Print this page
5255 uts shouldn't open-code ISP2
Split |
Close |
Expand all |
Collapse all |
--- old/usr/src/uts/common/krtld/kobj.c
+++ new/usr/src/uts/common/krtld/kobj.c
1 1 /*
2 2 * CDDL HEADER START
3 3 *
4 4 * The contents of this file are subject to the terms of the
5 5 * Common Development and Distribution License (the "License").
6 6 * You may not use this file except in compliance with the License.
7 7 *
8 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 9 * or http://www.opensolaris.org/os/licensing.
10 10 * See the License for the specific language governing permissions
11 11 * and limitations under the License.
12 12 *
13 13 * When distributing Covered Code, include this CDDL HEADER in each
14 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 15 * If applicable, add the following below this CDDL HEADER, with the
16 16 * fields enclosed by brackets "[]" replaced with your own identifying
17 17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 18 *
19 19 * CDDL HEADER END
20 20 */
21 21 /*
22 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
23 23 * Use is subject to license terms.
24 24 */
25 25 /*
26 26 * Copyright 2011 Bayard G. Bell <buffer.g.overflow@gmail.com>.
27 27 * All rights reserved. Use is subject to license terms.
28 28 */
29 29
30 30 /*
31 31 * Kernel's linker/loader
32 32 */
33 33
34 34 #include <sys/types.h>
35 35 #include <sys/param.h>
36 36 #include <sys/sysmacros.h>
37 37 #include <sys/systm.h>
38 38 #include <sys/user.h>
39 39 #include <sys/kmem.h>
40 40 #include <sys/reboot.h>
41 41 #include <sys/bootconf.h>
42 42 #include <sys/debug.h>
43 43 #include <sys/uio.h>
44 44 #include <sys/file.h>
45 45 #include <sys/vnode.h>
46 46 #include <sys/user.h>
47 47 #include <sys/mman.h>
48 48 #include <vm/as.h>
49 49 #include <vm/seg_kp.h>
50 50 #include <vm/seg_kmem.h>
51 51 #include <sys/elf.h>
52 52 #include <sys/elf_notes.h>
53 53 #include <sys/vmsystm.h>
54 54 #include <sys/kdi.h>
55 55 #include <sys/atomic.h>
56 56 #include <sys/kmdb.h>
57 57
58 58 #include <sys/link.h>
59 59 #include <sys/kobj.h>
60 60 #include <sys/ksyms.h>
61 61 #include <sys/disp.h>
62 62 #include <sys/modctl.h>
63 63 #include <sys/varargs.h>
64 64 #include <sys/kstat.h>
65 65 #include <sys/kobj_impl.h>
66 66 #include <sys/fs/decomp.h>
67 67 #include <sys/callb.h>
68 68 #include <sys/cmn_err.h>
69 69 #include <sys/tnf_probe.h>
70 70 #include <sys/zmod.h>
71 71
72 72 #include <krtld/reloc.h>
73 73 #include <krtld/kobj_kdi.h>
74 74 #include <sys/sha1.h>
75 75 #include <sys/crypto/elfsign.h>
76 76
77 77 #if !defined(_OBP)
78 78 #include <sys/bootvfs.h>
79 79 #endif
80 80
81 81 /*
82 82 * do_symbols() error codes
83 83 */
84 84 #define DOSYM_UNDEF -1 /* undefined symbol */
85 85 #define DOSYM_UNSAFE -2 /* MT-unsafe driver symbol */
86 86
87 87 #if !defined(_OBP)
88 88 static void synthetic_bootaux(char *, val_t *);
89 89 #endif
90 90
91 91 static struct module *load_exec(val_t *, char *);
92 92 static void load_linker(val_t *);
93 93 static struct modctl *add_primary(const char *filename, int);
94 94 static int bind_primary(val_t *, int);
95 95 static int load_primary(struct module *, int);
96 96 static int load_kmdb(val_t *);
97 97 static int get_progbits(struct module *, struct _buf *);
98 98 static int get_syms(struct module *, struct _buf *);
99 99 static int get_ctf(struct module *, struct _buf *);
100 100 static void get_signature(struct module *, struct _buf *);
101 101 static int do_common(struct module *);
102 102 static void add_dependent(struct module *, struct module *);
103 103 static int do_dependents(struct modctl *, char *, size_t);
104 104 static int do_symbols(struct module *, Elf64_Addr);
105 105 static void module_assign(struct modctl *, struct module *);
106 106 static void free_module_data(struct module *);
107 107 static char *depends_on(struct module *);
108 108 static char *getmodpath(const char *);
109 109 static char *basename(char *);
110 110 static void attr_val(val_t *);
111 111 static char *find_libmacro(char *);
112 112 static char *expand_libmacro(char *, char *, char *);
113 113 static int read_bootflags(void);
114 114 static int kobj_comp_setup(struct _buf *, struct compinfo *);
115 115 static int kobj_uncomp_blk(struct _buf *, caddr_t, uint_t);
116 116 static int kobj_read_blks(struct _buf *, caddr_t, uint_t, uint_t);
117 117 static int kobj_boot_open(char *, int);
118 118 static int kobj_boot_close(int);
119 119 static int kobj_boot_seek(int, off_t, off_t);
120 120 static int kobj_boot_read(int, caddr_t, size_t);
121 121 static int kobj_boot_fstat(int, struct bootstat *);
122 122 static int kobj_boot_compinfo(int, struct compinfo *);
123 123
124 124 static Sym *lookup_one(struct module *, const char *);
125 125 static void sym_insert(struct module *, char *, symid_t);
126 126 static Sym *sym_lookup(struct module *, Sym *);
127 127
128 128 static struct kobjopen_tctl *kobjopen_alloc(char *filename);
129 129 static void kobjopen_free(struct kobjopen_tctl *ltp);
130 130 static void kobjopen_thread(struct kobjopen_tctl *ltp);
131 131 static int kobj_is_compressed(intptr_t);
132 132
133 133 extern int kcopy(const void *, void *, size_t);
134 134 extern int elf_mach_ok(Ehdr *);
135 135 extern int alloc_gottable(struct module *, caddr_t *, caddr_t *);
136 136
137 137 #if !defined(_OBP)
138 138 extern int kobj_boot_mountroot(void);
139 139 #endif
140 140
141 141 static void tnf_unsplice_probes(uint_t, struct modctl *);
142 142 extern tnf_probe_control_t *__tnf_probe_list_head;
143 143 extern tnf_tag_data_t *__tnf_tag_list_head;
144 144
145 145 extern int modrootloaded;
146 146 extern int swaploaded;
147 147 extern int bop_io_quiesced;
148 148 extern int last_module_id;
149 149
150 150 extern char stubs_base[];
151 151 extern char stubs_end[];
152 152
153 153 #ifdef KOBJ_DEBUG
154 154 /*
155 155 * Values that can be or'd in to kobj_debug and their effects:
156 156 *
157 157 * D_DEBUG - misc. debugging information.
158 158 * D_SYMBOLS - list symbols and their values as they are entered
159 159 * into the hash table
160 160 * D_RELOCATIONS - display relocation processing information
161 161 * D_LOADING - display information about each module as it
162 162 * is loaded.
163 163 */
164 164 int kobj_debug = 0;
165 165
166 166 #define KOBJ_MARK(s) if (kobj_debug & D_DEBUG) \
167 167 (_kobj_printf(ops, "%d", __LINE__), _kobj_printf(ops, ": %s\n", s))
168 168 #else
169 169 #define KOBJ_MARK(s) /* discard */
170 170 #endif
171 171
172 172 #define MODPATH_PROPNAME "module-path"
173 173
174 174 #ifdef MODDIR_SUFFIX
175 175 static char slash_moddir_suffix_slash[] = MODDIR_SUFFIX "/";
176 176 #else
177 177 #define slash_moddir_suffix_slash ""
178 178 #endif
179 179
180 180 #define _moddebug get_weakish_int(&moddebug)
181 181 #define _modrootloaded get_weakish_int(&modrootloaded)
182 182 #define _swaploaded get_weakish_int(&swaploaded)
183 183 #define _ioquiesced get_weakish_int(&bop_io_quiesced)
184 184
185 185 #define mod(X) (struct module *)((X)->modl_modp->mod_mp)
186 186
187 187 void *romp; /* rom vector (opaque to us) */
188 188 struct bootops *ops; /* bootops vector */
189 189 void *dbvec; /* debug vector */
190 190
191 191 /*
192 192 * kobjopen thread control structure
193 193 */
194 194 struct kobjopen_tctl {
195 195 ksema_t sema;
196 196 char *name; /* name of file */
197 197 struct vnode *vp; /* vnode return from vn_open() */
198 198 int Errno; /* error return from vnopen */
199 199 };
200 200
201 201 /*
202 202 * Structure for defining dynamically expandable library macros
203 203 */
204 204
205 205 struct lib_macro_info {
206 206 char *lmi_list; /* ptr to list of possible choices */
207 207 char *lmi_macroname; /* pointer to macro name */
208 208 ushort_t lmi_ba_index; /* index into bootaux vector */
209 209 ushort_t lmi_macrolen; /* macro length */
210 210 } libmacros[] = {
211 211 { NULL, "CPU", BA_CPU, 0 },
212 212 { NULL, "MMU", BA_MMU, 0 }
213 213 };
214 214
215 215 #define NLIBMACROS sizeof (libmacros) / sizeof (struct lib_macro_info)
216 216
217 217 char *boot_cpu_compatible_list; /* make $CPU available */
218 218
219 219 char *kobj_module_path; /* module search path */
220 220 vmem_t *text_arena; /* module text arena */
221 221 static vmem_t *data_arena; /* module data & bss arena */
222 222 static vmem_t *ctf_arena; /* CTF debug data arena */
223 223 static struct modctl *kobj_modules = NULL; /* modules loaded */
224 224 int kobj_mmu_pagesize; /* system pagesize */
225 225 static int lg_pagesize; /* "large" pagesize */
226 226 static int kobj_last_module_id = 0; /* id assignment */
227 227 static kmutex_t kobj_lock; /* protects mach memory list */
228 228
229 229 /*
230 230 * The following functions have been implemented by the kernel.
231 231 * However, many 3rd party drivers provide their own implementations
232 232 * of these functions. When such drivers are loaded, messages
233 233 * indicating that these symbols have been multiply defined will be
234 234 * emitted to the console. To avoid alarming customers for no good
235 235 * reason, we simply suppress such warnings for the following set of
236 236 * functions.
237 237 */
238 238 static char *suppress_sym_list[] =
239 239 {
240 240 "strstr",
241 241 "strncat",
242 242 "strlcat",
243 243 "strlcpy",
244 244 "strspn",
245 245 "memcpy",
246 246 "memset",
247 247 "memmove",
248 248 "memcmp",
249 249 "memchr",
250 250 "__udivdi3",
251 251 "__divdi3",
252 252 "__umoddi3",
253 253 "__moddi3",
254 254 NULL /* This entry must exist */
255 255 };
256 256
257 257 /* indexed by KOBJ_NOTIFY_* */
258 258 static kobj_notify_list_t *kobj_notifiers[KOBJ_NOTIFY_MAX + 1];
259 259
260 260 /*
261 261 * TNF probe management globals
262 262 */
263 263 tnf_probe_control_t *__tnf_probe_list_head = NULL;
264 264 tnf_tag_data_t *__tnf_tag_list_head = NULL;
265 265 int tnf_changed_probe_list = 0;
266 266
267 267 /*
268 268 * Prefix for statically defined tracing (SDT) DTrace probes.
269 269 */
270 270 const char *sdt_prefix = "__dtrace_probe_";
271 271
272 272 /*
273 273 * Beginning and end of the kernel's dynamic text/data segments.
