The branch, master has been updated via 2052c2d s3-libsmb: remove unused cli_lock() via d29f849 s3-torture: run_locktest5(): replace cli_lock() with cli_lock32() via 8f7b7d7 s3-torture: run_locktest4(): replace cli_lock() with cli_lock32() via 69ed3a7 s3-torture: run_oplock2(): replace cli_lock() with cli_lock32() via 4dbdaa6 s3-torture: run_locktest9(): replace cli_lock() with cli_lock32() via ae92edc s3-torture: run_locktest8(): replace cli_lock() with cli_lock32() via a5d5308 s3-torture: run_locktest7(): replace cli_lock() with cli_lock32() via b0faf0b s3-torture: run_locktest3(): replace cli_lock() with cli_lock32() from df09511 s3-rpc_server: Fixed segfaults in rpc daemons.
http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master - Log ----------------------------------------------------------------- commit 2052c2d6fa830b94a6b6cf8dd48b56f62de4e5ac Author: Björn Baumbach <b...@sernet.de> Date: Mon Jul 18 14:14:01 2011 +0200 s3-libsmb: remove unused cli_lock() Replaced with cli_lock32() Signed-off-by: Stefan Metzmacher <me...@samba.org> Autobuild-User: Stefan Metzmacher <me...@samba.org> Autobuild-Date: Tue Jul 19 00:43:03 CEST 2011 on sn-devel-104 commit d29f8491bdc3e04e4644c7ad0d0ef79c6f1affc3 Author: Björn Baumbach <b...@sernet.de> Date: Mon Jul 18 14:09:50 2011 +0200 s3-torture: run_locktest5(): replace cli_lock() with cli_lock32() Signed-off-by: Stefan Metzmacher <me...@samba.org> commit 8f7b7d7aa2eb1eb27eb7c90c7056d46d198634d4 Author: Björn Baumbach <b...@sernet.de> Date: Mon Jul 18 14:03:55 2011 +0200 s3-torture: run_locktest4(): replace cli_lock() with cli_lock32() Signed-off-by: Stefan Metzmacher <me...@samba.org> commit 69ed3a780e26b53669ab00ddde99ac9c7bd10410 Author: Björn Baumbach <b...@sernet.de> Date: Mon Jul 18 13:19:12 2011 +0200 s3-torture: run_oplock2(): replace cli_lock() with cli_lock32() Signed-off-by: Stefan Metzmacher <me...@samba.org> commit 4dbdaa6608b8d97b685906e52d6fee3af7bc07ea Author: Björn Baumbach <b...@sernet.de> Date: Mon Jul 18 13:15:49 2011 +0200 s3-torture: run_locktest9(): replace cli_lock() with cli_lock32() Signed-off-by: Stefan Metzmacher <me...@samba.org> commit ae92edc46b3d90c0c59fb11e03920a093247ef0d Author: Björn Baumbach <b...@sernet.de> Date: Mon Jul 18 13:09:52 2011 +0200 s3-torture: run_locktest8(): replace cli_lock() with cli_lock32() Signed-off-by: Stefan Metzmacher <me...@samba.org> commit a5d5308073e81ba2da2cb95cac81b38aabe87afc Author: Björn Baumbach <b...@sernet.de> Date: Mon Jul 18 12:51:19 2011 +0200 s3-torture: run_locktest7(): replace cli_lock() with cli_lock32() Signed-off-by: Stefan Metzmacher <me...@samba.org> commit b0faf0bd26b275719bf44f742feed11d5acccde3 Author: Björn Baumbach <b...@sernet.de> Date: Mon Jul 18 12:39:35 2011 +0200 s3-torture: run_locktest3(): replace cli_lock() with cli_lock32() Signed-off-by: Stefan Metzmacher <me...@samba.org> ----------------------------------------------------------------------- Summary of changes: source3/libsmb/clifile.c | 16 ----- source3/libsmb/proto.h | 2 - source3/torture/torture.c | 164 ++++++++++++++++++++++++++------------------- 3 files changed, 94 insertions(+), 88 deletions(-) Changeset truncated at 500 lines: diff --git a/source3/libsmb/clifile.c b/source3/libsmb/clifile.c index a5be748..8cf60de 100644 --- a/source3/libsmb/clifile.c +++ b/source3/libsmb/clifile.c @@ -2592,22 +2592,6 @@ NTSTATUS cli_lock32(struct cli_state *cli, uint16_t