]>
Commit | Line | Data |
---|---|---|
716154c5 BB |
1 | /*****************************************************************************\ |
2 | * Copyright (C) 2007-2010 Lawrence Livermore National Security, LLC. | |
3 | * Copyright (C) 2007 The Regents of the University of California. | |
4 | * Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER). | |
5 | * Written by Brian Behlendorf <behlendorf1@llnl.gov>. | |
715f6251 | 6 | * UCRL-CODE-235197 |
7 | * | |
716154c5 BB |
8 | * This file is part of the SPL, Solaris Porting Layer. |
9 | * For details, see <http://github.com/behlendorf/spl/>. | |
10 | * | |
11 | * The SPL is free software; you can redistribute it and/or modify it | |
12 | * under the terms of the GNU General Public License as published by the | |
13 | * Free Software Foundation; either version 2 of the License, or (at your | |
14 | * option) any later version. | |
715f6251 | 15 | * |
716154c5 | 16 | * The SPL is distributed in the hope that it will be useful, but WITHOUT |
715f6251 | 17 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
18 | * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | |
19 | * for more details. | |
20 | * | |
21 | * You should have received a copy of the GNU General Public License along | |
716154c5 BB |
22 | * with the SPL. If not, see <http://www.gnu.org/licenses/>. |
23 | ***************************************************************************** | |
24 | * Solaris Porting LAyer Tests (SPLAT) Test Control Interface. | |
25 | * | |
26 | * The 'splat' (Solaris Porting LAyer Tests) module is designed as a | |
27 | * framework which runs various in kernel regression tests to validate | |
28 | * the SPL primitives honor the Solaris ABI. | |
f1ca4da6 | 29 | * |
716154c5 BB |
30 | * The splat module is constructed of various splat_* source files each |
31 | * of which contain regression tests for a particular subsystem. For | |
32 | * example, the splat_kmem.c file contains all the tests for validating | |
33 | * the kmem interfaces have been implemented correctly. When the splat | |
34 | * module is loaded splat_*_init() will be called for each subsystems | |
35 | * tests. It is the responsibility of splat_*_init() to register all | |
36 | * the tests for this subsystem using the SPLAT_TEST_INIT() macro. | |
37 | * Similarly splat_*_fini() is called when the splat module is removed | |
38 | * and is responsible for unregistering its tests via the SPLAT_TEST_FINI | |
39 | * macro. Once a test is registered it can then be run with an ioctl() | |
40 | * call which specifies the subsystem and test to be run. The provided | |
41 | * splat command line tool can be used to display all available | |
42 | * subsystems and tests. It can also be used to run the full suite | |
43 | * of regression tests or particular tests. | |
44 | \*****************************************************************************/ | |
f1ca4da6 | 45 | |
7c50328b | 46 | #include "splat-internal.h" |
f1ca4da6 | 47 | |
46c685d0 | 48 | static spl_class *splat_class; |
25557fd8 | 49 | static spl_device *splat_device; |
7c50328b | 50 | static struct list_head splat_module_list; |
51 | static spinlock_t splat_module_lock; | |
f1ca4da6 | 52 | |
53 | static int | |
7c50328b | 54 | splat_open(struct inode *inode, struct file *file) |
f1ca4da6 | 55 | { |
