smb2_ioctl: split ioctl handler code on device type
[mat/samba.git] / source3 / smbd / smb2_ioctl.c
index 85da92e6c0063ba8bc3df5ff5db11c0ccb37e015..ea29cd460dfab21b48d5a6367e44a2b665b552ee 100644 (file)
 */
 
 #include "includes.h"
+#include "smbd/smbd.h"
 #include "smbd/globals.h"
-#include "../source4/libcli/smb2/smb2_constants.h"
+#include "../libcli/smb/smb_common.h"
+#include "../lib/util/tevent_ntstatus.h"
+#include "include/ntioctl.h"
+#include "smb2_ioctl_private.h"
 
 static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
                                               struct tevent_context *ev,
                                               struct smbd_smb2_request *smb2req,
+                                              struct files_struct *in_fsp,
                                               uint32_t in_ctl_code,
-                                              uint64_t in_file_id_volatile,
                                               DATA_BLOB in_input,
                                               uint32_t in_max_output,
                                               uint32_t in_flags);
 static NTSTATUS smbd_smb2_ioctl_recv(struct tevent_req *req,
                                     TALLOC_CTX *mem_ctx,
-                                    DATA_BLOB *out_output);
+                                    DATA_BLOB *out_output,
+                                    bool *disconnect);
 
 static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq);
 NTSTATUS smbd_smb2_request_process_ioctl(struct smbd_smb2_request *req)
 {
-       const uint8_t *inhdr;
+       NTSTATUS status;
        const uint8_t *inbody;
-       int i = req->current_idx;
-       size_t expected_body_size = 0x39;
-       size_t body_size;
+       uint32_t min_buffer_offset;
+       uint32_t max_buffer_offset;
+       uint32_t min_output_offset;
+       uint32_t allowed_length_in;
+       uint32_t allowed_length_out;
        uint32_t in_ctl_code;
        uint64_t in_file_id_persistent;
        uint64_t in_file_id_volatile;
+       struct files_struct *in_fsp = NULL;
        uint32_t in_input_offset;
        uint32_t in_input_length;
-       DATA_BLOB in_input_buffer;
+       DATA_BLOB in_input_buffer = data_blob_null;
+       uint32_t in_max_input_length;
+       uint32_t in_output_offset;
+       uint32_t in_output_length;
+       DATA_BLOB in_output_buffer = data_blob_null;
        uint32_t in_max_output_length;
        uint32_t in_flags;
+       uint32_t data_length_in;
+       uint32_t data_length_out;
+       uint32_t data_length_tmp;
+       uint32_t data_length_max;
        struct tevent_req *subreq;
 
-       inhdr = (const uint8_t *)req->in.vector[i+0].iov_base;
-       if (req->in.vector[i+1].iov_len != (expected_body_size & 0xFFFFFFFE)) {
-               return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
-       }
-
-       inbody = (const uint8_t *)req->in.vector[i+1].iov_base;
-
-       body_size = SVAL(inbody, 0x00);
-       if (body_size != expected_body_size) {
-               return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
+       status = smbd_smb2_request_verify_sizes(req, 0x39);
+       if (!NT_STATUS_IS_OK(status)) {
+               return smbd_smb2_request_error(req, status);
        }
+       inbody = SMBD_SMB2_IN_BODY_PTR(req);
 
        in_ctl_code             = IVAL(inbody, 0x04);
        in_file_id_persistent   = BVAL(inbody, 0x08);
        in_file_id_volatile     = BVAL(inbody, 0x10);
        in_input_offset         = IVAL(inbody, 0x18);
        in_input_length         = IVAL(inbody, 0x1C);
+       in_max_input_length     = IVAL(inbody, 0x20);
+       in_output_offset        = IVAL(inbody, 0x24);
+       in_output_length        = IVAL(inbody, 0x28);
        in_max_output_length    = IVAL(inbody, 0x2C);
        in_flags                = IVAL(inbody, 0x30);
 
