mirror of
https://git.proxmox.com/git/mirror_zfs.git
synced 2025-03-03 19:28:18 +03:00

The previous credential implementation simply provided the needed types and a couple of dummy functions needed. This update correctly ties the basic Solaris credential API in to one of two Linux kernel APIs. Prior to 2.6.29 the linux kernel embeded all credentials in the task structure. For these kernels, we pass around the entire task struct as if it were the credential, then we use the helper functions to extract the credential related bits. As of 2.6.29 a new credential type was added which we can and do fairly cleanly layer on top of. Once again the helper functions nicely hide the implementation details from all callers. Three tests were added to the splat test framework to verify basic correctness. They should be extended as needed when need credential functions are added.
706 lines
18 KiB
C
706 lines
18 KiB
C
/*
|
|
* This file is part of the SPL: Solaris Porting Layer.
|
|
*
|
|
* Copyright (c) 2008 Lawrence Livermore National Security, LLC.
|
|
* Produced at Lawrence Livermore National Laboratory
|
|
* Written by:
|
|
* Brian Behlendorf <behlendorf1@llnl.gov>,
|
|
* Herb Wartens <wartens2@llnl.gov>,
|
|
* Jim Garlick <garlick@llnl.gov>
|
|
* UCRL-CODE-235197
|
|
*
|
|
* This is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*/
|
|
|
|
/*
|
|
* My intent is to create a loadable 'splat' (Solaris Porting LAyer
|
|
* Tests) module which can be used as an access point to run
|
|
* in kernel Solaris ABI regression tests. This provides a
|
|
* nice mechanism to validate the shim primates are working properly.
|
|
*
|
|
* The basic design is the splat module is that it is constructed of
|
|
* various splat_* source files each of which contains regression tests.
|
|
* For example the splat_linux_kmem.c file contains tests for validating
|
|
* kmem correctness. When the splat module is loaded splat_*_init()
|
|
* will be called for each subsystems tests, similarly splat_*_fini() is
|
|
* called when the splat module is removed. Each test can then be
|
|
* run by making an ioctl() call from a userspace control application
|
|
* to pick the subsystem and test which should be run.
|
|
*/
|
|
|
|
#include "splat-internal.h"
|
|
|
|
static spl_class *splat_class;
|
|
static spl_device *splat_device;
|
|
static struct list_head splat_module_list;
|
|
static spinlock_t splat_module_lock;
|
|
|
|
static int
|
|
splat_open(struct inode *inode, struct file *file)
|
|
{
|
|
unsigned int minor = iminor(inode);
|
|
splat_info_t *info;
|
|
|
|
if (minor >= SPLAT_MINORS)
|
|
return -ENXIO;
|
|
|
|
info = (splat_info_t *)kmalloc(sizeof(*info), GFP_KERNEL);
|
|
if (info == NULL)
|
|
return -ENOMEM;
|
|
|
|
spin_lock_init(&info->info_lock);
|
|
info->info_size = SPLAT_INFO_BUFFER_SIZE;
|
|
info->info_buffer = (char *)vmalloc(SPLAT_INFO_BUFFER_SIZE);
|
|
if (info->info_buffer == NULL) {
|
|
kfree(info);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
info->info_head = info->info_buffer;
|
|
file->private_data = (void *)info;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
