summaryrefslogtreecommitdiffstats
path: root/source4/torture/smbtorture.c
diff options
context:
space:
mode:
Diffstat (limited to 'source4/torture/smbtorture.c')
-rw-r--r--source4/torture/smbtorture.c770
1 files changed, 770 insertions, 0 deletions
diff --git a/source4/torture/smbtorture.c b/source4/torture/smbtorture.c
new file mode 100644
index 0000000..d9e90ea
--- /dev/null
+++ b/source4/torture/smbtorture.c
@@ -0,0 +1,770 @@
+/*
+ Unix SMB/CIFS implementation.
+ SMB torture tester
+ Copyright (C) Andrew Tridgell 1997-2003
+ Copyright (C) Jelmer Vernooij 2006-2008
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include "includes.h"
+#include "lib/cmdline/cmdline.h"
+#include "system/time.h"
+#include "system/wait.h"
+#include "system/filesys.h"
+#include "system/readline.h"
+#include "../libcli/smbreadline/smbreadline.h"
+#include "libcli/libcli.h"
+#include "lib/events/events.h"
+
+#include "torture/smbtorture.h"
+#include "librpc/rpc/dcerpc.h"
+#include "auth/gensec/gensec.h"
+#include "param/param.h"
+#include "lib/util/samba_modules.h"
+
+#ifdef HAVE_READLINE_HISTORY_H
+#include <readline/history.h>
+#endif
+
+static int use_fullname;
+
+static char *prefix_name(TALLOC_CTX *mem_ctx, const char *prefix, const char *name)
+{
+ if (prefix == NULL)
+ return talloc_strdup(mem_ctx, name);
+ else
+ return talloc_asprintf(mem_ctx, "%s.%s", prefix, name);
+}
+
+static void print_test_list(const struct torture_suite *suite, const char *prefix, const char *expr)
+{
+ struct torture_suite *o;
+ struct torture_tcase *t;
+ struct torture_test *p;
+
+ for (o = suite->children; o; o = o->next) {
+ char *name = prefix_name(NULL, prefix, o->name);
+ print_test_list(o, name, expr);
+ talloc_free(name);
+ }
+
+ for (t = suite->testcases; t; t = t->next) {
+ for (p = t->tests; p; p = p->next) {
+ char *name = talloc_asprintf(NULL, "%s.%s.%s", prefix, t->name, p->name);
+ if (strncmp(name, expr, strlen(expr)) == 0) {
+ printf("%s\n", name);
+ }
+ talloc_free(name);
+ }
+ }
+}
+
+static bool run_matching(struct torture_context *torture,
+ const char *prefix,
+ const char *expr,
+ const char **restricted,
+ struct torture_suite *suite,
+ bool *matched)
+{
+ bool ret = true;
+ struct torture_suite *o;
+ struct torture_tcase *t;
+ struct torture_test *p;
+
+ for (o = suite->children; o; o = o->next) {
+ char *name = NULL;
+ name = prefix_name(torture, prefix, o->name);
+ if (gen_fnmatch(expr, name) == 0) {
+ *matched = true;
+ reload_charcnv(torture->lp_ctx);
+ if (use_fullname == 1) {
+ torture_subunit_prefix_reset(torture, prefix);
+ }
+ ret &= torture_run_suite_restricted(torture, o, restricted);
+ if (use_fullname == 1) {
+ torture_subunit_prefix_reset(torture, NULL);
+ }
+ /*
+ * torture_run_suite_restricted() already implements
+ * recursion, so we're done with this child suite.
+ */
+ continue;
+ }
+ ret &= run_matching(torture, name, expr, restricted, o, matched);
+ }
+
+ for (t = suite->testcases; t; t = t->next) {
+ char *tname = prefix_name(torture, prefix, t->name);
+ if (gen_fnmatch(expr, tname) == 0) {
+ *matched = true;
+ reload_charcnv(torture->lp_ctx);
+ if (use_fullname == 1) {
+ torture_subunit_prefix_reset(torture, prefix);
+ }
+ ret &= torture_run_tcase_restricted(torture, t, restricted);
+ if (use_fullname == 1) {
+ torture_subunit_prefix_reset(torture, NULL);
+ }
+ /*
+ * torture_run_tcase_restricted() already implements
+ * recursion, so we're done for this tcase.