-       if (in_input_offset != (SMB2_HDR_BODY + (body_size & 0xFFFFFFFE))) {
+       min_buffer_offset = SMB2_HDR_BODY + SMBD_SMB2_IN_BODY_LEN(req);
+       max_buffer_offset = min_buffer_offset + SMBD_SMB2_IN_DYN_LEN(req);
+       min_output_offset = min_buffer_offset;
+
+       /*
+        * InputOffset (4 bytes): The offset, in bytes, from the beginning of
+        * the SMB2 header to the input data buffer. If no input data is
+        * required for the FSCTL/IOCTL command being issued, the client SHOULD
+        * set this value to 0.<49>
+        * <49> If no input data is required for the FSCTL/IOCTL command being
+        * issued, Windows-based clients set this field to any value.
+        */
+       allowed_length_in = 0;
+       if ((in_input_offset > 0) && (in_input_length > 0)) {
+               uint32_t tmp_ofs;
+
+               if (in_input_offset < min_buffer_offset) {
+                       return smbd_smb2_request_error(req,
+                                       NT_STATUS_INVALID_PARAMETER);
+               }
+               if (in_input_offset > max_buffer_offset) {
+                       return smbd_smb2_request_error(req,
+                                       NT_STATUS_INVALID_PARAMETER);
+               }
+               allowed_length_in = max_buffer_offset - in_input_offset;
+
+               tmp_ofs = in_input_offset - min_buffer_offset;
+               in_input_buffer.data = SMBD_SMB2_IN_DYN_PTR(req);
+               in_input_buffer.data += tmp_ofs;
+               in_input_buffer.length = in_input_length;
+               min_output_offset += tmp_ofs;
+               min_output_offset += in_input_length;
+       }
+
+       if (in_input_length > allowed_length_in) {
+               return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
+       }
+
+       allowed_length_out = 0;
+       if (in_output_offset > 0) {
+               if (in_output_offset < min_buffer_offset) {
+                       return smbd_smb2_request_error(req,
+                                       NT_STATUS_INVALID_PARAMETER);
+               }
+               if (in_output_offset > max_buffer_offset) {
+                       return smbd_smb2_request_error(req,
+                                       NT_STATUS_INVALID_PARAMETER);
+               }
+               allowed_length_out = max_buffer_offset - in_output_offset;
+       }
+
+       if (in_output_length > allowed_length_out) {
                return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
        }
 
-       if (in_input_length > req->in.vector[i+2].iov_len) {
+       if (in_output_length > 0) {
+               uint32_t tmp_ofs;
+
+               if (in_output_offset < min_output_offset) {
+                       return smbd_smb2_request_error(req,
+                                       NT_STATUS_INVALID_PARAMETER);
+               }
+
+               tmp_ofs = in_output_offset - min_buffer_offset;
+               in_output_buffer.data = SMBD_SMB2_IN_DYN_PTR(req);
+               in_output_buffer.data += tmp_ofs;
+               in_output_buffer.length = in_output_length;
+       }
+
+       /*
+        * verify the credits and avoid overflows
+        * in_input_buffer.length and in_output_buffer.length
+        * are already verified.
+        */
+       data_length_in = in_input_buffer.length + in_output_buffer.length;
+
+       data_length_out = in_max_input_length;
+       data_length_tmp = UINT32_MAX - data_length_out;
+       if (data_length_tmp < in_max_output_length) {
                return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
        }
+       data_length_out += in_max_output_length;
+
+       data_length_max = MAX(data_length_in, data_length_out);
+
+       status = smbd_smb2_request_verify_creditcharge(req, data_length_max);
+       if (!NT_STATUS_IS_OK(status)) {
+               return smbd_smb2_request_error(req, status);
+       }
 
-       in_input_buffer.data = (uint8_t *)req->in.vector[i+2].iov_base;
-       in_input_buffer.length = in_input_length;
+       /*
+        * If the Flags field of the request is not SMB2_0_IOCTL_IS_FSCTL the
+        * server MUST fail the request with STATUS_NOT_SUPPORTED.
+        */
+       if (in_flags != SMB2_IOCTL_FLAG_IS_FSCTL) {
+               return smbd_smb2_request_error(req, NT_STATUS_NOT_SUPPORTED);
+       }
 
