2003-08-13 05:53:07 +04:00
/*
Unix SMB / CIFS implementation .
generic testing tool
Copyright ( C ) Andrew Tridgell 2003
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
2004-11-02 03:24:21 +03:00
# include "system/time.h"
2005-02-10 08:09:35 +03:00
# include "system/filesys.h"
2006-01-10 00:44:30 +03:00
# include "libcli/raw/request.h"
2006-01-03 18:40:05 +03:00
# include "libcli/libcli.h"
2004-11-01 04:03:22 +03:00
# include "libcli/raw/libcliraw.h"
2004-11-30 07:33:27 +03:00
# include "librpc/gen_ndr/ndr_security.h"
2005-12-31 01:46:16 +03:00
# include "auth/gensec/gensec.h"
2006-03-07 02:28:18 +03:00
# include "torture/torture.h"
2003-08-13 05:53:07 +04:00
# define NSERVERS 2
# define NINSTANCES 2
/* global options */
static struct gentest_options {
BOOL showall ;
BOOL analyze ;
BOOL analyze_always ;
BOOL analyze_continuous ;
uint_t max_open_handles ;
uint_t seed ;
uint_t numops ;
BOOL use_oplocks ;
char * * ignore_patterns ;
const char * seeds_file ;
BOOL use_preset_seeds ;
BOOL fast_reconnect ;
} options ;
/* mapping between open handles on the server and local handles */
static struct {
BOOL active ;
uint_t instance ;
uint_t server_fnum [ NSERVERS ] ;
const char * name ;
} * open_handles ;
static uint_t num_open_handles ;
/* state information for the servers. We open NINSTANCES connections to
each server */
static struct {
2004-08-04 17:23:35 +04:00
struct smbcli_state * cli [ NINSTANCES ] ;
2003-08-13 05:53:07 +04:00
char * server_name ;
char * share_name ;
2005-03-22 22:30:59 +03:00
struct cli_credentials * credentials ;
2003-08-13 05:53:07 +04:00
} servers [ NSERVERS ] ;
/* the seeds and flags for each operation */
static struct {
uint_t seed ;
BOOL disabled ;
} * op_parms ;
/* oplock break info */
static struct {
BOOL got_break ;
2004-05-25 21:24:24 +04:00
uint16_t fnum ;
uint16_t handle ;
2004-05-25 21:50:17 +04:00
uint8_t level ;
2003-08-13 05:53:07 +04:00
BOOL do_close ;
} oplocks [ NSERVERS ] [ NINSTANCES ] ;
/* change notify reply info */
static struct {
int notify_count ;
NTSTATUS status ;
2006-03-10 23:49:20 +03:00
union smb_notify notify ;
2003-08-13 05:53:07 +04:00
} notifies [ NSERVERS ] [ NINSTANCES ] ;
/* info relevant to the current operation */
static struct {
const char * name ;
uint_t seed ;
NTSTATUS status ;
uint_t opnum ;
TALLOC_CTX * mem_ctx ;
} current_op ;
# define BAD_HANDLE 0xFFFE
2004-08-04 17:23:35 +04:00
static BOOL oplock_handler ( struct smbcli_transport * transport , uint16_t tid , uint16_t fnum , uint8_t level , void * private ) ;
static void idle_func ( struct smbcli_transport * transport , void * private ) ;
2003-08-13 05:53:07 +04:00
/*
check if a string should be ignored . This is used as the basis
for all error ignore settings
*/
static BOOL ignore_pattern ( const char * str )
{
int i ;
if ( ! options . ignore_patterns ) return False ;
for ( i = 0 ; options . ignore_patterns [ i ] ; i + + ) {
if ( strcmp ( options . ignore_patterns [ i ] , str ) = = 0 | |
gen_fnmatch ( options . ignore_patterns [ i ] , str ) = = 0 ) {
DEBUG ( 2 , ( " Ignoring '%s' \n " , str ) ) ;
return True ;
}
}
return False ;
}
/*****************************************************
connect to the servers
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static BOOL connect_servers_fast ( void )
{
int h , i ;
/* close all open files */
for ( h = 0 ; h < options . max_open_handles ; h + + ) {
if ( ! open_handles [ h ] . active ) continue ;
for ( i = 0 ; i < NSERVERS ; i + + ) {
2004-08-04 17:23:35 +04:00
if ( NT_STATUS_IS_ERR ( ( smbcli_close ( servers [ i ] . cli [ open_handles [ h ] . instance ] - > tree ,
2004-02-10 14:33:35 +03:00
open_handles [ h ] . server_fnum [ i ] ) ) ) ) {
2003-08-13 05:53:07 +04:00
return False ;
}
open_handles [ h ] . active = False ;
}
}
return True ;
}
/*****************************************************
connect to the servers
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static BOOL connect_servers ( void )
{
int i , j ;
if ( options . fast_reconnect & & servers [ 0 ] . cli [ 0 ] ) {
if ( connect_servers_fast ( ) ) {
return True ;
}
}
/* close any existing connections */
for ( i = 0 ; i < NSERVERS ; i + + ) {
for ( j = 0 ; j < NINSTANCES ; j + + ) {
if ( servers [ i ] . cli [ j ] ) {
2004-08-04 17:23:35 +04:00
smbcli_tdis ( servers [ i ] . cli [ j ] ) ;
2005-06-18 04:02:36 +04:00
talloc_free ( servers [ i ] . cli [ j ] ) ;
2003-08-13 05:53:07 +04:00
servers [ i ] . cli [ j ] = NULL ;
}
}
}
for ( i = 0 ; i < NSERVERS ; i + + ) {
for ( j = 0 ; j < NINSTANCES ; j + + ) {
NTSTATUS status ;
printf ( " Connecting to \\ \\ %s \\ %s as %s - instance %d \n " ,
servers [ i ] . server_name , servers [ i ] . share_name ,
2005-03-22 22:30:59 +03:00
servers [ i ] . credentials - > username , j ) ;
2005-03-22 02:35:58 +03:00
r6028: A MAJOR update to intergrate the new credentails system fully with
GENSEC, and to pull SCHANNEL into GENSEC, by making it less 'special'.
GENSEC now no longer has it's own handling of 'set username' etc,
instead it uses cli_credentials calls.
In order to link the credentails code right though Samba, a lot of
interfaces have changed to remove 'username, domain, password'
arguments, and these have been replaced with a single 'struct
cli_credentials'.
In the session setup code, a new parameter 'workgroup' contains the
client/server current workgroup, which seems unrelated to the
authentication exchange (it was being filled in from the auth info).
This allows in particular kerberos to only call back for passwords
when it actually needs to perform the kinit.
The kerberos code has been modified not to use the SPNEGO provided
'principal name' (in the mechListMIC), but to instead use the name the
host was connected to as. This better matches Microsoft behaviour,
is more secure and allows better use of standard kerberos functions.
To achieve this, I made changes to our socket code so that the
hostname (before name resolution) is now recorded on the socket.
In schannel, most of the code from librpc/rpc/dcerpc_schannel.c is now
in libcli/auth/schannel.c, and it looks much more like a standard
GENSEC module. The actual sign/seal code moved to
libcli/auth/schannel_sign.c in a previous commit.
The schannel credentails structure is now merged with the rest of the
credentails, as many of the values (username, workstation, domain)
where already present there. This makes handling this in a generic
manner much easier, as there is no longer a custom entry-point.
The auth_domain module continues to be developed, but is now just as
functional as auth_winbind. The changes here are consequential to the
schannel changes.
The only removed function at this point is the RPC-LOGIN test
(simulating the load of a WinXP login), which needs much more work to
clean it up (it contains copies of too much code from all over the
torture suite, and I havn't been able to penetrate its 'structure').
Andrew Bartlett
(This used to be commit 2301a4b38a21aa60917973451687063d83d18d66)
2005-03-24 07:14:06 +03:00
cli_credentials_set_workstation ( servers [ i ] . credentials ,
" gentest " , CRED_SPECIFIED ) ;
2004-09-28 09:44:59 +04:00
status = smbcli_full_connection ( NULL , & servers [ i ] . cli [ j ] ,
2005-01-15 14:58:52 +03:00
servers [ i ] . server_name ,
2005-03-22 02:35:58 +03:00
servers [ i ] . share_name , NULL ,
2005-06-16 15:36:09 +04:00
servers [ i ] . credentials , NULL ) ;
2003-08-13 05:53:07 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " Failed to connect to \\ \\ %s \\ %s - %s \n " ,
servers [ i ] . server_name , servers [ i ] . share_name ,
nt_errstr ( status ) ) ;
return False ;
}
2004-08-04 17:23:35 +04:00
smbcli_oplock_handler ( servers [ i ] . cli [ j ] - > transport , oplock_handler , NULL ) ;
2004-11-03 13:09:48 +03:00
smbcli_transport_idle_handler ( servers [ i ] . cli [ j ] - > transport , idle_func , 50000 , NULL ) ;
2003-08-13 05:53:07 +04:00
}
}
return True ;
}
/*
work out the time skew between the servers - be conservative
*/
static uint_t time_skew ( void )
{
uint_t ret ;
ret = ABS ( servers [ 0 ] . cli [ 0 ] - > transport - > negotiate . server_time -
servers [ 1 ] . cli [ 0 ] - > transport - > negotiate . server_time ) ;
return ret + 300 ;
}
/*
turn an fnum for an instance into a handle
*/
2004-05-25 21:24:24 +04:00
static uint_t fnum_to_handle ( int server , int instance , uint16_t fnum )
2003-08-13 05:53:07 +04:00
{
uint_t i ;
for ( i = 0 ; i < options . max_open_handles ; i + + ) {
if ( ! open_handles [ i ] . active | |
instance ! = open_handles [ i ] . instance ) continue ;
if ( open_handles [ i ] . server_fnum [ server ] = = fnum ) {
return i ;
}
}
printf ( " Invalid fnum %d in fnum_to_handle on server %d instance %d \n " ,
fnum , server , instance ) ;
return BAD_HANDLE ;
}
/*
add some newly opened handles
*/
2004-05-25 21:24:24 +04:00
static void gen_add_handle ( int instance , const char * name , uint16_t fnums [ NSERVERS ] )
2003-08-13 05:53:07 +04:00
{
int i , h ;
for ( h = 0 ; h < options . max_open_handles ; h + + ) {
if ( ! open_handles [ h ] . active ) break ;
}
if ( h = = options . max_open_handles ) {
/* we have to force close a random handle */
h = random ( ) % options . max_open_handles ;
for ( i = 0 ; i < NSERVERS ; i + + ) {
2004-08-04 17:23:35 +04:00
if ( NT_STATUS_IS_ERR ( ( smbcli_close ( servers [ i ] . cli [ open_handles [ h ] . instance ] - > tree ,
2004-02-10 14:33:35 +03:00
open_handles [ h ] . server_fnum [ i ] ) ) ) ) {
2003-08-13 05:53:07 +04:00
printf ( " INTERNAL ERROR: Close failed when recovering handle! - %s \n " ,
2004-08-04 17:23:35 +04:00
smbcli_errstr ( servers [ i ] . cli [ open_handles [ h ] . instance ] - > tree ) ) ;
2003-08-13 05:53:07 +04:00
}
}
printf ( " Recovered handle %d \n " , h ) ;
num_open_handles - - ;
}
for ( i = 0 ; i < NSERVERS ; i + + ) {
open_handles [ h ] . server_fnum [ i ] = fnums [ i ] ;
open_handles [ h ] . instance = instance ;
open_handles [ h ] . active = True ;
open_handles [ h ] . name = name ;
}
num_open_handles + + ;
printf ( " OPEN num_open_handles=%d h=%d s1=0x%x s2=0x%x (%s) \n " ,
num_open_handles , h ,
open_handles [ h ] . server_fnum [ 0 ] , open_handles [ h ] . server_fnum [ 1 ] ,
name ) ;
}
/*
remove a closed handle
*/
2004-05-25 21:24:24 +04:00
static void gen_remove_handle ( int instance , uint16_t fnums [ NSERVERS ] )
2003-08-13 05:53:07 +04:00
{
int h ;
for ( h = 0 ; h < options . max_open_handles ; h + + ) {
if ( instance = = open_handles [ h ] . instance & &
open_handles [ h ] . server_fnum [ 0 ] = = fnums [ 0 ] ) {
open_handles [ h ] . active = False ;
num_open_handles - - ;
printf ( " CLOSE num_open_handles=%d h=%d s1=0x%x s2=0x%x (%s) \n " ,
num_open_handles , h ,
open_handles [ h ] . server_fnum [ 0 ] , open_handles [ h ] . server_fnum [ 1 ] ,
open_handles [ h ] . name ) ;
return ;
}
}
printf ( " Removing invalid handle!? \n " ) ;
exit ( 1 ) ;
}
/*
return True with ' chance ' probability as a percentage
*/
static BOOL gen_chance ( uint_t chance )
{
return ( ( random ( ) % 100 ) < = chance ) ;
}
/*
map an internal handle number to a server fnum
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_lookup_fnum ( int server , uint16_t handle )
2003-08-13 05:53:07 +04:00
{
if ( handle = = BAD_HANDLE ) return handle ;
return open_handles [ handle ] . server_fnum [ server ] ;
}
/*
return a file handle
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_fnum ( int instance )
2003-08-13 05:53:07 +04:00
{
2004-05-25 21:24:24 +04:00
uint16_t h ;
2003-08-13 05:53:07 +04:00
int count = 0 ;
if ( gen_chance ( 20 ) ) return BAD_HANDLE ;
while ( num_open_handles > 0 & & count + + < 10 * options . max_open_handles ) {
h = random ( ) % options . max_open_handles ;
if ( open_handles [ h ] . active & &
open_handles [ h ] . instance = = instance ) {
return h ;
}
}
return BAD_HANDLE ;
}
/*
return a file handle , but skewed so we don ' t close the last
couple of handles too readily
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_fnum_close ( int instance )
2003-08-13 05:53:07 +04:00
{
if ( num_open_handles < 3 ) {
if ( gen_chance ( 80 ) ) return BAD_HANDLE ;
}
return gen_fnum ( instance ) ;
}
/*
generate an integer in a specified range
*/
static int gen_int_range ( uint_t min , uint_t max )
{
uint_t r = random ( ) ;
return min + ( r % ( 1 + max - min ) ) ;
}
/*
return a fnum for use as a root fid
be careful to call GEN_SET_FNUM ( ) when you use this !
