2 Unix SMB/CIFS implementation.
3 test suite for eventlog rpc operations
5 Copyright (C) Tim Potter 2003,2005
6 Copyright (C) Jelmer Vernooij 2004
7 Copyright (C) Guenther Deschner 2009
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "librpc/gen_ndr/ndr_eventlog.h"
25 #include "librpc/gen_ndr/ndr_eventlog_c.h"
26 #include "torture/rpc/torture_rpc.h"
27 #include "param/param.h"
29 #define TEST_BACKUP_NAME "samrtorturetest"
31 static void init_lsa_String(struct lsa_String
*name
, const char *s
)
34 name
->length
= 2*strlen_m(s
);
35 name
->size
= name
->length
;
38 static bool get_policy_handle(struct torture_context
*tctx
,
39 struct dcerpc_binding_handle
*b
,
40 struct policy_handle
*handle
)
42 struct eventlog_OpenEventLogW r
;
43 struct eventlog_OpenUnknown0 unknown0
;
44 struct lsa_String logname
, servername
;
46 unknown0
.unknown0
= 0x005c;
47 unknown0
.unknown1
= 0x0001;
49 r
.in
.unknown0
= &unknown0
;
50 init_lsa_String(&logname
, "dns server");
51 init_lsa_String(&servername
, NULL
);
52 r
.in
.logname
= &logname
;
53 r
.in
.servername
= &servername
;
54 r
.in
.major_version
= 0x00000001;
55 r
.in
.minor_version
= 0x00000001;
56 r
.out
.handle
= handle
;
58 torture_assert_ntstatus_ok(tctx
,
59 dcerpc_eventlog_OpenEventLogW_r(b
, tctx
, &r
),
60 "OpenEventLog failed");
62 torture_assert_ntstatus_ok(tctx
, r
.out
.result
, "OpenEventLog failed");
69 static bool test_GetNumRecords(struct torture_context
*tctx
, struct dcerpc_pipe
*p
)
71 struct eventlog_GetNumRecords r
;
72 struct eventlog_CloseEventLog cr
;
73 struct policy_handle handle
;
75 struct dcerpc_binding_handle
*b
= p
->binding_handle
;
77 if (!get_policy_handle(tctx
, b
, &handle
))
81 r
.in
.handle
= &handle
;
82 r
.out
.number
= &number
;
84 torture_assert_ntstatus_ok(tctx
,
85 dcerpc_eventlog_GetNumRecords_r(b
, tctx
, &r
),
86 "GetNumRecords failed");
87 torture_assert_ntstatus_ok(tctx
, r
.out
.result
,
88 "GetNumRecords failed");
89 torture_comment(tctx
, "%d records\n", *r
.out
.number
);
91 cr
.in
.handle
= cr
.out
.handle
= &handle
;
93 torture_assert_ntstatus_ok(tctx
,
94 dcerpc_eventlog_CloseEventLog_r(b
, tctx
, &cr
),
95 "CloseEventLog failed");
96 torture_assert_ntstatus_ok(tctx
, cr
.out
.result
,
97 "CloseEventLog failed");
101 static bool test_ReadEventLog(struct torture_context
*tctx
,
102 struct dcerpc_pipe
*p
)
105 struct eventlog_ReadEventLogW r
;
106 struct eventlog_CloseEventLog cr
;
107 struct policy_handle handle
;
108 struct dcerpc_binding_handle
*b
= p
->binding_handle
;
110 uint32_t sent_size
= 0;
111 uint32_t real_size
= 0;
113 if (!get_policy_handle(tctx
, b
, &handle
))
118 r
.in
.handle
= &handle
;
121 r
.out
.sent_size
= &sent_size
;
122 r
.out
.real_size
= &real_size
;
124 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_ReadEventLogW_r(b
, tctx
, &r
),
125 "ReadEventLog failed");
127 torture_assert_ntstatus_equal(tctx
, r
.out
.result
, NT_STATUS_INVALID_PARAMETER
,
128 "ReadEventLog failed");
131 struct EVENTLOGRECORD rec
;
132 enum ndr_err_code ndr_err
;
136 /* Read first for number of bytes in record */
138 r
.in
.number_of_bytes
= 0;
139 r
.in
.flags
= EVENTLOG_BACKWARDS_READ
|EVENTLOG_SEQUENTIAL_READ
;
141 r
.out
.sent_size
= &sent_size
;
142 r
.out
.real_size
= &real_size
;
144 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_ReadEventLogW_r(b
, tctx
, &r
),
145 "ReadEventLogW failed");
147 if (NT_STATUS_EQUAL(r
.out
.result
, NT_STATUS_END_OF_FILE