splat_release(struct inode *inode, struct file *file)
|
|
{
|
|
unsigned int minor = iminor(inode);
|
|
splat_info_t *info = (splat_info_t *)file->private_data;
|
|
|
|
if (minor >= SPLAT_MINORS)
|
|
return -ENXIO;
|
|
|
|
ASSERT(info);
|
|
ASSERT(info->info_buffer);
|
|
|
|
vfree(info->info_buffer);
|
|
kfree(info);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
splat_buffer_clear(struct file *file, splat_cfg_t *kcfg, unsigned long arg)
|
|
{
|
|
splat_info_t *info = (splat_info_t *)file->private_data;
|
|
|
|
ASSERT(info);
|
|
ASSERT(info->info_buffer);
|
|
|
|
spin_lock(&info->info_lock);
|
|
memset(info->info_buffer, 0, info->info_size);
|
|
info->info_head = info->info_buffer;
|
|
spin_unlock(&info->info_lock);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
splat_buffer_size(struct file *file, splat_cfg_t *kcfg, unsigned long arg)
|
|
{
|
|
splat_info_t *info = (splat_info_t *)file->private_data;
|
|
char *buf;
|
|
int min, size, rc = 0;
|
|
|
|
ASSERT(info);
|
|
ASSERT(info->info_buffer);
|
|
|
|
spin_lock(&info->info_lock);
|
|
if (kcfg->cfg_arg1 > 0) {
|
|
|
|
size = kcfg->cfg_arg1;
|
|
buf = (char *)vmalloc(size);
|
|
if (buf == NULL) {
|
|
rc = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
/* Zero fill and truncate contents when coping buffer */
|
|
min = ((size < info->info_size) ? size : info->info_size);
|
|
memset(buf, 0, size);
|
|
memcpy(buf, info->info_buffer, min);
|
|
vfree(info->info_buffer);
|
|
info->info_size = size;
|
|
info->info_buffer = buf;
|
|
info->info_head = info->info_buffer;
|
|
}
|
|
|
|
kcfg->cfg_rc1 = info->info_size;
|
|
|
|
if (copy_to_user((struct splat_cfg_t __user *)arg, kcfg, sizeof(*kcfg)))
|
|
rc = -EFAULT;
|
|
out:
|
|
spin_unlock(&info->info_lock);
|
|
|
|
return rc;
|
|
}
|
|
|
|
|
|
static splat_subsystem_t *
|
|
splat_subsystem_find(int id) {
|
|
splat_subsystem_t *sub;
|
|
|
|
spin_lock(&splat_module_lock);
|
|
list_for_each_entry(sub, &splat_module_list, subsystem_list) {
|
|
if (id == sub->desc.id) {
|
|
spin_unlock(&splat_module_lock);
|
|
return sub;
|
|
}
|
|
}
|
|
spin_unlock(&splat_module_lock);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static int
|
|
splat_subsystem_count(splat_cfg_t *kcfg, unsigned long arg)
|
|
{
|
|
splat_subsystem_t *sub;
|
|
int i = 0;
|
|
|
|
spin_lock(&splat_module_lock);
|
|
list_for_each_entry(sub, &splat_module_list, subsystem_list)
|
|
i++;
|
|
|
|
spin_unlock(&splat_module_lock);
|
|
kcfg->cfg_rc1 = i;
|
|
|
|
if (copy_to_user((struct splat_cfg_t __user *)arg, kcfg, sizeof(*kcfg)))
|
|
return -EFAULT;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
splat_subsystem_list(splat_cfg_t *kcfg, unsigned long arg)
|
|
{
|
|
splat_subsystem_t *sub;
|
|
splat_cfg_t *tmp;
|
|
int size, i = 0;
|
|
|
|
/* Structure will be sized large enough for N subsystem entries
|
|
* which is passed in by the caller. On exit the number of
|
|
* entries filled in with valid subsystems will be stored in
|
|
* cfg_rc1. If the caller does not provide enough entries
|
|
* for all subsystems we will truncate the list to avoid overrun.
