[LTP] [RFC PATCH 1/1] Remove nfsv4
Petr Vorel
pvorel@suse.cz
Mon Jul 20 11:14:49 CEST 2020
Reasons to drop:
* outdated tests (from 2005)
* not used (NFS kernel maintainers use pynfs [1])
* written in Python (we support C and shell, see [2])
[1] http://git.linux-nfs.org/?p=bfields/pynfs.git;a=summary
[2] https://github.com/linux-test-project/ltp/issues/547
Signed-off-by: Petr Vorel <pvorel@suse.cz>
---
@Chuck, Bruce: FYI RFC to drop NFS related legacy test suite from LTP.
Kind regards,
Petr
testcases/network/.gitignore | 2 -
testcases/network/nfsv4/Makefile | 26 -
testcases/network/nfsv4/acl/Makefile | 29 -
testcases/network/nfsv4/acl/README | 21 -
testcases/network/nfsv4/acl/acl1.c | 373 ------
testcases/network/nfsv4/acl/cleangroups.py | 10 -
testcases/network/nfsv4/acl/cleanusers.py | 12 -
testcases/network/nfsv4/acl/create_users.py | 21 -
testcases/network/nfsv4/acl/random_gen.py | 251 ----
testcases/network/nfsv4/acl/runtest | 70 --
testcases/network/nfsv4/acl/setacl_stress.py | 32 -
testcases/network/nfsv4/acl/test_acl.py | 122 --
testcases/network/nfsv4/acl/test_long_acl.py | 44 -
testcases/network/nfsv4/locks/Makefile | 33 -
testcases/network/nfsv4/locks/README | 169 ---
testcases/network/nfsv4/locks/VERSION | 3 -
.../nfsv4/locks/deploy/locktests.tar.gz | Bin 12354 -> 0 bytes
testcases/network/nfsv4/locks/deploy_info | 37 -
testcases/network/nfsv4/locks/locktests.c | 1034 -----------------
testcases/network/nfsv4/locks/locktests.h | 165 ---
testcases/network/nfsv4/locks/locktests.py | 236 ----
testcases/network/nfsv4/locks/netsync.c | 201 ----
22 files changed, 2891 deletions(-)
delete mode 100644 testcases/network/nfsv4/Makefile
delete mode 100644 testcases/network/nfsv4/acl/Makefile
delete mode 100644 testcases/network/nfsv4/acl/README
delete mode 100644 testcases/network/nfsv4/acl/acl1.c
delete mode 100755 testcases/network/nfsv4/acl/cleangroups.py
delete mode 100755 testcases/network/nfsv4/acl/cleanusers.py
delete mode 100755 testcases/network/nfsv4/acl/create_users.py
delete mode 100755 testcases/network/nfsv4/acl/random_gen.py
delete mode 100755 testcases/network/nfsv4/acl/runtest
delete mode 100755 testcases/network/nfsv4/acl/setacl_stress.py
delete mode 100755 testcases/network/nfsv4/acl/test_acl.py
delete mode 100755 testcases/network/nfsv4/acl/test_long_acl.py
delete mode 100644 testcases/network/nfsv4/locks/Makefile
delete mode 100644 testcases/network/nfsv4/locks/README
delete mode 100644 testcases/network/nfsv4/locks/VERSION
delete mode 100644 testcases/network/nfsv4/locks/deploy/locktests.tar.gz
delete mode 100644 testcases/network/nfsv4/locks/deploy_info
delete mode 100644 testcases/network/nfsv4/locks/locktests.c
delete mode 100644 testcases/network/nfsv4/locks/locktests.h
delete mode 100755 testcases/network/nfsv4/locks/locktests.py
delete mode 100644 testcases/network/nfsv4/locks/netsync.c
diff --git a/testcases/network/.gitignore b/testcases/network/.gitignore
index dab2bc34e..b5cdb351a 100644
--- a/testcases/network/.gitignore
+++ b/testcases/network/.gitignore
@@ -17,8 +17,6 @@
/nfs/nfs_stress/nfs05_make_tree
/nfs/nfslock01/nfs_flock
/nfs/nfslock01/nfs_flock_dgen
-/nfsv4/acl/acl1
-/nfsv4/locks/locktests
/rpc/basic_tests/rpc01/rpc1
/rpc/basic_tests/rpc01/rpc_server
/sctp/sctp_big_chunk
diff --git a/testcases/network/nfsv4/Makefile b/testcases/network/nfsv4/Makefile
deleted file mode 100644
index a311eaa42..000000000
--- a/testcases/network/nfsv4/Makefile
+++ /dev/null
@@ -1,26 +0,0 @@
-#
-# network/nfsv4 test suite Makefile.
-#
-# Copyright (C) 2009, Cisco Systems Inc.
-#
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation; either version 2 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License along
-# with this program; if not, write to the Free Software Foundation, Inc.,
-# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
-#
-# Ngie Cooper, July 2009
-#
-
-top_srcdir ?= ../../..
-
-include $(top_srcdir)/include/mk/env_pre.mk
-include $(top_srcdir)/include/mk/generic_trunk_target.mk
diff --git a/testcases/network/nfsv4/acl/Makefile b/testcases/network/nfsv4/acl/Makefile
deleted file mode 100644
index 8c55a6bbd..000000000
--- a/testcases/network/nfsv4/acl/Makefile
+++ /dev/null
@@ -1,29 +0,0 @@
-#
-# network/nfsv4/acl testcases Makefile.
-#
-# Copyright (C) 2009, Cisco Systems Inc.
-#
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation; either version 2 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License along
-# with this program; if not, write to the Free Software Foundation, Inc.,
-# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
-#
-# Ngie Cooper, September 2009
-#
-
-top_srcdir ?= ../../../..
-
-include $(top_srcdir)/include/mk/env_pre.mk
-
-LDLIBS += $(ACL_LIBS)
-
-include $(top_srcdir)/include/mk/generic_leaf_target.mk
diff --git a/testcases/network/nfsv4/acl/README b/testcases/network/nfsv4/acl/README
deleted file mode 100644
index 15a0e0a48..000000000
--- a/testcases/network/nfsv4/acl/README
+++ /dev/null
@@ -1,21 +0,0 @@
-ACL testing
-Aurélien Charbon - Bull SA
-
-# GOAL :
-Testing ACL conformance, ACL limits, and ACL robustness
-
-# REQUIREMENTS :
-ACL support must be present on the remote host
-attr and acl packages must be install for the stestsuite to build/run.
-This testsuite is not built by the default make in the LTP root directory
-
-acl1: verify the conformance ok access regarding the ACL of files and directory.
-stress: multiprocess application to stress the ACL
-
-setacl_stress.py: python script that does lots of setfacl function
-
-test_long_acl.py: try to "build" ACLs of different length. Stop when the specified maximum length is reached.
-
-To run the test:
-make (builds the binaries)
-./runtest (executes the sequence of tests)
diff --git a/testcases/network/nfsv4/acl/acl1.c b/testcases/network/nfsv4/acl/acl1.c
deleted file mode 100644
index ad778cd33..000000000
--- a/testcases/network/nfsv4/acl/acl1.c
+++ /dev/null
@@ -1,373 +0,0 @@
-/*
- * Aurélien Charbon - Bull SA
- * ACL testing basic program
- * Purpose: setting an acl on a file a verifies that the accesses are right
- */
-
-#include <sys/param.h>
-
-#include <stdlib.h>
-#include <sys/types.h>
-#include <sys/time.h>
-#include <sys/stat.h>
-#include <stdio.h>
-#include <string.h>
-#include <dirent.h>
-#include <unistd.h>
-#include <errno.h>
-
-#include "config.h"
-#include "tst_res_flags.h"
-
-#ifdef HAVE_LIBACL
-
-#include <sys/acl.h>
-
-#define OP_READ 0x1
-#define OP_WRITE 0x2
-#define OP_EXEC 0x4
-
-acl_t testacl;
-/* the "typical" acl used for the test */
-
-static char *permtab[] =
- { "---", "r--", "-w-", "rw-", "--x", "r-x", "-wx", "rwx" };
-
-struct statstore {
- /* number of passed tests */
- int ok;
- /* number of failed tests */
- int failed;
-} aclstat;
-
-int do_file_op(char *filename)
-{
- int exe;
- int result;
- uid_t uid;
- result = 0;
- FILE *fptr;
- char str[256] = "./";
-
- uid = geteuid();
- strcat(str, filename);
-
- exe = execl(str, NULL, NULL);
- if (exe == -1 && errno != EACCES)
- result = result + OP_EXEC;
-
- fptr = fopen(filename, "r");
- if (fptr != NULL) {
- result = result + OP_READ;
- fclose(fptr);
- }
-
- fptr = fopen(filename, "r+");
- if (fptr != NULL) {
- result = result + OP_WRITE;
- fclose(fptr);
- }
-
- return result;
-}
-
-/* acl with user entries used for the test */
-acl_t test_acl_user_create(void)
-{
- char acl_text[] =
- "u::rwx,u:user1:rwx,u:user2:rw-,u:user3:r--,u:user4:r-x,u:user5:---,g::r-x,o::r-x,m::rwx";
- acl_t acl;
- acl = acl_from_text(acl_text);
- return acl;
-}
-
-/* acl with group entries used for the test */
-
-acl_t test_acl_grp_create(void)
-{
- char acl_text[] =
- "u::rwx,g:grp1:rwx,g:grp2:rw-,g:grp3:r--,g:grp4:r-x,g:grp5:---,g::---,o::r-x,m::rwx";
- acl_t acl;
- acl = acl_from_text(acl_text);
- return acl;
-}
-
-acl_t test_acl_default_create(void)
-{
- char acl_text[] =
- "u::rwx,u:user1:rwx,u:user2:rw-,u:user3:r--,u:user4:r-x,u:user5:---,g::r-x,m::rwx,o::r-x";
- acl_t acl;
- acl = acl_from_text(acl_text);
- return acl;
-}
-
-static void report(testnum, expected, result, fail)
-int testnum; /* test number */
-int expected; /* expected result */
-int result; /* actual result */
-int fail; /* fail or warning */
-{
- char *res;
- if (expected == result) {
- res = "[OK]";
- aclstat.ok++;
- } else {
- res = "[FAILED]";
- aclstat.failed++;
- }
- printf("\ttest #%d - Expected: %s - Obtained: %s - %s\n", testnum,
- permtab[expected], permtab[result], res);
-
- fflush(stdout);
-}
-
-/*
- * set acl in order the file is only readable for the testuser
- * - try to read
- * - try to write
- */
-static void test1(char *file)
-{
- int result;
- if (seteuid((uid_t) 601) == 0) {
- result = do_file_op(file);
- /* expected result = OP_READ || OP_WRITE || OP_EXEC */
- report(1, OP_READ + OP_WRITE + OP_EXEC, result);
- seteuid((uid_t) 0);
- setegid((gid_t) 0);
- }
-}
-
-/*
- * set acl in order the file is only readable for the testgroup
- * - try to read with test user
- * - try to write with test user
- *
- */
-
-static void test2(char *file)
-{
- int result;
- if (seteuid((uid_t) 602) == 0) {
- result = do_file_op(file);
- /* expected result = OP_READ || OP_WRITE */
- report(2, OP_READ + OP_WRITE, result);
- seteuid((uid_t) 0);
- }
-}
-
-/*
- * set acl in order the file is only readable for the testuser
- * - try to read
- * - try to write
- */
-
-static void test3(char *file)
-{
- int result;
- if (seteuid((uid_t) 603) == 0) {
- result = do_file_op(file);
- /* expected result = OP_READ */
- report(3, OP_READ, result);
- seteuid((uid_t) 0);
- }
-}
-
-/*
- * set read-write acl on the file for the testuser
- * - try to read
- * - try to write
- */
-
-static void test4(char *file)
-{
- int result;
- if (seteuid((uid_t) 604) == 0) {
- result = do_file_op(file);
- /* expected result = OP_READ || OP_EXEC */
- report(4, OP_READ + OP_EXEC, result);
- seteuid((uid_t) 0);
- }
-}
-
-static void test5(char *file)
-{
- int result;
- if (seteuid((uid_t) 605) == 0) {
- result = do_file_op(file);
- /* expected result = 0x0 */
- report(5, 0x00, result);
- seteuid((uid_t) 0);
- }
-}
-
-static void testgrp1(char *file)
-{
- int result;
- if (setegid((gid_t) 601) == 0) {
- if (seteuid((uid_t) 601) == 0) {
- result = do_file_op(file);
- /* expected result = OP_READ || OP_WRITE || OP_EXEC */
- report(1, OP_READ + OP_WRITE + OP_EXEC, result);
- seteuid((uid_t) 0);
- setegid((gid_t) 0);
- }
- }
-}
-
-/*
- * set acl in order the file is only readable for the testgroup
- * - try to read with test user
- * - try to write with test user
- *
- */
-
-static void testgrp2(char *file)
-{
- int result;
- if ((setegid((gid_t) 602) == 0) && (seteuid((uid_t) 602) == 0)) {
- result = do_file_op(file);
- /* expected result = OP_READ || OP_WRITE */
- report(2, OP_READ + OP_WRITE, result);
- seteuid((uid_t) 0);
- setegid((gid_t) 0);
- }
-}
-
-/*
- * set acl in order the file is only readable for the testuser
- * - try to read
- * - try to write
- */
-
-static void testgrp3(char *file)
-{
- int result;
- if ((setegid((gid_t) 603) == 0) && (seteuid((uid_t) 603) == 0)) {
- result = do_file_op(file);
- /* expected result = OP_READ */
- report(3, OP_READ, result);
- seteuid((uid_t) 0);
- setegid((gid_t) 0);
- }
-}
-
-/*
- * set read-write acl on the file for the testuser
- * - try to read
- * - try to write
- */
-
-static void testgrp4(char *file)
-{
- int result;
- if (setegid((gid_t) 604) == 0) {
- if (seteuid((uid_t) 604) == 0)
- result = do_file_op(file);
- /* expected result = OP_READ || OP_EXEC */
- report(4, OP_READ + OP_EXEC, result);
- seteuid((uid_t) 0);
- setegid((gid_t) 0);
- }
-}
-
-static void testgrp5(char *file)
-{
- int result;
- if (setegid((gid_t) 605) == 0) {
- if (seteuid((uid_t) 605) == 0)
- result = do_file_op(file);
- /* expected result = 0x0 */
- report(5, 0x00, result);
- seteuid((uid_t) 0);
- setegid((gid_t) 0);
- }
-}
-
-/* testing default acl */
-void test_acl_default(char *dir, acl_t acl)
-{
- /* set default acl on directory */
- /* create a file in this directory */
- /* compare the file's acl and the parent directory's one */
- int res;
- acl_t acl1, acl2;
-
- res = acl_set_file(dir, ACL_TYPE_DEFAULT, acl);
- acl1 = acl_get_file(dir, ACL_TYPE_DEFAULT);
- if (res == -1)
- printf("path = %s **** errno = %d", dir, errno);
- char *path = strcat(dir, "/testfile");
- fopen(path, "w+");
- char *cmd = malloc(256);
-
- strcpy(cmd, "chmod 7777 ");
- printf(cmd, NULL);
- strcat(cmd, dir);
- system(cmd);
- acl2 = acl_get_file(path, ACL_TYPE_ACCESS);
-
- test1(path);
- test2(path);
- test3(path);
- test4(path);
- test5(path);
-}
-
-static void showstats(void)
-{
- printf("\nACL TESTS RESULTS: %d passed, %d failed\n\n", aclstat.ok,
- aclstat.failed);
-}
-
-int main(int argc, char *argv[])
-{
- int result;
- aclstat.ok = 0;
- aclstat.failed = 0;
- acl_t testacl;
- printf("Test acl with entries on users\n");
- testacl = test_acl_user_create();
-
- /* set the right acl for the test */
- result = acl_set_file(argv[1], ACL_TYPE_ACCESS, testacl);
- if (result == -1) {
- printf("setting acl on file %s failed\nBad NFS configuration",
- argv[1]);
- exit(1);
- }
- test1(argv[1]);
- test2(argv[1]);
- test3(argv[1]);
- test4(argv[1]);
- test5(argv[1]);
- acl_free(testacl);
- printf("\nTest of default acl:\n");
-
- testacl = test_acl_default_create();
- test_acl_default(argv[2], testacl);
-
- printf("\nTest acl with entries concerning groups\n");
- testacl = test_acl_grp_create();
- result = acl_set_file(argv[1], ACL_TYPE_ACCESS, testacl);
- if (result == -1)
- printf("setting acl on file %s failed\n", argv[1]);
-
- testgrp1(argv[1]);
- testgrp2(argv[1]);
- testgrp3(argv[1]);
- testgrp4(argv[1]);
- testgrp5(argv[1]);
-
- acl_free(testacl);
-
- showstats();
- return 1;
-}
-#else
-int main(void)
-{
- printf("The acl library was missing upon compilation.\n");
