Home | History | Annotate | Line # | Download | only in kern
kern_module.c revision 1.23
      1  1.23      ad /*	$NetBSD: kern_module.c,v 1.23 2008/10/22 11:16:29 ad Exp $	*/
      2   1.1      ad 
      3   1.1      ad /*-
      4   1.1      ad  * Copyright (c) 2008 The NetBSD Foundation, Inc.
      5   1.1      ad  * All rights reserved.
      6   1.1      ad  *
      7   1.1      ad  * Redistribution and use in source and binary forms, with or without
      8   1.1      ad  * modification, are permitted provided that the following conditions
      9   1.1      ad  * are met:
     10   1.1      ad  * 1. Redistributions of source code must retain the above copyright
     11   1.1      ad  *    notice, this list of conditions and the following disclaimer.
     12   1.1      ad  * 2. Redistributions in binary form must reproduce the above copyright
     13   1.1      ad  *    notice, this list of conditions and the following disclaimer in the
     14   1.1      ad  *    documentation and/or other materials provided with the distribution.
     15   1.1      ad  *
     16   1.1      ad  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17   1.1      ad  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18   1.1      ad  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19   1.1      ad  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20   1.1      ad  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21   1.1      ad  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22   1.1      ad  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23   1.1      ad  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24   1.1      ad  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25   1.1      ad  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26   1.1      ad  * POSSIBILITY OF SUCH DAMAGE.
     27   1.1      ad  */
     28   1.1      ad 
     29   1.1      ad /*
     30   1.2      ad  * Kernel module support.
     31   1.1      ad  */
     32   1.1      ad 
     33  1.13      ad #include "opt_modular.h"
     34  1.13      ad 
     35   1.1      ad #include <sys/cdefs.h>
     36  1.23      ad __KERNEL_RCSID(0, "$NetBSD: kern_module.c,v 1.23 2008/10/22 11:16:29 ad Exp $");
     37   1.1      ad 
     38   1.1      ad #include <sys/param.h>
     39   1.1      ad #include <sys/systm.h>
     40   1.1      ad #include <sys/fcntl.h>
     41   1.1      ad #include <sys/proc.h>
     42   1.1      ad #include <sys/kauth.h>
     43   1.1      ad #include <sys/kobj.h>
     44   1.1      ad #include <sys/kmem.h>
     45   1.1      ad #include <sys/module.h>
     46  1.18      ad #include <sys/kauth.h>
     47   1.1      ad 
     48   1.1      ad #include <uvm/uvm_extern.h>
     49   1.1      ad 
     50   1.1      ad #include <machine/stdarg.h>
     51   1.1      ad 
     52   1.2      ad #ifndef LKM	/* XXX */
     53   1.2      ad struct vm_map *lkm_map;
     54   1.2      ad #endif
     55   1.2      ad 
     56   1.1      ad struct modlist	module_list = TAILQ_HEAD_INITIALIZER(module_list);
     57   1.1      ad struct modlist	module_bootlist = TAILQ_HEAD_INITIALIZER(module_bootlist);
     58  1.12      ad static module_t	*module_active;
     59  1.16      ad static char	module_base[64];
     60   1.1      ad u_int		module_count;
     61   1.1      ad kmutex_t	module_lock;
     62   1.1      ad 
     63   1.1      ad /* Ensure that the kernel's link set isn't empty. */
     64   1.1      ad static modinfo_t module_dummy;
     65   1.1      ad __link_set_add_rodata(modules, module_dummy);
     66   1.1      ad 
     67   1.1      ad static module_t	*module_lookup(const char *);
     68   1.9    jmmv static int	module_do_load(const char *, bool, int, prop_dictionary_t,
     69  1.20      ad 		    module_t **, modclass_t class, bool);
     70   1.1      ad static int	module_do_unload(const char *);
     71   1.1      ad static void	module_error(const char *, ...);
     72   1.1      ad static int	module_do_builtin(const char *, module_t **);
     73  1.11      ad static int	module_fetch_info(module_t *);
     74   1.1      ad 
     75   1.1      ad /*
     76   1.1      ad  * module_error:
     77   1.1      ad  *
     78   1.1      ad  *	Utility function: log an error.
     79   1.1      ad  */
     80   1.1      ad static void
     81   1.1      ad module_error(const char *fmt, ...)
     82   1.1      ad {
     83   1.1      ad 	va_list ap;
     84   1.1      ad 
     85   1.1      ad 	va_start(ap, fmt);
     86   1.1      ad 	printf("WARNING: module error: ");
     87   1.1      ad 	vprintf(fmt, ap);
     88   1.1      ad 	printf("\n");
     89   1.1      ad 	va_end(ap);
     90   1.1      ad }
     91   1.1      ad 
     92   1.1      ad /*
     93   1.1      ad  * module_init:
     94   1.1      ad  *
     95   1.1      ad  *	Initialize the module subsystem.
