summaryrefslogtreecommitdiff
path: root/source4/torture/smb2/ioctl.c
diff options
context:
space:
mode:
authorDavid Disseldorp <ddiss@suse.de>2011-09-27 16:40:20 +0200
committerDavid Disseldorp <ddiss@samba.org>2011-10-31 17:55:05 +0100
commit8abaafadde887a22e803f93b3b801b732495ad98 (patch)
treefffbdda3b9ad8e7375bf96bd4fcf6b833f112687 /source4/torture/smb2/ioctl.c
parent2e1168d0a84d49b7858725d580491e970d6b4f64 (diff)
downloadsamba-8abaafadde887a22e803f93b3b801b732495ad98.tar.gz
samba-8abaafadde887a22e803f93b3b801b732495ad98.tar.bz2
samba-8abaafadde887a22e803f93b3b801b732495ad98.zip
s4-torture: Add tests for the smb2 copychunk ioctl
Add idls for parsing of copychunk ioctl args. Signed-off-by: Stefan Metzmacher <metze@samba.org>
Diffstat (limited to 'source4/torture/smb2/ioctl.c')
-rw-r--r--source4/torture/smb2/ioctl.c173
1 files changed, 172 insertions, 1 deletions
diff --git a/source4/torture/smb2/ioctl.c b/source4/torture/smb2/ioctl.c
index 169a001f31..67dabe8737 100644
--- a/source4/torture/smb2/ioctl.c
+++ b/source4/torture/smb2/ioctl.c
@@ -25,8 +25,10 @@
#include "libcli/smb2/smb2_calls.h"
#include "torture/torture.h"
#include "torture/smb2/proto.h"
+#include "librpc/gen_ndr/ndr_ioctl.h"
-#define FNAME "testfsctl.dat"
+#define FNAME "testfsctl.dat"
+#define FNAME2 "testfsctl2.dat"
/*
basic testing of SMB2 shadow copy calls
@@ -72,6 +74,173 @@ static bool test_ioctl_get_shadow_copy(struct torture_context *torture,
}
/*
+ basic testing of the SMB2 server side copy ioctls
+*/
+static bool test_ioctl_req_resume_key(struct torture_context *torture,
+ struct smb2_tree *tree)
+{
+ struct smb2_handle h;
+ uint8_t buf[100];
+ NTSTATUS status;
+ union smb_ioctl ioctl;
+ TALLOC_CTX *tmp_ctx = talloc_new(tree);
+ struct req_resume_key_rsp res_key;
+ enum ndr_err_code ndr_ret;
+
+ smb2_util_unlink(tree, FNAME);
+
+ status = torture_smb2_testfile(tree, FNAME, &h);
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("create write\n");
+ return false;
+ }
+
+ ZERO_ARRAY(buf);
+ status = smb2_util_write(tree, h, buf, 0, ARRAY_SIZE(buf));
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("failed write\n");
+ return false;
+ }
+
+ ZERO_STRUCT(ioctl);
+ ioctl.smb2.level = RAW_IOCTL_SMB2;
+ ioctl.smb2.in.file.handle = h;
+ ioctl.smb2.in.function = FSCTL_SRV_REQUEST_RESUME_KEY;
+ ioctl.smb2.in.max_response_size = 32;
+ ioctl.smb2.in.flags = SMB2_IOCTL_FLAG_IS_FSCTL;
+
+ status = smb2_ioctl(tree, tmp_ctx, &ioctl.smb2);
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("FSCTL_SRV_REQUEST_RESUME_KEY failed\n");
+ return false;
+ }
+
+ ndr_ret = ndr_pull_struct_blob(&ioctl.smb2.out.out, tmp_ctx, &res_key,
+ (ndr_pull_flags_fn_t)ndr_pull_req_resume_key_rsp);
+ if (ndr_ret != NDR_ERR_SUCCESS) {
+ return false;
+ }
+
+ ndr_print_debug((ndr_print_fn_t)ndr_print_req_resume_key_rsp, "yo", &res_key);
+
+ talloc_free(tmp_ctx);
+ return true;
+}
+
+static bool test_ioctl_copy_chunk(struct torture_context *torture,
+ struct smb2_tree *tree)
+{
+ struct smb2_handle h;
+ struct smb2_handle h2;
+ uint8_t buf[100];
+ NTSTATUS status;
+ union smb_ioctl ioctl;
+ TALLOC_CTX *tmp_ctx = talloc_new(tree);
+ struct req_resume_key_rsp res_key;
+ struct srv_copychunk chunk;
+ struct srv_copychunk_copy cc_copy;
+ struct srv_copychunk_rsp cc_rsp;
+ enum ndr_err_code ndr_ret;
