s3:smb2_ioctl: Fix Coverity ID 701771 Uninitialized scalar variable
[samba.git] / source3 / smbd / smb2_ioctl.c
index 4a00e9d5629a032c73f67f4c12193a4cd0a07b61..37acf11767c0ac2f882aba2e2464b1536103b386 100644 (file)
 */
 
 #include "includes.h"
+#include "smbd/smbd.h"
 #include "smbd/globals.h"
-#include "../source4/libcli/smb2/smb2_constants.h"
+#include "../libcli/smb/smb_common.h"
+#include "../lib/util/tevent_ntstatus.h"
+#include "rpc_server/srv_pipe_hnd.h"
+#include "include/ntioctl.h"
+#include "../librpc/ndr/libndr.h"
 
 static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
                                               struct tevent_context *ev,
@@ -32,16 +37,15 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
                                               uint32_t in_flags);
 static NTSTATUS smbd_smb2_ioctl_recv(struct tevent_req *req,
                                     TALLOC_CTX *mem_ctx,
-                                    DATA_BLOB *out_output);
+                                    DATA_BLOB *out_output,
+                                    bool *disconnect);
 
 static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq);
 NTSTATUS smbd_smb2_request_process_ioctl(struct smbd_smb2_request *req)
 {
-       const uint8_t *inhdr;
+       NTSTATUS status;
        const uint8_t *inbody;
        int i = req->current_idx;
-       size_t expected_body_size = 0x39;
-       size_t body_size;
        uint32_t in_ctl_code;
        uint64_t in_file_id_persistent;
        uint64_t in_file_id_volatile;
@@ -52,18 +56,12 @@ NTSTATUS smbd_smb2_request_process_ioctl(struct smbd_smb2_request *req)
        uint32_t in_flags;
        struct tevent_req *subreq;
 
-       inhdr = (const uint8_t *)req->in.vector[i+0].iov_base;
-       if (req->in.vector[i+1].iov_len != (expected_body_size & 0xFFFFFFFE)) {
-               return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
+       status = smbd_smb2_request_verify_sizes(req, 0x39);
+       if (!NT_STATUS_IS_OK(status)) {
+               return smbd_smb2_request_error(req, status);
        }
-
        inbody = (const uint8_t *)req->in.vector[i+1].iov_base;
 
-       body_size = SVAL(inbody, 0x00);
-       if (body_size != expected_body_size) {
-               return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
-       }
-
        in_ctl_code             = IVAL(inbody, 0x04);
        in_file_id_persistent   = BVAL(inbody, 0x08);
        in_file_id_volatile     = BVAL(inbody, 0x10);
@@ -72,7 +70,16 @@ NTSTATUS smbd_smb2_request_process_ioctl(struct smbd_smb2_request *req)
        in_max_output_length    = IVAL(inbody, 0x2C);
        in_flags                = IVAL(inbody, 0x30);
 
-       if (in_input_offset != (SMB2_HDR_BODY + (body_size & 0xFFFFFFFE))) {
+       /*
+        * InputOffset (4 bytes): The offset, in bytes, from the beginning of
+        * the SMB2 header to the input data buffer. If no input data is
+        * required for the FSCTL/IOCTL command being issued, the client SHOULD
+        * set this value to 0.<49>
+        * <49> If no input data is required for the FSCTL/IOCTL command being
+        * issued, Windows-based clients set this field to any value.
+        */
+       if ((in_input_length > 0)
+        && (in_input_offset != (SMB2_HDR_BODY + req->in.vector[i+1].iov_len))) {
                return smbd_smb2_request_error(req, NT_STATUS_INVALID_PARAMETER);
        }
 
@@ -83,15 +90,17 @@ NTSTATUS smbd_smb2_request_process_ioctl(struct smbd_smb2_request *req)
        in_input_buffer.data = (uint8_t *)req->in.vector[i+2].iov_base;
        in_input_buffer.length = in_input_length;
 
