2 Unix SMB/CIFS implementation.
3 client file read/write routines
4 Copyright (C) Andrew Tridgell 1994-1998
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 /****************************************************************************
23 Calculate the recommended read buffer size
24 ****************************************************************************/
25 static size_t cli_read_max_bufsize(struct cli_state *cli)
27 if (!client_is_signing_on(cli) && !cli_encryption_on(cli)
28 && (cli->posix_capabilities & CIFS_UNIX_LARGE_READ_CAP)) {
29 return CLI_SAMBA_MAX_POSIX_LARGE_READX_SIZE;
31 if (cli->capabilities & CAP_LARGE_READX) {
33 ? CLI_SAMBA_MAX_LARGE_READX_SIZE
34 : CLI_WINDOWS_MAX_LARGE_READX_SIZE;
36 return (cli->max_xmit - (smb_size+32)) & ~1023;
39 /****************************************************************************
40 Calculate the recommended write buffer size
41 ****************************************************************************/
42 static size_t cli_write_max_bufsize(struct cli_state *cli, uint16_t write_mode)
44 if (write_mode == 0 &&
45 !client_is_signing_on(cli) &&
46 !cli_encryption_on(cli) &&
47 (cli->posix_capabilities & CIFS_UNIX_LARGE_WRITE_CAP) &&
48 (cli->capabilities & CAP_LARGE_FILES)) {
49 /* Only do massive writes if we can do them direct
50 * with no signing or encrypting - not on a pipe. */
51 return CLI_SAMBA_MAX_POSIX_LARGE_WRITEX_SIZE;
55 return CLI_SAMBA_MAX_LARGE_WRITEX_SIZE;
58 if (((cli->capabilities & CAP_LARGE_WRITEX) == 0)
59 || client_is_signing_on(cli)
60 || strequal(cli->dev, "LPT1:")) {
63 * Printer devices are restricted to max_xmit writesize in
64 * Vista and XPSP3 as are signing connections.
67 return (cli->max_xmit - (smb_size+32)) & ~1023;
70 return CLI_WINDOWS_MAX_LARGE_WRITEX_SIZE;
73 struct cli_read_andx_state {
81 static void cli_read_andx_done(struct tevent_req *subreq);
83 struct tevent_req *cli_read_andx_create(TALLOC_CTX *mem_ctx,
84 struct event_context *ev,
85 struct cli_state *cli, int fnum,
86 off_t offset, size_t size,
87 struct tevent_req **psmbreq)
89 struct tevent_req *req, *subreq;
90 struct cli_read_andx_state *state;
91 bool bigoffset = False;
94 if (size > cli_read_max_bufsize(cli)) {
95 DEBUG(0, ("cli_read_andx_send got size=%d, can only handle "
96 "size=%d\n", (int)size,
97 (int)cli_read_max_bufsize(cli)));
101 req = tevent_req_create(mem_ctx, &state, struct cli_read_andx_state);
107 SCVAL(state->vwv + 0, 0, 0xFF);
108 SCVAL(state->vwv + 0, 1, 0);
109 SSVAL(state->vwv + 1, 0, 0);
110 SSVAL(state->vwv + 2, 0, fnum);
111 SIVAL(state->vwv + 3, 0, offset);
112 SSVAL(state->vwv + 5, 0, size);
113 SSVAL(state->vwv + 6, 0, size);
114 SSVAL(state->vwv + 7, 0, (size >> 16));
115 SSVAL(state->vwv + 8, 0, 0);
116 SSVAL(state->vwv + 9, 0, 0);
118 if ((uint64_t)offset >> 32) {
120 SIVAL(state->vwv + 10, 0,
121 (((uint64_t)offset)>>32) & 0xffffffff);
125 subreq = cli_smb_req_create(state, ev, cli, SMBreadX, 0, wct,
126 state->vwv, 0, NULL);
127 if (subreq == NULL) {
131 tevent_req_set_callback(subreq, cli_read_andx_done, req);
136 struct tevent_req *cli_read_andx_send(TALLOC_CTX *mem_ctx,
137 struct event_context *ev,
138 struct cli_state *cli, int fnum,
139 off_t offset, size_t size)
141 struct tevent_req *req, *subreq;
143 req = cli_read_andx_create(mem_ctx, ev, cli, fnum, offset, size,
145 if ((req == NULL) || !cli_smb_req_send(subreq)) {
152 static void cli_read_andx_done(struct tevent_req *subreq)
154 struct tevent_req *req = tevent_req_callback_data(
155 subreq, struct tevent_req);
156 struct cli_read_andx_state *state = tevent_req_data(
157 req, struct cli_read_andx_state);
164 state->status = cli_smb_recv(subreq, 12, &wct, &vwv, &num_bytes,
166 if (NT_STATUS_IS_ERR(state->status)) {
167 tevent_req_nterror(req, state->status);
171 /* size is the number of bytes the server returned.
