1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #pragma ident "%Z%%M% %I% %E% SMI" 27 28 /* 29 * Kernel's linker/loader 30 */ 31 32 #include <sys/types.h> 33 #include <sys/param.h> 34 #include <sys/sysmacros.h> 35 #include <sys/systm.h> 36 #include <sys/user.h> 37 #include <sys/kmem.h> 38 #include <sys/reboot.h> 39 #include <sys/bootconf.h> 40 #include <sys/debug.h> 41 #include <sys/uio.h> 42 #include <sys/file.h> 43 #include <sys/vnode.h> 44 #include <sys/user.h> 45 #include <sys/mman.h> 46 #include <vm/as.h> 47 #include <vm/seg_kp.h> 48 #include <vm/seg_kmem.h> 49 #include <sys/elf.h> 50 #include <sys/elf_notes.h> 51 #include <sys/vmsystm.h> 52 #include <sys/kdi.h> 53 #include <sys/atomic.h> 54 #include <sys/kmdb.h> 55 56 #include <sys/link.h> 57 #include <sys/kobj.h> 58 #include <sys/ksyms.h> 59 #include <sys/disp.h> 60 #include <sys/modctl.h> 61 #include <sys/varargs.h> 62 #include <sys/kstat.h> 63 #include <sys/kobj_impl.h> 64 #include <sys/callb.h> 65 #include <sys/cmn_err.h> 66 #include <sys/tnf_probe.h> 67 68 #include <reloc.h> 69 #include <kobj_kdi.h> 70 #include <sys/sha1.h> 71 #include <sys/crypto/elfsign.h> 72 73 #if !defined(__sparc) 74 #include <sys/bootvfs.h> 75 #endif 76 77 /* 78 * do_symbols() error codes 79 */ 80 #define DOSYM_UNDEF -1 /* undefined symbol */ 81 #define DOSYM_UNSAFE -2 /* MT-unsafe driver symbol */ 82 83 static void synthetic_bootaux(char *, val_t *); 84 static struct module *load_exec(val_t *, char *); 85 static void load_linker(val_t *); 86 static struct modctl *add_primary(const char *filename, int); 87 static int bind_primary(val_t *, int); 88 static int load_primary(struct module *, int); 89 static int load_kmdb(val_t *); 90 static int get_progbits(struct module *, struct _buf *); 91 static int get_syms(struct module *, struct _buf *); 92 static int get_ctf(struct module *, struct _buf *); 93 static void get_signature(struct module *, struct _buf *); 94 static int do_common(struct module *); 95 static void add_dependent(struct module *, struct module *); 96 static int do_dependents(struct modctl *, char *, size_t); 97 static int do_symbols(struct module *, Elf64_Addr); 98 static void module_assign(struct modctl *, struct module *); 99 static void free_module_data(struct module *); 100 static char *depends_on(struct module *); 101 static char *getmodpath(const char *); 102 static char *basename(char *); 103 static void attr_val(val_t *); 104 static char *find_libmacro(char *); 105 static char *expand_libmacro(char *, char *, char *); 106 static int read_bootflags(void); 107 static int kobj_boot_open(char *, int); 108 static int kobj_boot_close(int); 109 static int kobj_boot_seek(int, off_t, off_t); 110 static int kobj_boot_read(int, caddr_t, size_t); 111 static int kobj_boot_fstat(int, struct bootstat *); 112 113 static Sym *lookup_one(struct module *, const char *); 114 static void sym_insert(struct module *, char *, symid_t); 115 static Sym *sym_lookup(struct module *, Sym *); 116 117 /*PRINTFLIKE2*/ 118 static void kprintf(void *, const char *, ...) __KPRINTFLIKE(2); 119 120 static struct kobjopen_tctl *kobjopen_alloc(char *filename); 121 static void kobjopen_free(struct kobjopen_tctl *ltp); 122 static void kobjopen_thread(struct kobjopen_tctl *ltp); 123 124 extern int kcopy(const void *, void *, size_t); 125 extern int elf_mach_ok(Ehdr *); 126 extern int alloc_gottable(struct module *, caddr_t *, caddr_t *); 127 128 static void tnf_unsplice_probes(unsigned int, struct modctl *); 129 130 extern int modrootloaded; 131 extern int swaploaded; 132 extern int bop_io_quiesced; 133 extern int last_module_id; 134 135 #ifdef KOBJ_DEBUG 136 /* 137 * Values that can be or'd in to kobj_debug and their effects: 138 * 139 * D_DEBUG - misc. debugging information. 140 * D_SYMBOLS - list symbols and their values as they are entered 141 * into the hash table 142 * D_RELOCATIONS - display relocation processing information 143 * D_LOADING - display information about each module as it 144 * is loaded. 145 */ 146 int kobj_debug = 0; 147 148 #define KOBJ_MARK(s) if (kobj_debug & D_DEBUG) \ 149 (_kobj_printf(ops, "%d", __LINE__), _kobj_printf(ops, ": %s\n", s)) 150 #else 151 #define KOBJ_MARK(s) /* discard */ 152 #endif 153 154 #define MODPATH_PROPNAME "module-path" 155 156 #ifdef MODDIR_SUFFIX 157 static char slash_moddir_suffix_slash[] = MODDIR_SUFFIX "/"; 158 #else 159 #define slash_moddir_suffix_slash "" 160 #endif 161 162 #define _moddebug get_weakish_int(&moddebug) 163 #define _modrootloaded get_weakish_int(&modrootloaded) 164 #define _swaploaded get_weakish_int(&swaploaded) 165 #define _ioquiesced get_weakish_int(&bop_io_quiesced) 166 167 #define mod(X) (struct module *)((X)->modl_modp->mod_mp) 168 169 void *romp; /* rom vector (opaque to us) */ 170 struct bootops *ops; /* bootops vector */ 171 void *dbvec; /* debug vector */ 172 173 /* 174 * kobjopen thread control structure 175 */ 176 struct kobjopen_tctl { 177 ksema_t sema; 178 char *name; /* name of file */ 179 struct vnode *vp; /* vnode return from vn_open() */ 180 int Errno; /* error return from vnopen */ 181 }; 182 183 /* 184 * Structure for defining dynamically expandable library macros 185 */ 186 187 struct lib_macro_info { 188 char *lmi_list; /* ptr to list of possible choices */ 189 char *lmi_macroname; /* pointer to macro name */ 190 ushort_t lmi_ba_index; /* index into bootaux vector */ 191 ushort_t lmi_macrolen; /* macro length */ 192 } libmacros[] = { 193 { NULL, "CPU", BA_CPU, 0 }, 194 { NULL, "MMU", BA_MMU, 0 } 195 }; 196 197 #define NLIBMACROS sizeof (libmacros) / sizeof (struct lib_macro_info) 198 199 char *boot_cpu_compatible_list; /* make $CPU available */ 200 201 #ifdef MPSAS 202 void sas_prisyms(struct modctl_list *); 203 void sas_syms(struct module *); 204 #endif 205 206 char *kobj_module_path; /* module search path */ 207 vmem_t *text_arena; /* module text arena */ 208 static vmem_t *data_arena; /* module data & bss arena */ 209 static vmem_t *ctf_arena; /* CTF debug data arena */ 210 static struct modctl *kobj_modules = NULL; /* modules loaded */ 211 int kobj_mmu_pagesize; /* system pagesize */ 212 static int lg_pagesize; /* "large" pagesize */ 213 static int kobj_last_module_id = 0; /* id assignment */ 214 static kmutex_t kobj_lock; /* protects mach memory list */ 215 216 /* 217 * The following functions have been implemented by the kernel. 218 * However, many 3rd party drivers provide their own implementations 219 * of these functions. When such drivers are loaded, messages 220 * indicateing that these symbols have been mulply defined will be 221 * emitted to the console. To avoid alarming customers for no good 222 * reason, we simply suppress such warnings for the following set of 223 * functions. 224 */ 225 static char *suppress_sym_list[] = 226 { 227 "strstr", 228 "strncat", 229 "strlcat", 230 "strlcpy", 231 "strspn", 232 "memcpy", 233 "memset", 234 "memmove", 235 "memcmp", 236 "memchr", 237 "__udivdi3", 238 "__divdi3", 239 "__umoddi3", 240 "__moddi3", 241 NULL /* This entry must exist */ 242 }; 243 244 /* indexed by KOBJ_NOTIFY_* */ 245 static kobj_notify_list_t *kobj_notifiers[KOBJ_NOTIFY_MAX + 1]; 246 247 /* 248 * TNF probe management globals 249 */ 250 tnf_probe_control_t *__tnf_probe_list_head = NULL; 251 tnf_tag_data_t *__tnf_tag_list_head = NULL; 252 int tnf_changed_probe_list = 0; 253 254 /* 255 * Prefix for statically defined tracing (SDT) DTrace probes. 256 */ 257 const char *sdt_prefix = "__dtrace_probe_"; 258 259 #if defined(__sparc) 260 /* 261 * Some PROMs return SUNW,UltraSPARC when they actually have 262 * SUNW,UltraSPARC-II cpus. SInce we're now filtering out all 263 * SUNW,UltraSPARC systems during the boot phase, we can safely 264 * point the auxv CPU value at SUNW,UltraSPARC-II. This is what 265 * we point it at. 266 */ 267 const char *ultra_2 = "SUNW,UltraSPARC-II"; 268 #endif 269 270 /* 271 * Beginning and end of the kernel's dynamic text/data segments. 272 */ 273 static caddr_t _text; 274 static caddr_t _etext; 275 static caddr_t _data; 276 277 /* 278 * XXX Hmm. The sparc linker fails to define this symbol. 279 */ 280 #if !defined(__sparc) 281 extern 282 #endif 283 caddr_t _edata; 284 285 static Addr dynseg = 0; /* load address of "dynamic" segment */ 286 287 int standalone = 1; /* an unwholey kernel? */ 288 int use_iflush; /* iflush after relocations */ 289 290 /* 291 * _kobj_printf() 292 * 293 * Common printf function pointer. Can handle only one conversion 294 * specification in the format string. Some of the functions invoked 295 * through this function pointer cannot handle more that one conversion 296 * specification in the format string. 297 */ 298 void (*_kobj_printf)(void *, const char *, ...); /* printf routine */ 299 300 static kobj_stat_t kobj_stat; 301 302 #define MINALIGN 8 /* at least a double-word */ 303 304 int 305 get_weakish_int(int *ip) 306 { 307 if (standalone) 308 return (0); 309 return (ip == NULL ? 0 : *ip); 310 } 311 312 static void * 313 get_weakish_pointer(void **ptrp) 314 { 315 if (standalone) 316 return (0); 317 return (ptrp == NULL ? 0 : *ptrp); 318 } 319 320 /* 321 * XXX fix dependencies on "kernel"; this should work 322 * for other standalone binaries as well. 323 * 324 * XXX Fix hashing code to use one pointer to 325 * hash entries. 326 * |----------| 327 * | nbuckets | 328 * |----------| 329 * | nchains | 330 * |----------| 331 * | bucket[] | 332 * |----------| 333 * | chain[] | 334 * |----------| 335 */ 336 337 /* 338 * Load, bind and relocate all modules that 339 * form the primary kernel. At this point, our 340 * externals have not been relocated. 341 */ 342 void 343 kobj_init( 344 void *romvec, 345 void *dvec, 346 struct bootops *bootvec, 347 val_t *bootaux) 348 { 349 struct module *mp; 350 struct modctl *modp; 351 Addr entry; 352 char filename[MAXPATHLEN]; 353 354 /* 355 * Save these to pass on to 356 * the booted standalone. 357 */ 358 romp = romvec; 359 dbvec = dvec; 360 361 ops = bootvec; 362 #if defined(__i386) || defined(__amd64) 363 _kobj_printf = (void (*)(void *, const char *, ...))ops->bsys_printf; 364 #else 365 _kobj_printf = (void (*)(void *, const char *, ...))bop_putsarg; 366 #endif 367 KOBJ_MARK("Entered kobj_init()"); 368 369 #if defined(__sparc) 370 /* XXXQ should suppress this test on sun4v */ 371 if (bootaux[BA_CPU].ba_ptr) { 372 if (strcmp("SUNW,UltraSPARC", bootaux[BA_CPU].ba_ptr) == 0) { 373 bootaux[BA_CPU].ba_ptr = (void *) ultra_2; 374 } 375 } 376 #endif 377 378 /* 379 * Check bootops version. 380 */ 381 if (BOP_GETVERSION(ops) != BO_VERSION) { 382 _kobj_printf(ops, "Warning: Using boot version %d, ", 383 BOP_GETVERSION(ops)); 384 _kobj_printf(ops, "expected %d\n", BO_VERSION); 385 } 386 #ifdef KOBJ_DEBUG 387 else if (kobj_debug & D_DEBUG) { 388 /* 389 * Say -something- so we know we got this far .. 390 */ 391 _kobj_printf(ops, "krtld: Using boot version %d.\n", 392 BOP_GETVERSION(ops)); 393 } 394 #endif 395 396 (void) BOP_GETPROP(ops, "whoami", filename); 397 398 /* 399 * We don't support standalone debuggers anymore. The use of kadb 400 * will interfere with the later use of kmdb. Let the user mend 401 * their ways now. Users will reach this message if they still 402 * have the kadb binary on their system (perhaps they used an old 403 * bfu, or maybe they intentionally copied it there) and have 404 * specified its use in a way that eluded our checking in the boot 405 * program. 406 */ 407 if (dvec != NULL) { 408 _kobj_printf(ops, "\nWARNING: Standalone debuggers such as " 409 "kadb are no longer supported\n\n"); 410 goto fail; 411 } 412 413 #ifndef __sparc 414 { 415 /* on x86, we always boot with a ramdisk */ 416 extern int kobj_boot_mountroot(void); 417 (void) kobj_boot_mountroot(); 418 419 /* 420 * Now that the ramdisk is mounted, finish boot property 421 * initialization. 422 */ 423 boot_prop_finish(); 424 } 425 #endif 426 427 #if !defined(_UNIX_KRTLD) 428 /* 429 * If 'unix' is linked together with 'krtld' into one executable, 430 * the early boot code does -not- hand us any of the dynamic metadata 431 * about the executable. In particular, it does not read in, map or 432 * otherwise look at the program headers. We fake all that up now. 433 * 434 * We do this early as DTrace static probes and tnf probes both call 435 * undefined references. We have to process those relocations before 436 * calling any of them. 437 */ 438 if (bootaux[BA_PHDR].ba_ptr == NULL) 439 synthetic_bootaux(filename, bootaux); 440 #endif 441 442 /* 443 * Save the interesting attribute-values 444 * (scanned by kobj_boot). 445 */ 446 attr_val(bootaux); 447 448 /* 449 * Set the module search path. 450 */ 451 kobj_module_path = getmodpath(filename); 452 453 boot_cpu_compatible_list = find_libmacro("CPU"); 454 455 /* 456 * These two modules have actually been 457 * loaded by boot, but we finish the job 458 * by introducing them into the world of 459 * loadable modules. 460 */ 461 462 mp = load_exec(bootaux, filename); 463 load_linker(bootaux); 464 465 /* 466 * Load all the primary dependent modules. 467 */ 468 if (load_primary(mp, KOBJ_LM_PRIMARY) == -1) 469 goto fail; 470 471 /* 472 * Glue it together. 473 */ 474 if (bind_primary(bootaux, KOBJ_LM_PRIMARY) == -1) 475 goto fail; 476 477 entry = bootaux[BA_ENTRY].ba_val; 478 479 #ifdef __sparc 480 /* 481 * On sparcv9, boot scratch memory is running out. 482 * Free the temporary allocations here to allow boot 483 * to continue. 484 */ 485 kobj_tmp_free(); 486 #endif 487 488 /* 489 * Get the boot flags 490 */ 491 bootflags(ops); 492 493 if (boothowto & RB_VERBOSE) 494 kobj_lm_dump(KOBJ_LM_PRIMARY); 495 496 kobj_kdi_init(); 497 498 if (boothowto & RB_KMDB) { 499 if (load_kmdb(bootaux) < 0) 500 goto fail; 501 } 502 503 /* 504 * Post setup. 505 */ 506 #ifdef MPSAS 507 sas_prisyms(kobj_lm_lookup(KOBJ_LM_PRIMARY)); 508 #endif 509 s_text = _text; 510 e_text = _etext; 511 s_data = _data; 512 e_data = _edata; 513 514 kobj_sync_instruction_memory(s_text, e_text - s_text); 515 516 #ifdef KOBJ_DEBUG 517 if (kobj_debug & D_DEBUG) 518 _kobj_printf(ops, 519 "krtld: transferring control to: 0x%p\n", entry); 520 #endif 521 522 /* 523 * Make sure the mod system knows about the modules already loaded. 524 */ 525 last_module_id = kobj_last_module_id; 526 bcopy(kobj_modules, &modules, sizeof (modules)); 527 modp = &modules; 528 do { 529 if (modp->mod_next == kobj_modules) 530 modp->mod_next = &modules; 531 if (modp->mod_prev == kobj_modules) 532 modp->mod_prev = &modules; 533 } while ((modp = modp->mod_next) != &modules); 534 535 standalone = 0; 536 537 #ifdef __sparc 538 /* 539 * On sparcv9, boot scratch memory is running out. 540 * Free the temporary allocations here to allow boot 541 * to continue. 