s4:torture/smb2: smb2.lease.breaking2 test
authorStefan Metzmacher <metze@samba.org>
Sat, 15 Nov 2014 10:58:01 +0000 (11:58 +0100)
committerStefan Metzmacher <metze@samba.org>
Thu, 27 Nov 2014 15:45:06 +0000 (16:45 +0100)
This demonstrates that a conflicting open with NTCREATEX_DISP_OVERWRITE
breaks a lease to NONE.

It also shows which error codes are generated for unexpected lease break acks.

Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
source4/torture/smb2/lease.c

index 5678436cc4935479a8c31662491811efe6aa881a..b694dd834a273967d3fa49bf5b5c5f72ad1fa3aa 100644 (file)
@@ -1885,6 +1885,157 @@ done:
        return ret;
 }
 
+static bool test_lease_breaking2(struct torture_context *tctx,
+                                struct smb2_tree *tree)
+{
+       TALLOC_CTX *mem_ctx = talloc_new(tctx);
+       struct smb2_create io1 = {};
+       struct smb2_create io2 = {};
+       struct smb2_lease ls1 = {};
+       struct smb2_handle h1a = {};
+       struct smb2_handle h1b = {};
+       struct smb2_handle h2 = {};
+       struct smb2_request *req2 = NULL;
+       struct smb2_lease_break_ack ack = {};
+       const char *fname = "lease_breaking2.dat";
+       bool ret = true;
+       NTSTATUS status;
+       uint32_t caps;
+
+       caps = smb2cli_conn_server_capabilities(tree->session->transport->conn);
+       if (!(caps & SMB2_CAP_LEASING)) {
+               torture_skip(tctx, "leases are not supported");
+       }
+
+       smb2_util_unlink(tree, fname);
+
+       tree->session->transport->lease.handler = torture_lease_handler;
+       tree->session->transport->lease.private_data = tree;
+       tree->session->transport->oplock.handler = torture_oplock_handler;
+       tree->session->transport->oplock.private_data = tree;
+
+       /*
+        * we defer acking the lease break.
+        */
+       ZERO_STRUCT(break_info);
+       break_info.lease_skip_ack = true;
+
+       smb2_lease_create_share(&io1, &ls1, false, fname,
+                               smb2_util_share_access("RWD"),
+                               LEASE1,
+                               smb2_util_lease_state("RWH"));
+       status = smb2_create(tree, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h1a = io1.out.file.handle;
+       CHECK_CREATED(&io1, CREATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io1, "RWH", true, LEASE1, 0);
+
+       /*
+        * a conflicting open is blocked until we ack the
+        * lease break
+        */
+       smb2_oplock_create(&io2, fname, SMB2_OPLOCK_LEVEL_NONE);
+       io2.in.create_disposition = NTCREATEX_DISP_OVERWRITE;
+       req2 = smb2_create_send(tree, &io2);
+       torture_assert(tctx, req2 != NULL, "smb2_create_send");
+
+       /*
+        * we got the lease break, but defer the ack.
+        */
+       CHECK_BREAK_INFO("RWH", "", LEASE1);
+
+       torture_assert(tctx, req2->state == SMB2_REQUEST_RECV, "req2 pending");
+
+       ack.in.lease.lease_key =
+               break_info.lease_break.current_lease.lease_key;
+       ZERO_STRUCT(break_info);
+
+       /*
+        * a open using the same lease key is still works,
+        * but reports SMB2_LEASE_FLAG_BREAK_IN_PROGRESS
+        */
+       status = smb2_create(tree, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h1b = io1.out.file.handle;
+       CHECK_CREATED(&io1, EXISTED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_LEASE(&io1, "RWH", true, LEASE1, SMB2_LEASE_FLAG_BREAK_IN_PROGRESS);
+       smb2_util_close(tree, h1b);
+
+       CHECK_NO_BREAK(tctx);