|
|
*/
|
|
size = sizeof(*tmp) + kcfg->cfg_data.splat_subsystems.size *
|
|
sizeof(splat_user_t);
|
|
tmp = kmalloc(size, GFP_KERNEL);
|
|
if (tmp == NULL)
|
|
return -ENOMEM;
|
|
|
|
/* Local 'tmp' is used as the structure copied back to user space */
|
|
memset(tmp, 0, size);
|
|
memcpy(tmp, kcfg, sizeof(*kcfg));
|
|
|
|
spin_lock(&splat_module_lock);
|
|
list_for_each_entry(sub, &splat_module_list, subsystem_list) {
|
|
strncpy(tmp->cfg_data.splat_subsystems.descs[i].name,
|
|
sub->desc.name, SPLAT_NAME_SIZE);
|
|
strncpy(tmp->cfg_data.splat_subsystems.descs[i].desc,
|
|
sub->desc.desc, SPLAT_DESC_SIZE);
|
|
tmp->cfg_data.splat_subsystems.descs[i].id = sub->desc.id;
|
|
|
|
/* Truncate list if we are about to overrun alloc'ed memory */
|
|
if ((i++) == kcfg->cfg_data.splat_subsystems.size)
|
|
break;
|
|
}
|
|
spin_unlock(&splat_module_lock);
|
|
tmp->cfg_rc1 = i;
|
|
|
|
if (copy_to_user((struct splat_cfg_t __user *)arg, tmp, size)) {
|
|
kfree(tmp);
|
|
return -EFAULT;
|
|
}
|
|
|
|
kfree(tmp);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
splat_test_count(splat_cfg_t *kcfg, unsigned long arg)
|
|
{
|
|
splat_subsystem_t *sub;
|
|
splat_test_t *test;
|
|
int i = 0;
|
|
|
|
/* Subsystem ID passed as arg1 */
|
|
sub = splat_subsystem_find(kcfg->cfg_arg1);
|
|
if (sub == NULL)
|
|
return -EINVAL;
|
|
|
|
spin_lock(&(sub->test_lock));
|
|
list_for_each_entry(test, &(sub->test_list), test_list)
|
|
i++;
|
|
|
|
spin_unlock(&(sub->test_lock));
|
|
kcfg->cfg_rc1 = i;
|
|
|
|
if (copy_to_user((struct splat_cfg_t __user *)arg, kcfg, sizeof(*kcfg)))
|
|
return -EFAULT;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
splat_test_list(splat_cfg_t *kcfg, unsigned long arg)
|
|
{
|
|
splat_subsystem_t *sub;
|
|
splat_test_t *test;
|
|
splat_cfg_t *tmp;
|
|
int size, i = 0;
|
|
|
|
/* Subsystem ID passed as arg1 */
|
|
sub = splat_subsystem_find(kcfg->cfg_arg1);
|
|
if (sub == NULL)
|
|
return -EINVAL;
|
|
|
|
/* Structure will be sized large enough for N test entries
|
|
* which is passed in by the caller. On exit the number of
|
|
* entries filled in with valid tests will be stored in
|
|
* cfg_rc1. If the caller does not provide enough entries
|
|
* for all tests we will truncate the list to avoid overrun.
|
|
*/
|
|
size = sizeof(*tmp)+kcfg->cfg_data.splat_tests.size*sizeof(splat_user_t);
|
|
tmp = kmalloc(size, GFP_KERNEL);
|
|
if (tmp == NULL)
|
|
return -ENOMEM;
|
|
|
|
/* Local 'tmp' is used as the structure copied back to user space */
|
|
memset(tmp, 0, size);
|
|
memcpy(tmp, kcfg, sizeof(*kcfg));
|
|
|
|
spin_lock(&(sub->test_lock));
|
|
