2009-06-02 14:38:37 +04:00
/*
Unix SMB / CIFS implementation .
Core SMB2 server
Copyright ( C ) Stefan Metzmacher 2009
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
2011-02-26 01:20:06 +03:00
# include "system/filesys.h"
2011-03-22 18:57:01 +03:00
# include "smbd/smbd.h"
2009-06-02 14:38:37 +04:00
# include "smbd/globals.h"
2009-08-12 19:52:55 +04:00
# include "../libcli/smb/smb_common.h"
2010-10-12 08:27:50 +04:00
# include "libcli/security/security.h"
2011-04-28 19:38:09 +04:00
# include "../lib/util/tevent_ntstatus.h"
2011-04-30 01:32:28 +04:00
# include "rpc_server/srv_pipe_hnd.h"
2009-06-02 14:38:37 +04:00
2009-06-05 14:26:19 +04:00
static struct tevent_req * smbd_smb2_read_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
2012-06-08 13:24:02 +04:00
struct files_struct * in_fsp ,
2009-06-05 14:26:19 +04:00
uint32_t in_smbpid ,
uint32_t in_length ,
uint64_t in_offset ,
uint32_t in_minimum ,
uint32_t in_remaining ) ;
static NTSTATUS smbd_smb2_read_recv ( struct tevent_req * req ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * out_data ,
uint32_t * out_remaining ) ;
static void smbd_smb2_request_read_done ( struct tevent_req * subreq ) ;
2009-06-02 14:38:37 +04:00
NTSTATUS smbd_smb2_request_process_read ( struct smbd_smb2_request * req )
{
2011-09-06 16:01:43 +04:00
NTSTATUS status ;
2009-06-02 14:38:37 +04:00
const uint8_t * inhdr ;
const uint8_t * inbody ;
int i = req - > current_idx ;
uint32_t in_smbpid ;
uint32_t in_length ;
uint64_t in_offset ;
uint64_t in_file_id_persistent ;
uint64_t in_file_id_volatile ;
2012-06-08 13:24:02 +04:00
struct files_struct * in_fsp ;
2009-06-02 14:38:37 +04:00
uint32_t in_minimum_count ;
uint32_t in_remaining_bytes ;
2009-06-05 14:26:19 +04:00
struct tevent_req * subreq ;
2009-06-02 14:38:37 +04:00
2011-09-06 16:01:43 +04:00
status = smbd_smb2_request_verify_sizes ( req , 0x31 ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return smbd_smb2_request_error ( req , status ) ;
2009-06-02 14:38:37 +04:00
}
2011-09-06 16:01:43 +04:00
inhdr = ( const uint8_t * ) req - > in . vector [ i + 0 ] . iov_base ;
2009-06-02 14:38:37 +04:00
inbody = ( const uint8_t * ) req - > in . vector [ i + 1 ] . iov_base ;
in_smbpid = IVAL ( inhdr , SMB2_HDR_PID ) ;
in_length = IVAL ( inbody , 0x04 ) ;
in_offset = BVAL ( inbody , 0x08 ) ;
in_file_id_persistent = BVAL ( inbody , 0x10 ) ;
in_file_id_volatile = BVAL ( inbody , 0x18 ) ;
in_minimum_count = IVAL ( inbody , 0x20 ) ;
in_remaining_bytes = IVAL ( inbody , 0x28 ) ;
/* check the max read size */
2011-09-23 19:18:14 +04:00
if ( in_length > req - > sconn - > smb2 . max_read ) {
2012-05-11 21:01:43 +04:00
DEBUG ( 2 , ( " smbd_smb2_request_process_read: "
" client ignored max read: %s: 0x%08X: 0x%08X \n " ,
2011-09-23 19:18:14 +04:00
__location__ , in_length , req - > sconn - > smb2 . max_read ) ) ;
2009-06-02 14:38:37 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
2012-02-28 05:51:40 +04:00
status = smbd_smb2_request_verify_creditcharge ( req , in_length ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return smbd_smb2_request_error ( req , status ) ;
}
2012-06-08 13:24:02 +04:00
in_fsp = file_fsp_smb2 ( req , in_file_id_persistent , in_file_id_volatile ) ;
if ( in_fsp = = NULL ) {
2009-06-02 14:38:37 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_FILE_CLOSED ) ;
}
2012-06-08 13:24:02 +04:00
subreq = smbd_smb2_read_send ( req , req - > sconn - > ev_ctx ,
req , in_fsp ,
2009-06-05 14:26:19 +04:00
in_smbpid ,
in_length ,
in_offset ,
in_minimum_count ,