274 274 */
275 275 static caddr_t _text;
276 276 static caddr_t _etext;
277 277 static caddr_t _data;
278 278
279 279 /*
280 280 * The sparc linker doesn't create a memory location
281 281 * for a variable named _edata, so _edata can only be
282 282 * referred to, not modified. krtld needs a static
283 283 * variable to modify it - within krtld, of course -
284 284 * outside of krtld, e_data is used in all kernels.
285 285 */
286 286 #if defined(__sparc)
287 287 static caddr_t _edata;
288 288 #else
289 289 extern caddr_t _edata;
290 290 #endif
291 291
292 292 Addr dynseg = 0; /* load address of "dynamic" segment */
293 293 size_t dynsize; /* "dynamic" segment size */
294 294
295 295
296 296 int standalone = 1; /* an unwholey kernel? */
297 297 int use_iflush; /* iflush after relocations */
298 298
299 299 /*
300 300 * _kobj_printf()
301 301 *
302 302 * Common printf function pointer. Can handle only one conversion
303 303 * specification in the format string. Some of the functions invoked
304 304 * through this function pointer cannot handle more that one conversion
305 305 * specification in the format string.
306 306 */
307 307 void (*_kobj_printf)(void *, const char *, ...); /* printf routine */
308 308
309 309 /*
310 310 * Standalone function pointers for use within krtld.
311 311 * Many platforms implement optimized platmod versions of
312 312 * utilities such as bcopy and any such are not yet available
313 313 * until the kernel is more completely stitched together.
314 314 * See kobj_impl.h
315 315 */
316 316 void (*kobj_bcopy)(const void *, void *, size_t);
317 317 void (*kobj_bzero)(void *, size_t);
318 318 size_t (*kobj_strlcat)(char *, const char *, size_t);
319 319
320 320 static kobj_stat_t kobj_stat;
321 321
322 322 #define MINALIGN 8 /* at least a double-word */
323 323
324 324 int
325 325 get_weakish_int(int *ip)
326 326 {
327 327 if (standalone)
328 328 return (0);
329 329 return (ip == NULL ? 0 : *ip);
330 330 }
331 331
332 332 static void *
333 333 get_weakish_pointer(void **ptrp)
334 334 {
335 335 if (standalone)
336 336 return (0);
337 337 return (ptrp == NULL ? 0 : *ptrp);
338 338 }
339 339
340 340 /*
341 341 * XXX fix dependencies on "kernel"; this should work
342 342 * for other standalone binaries as well.
343 343 *
344 344 * XXX Fix hashing code to use one pointer to
345 345 * hash entries.
346 346 * |----------|
347 347 * | nbuckets |
348 348 * |----------|
349 349 * | nchains |
350 350 * |----------|
351 351 * | bucket[] |
352 352 * |----------|
353 353 * | chain[] |
354 354 * |----------|
355 355 */
356 356
357 357 /*
358 358 * Load, bind and relocate all modules that
359 359 * form the primary kernel. At this point, our
360 360 * externals have not been relocated.
361 361 */
362 362 void
363 363 kobj_init(
364 364 void *romvec,
365 365 void *dvec,
366 366 struct bootops *bootvec,
367 367 val_t *bootaux)
368 368 {
369 369 struct module *mp;
370 370 struct modctl *modp;
371 371 Addr entry;
372 372 char filename[MAXPATHLEN];
373 373
374 374 /*
375 375 * Save these to pass on to
376 376 * the booted standalone.
377 377 */
378 378 romp = romvec;
379 379 dbvec = dvec;
380 380
381 381 ops = bootvec;
382 382 kobj_setup_standalone_vectors();
383 383
384 384 KOBJ_MARK("Entered kobj_init()");
385 385
386 386 (void) BOP_GETPROP(ops, "whoami", filename);
387 387
388 388 /*
389 389 * We don't support standalone debuggers anymore. The use of kadb
390 390 * will interfere with the later use of kmdb. Let the user mend
391 391 * their ways now. Users will reach this message if they still
392 392 * have the kadb binary on their system (perhaps they used an old
393 393 * bfu, or maybe they intentionally copied it there) and have
394 394 * specified its use in a way that eluded our checking in the boot
395 395 * program.
396 396 */
397 397 if (dvec != NULL) {
398 398 _kobj_printf(ops, "\nWARNING: Standalone debuggers such as "
399 399 "kadb are no longer supported\n\n");
400 400 goto fail;
401 401 }
402 402
403 403 #if defined(_OBP)
404 404 /*
405 405 * OBP allows us to read both the ramdisk and
406 406 * the underlying root fs when root is a disk.
407 407 * This can lower incidences of unbootable systems
408 408 * when the archive is out-of-date with the /etc
409 409 * state files.
410 410 */
411 411 if (BOP_MOUNTROOT() != BOOT_SVC_OK) {
412 412 _kobj_printf(ops, "can't mount boot fs\n");
413 413 goto fail;
414 414 }
415 415 #else
416 416 {
417 417 /* on x86, we always boot with a ramdisk */
418 418 (void) kobj_boot_mountroot();
419 419
420 420 /*
421 421 * Now that the ramdisk is mounted, finish boot property
422 422 * initialization.
423 423 */
424 424 boot_prop_finish();
425 425 }
426 426
427 427 #if !defined(_UNIX_KRTLD)
428 428 /*
429 429 * 'unix' is linked together with 'krtld' into one executable and
430 430 * the early boot code does -not- hand us any of the dynamic metadata
431 431 * about the executable. In particular, it does not read in, map or
432 432 * otherwise look at the program headers. We fake all that up now.
433 433 *
434 434 * We do this early as DTrace static probes and tnf probes both call
435 435 * undefined references. We have to process those relocations before
436 436 * calling any of them.
437 437 *
438 438 * OBP tells kobj_start() where the ELF image is in memory, so it
439 439 * synthesized bootaux before kobj_init() was called
440 440 */
441 441 if (bootaux[BA_PHDR].ba_ptr == NULL)
442 442 synthetic_bootaux(filename, bootaux);
443 443
444 444 #endif /* !_UNIX_KRTLD */
445 445 #endif /* _OBP */
446 446
447 447 /*
448 448 * Save the interesting attribute-values
449 449 * (scanned by kobj_boot).
450 450 */
451 451 attr_val(bootaux);
452 452
453 453 /*
454 454 * Set the module search path.
455 455 */
456 456 kobj_module_path = getmodpath(filename);
457 457
458 458 boot_cpu_compatible_list = find_libmacro("CPU");
459 459
460 460 /*
461 461 * These two modules have actually been
462 462 * loaded by boot, but we finish the job
463 463 * by introducing them into the world of
464 464 * loadable modules.
465 465 */
466 466
467 467 mp = load_exec(bootaux, filename);
468 468 load_linker(bootaux);
469 469
470 470 /*
471 471 * Load all the primary dependent modules.
472 472 */
473 473 if (load_primary(mp, KOBJ_LM_PRIMARY) == -1)
474 474 goto fail;
475 475
476 476 /*
477 477 * Glue it together.
478 478 */
479 479 if (bind_primary(bootaux, KOBJ_LM_PRIMARY) == -1)
480 480 goto fail;
481 481
482 482 entry = bootaux[BA_ENTRY].ba_val;
483 483
484 484 /*
485 485 * Get the boot flags
486 486 */
487 487 bootflags(ops);
488 488
489 489 if (boothowto & RB_VERBOSE)
490 490 kobj_lm_dump(KOBJ_LM_PRIMARY);
491 491
492 492 kobj_kdi_init();
493 493
494 494 if (boothowto & RB_KMDB) {
495 495 if (load_kmdb(bootaux) < 0)
496 496 goto fail;
497 497 }
498 498
499 499 /*
500 500 * Post setup.
501 501 */
502 502 s_text = _text;
503 503 e_text = _etext;
504 504 s_data = _data;
505 505 e_data = _edata;
506 506
507 507 kobj_sync_instruction_memory(s_text, e_text - s_text);
508 508
509 509 #ifdef KOBJ_DEBUG
510 510 if (kobj_debug & D_DEBUG)
511 511 _kobj_printf(ops,
512 512 "krtld: transferring control to: 0x%p\n", entry);
513 513 #endif
514 514
515 515 /*
516 516 * Make sure the mod system knows about the modules already loaded.
517 517 */
518 518 last_module_id = kobj_last_module_id;
519 519 bcopy(kobj_modules, &modules, sizeof (modules));
520 520 modp = &modules;
521 521 do {
522 522 if (modp->mod_next == kobj_modules)
523 523 modp->mod_next = &modules;
524 524 if (modp->mod_prev == kobj_modules)
525 525 modp->mod_prev = &modules;
526 526 } while ((modp = modp->mod_next) != &modules);
527 527
528 528 standalone = 0;
529 529
530 530 #ifdef KOBJ_DEBUG
531 531 if (kobj_debug & D_DEBUG)
532 532 _kobj_printf(ops,
533 533 "krtld: really transferring control to: 0x%p\n", entry);
534 534 #endif
535 535
536 536 /* restore printf/bcopy/bzero vectors before returning */
537 537 kobj_restore_vectors();
538 538
539 539 #if defined(_DBOOT)
540 540 /*
541 541 * krtld was called from a dboot ELF section, the embedded
542 542 * dboot code contains the real entry via bootaux
543 543 */
544 544 exitto((caddr_t)entry);
545 545 #else
546 546 /*
547 547 * krtld was directly called from startup
548 548 */
549 549 return;
550 550 #endif
551 551
552 552 fail:
553 553
554 554 _kobj_printf(ops, "krtld: error during initial load/link phase\n");
555 555
556 556 #if !defined(_UNIX_KRTLD)
557 557 _kobj_printf(ops, "\n");
558 558 _kobj_printf(ops, "krtld could neither locate nor resolve symbols"
559 559 " for:\n");
560 560 _kobj_printf(ops, " %s\n", filename);
561 561 _kobj_printf(ops, "in the boot archive. Please verify that this"
562 562 " file\n");
563 563 _kobj_printf(ops, "matches what is found in the boot archive.\n");
564 564 _kobj_printf(ops, "You may need to boot using the Solaris failsafe to"
565 565 " fix this.\n");
566 566 bop_panic("Unable to boot");
567 567 #endif
568 568 }
569 569
570 570 #if !defined(_UNIX_KRTLD) && !defined(_OBP)
571 571 /*
572 572 * Synthesize additional metadata that describes the executable if
573 573 * krtld's caller didn't do it.
574 574 *
575 575 * (When the dynamic executable has an interpreter, the boot program
576 576 * does all this for us. Where we don't have an interpreter, (or a
577 577 * even a boot program, perhaps) we have to do this for ourselves.)
