s4-torture: add test to check for max. number of channels per session.
[metze/samba/wip.git] / source4 / torture / smb2 / multichannel.c
index 0a4203aa5fb97bed9dbb4649e4b7f29601704fbf..6fc94dd2b8caca9d89f6ce9aa98aa495f03dc04c 100644 (file)
 #include "libcli/smb2/smb2.h"
 #include "libcli/smb2/smb2_calls.h"
 #include "torture/torture.h"
-#include "torture/util.h"
 #include "torture/smb2/proto.h"
 #include "libcli/security/security.h"
 #include "librpc/gen_ndr/ndr_security.h"
 #include "librpc/gen_ndr/ndr_ioctl.h"
 #include "../libcli/smb/smbXcli_base.h"
+#include "lib/cmdline/popt_common.h"
+#include "libcli/security/security.h"
+#include "libcli/resolve/resolve.h"
+#include "lib/param/param.h"
+#include "lib/events/events.h"
+#include "oplock_break_handler.h"
+#include "lease_break_handler.h"
+#include "torture/smb2/block.h"
+
+#define BASEDIR "multichanneltestdir"
+
+#define CHECK_STATUS(status, correct) \
+       torture_assert_ntstatus_equal_goto(tctx, status, correct,\
+                                          ret, done, "")
 
-#define CHECK_STATUS(status, correct) do { \
-       if (!NT_STATUS_EQUAL(status, correct)) { \
+#define CHECK_VAL(v, correct) do { \
+       if ((v) != (correct)) { \
+               torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s" \
+                               " got 0x%x - should be 0x%x\n", \
+                               __location__, #v, (int)v, (int)correct); \
+               ret = false; \
+               goto done; \
+       } } while (0)
+
+#define CHECK_VAL_GREATER_THAN(v, gt_val) do { \
+       if ((v) <= (gt_val)) { \
                torture_result(tctx, TORTURE_FAIL, \
-                       "(%s) Incorrect status %s - should be %s\n", \
-                        __location__, nt_errstr(status), nt_errstr(correct)); \
-               return false; \
+                               "(%s): wrong value for %s got 0x%x - " \
+                               "should be greater than 0x%x\n", \
+                               __location__, #v, (int)v, (int)gt_val); \
+               ret = false; \
+               goto done; \
        } } while (0)
 
+#define CHECK_CREATED(__io, __created, __attribute)                    \
+       do {                                                            \
+               CHECK_VAL((__io)->out.create_action,                    \
+                               NTCREATEX_ACTION_ ## __created);        \
+               CHECK_VAL((__io)->out.alloc_size, 0);                   \
+               CHECK_VAL((__io)->out.size, 0);                         \
+               CHECK_VAL((__io)->out.file_attr, (__attribute));        \
+               CHECK_VAL((__io)->out.reserved2, 0);                    \
+       } while (0)
+
+#define CHECK_PTR(ptr, correct) do { \
+       if ((ptr) != (correct)) { \
+               torture_result(tctx, TORTURE_FAIL, "(%s): wrong value for %s " \
+                               "got 0x%p - should be 0x%p\n", \
+                               __location__, #ptr, ptr, correct); \
+               ret = false; \
+               goto done; \
+       } } while (0)
+
+#define CHECK_LEASE(__io, __state, __oplevel, __key, __flags)          \
+       do {                                                            \
+               CHECK_VAL((__io)->out.lease_response.lease_version, 1); \
+               if (__oplevel) {                                        \
+                       CHECK_VAL((__io)->out.oplock_level, \
+                                       SMB2_OPLOCK_LEVEL_LEASE); \
+                       CHECK_VAL((__io)->out.lease_response.lease_key.data[0],\
+                                 (__key)); \
+                       CHECK_VAL((__io)->out.lease_response.lease_key.data[1],\
+                                 ~(__key)); \
+                       CHECK_VAL((__io)->out.lease_response.lease_state,\
+                                 smb2_util_lease_state(__state)); \
+               } else {                                                \
+                       CHECK_VAL((__io)->out.oplock_level,\
+                                 SMB2_OPLOCK_LEVEL_NONE); \
+                       CHECK_VAL((__io)->out.lease_response.lease_key.data[0],\
+                                 0); \
+                       CHECK_VAL((__io)->out.lease_response.lease_key.data[1],\
+                                 0); \
+                       CHECK_VAL((__io)->out.lease_response.lease_state, 0); \
+               }                                                       \
+                                                                       \
+               CHECK_VAL((__io)->out.lease_response.lease_flags, (__flags)); \
+               CHECK_VAL((__io)->out.lease_response.lease_duration, 0); \
+               CHECK_VAL((__io)->out.lease_response.lease_epoch, 0); \
+       } while (0)
+
 static bool test_ioctl_network_interface_info(struct torture_context *tctx,
                                              struct smb2_tree *tree,
                                              struct fsctl_net_iface_info *info)
@@ -93,12 +163,1706 @@ static bool test_multichannel_interface_info(struct torture_context *tctx,
        return test_ioctl_network_interface_info(tctx, tree, &info);
 }
 
+static struct smb2_tree *test_multichannel_create_channel(
+                               struct torture_context *tctx,
+                               const char *host,
+                               const char *share,
+                               struct cli_credentials *credentials,
+                               struct smbcli_options *transport_options,
+                               struct smb2_tree *parent_tree
+                               )
+{
+       NTSTATUS status;
+       struct smb2_transport *transport;
+       struct smb2_session *session;
+       bool ret = true;
+       struct smb2_tree *tree;
+
+       status = smb2_connect(tctx,
+                       host,
+                       lpcfg_smb_ports(tctx->lp_ctx),
+                       share,
+                       lpcfg_resolve_context(tctx->lp_ctx),
+                       credentials,
+                       &tree,
+                       tctx->ev,
+                       transport_options,
+                       lpcfg_socket_options(tctx->lp_ctx),
+                       lpcfg_gensec_settings(tctx, tctx->lp_ctx)
+                       );
+       torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
+                       "smb2_connect failed");
+       transport = tree->session->transport;
+       transport->oplock.handler = torture_oplock_ack_handler;
+       transport->oplock.private_data = tree;
+       transport->lease.handler = torture_lease_handler;
+       transport->lease.private_data = tree;
+       torture_comment(tctx, "established transport [%p]\n", transport);
+
+       /*
+        * If parent tree is set, bind the session to the parent transport
+        */
+       if (parent_tree) {
+               session = smb2_session_channel(transport,
+                               lpcfg_gensec_settings(tctx, tctx->lp_ctx),
+                               parent_tree, parent_tree->session);
+               torture_assert_goto(tctx, session != NULL, ret, done,
+                               "smb2_session_channel failed");
+
+               tree->smbXcli = parent_tree->smbXcli;
+               tree->session = session;
+               status = smb2_session_setup_spnego(session,
+                                               credentials,
+                                               0 /* previous_session_id */);
+               CHECK_STATUS(status, NT_STATUS_OK);
+               torture_comment(tctx, "bound new session to parent\n");
+       }
+       /*
+        * We absolutely need to make sure to send something over this
+        * connection to register the oplock break handler with the smb client
+        * connection. If we do not send something (at least a keepalive), we
+        * will *NEVER* receive anything over this transport.
