]> git.ipfire.org Git - thirdparty/linux.git/blame - include/linux/module.h
Merge tag 'mmc-v6.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/ulfh/mmc
[thirdparty/linux.git] / include / linux / module.h
CommitLineData
bf49d9dd 1/* SPDX-License-Identifier: GPL-2.0-only */
1da177e4
LT
2/*
3 * Dynamic loading of modules into the kernel.
4 *
5 * Rewritten by Richard Henderson <rth@tamu.edu> Dec 1996
6 * Rewritten again by Rusty Russell, 2002
7 */
bf49d9dd
MY
8
9#ifndef _LINUX_MODULE_H
10#define _LINUX_MODULE_H
11
1da177e4
LT
12#include <linux/list.h>
13#include <linux/stat.h>
9294523e 14#include <linux/buildid.h>
1da177e4
LT
15#include <linux/compiler.h>
16#include <linux/cache.h>
17#include <linux/kmod.h>
0fd972a7 18#include <linux/init.h>
1da177e4
LT
19#include <linux/elf.h>
20#include <linux/stringify.h>
21#include <linux/kobject.h>
22#include <linux/moduleparam.h>
b2e285fc 23#include <linux/jump_label.h>
f5016932 24#include <linux/export.h>
93c2e105 25#include <linux/rbtree_latch.h>
663faf9f 26#include <linux/error-injection.h>
9c0be3f6 27#include <linux/tracepoint-defs.h>
fe15b50c 28#include <linux/srcu.h>
9183c3f9 29#include <linux/static_call_types.h>
7deabd67 30#include <linux/dynamic_debug.h>
1da177e4 31
e1783a24 32#include <linux/percpu.h>
1da177e4
LT
33#include <asm/module.h>
34
730b69d2 35#define MODULE_NAME_LEN MAX_PARAM_PREFIX_LEN
1da177e4 36
e865d06b 37struct modversion_info {
1da177e4
LT
38 unsigned long crc;
39 char name[MODULE_NAME_LEN];
40};
41
42struct module;
0ef76537 43struct exception_table_entry;
1da177e4 44
4befb026
KS
45struct module_kobject {
46 struct kobject kobj;
47 struct module *mod;
48 struct kobject *drivers_dir;
49 struct module_param_attrs *mp;
942e4431 50 struct completion *kobj_completion;
3859a271 51} __randomize_layout;
4befb026 52
1da177e4 53struct module_attribute {
4befb026 54 struct attribute attr;
f3227ffd 55 ssize_t (*show)(const struct module_attribute *, struct module_kobject *,
4befb026 56 char *);
f3227ffd 57 ssize_t (*store)(const struct module_attribute *, struct module_kobject *,
1da177e4 58 const char *, size_t count);
c988d2b2
MD
59 void (*setup)(struct module *, const char *);
60 int (*test)(struct module *);
61 void (*free)(struct module *);
1da177e4
LT
62};
63
e94965ed
DT
64struct module_version_attribute {
65 struct module_attribute mattr;
66 const char *module_name;
67 const char *version;
0801a007 68};
e94965ed 69
f3227ffd 70extern ssize_t __modver_version_show(const struct module_attribute *,
4befb026 71 struct module_kobject *, char *);
9b73a584 72
f3227ffd 73extern const struct module_attribute module_uevent;
1da177e4
LT
74
75/* These are either module local, or the kernel's dummy ones. */
76extern int init_module(void);
77extern void cleanup_module(void);
78
0fd972a7
PG
79#ifndef MODULE
80/**
81 * module_init() - driver initialization entry point
82 * @x: function to be run at kernel boot time or module insertion
83 *
84 * module_init() will either be called during do_initcalls() (if
85 * builtin) or at module insertion time (if a module). There can only
86 * be one per module.
87 */
88#define module_init(x) __initcall(x);
89
90/**
91 * module_exit() - driver exit entry point
92 * @x: function to be run when driver is removed
93 *
94 * module_exit() will wrap the driver clean-up code
95 * with cleanup_module() when used with rmmod when
96 * the driver is a module. If the driver is statically
97 * compiled into the kernel, module_exit() has no effect.
98 * There can only be one per module.
99 */
100#define module_exit(x) __exitcall(x);
101
102#else /* MODULE */
103
104/*
105 * In most cases loadable modules do not need custom
106 * initcall levels. There are still some valid cases where
107 * a driver may be needed early if built in, and does not
108 * matter when built as a loadable module. Like bus
109 * snooping debug drivers.