173 state->received = SVAL(vwv + 5, 0);
174 state->received |= (((unsigned int)SVAL(vwv + 7, 0)) << 16);
176 if (state->received > state->size) {
177 DEBUG(5,("server returned more than we wanted!\n"));
178 tevent_req_nterror(req, NT_STATUS_UNEXPECTED_IO_ERROR);
183 * bcc field must be valid for small reads, for large reads the 16-bit
184 * bcc field can't be correct.
187 if ((state->received < 0xffff) && (state->received > num_bytes)) {
188 DEBUG(5, ("server announced more bytes than sent\n"));
189 tevent_req_nterror(req, NT_STATUS_INVALID_NETWORK_RESPONSE);
193 inbuf = cli_smb_inbuf(subreq);
194 state->buf = (uint8_t *)smb_base(inbuf) + SVAL(vwv+6, 0);
196 if (trans_oob(smb_len(inbuf), SVAL(vwv+6, 0), state->received)
197 || (state->buf < bytes)) {
198 DEBUG(5, ("server returned invalid read&x data offset\n"));
199 tevent_req_nterror(req, NT_STATUS_INVALID_NETWORK_RESPONSE);
202 tevent_req_done(req);
206 * Pull the data out of a finished async read_and_x request. rcvbuf is
207 * talloced from the request, so better make sure that you copy it away before
208 * you talloc_free(req). "rcvbuf" is NOT a talloc_ctx of its own, so do not
212 NTSTATUS cli_read_andx_recv(struct tevent_req *req, ssize_t *received,
215 struct cli_read_andx_state *state = tevent_req_data(
216 req, struct cli_read_andx_state);
219 if (tevent_req_is_nterror(req, &status)) {
222 *received = state->received;
223 *rcvbuf = state->buf;
227 struct cli_pull_subreq {
228 struct tevent_req *req;
234 * Parallel read support.
236 * cli_pull sends as many read&x requests as the server would allow via
237 * max_mux at a time. When replies flow back in, the data is written into
238 * the callback function "sink" in the right order.
241 struct cli_pull_state {
242 struct tevent_req *req;
244 struct event_context *ev;
245 struct cli_state *cli;
250 NTSTATUS (*sink)(char *buf, size_t n, void *priv);
256 * Outstanding requests
259 struct cli_pull_subreq *reqs;
262 * For how many bytes did we send requests already?
267 * Next request index to push into "sink". This walks around the "req"
268 * array, taking care that the requests are pushed to "sink" in the
269 * right order. If necessary (i.e. replies don't come in in the right
270 * order), replies are held back in "reqs".
275 * How many bytes did we push into "sink"?