-       if (in_file_id_persistent == UINT64_MAX &&
-           in_file_id_volatile == UINT64_MAX) {
+       if (req->compat_chain_fsp) {
+               /* skip check */
+       } else if (in_file_id_persistent == UINT64_MAX &&
+                  in_file_id_volatile == UINT64_MAX) {
                /* without a handle */
-       } else if (in_file_id_persistent != 0) {
+       } else if (in_file_id_persistent != in_file_id_volatile) {
                return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
        }
 
        subreq = smbd_smb2_ioctl_send(req,
-                                     req->conn->smb2.event_ctx,
+                                     req->sconn->ev_ctx,
                                      req,
                                      in_ctl_code,
                                      in_file_id_volatile,
@@ -102,45 +111,71 @@ NTSTATUS smbd_smb2_request_process_ioctl(struct smbd_smb2_request *req)
                return smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
        }
        tevent_req_set_callback(subreq, smbd_smb2_request_ioctl_done, req);
-       return NT_STATUS_OK;
+
+       return smbd_smb2_request_pending_queue(req, subreq, 1000);
 }
 
 static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq)
 {
        struct smbd_smb2_request *req = tevent_req_callback_data(subreq,
                                        struct smbd_smb2_request);
+       const uint8_t *inbody;
        int i = req->current_idx;
-       uint8_t *outhdr;
        DATA_BLOB outbody;
        DATA_BLOB outdyn;
+       uint32_t in_ctl_code;
+       uint64_t in_file_id_persistent;
+       uint64_t in_file_id_volatile;
+       uint32_t out_input_offset;
        uint32_t out_output_offset;
-       DATA_BLOB out_output_buffer;
+       DATA_BLOB out_output_buffer = data_blob_null;
        NTSTATUS status;
        NTSTATUS error; /* transport error */
+       bool disconnect = false;
+
+       status = smbd_smb2_ioctl_recv(subreq, req,
+                                     &out_output_buffer,
+                                     &disconnect);
+
+       DEBUG(10,("smbd_smb2_request_ioctl_done: smbd_smb2_ioctl_recv returned "
+               "%u status %s\n",
+               (unsigned int)out_output_buffer.length,
+               nt_errstr(status) ));
 
-       status = smbd_smb2_ioctl_recv(subreq, req, &out_output_buffer);
        TALLOC_FREE(subreq);
+       if (disconnect) {
+               error = status;
+               smbd_server_connection_terminate(req->sconn,
+                                                nt_errstr(error));
+               return;
+       }
+
        if (NT_STATUS_EQUAL(status, STATUS_BUFFER_OVERFLOW)) {
                /* also ok */
        } else if (!NT_STATUS_IS_OK(status)) {
                error = smbd_smb2_request_error(req, status);
                if (!NT_STATUS_IS_OK(error)) {
-                       smbd_server_connection_terminate(req->conn,
+                       smbd_server_connection_terminate(req->sconn,
                                                         nt_errstr(error));
                        return;
                }
                return;
        }
 
+       out_input_offset = SMB2_HDR_BODY + 0x30;
        out_output_offset = SMB2_HDR_BODY + 0x30;
 
-       outhdr = (uint8_t *)req->out.vector[i].iov_base;
+       inbody = (const uint8_t *)req->in.vector[i+1].iov_base;
+
+       in_ctl_code             = IVAL(inbody, 0x04);
+       in_file_id_persistent   = BVAL(inbody, 0x08);
+       in_file_id_volatile     = BVAL(inbody, 0x10);
 
        outbody = data_blob_talloc(req->out.vector, NULL, 0x30);
        if (outbody.data == NULL) {
                error = smbd_smb2_request_error(req, NT_STATUS_NO_MEMORY);
                if (!NT_STATUS_IS_OK(error)) {
-                       smbd_server_connection_terminate(req->conn,
+                       smbd_server_connection_terminate(req->sconn,
                                                         nt_errstr(error));
                        return;
                }
@@ -149,10 +184,14 @@ static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq)
 
