1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-27 03:21:53 +03:00
samba-mirror/source4/torture/gentest.c
Björn Jacke 2b254c814b s3/s4: merge msleep and smb_msleep
the merged variant is renamed to smb_msleep as some platforms already have a
msleep function.
2010-09-16 21:38:20 +02:00

3262 lines
84 KiB
C

/*
Unix SMB/CIFS implementation.
generic testing tool - version with both SMB and SMB2 support
Copyright (C) Andrew Tridgell 2003-2008
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "lib/cmdline/popt_common.h"
#include "lib/events/events.h"
#include "system/time.h"
#include "system/filesys.h"
#include "libcli/raw/request.h"
#include "libcli/libcli.h"
#include "libcli/raw/libcliraw.h"
#include "libcli/smb2/smb2.h"
#include "libcli/smb2/smb2_calls.h"
#include "librpc/gen_ndr/security.h"
#include "librpc/gen_ndr/ndr_security.h"
#include "auth/credentials/credentials.h"
#include "libcli/resolve/resolve.h"
#include "auth/gensec/gensec.h"
#include "param/param.h"
#include "dynconfig/dynconfig.h"
#include "libcli/security/security.h"
#include "libcli/raw/raw_proto.h"
#define NSERVERS 2
#define NINSTANCES 2
/* global options */
static struct gentest_options {
int showall;
int analyze;
int analyze_always;
int analyze_continuous;
unsigned int max_open_handles;
unsigned int seed;
unsigned int numops;
int use_oplocks;
char **ignore_patterns;
const char *seeds_file;
int use_preset_seeds;
int fast_reconnect;
int mask_indexing;
int no_eas;
int no_acls;
int skip_cleanup;
int valid;
int smb2;
} options;
/* mapping between open handles on the server and local handles */
static struct {
bool active;
unsigned int instance;
struct smb2_handle smb2_handle[NSERVERS]; /* SMB2 */
uint16_t smb_handle[NSERVERS]; /* SMB */
const char *name;
} *open_handles;
static unsigned int num_open_handles;
/* state information for the servers. We open NINSTANCES connections to
each server */
static struct {
struct smb2_tree *smb2_tree[NINSTANCES];
struct smbcli_tree *smb_tree[NINSTANCES];
char *server_name;
char *share_name;
struct cli_credentials *credentials;
} servers[NSERVERS];
/* the seeds and flags for each operation */
static struct {
unsigned int seed;
bool disabled;
} *op_parms;
/* oplock break info */
static struct {
bool got_break;
struct smb2_handle smb2_handle;
uint16_t smb_handle;
uint16_t handle;
uint8_t level;
bool do_close;
} oplocks[NSERVERS][NINSTANCES];
/* change notify reply info */
static struct {
int notify_count;
NTSTATUS status;
union smb_notify notify;
} notifies[NSERVERS][NINSTANCES];
/* info relevant to the current operation */
static struct {
const char *name;
unsigned int seed;
NTSTATUS status;
unsigned int opnum;
TALLOC_CTX *mem_ctx;
const char *mismatch;
} current_op;
static struct smb2_handle bad_smb2_handle;
#define BAD_HANDLE 0xFFFE
static bool oplock_handler_smb2(struct smb2_transport *transport, const struct smb2_handle *handle,
uint8_t level, void *private_data);
static void idle_func_smb2(struct smb2_transport *transport, void *private_data);
static bool oplock_handler_smb(struct smbcli_transport *transport, uint16_t tid, uint16_t fnum, uint8_t level, void *private_data);
static void idle_func_smb(struct smbcli_transport *transport, void *private_data);
/*
check if a string should be ignored. This is used as the basis
for all error ignore settings
*/
static bool ignore_pattern(const char *str)
{
int i;
if (!options.ignore_patterns) return false;
for (i=0;options.ignore_patterns[i];i++) {
if (strcmp(options.ignore_patterns[i], str) == 0 ||
gen_fnmatch(options.ignore_patterns[i], str) == 0) {
DEBUG(2,("Ignoring '%s'\n", str));
return true;
}
}
return false;
}
/*****************************************************
connect to the servers
*******************************************************/
static bool connect_servers_fast(void)
{
int h, i;
/* close all open files */
for (h=0;h<options.max_open_handles;h++) {
if (!open_handles[h].active) continue;
for (i=0;i<NSERVERS;i++) {
NTSTATUS status;
if (options.smb2) {
status = smb2_util_close(servers[i].smb2_tree[open_handles[h].instance],
open_handles[h].smb2_handle[i]);
} else {
status = smbcli_close(servers[i].smb_tree[open_handles[h].instance],
open_handles[h].smb_handle[i]);
}
if (NT_STATUS_IS_ERR(status)) {
return false;
}
open_handles[h].active = false;
}
}
return true;
}
/*****************************************************
connect to the servers
*******************************************************/
static bool connect_servers(struct tevent_context *ev,
struct loadparm_context *lp_ctx)
{
int i, j;
if (options.fast_reconnect && servers[0].smb2_tree[0]) {
if (connect_servers_fast()) {
return true;
}
}
/* close any existing connections */
for (i=0;i<NSERVERS;i++) {
for (j=0;j<NINSTANCES;j++) {
if (servers[i].smb2_tree[j]) {
smb2_tdis(servers[i].smb2_tree[j]);
talloc_free(servers[i].smb2_tree[j]);
servers[i].smb2_tree[j] = NULL;
}
if (servers[i].smb_tree[j]) {
smb_tree_disconnect(servers[i].smb_tree[j]);
talloc_free(servers[i].smb_tree[j]);
servers[i].smb_tree[j] = NULL;
}
}
}
for (i=0;i<NSERVERS;i++) {
for (j=0;j<NINSTANCES;j++) {
NTSTATUS status;
struct smbcli_options smb_options;
struct smbcli_session_options smb_session_options;
lpcfg_smbcli_options(lp_ctx, &smb_options);
lpcfg_smbcli_session_options(lp_ctx, &smb_session_options);
printf("Connecting to \\\\%s\\%s as %s - instance %d\n",
servers[i].server_name, servers[i].share_name,
servers[i].credentials->username, j);
cli_credentials_set_workstation(servers[i].credentials,
"gentest", CRED_SPECIFIED);
if (options.smb2) {
status = smb2_connect(NULL, servers[i].server_name,
lpcfg_smb_ports(lp_ctx),
servers[i].share_name,
lpcfg_resolve_context(lp_ctx),
servers[i].credentials,
&servers[i].smb2_tree[j],
ev, &smb_options,
lpcfg_socket_options(lp_ctx),
lpcfg_gensec_settings(lp_ctx, lp_ctx)
);
} else {
status = smbcli_tree_full_connection(NULL,
&servers[i].smb_tree[j],
servers[i].server_name,
lpcfg_smb_ports(lp_ctx),
servers[i].share_name, "A:",
lpcfg_socket_options(lp_ctx),
servers[i].credentials,
lpcfg_resolve_context(lp_ctx), ev,
&smb_options,
&smb_session_options,
lpcfg_gensec_settings(lp_ctx, lp_ctx));
}
if (!NT_STATUS_IS_OK(status)) {
printf("Failed to connect to \\\\%s\\%s - %s\n",
servers[i].server_name, servers[i].share_name,
nt_errstr(status));
return false;
}
if (options.smb2) {
servers[i].smb2_tree[j]->session->transport->oplock.handler = oplock_handler_smb2;
servers[i].smb2_tree[j]->session->transport->oplock.private_data = (void *)(uintptr_t)((i<<8)|j);
smb2_transport_idle_handler(servers[i].smb2_tree[j]->session->transport,
idle_func_smb2, 50000, NULL);
} else {
smbcli_oplock_handler(servers[i].smb_tree[j]->session->transport, oplock_handler_smb,
(void *)(uintptr_t)((i<<8)|j));
smbcli_transport_idle_handler(servers[i].smb_tree[j]->session->transport, idle_func_smb,
50000, (void *)(uintptr_t)((i<<8)|j));
}
}
}
return true;
}
/*
work out the time skew between the servers - be conservative
*/
static unsigned int time_skew(void)
{
unsigned int ret;
if (options.smb2) {
ret = labs(servers[0].smb2_tree[0]->session->transport->negotiate.system_time -
servers[1].smb2_tree[0]->session->transport->negotiate.system_time);
} else {
ret = labs(servers[0].smb_tree[0]->session->transport->negotiate.server_time -
servers[1].smb_tree[0]->session->transport->negotiate.server_time);
}
return ret + 300;
}
static bool smb2_handle_equal(const struct smb2_handle *h1, const struct smb2_handle *h2)
{
return memcmp(h1, h2, sizeof(struct smb2_handle)) == 0;
}
/*
turn a server handle into a local handle
*/
static unsigned int fnum_to_handle_smb2(int server, int instance, struct smb2_handle server_handle)
{
unsigned int i;
for (i=0;i<options.max_open_handles;i++) {
if (!open_handles[i].active ||
instance != open_handles[i].instance) continue;
if (smb2_handle_equal(&open_handles[i].smb2_handle[server], &server_handle)) {
return i;
}
}
printf("Invalid server handle in fnum_to_handle on server %d instance %d\n",
server, instance);
return BAD_HANDLE;
}
/*
turn a server handle into a local handle
*/
static unsigned int fnum_to_handle_smb(int server, int instance, uint16_t server_handle)
{
unsigned int i;
for (i=0;i<options.max_open_handles;i++) {
if (!open_handles[i].active ||
instance != open_handles[i].instance) continue;
if (open_handles[i].smb_handle[server] == server_handle) {
return i;
}
}
printf("Invalid server handle in fnum_to_handle on server %d instance %d\n",
server, instance);
return BAD_HANDLE;
}
/*
add some newly opened handles
*/
static void gen_add_handle_smb2(int instance, const char *name, struct smb2_handle handles[NSERVERS])
{
int i, h;
for (h=0;h<options.max_open_handles;h++) {
if (!open_handles[h].active) break;
}
if (h == options.max_open_handles) {
/* we have to force close a random handle */
h = random() % options.max_open_handles;
for (i=0;i<NSERVERS;i++) {
NTSTATUS status;
status = smb2_util_close(servers[i].smb2_tree[open_handles[h].instance],
open_handles[h].smb2_handle[i]);
if (NT_STATUS_IS_ERR(status)) {
printf("INTERNAL ERROR: Close failed when recovering handle! - %s\n",
nt_errstr(status));
}
}
printf("Recovered handle %d\n", h);
num_open_handles--;
}
for (i=0;i<NSERVERS;i++) {
open_handles[h].smb2_handle[i] = handles[i];
open_handles[h].instance = instance;
open_handles[h].active = true;
open_handles[h].name = name;
}
num_open_handles++;
printf("OPEN num_open_handles=%d h=%d (%s)\n",
num_open_handles, h, name);
}
/*
add some newly opened handles
*/
static void gen_add_handle_smb(int instance, const char *name, uint16_t handles[NSERVERS])
{
int i, h;
for (h=0;h<options.max_open_handles;h++) {
if (!open_handles[h].active) break;
}
if (h == options.max_open_handles) {
/* we have to force close a random handle */
h = random() % options.max_open_handles;
for (i=0;i<NSERVERS;i++) {
NTSTATUS status;
status = smbcli_close(servers[i].smb_tree[open_handles[h].instance],
open_handles[h].smb_handle[i]);
if (NT_STATUS_IS_ERR(status)) {
printf("INTERNAL ERROR: Close failed when recovering handle! - %s\n",
nt_errstr(status));
}
}
printf("Recovered handle %d\n", h);
num_open_handles--;
}
for (i=0;i<NSERVERS;i++) {
open_handles[h].smb_handle[i] = handles[i];
open_handles[h].instance = instance;
open_handles[h].active = true;
open_handles[h].name = name;
}
num_open_handles++;
printf("OPEN num_open_handles=%d h=%d (%s)\n",
num_open_handles, h, name);
}
/*
remove a closed handle
*/
static void gen_remove_handle_smb2(int instance, struct smb2_handle handles[NSERVERS])
{
int h;
for (h=0;h<options.max_open_handles;h++) {
if (instance == open_handles[h].instance &&
smb2_handle_equal(&open_handles[h].smb2_handle[0], &handles[0])) {
open_handles[h].active = false;
num_open_handles--;
printf("CLOSE num_open_handles=%d h=%d (%s)\n",
num_open_handles, h,
open_handles[h].name);
return;
}
}
printf("Removing invalid handle!?\n");
exit(1);
}
/*
remove a closed handle
*/
static void gen_remove_handle_smb(int instance, uint16_t handles[NSERVERS])
{
int h;
for (h=0;h<options.max_open_handles;h++) {
if (instance == open_handles[h].instance &&
open_handles[h].smb_handle[0] == handles[0]) {
open_handles[h].active = false;
num_open_handles--;
printf("CLOSE num_open_handles=%d h=%d (%s)\n",
num_open_handles, h,
open_handles[h].name);
return;
}
}
printf("Removing invalid handle!?\n");
exit(1);
}
/*
return true with 'chance' probability as a percentage
*/
static bool gen_chance(unsigned int chance)
{
return ((random() % 100) <= chance);
}
/*
map an internal handle number to a server handle
*/
static struct smb2_handle gen_lookup_handle_smb2(int server, uint16_t handle)
{
if (handle == BAD_HANDLE) return bad_smb2_handle;
return open_handles[handle].smb2_handle[server];
}
/*
map an internal handle number to a server handle
*/
static uint16_t gen_lookup_handle_smb(int server, uint16_t handle)
{
if (handle == BAD_HANDLE) return BAD_HANDLE;
return open_handles[handle].smb_handle[server];
}
/*
return a file handle
*/
static uint16_t gen_fnum(int instance)
{
uint16_t h;
int count = 0;
if (gen_chance(20)) return BAD_HANDLE;
while (num_open_handles > 0 && count++ < 10*options.max_open_handles) {
h = random() % options.max_open_handles;
if (open_handles[h].active &&
open_handles[h].instance == instance) {
return h;
}
}
return BAD_HANDLE;
}
/*
return a file handle, but skewed so we don't close the last
couple of handles too readily
*/
static uint16_t gen_fnum_close(int instance)
{
if (num_open_handles < 5) {
if (gen_chance(90)) return BAD_HANDLE;
}
return gen_fnum(instance);
}
/*
generate an integer in a specified range
*/
static int gen_int_range(uint64_t min, uint64_t max)
{
unsigned int r = random();
return min + (r % (1+max-min));
}
/*
return a fnum for use as a root fid
be careful to call GEN_SET_FNUM() when you use this!
