/* Unix SMB/Netbios implementation. Version 2.0 mask_match tester Copyright (C) Andrew Tridgell 1999 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #define NO_SYSLOG #include "includes.h" static fstring password; static fstring username; static fstring workgroup; static int got_pass; static int numops = 1000; static BOOL showall; static BOOL analyze; #define FILENAME "locktest.dat" #define LOCKRANGE 100 #define READ_PCT 50 #define LOCK_PCT 25 #define UNLOCK_PCT 65 #define RANGE_MULTIPLE 32 #define NCONNECTIONS 2 #define NFILES 2 #define LOCK_TIMEOUT 0 #define NASTY_POSIX_LOCK_HACK 1 struct record { char r1, r2; char conn, f; int start, len; char needed; }; static struct record preset[] = { {77, 11, 0, 0, 2432, 480, 1}, {13, 11, 0, 0, 2624, 224, 1}, {16, 19, 0, 1, 448, 1344, 1}, {21, 96, 0, 0, 2144, 640, 1}, {53, 5, 1, 1, 2336, 608, 1}, {36, 5, 0, 0, 0, 8, 1}, { 2, 6, 0, 1, 0, 1, 1}, {53, 92, 0, 0, 0, 0, 1}, {99, 11, 0, 0, 7, 1, 1}, }; static struct record *recorded; static void print_brl(SMB_DEV_T dev, SMB_INO_T ino, int pid, enum brl_type lock_type, br_off start, br_off size) { #if NASTY_POSIX_LOCK_HACK { pstring cmd; static SMB_INO_T lastino; if (lastino != ino) { slprintf(cmd, sizeof(cmd), "egrep POSIX.*%d /proc/locks", (int)ino); system(cmd); } lastino = ino; } #endif printf("%6d %05x:%05x %s %.0f:%.0f(%.0f)\n", (int)pid, (int)dev, (int)ino, lock_type==READ_LOCK?"R":"W", (double)start, (double)start+size-1,(double)size); } /***************************************************** return a connection to a server *******************************************************/ struct cli_state *connect_one(char *share) { struct cli_state *c; struct nmb_name called, calling; char *server_n; fstring server; struct in_addr ip; extern struct in_addr ipzero; fstring myname; static int count; fstrcpy(server,share+2); share = strchr(server,'\\'); if (!share) return NULL; *share = 0; share++; server_n = server; ip = ipzero; slprintf(myname,sizeof(myname), "lock-%d-%d", getpid(), count++); make_nmb_name(&calling, myname, 0x0); make_nmb_name(&called , server, 0x20); again: ip = ipzero; /* have to open a new connection */ if (!(c=cli_initialise(NULL)) || (cli_set_port(c, 139) == 0) || !cli_connect(c, server_n, &ip)) { DEBUG(0,("Connection to %s failed\n", server_n)); return NULL; } if (!cli_session_request(c, &calling, &called)) { DEBUG(0,("session request to %s failed\n", called.name)); cli_shutdown(c); if (strcmp(called.name, "*SMBSERVER")) { make_nmb_name(&called , "*SMBSERVER", 0x20); goto again; } return NULL; } DEBUG(4,(" session request ok\n")); if (!cli_negprot(c)) { DEBUG(0,("protocol negotiation failed\n")); cli_shutdown(c); return NULL; } if (!got_pass) { char *pass = getpass("Password: "); if (pass) { pstrcpy(password, pass); } } if (!cli_session_setup(c, username, password, strlen(password), password, strlen(password), workgroup)) { DEBUG(0,("session setup failed: %s\n", cli_errstr(c))); return NULL; } /* * These next two lines are needed to emulate * old client behaviour for people who have * scripts based on client output. * QUESTION ? Do we want to have a 'client compatibility * mode to turn these on/off ? JRA. */ if (*c->server_domain || *c->server_os || *c->server_type) DEBUG(1,("Domain=[%s] OS=[%s] Server=[%s]\n", c->server_domain,c->server_os,c->server_type)); DEBUG(4,(" session setup ok\n")); if (!cli_send_tconX(c, share, "?????", password, strlen(password)+1)) { DEBUG(0,("tree connect failed: %s\n", cli_errstr(c))); cli_shutdown(c); return NULL; } DEBUG(4,(" tconx ok\n")); return c; } static void reconnect(struct cli_state *cli[2][2], int fnum[2][2][2], char *share1, char *share2) { int server, conn, f; char *share[2]; share[0] = share1; share[1] = share2; for (server=0;server<2;server++) for (conn=0;connconn; int f = rec->f; int start = rec->start; int len = rec->len; int r1 = rec->r1; int r2 = rec->r2; int op; BOOL ret1, ret2; if (r1 < READ_PCT) { op = READ_LOCK; } else { op = WRITE_LOCK; } if (r2 < LOCK_PCT) { /* set a lock */ ret1 = cli_lock(cli[0][conn], fnum[0][conn][f], start, len, LOCK_TIMEOUT, op); ret2 = cli_lock(cli[1][conn], fnum[1][conn][f], start, len, LOCK_TIMEOUT, op); if (showall || ret1 != ret2) { printf("lock conn=%d f=%d range=%d:%d(%d) op=%s -> %d:%d\n", conn, f, start, start+len-1, len, op==READ_LOCK?"READ_LOCK":"WRITE_LOCK", ret1, ret2); } if (showall) brl_forall(print_brl); if (ret1 != ret2) return False; } else if (r2 < LOCK_PCT+UNLOCK_PCT) { /* unset a lock */ ret1 = cli_unlock(cli[0][conn], fnum[0][conn][f], start, len); ret2 = cli_unlock(cli[1][conn], fnum[1][conn][f], start, len); if (showall || ret1 != ret2) { printf("unlock conn=%d f=%d range=%d:%d(%d) -> %d:%d\n", conn, f, start, start+len-1, len, ret1, ret2); } if (showall) brl_forall(print_brl); if (ret1 != ret2) return False; } else { /* reopen the file */ cli_close(cli[0][conn], fnum[0][conn][f]); cli_close(cli[1][conn], fnum[1][conn][f]); fnum[0][conn][f] = cli_open(cli[0][conn], FILENAME, O_RDWR|O_CREAT, DENY_NONE); fnum[1][conn][f] = cli_open(cli[1][conn], FILENAME, O_RDWR|O_CREAT, DENY_NONE); if (fnum[0][conn][f] == -1) { printf("failed to reopen on share1\n"); return False; } if (fnum[1][conn][f] == -1) { printf("failed to reopen on share2\n"); return False; } if (showall) { printf("reopen conn=%d f=%d\n", conn, f); brl_forall(print_brl); } } return True; } static void close_files(struct cli_state *cli[2][2], int fnum[2][2][2]) { int server, conn, f; for (server=0;server<2;server++) for (conn=0;conn