diff options
Diffstat (limited to 'kernel/module.c')
| -rw-r--r-- | kernel/module.c | 327 |
1 files changed, 213 insertions, 114 deletions
diff --git a/kernel/module.c b/kernel/module.c index 333fbcc96978..8c6b42840dd1 100644 --- a/kernel/module.c +++ b/kernel/module.c | |||
| @@ -72,7 +72,11 @@ | |||
| 72 | /* If this is set, the section belongs in the init part of the module */ | 72 | /* If this is set, the section belongs in the init part of the module */ |
| 73 | #define INIT_OFFSET_MASK (1UL << (BITS_PER_LONG-1)) | 73 | #define INIT_OFFSET_MASK (1UL << (BITS_PER_LONG-1)) |
| 74 | 74 | ||
| 75 | /* List of modules, protected by module_mutex or preempt_disable | 75 | /* |
| 76 | * Mutex protects: | ||
| 77 | * 1) List of modules (also safely readable with preempt_disable), | ||
| 78 | * 2) module_use links, | ||
| 79 | * 3) module_addr_min/module_addr_max. | ||
| 76 | * (delete uses stop_machine/add uses RCU list operations). */ | 80 | * (delete uses stop_machine/add uses RCU list operations). */ |
| 77 | DEFINE_MUTEX(module_mutex); | 81 | DEFINE_MUTEX(module_mutex); |
| 78 | EXPORT_SYMBOL_GPL(module_mutex); | 82 | EXPORT_SYMBOL_GPL(module_mutex); |
| @@ -90,7 +94,8 @@ static DECLARE_WAIT_QUEUE_HEAD(module_wq); | |||
| 90 | 94 | ||
| 91 | static BLOCKING_NOTIFIER_HEAD(module_notify_list); | 95 | static BLOCKING_NOTIFIER_HEAD(module_notify_list); |
| 92 | 96 | ||
| 93 | /* Bounds of module allocation, for speeding __module_address */ | 97 | /* Bounds of module allocation, for speeding __module_address. |
| 98 | * Protected by module_mutex. */ | ||
| 94 | static unsigned long module_addr_min = -1UL, module_addr_max = 0; | 99 | static unsigned long module_addr_min = -1UL, module_addr_max = 0; |
| 95 | 100 | ||
| 96 | int register_module_notifier(struct notifier_block * nb) | 101 | int register_module_notifier(struct notifier_block * nb) |
| @@ -329,7 +334,7 @@ static bool find_symbol_in_section(const struct symsearch *syms, | |||
| 329 | } | 334 | } |
| 330 | 335 | ||
| 331 | /* Find a symbol and return it, along with, (optional) crc and | 336 | /* Find a symbol and return it, along with, (optional) crc and |
| 332 | * (optional) module which owns it */ | 337 | * (optional) module which owns it. Needs preempt disabled or module_mutex. */ |
| 333 | const struct kernel_symbol *find_symbol(const char *name, | 338 | const struct kernel_symbol *find_symbol(const char *name, |
| 334 | struct module **owner, | 339 | struct module **owner, |
| 335 | const unsigned long **crc, | 340 | const unsigned long **crc, |
| @@ -403,7 +408,7 @@ static unsigned int find_pcpusec(Elf_Ehdr *hdr, | |||
| 403 | Elf_Shdr *sechdrs, | 408 | Elf_Shdr *sechdrs, |
| 404 | const char *secstrings) | 409 | const char *secstrings) |
| 405 | { | 410 | { |
| 406 | return find_sec(hdr, sechdrs, secstrings, ".data.percpu"); | 411 | return find_sec(hdr, sechdrs, secstrings, ".data..percpu"); |
| 407 | } | 412 | } |
| 408 | 413 | ||
| 409 | static void percpu_modcopy(struct module *mod, | 414 | static void percpu_modcopy(struct module *mod, |
| @@ -523,7 +528,8 @@ static void module_unload_init(struct module *mod) | |||
| 523 | { | 528 | { |
| 524 | int cpu; | 529 | int cpu; |
| 525 | 530 | ||
| 526 | INIT_LIST_HEAD(&mod->modules_which_use_me); | 531 | INIT_LIST_HEAD(&mod->source_list); |
| 532 | INIT_LIST_HEAD(&mod->target_list); | ||
| 527 | for_each_possible_cpu(cpu) { | 533 | for_each_possible_cpu(cpu) { |
| 528 | per_cpu_ptr(mod->refptr, cpu)->incs = 0; | 534 | per_cpu_ptr(mod->refptr, cpu)->incs = 0; |
| 529 | per_cpu_ptr(mod->refptr, cpu)->decs = 0; | 535 | per_cpu_ptr(mod->refptr, cpu)->decs = 0; |
| @@ -535,20 +541,13 @@ static void module_unload_init(struct module *mod) | |||
| 535 | mod->waiter = current; | 541 | mod->waiter = current; |
| 536 | } | 542 | } |
| 537 | 543 | ||
| 538 | /* modules using other modules */ | ||
| 539 | struct module_use | ||
| 540 | { | ||
| 541 | struct list_head list; | ||
| 542 | struct module *module_which_uses; | ||
| 543 | }; | ||
| 544 | |||
| 545 | /* Does a already use b? */ | 544 | /* Does a already use b? */ |
| 546 | static int already_uses(struct module *a, struct module *b) | 545 | static int already_uses(struct module *a, struct module *b) |