110 */
111#define early_initcall(fn) module_init(fn)
112#define core_initcall(fn) module_init(fn)
113#define core_initcall_sync(fn) module_init(fn)
114#define postcore_initcall(fn) module_init(fn)
115#define postcore_initcall_sync(fn) module_init(fn)
116#define arch_initcall(fn) module_init(fn)
117#define subsys_initcall(fn) module_init(fn)
118#define subsys_initcall_sync(fn) module_init(fn)
119#define fs_initcall(fn) module_init(fn)
120#define fs_initcall_sync(fn) module_init(fn)
121#define rootfs_initcall(fn) module_init(fn)
122#define device_initcall(fn) module_init(fn)
123#define device_initcall_sync(fn) module_init(fn)
124#define late_initcall(fn) module_init(fn)
125#define late_initcall_sync(fn) module_init(fn)
126
127#define console_initcall(fn) module_init(fn)
0fd972a7
PG
128
129/* Each module must use one module_init(). */
130#define module_init(initfn) \
1f318a8b 131 static inline initcall_t __maybe_unused __inittest(void) \
0fd972a7 132 { return initfn; } \
cf68fffb
ST
133 int init_module(void) __copy(initfn) \
134 __attribute__((alias(#initfn))); \
92efda8e 135 ___ADDRESSABLE(init_module, __initdata);
0fd972a7
PG
136
137/* This is only required if you want to be unloadable. */
138#define module_exit(exitfn) \
1f318a8b 139 static inline exitcall_t __maybe_unused __exittest(void) \
0fd972a7 140 { return exitfn; } \
cf68fffb
ST
141 void cleanup_module(void) __copy(exitfn) \
142 __attribute__((alias(#exitfn))); \
92efda8e 143 ___ADDRESSABLE(cleanup_module, __exitdata);
0fd972a7
PG
144
145#endif
146
147/* This means "can be init if no module support, otherwise module load
148 may call it." */
149#ifdef CONFIG_MODULES
150#define __init_or_module
151#define __initdata_or_module
152#define __initconst_or_module
153#define __INIT_OR_MODULE .text
154#define __INITDATA_OR_MODULE .data
155#define __INITRODATA_OR_MODULE .section ".rodata","a",%progbits
156#else
157#define __init_or_module __init
158#define __initdata_or_module __initdata
159#define __initconst_or_module __initconst
160#define __INIT_OR_MODULE __INIT
161#define __INITDATA_OR_MODULE __INITDATA
162#define __INITRODATA_OR_MODULE __INITRODATA
163#endif /*CONFIG_MODULES*/
164
7c76c813
SS
165struct module_kobject *lookup_or_create_module_kobject(const char *name);
166
1da177e4
LT
167/* Generic info of form tag = "info" */
168#define MODULE_INFO(tag, info) __MODULE_INFO(tag, tag, info)
169
170/* For userspace: you can also call me... */
171#define MODULE_ALIAS(_alias) MODULE_INFO(alias, _alias)
172
7cb14ba7
AR
173/* Soft module dependencies. See man modprobe.d for details.
174 * Example: MODULE_SOFTDEP("pre: module-foo module-bar post: module-baz")
175 */
176#define MODULE_SOFTDEP(_softdep) MODULE_INFO(softdep, _softdep)
177
61842868
JITM
178/*
179 * Weak module dependencies. See man modprobe.d for details.
180 * Example: MODULE_WEAKDEP("module-foo")
181 */
182#define MODULE_WEAKDEP(_weakdep) MODULE_INFO(weakdep, _weakdep)
183
8b41fc44
MY
184/*
185 * MODULE_FILE is used for generating modules.builtin
186 * So, make it no-op when this is being built as a module
187 */
188#ifdef MODULE
189#define MODULE_FILE
190#else
191#define MODULE_FILE MODULE_INFO(file, KBUILD_MODFILE);
192#endif
193
1da177e4
LT
194/*
195 * The following license idents are currently accepted as indicating free
196 * software modules
197 *
bf7fbeea 198 * "GPL" [GNU Public License v2]
1da177e4
LT
199 * "GPL v2" [GNU Public License v2]
200 * "GPL and additional rights" [GNU Public License v2 rights and more]
201 * "Dual BSD/GPL" [GNU Public License v2
202 * or BSD license choice]
8d27e908
XVP
203 * "Dual MIT/GPL" [GNU Public License v2
204 * or MIT license choice]
1da177e4
LT
205 * "Dual MPL/GPL" [GNU Public License v2
206 * or Mozilla license choice]
207 *
208 * The following other idents are available
209 *
210 * "Proprietary" [Non free products]
211 *
bf7fbeea
TG
212 * Both "GPL v2" and "GPL" (the latter also in dual licensed strings) are
213 * merely stating that the module is licensed under the GPL v2, but are not
214 * telling whether "GPL v2 only" or "GPL v2 or later". The reason why there
215 * are two variants is a historic and failed attempt to convey more
216 * information in the MODULE_LICENSE string. For module loading the
217 * "only/or later" distinction is completely irrelevant and does neither
218 * replace the proper license identifiers in the corresponding source file
219 * nor amends them in any way. The sole purpose is to make the
220 * 'Proprietary' flagging work and to refuse to bind symbols which are
221 * exported with EXPORT_SYMBOL_GPL when a non free module is loaded.
222 *
223 * In the same way "BSD" is not a clear license information. It merely
224 * states, that the module is licensed under one of the compatible BSD
225 * license variants. The detailed and correct license information is again
226 * to be found in the corresponding source files.
227 *
1da177e4
LT
228 * There are dual licensed components, but when running with Linux it is the
229 * GPL that is relevant so this is a non issue. Similarly LGPL linked with GPL
230 * is a GPL combined work.