list_for_each_entry(test, &(sub->test_list), test_list) {
|
|
strncpy(tmp->cfg_data.splat_tests.descs[i].name,
|
|
test->desc.name, SPLAT_NAME_SIZE);
|
|
strncpy(tmp->cfg_data.splat_tests.descs[i].desc,
|
|
test->desc.desc, SPLAT_DESC_SIZE);
|
|
tmp->cfg_data.splat_tests.descs[i].id = test->desc.id;
|
|
|
|
/* Truncate list if we are about to overrun alloc'ed memory */
|
|
if ((i++) == kcfg->cfg_data.splat_tests.size)
|
|
break;
|
|
}
|
|
spin_unlock(&(sub->test_lock));
|
|
tmp->cfg_rc1 = i;
|
|
|
|
if (copy_to_user((struct splat_cfg_t __user *)arg, tmp, size)) {
|
|
kfree(tmp);
|
|
return -EFAULT;
|
|
}
|
|
|
|
kfree(tmp);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
splat_validate(struct file *file, splat_subsystem_t *sub, int cmd, void *arg)
|
|
{
|
|
splat_test_t *test;
|
|
|
|
spin_lock(&(sub->test_lock));
|
|
list_for_each_entry(test, &(sub->test_list), test_list) {
|
|
if (test->desc.id == cmd) {
|
|
spin_unlock(&(sub->test_lock));
|
|
return test->test(file, arg);
|
|
}
|
|
}
|
|
spin_unlock(&(sub->test_lock));
|
|
|
|
return -EINVAL;
|
|
}
|
|
|
|
static int
|
|
splat_ioctl_cfg(struct file *file, unsigned int cmd, unsigned long arg)
|
|
{
|
|
splat_cfg_t kcfg;
|
|
int rc = 0;
|
|
|
|
/* User and kernel space agree about arg size */
|
|
if (_IOC_SIZE(cmd) != sizeof(kcfg))
|
|
return -EBADMSG;
|
|
|
|
if (copy_from_user(&kcfg, (splat_cfg_t *)arg, sizeof(kcfg)))
|
|
return -EFAULT;
|
|
|
|
if (kcfg.cfg_magic != SPLAT_CFG_MAGIC) {
|
|
splat_print(file, "Bad config magic 0x%x != 0x%x\n",
|
|
kcfg.cfg_magic, SPLAT_CFG_MAGIC);
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (kcfg.cfg_cmd) {
|
|
case SPLAT_CFG_BUFFER_CLEAR:
|
|
/* cfg_arg1 - Unused
|
|
* cfg_rc1 - Unused
|
|
*/
|
|
rc = splat_buffer_clear(file, &kcfg, arg);
|
|
break;
|
|
case SPLAT_CFG_BUFFER_SIZE:
|
|
/* cfg_arg1 - 0 - query size; >0 resize
|
|
* cfg_rc1 - Set to current buffer size
|
|
*/
|
|
rc = splat_buffer_size(file, &kcfg, arg);
|
|
break;
|
|
case SPLAT_CFG_SUBSYSTEM_COUNT:
|
|
/* cfg_arg1 - Unused
|
|
* cfg_rc1 - Set to number of subsystems
|
|
*/
|
|
rc = splat_subsystem_count(&kcfg, arg);
|
|
break;
|
|
case SPLAT_CFG_SUBSYSTEM_LIST:
|
|
/* cfg_arg1 - Unused
|
|
* cfg_rc1 - Set to number of subsystems
|
|
* cfg_data.splat_subsystems - Set with subsystems
|
|
*/
|
|
rc = splat_subsystem_list(&kcfg, arg);
|
|
break;
|
|
case SPLAT_CFG_TEST_COUNT:
|
|
/* cfg_arg1 - Set to a target subsystem
|
|
* cfg_rc1 - Set to number of tests
|
|
*/
|
|
rc = splat_test_count(&kcfg, arg);
|
|
break;
|
|
case SPLAT_CFG_TEST_LIST:
|
|
/* cfg_arg1 - Set to a target subsystem
|
|
* cfg_rc1 - Set to number of tests