in_remaining_bytes ) ;
if ( subreq = = NULL ) {
return smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
}
tevent_req_set_callback ( subreq , smbd_smb2_request_read_done , req ) ;
2009-06-10 00:34:14 +04:00
2011-11-14 18:42:55 +04:00
return smbd_smb2_request_pending_queue ( req , subreq , 500 ) ;
2009-06-05 14:26:19 +04:00
}
static void smbd_smb2_request_read_done ( struct tevent_req * subreq )
{
struct smbd_smb2_request * req = tevent_req_callback_data ( subreq ,
struct smbd_smb2_request ) ;
DATA_BLOB outbody ;
DATA_BLOB outdyn ;
uint8_t out_data_offset ;
2009-07-24 18:21:07 +04:00
DATA_BLOB out_data_buffer = data_blob_null ;
uint32_t out_data_remaining = 0 ;
2009-06-05 14:26:19 +04:00
NTSTATUS status ;
NTSTATUS error ; /* transport error */
status = smbd_smb2_read_recv ( subreq ,
req ,
& out_data_buffer ,
& out_data_remaining ) ;
TALLOC_FREE ( subreq ) ;
2009-06-02 14:38:37 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2009-06-05 14:26:19 +04:00
error = smbd_smb2_request_error ( req , status ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2009-08-07 17:21:07 +04:00
smbd_server_connection_terminate ( req - > sconn ,
2009-06-05 14:26:19 +04:00
nt_errstr ( error ) ) ;
return ;
}
2009-06-05 16:31:41 +04:00
return ;
2009-06-02 14:38:37 +04:00
}
out_data_offset = SMB2_HDR_BODY + 0x10 ;
outbody = data_blob_talloc ( req - > out . vector , NULL , 0x10 ) ;
if ( outbody . data = = NULL ) {
2009-06-05 14:26:19 +04:00
error = smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2009-08-07 17:21:07 +04:00
smbd_server_connection_terminate ( req - > sconn ,
2009-06-05 14:26:19 +04:00
nt_errstr ( error ) ) ;
return ;
}
2009-06-05 16:31:41 +04:00
return ;
2009-06-02 14:38:37 +04:00
}
SSVAL ( outbody . data , 0x00 , 0x10 + 1 ) ; /* struct size */
SCVAL ( outbody . data , 0x02 ,
out_data_offset ) ; /* data offset */
SCVAL ( outbody . data , 0x03 , 0 ) ; /* reserved */
SIVAL ( outbody . data , 0x04 ,
out_data_buffer . length ) ; /* data length */
SIVAL ( outbody . data , 0x08 ,
out_data_remaining ) ; /* data remaining */
SIVAL ( outbody . data , 0x0C , 0 ) ; /* reserved */
outdyn = out_data_buffer ;
2009-06-05 14:26:19 +04:00
error = smbd_smb2_request_done ( req , outbody , & outdyn ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2009-08-07 17:21:07 +04:00
smbd_server_connection_terminate ( req - > sconn ,
2009-06-05 14:26:19 +04:00
nt_errstr ( error ) ) ;
return ;
}
2009-06-02 14:38:37 +04:00
}
2009-06-05 14:26:19 +04:00
struct smbd_smb2_read_state {
struct smbd_smb2_request * smb2req ;
2011-11-14 12:33:22 +04:00
struct smb_request * smbreq ;
2010-06-09 21:48:12 +04:00
files_struct * fsp ;
uint32_t in_length ;
uint64_t in_offset ;
uint32_t in_minimum ;
2009-06-05 14:26:19 +04:00
DATA_BLOB out_data ;
uint32_t out_remaining ;
} ;
2010-12-15 00:36:08 +03:00
/* struct smbd_smb2_read_state destructor. Send the SMB2_READ data. */
static int smb2_sendfile_send_data ( struct smbd_smb2_read_state * state )
{
struct lock_struct lock ;
uint32_t in_length = state - > in_length ;
uint64_t in_offset = state - > in_offset ;
files_struct * fsp = state - > fsp ;
ssize_t nread ;
nread = SMB_VFS_SENDFILE ( fsp - > conn - > sconn - > sock ,
fsp ,
NULL ,
in_offset ,
in_length ) ;
DEBUG ( 10 , ( " smb2_sendfile_send_data: SMB_VFS_SENDFILE returned %d on file %s \n " ,
( int ) nread ,
fsp_str_dbg ( fsp ) ) ) ;
if ( nread = = - 1 ) {
if ( errno = = ENOSYS | | errno = = EINTR ) {
/*
* Special hack for broken systems with no working
* sendfile . Fake this up by doing read / write calls .
