aboutsummaryrefslogtreecommitdiff
path: root/testcases/network/can/filter-tests/can_common.h
blob: af0cf5f00f448ecae70464d2c359b5a7ce9d5d90 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
// SPDX-License-Identifier: GPL-2.0-or-later
/*
 * Copyright (c) 2021 SUSE LLC
 */

#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>

#include <sys/types.h>
#include <sys/socket.h>
#include <sys/ioctl.h>
#include <sys/time.h>

#include "tst_cmd.h"
#include "tst_safe_stdio.h"
#include "tst_safe_file_ops.h"

#include <linux/if.h>
#include <linux/can.h>
#include <linux/can/raw.h>

static char *can_dev_name;
static int can_created_dev;

static void can_cmd(const char *const argv[])
{
	tst_cmd(argv, NULL, NULL, TST_CMD_TCONF_ON_MISSING);
}

#define CAN_CMD(...) can_cmd((const char *const[]){ __VA_ARGS__, NULL })

static void can_setup_vcan(void)
{
	unsigned int flags;
	char *path;

	if (can_dev_name)
		goto check_echo;

	can_dev_name = "vcan0";

	tst_res(TINFO, "Creating vcan0 device; use -D option to avoid this");

	CAN_CMD("modprobe", "-r", "vcan");
	CAN_CMD("modprobe", "vcan", "echo=1");

	can_created_dev = 1;

	CAN_CMD("ip", "link", "add", "dev", "vcan0", "type", "vcan");
	CAN_CMD("ip", "link", "set", "dev", "vcan0", "up");

check_echo:
	SAFE_ASPRINTF(&path, "/sys/class/net/%s/flags", can_dev_name);
	if (FILE_SCANF(path, "%x", &flags) || !(flags & IFF_ECHO)) {
		tst_res(TWARN,
			"Could not determine if ECHO is set on %s. This may effect code coverage.",
			can_dev_name);
	}
}

static void can_cleanup_vcan(void)
{
	if (!can_created_dev)
		return;

	CAN_CMD("ip", "link", "set", "dev", "vcan0", "down");
	CAN_CMD("ip", "link", "del", "dev", "vcan0");
	CAN_CMD("modprobe", "-r", "vcan");
}