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_root_fid ( int instance )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 5 ) ) return gen_fnum ( instance ) ;
return 0 ;
}
/*
generate a file offset
*/
static int gen_offset ( void )
{
if ( gen_chance ( 20 ) ) return 0 ;
return gen_int_range ( 0 , 1024 * 1024 ) ;
}
/*
generate a io count
*/
static int gen_io_count ( void )
{
if ( gen_chance ( 20 ) ) return 0 ;
return gen_int_range ( 0 , 4096 ) ;
}
/*
generate a filename
*/
static const char * gen_fname ( void )
{
const char * names [ ] = { " \\ gentest \\ gentest.dat " ,
" \\ gentest \\ foo " ,
" \\ gentest \\ foo2.sym " ,
" \\ gentest \\ foo3.dll " ,
" \\ gentest \\ foo4 " ,
" \\ gentest \\ foo4:teststream1 " ,
" \\ gentest \\ foo4:teststream2 " ,
" \\ gentest \\ foo5.exe " ,
" \\ gentest \\ foo5.exe:teststream3 " ,
" \\ gentest \\ foo5.exe:teststream4 " ,
" \\ gentest \\ foo6.com " ,
" \\ gentest \\ blah " ,
" \\ gentest \\ blah \\ blergh.txt " ,
" \\ gentest \\ blah \\ blergh2 " ,
" \\ gentest \\ blah \\ blergh3.txt " ,
" \\ gentest \\ blah \\ blergh4 " ,
" \\ gentest \\ blah \\ blergh5.txt " ,
" \\ gentest \\ blah \\ blergh5 " ,
" \\ gentest \\ blah \\ . " ,
#if 0
/* this causes problem with w2k3 */
" \\ gentest \\ blah \\ .. " ,
# endif
" \\ gentest \\ a_very_long_name.bin " ,
" \\ gentest \\ x.y " ,
" \\ gentest \\ blah " } ;
int i ;
do {
i = gen_int_range ( 0 , ARRAY_SIZE ( names ) - 1 ) ;
} while ( ignore_pattern ( names [ i ] ) ) ;
return names [ i ] ;
}
/*
generate a filename with a higher chance of choosing an already
open file
*/
static const char * gen_fname_open ( int instance )
{
2004-05-25 21:24:24 +04:00
uint16_t h ;
2003-08-13 05:53:07 +04:00
h = gen_fnum ( instance ) ;
if ( h = = BAD_HANDLE ) {
return gen_fname ( ) ;
}
return open_handles [ h ] . name ;
}
/*
generate a wildcard pattern
*/
static const char * gen_pattern ( void )
{
int i ;
const char * names [ ] = { " \\ gentest \\ *.dat " ,
" \\ gentest \\ * " ,
" \\ gentest \\ *.* " ,
" \\ gentest \\ blah \\ *.* " ,
" \\ gentest \\ blah \\ * " ,
" \\ gentest \\ ? " } ;
if ( gen_chance ( 50 ) ) return gen_fname ( ) ;
do {
i = gen_int_range ( 0 , ARRAY_SIZE ( names ) - 1 ) ;
} while ( ignore_pattern ( names [ i ] ) ) ;
return names [ i ] ;
}
/*
generate a bitmask
*/
2004-05-25 20:24:13 +04:00
static uint32_t gen_bits_mask ( uint_t mask )
2003-08-13 05:53:07 +04:00
{
uint_t ret = random ( ) ;
return ret & mask ;
}
/*
generate a bitmask with high probability of the first mask
and low of the second
*/
2004-05-25 20:24:13 +04:00
static uint32_t gen_bits_mask2 ( uint32_t mask1 , uint32_t mask2 )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 10 ) ) return gen_bits_mask ( mask2 ) ;
return gen_bits_mask ( mask1 ) ;
}
/*
generate a boolean
*/
static BOOL gen_bool ( void )
{
return gen_bits_mask2 ( 0x1 , 0xFF ) ;
}
2003-08-13 20:04:21 +04:00
/*
generate ntrename flags
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_rename_flags ( void )
2003-08-13 20:04:21 +04:00
{
if ( gen_chance ( 30 ) ) return RENAME_FLAG_RENAME ;
if ( gen_chance ( 30 ) ) return RENAME_FLAG_HARD_LINK ;
if ( gen_chance ( 30 ) ) return RENAME_FLAG_COPY ;
return gen_bits_mask ( 0xFFFF ) ;
}
2003-08-13 05:53:07 +04:00
/*
return a lockingx lock mode
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_lock_mode ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 5 ) ) return gen_bits_mask ( 0xFFFF ) ;
if ( gen_chance ( 20 ) ) return gen_bits_mask ( 0x1F ) ;
return gen_bits_mask ( LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES ) ;
}
/*
generate a pid
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_pid ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 10 ) ) return gen_bits_mask ( 0xFFFF ) ;
return getpid ( ) ;
}
/*
generate a lock count
*/
2004-11-01 23:21:54 +03:00
static off_t gen_lock_count ( void )
2003-08-13 05:53:07 +04:00
{
return gen_int_range ( 0 , 3 ) ;
}
/*
generate a ntcreatex flags field
*/
2004-05-25 20:24:13 +04:00
static uint32_t gen_ntcreatex_flags ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 70 ) ) return NTCREATEX_FLAGS_EXTENDED ;
return gen_bits_mask2 ( 0x1F , 0xFFFFFFFF ) ;
}
/*
generate a NT access mask
*/
2004-05-25 20:24:13 +04:00
static uint32_t gen_access_mask ( void )
2003-08-13 05:53:07 +04:00
{
2004-12-02 07:37:36 +03:00
if ( gen_chance ( 50 ) ) return SEC_FLAG_MAXIMUM_ALLOWED ;
2004-11-30 07:33:27 +03:00
if ( gen_chance ( 20 ) ) return SEC_FILE_ALL ;
2003-08-13 05:53:07 +04:00
return gen_bits_mask ( 0xFFFFFFFF ) ;
}
/*
generate a ntcreatex create options bitfield
*/
2004-05-25 20:24:13 +04:00
static uint32_t gen_create_options ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 20 ) ) return gen_bits_mask ( 0xFFFFFFFF ) ;
if ( gen_chance ( 50 ) ) return 0 ;
return gen_bits_mask ( NTCREATEX_OPTIONS_DELETE_ON_CLOSE | NTCREATEX_OPTIONS_DIRECTORY ) ;
}
/*
generate a ntcreatex open disposition
*/
2004-05-25 20:24:13 +04:00
static uint32_t gen_open_disp ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 10 ) ) return gen_bits_mask ( 0xFFFFFFFF ) ;
return gen_int_range ( 0 , 5 ) ;
}
/*
generate an openx open mode
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_openx_mode ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 20 ) ) return gen_bits_mask ( 0xFFFF ) ;
if ( gen_chance ( 20 ) ) return gen_bits_mask ( 0xFF ) ;
return OPENX_MODE_DENY_NONE | gen_bits_mask ( 0x3 ) ;
}
/*
generate an openx flags field
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_openx_flags ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 20 ) ) return gen_bits_mask ( 0xFFFF ) ;
return gen_bits_mask ( 0x7 ) ;
}
/*
generate an openx open function
*/
2004-05-25 21:24:24 +04:00
static uint16_t gen_openx_func ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 20 ) ) return gen_bits_mask ( 0xFFFF ) ;
return gen_bits_mask ( 0x13 ) ;
}
/*
generate a file attrib combination
*/
2004-05-25 20:24:13 +04:00
static uint32_t gen_attrib ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 20 ) ) return gen_bits_mask ( 0xFFFFFFFF ) ;
return gen_bits_mask ( FILE_ATTRIBUTE_NORMAL | FILE_ATTRIBUTE_DIRECTORY ) ;
}
/*
generate a unix timestamp
*/
static time_t gen_timet ( void )
{
if ( gen_chance ( 30 ) ) return 0 ;
return ( time_t ) random ( ) ;
}
/*
generate a unix timestamp
*/
static NTTIME gen_nttime ( void )
{
NTTIME ret ;
unix_to_nt_time ( & ret , gen_timet ( ) ) ;
return ret ;
}
/*
generate a milliseconds protocol timeout
*/
2004-05-25 20:24:13 +04:00
static uint32_t gen_timeout ( void )
2003-08-13 05:53:07 +04:00
{
if ( gen_chance ( 98 ) ) return 0 ;
return random ( ) % 50 ;
}
/*
generate a file allocation size
*/
static uint_t gen_alloc_size ( void )
{
uint_t ret ;
if ( gen_chance ( 30 ) ) return 0 ;
ret = random ( ) % 4 * 1024 * 1024 ;
/* give a high chance of a round number */
if ( gen_chance ( 60 ) ) {
ret & = ~ ( 1024 * 1024 - 1 ) ;
}
return ret ;
}
/*
generate an ea_struct
*/
2003-12-01 02:40:04 +03:00
static struct ea_struct gen_ea_struct ( void )
2003-08-13 05:53:07 +04:00
{
struct ea_struct ea ;
const char * names [ ] = { " EAONE " ,
" " ,
" FOO! " ,
" WITH SPACES " ,
" . " ,
" AVERYLONGATTRIBUTENAME " } ;
const char * values [ ] = { " VALUE1 " ,
" " ,
" NOT MUCH FOO " ,
" LEADING SPACES " ,
" : " ,
" ASOMEWHATLONGERATTRIBUTEVALUE " } ;
int i ;
do {
i = gen_int_range ( 0 , ARRAY_SIZE ( names ) - 1 ) ;
} while ( ignore_pattern ( names [ i ] ) ) ;
ea . name . s = names [ i ] ;
do {
i = gen_int_range ( 0 , ARRAY_SIZE ( values ) - 1 ) ;
} while ( ignore_pattern ( values [ i ] ) ) ;
ea . value = data_blob ( values [ i ] , strlen ( values [ i ] ) ) ;
if ( gen_chance ( 10 ) ) ea . flags = gen_bits_mask ( 0xFF ) ;
ea . flags = 0 ;
return ea ;
}
/*
this is called when a change notify reply comes in
*/
2004-08-04 17:23:35 +04:00
static void async_notify ( struct smbcli_request * req )
2003-08-13 05:53:07 +04:00
{
2006-03-10 23:49:20 +03:00
union smb_notify notify ;
2003-08-13 05:53:07 +04:00
NTSTATUS status ;
int i , j ;
2004-05-25 21:24:24 +04:00
uint16_t tid ;
2004-08-04 17:23:35 +04:00
struct smbcli_transport * transport = req - > transport ;
2003-08-13 05:53:07 +04:00
tid = SVAL ( req - > in . hdr , HDR_TID ) ;