281 static char *cli_pull_print(struct tevent_req *req, TALLOC_CTX *mem_ctx)
283 struct cli_pull_state *state = tevent_req_data(
284 req, struct cli_pull_state);
287 result = tevent_req_print(mem_ctx, req);
288 if (result == NULL) {
292 return talloc_asprintf_append_buffer(
293 result, "num_reqs=%d, top_req=%d",
294 state->num_reqs, state->top_req);
297 static void cli_pull_read_done(struct tevent_req *read_req);
300 * Prepare an async pull request
303 struct tevent_req *cli_pull_send(TALLOC_CTX *mem_ctx,
304 struct event_context *ev,
305 struct cli_state *cli,
306 uint16_t fnum, off_t start_offset,
307 SMB_OFF_T size, size_t window_size,
308 NTSTATUS (*sink)(char *buf, size_t n,
312 struct tevent_req *req;
313 struct cli_pull_state *state;
316 req = tevent_req_create(mem_ctx, &state, struct cli_pull_state);
320 tevent_req_set_print_fn(req, cli_pull_print);
326 state->start_offset = start_offset;
335 tevent_req_done(req);
336 return tevent_req_post(req, ev);
339 state->chunk_size = cli_read_max_bufsize(cli);
341 state->num_reqs = MAX(window_size/state->chunk_size, 1);
342 state->num_reqs = MIN(state->num_reqs, cli->max_mux);
344 state->reqs = TALLOC_ZERO_ARRAY(state, struct cli_pull_subreq,
346 if (state->reqs == NULL) {
350 state->requested = 0;
352 for (i=0; i<state->num_reqs; i++) {
353 struct cli_pull_subreq *subreq = &state->reqs[i];
355 size_t request_thistime;
357 if (state->requested >= size) {
362 size_left = size - state->requested;
363 request_thistime = MIN(size_left, state->chunk_size);
365 subreq->req = cli_read_andx_send(
366 state->reqs, ev, cli, fnum,
367 state->start_offset + state->requested,
370 if (subreq->req == NULL) {
373 tevent_req_set_callback(subreq->req, cli_pull_read_done, req);
374 state->requested += request_thistime;
384 * Handle incoming read replies, push the data into sink and send out new
385 * requests if necessary.
388 static void cli_pull_read_done(struct tevent_req *subreq)
390 struct tevent_req *req = tevent_req_callback_data(
391 subreq, struct tevent_req);
392 struct cli_pull_state *state = tevent_req_data(
393 req, struct cli_pull_state);
394 struct cli_pull_subreq *pull_subreq = NULL;
398 for (i = 0; i < state->num_reqs; i++) {
399 pull_subreq = &state->reqs[i];
400 if (subreq == pull_subreq->req) {
404 if (i == state->num_reqs) {
405 /* Huh -- received something we did not send?? */
406 tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR);
410 status = cli_read_andx_recv(subreq, &pull_subreq->received,
412 if (!NT_STATUS_IS_OK(status)) {
413 tevent_req_nterror(state->req, status);
418 * This loop is the one to take care of out-of-order replies. All
419 * pending requests are in state->reqs, state->reqs[top_req] is the
420 * one that is to be pushed next. If however a request later than
421 * top_req is replied to, then we can't push yet. If top_req is
422 * replied to at a later point then, we need to push all the finished
426 while (state->reqs[state->top_req].req != NULL) {
427 struct cli_pull_subreq *top_subreq;
429 DEBUG(11, ("cli_pull_read_done: top_req = %d\n",
432 top_subreq = &state->reqs[state->top_req];
434 if (tevent_req_is_in_progress(top_subreq->req)) {
435 DEBUG(11, ("cli_pull_read_done: top request not yet "
440 DEBUG(10, ("cli_pull_read_done: Pushing %d bytes, %d already "
441 "pushed\n", (int)top_subreq->received,
442 (int)state->pushed));
444 status = state->sink((char *)top_subreq->buf,
445 top_subreq->received, state->priv);
446 if (!NT_STATUS_IS_OK(status)) {
447 tevent_req_nterror(state->req, status);
450 state->pushed += top_subreq->received;
452 TALLOC_FREE(state->reqs[state->top_req].req);
454 if (state->requested < state->size) {
455 struct tevent_req *new_req;