231 *
232 * This exists for several reasons
e865d06b 233 * 1. So modinfo can show license info for users wanting to vet their setup
1da177e4
LT
234 * is free
235 * 2. So the community can ignore bug reports including proprietary modules
236 * 3. So vendors can do likewise based on their own policies
237 */
8b41fc44 238#define MODULE_LICENSE(_license) MODULE_FILE MODULE_INFO(license, _license)
1da177e4 239
1d7015ca
JB
240/*
241 * Author(s), use "Name <email>" or just "Name", for multiple
242 * authors use multiple MODULE_AUTHOR() statements/lines.
243 */
1da177e4 244#define MODULE_AUTHOR(_author) MODULE_INFO(author, _author)
e865d06b 245
1da177e4
LT
246/* What your module does. */
247#define MODULE_DESCRIPTION(_description) MODULE_INFO(description, _description)
248
cff26a51
RR
249#ifdef MODULE
250/* Creates an alias so file2alias.c can find device table. */
251#define MODULE_DEVICE_TABLE(type, name) \
8c21c411
MY
252static typeof(name) __mod_device_table__##type##__##name \
253 __attribute__ ((used, alias(__stringify(name))))
cff26a51
RR
254#else /* !MODULE */
255#define MODULE_DEVICE_TABLE(type, name)
256#endif
1da177e4
LT
257
258/* Version of form [<epoch>:]<version>[-<extra-version>].
e865d06b
SL
259 * Or for CVS/RCS ID version, everything but the number is stripped.
260 * <epoch>: A (small) unsigned integer which allows you to start versions
261 * anew. If not mentioned, it's zero. eg. "2:1.0" is after
262 * "1:2.0".
263
264 * <version>: The <version> may contain only alphanumerics and the
265 * character `.'. Ordered by numeric sort for numeric parts,
266 * ascii sort for ascii parts (as per RPM or DEB algorithm).
267
268 * <extraversion>: Like <version>, but inserted for local
269 * customizations, eg "rh3" or "rusty1".
270
271 * Using this automatically adds a checksum of the .c files and the
272 * local headers in "srcversion".
273 */
e94965ed 274
3b90a5b2 275#if defined(MODULE) || !defined(CONFIG_SYSFS)
1da177e4 276#define MODULE_VERSION(_version) MODULE_INFO(version, _version)
e94965ed
DT
277#else
278#define MODULE_VERSION(_version) \
898490c0 279 MODULE_INFO(version, _version); \
38e3fe65 280 static const struct module_version_attribute __modver_attr \
b112082c
JH
281 __used __section("__modver") \
282 __aligned(__alignof__(struct module_version_attribute)) \
283 = { \
284 .mattr = { \
285 .attr = { \
286 .name = "version", \
287 .mode = S_IRUGO, \
288 }, \
289 .show = __modver_version_show, \
e94965ed 290 }, \
b112082c
JH
291 .module_name = KBUILD_MODNAME, \
292 .version = _version, \
2d26c716 293 }
e94965ed 294#endif
1da177e4 295
187afbed
JM
296/* Optional firmware file (or files) needed by the module
297 * format is simply firmware file name. Multiple firmware
298 * files require multiple MODULE_FIRMWARE() specifiers */
299#define MODULE_FIRMWARE(_firmware) MODULE_INFO(firmware, _firmware)
300
cdd30ebb 301#define MODULE_IMPORT_NS(ns) MODULE_INFO(import_ns, ns)
3e4d890a 302
1da177e4
LT
303struct notifier_block;
304
305#ifdef CONFIG_MODULES
306
5ed10910 307extern int modules_disabled; /* for sysctl */
1da177e4
LT
308/* Get/put a kernel symbol (calls must be symmetric) */
309void *__symbol_get(const char *symbol);
310void *__symbol_get_gpl(const char *symbol);
4c56eb33
MY
311#define symbol_get(x) ({ \
312 static const char __notrim[] \
313 __used __section(".no_trim_symbol") = __stringify(x); \
314 (typeof(&x))(__symbol_get(__stringify(x))); })
1da177e4 315
c8e21ced
RR
316/* modules using other modules: kdb wants to see this. */
317struct module_use {
318 struct list_head source_list;
319 struct list_head target_list;
320 struct module *source, *target;
321};
322
0d21b0e3
RR
323enum module_state {
324 MODULE_STATE_LIVE, /* Normal state. */
325 MODULE_STATE_COMING, /* Full formed, running module_init. */
326 MODULE_STATE_GOING, /* Going away. */
327 MODULE_STATE_UNFORMED, /* Still setting it up. */
1da177e4
LT
328};
329
93c2e105
PZ
330struct mod_tree_node {
331 struct module *mod;
332 struct latch_tree_node node;
333};
334
ac3b4328
SL
335enum mod_mem_type {
336 MOD_TEXT = 0,
337 MOD_DATA,
338 MOD_RODATA,
339 MOD_RO_AFTER_INIT,
340 MOD_INIT_TEXT,
341 MOD_INIT_DATA,
342 MOD_INIT_RODATA,
343
344 MOD_MEM_NUM_TYPES,
345 MOD_INVALID = -1,
346};
347
348#define mod_mem_type_is_init(type) \
349 ((type) == MOD_INIT_TEXT || \