*/
static uint16_t gen_root_fid(int instance)
{
if (gen_chance(5)) return gen_fnum(instance);
return 0;
}
/*
generate a file offset
*/
static int gen_offset(void)
{
if (gen_chance(20)) return 0;
// if (gen_chance(5)) return gen_int_range(0, 0xFFFFFFFF);
return gen_int_range(0, 1024*1024);
}
/*
generate a io count
*/
static int gen_io_count(void)
{
if (gen_chance(20)) return 0;
// if (gen_chance(5)) return gen_int_range(0, 0xFFFFFFFF);
return gen_int_range(0, 4096);
}
/*
generate a filename
*/
static const char *gen_fname(void)
{
const char *names[] = {"gentest\\gentest.dat",
"gentest\\foo",
"gentest\\foo2.sym",
"gentest\\foo3.dll",
"gentest\\foo4",
"gentest\\foo4:teststream1",
"gentest\\foo4:teststream2",
"gentest\\foo5.exe",
"gentest\\foo5.exe:teststream3",
"gentest\\foo5.exe:teststream4",
"gentest\\foo6.com",
"gentest\\blah",
"gentest\\blah\\blergh.txt",
"gentest\\blah\\blergh2",
"gentest\\blah\\blergh3.txt",
"gentest\\blah\\blergh4",
"gentest\\blah\\blergh5.txt",
"gentest\\blah\\blergh5",
"gentest\\blah\\.",
"gentest\\blah\\..",
"gentest\\a_very_long_name.bin",
"gentest\\x.y",
"gentest\\blah"};
int i;
do {
i = gen_int_range(0, ARRAY_SIZE(names)-1);
} while (ignore_pattern(names[i]));
return names[i];
}
/*
generate a filename with a higher chance of choosing an already
open file
*/
static const char *gen_fname_open(int instance)
{
uint16_t h;
h = gen_fnum(instance);
if (h == BAD_HANDLE) {
return gen_fname();
}
return open_handles[h].name;
}
/*
generate a wildcard pattern
*/
static const char *gen_pattern(void)
{
int i;
const char *names[] = {"gentest\\*.dat",
"gentest\\*",
"gentest\\*.*",
"gentest\\blah\\*.*",
"gentest\\blah\\*",
"gentest\\?"};
if (gen_chance(50)) return gen_fname();
do {
i = gen_int_range(0, ARRAY_SIZE(names)-1);
} while (ignore_pattern(names[i]));
return names[i];
}
static uint32_t gen_bits_levels(int nlevels, ...)
{
va_list ap;
uint32_t pct;
uint32_t mask;
int i;
va_start(ap, nlevels);
for (i=0;i<nlevels;i++) {
pct = va_arg(ap, uint32_t);
mask = va_arg(ap, uint32_t);
if (pct == 100 || gen_chance(pct)) {
va_end(ap);
return mask & random();
}
}
va_end(ap);
return 0;
}
/*
generate a bitmask
*/
static uint32_t gen_bits_mask(unsigned int mask)
{
unsigned int ret = random();
return ret & mask;
}
/*
generate a bitmask with high probability of the first mask
and low of the second
*/
static uint32_t gen_bits_mask2(uint32_t mask1, uint32_t mask2)
{
if (!options.valid && gen_chance(10)) return gen_bits_mask(mask2);
return gen_bits_mask(mask1);
}
/*
generate reserved values
*/
static uint64_t gen_reserved8(void)
{
if (options.valid) return 0;
return gen_bits_mask(0xFF);
}
static uint64_t gen_reserved16(void)
{
if (options.valid) return 0;
return gen_bits_mask(0xFFFF);
}
static uint64_t gen_reserved32(void)
{
if (options.valid) return 0;
return gen_bits_mask(0xFFFFFFFF);
}
static uint64_t gen_reserved64(void)
{
if (options.valid) return 0;
return gen_bits_mask(0xFFFFFFFF) | (((uint64_t)gen_bits_mask(0xFFFFFFFF))<<32);
}
/*
generate a boolean
*/
static bool gen_bool(void)
{
return gen_bits_mask2(0x1, 0xFF);
}
/*
generate ntrename flags
*/
static uint16_t gen_rename_flags(void)
{
if (gen_chance(30)) return RENAME_FLAG_RENAME;
if (gen_chance(30)) return RENAME_FLAG_HARD_LINK;
if (gen_chance(30)) return RENAME_FLAG_COPY;
return gen_bits_mask(0xFFFF);
}
/*
generate a pid
*/
static uint16_t gen_pid(void)
{
if (gen_chance(10)) return gen_bits_mask(0xFFFF);
return getpid();
}
/*
return a set of lock flags
*/
static uint16_t gen_lock_flags_smb2(void)
{
if (!options.valid && gen_chance(5)) return gen_bits_mask(0xFFFF);
if (gen_chance(20)) return gen_bits_mask(0x1F);
if (gen_chance(50)) return SMB2_LOCK_FLAG_UNLOCK;
return gen_bits_mask(SMB2_LOCK_FLAG_SHARED |
SMB2_LOCK_FLAG_EXCLUSIVE |
SMB2_LOCK_FLAG_FAIL_IMMEDIATELY);
}
/*
generate a lock count
*/
static off_t gen_lock_count(void)
{
return gen_int_range(0, 3);
}
/*
generate a NT access mask
*/
static uint32_t gen_access_mask(void)
{
uint32_t ret;
if (gen_chance(70)) return SEC_FLAG_MAXIMUM_ALLOWED;
if (gen_chance(70)) return SEC_FILE_ALL;
ret = gen_bits_mask(0xFFFFFFFF);
if (options.valid) ret &= ~SEC_MASK_INVALID;
return ret;
}
/*
return a lockingx lock mode
*/
static uint16_t gen_lock_mode(void)
{
if (!options.valid && gen_chance(5)) return gen_bits_mask(0xFFFF);
if (gen_chance(20)) return gen_bits_mask(0x1F);
return gen_bits_mask(LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES);
}
/*
generate a ntcreatex flags field
*/
static uint32_t gen_ntcreatex_flags(void)
{
if (gen_chance(70)) return NTCREATEX_FLAGS_EXTENDED;
return gen_bits_mask2(0x1F, 0xFFFFFFFF);
}
/*
generate a ntcreatex create options bitfield
*/
static uint32_t gen_create_options(void)
{
if (!options.valid && gen_chance(20)) return gen_bits_mask(0xFFFFFFFF);
if (gen_chance(50)) return 0;
return gen_bits_mask(NTCREATEX_OPTIONS_DELETE_ON_CLOSE | NTCREATEX_OPTIONS_DIRECTORY);
}
/*
generate a ntcreatex open disposition
*/
static uint32_t gen_open_disp(void)
{
if (gen_chance(50)) return NTCREATEX_DISP_OPEN_IF;
if (!options.valid && gen_chance(10)) return gen_bits_mask(0xFFFFFFFF);
return gen_int_range(0, 5);
}
/*
generate an openx open mode
*/
static uint16_t gen_openx_mode(void)
{
if (!options.valid && gen_chance(20)) return gen_bits_mask(0xFFFF);
if (gen_chance(20)) return gen_bits_mask(0xFF);
return OPENX_MODE_DENY_NONE | gen_bits_mask(0x3);
}
/*
generate an openx flags field
*/
static uint16_t gen_openx_flags(void)
{
if (!options.valid && gen_chance(20)) return gen_bits_mask(0xFFFF);
return gen_bits_mask(0x7);
}
/*
generate an openx open function
*/
static uint16_t gen_openx_func(void)
{
if (!options.valid && gen_chance(20)) return gen_bits_mask(0xFFFF);
return gen_bits_mask(0x13);
}
/*
generate a file attrib combination
*/
static uint32_t gen_attrib(void)
{
uint32_t ret;
if (gen_chance(20)) {
ret = gen_bits_mask(0xFFFFFFFF);
if (options.valid) ret &= FILE_ATTRIBUTE_ALL_MASK;
return ret;
}
return gen_bits_mask(FILE_ATTRIBUTE_NORMAL | FILE_ATTRIBUTE_DIRECTORY);
}
/*
generate a unix timestamp
*/
static time_t gen_timet(void)
{
if (gen_chance(30)) return 0;
return (time_t)random();
}
/*
generate a milliseconds protocol timeout
*/
static uint32_t gen_timeout(void)
{
if (gen_chance(98)) return 0;
return random() % 50;
}
/*
generate a timestamp
*/
static NTTIME gen_nttime(void)
{
NTTIME ret;
unix_to_nt_time(&ret, gen_timet());
return ret;
}
/*
generate a timewarp value
*/
static NTTIME gen_timewarp(void)
{
NTTIME ret = gen_nttime();
if (gen_chance(98)) ret = 0;
return ret;
}
/*
generate a file allocation size
*/
static unsigned int gen_alloc_size(void)
{
unsigned int ret;
if (gen_chance(30)) return 0;
ret = random() % 4*1024*1024;
/* give a high chance of a round number */
if (gen_chance(60)) {
ret &= ~(1024*1024 - 1);
}
return ret;
}
/*
generate an ea_struct
*/
static struct ea_struct gen_ea_struct(void)
{
struct ea_struct ea;
const char *names[] = {"EAONE",
"",
"FOO!",
" WITH SPACES ",
".",
"AVERYLONGATTRIBUTENAME"};
const char *values[] = {"VALUE1",
"",
"NOT MUCH FOO",
" LEADING SPACES ",
":",
"ASOMEWHATLONGERATTRIBUTEVALUE"};
int i;
ZERO_STRUCT(ea);
do {
i = gen_int_range(0, ARRAY_SIZE(names)-1);
} while (ignore_pattern(names[i]));
ea.name.s = names[i];
do {
i = gen_int_range(0, ARRAY_SIZE(values)-1);
} while (ignore_pattern(values[i]));
ea.value = data_blob(values[i], strlen(values[i]));
if (gen_chance(10)) ea.flags = gen_bits_mask(0xFF);
ea.flags = 0;
return ea;
}
/*
generate an ea_struct
*/
static struct smb_ea_list gen_ea_list(void)
{
struct smb_ea_list eas;
int i;
if (options.no_eas) {
ZERO_STRUCT(eas);
return eas;
}
eas.num_eas = gen_int_range(0, 3);
eas.eas = talloc_array(current_op.mem_ctx, struct ea_struct, eas.num_eas);
for (i=0;i<eas.num_eas;i++) {
eas.eas[i] = gen_ea_struct();
}
return eas;
}
/* generate a security descriptor */
static struct security_descriptor *gen_sec_desc(void)
{
struct security_descriptor *sd;
if (options.no_acls || gen_chance(90)) return NULL;
sd = security_descriptor_dacl_create(current_op.mem_ctx,
0, NULL, NULL,
NULL,
SEC_ACE_TYPE_ACCESS_ALLOWED,
SEC_FILE_WRITE_DATA | SEC_STD_WRITE_DAC,
SEC_ACE_FLAG_OBJECT_INHERIT,
SID_WORLD,
SEC_ACE_TYPE_ACCESS_ALLOWED,
SEC_FILE_ALL | SEC_STD_ALL,
0,
NULL);
return sd;
}
static void oplock_handler_close_recv_smb(struct smbcli_request *req)
{
NTSTATUS status;
status = smbcli_request_simple_recv(req);
if (!NT_STATUS_IS_OK(status)) {
printf("close failed in oplock_handler\n");
smb_panic("close failed in oplock_handler");
}
}
/*
the oplock handler will either ack the break or close the file
*/
static bool oplock_handler_smb(struct smbcli_transport *transport, uint16_t tid, uint16_t fnum, uint8_t level, void *private_data)
{
union smb_close io;
int i, j;
bool do_close;
struct smbcli_tree *tree = NULL;
struct smbcli_request *req;
srandom(current_op.seed);
do_close = gen_chance(50);
for (i=0;i<NSERVERS;i++) {
for (j=0;j<NINSTANCES;j++) {
if (transport == servers[i].smb_tree[j]->session->transport &&
tid == servers[i].smb_tree[j]->tid) {
oplocks[i][j].got_break = true;
oplocks[i][j].smb_handle = fnum;
oplocks[i][j].handle = fnum_to_handle_smb(i, j, fnum);
oplocks[i][j].level = level;
oplocks[i][j].do_close = do_close;
tree = servers[i].smb_tree[j];
}
}
}
if (!tree) {
printf("Oplock break not for one of our trees!?\n");
return false;
}
if (!do_close) {
printf("oplock ack fnum=%d\n", fnum);
return smbcli_oplock_ack(tree, fnum, level);
}
printf("oplock close fnum=%d\n", fnum);
io.close.level = RAW_CLOSE_CLOSE;
io.close.in.file.fnum = fnum;
io.close.in.write_time = 0;
req = smb_raw_close_send(tree, &io);
if (req == NULL) {
