Fix the posixtimedlock test
[ira/wip.git] / source4 / torture / raw / samba3misc.c
index 59b9adfb1bded0f5d09d70dd372ed88f67d2a895..4ec8acc7c27de59e64a25f6f9acc248f08f13fbc 100644 (file)
 #include "includes.h"
 #include "torture/torture.h"
 #include "libcli/raw/libcliraw.h"
+#include "libcli/raw/raw_proto.h"
 #include "system/time.h"
 #include "system/filesys.h"
 #include "libcli/libcli.h"
 #include "torture/util.h"
+#include "lib/events/events.h"
+#include "param/param.h"
 
 #define CHECK_STATUS(status, correct) do { \
        if (!NT_STATUS_EQUAL(status, correct)) { \
                printf("(%s) Incorrect status %s - should be %s\n", \
                       __location__, nt_errstr(status), nt_errstr(correct)); \
-               ret = False; \
+               ret = false; \
        } \
 } while (0)
 
-BOOL torture_samba3_checkfsp(struct torture_context *torture)
+bool torture_samba3_checkfsp(struct torture_context *torture)
 {
        struct smbcli_state *cli;
        const char *fname = "test.txt";
        const char *dirname = "testdir";
        int fnum;
        NTSTATUS status;
-       BOOL ret = True;
+       bool ret = true;
        TALLOC_CTX *mem_ctx;
        ssize_t nread;
        char buf[16];
@@ -48,14 +51,14 @@ BOOL torture_samba3_checkfsp(struct torture_context *torture)
 
        if ((mem_ctx = talloc_init("torture_samba3_checkfsp")) == NULL) {
                d_printf("talloc_init failed\n");
-               return False;
+               return false;
        }
 
        if (!torture_open_connection_share(
-                   torture, &cli, torture_setting_string(torture, "host", NULL),
-                   torture_setting_string(torture, "share", NULL), NULL)) {
+                   torture, &cli, torture, torture_setting_string(torture, "host", NULL),
+                   torture_setting_string(torture, "share", NULL), torture->ev)) {
                d_printf("torture_open_connection_share failed\n");
-               ret = False;
+               ret = false;
                goto done;
        }
 
@@ -78,7 +81,7 @@ BOOL torture_samba3_checkfsp(struct torture_context *torture)
        status = smbcli_mkdir(cli->tree, dirname);
        if (!NT_STATUS_IS_OK(status)) {
                d_printf("smbcli_mkdir failed: %s\n", nt_errstr(status));
-               ret = False;
+               ret = false;
                goto done;
        }
 
@@ -101,7 +104,7 @@ BOOL torture_samba3_checkfsp(struct torture_context *torture)
                if (!NT_STATUS_IS_OK(status)) {
                        d_printf("smb_open on the directory failed: %s\n",
                                 nt_errstr(status));
-                       ret = False;
+                       ret = false;
                        goto done;
                }
                fnum = io.ntcreatex.out.file.fnum;
@@ -113,7 +116,7 @@ BOOL torture_samba3_checkfsp(struct torture_context *torture)
        if (nread >= 0) {
                d_printf("smbcli_read on a directory succeeded, expected "
                         "failure\n");
-               ret = False;
+               ret = false;
        }
 
        CHECK_STATUS(smbcli_nt_error(cli->tree),
@@ -125,7 +128,7 @@ BOOL torture_samba3_checkfsp(struct torture_context *torture)
        if (nread >= 0) {
                d_printf("smbcli_read on a directory succeeded, expected "
                         "failure\n");
-               ret = False;
+               ret = false;
        }
 
        CHECK_STATUS(smbcli_nt_error(tree2), NT_STATUS_INVALID_HANDLE);
@@ -138,7 +141,7 @@ BOOL torture_samba3_checkfsp(struct torture_context *torture)
        if (fnum == -1) {
                d_printf("Failed to create %s - %s\n", fname,
                         smbcli_errstr(cli->tree));
-               ret = False;
+               ret = false;
                goto done;
        }
 