+ */
+ continue;
+ }
+ for (p = t->tests; p; p = p->next) {
+ char *pname = prefix_name(torture, tname, p->name);
+ if (gen_fnmatch(expr, pname) == 0) {
+ *matched = true;
+ reload_charcnv(torture->lp_ctx);
+ if (use_fullname == 1) {
+ torture_subunit_prefix_reset(torture,
+ tname);
+ }
+ ret &= torture_run_test_restricted(torture, t, p, restricted);
+ if (use_fullname == 1) {
+ torture_subunit_prefix_reset(torture,
+ NULL);
+ }
+ }
+ }
+ }
+
+ return ret;
+}
+
+#define MAX_COLS 80 /* FIXME: Determine this at run-time */
+
+/****************************************************************************
+run a specified test or "ALL"
+****************************************************************************/
+bool torture_run_named_tests(struct torture_context *torture, const char *name,
+ const char **restricted)
+{
+ bool ret = true;
+ bool matched = false;
+ struct torture_suite *o;
+
+ torture_ui_report_time(torture);
+
+ if (strequal(name, "ALL")) {
+ if (restricted != NULL) {
+ printf("--load-list and ALL are incompatible\n");
+ return false;
+ }
+ for (o = torture_root->children; o; o = o->next) {
+ ret &= torture_run_suite(torture, o);
+ }
+ return ret;
+ }
+
+ ret = run_matching(torture, NULL, name, restricted, torture_root, &matched);
+
+ if (!matched) {
+ printf("Unknown torture operation '%s'\n", name);
+ return false;
+ }
+
+ return ret;
+}
+
+bool torture_parse_target(TALLOC_CTX *ctx,
+ struct loadparm_context *lp_ctx,
+ const char *target)
+{
+ char *host = NULL, *share = NULL;
+ struct dcerpc_binding *binding_struct;
+ NTSTATUS status;
+
+ /* see if its a RPC transport specifier */
+ if (!smbcli_parse_unc(target, NULL, &host, &share)) {
+ const char *h;
+
+ status = dcerpc_parse_binding(ctx, target, &binding_struct);
+ if (NT_STATUS_IS_ERR(status)) {
+ d_printf("Invalid option: %s is not a valid torture target (share or binding string)\n\n", target);
+ return false;
+ }
+
+ h = dcerpc_binding_get_string_option(binding_struct, "host");
+ host = discard_const_p(char, h);
+ if (host != NULL) {
+ lpcfg_set_cmdline(lp_ctx, "torture:host", host);
+ }
+
+ if (lpcfg_parm_string(lp_ctx, NULL, "torture", "share") == NULL)
+ lpcfg_set_cmdline(lp_ctx, "torture:share", "IPC$");
+ lpcfg_set_cmdline(lp_ctx, "torture:binding", target);
+ } else {
+ lpcfg_set_cmdline(lp_ctx, "torture:host", host);
+ lpcfg_set_cmdline(lp_ctx, "torture:share", share);
+ lpcfg_set_cmdline(lp_ctx, "torture:binding", host);
+ }
+
+ return true;
+}
+
+static void parse_dns(struct loadparm_context *lp_ctx, const char *dns)
+{
+ char *userdn, *basedn, *secret;
+ char *p, *d;
+
+ /* retrieve the userdn */
+ p = strchr_m(dns, '#');
+ if (!p) {
+ lpcfg_set_cmdline(lp_ctx, "torture:ldap_userdn", "");
+ lpcfg_set_cmdline(lp_ctx, "torture:ldap_basedn", "");
+ lpcfg_set_cmdline(lp_ctx, "torture:ldap_secret", "");
+ return;
+ }
+ userdn = strndup(dns, p - dns);
+ lpcfg_set_cmdline(lp_ctx, "torture:ldap_userdn", userdn);
+
+ /* retrieve the basedn */
+ d = p + 1;
+ p = strchr_m(d, '#');
+ if (!p) {
+ lpcfg_set_cmdline(lp_ctx, "torture:ldap_basedn", "");
+ lpcfg_set_cmdline(lp_ctx, "torture:ldap_secret", "");
+ return;
+ }
+ basedn = strndup(d, p - d);
+ lpcfg_set_cmdline(lp_ctx, "torture:ldap_basedn", basedn);
+
+ /* retrieve the secret */
+ p = p + 1;
+ if (!p) {
+ lpcfg_set_cmdline(lp_ctx, "torture:ldap_secret", "");
+ return;
+ }
+ secret = strdup(p);
+ lpcfg_set_cmdline(lp_ctx, "torture:ldap_secret", secret);
+
+ printf ("%s - %s - %s\n", userdn, basedn, secret);
+
+}
+
+/* Print the full test list, formatted into separate labelled test
+ * groups.