     96   1.1      ad  */
     97   1.1      ad void
     98   1.1      ad module_init(void)
     99   1.1      ad {
    100   1.1      ad 	extern struct vm_map *lkm_map;
    101   1.1      ad 
    102   1.1      ad 	if (lkm_map == NULL)
    103   1.1      ad 		lkm_map = kernel_map;
    104   1.1      ad 	mutex_init(&module_lock, MUTEX_DEFAULT, IPL_NONE);
    105  1.13      ad #ifdef MODULAR	/* XXX */
    106  1.11      ad 	module_init_md();
    107  1.12      ad #endif
    108  1.16      ad 
    109  1.16      ad #if __NetBSD_Version__ / 1000000 % 100 == 99	/* -current */
    110  1.17      ad 	snprintf(module_base, sizeof(module_base), "/stand/%s/%s/modules",
    111  1.17      ad 	    machine, osrelease);
    112  1.16      ad #else						/* release */
    113  1.17      ad 	snprintf(module_base, sizeof(module_base), "/stand/%s/%d.%d/modules",
    114  1.17      ad 	    machine, __NetBSD_Version__ / 100000000,
    115  1.16      ad 	    __NetBSD_Version__ / 1000000 % 100);
    116  1.16      ad #endif
    117   1.1      ad }
    118   1.1      ad 
    119   1.1      ad /*
    120   1.1      ad  * module_init_class:
    121   1.1      ad  *
    122   1.1      ad  *	Initialize all built-in and pre-loaded modules of the
    123   1.1      ad  *	specified class.
    124   1.1      ad  */
    125   1.1      ad void
    126   1.1      ad module_init_class(modclass_t class)
    127   1.1      ad {
    128   1.1      ad 	__link_set_decl(modules, modinfo_t);
    129   1.1      ad 	modinfo_t *const *mip, *mi;
    130   1.1      ad 	module_t *mod;
    131   1.1      ad 
    132   1.1      ad 	mutex_enter(&module_lock);
    133   1.1      ad 	/*
    134   1.1      ad 	 * Builtins first.  These can't depend on pre-loaded modules.
    135   1.1      ad 	 */
    136   1.1      ad 	__link_set_foreach(mip, modules) {
    137   1.1      ad 		mi = *mip;
    138   1.1      ad 		if (mi == &module_dummy) {
    139   1.1      ad 			continue;
    140   1.1      ad 		}
    141   1.1      ad 		if (class != MODULE_CLASS_ANY && class != mi->mi_class) {
    142   1.1      ad 			continue;
    143   1.1      ad 		}
    144   1.1      ad 		(void)module_do_builtin(mi->mi_name, NULL);
    145   1.1      ad 	}
    146   1.1      ad 	/*
    147   1.1      ad 	 * Now preloaded modules.  These will be pulled off the
    148   1.1      ad 	 * list as we call module_do_load();
    149   1.1      ad 	 */
    150  1.11      ad 	do {
    151  1.11      ad 		TAILQ_FOREACH(mod, &module_bootlist, mod_chain) {
    152  1.11      ad 			mi = mod->mod_info;
    153  1.11      ad 			if (class != MODULE_CLASS_ANY &&
    154  1.11      ad 			    class != mi->mi_class)
    155  1.11      ad 				continue;
    156  1.18      ad 			module_do_load(mi->mi_name, false, 0, NULL, NULL,
    157  1.20      ad 			    class, true);
    158  1.11      ad 			break;
    159  1.11      ad 		}
    160  1.11      ad 	} while (mod != NULL);
    161   1.1      ad 	mutex_exit(&module_lock);
    162   1.1      ad }
    163   1.1      ad 
    164   1.1      ad /*
    165  1.21      ad  * module_compatible:
    166   1.1      ad  *
    167  1.21      ad  *	Return true if the two supplied kernel versions are said to
    168  1.21      ad  *	have the same binary interface for kernel code.  The entire
    169  1.21      ad  *	version is signficant for the development tree (-current),
    170  1.21      ad  *	major and minor versions are significant for official
    171  1.21      ad  *	releases of the system.
    172   1.1      ad  */
    173  1.22   pooka bool
    174  1.21      ad module_compatible(int v1, int v2)
    175   1.1      ad {
    176   1.1      ad 
    177  1.21      ad #if __NetBSD_Version__ / 1000000 % 100 == 99	/* -current */
    178  1.21      ad 	return v1 == v2;
    179  1.21      ad #else						/* release */
    180  1.21      ad 	return abs(v1 - v2) < 10000;
    181  1.21      ad #endif
    182   1.1      ad }
    183   1.1      ad 
    184   1.1      ad /*
    185   1.1      ad  * module_load:
    186   1.1      ad  *
    187   1.9    jmmv  *	Load a single module from the file system.
