2001-06-19 06:02:19 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2001-06-19 06:02:19 +04:00
SMB torture tester
Copyright ( C ) Andrew Tridgell 1997 - 1998
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# define NO_SYSLOG
# include "includes.h"
static fstring host , workgroup , share , password , username , myname ;
static int max_protocol = PROTOCOL_NT1 ;
static char * sockops = " TCP_NODELAY " ;
static int nprocs = 1 , numops = 100 ;
static int procnum ; /* records process count number when forking */
static struct cli_state current_cli ;
static fstring randomfname ;
static BOOL use_oplocks ;
static BOOL use_level_II_oplocks ;
2002-02-05 04:31:47 +03:00
static char * client_txt = " client_oplocks.txt " ;
2002-03-04 03:24:24 +03:00
static BOOL use_kerberos ;
2002-02-05 04:31:47 +03:00
2001-09-06 14:37:21 +04:00
BOOL torture_showall = False ;
2001-06-19 06:02:19 +04:00
2001-07-02 07:21:17 +04:00
static double create_procs ( BOOL ( * fn ) ( int ) , BOOL * result ) ;
2001-06-19 06:02:19 +04:00
static struct timeval tp1 , tp2 ;
2002-02-05 04:31:47 +03:00
void start_timer ( void )
2001-06-19 06:02:19 +04:00
{
gettimeofday ( & tp1 , NULL ) ;
}
2002-02-05 04:31:47 +03:00
double end_timer ( void )
2001-06-19 06:02:19 +04:00
{
gettimeofday ( & tp2 , NULL ) ;
return ( ( tp2 . tv_sec - tp1 . tv_sec ) +
( tp2 . tv_usec - tp1 . tv_usec ) * 1.0e-6 ) ;
}
/* return a pointer to a anonymous shared memory segment of size "size"
which will persist across fork ( ) but will disappear when all processes
exit
The memory is not zeroed
This function uses system5 shared memory . It takes advantage of a property
that the memory is not destroyed if it is attached when the id is removed
*/
2002-02-05 04:31:47 +03:00
void * shm_setup ( int size )
2001-06-19 06:02:19 +04:00
{
int shmid ;
void * ret ;
shmid = shmget ( IPC_PRIVATE , size , SHM_R | SHM_W ) ;
if ( shmid = = - 1 ) {
printf ( " can't get shared memory \n " ) ;
exit ( 1 ) ;
}
ret = ( void * ) shmat ( shmid , 0 , 0 ) ;
if ( ! ret | | ret = = ( void * ) - 1 ) {
printf ( " can't attach to shared memory \n " ) ;
return NULL ;
}
/* the following releases the ipc, but note that this process
and all its children will still have access to the memory , its
just that the shmid is no longer valid for other shm calls . This
means we don ' t leave behind lots of shm segments after we exit
See Stevens " advanced programming in unix env " for details
*/
shmctl ( shmid , IPC_RMID , 0 ) ;
return ret ;
}
static BOOL open_nbt_connection ( struct cli_state * c )
{
struct nmb_name called , calling ;
struct in_addr ip ;
ZERO_STRUCTP ( c ) ;
make_nmb_name ( & calling , myname , 0x0 ) ;
make_nmb_name ( & called , host , 0x20 ) ;
2001-11-26 06:11:44 +03:00
zero_ip ( & ip ) ;
2001-06-19 06:02:19 +04:00
if ( ! cli_initialise ( c ) | | ! cli_connect ( c , host , & ip ) ) {
printf ( " Failed to connect with %s \n " , host ) ;
return False ;
}
2002-03-04 03:24:24 +03:00
c - > use_kerberos = use_kerberos ;
2001-06-19 06:02:19 +04:00
c - > timeout = 120000 ; /* set a really long timeout (2 minutes) */
if ( use_oplocks ) c - > use_oplocks = True ;
if ( use_level_II_oplocks ) c - > use_level_II_oplocks = True ;
if ( ! cli_session_request ( c , & calling , & called ) ) {
printf ( " %s rejected the session \n " , host ) ;
cli_shutdown ( c ) ;
return False ;
}
return True ;
}
2001-08-27 12:19:43 +04:00
BOOL torture_open_connection ( struct cli_state * c )
2001-06-19 06:02:19 +04:00
{
ZERO_STRUCTP ( c ) ;
if ( ! open_nbt_connection ( c ) ) {
return False ;
}
if ( ! cli_negprot ( c ) ) {
printf ( " %s rejected the negprot (%s) \n " , host , cli_errstr ( c ) ) ;
cli_shutdown ( c ) ;
return False ;
}
if ( ! cli_session_setup ( c , username ,
password , strlen ( password ) ,
password , strlen ( password ) ,
workgroup ) ) {
printf ( " %s rejected the sessionsetup (%s) \n " , host , cli_errstr ( c ) ) ;
cli_shutdown ( c ) ;
return False ;
}
if ( ! cli_send_tconX ( c , share , " ????? " ,
password , strlen ( password ) + 1 ) ) {
printf ( " %s refused tree connect (%s) \n " , host , cli_errstr ( c ) ) ;
cli_shutdown ( c ) ;
return False ;
}
return True ;
}
2001-08-27 12:19:43 +04:00
BOOL torture_close_connection ( struct cli_state * c )
2001-06-19 06:02:19 +04:00
{
2001-07-02 07:21:17 +04:00
BOOL ret = True ;
2001-06-19 06:02:19 +04:00
if ( ! cli_tdis ( c ) ) {
printf ( " tdis failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
ret = False ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
cli_shutdown ( c ) ;
return ret ;
2001-06-19 06:02:19 +04:00
}
/* check if the server produced the expected error code */
2001-08-20 09:15:26 +04:00
static BOOL check_error ( int line , struct cli_state * c ,
2001-09-04 15:52:42 +04:00
uint8 eclass , uint32 ecode , NTSTATUS nterr )
2001-06-19 06:02:19 +04:00
{
2001-08-13 08:08:42 +04:00
if ( cli_is_dos_error ( c ) ) {
uint8 class ;
uint32 num ;
/* Check DOS error */
cli_dos_error ( c , & class , & num ) ;
if ( eclass ! = class | | ecode ! = num ) {
printf ( " unexpected error code class=%d code=%d \n " ,
( int ) class , ( int ) num ) ;
2001-09-04 15:52:42 +04:00
printf ( " expected %d/%d %s (line=%d) \n " ,
2002-03-17 07:36:35 +03:00
( int ) eclass , ( int ) ecode , nt_errstr ( nterr ) , line ) ;
2001-08-13 08:08:42 +04:00
return False ;
}
} else {
2001-08-27 23:46:22 +04:00
NTSTATUS status ;
2001-08-13 08:08:42 +04:00
/* Check NT error */
status = cli_nt_error ( c ) ;
2001-09-04 15:52:42 +04:00
if ( NT_STATUS_V ( nterr ) ! = NT_STATUS_V ( status ) ) {
2002-03-17 07:36:35 +03:00
printf ( " unexpected error code %s \n " , nt_errstr ( status ) ) ;
printf ( " expected %s (line=%d) \n " , nt_errstr ( nterr ) , line ) ;
2001-08-13 08:08:42 +04:00
return False ;
}
}
2001-06-19 06:02:19 +04:00
return True ;
}
static BOOL wait_lock ( struct cli_state * c , int fnum , uint32 offset , uint32 len )
{
while ( ! cli_lock ( c , fnum , offset , len , - 1 , WRITE_LOCK ) ) {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , c , ERRDOS , ERRlock , NT_STATUS_LOCK_NOT_GRANTED ) ) return False ;
2001-06-19 06:02:19 +04:00
}
return True ;
}
static BOOL rw_torture ( struct cli_state * c )
{
char * lockfname = " \\ torture.lck " ;
fstring fname ;
int fnum ;
int fnum2 ;
pid_t pid2 , pid = getpid ( ) ;
int i , j ;
char buf [ 1024 ] ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
fnum2 = cli_open ( c , lockfname , O_RDWR | O_CREAT | O_EXCL ,
DENY_NONE ) ;
if ( fnum2 = = - 1 )
fnum2 = cli_open ( c , lockfname , O_RDWR , DENY_NONE ) ;
if ( fnum2 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , lockfname , cli_errstr ( c ) ) ;
return False ;
}
for ( i = 0 ; i < numops ; i + + ) {
unsigned n = ( unsigned ) sys_random ( ) % 10 ;
if ( i % 10 = = 0 ) {
printf ( " %d \r " , i ) ; fflush ( stdout ) ;
}
slprintf ( fname , sizeof ( fstring ) - 1 , " \\ torture.%u " , n ) ;
if ( ! wait_lock ( c , fnum2 , n * sizeof ( int ) , sizeof ( int ) ) ) {
return False ;
}
fnum = cli_open ( c , fname , O_RDWR | O_CREAT | O_TRUNC , DENY_ALL ) ;
if ( fnum = = - 1 ) {
printf ( " open failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
break ;
}
if ( cli_write ( c , fnum , 0 , ( char * ) & pid , 0 , sizeof ( pid ) ) ! = sizeof ( pid ) ) {
printf ( " write failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
for ( j = 0 ; j < 50 ; j + + ) {
if ( cli_write ( c , fnum , 0 , ( char * ) buf ,
sizeof ( pid ) + ( j * sizeof ( buf ) ) ,
sizeof ( buf ) ) ! = sizeof ( buf ) ) {
printf ( " write failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
}
pid2 = 0 ;
if ( cli_read ( c , fnum , ( char * ) & pid2 , 0 , sizeof ( pid ) ) ! = sizeof ( pid ) ) {
printf ( " read failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( pid2 ! = pid ) {
printf ( " data corruption! \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_close ( c , fnum ) ) {
printf ( " close failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_unlink ( c , fname ) ) {
printf ( " unlink failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_unlock ( c , fnum2 , n * sizeof ( int ) , sizeof ( int ) ) ) {
printf ( " unlock failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
}
cli_close ( c , fnum2 ) ;
cli_unlink ( c , lockfname ) ;
printf ( " %d \n " , i ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
static BOOL run_torture ( int dummy )
2001-06-19 06:02:19 +04:00
{
struct cli_state cli ;
2001-07-02 07:21:17 +04:00
BOOL ret ;
2001-06-19 06:02:19 +04:00
cli = current_cli ;
cli_sockopt ( & cli , sockops ) ;
2001-07-02 07:21:17 +04:00
ret = rw_torture ( & cli ) ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
ret = False ;
}
return ret ;
2001-06-19 06:02:19 +04:00
}
static BOOL rw_torture3 ( struct cli_state * c , char * lockfname )
{
int fnum = - 1 ;
int i = 0 ;
char buf [ 131072 ] ;
char buf_rd [ 131072 ] ;
unsigned count ;
unsigned countprev = 0 ;
2001-09-16 12:24:44 +04:00
ssize_t sent = 0 ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
srandom ( 1 ) ;
for ( i = 0 ; i < sizeof ( buf ) ; i + = sizeof ( uint32 ) )
{
SIVAL ( buf , i , sys_random ( ) ) ;
}
if ( procnum = = 0 )
{
fnum = cli_open ( c , lockfname , O_RDWR | O_CREAT | O_EXCL ,
DENY_NONE ) ;
if ( fnum = = - 1 ) {
printf ( " first open read/write of %s failed (%s) \n " ,
lockfname , cli_errstr ( c ) ) ;
return False ;
}
}
else
{
for ( i = 0 ; i < 500 & & fnum = = - 1 ; i + + )
{
fnum = cli_open ( c , lockfname , O_RDONLY ,
DENY_NONE ) ;
msleep ( 10 ) ;
}
if ( fnum = = - 1 ) {
printf ( " second open read-only of %s failed (%s) \n " ,
lockfname , cli_errstr ( c ) ) ;
return False ;
}
}
i = 0 ;
for ( count = 0 ; count < sizeof ( buf ) ; count + = sent )
{
if ( count > = countprev ) {
printf ( " %d %8d \r " , i , count ) ;
fflush ( stdout ) ;
i + + ;
countprev + = ( sizeof ( buf ) / 20 ) ;
}
if ( procnum = = 0 )
{
sent = ( ( unsigned ) sys_random ( ) % ( 20 ) ) + 1 ;
if ( sent > sizeof ( buf ) - count )
{
sent = sizeof ( buf ) - count ;
}
2001-09-16 12:24:44 +04:00
if ( cli_write ( c , fnum , 0 , buf + count , count , ( size_t ) sent ) ! = sent ) {
2001-06-19 06:02:19 +04:00
printf ( " write failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
}
else
{
sent = cli_read ( c , fnum , buf_rd + count , count ,
sizeof ( buf ) - count ) ;
if ( sent < 0 )
{
printf ( " read failed offset:%d size:%d (%s) \n " ,
count , sizeof ( buf ) - count ,
cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
sent = 0 ;
}
if ( sent > 0 )
{
if ( memcmp ( buf_rd + count , buf + count , sent ) ! = 0 )
{
printf ( " read/write compare failed \n " ) ;
printf ( " offset: %d req %d recvd %d \n " ,
count , sizeof ( buf ) - count , sent ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
break ;
}
}
}
}
if ( ! cli_close ( c , fnum ) ) {
printf ( " close failed (%s) \n " , cli_errstr ( c ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
static BOOL rw_torture2 ( struct cli_state * c1 , struct cli_state * c2 )
{
2001-09-25 09:20:43 +04:00
char * lockfname = " \\ torture2.lck " ;
2001-06-19 06:02:19 +04:00
int fnum1 ;
int fnum2 ;
int i ;
2001-09-16 12:24:44 +04:00
uchar buf [ 131072 ] ;
uchar buf_rd [ 131072 ] ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
ssize_t bytes_read ;
2001-06-19 06:02:19 +04:00
if ( ! cli_unlink ( c1 , lockfname ) ) {
2001-07-02 07:21:17 +04:00
printf ( " unlink failed (%s) (normal, this file should not exist) \n " , cli_errstr ( c1 ) ) ;
2001-06-19 06:02:19 +04:00
}
fnum1 = cli_open ( c1 , lockfname , O_RDWR | O_CREAT | O_EXCL ,
DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " first open read/write of %s failed (%s) \n " ,
lockfname , cli_errstr ( c1 ) ) ;
return False ;
}
fnum2 = cli_open ( c2 , lockfname , O_RDONLY ,
DENY_NONE ) ;
if ( fnum2 = = - 1 ) {
printf ( " second open read-only of %s failed (%s) \n " ,
lockfname , cli_errstr ( c2 ) ) ;
cli_close ( c1 , fnum1 ) ;
return False ;
}
for ( i = 0 ; i < numops ; i + + )
{
2001-07-02 07:21:17 +04:00
size_t buf_size = ( ( unsigned ) sys_random ( ) % ( sizeof ( buf ) - 1 ) ) + 1 ;
2001-06-19 06:02:19 +04:00
if ( i % 10 = = 0 ) {
printf ( " %d \r " , i ) ; fflush ( stdout ) ;
}
generate_random_buffer ( buf , buf_size , False ) ;
if ( cli_write ( c1 , fnum1 , 0 , buf , 0 , buf_size ) ! = buf_size ) {
printf ( " write failed (%s) \n " , cli_errstr ( c1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
if ( ( bytes_read = cli_read ( c2 , fnum2 , buf_rd , 0 , buf_size ) ) ! = buf_size ) {
2001-06-19 06:02:19 +04:00
printf ( " read failed (%s) \n " , cli_errstr ( c2 ) ) ;
2001-07-02 07:21:17 +04:00
printf ( " read %d, expected %d \n " , bytes_read , buf_size ) ;
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( memcmp ( buf_rd , buf , buf_size ) ! = 0 )
{
printf ( " read/write compare failed \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
}
if ( ! cli_close ( c2 , fnum2 ) ) {
printf ( " close failed (%s) \n " , cli_errstr ( c2 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_close ( c1 , fnum1 ) ) {
printf ( " close failed (%s) \n " , cli_errstr ( c1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_unlink ( c1 , lockfname ) ) {