- return TCONF;
-}
-#endif /* HAVE_LIBACL */
diff --git a/testcases/network/nfsv4/acl/cleangroups.py b/testcases/network/nfsv4/acl/cleangroups.py
deleted file mode 100755
index 3c064783c..000000000
--- a/testcases/network/nfsv4/acl/cleangroups.py
+++ /dev/null
@@ -1,10 +0,0 @@
-#!/usr/bin/env python3
-from random_gen import *
-from optparse import OptionParser
-import subprocess
-import os
-import random
-
-test = RandomGen()
-test.getGroupList()
-test.cleanGroups()
diff --git a/testcases/network/nfsv4/acl/cleanusers.py b/testcases/network/nfsv4/acl/cleanusers.py
deleted file mode 100755
index 3e652c5b7..000000000
--- a/testcases/network/nfsv4/acl/cleanusers.py
+++ /dev/null
@@ -1,12 +0,0 @@
-#!/usr/bin/env python3
-from random_gen import *
-from optparse import OptionParser
-import subprocess
-import os
-import random
-
-test = RandomGen()
-test.getUserList()
-test.getGroupList()
-test.cleanUsers()
-test.cleanGroups()
diff --git a/testcases/network/nfsv4/acl/create_users.py b/testcases/network/nfsv4/acl/create_users.py
deleted file mode 100755
index 3203aff8b..000000000
--- a/testcases/network/nfsv4/acl/create_users.py
+++ /dev/null
@@ -1,21 +0,0 @@
-#!/usr/bin/env python3
-'''
- Access Control Lists testing based on newpynfs framework
- Aurelien Charbon - Bull SA
-'''
-
-from random_gen import *
-from optparse import OptionParser
-
-parser = OptionParser()
-parser.add_option("-u", "--users", dest="nu",type="int",help="number of users to create")
-parser.add_option("-g", "--group",dest="ng",type="int",help="number of groups to create")
-
-(options, args) = parser.parse_args()
-
-''' Measuring time to add an ACE to a list regarding the number of ACE already in the list'''
-''' Doing the measurement on 100 files '''
-test=RandomGen()
-test.createNGroup(options.ng)
-test.getGroupList()
-test.createNUser(options.nu)
diff --git a/testcases/network/nfsv4/acl/random_gen.py b/testcases/network/nfsv4/acl/random_gen.py
deleted file mode 100755
index 4b6ba9625..000000000
--- a/testcases/network/nfsv4/acl/random_gen.py
+++ /dev/null
@@ -1,251 +0,0 @@
-#!/usr/bin/env python3
-import subprocess
-import random
-import re
-
-alphabet = 'azertyuiopqsdfghjklmwxcvbnAZERTYUIOPQSDFGHJKLMWXCVBN123456789-_'
-a_length = len(alphabet)
-
-""" ACL support attribute """
-ACL4_SUPPORT_ALLOW_ACL = 0x00000001
-ACL4_SUPPORT_DENY_ACL = 0x00000002
-ACL4_SUPPORT_AUDIT_ACL = 0x00000004
-ACL4_SUPPORT_ALARM_ACL = 0x00000008
-
-class RandomGen(object):
-
-
- """ List of ACE possible who fields """
- ace_who=["OWNER@","GROUP@","EVERYONE@","ANONYMOUS@","AUTHENTICATED@"]
-
- """ List of GID than can be used to do the tests """
- gList=[]
- gListSize = len(gList)
- uList = []
- uListSize = len(uList)
-
- fList=[]
- fListSize = len(fList)
-
- """ Create a user in available groups to do the tests """
- def createUser(self,username):
- group = self.gList[random.randint(0,len(self.gList)-1)][0]
- opts = "-g" + group + " -p" + "1pilot" + " -m " + username
- u = subprocess.getoutput('/usr/sbin/useradd '+ opts)
- if u != "":
- print("create user " + username + "failed" + u)
-
- def createFile(self,path,n):
- for i in range(n):
- fName = 'file' + str(i)
- u = subprocess.getoutput('touch ' + path + '/'+ fName)
- self.fList.append(fName)
-
- def createGroup(self, grpname, gid):
- u = subprocess.getoutput('/usr/sbin/groupadd -g' + gid + " " + grpname)
- if u != "":
- print(u)
-
- def createNGroup(self, n):
- for i in range(n):
- gName = 'grp' + str(i)
- gid = str(500+i)
- self.createGroup(gName, gid)
-
-
- """ Random creation of n user """
- def createNUser(self,n):
- for i in range(n):
- userName= "user" + str(i)
- self.createUser(userName)
-
- """ clean all users created to do the tests """
- def cleanUsers(self):
- for name in self.uList:
- u = subprocess.getoutput('/usr/sbin/userdel -r '+ name)
- self.uList = []
-
- """ clean all users created to do the tests """
- def cleanGroups(self):
- for name in self.gList:
- u = subprocess.getoutput('/usr/sbin/groupdel '+ name[0])
- self.gList = []
-
- """ Retrieve the list of user from /etc/passwd file """
- def getUserList(self):
- f = open('/etc/passwd','r')
- lines = f.readlines()
- for line in lines:
- splitedline = line.split(':')
- userName = splitedline[0]
- gid = splitedline[3]
- # TO FIX: verify that the group is OK (in the right range)
- NameOK = re.match("user",userName)
- # We keep only usernames starting with "user"
- if NameOK != None:
- self.uList.append(userName)
- f.close()
-
- def getFileList(self,path):
- u = subprocess.getoutput('ls ' + path)
- tmp = u.split('\n')
- for i in range (len(tmp)-1):
- NameOK = re.match("file",tmp[i])
- if NameOK != None:
- self.fList.append(tmp[i])
-
- def getNUserList(self,nb):
- f = open('/etc/passwd','r')
- lines = f.readlines()
- n = 0
- for line in lines:
- splitedline = line.split(':');
- userName = splitedline[0]
- gid = splitedline[3]
- # TO FIX: verify that the group is OK (in the right range)
- NameOK = re.match("user",userName)
- # We keep only usernames starting with "user"
- if NameOK != None:
- self.uList.append(userName)
- n = n+1
- if n==nb:
- break;
- f.close()
-
- """ Get group list """
- def getGroupList(self):
- f = open('/etc/group','r')
- lines = f.readlines()
- for line in lines:
- splitedline = line.split(':');
- groupName = splitedline[0]
- gid = splitedline[2]
- NameOK = re.match("grp",groupName)
- if NameOK != None:
- self.gList.append([groupName,gid])
- f.close()
-
- """ Get a list of n group """
- def getNGroupList(self,nb):
- f = open('/etc/group','r')
- lines = f.readlines()
- n = 0
- for line in lines:
- splitedline = line.split(':');
- groupName = splitedline[0]
- gid = splitedline[2]
- NameOK = re.match("grp",groupName)
- if NameOK != None:
- self.gList.append([groupName,gid])
- n = n+1
- if n==nb:
- break;
- f.close()
-
- def printUserList(self):
- print(self.uList)
-
- def printGroupList(self):
- print(self.gList)
-
- """ Create a random name of random length """
- def createOneNameRandomLength(self,maxlength):
- outputString =""
- l=random.randint(0,maxlength)
- for i in range(l):
- a = random.randint(0,a_length-1)
- outputString =outputString + alphabet[a]
- return outputString
-
- """ Create a random name of fixed length """
- def createOneName(self,lenght):
- outputString =""
- for i in range(length):
- a = random.randint(0,a_length-1)
- outputString = outputString + alphabet[a]
- return outputString
-
- """ Create Random User List with fixed length user names """
- def createRandomUserList(self,listlength,usernamelength):
- userlist = []
- for i in range(listlength):
- user = createOneName(lenght)
- userlist.append(user)
- return userlist
-
- """ Create Random ACE for a file and a given usr """
- def createRandomACE(self,user):
- type = ace_type[random.randint(0,len(ace_type))]
- flag = ace_flags[random.randint(0,len(ace_flags))]
- mask = ace_mask[random.randint(0,len(ace_mask))]
- who = ace_who[random.randint(0,len(ace_who))]
- return nfsace4(type, flag, mask, who)
-
- """ Create Random ACL for a file with a fixed number a entries """
- def createRandomACL(self,acl_size):
- acl = []
- userList = uList
- userListSize = uListSize
- for i in range(acl_size):
- n = random.randint(0,userListSize-1)
- usr = userList.pop(n)
- newace = createRandomACE(usr)
- acl.append(newace)
- return acl
-
- """ Return a mode string like 'xwr' or 'x' """
- def createRandomMode(self):
- out_str = ""
- while (out_str == ""):
- if random.randint(0,1) == 1:
- out_str += 'x'
- if random.randint(0,1) == 1:
- out_str += 'w'
- if random.randint(0,1) == 1:
- out_str += 'r'
- return out_str
-
- """ Create a random ACL operation (delete / remove / modify on user / group ) """
- def randomOp(self,path):
- a = random.randint(1,4)
- mode = self.createRandomMode()
- file = self.fList[random.randint(0,len(self.fList)-1)]
- if a == 1: # creation/modification
- user = self.uList[random.randint(0,len(self.uList)-1)]
- u = subprocess.getoutput('setfacl -m u:' + user + ':' + mode + " " + path + "/" + file)
-
- if a == 2: # with group
- group = self.gList[random.randint(0,len(self.gList)-1)][0]
- u = subprocess.getoutput('setfacl -m g:' + group + ':' + mode + " " + path + "/" + file)
-
- if a == 3: # deletation
- user = self.uList[random.randint(0,len(self.uList)-1)]
- u = subprocess.getoutput('setfacl -x u:' + user + " " + path + "/" + file)
-
- if a == 4: # with group
- group = self.gList[random.randint(0,len(self.gList)-1)][0]
- u = subprocess.getoutput('setfacl -x g:' + group + " " + path + "/" + file)
-
- # request on a unexisting group
- '''if a == 5:
- group = self.createOneNameRandomLength(16)
- print 'setfacl -x g:' + group + " " + path + "/" + file
- u = commands.getoutput('setfacl -x g:' + group + " " + path + "/" + file)
- if a == 6:
- user = self.createOneNameRandomLength(16)
- u = commands.getoutput('setfacl -x u:' + user + " " + path + "/" + file)
-
- if a == 7: # creation/modification
- user = self.createOneNameRandomLength(16)
- u = commands.getoutput('setfacl -m u:' + user + ':' + mode + " " + path + "/" + file)
-
- if a == 8: # with group
- group = self.createOneNameRandomLength(16)
- u = commands.getoutput('setfacl -m g:' + group + ':' + mode + " " + path + "/" + file)
-
- if a == 9: #Copying the ACL of one file to another
- file2 = self.fList[random.randint(0,len(self.fList)-1)]
- u = commands.getoutput('getfacl ' + path + "/" + file + "| setfacl --set-file=- " + path + "/" + file2)
- if u!="":
- print u'''
-
diff --git a/testcases/network/nfsv4/acl/runtest b/testcases/network/nfsv4/acl/runtest
deleted file mode 100755
index a859e85bc..000000000
--- a/testcases/network/nfsv4/acl/runtest
+++ /dev/null
@@ -1,70 +0,0 @@
-#!/bin/sh
-#
-# @(#)runtests
-#
-# runtests script for ACL testing
-REMOTEHOST=nfsserver
-MAXLENGTH=30 # maximum ACL length - NB: the current NFSv4 acl implementation does not allow ACL greater than one page (about 35 entries with 6 character user name length and 10 character domain name)
-NFSMNTDIR=/mnt/nfs-acl
-echo "Test on NFS server $REMOTEHOST"
-ACLTESTDIR=testdir
-ACLTESTFILE=testfile
-
-USER_NB=20 # total number of users to create
-GRP_NB=20 # total number of groups to create
-FILE_NB=10 # total number of files for the test
-
-# creation of users on the local machine
-for i in 1 2 3 4 5
-do
- groupadd -g 60$i grp$i
- useradd -u 60$i user$i
-done
-
-# creation of users on the remote machine (removed only at the end of the tests)
-rsh -n $REMOTEHOST python3 $PWD/create_users.py -u 50 -g 50
-
-echo "Starting ACL testing"
-
-echo "Starting BASIC tests"
-
-echo "Creating testing file and directory"
-touch $NFSMNTDIR/$ACLTESTFILE
-mkdir $NFSMNTDIR/$ACLTESTDIR
-if test ! -d $NFSMNTDIR/$ACLTESTDIR
-then
- echo "Can't make directory $ACLTESTDIR"
- exit 1
-fi
-
-# File and Directory tree creation test
-echo "Execute acl1 $NFSMNTDIR/$ACLTESTFILE $NFSMNTDIR/$ACLTESTDIR"
-./acl1 $NFSMNTDIR/$ACLTESTFILE $NFSMNTDIR/$ACLTESTDIR
-#./stress $ACLTESTFILE
-for i in 1 2 3 4 5
- do
- userdel user$i
- groupdel grp$i
- done
-
-echo "Basic tests finished"
-
-echo "LONG ACL TEST"
-echo "creating necessary users and groups"
-python3 create_users.py -u 50 -g 50
-echo "creating necessary users and groups on the remote host"
-mkdir $NFSMNTDIR/lacl-testdir
-python3 test_long_acl.py -l $MAXLENGTH -p $NFSMNTDIR/lacl-testdir
-rm -rf $NFSMNTDIR/lacl-testdir
-echo "Long ACL test OK with $MAXLENGTH entries"
-echo "ACL STRESSING TEST"
-python3 setacl_stress.py -n 100 -u $USER_NB -g $GRP_NB -f $FILE_NB -p $NFSMNTDIR
-
-# remove local an remote users
-python3 cleanusers.py
-python3 cleangroups.py
-rsh -n $REMOTEHOST python3 $PWD/cleanusers.py
-
-echo "Test OK"
-
-exit 0
diff --git a/testcases/network/nfsv4/acl/setacl_stress.py b/testcases/network/nfsv4/acl/setacl_stress.py
deleted file mode 100755
index c93ac8bc0..000000000
--- a/testcases/network/nfsv4/acl/setacl_stress.py
+++ /dev/null
@@ -1,32 +0,0 @@
-#!/usr/bin/env python3
-'''
- Access Control Lists stressing script
- To lauch on the first client
- Aurelien Charbon - Bull SA
-'''
-
-from random_gen import *
-from optparse import OptionParser
-import subprocess
-import os
-import random
-
-alphabet='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ123456789_-()'
-t_alphabet=len(alphabet)
-
-test = RandomGen()
-
-parser = OptionParser()
-parser.set_defaults(nbfiles=5,nbusers=5,nbgroups=5,nloop=100 )
-parser.add_option("-n","--nloop", dest="nloop",type="int", help="number of loop to do in the test")
-parser.add_option("-p", "--path", dest="path",help="path on which the test is executed")
-parser.add_option("-f", "--nbfiles", dest="nbfiles",type="int",help="nb of files to do the test (default=5)")
-parser.add_option("-u", "--nbusers", dest="nbusers",type="int",help="nb of users (default=5)")
-parser.add_option("-g", "--nbgrp", dest="nbgroups",type="int",help="nb of groups (default=5)")
-(options, args) = parser.parse_args()
-
-test.createFile(options.path,options.nbfiles)
-test.getNUserList(options.nbusers)
-test.getNGroupList(options.nbgroups)
-for i in range (options.nloop):
- test.randomOp(options.path)
diff --git a/testcases/network/nfsv4/acl/test_acl.py b/testcases/network/nfsv4/acl/test_acl.py
deleted file mode 100755
index 8699b0206..000000000
--- a/testcases/network/nfsv4/acl/test_acl.py
+++ /dev/null
@@ -1,122 +0,0 @@
-#!/usr/bin/env python3
-'''
- Access Control Lists testing based on newpynfs framework
- Aurelien Charbon - Bull SA
-'''
-from random_gen import *
-import subprocess
-import os
-import threading
-import time
-import random
-
-alphabet='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ123456789_-() ~'
-t_alphabet=len(alphabet)
-
-def test_acl_default(path):
-
-# set default acl on the test directory
- u = subprocess.getoutput('mkdir ' + path + "/" + testdir)