)) {
148 /* FIXME: still need to decode then */
152 torture_assert_ntstatus_equal(tctx
, r
.out
.result
, NT_STATUS_BUFFER_TOO_SMALL
,
153 "ReadEventLog failed");
155 /* Now read the actual record */
157 r
.in
.number_of_bytes
= *r
.out
.real_size
;
158 r
.out
.data
= talloc_array(tctx
, uint8_t, r
.in
.number_of_bytes
);
160 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_ReadEventLogW_r(b
, tctx
, &r
),
161 "ReadEventLogW failed");
163 torture_assert_ntstatus_ok(tctx
, r
.out
.result
, "ReadEventLog failed");
165 /* Decode a user-marshalled record */
166 size
= IVAL(r
.out
.data
, pos
);
169 DATA_BLOB blob
= data_blob_const(
170 r
.out
.data
+ pos
, size
);
171 dump_data(0, blob
.data
, blob
.length
);
173 ndr_err
= ndr_pull_struct_blob_all(&blob
, tctx
, &rec
,
174 (ndr_pull_flags_fn_t
)ndr_pull_EVENTLOGRECORD
);
175 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err
)) {
176 status
= ndr_map_error2ntstatus(ndr_err
);
177 torture_assert_ntstatus_ok(tctx
, status
,
178 "ReadEventLog failed parsing event log record");
181 NDR_PRINT_DEBUG(EVENTLOGRECORD
, &rec
);
185 if (pos
+ 4 > *r
.out
.sent_size
) {
189 size
= IVAL(r
.out
.data
, pos
);
192 torture_assert_ntstatus_ok(tctx
, r
.out
.result
,
193 "ReadEventLog failed parsing event log record");
198 cr
.in
.handle
= cr
.out
.handle
= &handle
;
200 torture_assert_ntstatus_ok(tctx
,
201 dcerpc_eventlog_CloseEventLog_r(b
, tctx
, &cr
),
202 "CloseEventLog failed");
203 torture_assert_ntstatus_ok(tctx
, cr
.out
.result
,
204 "CloseEventLog failed");
209 static bool test_ReportEventLog(struct torture_context
*tctx
,
210 struct dcerpc_pipe
*p
)
212 struct eventlog_ReportEventW r
;
213 struct eventlog_CloseEventLog cr
;
214 struct policy_handle handle
;
215 struct dcerpc_binding_handle
*b
= p
->binding_handle
;
217 uint32_t record_number
= 0;
218 time_t time_written
= 0;
219 struct lsa_String servername
, *strings
;
221 if (!get_policy_handle(tctx
, b
, &handle
))
224 init_lsa_String(&servername
, NULL
);
226 strings
= talloc_array(tctx
, struct lsa_String
, 1);
227 init_lsa_String(&strings
[0], "Currently tortured by samba 4");
231 r
.in
.handle
= &handle
;
232 r
.in
.timestamp
= time(NULL
);
233 r
.in
.event_type
= EVENTLOG_INFORMATION_TYPE
;
234 r
.in
.event_category
= 0;
236 r
.in
.num_of_strings
= 1;
238 r
.in
.servername
= &servername
;
239 r
.in
.user_sid
= NULL
;
240 r
.in
.strings
= &strings
;
243 r
.in
.record_number
= r
.out
.record_number
= &record_number
;
244 r
.in
.time_written
= r
.out
.time_written
= &time_written
;
246 torture_assert_ntstatus_ok(tctx
,
247 dcerpc_eventlog_ReportEventW_r(b
, tctx
, &r
),
248 "ReportEventW failed");
250 torture_assert_ntstatus_ok(tctx
, r
.out
.result
, "ReportEventW failed");
252 cr
.in
.handle
= cr
.out
.handle
= &handle
;
254 torture_assert_ntstatus_ok(tctx
,
255 dcerpc_eventlog_CloseEventLog_r(b
, tctx
, &cr
),
256 "CloseEventLog failed");
257 torture_assert_ntstatus_ok(tctx
, cr
.out
.result
,
258 "CloseEventLog failed");
263 static bool test_FlushEventLog(struct torture_context
*tctx
,
264 struct dcerpc_pipe
*p
)
266 struct eventlog_FlushEventLog r
;
267 struct eventlog_CloseEventLog cr
;
268 struct policy_handle handle
;
269 struct dcerpc_binding_handle
*b
= p
->binding_handle
;
271 if (!get_policy_handle(tctx
, b
, &handle
))
274 r
.in
.handle
= &handle
;
276 /* Huh? Does this RPC always return access denied? */
277 torture_assert_ntstatus_ok(tctx
