/* Unix SMB/CIFS implementation. randomised byte range lock tester Copyright (C) Andrew Tridgell 1999 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" #include "dynconfig.h" #include "system/time.h" static int numops = 1000; static BOOL showall; static BOOL analyze; static BOOL hide_unlock_fails; static BOOL use_oplocks; static uint_t lock_range = 100; static uint_t lock_base = 0; static uint_t min_length = 0; static BOOL exact_error_codes; static BOOL zero_zero; #define FILENAME "\\locktest.dat" #define READ_PCT 50 #define LOCK_PCT 45 #define UNLOCK_PCT 70 #define RANGE_MULTIPLE 1 #define NSERVERS 2 #define NCONNECTIONS 2 #define NFILES 2 #define LOCK_TIMEOUT 0 #define NASTY_POSIX_LOCK_HACK 0 static struct { char *username; char *password; } servers[NSERVERS]; enum lock_op {OP_LOCK, OP_UNLOCK, OP_REOPEN}; struct record { enum lock_op lock_op; enum brl_type lock_type; char conn, f; uint64_t start, len; char needed; }; #define PRESETS 0 #if PRESETS static struct record preset[] = { {OP_LOCK, WRITE_LOCK, 0, 0, 2, 0, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 0, 0, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 3, 0, 1}, {OP_UNLOCK, 0 , 0, 0, 2, 0, 1}, {OP_REOPEN, 0, 0, 0, 0, 0, 1}, {OP_LOCK, READ_LOCK, 0, 0, 2, 0, 1}, {OP_LOCK, READ_LOCK, 0, 0, 1, 1, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 0, 0, 1}, {OP_REOPEN, 0, 0, 0, 0, 0, 1}, {OP_LOCK, READ_LOCK, 0, 0, 2, 0, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 3, 1, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 0, 0, 1}, {OP_REOPEN, 0, 0, 0, 0, 0, 1}, {OP_LOCK, READ_LOCK, 0, 0, 2, 0, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 1, 1, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 0, 0, 1}, {OP_REOPEN, 0, 0, 0, 0, 0, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 2, 0, 1}, {OP_LOCK, READ_LOCK, 0, 0, 1, 1, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 0, 0, 1}, {OP_REOPEN, 0, 0, 0, 0, 0, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 2, 0, 1}, {OP_LOCK, READ_LOCK, 0, 0, 3, 1, 1}, {OP_LOCK, WRITE_LOCK, 0, 0, 0, 0, 1}, {OP_REOPEN, 0, 0, 0, 0, 0, 1}, }; #endif static struct record *recorded; /***************************************************** return a connection to a server *******************************************************/ static struct smbcli_state *connect_one(char *share, int snum) { struct smbcli_state *c; fstring server, myname; uint_t flags = 0; NTSTATUS status; int retries = 10; fstrcpy(server,share+2); share = strchr_m(server,'\\'); if (!share) return NULL; *share = 0; share++; slprintf(myname,sizeof(myname), "lock-%u-%u", getpid(), snum); do { status = smbcli_full_connection(NULL, &c, myname, server, NULL, share, "?????", servers[snum].username, lp_workgroup(), servers[snum].password, flags, NULL); if (!NT_STATUS_IS_OK(status)) { sleep(2); } } while (!NT_STATUS_IS_OK(status) && retries--); if (!NT_STATUS_IS_OK(status)) { return NULL; } return c; } static void reconnect(struct smbcli_state *cli[NSERVERS][NCONNECTIONS], int fnum[NSERVERS][NCONNECTIONS][NFILES], char *share[NSERVERS]) { int server, conn, f; for (server=0;server<NSERVERS;server++) for (conn=0;conn<NCONNECTIONS;conn++) { if (cli[server][conn]) { for (f=0;f<NFILES;f++) { if (fnum[server][conn][f] != -1) { smbcli_close(cli[server][conn]->tree, fnum[server][conn][f]); fnum[server][conn][f] = -1; } } smbcli_shutdown(cli[server][conn]); } cli[server][conn] = connect_one(share[server], server); if (!cli[server][conn]) { DEBUG(0,("Failed to connect to %s\n", share[server])); exit(1); } } } static BOOL test_one(struct smbcli_state *cli[NSERVERS][NCONNECTIONS], int fnum[NSERVERS][NCONNECTIONS][NFILES], struct record *rec) { uint_t conn = rec->conn; uint_t f = rec->f; uint64_t start = rec->start; uint64_t len = rec->len; enum brl_type op = rec->lock_type; int server; BOOL ret[NSERVERS]; NTSTATUS status[NSERVERS]; switch (rec->lock_op) { case OP_LOCK: /* set