@@ -183,7 +186,9 @@ static NTSTATUS raw_smbcli_open(struct smbcli_tree *tree, const char *fname, int
                 accessmode |= OPENX_MODE_ACCESS_RDWR;
         } else if ((flags & O_ACCMODE) == O_WRONLY) {
                 accessmode |= OPENX_MODE_ACCESS_WRITE;
-        }
+        } else if ((flags & O_ACCMODE) == O_RDONLY) {
+                accessmode |= OPENX_MODE_ACCESS_READ;
+       }
 
 #if defined(O_SYNC)
         if ((flags & O_SYNC) == O_SYNC) {
@@ -216,45 +221,151 @@ static NTSTATUS raw_smbcli_open(struct smbcli_tree *tree, const char *fname, int
         return status;
 }
 
-BOOL torture_samba3_badpath(struct torture_context *torture)
+static NTSTATUS raw_smbcli_t2open(struct smbcli_tree *tree, const char *fname, int flags, int share_mode, int *fnum)
+{
+        union smb_open io;
+        uint_t openfn=0;
+        uint_t accessmode=0;
+        TALLOC_CTX *mem_ctx;
+        NTSTATUS status;
+
+        mem_ctx = talloc_init("raw_t2open");
+        if (!mem_ctx) return NT_STATUS_NO_MEMORY;
+
+        if (flags & O_CREAT) {
+                openfn |= OPENX_OPEN_FUNC_CREATE;
+        }
+        if (!(flags & O_EXCL)) {
+                if (flags & O_TRUNC) {
+                        openfn |= OPENX_OPEN_FUNC_TRUNC;
+                } else {
+                        openfn |= OPENX_OPEN_FUNC_OPEN;
+                }
+        }
+
+        accessmode = (share_mode<<OPENX_MODE_DENY_SHIFT);
+
+        if ((flags & O_ACCMODE) == O_RDWR) {
+                accessmode |= OPENX_MODE_ACCESS_RDWR;
+        } else if ((flags & O_ACCMODE) == O_WRONLY) {
+                accessmode |= OPENX_MODE_ACCESS_WRITE;
+        } else if ((flags & O_ACCMODE) == O_RDONLY) {
+                accessmode |= OPENX_MODE_ACCESS_READ;
+       }
+
+#if defined(O_SYNC)
+        if ((flags & O_SYNC) == O_SYNC) {
+                accessmode |= OPENX_MODE_WRITE_THRU;
+        }
+#endif
+
+        if (share_mode == DENY_FCB) {
+                accessmode = OPENX_MODE_ACCESS_FCB | OPENX_MODE_DENY_FCB;
+        }
+
+       memset(&io, '\0', sizeof(io));
+        io.t2open.level = RAW_OPEN_T2OPEN;
+        io.t2open.in.flags = 0;
+        io.t2open.in.open_mode = accessmode;
+        io.t2open.in.search_attrs = FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN;
+        io.t2open.in.file_attrs = 0;
+        io.t2open.in.write_time = 0;
+        io.t2open.in.open_func = openfn;
+        io.t2open.in.size = 0;
+        io.t2open.in.timeout = 0;
+        io.t2open.in.fname = fname;
+
+        io.t2open.in.num_eas = 1;
+       io.t2open.in.eas = talloc_array(mem_ctx, struct ea_struct, io.t2open.in.num_eas);
+       io.t2open.in.eas[0].flags = 0;
+       io.t2open.in.eas[0].name.s = ".CLASSINFO";
+       io.t2open.in.eas[0].value = data_blob_talloc(mem_ctx, "first value", 11);
+
+        status = smb_raw_open(tree, mem_ctx, &io);
+        talloc_free(mem_ctx);
+
+        if (fnum && NT_STATUS_IS_OK(status)) {
+                *fnum = io.openx.out.file.fnum;
+        }
+
+        return status;
+}
+
+static NTSTATUS raw_smbcli_ntcreate(struct smbcli_tree *tree, const char *fname, int *fnum)
+{
+        union smb_open io;
+        TALLOC_CTX *mem_ctx;
+        NTSTATUS status;
+
+        mem_ctx = talloc_init("raw_t2open");
+        if (!mem_ctx) return NT_STATUS_NO_MEMORY;
+
+       memset(&io, '\0', sizeof(io));
+        io.generic.level = RAW_OPEN_NTCREATEX;
+       io.ntcreatex.in.flags = NTCREATEX_FLAGS_EXTENDED;
+       io.ntcreatex.in.root_fid = 0;
+       io.ntcreatex.in.access_mask = SEC_RIGHTS_FILE_ALL;
+       io.ntcreatex.in.alloc_size = 0;
+       io.ntcreatex.in.file_attr = FILE_ATTRIBUTE_NORMAL;
+       io.ntcreatex.in.share_access = NTCREATEX_SHARE_ACCESS_READ | NTCREATEX_SHARE_ACCESS_WRITE;
+       io.ntcreatex.in.open_disposition = NTCREATEX_DISP_CREATE;
+       io.ntcreatex.in.create_options = 0;
+       io.ntcreatex.in.impersonation = NTCREATEX_IMPERSONATION_ANONYMOUS;
+       io.ntcreatex.in.security_flags = 0;
+       io.ntcreatex.in.fname = fname;
+
+        status = smb_raw_open(tree, mem_ctx, &io);
+        talloc_free(mem_ctx);
+
+        if (fnum && NT_STATUS_IS_OK(status)) {
+                *fnum = io.openx.out.file.fnum;
+        }
+
+        return status;
+}
+
+
+bool torture_samba3_badpath(struct torture_context *torture)
 {
        struct smbcli_state *cli_nt;
        struct smbcli_state *cli_dos;
        const char *fname = "test.txt";
+       const char *fname1 = "test1.txt";
        const char *dirname = "testdir";
        char *fpath;
+       char *fpath1;
        int fnum;
        NTSTATUS status;
-       BOOL ret = True;
+       bool ret = true;
        TALLOC_CTX *mem_ctx;
-       BOOL nt_status_support;
+       bool nt_status_support;
 
