]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | #ifndef _LINUX_MODULE_H |
2 | #define _LINUX_MODULE_H | |
3 | /* | |
4 | * Dynamic loading of modules into the kernel. | |
5 | * | |
6 | * Rewritten by Richard Henderson <rth@tamu.edu> Dec 1996 | |
7 | * Rewritten again by Rusty Russell, 2002 | |
8 | */ | |
1da177e4 LT |
9 | #include <linux/list.h> |
10 | #include <linux/stat.h> | |
11 | #include <linux/compiler.h> | |
12 | #include <linux/cache.h> | |
13 | #include <linux/kmod.h> | |
0fd972a7 | 14 | #include <linux/init.h> |
1da177e4 LT |
15 | #include <linux/elf.h> |
16 | #include <linux/stringify.h> | |
17 | #include <linux/kobject.h> | |
18 | #include <linux/moduleparam.h> | |
b2e285fc | 19 | #include <linux/jump_label.h> |
f5016932 | 20 | #include <linux/export.h> |
0ef76537 | 21 | #include <linux/extable.h> /* only as arch move module.h -> extable.h */ |
93c2e105 | 22 | #include <linux/rbtree_latch.h> |
1da177e4 | 23 | |
e1783a24 | 24 | #include <linux/percpu.h> |
1da177e4 LT |
25 | #include <asm/module.h> |
26 | ||
106a4ee2 RR |
27 | /* In stripped ARM and x86-64 modules, ~ is surprisingly rare. */ |
28 | #define MODULE_SIG_STRING "~Module signature appended~\n" | |
29 | ||
1da177e4 LT |
30 | /* Not Yet Implemented */ |
31 | #define MODULE_SUPPORTED_DEVICE(name) | |
32 | ||
730b69d2 | 33 | #define MODULE_NAME_LEN MAX_PARAM_PREFIX_LEN |
1da177e4 | 34 | |
e865d06b | 35 | struct modversion_info { |
1da177e4 LT |
36 | unsigned long crc; |
37 | char name[MODULE_NAME_LEN]; | |
38 | }; | |
39 | ||
40 | struct module; | |
0ef76537 | 41 | struct exception_table_entry; |
1da177e4 | 42 | |
4befb026 KS |
43 | struct module_kobject { |
44 | struct kobject kobj; | |
45 | struct module *mod; | |
46 | struct kobject *drivers_dir; | |
47 | struct module_param_attrs *mp; | |
942e4431 | 48 | struct completion *kobj_completion; |
4befb026 KS |
49 | }; |
50 | ||
1da177e4 | 51 | struct module_attribute { |
4befb026 KS |
52 | struct attribute attr; |
53 | ssize_t (*show)(struct module_attribute *, struct module_kobject *, | |
54 | char *); | |
55 | ssize_t (*store)(struct module_attribute *, struct module_kobject *, | |
1da177e4 | 56 | const char *, size_t count); |
c988d2b2 MD |
57 | void (*setup)(struct module *, const char *); |
58 | int (*test)(struct module *); | |
59 | void (*free)(struct module *); | |
1da177e4 LT |
60 | }; |
61 | ||
e94965ed DT |
62 | struct module_version_attribute { |
63 | struct module_attribute mattr; | |
64 | const char *module_name; | |
65 | const char *version; | |
98562ad8 | 66 | } __attribute__ ((__aligned__(sizeof(void *)))); |
e94965ed | 67 | |
9b73a584 | 68 | extern ssize_t __modver_version_show(struct module_attribute *, |
4befb026 | 69 | struct module_kobject *, char *); |
9b73a584 | 70 | |
88bfa324 | 71 | extern struct module_attribute module_uevent; |
1da177e4 LT |
72 | |
73 | /* These are either module local, or the kernel's dummy ones. */ | |
74 | extern int init_module(void); | |
75 | extern void cleanup_module(void); | |
76 | ||
0fd972a7 PG |
77 | #ifndef MODULE |
78 | /** | |
79 | * module_init() - driver initialization entry point | |
80 | * @x: function to be run at kernel boot time or module insertion | |
81 | * | |
82 | * module_init() will either be called during do_initcalls() (if | |
83 | * builtin) or at module insertion time (if a module). There can only | |
84 | * be one per module. | |
85 | */ | |
86 | #define module_init(x) __initcall(x); | |
87 | ||
88 | /** | |
89 | * module_exit() - driver exit entry point | |
90 | * @x: function to be run when driver is removed | |
91 | * | |
92 | * module_exit() will wrap the driver clean-up code | |
93 | * with cleanup_module() when used with rmmod when | |
94 | * the driver is a module. If the driver is statically | |
95 | * compiled into the kernel, module_exit() has no effect. | |
96 | * There can only be one per module. | |
97 | */ | |
98 | #define module_exit(x) __exitcall(x); | |
99 | ||
100 | #else /* MODULE */ | |
101 | ||
102 | /* | |
103 | * In most cases loadable modules do not need custom | |