+        */
+       smb2_keepalive(transport);
+
+done:
+       if (ret) {
+               return tree;
+       } else {
+               return NULL;
+       }
+}
+
+bool test_multichannel_create_channels(
+                               struct torture_context *tctx,
+                               const char *host,
+                               const char *share,
+                               struct cli_credentials *credentials,
+                               struct smbcli_options *transport_options,
+                               struct smb2_tree **tree2A,
+                               struct smb2_tree **tree2B,
+                               struct smb2_tree **tree2C
+                               )
+{
+       struct smb2_tree *tree;
+       struct smb2_transport *transport2A;
+       struct smb2_transport *transport2B;
+       struct smb2_transport *transport2C;
+       uint16_t local_port = 0;
+
+       transport_options->client_guid = GUID_random();
+
+       /* Session 2A */
+       torture_comment(tctx, "Setting up connection 2A\n");
+       tree = test_multichannel_create_channel(tctx, host, share,
+                               credentials, transport_options, NULL);
+       if (!tree) {
+               goto done;
+       }
+       *tree2A = tree;
+       transport2A = tree->session->transport;
+       local_port = torture_get_local_port_from_transport(transport2A);
+       torture_comment(tctx, "transport2A uses tcp port: %d\n", local_port);
+
+       /* Session 2B */
+       if (tree2B) {
+               torture_comment(tctx, "Setting up connection 2B\n");
+               tree = test_multichannel_create_channel(tctx, host, share,
+                               credentials, transport_options, *tree2A);
+               if (!tree) {
+                       goto done;
+               }
+               *tree2B = tree;
+               transport2B = tree->session->transport;
+               local_port = torture_get_local_port_from_transport(transport2B);
+               torture_comment(tctx, "transport2B uses tcp port: %d\n",
+                                                               local_port);
+       }
+
+       /* Session 2C */
+       if (tree2C) {
+               torture_comment(tctx, "Setting up connection 2C\n");
+               tree = test_multichannel_create_channel(tctx, host, share,
+                               credentials, transport_options, *tree2A);
+               if (!tree) {
+                       goto done;
+               }
+               *tree2C = tree;
+               transport2C = tree->session->transport;
+               local_port = torture_get_local_port_from_transport(transport2C);
+               torture_comment(tctx, "transport2C uses tcp port: %d\n",
+                                                               local_port);
+       }
+
+       return true;
+done:
+       return false;
+}
+
+static void test_multichannel_free_channels(struct smb2_tree *tree2A,
+                                            struct smb2_tree *tree2B,
+                                            struct smb2_tree *tree2C)
+{
+       TALLOC_FREE(tree2A);
+       TALLOC_FREE(tree2B);
+       TALLOC_FREE(tree2C);
+}
+
+static bool test_multichannel_initial_checks(struct torture_context *tctx,
+                                            struct smb2_tree *tree1)
+{
+       struct smb2_transport *transport1 = tree1->session->transport;
+       uint32_t server_capabilities;
+       struct fsctl_net_iface_info info;
+
+       if (smbXcli_conn_protocol(transport1->conn) < PROTOCOL_SMB3_00) {
+               torture_skip_goto(tctx, fail,
+                                 "SMB 3.X Dialect family required for "
+                                 "Multichannel tests\n");
+       }
+
+       server_capabilities = smb2cli_conn_server_capabilities(
+                                       tree1->session->transport->conn);
+       if (!(server_capabilities & SMB2_CAP_MULTI_CHANNEL)) {
+               torture_skip_goto(tctx, fail,
+                            "Server does not support multichannel.");
+       }
+
+       torture_assert(tctx,
+               test_ioctl_network_interface_info(tctx, tree1, &info),
+               "failed to retrieve network interface info");
+
+       return true;
+fail:
+       return false;
+}
+
+static void test_multichannel_init_smb_create(struct smb2_create *io)
+{
+       io->in.durable_open = false;
+       io->in.durable_open_v2 = true;
+       io->in.persistent_open = false;
+       io->in.create_guid = GUID_random();
+       io->in.timeout = 0x493E0; /* 300000 */
+       /* windows 2016 returns 300000 0x493E0 */
+}
+
+/*
+ * We simulate blocking incoming oplock break requests by simply ignoring
+ * the incoming break requests.
+ */
+static bool test_set_ignore_break_handler(struct torture_context *tctx,
+                                         struct smb2_transport *transport)
+{
+       transport->oplock.handler = torture_oplock_ignore_handler;
+       transport->lease.handler = torture_lease_ignore_handler;
+
+       return true;
+}
+
+static bool test_reset_break_handler(struct torture_context *tctx,
+                                    struct smb2_transport *transport)
+{
+       transport->oplock.handler = torture_oplock_ack_handler;
+       transport->lease.handler = torture_lease_handler;
+
+       return true;
+}
+
+/*
+ * Use iptables to block channels
+ */
+static bool test_iptables_block_channel(struct torture_context *tctx,
+                                       struct smb2_transport *transport,
+                                       const char *name)
+{
+       uint16_t local_port;
+       bool ret;
+
+       local_port = torture_get_local_port_from_transport(transport);
+       torture_comment(tctx, "transport uses tcp port: %d\n", local_port);
+       ret = torture_block_tcp_transport_name(tctx, transport, name);
+       torture_assert(tctx, ret, "we could not block tcp transport");
+
+       return ret;
+}
+
+static bool test_iptables_unblock_channel(struct torture_context *tctx,
+                                         struct smb2_transport *transport,
+                                         const char *name)
+{
+       uint16_t local_port;
+       bool ret;
+
+       local_port = torture_get_local_port_from_transport(transport);
+       torture_comment(tctx, "transport uses tcp port: %d\n", local_port);
+       ret = torture_unblock_tcp_transport_name(tctx, transport, name);
+       torture_assert(tctx, ret, "we could not block tcp transport");
+
+       return ret;
+}
+
+#define test_block_channel(_tctx, _t) _test_block_channel(_tctx, _t, #_t)
+static bool _test_block_channel(struct torture_context *tctx,
+                                         struct smb2_transport *transport,
+                                         const char *name)
+{
+       bool use_iptables = torture_setting_bool(tctx,
+                                       "use_iptables", false);
+
+       if (use_iptables) {
+               return test_iptables_block_channel(tctx, transport, name);
+       } else {
+               return test_set_ignore_break_handler(tctx, transport);
+       }
+}
+
+#define test_unblock_channel(_tctx, _t) _test_unblock_channel(_tctx, _t, #_t)
+static bool _test_unblock_channel(struct torture_context *tctx,
+                                         struct smb2_transport *transport,
+                                         const char *name)
+{
+       bool use_iptables = torture_setting_bool(tctx,
+                                       "use_iptables", false);
+
+       if (use_iptables) {
+               return test_iptables_unblock_channel(tctx, transport, name);
+       } else {
+               return test_reset_break_handler(tctx, transport);
+       }
+}
+
+static void test_cleanup_blocked_channels(struct torture_context *tctx)
+{
+       bool use_iptables = torture_setting_bool(tctx,
+                                       "use_iptables", false);
+
+       if (use_iptables) {
+               torture_unblock_cleanup(tctx);
+       }
+}
+
+/* Timer handler function notifies the registering function that time is up */
+static void timeout_cb(struct tevent_context *ev,
+                      struct tevent_timer *te,
+                      struct timeval current_time,
+                      void *private_data)
+{
+       bool *timesup = (bool *)private_data;
+       *timesup = true;
+}
+
+/*
+ * Oplock break - Test 1
+ * Test to confirm that server sends oplock breaks as expected.