status = smb_raw_changenotify_recv ( req , current_op . mem_ctx , & notify ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
printf ( " notify tid=%d num_changes=%d action=%d name=%s \n " ,
tid ,
2006-03-10 23:49:20 +03:00
notify . notify . out . num_changes ,
notify . notify . out . changes [ 0 ] . action ,
notify . notify . out . changes [ 0 ] . name . s ) ;
2003-08-13 05:53:07 +04:00
}
for ( i = 0 ; i < NSERVERS ; i + + ) {
for ( j = 0 ; j < NINSTANCES ; j + + ) {
if ( transport = = servers [ i ] . cli [ j ] - > transport & &
tid = = servers [ i ] . cli [ j ] - > tree - > tid ) {
notifies [ i ] [ j ] . notify_count + + ;
notifies [ i ] [ j ] . status = status ;
notifies [ i ] [ j ] . notify = notify ;
}
}
}
}
2005-12-29 01:31:26 +03:00
static void oplock_handler_close_recv ( struct smbcli_request * req )
{
NTSTATUS status ;
status = smbcli_request_simple_recv ( req ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
printf ( " close failed in oplock_handler \n " ) ;
smb_panic ( " close failed in oplock_handler " ) ;
}
}
2003-08-13 05:53:07 +04:00
/*
the oplock handler will either ack the break or close the file
*/
2004-08-04 17:23:35 +04:00
static BOOL oplock_handler ( struct smbcli_transport * transport , uint16_t tid , uint16_t fnum , uint8_t level , void * private )
2003-08-13 05:53:07 +04:00
{
union smb_close io ;
NTSTATUS status ;
int i , j ;
BOOL do_close ;
2004-08-04 17:23:35 +04:00
struct smbcli_tree * tree = NULL ;
2005-12-29 01:31:26 +03:00
struct smbcli_request * req ;
2003-08-13 05:53:07 +04:00
srandom ( current_op . seed ) ;
do_close = gen_chance ( 50 ) ;
for ( i = 0 ; i < NSERVERS ; i + + ) {
for ( j = 0 ; j < NINSTANCES ; j + + ) {
if ( transport = = servers [ i ] . cli [ j ] - > transport & &
tid = = servers [ i ] . cli [ j ] - > tree - > tid ) {
oplocks [ i ] [ j ] . got_break = True ;
oplocks [ i ] [ j ] . fnum = fnum ;
oplocks [ i ] [ j ] . handle = fnum_to_handle ( i , j , fnum ) ;
oplocks [ i ] [ j ] . level = level ;
oplocks [ i ] [ j ] . do_close = do_close ;
tree = servers [ i ] . cli [ j ] - > tree ;
}
}
}
if ( ! tree ) {
printf ( " Oplock break not for one of our trees!? \n " ) ;
return False ;
}
if ( ! do_close ) {
printf ( " oplock ack fnum=%d \n " , fnum ) ;
2004-08-04 17:23:35 +04:00
return smbcli_oplock_ack ( tree , fnum , level ) ;
2003-08-13 05:53:07 +04:00
}
printf ( " oplock close fnum=%d \n " , fnum ) ;
io . close . level = RAW_CLOSE_CLOSE ;
2006-03-13 01:48:25 +03:00
io . close . in . file . fnum = fnum ;
2003-08-13 05:53:07 +04:00
io . close . in . write_time = 0 ;
2005-12-29 01:31:26 +03:00
req = smb_raw_close_send ( tree , & io ) ;
2003-08-13 05:53:07 +04:00
2005-12-29 01:31:26 +03:00
if ( req = = NULL ) {
printf ( " WARNING: close failed in oplock_handler_close - %s \n " ,
nt_errstr ( status ) ) ;
return False ;
2003-08-13 05:53:07 +04:00
}
2005-12-29 01:31:26 +03:00
req - > async . fn = oplock_handler_close_recv ;
req - > async . private = NULL ;
2003-08-13 05:53:07 +04:00
return True ;
}
/*
the idle function tries to cope with getting an oplock break on a connection , and
an operation on another connection blocking until that break is acked
we check for operations on all transports in the idle function
*/
2004-08-04 17:23:35 +04:00
static void idle_func ( struct smbcli_transport * transport , void * private )
2003-08-13 05:53:07 +04:00
{
int i , j ;
for ( i = 0 ; i < NSERVERS ; i + + ) {
for ( j = 0 ; j < NINSTANCES ; j + + ) {
if ( servers [ i ] . cli [ j ] & &
2004-07-23 10:40:49 +04:00
transport ! = servers [ i ] . cli [ j ] - > transport ) {
2004-08-04 17:23:35 +04:00
smbcli_transport_process ( servers [ i ] . cli [ j ] - > transport ) ;
2003-08-13 05:53:07 +04:00
}
}
}
}
/*
compare NTSTATUS , using checking ignored patterns
*/
static BOOL compare_status ( NTSTATUS status1 , NTSTATUS status2 )
{
if ( NT_STATUS_EQUAL ( status1 , status2 ) ) return True ;
/* one code being an error and the other OK is always an error */
if ( NT_STATUS_IS_OK ( status1 ) | | NT_STATUS_IS_OK ( status2 ) ) return False ;
/* if we are ignoring one of the status codes then consider this a match */
if ( ignore_pattern ( nt_errstr ( status1 ) ) | |
ignore_pattern ( nt_errstr ( status2 ) ) ) {
return True ;
}
return False ;
}
/*
check for pending packets on all connections
*/
static void check_pending ( void )
{
int i , j ;
msleep ( 20 ) ;
for ( j = 0 ; j < NINSTANCES ; j + + ) {
for ( i = 0 ; i < NSERVERS ; i + + ) {
2004-08-04 17:23:35 +04:00
smbcli_transport_process ( servers [ i ] . cli [ j ] - > transport ) ;
2003-08-13 05:53:07 +04:00
}
}
}
/*
check that the same oplock breaks have been received by all instances
*/
static BOOL check_oplocks ( const char * call )
{
int i , j ;
int tries = 0 ;
again :
check_pending ( ) ;
for ( j = 0 ; j < NINSTANCES ; j + + ) {
for ( i = 1 ; i < NSERVERS ; i + + ) {
if ( oplocks [ 0 ] [ j ] . got_break ! = oplocks [ i ] [ j ] . got_break | |
oplocks [ 0 ] [ j ] . handle ! = oplocks [ i ] [ j ] . handle | |
oplocks [ 0 ] [ j ] . level ! = oplocks [ i ] [ j ] . level ) {
if ( tries + + < 10 ) goto again ;
printf ( " oplock break inconsistent - %d/%d/%d vs %d/%d/%d \n " ,
oplocks [ 0 ] [ j ] . got_break ,
oplocks [ 0 ] [ j ] . handle ,
oplocks [ 0 ] [ j ] . level ,
oplocks [ i ] [ j ] . got_break ,
oplocks [ i ] [ j ] . handle ,
oplocks [ i ] [ j ] . level ) ;
return False ;
}
}
}
/* if we got a break and closed then remove the handle */
for ( j = 0 ; j < NINSTANCES ; j + + ) {
if ( oplocks [ 0 ] [ j ] . got_break & &
oplocks [ 0 ] [ j ] . do_close ) {
2004-05-25 21:24:24 +04:00
uint16_t fnums [ NSERVERS ] ;
2003-08-13 05:53:07 +04:00
for ( i = 0 ; i < NSERVERS ; i + + ) {
fnums [ i ] = oplocks [ i ] [ j ] . fnum ;
}
gen_remove_handle ( j , fnums ) ;
break ;
}
}
return True ;
}
/*
check that the same change notify info has been received by all instances
*/
static BOOL check_notifies ( const char * call )
{
int i , j ;
int tries = 0 ;
again :
check_pending ( ) ;
for ( j = 0 ; j < NINSTANCES ; j + + ) {
for ( i = 1 ; i < NSERVERS ; i + + ) {
int n ;
2006-03-10 23:49:20 +03:00
union smb_notify not1 , not2 ;
2003-08-13 05:53:07 +04:00
if ( notifies [ 0 ] [ j ] . notify_count ! = notifies [ i ] [ j ] . notify_count ) {
if ( tries + + < 10 ) goto again ;
printf ( " Notify count inconsistent %d %d \n " ,
notifies [ 0 ] [ j ] . notify_count ,
notifies [ i ] [ j ] . notify_count ) ;
return False ;
}
if ( notifies [ 0 ] [ j ] . notify_count = = 0 ) continue ;
if ( ! NT_STATUS_EQUAL ( notifies [ 0 ] [ j ] . status ,
notifies [ i ] [ j ] . status ) ) {
printf ( " Notify status mismatch - %s - %s \n " ,
nt_errstr ( notifies [ 0 ] [ j ] . status ) ,
nt_errstr ( notifies [ i ] [ j ] . status ) ) ;
return False ;
}
if ( ! NT_STATUS_IS_OK ( notifies [ 0 ] [ j ] . status ) ) {
continue ;
}
not1 = notifies [ 0 ] [ j ] . notify ;
not2 = notifies [ i ] [ j ] . notify ;
2006-03-10 23:49:20 +03:00
for ( n = 0 ; n < not1 . notify . out . num_changes ; n + + ) {
if ( not1 . notify . out . changes [ n ] . action ! =
not2 . notify . out . changes [ n ] . action ) {
2003-08-13 05:53:07 +04:00
printf ( " Notify action %d inconsistent %d %d \n " , n ,
2006-03-10 23:49:20 +03:00
not1 . notify . out . changes [ n ] . action ,
not2 . notify . out . changes [ n ] . action ) ;
2003-08-13 05:53:07 +04:00
return False ;
}
2006-03-10 23:49:20 +03:00
if ( strcmp ( not1 . notify . out . changes [ n ] . name . s ,
not2 . notify . out . changes [ n ] . name . s ) ) {
2003-08-13 05:53:07 +04:00
printf ( " Notify name %d inconsistent %s %s \n " , n ,
2006-03-10 23:49:20 +03:00
not1 . notify . out . changes [ n ] . name . s ,
not2 . notify . out . changes [ n ] . name . s ) ;
2003-08-13 05:53:07 +04:00
return False ;
}
2006-03-10 23:49:20 +03:00
if ( not1 . notify . out . changes [ n ] . name . private_length ! =
not2 . notify . out . changes [ n ] . name . private_length ) {
2003-08-13 05:53:07 +04:00
printf ( " Notify name length %d inconsistent %d %d \n " , n ,
2006-03-10 23:49:20 +03:00
not1 . notify . out . changes [ n ] . name . private_length ,
not2 . notify . out . changes [ n ] . name . private_length ) ;
2003-08-13 05:53:07 +04:00
return False ;
}
}
}
}
ZERO_STRUCT ( notifies ) ;
return True ;
}
# define GEN_COPY_PARM do { \
int i ; \
for ( i = 1 ; i < NSERVERS ; i + + ) { \