*/
set_use_sendfile ( SNUM ( fsp - > conn ) , false ) ;
nread = fake_sendfile ( fsp , in_offset , in_length ) ;
if ( nread = = - 1 ) {
DEBUG ( 0 , ( " smb2_sendfile_send_data: "
" fake_sendfile failed for "
" file %s (%s). \n " ,
fsp_str_dbg ( fsp ) ,
strerror ( errno ) ) ) ;
exit_server_cleanly ( " smb2_sendfile_send_data: "
" fake_sendfile failed " ) ;
}
goto out ;
}
DEBUG ( 0 , ( " smb2_sendfile_send_data: sendfile failed for file "
" %s (%s). Terminating \n " ,
fsp_str_dbg ( fsp ) ,
strerror ( errno ) ) ) ;
exit_server_cleanly ( " smb2_sendfile_send_data: sendfile failed " ) ;
} else if ( nread = = 0 ) {
/*
* Some sendfile implementations return 0 to indicate
* that there was a short read , but nothing was
* actually written to the socket . In this case ,
* fallback to the normal read path so the header gets
* the correct byte count .
*/
DEBUG ( 3 , ( " send_file_readX: sendfile sent zero bytes "
" falling back to the normal read: %s \n " ,
fsp_str_dbg ( fsp ) ) ) ;
nread = fake_sendfile ( fsp , in_offset , in_length ) ;
if ( nread = = - 1 ) {
DEBUG ( 0 , ( " smb2_sendfile_send_data: "
" fake_sendfile failed for file "
" %s (%s). Terminating \n " ,
fsp_str_dbg ( fsp ) ,
strerror ( errno ) ) ) ;
exit_server_cleanly ( " smb2_sendfile_send_data: "
" fake_sendfile failed " ) ;
}
}
out :
if ( nread < in_length ) {
sendfile_short_send ( fsp , nread , 0 , in_length ) ;
}
init_strict_lock_struct ( fsp ,
2012-06-08 19:51:47 +04:00
fsp - > op - > global - > open_persistent_id ,
2010-12-15 00:36:08 +03:00
in_offset ,
in_length ,
READ_LOCK ,
& lock ) ;
SMB_VFS_STRICT_UNLOCK ( fsp - > conn , fsp , & lock ) ;
return 0 ;
}
static NTSTATUS schedule_smb2_sendfile_read ( struct smbd_smb2_request * smb2req ,
struct smbd_smb2_read_state * state )
{
struct smbd_smb2_read_state * state_copy = NULL ;
files_struct * fsp = state - > fsp ;
/*
* We cannot use sendfile if . . .
* We were not configured to do so OR
* Signing is active OR
* This is a compound SMB2 operation OR
* fsp is a STREAM file OR
* We ' re using a write cache OR
* It ' s not a regular file OR
* Requested offset is greater than file size OR
* there ' s not enough data in the file .
* Phew : - ) . Luckily this means most
* reads on most normal files . JRA .
