--- /dev/null
+/*
+ Unix SMB/CIFS implementation.
+
+ test suite for SMB2 shadow copy operations
+
+ Copyright (C) Michael Adam 2013
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include "includes.h"
+#include "librpc/gen_ndr/security.h"
+#include "libcli/smb2/smb2.h"
+#include "libcli/smb2/smb2_calls.h"
+#include "torture/torture.h"
+#include "torture/smb2/proto.h"
+#include "librpc/gen_ndr/ndr_ioctl.h"
+
+#define FNAME "testfsctl.dat"
+#define FNAME2 "testfsctl2.dat"
+
+/**
+ * Open the share's base directory and get the shadow copy data.
+ */
+static bool test_shadow_copy_1(struct torture_context *torture,
+ struct smb2_tree *tree)
+{
+ struct smb2_handle h;
+ NTSTATUS status;
+ union smb_ioctl ioctl;
+ TALLOC_CTX *tmp_ctx = talloc_new(tree);
+ uint32_t num_volumes;
+ uint32_t num_labels;
+ uint32_t count;
+ uint32_t delivered_count;
+
+ status = smb2_util_roothandle(tree, &h);
+ torture_assert_ntstatus_ok(torture, status, "open root");
+
+ ZERO_STRUCT(ioctl);
+ ioctl.smb2.level = RAW_IOCTL_SMB2;
+ ioctl.smb2.in.file.handle = h;
+ ioctl.smb2.in.function = FSCTL_SRV_ENUM_SNAPS;
+ ioctl.smb2.in.max_response_size = 16;
+ ioctl.smb2.in.flags = SMB2_IOCTL_FLAG_IS_FSCTL;
+
+ status = smb2_ioctl(tree, tmp_ctx, &ioctl.smb2);
+ if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED) ||
+ NT_STATUS_EQUAL(status, NT_STATUS_INVALID_DEVICE_REQUEST))
+ {
+ torture_skip(torture, "FSCTL_GET_SHADOW_COPY_DATA not supported\n");
+ }
+ torture_assert_ntstatus_ok(torture, status, "FSCTL_GET_SHADOW_COPY_DATA");
+
+ torture_assert(torture,
+ (ioctl.smb2.out.out.length >= 12),
+ "FSCTL_GET_SHADOW_COPY_DATA response: out data too small (header)");
+
+ num_volumes = IVAL(ioctl.smb2.out.out.data, 0);
+ num_labels = IVAL(ioctl.smb2.out.out.data, 4);
+ count = IVAL(ioctl.smb2.out.out.data, 8);
+
+ torture_assert(torture,
+ (count == num_volumes * 2 * 25 + 2),
+ "FSCTL_GET_SHADOW_COPY_DATA response: wrong count");
+
+ delivered_count = num_labels * 2 * 25 + 2;
+
+ torture_assert(torture,
+ (ioctl.smb2.out.out.length >= 12 + delivered_count),
+ "FSCTL_GET_SHADOW_COPY_DATA response: out data too small (labels)");
+
+ /*
+ * request again, with enough space now.
+ *
+ * TODO: alloc buffer ??
+ */
+
+ ZERO_STRUCT(ioctl);
+ ioctl.smb2.level = RAW_IOCTL_SMB2;
+ ioctl.smb2.in.file.handle = h;
+ ioctl.smb2.in.function = FSCTL_SRV_ENUM_SNAPS;
+ ioctl.smb2.in.max_response_size = 16 + count;
+ //ioctl.smb2.in.max_response_size = 16 + num_volumes * 2 * 25 + 2;
+ ioctl.smb2.in.flags = SMB2_IOCTL_FLAG_IS_FSCTL;
+
+ status = smb2_ioctl(tree, tmp_ctx, &ioctl.smb2);
+ if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED) ||
+ NT_STATUS_EQUAL(status, NT_STATUS_INVALID_DEVICE_REQUEST))
+ {
+ torture_skip(torture, "FSCTL_GET_SHADOW_COPY_DATA not supported\n");
+ }
+ torture_assert_ntstatus_ok(torture, status, "FSCTL_GET_SHADOW_COPY_DATA");
+
+ torture_assert(torture,
+ (ioctl.smb2.out.out.length >= 12),
+ "FSCTL_GET_SHADOW_COPY_DATA response: out data too small (header)");
+
+ num_volumes = IVAL(ioctl.smb2.out.out.data, 0);
+ num_labels = IVAL(ioctl.smb2.out.out.data, 4);
+ count = IVAL(ioctl.smb2.out.out.data, 8);
+
+ torture_assert(torture,
+ (num_volumes == num_labels),
+ "FSCTL_GET_SHADOW_COPY_DATA response: wrong number of labels");
+
+ torture_assert(torture,
+ (count == num_volumes * 2 * 25 + 2),
+ "FSCTL_GET_SHADOW_COPY_DATA response: wrong count");
+
+ delivered_count = num_labels * 2 * 25 + 2;
+
+ torture_assert(torture,
+ (ioctl.smb2.out.out.length >= 12 + delivered_count),
+ "FSCTL_GET_SHADOW_COPY_DATA response: out data too small (labels)");
+
+ return true;
+}
+
+#if 0
+/**
+ */
+static bool test_shadow_copy_1(struct torture_context *torture,
+ struct smb2_tree *tree)
+{
+ struct smb2_handle h;
+ uint8_t buf[100];
+ NTSTATUS status;
+ union smb_ioctl ioctl;
+ TALLOC_CTX *tmp_ctx = talloc_new(tree);
+
+ smb2_util_unlink(tree, FNAME);
+
+ status = torture_smb2_testfile(tree, FNAME, &h);
+ torture_assert_ntstatus_ok(torture, status, "create write");
+
+ ZERO_ARRAY(buf);
+ status = smb2_util_write(tree, h, buf, 0, ARRAY_SIZE(buf));
+ torture_assert_ntstatus_ok(torture, status, "write");
+
+ ZERO_STRUCT(ioctl);
+ ioctl.smb2.level = RAW_IOCTL_SMB2;
+ ioctl.smb2.in.file.handle = h;
+ ioctl.smb2.in.function = FSCTL_SRV_ENUM_SNAPS;
+ ioctl.smb2.in.max_response_size = 16;
+ ioctl.smb2.in.flags = SMB2_IOCTL_FLAG_IS_FSCTL;
+
+ status = smb2_ioctl(tree, tmp_ctx, &ioctl.smb2);
+ if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED)
+ || NT_STATUS_EQUAL(status, NT_STATUS_INVALID_DEVICE_REQUEST)) {
+ torture_skip(torture, "FSCTL_SRV_ENUM_SNAPS not supported\n");
+ }
+ torture_assert_ntstatus_ok(torture, status, "FSCTL_SRV_ENUM_SNAPS");
+
+ return true;
+}
+#endif
+
+/**
+ * basic testing of SMB2 shadow copies
+ */
+struct torture_suite *torture_smb2_shadow_copy_init(void)
+{
+ struct torture_suite *suite = torture_suite_create(talloc_autofree_context(), "shadow-copy");
+
+ torture_suite_add_1smb2_test(suite, "shadow_copy_1",
+ test_shadow_copy_1);
+
+ suite->description = talloc_strdup(suite, "SMB2-SHADOW-COPY tests");
+
+ return suite;
+}
+