- u = subprocess.getoutput('getfacl ' + path + "/" + testdir)
- acl=[]
- for i in range (len(splitedresult)-1):
- splitedline = splitedresult[i].split('::')
- name = splitedline[0]
- entry = splitedline[1]
- acl.append(name,entry)
-# create a file in this directory
- u = subprocess.getoutput('touch ' + path + "/" + testdir + testfile)
-# get the file's ACL and verify
- u = subprocess.getoutput('getfacl ' + path + "/" + testdir + testfile)
- splitedresult = u.split('\n')
- acl2=[]
- for i in range (len(splitedresult)-1):
- splitedline = splitedresult[i].split('::')
- name = splitedline[0]
- entry = splitedline[1]
- acl2.append(name,entry)
-
- result_final = True
- while i < len(acl2):
- result = False
- while j < len(acl2) and result == False:
- if acl2[i] == acl[j]:
- result = True
- if result == False:
- result_final = False
-
-''' Measuring time to add an ACE to a list regarding the number of ACE already in the list'''
-''' Doing the measurement on 100 files '''
-def test_acl_long():
- path = '/mnt/nfs/test-acl'
- test = RandomGen()
- test.createFile(path,100)
- test.getUserList()
- t0=time.time()
- for test_file in test.fList:
- for user in test.uList:
- mode = test.createRandomMode()
- u = subprocess.getoutput('setfacl -m u:' + user + ':' + mode + " " + path + "/" + test_file)
- t1=time.time()
- print(t1-t0)
-
-def test_nfs_acl():
- print("test acl 10000\n")
- test = RandomGen()
- f = open('/tmp/acl-result-10000','w')
- path = '/mnt/nfs/test-acl'
- for i in range(10000):
- print("test avec " + str(i) + " ACE")
- test.getUserList()
- testfile = 'testfile' + str(i)
- u = subprocess.getoutput('touch ' + path + "/" + testfile)
- t0=time.time()
- for j in range(i):
- user = test.uList.pop()
- mode = test.createRandomMode()
- u = subprocess.getoutput('setfacl -m u:' + user + ':' + mode + " " + path + "/" + testfile)
- t1=time.time()
- f.write(str(i) + "\t" + str(t1-t0)+"\n")
- f.close()
-
-
-def test_nfs_getfacl():
- # mesures sur le getfacl
- test = RandomGen()
-
- path = '/mnt/nfs/test-acl' # NFS mounted directory
- u = subprocess.getoutput('rm ' + path + "/*") # clean directory
- print("test acl getfacl\n")
- f = open('/tmp/acl-result-getfacl','w')
- for i in range(37):
-
- test.getUserList()
- testfile = 'testfile' + str(i)
-
- u = subprocess.getoutput('touch ' + path + "/" + testfile)
- print("setfacl " + str(i) + " " + u)
- for j in range(i):
- user = test.uList.pop()
- mode = test.createRandomMode()
- u = subprocess.getoutput('setfacl -m u:' + user + ':' + mode + " " + path + "/" + testfile)
-
- t1=time.time()
- u = subprocess.getoutput('getfacl ' + path + "/" + testfile)
- print("getfacl - " + str(i) + u + "\n")
- t2=time.time()
- f.write(str(i) + "\t" + str(t2-t1)+"\n")
- f.close()
-
-
-def main():
- # test getFileList
- path = '/mnt/nfs/test-acl'
- test = RandomGen()
- test.getFileList(path)
- print(test.fList)
-main()
-
-
-
-
-
diff --git a/testcases/network/nfsv4/acl/test_long_acl.py b/testcases/network/nfsv4/acl/test_long_acl.py
deleted file mode 100755
index 893855b42..000000000
--- a/testcases/network/nfsv4/acl/test_long_acl.py
+++ /dev/null
@@ -1,44 +0,0 @@
-#!/usr/bin/env python3
-'''
- Access Control Lists testing based on newpynfs framework
- Aurelien Charbon - Bull SA
-'''
-from random_gen import *
-from optparse import OptionParser
-import subprocess
-import os
-import threading
-import time
-import random
-
-alphabet='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ123456789_-() ~'
-t_alphabet=len(alphabet)
-
-
-
-def test_longacl(l,path):
- # mesures sur le getfacl
- test = RandomGen()
-
- u = subprocess.getoutput('rm ' + path + "/*") # clean directory
- print("test acl getfacl\n")
- for i in range(l):
- test.getUserList()
- testfile = 'testfile' + str(i)
- u = subprocess.getoutput('touch ' + path + "/" + testfile)
- print("setfacl with " + str(i) + " entries\n " + u)
- for j in range(i):
- user = test.uList.pop()
- mode = test.createRandomMode()
- u = subprocess.getoutput('setfacl -m u:' + user + ':' + mode + " " + path + "/" + testfile)
- if u != "":
- print("setfacl -m u:" + user + ':' + mode + " " + path + "/" + testfile)
- print(u)
-def main():
- parser = OptionParser()
- parser.add_option("-l", "--length", dest="length",type="int",help="max lentgh of ACL")
- parser.add_option("-p", "--path", dest="path",help="path of test file")
- (options, args) = parser.parse_args()
- test_longacl(options.length,options.path)
-main()
-
diff --git a/testcases/network/nfsv4/locks/Makefile b/testcases/network/nfsv4/locks/Makefile
deleted file mode 100644
index 5812dea3a..000000000
--- a/testcases/network/nfsv4/locks/Makefile
+++ /dev/null
@@ -1,33 +0,0 @@
-#
-# network/nfsv4/locks testcases Makefile.
-#
-# Copyright (C) 2009, Cisco Systems Inc.
-#
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation; either version 2 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License along
-# with this program; if not, write to the Free Software Foundation, Inc.,
-# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
-#
-# Ngie Cooper, July 2009
-#
-
-top_srcdir ?= ../../../..
-
-include $(top_srcdir)/include/mk/testcases.mk
-
-MAKE_TARGETS := locktests
-
-LDLIBS += -lpthread
-
-$(MAKE_TARGETS): $(patsubst $(abs_srcdir)/%.c,%.o,$(wildcard $(abs_srcdir)/*.c))
-
-include $(top_srcdir)/include/mk/generic_leaf_target.mk
diff --git a/testcases/network/nfsv4/locks/README b/testcases/network/nfsv4/locks/README
deleted file mode 100644
index cf044a45c..000000000
--- a/testcases/network/nfsv4/locks/README
+++ /dev/null
@@ -1,169 +0,0 @@
-COMPILE : make
-RUN LOCAL: ./locktests -n <number of concurent process> -f <test file> [-T]
-
-
-GOAL : This test is aimed at stressing the fcntl locking functions.
-A master process sets a lock on a file region (byte range locking).
-Several slave processes try to perform operations on this region, such
-as: read, write, set a new lock ...
-The expected results of these operations are known.
-If the operation's result is the same as the expected one, the test
-succeeds, otherwise it fails.
-
-
-HISTORY : This program was been written to stress NFSv4 locks.
-
-Slaves are concurrent processes or threads.
--n <num> : Number of threads to use (mandatory).
--f <file> : Run the test on a test file defined by the -f option (mandatory).
--T : Use threads instead of processes (optional).
-
-
-
-* RUN NETWORK *
-
-Test server:
-./locktests -n <number of concurent processes> -f <test file> -c <number of clients>
-
-Test clients:
-./locktests --server <server host name>
-
-
-Multiple clients options
-_______________________
-
-These options have been developed to test NFSv4 locking when multiple
-clients try to use the same file. It uses a test server and several test
-clients.
-
- --------------
- | |
- | NFS SERVER |
- | |
- --------------
- |
- |
- -----------------------------------------------
- | | |
- | | |
- ------------------ ------------------- ------------------
- | NFS Client 1 | | NFS Client 1 | | NFS Client 1 |
- | running | | running | | running |
- | a CLIENT TEST | | the SERVER TEST | | a CLIENT TEST |
- ------------------ ------------------- ------------------
-
-See the DEPLOY file to know how to configure client test on each client.
-
-Server options are:
-
--n <num> : Number of threads to use (mandatory).
--f <file> : Run the test on given test file defined by the -f option (mandatory).
--c <num> : Number of clients to connect before starting the tests.
-
-
-Client options
-______________
---server <server hostname>
-
-
-* EXAMPLES *
-============
-
-Local testing:
-./locktests -n 50 -f /file/system/to/test
-
-Multiple clients:
--on the test server (called host1):
- ./locktest -n 50 -f /network/file/system/to/test -c 3
- (Server waiting for 3 clients to be connected)
-
--test clients:
- ./locktest --server host1
-
-
-HOW TO UNDERSTAND TEST RESULTS
-==============================
-Ten tests are performed:
- 1. WRITE ON A READ LOCK
- 2. WRITE ON A WRITE LOCK
- 3. READ ON A READ LOCK
- 4. READ ON A WRITE LOCK
- 5. SET A READ LOCK ON A READ LOCK
- 6. SET A WRITE LOCK ON A WRITE LOCK
- 7. SET A WRITE LOCK ON A READ LOCK
- 8. SET A READ LOCK ON A WRITE LOCK
- 9. READ LOCK THE WHOLE FILE BYTE BY BYTE
- 10. WRITE LOCK THE WHOLE FILE BYTE BY BYTE
-
-
-For each test, the MASTER process takes a lock (READ/WRITE LOCK) and
-the SLAVE processes try to perform the following operations on the
-locked section:
-
- - WRITE
- - READ
- - SET A WRITE LOCK
- - SET A WRITE LOCK
-
-If a slave process performs its test operation without error it prints
-"=", otherwise it prints "x".
-
-An operation performed "without error" means:
-
- - The operation (write, read, fcntl ...) returns no error code, and
- - errno is not changed.
-
-However, "the slave performs its test operation without error" does NOT
-mean the "result is correct". For example, a slave process is NOT
-allowed to set a READ LOCK on an already-set WRITE LOCK. When such
-operations are performed, the correct and expected result is that the
-tested function returns the EAGAIN error code.
-
-When all tests have been processed, the result of each process for each
-test is compared with the table of expected results, and a new table is
-displayed:
-
-For example:
- 200 processes of 200 successfully ran test : READ ON A READ LOCK
- 200 processes of 200 successfully ran test : SET A READ LOCK ON A WRITE LOCK
-
-This result lists the process/thread both on local and remote machines.
-
-Note that the testing locks with thread on multiple clients is disabled
-because it does not make sense: 2 different clients obviously run at
-least 2 different processes (thread information cannot be shared
-between this thread over the network).
-
-EXPECTED RESULTS
-================
-Here is the table of expected results, depending on :
- - Slave test operations (READ, WRITE, SET A WRITE LOCK ... )
- - Master Operation (SET A READ/A WRITE LOCK )
- - Slave types (Processes, threads)
- - Locking profile (POSIX locking, Mandatory locking)
-
-
-================================================================================================
- | Master process/thread |
-===================================|===========================================================|
-Slave type | Test operation | advisory locking | mandatory locking |
-___________________________________|______________________________|____________________________|
- | | read lock write lock | read lock write lock |
-___________________________________|______________________________|____________________________|
-thread | set a read lock | Allowed Allowed | Allowed Allowed |
- | set a write lock | Allowed Allowed | Allowed Allowed |
- | read | Allowed Allowed | Allowed Allowed |
- | write | Allowed Allowed | Allowed Allowed |
-===================================+==============================+============================|
-process | set a read lock | Allowed Denied | Allowed Denied |
- | set a write lock | Denied Denied | Denied Denied |
- | read | Allowed Allowed | Denied Allowed |
- | write | Allowed Allowed | Denied Denied |
-================================================================================================
-
-
-**************
-Bull SA - 2006 - http://nfsv4.bullopensource.org
-Tony Reix: tony.reix@bull.net
-Aurélien Charbon: aurelien.charbon@ext bull.net
-**************
diff --git a/testcases/network/nfsv4/locks/VERSION b/testcases/network/nfsv4/locks/VERSION
deleted file mode 100644
index aead93e4f..000000000
--- a/testcases/network/nfsv4/locks/VERSION
+++ /dev/null
@@ -1,3 +0,0 @@
-* 08/02/06 copyediting (bryce)
-* 03/01/06 remove unicode and translate comments in english.
-* 21/12/05 free alocated memory before exiting
diff --git a/testcases/network/nfsv4/locks/deploy/locktests.tar.gz b/testcases/network/nfsv4/locks/deploy/locktests.tar.gz
deleted file mode 100644
index 1e0b517f2bbad3318e8036f494cfa547cd4fda89..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001
literal 12354
zcmZ9wV{j(Gwx}K3HYT=hPHfw@?c|MZ+t$RkZQGn!cdE{}&$sWbdTP~jul}>TstKc@
zfJBo*MSwuBePLbDR#WzpENt3~us$OMBIK1Q*<B`M;^TpE=S78C3AH5}Nu!yFuhrby
zw&!%W&ubyjw4wE|d7^~}j#wPsvccT4w>byxveU1)32*xXq1|Ge0OOq4Zm}F9Cwtp!
zeF&}S2L?9R-M7k5l^q>qhQ_0ke3YuYFE^dHJs<ysK0```-S{jC<}w?5D=WQLJ<!h5
z`tDzMWn*V)WoPBZPcgdUh6>010Wncc2gh}z+W1uxE-~VE8S%Oh4#ijRr4oy`x(FM^
z!|`M<$Ay3g8=bWUrJhercH=jWKR^p0OG%|~({wSSmR+1z8r%9FZ-2^^qPo*;BgIqN
zFMm}e2fgQ4dGhT7@nfT^oRl_t{VEeT+Hub^UG0vEUG}e7Vi3kjx%>$dn})@ZeD1}*
z%bF)`d-}n5c)Un?ui&mTiYWdYwvko`Ei3rDVK_6psNwGXOmDHNgQb{OZDCGLv2LeD
z7l?f-$tJm!b{^&&n61p@K#H|U43<lEF~x=+RrT?$WMZqW5lj)?<|>sM_vG0I4Z8Zu
z?iS4HE5bz2aOv+>exZ4CS8i~d6mRAE6fb#;tW;ON*prF)BnRbnpQ0Xs)RS6DZ#e~O
zScMtqbD%jny90U-eYY<kK~QwF7)I+GLZ*iyNiD^Px>0o+H{`Dl3XuVE)yYAIj@Ecz
z9F!~u)#Vs<5w3#LI9<8~DTYGpabgF~o{hx?`-qf?NHEGqu4+*S4(N~%F}Nlel_K?6
zpeS#matfW6S=LH^wK&`|+>s)BGRo^INuOKDmm2s}G{krjBD!l&Kn66W6?Gl8B$6*_
z#)NUMWvgZ^Q-9(C$d8PiVT>H8De{DS!-6RqBdoBR(VX`@(Q%+qCjFjiW3skBcj53a
zFLI8vQ__RxcrJU&zVMOA@wq4zD@O{eWDP_lZP@h#Sz|p(t9+O~R0l}1R`BrjjC&^P
z1ho2v$>Q?g5JY@ag3JW!Opn5hRcbF!?k}~NIM6EW$G<GefEx)ERAVq25$u(PI@SK#
z+7_6?OF?Hl=Kc|irep+wgN|u0>oD_E5*M-C7m<Z?rQ@zcm?8@z5LHR>qcX-rEQy*}
zGb;nlgCffT8$Y|e)bzkcGNc6`s6#M&2~!<0g(1Nx9T-^{tnYV~kOW7j269plDI9{I
z`D48y2SIHw_ml$Ee6(ft=fcTY5T$MO{E&unbIZ(64C~7mUbixq3d@zdx81AZpZ?H1
z7W6BgP-|zni_kxg2UY&wSi1Ha1S;OmuV8&|Y{|)y(ih=T&Ggi(dnrO9Rt>M1NbDkz
zHp4-YuF<PF>LdM3%*ubg_TY+7S+2_`Bkov^+aRn;%bc`ims>#Q>-RaxAC}Vpd3fGQ
zQLFvMm6}-@xG*jh{O0*?pf<hv3VLgsP^@>66%!zy>UBBZoG;|5(Nx+!8kQL5bu=cT
zw1}^<*8<B2K7Zq|`(BH1`&(00wZmIjmxg;&{h4a&tz!^>j{1q_1=#HN!L|D@q`2Z|
zJhet4mFN?$kCfty3j-pyA`T`y`+LkD+qLc_e$eUi2hJ&jPTO4EJE_CRikl0NQPMv0
zg$DYCLb5n&Nw2%Dgs{f^&N^n|pto0NpeUgSHj|oR6r5w%j^|^@>BC%O3r*-NR^OX)
zbh9sVZ%~XZeNu29**;&7gh3yoDt085oWHXsH!?M<_Sk~SRAA+5l`u=K;PBEQH<?qN
zkX&2rjDoj%{!pj8r@Q*87vzt^?#9gb^Y=o$YxfM(yKqhc0_5k+P3$Iqz0e;iU-fD?