| 547 | { | 546 | { |
| 548 | struct module_use *use; | 547 | struct module_use *use; |
| 549 | 548 | ||
| 550 | list_for_each_entry(use, &b->modules_which_use_me, list) { | 549 | list_for_each_entry(use, &b->source_list, source_list) { |
| 551 | if (use->module_which_uses == a) { | 550 | if (use->source == a) { |
| 552 | DEBUGP("%s uses %s!\n", a->name, b->name); | 551 | DEBUGP("%s uses %s!\n", a->name, b->name); |
| 553 | return 1; | 552 | return 1; |
| 554 | } | 553 | } |
| @@ -557,62 +556,68 @@ static int already_uses(struct module *a, struct module *b) | |||
| 557 | return 0; | 556 | return 0; |
| 558 | } | 557 | } |
| 559 | 558 | ||
| 560 | /* Module a uses b */ | 559 | /* |
| 561 | int use_module(struct module *a, struct module *b) | 560 | * Module a uses b |
| 561 | * - we add 'a' as a "source", 'b' as a "target" of module use | ||
| 562 | * - the module_use is added to the list of 'b' sources (so | ||
| 563 | * 'b' can walk the list to see who sourced them), and of 'a' | ||
| 564 | * targets (so 'a' can see what modules it targets). | ||
| 565 | */ | ||
| 566 | static int add_module_usage(struct module *a, struct module *b) | ||
| 562 | { | 567 | { |
| 563 | struct module_use *use; | 568 | struct module_use *use; |
| 564 | int no_warn, err; | ||
| 565 | 569 | ||
| 566 | if (b == NULL || already_uses(a, b)) return 1; | 570 | DEBUGP("Allocating new usage for %s.\n", a->name); |
| 571 | use = kmalloc(sizeof(*use), GFP_ATOMIC); | ||
| 572 | if (!use) { | ||
| 573 | printk(KERN_WARNING "%s: out of memory loading\n", a->name); | ||
| 574 | return -ENOMEM; | ||
| 575 | } | ||
| 576 | |||
| 577 | use->source = a; | ||
| 578 | use->target = b; | ||
| 579 | list_add(&use->source_list, &b->source_list); | ||
| 580 | list_add(&use->target_list, &a->target_list); | ||
| 581 | return 0; | ||
| 582 | } | ||
| 583 | |||
| 584 | /* Module a uses b: caller needs module_mutex() */ | ||
| 585 | int ref_module(struct module *a, struct module *b) | ||
| 586 | { | ||
| 587 | int err; | ||
| 567 | 588 | ||
| 568 | /* If we're interrupted or time out, we fail. */ | 589 | if (b == NULL || already_uses(a, b)) |
| 569 | if (wait_event_interruptible_timeout( | ||
| 570 | module_wq, (err = strong_try_module_get(b)) != -EBUSY, | ||
| 571 | 30 * HZ) <= 0) { | ||
| 572 | printk("%s: gave up waiting for init of module %s.\n", | ||
| 573 | a->name, b->name); | ||
| 574 | return 0; | 590 | return 0; |
| 575 | } | ||
| 576 | 591 | ||
| 577 | /* If strong_try_module_get() returned a different error, we fail. */ | 592 | /* If module isn't available, we fail. */ |
| 593 | err = strong_try_module_get(b); | ||
| 578 | if (err) | 594 | if (err) |
| 579 | return 0; | 595 | return err; |
| 580 | 596 | ||
| 581 | DEBUGP("Allocating new usage for %s.\n", a->name); | 597 | err = add_module_usage(a, b); |
| 582 | use = kmalloc(sizeof(*use), GFP_ATOMIC); | 598 | if (err) { |
| 583 | if (!use) { | ||
| 584 | printk("%s: out of memory loading\n", a->name); | ||
| 585 | module_put(b); | 599 | module_put(b); |
| 586 | return 0; | 600 | return err; |
| 587 | } | 601 | } |
| 588 | 602 | return 0; | |
| 589 | use->module_which_uses = a; | ||
| 590 | list_add(&use->list, &b->modules_which_use_me); | ||
| 591 | no_warn = sysfs_create_link(b->holders_dir, &a->mkobj.kobj, a->name); | ||
| 592 | return 1; | ||
| 593 | } | 603 | } |
| 594 | EXPORT_SYMBOL_GPL(use_module); | 604 | EXPORT_SYMBOL_GPL(ref_module); |
| 595 | 605 | ||
| 596 | /* Clear the unload stuff of the module. */ | 606 | /* Clear the unload stuff of the module. */ |
| 597 | static void module_unload_free(struct module *mod) | 607 | static void module_unload_free(struct module *mod) |
| 598 | { | 608 | { |
| 599 | struct module *i; | 609 | struct module_use *use, *tmp; |
| 600 | 610 | ||
| 601 | list_for_each_entry(i, &modules, list) { | 611 | mutex_lock(&module_mutex); |
| 602 | struct module_use *use; | 612 | list_for_each_entry_safe(use, tmp, &mod->target_list, target_list) { |
| 603 | 613 | struct module *i = use->target; | |
| 604 | list_for_each_entry(use, &i->modules_which_use_me, list) { | 614 | DEBUGP("%s unusing %s\n", mod->name, i->name); |
| 605 | if (use->module_which_uses == mod) { | 615 | module_put(i); |