542 */ 543 kobj_tmp_free(); 544 #endif 545 546 _kobj_printf = kprintf; 547 exitto((caddr_t)entry); 548 fail: 549 550 _kobj_printf(ops, "krtld: error during initial load/link phase\n"); 551 } 552 553 #if !defined(_UNIX_KRTLD) 554 /* 555 * Synthesize additional metadata that describes the executable. 556 * 557 * (When the dynamic executable has an interpreter, the boot program 558 * does all this for us. Where we don't have an interpreter, (or a 559 * even a boot program, perhaps) we have to do this for ourselves.) 560 */ 561 static void 562 synthetic_bootaux(char *filename, val_t *bootaux) 563 { 564 Ehdr ehdr; 565 caddr_t phdrbase; 566 struct _buf *file; 567 int i, n; 568 569 /* 570 * Elf header 571 */ 572 KOBJ_MARK("synthetic_bootaux()"); 573 KOBJ_MARK(filename); 574 file = kobj_open_file(filename); 575 if (file == (struct _buf *)-1) { 576 _kobj_printf(ops, "krtld: failed to open '%s'\n", filename); 577 return; 578 } 579 KOBJ_MARK("reading program headers"); 580 if (kobj_read_file(file, (char *)&ehdr, sizeof (ehdr), 0) < 0) { 581 _kobj_printf(ops, "krtld: %s: failed to read ehder\n", 582 filename); 583 return; 584 } 585 586 /* 587 * Program headers 588 */ 589 bootaux[BA_PHNUM].ba_val = ehdr.e_phnum; 590 bootaux[BA_PHENT].ba_val = ehdr.e_phentsize; 591 n = ehdr.e_phentsize * ehdr.e_phnum; 592 593 phdrbase = kobj_alloc(n, KM_WAIT | KM_TMP); 594 595 if (kobj_read_file(file, phdrbase, n, ehdr.e_phoff) < 0) { 596 _kobj_printf(ops, "krtld: %s: failed to read phdrs\n", 597 filename); 598 return; 599 } 600 bootaux[BA_PHDR].ba_ptr = phdrbase; 601 kobj_close_file(file); 602 KOBJ_MARK("closed file"); 603 604 /* 605 * Find the dynamic section address 606 */ 607 for (i = 0; i < ehdr.e_phnum; i++) { 608 Phdr *phdr = (Phdr *)(phdrbase + ehdr.e_phentsize * i); 609 610 if (phdr->p_type == PT_DYNAMIC) { 611 bootaux[BA_DYNAMIC].ba_ptr = (void *)phdr->p_vaddr; 612 break; 613 } 614 } 615 KOBJ_MARK("synthetic_bootaux() done"); 616 } 617 #endif 618 619 /* 620 * Set up any global information derived 621 * from attribute/values in the boot or 622 * aux vector. 623 */ 624 static void 625 attr_val(val_t *bootaux) 626 { 627 Phdr *phdr; 628 int phnum, phsize; 629 int i; 630 631 KOBJ_MARK("attr_val()"); 632 kobj_mmu_pagesize = bootaux[BA_PAGESZ].ba_val; 633 lg_pagesize = bootaux[BA_LPAGESZ].ba_val; 634 use_iflush = bootaux[BA_IFLUSH].ba_val; 635 636 phdr = (Phdr *)bootaux[BA_PHDR].ba_ptr; 637 phnum = bootaux[BA_PHNUM].ba_val; 638 phsize = bootaux[BA_PHENT].ba_val; 639 for (i = 0; i < phnum; i++) { 640 phdr = (Phdr *)(bootaux[BA_PHDR].ba_val + i * phsize); 641 642 if (phdr->p_type != PT_LOAD) 643 continue; 644 /* 645 * Bounds of the various segments. 646 */ 647 if (!(phdr->p_flags & PF_X)) { 648 #if defined(_UNIX_KRTLD) 649 dynseg = phdr->p_vaddr; 650 #else 651 ASSERT(phdr->p_vaddr == 0); 652 #endif 653 } else { 654 if (phdr->p_flags & PF_W) { 655 _data = (caddr_t)phdr->p_vaddr; 656 _edata = _data + phdr->p_memsz; 657 } else { 658 _text = (caddr_t)phdr->p_vaddr; 659 _etext = _text + phdr->p_memsz; 660 } 661 } 662 } 663 664 /* To do the kobj_alloc, _edata needs to be set. */ 665 for (i = 0; i < NLIBMACROS; i++) { 666 if (bootaux[libmacros[i].lmi_ba_index].ba_ptr != NULL) { 667 libmacros[i].lmi_list = kobj_alloc( 668 strlen(bootaux[libmacros[i].lmi_ba_index].ba_ptr) + 669 1, KM_WAIT); 670 (void) strcpy(libmacros[i].lmi_list, 671 bootaux[libmacros[i].lmi_ba_index].ba_ptr); 672 } 673 libmacros[i].lmi_macrolen = strlen(libmacros[i].lmi_macroname); 674 } 675 } 676 677 /* 678 * Set up the booted executable. 679 */ 680 static struct module * 681 load_exec(val_t *bootaux, char *filename) 682 { 683 struct modctl *cp; 684 struct module *mp; 685 Dyn *dyn; 686 Sym *sp; 687 int i, lsize, osize, nsize, allocsize; 688 char *libname, *tmp; 689 690 /* 691 * Set the module search path. 692 */ 693 kobj_module_path = getmodpath(filename); 694 695 #ifdef KOBJ_DEBUG 696 if (kobj_debug & D_DEBUG) 697 _kobj_printf(ops, "module path '%s'\n", kobj_module_path); 698 #endif 699 700 KOBJ_MARK("add_primary"); 701 cp = add_primary(filename, KOBJ_LM_PRIMARY); 702 703 KOBJ_MARK("struct module"); 704 mp = kobj_zalloc(sizeof (struct module), KM_WAIT); 705 cp->mod_mp = mp; 706 707 /* 708 * We don't have the following information 709 * since this module is an executable and not 710 * a relocatable .o. 711 */ 712 mp->symtbl_section = 0; 713 mp->shdrs = NULL; 714 mp->strhdr = NULL; 715 716 /* 717 * Since this module is the only exception, 718 * we cons up some section headers. 719 */ 720 KOBJ_MARK("symhdr"); 721 mp->symhdr = kobj_zalloc(sizeof (Shdr), KM_WAIT); 722 723 KOBJ_MARK("strhdr"); 724 mp->strhdr = kobj_zalloc(sizeof (Shdr), KM_WAIT); 725 726 mp->symhdr->sh_type = SHT_SYMTAB; 727 mp->strhdr->sh_type = SHT_STRTAB; 728 /* 729 * Scan the dynamic structure. 730 */ 731 for (dyn = (Dyn *) bootaux[BA_DYNAMIC].ba_ptr; 732 dyn->d_tag != DT_NULL; dyn++) { 733 switch (dyn->d_tag) { 734 case DT_SYMTAB: 735 dyn->d_un.d_ptr += dynseg; 736 mp->symspace = mp->symtbl = (char *)dyn->d_un.d_ptr; 737 mp->symhdr->sh_addr = dyn->d_un.d_ptr; 738 break; 739 case DT_HASH: 740 dyn->d_un.d_ptr += dynseg; 741 mp->nsyms = *((uint_t *)dyn->d_un.d_ptr + 1); 742 mp->hashsize = *(uint_t *)dyn->d_un.d_ptr; 743 break; 744 case DT_STRTAB: 745 dyn->d_un.d_ptr += dynseg; 746 mp->strings = (char *)dyn->d_un.d_ptr; 747 mp->strhdr->sh_addr = dyn->d_un.d_ptr; 748 break; 749 case DT_STRSZ: 750 mp->strhdr->sh_size = dyn->d_un.d_val; 751 break; 752 case DT_SYMENT: 753 mp->symhdr->sh_entsize = dyn->d_un.d_val; 754 break; 755 } 756 } 757 758 /* 759 * Collapse any DT_NEEDED entries into one string. 760 */ 761 nsize = osize = 0; 762 allocsize = MAXPATHLEN; 763 764 KOBJ_MARK("depends_on"); 765 mp->depends_on = kobj_alloc(allocsize, KM_WAIT); 766 767 for (dyn = (Dyn *) bootaux[BA_DYNAMIC].ba_ptr; 768 dyn->d_tag != DT_NULL; dyn++) 769 if (dyn->d_tag == DT_NEEDED) { 770 char *_lib; 771 772 libname = mp->strings + dyn->d_un.d_val; 773 if (strchr(libname, '$') != NULL) { 774 if ((_lib = expand_libmacro(libname, 775 filename, filename)) != NULL) 776 libname = _lib; 777 else 778 _kobj_printf(ops, "krtld: " 779 "load_exec: fail to " 780 "expand %s\n", libname); 781 } 782 lsize = strlen(libname); 783 nsize += lsize; 784 if (nsize + 1 > allocsize) { 785 KOBJ_MARK("grow depends_on"); 786 tmp = kobj_alloc(allocsize + MAXPATHLEN, 787 KM_WAIT); 788 bcopy(mp->depends_on, tmp, osize); 789 kobj_free(mp->depends_on, allocsize); 790 mp->depends_on = tmp; 791 allocsize += MAXPATHLEN; 792 } 793 bcopy(libname, mp->depends_on + osize, lsize); 794 *(mp->depends_on + nsize) = ' '; /* seperate */ 795 nsize++; 796 osize = nsize; 797 } 798 if (nsize) { 799 mp->depends_on[nsize - 1] = '\0'; /* terminate the string */ 800 /* 801 * alloc with exact size and copy whatever it got over 802 */ 803 KOBJ_MARK("realloc depends_on"); 804 tmp = kobj_alloc(nsize, KM_WAIT); 805 bcopy(mp->depends_on, tmp, nsize); 806 kobj_free(mp->depends_on, allocsize); 807 mp->depends_on = tmp; 808 } else { 809 kobj_free(mp->depends_on, allocsize); 810 mp->depends_on = NULL; 811 } 812 813 mp->flags = KOBJ_EXEC|KOBJ_PRIM; /* NOT a relocatable .o */ 814 mp->symhdr->sh_size = mp->nsyms * mp->symhdr->sh_entsize; 815 /* 816 * We allocate our own table since we don't 817 * hash undefined references. 818 */ 819 KOBJ_MARK("chains"); 820 mp->chains = kobj_zalloc(mp->nsyms * sizeof (symid_t), KM_WAIT); 821 KOBJ_MARK("buckets"); 822 mp->buckets = kobj_zalloc(mp->hashsize * sizeof (symid_t), KM_WAIT); 823 824 mp->text = _text; 825 mp->data = _data; 826 827 mp->text_size = _etext - _text; 828 mp->data_size = _edata - _data; 829 830 cp->mod_text = mp->text; 831 cp->mod_text_size = mp->text_size; 832 833 mp->filename = cp->mod_filename; 834 835 #ifdef KOBJ_DEBUG 836 if (kobj_debug & D_LOADING) { 837 _kobj_printf(ops, "krtld: file=%s\n", mp->filename); 838 _kobj_printf(ops, "\ttext: 0x%p", mp->text); 839 _kobj_printf(ops, " size: 0x%x\n", mp->text_size); 840 _kobj_printf(ops, "\tdata: 0x%p", mp->data); 841 _kobj_printf(ops, " dsize: 0x%x\n", mp->data_size); 842 } 843 #endif /* KOBJ_DEBUG */ 844 845 /* 846 * Insert symbols into the hash table. 847 */ 848 for (i = 0; i < mp->nsyms; i++) { 849 sp = (Sym *)(mp->symtbl + i * mp->symhdr->sh_entsize); 850 851 if (sp->st_name == 0 || sp->st_shndx == SHN_UNDEF) 852 continue; 853 #ifdef __sparc 854 /* 855 * Register symbols are ignored in the kernel 856 */ 857 if (ELF_ST_TYPE(sp->st_info) == STT_SPARC_REGISTER) 858 continue; 859 #endif /* __sparc */ 860 861 sym_insert(mp, mp->strings + sp->st_name, i); 862 } 863 864 KOBJ_MARK("load_exec done"); 865 return (mp); 866 } 867 868 /* 869 * Set up the linker module (if it's compiled in, LDNAME is NULL) 870 */ 871 static void 872 load_linker(val_t *bootaux) 873 { 874 struct module *kmp = (struct module *)kobj_modules->mod_mp; 875 struct module *mp; 876 struct modctl *cp; 877 int i; 878 Shdr *shp; 879 Sym *sp; 880 int shsize; 881 char *dlname = (char *)bootaux[BA_LDNAME].ba_ptr; 882 883 /* 884 * On some architectures, krtld is compiled into the kernel. 885 */ 886 if (dlname == NULL) 887 return; 888 889 cp = add_primary(dlname, KOBJ_LM_PRIMARY); 890 891 mp = kobj_zalloc(sizeof (struct module), KM_WAIT); 892 893 cp->mod_mp = mp; 894 mp->hdr = *(Ehdr *)bootaux[BA_LDELF].ba_ptr; 895 shsize = mp->hdr.e_shentsize * mp->hdr.e_shnum; 896 mp->shdrs = kobj_alloc(shsize, KM_WAIT); 897 bcopy(bootaux[BA_LDSHDR].ba_ptr, mp->shdrs, shsize); 898 899 for (i = 1; i < (int)mp->hdr.e_shnum; i++) { 900 shp = (Shdr *)(mp->shdrs + (i * mp->hdr.e_shentsize)); 901 902 if (shp->sh_flags & SHF_ALLOC) { 903 if (shp->sh_flags & SHF_WRITE) { 904 if (mp->data == NULL) 905 mp->data = (char *)shp->sh_addr; 906 } else if (mp->text == NULL) { 907 mp->text = (char *)shp->sh_addr; 908 } 909 } 910 if (shp->sh_type == SHT_SYMTAB) { 911 mp->symtbl_section = i; 912 mp->symhdr = shp; 913 mp->symspace = mp->symtbl = (char *)shp->sh_addr; 914 } 915 } 916 mp->nsyms = mp->symhdr->sh_size / mp->symhdr->sh_entsize; 917 mp->flags = KOBJ_INTERP|KOBJ_PRIM; 918 mp->strhdr = (Shdr *) 919 (mp->shdrs + mp->symhdr->sh_link * mp->hdr.e_shentsize); 920 mp->strings = (char *)mp->strhdr->sh_addr; 921 mp->hashsize = kobj_gethashsize(mp->nsyms); 922 923 mp->symsize = mp->symhdr->sh_size + mp->strhdr->sh_size + sizeof (int) + 924 (mp->hashsize + mp->nsyms) * sizeof (symid_t); 925 926 mp->chains = kobj_zalloc(mp->nsyms * sizeof (symid_t), KM_WAIT); 927 mp->buckets = kobj_zalloc(mp->hashsize * sizeof (symid_t), KM_WAIT); 928 929 mp->bss = bootaux[BA_BSS].ba_val; 930 mp->bss_align = 0; /* pre-aligned during allocation */ 931 mp->bss_size = (uintptr_t)_edata - mp->bss; 932 mp->text_size = _etext - mp->text; 933 mp->data_size = _edata - mp->data; 934 mp->filename = cp->mod_filename; 935 cp->mod_text = mp->text; 936 cp->mod_text_size = mp->text_size; 937 938 /* 939 * Now that we've figured out where the linker is, 940 * set the limits for the booted object. 941 */ 942 kmp->text_size = (size_t)(mp->text - kmp->text); 943 kmp->data_size = (size_t)(mp->data - kmp->data); 944 kobj_modules->mod_text_size = kmp->text_size; 945 946 #ifdef KOBJ_DEBUG 947 if (kobj_debug & D_LOADING) { 948 _kobj_printf(ops, "krtld: file=%s\n", mp->filename); 949 _kobj_printf(ops, "\ttext:0x%p", mp->text); 950 _kobj_printf(ops, " size: 0x%x\n", mp->text_size); 951 _kobj_printf(ops, "\tdata:0x%p", mp->data); 952 _kobj_printf(ops, " dsize: 0x%x\n", mp->data_size); 953 } 954 #endif /* KOBJ_DEBUG */ 955 956 /* 957 * Insert the symbols into the hash table. 958 */ 959 for (i = 0; i < mp->nsyms; i++) { 960 sp = (Sym *)(mp->symtbl + i * mp->symhdr->sh_entsize); 961 962 if (sp->st_name == 0 || sp->st_shndx == SHN_UNDEF) 963 continue; 964 if (ELF_ST_BIND(sp->st_info) == STB_GLOBAL) { 965 if (sp->st_shndx == SHN_COMMON) 966 sp->st_shndx = SHN_ABS; 967 } 968 sym_insert(mp, mp->strings + sp->st_name, i); 969 } 970 971 } 972 973 static kobj_notify_list_t ** 974 kobj_notify_lookup(uint_t type) 975 { 976 ASSERT(type != 0 && type < sizeof (kobj_notifiers) / 977 sizeof (kobj_notify_list_t *)); 978 979 return (&kobj_notifiers[type]); 980 } 981 982 int 983 kobj_notify_add(kobj_notify_list_t *knp) 984 { 985 kobj_notify_list_t **knl; 986 987 knl = kobj_notify_lookup(knp->kn_type); 988 989 knp->kn_next = NULL; 990 knp->kn_prev = NULL; 991 992 mutex_enter(&kobj_lock); 993 994 if (*knl != NULL) { 995 (*knl)->kn_prev = knp; 996 knp->kn_next = *knl; 997 } 998 (*knl) = knp; 999 1000 mutex_exit(&kobj_lock); 1001 return (0); 1002 } 1003 1004 int 1005 kobj_notify_remove(kobj_notify_list_t *knp) 1006 { 1007 kobj_notify_list_t **knl = kobj_notify_lookup(knp->kn_type); 1008 kobj_notify_list_t *tknp; 1009 1010 mutex_enter(&kobj_lock); 1011 1012 /* LINTED */ 1013 if (tknp = knp->kn_next) 1014 tknp->kn_prev = knp->kn_prev; 1015 1016 /* LINTED */ 1017 if (tknp = knp->kn_prev) 1018 tknp->kn_next = knp->kn_next; 1019 else 1020 *knl = knp->kn_next; 1021 1022 mutex_exit(&kobj_lock); 1023 1024 return (0); 1025 } 1026 1027 /* 1028 * Notify all interested callbacks of a specified change in module state. 1029 */ 1030 static void 1031 kobj_notify(int type, struct modctl *modp) 1032 { 1033 kobj_notify_list_t *knp; 1034 1035 if (modp->mod_loadflags & MOD_NONOTIFY || standalone) 1036 return; 1037 1038 mutex_enter(&kobj_lock); 1039 1040 for (knp = *(kobj_notify_lookup(type)); knp != NULL; knp = knp->kn_next) 1041 knp->kn_func(type, modp); 1042 1043 /* 1044 * KDI notification must be last (it has to allow for work done by the 1045 * other notification callbacks), so we call it manually. 1046 */ 1047 kobj_kdi_mod_notify(type, modp); 1048 1049 mutex_exit(&kobj_lock); 1050 } 1051 1052 /* 1053 * Ask boot for the module path. 1054 */ 1055 /*ARGSUSED*/ 1056 static char * 1057 getmodpath(const char *filename) 1058 { 1059 char *path; 1060 int len; 1061 1062 #if defined(_UNIX_KRTLD) 1063 /* 1064 * The boot program provides the module name when it detects 1065 * that the executable has an interpreter, thus we can ask 1066 * it directly in this case. 1067 */ 1068 if ((len = BOP_GETPROPLEN(ops, MODPATH_PROPNAME)) == -1) 1069 return (MOD_DEFPATH); 1070 1071 path = kobj_zalloc(len, KM_WAIT); 1072 1073 (void) BOP_GETPROP(ops, MODPATH_PROPNAME, path); 1074 1075 return (*path ? path : MOD_DEFPATH); 1076 1077 #else 1078 1079 /* 1080 * Construct the directory path from the filename. 1081 */ 1082 1083 char *p; 1084 const char isastr[] = "/amd64"; 1085 size_t isalen = strlen(isastr); 1086 1087 if ((p = strrchr(filename, '/')) == NULL) 1088 return (MOD_DEFPATH); 1089 1090 while (p > filename && *(p - 1) == '/') 1091 p--; /* remove trailing '/' characters */ 1092 if (p == filename) 1093 p++; /* so "/" -is- the modpath in this case */ 1094 1095 /* 1096 * Remove optional isa-dependent directory name - the module 1097 * subsystem will put this back again (!) 