56 | unsigned int minor = iminor(inode); | |
7c50328b | 57 | splat_info_t *info; |
f1ca4da6 | 58 | |
7c50328b | 59 | if (minor >= SPLAT_MINORS) |
f1ca4da6 | 60 | return -ENXIO; |
61 | ||
7c50328b | 62 | info = (splat_info_t *)kmalloc(sizeof(*info), GFP_KERNEL); |
f1ca4da6 | 63 | if (info == NULL) |
64 | return -ENOMEM; | |
65 | ||
66 | spin_lock_init(&info->info_lock); | |
7c50328b | 67 | info->info_size = SPLAT_INFO_BUFFER_SIZE; |
68 | info->info_buffer = (char *)vmalloc(SPLAT_INFO_BUFFER_SIZE); | |
f1ca4da6 | 69 | if (info->info_buffer == NULL) { |
70 | kfree(info); | |
71 | return -ENOMEM; | |
72 | } | |
1a73940d | 73 | memset(info->info_buffer, 0, info->info_size); |
f1ca4da6 | 74 | |
75 | info->info_head = info->info_buffer; | |
76 | file->private_data = (void *)info; | |
77 | ||
1a73940d NB |
78 | splat_print(file, "%s\n", spl_version); |
79 | ||
80 | return 0; | |
f1ca4da6 | 81 | } |
82 | ||
83 | static int | |
7c50328b | 84 | splat_release(struct inode *inode, struct file *file) |
f1ca4da6 | 85 | { |
86 | unsigned int minor = iminor(inode); | |
7c50328b | 87 | splat_info_t *info = (splat_info_t *)file->private_data; |
f1ca4da6 | 88 | |
7c50328b | 89 | if (minor >= SPLAT_MINORS) |
f1ca4da6 | 90 | return -ENXIO; |
91 | ||
92 | ASSERT(info); | |
93 | ASSERT(info->info_buffer); | |
94 | ||
95 | vfree(info->info_buffer); | |
96 | kfree(info); | |
97 | ||
98 | return 0; | |
99 | } | |
100 | ||
101 | static int | |
7c50328b | 102 | splat_buffer_clear(struct file *file, splat_cfg_t *kcfg, unsigned long arg) |
f1ca4da6 | 103 | { |
7c50328b | 104 | splat_info_t *info = (splat_info_t *)file->private_data; |
f1ca4da6 | 105 | |
106 | ASSERT(info); | |
107 | ASSERT(info->info_buffer); | |
108 | ||
109 | spin_lock(&info->info_lock); | |
110 | memset(info->info_buffer, 0, info->info_size); | |
111 | info->info_head = info->info_buffer; | |
112 | spin_unlock(&info->info_lock); | |
113 | ||
114 | return 0; | |
115 | } | |
116 | ||
117 | static int | |
7c50328b | 118 | splat_buffer_size(struct file *file, splat_cfg_t *kcfg, unsigned long arg) |
f1ca4da6 | 119 | { |
7c50328b | 120 | splat_info_t *info = (splat_info_t *)file->private_data; |
f1ca4da6 | 121 | char *buf; |
122 | int min, size, rc = 0; | |
123 | ||
124 | ASSERT(info); | |
125 | ASSERT(info->info_buffer); | |
126 | ||
127 | spin_lock(&info->info_lock); | |
128 | if (kcfg->cfg_arg1 > 0) { | |
129 | ||
130 | size = kcfg->cfg_arg1; | |
131 | buf = (char *)vmalloc(size); | |
132 | if (buf == NULL) { | |
133 | rc = -ENOMEM; | |
134 | goto out; | |
135 | } | |
136 | ||
137 | /* Zero fill and truncate contents when coping buffer */ | |
138 | min = ((size < info->info_size) ? size : info->info_size); | |
139 | memset(buf, 0, size); | |
140 | memcpy(buf, info->info_buffer, min); | |
141 | vfree(info->info_buffer); | |
142 | info->info_size = size; | |
143 | info->info_buffer = buf; | |
144 | info->info_head = info->info_buffer; | |
145 | } | |
146 | ||
147 | kcfg->cfg_rc1 = info->info_size; | |
148 | ||
7c50328b | 149 | if (copy_to_user((struct splat_cfg_t __user *)arg, kcfg, sizeof(*kcfg))) |
f1ca4da6 | 150 | rc = -EFAULT; |
151 | out: | |
152 | spin_unlock(&info->info_lock); | |
153 | ||
154 | return rc; | |
155 | } | |
156 | ||
157 | ||
7c50328b | 158 | static splat_subsystem_t * |
159 | splat_subsystem_find(int id) { | |
