Home | History | Annotate | Line # | Download | only in kern
kern_module.c revision 1.20
      1  1.20      ad /*	$NetBSD: kern_module.c,v 1.20 2008/05/20 19:20:38 ad Exp $	*/
      2   1.1      ad 
      3   1.1      ad /*-
      4   1.1      ad  * Copyright (c) 2008 The NetBSD Foundation, Inc.
      5   1.1      ad  * All rights reserved.
      6   1.1      ad  *
      7   1.1      ad  * Redistribution and use in source and binary forms, with or without
      8   1.1      ad  * modification, are permitted provided that the following conditions
      9   1.1      ad  * are met:
     10   1.1      ad  * 1. Redistributions of source code must retain the above copyright
     11   1.1      ad  *    notice, this list of conditions and the following disclaimer.
     12   1.1      ad  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.1      ad  *    notice, this list of conditions and the following disclaimer in the
     14   1.1      ad  *    documentation and/or other materials provided with the distribution.
     15   1.1      ad  *
     16   1.1      ad  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17   1.1      ad  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18   1.1      ad  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19   1.1      ad  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20   1.1      ad  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21   1.1      ad  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22   1.1      ad  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23   1.1      ad  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24   1.1      ad  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25   1.1      ad  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26   1.1      ad  * POSSIBILITY OF SUCH DAMAGE.
     27   1.1      ad  */
     28   1.1      ad 
     29   1.1      ad /*
     30   1.2      ad  * Kernel module support.
     31   1.1      ad  */
     32   1.1      ad 
     33  1.13      ad #include "opt_modular.h"
     34  1.13      ad 
     35   1.1      ad #include <sys/cdefs.h>
     36  1.20      ad __KERNEL_RCSID(0, "$NetBSD: kern_module.c,v 1.20 2008/05/20 19:20:38 ad Exp $");
     37   1.1      ad 
     38   1.1      ad #include <sys/param.h>
     39   1.1      ad #include <sys/systm.h>
     40   1.1      ad #include <sys/fcntl.h>
     41   1.1      ad #include <sys/proc.h>
     42   1.1      ad #include <sys/kauth.h>
     43   1.1      ad #include <sys/kobj.h>
     44   1.1      ad #include <sys/kmem.h>
     45   1.1      ad #include <sys/module.h>
     46  1.18      ad #include <sys/kauth.h>
     47   1.1      ad 
     48   1.1      ad #include <uvm/uvm_extern.h>
     49   1.1      ad 
     50   1.1      ad #include <machine/stdarg.h>
     51   1.1      ad 
     52   1.2      ad #ifndef LKM	/* XXX */
     53   1.2      ad struct vm_map *lkm_map;
     54   1.2      ad #endif
     55   1.2      ad 
     56   1.1      ad struct modlist	module_list = TAILQ_HEAD_INITIALIZER(module_list);
     57   1.1      ad struct modlist	module_bootlist = TAILQ_HEAD_INITIALIZER(module_bootlist);
     58  1.12      ad static module_t	*module_active;
     59  1.16      ad static char	module_base[64];
     60   1.1      ad u_int		module_count;
     61   1.1      ad kmutex_t	module_lock;
     62   1.1      ad 
     63   1.1      ad /* Ensure that the kernel's link set isn't empty. */
     64   1.1      ad static modinfo_t module_dummy;
     65   1.1      ad __link_set_add_rodata(modules, module_dummy);
     66   1.1      ad 
     67   1.1      ad static module_t	*module_lookup(const char *);
     68   1.9    jmmv static int	module_do_load(const char *, bool, int, prop_dictionary_t,
     69  1.20      ad 		    module_t **, modclass_t class, bool);
     70   1.1      ad static int	module_do_unload(const char *);
     71   1.1      ad static void	module_error(const char *, ...);
     72   1.1      ad static int	module_do_builtin(const char *, module_t **);
     73  1.11      ad static int	module_fetch_info(module_t *);
     74   1.1      ad 
     75   1.1      ad /*
     76   1.1      ad  * module_error:
     77   1.1      ad  *
     78   1.1      ad  *	Utility function: log an error.
     79   1.1      ad  */
     80   1.1      ad static void
     81   1.1      ad module_error(const char *fmt, ...)
     82   1.1      ad {
     83   1.1      ad 	va_list ap;
     84   1.1      ad 
     85   1.1      ad 	va_start(ap, fmt);
     86   1.1      ad 	printf("WARNING: module error: ");
     87   1.1      ad 	vprintf(fmt, ap);
     88   1.1      ad 	printf("\n");
     89   1.1      ad 	va_end(ap);
     90   1.1      ad }
     91   1.1      ad 
     92   1.1      ad /*
     93   1.1      ad  * module_init:
     94   1.1      ad  *
     95   1.1      ad  *	Initialize the module subsystem.