| 606 | DEBUGP("%s unusing %s\n", mod->name, i->name); | 616 | list_del(&use->source_list); |
| 607 | module_put(i); | 617 | list_del(&use->target_list); |
| 608 | list_del(&use->list); | 618 | kfree(use); |
| 609 | kfree(use); | ||
| 610 | sysfs_remove_link(i->holders_dir, mod->name); | ||
| 611 | /* There can be at most one match. */ | ||
| 612 | break; | ||
| 613 | } | ||
| 614 | } | ||
| 615 | } | 619 | } |
| 620 | mutex_unlock(&module_mutex); | ||
| 616 | } | 621 | } |
| 617 | 622 | ||
| 618 | #ifdef CONFIG_MODULE_FORCE_UNLOAD | 623 | #ifdef CONFIG_MODULE_FORCE_UNLOAD |
| @@ -735,7 +740,7 @@ SYSCALL_DEFINE2(delete_module, const char __user *, name_user, | |||
| 735 | goto out; | 740 | goto out; |
| 736 | } | 741 | } |
| 737 | 742 | ||
| 738 | if (!list_empty(&mod->modules_which_use_me)) { | 743 | if (!list_empty(&mod->source_list)) { |
| 739 | /* Other modules depend on us: get rid of them first. */ | 744 | /* Other modules depend on us: get rid of them first. */ |
| 740 | ret = -EWOULDBLOCK; | 745 | ret = -EWOULDBLOCK; |
| 741 | goto out; | 746 | goto out; |
| @@ -779,13 +784,14 @@ SYSCALL_DEFINE2(delete_module, const char __user *, name_user, | |||
| 779 | blocking_notifier_call_chain(&module_notify_list, | 784 | blocking_notifier_call_chain(&module_notify_list, |
| 780 | MODULE_STATE_GOING, mod); | 785 | MODULE_STATE_GOING, mod); |
| 781 | async_synchronize_full(); | 786 | async_synchronize_full(); |
| 782 | mutex_lock(&module_mutex); | 787 | |
| 783 | /* Store the name of the last unloaded module for diagnostic purposes */ | 788 | /* Store the name of the last unloaded module for diagnostic purposes */ |
| 784 | strlcpy(last_unloaded_module, mod->name, sizeof(last_unloaded_module)); | 789 | strlcpy(last_unloaded_module, mod->name, sizeof(last_unloaded_module)); |
| 785 | ddebug_remove_module(mod->name); | 790 | ddebug_remove_module(mod->name); |
| 786 | free_module(mod); | ||
| 787 | 791 | ||
| 788 | out: | 792 | free_module(mod); |
| 793 | return 0; | ||
| 794 | out: | ||
| 789 | mutex_unlock(&module_mutex); | 795 | mutex_unlock(&module_mutex); |
| 790 | return ret; | 796 | return ret; |
| 791 | } | 797 | } |
| @@ -799,9 +805,9 @@ static inline void print_unload_info(struct seq_file *m, struct module *mod) | |||
| 799 | 805 | ||
| 800 | /* Always include a trailing , so userspace can differentiate | 806 | /* Always include a trailing , so userspace can differentiate |
| 801 | between this and the old multi-field proc format. */ | 807 | between this and the old multi-field proc format. */ |
| 802 | list_for_each_entry(use, &mod->modules_which_use_me, list) { | 808 | list_for_each_entry(use, &mod->source_list, source_list) { |
| 803 | printed_something = 1; | 809 | printed_something = 1; |
| 804 | seq_printf(m, "%s,", use->module_which_uses->name); | 810 | seq_printf(m, "%s,", use->source->name); |
| 805 | } | 811 | } |
| 806 | 812 | ||
| 807 | if (mod->init != NULL && mod->exit == NULL) { | 813 | if (mod->init != NULL && mod->exit == NULL) { |
| @@ -880,11 +886,11 @@ static inline void module_unload_free(struct module *mod) | |||
| 880 | { | 886 | { |
| 881 | } | 887 | } |
| 882 | 888 | ||
| 883 | int use_module(struct module *a, struct module *b) | 889 | int ref_module(struct module *a, struct module *b) |
| 884 | { | 890 | { |
| 885 | return strong_try_module_get(b) == 0; | 891 | return strong_try_module_get(b); |
| 886 | } | 892 | } |
| 887 | EXPORT_SYMBOL_GPL(use_module); | 893 | EXPORT_SYMBOL_GPL(ref_module); |
| 888 | 894 | ||
| 889 | static inline void module_unload_init(struct module *mod) | 895 | static inline void module_unload_init(struct module *mod) |
| 890 | { | 896 | { |
| @@ -1001,6 +1007,8 @@ static inline int check_modstruct_version(Elf_Shdr *sechdrs, | |||
| 1001 | { | 1007 | { |
| 1002 | const unsigned long *crc; | 1008 | const unsigned long *crc; |
| 1003 | 1009 | ||
| 1010 | /* Since this should be found in kernel (which can't be removed), | ||
| 1011 | * no locking is necessary. */ | ||
| 1004 | if (!find_symbol(MODULE_SYMBOL_PREFIX "module_layout", NULL, | 1012 | if (!find_symbol(MODULE_SYMBOL_PREFIX "module_layout", NULL, |
| 1005 | &crc, true, false)) | 1013 | &crc, true, false)) |
