[BACK]Return to t_modload.sh CVS log [TXT][DIR] Up to [cvs.NetBSD.org] / src / tests / modules

File: [cvs.NetBSD.org] / src / tests / modules / t_modload.sh (download)

Revision 1.13, Fri Apr 20 05:41:25 2012 UTC (11 years, 11 months ago) by jruoho
Branch: MAIN
CVS Tags: yamt-pagecache-base9, yamt-pagecache-base8, yamt-pagecache-base7, yamt-pagecache-base6, yamt-pagecache-base5, tls-maxphys-base, tls-maxphys, tls-earlyentropy-base, tls-earlyentropy, riastradh-xf86-video-intel-2-7-1-pre-2-21-15, riastradh-drm2-base3, riastradh-drm2-base2, riastradh-drm2-base1, riastradh-drm2-base, riastradh-drm2, prg-localcount2-base3, prg-localcount2-base2, prg-localcount2-base1, prg-localcount2-base, prg-localcount2, phil-wifi-base, phil-wifi-20200421, phil-wifi-20200411, phil-wifi-20200406, phil-wifi-20191119, phil-wifi-20190609, phil-wifi, pgoyette-localcount-base, pgoyette-localcount-20170426, pgoyette-localcount-20170320, pgoyette-localcount-20170107, pgoyette-localcount-20161104, pgoyette-localcount-20160806, pgoyette-localcount-20160726, pgoyette-localcount, pgoyette-compat-merge-20190127, pgoyette-compat-base, pgoyette-compat-20190127, pgoyette-compat-20190118, pgoyette-compat-1226, pgoyette-compat-1126, pgoyette-compat-1020, pgoyette-compat-0930, pgoyette-compat-0906, pgoyette-compat-0728, pgoyette-compat-0625, pgoyette-compat-0521, pgoyette-compat-0502, pgoyette-compat-0422, pgoyette-compat-0415, pgoyette-compat-0407, pgoyette-compat-0330, pgoyette-compat-0322, pgoyette-compat-0315, pgoyette-compat, perseant-stdc-iso10646-base, perseant-stdc-iso10646, netbsd-9-base, netbsd-9-3-RELEASE, netbsd-9-2-RELEASE, netbsd-9-1-RELEASE, netbsd-9-0-RELEASE, netbsd-9-0-RC2, netbsd-9-0-RC1, netbsd-9, netbsd-8-base, netbsd-8-2-RELEASE, netbsd-8-1-RELEASE, netbsd-8-1-RC1, netbsd-8-0-RELEASE, netbsd-8-0-RC2, netbsd-8-0-RC1, netbsd-8, netbsd-7-nhusb-base-20170116, netbsd-7-nhusb-base, netbsd-7-nhusb, netbsd-7-base, netbsd-7-2-RELEASE, netbsd-7-1-RELEASE, netbsd-7-1-RC2, netbsd-7-1-RC1, netbsd-7-1-2-RELEASE, netbsd-7-1-1-RELEASE, netbsd-7-1, netbsd-7-0-RELEASE, netbsd-7-0-RC3, netbsd-7-0-RC2, netbsd-7-0-RC1, netbsd-7-0-2-RELEASE, netbsd-7-0-1-RELEASE, netbsd-7-0, netbsd-7, netbsd-10-base, netbsd-10-0-RELEASE, netbsd-10-0-RC6, netbsd-10-0-RC5, netbsd-10-0-RC4, netbsd-10-0-RC3, netbsd-10-0-RC2, netbsd-10-0-RC1, netbsd-10, matt-nb8-mediatek-base, matt-nb8-mediatek, localcount-20160914, is-mlppp-base, is-mlppp, cjep_sun2x-base1, cjep_sun2x-base, cjep_sun2x, cjep_staticlib_x-base1, cjep_staticlib_x-base, cjep_staticlib_x, bouyer-socketcan-base1, bouyer-socketcan-base, bouyer-socketcan, agc-symver-base, agc-symver, HEAD
Changes since 1.12: +4 -4 lines

For now, skip module tests if modctl(8) fails either with EPERM or ENOSYS.

# $NetBSD: t_modload.sh,v 1.13 2012/04/20 05:41:25 jruoho Exp $
#
# Copyright (c) 2008 The NetBSD Foundation, Inc.
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
# 1. Redistributions of source code must retain the above copyright
#    notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer in the
#    documentation and/or other materials provided with the distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
#

check_sysctl() {
	echo "${1} = ${2}" >expout
	atf_check -s eq:0 -o file:expout -e empty sysctl ${1}
}

atf_test_case plain cleanup
plain_head() {
	atf_set "descr" "Test load without arguments"
	atf_set "require.user" "root"
}
plain_body() {