350 (type) == MOD_INIT_DATA || \
351 (type) == MOD_INIT_RODATA)
352
353#define mod_mem_type_is_core(type) (!mod_mem_type_is_init(type))
354
355#define mod_mem_type_is_text(type) \
356 ((type) == MOD_TEXT || \
357 (type) == MOD_INIT_TEXT)
358
359#define mod_mem_type_is_data(type) (!mod_mem_type_is_text(type))
360
361#define mod_mem_type_is_core_data(type) \
362 (mod_mem_type_is_core(type) && \
363 mod_mem_type_is_data(type))
364
365#define for_each_mod_mem_type(type) \
366 for (enum mod_mem_type (type) = 0; \
367 (type) < MOD_MEM_NUM_TYPES; (type)++)
368
369#define for_class_mod_mem_type(type, class) \
370 for_each_mod_mem_type(type) \
371 if (mod_mem_type_is_##class(type))
372
373struct module_memory {
7523e4dc 374 void *base;
0c133b1e 375 bool is_rox;
7523e4dc 376 unsigned int size;
7523e4dc
RR
377
378#ifdef CONFIG_MODULES_TREE_LOOKUP
379 struct mod_tree_node mtn;
380#endif
381};
382
383#ifdef CONFIG_MODULES_TREE_LOOKUP
384/* Only touch one cacheline for common rbtree-for-core-layout case. */
ac3b4328 385#define __module_memory_align ____cacheline_aligned
7523e4dc 386#else
ac3b4328 387#define __module_memory_align
7523e4dc
RR
388#endif
389
8244062e
RR
390struct mod_kallsyms {
391 Elf_Sym *symtab;
392 unsigned int num_symtab;
393 char *strtab;
1c7651f4 394 char *typetab;
8244062e
RR
395};
396
1ce15ef4 397#ifdef CONFIG_LIVEPATCH
eca0edaf 398/**
6486a57f 399 * struct klp_modinfo - ELF information preserved from the livepatch module
eca0edaf 400 *
6486a57f 401 * @hdr: ELF header
eca0edaf
MPS
402 * @sechdrs: Section header table
403 * @secstrings: String table for the section headers
404 * @symndx: The symbol table section index
405 */
1ce15ef4
JY
406struct klp_modinfo {
407 Elf_Ehdr hdr;
408 Elf_Shdr *sechdrs;
409 char *secstrings;
410 unsigned int symndx;
411};
412#endif
413
e865d06b 414struct module {
1da177e4
LT
415 enum module_state state;
416
417 /* Member of list of modules */
418 struct list_head list;
419
420 /* Unique handle for this module */
421 char name[MODULE_NAME_LEN];
422
9294523e
SB
423#ifdef CONFIG_STACKTRACE_BUILD_ID
424 /* Module build ID */
425 unsigned char build_id[BUILD_ID_SIZE_MAX];
426#endif
427
1da177e4
LT
428 /* Sysfs stuff. */
429 struct module_kobject mkobj;
03e88ae1 430 struct module_attribute *modinfo_attrs;
c988d2b2
MD
431 const char *version;
432 const char *srcversion;
270a6c4c 433 struct kobject *holders_dir;
1da177e4
LT
434
435 /* Exported symbols */
436 const struct kernel_symbol *syms;
1cd9502e 437 const u32 *crcs;
af540689 438 unsigned int num_syms;
1da177e4 439
89245600
ST
440#ifdef CONFIG_ARCH_USES_CFI_TRAPS
441 s32 *kcfi_traps;
442 s32 *kcfi_traps_end;
cf68fffb
ST
443#endif
444
e180a6b7 445 /* Kernel parameters. */
cf2fde7b 446#ifdef CONFIG_SYSFS
b51d23e4 447 struct mutex param_lock;
cf2fde7b 448#endif
e180a6b7
RR
449 struct kernel_param *kp;
450 unsigned int num_kp;
451
1da177e4 452 /* GPL-only exported symbols. */
1da177e4 453 unsigned int num_gpl_syms;
af540689 454 const struct kernel_symbol *gpl_syms;
1cd9502e 455 const u32 *gpl_crcs;
262e6ae7 456 bool using_gplonly_symbols;
1da177e4 457
106a4ee2
RR
458#ifdef CONFIG_MODULE_SIG
459 /* Signature was verified. */
460 bool sig_ok;
461#endif
462
f2411da7
LR
463 bool async_probe_requested;
464
1da177e4
LT
465 /* Exception table */
466 unsigned int num_exentries;
5e458cc0 467 struct exception_table_entry *extable;
1da177e4
LT
468
469 /* Startup function. */
470 int (*init)(void);
471
ac3b4328 472 struct module_memory mem[MOD_MEM_NUM_TYPES] __module_memory_align;
84e1c6bb 473
1da177e4
LT
474 /* Arch-specific module values */
475 struct mod_arch_specific arch;
476
7fd8329b 477 unsigned long taints; /* same bits as kernel:taint_flags */
2bc2d61a 478
7664c5a1
JF
479#ifdef CONFIG_GENERIC_BUG
480 /* Support for BUG */
af540689 481 unsigned num_bugs;
7664c5a1
JF
482 struct list_head bug_list;
483 struct bug_entry *bug_table;
1da177e4
LT
484#endif
485
486#ifdef CONFIG_KALLSYMS
8244062e 487 /* Protected by RCU and/or module_mutex: use rcu_dereference() */
6080d608 488 struct mod_kallsyms __rcu *kallsyms;
8244062e 489 struct mod_kallsyms core_kallsyms;
c714965f 490
1da177e4
LT
491 /* Section attributes */
492 struct module_sect_attrs *sect_attrs;
6d760133
RM
493
494 /* Notes attributes */
495 struct module_notes_attrs *notes_attrs;
1da177e4