printf ( " unlink failed (%s) \n " , cli_errstr ( c1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
static BOOL run_readwritetest ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli1 , cli2 ;
2001-07-02 07:21:17 +04:00
BOOL test1 , test2 ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) | | ! torture_open_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli1 , sockops ) ;
cli_sockopt ( & cli2 , sockops ) ;
printf ( " starting readwritetest \n " ) ;
2001-07-02 07:21:17 +04:00
test1 = rw_torture2 ( & cli1 , & cli2 ) ;
printf ( " Passed readwritetest v1: %s \n " , BOOLSTR ( test1 ) ) ;
2001-06-19 06:02:19 +04:00
2001-07-02 07:21:17 +04:00
test2 = rw_torture2 ( & cli1 , & cli1 ) ;
printf ( " Passed readwritetest v2: %s \n " , BOOLSTR ( test2 ) ) ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
test1 = False ;
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
test2 = False ;
}
return ( test1 & & test2 ) ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
static BOOL run_readwritemulti ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli ;
BOOL test ;
cli = current_cli ;
cli_sockopt ( & cli , sockops ) ;
printf ( " run_readwritemulti: fname %s \n " , randomfname ) ;
test = rw_torture3 ( & cli , randomfname ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
test = False ;
}
return test ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
static BOOL run_readwritelarge ( int dummy )
2001-06-19 06:02:19 +04:00
{
2001-07-02 07:21:17 +04:00
static struct cli_state cli1 ;
2001-06-19 06:02:19 +04:00
int fnum1 ;
char * lockfname = " \\ large.dat " ;
size_t fsize ;
2002-03-20 04:47:31 +03:00
char buf [ 126 * 1024 ] ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
}
cli_sockopt ( & cli1 , sockops ) ;
2001-06-19 06:02:19 +04:00
memset ( buf , ' \0 ' , sizeof ( buf ) ) ;
2001-07-02 07:21:17 +04:00
2002-03-20 04:47:31 +03:00
cli1 . max_xmit = 128 * 1024 ;
2001-07-02 07:21:17 +04:00
printf ( " starting readwritelarge \n " ) ;
2001-06-19 06:02:19 +04:00
cli_unlink ( & cli1 , lockfname ) ;
fnum1 = cli_open ( & cli1 , lockfname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open read/write of %s failed (%s) \n " , lockfname , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_write ( & cli1 , fnum1 , 0 , buf , 0 , sizeof ( buf ) ) ;
2002-03-20 04:47:31 +03:00
if ( ! cli_qfileinfo ( & cli1 , fnum1 , NULL , & fsize , NULL , NULL , NULL , NULL , NULL ) ) {
printf ( " qfileinfo failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( fsize = = sizeof ( buf ) )
2001-07-07 10:21:32 +04:00
printf ( " readwritelarge test 1 succeeded (size = %x) \n " , fsize ) ;
2001-07-02 07:21:17 +04:00
else {
2001-07-07 10:21:32 +04:00
printf ( " readwritelarge test 1 failed (size = %x) \n " , fsize ) ;
correct = False ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
2002-03-20 04:47:31 +03:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
correct = False ;
}
2001-06-19 06:02:19 +04:00
if ( ! cli_unlink ( & cli1 , lockfname ) ) {
printf ( " unlink failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
2001-07-07 10:21:32 +04:00
fnum1 = cli_open ( & cli1 , lockfname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open read/write of %s failed (%s) \n " , lockfname , cli_errstr ( & cli1 ) ) ;
return False ;
}
2002-03-20 04:47:31 +03:00
cli1 . max_xmit = 4 * 1024 ;
2001-07-07 10:21:32 +04:00
cli_smbwrite ( & cli1 , fnum1 , buf , 0 , sizeof ( buf ) ) ;
2002-03-20 04:47:31 +03:00
if ( ! cli_qfileinfo ( & cli1 , fnum1 , NULL , & fsize , NULL , NULL , NULL , NULL , NULL ) ) {
printf ( " qfileinfo failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
correct = False ;
}
if ( fsize = = sizeof ( buf ) )
printf ( " readwritelarge test 2 succeeded (size = %x) \n " , fsize ) ;
else {
printf ( " readwritelarge test 2 failed (size = %x) \n " , fsize ) ;
correct = False ;
}
2002-03-23 05:57:44 +03:00
#if 0
/* ToDo - set allocation. JRA */
if ( ! cli_set_allocation_size ( & cli1 , fnum1 , 0 ) ) {
printf ( " set allocation size to zero failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
if ( ! cli_qfileinfo ( & cli1 , fnum1 , NULL , & fsize , NULL , NULL , NULL , NULL , NULL ) ) {
printf ( " qfileinfo failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
correct = False ;
}
if ( fsize ! = 0 )
printf ( " readwritelarge test 3 (truncate test) succeeded (size = %x) \n " , fsize ) ;
# endif
2001-07-07 10:21:32 +04:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
correct = False ;
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
return correct ;
2001-07-07 10:21:32 +04:00
}
2001-06-19 06:02:19 +04:00
int line_count = 0 ;
2002-02-05 04:31:47 +03:00
int nbio_id ;
# define ival(s) strtol(s, NULL, 0)
2001-06-19 06:02:19 +04:00
/* run a test that simulates an approximate netbench client load */
2001-07-02 07:21:17 +04:00
static BOOL run_netbench ( int client )
2001-06-19 06:02:19 +04:00
{
struct cli_state cli ;
int i ;
fstring fname ;
pstring line ;
char cname [ 20 ] ;
FILE * f ;
char * params [ 20 ] ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
cli = current_cli ;
2002-02-05 04:31:47 +03:00
nbio_id = client ;
2001-06-19 06:02:19 +04:00
cli_sockopt ( & cli , sockops ) ;
nb_setup ( & cli ) ;
2002-02-05 04:31:47 +03:00
slprintf ( cname , sizeof ( fname ) , " client%d " , client ) ;
2001-06-19 06:02:19 +04:00
2002-02-05 04:31:47 +03:00
f = fopen ( client_txt , " r " ) ;
2001-06-19 06:02:19 +04:00
if ( ! f ) {
2002-02-05 04:31:47 +03:00
perror ( client_txt ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
while ( fgets ( line , sizeof ( line ) - 1 , f ) ) {
line_count + + ;
line [ strlen ( line ) - 1 ] = 0 ;
/* printf("[%d] %s\n", line_count, line); */
2002-02-05 04:31:47 +03:00
all_string_sub ( line , " client1 " , cname , sizeof ( line ) ) ;
2001-06-19 06:02:19 +04:00
/* parse the command parameters */
params [ 0 ] = strtok ( line , " " ) ;
i = 0 ;
while ( params [ i ] ) params [ + + i ] = strtok ( NULL , " " ) ;
params [ i ] = " " ;
if ( i < 2 ) continue ;
2002-02-05 04:31:47 +03:00
if ( ! strncmp ( params [ 0 ] , " SMB " , 3 ) ) {
printf ( " ERROR: You are using a dbench 1 load file \n " ) ;
exit ( 1 ) ;
}
if ( ! strcmp ( params [ 0 ] , " NTCreateX " ) ) {
nb_createx ( params [ 1 ] , ival ( params [ 2 ] ) , ival ( params [ 3 ] ) ,
ival ( params [ 4 ] ) ) ;
} else if ( ! strcmp ( params [ 0 ] , " Close " ) ) {
nb_close ( ival ( params [ 1 ] ) ) ;
} else if ( ! strcmp ( params [ 0 ] , " Rename " ) ) {
nb_rename ( params [ 1 ] , params [ 2 ] ) ;
} else if ( ! strcmp ( params [ 0 ] , " Unlink " ) ) {
nb_unlink ( params [ 1 ] ) ;
} else if ( ! strcmp ( params [ 0 ] , " Deltree " ) ) {
nb_deltree ( params [ 1 ] ) ;
} else if ( ! strcmp ( params [ 0 ] , " Rmdir " ) ) {
nb_rmdir ( params [ 1 ] ) ;
} else if ( ! strcmp ( params [ 0 ] , " QUERY_PATH_INFORMATION " ) ) {
nb_qpathinfo ( params [ 1 ] ) ;
} else if ( ! strcmp ( params [ 0 ] , " QUERY_FILE_INFORMATION " ) ) {
nb_qfileinfo ( ival ( params [ 1 ] ) ) ;
} else if ( ! strcmp ( params [ 0 ] , " QUERY_FS_INFORMATION " ) ) {
nb_qfsinfo ( ival ( params [ 1 ] ) ) ;
} else if ( ! strcmp ( params [ 0 ] , " FIND_FIRST " ) ) {
nb_findfirst ( params [ 1 ] ) ;
} else if ( ! strcmp ( params [ 0 ] , " WriteX " ) ) {
nb_writex ( ival ( params [ 1 ] ) ,
ival ( params [ 2 ] ) , ival ( params [ 3 ] ) , ival ( params [ 4 ] ) ) ;
} else if ( ! strcmp ( params [ 0 ] , " ReadX " ) ) {
nb_readx ( ival ( params [ 1 ] ) ,
ival ( params [ 2 ] ) , ival ( params [ 3 ] ) , ival ( params [ 4 ] ) ) ;
} else if ( ! strcmp ( params [ 0 ] , " Flush " ) ) {
nb_flush ( ival ( params [ 1 ] ) ) ;
2001-06-19 06:02:19 +04:00
} else {
2002-02-05 04:31:47 +03:00
printf ( " Unknown operation %s \n " , params [ 0 ] ) ;
exit ( 1 ) ;
2001-06-19 06:02:19 +04:00
}
}
fclose ( f ) ;
2002-02-05 06:55:20 +03:00
nb_cleanup ( ) ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
return correct ;
2001-06-19 06:02:19 +04:00
}
2002-02-05 04:31:47 +03:00
/* run a test that simulates an approximate netbench client load */
static BOOL run_nbench ( int dummy )
2001-06-19 06:02:19 +04:00
{
double t ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
2002-02-05 04:31:47 +03:00
nbio_shmem ( nprocs ) ;
nbio_id = - 1 ;
signal ( SIGALRM , nb_alarm ) ;
alarm ( 1 ) ;
2001-07-02 07:21:17 +04:00
t = create_procs ( run_netbench , & correct ) ;
2002-02-05 04:31:47 +03:00
alarm ( 0 ) ;
printf ( " \n Throughput %g MB/sec \n " ,
1.0e-6 * nbio_total ( ) / t ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/*
This test checks for two things :
1 ) correct support for retaining locks over a close ( ie . the server
must not use posix semantics )
2 ) support for lock timeouts
*/
2001-07-02 07:21:17 +04:00
static BOOL run_locktest1 ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli1 , cli2 ;
char * fname = " \\ lockt1.lck " ;
int fnum1 , fnum2 , fnum3 ;
time_t t1 , t2 ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) | | ! torture_open_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli1 , sockops ) ;
cli_sockopt ( & cli2 , sockops ) ;
printf ( " starting locktest1 \n " ) ;
cli_unlink ( & cli1 , fname ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
fnum2 = cli_open ( & cli1 , fname , O_RDWR , DENY_NONE ) ;
if ( fnum2 = = - 1 ) {
printf ( " open2 of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
fnum3 = cli_open ( & cli2 , fname , O_RDWR , DENY_NONE ) ;
if ( fnum3 = = - 1 ) {
printf ( " open3 of %s failed (%s) \n " , fname , cli_errstr ( & cli2 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_lock ( & cli1 , fnum1 , 0 , 4 , 0 , WRITE_LOCK ) ) {
printf ( " lock1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_lock ( & cli2 , fnum3 , 0 , 4 , 0 , WRITE_LOCK ) ) {
printf ( " lock2 succeeded! This is a locking bug \n " ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
} else {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , & cli2 , ERRDOS , ERRlock ,
NT_STATUS_LOCK_NOT_GRANTED ) ) return False ;
2001-06-19 06:02:19 +04:00
}
printf ( " Testing lock timeouts \n " ) ;
t1 = time ( NULL ) ;
if ( cli_lock ( & cli2 , fnum3 , 0 , 4 , 10 * 1000 , WRITE_LOCK ) ) {
printf ( " lock3 succeeded! This is a locking bug \n " ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
} else {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , & cli2 , ERRDOS , ERRlock ,
2002-03-06 21:55:01 +03:00
NT_STATUS_FILE_LOCK_CONFLICT ) ) return False ;
2001-06-19 06:02:19 +04:00
}
t2 = time ( NULL ) ;
if ( t2 - t1 < 5 ) {
printf ( " error: This server appears not to support timed lock requests \n " ) ;
}
if ( ! cli_close ( & cli1 , fnum2 ) ) {
printf ( " close1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_lock ( & cli2 , fnum3 , 0 , 4 , 0 , WRITE_LOCK ) ) {
printf ( " lock4 succeeded! This is a locking bug \n " ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
} else {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , & cli2 , ERRDOS , ERRlock ,
2002-03-06 21:55:01 +03:00
NT_STATUS_FILE_LOCK_CONFLICT ) ) return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_close ( & cli2 , fnum3 ) ) {
printf ( " close3 failed (%s) \n " , cli_errstr ( & cli2 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_unlink ( & cli1 , fname ) ) {
printf ( " unlink failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
}
2001-06-19 06:02:19 +04:00
printf ( " Passed locktest1 \n " ) ;
2001-07-02 07:21:17 +04:00
return True ;
2001-06-19 06:02:19 +04:00
}
/*
checks for correct tconX support
*/
2001-07-02 07:21:17 +04:00
static BOOL run_tcon_test ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli1 ;
char * fname = " \\ tcontest.tmp " ;
int fnum1 ;
uint16 cnum ;
char buf [ 4 ] ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli1 , sockops ) ;
printf ( " starting tcontest \n " ) ;
cli_unlink ( & cli1 , fname ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 )
{
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cnum = cli1 . cnum ;
if ( cli_write ( & cli1 , fnum1 , 0 , buf , 130 , 4 ) ! = 4 )
{
printf ( " write failed (%s) " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_send_tconX ( & cli1 , share , " ????? " ,
password , strlen ( password ) + 1 ) ) {
printf ( " %s refused 2nd tree connect (%s) \n " , host ,
cli_errstr ( & cli1 ) ) ;
cli_shutdown ( & cli1 ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_write ( & cli1 , fnum1 , 0 , buf , 130 , 4 ) = = 4 )
{
printf ( " write succeeded (%s) " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_close ( & cli1 , fnum1 ) ) {
printf ( " close2 succeeded (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_tdis ( & cli1 ) ) {
printf ( " tdis failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli1 . cnum = cnum ;
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
}
2001-06-19 06:02:19 +04:00
printf ( " Passed tcontest \n " ) ;
2001-07-02 07:21:17 +04:00
return True ;
2001-06-19 06:02:19 +04:00
}
/*
This test checks that
1 ) the server supports multiple locking contexts on the one SMB
connection , distinguished by PID .