     96   1.1      ad  */
     97   1.1      ad void
     98   1.1      ad module_init(void)
     99   1.1      ad {
    100   1.1      ad 	extern struct vm_map *lkm_map;
    101   1.1      ad 
    102   1.1      ad 	if (lkm_map == NULL)
    103   1.1      ad 		lkm_map = kernel_map;
    104   1.1      ad 	mutex_init(&module_lock, MUTEX_DEFAULT, IPL_NONE);
    105  1.13      ad #ifdef MODULAR	/* XXX */
    106  1.11      ad 	module_init_md();
    107  1.12      ad #endif
    108  1.16      ad 
    109  1.16      ad #if __NetBSD_Version__ / 1000000 % 100 == 99	/* -current */
    110  1.17      ad 	snprintf(module_base, sizeof(module_base), "/stand/%s/%s/modules",
    111  1.17      ad 	    machine, osrelease);
    112  1.16      ad #else						/* release */
    113  1.17      ad 	snprintf(module_base, sizeof(module_base), "/stand/%s/%d.%d/modules",
    114  1.17      ad 	    machine, __NetBSD_Version__ / 100000000,
    115  1.16      ad 	    __NetBSD_Version__ / 1000000 % 100);
    116  1.16      ad #endif
    117   1.1      ad }
    118   1.1      ad 
    119   1.1      ad /*
    120   1.1      ad  * module_init_class:
    121   1.1      ad  *
    122   1.1      ad  *	Initialize all built-in and pre-loaded modules of the
    123   1.1      ad  *	specified class.
    124   1.1      ad  */
    125   1.1      ad void
    126   1.1      ad module_init_class(modclass_t class)
    127   1.1      ad {
    128   1.1      ad 	__link_set_decl(modules, modinfo_t);
    129   1.1      ad 	modinfo_t *const *mip, *mi;
    130   1.1      ad 	module_t *mod;
    131   1.1      ad 
    132   1.1      ad 	mutex_enter(&module_lock);
    133   1.1      ad 	/*
    134   1.1      ad 	 * Builtins first.  These can't depend on pre-loaded modules.
    135   1.1      ad 	 */
    136   1.1      ad 	__link_set_foreach(mip, modules) {
    137   1.1      ad 		mi = *mip;
    138   1.1      ad 		if (mi == &module_dummy) {
    139   1.1      ad 			continue;
    140   1.1      ad 		}
    141   1.1      ad 		if (class != MODULE_CLASS_ANY && class != mi->mi_class) {
    142   1.1      ad 			continue;
    143   1.1      ad 		}
    144   1.1      ad 		(void)module_do_builtin(mi->mi_name, NULL);
    145   1.1      ad 	}
    146   1.1      ad 	/*
    147   1.1      ad 	 * Now preloaded modules.  These will be pulled off the
    148   1.1      ad 	 * list as we call module_do_load();
    149   1.1      ad 	 */
    150  1.11      ad 	do {
    151  1.11      ad 		TAILQ_FOREACH(mod, &module_bootlist, mod_chain) {
    152  1.11      ad 			mi = mod->mod_info;
    153  1.11      ad 			if (class != MODULE_CLASS_ANY &&
    154  1.11      ad 			    class != mi->mi_class)
    155  1.11      ad 				continue;
    156  1.18      ad 			module_do_load(mi->mi_name, false, 0, NULL, NULL,
    157  1.20      ad 			    class, true);
    158  1.11      ad 			break;
    159  1.11      ad 		}
    160  1.11      ad 	} while (mod != NULL);
    161   1.1      ad 	mutex_exit(&module_lock);
    162   1.1      ad }
    163   1.1      ad 
    164   1.1      ad /*
    165   1.1      ad  * module_jettison:
    166   1.1      ad  *
    167   1.1      ad  *	Return memory used by pre-loaded modules to the freelist.
    168   1.1      ad  */
    169   1.1      ad void
    170   1.1      ad module_jettison(void)
    171   1.1      ad {
    172   1.1      ad 
    173   1.1      ad 	/* XXX nothing yet */
    174   1.1      ad }
    175   1.1      ad 
    176   1.1      ad /*
    177   1.1      ad  * module_load:
    178   1.1      ad  *
    179   1.9    jmmv  *	Load a single module from the file system.