fnum, } /**************************************************************************** - Lock a file. - note that timeout is in units of 2 milliseconds -****************************************************************************/ - -bool cli_lock(struct cli_state *cli, uint16_t fnum, - uint32_t offset, uint32_t len, int timeout, - enum brl_type lock_type) -{ - NTSTATUS status; - - status = cli_locktype(cli, fnum, offset, len, timeout, - (lock_type == READ_LOCK? 1 : 0)); - return NT_STATUS_IS_OK(status); -} - -/**************************************************************************** Unlock a file. ****************************************************************************/ diff --git a/source3/libsmb/proto.h b/source3/libsmb/proto.h index 0029db1..070b4b1 100644 --- a/source3/libsmb/proto.h +++ b/source3/libsmb/proto.h @@ -388,8 +388,6 @@ NTSTATUS cli_ftruncate(struct cli_state *cli, uint16_t fnum, uint64_t size); NTSTATUS cli_locktype(struct cli_state *cli, uint16_t fnum, uint32_t offset, uint32_t len, int timeout, unsigned char locktype); -bool cli_lock(struct cli_state *cli, uint16_t fnum, - uint32_t offset, uint32_t len, int timeout, enum brl_type lock_type); NTSTATUS cli_lock32(struct cli_state *cli, uint16_t fnum, uint32_t offset, uint32_t len, int timeout, enum brl_type lock_type); struct tevent_req *cli_unlock_send(TALLOC_CTX *mem_ctx, diff --git a/source3/torture/torture.c b/source3/torture/torture.c index d40d5aa..39d7ad3 100644 --- a/source3/torture/torture.c +++ b/source3/torture/torture.c @@ -1797,17 +1797,20 @@ static bool run_locktest3(int dummy) for (offset=i=0;i<torture_numops;i++) { NEXT_OFFSET; - if (!cli_lock(cli1, fnum1, offset-1, 1, 0, WRITE_LOCK)) { + + status = cli_lock32(cli1, fnum1, offset-1, 1, 0, WRITE_LOCK); + if (!NT_STATUS_IS_OK(status)) { printf("lock1 %d failed (%s)\n", i, - cli_errstr(cli1)); + nt_errstr(status)); return False; } - if (!cli_lock(cli2, fnum2, offset-2, 1, 0, WRITE_LOCK)) { + status = cli_lock32(cli2, fnum2, offset-2, 1, 0, WRITE_LOCK); + if (!NT_STATUS_IS_OK(status)) { printf("lock2 %d failed (%s)\n", i, - cli_errstr(cli1)); + nt_errstr(status)); return False; } } @@ -1815,22 +1818,26 @@ static bool run_locktest3(int dummy) for (offset=i=0;i<torture_numops;i++) { NEXT_OFFSET; - if (cli_lock(cli1, fnum1, offset-2, 1, 0, WRITE_LOCK)) { + status = cli_lock32(cli1, fnum1, offset-2, 1, 0, WRITE_LOCK); + if (NT_STATUS_IS_OK(status)) { printf("error: lock1 %d succeeded!\n", i); return False; } - if (cli_lock(cli2, fnum2, offset-1, 1, 0, WRITE_LOCK)) { + status = cli_lock32(cli2, fnum2, offset-1, 1, 0, WRITE_LOCK); + if (NT_STATUS_IS_OK(status)) { printf("error: lock2 %d succeeded!\n", i); return False; } - if (cli_lock(cli1, fnum1, offset-1, 1, 0, WRITE_LOCK)) { + status = cli_lock32(cli1, fnum1, offset-1, 1, 0, WRITE_LOCK); + if (NT_STATUS_IS_OK(status)) { printf("error: lock3 %d succeeded!\n", i); return False; } - if (cli_lock(cli2, fnum2, offset-2, 1, 0, WRITE_LOCK)) { + status = cli_lock32(cli2, fnum2, offset-2, 1, 0, WRITE_LOCK); + if (NT_STATUS_IS_OK(status)) { printf("error: lock4 %d succeeded!