parm [ i ] = parm [ 0 ] ; \
} \
} while ( 0 )
# define GEN_CALL(call) do { \
int i ; \
ZERO_STRUCT ( oplocks ) ; \
ZERO_STRUCT ( notifies ) ; \
for ( i = 0 ; i < NSERVERS ; i + + ) { \
2004-08-04 17:23:35 +04:00
struct smbcli_tree * tree = servers [ i ] . cli [ instance ] - > tree ; \
2003-08-13 05:53:07 +04:00
status [ i ] = call ; \
} \
current_op . status = status [ 0 ] ; \
for ( i = 1 ; i < NSERVERS ; i + + ) { \
if ( ! compare_status ( status [ i ] , status [ 0 ] ) ) { \
printf ( " status different in %s - %s %s \n " , # call , \
nt_errstr ( status [ 0 ] ) , nt_errstr ( status [ i ] ) ) ; \
return False ; \
} \
} \
if ( ! check_oplocks ( # call ) ) return False ; \
if ( ! check_notifies ( # call ) ) return False ; \
if ( ! NT_STATUS_IS_OK ( status [ 0 ] ) ) { \
return True ; \
} \
} while ( 0 )
# define ADD_HANDLE(name, field) do { \
2004-05-25 21:24:24 +04:00
uint16_t fnums [ NSERVERS ] ; \
2003-08-13 05:53:07 +04:00
int i ; \
for ( i = 0 ; i < NSERVERS ; i + + ) { \
fnums [ i ] = parm [ i ] . field ; \
} \
gen_add_handle ( instance , name , fnums ) ; \
} while ( 0 )
# define REMOVE_HANDLE(field) do { \
2004-05-25 21:24:24 +04:00
uint16_t fnums [ NSERVERS ] ; \
2003-08-13 05:53:07 +04:00
int i ; \
for ( i = 0 ; i < NSERVERS ; i + + ) { \
fnums [ i ] = parm [ i ] . field ; \
} \
gen_remove_handle ( instance , fnums ) ; \
} while ( 0 )
# define GEN_SET_FNUM(field) do { \
int i ; \
for ( i = 0 ; i < NSERVERS ; i + + ) { \
parm [ i ] . field = gen_lookup_fnum ( i , parm [ i ] . field ) ; \
} \
} while ( 0 )
# define CHECK_EQUAL(field) do { \
if ( parm [ 0 ] . field ! = parm [ 1 ] . field & & ! ignore_pattern ( # field ) ) { \
printf ( " Mismatch in %s - 0x%x 0x%x \n " , # field , \
( int ) parm [ 0 ] . field , ( int ) parm [ 1 ] . field ) ; \
return False ; \
} \
} while ( 0 )
# define CHECK_WSTR_EQUAL(field) do { \
2003-08-13 06:03:16 +04:00
if ( ( ! parm [ 0 ] . field . s & & parm [ 1 ] . field . s ) | | ( parm [ 0 ] . field . s & & ! parm [ 1 ] . field . s ) ) { \
printf ( " %s is NULL! \n " , # field ) ; \
return False ; \
} \
if ( parm [ 0 ] . field . s & & strcmp ( parm [ 0 ] . field . s , parm [ 1 ] . field . s ) ! = 0 & & ! ignore_pattern ( # field ) ) { \
2003-08-13 05:53:07 +04:00
printf ( " Mismatch in %s - %s %s \n " , # field , \
parm [ 0 ] . field . s , parm [ 1 ] . field . s ) ; \
return False ; \
} \
CHECK_EQUAL ( field . private_length ) ; \
} while ( 0 )
# define CHECK_BLOB_EQUAL(field) do { \
if ( memcmp ( parm [ 0 ] . field . data , parm [ 1 ] . field . data , parm [ 0 ] . field . length ) ! = 0 & & ! ignore_pattern ( # field ) ) { \
printf ( " Mismatch in %s \n " , # field ) ; \
return False ; \
} \
CHECK_EQUAL ( field . length ) ; \
} while ( 0 )
# define CHECK_TIMES_EQUAL(field) do { \
if ( ABS ( parm [ 0 ] . field - parm [ 1 ] . field ) > time_skew ( ) & & \
! ignore_pattern ( # field ) ) { \
printf ( " Mismatch in %s - 0x%x 0x%x \n " , # field , \
( int ) parm [ 0 ] . field , ( int ) parm [ 1 ] . field ) ; \
return False ; \
} \
} while ( 0 )
# define CHECK_NTTIMES_EQUAL(field) do { \
2004-05-25 17:57:39 +04:00
if ( ABS ( nt_time_to_unix ( parm [ 0 ] . field ) - \
nt_time_to_unix ( parm [ 1 ] . field ) ) > time_skew ( ) & & \
2003-08-13 05:53:07 +04:00
! ignore_pattern ( # field ) ) { \
printf ( " Mismatch in %s - 0x%x 0x%x \n " , # field , \
2004-05-25 17:57:39 +04:00
( int ) nt_time_to_unix ( parm [ 0 ] . field ) , \
( int ) nt_time_to_unix ( parm [ 1 ] . field ) ) ; \
2003-08-13 05:53:07 +04:00
return False ; \
} \
} while ( 0 )
/*
generate openx operations
*/
static BOOL handler_openx ( int instance )
{
union smb_open parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
parm [ 0 ] . openx . level = RAW_OPEN_OPENX ;
parm [ 0 ] . openx . in . flags = gen_openx_flags ( ) ;
parm [ 0 ] . openx . in . open_mode = gen_openx_mode ( ) ;
parm [ 0 ] . openx . in . search_attrs = gen_attrib ( ) ;
parm [ 0 ] . openx . in . file_attrs = gen_attrib ( ) ;
parm [ 0 ] . openx . in . write_time = gen_timet ( ) ;
parm [ 0 ] . openx . in . open_func = gen_openx_func ( ) ;
parm [ 0 ] . openx . in . size = gen_io_count ( ) ;
parm [ 0 ] . openx . in . timeout = gen_timeout ( ) ;
parm [ 0 ] . openx . in . fname = gen_fname_open ( instance ) ;
if ( ! options . use_oplocks ) {
/* mask out oplocks */
parm [ 0 ] . openx . in . flags & = ~ ( OPENX_FLAGS_REQUEST_OPLOCK |
OPENX_FLAGS_REQUEST_BATCH_OPLOCK ) ;
}
GEN_COPY_PARM ;
GEN_CALL ( smb_raw_open ( tree , current_op . mem_ctx , & parm [ i ] ) ) ;
CHECK_EQUAL ( openx . out . attrib ) ;
CHECK_EQUAL ( openx . out . size ) ;
CHECK_EQUAL ( openx . out . access ) ;
CHECK_EQUAL ( openx . out . ftype ) ;
CHECK_EQUAL ( openx . out . devstate ) ;
CHECK_EQUAL ( openx . out . action ) ;
CHECK_EQUAL ( openx . out . access_mask ) ;
CHECK_EQUAL ( openx . out . unknown ) ;
CHECK_TIMES_EQUAL ( openx . out . write_time ) ;
/* open creates a new file handle */
2006-03-13 01:48:25 +03:00
ADD_HANDLE ( parm [ 0 ] . openx . in . fname , openx . out . file . fnum ) ;
2003-08-13 05:53:07 +04:00
return True ;
}
2003-08-14 05:21:05 +04:00
/*
generate open operations
*/
static BOOL handler_open ( int instance )
{
union smb_open parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
2004-11-02 07:17:30 +03:00
parm [ 0 ] . openold . level = RAW_OPEN_OPEN ;
2004-12-13 13:48:21 +03:00
parm [ 0 ] . openold . in . open_mode = gen_bits_mask2 ( 0xF , 0xFFFF ) ;
2004-11-02 07:17:30 +03:00
parm [ 0 ] . openold . in . search_attrs = gen_attrib ( ) ;
parm [ 0 ] . openold . in . fname = gen_fname_open ( instance ) ;
2003-08-14 05:21:05 +04:00
if ( ! options . use_oplocks ) {
/* mask out oplocks */
2004-12-13 13:48:21 +03:00
parm [ 0 ] . openold . in . open_mode & = ~ ( OPENX_FLAGS_REQUEST_OPLOCK |
OPENX_FLAGS_REQUEST_BATCH_OPLOCK ) ;
2003-08-14 05:21:05 +04:00
}
GEN_COPY_PARM ;
GEN_CALL ( smb_raw_open ( tree , current_op . mem_ctx , & parm [ i ] ) ) ;
2004-11-02 07:17:30 +03:00
CHECK_EQUAL ( openold . out . attrib ) ;
CHECK_TIMES_EQUAL ( openold . out . write_time ) ;
CHECK_EQUAL ( openold . out . size ) ;
CHECK_EQUAL ( openold . out . rmode ) ;
2003-08-14 05:21:05 +04:00
/* open creates a new file handle */
2006-03-13 01:48:25 +03:00
ADD_HANDLE ( parm [ 0 ] . openold . in . fname , openold . out . file . fnum ) ;
2003-08-14 05:21:05 +04:00
return True ;
}
2003-08-13 05:53:07 +04:00
/*
generate ntcreatex operations
*/
static BOOL handler_ntcreatex ( int instance )
{
union smb_open parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
parm [ 0 ] . ntcreatex . level = RAW_OPEN_NTCREATEX ;
parm [ 0 ] . ntcreatex . in . flags = gen_ntcreatex_flags ( ) ;
parm [ 0 ] . ntcreatex . in . root_fid = gen_root_fid ( instance ) ;
parm [ 0 ] . ntcreatex . in . access_mask = gen_access_mask ( ) ;
parm [ 0 ] . ntcreatex . in . alloc_size = gen_alloc_size ( ) ;
parm [ 0 ] . ntcreatex . in . file_attr = gen_attrib ( ) ;
parm [ 0 ] . ntcreatex . in . share_access = gen_bits_mask2 ( 0x7 , 0xFFFFFFFF ) ;
parm [ 0 ] . ntcreatex . in . open_disposition = gen_open_disp ( ) ;
parm [ 0 ] . ntcreatex . in . create_options = gen_create_options ( ) ;
parm [ 0 ] . ntcreatex . in . impersonation = gen_bits_mask2 ( 0 , 0xFFFFFFFF ) ;
parm [ 0 ] . ntcreatex . in . security_flags = gen_bits_mask2 ( 0 , 0xFF ) ;
parm [ 0 ] . ntcreatex . in . fname = gen_fname_open ( instance ) ;
if ( ! options . use_oplocks ) {
/* mask out oplocks */
parm [ 0 ] . ntcreatex . in . flags & = ~ ( NTCREATEX_FLAGS_REQUEST_OPLOCK |
NTCREATEX_FLAGS_REQUEST_BATCH_OPLOCK ) ;
}
GEN_COPY_PARM ;
if ( parm [ 0 ] . ntcreatex . in . root_fid ! = 0 ) {
GEN_SET_FNUM ( ntcreatex . in . root_fid ) ;
}
GEN_CALL ( smb_raw_open ( tree , current_op . mem_ctx , & parm [ i ] ) ) ;
CHECK_EQUAL ( ntcreatex . out . oplock_level ) ;
CHECK_EQUAL ( ntcreatex . out . create_action ) ;
CHECK_NTTIMES_EQUAL ( ntcreatex . out . create_time ) ;
CHECK_NTTIMES_EQUAL ( ntcreatex . out . access_time ) ;
CHECK_NTTIMES_EQUAL ( ntcreatex . out . write_time ) ;
CHECK_NTTIMES_EQUAL ( ntcreatex . out . change_time ) ;
CHECK_EQUAL ( ntcreatex . out . attrib ) ;
CHECK_EQUAL ( ntcreatex . out . alloc_size ) ;
CHECK_EQUAL ( ntcreatex . out . size ) ;
CHECK_EQUAL ( ntcreatex . out . file_type ) ;
