1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-22 13:34:15 +03:00
samba-mirror/source4/torture/smb2/getinfo.c
Ralph Boehme 9b2d281571 smbtorture: check required access for SMB2-GETINFO
BUG: https://bugzilla.samba.org/show_bug.cgi?id=15153

Signed-off-by: Ralph Boehme <slow@samba.org>
Reviewed-by: Stefan Metzmacher <metze@samba.org>
2022-08-23 11:52:29 +00:00

952 lines
32 KiB
C

/*
Unix SMB/CIFS implementation.
SMB2 getinfo test suite
Copyright (C) Andrew Tridgell 2005
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "libcli/smb2/smb2.h"
#include "libcli/smb2/smb2_calls.h"
#include "libcli/smb/smbXcli_base.h"
#include "torture/torture.h"
#include "torture/smb2/proto.h"
#include "torture/util.h"
static struct {
const char *name;
uint16_t level;
NTSTATUS fstatus;
NTSTATUS dstatus;
union smb_fileinfo finfo;
union smb_fileinfo dinfo;
} file_levels[] = {
#define LEVEL(x) .name = #x, .level = x
{ LEVEL(RAW_FILEINFO_BASIC_INFORMATION) },
{ LEVEL(RAW_FILEINFO_STANDARD_INFORMATION) },
{ LEVEL(RAW_FILEINFO_INTERNAL_INFORMATION) },
{ LEVEL(RAW_FILEINFO_EA_INFORMATION) },
{ LEVEL(RAW_FILEINFO_ACCESS_INFORMATION) },
{ LEVEL(RAW_FILEINFO_POSITION_INFORMATION) },
{ LEVEL(RAW_FILEINFO_MODE_INFORMATION) },
{ LEVEL(RAW_FILEINFO_ALIGNMENT_INFORMATION) },
{ LEVEL(RAW_FILEINFO_ALL_INFORMATION) },
{ LEVEL(RAW_FILEINFO_ALT_NAME_INFORMATION) },
{ LEVEL(RAW_FILEINFO_STREAM_INFORMATION) },
{ LEVEL(RAW_FILEINFO_COMPRESSION_INFORMATION) },
{ LEVEL(RAW_FILEINFO_NETWORK_OPEN_INFORMATION) },
{ LEVEL(RAW_FILEINFO_ATTRIBUTE_TAG_INFORMATION) },
{ LEVEL(RAW_FILEINFO_SMB2_ALL_EAS) },
{ LEVEL(RAW_FILEINFO_SMB2_ALL_INFORMATION) },
{ LEVEL(RAW_FILEINFO_SEC_DESC) }
};
static struct {
const char *name;
uint16_t level;
NTSTATUS status;
union smb_fsinfo info;
} fs_levels[] = {
{ LEVEL(RAW_QFS_VOLUME_INFORMATION) },
{ LEVEL(RAW_QFS_SIZE_INFORMATION) },
{ LEVEL(RAW_QFS_DEVICE_INFORMATION) },
{ LEVEL(RAW_QFS_ATTRIBUTE_INFORMATION) },
{ LEVEL(RAW_QFS_QUOTA_INFORMATION) },
{ LEVEL(RAW_QFS_FULL_SIZE_INFORMATION) },
{ LEVEL(RAW_QFS_OBJECTID_INFORMATION) },
{ LEVEL(RAW_QFS_SECTOR_SIZE_INFORMATION) },
};
#define FNAME "testsmb2_file.dat"
#define DNAME "testsmb2_dir"
/*
test fileinfo levels
*/
static bool torture_smb2_fileinfo(struct torture_context *tctx, struct smb2_tree *tree)
{
struct smb2_handle hfile, hdir;
NTSTATUS status;
int i;
status = torture_smb2_testfile(tree, FNAME, &hfile);
torture_assert_ntstatus_ok(tctx, status, "Unable to create test file "
FNAME "\n");
status = torture_smb2_testdir(tree, DNAME, &hdir);
torture_assert_ntstatus_ok(tctx, status, "Unable to create test dir "
DNAME "\n");
torture_comment(tctx, "Testing file info levels\n");
torture_smb2_all_info(tctx, tree, hfile);
torture_smb2_all_info(tctx, tree, hdir);
for (i=0;i<ARRAY_SIZE(file_levels);i++) {
if (file_levels[i].level == RAW_FILEINFO_SEC_DESC) {
file_levels[i].finfo.query_secdesc.in.secinfo_flags = 0x7;
