1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108
|
/* -*- linux-c -*-
* Systemtap Test Module 1
* Copyright (C) 2007 Red Hat Inc.
*
* This file is part of systemtap, and is free software. You can
* redistribute it and/or modify it under the terms of the GNU General
* Public License (GPL); either version 2, or (at your option) any
* later version.
*/
#include <linux/kernel.h>
#include <linux/module.h>
#include <linux/init.h>
#include <linux/proc_fs.h>
#include <linux/compiler.h>
#include <linux/uaccess.h>
MODULE_LICENSE("GPL");
int my_init_module(void);
void my_cleanup_module(void);
module_init(my_init_module);
module_exit(my_cleanup_module);
/* The purpose of this module is to provide a bunch of functions that */
/* do nothing important, and then call them in different contexts. */
/* We use a /proc file to trigger function calls from user context. */
/* Then systemtap scripts set probes on the functions and run tests */
/* to see if the expected output is received. This is better than using */
/* the kernel because kernel internals frequently change. */
/* The source is modelled after LTP's crasher testcase */
/** These functions are in module 2 **/
/* They are there to prevent compiler optimization from */
/* optimizing away functions. */
int yyy_func1 (int);
int yyy_int (int,int,int);
unsigned yyy_uint (unsigned,unsigned,unsigned);
long yyy_long (long,long,long);
int64_t yyy_int64 (int64_t,int64_t,int64_t);
char yyy_char(char, char, char);
char *yyy_str(char *, char *, char *);
/************ Below are the functions to create this module ************/
static struct proc_dir_entry *stm_ctl = NULL;
static ssize_t stm_write_cmd (struct file *file, const char __user *buf,
size_t count, loff_t *ppos)
{
char type;
if (get_user(type, (char __user *)buf))
return -EFAULT;
switch (type) {
case '0':
yyy_func1(1234);
break;
case '1':
yyy_int(-1, 200, 300);
break;
case '2':
yyy_uint((unsigned)-1, 200, 300);
break;
case '3':
yyy_long(-1L, 200L, 300L);
break;
case '4':
yyy_int64(-1, 200, 300);
break;
case '5':
yyy_char('a', 'b', 'c');
break;
case '6':
yyy_str("Hello", "System", "Tap");
break;
default:
printk ("systemtap_test_module1: invalid command type %d\n", (int)type);
return -EINVAL;
}
return count;
}
static const struct proc_ops stm_pops_cmd = {
// .proc_owner = THIS_MODULE,
.proc_write = stm_write_cmd,
};
int my_init_module(void)
{
stm_ctl = proc_create_data ("stap_test_cmd", 0666, NULL, &stm_pops_cmd, NULL);
if (stm_ctl == NULL)
return -1;
return 0;
}
void my_cleanup_module(void)
{
if (stm_ctl)
remove_proc_entry ("stap_test_cmd", NULL);
}
MODULE_DESCRIPTION("systemtap backtrace test module1");
MODULE_LICENSE("GPL");
|