        SSVAL(outbody.data, 0x00, 0x30 + 1);    /* struct size */
        SSVAL(outbody.data, 0x02, 0);           /* reserved */
-       SIVAL(outbody.data, 0x04, 0);           /* ctl code */
-       SBVAL(outbody.data, 0x08, 0);           /* file id (persistent) */
-       SBVAL(outbody.data, 0x10, 0);           /* file id (volatile) */
-       SIVAL(outbody.data, 0x18, 0);           /* input offset */
+       SIVAL(outbody.data, 0x04,
+             in_ctl_code);                     /* ctl code */
+       SBVAL(outbody.data, 0x08,
+             in_file_id_persistent);           /* file id (persistent) */
+       SBVAL(outbody.data, 0x10,
+             in_file_id_volatile);             /* file id (volatile) */
+       SIVAL(outbody.data, 0x18,
+             out_input_offset);                /* input offset */
        SIVAL(outbody.data, 0x1C, 0);           /* input count */
        SIVAL(outbody.data, 0x20,
              out_output_offset);               /* output offset */
@@ -162,16 +201,16 @@ static void smbd_smb2_request_ioctl_done(struct tevent_req *subreq)
        SIVAL(outbody.data, 0x2C, 0);           /* reserved */
 
        /*
-        * Note: Windows sends back also the input from the request.
-        *       I think this is stupid and I hope not required.
-        *       For now we avoid a talloc + memcopy here...
+        * Note: Windows Vista and 2008 send back also the
+        *       input from the request. But it was fixed in
+        *       Windows 7.
         */
        outdyn = out_output_buffer;
 
        error = smbd_smb2_request_done_ex(req, status, outbody, &outdyn,
                                          __location__);
        if (!NT_STATUS_IS_OK(error)) {
-               smbd_server_connection_terminate(req->conn,
+               smbd_server_connection_terminate(req->sconn,
                                                 nt_errstr(error));
                return;
        }
@@ -184,6 +223,7 @@ struct smbd_smb2_ioctl_state {
        DATA_BLOB in_input;
        uint32_t in_max_output;
        DATA_BLOB out_output;
+       bool disconnect;
 };
 
 static void smbd_smb2_ioctl_pipe_write_done(struct tevent_req *subreq);
@@ -216,8 +256,9 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
        state->in_max_output = in_max_output;
        state->out_output = data_blob_null;
 
-       DEBUG(10,("smbd_smb2_ioctl: file_id[0x%016llX]\n",
-                 (unsigned long long)in_file_id_volatile));
+       DEBUG(10, ("smbd_smb2_ioctl: ctl_code[0x%08x] file_id[0x%016llX]\n",
+                  (unsigned)in_ctl_code,
+                  (unsigned long long)in_file_id_volatile));
 
        smbreq = smbd_smb2_fake_smb_request(smb2req);
        if (tevent_req_nomem(smbreq, req)) {
@@ -278,7 +319,7 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
                                           in_file_name_buffer.data,
                                           in_file_name_buffer.length,
                                           &in_file_name_string,
-                                          &in_file_name_string_size, false);
+                                          &in_file_name_string_size);
                if (!ok) {
                        tevent_req_nterror(req, NT_STATUS_ILLEGAL_CHARACTER);
                        return tevent_req_post(req, ev);
@@ -311,7 +352,7 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
                }
 
                if (overflow) {
-                       tevent_req_nterror(STATUS_BUFFER_OVERFLOW);
+                       tevent_req_nterror(req, STATUS_BUFFER_OVERFLOW);
                } else {
                        tevent_req_done(req);
                }
@@ -320,7 +361,7 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
        case 0x0011C017: /* FSCTL_PIPE_TRANSCEIVE */
 
                if (!IS_IPC(smbreq->conn)) {
-                       tevent_req_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
+                       tevent_req_nterror(req, NT_STATUS_NOT_SUPPORTED);
                        return tevent_req_post(req, ev);
                }
 