\n", i); return False; } @@ -1928,74 +1935,81 @@ static bool run_locktest4(int dummy) goto fail; } - ret = cli_lock(cli1, fnum1, 0, 4, 0, WRITE_LOCK) && - cli_lock(cli1, fnum1, 2, 4, 0, WRITE_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 0, 4, 0, WRITE_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 2, 4, 0, WRITE_LOCK)); EXPECTED(ret, False); printf("the same process %s set overlapping write locks\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 10, 4, 0, READ_LOCK) && - cli_lock(cli1, fnum1, 12, 4, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 10, 4, 0, READ_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 12, 4, 0, READ_LOCK)); EXPECTED(ret, True); printf("the same process %s set overlapping read locks\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 20, 4, 0, WRITE_LOCK) && - cli_lock(cli2, fnum2, 22, 4, 0, WRITE_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 20, 4, 0, WRITE_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli2, fnum2, 22, 4, 0, WRITE_LOCK)); EXPECTED(ret, False); printf("a different connection %s set overlapping write locks\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 30, 4, 0, READ_LOCK) && - cli_lock(cli2, fnum2, 32, 4, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 30, 4, 0, READ_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli2, fnum2, 32, 4, 0, READ_LOCK)); EXPECTED(ret, True); printf("a different connection %s set overlapping read locks\n", ret?"can":"cannot"); - ret = (cli_setpid(cli1, 1), cli_lock(cli1, fnum1, 40, 4, 0, WRITE_LOCK)) && - (cli_setpid(cli1, 2), cli_lock(cli1, fnum1, 42, 4, 0, WRITE_LOCK)); + ret = (cli_setpid(cli1, 1), + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 40, 4, 0, WRITE_LOCK))) && + (cli_setpid(cli1, 2), + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 42, 4, 0, WRITE_LOCK))); EXPECTED(ret, False); printf("a different pid %s set overlapping write locks\n", ret?"can":"cannot"); - ret = (cli_setpid(cli1, 1), cli_lock(cli1, fnum1, 50, 4, 0, READ_LOCK)) && - (cli_setpid(cli1, 2), cli_lock(cli1, fnum1, 52, 4, 0, READ_LOCK)); + ret = (cli_setpid(cli1, 1), + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 50, 4, 0, READ_LOCK))) && + (cli_setpid(cli1, 2), + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 52, 4, 0, READ_LOCK))); EXPECTED(ret, True); printf("a different pid %s set overlapping read locks\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 60, 4, 0, READ_LOCK) && - cli_lock(cli1, fnum1, 60, 4, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 60, 4, 0, READ_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 60, 4, 0, READ_LOCK)); EXPECTED(ret, True); printf("the same process %s set the same read lock twice\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 70, 4, 0, WRITE_LOCK) && - cli_lock(cli1, fnum1, 70, 4, 0, WRITE_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 70, 4, 0, WRITE_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 70, 4, 0, WRITE_LOCK)); EXPECTED(ret, False); printf("the same process %s set the same write lock twice\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 80, 4, 0, READ_LOCK) && - cli_lock(cli1, fnum1, 80, 4, 0, WRITE_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 80, 4, 0, READ_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 80, 4, 0, WRITE_LOCK)); EXPECTED(ret, False); printf("the same process %s overlay a read lock with a write lock\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 90, 4, 0, WRITE_LOCK) && - cli_lock(cli1, fnum1, 90, 4, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 90, 4, 0, WRITE_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 90, 4, 0, READ_LOCK)); EXPECTED(ret, True); printf("the same process %s overlay a write lock with a read lock\n", ret?"can":"cannot"); - ret = (cli_setpid(cli1, 