kmod/testsuite/test-blacklist.c
Lucas De Marchi 3d38e322f9 testsuite: Handle different sysconfdir
Instead of skipping tests if sysconfdir isn't /etc, just handle it
during the rootfs setup logic.

Signed-off-by: Lucas De Marchi <lucas.de.marchi@gmail.com>
Reviewed-by: Emil Velikov <emil.l.velikov@gmail.com>
2023-02-10 14:29:28 -08:00

106 lines
2.5 KiB
C

/*
* Copyright (C) 2011-2013 ProFUSION embedded systems
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
*/
#include <errno.h>
#include <inttypes.h>
#include <stddef.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <shared/util.h>
#include <libkmod/libkmod.h>
/* good luck bulding a kmod_list outside of the library... makes this blacklist
* function rather pointless */
#include <libkmod/libkmod-internal.h>
/* FIXME: hack, change name so we don't clash */
#undef ERR
#include "testsuite.h"
static int blacklist_1(const struct test *t)
{
struct kmod_ctx *ctx;
struct kmod_list *list = NULL, *l, *filtered;
struct kmod_module *mod;
int err;
size_t len = 0;
const char *names[] = { "pcspkr", "pcspkr2", "floppy", "ext4", NULL };
const char **name;
ctx = kmod_new(NULL, NULL);
if (ctx == NULL)
exit(EXIT_FAILURE);
for(name = names; *name; name++) {
err = kmod_module_new_from_name(ctx, *name, &mod);
if (err < 0)
goto fail_lookup;
list = kmod_list_append(list, mod);
}
err = kmod_module_apply_filter(ctx, KMOD_FILTER_BLACKLIST, list,
&filtered);
if (err < 0) {
ERR("Could not filter: %s\n", strerror(-err));
goto fail;
}
if (filtered == NULL) {
ERR("All modules were filtered out!\n");
goto fail;
}
kmod_list_foreach(l, filtered) {
const char *modname;
mod = kmod_module_get_module(l);
modname = kmod_module_get_name(mod);
if (streq("pcspkr", modname) || streq("floppy", modname))
goto fail;
len++;
kmod_module_unref(mod);
}
if (len != 2)
goto fail;
kmod_module_unref_list(filtered);
kmod_module_unref_list(list);
kmod_unref(ctx);
return EXIT_SUCCESS;
fail:
kmod_module_unref_list(list);
fail_lookup:
kmod_unref(ctx);
return EXIT_FAILURE;
}
DEFINE_TEST(blacklist_1,
.description = "check if modules are correctly blacklisted",
.config = {
[TC_ROOTFS] = TESTSUITE_ROOTFS "test-blacklist/",
},
.need_spawn = true,
);
TESTSUITE_MAIN();