From patchwork Mon Dec 2 10:12:50 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrea Cervesato X-Patchwork-Id: 2017061 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=suse.de header.i=@suse.de header.a=rsa-sha256 header.s=susede2_rsa header.b=eOLwc/gM; dkim=fail reason="signature verification failed" header.d=suse.de header.i=@suse.de header.a=ed25519-sha256 header.s=susede2_ed25519 header.b=1xKd1CTz; dkim=fail reason="signature verification failed" (1024-bit key) header.d=suse.de header.i=@suse.de header.a=rsa-sha256 header.s=susede2_rsa header.b=eOLwc/gM; dkim=neutral header.d=suse.de header.i=@suse.de header.a=ed25519-sha256 header.s=susede2_ed25519 header.b=1xKd1CTz; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it (client-ip=213.254.12.146; helo=picard.linux.it; envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it; receiver=patchwork.ozlabs.org) Received: from picard.linux.it (picard.linux.it [213.254.12.146]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4Y204X2DRKz1yR5 for ; Mon, 2 Dec 2024 21:14:04 +1100 (AEDT) Received: from picard.linux.it (localhost [IPv6:::1]) by picard.linux.it (Postfix) with ESMTP id 744143DD28C for ; Mon, 2 Dec 2024 11:14:02 +0100 (CET) X-Original-To: ltp@lists.linux.it Delivered-To: ltp@picard.linux.it Received: from in-7.smtp.seeweb.it (in-7.smtp.seeweb.it [217.194.8.7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1)) (No client certificate requested) by picard.linux.it (Postfix) with ESMTPS id 6BD3C3DD246 for ; Mon, 2 Dec 2024 11:12:52 +0100 (CET) Authentication-Results: in-7.smtp.seeweb.it; spf=pass (sender SPF authorized) smtp.mailfrom=suse.de (client-ip=195.135.223.131; helo=smtp-out2.suse.de; envelope-from=andrea.cervesato@suse.de; receiver=lists.linux.it) Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.223.131]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by in-7.smtp.seeweb.it (Postfix) with ESMTPS id E5A37217036 for ; Mon, 2 Dec 2024 11:12:51 +0100 (CET) Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 6957B1F747 for ; Mon, 2 Dec 2024 10:12:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1733134371; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=++FEL+nStN2kw3jFeJSIMnfiGfr/iQJw1VdpOFLStzw=; b=eOLwc/gM2LaKcHX30UidBV5ziU6/pXykuze6iz689Qhj0mqqdNvi3s0MwWwTDxiWTGKYLV Bl13cw/q6AGkkDoaJWHUhLcu3rAnqSxJk84M6V9qa/DJBYoK2lu9OTtQCvNk6UXAReak1O jVZ+WVTXiSJ7dFoSoXi4pPL72lG6iok= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1733134371; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=++FEL+nStN2kw3jFeJSIMnfiGfr/iQJw1VdpOFLStzw=; b=1xKd1CTzpoXzTbBtdfIRon8WY1sSMX3mytPIqkW/FB6Ga6El/B82tjkWtnQgMx/yxv2Jtm pdVThpnL4WHAbzBA== Authentication-Results: smtp-out2.suse.de; dkim=pass header.d=suse.de header.s=susede2_rsa header.b="eOLwc/gM"; dkim=pass header.d=suse.de header.s=susede2_ed25519 header.b=1xKd1CTz DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1733134371; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=++FEL+nStN2kw3jFeJSIMnfiGfr/iQJw1VdpOFLStzw=; b=eOLwc/gM2LaKcHX30UidBV5ziU6/pXykuze6iz689Qhj0mqqdNvi3s0MwWwTDxiWTGKYLV Bl13cw/q6AGkkDoaJWHUhLcu3rAnqSxJk84M6V9qa/DJBYoK2lu9OTtQCvNk6UXAReak1O jVZ+WVTXiSJ7dFoSoXi4pPL72lG6iok= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1733134371; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=++FEL+nStN2kw3jFeJSIMnfiGfr/iQJw1VdpOFLStzw=; b=1xKd1CTzpoXzTbBtdfIRon8WY1sSMX3mytPIqkW/FB6Ga6El/B82tjkWtnQgMx/yxv2Jtm