LT
496#endif
497
a288bd65
RK
498 /* The command line arguments (may be mangled). People like
499 keeping pointers to this stuff */
500 char *args;
501
259354de 502#ifdef CONFIG_SMP
1da177e4 503 /* Per-cpu data. */
259354de
TH
504 void __percpu *percpu;
505 unsigned int percpu_size;
506#endif
66e9b071
TG
507 void *noinstr_text_start;
508 unsigned int noinstr_text_size;
1da177e4 509
97e1c18e 510#ifdef CONFIG_TRACEPOINTS
97e1c18e 511 unsigned int num_tracepoints;
9c0be3f6 512 tracepoint_ptr_t *tracepoints_ptrs;
97e1c18e 513#endif
fe15b50c
PM
514#ifdef CONFIG_TREE_SRCU
515 unsigned int num_srcu_structs;
516 struct srcu_struct **srcu_struct_ptrs;
517#endif
a38d1107
MM
518#ifdef CONFIG_BPF_EVENTS
519 unsigned int num_bpf_raw_events;
520 struct bpf_raw_event_map *bpf_raw_events;
521#endif
36e68442
AN
522#ifdef CONFIG_DEBUG_INFO_BTF_MODULES
523 unsigned int btf_data_size;
d4e48e3d 524 unsigned int btf_base_data_size;
36e68442 525 void *btf_data;
d4e48e3d 526 void *btf_base_data;
36e68442 527#endif
e9666d10 528#ifdef CONFIG_JUMP_LABEL
bf5438fc
JB
529 struct jump_entry *jump_entries;
530 unsigned int num_jump_entries;
531#endif
769b0441 532#ifdef CONFIG_TRACING
1ba28e02 533 unsigned int num_trace_bprintk_fmt;
a288bd65 534 const char **trace_bprintk_fmt_start;
1ba28e02 535#endif
6d723736 536#ifdef CONFIG_EVENT_TRACING
2425bcb9 537 struct trace_event_call **trace_events;
6d723736 538 unsigned int num_trace_events;
99be647c
JL
539 struct trace_eval_map **trace_evals;
540 unsigned int num_trace_evals;
6d723736 541#endif
93eb677d 542#ifdef CONFIG_FTRACE_MCOUNT_RECORD
93eb677d 543 unsigned int num_ftrace_callsites;
a288bd65 544 unsigned long *ftrace_callsites;
93eb677d 545#endif
1e6769b0
MH
546#ifdef CONFIG_KPROBES
547 void *kprobes_text_start;
548 unsigned int kprobes_text_size;
16db6264
MH
549 unsigned long *kprobe_blacklist;
550 unsigned int num_kprobe_blacklist;
1e6769b0 551#endif
9183c3f9
JP
552#ifdef CONFIG_HAVE_STATIC_CALL_INLINE
553 int num_static_call_sites;
554 struct static_call_site *static_call_sites;
555#endif
3d6e4462 556#if IS_ENABLED(CONFIG_KUNIT)
d81f0d7b
RM
557 int num_kunit_init_suites;
558 struct kunit_suite **kunit_init_suites;
3d6e4462 559 int num_kunit_suites;
e5857d39 560 struct kunit_suite **kunit_suites;
3d6e4462
JK
561#endif
562
1ba28e02 563
8cb2c2dc 564#ifdef CONFIG_LIVEPATCH
1ce15ef4 565 bool klp; /* Is this a livepatch module? */
8cb2c2dc 566 bool klp_alive;
1ce15ef4 567
6486a57f 568 /* ELF information */
1ce15ef4 569 struct klp_modinfo *klp_info;
8cb2c2dc
PM
570#endif
571
33701557
CD
572#ifdef CONFIG_PRINTK_INDEX
573 unsigned int printk_index_size;
574 struct pi_entry **printk_index_start;
575#endif
576
af540689
RK
577#ifdef CONFIG_MODULE_UNLOAD
578 /* What modules depend on me? */
2c02dfe7
LT
579 struct list_head source_list;
580 /* What modules do I depend on? */
581 struct list_head target_list;
af540689 582
af540689
RK
583 /* Destruction function. */
584 void (*exit)(void);
585
2f35c41f 586 atomic_t refcnt;
af540689 587#endif
b99b87f7
PO
588
589#ifdef CONFIG_CONSTRUCTORS
590 /* Constructor functions. */
591 ctor_fn_t *ctors;
592 unsigned int num_ctors;
593#endif
92ace999 594
540adea3 595#ifdef CONFIG_FUNCTION_ERROR_INJECTION
663faf9f 596 struct error_injection_entry *ei_funcs;
540adea3 597 unsigned int num_ei_funcs;
92ace999 598#endif
7deabd67
JB
599#ifdef CONFIG_DYNAMIC_DEBUG_CORE
600 struct _ddebug_info dyndbg_info;
601#endif
3859a271 602} ____cacheline_aligned __randomize_layout;
e61a1c1c
RZ
603#ifndef MODULE_ARCH_INIT
604#define MODULE_ARCH_INIT {}
605#endif
1da177e4 606
93d77e7f
VW
607#ifndef HAVE_ARCH_KALLSYMS_SYMBOL_VALUE
608static inline unsigned long kallsyms_symbol_value(const Elf_Sym *sym)
609{
610 return sym->st_value;
611}
612#endif
613
1da177e4
LT
614/* FIXME: It'd be nice to isolate modules during init, too, so they
615 aren't used before they (may) fail. But presently too much code
616 (IDE & SCSI) require entry into the module during init.*/
171d864e 617static inline bool module_is_live(struct module *mod)
1da177e4
LT
618{
619 return mod->state != MODULE_STATE_GOING;
620}
621
7582b7be
MRI
622static inline bool module_is_coming(struct module *mod)
623{
624 return mod->state == MODULE_STATE_COMING;
625}
626
1da177e4 627struct module *__module_text_address(unsigned long addr);
e610499e
RR