file_levels[i].dinfo.query_secdesc.in.secinfo_flags = 0x7;
}
if (file_levels[i].level == RAW_FILEINFO_SMB2_ALL_EAS) {
file_levels[i].finfo.all_eas.in.continue_flags =
SMB2_CONTINUE_FLAG_RESTART;
file_levels[i].dinfo.all_eas.in.continue_flags =
SMB2_CONTINUE_FLAG_RESTART;
}
file_levels[i].finfo.generic.level = file_levels[i].level;
file_levels[i].finfo.generic.in.file.handle = hfile;
file_levels[i].fstatus = smb2_getinfo_file(tree, tree, &file_levels[i].finfo);
torture_assert_ntstatus_ok(tctx, file_levels[i].fstatus,
talloc_asprintf(tctx, "%s on file",
file_levels[i].name));
file_levels[i].dinfo.generic.level = file_levels[i].level;
file_levels[i].dinfo.generic.in.file.handle = hdir;
file_levels[i].dstatus = smb2_getinfo_file(tree, tree, &file_levels[i].dinfo);
torture_assert_ntstatus_ok(tctx, file_levels[i].dstatus,
talloc_asprintf(tctx, "%s on dir",
file_levels[i].name));
}
return true;
}
/*
test granted access when desired access includes
FILE_EXECUTE and does not include FILE_READ_DATA
*/
static bool torture_smb2_fileinfo_grant_read(struct torture_context *tctx)
{
struct smb2_tree *tree;
bool ret;
struct smb2_handle hfile, hdir;
NTSTATUS status;
uint32_t file_granted_access, dir_granted_access;
ret = torture_smb2_connection(tctx, &tree);
torture_assert(tctx, ret, "connection failed");
status = torture_smb2_testfile_access(
tree, FNAME, &hfile, SEC_FILE_EXECUTE | SEC_FILE_READ_ATTRIBUTE);
torture_assert_ntstatus_ok(tctx, status,
"Unable to create test file " FNAME "\n");
status =
torture_smb2_get_allinfo_access(tree, hfile, &file_granted_access);
torture_assert_ntstatus_ok(tctx, status,
"Unable to query test file access ");
torture_assert_int_equal(tctx, file_granted_access,
SEC_FILE_EXECUTE | SEC_FILE_READ_ATTRIBUTE,
"granted file access ");
smb2_util_close(tree, hfile);
status = torture_smb2_testdir_access(
tree, DNAME, &hdir, SEC_FILE_EXECUTE | SEC_FILE_READ_ATTRIBUTE);
torture_assert_ntstatus_ok(tctx, status,
"Unable to create test dir " DNAME "\n");
status =
torture_smb2_get_allinfo_access(tree, hdir, &dir_granted_access);
torture_assert_ntstatus_ok(tctx, status,
"Unable to query test dir access ");
torture_assert_int_equal(tctx, dir_granted_access,
SEC_FILE_EXECUTE | SEC_FILE_READ_ATTRIBUTE,
"granted dir access ");
smb2_util_close(tree, hdir);
return true;
}
static bool torture_smb2_fileinfo_normalized(struct torture_context *tctx)
{
struct smb2_tree *tree = NULL;
bool ret;
struct smb2_handle hroot;
const char *d1 = NULL, *d1l = NULL, *d1u = NULL;
struct smb2_handle hd1, hd1l, hd1u;
const char *d2 = NULL, *d2l = NULL, *d2u = NULL;
struct smb2_handle hd2, hd2l, hd2u;
const char *d3 = NULL, *d3l = NULL, *d3u = NULL;
struct smb2_handle hd3, hd3l, hd3u;
const char *d3s = NULL, *d3sl = NULL, *d3su = NULL, *d3sd = NULL;
struct smb2_handle hd3s, hd3sl, hd3su, hd3sd;