1098 */ 1099 len = p - filename; 1100 if (len > isalen && 1101 strncmp(&filename[len - isalen], isastr, isalen) == 0) 1102 p -= isalen; 1103 1104 /* 1105 * "/platform/mumblefrotz" + " " + MOD_DEFPATH 1106 */ 1107 len += (p - filename) + 1 + strlen(MOD_DEFPATH) + 1; 1108 1109 path = kobj_zalloc(len, KM_WAIT); 1110 (void) strncpy(path, filename, p - filename); 1111 (void) strcat(path, " "); 1112 return (strcat(path, MOD_DEFPATH)); 1113 #endif 1114 } 1115 1116 static struct modctl * 1117 add_primary(const char *filename, int lmid) 1118 { 1119 struct modctl *cp; 1120 1121 cp = kobj_zalloc(sizeof (struct modctl), KM_WAIT); 1122 1123 cp->mod_filename = kobj_alloc(strlen(filename) + 1, KM_WAIT); 1124 1125 /* 1126 * For symbol lookup, we assemble our own 1127 * modctl list of the primary modules. 1128 */ 1129 1130 (void) strcpy(cp->mod_filename, filename); 1131 cp->mod_modname = basename(cp->mod_filename); 1132 1133 /* set values for modinfo assuming that the load will work */ 1134 cp->mod_prim = 1; 1135 cp->mod_loaded = 1; 1136 cp->mod_installed = 1; 1137 cp->mod_loadcnt = 1; 1138 cp->mod_loadflags = MOD_NOAUTOUNLOAD; 1139 1140 cp->mod_id = kobj_last_module_id++; 1141 1142 /* 1143 * Link the module in. We'll pass this info on 1144 * to the mod squad later. 1145 */ 1146 if (kobj_modules == NULL) { 1147 kobj_modules = cp; 1148 cp->mod_prev = cp->mod_next = cp; 1149 } else { 1150 cp->mod_prev = kobj_modules->mod_prev; 1151 cp->mod_next = kobj_modules; 1152 kobj_modules->mod_prev->mod_next = cp; 1153 kobj_modules->mod_prev = cp; 1154 } 1155 1156 kobj_lm_append(lmid, cp); 1157 1158 return (cp); 1159 } 1160 1161 static int 1162 bind_primary(val_t *bootaux, int lmid) 1163 { 1164 struct modctl_list *linkmap = kobj_lm_lookup(lmid); 1165 struct modctl_list *lp; 1166 struct module *mp; 1167 1168 /* 1169 * Do common symbols. 1170 */ 1171 for (lp = linkmap; lp; lp = lp->modl_next) { 1172 mp = mod(lp); 1173 1174 /* 1175 * Don't do common section relocations for modules that 1176 * don't need it. 1177 */ 1178 if (mp->flags & (KOBJ_EXEC|KOBJ_INTERP)) 1179 continue; 1180 1181 if (do_common(mp) < 0) 1182 return (-1); 1183 } 1184 1185 /* 1186 * Resolve symbols. 1187 */ 1188 for (lp = linkmap; lp; lp = lp->modl_next) { 1189 mp = mod(lp); 1190 1191 if (do_symbols(mp, 0) < 0) 1192 return (-1); 1193 } 1194 1195 /* 1196 * Do relocations. 1197 */ 1198 for (lp = linkmap; lp; lp = lp->modl_next) { 1199 mp = mod(lp); 1200 1201 if (mp->flags & KOBJ_EXEC) { 1202 Dyn *dyn; 1203 Word relasz = 0, relaent = 0; 1204 Word shtype; 1205 char *rela = NULL; 1206 1207 for (dyn = (Dyn *)bootaux[BA_DYNAMIC].ba_ptr; 1208 dyn->d_tag != DT_NULL; dyn++) { 1209 switch (dyn->d_tag) { 1210 case DT_RELASZ: 1211 case DT_RELSZ: 1212 relasz = dyn->d_un.d_val; 1213 break; 1214 case DT_RELAENT: 1215 case DT_RELENT: 1216 relaent = dyn->d_un.d_val; 1217 break; 1218 case DT_RELA: 1219 shtype = SHT_RELA; 1220 rela = (char *)(dyn->d_un.d_ptr + 1221 dynseg); 1222 break; 1223 case DT_REL: 1224 shtype = SHT_REL; 1225 rela = (char *)(dyn->d_un.d_ptr + 1226 dynseg); 1227 break; 1228 } 1229 } 1230 if (relasz == 0 || 1231 relaent == 0 || rela == NULL) { 1232 _kobj_printf(ops, "krtld: bind_primary(): " 1233 "no relocation information found for " 1234 "module %s\n", mp->filename); 1235 return (-1); 1236 } 1237 #ifdef KOBJ_DEBUG 1238 if (kobj_debug & D_RELOCATIONS) 1239 _kobj_printf(ops, "krtld: relocating: file=%s " 1240 "KOBJ_EXEC\n", mp->filename); 1241 #endif 1242 if (do_relocate(mp, rela, shtype, relasz/relaent, 1243 relaent, (Addr)mp->text) < 0) 1244 return (-1); 1245 } else { 1246 if (do_relocations(mp) < 0) 1247 return (-1); 1248 } 1249 1250 kobj_sync_instruction_memory(mp->text, mp->text_size); 1251 } 1252 1253 for (lp = linkmap; lp; lp = lp->modl_next) { 1254 mp = mod(lp); 1255 1256 /* 1257 * We need to re-read the full symbol table for the boot file, 1258 * since we couldn't use the full one before. We also need to 1259 * load the CTF sections of both the boot file and the 1260 * interpreter (us). 1261 */ 1262 if (mp->flags & KOBJ_EXEC) { 1263 struct _buf *file; 1264 int n; 1265 1266 file = kobj_open_file(mp->filename); 1267 if (file == (struct _buf *)-1) 1268 return (-1); 1269 if (kobj_read_file(file, (char *)&mp->hdr, 1270 sizeof (mp->hdr), 0) < 0) 1271 return (-1); 1272 n = mp->hdr.e_shentsize * mp->hdr.e_shnum; 1273 mp->shdrs = kobj_alloc(n, KM_WAIT); 1274 if (kobj_read_file(file, mp->shdrs, n, 1275 mp->hdr.e_shoff) < 0) 1276 return (-1); 1277 if (get_syms(mp, file) < 0) 1278 return (-1); 1279 if (get_ctf(mp, file) < 0) 1280 return (-1); 1281 kobj_close_file(file); 1282 mp->flags |= KOBJ_RELOCATED; 1283 1284 } else if (mp->flags & KOBJ_INTERP) { 1285 struct _buf *file; 1286 1287 /* 1288 * The interpreter path fragment in mp->filename 1289 * will already have the module directory suffix 1290 * in it (if appropriate). 1291 */ 1292 file = kobj_open_path(mp->filename, 1, 0); 1293 if (file == (struct _buf *)-1) 1294 return (-1); 1295 if (get_ctf(mp, file) < 0) 1296 return (-1); 1297 kobj_close_file(file); 1298 mp->flags |= KOBJ_RELOCATED; 1299 } 1300 } 1301 1302 return (0); 1303 } 1304 1305 static struct modctl * 1306 mod_already_loaded(char *modname) 1307 { 1308 struct modctl *mctl = kobj_modules; 1309 1310 do { 1311 if (strcmp(modname, mctl->mod_filename) == 0) 1312 return (mctl); 1313 mctl = mctl->mod_next; 1314 1315 } while (mctl != kobj_modules); 1316 1317 return (NULL); 1318 } 1319 1320 /* 1321 * Load all the primary dependent modules. 1322 */ 1323 static int 1324 load_primary(struct module *mp, int lmid) 1325 { 1326 struct modctl *cp; 1327 struct module *dmp; 1328 char *p, *q; 1329 char modname[MODMAXNAMELEN]; 1330 1331 if ((p = mp->depends_on) == NULL) 1332 return (0); 1333 1334 /* CONSTANTCONDITION */ 1335 while (1) { 1336 /* 1337 * Skip space. 1338 */ 1339 while (*p && (*p == ' ' || *p == '\t')) 1340 p++; 1341 /* 1342 * Get module name. 1343 */ 1344 q = modname; 1345 while (*p && *p != ' ' && *p != '\t') 1346 *q++ = *p++; 1347 1348 if (q == modname) 1349 break; 1350 1351 *q = '\0'; 1352 /* 1353 * Check for dup dependencies. 1354 */ 1355 if (strcmp(modname, "dtracestubs") == 0 || 1356 mod_already_loaded(modname) != NULL) 1357 continue; 1358 1359 cp = add_primary(modname, lmid); 1360 cp->mod_busy = 1; 1361 /* 1362 * Load it. 1363 */ 1364 (void) kobj_load_module(cp, 1); 1365 cp->mod_busy = 0; 1366 1367 if ((dmp = cp->mod_mp) == NULL) { 1368 cp->mod_loaded = 0; 1369 cp->mod_installed = 0; 1370 cp->mod_loadcnt = 0; 1371 return (-1); 1372 } 1373 1374 add_dependent(mp, dmp); 1375 dmp->flags |= KOBJ_PRIM; 1376 1377 /* 1378 * Recurse. 1379 */ 1380 if (load_primary(dmp, lmid) == -1) { 1381 cp->mod_loaded = 0; 1382 cp->mod_installed = 0; 1383 cp->mod_loadcnt = 0; 1384 return (-1); 1385 } 1386 } 1387 return (0); 1388 } 1389 1390 static int 1391 console_is_usb_serial(void) 1392 { 1393 char *console; 1394 int len, ret; 1395 1396 if ((len = BOP_GETPROPLEN(ops, "console")) == -1) 1397 return (0); 1398 1399 console = kobj_zalloc(len, KM_WAIT|KM_TMP); 1400 (void) BOP_GETPROP(ops, "console", console); 1401 ret = (strcmp(console, "usb-serial") == 0); 1402 kobj_free(console, len); 1403 1404 return (ret); 1405 } 1406 1407 static int 1408 load_kmdb(val_t *bootaux) 1409 { 1410 struct modctl *mctl; 1411 struct module *mp; 1412 Sym *sym; 1413 1414 if (console_is_usb_serial()) { 1415 _kobj_printf(ops, "kmdb not loaded " 1416 "(unsupported on usb serial console)\n"); 1417 return (0); 1418 } 1419 1420 _kobj_printf(ops, "Loading kmdb...\n"); 1421 1422 if ((mctl = add_primary("misc/kmdbmod", KOBJ_LM_DEBUGGER)) == NULL) 1423 return (-1); 1424 1425 mctl->mod_busy = 1; 1426 (void) kobj_load_module(mctl, 1); 1427 mctl->mod_busy = 0; 1428 1429 if ((mp = mctl->mod_mp) == NULL) 1430 return (-1); 1431 1432 mp->flags |= KOBJ_PRIM; 1433 1434 if (load_primary(mp, KOBJ_LM_DEBUGGER) < 0) 1435 return (-1); 1436 1437 if (boothowto & RB_VERBOSE) 1438 kobj_lm_dump(KOBJ_LM_DEBUGGER); 1439 1440 if (bind_primary(bootaux, KOBJ_LM_DEBUGGER) < 0) 1441 return (-1); 1442 1443 if ((sym = lookup_one(mctl->mod_mp, "kctl_boot_activate")) == NULL) 1444 return (-1); 1445 1446 #ifdef KOBJ_DEBUG 1447 if (kobj_debug & D_DEBUG) { 1448 _kobj_printf(ops, "calling kctl_boot_activate() @ 0x%lx\n", 1449 sym->st_value); 1450 _kobj_printf(ops, "\tops 0x%p\n", ops); 1451 _kobj_printf(ops, "\tromp 0x%p\n", romp); 1452 } 1453 #endif 1454 1455 if (((kctl_boot_activate_f *)sym->st_value)(ops, romp, 0, 1456 (const char **)kobj_kmdb_argv) < 0) 1457 return (-1); 1458 1459 return (0); 1460 } 1461 1462 /* 1463 * Return a string listing module dependencies. 1464 */ 1465 static char * 1466 depends_on(struct module *mp) 1467 { 1468 Sym *sp; 1469 char *depstr, *q; 1470 1471 /* 1472 * The module doesn't have a depends_on value, so let's try it the 1473 * old-fashioned way - via "_depends_on" 1474 */ 1475 if ((sp = lookup_one(mp, "_depends_on")) == NULL) 1476 return (NULL); 1477 1478 q = (char *)sp->st_value; 1479 1480 /* 1481 * Idiot checks. Make sure it's 1482 * in-bounds and NULL terminated. 1483 */ 1484 if (kobj_addrcheck(mp, q) || q[sp->st_size - 1] != '\0') { 1485 _kobj_printf(ops, "Error processing dependency for %s\n", 1486 mp->filename); 1487 return (NULL); 1488 } 1489 1490 depstr = (char *)kobj_alloc(strlen(q) + 1, KM_WAIT); 1491 (void) strcpy(depstr, q); 1492 1493 return (depstr); 1494 } 1495 1496 void 1497 kobj_getmodinfo(void *xmp, struct modinfo *modinfo) 1498 { 1499 struct module *mp; 1500 mp = (struct module *)xmp; 1501 1502 modinfo->mi_base = mp->text; 1503 modinfo->mi_size = mp->text_size + mp->data_size; 1504 } 1505 1506 /* 1507 * kobj_export_ksyms() performs the following services: 1508 * 1509 * (1) Migrates the symbol table from boot/kobj memory to the ksyms arena. 1510 * (2) Removes unneeded symbols to save space. 1511 * (3) Reduces memory footprint by using VM_BESTFIT allocations. 1512 * (4) Makes the symbol table visible to /dev/ksyms. 1513 */ 1514 static void 1515 kobj_export_ksyms(struct module *mp) 1516 { 1517 Sym *esp = (Sym *)(mp->symtbl + mp->symhdr->sh_size); 1518 Sym *sp, *osp; 1519 char *name; 1520 size_t namelen; 1521 struct module *omp; 1522 uint_t nsyms; 1523 size_t symsize = mp->symhdr->sh_entsize; 1524 size_t locals = 1; 1525 size_t strsize; 1526 1527 /* 1528 * Make a copy of the original module structure. 1529 */ 1530 omp = kobj_alloc(sizeof (struct module), KM_WAIT); 1531 bcopy(mp, omp, sizeof (struct module)); 1532 1533 /* 1534 * Compute the sizes of the new symbol table sections. 1535 */ 1536 for (nsyms = strsize = 1, osp = (Sym *)omp->symtbl; osp < esp; osp++) { 1537 if (osp->st_value == 0) 1538 continue; 1539 if (sym_lookup(omp, osp) == NULL) 1540 continue; 1541 name = omp->strings + osp->st_name; 1542 namelen = strlen(name); 1543 if (ELF_ST_BIND(osp->st_info) == STB_LOCAL) 1544 locals++; 1545 nsyms++; 1546 strsize += namelen + 1; 1547 } 1548 1549 mp->nsyms = nsyms; 1550 mp->hashsize = kobj_gethashsize(mp->nsyms); 1551 1552 /* 1553 * ksyms_lock must be held as writer during any operation that 1554 * modifies ksyms_arena, including allocation from same, and 1555 * must not be dropped until the arena is vmem_walk()able. 1556 */ 1557 rw_enter(&ksyms_lock, RW_WRITER); 1558 1559 /* 1560 * Allocate space for the new section headers (symtab and strtab), 1561 * symbol table, buckets, chains, and strings. 1562 */ 1563 mp->symsize = (2 * sizeof (Shdr)) + (nsyms * symsize) + 1564 (mp->hashsize + mp->nsyms) * sizeof (symid_t) + strsize; 1565 1566 if (mp->flags & KOBJ_NOKSYMS) { 1567 mp->symspace = kobj_alloc(mp->symsize, KM_WAIT); 1568 } else { 1569 mp->symspace = vmem_alloc(ksyms_arena, mp->symsize, 1570 VM_BESTFIT | VM_SLEEP); 1571 } 1572 bzero(mp->symspace, mp->symsize); 1573 1574 /* 1575 * Divvy up symspace. 1576 */ 1577 mp->shdrs = mp->symspace; 1578 mp->symhdr = (Shdr *)mp->shdrs; 1579 mp->strhdr = (Shdr *)(mp->symhdr + 1); 1580 mp->symtbl = (char *)(mp->strhdr + 1); 1581 mp->buckets = (symid_t *)(mp->symtbl + (nsyms * symsize)); 1582 mp->chains = (symid_t *)(mp->buckets + mp->hashsize); 1583 mp->strings = (char *)(mp->chains + nsyms); 1584 1585 /* 1586 * Fill in the new section headers (symtab and strtab). 1587 */ 1588 mp->hdr.e_shnum = 2; 1589 mp->symtbl_section = 0; 1590 1591 mp->symhdr->sh_type = SHT_SYMTAB; 1592 mp->symhdr->sh_addr = (Addr)mp->symtbl; 1593 mp->symhdr->sh_size = nsyms * symsize; 1594 mp->symhdr->sh_link = 1; 1595 mp->symhdr->sh_info = locals; 1596 mp->symhdr->sh_addralign = sizeof (Addr); 1597 mp->symhdr->sh_entsize = symsize; 1598 1599 mp->strhdr->sh_type = SHT_STRTAB; 1600 mp->strhdr->sh_addr = (Addr)mp->strings; 1601 mp->strhdr->sh_size = strsize; 1602 mp->strhdr->sh_addralign = 1; 1603 1604 /* 1605 * Construct the new symbol table. 1606 */ 1607 for (nsyms = strsize = 1, osp = (Sym *)omp->symtbl; osp < esp; osp++) { 1608 if (osp->st_value == 0) 1609 continue; 1610 if (sym_lookup(omp, osp) == NULL) 1611 continue; 1612 name = omp->strings + osp->st_name; 1613 namelen = strlen(name); 1614 sp = (Sym *)(mp->symtbl + symsize * nsyms); 1615 bcopy(osp, sp, symsize); 1616 bcopy(name, mp->strings + strsize, namelen); 1617 sp->st_name = strsize; 1618 sym_insert(mp, name, nsyms); 1619 nsyms++; 1620 strsize += namelen + 1; 1621 } 1622 1623 rw_exit(&ksyms_lock); 1624 1625 /* 1626 * Free the old section headers -- we'll never need them again. 1627 */ 1628 if (!(mp->flags & KOBJ_PRIM)) 1629 kobj_free(omp->shdrs, omp->hdr.e_shentsize * omp->hdr.e_shnum); 1630 /* 1631 * Discard the old symbol table and our copy of the module strucure. 1632 */ 1633 if (!(mp->flags & KOBJ_PRIM)) 1634 kobj_free(omp->symspace, omp->symsize); 1635 kobj_free(omp, sizeof (struct module)); 1636 } 1637 1638 static void 1639 kobj_export_ctf(struct module *mp) 1640 { 1641 char *data = mp->ctfdata; 1642 size_t size = mp->ctfsize; 1643 1644 if (data != NULL) { 1645 if (_moddebug & MODDEBUG_NOCTF) { 1646 mp->ctfdata = NULL; 1647 mp->ctfsize = 0; 1648 } else { 1649 mp->ctfdata = vmem_alloc(ctf_arena, size, 1650 VM_BESTFIT | VM_SLEEP); 1651 bcopy(data, mp->ctfdata, size); 1652 } 1653 1654 if (!