+ */
+static void print_structured_testsuite_list(void)
+{
+ struct torture_suite *o;
+ struct torture_suite *s;
+ struct torture_tcase *t;
+ int i;
+
+ if (torture_root == NULL) {
+ printf("NO TESTS LOADED\n");
+ return;
+ }
+
+ for (o = torture_root->children; o; o = o->next) {
+ printf("\n%s (%s):\n ", o->description, o->name);
+
+ i = 0;
+ for (s = o->children; s; s = s->next) {
+ if (i + strlen(o->name) + strlen(s->name) >= (MAX_COLS - 3)) {
+ printf("\n ");
+ i = 0;
+ }
+ i+=printf("%s.%s ", o->name, s->name);
+ }
+
+ for (t = o->testcases; t; t = t->next) {
+ if (i + strlen(o->name) + strlen(t->name) >= (MAX_COLS - 3)) {
+ printf("\n ");
+ i = 0;
+ }
+ i+=printf("%s.%s ", o->name, t->name);
+ }
+
+ if (i) printf("\n");
+ }
+
+ printf("\nThe default test is ALL.\n");
+}
+
+static void print_testsuite_list(void)
+{
+ struct torture_suite *o;
+ struct torture_suite *s;
+ struct torture_tcase *t;
+
+ if (torture_root == NULL)
+ return;
+
+ for (o = torture_root->children; o; o = o->next) {
+ for (s = o->children; s; s = s->next) {
+ printf("%s.%s\n", o->name, s->name);
+ }
+
+ for (t = o->testcases; t; t = t->next) {
+ printf("%s.%s\n", o->name, t->name);
+ }
+ }
+}
+
+void torture_print_testsuites(bool structured)
+{
+ if (structured) {
+ print_structured_testsuite_list();
+ } else {
+ print_testsuite_list();
+ }
+}
+
+static void usage(poptContext pc)
+{
+ poptPrintUsage(pc, stdout, 0);
+ printf("\n");
+
+ printf("The binding format is:\n\n");
+
+ printf(" TRANSPORT:host[flags]\n\n");
+
+ printf(" where TRANSPORT is either ncacn_np for SMB, ncacn_ip_tcp for RPC/TCP\n");
+ printf(" or ncalrpc for local connections.\n\n");
+
+ printf(" 'host' is an IP or hostname or netbios name. If the binding string\n");
+ printf(" identifies the server side of an endpoint, 'host' may be an empty\n");
+ printf(" string.\n\n");
+
+ printf(" 'flags' can include a SMB pipe name if using the ncacn_np transport or\n");
+ printf(" a TCP port number if using the ncacn_ip_tcp transport, otherwise they\n");
+ printf(" will be auto-determined.\n\n");
+
+ printf(" other recognised flags are:\n\n");
+
+ printf(" sign : enable ntlmssp signing\n");
+ printf(" seal : enable ntlmssp sealing\n");
+ printf(" connect : enable rpc connect level auth (auth, but no sign or seal)\n");
+ printf(" validate: enable the NDR validator\n");
+ printf(" print: enable debugging of the packets\n");
+ printf(" bigendian: use bigendian RPC\n");
+ printf(" padcheck: check reply data for non-zero pad bytes\n\n");
+
+ printf(" For example, these all connect to the samr pipe:\n\n");
+
+ printf(" ncacn_np:myserver\n");
+ printf(" ncacn_np:myserver[samr]\n");
+ printf(" ncacn_np:myserver[\\pipe\\samr]\n");
+ printf(" ncacn_np:myserver[/pipe/samr]\n");
+ printf(" ncacn_np:myserver[samr,sign,print]\n");
+ printf(" ncacn_np:myserver[\\pipe\\samr,sign,seal,bigendian]\n");
+ printf(" ncacn_np:myserver[/pipe/samr,seal,validate]\n");
+ printf(" ncacn_np:\n");
+ printf(" ncacn_np:[/pipe/samr]\n\n");
+
+ printf(" ncacn_ip_tcp:myserver\n");
+ printf(" ncacn_ip_tcp:myserver[1024]\n");