printf("WARNING: close failed in oplock_handler_close\n");
return false;
}
req->async.fn = oplock_handler_close_recv_smb;
req->async.private_data = NULL;
return true;
}
/*
the idle function tries to cope with getting an oplock break on a connection, and
an operation on another connection blocking until that break is acked
we check for operations on all transports in the idle function
*/
static void idle_func_smb(struct smbcli_transport *transport, void *private_data)
{
int i, j;
for (i=0;i<NSERVERS;i++) {
for (j=0;j<NINSTANCES;j++) {
if (servers[i].smb_tree[j] &&
transport != servers[i].smb_tree[j]->session->transport) {
smbcli_transport_process(servers[i].smb_tree[j]->session->transport);
}
}
}
}
static void oplock_handler_close_recv_smb2(struct smb2_request *req)
{
NTSTATUS status;
struct smb2_close io;
status = smb2_close_recv(req, &io);
if (!NT_STATUS_IS_OK(status)) {
printf("close failed in oplock_handler\n");
smb_panic("close failed in oplock_handler");
}
}
static void oplock_handler_ack_callback_smb2(struct smb2_request *req)
{
NTSTATUS status;
struct smb2_break br;
status = smb2_break_recv(req, &br);
if (!NT_STATUS_IS_OK(status)) {
printf("oplock break ack failed in oplock_handler\n");
smb_panic("oplock break ack failed in oplock_handler");
}
}
static bool send_oplock_ack_smb2(struct smb2_tree *tree, struct smb2_handle handle,
uint8_t level)
{
struct smb2_break br;
struct smb2_request *req;
ZERO_STRUCT(br);
br.in.file.handle = handle;
br.in.oplock_level = level;
br.in.reserved = gen_reserved8();
br.in.reserved2 = gen_reserved32();
req = smb2_break_send(tree, &br);
if (req == NULL) return false;
req->async.fn = oplock_handler_ack_callback_smb2;
req->async.private_data = NULL;
return true;
}
/*
the oplock handler will either ack the break or close the file
*/
static bool oplock_handler_smb2(struct smb2_transport *transport, const struct smb2_handle *handle,
uint8_t level, void *private_data)
{
struct smb2_close io;
unsigned i, j;
bool do_close;
struct smb2_tree *tree = NULL;
struct smb2_request *req;
srandom(current_op.seed);
do_close = gen_chance(50);
i = ((uintptr_t)private_data) >> 8;
j = ((uintptr_t)private_data) & 0xFF;
if (i >= NSERVERS || j >= NINSTANCES) {
printf("Bad private_data in oplock_handler\n");
return false;
}
oplocks[i][j].got_break = true;
oplocks[i][j].smb2_handle = *handle;
oplocks[i][j].handle = fnum_to_handle_smb2(i, j, *handle);
oplocks[i][j].level = level;
oplocks[i][j].do_close = do_close;
tree = talloc_get_type(servers[i].smb2_tree[j], struct smb2_tree);
if (!tree) {
printf("Oplock break not for one of our trees!?\n");
return false;
}
if (!do_close) {
printf("oplock ack handle=%d\n", oplocks[i][j].handle);
return send_oplock_ack_smb2(tree, *handle, level);
}
printf("oplock close fnum=%d\n", oplocks[i][j].handle);
ZERO_STRUCT(io);
io.in.file.handle = *handle;
io.in.flags = 0;
req = smb2_close_send(tree, &io);
if (req == NULL) {
printf("WARNING: close failed in oplock_handler_close\n");
return false;
}
req->async.fn = oplock_handler_close_recv_smb2;
req->async.private_data = NULL;
return true;
}
/*
the idle function tries to cope with getting an oplock break on a connection, and
an operation on another connection blocking until that break is acked
we check for operations on all transports in the idle function
*/
static void idle_func_smb2(struct smb2_transport *transport, void *private_data)
{
int i, j;
for (i=0;i<NSERVERS;i++) {
for (j=0;j<NINSTANCES;j++) {
if (servers[i].smb2_tree[j] &&
transport != servers[i].smb2_tree[j]->session->transport) {
// smb2_transport_process(servers[i].smb2_tree[j]->session->transport);
}
}
}
}
/*
compare NTSTATUS, using checking ignored patterns
*/
static bool compare_status(NTSTATUS status1, NTSTATUS status2)
{
char *s;
if (NT_STATUS_EQUAL(status1, status2)) return true;
/* one code being an error and the other OK is always an error */
if (NT_STATUS_IS_OK(status1) || NT_STATUS_IS_OK(status2)) {
current_op.mismatch = nt_errstr(status1);
return false;
}
/* if we are ignoring one of the status codes then consider this a match */
if (ignore_pattern(nt_errstr(status1)) ||
ignore_pattern(nt_errstr(status2))) {
return true;
}
/* also support ignore patterns of the form NT_STATUS_XX:NT_STATUS_YY
meaning that the first server returns NT_STATUS_XX and the 2nd
returns NT_STATUS_YY */
s = talloc_asprintf(current_op.mem_ctx, "%s:%s",
nt_errstr(status1),
nt_errstr(status2));
if (ignore_pattern(s)) {
return true;
}
current_op.mismatch = nt_errstr(status1);
return false;
}
/*
check for pending packets on all connections
*/
static void check_pending(void)
{
int i, j;
smb_msleep(20);
for (j=0;j<NINSTANCES;j++) {
for (i=0;i<NSERVERS;i++) {
// smb2_transport_process(servers[i].smb2_tree[j]->session->transport);
}
}
}
/*
check that the same oplock breaks have been received by all instances
*/
static bool check_oplocks(const char *call)
{
int i, j;
int tries = 0;
if (!options.use_oplocks || options.smb2) {
/* no smb2 oplocks in gentest yet */
return true;
}
again:
check_pending();
for (j=0;j<NINSTANCES;j++) {
for (i=1;i<NSERVERS;i++) {
if (oplocks[0][j].got_break != oplocks[i][j].got_break ||
oplocks[0][j].handle != oplocks[i][j].handle ||
oplocks[0][j].level != oplocks[i][j].level) {
if (tries++ < 10) goto again;
printf("oplock break inconsistent - %d/%d/%d vs %d/%d/%d\n",
oplocks[0][j].got_break,
oplocks[0][j].handle,
oplocks[0][j].level,
oplocks[i][j].got_break,
oplocks[i][j].handle,
oplocks[i][j].level);
current_op.mismatch = "oplock break";
return false;
}
}
}
/* if we got a break and closed then remove the handle */
for (j=0;j<NINSTANCES;j++) {
if (oplocks[0][j].got_break &&
oplocks[0][j].do_close) {
uint16_t fnums[NSERVERS];
for (i=0;i<NSERVERS;i++) {
fnums[i] = oplocks[i][j].smb_handle;
}
gen_remove_handle_smb(j, fnums);
break;
}
}
return true;
}
/*
check that the same change notify info has been received by all instances
*/
static bool check_notifies(const char *call)
{
int i, j;
int tries = 0;
if (options.smb2) {
/* no smb2 notifies in gentest yet */
return true;
}
again:
check_pending();
for (j=0;j<NINSTANCES;j++) {
for (i=1;i<NSERVERS;i++) {
int n;
union smb_notify not1, not2;
if (notifies[0][j].notify_count != notifies[i][j].notify_count) {
if (tries++ < 10) goto again;
printf("Notify count inconsistent %d %d\n",
notifies[0][j].notify_count,
notifies[i][j].notify_count);
current_op.mismatch = "notify count";
return false;
}
if (notifies[0][j].notify_count == 0) continue;
if (!NT_STATUS_EQUAL(notifies[0][j].status,
notifies[i][j].status)) {
printf("Notify status mismatch - %s - %s\n",
nt_errstr(notifies[0][j].status),
nt_errstr(notifies[i][j].status));
current_op.mismatch = "Notify status";
return false;
}
if (!NT_STATUS_IS_OK(notifies[0][j].status)) {
continue;
}
not1 = notifies[0][j].notify;
not2 = notifies[i][j].notify;
for (n=0;n<not1.nttrans.out.num_changes;n++) {
if (not1.nttrans.out.changes[n].action !=
not2.nttrans.out.changes[n].action) {
printf("Notify action %d inconsistent %d %d\n", n,
not1.nttrans.out.changes[n].action,
not2.nttrans.out.changes[n].action);
current_op.mismatch = "notify action";
return false;
}
if (strcmp(not1.nttrans.out.changes[n].name.s,
not2.nttrans.out.changes[n].name.s)) {
printf("Notify name %d inconsistent %s %s\n", n,
not1.nttrans.out.changes[n].name.s,
not2.nttrans.out.changes[n].name.s);
current_op.mismatch = "notify name";
return false;
}
if (not1.nttrans.out.changes[n].name.private_length !=
not2.nttrans.out.changes[n].name.private_length) {
printf("Notify name length %d inconsistent %d %d\n", n,
not1.nttrans.out.changes[n].name.private_length,
not2.nttrans.out.changes[n].name.private_length);
current_op.mismatch = "notify name length";
return false;
}
}
}
}
ZERO_STRUCT(notifies);
return true;
}
#define GEN_COPY_PARM do { \
int i; \
for (i=1;i<NSERVERS;i++) { \
parm[i] = parm[0]; \
} \
} while (0)
#define GEN_CALL(call, treetype, treefield) do { \
int i; \
ZERO_STRUCT(oplocks); \
ZERO_STRUCT(notifies); \
for (i=0;i<NSERVERS;i++) { \
struct treetype *tree = servers[i].treefield[instance]; \
status[i] = call; \
} \
current_op.status = status[0]; \
for (i=1;i<NSERVERS;i++) { \
if (!compare_status(status[0], status[1])) { \
printf("status different in %s - %s %s\n", #call, \
nt_errstr(status[0]), nt_errstr(status[i])); \
current_op.mismatch = nt_errstr(status[0]); \
return false; \
} \
} \
if (!check_oplocks(#call)) return false; \
if (!check_notifies(#call)) return false; \
if (!NT_STATUS_IS_OK(status[0])) { \
return true; \
} \
} while(0)
#define GEN_CALL_SMB(call) GEN_CALL(call, smbcli_tree, smb_tree)
#define GEN_CALL_SMB2(call) GEN_CALL(call, smb2_tree, smb2_tree)
#define ADD_HANDLE_SMB2(name, field) do { \
struct smb2_handle handles[NSERVERS]; \
int i; \
for (i=0;i<NSERVERS;i++) { \
handles[i] = parm[i].field; \
} \
gen_add_handle_smb2(instance, name, handles); \
} while(0)
#define REMOVE_HANDLE_SMB2(field) do { \
struct smb2_handle handles[NSERVERS]; \
int i; \
for (i=0;i<NSERVERS;i++) { \
handles[i] = parm[i].field; \
} \
gen_remove_handle_smb2(instance, handles); \
} while(0)
#define ADD_HANDLE_SMB(name, field) do { \
uint16_t handles[NSERVERS]; \
int i; \
for (i=0;i<NSERVERS;i++) { \
handles[i] = parm[i].field; \
} \
gen_add_handle_smb(instance, name, handles); \
} while(0)
#define REMOVE_HANDLE_SMB(field) do { \
uint16_t handles[NSERVERS]; \
int i; \
for (i=0;i<NSERVERS;i++) { \
handles[i] = parm[i].field; \
} \
gen_remove_handle_smb(instance, handles); \
} while(0)
#define GEN_SET_FNUM_SMB2(field) do { \
int i; \
for (i=0;i<NSERVERS;i++) { \
parm[i].field = gen_lookup_handle_smb2(i, parm[i].field.data[0]); \
} \