+ * open file1 in session 2A
+ * open file2 in session 2B
+ * open file1 in session 1
+ *      oplock break received
+ * open file1 in session 1
+ *      oplock break received
+ * Cleanup
+ */
+static bool test_multichannel_oplock_break_test1(struct torture_context *tctx,
+                                          struct smb2_tree *tree1)
+{
+       const char *host = torture_setting_string(tctx, "host", NULL);
+       const char *share = torture_setting_string(tctx, "share", NULL);
+       struct cli_credentials *credentials = popt_get_cmdline_credentials();
+       NTSTATUS status;
+       TALLOC_CTX *mem_ctx = talloc_new(tctx);
+       struct smb2_handle _h;
+       struct smb2_handle h_client1_file1 = {{0}};
+       struct smb2_handle h_client1_file2 = {{0}};
+       struct smb2_handle h_client1_file3 = {{0}};
+       struct smb2_handle h_client2_file1 = {{0}};
+       struct smb2_handle h_client2_file2 = {{0}};
+       struct smb2_handle h_client2_file3 = {{0}};
+       struct smb2_create io1, io2, io3;
+       bool ret = true;
+       const char *fname1 = BASEDIR "\\oplock_break_test1.dat";
+       const char *fname2 = BASEDIR "\\oplock_break_test2.dat";
+       const char *fname3 = BASEDIR "\\oplock_break_test3.dat";
+       struct smb2_tree *tree2A = NULL;
+       struct smb2_tree *tree2B = NULL;
+       struct smb2_tree *tree2C = NULL;
+       struct smb2_transport *transport1 = tree1->session->transport;
+       struct smbcli_options transport2_options;
+       struct smb2_session *session1 = tree1->session;
+       uint16_t local_port = 0;
+
+       if (!test_multichannel_initial_checks(tctx, tree1)) {
+               return true;
+       }
+
+       torture_comment(tctx, "Oplock break retry: Test1\n");
+
+       torture_reset_break_info(tctx, &break_info);
+
+       transport1->oplock.handler = torture_oplock_ack_handler;
+       transport1->oplock.private_data = tree1;
+       torture_comment(tctx, "transport1  [%p]\n", transport1);
+       local_port = torture_get_local_port_from_transport(transport1);
+       torture_comment(tctx, "transport1 uses tcp port: %d\n", local_port);
+
+       status = torture_smb2_testdir(tree1, BASEDIR, &_h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       smb2_util_close(tree1, _h);
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       CHECK_VAL(break_info.count, 0);
+
+       smb2_oplock_create_share(&io1, fname1,
+                       smb2_util_share_access("RWD"),
+                       smb2_util_oplock_level("b"));
+       test_multichannel_init_smb_create(&io1);
+
+       smb2_oplock_create_share(&io2, fname2,
+                       smb2_util_share_access("RWD"),
+                       smb2_util_oplock_level("b"));
+       test_multichannel_init_smb_create(&io2);
+
+       smb2_oplock_create_share(&io3, fname3,
+                       smb2_util_share_access("RWD"),
+                       smb2_util_oplock_level("b"));
+       test_multichannel_init_smb_create(&io3);
+
+       transport2_options = transport1->options;
+
+       ret = test_multichannel_create_channels(tctx, host, share,
+                                                 credentials,
+                                                 &transport2_options,
+                                                 &tree2A, &tree2B, NULL);
+       torture_assert(tctx, ret, "Could not create channels.\n");
+
+       /* 2a opens file1 */
+       torture_comment(tctx, "client2 opens fname1 via session 2A\n");
+       status = smb2_create(tree2A, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io1.out.oplock_level, smb2_util_oplock_level("b"));
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 0);
+
+       /* 2b opens file2 */
+       torture_comment(tctx, "client2 opens fname2 via session 2B\n");
+       status = smb2_create(tree2B, mem_ctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file2 = io2.out.file.handle;
+       CHECK_CREATED(&io2, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io2.out.oplock_level, smb2_util_oplock_level("b"));
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 0);
+
+
+       /* 1 opens file1 - batchoplock break? */
+       torture_comment(tctx, "client1 opens fname1 via session 1\n");
+       io1.in.oplock_level = smb2_util_oplock_level("b");
+       status = smb2_create(tree1, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io1.out.oplock_level, smb2_util_oplock_level("s"));
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 1);
+
+       torture_reset_break_info(tctx, &break_info);
+
+       /* 1 opens file2 - batchoplock break? */
+       torture_comment(tctx, "client1 opens fname2 via session 1\n");
+       io2.in.oplock_level = smb2_util_oplock_level("b");
+       status = smb2_create(tree1, mem_ctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file2 = io2.out.file.handle;
+       CHECK_CREATED(&io2, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io2.out.oplock_level, smb2_util_oplock_level("s"));
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 1);
+
+       /* cleanup everything */
+       torture_reset_break_info(tctx, &break_info);
+
+       smb2_util_close(tree1, h_client1_file1);
+       smb2_util_close(tree1, h_client1_file2);
+       smb2_util_close(tree1, h_client1_file3);
+       smb2_util_close(tree2A, h_client2_file1);
+       smb2_util_close(tree2A, h_client2_file2);
+       smb2_util_close(tree2A, h_client2_file3);
+
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       CHECK_VAL(break_info.count, 0);
+       test_multichannel_free_channels(tree2A, tree2B, tree2C);
+       tree2A = tree2B = tree2C = NULL;
+done:
+       tree1->session = session1;
+
+       smb2_util_close(tree1, h_client1_file1);
+       smb2_util_close(tree1, h_client1_file2);
+       smb2_util_close(tree1, h_client1_file3);
+       if (tree2A != NULL) {
+               smb2_util_close(tree2A, h_client2_file1);
+               smb2_util_close(tree2A, h_client2_file2);
+               smb2_util_close(tree2A, h_client2_file3);
+       }
+
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       smb2_deltree(tree1, BASEDIR);
+
+       test_multichannel_free_channels(tree2A, tree2B, tree2C);
+       talloc_free(tree1);
+       talloc_free(mem_ctx);
+
+       return ret;
+}
+
+/*
+ * Oplock Break Test 2
+ * Test to see if oplock break retries are sent by the server.
+ * Also checks to see if new channels can be created and used
+ * after an oplock break retry.
+ * open file1 in 2A
+ * open file2 in 2B
+ * open file1 in session 1
+ *      oplock break received
+ * block channel on which oplock break received
+ * open file2 in session 1
+ *      oplock break not received. Retry received.
+ *      file opened
+ * write to file2 on 2B
+ *      Break sent to session 1(which has file2 open)
+ *      Break sent to session 2A(which has read oplock)
+ * close file1 in session 1
+ * open file1 with session 1
+ * unblock blocked channel
+ * disconnect blocked channel
+ * connect channel 2D
+ * open file3 in 2D
+ * open file3 in session 1
+ *      receive break
+ */
+static bool test_multichannel_oplock_break_test2(struct torture_context *tctx,
+                                          struct smb2_tree *tree1)
+{
+       const char *host = torture_setting_string(tctx, "host", NULL);
+       const char *share = torture_setting_string(tctx, "share", NULL);
+       struct cli_credentials *credentials = popt_get_cmdline_credentials();
+       NTSTATUS status;
+       TALLOC_CTX *mem_ctx = talloc_new(tctx);
+       struct smb2_handle _h;
+       struct smb2_handle h_client1_file1 = {{0}};
+       struct smb2_handle h_client1_file2 = {{0}};
+       struct smb2_handle h_client1_file3 = {{0}};
+       struct smb2_handle h_client2_file1 = {{0}};
+       struct smb2_handle h_client2_file2 = {{0}};
+       struct smb2_handle h_client2_file3 = {{0}};
+       struct smb2_create io1, io2, io3;
+       bool ret = true;
+       const char *fname1 = BASEDIR "\\oplock_break_test1.dat";
+       const char *fname2 = BASEDIR "\\oplock_break_test2.dat";
+       const char *fname3 = BASEDIR "\\oplock_break_test3.dat";
+       struct smb2_tree *tree2A = NULL;
+       struct smb2_tree *tree2B = NULL;
+       struct smb2_tree *tree2C = NULL;
+       struct smb2_tree *tree2D = NULL;
+       struct smb2_transport *transport1 = tree1->session->transport;
+       struct smb2_transport *transport2 = NULL;
+       struct smbcli_options transport2_options;
+       struct smb2_session *session1 = tree1->session;
+       uint16_t local_port = 0;
+       DATA_BLOB blob;
+       bool block_ok = false;
+       bool unblock_ok = false;
+
+       if (!test_multichannel_initial_checks(tctx, tree1)) {
+               return true;
+       }
+
+       torture_comment(tctx, "Oplock break retry: Test2\n");
+
+       torture_reset_break_info(tctx, &break_info);
+
+       transport1->oplock.handler = torture_oplock_ack_handler;
+       transport1->oplock.private_data = tree1;
+       torture_comment(tctx, "transport1  [%p]\n", transport1);
+       local_port = torture_get_local_port_from_transport(transport1);
+       torture_comment(tctx, "transport1 uses tcp port: %d\n", local_port);
+
+       status = torture_smb2_testdir(tree1, BASEDIR, &_h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       smb2_util_close(tree1, _h);
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       CHECK_VAL(break_info.count, 0);
+
+       smb2_oplock_create_share(&io1, fname1,
+                       smb2_util_share_access("RWD"),
+                       smb2_util_oplock_level("b"));
+       test_multichannel_init_smb_create(&io1);
+
+       smb2_oplock_create_share(&io2, fname2,
+                       smb2_util_share_access("RWD"),
+                       smb2_util_oplock_level("b"));
+       test_multichannel_init_smb_create(&io2);
+
+       smb2_oplock_create_share(&io3, fname3,
+                       smb2_util_share_access("RWD"),
+                       smb2_util_oplock_level("b"));
+       test_multichannel_init_smb_create(&io3);
+
+       transport2_options = transport1->options;
+
+       ret = test_multichannel_create_channels(tctx, host, share,
+                                                 credentials,
+                                                 &transport2_options,
+                                                 &tree2A, &tree2B, &tree2C);
+       torture_assert(tctx, ret, "Could not create channels.\n")
+
+       torture_comment(tctx, "client2 opens fname1 via session 2A\n");
+       io1.in.oplock_level = smb2_util_oplock_level("b");
+       status = smb2_create(tree2A, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io1.out.oplock_level, smb2_util_oplock_level("b"));
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 0);
+
+
+       torture_comment(tctx, "client2 opens fname2 via session 2B\n");
+       io2.in.oplock_level = smb2_util_oplock_level("b");
+       status = smb2_create(tree2B, mem_ctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file2 = io2.out.file.handle;
+       CHECK_CREATED(&io2, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io2.out.oplock_level, smb2_util_oplock_level("b"));
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 0);
+
+
+       torture_comment(tctx, "client1 opens fname1 via session 1\n");
+       io1.in.oplock_level = smb2_util_oplock_level("b");
+       status = smb2_create(tree1, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io1.out.oplock_level, smb2_util_oplock_level("s"));
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 1);
+
+       /* We use the transport over which this oplock break was received */
+       transport2 = break_info.received_transport;
+       torture_reset_break_info(tctx, &break_info);
+
+       /* block channel */
+       block_ok = test_block_channel(tctx, transport2);
+
+       torture_comment(tctx, "client1 opens fname2 via session 1\n");
+       io2.in.oplock_level = smb2_util_oplock_level("b");
+       status = smb2_create(tree1, mem_ctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file2 = io2.out.file.handle;
+       CHECK_CREATED(&io2, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io2.out.oplock_level, smb2_util_oplock_level("s"));
+
+       /*
+        * Samba downgrades oplock to a level 2 oplock.