+ printf(" ncacn_ip_tcp:myserver[1024,sign,seal]\n\n");
+
+ printf(" ncalrpc:\n\n");
+
+ printf("The UNC format is:\n\n");
+
+ printf(" //server/share\n\n");
+
+ printf("Tests are:");
+
+ print_structured_testsuite_list();
+
+}
+
+_NORETURN_ static void max_runtime_handler(int sig)
+{
+ DEBUG(0,("maximum runtime exceeded for smbtorture - terminating\n"));
+ exit(1);
+}
+
+/****************************************************************************
+ main program
+****************************************************************************/
+int main(int argc, const char *argv[])
+{
+ int opt, i;
+ bool correct = true;
+ int max_runtime=0;
+ int argc_new;
+ struct torture_context *torture;
+ struct torture_results *results;
+ const struct torture_ui_ops *ui_ops;
+ char **argv_new;
+ poptContext pc;
+ static const char *target = "other";
+ NTSTATUS status;
+ int shell = false;
+ static const char *ui_ops_name = "subunit";
+ const char *basedir = NULL;
+ char *outputdir;
+ const char *extra_module = NULL;
+ static int list_tests = 0, list_testsuites = 0;
+ int num_extra_users = 0;
+ const char **restricted = NULL;
+ int num_restricted = -1;
+ const char *load_list = NULL;
+ enum {OPT_LOADFILE=1000,OPT_UNCLIST,OPT_TIMELIMIT,OPT_DNS, OPT_LIST,
+ OPT_DANGEROUS,OPT_SMB_PORTS,OPT_ASYNC,OPT_NUMPROGS,
+ OPT_EXTRA_USER,};
+ TALLOC_CTX *mem_ctx = NULL;
+ struct loadparm_context *lp_ctx = NULL;
+ bool ok;
+
+ struct poptOption long_options[] = {
+ POPT_AUTOHELP
+ {"fullname", 0, POPT_ARG_NONE, &use_fullname, 0,
+ "use full name for the test", NULL },
+ {"format", 0, POPT_ARG_STRING, &ui_ops_name, 0, "Output format (one of: simple, subunit)", NULL },
+ {"smb-ports", 'p', POPT_ARG_STRING, NULL, OPT_SMB_PORTS, "SMB ports", NULL},
+ {"basedir", 0, POPT_ARG_STRING, &basedir, 0, "base directory", "BASEDIR" },
+ {"seed", 0, POPT_ARG_INT, &torture_seed, 0, "Seed to use for randomizer", NULL},
+ {"num-progs", 0, POPT_ARG_INT, NULL, OPT_NUMPROGS, "num progs", NULL},
+ {"num-ops", 0, POPT_ARG_INT, &torture_numops, 0, "num ops", NULL},
+ {"entries", 0, POPT_ARG_INT, &torture_entries, 0, "entries", NULL},
+ {"loadfile", 0, POPT_ARG_STRING, NULL, OPT_LOADFILE, "NBench load file to use", NULL},
+ {"list-suites", 0, POPT_ARG_NONE, &list_testsuites, 0, "List available testsuites and exit", NULL },
+ {"list", 0, POPT_ARG_NONE, &list_tests, 0, "List available tests in specified suites and exit", NULL },
+ {"unclist", 0, POPT_ARG_STRING, NULL, OPT_UNCLIST, "unclist", NULL},
+ {"timelimit", 't', POPT_ARG_INT, NULL, OPT_TIMELIMIT, "Set time limit (in seconds)", NULL},
+ {"failures", 'f', POPT_ARG_INT, &torture_failures, 0, "failures", NULL},
+ {"parse-dns", 'D', POPT_ARG_STRING, NULL, OPT_DNS, "parse-dns", NULL},
+ {"dangerous", 'X', POPT_ARG_NONE, NULL, OPT_DANGEROUS,
+ "run dangerous tests (eg. wiping out password database)", NULL},
+ {"load-module", 0, POPT_ARG_STRING, &extra_module, 0, "load tests from DSO file", "SOFILE"},
+ {"shell", 0, POPT_ARG_NONE, &shell, true, "Run shell", NULL},
+ {"target", 'T', POPT_ARG_STRING, &target, 0, "samba3|samba4|other", NULL},