160 | splat_subsystem_t *sub; | |
f1ca4da6 | 161 | |
7c50328b | 162 | spin_lock(&splat_module_lock); |
163 | list_for_each_entry(sub, &splat_module_list, subsystem_list) { | |
f1ca4da6 | 164 | if (id == sub->desc.id) { |
7c50328b | 165 | spin_unlock(&splat_module_lock); |
f1ca4da6 | 166 | return sub; |
167 | } | |
168 | } | |
7c50328b | 169 | spin_unlock(&splat_module_lock); |
f1ca4da6 | 170 | |
171 | return NULL; | |
172 | } | |
173 | ||
174 | static int | |
7c50328b | 175 | splat_subsystem_count(splat_cfg_t *kcfg, unsigned long arg) |
f1ca4da6 | 176 | { |
7c50328b | 177 | splat_subsystem_t *sub; |
f1ca4da6 | 178 | int i = 0; |
179 | ||
7c50328b | 180 | spin_lock(&splat_module_lock); |
181 | list_for_each_entry(sub, &splat_module_list, subsystem_list) | |
f1ca4da6 | 182 | i++; |
183 | ||
7c50328b | 184 | spin_unlock(&splat_module_lock); |
f1ca4da6 | 185 | kcfg->cfg_rc1 = i; |
186 | ||
7c50328b | 187 | if (copy_to_user((struct splat_cfg_t __user *)arg, kcfg, sizeof(*kcfg))) |
f1ca4da6 | 188 | return -EFAULT; |
189 | ||
190 | return 0; | |
191 | } | |
192 | ||
193 | static int | |
7c50328b | 194 | splat_subsystem_list(splat_cfg_t *kcfg, unsigned long arg) |
f1ca4da6 | 195 | { |
7c50328b | 196 | splat_subsystem_t *sub; |
197 | splat_cfg_t *tmp; | |
f1ca4da6 | 198 | int size, i = 0; |
199 | ||
200 | /* Structure will be sized large enough for N subsystem entries | |
201 | * which is passed in by the caller. On exit the number of | |
202 | * entries filled in with valid subsystems will be stored in | |
203 | * cfg_rc1. If the caller does not provide enough entries | |
204 | * for all subsystems we will truncate the list to avoid overrun. | |
205 | */ | |
7c50328b | 206 | size = sizeof(*tmp) + kcfg->cfg_data.splat_subsystems.size * |
207 | sizeof(splat_user_t); | |
f1ca4da6 | 208 | tmp = kmalloc(size, GFP_KERNEL); |
209 | if (tmp == NULL) | |
210 | return -ENOMEM; | |
211 | ||
212 | /* Local 'tmp' is used as the structure copied back to user space */ | |
213 | memset(tmp, 0, size); | |
214 | memcpy(tmp, kcfg, sizeof(*kcfg)); | |
215 | ||
7c50328b | 216 | spin_lock(&splat_module_lock); |
217 | list_for_each_entry(sub, &splat_module_list, subsystem_list) { | |
218 | strncpy(tmp->cfg_data.splat_subsystems.descs[i].name, | |
219 | sub->desc.name, SPLAT_NAME_SIZE); | |
220 | strncpy(tmp->cfg_data.splat_subsystems.descs[i].desc, | |
221 | sub->desc.desc, SPLAT_DESC_SIZE); | |
222 | tmp->cfg_data.splat_subsystems.descs[i].id = sub->desc.id; | |
f1ca4da6 | 223 | |
224 | /* Truncate list if we are about to overrun alloc'ed memory */ | |
7c50328b | 225 | if ((i++) == kcfg->cfg_data.splat_subsystems.size) |
f1ca4da6 | 226 | break; |
227 | } | |
7c50328b | 228 | spin_unlock(&splat_module_lock); |
f1ca4da6 | 229 | tmp->cfg_rc1 = i; |
230 | ||
7c50328b | 231 | if (copy_to_user((struct splat_cfg_t __user *)arg, tmp, size)) { |
f1ca4da6 | 232 | kfree(tmp); |
233 | return -EFAULT; | |
234 | } | |
235 | ||
236 | kfree(tmp); | |
237 | return 0; | |
238 | } | |
239 | ||
240 | static int | |
7c50328b | 241 | splat_test_count(splat_cfg_t *kcfg, unsigned long arg) |
f1ca4da6 | 242 | { |
7c50328b | 243 | splat_subsystem_t *sub; |
244 | splat_test_t *test; | |
f1b59d26 | 245 | int i = 0; |
f1ca4da6 | 246 | |
247 | /* Subsystem ID passed as arg1 */ | |
7c50328b | 248 | sub = splat_subsystem_find(kcfg->cfg_arg1); |
