mirror of
https://github.com/samba-team/samba.git
synced 2024-12-27 03:21:53 +03:00
1e973565b6
(This used to be commit 5b44d8121d
)
904 lines
24 KiB
C
904 lines
24 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
SMB torture tester utility functions
|
|
Copyright (C) Andrew Tridgell 2003
|
|
Copyright (C) Jelmer Vernooij 2006
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "lib/cmdline/popt_common.h"
|
|
#include "libcli/raw/libcliraw.h"
|
|
#include "libcli/raw/raw_proto.h"
|
|
#include "libcli/raw/ioctl.h"
|
|
#include "libcli/libcli.h"
|
|
#include "system/filesys.h"
|
|
#include "system/shmem.h"
|
|
#include "system/wait.h"
|
|
#include "system/time.h"
|
|
#include "torture/torture.h"
|
|
#include "util/dlinklist.h"
|
|
#include "auth/credentials/credentials.h"
|
|
#include "libcli/resolve/resolve.h"
|
|
#include "param/param.h"
|
|
|
|
|
|
/**
|
|
setup a directory ready for a test
|
|
*/
|
|
_PUBLIC_ bool torture_setup_dir(struct smbcli_state *cli, const char *dname)
|
|
{
|
|
smb_raw_exit(cli->session);
|
|
if (smbcli_deltree(cli->tree, dname) == -1 ||
|
|
NT_STATUS_IS_ERR(smbcli_mkdir(cli->tree, dname))) {
|
|
printf("Unable to setup %s - %s\n", dname, smbcli_errstr(cli->tree));
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/*
|
|
create a directory, returning a handle to it
|
|
*/
|
|
NTSTATUS create_directory_handle(struct smbcli_tree *tree, const char *dname, int *fnum)
|
|
{
|
|
NTSTATUS status;
|
|
union smb_open io;
|
|
TALLOC_CTX *mem_ctx;
|
|
|
|
mem_ctx = talloc_named_const(tree, 0, "create_directory_handle");
|
|
|
|
io.generic.level = RAW_OPEN_NTCREATEX;
|
|
io.ntcreatex.in.root_fid = 0;
|
|
io.ntcreatex.in.flags = 0;
|
|
io.ntcreatex.in.access_mask = SEC_RIGHTS_FILE_ALL;
|
|
io.ntcreatex.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
|
|
io.ntcreatex.in.file_attr = FILE_ATTRIBUTE_NORMAL;
|
|
io.ntcreatex.in.share_access = NTCREATEX_SHARE_ACCESS_READ | NTCREATEX_SHARE_ACCESS_WRITE;
|
|
io.ntcreatex.in.alloc_size = 0;
|
|
io.ntcreatex.in.open_disposition = NTCREATEX_DISP_OPEN_IF;
|
|
io.ntcreatex.in.impersonation = NTCREATEX_IMPERSONATION_ANONYMOUS;
|
|
io.ntcreatex.in.security_flags = 0;
|
|
io.ntcreatex.in.fname = dname;
|
|
|
|
status = smb_raw_open(tree, mem_ctx, &io);
|
|
talloc_free(mem_ctx);
|
|
|
|
if (NT_STATUS_IS_OK(status)) {
|
|
*fnum = io.ntcreatex.out.file.fnum;
|
|
}
|
|
|
|
return status;
|
|
}
|
|
|
|
|
|
/**
|
|
sometimes we need a fairly complex file to work with, so we can test
|
|
all possible attributes.