    188   1.1      ad  */
    189   1.1      ad int
    190  1.18      ad module_load(const char *filename, int flags, prop_dictionary_t props,
    191  1.23      ad 	    modclass_t class)
    192   1.1      ad {
    193   1.1      ad 	int error;
    194   1.1      ad 
    195  1.18      ad 	/* Authorize. */
    196  1.18      ad 	error = kauth_authorize_system(kauth_cred_get(), KAUTH_SYSTEM_MODULE,
    197  1.18      ad 	    0, (void *)(uintptr_t)MODCTL_LOAD, NULL, NULL);
    198  1.18      ad 	if (error != 0) {
    199  1.18      ad 		return error;
    200  1.18      ad 	}
    201  1.18      ad 
    202   1.1      ad 	mutex_enter(&module_lock);
    203  1.20      ad 	error = module_do_load(filename, false, flags, props, NULL, class,
    204  1.23      ad 	    false);
    205   1.1      ad 	mutex_exit(&module_lock);
    206   1.1      ad 
    207   1.1      ad 	return error;
    208   1.1      ad }
    209   1.1      ad 
    210   1.1      ad /*
    211  1.23      ad  * module_autoload:
    212  1.23      ad  *
    213  1.23      ad  *	Load a single module from the file system, system initiated.
    214  1.23      ad  */
    215  1.23      ad int
    216  1.23      ad module_autoload(const char *filename, modclass_t class)
    217  1.23      ad {
    218  1.23      ad 	int error;
    219  1.23      ad 
    220  1.23      ad 	KASSERT(mutex_owned(&module_lock));
    221  1.23      ad 
    222  1.23      ad 	/* Authorize. */
    223  1.23      ad 	error = kauth_authorize_system(kauth_cred_get(), KAUTH_SYSTEM_MODULE,
    224  1.23      ad 	    0, (void *)(uintptr_t)MODCTL_LOAD, (void *)(uintptr_t)1, NULL);
    225  1.23      ad 	if (error != 0) {
    226  1.23      ad 		return error;
    227  1.23      ad 	}
    228  1.23      ad 
    229  1.23      ad 	return module_do_load(filename, false, 0, NULL, NULL, class, true);
    230  1.23      ad }
    231  1.23      ad 
    232  1.23      ad /*
    233   1.1      ad  * module_unload:
    234   1.1      ad  *
    235   1.1      ad  *	Find and unload a module by name.
    236   1.1      ad  */
    237   1.1      ad int
    238   1.1      ad module_unload(const char *name)
    239   1.1      ad {
    240   1.1      ad 	int error;
    241   1.1      ad 
    242  1.18      ad 	/* Authorize. */
    243  1.18      ad 	error = kauth_authorize_system(kauth_cred_get(), KAUTH_SYSTEM_MODULE,
    244  1.18      ad 	    0, (void *)(uintptr_t)MODCTL_UNLOAD, NULL, NULL);
    245  1.18      ad 	if (error != 0) {
    246  1.18      ad 		return error;
    247  1.18      ad 	}
    248  1.18      ad 
    249   1.1      ad 	mutex_enter(&module_lock);
    250   1.1      ad 	error = module_do_unload(name);
    251   1.1      ad 	mutex_exit(&module_lock);
    252   1.1      ad 
    253   1.1      ad 	return error;
    254   1.1      ad }
    255   1.1      ad 
    256   1.1      ad /*
    257   1.1      ad  * module_lookup:
    258   1.1      ad  *
    259   1.1      ad  *	Look up a module by name.
    260   1.1      ad  */
    261   1.1      ad module_t *
    262   1.1      ad module_lookup(const char *name)
    263   1.1      ad {
    264   1.1      ad 	module_t *mod;
    265   1.1      ad 
    266   1.1      ad 	KASSERT(mutex_owned(&module_lock));
    267   1.1      ad 
    268   1.1      ad 	TAILQ_FOREACH(mod, &module_list, mod_chain) {
    269   1.1      ad 		if (strcmp(mod->mod_info->mi_name, name) == 0) {
    270   1.1      ad 			break;
    271   1.1      ad 		}
    272   1.1      ad 	}
    273   1.1      ad 
    274   1.1      ad 	return mod;
    275   1.1      ad }
    276   1.1      ad 
    277   1.1      ad /*
    278   1.1      ad  * module_hold:
    279   1.1      ad  *
    280   1.1      ad  *	Add a single reference to a module.  It's the caller's
    281   1.1      ad  *	responsibility to ensure that the reference is dropped
    282   1.1      ad  *	later.
    283   1.1      ad  */
    284   1.1      ad int
    285   1.1      ad module_hold(const char *name)
    286   1.1      ad {
    287   1.1      ad 	module_t *mod;
    288   1.1      ad 
    289   1.1      ad 	mutex_enter(&module_lock);
    290   1.1      ad 	mod = module_lookup(name);
    291   1.1      ad 	if (mod == NULL) {
    292   1.1      ad 		mutex_exit(&module_lock);
    293   1.1      ad 		return ENOENT;
    294   1.1      ad 	}
    295   1.1      ad 	mod->mod_refcnt++;
    296   1.1      ad 	mutex_exit(&module_lock);
    297   1.1      ad 
    298   1.1      ad 	return 0;
    299   1.1      ad }
    300   1.1      ad 
    301   1.1      ad /*
    302   1.1      ad  * module_rele:
    303   1.1      ad  *
    304   1.1      ad  *	Release a reference acquired with module_hold().
