2009-06-02 14:38:37 +04:00
/*
Unix SMB / CIFS implementation .
Core SMB2 server
Copyright ( C ) Stefan Metzmacher 2009
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
2011-02-26 01:20:06 +03:00
# include "system/filesys.h"
2011-03-22 18:57:01 +03:00
# include "smbd/smbd.h"
2009-06-02 14:38:37 +04:00
# include "smbd/globals.h"
2009-08-12 19:52:55 +04:00
# include "../libcli/smb/smb_common.h"
2010-10-12 08:27:50 +04:00
# include "libcli/security/security.h"
2011-04-28 19:38:09 +04:00
# include "../lib/util/tevent_ntstatus.h"
2011-04-30 01:32:28 +04:00
# include "rpc_server/srv_pipe_hnd.h"
2015-10-12 16:57:34 +03:00
# include "lib/util/sys_rw_data.h"
2009-06-02 14:38:37 +04:00
2018-03-21 22:01:05 +03:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_SMB2
2009-06-05 14:26:19 +04:00
static struct tevent_req * smbd_smb2_read_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
2012-06-08 13:24:02 +04:00
struct files_struct * in_fsp ,
2015-05-06 11:52:57 +03:00
uint8_t in_flags ,
2009-06-05 14:26:19 +04:00
uint32_t in_length ,
uint64_t in_offset ,
uint32_t in_minimum ,
uint32_t in_remaining ) ;
static NTSTATUS smbd_smb2_read_recv ( struct tevent_req * req ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * out_data ,
uint32_t * out_remaining ) ;
static void smbd_smb2_request_read_done ( struct tevent_req * subreq ) ;
2009-06-02 14:38:37 +04:00
NTSTATUS smbd_smb2_request_process_read ( struct smbd_smb2_request * req )
{
2014-06-12 10:38:48 +04:00
struct smbXsrv_connection * xconn = req - > xconn ;
2011-09-06 16:01:43 +04:00
NTSTATUS status ;
2009-06-02 14:38:37 +04:00
const uint8_t * inbody ;
2015-05-06 11:52:57 +03:00
uint8_t in_flags ;
2009-06-02 14:38:37 +04:00
uint32_t in_length ;
uint64_t in_offset ;
uint64_t in_file_id_persistent ;
uint64_t in_file_id_volatile ;
2012-06-08 13:24:02 +04:00
struct files_struct * in_fsp ;
2009-06-02 14:38:37 +04:00
uint32_t in_minimum_count ;
uint32_t in_remaining_bytes ;
2009-06-05 14:26:19 +04:00
struct tevent_req * subreq ;
2009-06-02 14:38:37 +04:00
2011-09-06 16:01:43 +04:00
status = smbd_smb2_request_verify_sizes ( req , 0x31 ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return smbd_smb2_request_error ( req , status ) ;
2009-06-02 14:38:37 +04:00
}
2012-08-05 16:55:58 +04:00
inbody = SMBD_SMB2_IN_BODY_PTR ( req ) ;
2009-06-02 14:38:37 +04:00
2015-05-06 11:52:57 +03:00
if ( xconn - > protocol > = PROTOCOL_SMB3_02 ) {
in_flags = CVAL ( inbody , 0x03 ) ;
} else {
in_flags = 0 ;
}
2009-06-02 14:38:37 +04:00
in_length = IVAL ( inbody , 0x04 ) ;
in_offset = BVAL ( inbody , 0x08 ) ;
in_file_id_persistent = BVAL ( inbody , 0x10 ) ;
in_file_id_volatile = BVAL ( inbody , 0x18 ) ;
in_minimum_count = IVAL ( inbody , 0x20 ) ;
