kern_module.c revision 1.20 1 1.20 ad /* $NetBSD: kern_module.c,v 1.20 2008/05/20 19:20:38 ad Exp $ */
2 1.1 ad
3 1.1 ad /*-
4 1.1 ad * Copyright (c) 2008 The NetBSD Foundation, Inc.
5 1.1 ad * All rights reserved.
6 1.1 ad *
7 1.1 ad * Redistribution and use in source and binary forms, with or without
8 1.1 ad * modification, are permitted provided that the following conditions
9 1.1 ad * are met:
10 1.1 ad * 1. Redistributions of source code must retain the above copyright
11 1.1 ad * notice, this list of conditions and the following disclaimer.
12 1.1 ad * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 ad * notice, this list of conditions and the following disclaimer in the
14 1.1 ad * documentation and/or other materials provided with the distribution.
15 1.1 ad *
16 1.1 ad * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 1.1 ad * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 1.1 ad * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 1.1 ad * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 1.1 ad * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 1.1 ad * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 1.1 ad * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 1.1 ad * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 1.1 ad * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 1.1 ad * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 1.1 ad * POSSIBILITY OF SUCH DAMAGE.
27 1.1 ad */
28 1.1 ad
29 1.1 ad /*
30 1.2 ad * Kernel module support.
31 1.1 ad */
32 1.1 ad
33 1.13 ad #include "opt_modular.h"
34 1.13 ad
35 1.1 ad #include <sys/cdefs.h>
36 1.20 ad __KERNEL_RCSID(0, "$NetBSD: kern_module.c,v 1.20 2008/05/20 19:20:38 ad Exp $");
37 1.1 ad
38 1.1 ad #include <sys/param.h>
39 1.1 ad #include <sys/systm.h>
40 1.1 ad #include <sys/fcntl.h>
41 1.1 ad #include <sys/proc.h>
42 1.1 ad #include <sys/kauth.h>
43 1.1 ad #include <sys/kobj.h>
44 1.1 ad #include <sys/kmem.h>
45 1.1 ad #include <sys/module.h>
46 1.18 ad #include <sys/kauth.h>
47 1.1 ad
48 1.1 ad #include <uvm/uvm_extern.h>
49 1.1 ad
50 1.1 ad #include <machine/stdarg.h>
51 1.1 ad
52 1.2 ad #ifndef LKM /* XXX */
53 1.2 ad struct vm_map *lkm_map;
54 1.2 ad #endif
55 1.2 ad
56 1.1 ad struct modlist module_list = TAILQ_HEAD_INITIALIZER(module_list);
57 1.1 ad struct modlist module_bootlist = TAILQ_HEAD_INITIALIZER(module_bootlist);
58 1.12 ad static module_t *module_active;
59 1.16 ad static char module_base[64];
60 1.1 ad u_int module_count;
61 1.1 ad kmutex_t module_lock;
62 1.1 ad
63 1.1 ad /* Ensure that the kernel's link set isn't empty. */
64 1.1 ad static modinfo_t module_dummy;
65 1.1 ad __link_set_add_rodata(modules, module_dummy);
66 1.1 ad
67 1.1 ad static module_t *module_lookup(const char *);
68 1.9 jmmv static int module_do_load(const char *, bool, int, prop_dictionary_t,
69 1.20 ad module_t **, modclass_t class, bool);
70 1.1 ad static int module_do_unload(const char *);
71 1.1 ad static void module_error(const char *, ...);
72 1.1 ad static int module_do_builtin(const char *, module_t **);
73 1.11 ad static int module_fetch_info(module_t *);
74 1.1 ad
75 1.1 ad /*
76 1.1 ad * module_error:
77 1.1 ad *
78 1.1 ad * Utility function: log an error.
79 1.1 ad */
80 1.1 ad static void
81 1.1 ad module_error(const char *fmt, ...)
