2 Unix SMB/CIFS implementation.
5 Copyright (C) Stefan Metzmacher 2009
6 Copyright (C) David Disseldorp 2013-2015
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "smbd/smbd.h"
24 #include "smbd/globals.h"
25 #include "../libcli/smb/smb_common.h"
26 #include "../libcli/security/security.h"
27 #include "../lib/util/tevent_ntstatus.h"
28 #include "rpc_server/srv_pipe_hnd.h"
29 #include "include/ntioctl.h"
30 #include "../librpc/ndr/libndr.h"
31 #include "librpc/gen_ndr/ndr_ioctl.h"
32 #include "smb2_ioctl_private.h"
35 #define DBGC_CLASS DBGC_SMB2
38 * XXX this may reduce dup_extents->byte_count so that it's less than the
41 static NTSTATUS fsctl_dup_extents_check_lengths(struct files_struct *src_fsp,
42 struct files_struct *dst_fsp,
43 struct fsctl_dup_extents_to_file *dup_extents)
47 if ((dup_extents->source_off + dup_extents->byte_count
48 < dup_extents->source_off)
49 || (dup_extents->target_off + dup_extents->byte_count
50 < dup_extents->target_off)) {
51 return NT_STATUS_INVALID_PARAMETER; /* wrap */
54 status = vfs_stat_fsp(src_fsp);
55 if (!NT_STATUS_IS_OK(status)) {
60 * XXX vfs_btrfs and vfs_default have size checks in the copychunk
61 * handler, as this needs to be rechecked after the src has potentially
62 * been extended by a previous chunk in the compound copychunk req.
64 if (src_fsp->fsp_name->st.st_ex_size
65 < dup_extents->source_off + dup_extents->byte_count) {
66 DEBUG(2, ("dup_extents req exceeds src size\n"));
67 return NT_STATUS_NOT_SUPPORTED;
70 status = vfs_stat_fsp(dst_fsp);
71 if (!NT_STATUS_IS_OK(status)) {
75 if (dst_fsp->fsp_name->st.st_ex_size
76 < dup_extents->target_off + dup_extents->byte_count) {
78 if (dst_fsp->fsp_name->st.st_ex_size - dup_extents->target_off
79 > dst_fsp->fsp_name->st.st_ex_size) {
80 return NT_STATUS_INVALID_PARAMETER; /* wrap */
84 * this server behaviour is pretty hairy, but we need to match
87 DEBUG(2, ("dup_extents req exceeds target size, capping\n"));
88 dup_extents->byte_count = dst_fsp->fsp_name->st.st_ex_size
89 - dup_extents->target_off;
95 static NTSTATUS fsctl_dup_extents_check_overlap(struct files_struct *src_fsp,
96 struct files_struct *dst_fsp,
97 struct fsctl_dup_extents_to_file *dup_extents)
99 uint64_t src_off_last;
100 uint64_t tgt_off_last;
102 if (!file_id_equal(&src_fsp->file_id, &dst_fsp->file_id)) {
103 /* src and dest refer to different files */
107 if (dup_extents->byte_count == 0) {
108 /* no range to overlap */
113 * [MS-FSCC] 2.3.8 FSCTL_DUPLICATE_EXTENTS_TO_FILE Reply
114 * STATUS_NOT_SUPPORTED:
115 * The source and target destination ranges overlap on the same file.
118 src_off_last = dup_extents->source_off + dup_extents->byte_count - 1;
119 if ((dup_extents->target_off >= dup_extents->source_off)
120 && (dup_extents->target_off <= src_off_last)) {
125 return NT_STATUS_NOT_SUPPORTED;
129 tgt_off_last = dup_extents->target_off + dup_extents->byte_count - 1;
130 if ((tgt_off_last >= dup_extents->source_off)
131 && (tgt_off_last <= src_off_last)) {
136 return NT_STATUS_NOT_SUPPORTED;
142 static NTSTATUS fsctl_dup_extents_check_sparse(struct files_struct *src_fsp,
143 struct files_struct *dst_fsp)
146 * 2.3.8 FSCTL_DUPLICATE_EXTENTS_TO_FILE Reply...
147 * STATUS_NOT_SUPPORTED: Target file is sparse, while source
148 * is a non-sparse file.
