]> git.ipfire.org Git - thirdparty/kmod.git/blob - testsuite/test-blacklist.c
99a86ab171523ccd75ea58a8dd2582f836227923
[thirdparty/kmod.git] / testsuite / test-blacklist.c
1 /*
2 * Copyright (C) 2011-2013 ProFUSION embedded systems
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
13 *
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
16 */
17
18 #include <errno.h>
19 #include <inttypes.h>
20 #include <stddef.h>
21 #include <stdio.h>
22 #include <stdlib.h>
23 #include <string.h>
24 #include <unistd.h>
25
26 #include <libkmod/libkmod.h>
27
28 /* good luck bulding a kmod_list outside of the library... makes this blacklist
29 * function rather pointless */
30 #include <libkmod/libkmod-internal.h>
31
32 /* FIXME: hack, change name so we don't clash */
33 #undef ERR
34 #include "testsuite.h"
35
36 static int blacklist_1(const struct test *t)
37 {
38 struct kmod_ctx *ctx;
39 struct kmod_list *list = NULL, *l, *filtered;
40 struct kmod_module *mod;
41 int err;
42 size_t len = 0;
43
44 const char *names[] = { "pcspkr", "pcspkr2", "floppy", "ext4", NULL };
45 const char **name;
46
47 ctx = kmod_new(NULL, NULL);
48 if (ctx == NULL)
49 exit(EXIT_FAILURE);
50
51 for(name = names; *name; name++) {
52 err = kmod_module_new_from_name(ctx, *name, &mod);
53 if (err < 0)
54 goto fail_lookup;
55 list = kmod_list_append(list, mod);
56 }
57
58 err = kmod_module_apply_filter(ctx, KMOD_FILTER_BLACKLIST, list,
59 &filtered);
60 if (err < 0) {
61 ERR("Could not filter: %s\n", strerror(-err));
62 goto fail;
63 }
64 if (filtered == NULL) {
65 ERR("All modules were filtered out!\n");
66 goto fail;
67 }
68
69 kmod_list_foreach(l, filtered) {
70 const char *modname;
71 mod = kmod_module_get_module(l);
72 modname = kmod_module_get_name(mod);
73 if (strcmp("pcspkr", modname) == 0 || strcmp("floppy", modname) == 0)
74 goto fail;
75 len++;
76 kmod_module_unref(mod);
77 }
78
79 if (len != 2)
80 goto fail;
81
82 kmod_module_unref_list(filtered);
83 kmod_module_unref_list(list);
84 kmod_unref(ctx);
85
86 return EXIT_SUCCESS;
87
88 fail:
89 kmod_module_unref_list(list);
90 fail_lookup:
91 kmod_unref(ctx);
92 return EXIT_FAILURE;
93 }
94 static const struct test sblacklist_1 = {
95 .name = "blacklist_1",
96 .description = "check if modules are correctly blacklisted",
97 .func = blacklist_1,
98 .config = {
99 [TC_ROOTFS] = TESTSUITE_ROOTFS "test-blacklist/",
100 },
101 .need_spawn = true,
102 };
103
104 TESTSUITE_MAIN();