} while(0)
#define GEN_SET_FNUM_SMB(field) do { \
int i; \
for (i=0;i<NSERVERS;i++) { \
parm[i].field = gen_lookup_handle_smb(i, parm[i].field); \
} \
} while(0)
#define CHECK_EQUAL(field) do { \
if (parm[0].field != parm[1].field && !ignore_pattern(#field)) { \
current_op.mismatch = #field; \
printf("Mismatch in %s - 0x%llx 0x%llx\n", #field, \
(unsigned long long)parm[0].field, (unsigned long long)parm[1].field); \
return false; \
} \
} while(0)
#define CHECK_SECDESC(field) do { \
if (!security_acl_equal(parm[0].field->dacl, parm[1].field->dacl) && !ignore_pattern(#field)) { \
current_op.mismatch = #field; \
printf("Mismatch in %s\n", #field); \
return false; \
} \
} while(0)
#define CHECK_ATTRIB(field) do { \
if (!options.mask_indexing) { \
CHECK_EQUAL(field); \
} else if ((~FILE_ATTRIBUTE_NONINDEXED & parm[0].field) != (~FILE_ATTRIBUTE_NONINDEXED & parm[1].field) && !ignore_pattern(#field)) { \
current_op.mismatch = #field; \
printf("Mismatch in %s - 0x%x 0x%x\n", #field, \
(int)parm[0].field, (int)parm[1].field); \
return false; \
} \
} while(0)
#define CHECK_WSTR_EQUAL(field) do { \
if ((!parm[0].field.s && parm[1].field.s) || (parm[0].field.s && !parm[1].field.s)) { \
current_op.mismatch = #field; \
printf("%s is NULL!\n", #field); \
return false; \
} \
if (parm[0].field.s && strcmp(parm[0].field.s, parm[1].field.s) != 0 && !ignore_pattern(#field)) { \
current_op.mismatch = #field; \
printf("Mismatch in %s - %s %s\n", #field, \
parm[0].field.s, parm[1].field.s); \
return false; \
} \
CHECK_EQUAL(field.private_length); \
} while(0)
#define CHECK_BLOB_EQUAL(field) do { \
if (((parm[0].field.data == NULL && parm[1].field.data != NULL) || \
(parm[1].field.data == NULL && parm[0].field.data != NULL) || \
(memcmp(parm[0].field.data, parm[1].field.data, parm[0].field.length) != 0)) && !ignore_pattern(#field)) { \
current_op.mismatch = #field; \
printf("Mismatch in %s\n", #field); \
return false; \
} \
CHECK_EQUAL(field.length); \
} while(0)
#define CHECK_TIMES_EQUAL(field) do { \
if (labs(parm[0].field - parm[1].field) > time_skew() && \
!ignore_pattern(#field)) { \
current_op.mismatch = #field; \
printf("Mismatch in %s - 0x%x 0x%x\n", #field, \
(int)parm[0].field, (int)parm[1].field); \
return false; \
} \
} while(0)
#define CHECK_NTTIMES_EQUAL(field) do { \
if (labs(nt_time_to_unix(parm[0].field) - \
nt_time_to_unix(parm[1].field)) > time_skew() && \
!ignore_pattern(#field)) { \
current_op.mismatch = #field; \
printf("Mismatch in %s - 0x%x 0x%x\n", #field, \
(int)nt_time_to_unix(parm[0].field), \
(int)nt_time_to_unix(parm[1].field)); \
return false; \
} \
} while(0)
/*
compare returned fileinfo structures
*/
static bool cmp_fileinfo(int instance,
union smb_fileinfo parm[NSERVERS],
NTSTATUS status[NSERVERS])
{
int i;
enum smb_fileinfo_level level = parm[0].generic.level;
if (level == RAW_FILEINFO_ALL_INFORMATION &&
options.smb2) {
level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
}
switch (level) {
case RAW_FILEINFO_GENERIC:
return false;
case RAW_FILEINFO_GETATTR:
CHECK_ATTRIB(getattr.out.attrib);
CHECK_EQUAL(getattr.out.size);
CHECK_TIMES_EQUAL(getattr.out.write_time);
break;
case RAW_FILEINFO_GETATTRE:
CHECK_TIMES_EQUAL(getattre.out.create_time);
CHECK_TIMES_EQUAL(getattre.out.access_time);
CHECK_TIMES_EQUAL(getattre.out.write_time);
CHECK_EQUAL(getattre.out.size);
CHECK_EQUAL(getattre.out.alloc_size);
CHECK_ATTRIB(getattre.out.attrib);
break;
case RAW_FILEINFO_STANDARD:
CHECK_TIMES_EQUAL(standard.out.create_time);
CHECK_TIMES_EQUAL(standard.out.access_time);
CHECK_TIMES_EQUAL(standard.out.write_time);
CHECK_EQUAL(standard.out.size);
CHECK_EQUAL(standard.out.alloc_size);
CHECK_ATTRIB(standard.out.attrib);
break;
case RAW_FILEINFO_EA_SIZE:
CHECK_TIMES_EQUAL(ea_size.out.create_time);
CHECK_TIMES_EQUAL(ea_size.out.access_time);
CHECK_TIMES_EQUAL(ea_size.out.write_time);
CHECK_EQUAL(ea_size.out.size);
CHECK_EQUAL(ea_size.out.alloc_size);
CHECK_ATTRIB(ea_size.out.attrib);
CHECK_EQUAL(ea_size.out.ea_size);
break;
case RAW_FILEINFO_ALL_EAS:
CHECK_EQUAL(all_eas.out.num_eas);
for (i=0;i<parm[0].all_eas.out.num_eas;i++) {
CHECK_EQUAL(all_eas.out.eas[i].flags);
CHECK_WSTR_EQUAL(all_eas.out.eas[i].name);
CHECK_BLOB_EQUAL(all_eas.out.eas[i].value);
}
break;
case RAW_FILEINFO_IS_NAME_VALID:
break;
case RAW_FILEINFO_BASIC_INFO:
case RAW_FILEINFO_BASIC_INFORMATION:
CHECK_NTTIMES_EQUAL(basic_info.out.create_time);
CHECK_NTTIMES_EQUAL(basic_info.out.access_time);
CHECK_NTTIMES_EQUAL(basic_info.out.write_time);
CHECK_NTTIMES_EQUAL(basic_info.out.change_time);
CHECK_ATTRIB(basic_info.out.attrib);
break;
case RAW_FILEINFO_STANDARD_INFO:
case RAW_FILEINFO_STANDARD_INFORMATION:
CHECK_EQUAL(standard_info.out.alloc_size);
CHECK_EQUAL(standard_info.out.size);
CHECK_EQUAL(standard_info.out.nlink);
CHECK_EQUAL(standard_info.out.delete_pending);
CHECK_EQUAL(standard_info.out.directory);
break;
case RAW_FILEINFO_EA_INFO:
case RAW_FILEINFO_EA_INFORMATION:
CHECK_EQUAL(ea_info.out.ea_size);
break;
case RAW_FILEINFO_NAME_INFO:
case RAW_FILEINFO_NAME_INFORMATION:
CHECK_WSTR_EQUAL(name_info.out.fname);
break;
case RAW_FILEINFO_ALL_INFO:
case RAW_FILEINFO_ALL_INFORMATION:
CHECK_NTTIMES_EQUAL(all_info.out.create_time);
CHECK_NTTIMES_EQUAL(all_info.out.access_time);
CHECK_NTTIMES_EQUAL(all_info.out.write_time);
CHECK_NTTIMES_EQUAL(all_info.out.change_time);
CHECK_ATTRIB(all_info.out.attrib);
CHECK_EQUAL(all_info.out.alloc_size);
CHECK_EQUAL(all_info.out.size);
CHECK_EQUAL(all_info.out.nlink);
CHECK_EQUAL(all_info.out.delete_pending);
CHECK_EQUAL(all_info.out.directory);
CHECK_EQUAL(all_info.out.ea_size);
CHECK_WSTR_EQUAL(all_info.out.fname);
break;
case RAW_FILEINFO_ALT_NAME_INFO:
case RAW_FILEINFO_ALT_NAME_INFORMATION:
CHECK_WSTR_EQUAL(alt_name_info.out.fname);
break;
case RAW_FILEINFO_STREAM_INFO:
case RAW_FILEINFO_STREAM_INFORMATION:
CHECK_EQUAL(stream_info.out.num_streams);
for (i=0;i<parm[0].stream_info.out.num_streams;i++) {
CHECK_EQUAL(stream_info.out.streams[i].size);
CHECK_EQUAL(stream_info.out.streams[i].alloc_size);
CHECK_WSTR_EQUAL(stream_info.out.streams[i].stream_name);
}
break;
case RAW_FILEINFO_COMPRESSION_INFO:
case RAW_FILEINFO_COMPRESSION_INFORMATION:
CHECK_EQUAL(compression_info.out.compressed_size);
CHECK_EQUAL(compression_info.out.format);
CHECK_EQUAL(compression_info.out.unit_shift);
CHECK_EQUAL(compression_info.out.chunk_shift);
CHECK_EQUAL(compression_info.out.cluster_shift);
break;
case RAW_FILEINFO_INTERNAL_INFORMATION:
CHECK_EQUAL(internal_information.out.file_id);
break;
case RAW_FILEINFO_ACCESS_INFORMATION:
CHECK_EQUAL(access_information.out.access_flags);
break;
case RAW_FILEINFO_POSITION_INFORMATION:
CHECK_EQUAL(position_information.out.position);
break;
case RAW_FILEINFO_MODE_INFORMATION:
CHECK_EQUAL(mode_information.out.mode);
break;
case RAW_FILEINFO_ALIGNMENT_INFORMATION:
CHECK_EQUAL(alignment_information.out.alignment_requirement);
break;
case RAW_FILEINFO_NETWORK_OPEN_INFORMATION:
CHECK_NTTIMES_EQUAL(network_open_information.out.create_time);
CHECK_NTTIMES_EQUAL(network_open_information.out.access_time);
CHECK_NTTIMES_EQUAL(network_open_information.out.write_time);
CHECK_NTTIMES_EQUAL(network_open_information.out.change_time);
CHECK_EQUAL(network_open_information.out.alloc_size);
CHECK_EQUAL(network_open_information.out.size);
CHECK_ATTRIB(network_open_information.out.attrib);
break;
case RAW_FILEINFO_ATTRIBUTE_TAG_INFORMATION:
CHECK_ATTRIB(attribute_tag_information.out.attrib);
CHECK_EQUAL(attribute_tag_information.out.reparse_tag);
break;
case RAW_FILEINFO_SMB2_ALL_INFORMATION:
CHECK_NTTIMES_EQUAL(all_info2.out.create_time);
CHECK_NTTIMES_EQUAL(all_info2.out.access_time);
CHECK_NTTIMES_EQUAL(all_info2.out.write_time);
CHECK_NTTIMES_EQUAL(all_info2.out.change_time);
CHECK_ATTRIB(all_info2.out.attrib);
CHECK_EQUAL(all_info2.out.unknown1);
CHECK_EQUAL(all_info2.out.alloc_size);
CHECK_EQUAL(all_info2.out.size);
CHECK_EQUAL(all_info2.out.nlink);
CHECK_EQUAL(all_info2.out.delete_pending);
CHECK_EQUAL(all_info2.out.directory);
CHECK_EQUAL(all_info2.out.file_id);
CHECK_EQUAL(all_info2.out.ea_size);
CHECK_EQUAL(all_info2.out.access_mask);
CHECK_EQUAL(all_info2.out.position);
CHECK_EQUAL(all_info2.out.mode);
CHECK_EQUAL(all_info2.out.alignment_requirement);
CHECK_WSTR_EQUAL(all_info2.out.fname);
break;
case RAW_FILEINFO_SMB2_ALL_EAS:
CHECK_EQUAL(all_eas.out.num_eas);
for (i=0;i<parm[0].all_eas.out.num_eas;i++) {
CHECK_EQUAL(all_eas.out.eas[i].flags);
CHECK_WSTR_EQUAL(all_eas.out.eas[i].name);
CHECK_BLOB_EQUAL(all_eas.out.eas[i].value);
}
break;
case RAW_FILEINFO_SEC_DESC:
CHECK_SECDESC(query_secdesc.out.sd);
break;
/* Unhandled levels */
case RAW_FILEINFO_EA_LIST:
case RAW_FILEINFO_UNIX_BASIC:
case RAW_FILEINFO_UNIX_LINK:
case RAW_FILEINFO_UNIX_INFO2:
break;
}
return true;
}
/*
generate openx operations
*/
static bool handler_smb_openx(int instance)
{
union smb_open parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].openx.level = RAW_OPEN_OPENX;
parm[0].openx.in.flags = gen_openx_flags();
parm[0].openx.in.open_mode = gen_openx_mode();
parm[0].openx.in.search_attrs = gen_attrib();
parm[0].openx.in.file_attrs = gen_attrib();
parm[0].openx.in.write_time = gen_timet();
parm[0].openx.in.open_func = gen_openx_func();
parm[0].openx.in.size = gen_io_count();
parm[0].openx.in.timeout = gen_timeout();
parm[0].openx.in.fname = gen_fname_open(instance);
if (!options.use_oplocks) {
/* mask out oplocks */
parm[0].openx.in.flags &= ~(OPENX_FLAGS_REQUEST_OPLOCK|
OPENX_FLAGS_REQUEST_BATCH_OPLOCK);
}
GEN_COPY_PARM;
GEN_CALL_SMB(smb_raw_open(tree, current_op.mem_ctx, &parm[i]));
CHECK_ATTRIB(openx.out.attrib);