pdVThpnL4WHAbzBA== Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 55C7713A31 for ; Mon, 2 Dec 2024 10:12:51 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id WLUbEyOITWcNSwAAD6G6ig (envelope-from ) for ; Mon, 02 Dec 2024 10:12:51 +0000 From: Andrea Cervesato Date: Mon, 02 Dec 2024 11:12:50 +0100 MIME-Version: 1.0 Message-Id: <20241202-input_refactoring-v2-6-369609492896@suse.com> References: <20241202-input_refactoring-v2-0-369609492896@suse.com> In-Reply-To: <20241202-input_refactoring-v2-0-369609492896@suse.com> To: ltp@lists.linux.it X-Mailer: b4 0.14.2 X-Developer-Signature: v=1; a=ed25519-sha256; t=1733134370; l=8529; i=andrea.cervesato@suse.com; s=20240812; h=from:subject:message-id; bh=p4yLVLPjcCTTBj+dkNjWo7wyyJULRIGPy4MCTaFMzdE=; b=Rd4owCr/XjN524KZktWrjA1HqrrYhEJZZnVhEX2C+/qA0+xPqoD8iBdwetNW/FPTvOi+N2xj1 82h5+WOFnhxBszl6Q4+pnHgN6EYCv7VdQrUup56ms1ItFUKplQxdF40 X-Developer-Key: i=andrea.cervesato@suse.com; a=ed25519; pk=RG/nLJ5snb1tLKGwSORQXBJ5XA4juT0WF2Pc/lq9meo= X-Rspamd-Queue-Id: 6957B1F747 X-Spam-Level: X-Spamd-Result: default: False [-4.51 / 50.00]; BAYES_HAM(-3.00)[100.00%]; NEURAL_HAM_LONG(-1.00)[-1.000]; R_DKIM_ALLOW(-0.20)[suse.de:s=susede2_rsa,suse.de:s=susede2_ed25519]; NEURAL_HAM_SHORT(-0.20)[-1.000]; MIME_GOOD(-0.10)[text/plain]; MX_GOOD(-0.01)[]; RBL_SPAMHAUS_BLOCKED_OPENRESOLVER(0.00)[2a07:de40:b281:104:10:150:64:97:from]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; RECEIVED_SPAMHAUS_BLOCKED_OPENRESOLVER(0.00)[2a07:de40:b281:106:10:150:64:167:received]; MIME_TRACE(0.00)[0:+]; RCPT_COUNT_ONE(0.00)[1]; FUZZY_BLOCKED(0.00)[rspamd.com]; RCVD_TLS_ALL(0.00)[]; SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:97:from]; RCVD_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; DBL_BLOCKED_OPENRESOLVER(0.00)[imap1.dmz-prg2.suse.org:helo,imap1.dmz-prg2.suse.org:rdns,suse.com:email,suse.com:mid,suse.de:dkim]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[ltp@lists.linux.it]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DKIM_SIGNED(0.00)[suse.de:s=susede2_rsa,suse.de:s=susede2_ed25519]; DKIM_TRACE(0.00)[suse.de:+] X-Rspamd-Server: rspamd2.dmz-prg2.suse.org X-Rspamd-Action: no action X-Spam-Score: -4.51 X-Spam-Status: No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS shortcircuit=no autolearn=disabled version=4.0.0 X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on in-7.smtp.seeweb.it X-Virus-Scanned: clamav-milter 1.0.3 at in-7.smtp.seeweb.it X-Virus-Status: Clean Subject: [LTP] [PATCH v2 6/7] Refactor input06 test X-BeenThere: ltp@lists.linux.it X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux Test Project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it Sender: "ltp" From: Andrea Cervesato Signed-off-by: Andrea Cervesato --- testcases/kernel/input/Makefile | 5 +- testcases/kernel/input/input06.c | 190 ++++++++++++++++----------------------- 2 files changed, 79 insertions(+), 116 deletions(-) diff --git a/testcases/kernel/input/Makefile b/testcases/kernel/input/Makefile index a37aa28fc27688901e0555a0338395a681b45b39..945299a13bfcecc3eeae029931ef5ae44781b7ad 100644 --- a/testcases/kernel/input/Makefile +++ b/testcases/kernel/input/Makefile @@ -7,9 +7,6 @@ LTPLIBS = uinput include $(top_srcdir)/include/mk/testcases.mk -FILTER_OUT_MAKE_TARGETS := input_helper -input01 input02 input03 input04 input05: LDLIBS += -lltpuinput - -input06: %: input_helper.o +LDLIBS += -lltpuinput include $(top_srcdir)/include/mk/generic_leaf_target.mk diff --git a/testcases/kernel/input/input06.c b/testcases/kernel/input/input06.c index b698c277d875ed2df8a0f07a88784997944eeee4..5527e160c4569a94d5b5f50da3dc3360143f231d 100644 --- a/testcases/kernel/input/input06.c +++ b/testcases/kernel/input/input06.c @@ -1,102 +1,30 @@ +// SPDX-License-Identifier: GPL-2.0-or-later /* * Copyright (c) 2015 Cedric Hnyda - * - * This program is free software; you can redistribute it and/or - * modify it under the terms of the GNU General Public License as - * published by the Free Software Foundation; either version 2 of - * the License, or (at your option) any later version. - * - * This program is distributed in the hope that it would be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write the Free Software Foundation, - * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA + * Copyright (C) 2024 SUSE LLC Andrea Cervesato */ - /* - * Create a virtual device, activate auto-repeat and - * and check that auto repeat is working - */ +/*\ + * [Description] + * + * Verify that auto-repeat is working on a virtual device, that in our case + * it's a mouse. + */ -#include #include -#include - -#include "test.h" -#include "safe_macros.h" -#include "lapi/fcntl.h" -#include "input_helper.h" -static void setup(void); -static void send_events(void); -static int check_events(void); -static void cleanup(void); +#include "input_common.h" -static int fd; -static int fd2; struct input_event events[64]; static int num_events; static int ev_iter; - -char *TCID = "input06"; - -int main(int ac, char **av) -{ - int lc; - int pid; - - tst_parse_opts(ac, av, NULL, NULL); - - setup(); - - for (lc = 0; TEST_LOOPING(lc); ++lc) { - pid = tst_fork(); - - switch (pid) { - case 0: - send_events(); - exit(0); - case -1: - tst_brkm(TBROK | TERRNO, cleanup, "fork() failed"); - default: - if (!check_events()) - tst_resm(TFAIL, - "Wrong data received in eventX"); - else - tst_resm(TPASS, "Data received in eventX"); - break; - } - - SAFE_WAITPID(NULL, pid, NULL, 0); - } - - cleanup(); - tst_exit(); -} - -static void setup(void) -{ - tst_require_root(); - - fd = open_uinput(); - - SAFE_IOCTL(NULL, fd, UI_SET_EVBIT, EV_KEY); - SAFE_IOCTL(NULL, fd, UI_SET_EVBIT, EV_REP); - SAFE_IOCTL(NULL, fd, UI_SET_KEYBIT, KEY_X); - - create_device(fd); - - fd2 = open_device(); - SAFE_IOCTL(NULL, fd2, EVIOCGRAB, 1); -} +static int fd_send = -1; +static int fd_recv = -1; static void send_events(void) { - send_event(fd, EV_KEY, KEY_X, 1); - send_event(fd, EV_SYN, 0, 0); + send_event(fd_send, EV_KEY, KEY_X, 1); + send_event(fd_send, EV_SYN, 0, 0); /* * Sleep long enough to keep the key pressed for some time @@ -106,8 +34,8 @@ static void send_events(void) */ usleep(500000); - send_event(fd, EV_KEY, KEY_X, 0); - send_event(fd, EV_SYN, 0, 0); + send_event(fd_send, EV_KEY, KEY_X, 0); + send_event(fd_send, EV_SYN, 0, 0); } static int check_event(struct input_event *iev, int event, int code, int value) @@ -117,20 +45,18 @@ static int check_event(struct input_event *iev, int event, int code, int value) static void read_events(void) { - int rd = read(fd2, events, sizeof(events)); - if (rd < 0) - tst_brkm(TBROK | TERRNO, cleanup, "read() failed"); + int num_bytes = SAFE_READ(0, fd_recv, events, sizeof(events)); - if (rd == 0) - tst_brkm(TBROK, cleanup, "Failed to read events"); + if (!num_bytes) + tst_brk(TBROK, "Failed to read events"); - if (rd % sizeof(struct input_event) != 0) { - tst_brkm(TBROK, cleanup, "read size %i not multiple of %zu", - rd, sizeof(struct input_event)); + if (num_bytes % sizeof(struct input_event) != 0) { + tst_brk(TBROK, "Read size %i is not multiple of %zu", + num_bytes, sizeof(struct input_event)); } ev_iter = 0; - num_events = rd / sizeof(struct input_event); + num_events = num_bytes / sizeof(struct input_event); } static int have_events(void) @@ -146,29 +72,37 @@ static struct input_event *next_event(void) return &events[ev_iter++]; } +static int check_event_code(struct input_event *iev, int event, int code) +{ + return iev->type == event && iev->code == code; +} + static int parse_autorepeat_config(struct input_event *iev) { if (!check_event_code(iev, EV_REP, REP_DELAY)) { - tst_resm(TFAIL, - "Didn't get EV_REP configuration with code REP_DELAY"); + tst_res(TFAIL, "Didn't get EV_REP type with REP_DELAY code"); return 0; } if (!check_event_code(next_event(), EV_REP, REP_PERIOD)) { - tst_resm(TFAIL, - "Didn't get EV_REP configuration with code REP_PERIOD"); + tst_res(TFAIL, "Didn't get EV_REP type with REP_PERIOD code"); return 0; } return 1; } +static int check_sync_event(struct input_event *iev) +{ + return check_event_code(iev, EV_SYN, SYN_REPORT); +} + static int parse_key(struct input_event *iev) { int autorep_count = 0; if (!check_event(iev, EV_KEY, KEY_X, 1) || !check_sync_event(next_event())) { - tst_resm(TFAIL, "Didn't get expected key press for KEY_X"); + tst_res(TFAIL, "Didn't get expected key press for KEY_X"); return 0; } @@ -180,19 +114,16 @@ static int parse_key(struct input_event *iev) /* make sure we have at least one auto-repeated key event */ if (!autorep_count) { - tst_resm(TFAIL, - "Didn't get autorepeat events for the key - KEY_X"); + tst_res(TFAIL, "Didn't get autorepeat events for the key - KEY_X"); return 0; } if (!check_event(iev, EV_KEY, KEY_X, 0) || !check_sync_event(next_event())) { - tst_resm(TFAIL, - "Didn't get expected key release for KEY_X"); + tst_res(TFAIL, "Didn't get expected key release for KEY_X"); return 0; } - tst_resm(TINFO, - "Received %d repititions for KEY_X", autorep_count); + tst_res(TINFO, "Received %d repetitions for KEY_X", autorep_count); return 1; } @@ -218,8 +149,7 @@ static int check_events(void) rep_keys_done = 1; break; default: - tst_resm(TFAIL, - "Unexpected event type '0x%04x' received", + tst_res(TFAIL, "Unexpected event type '0x%04x' received", iev->type); ret = 0; break; @@ -232,10 +162,46 @@ static int check_events(void) return ret; } +static void run(void) +{ + if (!SAFE_FORK()) { + send_events(); + exit(0); + } + + if (!check_events()) + tst_res(TFAIL, "Wrong data received from input device"); + else + tst_res(TPASS, "Data received from input device"); +} + +static void setup(void) +{ + fd_send = open_uinput(); + + SAFE_IOCTL(fd_send, UI_SET_EVBIT, EV_KEY); + SAFE_IOCTL(fd_send, UI_SET_EVBIT, EV_REP); + SAFE_IOCTL(fd_send, UI_SET_KEYBIT, KEY_X); + + create_input_device(fd_send); + + fd_recv = open_event_device(); + SAFE_IOCTL(fd_recv, EVIOCGRAB, 1); +} + static void cleanup(void) { - if (fd2 > 0 && close(fd2)) - tst_resm(TWARN | TERRNO, "close(fd2) failed"); + if (fd_send != -1) + destroy_input_device(fd_send); - destroy_device(fd); + if (fd_recv != -1) + SAFE_CLOSE(fd_recv); } + +static struct tst_test test = { + .test_all = run, + .setup = setup, + .cleanup = cleanup, + .needs_root = 1, + .forks_child = 1, +};