104 | * initcall levels. There are still some valid cases where | |
105 | * a driver may be needed early if built in, and does not | |
106 | * matter when built as a loadable module. Like bus | |
107 | * snooping debug drivers. | |
108 | */ | |
109 | #define early_initcall(fn) module_init(fn) | |
110 | #define core_initcall(fn) module_init(fn) | |
111 | #define core_initcall_sync(fn) module_init(fn) | |
112 | #define postcore_initcall(fn) module_init(fn) | |
113 | #define postcore_initcall_sync(fn) module_init(fn) | |
114 | #define arch_initcall(fn) module_init(fn) | |
115 | #define subsys_initcall(fn) module_init(fn) | |
116 | #define subsys_initcall_sync(fn) module_init(fn) | |
117 | #define fs_initcall(fn) module_init(fn) | |
118 | #define fs_initcall_sync(fn) module_init(fn) | |
119 | #define rootfs_initcall(fn) module_init(fn) | |
120 | #define device_initcall(fn) module_init(fn) | |
121 | #define device_initcall_sync(fn) module_init(fn) | |
122 | #define late_initcall(fn) module_init(fn) | |
123 | #define late_initcall_sync(fn) module_init(fn) | |
124 | ||
125 | #define console_initcall(fn) module_init(fn) | |
126 | #define security_initcall(fn) module_init(fn) | |
127 | ||
128 | /* Each module must use one module_init(). */ | |
129 | #define module_init(initfn) \ | |
130 | static inline initcall_t __inittest(void) \ | |
131 | { return initfn; } \ | |
132 | int init_module(void) __attribute__((alias(#initfn))); | |
133 | ||
134 | /* This is only required if you want to be unloadable. */ | |
135 | #define module_exit(exitfn) \ | |
136 | static inline exitcall_t __exittest(void) \ | |
137 | { return exitfn; } \ | |
138 | void cleanup_module(void) __attribute__((alias(#exitfn))); | |
139 | ||
140 | #endif | |
141 | ||
142 | /* This means "can be init if no module support, otherwise module load | |
143 | may call it." */ | |
144 | #ifdef CONFIG_MODULES | |
145 | #define __init_or_module | |
146 | #define __initdata_or_module | |
147 | #define __initconst_or_module | |
148 | #define __INIT_OR_MODULE .text | |
149 | #define __INITDATA_OR_MODULE .data | |
150 | #define __INITRODATA_OR_MODULE .section ".rodata","a",%progbits | |
151 | #else | |
152 | #define __init_or_module __init | |
153 | #define __initdata_or_module __initdata | |
154 | #define __initconst_or_module __initconst | |
155 | #define __INIT_OR_MODULE __INIT | |
156 | #define __INITDATA_OR_MODULE __INITDATA | |
157 | #define __INITRODATA_OR_MODULE __INITRODATA | |
158 | #endif /*CONFIG_MODULES*/ | |
159 | ||
1da177e4 LT |
160 | /* Generic info of form tag = "info" */ |
161 | #define MODULE_INFO(tag, info) __MODULE_INFO(tag, tag, info) | |
162 | ||
163 | /* For userspace: you can also call me... */ | |
164 | #define MODULE_ALIAS(_alias) MODULE_INFO(alias, _alias) | |
165 | ||
7cb14ba7 AR |
166 | /* Soft module dependencies. See man modprobe.d for details. |
167 | * Example: MODULE_SOFTDEP("pre: module-foo module-bar post: module-baz") | |
168 | */ | |
169 | #define MODULE_SOFTDEP(_softdep) MODULE_INFO(softdep, _softdep) | |
170 | ||
1da177e4 LT |
171 | /* |
172 | * The following license idents are currently accepted as indicating free | |
173 | * software modules | |
174 | * | |
175 | * "GPL" [GNU Public License v2 or later] | |
176 | * "GPL v2" [GNU Public License v2] | |
177 | * "GPL and additional rights" [GNU Public License v2 rights and more] | |
178 | * "Dual BSD/GPL" [GNU Public License v2 | |
179 | * or BSD license choice] | |
8d27e908 XVP |
180 | * "Dual MIT/GPL" [GNU Public License v2 |
181 | * or MIT license choice] | |
1da177e4 LT |
182 | * "Dual MPL/GPL" [GNU Public License v2 |
183 | * or Mozilla license choice] | |
184 | * | |
185 | * The following other idents are available | |
186 | * | |
187 | * "Proprietary" [Non free products] | |
188 | * | |
189 | * There are dual licensed components, but when running with Linux it is the | |
190 | * GPL that is relevant so this is a non issue. Similarly LGPL linked with GPL | |
191 | * is a GPL combined work. | |
192 | * | |
193 | * This exists for several reasons | |
e865d06b | 194 | * 1. So modinfo can show license info for users wanting to vet their setup |