| 1006 | BUG(); | 1014 | BUG(); |
| @@ -1043,29 +1051,62 @@ static inline int same_magic(const char *amagic, const char *bmagic, | |||
| 1043 | } | 1051 | } |
| 1044 | #endif /* CONFIG_MODVERSIONS */ | 1052 | #endif /* CONFIG_MODVERSIONS */ |
| 1045 | 1053 | ||
| 1046 | /* Resolve a symbol for this module. I.e. if we find one, record usage. | 1054 | /* Resolve a symbol for this module. I.e. if we find one, record usage. */ |
| 1047 | Must be holding module_mutex. */ | ||
| 1048 | static const struct kernel_symbol *resolve_symbol(Elf_Shdr *sechdrs, | 1055 | static const struct kernel_symbol *resolve_symbol(Elf_Shdr *sechdrs, |
| 1049 | unsigned int versindex, | 1056 | unsigned int versindex, |
| 1050 | const char *name, | 1057 | const char *name, |
| 1051 | struct module *mod) | 1058 | struct module *mod, |
| 1059 | char ownername[]) | ||
| 1052 | { | 1060 | { |
| 1053 | struct module *owner; | 1061 | struct module *owner; |
| 1054 | const struct kernel_symbol *sym; | 1062 | const struct kernel_symbol *sym; |
| 1055 | const unsigned long *crc; | 1063 | const unsigned long *crc; |
| 1064 | int err; | ||
| 1056 | 1065 | ||
| 1066 | mutex_lock(&module_mutex); | ||
| 1057 | sym = find_symbol(name, &owner, &crc, | 1067 | sym = find_symbol(name, &owner, &crc, |
| 1058 | !(mod->taints & (1 << TAINT_PROPRIETARY_MODULE)), true); | 1068 | !(mod->taints & (1 << TAINT_PROPRIETARY_MODULE)), true); |
| 1059 | /* use_module can fail due to OOM, | 1069 | if (!sym) |
| 1060 | or module initialization or unloading */ | 1070 | goto unlock; |
| 1061 | if (sym) { | 1071 | |
| 1062 | if (!check_version(sechdrs, versindex, name, mod, crc, owner) | 1072 | if (!check_version(sechdrs, versindex, name, mod, crc, owner)) { |
| 1063 | || !use_module(mod, owner)) | 1073 | sym = ERR_PTR(-EINVAL); |
| 1064 | sym = NULL; | 1074 | goto getname; |
| 1075 | } | ||
| 1076 | |||
| 1077 | err = ref_module(mod, owner); | ||
| 1078 | if (err) { | ||
| 1079 | sym = ERR_PTR(err); | ||
| 1080 | goto getname; | ||
| 1065 | } | 1081 | } |
| 1082 | |||
| 1083 | getname: | ||
| 1084 | /* We must make copy under the lock if we failed to get ref. */ | ||
| 1085 | strncpy(ownername, module_name(owner), MODULE_NAME_LEN); | ||
| 1086 | unlock: | ||
| 1087 | mutex_unlock(&module_mutex); | ||
| 1066 | return sym; | 1088 | return sym; |
| 1067 | } | 1089 | } |
| 1068 | 1090 | ||
| 1091 | static const struct kernel_symbol *resolve_symbol_wait(Elf_Shdr *sechdrs, | ||
| 1092 | unsigned int versindex, | ||
| 1093 | const char *name, | ||
| 1094 | struct module *mod) | ||
| 1095 | { | ||
| 1096 | const struct kernel_symbol *ksym; | ||
| 1097 | char ownername[MODULE_NAME_LEN]; | ||
| 1098 | |||
| 1099 | if (wait_event_interruptible_timeout(module_wq, | ||
| 1100 | !IS_ERR(ksym = resolve_symbol(sechdrs, versindex, name, | ||
| 1101 | mod, ownername)) || | ||
| 1102 | PTR_ERR(ksym) != -EBUSY, | ||
| 1103 | 30 * HZ) <= 0) { | ||
| 1104 | printk(KERN_WARNING "%s: gave up waiting for init of module %s.\n", | ||
| 1105 | mod->name, ownername); | ||
| 1106 | } | ||
| 1107 | return ksym; | ||
| 1108 | } | ||
| 1109 | |||
| 1069 | /* | 1110 | /* |
| 1070 | * /sys/module/foo/sections stuff | 1111 | * /sys/module/foo/sections stuff |
| 1071 | * J. Corbet <corbet@lwn.net> | 1112 | * J. Corbet <corbet@lwn.net> |
| @@ -1295,7 +1336,34 @@ static inline void remove_notes_attrs(struct module *mod) | |||
| 1295 | #endif | 1336 | #endif |
| 1296 | 1337 | ||
| 1297 | #ifdef CONFIG_SYSFS | 1338 | #ifdef CONFIG_SYSFS |
| 1298 | int module_add_modinfo_attrs(struct module *mod) | 1339 | static void add_usage_links(struct module *mod) |
| 1340 | { | ||
| 1341 | #ifdef CONFIG_MODULE_UNLOAD | ||
| 1342 | struct module_use *use; | ||
| 1343 | int nowarn; | ||
| 1344 | |||
| 1345 | mutex_lock(&module_mutex); | ||
| 1346 | list_for_each_entry(use, &mod->target_list, target_list) { | ||
| 1347 | nowarn = sysfs_create_link(use->target->holders_dir, | ||
| 1348 | &mod->mkobj.kobj, mod->name); | ||
| 1349 | } | ||
| 1350 | mutex_unlock(&module_mutex); | ||
| 1351 | #endif | ||
| 1352 | } | ||
| 1353 | |||
| 1354 | static void del_usage_links(struct module *mod) | ||
| 1355 | { | ||
| 1356 | #ifdef CONFIG_MODULE_UNLOAD | ||
