* tests/btrfs.c (btrfs_test_send_ioctl): Assign key_reference to search_args for BTRFS_IOC_TREE_SEARCH ioctl tests. --- tests/btrfs.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/tests/btrfs.c b/tests/btrfs.c index ee731bb..d2b1637 100644 --- a/tests/btrfs.c +++ b/tests/btrfs.c @@ -851,7 +851,7 @@ btrfs_test_search_ioctls(void) ioctl(-1, BTRFS_IOC_TREE_SEARCH_V2, NULL); printf("ioctl(-1, BTRFS_IOC_TREE_SEARCH_V2, NULL) = -1 EBADF (%m)\n"); - search_args_v2.key = key_reference; + search_args.key = key_reference; printf("ioctl(-1, BTRFS_IOC_TREE_SEARCH, {"); btrfs_print_search_key(&search_args.key); ioctl(-1, BTRFS_IOC_TREE_SEARCH, &search_args); @@ -866,7 +866,7 @@ btrfs_test_search_ioctls(void) key_reference.min_objectid = 6; key_reference.max_objectid = 7; - search_args_v2.key = key_reference; + search_args.key = key_reference; printf("ioctl(-1, BTRFS_IOC_TREE_SEARCH, {"); btrfs_print_search_key(&search_args.key); ioctl(-1, BTRFS_IOC_TREE_SEARCH, &search_args); @@ -881,7 +881,7 @@ btrfs_test_search_ioctls(void) key_reference.min_offset++; key_reference.max_offset--; - search_args_v2.key = key_reference; + search_args.key = key_reference; printf("ioctl(-1, BTRFS_IOC_TREE_SEARCH, {"); btrfs_print_search_key(&search_args.key); ioctl(-1, BTRFS_IOC_TREE_SEARCH, &search_args); @@ -896,7 +896,7 @@ btrfs_test_search_ioctls(void) key_reference.min_transid++; key_reference.max_transid--; - search_args_v2.key = key_reference; + search_args.key = key_reference; printf("ioctl(-1, BTRFS_IOC_TREE_SEARCH, {"); btrfs_print_search_key(&search_args.key); ioctl(-1, BTRFS_IOC_TREE_SEARCH, &search_args); @@ -911,7 +911,7 @@ btrfs_test_search_ioctls(void) key_reference.min_type = 1; key_reference.max_type = 12; - search_args_v2.key = key_reference; + search_args.key = key_reference; printf("ioctl(-1, BTRFS_IOC_TREE_SEARCH, {"); btrfs_print_search_key(&search_args.key); ioctl(-1, BTRFS_IOC_TREE_SEARCH, &search_args); -- 2.7.1 -- Jeff Mahoney SUSE Labs ------------------------------------------------------------------------------ Mobile security can be enabling, not merely restricting. Employees who bring their own devices (BYOD) to work are irked by the imposition of MDM restrictions. Mobile Device Manager Plus allows you to control only the apps on BYO-devices by containerizing them, leaving personal data untouched! https://ad.doubleclick.net/ddm/clk/304595813;131938128;j _______________________________________________ Strace-devel mailing list Strace-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/strace-devel