CHECK_EQUAL(openx.out.size);
CHECK_EQUAL(openx.out.access);
CHECK_EQUAL(openx.out.ftype);
CHECK_EQUAL(openx.out.devstate);
CHECK_EQUAL(openx.out.action);
CHECK_EQUAL(openx.out.access_mask);
CHECK_EQUAL(openx.out.unknown);
CHECK_TIMES_EQUAL(openx.out.write_time);
/* open creates a new file handle */
ADD_HANDLE_SMB(parm[0].openx.in.fname, openx.out.file.fnum);
return true;
}
/*
generate open operations
*/
static bool handler_smb_open(int instance)
{
union smb_open parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].openold.level = RAW_OPEN_OPEN;
parm[0].openold.in.open_mode = gen_bits_mask2(0xF, 0xFFFF);
parm[0].openold.in.search_attrs = gen_attrib();
parm[0].openold.in.fname = gen_fname_open(instance);
if (!options.use_oplocks) {
/* mask out oplocks */
parm[0].openold.in.open_mode &= ~(OPENX_FLAGS_REQUEST_OPLOCK|
OPENX_FLAGS_REQUEST_BATCH_OPLOCK);
}
GEN_COPY_PARM;
GEN_CALL_SMB(smb_raw_open(tree, current_op.mem_ctx, &parm[i]));
CHECK_ATTRIB(openold.out.attrib);
CHECK_TIMES_EQUAL(openold.out.write_time);
CHECK_EQUAL(openold.out.size);
CHECK_EQUAL(openold.out.rmode);
/* open creates a new file handle */
ADD_HANDLE_SMB(parm[0].openold.in.fname, openold.out.file.fnum);
return true;
}
/*
generate ntcreatex operations
*/
static bool handler_smb_ntcreatex(int instance)
{
union smb_open parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].ntcreatex.level = RAW_OPEN_NTCREATEX;
parm[0].ntcreatex.in.flags = gen_ntcreatex_flags();
parm[0].ntcreatex.in.root_fid.fnum = gen_root_fid(instance);
parm[0].ntcreatex.in.access_mask = gen_access_mask();
parm[0].ntcreatex.in.alloc_size = gen_alloc_size();
parm[0].ntcreatex.in.file_attr = gen_attrib();
parm[0].ntcreatex.in.share_access = gen_bits_mask2(0x7, 0xFFFFFFFF);
parm[0].ntcreatex.in.open_disposition = gen_open_disp();
parm[0].ntcreatex.in.create_options = gen_create_options();
parm[0].ntcreatex.in.impersonation = gen_bits_mask2(0, 0xFFFFFFFF);
parm[0].ntcreatex.in.security_flags = gen_bits_mask2(0, 0xFF);
parm[0].ntcreatex.in.fname = gen_fname_open(instance);
if (!options.use_oplocks) {
/* mask out oplocks */
parm[0].ntcreatex.in.flags &= ~(NTCREATEX_FLAGS_REQUEST_OPLOCK|
NTCREATEX_FLAGS_REQUEST_BATCH_OPLOCK);
}
GEN_COPY_PARM;
if (parm[0].ntcreatex.in.root_fid.fnum != 0) {
GEN_SET_FNUM_SMB(ntcreatex.in.root_fid.fnum);
}
GEN_CALL_SMB(smb_raw_open(tree, current_op.mem_ctx, &parm[i]));
CHECK_EQUAL(ntcreatex.out.oplock_level);
CHECK_EQUAL(ntcreatex.out.create_action);
CHECK_NTTIMES_EQUAL(ntcreatex.out.create_time);
CHECK_NTTIMES_EQUAL(ntcreatex.out.access_time);
CHECK_NTTIMES_EQUAL(ntcreatex.out.write_time);
CHECK_NTTIMES_EQUAL(ntcreatex.out.change_time);
CHECK_ATTRIB(ntcreatex.out.attrib);
CHECK_EQUAL(ntcreatex.out.alloc_size);
CHECK_EQUAL(ntcreatex.out.size);
CHECK_EQUAL(ntcreatex.out.file_type);
CHECK_EQUAL(ntcreatex.out.ipc_state);
CHECK_EQUAL(ntcreatex.out.is_directory);
/* ntcreatex creates a new file handle */
ADD_HANDLE_SMB(parm[0].ntcreatex.in.fname, ntcreatex.out.file.fnum);
return true;
}
/*
generate close operations
*/
static bool handler_smb_close(int instance)
{
union smb_close parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].close.level = RAW_CLOSE_CLOSE;
parm[0].close.in.file.fnum = gen_fnum_close(instance);
parm[0].close.in.write_time = gen_timet();
GEN_COPY_PARM;
GEN_SET_FNUM_SMB(close.in.file.fnum);
GEN_CALL_SMB(smb_raw_close(tree, &parm[i]));
REMOVE_HANDLE_SMB(close.in.file.fnum);
return true;
}
/*
generate unlink operations
*/
static bool handler_smb_unlink(int instance)
{
union smb_unlink parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].unlink.in.pattern = gen_pattern();
parm[0].unlink.in.attrib = gen_attrib();
GEN_COPY_PARM;
GEN_CALL_SMB(smb_raw_unlink(tree, &parm[i]));
return true;
}
/*
generate chkpath operations
*/
static bool handler_smb_chkpath(int instance)
{
union smb_chkpath parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].chkpath.in.path = gen_fname_open(instance);
GEN_COPY_PARM;
GEN_CALL_SMB(smb_raw_chkpath(tree, &parm[i]));
return true;
}
/*
generate mkdir operations
*/
static bool handler_smb_mkdir(int instance)
{
union smb_mkdir parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].mkdir.level = RAW_MKDIR_MKDIR;
parm[0].mkdir.in.path = gen_fname_open(instance);
GEN_COPY_PARM;
GEN_CALL_SMB(smb_raw_mkdir(tree, &parm[i]));
return true;
}
/*
generate rmdir operations
*/
static bool handler_smb_rmdir(int instance)
{
struct smb_rmdir parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].in.path = gen_fname_open(instance);
GEN_COPY_PARM;
GEN_CALL_SMB(smb_raw_rmdir(tree, &parm[i]));
return true;
}
/*
generate rename operations
*/
static bool handler_smb_rename(int instance)
{
union smb_rename parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].generic.level = RAW_RENAME_RENAME;
parm[0].rename.in.pattern1 = gen_pattern();
parm[0].rename.in.pattern2 = gen_pattern();
parm[0].rename.in.attrib = gen_attrib();
GEN_COPY_PARM;
GEN_CALL_SMB(smb_raw_rename(tree, &parm[i]));
return true;
}
/*
generate ntrename operations
*/
static bool handler_smb_ntrename(int instance)
{
union smb_rename parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].generic.level = RAW_RENAME_NTRENAME;
parm[0].ntrename.in.old_name = gen_fname();
parm[0].ntrename.in.new_name = gen_fname();
parm[0].ntrename.in.attrib = gen_attrib();
parm[0].ntrename.in.cluster_size = gen_bits_mask2(0, 0xFFFFFFF);
parm[0].ntrename.in.flags = gen_rename_flags();
GEN_COPY_PARM;
GEN_CALL_SMB(smb_raw_rename(tree, &parm[i]));
return true;
}
/*
generate seek operations
*/
static bool handler_smb_seek(int instance)
{
union smb_seek parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].lseek.in.file.fnum = gen_fnum(instance);
parm[0].lseek.in.mode = gen_bits_mask2(0x3, 0xFFFF);
parm[0].lseek.in.offset = gen_offset();
GEN_COPY_PARM;
GEN_SET_FNUM_SMB(lseek.in.file.fnum);
GEN_CALL_SMB(smb_raw_seek(tree, &parm[i]));
CHECK_EQUAL(lseek.out.offset);
return true;
}
/*
generate readx operations
*/
static bool handler_smb_readx(int instance)
{
union smb_read parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].readx.level = RAW_READ_READX;
parm[0].readx.in.file.fnum = gen_fnum(instance);
parm[0].readx.in.offset = gen_offset();
parm[0].readx.in.mincnt = gen_io_count();
parm[0].readx.in.maxcnt = gen_io_count();
parm[0].readx.in.remaining = gen_io_count();
parm[0].readx.in.read_for_execute = gen_bool();
parm[0].readx.out.data = talloc_array(current_op.mem_ctx, uint8_t,
MAX(parm[0].readx.in.mincnt, parm[0].readx.in.maxcnt));
GEN_COPY_PARM;
GEN_SET_FNUM_SMB(readx.in.file.fnum);
GEN_CALL_SMB(smb_raw_read(tree, &parm[i]));
CHECK_EQUAL(readx.out.remaining);
CHECK_EQUAL(readx.out.compaction_mode);
CHECK_EQUAL(readx.out.nread);
return true;
}
/*
generate writex operations
*/
static bool handler_smb_writex(int instance)
{
union smb_write parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].writex.level = RAW_WRITE_WRITEX;
parm[0].writex.in.file.fnum = gen_fnum(instance);
parm[0].writex.in.offset = gen_offset();
parm[0].writex.in.wmode = gen_bits_mask(0xFFFF);
parm[0].writex.in.remaining = gen_io_count();
parm[0].writex.in.count = gen_io_count();
parm[0].writex.in.data = talloc_zero_array(current_op.mem_ctx, uint8_t, parm[0].writex.in.count);
GEN_COPY_PARM;
GEN_SET_FNUM_SMB(writex.in.file.fnum);
GEN_CALL_SMB(smb_raw_write(tree, &parm[i]));
CHECK_EQUAL(writex.out.nwritten);
CHECK_EQUAL(writex.out.remaining);
return true;
}
/*
generate lockingx operations
*/
static bool handler_smb_lockingx(int instance)
{
union smb_lock parm[NSERVERS];
NTSTATUS status[NSERVERS];
int n, nlocks;
parm[0].lockx.level = RAW_LOCK_LOCKX;
parm[0].lockx.in.file.fnum = gen_fnum(instance);
parm[0].lockx.in.mode = gen_lock_mode();
parm[0].lockx.in.timeout = gen_timeout();
do {
/* make sure we don't accidentially generate an oplock
break ack - otherwise the server can just block forever */
parm[0].lockx.in.ulock_cnt = gen_lock_count();
parm[0].lockx.in.lock_cnt = gen_lock_count();
nlocks = parm[0].lockx.in.ulock_cnt + parm[0].lockx.in.lock_cnt;
} while (nlocks == 0);
if (nlocks > 0) {
parm[0].lockx.in.locks = talloc_array(current_op.mem_ctx,
struct smb_lock_entry,
nlocks);
for (n=0;n<nlocks;n++) {
parm[0].lockx.in.locks[n].pid = gen_pid();
parm[0].lockx.in.locks[n].offset = gen_offset();
parm[0].lockx.in.locks[n].count = gen_io_count();
}
}
GEN_COPY_PARM;
GEN_SET_FNUM_SMB(lockx.in.file.fnum);
GEN_CALL_SMB(smb_raw_lock(tree, &parm[i]));
return true;
}
#if 0
/*
generate a fileinfo query structure
*/
static void gen_setfileinfo(int instance, union smb_setfileinfo *info)
{
int i;
#undef LVL
#define LVL(v) {RAW_SFILEINFO_ ## v, "RAW_SFILEINFO_" #v}
struct {
enum smb_setfileinfo_level level;
const char *name;
} levels[] = {
#if 0
/* disabled until win2003 can handle them ... */
LVL(EA_SET), LVL(BASIC_INFO), LVL(DISPOSITION_INFO),
LVL(STANDARD), LVL(ALLOCATION_INFO), LVL(END_OF_FILE_INFO),
#endif
LVL(SETATTR), LVL(SETATTRE), LVL(BASIC_INFORMATION),
LVL(RENAME_INFORMATION), LVL(DISPOSITION_INFORMATION),
LVL(POSITION_INFORMATION), LVL(MODE_INFORMATION),
LVL(ALLOCATION_INFORMATION), LVL(END_OF_FILE_INFORMATION),
LVL(1023), LVL(1025), LVL(1029), LVL(1032), LVL(1039), LVL(1040)
};
do {
i = gen_int_range(0, ARRAY_SIZE(levels)-1);
} while (ignore_pattern(levels[i].name));
info->generic.level = levels[i].level;
switch (info->generic.level) {
case RAW_SFILEINFO_SETATTR:
info->setattr.in.attrib = gen_attrib();
info->setattr.in.write_time = gen_timet();
break;
case RAW_SFILEINFO_SETATTRE:
info->setattre.in.create_time = gen_timet();
info->setattre.in.access_time = gen_timet();
info->setattre.in.write_time = gen_timet();