f1ca4da6 | 249 | if (sub == NULL) |
250 | return -EINVAL; | |
251 | ||
252 | spin_lock(&(sub->test_lock)); | |
253 | list_for_each_entry(test, &(sub->test_list), test_list) | |
254 | i++; | |
255 | ||
256 | spin_unlock(&(sub->test_lock)); | |
257 | kcfg->cfg_rc1 = i; | |
258 | ||
7c50328b | 259 | if (copy_to_user((struct splat_cfg_t __user *)arg, kcfg, sizeof(*kcfg))) |
f1ca4da6 | 260 | return -EFAULT; |
261 | ||
262 | return 0; | |
263 | } | |
264 | ||
265 | static int | |
7c50328b | 266 | splat_test_list(splat_cfg_t *kcfg, unsigned long arg) |
f1ca4da6 | 267 | { |
7c50328b | 268 | splat_subsystem_t *sub; |
269 | splat_test_t *test; | |
270 | splat_cfg_t *tmp; | |
f1b59d26 | 271 | int size, i = 0; |
f1ca4da6 | 272 | |
273 | /* Subsystem ID passed as arg1 */ | |
7c50328b | 274 | sub = splat_subsystem_find(kcfg->cfg_arg1); |
f1ca4da6 | 275 | if (sub == NULL) |
276 | return -EINVAL; | |
277 | ||
278 | /* Structure will be sized large enough for N test entries | |
279 | * which is passed in by the caller. On exit the number of | |
280 | * entries filled in with valid tests will be stored in | |
281 | * cfg_rc1. If the caller does not provide enough entries | |
282 | * for all tests we will truncate the list to avoid overrun. | |
283 | */ | |
7c50328b | 284 | size = sizeof(*tmp)+kcfg->cfg_data.splat_tests.size*sizeof(splat_user_t); |
f1ca4da6 | 285 | tmp = kmalloc(size, GFP_KERNEL); |
286 | if (tmp == NULL) | |
287 | return -ENOMEM; | |
288 | ||
289 | /* Local 'tmp' is used as the structure copied back to user space */ | |
290 | memset(tmp, 0, size); | |
291 | memcpy(tmp, kcfg, sizeof(*kcfg)); | |
292 | ||
293 | spin_lock(&(sub->test_lock)); | |
294 | list_for_each_entry(test, &(sub->test_list), test_list) { | |
7c50328b | 295 | strncpy(tmp->cfg_data.splat_tests.descs[i].name, |
296 | test->desc.name, SPLAT_NAME_SIZE); | |
297 | strncpy(tmp->cfg_data.splat_tests.descs[i].desc, | |
298 | test->desc.desc, SPLAT_DESC_SIZE); | |
299 | tmp->cfg_data.splat_tests.descs[i].id = test->desc.id; | |
f1ca4da6 | 300 | |
301 | /* Truncate list if we are about to overrun alloc'ed memory */ | |
7c50328b | 302 | if ((i++) == kcfg->cfg_data.splat_tests.size) |
f1ca4da6 | 303 | break; |
304 | } | |
305 | spin_unlock(&(sub->test_lock)); | |
306 | tmp->cfg_rc1 = i; | |
307 | ||
7c50328b | 308 | if (copy_to_user((struct splat_cfg_t __user *)arg, tmp, size)) { |
f1ca4da6 | 309 | kfree(tmp); |
310 | return -EFAULT; | |
311 | } | |
312 | ||
313 | kfree(tmp); | |
314 | return 0; | |
315 | } | |
316 | ||
317 | static int | |
7c50328b | 318 | splat_validate(struct file *file, splat_subsystem_t *sub, int cmd, void *arg) |
f1ca4da6 | 319 | { |
7c50328b | 320 | splat_test_t *test; |
f1ca4da6 | 321 | |
322 | spin_lock(&(sub->test_lock)); | |
323 | list_for_each_entry(test, &(sub->test_list), test_list) { | |
324 | if (test->desc.id == cmd) { | |
325 | spin_unlock(&(sub->test_lock)); | |
326 | return test->test(file, arg); | |
327 | } | |
328 | } | |
329 | spin_unlock(&(sub->test_lock)); | |
330 | ||
331 | return -EINVAL; | |
332 | } | |
333 | ||
334 | static int | |
e554dffa | 335 | splat_ioctl_cfg(struct file *file, unsigned int cmd, unsigned long arg) |
f1ca4da6 | 336 | { |
7c50328b | 337 | splat_cfg_t kcfg; |
f1ca4da6 | 338 | int rc = 0; |
339 | ||
e554dffa BB |