150 * WS2016 has the following behaviour (MS are in the process of fixing
152 * STATUS_NOT_SUPPORTED is returned if the source is sparse, while the
153 * target is non-sparse. However, if target is sparse while the source
154 * is non-sparse, then FSCTL_DUPLICATE_EXTENTS_TO_FILE completes
157 if (src_fsp->fsp_flags.is_sparse && !dst_fsp->fsp_flags.is_sparse) {
158 return NT_STATUS_NOT_SUPPORTED;
164 struct fsctl_dup_extents_state {
165 struct tevent_context *ev;
166 struct connection_struct *conn;
167 struct files_struct *dst_fsp;
168 struct fsctl_dup_extents_to_file dup_extents;
171 static void fsctl_dup_extents_offload_read_done(struct tevent_req *subreq);
172 static void fsctl_dup_extents_vfs_done(struct tevent_req *subreq);
174 static struct tevent_req *fsctl_dup_extents_send(TALLOC_CTX *mem_ctx,
175 struct tevent_context *ev,
176 struct files_struct *dst_fsp,
178 struct smbd_smb2_request *smb2req)
180 struct tevent_req *req = NULL;
181 struct tevent_req *subreq = NULL;
182 struct fsctl_dup_extents_state *state = NULL;
183 uint64_t src_fid_persistent = 0;
184 uint64_t src_fid_volatile = 0;
185 struct files_struct *src_fsp = NULL;
189 req = tevent_req_create(mem_ctx, &state,
190 struct fsctl_dup_extents_state);
195 if (dst_fsp == NULL) {
196 tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
197 return tevent_req_post(req, ev);
200 *state = (struct fsctl_dup_extents_state) {
201 .conn = dst_fsp->conn,
206 if ((dst_fsp->conn->fs_capabilities
207 & FILE_SUPPORTS_BLOCK_REFCOUNTING) == 0) {
208 DBG_INFO("FS does not advertise block refcounting support\n");
209 tevent_req_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
210 return tevent_req_post(req, ev);
213 ndr_ret = ndr_pull_struct_blob(in_input, state, &state->dup_extents,
214 (ndr_pull_flags_fn_t)ndr_pull_fsctl_dup_extents_to_file);
215 if (ndr_ret != NDR_ERR_SUCCESS) {
216 DBG_ERR("failed to unmarshall dup extents to file req\n");
217 tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
218 return tevent_req_post(req, ev);
221 src_fid_persistent = BVAL(state->dup_extents.source_fid, 0);
222 src_fid_volatile = BVAL(state->dup_extents.source_fid, 8);
223 src_fsp = file_fsp_get(smb2req, src_fid_persistent, src_fid_volatile);
224 if ((src_fsp == NULL)
225 || (src_fsp->file_id.devid != dst_fsp->file_id.devid)) {
227 * [MS-FSCC] 2.3.8 FSCTL_DUPLICATE_EXTENTS_TO_FILE Reply
228 * STATUS_INVALID_PARAMETER:
229 * The FileHandle parameter is either invalid or does not
230 * represent a handle to an opened file on the same volume.
232 * Windows Server responds with NT_STATUS_INVALID_HANDLE instead
233 * of STATUS_INVALID_PARAMETER here, despite the above spec.
235 DBG_ERR("invalid src_fsp for dup_extents\n");
236 tevent_req_nterror(req, NT_STATUS_INVALID_HANDLE);
237 return tevent_req_post(req, ev);
240 status = fsctl_dup_extents_check_lengths(src_fsp, dst_fsp,
241 &state->dup_extents);
242 if (!NT_STATUS_IS_OK(status)) {
243 tevent_req_nterror(req, status);
244 return tevent_req_post(req, ev);
247 if (state->dup_extents.byte_count == 0) {
248 DBG_ERR("skipping zero length dup extents\n");
249 tevent_req_done(req);
250 return tevent_req_post(req, ev);
253 status = fsctl_dup_extents_check_overlap(src_fsp, dst_fsp,
254 &state->dup_extents);
255 if (!NT_STATUS_IS_OK(status)) {
256 tevent_req_nterror(req, status);
257 return tevent_req_post(req, ev);
260 status = fsctl_dup_extents_check_sparse(src_fsp, dst_fsp);
261 if (!NT_STATUS_IS_OK(status)) {
262 tevent_req_nterror(req, status);
263 return tevent_req_post(req, ev);
266 subreq = SMB_VFS_OFFLOAD_READ_SEND(state, ev, src_fsp,
267 FSCTL_DUP_EXTENTS_TO_FILE,
269 if (tevent_req_nomem(subreq, req)) {
270 return tevent_req_post(req, ev);