a lock */ for (server=0;server<NSERVERS;server++) { ret[server] = NT_STATUS_IS_OK(smbcli_lock64(cli[server][conn]->tree, fnum[server][conn][f], start, len, LOCK_TIMEOUT, op)); status[server] = smbcli_nt_error(cli[server][conn]->tree); if (!exact_error_codes && NT_STATUS_EQUAL(status[server], NT_STATUS_FILE_LOCK_CONFLICT)) { status[server] = NT_STATUS_LOCK_NOT_GRANTED; } } if (showall || !NT_STATUS_EQUAL(status[0],status[1])) { printf("lock conn=%u f=%u range=%.0f(%.0f) op=%s -> %s:%s\n", conn, f, (double)start, (double)len, op==READ_LOCK?"READ_LOCK":"WRITE_LOCK", nt_errstr(status[0]), nt_errstr(status[1])); } if (!NT_STATUS_EQUAL(status[0],status[1])) return False; break; case OP_UNLOCK: /* unset a lock */ for (server=0;server<NSERVERS;server++) { ret[server] = NT_STATUS_IS_OK(smbcli_unlock64(cli[server][conn]->tree, fnum[server][conn][f], start, len)); status[server] = smbcli_nt_error(cli[server][conn]->tree); } if (showall || (!hide_unlock_fails && !NT_STATUS_EQUAL(status[0],status[1]))) { printf("unlock conn=%u f=%u range=%.0f(%.0f) -> %s:%s\n", conn, f, (double)start, (double)len, nt_errstr(status[0]), nt_errstr(status[1])); } if (!hide_unlock_fails && !NT_STATUS_EQUAL(status[0],status[1])) return False; break; case OP_REOPEN: /* reopen the file */ for (server=0;server<NSERVERS;server++) { smbcli_close(cli[server][conn]->tree, fnum[server][conn][f]); fnum[server][conn][f] = -1; } for (server=0;server<NSERVERS;server++) { fnum[server][conn][f] = smbcli_open(cli[server][conn]->tree, FILENAME, O_RDWR|O_CREAT, DENY_NONE); if (fnum[server][conn][f] == -1) { printf("failed to reopen on share%d\n", server); return False; } } if (showall) { printf("reopen conn=%u f=%u\n", conn, f); } break; } return True; } static void close_files(struct smbcli_state *cli[NSERVERS][NCONNECTIONS], int fnum[NSERVERS][NCONNECTIONS][NFILES]) { int server, conn, f; for (server=0;server<NSERVERS;server++) for (conn=0;conn<NCONNECTIONS;conn++) for (f=0;f<NFILES;f++) { if (fnum[server][conn][f] != -1) { smbcli_close(cli[server][conn]->tree, fnum[server][conn][f]); fnum[server][conn][f] = -1; } } for (server=0;server<NSERVERS;server++) { smbcli_unlink(cli[server][0]->tree, FILENAME); } } static void open_files(struct smbcli_state *cli[NSERVERS][NCONNECTIONS], int fnum[NSERVERS][NCONNECTIONS][NFILES]) { int server, conn, f; for (server=0;server<NSERVERS;server++) for (conn=0;conn<NCONNECTIONS;conn++) for (f=0;f<NFILES;f++) { fnum[server][conn][f] = smbcli_open(cli[server][conn]->tree, FILENAME, O_RDWR|O_CREAT, DENY_NONE); if (fnum[server][conn][f] == -1) { fprintf(stderr,"Failed to open fnum[%u][%u][%u]\n", server, conn, f); exit(1); } } } static int retest(struct smbcli_state *cli[NSERVERS][NCONNECTIONS], int fnum[NSERVERS][NCONNECTIONS][NFILES], int n) { int i; printf("testing %u ...\n", n); for (i=0; i<n; i++) { if (i && i % 100 == 0) { printf("%u\n", i); } if (recorded[i].needed && !test_one(cli, fnum, &recorded[i])) return i; } return n; } /* each server has two connections open to it. Each connection has two file descriptors open on the file - 8 file descriptors in total we then do random locking ops in tamdem on the 4 fnums from each server and ensure that the results match */ static void test_locks(char *share[NSERVERS]) { struct smbcli_state *cli[NSERVERS][NCONNECTIONS]; int fnum[NSERVERS][NCONNECTIONS][NFILES]; int n, i, n1, skip, r1, r2; ZERO_STRUCT(fnum); ZERO_STRUCT(cli); recorded = malloc_array_p(struct record, numops); for (n=0; n<numops; n++) { #if PRESETS if (n < sizeof(preset) / sizeof(preset[0])) { recorded[n] = preset[n]; } else { #endif recorded[n].conn = random() % NCONNECTIONS; recorded[n].f = random() % NFILES; recorded[n].start = lock_base + ((uint_t)random() % (lock_range-1)); recorded[n].len = min_length + random() % (lock_range-(recorded[n].start-lock_base)); recorded[n].start *= RANGE_MULTIPLE; recorded[n].len *= RANGE_MULTIPLE; r1 = random() % 