        if (!(mem_ctx = talloc_init("torture_samba3_badpath"))) {
                d_printf("talloc_init failed\n");
-               return False;
+               return false;
        }
 
-       nt_status_support = lp_nt_status_support();
+       nt_status_support = lp_nt_status_support(torture->lp_ctx);
 
-       if (!lp_set_cmdline("nt status support", "yes")) {
+       if (!lp_set_cmdline(torture->lp_ctx, "nt status support", "yes")) {
                printf("Could not set 'nt status support = yes'\n");
                goto fail;
        }
 
-       if (!torture_open_connection(&cli_nt, 0)) {
+       if (!torture_open_connection(&cli_nt, torture, 0)) {
                goto fail;
        }
 
-       if (!lp_set_cmdline("nt status support", "no")) {
+       if (!lp_set_cmdline(torture->lp_ctx, "nt status support", "no")) {
                printf("Could not set 'nt status support = yes'\n");
                goto fail;
        }
 
-       if (!torture_open_connection(&cli_dos, 1)) {
+       if (!torture_open_connection(&cli_dos, torture, 1)) {
                goto fail;
        }
 
-       if (!lp_set_cmdline("nt status support",
+       if (!lp_set_cmdline(torture->lp_ctx, "nt status support",
                            nt_status_support ? "yes":"no")) {
                printf("Could not reset 'nt status support = yes'");
                goto fail;
@@ -265,7 +376,7 @@ BOOL torture_samba3_badpath(struct torture_context *torture)
        status = smbcli_mkdir(cli_nt->tree, dirname);
        if (!NT_STATUS_IS_OK(status)) {
                d_printf("smbcli_mkdir failed: %s\n", nt_errstr(status));
-               ret = False;
+               ret = false;
                goto done;
        }
 