+
+ smb2_util_unlink(tree, FNAME);
+ smb2_util_unlink(tree, FNAME2);
+
+ status = torture_smb2_testfile(tree, FNAME, &h);
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("create write\n");
+ return false;
+ }
+
+ ZERO_ARRAY(buf);
+ status = smb2_util_write(tree, h, buf, 0, ARRAY_SIZE(buf));
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("failed write\n");
+ return false;
+ }
+
+ ZERO_STRUCT(ioctl);
+ ioctl.smb2.level = RAW_IOCTL_SMB2;
+ ioctl.smb2.in.file.handle = h;
+ ioctl.smb2.in.function = FSCTL_SRV_REQUEST_RESUME_KEY;
+ /* Allow for Key + ContextLength + Context */
+ ioctl.smb2.in.max_response_size = 32;
+ ioctl.smb2.in.flags = SMB2_IOCTL_FLAG_IS_FSCTL;
+
+ status = smb2_ioctl(tree, tmp_ctx, &ioctl.smb2);
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("FSCTL_SRV_REQUEST_RESUME_KEY failed\n");
+ return false;
+ }
+
+ ndr_ret = ndr_pull_struct_blob(&ioctl.smb2.out.out, tmp_ctx, &res_key,
+ (ndr_pull_flags_fn_t)ndr_pull_req_resume_key_rsp);
+ if (ndr_ret != NDR_ERR_SUCCESS) {
+ return false;
+ }
+
+ status = torture_smb2_testfile(tree, FNAME2, &h2);
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("create write\n");
+ return false;
+ }
+
+ ZERO_STRUCT(ioctl);
+ ioctl.smb2.level = RAW_IOCTL_SMB2;
+ ioctl.smb2.in.file.handle = h2;
+ ioctl.smb2.in.function = FSCTL_SRV_COPYCHUNK;
+ ioctl.smb2.in.max_response_size = 12; /* FIXME */
+ ioctl.smb2.in.flags = SMB2_IOCTL_FLAG_IS_FSCTL;
+
+ ZERO_STRUCT(chunk);
+ chunk.source_off = 0;
+ chunk.target_off = 0;
+ chunk.length = 100;
+
+ ZERO_STRUCT(cc_copy);
+ memcpy(cc_copy.source_key, res_key.resume_key, ARRAY_SIZE(cc_copy.source_key));
+ cc_copy.chunk_count = 1;
+ cc_copy.chunks = &chunk;
+
+ ndr_ret = ndr_push_struct_blob(&ioctl.smb2.in.out, tmp_ctx,
+ &cc_copy,
+ (ndr_push_flags_fn_t)ndr_push_srv_copychunk_copy);
+ if (ndr_ret != NDR_ERR_SUCCESS) {
+ return false;
+ }
+
+ /* request a copy of all src file data (via a single chunk desc) */
+ status = smb2_ioctl(tree, tmp_ctx, &ioctl.smb2);
+ if (!NT_STATUS_IS_OK(status)) {
+ printf("FSCTL_SRV_COPYCHUNK failed\n");
+ return false;
+ }
+
+ ndr_ret = ndr_pull_struct_blob(&ioctl.smb2.out.out, tmp_ctx,
+ &cc_rsp,
+ (ndr_pull_flags_fn_t)ndr_pull_srv_copychunk_rsp);
+ if (ndr_ret != NDR_ERR_SUCCESS) {
+ return false;
+ }
+ if (cc_rsp.chunks_written != 1) {
+ printf("fail, expected 1 chunk, got %u\n", cc_rsp.chunks_written);
+ return false;
+ }
+ if (cc_rsp.chunk_bytes_written != 0) {
+ printf("fail, expected 0 chunk bytes remaining, got %u\n",
+ cc_rsp.chunk_bytes_written);
+ return false;
+ }
+ if (cc_rsp.total_bytes_written != 100) {
+ printf("fail, expected 100 total bytes, got %u\n",
+ cc_rsp.total_bytes_written);
+ return false;
+ }
+
+ talloc_free(tmp_ctx);
+ return true;
+}
+
+/*
basic testing of SMB2 ioctls
*/
struct torture_suite *torture_smb2_ioctl_init(void)
@@ -79,6 +248,8 @@ struct torture_suite *torture_smb2_ioctl_init(void)
struct torture_suite *suite = torture_suite_create(talloc_autofree_context(), "ioctl");
torture_suite_add_1smb2_test(suite, "shadow_copy", test_ioctl_get_shadow_copy);
+ torture_suite_add_1smb2_test(suite, "req_resume_key", test_ioctl_req_resume_key);
+ torture_suite_add_1smb2_test(suite, "copy_chunk", test_ioctl_copy_chunk);
suite->description = talloc_strdup(suite, "SMB2-IOCTL tests");