CHECK_EQUAL ( ntcreatex . out . ipc_state ) ;
CHECK_EQUAL ( ntcreatex . out . is_directory ) ;
/* ntcreatex creates a new file handle */
2006-03-13 01:48:25 +03:00
ADD_HANDLE ( parm [ 0 ] . ntcreatex . in . fname , ntcreatex . out . file . fnum ) ;
2003-08-13 05:53:07 +04:00
return True ;
}
/*
generate close operations
*/
static BOOL handler_close ( int instance )
{
union smb_close parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
parm [ 0 ] . close . level = RAW_CLOSE_CLOSE ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . close . in . file . fnum = gen_fnum_close ( instance ) ;
2003-08-13 05:53:07 +04:00
parm [ 0 ] . close . in . write_time = gen_timet ( ) ;
GEN_COPY_PARM ;
2006-03-13 01:48:25 +03:00
GEN_SET_FNUM ( close . in . file . fnum ) ;
2003-08-13 05:53:07 +04:00
GEN_CALL ( smb_raw_close ( tree , & parm [ i ] ) ) ;
2006-03-13 01:48:25 +03:00
REMOVE_HANDLE ( close . in . file . fnum ) ;
2003-08-13 05:53:07 +04:00
return True ;
}
/*
generate unlink operations
*/
static BOOL handler_unlink ( int instance )
{
2006-03-10 23:49:20 +03:00
union smb_unlink parm [ NSERVERS ] ;
2003-08-13 05:53:07 +04:00
NTSTATUS status [ NSERVERS ] ;
2006-03-10 23:49:20 +03:00
parm [ 0 ] . unlink . in . pattern = gen_pattern ( ) ;
parm [ 0 ] . unlink . in . attrib = gen_attrib ( ) ;
2003-08-13 05:53:07 +04:00
GEN_COPY_PARM ;
GEN_CALL ( smb_raw_unlink ( tree , & parm [ i ] ) ) ;
return True ;
}
/*
generate chkpath operations
*/
static BOOL handler_chkpath ( int instance )
{
2006-03-10 23:49:20 +03:00
union smb_chkpath parm [ NSERVERS ] ;
2003-08-13 05:53:07 +04:00
NTSTATUS status [ NSERVERS ] ;
2006-03-10 23:49:20 +03:00
parm [ 0 ] . chkpath . in . path = gen_fname_open ( instance ) ;
2003-08-13 05:53:07 +04:00
GEN_COPY_PARM ;
GEN_CALL ( smb_raw_chkpath ( tree , & parm [ i ] ) ) ;
return True ;
}
/*
generate mkdir operations
*/
static BOOL handler_mkdir ( int instance )
{
union smb_mkdir parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
parm [ 0 ] . mkdir . level = RAW_MKDIR_MKDIR ;
parm [ 0 ] . mkdir . in . path = gen_fname_open ( instance ) ;
GEN_COPY_PARM ;
GEN_CALL ( smb_raw_mkdir ( tree , & parm [ i ] ) ) ;
return True ;
}
/*
generate rmdir operations
*/
static BOOL handler_rmdir ( int instance )
{
struct smb_rmdir parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
parm [ 0 ] . in . path = gen_fname_open ( instance ) ;
GEN_COPY_PARM ;
GEN_CALL ( smb_raw_rmdir ( tree , & parm [ i ] ) ) ;
return True ;
}
/*
generate rename operations
*/
static BOOL handler_rename ( int instance )
{
2003-08-13 20:04:21 +04:00
union smb_rename parm [ NSERVERS ] ;
2003-08-13 05:53:07 +04:00
NTSTATUS status [ NSERVERS ] ;
2003-08-13 20:04:21 +04:00
parm [ 0 ] . generic . level = RAW_RENAME_RENAME ;
parm [ 0 ] . rename . in . pattern1 = gen_pattern ( ) ;
parm [ 0 ] . rename . in . pattern2 = gen_pattern ( ) ;
parm [ 0 ] . rename . in . attrib = gen_attrib ( ) ;
GEN_COPY_PARM ;
GEN_CALL ( smb_raw_rename ( tree , & parm [ i ] ) ) ;
return True ;
}
/*
generate ntrename operations
*/
static BOOL handler_ntrename ( int instance )
{
union smb_rename parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
parm [ 0 ] . generic . level = RAW_RENAME_NTRENAME ;
parm [ 0 ] . ntrename . in . old_name = gen_fname ( ) ;
parm [ 0 ] . ntrename . in . new_name = gen_fname ( ) ;
parm [ 0 ] . ntrename . in . attrib = gen_attrib ( ) ;
2003-09-02 08:37:33 +04:00
parm [ 0 ] . ntrename . in . cluster_size = gen_bits_mask2 ( 0 , 0xFFFFFFF ) ;
2003-08-13 20:04:21 +04:00
parm [ 0 ] . ntrename . in . flags = gen_rename_flags ( ) ;
2003-08-13 05:53:07 +04:00
GEN_COPY_PARM ;
GEN_CALL ( smb_raw_rename ( tree , & parm [ i ] ) ) ;
return True ;
}
2003-08-14 05:12:27 +04:00
/*
generate seek operations
*/
static BOOL handler_seek ( int instance )
{
2006-03-10 23:49:20 +03:00
union smb_seek parm [ NSERVERS ] ;
2003-08-14 05:12:27 +04:00
NTSTATUS status [ NSERVERS ] ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . lseek . in . file . fnum = gen_fnum ( instance ) ;
2006-03-10 23:49:20 +03:00
parm [ 0 ] . lseek . in . mode = gen_bits_mask2 ( 0x3 , 0xFFFF ) ;
parm [ 0 ] . lseek . in . offset = gen_offset ( ) ;
2003-08-14 05:12:27 +04:00
GEN_COPY_PARM ;
2006-03-13 01:48:25 +03:00
GEN_SET_FNUM ( lseek . in . file . fnum ) ;
2003-08-14 05:12:27 +04:00
GEN_CALL ( smb_raw_seek ( tree , & parm [ i ] ) ) ;
2006-03-10 23:49:20 +03:00
CHECK_EQUAL ( lseek . out . offset ) ;
2003-08-14 05:12:27 +04:00
return True ;
}
2003-08-13 05:53:07 +04:00
/*
generate readx operations
*/
static BOOL handler_readx ( int instance )
{
union smb_read parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
parm [ 0 ] . readx . level = RAW_READ_READX ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . readx . in . file . fnum = gen_fnum ( instance ) ;
2003-08-13 05:53:07 +04:00
parm [ 0 ] . readx . in . offset = gen_offset ( ) ;
parm [ 0 ] . readx . in . mincnt = gen_io_count ( ) ;
parm [ 0 ] . readx . in . maxcnt = gen_io_count ( ) ;
parm [ 0 ] . readx . in . remaining = gen_io_count ( ) ;
2006-03-11 15:58:36 +03:00
parm [ 0 ] . readx . in . read_for_execute = gen_bool ( ) ;
2005-01-06 06:06:58 +03:00
parm [ 0 ] . readx . out . data = talloc_size ( current_op . mem_ctx ,
MAX ( parm [ 0 ] . readx . in . mincnt , parm [ 0 ] . readx . in . maxcnt ) ) ;
2003-08-13 05:53:07 +04:00
GEN_COPY_PARM ;
2006-03-13 01:48:25 +03:00
GEN_SET_FNUM ( readx . in . file . fnum ) ;
2003-08-13 05:53:07 +04:00
GEN_CALL ( smb_raw_read ( tree , & parm [ i ] ) ) ;
CHECK_EQUAL ( readx . out . remaining ) ;
CHECK_EQUAL ( readx . out . compaction_mode ) ;
CHECK_EQUAL ( readx . out . nread ) ;
return True ;
}
/*
generate writex operations
*/
static BOOL handler_writex ( int instance )
{
union smb_write parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
parm [ 0 ] . writex . level = RAW_WRITE_WRITEX ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . writex . in . file . fnum = gen_fnum ( instance ) ;
2003-08-13 05:53:07 +04:00
parm [ 0 ] . writex . in . offset = gen_offset ( ) ;
parm [ 0 ] . writex . in . wmode = gen_bits_mask ( 0xFFFF ) ;
parm [ 0 ] . writex . in . remaining = gen_io_count ( ) ;
parm [ 0 ] . writex . in . count = gen_io_count ( ) ;
2005-01-07 07:39:16 +03:00
parm [ 0 ] . writex . in . data = talloc_zero_size ( current_op . mem_ctx , parm [ 0 ] . writex . in . count ) ;
2003-08-13 05:53:07 +04:00
GEN_COPY_PARM ;
2006-03-13 01:48:25 +03:00
GEN_SET_FNUM ( writex . in . file . fnum ) ;
2003-08-13 05:53:07 +04:00
GEN_CALL ( smb_raw_write ( tree , & parm [ i ] ) ) ;
CHECK_EQUAL ( writex . out . nwritten ) ;
CHECK_EQUAL ( writex . out . remaining ) ;
return True ;
}
/*
generate lockingx operations
*/
static BOOL handler_lockingx ( int instance )
{
union smb_lock parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
int n , nlocks ;
parm [ 0 ] . lockx . level = RAW_LOCK_LOCKX ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . lockx . in . file . fnum = gen_fnum ( instance ) ;
2003-08-13 05:53:07 +04:00
parm [ 0 ] . lockx . in . mode = gen_lock_mode ( ) ;
parm [ 0 ] . lockx . in . timeout = gen_timeout ( ) ;
do {
/* make sure we don't accidentially generate an oplock
break ack - otherwise the server can just block forever */
parm [ 0 ] . lockx . in . ulock_cnt = gen_lock_count ( ) ;
parm [ 0 ] . lockx . in . lock_cnt = gen_lock_count ( ) ;
nlocks = parm [ 0 ] . lockx . in . ulock_cnt + parm [ 0 ] . lockx . in . lock_cnt ;
} while ( nlocks = = 0 ) ;
if ( nlocks > 0 ) {
2005-01-27 10:08:20 +03:00
parm [ 0 ] . lockx . in . locks = talloc_array ( current_op . mem_ctx ,
2005-01-06 06:06:58 +03:00
struct smb_lock_entry ,
nlocks ) ;
2003-08-13 05:53:07 +04:00
for ( n = 0 ; n < nlocks ; n + + ) {
parm [ 0 ] . lockx . in . locks [ n ] . pid = gen_pid ( ) ;
parm [ 0 ] . lockx . in . locks [ n ] . offset = gen_offset ( ) ;
parm [ 0 ] . lockx . in . locks [ n ] . count = gen_io_count ( ) ;
}
}
GEN_COPY_PARM ;
2006-03-13 01:48:25 +03:00
GEN_SET_FNUM ( lockx . in . file . fnum ) ;
2003-08-13 05:53:07 +04:00
GEN_CALL ( smb_raw_lock ( tree , & parm [ i ] ) ) ;
return True ;
}
/*
generate a fileinfo query structure
*/
static void gen_fileinfo ( int instance , union smb_fileinfo * info )
{
int i ;
# define LVL(v) {RAW_FILEINFO_ ## v, "RAW_FILEINFO_" #v}
struct {