	# XXX: Adjust when modctl(8) fails consistently.
	#
	$(atf_get_srcdir)/k_helper3 \
		"%s/k_helper/k_helper.kmod" $(atf_get_srcdir)

	if [ $? -eq 1 ] || [ $? -eq 78 ]; then
		atf_skip "host does not support modules"
	fi

	cat >experr <<EOF
modload: No such file or directory
EOF
	atf_check -s eq:1 -o empty -e ignore modload non-existent.o

	atf_check -s eq:0 -o empty -e empty \
	    modload $(atf_get_srcdir)/k_helper/k_helper.kmod
	check_sysctl vendor.k_helper.present 1
	check_sysctl vendor.k_helper.prop_int_ok 0
	check_sysctl vendor.k_helper.prop_str_ok 0
	atf_check -s eq:0 -o empty -e empty modunload k_helper
	touch done
}
plain_cleanup() {
	test -f done || modunload k_helper >/dev/null 2>&1
}

atf_test_case bflag cleanup
bflag_head() {
	atf_set "descr" "Test the -b flag"
	atf_set "require.user" "root"
}
bflag_body() {
	echo "Checking error conditions"

	atf_check -s eq:1 -o empty -e save:stderr \
	    modload -b foo k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid parameter.*foo' stderr

	atf_check -s eq:1 -o empty -e save:stderr \
	    modload -b foo= k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid boolean value' stderr

	atf_check -s eq:1 -o empty -e save:stderr \
	    modload -b foo=bar k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid boolean value.*bar' stderr

	atf_check -s eq:1 -o empty -e save:stderr \
	    modload -b foo=falsea k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid boolean value.*falsea' stderr

	atf_check -s eq:1 -o empty -e save:stderr \
	    modload -b foo=truea k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid boolean value.*truea' stderr

	# TODO Once sysctl(8) supports CTLTYPE_BOOL nodes.
	#echo "Checking valid values"
}
bflag_cleanup() {
	modunload k_helper >/dev/null 2>&1 || true
}

atf_test_case iflag cleanup
iflag_head() {
	atf_set "descr" "Test the -i flag"
	atf_set "require.user" "root"
}
iflag_body() {

	# XXX: Adjust when modctl(8) fails consistently.
	#
	$(atf_get_srcdir)/k_helper3 \
		"%s/k_helper/k_helper.kmod" $(atf_get_srcdir)

	if [ $? -eq 1 ] || [ $? -eq 78 ]; then
		atf_skip "host does not support modules"
	fi

	echo "Checking error conditions"

	atf_check -s eq:1 -o empty -e save:stderr modload -i foo \
	    k_helper/k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid parameter.*foo' stderr

	atf_check -s eq:1 -o empty -e save:stderr modload -i foo= \
	    k_helper/k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid integer value' stderr

	atf_check -s eq:1 -o empty -e save:stderr \
	    modload -i foo=bar k_helper/k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid integer value.*bar' stderr

	atf_check -s eq:1 -o empty -e save:stderr \
	    modload -i foo=123a k_helper/k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid integer value.*123a' stderr

	echo "Checking valid values"

	for v in 5 10; do
		atf_check -s eq:0 -o empty -e empty \
		    modload -i prop_int="${v}" \
		    $(atf_get_srcdir)/k_helper/k_helper.kmod
		check_sysctl vendor.k_helper.prop_int_ok 1
		check_sysctl vendor.k_helper.prop_int_val "${v}"
		atf_check -s eq:0 -o empty -e empty modunload k_helper
	done
	touch done
}
iflag_cleanup() {
	test -f done || modunload k_helper >/dev/null 2>&1
}

atf_test_case sflag cleanup
sflag_head() {
	atf_set "descr" "Test the -s flag"
	atf_set "require.user" "root"
}
sflag_body() {

	# XXX: Adjust when modctl(8) fails consistently.
	#
	$(atf_get_srcdir)/k_helper3 \
		"%s/k_helper/k_helper.kmod" $(atf_get_srcdir)

	if [ $? -eq 1 ] || [ $? -eq 78 ]; then
		atf_skip "host does not support modules"
	fi

	echo "Checking error conditions"

	atf_check -s eq:1 -o empty -e save:stderr modload -s foo \
	    k_helper/k_helper.kmod
	atf_check -s eq:0 -o ignore -e empty \
	    grep 'Invalid parameter.*foo' stderr

	echo "Checking valid values"

	for v in '1st string' '2nd string'; do
		atf_check -s eq:0 -o empty -e empty \
		    modload -s prop_str="${v}" \
		    $(atf_get_srcdir)/k_helper/k_helper.kmod
		check_sysctl vendor.k_helper.prop_str_ok 1
		check_sysctl vendor.k_helper.prop_str_val "${v}"
		atf_check -s eq:0 -o empty -e empty modunload k_helper
	done
	touch done
}
sflag_cleanup() {
	test -f done || modunload k_helper >/dev/null 2>&1
}

atf_init_test_cases()
{
	atf_add_test_case plain
	atf_add_test_case bflag
	atf_add_test_case iflag
	atf_add_test_case sflag
}