|
|
* cfg_data.splat_subsystems - Populated with tests
|
|
*/
|
|
rc = splat_test_list(&kcfg, arg);
|
|
break;
|
|
default:
|
|
splat_print(file, "Bad config command %d\n",
|
|
kcfg.cfg_cmd);
|
|
rc = -EINVAL;
|
|
break;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
splat_ioctl_cmd(struct file *file, unsigned int cmd, unsigned long arg)
|
|
{
|
|
splat_subsystem_t *sub;
|
|
splat_cmd_t kcmd;
|
|
int rc = -EINVAL;
|
|
void *data = NULL;
|
|
|
|
/* User and kernel space agree about arg size */
|
|
if (_IOC_SIZE(cmd) != sizeof(kcmd))
|
|
return -EBADMSG;
|
|
|
|
if (copy_from_user(&kcmd, (splat_cfg_t *)arg, sizeof(kcmd)))
|
|
return -EFAULT;
|
|
|
|
if (kcmd.cmd_magic != SPLAT_CMD_MAGIC) {
|
|
splat_print(file, "Bad command magic 0x%x != 0x%x\n",
|
|
kcmd.cmd_magic, SPLAT_CFG_MAGIC);
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* Allocate memory for any opaque data the caller needed to pass on */
|
|
if (kcmd.cmd_data_size > 0) {
|
|
data = (void *)kmalloc(kcmd.cmd_data_size, GFP_KERNEL);
|
|
if (data == NULL)
|
|
return -ENOMEM;
|
|
|
|
if (copy_from_user(data, (void *)(arg + offsetof(splat_cmd_t,
|
|
cmd_data_str)), kcmd.cmd_data_size)) {
|
|
kfree(data);
|
|
return -EFAULT;
|
|
}
|
|
}
|
|
|
|
sub = splat_subsystem_find(kcmd.cmd_subsystem);
|
|
if (sub != NULL)
|
|
rc = splat_validate(file, sub, kcmd.cmd_test, data);
|
|
else
|
|
rc = -EINVAL;
|
|
|
|
if (data != NULL)
|
|
kfree(data);
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
splat_ioctl(struct inode *inode, struct file *file,
|
|
unsigned int cmd, unsigned long arg)
|
|
{
|
|
unsigned int minor = iminor(file->f_dentry->d_inode);
|
|
int rc = 0;
|
|
|
|
/* Ignore tty ioctls */
|
|
if ((cmd & 0xffffff00) == ((int)'T') << 8)
|
|
return -ENOTTY;
|
|
|
|
if (minor >= SPLAT_MINORS)
|
|
return -ENXIO;
|
|
|
|
switch (cmd) {
|
|
case SPLAT_CFG:
|
|
rc = splat_ioctl_cfg(file, cmd, arg);
|
|
break;
|
|
case SPLAT_CMD:
|
|
rc = splat_ioctl_cmd(file, cmd, arg);
|
|
break;
|
|
default:
|
|
splat_print(file, "Bad ioctl command %d\n", cmd);
|
|
rc = -EINVAL;
|
|
break;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
#ifdef CONFIG_COMPAT
|
|
/* Compatibility handler for ioctls from 32-bit ELF binaries */
|
|
static long
|
|
splat_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
|
|
{
|
|
return splat_ioctl(NULL, file, cmd, arg);
|
|
}
|
|
#endif /* CONFIG_COMPAT */
|
|
|
|
/* I'm not sure why you would want to write in to this buffer from
|
|
* user space since its principle use is to pass test status info
|
|
* back to the user space, but I don't see any reason to prevent it.