@@ -334,6 +375,9 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
                        return tevent_req_post(req, ev);
                }
 
+               DEBUG(10,("smbd_smb2_ioctl_send: np_write_send of size %u\n",
+                       (unsigned int)in_input.length ));
+
                subreq = np_write_send(state, ev,
                                       fsp->fake_file_handle,
                                       in_input.data,
@@ -346,15 +390,212 @@ static struct tevent_req *smbd_smb2_ioctl_send(TALLOC_CTX *mem_ctx,
                                        req);
                return req;
 
-       default:
-               if (IS_IPC(smbreq->conn)) {
-                       tevent_req_nterror(req, NT_STATUS_FS_DRIVER_REQUIRED);
+       case FSCTL_VALIDATE_NEGOTIATE_INFO_224:
+       {
+               struct smbXsrv_connection *conn = smbreq->sconn->conn;
+               uint32_t in_capabilities;
+               DATA_BLOB in_guid_blob;
+               struct GUID in_guid;
+               uint16_t in_security_mode;
+               uint16_t in_max_dialect;
+               uint16_t max_dialect;
+               DATA_BLOB out_guid_blob;
+               NTSTATUS status;
+
+               if (in_input.length != 0x18) {
+                       tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
+                       return tevent_req_post(req, ev);
+               }
+
+               if (in_max_output < 0x18) {
+                       tevent_req_nterror(req, NT_STATUS_BUFFER_TOO_SMALL);
+                       return tevent_req_post(req, ev);
+               }
+
+               in_capabilities = IVAL(in_input.data, 0x00);
+               in_guid_blob = data_blob_const(in_input.data + 0x04, 16);
+               in_security_mode = SVAL(in_input.data, 0x14);
+               in_max_dialect = SVAL(in_input.data, 0x16);
+
+               status = GUID_from_ndr_blob(&in_guid_blob, &in_guid);
+               if (tevent_req_nterror(req, status)) {
+                       return tevent_req_post(req, ev);
+               }
+
+               max_dialect = conn->smb2.client.dialects[conn->smb2.client.num_dialects-1];
+               if (in_max_dialect != max_dialect) {
+                       state->disconnect = true;
+                       tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                       return tevent_req_post(req, ev);
+               }
+
+               if (!GUID_compare(&in_guid, &conn->smb2.client.guid)) {
+                       state->disconnect = true;
+                       tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                       return tevent_req_post(req, ev);
+               }
+
+               if (in_security_mode != conn->smb2.client.security_mode) {
+                       state->disconnect = true;
+                       tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                       return tevent_req_post(req, ev);
+               }
+
+               if (in_capabilities != conn->smb2.client.capabilities) {
+                       state->disconnect = true;
+                       tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                       return tevent_req_post(req, ev);
+               }
+
+               status = GUID_to_ndr_blob(&conn->smb2.server.guid, state,
+                                         &out_guid_blob);
+               if (tevent_req_nterror(req, status)) {
+                       return tevent_req_post(req, ev);
+               }
+
+               state->out_output = data_blob_talloc(state, NULL, 0x18);
+               if (tevent_req_nomem(state->out_output.data, req)) {
+                       return tevent_req_post(req, ev);
+               }
+
+               SIVAL(state->out_output.data, 0x00, conn->smb2.server.capabilities);
+               memcpy(state->out_output.data+0x04, out_guid_blob.data, 16);
+               SIVAL(state->out_output.data, 0x14, conn->smb2.server.security_mode);
+               SIVAL(state->out_output.data, 0x16, conn->smb2.server.dialect);
+
+               tevent_req_done(req);