272 tevent_req_set_callback(subreq, fsctl_dup_extents_offload_read_done,
277 static void fsctl_dup_extents_offload_read_done(struct tevent_req *subreq)
279 struct tevent_req *req = tevent_req_callback_data(
280 subreq, struct tevent_req);
281 struct fsctl_dup_extents_state *state = tevent_req_data(
282 req, struct fsctl_dup_extents_state);
286 status = SMB_VFS_OFFLOAD_READ_RECV(subreq, state->dst_fsp->conn,
288 if (tevent_req_nterror(req, status)) {
292 /* tell the VFS to ignore locks across the clone, matching ReFS */
293 subreq = SMB_VFS_OFFLOAD_WRITE_SEND(state->dst_fsp->conn,
296 FSCTL_DUP_EXTENTS_TO_FILE,
298 state->dup_extents.source_off,
300 state->dup_extents.target_off,
301 state->dup_extents.byte_count);
302 if (tevent_req_nomem(subreq, req)) {
305 tevent_req_set_callback(subreq, fsctl_dup_extents_vfs_done, req);
309 static void fsctl_dup_extents_vfs_done(struct tevent_req *subreq)
311 struct tevent_req *req = tevent_req_callback_data(
312 subreq, struct tevent_req);
313 struct fsctl_dup_extents_state *state = tevent_req_data(
314 req, struct fsctl_dup_extents_state);
318 status = SMB_VFS_OFFLOAD_WRITE_RECV(state->conn, subreq, &nb_chunk);
320 if (tevent_req_nterror(req, status)) {
324 if (nb_chunk != state->dup_extents.byte_count) {
325 tevent_req_nterror(req, NT_STATUS_IO_DEVICE_ERROR);
329 tevent_req_done(req);
332 static NTSTATUS fsctl_dup_extents_recv(struct tevent_req *req)
334 return tevent_req_simple_recv_ntstatus(req);
337 static NTSTATUS fsctl_get_cmprn(TALLOC_CTX *mem_ctx,
338 struct tevent_context *ev,
339 struct files_struct *fsp,
340 size_t in_max_output,
341 DATA_BLOB *out_output)
343 struct compression_state cmpr_state;
344 enum ndr_err_code ndr_ret;
349 return NT_STATUS_FILE_CLOSED;
352 /* Windows doesn't check for SEC_FILE_READ_ATTRIBUTE permission here */
354 ZERO_STRUCT(cmpr_state);
355 if (fsp->conn->fs_capabilities & FILE_FILE_COMPRESSION) {
356 status = SMB_VFS_GET_COMPRESSION(fsp->conn,
361 if (!NT_STATUS_IS_OK(status)) {
366 * bso#12144: The underlying filesystem doesn't support
367 * compression, so we should respond with "not-compressed"
368 * (like WS2016 ReFS) instead of STATUS_NOT_SUPPORTED or
369 * NT_STATUS_INVALID_DEVICE_REQUEST.
371 cmpr_state.format = COMPRESSION_FORMAT_NONE;
374 ndr_ret = ndr_push_struct_blob(&output, mem_ctx,
376 (ndr_push_flags_fn_t)ndr_push_compression_state);
377 if (ndr_ret != NDR_ERR_SUCCESS) {
378 return NT_STATUS_INTERNAL_ERROR;
381 if (in_max_output < output.length) {
382 DEBUG(1, ("max output %u too small for compression state %ld\n",
383 (unsigned int)in_max_output, (long int)output.length));
384 return NT_STATUS_INVALID_USER_BUFFER;
386 *out_output = output;
391 static NTSTATUS fsctl_set_cmprn(TALLOC_CTX *mem_ctx,
392 struct tevent_context *ev,
393 struct files_struct *fsp,
396 struct compression_state cmpr_state;
397 enum ndr_err_code ndr_ret;
401 return NT_STATUS_FILE_CLOSED;
404 /* WRITE_DATA permission is required, WRITE_ATTRIBUTES is not */
405 status = check_access_fsp(fsp, FILE_WRITE_DATA);
406 if (!NT_STATUS_IS_OK(status)) {
410 ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &cmpr_state,
411 (ndr_pull_flags_fn_t)ndr_pull_compression_state);
412 if (ndr_ret != NDR_ERR_SUCCESS) {
413 DEBUG(0, ("failed to unmarshall set compression req\n"));
414 return NT_STATUS_INVALID_PARAMETER;
417 status = NT_STATUS_NOT_SUPPORTED;
418 if (fsp->conn->fs_capabilities & FILE_FILE_COMPRESSION) {
419 status = SMB_VFS_SET_COMPRESSION(fsp->conn,
423 } else if (cmpr_state.format == COMPRESSION_FORMAT_NONE) {
425 * bso#12144: The underlying filesystem doesn't support
426 * compression. We should still accept set(FORMAT_NONE) requests
427 * (like WS2016 ReFS).