2 ) the server correctly fails overlapping locks made by the same PID ( this
goes against POSIX behaviour , which is why it is tricky to implement )
3 ) the server denies unlock requests by an incorrect client PID
*/
2001-07-02 07:21:17 +04:00
static BOOL run_locktest2 ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli ;
char * fname = " \\ lockt2.lck " ;
int fnum1 , fnum2 , fnum3 ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli , sockops ) ;
printf ( " starting locktest2 \n " ) ;
cli_unlink ( & cli , fname ) ;
cli_setpid ( & cli , 1 ) ;
fnum1 = cli_open ( & cli , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
fnum2 = cli_open ( & cli , fname , O_RDWR , DENY_NONE ) ;
if ( fnum2 = = - 1 ) {
printf ( " open2 of %s failed (%s) \n " , fname , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_setpid ( & cli , 2 ) ;
fnum3 = cli_open ( & cli , fname , O_RDWR , DENY_NONE ) ;
if ( fnum3 = = - 1 ) {
printf ( " open3 of %s failed (%s) \n " , fname , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_setpid ( & cli , 1 ) ;
if ( ! cli_lock ( & cli , fnum1 , 0 , 4 , 0 , WRITE_LOCK ) ) {
printf ( " lock1 failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_lock ( & cli , fnum1 , 0 , 4 , 0 , WRITE_LOCK ) ) {
printf ( " WRITE lock1 succeeded! This is a locking bug \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
} else {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , & cli , ERRDOS , ERRlock ,
NT_STATUS_LOCK_NOT_GRANTED ) ) return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_lock ( & cli , fnum2 , 0 , 4 , 0 , WRITE_LOCK ) ) {
printf ( " WRITE lock2 succeeded! This is a locking bug \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
} else {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , & cli , ERRDOS , ERRlock ,
NT_STATUS_LOCK_NOT_GRANTED ) ) return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_lock ( & cli , fnum2 , 0 , 4 , 0 , READ_LOCK ) ) {
printf ( " READ lock2 succeeded! This is a locking bug \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
} else {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , & cli , ERRDOS , ERRlock ,
2002-03-06 21:55:01 +03:00
NT_STATUS_FILE_LOCK_CONFLICT ) ) return False ;
2001-06-19 06:02:19 +04:00
}
2001-07-07 10:21:32 +04:00
if ( ! cli_lock ( & cli , fnum1 , 100 , 4 , 0 , WRITE_LOCK ) ) {
printf ( " lock at 100 failed (%s) \n " , cli_errstr ( & cli ) ) ;
}
2001-06-19 06:02:19 +04:00
cli_setpid ( & cli , 2 ) ;
2001-07-07 10:21:32 +04:00
if ( cli_unlock ( & cli , fnum1 , 100 , 4 ) ) {
printf ( " unlock at 100 succeeded! This is a locking bug \n " ) ;
correct = False ;
}
2001-06-19 06:02:19 +04:00
2001-07-07 10:21:32 +04:00
if ( cli_unlock ( & cli , fnum1 , 0 , 4 ) ) {
2001-07-02 07:21:17 +04:00
printf ( " unlock1 succeeded! This is a locking bug \n " ) ;
correct = False ;
2001-07-07 10:21:32 +04:00
} else {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , & cli ,
2001-09-06 05:21:09 +04:00
ERRDOS , ERRlock ,
2002-03-06 21:55:01 +03:00
NT_STATUS_RANGE_NOT_LOCKED ) ) return False ;
2001-07-07 10:21:32 +04:00
}
if ( cli_unlock ( & cli , fnum1 , 0 , 8 ) ) {
printf ( " unlock2 succeeded! This is a locking bug \n " ) ;
correct = False ;
} else {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , & cli ,
2001-09-06 05:21:09 +04:00
ERRDOS , ERRlock ,
2002-03-06 21:55:01 +03:00
NT_STATUS_RANGE_NOT_LOCKED ) ) return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_lock ( & cli , fnum3 , 0 , 4 , 0 , WRITE_LOCK ) ) {
printf ( " lock3 succeeded! This is a locking bug \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
} else {
2001-08-20 09:15:26 +04:00
if ( ! check_error ( __LINE__ , & cli , ERRDOS , ERRlock , NT_STATUS_LOCK_NOT_GRANTED ) ) return False ;
2001-06-19 06:02:19 +04:00
}
cli_setpid ( & cli , 1 ) ;
if ( ! cli_close ( & cli , fnum1 ) ) {
printf ( " close1 failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_close ( & cli , fnum2 ) ) {
printf ( " close2 failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_close ( & cli , fnum3 ) ) {
printf ( " close3 failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " locktest2 finished \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/*
This test checks that
1 ) the server supports the full offset range in lock requests
*/
2001-07-02 07:21:17 +04:00
static BOOL run_locktest3 ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli1 , cli2 ;
char * fname = " \\ lockt3.lck " ;
int fnum1 , fnum2 , i ;
uint32 offset ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
# define NEXT_OFFSET offset += (~(uint32)0) / numops
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) | | ! torture_open_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli1 , sockops ) ;
cli_sockopt ( & cli2 , sockops ) ;
printf ( " starting locktest3 \n " ) ;
cli_unlink ( & cli1 , fname ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
fnum2 = cli_open ( & cli2 , fname , O_RDWR , DENY_NONE ) ;
if ( fnum2 = = - 1 ) {
printf ( " open2 of %s failed (%s) \n " , fname , cli_errstr ( & cli2 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
for ( offset = i = 0 ; i < numops ; i + + ) {
NEXT_OFFSET ;
if ( ! cli_lock ( & cli1 , fnum1 , offset - 1 , 1 , 0 , WRITE_LOCK ) ) {
printf ( " lock1 %d failed (%s) \n " ,
i ,
cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_lock ( & cli2 , fnum2 , offset - 2 , 1 , 0 , WRITE_LOCK ) ) {
printf ( " lock2 %d failed (%s) \n " ,
i ,
cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
}
for ( offset = i = 0 ; i < numops ; i + + ) {
NEXT_OFFSET ;
if ( cli_lock ( & cli1 , fnum1 , offset - 2 , 1 , 0 , WRITE_LOCK ) ) {
printf ( " error: lock1 %d succeeded! \n " , i ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_lock ( & cli2 , fnum2 , offset - 1 , 1 , 0 , WRITE_LOCK ) ) {
printf ( " error: lock2 %d succeeded! \n " , i ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_lock ( & cli1 , fnum1 , offset - 1 , 1 , 0 , WRITE_LOCK ) ) {
printf ( " error: lock3 %d succeeded! \n " , i ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_lock ( & cli2 , fnum2 , offset - 2 , 1 , 0 , WRITE_LOCK ) ) {
printf ( " error: lock4 %d succeeded! \n " , i ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
}
for ( offset = i = 0 ; i < numops ; i + + ) {
NEXT_OFFSET ;
if ( ! cli_unlock ( & cli1 , fnum1 , offset - 1 , 1 ) ) {
printf ( " unlock1 %d failed (%s) \n " ,
i ,
cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_unlock ( & cli2 , fnum2 , offset - 2 , 1 ) ) {
printf ( " unlock2 %d failed (%s) \n " ,
i ,
cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_close ( & cli2 , fnum2 ) ) {
printf ( " close2 failed (%s) \n " , cli_errstr ( & cli2 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_unlink ( & cli1 , fname ) ) {
printf ( " unlink failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " finished locktest3 \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
# define EXPECTED(ret, v) if ((ret) != (v)) { \
printf ( " ** " ) ; correct = False ; \
}
2001-06-19 06:02:19 +04:00
/*
looks at overlapping locks
*/
2001-07-02 07:21:17 +04:00
static BOOL run_locktest4 ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli1 , cli2 ;
char * fname = " \\ lockt4.lck " ;
int fnum1 , fnum2 , f ;
BOOL ret ;
char buf [ 1000 ] ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) | | ! torture_open_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli1 , sockops ) ;
cli_sockopt ( & cli2 , sockops ) ;
printf ( " starting locktest4 \n " ) ;
cli_unlink ( & cli1 , fname ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
fnum2 = cli_open ( & cli2 , fname , O_RDWR , DENY_NONE ) ;
memset ( buf , 0 , sizeof ( buf ) ) ;
if ( cli_write ( & cli1 , fnum1 , 0 , buf , 0 , sizeof ( buf ) ) ! = sizeof ( buf ) ) {
printf ( " Failed to create file \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
goto fail ;
}
ret = cli_lock ( & cli1 , fnum1 , 0 , 4 , 0 , WRITE_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 2 , 4 , 0 , WRITE_LOCK ) ;
EXPECTED ( ret , False ) ;
printf ( " the same process %s set overlapping write locks \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 10 , 4 , 0 , READ_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 12 , 4 , 0 , READ_LOCK ) ;
EXPECTED ( ret , True ) ;
printf ( " the same process %s set overlapping read locks \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 20 , 4 , 0 , WRITE_LOCK ) & &
cli_lock ( & cli2 , fnum2 , 22 , 4 , 0 , WRITE_LOCK ) ;
EXPECTED ( ret , False ) ;
printf ( " a different connection %s set overlapping write locks \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 30 , 4 , 0 , READ_LOCK ) & &
cli_lock ( & cli2 , fnum2 , 32 , 4 , 0 , READ_LOCK ) ;
EXPECTED ( ret , True ) ;
printf ( " a different connection %s set overlapping read locks \n " , ret ? " can " : " cannot " ) ;
ret = ( cli_setpid ( & cli1 , 1 ) , cli_lock ( & cli1 , fnum1 , 40 , 4 , 0 , WRITE_LOCK ) ) & &
( cli_setpid ( & cli1 , 2 ) , cli_lock ( & cli1 , fnum1 , 42 , 4 , 0 , WRITE_LOCK ) ) ;
EXPECTED ( ret , False ) ;
printf ( " a different pid %s set overlapping write locks \n " , ret ? " can " : " cannot " ) ;
ret = ( cli_setpid ( & cli1 , 1 ) , cli_lock ( & cli1 , fnum1 , 50 , 4 , 0 , READ_LOCK ) ) & &
( cli_setpid ( & cli1 , 2 ) , cli_lock ( & cli1 , fnum1 , 52 , 4 , 0 , READ_LOCK ) ) ;
EXPECTED ( ret , True ) ;
printf ( " a different pid %s set overlapping read locks \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 60 , 4 , 0 , READ_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 60 , 4 , 0 , READ_LOCK ) ;
EXPECTED ( ret , True ) ;
printf ( " the same process %s set the same read lock twice \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 70 , 4 , 0 , WRITE_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 70 , 4 , 0 , WRITE_LOCK ) ;
EXPECTED ( ret , False ) ;
printf ( " the same process %s set the same write lock twice \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 80 , 4 , 0 , READ_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 80 , 4 , 0 , WRITE_LOCK ) ;
EXPECTED ( ret , False ) ;
printf ( " the same process %s overlay a read lock with a write lock \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 90 , 4 , 0 , WRITE_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 90 , 4 , 0 , READ_LOCK ) ;
EXPECTED ( ret , True ) ;
printf ( " the same process %s overlay a write lock with a read lock \n " , ret ? " can " : " cannot " ) ;
ret = ( cli_setpid ( & cli1 , 1 ) , cli_lock ( & cli1 , fnum1 , 100 , 4 , 0 , WRITE_LOCK ) ) & &
( cli_setpid ( & cli1 , 2 ) , cli_lock ( & cli1 , fnum1 , 100 , 4 , 0 , READ_LOCK ) ) ;
EXPECTED ( ret , False ) ;
printf ( " a different pid %s overlay a write lock with a read lock \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 110 , 4 , 0 , READ_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 112 , 4 , 0 , READ_LOCK ) & &
cli_unlock ( & cli1 , fnum1 , 110 , 6 ) ;
EXPECTED ( ret , False ) ;
printf ( " the same process %s coalesce read locks \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 120 , 4 , 0 , WRITE_LOCK ) & &
( cli_read ( & cli2 , fnum2 , buf , 120 , 4 ) = = 4 ) ;
EXPECTED ( ret , False ) ;
printf ( " this server %s strict write locking \n " , ret ? " doesn't do " : " does " ) ;
ret = cli_lock ( & cli1 , fnum1 , 130 , 4 , 0 , READ_LOCK ) & &
( cli_write ( & cli2 , fnum2 , 0 , buf , 130 , 4 ) = = 4 ) ;
EXPECTED ( ret , False ) ;
printf ( " this server %s strict read locking \n " , ret ? " doesn't do " : " does " ) ;
ret = cli_lock ( & cli1 , fnum1 , 140 , 4 , 0 , READ_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 140 , 4 , 0 , READ_LOCK ) & &
cli_unlock ( & cli1 , fnum1 , 140 , 4 ) & &
cli_unlock ( & cli1 , fnum1 , 140 , 4 ) ;
EXPECTED ( ret , True ) ;
printf ( " this server %s do recursive read locking \n " , ret ? " does " : " doesn't " ) ;
ret = cli_lock ( & cli1 , fnum1 , 150 , 4 , 0 , WRITE_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 150 , 4 , 0 , READ_LOCK ) & &
cli_unlock ( & cli1 , fnum1 , 150 , 4 ) & &
( cli_read ( & cli2 , fnum2 , buf , 150 , 4 ) = = 4 ) & &
! ( cli_write ( & cli2 , fnum2 , 0 , buf , 150 , 4 ) = = 4 ) & &
cli_unlock ( & cli1 , fnum1 , 150 , 4 ) ;
EXPECTED ( ret , True ) ;
printf ( " this server %s do recursive lock overlays \n " , ret ? " does " : " doesn't " ) ;
ret = cli_lock ( & cli1 , fnum1 , 160 , 4 , 0 , READ_LOCK ) & &
cli_unlock ( & cli1 , fnum1 , 160 , 4 ) & &
( cli_write ( & cli2 , fnum2 , 0 , buf , 160 , 4 ) = = 4 ) & &
( cli_read ( & cli2 , fnum2 , buf , 160 , 4 ) = = 4 ) ;
EXPECTED ( ret , True ) ;
printf ( " the same process %s remove a read lock using write locking \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 170 , 4 , 0 , WRITE_LOCK ) & &
cli_unlock ( & cli1 , fnum1 , 170 , 4 ) & &
( cli_write ( & cli2 , fnum2 , 0 , buf , 170 , 4 ) = = 4 ) & &
( cli_read ( & cli2 , fnum2 , buf , 170 , 4 ) = = 4 ) ;
EXPECTED ( ret , True ) ;
printf ( " the same process %s remove a write lock using read locking \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli1 , fnum1 , 190 , 4 , 0 , WRITE_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 190 , 4 , 0 , READ_LOCK ) & &
cli_unlock ( & cli1 , fnum1 , 190 , 4 ) & &
! ( cli_write ( & cli2 , fnum2 , 0 , buf , 190 , 4 ) = = 4 ) & &
( cli_read ( & cli2 , fnum2 , buf , 190 , 4 ) = = 4 ) ;
EXPECTED ( ret , True ) ;
printf ( " the same process %s remove the first lock first \n " , ret ? " does " : " doesn't " ) ;
cli_close ( & cli1 , fnum1 ) ;
cli_close ( & cli2 , fnum2 ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR , DENY_NONE ) ;
f = cli_open ( & cli1 , fname , O_RDWR , DENY_NONE ) ;
ret = cli_lock ( & cli1 , fnum1 , 0 , 8 , 0 , READ_LOCK ) & &
cli_lock ( & cli1 , f , 0 , 1 , 0 , READ_LOCK ) & &
cli_close ( & cli1 , fnum1 ) & &
( ( fnum1 = cli_open ( & cli1 , fname , O_RDWR , DENY_NONE ) ) ! = - 1 ) & &
cli_lock ( & cli1 , fnum1 , 7 , 1 , 0 , WRITE_LOCK ) ;
cli_close ( & cli1 , f ) ;
2002-03-11 04:37:08 +03:00
cli_close ( & cli1 , fnum1 ) ;
2001-06-19 06:02:19 +04:00
EXPECTED ( ret , True ) ;
printf ( " the server %s have the NT byte range lock bug \n " , ! ret ? " does " : " doesn't " ) ;
2002-03-11 04:37:08 +03:00
2001-06-19 06:02:19 +04:00
fail :
cli_close ( & cli1 , fnum1 ) ;
cli_close ( & cli2 , fnum2 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-08-27 12:19:43 +04:00
torture_close_connection ( & cli1 ) ;
torture_close_connection ( & cli2 ) ;
2001-06-19 06:02:19 +04:00
printf ( " finished locktest4 \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/*
looks at lock upgrade / downgrade .