,
278 dcerpc_eventlog_FlushEventLog_r(b
, tctx
, &r
),
279 "FlushEventLog failed");
281 torture_assert_ntstatus_equal(tctx
,
283 NT_STATUS_ACCESS_DENIED
,
284 "FlushEventLog failed");
286 cr
.in
.handle
= cr
.out
.handle
= &handle
;
288 torture_assert_ntstatus_ok(tctx
,
289 dcerpc_eventlog_CloseEventLog_r(b
, tctx
, &cr
),
290 "CloseEventLog failed");
291 torture_assert_ntstatus_ok(tctx
, cr
.out
.result
,
292 "CloseEventLog failed");
297 static bool test_ClearEventLog(struct torture_context
*tctx
,
298 struct dcerpc_pipe
*p
)
300 struct eventlog_ClearEventLogW r
;
301 struct eventlog_CloseEventLog cr
;
302 struct policy_handle handle
;
303 struct dcerpc_binding_handle
*b
= p
->binding_handle
;
305 if (!get_policy_handle(tctx
, b
, &handle
))
308 r
.in
.handle
= &handle
;
309 r
.in
.backupfile
= NULL
;
311 torture_assert_ntstatus_ok(tctx
,
312 dcerpc_eventlog_ClearEventLogW_r(b
, tctx
, &r
),
313 "ClearEventLog failed");
314 torture_assert_ntstatus_ok(tctx
, r
.out
.result
,
315 "ClearEventLog failed");
317 cr
.in
.handle
= cr
.out
.handle
= &handle
;
319 torture_assert_ntstatus_ok(tctx
,
320 dcerpc_eventlog_CloseEventLog_r(b
, tctx
, &cr
),
321 "CloseEventLog failed");
322 torture_assert_ntstatus_ok(tctx
, cr
.out
.result
,
323 "CloseEventLog failed");
328 static bool test_GetLogInformation(struct torture_context
*tctx
,
329 struct dcerpc_pipe
*p
)
331 struct eventlog_GetLogInformation r
;
332 struct eventlog_CloseEventLog cr
;
333 struct policy_handle handle
;
334 uint32_t bytes_needed
= 0;
335 struct dcerpc_binding_handle
*b
= p
->binding_handle
;
337 if (!get_policy_handle(tctx
, b
, &handle
))
340 r
.in
.handle
= &handle
;
344 r
.out
.bytes_needed
= &bytes_needed
;
346 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_GetLogInformation_r(b
, tctx
, &r
),
347 "GetLogInformation failed");
349 torture_assert_ntstatus_equal(tctx
, r
.out
.result
, NT_STATUS_INVALID_LEVEL
,
350 "GetLogInformation failed");
354 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_GetLogInformation_r(b
, tctx
, &r
),
355 "GetLogInformation failed");
357 torture_assert_ntstatus_equal(tctx
, r
.out
.result
, NT_STATUS_BUFFER_TOO_SMALL
,
358 "GetLogInformation failed");
360 r
.in
.buf_size
= bytes_needed
;
361 r
.out
.buffer
= talloc_array(tctx
, uint8_t, bytes_needed
);
363 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_GetLogInformation_r(b
, tctx
, &r
),
364 "GetLogInformation failed");
366 torture_assert_ntstatus_ok(tctx
, r
.out
.result
, "GetLogInformation failed");
368 cr
.in
.handle
= cr
.out
.handle
= &handle
;
370 torture_assert_ntstatus_ok(tctx
,
371 dcerpc_eventlog_CloseEventLog_r(b
, tctx
, &cr
),
372 "CloseEventLog failed");
373 torture_assert_ntstatus_ok(tctx
, cr
.out
.result
,
374 "CloseEventLog failed");
380 static bool test_OpenEventLog(struct torture_context
*tctx
,
381 struct dcerpc_pipe
*p
)
383 struct policy_handle handle
;
384 struct eventlog_CloseEventLog cr
;
385 struct dcerpc_binding_handle
*b
= p
->binding_handle
;
387 if (!get_policy_handle(tctx
, b
, &handle
))
390 cr
.in
.handle
= cr
.out
.handle
= &handle
;
392 torture_assert_ntstatus_ok(tctx
,
393 dcerpc_eventlog_CloseEventLog_r(b
, tctx
, &cr
),
394 "CloseEventLog failed");
395 torture_assert_ntstatus_ok(tctx
, cr
.out
.result
,
396 "CloseEventLog failed");
401 static bool test_BackupLog(struct torture_context
*tctx
,
402 struct dcerpc_pipe
*p
)
404 struct policy_handle handle
