[SCM] Samba Shared Repository - branch master updated
Volker Lendecke
vlendec at samba.org
Thu Apr 18 09:00:02 MDT 2013
The branch, master has been updated
via 33c6907 selftest: S3 does not do leases yet
via d496ccd s4:torture/smb2: add v2 lease requests
via 3c9846c s4:torture/smb2: add smb2_lease_v2_create_share() helper
via 6c81893 s4:libcli/smb2: add support for SMB2 LEASES v2
via f367d07 libcli/smb: add SMB2_LEASE_FLAG_* defines
via 1bfc7e8 s4:torture/smb2: add NTCREATEX_SHARE_ACCESS_DELETE in smb2_generic_create_share()
from 87685b3 s4:torture:smb2 delete temp memory context in test_durable_open_oplock_disconnect
http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master
- Log -----------------------------------------------------------------
commit 33c690746b0bd0e24da6d07f926a3139a5e48099
Author: Volker Lendecke <vl at samba.org>
Date: Wed Apr 17 17:19:59 2013 +0200
selftest: S3 does not do leases yet
Signed-off-by: Volker Lendecke <vl at samba.org>
Reviewed-by: Stefan Metzmacher <metze at samba.org>
Autobuild-User(master): Volker Lendecke <vl at samba.org>
Autobuild-Date(master): Thu Apr 18 16:59:39 CEST 2013 on sn-devel-104
commit d496ccdb905c3897bcacef7f4d56010eb523c965
Author: Stefan Metzmacher <metze at samba.org>
Date: Wed Oct 31 09:07:19 2012 +0100
s4:torture/smb2: add v2 lease requests
Signed-off-by: Stefan Metzmacher <metze at samba.org>
Reviewed-by: Volker Lendecke <vl at samba.org>
commit 3c9846cafde28fb8d40ae81cafb03f2e2ec8d9e2
Author: Stefan Metzmacher <metze at samba.org>
Date: Wed Oct 31 09:06:48 2012 +0100
s4:torture/smb2: add smb2_lease_v2_create_share() helper
Signed-off-by: Stefan Metzmacher <metze at samba.org>
Reviewed-by: Volker Lendecke <vl at samba.org>
commit 6c81893b342786d5f63aaa89e855e9378def50c3
Author: Stefan Metzmacher <metze at samba.org>
Date: Wed Oct 31 08:37:13 2012 +0100
s4:libcli/smb2: add support for SMB2 LEASES v2
Signed-off-by: Stefan Metzmacher <metze at samba.org>
Reviewed-by: Volker Lendecke <vl at samba.org>
commit f367d07f521b26cfb5813dd679a4e4883b69752f
Author: Stefan Metzmacher <metze at samba.org>
Date: Wed Oct 31 08:19:52 2012 +0100
libcli/smb: add SMB2_LEASE_FLAG_* defines
Signed-off-by: Stefan Metzmacher <metze at samba.org>
Reviewed-by: Volker Lendecke <vl at samba.org>
commit 1bfc7e863e76124c287228b772c331bc5c9f8616
Author: Stefan Metzmacher <metze at samba.org>
Date: Thu Nov 1 16:20:35 2012 +0100
s4:torture/smb2: add NTCREATEX_SHARE_ACCESS_DELETE in smb2_generic_create_share()
Signed-off-by: Stefan Metzmacher <metze at samba.org>
Reviewed-by: Volker Lendecke <vl at samba.org>
-----------------------------------------------------------------------
Summary of changes:
libcli/smb/smb2_constants.h | 4 +
selftest/knownfail | 1 +
source4/libcli/raw/interfaces.h | 7 +-
source4/libcli/smb2/create.c | 48 ++++++++-
source4/torture/smb2/lease.c | 210 ++++++++++++++++++++++++++++++++++++++-
source4/torture/smb2/util.c | 29 +++++-
6 files changed, 291 insertions(+), 8 deletions(-)
Changeset truncated at 500 lines:
diff --git a/libcli/smb/smb2_constants.h b/libcli/smb/smb2_constants.h
index 22fe23a..60fedbb 100644
--- a/libcli/smb/smb2_constants.h
+++ b/libcli/smb/smb2_constants.h
@@ -183,6 +183,10 @@
#define SMB2_LEASE_HANDLE 0x02
#define SMB2_LEASE_WRITE 0x04
+/* SMB2 lease flags */