|
|
*/
|
|
_PUBLIC_ int create_complex_file(struct smbcli_state *cli, TALLOC_CTX *mem_ctx, const char *fname)
|
|
{
|
|
int fnum;
|
|
char buf[7] = "abc";
|
|
union smb_setfileinfo setfile;
|
|
union smb_fileinfo fileinfo;
|
|
time_t t = (time(NULL) & ~1);
|
|
NTSTATUS status;
|
|
|
|
smbcli_unlink(cli->tree, fname);
|
|
fnum = smbcli_nt_create_full(cli->tree, fname, 0,
|
|
SEC_RIGHTS_FILE_ALL,
|
|
FILE_ATTRIBUTE_NORMAL,
|
|
NTCREATEX_SHARE_ACCESS_DELETE|
|
|
NTCREATEX_SHARE_ACCESS_READ|
|
|
NTCREATEX_SHARE_ACCESS_WRITE,
|
|
NTCREATEX_DISP_OVERWRITE_IF,
|
|
0, 0);
|
|
if (fnum == -1) return -1;
|
|
|
|
smbcli_write(cli->tree, fnum, 0, buf, 0, sizeof(buf));
|
|
|
|
if (strchr(fname, ':') == NULL) {
|
|
/* setup some EAs */
|
|
setfile.generic.level = RAW_SFILEINFO_EA_SET;
|
|
setfile.generic.in.file.fnum = fnum;
|
|
setfile.ea_set.in.num_eas = 2;
|
|
setfile.ea_set.in.eas = talloc_array(mem_ctx, struct ea_struct, 2);
|
|
setfile.ea_set.in.eas[0].flags = 0;
|
|
setfile.ea_set.in.eas[0].name.s = "EAONE";
|
|
setfile.ea_set.in.eas[0].value = data_blob_talloc(mem_ctx, "VALUE1", 6);
|
|
setfile.ea_set.in.eas[1].flags = 0;
|
|
setfile.ea_set.in.eas[1].name.s = "SECONDEA";
|
|
setfile.ea_set.in.eas[1].value = data_blob_talloc(mem_ctx, "ValueTwo", 8);
|
|
status = smb_raw_setfileinfo(cli->tree, &setfile);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to setup EAs\n");
|
|
}
|
|
}
|
|
|
|
/* make sure all the timestamps aren't the same, and are also
|
|
in different DST zones*/
|
|
setfile.generic.level = RAW_SFILEINFO_SETATTRE;
|
|
setfile.generic.in.file.fnum = fnum;
|
|
|
|
setfile.setattre.in.create_time = t + 9*30*24*60*60;
|
|
setfile.setattre.in.access_time = t + 6*30*24*60*60;
|
|
setfile.setattre.in.write_time = t + 3*30*24*60*60;
|
|
|
|
status = smb_raw_setfileinfo(cli->tree, &setfile);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to setup file times - %s\n", nt_errstr(status));
|
|
}
|
|
|
|
/* make sure all the timestamps aren't the same */
|
|
fileinfo.generic.level = RAW_FILEINFO_GETATTRE;
|
|
fileinfo.generic.in.file.fnum = fnum;
|
|
|
|
status = smb_raw_fileinfo(cli->tree, mem_ctx, &fileinfo);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to query file times - %s\n", nt_errstr(status));
|
|
}
|
|
|
|
if (setfile.setattre.in.create_time != fileinfo.getattre.out.create_time) {
|
|
printf("create_time not setup correctly\n");
|
|
}
|
|
if (setfile.setattre.in.access_time != fileinfo.getattre.out.access_time) {
|
|
printf("access_time not setup correctly\n");
|
|
}
|
|
if (setfile.setattre.in.write_time != fileinfo.getattre.out.write_time) {
|
|
printf("write_time not setup correctly\n");
|
|
}
|
|
|
|
return fnum;
|
|
}
|
|
|
|
|
|
/*
|
|
sometimes we need a fairly complex directory to work with, so we can test
|
|
all possible attributes.
|
|
*/
|
|
int create_complex_dir(struct smbcli_state *cli, TALLOC_CTX *mem_ctx, const char *dname)
|
|
{
|
|
int fnum;
|
|
union smb_setfileinfo setfile;
|
|
union smb_fileinfo fileinfo;
|
|
time_t t = (time(NULL) & ~1);
|
|
NTSTATUS status;
|
|
|
|
smbcli_deltree(cli->tree, dname);
|
|
fnum = smbcli_nt_create_full(cli->tree, dname, 0,
|
|
SEC_RIGHTS_DIR_ALL,
|
|
FILE_ATTRIBUTE_DIRECTORY,
|
|
NTCREATEX_SHARE_ACCESS_READ|
|
|
NTCREATEX_SHARE_ACCESS_WRITE,
|
|
NTCREATEX_DISP_OPEN_IF,
|
|