@@ -300,6 +411,17 @@ BOOL torture_samba3_badpath(struct torture_context *torture)
        }
        smbcli_close(cli_nt->tree, fnum);
 
+       if (!(fpath1 = talloc_asprintf(mem_ctx, "%s\\%s", dirname, fname1))) {
+               goto fail;
+       }
+       fnum = smbcli_open(cli_nt->tree, fpath1, O_RDWR | O_CREAT, DENY_NONE);
+       if (fnum == -1) {
+               d_printf("Could not create file %s: %s\n", fpath1,
+                        smbcli_errstr(cli_nt->tree));
+               goto fail;
+       }
+       smbcli_close(cli_nt->tree, fnum);
+
        /*
         * Do a whole bunch of error code checks on chkpath
         */
@@ -411,10 +533,61 @@ BOOL torture_samba3_badpath(struct torture_context *torture)
        status = raw_smbcli_open(cli_dos->tree, "<\\bla", O_RDONLY, DENY_NONE, NULL);
        CHECK_STATUS(status, NT_STATUS_DOS(ERRDOS, ERRinvalidname));
 
+       /* Let's test EEXIST error code mapping. */
+       status = raw_smbcli_open(cli_nt->tree, fpath, O_RDONLY | O_CREAT| O_EXCL, DENY_NONE, NULL);
+       CHECK_STATUS(status, NT_STATUS_OBJECT_NAME_COLLISION);
+       status = raw_smbcli_open(cli_dos->tree, fpath, O_RDONLY | O_CREAT| O_EXCL, DENY_NONE, NULL);
+       CHECK_STATUS(status, NT_STATUS_DOS(ERRDOS,ERRfilexists));
+
+       status = raw_smbcli_t2open(cli_nt->tree, fpath, O_RDONLY | O_CREAT| O_EXCL, DENY_NONE, NULL);
+       if (!NT_STATUS_EQUAL(status, NT_STATUS_EAS_NOT_SUPPORTED)
+           || !torture_setting_bool(torture, "samba3", false)) {
+               /* Against samba3, treat EAS_NOT_SUPPORTED as acceptable */
+               CHECK_STATUS(status, NT_STATUS_OBJECT_NAME_COLLISION);
+       }
+       status = raw_smbcli_t2open(cli_dos->tree, fpath, O_RDONLY | O_CREAT| O_EXCL, DENY_NONE, NULL);
+       if (!NT_STATUS_EQUAL(status, NT_STATUS_DOS(ERRDOS,ERReasnotsupported))
+           || !torture_setting_bool(torture, "samba3", false)) {
+               /* Against samba3, treat EAS_NOT_SUPPORTED as acceptable */
+               CHECK_STATUS(status, NT_STATUS_DOS(ERRDOS,ERRfilexists));
+       }
+
+       status = raw_smbcli_ntcreate(cli_nt->tree, fpath, NULL);
+       CHECK_STATUS(status, NT_STATUS_OBJECT_NAME_COLLISION);
+       status = raw_smbcli_ntcreate(cli_dos->tree, fpath, NULL);
+       CHECK_STATUS(status, NT_STATUS_DOS(ERRDOS,ERRfilexists));
+
+       /* Try the rename test. */
+       {
+               union smb_rename io;
+               memset(&io, '\0', sizeof(io));
+               io.rename.in.pattern1 = fpath1;
+               io.rename.in.pattern2 = fpath;
+
+               /* Try with SMBmv rename. */
+               status = smb_raw_rename(cli_nt->tree, &io);
+               CHECK_STATUS(status, NT_STATUS_OBJECT_NAME_COLLISION);
+               status = smb_raw_rename(cli_dos->tree, &io);
+               CHECK_STATUS(status, NT_STATUS_DOS(ERRDOS,ERRrename));
+
+               /* Try with NT rename. */
+               io.generic.level = RAW_RENAME_NTRENAME;
+               io.ntrename.in.old_name = fpath1;
+               io.ntrename.in.new_name = fpath;
+               io.ntrename.in.attrib = 0;
+               io.ntrename.in.cluster_size = 0;
+               io.ntrename.in.flags = RENAME_FLAG_RENAME;
+
+               status = smb_raw_rename(cli_nt->tree, &io);
+               CHECK_STATUS(status, NT_STATUS_OBJECT_NAME_COLLISION);
+               status = smb_raw_rename(cli_dos->tree, &io);
+               CHECK_STATUS(status, NT_STATUS_DOS(ERRDOS,ERRrename));
+       }
+
        goto done;
 
