The Samba-Bugzilla – Attachment 16260 Details for
Bug 14512
Fix MultipleChannel_Negative_SMB2002
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
testsuite test report with complete logs
20200925_mc_1.xml (text/xml), 98.17 KB, created by
Jones Syue
on 2020-09-25 09:29:35 UTC
(
hide
)
Description:
testsuite test report with complete logs
Filename:
MIME Type:
Creator:
Jones Syue
Created:
2020-09-25 09:29:35 UTC
Size:
98.17 KB
patch
obsolete
><?xml version="1.0" encoding="utf-8"?> ><assemblies timestamp="09/25/2020 06:43:46"> > <assembly name="C:\FileServer-TestSuite-ServerEP\Bin\MS-SMB2_ServerTestSuite.dll" run-date="2020-09-25" run-time="06:43:46" total="9" passed="5" failed="4" skipped="0" time="274.296"> > <errors /> > <collection name="Test Collection for Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic" total="7" passed="5" failed="2" skipped="0" time="150.171"> > <test name="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.BVT_MultipleChannel_NicRedundantOnBoth" type="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic" method="BVT_MultipleChannel_NicRedundantOnBoth" time="23.754" result="Pass"> > <output>2020-09-25 06:43:46.211 [TestInProgress] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.BVT_MultipleChannel_NicRedundantOnBoth >2020-09-25 06:43:46.221 [Comment] This test case is designed to test the basic functionality of Multiple Channel, assuming that both client and server have two NICs. >2020-09-25 06:43:46.236 [Comment] Adapter Microsoft.Protocols.TestSuites.FileSharing.Common.Adapter.SutProtocolControlAdapter implements Microsoft.Protocols.TestSuites.FileSharing.Common.Adapter.ISutProtocolControlAdapter >2020-09-25 06:43:46.245 [Debug] SecurityPackage for authentication: Negotiate >2020-09-25 06:43:46.253 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic1IPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:43:46.254 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic2IPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:43:46.255 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:43:46.255 [CheckSucceeded] Assume.IsTrue succeeded. SutAlternativeIPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:43:46.260 [CheckSucceeded] Assert.IsTrue succeeded. Client should have more than one IP address >2020-09-25 06:43:46.260 [CheckSucceeded] Assert.IsTrue succeeded. Server should have more than one IP address >2020-09-25 06:43:46.261 [TestStep] Start to write content to file from main channel with client 192.168.142.110 and server 192.168.144.9 >2020-09-25 06:43:46.270 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:43:46.270 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 06:43:46.435 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:43:48.417 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:43:48.420 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:43:48.420 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:43:48.425 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:43:49.684 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:43:49.690 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:43:49.691 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:43:49.692 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:43:49.692 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:43:50.784 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:43:52.692 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=2983411926 >2020-09-25 06:43:52.765 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\IPC$ >2020-09-25 06:43:53.224 [Debug] R TREE CONNECT, TreeId=0x28bade94 >2020-09-25 06:43:53.226 [Debug] C IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO, FileId={ Persistent: 0xffffffffffffffff, Volatile: 0xffffffffffffffff } >2020-09-25 06:43:53.551 [Debug] R IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:43:53.560 [Debug] Get NETWORK_INTERFACE_INFO: 192.168.144.10 >2020-09-25 06:43:53.561 [Debug] Address queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO matches server second address 192.168.144.10 >2020-09-25 06:43:53.561 [CheckSucceeded] Assert.IsTrue succeeded. Second address 192.168.144.10 should be queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:43:53.562 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:43:53.732 [Debug] R TREE CONNECT, TreeId=0x83e60ec2 >2020-09-25 06:43:53.735 [Debug] C CREATE, File=BVT_MultipleChannel_NicRedundantOnBoth_cde5d929-1452-4d88-8553-d427b0d3758c, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:43:53.881 [Debug] R CREATE, FileId={ Persistent: 0x00000000620c0c09, Volatile: 0x00000000ec8b0b32 } >2020-09-25 06:43:53.882 [Debug] C WRITE, FileId={ Persistent: 0x00000000620c0c09, Volatile: 0x00000000ec8b0b32 }, Write 32768 bytes from offset 0 >2020-09-25 06:43:54.599 [Debug] R WRITE, Written 32768 bytes >2020-09-25 06:43:54.600 [TestStep] Start to read content from file from alternative channel with client 192.168.142.111 and server 192.168.144.10 >2020-09-25 06:43:54.602 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:43:54.602 [Debug] Connect to server over TCP from IP 192.168.142.111 to IP 192.168.144.10 >2020-09-25 06:43:54.738 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:43:56.326 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:43:56.326 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:43:56.328 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:43:56.329 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:43:57.829 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:43:57.838 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:43:57.838 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:43:57.838 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:43:57.839 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:43:58.830 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:44:00.525 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=2983411926 >2020-09-25 06:44:00.583 [CheckSucceeded] Assert.AreEqual succeeded. SessionSetup should succeed >2020-09-25 06:44:00.585 [Debug] C READ, FileId={ Persistent: 0x00000000620c0c09, Volatile: 0x00000000ec8b0b32 }, Read 32768 bytes from offset 0 >2020-09-25 06:44:01.238 [Debug] R READ, Read 32768 bytes >2020-09-25 06:44:01.240 [Debug] C CLOSE, FileId={ Persistent: 0x00000000620c0c09, Volatile: 0x00000000ec8b0b32 } >2020-09-25 06:44:01.453 [Debug] R CLOSE >2020-09-25 06:44:01.454 [Debug] C TREE DISCONNECT, TreeId=0x83e60ec2 >2020-09-25 06:44:01.595 [Debug] R TREE DISCONNECT >2020-09-25 06:44:01.596 [Debug] C LOGOFF, SessionId=2983411926 >2020-09-25 06:44:01.735 [Debug] R LOGOFF >2020-09-25 06:44:01.738 [CheckSucceeded] Assert.IsTrue succeeded. Content read should be identical to content written. >2020-09-25 06:44:01.748 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:44:01.748 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:44:09.754 [TestPassed] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.BVT_MultipleChannel_NicRedundantOnBoth</output> > <traits> > <trait name="Category" value="BVT" /> > <trait name="Category" value="Smb30" /> > <trait name="Category" value="MultipleChannel" /> > </traits> > </test> > <test name="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_NicRedundantOnClient" type="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic" method="MultipleChannel_NicRedundantOnClient" time="23.051" result="Pass"> > <output>2020-09-25 06:44:09.840 [TestInProgress] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_NicRedundantOnClient >2020-09-25 06:44:09.857 [Comment] Operate file via multi-channel with 2 Nics on client. >2020-09-25 06:44:09.861 [Debug] SecurityPackage for authentication: Negotiate >2020-09-25 06:44:09.862 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic1IPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:44:09.862 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic2IPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:44:09.862 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:44:09.862 [CheckSucceeded] Assume.IsTrue succeeded. SutAlternativeIPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:44:09.864 [CheckSucceeded] Assert.IsTrue succeeded. Client should have more than one IP address >2020-09-25 06:44:09.864 [CheckSucceeded] Assert.IsTrue succeeded. Server should have at least one IP address >2020-09-25 06:44:09.864 [TestStep] Start to write content to file from main channel with client 192.168.142.110 and server 192.168.144.9 >2020-09-25 06:44:09.864 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:44:09.864 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 06:44:10.001 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:44:11.993 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:44:11.994 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:44:11.996 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:44:11.997 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:44:13.072 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:44:13.077 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:44:13.078 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:44:13.080 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:44:13.080 