*/
2011-07-08 03:19:43 +04:00
if ( ! lp__use_sendfile ( SNUM ( fsp - > conn ) ) | |
2010-12-15 00:36:08 +03:00
smb2req - > do_signing | |
smb2req - > in . vector_count ! = 4 | |
( fsp - > base_fsp ! = NULL ) | |
( fsp - > wcp ! = NULL ) | |
( ! S_ISREG ( fsp - > fsp_name - > st . st_ex_mode ) ) | |
( state - > in_offset > = fsp - > fsp_name - > st . st_ex_size ) | |
( fsp - > fsp_name - > st . st_ex_size < state - > in_offset +
state - > in_length ) ) {
return NT_STATUS_RETRY ;
}
/* We've already checked there's this amount of data
to read . */
state - > out_data . length = state - > in_length ;
state - > out_remaining = 0 ;
/* Make a copy of state attached to the smb2req. Attach
the destructor here as this will trigger the sendfile
call when the request is destroyed . */
2011-06-07 05:38:41 +04:00
state_copy = talloc ( smb2req , struct smbd_smb2_read_state ) ;
2010-12-15 00:36:08 +03:00
if ( ! state_copy ) {
return NT_STATUS_NO_MEMORY ;
}
* state_copy = * state ;
talloc_set_destructor ( state_copy , smb2_sendfile_send_data ) ;
return NT_STATUS_OK ;
}
2009-06-05 14:58:26 +04:00
static void smbd_smb2_read_pipe_done ( struct tevent_req * subreq ) ;
2010-06-09 21:48:12 +04:00
/*******************************************************************
Common read complete processing function for both synchronous and
asynchronous reads .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NTSTATUS smb2_read_complete ( struct tevent_req * req , ssize_t nread , int err )
{
struct smbd_smb2_read_state * state = tevent_req_data ( req ,
struct smbd_smb2_read_state ) ;
files_struct * fsp = state - > fsp ;
if ( nread < 0 ) {
NTSTATUS status = map_nt_error_from_unix ( err ) ;
DEBUG ( 3 , ( " smb2_read_complete: file %s nread = %d. "
" Error = %s (NTSTATUS %s) \n " ,
fsp_str_dbg ( fsp ) ,
( int ) nread ,
strerror ( err ) ,
nt_errstr ( status ) ) ) ;
return status ;
}
if ( nread = = 0 & & state - > in_length ! = 0 ) {
DEBUG ( 5 , ( " smb2_read_complete: read_file[%s] end of file \n " ,
fsp_str_dbg ( fsp ) ) ) ;
return NT_STATUS_END_OF_FILE ;
}
if ( nread < state - > in_minimum ) {
DEBUG ( 5 , ( " smb2_read_complete: read_file[%s] read less %d than "
" minimum requested %u. Returning end of file \n " ,
fsp_str_dbg ( fsp ) ,
( int ) nread ,
( unsigned int ) state - > in_minimum ) ) ;
return NT_STATUS_END_OF_FILE ;
}
2012-06-14 15:25:29 +04:00
DEBUG ( 3 , ( " smbd_smb2_read: %s, file %s, length=%lu offset=%lu read=%lu \n " ,
fsp_fnum_dbg ( fsp ) ,
2010-06-09 21:48:12 +04:00
fsp_str_dbg ( fsp ) ,
( unsigned long ) state - > in_length ,
( unsigned long ) state - > in_offset ,
( unsigned long ) nread ) ) ;
state - > out_data . length = nread ;
state - > out_remaining = 0 ;
return NT_STATUS_OK ;
}
2011-11-14 12:33:22 +04:00
static bool smbd_smb2_read_cancel ( struct tevent_req * req )
{
struct smbd_smb2_read_state * state =
tevent_req_data ( req ,
struct smbd_smb2_read_state ) ;
state - > smb2req - > cancelled = true ;
return cancel_smb2_aio ( state - > smbreq ) ;
}
2009-06-05 14:26:19 +04:00
static struct tevent_req * smbd_smb2_read_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
2012-06-08 13:24:02 +04:00
struct files_struct * fsp ,
2009-06-05 14:26:19 +04:00
uint32_t in_smbpid ,
uint32_t in_length ,
uint64_t in_offset ,
uint32_t in_minimum ,
uint32_t in_remaining )
2009-06-02 14:38:37 +04:00
{
2010-06-09 21:48:12 +04:00
NTSTATUS status ;
struct tevent_req * req = NULL ;
struct smbd_smb2_read_state * state = NULL ;