340 | /* User and kernel space agree about arg size */ |
341 | if (_IOC_SIZE(cmd) != sizeof(kcfg)) | |
342 | return -EBADMSG; | |
343 | ||
7c50328b | 344 | if (copy_from_user(&kcfg, (splat_cfg_t *)arg, sizeof(kcfg))) |
f1ca4da6 | 345 | return -EFAULT; |
346 | ||
7c50328b | 347 | if (kcfg.cfg_magic != SPLAT_CFG_MAGIC) { |
348 | splat_print(file, "Bad config magic 0x%x != 0x%x\n", | |
349 | kcfg.cfg_magic, SPLAT_CFG_MAGIC); | |
f1ca4da6 | 350 | return -EINVAL; |
351 | } | |
352 | ||
353 | switch (kcfg.cfg_cmd) { | |
7c50328b | 354 | case SPLAT_CFG_BUFFER_CLEAR: |
f1ca4da6 | 355 | /* cfg_arg1 - Unused |
356 | * cfg_rc1 - Unused | |
357 | */ | |
7c50328b | 358 | rc = splat_buffer_clear(file, &kcfg, arg); |
f1ca4da6 | 359 | break; |
7c50328b | 360 | case SPLAT_CFG_BUFFER_SIZE: |
f1ca4da6 | 361 | /* cfg_arg1 - 0 - query size; >0 resize |
362 | * cfg_rc1 - Set to current buffer size | |
363 | */ | |
7c50328b | 364 | rc = splat_buffer_size(file, &kcfg, arg); |
f1ca4da6 | 365 | break; |
7c50328b | 366 | case SPLAT_CFG_SUBSYSTEM_COUNT: |
f1ca4da6 | 367 | /* cfg_arg1 - Unused |
368 | * cfg_rc1 - Set to number of subsystems | |
369 | */ | |
7c50328b | 370 | rc = splat_subsystem_count(&kcfg, arg); |
f1ca4da6 | 371 | break; |
7c50328b | 372 | case SPLAT_CFG_SUBSYSTEM_LIST: |
f1ca4da6 | 373 | /* cfg_arg1 - Unused |
374 | * cfg_rc1 - Set to number of subsystems | |
e554dffa | 375 | * cfg_data.splat_subsystems - Set with subsystems |
f1ca4da6 | 376 | */ |
7c50328b | 377 | rc = splat_subsystem_list(&kcfg, arg); |
f1ca4da6 | 378 | break; |
7c50328b | 379 | case SPLAT_CFG_TEST_COUNT: |
f1ca4da6 | 380 | /* cfg_arg1 - Set to a target subsystem |
381 | * cfg_rc1 - Set to number of tests | |
382 | */ | |
7c50328b | 383 | rc = splat_test_count(&kcfg, arg); |
f1ca4da6 | 384 | break; |
7c50328b | 385 | case SPLAT_CFG_TEST_LIST: |
f1ca4da6 | 386 | /* cfg_arg1 - Set to a target subsystem |
387 | * cfg_rc1 - Set to number of tests | |
7c50328b | 388 | * cfg_data.splat_subsystems - Populated with tests |
f1ca4da6 | 389 | */ |
7c50328b | 390 | rc = splat_test_list(&kcfg, arg); |
f1ca4da6 | 391 | break; |
392 | default: | |
e554dffa BB |
393 | splat_print(file, "Bad config command %d\n", |
394 | kcfg.cfg_cmd); | |
f1ca4da6 | 395 | rc = -EINVAL; |
396 | break; | |
397 | } | |
398 | ||
399 | return rc; | |
400 | } | |
401 | ||
402 | static int | |
e554dffa | 403 | splat_ioctl_cmd(struct file *file, unsigned int cmd, unsigned long arg) |
f1ca4da6 | 404 | { |
7c50328b | 405 | splat_subsystem_t *sub; |
406 | splat_cmd_t kcmd; | |
f1ca4da6 | 407 | int rc = -EINVAL; |
408 | void *data = NULL; | |
409 | ||
e554dffa BB |
410 | /* User and kernel space agree about arg size */ |
411 | if (_IOC_SIZE(cmd) != sizeof(kcmd)) | |
412 | return -EBADMSG; | |
413 | ||
7c50328b | 414 | if (copy_from_user(&kcmd, (splat_cfg_t *)arg, sizeof(kcmd))) |
f1ca4da6 | 415 | return -EFAULT; |
416 | ||
7c50328b | 417 | if (kcmd.cmd_magic != SPLAT_CMD_MAGIC) { |
418 | splat_print(file, "Bad command magic 0x%x != 0x%x\n", | |
419 | kcmd.cmd_magic, SPLAT_CFG_MAGIC); | |
f1ca4da6 | 420 | return -EINVAL; |
421 | } | |
422 | ||
423 | /* Allocate memory for any opaque data the caller needed to pass on */ | |
424 | if (kcmd.cmd_data_size > 0) { | |
425 | data = (void *)kmalloc(kcmd.cmd_data_size, GFP_KERNEL); | |
426 | if (data == NULL) | |
427 | return -ENOMEM; | |