*/
2001-07-02 07:21:17 +04:00
static BOOL run_locktest5 ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli1 , cli2 ;
char * fname = " \\ lockt5.lck " ;
int fnum1 , fnum2 , fnum3 ;
BOOL ret ;
char buf [ 1000 ] ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) | | ! torture_open_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli1 , sockops ) ;
cli_sockopt ( & cli2 , sockops ) ;
printf ( " starting locktest5 \n " ) ;
cli_unlink ( & cli1 , fname ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
fnum2 = cli_open ( & cli2 , fname , O_RDWR , DENY_NONE ) ;
fnum3 = cli_open ( & cli1 , fname , O_RDWR , DENY_NONE ) ;
memset ( buf , 0 , sizeof ( buf ) ) ;
if ( cli_write ( & cli1 , fnum1 , 0 , buf , 0 , sizeof ( buf ) ) ! = sizeof ( buf ) ) {
printf ( " Failed to create file \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
goto fail ;
}
/* Check for NT bug... */
ret = cli_lock ( & cli1 , fnum1 , 0 , 8 , 0 , READ_LOCK ) & &
cli_lock ( & cli1 , fnum3 , 0 , 1 , 0 , READ_LOCK ) ;
cli_close ( & cli1 , fnum1 ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR , DENY_NONE ) ;
ret = cli_lock ( & cli1 , fnum1 , 7 , 1 , 0 , WRITE_LOCK ) ;
EXPECTED ( ret , True ) ;
printf ( " this server %s the NT locking bug \n " , ret ? " doesn't have " : " has " ) ;
cli_close ( & cli1 , fnum1 ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR , DENY_NONE ) ;
cli_unlock ( & cli1 , fnum3 , 0 , 1 ) ;
ret = cli_lock ( & cli1 , fnum1 , 0 , 4 , 0 , WRITE_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 1 , 1 , 0 , READ_LOCK ) ;
EXPECTED ( ret , True ) ;
printf ( " the same process %s overlay a write with a read lock \n " , ret ? " can " : " cannot " ) ;
ret = cli_lock ( & cli2 , fnum2 , 0 , 4 , 0 , READ_LOCK ) ;
EXPECTED ( ret , False ) ;
printf ( " a different processs %s get a read lock on the first process lock stack \n " , ret ? " can " : " cannot " ) ;
/* Unlock the process 2 lock. */
cli_unlock ( & cli2 , fnum2 , 0 , 4 ) ;
ret = cli_lock ( & cli1 , fnum3 , 0 , 4 , 0 , READ_LOCK ) ;
EXPECTED ( ret , False ) ;
printf ( " the same processs on a different fnum %s get a read lock \n " , ret ? " can " : " cannot " ) ;
/* Unlock the process 1 fnum3 lock. */
cli_unlock ( & cli1 , fnum3 , 0 , 4 ) ;
/* Stack 2 more locks here. */
ret = cli_lock ( & cli1 , fnum1 , 0 , 4 , 0 , READ_LOCK ) & &
cli_lock ( & cli1 , fnum1 , 0 , 4 , 0 , READ_LOCK ) ;
EXPECTED ( ret , True ) ;
printf ( " the same process %s stack read locks \n " , ret ? " can " : " cannot " ) ;
/* Unlock the first process lock, then check this was the WRITE lock that was
removed . */
ret = cli_unlock ( & cli1 , fnum1 , 0 , 4 ) & &
cli_lock ( & cli2 , fnum2 , 0 , 4 , 0 , READ_LOCK ) ;
EXPECTED ( ret , True ) ;
printf ( " the first unlock removes the %s lock \n " , ret ? " WRITE " : " READ " ) ;
/* Unlock the process 2 lock. */
cli_unlock ( & cli2 , fnum2 , 0 , 4 ) ;
/* We should have 3 stacked locks here. Ensure we need to do 3 unlocks. */
ret = cli_unlock ( & cli1 , fnum1 , 1 , 1 ) & &
cli_unlock ( & cli1 , fnum1 , 0 , 4 ) & &
cli_unlock ( & cli1 , fnum1 , 0 , 4 ) ;
EXPECTED ( ret , True ) ;
printf ( " the same process %s unlock the stack of 4 locks \n " , ret ? " can " : " cannot " ) ;
/* Ensure the next unlock fails. */
ret = cli_unlock ( & cli1 , fnum1 , 0 , 4 ) ;
EXPECTED ( ret , False ) ;
printf ( " the same process %s count the lock stack \n " , ! ret ? " can " : " cannot " ) ;
/* Ensure connection 2 can get a write lock. */
ret = cli_lock ( & cli2 , fnum2 , 0 , 4 , 0 , WRITE_LOCK ) ;
EXPECTED ( ret , True ) ;
printf ( " a different processs %s get a write lock on the unlocked stack \n " , ret ? " can " : " cannot " ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
fail :
cli_close ( & cli1 , fnum1 ) ;
cli_close ( & cli2 , fnum2 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " finished locktest5 \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
2002-03-11 04:37:08 +03:00
/*
tries the unusual lockingX locktype bits
*/
static BOOL run_locktest6 ( int dummy )
{
static struct cli_state cli ;
2002-03-11 18:56:59 +03:00
char * fname [ 1 ] = { " \\ lock6.txt " } ;
2002-03-11 04:57:39 +03:00
int i ;
2002-03-11 04:37:08 +03:00
int fnum ;
NTSTATUS status ;
if ( ! torture_open_connection ( & cli ) ) {
return False ;
}
cli_sockopt ( & cli , sockops ) ;
printf ( " starting locktest6 \n " ) ;
2002-03-11 18:56:59 +03:00
for ( i = 0 ; i < 1 ; i + + ) {
2002-03-11 04:57:39 +03:00
printf ( " Testing %s \n " , fname [ i ] ) ;
2002-03-11 04:37:08 +03:00
2002-03-11 04:57:39 +03:00
cli_unlink ( & cli , fname [ i ] ) ;
2002-03-11 04:37:08 +03:00
2002-03-11 04:57:39 +03:00
fnum = cli_open ( & cli , fname [ i ] , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
status = cli_locktype ( & cli , fnum , 0 , 8 , 0 , LOCKING_ANDX_CHANGE_LOCKTYPE ) ;
cli_close ( & cli , fnum ) ;
2002-03-17 07:36:35 +03:00
printf ( " CHANGE_LOCKTYPE gave %s \n " , nt_errstr ( status ) ) ;
2002-03-11 04:57:39 +03:00
fnum = cli_open ( & cli , fname [ i ] , O_RDWR , DENY_NONE ) ;
status = cli_locktype ( & cli , fnum , 0 , 8 , 0 , LOCKING_ANDX_CANCEL_LOCK ) ;
cli_close ( & cli , fnum ) ;
2002-03-17 07:36:35 +03:00
printf ( " CANCEL_LOCK gave %s \n " , nt_errstr ( status ) ) ;
2002-03-11 04:57:39 +03:00
cli_unlink ( & cli , fname [ i ] ) ;
}
2002-03-11 04:37:08 +03:00
torture_close_connection ( & cli ) ;
printf ( " finished locktest6 \n " ) ;
return True ;
}
2001-06-19 06:02:19 +04:00
/*
test whether fnums and tids open on one VC are available on another ( a major
security hole )
*/
2001-07-02 07:21:17 +04:00
static BOOL run_fdpasstest ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli1 , cli2 , cli3 ;
char * fname = " \\ fdpass.tst " ;
int fnum1 ;
pstring buf ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) | | ! torture_open_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli1 , sockops ) ;
cli_sockopt ( & cli2 , sockops ) ;
printf ( " starting fdpasstest \n " ) ;
cli_unlink ( & cli1 , fname ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_write ( & cli1 , fnum1 , 0 , " hello world \n " , 0 , 13 ) ! = 13 ) {
printf ( " write failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli3 = cli2 ;
cli3 . vuid = cli1 . vuid ;
cli3 . cnum = cli1 . cnum ;
cli3 . pid = cli1 . pid ;
if ( cli_read ( & cli3 , fnum1 , buf , 0 , 13 ) = = 13 ) {
printf ( " read succeeded! nasty security hole [%s] \n " ,
buf ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_close ( & cli1 , fnum1 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-08-27 12:19:43 +04:00
torture_close_connection ( & cli1 ) ;
torture_close_connection ( & cli2 ) ;
2001-06-19 06:02:19 +04:00
printf ( " finished fdpasstest \n " ) ;
2001-07-02 07:21:17 +04:00
return True ;
2001-06-19 06:02:19 +04:00
}
/*
This test checks that
1 ) the server does not allow an unlink on a file that is open
*/
2001-07-02 07:21:17 +04:00
static BOOL run_unlinktest ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli ;
char * fname = " \\ unlink.tst " ;
int fnum ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli , sockops ) ;
printf ( " starting unlink test \n " ) ;
cli_unlink ( & cli , fname ) ;
cli_setpid ( & cli , 1 ) ;
fnum = cli_open ( & cli , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( cli_unlink ( & cli , fname ) ) {
printf ( " error: server allowed unlink on an open file \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-08-24 03:16:42 +04:00
} else {
correct = check_error ( __LINE__ , & cli , ERRDOS , ERRbadshare ,
NT_STATUS_SHARING_VIOLATION ) ;
2001-06-19 06:02:19 +04:00
}
cli_close ( & cli , fnum ) ;
cli_unlink ( & cli , fname ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " unlink test finished \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/*
test how many open files this server supports on the one socket
*/
2001-07-02 07:21:17 +04:00
static BOOL run_maxfidtest ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli ;
char * template = " \\ maxfid.%d.%d " ;
fstring fname ;
2001-08-20 09:15:26 +04:00
int fnums [ 0x11000 ] , i ;
2001-06-19 06:02:19 +04:00
int retries = 4 ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
cli = current_cli ;
if ( retries < = 0 ) {
printf ( " failed to connect \n " ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli , sockops ) ;
2001-08-20 09:15:26 +04:00
for ( i = 0 ; i < 0x11000 ; i + + ) {
slprintf ( fname , sizeof ( fname ) - 1 , template , i , ( int ) getpid ( ) ) ;
if ( ( fnums [ i ] = cli_open ( & cli , fname ,
O_RDWR | O_CREAT | O_TRUNC , DENY_NONE ) ) = =
2001-06-19 06:02:19 +04:00
- 1 ) {
printf ( " open of %s failed (%s) \n " ,
fname , cli_errstr ( & cli ) ) ;
2001-08-20 09:15:26 +04:00
printf ( " maximum fnum is %d \n " , i ) ;
2001-06-19 06:02:19 +04:00
break ;
}
2001-08-24 03:16:42 +04:00
printf ( " %6d \r " , i ) ;
2001-06-19 06:02:19 +04:00
}
2001-08-24 03:16:42 +04:00
printf ( " %6d \n " , i ) ;
2001-11-20 11:49:16 +03:00
i - - ;
2001-06-19 06:02:19 +04:00
printf ( " cleaning up \n " ) ;
2001-08-20 09:15:26 +04:00
for ( ; i > = 0 ; i - - ) {
slprintf ( fname , sizeof ( fname ) - 1 , template , i , ( int ) getpid ( ) ) ;
cli_close ( & cli , fnums [ i ] ) ;
2001-06-19 06:02:19 +04:00
if ( ! cli_unlink ( & cli , fname ) ) {
printf ( " unlink of %s failed (%s) \n " ,
fname , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
2001-08-24 03:16:42 +04:00
printf ( " %6d \r " , i ) ;
2001-06-19 06:02:19 +04:00
}
2001-08-24 03:16:42 +04:00
printf ( " %6d \n " , 0 ) ;
2001-06-19 06:02:19 +04:00
printf ( " maxfid test finished \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
return correct ;
2001-06-19 06:02:19 +04:00
}
/* generate a random buffer */
static void rand_buf ( char * buf , int len )
{
while ( len - - ) {
* buf = ( char ) sys_random ( ) ;
buf + + ;
}
}
/* send smb negprot commands, not reading the response */
2001-07-02 07:21:17 +04:00
static BOOL run_negprot_nowait ( int dummy )
2001-06-19 06:02:19 +04:00
{
int i ;
static struct cli_state cli ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
printf ( " starting negprot nowait test \n " ) ;
if ( ! open_nbt_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
for ( i = 0 ; i < 50000 ; i + + ) {
cli_negprot_send ( & cli ) ;
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " finished negprot nowait test \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/* send random IPC commands */
2001-07-02 07:21:17 +04:00
static BOOL run_randomipc ( int dummy )
2001-06-19 06:02:19 +04:00
{
char * rparam = NULL ;
char * rdata = NULL ;
int rdrcnt , rprcnt ;
pstring param ;
int api , param_len , i ;
static struct cli_state cli ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-08-24 03:16:42 +04:00
int count = 50000 ;
2001-06-19 06:02:19 +04:00
printf ( " starting random ipc test \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
2001-08-24 03:16:42 +04:00
for ( i = 0 ; i < count ; i + + ) {
2001-06-19 06:02:19 +04:00
api = sys_random ( ) % 500 ;
param_len = ( sys_random ( ) % 64 ) ;
rand_buf ( param , param_len ) ;
SSVAL ( param , 0 , api ) ;
cli_api ( & cli ,
param , param_len , 8 ,
NULL , 0 , BUFFER_SIZE ,
& rparam , & rprcnt ,
& rdata , & rdrcnt ) ;
2001-08-24 03:16:42 +04:00
if ( i % 100 = = 0 ) {
printf ( " %d/%d \r " , i , count ) ;
}
2001-06-19 06:02:19 +04:00
}
2001-08-24 03:16:42 +04:00
printf ( " %d/%d \n " , i , count ) ;
2001-06-19 06:02:19 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " finished random ipc test \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
static void browse_callback ( const char * sname , uint32 stype ,
const char * comment , void * state )
{
printf ( " \t %20.20s %08x %s \n " , sname , stype , comment ) ;
}
/*
This test checks the browse list code
*/
2001-07-02 07:21:17 +04:00
static BOOL run_browsetest ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
printf ( " starting browse test \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
printf ( " domain list: \n " ) ;
cli_NetServerEnum ( & cli , cli . server_domain ,
SV_TYPE_DOMAIN_ENUM ,
browse_callback , NULL ) ;
printf ( " machine list: \n " ) ;
cli_NetServerEnum ( & cli , cli . server_domain ,
SV_TYPE_ALL ,
browse_callback , NULL ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " browse test finished \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/*
This checks how the getatr calls works
*/
2001-07-02 07:21:17 +04:00
static BOOL run_attrtest ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli ;
int fnum ;
time_t t , t2 ;
char * fname = " \\ attrib.tst " ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