(mp->flags & KOBJ_PRIM)) 1655 kobj_free(data, size); 1656 } 1657 } 1658 1659 void 1660 kobj_export_module(struct module *mp) 1661 { 1662 kobj_export_ksyms(mp); 1663 kobj_export_ctf(mp); 1664 1665 mp->flags |= KOBJ_EXPORTED; 1666 } 1667 1668 static int 1669 process_dynamic(struct module *mp, char *dyndata, char *strdata) 1670 { 1671 char *path = NULL, *depstr = NULL; 1672 int allocsize = 0, osize = 0, nsize = 0; 1673 char *libname, *tmp; 1674 int lsize; 1675 Dyn *dynp; 1676 1677 for (dynp = (Dyn *)dyndata; dynp && dynp->d_tag != DT_NULL; dynp++) { 1678 switch (dynp->d_tag) { 1679 case DT_NEEDED: 1680 /* 1681 * Read the DT_NEEDED entries, expanding the macros they 1682 * contain (if any), and concatenating them into a 1683 * single space-separated dependency list. 1684 */ 1685 libname = (ulong_t)dynp->d_un.d_ptr + strdata; 1686 1687 if (strchr(libname, '$') != NULL) { 1688 char *_lib; 1689 1690 if (path == NULL) 1691 path = kobj_alloc(MAXPATHLEN, KM_WAIT); 1692 if ((_lib = expand_libmacro(libname, path, 1693 path)) != NULL) 1694 libname = _lib; 1695 else { 1696 _kobj_printf(ops, "krtld: " 1697 "process_dynamic: failed to expand " 1698 "%s\n", libname); 1699 } 1700 } 1701 1702 lsize = strlen(libname); 1703 nsize += lsize; 1704 if (nsize + 1 > allocsize) { 1705 tmp = kobj_alloc(allocsize + MAXPATHLEN, 1706 KM_WAIT); 1707 if (depstr != NULL) { 1708 bcopy(depstr, tmp, osize); 1709 kobj_free(depstr, allocsize); 1710 } 1711 depstr = tmp; 1712 allocsize += MAXPATHLEN; 1713 } 1714 bcopy(libname, depstr + osize, lsize); 1715 *(depstr + nsize) = ' '; /* separator */ 1716 nsize++; 1717 osize = nsize; 1718 break; 1719 1720 case DT_FLAGS_1: 1721 if (dynp->d_un.d_val & DF_1_IGNMULDEF) 1722 mp->flags |= KOBJ_IGNMULDEF; 1723 if (dynp->d_un.d_val & DF_1_NOKSYMS) 1724 mp->flags |= KOBJ_NOKSYMS; 1725 1726 break; 1727 } 1728 } 1729 1730 /* 1731 * finish up the depends string (if any) 1732 */ 1733 if (depstr != NULL) { 1734 *(depstr + nsize - 1) = '\0'; /* overwrite seperator w/term */ 1735 if (path != NULL) 1736 kobj_free(path, MAXPATHLEN); 1737 1738 tmp = kobj_alloc(nsize, KM_WAIT); 1739 bcopy(depstr, tmp, nsize); 1740 kobj_free(depstr, allocsize); 1741 depstr = tmp; 1742 1743 mp->depends_on = depstr; 1744 } 1745 1746 return (0); 1747 } 1748 1749 static int 1750 do_dynamic(struct module *mp, struct _buf *file) 1751 { 1752 Shdr *dshp, *dstrp, *shp; 1753 char *dyndata, *dstrdata; 1754 int dshn, shn, rc; 1755 1756 /* find and validate the dynamic section (if any) */ 1757 1758 for (dshp = NULL, shn = 1; shn < mp->hdr.e_shnum; shn++) { 1759 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize); 1760 switch (shp->sh_type) { 1761 case SHT_DYNAMIC: 1762 if (dshp != NULL) { 1763 _kobj_printf(ops, "krtld: get_dynamic: %s, ", 1764 mp->filename); 1765 _kobj_printf(ops, 1766 "multiple dynamic sections\n"); 1767 return (-1); 1768 } else { 1769 dshp = shp; 1770 dshn = shn; 1771 } 1772 break; 1773 } 1774 } 1775 1776 if (dshp == NULL) 1777 return (0); 1778 1779 if (dshp->sh_link > mp->hdr.e_shnum) { 1780 _kobj_printf(ops, "krtld: get_dynamic: %s, ", mp->filename); 1781 _kobj_printf(ops, "no section for sh_link %d\n", dshp->sh_link); 1782 return (-1); 1783 } 1784 dstrp = (Shdr *)(mp->shdrs + dshp->sh_link * mp->hdr.e_shentsize); 1785 1786 if (dstrp->sh_type != SHT_STRTAB) { 1787 _kobj_printf(ops, "krtld: get_dynamic: %s, ", mp->filename); 1788 _kobj_printf(ops, "sh_link not a string table for section %d\n", 1789 dshn); 1790 return (-1); 1791 } 1792 1793 /* read it from disk */ 1794 1795 dyndata = kobj_alloc(dshp->sh_size, KM_WAIT|KM_TMP); 1796 if (kobj_read_file(file, dyndata, dshp->sh_size, dshp->sh_offset) < 0) { 1797 _kobj_printf(ops, "krtld: get_dynamic: %s, ", mp->filename); 1798 _kobj_printf(ops, "error reading section %d\n", dshn); 1799 1800 kobj_free(dyndata, dshp->sh_size); 1801 return (-1); 1802 } 1803 1804 dstrdata = kobj_alloc(dstrp->sh_size, KM_WAIT|KM_TMP); 1805 if (kobj_read_file(file, dstrdata, dstrp->sh_size, 1806 dstrp->sh_offset) < 0) { 1807 _kobj_printf(ops, "krtld: get_dynamic: %s, ", mp->filename); 1808 _kobj_printf(ops, "error reading section %d\n", dshp->sh_link); 1809 1810 kobj_free(dyndata, dshp->sh_size); 1811 kobj_free(dstrdata, dstrp->sh_size); 1812 return (-1); 1813 } 1814 1815 /* pull the interesting pieces out */ 1816 1817 rc = process_dynamic(mp, dyndata, dstrdata); 1818 1819 kobj_free(dyndata, dshp->sh_size); 1820 kobj_free(dstrdata, dstrp->sh_size); 1821 1822 return (rc); 1823 } 1824 1825 void 1826 kobj_set_ctf(struct module *mp, caddr_t data, size_t size) 1827 { 1828 if (!standalone) { 1829 if (mp->ctfdata != NULL) { 1830 if (vmem_contains(ctf_arena, mp->ctfdata, 1831 mp->ctfsize)) { 1832 vmem_free(ctf_arena, mp->ctfdata, mp->ctfsize); 1833 } else { 1834 kobj_free(mp->ctfdata, mp->ctfsize); 1835 } 1836 } 1837 } 1838 1839 /* 1840 * The order is very important here. We need to make sure that 1841 * consumers, at any given instant, see a consistent state. We'd 1842 * rather they see no CTF data than the address of one buffer and the 1843 * size of another. 1844 */ 1845 mp->ctfdata = NULL; 1846 membar_producer(); 1847 mp->ctfsize = size; 1848 mp->ctfdata = data; 1849 membar_producer(); 1850 } 1851 1852 int 1853 kobj_load_module(struct modctl *modp, int use_path) 1854 { 1855 char *filename = modp->mod_filename; 1856 char *modname = modp->mod_modname; 1857 int i; 1858 int n; 1859 struct _buf *file; 1860 struct module *mp = NULL; 1861 #ifdef MODDIR_SUFFIX 1862 int no_suffixdir_drv = 0; 1863 #endif 1864 1865 mp = kobj_zalloc(sizeof (struct module), KM_WAIT); 1866 1867 /* 1868 * We need to prevent kmdb's symbols from leaking into /dev/ksyms. 1869 * kmdb contains a bunch of symbols with well-known names, symbols 1870 * which will mask the real versions, thus causing no end of trouble 1871 * for mdb. 1872 */ 1873 if (strcmp(modp->mod_modname, "kmdbmod") == 0) 1874 mp->flags |= KOBJ_NOKSYMS; 1875 1876 file = kobj_open_path(filename, use_path, 1); 1877 if (file == (struct _buf *)-1) { 1878 #ifdef MODDIR_SUFFIX 1879 file = kobj_open_path(filename, use_path, 0); 1880 #endif 1881 if (file == (struct _buf *)-1) { 1882 kobj_free(mp, sizeof (*mp)); 1883 goto bad; 1884 } 1885 #ifdef MODDIR_SUFFIX 1886 /* 1887 * There is no driver module in the ISA specific (suffix) 1888 * subdirectory but there is a module in the parent directory. 1889 */ 1890 if (strncmp(filename, "drv/", 4) == 0) { 1891 no_suffixdir_drv = 1; 1892 } 1893 #endif 1894 } 1895 1896 mp->filename = kobj_alloc(strlen(file->_name) + 1, KM_WAIT); 1897 (void) strcpy(mp->filename, file->_name); 1898 1899 if (kobj_read_file(file, (char *)&mp->hdr, sizeof (mp->hdr), 0) < 0) { 1900 _kobj_printf(ops, "kobj_load_module: %s read header failed\n", 1901 modname); 1902 kobj_free(mp->filename, strlen(file->_name) + 1); 1903 kobj_free(mp, sizeof (*mp)); 1904 goto bad; 1905 } 1906 for (i = 0; i < SELFMAG; i++) { 1907 if (mp->hdr.e_ident[i] != ELFMAG[i]) { 1908 if (_moddebug & MODDEBUG_ERRMSG) 1909 _kobj_printf(ops, "%s not an elf module\n", 1910 modname); 1911 kobj_free(mp->filename, strlen(file->_name) + 1); 1912 kobj_free(mp, sizeof (*mp)); 1913 goto bad; 1914 } 1915 } 1916 /* 1917 * It's ELF, but is it our ISA? Interpreting the header 1918 * from a file for a byte-swapped ISA could cause a huge 1919 * and unsatisfiable value to be passed to kobj_alloc below 1920 * and therefore hang booting. 1921 */ 1922 if (!elf_mach_ok(&mp->hdr)) { 1923 if (_moddebug & MODDEBUG_ERRMSG) 1924 _kobj_printf(ops, "%s not an elf module for this ISA\n", 1925 modname); 1926 kobj_free(mp->filename, strlen(file->_name) + 1); 1927 kobj_free(mp, sizeof (*mp)); 1928 #ifdef MODDIR_SUFFIX 1929 /* 1930 * The driver mod is not in the ISA specific subdirectory 1931 * and the module in the parent directory is not our ISA. 1932 * If it is our ISA, for now we will silently succeed. 1933 */ 1934 if (no_suffixdir_drv == 1) { 1935 cmn_err(CE_CONT, "?NOTICE: %s: 64-bit driver module" 1936 " not found\n", modname); 1937 } 1938 #endif 1939 goto bad; 1940 } 1941 1942 /* 1943 * All modules, save for unix, should be relocatable (as opposed to 1944 * dynamic). Dynamic modules come with PLTs and GOTs, which can't 1945 * currently be processed by krtld. 1946 */ 1947 if (mp->hdr.e_type != ET_REL) { 1948 if (_moddebug & MODDEBUG_ERRMSG) 1949 _kobj_printf(ops, "%s isn't a relocatable (ET_REL) " 1950 "module\n", modname); 1951 kobj_free(mp->filename, strlen(file->_name) + 1); 1952 kobj_free(mp, sizeof (*mp)); 1953 goto bad; 1954 } 1955 1956 n = mp->hdr.e_shentsize * mp->hdr.e_shnum; 1957 mp->shdrs = kobj_alloc(n, KM_WAIT); 1958 1959 if (kobj_read_file(file, mp->shdrs, n, mp->hdr.e_shoff) < 0) { 1960 _kobj_printf(ops, "kobj_load_module: %s error reading " 1961 "section headers\n", modname); 1962 kobj_free(mp->shdrs, n); 1963 kobj_free(mp->filename, strlen(file->_name) + 1); 1964 kobj_free(mp, sizeof (*mp)); 1965 goto bad; 1966 } 1967 1968 kobj_notify(KOBJ_NOTIFY_MODLOADING, modp); 1969 module_assign(modp, mp); 1970 1971 /* read in sections */ 1972 if (get_progbits(mp, file) < 0) { 1973 _kobj_printf(ops, "%s error reading sections\n", modname); 1974 goto bad; 1975 } 1976 1977 if (do_dynamic(mp, file) < 0) { 1978 _kobj_printf(ops, "%s error reading dynamic section\n", 1979 modname); 1980 goto bad; 1981 } 1982 1983 modp->mod_text = mp->text; 1984 modp->mod_text_size = mp->text_size; 1985 1986 /* read in symbols; adjust values for each section's real address */ 1987 if (get_syms(mp, file) < 0) { 1988 _kobj_printf(ops, "%s error reading symbols\n", 1989 modname); 1990 goto bad; 1991 } 1992 1993 /* 1994 * If we didn't dependency information from the dynamic section, look 1995 * for it the old-fashioned way. 1996 */ 1997 if (mp->depends_on == NULL) 1998 mp->depends_on = depends_on(mp); 1999 2000 if (get_ctf(mp, file) < 0) { 2001 _kobj_printf(ops, "%s debug information will not " 2002 "be available\n", modname); 2003 } 2004 2005 /* primary kernel modules do not have a signature section */ 2006 if (!(mp->flags & KOBJ_PRIM)) 2007 get_signature(mp, file); 2008 2009 #ifdef KOBJ_DEBUG 2010 if (kobj_debug & D_LOADING) { 2011 _kobj_printf(ops, "krtld: file=%s\n", mp->filename); 2012 _kobj_printf(ops, "\ttext:0x%p", mp->text); 2013 _kobj_printf(ops, " size: 0x%x\n", mp->text_size); 2014 _kobj_printf(ops, "\tdata:0x%p", mp->data); 2015 _kobj_printf(ops, " dsize: 0x%x\n", mp->data_size); 2016 } 2017 #endif /* KOBJ_DEBUG */ 2018 2019 /* 2020 * For primary kernel modules, we defer 2021 * symbol resolution and relocation until 2022 * all primary objects have been loaded. 2023 */ 2024 if (!standalone) { 2025 int ddrval, dcrval; 2026 char *dependent_modname; 2027 /* load all dependents */ 2028 dependent_modname = kobj_zalloc(MODMAXNAMELEN, KM_WAIT); 2029 ddrval = do_dependents(modp, dependent_modname, MODMAXNAMELEN); 2030 2031 /* 2032 * resolve undefined and common symbols, 2033 * also allocates common space 2034 */ 2035 if ((dcrval = do_common(mp)) < 0) { 2036 switch (dcrval) { 2037 case DOSYM_UNSAFE: 2038 _kobj_printf(ops, "WARNING: mod_load: " 2039 "MT-unsafe module '%s' rejected\n", 2040 modname); 2041 break; 2042 case DOSYM_UNDEF: 2043 _kobj_printf(ops, "WARNING: mod_load: " 2044 "cannot load module '%s'\n", 2045 modname); 2046 if (ddrval == -1) { 2047 _kobj_printf(ops, "WARNING: %s: ", 2048 modname); 2049 _kobj_printf(ops, 2050 "unable to resolve dependency, " 2051 "module '%s' not found\n", 2052 dependent_modname); 2053 } 2054 break; 2055 } 2056 } 2057 kobj_free(dependent_modname, MODMAXNAMELEN); 2058 if (dcrval < 0) 2059 goto bad; 2060 2061 /* process relocation tables */ 2062 if (do_relocations(mp) < 0) { 2063 _kobj_printf(ops, "%s error doing relocations\n", 2064 modname); 2065 goto bad; 2066 } 2067 2068 if (mp->destination) { 2069 off_t off = (uintptr_t)mp->destination & PAGEOFFSET; 2070 caddr_t base = (caddr_t)mp->destination - off; 2071 size_t size = P2ROUNDUP(mp->text_size + off, PAGESIZE); 2072 2073 hat_unload(kas.a_hat, base, size, HAT_UNLOAD_UNLOCK); 2074 vmem_free(heap_arena, base, size); 2075 } 2076 2077 /* sync_instruction_memory */ 2078 kobj_sync_instruction_memory(mp->text, mp->text_size); 2079 #ifdef MPSAS 2080 sas_syms(mp); 2081 #endif 2082 kobj_export_module(mp); 2083 kobj_notify(KOBJ_NOTIFY_MODLOADED, modp); 2084 } 2085 kobj_close_file(file); 2086 return (0); 2087 bad: 2088 if (file != (struct _buf *)-1) 2089 kobj_close_file(file); 2090 if (modp->mod_mp != NULL) 2091 free_module_data(modp->mod_mp); 2092 2093 module_assign(modp, NULL); 2094 return ((file == (struct _buf *)-1) ? ENOENT : EINVAL); 2095 } 2096 2097 int 2098 kobj_load_primary_module(struct modctl *modp) 2099 { 2100 struct modctl *dep; 2101 struct module *mp; 2102 2103 if (kobj_load_module(modp, 0) != 0) 2104 return (-1); 2105 2106 mp = modp->mod_mp; 2107 mp->flags |= KOBJ_PRIM; 2108 2109 /* Bind new module to its dependents */ 2110 if (mp->depends_on != NULL && (dep = 2111 mod_already_loaded(mp->depends_on)) == NULL) { 2112 #ifdef KOBJ_DEBUG 2113 if (kobj_debug & D_DEBUG) { 2114 _kobj_printf(ops, "krtld: failed to resolve deps " 2115 "for primary %s\n", modp->mod_modname); 2116 } 2117 #endif 2118 return (-1); 2119 } 2120 2121 add_dependent(mp, dep->mod_mp); 2122 2123 /* 2124 * Relocate it. This module may not be part of a link map, so we 2125 * can't use bind_primary. 2126 */ 2127 if (do_common(mp) < 0 || do_symbols(mp, 0) < 0 || 2128 do_relocations(mp) < 0) { 2129 #ifdef KOBJ_DEBUG 2130 if (kobj_debug & D_DEBUG) { 2131 _kobj_printf(ops, "krtld: failed to relocate " 2132 "primary %s\n", modp->mod_modname); 2133 } 2134 #endif 2135 return (-1); 2136 } 2137 2138 return (0); 2139 } 2140 2141 static void 2142 module_assign(struct modctl *cp, struct module *mp) 2143 { 2144 if (standalone) { 2145 cp->mod_mp = mp; 2146 return; 2147 } 2148 mutex_enter(&mod_lock); 2149 cp->mod_mp = mp; 2150 cp->mod_gencount++; 2151 mutex_exit(&mod_lock); 2152 } 2153 2154 void 2155 kobj_unload_module(struct modctl *modp) 2156 { 2157 struct module *mp = modp->mod_mp; 2158 2159 if ((_moddebug & MODDEBUG_KEEPTEXT) && mp) { 2160 _kobj_printf(ops, "text for %s ", mp->filename); 2161 _kobj_printf(ops, "was at %p\n", mp->text); 2162 mp->text = NULL; /* don't actually free it */ 2163 } 2164 2165 kobj_notify(KOBJ_NOTIFY_MODUNLOADING, modp); 2166 2167 /* 2168 * Null out mod_mp first, so consumers (debuggers) know not to look 2169 * at the module structure any more. 2170 */ 2171 mutex_enter(&mod_lock); 2172 modp->mod_mp = NULL; 2173 mutex_exit(&mod_lock); 2174 2175 kobj_notify(KOBJ_NOTIFY_MODUNLOADED, modp); 2176 free_module_data(mp); 2177 } 2178 2179 static void 2180 free_module_data(struct module *mp) 2181 { 2182 struct module_list *lp, *tmp; 2183 int ksyms_exported = 0; 2184 2185 lp = mp->head; 2186 while (lp) { 2187 tmp = lp; 2188 lp = lp->next; 2189 kobj_free((char *)tmp, sizeof (*tmp)); 2190 } 2191 2192 rw_enter(&ksyms_lock, RW_WRITER); 2193 if (mp->symspace) { 2194 if (vmem_contains(ksyms_arena, mp->symspace, mp->symsize)) { 2195 vmem_free(ksyms_arena, mp->symspace, mp->symsize); 2196 ksyms_exported = 1; 2197 } else { 2198 if (mp->flags & KOBJ_NOKSYMS) 2199 ksyms_exported = 1; 2200 kobj_free(mp->symspace, mp->symsize); 2201 } 2202 } 2203 rw_exit(&ksyms_lock); 2204 2205 if (mp->ctfdata) { 2206 if (vmem_contains(ctf_arena, mp->ctfdata, mp->ctfsize)) 2207 vmem_free(ctf_arena, mp->ctfdata, mp->ctfsize); 2208 else 2209 kobj_free(mp->ctfdata, mp->ctfsize); 2210 } 2211 2212 if (mp->sigdata) 2213 kobj_free(mp->sigdata, mp->sigsize); 2214 2215 /* 2216 * We did not get far enough into kobj_export_ksyms() to free allocated 2217 * buffers because we encounted error conditions. Free the buffers. 