82 1.1 ad {
83 1.1 ad va_list ap;
84 1.1 ad
85 1.1 ad va_start(ap, fmt);
86 1.1 ad printf("WARNING: module error: ");
87 1.1 ad vprintf(fmt, ap);
88 1.1 ad printf("\n");
89 1.1 ad va_end(ap);
90 1.1 ad }
91 1.1 ad
92 1.1 ad /*
93 1.1 ad * module_init:
94 1.1 ad *
95 1.1 ad * Initialize the module subsystem.
96 1.1 ad */
97 1.1 ad void
98 1.1 ad module_init(void)
99 1.1 ad {
100 1.1 ad extern struct vm_map *lkm_map;
101 1.1 ad
102 1.1 ad if (lkm_map == NULL)
103 1.1 ad lkm_map = kernel_map;
104 1.1 ad mutex_init(&module_lock, MUTEX_DEFAULT, IPL_NONE);
105 1.13 ad #ifdef MODULAR /* XXX */
106 1.11 ad module_init_md();
107 1.12 ad #endif
108 1.16 ad
109 1.16 ad #if __NetBSD_Version__ / 1000000 % 100 == 99 /* -current */
110 1.17 ad snprintf(module_base, sizeof(module_base), "/stand/%s/%s/modules",
111 1.17 ad machine, osrelease);
112 1.16 ad #else /* release */
113 1.17 ad snprintf(module_base, sizeof(module_base), "/stand/%s/%d.%d/modules",
114 1.17 ad machine, __NetBSD_Version__ / 100000000,
115 1.16 ad __NetBSD_Version__ / 1000000 % 100);
116 1.16 ad #endif
117 1.1 ad }
118 1.1 ad
119 1.1 ad /*
120 1.1 ad * module_init_class:
121 1.1 ad *
122 1.1 ad * Initialize all built-in and pre-loaded modules of the
123 1.1 ad * specified class.
124 1.1 ad */
125 1.1 ad void
126 1.1 ad module_init_class(modclass_t class)
127 1.1 ad {
128 1.1 ad __link_set_decl(modules, modinfo_t);
129 1.1 ad modinfo_t *const *mip, *mi;
130 1.1 ad module_t *mod;
131 1.1 ad
132 1.1 ad mutex_enter(&module_lock);
133 1.1 ad /*
134 1.1 ad * Builtins first. These can't depend on pre-loaded modules.
135 1.1 ad */
136 1.1 ad __link_set_foreach(mip, modules) {
137 1.1 ad mi = *mip;
138 1.1 ad if (mi == &module_dummy) {
139 1.1 ad continue;
140 1.1 ad }
141 1.1 ad if (class != MODULE_CLASS_ANY && class != mi->mi_class) {
142 1.1 ad continue;
143 1.1 ad }
144 1.1 ad (void)module_do_builtin(mi->mi_name, NULL);
145 1.1 ad }
146 1.1 ad /*
147 1.1 ad * Now preloaded modules. These will be pulled off the
148 1.1 ad * list as we call module_do_load();
149 1.1 ad */
150 1.11 ad do {
151 1.11 ad TAILQ_FOREACH(mod, &module_bootlist, mod_chain) {
152 1.11 ad mi = mod->mod_info;
153 1.11 ad if (class != MODULE_CLASS_ANY &&
154 1.11 ad class != mi->mi_class)
155 1.11 ad continue;
156 1.18 ad module_do_load(mi->mi_name, false, 0, NULL, NULL,
157 1.20 ad class, true);
158 1.11 ad break;
159 1.11 ad }
160 1.11 ad } while (mod != NULL);
161 1.1 ad mutex_exit(&module_lock);
162 1.1 ad }
163 1.1 ad
164 1.1 ad /*
165 1.1 ad * module_jettison:
166 1.1 ad *
167 1.1 ad * Return memory used by pre-loaded modules to the freelist.
168 1.1 ad */
169 1.1 ad void
170 1.1 ad module_jettison(void)
171 1.1 ad {
172 1.1 ad
173 1.1 ad /* XXX nothing yet */
174 1.1 ad }
175 1.1 ad
176 1.1 ad /*
177 1.1 ad * module_load:
178 1.1 ad *
179 1.9 jmmv * Load a single module from the file system.