578 578 */
579 579 static void
580 580 synthetic_bootaux(char *filename, val_t *bootaux)
581 581 {
582 582 Ehdr ehdr;
583 583 caddr_t phdrbase;
584 584 struct _buf *file;
585 585 int i, n;
586 586
587 587 /*
588 588 * Elf header
589 589 */
590 590 KOBJ_MARK("synthetic_bootaux()");
591 591 KOBJ_MARK(filename);
592 592 file = kobj_open_file(filename);
593 593 if (file == (struct _buf *)-1) {
594 594 _kobj_printf(ops, "krtld: failed to open '%s'\n", filename);
595 595 return;
596 596 }
597 597 KOBJ_MARK("reading program headers");
598 598 if (kobj_read_file(file, (char *)&ehdr, sizeof (ehdr), 0) < 0) {
599 599 _kobj_printf(ops, "krtld: %s: failed to read ehder\n",
600 600 filename);
601 601 return;
602 602 }
603 603
604 604 /*
605 605 * Program headers
606 606 */
607 607 bootaux[BA_PHNUM].ba_val = ehdr.e_phnum;
608 608 bootaux[BA_PHENT].ba_val = ehdr.e_phentsize;
609 609 n = ehdr.e_phentsize * ehdr.e_phnum;
610 610
611 611 phdrbase = kobj_alloc(n, KM_WAIT | KM_TMP);
612 612
613 613 if (kobj_read_file(file, phdrbase, n, ehdr.e_phoff) < 0) {
614 614 _kobj_printf(ops, "krtld: %s: failed to read phdrs\n",
615 615 filename);
616 616 return;
617 617 }
618 618 bootaux[BA_PHDR].ba_ptr = phdrbase;
619 619 kobj_close_file(file);
620 620 KOBJ_MARK("closed file");
621 621
622 622 /*
623 623 * Find the dynamic section address
624 624 */
625 625 for (i = 0; i < ehdr.e_phnum; i++) {
626 626 Phdr *phdr = (Phdr *)(phdrbase + ehdr.e_phentsize * i);
627 627
628 628 if (phdr->p_type == PT_DYNAMIC) {
629 629 bootaux[BA_DYNAMIC].ba_ptr = (void *)phdr->p_vaddr;
630 630 break;
631 631 }
632 632 }
633 633 KOBJ_MARK("synthetic_bootaux() done");
634 634 }
635 635 #endif /* !_UNIX_KRTLD && !_OBP */
636 636
637 637 /*
638 638 * Set up any global information derived
639 639 * from attribute/values in the boot or
640 640 * aux vector.
641 641 */
642 642 static void
643 643 attr_val(val_t *bootaux)
644 644 {
645 645 Phdr *phdr;
646 646 int phnum, phsize;
647 647 int i;
648 648
649 649 KOBJ_MARK("attr_val()");
650 650 kobj_mmu_pagesize = bootaux[BA_PAGESZ].ba_val;
651 651 lg_pagesize = bootaux[BA_LPAGESZ].ba_val;
652 652 use_iflush = bootaux[BA_IFLUSH].ba_val;
653 653
654 654 phdr = (Phdr *)bootaux[BA_PHDR].ba_ptr;
655 655 phnum = bootaux[BA_PHNUM].ba_val;
656 656 phsize = bootaux[BA_PHENT].ba_val;
657 657 for (i = 0; i < phnum; i++) {
658 658 phdr = (Phdr *)(bootaux[BA_PHDR].ba_val + i * phsize);
659 659
660 660 if (phdr->p_type != PT_LOAD) {
661 661 continue;
662 662 }
663 663 /*
664 664 * Bounds of the various segments.
665 665 */
666 666 if (!(phdr->p_flags & PF_X)) {
667 667 #if defined(_RELSEG)
668 668 /*
669 669 * sparc kernel puts the dynamic info
670 670 * into a separate segment, which is
671 671 * free'd in bop_fini()
672 672 */
673 673 ASSERT(phdr->p_vaddr != 0);
674 674 dynseg = phdr->p_vaddr;
675 675 dynsize = phdr->p_memsz;
676 676 #else
677 677 ASSERT(phdr->p_vaddr == 0);
678 678 #endif
679 679 } else {
680 680 if (phdr->p_flags & PF_W) {
681 681 _data = (caddr_t)phdr->p_vaddr;
682 682 _edata = _data + phdr->p_memsz;
683 683 } else {
684 684 _text = (caddr_t)phdr->p_vaddr;
685 685 _etext = _text + phdr->p_memsz;
686 686 }
687 687 }
688 688 }
689 689
690 690 /* To do the kobj_alloc, _edata needs to be set. */
691 691 for (i = 0; i < NLIBMACROS; i++) {
692 692 if (bootaux[libmacros[i].lmi_ba_index].ba_ptr != NULL) {
693 693 libmacros[i].lmi_list = kobj_alloc(
694 694 strlen(bootaux[libmacros[i].lmi_ba_index].ba_ptr) +
695 695 1, KM_WAIT);
696 696 (void) strcpy(libmacros[i].lmi_list,
697 697 bootaux[libmacros[i].lmi_ba_index].ba_ptr);
698 698 }
699 699 libmacros[i].lmi_macrolen = strlen(libmacros[i].lmi_macroname);
700 700 }
701 701 }
702 702
703 703 /*
704 704 * Set up the booted executable.
705 705 */
706 706 static struct module *
707 707 load_exec(val_t *bootaux, char *filename)
708 708 {
709 709 struct modctl *cp;
710 710 struct module *mp;
711 711 Dyn *dyn;
712 712 Sym *sp;
713 713 int i, lsize, osize, nsize, allocsize;
714 714 char *libname, *tmp;
715 715 char path[MAXPATHLEN];
716 716
717 717 #ifdef KOBJ_DEBUG
718 718 if (kobj_debug & D_DEBUG)
719 719 _kobj_printf(ops, "module path '%s'\n", kobj_module_path);
720 720 #endif
721 721
722 722 KOBJ_MARK("add_primary");
723 723 cp = add_primary(filename, KOBJ_LM_PRIMARY);
724 724
725 725 KOBJ_MARK("struct module");
726 726 mp = kobj_zalloc(sizeof (struct module), KM_WAIT);
727 727 cp->mod_mp = mp;
728 728
729 729 /*
730 730 * We don't have the following information
731 731 * since this module is an executable and not
732 732 * a relocatable .o.
733 733 */
734 734 mp->symtbl_section = 0;
735 735 mp->shdrs = NULL;
736 736 mp->strhdr = NULL;
737 737
738 738 /*
739 739 * Since this module is the only exception,
740 740 * we cons up some section headers.
741 741 */
742 742 KOBJ_MARK("symhdr");
743 743 mp->symhdr = kobj_zalloc(sizeof (Shdr), KM_WAIT);
744 744
745 745 KOBJ_MARK("strhdr");
746 746 mp->strhdr = kobj_zalloc(sizeof (Shdr), KM_WAIT);
747 747
748 748 mp->symhdr->sh_type = SHT_SYMTAB;
749 749 mp->strhdr->sh_type = SHT_STRTAB;
750 750 /*
751 751 * Scan the dynamic structure.
752 752 */
753 753 for (dyn = (Dyn *) bootaux[BA_DYNAMIC].ba_ptr;
754 754 dyn->d_tag != DT_NULL; dyn++) {
755 755 switch (dyn->d_tag) {
756 756 case DT_SYMTAB:
757 757 mp->symspace = mp->symtbl = (char *)dyn->d_un.d_ptr;
758 758 mp->symhdr->sh_addr = dyn->d_un.d_ptr;
759 759 break;
760 760 case DT_HASH:
761 761 mp->nsyms = *((uint_t *)dyn->d_un.d_ptr + 1);
762 762 mp->hashsize = *(uint_t *)dyn->d_un.d_ptr;
763 763 break;
764 764 case DT_STRTAB:
765 765 mp->strings = (char *)dyn->d_un.d_ptr;
766 766 mp->strhdr->sh_addr = dyn->d_un.d_ptr;
767 767 break;
768 768 case DT_STRSZ:
769 769 mp->strhdr->sh_size = dyn->d_un.d_val;
770 770 break;
771 771 case DT_SYMENT:
772 772 mp->symhdr->sh_entsize = dyn->d_un.d_val;
773 773 break;
774 774 }
775 775 }
776 776
777 777 /*
778 778 * Collapse any DT_NEEDED entries into one string.
779 779 */
780 780 nsize = osize = 0;
781 781 allocsize = MAXPATHLEN;
782 782
783 783 KOBJ_MARK("depends_on");
784 784 mp->depends_on = kobj_alloc(allocsize, KM_WAIT);
785 785
786 786 for (dyn = (Dyn *) bootaux[BA_DYNAMIC].ba_ptr;
787 787 dyn->d_tag != DT_NULL; dyn++)
788 788 if (dyn->d_tag == DT_NEEDED) {
789 789 char *_lib;
790 790
791 791 libname = mp->strings + dyn->d_un.d_val;
792 792 if (strchr(libname, '$') != NULL) {
793 793 if ((_lib = expand_libmacro(libname,
794 794 path, path)) != NULL)
795 795 libname = _lib;
796 796 else
797 797 _kobj_printf(ops, "krtld: "
798 798 "load_exec: fail to "
799 799 "expand %s\n", libname);
800 800 }
801 801 lsize = strlen(libname);
802 802 nsize += lsize;
803 803 if (nsize + 1 > allocsize) {
804 804 KOBJ_MARK("grow depends_on");
805 805 tmp = kobj_alloc(allocsize + MAXPATHLEN,
806 806 KM_WAIT);
807 807 bcopy(mp->depends_on, tmp, osize);
808 808 kobj_free(mp->depends_on, allocsize);
809 809 mp->depends_on = tmp;
810 810 allocsize += MAXPATHLEN;
811 811 }
812 812 bcopy(libname, mp->depends_on + osize, lsize);
813 813 *(mp->depends_on + nsize) = ' '; /* separate */
814 814 nsize++;
815 815 osize = nsize;
816 816 }
817 817 if (nsize) {
818 818 mp->depends_on[nsize - 1] = '\0'; /* terminate the string */
819 819 /*
820 820 * alloc with exact size and copy whatever it got over
821 821 */
822 822 KOBJ_MARK("realloc depends_on");
823 823 tmp = kobj_alloc(nsize, KM_WAIT);
824 824 bcopy(mp->depends_on, tmp, nsize);
825 825 kobj_free(mp->depends_on, allocsize);
826 826 mp->depends_on = tmp;
827 827 } else {
828 828 kobj_free(mp->depends_on, allocsize);
829 829 mp->depends_on = NULL;
830 830 }
831 831
832 832 mp->flags = KOBJ_EXEC|KOBJ_PRIM; /* NOT a relocatable .o */
833 833 mp->symhdr->sh_size = mp->nsyms * mp->symhdr->sh_entsize;
834 834 /*
835 835 * We allocate our own table since we don't
836 836 * hash undefined references.
837 837 */
838 838 KOBJ_MARK("chains");
839 839 mp->chains = kobj_zalloc(mp->nsyms * sizeof (symid_t), KM_WAIT);
840 840 KOBJ_MARK("buckets");
841 841 mp->buckets = kobj_zalloc(mp->hashsize * sizeof (symid_t), KM_WAIT);
842 842
843 843 mp->text = _text;
844 844 mp->data = _data;
845 845
846 846 mp->text_size = _etext - _text;
847 847 mp->data_size = _edata - _data;
848 848
849 849 cp->mod_text = mp->text;
850 850 cp->mod_text_size = mp->text_size;
851 851
852 852 mp->filename = cp->mod_filename;
853 853
854 854 #ifdef KOBJ_DEBUG
855 855 if (kobj_debug & D_LOADING) {
856 856 _kobj_printf(ops, "krtld: file=%s\n", mp->filename);
857 857 _kobj_printf(ops, "\ttext: 0x%p", mp->text);
858 858 _kobj_printf(ops, " size: 0x%x\n", mp->text_size);
859 859 _kobj_printf(ops, "\tdata: 0x%p", mp->data);
860 860 _kobj_printf(ops, " dsize: 0x%x\n", mp->data_size);
861 861 }
862 862 #endif /* KOBJ_DEBUG */
863 863
864 864 /*
865 865 * Insert symbols into the hash table.