    305   1.1      ad  */
    306   1.1      ad void
    307   1.1      ad module_rele(const char *name)
    308   1.1      ad {
    309   1.1      ad 	module_t *mod;
    310   1.1      ad 
    311   1.1      ad 	mutex_enter(&module_lock);
    312   1.1      ad 	mod = module_lookup(name);
    313   1.1      ad 	if (mod == NULL) {
    314   1.1      ad 		mutex_exit(&module_lock);
    315   1.1      ad 		panic("module_rele: gone");
    316   1.1      ad 	}
    317   1.1      ad 	mod->mod_refcnt--;
    318   1.1      ad 	mutex_exit(&module_lock);
    319   1.1      ad }
    320   1.1      ad 
    321   1.1      ad /*
    322   1.1      ad  * module_do_builtin:
    323   1.1      ad  *
    324   1.1      ad  *	Initialize a single module from the list of modules that are
    325   1.1      ad  *	built into the kernel (linked into the kernel image).
    326   1.1      ad  */
    327   1.1      ad static int
    328   1.1      ad module_do_builtin(const char *name, module_t **modp)
    329   1.1      ad {
    330   1.1      ad 	__link_set_decl(modules, modinfo_t);
    331   1.1      ad 	modinfo_t *const *mip;
    332   1.1      ad 	const char *p, *s;
    333   1.1      ad 	char buf[MAXMODNAME];
    334   1.1      ad 	modinfo_t *mi;
    335   1.1      ad 	module_t *mod, *mod2;
    336   1.1      ad 	size_t len;
    337   1.1      ad 	int error, i;
    338   1.1      ad 
    339   1.1      ad 	KASSERT(mutex_owned(&module_lock));
    340   1.1      ad 
    341   1.1      ad 	/*
    342   1.1      ad 	 * Check to see if already loaded.
    343   1.1      ad 	 */
    344   1.1      ad 	if ((mod = module_lookup(name)) != NULL) {
    345   1.1      ad 		if (modp != NULL) {
    346   1.1      ad 			*modp = mod;
    347   1.1      ad 		}
    348   1.1      ad 		return 0;
    349   1.1      ad 	}
    350   1.1      ad 
    351   1.1      ad 	/*
    352   1.1      ad 	 * Search the list to see if we have a module by this name.
    353   1.1      ad 	 */
    354   1.1      ad 	error = ENOENT;
    355   1.1      ad 	__link_set_foreach(mip, modules) {
    356   1.1      ad 		mi = *mip;
    357   1.1      ad 		if (mi == &module_dummy) {
    358   1.1      ad 			continue;
    359   1.1      ad 		}
    360   1.1      ad 		if (strcmp(mi->mi_name, name) == 0) {
    361   1.1      ad 			error = 0;
    362   1.1      ad 			break;
    363   1.1      ad 		}
    364   1.1      ad 	}
    365   1.1      ad 	if (error != 0) {
    366   1.1      ad 		return error;
    367   1.1      ad 	}
    368   1.1      ad 
    369   1.1      ad 	/*
    370   1.1      ad 	 * Initialize pre-requisites.
    371   1.1      ad 	 */
    372   1.1      ad 	mod = kmem_zalloc(sizeof(*mod), KM_SLEEP);
    373   1.1      ad 	if (mod == NULL) {
    374   1.1      ad 		return ENOMEM;
    375   1.1      ad 	}
    376   1.1      ad 	if (modp != NULL) {
    377   1.1      ad 		*modp = mod;
    378   1.1      ad 	}
    379   1.1      ad 	if (mi->mi_required != NULL) {
    380   1.1      ad 		for (s = mi->mi_required; *s != '\0'; s = p) {
    381   1.1      ad 			if (*s == ',')
    382   1.1      ad 				s++;
    383   1.1      ad 			p = s;
    384   1.1      ad 			while (*p != '\0' && *p != ',')
    385   1.1      ad 				p++;
    386   1.1      ad 			len = min(p - s + 1, sizeof(buf));
    387   1.1      ad 			strlcpy(buf, s, len);
    388   1.1      ad 			if (buf[0] == '\0')
    389   1.1      ad 				break;
    390   1.1      ad 			if (mod->mod_nrequired == MAXMODDEPS - 1) {
    391   1.1      ad 				module_error("too many required modules");
    392   1.1      ad 				kmem_free(mod, sizeof(*mod));
    393   1.1      ad 				return EINVAL;
    394   1.1      ad 			}
    395   1.1      ad 			error = module_do_builtin(buf, &mod2);
    396   1.1      ad 			if (error != 0) {
    397   1.1      ad 				kmem_free(mod, sizeof(*mod));
    398   1.1      ad 				return error;
    399   1.1      ad 			}
    400   1.1      ad 			mod->mod_required[mod->mod_nrequired++] = mod2;
    401   1.1      ad 		}
    402   1.1      ad 	}
    403   1.1      ad 
    404   1.1      ad 	/*
    405   1.1      ad 	 * Try to initialize the module.