180 1.1 ad */
181 1.1 ad int
182 1.18 ad module_load(const char *filename, int flags, prop_dictionary_t props,
183 1.20 ad modclass_t class, bool autoload)
184 1.1 ad {
185 1.1 ad int error;
186 1.1 ad
187 1.18 ad /* Authorize. */
188 1.18 ad error = kauth_authorize_system(kauth_cred_get(), KAUTH_SYSTEM_MODULE,
189 1.18 ad 0, (void *)(uintptr_t)MODCTL_LOAD, NULL, NULL);
190 1.18 ad if (error != 0) {
191 1.18 ad return error;
192 1.18 ad }
193 1.18 ad
194 1.1 ad mutex_enter(&module_lock);
195 1.20 ad error = module_do_load(filename, false, flags, props, NULL, class,
196 1.20 ad autoload);
197 1.1 ad mutex_exit(&module_lock);
198 1.1 ad
199 1.1 ad return error;
200 1.1 ad }
201 1.1 ad
202 1.1 ad /*
203 1.1 ad * module_unload:
204 1.1 ad *
205 1.1 ad * Find and unload a module by name.
206 1.1 ad */
207 1.1 ad int
208 1.1 ad module_unload(const char *name)
209 1.1 ad {
210 1.1 ad int error;
211 1.1 ad
212 1.18 ad /* Authorize. */
213 1.18 ad error = kauth_authorize_system(kauth_cred_get(), KAUTH_SYSTEM_MODULE,
214 1.18 ad 0, (void *)(uintptr_t)MODCTL_UNLOAD, NULL, NULL);
215 1.18 ad if (error != 0) {
216 1.18 ad return error;
217 1.18 ad }
218 1.18 ad
219 1.1 ad mutex_enter(&module_lock);
220 1.1 ad error = module_do_unload(name);
221 1.1 ad mutex_exit(&module_lock);
222 1.1 ad
223 1.1 ad return error;
224 1.1 ad }
225 1.1 ad
226 1.1 ad /*
227 1.1 ad * module_lookup:
228 1.1 ad *
229 1.1 ad * Look up a module by name.
230 1.1 ad */
231 1.1 ad module_t *
232 1.1 ad module_lookup(const char *name)
233 1.1 ad {
234 1.1 ad module_t *mod;
235 1.1 ad
236 1.1 ad KASSERT(mutex_owned(&module_lock));
237 1.1 ad
238 1.1 ad TAILQ_FOREACH(mod, &module_list, mod_chain) {
239 1.1 ad if (strcmp(mod->mod_info->mi_name, name) == 0) {
240 1.1 ad break;
241 1.1 ad }
242 1.1 ad }
243 1.1 ad
244 1.1 ad return mod;
245 1.1 ad }
246 1.1 ad
247 1.1 ad /*
248 1.1 ad * module_hold:
249 1.1 ad *
250 1.1 ad * Add a single reference to a module. It's the caller's
251 1.1 ad * responsibility to ensure that the reference is dropped
252 1.1 ad * later.
253 1.1 ad */
254 1.1 ad int
255 1.1 ad module_hold(const char *name)
256 1.1 ad {
257 1.1 ad module_t *mod;
258 1.1 ad
259 1.1 ad mutex_enter(&module_lock);
260 1.1 ad mod = module_lookup(name);
261 1.1 ad if (mod == NULL) {
262 1.1 ad mutex_exit(&module_lock);
263 1.1 ad return ENOENT;
264 1.1 ad }
265 1.1 ad mod->mod_refcnt++;
266 1.1 ad mutex_exit(&module_lock);
267 1.1 ad
268 1.1 ad return 0;
269 1.1 ad }
270 1.1 ad
271 1.1 ad /*
272 1.1 ad * module_rele:
273 1.1 ad *
274 1.1 ad * Release a reference acquired with module_hold().