1da177e4 LT |
195 | * is free |
196 | * 2. So the community can ignore bug reports including proprietary modules | |
197 | * 3. So vendors can do likewise based on their own policies | |
198 | */ | |
199 | #define MODULE_LICENSE(_license) MODULE_INFO(license, _license) | |
200 | ||
1d7015ca JB |
201 | /* |
202 | * Author(s), use "Name <email>" or just "Name", for multiple | |
203 | * authors use multiple MODULE_AUTHOR() statements/lines. | |
204 | */ | |
1da177e4 | 205 | #define MODULE_AUTHOR(_author) MODULE_INFO(author, _author) |
e865d06b | 206 | |
1da177e4 LT |
207 | /* What your module does. */ |
208 | #define MODULE_DESCRIPTION(_description) MODULE_INFO(description, _description) | |
209 | ||
cff26a51 RR |
210 | #ifdef MODULE |
211 | /* Creates an alias so file2alias.c can find device table. */ | |
212 | #define MODULE_DEVICE_TABLE(type, name) \ | |
6301939d | 213 | extern const typeof(name) __mod_##type##__##name##_device_table \ |
cff26a51 RR |
214 | __attribute__ ((unused, alias(__stringify(name)))) |
215 | #else /* !MODULE */ | |
216 | #define MODULE_DEVICE_TABLE(type, name) | |
217 | #endif | |
1da177e4 LT |
218 | |
219 | /* Version of form [<epoch>:]<version>[-<extra-version>]. | |
e865d06b SL |
220 | * Or for CVS/RCS ID version, everything but the number is stripped. |
221 | * <epoch>: A (small) unsigned integer which allows you to start versions | |
222 | * anew. If not mentioned, it's zero. eg. "2:1.0" is after | |
223 | * "1:2.0". | |
224 | ||
225 | * <version>: The <version> may contain only alphanumerics and the | |
226 | * character `.'. Ordered by numeric sort for numeric parts, | |
227 | * ascii sort for ascii parts (as per RPM or DEB algorithm). | |
228 | ||
229 | * <extraversion>: Like <version>, but inserted for local | |
230 | * customizations, eg "rh3" or "rusty1". | |
231 | ||
232 | * Using this automatically adds a checksum of the .c files and the | |
233 | * local headers in "srcversion". | |
234 | */ | |
e94965ed | 235 | |
3b90a5b2 | 236 | #if defined(MODULE) || !defined(CONFIG_SYSFS) |
1da177e4 | 237 | #define MODULE_VERSION(_version) MODULE_INFO(version, _version) |
e94965ed DT |
238 | #else |
239 | #define MODULE_VERSION(_version) \ | |
b4bc8428 | 240 | static struct module_version_attribute ___modver_attr = { \ |
e94965ed DT |
241 | .mattr = { \ |
242 | .attr = { \ | |
243 | .name = "version", \ | |
244 | .mode = S_IRUGO, \ | |
245 | }, \ | |
246 | .show = __modver_version_show, \ | |
247 | }, \ | |
248 | .module_name = KBUILD_MODNAME, \ | |
249 | .version = _version, \ | |
b4bc8428 DT |
250 | }; \ |
251 | static const struct module_version_attribute \ | |
252 | __used __attribute__ ((__section__ ("__modver"))) \ | |
253 | * __moduleparam_const __modver_attr = &___modver_attr | |
e94965ed | 254 | #endif |
1da177e4 | 255 | |
187afbed JM |
256 | /* Optional firmware file (or files) needed by the module |
257 | * format is simply firmware file name. Multiple firmware | |
258 | * files require multiple MODULE_FIRMWARE() specifiers */ | |
259 | #define MODULE_FIRMWARE(_firmware) MODULE_INFO(firmware, _firmware) | |
260 | ||
1da177e4 LT |
261 | struct notifier_block; |
262 | ||
8c26f36d MG |
263 | #ifdef CONFIG_MODULE_SIG |
264 | extern void enforce_signed_modules(void); | |
265 | #else | |
266 | static inline void enforce_signed_modules(void) {}; | |
267 | #endif | |
268 | ||
1da177e4 LT |
269 | #ifdef CONFIG_MODULES |
270 | ||
5ed10910 | 271 | extern int modules_disabled; /* for sysctl */ |
1da177e4 LT |
272 | /* Get/put a kernel symbol (calls must be symmetric) */ |
273 | void *__symbol_get(const char *symbol); | |
274 | void *__symbol_get_gpl(const char *symbol); | |
b92021b0 | 275 | #define symbol_get(x) ((typeof(&x))(__symbol_get(VMLINUX_SYMBOL_STR(x)))) |
1da177e4 | 276 | |
c8e21ced RR |
277 | /* modules using other modules: kdb wants to see this. */ |
278 | struct module_use { | |
279 | struct list_head source_list; | |
280 | struct list_head target_list; | |
281 | struct module *source, *target; | |
282 | }; | |
283 | ||
0d21b0e3 RR |