457 size_t request_thistime;
459 size_left = state->size - state->requested;
460 request_thistime = MIN(size_left, state->chunk_size);
462 DEBUG(10, ("cli_pull_read_done: Requesting %d bytes "
463 "at %d, position %d\n",
464 (int)request_thistime,
465 (int)(state->start_offset
469 new_req = cli_read_andx_send(
470 state->reqs, state->ev, state->cli,
472 state->start_offset + state->requested,
475 if (tevent_req_nomem(new_req, state->req)) {
478 tevent_req_set_callback(new_req, cli_pull_read_done,
481 state->reqs[state->top_req].req = new_req;
482 state->requested += request_thistime;
485 state->top_req = (state->top_req+1) % state->num_reqs;
488 tevent_req_done(req);
491 NTSTATUS cli_pull_recv(struct tevent_req *req, SMB_OFF_T *received)
493 struct cli_pull_state *state = tevent_req_data(
494 req, struct cli_pull_state);
497 if (tevent_req_is_nterror(req, &status)) {
500 *received = state->pushed;
504 NTSTATUS cli_pull(struct cli_state *cli, uint16_t fnum,
505 off_t start_offset, SMB_OFF_T size, size_t window_size,
506 NTSTATUS (*sink)(char *buf, size_t n, void *priv),
507 void *priv, SMB_OFF_T *received)
509 TALLOC_CTX *frame = talloc_stackframe();
510 struct event_context *ev;
511 struct tevent_req *req;
512 NTSTATUS status = NT_STATUS_OK;
514 if (cli_has_async_calls(cli)) {
516 * Can't use sync call while an async call is in flight
518 status = NT_STATUS_INVALID_PARAMETER;
522 ev = event_context_init(frame);
524 status = NT_STATUS_NO_MEMORY;
528 req = cli_pull_send(frame, ev, cli, fnum, start_offset, size,
529 window_size, sink, priv);
531 status = NT_STATUS_NO_MEMORY;
535 if (!tevent_req_poll(req, ev)) {
536 status = map_nt_error_from_unix(errno);
540 status = cli_pull_recv(req, received);
543 if (!NT_STATUS_IS_OK(status)) {
544 cli_set_error(cli, status);
549 static NTSTATUS cli_read_sink(char *buf, size_t n, void *priv)
551 char **pbuf = (char **)priv;
552 memcpy(*pbuf, buf, n);
557 ssize_t cli_read(struct cli_state *cli, int fnum, char *buf,
558 off_t offset, size_t size)
563 status = cli_pull(cli, fnum, offset, size, size,
564 cli_read_sink, &buf, &ret);
565 if (!NT_STATUS_IS_OK(status)) {
566 cli_set_error(cli, status);
572 /****************************************************************************
573 Issue a single SMBwrite and don't wait for a reply.
574 ****************************************************************************/
576 static bool cli_issue_write(struct cli_state *cli,
585 bool large_writex = false;
586 /* We can only do direct writes if not signing and not encrypting. */
587 bool direct_writes = !client_is_signing_on(cli) && !cli_encryption_on(cli);
589 if (!direct_writes && size + 1 > cli->bufsize) {
590 cli->outbuf = (char *)SMB_REALLOC(cli->outbuf, size + 1024);
594 cli->inbuf = (char *)SMB_REALLOC(cli->inbuf, size + 1024);
595 if (cli->inbuf == NULL) {
596 SAFE_FREE(cli->outbuf);
599 cli->bufsize = size + 1024;
602 memset(cli->outbuf,'\0',smb_size);
603 memset(cli->inbuf,'\0',smb_size);
605 if (cli->capabilities & CAP_LARGE_FILES) {
610 cli_set_message(cli->outbuf,14,0,True);
612 cli_set_message(cli->outbuf,12,0,True);
615 SCVAL(cli->outbuf,smb_com,SMBwriteX);
616 SSVAL(cli->outbuf,smb_tid,cli->cnum);
617 cli_setup_packet(cli);
619 SCVAL(cli->outbuf,smb_vwv0,0xFF);
620 SSVAL(cli->outbuf,smb_vwv2,fnum);
622 SIVAL(cli->outbuf,smb_vwv3,offset);
623 SIVAL(cli->outbuf,smb_vwv5,0);
624 SSVAL(cli->outbuf,smb_vwv7,mode);
626 SSVAL(cli->outbuf,smb_vwv8,(mode & 0x0008) ? size : 0);
628 * According to CIFS-TR-1p00, this following field should only
629 * be set if CAP_LARGE_WRITEX is set. We should check this
630 * locally. However, this check might already have been
631 * done by our callers.