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:44:13.904 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:44:15.519 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=835080127 >2020-09-25 06:44:15.565 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:44:16.039 [Debug] R TREE CONNECT, TreeId=0x1e974f03 >2020-09-25 06:44:16.040 [Debug] C CREATE, File=MultipleChannel_NicRedundantOnClient_69f2d187-f45f-4e3c-943b-b44b5a7d419b, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:44:16.368 [Debug] R CREATE, FileId={ Persistent: 0x000000007907829b, Volatile: 0x00000000ac34bcef } >2020-09-25 06:44:16.368 [Debug] C WRITE, FileId={ Persistent: 0x000000007907829b, Volatile: 0x00000000ac34bcef }, Write 32768 bytes from offset 0 >2020-09-25 06:44:17.086 [Debug] R WRITE, Written 32768 bytes >2020-09-25 06:44:17.087 [TestStep] Start to read content from file from alternative channel with client 192.168.142.111 and server 192.168.144.9 >2020-09-25 06:44:17.088 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:44:17.088 [Debug] Connect to server over TCP from IP 192.168.142.111 to IP 192.168.144.9 >2020-09-25 06:44:17.224 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:44:19.205 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:44:19.205 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:44:19.206 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:44:19.207 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:44:21.032 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:44:21.038 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:44:21.038 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:44:21.038 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:44:21.039 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:44:21.884 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:44:23.491 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=835080127 >2020-09-25 06:44:23.537 [CheckSucceeded] Assert.AreEqual succeeded. SessionSetup should succeed >2020-09-25 06:44:23.537 [Debug] C READ, FileId={ Persistent: 0x000000007907829b, Volatile: 0x00000000ac34bcef }, Read 32768 bytes from offset 0 >2020-09-25 06:44:24.234 [Debug] R READ, Read 32768 bytes >2020-09-25 06:44:24.235 [Debug] C CLOSE, FileId={ Persistent: 0x000000007907829b, Volatile: 0x00000000ac34bcef } >2020-09-25 06:44:24.541 [Debug] R CLOSE >2020-09-25 06:44:24.541 [Debug] C TREE DISCONNECT, TreeId=0x1e974f03 >2020-09-25 06:44:24.682 [Debug] R TREE DISCONNECT >2020-09-25 06:44:24.683 [Debug] C LOGOFF, SessionId=835080127 >2020-09-25 06:44:24.822 [Debug] R LOGOFF >2020-09-25 06:44:24.824 [CheckSucceeded] Assert.IsTrue succeeded. Content should be identical to content written. >2020-09-25 06:44:24.829 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:44:24.829 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:44:32.830 [TestPassed] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_NicRedundantOnClient</output> > <traits> > <trait name="Category" value="Smb30" /> > <trait name="Category" value="MultipleChannel" /> > <trait name="Category" value="Positive" /> > </traits> > </test> > <test name="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_NicRedundantOnServer" type="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic" method="MultipleChannel_NicRedundantOnServer" time="22.686" result="Pass"> > <output>2020-09-25 06:44:32.895 [TestInProgress] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_NicRedundantOnServer >2020-09-25 06:44:32.909 [Comment] Operate file via multi-channel with 2 Nics on server. >2020-09-25 06:44:32.910 [Debug] SecurityPackage for authentication: Negotiate >2020-09-25 06:44:32.912 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic1IPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:44:32.913 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic2IPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:44:32.927 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:44:32.927 [CheckSucceeded] Assume.IsTrue succeeded. SutAlternativeIPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:44:32.930 [CheckSucceeded] Assert.IsTrue succeeded. Client should have at least one IP address >2020-09-25 06:44:32.930 [CheckSucceeded] Assert.IsTrue succeeded. Server should have more than one IP address >2020-09-25 06:44:32.930 [TestStep] Start to write content to file from main channel with client 192.168.142.110 and server 192.168.144.9 >2020-09-25 06:44:32.930 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:44:32.930 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 06:44:33.067 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:44:35.046 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:44:35.046 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:44:35.046 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:44:35.047 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:44:36.109 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:44:36.116 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:44:36.116 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:44:36.116 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:44:36.117 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:44:36.930 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:44:38.710 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=275745205 >2020-09-25 06:44:38.753 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\IPC$ >2020-09-25 06:44:39.234 [Debug] R TREE CONNECT, TreeId=0x715b8900 >2020-09-25 06:44:39.234 [Debug] C IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO, FileId={ Persistent: 0xffffffffffffffff, Volatile: 0xffffffffffffffff } >2020-09-25 06:44:39.548 [Debug] R IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:44:39.552 [Debug] Get NETWORK_INTERFACE_INFO: 192.168.144.10 >2020-09-25 06:44:39.552 [Debug] Address queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO matches server second address 192.168.144.10 >2020-09-25 06:44:39.552 [CheckSucceeded] Assert.IsTrue succeeded. Second address 192.168.144.10 should be queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:44:39.553 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:44:39.723 [Debug] R TREE CONNECT, TreeId=0x2e4ca7ce >2020-09-25 06:44:39.724 [Debug] C CREATE, File=MultipleChannel_NicRedundantOnServer_5d87337c-3a6b-4341-9d71-5e18a30a89a0, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:44:39.867 [Debug] R CREATE, FileId={ Persistent: 0x00000000fbb4713b, Volatile: 0x00000000aae1c5ba } >2020-09-25 06:44:39.867 [Debug] C WRITE, FileId={ Persistent: 0x00000000fbb4713b, Volatile: 0x00000000aae1c5ba }, Write 32768 bytes from offset 0 >2020-09-25 06:44:40.579 [Debug] R WRITE, Written 32768 bytes >2020-09-25 06:44:40.579 [TestStep] Start to read content from file from alternative channel with client 192.168.142.110 and server 192.168.144.10 >2020-09-25 06:44:40.580 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:44:40.580 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.10 >2020-09-25 06:44:40.716 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:44:42.308 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:44:42.308 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:44:42.309 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:44:42.311 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:44:43.809 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:44:43.814 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:44:43.814 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:44:43.815 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:44:43.816 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:44:44.698 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:44:46.272 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=275745205 >2020-09-25 06:44:46.318 [CheckSucceeded] Assert.AreEqual succeeded. SessionSetup should succeed >2020-09-25 06:44:46.318 [Debug] C READ, FileId={ Persistent: 0x00000000fbb4713b, Volatile: 0x00000000aae1c5ba }, Read 32768 bytes from offset 0 >2020-09-25 06:44:47.013 [Debug] R READ, Read 32768 bytes >2020-09-25 06:44:47.014 [Debug] C CLOSE, FileId={ Persistent: 0x00000000fbb4713b, Volatile: 0x00000000aae1c5ba } >2020-09-25 06:44:47.229 [Debug] R CLOSE >2020-09-25 06:44:47.229 [Debug] C TREE DISCONNECT, TreeId=0x2e4ca7ce >2020-09-25 06:44:47.366 [Debug] R TREE DISCONNECT >2020-09-25 06:44:47.366 [Debug] C LOGOFF, SessionId=275745205 >2020-09-25 06:44:47.504 [Debug] R LOGOFF >2020-09-25 06:44:47.506 [TestStep] Verify the contents read from alternative channel are the same as the one written by main channel. >2020-09-25 06:44:47.506 [CheckSucceeded] Assert.IsTrue succeeded. Content should be identical. >2020-09-25 06:44:47.509 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:44:47.509 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:44:55.518 [TestPassed] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_NicRedundantOnServer</output> > <traits> > <trait name="Category" value="Smb30" /> > <trait name="Category" value="MultipleChannel" /> > <trait name="Category" value="Positive" /> > </traits> > </test> > <test