275 1.1 ad */
276 1.1 ad void
277 1.1 ad module_rele(const char *name)
278 1.1 ad {
279 1.1 ad module_t *mod;
280 1.1 ad
281 1.1 ad mutex_enter(&module_lock);
282 1.1 ad mod = module_lookup(name);
283 1.1 ad if (mod == NULL) {
284 1.1 ad mutex_exit(&module_lock);
285 1.1 ad panic("module_rele: gone");
286 1.1 ad }
287 1.1 ad mod->mod_refcnt--;
288 1.1 ad mutex_exit(&module_lock);
289 1.1 ad }
290 1.1 ad
291 1.1 ad /*
292 1.1 ad * module_do_builtin:
293 1.1 ad *
294 1.1 ad * Initialize a single module from the list of modules that are
295 1.1 ad * built into the kernel (linked into the kernel image).
296 1.1 ad */
297 1.1 ad static int
298 1.1 ad module_do_builtin(const char *name, module_t **modp)
299 1.1 ad {
300 1.1 ad __link_set_decl(modules, modinfo_t);
301 1.1 ad modinfo_t *const *mip;
302 1.1 ad const char *p, *s;
303 1.1 ad char buf[MAXMODNAME];
304 1.1 ad modinfo_t *mi;
305 1.1 ad module_t *mod, *mod2;
306 1.1 ad size_t len;
307 1.1 ad int error, i;
308 1.1 ad
309 1.1 ad KASSERT(mutex_owned(&module_lock));
310 1.1 ad
311 1.1 ad /*
312 1.1 ad * Check to see if already loaded.
313 1.1 ad */
314 1.1 ad if ((mod = module_lookup(name)) != NULL) {
315 1.1 ad if (modp != NULL) {
316 1.1 ad *modp = mod;
317 1.1 ad }
318 1.1 ad return 0;
319 1.1 ad }
320 1.1 ad
321 1.1 ad /*
322 1.1 ad * Search the list to see if we have a module by this name.
323 1.1 ad */
324 1.1 ad error = ENOENT;
325 1.1 ad __link_set_foreach(mip, modules) {
326 1.1 ad mi = *mip;
327 1.1 ad if (mi == &module_dummy) {
328 1.1 ad continue;
329 1.1 ad }
330 1.1 ad if (strcmp(mi->mi_name, name) == 0) {
331 1.1 ad error = 0;
332 1.1 ad break;
333 1.1 ad }
334 1.1 ad }
335 1.1 ad if (error != 0) {
336 1.1 ad return error;
337 1.1 ad }
338 1.1 ad
339 1.1 ad /*
340 1.1 ad * Initialize pre-requisites.
341 1.1 ad */
342 1.1 ad mod = kmem_zalloc(sizeof(*mod), KM_SLEEP);
343 1.1 ad if (mod == NULL) {
344 1.1 ad return ENOMEM;
345 1.1 ad }
346 1.1 ad if (modp != NULL) {
347 1.1 ad *modp = mod;
348 1.1 ad }
349 1.1 ad if (mi->mi_required != NULL) {
350 1.1 ad for (s = mi->mi_required; *s != '\0'; s = p) {
351 1.1 ad if (*s == ',')
352 1.1 ad s++;
353 1.1 ad p = s;
354 1.1 ad while (*p != '\0' && *p != ',')
355 1.1 ad p++;
356 1.1 ad len = min(p - s + 1, sizeof(buf));
357 1.1 ad strlcpy(buf, s, len);
358 1.1 ad if (buf[0] == '\0')
359 1.1 ad break;
360 1.1 ad if (mod->mod_nrequired == MAXMODDEPS - 1) {
361 1.1 ad module_error("too many required modules");
362 1.1 ad kmem_free(mod, sizeof(*mod));
363 1.1 ad return EINVAL;
364 1.1 ad }
365 1.1 ad error = module_do_builtin(buf, &mod2);
366 1.1 ad if (error != 0) {
367 1.1 ad kmem_free(mod, sizeof(*mod));
368 1.1 ad return error;
369 1.1 ad }
370 1.1 ad mod->mod_required[mod->mod_nrequired++] = mod2;
371 1.1 ad }
372 1.1 ad }
373 1.1 ad
374 1.1 ad /*
375 1.1 ad * Try to initialize the module.