    406   1.1      ad 	 */
    407  1.12      ad 	KASSERT(module_active == NULL);
    408  1.12      ad 	module_active = mod;
    409   1.1      ad 	error = (*mi->mi_modcmd)(MODULE_CMD_INIT, NULL);
    410  1.12      ad 	module_active = NULL;
    411   1.1      ad 	if (error != 0) {
    412   1.1      ad 		module_error("builtin module `%s' "
    413   1.1      ad 		    "failed to init", mi->mi_name);
    414   1.1      ad 		kmem_free(mod, sizeof(*mod));
    415   1.1      ad 		return error;
    416   1.1      ad 	}
    417   1.1      ad 	mod->mod_info = mi;
    418   1.1      ad 	mod->mod_source = MODULE_SOURCE_KERNEL;
    419   1.1      ad 	module_count++;
    420   1.1      ad 	TAILQ_INSERT_TAIL(&module_list, mod, mod_chain);
    421   1.1      ad 
    422   1.1      ad 	/*
    423   1.1      ad 	 * If that worked, count dependencies.
    424   1.1      ad 	 */
    425   1.1      ad 	for (i = 0; i < mod->mod_nrequired; i++) {
    426   1.1      ad 		mod->mod_required[i]->mod_refcnt++;
    427   1.1      ad 	}
    428   1.1      ad 
    429   1.1      ad 	return 0;
    430   1.1      ad }
    431   1.1      ad 
    432   1.1      ad /*
    433   1.1      ad  * module_do_load:
    434   1.1      ad  *
    435   1.1      ad  *	Helper routine: load a module from the file system, or one
    436   1.1      ad  *	pushed by the boot loader.
    437   1.1      ad  */
    438   1.1      ad static int
    439   1.9    jmmv module_do_load(const char *filename, bool isdep, int flags,
    440  1.20      ad 	       prop_dictionary_t props, module_t **modp, modclass_t class,
    441  1.20      ad 	       bool autoload)
    442   1.1      ad {
    443   1.1      ad 	static TAILQ_HEAD(,module) pending = TAILQ_HEAD_INITIALIZER(pending);
    444   1.1      ad 	static int depth;
    445   1.1      ad 	const int maxdepth = 6;
    446   1.1      ad 	modinfo_t *mi;
    447   1.1      ad 	module_t *mod, *mod2;
    448   1.1      ad 	char buf[MAXMODNAME];
    449   1.1      ad 	const char *s, *p;
    450   1.1      ad 	int error;
    451   1.1      ad 	size_t len;
    452   1.1      ad 	u_int i;
    453   1.1      ad 
    454   1.1      ad 	KASSERT(mutex_owned(&module_lock));
    455   1.1      ad 
    456   1.1      ad 	error = 0;
    457   1.1      ad 
    458   1.1      ad 	/*
    459   1.1      ad 	 * Avoid recursing too far.
    460   1.1      ad 	 */
    461   1.1      ad 	if (++depth > maxdepth) {
    462   1.1      ad 		module_error("too many required modules");
    463   1.1      ad 		depth--;
    464   1.1      ad 		return EMLINK;
    465   1.1      ad 	}
    466   1.1      ad 
    467   1.1      ad 	/*
    468   1.1      ad 	 * Load the module and link.  Before going to the file system,
    469   1.1      ad 	 * scan the list of modules loaded by the boot loader.  Just
    470   1.1      ad 	 * before init is started the list of modules loaded at boot
    471   1.1      ad 	 * will be purged.  Before init is started we can assume that
    472   1.1      ad 	 * `filename' is a module name and not a path name.