| 1357 | struct module_use *use; | ||
| 1358 | |||
| 1359 | mutex_lock(&module_mutex); | ||
| 1360 | list_for_each_entry(use, &mod->target_list, target_list) | ||
| 1361 | sysfs_remove_link(use->target->holders_dir, mod->name); | ||
| 1362 | mutex_unlock(&module_mutex); | ||
| 1363 | #endif | ||
| 1364 | } | ||
| 1365 | |||
| 1366 | static int module_add_modinfo_attrs(struct module *mod) | ||
| 1299 | { | 1367 | { |
| 1300 | struct module_attribute *attr; | 1368 | struct module_attribute *attr; |
| 1301 | struct module_attribute *temp_attr; | 1369 | struct module_attribute *temp_attr; |
| @@ -1321,7 +1389,7 @@ int module_add_modinfo_attrs(struct module *mod) | |||
| 1321 | return error; | 1389 | return error; |
| 1322 | } | 1390 | } |
| 1323 | 1391 | ||
| 1324 | void module_remove_modinfo_attrs(struct module *mod) | 1392 | static void module_remove_modinfo_attrs(struct module *mod) |
| 1325 | { | 1393 | { |
| 1326 | struct module_attribute *attr; | 1394 | struct module_attribute *attr; |
| 1327 | int i; | 1395 | int i; |
| @@ -1337,7 +1405,7 @@ void module_remove_modinfo_attrs(struct module *mod) | |||
| 1337 | kfree(mod->modinfo_attrs); | 1405 | kfree(mod->modinfo_attrs); |
| 1338 | } | 1406 | } |
| 1339 | 1407 | ||
| 1340 | int mod_sysfs_init(struct module *mod) | 1408 | static int mod_sysfs_init(struct module *mod) |
| 1341 | { | 1409 | { |
| 1342 | int err; | 1410 | int err; |
| 1343 | struct kobject *kobj; | 1411 | struct kobject *kobj; |
| @@ -1371,12 +1439,16 @@ out: | |||
| 1371 | return err; | 1439 | return err; |
| 1372 | } | 1440 | } |
| 1373 | 1441 | ||
| 1374 | int mod_sysfs_setup(struct module *mod, | 1442 | static int mod_sysfs_setup(struct module *mod, |
| 1375 | struct kernel_param *kparam, | 1443 | struct kernel_param *kparam, |
| 1376 | unsigned int num_params) | 1444 | unsigned int num_params) |
| 1377 | { | 1445 | { |
| 1378 | int err; | 1446 | int err; |
| 1379 | 1447 | ||
| 1448 | err = mod_sysfs_init(mod); | ||
| 1449 | if (err) | ||
| 1450 | goto out; | ||
| 1451 | |||
| 1380 | mod->holders_dir = kobject_create_and_add("holders", &mod->mkobj.kobj); | 1452 | mod->holders_dir = kobject_create_and_add("holders", &mod->mkobj.kobj); |
| 1381 | if (!mod->holders_dir) { | 1453 | if (!mod->holders_dir) { |
| 1382 | err = -ENOMEM; | 1454 | err = -ENOMEM; |
| @@ -1391,6 +1463,8 @@ int mod_sysfs_setup(struct module *mod, | |||
| 1391 | if (err) | 1463 | if (err) |
| 1392 | goto out_unreg_param; | 1464 | goto out_unreg_param; |
| 1393 | 1465 | ||
| 1466 | add_usage_links(mod); | ||
| 1467 | |||
| 1394 | kobject_uevent(&mod->mkobj.kobj, KOBJ_ADD); | 1468 | kobject_uevent(&mod->mkobj.kobj, KOBJ_ADD); |
| 1395 | return 0; | 1469 | return 0; |
| 1396 | 1470 | ||
| @@ -1400,6 +1474,7 @@ out_unreg_holders: | |||
| 1400 | kobject_put(mod->holders_dir); | 1474 | kobject_put(mod->holders_dir); |
| 1401 | out_unreg: | 1475 | out_unreg: |
| 1402 | kobject_put(&mod->mkobj.kobj); | 1476 | kobject_put(&mod->mkobj.kobj); |
| 1477 | out: | ||
| 1403 | return err; | 1478 | return err; |
| 1404 | } | 1479 | } |
| 1405 | 1480 | ||
| @@ -1410,14 +1485,40 @@ static void mod_sysfs_fini(struct module *mod) | |||
| 1410 | 1485 | ||
| 1411 | #else /* CONFIG_SYSFS */ | 1486 | #else /* CONFIG_SYSFS */ |
| 1412 | 1487 | ||
| 1488 | static inline int mod_sysfs_init(struct module *mod) | ||
| 1489 | { | ||
| 1490 | return 0; | ||
| 1491 | } | ||
| 1492 | |||
| 1493 | static inline int mod_sysfs_setup(struct module *mod, | ||
| 1494 | struct kernel_param *kparam, | ||
| 1495 | unsigned int num_params) | ||
| 1496 | { | ||
| 1497 | return 0; | ||
| 1498 | } | ||
| 1499 | |||
| 1500 | static inline int module_add_modinfo_attrs(struct module *mod) | ||
| 1501 | { | ||
| 1502 | return 0; | ||
| 1503 | } | ||
| 1504 | |||
| 1505 | static inline void module_remove_modinfo_attrs(struct module *mod) | ||
| 1506 | { | ||
| 1507 | } | ||
| 1508 | |||
| 1413 | static void mod_sysfs_fini(struct module *mod) | 1509 | static void mod_sysfs_fini(struct module *mod) |
| 1414 | { | 1510 | { |
| 1415 | } | 1511 | } |
| 1416 | 1512 | ||
| 1513 | static void del_usage_links(struct module *mod) | ||
| 1514 | { | ||
| 1515 | } | ||
| 1516 | |||