    180   1.1      ad  */
    181   1.1      ad int
    182  1.18      ad module_load(const char *filename, int flags, prop_dictionary_t props,
    183  1.20      ad 	    modclass_t class, bool autoload)
    184   1.1      ad {
    185   1.1      ad 	int error;
    186   1.1      ad 
    187  1.18      ad 	/* Authorize. */
    188  1.18      ad 	error = kauth_authorize_system(kauth_cred_get(), KAUTH_SYSTEM_MODULE,
    189  1.18      ad 	    0, (void *)(uintptr_t)MODCTL_LOAD, NULL, NULL);
    190  1.18      ad 	if (error != 0) {
    191  1.18      ad 		return error;
    192  1.18      ad 	}
    193  1.18      ad 
    194   1.1      ad 	mutex_enter(&module_lock);
    195  1.20      ad 	error = module_do_load(filename, false, flags, props, NULL, class,
    196  1.20      ad 	    autoload);
    197   1.1      ad 	mutex_exit(&module_lock);
    198   1.1      ad 
    199   1.1      ad 	return error;
    200   1.1      ad }
    201   1.1      ad 
    202   1.1      ad /*
    203   1.1      ad  * module_unload:
    204   1.1      ad  *
    205   1.1      ad  *	Find and unload a module by name.
    206   1.1      ad  */
    207   1.1      ad int
    208   1.1      ad module_unload(const char *name)
    209   1.1      ad {
    210   1.1      ad 	int error;
    211   1.1      ad 
    212  1.18      ad 	/* Authorize. */
    213  1.18      ad 	error = kauth_authorize_system(kauth_cred_get(), KAUTH_SYSTEM_MODULE,
    214  1.18      ad 	    0, (void *)(uintptr_t)MODCTL_UNLOAD, NULL, NULL);
    215  1.18      ad 	if (error != 0) {
    216  1.18      ad 		return error;
    217  1.18      ad 	}
    218  1.18      ad 
    219   1.1      ad 	mutex_enter(&module_lock);
    220   1.1      ad 	error = module_do_unload(name);
    221   1.1      ad 	mutex_exit(&module_lock);
    222   1.1      ad 
    223   1.1      ad 	return error;
    224   1.1      ad }
    225   1.1      ad 
    226   1.1      ad /*
    227   1.1      ad  * module_lookup:
    228   1.1      ad  *
    229   1.1      ad  *	Look up a module by name.
    230   1.1      ad  */
    231   1.1      ad module_t *
    232   1.1      ad module_lookup(const char *name)
    233   1.1      ad {
    234   1.1      ad 	module_t *mod;
    235   1.1      ad 
    236   1.1      ad 	KASSERT(mutex_owned(&module_lock));
    237   1.1      ad 
    238   1.1      ad 	TAILQ_FOREACH(mod, &module_list, mod_chain) {
    239   1.1      ad 		if (strcmp(mod->mod_info->mi_name, name) == 0) {
    240   1.1      ad 			break;
    241   1.1      ad 		}
    242   1.1      ad 	}
    243   1.1      ad 
    244   1.1      ad 	return mod;
    245   1.1      ad }
    246   1.1      ad 
    247   1.1      ad /*
    248   1.1      ad  * module_hold:
    249   1.1      ad  *
    250   1.1      ad  *	Add a single reference to a module.  It's the caller's
    251   1.1      ad  *	responsibility to ensure that the reference is dropped
    252   1.1      ad  *	later.
    253   1.1      ad  */
    254   1.1      ad int
    255   1.1      ad module_hold(const char *name)
    256   1.1      ad {
    257   1.1      ad 	module_t *mod;
    258   1.1      ad 
    259   1.1      ad 	mutex_enter(&module_lock);
    260   1.1      ad 	mod = module_lookup(name);
    261   1.1      ad 	if (mod == NULL) {
    262   1.1      ad 		mutex_exit(&module_lock);
    263   1.1      ad 		return ENOENT;
    264   1.1      ad 	}
    265   1.1      ad 	mod->mod_refcnt++;
    266   1.1      ad 	mutex_exit(&module_lock);
    267   1.1      ad 
    268   1.1      ad 	return 0;
    269   1.1      ad }
    270   1.1      ad 
    271   1.1      ad /*
    272   1.1      ad  * module_rele:
    273   1.1      ad  *
    274   1.1      ad  *	Release a reference acquired with module_hold().
    275   1.1      ad  */
    276   1.1      ad void
    277   1.1      ad module_rele(const char *name)
    278   1.1      ad {
    279   1.1      ad 	module_t *mod;
    280   1.1      ad 
    281   1.1      ad 	mutex_enter(&module_lock);
    282   1.1      ad 	mod = module_lookup(name);
    283   1.1      ad 	if (mod == NULL) {
    284   1.1      ad 		mutex_exit(&module_lock);
    285   1.1      ad 		panic("module_rele: gone");
    286   1.1      ad 	}
    287   1.1      ad 	mod->mod_refcnt--;
    288   1.1      ad 	mutex_exit(&module_lock);
    289   1.1      ad }
    290   1.1      ad 
    291   1.1      ad /*
    292   1.1      ad  * module_do_builtin:
    293   1.1      ad  *
    294   1.1      ad  *	Initialize a single module from the list of modules that are
    295   1.1      ad  *	built into the kernel (linked into the kernel image).