zBV?G-jIoZL<uBsXeA7z`7-*7hnEvE8_wp97!AtP*;FX<a><bur8%uNp|MEJ4wWT$f
z%&IL#1<g~)4)peLlyS4BiX#eG0HJap4CP!{Nx!Hd2?Cwc)txaYI6jWzN?}kdNw=KE
ztgxX;vHjo(k@Tyc2ug~R9`zr0{7q^nNaUh1?uMU4zR&bC6(JGOAm&V`*OHT>>JQLq
zUDApZW*l@}mw3TMjCMms38zD9Z9VsCAG*`@<BMT%slK6#{2Ar=G>%LlzDo1<>kGX_
zbCb6n?#L1scOm(#4K^*%OKQ@xF~zmnh$6-XWht>p=5>{K;jdJ%(o~`-+fr9z%S~f>
zI$NGo<wW|Jm0s%NYVBosz7BNGToK&>fxmni%sKI4Y3Haaf-9r3eUwn%6AeKiKcSL|
z7pWH5?*m<AB~Mp+E6k8+_qBaE&LE1P={{f^C-Tv=bIFp2n^;CcjuY+zsR*-flI-+m
zBMe$##MJNXEPD2np7pRDZ#7%b<zI7;NBn4=y`8<?i-HL5yRj?fObQQi7g_Gs<k-Q1
zpnuN!Ax4-pODjDEtdUbeU0#{$U*=`Fb?5d*_q!SQsE))s14u{%1O*IL6axCu;&zp>
z_V|eM7g8h<j~wDFMU^G71{HkZL~;uztIumdT2RA~!!tM(e5nSd8Q_4-mA2mBlgZo!
zh~`Wv|BO@O{)n6uDg`qPoAcwI*t<yR!+~>g-_DDi*76Sri;~hMjYQ(ei=)nwF2GEZ
zG#Eu%&$+>v5aCagHFdxgDV<7;Y4DmkED`+99wQ%7#lhW?y(3|V<nERbjRX(g3X~y8
z9H37sdCjltNcj#&YgMOZ?@OAfi4P;seU5rf4ohBZ6(vuUTWGcsRU=jQ6faVtxG-K<
zD<hJ@9B_)xB}zwBzI3lkpbVnzIR|&mS50J37Oz5v8hmie88!&P*HFDk(o(w3zgSt6
zXSo<`8xLUl@w@HbiPU6VbC#mPuzzxTs|_<rLRPRZEmb*3O>n`W09cS}8R;Aea-KO$
z&F94y=Vx6`QV5io9mrAo37|^Q+LiTbR7wCV!hx)BZIx7S1xpG!-z;dbQ%a=-wiD4w
z)`~sbU}*4-$ecj7Sb%UR{F)lO+$w1{vX`)fTWG9*g!21-f6J~h*-Dc&Q_aJh?k%3T
zkL`N}YOr(V&Kf^W;tVb^f5l4*auldtew#K7>)@;S$ZQ)$`jR%M^o<GZ2<rd}p)_SK
zyO5$T6kBGM+cS_`_sJ_~@1x`(p|#z$8DZt19CH^G@+MGd<9ePwIa&W3F<chUH3JkY
zdyMx`V7)ENH0CKtzcyhsR^deqX$mF9E2@pB-(7pMz(_gsW+^20*__(YF#%FcjlORK
zOErgPW}HndolIa>K<h|JFH)leP&aYXrgs8Y+rs(Gt?K7P$~Zk#j#jVz6h6kUY7^V9
zh%GF95@9i6ps3YOHci;WSved-YaQ6ldPv7JOK^jVMgit51#|2ce#9;Sc1~q5kekIm
zQ1ap3K`EK9OOA|~@t$jSZa|5#aCVW>(_+-1m6lfNREiij78(>a@Z!yuE}2J)tm99K
z82U6dS-4;m`~4(QLLCUMTN}A^NoQ`<kch2Hqm9)kiQkk6Js6fClOlLxDZpakh6%5G
z_<o+BpWplxPOOMr%6*o^9nzXE9*(DdL~c0?&x)0FStsQh63V$6&*o!^=%D$Pe~l6*
zt05MxMl8S1Y6U|Lgm3L&Lu*Y)r#_KhjuaO6Hd;uzv?`Hj1*UXxEfRVm+UX=2g=H%x
zBz7`q9TzN`*gv91);=@`3}n}%iIQEjgZqupEnE#DcU_=~%qUX$l&KRt!NHt#lvioS
zYhe!r3Q;v+GBxnTm#2Tfc~V-C`+~s=zuJ4|ME{I|;e0uk1q#>^BAZwIIvA9y*fbIm
z1h+}%1yDm{$g1lTx2LQ~$C&1kjHAYGh|i}P==yu3S>qXNOdmENhk%HL`vH!s9ZRSL
zSQMK(Q;HhiOfUu~NAkT``^o(*s&xbte!+@lAG&dxx2Crn)U#rq{DP2giP&E(v58Vx
zzaykY#E*I?Hf@!rKy8lUfHZXrRGnr(-h@GC7N;prA2ZVBtO-iNbR|}RDyDrRmfNh)
zj$F|tc;spTXA8kDCDOGv5+n}4R1l{qWr$#BbAM&x9}Y`(kLB95m1#Fb)tqxc6hw0%
zCW3V&@@71cvr>GG@%<Q#BW9XTUu7IS8Lo8FYurQ_Hd*OQ9wIl^o*0ZT8PSjlvO%tf
z2%M}YMjvT#bP)5<wKpHVu89O4XbpiWN-@x<bn$LuSlYb^2+E3anb&NFC{dwXGl7_U
z(%WHzrlc955&6pb1DU+e8>F&Wz}dlON;AffEiX)whyhP$pX`T|wh2q5Tf{@fx|7(T
z8Q;{R8_&`!CNX1`m59Ud`Bmo=9Yh&OT)REC+aXF`5)`54i$Pa|sfmW3D?F#Y2NHIZ
zqdJ5Fk-|VkX|rC5dak&w($bYV5?jk9J2Xr@9QG@qO`|9y%t7zb3dSYAbz%i(%v|Nd
zHA(yZciG=N`?>mN90n$gkt<6D=BgEkayX%N2Q85ba-5X}ZTJZ*`ow87r;a$c6e*nF
z^JH&r5IHD4ic-z8FxN?7XcbZ9PX?S$v43ogj1gO>+H8##G;MBIBx30FrA=gO2FtOz
zAKMHe{4^vEX7F|{&ANRdx25cw83`zD<qWO{uX7AFH34-paRW42igZZOaK%&DjHwVB
zq$zd=38f>&k}P~V+kI-vf$i^s!al#GZI;RLQ&Ru1EKqaykPgZ!Pmnt$bVW)v8XDKv
zio}q&_p5p$CGGBy7Ou6_(=Ctu!ja>R+E7@viXXA-vPAGC+t)<M<U4_n@hQdBgl#-_
zDhdRO3i)!-()a9G&(6eXY8t?>ENoy>b-pRiUjN!j6@*<N&A9q(C1tJRH<?^%iYk=B
zDvP26&c5W=S{$y=p0KMc968+6WP}U5l4-rP!Dn_MX0p(oLUk2RtcKM{U2lHHpDT~I
zGzjLBr0EPqTVb!F5d!I~i+Hz4igB=H%TaeFv~bL4>ifGEh(EzK%U8HUEVfm%(n(NB
zrLs2c3Jj>##g;0(jB*8Nsn-ultlS0&s8Hj0<C=iwPpMVkP?Le=2;xxM5LQZ2rMfk3
z{es1uw(wG-DX-a4+BTZJidyG}cgrG~55ZBk$rMps-{?lIMAhvX)2nRZ-072)v{J)R
zpOKf;FLmd7HqCa0PpV4x^bS`>cq0e?UAwB7<sxL$M86i=pgU2@0+<RDTjR%EK2w_C
zb?y_iQHAa3)|r=d&83gxIRaSn+-_vB^Y%UM{B>0Fw;mlY;Gx7*arGu_oLvDl%Xp5>
zaDNe-bvyiKBEPk{I`SY^IJWR?PVBFAC~@V<Q(CT`<;N2@huWY*Um>lzy-3fb)?lwp
zz5q+tfb?c8(PBfEe~yRYUAS=Vmr<(}u_sK5eX4YpV|IIGN_kd|{*o)#nB#J|s-Vdz
zN9X{2K|Nx^(a5S`J@0XMG+=30x;;%?phX7(Q4vth>FF;ST8nfuWBx9oCSy>FgA;c+
zFU~)tVFxty#RPF#v0(-^CHN4GG&82>YnveY<8rX_l!m6KTcXRu*Mowu9qu&-=+8|@
zVXU#%tkIoFNJM`-jj*$HAmbH-&?1tm4kq@`ZA1hF6Vn(YS9n-pqIwK|WwnU_HDWI#
z`tyvovX<lIO7+=pad|VKu1PbCDHW{3hXEZlJn@Z{D7MPs;T+gHK+zrdjIs`f(Nm{n
zVV_k%`r0f=O$kW{6R+RXqliLHRpc3Cvy9IeohJBbPDxG?t5B!Lih@OLFA3Jt2&O%K
zDIyLTWfthe%Q>-7h~k|H+l;#%S|XJPjmzTXc$goigQ!3<ozG-V6*saCG|v%>S$|8D
zOJvX6B$3T1VMgiWX0m6-5V$bVU3$6jo~+Hf{JODW7!GeXGCpKP0%p17g=?q*9iiO}
z4k31+6_C6=cYB$j)~}5<Z}xCP#W0cDDa{-nB&1qq4oJ#jJ>n=^DN_;W=kM#EiBME%
zYdhcS#g<4>l+&Uv+~KK`d|Rn*Mpbgea&=Df|3#PoID8CAf)0t6ZPAYK?<M5GNMtqF
zniKudX!oX;;Caf!i(1fJA%fK>l}K}m)&!}x18#qvaA%v3urr3dHe2Asuyo$9(P2oG
zQqyy9>RbpCHJ4d91=-Mv=7t70=s4jdLu4%urG>TE*!!D4uoRgsPDOVs!KG#2y&*<k
zX`OFPQ(##NM|nNJnc_j8gfWUvVGTV|DIakoO55>RR=_P%qShxVGp_;>i6q}O&j;e-
z9S|HqnK|1CFX&cM)rT>2{b-9Z5$hI1je$i-(c;uBc^jZ4)XUXqiej6XZv0rGHFe8d
z&I*w%K8BPGo&}ja%s>_a<#M4AvM7-H=G=<Kv45h+Z>(c^oME3IS!x_85kOcFa~9av
z4!XD{$TM%#z%;tm>`-*1Y%hlkcFBEO??-qYWw@y@cADgBCN<}q=@5q9sZqj$0#|Ug
zLWOXD++Z@-dN6GyLP(YzC$7}SNzi<a3xa$vk;oqrVMb0wk}WU7p;=lGQ$WLqPgR;m
zmy{_ByL+(2l+$#1Q^(nTy48-lg1~0TUdqfRO;N2=Hu1j7$XcqcM4oQs*l1Uh3LjY{
zKboVDDl@2BPwTVMBts|$xW~t*D0RqZfUnN^sB<CDAixqTEQFj)bhv?hw-AGAl-1Ya
z8XBo%jPlTTZ>#FG#(svR8Pi;vBI4sz5N}NR@X99Zhu9UnvEiPND7=O^!Azr>u5eL1
zjxkfAM_~2zkAZlUbT3j`V@A;gA;u)FZd`m27j?@nk^$w&5K2LHbt%D_FyGu2hetP`
zl0i4M)Cq`e48Mg&H`T3<PQ~#VO-9!+^@XdgU5MslSNbM<J(X7#k!DMf6;rhnnp1sF
zH~9A@z{aCaecnP{ihVu>mlGVC*QGe#H1BJ=%z^meSaQ0!?Y|S2VfCd`8H!o_j9L7W
zwAK5obDUmm?G#tKb%~Q?veSCP7`xNric$_|Ahq0MI(Gm@)l!oBWqb79XQDbE#Y%s@
zr^EVS0R6HhImU^MC*eWXQ0(0ZClzM0M$Neo0#f0SqV{H?K)a}CF{MagSMBC-V{-+)
zGXRGddysLxh4)V?t{64DwoZuGjp#Xk-3KbIjyxkFKh=b3Y8Hj;27wZPh0`;v!a`-N
zE=EUp`pX)Lc%Hb{`b9QL9lZ8Rsl$C?v(Lpa6V?Z$tc%#JShEjz21n3c*GjQEu{51U
z#(oPg8{@pyatJCoA16<Jy6Z}XI#&(@R}Co-Aa-&nr^B_|Uy}S=zQ2v`(%d-mkIB}Y
ztniky&3DInBg@xDL6>ZR+H!cJtXN^C=DmYwg1t$&7J}deJqlP>l^ya!E1Nd(d|!%g
ztoi*#P>Hz>t&-PA8F_Y?{qf3kIo)2igBrDL4@c^>{CaFTvSX*SDEHFg74#sPMkTAb
zxfu)NX8K|7(kHo`P~@P}ua*fwNeF67fVg`uLe7xa4Y(a9O_S0nhC4Of<+}=<8EvVp
z<HEyBDsNerWi_vYUjg+|)nn*HEfDr~y03PD2A@{dJVWM!?m04@n$++D3J&oB7JeJ?