|
|
*/
|
|
static ssize_t splat_write(struct file *file, const char __user *buf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
unsigned int minor = iminor(file->f_dentry->d_inode);
|
|
splat_info_t *info = (splat_info_t *)file->private_data;
|
|
int rc = 0;
|
|
|
|
if (minor >= SPLAT_MINORS)
|
|
return -ENXIO;
|
|
|
|
ASSERT(info);
|
|
ASSERT(info->info_buffer);
|
|
|
|
spin_lock(&info->info_lock);
|
|
|
|
/* Write beyond EOF */
|
|
if (*ppos >= info->info_size) {
|
|
rc = -EFBIG;
|
|
goto out;
|
|
}
|
|
|
|
/* Resize count if beyond EOF */
|
|
if (*ppos + count > info->info_size)
|
|
count = info->info_size - *ppos;
|
|
|
|
if (copy_from_user(info->info_buffer, buf, count)) {
|
|
rc = -EFAULT;
|
|
goto out;
|
|
}
|
|
|
|
*ppos += count;
|
|
rc = count;
|
|
out:
|
|
spin_unlock(&info->info_lock);
|
|
return rc;
|
|
}
|
|
|
|
static ssize_t splat_read(struct file *file, char __user *buf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
unsigned int minor = iminor(file->f_dentry->d_inode);
|
|
splat_info_t *info = (splat_info_t *)file->private_data;
|
|
int rc = 0;
|
|
|
|
if (minor >= SPLAT_MINORS)
|
|
return -ENXIO;
|
|
|
|
ASSERT(info);
|
|
ASSERT(info->info_buffer);
|
|
|
|
spin_lock(&info->info_lock);
|
|
|
|
/* Read beyond EOF */
|
|
if (*ppos >= info->info_size)
|
|
goto out;
|
|
|
|
/* Resize count if beyond EOF */
|
|
if (*ppos + count > info->info_size)
|
|
count = info->info_size - *ppos;
|
|
|
|
if (copy_to_user(buf, info->info_buffer + *ppos, count)) {
|
|
rc = -EFAULT;
|
|
goto out;
|
|
}
|
|
|
|
*ppos += count;
|
|
rc = count;
|
|
out:
|
|
spin_unlock(&info->info_lock);
|
|
return rc;
|
|
}
|
|
|
|
static loff_t splat_seek(struct file *file, loff_t offset, int origin)
|
|
{
|
|
unsigned int minor = iminor(file->f_dentry->d_inode);
|
|
splat_info_t *info = (splat_info_t *)file->private_data;
|
|
int rc = -EINVAL;
|
|
|
|
if (minor >= SPLAT_MINORS)
|
|
return -ENXIO;
|
|
|
|
ASSERT(info);
|
|
ASSERT(info->info_buffer);
|
|
|
|
spin_lock(&info->info_lock);
|
|
|
|
switch (origin) {
|
|
case 0: /* SEEK_SET - No-op just do it */
|
|
break;
|
|
case 1: /* SEEK_CUR - Seek from current */
|
|
offset = file->f_pos + offset;
|
|
break;
|
|
case 2: /* SEEK_END - Seek from end */
|
|
offset = info->info_size + offset;
|
|
break;
|
|
}
|
|
|
|
if (offset >= 0) {
|
|
file->f_pos = offset;
|
|
file->f_version = 0;
|
|
rc = offset;
|
|
}
|
|
|
|
spin_unlock(&info->info_lock);
|
|
|
|
return rc;
|
|
}
|
|
|
|
static struct file_operations splat_fops = {
|
|
.owner = THIS_MODULE,
|
|
.open = splat_open,
|
|
.release = splat_release,
|
|
.ioctl = splat_ioctl,
|
|
#ifdef CONFIG_COMPAT
|
|
.compat_ioctl = splat_compat_ioctl,
|
|
#endif
|
|
.read = splat_read,
|
|
.write = splat_write,
|
|
.llseek = splat_seek,
|
|
};
|
|
|
|
static struct cdev splat_cdev = {
|
|
.owner = THIS_MODULE,
|
|
.kobj = { .name = SPLAT_NAME, },