in_remaining_bytes = IVAL ( inbody , 0x28 ) ;
/* check the max read size */
2014-05-23 12:22:34 +04:00
if ( in_length > xconn - > smb2 . server . max_read ) {
2012-05-11 21:01:43 +04:00
DEBUG ( 2 , ( " smbd_smb2_request_process_read: "
" client ignored max read: %s: 0x%08X: 0x%08X \n " ,
2014-05-23 12:22:34 +04:00
__location__ , in_length , xconn - > smb2 . server . max_read ) ) ;
2009-06-02 14:38:37 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
2012-02-28 05:51:40 +04:00
status = smbd_smb2_request_verify_creditcharge ( req , in_length ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return smbd_smb2_request_error ( req , status ) ;
}
2012-06-08 13:24:02 +04:00
in_fsp = file_fsp_smb2 ( req , in_file_id_persistent , in_file_id_volatile ) ;
if ( in_fsp = = NULL ) {
2009-06-02 14:38:37 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_FILE_CLOSED ) ;
}
2018-12-27 17:18:55 +03:00
subreq = smbd_smb2_read_send ( req , req - > sconn - > ev_ctx ,
2012-06-08 13:24:02 +04:00
req , in_fsp ,
2015-05-06 11:52:57 +03:00
in_flags ,
2009-06-05 14:26:19 +04:00
in_length ,
in_offset ,
in_minimum_count ,
in_remaining_bytes ) ;
if ( subreq = = NULL ) {
return smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
}
tevent_req_set_callback ( subreq , smbd_smb2_request_read_done , req ) ;
2009-06-10 00:34:14 +04:00
2011-11-14 18:42:55 +04:00
return smbd_smb2_request_pending_queue ( req , subreq , 500 ) ;
2009-06-05 14:26:19 +04:00
}
static void smbd_smb2_request_read_done ( struct tevent_req * subreq )
{
struct smbd_smb2_request * req = tevent_req_callback_data ( subreq ,
struct smbd_smb2_request ) ;
2021-07-05 18:49:00 +03:00
uint16_t body_size ;
2021-07-05 18:49:00 +03:00
uint8_t body_padding = req - > xconn - > smb2 . smbtorture . read_body_padding ;
2009-06-05 14:26:19 +04:00
DATA_BLOB outbody ;
DATA_BLOB outdyn ;
uint8_t out_data_offset ;
2009-07-24 18:21:07 +04:00
DATA_BLOB out_data_buffer = data_blob_null ;
uint32_t out_data_remaining = 0 ;
2009-06-05 14:26:19 +04:00
NTSTATUS status ;
NTSTATUS error ; /* transport error */
status = smbd_smb2_read_recv ( subreq ,
req ,
& out_data_buffer ,
& out_data_remaining ) ;
TALLOC_FREE ( subreq ) ;
2009-06-02 14:38:37 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2009-06-05 14:26:19 +04:00
error = smbd_smb2_request_error ( req , status ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2014-06-11 14:15:48 +04:00
smbd_server_connection_terminate ( req - > xconn ,
2009-06-05 14:26:19 +04:00
nt_errstr ( error ) ) ;
return ;
}
2009-06-05 16:31:41 +04:00
return ;
2009-06-02 14:38:37 +04:00
}
2021-07-05 18:49:00 +03:00
/*
* Only FSCTL_SMBTORTURE_GLOBAL_READ_RESPONSE_BODY_PADDING8
* sets body_padding to a value different from 0.