zeG0YgcI}^2_6E?WcG-C#{lE%H0~#I&wLG*khWzfoz%KuG7WBaeOf<y0d*fY_se~=)
zFB_Yd1`^_i+vW6~zi2wZy;cWFaZOId;fNL+J;~bNA8lW_H9;sLC(n-zdE7p)Dn30c
ze|}{Y@qFGjrCnVXCAYq=P!UmqR`$RPm{0Up6Zuj#54ivSn&HhL3=8d7oghu7KRTxn
zM;(`i=Jf-*PFOgS8CXwKTMZl_f2Z4#(noORMBO^WEICA{KugN3;L>rl(EP|*LB7|B
ze9Z*X7h75b)@o=TmN>J7jzECLEotGs=ohdbR=;b6Z=M|y@EGd$5CA(=VrYfgTFNZ$
zu-=3>`vk(z1K0VzsHp(Q$fn|$g!@G{0*&klPfuxuRK?f4F(vo@C1;DbYU&+>DI9*5
zLCQyE@SBp2SIK^5z_E*VG+AFnDamXj!IZ)eZ~dHM5`j+a*>M)OxVwecw&Jdaf|8;z
zE{FG-O}`u~zX^QO5AqNeB&!+D?^KP-fn}-($R_&=MMpAq)w<M}3exo1M)93}UHi!H
zJ8(_KNykNLqyf_IXj4j>vBxHUliYfHB<Wn}v8x-KNGl=#DVQ!%H9rr#%2@PL#{Z*i
zJX>I4<PK1;&9Q8QrEehK1plm^erPMn2h7e~LV+!>AZ7Y65qFSw6slZXMHHG?j%vDU
zR2^14z}oB8pF+gAxkfsO_?$to!m_cqb3J?gGtTAq14=zGEFHY_qu_NL<@qyN7<%;$
z7)dQX5t9wrZ8qrt_3{mHALwooDY|8Usr9a^J^D_Q@BOlrarl`WC^hr?QGXm55qmrp
z8Me2v%Dr9raUYpRUH#LBS@S>0oD`zFH6pYXtLLxXY6UuWdL__nA*)xvp2g673nXZ(
z(W;l|jQP^sp#T4rI@f79{@*0zcn?SZzX%1}mPP!>Iguw1@AjXf3JtL>8nyogYxBR`
z|I>vP|2OtenQK?CZu>9RM5yo1^coKI8h%0j3$11U=Zybvg603o*O~h_^EUB+bGFqf
z@(*fJms<o+d0*A-Zl0m&^Bw$y9eg9#e~GvK+Tj0_(&l`N@YYmw{J+()$o~RTIo|H!
z{{hO?{^MVJG2H*=SksMR!+~K#@Kmpvsp6^w)Am!0XY=KUK?>*f>qiV0Bl+#y-}$i+
zJZkNWa9URO5wiv8+oy}Z@9X=AXOAECLPt?m)wFNf1V@PSIlinEd?zn!`m=y@tYql7
z9nor%G$q_DLSNu1*yo5jH!p!lX}>cYQv17~JUqWTun#(7)d8X_5@z10IdTx<2nCBK
z=hFv4NdKb=8?mk6UlalaA})~q-$ZbE#z2S8(DI;!gh=;78?Tf=G)imu3};Lfn&GdH
zO5=f^6>D2)tizkQ4;f)^Q~u<qzNV{M^fb>zyXt+9LLNJ#=lQ!WcTghX9;^4e5|=ns
z+lY6stAoxN&P<v*DStndzH9gGlfOPn?r5NszLv9pu<w=zoZCUS&Axl$MnCug_6PO#
z2zf_$m|VP_nf=mSK6Hpbi~wg<xSRUn9~{6>F5t%;f#GQXCvI@}_)ZUDcVh8_4B$UH
z=ubMp#hW%L&6$02hXnYred`VyBs{)*!t+ZV1aRui?)RQLKmz<>;vT}wMno)i<^0A5
zwLM<FjJQJ|smcT_U@7te2ZLAnp)sQ0aM%rg88LGibix!$Q17Up9x%{=^K1hwINls|
z63$1dfj_qJFAI+(R<$IdkR}fyazH5DUqB7)B`i2u=&*o<7)s{)_<C&Afmk~vFNf$o
zGv<NkG31pWvd<;zekM@px*LQ;$gdU$;<}Ll_Qb<x$7u02aiPXW=cmTlJD;)A*JaUk
zKBG85&$R#YCt+}9`H8ynx@v##EK2Du<!HwE(MN+>*N~|;xQ8k)-ZnbxmWbY=A6)N7
z-_OGfA6r@gGcU}oH1WZodw9v~Q4Z1%&Yprf#64W<@1$1<k~>r%5pce6`||wXckt++
zmOjCT9vHg@jIsN;)W^=RVaaiaxYTEluVFCWAiI5Ql0LzS829in&N#aY?X&-yykhnA
z*LQ{4GqPK|cQg8Ql(r#i(C3Z{l=Us}I;Tf7cz`jE*l)o4Gx;BK7|x))I{zKwY|CN<
zK*Qnki5pH?f{3wr#Sf$(f@L<%k5WZ*$>*2<eo?|Ai@zi80t`?_fU%zz@lZyiNNxo=
zqz+JKh~f^sC}5E#YlJ!=hAJvW5QJ?0i%M^WI*^1aIz@ORsr@r$48p|C|24@N`z7<w
zl(qT&I+X=gWP-|L@l6$tBIlEOk~ctkK17h|4^uRRin#cxj765WCjBUHNE<lx$MPH4
z&g&kv(~rgHK}O!+{$Rg%IJ+;8=SIfo%sMyofVYouvk7vdvM!vge*b$gZAV68cI?g*
zYTZ+zjzECD@&1zqK!uQe8oL(@s$d8H)00WT%SOWD{w>_=wz|F_oZBnn@rfDczP}`2
zMq;(h0&veUb$r1OIYF_|`ynL<7cfJ}tCh_^eQntPS7lGeo5S-FCU3lECf@+-1Z3DL
zYz(!EmIm`WHMY@^pfFu~k<el;F5L3T*J_<%ZemLZc4fC7Q4zg$ZHQd<7@lhu@Owoe
zxe8mV)4a>n%<&37vi@;z4>F+!ULW%Q%Fs`upb|?Ari?GE3PqdPhJ}jWxZp69C4#0m
zgrD|Ugrc&HE^A$R3K#5@xc^$>&N#>b{*HSm{T0XSTSD#_9!Ol++^wq4_H~E_kg-Q(
z;$B`__9~BL_8N_86*-y?Agx2}HB4DOw%5t;^7Hfq@x<rSr>^s!k>;}W8zirz(JUu(
z?`t<VAvqdNS_2mU)c|+FMaq`j-SIk`9UObvXYBFeYH~-CKBp&hhFF&ceN98Kha>tF
zSxHkC{R%+#$CuAELx1RLz;G6utSo!oT=f(tsQO_D`H{KM<nck8*gLJ$Zv28%l9$>-
zOEXX^vmU|Zg|Q*i>%0504T;0Fddb1KVs7(DwJZ(wBywPN$$hT|SLNE(^3{K;2oTHs
zJp-)@B8$b4%|Kx0xrNUyAScHsJDyUuY&`POppdW{8J9OGrC(3pyq`V(Wjzc(SA5r%
zXoP4IUGh?%K@e^~)Z`4g1`O;py#5E%iT@yj$`C)f9>@lj$V#l-&7DrU4RJ2KAX6>w
zj|27*c-E|PTBJ;9`q<4?@B%K?(n9q7hND3?Gyn8sa4?d8+UezMB26ly1pzoYLVfC)
z#Tl!2PDP;$oev^IhUDK#;F8D!#wjLpwYgX(YBf4PR+p~GzFmJY7~@XiSwi@nKFau_
z?SezTtTK_Fk)~C2{Z|rGdVXG)F0Eca6Ipn=?8QZ1eZ#4nk<|)ou|90;KD&B?qorVB
zm-`~y<>bR6TLN;_S5@O=s4A0|EsN^YRENy-mQ-)orA$9}=w6(~x?9<%(rk{JBuKW1
z^AAFW-QW5wDoJlEKA=878E=`xE8Jh=l=ksjur>OpquS;CSVL`?C>Ek1`o&;qr4B!W
zN&4=mUu6x)n@=@ZXwUrMg>_cA{G5jh^Uh}>qy8qVf9fT7zf?fJzh^rG#@-11;O6vw
z(Vk+iU~-1swWn+6B8mz?37SkAtOTMh{nE`%&jhcd0jb{cx1a`i;%-ZRsGNL(9ss1<
zD?-s!cR=n{AbG)SU)I*fmx=mW-@HPC={wxy-#I?Y7VxoKGv;qllg3v?Vm5^@79EU;
zLBVW*zG+C2L54nuY-=kZP=VxUQ!_H8<q#-##toE;87D+=ZoG`iAJV~r(~IS$g4w5*
zu<XR^Wd`gExb!BaDVp=~qQLB}!{}7g5Wx+QdqcHDgTsIrl*O>Gk@hK+KJJw~&!8wi
z8J!-1iJWWS*Z1lYEeL-$rddk?=|IWjB`}6O1aKW21A&*&0IiG;u-i}w9>}Gg;hePH
zbgV3);8=~rjK%b)L=k7W+v7d;o2@*WpPQZPfJf(XL2+S~uzqa%Ei&q1yTgmh68*%&
zYStQUu#?Zix}(u`{<4K*EcQiQA667R4{A>|t2PlMF%@j3oVs?;6tN}`07Qz`fhTfy
z5yk+G`<5%){t26bTaHY&E22`w$I`uszrg2RJ{8iGM~nN;ojm`0H)lDJ*~&y)G#e)=
zt9|sM!Xn70E>wLQg_xVP_KsnCNxf35kbIy%8<AMt{qf^Su+B-RE!PPrmzLJ=TsOg7
zkJ`3O6tM1TJGCIOn2qPDIx((3TE8zWCEox+IQbI=0kP3>M+o+4fhj)QEtk>zcOboY
zWq?<GrYzk<y!<-I?Htw6PU$vCbhEEVp$l|)y6$1X6OV_1_-rI5rrC4O#}LsDEYwyK
zMMTaR3fr=(gl^8S8gp1(FOU}L*OEJnP!7$_X*<D&e&_X;goQwhoq3yU(c1<hGoP-{
zUsdA8Q-xA@5OJoDNYcev^$Isq2lnvN*qpXW@LP&7fLwfkSW!Vz_2-K^YAk!#7ewK$
zU?z02Cuk8@N9a09wVC{a@K-sJDwu56ea0jw6{{;nl}u*QW5$=1%D4~jYh-BLo9S!%
zeIFJJ0W`el`Xlq<@vg?If7cynGUP*JB6xEc0U`C|sQZpf{Ad<~d}18h>EYtoZ}?N=
z?W}=VSdu5&DBtLCdWa2!BZt$;!ZsZE%DHu)b2yLPhaTZ4Dl0&5z*4Vsn01FU|MwR>
zq$hp04L^Zz@bTegx)QFm<zHC)@D=j`A70lHCc>tgHxIOmpO0JWlf&R8n42>3N2hc5
zC)}_?K3TS}-{OfbefMAses}J2pa^KvEwrg|*%`$eZh2`#2j)Y+|Kyp=)+f9L_o8Og
zrn1Q2Pfz`jEO_jbaXtQ;ZNe5iGe*l53)<hsb`5vC&l~hY_}+|OYaEK?w8Q4sRBam>
z3M+kQ5A(UOI{BbE*?dT}P?<N&E`|?zNZiX~_QJ!~{gqfKZuvKG)zjFw(4z!2RKHh4
zYJV#V17;E{bXt@?ZDXjH*y@$6%m_E<o|{lYL>+d@RNK1TtlZAzS_Y#36=`>%G|Z~M
z^adt}0o$?O(c@sGd+o=2{%q3+Z~w=7V3y>Q2DS8SI4{%Tnm^#D6F8Xi=k=HQZR&oK
z`B~qDf5<Al)>}#1Rwe;F-zWtAtdQSL7C(1gB#0S*y{%nFhDHdq-!Utu&AwWt)9llo
z;-Vze;KSA3TvIV)x5qIjLxFkJI;Q7Z!+co;%l)v#Cq}SGcgm|s5NES|nL9yt!=s-~
zx&zMTQdxF6c*2IgJhWAsVivHgcMPf%?k@o{k~l?^&}U6jAJH4Zqt?YPO+N(g@!#<r
zXJ2P&aESPW(faayxwX{I@Q5+U?Aoq~;+@fAJlyzzht+5gt5~_;+nFt}{`+I5ll-5d
zgCp#C!*pzimsmd;%1WPs$jF!TzClWl^vHR8bEuH$qe3C0ksLT?P`;6;dQ4>quUqTf
z*>IKUNuE)4;P)qfu-j1#x`3Q$<j>0=&Bb+*(@Og<Rlkv1|8<t{V~RQF;Trpsk^Dcs
zfiJ>0tmI&`dZ2?)IF2ujF@9%rgjMeRO&>{zp)cr|Br_Bav2ly*Pg1Kh`e=GwPav^8
z-Y@$w8+X=+0waI)czh;U{A^5cJkUmNHu^?Ne`PQTGItO60?*GikmV?jwmXe(0!JKz
z2MpcE3LJRE5N4c}@|#!}e!NZ`a?Vrv{~<V#xq#sNxAoaPi?5am^%nN<D0Tfr>>}q&
z1|t|oh&);X(vo|{`=zg5NIW7|-(8I&neQRP1B=FerPic(HqxA+@8xcATjEib9yC=B
zK4rxi3U+0{cJO)wMaF3SuPY>dfo&lD3E#WQ%n-Z$dq<TYw;7mw<p-TP`uIII_8mX9
zAR7Fw`=!qcfQ@*-Wv@;}B93K<?;ADrCZS1{ocM!1=sI5|<83Hh<eSpg*blwNOAx)S
zzR#s|GkZTO%gnyg_}F$sc6;}4ml2zG<9vsen=b8n+44fnp>ko@rlee7wzoSk$dotA
zVDRL<J}T0tmdCa@P2#7vrKoM%A5o08v(oB0#!Riehq^*Y79C0G^~ddnr})rc_X^Q#
zZv}c6l|^2F@1D+7U%agx63-J1<>8;#XF#JvRdk1+Y4;9xAUXM(KM?(Qm4o@_Mxi%(
z0;~_)Y6*clUO&V=4l~*09QB5G=QPZ7y@9+u?nc_?P-lG(f#cRP8OZ=2+(Y)a!MT};
z1ImcAMjm#-r*<CfgO5}m-!Qp9P_yoPZ^*m?!KeEBZ*;t;d-wcc_xlw9b0*$D{mw5U
zYCV1reCGU{;q8FIal_(C>Mq6B7W4!8!#GL-Wcj&t%I_G3o~ZrvKnjFe-@B{OQz%|B
z53Amr3d=XIH|BCDkL-amlwLf#-+vm5j2jNL*IQQVSULIxO#O_FrH!Q*eTG+IpAA$+
z)wvxB5nyvV$9^ygONa&1S4cqbR-CVLka`nwn$0v9@=aY@3Vhcu+PzFrEhR)BpcjyE
zmxz9OUve$fOVaGAt?=H!Bm^>s9510AG!U*Q$0jG;sYB98;2Z!6Dv)E$lN1Zdh8%jV
zvs;E=Wato}7}QPA<H^z{%83&PM$7#$TG5^Wtu;eDLw``&)_fqX(ls-=#A%{82{p<U
z4*K$@Iq`O2R!81e?avJEw#}MwkBacL!`vZA>>KT_{TjF+IVkuVQmyY+rL{w6dI{fu
z4_k`~dVWr@oSNBq)0Qm9FKb1)KH}iDsf(9TzhW5lm9lr@ZLXUI7LFTg>Wf1$<CsId
zevDbnfKPY~bdVYl@g_*0x#|L(%I~3b)~)Foct3o)tU#<Cr={GD0NKOcHL9xd`rM@4
zIrtmG!JH;kNuO^s>>GZF*%_GHje3WtdpUsaZ3B6Dm!=)~3Jq)`l5~AFO)+BMTH_&3
z#@_H{o8D9<-9Jlt$RB(UF?;-o4Gi*OKu#8S=AEM7pXH8d+6WxFKqH?22o?go6MJ;j
zr4aK7B|X++1>iiGAiD-p2s}ZK;Lyp5Q?dqjXYc+ZBXT5PwI!sq<KOxtS55!!dPDH?