+        * Windows 2016 revokes oplock
+        */
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 1);
+       torture_reset_break_info(tctx, &break_info);
+
+       torture_comment(tctx, "Trying write to file2 on tree2B\n");
+
+       blob = data_blob_string_const("Here I am");
+       status = smb2_util_write(tree2B,
+                                h_client2_file2,
+                                blob.data,
+                                0,
+                                blob.length);
+       torture_assert_ntstatus_ok(tctx, status,
+               "failed to write file2 via channel 2B");
+
+       /*
+        * Samba: Write triggers 2 oplock breaks
+        *  for session 1 which has file2 open
+        *  for session 2 which has type 2 oplock
+        * Windows 2016: Only one oplock break for session 1
+        */
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL_GREATER_THAN(break_info.count, 0);
+       torture_reset_break_info(tctx, &break_info);
+
+       torture_comment(tctx, "client1 closes fname2 via session 1\n");
+       smb2_util_close(tree1, h_client1_file2);
+
+       torture_comment(tctx, "client1 opens fname2 via session 1 again\n");
+       io2.in.oplock_level = smb2_util_oplock_level("b");
+       status = smb2_create(tree1, mem_ctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file2 = io2.out.file.handle;
+       io2.out.alloc_size = 0;
+       io2.out.size = 0;
+       CHECK_CREATED(&io2, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io2.out.oplock_level, smb2_util_oplock_level("s"));
+
+       /*
+        * now add a fourth channel and repeat the test, we need to reestablish
+        * transport2 because the remote end has invalidated our connection
+        */
+       torture_comment(tctx, "Connecting session 2D\n");
+       tree2D = test_multichannel_create_channel(tctx, host, share,
+                                    credentials, &transport2_options, tree2B);
+       if (!tree2D) {
+               goto done;
+       }
+
+       torture_reset_break_info(tctx, &break_info);
+       torture_comment(tctx, "client 2 opening fname3 over transport2D\n");
+       status = smb2_create(tree2D, mem_ctx, &io3);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file3 = io3.out.file.handle;
+       CHECK_CREATED(&io3, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io3.out.oplock_level, smb2_util_oplock_level("b"));
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 0);
+
+       torture_comment(tctx, "client1 opens fname3 via session 1\n");
+       status = smb2_create(tree1, mem_ctx, &io3);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file3 = io3.out.file.handle;
+       CHECK_CREATED(&io3, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io3.out.oplock_level, smb2_util_oplock_level("s"));
+       torture_wait_for_oplock_break(tctx);
+       CHECK_VAL(break_info.count, 1);
+
+done:
+       if (block_ok && !unblock_ok) {
+               test_unblock_channel(tctx, transport2);
+       }
+       test_cleanup_blocked_channels(tctx);
+
+       tree1->session = session1;
+
+       smb2_util_close(tree1, h_client1_file1);
+       smb2_util_close(tree1, h_client1_file2);
+       smb2_util_close(tree1, h_client1_file3);
+       if (tree2B != NULL) {
+               smb2_util_close(tree2B, h_client2_file1);
+               smb2_util_close(tree2B, h_client2_file2);
+               smb2_util_close(tree2B, h_client2_file3);
+       }
+
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       smb2_deltree(tree1, BASEDIR);
+
+       test_multichannel_free_channels(tree2A, tree2B, tree2C);
+       if (tree2D != NULL) {
+               TALLOC_FREE(tree2D);
+       }
+       talloc_free(tree1);
+       talloc_free(mem_ctx);
+
+       return ret;
+}
+
+static const uint64_t LEASE1F1 = 0xBADC0FFEE0DDF00Dull;
+static const uint64_t LEASE1F2 = 0xBADC0FFEE0DDD00Dull;
+static const uint64_t LEASE1F3 = 0xDADC0FFEE0DDD00Dull;
+static const uint64_t LEASE2F1 = 0xDEADBEEFFEEDBEADull;
+static const uint64_t LEASE2F2 = 0xDAD0FFEDD00DF00Dull;
+static const uint64_t LEASE2F3 = 0xBAD0FFEDD00DF00Dull;
+
+/*
+ * Lease Break Test 1:
+ * Test to check if lease breaks are sent by the server as expected.