428 | ||
7c50328b | 429 | if (copy_from_user(data, (void *)(arg + offsetof(splat_cmd_t, |
f1ca4da6 | 430 | cmd_data_str)), kcmd.cmd_data_size)) { |
431 | kfree(data); | |
432 | return -EFAULT; | |
433 | } | |
434 | } | |
435 | ||
7c50328b | 436 | sub = splat_subsystem_find(kcmd.cmd_subsystem); |
f1ca4da6 | 437 | if (sub != NULL) |
7c50328b | 438 | rc = splat_validate(file, sub, kcmd.cmd_test, data); |
f1ca4da6 | 439 | else |
440 | rc = -EINVAL; | |
441 | ||
442 | if (data != NULL) | |
443 | kfree(data); | |
444 | ||
445 | return rc; | |
446 | } | |
447 | ||
8655ce49 BB |
448 | static long |
449 | splat_unlocked_ioctl(struct file *file, unsigned int cmd, unsigned long arg) | |
f1ca4da6 | 450 | { |
f1b59d26 | 451 | unsigned int minor = iminor(file->f_dentry->d_inode); |
452 | int rc = 0; | |
f1ca4da6 | 453 | |
454 | /* Ignore tty ioctls */ | |
455 | if ((cmd & 0xffffff00) == ((int)'T') << 8) | |
456 | return -ENOTTY; | |
457 | ||
7c50328b | 458 | if (minor >= SPLAT_MINORS) |
f1ca4da6 | 459 | return -ENXIO; |
460 | ||
461 | switch (cmd) { | |
7c50328b | 462 | case SPLAT_CFG: |
e554dffa | 463 | rc = splat_ioctl_cfg(file, cmd, arg); |
f1ca4da6 | 464 | break; |
7c50328b | 465 | case SPLAT_CMD: |
e554dffa | 466 | rc = splat_ioctl_cmd(file, cmd, arg); |
f1ca4da6 | 467 | break; |
468 | default: | |
7c50328b | 469 | splat_print(file, "Bad ioctl command %d\n", cmd); |
f1ca4da6 | 470 | rc = -EINVAL; |
471 | break; | |
472 | } | |
473 | ||
474 | return rc; | |
475 | } | |
476 | ||
9593ef76 BB |
477 | #ifdef CONFIG_COMPAT |
478 | /* Compatibility handler for ioctls from 32-bit ELF binaries */ | |
479 | static long | |
480 | splat_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg) | |
481 | { | |
8655ce49 | 482 | return splat_unlocked_ioctl(file, cmd, arg); |
9593ef76 BB |
483 | } |
484 | #endif /* CONFIG_COMPAT */ | |
485 | ||
f1ca4da6 | 486 | /* I'm not sure why you would want to write in to this buffer from |
487 | * user space since its principle use is to pass test status info | |
488 | * back to the user space, but I don't see any reason to prevent it. | |
489 | */ | |
7c50328b | 490 | static ssize_t splat_write(struct file *file, const char __user *buf, |
f1ca4da6 | 491 | size_t count, loff_t *ppos) |
492 | { | |
493 | unsigned int minor = iminor(file->f_dentry->d_inode); | |
7c50328b | 494 | splat_info_t *info = (splat_info_t *)file->private_data; |
f1ca4da6 | 495 | int rc = 0; |
496 | ||
7c50328b | 497 | if (minor >= SPLAT_MINORS) |
f1ca4da6 | 498 | return -ENXIO; |
499 | ||
500 | ASSERT(info); | |
501 | ASSERT(info->info_buffer); | |
502 | ||
503 | spin_lock(&info->info_lock); | |
504 | ||
505 | /* Write beyond EOF */ | |
506 | if (*ppos >= info->info_size) { | |
507 | rc = -EFBIG; | |
508 | goto out; | |
509 | } | |
510 | ||
511 | /* Resize count if beyond EOF */ | |
512 | if (*ppos + count > info->info_size) | |
513 | count = info->info_size - *ppos; | |
514 | ||
515 | if (copy_from_user(info->info_buffer, buf, count)) { | |
516 | rc = -EFAULT; | |
517 | goto out; | |
518 | } | |
519 | ||
520 | *ppos += count; | |
521 | rc = count; | |
522 | out: | |
523 | spin_unlock(&info->info_lock); | |
524 | return rc; | |
525 | } | |
526 | ||
7c50328b | 527 | static ssize_t splat_read(struct file *file, char __user *buf, |
f1ca4da6 | 528 | size_t count, loff_t *ppos) |
