/* Unix SMB/CIFS implementation. SMB torture tester Copyright (C) Andrew Tridgell 1997-1998 Copyright (C) Jeremy Allison 2009 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "includes.h" #include "nsswitch/libwbclient/wbc_async.h" #include "torture/proto.h" #include "libcli/security/security.h" #include "tldap.h" #include "tldap_util.h" #include "../librpc/gen_ndr/svcctl.h" #include "memcache.h" #include "nsswitch/winbind_client.h" #include "dbwrap.h" #include "talloc_dict.h" #include "async_smb.h" extern char *optarg; extern int optind; static fstring host, workgroup, share, password, username, myname; static int max_protocol = PROTOCOL_NT1; static const char *sockops="TCP_NODELAY"; static int nprocs=1; static int port_to_use=0; int torture_numops=100; int torture_blocksize=1024*1024; static int procnum; /* records process count number when forking */ static struct cli_state *current_cli; static fstring randomfname; static bool use_oplocks; static bool use_level_II_oplocks; static const char *client_txt = "client_oplocks.txt"; static bool use_kerberos; static fstring multishare_conn_fname; static bool use_multishare_conn = False; static bool do_encrypt; static const char *local_path = NULL; static int signing_state = Undefined; bool torture_showall = False; static double create_procs(bool (*fn)(int), bool *result); /* return a pointer to a anonymous shared memory segment of size "size" which will persist across fork() but will disappear when all processes exit The memory is not zeroed This function uses system5 shared memory. It takes advantage of a property that the memory is not destroyed if it is attached when the id is removed */ void *shm_setup(int size) { int shmid; void *ret; #ifdef __QNXNTO__ shmid = shm_open("private", O_RDWR | O_CREAT | O_EXCL, S_IRUSR | S_IWUSR); if (shmid == -1) { printf("can't get shared memory\n"); exit(1); } shm_unlink("private"); if (ftruncate(shmid, size) == -1) { printf("can't set shared memory size\n"); exit(1); } ret = mmap(0, size, PROT_READ | PROT_WRITE, MAP_SHARED, shmid, 0); if (ret == MAP_FAILED) { printf("can't map shared memory\n"); exit(1); } #else shmid = shmget(IPC_PRIVATE, size, S_IRUSR | S_IWUSR); if (shmid == -1) { printf("can't get shared memory\n"); exit(1); } ret = (void *)shmat(shmid, 0, 0); if (!ret || ret == (void *)-1) { printf("can't attach to shared memory\n"); return NULL; } /* the following releases the ipc, but note that this process and all its children will still have access to the memory, its just that the shmid is no longer valid for other shm calls. This means we don't leave behind lots of shm segments after we exit See Stevens "advanced programming in unix env" for details */ shmctl(shmid, IPC_RMID, 0); #endif return ret; } /******************************************************************** Ensure a connection is encrypted. ********************************************************************/ static bool force_cli_encryption(struct cli_state *c, const char *sharename) { uint16 major, minor; uint32 caplow, caphigh; NTSTATUS status; if (!SERVER_HAS_UNIX_CIFS(c)) { d_printf("Encryption required and " "server that doesn't support " "UNIX extensions - failing connect\n"); return false; } status = cli_unix_extensions_version(c, &major, &minor, &caplow, &caphigh); if (!NT_STATUS_IS_OK(status)) { d_printf("Encryption required and " "can't get UNIX CIFS extensions " "version from server: %s\n", nt_errstr(status)); return false; } if (!(caplow & CIFS_UNIX_TRANSPORT_ENCRYPTION_CAP)) { d_printf("Encryption required and " "share %s doesn't support " "encryption.\n", sharename); return false; } if (c->use_kerberos) { status = cli_gss_smb_encryption_start(c); } else { status = cli_raw_ntlm_smb_encryption_start(c, username, password, workgroup); } if (!NT_STATUS_IS_OK(status)) { d_printf("Encryption required and " "setup failed with error %s.\n", nt_errstr(status)); return false; } return true; } static struct cli_state *open_nbt_connection(void) { struct nmb_name called, calling; struct sockaddr_storage ss; struct cli_state *c; NTSTATUS status; make_nmb_name(&calling, myname, 0x0); make_nmb_name(&called , host, 0x20); zero_sockaddr(&ss); if (!(c = cli_initialise_ex(signing_state))) { printf("Failed initialize cli_struct to connect with %s\n", host); return NULL; } c->port = port_to_use; status = cli_connect(c, host, &ss); if (!NT_STATUS_IS_OK(status)) { printf("Failed to connect with %s. Error %s\n", host, nt_errstr(status) ); return NULL; } c->use_kerberos = use_kerberos; c->timeout = 120000; /* set a really long timeout (2 minutes) */ if (use_oplocks) c->use_oplocks = True; if (use_level_II_oplocks) c->use_level_II_oplocks = True; if (!cli_session_request(c, &calling, &called)) { /* * Well, that failed, try *SMBSERVER ... * However, we must reconnect as well ... */ status = cli_connect(c, host, &ss); if (!NT_STATUS_IS_OK(status)) { printf("Failed to connect with %s. Error %s\n", host, nt_errstr(status) ); return NULL; } make_nmb_name(&called, "*SMBSERVER", 0x20); if (!cli_session_request(c, &calling, &called)) { printf("%s rejected the session\n",host); printf("We tried with a called name of %s & %s\n", host, "*SMBSERVER"); cli_shutdown(c); return NULL; } } return c; } /**************************************************************************** Send a corrupt session request. See rfc1002.txt 4.3 and 4.3.2. ****************************************************************************/ static bool cli_bad_session_request(struct cli_state *cli, struct nmb_name *calling, struct nmb_name *called) { char *p; int len = 4; int namelen = 0; char *tmp; memcpy(&(cli->calling), calling, sizeof(*calling)); memcpy(&(cli->called ), called , sizeof(*called )); /* put in the destination name */ tmp = name_mangle(talloc_tos(), cli->called.name, cli->called.name_type); if (tmp == NULL) { return false; } p = cli->outbuf+len; namelen = name_len((unsigned char *)tmp, talloc_get_size(tmp)); if (namelen > 0) { memcpy(p, tmp, namelen); len += namelen; } TALLOC_FREE(tmp); /* Deliberately corrupt the name len (first byte) */ *p = 100; /* and my name */ tmp = name_mangle(talloc_tos(), cli->calling.name, cli->calling.name_type); if (tmp == NULL) { return false; } p = cli->outbuf+len; namelen = name_len((unsigned char *)tmp, talloc_get_size(tmp)); if (namelen > 0) { memcpy(p, tmp, namelen); len += namelen; } TALLOC_FREE(tmp); /* Deliberately corrupt the name len (first byte) */ *p = 100; /* send a session request (RFC 1002) */ /* setup the packet length * Remove four bytes from the length count, since the length * field in the NBT Session Service header counts the number * of bytes which follow. The cli_send_smb() function knows * about this and accounts for those four bytes. * CRH. */ len -= 4; _smb_setlen(cli->outbuf,len); SCVAL(cli->outbuf,0,0x81); cli_send_smb(cli); DEBUG(5,("Sent session request\n")); if (!cli_receive_smb(cli)) return False; if (CVAL(cli->inbuf,0) != 0x82) { /* This is the wrong place to put the error... JRA. */ cli->rap_error = CVAL(cli->inbuf,4); return False; } return(True); } static struct cli_state *open_bad_nbt_connection(void) { struct nmb_name called, calling; struct sockaddr_storage ss; struct cli_state *c; NTSTATUS status; make_nmb_name(&calling, myname, 0x0); make_nmb_name(&called , host, 0x20); zero_sockaddr(&ss); if (!(c = cli_initialise_ex(signing_state))) { printf("Failed initialize cli_struct to connect with %s\n", host); return NULL; } c->port = 139; status = cli_connect(c, host, &ss); if (!NT_STATUS_IS_OK(status)) { printf("Failed to connect with %s. Error %s\n", host, nt_errstr(status) ); return NULL; } c->timeout = 4000; /* set a short timeout (4 seconds) */ if (!cli_bad_session_request(c, &calling, &called)) { printf("Failed to connect with %s. Error %s\n", host, nt_errstr(status) ); return NULL; } return c; } /* Insert a NULL at the first separator of the given path and return a pointer * to the remainder of the string. */ static char * terminate_path_at_separator(char * path) { char * p; if (!path) { return NULL; } if ((p = strchr_m(path, '/'))) { *p = '\0'; return p + 1; } if ((p = strchr_m(path, '\\'))) { *p = '\0'; return p + 1; } /* No separator. */ return NULL; } /* parse a //server/share type UNC name */ bool smbcli_parse_unc(const char *unc_name, TALLOC_CTX *mem_ctx, char **hostname, char **sharename) { char *p; *hostname = *sharename = NULL; if (strncmp(unc_name, "\\\\", 2) && strncmp(unc_name, "//", 2)) { return False; } *hostname = talloc_strdup(mem_ctx, &unc_name[2]); p = terminate_path_at_separator(*hostname); if (p && *p) { *sharename = talloc_strdup(mem_ctx, p); terminate_path_at_separator(*sharename); } if (*hostname && *sharename) { return True; } TALLOC_FREE(*hostname); TALLOC_FREE(*sharename); return False; } static bool torture_open_connection_share(struct cli_state **c, const char *hostname, const char *sharename) { bool retry; int flags = 0; NTSTATUS status; if (use_kerberos) flags |= CLI_FULL_CONNECTION_USE_KERBEROS; if (use_oplocks) flags |= CLI_FULL_CONNECTION_OPLOCKS; if (use_level_II_oplocks) flags |= CLI_FULL_CONNECTION_LEVEL_II_OPLOCKS; status = cli_full_connection(c, myname, hostname, NULL, port_to_use, sharename, "?????", username, workgroup, password, flags, signing_state, &retry); if (!NT_STATUS_IS_OK(status)) { printf("failed to open share connection: //%s/%s port:%d - %s\n", hostname, sharename, port_to_use, nt_errstr(status)); return False; } (*c)->timeout = 120000; /* set a really long timeout (2 minutes) */ if (do_encrypt) { return force_cli_encryption(*c, sharename); } return True; } bool torture_open_connection(struct cli_state **c, int conn_index) { char **unc_list = NULL; int num_unc_names = 0; bool result; if (use_multishare_conn==True) { char *h, *s; unc_list = file_lines_load(multishare_conn_fname, &num_unc_names, 0, NULL); if (!unc_list || num_unc_names <= 0) { printf("Failed to load unc names list from '%s'\n", multishare_conn_fname); exit(1); } if (!smbcli_parse_unc(unc_list[conn_index % num_unc_names], NULL, &h, &s)) { printf("Failed to parse UNC name %s\n", unc_list[conn_index % num_unc_names]); TALLOC_FREE(unc_list); exit(1); } result = torture_open_connection_share(c, h, s); /* h, s were copied earlier */ TALLOC_FREE(unc_list); return result; } return torture_open_connection_share(c, host, share); } bool torture_cli_session_setup2(struct cli_state *cli, uint16 *new_vuid) { uint16 old_vuid = cli->vuid; fstring old_user_name; size_t passlen = strlen(password); NTSTATUS status; bool ret; fstrcpy(old_user_name, cli->user_name); cli->vuid = 0; ret = NT_STATUS_IS_OK(cli_session_setup(cli, username, password, passlen, password, passlen, workgroup)); *new_vuid = cli->vuid; cli->vuid = old_vuid; status = cli_set_username(cli, old_user_name); if (!NT_STATUS_IS_OK(status)) { return false; } return ret; } bool torture_close_connection(struct cli_state *c) { bool ret = True; NTSTATUS status; status = cli_tdis(c); if (!NT_STATUS_IS_OK(status)) { printf("tdis failed (%s)\n", nt_errstr(status)); ret = False; } cli_shutdown(c); return ret; } /* check if the server produced the expected error code */ static bool check_error(int line, struct cli_state *c, uint8 eclass, uint32 ecode, NTSTATUS nterr) { if (cli_is_dos_error(c)) { uint8 cclass; uint32 num; /* Check DOS error */ cli_dos_error(c, &cclass, &num); if (eclass != cclass || ecode != num) { printf("unexpected error code class=%d code=%d\n", (int)cclass, (int)num); printf(" expected %d/%d %s (line=%d)\n", (int)eclass, (int)ecode, nt_errstr(nterr), line); return False; } } else { NTSTATUS status; /* Check NT error */ status = cli_nt_error(c); if (NT_STATUS_V(nterr) != NT_STATUS_V(status)) { printf("unexpected error code %s\n", nt_errstr(status)); printf(" expected %s (line=%d)\n", nt_errstr(nterr), line); return False; } } return True; } static bool wait_lock(struct cli_state *c, int fnum, uint32 offset, uint32 len) { while (!cli_lock(c, fnum, offset, len, -1, WRITE_LOCK)) { if (!check_error(__LINE__, c, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; } return True; } static bool rw_torture(struct cli_state *c) { const char *lockfname = "\\torture.lck"; fstring fname; uint16_t fnum; uint16_t fnum2; pid_t pid2, pid = getpid(); int i, j; char buf[1024]; bool correct = True; NTSTATUS status; memset(buf, '\0', sizeof(buf)); status = cli_open(c, lockfname, O_RDWR | O_CREAT | O_EXCL, DENY_NONE, &fnum2); if (!NT_STATUS_IS_OK(status)) { status = cli_open(c, lockfname, O_RDWR, DENY_NONE, &fnum2); } if (!NT_STATUS_IS_OK(status)) { printf("open of %s failed (%s)\n", lockfname, cli_errstr(c)); return False; } for (i=0;i= countprev) { printf("%d %8d\r", i, count); fflush(stdout); i++; countprev += (sizeof(buf) / 20); } if (procnum == 0) { sent = ((unsigned)sys_random()%(20))+ 1; if (sent > sizeof(buf) - count) { sent = sizeof(buf) - count; } if (cli_write(c, fnum, 0, buf+count, count, (size_t)sent) != sent) { printf("write failed (%s)\n", cli_errstr(c)); correct = False; } } else { sent = cli_read(c, fnum, buf_rd+count, count, sizeof(buf)-count); if (sent < 0) { printf("read failed offset:%d size:%ld (%s)\n", count, (unsigned long)sizeof(buf)-count, cli_errstr(c)); correct = False; sent = 0; } if (sent > 0) { if (memcmp(buf_rd+count, buf+count, sent) != 0) { printf("read/write compare failed\n"); printf("offset: %d req %ld recvd %ld\n", count, (unsigned long)sizeof(buf)-count, (unsigned long)sent); correct = False; break; } } } } if (!NT_STATUS_IS_OK(cli_close(c, fnum))) { printf("close failed (%s)\n", cli_errstr(c)); correct = False; } return correct; } static bool rw_torture2(struct cli_state *c1, struct cli_state *c2) { const char *lockfname = "\\torture2.lck"; uint16_t fnum1; uint16_t fnum2; int i; char buf[131072]; char buf_rd[131072]; bool correct = True; ssize_t bytes_read; if (!NT_STATUS_IS_OK(cli_unlink(c1, lockfname, aSYSTEM | aHIDDEN))) { printf("unlink failed (%s) (normal, this file should not exist)\n", cli_errstr(c1)); } if (!NT_STATUS_IS_OK(cli_open(c1, lockfname, O_RDWR | O_CREAT | O_EXCL, DENY_NONE, &fnum1))) { printf("first open read/write of %s failed (%s)\n", lockfname, cli_errstr(c1)); return False; } if (!NT_STATUS_IS_OK(cli_open(c2, lockfname, O_RDONLY, DENY_NONE, &fnum2))) { printf("second open read-only of %s failed (%s)\n", lockfname, cli_errstr(c2)); cli_close(c1, fnum1); return False; } for (i=0;imax_xmit = max_xmit_k*1024; if (signing_state == Required) { /* Horrible cheat to force multiple signed outstanding packets against a Samba server. */ cli1->is_samba = false; } printf("starting readwritelarge_internal\n"); cli_unlink(cli1, lockfname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_open(cli1, lockfname, O_RDWR | O_CREAT | O_EXCL, DENY_NONE, &fnum1))) { printf("open read/write of %s failed (%s)\n", lockfname, cli_errstr(cli1)); return False; } cli_write(cli1, fnum1, 0, buf, 0, sizeof(buf)); if (!NT_STATUS_IS_OK(cli_qfileinfo_basic( cli1, fnum1, NULL, &fsize, NULL, NULL, NULL, NULL, NULL))) { printf("qfileinfo failed (%s)\n", cli_errstr(cli1)); correct = False; } if (fsize == sizeof(buf)) printf("readwritelarge_internal test 1 succeeded (size = %lx)\n", (unsigned long)fsize); else { printf("readwritelarge_internal test 1 failed (size = %lx)\n", (unsigned long)fsize); correct = False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close failed (%s)\n", cli_errstr(cli1)); correct = False; } if (!NT_STATUS_IS_OK(cli_unlink(cli1, lockfname, aSYSTEM | aHIDDEN))) { printf("unlink failed (%s)\n", cli_errstr(cli1)); correct = False; } if (!NT_STATUS_IS_OK(cli_open(cli1, lockfname, O_RDWR | O_CREAT | O_EXCL, DENY_NONE, &fnum1))) { printf("open read/write of %s failed (%s)\n", lockfname, cli_errstr(cli1)); return False; } cli1->max_xmit = 4*1024; cli_smbwrite(cli1, fnum1, buf, 0, sizeof(buf)); if (!NT_STATUS_IS_OK(cli_qfileinfo_basic( cli1, fnum1, NULL, &fsize, NULL, NULL, NULL, NULL, NULL))) { printf("qfileinfo failed (%s)\n", cli_errstr(cli1)); correct = False; } if (fsize == sizeof(buf)) printf("readwritelarge_internal test 2 succeeded (size = %lx)\n", (unsigned long)fsize); else { printf("readwritelarge_internal test 2 failed (size = %lx)\n", (unsigned long)fsize); correct = False; } #if 0 /* ToDo - set allocation. JRA */ if(!cli_set_allocation_size(cli1, fnum1, 0)) { printf("set allocation size to zero failed (%s)\n", cli_errstr(&cli1)); return False; } if (!cli_qfileinfo_basic(cli1, fnum1, NULL, &fsize, NULL, NULL, NULL, NULL, NULL)) { printf("qfileinfo failed (%s)\n", cli_errstr(cli1)); correct = False; } if (fsize != 0) printf("readwritelarge test 3 (truncate test) succeeded (size = %x)\n", fsize); #endif if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close failed (%s)\n", cli_errstr(cli1)); correct = False; } if (!torture_close_connection(cli1)) { correct = False; } return correct; } static bool run_readwritelarge(int dummy) { return run_readwritelarge_internal(128); } static bool run_readwritelarge_signtest(int dummy) { bool ret; signing_state = Required; ret = run_readwritelarge_internal(2); signing_state = Undefined; return ret; } int line_count = 0; int nbio_id; #define ival(s) strtol(s, NULL, 0) /* run a test that simulates an approximate netbench client load */ static bool run_netbench(int client) { struct cli_state *cli; int i; char line[1024]; char cname[20]; FILE *f; const char *params[20]; bool correct = True; cli = current_cli; nbio_id = client; cli_sockopt(cli, sockops); nb_setup(cli); slprintf(cname,sizeof(cname)-1, "client%d", client); f = fopen(client_txt, "r"); if (!f) { perror(client_txt); return False; } while (fgets(line, sizeof(line)-1, f)) { char *saveptr; line_count++; line[strlen(line)-1] = 0; /* printf("[%d] %s\n", line_count, line); */ all_string_sub(line,"client1", cname, sizeof(line)); /* parse the command parameters */ params[0] = strtok_r(line, " ", &saveptr); i = 0; while (params[i]) params[++i] = strtok_r(NULL, " ", &saveptr); params[i] = ""; if (i < 2) continue; if (!strncmp(params[0],"SMB", 3)) { printf("ERROR: You are using a dbench 1 load file\n"); exit(1); } if (!strcmp(params[0],"NTCreateX")) { nb_createx(params[1], ival(params[2]), ival(params[3]), ival(params[4])); } else if (!strcmp(params[0],"Close")) { nb_close(ival(params[1])); } else if (!strcmp(params[0],"Rename")) { nb_rename(params[1], params[2]); } else if (!strcmp(params[0],"Unlink")) { nb_unlink(params[1]); } else if (!strcmp(params[0],"Deltree")) { nb_deltree(params[1]); } else if (!strcmp(params[0],"Rmdir")) { nb_rmdir(params[1]); } else if (!strcmp(params[0],"QUERY_PATH_INFORMATION")) { nb_qpathinfo(params[1]); } else if (!strcmp(params[0],"QUERY_FILE_INFORMATION")) { nb_qfileinfo(ival(params[1])); } else if (!strcmp(params[0],"QUERY_FS_INFORMATION")) { nb_qfsinfo(ival(params[1])); } else if (!strcmp(params[0],"FIND_FIRST")) { nb_findfirst(params[1]); } else if (!strcmp(params[0],"WriteX")) { nb_writex(ival(params[1]), ival(params[2]), ival(params[3]), ival(params[4])); } else if (!strcmp(params[0],"ReadX")) { nb_readx(ival(params[1]), ival(params[2]), ival(params[3]), ival(params[4])); } else if (!strcmp(params[0],"Flush")) { nb_flush(ival(params[1])); } else { printf("Unknown operation %s\n", params[0]); exit(1); } } fclose(f); nb_cleanup(); if (!torture_close_connection(cli)) { correct = False; } return correct; } /* run a test that simulates an approximate netbench client load */ static bool run_nbench(int dummy) { double t; bool correct = True; nbio_shmem(nprocs); nbio_id = -1; signal(SIGALRM, nb_alarm); alarm(1); t = create_procs(run_netbench, &correct); alarm(0); printf("\nThroughput %g MB/sec\n", 1.0e-6 * nbio_total() / t); return correct; } /* This test checks for two things: 1) correct support for retaining locks over a close (ie. the server must not use posix semantics) 2) support for lock timeouts */ static bool run_locktest1(int dummy) { struct cli_state *cli1, *cli2; const char *fname = "\\lockt1.lck"; uint16_t fnum1, fnum2, fnum3; time_t t1, t2; unsigned lock_timeout; if (!torture_open_connection(&cli1, 0) || !torture_open_connection(&cli2, 1)) { return False; } cli_sockopt(cli1, sockops); cli_sockopt(cli2, sockops); printf("starting locktest1\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR, DENY_NONE, &fnum2))) { printf("open2 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_open(cli2, fname, O_RDWR, DENY_NONE, &fnum3))) { printf("open3 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } if (!cli_lock(cli1, fnum1, 0, 4, 0, WRITE_LOCK)) { printf("lock1 failed (%s)\n", cli_errstr(cli1)); return False; } if (cli_lock(cli2, fnum3, 0, 4, 0, WRITE_LOCK)) { printf("lock2 succeeded! This is a locking bug\n"); return False; } else { if (!check_error(__LINE__, cli2, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; } lock_timeout = (1 + (random() % 20)); printf("Testing lock timeout with timeout=%u\n", lock_timeout); t1 = time(NULL); if (cli_lock(cli2, fnum3, 0, 4, lock_timeout * 1000, WRITE_LOCK)) { printf("lock3 succeeded! This is a locking bug\n"); return False; } else { if (!check_error(__LINE__, cli2, ERRDOS, ERRlock, NT_STATUS_FILE_LOCK_CONFLICT)) return False; } t2 = time(NULL); if (ABS(t2 - t1) < lock_timeout-1) { printf("error: This server appears not to support timed lock requests\n"); } printf("server slept for %u seconds for a %u second timeout\n", (unsigned int)(t2-t1), lock_timeout); if (!NT_STATUS_IS_OK(cli_close(cli1, fnum2))) { printf("close1 failed (%s)\n", cli_errstr(cli1)); return False; } if (cli_lock(cli2, fnum3, 0, 4, 0, WRITE_LOCK)) { printf("lock4 succeeded! This is a locking bug\n"); return False; } else { if (!check_error(__LINE__, cli2, ERRDOS, ERRlock, NT_STATUS_FILE_LOCK_CONFLICT)) return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close2 failed (%s)\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli2, fnum3))) { printf("close3 failed (%s)\n", cli_errstr(cli2)); return False; } if (!NT_STATUS_IS_OK(cli_unlink(cli1, fname, aSYSTEM | aHIDDEN))) { printf("unlink failed (%s)\n", cli_errstr(cli1)); return False; } if (!torture_close_connection(cli1)) { return False; } if (!torture_close_connection(cli2)) { return False; } printf("Passed locktest1\n"); return True; } /* this checks to see if a secondary tconx can use open files from an earlier tconx */ static bool run_tcon_test(int dummy) { static struct cli_state *cli; const char *fname = "\\tcontest.tmp"; uint16 fnum1; uint16 cnum1, cnum2, cnum3; uint16 vuid1, vuid2; char buf[4]; bool ret = True; NTSTATUS status; memset(buf, '\0', sizeof(buf)); if (!torture_open_connection(&cli, 0)) { return False; } cli_sockopt(cli, sockops); printf("starting tcontest\n"); cli_unlink(cli, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_open(cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); return False; } cnum1 = cli->cnum; vuid1 = cli->vuid; if (cli_write(cli, fnum1, 0, buf, 130, 4) != 4) { printf("initial write failed (%s)", cli_errstr(cli)); return False; } status = cli_tcon_andx(cli, share, "?????", password, strlen(password)+1); if (!NT_STATUS_IS_OK(status)) { printf("%s refused 2nd tree connect (%s)\n", host, nt_errstr(status)); cli_shutdown(cli); return False; } cnum2 = cli->cnum; cnum3 = MAX(cnum1, cnum2) + 1; /* any invalid number */ vuid2 = cli->vuid + 1; /* try a write with the wrong tid */ cli->cnum = cnum2; if (cli_write(cli, fnum1, 0, buf, 130, 4) == 4) { printf("* server allows write with wrong TID\n"); ret = False; } else { printf("server fails write with wrong TID : %s\n", cli_errstr(cli)); } /* try a write with an invalid tid */ cli->cnum = cnum3; if (cli_write(cli, fnum1, 0, buf, 130, 4) == 4) { printf("* server allows write with invalid TID\n"); ret = False; } else { printf("server fails write with invalid TID : %s\n", cli_errstr(cli)); } /* try a write with an invalid vuid */ cli->vuid = vuid2; cli->cnum = cnum1; if (cli_write(cli, fnum1, 0, buf, 130, 4) == 4) { printf("* server allows write with invalid VUID\n"); ret = False; } else { printf("server fails write with invalid VUID : %s\n", cli_errstr(cli)); } cli->cnum = cnum1; cli->vuid = vuid1; if (!NT_STATUS_IS_OK(cli_close(cli, fnum1))) { printf("close failed (%s)\n", cli_errstr(cli)); return False; } cli->cnum = cnum2; status = cli_tdis(cli); if (!NT_STATUS_IS_OK(status)) { printf("secondary tdis failed (%s)\n", nt_errstr(status)); return False; } cli->cnum = cnum1; if (!torture_close_connection(cli)) { return False; } return ret; } /* checks for old style tcon support */ static bool run_tcon2_test(int dummy) { static struct cli_state *cli; uint16 cnum, max_xmit; char *service; NTSTATUS status; if (!torture_open_connection(&cli, 0)) { return False; } cli_sockopt(cli, sockops); printf("starting tcon2 test\n"); if (asprintf(&service, "\\\\%s\\%s", host, share) == -1) { return false; } status = cli_raw_tcon(cli, service, password, "?????", &max_xmit, &cnum); if (!NT_STATUS_IS_OK(status)) { printf("tcon2 failed : %s\n", cli_errstr(cli)); } else { printf("tcon OK : max_xmit=%d cnum=%d tid=%d\n", (int)max_xmit, (int)cnum, SVAL(cli->inbuf, smb_tid)); } if (!torture_close_connection(cli)) { return False; } printf("Passed tcon2 test\n"); return True; } static bool tcon_devtest(struct cli_state *cli, const char *myshare, const char *devtype, const char *return_devtype, NTSTATUS expected_error) { NTSTATUS status; bool ret; status = cli_tcon_andx(cli, myshare, devtype, password, strlen(password)+1); if (NT_STATUS_IS_OK(expected_error)) { if (NT_STATUS_IS_OK(status)) { if (strcmp(cli->dev, return_devtype) == 0) { ret = True; } else { printf("tconX to share %s with type %s " "succeeded but returned the wrong " "device type (got [%s] but should have got [%s])\n", myshare, devtype, cli->dev, return_devtype); ret = False; } } else { printf("tconX to share %s with type %s " "should have succeeded but failed\n", myshare, devtype); ret = False; } cli_tdis(cli); } else { if (NT_STATUS_IS_OK(status)) { printf("tconx to share %s with type %s " "should have failed but succeeded\n", myshare, devtype); ret = False; } else { if (NT_STATUS_EQUAL(cli_nt_error(cli), expected_error)) { ret = True; } else { printf("Returned unexpected error\n"); ret = False; } } } return ret; } /* checks for correct tconX support */ static bool run_tcon_devtype_test(int dummy) { static struct cli_state *cli1 = NULL; bool retry; int flags = 0; NTSTATUS status; bool ret = True; status = cli_full_connection(&cli1, myname, host, NULL, port_to_use, NULL, NULL, username, workgroup, password, flags, signing_state, &retry); if (!NT_STATUS_IS_OK(status)) { printf("could not open connection\n"); return False; } if (!tcon_devtest(cli1, "IPC$", "A:", NULL, NT_STATUS_BAD_DEVICE_TYPE)) ret = False; if (!tcon_devtest(cli1, "IPC$", "?????", "IPC", NT_STATUS_OK)) ret = False; if (!tcon_devtest(cli1, "IPC$", "LPT:", NULL, NT_STATUS_BAD_DEVICE_TYPE)) ret = False; if (!tcon_devtest(cli1, "IPC$", "IPC", "IPC", NT_STATUS_OK)) ret = False; if (!tcon_devtest(cli1, "IPC$", "FOOBA", NULL, NT_STATUS_BAD_DEVICE_TYPE)) ret = False; if (!tcon_devtest(cli1, share, "A:", "A:", NT_STATUS_OK)) ret = False; if (!tcon_devtest(cli1, share, "?????", "A:", NT_STATUS_OK)) ret = False; if (!tcon_devtest(cli1, share, "LPT:", NULL, NT_STATUS_BAD_DEVICE_TYPE)) ret = False; if (!tcon_devtest(cli1, share, "IPC", NULL, NT_STATUS_BAD_DEVICE_TYPE)) ret = False; if (!tcon_devtest(cli1, share, "FOOBA", NULL, NT_STATUS_BAD_DEVICE_TYPE)) ret = False; cli_shutdown(cli1); if (ret) printf("Passed tcondevtest\n"); return ret; } /* This test checks that 1) the server supports multiple locking contexts on the one SMB connection, distinguished by PID. 2) the server correctly fails overlapping locks made by the same PID (this goes against POSIX behaviour, which is why it is tricky to implement) 3) the server denies unlock requests by an incorrect client PID */ static bool run_locktest2(int dummy) { static struct cli_state *cli; const char *fname = "\\lockt2.lck"; uint16_t fnum1, fnum2, fnum3; bool correct = True; if (!torture_open_connection(&cli, 0)) { return False; } cli_sockopt(cli, sockops); printf("starting locktest2\n"); cli_unlink(cli, fname, aSYSTEM | aHIDDEN); cli_setpid(cli, 1); if (!NT_STATUS_IS_OK(cli_open(cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); return False; } if (!NT_STATUS_IS_OK(cli_open(cli, fname, O_RDWR, DENY_NONE, &fnum2))) { printf("open2 of %s failed (%s)\n", fname, cli_errstr(cli)); return False; } cli_setpid(cli, 2); if (!NT_STATUS_IS_OK(cli_open(cli, fname, O_RDWR, DENY_NONE, &fnum3))) { printf("open3 of %s failed (%s)\n", fname, cli_errstr(cli)); return False; } cli_setpid(cli, 1); if (!cli_lock(cli, fnum1, 0, 4, 0, WRITE_LOCK)) { printf("lock1 failed (%s)\n", cli_errstr(cli)); return False; } if (cli_lock(cli, fnum1, 0, 4, 0, WRITE_LOCK)) { printf("WRITE lock1 succeeded! This is a locking bug\n"); correct = False; } else { if (!check_error(__LINE__, cli, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; } if (cli_lock(cli, fnum2, 0, 4, 0, WRITE_LOCK)) { printf("WRITE lock2 succeeded! This is a locking bug\n"); correct = False; } else { if (!check_error(__LINE__, cli, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; } if (cli_lock(cli, fnum2, 0, 4, 0, READ_LOCK)) { printf("READ lock2 succeeded! This is a locking bug\n"); correct = False; } else { if (!check_error(__LINE__, cli, ERRDOS, ERRlock, NT_STATUS_FILE_LOCK_CONFLICT)) return False; } if (!cli_lock(cli, fnum1, 100, 4, 0, WRITE_LOCK)) { printf("lock at 100 failed (%s)\n", cli_errstr(cli)); } cli_setpid(cli, 2); if (NT_STATUS_IS_OK(cli_unlock(cli, fnum1, 100, 4))) { printf("unlock at 100 succeeded! This is a locking bug\n"); correct = False; } if (NT_STATUS_IS_OK(cli_unlock(cli, fnum1, 0, 4))) { printf("unlock1 succeeded! This is a locking bug\n"); correct = False; } else { if (!check_error(__LINE__, cli, ERRDOS, ERRlock, NT_STATUS_RANGE_NOT_LOCKED)) return False; } if (NT_STATUS_IS_OK(cli_unlock(cli, fnum1, 0, 8))) { printf("unlock2 succeeded! This is a locking bug\n"); correct = False; } else { if (!check_error(__LINE__, cli, ERRDOS, ERRlock, NT_STATUS_RANGE_NOT_LOCKED)) return False; } if (cli_lock(cli, fnum3, 0, 4, 0, WRITE_LOCK)) { printf("lock3 succeeded! This is a locking bug\n"); correct = False; } else { if (!check_error(__LINE__, cli, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; } cli_setpid(cli, 1); if (!NT_STATUS_IS_OK(cli_close(cli, fnum1))) { printf("close1 failed (%s)\n", cli_errstr(cli)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli, fnum2))) { printf("close2 failed (%s)\n", cli_errstr(cli)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli, fnum3))) { printf("close3 failed (%s)\n", cli_errstr(cli)); return False; } if (!torture_close_connection(cli)) { correct = False; } printf("locktest2 finished\n"); return correct; } /* This test checks that 1) the server supports the full offset range in lock requests */ static bool run_locktest3(int dummy) { static struct cli_state *cli1, *cli2; const char *fname = "\\lockt3.lck"; uint16_t fnum1, fnum2; int i; uint32 offset; bool correct = True; #define NEXT_OFFSET offset += (~(uint32)0) / torture_numops if (!torture_open_connection(&cli1, 0) || !torture_open_connection(&cli2, 1)) { return False; } cli_sockopt(cli1, sockops); cli_sockopt(cli2, sockops); printf("starting locktest3\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_open(cli2, fname, O_RDWR, DENY_NONE, &fnum2))) { printf("open2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } for (offset=i=0;i\n"); return false; } if (pipe(pipe_in) == -1 || pipe(pipe_out) == -1) { return false; } child_pid = fork(); if (child_pid == -1) { return false; } if (child_pid == 0) { /* Child. */ do_local_lock(pipe_out[0], pipe_in[1]); exit(0); } close(pipe_out[0]); close(pipe_in[1]); pipe_out[0] = -1; pipe_in[1] = -1; /* Parent. */ ret = read(pipe_in[0], &c, 1); if (ret != 1) { d_fprintf(stderr, "failed to read start signal from child. %s\n", strerror(errno)); return false; } if (!torture_open_connection(&cli1, 0)) { return false; } cli_sockopt(cli1, sockops); status = cli_open(cli1, fname, O_RDWR, DENY_NONE, &fnum); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, "cli_open returned %s\n", cli_errstr(cli1)); return false; } /* Ensure the child has the lock. */ if (cli_lock(cli1, fnum, 0, 4, 0, WRITE_LOCK)) { d_fprintf(stderr, "Got the lock on range 0:4 - this should not happen !\n"); goto fail; } else { d_printf("Child has the lock.\n"); } /* Tell the child to wait 5 seconds then exit. */ ret = write(pipe_out[1], &c, 1); if (ret != 1) { d_fprintf(stderr, "failed to send exit signal to child. %s\n", strerror(errno)); goto fail; } /* Wait 20 seconds for the lock. */ alarm_fd = cli1->fd; CatchSignal(SIGALRM, alarm_handler_parent); alarm(20); start = timeval_current(); if (!cli_lock(cli1, fnum, 0, 4, -1, WRITE_LOCK)) { d_fprintf(stderr, "Unable to apply write lock on range 0:4, error was " "%s\n", cli_errstr(cli1)); goto fail_nofd; } alarm(0); seconds = timeval_elapsed(&start); printf("Parent got the lock after %.2f seconds.\n", seconds); status = cli_close(cli1, fnum); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, "cli_close(fnum1) %s\n", cli_errstr(cli1)); goto fail; } correct = true; fail: cli_close(cli1, fnum); torture_close_connection(cli1); fail_nofd: printf("finished locktest9\n"); return correct; } /* test whether fnums and tids open on one VC are available on another (a major security hole) */ static bool run_fdpasstest(int dummy) { struct cli_state *cli1, *cli2; const char *fname = "\\fdpass.tst"; uint16_t fnum1; char buf[1024]; if (!torture_open_connection(&cli1, 0) || !torture_open_connection(&cli2, 1)) { return False; } cli_sockopt(cli1, sockops); cli_sockopt(cli2, sockops); printf("starting fdpasstest\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (cli_write(cli1, fnum1, 0, "hello world\n", 0, 13) != 13) { printf("write failed (%s)\n", cli_errstr(cli1)); return False; } cli2->vuid = cli1->vuid; cli2->cnum = cli1->cnum; cli2->pid = cli1->pid; if (cli_read(cli2, fnum1, buf, 0, 13) == 13) { printf("read succeeded! nasty security hole [%s]\n", buf); return False; } cli_close(cli1, fnum1); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); torture_close_connection(cli1); torture_close_connection(cli2); printf("finished fdpasstest\n"); return True; } static bool run_fdsesstest(int dummy) { struct cli_state *cli; uint16 new_vuid; uint16 saved_vuid; uint16 new_cnum; uint16 saved_cnum; const char *fname = "\\fdsess.tst"; const char *fname1 = "\\fdsess1.tst"; uint16_t fnum1; uint16_t fnum2; char buf[1024]; bool ret = True; if (!torture_open_connection(&cli, 0)) return False; cli_sockopt(cli, sockops); if (!torture_cli_session_setup2(cli, &new_vuid)) return False; saved_cnum = cli->cnum; if (!NT_STATUS_IS_OK(cli_tcon_andx(cli, share, "?????", "", 1))) return False; new_cnum = cli->cnum; cli->cnum = saved_cnum; printf("starting fdsesstest\n"); cli_unlink(cli, fname, aSYSTEM | aHIDDEN); cli_unlink(cli, fname1, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_open(cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); return False; } if (cli_write(cli, fnum1, 0, "hello world\n", 0, 13) != 13) { printf("write failed (%s)\n", cli_errstr(cli)); return False; } saved_vuid = cli->vuid; cli->vuid = new_vuid; if (cli_read(cli, fnum1, buf, 0, 13) == 13) { printf("read succeeded with different vuid! nasty security hole [%s]\n", buf); ret = False; } /* Try to open a file with different vuid, samba cnum. */ if (NT_STATUS_IS_OK(cli_open(cli, fname1, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum2))) { printf("create with different vuid, same cnum succeeded.\n"); cli_close(cli, fnum2); cli_unlink(cli, fname1, aSYSTEM | aHIDDEN); } else { printf("create with different vuid, same cnum failed.\n"); printf("This will cause problems with service clients.