break;
case RAW_SFILEINFO_STANDARD:
info->standard.in.create_time = gen_timet();
info->standard.in.access_time = gen_timet();
info->standard.in.write_time = gen_timet();
break;
case RAW_SFILEINFO_EA_SET: {
static struct ea_struct ea;
info->ea_set.in.num_eas = 1;
info->ea_set.in.eas = &ea;
info->ea_set.in.eas[0] = gen_ea_struct();
}
break;
case RAW_SFILEINFO_BASIC_INFO:
case RAW_SFILEINFO_BASIC_INFORMATION:
info->basic_info.in.create_time = gen_nttime();
info->basic_info.in.access_time = gen_nttime();
info->basic_info.in.write_time = gen_nttime();
info->basic_info.in.change_time = gen_nttime();
info->basic_info.in.attrib = gen_attrib();
break;
case RAW_SFILEINFO_DISPOSITION_INFO:
case RAW_SFILEINFO_DISPOSITION_INFORMATION:
info->disposition_info.in.delete_on_close = gen_bool();
break;
case RAW_SFILEINFO_ALLOCATION_INFO:
case RAW_SFILEINFO_ALLOCATION_INFORMATION:
info->allocation_info.in.alloc_size = gen_alloc_size();
break;
case RAW_SFILEINFO_END_OF_FILE_INFO:
case RAW_SFILEINFO_END_OF_FILE_INFORMATION:
info->end_of_file_info.in.size = gen_offset();
break;
case RAW_SFILEINFO_RENAME_INFORMATION:
case RAW_SFILEINFO_RENAME_INFORMATION_SMB2:
info->rename_information.in.overwrite = gen_bool();
info->rename_information.in.root_fid = gen_root_fid(instance);
info->rename_information.in.new_name = gen_fname_open(instance);
break;
case RAW_SFILEINFO_POSITION_INFORMATION:
info->position_information.in.position = gen_offset();
break;
case RAW_SFILEINFO_MODE_INFORMATION:
info->mode_information.in.mode = gen_bits_mask(0xFFFFFFFF);
break;
case RAW_SFILEINFO_FULL_EA_INFORMATION:
info->full_ea_information.in.eas = gen_ea_list();
break;
case RAW_SFILEINFO_GENERIC:
case RAW_SFILEINFO_SEC_DESC:
case RAW_SFILEINFO_UNIX_BASIC:
case RAW_SFILEINFO_UNIX_LINK:
case RAW_SFILEINFO_UNIX_HLINK:
case RAW_SFILEINFO_1023:
case RAW_SFILEINFO_1025:
case RAW_SFILEINFO_1029:
case RAW_SFILEINFO_1032:
case RAW_SFILEINFO_1039:
case RAW_SFILEINFO_1040:
case RAW_SFILEINFO_UNIX_INFO2:
/* Untested */
break;
}
}
#endif
/*
generate a fileinfo query structure
*/
static void gen_setfileinfo(int instance, union smb_setfileinfo *info)
{
int i;
#undef LVL
#define LVL(v) {RAW_SFILEINFO_ ## v, "RAW_SFILEINFO_" #v}
struct levels {
enum smb_setfileinfo_level level;
const char *name;
};
struct levels smb_levels[] = {
LVL(EA_SET), LVL(BASIC_INFO), LVL(DISPOSITION_INFO),
LVL(STANDARD), LVL(ALLOCATION_INFO), LVL(END_OF_FILE_INFO),
LVL(SETATTR), LVL(SETATTRE), LVL(BASIC_INFORMATION),
LVL(RENAME_INFORMATION), LVL(DISPOSITION_INFORMATION),
LVL(POSITION_INFORMATION), LVL(FULL_EA_INFORMATION), LVL(MODE_INFORMATION),
LVL(ALLOCATION_INFORMATION), LVL(END_OF_FILE_INFORMATION),
LVL(PIPE_INFORMATION), LVL(VALID_DATA_INFORMATION), LVL(SHORT_NAME_INFORMATION),
LVL(1025), LVL(1027), LVL(1029), LVL(1030), LVL(1031), LVL(1032), LVL(1036),
LVL(1041), LVL(1042), LVL(1043), LVL(1044),
};
struct levels smb2_levels[] = {
LVL(BASIC_INFORMATION),
LVL(RENAME_INFORMATION), LVL(DISPOSITION_INFORMATION),
LVL(POSITION_INFORMATION), LVL(FULL_EA_INFORMATION), LVL(MODE_INFORMATION),
LVL(ALLOCATION_INFORMATION), LVL(END_OF_FILE_INFORMATION),
LVL(PIPE_INFORMATION), LVL(VALID_DATA_INFORMATION), LVL(SHORT_NAME_INFORMATION),
LVL(1025), LVL(1027), LVL(1029), LVL(1030), LVL(1031), LVL(1032), LVL(1036),
LVL(1041), LVL(1042), LVL(1043), LVL(1044),
};
struct levels *levels = options.smb2?smb2_levels:smb_levels;
uint32_t num_levels = options.smb2?ARRAY_SIZE(smb2_levels):ARRAY_SIZE(smb_levels);
do {
i = gen_int_range(0, num_levels-1);
} while (ignore_pattern(levels[i].name));
ZERO_STRUCTP(info);
info->generic.level = levels[i].level;
switch (info->generic.level) {
case RAW_SFILEINFO_SETATTR:
info->setattr.in.attrib = gen_attrib();
info->setattr.in.write_time = gen_timet();
break;
case RAW_SFILEINFO_SETATTRE:
info->setattre.in.create_time = gen_timet();
info->setattre.in.access_time = gen_timet();
info->setattre.in.write_time = gen_timet();
break;
case RAW_SFILEINFO_STANDARD:
info->standard.in.create_time = gen_timet();
info->standard.in.access_time = gen_timet();
info->standard.in.write_time = gen_timet();
break;
case RAW_SFILEINFO_EA_SET: {
static struct ea_struct ea;
info->ea_set.in.num_eas = 1;
info->ea_set.in.eas = &ea;
info->ea_set.in.eas[0] = gen_ea_struct();
break;
}
case RAW_SFILEINFO_BASIC_INFO:
case RAW_SFILEINFO_BASIC_INFORMATION:
info->basic_info.in.create_time = gen_nttime();
info->basic_info.in.access_time = gen_nttime();
info->basic_info.in.write_time = gen_nttime();
info->basic_info.in.change_time = gen_nttime();
info->basic_info.in.attrib = gen_attrib();
break;
case RAW_SFILEINFO_DISPOSITION_INFO:
case RAW_SFILEINFO_DISPOSITION_INFORMATION:
info->disposition_info.in.delete_on_close = gen_bool();
break;
case RAW_SFILEINFO_ALLOCATION_INFO:
case RAW_SFILEINFO_ALLOCATION_INFORMATION:
info->allocation_info.in.alloc_size = gen_alloc_size();
break;
case RAW_SFILEINFO_END_OF_FILE_INFO:
case RAW_SFILEINFO_END_OF_FILE_INFORMATION:
info->end_of_file_info.in.size = gen_offset();
break;
case RAW_SFILEINFO_RENAME_INFORMATION:
case RAW_SFILEINFO_RENAME_INFORMATION_SMB2:
info->rename_information.in.overwrite = gen_bool();
info->rename_information.in.root_fid = gen_root_fid(instance);
info->rename_information.in.new_name = gen_fname_open(instance);
break;
case RAW_SFILEINFO_POSITION_INFORMATION:
info->position_information.in.position = gen_offset();
break;
case RAW_SFILEINFO_MODE_INFORMATION:
info->mode_information.in.mode = gen_bits_mask(0xFFFFFFFF);
break;
case RAW_SFILEINFO_FULL_EA_INFORMATION:
info->full_ea_information.in.eas = gen_ea_list();
break;
case RAW_SFILEINFO_GENERIC:
case RAW_SFILEINFO_SEC_DESC:
case RAW_SFILEINFO_1025:
case RAW_SFILEINFO_1029:
case RAW_SFILEINFO_1032:
case RAW_SFILEINFO_UNIX_BASIC:
case RAW_SFILEINFO_UNIX_INFO2:
case RAW_SFILEINFO_UNIX_LINK:
case RAW_SFILEINFO_UNIX_HLINK:
/* Untested */
break;
}
}
/*
generate a fileinfo query structure
*/
static void gen_fileinfo_smb(int instance, union smb_fileinfo *info)
{
int i;
#undef LVL
#define LVL(v) {RAW_FILEINFO_ ## v, "RAW_FILEINFO_" #v}
struct {
enum smb_fileinfo_level level;
const char *name;
} levels[] = {
LVL(GETATTR), LVL(GETATTRE), LVL(STANDARD),
LVL(EA_SIZE), LVL(ALL_EAS), LVL(IS_NAME_VALID),
LVL(BASIC_INFO), LVL(STANDARD_INFO), LVL(EA_INFO),
LVL(NAME_INFO), LVL(ALL_INFO), LVL(ALT_NAME_INFO),
LVL(STREAM_INFO), LVL(COMPRESSION_INFO), LVL(BASIC_INFORMATION),
LVL(STANDARD_INFORMATION), LVL(INTERNAL_INFORMATION), LVL(EA_INFORMATION),
LVL(ACCESS_INFORMATION), LVL(NAME_INFORMATION), LVL(POSITION_INFORMATION),
LVL(MODE_INFORMATION), LVL(ALIGNMENT_INFORMATION), LVL(ALL_INFORMATION),
LVL(ALT_NAME_INFORMATION), LVL(STREAM_INFORMATION), LVL(COMPRESSION_INFORMATION),
LVL(NETWORK_OPEN_INFORMATION), LVL(ATTRIBUTE_TAG_INFORMATION)
};
do {
i = gen_int_range(0, ARRAY_SIZE(levels)-1);
} while (ignore_pattern(levels[i].name));
info->generic.level = levels[i].level;
}
/*
generate qpathinfo operations
*/
static bool handler_smb_qpathinfo(int instance)
{
union smb_fileinfo parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].generic.in.file.path = gen_fname_open(instance);
gen_fileinfo_smb(instance, &parm[0]);
GEN_COPY_PARM;
GEN_CALL_SMB(smb_raw_pathinfo(tree, current_op.mem_ctx, &parm[i]));
return cmp_fileinfo(instance, parm, status);
}
/*
generate qfileinfo operations
*/
static bool handler_smb_qfileinfo(int instance)
{
union smb_fileinfo parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].generic.in.file.fnum = gen_fnum(instance);
gen_fileinfo_smb(instance, &parm[0]);
GEN_COPY_PARM;
GEN_SET_FNUM_SMB(generic.in.file.fnum);
GEN_CALL_SMB(smb_raw_fileinfo(tree, current_op.mem_ctx, &parm[i]));
return cmp_fileinfo(instance, parm, status);
}
/*
generate setpathinfo operations
*/
static bool handler_smb_spathinfo(int instance)
{
union smb_setfileinfo parm[NSERVERS];
NTSTATUS status[NSERVERS];
gen_setfileinfo(instance, &parm[0]);
parm[0].generic.in.file.path = gen_fname_open(instance);
GEN_COPY_PARM;
/* a special case for the fid in a RENAME */
if (parm[0].generic.level == RAW_SFILEINFO_RENAME_INFORMATION &&
parm[0].rename_information.in.root_fid != 0) {
GEN_SET_FNUM_SMB(rename_information.in.root_fid);
}
GEN_CALL_SMB(smb_raw_setpathinfo(tree, &parm[i]));
return true;
}
/*
generate setfileinfo operations
*/
static bool handler_smb_sfileinfo(int instance)
{
union smb_setfileinfo parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].generic.in.file.fnum = gen_fnum(instance);
gen_setfileinfo(instance, &parm[0]);
GEN_COPY_PARM;
GEN_SET_FNUM_SMB(generic.in.file.fnum);
GEN_CALL_SMB(smb_raw_setfileinfo(tree, &parm[i]));
return true;
}
/*
this is called when a change notify reply comes in
*/
static void async_notify_smb(struct smbcli_request *req)
{
union smb_notify notify;
NTSTATUS status;
int i, j;
uint16_t tid;
struct smbcli_transport *transport = req->transport;
tid = SVAL(req->in.hdr, HDR_TID);
notify.nttrans.level = RAW_NOTIFY_NTTRANS;
status = smb_raw_changenotify_recv(req, current_op.mem_ctx, &notify);
if (NT_STATUS_IS_OK(status) && notify.nttrans.out.num_changes > 0) {
printf("notify tid=%d num_changes=%d action=%d name=%s\n",
tid,
notify.nttrans.out.num_changes,
notify.nttrans.out.changes[0].action,
notify.nttrans.out.changes[0].name.s);
}
for (i=0;i<NSERVERS;i++) {
for (j=0;j<NINSTANCES;j++) {
if (transport == servers[i].smb_tree[j]->session->transport &&
tid == servers[i].smb_tree[j]->tid) {
notifies[i][j].notify_count++;
notifies[i][j].status = status;
notifies[i][j].notify = notify;
}
}
}
}
/*
generate change notify operations
*/
static bool handler_smb_notify(int instance)
{
union smb_notify parm[NSERVERS];
int n;
ZERO_STRUCT(parm[0]);