284 | enum module_state { |
285 | MODULE_STATE_LIVE, /* Normal state. */ | |
286 | MODULE_STATE_COMING, /* Full formed, running module_init. */ | |
287 | MODULE_STATE_GOING, /* Going away. */ | |
288 | MODULE_STATE_UNFORMED, /* Still setting it up. */ | |
1da177e4 LT |
289 | }; |
290 | ||
93c2e105 PZ |
291 | struct module; |
292 | ||
293 | struct mod_tree_node { | |
294 | struct module *mod; | |
295 | struct latch_tree_node node; | |
296 | }; | |
297 | ||
7523e4dc RR |
298 | struct module_layout { |
299 | /* The actual code + data. */ | |
300 | void *base; | |
301 | /* Total size. */ | |
302 | unsigned int size; | |
303 | /* The size of the executable code. */ | |
304 | unsigned int text_size; | |
305 | /* Size of RO section of the module (text+rodata) */ | |
306 | unsigned int ro_size; | |
444d13ff JY |
307 | /* Size of RO after init section */ |
308 | unsigned int ro_after_init_size; | |
7523e4dc RR |
309 | |
310 | #ifdef CONFIG_MODULES_TREE_LOOKUP | |
311 | struct mod_tree_node mtn; | |
312 | #endif | |
313 | }; | |
314 | ||
315 | #ifdef CONFIG_MODULES_TREE_LOOKUP | |
316 | /* Only touch one cacheline for common rbtree-for-core-layout case. */ | |
317 | #define __module_layout_align ____cacheline_aligned | |
318 | #else | |
319 | #define __module_layout_align | |
320 | #endif | |
321 | ||
8244062e RR |
322 | struct mod_kallsyms { |
323 | Elf_Sym *symtab; | |
324 | unsigned int num_symtab; | |
325 | char *strtab; | |
326 | }; | |
327 | ||
1ce15ef4 JY |
328 | #ifdef CONFIG_LIVEPATCH |
329 | struct klp_modinfo { | |
330 | Elf_Ehdr hdr; | |
331 | Elf_Shdr *sechdrs; | |
332 | char *secstrings; | |
333 | unsigned int symndx; | |
334 | }; | |
335 | #endif | |
336 | ||
e865d06b | 337 | struct module { |
1da177e4 LT |
338 | enum module_state state; |
339 | ||
340 | /* Member of list of modules */ | |
341 | struct list_head list; | |
342 | ||
343 | /* Unique handle for this module */ | |
344 | char name[MODULE_NAME_LEN]; | |
345 | ||
346 | /* Sysfs stuff. */ | |
347 | struct module_kobject mkobj; | |
03e88ae1 | 348 | struct module_attribute *modinfo_attrs; |
c988d2b2 MD |
349 | const char *version; |
350 | const char *srcversion; | |
270a6c4c | 351 | struct kobject *holders_dir; |
1da177e4 LT |
352 | |
353 | /* Exported symbols */ | |
354 | const struct kernel_symbol *syms; | |
71810db2 | 355 | const s32 *crcs; |
af540689 | 356 | unsigned int num_syms; |
1da177e4 | 357 | |
e180a6b7 | 358 | /* Kernel parameters. */ |
cf2fde7b | 359 | #ifdef CONFIG_SYSFS |
b51d23e4 | 360 | struct mutex param_lock; |
cf2fde7b | 361 | #endif |
e180a6b7 RR |
362 | struct kernel_param *kp; |
363 | unsigned int num_kp; | |
364 | ||
1da177e4 | 365 | /* GPL-only exported symbols. */ |
1da177e4 | 366 | unsigned int num_gpl_syms; |
af540689 | 367 | const struct kernel_symbol *gpl_syms; |
71810db2 | 368 | const s32 *gpl_crcs; |
1da177e4 | 369 | |
f7f5b675 | 370 | #ifdef CONFIG_UNUSED_SYMBOLS |
f71d20e9 AV |
371 | /* unused exported symbols. */ |
372 | const struct kernel_symbol *unused_syms; | |
71810db2 | 373 | const s32 *unused_crcs; |
af540689 RK |
374 | unsigned int num_unused_syms; |
375 | ||
f71d20e9 | 376 | /* GPL-only, unused exported symbols. */ |
f71d20e9 | 377 | unsigned int num_unused_gpl_syms; |
af540689 | 378 | const struct kernel_symbol *unused_gpl_syms; |
71810db2 | 379 | const s32 *unused_gpl_crcs; |
f7f5b675 | 380 | #endif |
f71d20e9 | 381 | |
106a4ee2 RR |
382 | #ifdef CONFIG_MODULE_SIG |
383 | /* Signature was verified. */ | |
384 | bool sig_ok; | |
385 | #endif | |
386 | ||
f2411da7 LR |
387 | bool async_probe_requested; |
388 | ||
9f28bb7e GKH |
389 | /* symbols that will be GPL-only in the near future. */ |
390 | const struct kernel_symbol *gpl_future_syms; | |
71810db2 | 391 | const s32 *gpl_future_crcs; |
af540689 | 392 | unsigned int num_gpl_future_syms; |
9f28bb7e | 393 | |
1da177e4 LT |
394 | /* Exception table */ |
395 | unsigned int num_exentries; | |
5e458cc0 | 396 | struct exception_table_entry *extable; |
1da177e4 LT |
397 | |
398 | /* Startup function. */ | |
399 | int (*init)(void); | |
400 | ||
7523e4dc RR |