\n"); ret = False; } cli->vuid = saved_vuid; /* Try with same vuid, different cnum. */ cli->cnum = new_cnum; if (cli_read(cli, fnum1, buf, 0, 13) == 13) { printf("read succeeded with different cnum![%s]\n", buf); ret = False; } cli->cnum = saved_cnum; cli_close(cli, fnum1); cli_unlink(cli, fname, aSYSTEM | aHIDDEN); torture_close_connection(cli); printf("finished fdsesstest\n"); return ret; } /* This test checks that 1) the server does not allow an unlink on a file that is open */ static bool run_unlinktest(int dummy) { struct cli_state *cli; const char *fname = "\\unlink.tst"; uint16_t fnum; bool correct = True; if (!torture_open_connection(&cli, 0)) { return False; } cli_sockopt(cli, sockops); printf("starting unlink test\n"); cli_unlink(cli, fname, aSYSTEM | aHIDDEN); cli_setpid(cli, 1); if (!NT_STATUS_IS_OK(cli_open(cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); return False; } if (NT_STATUS_IS_OK(cli_unlink(cli, fname, aSYSTEM | aHIDDEN))) { printf("error: server allowed unlink on an open file\n"); correct = False; } else { correct = check_error(__LINE__, cli, ERRDOS, ERRbadshare, NT_STATUS_SHARING_VIOLATION); } cli_close(cli, fnum); cli_unlink(cli, fname, aSYSTEM | aHIDDEN); if (!torture_close_connection(cli)) { correct = False; } printf("unlink test finished\n"); return correct; } /* test how many open files this server supports on the one socket */ static bool run_maxfidtest(int dummy) { struct cli_state *cli; const char *ftemplate = "\\maxfid.%d.%d"; fstring fname; uint16_t fnums[0x11000]; int i; int retries=4; bool correct = True; cli = current_cli; if (retries <= 0) { printf("failed to connect\n"); return False; } cli_sockopt(cli, sockops); for (i=0; i<0x11000; i++) { slprintf(fname,sizeof(fname)-1,ftemplate, i,(int)getpid()); if (!NT_STATUS_IS_OK(cli_open(cli, fname, O_RDWR|O_CREAT|O_TRUNC, DENY_NONE, &fnums[i]))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); printf("maximum fnum is %d\n", i); break; } printf("%6d\r", i); } printf("%6d\n", i); i--; printf("cleaning up\n"); for (;i>=0;i--) { slprintf(fname,sizeof(fname)-1,ftemplate, i,(int)getpid()); cli_close(cli, fnums[i]); if (!NT_STATUS_IS_OK(cli_unlink(cli, fname, aSYSTEM | aHIDDEN))) { printf("unlink of %s failed (%s)\n", fname, cli_errstr(cli)); correct = False; } printf("%6d\r", i); } printf("%6d\n", 0); printf("maxfid test finished\n"); if (!torture_close_connection(cli)) { correct = False; } return correct; } /* generate a random buffer */ static void rand_buf(char *buf, int len) { while (len--) { *buf = (char)sys_random(); buf++; } } /* send smb negprot commands, not reading the response */ static bool run_negprot_nowait(int dummy) { int i; static struct cli_state *cli; bool correct = True; printf("starting negprot nowait test\n"); if (!(cli = open_nbt_connection())) { return False; } for (i=0;i<50000;i++) { cli_negprot_sendsync(cli); } if (!torture_close_connection(cli)) { correct = False; } printf("finished negprot nowait test\n"); return correct; } /* send smb negprot commands, not reading the response */ static bool run_bad_nbt_session(int dummy) { static struct cli_state *cli; printf("starting bad nbt session test\n"); if (!(cli = open_bad_nbt_connection())) { return False; } cli_shutdown(cli); printf("finished bad nbt session test\n"); return true; } /* send random IPC commands */ static bool run_randomipc(int dummy) { char *rparam = NULL; char *rdata = NULL; unsigned int rdrcnt,rprcnt; char param[1024]; int api, param_len, i; struct cli_state *cli; bool correct = True; int count = 50000; printf("starting random ipc test\n"); if (!torture_open_connection(&cli, 0)) { return False; } for (i=0;iserver_domain, SV_TYPE_DOMAIN_ENUM, browse_callback, NULL); printf("machine list:\n"); cli_NetServerEnum(cli, cli->server_domain, SV_TYPE_ALL, browse_callback, NULL); if (!torture_close_connection(cli)) { correct = False; } printf("browse test finished\n"); return correct; } /* This checks how the getatr calls works */ static bool run_attrtest(int dummy) { struct cli_state *cli; uint16_t fnum; time_t t, t2; const char *fname = "\\attrib123456789.tst"; bool correct = True; printf("starting attrib test\n"); if (!torture_open_connection(&cli, 0)) { return False; } cli_unlink(cli, fname, aSYSTEM | aHIDDEN); cli_open(cli, fname, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE, &fnum); cli_close(cli, fnum); if (!NT_STATUS_IS_OK(cli_getatr(cli, fname, NULL, NULL, &t))) { printf("getatr failed (%s)\n", cli_errstr(cli)); correct = False; } if (abs(t - time(NULL)) > 60*60*24*10) { printf("ERROR: SMBgetatr bug. time is %s", ctime(&t)); t = time(NULL); correct = True; } t2 = t-60*60*24; /* 1 day ago */ if (!NT_STATUS_IS_OK(cli_setatr(cli, fname, 0, t2))) { printf("setatr failed (%s)\n", cli_errstr(cli)); correct = True; } if (!NT_STATUS_IS_OK(cli_getatr(cli, fname, NULL, NULL, &t))) { printf("getatr failed (%s)\n", cli_errstr(cli)); correct = True; } if (t != t2) { printf("ERROR: getatr/setatr bug. times are\n%s", ctime(&t)); printf("%s", ctime(&t2)); correct = True; } cli_unlink(cli, fname, aSYSTEM | aHIDDEN); if (!torture_close_connection(cli)) { correct = False; } printf("attrib test finished\n"); return correct; } /* This checks a couple of trans2 calls */ static bool run_trans2test(int dummy) { struct cli_state *cli; uint16_t fnum; SMB_OFF_T size; time_t c_time, a_time, m_time; struct timespec c_time_ts, a_time_ts, m_time_ts, w_time_ts, m_time2_ts; const char *fname = "\\trans2.tst"; const char *dname = "\\trans2"; const char *fname2 = "\\trans2\\trans2.tst"; char pname[1024]; bool correct = True; NTSTATUS status; uint32_t fs_attr; printf("starting trans2 test\n"); if (!torture_open_connection(&cli, 0)) { return False; } status = cli_get_fs_attr_info(cli, &fs_attr); if (!NT_STATUS_IS_OK(status)) { printf("ERROR: cli_get_fs_attr_info returned %s\n", nt_errstr(status)); correct = false; } cli_unlink(cli, fname, aSYSTEM | aHIDDEN); cli_open(cli, fname, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE, &fnum); if (!NT_STATUS_IS_OK(cli_qfileinfo_basic( cli, fnum, NULL, &size, &c_time_ts, &a_time_ts, &w_time_ts, &m_time_ts, NULL))) { printf("ERROR: qfileinfo failed (%s)\n", cli_errstr(cli)); correct = False; } if (!NT_STATUS_IS_OK(cli_qfilename(cli, fnum, pname, sizeof(pname)))) { printf("ERROR: qfilename failed (%s)\n", cli_errstr(cli)); correct = False; } if (strcmp(pname, fname)) { printf("qfilename gave different name? [%s] [%s]\n", fname, pname); correct = False; } cli_close(cli, fnum); sleep(2); cli_unlink(cli, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_open(cli, fname, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE, &fnum))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); return False; } cli_close(cli, fnum); status = cli_qpathinfo1(cli, fname, &c_time, &a_time, &m_time, &size, NULL); if (!NT_STATUS_IS_OK(status)) { printf("ERROR: qpathinfo failed (%s)\n", nt_errstr(status)); correct = False; } else { if (c_time != m_time) { printf("create time=%s", ctime(&c_time)); printf("modify time=%s", ctime(&m_time)); printf("This system appears to have sticky create times\n"); } if (a_time % (60*60) == 0) { printf("access time=%s", ctime(&a_time)); printf("This system appears to set a midnight access time\n"); correct = False; } if (abs(m_time - time(NULL)) > 60*60*24*7) { printf("ERROR: totally incorrect times - maybe word reversed? mtime=%s", ctime(&m_time)); correct = False; } } cli_unlink(cli, fname, aSYSTEM | aHIDDEN); cli_open(cli, fname, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE, &fnum); cli_close(cli, fnum); status = cli_qpathinfo2(cli, fname, &c_time_ts, &a_time_ts, &w_time_ts, &m_time_ts, &size, NULL, NULL); if (!NT_STATUS_IS_OK(status)) { printf("ERROR: qpathinfo2 failed (%s)\n", nt_errstr(status)); correct = False; } else { if (w_time_ts.tv_sec < 60*60*24*2) { printf("write time=%s", ctime(&w_time_ts.tv_sec)); printf("This system appears to set a initial 0 write time\n"); correct = False; } } cli_unlink(cli, fname, aSYSTEM | aHIDDEN); /* check if the server updates the directory modification time when creating a new file */ if (!NT_STATUS_IS_OK(cli_mkdir(cli, dname))) { printf("ERROR: mkdir failed (%s)\n", cli_errstr(cli)); correct = False; } sleep(3); status = cli_qpathinfo2(cli, "\\trans2\\", &c_time_ts, &a_time_ts, &w_time_ts, &m_time_ts, &size, NULL, NULL); if (!NT_STATUS_IS_OK(status)) { printf("ERROR: qpathinfo2 failed (%s)\n", nt_errstr(status)); correct = False; } cli_open(cli, fname2, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE, &fnum); cli_write(cli, fnum, 0, (char *)&fnum, 0, sizeof(fnum)); cli_close(cli, fnum); status = cli_qpathinfo2(cli, "\\trans2\\", &c_time_ts, &a_time_ts, &w_time_ts, &m_time2_ts, &size, NULL, NULL); if (!NT_STATUS_IS_OK(status)) { printf("ERROR: qpathinfo2 failed (%s)\n", nt_errstr(status)); correct = False; } else { if (memcmp(&m_time_ts, &m_time2_ts, sizeof(struct timespec)) == 0) { printf("This system does not update directory modification times\n"); correct = False; } } cli_unlink(cli, fname2, aSYSTEM | aHIDDEN); cli_rmdir(cli, dname); if (!torture_close_connection(cli)) { correct = False; } printf("trans2 test finished\n"); return correct; } /* This checks new W2K calls. */ static NTSTATUS new_trans(struct cli_state *pcli, int fnum, int level) { uint8_t *buf = NULL; uint32 len; NTSTATUS status; status = cli_qfileinfo(talloc_tos(), pcli, fnum, level, 0, pcli->max_xmit, &buf, &len); if (!NT_STATUS_IS_OK(status)) { printf("ERROR: qfileinfo (%d) failed (%s)\n", level, nt_errstr(status)); } else { printf("qfileinfo: level %d, len = %u\n", level, len); dump_data(0, (uint8 *)buf, len); printf("\n"); } TALLOC_FREE(buf); return status; } static bool run_w2ktest(int dummy) { struct cli_state *cli; uint16_t fnum; const char *fname = "\\w2ktest\\w2k.tst"; int level; bool correct = True; printf("starting w2k test\n"); if (!torture_open_connection(&cli, 0)) { return False; } cli_open(cli, fname, O_RDWR | O_CREAT , DENY_NONE, &fnum); for (level = 1004; level < 1040; level++) { new_trans(cli, fnum, level); } cli_close(cli, fnum); if (!torture_close_connection(cli)) { correct = False; } printf("w2k test finished\n"); return correct; } /* this is a harness for some oplock tests */ static bool run_oplock1(int dummy) { struct cli_state *cli1; const char *fname = "\\lockt1.lck"; uint16_t fnum1; bool correct = True; printf("starting oplock test 1\n"); if (!torture_open_connection(&cli1, 0)) { return False; } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_sockopt(cli1, sockops); cli1->use_oplocks = True; if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } cli1->use_oplocks = False; cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close2 failed (%s)\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_unlink(cli1, fname, aSYSTEM | aHIDDEN))) { printf("unlink failed (%s)\n", cli_errstr(cli1)); return False; } if (!torture_close_connection(cli1)) { correct = False; } printf("finished oplock test 1\n"); return correct; } static bool run_oplock2(int dummy) { struct cli_state *cli1, *cli2; const char *fname = "\\lockt2.lck"; uint16_t fnum1, fnum2; int saved_use_oplocks = use_oplocks; char buf[4]; bool correct = True; volatile bool *shared_correct; shared_correct = (volatile bool *)shm_setup(sizeof(bool)); *shared_correct = True; use_level_II_oplocks = True; use_oplocks = True; printf("starting oplock test 2\n"); if (!torture_open_connection(&cli1, 0)) { use_level_II_oplocks = False; use_oplocks = saved_use_oplocks; return False; } cli1->use_oplocks = True; cli1->use_level_II_oplocks = True; if (!torture_open_connection(&cli2, 1)) { use_level_II_oplocks = False; use_oplocks = saved_use_oplocks; return False; } cli2->use_oplocks = True; cli2->use_level_II_oplocks = True; cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_sockopt(cli1, sockops); cli_sockopt(cli2, sockops); if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } /* Don't need the globals any more. */ use_level_II_oplocks = False; use_oplocks = saved_use_oplocks; if (fork() == 0) { /* Child code */ if (!NT_STATUS_IS_OK(cli_open(cli2, fname, O_RDWR, DENY_NONE, &fnum2))) { printf("second open of %s failed (%s)\n", fname, cli_errstr(cli1)); *shared_correct = False; exit(0); } sleep(2); if (!NT_STATUS_IS_OK(cli_close(cli2, fnum2))) { printf("close2 failed (%s)\n", cli_errstr(cli1)); *shared_correct = False; } exit(0); } sleep(2); /* Ensure cli1 processes the break. Empty file should always return 0 * bytes. */ if (cli_read(cli1, fnum1, buf, 0, 4) != 0) { printf("read on fnum1 failed (%s)\n", cli_errstr(cli1)); correct = False; } /* Should now be at level II. */ /* Test if sending a write locks causes a break to none. */ if (!cli_lock(cli1, fnum1, 0, 4, 0, READ_LOCK)) { printf("lock failed (%s)\n", cli_errstr(cli1)); correct = False; } cli_unlock(cli1, fnum1, 0, 4); sleep(2); if (!cli_lock(cli1, fnum1, 0, 4, 0, WRITE_LOCK)) { printf("lock failed (%s)\n", cli_errstr(cli1)); correct = False; } cli_unlock(cli1, fnum1, 0, 4); sleep(2); cli_read(cli1, fnum1, buf, 0, 4); #if 0 if (cli_write(cli1, fnum1, 0, buf, 0, 4) != 4) { printf("write on fnum1 failed (%s)\n", cli_errstr(cli1)); correct = False; } #endif if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close1 failed (%s)\n", cli_errstr(cli1)); correct = False; } sleep(4); if (!NT_STATUS_IS_OK(cli_unlink(cli1, fname, aSYSTEM | aHIDDEN))) { printf("unlink failed (%s)\n", cli_errstr(cli1)); correct = False; } if (!torture_close_connection(cli1)) { correct = False; } if (!*shared_correct) { correct = False; } printf("finished oplock test 2\n"); return correct; } /* handler for oplock 3 tests */ static NTSTATUS oplock3_handler(struct cli_state *cli, uint16_t fnum, unsigned char level) { printf("got oplock break fnum=%d level=%d\n", fnum, level); return cli_oplock_ack(cli, fnum, level); } static bool run_oplock3(int dummy) { struct cli_state *cli; const char *fname = "\\oplockt3.dat"; uint16_t fnum; char buf[4] = "abcd"; bool correct = True; volatile bool *shared_correct; shared_correct = (volatile bool *)shm_setup(sizeof(bool)); *shared_correct = True; printf("starting oplock test 3\n"); if (fork() == 0) { /* Child code */ use_oplocks = True; use_level_II_oplocks = True; if (!torture_open_connection(&cli, 0)) { *shared_correct = False; exit(0); } sleep(2); /* try to trigger a oplock break in parent */ cli_open(cli, fname, O_RDWR, DENY_NONE, &fnum); cli_write(cli, fnum, 0, buf, 0, 4); exit(0); } /* parent code */ use_oplocks = True; use_level_II_oplocks = True; if (!torture_open_connection(&cli, 1)) { /* other is forked */ return False; } cli_oplock_handler(cli, oplock3_handler); cli_open(cli, fname, O_RDWR|O_CREAT, DENY_NONE, &fnum); cli_write(cli, fnum, 0, buf, 0, 4); cli_close(cli, fnum); cli_open(cli, fname, O_RDWR, DENY_NONE, &fnum); cli->timeout = 20000; cli_receive_smb(cli); printf("finished oplock test 3\n"); return (correct && *shared_correct); /* What are we looking for here? What's sucess and what's FAILURE? */ } /* Test delete on close semantics. */ static bool run_deletetest(int dummy) { struct cli_state *cli1 = NULL; struct cli_state *cli2 = NULL; const char *fname = "\\delete.file"; uint16_t fnum1 = (uint16_t)-1; uint16_t fnum2 = (uint16_t)-1; bool correct = True; printf("starting delete test\n"); if (!torture_open_connection(&cli1, 0)) { return False; } cli_sockopt(cli1, sockops); /* Test 1 - this should delete the file on close. */ cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_ALL_ACCESS|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, 0, FILE_OVERWRITE_IF, FILE_DELETE_ON_CLOSE, 0, &fnum1))) { printf("[1] open of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[1] close failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } if (NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR, DENY_NONE, &fnum1))) { printf("[1] open of %s succeeded (should fail)\n", fname); correct = False; goto fail; } printf("first delete on close test succeeded.\n"); /* Test 2 - this should delete the file on close. */ cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_ALL_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("[2] open of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_nt_delete_on_close(cli1, fnum1, true))) { printf("[2] setting delete_on_close failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[2] close failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } if (NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDONLY, DENY_NONE, &fnum1))) { printf("[2] open of %s succeeded should have been deleted on close !\n", fname); if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[2] close failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); } else printf("second delete on close test succeeded.\n"); /* Test 3 - ... */ cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_ALL_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("[3] open - 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } /* This should fail with a sharing violation - open for delete is only compatible with SHARE_DELETE. */ if (NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN, 0, 0, &fnum2))) { printf("[3] open - 2 of %s succeeded - should have failed.\n", fname); correct = False; goto fail; } /* This should succeed. */ if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0, 0, &fnum2))) { printf("[3] open - 2 of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_nt_delete_on_close(cli1, fnum1, true))) { printf("[3] setting delete_on_close failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[3] close 1 failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum2))) { printf("[3] close 2 failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } /* This should fail - file should no longer be there. */ if (NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDONLY, DENY_NONE, &fnum1))) { printf("[3] open of %s succeeded should have been deleted on close !\n", fname); if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[3] close failed (%s)\n", cli_errstr(cli1)); } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); correct = False; goto fail; } else printf("third delete on close test succeeded.