866 866 */
867 867 for (i = 0; i < mp->nsyms; i++) {
868 868 sp = (Sym *)(mp->symtbl + i * mp->symhdr->sh_entsize);
869 869
870 870 if (sp->st_name == 0 || sp->st_shndx == SHN_UNDEF)
871 871 continue;
872 872 #if defined(__sparc)
873 873 /*
874 874 * Register symbols are ignored in the kernel
875 875 */
876 876 if (ELF_ST_TYPE(sp->st_info) == STT_SPARC_REGISTER)
877 877 continue;
878 878 #endif /* __sparc */
879 879
880 880 sym_insert(mp, mp->strings + sp->st_name, i);
881 881 }
882 882
883 883 KOBJ_MARK("load_exec done");
884 884 return (mp);
885 885 }
886 886
887 887 /*
888 888 * Set up the linker module (if it's compiled in, LDNAME is NULL)
889 889 */
890 890 static void
891 891 load_linker(val_t *bootaux)
892 892 {
893 893 struct module *kmp = (struct module *)kobj_modules->mod_mp;
894 894 struct module *mp;
895 895 struct modctl *cp;
896 896 int i;
897 897 Shdr *shp;
898 898 Sym *sp;
899 899 int shsize;
900 900 char *dlname = (char *)bootaux[BA_LDNAME].ba_ptr;
901 901
902 902 /*
903 903 * On some architectures, krtld is compiled into the kernel.
904 904 */
905 905 if (dlname == NULL)
906 906 return;
907 907
908 908 cp = add_primary(dlname, KOBJ_LM_PRIMARY);
909 909
910 910 mp = kobj_zalloc(sizeof (struct module), KM_WAIT);
911 911
912 912 cp->mod_mp = mp;
913 913 mp->hdr = *(Ehdr *)bootaux[BA_LDELF].ba_ptr;
914 914 shsize = mp->hdr.e_shentsize * mp->hdr.e_shnum;
915 915 mp->shdrs = kobj_alloc(shsize, KM_WAIT);
916 916 bcopy(bootaux[BA_LDSHDR].ba_ptr, mp->shdrs, shsize);
917 917
918 918 for (i = 1; i < (int)mp->hdr.e_shnum; i++) {
919 919 shp = (Shdr *)(mp->shdrs + (i * mp->hdr.e_shentsize));
920 920
921 921 if (shp->sh_flags & SHF_ALLOC) {
922 922 if (shp->sh_flags & SHF_WRITE) {
923 923 if (mp->data == NULL)
924 924 mp->data = (char *)shp->sh_addr;
925 925 } else if (mp->text == NULL) {
926 926 mp->text = (char *)shp->sh_addr;
927 927 }
928 928 }
929 929 if (shp->sh_type == SHT_SYMTAB) {
930 930 mp->symtbl_section = i;
931 931 mp->symhdr = shp;
932 932 mp->symspace = mp->symtbl = (char *)shp->sh_addr;
933 933 }
934 934 }
935 935 mp->nsyms = mp->symhdr->sh_size / mp->symhdr->sh_entsize;
936 936 mp->flags = KOBJ_INTERP|KOBJ_PRIM;
937 937 mp->strhdr = (Shdr *)
938 938 (mp->shdrs + mp->symhdr->sh_link * mp->hdr.e_shentsize);
939 939 mp->strings = (char *)mp->strhdr->sh_addr;
940 940 mp->hashsize = kobj_gethashsize(mp->nsyms);
941 941
942 942 mp->symsize = mp->symhdr->sh_size + mp->strhdr->sh_size + sizeof (int) +
943 943 (mp->hashsize + mp->nsyms) * sizeof (symid_t);
944 944
945 945 mp->chains = kobj_zalloc(mp->nsyms * sizeof (symid_t), KM_WAIT);
946 946 mp->buckets = kobj_zalloc(mp->hashsize * sizeof (symid_t), KM_WAIT);
947 947
948 948 mp->bss = bootaux[BA_BSS].ba_val;
949 949 mp->bss_align = 0; /* pre-aligned during allocation */
950 950 mp->bss_size = (uintptr_t)_edata - mp->bss;
951 951 mp->text_size = _etext - mp->text;
952 952 mp->data_size = _edata - mp->data;
953 953 mp->filename = cp->mod_filename;
954 954 cp->mod_text = mp->text;
955 955 cp->mod_text_size = mp->text_size;
956 956
957 957 /*
958 958 * Now that we've figured out where the linker is,
959 959 * set the limits for the booted object.
960 960 */
961 961 kmp->text_size = (size_t)(mp->text - kmp->text);
962 962 kmp->data_size = (size_t)(mp->data - kmp->data);
963 963 kobj_modules->mod_text_size = kmp->text_size;
964 964
965 965 #ifdef KOBJ_DEBUG
966 966 if (kobj_debug & D_LOADING) {
967 967 _kobj_printf(ops, "krtld: file=%s\n", mp->filename);
968 968 _kobj_printf(ops, "\ttext:0x%p", mp->text);
969 969 _kobj_printf(ops, " size: 0x%x\n", mp->text_size);
970 970 _kobj_printf(ops, "\tdata:0x%p", mp->data);
971 971 _kobj_printf(ops, " dsize: 0x%x\n", mp->data_size);
972 972 }
973 973 #endif /* KOBJ_DEBUG */
974 974
975 975 /*
976 976 * Insert the symbols into the hash table.
977 977 */
978 978 for (i = 0; i < mp->nsyms; i++) {
979 979 sp = (Sym *)(mp->symtbl + i * mp->symhdr->sh_entsize);
980 980
981 981 if (sp->st_name == 0 || sp->st_shndx == SHN_UNDEF)
982 982 continue;
983 983 if (ELF_ST_BIND(sp->st_info) == STB_GLOBAL) {
984 984 if (sp->st_shndx == SHN_COMMON)
985 985 sp->st_shndx = SHN_ABS;
986 986 }
987 987 sym_insert(mp, mp->strings + sp->st_name, i);
988 988 }
989 989
990 990 }
991 991
992 992 static kobj_notify_list_t **
993 993 kobj_notify_lookup(uint_t type)
994 994 {
995 995 ASSERT(type != 0 && type < sizeof (kobj_notifiers) /
996 996 sizeof (kobj_notify_list_t *));
997 997
998 998 return (&kobj_notifiers[type]);
999 999 }
1000 1000
1001 1001 int
1002 1002 kobj_notify_add(kobj_notify_list_t *knp)
1003 1003 {
1004 1004 kobj_notify_list_t **knl;
1005 1005
1006 1006 knl = kobj_notify_lookup(knp->kn_type);
1007 1007
1008 1008 knp->kn_next = NULL;
1009 1009 knp->kn_prev = NULL;
1010 1010
1011 1011 mutex_enter(&kobj_lock);
1012 1012
1013 1013 if (*knl != NULL) {
1014 1014 (*knl)->kn_prev = knp;
1015 1015 knp->kn_next = *knl;
1016 1016 }
1017 1017 (*knl) = knp;
1018 1018
1019 1019 mutex_exit(&kobj_lock);
1020 1020 return (0);
1021 1021 }
1022 1022
1023 1023 int
1024 1024 kobj_notify_remove(kobj_notify_list_t *knp)
1025 1025 {
1026 1026 kobj_notify_list_t **knl = kobj_notify_lookup(knp->kn_type);
1027 1027 kobj_notify_list_t *tknp;
1028 1028
1029 1029 mutex_enter(&kobj_lock);
1030 1030
1031 1031 /* LINTED */
1032 1032 if (tknp = knp->kn_next)
1033 1033 tknp->kn_prev = knp->kn_prev;
1034 1034
1035 1035 /* LINTED */
1036 1036 if (tknp = knp->kn_prev)
1037 1037 tknp->kn_next = knp->kn_next;
1038 1038 else
1039 1039 *knl = knp->kn_next;
1040 1040
1041 1041 mutex_exit(&kobj_lock);
1042 1042
1043 1043 return (0);
1044 1044 }
1045 1045
1046 1046 /*
1047 1047 * Notify all interested callbacks of a specified change in module state.
1048 1048 */
1049 1049 static void
1050 1050 kobj_notify(int type, struct modctl *modp)
1051 1051 {
1052 1052 kobj_notify_list_t *knp;
1053 1053
1054 1054 if (modp->mod_loadflags & MOD_NONOTIFY || standalone)
1055 1055 return;
1056 1056
1057 1057 mutex_enter(&kobj_lock);
1058 1058
1059 1059 for (knp = *(kobj_notify_lookup(type)); knp != NULL; knp = knp->kn_next)
1060 1060 knp->kn_func(type, modp);
1061 1061
1062 1062 /*
1063 1063 * KDI notification must be last (it has to allow for work done by the
1064 1064 * other notification callbacks), so we call it manually.
1065 1065 */
1066 1066 kobj_kdi_mod_notify(type, modp);
1067 1067
1068 1068 mutex_exit(&kobj_lock);
1069 1069 }
1070 1070
1071 1071 /*
1072 1072 * Create the module path.
1073 1073 */
1074 1074 static char *
1075 1075 getmodpath(const char *filename)
1076 1076 {
1077 1077 char *path = kobj_zalloc(MAXPATHLEN, KM_WAIT);
1078 1078
1079 1079 /*
1080 1080 * Platform code gets first crack, then add
1081 1081 * the default components
1082 1082 */
1083 1083 mach_modpath(path, filename);
1084 1084 if (*path != '\0')
1085 1085 (void) strcat(path, " ");
1086 1086 return (strcat(path, MOD_DEFPATH));
1087 1087 }
1088 1088
1089 1089 static struct modctl *
1090 1090 add_primary(const char *filename, int lmid)
1091 1091 {
1092 1092 struct modctl *cp;
1093 1093
1094 1094 cp = kobj_zalloc(sizeof (struct modctl), KM_WAIT);
1095 1095
1096 1096 cp->mod_filename = kobj_alloc(strlen(filename) + 1, KM_WAIT);
1097 1097
1098 1098 /*
1099 1099 * For symbol lookup, we assemble our own
1100 1100 * modctl list of the primary modules.
1101 1101 */
1102 1102
1103 1103 (void) strcpy(cp->mod_filename, filename);
1104 1104 cp->mod_modname = basename(cp->mod_filename);
1105 1105
1106 1106 /* set values for modinfo assuming that the load will work */
1107 1107 cp->mod_prim = 1;
1108 1108 cp->mod_loaded = 1;
1109 1109 cp->mod_installed = 1;
1110 1110 cp->mod_loadcnt = 1;
1111 1111 cp->mod_loadflags = MOD_NOAUTOUNLOAD;
1112 1112
1113 1113 cp->mod_id = kobj_last_module_id++;
1114 1114
1115 1115 /*
1116 1116 * Link the module in. We'll pass this info on
1117 1117 * to the mod squad later.
1118 1118 */
1119 1119 if (kobj_modules == NULL) {
1120 1120 kobj_modules = cp;
1121 1121 cp->mod_prev = cp->mod_next = cp;
1122 1122 } else {
1123 1123 cp->mod_prev = kobj_modules->mod_prev;
1124 1124 cp->mod_next = kobj_modules;
1125 1125 kobj_modules->mod_prev->mod_next = cp;
1126 1126 kobj_modules->mod_prev = cp;
1127 1127 }
1128 1128
1129 1129 kobj_lm_append(lmid, cp);
1130 1130
1131 1131 return (cp);
1132 1132 }
1133 1133
1134 1134 static int
1135 1135 bind_primary(val_t *bootaux, int lmid)
1136 1136 {
1137 1137 struct modctl_list *linkmap = kobj_lm_lookup(lmid);
1138 1138 struct modctl_list *lp;
1139 1139 struct module *mp;
1140 1140
1141 1141 /*
1142 1142 * Do common symbols.
1143 1143 */
1144 1144 for (lp = linkmap; lp; lp = lp->modl_next) {
1145 1145 mp = mod(lp);
1146 1146
1147 1147 /*
1148 1148 * Don't do common section relocations for modules that
1149 1149 * don't need it.
1150 1150 */
1151 1151 if (mp->flags & (KOBJ_EXEC|KOBJ_INTERP))
1152 1152 continue;
1153 1153
1154 1154 if (do_common(mp) < 0)
1155 1155 return (-1);
1156 1156 }
1157 1157
1158 1158 /*
1159 1159 * Resolve symbols.