1), cli_lock(cli1, fnum1, 100, 4, 0, WRITE_LOCK)) && - (cli_setpid(cli1, 2), cli_lock(cli1, fnum1, 100, 4, 0, READ_LOCK)); + ret = (cli_setpid(cli1, 1), + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 100, 4, 0, WRITE_LOCK))) && + (cli_setpid(cli1, 2), + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 100, 4, 0, READ_LOCK))); EXPECTED(ret, False); printf("a different pid %s overlay a write lock with a read lock\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 110, 4, 0, READ_LOCK) && - cli_lock(cli1, fnum1, 112, 4, 0, READ_LOCK) && + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 110, 4, 0, READ_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 112, 4, 0, READ_LOCK)) && NT_STATUS_IS_OK(cli_unlock(cli1, fnum1, 110, 6)); EXPECTED(ret, False); printf("the same process %s coalesce read locks\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 120, 4, 0, WRITE_LOCK) && + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 120, 4, 0, WRITE_LOCK)) && (cli_read(cli2, fnum2, buf, 120, 4) == 4); EXPECTED(ret, False); printf("this server %s strict write locking\n", ret?"doesn't do":"does"); - ret = cli_lock(cli1, fnum1, 130, 4, 0, READ_LOCK); + status = cli_lock32(cli1, fnum1, 130, 4, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(status); if (ret) { status = cli_writeall(cli2, fnum2, 0, (uint8_t *)buf, 130, 4, NULL); @@ -2005,16 +2019,16 @@ static bool run_locktest4(int dummy) printf("this server %s strict read locking\n", ret?"doesn't do":"does"); - ret = cli_lock(cli1, fnum1, 140, 4, 0, READ_LOCK) && - cli_lock(cli1, fnum1, 140, 4, 0, READ_LOCK) && + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 140, 4, 0, READ_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 140, 4, 0, READ_LOCK)) && NT_STATUS_IS_OK(cli_unlock(cli1, fnum1, 140, 4)) && NT_STATUS_IS_OK(cli_unlock(cli1, fnum1, 140, 4)); EXPECTED(ret, True); printf("this server %s do recursive read locking\n", ret?"does":"doesn't"); - ret = cli_lock(cli1, fnum1, 150, 4, 0, WRITE_LOCK) && - cli_lock(cli1, fnum1, 150, 4, 0, READ_LOCK) && + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 150, 4, 0, WRITE_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 150, 4, 0, READ_LOCK)) && NT_STATUS_IS_OK(cli_unlock(cli1, fnum1, 150, 4)) && (cli_read(cli2, fnum2, buf, 150, 4) == 4) && !(NT_STATUS_IS_OK(cli_writeall(cli2, fnum2, 0, (uint8_t *)buf, @@ -2023,7 +2037,7 @@ static bool run_locktest4(int dummy) EXPECTED(ret, True); printf("this server %s do recursive lock overlays\n", ret?"does":"doesn't"); - ret = cli_lock(cli1, fnum1, 160, 4, 0, READ_LOCK) && + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 160, 4, 0, READ_LOCK)) && NT_STATUS_IS_OK(cli_unlock(cli1, fnum1, 160, 4)) && NT_STATUS_IS_OK(cli_writeall(cli2, fnum2, 0, (uint8_t *)buf, 160, 4, NULL)) && @@ -2031,7 +2045,7 @@ static bool run_locktest4(int dummy) EXPECTED(ret, True); printf("the same process %s remove a read lock using write locking\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 170, 4, 0, WRITE_LOCK) && + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 170, 4, 0, WRITE_LOCK)) && NT_STATUS_IS_OK(cli_unlock(cli1, fnum1, 170, 4)) && NT_STATUS_IS_OK(cli_writeall(cli2, fnum2, 0, (uint8_t *)buf, 170, 4, NULL)) && @@ -2039,8 +2053,8 @@ static bool run_locktest4(int dummy) EXPECTED(ret, True); printf("the same process %s remove a write lock using read locking\n", ret?"can":"cannot"); - ret = cli_lock(cli1, fnum1, 190, 4, 