2218 */ 2219 if ((ksyms_exported == 0) && (mp->shdrs != NULL)) { 2220 uint_t shn; 2221 Shdr *shp; 2222 2223 for (shn = 1; shn < mp->hdr.e_shnum; shn++) { 2224 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize); 2225 switch (shp->sh_type) { 2226 case SHT_RELA: 2227 case SHT_REL: 2228 if (shp->sh_addr != 0) 2229 kobj_free((void *)shp->sh_addr, 2230 shp->sh_size); 2231 break; 2232 } 2233 } 2234 err_free_done: 2235 if (!(mp->flags & KOBJ_PRIM)) { 2236 kobj_free(mp->shdrs, 2237 mp->hdr.e_shentsize * mp->hdr.e_shnum); 2238 } 2239 } 2240 2241 if (mp->bss) 2242 vmem_free(data_arena, (void *)mp->bss, mp->bss_size); 2243 2244 if (mp->fbt_tab) 2245 kobj_texthole_free(mp->fbt_tab, mp->fbt_size); 2246 2247 if (mp->textwin_base) 2248 kobj_textwin_free(mp); 2249 2250 if (mp->sdt_probes != NULL) { 2251 sdt_probedesc_t *sdp = mp->sdt_probes, *next; 2252 2253 while (sdp != NULL) { 2254 next = sdp->sdpd_next; 2255 kobj_free(sdp->sdpd_name, strlen(sdp->sdpd_name) + 1); 2256 kobj_free(sdp, sizeof (sdt_probedesc_t)); 2257 sdp = next; 2258 } 2259 } 2260 2261 if (mp->sdt_tab) 2262 kobj_texthole_free(mp->sdt_tab, mp->sdt_size); 2263 if (mp->text) 2264 vmem_free(text_arena, mp->text, mp->text_size); 2265 if (mp->data) 2266 vmem_free(data_arena, mp->data, mp->data_size); 2267 if (mp->depends_on) 2268 kobj_free(mp->depends_on, strlen(mp->depends_on)+1); 2269 if (mp->filename) 2270 kobj_free(mp->filename, strlen(mp->filename)+1); 2271 2272 kobj_free((char *)mp, sizeof (*mp)); 2273 } 2274 2275 static int 2276 get_progbits(struct module *mp, struct _buf *file) 2277 { 2278 struct proginfo *tp, *dp, *sdp; 2279 Shdr *shp; 2280 reloc_dest_t dest = NULL; 2281 uintptr_t bits_ptr; 2282 uintptr_t text = 0, data, sdata = 0, textptr; 2283 uint_t shn; 2284 int err = -1; 2285 2286 tp = kobj_zalloc(sizeof (struct proginfo), KM_WAIT); 2287 dp = kobj_zalloc(sizeof (struct proginfo), KM_WAIT); 2288 sdp = kobj_zalloc(sizeof (struct proginfo), KM_WAIT); 2289 /* 2290 * loop through sections to find out how much space we need 2291 * for text, data, (also bss that is already assigned) 2292 */ 2293 if (get_progbits_size(mp, tp, dp, sdp) < 0) 2294 goto done; 2295 2296 mp->text_size = tp->size; 2297 mp->data_size = dp->size; 2298 2299 if (standalone) { 2300 caddr_t limit = _data; 2301 2302 if (lg_pagesize && _text + lg_pagesize < limit) 2303 limit = _text + lg_pagesize; 2304 2305 mp->text = kobj_segbrk(&_etext, mp->text_size, 2306 tp->align, limit); 2307 /* 2308 * If we can't grow the text segment, try the 2309 * data segment before failing. 2310 */ 2311 if (mp->text == NULL) { 2312 mp->text = kobj_segbrk(&_edata, mp->text_size, 2313 tp->align, 0); 2314 } 2315 2316 mp->data = kobj_segbrk(&_edata, mp->data_size, dp->align, 0); 2317 2318 if (mp->text == NULL || mp->data == NULL) 2319 goto done; 2320 2321 } else { 2322 if (text_arena == NULL) 2323 kobj_vmem_init(&text_arena, &data_arena); 2324 2325 /* 2326 * some architectures may want to load the module on a 2327 * page that is currently read only. It may not be 2328 * possible for those architectures to remap their page 2329 * on the fly. So we provide a facility for them to hang 2330 * a private hook where the memory they assign the module 2331 * is not the actual place where the module loads. 2332 * 2333 * In this case there are two addresses that deal with the 2334 * modload. 2335 * 1) the final destination of the module 2336 * 2) the address that is used to view the newly 2337 * loaded module until all the relocations relative to 1 2338 * above are completed. 2339 * 2340 * That is what dest is used for below. 2341 */ 2342 mp->text_size += tp->align; 2343 mp->data_size += dp->align; 2344 2345 mp->text = kobj_text_alloc(text_arena, mp->text_size); 2346 2347 /* 2348 * a remap is taking place. Align the text ptr relative 2349 * to the secondary mapping. That is where the bits will 2350 * be read in. 2351 */ 2352 if (kvseg.s_base != NULL && !vmem_contains(heaptext_arena, 2353 mp->text, mp->text_size)) { 2354 off_t off = (uintptr_t)mp->text & PAGEOFFSET; 2355 size_t size = P2ROUNDUP(mp->text_size + off, PAGESIZE); 2356 caddr_t map = vmem_alloc(heap_arena, size, VM_SLEEP); 2357 caddr_t orig = mp->text - off; 2358 pgcnt_t pages = size / PAGESIZE; 2359 2360 dest = (reloc_dest_t)(map + off); 2361 text = ALIGN((uintptr_t)dest, tp->align); 2362 2363 while (pages--) { 2364 hat_devload(kas.a_hat, map, PAGESIZE, 2365 hat_getpfnum(kas.a_hat, orig), 2366 PROT_READ | PROT_WRITE | PROT_EXEC, 2367 HAT_LOAD_NOCONSIST | HAT_LOAD_LOCK); 2368 map += PAGESIZE; 2369 orig += PAGESIZE; 2370 } 2371 /* 2372 * Since we set up a non-cacheable mapping, we need 2373 * to flush any old entries in the cache that might 2374 * be left around from the read-only mapping. 2375 */ 2376 dcache_flushall(); 2377 } 2378 if (mp->data_size) 2379 mp->data = vmem_alloc(data_arena, mp->data_size, 2380 VM_SLEEP | VM_BESTFIT); 2381 } 2382 textptr = (uintptr_t)mp->text; 2383 textptr = ALIGN(textptr, tp->align); 2384 mp->destination = dest; 2385 2386 /* 2387 * This is the case where a remap is not being done. 2388 */ 2389 if (text == 0) 2390 text = ALIGN((uintptr_t)mp->text, tp->align); 2391 data = ALIGN((uintptr_t)mp->data, dp->align); 2392 2393 /* now loop though sections assigning addresses and loading the data */ 2394 for (shn = 1; shn < mp->hdr.e_shnum; shn++) { 2395 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize); 2396 if (!(shp->sh_flags & SHF_ALLOC)) 2397 continue; 2398 2399 if ((shp->sh_flags & SHF_WRITE) == 0) 2400 bits_ptr = text; 2401 else if (shp->sh_flags & SHF_NEUT_SHORT) 2402 bits_ptr = sdata; 2403 else 2404 bits_ptr = data; 2405 2406 bits_ptr = ALIGN(bits_ptr, shp->sh_addralign); 2407 2408 if (shp->sh_type == SHT_NOBITS) { 2409 /* 2410 * Zero bss. 2411 */ 2412 bzero((caddr_t)bits_ptr, shp->sh_size); 2413 shp->sh_type = SHT_PROGBITS; 2414 } else { 2415 if (kobj_read_file(file, (char *)bits_ptr, 2416 shp->sh_size, shp->sh_offset) < 0) 2417 goto done; 2418 } 2419 2420 if (shp->sh_flags & SHF_WRITE) { 2421 shp->sh_addr = bits_ptr; 2422 } else { 2423 textptr = ALIGN(textptr, shp->sh_addralign); 2424 shp->sh_addr = textptr; 2425 textptr += shp->sh_size; 2426 } 2427 2428 bits_ptr += shp->sh_size; 2429 if ((shp->sh_flags & SHF_WRITE) == 0) 2430 text = bits_ptr; 2431 else if (shp->sh_flags & SHF_NEUT_SHORT) 2432 sdata = bits_ptr; 2433 else 2434 data = bits_ptr; 2435 } 2436 2437 err = 0; 2438 done: 2439 /* 2440 * Free and mark as freed the section headers here so that 2441 * free_module_data() does not have to worry about this buffer. 2442 * 2443 * This buffer is freed here because one of the possible reasons 2444 * for error is a section with non-zero sh_addr and in that case 2445 * free_module_data() would have no way of recognizing that this 2446 * buffer was unallocated. 2447 */ 2448 if (err != 0) { 2449 kobj_free(mp->shdrs, mp->hdr.e_shentsize * mp->hdr.e_shnum); 2450 mp->shdrs = NULL; 2451 } 2452 2453 (void) kobj_free(tp, sizeof (struct proginfo)); 2454 (void) kobj_free(dp, sizeof (struct proginfo)); 2455 (void) kobj_free(sdp, sizeof (struct proginfo)); 2456 2457 return (err); 2458 } 2459 2460 /* 2461 * Go through suppress_sym_list to see if "multiply defined" 2462 * warning of this symbol should be suppressed. Return 1 if 2463 * warning should be suppressed, 0 otherwise. 2464 */ 2465 static int 2466 kobj_suppress_warning(char *symname) 2467 { 2468 int i; 2469 2470 for (i = 0; suppress_sym_list[i] != NULL; i++) { 2471 if (strcmp(suppress_sym_list[i], symname) == 0) 2472 return (1); 2473 } 2474 2475 return (0); 2476 } 2477 2478 static int 2479 get_syms(struct module *mp, struct _buf *file) 2480 { 2481 uint_t shn; 2482 Shdr *shp; 2483 uint_t i; 2484 Sym *sp, *ksp; 2485 char *symname; 2486 int dosymtab = 0; 2487 extern char stubs_base[], stubs_end[]; 2488 2489 /* 2490 * Find the interesting sections. 2491 */ 2492 for (shn = 1; shn < mp->hdr.e_shnum; shn++) { 2493 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize); 2494 switch (shp->sh_type) { 2495 case SHT_SYMTAB: 2496 mp->symtbl_section = shn; 2497 mp->symhdr = shp; 2498 dosymtab++; 2499 break; 2500 2501 case SHT_RELA: 2502 case SHT_REL: 2503 /* 2504 * Already loaded. 2505 */ 2506 if (shp->sh_addr) 2507 continue; 2508 shp->sh_addr = (Addr) 2509 kobj_alloc(shp->sh_size, KM_WAIT|KM_TMP); 2510 2511 if (kobj_read_file(file, (char *)shp->sh_addr, 2512 shp->sh_size, shp->sh_offset) < 0) { 2513 _kobj_printf(ops, "krtld: get_syms: %s, ", 2514 mp->filename); 2515 _kobj_printf(ops, "error reading section %d\n", 2516 shn); 2517 return (-1); 2518 } 2519 break; 2520 } 2521 } 2522 2523 /* 2524 * This is true for a stripped executable. In the case of 2525 * 'unix' it can be stripped but it still contains the SHT_DYNSYM, 2526 * and since that symbol information is still present everything 2527 * is just fine. 2528 */ 2529 if (!dosymtab) { 2530 if (mp->flags & KOBJ_EXEC) 2531 return (0); 2532 _kobj_printf(ops, "krtld: get_syms: %s ", 2533 mp->filename); 2534 _kobj_printf(ops, "no SHT_SYMTAB symbol table found\n"); 2535 return (-1); 2536 } 2537 2538 /* 2539 * get the associated string table header 2540 */ 2541 if ((mp->symhdr == 0) || (mp->symhdr->sh_link >= mp->hdr.e_shnum)) 2542 return (-1); 2543 mp->strhdr = (Shdr *) 2544 (mp->shdrs + mp->symhdr->sh_link * mp->hdr.e_shentsize); 2545 2546 mp->nsyms = mp->symhdr->sh_size / mp->symhdr->sh_entsize; 2547 mp->hashsize = kobj_gethashsize(mp->nsyms); 2548 2549 /* 2550 * Allocate space for the symbol table, buckets, chains, and strings. 2551 */ 2552 mp->symsize = mp->symhdr->sh_size + 2553 (mp->hashsize + mp->nsyms) * sizeof (symid_t) + mp->strhdr->sh_size; 2554 mp->symspace = kobj_zalloc(mp->symsize, KM_WAIT|KM_SCRATCH); 2555 2556 mp->symtbl = mp->symspace; 2557 mp->buckets = (symid_t *)(mp->symtbl + mp->symhdr->sh_size); 2558 mp->chains = mp->buckets + mp->hashsize; 2559 mp->strings = (char *)(mp->chains + mp->nsyms); 2560 2561 if (kobj_read_file(file, mp->symtbl, 2562 mp->symhdr->sh_size, mp->symhdr->sh_offset) < 0 || 2563 kobj_read_file(file, mp->strings, 2564 mp->strhdr->sh_size, mp->strhdr->sh_offset) < 0) 2565 return (-1); 2566 2567 /* 2568 * loop through the symbol table adjusting values to account 2569 * for where each section got loaded into memory. Also 2570 * fill in the hash table. 2571 */ 2572 for (i = 1; i < mp->nsyms; i++) { 2573 sp = (Sym *)(mp->symtbl + i * mp->symhdr->sh_entsize); 2574 if (sp->st_shndx < SHN_LORESERVE) { 2575 if (sp->st_shndx >= mp->hdr.e_shnum) { 2576 _kobj_printf(ops, "%s bad shndx ", 2577 file->_name); 2578 _kobj_printf(ops, "in symbol %d\n", i); 2579 return (-1); 2580 } 2581 shp = (Shdr *) 2582 (mp->shdrs + 2583 sp->st_shndx * mp->hdr.e_shentsize); 2584 if (!(mp->flags & KOBJ_EXEC)) 2585 sp->st_value += shp->sh_addr; 2586 } 2587 2588 if (sp->st_name == 0 || sp->st_shndx == SHN_UNDEF) 2589 continue; 2590 if (sp->st_name >= mp->strhdr->sh_size) 2591 return (-1); 2592 2593 symname = mp->strings + sp->st_name; 2594 2595 if (!(mp->flags & KOBJ_EXEC) && 2596 ELF_ST_BIND(sp->st_info) == STB_GLOBAL) { 2597 ksp = kobj_lookup_all(mp, symname, 0); 2598 2599 if (ksp && ELF_ST_BIND(ksp->st_info) == STB_GLOBAL && 2600 !kobj_suppress_warning(symname) && 2601 sp->st_shndx != SHN_UNDEF && 2602 sp->st_shndx != SHN_COMMON && 2603 ksp->st_shndx != SHN_UNDEF && 2604 ksp->st_shndx != SHN_COMMON) { 2605 /* 2606 * Unless this symbol is a stub, it's multiply 2607 * defined. Multiply-defined symbols are 2608 * usually bad, but some objects (kmdb) have 2609 * a legitimate need to have their own 2610 * copies of common functions. 2611 */ 2612 if ((standalone || 2613 ksp->st_value < (uintptr_t)stubs_base || 2614 ksp->st_value >= (uintptr_t)stubs_end) && 2615 !(mp->flags & KOBJ_IGNMULDEF)) { 2616 _kobj_printf(ops, 2617 "%s symbol ", file->_name); 2618 _kobj_printf(ops, 2619 "%s multiply defined\n", symname); 2620 } 2621 } 2622 } 2623 2624 sym_insert(mp, symname, i); 2625 } 2626 2627 return (0); 2628 } 2629 2630 static int 2631 get_ctf(struct module *mp, struct _buf *file) 2632 { 2633 char *shstrtab, *ctfdata; 2634 size_t shstrlen; 2635 Shdr *shp; 2636 uint_t i; 2637 2638 if (_moddebug & MODDEBUG_NOCTF) 2639 return (0); /* do not attempt to even load CTF data */ 2640 2641 if (mp->hdr.e_shstrndx >= mp->hdr.e_shnum) { 2642 _kobj_printf(ops, "krtld: get_ctf: %s, ", 2643 mp->filename); 2644 _kobj_printf(ops, "corrupt e_shstrndx %u\n", 2645 mp->hdr.e_shstrndx); 2646 return (-1); 2647 } 2648 2649 shp = (Shdr *)(mp->shdrs + mp->hdr.e_shstrndx * mp->hdr.e_shentsize); 2650 shstrlen = shp->sh_size; 2651 shstrtab = kobj_alloc(shstrlen, KM_WAIT|KM_TMP); 2652 2653 if (kobj_read_file(file, shstrtab, shstrlen, shp->sh_offset) < 0) { 2654 _kobj_printf(ops, "krtld: get_ctf: %s, ", 2655 mp->filename); 2656 _kobj_printf(ops, "error reading section %u\n", 2657 mp->hdr.e_shstrndx); 2658 kobj_free(shstrtab, shstrlen); 2659 return (-1); 2660 } 2661 2662 for (i = 0; i < mp->hdr.e_shnum; i++) { 2663 shp = (Shdr *)(mp->shdrs + i * mp->hdr.e_shentsize); 2664 2665 if (shp->sh_size != 0 && shp->sh_name < shstrlen && 2666 strcmp(shstrtab + shp->sh_name, ".SUNW_ctf") == 0) { 2667 ctfdata = kobj_alloc(shp->sh_size, KM_WAIT|KM_SCRATCH); 2668 2669 if (kobj_read_file(file, ctfdata, shp->sh_size, 2670 shp->sh_offset) < 0) { 2671 _kobj_printf(ops, "krtld: get_ctf: %s, error " 2672 "reading .SUNW_ctf data\n", mp->filename); 2673 kobj_free(ctfdata, shp->sh_size); 2674 kobj_free(shstrtab, shstrlen); 2675 return (-1); 2676 } 2677 2678 mp->ctfdata = ctfdata; 2679 mp->ctfsize = shp->sh_size; 2680 break; 2681 } 2682 } 2683 2684 kobj_free(shstrtab, shstrlen); 2685 return (0); 2686 } 2687 2688 #define SHA1_DIGEST_LENGTH 20 /* SHA1 digest length in bytes */ 2689 2690 /* 2691 * Return the hash of the ELF sections that are memory resident. 2692 * i.e. text and data. We skip a SHT_NOBITS section since it occupies 2693 * no space in the file. We use SHA1 here since libelfsign uses 2694 * it and both places need to use the same algorithm. 2695 */ 2696 static void 2697 crypto_es_hash(struct module *mp, char *hash, char *shstrtab) 2698 { 2699 uint_t shn; 2700 Shdr *shp; 2701 SHA1_CTX ctx; 2702 2703 SHA1Init(&ctx); 2704 2705 for (shn = 1; shn < mp->hdr.e_shnum; shn++) { 2706 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize); 2707 if (!(shp->sh_flags & SHF_ALLOC) || shp->sh_size == 0) 2708 continue; 2709 2710 /* 2711 * The check should ideally be shp->sh_type == SHT_NOBITS. 