parm[0].nttrans.level = RAW_NOTIFY_NTTRANS;
parm[0].nttrans.in.buffer_size = gen_io_count();
parm[0].nttrans.in.completion_filter = gen_bits_mask(0xFF);
parm[0].nttrans.in.file.fnum = gen_fnum(instance);
parm[0].nttrans.in.recursive = gen_bool();
GEN_COPY_PARM;
GEN_SET_FNUM_SMB(nttrans.in.file.fnum);
for (n=0;n<NSERVERS;n++) {
struct smbcli_request *req;
req = smb_raw_changenotify_send(servers[n].smb_tree[instance], &parm[n]);
req->async.fn = async_notify_smb;
}
return true;
}
/*
generate ntcreatex operations
*/
static bool handler_smb2_create(int instance)
{
struct smb2_create parm[NSERVERS];
NTSTATUS status[NSERVERS];
ZERO_STRUCT(parm[0]);
parm[0].in.security_flags = gen_bits_levels(3, 90, 0x0, 70, 0x3, 100, 0xFF);
parm[0].in.oplock_level = gen_bits_levels(3, 90, 0x0, 70, 0x9, 100, 0xFF);
parm[0].in.impersonation_level = gen_bits_levels(3, 90, 0x0, 70, 0x3, 100, 0xFFFFFFFF);
parm[0].in.create_flags = gen_reserved64();
parm[0].in.reserved = gen_reserved64();
parm[0].in.desired_access = gen_access_mask();
parm[0].in.file_attributes = gen_attrib();
parm[0].in.share_access = gen_bits_mask2(0x7, 0xFFFFFFFF);
parm[0].in.create_disposition = gen_open_disp();
parm[0].in.create_options = gen_create_options();
parm[0].in.fname = gen_fname_open(instance);
parm[0].in.eas = gen_ea_list();
parm[0].in.alloc_size = gen_alloc_size();
parm[0].in.durable_open = gen_bool();
parm[0].in.query_maximal_access = gen_bool();
parm[0].in.timewarp = gen_timewarp();
parm[0].in.query_on_disk_id = gen_bool();
parm[0].in.sec_desc = gen_sec_desc();
if (!options.use_oplocks) {
/* mask out oplocks */
parm[0].in.oplock_level = 0;
}
if (options.valid) {
parm[0].in.security_flags &= 3;
parm[0].in.oplock_level &= 9;
parm[0].in.impersonation_level &= 3;
}
GEN_COPY_PARM;
GEN_CALL_SMB2(smb2_create(tree, current_op.mem_ctx, &parm[i]));
CHECK_EQUAL(out.oplock_level);
CHECK_EQUAL(out.reserved);
CHECK_EQUAL(out.create_action);
CHECK_NTTIMES_EQUAL(out.create_time);
CHECK_NTTIMES_EQUAL(out.access_time);
CHECK_NTTIMES_EQUAL(out.write_time);
CHECK_NTTIMES_EQUAL(out.change_time);
CHECK_EQUAL(out.alloc_size);
CHECK_EQUAL(out.size);
CHECK_ATTRIB(out.file_attr);
CHECK_EQUAL(out.reserved2);
CHECK_EQUAL(out.maximal_access);
/* ntcreatex creates a new file handle */
ADD_HANDLE_SMB2(parm[0].in.fname, out.file.handle);
return true;
}
/*
generate close operations
*/
static bool handler_smb2_close(int instance)
{
struct smb2_close parm[NSERVERS];
NTSTATUS status[NSERVERS];
ZERO_STRUCT(parm[0]);
parm[0].in.file.handle.data[0] = gen_fnum_close(instance);
parm[0].in.flags = gen_bits_mask2(0x1, 0xFFFF);
GEN_COPY_PARM;
GEN_SET_FNUM_SMB2(in.file.handle);
GEN_CALL_SMB2(smb2_close(tree, &parm[i]));
CHECK_EQUAL(out.flags);
CHECK_EQUAL(out._pad);
CHECK_NTTIMES_EQUAL(out.create_time);
CHECK_NTTIMES_EQUAL(out.access_time);
CHECK_NTTIMES_EQUAL(out.write_time);
CHECK_NTTIMES_EQUAL(out.change_time);
CHECK_EQUAL(out.alloc_size);
CHECK_EQUAL(out.size);
CHECK_ATTRIB(out.file_attr);
REMOVE_HANDLE_SMB2(in.file.handle);
return true;
}
/*
generate read operations
*/
static bool handler_smb2_read(int instance)
{
struct smb2_read parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].in.file.handle.data[0] = gen_fnum(instance);
parm[0].in.reserved = gen_reserved8();
parm[0].in.length = gen_io_count();
parm[0].in.offset = gen_offset();
parm[0].in.min_count = gen_io_count();
parm[0].in.channel = gen_bits_mask2(0x0, 0xFFFFFFFF);
parm[0].in.remaining = gen_bits_mask2(0x0, 0xFFFFFFFF);
parm[0].in.channel_offset = gen_bits_mask2(0x0, 0xFFFF);
parm[0].in.channel_length = gen_bits_mask2(0x0, 0xFFFF);
GEN_COPY_PARM;
GEN_SET_FNUM_SMB2(in.file.handle);
GEN_CALL_SMB2(smb2_read(tree, current_op.mem_ctx, &parm[i]));
CHECK_EQUAL(out.remaining);
CHECK_EQUAL(out.reserved);
CHECK_EQUAL(out.data.length);
return true;
}
/*
generate write operations
*/
static bool handler_smb2_write(int instance)
{
struct smb2_write parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].in.file.handle.data[0] = gen_fnum(instance);
parm[0].in.offset = gen_offset();
parm[0].in.unknown1 = gen_bits_mask2(0, 0xFFFFFFFF);
parm[0].in.unknown2 = gen_bits_mask2(0, 0xFFFFFFFF);
parm[0].in.data = data_blob_talloc(current_op.mem_ctx, NULL,
gen_io_count());
GEN_COPY_PARM;
GEN_SET_FNUM_SMB2(in.file.handle);
GEN_CALL_SMB2(smb2_write(tree, &parm[i]));
CHECK_EQUAL(out._pad);
CHECK_EQUAL(out.nwritten);
CHECK_EQUAL(out.unknown1);
return true;
}
/*
generate lockingx operations
*/
static bool handler_smb2_lock(int instance)
{
struct smb2_lock parm[NSERVERS];
NTSTATUS status[NSERVERS];
int n;
parm[0].level = RAW_LOCK_LOCKX;
parm[0].in.file.handle.data[0] = gen_fnum(instance);
parm[0].in.lock_count = gen_lock_count();
parm[0].in.lock_sequence = gen_reserved32();
parm[0].in.locks = talloc_array(current_op.mem_ctx,
struct smb2_lock_element,
parm[0].in.lock_count);
for (n=0;n<parm[0].in.lock_count;n++) {
parm[0].in.locks[n].offset = gen_offset();
parm[0].in.locks[n].length = gen_io_count();
/* don't yet cope with async replies */
parm[0].in.locks[n].flags = gen_lock_flags_smb2() |
SMB2_LOCK_FLAG_FAIL_IMMEDIATELY;
parm[0].in.locks[n].reserved = gen_bits_mask2(0x0, 0xFFFFFFFF);
}
GEN_COPY_PARM;
GEN_SET_FNUM_SMB2(in.file.handle);
GEN_CALL_SMB2(smb2_lock(tree, &parm[i]));
return true;
}
/*
generate flush operations
*/
static bool handler_smb2_flush(int instance)
{
struct smb2_flush parm[NSERVERS];
NTSTATUS status[NSERVERS];
ZERO_STRUCT(parm[0]);
parm[0].in.file.handle.data[0] = gen_fnum(instance);
parm[0].in.reserved1 = gen_reserved16();
parm[0].in.reserved2 = gen_reserved32();
GEN_COPY_PARM;
GEN_SET_FNUM_SMB2(in.file.handle);
GEN_CALL_SMB2(smb2_flush(tree, &parm[i]));
CHECK_EQUAL(out.reserved);
return true;
}
/*
generate echo operations
*/
static bool handler_smb2_echo(int instance)
{
NTSTATUS status[NSERVERS];
GEN_CALL_SMB2(smb2_keepalive(tree->session->transport));
return true;
}
/*
generate a fileinfo query structure
*/
static void gen_fileinfo_smb2(int instance, union smb_fileinfo *info)
{
int i;
#define LVL(v) {RAW_FILEINFO_ ## v, "RAW_FILEINFO_" #v}
struct {
enum smb_fileinfo_level level;
const char *name;
} levels[] = {
LVL(BASIC_INFORMATION),
LVL(STANDARD_INFORMATION), LVL(INTERNAL_INFORMATION), LVL(EA_INFORMATION),
LVL(ACCESS_INFORMATION), LVL(NAME_INFORMATION), LVL(POSITION_INFORMATION),
LVL(MODE_INFORMATION), LVL(ALIGNMENT_INFORMATION), LVL(SMB2_ALL_INFORMATION),
LVL(ALT_NAME_INFORMATION), LVL(STREAM_INFORMATION), LVL(COMPRESSION_INFORMATION),
LVL(NETWORK_OPEN_INFORMATION), LVL(ATTRIBUTE_TAG_INFORMATION),
LVL(SMB2_ALL_EAS), LVL(SMB2_ALL_INFORMATION), LVL(SEC_DESC),
};
do {
i = gen_int_range(0, ARRAY_SIZE(levels)-1);
} while (ignore_pattern(levels[i].name));
info->generic.level = levels[i].level;
}
/*
generate qfileinfo operations
*/
static bool handler_smb2_qfileinfo(int instance)
{
union smb_fileinfo parm[NSERVERS];
NTSTATUS status[NSERVERS];
parm[0].generic.in.file.handle.data[0] = gen_fnum(instance);
gen_fileinfo_smb2(instance, &parm[0]);
GEN_COPY_PARM;
GEN_SET_FNUM_SMB2(generic.in.file.handle);
GEN_CALL_SMB2(smb2_getinfo_file(tree, current_op.mem_ctx, &parm[i]));
return cmp_fileinfo(instance, parm, status);
}
/*
generate setfileinfo operations
*/
static bool handler_smb2_sfileinfo(int instance)
{
union smb_setfileinfo parm[NSERVERS];
NTSTATUS status[NSERVERS];
gen_setfileinfo(instance, &parm[0]);
parm[0].generic.in.file.fnum = gen_fnum(instance);
GEN_COPY_PARM;
GEN_SET_FNUM_SMB2(generic.in.file.handle);
GEN_CALL_SMB2(smb2_setinfo_file(tree, &parm[i]));
return true;
}
/*
wipe any relevant files
*/
static void wipe_files(void)
{
int i;
NTSTATUS status;
if (options.skip_cleanup) {
return;
}
for (i=0;i<NSERVERS;i++) {
int n;
if (options.smb2) {
n = smb2_deltree(servers[i].smb2_tree[0], "gentest");
} else {
n = smbcli_deltree(servers[i].smb_tree[0], "gentest");
}
if (n == -1) {
printf("Failed to wipe tree on server %d\n", i);
exit(1);
}
if (options.smb2) {
status = smb2_util_mkdir(servers[i].smb2_tree[0], "gentest");
} else {
status = smbcli_mkdir(servers[i].smb_tree[0], "gentest");
}
if (NT_STATUS_IS_ERR(status)) {
printf("Failed to create gentest on server %d - %s\n", i, nt_errstr(status));
exit(1);
}
if (n > 0) {
printf("Deleted %d files on server %d\n", n, i);
}
}
}
/*
dump the current seeds - useful for continuing a backtrack
*/
static void dump_seeds(void)
{
int i;
FILE *f;
if (!options.seeds_file) {
return;
}
f = fopen("seeds.tmp", "w");
if (!f) return;
for (i=0;i<options.numops;i++) {
fprintf(f, "%u\n", op_parms[i].seed);
}
fclose(f);
rename("seeds.tmp", options.seeds_file);
}
/*
the list of top-level operations that we will generate
*/
static struct {
const char *name;
bool (*handler)(int instance);
bool smb2;
int count, success_count;
} gen_ops[] = {
{"CREATE", handler_smb2_create, true},
{"CLOSE", handler_smb2_close, true},
{"READ", handler_smb2_read, true},
{"WRITE", handler_smb2_write, true},
{"LOCK", handler_smb2_lock, true},
{"FLUSH", handler_smb2_flush, true},
{"ECHO", handler_smb2_echo, true},
{"QFILEINFO", handler_smb2_qfileinfo, true},
{"SFILEINFO", handler_smb2_sfileinfo, true},
{"OPEN", handler_smb_open, false},
{"OPENX", handler_smb_openx, false},
{"NTCREATEX", handler_smb_ntcreatex, false},
{"CLOSE", handler_smb_close, false},
{"UNLINK", handler_smb_unlink, false},
{"MKDIR", handler_smb_mkdir, false},
{"RMDIR", handler_smb_rmdir, false},
{"RENAME", handler_smb_rename, false},
{"NTRENAME", handler_smb_ntrename, false},
{"READX", handler_smb_readx, false},
{"WRITEX", handler_smb_writex, false},
{"CHKPATH", handler_smb_chkpath, false},
{"SEEK", handler_smb_seek, false},
{"LOCKINGX", handler_smb_lockingx, false},