| 1417 | #endif /* CONFIG_SYSFS */ | 1517 | #endif /* CONFIG_SYSFS */ |
| 1418 | 1518 | ||
| 1419 | static void mod_kobject_remove(struct module *mod) | 1519 | static void mod_kobject_remove(struct module *mod) |
| 1420 | { | 1520 | { |
| 1521 | del_usage_links(mod); | ||
| 1421 | module_remove_modinfo_attrs(mod); | 1522 | module_remove_modinfo_attrs(mod); |
| 1422 | module_param_sysfs_remove(mod); | 1523 | module_param_sysfs_remove(mod); |
| 1423 | kobject_put(mod->mkobj.drivers_dir); | 1524 | kobject_put(mod->mkobj.drivers_dir); |
| @@ -1436,13 +1537,15 @@ static int __unlink_module(void *_mod) | |||
| 1436 | return 0; | 1537 | return 0; |
| 1437 | } | 1538 | } |
| 1438 | 1539 | ||
| 1439 | /* Free a module, remove from lists, etc (must hold module_mutex). */ | 1540 | /* Free a module, remove from lists, etc. */ |
| 1440 | static void free_module(struct module *mod) | 1541 | static void free_module(struct module *mod) |
| 1441 | { | 1542 | { |
| 1442 | trace_module_free(mod); | 1543 | trace_module_free(mod); |
| 1443 | 1544 | ||
| 1444 | /* Delete from various lists */ | 1545 | /* Delete from various lists */ |
| 1546 | mutex_lock(&module_mutex); | ||
| 1445 | stop_machine(__unlink_module, mod, NULL); | 1547 | stop_machine(__unlink_module, mod, NULL); |
| 1548 | mutex_unlock(&module_mutex); | ||
| 1446 | remove_notes_attrs(mod); | 1549 | remove_notes_attrs(mod); |
| 1447 | remove_sect_attrs(mod); | 1550 | remove_sect_attrs(mod); |
| 1448 | mod_kobject_remove(mod); | 1551 | mod_kobject_remove(mod); |
| @@ -1493,6 +1596,8 @@ EXPORT_SYMBOL_GPL(__symbol_get); | |||
| 1493 | /* | 1596 | /* |
| 1494 | * Ensure that an exported symbol [global namespace] does not already exist | 1597 | * Ensure that an exported symbol [global namespace] does not already exist |
| 1495 | * in the kernel or in some other module's exported symbol table. | 1598 | * in the kernel or in some other module's exported symbol table. |
| 1599 | * | ||
| 1600 | * You must hold the module_mutex. | ||
| 1496 | */ | 1601 | */ |
| 1497 | static int verify_export_symbols(struct module *mod) | 1602 | static int verify_export_symbols(struct module *mod) |
| 1498 | { | 1603 | { |
| @@ -1558,21 +1663,23 @@ static int simplify_symbols(Elf_Shdr *sechdrs, | |||
| 1558 | break; | 1663 | break; |
| 1559 | 1664 | ||
| 1560 | case SHN_UNDEF: | 1665 | case SHN_UNDEF: |
| 1561 | ksym = resolve_symbol(sechdrs, versindex, | 1666 | ksym = resolve_symbol_wait(sechdrs, versindex, |
| 1562 | strtab + sym[i].st_name, mod); | 1667 | strtab + sym[i].st_name, |
| 1668 | mod); | ||
| 1563 | /* Ok if resolved. */ | 1669 | /* Ok if resolved. */ |
| 1564 | if (ksym) { | 1670 | if (ksym && !IS_ERR(ksym)) { |
| 1565 | sym[i].st_value = ksym->value; | 1671 | sym[i].st_value = ksym->value; |
| 1566 | break; | 1672 | break; |
| 1567 | } | 1673 | } |
| 1568 | 1674 | ||
| 1569 | /* Ok if weak. */ | 1675 | /* Ok if weak. */ |
| 1570 | if (ELF_ST_BIND(sym[i].st_info) == STB_WEAK) | 1676 | if (!ksym && ELF_ST_BIND(sym[i].st_info) == STB_WEAK) |
| 1571 | break; | 1677 | break; |
| 1572 | 1678 | ||
| 1573 | printk(KERN_WARNING "%s: Unknown symbol %s\n", | 1679 | printk(KERN_WARNING "%s: Unknown symbol %s (err %li)\n", |
| 1574 | mod->name, strtab + sym[i].st_name); | 1680 | mod->name, strtab + sym[i].st_name, |
| 1575 | ret = -ENOENT; | 1681 | PTR_ERR(ksym)); |
| 1682 | ret = PTR_ERR(ksym) ?: -ENOENT; | ||
| 1576 | break; | 1683 | break; |
| 1577 | 1684 | ||
| 1578 | default: | 1685 | default: |
| @@ -1960,11 +2067,13 @@ static void *module_alloc_update_bounds(unsigned long size) | |||
| 1960 | void *ret = module_alloc(size); | 2067 | void *ret = module_alloc(size); |
| 1961 | 2068 | ||
| 1962 | if (ret) { | 2069 | if (ret) { |
| 2070 | mutex_lock(&module_mutex); | ||
| 1963 | /* Update module bounds. */ | 2071 | /* Update module bounds. */ |
| 1964 | if ((unsigned long)ret < module_addr_min) | 2072 | if ((unsigned long)ret < module_addr_min) |
| 1965 | module_addr_min = (unsigned long)ret; | 2073 | module_addr_min = (unsigned long)ret; |
| 1966 | if ((unsigned long)ret + size > module_addr_max) | 2074 | if ((unsigned long)ret + size > module_addr_max) |
| 1967 | module_addr_max = (unsigned long)ret + size; | 2075 | module_addr_max = (unsigned long)ret + size; |