1160 1160 */
1161 1161 for (lp = linkmap; lp; lp = lp->modl_next) {
1162 1162 mp = mod(lp);
1163 1163
1164 1164 if (do_symbols(mp, 0) < 0)
1165 1165 return (-1);
1166 1166 }
1167 1167
1168 1168 /*
1169 1169 * Do relocations.
1170 1170 */
1171 1171 for (lp = linkmap; lp; lp = lp->modl_next) {
1172 1172 mp = mod(lp);
1173 1173
1174 1174 if (mp->flags & KOBJ_EXEC) {
1175 1175 Dyn *dyn;
1176 1176 Word relasz = 0, relaent = 0;
1177 1177 Word shtype;
1178 1178 char *rela = NULL;
1179 1179
1180 1180 for (dyn = (Dyn *)bootaux[BA_DYNAMIC].ba_ptr;
1181 1181 dyn->d_tag != DT_NULL; dyn++) {
1182 1182 switch (dyn->d_tag) {
1183 1183 case DT_RELASZ:
1184 1184 case DT_RELSZ:
1185 1185 relasz = dyn->d_un.d_val;
1186 1186 break;
1187 1187 case DT_RELAENT:
1188 1188 case DT_RELENT:
1189 1189 relaent = dyn->d_un.d_val;
1190 1190 break;
1191 1191 case DT_RELA:
1192 1192 shtype = SHT_RELA;
1193 1193 rela = (char *)dyn->d_un.d_ptr;
1194 1194 break;
1195 1195 case DT_REL:
1196 1196 shtype = SHT_REL;
1197 1197 rela = (char *)dyn->d_un.d_ptr;
1198 1198 break;
1199 1199 }
1200 1200 }
1201 1201 if (relasz == 0 ||
1202 1202 relaent == 0 || rela == NULL) {
1203 1203 _kobj_printf(ops, "krtld: bind_primary(): "
1204 1204 "no relocation information found for "
1205 1205 "module %s\n", mp->filename);
1206 1206 return (-1);
1207 1207 }
1208 1208 #ifdef KOBJ_DEBUG
1209 1209 if (kobj_debug & D_RELOCATIONS)
1210 1210 _kobj_printf(ops, "krtld: relocating: file=%s "
1211 1211 "KOBJ_EXEC\n", mp->filename);
1212 1212 #endif
1213 1213 if (do_relocate(mp, rela, shtype, relasz/relaent,
1214 1214 relaent, (Addr)mp->text) < 0)
1215 1215 return (-1);
1216 1216 } else {
1217 1217 if (do_relocations(mp) < 0)
1218 1218 return (-1);
1219 1219 }
1220 1220
1221 1221 kobj_sync_instruction_memory(mp->text, mp->text_size);
1222 1222 }
1223 1223
1224 1224 for (lp = linkmap; lp; lp = lp->modl_next) {
1225 1225 mp = mod(lp);
1226 1226
1227 1227 /*
1228 1228 * We need to re-read the full symbol table for the boot file,
1229 1229 * since we couldn't use the full one before. We also need to
1230 1230 * load the CTF sections of both the boot file and the
1231 1231 * interpreter (us).
1232 1232 */
1233 1233 if (mp->flags & KOBJ_EXEC) {
1234 1234 struct _buf *file;
1235 1235 int n;
1236 1236
1237 1237 file = kobj_open_file(mp->filename);
1238 1238 if (file == (struct _buf *)-1)
1239 1239 return (-1);
1240 1240 if (kobj_read_file(file, (char *)&mp->hdr,
1241 1241 sizeof (mp->hdr), 0) < 0)
1242 1242 return (-1);
1243 1243 n = mp->hdr.e_shentsize * mp->hdr.e_shnum;
1244 1244 mp->shdrs = kobj_alloc(n, KM_WAIT);
1245 1245 if (kobj_read_file(file, mp->shdrs, n,
1246 1246 mp->hdr.e_shoff) < 0)
1247 1247 return (-1);
1248 1248 if (get_syms(mp, file) < 0)
1249 1249 return (-1);
1250 1250 if (get_ctf(mp, file) < 0)
1251 1251 return (-1);
1252 1252 kobj_close_file(file);
1253 1253 mp->flags |= KOBJ_RELOCATED;
1254 1254
1255 1255 } else if (mp->flags & KOBJ_INTERP) {
1256 1256 struct _buf *file;
1257 1257
1258 1258 /*
1259 1259 * The interpreter path fragment in mp->filename
1260 1260 * will already have the module directory suffix
1261 1261 * in it (if appropriate).
1262 1262 */
1263 1263 file = kobj_open_path(mp->filename, 1, 0);
1264 1264 if (file == (struct _buf *)-1)
1265 1265 return (-1);
1266 1266 if (get_ctf(mp, file) < 0)
1267 1267 return (-1);
1268 1268 kobj_close_file(file);
1269 1269 mp->flags |= KOBJ_RELOCATED;
1270 1270 }
1271 1271 }
1272 1272
1273 1273 return (0);
1274 1274 }
1275 1275
1276 1276 static struct modctl *
1277 1277 mod_already_loaded(char *modname)
1278 1278 {
1279 1279 struct modctl *mctl = kobj_modules;
1280 1280
1281 1281 do {
1282 1282 if (strcmp(modname, mctl->mod_filename) == 0)
1283 1283 return (mctl);
1284 1284 mctl = mctl->mod_next;
1285 1285
1286 1286 } while (mctl != kobj_modules);
1287 1287
1288 1288 return (NULL);
1289 1289 }
1290 1290
1291 1291 /*
1292 1292 * Load all the primary dependent modules.
1293 1293 */
1294 1294 static int
1295 1295 load_primary(struct module *mp, int lmid)
1296 1296 {
1297 1297 struct modctl *cp;
1298 1298 struct module *dmp;
1299 1299 char *p, *q;
1300 1300 char modname[MODMAXNAMELEN];
1301 1301
1302 1302 if ((p = mp->depends_on) == NULL)
1303 1303 return (0);
1304 1304
1305 1305 /* CONSTANTCONDITION */
1306 1306 while (1) {
1307 1307 /*
1308 1308 * Skip space.
1309 1309 */
1310 1310 while (*p && (*p == ' ' || *p == '\t'))
1311 1311 p++;
1312 1312 /*
1313 1313 * Get module name.
1314 1314 */
1315 1315 q = modname;
1316 1316 while (*p && *p != ' ' && *p != '\t')
1317 1317 *q++ = *p++;
1318 1318
1319 1319 if (q == modname)
1320 1320 break;
1321 1321
1322 1322 *q = '\0';
1323 1323 /*
1324 1324 * Check for dup dependencies.
1325 1325 */
1326 1326 if (strcmp(modname, "dtracestubs") == 0 ||
1327 1327 mod_already_loaded(modname) != NULL)
1328 1328 continue;
1329 1329
1330 1330 cp = add_primary(modname, lmid);
1331 1331 cp->mod_busy = 1;
1332 1332 /*
1333 1333 * Load it.
1334 1334 */
1335 1335 (void) kobj_load_module(cp, 1);
1336 1336 cp->mod_busy = 0;
1337 1337
1338 1338 if ((dmp = cp->mod_mp) == NULL) {
1339 1339 cp->mod_loaded = 0;
1340 1340 cp->mod_installed = 0;
1341 1341 cp->mod_loadcnt = 0;
1342 1342 return (-1);
1343 1343 }
1344 1344
1345 1345 add_dependent(mp, dmp);
1346 1346 dmp->flags |= KOBJ_PRIM;
1347 1347
1348 1348 /*
1349 1349 * Recurse.
1350 1350 */
1351 1351 if (load_primary(dmp, lmid) == -1) {
1352 1352 cp->mod_loaded = 0;
1353 1353 cp->mod_installed = 0;
1354 1354 cp->mod_loadcnt = 0;
1355 1355 return (-1);
1356 1356 }
1357 1357 }
1358 1358 return (0);
1359 1359 }
1360 1360
1361 1361 static int
1362 1362 console_is_usb_serial(void)
1363 1363 {
1364 1364 char *console;
1365 1365 int len, ret;
1366 1366
1367 1367 if ((len = BOP_GETPROPLEN(ops, "console")) == -1)
1368 1368 return (0);
1369 1369
1370 1370 console = kobj_zalloc(len, KM_WAIT|KM_TMP);
1371 1371 (void) BOP_GETPROP(ops, "console", console);
1372 1372 ret = (strcmp(console, "usb-serial") == 0);
1373 1373 kobj_free(console, len);
1374 1374
1375 1375 return (ret);
1376 1376 }
1377 1377
1378 1378 static int
1379 1379 load_kmdb(val_t *bootaux)
1380 1380 {
1381 1381 struct modctl *mctl;
1382 1382 struct module *mp;
1383 1383 Sym *sym;
1384 1384
1385 1385 if (console_is_usb_serial()) {
1386 1386 _kobj_printf(ops, "kmdb not loaded "
1387 1387 "(unsupported on usb serial console)\n");
1388 1388 return (0);
1389 1389 }
1390 1390
1391 1391 _kobj_printf(ops, "Loading kmdb...\n");
1392 1392
1393 1393 if ((mctl = add_primary("misc/kmdbmod", KOBJ_LM_DEBUGGER)) == NULL)
1394 1394 return (-1);
1395 1395
1396 1396 mctl->mod_busy = 1;
1397 1397 (void) kobj_load_module(mctl, 1);
1398 1398 mctl->mod_busy = 0;
1399 1399
1400 1400 if ((mp = mctl->mod_mp) == NULL)
1401 1401 return (-1);
1402 1402
1403 1403 mp->flags |= KOBJ_PRIM;
1404 1404
1405 1405 if (load_primary(mp, KOBJ_LM_DEBUGGER) < 0)
1406 1406 return (-1);
1407 1407
1408 1408 if (boothowto & RB_VERBOSE)
1409 1409 kobj_lm_dump(KOBJ_LM_DEBUGGER);
1410 1410
1411 1411 if (bind_primary(bootaux, KOBJ_LM_DEBUGGER) < 0)
1412 1412 return (-1);
1413 1413
1414 1414 if ((sym = lookup_one(mctl->mod_mp, "kctl_boot_activate")) == NULL)
1415 1415 return (-1);
1416 1416
1417 1417 #ifdef KOBJ_DEBUG
1418 1418 if (kobj_debug & D_DEBUG) {
1419 1419 _kobj_printf(ops, "calling kctl_boot_activate() @ 0x%lx\n",
1420 1420 sym->st_value);
1421 1421 _kobj_printf(ops, "\tops 0x%p\n", ops);
1422 1422 _kobj_printf(ops, "\tromp 0x%p\n", romp);
1423 1423 }
1424 1424 #endif
1425 1425
1426 1426 if (((kctl_boot_activate_f *)sym->st_value)(ops, romp, 0,
1427 1427 (const char **)kobj_kmdb_argv) < 0)
1428 1428 return (-1);
1429 1429
1430 1430 return (0);
1431 1431 }
1432 1432
1433 1433 /*
1434 1434 * Return a string listing module dependencies.
1435 1435 */
1436 1436 static char *
1437 1437 depends_on(struct module *mp)
1438 1438 {
1439 1439 Sym *sp;
1440 1440 char *depstr, *q;
1441 1441
1442 1442 /*
1443 1443 * The module doesn't have a depends_on value, so let's try it the
1444 1444 * old-fashioned way - via "_depends_on"
1445 1445 */
1446 1446 if ((sp = lookup_one(mp, "_depends_on")) == NULL)
1447 1447 return (NULL);
1448 1448
1449 1449 q = (char *)sp->st_value;
1450 1450
1451 1451 #ifdef KOBJ_DEBUG
1452 1452 /*
1453 1453 * _depends_on is a deprecated interface, so we warn about its use
1454 1454 * irrespective of subsequent processing errors. How else are we going
1455 1455 * to be able to deco this interface completely?