2712 * However, we can't do that check here as get_progbits() 2713 * resets the type. 2714 */ 2715 if (strcmp(shstrtab + shp->sh_name, ".bss") == 0) 2716 continue; 2717 #ifdef KOBJ_DEBUG 2718 if (kobj_debug & D_DEBUG) 2719 _kobj_printf(ops, 2720 "krtld: crypto_es_hash: updating hash with" 2721 " %s data size=%d\n", shstrtab + shp->sh_name, 2722 shp->sh_size); 2723 #endif 2724 ASSERT(shp->sh_addr != NULL); 2725 SHA1Update(&ctx, (const uint8_t *)shp->sh_addr, shp->sh_size); 2726 } 2727 2728 SHA1Final((uchar_t *)hash, &ctx); 2729 } 2730 2731 /* 2732 * Get the .SUNW_signature section for the module, it it exists. 2733 * 2734 * This section exists only for crypto modules. None of the 2735 * primary modules have this section currently. 2736 */ 2737 static void 2738 get_signature(struct module *mp, struct _buf *file) 2739 { 2740 char *shstrtab, *sigdata = NULL; 2741 size_t shstrlen; 2742 Shdr *shp; 2743 uint_t i; 2744 2745 if (mp->hdr.e_shstrndx >= mp->hdr.e_shnum) { 2746 _kobj_printf(ops, "krtld: get_signature: %s, ", 2747 mp->filename); 2748 _kobj_printf(ops, "corrupt e_shstrndx %u\n", 2749 mp->hdr.e_shstrndx); 2750 return; 2751 } 2752 2753 shp = (Shdr *)(mp->shdrs + mp->hdr.e_shstrndx * mp->hdr.e_shentsize); 2754 shstrlen = shp->sh_size; 2755 shstrtab = kobj_alloc(shstrlen, KM_WAIT|KM_TMP); 2756 2757 if (kobj_read_file(file, shstrtab, shstrlen, shp->sh_offset) < 0) { 2758 _kobj_printf(ops, "krtld: get_signature: %s, ", 2759 mp->filename); 2760 _kobj_printf(ops, "error reading section %u\n", 2761 mp->hdr.e_shstrndx); 2762 kobj_free(shstrtab, shstrlen); 2763 return; 2764 } 2765 2766 for (i = 0; i < mp->hdr.e_shnum; i++) { 2767 shp = (Shdr *)(mp->shdrs + i * mp->hdr.e_shentsize); 2768 if (shp->sh_size != 0 && shp->sh_name < shstrlen && 2769 strcmp(shstrtab + shp->sh_name, 2770 ELF_SIGNATURE_SECTION) == 0) { 2771 filesig_vers_t filesig_version; 2772 size_t sigsize = shp->sh_size + SHA1_DIGEST_LENGTH; 2773 sigdata = kobj_alloc(sigsize, KM_WAIT|KM_SCRATCH); 2774 2775 if (kobj_read_file(file, sigdata, shp->sh_size, 2776 shp->sh_offset) < 0) { 2777 _kobj_printf(ops, "krtld: get_signature: %s," 2778 " error reading .SUNW_signature data\n", 2779 mp->filename); 2780 kobj_free(sigdata, sigsize); 2781 kobj_free(shstrtab, shstrlen); 2782 return; 2783 } 2784 filesig_version = ((struct filesignatures *)sigdata)-> 2785 filesig_sig.filesig_version; 2786 if (!(filesig_version == FILESIG_VERSION1 || 2787 filesig_version == FILESIG_VERSION3)) { 2788 /* skip versions we don't understand */ 2789 kobj_free(sigdata, sigsize); 2790 kobj_free(shstrtab, shstrlen); 2791 return; 2792 } 2793 2794 mp->sigdata = sigdata; 2795 mp->sigsize = sigsize; 2796 break; 2797 } 2798 } 2799 2800 if (sigdata != NULL) { 2801 crypto_es_hash(mp, sigdata + shp->sh_size, shstrtab); 2802 } 2803 2804 kobj_free(shstrtab, shstrlen); 2805 } 2806 2807 static void 2808 add_dependent(struct module *mp, struct module *dep) 2809 { 2810 struct module_list *lp; 2811 2812 for (lp = mp->head; lp; lp = lp->next) { 2813 if (lp->mp == dep) 2814 return; /* already on the list */ 2815 } 2816 2817 if (lp == NULL) { 2818 lp = kobj_zalloc(sizeof (*lp), KM_WAIT); 2819 2820 lp->mp = dep; 2821 lp->next = NULL; 2822 if (mp->tail) 2823 mp->tail->next = lp; 2824 else 2825 mp->head = lp; 2826 mp->tail = lp; 2827 } 2828 } 2829 2830 static int 2831 do_dependents(struct modctl *modp, char *modname, size_t modnamelen) 2832 { 2833 struct module *mp; 2834 struct modctl *req; 2835 char *d, *p, *q; 2836 int c; 2837 char *err_modname = NULL; 2838 2839 mp = modp->mod_mp; 2840 2841 if ((p = mp->depends_on) == NULL) 2842 return (0); 2843 2844 for (;;) { 2845 /* 2846 * Skip space. 2847 */ 2848 while (*p && (*p == ' ' || *p == '\t')) 2849 p++; 2850 /* 2851 * Get module name. 2852 */ 2853 d = p; 2854 q = modname; 2855 c = 0; 2856 while (*p && *p != ' ' && *p != '\t') { 2857 if (c < modnamelen - 1) { 2858 *q++ = *p; 2859 c++; 2860 } 2861 p++; 2862 } 2863 2864 if (q == modname) 2865 break; 2866 2867 if (c == modnamelen - 1) { 2868 char *dep = kobj_alloc(p - d + 1, KM_WAIT|KM_TMP); 2869 2870 (void) strncpy(dep, d, p - d + 1); 2871 dep[p - d] = '\0'; 2872 2873 _kobj_printf(ops, "%s: dependency ", modp->mod_modname); 2874 _kobj_printf(ops, "'%s' too long ", dep); 2875 _kobj_printf(ops, "(max %d chars)\n", modnamelen); 2876 2877 kobj_free(dep, p - d + 1); 2878 2879 return (-1); 2880 } 2881 2882 *q = '\0'; 2883 if ((req = mod_load_requisite(modp, modname)) == NULL) { 2884 #ifndef KOBJ_DEBUG 2885 if (_moddebug & MODDEBUG_LOADMSG) { 2886 #endif /* KOBJ_DEBUG */ 2887 _kobj_printf(ops, 2888 "%s: unable to resolve dependency, ", 2889 modp->mod_modname); 2890 _kobj_printf(ops, "cannot load module '%s'\n", 2891 modname); 2892 #ifndef KOBJ_DEBUG 2893 } 2894 #endif /* KOBJ_DEBUG */ 2895 if (err_modname == NULL) { 2896 /* 2897 * This must be the same size as the modname 2898 * one. 2899 */ 2900 err_modname = kobj_zalloc(MODMAXNAMELEN, 2901 KM_WAIT); 2902 2903 /* 2904 * We can use strcpy() here without fearing 2905 * the NULL terminator because the size of 2906 * err_modname is the same as one of modname, 2907 * and it's filled with zeros. 2908 */ 2909 (void) strcpy(err_modname, modname); 2910 } 2911 continue; 2912 } 2913 2914 add_dependent(mp, req->mod_mp); 2915 mod_release_mod(req); 2916 2917 } 2918 2919 if (err_modname != NULL) { 2920 /* 2921 * Copy the first module name where you detect an error to keep 2922 * its behavior the same as before. 2923 * This way keeps minimizing the memory use for error 2924 * modules, and this might be important at boot time because 2925 * the memory usage is a crucial factor for booting in most 2926 * cases. You can expect more verbose messages when using 2927 * a debug kernel or setting a bit in moddebug. 2928 */ 2929 bzero(modname, MODMAXNAMELEN); 2930 (void) strcpy(modname, err_modname); 2931 kobj_free(err_modname, MODMAXNAMELEN); 2932 return (-1); 2933 } 2934 2935 return (0); 2936 } 2937 2938 static int 2939 do_common(struct module *mp) 2940 { 2941 int err; 2942 2943 /* 2944 * first time through, assign all symbols defined in other 2945 * modules, and count up how much common space will be needed 2946 * (bss_size and bss_align) 2947 */ 2948 if ((err = do_symbols(mp, 0)) < 0) 2949 return (err); 2950 /* 2951 * increase bss_size by the maximum delta that could be 2952 * computed by the ALIGN below 2953 */ 2954 mp->bss_size += mp->bss_align; 2955 if (mp->bss_size) { 2956 if (standalone) 2957 mp->bss = (uintptr_t)kobj_segbrk(&_edata, mp->bss_size, 2958 MINALIGN, 0); 2959 else 2960 mp->bss = (uintptr_t)vmem_alloc(data_arena, 2961 mp->bss_size, VM_SLEEP | VM_BESTFIT); 2962 bzero((void *)mp->bss, mp->bss_size); 2963 /* now assign addresses to all common symbols */ 2964 if ((err = do_symbols(mp, ALIGN(mp->bss, mp->bss_align))) < 0) 2965 return (err); 2966 } 2967 return (0); 2968 } 2969 2970 static int 2971 do_symbols(struct module *mp, Elf64_Addr bss_base) 2972 { 2973 int bss_align; 2974 uintptr_t bss_ptr; 2975 int err; 2976 int i; 2977 Sym *sp, *sp1; 2978 char *name; 2979 int assign; 2980 int resolved = 1; 2981 2982 /* 2983 * Nothing left to do (optimization). 2984 */ 2985 if (mp->flags & KOBJ_RESOLVED) 2986 return (0); 2987 2988 assign = (bss_base) ? 1 : 0; 2989 bss_ptr = bss_base; 2990 bss_align = 0; 2991 err = 0; 2992 2993 for (i = 1; i < mp->nsyms; i++) { 2994 sp = (Sym *)(mp->symtbl + mp->symhdr->sh_entsize * i); 2995 /* 2996 * we know that st_name is in bounds, since get_sections 2997 * has already checked all of the symbols 2998 */ 2999 name = mp->strings + sp->st_name; 3000 if (sp->st_shndx != SHN_UNDEF && sp->st_shndx != SHN_COMMON) 3001 continue; 3002 #ifdef __sparc 3003 /* 3004 * Register symbols are ignored in the kernel 3005 */ 3006 if (ELF_ST_TYPE(sp->st_info) == STT_SPARC_REGISTER) { 3007 if (*name != '\0') { 3008 _kobj_printf(ops, "%s: named REGISTER symbol ", 3009 mp->filename); 3010 _kobj_printf(ops, "not supported '%s'\n", 3011 name); 3012 err = DOSYM_UNDEF; 3013 } 3014 continue; 3015 } 3016 #endif /* __sparc */ 3017 /* 3018 * TLS symbols are ignored in the kernel 3019 */ 3020 if (ELF_ST_TYPE(sp->st_info) == STT_TLS) { 3021 _kobj_printf(ops, "%s: TLS symbol ", 3022 mp->filename); 3023 _kobj_printf(ops, "not supported '%s'\n", 3024 name); 3025 err = DOSYM_UNDEF; 3026 continue; 3027 } 3028 3029 if (ELF_ST_BIND(sp->st_info) != STB_LOCAL) { 3030 if ((sp1 = kobj_lookup_all(mp, name, 0)) != NULL) { 3031 sp->st_shndx = SHN_ABS; 3032 sp->st_value = sp1->st_value; 3033 continue; 3034 } 3035 } 3036 3037 if (sp->st_shndx == SHN_UNDEF) { 3038 resolved = 0; 3039 3040 if (strncmp(name, sdt_prefix, strlen(sdt_prefix)) == 0) 3041 continue; 3042 3043 /* 3044 * If it's not a weak reference and it's 3045 * not a primary object, it's an error. 3046 * (Primary objects may take more than 3047 * one pass to resolve) 3048 */ 3049 if (!(mp->flags & KOBJ_PRIM) && 3050 ELF_ST_BIND(sp->st_info) != STB_WEAK) { 3051 _kobj_printf(ops, "%s: undefined symbol", 3052 mp->filename); 3053 _kobj_printf(ops, " '%s'\n", name); 3054 /* 3055 * Try to determine whether this symbol 3056 * represents a dependency on obsolete 3057 * unsafe driver support. This is just 3058 * to make the warning more informative. 3059 */ 3060 if (strcmp(name, "sleep") == 0 || 3061 strcmp(name, "unsleep") == 0 || 3062 strcmp(name, "wakeup") == 0 || 3063 strcmp(name, "bsd_compat_ioctl") == 0 || 3064 strcmp(name, "unsafe_driver") == 0 || 3065 strncmp(name, "spl", 3) == 0 || 3066 strncmp(name, "i_ddi_spl", 9) == 0) 3067 err = DOSYM_UNSAFE; 3068 if (err == 0) 3069 err = DOSYM_UNDEF; 3070 } 3071 continue; 3072 } 3073 /* 3074 * It's a common symbol - st_value is the 3075 * required alignment. 3076 */ 3077 if (sp->st_value > bss_align) 3078 bss_align = sp->st_value; 3079 bss_ptr = ALIGN(bss_ptr, sp->st_value); 3080 if (assign) { 3081 sp->st_shndx = SHN_ABS; 3082 sp->st_value = bss_ptr; 3083 } 3084 bss_ptr += sp->st_size; 3085 } 3086 if (err) 3087 return (err); 3088 if (assign == 0 && mp->bss == NULL) { 3089 mp->bss_align = bss_align; 3090 mp->bss_size = bss_ptr; 3091 } else if (resolved) { 3092 mp->flags |= KOBJ_RESOLVED; 3093 } 3094 3095 return (0); 3096 } 3097 3098 uint_t 3099 kobj_hash_name(const char *p) 3100 { 3101 unsigned int g; 3102 uint_t hval; 3103 3104 hval = 0; 3105 while (*p) { 3106 hval = (hval << 4) + *p++; 3107 if ((g = (hval & 0xf0000000)) != 0) 3108 hval ^= g >> 24; 3109 hval &= ~g; 3110 } 3111 return (hval); 3112 } 3113 3114 /* look for name in all modules */ 3115 uintptr_t 3116 kobj_getsymvalue(char *name, int kernelonly) 3117 { 3118 Sym *sp; 3119 struct modctl *modp; 3120 struct module *mp; 3121 uintptr_t value = 0; 3122 3123 if ((sp = kobj_lookup_kernel(name)) != NULL) 3124 return ((uintptr_t)sp->st_value); 3125 3126 if (kernelonly) 3127 return (0); /* didn't find it in the kernel so give up */ 3128 3129 mutex_enter(&mod_lock); 3130 modp = &modules; 3131 do { 3132 mp = (struct module *)modp->mod_mp; 3133 if (mp && !(mp->flags & KOBJ_PRIM) && modp->mod_loaded && 3134 (sp = lookup_one(mp, name))) { 3135 value = (uintptr_t)sp->st_value; 3136 break; 3137 } 3138 } while ((modp = modp->mod_next) != &modules); 3139 mutex_exit(&mod_lock); 3140 return (value); 3141 } 3142 3143 /* look for a symbol near value. */ 3144 char * 3145 kobj_getsymname(uintptr_t value, ulong_t *offset) 3146 { 3147 char *name = NULL; 3148 struct modctl *modp; 3149 3150 struct modctl_list *lp; 3151 struct module *mp; 3152 3153 /* 3154 * Loop through the primary kernel modules. 3155 */ 3156 for (lp = kobj_lm_lookup(KOBJ_LM_PRIMARY); lp; lp = lp->modl_next) { 3157 mp = mod(lp); 3158 3159 if ((name = kobj_searchsym(mp, value, offset)) != NULL) 3160 return (name); 3161 } 3162 3163 mutex_enter(&mod_lock); 3164 modp = &modules; 3165 do { 3166 mp = (struct module *)modp->mod_mp; 3167 if (mp && !(mp->flags & KOBJ_PRIM) && modp->mod_loaded && 3168 (name = kobj_searchsym(mp, value, offset))) 3169 break; 3170 } while ((modp = modp->mod_next) != &modules); 3171 mutex_exit(&mod_lock); 3172 return (name); 3173 } 3174 3175 /* return address of symbol and size */ 3176 3177 uintptr_t 3178 kobj_getelfsym(char *name, void *mp, int *size) 3179 { 3180 Sym *sp; 3181 3182 if (mp == NULL) 3183 sp = kobj_lookup_kernel(name); 3184 else 3185 sp = lookup_one(mp, name); 3186 3187 if (sp == NULL) 3188 return (0); 3189 3190 *size = (int)sp->st_size; 3191 return ((uintptr_t)sp->st_value); 3192 } 3193 3194 uintptr_t 3195 kobj_lookup(struct module *mod, const char *name) 3196 { 3197 Sym *sp; 3198 3199 sp = lookup_one(mod, name); 3200 3201 if (sp == NULL) 3202 return (0); 3203 3204 return ((uintptr_t)sp->st_value); 3205 } 3206 3207 char * 3208 kobj_searchsym(struct module *mp, uintptr_t value, ulong_t *offset) 3209 { 3210 Sym *symtabptr; 3211 char *strtabptr; 3212 int symnum; 3213 Sym *sym; 3214 Sym *cursym; 3215 uintptr_t curval; 3216 3217 *offset = (ulong_t)-1l; /* assume not found */ 3218 cursym = NULL; 3219 3220 if (kobj_addrcheck(mp, (void *)value) != 0) 3221 return (NULL); /* not in this module */ 3222 3223 strtabptr = mp->strings; 3224 symtabptr = (Sym *)mp->symtbl; 3225 3226 /* 3227 * Scan the module's symbol table for a symbol <= value 3228 */ 3229 for (symnum = 1, sym = symtabptr + 1; 3230 symnum < mp->nsyms; symnum++, sym = (Sym *) 3231 ((uintptr_t)sym + mp->symhdr->sh_entsize)) { 3232 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL) { 3233 if (ELF_ST_BIND(sym->st_info) != STB_LOCAL) 3234 continue; 3235 if (ELF_ST_TYPE(sym->st_info) != STT_OBJECT && 3236 ELF_ST_TYPE(sym->st_info) != STT_FUNC) 3237 continue; 3238 } 3239 3240 curval = (uintptr_t)sym->st_value; 3241 3242 if (curval > value) 3243 continue; 3244 3245 /* 3246 * If one or both are functions... 3247 */ 3248 if (ELF_ST_TYPE(sym->st_info) == STT_FUNC || (cursym != NULL && 3249 ELF_ST_TYPE(cursym->st_info) == STT_FUNC)) { 3250 /* Ignore if the address is out of the bounds */ 3251 if (value - sym->st_value >= sym->st_size) 3252 continue; 3253 3254 if (cursym != NULL && 3255 ELF_ST_TYPE(cursym->st_info) == STT_FUNC) { 3256 /* Prefer the function to the non-function */ 3257 if (ELF_ST_TYPE(sym->st_info) != STT_FUNC) 3258 continue; 3259 3260 /* Prefer the larger of the two functions */ 3261 if (sym->st_size <= cursym->st_size) 3262 continue; 3263 } 3264 } else if (value - curval >= *offset) { 3265 continue; 3266 } 3267 3268 *offset = (ulong_t)(value - curval); 3269 cursym = sym; 3270 } 3271 if (cursym == NULL) 3272 return (NULL); 3273 3274 return (strtabptr + cursym->st_name); 3275 } 3276 3277 Sym * 3278 kobj_lookup_all(struct module *mp, char *name, int include_self) 3279 { 3280 Sym *sp; 3281 struct module_list *mlp; 3282 struct modctl_list *clp; 3283 struct module *mmp; 3284 3285 if (include_self && (sp = lookup_one(mp, name)) != NULL) 3286 return (sp); 3287 3288 for (mlp = mp->head; mlp; mlp = mlp->next) { 3289 if ((sp = lookup_one(mlp->mp, name)) != NULL && 3290 ELF_ST_BIND(sp->st_info) != STB_LOCAL) 3291 return (sp); 3292 } 3293 3294 /* 3295 * Loop through the primary kernel modules. 