NTCREATEX_OPTIONS_DIRECTORY, 0);
|
|
if (fnum == -1) return -1;
|
|
|
|
if (strchr(dname, ':') == NULL) {
|
|
/* setup some EAs */
|
|
setfile.generic.level = RAW_SFILEINFO_EA_SET;
|
|
setfile.generic.in.file.fnum = fnum;
|
|
setfile.ea_set.in.num_eas = 2;
|
|
setfile.ea_set.in.eas = talloc_array(mem_ctx, struct ea_struct, 2);
|
|
setfile.ea_set.in.eas[0].flags = 0;
|
|
setfile.ea_set.in.eas[0].name.s = "EAONE";
|
|
setfile.ea_set.in.eas[0].value = data_blob_talloc(mem_ctx, "VALUE1", 6);
|
|
setfile.ea_set.in.eas[1].flags = 0;
|
|
setfile.ea_set.in.eas[1].name.s = "SECONDEA";
|
|
setfile.ea_set.in.eas[1].value = data_blob_talloc(mem_ctx, "ValueTwo", 8);
|
|
status = smb_raw_setfileinfo(cli->tree, &setfile);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to setup EAs\n");
|
|
}
|
|
}
|
|
|
|
/* make sure all the timestamps aren't the same, and are also
|
|
in different DST zones*/
|
|
setfile.generic.level = RAW_SFILEINFO_SETATTRE;
|
|
setfile.generic.in.file.fnum = fnum;
|
|
|
|
setfile.setattre.in.create_time = t + 9*30*24*60*60;
|
|
setfile.setattre.in.access_time = t + 6*30*24*60*60;
|
|
setfile.setattre.in.write_time = t + 3*30*24*60*60;
|
|
|
|
status = smb_raw_setfileinfo(cli->tree, &setfile);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to setup file times - %s\n", nt_errstr(status));
|
|
}
|
|
|
|
/* make sure all the timestamps aren't the same */
|
|
fileinfo.generic.level = RAW_FILEINFO_GETATTRE;
|
|
fileinfo.generic.in.file.fnum = fnum;
|
|
|
|
status = smb_raw_fileinfo(cli->tree, mem_ctx, &fileinfo);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to query file times - %s\n", nt_errstr(status));
|
|
}
|
|
|
|
if (setfile.setattre.in.create_time != fileinfo.getattre.out.create_time) {
|
|
printf("create_time not setup correctly\n");
|
|
}
|
|
if (setfile.setattre.in.access_time != fileinfo.getattre.out.access_time) {
|
|
printf("access_time not setup correctly\n");
|
|
}
|
|
if (setfile.setattre.in.write_time != fileinfo.getattre.out.write_time) {
|
|
printf("write_time not setup correctly\n");
|
|
}
|
|
|
|
return fnum;
|
|
}
|
|
|
|
|
|
|
|
/* return a pointer to a anonymous shared memory segment of size "size"
|
|
which will persist across fork() but will disappear when all processes
|
|
exit
|
|
|
|
The memory is not zeroed
|
|
|
|
This function uses system5 shared memory. It takes advantage of a property
|
|
that the memory is not destroyed if it is attached when the id is removed
|
|
*/
|
|
void *shm_setup(int size)
|
|
{
|
|
int shmid;
|
|
void *ret;
|
|
|
|
shmid = shmget(IPC_PRIVATE, size, SHM_R | SHM_W);
|
|
if (shmid == -1) {
|
|
printf("can't get shared memory\n");
|
|
exit(1);
|
|
}
|
|
ret = (void *)shmat(shmid, 0, 0);
|
|
if (!ret || ret == (void *)-1) {
|
|
printf("can't attach to shared memory\n");
|
|
return NULL;
|
|
}
|
|
/* the following releases the ipc, but note that this process
|
|
and all its children will still have access to the memory, its
|
|
just that the shmid is no longer valid for other shm calls. This
|
|
means we don't leave behind lots of shm segments after we exit
|
|
|
|
See Stevens "advanced programming in unix env" for details
|
|
*/
|
|
shmctl(shmid, IPC_RMID, 0);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
check that a wire string matches the flags specified
|
|
not 100% accurate, but close enough for testing