+ {"async", 'a', POPT_ARG_NONE, NULL, OPT_ASYNC,
+ "run async tests", NULL},
+ {"num-async", 0, POPT_ARG_INT, &torture_numasync, 0,
+ "number of simultaneous async requests", NULL},
+ {"maximum-runtime", 0, POPT_ARG_INT, &max_runtime, 0,
+ "set maximum time for smbtorture to live", "seconds"},
+ {"extra-user", 0, POPT_ARG_STRING, NULL, OPT_EXTRA_USER,
+ "extra user credentials", NULL},
+ {"load-list", 0, POPT_ARG_STRING, &load_list, 0,
+ "load a test id list from a text file", NULL},
+ POPT_COMMON_SAMBA
+ POPT_COMMON_CONNECTION
+ POPT_COMMON_CREDENTIALS
+ POPT_COMMON_VERSION
+ POPT_LEGACY_S4
+ POPT_TABLEEND
+ };
+
+ setlinebuf(stdout);
+
+ mem_ctx = talloc_named_const(NULL, 0, "torture_ctx");
+ if (mem_ctx == NULL) {
+ printf("Unable to allocate torture_ctx\n");
+ exit(1);
+ }
+
+ printf("smbtorture %s\n", samba_version_string());
+
+ /* we are never interested in SIGPIPE */
+ BlockSignals(true, SIGPIPE);
+
+ ok = samba_cmdline_init(mem_ctx,
+ SAMBA_CMDLINE_CONFIG_CLIENT,
+ false /* require_smbconf */);
+ if (!ok) {
+ DBG_ERR("Unable to init cmdline parser\n");
+ TALLOC_FREE(mem_ctx);
+ exit(1);
+ }
+
+ pc = samba_popt_get_context(getprogname(),
+ argc,
+ argv,
+ long_options,
+ POPT_CONTEXT_KEEP_FIRST);
+ if (pc == NULL) {
+ DBG_ERR("Failed cmdline parser\n");
+ TALLOC_FREE(mem_ctx);
+ exit(1);
+ }
+
+ poptSetOtherOptionHelp(pc, "<binding>|<unc> TEST1 TEST2 ...");
+
+ lp_ctx = samba_cmdline_get_lp_ctx();
+
+ while((opt = poptGetNextOpt(pc)) != -1) {
+ switch (opt) {
+ case OPT_LOADFILE:
+ lpcfg_set_cmdline(lp_ctx, "torture:loadfile", poptGetOptArg(pc));
+ break;
+ case OPT_UNCLIST:
+ lpcfg_set_cmdline(lp_ctx, "torture:unclist", poptGetOptArg(pc));
+ break;
+ case OPT_TIMELIMIT:
+ lpcfg_set_cmdline(lp_ctx, "torture:timelimit", poptGetOptArg(pc));
+ break;
+ case OPT_NUMPROGS:
+ lpcfg_set_cmdline(lp_ctx, "torture:nprocs", poptGetOptArg(pc));
+ break;
+ case OPT_DNS:
+ parse_dns(lp_ctx, poptGetOptArg(pc));
+ break;
+ case OPT_DANGEROUS:
+ lpcfg_set_cmdline(lp_ctx, "torture:dangerous", "Yes");
+ break;
+ case OPT_ASYNC:
+ lpcfg_set_cmdline(lp_ctx, "torture:async", "Yes");
+ break;
+ case OPT_SMB_PORTS:
+ lpcfg_set_cmdline(lp_ctx, "smb ports", poptGetOptArg(pc));
+ break;
+ case OPT_EXTRA_USER:
+ {
+ char *option = talloc_asprintf(mem_ctx,
+ "torture:extra_user%u",
+ ++num_extra_users);
+ const char *value = poptGetOptArg(pc);
+ if (option == NULL) {
+ printf("talloc fail\n");
+ talloc_free(mem_ctx);
+ exit(1);
+ }
+ lpcfg_set_cmdline(lp_ctx, option, value);
+ talloc_free(option);
+ }
+ break;
+ default:
+ if (opt < 0) {
+ printf("Invalid command line option %s (%d)\n",
+ poptBadOption(pc, 0),
+ opt);
+ talloc_free(mem_ctx);
+ exit(1);
+ }
+ }
+ }
+
+ if (load_list != NULL) {
+ char **r;
+ r = file_lines_load(load_list, &num_restricted, 0, mem_ctx);
+ restricted = discard_const_p(const char *, r);
+ if (restricted == NULL) {
+ printf("Unable to read load list file '%s'\n", load_list);
+ talloc_free(mem_ctx);
+ exit(1);
+ }
+ }
+
+ if (strcmp(target, "samba3") == 0) {
+ lpcfg_set_cmdline(lp_ctx, "torture:samba3", "true");