const char *f4 = NULL, *f4l = NULL, *f4u = NULL, *f4d = NULL;
struct smb2_handle hf4, hf4l, hf4u, hf4d;
const char *f4s = NULL, *f4sl = NULL, *f4su = NULL, *f4sd = NULL;
struct smb2_handle hf4s, hf4sl, hf4su, hf4sd;
union smb_fileinfo info = {
.normalized_name_info = {
.level = RAW_FILEINFO_NORMALIZED_NAME_INFORMATION,
},
};
NTSTATUS status;
enum protocol_types protocol;
struct smb2_tree *tree_3_0 = NULL;
struct smbcli_options options3_0;
struct smb2_handle hroot_3_0;
ret = torture_smb2_connection(tctx, &tree);
torture_assert(tctx, ret, "connection failed");
protocol = smbXcli_conn_protocol(tree->session->transport->conn);
d1 = talloc_asprintf(tctx, "torture_dIr1N");
torture_assert_not_null(tctx, d1, "d1");
d1l = strlower_talloc(tctx, d1);
torture_assert_not_null(tctx, d1l, "d1l");
d1u = strupper_talloc(tctx, d1);
torture_assert_not_null(tctx, d1u, "d1u");
d2 = talloc_asprintf(tctx, "%s\\dIr2Na", d1);
torture_assert_not_null(tctx, d2, "d2");
d2l = strlower_talloc(tctx, d2);
torture_assert_not_null(tctx, d2l, "d2l");
d2u = strupper_talloc(tctx, d2);
torture_assert_not_null(tctx, d2u, "d2u");
d3 = talloc_asprintf(tctx, "%s\\dIr3NaM", d2);
torture_assert_not_null(tctx, d3, "d3");
d3l = strlower_talloc(tctx, d3);
torture_assert_not_null(tctx, d3l, "d3l");
d3u = strupper_talloc(tctx, d3);
torture_assert_not_null(tctx, d3u, "d3u");
d3s = talloc_asprintf(tctx, "%s:sTrEaM3", d3);
torture_assert_not_null(tctx, d3s, "d3s");
d3sl = strlower_talloc(tctx, d3s);
torture_assert_not_null(tctx, d3sl, "d3sl");
d3su = strupper_talloc(tctx, d3s);
torture_assert_not_null(tctx, d3su, "d3su");
d3sd = talloc_asprintf(tctx, "%s:$DaTa", d3s);
torture_assert_not_null(tctx, d3sd, "d3sd");
f4 = talloc_asprintf(tctx, "%s\\fIlE4NaMe", d3);
torture_assert_not_null(tctx, f4, "f4");
f4l = strlower_talloc(tctx, f4);
torture_assert_not_null(tctx, f4l, "f4l");
f4u = strupper_talloc(tctx, f4);
torture_assert_not_null(tctx, f4u, "f4u");
f4d = talloc_asprintf(tctx, "%s::$dAtA", f4);
torture_assert_not_null(tctx, f4d, "f4d");
f4s = talloc_asprintf(tctx, "%s:StReAm4", f4);
torture_assert_not_null(tctx, f4s, "f4s");
f4sl = strlower_talloc(tctx, f4s);
torture_assert_not_null(tctx, f4sl, "f4sl");
f4su = strupper_talloc(tctx, f4s);
torture_assert_not_null(tctx, f4su, "f4su");
f4sd = talloc_asprintf(tctx, "%s:$dAtA", f4s);
torture_assert_not_null(tctx, f4sd, "f4sd");
status = smb2_util_roothandle(tree, &hroot);
torture_assert_ntstatus_ok(tctx, status, "Unable to create root handle");
info.normalized_name_info.in.file.handle = hroot;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
if (protocol < PROTOCOL_SMB3_11) {
/*
* Only SMB 3.1.1 and above should offer this.
*/
torture_assert_ntstatus_equal(tctx, status,
NT_STATUS_NOT_SUPPORTED,
"getinfo hroot");
torture_skip(tctx, "SMB 3.1.1 not supported");
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED)) {
/*
* Not all servers support this.