1456 1456 * Changes initially limited to DEBUG because third-party modules
1457 1457 * should be flagged to developers before general use base.
1458 1458 */
1459 1459 _kobj_printf(ops,
1460 1460 "Warning: %s uses deprecated _depends_on interface.\n",
1461 1461 mp->filename);
1462 1462 _kobj_printf(ops, "Please notify module developer or vendor.\n");
1463 1463 #endif
1464 1464
1465 1465 /*
1466 1466 * Idiot checks. Make sure it's
1467 1467 * in-bounds and NULL terminated.
1468 1468 */
1469 1469 if (kobj_addrcheck(mp, q) || q[sp->st_size - 1] != '\0') {
1470 1470 _kobj_printf(ops, "Error processing dependency for %s\n",
1471 1471 mp->filename);
1472 1472 return (NULL);
1473 1473 }
1474 1474
1475 1475 depstr = (char *)kobj_alloc(strlen(q) + 1, KM_WAIT);
1476 1476 (void) strcpy(depstr, q);
1477 1477
1478 1478 return (depstr);
1479 1479 }
1480 1480
1481 1481 void
1482 1482 kobj_getmodinfo(void *xmp, struct modinfo *modinfo)
1483 1483 {
1484 1484 struct module *mp;
1485 1485 mp = (struct module *)xmp;
1486 1486
1487 1487 modinfo->mi_base = mp->text;
1488 1488 modinfo->mi_size = mp->text_size + mp->data_size;
1489 1489 }
1490 1490
1491 1491 /*
1492 1492 * kobj_export_ksyms() performs the following services:
1493 1493 *
1494 1494 * (1) Migrates the symbol table from boot/kobj memory to the ksyms arena.
1495 1495 * (2) Removes unneeded symbols to save space.
1496 1496 * (3) Reduces memory footprint by using VM_BESTFIT allocations.
1497 1497 * (4) Makes the symbol table visible to /dev/ksyms.
1498 1498 */
1499 1499 static void
1500 1500 kobj_export_ksyms(struct module *mp)
1501 1501 {
1502 1502 Sym *esp = (Sym *)(mp->symtbl + mp->symhdr->sh_size);
1503 1503 Sym *sp, *osp;
1504 1504 char *name;
1505 1505 size_t namelen;
1506 1506 struct module *omp;
1507 1507 uint_t nsyms;
1508 1508 size_t symsize = mp->symhdr->sh_entsize;
1509 1509 size_t locals = 1;
1510 1510 size_t strsize;
1511 1511
1512 1512 /*
1513 1513 * Make a copy of the original module structure.
1514 1514 */
1515 1515 omp = kobj_alloc(sizeof (struct module), KM_WAIT);
1516 1516 bcopy(mp, omp, sizeof (struct module));
1517 1517
1518 1518 /*
1519 1519 * Compute the sizes of the new symbol table sections.
1520 1520 */
1521 1521 for (nsyms = strsize = 1, osp = (Sym *)omp->symtbl; osp < esp; osp++) {
1522 1522 if (osp->st_value == 0)
1523 1523 continue;
1524 1524 if (sym_lookup(omp, osp) == NULL)
1525 1525 continue;
1526 1526 name = omp->strings + osp->st_name;
1527 1527 namelen = strlen(name);
1528 1528 if (ELF_ST_BIND(osp->st_info) == STB_LOCAL)
1529 1529 locals++;
1530 1530 nsyms++;
1531 1531 strsize += namelen + 1;
1532 1532 }
1533 1533
1534 1534 mp->nsyms = nsyms;
1535 1535 mp->hashsize = kobj_gethashsize(mp->nsyms);
1536 1536
1537 1537 /*
1538 1538 * ksyms_lock must be held as writer during any operation that
1539 1539 * modifies ksyms_arena, including allocation from same, and
1540 1540 * must not be dropped until the arena is vmem_walk()able.
1541 1541 */
1542 1542 rw_enter(&ksyms_lock, RW_WRITER);
1543 1543
1544 1544 /*
1545 1545 * Allocate space for the new section headers (symtab and strtab),
1546 1546 * symbol table, buckets, chains, and strings.
1547 1547 */
1548 1548 mp->symsize = (2 * sizeof (Shdr)) + (nsyms * symsize) +
1549 1549 (mp->hashsize + mp->nsyms) * sizeof (symid_t) + strsize;
1550 1550
1551 1551 if (mp->flags & KOBJ_NOKSYMS) {
1552 1552 mp->symspace = kobj_alloc(mp->symsize, KM_WAIT);
1553 1553 } else {
1554 1554 mp->symspace = vmem_alloc(ksyms_arena, mp->symsize,
1555 1555 VM_BESTFIT | VM_SLEEP);
1556 1556 }
1557 1557 bzero(mp->symspace, mp->symsize);
1558 1558
1559 1559 /*
1560 1560 * Divvy up symspace.
1561 1561 */
1562 1562 mp->shdrs = mp->symspace;
1563 1563 mp->symhdr = (Shdr *)mp->shdrs;
1564 1564 mp->strhdr = (Shdr *)(mp->symhdr + 1);
1565 1565 mp->symtbl = (char *)(mp->strhdr + 1);
1566 1566 mp->buckets = (symid_t *)(mp->symtbl + (nsyms * symsize));
1567 1567 mp->chains = (symid_t *)(mp->buckets + mp->hashsize);
1568 1568 mp->strings = (char *)(mp->chains + nsyms);
1569 1569
1570 1570 /*
1571 1571 * Fill in the new section headers (symtab and strtab).
1572 1572 */
1573 1573 mp->hdr.e_shnum = 2;
1574 1574 mp->symtbl_section = 0;
1575 1575
1576 1576 mp->symhdr->sh_type = SHT_SYMTAB;
1577 1577 mp->symhdr->sh_addr = (Addr)mp->symtbl;
1578 1578 mp->symhdr->sh_size = nsyms * symsize;
1579 1579 mp->symhdr->sh_link = 1;
1580 1580 mp->symhdr->sh_info = locals;
1581 1581 mp->symhdr->sh_addralign = sizeof (Addr);
1582 1582 mp->symhdr->sh_entsize = symsize;
1583 1583
1584 1584 mp->strhdr->sh_type = SHT_STRTAB;
1585 1585 mp->strhdr->sh_addr = (Addr)mp->strings;
1586 1586 mp->strhdr->sh_size = strsize;
1587 1587 mp->strhdr->sh_addralign = 1;
1588 1588
1589 1589 /*
1590 1590 * Construct the new symbol table.
1591 1591 */
1592 1592 for (nsyms = strsize = 1, osp = (Sym *)omp->symtbl; osp < esp; osp++) {
1593 1593 if (osp->st_value == 0)
1594 1594 continue;
1595 1595 if (sym_lookup(omp, osp) == NULL)
1596 1596 continue;
1597 1597 name = omp->strings + osp->st_name;
1598 1598 namelen = strlen(name);
1599 1599 sp = (Sym *)(mp->symtbl + symsize * nsyms);
1600 1600 bcopy(osp, sp, symsize);
1601 1601 bcopy(name, mp->strings + strsize, namelen);
1602 1602 sp->st_name = strsize;
1603 1603 sym_insert(mp, name, nsyms);
1604 1604 nsyms++;
1605 1605 strsize += namelen + 1;
1606 1606 }
1607 1607
1608 1608 rw_exit(&ksyms_lock);
1609 1609
1610 1610 /*
1611 1611 * Free the old section headers -- we'll never need them again.
1612 1612 */
1613 1613 if (!(mp->flags & KOBJ_PRIM)) {
1614 1614 uint_t shn;
1615 1615 Shdr *shp;
1616 1616
1617 1617 for (shn = 1; shn < omp->hdr.e_shnum; shn++) {
1618 1618 shp = (Shdr *)(omp->shdrs + shn * omp->hdr.e_shentsize);
1619 1619 switch (shp->sh_type) {
1620 1620 case SHT_RELA:
1621 1621 case SHT_REL:
1622 1622 if (shp->sh_addr != 0) {
1623 1623 kobj_free((void *)shp->sh_addr,
1624 1624 shp->sh_size);
1625 1625 }
1626 1626 break;
1627 1627 }
1628 1628 }
1629 1629 kobj_free(omp->shdrs, omp->hdr.e_shentsize * omp->hdr.e_shnum);
1630 1630 }
1631 1631 /*
1632 1632 * Discard the old symbol table and our copy of the module strucure.
1633 1633 */
1634 1634 if (!(mp->flags & KOBJ_PRIM))
1635 1635 kobj_free(omp->symspace, omp->symsize);
1636 1636 kobj_free(omp, sizeof (struct module));
1637 1637 }
1638 1638
1639 1639 static void
1640 1640 kobj_export_ctf(struct module *mp)
1641 1641 {
1642 1642 char *data = mp->ctfdata;
1643 1643 size_t size = mp->ctfsize;
1644 1644
1645 1645 if (data != NULL) {
1646 1646 if (_moddebug & MODDEBUG_NOCTF) {
1647 1647 mp->ctfdata = NULL;
1648 1648 mp->ctfsize = 0;
1649 1649 } else {
1650 1650 mp->ctfdata = vmem_alloc(ctf_arena, size,
1651 1651 VM_BESTFIT | VM_SLEEP);
1652 1652 bcopy(data, mp->ctfdata, size);
1653 1653 }
1654 1654
1655 1655 if (!(mp->flags & KOBJ_PRIM))
1656 1656 kobj_free(data, size);
1657 1657 }
1658 1658 }
1659 1659
1660 1660 void
1661 1661 kobj_export_module(struct module *mp)
1662 1662 {
1663 1663 kobj_export_ksyms(mp);
1664 1664 kobj_export_ctf(mp);
1665 1665
1666 1666 mp->flags |= KOBJ_EXPORTED;
1667 1667 }
1668 1668
1669 1669 static int
1670 1670 process_dynamic(struct module *mp, char *dyndata, char *strdata)
1671 1671 {
1672 1672 char *path = NULL, *depstr = NULL;
1673 1673 int allocsize = 0, osize = 0, nsize = 0;
1674 1674 char *libname, *tmp;
1675 1675 int lsize;
1676 1676 Dyn *dynp;
1677 1677
1678 1678 for (dynp = (Dyn *)dyndata; dynp && dynp->d_tag != DT_NULL; dynp++) {
1679 1679 switch (dynp->d_tag) {
1680 1680 case DT_NEEDED:
1681 1681 /*
1682 1682 * Read the DT_NEEDED entries, expanding the macros they
1683 1683 * contain (if any), and concatenating them into a
1684 1684 * single space-separated dependency list.