401 | /* Core layout: rbtree is accessed frequently, so keep together. */ |
402 | struct module_layout core_layout __module_layout_align; | |
403 | struct module_layout init_layout; | |
84e1c6bb | 404 | |
1da177e4 LT |
405 | /* Arch-specific module values */ |
406 | struct mod_arch_specific arch; | |
407 | ||
7fd8329b | 408 | unsigned long taints; /* same bits as kernel:taint_flags */ |
2bc2d61a | 409 | |
7664c5a1 JF |
410 | #ifdef CONFIG_GENERIC_BUG |
411 | /* Support for BUG */ | |
af540689 | 412 | unsigned num_bugs; |
7664c5a1 JF |
413 | struct list_head bug_list; |
414 | struct bug_entry *bug_table; | |
1da177e4 LT |
415 | #endif |
416 | ||
417 | #ifdef CONFIG_KALLSYMS | |
8244062e RR |
418 | /* Protected by RCU and/or module_mutex: use rcu_dereference() */ |
419 | struct mod_kallsyms *kallsyms; | |
420 | struct mod_kallsyms core_kallsyms; | |
c714965f | 421 | |
1da177e4 LT |
422 | /* Section attributes */ |
423 | struct module_sect_attrs *sect_attrs; | |
6d760133 RM |
424 | |
425 | /* Notes attributes */ | |
426 | struct module_notes_attrs *notes_attrs; | |
1da177e4 LT |
427 | #endif |
428 | ||
a288bd65 RK |
429 | /* The command line arguments (may be mangled). People like |
430 | keeping pointers to this stuff */ | |
431 | char *args; | |
432 | ||
259354de | 433 | #ifdef CONFIG_SMP |
1da177e4 | 434 | /* Per-cpu data. */ |
259354de TH |
435 | void __percpu *percpu; |
436 | unsigned int percpu_size; | |
437 | #endif | |
1da177e4 | 438 | |
97e1c18e | 439 | #ifdef CONFIG_TRACEPOINTS |
97e1c18e | 440 | unsigned int num_tracepoints; |
a288bd65 | 441 | struct tracepoint * const *tracepoints_ptrs; |
97e1c18e | 442 | #endif |
bf5438fc JB |
443 | #ifdef HAVE_JUMP_LABEL |
444 | struct jump_entry *jump_entries; | |
445 | unsigned int num_jump_entries; | |
446 | #endif | |
769b0441 | 447 | #ifdef CONFIG_TRACING |
1ba28e02 | 448 | unsigned int num_trace_bprintk_fmt; |
a288bd65 | 449 | const char **trace_bprintk_fmt_start; |
1ba28e02 | 450 | #endif |
6d723736 | 451 | #ifdef CONFIG_EVENT_TRACING |
2425bcb9 | 452 | struct trace_event_call **trace_events; |
6d723736 | 453 | unsigned int num_trace_events; |
3673b8e4 SRRH |
454 | struct trace_enum_map **trace_enums; |
455 | unsigned int num_trace_enums; | |
6d723736 | 456 | #endif |
93eb677d | 457 | #ifdef CONFIG_FTRACE_MCOUNT_RECORD |
93eb677d | 458 | unsigned int num_ftrace_callsites; |
a288bd65 | 459 | unsigned long *ftrace_callsites; |
93eb677d | 460 | #endif |
1ba28e02 | 461 | |
8cb2c2dc | 462 | #ifdef CONFIG_LIVEPATCH |
1ce15ef4 | 463 | bool klp; /* Is this a livepatch module? */ |
8cb2c2dc | 464 | bool klp_alive; |
1ce15ef4 JY |
465 | |
466 | /* Elf information */ | |
467 | struct klp_modinfo *klp_info; | |
8cb2c2dc PM |
468 | #endif |
469 | ||
af540689 RK |
470 | #ifdef CONFIG_MODULE_UNLOAD |
471 | /* What modules depend on me? */ | |
2c02dfe7 LT |
472 | struct list_head source_list; |
473 | /* What modules do I depend on? */ | |
474 | struct list_head target_list; | |
af540689 | 475 | |
af540689 RK |
476 | /* Destruction function. */ |
477 | void (*exit)(void); | |
478 | ||
2f35c41f | 479 | atomic_t refcnt; |
af540689 | 480 | #endif |
b99b87f7 PO |
481 | |
482 | #ifdef CONFIG_CONSTRUCTORS | |
483 | /* Constructor functions. */ | |
484 | ctor_fn_t *ctors; | |
485 | unsigned int num_ctors; | |
486 | #endif | |
93c2e105 | 487 | } ____cacheline_aligned; |
e61a1c1c RZ |
488 | #ifndef MODULE_ARCH_INIT |
489 | #define MODULE_ARCH_INIT {} | |
490 | #endif | |
1da177e4 | 491 | |
c6b37801 TA |
492 | extern struct mutex module_mutex; |
493 | ||
1da177e4 LT |
494 | /* FIXME: It'd be nice to isolate modules during init, too, so they |
495 | aren't used before they (may) fail. But presently too much code | |
496 | (IDE & SCSI) require entry into the module during init.*/ | |
497 | static inline int module_is_live(struct module *mod) | |
498 | { | |
499 | return mod->state != MODULE_STATE_GOING; | |
500 | } | |
501 | ||
1da177e4 | 502 | struct module *__module_text_address(unsigned long addr); |
e610499e RR |
503 | struct module *__module_address(unsigned long addr); |