633 SSVAL(cli->outbuf,smb_vwv9,(size>>16));
634 SSVAL(cli->outbuf,smb_vwv10,size);
635 /* +1 is pad byte. */
636 SSVAL(cli->outbuf,smb_vwv11,
637 smb_buf(cli->outbuf) - smb_base(cli->outbuf) + 1);
640 SIVAL(cli->outbuf,smb_vwv12,(((uint64_t)offset)>>32) & 0xffffffff);
643 p = smb_base(cli->outbuf) + SVAL(cli->outbuf,smb_vwv11) -1;
644 *p++ = '\0'; /* pad byte. */
645 if (!direct_writes) {
646 memcpy(p, buf, size);
648 if (size > 0x1FFFF) {
649 /* This is a POSIX 14 word large write. */
650 set_message_bcc(cli->outbuf, 0); /* Set bcc to zero. */
651 _smb_setlen_large(cli->outbuf,smb_size + 28 + 1 /* pad */ + size - 4);
653 cli_setup_bcc(cli, p+size);
656 SSVAL(cli->outbuf,smb_mid,cli->mid + i);
658 show_msg(cli->outbuf);
660 /* For direct writes we now need to write the data
661 * directly out of buf. */
662 return cli_send_smb_direct_writeX(cli, buf, size);
664 return cli_send_smb(cli);
668 /****************************************************************************
670 write_mode: 0x0001 disallow write cacheing
671 0x0002 return bytes remaining
672 0x0004 use raw named pipe protocol
673 0x0008 start of message mode named pipe protocol
674 ****************************************************************************/
676 ssize_t cli_write(struct cli_state *cli,
677 int fnum, uint16 write_mode,
678 const char *buf, off_t offset, size_t size)
680 ssize_t bwritten = 0;
681 unsigned int issued = 0;
682 unsigned int received = 0;
687 if(cli->max_mux > 1) {
688 mpx = cli->max_mux-1;
693 writesize = cli_write_max_bufsize(cli, write_mode);
695 blocks = (size + (writesize-1)) / writesize;
697 while (received < blocks) {
699 while ((issued - received < mpx) && (issued < blocks)) {
700 ssize_t bsent = issued * writesize;
701 ssize_t size1 = MIN(writesize, size - bsent);
703 if (!cli_issue_write(cli, fnum, offset + bsent,
711 if (!cli_receive_smb(cli)) {
717 if (cli_is_error(cli))
720 bwritten += SVAL(cli->inbuf, smb_vwv2);
721 if (writesize > 0xFFFF) {
722 bwritten += (((int)(SVAL(cli->inbuf, smb_vwv4)))<<16);
726 while (received < issued && cli_receive_smb(cli)) {
733 /****************************************************************************
734 write to a file using a SMBwrite and not bypassing 0 byte writes
735 ****************************************************************************/
737 ssize_t cli_smbwrite(struct cli_state *cli,
738 int fnum, char *buf, off_t offset, size_t size1)
744 size_t size = MIN(size1, cli->max_xmit - 48);
746 memset(cli->outbuf,'\0',smb_size);
747 memset(cli->inbuf,'\0',smb_size);
749 cli_set_message(cli->outbuf,5, 0,True);
751 SCVAL(cli->outbuf,smb_com,SMBwrite);
752 SSVAL(cli->outbuf,smb_tid,cli->cnum);
753 cli_setup_packet(cli);
755 SSVAL(cli->outbuf,smb_vwv0,fnum);
756 SSVAL(cli->outbuf,smb_vwv1,size);
757 SIVAL(cli->outbuf,smb_vwv2,offset);
758 SSVAL(cli->outbuf,smb_vwv4,0);
760 p = smb_buf(cli->outbuf);
762 SSVAL(p, 0, size); p += 2;