| 2076 | mutex_unlock(&module_mutex); | ||
| 1968 | } | 2077 | } |
| 1969 | return ret; | 2078 | return ret; |
| 1970 | } | 2079 | } |
| @@ -2014,6 +2123,7 @@ static noinline struct module *load_module(void __user *umod, | |||
| 2014 | long err = 0; | 2123 | long err = 0; |
| 2015 | void *ptr = NULL; /* Stops spurious gcc warning */ | 2124 | void *ptr = NULL; /* Stops spurious gcc warning */ |
| 2016 | unsigned long symoffs, stroffs, *strmap; | 2125 | unsigned long symoffs, stroffs, *strmap; |
| 2126 | void __percpu *percpu; | ||
| 2017 | 2127 | ||
| 2018 | mm_segment_t old_fs; | 2128 | mm_segment_t old_fs; |
| 2019 | 2129 | ||
| @@ -2138,11 +2248,6 @@ static noinline struct module *load_module(void __user *umod, | |||
| 2138 | goto free_mod; | 2248 | goto free_mod; |
| 2139 | } | 2249 | } |
| 2140 | 2250 | ||
| 2141 | if (find_module(mod->name)) { | ||
| 2142 | err = -EEXIST; | ||
| 2143 | goto free_mod; | ||
| 2144 | } | ||
| 2145 | |||
| 2146 | mod->state = MODULE_STATE_COMING; | 2251 | mod->state = MODULE_STATE_COMING; |
| 2147 | 2252 | ||
| 2148 | /* Allow arches to frob section contents and sizes. */ | 2253 | /* Allow arches to frob section contents and sizes. */ |
| @@ -2158,6 +2263,8 @@ static noinline struct module *load_module(void __user *umod, | |||
| 2158 | goto free_mod; | 2263 | goto free_mod; |
| 2159 | sechdrs[pcpuindex].sh_flags &= ~(unsigned long)SHF_ALLOC; | 2264 | sechdrs[pcpuindex].sh_flags &= ~(unsigned long)SHF_ALLOC; |
| 2160 | } | 2265 | } |
| 2266 | /* Keep this around for failure path. */ | ||
| 2267 | percpu = mod_percpu(mod); | ||
| 2161 | 2268 | ||
| 2162 | /* Determine total sizes, and put offsets in sh_entsize. For now | 2269 | /* Determine total sizes, and put offsets in sh_entsize. For now |
| 2163 | this is done generically; there doesn't appear to be any | 2270 | this is done generically; there doesn't appear to be any |
| @@ -2231,11 +2338,6 @@ static noinline struct module *load_module(void __user *umod, | |||
| 2231 | /* Now we've moved module, initialize linked lists, etc. */ | 2338 | /* Now we've moved module, initialize linked lists, etc. */ |
| 2232 | module_unload_init(mod); | 2339 | module_unload_init(mod); |
| 2233 | 2340 | ||
| 2234 | /* add kobject, so we can reference it. */ | ||
| 2235 | err = mod_sysfs_init(mod); | ||
| 2236 | if (err) | ||
| 2237 | goto free_unload; | ||
| 2238 | |||
| 2239 | /* Set up license info based on the info section */ | 2341 | /* Set up license info based on the info section */ |
| 2240 | set_license(mod, get_modinfo(sechdrs, infoindex, "license")); | 2342 | set_license(mod, get_modinfo(sechdrs, infoindex, "license")); |
| 2241 | 2343 | ||
| @@ -2360,11 +2462,6 @@ static noinline struct module *load_module(void __user *umod, | |||
| 2360 | goto cleanup; | 2462 | goto cleanup; |
| 2361 | } | 2463 | } |
| 2362 | 2464 | ||
| 2363 | /* Find duplicate symbols */ | ||
| 2364 | err = verify_export_symbols(mod); | ||
| 2365 | if (err < 0) | ||
| 2366 | goto cleanup; | ||
| 2367 | |||
| 2368 | /* Set up and sort exception table */ | 2465 | /* Set up and sort exception table */ |
| 2369 | mod->extable = section_objs(hdr, sechdrs, secstrings, "__ex_table", | 2466 | mod->extable = section_objs(hdr, sechdrs, secstrings, "__ex_table", |
| 2370 | sizeof(*mod->extable), &mod->num_exentries); | 2467 | sizeof(*mod->extable), &mod->num_exentries); |
| @@ -2423,7 +2520,19 @@ static noinline struct module *load_module(void __user *umod, | |||
| 2423 | * function to insert in a way safe to concurrent readers. | 2520 | * function to insert in a way safe to concurrent readers. |
| 2424 | * The mutex protects against concurrent writers. | 2521 | * The mutex protects against concurrent writers. |
| 2425 | */ | 2522 | */ |
| 2523 | mutex_lock(&module_mutex); | ||
| 2524 | if (find_module(mod->name)) { | ||
| 2525 | err = -EEXIST; | ||
| 2526 | goto unlock; | ||
| 2527 | } | ||
| 2528 | |||
| 2529 | /* Find duplicate symbols */ | ||
| 2530 | err = verify_export_symbols(mod); | ||
| 2531 | if (err < 0) | ||
| 2532 | goto unlock; | ||
| 2533 | |||
| 2426 | list_add_rcu(&mod->list, &modules); | 2534 | list_add_rcu(&mod->list, &modules); |