376 1.1 ad */
377 1.12 ad KASSERT(module_active == NULL);
378 1.12 ad module_active = mod;
379 1.1 ad error = (*mi->mi_modcmd)(MODULE_CMD_INIT, NULL);
380 1.12 ad module_active = NULL;
381 1.1 ad if (error != 0) {
382 1.1 ad module_error("builtin module `%s' "
383 1.1 ad "failed to init", mi->mi_name);
384 1.1 ad kmem_free(mod, sizeof(*mod));
385 1.1 ad return error;
386 1.1 ad }
387 1.1 ad mod->mod_info = mi;
388 1.1 ad mod->mod_source = MODULE_SOURCE_KERNEL;
389 1.1 ad module_count++;
390 1.1 ad TAILQ_INSERT_TAIL(&module_list, mod, mod_chain);
391 1.1 ad
392 1.1 ad /*
393 1.1 ad * If that worked, count dependencies.
394 1.1 ad */
395 1.1 ad for (i = 0; i < mod->mod_nrequired; i++) {
396 1.1 ad mod->mod_required[i]->mod_refcnt++;
397 1.1 ad }
398 1.1 ad
399 1.1 ad return 0;
400 1.1 ad }
401 1.1 ad
402 1.1 ad /*
403 1.1 ad * module_do_load:
404 1.1 ad *
405 1.1 ad * Helper routine: load a module from the file system, or one
406 1.1 ad * pushed by the boot loader.
407 1.1 ad */
408 1.1 ad static int
409 1.9 jmmv module_do_load(const char *filename, bool isdep, int flags,
410 1.20 ad prop_dictionary_t props, module_t **modp, modclass_t class,
411 1.20 ad bool autoload)
412 1.1 ad {
413 1.1 ad static TAILQ_HEAD(,module) pending = TAILQ_HEAD_INITIALIZER(pending);
414 1.1 ad static int depth;
415 1.1 ad const int maxdepth = 6;
416 1.1 ad modinfo_t *mi;
417 1.1 ad module_t *mod, *mod2;
418 1.1 ad char buf[MAXMODNAME];
419 1.1 ad const char *s, *p;
420 1.1 ad int error;
421 1.1 ad size_t len;
422 1.1 ad u_int i;
423 1.1 ad
424 1.1 ad KASSERT(mutex_owned(&module_lock));
425 1.1 ad
426 1.1 ad error = 0;
427 1.1 ad
428 1.1 ad /*
429 1.1 ad * Avoid recursing too far.
430 1.1 ad */
431 1.1 ad if (++depth > maxdepth) {
432 1.1 ad module_error("too many required modules");
433 1.1 ad depth--;
434 1.1 ad return EMLINK;
435 1.1 ad }
436 1.1 ad
437 1.1 ad /*
438 1.1 ad * Load the module and link. Before going to the file system,
439 1.1 ad * scan the list of modules loaded by the boot loader. Just
440 1.1 ad * before init is started the list of modules loaded at boot
441 1.1 ad * will be purged. Before init is started we can assume that
442 1.1 ad * `filename' is a module name and not a path name.
443 1.1 ad */
444 1.1 ad TAILQ_FOREACH(mod, &module_bootlist, mod_chain) {
445 1.1 ad if (strcmp(mod->mod_info->mi_name, filename) == 0) {
446 1.1 ad TAILQ_REMOVE(&module_bootlist, mod, mod_chain);
447 1.1 ad break;
448 1.1 ad }
449 1.1 ad }
450 1.14 rumble if (mod != NULL) {
451 1.14 rumble TAILQ_INSERT_TAIL(&pending, mod, mod_chain);
452 1.14 rumble } else {
453 1.1 ad mod = kmem_zalloc(sizeof(*mod), KM_SLEEP);
454 1.1 ad if (mod == NULL) {
455 1.1 ad depth--;
456 1.1 ad return ENOMEM;
457 1.1 ad }
458 1.20 ad error = kobj_load_file(&mod->mod_kobj, filename, module_base,
459 1.20 ad autoload);
460 1.1 ad if (error != 0) {
461 1.1 ad kmem_free(mod, sizeof(*mod));
462 1.1 ad depth--;
463 1.6 rumble module_error("unable to load kernel object");
464 1.8 rumble return error;
465 1.7 rumble }
466 1.14 rumble TAILQ_INSERT_TAIL(&pending, mod, mod_chain);
467 1.1 ad mod->mod_source = MODULE_SOURCE_FILESYS;
468 1.11 ad error = module_fetch_info(mod);
469 1.11 ad if (error != 0) {
470 1.11 ad goto fail;
471 1.11 ad }
472 1.1 ad }
473 1.1 ad
474 1.1 ad /*
475 1.11 ad * Check compatibility.