name="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_Negative_SMB21" type="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic" method="MultipleChannel_Negative_SMB21" time="19.203" result="Pass"> > <output>2020-09-25 06:44:55.599 [TestInProgress] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_Negative_SMB21 >2020-09-25 06:44:55.610 [Comment] Operate file via multi-channel with SMB21 dialect, expect failure with error code STATUS_REQUEST_NOT_ACCEPTED. >2020-09-25 06:44:55.610 [Debug] SecurityPackage for authentication: Negotiate >2020-09-25 06:44:55.615 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic1IPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:44:55.615 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic2IPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:44:55.624 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:44:55.633 [CheckSucceeded] Assume.IsTrue succeeded. SutAlternativeIPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:44:55.635 [CheckSucceeded] Assert.IsTrue succeeded. Client should have at least one IP address >2020-09-25 06:44:55.635 [CheckSucceeded] Assert.IsTrue succeeded. Server should have more than one IP address >2020-09-25 06:44:55.635 [TestStep] Start to write content to file from main channel with client 192.168.142.110 and server 192.168.144.9 >2020-09-25 06:44:55.635 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:44:55.635 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 06:44:55.770 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:44:57.751 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:44:57.752 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:44:57.753 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:44:57.754 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:44:58.817 [Debug] R NEGOTIATE, Dialect=Smb21, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:44:58.817 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:44:58.818 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:44:59.607 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:45:01.221 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=3509242693 >2020-09-25 06:45:01.266 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\IPC$ >2020-09-25 06:45:01.582 [Debug] R TREE CONNECT, TreeId=0x324fc6b9 >2020-09-25 06:45:01.582 [Debug] C IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO, FileId={ Persistent: 0xffffffffffffffff, Volatile: 0xffffffffffffffff } >2020-09-25 06:45:01.896 [Debug] R IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:45:01.899 [Debug] Get NETWORK_INTERFACE_INFO: 192.168.144.10 >2020-09-25 06:45:01.899 [Debug] Address queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO matches server second address 192.168.144.10 >2020-09-25 06:45:01.900 [CheckSucceeded] Assert.IsTrue succeeded. Second address 192.168.144.10 should be queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:45:01.900 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:45:02.069 [Debug] R TREE CONNECT, TreeId=0x505f5e9b >2020-09-25 06:45:02.070 [Debug] C CREATE, File=MultipleChannel_Negative_SMB21_3bb1ae5f-402b-417e-89eb-b575e753fa52, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:45:02.213 [Debug] R CREATE, FileId={ Persistent: 0x00000000a7c00f82, Volatile: 0x00000000c08c3277 } >2020-09-25 06:45:02.214 [TestStep] Start to read content from file from alternative channel with client 192.168.142.110 and server 192.168.144.10 >2020-09-25 06:45:02.215 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:45:02.215 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.10 >2020-09-25 06:45:02.350 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:45:03.938 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:45:03.938 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:45:03.939 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:45:03.940 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:45:05.483 [Debug] R NEGOTIATE, Dialect=Smb21, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:45:05.483 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:45:05.484 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:45:06.284 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:45:06.731 [Debug] R SESSION_SETUP, ErrorCode=STATUS_REQUEST_NOT_ACCEPTED >2020-09-25 06:45:06.731 [CheckSucceeded] Assert.AreEqual succeeded. SessionSetup is expected to fail with STATUS_REQUEST_NOT_ACCEPTED. >2020-09-25 06:45:06.732 [Debug] Dialect Smb21 is not supported for multiple channel and fail as expected with STATUS_REQUEST_NOT_ACCEPTED. >2020-09-25 06:45:06.735 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:45:06.735 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:45:14.737 [TestPassed] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_Negative_SMB21</output> > <traits> > <trait name="Category" value="Smb30" /> > <trait name="Category" value="MultipleChannel" /> > <trait name="Category" value="Compatibility" /> > </traits> > </test> > <test name="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_Negative_SMB2002" type="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic" method="MultipleChannel_Negative_SMB2002" time="17.718" result="Fail"> > <output>2020-09-25 08:35:16.820 [TestInProgress] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_Negative_SMB2002 >2020-09-25 08:35:16.830 [Comment] Operate file via multi-channel with SMB2002 dialect, expect failure with error code STATUS_REQUEST_NOT_ACCEPTED. >2020-09-25 08:35:16.844 [Comment] Adapter Microsoft.Protocols.TestSuites.FileSharing.Common.Adapter.SutProtocolControlAdapter implements Microsoft.Protocols.TestSuites.FileSharing.Common.Adapter.ISutProtocolControlAdapter >2020-09-25 08:35:16.855 [Debug] SecurityPackage for authentication: Negotiate >2020-09-25 08:35:16.862 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic1IPAddress should be a valid IP address or a resolvable host name! >2020-09-25 08:35:16.863 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic2IPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 08:35:16.864 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 08:35:16.864 [CheckSucceeded] Assume.IsTrue succeeded. SutAlternativeIPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 08:35:16.869 [CheckSucceeded] Assert.IsTrue succeeded. Client should have at least one IP address >2020-09-25 08:35:16.869 [CheckSucceeded] Assert.IsTrue succeeded. Server should have more than one IP address >2020-09-25 08:35:16.870 [TestStep] Start to write content to file from main channel with client 192.168.142.110 and server 192.168.144.9 >2020-09-25 08:35:16.877 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 08:35:16.877 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 08:35:17.037 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 08:35:19.031 [Debug] R NEGOTIATE, Dialect=Smb2002, Capabilities=GLOBAL_CAP_DFS >2020-09-25 08:35:19.034 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 08:35:19.034 [Debug] The selected dialect is Smb2002 >2020-09-25 08:35:19.034 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 08:35:19.037 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 08:35:20.076 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 08:35:22.176 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=517660286 >2020-09-25 08:35:22.239 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\IPC$ >2020-09-25 08:35:22.702 [Debug] R TREE CONNECT, TreeId=0x3719b309 >2020-09-25 08:35:22.704 [Debug] C IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO, FileId={ Persistent: 0xffffffffffffffff, Volatile: 0xffffffffffffffff } >2020-09-25 08:35:23.029 [Debug] R IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 08:35:23.038 [Debug] Get NETWORK_INTERFACE_INFO: 192.168.144.10 >2020-09-25 08:35:23.039 [Debug] Address queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO matches server second address 192.168.144.10 >2020-09-25 08:35:23.039 [CheckSucceeded] Assert.IsTrue succeeded. Second address 192.168.144.10 should be queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 08:35:23.040 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 08:35:23.211 [Debug] R TREE CONNECT, TreeId=0x4318d3d3 >2020-09-25 08:35:23.214 [Debug] C CREATE, File=MultipleChannel_Negative_SMB2002_e2c2a297-cf8f-44c9-8fe3-42922e9733f2, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 08:35:23.360 [Debug] R CREATE, FileId={ Persistent: 0x00000000a7d67ebd, Volatile: 0x00000000788ccf5e } >2020-09-25 08:35:23.360 [TestStep] Start to read content from file from alternative channel with client 192.168.142.110 and server 192.168.144.10 >2020-09-25 08:35:23.363 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 08:35:23.363 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.10 >2020-09-25 08:35:23.498 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 08:35:25.092 [Debug] R NEGOTIATE, Dialect=Smb2002, Capabilities=GLOBAL_CAP_DFS >2020-09-25 08:35:25.093 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 08:35:25.108 [Debug] The selected dialect is Smb2002 >2020-09-25 08:35:25.109 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 08:35:25.109 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 08:35:25.971 