{"QPATHINFO", handler_smb_qpathinfo, false},
{"QFILEINFO", handler_smb_qfileinfo, false},
{"SPATHINFO", handler_smb_spathinfo, false},
{"SFILEINFO", handler_smb_sfileinfo, false},
{"NOTIFY", handler_smb_notify, false},
{"SEEK", handler_smb_seek, false},
};
/*
run the test with the current set of op_parms parameters
return the number of operations that completed successfully
*/
static int run_test(struct tevent_context *ev, struct loadparm_context *lp_ctx)
{
int op, i;
if (!connect_servers(ev, lp_ctx)) {
printf("Failed to connect to servers\n");
exit(1);
}
dump_seeds();
/* wipe any leftover files from old runs */
wipe_files();
/* reset the open handles array */
memset(open_handles, 0, options.max_open_handles * sizeof(open_handles[0]));
num_open_handles = 0;
for (i=0;i<ARRAY_SIZE(gen_ops);i++) {
gen_ops[i].count = 0;
gen_ops[i].success_count = 0;
}
for (op=0; op<options.numops; op++) {
int instance, which_op;
bool ret;
if (op_parms[op].disabled) continue;
srandom(op_parms[op].seed);
instance = gen_int_range(0, NINSTANCES-1);
/* generate a non-ignored operation */
do {
which_op = gen_int_range(0, ARRAY_SIZE(gen_ops)-1);
} while (ignore_pattern(gen_ops[which_op].name) ||
gen_ops[which_op].smb2 != options.smb2);
DEBUG(3,("Generating op %s on instance %d\n",
gen_ops[which_op].name, instance));
current_op.seed = op_parms[op].seed;
current_op.opnum = op;
current_op.name = gen_ops[which_op].name;
current_op.status = NT_STATUS_OK;
talloc_free(current_op.mem_ctx);
current_op.mem_ctx = talloc_named(NULL, 0, "%s", current_op.name);
ret = gen_ops[which_op].handler(instance);
gen_ops[which_op].count++;
if (NT_STATUS_IS_OK(current_op.status)) {
gen_ops[which_op].success_count++;
}
if (!ret) {
printf("Failed at operation %d - %s\n",
op, gen_ops[which_op].name);
return op;
}
if (op % 100 == 0) {
printf("%d\n", op);
}
}
for (i=0;i<ARRAY_SIZE(gen_ops);i++) {
printf("Op %-10s got %d/%d success\n",
gen_ops[i].name,
gen_ops[i].success_count,
gen_ops[i].count);
}
return op;
}
/*
perform a backtracking analysis of the minimal set of operations
to generate an error
*/
static void backtrack_analyze(struct tevent_context *ev,
struct loadparm_context *lp_ctx)
{
int chunk, ret;
const char *mismatch = current_op.mismatch;
chunk = options.numops / 2;
do {
int base;
for (base=0;
chunk > 0 && base+chunk < options.numops && options.numops > 1; ) {
int i, max;
chunk = MIN(chunk, options.numops / 2);
/* mark this range as disabled */
max = MIN(options.numops, base+chunk);
for (i=base;i<max; i++) {
op_parms[i].disabled = true;
}
printf("Testing %d ops with %d-%d disabled\n",
options.numops, base, max-1);
ret = run_test(ev, lp_ctx);
printf("Completed %d of %d ops\n", ret, options.numops);
for (i=base;i<max; i++) {
op_parms[i].disabled = false;
}
if (ret == options.numops) {
/* this chunk is needed */
base += chunk;
} else if (mismatch != current_op.mismatch &&
strcmp(mismatch, current_op.mismatch)) {
base += chunk;
printf("Different error in backtracking\n");
} else if (ret < base) {
printf("damn - inconsistent errors! found early error\n");
options.numops = ret+1;
base = 0;
} else {
/* it failed - this chunk isn't needed for a failure */
memmove(&op_parms[base], &op_parms[max],
sizeof(op_parms[0]) * (options.numops - max));
options.numops = (ret+1) - (max - base);
}
}
if (chunk == 2) {
chunk = 1;
} else {
chunk *= 0.4;
}
if (options.analyze_continuous && chunk == 0 && options.numops != 1) {
chunk = 1;
}
} while (chunk > 0);
printf("Reduced to %d ops\n", options.numops);
ret = run_test(ev, lp_ctx);
if (ret != options.numops - 1) {
printf("Inconsistent result? ret=%d numops=%d\n", ret, options.numops);
}
}
/*
start the main gentest process
*/
static bool start_gentest(struct tevent_context *ev,
struct loadparm_context *lp_ctx)
{
int op;
int ret;
/* allocate the open_handles array */
open_handles = calloc(options.max_open_handles, sizeof(open_handles[0]));
srandom(options.seed);
op_parms = calloc(options.numops, sizeof(op_parms[0]));
/* generate the seeds - after this everything is deterministic */
if (options.use_preset_seeds) {
int numops;
char **preset = file_lines_load(options.seeds_file, &numops, 0, NULL);
if (!preset) {
printf("Failed to load %s - %s\n", options.seeds_file, strerror(errno));
exit(1);
}
if (numops < options.numops) {
options.numops = numops;
}
for (op=0;op<options.numops;op++) {
if (!preset[op]) {
printf("Not enough seeds in %s\n", options.seeds_file);
exit(1);
}
op_parms[op].seed = atoi(preset[op]);
}
printf("Loaded %d seeds from %s\n", options.numops, options.seeds_file);
} else {
for (op=0; op<options.numops; op++) {
op_parms[op].seed = random();
}
}
ret = run_test(ev, lp_ctx);
if (ret != options.numops && options.analyze) {
options.numops = ret+1;
backtrack_analyze(ev, lp_ctx);
} else if (options.analyze_always) {
backtrack_analyze(ev, lp_ctx);
} else if (options.analyze_continuous) {
while (run_test(ev, lp_ctx) == options.numops) ;
}
return ret == options.numops;
}
static void usage(poptContext pc)
{
printf(
"Usage:\n\
gentest //server1/share1 //server2/share2 [options..]\n\
");
poptPrintUsage(pc, stdout, 0);
}
/**
split a UNC name into server and share names
*/
static bool split_unc_name(const char *unc, char **server, char **share)
{
char *p = strdup(unc);
if (!p) return false;
all_string_sub(p, "\\", "/", 0);
if (strncmp(p, "//", 2) != 0) return false;
(*server) = p+2;
p = strchr(*server, '/');
if (!p) return false;
*p = 0;
(*share) = p+1;
return true;
}
/****************************************************************************
main program
****************************************************************************/
int main(int argc, char *argv[])
{
int opt;
int i, username_count=0;
bool ret;
char *ignore_file=NULL;
struct tevent_context *ev;
struct loadparm_context *lp_ctx;
poptContext pc;
int argc_new;
char **argv_new;
enum {OPT_UNCLIST=1000};
struct poptOption long_options[] = {
POPT_AUTOHELP
{"smb2", 0, POPT_ARG_NONE, &options.smb2, 0, "use SMB2 protocol", NULL},
{"seed", 0, POPT_ARG_INT, &options.seed, 0, "Seed to use for randomizer", NULL},
{"num-ops", 0, POPT_ARG_INT, &options.numops, 0, "num ops", NULL},
{"oplocks", 0, POPT_ARG_NONE, &options.use_oplocks,0, "use oplocks", NULL},
{"showall", 0, POPT_ARG_NONE, &options.showall, 0, "display all operations", NULL},
{"analyse", 0, POPT_ARG_NONE, &options.analyze, 0, "do backtrack analysis", NULL},
{"analysealways", 0, POPT_ARG_NONE, &options.analyze_always, 0, "analysis always", NULL},
{"analysecontinuous", 0, POPT_ARG_NONE, &options.analyze_continuous, 0, "analysis continuous", NULL},
{"ignore", 0, POPT_ARG_STRING, &ignore_file, 0, "ignore from file", NULL},
{"preset", 0, POPT_ARG_NONE, &options.use_preset_seeds, 0, "use preset seeds", NULL},
{"fast", 0, POPT_ARG_NONE, &options.fast_reconnect, 0, "use fast reconnect", NULL},
{"unclist", 0, POPT_ARG_STRING, NULL, OPT_UNCLIST, "unclist", NULL},
{"seedsfile", 0, POPT_ARG_STRING, &options.seeds_file, 0, "seed file", NULL},
{ "user", 'U', POPT_ARG_STRING, NULL, 'U', "Set the network username", "[DOMAIN/]USERNAME[%PASSWORD]" },
{"maskindexing", 0, POPT_ARG_NONE, &options.mask_indexing, 0, "mask out the indexed file attrib", NULL},
{"noeas", 0, POPT_ARG_NONE, &options.no_eas, 0, "don't use extended attributes", NULL},
{"noacls", 0, POPT_ARG_NONE, &options.no_acls, 0, "don't use ACLs", NULL},
{"skip-cleanup", 0, POPT_ARG_NONE, &options.skip_cleanup, 0, "don't delete files at start", NULL},
{"valid", 0, POPT_ARG_NONE, &options.valid, 0, "generate only valid fields", NULL},
POPT_COMMON_SAMBA
POPT_COMMON_CONNECTION
POPT_COMMON_CREDENTIALS
POPT_COMMON_VERSION
{ NULL }
};
memset(&bad_smb2_handle, 0xFF, sizeof(bad_smb2_handle));
setlinebuf(stdout);
options.seed = time(NULL);
options.numops = 1000;
options.max_open_handles = 20;
options.seeds_file = "gentest_seeds.dat";
pc = poptGetContext("gentest", argc, (const char **) argv, long_options,
POPT_CONTEXT_KEEP_FIRST);
poptSetOtherOptionHelp(pc, "<unc1> <unc2>");
lp_ctx = cmdline_lp_ctx;
servers[0].credentials = cli_credentials_init(talloc_autofree_context());
servers[1].credentials = cli_credentials_init(talloc_autofree_context());
cli_credentials_guess(servers[0].credentials, lp_ctx);
cli_credentials_guess(servers[1].credentials, lp_ctx);
while((opt = poptGetNextOpt(pc)) != -1) {
switch (opt) {
case OPT_UNCLIST:
lpcfg_set_cmdline(cmdline_lp_ctx, "torture:unclist", poptGetOptArg(pc));
break;
case 'U':
if (username_count == 2) {
usage(pc);
exit(1);
}
cli_credentials_parse_string(servers[username_count].credentials, poptGetOptArg(pc), CRED_SPECIFIED);
username_count++;
break;
}
}
if (ignore_file) {
options.ignore_patterns = file_lines_load(ignore_file, NULL, 0, NULL);
}
argv_new = discard_const_p(char *, poptGetArgs(pc));
argc_new = argc;
for (i=0; i<argc; i++) {
if (argv_new[i] == NULL) {
argc_new = i;
break;
}
}
if (!(argc_new >= 3)) {
usage(pc);
exit(1);
}
setlinebuf(stdout);
setup_logging("gentest", DEBUG_STDOUT);
if (argc < 3 || argv[1][0] == '-') {
usage(pc);
exit(1);
}
setup_logging(argv[0], DEBUG_STDOUT);
for (i=0;i<NSERVERS;i++) {
const char *share = argv[1+i];
if (!split_unc_name(share, &servers[i].server_name, &servers[i].share_name)) {
printf("Invalid share name '%s'\n", share);
return -1;
}
}
if (username_count == 0) {
usage(pc);
return -1;
}
if (username_count == 1) {
servers[1].credentials = servers[0].credentials;
}
printf("seed=%u\n", options.seed);
ev = s4_event_context_init(talloc_autofree_context());
gensec_init(lp_ctx);
ret = start_gentest(ev, lp_ctx);
if (ret) {
printf("gentest completed - no errors\n");
} else {
printf("gentest failed\n");
}
return ret?0:-1;
}