628struct module *__module_address(unsigned long addr);
629bool is_module_address(unsigned long addr);
383776fa 630bool __is_module_percpu_address(unsigned long addr, unsigned long *can_addr);
10fad5e4 631bool is_module_percpu_address(unsigned long addr);
e610499e 632bool is_module_text_address(unsigned long addr);
1da177e4 633
ac3b4328
SL
634static inline bool within_module_mem_type(unsigned long addr,
635 const struct module *mod,
636 enum mod_mem_type type)
637{
638 unsigned long base, size;
639
640 base = (unsigned long)mod->mem[type].base;
641 size = mod->mem[type].size;
642 return addr - base < size;
643}
644
76681c8f
PM
645static inline bool within_module_core(unsigned long addr,
646 const struct module *mod)
a06f6211 647{
ac3b4328
SL
648 for_class_mod_mem_type(type, core) {
649 if (within_module_mem_type(addr, mod, type))
650 return true;
651 }
652 return false;
a06f6211
MH
653}
654
76681c8f
PM
655static inline bool within_module_init(unsigned long addr,
656 const struct module *mod)
a06f6211 657{
ac3b4328
SL
658 for_class_mod_mem_type(type, init) {
659 if (within_module_mem_type(addr, mod, type))
660 return true;
661 }
662 return false;
a06f6211
MH
663}
664
76681c8f 665static inline bool within_module(unsigned long addr, const struct module *mod)
9b20a352
PM
666{
667 return within_module_init(addr, mod) || within_module_core(addr, mod);
668}
669
febaa65c 670/* Search for module by name: must be in a RCU critical section. */
c6b37801
TA
671struct module *find_module(const char *name);
672
ca3574bd 673extern void __noreturn __module_put_and_kthread_exit(struct module *mod,
bf262dce 674 long code);
ca3574bd 675#define module_put_and_kthread_exit(code) __module_put_and_kthread_exit(THIS_MODULE, code)
1da177e4
LT
676
677#ifdef CONFIG_MODULE_UNLOAD
d5db139a 678int module_refcount(struct module *mod);
1da177e4 679void __symbol_put(const char *symbol);
996302c5 680#define symbol_put(x) __symbol_put(__stringify(x))
1da177e4
LT
681void symbol_put_addr(void *addr);
682
683/* Sometimes we know we already have a refcount, and it's easier not
684 to handle the error case (which only happens with rmmod --wait). */
d53799be 685extern void __module_get(struct module *module);
e1783a24 686
557aafac
LC
687/**
688 * try_module_get() - take module refcount unless module is being removed
689 * @module: the module we should check for
690 *
691 * Only try to get a module reference count if the module is not being removed.
4515d08a 692 * This call will fail if the module is in the process of being removed.
557aafac
LC
693 *
694 * Care must also be taken to ensure the module exists and is alive prior to
695 * usage of this call. This can be gauranteed through two means:
696 *
697 * 1) Direct protection: you know an earlier caller must have increased the
698 * module reference through __module_get(). This can typically be achieved
699 * by having another entity other than the module itself increment the
700 * module reference count.
701 *
702 * 2) Implied protection: there is an implied protection against module
703 * removal. An example of this is the implied protection used by kernfs /
704 * sysfs. The sysfs store / read file operations are guaranteed to exist
705 * through the use of kernfs's active reference (see kernfs_active()) and a
706 * sysfs / kernfs file removal cannot happen unless the same file is not
707 * active. Therefore, if a sysfs file is being read or written to the module
708 * which created it must still exist. It is therefore safe to use
709 * try_module_get() on module sysfs store / read ops.
710 *
711 * One of the real values to try_module_get() is the module_is_live() check
712 * which ensures that the caller of try_module_get() can yield to userspace
713 * module removal requests and gracefully fail if the module is on its way out.
714 *
715 * Returns true if the reference count was successfully incremented.
716 */
d53799be 717extern bool try_module_get(struct module *module);
1da177e4 718
557aafac
LC
719/**
720 * module_put() - release a reference count to a module
721 * @module: the module we should release a reference count for
722 *
723 * If you successfully bump a reference count to a module with try_module_get(),
724 * when you are finished you must call module_put() to release that reference
725 * count.