+               return tevent_req_post(req, ev);
+       }
+
+       case FSCTL_VALIDATE_NEGOTIATE_INFO:
+       {
+               struct smbXsrv_connection *conn = smbreq->sconn->conn;
+               uint32_t in_capabilities;
+               DATA_BLOB in_guid_blob;
+               struct GUID in_guid;
+               uint16_t in_security_mode;
+               uint16_t in_num_dialects;
+               uint16_t i;
+               DATA_BLOB out_guid_blob;
+               NTSTATUS status;
+
+               if (in_input.length < 0x18) {
+                       tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
+                       return tevent_req_post(req, ev);
+               }
+
+               in_capabilities = IVAL(in_input.data, 0x00);
+               in_guid_blob = data_blob_const(in_input.data + 0x04, 16);
+               in_security_mode = SVAL(in_input.data, 0x14);
+               in_num_dialects = SVAL(in_input.data, 0x16);
+
+               if (in_input.length != (0x18 + in_num_dialects*2)) {
+                       tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
+                       return tevent_req_post(req, ev);
+               }
+
+               if (in_max_output < 0x18) {
+                       tevent_req_nterror(req, NT_STATUS_BUFFER_TOO_SMALL);
+                       return tevent_req_post(req, ev);
+               }
+
+               status = GUID_from_ndr_blob(&in_guid_blob, &in_guid);
+               if (tevent_req_nterror(req, status)) {
+                       return tevent_req_post(req, ev);
+               }
+
+               if (in_num_dialects != conn->smb2.client.num_dialects) {
+                       state->disconnect = true;
+                       tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                       return tevent_req_post(req, ev);
+               }
+
+               for (i=0; i < in_num_dialects; i++) {
+                       uint16_t v = SVAL(in_input.data, 0x18 + i*2);
+
+                       if (conn->smb2.client.dialects[i] != v) {
+                               state->disconnect = true;
+                               tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                               return tevent_req_post(req, ev);
+                       }
+               }
+
+               if (!GUID_compare(&in_guid, &conn->smb2.client.guid)) {
+                       state->disconnect = true;
+                       tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                       return tevent_req_post(req, ev);
+               }
+
+               if (in_security_mode != conn->smb2.client.security_mode) {
+                       state->disconnect = true;
+                       tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                       return tevent_req_post(req, ev);
+               }
+
+               if (in_capabilities != conn->smb2.client.capabilities) {
+                       state->disconnect = true;
+                       tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                       return tevent_req_post(req, ev);
+               }
+
+               status = GUID_to_ndr_blob(&conn->smb2.server.guid, state,
+                                         &out_guid_blob);
+               if (tevent_req_nterror(req, status)) {
+                       return tevent_req_post(req, ev);
+               }
+
+               state->out_output = data_blob_talloc(state, NULL, 0x18);
+               if (tevent_req_nomem(state->out_output.data, req)) {
                        return tevent_req_post(req, ev);
                }
-               tevent_req_nterror(req, NT_STATUS_INVALID_DEVICE_REQUEST);
+
+               SIVAL(state->out_output.data, 0x00, conn->smb2.server.capabilities);
+               memcpy(state->out_output.data+0x04, out_guid_blob.data, 16);
+               SIVAL(state->out_output.data, 0x14, conn->smb2.server.security_mode);
+               SIVAL(state->out_output.data, 0x16, conn->smb2.server.dialect);
+
+               tevent_req_done(req);
                return tevent_req_post(req, ev);
        }
 