\n"); /* Test 4 ... */ cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("[4] open of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } /* This should succeed. */ if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0, 0, &fnum2))) { printf("[4] open - 2 of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum2))) { printf("[4] close - 1 failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_nt_delete_on_close(cli1, fnum1, true))) { printf("[4] setting delete_on_close failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } /* This should fail - no more opens once delete on close set. */ if (NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0, 0, &fnum2))) { printf("[4] open - 3 of %s succeeded ! Should have failed.\n", fname ); correct = False; goto fail; } else printf("fourth delete on close test succeeded.\n"); if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[4] close - 2 failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } /* Test 5 ... */ cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR|O_CREAT, DENY_NONE, &fnum1))) { printf("[5] open of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } /* This should fail - only allowed on NT opens with DELETE access. */ if (NT_STATUS_IS_OK(cli_nt_delete_on_close(cli1, fnum1, true))) { printf("[5] setting delete_on_close on OpenX file succeeded - should fail !\n"); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[5] close - 2 failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } printf("fifth delete on close test succeeded.\n"); /* Test 6 ... */ cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_DATA|FILE_WRITE_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("[6] open of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } /* This should fail - only allowed on NT opens with DELETE access. */ if (NT_STATUS_IS_OK(cli_nt_delete_on_close(cli1, fnum1, true))) { printf("[6] setting delete_on_close on file with no delete access succeeded - should fail !\n"); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[6] close - 2 failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } printf("sixth delete on close test succeeded.\n"); /* Test 7 ... */ cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, 0, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("[7] open of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_nt_delete_on_close(cli1, fnum1, true))) { printf("[7] setting delete_on_close on file failed !\n"); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_nt_delete_on_close(cli1, fnum1, false))) { printf("[7] unsetting delete_on_close on file failed !\n"); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[7] close - 2 failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } /* This next open should succeed - we reset the flag. */ if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDONLY, DENY_NONE, &fnum1))) { printf("[5] open of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[7] close - 2 failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } printf("seventh delete on close test succeeded.\n"); /* Test 7 ... */ cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!torture_open_connection(&cli2, 1)) { printf("[8] failed to open second connection.\n"); correct = False; goto fail; } cli_sockopt(cli1, sockops); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("[8] open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_ntcreate(cli2, fname, 0, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0, 0, &fnum2))) { printf("[8] open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_nt_delete_on_close(cli1, fnum1, true))) { printf("[8] setting delete_on_close on file failed !\n"); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[8] close - 1 failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli2, fnum2))) { printf("[8] close - 2 failed (%s)\n", cli_errstr(cli2)); correct = False; goto fail; } /* This should fail.. */ if (NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDONLY, DENY_NONE, &fnum1))) { printf("[8] open of %s succeeded should have been deleted on close !\n", fname); goto fail; correct = False; } else printf("eighth delete on close test succeeded.\n"); /* This should fail - we need to set DELETE_ACCESS. */ if (NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0,FILE_READ_DATA|FILE_WRITE_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, FILE_DELETE_ON_CLOSE, 0, &fnum1))) { printf("[9] open of %s succeeded should have failed!\n", fname); correct = False; goto fail; } printf("ninth delete on close test succeeded.\n"); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, FILE_DELETE_ON_CLOSE, 0, &fnum1))) { printf("[10] open of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } /* This should delete the file. */ if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[10] close failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } /* This should fail.. */ if (NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDONLY, DENY_NONE, &fnum1))) { printf("[10] open of %s succeeded should have been deleted on close !\n", fname); goto fail; correct = False; } else printf("tenth delete on close test succeeded.\n"); cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); /* What error do we get when attempting to open a read-only file with delete access ? */ /* Create a readonly file. */ if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_DATA|FILE_WRITE_DATA, FILE_ATTRIBUTE_READONLY, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("[11] open of %s failed (%s)\n", fname, cli_errstr(cli1)); correct = False; goto fail; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("[11] close failed (%s)\n", cli_errstr(cli1)); correct = False; goto fail; } /* Now try open for delete access. */ if (NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_ATTRIBUTES|DELETE_ACCESS, 0, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("[11] open of %s succeeded should have been denied with ACCESS_DENIED!\n", fname); cli_close(cli1, fnum1); goto fail; correct = False; } else { NTSTATUS nterr = cli_nt_error(cli1); if (!NT_STATUS_EQUAL(nterr,NT_STATUS_ACCESS_DENIED)) { printf("[11] open of %s should have been denied with ACCESS_DENIED! Got error %s\n", fname, nt_errstr(nterr)); goto fail; correct = False; } else { printf("eleventh delete on close test succeeded.\n"); } } printf("finished delete test\n"); fail: /* FIXME: This will crash if we aborted before cli2 got * intialized, because these functions don't handle * uninitialized connections. */ if (fnum1 != (uint16_t)-1) cli_close(cli1, fnum1); if (fnum2 != (uint16_t)-1) cli_close(cli1, fnum2); cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (cli1 && !torture_close_connection(cli1)) { correct = False; } if (cli2 && !torture_close_connection(cli2)) { correct = False; } return correct; } /* print out server properties */ static bool run_properties(int dummy) { struct cli_state *cli; bool correct = True; printf("starting properties test\n"); ZERO_STRUCT(cli); if (!torture_open_connection(&cli, 0)) { return False; } cli_sockopt(cli, sockops); d_printf("Capabilities 0x%08x\n", cli->capabilities); if (!torture_close_connection(cli)) { correct = False; } return correct; } /* FIRST_DESIRED_ACCESS 0xf019f */ #define FIRST_DESIRED_ACCESS FILE_READ_DATA|FILE_WRITE_DATA|FILE_APPEND_DATA|\ FILE_READ_EA| /* 0xf */ \ FILE_WRITE_EA|FILE_READ_ATTRIBUTES| /* 0x90 */ \ FILE_WRITE_ATTRIBUTES| /* 0x100 */ \ DELETE_ACCESS|READ_CONTROL_ACCESS|\ WRITE_DAC_ACCESS|WRITE_OWNER_ACCESS /* 0xf0000 */ /* SECOND_DESIRED_ACCESS 0xe0080 */ #define SECOND_DESIRED_ACCESS FILE_READ_ATTRIBUTES| /* 0x80 */ \ READ_CONTROL_ACCESS|WRITE_DAC_ACCESS|\ WRITE_OWNER_ACCESS /* 0xe0000 */ #if 0 #define THIRD_DESIRED_ACCESS FILE_READ_ATTRIBUTES| /* 0x80 */ \ READ_CONTROL_ACCESS|WRITE_DAC_ACCESS|\ FILE_READ_DATA|\ WRITE_OWNER_ACCESS /* */ #endif /* Test ntcreate calls made by xcopy */ static bool run_xcopy(int dummy) { static struct cli_state *cli1; const char *fname = "\\test.txt"; bool correct = True; uint16_t fnum1, fnum2; printf("starting xcopy test\n"); if (!torture_open_connection(&cli1, 0)) { return False; } if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FIRST_DESIRED_ACCESS, FILE_ATTRIBUTE_ARCHIVE, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0x4044, 0, &fnum1))) { printf("First open failed - %s\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, SECOND_DESIRED_ACCESS, 0, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0x200000, 0, &fnum2))) { printf("second open failed - %s\n", cli_errstr(cli1)); return False; } if (!torture_close_connection(cli1)) { correct = False; } return correct; } /* Test rename on files open with share delete and no share delete. */ static bool run_rename(int dummy) { static struct cli_state *cli1; const char *fname = "\\test.txt"; const char *fname1 = "\\test1.txt"; bool correct = True; uint16_t fnum1; uint16_t attr; NTSTATUS status; printf("starting rename test\n"); if (!torture_open_connection(&cli1, 0)) { return False; } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_unlink(cli1, fname1, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("First open failed - %s\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_rename(cli1, fname, fname1))) { printf("First rename failed (SHARE_READ) (this is correct) - %s\n", cli_errstr(cli1)); } else { printf("First rename succeeded (SHARE_READ) - this should have failed !\n"); correct = False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close - 1 failed (%s)\n", cli_errstr(cli1)); return False; } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_unlink(cli1, fname1, aSYSTEM | aHIDDEN); status = cli_ntcreate(cli1, fname, 0, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, #if 0 FILE_SHARE_DELETE|FILE_SHARE_NONE, #else FILE_SHARE_DELETE|FILE_SHARE_READ, #endif FILE_OVERWRITE_IF, 0, 0, &fnum1); if (!NT_STATUS_IS_OK(status)) { printf("Second open failed - %s\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_rename(cli1, fname, fname1))) { printf("Second rename failed (SHARE_DELETE | SHARE_READ) - this should have succeeded - %s\n", cli_errstr(cli1)); correct = False; } else { printf("Second rename succeeded (SHARE_DELETE | SHARE_READ)\n"); } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close - 2 failed (%s)\n", cli_errstr(cli1)); return False; } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_unlink(cli1, fname1, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, READ_CONTROL_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("Third open failed - %s\n", cli_errstr(cli1)); return False; } #if 0 { uint16_t fnum2; if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum2))) { printf("Fourth open failed - %s\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_nt_delete_on_close(cli1, fnum2, true))) { printf("[8] setting delete_on_close on file failed !\n"); return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum2))) { printf("close - 4 failed (%s)\n", cli_errstr(cli1)); return False; } } #endif if (!NT_STATUS_IS_OK(cli_rename(cli1, fname, fname1))) { printf("Third rename failed (SHARE_NONE) - this should have succeeded - %s\n", cli_errstr(cli1)); correct = False; } else { printf("Third rename succeeded (SHARE_NONE)\n"); } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close - 3 failed (%s)\n", cli_errstr(cli1)); return False; } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_unlink(cli1, fname1, aSYSTEM | aHIDDEN); /*----*/ if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ | FILE_SHARE_WRITE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("Fourth open failed - %s\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_rename(cli1, fname, fname1))) { printf("Fourth rename failed (SHARE_READ | SHARE_WRITE) (this is correct) - %s\n", cli_errstr(cli1)); } else { printf("Fourth rename succeeded (SHARE_READ | SHARE_WRITE) - this should have failed !\n"); correct = False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close - 4 failed (%s)\n", cli_errstr(cli1)); return False; } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_unlink(cli1, fname1, aSYSTEM | aHIDDEN); /*--*/ if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("Fifth open failed - %s\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_rename(cli1, fname, fname1))) { printf("Fifth rename failed (SHARE_READ | SHARE_WRITE | SHARE_DELETE) - this should have succeeded - %s ! \n", cli_errstr(cli1)); correct = False; } else { printf("Fifth rename succeeded (SHARE_READ | SHARE_WRITE | SHARE_DELETE) (this is correct) - %s\n", cli_errstr(cli1)); } /* * Now check if the first name still exists ... */ /* if (!NT_STATUS_OP(cli_ntcreate(cli1, fname, 0, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE, FILE_OVERWRITE_IF, 0, 0, &fnum2))) { printf("Opening original file after rename of open file fails: %s\n", cli_errstr(cli1)); } else { printf("Opening original file after rename of open file works ...\n"); (void)cli_close(cli1, fnum2); } */ /*--*/ if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close - 5 failed (%s)\n", cli_errstr(cli1)); return False; } /* Check that the renamed file has FILE_ATTRIBUTE_ARCHIVE. */ if (!NT_STATUS_IS_OK(cli_getatr(cli1, fname1, &attr, NULL, NULL))) { printf("getatr on file %s failed - %s ! \n", fname1, cli_errstr(cli1)); correct = False; } else { if (attr != FILE_ATTRIBUTE_ARCHIVE) { printf("Renamed file %s has wrong attr 0x%x " "(should be 0x%x)\n", fname1, attr, (unsigned int)FILE_ATTRIBUTE_ARCHIVE); correct = False; } else { printf("Renamed file %s has archive bit set\n", fname1); } } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_unlink(cli1, fname1, aSYSTEM | aHIDDEN); if (!torture_close_connection(cli1)) { correct = False; } return correct; } static bool run_pipe_number(int dummy) { struct cli_state *cli1; const char *pipe_name = "\\SPOOLSS"; uint16_t fnum; int num_pipes = 0; printf("starting pipenumber test\n"); if (!torture_open_connection(&cli1, 0)) { return False; } cli_sockopt(cli1, sockops); while(1) { if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, pipe_name, 0, FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN_IF, 0, 0, &fnum))) { printf("Open of pipe %s failed with error (%s)\n", pipe_name, cli_errstr(cli1)); break; } num_pipes++; printf("\r%6d", num_pipes); } printf("pipe_number test - we can open %d %s pipes.\n", num_pipes, pipe_name ); torture_close_connection(cli1); return True; } /* Test open mode returns on read-only files. */ static bool run_opentest(int dummy) { static struct cli_state *cli1; static struct cli_state *cli2; const char *fname = "\\readonly.file"; uint16_t fnum1, fnum2; char buf[20]; SMB_OFF_T fsize; bool correct = True; char *tmp_path; printf("starting open test\n"); if (!torture_open_connection(&cli1, 0)) { return False; } cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); cli_sockopt(cli1, sockops); if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close2 failed (%s)\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_setatr(cli1, fname, aRONLY, 0))) { printf("cli_setatr failed (%s)\n", cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDONLY, DENY_WRITE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } /* This will fail - but the error should be ERRnoaccess, not ERRbadshare. */ cli_open(cli1, fname, O_RDWR, DENY_ALL, &fnum2); if (check_error(__LINE__, cli1, ERRDOS, ERRnoaccess, NT_STATUS_ACCESS_DENIED)) { printf("correct error code ERRDOS/ERRnoaccess returned\n"); } printf("finished open test 1\n"); cli_close(cli1, fnum1); /* Now try not readonly and ensure ERRbadshare is returned. */ cli_setatr(cli1, fname, 0, 0); if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDONLY, DENY_WRITE, &fnum1))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } /* This will fail - but the error should be ERRshare. */ cli_open(cli1, fname, O_RDWR, DENY_ALL, &fnum2); if (check_error(__LINE__, cli1, ERRDOS, ERRbadshare, NT_STATUS_SHARING_VIOLATION)) { printf("correct error code ERRDOS/ERRbadshare returned\n"); } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close2 failed (%s)\n", cli_errstr(cli1)); return False; } cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); printf("finished open test 2\n"); /* Test truncate open disposition on file opened for read. */ if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum1))) { printf("(3) open (1) of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } /* write 20 bytes. */ memset(buf, '\0', 20); if (cli_write(cli1, fnum1, 0, buf, 0, 20) != 20) { printf("write failed (%s)\n", cli_errstr(cli1)); correct = False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("(3) close1 failed (%s)\n", cli_errstr(cli1)); return False; } /* Ensure size == 20. */ if (!NT_STATUS_IS_OK(cli_getatr(cli1, fname, NULL, &fsize, NULL))) { printf("(3) getatr failed (%s)\n", cli_errstr(cli1)); return False; } if (fsize != 20) { printf("(3) file size != 20\n"); return False; } /* Now test if we can truncate a file opened for readonly. */ if (!NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDONLY|O_TRUNC, DENY_NONE, &fnum1))) { printf("(3) open (2) of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close2 failed (%s)\n", cli_errstr(cli1)); return False; } /* Ensure size == 0. */ if (!NT_STATUS_IS_OK(cli_getatr(cli1, fname, NULL, &fsize, NULL))) { printf("(3) getatr failed (%s)\n", cli_errstr(cli1)); return False; } if (fsize != 0) { printf("(3) file size != 0\n"); return False; } printf("finished open test 3\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); printf("Do ctemp tests\n"); if (!NT_STATUS_IS_OK(cli_ctemp(cli1, talloc_tos(), "\\", &fnum1, &tmp_path))) { printf("ctemp failed (%s)\n", cli_errstr(cli1)); return False; } printf("ctemp gave path %s\n", tmp_path); if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close of temp failed (%s)\n", cli_errstr(cli1)); } if (!NT_STATUS_IS_OK(cli_unlink(cli1, tmp_path, aSYSTEM | aHIDDEN))) { printf("unlink of temp failed (%s)\n", cli_errstr(cli1)); } /* Test the non-io opens... */ if (!torture_open_connection(&cli2, 1)) { return False; } cli_setatr(cli2, fname, 0, 0); cli_unlink(cli2, fname, aSYSTEM | aHIDDEN); cli_sockopt(cli2, sockops); printf("TEST #1 testing 2 non-io opens (no delete)\n"); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("TEST #1 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_ntcreate(cli2, fname, 0, FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OPEN_IF, 0, 0, &fnum2))) { printf("TEST #1 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("TEST #1 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli2, fnum2))) { printf("TEST #1 close 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } printf("non-io open test #1 passed.