|
|
};
|
|
|
|
static int __init
|
|
splat_init(void)
|
|
{
|
|
dev_t dev;
|
|
int rc;
|
|
|
|
spin_lock_init(&splat_module_lock);
|
|
INIT_LIST_HEAD(&splat_module_list);
|
|
|
|
SPLAT_SUBSYSTEM_INIT(kmem);
|
|
SPLAT_SUBSYSTEM_INIT(taskq);
|
|
SPLAT_SUBSYSTEM_INIT(krng);
|
|
SPLAT_SUBSYSTEM_INIT(mutex);
|
|
SPLAT_SUBSYSTEM_INIT(condvar);
|
|
SPLAT_SUBSYSTEM_INIT(thread);
|
|
SPLAT_SUBSYSTEM_INIT(rwlock);
|
|
SPLAT_SUBSYSTEM_INIT(time);
|
|
SPLAT_SUBSYSTEM_INIT(vnode);
|
|
SPLAT_SUBSYSTEM_INIT(kobj);
|
|
SPLAT_SUBSYSTEM_INIT(atomic);
|
|
SPLAT_SUBSYSTEM_INIT(list);
|
|
SPLAT_SUBSYSTEM_INIT(generic);
|
|
SPLAT_SUBSYSTEM_INIT(cred);
|
|
|
|
dev = MKDEV(SPLAT_MAJOR, 0);
|
|
if ((rc = register_chrdev_region(dev, SPLAT_MINORS, SPLAT_NAME)))
|
|
goto error;
|
|
|
|
/* Support for registering a character driver */
|
|
cdev_init(&splat_cdev, &splat_fops);
|
|
if ((rc = cdev_add(&splat_cdev, dev, SPLAT_MINORS))) {
|
|
printk(KERN_ERR "SPLAT: Error adding cdev, %d\n", rc);
|
|
kobject_put(&splat_cdev.kobj);
|
|
unregister_chrdev_region(dev, SPLAT_MINORS);
|
|
goto error;
|
|
}
|
|
|
|
/* Support for udev make driver info available in sysfs */
|
|
splat_class = spl_class_create(THIS_MODULE, "splat");
|
|
if (IS_ERR(splat_class)) {
|
|
rc = PTR_ERR(splat_class);
|
|
printk(KERN_ERR "SPLAT: Error creating splat class, %d\n", rc);
|
|
cdev_del(&splat_cdev);
|
|
unregister_chrdev_region(dev, SPLAT_MINORS);
|
|
goto error;
|
|
}
|
|
|
|
splat_device = spl_device_create(splat_class, NULL,
|
|
MKDEV(SPLAT_MAJOR, 0),
|
|
NULL, SPLAT_NAME);
|
|
|
|
printk(KERN_INFO "SPLAT: Loaded Solaris Porting LAyer "
|
|
"Tests v%s\n", SPL_META_VERSION);
|
|
return 0;
|
|
error:
|
|
printk(KERN_ERR "SPLAT: Error registering splat device, %d\n", rc);
|
|
return rc;
|
|
}
|
|
|
|
static void
|
|
splat_fini(void)
|
|
{
|
|
dev_t dev = MKDEV(SPLAT_MAJOR, 0);
|
|
|
|
spl_device_destroy(splat_class, splat_device, dev);
|
|
spl_class_destroy(splat_class);
|
|
cdev_del(&splat_cdev);
|
|
unregister_chrdev_region(dev, SPLAT_MINORS);
|
|
|
|
SPLAT_SUBSYSTEM_FINI(cred);
|
|
SPLAT_SUBSYSTEM_FINI(generic);
|
|
SPLAT_SUBSYSTEM_FINI(list);
|
|
SPLAT_SUBSYSTEM_FINI(atomic);
|
|
SPLAT_SUBSYSTEM_FINI(kobj);
|
|
SPLAT_SUBSYSTEM_FINI(vnode);
|
|
SPLAT_SUBSYSTEM_FINI(time);
|
|
SPLAT_SUBSYSTEM_FINI(rwlock);
|
|
SPLAT_SUBSYSTEM_FINI(thread);
|
|
SPLAT_SUBSYSTEM_FINI(condvar);
|
|
SPLAT_SUBSYSTEM_FINI(mutex);
|
|
SPLAT_SUBSYSTEM_FINI(krng);
|
|
SPLAT_SUBSYSTEM_FINI(taskq);
|
|
SPLAT_SUBSYSTEM_FINI(kmem);
|
|
|
|
ASSERT(list_empty(&splat_module_list));
|
|
printk(KERN_INFO "SPLAT: Unloaded Solaris Porting LAyer "
|
|
"Tests v%s\n", SPL_META_VERSION);
|
|
}
|
|
|
|
module_init(splat_init);
|
|
module_exit(splat_fini);
|
|
|
|
MODULE_AUTHOR("Lawrence Livermore National Labs");
|
|
MODULE_DESCRIPTION("Solaris Porting LAyer Tests");
|
|
MODULE_LICENSE("GPL");
|