529 | { | |
530 | unsigned int minor = iminor(file->f_dentry->d_inode); | |
7c50328b | 531 | splat_info_t *info = (splat_info_t *)file->private_data; |
f1ca4da6 | 532 | int rc = 0; |
533 | ||
7c50328b | 534 | if (minor >= SPLAT_MINORS) |
f1ca4da6 | 535 | return -ENXIO; |
536 | ||
537 | ASSERT(info); | |
538 | ASSERT(info->info_buffer); | |
539 | ||
540 | spin_lock(&info->info_lock); | |
541 | ||
542 | /* Read beyond EOF */ | |
543 | if (*ppos >= info->info_size) | |
544 | goto out; | |
545 | ||
546 | /* Resize count if beyond EOF */ | |
547 | if (*ppos + count > info->info_size) | |
548 | count = info->info_size - *ppos; | |
549 | ||
550 | if (copy_to_user(buf, info->info_buffer + *ppos, count)) { | |
551 | rc = -EFAULT; | |
552 | goto out; | |
553 | } | |
554 | ||
555 | *ppos += count; | |
556 | rc = count; | |
557 | out: | |
558 | spin_unlock(&info->info_lock); | |
559 | return rc; | |
560 | } | |
561 | ||
7c50328b | 562 | static loff_t splat_seek(struct file *file, loff_t offset, int origin) |
f1ca4da6 | 563 | { |
564 | unsigned int minor = iminor(file->f_dentry->d_inode); | |
7c50328b | 565 | splat_info_t *info = (splat_info_t *)file->private_data; |
f1ca4da6 | 566 | int rc = -EINVAL; |
567 | ||
7c50328b | 568 | if (minor >= SPLAT_MINORS) |
f1ca4da6 | 569 | return -ENXIO; |
570 | ||
571 | ASSERT(info); | |
572 | ASSERT(info->info_buffer); | |
573 | ||
574 | spin_lock(&info->info_lock); | |
575 | ||
576 | switch (origin) { | |
577 | case 0: /* SEEK_SET - No-op just do it */ | |
578 | break; | |
579 | case 1: /* SEEK_CUR - Seek from current */ | |
580 | offset = file->f_pos + offset; | |
581 | break; | |
582 | case 2: /* SEEK_END - Seek from end */ | |
583 | offset = info->info_size + offset; | |
584 | break; | |
585 | } | |
586 | ||
587 | if (offset >= 0) { | |
588 | file->f_pos = offset; | |
589 | file->f_version = 0; | |
590 | rc = offset; | |
591 | } | |
592 | ||
593 | spin_unlock(&info->info_lock); | |
594 | ||
595 | return rc; | |
596 | } | |
597 | ||
39ab5440 | 598 | static struct cdev splat_cdev; |
7c50328b | 599 | static struct file_operations splat_fops = { |
9593ef76 BB |
600 | .owner = THIS_MODULE, |
601 | .open = splat_open, | |
602 | .release = splat_release, | |
8655ce49 | 603 | .unlocked_ioctl = splat_unlocked_ioctl, |
9593ef76 BB |
604 | #ifdef CONFIG_COMPAT |
605 | .compat_ioctl = splat_compat_ioctl, | |
606 | #endif | |
607 | .read = splat_read, | |
608 | .write = splat_write, | |
609 | .llseek = splat_seek, | |
f1ca4da6 | 610 | }; |
611 | ||
51a727e9 | 612 | static int |
7c50328b | 613 | splat_init(void) |
f1ca4da6 | 614 | { |
615 | dev_t dev; | |
f1b59d26 | 616 | int rc; |
f1ca4da6 | 617 | |
7c50328b | 618 | spin_lock_init(&splat_module_lock); |
619 | INIT_LIST_HEAD(&splat_module_list); | |
f1ca4da6 | 620 | |
7c50328b | 621 | SPLAT_SUBSYSTEM_INIT(kmem); |
622 | SPLAT_SUBSYSTEM_INIT(taskq); | |
623 | SPLAT_SUBSYSTEM_INIT(krng); | |
624 | SPLAT_SUBSYSTEM_INIT(mutex); | |
625 | SPLAT_SUBSYSTEM_INIT(condvar); | |
626 | SPLAT_SUBSYSTEM_INIT(thread); | |
627 | SPLAT_SUBSYSTEM_INIT(rwlock); | |
628 | SPLAT_SUBSYSTEM_INIT(time); | |
4b171585 | 629 | SPLAT_SUBSYSTEM_INIT(vnode); |
9490c148 | 630 | SPLAT_SUBSYSTEM_INIT(kobj); |
9f4c835a | 631 | SPLAT_SUBSYSTEM_INIT(atomic); |
d702c04f | 632 | SPLAT_SUBSYSTEM_INIT(list); |