\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); printf("TEST #2 testing 2 non-io opens (first with delete)\n"); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("TEST #2 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_ntcreate(cli2, fname, 0, FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OPEN_IF, 0, 0, &fnum2))) { printf("TEST #2 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("TEST #2 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli2, fnum2))) { printf("TEST #2 close 2 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } printf("non-io open test #2 passed.\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); printf("TEST #3 testing 2 non-io opens (second with delete)\n"); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("TEST #3 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_ntcreate(cli2, fname, 0, DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OPEN_IF, 0, 0, &fnum2))) { printf("TEST #3 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("TEST #3 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli2, fnum2))) { printf("TEST #3 close 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } printf("non-io open test #3 passed.\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); printf("TEST #4 testing 2 non-io opens (both with delete)\n"); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("TEST #4 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (NT_STATUS_IS_OK(cli_ntcreate(cli2, fname, 0, DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OPEN_IF, 0, 0, &fnum2))) { printf("TEST #4 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, cli_errstr(cli2)); return False; } printf("TEST #4 open 2 of %s gave %s (correct error should be %s)\n", fname, cli_errstr(cli2), "sharing violation"); if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("TEST #4 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } printf("non-io open test #4 passed.\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); printf("TEST #5 testing 2 non-io opens (both with delete - both with file share delete)\n"); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_DELETE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("TEST #5 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_ntcreate(cli2, fname, 0, DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_DELETE, FILE_OPEN_IF, 0, 0, &fnum2))) { printf("TEST #5 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("TEST #5 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli2, fnum2))) { printf("TEST #5 close 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } printf("non-io open test #5 passed.\n"); printf("TEST #6 testing 1 non-io open, one io open\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("TEST #6 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_ntcreate(cli2, fname, 0, FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ, FILE_OPEN_IF, 0, 0, &fnum2))) { printf("TEST #6 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("TEST #6 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli2, fnum2))) { printf("TEST #6 close 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); return False; } printf("non-io open test #6 passed.\n"); printf("TEST #7 testing 1 non-io open, one io open with delete\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("TEST #7 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } if (NT_STATUS_IS_OK(cli_ntcreate(cli2, fname, 0, DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_DELETE, FILE_OPEN_IF, 0, 0, &fnum2))) { printf("TEST #7 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, cli_errstr(cli2)); return False; } printf("TEST #7 open 2 of %s gave %s (correct error should be %s)\n", fname, cli_errstr(cli2), "sharing violation"); if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("TEST #7 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); return False; } printf("non-io open test #7 passed.\n"); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!torture_close_connection(cli1)) { correct = False; } if (!torture_close_connection(cli2)) { correct = False; } return correct; } NTSTATUS torture_setup_unix_extensions(struct cli_state *cli) { uint16 major, minor; uint32 caplow, caphigh; NTSTATUS status; if (!SERVER_HAS_UNIX_CIFS(cli)) { printf("Server doesn't support UNIX CIFS extensions.\n"); return NT_STATUS_NOT_SUPPORTED; } status = cli_unix_extensions_version(cli, &major, &minor, &caplow, &caphigh); if (!NT_STATUS_IS_OK(status)) { printf("Server didn't return UNIX CIFS extensions: %s\n", nt_errstr(status)); return status; } status = cli_set_unix_extensions_capabilities(cli, major, minor, caplow, caphigh); if (!NT_STATUS_IS_OK(status)) { printf("Server doesn't support setting UNIX CIFS extensions: " "%s.\n", nt_errstr(status)); return status; } return NT_STATUS_OK; } /* Test POSIX open /mkdir calls. */ static bool run_simple_posix_open_test(int dummy) { static struct cli_state *cli1; const char *fname = "posix:file"; const char *hname = "posix:hlink"; const char *sname = "posix:symlink"; const char *dname = "posix:dir"; char buf[10]; char namebuf[11]; uint16_t fnum1 = (uint16_t)-1; SMB_STRUCT_STAT sbuf; bool correct = false; NTSTATUS status; printf("Starting simple POSIX open test\n"); if (!torture_open_connection(&cli1, 0)) { return false; } cli_sockopt(cli1, sockops); status = torture_setup_unix_extensions(cli1); if (!NT_STATUS_IS_OK(status)) { return false; } cli_setatr(cli1, fname, 0, 0); cli_posix_unlink(cli1, fname); cli_setatr(cli1, dname, 0, 0); cli_posix_rmdir(cli1, dname); cli_setatr(cli1, hname, 0, 0); cli_posix_unlink(cli1, hname); cli_setatr(cli1, sname, 0, 0); cli_posix_unlink(cli1, sname); /* Create a directory. */ if (!NT_STATUS_IS_OK(cli_posix_mkdir(cli1, dname, 0777))) { printf("POSIX mkdir of %s failed (%s)\n", dname, cli_errstr(cli1)); goto out; } if (!NT_STATUS_IS_OK(cli_posix_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, 0600, &fnum1))) { printf("POSIX create of %s failed (%s)\n", fname, cli_errstr(cli1)); goto out; } /* Test ftruncate - set file size. */ if (!NT_STATUS_IS_OK(cli_ftruncate(cli1, fnum1, 1000))) { printf("ftruncate failed (%s)\n", cli_errstr(cli1)); goto out; } /* Ensure st_size == 1000 */ if (!NT_STATUS_IS_OK(cli_posix_stat(cli1, fname, &sbuf))) { printf("stat failed (%s)\n", cli_errstr(cli1)); goto out; } if (sbuf.st_ex_size != 1000) { printf("ftruncate - stat size (%u) != 1000\n", (unsigned int)sbuf.st_ex_size); goto out; } /* Test ftruncate - set file size back to zero. */ if (!NT_STATUS_IS_OK(cli_ftruncate(cli1, fnum1, 0))) { printf("ftruncate failed (%s)\n", cli_errstr(cli1)); goto out; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close failed (%s)\n", cli_errstr(cli1)); goto out; } /* Now open the file again for read only. */ if (!NT_STATUS_IS_OK(cli_posix_open(cli1, fname, O_RDONLY, 0, &fnum1))) { printf("POSIX open of %s failed (%s)\n", fname, cli_errstr(cli1)); goto out; } /* Now unlink while open. */ if (!NT_STATUS_IS_OK(cli_posix_unlink(cli1, fname))) { printf("POSIX unlink of %s failed (%s)\n", fname, cli_errstr(cli1)); goto out; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close(2) failed (%s)\n", cli_errstr(cli1)); goto out; } /* Ensure the file has gone. */ if (NT_STATUS_IS_OK(cli_posix_open(cli1, fname, O_RDONLY, 0, &fnum1))) { printf("POSIX open of %s succeeded, should have been deleted.\n", fname); goto out; } /* What happens when we try and POSIX open a directory ? */ if (NT_STATUS_IS_OK(cli_posix_open(cli1, dname, O_RDONLY, 0, &fnum1))) { printf("POSIX open of directory %s succeeded, should have failed.\n", fname); goto out; } else { if (!check_error(__LINE__, cli1, ERRDOS, EISDIR, NT_STATUS_FILE_IS_A_DIRECTORY)) { goto out; } } /* Create the file. */ if (!NT_STATUS_IS_OK(cli_posix_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, 0600, &fnum1))) { printf("POSIX create of %s failed (%s)\n", fname, cli_errstr(cli1)); goto out; } /* Write some data into it. */ if (cli_write(cli1, fnum1, 0, "TEST DATA\n", 0, 10) != 10) { printf("cli_write failed: %s\n", cli_errstr(cli1)); goto out; } cli_close(cli1, fnum1); /* Now create a hardlink. */ if (!NT_STATUS_IS_OK(cli_posix_hardlink(cli1, fname, hname))) { printf("POSIX hardlink of %s failed (%s)\n", hname, cli_errstr(cli1)); goto out; } /* Now create a symlink. */ if (!NT_STATUS_IS_OK(cli_posix_symlink(cli1, fname, sname))) { printf("POSIX symlink of %s failed (%s)\n", sname, cli_errstr(cli1)); goto out; } /* Open the hardlink for read. */ if (!NT_STATUS_IS_OK(cli_posix_open(cli1, hname, O_RDONLY, 0, &fnum1))) { printf("POSIX open of %s failed (%s)\n", hname, cli_errstr(cli1)); goto out; } if (cli_read(cli1, fnum1, buf, 0, 10) != 10) { printf("POSIX read of %s failed (%s)\n", hname, cli_errstr(cli1)); goto out; } if (memcmp(buf, "TEST DATA\n", 10)) { printf("invalid data read from hardlink\n"); goto out; } /* Do a POSIX lock/unlock. */ if (!NT_STATUS_IS_OK(cli_posix_lock(cli1, fnum1, 0, 100, true, READ_LOCK))) { printf("POSIX lock failed %s\n", cli_errstr(cli1)); goto out; } /* Punch a hole in the locked area. */ if (!NT_STATUS_IS_OK(cli_posix_unlock(cli1, fnum1, 10, 80))) { printf("POSIX unlock failed %s\n", cli_errstr(cli1)); goto out; } cli_close(cli1, fnum1); /* Open the symlink for read - this should fail. A POSIX client should not be doing opens on a symlink. */ if (NT_STATUS_IS_OK(cli_posix_open(cli1, sname, O_RDONLY, 0, &fnum1))) { printf("POSIX open of %s succeeded (should have failed)\n", sname); goto out; } else { if (!check_error(__LINE__, cli1, ERRDOS, ERRbadpath, NT_STATUS_OBJECT_PATH_NOT_FOUND)) { printf("POSIX open of %s should have failed " "with NT_STATUS_OBJECT_PATH_NOT_FOUND, " "failed with %s instead.\n", sname, cli_errstr(cli1)); goto out; } } if (!NT_STATUS_IS_OK(cli_posix_readlink(cli1, sname, namebuf, sizeof(namebuf)))) { printf("POSIX readlink on %s failed (%s)\n", sname, cli_errstr(cli1)); goto out; } if (strcmp(namebuf, fname) != 0) { printf("POSIX readlink on %s failed to match name %s (read %s)\n", sname, fname, namebuf); goto out; } if (!NT_STATUS_IS_OK(cli_posix_rmdir(cli1, dname))) { printf("POSIX rmdir failed (%s)\n", cli_errstr(cli1)); goto out; } printf("Simple POSIX open test passed\n"); correct = true; out: if (fnum1 != (uint16_t)-1) { cli_close(cli1, fnum1); fnum1 = (uint16_t)-1; } cli_setatr(cli1, sname, 0, 0); cli_posix_unlink(cli1, sname); cli_setatr(cli1, hname, 0, 0); cli_posix_unlink(cli1, hname); cli_setatr(cli1, fname, 0, 0); cli_posix_unlink(cli1, fname); cli_setatr(cli1, dname, 0, 0); cli_posix_rmdir(cli1, dname); if (!torture_close_connection(cli1)) { correct = false; } return correct; } static uint32 open_attrs_table[] = { FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_READONLY, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_HIDDEN,FILE_ATTRIBUTE_SYSTEM, }; struct trunc_open_results { unsigned int num; uint32 init_attr; uint32 trunc_attr; uint32 result_attr; }; static struct trunc_open_results attr_results[] = { { 0, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_ARCHIVE }, { 1, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_ARCHIVE }, { 2, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_READONLY, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY }, { 16, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_ARCHIVE }, { 17, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_ARCHIVE }, { 18, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_READONLY, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY }, { 51, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, { 54, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, { 56, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN }, { 68, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, { 71, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, { 73, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM }, { 99, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_HIDDEN,FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, { 102, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, { 104, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN }, { 116, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, { 119, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, { 121, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM }, { 170, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM|FILE_ATTRIBUTE_HIDDEN }, { 173, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM }, { 227, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, { 230, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, { 232, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN }, { 244, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, { 247, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, { 249, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM } }; static bool run_openattrtest(int dummy) { static struct cli_state *cli1; const char *fname = "\\openattr.file"; uint16_t fnum1; bool correct = True; uint16 attr; unsigned int i, j, k, l; printf("starting open attr test\n"); if (!torture_open_connection(&cli1, 0)) { return False; } cli_sockopt(cli1, sockops); for (k = 0, i = 0; i < sizeof(open_attrs_table)/sizeof(uint32); i++) { cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_WRITE_DATA, open_attrs_table[i], FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0, 0, &fnum1))) { printf("open %d (1) of %s failed (%s)\n", i, fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close %d (1) of %s failed (%s)\n", i, fname, cli_errstr(cli1)); return False; } for (j = 0; j < sizeof(open_attrs_table)/sizeof(uint32); j++) { if (!NT_STATUS_IS_OK(cli_ntcreate(cli1, fname, 0, FILE_READ_DATA|FILE_WRITE_DATA, open_attrs_table[j], FILE_SHARE_NONE, FILE_OVERWRITE, 0, 0, &fnum1))) { for (l = 0; l < sizeof(attr_results)/sizeof(struct trunc_open_results); l++) { if (attr_results[l].num == k) { printf("[%d] trunc open 0x%x -> 0x%x of %s failed - should have succeeded !(0x%x:%s)\n", k, open_attrs_table[i], open_attrs_table[j], fname, NT_STATUS_V(cli_nt_error(cli1)), cli_errstr(cli1)); correct = False; } } if (NT_STATUS_V(cli_nt_error(cli1)) != NT_STATUS_V(NT_STATUS_ACCESS_DENIED)) { printf("[%d] trunc open 0x%x -> 0x%x failed with wrong error code %s\n", k, open_attrs_table[i], open_attrs_table[j], cli_errstr(cli1)); correct = False; } #if 0 printf("[%d] trunc open 0x%x -> 0x%x failed\n", k, open_attrs_table[i], open_attrs_table[j]); #endif k++; continue; } if (!NT_STATUS_IS_OK(cli_close(cli1, fnum1))) { printf("close %d (2) of %s failed (%s)\n", j, fname, cli_errstr(cli1)); return False; } if (!NT_STATUS_IS_OK(cli_getatr(cli1, fname, &attr, NULL, NULL))) { printf("getatr(2) failed (%s)\n", cli_errstr(cli1)); return False; } #if 0 printf("[%d] getatr check [0x%x] trunc [0x%x] got attr 0x%x\n", k, open_attrs_table[i], open_attrs_table[j], attr ); #endif for (l = 0; l < sizeof(attr_results)/sizeof(struct trunc_open_results); l++) { if (attr_results[l].num == k) { if (attr != attr_results[l].result_attr || open_attrs_table[i] != attr_results[l].init_attr || open_attrs_table[j] != attr_results[l].trunc_attr) { printf("getatr check failed. [0x%x] trunc [0x%x] got attr 0x%x, should be 0x%x\n", open_attrs_table[i], open_attrs_table[j], (unsigned int)attr, attr_results[l].result_attr); correct = False; } break; } } k++; } } cli_setatr(cli1, fname, 0, 0); cli_unlink(cli1, fname, aSYSTEM | aHIDDEN); printf("open attr test %s.