printf ( " starting attrib test \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_unlink ( & cli , fname ) ;
fnum = cli_open ( & cli , fname ,
O_RDWR | O_CREAT | O_TRUNC , DENY_NONE ) ;
cli_close ( & cli , fnum ) ;
if ( ! cli_getatr ( & cli , fname , NULL , NULL , & t ) ) {
printf ( " getatr failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
2002-03-03 23:47:44 +03:00
if ( abs ( t - time ( NULL ) ) > 60 * 60 * 24 * 10 ) {
2001-06-19 06:02:19 +04:00
printf ( " ERROR: SMBgetatr bug. time is %s " ,
ctime ( & t ) ) ;
t = time ( NULL ) ;
2001-07-02 07:21:17 +04:00
correct = True ;
2001-06-19 06:02:19 +04:00
}
t2 = t - 60 * 60 * 24 ; /* 1 day ago */
if ( ! cli_setatr ( & cli , fname , 0 , t2 ) ) {
printf ( " setatr failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = True ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_getatr ( & cli , fname , NULL , NULL , & t ) ) {
printf ( " getatr failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = True ;
2001-06-19 06:02:19 +04:00
}
if ( t ! = t2 ) {
printf ( " ERROR: getatr/setatr bug. times are \n %s " ,
ctime ( & t ) ) ;
printf ( " %s " , ctime ( & t2 ) ) ;
2001-07-02 07:21:17 +04:00
correct = True ;
2001-06-19 06:02:19 +04:00
}
cli_unlink ( & cli , fname ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " attrib test finished \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/*
This checks a couple of trans2 calls
*/
2001-07-02 07:21:17 +04:00
static BOOL run_trans2test ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli ;
int fnum ;
size_t size ;
time_t c_time , a_time , m_time , w_time , m_time2 ;
char * fname = " \\ trans2.tst " ;
char * dname = " \\ trans2 " ;
char * fname2 = " \\ trans2 \\ trans2.tst " ;
2002-02-21 07:27:16 +03:00
pstring pname ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
printf ( " starting trans2 test \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_unlink ( & cli , fname ) ;
fnum = cli_open ( & cli , fname ,
O_RDWR | O_CREAT | O_TRUNC , DENY_NONE ) ;
if ( ! cli_qfileinfo ( & cli , fnum , NULL , & size , & c_time , & a_time , & m_time ,
NULL , NULL ) ) {
printf ( " ERROR: qfileinfo failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
2002-02-21 07:27:16 +03:00
if ( ! cli_qfilename ( & cli , fnum , pname ) ) {
printf ( " ERROR: qfilename failed (%s) \n " , cli_errstr ( & cli ) ) ;
correct = False ;
}
if ( strcmp ( pname , fname ) ) {
printf ( " qfilename gave different name? [%s] [%s] \n " ,
fname , pname ) ;
correct = False ;
}
2001-06-19 06:02:19 +04:00
cli_close ( & cli , fnum ) ;
sleep ( 2 ) ;
cli_unlink ( & cli , fname ) ;
fnum = cli_open ( & cli , fname ,
O_RDWR | O_CREAT | O_TRUNC , DENY_NONE ) ;
2001-08-22 07:15:33 +04:00
if ( fnum = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli ) ) ;
return False ;
}
2001-06-19 06:02:19 +04:00
cli_close ( & cli , fnum ) ;
if ( ! cli_qpathinfo ( & cli , fname , & c_time , & a_time , & m_time , & size , NULL ) ) {
printf ( " ERROR: qpathinfo failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
} else {
if ( c_time ! = m_time ) {
printf ( " create time=%s " , ctime ( & c_time ) ) ;
printf ( " modify time=%s " , ctime ( & m_time ) ) ;
printf ( " This system appears to have sticky create times \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( a_time % ( 60 * 60 ) = = 0 ) {
printf ( " access time=%s " , ctime ( & a_time ) ) ;
printf ( " This system appears to set a midnight access time \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
if ( abs ( m_time - time ( NULL ) ) > 60 * 60 * 24 * 7 ) {
2001-08-24 03:16:42 +04:00
printf ( " ERROR: totally incorrect times - maybe word reversed? mtime=%s " , ctime ( & m_time ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
}
cli_unlink ( & cli , fname ) ;
fnum = cli_open ( & cli , fname ,
O_RDWR | O_CREAT | O_TRUNC , DENY_NONE ) ;
cli_close ( & cli , fnum ) ;
if ( ! cli_qpathinfo2 ( & cli , fname , & c_time , & a_time , & m_time ,
& w_time , & size , NULL , NULL ) ) {
printf ( " ERROR: qpathinfo2 failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
} else {
if ( w_time < 60 * 60 * 24 * 2 ) {
printf ( " write time=%s " , ctime ( & w_time ) ) ;
printf ( " This system appears to set a initial 0 write time \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
}
cli_unlink ( & cli , fname ) ;
/* check if the server updates the directory modification time
when creating a new file */
if ( ! cli_mkdir ( & cli , dname ) ) {
printf ( " ERROR: mkdir failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
sleep ( 3 ) ;
if ( ! cli_qpathinfo2 ( & cli , " \\ trans2 \\ " , & c_time , & a_time , & m_time ,
& w_time , & size , NULL , NULL ) ) {
printf ( " ERROR: qpathinfo2 failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
fnum = cli_open ( & cli , fname2 ,
O_RDWR | O_CREAT | O_TRUNC , DENY_NONE ) ;
cli_write ( & cli , fnum , 0 , ( char * ) & fnum , 0 , sizeof ( fnum ) ) ;
cli_close ( & cli , fnum ) ;
if ( ! cli_qpathinfo2 ( & cli , " \\ trans2 \\ " , & c_time , & a_time , & m_time2 ,
& w_time , & size , NULL , NULL ) ) {
printf ( " ERROR: qpathinfo2 failed (%s) \n " , cli_errstr ( & cli ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
} else {
2001-07-02 07:21:17 +04:00
if ( m_time2 = = m_time ) {
2001-06-19 06:02:19 +04:00
printf ( " This system does not update directory modification times \n " ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
}
cli_unlink ( & cli , fname2 ) ;
cli_rmdir ( & cli , dname ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " trans2 test finished \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/*
This checks new W2K calls .
*/
2001-07-02 07:21:17 +04:00
static BOOL new_trans ( struct cli_state * pcli , int fnum , int level )
2001-06-19 06:02:19 +04:00
{
char buf [ 4096 ] ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
memset ( buf , 0xff , sizeof ( buf ) ) ;
if ( ! cli_qfileinfo_test ( pcli , fnum , level , buf ) ) {
printf ( " ERROR: qfileinfo (%d) failed (%s) \n " , level , cli_errstr ( pcli ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
} else {
printf ( " qfileinfo: level %d \n " , level ) ;
dump_data ( 0 , buf , 256 ) ;
printf ( " \n " ) ;
}
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
static BOOL run_w2ktest ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli ;
int fnum ;
char * fname = " \\ w2ktest \\ w2k.tst " ;
int level ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
printf ( " starting w2k test \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
fnum = cli_open ( & cli , fname ,
O_RDWR | O_CREAT , DENY_NONE ) ;
2001-07-02 07:21:17 +04:00
for ( level = 1004 ; level < 1040 ; level + + ) {
2001-08-22 07:15:33 +04:00
new_trans ( & cli , fnum , level ) ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
cli_close ( & cli , fnum ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " w2k test finished \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/*
this is a harness for some oplock tests
*/
2001-07-02 07:21:17 +04:00
static BOOL run_oplock1 ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli1 ;
char * fname = " \\ lockt1.lck " ;
int fnum1 ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
printf ( " starting oplock test 1 \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_unlink ( & cli1 , fname ) ;
cli_sockopt ( & cli1 , sockops ) ;
cli1 . use_oplocks = True ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli1 . use_oplocks = False ;
cli_unlink ( & cli1 , fname ) ;
cli_unlink ( & cli1 , fname ) ;
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_unlink ( & cli1 , fname ) ) {
printf ( " unlink failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " finished oplock test 1 \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
static BOOL run_oplock2 ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli1 , cli2 ;
char * fname = " \\ lockt2.lck " ;
int fnum1 , fnum2 ;
int saved_use_oplocks = use_oplocks ;
char buf [ 4 ] ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
volatile BOOL * shared_correct ;
shared_correct = ( volatile BOOL * ) shm_setup ( sizeof ( BOOL ) ) ;
* shared_correct = True ;
2001-06-19 06:02:19 +04:00
use_level_II_oplocks = True ;
use_oplocks = True ;
printf ( " starting oplock test 2 \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) ) {
2001-06-19 06:02:19 +04:00
use_level_II_oplocks = False ;
use_oplocks = saved_use_oplocks ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli1 . use_oplocks = True ;
cli1 . use_level_II_oplocks = True ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli2 ) ) {
2001-06-19 06:02:19 +04:00
use_level_II_oplocks = False ;
use_oplocks = saved_use_oplocks ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli2 . use_oplocks = True ;
cli2 . use_level_II_oplocks = True ;
cli_unlink ( & cli1 , fname ) ;
cli_sockopt ( & cli1 , sockops ) ;
cli_sockopt ( & cli2 , sockops ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
/* Don't need the globals any more. */
use_level_II_oplocks = False ;
use_oplocks = saved_use_oplocks ;
if ( fork ( ) = = 0 ) {
/* Child code */
fnum2 = cli_open ( & cli2 , fname , O_RDWR , DENY_NONE ) ;
if ( fnum2 = = - 1 ) {
printf ( " second open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
* shared_correct = False ;
2001-06-19 06:02:19 +04:00
exit ( 0 ) ;
}
sleep ( 2 ) ;
if ( ! cli_close ( & cli2 , fnum2 ) ) {
printf ( " close2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
* shared_correct = False ;
2001-06-19 06:02:19 +04:00
}
exit ( 0 ) ;
}
sleep ( 2 ) ;
/* Ensure cli1 processes the break. */
if ( cli_read ( & cli1 , fnum1 , buf , 0 , 4 ) ! = 4 ) {
printf ( " read on fnum1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
/* Should now be at level II. */
/* Test if sending a write locks causes a break to none. */
if ( ! cli_lock ( & cli1 , fnum1 , 0 , 4 , 0 , READ_LOCK ) ) {
printf ( " lock failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
cli_unlock ( & cli1 , fnum1 , 0 , 4 ) ;
sleep ( 2 ) ;
if ( ! cli_lock ( & cli1 , fnum1 , 0 , 4 , 0 , WRITE_LOCK ) ) {
printf ( " lock failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
cli_unlock ( & cli1 , fnum1 , 0 , 4 ) ;
sleep ( 2 ) ;
cli_read ( & cli1 , fnum1 , buf , 0 , 4 ) ;
#if 0
if ( cli_write ( & cli1 , fnum1 , 0 , buf , 0 , 4 ) ! = 4 ) {
printf ( " write on fnum1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
# endif
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
sleep ( 4 ) ;
if ( ! cli_unlink ( & cli1 , fname ) ) {
printf ( " unlink failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
if ( ! * shared_correct ) {
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " finished oplock test 2 \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
/* handler for oplock 3 tests */
static BOOL oplock3_handler ( struct cli_state * cli , int fnum , unsigned char level )
{
printf ( " got oplock break fnum=%d level=%d \n " ,
fnum , level ) ;
return cli_oplock_ack ( cli , fnum , level ) ;
}
2001-07-02 07:21:17 +04:00
static BOOL run_oplock3 ( int dummy )
2001-06-19 06:02:19 +04:00
{
static struct cli_state cli ;
char * fname = " \\ oplockt3.dat " ;
int fnum ;
char buf [ 4 ] = " abcd " ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
volatile BOOL * shared_correct ;
shared_correct = ( volatile BOOL * ) shm_setup ( sizeof ( BOOL ) ) ;
* shared_correct = True ;
2001-06-19 06:02:19 +04:00
printf ( " starting oplock test 3 \n " ) ;
if ( fork ( ) = = 0 ) {
/* Child code */
2001-06-19 11:31:55 +04:00
use_oplocks = True ;
use_level_II_oplocks = True ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
* shared_correct = False ;
exit ( 0 ) ;
}
2001-06-19 06:02:19 +04:00
sleep ( 2 ) ;
/* try to trigger a oplock break in parent */
fnum = cli_open ( & cli , fname , O_RDWR , DENY_NONE ) ;
cli_write ( & cli , fnum , 0 , buf , 0 , 4 ) ;
exit ( 0 ) ;
}
/* parent code */
use_oplocks = True ;
use_level_II_oplocks = True ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
}
2001-06-19 06:02:19 +04:00
cli_oplock_handler ( & cli , oplock3_handler ) ;
fnum = cli_open ( & cli , fname , O_RDWR | O_CREAT , DENY_NONE ) ;
cli_write ( & cli , fnum , 0 , buf , 0 , 4 ) ;
cli_close ( & cli , fnum ) ;
fnum = cli_open ( & cli , fname , O_RDWR , DENY_NONE ) ;
cli . timeout = 20000 ;
cli_receive_smb ( & cli ) ;
printf ( " finished oplock test 3 \n " ) ;
2001-07-02 07:21:17 +04:00
return ( correct & & * shared_correct ) ;
/* What are we looking for here? What's sucess and what's FAILURE? */
2001-06-19 06:02:19 +04:00
}
/*
Test delete on close semantics .