2004-07-19 14:35:05 +04:00
enum smb_fileinfo_level level ;
2003-08-13 05:53:07 +04:00
const char * name ;
} levels [ ] = {
LVL ( GETATTR ) , LVL ( GETATTRE ) , LVL ( STANDARD ) ,
LVL ( EA_SIZE ) , LVL ( ALL_EAS ) , LVL ( IS_NAME_VALID ) ,
LVL ( BASIC_INFO ) , LVL ( STANDARD_INFO ) , LVL ( EA_INFO ) ,
LVL ( NAME_INFO ) , LVL ( ALL_INFO ) , LVL ( ALT_NAME_INFO ) ,
LVL ( STREAM_INFO ) , LVL ( COMPRESSION_INFO ) , LVL ( BASIC_INFORMATION ) ,
LVL ( STANDARD_INFORMATION ) , LVL ( INTERNAL_INFORMATION ) , LVL ( EA_INFORMATION ) ,
LVL ( ACCESS_INFORMATION ) , LVL ( NAME_INFORMATION ) , LVL ( POSITION_INFORMATION ) ,
LVL ( MODE_INFORMATION ) , LVL ( ALIGNMENT_INFORMATION ) , LVL ( ALL_INFORMATION ) ,
LVL ( ALT_NAME_INFORMATION ) , LVL ( STREAM_INFORMATION ) , LVL ( COMPRESSION_INFORMATION ) ,
LVL ( NETWORK_OPEN_INFORMATION ) , LVL ( ATTRIBUTE_TAG_INFORMATION )
} ;
do {
i = gen_int_range ( 0 , ARRAY_SIZE ( levels ) - 1 ) ;
} while ( ignore_pattern ( levels [ i ] . name ) ) ;
info - > generic . level = levels [ i ] . level ;
}
/*
compare returned fileinfo structures
*/
static BOOL cmp_fileinfo ( int instance ,
union smb_fileinfo parm [ NSERVERS ] ,
NTSTATUS status [ NSERVERS ] )
{
int i ;
switch ( parm [ 0 ] . generic . level ) {
case RAW_FILEINFO_GENERIC :
return False ;
case RAW_FILEINFO_GETATTR :
CHECK_EQUAL ( getattr . out . attrib ) ;
CHECK_EQUAL ( getattr . out . size ) ;
CHECK_TIMES_EQUAL ( getattr . out . write_time ) ;
break ;
case RAW_FILEINFO_GETATTRE :
CHECK_TIMES_EQUAL ( getattre . out . create_time ) ;
CHECK_TIMES_EQUAL ( getattre . out . access_time ) ;
CHECK_TIMES_EQUAL ( getattre . out . write_time ) ;
CHECK_EQUAL ( getattre . out . size ) ;
CHECK_EQUAL ( getattre . out . alloc_size ) ;
CHECK_EQUAL ( getattre . out . attrib ) ;
break ;
case RAW_FILEINFO_STANDARD :
CHECK_TIMES_EQUAL ( standard . out . create_time ) ;
CHECK_TIMES_EQUAL ( standard . out . access_time ) ;
CHECK_TIMES_EQUAL ( standard . out . write_time ) ;
CHECK_EQUAL ( standard . out . size ) ;
CHECK_EQUAL ( standard . out . alloc_size ) ;
CHECK_EQUAL ( standard . out . attrib ) ;
break ;
case RAW_FILEINFO_EA_SIZE :
CHECK_TIMES_EQUAL ( ea_size . out . create_time ) ;
CHECK_TIMES_EQUAL ( ea_size . out . access_time ) ;
CHECK_TIMES_EQUAL ( ea_size . out . write_time ) ;
CHECK_EQUAL ( ea_size . out . size ) ;
CHECK_EQUAL ( ea_size . out . alloc_size ) ;
CHECK_EQUAL ( ea_size . out . attrib ) ;
CHECK_EQUAL ( ea_size . out . ea_size ) ;
break ;
case RAW_FILEINFO_ALL_EAS :
CHECK_EQUAL ( all_eas . out . num_eas ) ;
for ( i = 0 ; i < parm [ 0 ] . all_eas . out . num_eas ; i + + ) {
CHECK_EQUAL ( all_eas . out . eas [ i ] . flags ) ;
CHECK_WSTR_EQUAL ( all_eas . out . eas [ i ] . name ) ;
CHECK_BLOB_EQUAL ( all_eas . out . eas [ i ] . value ) ;
}
break ;
case RAW_FILEINFO_IS_NAME_VALID :
break ;
case RAW_FILEINFO_BASIC_INFO :
case RAW_FILEINFO_BASIC_INFORMATION :
CHECK_NTTIMES_EQUAL ( basic_info . out . create_time ) ;
CHECK_NTTIMES_EQUAL ( basic_info . out . access_time ) ;
CHECK_NTTIMES_EQUAL ( basic_info . out . write_time ) ;
CHECK_NTTIMES_EQUAL ( basic_info . out . change_time ) ;
CHECK_EQUAL ( basic_info . out . attrib ) ;
break ;
case RAW_FILEINFO_STANDARD_INFO :
case RAW_FILEINFO_STANDARD_INFORMATION :
CHECK_EQUAL ( standard_info . out . alloc_size ) ;
CHECK_EQUAL ( standard_info . out . size ) ;
CHECK_EQUAL ( standard_info . out . nlink ) ;
CHECK_EQUAL ( standard_info . out . delete_pending ) ;
CHECK_EQUAL ( standard_info . out . directory ) ;
break ;
case RAW_FILEINFO_EA_INFO :
case RAW_FILEINFO_EA_INFORMATION :
CHECK_EQUAL ( ea_info . out . ea_size ) ;
break ;
case RAW_FILEINFO_NAME_INFO :
case RAW_FILEINFO_NAME_INFORMATION :
CHECK_WSTR_EQUAL ( name_info . out . fname ) ;
break ;
case RAW_FILEINFO_ALL_INFO :
case RAW_FILEINFO_ALL_INFORMATION :
CHECK_NTTIMES_EQUAL ( all_info . out . create_time ) ;
CHECK_NTTIMES_EQUAL ( all_info . out . access_time ) ;
CHECK_NTTIMES_EQUAL ( all_info . out . write_time ) ;
CHECK_NTTIMES_EQUAL ( all_info . out . change_time ) ;
CHECK_EQUAL ( all_info . out . attrib ) ;
CHECK_EQUAL ( all_info . out . alloc_size ) ;
CHECK_EQUAL ( all_info . out . size ) ;
CHECK_EQUAL ( all_info . out . nlink ) ;
CHECK_EQUAL ( all_info . out . delete_pending ) ;
CHECK_EQUAL ( all_info . out . directory ) ;
CHECK_EQUAL ( all_info . out . ea_size ) ;
CHECK_WSTR_EQUAL ( all_info . out . fname ) ;
break ;
case RAW_FILEINFO_ALT_NAME_INFO :
case RAW_FILEINFO_ALT_NAME_INFORMATION :
CHECK_WSTR_EQUAL ( alt_name_info . out . fname ) ;
break ;
case RAW_FILEINFO_STREAM_INFO :
case RAW_FILEINFO_STREAM_INFORMATION :
CHECK_EQUAL ( stream_info . out . num_streams ) ;
for ( i = 0 ; i < parm [ 0 ] . stream_info . out . num_streams ; i + + ) {
CHECK_EQUAL ( stream_info . out . streams [ i ] . size ) ;
CHECK_EQUAL ( stream_info . out . streams [ i ] . alloc_size ) ;
CHECK_WSTR_EQUAL ( stream_info . out . streams [ i ] . stream_name ) ;
}
break ;
case RAW_FILEINFO_COMPRESSION_INFO :
case RAW_FILEINFO_COMPRESSION_INFORMATION :
CHECK_EQUAL ( compression_info . out . compressed_size ) ;
CHECK_EQUAL ( compression_info . out . format ) ;
CHECK_EQUAL ( compression_info . out . unit_shift ) ;
CHECK_EQUAL ( compression_info . out . chunk_shift ) ;
CHECK_EQUAL ( compression_info . out . cluster_shift ) ;
break ;
case RAW_FILEINFO_INTERNAL_INFORMATION :
2003-09-02 08:37:33 +04:00
CHECK_EQUAL ( internal_information . out . file_id ) ;
2003-08-13 05:53:07 +04:00
break ;
case RAW_FILEINFO_ACCESS_INFORMATION :
CHECK_EQUAL ( access_information . out . access_flags ) ;
break ;
case RAW_FILEINFO_POSITION_INFORMATION :
CHECK_EQUAL ( position_information . out . position ) ;
break ;
case RAW_FILEINFO_MODE_INFORMATION :
CHECK_EQUAL ( mode_information . out . mode ) ;
break ;
case RAW_FILEINFO_ALIGNMENT_INFORMATION :
CHECK_EQUAL ( alignment_information . out . alignment_requirement ) ;
break ;
case RAW_FILEINFO_NETWORK_OPEN_INFORMATION :
CHECK_NTTIMES_EQUAL ( network_open_information . out . create_time ) ;
CHECK_NTTIMES_EQUAL ( network_open_information . out . access_time ) ;
CHECK_NTTIMES_EQUAL ( network_open_information . out . write_time ) ;
CHECK_NTTIMES_EQUAL ( network_open_information . out . change_time ) ;
CHECK_EQUAL ( network_open_information . out . alloc_size ) ;
CHECK_EQUAL ( network_open_information . out . size ) ;
CHECK_EQUAL ( network_open_information . out . attrib ) ;
break ;
case RAW_FILEINFO_ATTRIBUTE_TAG_INFORMATION :
CHECK_EQUAL ( attribute_tag_information . out . attrib ) ;
CHECK_EQUAL ( attribute_tag_information . out . reparse_tag ) ;
break ;
2005-11-10 06:48:56 +03:00
/* Unhandled levels */
case RAW_FILEINFO_SEC_DESC :
case RAW_FILEINFO_EA_LIST :
case RAW_FILEINFO_UNIX_BASIC :
case RAW_FILEINFO_UNIX_LINK :
break ;
2003-08-13 05:53:07 +04:00
}
return True ;
}
/*
generate qpathinfo operations
*/
static BOOL handler_qpathinfo ( int instance )
{
union smb_fileinfo parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . generic . in . file . path = gen_fname_open ( instance ) ;
2003-08-13 05:53:07 +04:00
gen_fileinfo ( instance , & parm [ 0 ] ) ;
GEN_COPY_PARM ;
GEN_CALL ( smb_raw_pathinfo ( tree , current_op . mem_ctx , & parm [ i ] ) ) ;
return cmp_fileinfo ( instance , parm , status ) ;
}
/*
generate qfileinfo operations
*/
static BOOL handler_qfileinfo ( int instance )
{
union smb_fileinfo parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . generic . in . file . fnum = gen_fnum ( instance ) ;
2003-08-13 05:53:07 +04:00
gen_fileinfo ( instance , & parm [ 0 ] ) ;
GEN_COPY_PARM ;
2006-03-13 01:48:25 +03:00
GEN_SET_FNUM ( generic . in . file . fnum ) ;
2003-08-13 05:53:07 +04:00
GEN_CALL ( smb_raw_fileinfo ( tree , current_op . mem_ctx , & parm [ i ] ) ) ;
return cmp_fileinfo ( instance , parm , status ) ;
}
/*
generate a fileinfo query structure
*/
static void gen_setfileinfo ( int instance , union smb_setfileinfo * info )
{
int i ;
# undef LVL
# define LVL(v) {RAW_SFILEINFO_ ## v, "RAW_SFILEINFO_" #v}
struct {
2004-07-19 14:35:05 +04:00
enum smb_setfileinfo_level level ;
2003-08-13 05:53:07 +04:00
const char * name ;
} levels [ ] = {
#if 0
/* disabled until win2003 can handle them ... */
LVL ( EA_SET ) , LVL ( BASIC_INFO ) , LVL ( DISPOSITION_INFO ) ,