*/
body_size = 0x10 + body_padding ;
2021-07-05 18:49:00 +03:00
out_data_offset = SMB2_HDR_BODY + body_size ;
2009-06-02 14:38:37 +04:00
2021-07-05 18:49:00 +03:00
outbody = smbd_smb2_generate_outbody ( req , body_size ) ;
2009-06-02 14:38:37 +04:00
if ( outbody . data = = NULL ) {
2009-06-05 14:26:19 +04:00
error = smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2014-06-11 14:15:48 +04:00
smbd_server_connection_terminate ( req - > xconn ,
2009-06-05 14:26:19 +04:00
nt_errstr ( error ) ) ;
return ;
}
2009-06-05 16:31:41 +04:00
return ;
2009-06-02 14:38:37 +04:00
}
SSVAL ( outbody . data , 0x00 , 0x10 + 1 ) ; /* struct size */
SCVAL ( outbody . data , 0x02 ,
out_data_offset ) ; /* data offset */
SCVAL ( outbody . data , 0x03 , 0 ) ; /* reserved */
SIVAL ( outbody . data , 0x04 ,
out_data_buffer . length ) ; /* data length */
SIVAL ( outbody . data , 0x08 ,
out_data_remaining ) ; /* data remaining */
SIVAL ( outbody . data , 0x0C , 0 ) ; /* reserved */
2021-07-05 18:49:00 +03:00
if ( body_padding ! = 0 ) {
memset ( outbody . data + 0x10 , 0 , body_padding ) ;
}
2009-06-02 14:38:37 +04:00
outdyn = out_data_buffer ;
2009-06-05 14:26:19 +04:00
error = smbd_smb2_request_done ( req , outbody , & outdyn ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2014-06-11 14:15:48 +04:00
smbd_server_connection_terminate ( req - > xconn ,
2009-06-05 14:26:19 +04:00
nt_errstr ( error ) ) ;
return ;
}
2009-06-02 14:38:37 +04:00
}
2009-06-05 14:26:19 +04:00
struct smbd_smb2_read_state {
struct smbd_smb2_request * smb2req ;
2011-11-14 12:33:22 +04:00
struct smb_request * smbreq ;
2010-06-09 21:48:12 +04:00
files_struct * fsp ;
2015-05-06 11:52:57 +03:00
uint8_t in_flags ;
2010-06-09 21:48:12 +04:00
uint32_t in_length ;
uint64_t in_offset ;
uint32_t in_minimum ;
2013-10-14 16:18:26 +04:00
DATA_BLOB out_headers ;
2013-12-04 15:32:36 +04:00
uint8_t _out_hdr_buf [ NBT_HDR_SIZE + SMB2_HDR_BODY + 0x10 ] ;
2009-06-05 14:26:19 +04:00
DATA_BLOB out_data ;
uint32_t out_remaining ;
} ;
2013-12-04 15:32:36 +04:00
static int smb2_smb2_read_state_deny_destructor ( struct smbd_smb2_read_state * state )
{
return - 1 ;
}
2010-12-15 00:36:08 +03:00
/* struct smbd_smb2_read_state destructor. Send the SMB2_READ data. */
static int smb2_sendfile_send_data ( struct smbd_smb2_read_state * state )
{
struct lock_struct lock ;
uint32_t in_length = state - > in_length ;
uint64_t in_offset = state - > in_offset ;
files_struct * fsp = state - > fsp ;
2014-07-10 23:08:06 +04:00
const DATA_BLOB * hdr = state - > smb2req - > queue_entry . sendfile_header ;
2014-07-11 04:25:00 +04:00
NTSTATUS * pstatus = state - > smb2req - > queue_entry . sendfile_status ;
2014-06-12 10:38:48 +04:00
struct smbXsrv_connection * xconn = state - > smb2req - > xconn ;
2010-12-15 00:36:08 +03:00
ssize_t nread ;
2014-07-10 23:08:06 +04:00
ssize_t ret ;
2014-05-23 14:59:43 +04:00
int saved_errno ;
2010-12-15 00:36:08 +03:00
2014-05-22 01:23:34 +04:00
nread = SMB_VFS_SENDFILE ( xconn - > transport . sock ,
2013-10-14 16:18:26 +04:00
fsp ,
2014-07-10 23:08:06 +04:00
hdr ,
2013-10-14 16:18:26 +04:00
in_offset ,
in_length ) ;
2010-12-15 00:36:08 +03:00
DEBUG ( 10 , ( " smb2_sendfile_send_data: SMB_VFS_SENDFILE returned %d on file %s \n " ,
( int ) nread ,
fsp_str_dbg ( fsp ) ) ) ;
if ( nread = = - 1 ) {
2014-05-23 14:59:43 +04:00
saved_errno = errno ;
2014-07-10 23:08:06 +04:00
/*
* Returning ENOSYS means no data at all was sent .
Do this as a normal read . */
if ( errno = = ENOSYS ) {
goto normal_read ;
}
2017-01-10 16:30:30 +03:00
if ( errno = = ENOTSUP ) {
set_use_sendfile ( SNUM ( fsp - > conn ) , false ) ;
DBG_WARNING ( " Disabling sendfile use as sendfile is "
" not supported by the system \n " ) ;
goto normal_read ;
}
2014-07-10 23:08:06 +04:00
if ( errno = = EINTR ) {
2010-12-15 00:36:08 +03:00
/*
2014-07-10 23:08:06 +04:00
* Special hack for broken Linux with no working sendfile . If we
* return EINTR we sent the header but not the rest of the data .
