mirror of
https://github.com/samba-team/samba.git
synced 2024-12-24 21:34:56 +03:00
10d753868e
This was broken by c7a9e0e4cd
.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14679
CI: https://gitlab.com/samba-team/samba/-/merge_requests/1875
Signed-off-by: Ralph Boehme <slow@samba.org>
Reviewed-by: Jeremy Allison <jra@amba.org>
Autobuild-User(master): Ralph Böhme <slow@samba.org>
Autobuild-Date(master): Wed Mar 31 06:13:39 UTC 2021 on sn-devel-184
632 lines
16 KiB
C
632 lines
16 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
Core SMB2 server
|
|
|
|
Copyright (C) Stefan Metzmacher 2009
|
|
Copyright (C) Jeremy Allison 2010
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "locking/share_mode_lock.h"
|
|
#include "smbd/smbd.h"
|
|
#include "smbd/globals.h"
|
|
#include "../libcli/smb/smb_common.h"
|
|
#include "trans2.h"
|
|
#include "../lib/util/tevent_ntstatus.h"
|
|
#include "../librpc/gen_ndr/open_files.h"
|
|
#include "source3/lib/dbwrap/dbwrap_watch.h"
|
|
#include "messages.h"
|
|
#include "librpc/gen_ndr/ndr_quota.h"
|
|
|
|
#undef DBGC_CLASS
|
|
#define DBGC_CLASS DBGC_SMB2
|
|
|
|
static struct tevent_req *smbd_smb2_setinfo_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct smbd_smb2_request *smb2req,
|
|
struct files_struct *in_fsp,
|
|
uint8_t in_info_type,
|
|
uint8_t in_file_info_class,
|
|
DATA_BLOB in_input_buffer,
|
|
uint32_t in_additional_information);
|
|
static NTSTATUS smbd_smb2_setinfo_recv(struct tevent_req *req);
|
|
|
|
static void smbd_smb2_request_setinfo_done(struct tevent_req *subreq);
|
|
NTSTATUS smbd_smb2_request_process_setinfo(struct smbd_smb2_request *req)
|
|
{
|
|
struct smbXsrv_connection *xconn = req->xconn;
|
|
NTSTATUS status;
|
|
const uint8_t *inbody;
|
|
uint8_t in_info_type;
|
|
uint8_t in_file_info_class;
|
|
uint16_t in_input_buffer_offset;
|
|
uint32_t in_input_buffer_length;
|
|
DATA_BLOB in_input_buffer;
|
|
uint32_t in_additional_information;
|
|
uint64_t in_file_id_persistent;
|
|
uint64_t in_file_id_volatile;
|
|
struct files_struct *in_fsp;
|
|
struct tevent_req *subreq;
|
|
|
|
status = smbd_smb2_request_verify_sizes(req, 0x21);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return smbd_smb2_request_error(req, status);
|
|
}
|
|
inbody = SMBD_SMB2_IN_BODY_PTR(req);
|
|
|
|
in_info_type = CVAL(inbody, 0x02);
|
|
in_file_info_class = CVAL(inbody, 0x03);
|
|
in_input_buffer_length = IVAL(inbody, 0x04);
|
|
in_input_buffer_offset = SVAL(inbody, 0x08);
|
|
/* 0x0A 2 bytes reserved */
|
|
in_additional_information = IVAL(inbody, 0x0C);
|
|
in_file_id_persistent = BVAL(inbody, 0x10);
|
|
in_file_id_volatile = BVAL(inbody, 0x18);
|
|
|
|
if (in_input_buffer_offset == 0 && in_input_buffer_length == 0) {
|
|
/* This is ok */
|
|
} else if (in_input_buffer_offset !=
|
|
(SMB2_HDR_BODY + SMBD_SMB2_IN_BODY_LEN(req))) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
|
|
}
|
|
|
|
if (in_input_buffer_length > SMBD_SMB2_IN_DYN_LEN(req)) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
|
|
}
|
|
|
|
in_input_buffer.data = SMBD_SMB2_IN_DYN_PTR(req);
|
|
in_input_buffer.length = in_input_buffer_length;
|
|
|
|
if (in_input_buffer.length > xconn->smb2.server.max_trans) {
|
|
DEBUG(2,("smbd_smb2_request_process_setinfo: "
|
|