+#define SMB2_LEASE_FLAG_BREAK_IN_PROGRESS 0x00000002
+#define SMB2_LEASE_FLAG_PARENT_LEASE_KEY_SET 0x00000004
+
/* SMB2 lease break flags */
#define SMB2_NOTIFY_BREAK_LEASE_FLAG_ACK_REQUIRED 0x01
diff --git a/selftest/knownfail b/selftest/knownfail
index 61a0a0e..0c96eee 100644
--- a/selftest/knownfail
+++ b/selftest/knownfail
@@ -184,6 +184,7 @@
^samba3.smb2.lease.break
^samba3.smb2.lease.oplock
^samba3.smb2.lease.multibreak
+^samba3.smb2.lease.v2_request
^samba3.smb2.oplock.batch12
^samba3.smb2.oplock.batch20
^samba3.smb2.oplock.stream1
diff --git a/source4/libcli/raw/interfaces.h b/source4/libcli/raw/interfaces.h
index c13475b..fb73f26 100644
--- a/source4/libcli/raw/interfaces.h
+++ b/source4/libcli/raw/interfaces.h
@@ -64,8 +64,11 @@ struct smb2_lease_key {
struct smb2_lease {
struct smb2_lease_key lease_key;
uint32_t lease_state;
- uint32_t lease_flags; /* should be 0 */
+ uint32_t lease_flags;
uint64_t lease_duration; /* should be 0 */
+ /* only for v2 */
+ struct smb2_lease_key parent_lease_key;
+ uint16_t lease_epoch;
};
struct smb2_lease_break {
@@ -1743,6 +1746,7 @@ union smb_open {
NTTIME timewarp;
bool query_on_disk_id;
struct smb2_lease *lease_request;
+ struct smb2_lease *lease_request_v2;
struct GUID *app_instance_id;
@@ -1773,6 +1777,7 @@ union smb_open {
uint32_t maximal_access;
uint8_t on_disk_id[32];
struct smb2_lease lease_response;
+ struct smb2_lease lease_response_v2;
bool durable_open;
/* durable handle v2 */
diff --git a/source4/libcli/smb2/create.c b/source4/libcli/smb2/create.c
index db9abbe..7267f92 100644
--- a/source4/libcli/smb2/create.c
+++ b/source4/libcli/smb2/create.c
@@ -226,6 +226,27 @@ struct smb2_request *smb2_create_send(struct smb2_tree *tree, struct smb2_create
}
}
+ if (io->in.lease_request_v2) {
+ struct smb2_lease *ls = io->in.lease_request_v2;
+ uint8_t data[52];
+
+ memcpy(&data[0], &ls->lease_key, 16);
+ SIVAL(data, 16, ls->lease_state);
+ SIVAL(data, 20, ls->lease_flags);
+ SBVAL(data, 24, ls->lease_duration);
+ memcpy(&data[32], &ls->parent_lease_key, 16);
+ SSVAL(data, 48, ls->lease_epoch);
+ SSVAL(data, 50, 0); /* reserved */
+
+ status = smb2_create_blob_add(req, &blobs,
+ SMB2_CREATE_TAG_RQLS,
+ data_blob_const(data, 52));
+ if (!NT_STATUS_IS_OK(status)) {
+ talloc_free(req);
+ return NULL;
+ }
+ }
+
if (io->in.app_instance_id) {
uint8_t data[20];
DATA_BLOB guid_blob;
@@ -342,17 +363,34 @@ NTSTATUS smb2_create_recv(struct smb2_request *req, TALLOC_CTX *mem_ctx, struct
memcpy(io->out.on_disk_id, io->out.blobs.blobs[i].data.data, 32);
}
if (strcmp(io->out.blobs.blobs[i].tag, SMB2_CREATE_TAG_RQLS) == 0) {
+ struct smb2_lease *ls = NULL;
uint8_t *data;
- if (io->out.blobs.blobs[i].data.length != 32) {
+
+ ZERO_STRUCT(io->out.lease_response);
+ ZERO_STRUCT(io->out.lease_response_v2);
+
+ switch (io->out.blobs.blobs[i].data.length) {
+ case 32:
+ ls = &io->out.lease_response;
+ break;
+ case 52:
+ ls = &io->out.lease_response_v2;
+ break;
+ default:
smb2_request_destroy(req);
return NT_STATUS_INVALID_NETWORK_RESPONSE;
}
data = io->out.blobs.blobs[i].data.data;
- memcpy(&io->out.lease_response.lease_key, data, 16);
- io->out.lease_response.lease_state = IVAL(data, 16);
- io->out.lease_response.lease_flags = IVAL(data, 20);
- io->out.lease_response.lease_duration = BVAL(data, 24);
+ memcpy(&ls->lease_key, data, 16);