  fail:
-       ret = False;
+       ret = false;
 
  done:
        if (cli_nt != NULL) {
@@ -428,3 +601,419 @@ BOOL torture_samba3_badpath(struct torture_context *torture)
 
        return ret;
 }
+
+static void count_fn(struct clilist_file_info *info, const char *name,
+                    void *private_data)
+{
+       int *counter = (int *)private_data;
+       *counter += 1;
+}
+
+bool torture_samba3_caseinsensitive(struct torture_context *torture)
+{
+       struct smbcli_state *cli;
+       TALLOC_CTX *mem_ctx;
+       NTSTATUS status;
+       const char *dirname = "insensitive";
+       const char *ucase_dirname = "InSeNsItIvE";
+       const char *fname = "foo";
+       char *fpath;
+       int fnum;
+       int counter = 0;
+       bool ret = true;
+
+       if (!(mem_ctx = talloc_init("torture_samba3_caseinsensitive"))) {
+               d_printf("talloc_init failed\n");
+               return false;
+       }
+
+       if (!torture_open_connection(&cli, torture, 0)) {
+               goto done;
+       }
+
+       smbcli_deltree(cli->tree, dirname);
+
+       status = smbcli_mkdir(cli->tree, dirname);
+       if (!NT_STATUS_IS_OK(status)) {
+               d_printf("smbcli_mkdir failed: %s\n", nt_errstr(status));
+               goto done;
+       }
+
+       if (!(fpath = talloc_asprintf(mem_ctx, "%s\\%s", dirname, fname))) {
+               goto done;
+       }
+       fnum = smbcli_open(cli->tree, fpath, O_RDWR | O_CREAT, DENY_NONE);
+       if (fnum == -1) {
+               d_printf("Could not create file %s: %s\n", fpath,
+                        smbcli_errstr(cli->tree));
+               goto done;
+       }
+       smbcli_close(cli->tree, fnum);
+
+       smbcli_list(cli->tree, talloc_asprintf(
+                           mem_ctx, "%s\\*", ucase_dirname),
+                   FILE_ATTRIBUTE_DIRECTORY|FILE_ATTRIBUTE_HIDDEN
+                   |FILE_ATTRIBUTE_SYSTEM,
+                   count_fn, (void *)&counter);
+
+       if (counter == 3) {
+               ret = true;
+       }
+       else {
+               d_fprintf(stderr, "expected 3 entries, got %d\n", counter);
+               ret = false;
+       }
+
+ done:
+       talloc_free(mem_ctx);
+       return ret;
+}
+
+static void close_locked_file(struct tevent_context *ev,
+                             struct tevent_timer *te,
+                             struct timeval now,
+                             void *private_data)
+{
+       int *pfd = (int *)private_data;
+
+       TALLOC_FREE(te);
+
+       if (*pfd != -1) {
+               close(*pfd);
+               *pfd = -1;
+       }
+}
+
+struct lock_result_state {
+       NTSTATUS status;
+       bool done;
+};
+
+static void receive_lock_result(struct smbcli_request *req)
+{
+       struct lock_result_state *state =
+               (struct lock_result_state *)req->async.private_data;
+
+       state->status = smbcli_request_simple_recv(req);
+       state->done = true;
+}
+
+/*
+ * Check that Samba3 correctly deals with conflicting posix byte range locks
+ * on an underlying file
+ *
+ * Note: This test depends on "posix locking = yes".
+ * Note: To run this test, use "--option=torture:localdir=<LOCALDIR>"
+ */
+
+bool torture_samba3_posixtimedlock(struct torture_context *tctx)
+{