struct smb_request * smbreq = NULL ;
2012-03-27 13:09:05 +04:00
connection_struct * conn = smb2req - > tcon - > compat ;
2009-06-02 14:38:37 +04:00
ssize_t nread = - 1 ;
struct lock_struct lock ;
2010-06-09 21:48:12 +04:00
int saved_errno ;
2009-06-02 14:38:37 +04:00
2009-06-05 14:26:19 +04:00
req = tevent_req_create ( mem_ctx , & state ,
struct smbd_smb2_read_state ) ;
if ( req = = NULL ) {
return NULL ;
}
state - > smb2req = smb2req ;
2010-06-09 21:48:12 +04:00
state - > in_length = in_length ;
state - > in_offset = in_offset ;
state - > in_minimum = in_minimum ;
2009-06-05 14:26:19 +04:00
state - > out_data = data_blob_null ;
state - > out_remaining = 0 ;
2012-06-14 15:25:29 +04:00
DEBUG ( 10 , ( " smbd_smb2_read: %s - %s \n " ,
fsp_str_dbg ( fsp ) , fsp_fnum_dbg ( fsp ) ) ) ;
2009-06-02 14:38:37 +04:00
2009-06-05 14:26:19 +04:00
smbreq = smbd_smb2_fake_smb_request ( smb2req ) ;
if ( tevent_req_nomem ( smbreq , req ) ) {
return tevent_req_post ( req , ev ) ;
2009-06-02 14:38:37 +04:00
}
2011-11-14 12:33:22 +04:00
state - > smbreq = smbreq ;
2009-06-02 14:38:37 +04:00
2010-05-05 20:50:48 +04:00
if ( fsp - > is_directory ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_DEVICE_REQUEST ) ;
return tevent_req_post ( req , ev ) ;
}
2009-06-02 14:38:37 +04:00
2010-06-09 21:48:12 +04:00
state - > fsp = fsp ;
2009-06-05 14:26:19 +04:00
if ( IS_IPC ( smbreq - > conn ) ) {
2010-06-09 21:48:12 +04:00
struct tevent_req * subreq = NULL ;
2009-06-05 14:58:26 +04:00
2010-12-15 03:32:10 +03:00
state - > out_data = data_blob_talloc ( state , NULL , in_length ) ;
if ( in_length > 0 & & tevent_req_nomem ( state - > out_data . data , req ) ) {
return tevent_req_post ( req , ev ) ;
}
2009-06-05 14:58:26 +04:00
if ( ! fsp_is_np ( fsp ) ) {
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
2011-12-12 16:47:56 +04:00
subreq = np_read_send ( state , ev ,
2009-06-05 14:58:26 +04:00
fsp - > fake_file_handle ,
state - > out_data . data ,
state - > out_data . length ) ;
if ( tevent_req_nomem ( subreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
tevent_req_set_callback ( subreq ,
smbd_smb2_read_pipe_done ,
req ) ;
return req ;
}
if ( ! CHECK_READ ( fsp , smbreq ) ) {
tevent_req_nterror ( req , NT_STATUS_ACCESS_DENIED ) ;
2009-06-05 14:26:19 +04:00
return tevent_req_post ( req , ev ) ;
2009-06-02 14:38:37 +04:00
}
2010-06-11 00:20:37 +04:00
status = schedule_smb2_aio_read ( fsp - > conn ,
smbreq ,
fsp ,
2010-12-15 03:32:10 +03:00
state ,
& state - > out_data ,
2012-04-05 08:53:08 +04:00
( off_t ) in_offset ,
2010-06-11 00:20:37 +04:00
( size_t ) in_length ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
/*
2011-11-14 12:33:22 +04:00
* Doing an async read , allow this
* request to be canceled
2010-06-11 00:20:37 +04:00
*/
2011-11-14 12:33:22 +04:00
tevent_req_set_cancel_fn ( req , smbd_smb2_read_cancel ) ;
2010-06-11 00:20:37 +04:00
return req ;
}
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_RETRY ) ) {
/* Real error in setting up aio. Fail. */
tevent_req_nterror ( req , NT_STATUS_FILE_CLOSED ) ;
return tevent_req_post ( req , ev ) ;
}
/* Fallback to synchronous. */
2009-06-02 14:38:37 +04:00
init_strict_lock_struct ( fsp ,
2012-06-08 19:51:47 +04:00
fsp - > op - > global - > open_persistent_id ,
2009-06-02 14:38:37 +04:00
in_offset ,
in_length ,
READ_LOCK ,
& lock ) ;
if ( ! SMB_VFS_STRICT_LOCK ( conn , fsp , & lock ) ) {
2009-06-05 14:26:19 +04:00
tevent_req_nterror ( req , NT_STATUS_FILE_LOCK_CONFLICT ) ;