z50yyjyxkQY>y209RWuvOsfFayn{Xi(oO*Z5h}rpm3vrR~QmDWe{t&Y82|H#nNPVCN
zHKWSrFd+A=-i0%Rj{KfsE$wdZVNSnZ8uA)9C}jc$HRBP;<1kpc#A4ZdQRIA%5Adwp
zLk4cr&Evpg+}w|NpV`Ak^ZWD$G3(sTWi@F1xX%aHm)s|Tn4-N(>t!%db0lOp*zxue
z?y~`0#)5*R(m@WauJ2vi-a*>l0W^M6PkV75{6o=hh#BH`iH_@F9@H8B$$I;Q2X*kb
z!3LjcRFIyq>XXmLp2-$4_qUt0g-wuKqtL&9`ac4azd?tt)Q#T#Wv3p>gC1T>V+gn8
z-#>RV|01rR{ovgP>ThYdgWr8vdyKkyTd^Z;31~@+M`-G)3wm~g*k^A}Jlt_`(KYP4
zK-6Iw`QOq8_`@0Zd2@c_5zs$h?kElamA<n7!a~IS@W1Wj+szAg{EZ$(82a+w`>@12
zd~S)Se}(wX+V=zW=^q9VfVz9o&CMiqex>>6C;YZc(d=QV(kBprst2U)qA#z;=Yd9l
zT&6z0{y^@@`_3povI6v5k59k)UJxX6S3#qlBXaP5#HTRrXtHMZfckm^?yz}%gjzK9
z>q6c)CSp?7X1gE^bTFPB-mN{`)^@8wd<e%rjI;G{46@z3f(AvF&3u2q0te_PE$j}S
zM|{oyL<}1F|3$sigMYI>cohKlz&qQW-uJI=op|ItA-v1-e3cAvtU91Zh}-A)k<_z5
zLGALJ1^cQ7$1<1E^s6J|0E+g;%c|1+)ZCJY`r42#(_FlTc;$%iwf6LKC*fz%2VYS3
z^l9kz#vO=*dh5!AyLV{V{dmN~_~`D1zGI&I!!7sIyRjeucDFFw^o<@SFnt*H?u57Z
zyX5mL6A<-vV9rJR9Hl>iYu=#$i4zc|^cm+-{g8FdbbXF)AfE>0BMxH^iDljt`gtoX
zjFNr)?@nhw{l?R~>bxso=WzpZizotdhHb@lan4>wKktTdnglGwpXp0)3VU3Z(zkeh
zX?`<HtCov34_z<@*$uskfK_0hxv|-nV$+Tk{s?g;Dobnbh?Bovdf}tEg`{{lXSX--
zhv%&hSoy~oXRQdJW9+ObpZu;;%gY)fs9+<^`?3{Nf~4rBBxw%C^*M9MvYcuXWsu<K
z3ad^@jX-LDTkD{)k;qB>vQ&y7R1ee98EtyoBhu4U67C+Jbg!+|+>y>1i8eQOSIq2^
z%(Jdd3BBl(uJ_Zr2k&h-8)EEt(m<u`qRCDw1ibtN#ZU4$$XC3zZAX!&peQx*D8oqF
zbxatmt=gUhQfEU@k?B&EhPeVPdIaag2LZj(atvcv5^3cqk3N+9d79)0N`fe*B<gNP
zLb0;~bn<ZwW8a^5Obz(uq&mmNxS((S;L-_u5m4(QKF~SgbxztP0~S*1$rDBe(b8%4
z!dTJio_L!~a>DXT$=Nma7Qkeb=m1ZaU;X!-6jQNw8q1KAfLw-z?sJ`{E5mkn=)}nr
z741ly#=Kmi1d@ftn$$tMR0Z5<fRu>_8X9z!ixzQLW0SY0w|U#Y&*>fo|F&LVO>-z}
z($ZU>r9VSigb~L8t%-^F@kzHXaMgr*n(ZMbEE-_RCAm?DD<k9dgI`i!jiXeLIv>(@
k_RWOHjyab)r`)UUGp@DH|D|s0r+@sMSM5dsVF3gEA8-;l(f|Me
diff --git a/testcases/network/nfsv4/locks/deploy_info b/testcases/network/nfsv4/locks/deploy_info
deleted file mode 100644
index b8a4660f2..000000000
--- a/testcases/network/nfsv4/locks/deploy_info
+++ /dev/null
@@ -1,37 +0,0 @@
-locktest.py script aims to help deploying and running locktests over multiple NFS
-clients accessing the same server.
-
-The source code of NFS client test is in ./deploy/locktests.tar.gz
-
-Setting up lock test with several test machines.
-================================================
-./locktests.py --setup -c <machine1> [machine2 ...] -s <my_nfs_server>:</>
-
---setup : Option to setup the test
--c <machine> [...] : Setup test on these clients
--s <server>:<mountpoint> : NFS server to use, followed by full directory to mount
-
-
-Example:
-./locktests.py --setup -c client1 client2 client3 -s NFS_Server:/exported/directory
-
-
-Running lock test over several test machines.
-=============================================
-Run test on already configured test machines.
-./locktests.py -n <pid> -f <file> -c <machine1> [machine2 ...]
-
--n <process_id> : Process number each test machine will lauch to perform the test
--f <file> : Test file. That must be the same on each machine
--c <machine> [...] : Clients. run tests from this clients
-
-
-Example:
-./locktests.py -n 50 -f /mnt/nfsv4/testfile -c testmachine1 testmachine2
-
-
-
-_________________________________
- Vincent ROQUETA - Bull SA - 2005
- vincent.roqueta@ext.bull.net
-
diff --git a/testcases/network/nfsv4/locks/locktests.c b/testcases/network/nfsv4/locks/locktests.c
deleted file mode 100644
index 961354e42..000000000
--- a/testcases/network/nfsv4/locks/locktests.c
+++ /dev/null
@@ -1,1034 +0,0 @@
-/* *************************************************
- * *********** README ******************************
- * *************************************************
- *
- * COMPILE : make
- * RUN : ./locktests -n <number of concurent process> -f <test file> [-P]
- *
- * GOAL : This test tries to stress the fcntl locking functions. A
- * master process sets a lock on a file region (this is called "byte
- * range locking"). Some slave processes try to perform operations on
- * this region, such as read, write, set a new lock ... The expected
- * results of these operations are known. If the operation result is
- * the same as the expected one, the test suceeds, else it fails.
- *
- *
- *
- * Slaves are concurent processes or thread.
- * -n <num> : Number of threads to use (mandatory).
- * -f <file> : Run the test on given test file defined by the -f option (mandatory).
- * -c <num> : Number of clients to connect before starting the tests.
- *
- * HISTORY : This program was written to stress NFSv4 locks.
- * EXAMPLE : ./locktests -n 50 -f /file/system/to/test
- *
- *
- * Vincent ROQUETA 2005 - vincent.roqueta@ext.bull.net
- * BULL S.A.
- */
-
-#include "locktests.h"
-
-int MAXLEN = 64;
-int MAXTEST = 10;
-extern int maxClients;
-extern int fdServer;
-
-char message[M_SIZE];
-int slaveReader;
-int masterReader;
-int slaveWriter;
-
-/* Which lock will be applied by the master process on test startup */
-int LIST_LOCKS[] = { READLOCK, WRITELOCK,
- READLOCK, WRITELOCK,
- READLOCK, WRITELOCK,
- READLOCK, WRITELOCK,
- BYTELOCK_READ, BYTELOCK_WRITE
-};
-
-/* The operations the slave processes will try to perform */
-int LIST_TESTS[] = { WRONLY, WRONLY,
- RDONLY, RDONLY,
- READLOCK, WRITELOCK,
- WRITELOCK, READLOCK,
- BYTELOCK_READ, BYTELOCK_WRITE
-};
-
-/* List of test names */
-char *LIST_NAMES_TESTS[] = { "WRITE ON A READ LOCK",
- "WRITE ON A WRITE LOCK",
- "READ ON A READ LOCK",
- "READ ON A WRITE LOCK",
- "SET A READ LOCK ON A READ LOCK",
- "SET A WRITE LOCK ON A WRITE LOCK",
- "SET A WRITE LOCK ON A READ LOCK",
- "SET A READ LOCK ON A WRITE LOCK",
- "READ LOCK THE WHOLE FILE BYTE BY BYTE",
- "WRITE LOCK THE WHOLE FILE BYTE BY BYTE"
-};
-
-/* List of expected test results, when slaves are processes */
-int LIST_RESULTS_PROCESS[] = { SUCCES, SUCCES,
- SUCCES, SUCCES,
- SUCCES, ECHEC,
- ECHEC, ECHEC,
- SUCCES, SUCCES
-};
-
-/* List of expected test results, when slaves are threads */
-int LIST_RESULTS_THREADS[] = { SUCCES, SUCCES,
- SUCCES, SUCCES,
- SUCCES, SUCCES,
- SUCCES, SUCCES,
- ECHEC, ECHEC
-};
-
-int *LIST_RESULTS = NULL;
-char *eType = NULL;
-
-int TOTAL_RESULT_OK[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
-
-void *slave(void *data);
-int (*finish) (int a);
-
-int finishProcess(int a)
-{
- exit(a);
-}
-
-int (*load) (void);
-
-struct dataPub dp;
-
-/* Functions to access tests/tests names/tests results*/
-int testSuiv(int n)
-{
- return LIST_TESTS[n];
-}
-
-int resAttSuiv(int n)
-{
- return LIST_RESULTS[n];
-}
-
-char *nomTestSuiv(int n)
-{
- return LIST_NAMES_TESTS[n];
-}
-
-int lockSuiv(int n)
-{
- return LIST_LOCKS[n];
-}
-
-/* Verify the test result is the expected one */
-int matchResult(int r, int n)
-{
-
- P("r=%d\n", r);
- if (r == LIST_RESULTS[n])
- return 1;
- else
- return 0;
-}
-
-/* Increments the number of process which have successfully passed the test */
-void counter(int r, int n)
-{
- TOTAL_RESULT_OK[n] += matchResult(r, n);
-}
-
-/* Special case for test 'lock file byte byte by byte'.
- * We ensure each byte is correctly locked.
- */
-void validationResults(int n)
-{
- int i, u, l, fsize;
- struct flock request;
-
- fsize = dp.nclnt * (maxClients + 1);
- TOTAL_RESULT_OK[n] = 0;
- l = FALSE;
- u = TRUE;
-
- /* If the expected operation result is a success, we will have to increase the number of correct results */
- if (LIST_RESULTS[n]) {
- l = TRUE;
- u = FALSE;
- }
-
- for (i = 0; i < fsize; i++) {
- request.l_type = F_WRLCK;
- request.l_whence = SEEK_SET;
- request.l_start = i;
- request.l_len = 1;
- fcntl(dp.fd, F_GETLK, &request);
- /* Ensure the lock is correctly set */
- if (request.l_type != F_UNLCK)
- TOTAL_RESULT_OK[n] += l;
- else
- TOTAL_RESULT_OK[n] += u;
- }
-}
-
-int initTest(void)
-{
-
- P("Master opens %s\n", dp.fname);
- dp.fd = open(dp.fname, OPENFLAGS, MANDMODES);
- if (dp.fd < 0) {
- perror("lock test : can't open test file :");
- finish(1);
- }
- P("fd=%d\n", dp.fd);
- return 0;
-}
-
-struct dataChild *initClientFork(int i)
-{
- struct dataPriv *dpr;
- struct dataChild *df;
-
- /* Initialize private data fields */
- dpr = malloc(sizeof(struct dataPriv));
- df = malloc(sizeof(struct dataChild));
- dpr->whoami = i;
- df->dp = &dp;
- df->dpr = dpr;
- /* Initialize master to client pipe */
- dp.lclnt[i] = malloc(sizeof(int) * 2);
- if (pipe(dp.lclnt[i]) < 0) {
- perror("Impossible to create pipe\n");
- exit(1);
- }
- P("Initialization %d\n", i);
- write(0, ".", 1);
- return df;
-}
-
-int initialize(int clnt)
-{
-
- /* Initialize private data fields */
- printf("Init\n");
- dp.nclnt = clnt;
- dp.lclnt = malloc(sizeof(int *) * clnt);
- dp.lthreads = malloc(sizeof(pthread_t) * clnt);
-
- /* Initialize client to master pipe */
- if (pipe(dp.master) < 0) {
- perror("Master pipe creation error\n");
- exit(1);
- }
- printf("%s initialization\n", eType);
- load();
- initTest();
-
- return 0;
-}
-
-void cleanClient(struct dataChild *df)
-{
- int i;
- i = df->dpr->whoami;
- free(dp.lclnt[i]);
- free(df->dpr);
- free(df);
-}
-
-void clean(void)
-{
- free(dp.lthreads);
- free(dp.lclnt);
-}
-
-int loadProcess(void)
-{
- int i;
- struct dataChild *df;
- for (i = 0; i < dp.nclnt; i++) {
- df = initClientFork(i);
- if (!fork()) {
- P("Running slave num: %d\n", df->dpr->whoami);
- write(0, ".", 1);
- slave((void *)df);
- cleanClient(df);
- exit(0);
- }
- }
- return 0;
-}
-
-void lockWholeFile(struct flock *request)
-{
- request->l_whence = SEEK_SET;
- request->l_start = 0;
- /* Lock the whole file */
- request->l_len = 0;
-}
-
-void selectTest(int n, struct s_test *test)
-{
-
- test->test = testSuiv(n);
- test->resAtt = resAttSuiv(n);
- test->nom = nomTestSuiv(n);
- test->type = lockSuiv(n);
-}
-
-/* Final test report */
-int report(int clnt)
-{
- int rc = 0;
- int i;
- int totalClients;
- totalClients = clnt * (maxClients + 1);
- printf
- ("\n%s number : %d - Remote clients: %d local client 1 - Total client %d - Total concurent tests: %d\n",
- eType, clnt, maxClients, maxClients + 1, totalClients);
- printf("%s number running test successfully :\n", eType);
- for (i = 0; i < MAXTEST; i++) {
- if (TOTAL_RESULT_OK[i] != totalClients)
- rc = 1;
-
- printf("%d %s of %d successfully ran test : %s\n",
- TOTAL_RESULT_OK[i], eType, totalClients,
- LIST_NAMES_TESTS[i]);
- }
- return rc;
-}
-
-int serverSendLocal(void)
-{
- int i;
- /* Synchronize slave processes */
- /* Configure slaves for test */
-
- for (i = 0; i < dp.nclnt; i++)
- write(dp.lclnt[i][1], message, M_SIZE);
- return 0;
-
-}
-
-void serverSendNet(void)
-{
- writeToAllClients(message);
-}
-
-int serverReceiveNet(void)
-{
- int i, c;
- for (c = 0; c < maxClients; c++) {
- for (i = 0; i < dp.nclnt; i++) {
- serverReceiveClient(c);
- }
- }
- return 0;
-}
-
-int serverReceiveLocal(void)
-{
- int i;
- for (i = 0; i < dp.nclnt; i++)
- read(masterReader, message, M_SIZE);
- return 0;
-}
-
-int clientReceiveLocal(void)
-{
- read(slaveReader, message, M_SIZE);
- return 0;
-}
-
-int clientSend(void)
-{
- write(slaveWriter, message, M_SIZE);
- return 0;
-}
-
-int serverSend(void)
-{
- serverSendNet();
- serverSendLocal();
- return 0;
-}
-
-int serverReceive(void)
-{
- serverReceiveNet();
- serverReceiveLocal();
- return 0;
-}
-
-/* binary structure <-> ASCII functions used to ensure data will be correctly used over
- * the network, especially when multiples clients do not use the same hardware architecture.