* (only Windows 10 1803 and higher)
*/
torture_skip(tctx, "NORMALIZED_NAME_INFORMATION not supported");
}
torture_assert_ntstatus_ok(tctx, status, "getinfo hroot");
torture_assert(tctx, info.normalized_name_info.out.fname.s == NULL,
"getinfo hroot should be empty");
smb2_deltree(tree, d1);
status = torture_smb2_testdir(tree, d1, &hd1);
torture_assert_ntstatus_ok(tctx, status, "Unable to create hd1");
status = torture_smb2_open(tree, d1l, SEC_RIGHTS_FILE_ALL, &hd1l);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hd1l");
status = torture_smb2_open(tree, d1u, SEC_RIGHTS_FILE_ALL, &hd1u);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hd1u");
status = torture_smb2_testdir(tree, d2, &hd2);
torture_assert_ntstatus_ok(tctx, status, "Unable to create hd2");
status = torture_smb2_open(tree, d2l, SEC_RIGHTS_FILE_ALL, &hd2l);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hd2l");
status = torture_smb2_open(tree, d2u, SEC_RIGHTS_FILE_ALL, &hd2u);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hd2u");
status = torture_smb2_testdir(tree, d3, &hd3);
torture_assert_ntstatus_ok(tctx, status, "Unable to create hd3");
status = torture_smb2_open(tree, d3l, SEC_RIGHTS_FILE_ALL, &hd3l);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hd3l");
status = torture_smb2_open(tree, d3u, SEC_RIGHTS_FILE_ALL, &hd3u);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hd3u");
status = torture_smb2_testfile(tree, d3s, &hd3s);
torture_assert_ntstatus_ok(tctx, status, "Unable to create hd3s");
status = torture_smb2_open(tree, d3sl, SEC_RIGHTS_FILE_ALL, &hd3sl);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hd3sl");
status = torture_smb2_open(tree, d3su, SEC_RIGHTS_FILE_ALL, &hd3su);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hd3su");
status = torture_smb2_open(tree, d3sd, SEC_RIGHTS_FILE_ALL, &hd3sd);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hd3sd");
status = torture_smb2_testfile(tree, f4, &hf4);
torture_assert_ntstatus_ok(tctx, status, "Unable to create hf4");
status = torture_smb2_open(tree, f4l, SEC_RIGHTS_FILE_ALL, &hf4l);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hf4l");
status = torture_smb2_open(tree, f4u, SEC_RIGHTS_FILE_ALL, &hf4u);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hf4u");
status = torture_smb2_open(tree, f4d, SEC_RIGHTS_FILE_ALL, &hf4d);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hf4d");
status = torture_smb2_testfile(tree, f4s, &hf4s);
torture_assert_ntstatus_ok(tctx, status, "Unable to create hf4s");
status = torture_smb2_open(tree, f4sl, SEC_RIGHTS_FILE_ALL, &hf4sl);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hf4sl");
status = torture_smb2_open(tree, f4su, SEC_RIGHTS_FILE_ALL, &hf4su);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hf4su");
status = torture_smb2_open(tree, f4sd, SEC_RIGHTS_FILE_ALL, &hf4sd);
torture_assert_ntstatus_ok(tctx, status, "Unable to open hf4sd");
info.normalized_name_info.in.file.handle = hd1;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd1");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d1, "getinfo hd1");
info.normalized_name_info.in.file.handle = hd1l;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd1l");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d1, "getinfo hd1l");
info.normalized_name_info.in.file.handle = hd1u;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd1u");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d1, "getinfo hd1u");
info.normalized_name_info.in.file.handle = hd2;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd2");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d2, "getinfo hd2");
info.normalized_name_info.in.file.handle = hd2l;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd2l");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d2, "getinfo hd2l");
info.normalized_name_info.in.file.handle = hd2u;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd2u");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d2, "getinfo hd2u");
info.normalized_name_info.in.file.handle = hd3;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd3");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d3, "getinfo hd3");
info.normalized_name_info.in.file.handle = hd3l;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd3l");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d3, "getinfo hd3l");
info.normalized_name_info.in.file.handle = hd3u;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd3u");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d3, "getinfo hd3u");