+ lpcfg_set_cmdline(lp_ctx, "torture:resume_key_support", "false");
+ } else if (strcmp(target, "samba4") == 0) {
+ lpcfg_set_cmdline(lp_ctx, "torture:samba4", "true");
+ } else if (strcmp(target, "samba4-ntvfs") == 0) {
+ lpcfg_set_cmdline(lp_ctx, "torture:samba4", "true");
+ lpcfg_set_cmdline(lp_ctx, "torture:samba4-ntvfs", "true");
+ } else if (strcmp(target, "winxp") == 0) {
+ lpcfg_set_cmdline(lp_ctx, "torture:winxp", "true");
+ } else if (strcmp(target, "w2k3") == 0) {
+ lpcfg_set_cmdline(lp_ctx, "torture:w2k3", "true");
+ } else if (strcmp(target, "w2k8") == 0) {
+ lpcfg_set_cmdline(lp_ctx, "torture:w2k8", "true");
+ lpcfg_set_cmdline(lp_ctx,
+ "torture:invalid_lock_range_support", "false");
+ } else if (strcmp(target, "w2k12") == 0) {
+ lpcfg_set_cmdline(lp_ctx, "torture:w2k12", "true");
+ } else if (strcmp(target, "win7") == 0) {
+ lpcfg_set_cmdline(lp_ctx, "torture:win7", "true");
+ lpcfg_set_cmdline(lp_ctx, "torture:resume_key_support", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:rewind_support", "false");
+
+ /* RAW-SEARCH for fails for inexplicable reasons against win7 */
+ lpcfg_set_cmdline(lp_ctx, "torture:search_ea_support", "false");
+
+ lpcfg_set_cmdline(lp_ctx, "torture:hide_on_access_denied",
+ "true");
+ } else if (strcmp(target, "onefs") == 0) {
+ lpcfg_set_cmdline(lp_ctx, "torture:onefs", "true");
+ lpcfg_set_cmdline(lp_ctx, "torture:openx_deny_dos_support",
+ "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:range_not_locked_on_file_close", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:sacl_support", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:ea_support", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:smbexit_pdu_support",
+ "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:smblock_pdu_support",
+ "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:2_step_break_to_none",
+ "true");
+ lpcfg_set_cmdline(lp_ctx, "torture:deny_dos_support", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:deny_fcb_support", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:read_support", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:writeclose_support", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:resume_key_support", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:rewind_support", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:raw_search_search", "false");
+ lpcfg_set_cmdline(lp_ctx, "torture:search_ea_size", "false");
+ }
+
+ if (max_runtime) {
+ /* this will only work if nobody else uses alarm(),
+ which means it won't work for some tests, but we
+ can't use the event context method we use for smbd
+ as so many tests create their own event
+ context. This will at least catch most cases. */
+ signal(SIGALRM, max_runtime_handler);
+ alarm(max_runtime);
+ }
+
+ if (extra_module != NULL) {
+ init_module_fn fn = load_module(poptGetOptArg(pc), false, NULL);
+
+ if (fn == NULL)
+ d_printf("Unable to load module from %s\n", poptGetOptArg(pc));
+ else {
+ status = fn(mem_ctx);
+ if (NT_STATUS_IS_ERR(status)) {
+ d_printf("Error initializing module %s: %s\n",