+ ls->lease_state = IVAL(data, 16);
+ ls->lease_flags = IVAL(data, 20);
+ ls->lease_duration = BVAL(data, 24);
+
+ if (io->out.blobs.blobs[i].data.length == 52) {
+ memcpy(&ls->parent_lease_key, data+32, 16);
+ ls->lease_epoch = SVAL(data, 48);
+ }
}
if (strcmp(io->out.blobs.blobs[i].tag, SMB2_CREATE_TAG_DHNQ) == 0) {
if (io->out.blobs.blobs[i].data.length != 8) {
diff --git a/source4/torture/smb2/lease.c b/source4/torture/smb2/lease.c
index 5669c62..21d4679 100644
--- a/source4/torture/smb2/lease.c
+++ b/source4/torture/smb2/lease.c
@@ -20,6 +20,7 @@
*/
#include "includes.h"
+#include <tevent.h>
#include "libcli/smb2/smb2.h"
#include "libcli/smb2/smb2_calls.h"
#include "torture/torture.h"
@@ -65,11 +66,30 @@
\
CHECK_VAL((__io)->out.lease_response.lease_flags, 0); \
CHECK_VAL((__io)->out.lease_response.lease_duration, 0); \
- } while(0) \
+ } while(0)
+
+#define CHECK_LEASE_V2(__io, __state, __oplevel, __key, __flags) \
+ do { \
+ if (__oplevel) { \
+ CHECK_VAL((__io)->out.oplock_level, SMB2_OPLOCK_LEVEL_LEASE); \
+ CHECK_VAL((__io)->out.lease_response_v2.lease_key.data[0], (__key)); \
+ CHECK_VAL((__io)->out.lease_response_v2.lease_key.data[1], ~(__key)); \
+ CHECK_VAL((__io)->out.lease_response_v2.lease_state, smb2_util_lease_state(__state)); \
+ } else { \
+ CHECK_VAL((__io)->out.oplock_level, SMB2_OPLOCK_LEVEL_NONE); \
+ CHECK_VAL((__io)->out.lease_response_v2.lease_key.data[0], 0); \
+ CHECK_VAL((__io)->out.lease_response_v2.lease_key.data[1], 0); \
+ CHECK_VAL((__io)->out.lease_response_v2.lease_state, 0); \
+ } \
+ \
+ CHECK_VAL((__io)->out.lease_response_v2.lease_flags, __flags); \
+ CHECK_VAL((__io)->out.lease_response_v2.lease_duration, 0); \
+ } while(0)
static const uint64_t LEASE1 = 0xBADC0FFEE0DDF00Dull;
static const uint64_t LEASE2 = 0xDEADBEEFFEEDBEADull;
static const uint64_t LEASE3 = 0xDAD0FFEDD00DF00Dull;
+static const uint64_t LEASE4 = 0xBAD0FFEDD00DF00Dull;
#define NREQUEST_RESULTS 8
static const char *request_results[NREQUEST_RESULTS][2] = {
@@ -400,6 +420,59 @@ static bool torture_lease_handler(struct smb2_transport *transport,
}
/*
+ Timer handler function notifies the registering function that time is up
+*/
+static void timeout_cb(struct tevent_context *ev,
+ struct tevent_timer *te,
+ struct timeval current_time,
+ void *private_data)
+{
+ bool *timesup = (bool *)private_data;
+ *timesup = true;
+ return;
+}
+
+/*
+ Wait a short period of time to receive a single oplock break request
+*/
+static void torture_wait_for_lease_break(struct torture_context *tctx)
+{
+ TALLOC_CTX *tmp_ctx = talloc_new(NULL);
+ struct tevent_timer *te = NULL;
+ struct timeval ne;
+ bool timesup = false;
+ int old_count = break_info.count;
+
+ /* Wait .1 seconds for an lease break */
+ ne = tevent_timeval_current_ofs(0, 100000);
+
+ te = tevent_add_timer(tctx->ev, tmp_ctx, ne, timeout_cb, ×up);
+ if (te == NULL) {
+ torture_comment(tctx, "Failed to wait for an oplock break. "
+ "test results may not be accurate.");
+ goto done;
+ }
+
+ while (!timesup && break_info.count < old_count + 1) {
+ if (tevent_loop_once(tctx->ev) != 0) {
+ torture_comment(tctx, "Failed to wait for an oplock "
+ "break. test results may not be "
+ "accurate.");
+ goto done;
+ }
+ }
+
+done:
+ /* We don't know if the timed event fired and was freed, we received