*/
2001-07-02 07:21:17 +04:00
static BOOL run_deletetest ( int dummy )
2001-06-19 06:02:19 +04:00
{
2001-07-02 07:21:17 +04:00
static struct cli_state cli1 ;
static struct cli_state cli2 ;
char * fname = " \\ delete.file " ;
2002-03-07 07:15:40 +03:00
int fnum1 = - 1 ;
int fnum2 = - 1 ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
printf ( " starting delete test \n " ) ;
2002-03-07 07:15:40 +03:00
ZERO_STRUCT ( cli1 ) ;
ZERO_STRUCT ( cli2 ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
}
2001-06-19 06:02:19 +04:00
cli_sockopt ( & cli1 , sockops ) ;
2001-09-06 05:21:09 +04:00
2001-06-19 06:02:19 +04:00
/* Test 1 - this should *NOT* delete the file on close. */
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
fnum1 = cli_nt_create_full ( & cli1 , fname , GENERIC_ALL_ACCESS , FILE_ATTRIBUTE_NORMAL ,
2001-09-06 05:21:09 +04:00
FILE_SHARE_DELETE , FILE_OVERWRITE_IF ,
DELETE_ON_CLOSE_FLAG ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
if ( fnum1 = = - 1 ) {
printf ( " [1] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [1] close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
fnum1 = cli_open ( & cli1 , fname , O_RDWR , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " [1] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [1] close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
printf ( " first delete on close test succeeded. \n " ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
/* Test 2 - this should delete the file on close. */
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
fnum1 = cli_nt_create_full ( & cli1 , fname , GENERIC_ALL_ACCESS ,
2001-09-06 05:21:09 +04:00
FILE_ATTRIBUTE_NORMAL , FILE_SHARE_NONE ,
FILE_OVERWRITE_IF , 0 ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
if ( fnum1 = = - 1 ) {
printf ( " [2] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
if ( ! cli_nt_delete_on_close ( & cli1 , fnum1 , True ) ) {
2001-07-02 07:21:17 +04:00
printf ( " [2] setting delete_on_close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [2] close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
fnum1 = cli_open ( & cli1 , fname , O_RDONLY , DENY_NONE ) ;
if ( fnum1 ! = - 1 ) {
2001-06-19 06:02:19 +04:00
printf ( " [2] open of %s succeeded should have been deleted on close ! \n " , fname ) ;
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [2] close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2002-03-07 07:15:40 +03:00
goto fail ;
2001-06-19 06:02:19 +04:00
}
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
} else
2001-06-19 06:02:19 +04:00
printf ( " second delete on close test succeeded. \n " ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
/* Test 3 - ... */
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
cli_unlink ( & cli1 , fname ) ;
fnum1 = cli_nt_create_full ( & cli1 , fname , GENERIC_ALL_ACCESS , FILE_ATTRIBUTE_NORMAL ,
2001-09-06 05:21:09 +04:00
FILE_SHARE_READ | FILE_SHARE_WRITE , FILE_OVERWRITE_IF , 0 ) ;
2001-06-19 06:02:19 +04:00
if ( fnum1 = = - 1 ) {
printf ( " [3] open - 1 of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
/* This should fail with a sharing violation - open for delete is only compatible
with SHARE_DELETE . */
fnum2 = cli_nt_create_full ( & cli1 , fname , GENERIC_READ_ACCESS , FILE_ATTRIBUTE_NORMAL ,
FILE_SHARE_READ | FILE_SHARE_WRITE , FILE_OPEN , 0 ) ;
if ( fnum2 ! = - 1 ) {
printf ( " [3] open - 2 of %s succeeded - should have failed. \n " , fname ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
/* This should succeed. */
fnum2 = cli_nt_create_full ( & cli1 , fname , GENERIC_READ_ACCESS , FILE_ATTRIBUTE_NORMAL ,
FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE , FILE_OPEN , 0 ) ;
if ( fnum2 = = - 1 ) {
printf ( " [3] open - 2 of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_nt_delete_on_close ( & cli1 , fnum1 , True ) ) {
2001-07-02 07:21:17 +04:00
printf ( " [3] setting delete_on_close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [3] close 1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
if ( ! cli_close ( & cli1 , fnum2 ) ) {
printf ( " [3] close 2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
/* This should fail - file should no longer be there. */
2001-07-02 07:21:17 +04:00
fnum1 = cli_open ( & cli1 , fname , O_RDONLY , DENY_NONE ) ;
if ( fnum1 ! = - 1 ) {
2001-06-19 06:02:19 +04:00
printf ( " [3] open of %s succeeded should have been deleted on close ! \n " , fname ) ;
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [3] close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
}
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2002-03-07 07:15:40 +03:00
goto fail ;
2001-07-02 07:21:17 +04:00
} else
2001-06-19 06:02:19 +04:00
printf ( " third delete on close test succeeded. \n " ) ;
/* Test 4 ... */
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
cli_unlink ( & cli1 , fname ) ;
fnum1 = cli_nt_create_full ( & cli1 , fname , FILE_READ_DATA | FILE_WRITE_DATA | DELETE_ACCESS ,
FILE_ATTRIBUTE_NORMAL , FILE_SHARE_READ | FILE_SHARE_WRITE , FILE_OVERWRITE_IF , 0 ) ;
if ( fnum1 = = - 1 ) {
printf ( " [4] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
/* This should succeed. */
fnum2 = cli_nt_create_full ( & cli1 , fname , GENERIC_READ_ACCESS ,
FILE_ATTRIBUTE_NORMAL , FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE , FILE_OPEN , 0 ) ;
if ( fnum2 = = - 1 ) {
printf ( " [4] open - 2 of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli1 , fnum2 ) ) {
printf ( " [4] close - 1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
if ( ! cli_nt_delete_on_close ( & cli1 , fnum1 , True ) ) {
2001-07-02 07:21:17 +04:00
printf ( " [4] setting delete_on_close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
/* This should fail - no more opens once delete on close set. */
fnum2 = cli_nt_create_full ( & cli1 , fname , GENERIC_READ_ACCESS ,
2001-07-02 07:21:17 +04:00
FILE_ATTRIBUTE_NORMAL , FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE , FILE_OPEN , 0 ) ;
2001-06-19 06:02:19 +04:00
if ( fnum2 ! = - 1 ) {
printf ( " [4] open - 3 of %s succeeded ! Should have failed. \n " , fname ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
} else
2001-06-19 06:02:19 +04:00
printf ( " fourth delete on close test succeeded. \n " ) ;
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [4] close - 2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
/* Test 5 ... */
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT , DENY_NONE ) ;
2001-06-19 06:02:19 +04:00
if ( fnum1 = = - 1 ) {
printf ( " [5] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
/* This should fail - only allowed on NT opens with DELETE access. */
if ( cli_nt_delete_on_close ( & cli1 , fnum1 , True ) ) {
2001-07-02 07:21:17 +04:00
printf ( " [5] setting delete_on_close on OpenX file succeeded - should fail ! \n " ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [5] close - 2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
printf ( " fifth delete on close test succeeded. \n " ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
/* Test 6 ... */
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
fnum1 = cli_nt_create_full ( & cli1 , fname , FILE_READ_DATA | FILE_WRITE_DATA ,
2001-07-02 07:21:17 +04:00
FILE_ATTRIBUTE_NORMAL , FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE ,
FILE_OVERWRITE_IF , 0 ) ;
2001-06-19 06:02:19 +04:00
if ( fnum1 = = - 1 ) {
printf ( " [6] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
/* This should fail - only allowed on NT opens with DELETE access. */
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
if ( cli_nt_delete_on_close ( & cli1 , fnum1 , True ) ) {
2001-07-02 07:21:17 +04:00
printf ( " [6] setting delete_on_close on file with no delete access succeeded - should fail ! \n " ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [6] close - 2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
printf ( " sixth delete on close test succeeded. \n " ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
/* Test 7 ... */
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
fnum1 = cli_nt_create_full ( & cli1 , fname , FILE_READ_DATA | FILE_WRITE_DATA | DELETE_ACCESS ,
2001-07-02 07:21:17 +04:00
FILE_ATTRIBUTE_NORMAL , 0 , FILE_OVERWRITE_IF , 0 ) ;
2001-06-19 06:02:19 +04:00
if ( fnum1 = = - 1 ) {
printf ( " [7] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_nt_delete_on_close ( & cli1 , fnum1 , True ) ) {
2001-07-02 07:21:17 +04:00
printf ( " [7] setting delete_on_close on file failed ! \n " ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
if ( ! cli_nt_delete_on_close ( & cli1 , fnum1 , False ) ) {
2001-07-02 07:21:17 +04:00
printf ( " [7] unsetting delete_on_close on file failed ! \n " ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [7] close - 2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
/* This next open should succeed - we reset the flag. */
2001-07-02 07:21:17 +04:00
fnum1 = cli_open ( & cli1 , fname , O_RDONLY , DENY_NONE ) ;
2001-06-19 06:02:19 +04:00
if ( fnum1 = = - 1 ) {
printf ( " [5] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [7] close - 2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
printf ( " seventh delete on close test succeeded. \n " ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
/* Test 7 ... */
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli2 ) ) {
2001-06-19 06:02:19 +04:00
printf ( " [8] failed to open second connection. \n " ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
cli_sockopt ( & cli1 , sockops ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
fnum1 = cli_nt_create_full ( & cli1 , fname , FILE_READ_DATA | FILE_WRITE_DATA | DELETE_ACCESS ,
2001-07-02 07:21:17 +04:00
FILE_ATTRIBUTE_NORMAL , FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE , FILE_OVERWRITE_IF , 0 ) ;
2001-06-19 06:02:19 +04:00
if ( fnum1 = = - 1 ) {
printf ( " [8] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
fnum2 = cli_nt_create_full ( & cli2 , fname , FILE_READ_DATA | FILE_WRITE_DATA | DELETE_ACCESS ,
2001-07-02 07:21:17 +04:00
FILE_ATTRIBUTE_NORMAL , FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE , FILE_OPEN , 0 ) ;
2001-06-19 06:02:19 +04:00
if ( fnum2 = = - 1 ) {
printf ( " [8] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-06-19 06:02:19 +04:00
}
if ( ! cli_nt_delete_on_close ( & cli1 , fnum1 , True ) ) {
2001-07-02 07:21:17 +04:00
printf ( " [8] setting delete_on_close on file failed ! \n " ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [8] close - 1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli2 , fnum2 ) ) {
printf ( " [8] close - 2 failed (%s) \n " , cli_errstr ( & cli2 ) ) ;
2002-03-07 07:15:40 +03:00
correct = False ;
goto fail ;
2001-07-02 07:21:17 +04:00
}
2001-06-19 06:02:19 +04:00
/* This should fail.. */
2001-07-02 07:21:17 +04:00
fnum1 = cli_open ( & cli1 , fname , O_RDONLY , DENY_NONE ) ;
if ( fnum1 ! = - 1 ) {
2001-06-19 06:02:19 +04:00
printf ( " [8] open of %s succeeded should have been deleted on close ! \n " , fname ) ;
2002-03-07 07:15:40 +03:00
goto fail ;
2001-07-02 07:21:17 +04:00
correct = False ;
} else
2001-06-19 06:02:19 +04:00
printf ( " eighth delete on close test succeeded. \n " ) ;
2002-03-07 07:15:40 +03:00
/* This should fail - we need to set DELETE_ACCESS. */
fnum1 = cli_nt_create_full ( & cli1 , fname , FILE_READ_DATA | FILE_WRITE_DATA ,
FILE_ATTRIBUTE_NORMAL , FILE_SHARE_NONE , FILE_OVERWRITE_IF , FILE_DELETE_ON_CLOSE ) ;
if ( fnum1 ! = - 1 ) {
printf ( " [9] open of %s succeeded should have failed! \n " , fname ) ;
correct = False ;
goto fail ;
}
printf ( " ninth delete on close test succeeded. \n " ) ;
fnum1 = cli_nt_create_full ( & cli1 , fname , FILE_READ_DATA | FILE_WRITE_DATA | DELETE_ACCESS ,
FILE_ATTRIBUTE_NORMAL , FILE_SHARE_NONE , FILE_OVERWRITE_IF , FILE_DELETE_ON_CLOSE ) ;
if ( fnum1 = = - 1 ) {
printf ( " [10] open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
correct = False ;
goto fail ;
}
/* This should delete the file. */
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " [10] close failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
correct = False ;
goto fail ;
}
/* This should fail.. */
fnum1 = cli_open ( & cli1 , fname , O_RDONLY , DENY_NONE ) ;
if ( fnum1 ! = - 1 ) {
printf ( " [10] open of %s succeeded should have been deleted on close ! \n " , fname ) ;
goto fail ;
correct = False ;
} else
printf ( " tenth delete on close test succeeded. \n " ) ;
2001-07-02 07:21:17 +04:00
printf ( " finished delete test \n " ) ;
2002-03-07 07:15:40 +03:00
fail :
2001-07-02 07:21:17 +04:00
2002-03-07 07:15:40 +03:00
cli_close ( & cli1 , fnum1 ) ;
cli_close ( & cli1 , fnum2 ) ;
2001-06-19 06:02:19 +04:00
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli2 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
return correct ;
2001-06-19 06:02:19 +04:00
}
2002-03-20 02:19:00 +03:00
/*
print out server properties
*/
static BOOL run_properties ( int dummy )
{
static struct cli_state cli ;
BOOL correct = True ;
printf ( " starting properties test \n " ) ;
ZERO_STRUCT ( cli ) ;
if ( ! torture_open_connection ( & cli ) ) {
return False ;
}
cli_sockopt ( & cli , sockops ) ;
d_printf ( " Capabilities 0x%08x \n " , cli . capabilities ) ;
if ( ! torture_close_connection ( & cli ) ) {
correct = False ;
}
return correct ;
}
2002-03-07 05:16:25 +03:00
/* FIRST_DESIRED_ACCESS 0xf019f */
# define FIRST_DESIRED_ACCESS FILE_READ_DATA|FILE_WRITE_DATA|FILE_APPEND_DATA|\
FILE_READ_EA | /* 0xf */ \
FILE_WRITE_EA | FILE_READ_ATTRIBUTES | /* 0x90 */ \
FILE_WRITE_ATTRIBUTES | /* 0x100 */ \
DELETE_ACCESS | READ_CONTROL_ACCESS | \
WRITE_DAC_ACCESS | WRITE_OWNER_ACCESS /* 0xf0000 */
/* SECOND_DESIRED_ACCESS 0xe0080 */
# define SECOND_DESIRED_ACCESS FILE_READ_ATTRIBUTES| /* 0x80 */ \
READ_CONTROL_ACCESS | WRITE_DAC_ACCESS | \
WRITE_OWNER_ACCESS /* 0xe0000 */
#if 0
# define THIRD_DESIRED_ACCESS FILE_READ_ATTRIBUTES| /* 0x80 */ \
READ_CONTROL_ACCESS | WRITE_DAC_ACCESS | \
FILE_READ_DATA | \
WRITE_OWNER_ACCESS /* */
# endif
2002-02-24 11:38:11 +03:00
/*
Test ntcreate calls made by xcopy
*/
static BOOL run_xcopy ( int dummy )
{
static struct cli_state cli1 ;
char * fname = " \\ test.txt " ;
BOOL correct = True ;
int fnum1 , fnum2 ;
printf ( " starting xcopy test \n " ) ;
if ( ! torture_open_connection ( & cli1 ) ) {
return False ;
}
fnum1 = cli_nt_create_full ( & cli1 , fname ,
2002-03-07 05:16:25 +03:00
FIRST_DESIRED_ACCESS , FILE_ATTRIBUTE_ARCHIVE ,
FILE_SHARE_NONE , FILE_OVERWRITE_IF ,
2002-02-24 11:38:11 +03:00
0x4044 ) ;
if ( fnum1 = = - 1 ) {
printf ( " First open failed - %s \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
fnum2 = cli_nt_create_full ( & cli1 , fname ,
2002-03-07 05:16:25 +03:00
SECOND_DESIRED_ACCESS , 0 ,
FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE , FILE_OPEN ,
2002-02-24 11:38:11 +03:00
0x200000 ) ;
if ( fnum2 = = - 1 ) {
printf ( " second open failed - %s \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
if ( ! torture_close_connection ( & cli1 ) ) {
correct = False ;
}
return correct ;
}
2002-03-05 22:45:16 +03:00
/*
Test rename on files open with share delete and no share delete .