+ poptGetOptArg(pc), nt_errstr(status));
+ }
+ }
+ } else {
+ torture_init(mem_ctx);
+ }
+
+ if (list_testsuites) {
+ print_testsuite_list();
+ poptFreeContext(pc);
+ talloc_free(mem_ctx);
+ return 0;
+ }
+
+ argv_new = discard_const_p(char *, poptGetArgs(pc));
+
+ argc_new = argc;
+ for (i=0; i<argc; i++) {
+ if (argv_new[i] == NULL) {
+ argc_new = i;
+ break;
+ }
+ }
+
+ if (list_tests) {
+ if (argc_new == 1) {
+ print_test_list(torture_root, NULL, "");
+ } else {
+ for (i=1;i<argc_new;i++) {
+ print_test_list(torture_root, NULL, argv_new[i]);
+ }
+ }
+ poptFreeContext(pc);
+ talloc_free(mem_ctx);
+ return 0;
+ }
+
+ if (torture_seed == 0) {
+ torture_seed = time(NULL);
+ }
+ printf("Using seed %d\n", torture_seed);
+ srandom(torture_seed);
+
+ if (!strcmp(ui_ops_name, "simple")) {
+ ui_ops = &torture_simple_ui_ops;
+ } else if (!strcmp(ui_ops_name, "subunit")) {
+ ui_ops = &torture_subunit_ui_ops;
+ } else {
+ printf("Unknown output format '%s'\n", ui_ops_name);
+ talloc_free(mem_ctx);
+ exit(1);
+ }
+
+ results = torture_results_init(mem_ctx, ui_ops);
+
+ torture = torture_context_init(s4_event_context_init(mem_ctx),
+ results);
+ if (basedir != NULL) {
+ if (basedir[0] != '/') {
+ fprintf(stderr, "Please specify an absolute path to --basedir\n");
+ poptFreeContext(pc);
+ talloc_free(mem_ctx);
+ return 1;
+ }
+ outputdir = talloc_asprintf(torture, "%s/smbtortureXXXXXX", basedir);
+ } else {
+ char *pwd = talloc_size(torture, PATH_MAX);
+ if (!getcwd(pwd, PATH_MAX)) {
+ fprintf(stderr, "Unable to determine current working directory\n");
+ poptFreeContext(pc);
+ talloc_free(mem_ctx);
+ return 1;
+ }
+ outputdir = talloc_asprintf(torture, "%s/smbtortureXXXXXX", pwd);
+ }
+ if (!outputdir) {
+ fprintf(stderr, "Could not allocate per-run output dir\n");
+ poptFreeContext(pc);
+ talloc_free(mem_ctx);
+ return 1;
+ }
+ torture->outputdir = mkdtemp(outputdir);
+ if (!torture->outputdir) {
+ perror("Failed to make temp output dir");
+ poptFreeContext(pc);
+ talloc_free(mem_ctx);
+ return 1;
+ }
+
+ torture->lp_ctx = lp_ctx;
+
+ gensec_init();
+
+ if (shell) {
+ /* In shell mode, just ignore any remaining test names. */
+ torture_shell(torture);
+ } else {
+
+ /* At this point, we should just have a target string,
+ * followed by a series of test names. Unless we are in
+ * shell mode, in which case we don't need anything more.
+ */
+
+ if (argc_new < 3) {
+ printf("You must specify a test to run, or 'ALL'\n");
+ usage(pc);
+ torture->results->returncode = 1;
+ } else if (!torture_parse_target(torture,
+ lp_ctx, argv_new[1])) {
+ /* Take the target name or binding. */
+ usage(pc);
+ torture->results->returncode = 1;
+ } else {
+ for (i=2;i<argc_new;i++) {
+ if (!torture_run_named_tests(torture, argv_new[i],
+ (const char **)restricted)) {
+ correct = false;
+ }
+ }
+ }
+ }
+
+ /* Now delete the temp dir we created */
+ torture_deltree_outputdir(torture);
+
+ if (torture->results->returncode && correct) {
+ poptFreeContext(pc);
+ talloc_free(mem_ctx);
+ return(0);
+ } else {
+ poptFreeContext(pc);
+ talloc_free(mem_ctx);
+ return(1);
+ }
+}