info.normalized_name_info.in.file.handle = hd3s;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd3s");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d3s, "getinfo hd3s");
info.normalized_name_info.in.file.handle = hd3sl;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd3sl");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d3s, "getinfo hd3sl");
info.normalized_name_info.in.file.handle = hd3su;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd3su");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d3s, "getinfo hd3su");
info.normalized_name_info.in.file.handle = hd3sd;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hd3sd");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
d3s, "getinfo hd3sd");
info.normalized_name_info.in.file.handle = hf4;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hf4");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
f4, "getinfo hf4");
info.normalized_name_info.in.file.handle = hf4l;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hf4l");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
f4, "getinfo hf4l");
info.normalized_name_info.in.file.handle = hf4u;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hf4u");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
f4, "getinfo hf4u");
info.normalized_name_info.in.file.handle = hf4d;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hf4d");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
f4, "getinfo hf4d");
info.normalized_name_info.in.file.handle = hf4s;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hf4s");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
f4s, "getinfo hf4s");
info.normalized_name_info.in.file.handle = hf4sl;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hf4sl");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
f4s, "getinfo hf4sl");
info.normalized_name_info.in.file.handle = hf4su;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hf4su");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
f4s, "getinfo hf4su");
info.normalized_name_info.in.file.handle = hf4sd;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree, tree, &info);
torture_assert_ntstatus_ok(tctx, status, "getinfo hf4sd");
torture_assert_str_equal(tctx, info.normalized_name_info.out.fname.s,
f4s, "getinfo hf4sd");
/* Set max protocol to SMB 3.0.2 */
options3_0 = tree->session->transport->options;
options3_0.max_protocol = PROTOCOL_SMB3_02;
options3_0.client_guid = GUID_zero();
ret = torture_smb2_connection_ext(tctx, 0, &options3_0, &tree_3_0);
torture_assert(tctx, ret, "connection with SMB < 3.1.1 failed");
status = smb2_util_roothandle(tree_3_0, &hroot_3_0);
torture_assert_ntstatus_ok(tctx, status, "Unable to create root handle 3_0");
info.normalized_name_info.in.file.handle = hroot_3_0;
ZERO_STRUCT(info.normalized_name_info.out);
status = smb2_getinfo_file(tree_3_0, tree_3_0, &info);
torture_assert_ntstatus_equal(tctx, status,
NT_STATUS_NOT_SUPPORTED,
"getinfo hroot");
return true;
}
/*
test fsinfo levels
*/
static bool torture_smb2_fsinfo(struct torture_context *tctx)
{
bool ret;
struct smb2_tree *tree;
int i;
NTSTATUS status;
struct smb2_handle handle;
torture_comment(tctx, "Testing fsinfo levels\n");
ret = torture_smb2_connection(tctx, &tree);
torture_assert(tctx, ret, "connection failed");
status = smb2_util_roothandle(tree, &handle);
torture_assert_ntstatus_ok(tctx, status, "Unable to create root handle");
for (i=0;i<ARRAY_SIZE(fs_levels);i++) {
fs_levels[i].info.generic.level = fs_levels[i].level;
fs_levels[i].info.generic.handle = handle;
fs_levels[i].status = smb2_getinfo_fs(tree, tree, &fs_levels[i].info);
torture_assert_ntstatus_ok(tctx, fs_levels[i].status,
fs_levels[i].name);
}
return true;
}
static bool torture_smb2_buffercheck_err(struct torture_context *tctx,
struct smb2_tree *tree,
struct smb2_getinfo *b,
size_t fixed,
DATA_BLOB full)
{
size_t i;
for (i=0; i<=full.length; i++) {
NTSTATUS status;
b->in.output_buffer_length = i;
status = smb2_getinfo(tree, tree, b);
if (i < fixed) {
torture_assert_ntstatus_equal(
tctx, status, NT_STATUS_INFO_LENGTH_MISMATCH,
"Wrong error code small buffer");
continue;
}
if (i<full.length) {
torture_assert_ntstatus_equal(
tctx, status, STATUS_BUFFER_OVERFLOW,
"Wrong error code for large buffer");
/*
* TODO: compare the output buffer. That seems a bit
* difficult, because for level 5 for example the
* label length is adjusted to what is there. And some
* reserved fields seem to be not initialized to 0.