\n", correct ? "passed" : "failed"); if (!torture_close_connection(cli1)) { correct = False; } return correct; } static NTSTATUS list_fn(const char *mnt, struct file_info *finfo, const char *name, void *state) { int *matched = (int *)state; if (matched != NULL) { *matched += 1; } return NT_STATUS_OK; } /* test directory listing speed */ static bool run_dirtest(int dummy) { int i; static struct cli_state *cli; uint16_t fnum; struct timeval core_start; bool correct = True; int matched; printf("starting directory test\n"); if (!torture_open_connection(&cli, 0)) { return False; } cli_sockopt(cli, sockops); srandom(0); for (i=0;iname); if (strcmp(finfo->name, ".") == 0 || strcmp(finfo->name, "..") == 0) return NT_STATUS_OK; if (finfo->mode & aDIR) { if (!NT_STATUS_IS_OK(cli_rmdir(pcli, fname))) printf("del_fn: failed to rmdir %s\n,", fname ); } else { if (!NT_STATUS_IS_OK(cli_unlink(pcli, fname, aSYSTEM | aHIDDEN))) printf("del_fn: failed to unlink %s\n,", fname ); } return NT_STATUS_OK; } /* sees what IOCTLs are supported */ bool torture_ioctl_test(int dummy) { static struct cli_state *cli; uint16_t device, function; uint16_t fnum; const char *fname = "\\ioctl.dat"; DATA_BLOB blob; NTSTATUS status; if (!torture_open_connection(&cli, 0)) { return False; } printf("starting ioctl test\n"); cli_unlink(cli, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_open(cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum))) { printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); return False; } status = cli_raw_ioctl(cli, fnum, 0x2d0000 | (0x0420<<2), &blob); printf("ioctl device info: %s\n", nt_errstr(status)); status = cli_raw_ioctl(cli, fnum, IOCTL_QUERY_JOB_INFO, &blob); printf("ioctl job info: %s\n", nt_errstr(status)); for (device=0;device<0x100;device++) { printf("ioctl test with device = 0x%x\n", device); for (function=0;function<0x100;function++) { uint32 code = (device<<16) | function; status = cli_raw_ioctl(cli, fnum, code, &blob); if (NT_STATUS_IS_OK(status)) { printf("ioctl 0x%x OK : %d bytes\n", (int)code, (int)blob.length); data_blob_free(&blob); } } } if (!torture_close_connection(cli)) { return False; } return True; } /* tries varients of chkpath */ bool torture_chkpath_test(int dummy) { static struct cli_state *cli; uint16_t fnum; bool ret; if (!torture_open_connection(&cli, 0)) { return False; } printf("starting chkpath test\n"); /* cleanup from an old run */ cli_rmdir(cli, "\\chkpath.dir\\dir2"); cli_unlink(cli, "\\chkpath.dir\\*", aSYSTEM | aHIDDEN); cli_rmdir(cli, "\\chkpath.dir"); if (!NT_STATUS_IS_OK(cli_mkdir(cli, "\\chkpath.dir"))) { printf("mkdir1 failed : %s\n", cli_errstr(cli)); return False; } if (!NT_STATUS_IS_OK(cli_mkdir(cli, "\\chkpath.dir\\dir2"))) { printf("mkdir2 failed : %s\n", cli_errstr(cli)); return False; } if (!NT_STATUS_IS_OK(cli_open(cli, "\\chkpath.dir\\foo.txt", O_RDWR|O_CREAT|O_EXCL, DENY_NONE, &fnum))) { printf("open1 failed (%s)\n", cli_errstr(cli)); return False; } cli_close(cli, fnum); if (!NT_STATUS_IS_OK(cli_chkpath(cli, "\\chkpath.dir"))) { printf("chkpath1 failed: %s\n", cli_errstr(cli)); ret = False; } if (!NT_STATUS_IS_OK(cli_chkpath(cli, "\\chkpath.dir\\dir2"))) { printf("chkpath2 failed: %s\n", cli_errstr(cli)); ret = False; } if (!NT_STATUS_IS_OK(cli_chkpath(cli, "\\chkpath.dir\\foo.txt"))) { ret = check_error(__LINE__, cli, ERRDOS, ERRbadpath, NT_STATUS_NOT_A_DIRECTORY); } else { printf("* chkpath on a file should fail\n"); ret = False; } if (!NT_STATUS_IS_OK(cli_chkpath(cli, "\\chkpath.dir\\bar.txt"))) { ret = check_error(__LINE__, cli, ERRDOS, ERRbadfile, NT_STATUS_OBJECT_NAME_NOT_FOUND); } else { printf("* chkpath on a non existant file should fail\n"); ret = False; } if (!NT_STATUS_IS_OK(cli_chkpath(cli, "\\chkpath.dir\\dirxx\\bar.txt"))) { ret = check_error(__LINE__, cli, ERRDOS, ERRbadpath, NT_STATUS_OBJECT_PATH_NOT_FOUND); } else { printf("* chkpath on a non existent component should fail\n"); ret = False; } cli_rmdir(cli, "\\chkpath.dir\\dir2"); cli_unlink(cli, "\\chkpath.dir\\*", aSYSTEM | aHIDDEN); cli_rmdir(cli, "\\chkpath.dir"); if (!torture_close_connection(cli)) { return False; } return ret; } static bool run_eatest(int dummy) { static struct cli_state *cli; const char *fname = "\\eatest.txt"; bool correct = True; uint16_t fnum; int i; size_t num_eas; struct ea_struct *ea_list = NULL; TALLOC_CTX *mem_ctx = talloc_init("eatest"); NTSTATUS status; printf("starting eatest\n"); if (!torture_open_connection(&cli, 0)) { talloc_destroy(mem_ctx); return False; } cli_unlink(cli, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(cli_ntcreate(cli, fname, 0, FIRST_DESIRED_ACCESS, FILE_ATTRIBUTE_ARCHIVE, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0x4044, 0, &fnum))) { printf("open failed - %s\n", cli_errstr(cli)); talloc_destroy(mem_ctx); return False; } for (i = 0; i < 10; i++) { fstring ea_name, ea_val; slprintf(ea_name, sizeof(ea_name), "EA_%d", i); memset(ea_val, (char)i+1, i+1); if (!cli_set_ea_fnum(cli, fnum, ea_name, ea_val, i+1)) { printf("ea_set of name %s failed - %s\n", ea_name, cli_errstr(cli)); talloc_destroy(mem_ctx); return False; } } cli_close(cli, fnum); for (i = 0; i < 10; i++) { fstring ea_name, ea_val; slprintf(ea_name, sizeof(ea_name), "EA_%d", i+10); memset(ea_val, (char)i+1, i+1); if (!cli_set_ea_path(cli, fname, ea_name, ea_val, i+1)) { printf("ea_set of name %s failed - %s\n", ea_name, cli_errstr(cli)); talloc_destroy(mem_ctx); return False; } } status = cli_get_ea_list_path(cli, fname, mem_ctx, &num_eas, &ea_list); if (!NT_STATUS_IS_OK(status)) { printf("ea_get list failed - %s\n", nt_errstr(status)); correct = False; } printf("num_eas = %d\n", (int)num_eas); if (num_eas != 20) { printf("Should be 20 EA's stored... failing.\n"); correct = False; } for (i = 0; i < num_eas; i++) { printf("%d: ea_name = %s. Val = ", i, ea_list[i].name); dump_data(0, ea_list[i].value.data, ea_list[i].value.length); } /* Setting EA's to zero length deletes them. Test this */ printf("Now deleting all EA's - case indepenent....\n"); #if 1 cli_set_ea_path(cli, fname, "", "", 0); #else for (i = 0; i < 20; i++) { fstring ea_name; slprintf(ea_name, sizeof(ea_name), "ea_%d", i); if (!cli_set_ea_path(cli, fname, ea_name, "", 0)) { printf("ea_set of name %s failed - %s\n", ea_name, cli_errstr(cli)); talloc_destroy(mem_ctx); return False; } } #endif status = cli_get_ea_list_path(cli, fname, mem_ctx, &num_eas, &ea_list); if (!NT_STATUS_IS_OK(status)) { printf("ea_get list failed - %s\n", nt_errstr(status)); correct = False; } printf("num_eas = %d\n", (int)num_eas); for (i = 0; i < num_eas; i++) { printf("%d: ea_name = %s. Val = ", i, ea_list[i].name); dump_data(0, ea_list[i].value.data, ea_list[i].value.length); } if (num_eas != 0) { printf("deleting EA's failed.\n"); correct = False; } /* Try and delete a non existant EA. */ if (!cli_set_ea_path(cli, fname, "foo", "", 0)) { printf("deleting non-existant EA 'foo' should succeed. %s\n", cli_errstr(cli)); correct = False; } talloc_destroy(mem_ctx); if (!torture_close_connection(cli)) { correct = False; } return correct; } static bool run_dirtest1(int dummy) { int i; static struct cli_state *cli; uint16_t fnum; int num_seen; bool correct = True; printf("starting directory test\n"); if (!torture_open_connection(&cli, 0)) { return False; } cli_sockopt(cli, sockops); cli_list(cli, "\\LISTDIR\\*", 0, del_fn, cli); cli_list(cli, "\\LISTDIR\\*", aDIR, del_fn, cli); cli_rmdir(cli, "\\LISTDIR"); cli_mkdir(cli, "\\LISTDIR"); /* Create 1000 files and 1000 directories. */ for (i=0;i<1000;i++) { fstring fname; slprintf(fname, sizeof(fname), "\\LISTDIR\\f%d", i); if (!NT_STATUS_IS_OK(cli_ntcreate(cli, fname, 0, GENERIC_ALL_ACCESS, FILE_ATTRIBUTE_ARCHIVE, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OVERWRITE_IF, 0, 0, &fnum))) { fprintf(stderr,"Failed to open %s\n", fname); return False; } cli_close(cli, fnum); } for (i=0;i<1000;i++) { fstring fname; slprintf(fname, sizeof(fname), "\\LISTDIR\\d%d", i); if (!NT_STATUS_IS_OK(cli_mkdir(cli, fname))) { fprintf(stderr,"Failed to open %s\n", fname); return False; } } /* Now ensure that doing an old list sees both files and directories. */ num_seen = 0; cli_list_old(cli, "\\LISTDIR\\*", aDIR, list_fn, &num_seen); printf("num_seen = %d\n", num_seen ); /* We should see 100 files + 1000 directories + . and .. */ if (num_seen != 2002) correct = False; /* Ensure if we have the "must have" bits we only see the * relevent entries. */ num_seen = 0; cli_list_old(cli, "\\LISTDIR\\*", (aDIR<<8)|aDIR, list_fn, &num_seen); printf("num_seen = %d\n", num_seen ); if (num_seen != 1002) correct = False; num_seen = 0; cli_list_old(cli, "\\LISTDIR\\*", (aARCH<<8)|aDIR, list_fn, &num_seen); printf("num_seen = %d\n", num_seen ); if (num_seen != 1000) correct = False; /* Delete everything. */ cli_list(cli, "\\LISTDIR\\*", 0, del_fn, cli); cli_list(cli, "\\LISTDIR\\*", aDIR, del_fn, cli); cli_rmdir(cli, "\\LISTDIR"); #if 0 printf("Matched %d\n", cli_list(cli, "a*.*", 0, list_fn, NULL)); printf("Matched %d\n", cli_list(cli, "b*.*", 0, list_fn, NULL)); printf("Matched %d\n", cli_list(cli, "xyzabc", 0, list_fn, NULL)); #endif if (!torture_close_connection(cli)) { correct = False; } printf("finished dirtest1\n"); return correct; } static bool run_error_map_extract(int dummy) { static struct cli_state *c_dos; static struct cli_state *c_nt; NTSTATUS status; uint32 error; uint32 flgs2, errnum; uint8 errclass; NTSTATUS nt_status; fstring user; /* NT-Error connection */ if (!(c_nt = open_nbt_connection())) { return False; } c_nt->use_spnego = False; status = cli_negprot(c_nt); if (!NT_STATUS_IS_OK(status)) { printf("%s rejected the NT-error negprot (%s)\n", host, nt_errstr(status)); cli_shutdown(c_nt); return False; } if (!NT_STATUS_IS_OK(cli_session_setup(c_nt, "", "", 0, "", 0, workgroup))) { printf("%s rejected the NT-error initial session setup (%s)\n",host, cli_errstr(c_nt)); return False; } /* DOS-Error connection */ if (!(c_dos = open_nbt_connection())) { return False; } c_dos->use_spnego = False; c_dos->force_dos_errors = True; status = cli_negprot(c_dos); if (!NT_STATUS_IS_OK(status)) { printf("%s rejected the DOS-error negprot (%s)\n", host, nt_errstr(status)); cli_shutdown(c_dos); return False; } if (!NT_STATUS_IS_OK(cli_session_setup(c_dos, "", "", 0, "", 0, workgroup))) { printf("%s rejected the DOS-error initial session setup (%s)\n",host, cli_errstr(c_dos)); return False; } for (error=(0xc0000000 | 0x1); error < (0xc0000000| 0xFFF); error++) { fstr_sprintf(user, "%X", error); if (NT_STATUS_IS_OK(cli_session_setup(c_nt, user, password, strlen(password), password, strlen(password), workgroup))) { printf("/** Session setup succeeded. This shouldn't happen...*/\n"); } flgs2 = SVAL(c_nt->inbuf,smb_flg2); /* Case #1: 32-bit NT errors */ if (flgs2 & FLAGS2_32_BIT_ERROR_CODES) { nt_status = NT_STATUS(IVAL(c_nt->inbuf,smb_rcls)); } else { printf("/** Dos error on NT connection! (%s) */\n", cli_errstr(c_nt)); nt_status = NT_STATUS(0xc0000000); } if (NT_STATUS_IS_OK(cli_session_setup(c_dos, user, password, strlen(password), password, strlen(password), workgroup))) { printf("/** Session setup succeeded. This shouldn't happen...*/\n"); } flgs2 = SVAL(c_dos->inbuf,smb_flg2), errnum; /* Case #1: 32-bit NT errors */ if (flgs2 & FLAGS2_32_BIT_ERROR_CODES) { printf("/** NT error on DOS connection! (%s) */\n", cli_errstr(c_nt)); errnum = errclass = 0; } else { cli_dos_error(c_dos, &errclass, &errnum); } if (NT_STATUS_V(nt_status) != error) { printf("/*\t{ This NT error code was 'sqashed'\n\t from %s to %s \n\t during the session setup }\n*/\n", get_nt_error_c_code(NT_STATUS(error)), get_nt_error_c_code(nt_status)); } printf("\t{%s,\t%s,\t%s},\n", smb_dos_err_class(errclass), smb_dos_err_name(errclass, errnum), get_nt_error_c_code(NT_STATUS(error))); } return True; } static bool run_sesssetup_bench(int dummy) { static struct cli_state *c; const char *fname = "\\file.dat"; uint16_t fnum; NTSTATUS status; int i; if (!torture_open_connection(&c, 0)) { return false; } if (!NT_STATUS_IS_OK(cli_ntcreate( c, fname, 0, GENERIC_ALL_ACCESS|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, 0, FILE_OVERWRITE_IF, FILE_DELETE_ON_CLOSE, 0, &fnum))) { d_printf("open %s failed: %s\n", fname, cli_errstr(c)); return false; } for (i=0; ivuid); status = cli_ulogoff(c); if (!NT_STATUS_IS_OK(status)) { d_printf("(%s) cli_ulogoff failed: %s\n", __location__, nt_errstr(status)); return false; } c->vuid = 0; } return true; } static bool subst_test(const char *str, const char *user, const char *domain, uid_t uid, gid_t gid, const char *expected) { char *subst; bool result = true; subst = talloc_sub_specified(talloc_tos(), str, user, domain, uid, gid); if (strcmp(subst, expected) != 0) { printf("sub_specified(%s, %s, %s, %d, %d) returned [%s], expected " "[%s]\n", str, user, domain, (int)uid, (int)gid, subst, expected); result = false; } TALLOC_FREE(subst); return result; } static void chain1_open_completion(struct tevent_req *req) { uint16_t fnum; NTSTATUS status; status = cli_open_recv(req, &fnum); TALLOC_FREE(req); d_printf("cli_open_recv returned %s: %d\n", nt_errstr(status), NT_STATUS_IS_OK(status) ? fnum : -1); } static void chain1_write_completion(struct tevent_req *req) { size_t written; NTSTATUS status; status = cli_write_andx_recv(req, &written); TALLOC_FREE(req); d_printf("cli_write_andx_recv returned %s: %d\n", nt_errstr(status), NT_STATUS_IS_OK(status) ? (int)written : -1); } static void chain1_close_completion(struct tevent_req *req) { NTSTATUS status; bool *done = (bool *)tevent_req_callback_data_void(req); status = cli_close_recv(req); *done = true; TALLOC_FREE(req); d_printf("cli_close returned %s\n", nt_errstr(status)); } static bool run_chain1(int dummy) { struct cli_state *cli1; struct event_context *evt = event_context_init(NULL); struct tevent_req *reqs[3], *smbreqs[3]; bool done = false; const char *str = "foobar"; NTSTATUS status; printf("starting chain1 test\n"); if (!torture_open_connection(&cli1, 0)) { return False; } cli_sockopt(cli1, sockops); reqs[0] = cli_open_create(talloc_tos(), evt, cli1, "\\test", O_CREAT|O_RDWR, 0, &smbreqs[0]); if (reqs[0] == NULL) return false; tevent_req_set_callback(reqs[0], chain1_open_completion, NULL); reqs[1] = cli_write_andx_create(talloc_tos(), evt, cli1, 0, 0, (uint8_t *)str, 0, strlen(str)+1, smbreqs, 1, &smbreqs[1]); if (reqs[1] == NULL) return false; tevent_req_set_callback(reqs[1], chain1_write_completion, NULL); reqs[2] = cli_close_create(talloc_tos(), evt, cli1, 0, &smbreqs[2]); if (reqs[2] == NULL) return false; tevent_req_set_callback(reqs[2], chain1_close_completion, &done); status = cli_smb_chain_send(smbreqs, ARRAY_SIZE(smbreqs)); if (!NT_STATUS_IS_OK(status)) { return false; } while (!done) { event_loop_once(evt); } torture_close_connection(cli1); return True; } static void chain2_sesssetup_completion(struct tevent_req *req) { NTSTATUS status; status = cli_session_setup_guest_recv(req); d_printf("sesssetup returned %s\n", nt_errstr(status)); } static void chain2_tcon_completion(struct tevent_req *req) { bool *done = (bool *)tevent_req_callback_data_void(req); NTSTATUS status; status = cli_tcon_andx_recv(req); d_printf("tcon_and_x returned %s\n", nt_errstr(status)); *done = true; } static bool run_chain2(int dummy) { struct cli_state *cli1; struct event_context *evt = event_context_init(NULL); struct tevent_req *reqs[2], *smbreqs[2]; bool done = false; NTSTATUS status; printf("starting chain2 test\n"); status = cli_start_connection(&cli1, global_myname(), host, NULL, port_to_use, Undefined, 0, NULL); if (!NT_STATUS_IS_OK(status)) { return False; } cli_sockopt(cli1, sockops); reqs[0] = cli_session_setup_guest_create(talloc_tos(), evt, cli1, &smbreqs[0]); if (reqs[0] == NULL) return false; tevent_req_set_callback(reqs[0], chain2_sesssetup_completion, NULL); reqs[1] = cli_tcon_andx_create(talloc_tos(), evt, cli1, "IPC$", "?????", NULL, 0, &smbreqs[1]); if (reqs[1] == NULL) return false; tevent_req_set_callback(reqs[1], chain2_tcon_completion, &done); status = cli_smb_chain_send(smbreqs, ARRAY_SIZE(smbreqs)); if (!NT_STATUS_IS_OK(status)) { return false; } while (!done) { event_loop_once(evt); } torture_close_connection(cli1); return True; } struct torture_createdel_state { struct tevent_context *ev; struct cli_state *cli; }; static void torture_createdel_created(struct tevent_req *subreq); static void torture_createdel_closed(struct tevent_req *subreq); static struct tevent_req *torture_createdel_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct cli_state *cli, const char *name) { struct tevent_req *req, *subreq; struct torture_createdel_state *state; req = tevent_req_create(mem_ctx, &state, struct torture_createdel_state); if (req == NULL) { return NULL; } state->ev = ev; state->cli = cli; subreq = cli_ntcreate_send( state, ev, cli, name, 0, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN_IF, FILE_DELETE_ON_CLOSE, 0); if (tevent_req_nomem(subreq, req)) { return tevent_req_post(req, ev); } tevent_req_set_callback(subreq, torture_createdel_created, req); return req; } static void torture_createdel_created(struct tevent_req *subreq) { struct tevent_req *req = tevent_req_callback_data( subreq, struct tevent_req); struct torture_createdel_state *state = tevent_req_data( req, struct torture_createdel_state); NTSTATUS status; uint16_t fnum; status = cli_ntcreate_recv(subreq, &fnum); TALLOC_FREE(subreq); if (!NT_STATUS_IS_OK(status)) { DEBUG(10, ("cli_ntcreate_recv returned %s\n", nt_errstr(status))); tevent_req_nterror(req, status); return; } subreq = cli_close_send(state, state->ev, state->cli, fnum); if (tevent_req_nomem(subreq, req)) { return; } tevent_req_set_callback(subreq, torture_createdel_closed, req); } static void torture_createdel_closed(struct tevent_req *subreq) { struct tevent_req *req = tevent_req_callback_data( subreq, struct tevent_req); NTSTATUS status; status = cli_close_recv(subreq); if (!NT_STATUS_IS_OK(status)) { DEBUG(10, ("cli_close_recv returned %s\n", nt_errstr(status))); tevent_req_nterror(req, status); return; } tevent_req_done(req); } static NTSTATUS torture_createdel_recv(struct tevent_req *req) { return tevent_req_simple_recv_ntstatus(req); } struct torture_createdels_state { struct tevent_context *ev; struct cli_state *cli; const char *base_name; int sent; int received; int num_files; struct tevent_req **reqs; }; static void torture_createdels_done(struct tevent_req *subreq); static struct tevent_req *torture_createdels_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct cli_state *cli, const char *base_name, int num_parallel, int num_files) { struct tevent_req *req; struct torture_createdels_state *state; int i; req = tevent_req_create(mem_ctx, &state, struct torture_createdels_state); if (req == NULL) { return NULL; } state->ev = ev; state->cli = cli; state->base_name = talloc_strdup(state, base_name); if (tevent_req_nomem(state->base_name, req)) { return tevent_req_post(req, ev); } state->num_files = MAX(num_parallel, num_files); state->sent = 0; state->received = 0; state->reqs = talloc_array(state, struct tevent_req *, num_parallel); if (tevent_req_nomem(state->reqs, req)) { return tevent_req_post(req, ev); } for (i=0; ibase_name, state->sent); if (tevent_req_nomem(name, req)) { return tevent_req_post(req, ev); } state->reqs[i] = torture_createdel_send( state->reqs, state->ev, state->cli, name); if (tevent_req_nomem(state->reqs[i], req)) { return tevent_req_post(req, ev); } name = talloc_move(state->reqs[i], &name); tevent_req_set_callback(state->reqs[i], torture_createdels_done, req); state->sent += 1; } return req; } static void torture_createdels_done(struct tevent_req *subreq) { struct tevent_req *req = tevent_req_callback_data( subreq, struct tevent_req); struct torture_createdels_state *state = tevent_req_data( req, struct torture_createdels_state); size_t num_parallel = talloc_array_length(state->reqs); NTSTATUS status; char *name; int i; status = torture_createdel_recv(subreq); if (!NT_STATUS_IS_OK(status)){ DEBUG(10, ("torture_createdel_recv returned %s\n", nt_errstr(status))); TALLOC_FREE(subreq); tevent_req_nterror(req, status); return; } for (i=0; ireqs[i]) { break; } } if (i == num_parallel) { DEBUG(10, ("received something we did not send\n")); tevent_req_nterror(req, NT_STATUS_INTERNAL_ERROR); return; } TALLOC_FREE(state->reqs[i]); if (state->sent >= state->num_files) { tevent_req_done(req); return; } name = talloc_asprintf(state, "%s%8.8d", state->base_name, state->sent); if (tevent_req_nomem(name, req)) { return; } state->reqs[i] = torture_createdel_send(state->reqs, state->ev, state->cli, name); if (tevent_req_nomem(state->reqs[i], req)) { return; } name = talloc_move(state->reqs[i], &name); tevent_req_set_callback(state->reqs[i], torture_createdels_done, req); state->sent += 1; } static NTSTATUS torture_createdels_recv(struct tevent_req *req) { return tevent_req_simple_recv_ntstatus(req); } struct swallow_notify_state { struct tevent_context *ev; struct cli_state *cli; uint16_t fnum; uint32_t completion_filter; bool recursive; bool (*fn)(uint32_t action, const char *name, void *priv); void *priv; }; static void swallow_notify_done(struct tevent_req *subreq); static struct tevent_req *swallow_notify_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct cli_state *cli, uint16_t fnum, uint32_t completion_filter, bool recursive, bool (*fn)(uint32_t action, const char *name, void *priv), void *priv) { struct tevent_req *req, *subreq; struct swallow_notify_state *state; req = tevent_req_create(mem_ctx, &state, struct swallow_notify_state); if (req == NULL) { return NULL; } state->ev = ev; state->cli = cli; state->fnum = fnum; state->completion_filter = completion_filter; state->recursive = recursive; state->fn = fn; state->priv = priv; subreq = cli_notify_send(state, state->ev, state->cli, state->fnum, 0xffff, state->completion_filter, state->recursive); if (tevent_req_nomem(subreq, req)) { return tevent_req_post(req, ev); } tevent_req_set_callback(subreq, swallow_notify_done, req); return req; } static void swallow_notify_done(struct tevent_req *subreq) { struct tevent_req *req = tevent_req_callback_data( subreq, struct tevent_req); struct swallow_notify_state *state = tevent_req_data( req, struct swallow_notify_state); NTSTATUS status; uint32_t i, num_changes; struct notify_change *changes; status = cli_notify_recv(subreq, state, &num_changes, &changes); TALLOC_FREE(subreq); if (!NT_STATUS_IS_OK(status)) { DEBUG(10, ("cli_notify_recv returned %s\n", nt_errstr(status))); tevent_req_nterror(req, status); return; } for (i=0; ifn(changes[i].action, changes[i].name, state->priv); } TALLOC_FREE(changes); subreq = cli_notify_send(state, state->ev, state->cli, state->fnum, 0xffff, state->completion_filter, state->recursive); if (tevent_req_nomem(subreq, req)) { return; } tevent_req_set_callback(subreq, swallow_notify_done, req); } static bool print_notifies(uint32_t action, const char *name, void *priv) { if (DEBUGLEVEL > 5) { d_printf("%d %s\n", (int)action, name); } return true; } static void notify_bench_done(struct tevent_req *req) { int *num_finished = (int *)tevent_req_callback_data_void(req); *num_finished += 1; } static bool run_notify_bench(int dummy) { const char *dname = "\\notify-bench"; struct tevent_context *ev; NTSTATUS status; uint16_t dnum; struct tevent_req *req1; struct tevent_req *req2 = NULL; int i, num_unc_names; int num_finished = 0; printf("starting notify-bench test\n"); if (use_multishare_conn) { char **unc_list; unc_list = file_lines_load(multishare_conn_fname, &num_unc_names, 0, NULL); if (!unc_list || num_unc_names <= 0) { d_printf("Failed to load unc names list from '%s'\n", multishare_conn_fname); return false; } TALLOC_FREE(unc_list); } else { num_unc_names = 1; } ev = tevent_context_init(talloc_tos()); if (ev == NULL) { d_printf("tevent_context_init failed\n"); return false; } for (i=0; ivuid; status = cli_ulogoff(cli); if (!NT_STATUS_IS_OK(status)) { d_printf("(%s) cli_ulogoff failed: %s\n", __location__, nt_errstr(status)); correct = false; goto out; } cli->vuid = old_vuid; /* Try an operation. */ status = cli_mkdir(cli, "\\uid_reg_test"); if (NT_STATUS_IS_OK(status)) { d_printf("(%s) cli_mkdir succeeded\n", __location__); correct = false; goto out; } else { /* Should be bad uid. */ if (!check_error(__LINE__, cli, ERRSRV, ERRbaduid, NT_STATUS_USER_SESSION_DELETED)) { correct = false; goto out; } } old_cnum = cli->cnum; /* Now try a SMBtdis with the invald vuid set to zero. */ cli->vuid = 0; /* This should succeed. */ status = cli_tdis(cli); if (NT_STATUS_IS_OK(status)) { d_printf("First tdis with invalid vuid should succeed.\n"); } else { d_printf("First tdis failed (%s)\n", nt_errstr(status)); correct = false; goto out; } cli->vuid = old_vuid; cli->cnum = old_cnum; /* This should fail. */ status = cli_tdis(cli); if (NT_STATUS_IS_OK(status)) { d_printf("Second tdis with invalid vuid should fail - succeeded instead !.\n"); correct = false; goto out; } else { /* Should be bad tid. */ if (!check_error(__LINE__, cli, ERRSRV, ERRinvnid, NT_STATUS_NETWORK_NAME_DELETED)) { correct = false; goto out; } } cli_rmdir(cli, "\\uid_reg_test"); out: cli_shutdown(cli); return correct; } static const char *illegal_chars = "*\\/?<>|\":"; static char force_shortname_chars[] = " +,.[];=\177"; static NTSTATUS shortname_del_fn(const char *mnt, struct file_info *finfo, const char *mask, void *state) { struct cli_state *pcli = (struct cli_state *)state; fstring fname; NTSTATUS status = NT_STATUS_OK; slprintf(fname, sizeof(fname), "\\shortname\\%s", finfo->name); if (strcmp(finfo->name, ".") == 0 || strcmp(finfo->name, "..") == 0) return NT_STATUS_OK; if (finfo->mode & aDIR) { status = cli_rmdir(pcli, fname); if (!NT_STATUS_IS_OK(status)) { printf("del_fn: failed to rmdir %s\n,", fname ); } } else { status = cli_unlink(pcli, fname, aSYSTEM | aHIDDEN); if (!NT_STATUS_IS_OK(status)) { printf("del_fn: failed to unlink %s\n,", fname ); } } return status; } struct sn_state { int matched; int i; bool val; }; static NTSTATUS shortname_list_fn(const char *mnt, struct file_info *finfo, const char *name, void *state) { struct sn_state *s = (struct sn_state *)state; int i = s->i; #if 0 printf("shortname list: i = %d, name = |%s|, shortname = |%s|\n", i, finfo->name, finfo->short_name); #endif if (strchr(force_shortname_chars, i)) { if (!finfo->short_name[0]) { /* Shortname not created when it should be. */ d_printf("(%s) ERROR: Shortname was not created for file %s containing %d\n", __location__, finfo->name, i); s->val = true; } } else if (finfo->short_name[0]){ /* Shortname created when it should not be. */ d_printf("(%s) ERROR: Shortname %s was created for file %s\n", __location__, finfo->short_name, finfo->name); s->val = true; } s->matched += 1; return NT_STATUS_OK; } static bool run_shortname_test(int dummy) { static struct cli_state *cli; bool correct = True; int i; struct sn_state s; char fname[20]; printf("starting shortname test\n"); if (!torture_open_connection(&cli, 0)) { return False; } cli_sockopt(cli, sockops); cli_list(cli, "\\shortname\\*", 0, shortname_del_fn, cli); cli_list(cli, "\\shortname\\*", aDIR, shortname_del_fn, cli); cli_rmdir(cli, "\\shortname"); if (!NT_STATUS_IS_OK(cli_mkdir(cli, "\\shortname"))) { d_printf("(%s) cli_mkdir of \\shortname failed: %s\n", __location__, cli_errstr(cli)); correct = false; goto out; } strlcpy(fname, "\\shortname\\", sizeof(fname)); strlcat(fname, "test .txt", sizeof(fname)); s.val = false; for (i = 32; i < 128; i++) { NTSTATUS status; uint16_t fnum = (uint16_t)-1; s.i = i; if (strchr(illegal_chars, i)) { continue; } fname[15] = i; status = cli_ntcreate(cli, fname, 0, GENERIC_ALL_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OVERWRITE_IF, 0, 0, &fnum); if (!NT_STATUS_IS_OK(status)) { d_printf("(%s) cli_nt_create of %s failed: %s\n", __location__, fname, cli_errstr(cli)); correct = false; goto out; } cli_close(cli, fnum); s.matched = 0; cli_list(cli, "\\shortname\\test*.*", 0, shortname_list_fn, &s); if (s.matched != 1) { d_printf("(%s) failed to list %s: %s\n", __location__, fname, cli_errstr(cli)); correct = false; goto out; } if (!NT_STATUS_IS_OK(cli_unlink(cli, fname, aSYSTEM | aHIDDEN))) { d_printf("(%s) failed to delete %s: %s\n", __location__, fname, cli_errstr(cli)); correct = false; goto out; } if (s.val) { correct = false; goto out; } } out: cli_list(cli, "\\shortname\\*", 0, shortname_del_fn, cli); cli_list(cli, "\\shortname\\*", aDIR, shortname_del_fn, cli); cli_rmdir(cli, "\\shortname"); torture_close_connection(cli); return correct; } static void pagedsearch_cb(struct tevent_req *req) { int rc; struct tldap_message *msg; char *dn; rc = tldap_search_paged_recv(req, talloc_tos(), &msg); if (rc != TLDAP_SUCCESS) { d_printf("tldap_search_paged_recv failed: %s\n", tldap_err2string(rc)); return; } if (tldap_msg_type(msg) != TLDAP_RES_SEARCH_ENTRY) { TALLOC_FREE(msg); return; } if (!tldap_entry_dn(msg, &dn)) { d_printf("tldap_entry_dn failed\n"); return; } d_printf("%s\n", dn); TALLOC_FREE(msg); } static bool run_tldap(int dummy) { struct tldap_context *ld; int fd, rc; NTSTATUS status; struct sockaddr_storage addr; struct tevent_context *ev; struct tevent_req *req; char *basedn; const char *filter; if (!resolve_name(host, &addr, 0, false)) { d_printf("could not find host %s\n", host); return false; } status = open_socket_out(&addr, 389, 9999, &fd); if (!NT_STATUS_IS_OK(status)) { d_printf("open_socket_out failed: %s\n", nt_errstr(status)); return false; } ld = tldap_context_create(talloc_tos(), fd); if (ld == NULL) { close(fd); d_printf("tldap_context_create failed\n"); return false; } rc = tldap_fetch_rootdse(ld); if (rc != TLDAP_SUCCESS) { d_printf("tldap_fetch_rootdse failed: %s\n", tldap_errstr(talloc_tos(), ld, rc)); return false; } basedn = tldap_talloc_single_attribute( tldap_rootdse(ld), "defaultNamingContext", talloc_tos()); if (basedn == NULL) { d_printf("no defaultNamingContext\n"); return false; } d_printf("defaultNamingContext: %s\n", basedn); ev = tevent_context_init(talloc_tos()); if (ev == NULL) { d_printf("tevent_context_init failed\n"); return false; } req = tldap_search_paged_send(talloc_tos(), ev, ld, basedn, TLDAP_SCOPE_SUB, "(objectclass=*)", NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, 5); if (req == NULL) { d_printf("tldap_search_paged_send failed\n"); return false; } tevent_req_set_callback(req, pagedsearch_cb, NULL); tevent_req_poll(req, ev); TALLOC_FREE(req); /* test search filters against rootDSE */ filter = "(&(|(name=samba)(nextRid<=10000000)(usnChanged>=10)(samba~=ambas)(!(name=s*m*a)))" "(|(name:=samba)(name:dn:2.5.13.5:=samba)(:dn:2.5.13.5:=samba)(!(name=*samba))))"; rc = tldap_search(ld, "", TLDAP_SCOPE_BASE, filter, NULL, 0, 0, NULL, 0, NULL, 0, 0, 0, 0, talloc_tos(), NULL, NULL); if (rc != TLDAP_SUCCESS) { d_printf("tldap_search with complex filter failed: %s\n", tldap_errstr(talloc_tos(), ld, rc)); return false; } TALLOC_FREE(ld); return true; } /* Torture test to ensure no regression of : https://bugzilla.samba.org/show_bug.cgi?id=7084 */ static bool run_dir_createtime(int dummy) { struct cli_state *cli; const char *dname = "\\testdir"; const char *fname = "\\testdir\\testfile"; NTSTATUS status; struct timespec create_time; struct timespec create_time1; uint16_t fnum; bool ret = false; if (!torture_open_connection(&cli, 0)) { return false; } cli_unlink(cli, fname, aSYSTEM | aHIDDEN); cli_rmdir(cli, dname); status = cli_mkdir(cli, dname); if (!NT_STATUS_IS_OK(status)) { printf("mkdir failed: %s\n", nt_errstr(status)); goto out; } status = cli_qpathinfo2(cli, dname, &create_time, NULL, NULL, NULL, NULL, NULL, NULL); if (!NT_STATUS_IS_OK(status)) { printf("cli_qpathinfo2 returned %s\n", nt_errstr(status)); goto out; } /* Sleep 3 seconds, then create a file. */ sleep(3); status = cli_open(cli, fname, O_RDWR | O_CREAT | O_EXCL, DENY_NONE, &fnum); if (!NT_STATUS_IS_OK(status)) { printf("cli_open failed: %s\n", nt_errstr(status)); goto out; } status = cli_qpathinfo2(cli, dname, &create_time1, NULL, NULL, NULL, NULL, NULL, NULL); if (!NT_STATUS_IS_OK(status)) { printf("cli_qpathinfo2 (2) returned %s\n", nt_errstr(status)); goto out; } if (timespec_compare(&create_time1, &create_time)) { printf("run_dir_createtime: create time was updated (error)\n"); } else { printf("run_dir_createtime: create time was not updated (correct)\n"); ret = true; } out: cli_unlink(cli, fname, aSYSTEM | aHIDDEN); cli_rmdir(cli, dname); if (!torture_close_connection(cli)) { ret = false; } return ret; } static bool run_streamerror(int dummy) { struct cli_state *cli; const char *dname = "\\testdir"; const char *streamname = "testdir:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d}:$DATA"; NTSTATUS status; time_t change_time, access_time, write_time; SMB_OFF_T size; uint16_t mode, fnum; bool ret = true; if (!torture_open_connection(&cli, 0)) { return false; } cli_unlink(cli, "\\testdir\\*", aSYSTEM | aHIDDEN); cli_rmdir(cli, dname); status = cli_mkdir(cli, dname); if (!NT_STATUS_IS_OK(status)) { printf("mkdir failed: %s\n", nt_errstr(status)); return false; } cli_qpathinfo1(cli, streamname, &change_time, &access_time, &write_time, &size, &mode); status = cli_nt_error(cli); if (!NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) { printf("pathinfo returned %s, expected " "NT_STATUS_OBJECT_NAME_NOT_FOUND\n", nt_errstr(status)); ret = false; } status = cli_ntcreate(cli, streamname, 0x16, FILE_READ_DATA|FILE_READ_EA| FILE_READ_ATTRIBUTES|READ_CONTROL_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ, FILE_OPEN, 0, 0, &fnum); if (!NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) { printf("ntcreate returned %s, expected " "NT_STATUS_OBJECT_NAME_NOT_FOUND\n", nt_errstr(status)); ret = false; } cli_rmdir(cli, dname); return ret; } static bool run_local_substitute(int dummy) { bool ok = true; ok &= subst_test("%U", "bla", "", -1, -1, "bla"); ok &= subst_test("%u%U", "bla", "", -1, -1, "blabla"); ok &= subst_test("%g", "", "", -1, -1, "NO_GROUP"); ok &= subst_test("%G", "", "", -1, -1, "NO_GROUP"); ok &= subst_test("%g", "", "", -1, 0, gidtoname(0)); ok &= subst_test("%G", "", "", -1, 0, gidtoname(0)); ok &= subst_test("%D%u", "u", "dom", -1, 0, "domu"); ok &= subst_test("%i %I", "", "", -1, -1, "0.0.0.0 0.0.0.0"); /* Different captialization rules in sub_basic... */ ok &= (strcmp(talloc_sub_basic(talloc_tos(), "BLA", "dom", "%U%D"), "blaDOM") == 0); return ok; } static bool run_local_base64(int dummy) { int i; bool ret = true; for (i=1; i<2000; i++) { DATA_BLOB blob1, blob2; char *b64; blob1.data = talloc_array(talloc_tos(), uint8_t, i); blob1.length = i; generate_random_buffer(blob1.data, blob1.length); b64 = base64_encode_data_blob(talloc_tos(), blob1); if (b64 == NULL) { d_fprintf(stderr, "base64_encode_data_blob failed " "for %d bytes\n", i); ret = false; } blob2 = base64_decode_data_blob(b64); TALLOC_FREE(b64); if (data_blob_cmp(&blob1, &blob2)) { d_fprintf(stderr, "data_blob_cmp failed for %d " "bytes\n", i); ret = false; } TALLOC_FREE(blob1.data); data_blob_free(&blob2); } return ret; } static bool run_local_gencache(int dummy) { char *val; time_t tm; DATA_BLOB blob; if (!gencache_set("foo", "bar", time(NULL) + 1000)) { d_printf("%s: gencache_set() failed\n", __location__); return False; } if (!gencache_get("foo", NULL, NULL)) { d_printf("%s: gencache_get() failed\n", __location__); return False; } if (!gencache_get("foo", &val, &tm)) { d_printf("%s: gencache_get() failed\n", __location__); return False; } if (strcmp(val, "bar") != 0) { d_printf("%s: gencache_get() returned %s, expected %s\n", __location__, val, "bar"); SAFE_FREE(val); return False; } SAFE_FREE(val); if (!gencache_del("foo")) { d_printf("%s: gencache_del() failed\n", __location__); return False; } if (gencache_del("foo")) { d_printf("%s: second gencache_del() succeeded\n", __location__); return False; } if (gencache_get("foo", &val, &tm)) { d_printf("%s: gencache_get() on deleted entry " "succeeded\n", __location__); return False; } blob = data_blob_string_const_null("bar"); tm = time(NULL) + 60; if (!gencache_set_data_blob("foo", &blob, tm)) { d_printf("%s: gencache_set_data_blob() failed\n", __location__); return False; } if (!gencache_get_data_blob("foo", &blob, NULL, NULL)) { d_printf("%s: gencache_get_data_blob() failed\n", __location__); return False; } if (strcmp((const char *)blob.data, "bar") != 0) { d_printf("%s: gencache_get_data_blob() returned %s, expected %s\n", __location__, (const char *)blob.data, "bar"); data_blob_free(&blob); return False; } data_blob_free(&blob); if (!gencache_del("foo")) { d_printf("%s: gencache_del() failed\n", __location__); return False; } if (gencache_del("foo")) { d_printf("%s: second gencache_del() succeeded\n", __location__); return False; } if (gencache_get_data_blob("foo", &blob, NULL, NULL)) { d_printf("%s: gencache_get_data_blob() on deleted entry " "succeeded\n", __location__); return False; } return True; } static bool rbt_testval(struct db_context *db, const char *key, const char *value) { struct db_record *rec; TDB_DATA data = string_tdb_data(value); bool ret = false; NTSTATUS status; rec = db->fetch_locked(db, db, string_tdb_data(key)); if (rec == NULL) { d_fprintf(stderr, "fetch_locked failed\n"); goto done; } status = rec->store(rec, data, 0); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, "store failed: %s\n", nt_errstr(status)); goto done; } TALLOC_FREE(rec); rec = db->fetch_locked(db, db, string_tdb_data(key)); if (rec == NULL) { d_fprintf(stderr, "second fetch_locked failed\n"); goto done; } if ((rec->value.dsize != data.dsize) || (memcmp(rec->value.dptr, data.dptr, data.dsize) != 0)) { d_fprintf(stderr, "Got wrong data back\n"); goto done; } ret = true; done: TALLOC_FREE(rec); return ret; } static bool run_local_rbtree(int dummy) { struct db_context *db; bool ret = false; int i; db = db_open_rbt(NULL); if (db == NULL) { d_fprintf(stderr, "db_open_rbt failed\n"); return false; } for (i=0; i<1000; i++) { char *key, *value; if (asprintf(&key, "key%ld", random()) == -1) { goto done; } if (asprintf(&value, "value%ld", random()) == -1) { SAFE_FREE(key); goto done; } if (!rbt_testval(db, key, value)) { SAFE_FREE(key); SAFE_FREE(value); goto done; } SAFE_FREE(value); if (asprintf(&value, "value%ld", random()) == -1) { SAFE_FREE(key); goto done; } if (!rbt_testval(db, key, value)) { SAFE_FREE(key); SAFE_FREE(value); goto done; } SAFE_FREE(key); SAFE_FREE(value); } ret = true; done: TALLOC_FREE(db); return