|
|
*/
|
|
bool wire_bad_flags(struct smb_wire_string *str, int flags,
|
|
struct smbcli_transport *transport)
|
|
{
|
|
bool server_unicode;
|
|
int len;
|
|
if (!str || !str->s) return true;
|
|
len = strlen(str->s);
|
|
if (flags & STR_TERMINATE) len++;
|
|
|
|
server_unicode = (transport->negotiate.capabilities&CAP_UNICODE)?true:false;
|
|
if (getenv("CLI_FORCE_ASCII") || !transport->options.unicode) {
|
|
server_unicode = false;
|
|
}
|
|
|
|
if ((flags & STR_UNICODE) || server_unicode) {
|
|
len *= 2;
|
|
} else if (flags & STR_TERMINATE_ASCII) {
|
|
len++;
|
|
}
|
|
if (str->private_length != len) {
|
|
printf("Expected wire_length %d but got %d for '%s'\n",
|
|
len, str->private_length, str->s);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
dump a all_info QFILEINFO structure
|
|
*/
|
|
void dump_all_info(TALLOC_CTX *mem_ctx, union smb_fileinfo *finfo)
|
|
{
|
|
d_printf("\tcreate_time: %s\n", nt_time_string(mem_ctx, finfo->all_info.out.create_time));
|
|
d_printf("\taccess_time: %s\n", nt_time_string(mem_ctx, finfo->all_info.out.access_time));
|
|
d_printf("\twrite_time: %s\n", nt_time_string(mem_ctx, finfo->all_info.out.write_time));
|
|
d_printf("\tchange_time: %s\n", nt_time_string(mem_ctx, finfo->all_info.out.change_time));
|
|
d_printf("\tattrib: 0x%x\n", finfo->all_info.out.attrib);
|
|
d_printf("\talloc_size: %llu\n", (long long)finfo->all_info.out.alloc_size);
|
|
d_printf("\tsize: %llu\n", (long long)finfo->all_info.out.size);
|
|
d_printf("\tnlink: %u\n", finfo->all_info.out.nlink);
|
|
d_printf("\tdelete_pending: %u\n", finfo->all_info.out.delete_pending);
|
|
d_printf("\tdirectory: %u\n", finfo->all_info.out.directory);
|
|
d_printf("\tea_size: %u\n", finfo->all_info.out.ea_size);
|
|
d_printf("\tfname: '%s'\n", finfo->all_info.out.fname.s);
|
|
}
|
|
|
|
/*
|
|
dump file infor by name
|
|
*/
|
|
void torture_all_info(struct smbcli_tree *tree, const char *fname)
|
|
{
|
|
TALLOC_CTX *mem_ctx = talloc_named(tree, 0, "%s", fname);
|
|
union smb_fileinfo finfo;
|
|
NTSTATUS status;
|
|
|
|
finfo.generic.level = RAW_FILEINFO_ALL_INFO;
|
|
finfo.generic.in.file.path = fname;
|
|
status = smb_raw_pathinfo(tree, mem_ctx, &finfo);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
d_printf("%s - %s\n", fname, nt_errstr(status));
|
|
return;
|
|
}
|
|
|
|
d_printf("%s:\n", fname);
|
|
dump_all_info(mem_ctx, &finfo);
|
|
talloc_free(mem_ctx);
|
|
}
|
|
|
|
|
|
/*
|
|
set a attribute on a file
|
|
*/
|
|
bool torture_set_file_attribute(struct smbcli_tree *tree, const char *fname, uint16_t attrib)
|
|
{
|
|
union smb_setfileinfo sfinfo;
|
|
NTSTATUS status;
|
|
|
|
ZERO_STRUCT(sfinfo.basic_info.in);
|
|
sfinfo.basic_info.level = RAW_SFILEINFO_BASIC_INFORMATION;
|
|
sfinfo.basic_info.in.file.path = fname;
|
|
sfinfo.basic_info.in.attrib = attrib;
|
|
status = smb_raw_setpathinfo(tree, &sfinfo);
|
|
return NT_STATUS_IS_OK(status);
|
|
}
|
|
|
|
|
|
/*
|
|
set a file descriptor as sparse
|
|
*/
|
|
NTSTATUS torture_set_sparse(struct smbcli_tree *tree, int fnum)
|
|
{
|
|
union smb_ioctl nt;
|
|
NTSTATUS status;
|
|
TALLOC_CTX *mem_ctx;
|
|
|
|
mem_ctx = talloc_named_const(tree, 0, "torture_set_sparse");
|
|
if (!mem_ctx) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
nt.ntioctl.level = RAW_IOCTL_NTIOCTL;
|
|