+
+       torture_assert(tctx, req2->state == SMB2_REQUEST_RECV, "req2 pending");
+
+       /*
+        * We ack the lease break.
+        */
+       ack.in.lease.lease_state =
+               SMB2_LEASE_READ | SMB2_LEASE_WRITE | SMB2_LEASE_HANDLE;
+       status = smb2_lease_break_ack(tree, &ack);
+       CHECK_STATUS(status, NT_STATUS_REQUEST_NOT_ACCEPTED);
+
+       ack.in.lease.lease_state =
+               SMB2_LEASE_READ | SMB2_LEASE_WRITE;
+       status = smb2_lease_break_ack(tree, &ack);
+       CHECK_STATUS(status, NT_STATUS_REQUEST_NOT_ACCEPTED);
+
+       ack.in.lease.lease_state =
+               SMB2_LEASE_WRITE | SMB2_LEASE_HANDLE;
+       status = smb2_lease_break_ack(tree, &ack);
+       CHECK_STATUS(status, NT_STATUS_REQUEST_NOT_ACCEPTED);
+
+       ack.in.lease.lease_state =
+               SMB2_LEASE_READ | SMB2_LEASE_HANDLE;
+       status = smb2_lease_break_ack(tree, &ack);
+       CHECK_STATUS(status, NT_STATUS_REQUEST_NOT_ACCEPTED);
+
+       ack.in.lease.lease_state = SMB2_LEASE_WRITE;
+       status = smb2_lease_break_ack(tree, &ack);
+       CHECK_STATUS(status, NT_STATUS_REQUEST_NOT_ACCEPTED);
+
+       ack.in.lease.lease_state = SMB2_LEASE_HANDLE;
+       status = smb2_lease_break_ack(tree, &ack);
+       CHECK_STATUS(status, NT_STATUS_REQUEST_NOT_ACCEPTED);
+
+       ack.in.lease.lease_state = SMB2_LEASE_READ;
+       status = smb2_lease_break_ack(tree, &ack);
+       CHECK_STATUS(status, NT_STATUS_REQUEST_NOT_ACCEPTED);
+
+       /* Try again with the correct state this time. */
+       ack.in.lease.lease_state = SMB2_LEASE_NONE;;
+       status = smb2_lease_break_ack(tree, &ack);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       CHECK_LEASE_BREAK_ACK(&ack, "", LEASE1);
+
+       status = smb2_lease_break_ack(tree, &ack);
+       CHECK_STATUS(status, NT_STATUS_UNSUCCESSFUL);
+
+       torture_assert(tctx, req2->cancel.can_cancel,
+                      "req2 can_cancel");
+
+       status = smb2_create_recv(req2, tctx, &io2);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       h2 = io2.out.file.handle;
+       CHECK_CREATED(&io2, TRUNCATED, FILE_ATTRIBUTE_ARCHIVE);
+       CHECK_VAL(io2.out.oplock_level, SMB2_OPLOCK_LEVEL_NONE);
+
+       CHECK_NO_BREAK(tctx);
+
+       /* Get state of the original handle. */
+       smb2_lease_create(&io1, &ls1, false, fname, LEASE1, smb2_util_lease_state(""));
+       status = smb2_create(tree, mem_ctx, &io1);
+       CHECK_STATUS(status, NT_STATUS_OK);
+       CHECK_LEASE(&io1, "", true, LEASE1, 0);
+       smb2_util_close(tree, io1.out.file.handle);
+
+done:
+       smb2_util_close(tree, h1a);
+       smb2_util_close(tree, h1b);
+       smb2_util_close(tree, h2);
+       smb2_util_unlink(tree, fname);
+       talloc_free(mem_ctx);
+       return ret;
+}
+
 static bool test_lease_complex1(struct torture_context *tctx,
                                struct smb2_tree *tree1a)
 {
@@ -2173,6 +2324,7 @@ struct torture_suite *torture_smb2_lease_init(void)
        torture_suite_add_1smb2_test(suite, "oplock", test_lease_oplock);
        torture_suite_add_1smb2_test(suite, "multibreak", test_lease_multibreak);
        torture_suite_add_1smb2_test(suite, "breaking1", test_lease_breaking1);
+       torture_suite_add_1smb2_test(suite, "breaking2", test_lease_breaking2);
        torture_suite_add_1smb2_test(suite, "complex1", test_lease_complex1);
        torture_suite_add_1smb2_test(suite, "v2_request_parent",
                                     test_lease_v2_request_parent);