s4: allow python code to dump NTACL object as well
[Samba/ekacnet.git] / source4 / torture / rpc / countcalls.c
blob3a4bbd99f0491571ad3f071425802892c8eaa0e4
1 /*
2 Unix SMB/CIFS implementation.
4 count number of calls on an interface
6 Copyright (C) Andrew Tridgell 2003
7 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include "librpc/ndr/libndr.h"
25 #include "librpc/ndr/ndr_table.h"
26 #include "torture/rpc/rpc.h"
27 #include "param/param.h"
31 bool count_calls(struct torture_context *tctx,
32 TALLOC_CTX *mem_ctx,
33 const struct ndr_interface_table *iface,
34 bool all)
36 struct dcerpc_pipe *p;
37 DATA_BLOB stub_in, stub_out;
38 int i;
39 NTSTATUS status = torture_rpc_connection(tctx, &p, iface);
40 if (NT_STATUS_EQUAL(NT_STATUS_OBJECT_NAME_NOT_FOUND, status)
41 || NT_STATUS_EQUAL(NT_STATUS_NET_WRITE_FAULT, status)
42 || NT_STATUS_EQUAL(NT_STATUS_PORT_UNREACHABLE, status)
43 || NT_STATUS_EQUAL(NT_STATUS_ACCESS_DENIED, status)) {
44 if (all) {
45 /* Not fatal if looking for all pipes */
46 return true;
47 } else {
48 printf("Failed to open '%s' to count calls - %s\n", iface->name, nt_errstr(status));
49 return false;
51 } else if (!NT_STATUS_IS_OK(status)) {
52 printf("Failed to open '%s' to count calls - %s\n", iface->name, nt_errstr(status));
53 return false;
56 stub_in = data_blob_talloc(p, mem_ctx, 0);
58 printf("\nScanning pipe '%s'\n", iface->name);
60 for (i=0;i<500;i++) {
61 status = dcerpc_request(p, NULL, i, p, &stub_in, &stub_out);
62 if (NT_STATUS_EQUAL(status, NT_STATUS_NET_WRITE_FAULT) &&
63 p->last_fault_code == DCERPC_FAULT_OP_RNG_ERROR) {
64 i--;
65 break;
67 if (NT_STATUS_EQUAL(status, NT_STATUS_NET_WRITE_FAULT) &&
68 p->last_fault_code == DCERPC_FAULT_OP_RNG_ERROR) {
69 i--;
70 break;
72 if (NT_STATUS_EQUAL(status, NT_STATUS_CONNECTION_DISCONNECTED)) {
73 i--;
74 break;
76 if (NT_STATUS_EQUAL(status, NT_STATUS_PIPE_DISCONNECTED)) {
77 i--;
78 break;
80 if (NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
81 i--;
82 break;
84 if (NT_STATUS_EQUAL(status, NT_STATUS_LOGON_FAILURE)) {
85 i--;
86 break;
90 if (i==500) {
91 talloc_free(p);
92 printf("no limit on calls: %s!?\n", nt_errstr(status));
93 return false;
96 printf("Found %d calls\n", i);
98 talloc_free(p);
100 return true;
104 bool torture_rpc_countcalls(struct torture_context *torture)
106 const struct ndr_interface_table *iface;
107 const char *iface_name;
108 bool ret = true;
109 const struct ndr_interface_list *l;
110 iface_name = lp_parm_string(torture->lp_ctx, NULL, "countcalls", "interface");
111 if (iface_name != NULL) {
112 iface = ndr_table_by_name(iface_name);
113 if (!iface) {
114 printf("Unknown interface '%s'\n", iface_name);
115 return false;
117 return count_calls(torture, torture, iface, false);
120 for (l=ndr_table_list();l;l=l->next) {
121 TALLOC_CTX *loop_ctx;
122 loop_ctx = talloc_named(torture, 0, "torture_rpc_councalls loop context");
123 ret &= count_calls(torture, loop_ctx, l->table, true);
124 talloc_free(loop_ctx);
126 return ret;