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 08:35:26.296 [Debug] R SESSION_SETUP, ErrorCode=STATUS_USER_SESSION_DELETED >2020-09-25 08:35:26.297 [CheckFailed] Assert.AreEqual failed. Expected: <3221225680 (0xC00000D0)>, Actual: <3221225987 (0xC0000203)>. SessionSetup is expected to fail with STATUS_REQUEST_NOT_ACCEPTED. >2020-09-25 08:35:26.322 [Comment] at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.ReadFromAlternativeChannel(DialectRevision[] requestDialect, DialectRevision expectedDialect, IPAddress serverIp, IPAddress clientIp, UInt32 lengthRead, UInt32 treeId, FILEID fileId, String& contentRead) in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 632 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.Negative_AlternativeChannel_NicRedundantOnServer(DialectRevision[] requestDialect, DialectRevision expectedDialect) in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 730 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_Negative_SMB2002() in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 308 >2020-09-25 08:35:26.342 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 08:35:26.342 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 08:35:34.335 [TestFailed] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_Negative_SMB2002</output> > <failure> > <message>Assert.AreEqual failed. Expected: <3221225680 (0xC00000D0)>, Actual: <3221225987 (0xC0000203)>. SessionSetup is expected to fail with STATUS_REQUEST_NOT_ACCEPTED. >===== Stack Trace ===== > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.ReadFromAlternativeChannel(DialectRevision[] requestDialect, DialectRevision expectedDialect, IPAddress serverIp, IPAddress clientIp, UInt32 lengthRead, UInt32 treeId, FILEID fileId, String& contentRead) in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 632 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.Negative_AlternativeChannel_NicRedundantOnServer(DialectRevision[] requestDialect, DialectRevision expectedDialect) in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 730 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_Negative_SMB2002() in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 308 >=== End of Stack Trace ===</message> > <stack-trace> at Microsoft.Protocols.TestTools.AsynchronousErrorProcessor.Process() > at Microsoft.Protocols.TestTools.AsynchronousErrorProcessor.ReportAsyncException(Exception checkerException) > at Microsoft.Protocols.TestTools.Checking.DefaultChecker`2.GenerateException(CheckResult checkResult, String message, Object[] parameters) > at Microsoft.Protocols.TestTools.Checking.DefaultChecker`2.AreEqual[T](T expected, T actual, String message, Object[] parameters) > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.ReadFromAlternativeChannel(DialectRevision[] requestDialect, DialectRevision expectedDialect, IPAddress serverIp, IPAddress clientIp, UInt32 lengthRead, UInt32 treeId, FILEID fileId, String& contentRead) in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 632 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.Negative_AlternativeChannel_NicRedundantOnServer(DialectRevision[] requestDialect, DialectRevision expectedDialect) in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 730 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_Negative_SMB2002() in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 308</stack-trace> > </failure> > <traits> > <trait name="Category" value="Smb30" /> > <trait name="Category" value="MultipleChannel" /> > <trait name="Category" value="Compatibility" /> > </traits> > </test> > <test name="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_MultiChannelOnSameNic" type="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic" method="MultipleChannel_MultiChannelOnSameNic" time="22.965" result="Pass"> > <output>2020-09-25 06:45:31.886 [TestInProgress] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_MultiChannelOnSameNic >2020-09-25 06:45:31.900 [Comment] Operate file via multi-channel on same Nic. >2020-09-25 06:45:31.901 [Debug] SecurityPackage for authentication: Negotiate >2020-09-25 06:45:31.905 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic1IPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:45:31.905 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic2IPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:45:31.905 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:45:31.905 [CheckSucceeded] Assume.IsTrue succeeded. SutAlternativeIPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:45:31.907 [CheckSucceeded] Assert.IsTrue succeeded. Client should have at least one IP address >2020-09-25 06:45:31.907 [CheckSucceeded] Assert.IsTrue succeeded. Server should have more than one IP address >2020-09-25 06:45:31.907 [TestStep] Start to write content to file from main channel with client 192.168.142.110 and server 192.168.144.9 >2020-09-25 06:45:31.907 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:45:31.907 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 06:45:32.041 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:45:34.022 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:45:34.022 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:45:34.023 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:45:34.024 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:45:35.100 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:45:35.105 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:45:35.105 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:45:35.105 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:45:35.106 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:45:35.904 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:45:37.688 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=3725431111 >2020-09-25 06:45:37.735 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:45:38.056 [Debug] R TREE CONNECT, TreeId=0xa5cc8055 >2020-09-25 06:45:38.056 [Debug] C CREATE, File=MultipleChannel_MultiChannelOnSameNic_d780c093-b02c-4d6b-a543-43e53194316f, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:45:38.384 [Debug] R CREATE, FileId={ Persistent: 0x00000000faee13d1, Volatile: 0x00000000ed889f95 } >2020-09-25 06:45:38.384 [Debug] C WRITE, FileId={ Persistent: 0x00000000faee13d1, Volatile: 0x00000000ed889f95 }, Write 32768 bytes from offset 0 >2020-09-25 06:45:39.103 [Debug] R WRITE, Written 32768 bytes >2020-09-25 06:45:39.103 [TestStep] Start to read content from file from alternative channel with client 192.168.142.110 and server 192.168.144.9 >2020-09-25 06:45:39.104 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:45:39.105 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 06:45:39.240 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:45:41.227 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:45:41.227 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:45:41.228 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:45:41.230 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:45:43.046 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:45:43.050 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:45:43.050 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:45:43.051 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:45:43.052 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:45:43.857 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:45:45.460 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=3725431111 >2020-09-25 06:45:45.505 [CheckSucceeded] Assert.AreEqual succeeded. SessionSetup should succeed >2020-09-25 06:45:45.506 [Debug] C READ, FileId={ Persistent: 0x00000000faee13d1, Volatile: 0x00000000ed889f95 }, Read 32768 bytes from offset 0 >2020-09-25 06:45:46.207 [Debug] R READ, Read 32768 bytes >2020-09-25 06:45:46.208 [Debug] C CLOSE, FileId={ Persistent: 0x00000000faee13d1, Volatile: 0x00000000ed889f95 } >2020-09-25 06:45:46.514 [Debug] R CLOSE >2020-09-25 06:45:46.515 [Debug] C TREE DISCONNECT, TreeId=0xa5cc8055 >2020-09-25 06:45:46.654 [Debug] R TREE DISCONNECT >2020-09-25 06:45:46.654 [Debug] C LOGOFF, SessionId=3725431111 >2020-09-25 06:45:46.793 [Debug] R LOGOFF >2020-09-25 06:45:46.794 [TestStep] Verify the contents read from alternative channel are the same as the one written by main channel. >2020-09-25 06:45:46.795 [CheckSucceeded] Assert.IsTrue succeeded. Content read should be identical to content written. >2020-09-25 06:45:46.797 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:45:46.797 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:45:54.787 [TestPassed] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_MultiChannelOnSameNic</output> > <traits> > <trait name="Category" value="Smb30" /> > <trait name="Category" value="MultipleChannel" /> > <trait name="Category" value="Positive" /> > </traits> > </test> > <test name="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_SecondChannelSessionSetupFailAtFirstTime" type="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic" method="MultipleChannel_SecondChannelSessionSetupFailAtFirstTime" time="20.794" result="Fail"> > <output>2020-09-25 06:45:54.857 [TestInProgress] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_SecondChannelSessionSetupFailAtFirstTime >2020-09-25 06:45:54.863 [Comment] This case is to test whether server calculates PreauthIntegrityHashValue correctly if it returns failure for the first session setup in the alternative channel. >2020-09-25 06:45:54.863 [Debug] SecurityPackage for authentication: Negotiate >2020-09-25 06:45:54.870 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic1IPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:45:54.870 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic2IPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:45:54.871 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:45:54.871 [CheckSucceeded] Assume.IsTrue succeeded. SutAlternativeIPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:45:54.874 [CheckSucceeded] Assert.IsTrue succeeded. Client should have at least one IP address >2020-09-25 06:45:54.874 [CheckSucceeded] Assert.IsTrue succeeded. Server should have more than one IP address >2020-09-25 06:45:54.875 [TestStep] Start to write content to file from main channel with client 192.168.142.110 and server 192.168.144.9 >2020-09-25 06:45:54.882 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:45:54.882 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 06:45:55.018 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:45:56.998 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:45:56.998 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:45:56.999 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:45:56.999 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:45:58.061 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:45:58.064 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:45:58.064 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:45:58.065 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:45:58.065 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:45:58.862 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:46:00.508 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=3850903017 >2020-09-25 06:46:00.553 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:46:01.045 [Debug] R TREE CONNECT, TreeId=0xb6741378 >2020-09-25 06:46:01.046 [Debug] C CREATE, File=MultipleChannel_SecondChannelSessionSetupFailAtFirstTime_636696bc-f55b-476c-bf64-45b4c1865093, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:46:01.358 [Debug] R CREATE, FileId={ Persistent: 0x00000000ad550d5c, Volatile: 0x00000000880acdce } >2020-09-25 06:46:01.358 [Debug] C WRITE, FileId={ Persistent: 0x00000000ad550d5c, Volatile: 0x00000000880acdce }, Write 32768 bytes from offset 0 >2020-09-25 06:46:02.077 [Debug] R WRITE, Written 32768 bytes >2020-09-25 06:46:02.077 [TestStep] Set up alternative channel with client 192.168.142.110 and server 192.168.144.9 >2020-09-25 06:46:02.078 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:46:02.078 [Debug] Connect to server over TCP from IP 192.168.142.111 to IP 192.168.144.10 >2020-09-25 06:46:02.214 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:46:03.806 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:46:03.807 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:46:03.808 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:46:03.809 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:46:05.307 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:46:05.311 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:46:05.312 [CheckSucceeded] Assert.AreEqual succeeded. Negotiation should succeed, actually server returns STATUS_SUCCESS. >2020-09-25 06:46:05.312 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:46:05.313 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:46:06.091 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:46:06.404 [Debug] R SESSION_SETUP, ErrorCode=STATUS_INVALID_PARAMETER >2020-09-25 06:46:06.405 [CheckSucceeded] Assert.AreEqual succeeded. The first SessionSetup from alternative channel should return STATUS_INVALID_PARAMETER since the token in buffer field is set to an invalid value. >2020-09-25 06:46:07.175 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:46:07.529 [Debug] R SESSION_SETUP, ErrorCode=STATUS_USER_SESSION_DELETED >2020-09-25 06:46:07.531 [CheckFailed] Assert.AreEqual failed. Expected: <0 (0x00000000)>, Actual: <3221225987 (0xC0000203)>. The second SessionSetup from alternative channel should succeed >2020-09-25 06:46:07.559 [Comment] at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_SecondChannelSessionSetupFailAtFirstTime() in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 449 >2020-09-25 06:46:07.571 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:46:07.571 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:46:15.570 [TestFailed] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_SecondChannelSessionSetupFailAtFirstTime</output> > <failure> > <message>Assert.AreEqual failed. Expected: <0 (0x00000000)>, Actual: <3221225987 (0xC0000203)>. The second SessionSetup from alternative channel should succeed >===== Stack Trace ===== > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_SecondChannelSessionSetupFailAtFirstTime() in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 449 >=== End of Stack Trace ===</message> > <stack-trace> at Microsoft.Protocols.TestTools.AsynchronousErrorProcessor.Process() > at Microsoft.Protocols.TestTools.AsynchronousErrorProcessor.ReportAsyncException(Exception checkerException) > at Microsoft.Protocols.TestTools.Checking.DefaultChecker`2.GenerateException(CheckResult checkResult, String message, Object[] parameters) > at Microsoft.Protocols.TestTools.Checking.DefaultChecker`2.AreEqual[T](T expected, T actual, String message, Object[] parameters) > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelBasic.MultipleChannel_SecondChannelSessionSetupFailAtFirstTime() in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelBasic.cs:line 449</stack-trace> > </failure> > <traits> > <trait name="Category" value="Smb311" /> > <trait name="Category" value="MultipleChannel" /> > <trait name="Category" value="UnexpectedFields" /> > </traits> > </test> > </collection> > <collection name="Test Collection for Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest" total="2" passed="0" failed="2" skipped="0" time="124.125"> > <test name="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnDiffChannel" type="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest" method="MultipleChannel_LockUnlockOnDiffChannel" time="65.782" result="Fail"> > <output>2020-09-25 06:46:15.654 [Comment] Expected execution time of the test suite (in seconds) is: >2020-09-25 06:46:15.655 [TestInProgress] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnDiffChannel >2020-09-25 06:46:15.656 [Comment] Operate file via multi-channel with lock operation on different channels. >2020-09-25 06:46:15.657 [Debug] SecurityPackage for authentication: Negotiate >2020-09-25 06:46:15.657 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic1IPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:46:15.657 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic2IPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:46:15.657 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:46:15.657 [CheckSucceeded] Assume.IsTrue succeeded. SutAlternativeIPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:46:15.657 [CheckSucceeded] Assert.IsTrue succeeded. Client should have more than one IP address >2020-09-25 06:46:15.657 [CheckSucceeded] Assert.IsTrue succeeded. Server should have more than one IP address >2020-09-25 06:46:15.660 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:46:15.668 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:46:23.680 [Debug] Create a directory MultipleChannel_LockUnlockOnDiffChannel_82f213a7-f6e3-46c7-83b7-cc13ede5925e in the share \\Jones-450-1685\SMBBasic. >2020-09-25 06:46:23.685 [TestStep] Establish main channel with client 192.168.142.110 and server 192.168.144.9. >2020-09-25 06:46:23.688 [Debug] Establish main channel to connect share \\Jones-450-1685\SMBBasic with following steps. >2020-09-25 06:46:23.688 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:46:23.688 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 06:46:23.824 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:46:25.809 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:46:25.809 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:46:25.810 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:46:25.812 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Ciphers={ENCRYPTION_AES128_GCM,ENCRYPTION_AES128_CCM}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING, GLOBAL_CAP_ENCRYPTION >2020-09-25 06:46:26.877 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Ciphers={ENCRYPTION_AES128_CCM}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:46:26.880 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:46:26.881 [CheckSucceeded] Assert.AreEqual succeeded. CREATE should succeed. >2020-09-25 06:46:26.881 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:46:26.881 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:46:26.882 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_ENCRYPTION_CAPABILITIES.CipherCount