504 | bool is_module_address(unsigned long addr); | |
10fad5e4 | 505 | bool is_module_percpu_address(unsigned long addr); |
e610499e | 506 | bool is_module_text_address(unsigned long addr); |
1da177e4 | 507 | |
76681c8f PM |
508 | static inline bool within_module_core(unsigned long addr, |
509 | const struct module *mod) | |
a06f6211 | 510 | { |
7523e4dc RR |
511 | return (unsigned long)mod->core_layout.base <= addr && |
512 | addr < (unsigned long)mod->core_layout.base + mod->core_layout.size; | |
a06f6211 MH |
513 | } |
514 | ||
76681c8f PM |
515 | static inline bool within_module_init(unsigned long addr, |
516 | const struct module *mod) | |
a06f6211 | 517 | { |
7523e4dc RR |
518 | return (unsigned long)mod->init_layout.base <= addr && |
519 | addr < (unsigned long)mod->init_layout.base + mod->init_layout.size; | |
a06f6211 MH |
520 | } |
521 | ||
76681c8f | 522 | static inline bool within_module(unsigned long addr, const struct module *mod) |
9b20a352 PM |
523 | { |
524 | return within_module_init(addr, mod) || within_module_core(addr, mod); | |
525 | } | |
526 | ||
c6b37801 TA |
527 | /* Search for module by name: must hold module_mutex. */ |
528 | struct module *find_module(const char *name); | |
529 | ||
530 | struct symsearch { | |
531 | const struct kernel_symbol *start, *stop; | |
71810db2 | 532 | const s32 *crcs; |
c6b37801 TA |
533 | enum { |
534 | NOT_GPL_ONLY, | |
535 | GPL_ONLY, | |
536 | WILL_BE_GPL_ONLY, | |
537 | } licence; | |
538 | bool unused; | |
539 | }; | |
540 | ||
0be964be PZ |
541 | /* |
542 | * Search for an exported symbol by name. | |
543 | * | |
544 | * Must be called with module_mutex held or preemption disabled. | |
545 | */ | |
c6b37801 TA |
546 | const struct kernel_symbol *find_symbol(const char *name, |
547 | struct module **owner, | |
71810db2 | 548 | const s32 **crc, |
c6b37801 TA |
549 | bool gplok, |
550 | bool warn); | |
551 | ||
0be964be PZ |
552 | /* |
553 | * Walk the exported symbol table | |
554 | * | |
555 | * Must be called with module_mutex held or preemption disabled. | |
556 | */ | |
de4d8d53 RR |
557 | bool each_symbol_section(bool (*fn)(const struct symsearch *arr, |
558 | struct module *owner, | |
559 | void *data), void *data); | |
c6b37801 | 560 | |
ea07890a | 561 | /* Returns 0 and fills in value, defined and namebuf, or -ERANGE if |
1da177e4 | 562 | symnum out of range. */ |
ea07890a AD |
563 | int module_get_kallsym(unsigned int symnum, unsigned long *value, char *type, |
564 | char *name, char *module_name, int *exported); | |
1da177e4 LT |
565 | |
566 | /* Look for this name: can be of form module:name. */ | |
567 | unsigned long module_kallsyms_lookup_name(const char *name); | |
568 | ||
75a66614 AK |
569 | int module_kallsyms_on_each_symbol(int (*fn)(void *, const char *, |
570 | struct module *, unsigned long), | |
571 | void *data); | |
572 | ||
bf262dce JK |
573 | extern void __noreturn __module_put_and_exit(struct module *mod, |
574 | long code); | |
74e22fac | 575 | #define module_put_and_exit(code) __module_put_and_exit(THIS_MODULE, code) |
1da177e4 LT |
576 | |
577 | #ifdef CONFIG_MODULE_UNLOAD | |
d5db139a | 578 | int module_refcount(struct module *mod); |
1da177e4 | 579 | void __symbol_put(const char *symbol); |
b92021b0 | 580 | #define symbol_put(x) __symbol_put(VMLINUX_SYMBOL_STR(x)) |
1da177e4 LT |
581 | void symbol_put_addr(void *addr); |
582 | ||
583 | /* Sometimes we know we already have a refcount, and it's easier not | |
584 | to handle the error case (which only happens with rmmod --wait). */ | |
d53799be | 585 | extern void __module_get(struct module *module); |
e1783a24 | 586 | |
d53799be SR |
587 | /* This is the Right Way to get a module: if it fails, it's being removed, |
588 | * so pretend it's not there. */ | |
589 | extern bool try_module_get(struct module *module); | |
1da177e4 | 590 | |
f6a57033 | 591 | extern void module_put(struct module *module); |
1da177e4 LT |
592 | |
593 | #else /*!CONFIG_MODULE_UNLOAD*/ | |
594 | static inline int try_module_get(struct module *module) | |
595 | { | |
596 | return !module || module_is_live(module); | |
