]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - include/linux/kmod.h
Merge branch 'x86-reboot-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
[mirror_ubuntu-bionic-kernel.git] / include / linux / kmod.h
CommitLineData
1da177e4
LT
1#ifndef __LINUX_KMOD_H__
2#define __LINUX_KMOD_H__
3
4/*
5 * include/linux/kmod.h
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
20 */
21
ac331d15 22#include <linux/gfp.h>
7888e7ff 23#include <linux/stddef.h>
1da177e4
LT
24#include <linux/errno.h>
25#include <linux/compiler.h>
a06a4dc3 26#include <linux/workqueue.h>
17f60a7d 27#include <linux/sysctl.h>
1da177e4
LT
28
29#define KMOD_PATH_LEN 256
30
a1ef5adb 31#ifdef CONFIG_MODULES
5ed10910 32extern char modprobe_path[]; /* for sysctl */
1da177e4
LT
33/* modprobe exit status on success, -ve on error. Return value
34 * usually useless though. */
b9075fa9
JP
35extern __printf(2, 3)
36int __request_module(bool wait, const char *name, ...);
acae0515
AV
37#define request_module(mod...) __request_module(true, mod)
38#define request_module_nowait(mod...) __request_module(false, mod)
39#define try_then_request_module(x, mod...) \
97c18e2c 40 ((x) ?: (__request_module(true, mod), (x)))
1da177e4 41#else
acae0515
AV
42static inline int request_module(const char *name, ...) { return -ENOSYS; }
43static inline int request_module_nowait(const char *name, ...) { return -ENOSYS; }
df648c9f 44#define try_then_request_module(x, mod...) (x)
1da177e4
LT
45#endif
46
7888e7ff 47
87966996 48struct cred;
0ab4dc92 49struct file;
a06a4dc3 50
9d944ef3
ON
51#define UMH_NO_WAIT 0 /* don't wait at all */
52#define UMH_WAIT_EXEC 1 /* wait for the exec, but not the process */
53#define UMH_WAIT_PROC 2 /* wait for the process to complete */
d0bd587a
ON
54#define UMH_KILLABLE 4 /* wait for EXEC/PROC killable */
55
a06a4dc3
NH
56struct subprocess_info {
57 struct work_struct work;
58 struct completion *complete;
a06a4dc3
NH
59 char *path;
60 char **argv;
61 char **envp;
9d944ef3 62 int wait;
a06a4dc3 63 int retval;
87966996 64 int (*init)(struct subprocess_info *info, struct cred *new);
a06a4dc3
NH
65 void (*cleanup)(struct subprocess_info *info);
66 void *data;
67};
0ab4dc92
JF
68
69/* Allocate a subprocess_info structure */
ac331d15
KM
70struct subprocess_info *call_usermodehelper_setup(char *path, char **argv,
71 char **envp, gfp_t gfp_mask);
0ab4dc92
JF
72
73/* Set various pieces of state into the subprocess_info structure */
a06a4dc3 74void call_usermodehelper_setfns(struct subprocess_info *info,
87966996 75 int (*init)(struct subprocess_info *info, struct cred *new),
a06a4dc3
NH
76 void (*cleanup)(struct subprocess_info *info),
77 void *data);
86313c48 78
0ab4dc92 79/* Actually execute the sub-process */
9d944ef3 80int call_usermodehelper_exec(struct subprocess_info *info, int wait);
0ab4dc92
JF
81
82/* Free the subprocess_info. This is only needed if you're not going
83 to call call_usermodehelper_exec */
84void call_usermodehelper_freeinfo(struct subprocess_info *info);
7888e7ff
DH
85
86static inline int
9d944ef3 87call_usermodehelper_fns(char *path, char **argv, char **envp, int wait,
87966996 88 int (*init)(struct subprocess_info *info, struct cred *new),
a06a4dc3 89 void (*cleanup)(struct subprocess_info *), void *data)
7888e7ff 90{
0ab4dc92 91 struct subprocess_info *info;
ac331d15 92 gfp_t gfp_mask = (wait == UMH_NO_WAIT) ? GFP_ATOMIC : GFP_KERNEL;
0ab4dc92 93
ac331d15 94 info = call_usermodehelper_setup(path, argv, envp, gfp_mask);
a06a4dc3 95
0ab4dc92
JF
96 if (info == NULL)
97 return -ENOMEM;
a06a4dc3
NH
98
99 call_usermodehelper_setfns(info, init, cleanup, data);
100
0ab4dc92
JF
101 return call_usermodehelper_exec(info, wait);
102}
103
a06a4dc3 104static inline int
9d944ef3 105call_usermodehelper(char *path, char **argv, char **envp, int wait)
a06a4dc3
NH
106{
107 return call_usermodehelper_fns(path, argv, envp, wait,
108 NULL, NULL, NULL);
109}
110
17f60a7d
EP
111extern struct ctl_table usermodehelper_table[];
112
247bc037
RW
113enum umh_disable_depth {
114 UMH_ENABLED = 0,
115 UMH_FREEZING,
116 UMH_DISABLED,
117};
118
1da177e4
LT
119extern void usermodehelper_init(void);
120
247bc037
RW
121extern int __usermodehelper_disable(enum umh_disable_depth depth);
122extern void __usermodehelper_set_disable_depth(enum umh_disable_depth depth);
123
124static inline int usermodehelper_disable(void)
125{
126 return __usermodehelper_disable(UMH_DISABLED);
127}
128
129static inline void usermodehelper_enable(void)
130{
131 __usermodehelper_set_disable_depth(UMH_ENABLED);
132}
133
fe2e39d8 134extern int usermodehelper_read_trylock(void);
9b78c1da 135extern long usermodehelper_read_lock_wait(long timeout);
fe2e39d8 136extern void usermodehelper_read_unlock(void);
1bfcf130 137
1da177e4 138#endif /* __LINUX_KMOD_H__ */