+       struct smbcli_state *cli;
+       NTSTATUS status;
+       bool ret = true;
+       const char *dirname = "posixlock";
+       const char *fname = "locked";
+       const char *fpath;
+       const char *localdir;
+       const char *localname;
+       int fnum = -1;
+
+       int fd = -1;
+       struct flock posix_lock;
+
+       union smb_lock io;
+       struct smb_lock_entry lock_entry;
+       struct smbcli_request *req;
+       struct lock_result_state lock_result;
+
+       struct tevent_timer *te;
+
+       if (!torture_open_connection(&cli, tctx, 0)) {
+               ret = false;
+               goto done;
+       }
+
+       smbcli_deltree(cli->tree, dirname);
+
+       status = smbcli_mkdir(cli->tree, dirname);
+       if (!NT_STATUS_IS_OK(status)) {
+               torture_warning(tctx, "smbcli_mkdir failed: %s\n",
+                               nt_errstr(status));
+               ret = false;
+               goto done;
+       }
+
+       if (!(fpath = talloc_asprintf(tctx, "%s\\%s", dirname, fname))) {
+               torture_warning(tctx, "talloc failed\n");
+               ret = false;
+               goto done;
+       }
+       fnum = smbcli_open(cli->tree, fpath, O_RDWR | O_CREAT, DENY_NONE);
+       if (fnum == -1) {
+               torture_warning(tctx, "Could not create file %s: %s\n", fpath,
+                               smbcli_errstr(cli->tree));
+               ret = false;
+               goto done;
+       }
+
+       if (!(localdir = torture_setting_string(tctx, "localdir", NULL))) {
+               torture_warning(tctx, "Need 'localdir' setting\n");
+               ret = false;
+               goto done;
+       }
+
+       if (!(localname = talloc_asprintf(tctx, "%s/%s/%s", localdir, dirname,
+                                         fname))) {
+               torture_warning(tctx, "talloc failed\n");
+               ret = false;
+               goto done;
+       }
+
+       /*
+        * Lock a byte range from posix
+        */
+
+       fd = open(localname, O_RDWR);
+       if (fd == -1) {
+               torture_warning(tctx, "open(%s) failed: %s\n",
+                               localname, strerror(errno));
+               goto done;
+       }
+
+       posix_lock.l_type = F_WRLCK;
+       posix_lock.l_whence = SEEK_SET;
+       posix_lock.l_start = 0;
+       posix_lock.l_len = 1;
+
+       if (fcntl(fd, F_SETLK, &posix_lock) == -1) {
+               torture_warning(tctx, "fcntl failed: %s\n", strerror(errno));
+               ret = false;
+               goto done;
+       }
+
+       /*
+        * Try a cifs brlock without timeout to see if posix locking = yes
+        */
+
+       io.lockx.in.ulock_cnt = 0;
+       io.lockx.in.lock_cnt = 1;
+
+       lock_entry.count = 1;
+       lock_entry.offset = 0;
+       lock_entry.pid = cli->tree->session->pid;
+
+       io.lockx.level = RAW_LOCK_LOCKX;
+       io.lockx.in.mode = LOCKING_ANDX_LARGE_FILES;
+       io.lockx.in.timeout = 0;
+       io.lockx.in.locks = &lock_entry;
+       io.lockx.in.file.fnum = fnum;
+
+       status = smb_raw_lock(cli->tree, &io);
+
+       ret = true;
+       CHECK_STATUS(status, NT_STATUS_FILE_LOCK_CONFLICT);
+
+       if (!ret) {
+               goto done;
+       }
+
+       /*