nt.ntioctl.in.function = FSCTL_SET_SPARSE;
|
|
nt.ntioctl.in.file.fnum = fnum;
|
|
nt.ntioctl.in.fsctl = true;
|
|
nt.ntioctl.in.filter = 0;
|
|
nt.ntioctl.in.max_data = 0;
|
|
nt.ntioctl.in.blob = data_blob(NULL, 0);
|
|
|
|
status = smb_raw_ioctl(tree, mem_ctx, &nt);
|
|
|
|
talloc_free(mem_ctx);
|
|
|
|
return status;
|
|
}
|
|
|
|
/*
|
|
check that an EA has the right value
|
|
*/
|
|
NTSTATUS torture_check_ea(struct smbcli_state *cli,
|
|
const char *fname, const char *eaname, const char *value)
|
|
{
|
|
union smb_fileinfo info;
|
|
NTSTATUS status;
|
|
struct ea_name ea;
|
|
TALLOC_CTX *mem_ctx = talloc_new(cli);
|
|
|
|
info.ea_list.level = RAW_FILEINFO_EA_LIST;
|
|
info.ea_list.in.file.path = fname;
|
|
info.ea_list.in.num_names = 1;
|
|
info.ea_list.in.ea_names = &ea;
|
|
|
|
ea.name.s = eaname;
|
|
|
|
status = smb_raw_pathinfo(cli->tree, mem_ctx, &info);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
talloc_free(mem_ctx);
|
|
return status;
|
|
}
|
|
|
|
if (info.ea_list.out.num_eas != 1) {
|
|
printf("Expected 1 ea in ea_list\n");
|
|
talloc_free(mem_ctx);
|
|
return NT_STATUS_EA_CORRUPT_ERROR;
|
|
}
|
|
|
|
if (strcasecmp_m(eaname, info.ea_list.out.eas[0].name.s) != 0) {
|
|
printf("Expected ea '%s' not '%s' in ea_list\n",
|
|
eaname, info.ea_list.out.eas[0].name.s);
|
|
talloc_free(mem_ctx);
|
|
return NT_STATUS_EA_CORRUPT_ERROR;
|
|
}
|
|
|
|
if (value == NULL) {
|
|
if (info.ea_list.out.eas[0].value.length != 0) {
|
|
printf("Expected zero length ea for %s\n", eaname);
|
|
talloc_free(mem_ctx);
|
|
return NT_STATUS_EA_CORRUPT_ERROR;
|
|
}
|
|
talloc_free(mem_ctx);
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
if (strlen(value) == info.ea_list.out.eas[0].value.length &&
|
|
memcmp(value, info.ea_list.out.eas[0].value.data,
|
|
info.ea_list.out.eas[0].value.length) == 0) {
|
|
talloc_free(mem_ctx);
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
printf("Expected value '%s' not '%*.*s' for ea %s\n",
|
|
value,
|
|
(int)info.ea_list.out.eas[0].value.length,
|
|
(int)info.ea_list.out.eas[0].value.length,
|
|
info.ea_list.out.eas[0].value.data,
|
|
eaname);
|
|
|
|
talloc_free(mem_ctx);
|
|
|
|
return NT_STATUS_EA_CORRUPT_ERROR;
|
|
}
|
|
|
|
_PUBLIC_ bool torture_open_connection_share(TALLOC_CTX *mem_ctx,
|
|
struct smbcli_state **c,
|
|
struct torture_context *tctx,
|
|
const char *hostname,
|
|
const char *sharename,
|
|
struct event_context *ev)
|
|
{
|
|
NTSTATUS status;
|
|
|
|
struct smbcli_options options;
|
|
|
|
lp_smbcli_options(tctx->lp_ctx, &options);
|
|
|
|
options.use_oplocks = torture_setting_bool(tctx, "use_oplocks", true);
|
|
options.use_level2_oplocks = torture_setting_bool(tctx, "use_level2_oplocks", true);
|
|
|
|
status = smbcli_full_connection(mem_ctx, c, hostname,
|
|
lp_smb_ports(tctx->lp_ctx),
|
|
sharename, NULL,
|
|
cmdline_credentials,
|
|
lp_resolve_context(tctx->lp_ctx),
|
|
ev, &options);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
printf("Failed to open connection - %s\n", nt_errstr(status));
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
_PUBLIC_ bool torture_get_conn_index(int conn_index,
|
|
TALLOC_CTX *mem_ctx,
|
|
struct torture_context *tctx,
|
|
char **host, char **share)
|
|
{
|
|
char **unc_list = NULL;
|
|
int num_unc_names = 0;
|
|
const char *p;
|
|
|
|