    296   1.1      ad  */
    297   1.1      ad static int
    298   1.1      ad module_do_builtin(const char *name, module_t **modp)
    299   1.1      ad {
    300   1.1      ad 	__link_set_decl(modules, modinfo_t);
    301   1.1      ad 	modinfo_t *const *mip;
    302   1.1      ad 	const char *p, *s;
    303   1.1      ad 	char buf[MAXMODNAME];
    304   1.1      ad 	modinfo_t *mi;
    305   1.1      ad 	module_t *mod, *mod2;
    306   1.1      ad 	size_t len;
    307   1.1      ad 	int error, i;
    308   1.1      ad 
    309   1.1      ad 	KASSERT(mutex_owned(&module_lock));
    310   1.1      ad 
    311   1.1      ad 	/*
    312   1.1      ad 	 * Check to see if already loaded.
    313   1.1      ad 	 */
    314   1.1      ad 	if ((mod = module_lookup(name)) != NULL) {
    315   1.1      ad 		if (modp != NULL) {
    316   1.1      ad 			*modp = mod;
    317   1.1      ad 		}
    318   1.1      ad 		return 0;
    319   1.1      ad 	}
    320   1.1      ad 
    321   1.1      ad 	/*
    322   1.1      ad 	 * Search the list to see if we have a module by this name.
    323   1.1      ad 	 */
    324   1.1      ad 	error = ENOENT;
    325   1.1      ad 	__link_set_foreach(mip, modules) {
    326   1.1      ad 		mi = *mip;
    327   1.1      ad 		if (mi == &module_dummy) {
    328   1.1      ad 			continue;
    329   1.1      ad 		}
    330   1.1      ad 		if (strcmp(mi->mi_name, name) == 0) {
    331   1.1      ad 			error = 0;
    332   1.1      ad 			break;
    333   1.1      ad 		}
    334   1.1      ad 	}
    335   1.1      ad 	if (error != 0) {
    336   1.1      ad 		return error;
    337   1.1      ad 	}
    338   1.1      ad 
    339   1.1      ad 	/*
    340   1.1      ad 	 * Initialize pre-requisites.
    341   1.1      ad 	 */
    342   1.1      ad 	mod = kmem_zalloc(sizeof(*mod), KM_SLEEP);
    343   1.1      ad 	if (mod == NULL) {
    344   1.1      ad 		return ENOMEM;
    345   1.1      ad 	}
    346   1.1      ad 	if (modp != NULL) {
    347   1.1      ad 		*modp = mod;
    348   1.1      ad 	}
    349   1.1      ad 	if (mi->mi_required != NULL) {
    350   1.1      ad 		for (s = mi->mi_required; *s != '\0'; s = p) {
    351   1.1      ad 			if (*s == ',')
    352   1.1      ad 				s++;
    353   1.1      ad 			p = s;
    354   1.1      ad 			while (*p != '\0' && *p != ',')
    355   1.1      ad 				p++;
    356   1.1      ad 			len = min(p - s + 1, sizeof(buf));
    357   1.1      ad 			strlcpy(buf, s, len);
    358   1.1      ad 			if (buf[0] == '\0')
    359   1.1      ad 				break;
    360   1.1      ad 			if (mod->mod_nrequired == MAXMODDEPS - 1) {
    361   1.1      ad 				module_error("too many required modules");
    362   1.1      ad 				kmem_free(mod, sizeof(*mod));
    363   1.1      ad 				return EINVAL;
    364   1.1      ad 			}
    365   1.1      ad 			error = module_do_builtin(buf, &mod2);
    366   1.1      ad 			if (error != 0) {
    367   1.1      ad 				kmem_free(mod, sizeof(*mod));
    368   1.1      ad 				return error;
    369   1.1      ad 			}
    370   1.1      ad 			mod->mod_required[mod->mod_nrequired++] = mod2;
    371   1.1      ad 		}
    372   1.1      ad 	}
    373   1.1      ad 
    374   1.1      ad 	/*
    375   1.1      ad 	 * Try to initialize the module.