429 status = NT_STATUS_OK;
435 static NTSTATUS fsctl_zero_data(TALLOC_CTX *mem_ctx,
436 struct tevent_context *ev,
437 struct files_struct *fsp,
440 struct file_zero_data_info zdata_info;
441 enum ndr_err_code ndr_ret;
442 struct lock_struct lck;
449 return NT_STATUS_FILE_CLOSED;
452 /* WRITE_DATA permission is required */
453 status = check_access_fsp(fsp, FILE_WRITE_DATA);
454 if (!NT_STATUS_IS_OK(status)) {
458 /* allow regardless of whether FS supports sparse or not */
460 ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &zdata_info,
461 (ndr_pull_flags_fn_t)ndr_pull_file_zero_data_info);
462 if (ndr_ret != NDR_ERR_SUCCESS) {
463 DEBUG(0, ("failed to unmarshall zero data request\n"));
464 return NT_STATUS_INVALID_PARAMETER;
467 if (zdata_info.beyond_final_zero < zdata_info.file_off) {
468 DEBUG(0, ("invalid zero data params: off %lu, bfz, %lu\n",
469 (unsigned long)zdata_info.file_off,
470 (unsigned long)zdata_info.beyond_final_zero));
471 return NT_STATUS_INVALID_PARAMETER;
474 /* convert strange "beyond final zero" param into length */
475 len = zdata_info.beyond_final_zero - zdata_info.file_off;
478 DEBUG(2, ("zero data called with zero length range\n"));
482 init_strict_lock_struct(fsp,
483 fsp->op->global->open_persistent_id,
489 if (!SMB_VFS_STRICT_LOCK_CHECK(fsp->conn, fsp, &lck)) {
490 DEBUG(2, ("failed to lock range for zero-data\n"));
491 return NT_STATUS_FILE_LOCK_CONFLICT;
495 * MS-FSCC <58> Section 2.3.67
496 * This FSCTL sets the range of bytes to zero (0) without extending the
499 * The VFS_FALLOCATE_FL_KEEP_SIZE flag is used to satisfy this
503 mode = VFS_FALLOCATE_FL_PUNCH_HOLE | VFS_FALLOCATE_FL_KEEP_SIZE;
504 ret = SMB_VFS_FALLOCATE(fsp, mode, zdata_info.file_off, len);
506 status = map_nt_error_from_unix_common(errno);
507 DEBUG(2, ("zero-data fallocate(0x%x) failed: %s\n", mode,
512 if (!fsp->fsp_flags.is_sparse && lp_strict_allocate(SNUM(fsp->conn))) {
514 * File marked non-sparse and "strict allocate" is enabled -
515 * allocate the range that we just punched out.
516 * In future FALLOC_FL_ZERO_RANGE could be used exclusively for
517 * this, but it's currently only supported on XFS and ext4.
519 * The newly allocated range still won't be found by SEEK_DATA
520 * for QAR, but stat.st_blocks will reflect it.
