1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-06 13:18:07 +03:00
samba-mirror/source4/torture/smb2/connect.c
Swen Schillig a7e7a62f7d torture: fix mem leak found by ASAN (smb2_connect)
Direct leak of 96 byte(s) in 1 object(s) allocated from:
    #0 0x7f0b16624c08 in __interceptor_malloc (/lib64/libasan.so.5+0xefc08)
    #1 0x7f0b15e4ba5c in __talloc_with_prefix ../../lib/talloc/talloc.c:782
    #2 0x7f0b15e4ba5c in __talloc ../../lib/talloc/talloc.c:824
    #3 0x7f0b15e4ba5c in _talloc_named_const ../../lib/talloc/talloc.c:981
    #4 0x7f0b15e4ba5c in talloc_named_const ../../lib/talloc/talloc.c:1748
    #5 0x55ffdd30d591 in torture_smb2_connect ../../source4/torture/smb2/connect.c:199
    #6 0x7f0b12723772 in wrap_simple_test ../../lib/torture/torture.c:633
    #7 0x7f0b1272775e in internal_torture_run_test ../../lib/torture/torture.c:442
    #8 0x7f0b12728543 in torture_run_tcase_restricted ../../lib/torture/torture.c:507
    #9 0x7f0b12728dd5 in torture_run_suite_restricted ../../lib/torture/torture.c:357
    #10 0x7f0b12729434 in torture_run_suite ../../lib/torture/torture.c:339
    #11 0x55ffdd10c54a in run_matching ../../source4/torture/smbtorture.c:93
    #12 0x55ffdd10df56 in torture_run_named_tests ../../source4/torture/smbtorture.c:143
    #13 0x55ffdd11199d in main ../../source4/torture/smbtorture.c:691
    #14 0x7f0b0aa45412 in __libc_start_main (/lib64/libc.so.6+0x24412)

Signed-off-by: Swen Schillig <swen@linux.ibm.com>
Reviewed-by: Volker Lendecke <vl@samba.org>
Reviewed-by: Andreas Schneider <asn@samba.org>
Reviewed-by: Ralph Boehme <slow@samba.org>

Autobuild-User(master): Ralph Böhme <slow@samba.org>
Autobuild-Date(master): Wed Aug 21 15:42:43 UTC 2019 on sn-devel-184
2019-08-21 15:42:43 +00:00