* Fake this up by doing read / write calls .
*/
2010-12-15 00:36:08 +03:00
set_use_sendfile ( SNUM ( fsp - > conn ) , false ) ;
2014-06-12 10:40:25 +04:00
nread = fake_sendfile ( xconn , fsp , in_offset , in_length ) ;
2010-12-15 00:36:08 +03:00
if ( nread = = - 1 ) {
2014-05-23 14:59:43 +04:00
saved_errno = errno ;
DEBUG ( 0 , ( " smb2_sendfile_send_data: fake_sendfile "
" failed for file %s (%s) for client %s. "
" Terminating \n " ,
fsp_str_dbg ( fsp ) , strerror ( saved_errno ) ,
smbXsrv_connection_dbg ( xconn ) ) ) ;
2014-07-11 04:25:00 +04:00
* pstatus = map_nt_error_from_unix_common ( saved_errno ) ;
return 0 ;
2010-12-15 00:36:08 +03:00
}
goto out ;
}
DEBUG ( 0 , ( " smb2_sendfile_send_data: sendfile failed for file "
2014-05-23 14:59:43 +04:00
" %s (%s) for client %s. Terminating \n " ,
fsp_str_dbg ( fsp ) , strerror ( saved_errno ) ,
smbXsrv_connection_dbg ( xconn ) ) ) ;
2014-07-11 04:25:00 +04:00
* pstatus = map_nt_error_from_unix_common ( saved_errno ) ;
return 0 ;
2010-12-15 00:36:08 +03:00
} else if ( nread = = 0 ) {
/*
* Some sendfile implementations return 0 to indicate
* that there was a short read , but nothing was
* actually written to the socket . In this case ,
* fallback to the normal read path so the header gets
* the correct byte count .
*/
DEBUG ( 3 , ( " send_file_readX: sendfile sent zero bytes "
" falling back to the normal read: %s \n " ,
fsp_str_dbg ( fsp ) ) ) ;
2014-07-10 23:08:06 +04:00
goto normal_read ;
}
2010-12-15 00:36:08 +03:00
2014-07-10 23:08:06 +04:00
/*
* We got a short read
*/
goto out ;
normal_read :
/* Send out the header. */
2014-05-22 01:23:34 +04:00
ret = write_data ( xconn - > transport . sock ,
2014-07-10 23:08:06 +04:00
( const char * ) hdr - > data , hdr - > length ) ;
if ( ret ! = hdr - > length ) {
2014-05-23 14:59:43 +04:00
saved_errno = errno ;
2014-07-10 23:08:06 +04:00
DEBUG ( 0 , ( " smb2_sendfile_send_data: write_data failed for file "
2014-05-23 14:59:43 +04:00
" %s (%s) for client %s. Terminating \n " ,
fsp_str_dbg ( fsp ) , strerror ( saved_errno ) ,
smbXsrv_connection_dbg ( xconn ) ) ) ;
2014-07-11 04:25:00 +04:00
* pstatus = map_nt_error_from_unix_common ( saved_errno ) ;
return 0 ;
2014-07-10 23:08:06 +04:00
}
2014-06-12 10:40:25 +04:00
nread = fake_sendfile ( xconn , fsp , in_offset , in_length ) ;
2014-07-10 23:08:06 +04:00
if ( nread = = - 1 ) {
2014-05-23 14:59:43 +04:00
saved_errno = errno ;
DEBUG ( 0 , ( " smb2_sendfile_send_data: fake_sendfile "
" failed for file %s (%s) for client %s. "
" Terminating \n " ,
fsp_str_dbg ( fsp ) , strerror ( saved_errno ) ,
smbXsrv_connection_dbg ( xconn ) ) ) ;
2014-07-11 04:25:00 +04:00
* pstatus = map_nt_error_from_unix_common ( saved_errno ) ;
return 0 ;
2010-12-15 00:36:08 +03:00
}
out :
if ( nread < in_length ) {
2014-06-12 10:42:16 +04:00
ret = sendfile_short_send ( xconn , fsp , nread ,
hdr - > length , in_length ) ;
if ( ret = = - 1 ) {
saved_errno = errno ;
2014-07-23 17:26:19 +04:00
DEBUG ( 0 , ( " %s: sendfile_short_send "
2014-06-12 10:42:16 +04:00