    376   1.1      ad 	 */
    377  1.12      ad 	KASSERT(module_active == NULL);
    378  1.12      ad 	module_active = mod;
    379   1.1      ad 	error = (*mi->mi_modcmd)(MODULE_CMD_INIT, NULL);
    380  1.12      ad 	module_active = NULL;
    381   1.1      ad 	if (error != 0) {
    382   1.1      ad 		module_error("builtin module `%s' "
    383   1.1      ad 		    "failed to init", mi->mi_name);
    384   1.1      ad 		kmem_free(mod, sizeof(*mod));
    385   1.1      ad 		return error;
    386   1.1      ad 	}
    387   1.1      ad 	mod->mod_info = mi;
    388   1.1      ad 	mod->mod_source = MODULE_SOURCE_KERNEL;
    389   1.1      ad 	module_count++;
    390   1.1      ad 	TAILQ_INSERT_TAIL(&module_list, mod, mod_chain);
    391   1.1      ad 
    392   1.1      ad 	/*
    393   1.1      ad 	 * If that worked, count dependencies.
    394   1.1      ad 	 */
    395   1.1      ad 	for (i = 0; i < mod->mod_nrequired; i++) {
    396   1.1      ad 		mod->mod_required[i]->mod_refcnt++;
    397   1.1      ad 	}
    398   1.1      ad 
    399   1.1      ad 	return 0;
    400   1.1      ad }
    401   1.1      ad 
    402   1.1      ad /*
    403   1.1      ad  * module_do_load:
    404   1.1      ad  *
    405   1.1      ad  *	Helper routine: load a module from the file system, or one
    406   1.1      ad  *	pushed by the boot loader.
    407   1.1      ad  */
    408   1.1      ad static int
    409   1.9    jmmv module_do_load(const char *filename, bool isdep, int flags,
    410  1.20      ad 	       prop_dictionary_t props, module_t **modp, modclass_t class,
    411  1.20      ad 	       bool autoload)
    412   1.1      ad {
    413   1.1      ad 	static TAILQ_HEAD(,module) pending = TAILQ_HEAD_INITIALIZER(pending);
    414   1.1      ad 	static int depth;
    415   1.1      ad 	const int maxdepth = 6;
    416   1.1      ad 	modinfo_t *mi;
    417   1.1      ad 	module_t *mod, *mod2;
    418   1.1      ad 	char buf[MAXMODNAME];
    419   1.1      ad 	const char *s, *p;
    420   1.1      ad 	int error;
    421   1.1      ad 	size_t len;
    422   1.1      ad 	u_int i;
    423   1.1      ad 
    424   1.1      ad 	KASSERT(mutex_owned(&module_lock));
    425   1.1      ad 
    426   1.1      ad 	error = 0;
    427   1.1      ad 
    428   1.1      ad 	/*
    429   1.1      ad 	 * Avoid recursing too far.
    430   1.1      ad 	 */
    431   1.1      ad 	if (++depth > maxdepth) {
    432   1.1      ad 		module_error("too many required modules");
    433   1.1      ad 		depth--;
    434   1.1      ad 		return EMLINK;
    435   1.1      ad 	}
    436   1.1      ad 
    437   1.1      ad 	/*
    438   1.1      ad 	 * Load the module and link.  Before going to the file system,
    439   1.1      ad 	 * scan the list of modules loaded by the boot loader.  Just
    440   1.1      ad 	 * before init is started the list of modules loaded at boot
    441   1.1      ad 	 * will be purged.  Before init is started we can assume that
    442   1.1      ad 	 * `filename' is a module name and not a path name.
    443   1.1      ad 	 */
    444   1.1      ad 	TAILQ_FOREACH(mod, &module_bootlist, mod_chain) {
    445   1.1      ad 		if (strcmp(mod->mod_info->mi_name, filename) == 0) {
    446   1.1      ad 			TAILQ_REMOVE(&module_bootlist, mod, mod_chain);
    447   1.1      ad 			break;
    448   1.1      ad 		}
    449   1.1      ad 	}
    450  1.14  rumble 	if (mod != NULL) {
    451  1.14  rumble 		TAILQ_INSERT_TAIL(&pending, mod, mod_chain);
    452  1.14  rumble 	} else {
    453   1.1      ad 		mod = kmem_zalloc(sizeof(*mod), KM_SLEEP);
    454   1.1      ad 		if (mod == NULL) {
    455   1.1      ad 			depth--;
    456   1.1      ad 			return ENOMEM;
    457   1.1      ad 		}
    458  1.20      ad 		error = kobj_load_file(&mod->mod_kobj, filename, module_base,
    459  1.20      ad 		    autoload);
    460   1.1      ad 		if (error != 0) {
    461   1.1      ad 			kmem_free(mod, sizeof(*mod));
    462   1.1      ad 			depth--;
    463   1.6  rumble 			module_error("unable to load kernel object");
    464   1.8  rumble 			return error;
    465   1.7  rumble 		}
    466  1.14  rumble 		TAILQ_INSERT_TAIL(&pending, mod, mod_chain);
    467   1.1      ad 		mod->mod_source = MODULE_SOURCE_FILESYS;
    468  1.11      ad 		error = module_fetch_info(mod);
    469  1.11      ad 		if (error != 0) {
    470  1.11      ad 			goto fail;
    471  1.11      ad 		}
    472   1.1      ad 	}
    473   1.1      ad 
    474   1.1      ad 	/*
    475  1.11      ad 	 * Check compatibility.