522 ret = SMB_VFS_FALLOCATE(fsp, VFS_FALLOCATE_FL_KEEP_SIZE,
523 zdata_info.file_off, len);
525 status = map_nt_error_from_unix_common(errno);
526 DEBUG(0, ("fallocate failed: %s\n", strerror(errno)));
534 static NTSTATUS fsctl_qar_buf_push(TALLOC_CTX *mem_ctx,
535 struct file_alloced_range_buf *qar_buf,
536 DATA_BLOB *qar_array_blob)
539 enum ndr_err_code ndr_ret;
542 ndr_ret = ndr_push_struct_blob(&new_slot, mem_ctx, qar_buf,
543 (ndr_push_flags_fn_t)ndr_push_file_alloced_range_buf);
544 if (ndr_ret != NDR_ERR_SUCCESS) {
545 DEBUG(0, ("failed to marshall QAR buf\n"));
546 return NT_STATUS_INVALID_PARAMETER;
549 /* TODO should be able to avoid copy by pushing into prealloced buf */
550 ok = data_blob_append(mem_ctx, qar_array_blob, new_slot.data,
552 data_blob_free(&new_slot);
554 return NT_STATUS_NO_MEMORY;
560 static NTSTATUS fsctl_qar_seek_fill(TALLOC_CTX *mem_ctx,
561 struct files_struct *fsp,
564 DATA_BLOB *qar_array_blob)
566 NTSTATUS status = NT_STATUS_NOT_SUPPORTED;
568 #ifdef HAVE_LSEEK_HOLE_DATA
569 while (curr_off <= max_off) {
572 struct file_alloced_range_buf qar_buf;
575 data_off = SMB_VFS_LSEEK(fsp, curr_off, SEEK_DATA);
576 if ((data_off == -1) && (errno == ENXIO)) {
577 /* no data from curr_off to EOF */
579 } else if (data_off == -1) {
580 status = map_nt_error_from_unix_common(errno);
581 DEBUG(1, ("lseek data failed: %s\n", strerror(errno)));
585 if (data_off > max_off) {
586 /* found something, but passed range of interest */
590 hole_off = SMB_VFS_LSEEK(fsp, data_off, SEEK_HOLE);
591 if (hole_off == -1) {
592 status = map_nt_error_from_unix_common(errno);
593 DEBUG(1, ("lseek hole failed: %s\n", strerror(errno)));
597 if (hole_off <= data_off) {
598 DEBUG(1, ("lseek inconsistent: hole %lu at or before "
599 "data %lu\n", (unsigned long)hole_off,
600 (unsigned long)data_off));
601 return NT_STATUS_INTERNAL_ERROR;
604 qar_buf.file_off = data_off;
605 /* + 1 to convert maximum offset to length */
606 qar_buf.len = MIN(hole_off, max_off + 1) - data_off;
608 status = fsctl_qar_buf_push(mem_ctx, &qar_buf, qar_array_blob);
609 if (!NT_STATUS_IS_OK(status)) {
610 return NT_STATUS_NO_MEMORY;
615 status = NT_STATUS_OK;
621 static NTSTATUS fsctl_qar(TALLOC_CTX *mem_ctx,
622 struct tevent_context *ev,
623 struct files_struct *fsp,
625 size_t in_max_output,
626 DATA_BLOB *out_output)
628 struct fsctl_query_alloced_ranges_req qar_req;
629 struct fsctl_query_alloced_ranges_rsp qar_rsp;
630 DATA_BLOB qar_array_blob = data_blob_null;
632 enum ndr_err_code ndr_ret;
635 SMB_STRUCT_STAT sbuf;
638 return NT_STATUS_FILE_CLOSED;
641 /* READ_DATA permission is required */
642 status = check_access_fsp(fsp, FILE_READ_DATA);
643 if (!NT_STATUS_IS_OK(status)) {
647 ndr_ret = ndr_pull_struct_blob(in_input, mem_ctx, &qar_req,
648 (ndr_pull_flags_fn_t)ndr_pull_fsctl_query_alloced_ranges_req);
649 if (ndr_ret != NDR_ERR_SUCCESS) {
650 DEBUG(0, ("failed to unmarshall QAR req\n"));
651 return NT_STATUS_INVALID_PARAMETER;
655 * XXX Windows Server 2008 & 2012 servers don't return lock-conflict
656 * for QAR requests over an exclusively locked range!