    473   1.1      ad 	 */
    474   1.1      ad 	TAILQ_FOREACH(mod, &module_bootlist, mod_chain) {
    475   1.1      ad 		if (strcmp(mod->mod_info->mi_name, filename) == 0) {
    476   1.1      ad 			TAILQ_REMOVE(&module_bootlist, mod, mod_chain);
    477   1.1      ad 			break;
    478   1.1      ad 		}
    479   1.1      ad 	}
    480  1.14  rumble 	if (mod != NULL) {
    481  1.14  rumble 		TAILQ_INSERT_TAIL(&pending, mod, mod_chain);
    482  1.14  rumble 	} else {
    483   1.1      ad 		mod = kmem_zalloc(sizeof(*mod), KM_SLEEP);
    484   1.1      ad 		if (mod == NULL) {
    485   1.1      ad 			depth--;
    486   1.1      ad 			return ENOMEM;
    487   1.1      ad 		}
    488  1.20      ad 		error = kobj_load_file(&mod->mod_kobj, filename, module_base,
    489  1.20      ad 		    autoload);
    490   1.1      ad 		if (error != 0) {
    491   1.1      ad 			kmem_free(mod, sizeof(*mod));
    492   1.1      ad 			depth--;
    493   1.6  rumble 			module_error("unable to load kernel object");
    494   1.8  rumble 			return error;
    495   1.7  rumble 		}
    496  1.14  rumble 		TAILQ_INSERT_TAIL(&pending, mod, mod_chain);
    497   1.1      ad 		mod->mod_source = MODULE_SOURCE_FILESYS;
    498  1.11      ad 		error = module_fetch_info(mod);
    499  1.11      ad 		if (error != 0) {
    500  1.11      ad 			goto fail;
    501  1.11      ad 		}
    502   1.1      ad 	}
    503   1.1      ad 
    504   1.1      ad 	/*
    505  1.11      ad 	 * Check compatibility.
    506   1.1      ad 	 */
    507   1.1      ad 	mi = mod->mod_info;
    508   1.3  rumble 	if (strlen(mi->mi_name) >= MAXMODNAME) {
    509   1.3  rumble 		error = EINVAL;
    510   1.3  rumble 		module_error("module name too long");
    511   1.3  rumble 		goto fail;
    512   1.3  rumble 	}
    513  1.21      ad 	if (!module_compatible(mi->mi_version, __NetBSD_Version__)) {
    514  1.21      ad 		error = EPROGMISMATCH;
    515  1.21      ad 		module_error("module built for different version of system");
    516  1.21      ad 		goto fail;
    517  1.21      ad 	}
    518   1.3  rumble 
    519   1.1      ad 	/*
    520  1.18      ad 	 * If a specific kind of module was requested, ensure that we have
    521  1.18      ad 	 * a match.
    522  1.18      ad 	 */
    523  1.18      ad 	if (class != MODULE_CLASS_ANY && class != mi->mi_class) {
    524  1.18      ad 		error = ENOENT;
    525  1.18      ad 		goto fail;
    526  1.18      ad 	}
    527  1.18      ad 
    528  1.18      ad 	/*
    529   1.1      ad 	 * If loading a dependency, `filename' is a plain module name.
    530   1.1      ad 	 * The name must match.
    531   1.1      ad 	 */
    532   1.1      ad 	if (isdep && strcmp(mi->mi_name, filename) != 0) {
    533   1.1      ad 		error = ENOENT;
    534   1.1      ad 		goto fail;
    535   1.1      ad 	}
    536   1.1      ad 
    537   1.1      ad 	/*
    538   1.3  rumble 	 * Check to see if the module is already loaded.  If so, we may
    539   1.3  rumble 	 * have been recursively called to handle a dependency, so be sure
    540   1.3  rumble 	 * to set modp.
    541   1.1      ad 	 */
    542   1.3  rumble 	if ((mod2 = module_lookup(mi->mi_name)) != NULL) {
    543   1.5  rumble 		if (modp != NULL)
    544   1.5  rumble 			*modp = mod2;
    545   1.1      ad 		error = EEXIST;
    546   1.1      ad 		goto fail;
    547   1.1      ad 	}
    548   1.3  rumble 
    549   1.3  rumble 	/*
    550   1.3  rumble 	 * Block circular dependencies.
    551   1.3  rumble 	 */
    552   1.1      ad 	TAILQ_FOREACH(mod2, &pending, mod_chain) {
    553   1.1      ad 		if (mod == mod2) {
    554   1.1      ad 			continue;
    555   1.1      ad 		}
    556   1.1      ad 		if (strcmp(mod2->mod_info->mi_name, mi->mi_name) == 0) {
    557   1.1      ad 		    	error = EDEADLK;
    558   1.1      ad 			module_error("circular dependency detected");
    559   1.1      ad 		    	goto fail;
    560   1.1      ad 		}
    561   1.1      ad 	}
    562   1.1      ad 
    563   1.1      ad 	/*
    564   1.1      ad 	 * Now try to load any requisite modules.
