Line data Source code
1 : /*
2 : Unix SMB/CIFS implementation.
3 : SMB torture tester
4 : Copyright (C) Andrew Tridgell 1997-2003
5 : Copyright (C) Jelmer Vernooij 2006-2008
6 :
7 : This program is free software; you can redistribute it and/or modify
8 : it under the terms of the GNU General Public License as published by
9 : the Free Software Foundation; either version 3 of the License, or
10 : (at your option) any later version.
11 :
12 : This program is distributed in the hope that it will be useful,
13 : but WITHOUT ANY WARRANTY; without even the implied warranty of
14 : MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 : GNU General Public License for more details.
16 :
17 : You should have received a copy of the GNU General Public License
18 : along with this program. If not, see <http://www.gnu.org/licenses/>.
19 : */
20 :
21 : #include "includes.h"
22 : #include "lib/util/util_file.h"
23 : #include "lib/cmdline/cmdline.h"
24 : #include "system/time.h"
25 : #include "system/wait.h"
26 : #include "system/filesys.h"
27 : #include "system/readline.h"
28 : #include "../libcli/smbreadline/smbreadline.h"
29 : #include "libcli/libcli.h"
30 : #include "lib/events/events.h"
31 :
32 : #include "torture/smbtorture.h"
33 : #include "librpc/rpc/dcerpc.h"
34 : #include "auth/gensec/gensec.h"
35 : #include "param/param.h"
36 : #include "lib/util/samba_modules.h"
37 :
38 : #ifdef HAVE_READLINE_HISTORY_H
39 : #include <readline/history.h>
40 : #endif
41 :
42 : static int use_fullname;
43 :
44 11861751 : static char *prefix_name(TALLOC_CTX *mem_ctx, const char *prefix, const char *name)
45 : {
46 11861751 : if (prefix == NULL)
47 56851 : return talloc_strdup(mem_ctx, name);
48 : else
49 11804900 : return talloc_asprintf(mem_ctx, "%s.%s", prefix, name);
50 : }
51 :
52 0 : static void print_test_list(const struct torture_suite *suite, const char *prefix, const char *expr)
53 : {
54 0 : struct torture_suite *o;
55 0 : struct torture_tcase *t;
56 0 : struct torture_test *p;
57 :
58 0 : for (o = suite->children; o; o = o->next) {
59 0 : char *name = prefix_name(NULL, prefix, o->name);
60 0 : print_test_list(o, name, expr);
61 0 : talloc_free(name);
62 : }
63 :
64 0 : for (t = suite->testcases; t; t = t->next) {
65 0 : for (p = t->tests; p; p = p->next) {
66 0 : char *name = talloc_asprintf(NULL, "%s.%s.%s", prefix, t->name, p->name);
67 0 : if (strncmp(name, expr, strlen(expr)) == 0) {
68 0 : printf("%s\n", name);
69 : }
70 0 : talloc_free(name);
71 : }
72 : }
73 0 : }
74 :
75 1126109 : static bool run_matching(struct torture_context *torture,
76 : const char *prefix,
77 : const char *expr,
78 : const char **restricted,
79 : struct torture_suite *suite,
80 : bool *matched)
81 : {
82 1126109 : bool ret = true;
83 92654 : struct torture_suite *o;
84 92654 : struct torture_tcase *t;
85 92654 : struct torture_test *p;
86 :
87 2251308 : for (o = suite->children; o; o = o->next) {
88 1125199 : char *name = NULL;
89 1125199 : name = prefix_name(torture, prefix, o->name);
90 1125199 : if (gen_fnmatch(expr, name) == 0) {
91 1372 : *matched = true;
92 1372 : reload_charcnv(torture->lp_ctx);
93 1372 : if (use_fullname == 1) {
94 3 : torture_subunit_prefix_reset(torture, prefix);
95 : }
96 1372 : ret &= torture_run_suite_restricted(torture, o, restricted);
97 1372 : if (use_fullname == 1) {
98 3 : torture_subunit_prefix_reset(torture, NULL);
99 : }
100 : /*
101 : * torture_run_suite_restricted() already implements
102 : * recursion, so we're done with this child suite.