(*host) = talloc_strdup(mem_ctx, torture_setting_string(tctx, "host", NULL));
|
|
(*share) = talloc_strdup(mem_ctx, torture_setting_string(tctx, "share", NULL));
|
|
|
|
p = torture_setting_string(tctx, "unclist", NULL);
|
|
if (!p) {
|
|
return true;
|
|
}
|
|
|
|
unc_list = file_lines_load(p, &num_unc_names, NULL);
|
|
if (!unc_list || num_unc_names <= 0) {
|
|
DEBUG(0,("Failed to load unc names list from '%s'\n", p));
|
|
return false;
|
|
}
|
|
|
|
if (!smbcli_parse_unc(unc_list[conn_index % num_unc_names],
|
|
mem_ctx, host, share)) {
|
|
DEBUG(0, ("Failed to parse UNC name %s\n",
|
|
unc_list[conn_index % num_unc_names]));
|
|
return false;
|
|
}
|
|
|
|
talloc_free(unc_list);
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
_PUBLIC_ bool torture_open_connection_ev(struct smbcli_state **c,
|
|
int conn_index,
|
|
struct torture_context *tctx,
|
|
struct event_context *ev)
|
|
{
|
|
char *host, *share;
|
|
bool ret;
|
|
|
|
if (!torture_get_conn_index(conn_index, ev, tctx, &host, &share)) {
|
|
return false;
|
|
}
|
|
|
|
ret = torture_open_connection_share(NULL, c, tctx, host, share, ev);
|
|
talloc_free(host);
|
|
talloc_free(share);
|
|
|
|
return ret;
|
|
}
|
|
|
|
_PUBLIC_ bool torture_open_connection(struct smbcli_state **c, struct torture_context *tctx, int conn_index)
|
|
{
|
|
return torture_open_connection_ev(c, conn_index, tctx, tctx->ev);
|
|
}
|
|
|
|
|
|
|
|
_PUBLIC_ bool torture_close_connection(struct smbcli_state *c)
|
|
{
|
|
bool ret = true;
|
|
if (!c) return true;
|
|
if (NT_STATUS_IS_ERR(smbcli_tdis(c))) {
|
|
printf("tdis failed (%s)\n", smbcli_errstr(c->tree));
|
|
ret = false;
|
|
}
|
|
talloc_free(c);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/* check if the server produced the expected error code */
|
|
_PUBLIC_ bool check_error(const char *location, struct smbcli_state *c,
|
|
uint8_t eclass, uint32_t ecode, NTSTATUS nterr)
|
|
{
|
|
NTSTATUS status;
|
|
|
|
status = smbcli_nt_error(c->tree);
|
|
if (NT_STATUS_IS_DOS(status)) {
|
|
int class, num;
|
|
class = NT_STATUS_DOS_CLASS(status);
|
|
num = NT_STATUS_DOS_CODE(status);
|
|
if (eclass != class || ecode != num) {
|
|
printf("unexpected error code %s\n", nt_errstr(status));
|
|
printf(" expected %s or %s (at %s)\n",
|
|
nt_errstr(NT_STATUS_DOS(eclass, ecode)),
|
|
nt_errstr(nterr), location);
|
|
return false;
|
|
}
|
|
} else {
|
|
if (!NT_STATUS_EQUAL(nterr, status)) {
|
|
printf("unexpected error code %s\n", nt_errstr(status));
|
|
printf(" expected %s (at %s)\n", nt_errstr(nterr), location);
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static struct smbcli_state *current_cli;
|
|
static int procnum; /* records process count number when forking */
|
|
|
|
static void sigcont(int sig)
|
|
{
|
|
}
|
|
|
|
double torture_create_procs(struct torture_context *tctx,
|
|
bool (*fn)(struct torture_context *, struct smbcli_state *, int), bool *result)
|
|
{
|
|
int i, status;
|
|
volatile pid_t *child_status;
|
|
volatile bool *child_status_out;
|
|
int synccount;
|
|
int tries = 8;
|
|
int torture_nprocs = torture_setting_int(tctx, "nprocs", 4);
|
|
double start_time_limit = 10 + (torture_nprocs * 1.5);
|
|
struct timeval tv;
|
|
|
|
*result = true;
|
|
|
|
synccount = 0;
|
|
|
|
signal(SIGCONT, sigcont);
|
|
|
|
child_status = (volatile pid_t *)shm_setup(sizeof(pid_t)*torture_nprocs);