" failed for file %s (%s) for client %s. "
" Terminating \n " ,
2014-07-23 17:26:19 +04:00
__func__ ,
2014-06-12 10:42:16 +04:00
fsp_str_dbg ( fsp ) , strerror ( saved_errno ) ,
smbXsrv_connection_dbg ( xconn ) ) ) ;
2014-07-11 04:25:00 +04:00
* pstatus = map_nt_error_from_unix_common ( saved_errno ) ;
return 0 ;
2014-06-12 10:42:16 +04:00
}
2010-12-15 00:36:08 +03:00
}
init_strict_lock_struct ( fsp ,
2012-06-08 19:51:47 +04:00
fsp - > op - > global - > open_persistent_id ,
2010-12-15 00:36:08 +03:00
in_offset ,
in_length ,
READ_LOCK ,
2021-11-17 02:00:03 +03:00
lp_posix_cifsu_locktype ( fsp ) ,
2010-12-15 00:36:08 +03:00
& lock ) ;
2014-07-11 04:25:00 +04:00
* pstatus = NT_STATUS_OK ;
2010-12-15 00:36:08 +03:00
return 0 ;
}
static NTSTATUS schedule_smb2_sendfile_read ( struct smbd_smb2_request * smb2req ,
struct smbd_smb2_read_state * state )
{
files_struct * fsp = state - > fsp ;
/*
* We cannot use sendfile if . . .
* We were not configured to do so OR
* Signing is active OR
* This is a compound SMB2 operation OR
* fsp is a STREAM file OR
* It ' s not a regular file OR
* Requested offset is greater than file size OR
* there ' s not enough data in the file .
* Phew : - ) . Luckily this means most
* reads on most normal files . JRA .
*/
2011-07-08 03:19:43 +04:00
if ( ! lp__use_sendfile ( SNUM ( fsp - > conn ) ) | |
2012-08-08 08:16:35 +04:00
smb2req - > do_signing | |
2012-08-08 08:35:34 +04:00
smb2req - > do_encryption | |
2017-09-22 03:41:25 +03:00
smbd_smb2_is_compound ( smb2req ) | |
2022-02-11 11:37:35 +03:00
fsp_is_alternate_stream ( fsp ) | |
2012-08-08 08:16:35 +04:00
( ! S_ISREG ( fsp - > fsp_name - > st . st_ex_mode ) ) | |
( state - > in_offset > = fsp - > fsp_name - > st . st_ex_size ) | |
( fsp - > fsp_name - > st . st_ex_size < state - > in_offset + state - > in_length ) )
{
2010-12-15 00:36:08 +03:00
return NT_STATUS_RETRY ;
}
/* We've already checked there's this amount of data
to read . */
state - > out_data . length = state - > in_length ;
state - > out_remaining = 0 ;
2013-12-04 15:32:36 +04:00
state - > out_headers = data_blob_const ( state - > _out_hdr_buf ,
sizeof ( state - > _out_hdr_buf ) ) ;
2010-12-15 00:36:08 +03:00
return NT_STATUS_OK ;
}
2009-06-05 14:58:26 +04:00
static void smbd_smb2_read_pipe_done ( struct tevent_req * subreq ) ;
2010-06-09 21:48:12 +04:00
/*******************************************************************
Common read complete processing function for both synchronous and
asynchronous reads .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NTSTATUS smb2_read_complete ( struct tevent_req * req , ssize_t nread , int err )
{
struct smbd_smb2_read_state * state = tevent_req_data ( req ,
struct smbd_smb2_read_state ) ;
files_struct * fsp = state - > fsp ;
if ( nread < 0 ) {
NTSTATUS status = map_nt_error_from_unix ( err ) ;
DEBUG ( 3 , ( " smb2_read_complete: file %s nread = %d. "
" Error = %s (NTSTATUS %s) \n " ,
fsp_str_dbg ( fsp ) ,
( int ) nread ,
strerror ( err ) ,
nt_errstr ( status ) ) ) ;
return status ;
}