103 : */
104 1372 : continue;
105 : }
106 1123827 : ret &= run_matching(torture, name, expr, restricted, o, matched);
107 : }
108 :
109 5971530 : for (t = suite->testcases; t; t = t->next) {
110 4845421 : char *tname = prefix_name(torture, prefix, t->name);
111 4845421 : if (gen_fnmatch(expr, tname) == 0) {
112 1080 : *matched = true;
113 1080 : reload_charcnv(torture->lp_ctx);
114 1080 : if (use_fullname == 1) {
115 1 : torture_subunit_prefix_reset(torture, prefix);
116 : }
117 1080 : ret &= torture_run_tcase_restricted(torture, t, restricted);
118 1080 : if (use_fullname == 1) {
119 1 : torture_subunit_prefix_reset(torture, NULL);
120 : }
121 : /*
122 : * torture_run_tcase_restricted() already implements
123 : * recursion, so we're done for this tcase.
124 : */
125 1080 : continue;
126 : }
127 10735472 : for (p = t->tests; p; p = p->next) {
128 5891131 : char *pname = prefix_name(torture, tname, p->name);
129 5891131 : if (gen_fnmatch(expr, pname) == 0) {
130 0 : *matched = true;
131 0 : reload_charcnv(torture->lp_ctx);
132 0 : if (use_fullname == 1) {
133 0 : torture_subunit_prefix_reset(torture,
134 : tname);
135 : }
136 0 : ret &= torture_run_test_restricted(torture, t, p, restricted);
137 0 : if (use_fullname == 1) {
138 0 : torture_subunit_prefix_reset(torture,
139 : NULL);
140 : }
141 : }
142 : }
143 : }
144 :
145 1126109 : return ret;
146 : }
147 :
148 : #define MAX_COLS 80 /* FIXME: Determine this at run-time */
149 :
150 : /****************************************************************************
151 : run a specified test or "ALL"
152 : ****************************************************************************/
153 2282 : bool torture_run_named_tests(struct torture_context *torture, const char *name,
154 : const char **restricted)
155 : {
156 2282 : bool ret = true;
157 2282 : bool matched = false;
158 119 : struct torture_suite *o;
159 :
160 2282 : torture_ui_report_time(torture);
161 :
162 2282 : if (strequal(name, "ALL")) {
163 0 : if (restricted != NULL) {
164 0 : printf("--load-list and ALL are incompatible\n");
165 0 : return false;
166 : }
167 0 : for (o = torture_root->children; o; o = o->next) {
168 0 : ret &= torture_run_suite(torture, o);
169 : }
170 0 : return ret;
171 : }
172 :
173 2282 : ret = run_matching(torture, NULL, name, restricted, torture_root, &matched);
174 :
175 2282 : if (!matched) {
176 0 : printf("Unknown torture operation '%s'\n", name);
177 0 : return false;
178 : }
179 :
180 2163 : return ret;
181 : }
182 :
183 2274 : bool torture_parse_target(TALLOC_CTX *ctx,
184 : struct loadparm_context *lp_ctx,
185 : const char *target)
186 : {
187 2274 : char *host = NULL, *share = NULL;
188 119 : struct dcerpc_binding *binding_struct;
189 119 : NTSTATUS status;
190 :
191 : /* see if its a RPC transport specifier */
192 2274 : if (!smbcli_parse_unc(target, NULL, &host, &share)) {
193 78 : const char *h;
194 :
195 1185 : status = dcerpc_parse_binding(ctx, target, &binding_struct);
196 1185 : if (NT_STATUS_IS_ERR(status)) {
197 0 : d_printf("Invalid option: %s is not a valid torture target (share or binding string)\n\n", target);
198 0 : return false;
199 : }
200 :
201 1185 : h = dcerpc_binding_get_string_option(binding_struct, "host");
202 1185 : host = discard_const_p(char, h);
203 1185 : if (host != NULL) {
204 1179 : lpcfg_set_cmdline(lp_ctx, "torture:host", host);
