summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMichael Adam <obnox@samba.org>2011-10-29 17:28:38 +0200
committerMichael Adam <obnox@samba.org>2011-10-30 20:17:16 +0100
commita354758da50d09341bbea237548de52e3821a198 (patch)
treedd521560229bc58448a375889ab00fc00c925e65
parent976f9806c9255202bd3c3d2f927d2d854f7034f8 (diff)
downloadsamba-a354758da50d09341bbea237548de52e3821a198.tar.gz
samba-a354758da50d09341bbea237548de52e3821a198.tar.bz2
samba-a354758da50d09341bbea237548de52e3821a198.zip
s4:torture:smb2: add durable_open_basic2 test: test durable open against all lease types
Autobuild-User: Michael Adam <obnox@samba.org> Autobuild-Date: Sun Oct 30 20:17:16 CET 2011 on sn-devel-104
-rw-r--r--source4/torture/smb2/durable_open.c146
1 files changed, 146 insertions, 0 deletions
diff --git a/source4/torture/smb2/durable_open.c b/source4/torture/smb2/durable_open.c
index 00a7f6b418..33ce1e9cd3 100644
--- a/source4/torture/smb2/durable_open.c
+++ b/source4/torture/smb2/durable_open.c
@@ -50,6 +50,28 @@
} while(0)
+static inline uint32_t map_lease(const char *ls)
+{
+ uint32_t val = 0;
+ int i;
+
+ for (i = 0; i < strlen(ls); i++) {
+ switch (ls[i]) {
+ case 'R':
+ val |= SMB2_LEASE_READ;
+ break;
+ case 'H':
+ val |= SMB2_LEASE_HANDLE;
+ break;
+ case 'W':
+ val |= SMB2_LEASE_WRITE;
+ break;
+ }
+ }
+
+ return val;
+}
+
/**
* basic durable_open test.
* durable state should only be granted when requested
@@ -159,6 +181,129 @@ done:
return ret;
}
+/**
+ * basic durable_open test.
+ * durable state should only be granted when requested
+ * along with a batch oplock or a handle lease.
+ *
+ * This test tests durable open with all valid lease types.
+ */
+
+struct durable_open_vs_lease {
+ const char *type;
+ bool expected;
+};
+
+#define NUM_LEASE_OPEN_TESTS 5
+struct durable_open_vs_lease durable_open_vs_lease_table[NUM_LEASE_OPEN_TESTS] =
+{
+ { "", false },
+ { "R", false },
+ { "RW", false },
+ { "RH", true },
+ { "RHW", true },
+};
+
+static bool test_one_durable_open_basic2(struct torture_context *tctx,
+ struct smb2_tree *tree,
+ const char *fname,
+ struct smb2_create io,
+ struct durable_open_vs_lease test)
+{
+ NTSTATUS status;
+ TALLOC_CTX *mem_ctx = talloc_new(tctx);
+ struct smb2_handle _h;
+ struct smb2_handle *h = NULL;
+ bool ret = true;
+ struct smb2_lease ls;
+ uint64_t lease;
+
+ smb2_util_unlink(tree, fname);
+
+ io.in.fname = fname;
+ io.in.oplock_level = SMB2_OPLOCK_LEVEL_LEASE;
+
+ lease = random();
+
+ ZERO_STRUCT(ls);
+ ls.lease_key.data[0] = lease;
+ ls.lease_key.data[1] = ~lease;
+ ls.lease_state = map_lease(test.type);
+ io.in.lease_request = &ls;
+
+ status = smb2_create(tree, mem_ctx, &io);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ _h = io.out.file.handle;
+ h = &_h;
+ CHECK_CREATED(&io, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+ CHECK_VAL(io.out.durable_open, test.expected);
+ CHECK_VAL(io.out.oplock_level, SMB2_OPLOCK_LEVEL_LEASE);
+ CHECK_VAL(io.out.lease_response.lease_key.data[0], lease);
+ CHECK_VAL(io.out.lease_response.lease_key.data[1], ~lease);
+ CHECK_VAL(io.out.lease_response.lease_state, map_lease(test.type));
+done:
+ if (h != NULL) {
+ smb2_util_close(tree, *h);
+ }
+ smb2_util_unlink(tree, fname);
+ talloc_free(mem_ctx);
+
+ return ret;
+}
+
+bool test_durable_open_basic2(struct torture_context *tctx,
+ struct smb2_tree *tree)
+{
+ TALLOC_CTX *mem_ctx = talloc_new(tctx);
+ struct smb2_create io;
+ char fname[256];
+ bool ret = true;
+ int i;
+
+ /* Choose a random name in case the state is left a little funky. */
+ snprintf(fname, 256, "durable_open_basic2_%s.dat", generate_random_str(tctx, 8));
+
+ smb2_util_unlink(tree, fname);
+
+ ZERO_STRUCT(io);
+ io.in.security_flags = 0x00;
+ io.in.impersonation_level = NTCREATEX_IMPERSONATION_IMPERSONATION;
+ io.in.create_flags = 0x00000000;
+ io.in.reserved = 0x00000000;
+ io.in.desired_access = SEC_RIGHTS_FILE_ALL;
+ io.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
+ io.in.share_access = NTCREATEX_SHARE_ACCESS_READ |
+ NTCREATEX_SHARE_ACCESS_WRITE |
+ NTCREATEX_SHARE_ACCESS_DELETE;
+ io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
+ io.in.create_options = NTCREATEX_OPTIONS_SEQUENTIAL_ONLY |
+ NTCREATEX_OPTIONS_ASYNC_ALERT |
+ NTCREATEX_OPTIONS_NON_DIRECTORY_FILE |
+ 0x00200000;
+ io.in.durable_open = true;
+ io.in.fname = fname;
+
+ /* test various oplock levels with durable open */
+
+ for (i = 0; i < NUM_LEASE_OPEN_TESTS; i++) {
+ ret = test_one_durable_open_basic2(tctx,
+ tree,
+ fname,
+ io,
+ durable_open_vs_lease_table[i]);
+ if (ret == false) {
+ goto done;
+ }
+ }
+
+done:
+ smb2_util_unlink(tree, fname);
+ talloc_free(tree);
+ talloc_free(mem_ctx);
+
+ return ret;
+}
+
/*
basic testing of SMB2 durable opens
regarding the position information on the handle
@@ -723,6 +868,7 @@ struct torture_suite *torture_smb2_durable_open_init(void)
torture_suite_create(talloc_autofree_context(), "durable-open");
torture_suite_add_1smb2_test(suite, "basic1", test_durable_open_basic1);
+ torture_suite_add_1smb2_test(suite, "basic2", test_durable_open_basic2);
torture_suite_add_2smb2_test(suite, "file-position",
test_durable_open_file_position);
torture_suite_add_2smb2_test(suite, "oplock", test_durable_open_oplock);