MUST be set to 1 >2020-09-25 06:46:27.672 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:46:29.456 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=2993981840 >2020-09-25 06:46:29.501 [Debug] Global encryption disabled >2020-09-25 06:46:29.501 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\IPC$ >2020-09-25 06:46:29.824 [Debug] R TREE CONNECT, TreeId=0xe7d055d4 >2020-09-25 06:46:29.825 [Debug] C IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO, FileId={ Persistent: 0xffffffffffffffff, Volatile: 0xffffffffffffffff } >2020-09-25 06:46:30.137 [Debug] R IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:46:30.140 [Debug] Get NETWORK_INTERFACE_INFO: 192.168.144.10 >2020-09-25 06:46:30.140 [Debug] Address queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO matches server second address 192.168.144.10 >2020-09-25 06:46:30.141 [CheckSucceeded] Assert.IsTrue succeeded. Second address 192.168.144.10 should be queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:46:30.142 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:46:30.314 [Debug] R TREE CONNECT, TreeId=0xc169b0b6 >2020-09-25 06:46:30.315 [CheckSucceeded] Assert.AreEqual succeeded. TreeConnect should succeed. >2020-09-25 06:46:30.315 [Debug] Per share encryption for TreeId=0xc169b0b6 : False >2020-09-25 06:46:30.315 [Debug] Finish establishing main channel to connect share \\Jones-450-1685\SMBBasic >2020-09-25 06:46:30.315 [TestStep] Main channel: CREATE file. >2020-09-25 06:46:30.317 [Debug] C CREATE, File=MultipleChannel_LockUnlockOnDiffChannel_45d8f674-6625-494f-bde5-cd3768fa9343, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:46:30.458 [Debug] R CREATE, FileId={ Persistent: 0x0000000058177b70, Volatile: 0x00000000f6174fec } >2020-09-25 06:46:30.459 [TestStep] Main channel: WRITE content to file. >2020-09-25 06:46:30.460 [Debug] C WRITE, FileId={ Persistent: 0x0000000058177b70, Volatile: 0x00000000f6174fec }, Write 32768 bytes from offset 0 >2020-09-25 06:46:31.184 [Debug] R WRITE, Written 32768 bytes >2020-09-25 06:46:31.184 [TestStep] Main channel client starts to lock a byte range for file "MultipleChannel_LockUnlockOnDiffChannel_45d8f674-6625-494f-bde5-cd3768fa9343" with parameters offset:0, length:32768, flags: LOCKFLAG_SHARED_LOCK) >2020-09-25 06:46:31.190 [Debug] C LOCK, FileId={ Persistent: 0x0000000058177b70, Volatile: 0x00000000f6174fec } >2020-09-25 06:46:31.330 [Debug] R LOCK >2020-09-25 06:46:31.330 [TestStep] Main channel: attempts to write content within the locking range. >2020-09-25 06:46:31.331 [Debug] C WRITE, FileId={ Persistent: 0x0000000058177b70, Volatile: 0x00000000f6174fec }, Write 32768 bytes from offset 0 >2020-09-25 06:46:31.653 [Debug] R WRITE, ErrorCode=STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:46:31.654 [CheckSucceeded] Assert.AreNotEqual succeeded. Write should not success when shared lock is taken >2020-09-25 06:46:31.657 [CheckSucceeded] Assert.AreEqual succeeded. Server should return error STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:46:31.657 [Checkpoint] MS-SMB2_R3 >2020-09-25 06:46:31.658 [TestStep] Establish alternative channel with client 192.168.142.111 and server 192.168.144.10. >2020-09-25 06:46:31.659 [Debug] Establish alternative channel to connect share \\Jones-450-1685\SMBBasic >2020-09-25 06:46:31.659 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:46:31.659 [Debug] Connect to server over TCP from IP 192.168.142.111 to IP 192.168.144.10 >2020-09-25 06:46:31.795 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:46:33.383 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:46:33.383 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:46:33.384 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:46:33.384 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Ciphers={ENCRYPTION_AES128_GCM,ENCRYPTION_AES128_CCM}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING, GLOBAL_CAP_ENCRYPTION >2020-09-25 06:46:34.884 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Ciphers={ENCRYPTION_AES128_CCM}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:46:34.893 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:46:34.893 [CheckSucceeded] Assert.AreEqual succeeded. CREATE should succeed. >2020-09-25 06:46:34.894 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:46:34.895 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:46:34.895 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_ENCRYPTION_CAPABILITIES.CipherCount MUST be set to 1 >2020-09-25 06:46:35.674 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:46:37.237 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=2993981840 >2020-09-25 06:46:37.283 [Debug] Per share encryption for TreeId=0xc169b0b6 : False >2020-09-25 06:46:37.283 [Debug] Establish alternative channel to connect share \\Jones-450-1685\SMBBasic >2020-09-25 06:46:37.284 [Debug] Alternative channel: attempts to randomly read the locking range with offset: 10487 and length: 6399 >2020-09-25 06:46:37.284 [Debug] C READ, FileId={ Persistent: 0x0000000058177b70, Volatile: 0x00000000f6174fec }, Read 6399 bytes from offset 10487 >2020-09-25 06:46:37.554 [Debug] R READ, Read 6399 bytes >2020-09-25 06:46:37.554 [TestStep] Alternative channel: attempts to write content to the locking range >2020-09-25 06:46:37.555 [Debug] C WRITE, FileId={ Persistent: 0x0000000058177b70, Volatile: 0x00000000f6174fec }, Write 32768 bytes from offset 0 >2020-09-25 06:46:38.261 [Debug] R WRITE, ErrorCode=STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:46:38.262 [CheckSucceeded] Assert.AreNotEqual succeeded. All opens MUST NOT be allowed to write within the range when SMB2_LOCKFLAG_SHARED_LOCK set >2020-09-25 06:46:38.262 [CheckSucceeded] Assert.AreEqual succeeded. Server should return error STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:46:38.262 [Checkpoint] MS-SMB2_R3 >2020-09-25 06:46:38.262 [TestStep] Read and write the locking range from Client3 when the file is locked >2020-09-25 06:46:38.265 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:46:38.265 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:46:38.265 [Debug] Connect to server 192.168.144.9 over TCP >2020-09-25 06:46:38.401 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:46:40.325 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:46:40.325 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:46:40.326 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:46:40.327 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:46:41.388 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:46:41.393 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:46:41.393 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:46:41.393 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:46:42.272 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:46:43.879 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=2177788263 >2020-09-25 06:46:43.923 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:46:44.231 [Debug] R TREE CONNECT, TreeId=0x854371f1 >2020-09-25 06:46:44.232 [Debug] C CREATE, File=MultipleChannel_LockUnlockOnDiffChannel_45d8f674-6625-494f-bde5-cd3768fa9343, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:46:44.545 [Debug] R CREATE, FileId={ Persistent: 0x00000000c0bba15e, Volatile: 0x00000000b7083bed } >2020-09-25 06:46:44.545 [Debug] C READ, FileId={ Persistent: 0x00000000c0bba15e, Volatile: 0x00000000b7083bed }, Read 6523 bytes from offset 25521 >2020-09-25 06:46:44.818 [Debug] R READ, Read 6523 bytes >2020-09-25 06:46:44.818 [Debug] C WRITE, FileId={ Persistent: 0x00000000c0bba15e, Volatile: 0x00000000b7083bed }, Write 32768 bytes from offset 0 >2020-09-25 06:46:45.544 [Debug] R WRITE, ErrorCode=STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:46:45.545 [CheckSucceeded] Assert.AreNotEqual succeeded. Write content to locked range of file from different client is not expected to success >2020-09-25 06:46:45.545 [CheckSucceeded] Assert.AreEqual succeeded. Server should return error STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:46:45.545 [Checkpoint] MS-SMB2_R3 >2020-09-25 06:46:45.546 [TestStep] From alternative channel client unlock the range >2020-09-25 06:46:45.547 [Debug] C LOCK, FileId={ Persistent: 0x0000000058177b70, Volatile: 0x00000000f6174fec } >2020-09-25 06:46:45.683 [Debug] R LOCK >2020-09-25 06:46:45.684 [TestStep] Read and write the locking range from Client3 when the file is unlocked >2020-09-25 06:46:45.685 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:46:45.685 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:46:45.686 [Debug] Connect to server 192.168.144.9 over TCP >2020-09-25 06:46:45.894 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:46:47.872 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:46:47.872 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:46:47.873 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:46:47.874 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:46:48.935 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:46:48.939 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:46:48.939 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:46:48.940 