597 | } | |
598 | static inline void module_put(struct module *module) | |
599 | { | |
600 | } | |
601 | static inline void __module_get(struct module *module) | |
602 | { | |
603 | } | |
e865d06b SL |
604 | #define symbol_put(x) do { } while (0) |
605 | #define symbol_put_addr(p) do { } while (0) | |
1da177e4 LT |
606 | |
607 | #endif /* CONFIG_MODULE_UNLOAD */ | |
dfd62d1d | 608 | int ref_module(struct module *a, struct module *b); |
1da177e4 LT |
609 | |
610 | /* This is a #define so the string doesn't get put in every .o file */ | |
611 | #define module_name(mod) \ | |
612 | ({ \ | |
613 | struct module *__mod = (mod); \ | |
614 | __mod ? __mod->name : "kernel"; \ | |
615 | }) | |
616 | ||
6dd06c9f RR |
617 | /* For kallsyms to ask for address resolution. namebuf should be at |
618 | * least KSYM_NAME_LEN long: a pointer to namebuf is returned if | |
619 | * found, otherwise NULL. */ | |
92dfc9dc | 620 | const char *module_address_lookup(unsigned long addr, |
6dd06c9f RR |
621 | unsigned long *symbolsize, |
622 | unsigned long *offset, | |
623 | char **modname, | |
624 | char *namebuf); | |
9d65cb4a | 625 | int lookup_module_symbol_name(unsigned long addr, char *symname); |
a5c43dae | 626 | int lookup_module_symbol_attrs(unsigned long addr, unsigned long *size, unsigned long *offset, char *modname, char *name); |
1da177e4 | 627 | |
e865d06b SL |
628 | int register_module_notifier(struct notifier_block *nb); |
629 | int unregister_module_notifier(struct notifier_block *nb); | |
1da177e4 LT |
630 | |
631 | extern void print_modules(void); | |
632 | ||
80c6e146 DT |
633 | static inline bool module_requested_async_probing(struct module *module) |
634 | { | |
635 | return module && module->async_probe_requested; | |
636 | } | |
637 | ||
1ce15ef4 JY |
638 | #ifdef CONFIG_LIVEPATCH |
639 | static inline bool is_livepatch_module(struct module *mod) | |
640 | { | |
641 | return mod->klp; | |
642 | } | |
643 | #else /* !CONFIG_LIVEPATCH */ | |
644 | static inline bool is_livepatch_module(struct module *mod) | |
645 | { | |
646 | return false; | |
647 | } | |
648 | #endif /* CONFIG_LIVEPATCH */ | |
649 | ||
562d2183 MG |
650 | extern bool secure_modules(void); |
651 | ||
1da177e4 | 652 | #else /* !CONFIG_MODULES... */ |
1da177e4 | 653 | |
e610499e RR |
654 | static inline struct module *__module_address(unsigned long addr) |
655 | { | |
656 | return NULL; | |
657 | } | |
658 | ||
1da177e4 LT |
659 | static inline struct module *__module_text_address(unsigned long addr) |
660 | { | |
661 | return NULL; | |
662 | } | |
663 | ||
e610499e RR |
664 | static inline bool is_module_address(unsigned long addr) |
665 | { | |
666 | return false; | |
667 | } | |
668 | ||
d5e50daf RD |
669 | static inline bool is_module_percpu_address(unsigned long addr) |
670 | { | |
671 | return false; | |
672 | } | |
673 | ||
e610499e | 674 | static inline bool is_module_text_address(unsigned long addr) |
4d435f9d | 675 | { |
e610499e | 676 | return false; |
4d435f9d IM |
677 | } |
678 | ||
1da177e4 LT |
679 | /* Get/put a kernel symbol (calls should be symmetric) */ |
680 | #define symbol_get(x) ({ extern typeof(x) x __attribute__((weak)); &(x); }) | |
e865d06b SL |
681 | #define symbol_put(x) do { } while (0) |
682 | #define symbol_put_addr(x) do { } while (0) | |
1da177e4 LT |
683 | |
684 | static inline void __module_get(struct module *module) | |
685 | { | |
686 | } | |
687 | ||
688 | static inline int try_module_get(struct module *module) | |
689 | { | |
690 | return 1; | |
691 | } | |
692 | ||
693 | static inline void module_put(struct module *module) | |
694 | { | |
695 | } | |
696 | ||
697 | #define module_name(mod) "kernel" | |
698 | ||
1da177e4 | 699 | /* For kallsyms to ask for address resolution. NULL means not found. */ |
92dfc9dc | 700 | static inline const char *module_address_lookup(unsigned long addr, |
6dd06c9f RR |
701 | unsigned long *symbolsize, |
702 | unsigned long *offset, | |
703 | char **modname, | |
704 | char *namebuf) | |
1da177e4 LT |
705 | { |
706 | return NULL; | |
707 | } | |
708 | ||
9d65cb4a AD |