763 memcpy(p, buf + total, size); p += size;
765 cli_setup_bcc(cli, p);
767 if (!cli_send_smb(cli))
770 if (!cli_receive_smb(cli))
773 if (cli_is_error(cli))
776 size = SVAL(cli->inbuf,smb_vwv0);
790 * Send a write&x request
793 struct cli_write_andx_state {
801 static void cli_write_andx_done(struct tevent_req *subreq);
803 struct tevent_req *cli_write_andx_create(TALLOC_CTX *mem_ctx,
804 struct event_context *ev,
805 struct cli_state *cli, uint16_t fnum,
806 uint16_t mode, const uint8_t *buf,
807 off_t offset, size_t size,
808 struct tevent_req **reqs_before,
810 struct tevent_req **psmbreq)
812 struct tevent_req *req, *subreq;
813 struct cli_write_andx_state *state;
814 bool bigoffset = ((cli->capabilities & CAP_LARGE_FILES) != 0);
815 uint8_t wct = bigoffset ? 14 : 12;
816 size_t max_write = cli_write_max_bufsize(cli, mode);
819 req = tevent_req_create(mem_ctx, &state, struct cli_write_andx_state);
824 size = MIN(size, max_write);
828 SCVAL(vwv+0, 0, 0xFF);
831 SSVAL(vwv+2, 0, fnum);
832 SIVAL(vwv+3, 0, offset);
834 SSVAL(vwv+7, 0, mode);
836 SSVAL(vwv+9, 0, (size>>16));
837 SSVAL(vwv+10, 0, size);
840 cli_smb_wct_ofs(reqs_before, num_reqs_before)
841 + 1 /* the wct field */
843 + 2 /* num_bytes field */
847 SIVAL(vwv+12, 0, (((uint64_t)offset)>>32) & 0xffffffff);
851 state->iov[0].iov_base = &state->pad;
852 state->iov[0].iov_len = 1;
853 state->iov[1].iov_base = CONST_DISCARD(uint8_t *, buf);
854 state->iov[1].iov_len = size;
856 subreq = cli_smb_req_create(state, ev, cli, SMBwriteX, 0, wct, vwv,
858 if (tevent_req_nomem(subreq, req)) {
859 return tevent_req_post(req, ev);
861 tevent_req_set_callback(subreq, cli_write_andx_done, req);
866 struct tevent_req *cli_write_andx_send(TALLOC_CTX *mem_ctx,
867 struct event_context *ev,
868 struct cli_state *cli, uint16_t fnum,
869 uint16_t mode, const uint8_t *buf,
870 off_t offset, size_t size)
872 struct tevent_req *req, *subreq;
874 req = cli_write_andx_create(mem_ctx, ev, cli, fnum, mode, buf, offset,
875 size, NULL, 0, &subreq);
876 if ((req == NULL) || !cli_smb_req_send(subreq)) {
883 static void cli_write_andx_done(struct tevent_req *subreq)
885 struct tevent_req *req = tevent_req_callback_data(
886 subreq, struct tevent_req);
887 struct cli_write_andx_state *state = tevent_req_data(
888 req, struct cli_write_andx_state);
893 status = cli_smb_recv(subreq, 6, &wct, &vwv, NULL, NULL);
894 if (NT_STATUS_IS_ERR(status)) {
896 tevent_req_nterror(req, status);
899 state->written = SVAL(vwv+2, 0);
900 state->written |= SVAL(vwv+4, 0)<<16;
901 tevent_req_done(req);
904 NTSTATUS cli_write_andx_recv(struct tevent_req *req, size_t *pwritten)
906 struct cli_write_andx_state *state = tevent_req_data(
907 req, struct cli_write_andx_state);
910 if (tevent_req_is_nterror(req, &status)) {
913 *pwritten = state->written;
917 struct cli_writeall_state {
918 struct event_context *ev;
919 struct cli_state *cli;