*/
static BOOL run_rename ( int dummy )
{
static struct cli_state cli1 ;
char * fname = " \\ test.txt " ;
char * fname1 = " \\ test1.txt " ;
BOOL correct = True ;
2002-03-10 04:47:12 +03:00
int fnum1 ;
2002-03-05 22:45:16 +03:00
printf ( " starting rename test \n " ) ;
if ( ! torture_open_connection ( & cli1 ) ) {
return False ;
}
cli_unlink ( & cli1 , fname ) ;
cli_unlink ( & cli1 , fname1 ) ;
fnum1 = cli_nt_create_full ( & cli1 , fname , GENERIC_READ_ACCESS , FILE_ATTRIBUTE_NORMAL ,
FILE_SHARE_READ , FILE_OVERWRITE_IF , 0 ) ;
if ( fnum1 = = - 1 ) {
printf ( " First open failed - %s \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
if ( ! cli_rename ( & cli1 , fname , fname1 ) ) {
printf ( " First rename failed (this is correct) - %s \n " , cli_errstr ( & cli1 ) ) ;
} else {
printf ( " First rename succeeded - this should have failed ! \n " ) ;
correct = False ;
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close - 1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
cli_unlink ( & cli1 , fname ) ;
cli_unlink ( & cli1 , fname1 ) ;
fnum1 = cli_nt_create_full ( & cli1 , fname , GENERIC_READ_ACCESS , FILE_ATTRIBUTE_NORMAL ,
2002-03-23 05:57:44 +03:00
#if 0
FILE_SHARE_DELETE | FILE_SHARE_NONE , FILE_OVERWRITE_IF , 0 ) ;
# else
2002-03-05 22:45:16 +03:00
FILE_SHARE_DELETE | FILE_SHARE_READ , FILE_OVERWRITE_IF , 0 ) ;
2002-03-23 05:57:44 +03:00
# endif
2002-03-05 22:45:16 +03:00
if ( fnum1 = = - 1 ) {
printf ( " Second open failed - %s \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
if ( ! cli_rename ( & cli1 , fname , fname1 ) ) {
printf ( " Second rename failed - this should have succeeded - %s \n " , cli_errstr ( & cli1 ) ) ;
correct = False ;
} else {
printf ( " Second rename succeeded \n " ) ;
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close - 2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-23 05:57:44 +03:00
return False ;
}
cli_unlink ( & cli1 , fname ) ;
cli_unlink ( & cli1 , fname1 ) ;
fnum1 = cli_nt_create_full ( & cli1 , fname , READ_CONTROL_ACCESS , FILE_ATTRIBUTE_NORMAL ,
FILE_SHARE_NONE , FILE_OVERWRITE_IF , 0 ) ;
if ( fnum1 = = - 1 ) {
printf ( " Third open failed - %s \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
2002-03-23 05:59:20 +03:00
#if 0
2002-03-23 05:57:44 +03:00
{
int fnum2 ;
fnum2 = cli_nt_create_full ( & cli1 , fname , DELETE_ACCESS , FILE_ATTRIBUTE_NORMAL ,
FILE_SHARE_NONE , FILE_OVERWRITE_IF , 0 ) ;
if ( fnum2 = = - 1 ) {
printf ( " Fourth open failed - %s \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
if ( ! cli_nt_delete_on_close ( & cli1 , fnum2 , True ) ) {
printf ( " [8] setting delete_on_close on file failed ! \n " ) ;
return False ;
}
if ( ! cli_close ( & cli1 , fnum2 ) ) {
printf ( " close - 4 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
}
# endif
if ( ! cli_rename ( & cli1 , fname , fname1 ) ) {
printf ( " Third rename failed - this should have succeeded - %s \n " , cli_errstr ( & cli1 ) ) ;
correct = False ;
} else {
printf ( " Third rename succeeded \n " ) ;
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close - 3 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2002-03-05 22:45:16 +03:00
return False ;
}
cli_unlink ( & cli1 , fname ) ;
cli_unlink ( & cli1 , fname1 ) ;
if ( ! torture_close_connection ( & cli1 ) ) {
correct = False ;
}
return correct ;
}
2002-02-24 11:38:11 +03:00
2001-06-19 06:02:19 +04:00
/*
Test open mode returns on read - only files .
*/
2001-07-02 07:21:17 +04:00
static BOOL run_opentest ( int dummy )
2001-06-19 06:02:19 +04:00
{
2001-07-02 07:21:17 +04:00
static struct cli_state cli1 ;
char * fname = " \\ readonly.file " ;
int fnum1 , fnum2 ;
2001-06-19 06:02:19 +04:00
char buf [ 20 ] ;
size_t fsize ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-09-17 08:23:48 +04:00
char * tmp_path ;
2001-06-19 06:02:19 +04:00
2001-07-02 07:21:17 +04:00
printf ( " starting open test \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
return False ;
}
2001-06-19 06:02:19 +04:00
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
2001-07-02 07:21:17 +04:00
cli_unlink ( & cli1 , fname ) ;
cli_sockopt ( & cli1 , sockops ) ;
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
return False ;
}
2001-06-19 06:02:19 +04:00
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
2001-06-19 06:02:19 +04:00
if ( ! cli_setatr ( & cli1 , fname , aRONLY , 0 ) ) {
printf ( " cli_setatr failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
fnum1 = cli_open ( & cli1 , fname , O_RDONLY , DENY_WRITE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
return False ;
}
2001-06-19 06:02:19 +04:00
/* This will fail - but the error should be ERRnoaccess, not ERRbadshare. */
2001-07-02 07:21:17 +04:00
fnum2 = cli_open ( & cli1 , fname , O_RDWR , DENY_ALL ) ;
2001-08-20 09:15:26 +04:00
if ( check_error ( __LINE__ , & cli1 , ERRDOS , ERRnoaccess ,
NT_STATUS_ACCESS_DENIED ) ) {
2001-06-19 06:02:19 +04:00
printf ( " correct error code ERRDOS/ERRnoaccess returned \n " ) ;
}
2001-07-02 07:21:17 +04:00
printf ( " finished open test 1 \n " ) ;
2001-06-19 06:02:19 +04:00
cli_close ( & cli1 , fnum1 ) ;
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
/* Now try not readonly and ensure ERRbadshare is returned. */
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
cli_setatr ( & cli1 , fname , 0 , 0 ) ;
2001-07-02 07:21:17 +04:00
fnum1 = cli_open ( & cli1 , fname , O_RDONLY , DENY_WRITE ) ;
if ( fnum1 = = - 1 ) {
printf ( " open of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
return False ;
}
2001-06-19 06:02:19 +04:00
/* This will fail - but the error should be ERRshare. */
2001-07-02 07:21:17 +04:00
fnum2 = cli_open ( & cli1 , fname , O_RDWR , DENY_ALL ) ;
2001-08-20 09:15:26 +04:00
if ( check_error ( __LINE__ , & cli1 , ERRDOS , ERRbadshare ,
NT_STATUS_SHARING_VIOLATION ) ) {
2001-06-19 06:02:19 +04:00
printf ( " correct error code ERRDOS/ERRbadshare returned \n " ) ;
}
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
2001-06-19 06:02:19 +04:00
cli_unlink ( & cli1 , fname ) ;
2001-07-02 07:21:17 +04:00
printf ( " finished open test 2 \n " ) ;
2001-06-19 06:02:19 +04:00
/* Test truncate open disposition on file opened for read. */
2001-07-02 07:21:17 +04:00
fnum1 = cli_open ( & cli1 , fname , O_RDWR | O_CREAT | O_EXCL , DENY_NONE ) ;
if ( fnum1 = = - 1 ) {
printf ( " (3) open (1) of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
return False ;
}
2001-06-19 06:02:19 +04:00
/* write 20 bytes. */
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
memset ( buf , ' \0 ' , 20 ) ;
if ( cli_write ( & cli1 , fnum1 , 0 , buf , 0 , 20 ) ! = 20 ) {
printf ( " write failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
correct = False ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " (3) close1 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
2001-06-19 06:02:19 +04:00
/* Ensure size == 20. */
if ( ! cli_getatr ( & cli1 , fname , NULL , & fsize , NULL ) ) {
printf ( " (3) getatr failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
if ( fsize ! = 20 ) {
printf ( " (3) file size != 20 \n " ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
/* Now test if we can truncate a file opened for readonly. */
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
fnum1 = cli_open ( & cli1 , fname , O_RDONLY | O_TRUNC , DENY_NONE ) ;
2001-07-02 07:21:17 +04:00
if ( fnum1 = = - 1 ) {
printf ( " (3) open (2) of %s failed (%s) \n " , fname , cli_errstr ( & cli1 ) ) ;
return False ;
}
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close2 failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
2001-06-19 06:02:19 +04:00
/* Ensure size == 0. */
if ( ! cli_getatr ( & cli1 , fname , NULL , & fsize , NULL ) ) {
printf ( " (3) getatr failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
if ( fsize ! = 0 ) {
printf ( " (3) file size != 0 \n " ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
printf ( " finished open test 3 \n " ) ;
2001-06-19 06:02:19 +04:00
cli_unlink ( & cli1 , fname ) ;
printf ( " testing ctemp \n " ) ;
2001-09-17 08:23:48 +04:00
fnum1 = cli_ctemp ( & cli1 , " \\ " , & tmp_path ) ;
if ( fnum1 = = - 1 ) {
printf ( " ctemp failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
return False ;
}
printf ( " ctemp gave path %s \n " , tmp_path ) ;
if ( ! cli_close ( & cli1 , fnum1 ) ) {
printf ( " close of temp failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
}
if ( ! cli_unlink ( & cli1 , tmp_path ) ) {
printf ( " unlink of temp failed (%s) \n " , cli_errstr ( & cli1 ) ) ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli1 ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
return correct ;
2001-06-19 06:02:19 +04:00
}
static void list_fn ( file_info * finfo , const char * name , void * state )
{
}
/*
test directory listing speed
*/
2001-07-02 07:21:17 +04:00
static BOOL run_dirtest ( int dummy )
2001-06-19 06:02:19 +04:00
{
int i ;
static struct cli_state cli ;
int fnum ;
double t1 ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
printf ( " starting directory test \n " ) ;
2001-08-27 12:19:43 +04:00
if ( ! torture_open_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_sockopt ( & cli , sockops ) ;
srandom ( 0 ) ;
for ( i = 0 ; i < numops ; i + + ) {
fstring fname ;
2002-03-03 23:47:44 +03:00
slprintf ( fname , sizeof ( fname ) , " \\ %x " , ( int ) random ( ) ) ;
2001-06-19 06:02:19 +04:00
fnum = cli_open ( & cli , fname , O_RDWR | O_CREAT , DENY_NONE ) ;
if ( fnum = = - 1 ) {
fprintf ( stderr , " Failed to open %s \n " , fname ) ;
2001-07-02 07:21:17 +04:00
return False ;
2001-06-19 06:02:19 +04:00
}
cli_close ( & cli , fnum ) ;
}
t1 = end_timer ( ) ;
printf ( " Matched %d \n " , cli_list ( & cli , " a*.* " , 0 , list_fn , NULL ) ) ;
printf ( " Matched %d \n " , cli_list ( & cli , " b*.* " , 0 , list_fn , NULL ) ) ;
printf ( " Matched %d \n " , cli_list ( & cli , " xyzabc " , 0 , list_fn , NULL ) ) ;
printf ( " dirtest core %g seconds \n " , end_timer ( ) - t1 ) ;
srandom ( 0 ) ;
for ( i = 0 ; i < numops ; i + + ) {
fstring fname ;
2002-03-03 23:47:44 +03:00
slprintf ( fname , sizeof ( fname ) , " \\ %x " , ( int ) random ( ) ) ;
2001-06-19 06:02:19 +04:00
cli_unlink ( & cli , fname ) ;
}
2001-08-27 12:19:43 +04:00
if ( ! torture_close_connection ( & cli ) ) {
2001-07-02 07:21:17 +04:00
correct = False ;
}
2001-06-19 06:02:19 +04:00
printf ( " finished dirtest \n " ) ;
2001-07-02 07:21:17 +04:00
return correct ;
2001-06-19 06:02:19 +04:00
}
2001-11-25 05:35:37 +03:00
static BOOL run_error_map_extract ( int dummy ) {
static struct cli_state c_dos ;
static struct cli_state c_nt ;
uint32 error ;
uint32 flgs2 , errnum ;
uint8 errclass ;
NTSTATUS nt_status ;
fstring user ;
2002-01-03 10:00:18 +03:00
/* NT-Error connection */
2002-01-03 09:10:25 +03:00
if ( ! open_nbt_connection ( & c_nt ) ) {
return False ;
}
2002-01-03 10:00:18 +03:00
c_nt . use_spnego = False ;
2002-01-03 08:48:49 +03:00
if ( ! cli_negprot ( & c_nt ) ) {
printf ( " %s rejected the NT-error negprot (%s) \n " , host , cli_errstr ( & c_nt ) ) ;
cli_shutdown ( & c_nt ) ;
2002-01-02 06:54:40 +03:00
return False ;
}
2001-11-25 05:35:37 +03:00
2002-01-03 10:00:18 +03:00
if ( ! cli_session_setup ( & c_nt , " " , " " , 0 , " " , 0 ,
workgroup ) ) {
printf ( " %s rejected the NT-error initial session setup (%s) \n " , host , cli_errstr ( & c_nt ) ) ;
return False ;
}
/* DOS-Error connection */
2002-01-03 09:10:25 +03:00
if ( ! open_nbt_connection ( & c_dos ) ) {
return False ;
}
2002-01-03 10:00:18 +03:00
c_dos . use_spnego = False ;
2001-11-25 05:35:37 +03:00
c_dos . force_dos_errors = True ;
2002-01-03 10:00:18 +03:00
2001-11-25 05:35:37 +03:00
if ( ! cli_negprot ( & c_dos ) ) {
printf ( " %s rejected the DOS-error negprot (%s) \n " , host , cli_errstr ( & c_dos ) ) ;
cli_shutdown ( & c_dos ) ;
return False ;
}
2002-01-03 10:00:18 +03:00
if ( ! cli_session_setup ( & c_dos , " " , " " , 0 , " " , 0 ,
workgroup ) ) {
printf ( " %s rejected the DOS-error initial session setup (%s) \n " , host , cli_errstr ( & c_dos ) ) ;
return False ;
}
2001-11-25 05:35:37 +03:00
for ( error = ( 0xc0000000 | 0x1 ) ; error < ( 0xc0000000 | 0xFFF ) ; error + + ) {
snprintf ( user , sizeof ( user ) , " %X " , error ) ;
2001-06-19 06:02:19 +04:00
2002-01-03 10:36:26 +03:00
if ( cli_session_setup ( & c_nt , user ,