205 : }
206 :
207 1185 : if (lpcfg_parm_string(lp_ctx, NULL, "torture", "share") == NULL)
208 1185 : lpcfg_set_cmdline(lp_ctx, "torture:share", "IPC$");
209 1185 : lpcfg_set_cmdline(lp_ctx, "torture:binding", target);
210 : } else {
211 1089 : lpcfg_set_cmdline(lp_ctx, "torture:host", host);
212 1089 : lpcfg_set_cmdline(lp_ctx, "torture:share", share);
213 1089 : lpcfg_set_cmdline(lp_ctx, "torture:binding", host);
214 : }
215 :
216 2155 : return true;
217 : }
218 :
219 7 : static void parse_dns(struct loadparm_context *lp_ctx, const char *dns)
220 : {
221 0 : char *userdn, *basedn, *secret;
222 0 : char *p, *d;
223 :
224 : /* retrieve the userdn */
225 7 : p = strchr_m(dns, '#');
226 7 : if (!p) {
227 0 : lpcfg_set_cmdline(lp_ctx, "torture:ldap_userdn", "");
228 0 : lpcfg_set_cmdline(lp_ctx, "torture:ldap_basedn", "");
229 0 : lpcfg_set_cmdline(lp_ctx, "torture:ldap_secret", "");
230 0 : return;
231 : }
232 7 : userdn = strndup(dns, p - dns);
233 7 : lpcfg_set_cmdline(lp_ctx, "torture:ldap_userdn", userdn);
234 :
235 : /* retrieve the basedn */
236 7 : d = p + 1;
237 7 : p = strchr_m(d, '#');
238 7 : if (!p) {
239 0 : lpcfg_set_cmdline(lp_ctx, "torture:ldap_basedn", "");
240 0 : lpcfg_set_cmdline(lp_ctx, "torture:ldap_secret", "");
241 0 : return;
242 : }
243 7 : basedn = strndup(d, p - d);
244 7 : lpcfg_set_cmdline(lp_ctx, "torture:ldap_basedn", basedn);
245 :
246 : /* retrieve the secret */
247 7 : p = p + 1;
248 7 : if (!p) {
249 0 : lpcfg_set_cmdline(lp_ctx, "torture:ldap_secret", "");
250 0 : return;
251 : }
252 7 : secret = strdup(p);
253 7 : lpcfg_set_cmdline(lp_ctx, "torture:ldap_secret", secret);
254 :
255 7 : printf ("%s - %s - %s\n", userdn, basedn, secret);
256 :
257 : }
258 :
259 : /* Print the full test list, formatted into separate labelled test
260 : * groups.
261 : */
262 0 : static void print_structured_testsuite_list(void)
263 : {
264 0 : struct torture_suite *o;
265 0 : struct torture_suite *s;
266 0 : struct torture_tcase *t;
267 0 : int i;
268 :
269 0 : if (torture_root == NULL) {
270 0 : printf("NO TESTS LOADED\n");
271 0 : return;
272 : }
273 :
274 0 : for (o = torture_root->children; o; o = o->next) {
275 0 : printf("\n%s (%s):\n ", o->description, o->name);
276 :
277 0 : i = 0;
278 0 : for (s = o->children; s; s = s->next) {
279 0 : if (i + strlen(o->name) + strlen(s->name) >= (MAX_COLS - 3)) {
280 0 : printf("\n ");
281 0 : i = 0;
282 : }
283 0 : i+=printf("%s.%s ", o->name, s->name);
284 : }
285 :
286 0 : for (t = o->testcases; t; t = t->next) {
287 0 : if (i + strlen(o->name) + strlen(t->name) >= (MAX_COLS - 3)) {
288 0 : printf("\n ");
289 0 : i = 0;
290 : }
291 0 : i+=printf("%s.%s ", o->name, t->name);
292 : }
293 :
294 0 : if (i) printf("\n");
295 : }
296 :
297 0 : printf("\nThe default test is ALL.\n");
298 : }
299 :
300 80 : static void print_testsuite_list(void)
301 : {
302 6 : struct torture_suite *o;
303 6 : struct torture_suite *s;
304 6 : struct torture_tcase *t;
305 :
306 80 : if (torture_root == NULL)
307 0 : return;
308 :
309 2124 : for (o = torture_root->children; o; o = o->next) {
310 17128 : for (s = o->children; s; s = s->next) {
311 15084 : printf("%s.%s\n", o->name, s->name);
312 : }
313 :
314 18984 : for (t = o->testcases; t; t = t->next) {
315 16940 : printf("%s.%s\n", o->name, t->name);
316 : }
317 : }
318 : }
319 :