476 1.1 ad */
477 1.1 ad mi = mod->mod_info;
478 1.3 rumble if (strlen(mi->mi_name) >= MAXMODNAME) {
479 1.3 rumble error = EINVAL;
480 1.3 rumble module_error("module name too long");
481 1.3 rumble goto fail;
482 1.3 rumble }
483 1.3 rumble
484 1.1 ad /*
485 1.18 ad * If a specific kind of module was requested, ensure that we have
486 1.18 ad * a match.
487 1.18 ad */
488 1.18 ad if (class != MODULE_CLASS_ANY && class != mi->mi_class) {
489 1.18 ad error = ENOENT;
490 1.18 ad goto fail;
491 1.18 ad }
492 1.18 ad
493 1.18 ad /*
494 1.1 ad * If loading a dependency, `filename' is a plain module name.
495 1.1 ad * The name must match.
496 1.1 ad */
497 1.1 ad if (isdep && strcmp(mi->mi_name, filename) != 0) {
498 1.1 ad error = ENOENT;
499 1.1 ad goto fail;
500 1.1 ad }
501 1.1 ad
502 1.1 ad /*
503 1.3 rumble * Check to see if the module is already loaded. If so, we may
504 1.3 rumble * have been recursively called to handle a dependency, so be sure
505 1.3 rumble * to set modp.
506 1.1 ad */
507 1.3 rumble if ((mod2 = module_lookup(mi->mi_name)) != NULL) {
508 1.5 rumble if (modp != NULL)
509 1.5 rumble *modp = mod2;
510 1.1 ad error = EEXIST;
511 1.1 ad goto fail;
512 1.1 ad }
513 1.3 rumble
514 1.3 rumble /*
515 1.3 rumble * Block circular dependencies.
516 1.3 rumble */
517 1.1 ad TAILQ_FOREACH(mod2, &pending, mod_chain) {
518 1.1 ad if (mod == mod2) {
519 1.1 ad continue;
520 1.1 ad }
521 1.1 ad if (strcmp(mod2->mod_info->mi_name, mi->mi_name) == 0) {
522 1.1 ad error = EDEADLK;
523 1.1 ad module_error("circular dependency detected");
524 1.1 ad goto fail;
525 1.1 ad }
526 1.1 ad }
527 1.1 ad
528 1.1 ad /*
529 1.1 ad * Now try to load any requisite modules.
530 1.1 ad */
531 1.1 ad if (mi->mi_required != NULL) {
532 1.1 ad for (s = mi->mi_required; *s != '\0'; s = p) {
533 1.1 ad if (*s == ',')
534 1.1 ad s++;
535 1.1 ad p = s;
536 1.1 ad while (*p != '\0' && *p != ',')
537 1.1 ad p++;
538 1.3 rumble len = p - s + 1;
539 1.3 rumble if (len >= MAXMODNAME) {
540 1.3 rumble error = EINVAL;
541 1.3 rumble module_error("required module name too long");
542 1.3 rumble goto fail;
543 1.3 rumble }
544 1.1 ad strlcpy(buf, s, len);
545 1.1 ad if (buf[0] == '\0')
546 1.1 ad break;
547 1.1 ad if (mod->mod_nrequired == MAXMODDEPS - 1) {
548 1.1 ad error = EINVAL;
549 1.1 ad module_error("too many required modules");
550 1.1 ad goto fail;
551 1.1 ad }
552 1.6 rumble if (strcmp(buf, mi->mi_name) == 0) {
553 1.6 rumble error = EDEADLK;
554 1.6 rumble module_error("self-dependency detected");
555 1.6 rumble goto fail;
556 1.6 rumble }
557 1.9 jmmv error = module_do_load(buf, true, flags, NULL,
558 1.18 ad &mod->mod_required[mod->mod_nrequired++],
559 1.20 ad MODULE_CLASS_ANY, true);
560 1.1 ad if (error != 0 && error != EEXIST)
561 1.1 ad goto fail;
562 1.1 ad }
563 1.1 ad }
564 1.1 ad
565 1.1 ad /*
566 1.15 ad * We loaded all needed modules successfully: perform global
567 1.15 ad * relocations and initialize.