|
|
if (!child_status) {
|
|
printf("Failed to setup shared memory\n");
|
|
return -1;
|
|
}
|
|
|
|
child_status_out = (volatile bool *)shm_setup(sizeof(bool)*torture_nprocs);
|
|
if (!child_status_out) {
|
|
printf("Failed to setup result status shared memory\n");
|
|
return -1;
|
|
}
|
|
|
|
for (i = 0; i < torture_nprocs; i++) {
|
|
child_status[i] = 0;
|
|
child_status_out[i] = true;
|
|
}
|
|
|
|
tv = timeval_current();
|
|
|
|
for (i=0;i<torture_nprocs;i++) {
|
|
procnum = i;
|
|
if (fork() == 0) {
|
|
char *myname;
|
|
|
|
pid_t mypid = getpid();
|
|
srandom(((int)mypid) ^ ((int)time(NULL)));
|
|
|
|
asprintf(&myname, "CLIENT%d", i);
|
|
lp_set_cmdline(tctx->lp_ctx, "netbios name", myname);
|
|
free(myname);
|
|
|
|
|
|
while (1) {
|
|
if (torture_open_connection(¤t_cli, tctx, i)) {
|
|
break;
|
|
}
|
|
if (tries-- == 0) {
|
|
printf("pid %d failed to start\n", (int)getpid());
|
|
_exit(1);
|
|
}
|
|
msleep(100);
|
|
}
|
|
|
|
child_status[i] = getpid();
|
|
|
|
pause();
|
|
|
|
if (child_status[i]) {
|
|
printf("Child %d failed to start!\n", i);
|
|
child_status_out[i] = 1;
|
|
_exit(1);
|
|
}
|
|
|
|
child_status_out[i] = fn(tctx, current_cli, i);
|
|
_exit(0);
|
|
}
|
|
}
|
|
|
|
do {
|
|
synccount = 0;
|
|
for (i=0;i<torture_nprocs;i++) {
|
|
if (child_status[i]) synccount++;
|
|
}
|
|
if (synccount == torture_nprocs) break;
|
|
msleep(100);
|
|
} while (timeval_elapsed(&tv) < start_time_limit);
|
|
|
|
if (synccount != torture_nprocs) {
|
|
printf("FAILED TO START %d CLIENTS (started %d)\n", torture_nprocs, synccount);
|
|
*result = false;
|
|
return timeval_elapsed(&tv);
|
|
}
|
|
|
|
printf("Starting %d clients\n", torture_nprocs);
|
|
|
|
/* start the client load */
|
|
tv = timeval_current();
|
|
for (i=0;i<torture_nprocs;i++) {
|
|
child_status[i] = 0;
|
|
}
|
|
|
|
printf("%d clients started\n", torture_nprocs);
|
|
|
|
kill(0, SIGCONT);
|
|
|
|
for (i=0;i<torture_nprocs;i++) {
|
|
int ret;
|
|
while ((ret=waitpid(0, &status, 0)) == -1 && errno == EINTR) /* noop */ ;
|
|
if (ret == -1 || WEXITSTATUS(status) != 0) {
|
|
*result = false;
|
|
}
|
|
}
|
|
|
|
printf("\n");
|
|
|
|
for (i=0;i<torture_nprocs;i++) {
|
|
if (!child_status_out[i]) {
|
|
*result = false;
|
|
}
|
|
}
|
|
return timeval_elapsed(&tv);
|
|
}
|
|
|
|
static bool wrap_smb_multi_test(struct torture_context *torture,
|
|
struct torture_tcase *tcase,
|
|
struct torture_test *test)
|
|
{
|
|
bool (*fn)(struct torture_context *, struct smbcli_state *, int ) = test->fn;
|
|
bool result;
|
|
|
|
torture_create_procs(torture, fn, &result);
|
|
|
|
return result;
|
|
}
|
|
|
|
_PUBLIC_ struct torture_test *torture_suite_add_smb_multi_test(
|
|
struct torture_suite *suite,
|
|
const char *name,
|
|
bool (*run) (struct torture_context *,
|
|
struct smbcli_state *,
|
|
int i))
|
|
{
|
|
struct torture_test *test;
|
|
struct torture_tcase *tcase;
|
|
|
|
tcase = torture_suite_add_tcase(suite, name);
|
|
|
|
test = talloc(tcase, struct torture_test);
|
|
|
|
test->name = talloc_strdup(test, name);
|
|
test->description = NULL;
|
|
test->run = wrap_smb_multi_test;
|
|
test->fn = run;
|
|
test->dangerous = false;
|
|
|
|
DLIST_ADD_END(tcase->tests, test, struct torture_test *);
|
|
|
|
return test;
|
|
|
|
}
|
|
|
|
static bool wrap_simple_2smb_test(struct torture_context *torture_ctx,