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:46:49.740 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:46:51.349 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=2431853197 >2020-09-25 06:46:51.400 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:46:51.888 [Debug] R TREE CONNECT, TreeId=0xf9ed157 >2020-09-25 06:46:51.888 [Debug] C CREATE, File=MultipleChannel_LockUnlockOnDiffChannel_45d8f674-6625-494f-bde5-cd3768fa9343, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:46:52.200 [Debug] R CREATE, FileId={ Persistent: 0x00000000d0d732fa, Volatile: 0x0000000019530aad } >2020-09-25 06:46:52.201 [Debug] C READ, FileId={ Persistent: 0x00000000d0d732fa, Volatile: 0x0000000019530aad }, Read 15822 bytes from offset 5299 >2020-09-25 06:46:52.603 [Debug] R READ, Read 15822 bytes >2020-09-25 06:46:52.603 [Debug] C WRITE, FileId={ Persistent: 0x00000000d0d732fa, Volatile: 0x0000000019530aad }, Write 32768 bytes from offset 0 >2020-09-25 06:46:53.325 [Debug] R WRITE, Written 32768 bytes >2020-09-25 06:46:53.325 [CheckSucceeded] Assert.AreEqual succeeded. Write content in file failed with error code=STATUS_SUCCESS >2020-09-25 06:46:53.327 [Debug] C CLOSE, FileId={ Persistent: 0x0000000058177b70, Volatile: 0x00000000f6174fec } >2020-09-25 06:47:05.357 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:47:05.357 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:47:13.372 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:47:13.372 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:47:21.372 [TestFailed] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnDiffChannel</output> > <failure> > <message>Test method Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnDiffChannel threw exception: >System.TimeoutException: The operation has timed out.</message> > <stack-trace> at Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.ReceivedPackets.WaitPacket(UInt64 messageId) in D:\a\1\s\ProtoSDK\MS-SMB2\Client\Smb2Client.cs:line 118 > at Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.Smb2Client.ExpectPacket[T](UInt64 messageId) in D:\a\1\s\ProtoSDK\MS-SMB2\Client\Smb2Client.cs:line 677 > at Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.Smb2Client.Close(UInt16 creditCharge, UInt16 creditRequest, Packet_Header_Flags_Values flags, UInt64 messageId, UInt64 sessionId, UInt32 treeId, FILEID fileId, Flags_Values closeFlags, Packet_Header& responseHeader, CLOSE_Response& responsePayload, UInt16 channelSequence) in D:\a\1\s\ProtoSDK\MS-SMB2\Client\Smb2Client.cs:line 1707 > at Microsoft.Protocols.TestSuites.FileSharing.Common.Adapter.Smb2FunctionalClient.Close(UInt32 treeId, FILEID fileId, ResponseChecker`1 checker, Flags_Values flags) in D:\a\1\s\TestSuites\FileServer\src\Common\Adapter\Smb2FunctionalClient.cs:line 1305 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.ClientTearDown(Smb2FunctionalClient client, UInt32 treeId, FILEID fileId) in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelExtendedTest.cs:line 290 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannelTestWithLock(Boolean lockUnlockOnSameChannel) in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelWithLock.cs:line 185 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnDiffChannel() in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelWithLock.cs:line 24</stack-trace> > </failure> > <traits> > <trait name="Category" value="Smb30" /> > <trait name="Category" value="MultipleChannel" /> > <trait name="Category" value="Positive" /> > </traits> > </test> > <test name="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnSameChannel" type="Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest" method="MultipleChannel_LockUnlockOnSameChannel" time="58.343" result="Fail"> > <output>2020-09-25 06:47:21.439 [TestInProgress] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnSameChannel >2020-09-25 06:47:21.450 [Comment] Operate file via multi-channel with lock operation on same channel. >2020-09-25 06:47:21.450 [Debug] SecurityPackage for authentication: Negotiate >2020-09-25 06:47:21.475 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic1IPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:47:21.476 [CheckSucceeded] Assume.IsTrue succeeded. ClientNic2IPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:47:21.476 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:47:21.476 [CheckSucceeded] Assume.IsTrue succeeded. SutAlternativeIPAddress should be a valid IP address or a resolvable host name with at least two IP addresses! >2020-09-25 06:47:21.476 [CheckSucceeded] Assert.IsTrue succeeded. Client should have more than one IP address >2020-09-25 06:47:21.476 [CheckSucceeded] Assert.IsTrue succeeded. Server should have more than one IP address >2020-09-25 06:47:21.477 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:47:21.477 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:47:29.466 [Debug] Create a directory MultipleChannel_LockUnlockOnSameChannel_a80c7328-4079-41fe-9da0-60da6cb97d1b in the share \\Jones-450-1685\SMBBasic. >2020-09-25 06:47:29.468 [TestStep] Establish main channel with client 192.168.142.110 and server 192.168.144.9. >2020-09-25 06:47:29.468 [Debug] Establish main channel to connect share \\Jones-450-1685\SMBBasic with following steps. >2020-09-25 06:47:29.469 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:47:29.469 [Debug] Connect to server over TCP from IP 192.168.142.110 to IP 192.168.144.9 >2020-09-25 06:47:29.605 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:47:31.582 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:47:31.583 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:47:31.584 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:47:31.585 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Ciphers={ENCRYPTION_AES128_GCM,ENCRYPTION_AES128_CCM}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING, GLOBAL_CAP_ENCRYPTION >2020-09-25 06:47:32.646 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Ciphers={ENCRYPTION_AES128_CCM}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:47:32.652 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:47:32.652 [CheckSucceeded] Assert.AreEqual succeeded. CREATE should succeed. >2020-09-25 06:47:32.653 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:47:32.654 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:47:32.654 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_ENCRYPTION_CAPABILITIES.CipherCount MUST be set to 1 >2020-09-25 06:47:33.455 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:47:35.233 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=1245455458 >2020-09-25 06:47:35.276 [Debug] Global encryption disabled >2020-09-25 06:47:35.276 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\IPC$ >2020-09-25 06:47:35.755 [Debug] R TREE CONNECT, TreeId=0x6184291b >2020-09-25 06:47:35.756 [Debug] C IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO, FileId={ Persistent: 0xffffffffffffffff, Volatile: 0xffffffffffffffff } >2020-09-25 06:47:36.083 [Debug] R IOCTL, CtlCode=FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:47:36.087 [Debug] Get NETWORK_INTERFACE_INFO: 192.168.144.10 >2020-09-25 06:47:36.088 [Debug] Address queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO matches server second address 192.168.144.10 >2020-09-25 06:47:36.089 [CheckSucceeded] Assert.IsTrue succeeded. Second address 192.168.144.10 should be queried by IOCTL request with FSCTL_QUERY_NETWORK_INTERFACE_INFO >2020-09-25 06:47:36.089 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:47:36.259 [Debug] R TREE CONNECT, TreeId=0x73deccb1 >2020-09-25 06:47:36.259 [CheckSucceeded] Assert.AreEqual succeeded. TreeConnect should succeed. >2020-09-25 06:47:36.260 [Debug] Per share encryption for TreeId=0x73deccb1 : False >2020-09-25 06:47:36.260 [Debug] Finish establishing main channel to connect share \\Jones-450-1685\SMBBasic >2020-09-25 06:47:36.260 [TestStep] Main channel: CREATE file. >2020-09-25 06:47:36.261 [Debug] C CREATE, File=MultipleChannel_LockUnlockOnSameChannel_47fc3b23-98eb-4f96-97f4-382653271278, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:47:36.403 [Debug] R CREATE, FileId={ Persistent: 0x000000006a8be17b, Volatile: 0x00000000e4e2b164 } >2020-09-25 06:47:36.403 [TestStep] Main channel: WRITE content to file. >2020-09-25 06:47:36.404 [Debug] C WRITE, FileId={ Persistent: 0x000000006a8be17b, Volatile: 0x00000000e4e2b164 }, Write 32768 bytes from offset 0 >2020-09-25 06:47:37.127 [Debug] R WRITE, Written 32768 bytes >2020-09-25 06:47:37.127 [TestStep] Main channel client starts to lock a byte range for file "MultipleChannel_LockUnlockOnSameChannel_47fc3b23-98eb-4f96-97f4-382653271278" with parameters offset:0, length:32768, flags: LOCKFLAG_SHARED_LOCK) >2020-09-25 06:47:37.129 [Debug] C LOCK, FileId={ Persistent: 0x000000006a8be17b, Volatile: 0x00000000e4e2b164 } >2020-09-25 06:47:37.267 [Debug] R LOCK >2020-09-25 06:47:37.267 [TestStep] Main channel: attempts to write content within the locking range. >2020-09-25 06:47:37.269 [Debug] C WRITE, FileId={ Persistent: 0x000000006a8be17b, Volatile: 0x00000000e4e2b164 }, Write 32768 bytes from offset 0 >2020-09-25 06:47:37.584 [Debug] R