"client ignored max trans: %s: 0x%08X: 0x%08X\n",
|
|
__location__, (unsigned)in_input_buffer.length,
|
|
(unsigned)xconn->smb2.server.max_trans));
|
|
return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
|
|
}
|
|
|
|
status = smbd_smb2_request_verify_creditcharge(req,
|
|
in_input_buffer.length);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return smbd_smb2_request_error(req, status);
|
|
}
|
|
|
|
in_fsp = file_fsp_smb2(req, in_file_id_persistent, in_file_id_volatile);
|
|
if (in_fsp == NULL) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
|
|
}
|
|
|
|
subreq = smbd_smb2_setinfo_send(req, req->sconn->ev_ctx,
|
|
req, in_fsp,
|
|
in_info_type,
|
|
in_file_info_class,
|
|
in_input_buffer,
|
|
in_additional_information);
|
|
if (subreq == NULL) {
|
|
return smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
|
|
}
|
|
tevent_req_set_callback(subreq, smbd_smb2_request_setinfo_done, req);
|
|
|
|
return smbd_smb2_request_pending_queue(req, subreq, 500);
|
|
}
|
|
|
|
static void smbd_smb2_request_setinfo_done(struct tevent_req *subreq)
|
|
{
|
|
struct smbd_smb2_request *req = tevent_req_callback_data(subreq,
|
|
struct smbd_smb2_request);
|
|
DATA_BLOB outbody;
|
|
NTSTATUS status;
|
|
NTSTATUS error; /* transport error */
|
|
|
|
status = smbd_smb2_setinfo_recv(subreq);
|
|
TALLOC_FREE(subreq);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
error = smbd_smb2_request_error(req, status);
|
|
if (!NT_STATUS_IS_OK(error)) {
|
|
smbd_server_connection_terminate(req->xconn,
|
|
nt_errstr(error));
|
|
return;
|
|
}
|
|
return;
|
|
}
|
|
|
|
outbody = smbd_smb2_generate_outbody(req, 0x02);
|
|
if (outbody.data == NULL) {
|
|
error = smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
|
|
if (!NT_STATUS_IS_OK(error)) {
|
|
smbd_server_connection_terminate(req->xconn,
|
|
nt_errstr(error));
|
|
return;
|
|
}
|
|
return;
|
|
}
|
|
|
|
SSVAL(outbody.data, 0x00, 0x02); /* struct size */
|
|
|
|
error = smbd_smb2_request_done(req, outbody, NULL);
|
|
if (!NT_STATUS_IS_OK(error)) {
|
|
smbd_server_connection_terminate(req->xconn,
|
|
nt_errstr(error));
|
|
return;
|
|
}
|
|
}
|
|
|
|
struct defer_rename_state {
|
|
struct tevent_req *req;
|
|
struct smbd_smb2_request *smb2req;
|
|
struct tevent_context *ev;
|
|
struct files_struct *fsp;
|
|
char *data;
|
|
int data_size;
|
|
};
|
|
|
|
static int defer_rename_state_destructor(struct defer_rename_state *rename_state)
|
|
{
|
|
SAFE_FREE(rename_state->data);
|
|
return 0;
|
|
}
|
|
|
|
static void defer_rename_done(struct tevent_req *subreq);
|
|
|
|
struct delay_rename_lease_break_state {
|
|
struct files_struct *fsp;
|
|
bool delay;
|
|
};
|
|
|
|
static bool delay_rename_lease_break_fn(
|
|
struct share_mode_entry *e,
|
|
void *private_data)
|
|
{
|
|
struct delay_rename_lease_break_state *state = private_data;
|
|
struct files_struct *fsp = state->fsp;
|
|
uint32_t e_lease_type, break_to;
|
|
bool ours, stale;
|
|
|
|
ours = smb2_lease_equal(fsp_client_guid(fsp),
|
|
&fsp->lease->lease.lease_key,
|
|
&e->client_guid,
|
|
&e->lease_key);
|
|
if (ours) {
|
|
return false;
|
|
}
|
|
|
|
e_lease_type = get_lease_type(e, fsp->file_id);
|
|
|
|
if ((e_lease_type & SMB2_LEASE_HANDLE) == 0) {
|
|
return false;
|
|
}
|
|
|
|
stale = share_entry_stale_pid(e);