    476   1.1      ad 	 */
    477   1.1      ad 	mi = mod->mod_info;
    478   1.3  rumble 	if (strlen(mi->mi_name) >= MAXMODNAME) {
    479   1.3  rumble 		error = EINVAL;
    480   1.3  rumble 		module_error("module name too long");
    481   1.3  rumble 		goto fail;
    482   1.3  rumble 	}
    483   1.3  rumble 
    484   1.1      ad 	/*
    485  1.18      ad 	 * If a specific kind of module was requested, ensure that we have
    486  1.18      ad 	 * a match.
    487  1.18      ad 	 */
    488  1.18      ad 	if (class != MODULE_CLASS_ANY && class != mi->mi_class) {
    489  1.18      ad 		error = ENOENT;
    490  1.18      ad 		goto fail;
    491  1.18      ad 	}
    492  1.18      ad 
    493  1.18      ad 	/*
    494   1.1      ad 	 * If loading a dependency, `filename' is a plain module name.
    495   1.1      ad 	 * The name must match.
    496   1.1      ad 	 */
    497   1.1      ad 	if (isdep && strcmp(mi->mi_name, filename) != 0) {
    498   1.1      ad 		error = ENOENT;
    499   1.1      ad 		goto fail;
    500   1.1      ad 	}
    501   1.1      ad 
    502   1.1      ad 	/*
    503   1.3  rumble 	 * Check to see if the module is already loaded.  If so, we may
    504   1.3  rumble 	 * have been recursively called to handle a dependency, so be sure
    505   1.3  rumble 	 * to set modp.
    506   1.1      ad 	 */
    507   1.3  rumble 	if ((mod2 = module_lookup(mi->mi_name)) != NULL) {
    508   1.5  rumble 		if (modp != NULL)
    509   1.5  rumble 			*modp = mod2;
    510   1.1      ad 		error = EEXIST;
    511   1.1      ad 		goto fail;
    512   1.1      ad 	}
    513   1.3  rumble 
    514   1.3  rumble 	/*
    515   1.3  rumble 	 * Block circular dependencies.
    516   1.3  rumble 	 */
    517   1.1      ad 	TAILQ_FOREACH(mod2, &pending, mod_chain) {
    518   1.1      ad 		if (mod == mod2) {
    519   1.1      ad 			continue;
    520   1.1      ad 		}
    521   1.1      ad 		if (strcmp(mod2->mod_info->mi_name, mi->mi_name) == 0) {
    522   1.1      ad 		    	error = EDEADLK;
    523   1.1      ad 			module_error("circular dependency detected");
    524   1.1      ad 		    	goto fail;
    525   1.1      ad 		}
    526   1.1      ad 	}
    527   1.1      ad 
    528   1.1      ad 	/*
    529   1.1      ad 	 * Now try to load any requisite modules.
    530   1.1      ad 	 */
    531   1.1      ad 	if (mi->mi_required != NULL) {
    532   1.1      ad 		for (s = mi->mi_required; *s != '\0'; s = p) {
    533   1.1      ad 			if (*s == ',')
    534   1.1      ad 				s++;
    535   1.1      ad 			p = s;
    536   1.1      ad 			while (*p != '\0' && *p != ',')
    537   1.1      ad 				p++;
    538   1.3  rumble 			len = p - s + 1;
    539   1.3  rumble 			if (len >= MAXMODNAME) {
    540   1.3  rumble 				error = EINVAL;
    541   1.3  rumble 				module_error("required module name too long");
    542   1.3  rumble 				goto fail;
    543   1.3  rumble 			}
    544   1.1      ad 			strlcpy(buf, s, len);
    545   1.1      ad 			if (buf[0] == '\0')
    546   1.1      ad 				break;
    547   1.1      ad 			if (mod->mod_nrequired == MAXMODDEPS - 1) {
    548   1.1      ad 				error = EINVAL;
    549   1.1      ad 				module_error("too many required modules");
    550   1.1      ad 				goto fail;
    551   1.1      ad 			}
    552   1.6  rumble 			if (strcmp(buf, mi->mi_name) == 0) {
    553   1.6  rumble 				error = EDEADLK;
    554   1.6  rumble 				module_error("self-dependency detected");
    555   1.6  rumble 				goto fail;
    556   1.6  rumble 			}
    557   1.9    jmmv 			error = module_do_load(buf, true, flags, NULL,
    558  1.18      ad 			    &mod->mod_required[mod->mod_nrequired++],
    559  1.20      ad 			    MODULE_CLASS_ANY, true);
    560   1.1      ad 			if (error != 0 && error != EEXIST)
    561   1.1      ad 				goto fail;
    562   1.1      ad 		}
    563   1.1      ad 	}
    564   1.1      ad 
    565   1.1      ad 	/*
    566  1.15      ad 	 * We loaded all needed modules successfully: perform global
    567  1.15      ad 	 * relocations and initialize.