+ *      open file1 in session 2A
+ *      open file2 in session 2B
+ *      open file3 in session 2C
+ *      open file1 in session 1
+ *           lease break sent
+ *      open file2 in session 1
+ *           lease break sent
+ *      open file3 in session 1
+ *           lease break sent
+ */
+static bool test_multichannel_lease_break_test1(struct torture_context *tctx,
+                                               struct smb2_tree *tree1)
+{
+       const char *host = torture_setting_string(tctx, "host", NULL);
+       const char *share = torture_setting_string(tctx, "share", NULL);
+       struct cli_credentials *credentials = popt_get_cmdline_credentials();
+       NTSTATUS status;
+       TALLOC_CTX *mem_ctx = talloc_new(tctx);
+       struct smb2_handle _h;
+       struct smb2_handle *h = NULL;
+       struct smb2_handle h_client1_file1 = {{0}};
+       struct smb2_handle h_client1_file2 = {{0}};
+       struct smb2_handle h_client1_file3 = {{0}};
+       struct smb2_handle h_client2_file1 = {{0}};
+       struct smb2_handle h_client2_file2 = {{0}};
+       struct smb2_handle h_client2_file3 = {{0}};
+       struct smb2_create io1, io2, io3;
+       bool ret = true;
+       const char *fname1 = BASEDIR "\\lease_break_test1.dat";
+       const char *fname2 = BASEDIR "\\lease_break_test2.dat";
+       const char *fname3 = BASEDIR "\\lease_break_test3.dat";
+       struct smb2_tree *tree2A = NULL;
+       struct smb2_tree *tree2B = NULL;
+       struct smb2_tree *tree2C = NULL;
+       struct smb2_transport *transport1 = tree1->session->transport;
+       struct smbcli_options transport2_options;
+       struct smb2_session *session1 = tree1->session;
+       uint16_t local_port = 0;
+       struct smb2_lease ls1;
+       struct smb2_lease ls2;
+       struct smb2_lease ls3;
+
+       if (!test_multichannel_initial_checks(tctx, tree1)) {
+               return true;
+       }
+
+       torture_comment(tctx, "Lease break retry: Test1\n");
+
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       transport1->lease.handler = torture_lease_handler;
+       transport1->lease.private_data = tree1;
+       torture_comment(tctx, "transport1  [%p]\n", transport1);
+       local_port = torture_get_local_port_from_transport(transport1);
+       torture_comment(tctx, "transport1 uses tcp port: %d\n", local_port);
+
+       status = torture_smb2_testdir(tree1, BASEDIR, &_h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       smb2_util_close(tree1, _h);
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE2F1,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io1);
+
+       smb2_lease_create(&io2, &ls2, false, fname2, LEASE2F2,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io2);
+
+       smb2_lease_create(&io3, &ls3, false, fname3, LEASE2F3,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io3);
+
+       transport2_options = transport1->options;
+
+       ret = test_multichannel_create_channels(tctx, host, share,
+                                                 credentials,
+                                                 &transport2_options,
+                                                 &tree2A, &tree2B, &tree2C);
+       torture_assert(tctx, ret, "Could not create channels.\n");
+
+       /* 2a opens file1 */
+       torture_comment(tctx, "client2 opens fname1 via session 2A\n");
+       status = smb2_create(tree2A, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io1, "RHW", true, LEASE2F1, 0);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       /* 2b opens file2 */
+       torture_comment(tctx, "client2 opens fname2 via session 2B\n");
+       status = smb2_create(tree2B, mem_ctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file2 = io2.out.file.handle;
+       CHECK_CREATED(&io2, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io2, "RHW", true, LEASE2F2, 0);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       /* 2c opens file3 */
+       torture_comment(tctx, "client2 opens fname3 via session 2C\n");
+       smb2_lease_create(&io3, &ls3, false, fname3, LEASE2F3,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree2C, mem_ctx, &io3);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file3 = io3.out.file.handle;
+       CHECK_CREATED(&io3, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io3, "RHW", true, LEASE2F3, 0);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       /* 1 opens file1 - lease break? */
+       torture_comment(tctx, "client1 opens fname1 via session 1\n");
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE1F1,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree1, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io1, "RH", true, LEASE1F1, 0);
+       CHECK_BREAK_INFO("RHW", "RH", LEASE2F1);
+       CHECK_VAL(lease_break_info.count, 1);
+
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       /* 1 opens file2 - lease break? */
+       torture_comment(tctx, "client1 opens fname2 via session 1\n");
+       smb2_lease_create(&io2, &ls2, false, fname2, LEASE1F2,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree1, mem_ctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file2 = io2.out.file.handle;
+       CHECK_CREATED(&io2, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io2, "RH", true, LEASE1F2, 0);
+       CHECK_BREAK_INFO("RHW", "RH", LEASE2F2);
+       CHECK_VAL(lease_break_info.count, 1);
+
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       /* 1 opens file3 - lease break? */
+       torture_comment(tctx, "client1 opens fname3 via session 1\n");
+       smb2_lease_create(&io3, &ls3, false, fname3, LEASE1F3,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree1, mem_ctx, &io3);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file3 = io3.out.file.handle;
+       CHECK_CREATED(&io3, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io3, "RH", true, LEASE1F3, 0);
+       CHECK_BREAK_INFO("RHW", "RH", LEASE2F3);
+       CHECK_VAL(lease_break_info.count, 1);
+
+       /* cleanup everything */
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       smb2_util_close(tree1, h_client1_file1);
+       smb2_util_close(tree1, h_client1_file2);
+       smb2_util_close(tree1, h_client1_file3);
+       smb2_util_close(tree2A, h_client2_file1);
+       smb2_util_close(tree2A, h_client2_file2);
+       smb2_util_close(tree2A, h_client2_file3);
+
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       CHECK_VAL(lease_break_info.count, 0);
+       test_multichannel_free_channels(tree2A, tree2B, tree2C);
+       tree2A = tree2B = tree2C = NULL;
+done:
+       tree1->session = session1;
+
+       smb2_util_close(tree1, h_client1_file1);
+       smb2_util_close(tree1, h_client1_file2);
+       smb2_util_close(tree1, h_client1_file3);
+       if (tree2A != NULL) {
+               smb2_util_close(tree2A, h_client2_file1);
+               smb2_util_close(tree2A, h_client2_file2);
+               smb2_util_close(tree2A, h_client2_file3);
+       }
+
+       if (h != NULL) {
+               smb2_util_close(tree1, *h);
+       }
+
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       smb2_deltree(tree1, BASEDIR);
+
+       test_multichannel_free_channels(tree2A, tree2B, tree2C);
+       talloc_free(tree1);
+       talloc_free(mem_ctx);
+
+       return ret;
+}
+
+/*
+ * Lease Break Test 2:
+ * Test for lease break retries being sent by the server.
+ *      Connect 2A, 2B
+ *      open file1 in session 2A
+ *      open file2 in session 2B
+ *      block 2A
+ *      open file2 in session 1
+ *           lease break retry reaches the client?
+ *      Connect 2C
+ *      open file3 in session 2C
+ *      unblock 2A
+ *      open file1 in session 1
+ *           lease break reaches the client?
+ *      open file3 in session 1
+ *           lease break reached the client?
+ *      Cleanup
+ *           On deletion by 1, lease breaks sent for file1, file2 and file3
+ *           on 2B
+ *           This changes RH lease to R for Session 2.
+ *           (This has been disabled while we add support for sending lease
+ *            break for handle leases.)
+ */
+static bool test_multichannel_lease_break_test2(struct torture_context *tctx,
+                                               struct smb2_tree *tree1)
+{
+       const char *host = torture_setting_string(tctx, "host", NULL);
+       const char *share = torture_setting_string(tctx, "share", NULL);
+       struct cli_credentials *credentials = popt_get_cmdline_credentials();
+       NTSTATUS status;
+       TALLOC_CTX *mem_ctx = talloc_new(tctx);
+       struct smb2_handle _h;
+       struct smb2_handle *h = NULL;
+       struct smb2_handle h_client1_file1 = {{0}};
+       struct smb2_handle h_client1_file2 = {{0}};
+       struct smb2_handle h_client1_file3 = {{0}};
+       struct smb2_handle h_client2_file1 = {{0}};
+       struct smb2_handle h_client2_file2 = {{0}};
+       struct smb2_handle h_client2_file3 = {{0}};
+       struct smb2_create io1, io2, io3;
+       bool ret = true;
+       const char *fname1 = BASEDIR "\\lease_break_test1.dat";
+       const char *fname2 = BASEDIR "\\lease_break_test2.dat";
+       const char *fname3 = BASEDIR "\\lease_break_test3.dat";
+       struct smb2_tree *tree2A = NULL;
+       struct smb2_tree *tree2B = NULL;
+       struct smb2_tree *tree2C = NULL;
+       struct smb2_transport *transport1 = tree1->session->transport;
+       struct smb2_transport *transport2A = NULL;
+       struct smbcli_options transport2_options;
+       struct smb2_session *session1 = tree1->session;
+       uint16_t local_port = 0;
+       struct smb2_lease ls1;
+       struct smb2_lease ls2;
+       struct smb2_lease ls3;