100; r2 = random() % 100; if (r1 < READ_PCT) { recorded[n].lock_type = READ_LOCK; } else { recorded[n].lock_type = WRITE_LOCK; } if (r2 < LOCK_PCT) { recorded[n].lock_op = OP_LOCK; } else if (r2 < UNLOCK_PCT) { recorded[n].lock_op = OP_UNLOCK; } else { recorded[n].lock_op = OP_REOPEN; } recorded[n].needed = True; if (!zero_zero && recorded[n].start==0 && recorded[n].len==0) { recorded[n].len = 1; } #if PRESETS } #endif } reconnect(cli, fnum, share); open_files(cli, fnum); n = retest(cli, fnum, numops); if (n == numops || !analyze) return; n++; skip = n/2; while (1) { n1 = n; close_files(cli, fnum); reconnect(cli, fnum, share); open_files(cli, fnum); for (i=0;i<n-skip;i+=skip) { int m, j; printf("excluding %d-%d\n", i, i+skip-1); for (j=i;j<i+skip;j++) { recorded[j].needed = False; } close_files(cli, fnum); open_files(cli, fnum); m = retest(cli, fnum, n); if (m == n) { for (j=i;j<i+skip;j++) { recorded[j].needed = True; } } else { if (i+(skip-1) < m) { memmove(&recorded[i], &recorded[i+skip], (m-(i+skip-1))*sizeof(recorded[0])); } n = m-(skip-1); i--; } } if (skip > 1) { skip = skip/2; printf("skip=%d\n", skip); continue; } if (n1 == n) break; } close_files(cli, fnum); reconnect(cli, fnum, share); open_files(cli, fnum); showall = True; n1 = retest(cli, fnum, n); if (n1 != n-1) { printf("ERROR - inconsistent result (%u %u)\n", n1, n); } close_files(cli, fnum); for (i=0;i<n;i++) { printf("{%d, %d, %u, %u, %.0f, %.0f, %u},\n", recorded[i].lock_op, recorded[i].lock_type, recorded[i].conn, recorded[i].f, (double)recorded[i].start, (double)recorded[i].len, recorded[i].needed); } } static void usage(void) { printf( "Usage:\n\ locktest //server1/share1 //server2/share2 [options..]\n\ options:\n\ -U user%%pass (may be specified twice)\n\ -s seed\n\ -o numops\n\ -u hide unlock fails\n\ -a (show all ops)\n\ -A analyse for minimal ops\n\ -O use oplocks\n\ -E enable exact error code checking\n\ -Z enable the zero/zero lock\n\ -R range set lock range\n\ -B base set lock base\n\ -M min set min lock length\n\ "); } /**************************************************************************** main program ****************************************************************************/ int main(int argc,char *argv[]) { char *share[NSERVERS]; int opt; int seed, server, i; setlinebuf(stdout); setup_logging("locktest", DEBUG_STDOUT); if (argc < 3 || argv[1][0] == '-') { usage(); exit(1); } setup_logging(argv[0], DEBUG_STDOUT); for (server=0;server<NSERVERS;server++) { share[server] = argv[1+server]; all_string_sub(share[server],"/","\\",0); } argc -= NSERVERS; argv += NSERVERS; lp_load(dyn_CONFIGFILE,True,False,False); load_interfaces(); seed = time(NULL); while ((opt = getopt(argc, argv, "U:s:ho:aAW:OR:B:M:EZW:")) != EOF) { switch (opt) { case 'U': i = servers[0].username?1:0; if (!split_username(optarg, &servers[i].username, &servers[i].password)) { printf("Must supply USER%%PASS\n"); return -1; } break; case 'R': lock_range = strtol(optarg, NULL, 0); break; case 'B': lock_base = strtol(optarg, NULL, 0); break; case 'M': min_length = strtol(optarg, NULL, 0); break; case 's': seed = atoi(optarg); break; case 'u': hide_unlock_fails = True; break; case 'o': numops = atoi(optarg); break; case 'O': use_oplocks = True; break; case 'a': showall = True; break; case 'A': analyze = True; break; case 'Z': zero_zero = True; break; case 'E': exact_error_codes = True; break; case 'W': lp_set_cmdline("workgroup", optarg); break; case 'h': usage(); exit(1); default: printf("Unknown option %c (%d)\n", (char)opt, opt); exit(1); } } if (!servers[0].username) { usage(); return -1; } if (!servers[1].username) { servers[1].username = servers[0].username; servers[1].password = servers[0].password; } locktest_init_subsystems; argc -= optind; argv += optind; DEBUG(0,("seed=%u base=%d range=%d min_length=%d\n", seed, lock_base, lock_range, min_length)); srandom(seed); test_locks(share); return(0); }