| 2535 | mutex_unlock(&module_mutex); | ||
| 2427 | 2536 | ||
| 2428 | err = parse_args(mod->name, mod->args, mod->kp, mod->num_kp, NULL); | 2537 | err = parse_args(mod->name, mod->args, mod->kp, mod->num_kp, NULL); |
| 2429 | if (err < 0) | 2538 | if (err < 0) |
| @@ -2432,6 +2541,7 @@ static noinline struct module *load_module(void __user *umod, | |||
| 2432 | err = mod_sysfs_setup(mod, mod->kp, mod->num_kp); | 2541 | err = mod_sysfs_setup(mod, mod->kp, mod->num_kp); |
| 2433 | if (err < 0) | 2542 | if (err < 0) |
| 2434 | goto unlink; | 2543 | goto unlink; |
| 2544 | |||
| 2435 | add_sect_attrs(mod, hdr->e_shnum, secstrings, sechdrs); | 2545 | add_sect_attrs(mod, hdr->e_shnum, secstrings, sechdrs); |
| 2436 | add_notes_attrs(mod, hdr->e_shnum, secstrings, sechdrs); | 2546 | add_notes_attrs(mod, hdr->e_shnum, secstrings, sechdrs); |
| 2437 | 2547 | ||
| @@ -2444,15 +2554,15 @@ static noinline struct module *load_module(void __user *umod, | |||
| 2444 | return mod; | 2554 | return mod; |
| 2445 | 2555 | ||
| 2446 | unlink: | 2556 | unlink: |
| 2557 | mutex_lock(&module_mutex); | ||
| 2447 | /* Unlink carefully: kallsyms could be walking list. */ | 2558 | /* Unlink carefully: kallsyms could be walking list. */ |
| 2448 | list_del_rcu(&mod->list); | 2559 | list_del_rcu(&mod->list); |
| 2560 | unlock: | ||
| 2561 | mutex_unlock(&module_mutex); | ||
| 2449 | synchronize_sched(); | 2562 | synchronize_sched(); |
| 2450 | module_arch_cleanup(mod); | 2563 | module_arch_cleanup(mod); |
| 2451 | cleanup: | 2564 | cleanup: |
| 2452 | free_modinfo(mod); | 2565 | free_modinfo(mod); |
| 2453 | kobject_del(&mod->mkobj.kobj); | ||
| 2454 | kobject_put(&mod->mkobj.kobj); | ||
| 2455 | free_unload: | ||
| 2456 | module_unload_free(mod); | 2566 | module_unload_free(mod); |
| 2457 | #if defined(CONFIG_MODULE_UNLOAD) | 2567 | #if defined(CONFIG_MODULE_UNLOAD) |
| 2458 | free_percpu(mod->refptr); | 2568 | free_percpu(mod->refptr); |
| @@ -2463,7 +2573,7 @@ static noinline struct module *load_module(void __user *umod, | |||
| 2463 | module_free(mod, mod->module_core); | 2573 | module_free(mod, mod->module_core); |
| 2464 | /* mod will be freed with core. Don't access it beyond this line! */ | 2574 | /* mod will be freed with core. Don't access it beyond this line! */ |
| 2465 | free_percpu: | 2575 | free_percpu: |
| 2466 | percpu_modfree(mod); | 2576 | free_percpu(percpu); |
| 2467 | free_mod: | 2577 | free_mod: |
| 2468 | kfree(args); | 2578 | kfree(args); |
| 2469 | kfree(strmap); | 2579 | kfree(strmap); |
| @@ -2499,19 +2609,10 @@ SYSCALL_DEFINE3(init_module, void __user *, umod, | |||
| 2499 | if (!capable(CAP_SYS_MODULE) || modules_disabled) | 2609 | if (!capable(CAP_SYS_MODULE) || modules_disabled) |
| 2500 | return -EPERM; | 2610 | return -EPERM; |
| 2501 | 2611 | ||
| 2502 | /* Only one module load at a time, please */ | ||
| 2503 | if (mutex_lock_interruptible(&module_mutex) != 0) | ||
| 2504 | return -EINTR; | ||
| 2505 | |||
| 2506 | /* Do all the hard work */ | 2612 | /* Do all the hard work */ |
| 2507 | mod = load_module(umod, len, uargs); | 2613 | mod = load_module(umod, len, uargs); |
| 2508 | if (IS_ERR(mod)) { | 2614 | if (IS_ERR(mod)) |
| 2509 | mutex_unlock(&module_mutex); | ||
| 2510 | return PTR_ERR(mod); | 2615 | return PTR_ERR(mod); |
| 2511 | } | ||
| 2512 | |||
| 2513 | /* Drop lock so they can recurse */ | ||
| 2514 | mutex_unlock(&module_mutex); | ||
| 2515 | 2616 | ||
| 2516 | blocking_notifier_call_chain(&module_notify_list, | 2617 | blocking_notifier_call_chain(&module_notify_list, |
| 2517 | MODULE_STATE_COMING, mod); | 2618 | MODULE_STATE_COMING, mod); |
| @@ -2528,9 +2629,7 @@ SYSCALL_DEFINE3(init_module, void __user *, umod, | |||
| 2528 | module_put(mod); | 2629 | module_put(mod); |
| 2529 | blocking_notifier_call_chain(&module_notify_list, | 2630 | blocking_notifier_call_chain(&module_notify_list, |
| 2530 | MODULE_STATE_GOING, mod); | 2631 | MODULE_STATE_GOING, mod); |
| 2531 | mutex_lock(&module_mutex); | ||
| 2532 | free_module(mod); | 2632 | free_module(mod); |
| 2533 | mutex_unlock(&module_mutex); | ||
| 2534 | wake_up(&module_wq); | 2633 | wake_up(&module_wq); |
| 2535 | return ret; | 2634 | return ret; |
| 2536 | } | 2635 | } |