1685 1685 */
1686 1686 libname = (ulong_t)dynp->d_un.d_ptr + strdata;
1687 1687
1688 1688 if (strchr(libname, '$') != NULL) {
1689 1689 char *_lib;
1690 1690
1691 1691 if (path == NULL)
1692 1692 path = kobj_alloc(MAXPATHLEN, KM_WAIT);
1693 1693 if ((_lib = expand_libmacro(libname, path,
1694 1694 path)) != NULL)
1695 1695 libname = _lib;
1696 1696 else {
1697 1697 _kobj_printf(ops, "krtld: "
1698 1698 "process_dynamic: failed to expand "
1699 1699 "%s\n", libname);
1700 1700 }
1701 1701 }
1702 1702
1703 1703 lsize = strlen(libname);
1704 1704 nsize += lsize;
1705 1705 if (nsize + 1 > allocsize) {
1706 1706 tmp = kobj_alloc(allocsize + MAXPATHLEN,
1707 1707 KM_WAIT);
1708 1708 if (depstr != NULL) {
1709 1709 bcopy(depstr, tmp, osize);
1710 1710 kobj_free(depstr, allocsize);
1711 1711 }
1712 1712 depstr = tmp;
1713 1713 allocsize += MAXPATHLEN;
1714 1714 }
1715 1715 bcopy(libname, depstr + osize, lsize);
1716 1716 *(depstr + nsize) = ' '; /* separator */
1717 1717 nsize++;
1718 1718 osize = nsize;
1719 1719 break;
1720 1720
1721 1721 case DT_FLAGS_1:
1722 1722 if (dynp->d_un.d_val & DF_1_IGNMULDEF)
1723 1723 mp->flags |= KOBJ_IGNMULDEF;
1724 1724 if (dynp->d_un.d_val & DF_1_NOKSYMS)
1725 1725 mp->flags |= KOBJ_NOKSYMS;
1726 1726
1727 1727 break;
1728 1728 }
1729 1729 }
1730 1730
1731 1731 /*
1732 1732 * finish up the depends string (if any)
1733 1733 */
1734 1734 if (depstr != NULL) {
1735 1735 *(depstr + nsize - 1) = '\0'; /* overwrite separator w/term */
1736 1736 if (path != NULL)
1737 1737 kobj_free(path, MAXPATHLEN);
1738 1738
1739 1739 tmp = kobj_alloc(nsize, KM_WAIT);
1740 1740 bcopy(depstr, tmp, nsize);
1741 1741 kobj_free(depstr, allocsize);
1742 1742 depstr = tmp;
1743 1743
1744 1744 mp->depends_on = depstr;
1745 1745 }
1746 1746
1747 1747 return (0);
1748 1748 }
1749 1749
1750 1750 static int
1751 1751 do_dynamic(struct module *mp, struct _buf *file)
1752 1752 {
1753 1753 Shdr *dshp, *dstrp, *shp;
1754 1754 char *dyndata, *dstrdata;
1755 1755 int dshn, shn, rc;
1756 1756
1757 1757 /* find and validate the dynamic section (if any) */
1758 1758
1759 1759 for (dshp = NULL, shn = 1; shn < mp->hdr.e_shnum; shn++) {
1760 1760 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize);
1761 1761 switch (shp->sh_type) {
1762 1762 case SHT_DYNAMIC:
1763 1763 if (dshp != NULL) {
1764 1764 _kobj_printf(ops, "krtld: get_dynamic: %s, ",
1765 1765 mp->filename);
1766 1766 _kobj_printf(ops,
1767 1767 "multiple dynamic sections\n");
1768 1768 return (-1);
1769 1769 } else {
1770 1770 dshp = shp;
1771 1771 dshn = shn;
1772 1772 }
1773 1773 break;
1774 1774 }
1775 1775 }
1776 1776
1777 1777 if (dshp == NULL)
1778 1778 return (0);
1779 1779
1780 1780 if (dshp->sh_link > mp->hdr.e_shnum) {
1781 1781 _kobj_printf(ops, "krtld: get_dynamic: %s, ", mp->filename);
1782 1782 _kobj_printf(ops, "no section for sh_link %d\n", dshp->sh_link);
1783 1783 return (-1);
1784 1784 }
1785 1785 dstrp = (Shdr *)(mp->shdrs + dshp->sh_link * mp->hdr.e_shentsize);
1786 1786
1787 1787 if (dstrp->sh_type != SHT_STRTAB) {
1788 1788 _kobj_printf(ops, "krtld: get_dynamic: %s, ", mp->filename);
1789 1789 _kobj_printf(ops, "sh_link not a string table for section %d\n",
1790 1790 dshn);
1791 1791 return (-1);
1792 1792 }
1793 1793
1794 1794 /* read it from disk */
1795 1795
1796 1796 dyndata = kobj_alloc(dshp->sh_size, KM_WAIT|KM_TMP);
1797 1797 if (kobj_read_file(file, dyndata, dshp->sh_size, dshp->sh_offset) < 0) {
1798 1798 _kobj_printf(ops, "krtld: get_dynamic: %s, ", mp->filename);
1799 1799 _kobj_printf(ops, "error reading section %d\n", dshn);
1800 1800
1801 1801 kobj_free(dyndata, dshp->sh_size);
1802 1802 return (-1);
1803 1803 }
1804 1804
1805 1805 dstrdata = kobj_alloc(dstrp->sh_size, KM_WAIT|KM_TMP);
1806 1806 if (kobj_read_file(file, dstrdata, dstrp->sh_size,
1807 1807 dstrp->sh_offset) < 0) {
1808 1808 _kobj_printf(ops, "krtld: get_dynamic: %s, ", mp->filename);
1809 1809 _kobj_printf(ops, "error reading section %d\n", dshp->sh_link);
1810 1810
1811 1811 kobj_free(dyndata, dshp->sh_size);
1812 1812 kobj_free(dstrdata, dstrp->sh_size);
1813 1813 return (-1);
1814 1814 }
1815 1815
1816 1816 /* pull the interesting pieces out */
1817 1817
1818 1818 rc = process_dynamic(mp, dyndata, dstrdata);
1819 1819
1820 1820 kobj_free(dyndata, dshp->sh_size);
1821 1821 kobj_free(dstrdata, dstrp->sh_size);
1822 1822
1823 1823 return (rc);
1824 1824 }
1825 1825
1826 1826 void
1827 1827 kobj_set_ctf(struct module *mp, caddr_t data, size_t size)
1828 1828 {
1829 1829 if (!standalone) {
1830 1830 if (mp->ctfdata != NULL) {
1831 1831 if (vmem_contains(ctf_arena, mp->ctfdata,
1832 1832 mp->ctfsize)) {
1833 1833 vmem_free(ctf_arena, mp->ctfdata, mp->ctfsize);
1834 1834 } else {
1835 1835 kobj_free(mp->ctfdata, mp->ctfsize);
1836 1836 }
1837 1837 }
1838 1838 }
1839 1839
1840 1840 /*
1841 1841 * The order is very important here. We need to make sure that
1842 1842 * consumers, at any given instant, see a consistent state. We'd
1843 1843 * rather they see no CTF data than the address of one buffer and the
1844 1844 * size of another.
1845 1845 */
1846 1846 mp->ctfdata = NULL;
1847 1847 membar_producer();
1848 1848 mp->ctfsize = size;
1849 1849 mp->ctfdata = data;
1850 1850 membar_producer();
1851 1851 }
1852 1852
1853 1853 int
1854 1854 kobj_load_module(struct modctl *modp, int use_path)
1855 1855 {
1856 1856 char *filename = modp->mod_filename;
1857 1857 char *modname = modp->mod_modname;
1858 1858 int i;
1859 1859 int n;
1860 1860 struct _buf *file;
1861 1861 struct module *mp = NULL;
1862 1862 #ifdef MODDIR_SUFFIX
1863 1863 int no_suffixdir_drv = 0;
1864 1864 #endif
1865 1865
1866 1866 mp = kobj_zalloc(sizeof (struct module), KM_WAIT);
1867 1867
1868 1868 /*
1869 1869 * We need to prevent kmdb's symbols from leaking into /dev/ksyms.
1870 1870 * kmdb contains a bunch of symbols with well-known names, symbols
1871 1871 * which will mask the real versions, thus causing no end of trouble
1872 1872 * for mdb.
1873 1873 */
1874 1874 if (strcmp(modp->mod_modname, "kmdbmod") == 0)
1875 1875 mp->flags |= KOBJ_NOKSYMS;
1876 1876
1877 1877 file = kobj_open_path(filename, use_path, 1);
1878 1878 if (file == (struct _buf *)-1) {
1879 1879 #ifdef MODDIR_SUFFIX
1880 1880 file = kobj_open_path(filename, use_path, 0);
1881 1881 #endif
1882 1882 if (file == (struct _buf *)-1) {
1883 1883 kobj_free(mp, sizeof (*mp));
1884 1884 goto bad;
1885 1885 }
1886 1886 #ifdef MODDIR_SUFFIX
1887 1887 /*
1888 1888 * There is no driver module in the ISA specific (suffix)
1889 1889 * subdirectory but there is a module in the parent directory.
1890 1890 */
1891 1891 if (strncmp(filename, "drv/", 4) == 0) {
1892 1892 no_suffixdir_drv = 1;
1893 1893 }
1894 1894 #endif
1895 1895 }
1896 1896
1897 1897 mp->filename = kobj_alloc(strlen(file->_name) + 1, KM_WAIT);
1898 1898 (void) strcpy(mp->filename, file->_name);
1899 1899
1900 1900 if (kobj_read_file(file, (char *)&mp->hdr, sizeof (mp->hdr), 0) < 0) {
1901 1901 _kobj_printf(ops, "kobj_load_module: %s read header failed\n",
1902 1902 modname);
1903 1903 kobj_free(mp->filename, strlen(file->_name) + 1);
1904 1904 kobj_free(mp, sizeof (*mp));
1905 1905 goto bad;
1906 1906 }
1907 1907 for (i = 0; i < SELFMAG; i++) {
1908 1908 if (mp->hdr.e_ident[i] != ELFMAG[i]) {
1909 1909 if (_moddebug & MODDEBUG_ERRMSG)
1910 1910 _kobj_printf(ops, "%s not an elf module\n",
1911 1911 modname);
1912 1912 kobj_free(mp->filename, strlen(file->_name) + 1);
1913 1913 kobj_free(mp, sizeof (*mp));
1914 1914 goto bad;
1915 1915 }
1916 1916 }
1917 1917 /*
1918 1918 * It's ELF, but is it our ISA? Interpreting the header
1919 1919 * from a file for a byte-swapped ISA could cause a huge
1920 1920 * and unsatisfiable value to be passed to kobj_alloc below
1921 1921 * and therefore hang booting.
1922 1922 */
1923 1923 if (!elf_mach_ok(&mp->hdr)) {
1924 1924 if (_moddebug & MODDEBUG_ERRMSG)
1925 1925 _kobj_printf(ops, "%s not an elf module for this ISA\n",
1926 1926 modname);
1927 1927 kobj_free(mp->filename, strlen(file->_name) + 1);
1928 1928 kobj_free(mp, sizeof (*mp));
1929 1929 #ifdef MODDIR_SUFFIX
1930 1930 /*
1931 1931 * The driver mod is not in the ISA specific subdirectory
1932 1932 * and the module in the parent directory is not our ISA.
1933 1933 * If it is our ISA, for now we will silently succeed.
1934 1934 */
1935 1935 if (no_suffixdir_drv == 1) {
1936 1936 cmn_err(CE_CONT, "?NOTICE: %s: 64-bit driver module"
1937 1937 " not found\n", modname);
1938 1938 }
1939 1939 #endif
1940 1940 goto bad;
1941 1941 }
1942 1942
1943 1943 /*
1944 1944 * All modules, save for unix, should be relocatable (as opposed to
1945 1945 * dynamic). Dynamic modules come with PLTs and GOTs, which can't
1946 1946 * currently be processed by krtld.