ret; } struct talloc_dict_test { int content; }; static int talloc_dict_traverse_fn(DATA_BLOB key, void *data, void *priv) { int *count = (int *)priv; *count += 1; return 0; } static bool run_local_talloc_dict(int dummy) { struct talloc_dict *dict; struct talloc_dict_test *t; int key, count; dict = talloc_dict_init(talloc_tos()); if (dict == NULL) { return false; } t = talloc(talloc_tos(), struct talloc_dict_test); if (t == NULL) { return false; } key = 1; t->content = 1; if (!talloc_dict_set(dict, data_blob_const(&key, sizeof(key)), t)) { return false; } count = 0; if (talloc_dict_traverse(dict, talloc_dict_traverse_fn, &count) != 0) { return false; } if (count != 1) { return false; } TALLOC_FREE(dict); return true; } static bool run_local_string_to_sid(int dummy) { struct dom_sid sid; if (string_to_sid(&sid, "S--1-5-32-545")) { printf("allowing S--1-5-32-545\n"); return false; } if (string_to_sid(&sid, "S-1-5-32-+545")) { printf("allowing S-1-5-32-+545\n"); return false; } if (string_to_sid(&sid, "S-1-2-3-4-5-6-7-8-9-0-1-2-3-4-5-6-7-8-9-0")) { printf("allowing S-1-2-3-4-5-6-7-8-9-0-1-2-3-4-5-6-7-8-9-0\n"); return false; } if (string_to_sid(&sid, "S-1-5-32-545-abc")) { printf("allowing S-1-5-32-545-abc\n"); return false; } if (!string_to_sid(&sid, "S-1-5-32-545")) { printf("could not parse S-1-5-32-545\n"); return false; } if (!dom_sid_equal(&sid, &global_sid_Builtin_Users)) { printf("mis-parsed S-1-5-32-545 as %s\n", sid_string_tos(&sid)); return false; } return true; } static bool run_local_binary_to_sid(int dummy) { struct dom_sid *sid = talloc(NULL, struct dom_sid); static const char good_binary_sid[] = { 0x1, /* revision number */ 15, /* num auths */ 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, /* id_auth */ 0x1, 0x1, 0x1, 0x1, /* auth[0] */ 0x1, 0x1, 0x1, 0x1, /* auth[1] */ 0x1, 0x1, 0x1, 0x1, /* auth[2] */ 0x1, 0x1, 0x1, 0x1, /* auth[3] */ 0x1, 0x1, 0x1, 0x1, /* auth[4] */ 0x1, 0x1, 0x1, 0x1, /* auth[5] */ 0x1, 0x1, 0x1, 0x1, /* auth[6] */ 0x1, 0x1, 0x1, 0x1, /* auth[7] */ 0x1, 0x1, 0x1, 0x1, /* auth[8] */ 0x1, 0x1, 0x1, 0x1, /* auth[9] */ 0x1, 0x1, 0x1, 0x1, /* auth[10] */ 0x1, 0x1, 0x1, 0x1, /* auth[11] */ 0x1, 0x1, 0x1, 0x1, /* auth[12] */ 0x1, 0x1, 0x1, 0x1, /* auth[13] */ 0x1, 0x1, 0x1, 0x1, /* auth[14] */ }; static const char long_binary_sid[] = { 0x1, /* revision number */ 15, /* num auths */ 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, /* id_auth */ 0x1, 0x1, 0x1, 0x1, /* auth[0] */ 0x1, 0x1, 0x1, 0x1, /* auth[1] */ 0x1, 0x1, 0x1, 0x1, /* auth[2] */ 0x1, 0x1, 0x1, 0x1, /* auth[3] */ 0x1, 0x1, 0x1, 0x1, /* auth[4] */ 0x1, 0x1, 0x1, 0x1, /* auth[5] */ 0x1, 0x1, 0x1, 0x1, /* auth[6] */ 0x1, 0x1, 0x1, 0x1, /* auth[7] */ 0x1, 0x1, 0x1, 0x1, /* auth[8] */ 0x1, 0x1, 0x1, 0x1, /* auth[9] */ 0x1, 0x1, 0x1, 0x1, /* auth[10] */ 0x1, 0x1, 0x1, 0x1, /* auth[11] */ 0x1, 0x1, 0x1, 0x1, /* auth[12] */ 0x1, 0x1, 0x1, 0x1, /* auth[13] */ 0x1, 0x1, 0x1, 0x1, /* auth[14] */ 0x1, 0x1, 0x1, 0x1, /* auth[15] */ 0x1, 0x1, 0x1, 0x1, /* auth[16] */ 0x1, 0x1, 0x1, 0x1, /* auth[17] */ }; static const char long_binary_sid2[] = { 0x1, /* revision number */ 32, /* num auths */ 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, /* id_auth */ 0x1, 0x1, 0x1, 0x1, /* auth[0] */ 0x1, 0x1, 0x1, 0x1, /* auth[1] */ 0x1, 0x1, 0x1, 0x1, /* auth[2] */ 0x1, 0x1, 0x1, 0x1, /* auth[3] */ 0x1, 0x1, 0x1, 0x1, /* auth[4] */ 0x1, 0x1, 0x1, 0x1, /* auth[5] */ 0x1, 0x1, 0x1, 0x1, /* auth[6] */ 0x1, 0x1, 0x1, 0x1, /* auth[7] */ 0x1, 0x1, 0x1, 0x1, /* auth[8] */ 0x1, 0x1, 0x1, 0x1, /* auth[9] */ 0x1, 0x1, 0x1, 0x1, /* auth[10] */ 0x1, 0x1, 0x1, 0x1, /* auth[11] */ 0x1, 0x1, 0x1, 0x1, /* auth[12] */ 0x1, 0x1, 0x1, 0x1, /* auth[13] */ 0x1, 0x1, 0x1, 0x1, /* auth[14] */ 0x1, 0x1, 0x1, 0x1, /* auth[15] */ 0x1, 0x1, 0x1, 0x1, /* auth[16] */ 0x1, 0x1, 0x1, 0x1, /* auth[17] */ 0x1, 0x1, 0x1, 0x1, /* auth[18] */ 0x1, 0x1, 0x1, 0x1, /* auth[19] */ 0x1, 0x1, 0x1, 0x1, /* auth[20] */ 0x1, 0x1, 0x1, 0x1, /* auth[21] */ 0x1, 0x1, 0x1, 0x1, /* auth[22] */ 0x1, 0x1, 0x1, 0x1, /* auth[23] */ 0x1, 0x1, 0x1, 0x1, /* auth[24] */ 0x1, 0x1, 0x1, 0x1, /* auth[25] */ 0x1, 0x1, 0x1, 0x1, /* auth[26] */ 0x1, 0x1, 0x1, 0x1, /* auth[27] */ 0x1, 0x1, 0x1, 0x1, /* auth[28] */ 0x1, 0x1, 0x1, 0x1, /* auth[29] */ 0x1, 0x1, 0x1, 0x1, /* auth[30] */ 0x1, 0x1, 0x1, 0x1, /* auth[31] */ }; if (!sid_parse(good_binary_sid, sizeof(good_binary_sid), sid)) { return false; } if (sid_parse(long_binary_sid2, sizeof(long_binary_sid2), sid)) { return false; } if (sid_parse(long_binary_sid, sizeof(long_binary_sid), sid)) { return false; } return true; } /* Split a path name into filename and stream name components. Canonicalise * such that an implicit $DATA token is always explicit. * * The "specification" of this function can be found in the * run_local_stream_name() function in torture.c, I've tried those * combinations against a W2k3 server. */ static NTSTATUS split_ntfs_stream_name(TALLOC_CTX *mem_ctx, const char *fname, char **pbase, char **pstream) { char *base = NULL; char *stream = NULL; char *sname; /* stream name */ const char *stype; /* stream type */ DEBUG(10, ("split_ntfs_stream_name called for [%s]\n", fname)); sname = strchr_m(fname, ':'); if (lp_posix_pathnames() || (sname == NULL)) { if (pbase != NULL) { base = talloc_strdup(mem_ctx, fname); NT_STATUS_HAVE_NO_MEMORY(base); } goto done; } if (pbase != NULL) { base = talloc_strndup(mem_ctx, fname, PTR_DIFF(sname, fname)); NT_STATUS_HAVE_NO_MEMORY(base); } sname += 1; stype = strchr_m(sname, ':'); if (stype == NULL) { sname = talloc_strdup(mem_ctx, sname); stype = "$DATA"; } else { if (StrCaseCmp(stype, ":$DATA") != 0) { /* * If there is an explicit stream type, so far we only * allow $DATA. Is there anything else allowed? -- vl */ DEBUG(10, ("[%s] is an invalid stream type\n", stype)); TALLOC_FREE(base); return NT_STATUS_OBJECT_NAME_INVALID; } sname = talloc_strndup(mem_ctx, sname, PTR_DIFF(stype, sname)); stype += 1; } if (sname == NULL) { TALLOC_FREE(base); return NT_STATUS_NO_MEMORY; } if (sname[0] == '\0') { /* * no stream name, so no stream */ goto done; } if (pstream != NULL) { stream = talloc_asprintf(mem_ctx, "%s:%s", sname, stype); if (stream == NULL) { TALLOC_FREE(sname); TALLOC_FREE(base); return NT_STATUS_NO_MEMORY; } /* * upper-case the type field */ strupper_m(strchr_m(stream, ':')+1); } done: if (pbase != NULL) { *pbase = base; } if (pstream != NULL) { *pstream = stream; } return NT_STATUS_OK; } static bool test_stream_name(const char *fname, const char *expected_base, const char *expected_stream, NTSTATUS expected_status) { NTSTATUS status; char *base = NULL; char *stream = NULL; status = split_ntfs_stream_name(talloc_tos(), fname, &base, &stream); if (!NT_STATUS_EQUAL(status, expected_status)) { goto error; } if (!NT_STATUS_IS_OK(status)) { return true; } if (base == NULL) goto error; if (strcmp(expected_base, base) != 0) goto error; if ((expected_stream != NULL) && (stream == NULL)) goto error; if ((expected_stream == NULL) && (stream != NULL)) goto error; if ((stream != NULL) && (strcmp(expected_stream, stream) != 0)) goto error; TALLOC_FREE(base); TALLOC_FREE(stream); return true; error: d_fprintf(stderr, "Do test_stream(%s, %s, %s, %s)\n", fname, expected_base ? expected_base : "", expected_stream ? expected_stream : "", nt_errstr(expected_status)); d_fprintf(stderr, "-> base=%s, stream=%s, status=%s\n", base ? base : "", stream ? stream : "", nt_errstr(status)); TALLOC_FREE(base); TALLOC_FREE(stream); return false; } static bool run_local_stream_name(int dummy) { bool ret = true; ret &= test_stream_name( "bla", "bla", NULL, NT_STATUS_OK); ret &= test_stream_name( "bla::$DATA", "bla", NULL, NT_STATUS_OK); ret &= test_stream_name( "bla:blub:", "bla", NULL, NT_STATUS_OBJECT_NAME_INVALID); ret &= test_stream_name( "bla::", NULL, NULL, NT_STATUS_OBJECT_NAME_INVALID); ret &= test_stream_name( "bla::123", "bla", NULL, NT_STATUS_OBJECT_NAME_INVALID); ret &= test_stream_name( "bla:$DATA", "bla", "$DATA:$DATA", NT_STATUS_OK); ret &= test_stream_name( "bla:x:$DATA", "bla", "x:$DATA", NT_STATUS_OK); ret &= test_stream_name( "bla:x", "bla", "x:$DATA", NT_STATUS_OK); return ret; } static bool data_blob_equal(DATA_BLOB a, DATA_BLOB b) { if (a.length != b.length) { printf("a.length=%d != b.length=%d\n", (int)a.length, (int)b.length); return false; } if (memcmp(a.data, b.data, a.length) != 0) { printf("a.data and b.data differ\n"); return false; } return true; } static bool run_local_memcache(int dummy) { struct memcache *cache; DATA_BLOB k1, k2; DATA_BLOB d1, d2, d3; DATA_BLOB v1, v2, v3; TALLOC_CTX *mem_ctx; char *str1, *str2; size_t size1, size2; bool ret = false; cache = memcache_init(NULL, 100); if (cache == NULL) { printf("memcache_init failed\n"); return false; } d1 = data_blob_const("d1", 2); d2 = data_blob_const("d2", 2); d3 = data_blob_const("d3", 2); k1 = data_blob_const("d1", 2); k2 = data_blob_const("d2", 2); memcache_add(cache, STAT_CACHE, k1, d1); memcache_add(cache, GETWD_CACHE, k2, d2); if (!memcache_lookup(cache, STAT_CACHE, k1, &v1)) { printf("could not find k1\n"); return false; } if (!data_blob_equal(d1, v1)) { return false; } if (!memcache_lookup(cache, GETWD_CACHE, k2, &v2)) { printf("could not find k2\n"); return false; } if (!data_blob_equal(d2, v2)) { return false; } memcache_add(cache, STAT_CACHE, k1, d3); if (!memcache_lookup(cache, STAT_CACHE, k1, &v3)) { printf("could not find replaced k1\n"); return false; } if (!data_blob_equal(d3, v3)) { return false; } memcache_add(cache, GETWD_CACHE, k1, d1); if (memcache_lookup(cache, GETWD_CACHE, k2, &v2)) { printf("Did find k2, should have been purged\n"); return false; } TALLOC_FREE(cache); cache = memcache_init(NULL, 0); mem_ctx = talloc_init("foo"); str1 = talloc_strdup(mem_ctx, "string1"); str2 = talloc_strdup(mem_ctx, "string2"); memcache_add_talloc(cache, SINGLETON_CACHE_TALLOC, data_blob_string_const("torture"), &str1); size1 = talloc_total_size(cache); memcache_add_talloc(cache, SINGLETON_CACHE_TALLOC, data_blob_string_const("torture"), &str2); size2 = talloc_total_size(cache); printf("size1=%d, size2=%d\n", (int)size1, (int)size2); if (size2 > size1) { printf("memcache leaks memory!\n"); goto fail; } ret = true; fail: TALLOC_FREE(cache); return ret; } static void wbclient_done(struct tevent_req *req) { wbcErr wbc_err; struct winbindd_response *wb_resp; int *i = (int *)tevent_req_callback_data_void(req); wbc_err = wb_trans_recv(req, req, &wb_resp); TALLOC_FREE(req); *i += 1; d_printf("wb_trans_recv %d returned %s\n", *i, wbcErrorString(wbc_err)); } static bool run_local_wbclient(int dummy) { struct event_context *ev; struct wb_context **wb_ctx; struct winbindd_request wb_req; bool result = false; int i, j; BlockSignals(True, SIGPIPE); ev = tevent_context_init_byname(talloc_tos(), "epoll"); if (ev == NULL) { goto fail; } wb_ctx = TALLOC_ARRAY(ev, struct wb_context *, nprocs); if (wb_ctx == NULL) { goto fail; } ZERO_STRUCT(wb_req); wb_req.cmd = WINBINDD_PING; d_printf("nprocs=%d, numops=%d\n", (int)nprocs, (int)torture_numops); for (i=0; ifetch_locked(db, db, string_term_tdb_data("transtest")); if (rec == NULL) { printf(__location__ "fetch_lock failed\n"); return false; } if (rec->value.dsize != sizeof(uint32_t)) { printf(__location__ "value.dsize = %d\n", (int)rec->value.dsize); goto fail; } val = (uint32_t *)rec->value.dptr; *val += 1; status = rec->store(rec, make_tdb_data((uint8_t *)val, sizeof(uint32_t)), 0); if (!NT_STATUS_IS_OK(status)) { printf(__location__ "store failed: %s\n", nt_errstr(status)); goto fail; } ret = true; fail: TALLOC_FREE(rec); return ret; } static bool run_local_dbtrans(int dummy) { struct db_context *db; struct db_record *rec; NTSTATUS status; uint32_t initial; int res; db = db_open(talloc_tos(), "transtest.tdb", 0, TDB_DEFAULT, O_RDWR|O_CREAT, 0600); if (db == NULL) { printf("Could not open transtest.db\n"); return false; } res = db->transaction_start(db); if (res == -1) { printf(__location__ "transaction_start failed\n"); return false; } rec = db->fetch_locked(db, db, string_term_tdb_data("transtest")); if (rec == NULL) { printf(__location__ "fetch_lock failed\n"); return false; } if (rec->value.dptr == NULL) { initial = 0; status = rec->store( rec, make_tdb_data((uint8_t *)&initial, sizeof(initial)), 0); if (!NT_STATUS_IS_OK(status)) { printf(__location__ "store returned %s\n", nt_errstr(status)); return false; } } TALLOC_FREE(rec); res = db->transaction_commit(db); if (res == -1) { printf(__location__ "transaction_commit failed\n"); return false; } while (true) { uint32_t val, val2; int i; res = db->transaction_start(db); if (res == -1) { printf(__location__ "transaction_start failed\n"); break; } if (!dbwrap_fetch_uint32(db, "transtest", &val)) { printf(__location__ "dbwrap_fetch_uint32 failed\n"); break; } for (i=0; i<10; i++) { if (!dbtrans_inc(db)) { return false; } } if (!dbwrap_fetch_uint32(db, "transtest", &val2)) { printf(__location__ "dbwrap_fetch_uint32 failed\n"); break; } if (val2 != val + 10) { printf(__location__ "val=%d, val2=%d\n", (int)val, (int)val2); break; } printf("val2=%d\r", val2); res = db->transaction_commit(db); if (res == -1) { printf(__location__ "transaction_commit failed\n"); break; } } TALLOC_FREE(db); return true; } /* * Just a dummy test to be run under a debugger. There's no real way * to inspect the tevent_select specific function from outside of * tevent_select.c. */ static bool run_local_tevent_select(int dummy) { struct tevent_context *ev; struct tevent_fd *fd1, *fd2; bool result = false; ev = tevent_context_init_byname(NULL, "select"); if (ev == NULL) { d_fprintf(stderr, "tevent_context_init_byname failed\n"); goto fail; } fd1 = tevent_add_fd(ev, ev, 2, 0, NULL, NULL); if (fd1 == NULL) { d_fprintf(stderr, "tevent_add_fd failed\n"); goto fail; } fd2 = tevent_add_fd(ev, ev, 3, 0, NULL, NULL); if (fd2 == NULL) { d_fprintf(stderr, "tevent_add_fd failed\n"); goto fail; } TALLOC_FREE(fd2); fd2 = tevent_add_fd(ev, ev, 1, 0, NULL, NULL); if (fd2 == NULL) { d_fprintf(stderr, "tevent_add_fd failed\n"); goto fail; } result = true; fail: TALLOC_FREE(ev); return result; } static double create_procs(bool (*fn)(int), bool *result) { int i, status; volatile pid_t *child_status; volatile bool *child_status_out; int synccount; int tries = 8; struct timeval start; synccount = 0; child_status = (volatile pid_t *)shm_setup(sizeof(pid_t)*nprocs); if (!child_status) { printf("Failed to setup shared memory\n"); return -1; } child_status_out = (volatile bool *)shm_setup(sizeof(bool)*nprocs); if (!child_status_out) { printf("Failed to setup result status shared memory\n"); return -1; } for (i = 0; i < nprocs; i++) { child_status[i] = 0; child_status_out[i] = True; } start = timeval_current(); for (i=0;i TEST1 TEST2 ...\n"); printf("\t-d debuglevel\n"); printf("\t-U user%%pass\n"); printf("\t-k use kerberos\n"); printf("\t-N numprocs\n"); printf("\t-n my_netbios_name\n"); printf("\t-W workgroup\n"); printf("\t-o num_operations\n"); printf("\t-O socket_options\n"); printf("\t-m maximum protocol\n"); printf("\t-L use oplocks\n"); printf("\t-c CLIENT.TXT specify client load file for NBENCH\n"); printf("\t-A showall\n"); printf("\t-p port\n"); printf("\t-s seed\n"); printf("\t-b unclist_filename specify multiple shares for multiple connections\n"); printf("\n\n"); printf("tests are:"); for (i=0;torture_ops[i].name;i++) { printf(" %s", torture_ops[i].name); } printf("\n"); printf("default test is ALL\n"); exit(1); } /**************************************************************************** main program ****************************************************************************/ int main(int argc,char *argv[]) { int opt, i; char *p; int gotuser = 0; int gotpass = 0; bool correct = True; TALLOC_CTX *frame = talloc_stackframe(); int seed = time(NULL); #ifdef HAVE_SETBUFFER setbuffer(stdout, NULL, 0); #endif setup_logging("smbtorture", DEBUG_STDOUT); load_case_tables(); if (is_default_dyn_CONFIGFILE()) { if(getenv("SMB_CONF_PATH")) { set_dyn_CONFIGFILE(getenv("SMB_CONF_PATH")); } } lp_load(get_dyn_CONFIGFILE(),True,False,False,True); load_interfaces(); if (argc < 2) { usage(); } for(p = argv[1]; *p; p++) if(*p == '\\') *p = '/'; if (strncmp(argv[1], "//", 2)) { usage(); } fstrcpy(host, &argv[1][2]); p = strchr_m(&host[2],'/'); if (!p) { usage(); } *p = 0; fstrcpy(share, p+1); fstrcpy(myname, get_myname(talloc_tos())); if (!*myname) { fprintf(stderr, "Failed to get my hostname.\n"); return 1; } if (*username == 0 && getenv("LOGNAME")) { fstrcpy(username,getenv("LOGNAME")); } argc--; argv++; fstrcpy(workgroup, lp_workgroup()); while ((opt = getopt(argc, argv, "p:hW:U:n:N:O:o:m:Ll:d:Aec:ks:b:B:")) != EOF) { switch (opt) { case 'p': port_to_use = atoi(optarg); break; case 's': seed = atoi(optarg); break; case 'W': fstrcpy(workgroup,optarg); break; case 'm': max_protocol = interpret_protocol(optarg, max_protocol); break; case 'N': nprocs = atoi(optarg); break; case 'o': torture_numops = atoi(optarg); break; case 'd': lp_set_cmdline("log level", optarg); break; case 'O': sockops = optarg; break; case 'L': use_oplocks = True; break; case 'l': local_path = optarg; break; case 'A': torture_showall = True; break; case 'n': fstrcpy(myname, optarg); break; case 'c': client_txt = optarg; break; case 'e': do_encrypt = true; break; case 'k': #ifdef HAVE_KRB5 use_kerberos = True; #else d_printf("No kerberos support compiled in\n"); exit(1); #endif break; case 'U': gotuser = 1; fstrcpy(username,optarg); p = strchr_m(username,'%'); if (p) { *p = 0; fstrcpy(password, p+1); gotpass = 1; } break; case 'b': fstrcpy(multishare_conn_fname, optarg); use_multishare_conn = True; break; case 'B': torture_blocksize = atoi(optarg); break; default: printf("Unknown option %c (%d)\n", (char)opt, opt); usage(); } } d_printf("using seed %d\n", seed); srandom(seed); if(use_kerberos && !gotuser) gotpass = True; while (!gotpass) { p = getpass("Password:"); if (p) { fstrcpy(password, p); gotpass = 1; } } printf("host=%s share=%s user=%s myname=%s\n", host, share, username, myname); if (argc == optind) { correct = run_test("ALL"); } else { for (i=optind;i