if ( nread = = 0 & & state - > in_length ! = 0 ) {
DEBUG ( 5 , ( " smb2_read_complete: read_file[%s] end of file \n " ,
fsp_str_dbg ( fsp ) ) ) ;
return NT_STATUS_END_OF_FILE ;
}
if ( nread < state - > in_minimum ) {
DEBUG ( 5 , ( " smb2_read_complete: read_file[%s] read less %d than "
" minimum requested %u. Returning end of file \n " ,
fsp_str_dbg ( fsp ) ,
( int ) nread ,
( unsigned int ) state - > in_minimum ) ) ;
return NT_STATUS_END_OF_FILE ;
}
2012-06-14 15:25:29 +04:00
DEBUG ( 3 , ( " smbd_smb2_read: %s, file %s, length=%lu offset=%lu read=%lu \n " ,
fsp_fnum_dbg ( fsp ) ,
2010-06-09 21:48:12 +04:00
fsp_str_dbg ( fsp ) ,
( unsigned long ) state - > in_length ,
( unsigned long ) state - > in_offset ,
( unsigned long ) nread ) ) ;
state - > out_data . length = nread ;
state - > out_remaining = 0 ;
return NT_STATUS_OK ;
}
2011-11-14 12:33:22 +04:00
static bool smbd_smb2_read_cancel ( struct tevent_req * req )
{
struct smbd_smb2_read_state * state =
tevent_req_data ( req ,
struct smbd_smb2_read_state ) ;
return cancel_smb2_aio ( state - > smbreq ) ;
}
2009-06-05 14:26:19 +04:00
static struct tevent_req * smbd_smb2_read_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
2012-06-08 13:24:02 +04:00
struct files_struct * fsp ,
2015-05-06 11:52:57 +03:00
uint8_t in_flags ,
2009-06-05 14:26:19 +04:00
uint32_t in_length ,
uint64_t in_offset ,
uint32_t in_minimum ,
uint32_t in_remaining )
2009-06-02 14:38:37 +04:00
{
2010-06-09 21:48:12 +04:00
NTSTATUS status ;
struct tevent_req * req = NULL ;
struct smbd_smb2_read_state * state = NULL ;
struct smb_request * smbreq = NULL ;
2012-03-27 13:09:05 +04:00
connection_struct * conn = smb2req - > tcon - > compat ;
2009-06-02 14:38:37 +04:00
ssize_t nread = - 1 ;
struct lock_struct lock ;
2010-06-09 21:48:12 +04:00
int saved_errno ;
2009-06-02 14:38:37 +04:00
2009-06-05 14:26:19 +04:00
req = tevent_req_create ( mem_ctx , & state ,
struct smbd_smb2_read_state ) ;
if ( req = = NULL ) {
return NULL ;
}
state - > smb2req = smb2req ;
2015-05-06 11:52:57 +03:00
state - > in_flags = in_flags ;
2010-06-09 21:48:12 +04:00
state - > in_length = in_length ;
state - > in_offset = in_offset ;
state - > in_minimum = in_minimum ;
2009-06-05 14:26:19 +04:00
state - > out_data = data_blob_null ;
state - > out_remaining = 0 ;
2012-06-14 15:25:29 +04:00
DEBUG ( 10 , ( " smbd_smb2_read: %s - %s \n " ,
fsp_str_dbg ( fsp ) , fsp_fnum_dbg ( fsp ) ) ) ;
2009-06-02 14:38:37 +04:00
2023-03-28 23:53:20 +03:00
smbreq = smbd_smb2_fake_smb_request ( smb2req , fsp ) ;
2009-06-05 14:26:19 +04:00
if ( tevent_req_nomem ( smbreq , req ) ) {
return tevent_req_post ( req , ev ) ;
2009-06-02 14:38:37 +04:00
}
2011-11-14 12:33:22 +04:00
state - > smbreq = smbreq ;
2009-06-02 14:38:37 +04:00
2020-04-02 19:21:11 +03:00
if ( fsp - > fsp_flags . is_directory ) {
2010-05-05 20:50:48 +04:00
tevent_req_nterror ( req , NT_STATUS_INVALID_DEVICE_REQUEST ) ;
return tevent_req_post ( req , ev ) ;
}
2009-06-02 14:38:37 +04:00
2010-06-09 21:48:12 +04:00
state - > fsp = fsp ;
2009-06-05 14:26:19 +04:00