*/
TALLOC_FREE(b->out.blob.data);
continue;
}
torture_assert_ntstatus_equal(
tctx, status, NT_STATUS_OK,
"Wrong error code for right sized buffer");
}
return true;
}
struct level_buffersize {
int level;
size_t fixed;
};
static bool torture_smb2_qfs_buffercheck(struct torture_context *tctx)
{
bool ret;
struct smb2_tree *tree;
NTSTATUS status;
struct smb2_handle handle;
int i;
struct level_buffersize levels[] = {
{ 1, 24 }, /* We don't have proper defines here */
{ 3, 24 },
{ 4, 8 },
{ 5, 16 },
{ 6, 48 },
{ 7, 32 },
{ 11, 28 },
};
torture_comment(tctx, "Testing SMB2_GETINFO_FS buffer sizes\n");
ret = torture_smb2_connection(tctx, &tree);
torture_assert(tctx, ret, "connection failed");
status = smb2_util_roothandle(tree, &handle);
torture_assert_ntstatus_ok(
tctx, status, "Unable to create root handle");
for (i=0; i<ARRAY_SIZE(levels); i++) {
struct smb2_getinfo b;
if (TARGET_IS_SAMBA3(tctx) &&
((levels[i].level == 6) || (levels[i].level == 11))) {
continue;
}
ZERO_STRUCT(b);
b.in.info_type = SMB2_0_INFO_FILESYSTEM;
b.in.info_class = levels[i].level;
b.in.file.handle = handle;
b.in.output_buffer_length = 65535;
status = smb2_getinfo(tree, tree, &b);
torture_assert_ntstatus_equal(
tctx, status, NT_STATUS_OK,
"Wrong error code for large buffer");
ret = torture_smb2_buffercheck_err(
tctx, tree, &b, levels[i].fixed, b.out.blob);
if (!ret) {
return ret;
}
}
return true;
}
static bool torture_smb2_qfile_buffercheck(struct torture_context *tctx)
{
bool ret;
struct smb2_tree *tree;
struct smb2_create c;
NTSTATUS status;
struct smb2_handle handle;
int i;
struct level_buffersize levels[] = {
{ 4, 40 },
{ 5, 24 },
{ 6, 8 },
{ 7, 4 },
{ 8, 4 },
{ 16, 4 },
{ 17, 4 },
{ 18, 104 },
{ 21, 8 },
{ 22, 32 },
{ 28, 16 },
{ 34, 56 },
{ 35, 8 },
};
torture_comment(tctx, "Testing SMB2_GETINFO_FILE buffer sizes\n");
ret = torture_smb2_connection(tctx, &tree);
torture_assert(tctx, ret, "connection failed");
ZERO_STRUCT(c);
c.in.desired_access = SEC_FLAG_MAXIMUM_ALLOWED;
c.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
c.in.create_disposition = NTCREATEX_DISP_OVERWRITE_IF;
c.in.share_access =
NTCREATEX_SHARE_ACCESS_DELETE|
NTCREATEX_SHARE_ACCESS_READ|
NTCREATEX_SHARE_ACCESS_WRITE;
c.in.create_options = 0;
c.in.fname = "bufsize.txt";
c.in.eas.num_eas = 2;
c.in.eas.eas = talloc_array(tree, struct ea_struct, 2);
c.in.eas.eas[0].flags = 0;
c.in.eas.eas[0].name.s = "EAONE";
c.in.eas.eas[0].value = data_blob_talloc(c.in.eas.eas, "VALUE1", 6);
c.in.eas.eas[1].flags = 0;
c.in.eas.eas[1].name.s = "SECONDEA";
c.in.eas.eas[1].value = data_blob_talloc(c.in.eas.eas, "ValueTwo", 8);
status = smb2_create(tree, tree, &c);
torture_assert_ntstatus_ok(
tctx, status, "Unable to create test file");
handle = c.out.file.handle;
for (i=0; i<ARRAY_SIZE(levels); i++) {
struct smb2_getinfo b;
ZERO_STRUCT(b);
b.in.info_type = SMB2_0_INFO_FILE;
b.in.info_class = levels[i].level;
b.in.file.handle = handle;
b.in.output_buffer_length = 65535;
status = smb2_getinfo(tree, tree, &b);
if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_IMPLEMENTED)) {
continue;
}
torture_assert_ntstatus_equal(
tctx, status, NT_STATUS_OK,
"Wrong error code for large buffer");
ret = torture_smb2_buffercheck_err(
tctx, tree, &b, levels[i].fixed, b.out.blob);
if (!ret) {
return ret;
}
}
return true;
}
static bool torture_smb2_qsec_buffercheck(struct torture_context *tctx)
{
struct smb2_getinfo b;
bool ret;
struct smb2_tree *tree;
struct smb2_create c;
NTSTATUS status;
struct smb2_handle handle;
torture_comment(tctx, "Testing SMB2_GETINFO_SECURITY buffer sizes\n");
