *location)
|
|
{
|
|
struct auth_session_info *session_info =
|
|
dcesrv_call_session_info(call);
|
|
const struct dom_sid *owner =
|
|
&session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
|
|
NTSTATUS status;
|
|
|
|
status = dcesrv_iface_state_store(call->conn->assoc_group,
|
|
call->context->iface,
|
|
owner,
|
|
call->conn,
|
|
call->auth_state,
|
|
call->context,
|
|
magic,
|
|
call->conn, /* mem_ctx */
|
|
ptr,
|
|
location);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
void *_dcesrv_iface_state_find_conn(struct dcesrv_call_state *call, uint64_t magic)
|
|
{
|
|
struct auth_session_info *session_info =
|
|
dcesrv_call_session_info(call);
|
|
const struct dom_sid *owner =
|
|
&session_info->security_token->sids[PRIMARY_USER_SID_INDEX];
|
|
void *ptr = NULL;
|
|
|
|
ptr = dcesrv_iface_state_find(call->conn->assoc_group,
|
|
call->context->iface,
|
|
owner,
|
|
call->conn,
|
|
call->auth_state,
|
|
call->context,
|
|
magic,
|
|
NULL); /* ptr */
|
|
if (ptr == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
return ptr;
|
|
}
|