, backup_handle
;
405 struct eventlog_BackupEventLogW r
;
406 struct eventlog_OpenBackupEventLogW br
;
407 struct eventlog_CloseEventLog cr
;
409 struct lsa_String backup_filename
;
410 struct eventlog_OpenUnknown0 unknown0
;
411 struct dcerpc_binding_handle
*b
= p
->binding_handle
;
413 if (torture_setting_bool(tctx
, "samba3", false)) {
414 torture_skip(tctx
, "skipping BackupLog test against samba");
417 if (!get_policy_handle(tctx
, b
, &handle
))
420 tmp
= talloc_asprintf(tctx
, "C:\\%s", TEST_BACKUP_NAME
);
421 init_lsa_String(&backup_filename
, tmp
);
423 r
.in
.handle
= &handle
;
424 r
.in
.backup_filename
= &backup_filename
;
426 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_BackupEventLogW_r(b
, tctx
, &r
),
427 "BackupEventLogW failed");
428 torture_assert_ntstatus_equal(tctx
, r
.out
.result
,
429 NT_STATUS_OBJECT_PATH_SYNTAX_BAD
, "BackupEventLogW failed");
431 tmp
= talloc_asprintf(tctx
, "\\??\\C:\\%s", TEST_BACKUP_NAME
);
432 init_lsa_String(&backup_filename
, tmp
);
434 r
.in
.handle
= &handle
;
435 r
.in
.backup_filename
= &backup_filename
;
437 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_BackupEventLogW_r(b
, tctx
, &r
),
438 "BackupEventLogW failed");
439 torture_assert_ntstatus_ok(tctx
, r
.out
.result
, "BackupEventLogW failed");
441 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_BackupEventLogW_r(b
, tctx
, &r
),
442 "BackupEventLogW failed");
443 torture_assert_ntstatus_equal(tctx
, r
.out
.result
,
444 NT_STATUS_OBJECT_NAME_COLLISION
, "BackupEventLogW failed");
446 cr
.in
.handle
= cr
.out
.handle
= &handle
;
448 torture_assert_ntstatus_ok(tctx
,
449 dcerpc_eventlog_CloseEventLog_r(b
, tctx
, &cr
),
451 torture_assert_ntstatus_ok(tctx
, cr
.out
.result
,
454 unknown0
.unknown0
= 0x005c;
455 unknown0
.unknown1
= 0x0001;
457 br
.in
.unknown0
= &unknown0
;
458 br
.in
.backup_logname
= &backup_filename
;
459 br
.in
.major_version
= 1;
460 br
.in
.minor_version
= 1;
461 br
.out
.handle
= &backup_handle
;
463 torture_assert_ntstatus_ok(tctx
, dcerpc_eventlog_OpenBackupEventLogW_r(b
, tctx
, &br
),
464 "OpenBackupEventLogW failed");
466 torture_assert_ntstatus_ok(tctx
, br
.out
.result
, "OpenBackupEventLogW failed");
468 cr
.in
.handle
= cr
.out
.handle
= &backup_handle
;
470 torture_assert_ntstatus_ok(tctx
,
471 dcerpc_eventlog_CloseEventLog_r(b
, tctx
, &cr
),
472 "CloseEventLog failed");
473 torture_assert_ntstatus_ok(tctx
, cr
.out
.result
,
474 "CloseEventLog failed");
479 struct torture_suite
*torture_rpc_eventlog(TALLOC_CTX
*mem_ctx
)
481 struct torture_suite
*suite
;
482 struct torture_rpc_tcase
*tcase
;
483 struct torture_test
*test
;
485 suite
= torture_suite_create(mem_ctx
, "eventlog");
486 tcase
= torture_suite_add_rpc_iface_tcase(suite
, "eventlog",
487 &ndr_table_eventlog
);
489 torture_rpc_tcase_add_test(tcase
, "OpenEventLog", test_OpenEventLog
);
490 test
= torture_rpc_tcase_add_test(tcase
, "ClearEventLog",
492 test
->dangerous
= true;
493 torture_rpc_tcase_add_test(tcase
, "GetNumRecords", test_GetNumRecords
);
494 torture_rpc_tcase_add_test(tcase
, "ReadEventLog", test_ReadEventLog
);
495 torture_rpc_tcase_add_test(tcase
, "ReportEventLog", test_ReportEventLog
);
496 torture_rpc_tcase_add_test(tcase
, "FlushEventLog", test_FlushEventLog
);
497 torture_rpc_tcase_add_test(tcase
, "GetLogIntormation", test_GetLogInformation
);
498 torture_rpc_tcase_add_test(tcase
, "BackupLog", test_BackupLog
);