+       bool block_ok = false;
+       bool unblock_ok = false;
+
+
+       if (!test_multichannel_initial_checks(tctx, tree1)) {
+               return true;
+       }
+
+       torture_comment(tctx, "Lease break retry: Test2\n");
+
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       transport1->lease.handler = torture_lease_handler;
+       transport1->lease.private_data = tree1;
+       torture_comment(tctx, "transport1  [%p]\n", transport1);
+       local_port = torture_get_local_port_from_transport(transport1);
+       torture_comment(tctx, "transport1 uses tcp port: %d\n", local_port);
+
+       status = torture_smb2_testdir(tree1, BASEDIR, &_h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       smb2_util_close(tree1, _h);
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE2F1,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io1);
+
+       smb2_lease_create(&io2, &ls2, false, fname2, LEASE2F2,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io2);
+
+       smb2_lease_create(&io3, &ls3, false, fname3, LEASE2F3,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io3);
+
+       transport2_options = transport1->options;
+
+       ret = test_multichannel_create_channels(tctx, host, share,
+                                                 credentials,
+                                                 &transport2_options,
+                                                 &tree2A, &tree2B, NULL);
+       torture_assert(tctx, ret, "Could not create channels.\n");
+       transport2A = tree2A->session->transport;
+
+       /* 2a opens file1 */
+       torture_comment(tctx, "client2 opens fname1 via session 2A\n");
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE2F1,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree2A, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io1, "RHW", true, LEASE2F1, 0);
+       CHECK_VAL(io1.out.durable_open_v2, false); //true);
+       CHECK_VAL(io1.out.timeout, io1.in.timeout);
+       CHECK_VAL(io1.out.durable_open, false);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       /* 2b opens file2 */
+       torture_comment(tctx, "client2 opens fname2 via session 2B\n");
+       smb2_lease_create(&io2, &ls2, false, fname2, LEASE2F2,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree2B, mem_ctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file2 = io2.out.file.handle;
+       CHECK_CREATED(&io2, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io2, "RHW", true, LEASE2F2, 0);
+       CHECK_VAL(io2.out.durable_open_v2, false); //true);
+       CHECK_VAL(io2.out.timeout, io2.in.timeout);
+       CHECK_VAL(io2.out.durable_open, false);
+       CHECK_VAL(lease_break_info.count, 0);
+
+
+       torture_comment(tctx, "Blocking 2A\n");
+       /* Block 2A */
+       block_ok = test_block_channel(tctx, transport2A);
+       torture_assert(tctx, block_ok, "we could not block tcp transport");
+
+       /* 1 opens file2 */
+       torture_comment(tctx,
+                       "Client opens fname2 with session1 with 2A blocked\n");
+       smb2_lease_create(&io2, &ls2, false, fname2, LEASE1F2,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree1, mem_ctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file2 = io2.out.file.handle;
+       CHECK_CREATED(&io2, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io2, "RH", true, LEASE1F2, 0);
+       CHECK_VAL(io2.out.durable_open_v2, false);
+       CHECK_VAL(io2.out.timeout, 0);
+       CHECK_VAL(io2.out.durable_open, false);
+
+       if (lease_break_info.count == 0) {
+               torture_comment(tctx,
+                               "Did not receive expected lease break!!\n");
+       } else {
+               torture_comment(tctx, "Received %d lease break(s)!!\n",
+                               lease_break_info.count);
+       }
+
+       CHECK_VAL(lease_break_info.count, 1);
+       CHECK_BREAK_INFO("RHW", "RH", LEASE2F2);
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       /* Connect 2C */
+       torture_comment(tctx, "Connecting session 2C\n");
+       talloc_free(tree2C);
+       tree2C = test_multichannel_create_channel(tctx, host, share,
+                               credentials, &transport2_options, tree2A);
+       if (!tree2C) {
+               goto done;
+       }
+
+       /* 2c opens file3 */
+       torture_comment(tctx, "client2 opens fname3 via session 2C\n");
+       smb2_lease_create(&io3, &ls3, false, fname3, LEASE2F3,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree2C, mem_ctx, &io3);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file3 = io3.out.file.handle;
+       CHECK_CREATED(&io3, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io3, "RHW", true, LEASE2F3, 0);
+       CHECK_VAL(io3.out.durable_open_v2, false);
+       CHECK_VAL(io3.out.timeout, io2.in.timeout);
+       CHECK_VAL(io3.out.durable_open, false);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       /* Unblock 2A */
+       torture_comment(tctx, "Unblocking 2A\n");
+       unblock_ok = test_unblock_channel(tctx, transport2A);
+       torture_assert(tctx, unblock_ok, "we could not unblock tcp transport");
+
+       /* 1 opens file1 */
+       torture_comment(tctx, "Client opens fname1 with session 1\n");
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE1F1,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree1, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io1, "RH", true, LEASE1F1, 0);
+
+       if (lease_break_info.count == 0) {
+               torture_comment(tctx,
+                               "Did not receive expected lease break!!\n");
+       } else {
+               torture_comment(tctx,
+                               "Received %d lease break(s)!!\n",
+                               lease_break_info.count);
+       }
+       CHECK_VAL(lease_break_info.count, 1);
+       CHECK_BREAK_INFO("RHW", "RH", LEASE2F1);
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       /*1 opens file3 */
+       torture_comment(tctx, "client opens fname3 via session 1\n");
+
+       smb2_lease_create(&io3, &ls3, false, fname3, LEASE1F3,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree1, mem_ctx, &io3);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file3 = io3.out.file.handle;
+       CHECK_CREATED(&io3, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io3, "RH", true, LEASE1F3, 0);
+
+       if (lease_break_info.count == 0) {
+               torture_comment(tctx,
+                               "Did not receive expected lease break!!\n");
+       } else {
+               torture_comment(tctx,
+                               "Received %d lease break(s)!!\n",
+                               lease_break_info.count);
+       }
+       CHECK_VAL(lease_break_info.count, 1);
+       CHECK_BREAK_INFO("RHW", "RH", LEASE2F3);
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       smb2_util_close(tree1, h_client1_file1);
+       smb2_util_close(tree1, h_client1_file2);
+       smb2_util_close(tree1, h_client1_file3);
+
+       /*
+        * Session 2 still has RW lease on file 1. Deletion of this file by 1
+        *  leads to a lease break call to session 2 file1
+        */
+       smb2_util_unlink(tree1, fname1);
+       /*
+        * Bug - Samba does not revoke Handle lease on unlink
+        * CHECK_BREAK_INFO("RH", "R", LEASE2F1);
+        */
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       /*
+        * Session 2 still has RW lease on file 2. Deletion of this file by 1
+        *  leads to a lease break call to session 2 file2
+        */
+       smb2_util_unlink(tree1, fname2);
+       /*
+        * Bug - Samba does not revoke Handle lease on unlink
+        * CHECK_BREAK_INFO("RH", "R", LEASE2F2);
+        */
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       /*
+        * Session 2 still has RW lease on file 3. Deletion of this file by 1
+        *  leads to a lease break call to session 2 file3
+        */
+       smb2_util_unlink(tree1, fname3);
+       /*
+        * Bug - Samba does not revoke Handle lease on unlink
+        * CHECK_BREAK_INFO("RH", "R", LEASE2F3);
+        */
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       smb2_util_close(tree2C, h_client2_file1);
+       smb2_util_close(tree2C, h_client2_file2);
+       smb2_util_close(tree2C, h_client2_file3);
+
+       test_multichannel_free_channels(tree2A, tree2B, tree2C);
+       tree2A = tree2B = tree2C = NULL;
+
+done:
+       if (block_ok && !unblock_ok) {
+               test_unblock_channel(tctx, transport2A);
+       }
+       test_cleanup_blocked_channels(tctx);
+
+       tree1->session = session1;
+
+       smb2_util_close(tree1, h_client1_file1);
+       smb2_util_close(tree1, h_client1_file2);
+       smb2_util_close(tree1, h_client1_file3);
+       if (tree2A != NULL) {
+               smb2_util_close(tree2A, h_client2_file1);
+               smb2_util_close(tree2A, h_client2_file2);
+               smb2_util_close(tree2A, h_client2_file3);
+       }
+
+       if (h != NULL) {
+               smb2_util_close(tree1, *h);
+       }
+
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       smb2_deltree(tree1, BASEDIR);
+
+       test_multichannel_free_channels(tree2A, tree2B, tree2C);
+       talloc_free(tree1);
+       talloc_free(mem_ctx);
+
+       return ret;
+}
+
+/*
+ * Test 3: Check to see how the server behaves if lease break
+ *      response is sent over a different channel to one over which
+ *      the break is received.
+ *      Connect 2A, 2B
+ *      open file1 in session 2A
+ *      open file1 in session 1
+ *           Lease break sent to 2A
+ *           2B sends back lease break reply.