    565   1.1      ad 	 */
    566   1.1      ad 	if (mi->mi_required != NULL) {
    567   1.1      ad 		for (s = mi->mi_required; *s != '\0'; s = p) {
    568   1.1      ad 			if (*s == ',')
    569   1.1      ad 				s++;
    570   1.1      ad 			p = s;
    571   1.1      ad 			while (*p != '\0' && *p != ',')
    572   1.1      ad 				p++;
    573   1.3  rumble 			len = p - s + 1;
    574   1.3  rumble 			if (len >= MAXMODNAME) {
    575   1.3  rumble 				error = EINVAL;
    576   1.3  rumble 				module_error("required module name too long");
    577   1.3  rumble 				goto fail;
    578   1.3  rumble 			}
    579   1.1      ad 			strlcpy(buf, s, len);
    580   1.1      ad 			if (buf[0] == '\0')
    581   1.1      ad 				break;
    582   1.1      ad 			if (mod->mod_nrequired == MAXMODDEPS - 1) {
    583   1.1      ad 				error = EINVAL;
    584   1.1      ad 				module_error("too many required modules");
    585   1.1      ad 				goto fail;
    586   1.1      ad 			}
    587   1.6  rumble 			if (strcmp(buf, mi->mi_name) == 0) {
    588   1.6  rumble 				error = EDEADLK;
    589   1.6  rumble 				module_error("self-dependency detected");
    590   1.6  rumble 				goto fail;
    591   1.6  rumble 			}
    592   1.9    jmmv 			error = module_do_load(buf, true, flags, NULL,
    593  1.18      ad 			    &mod->mod_required[mod->mod_nrequired++],
    594  1.20      ad 			    MODULE_CLASS_ANY, true);
    595   1.1      ad 			if (error != 0 && error != EEXIST)
    596   1.1      ad 				goto fail;
    597   1.1      ad 		}
    598   1.1      ad 	}
    599   1.1      ad 
    600   1.1      ad 	/*
    601  1.15      ad 	 * We loaded all needed modules successfully: perform global
    602  1.15      ad 	 * relocations and initialize.
    603   1.1      ad 	 */
    604  1.15      ad 	error = kobj_affix(mod->mod_kobj, mi->mi_name);
    605  1.15      ad 	if (error != 0) {
    606  1.15      ad 		module_error("unable to affix module");
    607  1.15      ad 		goto fail2;
    608  1.15      ad 	}
    609  1.15      ad 
    610  1.12      ad 	KASSERT(module_active == NULL);
    611  1.12      ad 	module_active = mod;
    612   1.9    jmmv 	error = (*mi->mi_modcmd)(MODULE_CMD_INIT, props);
    613  1.12      ad 	module_active = NULL;
    614   1.1      ad 	if (error != 0) {
    615   1.1      ad 		module_error("modctl function returned error %d", error);
    616   1.1      ad 		goto fail;
    617   1.1      ad 	}
    618   1.1      ad 
    619   1.1      ad 	/*
    620   1.1      ad 	 * Good, the module loaded successfully.  Put it onto the
    621   1.1      ad 	 * list and add references to its requisite modules.
    622   1.1      ad 	 */
    623   1.1      ad 	module_count++;
    624   1.1      ad 	TAILQ_REMOVE(&pending, mod, mod_chain);
    625   1.1      ad 	TAILQ_INSERT_TAIL(&module_list, mod, mod_chain);
    626   1.1      ad 	for (i = 0; i < mod->mod_nrequired; i++) {
    627   1.4  simonb 		KASSERT(mod->mod_required[i] != NULL);
    628   1.1      ad 		mod->mod_required[i]->mod_refcnt++;
    629   1.1      ad 	}
    630   1.1      ad 	if (modp != NULL) {
    631   1.1      ad 		*modp = mod;
    632   1.1      ad 	}
    633   1.1      ad 	depth--;
    634   1.1      ad 	return 0;
    635   1.7  rumble 
    636   1.1      ad  fail:
    637  1.15      ad 	kobj_unload(mod->mod_kobj);
    638  1.15      ad  fail2:
    639   1.1      ad 	TAILQ_REMOVE(&pending, mod, mod_chain);
    640   1.1      ad 	kmem_free(mod, sizeof(*mod));
    641   1.1      ad 	depth--;
    642   1.1      ad 	return error;
    643   1.1      ad }
    644   1.1      ad 
    645   1.1      ad /*
    646   1.1      ad  * module_do_unload:
    647   1.1      ad  *
    648   1.1      ad  *	Helper routine: do the dirty work of unloading a module.