if ( IS_IPC ( smbreq - > conn ) ) {
2010-06-09 21:48:12 +04:00
struct tevent_req * subreq = NULL ;
2009-06-05 14:58:26 +04:00
2010-12-15 03:32:10 +03:00
state - > out_data = data_blob_talloc ( state , NULL , in_length ) ;
if ( in_length > 0 & & tevent_req_nomem ( state - > out_data . data , req ) ) {
return tevent_req_post ( req , ev ) ;
}
2009-06-05 14:58:26 +04:00
if ( ! fsp_is_np ( fsp ) ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
2011-12-12 16:47:56 +04:00
subreq = np_read_send ( state , ev ,
2009-06-05 14:58:26 +04:00
fsp - > fake_file_handle ,
state - > out_data . data ,
state - > out_data . length ) ;
if ( tevent_req_nomem ( subreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
tevent_req_set_callback ( subreq ,
smbd_smb2_read_pipe_done ,
req ) ;
return req ;
}
2017-06-09 14:02:49 +03:00
if ( ! CHECK_READ_SMB2 ( fsp ) ) {
2009-06-05 14:58:26 +04:00
tevent_req_nterror ( req , NT_STATUS_ACCESS_DENIED ) ;
2009-06-05 14:26:19 +04:00
return tevent_req_post ( req , ev ) ;
2009-06-02 14:38:37 +04:00
}
2010-06-11 00:20:37 +04:00
status = schedule_smb2_aio_read ( fsp - > conn ,
smbreq ,
fsp ,
2010-12-15 03:32:10 +03:00
state ,
& state - > out_data ,
2012-04-05 08:53:08 +04:00
( off_t ) in_offset ,
2010-06-11 00:20:37 +04:00
( size_t ) in_length ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
/*
2011-11-14 12:33:22 +04:00
* Doing an async read , allow this
* request to be canceled
2010-06-11 00:20:37 +04:00
*/
2011-11-14 12:33:22 +04:00
tevent_req_set_cancel_fn ( req , smbd_smb2_read_cancel ) ;
2010-06-11 00:20:37 +04:00
return req ;
}
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_RETRY ) ) {
/* Real error in setting up aio. Fail. */
2013-12-06 03:20:26 +04:00
tevent_req_nterror ( req , status ) ;
2010-06-11 00:20:37 +04:00
return tevent_req_post ( req , ev ) ;
}
/* Fallback to synchronous. */
2009-06-02 14:38:37 +04:00
init_strict_lock_struct ( fsp ,
2012-06-08 19:51:47 +04:00
fsp - > op - > global - > open_persistent_id ,
2009-06-02 14:38:37 +04:00
in_offset ,
in_length ,
READ_LOCK ,
2021-11-17 02:00:03 +03:00
lp_posix_cifsu_locktype ( fsp ) ,
2009-06-02 14:38:37 +04:00
& lock ) ;
2017-07-09 15:34:10 +03:00
if ( ! SMB_VFS_STRICT_LOCK_CHECK ( conn , fsp , & lock ) ) {
2009-06-05 14:26:19 +04:00
tevent_req_nterror ( req , NT_STATUS_FILE_LOCK_CONFLICT ) ;
return tevent_req_post ( req , ev ) ;
2009-06-02 14:38:37 +04:00
}
2010-12-15 00:36:08 +03:00
/* Try sendfile in preference. */
status = schedule_smb2_sendfile_read ( smb2req , state ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
tevent_req_done ( req ) ;
return tevent_req_post ( req , ev ) ;
} else {
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_RETRY ) ) {
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
}
2010-12-15 03:32:10 +03:00
/* Ok, read into memory. Allocate the out buffer. */
state - > out_data = data_blob_talloc ( state , NULL , in_length ) ;
if ( in_length > 0 & & tevent_req_nomem ( state - > out_data . data , req ) ) {
return tevent_req_post ( req , ev ) ;
}