- */
-int serializeTLock(struct s_test *tLock)
-{
- memset(message, 0, M_SIZE);
- sprintf(message, "T:%d:%d:%d::", tLock->test, tLock->type,
- tLock->resAtt);
- return 0;
-}
-
-void unSerializeTLock(struct s_test *tLock)
-{
- sscanf(message, "T:%d:%d:%d::", &(tLock->test), &(tLock->type),
- &(tLock->resAtt));
- memset(message, 0, M_SIZE);
-
-}
-
-void serializeFLock(struct flock *request)
-{
- int len, pid, start;
- memset(message, 0, M_SIZE);
- len = (int)request->l_len;
- pid = (int)request->l_pid;
- start = (int)request->l_start;
- /* Beware to length of integer conversions ... */
- sprintf(message, "L:%hd:%hd:%d:%d:%d::",
- request->l_type, request->l_whence, start, len, pid);
-}
-
-void serializeResult(int result)
-{
- memset(message, 0, M_SIZE);
- sprintf(message, "R:%d::", result);
-
-}
-
-void unSerializeResult(int *result)
-{
- sscanf(message, "R:%d::", result);
-}
-
-void unSerializeFLock(struct flock *request)
-{
- int len, pid, start;
- sscanf(message, "L:%hd:%hd:%d:%d:%d::",
- &(request->l_type), &(request->l_whence), &start, &len, &pid);
- request->l_start = (off_t) start;
- request->l_len = (off_t) len;
- request->l_pid = (pid_t) pid;
-}
-
-int serverSendLockClient(struct flock *request, int client)
-{
- serializeFLock(request);
- return serverSendClient(client);
-}
-
-int serverSendLockLocal(struct flock *request, int slave)
-{
- serializeFLock(request);
- return write(dp.lclnt[slave][1], message, M_SIZE);
-}
-
-int getLockSection(struct flock *request)
-{
- memset(message, 0, M_SIZE);
- clientReceiveLocal();
- unSerializeFLock(request);
- return 0;
-}
-
-int sendLockTest(struct s_test *tLock)
-{
- serializeTLock(tLock);
- serverSend();
- return 0;
-}
-
-int getLockTest(struct s_test *tLock)
-{
- clientReceiveLocal();
- unSerializeTLock(tLock);
- return 0;
-}
-
-int sendResult(int result)
-{
- serializeResult(result);
- clientSend();
- return 0;
-}
-
-int getResults(int ntest)
-{
- int i, c;
- int result = 0;
- /* Add remote test results */
- for (c = 0; c < maxClients; c++) {
- for (i = 0; i < dp.nclnt; i++) {
- serverReceiveClient(c);
- unSerializeResult(&result);
- counter(result, ntest);
-
- }
- }
- /* Add local test results */
- for (i = 0; i < dp.nclnt; i++) {
- read(masterReader, message, M_SIZE);
- unSerializeResult(&result);
- counter(result, ntest);
- }
-
- return 0;
-}
-
-#ifdef DEBUG
-#define P(a,b) memset(dbg,0,16);sprintf(dbg,a,b);write(0,dbg,16);
-#endif
-
-/* In the case of a network use, the master of the client application si only
- * a 'repeater' of information. It resends server-master instructions to its own slaves.
- */
-void masterClient(void)
-{
- fd_set fdread;
- struct timeval tv;
- int n, i, r, m, start;
-#ifdef DEBUG
- char dbg[16];
-#endif
- struct flock lock;
- int t;
-
- masterReader = dp.master[0];
- FD_ZERO(&fdread);
- tv.tv_sec = 50;
- tv.tv_usec = 0;
- n = fdServer > masterReader ? fdServer : masterReader;
- printf("Master Client - fdServer=%d\n", fdServer);
- while (1) {
- /* Add slave and server pipe file descriptors */
- FD_ZERO(&fdread);
- FD_SET(fdServer, &fdread);
- FD_SET(masterReader, &fdread);
- r = select(n + 1, &fdread, NULL, NULL, &tv);
- if (r < 0) {
- perror("select:\n");
- continue;
- }
- if (r == 0) {
- exit(0);
- }
-
- if (FD_ISSET(fdServer, &fdread)) {
- /* We just have received information from the server.
- * We repeat it to slaves.
- */
- i = readFromServer(message);
- t = message[0];
- switch (t) {
- case 'L':
- /* Lock instruction. We need to send a different section to lock to each process */
- unSerializeFLock(&lock);
- start = lock.l_start;
- for (i = 0; i < dp.nclnt; i++) {
- lock.l_start = start + i;
- serializeFLock(&lock);
- write(dp.lclnt[i][1], message, M_SIZE);
- }
- printf("\n");
- continue;
- case 'T':
- /* Test instruction. Ensure server is not sending the END(ish) instruction to end tests */
- /* To be rewritten asap */
- m = atoi(&(message[2]));
- if (m == END)
- break;
- if (m == CLEAN)
- printf("\n");
-
- serverSendLocal();
- continue;
- }
- break;
- } else {
- /* Else, we read information from slaves and repeat them to the server */
- for (i = 0; i < dp.nclnt; i++) {
- r = read(masterReader, message, M_SIZE);
- r = write(fdServer, message, M_SIZE);
- if (r < 0)
- perror("write : ");
-
- }
- continue;
- }
- }
-
- /* Receive the END(ish) instruction */
-
- /* Repeat it to the slaves */
- printf("Exitting...\n");
- serverSendLocal();
-
- /* Ok, we can quit */
- printf("Bye :)\n");
-
-}
-
-int master(void)
-{
- int i, n, bl;
- int clnt;
- char tmp[MAXLEN], *buf;
-#ifdef DEBUG
- char dbg[16];
-#endif
- struct flock request;
- struct s_test tLock;
- enum state_t state;
- int offset;
- /* A test sentence written in the file */
- char phraseTest[] =
- "Ceci est une phrase test ecrite par le maitre dans le fichier";
- bl = -1;
- clnt = dp.nclnt;
- masterReader = dp.master[0];
- state = SELECT;
- /* Start with the first test ;) */
- n = 0;
- printf("\n--------------------------------------\n");
- while (1) {
- switch (state) {
- case SELECT:
- /* Select the test to perform */
- printf("\n");
- E("Master: SELECT");
- selectTest(n, &tLock);
- state = tLock.type;
- bl = 0;
- if (n < MAXTEST) {
- memset(tmp, 0, MAXLEN);
- sprintf(tmp, "TEST : TRY TO %s:",
- LIST_NAMES_TESTS[n]);
- write(0, tmp, strlen(tmp));
- } else
- state = END;
- P("state=%d\n", state);
- n += 1;
- continue;
-
- case RDONLY:
- case WRONLY:
-
- case READLOCK:
- P("Read lock :%d\n", state);
- request.l_type = F_RDLCK;
- state = LOCK;
- continue;
-
- case WRITELOCK:
- P("Write lock :%d\n", state);
- request.l_type = F_WRLCK;
- state = LOCK;
- continue;
-
- case LOCK:
- /* Apply the wanted lock */
- E("Master: LOCK");
- write(dp.fd, phraseTest, strlen(phraseTest));
- lockWholeFile(&request);
- if (fcntl(dp.fd, F_SETLK, &request) < 0) {
- perror("Master: can't set lock\n");
- perror("Echec\n");
- exit(0);
- }
- E("Master");
- state = SYNC;
- continue;
-
- case BYTELOCK_READ:
- bl = 1;
- request.l_type = F_RDLCK;
- state = SYNC;
- continue;
-
- case BYTELOCK_WRITE:
- bl = 1;
- request.l_type = F_WRLCK;
- state = SYNC;
- continue;
-
- case BYTELOCK:
- /* The main idea is to lock all the bytes in a file. Each slave process locks one byte.
- *
- * We need :
- * - To create a file of a length equal to the total number of slave processes
- * - send the exact section to lock to each slave
- * - ensure locks have been correctly set
- */
-
- /* Create a string to record in the test file. Length is exactly the number of sub process */
- P("Master: BYTELOCK: %d\n", state);
- buf = malloc(clnt * (maxClients + 1));
- memset(buf, '*', clnt);
- write(dp.fd, buf, clnt);
- free(buf);
-
- /* Each slave process re-writes its own field to lock */
- request.l_whence = SEEK_SET;
- request.l_start = 0;
- request.l_len = 1;
-
- /* Start to send sections to lock to remote process (network clients) */
- for (i = 0; i < maxClients; i++) {
- /* Set the correct byte to lock */
- offset = (i + 1) * clnt;
- request.l_start = (off_t) offset;
- serverSendLockClient(&request, i);
- }
-
- /* Now send sections to local processes */
- for (i = 0; i < clnt; i++) {
- request.l_start = i;
- serverSendLockLocal(&request, i);
- }
- state = RESULT;
- continue;
-
- case SYNC:
- sendLockTest(&tLock);
- if (bl) {
- state = BYTELOCK;
- continue;
- }
-
- if (n < MAXTEST + 1)
- state = RESULT;
- else
- state = END;
- continue;
-
- case RESULT:
- /* Read results by one */
- getResults(n - 1);
- if (bl)
- validationResults(n - 1);
- state = CLEAN;
- continue;
-
- case CLEAN:
- /* Ask the clients to stop testing ... */
- tLock.test = CLEAN;
- serializeTLock(&tLock);
- serverSend();
- /* ... and wait for an ack before closing */
- serverReceive();
- /* Ignore message content : that is only an ack */
-
- /* close and open file */
- close(dp.fd);
- initTest();
- state = SELECT;
- continue;
- case END:
- tLock.test = END;
- serializeTLock(&tLock);
- serverSend();
- sleep(2);
- break;
-
- printf("(end)\n");
- exit(0);
-
- }
- break;
- }
-
- return report(clnt);
-}
-
-/* Slave process/thread */
-
-void *slave(void *data)
-{
- struct dataChild *df;
- int i, a, result, ftest;
- struct s_test tLock;
- struct flock request;
- char tmp[16];
-#ifdef DEBUG
- char dbg[16];
-#endif
- char *phraseTest = "L'ecriture a reussi";
- int len;
- enum state_t state;
-
- result = -1;
- ftest = -1;
- len = strlen(phraseTest);
- df = (struct dataChild *)data;
- i = df->dpr->whoami;
- P("Slave n=%d\n", i);
- slaveReader = dp.lclnt[i][0];
- slaveWriter = dp.master[1];
- state = SYNC;
- errno = 0;
- memset(tmp, 0, 16);
- while (1) {
- switch (state) {
- case SELECT:
- case SYNC:
- getLockTest(&tLock);
- state = tLock.test;
- P("Slave State=%d\n", state);
-
- continue;
- case RDONLY:
- /* Try to read a file */
- P("TEST READ ONLY %d\n", RDONLY);
- if ((ftest = open(dp.fname, O_RDONLY | O_NONBLOCK)) < 0) {
- result = ECHEC;
- state = RESULT;
- if (dp.verbose)
- perror("Open:");
- continue;
- }
- P("fd=%d\n", ftest);
- a = read(ftest, tmp, 16);
- if (a < 16)
- result = ECHEC;
- else
- result = SUCCES;
- state = RESULT;
- continue;
-
- case WRONLY:
- /* Try to write a file */
- P("TEST WRITE ONLY %d\n", WRONLY);
- if ((ftest = open(dp.fname, O_WRONLY | O_NONBLOCK)) < 0) {
- result = ECHEC;
- state = RESULT;
- if (dp.verbose)
- perror("Open read only:");
- continue;
- }
- P("fd=%d\n", ftest);
- if (write(ftest, phraseTest, len) < len)
- result = ECHEC;
- else
- result = SUCCES;
- state = RESULT;
- continue;
-
- case LOCK:
-
- case READLOCK:
- /* Try to read a read-locked section */
- P("READ LOCK %d\n", F_RDLCK);
- if ((ftest = open(dp.fname, O_RDONLY | O_NONBLOCK)) < 0) {
- result = ECHEC;
- state = RESULT;
- if (dp.verbose)
- perror("Open read-write:");
- continue;
- }
-
- P("fd=%d\n", ftest);
- /* Lock the whole file */
- request.l_type = F_RDLCK;
- request.l_whence = SEEK_SET;
- request.l_start = 0;
- request.l_len = 0;
-
- if (fcntl(ftest, F_SETLK, &request) < 0) {
- if (dp.verbose || errno != EAGAIN)
- perror("RDONLY: fcntl");
- result = ECHEC;
- } else
- result = SUCCES;
- state = RESULT;
- continue;
-
- case WRITELOCK:
- /* Try to write a file */
- P("WRITE LOCK %d\n", F_WRLCK);
- if ((ftest = open(dp.fname, O_WRONLY | O_NONBLOCK)) < 0) {
- result = ECHEC;
- state = RESULT;
- if (dp.verbose)
- perror("\nOpen:");
- continue;
- }
- /* Lock the whole file */
- P("fd=%d\n", ftest);
- request.l_type = F_WRLCK;
- request.l_whence = SEEK_SET;
- request.l_start = 0;
- request.l_len = 0;
-
- if (fcntl(ftest, F_SETLK, &request) < 0) {
- if (dp.verbose || errno != EAGAIN)
- perror("\nWRONLY: fcntl");
- result = ECHEC;
- } else
- result = SUCCES;
- state = RESULT;
- continue;
-
- case BYTELOCK_READ:
- P("BYTE LOCK READ: %d\n", state);
- state = BYTELOCK;
- continue;
-
- case BYTELOCK_WRITE:
- P("BYTE LOCK WRITE: %d\n", state);
- state = BYTELOCK;
- continue;
-
- case BYTELOCK:
- /* Wait for the exact section to lock. The whole file is sent by the master */
- P("BYTE LOCK %d\n", state);
- getLockSection(&request);
- if ((ftest = open(dp.fname, O_RDWR | O_NONBLOCK)) < 0) {
- result = ECHEC;
- state = RESULT;
- if (dp.verbose)
- perror("\nOpen:");
- continue;
- }
-
- if (fcntl(ftest, F_SETLK, &request) < 0) {
- if (dp.verbose || errno != EAGAIN)
- perror("\nBTLOCK: fcntl");
- result = ECHEC;
- state = RESULT;
- continue;
- }
- /* Change the character at the given position for an easier verification */
- a = lseek(ftest, request.l_start, SEEK_SET);
- write(ftest, "=", 1);
- result = SUCCES;
- state = RESULT;
- continue;
-
- case RESULT:
- if (result == SUCCES)
- write(0, "=", 1);
- else
- write(0, "x", 1);
- P("RESULT: %d\n", result);
- sendResult(result);
- state = SYNC;
- continue;
-
- case CLEAN:
- close(ftest);
- /* Send CLEAN Ack */
- sendResult(result);
- state = SYNC;
- continue;
-
- case END:
- E("(End)\n");
- finish(0);
- printf("Unknown command\n");
- finish(1);
-
- }
- }
-
-}
-
-char *nextArg(int argc, char **argv, int *i)
-{
- if (((*i) + 1) < argc) {
- (*i) += 1;
- return argv[(*i)];
- }
- return NULL;
-}
-
-int usage(void)
-{
- printf("locktest -n <number of process> -f <test file> [-T]\n");
- printf("Number of child process must be higher than 1\n");
- exit(0);
- return 0;
-}
-
-int main(int argc, char **argv)
-{
- int rc = 0;
- int i, nThread = 0;
- char *tmp;
- int type = 0;
- int clients;
- type = PROCESS;
- dp.fname = NULL;
- dp.verbose = 0;
- int server = 1;
- char *host;
-
- host = NULL;
- clients = 0;
-
- for (i = 1; i < argc; i++) {
-
- if (!strcmp("-n", argv[i])) {
- if (!(tmp = nextArg(argc, argv, &i)))
- usage();
- nThread = atoi(tmp);
- continue;
- }
-
- if (!strcmp("-f", argv[i])) {
- if (!(dp.fname = nextArg(argc, argv, &i)))
- usage();
- continue;
- }
- if (!strcmp("-v", argv[i])) {
- dp.verbose = TRUE;
- continue;
- }
- if (!strcmp("-c", argv[i])) {
- if (!(clients = atoi(nextArg(argc, argv, &i))))
- usage();
- continue;
- }
-
- if (!strcmp("--server", argv[i])) {
- if (!(host = nextArg(argc, argv, &i)))
- usage();
- server = 0;
- continue;
- }
- printf("Ignoring unknown option: %s\n", argv[i]);
- }
-
- if (server) {
- if (!(dp.fname && nThread))
- usage();
- if (clients > 0) {
- configureServer(clients);
- setupClients(type, dp.fname, nThread);
- }
- } else {
- configureClient(host);
- dp.fname = malloc(512);
- memset(dp.fname, 0, 512);
- getConfiguration(&type, dp.fname, &nThread);
- }
-
- if (dp.verbose)
- printf("By process.\n");
- load = loadProcess;
- eType = "process";
- finish = finishProcess;
- LIST_RESULTS = LIST_RESULTS_PROCESS;
- initialize(nThread);
- if (server) {
- rc = master();
- } else {
- masterClient();
- free(dp.fname);
- }
- clean();
-
- return rc;
-}
diff --git a/testcases/network/nfsv4/locks/locktests.h b/testcases/network/nfsv4/locks/locktests.h
deleted file mode 100644
index a40e4172e..000000000
--- a/testcases/network/nfsv4/locks/locktests.h
+++ /dev/null
@@ -1,165 +0,0 @@
-/* *************************************************
- * *********** README ******************************
- * *************************************************
- *
- * COMPILE : make
- * RUN : ./locktests -n <number of concurent process> -f <test file> [-P]
- *
- * GOAL : This test tries to stress the fcntl locking functions. A
- * master process sets a lock on a file region (this is called "byte
- * range locking"). Some slave processes try to perform operations on
- * this region, such as read, write, set a new lock ... The expected
- * results of these operations are known. If the operation's result is
- * the same as the expected one, the test suceeds, else it fails.