568 1.1 ad */
569 1.15 ad error = kobj_affix(mod->mod_kobj, mi->mi_name);
570 1.15 ad if (error != 0) {
571 1.15 ad module_error("unable to affix module");
572 1.15 ad goto fail2;
573 1.15 ad }
574 1.15 ad
575 1.12 ad KASSERT(module_active == NULL);
576 1.12 ad module_active = mod;
577 1.9 jmmv error = (*mi->mi_modcmd)(MODULE_CMD_INIT, props);
578 1.12 ad module_active = NULL;
579 1.1 ad if (error != 0) {
580 1.1 ad module_error("modctl function returned error %d", error);
581 1.1 ad goto fail;
582 1.1 ad }
583 1.1 ad
584 1.1 ad /*
585 1.1 ad * Good, the module loaded successfully. Put it onto the
586 1.1 ad * list and add references to its requisite modules.
587 1.1 ad */
588 1.1 ad module_count++;
589 1.1 ad TAILQ_REMOVE(&pending, mod, mod_chain);
590 1.1 ad TAILQ_INSERT_TAIL(&module_list, mod, mod_chain);
591 1.1 ad for (i = 0; i < mod->mod_nrequired; i++) {
592 1.4 simonb KASSERT(mod->mod_required[i] != NULL);
593 1.1 ad mod->mod_required[i]->mod_refcnt++;
594 1.1 ad }
595 1.1 ad if (modp != NULL) {
596 1.1 ad *modp = mod;
597 1.1 ad }
598 1.1 ad depth--;
599 1.1 ad return 0;
600 1.7 rumble
601 1.1 ad fail:
602 1.15 ad kobj_unload(mod->mod_kobj);
603 1.15 ad fail2:
604 1.1 ad TAILQ_REMOVE(&pending, mod, mod_chain);
605 1.1 ad kmem_free(mod, sizeof(*mod));
606 1.1 ad depth--;
607 1.1 ad return error;
608 1.1 ad }
609 1.1 ad
610 1.1 ad /*
611 1.1 ad * module_do_unload:
612 1.1 ad *
613 1.1 ad * Helper routine: do the dirty work of unloading a module.
614 1.1 ad */
615 1.1 ad static int
616 1.1 ad module_do_unload(const char *name)
617 1.1 ad {
618 1.1 ad module_t *mod;
619 1.1 ad int error;
620 1.1 ad u_int i;
621 1.1 ad
622 1.1 ad KASSERT(mutex_owned(&module_lock));
623 1.1 ad
624 1.1 ad mod = module_lookup(name);
625 1.1 ad if (mod == NULL) {
626 1.1 ad return ENOENT;
627 1.1 ad }
628 1.1 ad if (mod->mod_refcnt != 0 || mod->mod_source == MODULE_SOURCE_KERNEL) {
629 1.1 ad return EBUSY;
630 1.1 ad }
631 1.12 ad KASSERT(module_active == NULL);
632 1.12 ad module_active = mod;
633 1.1 ad error = (*mod->mod_info->mi_modcmd)(MODULE_CMD_FINI, NULL);
634 1.12 ad module_active = NULL;
635 1.1 ad if (error != 0) {
636 1.1 ad return error;
637 1.1 ad }
638 1.1 ad module_count--;
639 1.1 ad TAILQ_REMOVE(&module_list, mod, mod_chain);
640 1.1 ad for (i = 0; i < mod->mod_nrequired; i++) {
641 1.1 ad mod->mod_required[i]->mod_refcnt--;
642 1.1 ad }
643 1.1 ad if (mod->mod_kobj != NULL) {
644 1.1 ad kobj_unload(mod->mod_kobj);
645 1.1 ad }
646 1.1 ad kmem_free(mod, sizeof(*mod));
647 1.1 ad
648 1.1 ad return 0;
649 1.1 ad }
650 1.1 ad
651 1.1 ad /*
652 1.1 ad * module_prime:
653 1.1 ad *
654 1.1 ad * Push a module loaded by the bootloader onto our internal
655 1.1 ad * list.