2009-06-02 14:38:37 +04:00
nread = read_file ( fsp ,
2009-06-05 14:26:19 +04:00
( char * ) state - > out_data . data ,
2009-06-02 14:38:37 +04:00
in_offset ,
in_length ) ;
2010-06-09 21:48:12 +04:00
saved_errno = errno ;
2012-06-14 15:25:29 +04:00
DEBUG ( 10 , ( " smbd_smb2_read: file %s, %s, offset=%llu "
2010-04-01 04:40:30 +04:00
" len=%llu returned %lld \n " ,
fsp_str_dbg ( fsp ) ,
2012-06-14 15:25:29 +04:00
fsp_fnum_dbg ( fsp ) ,
2010-04-01 04:40:30 +04:00
( unsigned long long ) in_offset ,
( unsigned long long ) in_length ,
( long long ) nread ) ) ;
2010-06-09 21:48:12 +04:00
status = smb2_read_complete ( req , nread , saved_errno ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
tevent_req_nterror ( req , status ) ;
} else {
/* Success. */
tevent_req_done ( req ) ;
2010-05-05 20:47:49 +04:00
}
2009-06-05 14:26:19 +04:00
return tevent_req_post ( req , ev ) ;
}
2009-06-05 14:58:26 +04:00
static void smbd_smb2_read_pipe_done ( struct tevent_req * subreq )
{
struct tevent_req * req = tevent_req_callback_data ( subreq ,
struct tevent_req ) ;
struct smbd_smb2_read_state * state = tevent_req_data ( req ,
struct smbd_smb2_read_state ) ;
NTSTATUS status ;
ssize_t nread = - 1 ;
bool is_data_outstanding ;
status = np_read_recv ( subreq , & nread , & is_data_outstanding ) ;
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2012-05-23 17:24:01 +04:00
NTSTATUS old = status ;
status = nt_status_np_pipe ( old ) ;
2009-06-05 14:58:26 +04:00
tevent_req_nterror ( req , status ) ;
return ;
}
if ( nread = = 0 & & state - > out_data . length ! = 0 ) {
tevent_req_nterror ( req , NT_STATUS_END_OF_FILE ) ;
return ;
}
state - > out_data . length = nread ;
state - > out_remaining = 0 ;
2011-06-24 10:54:02 +04:00
/*
* TODO : add STATUS_BUFFER_OVERFLOW handling , once we also
* handle it in SMB1 pipe_read_andx_done ( ) .
*/
2009-06-05 14:58:26 +04:00
tevent_req_done ( req ) ;
}
2009-06-05 14:26:19 +04:00
static NTSTATUS smbd_smb2_read_recv ( struct tevent_req * req ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * out_data ,
uint32_t * out_remaining )
{
NTSTATUS status ;
struct smbd_smb2_read_state * state = tevent_req_data ( req ,
struct smbd_smb2_read_state ) ;
if ( tevent_req_is_nterror ( req , & status ) ) {
tevent_req_received ( req ) ;
return status ;
2009-06-02 14:38:37 +04:00
}
2009-06-05 14:26:19 +04:00
* out_data = state - > out_data ;
talloc_steal ( mem_ctx , out_data - > data ) ;
* out_remaining = state - > out_remaining ;
2013-12-04 15:32:36 +04:00
if ( state - > out_headers . length > 0 ) {
talloc_steal ( mem_ctx , state ) ;
talloc_set_destructor ( state , smb2_smb2_read_state_deny_destructor ) ;
tevent_req_received ( req ) ;
state - > smb2req - > queue_entry . sendfile_header = & state - > out_headers ;
2020-06-05 21:14:10 +03:00
state - > smb2req - > queue_entry . sendfile_body_size = state - > in_length ;
2013-12-04 15:32:36 +04:00
talloc_set_destructor ( state , smb2_sendfile_send_data ) ;
} else {
tevent_req_received ( req ) ;
}
2009-06-02 14:38:37 +04:00
return NT_STATUS_OK ;
}