659 ret = SMB_VFS_FSTAT(fsp, &sbuf);
661 status = map_nt_error_from_unix_common(errno);
662 DEBUG(2, ("fstat failed: %s\n", strerror(errno)));
666 if ((qar_req.buf.len == 0)
667 || (sbuf.st_ex_size == 0)
668 || (qar_req.buf.file_off >= sbuf.st_ex_size)) {
669 /* zero length range or after EOF, no ranges to return */
673 /* check for integer overflow */
674 if (qar_req.buf.file_off + qar_req.buf.len < qar_req.buf.file_off) {
675 return NT_STATUS_INVALID_PARAMETER;
679 * Maximum offset is either the last valid offset _before_ EOF, or the
680 * last byte offset within the requested range. -1 converts length to
681 * offset, which is easier to work with for SEEK_DATA/SEEK_HOLE, E.g.:
683 * /off=0 /off=512K /st_ex_size=1M
684 * |-------------------------------------|
686 * |-------------------------------------|
688 * |=====================================|
689 * | QAR off=512K, len=1M |
690 * |=================^===================|
693 * |==================|
694 * |QAR off=0 len=512K|
695 * |==================|
699 max_off = MIN(sbuf.st_ex_size,
700 qar_req.buf.file_off + qar_req.buf.len) - 1;
702 if (!fsp->fsp_flags.is_sparse) {
703 struct file_alloced_range_buf qar_buf;
705 /* file is non-sparse, claim file_off->max_off is allocated */
706 qar_buf.file_off = qar_req.buf.file_off;
707 /* + 1 to convert maximum offset back to length */
708 qar_buf.len = max_off - qar_req.buf.file_off + 1;
710 status = fsctl_qar_buf_push(mem_ctx, &qar_buf, &qar_array_blob);
712 status = fsctl_qar_seek_fill(mem_ctx, fsp, qar_req.buf.file_off,
713 max_off, &qar_array_blob);
715 if (!NT_STATUS_IS_OK(status)) {
719 /* marshall response buffer. */
720 qar_rsp.far_buf_array = qar_array_blob;
722 ndr_ret = ndr_push_struct_blob(out_output, mem_ctx, &qar_rsp,
723 (ndr_push_flags_fn_t)ndr_push_fsctl_query_alloced_ranges_rsp);
724 if (ndr_ret != NDR_ERR_SUCCESS) {
725 DEBUG(0, ("failed to marshall QAR rsp\n"));
726 return NT_STATUS_INVALID_PARAMETER;
729 if (out_output->length > in_max_output) {
730 DEBUG(2, ("QAR output len %lu exceeds max %lu\n",
731 (unsigned long)out_output->length,
732 (unsigned long)in_max_output));
733 data_blob_free(out_output);
734 return NT_STATUS_BUFFER_TOO_SMALL;
740 static void smb2_ioctl_filesys_dup_extents_done(struct tevent_req *subreq);
742 struct tevent_req *smb2_ioctl_filesys(uint32_t ctl_code,
743 struct tevent_context *ev,
744 struct tevent_req *req,
745 struct smbd_smb2_ioctl_state *state)
750 case FSCTL_GET_COMPRESSION:
751 status = fsctl_get_cmprn(state, ev, state->fsp,
752 state->in_max_output,
754 if (!tevent_req_nterror(req, status)) {
755 tevent_req_done(req);
757 return tevent_req_post(req, ev);
759 case FSCTL_SET_COMPRESSION:
760 status = fsctl_set_cmprn(state, ev, state->fsp,
762 if (!tevent_req_nterror(req, status)) {
763 tevent_req_done(req);
765 return tevent_req_post(req, ev);
767 case FSCTL_SET_ZERO_DATA:
768 status = fsctl_zero_data(state, ev, state->fsp,
770 if (!tevent_req_nterror(req, status)) {
771 tevent_req_done(req);
773 return tevent_req_post(req, ev);
775 case FSCTL_QUERY_ALLOCATED_RANGES:
776 status = fsctl_qar(state, ev, state->fsp,
778 state->in_max_output,
780 if (!tevent_req_nterror(req, status)) {
781 tevent_req_done(req);
783 return tevent_req_post(req, ev);
785 case FSCTL_DUP_EXTENTS_TO_FILE: {
786 struct tevent_req *subreq = NULL;
788 subreq = fsctl_dup_extents_send(state, ev,
792 if (tevent_req_nomem(subreq, req)) {
793 return tevent_req_post(req, ev);
795 tevent_req_set_callback(subreq,
796 smb2_ioctl_filesys_dup_extents_done,
802 uint8_t *out_data = NULL;
803 uint32_t out_data_len = 0;
805 if (state->fsp == NULL) {
806 status = NT_STATUS_NOT_SUPPORTED;
808 status = SMB_VFS_FSCTL(state->fsp,
811 state->smbreq->flags2,
812 state->in_input.data,
813 state->in_input.length,
815 state->in_max_output,
817 state->out_output = data_blob_const(out_data, out_data_len);
818 if (NT_STATUS_IS_OK(status)) {
819 tevent_req_done(req);
820 return tevent_req_post(req, ev);
824 if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED)) {
825 if (IS_IPC(state->smbreq->conn)) {
826 status = NT_STATUS_FS_DRIVER_REQUIRED;
828 status = NT_STATUS_INVALID_DEVICE_REQUEST;
832 tevent_req_nterror(req, status);
833 return tevent_req_post(req, ev);
838 tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
839 return tevent_req_post(req, ev);
842 static void smb2_ioctl_filesys_dup_extents_done(struct tevent_req *subreq)
844 struct tevent_req *req = tevent_req_callback_data(subreq,
848 status = fsctl_dup_extents_recv(subreq);
850 if (!tevent_req_nterror(req, status)) {
851 tevent_req_done(req);