|
|
if (stale) {
|
|
return false;
|
|
}
|
|
|
|
state->delay = true;
|
|
break_to = (e_lease_type & ~SMB2_LEASE_HANDLE);
|
|
|
|
send_break_message(
|
|
fsp->conn->sconn->msg_ctx, &fsp->file_id, e, break_to);
|
|
|
|
return false;
|
|
}
|
|
|
|
static struct tevent_req *delay_rename_for_lease_break(struct tevent_req *req,
|
|
struct smbd_smb2_request *smb2req,
|
|
struct tevent_context *ev,
|
|
struct files_struct *fsp,
|
|
struct share_mode_lock *lck,
|
|
char *data,
|
|
int data_size)
|
|
|
|
{
|
|
struct tevent_req *subreq;
|
|
struct defer_rename_state *rename_state;
|
|
struct delay_rename_lease_break_state state = { .fsp = fsp };
|
|
struct timeval timeout;
|
|
bool ok;
|
|
|
|
if (fsp->oplock_type != LEASE_OPLOCK) {
|
|
return NULL;
|
|
}
|
|
|
|
ok = share_mode_forall_leases(
|
|
lck, delay_rename_lease_break_fn, &state);
|
|
if (!ok) {
|
|
return NULL;
|
|
}
|
|
|
|
if (!state.delay) {
|
|
return NULL;
|
|
}
|
|
|
|
/* Setup a watch on this record. */
|
|
rename_state = talloc_zero(req, struct defer_rename_state);
|
|
if (rename_state == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
rename_state->req = req;
|
|
rename_state->smb2req = smb2req;
|
|
rename_state->ev = ev;
|
|
rename_state->fsp = fsp;
|
|
rename_state->data = data;
|
|
rename_state->data_size = data_size;
|
|
|
|
talloc_set_destructor(rename_state, defer_rename_state_destructor);
|
|
|
|
subreq = share_mode_watch_send(
|
|
rename_state,
|
|
ev,
|
|
lck,
|
|
(struct server_id){0});
|
|
|
|
if (subreq == NULL) {
|
|
exit_server("Could not watch share mode record for rename\n");
|
|
}
|
|
|
|
tevent_req_set_callback(subreq, defer_rename_done, rename_state);
|
|
|
|
timeout = timeval_set(OPLOCK_BREAK_TIMEOUT*2, 0);
|
|
if (!tevent_req_set_endtime(subreq,
|
|
ev,
|
|
timeval_sum(&smb2req->request_time, &timeout))) {
|
|
exit_server("Could not set rename timeout\n");
|
|
}
|
|
|
|
return subreq;
|
|
}
|
|
|
|
static void defer_rename_done(struct tevent_req *subreq)
|
|
{
|
|
struct defer_rename_state *state = tevent_req_callback_data(
|
|
subreq, struct defer_rename_state);
|
|
NTSTATUS status;
|
|
struct share_mode_lock *lck;
|
|
int ret_size = 0;
|
|
bool ok;
|
|
|
|
status = share_mode_watch_recv(subreq, NULL, NULL);
|
|
TALLOC_FREE(subreq);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
DEBUG(5, ("dbwrap_record_watch_recv returned %s\n",
|
|
nt_errstr(status)));
|
|
tevent_req_nterror(state->req, status);
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Make sure we run as the user again
|
|
*/
|
|
ok = change_to_user_and_service(
|
|
state->smb2req->tcon->compat,
|
|
state->smb2req->session->global->session_wire_id);
|
|
if (!ok) {
|
|
tevent_req_nterror(state->req, NT_STATUS_ACCESS_DENIED);
|
|
return;
|
|
}
|
|
|
|
/* Do we still need to wait ? */
|
|
lck = get_existing_share_mode_lock(state->req, state->fsp->file_id);
|
|
if (lck == NULL) {
|
|
tevent_req_nterror(state->req, NT_STATUS_UNSUCCESSFUL);
|
|
return;
|
|
}
|
|
subreq = delay_rename_for_lease_break(state->req,
|
|
state->smb2req,
|
|
state->ev,
|
|
state->fsp,
|
|
lck,
|
|
state->data,
|
|
state->data_size);
|
|
if (subreq) {
|
|
/* Yep - keep waiting. */
|
|
state->data = NULL;
|
|
TALLOC_FREE(state);
|
|
TALLOC_FREE(lck);
|
|
return;
|
|
}
|
|
|
|