WRITE, ErrorCode=STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:47:37.584 [CheckSucceeded] Assert.AreNotEqual succeeded. Write should not success when shared lock is taken >2020-09-25 06:47:37.585 [CheckSucceeded] Assert.AreEqual succeeded. Server should return error STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:47:37.585 [Checkpoint] MS-SMB2_R3 >2020-09-25 06:47:37.586 [TestStep] Establish alternative channel with client 192.168.142.111 and server 192.168.144.10. >2020-09-25 06:47:37.586 [Debug] Establish alternative channel to connect share \\Jones-450-1685\SMBBasic >2020-09-25 06:47:37.586 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:47:37.586 [Debug] Connect to server over TCP from IP 192.168.142.111 to IP 192.168.144.10 >2020-09-25 06:47:37.722 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:47:39.314 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:47:39.314 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:47:39.315 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:47:39.316 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Ciphers={ENCRYPTION_AES128_GCM,ENCRYPTION_AES128_CCM}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING, GLOBAL_CAP_ENCRYPTION >2020-09-25 06:47:40.815 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Ciphers={ENCRYPTION_AES128_CCM}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:47:40.822 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:47:40.822 [CheckSucceeded] Assert.AreEqual succeeded. CREATE should succeed. >2020-09-25 06:47:40.823 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:47:40.823 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:47:40.824 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_ENCRYPTION_CAPABILITIES.CipherCount MUST be set to 1 >2020-09-25 06:47:41.700 [Debug] C SESSION_SETUP, Alternative Channel, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:47:43.260 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=1245455458 >2020-09-25 06:47:43.303 [Debug] Per share encryption for TreeId=0x73deccb1 : False >2020-09-25 06:47:43.303 [Debug] Establish alternative channel to connect share \\Jones-450-1685\SMBBasic >2020-09-25 06:47:43.304 [Debug] Alternative channel: attempts to randomly read the locking range with offset: 17788 and length: 6155 >2020-09-25 06:47:43.304 [Debug] C READ, FileId={ Persistent: 0x000000006a8be17b, Volatile: 0x00000000e4e2b164 }, Read 6155 bytes from offset 17788 >2020-09-25 06:47:43.575 [Debug] R READ, Read 6155 bytes >2020-09-25 06:47:43.575 [TestStep] Alternative channel: attempts to write content to the locking range >2020-09-25 06:47:43.576 [Debug] C WRITE, FileId={ Persistent: 0x000000006a8be17b, Volatile: 0x00000000e4e2b164 }, Write 32768 bytes from offset 0 >2020-09-25 06:47:44.286 [Debug] R WRITE, ErrorCode=STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:47:44.286 [CheckSucceeded] Assert.AreNotEqual succeeded. All opens MUST NOT be allowed to write within the range when SMB2_LOCKFLAG_SHARED_LOCK set >2020-09-25 06:47:44.286 [CheckSucceeded] Assert.AreEqual succeeded. Server should return error STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:47:44.287 [Checkpoint] MS-SMB2_R3 >2020-09-25 06:47:44.287 [TestStep] Read and write the locking range from Client3 when the file is locked >2020-09-25 06:47:44.288 [CheckSucceeded] Assume.IsTrue succeeded. SutIPAddress should be a valid IP address or a resolvable host name! >2020-09-25 06:47:44.288 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:47:44.289 [Debug] Connect to server 192.168.144.9 over TCP >2020-09-25 06:47:44.425 [Debug] Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.SmbNegotiateRequestPacket >2020-09-25 06:47:46.411 [Debug] R NEGOTIATE, Dialect=Smb2Wildcard, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU >2020-09-25 06:47:46.411 [CheckSucceeded] Assert.AreEqual succeeded. ComNegotiate should succeed. >2020-09-25 06:47:46.412 [Debug] The selected dialect is Smb2Wildcard >2020-09-25 06:47:46.412 [Debug] C NEGOTIATE, Dialects={Smb2002,Smb21,Smb30,Smb302,Smb311}, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL, GLOBAL_CAP_PERSISTENT_HANDLES, GLOBAL_CAP_DIRECTORY_LEASING >2020-09-25 06:47:47.489 [Debug] R NEGOTIATE, Dialect=Smb311, HashAlgorithms={SHA_512}, Capabilities=GLOBAL_CAP_DFS, GLOBAL_CAP_LEASING, GLOBAL_CAP_LARGE_MTU, GLOBAL_CAP_MULTI_CHANNEL >2020-09-25 06:47:47.492 [CheckSucceeded] Assert.IsTrue succeeded. The server SHOULD<168> grant the client a non-zero value of credits in response to any non-zero value requested, within administratively configured limits. The server MUST grant the client at least 1 credit when responding to SMB2 NEGOTIATE, actually server returns 1 >2020-09-25 06:47:47.492 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES.HashAlgorithmCount MUST be set to 1 >2020-09-25 06:47:47.493 [CheckSucceeded] Assert.AreEqual succeeded. The response's SMB2_PREAUTH_INTEGRITY_CAPABILITIES Salt buffer length must same as SaltLength >2020-09-25 06:47:48.265 [Debug] C SESSION_SETUP, SecurityMode=NEGOTIATE_SIGNING_ENABLED, Capabilities=GLOBAL_CAP_DFS >2020-09-25 06:47:49.888 [Debug] R SESSION_SETUP, SessionFlags=NONE, SessionId=3547206382 >2020-09-25 06:47:49.933 [Debug] C TREE CONNECT, Path=\\Jones-450-1685\SMBBasic >2020-09-25 06:47:50.255 [Debug] R TREE CONNECT, TreeId=0x27dcd4d6 >2020-09-25 06:47:50.256 [Debug] C CREATE, File=MultipleChannel_LockUnlockOnSameChannel_47fc3b23-98eb-4f96-97f4-382653271278, DesiredAccess=DELETE, GENERIC_WRITE, GENERIC_READ, ShareAccess=(RWD) >2020-09-25 06:47:50.569 [Debug] R CREATE, FileId={ Persistent: 0x00000000c4efcb62, Volatile: 0x0000000040b78dc6 } >2020-09-25 06:47:50.569 [Debug] C READ, FileId={ Persistent: 0x00000000c4efcb62, Volatile: 0x0000000040b78dc6 }, Read 26624 bytes from offset 703 >2020-09-25 06:47:50.973 [Debug] R READ, Read 26624 bytes >2020-09-25 06:47:50.974 [Debug] C WRITE, FileId={ Persistent: 0x00000000c4efcb62, Volatile: 0x0000000040b78dc6 }, Write 32768 bytes from offset 0 >2020-09-25 06:47:51.693 [Debug] R WRITE, ErrorCode=STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:47:51.693 [CheckSucceeded] Assert.AreNotEqual succeeded. Write content to locked range of file from different client is not expected to success >2020-09-25 06:47:51.694 [CheckSucceeded] Assert.AreEqual succeeded. Server should return error STATUS_FILE_LOCK_CONFLICT >2020-09-25 06:47:51.695 [Checkpoint] MS-SMB2_R3 >2020-09-25 06:47:51.696 [TestStep] From main channel client unlock the range >2020-09-25 06:47:51.698 [Debug] C LOCK, FileId={ Persistent: 0x000000006a8be17b, Volatile: 0x00000000e4e2b164 } >2020-09-25 06:48:03.704 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:48:03.704 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:48:11.720 [CheckSucceeded] Assert.IsTrue succeeded. serverIp should not be empty when transport type is TCP. >2020-09-25 06:48:11.720 [Debug] Connect to server 192.168.144.18 over TCP >2020-09-25 06:48:19.719 [TestFailed] Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnSameChannel</output> > <failure> > <message>Test method Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnSameChannel threw exception: >System.TimeoutException: The operation has timed out.</message> > <stack-trace> at Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.ReceivedPackets.WaitPacket(UInt64 messageId) in D:\a\1\s\ProtoSDK\MS-SMB2\Client\Smb2Client.cs:line 118 > at Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.Smb2Client.ExpectPacket[T](UInt64 messageId) in D:\a\1\s\ProtoSDK\MS-SMB2\Client\Smb2Client.cs:line 677 > at Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.Smb2Client.LockResponse(UInt64 messageId, Packet_Header& responseHeader, LOCK_Response& responsePayload) in D:\a\1\s\ProtoSDK\MS-SMB2\Client\Smb2Client.cs:line 2075 > at Microsoft.Protocols.TestTools.StackSdk.FileAccessService.Smb2.Smb2Client.Lock(UInt16 creditCharge, UInt16 creditRequest, Packet_Header_Flags_Values flags, UInt64 messageId, UInt64 sessionId, UInt32 treeId, UInt32 lockSequence, FILEID fileId, LOCK_ELEMENT[] locks, Packet_Header& responseHeader, LOCK_Response& responsePayload) in D:\a\1\s\ProtoSDK\MS-SMB2\Client\Smb2Client.cs:line 2032 > at Microsoft.Protocols.TestSuites.FileSharing.Common.Adapter.Smb2FunctionalClient.Lock(UInt32 treeId, UInt32 lockSequence, FILEID fileId, LOCK_ELEMENT[] locks, ResponseChecker`1 checker) in D:\a\1\s\TestSuites\FileServer\src\Common\Adapter\Smb2FunctionalClient.cs:line 2658 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannelTestWithLock(Boolean lockUnlockOnSameChannel) in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelWithLock.cs:line 169 > at Microsoft.Protocols.TestSuites.FileSharing.SMB2.TestSuite.MultipleChannelExtendedTest.MultipleChannel_LockUnlockOnSameChannel() in D:\a\1\s\TestSuites\FileServer\src\SMB2\TestSuite\MultipleChannel\MultipleChannelWithLock.cs:line 34</stack-trace> > </failure> > <traits> > <trait name="Category" value="Smb30" /> > <trait name="Category" value="MultipleChannel" /> > <trait name="Category" value="Positive" /> > </traits> > </test> > </collection> > </assembly> ></assemblies>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 14512
:
16259
| 16260 |
16261