    568   1.1      ad 	 */
    569  1.15      ad 	error = kobj_affix(mod->mod_kobj, mi->mi_name);
    570  1.15      ad 	if (error != 0) {
    571  1.15      ad 		module_error("unable to affix module");
    572  1.15      ad 		goto fail2;
    573  1.15      ad 	}
    574  1.15      ad 
    575  1.12      ad 	KASSERT(module_active == NULL);
    576  1.12      ad 	module_active = mod;
    577   1.9    jmmv 	error = (*mi->mi_modcmd)(MODULE_CMD_INIT, props);
    578  1.12      ad 	module_active = NULL;
    579   1.1      ad 	if (error != 0) {
    580   1.1      ad 		module_error("modctl function returned error %d", error);
    581   1.1      ad 		goto fail;
    582   1.1      ad 	}
    583   1.1      ad 
    584   1.1      ad 	/*
    585   1.1      ad 	 * Good, the module loaded successfully.  Put it onto the
    586   1.1      ad 	 * list and add references to its requisite modules.
    587   1.1      ad 	 */
    588   1.1      ad 	module_count++;
    589   1.1      ad 	TAILQ_REMOVE(&pending, mod, mod_chain);
    590   1.1      ad 	TAILQ_INSERT_TAIL(&module_list, mod, mod_chain);
    591   1.1      ad 	for (i = 0; i < mod->mod_nrequired; i++) {
    592   1.4  simonb 		KASSERT(mod->mod_required[i] != NULL);
    593   1.1      ad 		mod->mod_required[i]->mod_refcnt++;
    594   1.1      ad 	}
    595   1.1      ad 	if (modp != NULL) {
    596   1.1      ad 		*modp = mod;
    597   1.1      ad 	}
    598   1.1      ad 	depth--;
    599   1.1      ad 	return 0;
    600   1.7  rumble 
    601   1.1      ad  fail:
    602  1.15      ad 	kobj_unload(mod->mod_kobj);
    603  1.15      ad  fail2:
    604   1.1      ad 	TAILQ_REMOVE(&pending, mod, mod_chain);
    605   1.1      ad 	kmem_free(mod, sizeof(*mod));
    606   1.1      ad 	depth--;
    607   1.1      ad 	return error;
    608   1.1      ad }
    609   1.1      ad 
    610   1.1      ad /*
    611   1.1      ad  * module_do_unload:
    612   1.1      ad  *
    613   1.1      ad  *	Helper routine: do the dirty work of unloading a module.
    614   1.1      ad  */
    615   1.1      ad static int
    616   1.1      ad module_do_unload(const char *name)
    617   1.1      ad {
    618   1.1      ad 	module_t *mod;
    619   1.1      ad 	int error;
    620   1.1      ad 	u_int i;
    621   1.1      ad 
    622   1.1      ad 	KASSERT(mutex_owned(&module_lock));
    623   1.1      ad 
    624   1.1      ad 	mod = module_lookup(name);
    625   1.1      ad 	if (mod == NULL) {
    626   1.1      ad 		return ENOENT;
    627   1.1      ad 	}
    628   1.1      ad 	if (mod->mod_refcnt != 0 || mod->mod_source == MODULE_SOURCE_KERNEL) {
    629   1.1      ad 		return EBUSY;
    630   1.1      ad 	}
    631  1.12      ad 	KASSERT(module_active == NULL);
    632  1.12      ad 	module_active = mod;
    633   1.1      ad 	error = (*mod->mod_info->mi_modcmd)(MODULE_CMD_FINI, NULL);
    634  1.12      ad 	module_active = NULL;
    635   1.1      ad 	if (error != 0) {
    636   1.1      ad 		return error;
    637   1.1      ad 	}
    638   1.1      ad 	module_count--;
    639   1.1      ad 	TAILQ_REMOVE(&module_list, mod, mod_chain);
    640   1.1      ad 	for (i = 0; i < mod->mod_nrequired; i++) {
    641   1.1      ad 		mod->mod_required[i]->mod_refcnt--;
    642   1.1      ad 	}
    643   1.1      ad 	if (mod->mod_kobj != NULL) {
    644   1.1      ad 		kobj_unload(mod->mod_kobj);
    645   1.1      ad 	}
    646   1.1      ad 	kmem_free(mod, sizeof(*mod));
    647   1.1      ad 
    648   1.1      ad 	return 0;
    649   1.1      ad }
    650   1.1      ad 
    651   1.1      ad /*
    652   1.1      ad  * module_prime:
    653   1.1      ad  *
    654   1.1      ad  *	Push a module loaded by the bootloader onto our internal
    655   1.1      ad  *	list.