320 0 : void torture_print_testsuites(bool structured)
321 : {
322 0 : if (structured) {
323 0 : print_structured_testsuite_list();
324 : } else {
325 0 : print_testsuite_list();
326 : }
327 0 : }
328 :
329 0 : static void usage(poptContext pc)
330 : {
331 0 : poptPrintUsage(pc, stdout, 0);
332 0 : printf("\n");
333 :
334 0 : printf("The binding format is:\n\n");
335 :
336 0 : printf(" TRANSPORT:host[flags]\n\n");
337 :
338 0 : printf(" where TRANSPORT is either ncacn_np for SMB, ncacn_ip_tcp for RPC/TCP\n");
339 0 : printf(" or ncalrpc for local connections.\n\n");
340 :
341 0 : printf(" 'host' is an IP or hostname or netbios name. If the binding string\n");
342 0 : printf(" identifies the server side of an endpoint, 'host' may be an empty\n");
343 0 : printf(" string.\n\n");
344 :
345 0 : printf(" 'flags' can include a SMB pipe name if using the ncacn_np transport or\n");
346 0 : printf(" a TCP port number if using the ncacn_ip_tcp transport, otherwise they\n");
347 0 : printf(" will be auto-determined.\n\n");
348 :
349 0 : printf(" other recognised flags are:\n\n");
350 :
351 0 : printf(" sign : enable ntlmssp signing\n");
352 0 : printf(" seal : enable ntlmssp sealing\n");
353 0 : printf(" connect : enable rpc connect level auth (auth, but no sign or seal)\n");
354 0 : printf(" validate: enable the NDR validator\n");
355 0 : printf(" print: enable debugging of the packets\n");
356 0 : printf(" bigendian: use bigendian RPC\n");
357 0 : printf(" padcheck: check reply data for non-zero pad bytes\n\n");
358 :
359 0 : printf(" For example, these all connect to the samr pipe:\n\n");
360 :
361 0 : printf(" ncacn_np:myserver\n");
362 0 : printf(" ncacn_np:myserver[samr]\n");
363 0 : printf(" ncacn_np:myserver[\\pipe\\samr]\n");
364 0 : printf(" ncacn_np:myserver[/pipe/samr]\n");
365 0 : printf(" ncacn_np:myserver[samr,sign,print]\n");
366 0 : printf(" ncacn_np:myserver[\\pipe\\samr,sign,seal,bigendian]\n");
367 0 : printf(" ncacn_np:myserver[/pipe/samr,seal,validate]\n");
368 0 : printf(" ncacn_np:\n");
369 0 : printf(" ncacn_np:[/pipe/samr]\n\n");
370 :
371 0 : printf(" ncacn_ip_tcp:myserver\n");
372 0 : printf(" ncacn_ip_tcp:myserver[1024]\n");
373 0 : printf(" ncacn_ip_tcp:myserver[1024,sign,seal]\n\n");
374 :
375 0 : printf(" ncalrpc:\n\n");
376 :
377 0 : printf("The UNC format is:\n\n");
378 :
379 0 : printf(" //server/share\n\n");
380 :
381 0 : printf("Tests are:");
382 :
383 0 : print_structured_testsuite_list();
384 :
385 0 : }
386 :
387 0 : _NORETURN_ static void max_runtime_handler(int sig)
388 : {
389 0 : DEBUG(0,("maximum runtime exceeded for smbtorture - terminating\n"));
390 0 : exit(1);
391 : }
392 :
393 : /****************************************************************************
394 : main program
395 : ****************************************************************************/
396 2356 : int main(int argc, const char *argv[])
397 : {
398 125 : int opt, i;
399 2356 : bool correct = true;
400 2356 : int max_runtime=0;
401 125 : int argc_new;
402 125 : struct torture_context *torture;
403 125 : struct torture_results *results;
404 125 : const struct torture_ui_ops *ui_ops;
405 125 : char **argv_new;
406 125 : poptContext pc;
407 125 : static const char *target = "other";
408 125 : NTSTATUS status;
409 2356 : int shell = false;
410 125 : static const char *ui_ops_name = "subunit";
411 2356 : const char *basedir = NULL;