656 1.1 ad */
657 1.1 ad int
658 1.1 ad module_prime(void *base, size_t size)
659 1.1 ad {
660 1.1 ad module_t *mod;
661 1.1 ad int error;
662 1.1 ad
663 1.1 ad mod = kmem_zalloc(sizeof(*mod), KM_SLEEP);
664 1.1 ad if (mod == NULL) {
665 1.1 ad return ENOMEM;
666 1.1 ad }
667 1.1 ad mod->mod_source = MODULE_SOURCE_BOOT;
668 1.1 ad
669 1.15 ad error = kobj_load_mem(&mod->mod_kobj, base, size);
670 1.1 ad if (error != 0) {
671 1.11 ad kmem_free(mod, sizeof(*mod));
672 1.11 ad module_error("unable to load object pushed by boot loader");
673 1.11 ad return error;
674 1.11 ad }
675 1.11 ad error = module_fetch_info(mod);
676 1.11 ad if (error != 0) {
677 1.11 ad kobj_unload(mod->mod_kobj);
678 1.1 ad kmem_free(mod, sizeof(*mod));
679 1.11 ad module_error("unable to load object pushed by boot loader");
680 1.1 ad return error;
681 1.1 ad }
682 1.11 ad
683 1.1 ad TAILQ_INSERT_TAIL(&module_bootlist, mod, mod_chain);
684 1.1 ad
685 1.1 ad return 0;
686 1.1 ad }
687 1.11 ad
688 1.11 ad /*
689 1.11 ad * module_fetch_into:
690 1.11 ad *
691 1.11 ad * Fetch modinfo record from a loaded module.
692 1.11 ad */
693 1.11 ad static int
694 1.11 ad module_fetch_info(module_t *mod)
695 1.11 ad {
696 1.11 ad int error;
697 1.11 ad void *addr;
698 1.11 ad size_t size;
699 1.11 ad
700 1.11 ad /*
701 1.11 ad * Find module info record and check compatibility.
702 1.11 ad */
703 1.11 ad error = kobj_find_section(mod->mod_kobj, "link_set_modules",
704 1.11 ad &addr, &size);
705 1.11 ad if (error != 0) {
706 1.11 ad module_error("`link_set_modules' section not present");
707 1.11 ad return error;
708 1.11 ad }
709 1.11 ad if (size != sizeof(modinfo_t **)) {
710 1.11 ad module_error("`link_set_modules' section wrong size");
711 1.11 ad return error;
712 1.11 ad }
713 1.11 ad mod->mod_info = *(modinfo_t **)addr;
714 1.11 ad
715 1.11 ad return 0;
716 1.11 ad }
717 1.12 ad
718 1.12 ad /*
719 1.12 ad * module_find_section:
720 1.12 ad *
721 1.12 ad * Allows a module that is being initialized to look up a section
722 1.12 ad * within its ELF object.
723 1.12 ad */
724 1.12 ad int
725 1.12 ad module_find_section(const char *name, void **addr, size_t *size)
726 1.12 ad {
727 1.12 ad
728 1.12 ad KASSERT(mutex_owned(&module_lock));
729 1.12 ad KASSERT(module_active != NULL);
730 1.12 ad
731 1.12 ad return kobj_find_section(module_active->mod_kobj, name, addr, size);
732 1.12 ad }
733