|
|
struct torture_tcase *tcase,
|
|
struct torture_test *test)
|
|
{
|
|
bool (*fn) (struct torture_context *, struct smbcli_state *,
|
|
struct smbcli_state *);
|
|
bool ret;
|
|
|
|
struct smbcli_state *cli1, *cli2;
|
|
|
|
if (!torture_open_connection(&cli1, torture_ctx, 0) ||
|
|
!torture_open_connection(&cli2, torture_ctx, 1))
|
|
return false;
|
|
|
|
fn = test->fn;
|
|
|
|
ret = fn(torture_ctx, cli1, cli2);
|
|
|
|
talloc_free(cli1);
|
|
talloc_free(cli2);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
|
|
_PUBLIC_ struct torture_test *torture_suite_add_2smb_test(
|
|
struct torture_suite *suite,
|
|
const char *name,
|
|
bool (*run) (struct torture_context *,
|
|
struct smbcli_state *,
|
|
struct smbcli_state *))
|
|
{
|
|
struct torture_test *test;
|
|
struct torture_tcase *tcase;
|
|
|
|
tcase = torture_suite_add_tcase(suite, name);
|
|
|
|
test = talloc(tcase, struct torture_test);
|
|
|
|
test->name = talloc_strdup(test, name);
|
|
test->description = NULL;
|
|
test->run = wrap_simple_2smb_test;
|
|
test->fn = run;
|
|
test->dangerous = false;
|
|
|
|
DLIST_ADD_END(tcase->tests, test, struct torture_test *);
|
|
|
|
return test;
|
|
|
|
}
|
|
|
|
static bool wrap_simple_1smb_test(struct torture_context *torture_ctx,
|
|
struct torture_tcase *tcase,
|
|
struct torture_test *test)
|
|
{
|
|
bool (*fn) (struct torture_context *, struct smbcli_state *);
|
|
bool ret;
|
|
|
|
struct smbcli_state *cli1;
|
|
|
|
if (!torture_open_connection(&cli1, torture_ctx, 0))
|
|
return false;
|
|
|
|
fn = test->fn;
|
|
|
|
ret = fn(torture_ctx, cli1);
|
|
|
|
talloc_free(cli1);
|
|
|
|
return ret;
|
|
}
|
|
|
|
_PUBLIC_ struct torture_test *torture_suite_add_1smb_test(
|
|
struct torture_suite *suite,
|
|
const char *name,
|
|
bool (*run) (struct torture_context *, struct smbcli_state *))
|
|
{
|
|
struct torture_test *test;
|
|
struct torture_tcase *tcase;
|
|
|
|
tcase = torture_suite_add_tcase(suite, name);
|
|
|
|
test = talloc(tcase, struct torture_test);
|
|
|
|
test->name = talloc_strdup(test, name);
|
|
test->description = NULL;
|
|
test->run = wrap_simple_1smb_test;
|
|
test->fn = run;
|
|
test->dangerous = false;
|
|
|
|
DLIST_ADD_END(tcase->tests, test, struct torture_test *);
|
|
|
|
return test;
|
|
}
|
|
|
|
|
|
NTSTATUS torture_second_tcon(TALLOC_CTX *mem_ctx,
|
|
struct smbcli_session *session,
|
|
const char *sharename,
|
|
struct smbcli_tree **res)
|
|
{
|
|
union smb_tcon tcon;
|
|
struct smbcli_tree *result;
|
|
TALLOC_CTX *tmp_ctx;
|
|
NTSTATUS status;
|
|
|
|
if ((tmp_ctx = talloc_new(mem_ctx)) == NULL) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
result = smbcli_tree_init(session, tmp_ctx, false);
|
|
if (result == NULL) {
|
|
talloc_free(tmp_ctx);
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
tcon.generic.level = RAW_TCON_TCONX;
|
|
tcon.tconx.in.flags = 0;
|
|
|
|
/* Ignore share mode security here */
|
|
tcon.tconx.in.password = data_blob(NULL, 0);
|
|
tcon.tconx.in.path = sharename;
|
|
tcon.tconx.in.device = "?????";
|
|
|
|
status = smb_raw_tcon(result, tmp_ctx, &tcon);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
talloc_free(tmp_ctx);
|
|
return status;
|
|
}
|
|
|
|
result->tid = tcon.tconx.out.tid;
|
|
*res = talloc_steal(mem_ctx, result);
|
|
talloc_free(tmp_ctx);
|
|
return NT_STATUS_OK;
|
|
}
|