2001-11-25 05:35:37 +03:00
password , strlen ( password ) ,
password , strlen ( password ) ,
2002-01-03 10:36:26 +03:00
workgroup ) ) {
printf ( " /** Session setup succeeded. This shouldn't happen...*/ \n " ) ;
}
flgs2 = SVAL ( c_nt . inbuf , smb_flg2 ) ;
/* Case #1: 32-bit NT errors */
if ( flgs2 & FLAGS2_32_BIT_ERROR_CODES ) {
nt_status = NT_STATUS ( IVAL ( c_nt . inbuf , smb_rcls ) ) ;
2001-11-25 05:35:37 +03:00
} else {
2002-01-03 11:36:47 +03:00
printf ( " /** Dos error on NT connection! (%s) */ \n " ,
2002-01-03 10:36:26 +03:00
cli_errstr ( & c_nt ) ) ;
nt_status = NT_STATUS ( 0xc0000000 ) ;
2001-11-25 05:35:37 +03:00
}
2002-01-03 10:36:26 +03:00
if ( cli_session_setup ( & c_dos , user ,
2001-11-25 05:35:37 +03:00
password , strlen ( password ) ,
password , strlen ( password ) ,
workgroup ) ) {
2002-01-03 10:36:26 +03:00
printf ( " /** Session setup succeeded. This shouldn't happen...*/ \n " ) ;
2001-11-25 05:35:37 +03:00
}
2002-01-03 10:36:26 +03:00
flgs2 = SVAL ( c_dos . inbuf , smb_flg2 ) , errnum ;
/* Case #1: 32-bit NT errors */
if ( flgs2 & FLAGS2_32_BIT_ERROR_CODES ) {
2002-01-03 11:36:47 +03:00
printf ( " /** NT error on DOS connection! (%s) */ \n " ,
2002-01-03 10:36:26 +03:00
cli_errstr ( & c_nt ) ) ;
errnum = errclass = 0 ;
2001-11-25 05:35:37 +03:00
} else {
2002-01-03 10:36:26 +03:00
cli_dos_error ( & c_dos , & errclass , & errnum ) ;
2001-11-25 05:35:37 +03:00
}
2002-01-03 10:36:26 +03:00
if ( NT_STATUS_V ( nt_status ) ! = error ) {
printf ( " /* \t { This NT error code was 'sqashed' \n \t from %s to %s \n \t during the session setup } \n */ \n " ,
get_nt_error_c_code ( NT_STATUS ( error ) ) ,
get_nt_error_c_code ( nt_status ) ) ;
}
printf ( " \t {%s, \t %s, \t %s}, \n " ,
smb_dos_err_class ( errclass ) ,
smb_dos_err_name ( errclass , errnum ) ,
2002-01-03 11:36:47 +03:00
get_nt_error_c_code ( NT_STATUS ( error ) ) ) ;
2001-11-25 05:35:37 +03:00
}
return True ;
}
2001-06-19 06:02:19 +04:00
2001-07-02 07:21:17 +04:00
static double create_procs ( BOOL ( * fn ) ( int ) , BOOL * result )
2001-06-19 06:02:19 +04:00
{
int i , status ;
2001-07-02 07:21:17 +04:00
volatile pid_t * child_status ;
volatile BOOL * child_status_out ;
2001-06-19 06:02:19 +04:00
int synccount ;
int tries = 8 ;
synccount = 0 ;
2001-07-02 07:21:17 +04:00
child_status = ( volatile pid_t * ) shm_setup ( sizeof ( pid_t ) * nprocs ) ;
2001-06-19 06:02:19 +04:00
if ( ! child_status ) {
printf ( " Failed to setup shared memory \n " ) ;
2001-07-02 07:21:17 +04:00
return - 1 ;
}
child_status_out = ( volatile BOOL * ) shm_setup ( sizeof ( BOOL ) * nprocs ) ;
if ( ! child_status_out ) {
printf ( " Failed to setup result status shared memory \n " ) ;
return - 1 ;
2001-06-19 06:02:19 +04:00
}
2002-01-16 05:31:53 +03:00
for ( i = 0 ; i < nprocs ; i + + ) {
child_status [ i ] = 0 ;
child_status_out [ i ] = True ;
}
2001-07-02 07:21:17 +04:00
start_timer ( ) ;
2001-06-19 06:02:19 +04:00
for ( i = 0 ; i < nprocs ; i + + ) {
procnum = i ;
if ( fork ( ) = = 0 ) {
pid_t mypid = getpid ( ) ;
sys_srandom ( ( ( int ) mypid ) ^ ( ( int ) time ( NULL ) ) ) ;
slprintf ( myname , sizeof ( myname ) , " CLIENT%d " , i ) ;
while ( 1 ) {
memset ( & current_cli , 0 , sizeof ( current_cli ) ) ;
2001-08-27 12:19:43 +04:00
if ( torture_open_connection ( & current_cli ) ) break ;
2001-06-19 06:02:19 +04:00
if ( tries - - = = 0 ) {
printf ( " pid %d failed to start \n " , ( int ) getpid ( ) ) ;
_exit ( 1 ) ;
}
2001-07-02 07:21:17 +04:00
msleep ( 10 ) ;
2001-06-19 06:02:19 +04:00
}
child_status [ i ] = getpid ( ) ;
while ( child_status [ i ] ) msleep ( 2 ) ;
2001-07-02 07:21:17 +04:00
child_status_out [ i ] = fn ( i ) ;
2001-06-19 06:02:19 +04:00
_exit ( 0 ) ;
}
}
do {
synccount = 0 ;
for ( i = 0 ; i < nprocs ; i + + ) {
if ( child_status [ i ] ) synccount + + ;
}
if ( synccount = = nprocs ) break ;
msleep ( 10 ) ;
} while ( end_timer ( ) < 30 ) ;
if ( synccount ! = nprocs ) {
printf ( " FAILED TO START %d CLIENTS (started %d) \n " , nprocs , synccount ) ;
2001-07-02 07:21:17 +04:00
* result = False ;
2001-06-19 06:02:19 +04:00
return end_timer ( ) ;
}
/* start the client load */
start_timer ( ) ;
for ( i = 0 ; i < nprocs ; i + + ) {
child_status [ i ] = 0 ;
}
printf ( " %d clients started \n " , nprocs ) ;
for ( i = 0 ; i < nprocs ; i + + ) {
2002-03-07 00:05:26 +03:00
while ( waitpid ( 0 , & status , 0 ) = = - 1 & & errno = = EINTR ) /* noop */ ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
2001-06-19 06:02:19 +04:00
printf ( " \n " ) ;
2001-07-02 07:21:17 +04:00
for ( i = 0 ; i < nprocs ; i + + ) {
if ( ! child_status_out [ i ] ) {
* result = False ;
}
}
2001-06-19 06:02:19 +04:00
return end_timer ( ) ;
}
# define FLAG_MULTIPROC 1
static struct {
char * name ;
2001-07-02 07:21:17 +04:00
BOOL ( * fn ) ( int ) ;
2001-06-19 06:02:19 +04:00
unsigned flags ;
} torture_ops [ ] = {
{ " FDPASS " , run_fdpasstest , 0 } ,
{ " LOCK1 " , run_locktest1 , 0 } ,
{ " LOCK2 " , run_locktest2 , 0 } ,
{ " LOCK3 " , run_locktest3 , 0 } ,
{ " LOCK4 " , run_locktest4 , 0 } ,
{ " LOCK5 " , run_locktest5 , 0 } ,
2002-03-11 04:37:08 +03:00
{ " LOCK6 " , run_locktest6 , 0 } ,
2001-06-19 06:02:19 +04:00
{ " UNLINK " , run_unlinktest , 0 } ,
{ " BROWSE " , run_browsetest , 0 } ,
{ " ATTR " , run_attrtest , 0 } ,
{ " TRANS2 " , run_trans2test , 0 } ,
{ " MAXFID " , run_maxfidtest , FLAG_MULTIPROC } ,
{ " TORTURE " , run_torture , FLAG_MULTIPROC } ,
{ " RANDOMIPC " , run_randomipc , 0 } ,
{ " NEGNOWAIT " , run_negprot_nowait , 0 } ,
2002-02-05 04:31:47 +03:00
{ " NBENCH " , run_nbench , 0 } ,
2001-06-19 06:02:19 +04:00
{ " OPLOCK1 " , run_oplock1 , 0 } ,
{ " OPLOCK2 " , run_oplock2 , 0 } ,
{ " OPLOCK3 " , run_oplock3 , 0 } ,
{ " DIR " , run_dirtest , 0 } ,
2001-09-06 14:37:21 +04:00
{ " DENY1 " , torture_denytest1 , 0 } ,
{ " DENY2 " , torture_denytest2 , 0 } ,
2001-06-19 06:02:19 +04:00
{ " TCON " , run_tcon_test , 0 } ,
{ " RW1 " , run_readwritetest , 0 } ,
{ " RW2 " , run_readwritemulti , FLAG_MULTIPROC } ,
{ " RW3 " , run_readwritelarge , 0 } ,
{ " OPEN " , run_opentest , 0 } ,
2002-02-24 11:38:11 +03:00
{ " XCOPY " , run_xcopy , 0 } ,
2002-03-05 22:45:16 +03:00
{ " RENAME " , run_rename , 0 } ,
2001-06-19 06:02:19 +04:00
{ " DELETE " , run_deletetest , 0 } ,
2002-03-20 02:19:00 +03:00
{ " PROPERTIES " , run_properties , 0 } ,
2001-06-19 06:02:19 +04:00
{ " W2K " , run_w2ktest , 0 } ,
2001-08-27 12:19:43 +04:00
{ " TRANS2SCAN " , torture_trans2_scan , 0 } ,
{ " NTTRANSSCAN " , torture_nttrans_scan , 0 } ,
2001-09-25 09:20:43 +04:00
{ " UTABLE " , torture_utable , 0 } ,
2001-10-02 09:52:11 +04:00
{ " CASETABLE " , torture_casetable , 0 } ,
2001-11-25 05:35:37 +03:00
{ " ERRMAPEXTRACT " , run_error_map_extract , 0 } ,
2001-06-19 06:02:19 +04:00
{ NULL , NULL , 0 } } ;
/****************************************************************************
run a specified test or " ALL "
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2001-07-02 07:21:17 +04:00
static BOOL run_test ( char * name )
2001-06-19 06:02:19 +04:00
{
2001-07-02 07:21:17 +04:00
BOOL ret = True ;
BOOL result = True ;
2001-06-19 06:02:19 +04:00
int i ;
2001-07-02 07:21:17 +04:00
double t ;
2001-06-19 06:02:19 +04:00
if ( strequal ( name , " ALL " ) ) {
for ( i = 0 ; torture_ops [ i ] . name ; i + + ) {
run_test ( torture_ops [ i ] . name ) ;
}
}
for ( i = 0 ; torture_ops [ i ] . name ; i + + ) {
snprintf ( randomfname , sizeof ( randomfname ) , " \\ XX%x " ,
( unsigned ) random ( ) ) ;
if ( strequal ( name , torture_ops [ i ] . name ) ) {
printf ( " Running %s \n " , name ) ;
if ( torture_ops [ i ] . flags & FLAG_MULTIPROC ) {
2001-07-02 07:21:17 +04:00
t = create_procs ( torture_ops [ i ] . fn , & result ) ;
if ( ! result ) {
ret = False ;
printf ( " TEST %s FAILED! \n " , name ) ;
}
2001-06-19 06:02:19 +04:00
} else {
2001-07-02 07:21:17 +04:00
start_timer ( ) ;
if ( ! torture_ops [ i ] . fn ( 0 ) ) {
ret = False ;
printf ( " TEST %s FAILED! \n " , name ) ;
}
t = end_timer ( ) ;
2001-06-19 06:02:19 +04:00
}
2001-07-02 07:21:17 +04:00
printf ( " %s took %g secs \n \n " , name , t ) ;
2001-06-19 06:02:19 +04:00
}
}
2001-07-02 07:21:17 +04:00
return ret ;
2001-06-19 06:02:19 +04:00
}
static void usage ( void )
{
int i ;
printf ( " Usage: smbtorture //server/share <options> TEST1 TEST2 ... \n " ) ;
printf ( " \t -d debuglevel \n " ) ;
printf ( " \t -U user%%pass \n " ) ;
2002-03-04 03:24:24 +03:00
printf ( " \t -k use kerberos \n " ) ;
2001-06-19 06:02:19 +04:00
printf ( " \t -N numprocs \n " ) ;
printf ( " \t -n my_netbios_name \n " ) ;
printf ( " \t -W workgroup \n " ) ;
printf ( " \t -o num_operations \n " ) ;
printf ( " \t -O socket_options \n " ) ;
printf ( " \t -m maximum protocol \n " ) ;
printf ( " \t -L use oplocks \n " ) ;
2002-02-05 04:31:47 +03:00
printf ( " \t -c CLIENT.TXT specify client load file for NBENCH \n " ) ;
2001-09-06 14:37:21 +04:00
printf ( " \t -A showall \n " ) ;
2001-06-19 06:02:19 +04:00
printf ( " \n \n " ) ;
printf ( " tests are: " ) ;
for ( i = 0 ; torture_ops [ i ] . name ; i + + ) {
printf ( " %s " , torture_ops [ i ] . name ) ;
}
printf ( " \n " ) ;
printf ( " default test is ALL \n " ) ;
exit ( 1 ) ;
}
/****************************************************************************
main program
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
int main ( int argc , char * argv [ ] )
{
int opt , i ;
char * p ;
int gotpass = 0 ;
extern char * optarg ;
extern int optind ;
2001-07-02 07:21:17 +04:00
BOOL correct = True ;
2001-06-19 06:02:19 +04:00
2001-09-10 15:08:57 +04:00
dbf = x_stdout ;
2001-06-19 06:02:19 +04:00
2001-07-02 08:47:55 +04:00
# ifdef HAVE_SETBUFFER
2001-06-19 06:02:19 +04:00
setbuffer ( stdout , NULL , 0 ) ;
2001-07-02 08:47:55 +04:00
# endif
2001-06-19 06:02:19 +04:00
2001-11-19 05:49:53 +03:00
lp_load ( dyn_CONFIGFILE , True , False , False ) ;
2001-06-19 06:02:19 +04:00
load_interfaces ( ) ;
if ( argc < 2 ) {
usage ( ) ;
}
for ( p = argv [ 1 ] ; * p ; p + + )
if ( * p = = ' \\ ' )
* p = ' / ' ;
if ( strncmp ( argv [ 1 ] , " // " , 2 ) ) {
usage ( ) ;
}
fstrcpy ( host , & argv [ 1 ] [ 2 ] ) ;
2001-07-04 11:36:09 +04:00
p = strchr_m ( & host [ 2 ] , ' / ' ) ;
2001-06-19 06:02:19 +04:00
if ( ! p ) {
usage ( ) ;
}
* p = 0 ;
fstrcpy ( share , p + 1 ) ;
get_myname ( myname ) ;
if ( * username = = 0 & & getenv ( " LOGNAME " ) ) {
pstrcpy ( username , getenv ( " LOGNAME " ) ) ;
}
argc - - ;
argv + + ;
fstrcpy ( workgroup , lp_workgroup ( ) ) ;
2002-03-04 03:24:24 +03:00
while ( ( opt = getopt ( argc , argv , " hW:U:n:N:O:o:m:Ld:Ac:k " ) ) ! = EOF ) {
2001-06-19 06:02:19 +04:00
switch ( opt ) {
case ' W ' :
fstrcpy ( workgroup , optarg ) ;
break ;
case ' m ' :
max_protocol = interpret_protocol ( optarg , max_protocol ) ;
break ;
case ' N ' :
nprocs = atoi ( optarg ) ;
break ;
case ' o ' :
numops = atoi ( optarg ) ;
break ;
case ' d ' :
DEBUGLEVEL = atoi ( optarg ) ;
break ;
case ' O ' :
sockops = optarg ;
break ;
case ' L ' :
use_oplocks = True ;
break ;
2001-09-06 14:37:21 +04:00
case ' A ' :
torture_showall = True ;
break ;
2001-06-19 06:02:19 +04:00
case ' n ' :
fstrcpy ( myname , optarg ) ;
break ;
2002-02-05 04:31:47 +03:00
case ' c ' :
client_txt = optarg ;
break ;
2002-03-04 03:24:24 +03:00
case ' k ' :
# ifdef HAVE_KRB5
use_kerberos = True ;
gotpass = True ;
# else
d_printf ( " No kerberos support compiled in \n " ) ;
exit ( 1 ) ;
# endif
break ;
2001-06-19 06:02:19 +04:00
case ' U ' :
pstrcpy ( username , optarg ) ;
2001-07-04 11:36:09 +04:00
p = strchr_m ( username , ' % ' ) ;
2001-06-19 06:02:19 +04:00
if ( p ) {
* p = 0 ;
pstrcpy ( password , p + 1 ) ;
gotpass = 1 ;
}
break ;
default :
printf ( " Unknown option %c (%d) \n " , ( char ) opt , opt ) ;
usage ( ) ;
}
}
while ( ! gotpass ) {
p = getpass ( " Password: " ) ;
if ( p ) {
pstrcpy ( password , p ) ;
gotpass = 1 ;
}
}
printf ( " host=%s share=%s user=%s myname=%s \n " ,
host , share , username , myname ) ;
if ( argc = = 1 ) {
2001-07-02 07:21:17 +04:00
correct = run_test ( " ALL " ) ;
2001-06-19 06:02:19 +04:00
} else {
for ( i = 1 ; i < argc ; i + + ) {
2001-07-02 07:21:17 +04:00
if ( ! run_test ( argv [ i ] ) ) {
correct = False ;
}
2001-06-19 06:02:19 +04:00
}
}
2001-07-02 07:21:17 +04:00
if ( correct ) {
return ( 0 ) ;
} else {
return ( 1 ) ;
}
2001-06-19 06:02:19 +04:00
}