+ * our oplock break, or some other event triggered the loop. Thus,
+ * we create a tmp_ctx to be able to safely free/remove the timed
+ * event in all 3 cases. */
+ talloc_free(tmp_ctx);
+
+ return;
+}
+
+/*
break_results should be read as "held lease, new lease, hold broken to, new
grant", i.e. { "RH", "RW", "RH", "R" } means that if key1 holds RH and key2
tries for RW, key1 will be broken to RH (in this case, not broken at all)
@@ -828,6 +901,140 @@ static bool test_lease_multibreak(struct torture_context *tctx,
return ret;
}
+static bool test_lease_v2_request(struct torture_context *tctx,
+ struct smb2_tree *tree)
+{
+ TALLOC_CTX *mem_ctx = talloc_new(tctx);
+ struct smb2_create io;
+ struct smb2_lease ls;
+ struct smb2_handle h1, h2, h3, h4, h5;
+ struct smb2_write w;
+ NTSTATUS status;
+ const char *fname = "lease.dat";
+ const char *dname = "lease.dir";
+ const char *dnamefname = "lease.dir\\lease.dat";
+ const char *dnamefname2 = "lease.dir\\lease2.dat";
+ bool ret = true;
+
+ smb2_util_unlink(tree, fname);
+ smb2_deltree(tree, dname);
+
+ tree->session->transport->lease.handler = torture_lease_handler;
+ tree->session->transport->lease.private_data = tree;
+ tree->session->transport->oplock.handler = torture_oplock_handler;
+ tree->session->transport->oplock.private_data = tree;
+
+ ZERO_STRUCT(break_info);
+
+ ZERO_STRUCT(io);
+ smb2_lease_v2_create_share(&io, &ls, false, fname,
+ smb2_util_share_access("RWD"),
+ LEASE1, NULL,
+ smb2_util_lease_state("RHW"),
+ 0);
+
+ status = smb2_create(tree, mem_ctx, &io);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ h1 = io.out.file.handle;
+ CHECK_CREATED(&io, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+ CHECK_LEASE_V2(&io, "RHW", true, LEASE1, 0);
+
+ ZERO_STRUCT(io);
+ smb2_lease_v2_create_share(&io, &ls, true, dname,
+ smb2_util_share_access("RWD"),
+ LEASE2, NULL,
+ smb2_util_lease_state("RHW"),
+ 0);
+ status = smb2_create(tree, mem_ctx, &io);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ h2 = io.out.file.handle;
+ CHECK_CREATED(&io, CREATED, FILE_ATTRIBUTE_DIRECTORY);
+ CHECK_LEASE_V2(&io, "RH", true, LEASE2, 0);
+
+ ZERO_STRUCT(io);
+ smb2_lease_v2_create_share(&io, &ls, false, dnamefname,
+ smb2_util_share_access("RWD"),
+ LEASE3, &LEASE2,
+ smb2_util_lease_state("RHW"),
+ 0);
+ status = smb2_create(tree, mem_ctx, &io);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ h3 = io.out.file.handle;
+ CHECK_CREATED(&io, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+ CHECK_LEASE_V2(&io, "RHW", true, LEASE3,
+ SMB2_LEASE_FLAG_PARENT_LEASE_KEY_SET);
+
+ torture_wait_for_lease_break(tctx);
+ CHECK_VAL(break_info.count, 0);
+ CHECK_VAL(break_info.failures, 0);
+
+ ZERO_STRUCT(io);
+ smb2_lease_v2_create_share(&io, &ls, false, dnamefname2,
+ smb2_util_share_access("RWD"),
+ LEASE4, NULL,
+ smb2_util_lease_state("RHW"),
+ 0);
+ status = smb2_create(tree, mem_ctx, &io);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ h4 = io.out.file.handle;
+ CHECK_CREATED(&io, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+ CHECK_LEASE_V2(&io, "RHW", true, LEASE4, 0);
+
+ torture_wait_for_lease_break(tctx);
+ torture_wait_for_lease_break(tctx);
+ CHECK_BREAK_INFO("RH", "", LEASE2);
+ torture_wait_for_lease_break(tctx);
+
+ ZERO_STRUCT(break_info);
+
+ ZERO_STRUCT(io);
+ smb2_lease_v2_create_share(&io, &ls, true, dname,