+ *      session 1 allowed to open file
+ */
+static bool test_multichannel_lease_break_test3(struct torture_context *tctx,
+                                               struct smb2_tree *tree1)
+{
+       const char *host = torture_setting_string(tctx, "host", NULL);
+       const char *share = torture_setting_string(tctx, "share", NULL);
+       struct cli_credentials *credentials = popt_get_cmdline_credentials();
+       NTSTATUS status;
+       TALLOC_CTX *mem_ctx = talloc_new(tctx);
+       struct smb2_handle _h;
+       struct smb2_handle *h = NULL;
+       struct smb2_handle h_client1_file1 = {{0}};
+       struct smb2_handle h_client2_file1 = {{0}};
+       struct smb2_create io1;
+       bool ret = true;
+       const char *fname1 = BASEDIR "\\lease_break_test1.dat";
+       struct smb2_tree *tree2A = NULL;
+       struct smb2_tree *tree2B = NULL;
+       struct smb2_transport *transport1 = tree1->session->transport;
+       struct smb2_transport *transport2A = NULL;
+       struct smbcli_options transport2_options;
+       uint16_t local_port = 0;
+       struct smb2_lease ls1;
+       struct tevent_timer *te = NULL;
+       struct timeval ne;
+       bool timesup = false;
+       TALLOC_CTX *tmp_ctx = talloc_new(NULL);
+
+       if (!test_multichannel_initial_checks(tctx, tree1)) {
+               return true;
+       }
+
+       torture_comment(tctx, "Lease break retry: Test3\n");
+
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       transport1->lease.handler = torture_lease_handler;
+       transport1->lease.private_data = tree1;
+       torture_comment(tctx, "transport1  [%p]\n", transport1);
+       local_port = torture_get_local_port_from_transport(transport1);
+       torture_comment(tctx, "transport1 uses tcp port: %d\n", local_port);
+
+       status = torture_smb2_testdir(tree1, BASEDIR, &_h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       smb2_util_close(tree1, _h);
+       smb2_util_unlink(tree1, fname1);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE2F1,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io1);
+
+       transport2_options = transport1->options;
+
+       ret = test_multichannel_create_channels(tctx, host, share,
+                                               credentials,
+                                               &transport2_options,
+                                               &tree2A, &tree2B, NULL);
+       torture_assert(tctx, ret, "Could not create channels.\n");
+       transport2A = tree2A->session->transport;
+       transport2A->lease.private_data = tree2B;
+
+       /* 2a opens file1 */
+       torture_comment(tctx, "client2 opens fname1 via session 2A\n");
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE2F1,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree2A, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io1, "RHW", true, LEASE2F1, 0);
+       CHECK_VAL(io1.out.durable_open_v2, false); //true);
+       CHECK_VAL(io1.out.timeout, io1.in.timeout);
+       CHECK_VAL(io1.out.durable_open, false);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       /* Set a timeout for 5 seconds for session 1 to open file1 */
+       ne = tevent_timeval_current_ofs(0, 5000000);
+       te = tevent_add_timer(tctx->ev, tmp_ctx, ne, timeout_cb, &timesup);
+       if (te == NULL) {
+               torture_comment(tctx, "Failed to add timer.");
+               goto done;
+       }
+
+       /* 1 opens file2 */
+       torture_comment(tctx, "Client opens fname1 with session 1\n");
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE1F1,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree1, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io1, "RH", true, LEASE1F1, 0);
+       CHECK_VAL(io1.out.durable_open_v2, false);
+       CHECK_VAL(io1.out.timeout, 0);
+       CHECK_VAL(io1.out.durable_open, false);
+
+       CHECK_VAL(lease_break_info.count, 1);
+       CHECK_BREAK_INFO("RHW", "RH", LEASE2F1);
+
+       /*
+        * Check if timeout handler was fired. This would indicate
+        * that the server didn't receive a reply for the oplock break
+        * from the client and the server let session 1 open the file
+        * only after the oplock break timeout.
+        */
+       CHECK_VAL(timesup, false);
+
+done:
+       smb2_util_close(tree1, h_client1_file1);
+       if (tree2A != NULL) {
+               smb2_util_close(tree2A, h_client2_file1);
+       }
+
+       if (h != NULL) {
+               smb2_util_close(tree1, *h);
+       }
+
+       smb2_util_unlink(tree1, fname1);
+       smb2_deltree(tree1, BASEDIR);
+
+       test_multichannel_free_channels(tree2A, tree2B, NULL);
+       talloc_free(tree1);
+       talloc_free(mem_ctx);
+
+       return ret;
+}
+
+/* lease handler for test4 */
+static bool test4_lease_break_handler(struct smb2_transport *transport,
+                          const struct smb2_lease_break *lb,
+                          void *private_data)
+{
+       NTSTATUS status;
+       bool ret = true;
+       struct smb2_tree *test4_tree2 = private_data;
+       struct torture_context *tctx = lease_break_info.tctx;
+       struct smb2_handle test4_h_file = lease_break_info.oplock_handle;
+       DATA_BLOB blob;
+
+       lease_break_info.lease_transport = transport;
+       lease_break_info.lease_break = *lb;
+       lease_break_info.count++;
+
+       torture_comment(tctx, "Test 6 Lease break handler called.\n");
+       torture_comment(tctx, "Trying write to file using given session.\n");
+
+       blob = data_blob_string_const("Here I am");
+       status = smb2_util_write(test4_tree2,
+                                test4_h_file,
+                                blob.data,
+                                0,
+                                blob.length);
+       torture_assert_ntstatus_ok_goto(tctx, status, ret, done,
+               "failed to write file");
+
+done:
+       return ret;
+}
+
+/*
+ * Lease Break Test 4:
+ * Test to see how the server behaves when the client flushes data back to the
+ * server but doesn't send the lease break response over the channel. Does it
+ * then retry the lease break?
+ *      Connect 2A, 2B
+ *      open file1 in session 2A
+ *      set lease handler for 2A to ignore break requests
+ *      open file1 in session 1
+ *           Lease break sent to 2A
+ *           Write to file in 2A
+ *           Do not send ack to lease break
+ *      Check to see if second lease break sent
+ *      Cleanup
+ */
+static bool test_multichannel_lease_break_test4(struct torture_context *tctx,
+                                               struct smb2_tree *tree1)
+{
+       const char *host = torture_setting_string(tctx, "host", NULL);
+       const char *share = torture_setting_string(tctx, "share", NULL);
+       struct cli_credentials *credentials = popt_get_cmdline_credentials();
+       NTSTATUS status;
+       TALLOC_CTX *mem_ctx = talloc_new(tctx);
+       struct smb2_handle _h;
+       struct smb2_handle *h = NULL;
+       struct smb2_handle h_client1_file1 = {{0}};
+       struct smb2_handle h_client2_file1 = {{0}};
+       struct smb2_create io1, io2, io3;
+       bool ret = true;
+       const char *fname1 = BASEDIR "\\lease_break_test1.dat";
+       const char *fname2 = BASEDIR "\\lease_break_test2.dat";
+       const char *fname3 = BASEDIR "\\lease_break_test3.dat";
+       struct smb2_tree *tree2A = NULL;
+       struct smb2_tree *tree2B = NULL;
+       struct smb2_tree *tree2C = NULL;
+       struct smb2_transport *transport1 = tree1->session->transport;
+       struct smb2_transport *transport2A = NULL;
+       struct smbcli_options transport2_options;
+       struct smb2_session *session1 = tree1->session;
+       uint16_t local_port = 0;
+       struct smb2_lease ls1;
+       struct smb2_lease ls2;
+       struct smb2_lease ls3;
+
+       if (!test_multichannel_initial_checks(tctx, tree1)) {
+               return true;
+       }
+
+       torture_comment(tctx, "Lease break retry: Test4\n");
+       torture_comment(tctx, "This test is specifically expected to run "
+                       "against samba and will not work against windows "
+                       "servers. The windows server assumes that if the "
+                       "send() command returns successfully, the lease break "
+                       "has been delivered. In this test, we rely on the "
+                       "Samba behaviour of waiting for a reply for the lease "
+                       "break from the server instead.\n");
+
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+       transport1->lease.handler = torture_lease_handler;
+       transport1->lease.private_data = tree1;
+       torture_comment(tctx, "transport1  [%p]\n", transport1);
+       local_port = torture_get_local_port_from_transport(transport1);
+       torture_comment(tctx, "transport1 uses tcp port: %d\n", local_port);
+
+       status = torture_smb2_testdir(tree1, BASEDIR, &_h);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       smb2_util_close(tree1, _h);
+       smb2_util_unlink(tree1, fname1);
+       smb2_util_unlink(tree1, fname2);
+       smb2_util_unlink(tree1, fname3);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE2F1,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io1);
+
+       smb2_lease_create(&io2, &ls2, false, fname2, LEASE2F2,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io2);
+
+       smb2_lease_create(&io3, &ls3, false, fname3, LEASE2F3,