928 static void cli_writeall_written(struct tevent_req *req);
930 static struct async_req *cli_writeall_send(TALLOC_CTX *mem_ctx,
931 struct event_context *ev,
932 struct cli_state *cli,
936 off_t offset, size_t size)
938 struct async_req *result;
939 struct tevent_req *subreq;
940 struct cli_writeall_state *state;
942 if (!async_req_setup(mem_ctx, &result, &state,
943 struct cli_writeall_state)) {
951 state->offset = offset;
955 subreq = cli_write_andx_send(state, state->ev, state->cli, state->fnum,
956 state->mode, state->buf, state->offset,
958 if (subreq == NULL) {
961 tevent_req_set_callback(subreq, cli_writeall_written, result);
969 static void cli_writeall_written(struct tevent_req *subreq)
971 struct async_req *req = tevent_req_callback_data(
972 subreq, struct async_req);
973 struct cli_writeall_state *state = talloc_get_type_abort(
974 req->private_data, struct cli_writeall_state);
976 size_t written, to_write;
978 status = cli_write_andx_recv(subreq, &written);
980 if (!NT_STATUS_IS_OK(status)) {
981 async_req_nterror(req, status);
985 state->written += written;
987 if (state->written > state->size) {
988 async_req_nterror(req, NT_STATUS_INVALID_NETWORK_RESPONSE);
992 to_write = state->size - state->written;
999 subreq = cli_write_andx_send(state, state->ev, state->cli, state->fnum,
1001 state->buf + state->written,
1002 state->offset + state->written, to_write);
1003 if (subreq == NULL) {
1004 async_req_nterror(req, NT_STATUS_NO_MEMORY);
1007 tevent_req_set_callback(subreq, cli_writeall_written, req);
1010 static NTSTATUS cli_writeall_recv(struct async_req *req)
1012 return async_req_simple_recv_ntstatus(req);
1015 struct cli_push_write_state {
1016 struct async_req *req;/* This is the main request! Not the subreq */
1023 struct cli_push_state {
1024 struct event_context *ev;
1025 struct cli_state *cli;
1031 size_t (*source)(uint8_t *buf, size_t n, void *priv);
1040 * Outstanding requests
1044 struct cli_push_write_state **reqs;
1047 static void cli_push_written(struct async_req *req);
1049 static bool cli_push_write_setup(struct async_req *req,
1050 struct cli_push_state *state,
1053 struct cli_push_write_state *substate;
1054 struct async_req *subreq;
1056 substate = talloc(state->reqs, struct cli_push_write_state);
1060 substate->req = req;
1061 substate->idx = idx;
1062 substate->ofs = state->next_offset;
1063 substate->buf = talloc_array(substate, uint8_t, state->chunk_size);
1064 if (!substate->buf) {
1065 talloc_free(substate);
1068 substate->size = state->source(substate->buf,
1071 if (substate->size == 0) {
1073 /* nothing to send */
1074 talloc_free(substate);
1078 subreq = cli_writeall_send(substate,
1079 state->ev, state->cli,
1080 state->fnum, state->mode,
1085 talloc_free(substate);
1088 subreq->async.fn = cli_push_written;
1089 subreq->async.priv = substate;
1091 state->reqs[idx] = substate;
1092 state->pending += 1;