0, WRITE_LOCK) && - cli_lock(cli1, fnum1, 190, 4, 0, READ_LOCK) && + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 190, 4, 0, WRITE_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 190, 4, 0, READ_LOCK)) && NT_STATUS_IS_OK(cli_unlock(cli1, fnum1, 190, 4)) && !NT_STATUS_IS_OK(cli_writeall(cli2, fnum2, 0, (uint8_t *)buf, 190, 4, NULL)) && @@ -2052,11 +2066,11 @@ static bool run_locktest4(int dummy) cli_close(cli2, fnum2); cli_open(cli1, fname, O_RDWR, DENY_NONE, &fnum1); cli_open(cli1, fname, O_RDWR, DENY_NONE, &f); - ret = cli_lock(cli1, fnum1, 0, 8, 0, READ_LOCK) && - cli_lock(cli1, f, 0, 1, 0, READ_LOCK) && + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 0, 8, 0, READ_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, f, 0, 1, 0, READ_LOCK)) && NT_STATUS_IS_OK(cli_close(cli1, fnum1)) && NT_STATUS_IS_OK(cli_open(cli1, fname, O_RDWR, DENY_NONE, &fnum1)) && - cli_lock(cli1, fnum1, 7, 1, 0, WRITE_LOCK); + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 7, 1, 0, WRITE_LOCK)); cli_close(cli1, f); cli_close(cli1, fnum1); EXPECTED(ret, True); @@ -2112,23 +2126,25 @@ static bool run_locktest5(int dummy) } /* Check for NT bug... */ - ret = cli_lock(cli1, fnum1, 0, 8, 0, READ_LOCK) && - cli_lock(cli1, fnum3, 0, 1, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 0, 8, 0, READ_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum3, 0, 1, 0, READ_LOCK)); cli_close(cli1, fnum1); cli_open(cli1, fname, O_RDWR, DENY_NONE, &fnum1); - ret = cli_lock(cli1, fnum1, 7, 1, 0, WRITE_LOCK); + status = cli_lock32(cli1, fnum1, 7, 1, 0, WRITE_LOCK); + ret = NT_STATUS_IS_OK(status); EXPECTED(ret, True); printf("this server %s the NT locking bug\n", ret ? "doesn't have" : "has"); cli_close(cli1, fnum1); cli_open(cli1, fname, O_RDWR, DENY_NONE, &fnum1); cli_unlock(cli1, fnum3, 0, 1); - ret = cli_lock(cli1, fnum1, 0, 4, 0, WRITE_LOCK) && - cli_lock(cli1, fnum1, 1, 1, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 0, 4, 0, WRITE_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 1, 1, 0, READ_LOCK)); EXPECTED(ret, True); printf("the same process %s overlay a write with a read lock\n", ret?"can":"cannot"); - ret = cli_lock(cli2, fnum2, 0, 4, 0, READ_LOCK); + status = cli_lock32(cli2, fnum2, 0, 4, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(status); EXPECTED(ret, False); printf("a different processs %s get a read lock on the first process lock stack\n", ret?"can":"cannot"); @@ -2136,7 +2152,8 @@ static bool run_locktest5(int dummy) /* Unlock the process 2 lock. */ cli_unlock(cli2, fnum2, 0, 4); - ret = cli_lock(cli1, fnum3, 0, 4, 0, READ_LOCK); + status = cli_lock32(cli1, fnum3, 0, 4, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(status); EXPECTED(ret, False); printf("the same processs on a different fnum %s get a read lock\n", ret?"can":"cannot"); @@ -2145,8 +2162,8 @@ static bool run_locktest5(int dummy) cli_unlock(cli1, fnum3, 0, 4); /* Stack 2 more locks here. */ - ret = cli_lock(cli1, fnum1, 0, 4, 0, READ_LOCK) && - cli_lock(cli1, fnum1, 0, 4, 0, READ_LOCK); + ret = NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 0, 4, 0, READ_LOCK)) && + NT_STATUS_IS_OK(cli_lock32(cli1, fnum1, 0, 4, 0, READ_LOCK)); EXPECTED(ret, True); printf("the same process %s stack read locks\n", ret?"can":"cannot"); @@ -2155,7 +2172,7 @@ static bool run_locktest5(int dummy) removed. */ ret = NT_STATUS_IS_OK(cli_unlock(cli1, fnum1, 0, 4)) && - cli_lock(cli2, fnum2, 0, 4, 