412 125 : char *outputdir;
413 2356 : const char *extra_module = NULL;
414 125 : static int list_tests = 0, list_testsuites = 0;
415 2356 : int num_extra_users = 0;
416 2356 : const char **restricted = NULL;
417 2356 : int num_restricted = -1;
418 2356 : const char *load_list = NULL;
419 125 : enum {OPT_LOADFILE=1000,OPT_UNCLIST,OPT_TIMELIMIT,OPT_DNS, OPT_LIST,
420 : OPT_DANGEROUS,OPT_SMB_PORTS,OPT_ASYNC,OPT_NUMPROGS,
421 : OPT_EXTRA_USER,};
422 2356 : TALLOC_CTX *mem_ctx = NULL;
423 2356 : struct loadparm_context *lp_ctx = NULL;
424 125 : bool ok;
425 :
426 14136 : struct poptOption long_options[] = {
427 : POPT_AUTOHELP
428 : {"fullname", 0, POPT_ARG_NONE, &use_fullname, 0,
429 : "use full name for the test", NULL },
430 : {"format", 0, POPT_ARG_STRING, &ui_ops_name, 0, "Output format (one of: simple, subunit)", NULL },
431 : {"smb-ports", 'p', POPT_ARG_STRING, NULL, OPT_SMB_PORTS, "SMB ports", NULL},
432 : {"basedir", 0, POPT_ARG_STRING, &basedir, 0, "base directory", "BASEDIR" },
433 : {"seed", 0, POPT_ARG_INT, &torture_seed, 0, "Seed to use for randomizer", NULL},
434 : {"num-progs", 0, POPT_ARG_INT, NULL, OPT_NUMPROGS, "num progs", NULL},
435 : {"num-ops", 0, POPT_ARG_INT, &torture_numops, 0, "num ops", NULL},
436 : {"entries", 0, POPT_ARG_INT, &torture_entries, 0, "entries", NULL},
437 : {"loadfile", 0, POPT_ARG_STRING, NULL, OPT_LOADFILE, "NBench load file to use", NULL},
438 : {"list-suites", 0, POPT_ARG_NONE, &list_testsuites, 0, "List available testsuites and exit", NULL },
439 : {"list", 0, POPT_ARG_NONE, &list_tests, 0, "List available tests in specified suites and exit", NULL },
440 : {"unclist", 0, POPT_ARG_STRING, NULL, OPT_UNCLIST, "unclist", NULL},
441 : {"timelimit", 't', POPT_ARG_INT, NULL, OPT_TIMELIMIT, "Set time limit (in seconds)", NULL},
442 : {"failures", 'f', POPT_ARG_INT, &torture_failures, 0, "failures", NULL},
443 : {"parse-dns", 'D', POPT_ARG_STRING, NULL, OPT_DNS, "parse-dns", NULL},
444 : {"dangerous", 'X', POPT_ARG_NONE, NULL, OPT_DANGEROUS,
445 : "run dangerous tests (eg. wiping out password database)", NULL},
446 : {"load-module", 0, POPT_ARG_STRING, &extra_module, 0, "load tests from DSO file", "SOFILE"},
447 : {"shell", 0, POPT_ARG_NONE, &shell, true, "Run shell", NULL},
448 : {"target", 'T', POPT_ARG_STRING, &target, 0, "samba3|samba4|other", NULL},
449 : {"async", 'a', POPT_ARG_NONE, NULL, OPT_ASYNC,
450 : "run async tests", NULL},
451 : {"num-async", 0, POPT_ARG_INT, &torture_numasync, 0,
452 : "number of simultaneous async requests", NULL},
453 : {"maximum-runtime", 0, POPT_ARG_INT, &max_runtime, 0,
454 : "set maximum time for smbtorture to live", "seconds"},
455 : {"extra-user", 0, POPT_ARG_STRING, NULL, OPT_EXTRA_USER,
456 : "extra user credentials", NULL},
457 : {"load-list", 0, POPT_ARG_STRING, &load_list, 0,
458 : "load a test id list from a text file", NULL},
459 2356 : POPT_COMMON_SAMBA
460 2356 : POPT_COMMON_CONNECTION
461 2356 : POPT_COMMON_CREDENTIALS
462 2356 : POPT_COMMON_VERSION
463 2356 : POPT_LEGACY_S4
464 : POPT_TABLEEND
465 : };
466 :
467 2356 : setlinebuf(stdout);
468 :
469 2356 : mem_ctx = talloc_named_const(NULL, 0, "torture_ctx");
470 2356 : if (mem_ctx == NULL) {
471 0 : printf("Unable to allocate torture_ctx\n");
472 0 : exit(1);
473 : }
474 :
475 2356 : printf("smbtorture %s\n", samba_version_string());
476 :