709 | static inline int lookup_module_symbol_name(unsigned long addr, char *symname) |
710 | { | |
711 | return -ERANGE; | |
712 | } | |
713 | ||
a5c43dae AD |
714 | static inline int lookup_module_symbol_attrs(unsigned long addr, unsigned long *size, unsigned long *offset, char *modname, char *name) |
715 | { | |
716 | return -ERANGE; | |
717 | } | |
718 | ||
ea07890a AD |
719 | static inline int module_get_kallsym(unsigned int symnum, unsigned long *value, |
720 | char *type, char *name, | |
721 | char *module_name, int *exported) | |
1da177e4 | 722 | { |
ea07890a | 723 | return -ERANGE; |
1da177e4 LT |
724 | } |
725 | ||
726 | static inline unsigned long module_kallsyms_lookup_name(const char *name) | |
727 | { | |
728 | return 0; | |
729 | } | |
730 | ||
75a66614 AK |
731 | static inline int module_kallsyms_on_each_symbol(int (*fn)(void *, const char *, |
732 | struct module *, | |
733 | unsigned long), | |
734 | void *data) | |
735 | { | |
736 | return 0; | |
737 | } | |
738 | ||
e865d06b | 739 | static inline int register_module_notifier(struct notifier_block *nb) |
1da177e4 LT |
740 | { |
741 | /* no events will happen anyway, so this can always succeed */ | |
742 | return 0; | |
743 | } | |
744 | ||
e865d06b | 745 | static inline int unregister_module_notifier(struct notifier_block *nb) |
1da177e4 LT |
746 | { |
747 | return 0; | |
748 | } | |
749 | ||
750 | #define module_put_and_exit(code) do_exit(code) | |
751 | ||
752 | static inline void print_modules(void) | |
753 | { | |
754 | } | |
80c6e146 DT |
755 | |
756 | static inline bool module_requested_async_probing(struct module *module) | |
757 | { | |
758 | return false; | |
759 | } | |
760 | ||
562d2183 MG |
761 | static inline bool secure_modules(void) |
762 | { | |
763 | return false; | |
764 | } | |
ef665c1a RD |
765 | #endif /* CONFIG_MODULES */ |
766 | ||
ef665c1a | 767 | #ifdef CONFIG_SYSFS |
7405c1e1 GKH |
768 | extern struct kset *module_kset; |
769 | extern struct kobj_type module_ktype; | |
770 | extern int module_sysfs_initialized; | |
ef665c1a RD |
771 | #endif /* CONFIG_SYSFS */ |
772 | ||
1da177e4 LT |
773 | #define symbol_request(x) try_then_request_module(symbol_get(x), "symbol:" #x) |
774 | ||
775 | /* BELOW HERE ALL THESE ARE OBSOLETE AND WILL VANISH */ | |
776 | ||
1da177e4 LT |
777 | #define __MODULE_STRING(x) __stringify(x) |
778 | ||
84e1c6bb MC |
779 | #ifdef CONFIG_DEBUG_SET_MODULE_RONX |
780 | extern void set_all_modules_text_rw(void); | |
781 | extern void set_all_modules_text_ro(void); | |
444d13ff | 782 | extern void module_enable_ro(const struct module *mod, bool after_init); |
85c898db | 783 | extern void module_disable_ro(const struct module *mod); |
84e1c6bb MC |
784 | #else |
785 | static inline void set_all_modules_text_rw(void) { } | |
786 | static inline void set_all_modules_text_ro(void) { } | |
444d13ff | 787 | static inline void module_enable_ro(const struct module *mod, bool after_init) { } |
85c898db | 788 | static inline void module_disable_ro(const struct module *mod) { } |
84e1c6bb | 789 | #endif |
0d9c25dd AM |
790 | |
791 | #ifdef CONFIG_GENERIC_BUG | |
5336377d | 792 | void module_bug_finalize(const Elf_Ehdr *, const Elf_Shdr *, |
0d9c25dd AM |
793 | struct module *); |
794 | void module_bug_cleanup(struct module *); | |
795 | ||
796 | #else /* !CONFIG_GENERIC_BUG */ | |
797 | ||
5336377d | 798 | static inline void module_bug_finalize(const Elf_Ehdr *hdr, |
0d9c25dd AM |
799 | const Elf_Shdr *sechdrs, |
800 | struct module *mod) | |
801 | { | |
0d9c25dd AM |
802 | } |
803 | static inline void module_bug_cleanup(struct module *mod) {} | |
804 | #endif /* CONFIG_GENERIC_BUG */ | |
805 | ||
59afdc7b HX |
806 | #ifdef CONFIG_MODULE_SIG |
807 | static inline bool module_sig_ok(struct module *module) | |
808 | { | |
809 | return module->sig_ok; | |
810 | } | |
811 | #else /* !CONFIG_MODULE_SIG */ | |
812 | static inline bool module_sig_ok(struct module *module) | |
813 | { | |
814 | return true; | |
815 | } | |
816 | #endif /* CONFIG_MODULE_SIG */ | |
817 | ||
1da177e4 | 818 | #endif /* _LINUX_MODULE_H */ |