258 lines
7.5 KiB
C

/*
Unix SMB/CIFS implementation.
test suite for SMB2 connection operations
Copyright (C) Andrew Tridgell 2005
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "libcli/smb2/smb2.h"
#include "libcli/smb2/smb2_calls.h"
#include "torture/torture.h"
#include "torture/smb2/proto.h"
/*
send a close
*/
static NTSTATUS torture_smb2_close(struct torture_context *tctx,
struct smb2_tree *tree,
struct smb2_handle handle)
{
struct smb2_close io;
NTSTATUS status;
TALLOC_CTX *tmp_ctx = talloc_new(tree);
ZERO_STRUCT(io);
io.in.file.handle = handle;
io.in.flags = SMB2_CLOSE_FLAGS_FULL_INFORMATION;
status = smb2_close(tree, &io);
if (!NT_STATUS_IS_OK(status)) {
torture_comment(tctx, "close failed - %s\n", nt_errstr(status));
return status;
}
if (DEBUGLVL(1)) {
torture_comment(tctx, "Close gave:\n");
torture_comment(tctx, "create_time = %s\n", nt_time_string(tmp_ctx, io.out.create_time));
torture_comment(tctx, "access_time = %s\n", nt_time_string(tmp_ctx, io.out.access_time));
torture_comment(tctx, "write_time = %s\n", nt_time_string(tmp_ctx, io.out.write_time));
torture_comment(tctx, "change_time = %s\n", nt_time_string(tmp_ctx, io.out.change_time));
torture_comment(tctx, "alloc_size = %lld\n", (long long)io.out.alloc_size);
torture_comment(tctx, "size = %lld\n", (long long)io.out.size);
torture_comment(tctx, "file_attr = 0x%x\n", io.out.file_attr);
}
talloc_free(tmp_ctx);
return status;
}
/*
test writing
*/
static NTSTATUS torture_smb2_write(struct torture_context *tctx, struct smb2_tree *tree, struct smb2_handle handle)
{
struct smb2_write w;
struct smb2_read r;
struct smb2_flush f;
NTSTATUS status;
DATA_BLOB data;
int i;
uint32_t size = torture_setting_int(tctx, "smb2maxwrite", 64*1024);
data = data_blob_talloc(tree, NULL, size);
if (size != data.length) {
torture_comment(tctx, "data_blob_talloc(%u) failed\n", (unsigned int)size);
return NT_STATUS_NO_MEMORY;
}
for (i=0;i<data.length;i++) {
data.data[i] = i;
}
ZERO_STRUCT(w);
w.in.file.handle = handle;
w.in.offset = 0;
w.in.data = data;
status = smb2_write(tree, &w);
if (!NT_STATUS_IS_OK(status)) {
torture_comment(tctx, "write 1 failed - %s\n", nt_errstr(status));
return status;
}
torture_smb2_all_info(tctx, tree, handle);
status = smb2_write(tree, &w);
if (!NT_STATUS_IS_OK(status)) {
torture_comment(tctx, "write 2 failed - %s\n", nt_errstr(status));
return status;
}
torture_smb2_all_info(tctx, tree, handle);
ZERO_STRUCT(f);
f.in.file.handle = handle;
status = smb2_flush(tree, &f);
if (!NT_STATUS_IS_OK(status)) {
torture_comment(tctx, "flush failed - %s\n", nt_errstr(status));
return status;
}
ZERO_STRUCT(r);
r.in.file.handle = handle;
r.in.length = data.length;
r.in.offset = 0;
status = smb2_read(tree, tree, &r);
if (!NT_STATUS_IS_OK(status)) {
torture_comment(tctx, "read failed - %s\n", nt_errstr(status));
return status;
}
if (data.length != r.out.data.length ||
memcmp(data.data, r.out.data.data, data.length) != 0) {
torture_comment(tctx, "read data mismatch\n");
return NT_STATUS_NET_WRITE_FAULT;
}
return status;
}
/*
send a create
*/
NTSTATUS torture_smb2_createfile(struct torture_context *tctx,
struct smb2_tree *tree,
const char *fname,
struct smb2_handle *handle)
{
struct smb2_create io;
NTSTATUS status;
TALLOC_CTX *tmp_ctx = talloc_new(tree);
ZERO_STRUCT(io);
io.in.oplock_level = 0;
io.in.desired_access = SEC_RIGHTS_FILE_ALL;
io.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
io.in.share_access =
NTCREATEX_SHARE_ACCESS_DELETE|
NTCREATEX_SHARE_ACCESS_READ|
NTCREATEX_SHARE_ACCESS_WRITE;
io.in.create_options = NTCREATEX_OPTIONS_WRITE_THROUGH;
io.in.fname = fname;
status = smb2_create(tree, tmp_ctx, &io);
if (!NT_STATUS_IS_OK(status)) {
TALLOC_FREE(tmp_ctx);
torture_comment(tctx, "create1 failed - %s\n", nt_errstr(status));
return status;
}
if (DEBUGLVL(1)) {
torture_comment(tctx, "Open gave:\n");
torture_comment(tctx, "oplock_flags = 0x%x\n", io.out.oplock_level);
torture_comment(tctx, "create_action = 0x%x\n", io.out.create_action);
torture_comment(tctx, "create_time = %s\n", nt_time_string(tmp_ctx, io.out.create_time));
torture_comment(tctx, "access_time = %s\n", nt_time_string(tmp_ctx, io.out.access_time));
torture_comment(tctx, "write_time = %s\n", nt_time_string(tmp_ctx, io.out.write_time));
torture_comment(tctx, "change_time = %s\n", nt_time_string(tmp_ctx, io.out.change_time));
torture_comment(tctx, "alloc_size = %lld\n", (long long)io.out.alloc_size);
torture_comment(tctx, "size = %lld\n", (long long)io.out.size);
torture_comment(tctx, "file_attr = 0x%x\n", io.out.file_attr);
torture_comment(tctx, "handle = %016llx%016llx\n",
(long long)io.out.file.handle.data[0],
(long long)io.out.file.handle.data[1]);
}
talloc_free(tmp_ctx);
*handle = io.out.file.handle;
return NT_STATUS_OK;
}
/*
basic testing of SMB2 connection calls
*/
bool torture_smb2_connect(struct torture_context *tctx)
{
TALLOC_CTX *mem_ctx = talloc_new(tctx);
struct smb2_tree *tree;
struct smb2_request *req;
struct smb2_handle h1, h2;
NTSTATUS status;
bool ok;
ok = torture_smb2_connection(tctx, &tree);
torture_assert(tctx, ok, "torture_smb2_connection failed");
smb2_util_unlink(tree, "test9.dat");
status = torture_smb2_createfile(tctx, tree, "test9.dat", &h1);
torture_assert_ntstatus_ok(tctx, status, "create failed");
status = torture_smb2_createfile(tctx, tree, "test9.dat", &h2);
torture_assert_ntstatus_ok(tctx, status, "create failed");
status = torture_smb2_write(tctx, tree, h1);
torture_assert_ntstatus_ok(tctx, status, "write failed");
status = torture_smb2_close(tctx, tree, h1);
torture_assert_ntstatus_ok(tctx, status, "close failed");
status = torture_smb2_close(tctx, tree, h2);
torture_assert_ntstatus_ok(tctx, status, "close failed");
status = smb2_util_close(tree, h1);
torture_assert_ntstatus_equal(tctx, status, NT_STATUS_FILE_CLOSED,
"close should have closed the handle");
status = smb2_tdis(tree);
torture_assert_ntstatus_ok(tctx, status, "tdis failed");
status = smb2_tdis(tree);
torture_assert_ntstatus_equal(tctx, status,
NT_STATUS_NETWORK_NAME_DELETED,
"tdis should have closed the tcon");
status = smb2_logoff(tree->session);
torture_assert_ntstatus_ok(tctx, status, "logoff failed");
req = smb2_logoff_send(tree->session);
torture_assert_not_null(tctx, req, "smb2_logoff_send failed");
req->session = NULL;
status = smb2_logoff_recv(req);
torture_assert_ntstatus_equal(tctx, status, NT_STATUS_USER_SESSION_DELETED,
"logoff should have disabled session");
status = smb2_keepalive(tree->session->transport);
torture_assert_ntstatus_ok(tctx, status, "keepalive failed");
talloc_free(mem_ctx);
return true;
}