ret = torture_smb2_connection(tctx, &tree);
torture_assert(tctx, ret, "connection failed");
ZERO_STRUCT(c);
c.in.oplock_level = 0;
c.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_DIR_READ_ATTRIBUTE |
SEC_DIR_LIST | SEC_STD_READ_CONTROL;
c.in.file_attributes = 0;
c.in.create_disposition = NTCREATEX_DISP_OPEN;
c.in.share_access = NTCREATEX_SHARE_ACCESS_READ|
NTCREATEX_SHARE_ACCESS_DELETE;
c.in.create_options = NTCREATEX_OPTIONS_ASYNC_ALERT;
c.in.fname = "";
status = smb2_create(tree, tree, &c);
torture_assert_ntstatus_ok(
tctx, status, "Unable to create root handle");
handle = c.out.file.handle;
ZERO_STRUCT(b);
b.in.info_type = SMB2_0_INFO_SECURITY;
b.in.info_class = 0;
b.in.file.handle = handle;
b.in.output_buffer_length = 0;
status = smb2_getinfo(tree, tree, &b);
torture_assert_ntstatus_equal(
tctx, status, NT_STATUS_BUFFER_TOO_SMALL,
"Wrong error code for large buffer");
b.in.output_buffer_length = 1;
status = smb2_getinfo(tree, tree, &b);
torture_assert_ntstatus_equal(
tctx, status, NT_STATUS_BUFFER_TOO_SMALL,
"Wrong error code for large buffer");
return true;
}
/* basic testing of all SMB2 getinfo levels
*/
static bool torture_smb2_getinfo(struct torture_context *tctx)
{
struct smb2_tree *tree;
bool ret = true;
NTSTATUS status;
ret = torture_smb2_connection(tctx, &tree);
torture_assert(tctx, ret, "connection failed");
smb2_deltree(tree, FNAME);
smb2_deltree(tree, DNAME);
status = torture_setup_complex_file(tctx, tree, FNAME);
torture_assert_ntstatus_ok(tctx, status,
"setup complex file " FNAME);
status = torture_setup_complex_file(tctx, tree, FNAME ":streamtwo");
torture_assert_ntstatus_ok(tctx, status,
"setup complex file " FNAME ":streamtwo");
status = torture_setup_complex_dir(tctx, tree, DNAME);
torture_assert_ntstatus_ok(tctx, status,
"setup complex dir " DNAME);
status = torture_setup_complex_file(tctx, tree, DNAME ":streamtwo");
torture_assert_ntstatus_ok(tctx, status,
"setup complex dir " DNAME ":streamtwo");
ret &= torture_smb2_fileinfo(tctx, tree);
return ret;
}
#undef LEVEL
#define LEVEL(l, u, ua, ra) \
.name = #l, \
.level = l, \
.unrestricted = u, \
.unrestricted_access = ua, \
.required_access = ra
static struct {
const char *name;
uint16_t level;
bool unrestricted;
uint32_t unrestricted_access;
uint32_t required_access;
} file_levels_access[] = {
/*
* The following info levels are not checked:
* - FileFullEaInformation and FileIdInformation:
* not implemented by the s4/libcli/raw
* - all pipe infolevels: that should be tested elsewhere by RPC tests
*/
/*
* The following allow unrestricted access, so requesting
* SEC_FILE_READ_ATTRIBUTE works, SEC_FILE_READ_ATTRIBUTE or
* SEC_FILE_READ_EA as well of course.
*/
{ LEVEL(RAW_FILEINFO_STANDARD_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_INTERNAL_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_ACCESS_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_POSITION_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_MODE_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_ALIGNMENT_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_ALT_NAME_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_STREAM_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_COMPRESSION_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_NORMALIZED_NAME_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_EA_INFORMATION, true, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_EA) },
/*
* The following require either SEC_FILE_READ_ATTRIBUTE or
* SEC_FILE_READ_EA.