726 */
f6a57033 727extern void module_put(struct module *module);
1da177e4
LT
728
729#else /*!CONFIG_MODULE_UNLOAD*/
8ba4fcdf 730static inline bool try_module_get(struct module *module)
1da177e4
LT
731{
732 return !module || module_is_live(module);
733}
734static inline void module_put(struct module *module)
735{
736}
737static inline void __module_get(struct module *module)
738{
739}
e865d06b
SL
740#define symbol_put(x) do { } while (0)
741#define symbol_put_addr(p) do { } while (0)
1da177e4
LT
742
743#endif /* CONFIG_MODULE_UNLOAD */
744
745/* This is a #define so the string doesn't get put in every .o file */
746#define module_name(mod) \
747({ \
748 struct module *__mod = (mod); \
749 __mod ? __mod->name : "kernel"; \
750})
751
b865ea64
SS
752/* Dereference module function descriptor */
753void *dereference_module_function_descriptor(struct module *mod, void *ptr);
754
e865d06b
SL
755int register_module_notifier(struct notifier_block *nb);
756int unregister_module_notifier(struct notifier_block *nb);
1da177e4
LT
757
758extern void print_modules(void);
759
80c6e146
DT
760static inline bool module_requested_async_probing(struct module *module)
761{
762 return module && module->async_probe_requested;
763}
764
1ce15ef4
JY
765static inline bool is_livepatch_module(struct module *mod)
766{
1be9473e 767#ifdef CONFIG_LIVEPATCH
1ce15ef4 768 return mod->klp;
1be9473e 769#else
1ce15ef4 770 return false;
1be9473e 771#endif
1ce15ef4 772}
1ce15ef4 773
8db5da0b 774void set_module_sig_enforced(void);
fda784e5 775
966b7d0e
SR
776void module_for_each_mod(int(*func)(struct module *mod, void *data), void *data);
777
1da177e4 778#else /* !CONFIG_MODULES... */
1da177e4 779
e610499e
RR
780static inline struct module *__module_address(unsigned long addr)
781{
782 return NULL;
783}
784
1da177e4
LT
785static inline struct module *__module_text_address(unsigned long addr)
786{
787 return NULL;
788}
789
e610499e
RR
790static inline bool is_module_address(unsigned long addr)
791{
792 return false;
793}
794
d5e50daf
RD
795static inline bool is_module_percpu_address(unsigned long addr)
796{
797 return false;
798}
799
383776fa
TG
800static inline bool __is_module_percpu_address(unsigned long addr, unsigned long *can_addr)
801{
802 return false;
803}
804
e610499e 805static inline bool is_module_text_address(unsigned long addr)
4d435f9d 806{
e610499e 807 return false;
4d435f9d
IM
808}
809
007ec26c
DH
810static inline bool within_module_core(unsigned long addr,
811 const struct module *mod)
812{
813 return false;
814}
815
dadec066
TV
816static inline bool within_module_init(unsigned long addr,
817 const struct module *mod)
818{
819 return false;
820}
821
822static inline bool within_module(unsigned long addr, const struct module *mod)
823{
824 return false;
825}
826
1da177e4 827/* Get/put a kernel symbol (calls should be symmetric) */
13150bc5 828#define symbol_get(x) ({ extern typeof(x) x __attribute__((weak,visibility("hidden"))); &(x); })
e865d06b
SL
829#define symbol_put(x) do { } while (0)
830#define symbol_put_addr(x) do { } while (0)
1da177e4
LT
831
832static inline void __module_get(struct module *module)
833{
834}
835
8ba4fcdf 836static inline bool try_module_get(struct module *module)
1da177e4 837{
8ba4fcdf 838 return true;
1da177e4
LT
839}
840
841static inline void module_put(struct module *module)
842{
843}
844
845#define module_name(mod) "kernel"
846
e865d06b 847static inline int register_module_notifier(struct notifier_block *nb)
1da177e4
LT
848{
849 /* no events will happen anyway, so this can always succeed */
850 return 0;
851}
852
e865d06b 853static inline int unregister_module_notifier(struct notifier_block *nb)
1da177e4
LT
854{
855 return 0;
856}
857
ca3574bd 858#define module_put_and_kthread_exit(code) kthread_exit(code)
1da177e4
LT
859
860static inline void print_modules(void)
861{
862}
80c6e146
DT
863
864static inline bool module_requested_async_probing(struct module *module)
865{
866 return false;
867}
868
fda784e5 869
8db5da0b
MZ
870static inline void set_module_sig_enforced(void)
871{
872}
873
b865ea64
SS
874/* Dereference module function descriptor */
875static inline
876void *dereference_module_function_descriptor(struct module *mod, void *ptr)
877{
878 return ptr;
879}
880
7582b7be
MRI
881static inline bool module_is_coming(struct module *mod)
882{
883 return false;
884}