-       if (req->compat_chain_fsp) {
-               /* skip check */
-       } else if (in_file_id_persistent == UINT64_MAX &&
-                  in_file_id_volatile == UINT64_MAX) {
-               /* without a handle */
-       } else if (in_file_id_persistent != 0) {
-               return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
+       switch (in_ctl_code) {
+       case FSCTL_DFS_GET_REFERRALS:
+       case FSCTL_DFS_GET_REFERRALS_EX:
+       case FSCTL_PIPE_WAIT:
+       case FSCTL_VALIDATE_NEGOTIATE_INFO_224:
+       case FSCTL_VALIDATE_NEGOTIATE_INFO:
+       case FSCTL_QUERY_NETWORK_INTERFACE_INFO:
+               /*
+                * Some SMB2 specific CtlCodes like FSCTL_DFS_GET_REFERRALS or
+                * FSCTL_PIPE_WAIT does not take a file handle.
+                *
+                * If FileId in the SMB2 Header of the request is not
+                * 0xFFFFFFFFFFFFFFFF, then the server MUST fail the request
+                * with STATUS_INVALID_PARAMETER.
+                */
+               if (in_file_id_persistent != UINT64_MAX ||
+                   in_file_id_volatile != UINT64_MAX) {
+                       return smbd_smb2_request_error(req,
+                               NT_STATUS_INVALID_PARAMETER);
+               }
+               break;
+       default:
+               in_fsp = file_fsp_smb2(req, in_file_id_persistent,
+                                      in_file_id_volatile);
+               if (in_fsp == NULL) {
+                       return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
+               }
+               break;
        }
 
-       subreq = smbd_smb2_ioctl_send(req,
-                                     req->conn->smb2.event_ctx,
-                                     req,
+       subreq = smbd_smb2_ioctl_send(req, req->sconn->ev_ctx,
+                                     req, in_fsp,
                                      in_ctl_code,
-                                     in_file_id_volatile,
                                      in_input_buffer,
                                      in_max_output_length,
                                      in_flags);
@@ -105,11 +224,7 @@ NTSTATUS smbd_smb2_request_process_ioctl(struct smbd_smb2_request *req)
        }
        tevent_req_set_callback(subreq, smbd_smb2_request_ioctl_done, req);
 
-       if (tevent_req_is_in_progress(subreq)) {
-               return smbd_smb2_request_pending_queue(req);
-       }
-
-       return NT_STATUS_OK;
+       return smbd_smb2_request_pending_queue(req, subreq, 1000);
 }
 
 static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq)
@@ -117,8 +232,6 @@ static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq)
        struct smbd_smb2_request *req = tevent_req_callback_data(subreq,
                                        struct smbd_smb2_request);
        const uint8_t *inbody;
-       int i = req->current_idx;
-       uint8_t *outhdr;
        DATA_BLOB outbody;
        DATA_BLOB outdyn;
        uint32_t in_ctl_code;
@@ -126,18 +239,34 @@ static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq)
        uint64_t in_file_id_volatile;
        uint32_t out_input_offset;
        uint32_t out_output_offset;
-       DATA_BLOB out_output_buffer;
+       DATA_BLOB out_output_buffer = data_blob_null;
        NTSTATUS status;
        NTSTATUS error; /* transport error */
+       bool disconnect = false;
+
+       status = smbd_smb2_ioctl_recv(subreq, req,
+                                     &out_output_buffer,
+                                     &disconnect);
+
+       DEBUG(10,("smbd_smb2_request_ioctl_done: smbd_smb2_ioctl_recv returned "
+               "%u status %s\n",
+               (unsigned int)out_output_buffer.length,
+               nt_errstr(status) ));
 