477 : /* we are never interested in SIGPIPE */
478 2356 : BlockSignals(true, SIGPIPE);
479 :
480 2356 : ok = samba_cmdline_init(mem_ctx,
481 : SAMBA_CMDLINE_CONFIG_CLIENT,
482 : false /* require_smbconf */);
483 2356 : if (!ok) {
484 0 : DBG_ERR("Unable to init cmdline parser\n");
485 0 : TALLOC_FREE(mem_ctx);
486 0 : exit(1);
487 : }
488 :
489 2356 : pc = samba_popt_get_context(getprogname(),
490 : argc,
491 : argv,
492 : long_options,
493 : POPT_CONTEXT_KEEP_FIRST);
494 2356 : if (pc == NULL) {
495 0 : DBG_ERR("Failed cmdline parser\n");
496 0 : TALLOC_FREE(mem_ctx);
497 0 : exit(1);
498 : }
499 :
500 2356 : poptSetOtherOptionHelp(pc, "<binding>|<unc> TEST1 TEST2 ...");
501 :
502 2356 : lp_ctx = samba_cmdline_get_lp_ctx();
503 :
504 2363 : while((opt = poptGetNextOpt(pc)) != -1) {
505 9 : switch (opt) {
506 0 : case OPT_LOADFILE:
507 0 : lpcfg_set_cmdline(lp_ctx, "torture:loadfile", poptGetOptArg(pc));
508 0 : break;
509 0 : case OPT_UNCLIST:
510 0 : lpcfg_set_cmdline(lp_ctx, "torture:unclist", poptGetOptArg(pc));
511 0 : break;
512 0 : case OPT_TIMELIMIT:
513 0 : lpcfg_set_cmdline(lp_ctx, "torture:timelimit", poptGetOptArg(pc));
514 0 : break;
515 0 : case OPT_NUMPROGS:
516 0 : lpcfg_set_cmdline(lp_ctx, "torture:nprocs", poptGetOptArg(pc));
517 0 : break;
518 7 : case OPT_DNS:
519 7 : parse_dns(lp_ctx, poptGetOptArg(pc));
520 7 : break;
521 0 : case OPT_DANGEROUS:
522 0 : lpcfg_set_cmdline(lp_ctx, "torture:dangerous", "Yes");
523 0 : break;
524 0 : case OPT_ASYNC:
525 0 : lpcfg_set_cmdline(lp_ctx, "torture:async", "Yes");
526 0 : break;
527 0 : case OPT_SMB_PORTS:
528 0 : lpcfg_set_cmdline(lp_ctx, "smb ports", poptGetOptArg(pc));
529 0 : break;
530 0 : case OPT_EXTRA_USER:
531 : {
532 0 : char *option = talloc_asprintf(mem_ctx,
533 : "torture:extra_user%u",
534 : ++num_extra_users);
535 0 : const char *value = poptGetOptArg(pc);
536 0 : if (option == NULL) {
537 0 : printf("talloc fail\n");
538 0 : talloc_free(mem_ctx);
539 0 : exit(1);
540 : }
541 0 : lpcfg_set_cmdline(lp_ctx, option, value);
542 0 : talloc_free(option);
543 : }
544 0 : break;
545 2 : default:
546 2 : if (opt < 0) {
547 2 : printf("Invalid command line option %s (%d)\n",
548 : poptBadOption(pc, 0),
549 : opt);
550 2 : talloc_free(mem_ctx);
551 2 : exit(1);
552 : }
553 : }
554 : }
555 :
556 2354 : if (load_list != NULL) {
557 0 : char **r;
558 0 : r = file_lines_load(load_list, &num_restricted, 0, mem_ctx);
559 0 : restricted = discard_const_p(const char *, r);
560 0 : if (restricted == NULL) {
561 0 : printf("Unable to read load list file '%s'\n", load_list);
562 0 : talloc_free(mem_ctx);
563 0 : exit(1);
564 : }
565 : }
566 :
567 2354 : if (strcmp(target, "samba3") == 0) {
568 1071 : lpcfg_set_cmdline(lp_ctx, "torture:samba3", "true");
569 1071 : lpcfg_set_cmdline(lp_ctx, "torture:resume_key_support", "false");
570 1283 : } else if (strcmp(target, "samba4") == 0) {
571 1179 : lpcfg_set_cmdline(lp_ctx, "torture:samba4", "true");
572 104 : } else if (strcmp(target, "samba4-ntvfs") == 0) {
573 0 : lpcfg_set_cmdline(lp_ctx, "torture:samba4", "true");
574 0 : lpcfg_set_cmdline(lp_ctx, "torture:samba4-ntvfs", "true");
575 104 : } else if (strcmp(target, "winxp") == 0) {
576 0 : lpcfg_set_cmdline(lp_ctx, "torture:winxp", "true");
577 104 : } else if (strcmp(target, "w2k3") == 0) {
578 0 : lpcfg_set_cmdline(lp_ctx, "torture:w2k3", "true");