    656   1.1      ad  */
    657   1.1      ad int
    658   1.1      ad module_prime(void *base, size_t size)
    659   1.1      ad {
    660   1.1      ad 	module_t *mod;
    661   1.1      ad 	int error;
    662   1.1      ad 
    663   1.1      ad 	mod = kmem_zalloc(sizeof(*mod), KM_SLEEP);
    664   1.1      ad 	if (mod == NULL) {
    665   1.1      ad 		return ENOMEM;
    666   1.1      ad 	}
    667   1.1      ad 	mod->mod_source = MODULE_SOURCE_BOOT;
    668   1.1      ad 
    669  1.15      ad 	error = kobj_load_mem(&mod->mod_kobj, base, size);
    670   1.1      ad 	if (error != 0) {
    671  1.11      ad 		kmem_free(mod, sizeof(*mod));
    672  1.11      ad 		module_error("unable to load object pushed by boot loader");
    673  1.11      ad 		return error;
    674  1.11      ad 	}
    675  1.11      ad 	error = module_fetch_info(mod);
    676  1.11      ad 	if (error != 0) {
    677  1.11      ad 		kobj_unload(mod->mod_kobj);
    678   1.1      ad 		kmem_free(mod, sizeof(*mod));
    679  1.11      ad 		module_error("unable to load object pushed by boot loader");
    680   1.1      ad 		return error;
    681   1.1      ad 	}
    682  1.11      ad 
    683   1.1      ad 	TAILQ_INSERT_TAIL(&module_bootlist, mod, mod_chain);
    684   1.1      ad 
    685   1.1      ad 	return 0;
    686   1.1      ad }
    687  1.11      ad 
    688  1.11      ad /*
    689  1.11      ad  * module_fetch_into:
    690  1.11      ad  *
    691  1.11      ad  *	Fetch modinfo record from a loaded module.
    692  1.11      ad  */
    693  1.11      ad static int
    694  1.11      ad module_fetch_info(module_t *mod)
    695  1.11      ad {
    696  1.11      ad 	int error;
    697  1.11      ad 	void *addr;
    698  1.11      ad 	size_t size;
    699  1.11      ad 
    700  1.11      ad 	/*
    701  1.11      ad 	 * Find module info record and check compatibility.
    702  1.11      ad 	 */
    703  1.11      ad 	error = kobj_find_section(mod->mod_kobj, "link_set_modules",
    704  1.11      ad 	    &addr, &size);
    705  1.11      ad 	if (error != 0) {
    706  1.11      ad 		module_error("`link_set_modules' section not present");
    707  1.11      ad 		return error;
    708  1.11      ad 	}
    709  1.11      ad 	if (size != sizeof(modinfo_t **)) {
    710  1.11      ad 		module_error("`link_set_modules' section wrong size");
    711  1.11      ad 		return error;
    712  1.11      ad 	}
    713  1.11      ad 	mod->mod_info = *(modinfo_t **)addr;
    714  1.11      ad 
    715  1.11      ad 	return 0;
    716  1.11      ad }
    717  1.12      ad 
    718  1.12      ad /*
    719  1.12      ad  * module_find_section:
    720  1.12      ad  *
    721  1.12      ad  *	Allows a module that is being initialized to look up a section
    722  1.12      ad  *	within its ELF object.
    723  1.12      ad  */
    724  1.12      ad int
    725  1.12      ad module_find_section(const char *name, void **addr, size_t *size)
    726  1.12      ad {
    727  1.12      ad 
    728  1.12      ad 	KASSERT(mutex_owned(&module_lock));
    729  1.12      ad 	KASSERT(module_active != NULL);
    730  1.12      ad 
    731  1.12      ad 	return kobj_find_section(module_active->mod_kobj, name, addr, size);
    732  1.12      ad }
    733