*/
{ LEVEL(RAW_FILEINFO_BASIC_INFORMATION, false, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_ALL_INFORMATION, false, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_NETWORK_OPEN_INFORMATION, false, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_ATTRIBUTE_TAG_INFORMATION, false, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_SMB2_ALL_INFORMATION, false, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_ATTRIBUTE) },
{ LEVEL(RAW_FILEINFO_SMB2_ALL_EAS, false, SEC_STD_SYNCHRONIZE, SEC_FILE_READ_EA) },
/* Also try SEC_FILE_READ_ATTRIBUTE to show that it is the wrong one */
{ LEVEL(RAW_FILEINFO_SMB2_ALL_EAS, false, SEC_FILE_READ_ATTRIBUTE, SEC_FILE_READ_EA) },
{ LEVEL(RAW_FILEINFO_SEC_DESC, false, SEC_STD_SYNCHRONIZE, SEC_STD_READ_CONTROL) },
/* Also try SEC_FILE_READ_ATTRIBUTE to show that it is the wrong one */
{ LEVEL(RAW_FILEINFO_SEC_DESC, false, SEC_FILE_READ_ATTRIBUTE, SEC_STD_READ_CONTROL) }
};
/*
test fileinfo levels
*/
static bool torture_smb2_getfinfo_access(struct torture_context *tctx,
struct smb2_tree *tree)
{
const char *fname = "torture_smb2_getfinfo_access";
struct smb2_handle hfile;
NTSTATUS status;
bool ret = true;
int i;
smb2_deltree(tree, fname);
torture_setup_complex_file(tctx, tree, fname);
for (i = 0; i < ARRAY_SIZE(file_levels_access); i++) {
union smb_fileinfo finfo;
NTSTATUS expected_status;
/*
* First open with unrestricted_access, SEC_STD_SYNCHRONIZE for
* most tests, info levels with unrestricted=true should allow
* this.
*/
status = torture_smb2_testfile_access(
tree, fname, &hfile, file_levels_access[i].unrestricted_access);
torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
"Unable to open test file\n");
if (file_levels_access[i].level == RAW_FILEINFO_SEC_DESC) {
finfo.query_secdesc.in.secinfo_flags = 0x7;
}
if (file_levels_access[i].level == RAW_FILEINFO_SMB2_ALL_EAS) {
finfo.all_eas.in.continue_flags =
SMB2_CONTINUE_FLAG_RESTART;
}
finfo.generic.level = file_levels_access[i].level;
finfo.generic.in.file.handle = hfile;
if (file_levels_access[i].unrestricted) {
expected_status = NT_STATUS_OK;
} else {
expected_status = NT_STATUS_ACCESS_DENIED;
}
status = smb2_getinfo_file(tree, tree, &finfo);
torture_assert_ntstatus_equal_goto(
tctx, status, expected_status, ret, done,
talloc_asprintf(tctx, "Level %s failed\n",
file_levels_access[i].name));
smb2_util_close(tree, hfile);
/*
* Now open with expected access, getinfo should work.
*/
status = torture_smb2_testfile_access(
tree, fname, &hfile, file_levels_access[i].required_access);
torture_assert_ntstatus_ok_goto(
tctx, status, ret, done,
"Unable to open test file\n");
if (file_levels_access[i].level == RAW_FILEINFO_SEC_DESC) {
finfo.query_secdesc.in.secinfo_flags = 0x7;
}
if (file_levels_access[i].level == RAW_FILEINFO_SMB2_ALL_EAS) {
finfo.all_eas.in.continue_flags =
SMB2_CONTINUE_FLAG_RESTART;
}
finfo.generic.level = file_levels_access[i].level;
finfo.generic.in.file.handle = hfile;
status = smb2_getinfo_file(tree, tree, &finfo);
torture_assert_ntstatus_ok_goto(
tctx, status, ret, done,
talloc_asprintf(tctx, "%s on file",
file_levels_access[i].name));
smb2_util_close(tree, hfile);
}
done:
smb2_deltree(tree, fname);
return ret;
}
struct torture_suite *torture_smb2_getinfo_init(TALLOC_CTX *ctx)
{
struct torture_suite *suite = torture_suite_create(
ctx, "getinfo");
torture_suite_add_simple_test(suite, "complex", torture_smb2_getinfo);
torture_suite_add_simple_test(suite, "fsinfo", torture_smb2_fsinfo);
torture_suite_add_simple_test(suite, "qfs_buffercheck",
torture_smb2_qfs_buffercheck);
torture_suite_add_simple_test(suite, "qfile_buffercheck",
torture_smb2_qfile_buffercheck);
torture_suite_add_simple_test(suite, "qsec_buffercheck",
torture_smb2_qsec_buffercheck);
torture_suite_add_simple_test(suite, "granted",
torture_smb2_fileinfo_grant_read);
torture_suite_add_simple_test(suite, "normalized",
torture_smb2_fileinfo_normalized);
torture_suite_add_1smb2_test(suite, "getinfo_access",
torture_smb2_getfinfo_access);
return suite;
}