3296 */ 3297 for (clp = kobj_lm_lookup(KOBJ_LM_PRIMARY); clp; clp = clp->modl_next) { 3298 mmp = mod(clp); 3299 3300 if (mmp == NULL || mp == mmp) 3301 continue; 3302 3303 if ((sp = lookup_one(mmp, name)) != NULL && 3304 ELF_ST_BIND(sp->st_info) != STB_LOCAL) 3305 return (sp); 3306 } 3307 return (NULL); 3308 } 3309 3310 Sym * 3311 kobj_lookup_kernel(const char *name) 3312 { 3313 struct modctl_list *lp; 3314 struct module *mp; 3315 Sym *sp; 3316 3317 /* 3318 * Loop through the primary kernel modules. 3319 */ 3320 for (lp = kobj_lm_lookup(KOBJ_LM_PRIMARY); lp; lp = lp->modl_next) { 3321 mp = mod(lp); 3322 3323 if (mp == NULL) 3324 continue; 3325 3326 if ((sp = lookup_one(mp, name)) != NULL) 3327 return (sp); 3328 } 3329 return (NULL); 3330 } 3331 3332 static Sym * 3333 lookup_one(struct module *mp, const char *name) 3334 { 3335 symid_t *ip; 3336 char *name1; 3337 Sym *sp; 3338 3339 for (ip = &mp->buckets[kobj_hash_name(name) % mp->hashsize]; *ip; 3340 ip = &mp->chains[*ip]) { 3341 sp = (Sym *)(mp->symtbl + 3342 mp->symhdr->sh_entsize * *ip); 3343 name1 = mp->strings + sp->st_name; 3344 if (strcmp(name, name1) == 0 && 3345 ELF_ST_TYPE(sp->st_info) != STT_FILE && 3346 sp->st_shndx != SHN_UNDEF && 3347 sp->st_shndx != SHN_COMMON) 3348 return (sp); 3349 } 3350 return (NULL); 3351 } 3352 3353 /* 3354 * Lookup a given symbol pointer in the module's symbol hash. If the symbol 3355 * is hashed, return the symbol pointer; otherwise return NULL. 3356 */ 3357 static Sym * 3358 sym_lookup(struct module *mp, Sym *ksp) 3359 { 3360 char *name = mp->strings + ksp->st_name; 3361 symid_t *ip; 3362 Sym *sp; 3363 3364 for (ip = &mp->buckets[kobj_hash_name(name) % mp->hashsize]; *ip; 3365 ip = &mp->chains[*ip]) { 3366 sp = (Sym *)(mp->symtbl + mp->symhdr->sh_entsize * *ip); 3367 if (sp == ksp) 3368 return (ksp); 3369 } 3370 return (NULL); 3371 } 3372 3373 static void 3374 sym_insert(struct module *mp, char *name, symid_t index) 3375 { 3376 symid_t *ip; 3377 3378 #ifdef KOBJ_DEBUG 3379 if (kobj_debug & D_SYMBOLS) { 3380 static struct module *lastmp = NULL; 3381 Sym *sp; 3382 if (lastmp != mp) { 3383 _kobj_printf(ops, 3384 "krtld: symbol entry: file=%s\n", 3385 mp->filename); 3386 _kobj_printf(ops, 3387 "krtld:\tsymndx\tvalue\t\t" 3388 "symbol name\n"); 3389 lastmp = mp; 3390 } 3391 sp = (Sym *)(mp->symtbl + 3392 index * mp->symhdr->sh_entsize); 3393 _kobj_printf(ops, "krtld:\t[%3d]", index); 3394 _kobj_printf(ops, "\t0x%lx", sp->st_value); 3395 _kobj_printf(ops, "\t%s\n", name); 3396 } 3397 3398 #endif 3399 for (ip = &mp->buckets[kobj_hash_name(name) % mp->hashsize]; *ip; 3400 ip = &mp->chains[*ip]) { 3401 ; 3402 } 3403 *ip = index; 3404 } 3405 3406 struct modctl * 3407 kobj_boot_mod_lookup(const char *modname) 3408 { 3409 struct modctl *mctl = kobj_modules; 3410 3411 do { 3412 if (strcmp(modname, mctl->mod_modname) == 0) 3413 return (mctl); 3414 } while ((mctl = mctl->mod_next) != kobj_modules); 3415 3416 return (NULL); 3417 } 3418 3419 /* 3420 * Determine if the module exists. 3421 */ 3422 int 3423 kobj_path_exists(char *name, int use_path) 3424 { 3425 struct _buf *file; 3426 3427 file = kobj_open_path(name, use_path, 1); 3428 #ifdef MODDIR_SUFFIX 3429 if (file == (struct _buf *)-1) 3430 file = kobj_open_path(name, use_path, 0); 3431 #endif /* MODDIR_SUFFIX */ 3432 if (file == (struct _buf *)-1) 3433 return (0); 3434 kobj_close_file(file); 3435 return (1); 3436 } 3437 3438 /* 3439 * fullname is dynamically allocated to be able to hold the 3440 * maximum size string that can be constructed from name. 3441 * path is exactly like the shell PATH variable. 3442 */ 3443 struct _buf * 3444 kobj_open_path(char *name, int use_path, int use_moddir_suffix) 3445 { 3446 char *p, *q; 3447 char *pathp; 3448 char *pathpsave; 3449 char *fullname; 3450 int maxpathlen; 3451 struct _buf *file; 3452 3453 #if !defined(MODDIR_SUFFIX) 3454 use_moddir_suffix = B_FALSE; 3455 #endif 3456 3457 if (!use_path) 3458 pathp = ""; /* use name as specified */ 3459 else 3460 pathp = kobj_module_path; 3461 /* use configured default path */ 3462 3463 pathpsave = pathp; /* keep this for error reporting */ 3464 3465 /* 3466 * Allocate enough space for the largest possible fullname. 3467 * since path is of the form <directory> : <directory> : ... 3468 * we're potentially allocating a little more than we need to 3469 * but we'll allocate the exact amount when we find the right directory. 3470 * (The + 3 below is one for NULL terminator and one for the '/' 3471 * we might have to add at the beginning of path and one for 3472 * the '/' between path and name.) 3473 */ 3474 maxpathlen = strlen(pathp) + strlen(name) + 3; 3475 /* sizeof includes null */ 3476 maxpathlen += sizeof (slash_moddir_suffix_slash) - 1; 3477 fullname = kobj_zalloc(maxpathlen, KM_WAIT); 3478 3479 for (;;) { 3480 p = fullname; 3481 if (*pathp != '\0' && *pathp != '/') 3482 *p++ = '/'; /* path must start with '/' */ 3483 while (*pathp && *pathp != ':' && *pathp != ' ') 3484 *p++ = *pathp++; 3485 if (p != fullname && p[-1] != '/') 3486 *p++ = '/'; 3487 if (use_moddir_suffix) { 3488 char *b = basename(name); 3489 char *s; 3490 3491 /* copy everything up to the base name */ 3492 q = name; 3493 while (q != b && *q) 3494 *p++ = *q++; 3495 s = slash_moddir_suffix_slash; 3496 while (*s) 3497 *p++ = *s++; 3498 /* copy the rest */ 3499 while (*b) 3500 *p++ = *b++; 3501 } else { 3502 q = name; 3503 while (*q) 3504 *p++ = *q++; 3505 } 3506 *p = 0; 3507 if ((file = kobj_open_file(fullname)) != (struct _buf *)-1) { 3508 kobj_free(fullname, maxpathlen); 3509 return (file); 3510 } 3511 if (*pathp == 0) 3512 break; 3513 pathp++; 3514 } 3515 kobj_free(fullname, maxpathlen); 3516 if (_moddebug & MODDEBUG_ERRMSG) { 3517 _kobj_printf(ops, "can't open %s,", name); 3518 _kobj_printf(ops, " path is %s\n", pathpsave); 3519 } 3520 return ((struct _buf *)-1); 3521 } 3522 3523 intptr_t 3524 kobj_open(char *filename) 3525 { 3526 struct vnode *vp; 3527 int fd; 3528 3529 if (_modrootloaded) { 3530 struct kobjopen_tctl *ltp = kobjopen_alloc(filename); 3531 int Errno; 3532 3533 /* 3534 * Hand off the open to a thread who has a 3535 * stack size capable handling the request. 3536 */ 3537 if (curthread != &t0) { 3538 (void) thread_create(NULL, DEFAULTSTKSZ * 2, 3539 kobjopen_thread, ltp, 0, &p0, TS_RUN, maxclsyspri); 3540 sema_p(<p->sema); 3541 Errno = ltp->Errno; 3542 vp = ltp->vp; 3543 } else { 3544 /* 3545 * 1098067: module creds should not be those of the 3546 * caller 3547 */ 3548 cred_t *saved_cred = curthread->t_cred; 3549 curthread->t_cred = kcred; 3550 Errno = vn_openat(filename, UIO_SYSSPACE, FREAD, 0, &vp, 3551 0, 0, rootdir); 3552 curthread->t_cred = saved_cred; 3553 } 3554 kobjopen_free(ltp); 3555 3556 if (Errno) { 3557 if (_moddebug & MODDEBUG_ERRMSG) { 3558 _kobj_printf(ops, 3559 "kobj_open: vn_open of %s fails, ", 3560 filename); 3561 _kobj_printf(ops, "Errno = %d\n", Errno); 3562 } 3563 return (-1); 3564 } else { 3565 if (_moddebug & MODDEBUG_ERRMSG) { 3566 _kobj_printf(ops, "kobj_open: '%s'", filename); 3567 _kobj_printf(ops, " vp = %p\n", vp); 3568 } 3569 return ((intptr_t)vp); 3570 } 3571 } else { 3572 fd = kobj_boot_open(filename, 0); 3573 3574 if (_moddebug & MODDEBUG_ERRMSG) { 3575 if (fd < 0) 3576 _kobj_printf(ops, 3577 "kobj_open: can't open %s\n", filename); 3578 else { 3579 _kobj_printf(ops, "kobj_open: '%s'", filename); 3580 _kobj_printf(ops, " descr = 0x%x\n", fd); 3581 } 3582 } 3583 return ((intptr_t)fd); 3584 } 3585 } 3586 3587 /* 3588 * Calls to kobj_open() are handled off to this routine as a separate thread. 3589 */ 3590 static void 3591 kobjopen_thread(struct kobjopen_tctl *ltp) 3592 { 3593 kmutex_t cpr_lk; 3594 callb_cpr_t cpr_i; 3595 3596 mutex_init(&cpr_lk, NULL, MUTEX_DEFAULT, NULL); 3597 CALLB_CPR_INIT(&cpr_i, &cpr_lk, callb_generic_cpr, "kobjopen"); 3598 ltp->Errno = vn_open(ltp->name, UIO_SYSSPACE, FREAD, 0, &(ltp->vp), 3599 0, 0); 3600 sema_v(<p->sema); 3601 mutex_enter(&cpr_lk); 3602 CALLB_CPR_EXIT(&cpr_i); 3603 mutex_destroy(&cpr_lk); 3604 thread_exit(); 3605 } 3606 3607 /* 3608 * allocate and initialize a kobjopen thread structure 3609 */ 3610 static struct kobjopen_tctl * 3611 kobjopen_alloc(char *filename) 3612 { 3613 struct kobjopen_tctl *ltp = kmem_zalloc(sizeof (*ltp), KM_SLEEP); 3614 3615 ASSERT(filename != NULL); 3616 3617 ltp->name = kmem_alloc(strlen(filename) + 1, KM_SLEEP); 3618 bcopy(filename, ltp->name, strlen(filename) + 1); 3619 sema_init(<p->sema, 0, NULL, SEMA_DEFAULT, NULL); 3620 return (ltp); 3621 } 3622 3623 /* 3624 * free a kobjopen thread control structure 3625 */ 3626 static void 3627 kobjopen_free(struct kobjopen_tctl *ltp) 3628 { 3629 sema_destroy(<p->sema); 3630 kmem_free(ltp->name, strlen(ltp->name) + 1); 3631 kmem_free(ltp, sizeof (*ltp)); 3632 } 3633 3634 int 3635 kobj_read(intptr_t descr, char *buf, unsigned size, unsigned offset) 3636 { 3637 int stat; 3638 ssize_t resid; 3639 3640 if (_modrootloaded) { 3641 if ((stat = vn_rdwr(UIO_READ, (struct vnode *)descr, buf, size, 3642 (offset_t)offset, UIO_SYSSPACE, 0, (rlim64_t)0, CRED(), 3643 &resid)) != 0) { 3644 _kobj_printf(ops, 3645 "vn_rdwr failed with error 0x%x\n", stat); 3646 return (-1); 3647 } 3648 return (size - resid); 3649 } else { 3650 int count = 0; 3651 3652 if (kobj_boot_seek((int)descr, (off_t)0, offset) != 0) { 3653 _kobj_printf(ops, 3654 "kobj_read: seek 0x%x failed\n", offset); 3655 return (-1); 3656 } 3657 3658 count = kobj_boot_read((int)descr, buf, size); 3659 if (count < size) { 3660 if (_moddebug & MODDEBUG_ERRMSG) { 3661 _kobj_printf(ops, 3662 "kobj_read: req %d bytes, ", size); 3663 _kobj_printf(ops, "got %d\n", count); 3664 } 3665 } 3666 return (count); 3667 } 3668 } 3669 3670 void 3671 kobj_close(intptr_t descr) 3672 { 3673 if (_moddebug & MODDEBUG_ERRMSG) 3674 _kobj_printf(ops, "kobj_close: 0x%lx\n", descr); 3675 3676 if (_modrootloaded) { 3677 struct vnode *vp = (struct vnode *)descr; 3678 (void) VOP_CLOSE(vp, FREAD, 1, (offset_t)0, CRED()); 3679 VN_RELE(vp); 3680 } else 3681 (void) kobj_boot_close((int)descr); 3682 } 3683 3684 int 3685 kobj_fstat(intptr_t descr, struct bootstat *buf) 3686 { 3687 if (buf == NULL) 3688 return (-1); 3689 3690 if (_modrootloaded) { 3691 vattr_t vattr; 3692 struct vnode *vp = (struct vnode *)descr; 3693 if (VOP_GETATTR(vp, &vattr, 0, kcred) != 0) 3694 return (-1); 3695 3696 /* 3697 * The vattr and bootstat structures are similar, but not 3698 * identical. We do our best to fill in the bootstat structure 3699 * from the contents of vattr (transfering only the ones that 3700 * are obvious. 3701 */ 3702 3703 buf->st_mode = (uint32_t)vattr.va_mode; 3704 buf->st_nlink = (uint32_t)vattr.va_nlink; 3705 buf->st_uid = (int32_t)vattr.va_uid; 3706 buf->st_gid = (int32_t)vattr.va_gid; 3707 buf->st_rdev = (uint64_t)vattr.va_rdev; 3708 buf->st_size = (uint64_t)vattr.va_size; 3709 buf->st_atim.tv_sec = (int64_t)vattr.va_atime.tv_sec; 3710 buf->st_atim.tv_nsec = (int64_t)vattr.va_atime.tv_nsec; 3711 buf->st_mtim.tv_sec = (int64_t)vattr.va_mtime.tv_sec; 3712 buf->st_mtim.tv_nsec = (int64_t)vattr.va_mtime.tv_nsec; 3713 buf->st_ctim.tv_sec = (int64_t)vattr.va_ctime.tv_sec; 3714 buf->st_ctim.tv_nsec = (int64_t)vattr.va_ctime.tv_nsec; 3715 buf->st_blksize = (int32_t)vattr.va_blksize; 3716 buf->st_blocks = (int64_t)vattr.va_nblocks; 3717 3718 return (0); 3719 } 3720 3721 return (kobj_boot_fstat((int)descr, buf)); 3722 } 3723 3724 3725 struct _buf * 3726 kobj_open_file(char *name) 3727 { 3728 struct _buf *file; 3729 intptr_t fd; 3730 3731 if ((fd = kobj_open(name)) == -1) { 3732 return ((struct _buf *)-1); 3733 } 3734 3735 file = kobj_zalloc(sizeof (struct _buf), KM_WAIT|KM_TMP); 3736 file->_fd = fd; 3737 file->_name = kobj_alloc(strlen(name)+1, KM_WAIT|KM_TMP); 3738 file->_base = kobj_zalloc(MAXBSIZE, KM_WAIT|KM_TMP); 3739 file->_cnt = file->_size = file->_off = 0; 3740 file->_ln = 1; 3741 file->_ptr = file->_base; 3742 (void) strcpy(file->_name, name); 3743 return (file); 3744 } 3745 3746 void 3747 kobj_close_file(struct _buf *file) 3748 { 3749 kobj_close(file->_fd); 3750 kobj_free(file->_base, MAXBSIZE); 3751 kobj_free(file->_name, strlen(file->_name)+1); 3752 kobj_free(file, sizeof (struct _buf)); 3753 } 3754 3755 int 3756 kobj_read_file(struct _buf *file, char *buf, unsigned size, unsigned off) 3757 { 3758 int b_size, c_size; 3759 int b_off; /* Offset into buffer for start of bcopy */ 3760 int count = 0; 3761 int page_addr; 3762 3763 if (_moddebug & MODDEBUG_ERRMSG) { 3764 _kobj_printf(ops, "kobj_read_file: size=%x,", size); 3765 _kobj_printf(ops, " offset=%x at", off); 3766 _kobj_printf(ops, " buf=%x\n", buf); 3767 } 3768 3769 while (size) { 3770 page_addr = F_PAGE(off); 3771 b_size = file->_size; 3772 /* 3773 * If we have the filesystem page the caller's referring to 3774 * and we have something in the buffer, 3775 * satisfy as much of the request from the buffer as we can. 3776 */ 3777 if (page_addr == file->_off && b_size > 0) { 3778 b_off = B_OFFSET(off); 3779 c_size = b_size - b_off; 3780 /* 3781 * If there's nothing to copy, we're at EOF. 3782 */ 3783 if (c_size <= 0) 3784 break; 3785 if (c_size > size) 3786 c_size = size; 3787 if (buf) { 3788 if (_moddebug & MODDEBUG_ERRMSG) 3789 _kobj_printf(ops, "copying %x bytes\n", 3790 c_size); 3791 bcopy(file->_base+b_off, buf, c_size); 3792 size -= c_size; 3793 off += c_size; 3794 buf += c_size; 3795 count += c_size; 3796 } else { 3797 _kobj_printf(ops, "kobj_read: system error"); 3798 count = -1; 3799 break; 3800 } 3801 } else { 3802 /* 3803 * If the caller's offset is page aligned and 3804 * the caller want's at least a filesystem page and 3805 * the caller provided a buffer, 3806 * read directly into the caller's buffer. 3807 */ 3808 if (page_addr == off && 3809 (c_size = F_PAGE(size)) && buf) { 3810 c_size = kobj_read(file->_fd, buf, c_size, 3811 page_addr); 3812 if (c_size < 0) { 3813 count = -1; 3814 break; 3815 } 3816 count += c_size; 3817 if (c_size != F_PAGE(size)) 3818 break; 3819 size -= c_size; 3820 off += c_size; 3821 buf += c_size; 3822 /* 3823 * Otherwise, read into our buffer and copy next time 3824 * around the loop. 3825 */ 3826 } else { 3827 file->_off = page_addr; 3828 c_size = kobj_read(file->_fd, file->_base, 3829 MAXBSIZE, page_addr); 3830 file->_ptr = file->_base; 3831 file->_cnt = c_size; 3832 file->_size = c_size; 3833 /* 3834 * If a _filbuf call or nothing read, break. 