/* Do the rename under the lock. */
|
|
status = smbd_do_setfilepathinfo(state->fsp->conn,
|
|
state->smb2req->smb1req,
|
|
state,
|
|
SMB2_FILE_RENAME_INFORMATION_INTERNAL,
|
|
state->fsp,
|
|
state->fsp->fsp_name,
|
|
&state->data,
|
|
state->data_size,
|
|
&ret_size);
|
|
|
|
TALLOC_FREE(lck);
|
|
SAFE_FREE(state->data);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
tevent_req_nterror(state->req, status);
|
|
return;
|
|
}
|
|
|
|
tevent_req_done(state->req);
|
|
}
|
|
|
|
struct smbd_smb2_setinfo_state {
|
|
struct smbd_smb2_request *smb2req;
|
|
};
|
|
|
|
static struct tevent_req *smbd_smb2_setinfo_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct smbd_smb2_request *smb2req,
|
|
struct files_struct *fsp,
|
|
uint8_t in_info_type,
|
|
uint8_t in_file_info_class,
|
|
DATA_BLOB in_input_buffer,
|
|
uint32_t in_additional_information)
|
|
{
|
|
struct tevent_req *req = NULL;
|
|
struct smbd_smb2_setinfo_state *state = NULL;
|
|
struct smb_request *smbreq = NULL;
|
|
connection_struct *conn = smb2req->tcon->compat;
|
|
struct share_mode_lock *lck = NULL;
|
|
NTSTATUS status;
|
|
int ret;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct smbd_smb2_setinfo_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->smb2req = smb2req;
|
|
|
|
DEBUG(10,("smbd_smb2_setinfo_send: %s - %s\n",
|
|
fsp_str_dbg(fsp), fsp_fnum_dbg(fsp)));
|
|
|
|
smbreq = smbd_smb2_fake_smb_request(smb2req);
|
|
if (tevent_req_nomem(smbreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (IS_IPC(conn)) {
|
|
tevent_req_nterror(req, NT_STATUS_NOT_SUPPORTED);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
switch (in_info_type) {
|
|
case SMB2_0_INFO_FILE:
|
|
{
|
|
uint16_t file_info_level;
|
|
char *data;
|
|
int data_size;
|
|
int ret_size = 0;
|
|
|
|
|
|
file_info_level = in_file_info_class + 1000;
|
|
if (file_info_level == SMB_FILE_RENAME_INFORMATION) {
|
|
/* SMB2_FILE_RENAME_INFORMATION_INTERNAL == 0xFF00 + in_file_info_class */
|
|
file_info_level = SMB2_FILE_RENAME_INFORMATION_INTERNAL;
|
|
}
|
|
|
|
if (fsp_get_pathref_fd(fsp) == -1) {
|
|
/*
|
|
* This is actually a SETFILEINFO on a directory
|
|
* handle (returned from an NT SMB). NT5.0 seems
|
|
* to do this call. JRA.
|
|
*/
|
|
ret = vfs_stat(fsp->conn, fsp->fsp_name);
|
|
if (ret != 0) {
|
|
DBG_WARNING("vfs_stat() of %s failed (%s)\n",
|
|
fsp_str_dbg(fsp),
|
|
strerror(errno));
|
|
status = map_nt_error_from_unix(errno);
|
|
tevent_req_nterror(req, status);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
} else if (fsp->print_file) {
|
|
/*
|
|
* Doing a DELETE_ON_CLOSE should cancel a print job.
|
|
*/
|
|
if ((file_info_level == SMB_SET_FILE_DISPOSITION_INFO)
|
|
&& in_input_buffer.length >= 1
|
|
&& CVAL(in_input_buffer.data,0)) {
|
|
uint32_t new_private_options =
|
|
fh_get_private_options(fsp->fh);
|
|
new_private_options |= NTCREATEX_FLAG_DELETE_ON_CLOSE;
|
|
fh_set_private_options(fsp->fh, new_private_options);
|
|
|
|
DEBUG(3,("smbd_smb2_setinfo_send: "
|
|
"Cancelling print job (%s)\n",
|
|
fsp_str_dbg(fsp)));
|
|
|
|
tevent_req_done(req);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_nterror(req, NT_STATUS_OBJECT_PATH_INVALID);
|
|
return tevent_req_post(req, ev);
|
|
} else {
|
|
/*
|
|
* Original code - this is an open file.