579 104 : } else if (strcmp(target, "w2k8") == 0) {
580 0 : lpcfg_set_cmdline(lp_ctx, "torture:w2k8", "true");
581 0 : lpcfg_set_cmdline(lp_ctx,
582 : "torture:invalid_lock_range_support", "false");
583 104 : } else if (strcmp(target, "w2k12") == 0) {
584 0 : lpcfg_set_cmdline(lp_ctx, "torture:w2k12", "true");
585 104 : } else if (strcmp(target, "win7") == 0) {
586 0 : lpcfg_set_cmdline(lp_ctx, "torture:win7", "true");
587 0 : lpcfg_set_cmdline(lp_ctx, "torture:resume_key_support", "false");
588 0 : lpcfg_set_cmdline(lp_ctx, "torture:rewind_support", "false");
589 :
590 : /* RAW-SEARCH for fails for inexplicable reasons against win7 */
591 0 : lpcfg_set_cmdline(lp_ctx, "torture:search_ea_support", "false");
592 :
593 0 : lpcfg_set_cmdline(lp_ctx, "torture:hide_on_access_denied",
594 : "true");
595 104 : } else if (strcmp(target, "onefs") == 0) {
596 0 : lpcfg_set_cmdline(lp_ctx, "torture:onefs", "true");
597 0 : lpcfg_set_cmdline(lp_ctx, "torture:openx_deny_dos_support",
598 : "false");
599 0 : lpcfg_set_cmdline(lp_ctx, "torture:range_not_locked_on_file_close", "false");
600 0 : lpcfg_set_cmdline(lp_ctx, "torture:sacl_support", "false");
601 0 : lpcfg_set_cmdline(lp_ctx, "torture:ea_support", "false");
602 0 : lpcfg_set_cmdline(lp_ctx, "torture:smbexit_pdu_support",
603 : "false");
604 0 : lpcfg_set_cmdline(lp_ctx, "torture:smblock_pdu_support",
605 : "false");
606 0 : lpcfg_set_cmdline(lp_ctx, "torture:2_step_break_to_none",
607 : "true");
608 0 : lpcfg_set_cmdline(lp_ctx, "torture:deny_dos_support", "false");
609 0 : lpcfg_set_cmdline(lp_ctx, "torture:deny_fcb_support", "false");
610 0 : lpcfg_set_cmdline(lp_ctx, "torture:read_support", "false");
611 0 : lpcfg_set_cmdline(lp_ctx, "torture:writeclose_support", "false");
612 0 : lpcfg_set_cmdline(lp_ctx, "torture:resume_key_support", "false");
613 0 : lpcfg_set_cmdline(lp_ctx, "torture:rewind_support", "false");
614 0 : lpcfg_set_cmdline(lp_ctx, "torture:raw_search_search", "false");
615 0 : lpcfg_set_cmdline(lp_ctx, "torture:search_ea_size", "false");
616 : }
617 :
618 2354 : if (max_runtime) {
619 : /* this will only work if nobody else uses alarm(),
620 : which means it won't work for some tests, but we
621 : can't use the event context method we use for smbd
622 : as so many tests create their own event
623 : context. This will at least catch most cases. */
624 2250 : signal(SIGALRM, max_runtime_handler);
625 2250 : alarm(max_runtime);
626 : }
627 :
628 2354 : if (extra_module != NULL) {
629 0 : init_module_fn fn = load_module(poptGetOptArg(pc), false, NULL);
630 :
631 0 : if (fn == NULL)
632 0 : d_printf("Unable to load module from %s\n", poptGetOptArg(pc));
633 : else {
634 0 : status = fn(mem_ctx);
635 0 : if (NT_STATUS_IS_ERR(status)) {
636 0 : d_printf("Error initializing module %s: %s\n",
637 : poptGetOptArg(pc), nt_errstr(status));
638 : }
639 : }
640 : } else {
641 2354 : torture_init(mem_ctx);
642 : }
643 :
644 2354 : if (list_testsuites) {
645 80 : print_testsuite_list();
646 80 : poptFreeContext(pc);
647 80 : talloc_free(mem_ctx);
648 80 : return 0;
649 : }
650 :
651 2274 : argv_new = discard_const_p(char *, poptGetArgs(pc));
652 :
653 2274 : argc_new = argc;
654 9223 : for (i=0; i<argc; i++) {
655 9100 : if (argv_new[i] == NULL) {
656 2155 : argc_new = i;
657 2155 : break;
658 : }
659 : }
660 :
661 2274 : if (list_tests) {