+ smb2_util_share_access("RWD"),
+ LEASE2, NULL,
+ smb2_util_lease_state("RHW"),
+ 0);
+ io.in.create_disposition = NTCREATEX_DISP_OPEN;
+ status = smb2_create(tree, mem_ctx, &io);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ h5 = io.out.file.handle;
+ CHECK_CREATED(&io, EXISTED, FILE_ATTRIBUTE_DIRECTORY);
+ CHECK_LEASE_V2(&io, "RH", true, LEASE2, 0);
+ smb2_util_close(tree, h5);
+
+ ZERO_STRUCT(w);
+ w.in.file.handle = h4;
+ w.in.offset = 0;
+ w.in.data = data_blob_talloc(mem_ctx, NULL, 4096);
+ memset(w.in.data.data, 'o', w.in.data.length);
+ status = smb2_write(tree, &w);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ smb_msleep(2000);
+ torture_wait_for_lease_break(tctx);
+ CHECK_VAL(break_info.count, 0);
+ CHECK_VAL(break_info.failures, 0);
+
+ smb2_util_close(tree, h4);
+ torture_wait_for_lease_break(tctx);
+ torture_wait_for_lease_break(tctx);
+ CHECK_BREAK_INFO("RH", "", LEASE2);
+ torture_wait_for_lease_break(tctx);
+
+ done:
+ smb2_util_close(tree, h1);
+ smb2_util_close(tree, h2);
+ smb2_util_close(tree, h3);
+ smb2_util_close(tree, h4);
+ smb2_util_close(tree, h5);
+
+ smb2_util_unlink(tree, fname);
+ smb2_deltree(tree, dname);
+
+ talloc_free(mem_ctx);
+
+ return ret;
+}
+
struct torture_suite *torture_smb2_lease_init(void)
{
struct torture_suite *suite =
@@ -839,6 +1046,7 @@ struct torture_suite *torture_smb2_lease_init(void)
torture_suite_add_1smb2_test(suite, "break", test_lease_break);
torture_suite_add_1smb2_test(suite, "oplock", test_lease_oplock);
torture_suite_add_1smb2_test(suite, "multibreak", test_lease_multibreak);
+ torture_suite_add_1smb2_test(suite, "v2_request", test_lease_v2_request);
suite->description = talloc_strdup(suite, "SMB2-LEASE tests");
diff --git a/source4/torture/smb2/util.c b/source4/torture/smb2/util.c
index 71e87f3..59748b7 100644
--- a/source4/torture/smb2/util.c
+++ b/source4/torture/smb2/util.c
@@ -687,7 +687,6 @@ void smb2_generic_create_share(struct smb2_create *io, struct smb2_lease *ls,
if (dir) {
io->in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
- io->in.share_access &= ~NTCREATEX_SHARE_ACCESS_DELETE;
io->in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
io->in.create_disposition = NTCREATEX_DISP_CREATE;
}
@@ -730,6 +729,34 @@ void smb2_lease_create(struct smb2_create *io, struct smb2_lease *ls,
leasekey, leasestate);
}
+void smb2_lease_v2_create_share(struct smb2_create *io,
+ struct smb2_lease *ls,
+ bool dir,
+ const char *name,
+ uint32_t share_access,
+ uint64_t leasekey,
+ const uint64_t *parentleasekey,
+ uint32_t leasestate,
+ uint16_t lease_epoch)
+{
+ smb2_generic_create_share(io, NULL, dir, name, NTCREATEX_DISP_OPEN_IF,
+ share_access, SMB2_OPLOCK_LEVEL_LEASE, 0, 0);
+
+ if (ls) {
+ ZERO_STRUCT(*ls);
+ ls->lease_key.data[0] = leasekey;
+ ls->lease_key.data[1] = ~leasekey;
+ ls->lease_state = leasestate;
+ if (parentleasekey != NULL) {
+ ls->lease_flags |= SMB2_LEASE_FLAG_PARENT_LEASE_KEY_SET;
+ ls->parent_lease_key.data[0] = *parentleasekey;
+ ls->parent_lease_key.data[1] = ~(*parentleasekey);
+ }
+ ls->lease_epoch = lease_epoch;
+ io->in.lease_request_v2 = ls;
+ }
+}
+
void smb2_oplock_create_share(struct smb2_create *io, const char *name,
uint32_t share_access, uint8_t oplock)
{
--
Samba Shared Repository
More information about the samba-cvs
mailing list