return tevent_req_post ( req , ev ) ;
2009-06-02 14:38:37 +04:00
}
2010-12-15 00:36:08 +03:00
/* Try sendfile in preference. */
status = schedule_smb2_sendfile_read ( smb2req , state ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
tevent_req_done ( req ) ;
return tevent_req_post ( req , ev ) ;
} else {
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_RETRY ) ) {
SMB_VFS_STRICT_UNLOCK ( conn , fsp , & lock ) ;
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
}
2010-12-15 03:32:10 +03:00
/* Ok, read into memory. Allocate the out buffer. */
state - > out_data = data_blob_talloc ( state , NULL , in_length ) ;
if ( in_length > 0 & & tevent_req_nomem ( state - > out_data . data , req ) ) {
SMB_VFS_STRICT_UNLOCK ( conn , fsp , & lock ) ;
return tevent_req_post ( req , ev ) ;
}
2009-06-02 14:38:37 +04:00
nread = read_file ( fsp ,
2009-06-05 14:26:19 +04:00
( char * ) state - > out_data . data ,
2009-06-02 14:38:37 +04:00
in_offset ,
in_length ) ;
2010-06-09 21:48:12 +04:00
saved_errno = errno ;
2009-06-02 14:38:37 +04:00
SMB_VFS_STRICT_UNLOCK ( conn , fsp , & lock ) ;
2012-06-14 15:25:29 +04:00
DEBUG ( 10 , ( " smbd_smb2_read: file %s, %s, offset=%llu "
2010-04-01 04:40:30 +04:00
" len=%llu returned %lld \n " ,
fsp_str_dbg ( fsp ) ,
2012-06-14 15:25:29 +04:00
fsp_fnum_dbg ( fsp ) ,
2010-04-01 04:40:30 +04:00
( unsigned long long ) in_offset ,
( unsigned long long ) in_length ,
( long long ) nread ) ) ;
2010-06-09 21:48:12 +04:00
status = smb2_read_complete ( req , nread , saved_errno ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
tevent_req_nterror ( req , status ) ;
} else {
/* Success. */
tevent_req_done ( req ) ;
2010-05-05 20:47:49 +04:00
}
2009-06-05 14:26:19 +04:00
return tevent_req_post ( req , ev ) ;
}
2009-06-05 14:58:26 +04:00
static void smbd_smb2_read_pipe_done ( struct tevent_req * subreq )
{
struct tevent_req * req = tevent_req_callback_data ( subreq ,
struct tevent_req ) ;
struct smbd_smb2_read_state * state = tevent_req_data ( req ,
struct smbd_smb2_read_state ) ;
NTSTATUS status ;
ssize_t nread = - 1 ;
bool is_data_outstanding ;
status = np_read_recv ( subreq , & nread , & is_data_outstanding ) ;
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2012-05-23 17:24:01 +04:00
NTSTATUS old = status ;
status = nt_status_np_pipe ( old ) ;
2009-06-05 14:58:26 +04:00
tevent_req_nterror ( req , status ) ;
return ;
}
if ( nread = = 0 & & state - > out_data . length ! = 0 ) {
tevent_req_nterror ( req , NT_STATUS_END_OF_FILE ) ;
return ;
}
state - > out_data . length = nread ;
state - > out_remaining = 0 ;
2011-06-24 10:54:02 +04:00
/*
* TODO : add STATUS_BUFFER_OVERFLOW handling , once we also
* handle it in SMB1 pipe_read_andx_done ( ) .
*/
2009-06-05 14:58:26 +04:00
tevent_req_done ( req ) ;
}
2009-06-05 14:26:19 +04:00
static NTSTATUS smbd_smb2_read_recv ( struct tevent_req * req ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * out_data ,
uint32_t * out_remaining )
{
NTSTATUS status ;
struct smbd_smb2_read_state * state = tevent_req_data ( req ,
struct smbd_smb2_read_state ) ;
if ( tevent_req_is_nterror ( req , & status ) ) {
tevent_req_received ( req ) ;
return status ;
2009-06-02 14:38:37 +04:00
}
2009-06-05 14:26:19 +04:00
* out_data = state - > out_data ;
talloc_steal ( mem_ctx , out_data - > data ) ;
* out_remaining = state - > out_remaining ;
tevent_req_received ( req ) ;
2009-06-02 14:38:37 +04:00
return NT_STATUS_OK ;
}