0c133b1e 885
966b7d0e
SR
886static inline void module_for_each_mod(int(*func)(struct module *mod, void *data), void *data)
887{
888}
ef665c1a
RD
889#endif /* CONFIG_MODULES */
890
ef665c1a 891#ifdef CONFIG_SYSFS
7405c1e1 892extern struct kset *module_kset;
042edf1e 893extern const struct kobj_type module_ktype;
ef665c1a
RD
894#endif /* CONFIG_SYSFS */
895
1da177e4
LT
896#define symbol_request(x) try_then_request_module(symbol_get(x), "symbol:" #x)
897
898/* BELOW HERE ALL THESE ARE OBSOLETE AND WILL VANISH */
899
1da177e4
LT
900#define __MODULE_STRING(x) __stringify(x)
901
0d9c25dd 902#ifdef CONFIG_GENERIC_BUG
5336377d 903void module_bug_finalize(const Elf_Ehdr *, const Elf_Shdr *,
0d9c25dd
AM
904 struct module *);
905void module_bug_cleanup(struct module *);
906
907#else /* !CONFIG_GENERIC_BUG */
908
5336377d 909static inline void module_bug_finalize(const Elf_Ehdr *hdr,
0d9c25dd
AM
910 const Elf_Shdr *sechdrs,
911 struct module *mod)
912{
0d9c25dd
AM
913}
914static inline void module_bug_cleanup(struct module *mod) {}
915#endif /* CONFIG_GENERIC_BUG */
916
aefb2f2e 917#ifdef CONFIG_MITIGATION_RETPOLINE
caf7501a
AK
918extern bool retpoline_module_ok(bool has_retpoline);
919#else
920static inline bool retpoline_module_ok(bool has_retpoline)
921{
922 return true;
923}
924#endif
925
59afdc7b 926#ifdef CONFIG_MODULE_SIG
0c1e4280
AT
927bool is_module_sig_enforced(void);
928
59afdc7b
HX
929static inline bool module_sig_ok(struct module *module)
930{
931 return module->sig_ok;
932}
933#else /* !CONFIG_MODULE_SIG */
0c1e4280
AT
934static inline bool is_module_sig_enforced(void)
935{
936 return false;
937}
938
59afdc7b
HX
939static inline bool module_sig_ok(struct module *module)
940{
941 return true;
942}
943#endif /* CONFIG_MODULE_SIG */
944
73feb8d5 945#if defined(CONFIG_MODULES) && defined(CONFIG_KALLSYMS)
07cc2c93 946int module_kallsyms_on_each_symbol(const char *modname,
3703bd54 947 int (*fn)(void *, const char *, unsigned long),
3e355205 948 void *data);
34bf9347
VM
949
950/* For kallsyms to ask for address resolution. namebuf should be at
951 * least KSYM_NAME_LEN long: a pointer to namebuf is returned if
952 * found, otherwise NULL.
953 */
7e1f4eb9
AB
954int module_address_lookup(unsigned long addr,
955 unsigned long *symbolsize,
956 unsigned long *offset,
957 char **modname, const unsigned char **modbuildid,
958 char *namebuf);
34bf9347
VM
959int lookup_module_symbol_name(unsigned long addr, char *symname);
960int lookup_module_symbol_attrs(unsigned long addr,
961 unsigned long *size,
962 unsigned long *offset,
963 char *modname,
964 char *name);
965
966/* Returns 0 and fills in value, defined and namebuf, or -ERANGE if
967 * symnum out of range.
968 */
969int module_get_kallsym(unsigned int symnum, unsigned long *value, char *type,
970 char *name, char *module_name, int *exported);
971
972/* Look for this name: can be of form module:name. */
973unsigned long module_kallsyms_lookup_name(const char *name);
974
975unsigned long find_kallsyms_symbol_value(struct module *mod, const char *name);
976
977#else /* CONFIG_MODULES && CONFIG_KALLSYMS */
978
07cc2c93 979static inline int module_kallsyms_on_each_symbol(const char *modname,
3703bd54 980 int (*fn)(void *, const char *, unsigned long),
73feb8d5
JO
981 void *data)
982{
983 return -EOPNOTSUPP;
984}
34bf9347
VM
985
986/* For kallsyms to ask for address resolution. NULL means not found. */
7e1f4eb9 987static inline int module_address_lookup(unsigned long addr,
34bf9347
VM
988 unsigned long *symbolsize,
989 unsigned long *offset,
990 char **modname,
991 const unsigned char **modbuildid,
992 char *namebuf)
993{
7e1f4eb9 994 return 0;
34bf9347
VM
995}
996
997static inline int lookup_module_symbol_name(unsigned long addr, char *symname)
998{
999 return -ERANGE;
1000}
1001
34bf9347
VM
1002static inline int module_get_kallsym(unsigned int symnum, unsigned long *value,
1003 char *type, char *name,
1004 char *module_name, int *exported)
1005{
1006 return -ERANGE;
1007}
1008
1009static inline unsigned long module_kallsyms_lookup_name(const char *name)
1010{
1011 return 0;
1012}
1013
1014static inline unsigned long find_kallsyms_symbol_value(struct module *mod,
1015 const char *name)
1016{
1017 return 0;
1018}
1019
73feb8d5 1020#endif /* CONFIG_MODULES && CONFIG_KALLSYMS */
3e355205 1021
1da177e4 1022#endif /* _LINUX_MODULE_H */