1093 state->next_offset += substate->size;
1098 struct async_req *cli_push_send(TALLOC_CTX *mem_ctx, struct event_context *ev,
1099 struct cli_state *cli,
1100 uint16_t fnum, uint16_t mode,
1101 off_t start_offset, size_t window_size,
1102 size_t (*source)(uint8_t *buf, size_t n,
1106 struct async_req *req;
1107 struct cli_push_state *state;
1110 if (!async_req_setup(mem_ctx, &req, &state,
1111 struct cli_push_state)) {
1117 state->start_offset = start_offset;
1119 state->source = source;
1123 state->next_offset = start_offset;
1125 state->chunk_size = cli_write_max_bufsize(cli, mode);
1127 if (window_size == 0) {
1128 window_size = cli->max_mux * state->chunk_size;
1130 state->num_reqs = window_size/state->chunk_size;
1131 if ((window_size % state->chunk_size) > 0) {
1132 state->num_reqs += 1;
1134 state->num_reqs = MIN(state->num_reqs, cli->max_mux);
1135 state->num_reqs = MAX(state->num_reqs, 1);
1137 state->reqs = TALLOC_ZERO_ARRAY(state, struct cli_push_write_state *,
1139 if (state->reqs == NULL) {
1143 for (i=0; i<state->num_reqs; i++) {
1144 if (!cli_push_write_setup(req, state, i)) {
1153 if (state->pending == 0) {
1154 if (!async_post_ntstatus(req, ev, NT_STATUS_OK)) {
1167 static void cli_push_written(struct async_req *subreq)
1169 struct cli_push_write_state *substate = talloc_get_type_abort(
1170 subreq->async.priv, struct cli_push_write_state);
1171 struct async_req *req = substate->req;
1172 struct cli_push_state *state = talloc_get_type_abort(
1173 req->private_data, struct cli_push_state);
1175 uint32_t idx = substate->idx;
1177 state->reqs[idx] = NULL;
1178 state->pending -= 1;
1180 status = cli_writeall_recv(subreq);
1181 TALLOC_FREE(subreq);
1182 TALLOC_FREE(substate);
1183 if (!NT_STATUS_IS_OK(status)) {
1184 async_req_nterror(req, status);
1189 if (!cli_push_write_setup(req, state, idx)) {
1190 async_req_nomem(NULL, req);
1195 if (state->pending == 0) {
1196 async_req_done(req);
1201 NTSTATUS cli_push_recv(struct async_req *req)
1203 return async_req_simple_recv_ntstatus(req);
1206 NTSTATUS cli_push(struct cli_state *cli, uint16_t fnum, uint16_t mode,
1207 off_t start_offset, size_t window_size,
1208 size_t (*source)(uint8_t *buf, size_t n, void *priv),
1211 TALLOC_CTX *frame = talloc_stackframe();
1212 struct event_context *ev;
1213 struct async_req *req;
1214 NTSTATUS status = NT_STATUS_OK;
1216 if (cli_has_async_calls(cli)) {
1218 * Can't use sync call while an async call is in flight
1220 status = NT_STATUS_INVALID_PARAMETER;
1224 ev = event_context_init(frame);
1226 status = NT_STATUS_NO_MEMORY;
1230 req = cli_push_send(frame, ev, cli, fnum, mode, start_offset,
1231 window_size, source, priv);
1233 status = NT_STATUS_NO_MEMORY;
1237 while (req->state < ASYNC_REQ_DONE) {
1238 if (event_loop_once(ev) == -1) {
1239 status = map_nt_error_from_unix(errno);
1244 status = cli_push_recv(req);
1247 if (!NT_STATUS_IS_OK(status)) {
1248 cli_set_error(cli, status);