- *
- * Slaves are either concurent processes or threads.
- * -n <num> : Number of threads to use (mandatory).
- * -f <file> : Run the test on a test file defined by the -f option (mandatory).
- * -T : Use threads instead of processes (optional).
- *
- * HISTORY : This program has been written to stress NFSv4 locks. -P
- * option was created to verify NFSv4 locking was thread-aware, and so,
- * locking behaviour over NFSv4 was POSIX correct both using threads and
- * process. This option may not be useful to stress.
- *
- * EXAMPLE : ./locktests -n 50 -f /file/system/to/test
- *
- *
- * Vincent ROQUETA 2005 - vincent.roqueta@ext.bull.net
- * BULL S.A.
- */
-
-
-#include <stdio.h>
-#include <stdlib.h>
-#include <stdlib.h>
-#include <signal.h>
-#include <string.h>
-#include <unistd.h>
-#include <fcntl.h>
-#include <errno.h>
-#include <math.h>
-#ifdef STDARG
-#include <stdarg.h>
-#endif
-#include <sys/types.h>
-#include <sys/wait.h>
-#include <sys/param.h>
-#include <sys/times.h>
-#ifdef MMAP
-#include <sys/mman.h>
-#endif
-#include <inttypes.h>
-#include <pthread.h>
-#include <sys/socket.h>
-#include <netinet/in.h>
-#include <sys/select.h>
-
-#ifdef O_SYNC
-#define OPENFLAGS (O_CREAT | O_RDWR | O_SYNC )
-#else
-#define OPENFLAGS (O_CREAT | O_RDWR )
-#endif
-#define OPENMODES (0600)
-#define MANDMODES (0600)
-/*(02666)*/
-
-#define SUCCES 1
-#define ECHEC 0
-
-#define TRUE 1
-#define FALSE 0
-
-#define PROCESS 0
-#define THREAD 1
-
-
-//#define DEBUG
-#ifdef DEBUG
- #define E(a) perror(a)
- #define P(a,b) printf(a,b)
-#else
- #define E(a)
- #define P(a,b)
-#endif
-
-
-
-#ifndef LOCKTESTS_H
-#define LOCKTESTS_H
-
-#define M_SIZE 512
-
-int writeToAllClients(char *foo);
-
-int serverReceiveNet();
-int clientReceiveNet();
-int serverReceiveClient(int n);
-int setupClients(int type, char *fname, int nThread);
-int serverCloseConnection();
-int getConfiguration(int *type, char *fname, int *nThread);
-int readFromServer(char *message);
-int serverSendClient(int n);
-
-
-enum state_t {
- CLEAN,
- RDONLY,
- RESULT,
- WRONLY,
- SELECT,
- LOCK,
- SYNC,
- END,
- READLOCK,
- WRITELOCK,
- BYTELOCK,
- BYTELOCK_READ,
- BYTELOCK_WRITE
-};
-
-/* Public data */
-struct dataPub {
- /* Number of clients */
- int nclnt;
- /* List of master to slave pipes */
- int **lclnt;
- /* Slave to master pipe */
- int master[2];
- /* Thread list */
- pthread_t *lthreads;
- /* test file name */
- char *fname;
- /* test file file-descriptor */
- int fd;
- /* Detailed error messages */
- int verbose;
-};
-
-/* private data */
-struct dataPriv {
- /* thread number */
- int whoami;
-};
-
-struct dataChild{
- struct dataPub *dp;
- struct dataPriv *dpr;
-};
-
-
-struct s_test {
- int test;
- int type;
- char *nom;
- int resAtt;
-
-};
-
-
-
-
-int configureServer(int max);
-int configureClient(char *s);
-
-#endif
diff --git a/testcases/network/nfsv4/locks/locktests.py b/testcases/network/nfsv4/locks/locktests.py
deleted file mode 100755
index 9876a86ef..000000000
--- a/testcases/network/nfsv4/locks/locktests.py
+++ /dev/null
@@ -1,236 +0,0 @@
-#!/usr/bin/env python3
-# This script aims to help to run locktests with several clients.
-#
-# Report bugs to Vincent ROQUETA : vincent.roqueta@ext.bull.net
-
-import encodings
-import shutil
-import os, sys
-import getopt, sys
-import string
-import socket
-from stat import *
-from sys import *
-from os import *
-
-NFS4_PATH="/mnt/nfsv4"
-NFS4_SERVER=""
-TEST_HOME="/home/vincent/locks/"
-testfile=NFS4_PATH+"/testfile"
-
-app="locktests"
-SRC="locktests.tar.gz"
-SRC_PATH="deploy"
-install="'tar xzf "+SRC+"; cd locks; make `"
-user="root"
-
-
-
-
-
-class Machine:
-
- def mkdir(self,dir):
- self.command="mkdir -p "+dir
- self.do()
- def rmdir(self,dir):
- self.command="rm -rf "+dir
- self.do()
-
- def printc(self):
- print("->"+self.command)
- print("\n")
-
-class Client(Machine):
-
- def __init__(self, machine):
- self.command=""
- self.machine=machine
- self.mountPath=NFS4_PATH
-
- def do(self):
- self.command="ssh "+user+"@"+self.machine+" "+self.command
- os.system(self.command)
-
- def isomount(self, dir):
- export=NFS4_SERVER
- mntpoint=NFS4_PATH
- self.command="'mkdir -p "+mntpoint+"; mount -t nfs4 "+export+" "+mntpoint+"'"
- self.do()
-
- def umount(self, dir):
- mntpoint=self.mountPath+"/"+dir
- self.command="umount "+mntpoint
- self.do()
- def install(self, path):
- self.command="'cd "+path+"; tar xzf "+SRC+"; cd locks; make'"
- self.do()
-
- def run(self, appli):
- self.command=appli
- self.do()
- def cp(self, fichier, path):
- command="scp "+fichier+" "+user+"@"+self.machine+":"+path
- os.system(command)
-
-
-class Serveur(Machine):
-
- def __init__(self, ip, exportPath):
- self.SERVEUR=ip
- self.exportPath=exportPath
-
- def do(self):
- self.command="ssh "+self.SERVEUR+" "+self.command
- os.system(self.command)
-
- def configure(self, dir):
- exportDir=self.exportPath+'/'+dir
- self. mkdir(exportDir)
-#self.printc()
- self.export(exportDir)
-#self.printc()
- def clean(self, dir):
- unexportDir=self.exportPath+'/'+dir
- self.unexport(unexportDir)
- self.rmdir(unexportDir)
-def usage():
- print("\n")
- print("usage:")
- print("locktests.py <-n process -f testfile ><--setup -s fs_server> -c host1, host2, host3 ... ")
- print("--setup : setup the configuration, deploy test on other test machines; This option also requires -c and -s")
- print("-c <machine> : host list to deploy/run/clean the test")
- print("-s <machine> : NFS server to use to setup the test")
- print("-n <num> : number of processes each test machine will lauch to perform the test")
- print("-f <file> : test file. This must be the same on each machine")
- print(" ")
- print("Example :")
- print("=========")
- print("*Setup machines for testing")
- print("./locktests.py --setup -c testmachine1 testmachine2 testmachine3 -s my_nfs_server:/")
- print("\n")
- print("*Run test on testmachine1,testmachine2 with 50 process on each machine using /mnt/nfsv4/testfile")
- print("./locktests.py -n 50 -f /mnt/nfsv4/testfile -c testmachine1 testmachine2")
- print("\n")
- print("_________________________________")
- print("Vincent ROQUETA - Bull SA - 2005\n")
-
- return 0
-
-
-
-def setup():
- path=os.path.abspath(".")
- fichier=SRC_PATH+"/"+SRC
- commande=""
- for i in clients:
- print("Setting up machine "+i)
- c=Client(i)
- c.mkdir(path)
- c.cp(fichier, path)
- c.install(path)
- c.isomount(NFS4_PATH)
- #Setup localhost
- print("Setting up localhost")
- commande="make; mkdir -p "+NFS4_PATH+" ; mount -t nfs4 "+NFS4_SERVER+" "+NFS4_PATH+" &"
- os.system(commande)
-
-
-def run():
- path=os.path.abspath(".")
- nbreClients=len(clients)
- hostname=socket.gethostname()
- # Lancement du serveur en local
- # Launch the server locally
- commande=path+"/"+app+" -n "+nbreProcess+" -f "+filename+" -c "+str(nbreClients)+" &"
- os.system(commande)
- commande=path+"/locks/"+app+" --server "+hostname
- for i in clients:
- c=Client(i)
- c.run(commande)
-
-def clean():
- for i in clients:
- client.umount(NFS4_PATH)
-
-
-
-
-
-
-args=sys.argv[1:]
-rge=list(range(len(args)))
-a=""
-r=True
-s=False
-nfsServer=False
-c=False
-f=False
-n=False
-clients=[]
-for i in rge:
- if args[i] in ("--install", "-i", "--setup"):
- r=False
- s=True
- continue
- if args[i] in ("-s", "--server"):
- a="nfsServer"
- nfsServer=True
- continue
- if args[i] in ("-h", "--help"):
- usage()
- sys.exit(1)
- if args[i] in ("--clients", "-c"):
- a="clients"
- c=True
- continue
- if args[i] == "-n":
- a="nbre"
- n=True
- continue
- if args[i] == "-f":
- a="file"
- f=True
- continue
-
- if a=="clients":
- clients.append(args[i])
- continue
- if a=="file":
- filename=args[i]
- continue
- if a=="nbre":
- nbreProcess=args[i]
- continue
- if a=="nfsServer":
- NFS4_SERVER=args[i]
- continue
-
-
- usage()
-# For ...
-if s:
- if (not c) or (not nfsServer):
- usage()
- sys.exit(1)
- print("Setup")
- print(NFS4_SERVER)
- setup()
- print("Setup complete")
-
-if r:
- if (not c) or (not f) or (not n):
- usage()
- sys.exit(1)
-
- print("Running test")
- run()
-
-
-
-
-
-
-
-
-
diff --git a/testcases/network/nfsv4/locks/netsync.c b/testcases/network/nfsv4/locks/netsync.c
deleted file mode 100644
index b40c002fe..000000000
--- a/testcases/network/nfsv4/locks/netsync.c
+++ /dev/null
@@ -1,201 +0,0 @@
-#include "locktests.h"
-
-#include <netdb.h>
-#include <string.h>
-#define PORT 12346
-#define MAX_CONNECTION 16
-
-int maxClients;
-int *fdClient;
-char *server_name;
-int fdServer;
-extern char message[M_SIZE];
-
-int serverReceiveClient(int c)
-{
- char tmp[M_SIZE];
- int r, s;
- /* Ensure we read _exactly_ M_SIZE characters in the message */
- memset(message, 0, M_SIZE);
- memset(tmp, 0, M_SIZE);
- r = 0;
- s = 0;
-
- while (s < M_SIZE) {
- r = read(fdClient[c], tmp, M_SIZE - s);
- /* Loop until we have a complete message */
- strncpy(message + s, tmp, r);
- s += r;
- }
- return s;
-}
-
-int serverSendClient(int n)
-{
- return write(fdClient[n], message, M_SIZE);
-}
-
-int clientReceiveNet(void)
-{
- readFromServer(message);
- return 0;
-}
-
-int setupConnectionServer(void)
-{
- struct sockaddr_in local;
- int c;
- socklen_t size;
- int sock;
- struct sockaddr_in remote;
-
- if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
- perror("socket");
- exit(1);
- }
- memset(&local, 0x00, sizeof(local));
- local.sin_family = AF_INET;
- local.sin_port = htons(PORT);
- local.sin_addr.s_addr = INADDR_ANY;
- memset(&(local.sin_zero), 0x00, 8);
-
- if (bind(sock, (struct sockaddr *)&local, sizeof(struct sockaddr)) ==
- -1) {
- perror("bind");
- exit(1);
- }
-
- if (listen(sock, MAX_CONNECTION) == -1) {
- perror("listen");
- return 1;
- }
- size = sizeof(struct sockaddr_in);
- for (c = 0; c < maxClients; c++) {
- if ((fdClient[c] =
- accept(sock, (struct sockaddr *)&remote, &size)) == -1) {
- perror("accept");
- return 1;
- }
-
- }
- return 0;
-}
-
-int writeToClient(int c, char *message)
-{
- return write(fdClient[c], message, 512);
-}
-
-int serverCloseConnection(void)
-{
- int c;
- for (c = 0; c < maxClients; c++)
- close(fdClient[c]);
- return 0;
-
-}
-
-int writeToAllClients(char *foo)
-{
- int c;
- for (c = 0; c < maxClients; c++)
- writeToClient(c, foo);
- return 0;
-}
-
-int setupClients(int type, char *fname, int nThread)
-{
- /*
- * Send parameters to all slaves :
- *
- * We must send :
- * - the position of the test file
- * - the number of slaves for each client
- * - The kind of slaves : process or thread
- */
- char message[512];
- sprintf(message, "%d:%s:%d::", type, fname, nThread);
- writeToAllClients(message);
- return 0;
-}
-
-int configureServer(int max)
-{
- maxClients = max;
- fdClient = malloc(sizeof(int) * max);
-
- setupConnectionServer();
-
- return 0;
-}
-
-int setupConnectionClient(void)
-{
-
- struct hostent *server;
- struct sockaddr_in serv_addr;
-
- if (!(server = gethostbyname(server_name))) {
- printf("erreur DNS\n");
- return 1;
- }
-
- fdServer = socket(AF_INET, SOCK_STREAM, 0);
- if (fdServer < 0) {
- perror("socket");
- return 1;
- }
-
- serv_addr.sin_addr = *(struct in_addr *)server->h_addr;
- serv_addr.sin_port = htons(PORT);
- serv_addr.sin_family = AF_INET;
- if (connect(fdServer, (struct sockaddr *)&serv_addr, sizeof(serv_addr))
- < 0) {
- perror("connect");
- return 1;
- }
- return 0;
-}
-
-int readFromServer(char *message)
-{
- char tmp[M_SIZE];
- int r, s;
- /* Ensure we read exactly M_SIZE characters */
- memset(message, 0, M_SIZE);
- memset(tmp, 0, M_SIZE);
- r = 0;
- s = 0;
- while (s < M_SIZE) {
- r = read(fdServer, tmp, M_SIZE - s);
- /* Loop until we have a complete message */
- strncpy(message + s, tmp, r);
- s += r;
- }
- return s;
-}
-
-int getConfiguration(int *type, char *fname, int *nThread)
-{
- char conf[M_SIZE];
- char *p;
- int i;
- readFromServer(conf);
- p = strtok(conf, ":");
- printf("%s\n", p);
- *type = atoi(p);
- p = strtok(NULL, ":");
- i = strlen(p);
- strncpy(fname, p, i);
- p = strtok(NULL, ":");
- *nThread = atoi(p);
-
- return 0;
-}
-
-int configureClient(char *s)
-{
- server_name = s;
- setupConnectionClient();
- return 0;
-}
--
2.27.0
More information about the ltp
mailing list