+        * Now fire off a timed brlock, unlock the posix lock and see if the
+        * timed lock gets through.
+        */
+
+       io.lockx.in.timeout = 5000;
+
+       req = smb_raw_lock_send(cli->tree, &io);
+       if (req == NULL) {
+               torture_warning(tctx, "smb_raw_lock_send failed\n");
+               ret = false;
+               goto done;
+       }
+
+       lock_result.done = false;
+       req->async.fn = receive_lock_result;
+       req->async.private_data = &lock_result;
+
+       te = tevent_add_timer(req->transport->socket->event.ctx,
+                             tctx, timeval_current_ofs(1, 0),
+                             close_locked_file, &fd);
+       if (te == NULL) {
+               torture_warning(tctx, "tevent_add_timer failed\n");
+               ret = false;
+               goto done;
+       }
+
+       while ((fd != -1) || (!lock_result.done)) {
+               if (tevent_loop_once(req->transport->socket->event.ctx)
+                   == -1) {
+                       torture_warning(tctx, "tevent_loop_once failed: %s\n",
+                                       strerror(errno));
+                       ret = false;
+                       goto done;
+               }
+       }
+
+       CHECK_STATUS(lock_result.status, NT_STATUS_OK);
+
+ done:
+       if (fnum != -1) {
+               smbcli_close(cli->tree, fnum);
+       }
+       if (fd != -1) {
+               close(fd);
+       }
+       smbcli_deltree(cli->tree, dirname);
+       return ret;
+}
+
+bool torture_samba3_rootdirfid(struct torture_context *tctx)
+{
+       struct smbcli_state *cli;
+       NTSTATUS status;
+       uint16_t dnum;
+       union smb_open io;
+       const char *fname = "testfile";
+       bool ret = false;
+
+       if (!torture_open_connection(&cli, tctx, 0)) {
+               ret = false;
+               goto done;
+       }
+
+       smbcli_unlink(cli->tree, fname);
+
+       ZERO_STRUCT(io);
+       io.generic.level = RAW_OPEN_NTCREATEX;
+       io.ntcreatex.in.flags = NTCREATEX_FLAGS_EXTENDED;
+       io.ntcreatex.in.root_fid = 0;
+       io.ntcreatex.in.security_flags = 0;
+       io.ntcreatex.in.access_mask =
+               SEC_STD_SYNCHRONIZE | SEC_FILE_EXECUTE;
+       io.ntcreatex.in.alloc_size = 0;
+       io.ntcreatex.in.file_attr = FILE_ATTRIBUTE_DIRECTORY;
+       io.ntcreatex.in.share_access =
+               NTCREATEX_SHARE_ACCESS_READ
+               | NTCREATEX_SHARE_ACCESS_READ;
+       io.ntcreatex.in.open_disposition = NTCREATEX_DISP_OPEN;
+       io.ntcreatex.in.create_options = 0;
+       io.ntcreatex.in.fname = "\\";
+       status = smb_raw_open(cli->tree, tctx, &io);
+       if (!NT_STATUS_IS_OK(status)) {
+               d_printf("smb_open on the directory failed: %s\n",
+                        nt_errstr(status));
+               ret = false;
+               goto done;
+       }
+       dnum = io.ntcreatex.out.file.fnum;
+
+       io.ntcreatex.in.flags =
+               NTCREATEX_FLAGS_REQUEST_OPLOCK
+               | NTCREATEX_FLAGS_REQUEST_BATCH_OPLOCK;
+       io.ntcreatex.in.root_fid = dnum;
+       io.ntcreatex.in.security_flags = 0;
+       io.ntcreatex.in.open_disposition = NTCREATEX_DISP_OVERWRITE_IF;
+       io.ntcreatex.in.access_mask = SEC_RIGHTS_FILE_ALL;
+       io.ntcreatex.in.alloc_size = 0;