|
|
*/
|
|
|
|
if (SMB_VFS_FSTAT(fsp, &fsp->fsp_name->st) != 0) {
|
|
DEBUG(3,("smbd_smb2_setinfo_send: fstat "
|
|
"of %s failed (%s)\n",
|
|
fsp_fnum_dbg(fsp),
|
|
strerror(errno)));
|
|
status = map_nt_error_from_unix(errno);
|
|
tevent_req_nterror(req, status);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
}
|
|
|
|
data = NULL;
|
|
data_size = in_input_buffer.length;
|
|
if (data_size > 0) {
|
|
data = (char *)SMB_MALLOC_ARRAY(char, data_size);
|
|
if (tevent_req_nomem(data, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
memcpy(data, in_input_buffer.data, data_size);
|
|
}
|
|
|
|
if (file_info_level == SMB2_FILE_RENAME_INFORMATION_INTERNAL) {
|
|
struct tevent_req *subreq;
|
|
|
|
lck = get_existing_share_mode_lock(mem_ctx,
|
|
fsp->file_id);
|
|
if (lck == NULL) {
|
|
SAFE_FREE(data);
|
|
tevent_req_nterror(req,
|
|
NT_STATUS_UNSUCCESSFUL);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
subreq = delay_rename_for_lease_break(req,
|
|
smb2req,
|
|
ev,
|
|
fsp,
|
|
lck,
|
|
data,
|
|
data_size);
|
|
if (subreq) {
|
|
/* Wait for lease break response. */
|
|
|
|
/* Ensure we can't be closed in flight. */
|
|
if (!aio_add_req_to_fsp(fsp, req)) {
|
|
TALLOC_FREE(lck);
|
|
tevent_req_nterror(req, NT_STATUS_NO_MEMORY);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
TALLOC_FREE(lck);
|
|
return req;
|
|
}
|
|
}
|
|
|
|
status = smbd_do_setfilepathinfo(conn, smbreq, state,
|
|
file_info_level,
|
|
fsp,
|
|
fsp->fsp_name,
|
|
&data,
|
|
data_size,
|
|
&ret_size);
|
|
TALLOC_FREE(lck);
|
|
SAFE_FREE(data);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_LEVEL)) {
|
|
status = NT_STATUS_INVALID_INFO_CLASS;
|
|
}
|
|
tevent_req_nterror(req, status);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
break;
|
|
}
|
|
|
|
case SMB2_0_INFO_FILESYSTEM:
|
|
{
|
|
uint16_t file_info_level = in_file_info_class + 1000;
|
|
|
|
status = smbd_do_setfsinfo(conn, smbreq, state,
|
|
file_info_level,
|
|
fsp,
|
|
&in_input_buffer);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_LEVEL)) {
|
|
status = NT_STATUS_INVALID_INFO_CLASS;
|
|
}
|
|
tevent_req_nterror(req, status);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
break;
|
|
}
|
|
|
|
case SMB2_0_INFO_SECURITY:
|
|
{
|
|
if (!CAN_WRITE(conn)) {
|
|
tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
status = set_sd_blob(fsp,
|
|
in_input_buffer.data,
|
|
in_input_buffer.length,
|
|
in_additional_information &
|
|
SMB_SUPPORTED_SECINFO_FLAGS);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
tevent_req_nterror(req, status);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
break;
|
|
}
|
|
|
|
case SMB2_0_INFO_QUOTA:
|
|
{
|
|
#ifdef HAVE_SYS_QUOTAS
|
|
struct file_quota_information info = {0};
|
|
SMB_NTQUOTA_STRUCT qt = {0};
|
|
enum ndr_err_code err;
|
|
|
|
if (!fsp->fake_file_handle) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
err = ndr_pull_struct_blob(
|
|
&in_input_buffer, state, &info,
|
|
(ndr_pull_flags_fn_t)ndr_pull_file_quota_information);
|
|
if (!NDR_ERR_CODE_IS_SUCCESS(err)) {
|
|
tevent_req_nterror(req, NT_STATUS_UNSUCCESSFUL);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
qt.usedspace = info.quota_used;
|
|
|
|
qt.softlim = info.quota_threshold;
|
|
|
|
qt.hardlim = info.quota_limit;
|
|
|
|
qt.sid = info.sid;
|
|
ret = vfs_set_ntquota(fsp, SMB_USER_QUOTA_TYPE, &qt.sid, &qt);
|
|
if (ret !=0 ) {
|
|
status = map_nt_error_from_unix(errno);
|
|
tevent_req_nterror(req, status);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
status = NT_STATUS_OK;
|
|
break;
|
|
#else
|
|
tevent_req_nterror(req, NT_STATUS_NOT_SUPPORTED);
|
|
return tevent_req_post(req, ev);
|
|
#endif
|
|
}
|
|
default:
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
tevent_req_done(req);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
static NTSTATUS smbd_smb2_setinfo_recv(struct tevent_req *req)
|
|
{
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
tevent_req_received(req);
|
|
return status;
|
|
}
|
|
|
|
tevent_req_received(req);
|
|
return NT_STATUS_OK;
|
|
}
|