b871b8cd | 633 | SPLAT_SUBSYSTEM_INIT(generic); |
ec7d53e9 | 634 | SPLAT_SUBSYSTEM_INIT(cred); |
19c1eb82 | 635 | SPLAT_SUBSYSTEM_INIT(zlib); |
f1ca4da6 | 636 | |
7c50328b | 637 | dev = MKDEV(SPLAT_MAJOR, 0); |
46c685d0 | 638 | if ((rc = register_chrdev_region(dev, SPLAT_MINORS, SPLAT_NAME))) |
f1ca4da6 | 639 | goto error; |
640 | ||
641 | /* Support for registering a character driver */ | |
7c50328b | 642 | cdev_init(&splat_cdev, &splat_fops); |
39ab5440 BB |
643 | splat_cdev.owner = THIS_MODULE; |
644 | kobject_set_name(&splat_cdev.kobj, SPLAT_NAME); | |
7c50328b | 645 | if ((rc = cdev_add(&splat_cdev, dev, SPLAT_MINORS))) { |
f6a19c0d | 646 | printk(KERN_ERR "SPLAT: Error adding cdev, %d\n", rc); |
7c50328b | 647 | kobject_put(&splat_cdev.kobj); |
648 | unregister_chrdev_region(dev, SPLAT_MINORS); | |
f1ca4da6 | 649 | goto error; |
650 | } | |
651 | ||
652 | /* Support for udev make driver info available in sysfs */ | |
46c685d0 | 653 | splat_class = spl_class_create(THIS_MODULE, "splat"); |
7c50328b | 654 | if (IS_ERR(splat_class)) { |
655 | rc = PTR_ERR(splat_class); | |
f6a19c0d | 656 | printk(KERN_ERR "SPLAT: Error creating splat class, %d\n", rc); |
7c50328b | 657 | cdev_del(&splat_cdev); |
658 | unregister_chrdev_region(dev, SPLAT_MINORS); | |
f1ca4da6 | 659 | goto error; |
660 | } | |
661 | ||
25557fd8 | 662 | splat_device = spl_device_create(splat_class, NULL, |
663 | MKDEV(SPLAT_MAJOR, 0), | |
664 | NULL, SPLAT_NAME); | |
f1ca4da6 | 665 | |
5b8f76ea DH |
666 | printk(KERN_INFO "SPLAT: Loaded module v%s%s\n", |
667 | SPL_META_VERSION, SPL_DEBUG_STR); | |
f1ca4da6 | 668 | return 0; |
669 | error: | |
f6a19c0d | 670 | printk(KERN_ERR "SPLAT: Error registering splat device, %d\n", rc); |
f1ca4da6 | 671 | return rc; |
672 | } | |
673 | ||
51a727e9 | 674 | static int |
7c50328b | 675 | splat_fini(void) |
f1ca4da6 | 676 | { |
7c50328b | 677 | dev_t dev = MKDEV(SPLAT_MAJOR, 0); |
f1ca4da6 | 678 | |
25557fd8 | 679 | spl_device_destroy(splat_class, splat_device, dev); |
46c685d0 | 680 | spl_class_destroy(splat_class); |
7c50328b | 681 | cdev_del(&splat_cdev); |
682 | unregister_chrdev_region(dev, SPLAT_MINORS); | |
683 | ||
19c1eb82 | 684 | SPLAT_SUBSYSTEM_FINI(zlib); |
ec7d53e9 | 685 | SPLAT_SUBSYSTEM_FINI(cred); |
b871b8cd | 686 | SPLAT_SUBSYSTEM_FINI(generic); |
d702c04f | 687 | SPLAT_SUBSYSTEM_FINI(list); |
9f4c835a | 688 | SPLAT_SUBSYSTEM_FINI(atomic); |
9490c148 | 689 | SPLAT_SUBSYSTEM_FINI(kobj); |
4b171585 | 690 | SPLAT_SUBSYSTEM_FINI(vnode); |
7c50328b | 691 | SPLAT_SUBSYSTEM_FINI(time); |
692 | SPLAT_SUBSYSTEM_FINI(rwlock); | |
693 | SPLAT_SUBSYSTEM_FINI(thread); | |
694 | SPLAT_SUBSYSTEM_FINI(condvar); | |
695 | SPLAT_SUBSYSTEM_FINI(mutex); | |
696 | SPLAT_SUBSYSTEM_FINI(krng); | |
697 | SPLAT_SUBSYSTEM_FINI(taskq); | |
698 | SPLAT_SUBSYSTEM_FINI(kmem); | |
699 | ||
700 | ASSERT(list_empty(&splat_module_list)); | |
5b8f76ea DH |
701 | printk(KERN_INFO "SPLAT: Unloaded module v%s%s\n", |
702 | SPL_META_VERSION, SPL_DEBUG_STR); | |
51a727e9 BB |
703 | |
704 | return 0; | |
f1ca4da6 | 705 | } |
706 | ||
51a727e9 BB |
707 | spl_module_init(splat_init); |
708 | spl_module_exit(splat_fini); | |
f1ca4da6 | 709 | |
710 | MODULE_AUTHOR("Lawrence Livermore National Labs"); | |
715f6251 | 711 | MODULE_DESCRIPTION("Solaris Porting LAyer Tests"); |
f1ca4da6 | 712 | MODULE_LICENSE("GPL"); |