3835 */ 3836 if (buf == NULL || c_size <= 0) { 3837 count = c_size; 3838 break; 3839 } 3840 } 3841 if (_moddebug & MODDEBUG_ERRMSG) 3842 _kobj_printf(ops, "read %x bytes\n", c_size); 3843 } 3844 } 3845 if (_moddebug & MODDEBUG_ERRMSG) 3846 _kobj_printf(ops, "count = %x\n", count); 3847 3848 return (count); 3849 } 3850 3851 int 3852 kobj_filbuf(struct _buf *f) 3853 { 3854 if (kobj_read_file(f, NULL, MAXBSIZE, f->_off + f->_size) > 0) 3855 return (kobj_getc(f)); 3856 return (-1); 3857 } 3858 3859 void 3860 kobj_free(void *address, size_t size) 3861 { 3862 if (standalone) 3863 return; 3864 3865 kmem_free(address, size); 3866 kobj_stat.nfree_calls++; 3867 kobj_stat.nfree += size; 3868 } 3869 3870 void * 3871 kobj_zalloc(size_t size, int flag) 3872 { 3873 void *v; 3874 3875 if ((v = kobj_alloc(size, flag)) != 0) { 3876 bzero(v, size); 3877 } 3878 3879 return (v); 3880 } 3881 3882 void * 3883 kobj_alloc(size_t size, int flag) 3884 { 3885 /* 3886 * If we are running standalone in the 3887 * linker, we ask boot for memory. 3888 * Either it's temporary memory that we lose 3889 * once boot is mapped out or we allocate it 3890 * permanently using the dynamic data segment. 3891 */ 3892 if (standalone) { 3893 #ifdef __sparc 3894 if (flag & KM_TMP) { 3895 return (kobj_tmp_alloc(size)); 3896 } else if (flag & KM_SCRATCH) { 3897 void *buf = kobj_bs_alloc(size); 3898 3899 if (buf != NULL) 3900 return (buf); 3901 #ifdef KOBJ_DEBUG 3902 if (kobj_debug & D_DEBUG) { 3903 _kobj_printf(ops, "krtld: failed scratch alloc " 3904 "of %lu bytes -- falling back\n", size); 3905 } 3906 #endif 3907 } 3908 3909 #else /* x86 */ 3910 if (flag & (KM_TMP | KM_SCRATCH)) 3911 return (BOP_ALLOC(ops, 0, size, MINALIGN)); 3912 #endif 3913 return (kobj_segbrk(&_edata, size, MINALIGN, 0)); 3914 } 3915 3916 kobj_stat.nalloc_calls++; 3917 kobj_stat.nalloc += size; 3918 3919 return (kmem_alloc(size, (flag & KM_NOWAIT) ? KM_NOSLEEP : KM_SLEEP)); 3920 } 3921 3922 /* 3923 * Allow the "mod" system to sync up with the work 3924 * already done by kobj during the initial loading 3925 * of the kernel. This also gives us a chance 3926 * to reallocate memory that belongs to boot. 3927 */ 3928 void 3929 kobj_sync(void) 3930 { 3931 struct modctl_list *lp, **lpp; 3932 3933 /* 3934 * The module path can be set in /etc/system via 'moddir' commands 3935 */ 3936 if (default_path != NULL) 3937 kobj_module_path = default_path; 3938 else 3939 default_path = kobj_module_path; 3940 3941 ksyms_arena = vmem_create("ksyms", NULL, 0, sizeof (uint64_t), 3942 segkmem_alloc, segkmem_free, heap_arena, 0, VM_SLEEP); 3943 3944 ctf_arena = vmem_create("ctf", NULL, 0, sizeof (uint_t), 3945 segkmem_alloc, segkmem_free, heap_arena, 0, VM_SLEEP); 3946 3947 /* 3948 * Move symbol tables from boot memory to ksyms_arena. 3949 */ 3950 for (lpp = kobj_linkmaps; *lpp != NULL; lpp++) { 3951 for (lp = *lpp; lp != NULL; lp = lp->modl_next) 3952 kobj_export_module(mod(lp)); 3953 } 3954 } 3955 3956 caddr_t 3957 kobj_segbrk(caddr_t *spp, size_t size, size_t align, caddr_t limit) 3958 { 3959 uintptr_t va, pva; 3960 size_t alloc_pgsz = kobj_mmu_pagesize; 3961 size_t alloc_align = BO_NO_ALIGN; 3962 size_t alloc_size; 3963 3964 /* 3965 * If we are using "large" mappings for the kernel, 3966 * request aligned memory from boot using the 3967 * "large" pagesize. 3968 */ 3969 if (lg_pagesize) { 3970 alloc_align = lg_pagesize; 3971 alloc_pgsz = lg_pagesize; 3972 } 3973 va = ALIGN((uintptr_t)*spp, align); 3974 pva = P2ROUNDUP((uintptr_t)*spp, alloc_pgsz); 3975 /* 3976 * Need more pages? 3977 */ 3978 if (va + size > pva) { 3979 uintptr_t npva; 3980 3981 alloc_size = P2ROUNDUP(size - (pva - va), alloc_pgsz); 3982 /* 3983 * Check for overlapping segments. 3984 */ 3985 if (limit && limit <= *spp + alloc_size) { 3986 return ((caddr_t)0); 3987 } 3988 3989 npva = (uintptr_t)BOP_ALLOC(ops, (caddr_t)pva, 3990 alloc_size, alloc_align); 3991 3992 if (npva == NULL) { 3993 _kobj_printf(ops, "BOP_ALLOC failed, 0x%lx bytes", 3994 alloc_size); 3995 _kobj_printf(ops, " aligned %lx", alloc_align); 3996 _kobj_printf(ops, " at 0x%lx\n", pva); 3997 return (NULL); 3998 } 3999 } 4000 *spp = (caddr_t)(va + size); 4001 4002 return ((caddr_t)va); 4003 } 4004 4005 /* 4006 * Calculate the number of output hash buckets. 4007 * We use the next prime larger than n / 4, 4008 * so the average hash chain is about 4 entries. 4009 * More buckets would just be a waste of memory. 4010 */ 4011 uint_t 4012 kobj_gethashsize(uint_t n) 4013 { 4014 int f; 4015 int hsize = MAX(n / 4, 2); 4016 4017 for (f = 2; f * f <= hsize; f++) 4018 if (hsize % f == 0) 4019 hsize += f = 1; 4020 4021 return (hsize); 4022 } 4023 4024 static char * 4025 basename(char *s) 4026 { 4027 char *p, *q; 4028 4029 q = NULL; 4030 p = s; 4031 do { 4032 if (*p == '/') 4033 q = p; 4034 } while (*p++); 4035 return (q ? q + 1 : s); 4036 } 4037 4038 /*ARGSUSED*/ 4039 static void 4040 kprintf(void *op, const char *fmt, ...) 4041 { 4042 va_list adx; 4043 4044 va_start(adx, fmt); 4045 vprintf(fmt, adx); 4046 va_end(adx); 4047 } 4048 4049 void 4050 kobj_stat_get(kobj_stat_t *kp) 4051 { 4052 *kp = kobj_stat; 4053 } 4054 4055 int 4056 kobj_getpagesize() 4057 { 4058 return (lg_pagesize); 4059 } 4060 4061 void 4062 kobj_textwin_alloc(struct module *mp) 4063 { 4064 ASSERT(MUTEX_HELD(&mod_lock)); 4065 4066 if (mp->textwin != NULL) 4067 return; 4068 4069 /* 4070 * If the text is not contained in the heap, then it is not contained 4071 * by a writable mapping. (Specifically, it's on the nucleus page.) 4072 * We allocate a read/write mapping for this module's text to allow 4073 * the text to be patched without calling hot_patch_kernel_text() 4074 * (which is quite slow). 4075 */ 4076 if (!vmem_contains(heaptext_arena, mp->text, mp->text_size)) { 4077 uintptr_t text = (uintptr_t)mp->text; 4078 uintptr_t size = (uintptr_t)mp->text_size; 4079 uintptr_t i; 4080 caddr_t va; 4081 size_t sz = ((text + size + PAGESIZE - 1) & PAGEMASK) - 4082 (text & PAGEMASK); 4083 4084 va = mp->textwin_base = vmem_alloc(heap_arena, sz, VM_SLEEP); 4085 4086 for (i = text & PAGEMASK; i < text + size; i += PAGESIZE) { 4087 hat_devload(kas.a_hat, va, PAGESIZE, 4088 hat_getpfnum(kas.a_hat, (caddr_t)i), 4089 PROT_READ | PROT_WRITE, 4090 HAT_LOAD_LOCK | HAT_LOAD_NOCONSIST); 4091 va += PAGESIZE; 4092 } 4093 4094 mp->textwin = mp->textwin_base + (text & PAGEOFFSET); 4095 } else { 4096 mp->textwin = mp->text; 4097 } 4098 } 4099 4100 void 4101 kobj_textwin_free(struct module *mp) 4102 { 4103 uintptr_t text = (uintptr_t)mp->text; 4104 uintptr_t tsize = (uintptr_t)mp->text_size; 4105 size_t size = (((text + tsize + PAGESIZE - 1) & PAGEMASK) - 4106 (text & PAGEMASK)); 4107 4108 mp->textwin = NULL; 4109 4110 if (mp->textwin_base == NULL) 4111 return; 4112 4113 hat_unload(kas.a_hat, mp->textwin_base, size, HAT_UNLOAD_UNLOCK); 4114 vmem_free(heap_arena, mp->textwin_base, size); 4115 mp->textwin_base = NULL; 4116 } 4117 4118 static char * 4119 find_libmacro(char *name) 4120 { 4121 int lmi; 4122 4123 for (lmi = 0; lmi < NLIBMACROS; lmi++) { 4124 if (strcmp(name, libmacros[lmi].lmi_macroname) == 0) 4125 return (libmacros[lmi].lmi_list); 4126 } 4127 return (NULL); 4128 } 4129 4130 /* 4131 * Check for $MACRO in tail (string to expand) and expand it in path at pathend 4132 * returns path if successful, else NULL 4133 * Support multiple $MACROs expansion and the first valid path will be returned 4134 * Caller's responsibility to provide enough space in path to expand 4135 */ 4136 char * 4137 expand_libmacro(char *tail, char *path, char *pathend) 4138 { 4139 char c, *p, *p1, *p2, *path2, *endp; 4140 int diff, lmi, macrolen, valid_macro, more_macro; 4141 struct _buf *file; 4142 4143 /* 4144 * check for $MACROS between nulls or slashes 4145 */ 4146 p = strchr(tail, '$'); 4147 if (p == NULL) 4148 return (NULL); 4149 for (lmi = 0; lmi < NLIBMACROS; lmi++) { 4150 macrolen = libmacros[lmi].lmi_macrolen; 4151 if (strncmp(p + 1, libmacros[lmi].lmi_macroname, macrolen) == 0) 4152 break; 4153 } 4154 4155 valid_macro = 0; 4156 if (lmi < NLIBMACROS) { 4157 /* 4158 * The following checks are used to restrict expansion of 4159 * macros to those that form a full directory/file name 4160 * and to keep the behavior same as before. If this 4161 * restriction is removed or no longer valid in the future, 4162 * the checks below can be deleted. 4163 */ 4164 if ((p == tail) || (*(p - 1) == '/')) { 4165 c = *(p + macrolen + 1); 4166 if (c == '/' || c == '\0') 4167 valid_macro = 1; 4168 } 4169 } 4170 4171 if (!valid_macro) { 4172 p2 = strchr(p, '/'); 4173 /* 4174 * if no more macro to expand, then just copy whatever left 4175 * and check whether it exists 4176 */ 4177 if (p2 == NULL || strchr(p2, '$') == NULL) { 4178 (void) strcpy(pathend, tail); 4179 if ((file = kobj_open_path(path, 1, 1)) != 4180 (struct _buf *)-1) { 4181 kobj_close_file(file); 4182 return (path); 4183 } else 4184 return (NULL); 4185 } else { 4186 /* 4187 * copy all chars before '/' and call expand_libmacro() 4188 * again 4189 */ 4190 diff = p2 - tail; 4191 bcopy(tail, pathend, diff); 4192 pathend += diff; 4193 *(pathend) = '\0'; 4194 return (expand_libmacro(p2, path, pathend)); 4195 } 4196 } 4197 4198 more_macro = 0; 4199 if (c != '\0') { 4200 endp = p + macrolen + 1; 4201 if (strchr(endp, '$') != NULL) 4202 more_macro = 1; 4203 } else 4204 endp = NULL; 4205 4206 /* 4207 * copy lmi_list and split it into components. 4208 * then put the part of tail before $MACRO into path 4209 * at pathend 4210 */ 4211 diff = p - tail; 4212 if (diff > 0) 4213 bcopy(tail, pathend, diff); 4214 path2 = pathend + diff; 4215 p1 = libmacros[lmi].lmi_list; 4216 while (p1 && (*p1 != '\0')) { 4217 p2 = strchr(p1, ':'); 4218 if (p2) { 4219 diff = p2 - p1; 4220 bcopy(p1, path2, diff); 4221 *(path2 + diff) = '\0'; 4222 } else { 4223 diff = strlen(p1); 4224 bcopy(p1, path2, diff + 1); 4225 } 4226 /* copy endp only if there isn't any more macro to expand */ 4227 if (!more_macro && (endp != NULL)) 4228 (void) strcat(path2, endp); 4229 file = kobj_open_path(path, 1, 1); 4230 if (file != (struct _buf *)-1) { 4231 kobj_close_file(file); 4232 /* 4233 * if more macros to expand then call expand_libmacro(), 4234 * else return path which has the whole path 4235 */ 4236 if (!more_macro || (expand_libmacro(endp, path, 4237 path2 + diff) != NULL)) { 4238 return (path); 4239 } 4240 } 4241 if (p2) 4242 p1 = ++p2; 4243 else 4244 return (NULL); 4245 } 4246 return (NULL); 4247 } 4248 4249 static void 4250 tnf_add_notifyunload(kobj_notify_f *fp) 4251 { 4252 kobj_notify_list_t *entry; 4253 4254 entry = kobj_alloc(sizeof (kobj_notify_list_t), KM_WAIT); 4255 entry->kn_type = KOBJ_NOTIFY_MODUNLOADING; 4256 entry->kn_func = fp; 4257 (void) kobj_notify_add(entry); 4258 } 4259 4260 /* ARGSUSED */ 4261 static void 4262 tnf_unsplice_probes(unsigned int what, struct modctl *mod) 4263 { 4264 extern tnf_probe_control_t *__tnf_probe_list_head; 4265 extern tnf_tag_data_t *__tnf_tag_list_head; 4266 tnf_probe_control_t **p; 4267 tnf_tag_data_t **q; 4268 struct module *mp = mod->mod_mp; 4269 4270 if (!(mp->flags & KOBJ_TNF_PROBE)) 4271 return; 4272 4273 for (p = &__tnf_probe_list_head; *p; ) 4274 if (kobj_addrcheck(mp, (char *)*p) == 0) 4275 *p = (*p)->next; 4276 else 4277 p = &(*p)->next; 4278 4279 for (q = &__tnf_tag_list_head; *q; ) 4280 if (kobj_addrcheck(mp, (char *)*q) == 0) 4281 *q = (tnf_tag_data_t *)(*q)->tag_version; 4282 else 4283 q = (tnf_tag_data_t **)&(*q)->tag_version; 4284 4285 tnf_changed_probe_list = 1; 4286 } 4287 4288 int 4289 tnf_splice_probes(int boot_load, tnf_probe_control_t *plist, 4290 tnf_tag_data_t *tlist) 4291 { 4292 int result = 0; 4293 static int add_notify = 1; 4294 4295 if (plist) { 4296 tnf_probe_control_t *pl; 4297 4298 for (pl = plist; pl->next; ) 4299 pl = pl->next; 4300 4301 if (!boot_load) 4302 mutex_enter(&mod_lock); 4303 tnf_changed_probe_list = 1; 4304 pl->next = __tnf_probe_list_head; 4305 __tnf_probe_list_head = plist; 4306 if (!boot_load) 4307 mutex_exit(&mod_lock); 4308 result = 1; 4309 } 4310 4311 if (tlist) { 4312 tnf_tag_data_t *tl; 4313 4314 for (tl = tlist; tl->tag_version; ) 4315 tl = (tnf_tag_data_t *)tl->tag_version; 4316 4317 if (!boot_load) 4318 mutex_enter(&mod_lock); 4319 tl->tag_version = (tnf_tag_version_t *)__tnf_tag_list_head; 4320 __tnf_tag_list_head = tlist; 4321 if (!boot_load) 4322 mutex_exit(&mod_lock); 4323 result = 1; 4324 } 4325 if (!boot_load && result && add_notify) { 4326 tnf_add_notifyunload(tnf_unsplice_probes); 4327 add_notify = 0; 4328 } 4329 return (result); 4330 } 4331 4332 #if defined(__x86) 4333 /* 4334 * This code is for the purpose of manually recording which files 4335 * needs to go into the boot archive on any given system. 4336 * 4337 * To enable the code, set kobj_file_bufsize in /etc/system 4338 * and reboot the system, then use mdb to look at kobj_file_buf. 4339 */ 4340 static void 4341 kobj_record_file(char *filename) 4342 { 4343 extern char *kobj_file_buf; 4344 extern int kobj_file_bufsize; 4345 static char *buf; 4346 static int size = 0; 4347 int n; 4348 4349 if (standalone) /* kernel symbol not available */ 4350 return; 4351 4352 if (kobj_file_bufsize == 0) /* don't bother */ 4353 return; 4354 4355 if (kobj_file_buf == NULL) { /* allocate buffer */ 4356 size = kobj_file_bufsize; 4357 buf = kobj_file_buf = kobj_alloc(size, KM_WAIT|KM_TMP); 4358 } 4359 4360 n = snprintf(buf, size, "%s\n", filename); 4361 if (n > size) 4362 n = size; 4363 size -= n; 4364 buf += n; 4365 } 4366 #endif /* __x86 */ 4367 4368 static int 4369 kobj_boot_fstat(int fd, struct bootstat *stp) 4370 { 4371 #if defined(__sparc) 4372 if (!standalone && _ioquiesced) 4373 return (-1); 4374 return (BOP_FSTAT(ops, fd, stp)); 4375 #else 4376 return (BRD_FSTAT(bfs_ops, fd, stp)); 4377 #endif 4378 } 4379 4380 /* 4381 * XXX these wrappers should go away when sparc is converted 4382 * boot from ramdisk 4383 */ 4384 static int 4385 kobj_boot_open(char *filename, int flags) 4386 { 4387 #if defined(__sparc) 4388 /* 4389 * If io via bootops is quiesced, it means boot is no longer 4390 * available to us. We make it look as if we can't open the 4391 * named file - which is reasonably accurate. 4392 */ 4393 if (!standalone && _ioquiesced) 4394 return (-1); 4395 4396 return (BOP_OPEN(ops, filename, flags)); 4397 #else /* x86 */ 4398 kobj_record_file(filename); 4399 return (BRD_OPEN(bfs_ops, filename, flags)); 4400 #endif 4401 } 4402 4403 static int 4404 kobj_boot_close(int fd) 4405 { 4406 #if defined(__sparc) 4407 if (!standalone && _ioquiesced) 4408 return (-1); 4409 4410 return (BOP_CLOSE(ops, fd)); 4411 #else /* x86 */ 4412 return (BRD_CLOSE(bfs_ops, fd)); 4413 #endif 4414 } 4415 4416 /*ARGSUSED*/ 4417 static int 4418 kobj_boot_seek(int fd, off_t hi, off_t lo) 4419 { 4420 #if defined(__sparc) 4421 return (BOP_SEEK(ops, fd, hi, lo)); 4422 #else 4423 return (BRD_SEEK(bfs_ops, fd, lo, SEEK_SET)); 4424 #endif 4425 } 4426 4427 static int 4428 kobj_boot_read(int fd, caddr_t buf, size_t size) 4429 { 4430 #if defined(__sparc) 4431 return (BOP_READ(ops, fd, buf, size)); 4432 #else 4433 return (BRD_READ(bfs_ops, fd, buf, size)); 4434 #endif 4435 } 4436