    649   1.1      ad  */
    650   1.1      ad static int
    651   1.1      ad module_do_unload(const char *name)
    652   1.1      ad {
    653   1.1      ad 	module_t *mod;
    654   1.1      ad 	int error;
    655   1.1      ad 	u_int i;
    656   1.1      ad 
    657   1.1      ad 	KASSERT(mutex_owned(&module_lock));
    658   1.1      ad 
    659   1.1      ad 	mod = module_lookup(name);
    660   1.1      ad 	if (mod == NULL) {
    661   1.1      ad 		return ENOENT;
    662   1.1      ad 	}
    663   1.1      ad 	if (mod->mod_refcnt != 0 || mod->mod_source == MODULE_SOURCE_KERNEL) {
    664   1.1      ad 		return EBUSY;
    665   1.1      ad 	}
    666  1.12      ad 	KASSERT(module_active == NULL);
    667  1.12      ad 	module_active = mod;
    668   1.1      ad 	error = (*mod->mod_info->mi_modcmd)(MODULE_CMD_FINI, NULL);
    669  1.12      ad 	module_active = NULL;
    670   1.1      ad 	if (error != 0) {
    671   1.1      ad 		return error;
    672   1.1      ad 	}
    673   1.1      ad 	module_count--;
    674   1.1      ad 	TAILQ_REMOVE(&module_list, mod, mod_chain);
    675   1.1      ad 	for (i = 0; i < mod->mod_nrequired; i++) {
    676   1.1      ad 		mod->mod_required[i]->mod_refcnt--;
    677   1.1      ad 	}
    678   1.1      ad 	if (mod->mod_kobj != NULL) {
    679   1.1      ad 		kobj_unload(mod->mod_kobj);
    680   1.1      ad 	}
    681   1.1      ad 	kmem_free(mod, sizeof(*mod));
    682   1.1      ad 
    683   1.1      ad 	return 0;
    684   1.1      ad }
    685   1.1      ad 
    686   1.1      ad /*
    687   1.1      ad  * module_prime:
    688   1.1      ad  *
    689   1.1      ad  *	Push a module loaded by the bootloader onto our internal
    690   1.1      ad  *	list.
    691   1.1      ad  */
    692   1.1      ad int
    693   1.1      ad module_prime(void *base, size_t size)
    694   1.1      ad {
    695   1.1      ad 	module_t *mod;
    696   1.1      ad 	int error;
    697   1.1      ad 
    698   1.1      ad 	mod = kmem_zalloc(sizeof(*mod), KM_SLEEP);
    699   1.1      ad 	if (mod == NULL) {
    700   1.1      ad 		return ENOMEM;
    701   1.1      ad 	}
    702   1.1      ad 	mod->mod_source = MODULE_SOURCE_BOOT;
    703   1.1      ad 
    704  1.15      ad 	error = kobj_load_mem(&mod->mod_kobj, base, size);
    705   1.1      ad 	if (error != 0) {
    706  1.11      ad 		kmem_free(mod, sizeof(*mod));
    707  1.11      ad 		module_error("unable to load object pushed by boot loader");
    708  1.11      ad 		return error;
    709  1.11      ad 	}
    710  1.11      ad 	error = module_fetch_info(mod);
    711  1.11      ad 	if (error != 0) {
    712  1.11      ad 		kobj_unload(mod->mod_kobj);
    713   1.1      ad 		kmem_free(mod, sizeof(*mod));
    714  1.11      ad 		module_error("unable to load object pushed by boot loader");
    715   1.1      ad 		return error;
    716   1.1      ad 	}
    717  1.11      ad 
    718   1.1      ad 	TAILQ_INSERT_TAIL(&module_bootlist, mod, mod_chain);
    719   1.1      ad 
    720   1.1      ad 	return 0;
    721   1.1      ad }
    722  1.11      ad 
    723  1.11      ad /*
    724  1.11      ad  * module_fetch_into:
    725  1.11      ad  *
    726  1.11      ad  *	Fetch modinfo record from a loaded module.
    727  1.11      ad  */
    728  1.11      ad static int
    729  1.11      ad module_fetch_info(module_t *mod)
    730  1.11      ad {
    731  1.11      ad 	int error;
    732  1.11      ad 	void *addr;
    733  1.11      ad 	size_t size;
    734  1.11      ad 
    735  1.11      ad 	/*
    736  1.11      ad 	 * Find module info record and check compatibility.
    737  1.11      ad 	 */
    738  1.11      ad 	error = kobj_find_section(mod->mod_kobj, "link_set_modules",
    739  1.11      ad 	    &addr, &size);
    740  1.11      ad 	if (error != 0) {
    741  1.11      ad 		module_error("`link_set_modules' section not present");
    742  1.11      ad 		return error;
    743  1.11      ad 	}
    744  1.11      ad 	if (size != sizeof(modinfo_t **)) {
    745  1.11      ad 		module_error("`link_set_modules' section wrong size");
    746  1.11      ad 		return error;
    747  1.11      ad 	}
    748  1.11      ad 	mod->mod_info = *(modinfo_t **)addr;
    749  1.11      ad 
    750  1.11      ad 	return 0;
    751  1.11      ad }
    752  1.12      ad 
    753  1.12      ad /*
    754  1.12      ad  * module_find_section:
    755  1.12      ad  *
    756  1.12      ad  *	Allows a module that is being initialized to look up a section
    757  1.12      ad  *	within its ELF object.
    758  1.12      ad  */
    759  1.12      ad int
    760  1.12      ad module_find_section(const char *name, void **addr, size_t *size)
    761  1.12      ad {
    762  1.12      ad 
    763  1.12      ad 	KASSERT(mutex_owned(&module_lock));
    764  1.12      ad 	KASSERT(module_active != NULL);
    765  1.12      ad 
    766  1.12      ad 	return kobj_find_section(module_active->mod_kobj, name, addr, size);
    767  1.12      ad }
    768