+                         smb2_util_lease_state("RHW"));
+       test_multichannel_init_smb_create(&io3);
+
+       transport2_options = transport1->options;
+
+       ret = test_multichannel_create_channels(tctx, host, share,
+                                                 credentials,
+                                                 &transport2_options,
+                                                 &tree2A, &tree2B, NULL);
+       torture_assert(tctx, ret, "Could not create channels.\n");
+       transport2A = tree2A->session->transport;
+
+       torture_comment(tctx, "client2 opens fname1 via session 2A\n");
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE2F1,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree2A, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client2_file1 = io1.out.file.handle;
+       CHECK_CREATED(&io1, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io1, "RHW", true, LEASE2F1, 0);
+       CHECK_VAL(io1.out.durable_open_v2, false); //true);
+       CHECK_VAL(io1.out.timeout, io1.in.timeout);
+       CHECK_VAL(io1.out.durable_open, false);
+       CHECK_VAL(lease_break_info.count, 0);
+
+       torture_comment(tctx, "Blocking 2A\n");
+       /* Set our lease handler for 2A */
+       lease_break_info.oplock_handle = h_client2_file1;
+       transport2A->lease.handler = test4_lease_break_handler;
+
+       torture_comment(tctx,
+                       "Client opens fname1 with session 1 with 2A blocked\n");
+       smb2_lease_create(&io1, &ls1, false, fname1, LEASE1F1,
+                         smb2_util_lease_state("RHW"));
+       status = smb2_create(tree1, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h_client1_file1 = io1.out.file.handle;
+       CHECK_LEASE(&io1, "RH", true, LEASE1F1, 0);
+
+       if (lease_break_info.count == 0) {
+               torture_comment(tctx,
+                               "Did not receive expected lease break!!\n");
+       } else {
+               torture_comment(tctx,
+                               "Received %d lease break(s)!!\n",
+                               lease_break_info.count);
+       }
+
+       /* Should receive 2 lease breaks */
+       CHECK_VAL(lease_break_info.count, 2);
+       torture_reset_lease_break_info(tctx, &lease_break_info);
+
+done:
+       tree1->session = session1;
+
+       smb2_util_close(tree1, h_client1_file1);
+       if (tree2A != NULL) {
+               smb2_util_close(tree2A, h_client2_file1);
+       }
+
+       if (h != NULL) {
+               smb2_util_close(tree1, *h);
+       }
+
+       smb2_util_unlink(tree1, fname1);
+       smb2_deltree(tree1, BASEDIR);
+
+       test_multichannel_free_channels(tree2A, tree2B, tree2C);
+       talloc_free(tree1);
+       talloc_free(mem_ctx);
+
+       return ret;
+}
+
+/*
+ * Test limits of channels
+ */
+static bool test_multichannel_num_channels(struct torture_context *tctx,
+                                          struct smb2_tree *tree1)
+{
+       const char *host = torture_setting_string(tctx, "host", NULL);
+       const char *share = torture_setting_string(tctx, "share", NULL);
+       struct cli_credentials *credentials = popt_get_cmdline_credentials();
+       TALLOC_CTX *mem_ctx = talloc_new(tctx);
+       bool ret = true;
+       struct smb2_tree **tree2 = NULL;
+       struct smb2_transport *transport1 = tree1->session->transport;
+       struct smb2_transport **transport2 = NULL;
+       struct smbcli_options transport2_options;
+       struct smb2_session **session2 = NULL;
+       uint32_t server_capabilities;
+       int i;
+       int max_channels = 33; /* 32 is the W2K12R2 and W2K16 limit */
+
+       if (smbXcli_conn_protocol(transport1->conn) < PROTOCOL_SMB3_00) {
+               torture_fail(tctx,
+                            "SMB 3.X Dialect family required for Multichannel"
+                            " tests\n");
+       }
+
+       server_capabilities = smb2cli_conn_server_capabilities(
+                                       tree1->session->transport->conn);
+       if (!(server_capabilities & SMB2_CAP_MULTI_CHANNEL)) {
+               torture_fail(tctx,
+                            "Server does not support multichannel.");
+       }
+
+       torture_comment(tctx, "Testing max. number of channels\n");
+
+       transport2_options = transport1->options;
+       transport2_options.client_guid = GUID_random();
+
+       tree2           = talloc_zero_array(mem_ctx, struct smb2_tree *,
+                                           max_channels);
+       transport2      = talloc_zero_array(mem_ctx, struct smb2_transport *,
+                                           max_channels);
+       session2        = talloc_zero_array(mem_ctx, struct smb2_session *,
+                                           max_channels);
+       if (tree2 == NULL || transport2 == NULL || session2 == NULL) {
+               torture_fail(tctx, "out of memory");
+       }
+
+       for (i = 0; i < max_channels; i++) {
+
+               NTSTATUS expected_status;
+
+               torture_assert_ntstatus_ok_goto(tctx,
+                       smb2_connect(tctx,
+                               host,
+                               lpcfg_smb_ports(tctx->lp_ctx),
+                               share,
+                               lpcfg_resolve_context(tctx->lp_ctx),
+                               credentials,
+                               &tree2[i],
+                               tctx->ev,
+                               &transport2_options,
+                               lpcfg_socket_options(tctx->lp_ctx),
+                               lpcfg_gensec_settings(tctx, tctx->lp_ctx)
+                               ),
+                       ret, done, "smb2_connect failed");
+
+               transport2[i] = tree2[i]->session->transport;
+
+               if (i == 0) {
+                       /* done for the 1st channel */
+                       continue;
+               }
+
+               /*
+                * Now bind the session2[i] to the transport2
+                */
+               session2[i] = smb2_session_channel(transport2[i],
+                                                  lpcfg_gensec_settings(tctx,
+                                                                tctx->lp_ctx),
+                                                  tree2[0],
+                                                  tree2[0]->session);
+
+               torture_assert(tctx, session2[i] != NULL,
+                              "smb2_session_channel failed");
+
+               torture_comment(tctx, "established transport2 [#%d]\n", i);
+
+               if (i >= 32) {
+                       expected_status = NT_STATUS_INSUFFICIENT_RESOURCES;
+               } else {
+                       expected_status = NT_STATUS_OK;
+               }
+
+               torture_assert_ntstatus_equal_goto(tctx,
+                       smb2_session_setup_spnego(session2[i],
+                               popt_get_cmdline_credentials(),
+                               0 /* previous_session_id */),
+                       expected_status,
+                       ret, done,
+                       talloc_asprintf(tctx, "failed to establish session "
+                                             "setup for channel #%d", i));
+
+               torture_comment(tctx, "bound session2 [#%d] to session2 [0]\n",
+                               i);
+       }
+
+ done:
+       talloc_free(mem_ctx);
+
+       return ret;
+}
+
 struct torture_suite *torture_smb2_multichannel_init(TALLOC_CTX *ctx)
 {
        struct torture_suite *suite = torture_suite_create(ctx, "multichannel");
+       struct torture_suite *suite_generic = torture_suite_create(ctx,
+                                                                  "generic");
+       struct torture_suite *suite_oplocks = torture_suite_create(ctx,
+                                                                  "oplocks");
+       struct torture_suite *suite_leases = torture_suite_create(ctx,
+                                                                 "leases");
+
+       torture_suite_add_suite(suite, suite_generic);
+       torture_suite_add_suite(suite, suite_oplocks);
+       torture_suite_add_suite(suite, suite_leases);
 
        torture_suite_add_1smb2_test(suite, "interface_info",
                                     test_multichannel_interface_info);
+       torture_suite_add_1smb2_test(suite_generic, "num_channels",
+                                    test_multichannel_num_channels);
+       torture_suite_add_1smb2_test(suite_oplocks, "test1",
+                                    test_multichannel_oplock_break_test1);
+       torture_suite_add_1smb2_test(suite_oplocks, "test2",
+                                    test_multichannel_oplock_break_test2);
+       torture_suite_add_1smb2_test(suite_leases, "test1",
+                                    test_multichannel_lease_break_test1);
+       torture_suite_add_1smb2_test(suite_leases, "test2",
+                                    test_multichannel_lease_break_test2);
+       torture_suite_add_1smb2_test(suite_leases, "test3",
+                                    test_multichannel_lease_break_test3);
+       torture_suite_add_1smb2_test(suite_leases, "test4",
+                                    test_multichannel_lease_break_test4);
 
        suite->description = talloc_strdup(suite, "SMB2 Multichannel tests");