+       io.ntcreatex.in.file_attr = FILE_ATTRIBUTE_NORMAL;
+       io.ntcreatex.in.share_access = NTCREATEX_SHARE_ACCESS_NONE;
+       io.ntcreatex.in.create_options = 0;
+       io.ntcreatex.in.fname = fname;
+
+       status = smb_raw_open(cli->tree, tctx, &io);
+       if (!NT_STATUS_IS_OK(status)) {
+               d_printf("smb_open on the file %s failed: %s\n",
+                        fname, nt_errstr(status));
+               ret = false;
+               goto done;
+       }
+
+       smbcli_close(cli->tree, io.ntcreatex.out.file.fnum);
+       smbcli_close(cli->tree, dnum);
+       smbcli_unlink(cli->tree, fname);
+
+       ret = true;
+ done:
+       return ret;
+}
+
+bool torture_samba3_oplock_logoff(struct torture_context *tctx)
+{
+       struct smbcli_state *cli;
+       NTSTATUS status;
+       uint16_t fnum1;
+       union smb_open io;
+       const char *fname = "testfile";
+       bool ret = false;
+       struct smbcli_request *req;
+       struct smb_echo echo_req;
+
+       if (!torture_open_connection(&cli, tctx, 0)) {
+               ret = false;
+               goto done;
+       }
+
+       smbcli_unlink(cli->tree, fname);
+
+       ZERO_STRUCT(io);
+       io.generic.level = RAW_OPEN_NTCREATEX;
+       io.ntcreatex.in.flags = NTCREATEX_FLAGS_EXTENDED;
+       io.ntcreatex.in.root_fid = 0;
+       io.ntcreatex.in.security_flags = 0;
+       io.ntcreatex.in.access_mask =
+               SEC_STD_SYNCHRONIZE | SEC_FILE_EXECUTE;
+       io.ntcreatex.in.alloc_size = 0;
+       io.ntcreatex.in.file_attr = FILE_ATTRIBUTE_NORMAL;
+       io.ntcreatex.in.share_access = NTCREATEX_SHARE_ACCESS_NONE;
+       io.ntcreatex.in.open_disposition = NTCREATEX_DISP_OPEN_IF;
+       io.ntcreatex.in.create_options = 0;
+       io.ntcreatex.in.fname = "testfile";
+       status = smb_raw_open(cli->tree, tctx, &io);
+       if (!NT_STATUS_IS_OK(status)) {
+               d_printf("first smb_open failed: %s\n", nt_errstr(status));
+               ret = false;
+               goto done;
+       }
+       fnum1 = io.ntcreatex.out.file.fnum;
+
+       /*
+        * Create a conflicting open, causing the one-second delay
+        */
+
+       req = smb_raw_open_send(cli->tree, &io);
+       if (req == NULL) {
+               d_printf("smb_raw_open_send failed\n");
+               ret = false;
+               goto done;
+       }
+
+       /*
+        * Pull the VUID from under that request. As of Nov 3, 2008 all Samba3
+        * versions (3.0, 3.2 and master) would spin sending ERRinvuid errors
+        * as long as the client is still connected.
+        */
+
+       status = smb_raw_ulogoff(cli->session);
+
+       if (!NT_STATUS_IS_OK(status)) {
+               d_printf("ulogoff failed: %s\n", nt_errstr(status));
+               ret = false;
+               goto done;
+       }
+
+       echo_req.in.repeat_count = 1;
+       echo_req.in.size = 1;
+       echo_req.in.data = (uint8_t *)"";
+
+       status = smb_raw_echo(cli->session->transport, &echo_req);
+       if (!NT_STATUS_IS_OK(status)) {
+               d_printf("smb_raw_echo returned %s\n",
+                        nt_errstr(status));
+               ret = false;
+               goto done;
+       }
+
+       ret = true;
+ done:
+       return ret;
+}