-       status = smbd_smb2_ioctl_recv(subreq, req, &out_output_buffer);
        TALLOC_FREE(subreq);
+       if (disconnect) {
+               error = status;
+               smbd_server_connection_terminate(req->sconn,
+                                                nt_errstr(error));
+               return;
+       }
+
        if (NT_STATUS_EQUAL(status, STATUS_BUFFER_OVERFLOW)) {
                /* also ok */
        } else if (!NT_STATUS_IS_OK(status)) {
                error = smbd_smb2_request_error(req, status);
                if (!NT_STATUS_IS_OK(error)) {
-                       smbd_server_connection_terminate(req->conn,
+                       smbd_server_connection_terminate(req->sconn,
                                                         nt_errstr(error));
                        return;
                }
@@ -147,19 +276,17 @@ static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq)
        out_input_offset = SMB2_HDR_BODY + 0x30;
        out_output_offset = SMB2_HDR_BODY + 0x30;
 
-       inbody = (const uint8_t *)req->in.vector[i+1].iov_base;
+       inbody = SMBD_SMB2_IN_BODY_PTR(req);
 
        in_ctl_code             = IVAL(inbody, 0x04);
        in_file_id_persistent   = BVAL(inbody, 0x08);
        in_file_id_volatile     = BVAL(inbody, 0x10);
 
-       outhdr = (uint8_t *)req->out.vector[i].iov_base;
-
        outbody = data_blob_talloc(req->out.vector, NULL, 0x30);
        if (outbody.data == NULL) {
                error = smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
                if (!NT_STATUS_IS_OK(error)) {
-                       smbd_server_connection_terminate(req->conn,
+                       smbd_server_connection_terminate(req->sconn,
                                                         nt_errstr(error));
                        return;
                }
@@ -194,29 +321,17 @@ static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq)
        error = smbd_smb2_request_done_ex(req, status, outbody, &outdyn,
                                          __location__);
        if (!NT_STATUS_IS_OK(error)) {
-               smbd_server_connection_terminate(req->conn,
+               smbd_server_connection_terminate(req->sconn,
                                                 nt_errstr(error));
                return;
        }
 }
 
-struct smbd_smb2_ioctl_state {
-       struct smbd_smb2_request *smb2req;
-       struct smb_request *smbreq;
-       files_struct *fsp;
-       DATA_BLOB in_input;
-       uint32_t in_max_output;
-       DATA_BLOB out_output;
-};
-
-static void smbd_smb2_ioctl_pipe_write_done(struct tevent_req *subreq);
-static void smbd_smb2_ioctl_pipe_read_done(struct tevent_req *subreq);
-
 static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
                                               struct tevent_context *ev,
                                               struct smbd_smb2_request *smb2req,
+                                              struct files_struct *fsp,
                                               uint32_t in_ctl_code,
-                                              uint64_t in_file_id_volatile,
                                               DATA_BLOB in_input,
                                               uint32_t in_max_output,
                                               uint32_t in_flags)
@@ -224,8 +339,6 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
        struct tevent_req *req;
        struct smbd_smb2_ioctl_state *state;
        struct smb_request *smbreq;
-       files_struct *fsp = NULL;
-       struct tevent_req *subreq;
 
        req = tevent_req_create(mem_ctx, &state,
                                struct smbd_smb2_ioctl_state);
@@ -234,13 +347,15 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
        }
        state->smb2req = smb2req;
        state->smbreq = NULL;
-       state->fsp = NULL;
+       state->fsp = fsp;
        state->in_input = in_input;
        state->in_max_output = in_max_output;
        state->out_output = data_blob_null;
 
-       DEBUG(10,("smbd_smb2_ioctl: file_id[0x%016llX]\n",
-                 (unsigned long long)in_file_id_volatile));
+       DEBUG(10, ("smbd_smb2_ioctl: ctl_code[0x%08x] %s, %s\n",
+                  (unsigned)in_ctl_code,
+                  fsp ? fsp_str_dbg(fsp) : "<no handle>",
+                  fsp_fnum_dbg(fsp)));
 
        smbreq = smbd_smb2_fake_smb_request(smb2req);
        if (tevent_req_nomem(smbreq, req)) {
@@ -248,208 +363,45 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
        }
        state->smbreq = smbreq;
 