662 0 : if (argc_new == 1) {
663 0 : print_test_list(torture_root, NULL, "");
664 : } else {
665 0 : for (i=1;i<argc_new;i++) {
666 0 : print_test_list(torture_root, NULL, argv_new[i]);
667 : }
668 : }
669 0 : poptFreeContext(pc);
670 0 : talloc_free(mem_ctx);
671 0 : return 0;
672 : }
673 :
674 2274 : if (torture_seed == 0) {
675 2274 : torture_seed = time(NULL);
676 : }
677 2274 : printf("Using seed %d\n", torture_seed);
678 2274 : srandom(torture_seed);
679 :
680 2274 : if (!strcmp(ui_ops_name, "simple")) {
681 0 : ui_ops = &torture_simple_ui_ops;
682 2274 : } else if (!strcmp(ui_ops_name, "subunit")) {
683 2155 : ui_ops = &torture_subunit_ui_ops;
684 : } else {
685 0 : printf("Unknown output format '%s'\n", ui_ops_name);
686 0 : talloc_free(mem_ctx);
687 0 : exit(1);
688 : }
689 :
690 2274 : results = torture_results_init(mem_ctx, ui_ops);
691 :
692 2274 : torture = torture_context_init(s4_event_context_init(mem_ctx),
693 : results);
694 2274 : if (basedir != NULL) {
695 2252 : if (basedir[0] != '/') {
696 0 : fprintf(stderr, "Please specify an absolute path to --basedir\n");
697 0 : poptFreeContext(pc);
698 0 : talloc_free(mem_ctx);
699 0 : return 1;
700 : }
701 2252 : outputdir = talloc_asprintf(torture, "%s/smbtortureXXXXXX", basedir);
702 : } else {
703 22 : char *pwd = talloc_size(torture, PATH_MAX);
704 30 : if (!getcwd(pwd, PATH_MAX)) {
705 0 : fprintf(stderr, "Unable to determine current working directory\n");
706 0 : poptFreeContext(pc);
707 0 : talloc_free(mem_ctx);
708 0 : return 1;
709 : }
710 22 : outputdir = talloc_asprintf(torture, "%s/smbtortureXXXXXX", pwd);
711 : }
712 2274 : if (!outputdir) {
713 0 : fprintf(stderr, "Could not allocate per-run output dir\n");
714 0 : poptFreeContext(pc);
715 0 : talloc_free(mem_ctx);
716 0 : return 1;
717 : }
718 2274 : torture->outputdir = mkdtemp(outputdir);
719 2274 : if (!torture->outputdir) {
720 0 : perror("Failed to make temp output dir");
721 0 : poptFreeContext(pc);
722 0 : talloc_free(mem_ctx);
723 0 : return 1;
724 : }
725 :
726 2274 : torture->lp_ctx = lp_ctx;
727 :
728 2274 : gensec_init();
729 :
730 2274 : if (shell) {
731 : /* In shell mode, just ignore any remaining test names. */
732 0 : torture_shell(torture);
733 : } else {
734 :
735 : /* At this point, we should just have a target string,
736 : * followed by a series of test names. Unless we are in
737 : * shell mode, in which case we don't need anything more.
738 : */
739 :
740 2274 : if (argc_new < 3) {
741 0 : printf("You must specify a test to run, or 'ALL'\n");
742 0 : usage(pc);
743 0 : torture->results->returncode = 1;
744 2274 : } else if (!torture_parse_target(torture,
745 2155 : lp_ctx, argv_new[1])) {
746 : /* Take the target name or binding. */
747 0 : usage(pc);
748 0 : torture->results->returncode = 1;
749 : } else {
750 4556 : for (i=2;i<argc_new;i++) {
751 2282 : if (!torture_run_named_tests(torture, argv_new[i],
752 : (const char **)restricted)) {
753 411 : correct = false;
754 : }
755 : }
756 : }
757 : }
758 :
759 : /* Now delete the temp dir we created */
760 2274 : torture_deltree_outputdir(torture);
761 :
762 2274 : if (torture->results->returncode && correct) {
763 1865 : poptFreeContext(pc);
764 1865 : talloc_free(mem_ctx);
765 1865 : return(0);
766 : } else {
767 409 : poptFreeContext(pc);
768 409 : talloc_free(mem_ctx);
769 409 : return(1);
770 : }
771 : }
|