LVL ( STANDARD ) , LVL ( ALLOCATION_INFO ) , LVL ( END_OF_FILE_INFO ) ,
# endif
LVL ( SETATTR ) , LVL ( SETATTRE ) , LVL ( BASIC_INFORMATION ) ,
LVL ( RENAME_INFORMATION ) , LVL ( DISPOSITION_INFORMATION ) ,
LVL ( POSITION_INFORMATION ) , LVL ( MODE_INFORMATION ) ,
LVL ( ALLOCATION_INFORMATION ) , LVL ( END_OF_FILE_INFORMATION ) ,
LVL ( 1023 ) , LVL ( 1025 ) , LVL ( 1029 ) , LVL ( 1032 ) , LVL ( 1039 ) , LVL ( 1040 )
} ;
do {
i = gen_int_range ( 0 , ARRAY_SIZE ( levels ) - 1 ) ;
} while ( ignore_pattern ( levels [ i ] . name ) ) ;
info - > generic . level = levels [ i ] . level ;
switch ( info - > generic . level ) {
case RAW_SFILEINFO_SETATTR :
info - > setattr . in . attrib = gen_attrib ( ) ;
info - > setattr . in . write_time = gen_timet ( ) ;
break ;
case RAW_SFILEINFO_SETATTRE :
info - > setattre . in . create_time = gen_timet ( ) ;
info - > setattre . in . access_time = gen_timet ( ) ;
info - > setattre . in . write_time = gen_timet ( ) ;
break ;
case RAW_SFILEINFO_STANDARD :
info - > standard . in . create_time = gen_timet ( ) ;
info - > standard . in . access_time = gen_timet ( ) ;
info - > standard . in . write_time = gen_timet ( ) ;
break ;
2004-12-17 07:51:23 +03:00
case RAW_SFILEINFO_EA_SET : {
static struct ea_struct ea ;
info - > ea_set . in . num_eas = 1 ;
info - > ea_set . in . eas = & ea ;
info - > ea_set . in . eas [ 0 ] = gen_ea_struct ( ) ;
}
2003-08-13 05:53:07 +04:00
break ;
case RAW_SFILEINFO_BASIC_INFO :
case RAW_SFILEINFO_BASIC_INFORMATION :
info - > basic_info . in . create_time = gen_nttime ( ) ;
info - > basic_info . in . access_time = gen_nttime ( ) ;
info - > basic_info . in . write_time = gen_nttime ( ) ;
info - > basic_info . in . change_time = gen_nttime ( ) ;
info - > basic_info . in . attrib = gen_attrib ( ) ;
break ;
case RAW_SFILEINFO_DISPOSITION_INFO :
case RAW_SFILEINFO_DISPOSITION_INFORMATION :
info - > disposition_info . in . delete_on_close = gen_bool ( ) ;
break ;
case RAW_SFILEINFO_ALLOCATION_INFO :
case RAW_SFILEINFO_ALLOCATION_INFORMATION :
info - > allocation_info . in . alloc_size = gen_alloc_size ( ) ;
break ;
case RAW_SFILEINFO_END_OF_FILE_INFO :
case RAW_SFILEINFO_END_OF_FILE_INFORMATION :
info - > end_of_file_info . in . size = gen_offset ( ) ;
break ;
case RAW_SFILEINFO_RENAME_INFORMATION :
info - > rename_information . in . overwrite = gen_bool ( ) ;
info - > rename_information . in . root_fid = gen_root_fid ( instance ) ;
info - > rename_information . in . new_name = gen_fname_open ( instance ) ;
break ;
case RAW_SFILEINFO_POSITION_INFORMATION :
info - > position_information . in . position = gen_offset ( ) ;
break ;
case RAW_SFILEINFO_MODE_INFORMATION :
info - > mode_information . in . mode = gen_bits_mask ( 0xFFFFFFFF ) ;
break ;
2005-11-10 08:42:07 +03:00
case RAW_SFILEINFO_GENERIC :
case RAW_SFILEINFO_SEC_DESC :
case RAW_SFILEINFO_UNIX_BASIC :
case RAW_SFILEINFO_UNIX_LINK :
case RAW_SFILEINFO_UNIX_HLINK :
case RAW_SFILEINFO_1023 :
case RAW_SFILEINFO_1025 :
case RAW_SFILEINFO_1029 :
case RAW_SFILEINFO_1032 :
case RAW_SFILEINFO_1039 :
case RAW_SFILEINFO_1040 :
/* Untested */
break ;
2003-08-13 05:53:07 +04:00
}
}
/*
generate setpathinfo operations
*/
static BOOL handler_spathinfo ( int instance )
{
union smb_setfileinfo parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . generic . in . file . path = gen_fname_open ( instance ) ;
2003-08-13 05:53:07 +04:00
gen_setfileinfo ( instance , & parm [ 0 ] ) ;
GEN_COPY_PARM ;
/* a special case for the fid in a RENAME */
if ( parm [ 0 ] . generic . level = = RAW_SFILEINFO_RENAME_INFORMATION & &
parm [ 0 ] . rename_information . in . root_fid ! = 0 ) {
GEN_SET_FNUM ( rename_information . in . root_fid ) ;
}
GEN_CALL ( smb_raw_setpathinfo ( tree , & parm [ i ] ) ) ;
return True ;
}
/*
generate setfileinfo operations
*/
static BOOL handler_sfileinfo ( int instance )
{
union smb_setfileinfo parm [ NSERVERS ] ;
NTSTATUS status [ NSERVERS ] ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . generic . in . file . fnum = gen_fnum ( instance ) ;
2003-08-13 05:53:07 +04:00
gen_setfileinfo ( instance , & parm [ 0 ] ) ;
GEN_COPY_PARM ;
2006-03-13 01:48:25 +03:00
GEN_SET_FNUM ( generic . in . file . fnum ) ;
2003-08-13 05:53:07 +04:00
GEN_CALL ( smb_raw_setfileinfo ( tree , & parm [ i ] ) ) ;
return True ;
}
/*
generate change notify operations
*/
static BOOL handler_notify ( int instance )
{
2006-03-10 23:49:20 +03:00
union smb_notify parm [ NSERVERS ] ;
2003-08-13 05:53:07 +04:00
int n ;
2006-03-10 23:49:20 +03:00
parm [ 0 ] . notify . in . buffer_size = gen_io_count ( ) ;
parm [ 0 ] . notify . in . completion_filter = gen_bits_mask ( 0xFF ) ;
2006-03-13 01:48:25 +03:00
parm [ 0 ] . notify . in . file . fnum = gen_fnum ( instance ) ;
2006-03-10 23:49:20 +03:00
parm [ 0 ] . notify . in . recursive = gen_bool ( ) ;
2003-08-13 05:53:07 +04:00
GEN_COPY_PARM ;
2006-03-13 01:48:25 +03:00
GEN_SET_FNUM ( notify . in . file . fnum ) ;
2003-08-13 05:53:07 +04:00
for ( n = 0 ; n < NSERVERS ; n + + ) {
2004-08-04 17:23:35 +04:00
struct smbcli_request * req ;
2003-08-13 05:53:07 +04:00
req = smb_raw_changenotify_send ( servers [ n ] . cli [ instance ] - > tree , & parm [ n ] ) ;
req - > async . fn = async_notify ;
}
return True ;
}
/*
wipe any relevant files
*/
static void wipe_files ( void )
{
int i ;
for ( i = 0 ; i < NSERVERS ; i + + ) {
2004-08-04 17:23:35 +04:00
int n = smbcli_deltree ( servers [ i ] . cli [ 0 ] - > tree , " \\ gentest " ) ;
2003-08-13 05:53:07 +04:00
if ( n = = - 1 ) {
printf ( " Failed to wipe tree on server %d \n " , i ) ;
exit ( 1 ) ;
}
2004-08-04 17:23:35 +04:00
if ( NT_STATUS_IS_ERR ( smbcli_mkdir ( servers [ i ] . cli [ 0 ] - > tree , " \\ gentest " ) ) ) {
2003-08-13 05:53:07 +04:00
printf ( " Failed to create \\ gentest - %s \n " ,
2004-08-04 17:23:35 +04:00
smbcli_errstr ( servers [ i ] . cli [ 0 ] - > tree ) ) ;
2003-08-13 05:53:07 +04:00
exit ( 1 ) ;
}
if ( n > 0 ) {
printf ( " Deleted %d files on server %d \n " , n , i ) ;
}
}
}
/*
dump the current seeds - useful for continuing a backtrack
*/
static void dump_seeds ( void )
{
int i ;
FILE * f ;
if ( ! options . seeds_file ) {
return ;
}
f = fopen ( " seeds.tmp " , " w " ) ;
if ( ! f ) return ;
for ( i = 0 ; i < options . numops ; i + + ) {
fprintf ( f , " %u \n " , op_parms [ i ] . seed ) ;
}
fclose ( f ) ;
rename ( " seeds.tmp " , options . seeds_file ) ;
}
/*
the list of top - level operations that we will generate
*/
static struct {
const char * name ;
BOOL ( * handler ) ( int instance ) ;
int count , success_count ;
} gen_ops [ ] = {
2003-08-14 05:21:05 +04:00
{ " OPEN " , handler_open } ,
2003-08-13 05:53:07 +04:00
{ " OPENX " , handler_openx } ,
{ " NTCREATEX " , handler_ntcreatex } ,
{ " CLOSE " , handler_close } ,
{ " UNLINK " , handler_unlink } ,
{ " MKDIR " , handler_mkdir } ,
{ " RMDIR " , handler_rmdir } ,
{ " RENAME " , handler_rename } ,
2003-08-13 20:04:21 +04:00
{ " NTRENAME " , handler_ntrename } ,
2003-08-13 05:53:07 +04:00
{ " READX " , handler_readx } ,
{ " WRITEX " , handler_writex } ,
{ " CHKPATH " , handler_chkpath } ,
{ " LOCKINGX " , handler_lockingx } ,
{ " QPATHINFO " , handler_qpathinfo } ,
{ " QFILEINFO " , handler_qfileinfo } ,
{ " SPATHINFO " , handler_spathinfo } ,
{ " SFILEINFO " , handler_sfileinfo } ,
{ " NOTIFY " , handler_notify } ,
2003-08-14 05:12:27 +04:00
{ " SEEK " , handler_seek } ,
2003-08-13 05:53:07 +04:00
} ;
/*
run the test with the current set of op_parms parameters
return the number of operations that completed successfully
*/
static int run_test ( void )
{
int op , i ;
if ( ! connect_servers ( ) ) {
printf ( " Failed to connect to servers \n " ) ;
exit ( 1 ) ;
}
dump_seeds ( ) ;
/* wipe any leftover files from old runs */
wipe_files ( ) ;
/* reset the open handles array */
memset ( open_handles , 0 , options . max_open_handles * sizeof ( open_handles [ 0 ] ) ) ;
num_open_handles = 0 ;
for ( i = 0 ; i < ARRAY_SIZE ( gen_ops ) ; i + + ) {
gen_ops [ i ] . count = 0 ;
gen_ops [ i ] . success_count = 0 ;
}
for ( op = 0 ; op < options . numops ; op + + ) {
int instance , which_op ;
BOOL ret ;
if ( op_parms [ op ] . disabled ) continue ;
srandom ( op_parms [ op ] . seed ) ;
instance = gen_int_range ( 0 , NINSTANCES - 1 ) ;