-       if (in_file_id_volatile != UINT64_MAX) {
-               fsp = file_fsp(smbreq, (uint16_t)in_file_id_volatile);
-               if (fsp == NULL) {
-                       tevent_req_nterror(req, NT_STATUS_FILE_CLOSED);
-                       return tevent_req_post(req, ev);
-               }
-               if (smbreq->conn != fsp->conn) {
-                       tevent_req_nterror(req, NT_STATUS_FILE_CLOSED);
-                       return tevent_req_post(req, ev);
-               }
-               if (smb2req->session->vuid != fsp->vuid) {
-                       tevent_req_nterror(req, NT_STATUS_FILE_CLOSED);
-                       return tevent_req_post(req, ev);
-               }
-               state->fsp = fsp;
-       }
-
-       switch (in_ctl_code) {
-       case 0x00060194: /* FSCTL_DFS_GET_REFERRALS */
-       {
-               uint16_t in_max_referral_level;
-               DATA_BLOB in_file_name_buffer;
-               char *in_file_name_string;
-               size_t in_file_name_string_size;
-               bool ok;
-               bool overflow = false;
-               NTSTATUS status;
-               int dfs_size;
-               char *dfs_data = NULL;
-
-               if (!IS_IPC(smbreq->conn)) {
-                       tevent_req_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
-                       return tevent_req_post(req, ev);
-               }
-
-               if (!lp_host_msdfs()) {
-                       tevent_req_nterror(req, NT_STATUS_FS_DRIVER_REQUIRED);
-                       return tevent_req_post(req, ev);
-               }
-
-               if (in_input.length < (2 + 2)) {
-                       tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
-                       return tevent_req_post(req, ev);
-               }
-
-               in_max_referral_level = SVAL(in_input.data, 0);
-               in_file_name_buffer.data = in_input.data + 2;
-               in_file_name_buffer.length = in_input.length - 2;
-
-               ok = convert_string_talloc(state, CH_UTF16, CH_UNIX,
-                                          in_file_name_buffer.data,
-                                          in_file_name_buffer.length,
-                                          &in_file_name_string,
-                                          &in_file_name_string_size, false);
-               if (!ok) {
-                       tevent_req_nterror(req, NT_STATUS_ILLEGAL_CHARACTER);
-                       return tevent_req_post(req, ev);
-               }
-
-               dfs_size = setup_dfs_referral(smbreq->conn,
-                                             in_file_name_string,
-                                             in_max_referral_level,
-                                             &dfs_data, &status);
-               if (dfs_size < 0) {
-                       tevent_req_nterror(req, status);
-                       return tevent_req_post(req, ev);
-               }
-
-               if (dfs_size > in_max_output) {
-                       /*
-                        * TODO: we need a testsuite for this
-                        */
-                       overflow = true;
-                       dfs_size = in_max_output;
-               }
-
-               state->out_output = data_blob_talloc(state,
-                                                    (uint8_t *)dfs_data,
-                                                    dfs_size);
-               SAFE_FREE(dfs_data);
-               if (dfs_size > 0 &&
-                   tevent_req_nomem(state->out_output.data, req)) {
-                       return tevent_req_post(req, ev);
-               }
-
-               if (overflow) {
-                       tevent_req_nterror(req, STATUS_BUFFER_OVERFLOW);
-               } else {
-                       tevent_req_done(req);
-               }
-               return tevent_req_post(req, ev);
-       }
-       case 0x0011C017: /* FSCTL_PIPE_TRANSCEIVE */
-
-               if (!IS_IPC(smbreq->conn)) {
-                       tevent_req_nterror(req, NT_STATUS_NOT_SUPPORTED);
-                       return tevent_req_post(req, ev);
-               }
-
-               if (fsp == NULL) {
-                       tevent_req_nterror(req, NT_STATUS_FILE_CLOSED);
-                       return tevent_req_post(req, ev);
-               }
-
-               if (!fsp_is_np(fsp)) {
-                       tevent_req_nterror(req, NT_STATUS_FILE_CLOSED);
-                       return tevent_req_post(req, ev);
-               }
-
-               subreq = np_write_send(state, ev,
-                                      fsp->fake_file_handle,
-                                      in_input.data,
-                                      in_input.length);
-               if (tevent_req_nomem(subreq, req)) {
-                       return tevent_req_post(req, ev);
-               }
-               tevent_req_set_callback(subreq,
-                                       smbd_smb2_ioctl_pipe_write_done,
-                                       req);
-               return req;
-
+       switch (in_ctl_code & IOCTL_DEV_TYPE_MASK) {
+       case FSCTL_DFS:
+               return smb2_ioctl_dfs(in_ctl_code, ev, req, state);
+               break;
+       case FSCTL_FILESYSTEM:
+               return smb2_ioctl_filesys(in_ctl_code, ev, req, state);
+               break;
+       case FSCTL_NAMED_PIPE:
+               return smb2_ioctl_named_pipe(in_ctl_code, ev, req, state);
+               break;
+       case FSCTL_NETWORK_FILESYSTEM:
+               return smb2_ioctl_network_fs(in_ctl_code, ev, req, state);
+               break;
        default:
                if (IS_IPC(smbreq->conn)) {
                        tevent_req_nterror(req, NT_STATUS_FS_DRIVER_REQUIRED);
-                       return tevent_req_post(req, ev);
+               } else {
+                       tevent_req_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
                }
-               tevent_req_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
+
                return tevent_req_post(req, ev);
+               break;
        }
 
        tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
        return tevent_req_post(req, ev);
 }
 
-static void smbd_smb2_ioctl_pipe_write_done(struct tevent_req *subreq)
-{
-       struct tevent_req *req = tevent_req_callback_data(subreq,
-                                struct tevent_req);
-       struct smbd_smb2_ioctl_state *state = tevent_req_data(req,
-                                             struct smbd_smb2_ioctl_state);
-       NTSTATUS status;
-       ssize_t nwritten = -1;
-
-       status = np_write_recv(subreq, &nwritten);
-       TALLOC_FREE(subreq);
-       if (!NT_STATUS_IS_OK(status)) {
-               tevent_req_nterror(req, status);
-               return;
-       }
-
-       if (nwritten != state->in_input.length) {
-               tevent_req_nterror(req, NT_STATUS_PIPE_NOT_AVAILABLE);
-               return;
-       }
-
-       state->out_output = data_blob_talloc(state, NULL, state->in_max_output);
-       if (state->in_max_output > 0 &&
-           tevent_req_nomem(state->out_output.data, req)) {
-               return;
-       }
-
-       subreq = np_read_send(state->smbreq->conn,
-                             state->smb2req->conn->smb2.event_ctx,
-                             state->fsp->fake_file_handle,
-                             state->out_output.data,
-                             state->out_output.length);
-       if (tevent_req_nomem(subreq, req)) {
-               return;
-       }
-       tevent_req_set_callback(subreq, smbd_smb2_ioctl_pipe_read_done, req);
-}
-
-static void smbd_smb2_ioctl_pipe_read_done(struct tevent_req *subreq)
-{
-       struct tevent_req *req = tevent_req_callback_data(subreq,
-                                struct tevent_req);
-       struct smbd_smb2_ioctl_state *state = tevent_req_data(req,
-                                             struct smbd_smb2_ioctl_state);
-       NTSTATUS status;
-       ssize_t nread;
-       bool is_data_outstanding;
-
-       status = np_read_recv(subreq, &nread, &is_data_outstanding);
-       TALLOC_FREE(subreq);
-       if (!NT_STATUS_IS_OK(status)) {
-               tevent_req_nterror(req, status);
-               return;
-       }
-
-       state->out_output.length = nread;
-
-       tevent_req_done(req);
-}
-
 static NTSTATUS smbd_smb2_ioctl_recv(struct tevent_req *req,
                                     TALLOC_CTX *mem_ctx,
-                                    DATA_BLOB *out_output)
+                                    DATA_BLOB *out_output,
+                                    bool *disconnect)
 {
-       NTSTATUS status;
+       NTSTATUS status = NT_STATUS_OK;
        struct smbd_smb2_ioctl_state *state = tevent_req_data(req,
                                              struct smbd_smb2_ioctl_state);
 
+       *disconnect = state->disconnect;
+
        if (tevent_req_is_nterror(req, &status)) {
                if (!NT_STATUS_EQUAL(status, STATUS_BUFFER_OVERFLOW)) {
                        tevent_req_received(req);