0, READ_LOCK); + NT_STATUS_IS_OK(cli_lock32(cli2, fnum2, 0, 4, 0, READ_LOCK)); EXPECTED(ret, True); printf("the first unlock removes the %s lock\n", ret?"WRITE":"READ"); @@ -2178,7 +2195,8 @@ static bool run_locktest5(int dummy) printf("the same process %s count the lock stack\n", !ret?"can":"cannot"); /* Ensure connection 2 can get a write lock. */ - ret = cli_lock(cli2, fnum2, 0, 4, 0, WRITE_LOCK); + status = cli_lock32(cli2, fnum2, 0, 4, 0, WRITE_LOCK); + ret = NT_STATUS_IS_OK(status); EXPECTED(ret, True); printf("a different processs %s get a write lock on the unlocked stack\n", ret?"can":"cannot"); @@ -2275,8 +2293,9 @@ static bool run_locktest7(int dummy) cli_setpid(cli1, 1); - if (!cli_lock(cli1, fnum1, 130, 4, 0, READ_LOCK)) { - printf("Unable to apply read lock on range 130:4, error was %s\n", cli_errstr(cli1)); + status = cli_lock32(cli1, fnum1, 130, 4, 0, READ_LOCK); + if (!NT_STATUS_IS_OK(status)) { + printf("Unable to apply read lock on range 130:4, error was %s\n", nt_errstr(status)); goto fail; } else { printf("pid1 successfully locked range 130:4 for READ\n"); @@ -2326,8 +2345,9 @@ static bool run_locktest7(int dummy) cli_setpid(cli1, 1); cli_unlock(cli1, fnum1, 130, 4); - if (!cli_lock(cli1, fnum1, 130, 4, 0, WRITE_LOCK)) { - printf("Unable to apply write lock on range 130:4, error was %s\n", cli_errstr(cli1)); + status = cli_lock32(cli1, fnum1, 130, 4, 0, WRITE_LOCK); + if (!NT_STATUS_IS_OK(status)) { + printf("Unable to apply write lock on range 130:4, error was %s\n", nt_errstr(status)); goto fail; } else { printf("pid1 successfully locked range 130:4 for WRITE\n"); @@ -2430,9 +2450,10 @@ static bool run_locktest8(int dummy) goto fail; } - if (!cli_lock(cli1, fnum2, 1, 1, 0, READ_LOCK)) { + status = cli_lock32(cli1, fnum2, 1, 1, 0, READ_LOCK); + if (!NT_STATUS_IS_OK(status)) { printf("Unable to apply read lock on range 1:1, error was " - "%s\n", cli_errstr(cli1)); + "%s\n", nt_errstr(status)); goto fail; } @@ -2612,7 +2633,8 @@ static bool run_locktest9(int dummy) } /* Ensure the child has the lock. */ - if (cli_lock(cli1, fnum, 0, 4, 0, WRITE_LOCK)) { + status = cli_lock32(cli1, fnum, 0, 4, 0, WRITE_LOCK); + if (NT_STATUS_IS_OK(status)) { d_fprintf(stderr, "Got the lock on range 0:4 - this should not happen !\n"); goto fail; } else { @@ -2634,9 +2656,10 @@ static bool run_locktest9(int dummy) start = timeval_current(); - if (!cli_lock(cli1, fnum, 0, 4, -1, WRITE_LOCK)) { + status = cli_lock32(cli1, fnum, 0, 4, -1, WRITE_LOCK); + if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, "Unable to apply write lock on range 0:4, error was " - "%s\n", cli_errstr(cli1)); + "%s\n", nt_errstr(status)); goto fail_nofd; } alarm(0); @@ -3523,9 +3546,9 @@ static bool run_oplock2(int dummy) /* Should now be at level II. */ /* Test if sending a write locks causes a break to none. */ - - if (!cli_lock(cli1, fnum1, 0, 4, 0, READ_LOCK)) { - printf("lock failed (%s)\n", cli_errstr(cli1)); + status = cli_lock32(cli1, fnum1, 0, 4, 0, READ_LOCK); + if (!NT_STATUS_IS_OK(status)) { + printf("lock failed (%s)\n", nt_errstr(status)); correct = False; } @@ -3533,8 +3556,9 @@ static bool run_oplock2(int dummy) sleep(2); - if (!cli_lock(cli1, fnum1, 0, 4, 0, WRITE_LOCK)) { - printf("lock failed (%s)\n", cli_errstr(cli1)); + status = cli_lock32(cli1, fnum1, 0, 4, 0, WRITE_LOCK); + if (!NT_STATUS_IS_OK(status)) { + printf("lock failed (%s)\n", nt_errstr(status)); correct = False; } -- Samba Shared Repository