+       default: {
+               uint8_t *out_data = NULL;
+               uint32_t out_data_len = 0;
+               NTSTATUS status;
+
+               if (fsp == NULL) {
+                       tevent_req_nterror(req, NT_STATUS_FILE_CLOSED);
+                       return tevent_req_post(req, ev);
+               }
+
+               status = SMB_VFS_FSCTL(fsp,
+                                      state,
+                                      in_ctl_code,
+                                      smbreq->flags2,
+                                      in_input.data,
+                                      in_input.length,
+                                      &out_data,
+                                      in_max_output,
+                                      &out_data_len);
+               state->out_output = data_blob_const(out_data, out_data_len);
+               if (NT_STATUS_IS_OK(status)) {
+                       tevent_req_done(req);
+                       return tevent_req_post(req, ev);
+               }
+
+               if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED)) {
+                       if (IS_IPC(smbreq->conn)) {
+                               status = NT_STATUS_FS_DRIVER_REQUIRED;
+                       } else {
+                               status = NT_STATUS_INVALID_DEVICE_REQUEST;
+                       }
+               }
+
+               tevent_req_nterror(req, status);
+               return tevent_req_post(req, ev);
+       }
+       }
+
        tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
        return tevent_req_post(req, ev);
 }
@@ -369,6 +610,10 @@ static void smbd_smb2_ioctl_pipe_write_done(struct tevent_req *subreq)
        ssize_t nwritten = -1;
 
        status = np_write_recv(subreq, &nwritten);
+
+       DEBUG(10,("smbd_smb2_ioctl_pipe_write_done: received %ld\n",
+               (long int)nwritten ));
+
        TALLOC_FREE(subreq);
        if (!NT_STATUS_IS_OK(status)) {
                tevent_req_nterror(req, status);
@@ -386,8 +631,13 @@ static void smbd_smb2_ioctl_pipe_write_done(struct tevent_req *subreq)
                return;
        }
 
+       DEBUG(10,("smbd_smb2_ioctl_pipe_write_done: issuing np_read_send "
+               "of size %u\n",
+               (unsigned int)state->out_output.length ));
+
+       TALLOC_FREE(subreq);
        subreq = np_read_send(state->smbreq->conn,
-                             state->smb2req->conn->smb2.event_ctx,
+                             state->smb2req->sconn->ev_ctx,
                              state->fsp->fake_file_handle,
                              state->out_output.data,
                              state->out_output.length);
@@ -404,10 +654,17 @@ static void smbd_smb2_ioctl_pipe_read_done(struct tevent_req *subreq)
        struct smbd_smb2_ioctl_state *state = tevent_req_data(req,
                                              struct smbd_smb2_ioctl_state);
        NTSTATUS status;
-       ssize_t nread;
-       bool is_data_outstanding;
+       ssize_t nread = -1;
+       bool is_data_outstanding = false;
 
        status = np_read_recv(subreq, &nread, &is_data_outstanding);
+
+       DEBUG(10,("smbd_smb2_ioctl_pipe_read_done: np_read_recv nread = %d "
+                "is_data_outstanding = %d, status = %s\n",
+               (int)nread,
+               (int)is_data_outstanding,
+               nt_errstr(status) ));
+
        TALLOC_FREE(subreq);
        if (!NT_STATUS_IS_OK(status)) {
                tevent_req_nterror(req, status);
@@ -416,17 +673,25 @@ static void smbd_smb2_ioctl_pipe_read_done(struct tevent_req *subreq)
 
        state->out_output.length = nread;
 
+       if (is_data_outstanding) {
+               tevent_req_nterror(req, STATUS_BUFFER_OVERFLOW);
+               return;
+       }
+
        tevent_req_done(req);
 }
 
 static NTSTATUS smbd_smb2_ioctl_recv(struct tevent_req *req,
                                     TALLOC_CTX *mem_ctx,
-                                    DATA_BLOB *out_output)
+                                    DATA_BLOB *out_output,
+                                    bool *disconnect)
 {
-       NTSTATUS status;
+       NTSTATUS status = NT_STATUS_OK;
        struct smbd_smb2_ioctl_state *state = tevent_req_data(req,
                                              struct smbd_smb2_ioctl_state);
 
+       *disconnect = state->disconnect;
+
        if (tevent_req_is_nterror(req, &status)) {
                if (!NT_STATUS_EQUAL(status, STATUS_BUFFER_OVERFLOW)) {
                        tevent_req_received(req);