/* generate a non-ignored operation */
do {
which_op = gen_int_range ( 0 , ARRAY_SIZE ( gen_ops ) - 1 ) ;
} while ( ignore_pattern ( gen_ops [ which_op ] . name ) ) ;
DEBUG ( 3 , ( " Generating op %s on instance %d \n " ,
gen_ops [ which_op ] . name , instance ) ) ;
current_op . seed = op_parms [ op ] . seed ;
current_op . opnum = op ;
current_op . name = gen_ops [ which_op ] . name ;
current_op . status = NT_STATUS_OK ;
2004-08-25 14:21:14 +04:00
current_op . mem_ctx = talloc_init ( " %s " , current_op . name ) ;
2003-08-13 05:53:07 +04:00
ret = gen_ops [ which_op ] . handler ( instance ) ;
2005-01-27 10:08:20 +03:00
talloc_free ( current_op . mem_ctx ) ;
2003-08-13 05:53:07 +04:00
gen_ops [ which_op ] . count + + ;
if ( NT_STATUS_IS_OK ( current_op . status ) ) {
gen_ops [ which_op ] . success_count + + ;
}
if ( ! ret ) {
printf ( " Failed at operation %d - %s \n " ,
op , gen_ops [ which_op ] . name ) ;
return op ;
}
if ( op % 100 = = 0 ) {
printf ( " %d \n " , op ) ;
}
}
for ( i = 0 ; i < ARRAY_SIZE ( gen_ops ) ; i + + ) {
printf ( " Op %-10s got %d/%d success \n " ,
gen_ops [ i ] . name ,
gen_ops [ i ] . success_count ,
gen_ops [ i ] . count ) ;
}
return op ;
}
/*
perform a backtracking analysis of the minimal set of operations
to generate an error
*/
static void backtrack_analyze ( void )
{
int chunk , ret ;
chunk = options . numops / 2 ;
do {
int base ;
for ( base = 0 ;
chunk > 0 & & base + chunk < options . numops & & options . numops > 1 ; ) {
int i , max ;
chunk = MIN ( chunk , options . numops / 2 ) ;
/* mark this range as disabled */
max = MIN ( options . numops , base + chunk ) ;
for ( i = base ; i < max ; i + + ) {
op_parms [ i ] . disabled = True ;
}
printf ( " Testing %d ops with %d-%d disabled \n " ,
options . numops , base , max - 1 ) ;
ret = run_test ( ) ;
printf ( " Completed %d of %d ops \n " , ret , options . numops ) ;
for ( i = base ; i < max ; i + + ) {
op_parms [ i ] . disabled = False ;
}
if ( ret = = options . numops ) {
/* this chunk is needed */
base + = chunk ;
} else if ( ret < base ) {
printf ( " damn - inconsistent errors! found early error \n " ) ;
options . numops = ret + 1 ;
base = 0 ;
} else {
/* it failed - this chunk isn't needed for a failure */
memmove ( & op_parms [ base ] , & op_parms [ max ] ,
sizeof ( op_parms [ 0 ] ) * ( options . numops - max ) ) ;
options . numops = ( ret + 1 ) - ( max - base ) ;
}
}
if ( chunk = = 2 ) {
chunk = 1 ;
} else {
chunk * = 0.4 ;
}
if ( options . analyze_continuous & & chunk = = 0 & & options . numops ! = 1 ) {
chunk = 1 ;
}
} while ( chunk > 0 ) ;
printf ( " Reduced to %d ops \n " , options . numops ) ;
ret = run_test ( ) ;
if ( ret ! = options . numops - 1 ) {
printf ( " Inconsistent result? ret=%d numops=%d \n " , ret , options . numops ) ;
}
}
/*
start the main gentest process
*/
static BOOL start_gentest ( void )
{
int op ;
int ret ;
/* allocate the open_handles array */
open_handles = calloc ( options . max_open_handles , sizeof ( open_handles [ 0 ] ) ) ;
srandom ( options . seed ) ;
op_parms = calloc ( options . numops , sizeof ( op_parms [ 0 ] ) ) ;
/* generate the seeds - after this everything is deterministic */
if ( options . use_preset_seeds ) {
int numops ;
2005-07-10 05:10:09 +04:00
char * * preset = file_lines_load ( options . seeds_file , & numops , NULL ) ;
2003-08-13 05:53:07 +04:00
if ( ! preset ) {
printf ( " Failed to load %s - %s \n " , options . seeds_file , strerror ( errno ) ) ;
exit ( 1 ) ;
}
if ( numops < options . numops ) {
options . numops = numops ;
}
for ( op = 0 ; op < options . numops ; op + + ) {
if ( ! preset [ op ] ) {
printf ( " Not enough seeds in %s \n " , options . seeds_file ) ;
exit ( 1 ) ;
}
op_parms [ op ] . seed = atoi ( preset [ op ] ) ;
}
printf ( " Loaded %d seeds from %s \n " , options . numops , options . seeds_file ) ;
} else {
for ( op = 0 ; op < options . numops ; op + + ) {
op_parms [ op ] . seed = random ( ) ;
}
}
ret = run_test ( ) ;
if ( ret ! = options . numops & & options . analyze ) {
options . numops = ret + 1 ;
backtrack_analyze ( ) ;
} else if ( options . analyze_always ) {
backtrack_analyze ( ) ;
} else if ( options . analyze_continuous ) {
while ( run_test ( ) = = options . numops ) ;
}
return ret = = options . numops ;
}
static void usage ( void )
{
printf (
" Usage: \n \
gentest2 / / server1 / share1 / / server2 / share2 [ options . . ] \ n \
options : \ n \
2004-08-10 00:51:16 +04:00
- U user % % pass ( can be specified twice ) \ n \
2003-08-13 05:53:07 +04:00
- s seed \ n \
- o numops \ n \
- a ( show all ops ) \ n \
- A backtrack to find minimal ops \ n \
- i FILE add a list of wildcard exclusions \ n \
- O enable oplocks \ n \
- S FILE set preset seeds file \ n \
- L use preset seeds \ n \
- F fast reconnect ( just close files ) \ n \
- C continuous analysis mode \ n \
- X analyse even when test OK \ n \
" );
}
/****************************************************************************
main program
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
int main ( int argc , char * argv [ ] )
{
int opt ;
2005-04-30 13:59:17 +04:00
int i , username_count = 0 ;
2003-08-13 05:53:07 +04:00
BOOL ret ;
setlinebuf ( stdout ) ;
setup_logging ( " gentest " , DEBUG_STDOUT ) ;
if ( argc < 3 | | argv [ 1 ] [ 0 ] = = ' - ' ) {
usage ( ) ;
exit ( 1 ) ;
}
2003-08-15 22:33:43 +04:00
setup_logging ( argv [ 0 ] , DEBUG_STDOUT ) ;
2003-08-13 05:53:07 +04:00
for ( i = 0 ; i < NSERVERS ; i + + ) {
const char * share = argv [ 1 + i ] ;
2005-03-22 22:30:59 +03:00
servers [ i ] . credentials = cli_credentials_init ( NULL ) ;
2003-08-13 05:53:07 +04:00
if ( ! split_unc_name ( share , & servers [ i ] . server_name , & servers [ i ] . share_name ) ) {
printf ( " Invalid share name '%s' \n " , share ) ;
return - 1 ;
}
}
argc - = NSERVERS ;
argv + = NSERVERS ;
2005-07-20 14:07:48 +04:00
lp_load ( ) ;
2003-08-13 05:53:07 +04:00
2005-04-30 13:59:17 +04:00
servers [ 0 ] . credentials = cli_credentials_init ( talloc_autofree_context ( ) ) ;
servers [ 1 ] . credentials = cli_credentials_init ( talloc_autofree_context ( ) ) ;
cli_credentials_guess ( servers [ 0 ] . credentials ) ;
cli_credentials_guess ( servers [ 1 ] . credentials ) ;
2003-08-13 05:53:07 +04:00
options . seed = time ( NULL ) ;
options . numops = 1000 ;
options . max_open_handles = 20 ;
options . seeds_file = " gentest_seeds.dat " ;
while ( ( opt = getopt ( argc , argv , " U:s:o:ad:i:AOhS:LFXC " ) ) ! = EOF ) {
switch ( opt ) {
case ' U ' :
2005-04-30 13:59:17 +04:00
if ( username_count = = 2 ) {
usage ( ) ;
exit ( 1 ) ;
}
cli_credentials_parse_string ( servers [ username_count ] . credentials ,
optarg , CRED_SPECIFIED ) ;
username_count + + ;
2003-08-13 05:53:07 +04:00
break ;
case ' d ' :
DEBUGLEVEL = atoi ( optarg ) ;
2003-08-15 22:33:43 +04:00
setup_logging ( NULL , DEBUG_STDOUT ) ;
2003-08-13 05:53:07 +04:00
break ;
case ' s ' :
options . seed = atoi ( optarg ) ;
break ;
case ' S ' :
options . seeds_file = optarg ;
break ;
case ' L ' :
options . use_preset_seeds = True ;
break ;
case ' F ' :
options . fast_reconnect = True ;
break ;
case ' o ' :
options . numops = atoi ( optarg ) ;
break ;
case ' O ' :
options . use_oplocks = True ;
break ;
case ' a ' :
options . showall = True ;
break ;
case ' A ' :
options . analyze = True ;
break ;
case ' X ' :
options . analyze_always = True ;
break ;
case ' C ' :
options . analyze_continuous = True ;
break ;
case ' i ' :
2005-07-10 05:10:09 +04:00
options . ignore_patterns = file_lines_load ( optarg , NULL , NULL ) ;
2003-08-13 05:53:07 +04:00
break ;
case ' h ' :
usage ( ) ;
exit ( 1 ) ;
default :
printf ( " Unknown option %c (%d) \n " , ( char ) opt , opt ) ;
exit ( 1 ) ;
}
}
2005-12-31 01:46:16 +03:00
gensec_init ( ) ;
2004-11-09 12:26:47 +03:00
2005-04-30 13:59:17 +04:00
if ( username_count = = 0 ) {
2003-08-13 05:53:07 +04:00
usage ( ) ;
return - 1 ;
}
2005-04-30 13:59:17 +04:00
if ( username_count = = 1 ) {
servers [ 1 ] . credentials = servers [ 0 ] . credentials ;
2004-08-10 00:51:16 +04:00
}
2003-08-13 05:53:07 +04:00
printf ( " seed=%u \n " , options . seed ) ;
ret = start_gentest ( ) ;
if ( ret ) {
printf ( " gentest completed - no errors \n " ) ;
} else {
printf ( " gentest failed \n " ) ;
}
return ret ? 0 : - 1 ;
}