1947 1947 */
1948 1948 if (mp->hdr.e_type != ET_REL) {
1949 1949 if (_moddebug & MODDEBUG_ERRMSG)
1950 1950 _kobj_printf(ops, "%s isn't a relocatable (ET_REL) "
1951 1951 "module\n", modname);
1952 1952 kobj_free(mp->filename, strlen(file->_name) + 1);
1953 1953 kobj_free(mp, sizeof (*mp));
1954 1954 goto bad;
1955 1955 }
1956 1956
1957 1957 n = mp->hdr.e_shentsize * mp->hdr.e_shnum;
1958 1958 mp->shdrs = kobj_alloc(n, KM_WAIT);
1959 1959
1960 1960 if (kobj_read_file(file, mp->shdrs, n, mp->hdr.e_shoff) < 0) {
1961 1961 _kobj_printf(ops, "kobj_load_module: %s error reading "
1962 1962 "section headers\n", modname);
1963 1963 kobj_free(mp->shdrs, n);
1964 1964 kobj_free(mp->filename, strlen(file->_name) + 1);
1965 1965 kobj_free(mp, sizeof (*mp));
1966 1966 goto bad;
1967 1967 }
1968 1968
1969 1969 kobj_notify(KOBJ_NOTIFY_MODLOADING, modp);
1970 1970 module_assign(modp, mp);
1971 1971
1972 1972 /* read in sections */
1973 1973 if (get_progbits(mp, file) < 0) {
1974 1974 _kobj_printf(ops, "%s error reading sections\n", modname);
1975 1975 goto bad;
1976 1976 }
1977 1977
1978 1978 if (do_dynamic(mp, file) < 0) {
1979 1979 _kobj_printf(ops, "%s error reading dynamic section\n",
1980 1980 modname);
1981 1981 goto bad;
1982 1982 }
1983 1983
1984 1984 modp->mod_text = mp->text;
1985 1985 modp->mod_text_size = mp->text_size;
1986 1986
1987 1987 /* read in symbols; adjust values for each section's real address */
1988 1988 if (get_syms(mp, file) < 0) {
1989 1989 _kobj_printf(ops, "%s error reading symbols\n",
1990 1990 modname);
1991 1991 goto bad;
1992 1992 }
1993 1993
1994 1994 /*
1995 1995 * If we didn't dependency information from the dynamic section, look
1996 1996 * for it the old-fashioned way.
1997 1997 */
1998 1998 if (mp->depends_on == NULL)
1999 1999 mp->depends_on = depends_on(mp);
2000 2000
2001 2001 if (get_ctf(mp, file) < 0) {
2002 2002 _kobj_printf(ops, "%s debug information will not "
2003 2003 "be available\n", modname);
2004 2004 }
2005 2005
2006 2006 /* primary kernel modules do not have a signature section */
2007 2007 if (!(mp->flags & KOBJ_PRIM))
2008 2008 get_signature(mp, file);
2009 2009
2010 2010 #ifdef KOBJ_DEBUG
2011 2011 if (kobj_debug & D_LOADING) {
2012 2012 _kobj_printf(ops, "krtld: file=%s\n", mp->filename);
2013 2013 _kobj_printf(ops, "\ttext:0x%p", mp->text);
2014 2014 _kobj_printf(ops, " size: 0x%x\n", mp->text_size);
2015 2015 _kobj_printf(ops, "\tdata:0x%p", mp->data);
2016 2016 _kobj_printf(ops, " dsize: 0x%x\n", mp->data_size);
2017 2017 }
2018 2018 #endif /* KOBJ_DEBUG */
2019 2019
2020 2020 /*
2021 2021 * For primary kernel modules, we defer
2022 2022 * symbol resolution and relocation until
2023 2023 * all primary objects have been loaded.
2024 2024 */
2025 2025 if (!standalone) {
2026 2026 int ddrval, dcrval;
2027 2027 char *dependent_modname;
2028 2028 /* load all dependents */
2029 2029 dependent_modname = kobj_zalloc(MODMAXNAMELEN, KM_WAIT);
2030 2030 ddrval = do_dependents(modp, dependent_modname, MODMAXNAMELEN);
2031 2031
2032 2032 /*
2033 2033 * resolve undefined and common symbols,
2034 2034 * also allocates common space
2035 2035 */
2036 2036 if ((dcrval = do_common(mp)) < 0) {
2037 2037 switch (dcrval) {
2038 2038 case DOSYM_UNSAFE:
2039 2039 _kobj_printf(ops, "WARNING: mod_load: "
2040 2040 "MT-unsafe module '%s' rejected\n",
2041 2041 modname);
2042 2042 break;
2043 2043 case DOSYM_UNDEF:
2044 2044 _kobj_printf(ops, "WARNING: mod_load: "
2045 2045 "cannot load module '%s'\n",
2046 2046 modname);
2047 2047 if (ddrval == -1) {
2048 2048 _kobj_printf(ops, "WARNING: %s: ",
2049 2049 modname);
2050 2050 _kobj_printf(ops,
2051 2051 "unable to resolve dependency, "
2052 2052 "module '%s' not found\n",
2053 2053 dependent_modname);
2054 2054 }
2055 2055 break;
2056 2056 }
2057 2057 }
2058 2058 kobj_free(dependent_modname, MODMAXNAMELEN);
2059 2059 if (dcrval < 0)
2060 2060 goto bad;
2061 2061
2062 2062 /* process relocation tables */
2063 2063 if (do_relocations(mp) < 0) {
2064 2064 _kobj_printf(ops, "%s error doing relocations\n",
2065 2065 modname);
2066 2066 goto bad;
2067 2067 }
2068 2068
2069 2069 if (mp->destination) {
2070 2070 off_t off = (uintptr_t)mp->destination & PAGEOFFSET;
2071 2071 caddr_t base = (caddr_t)mp->destination - off;
2072 2072 size_t size = P2ROUNDUP(mp->text_size + off, PAGESIZE);
2073 2073
2074 2074 hat_unload(kas.a_hat, base, size, HAT_UNLOAD_UNLOCK);
2075 2075 vmem_free(heap_arena, base, size);
2076 2076 }
2077 2077
2078 2078 /* sync_instruction_memory */
2079 2079 kobj_sync_instruction_memory(mp->text, mp->text_size);
2080 2080 kobj_export_module(mp);
2081 2081 kobj_notify(KOBJ_NOTIFY_MODLOADED, modp);
2082 2082 }
2083 2083 kobj_close_file(file);
2084 2084 return (0);
2085 2085 bad:
2086 2086 if (file != (struct _buf *)-1)
2087 2087 kobj_close_file(file);
2088 2088 if (modp->mod_mp != NULL)
2089 2089 free_module_data(modp->mod_mp);
2090 2090
2091 2091 module_assign(modp, NULL);
2092 2092 return ((file == (struct _buf *)-1) ? ENOENT : EINVAL);
2093 2093 }
2094 2094
2095 2095 int
2096 2096 kobj_load_primary_module(struct modctl *modp)
2097 2097 {
2098 2098 struct modctl *dep;
2099 2099 struct module *mp;
2100 2100
2101 2101 if (kobj_load_module(modp, 0) != 0)
2102 2102 return (-1);
2103 2103
2104 2104 mp = modp->mod_mp;
2105 2105 mp->flags |= KOBJ_PRIM;
2106 2106
2107 2107 /* Bind new module to its dependents */
2108 2108 if (mp->depends_on != NULL && (dep =
2109 2109 mod_already_loaded(mp->depends_on)) == NULL) {
2110 2110 #ifdef KOBJ_DEBUG
2111 2111 if (kobj_debug & D_DEBUG) {
2112 2112 _kobj_printf(ops, "krtld: failed to resolve deps "
2113 2113 "for primary %s\n", modp->mod_modname);
2114 2114 }
2115 2115 #endif
2116 2116 return (-1);
2117 2117 }
2118 2118
2119 2119 add_dependent(mp, dep->mod_mp);
2120 2120
2121 2121 /*
2122 2122 * Relocate it. This module may not be part of a link map, so we
2123 2123 * can't use bind_primary.
2124 2124 */
2125 2125 if (do_common(mp) < 0 || do_symbols(mp, 0) < 0 ||
2126 2126 do_relocations(mp) < 0) {
2127 2127 #ifdef KOBJ_DEBUG
2128 2128 if (kobj_debug & D_DEBUG) {
2129 2129 _kobj_printf(ops, "krtld: failed to relocate "
2130 2130 "primary %s\n", modp->mod_modname);
2131 2131 }
2132 2132 #endif
2133 2133 return (-1);
2134 2134 }
2135 2135
2136 2136 return (0);
2137 2137 }
2138 2138
2139 2139 static void
2140 2140 module_assign(struct modctl *cp, struct module *mp)
2141 2141 {
2142 2142 if (standalone) {
2143 2143 cp->mod_mp = mp;
2144 2144 return;
2145 2145 }
2146 2146 mutex_enter(&mod_lock);
2147 2147 cp->mod_mp = mp;
2148 2148 cp->mod_gencount++;
2149 2149 mutex_exit(&mod_lock);
2150 2150 }
2151 2151
2152 2152 void
2153 2153 kobj_unload_module(struct modctl *modp)
2154 2154 {
2155 2155 struct module *mp = modp->mod_mp;
2156 2156
2157 2157 if ((_moddebug & MODDEBUG_KEEPTEXT) && mp) {
2158 2158 _kobj_printf(ops, "text for %s ", mp->filename);
2159 2159 _kobj_printf(ops, "was at %p\n", mp->text);
2160 2160 mp->text = NULL; /* don't actually free it */
2161 2161 }
2162 2162
2163 2163 kobj_notify(KOBJ_NOTIFY_MODUNLOADING, modp);
2164 2164
2165 2165 /*
2166 2166 * Null out mod_mp first, so consumers (debuggers) know not to look
2167 2167 * at the module structure any more.
2168 2168 */
2169 2169 mutex_enter(&mod_lock);
2170 2170 modp->mod_mp = NULL;
2171 2171 mutex_exit(&mod_lock);
2172 2172
2173 2173 kobj_notify(KOBJ_NOTIFY_MODUNLOADED, modp);
2174 2174 free_module_data(mp);
2175 2175 }
2176 2176
2177 2177 static void
2178 2178 free_module_data(struct module *mp)
2179 2179 {
2180 2180 struct module_list *lp, *tmp;
2181 2181 int ksyms_exported = 0;
2182 2182
2183 2183 lp = mp->head;
2184 2184 while (lp) {
2185 2185 tmp = lp;
2186 2186 lp = lp->next;
2187 2187 kobj_free((char *)tmp, sizeof (*tmp));
2188 2188 }
2189 2189
2190 2190 rw_enter(&ksyms_lock, RW_WRITER);
2191 2191 if (mp->symspace) {
2192 2192 if (vmem_contains(ksyms_arena, mp->symspace, mp->symsize)) {
2193 2193 vmem_free(ksyms_arena, mp->symspace, mp->symsize);
2194 2194 ksyms_exported = 1;
2195 2195 } else {
2196 2196 if (mp->flags & KOBJ_NOKSYMS)
2197 2197 ksyms_exported = 1;
2198 2198 kobj_free(mp->symspace, mp->symsize);
2199 2199 }
2200 2200 }
2201 2201 rw_exit(&ksyms_lock);
2202 2202
2203 2203 if (mp->ctfdata) {
2204 2204 if (vmem_contains(ctf_arena, mp->ctfdata, mp->ctfsize))
2205 2205 vmem_free(ctf_arena, mp->ctfdata, mp->ctfsize);
2206 2206 else
2207 2207 kobj_free(mp->ctfdata, mp->ctfsize);
2208 2208 }
2209 2209
2210 2210 if (mp->sigdata)
2211 2211 kobj_free(mp->sigdata, mp->sigsize);
2212 2212
2213 2213 /*
2214 2214 * We did not get far enough into kobj_export_ksyms() to free allocated
2215 2215 * buffers because we encounted error conditions. Free the buffers.
2216 2216 */
2217 2217 if ((ksyms_exported == 0) && (mp->shdrs != NULL)) {
2218 2218 uint_t shn;
2219 2219 Shdr *shp;
2220 2220
2221 2221 for (shn = 1; shn < mp->hdr.e_shnum; shn++) {
2222 2222 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize);
2223 2223 switch (shp->sh_type) {
2224 2224 case SHT_RELA:
2225 2225 case SHT_REL:
2226 2226 if (shp->sh_addr != 0)
2227 2227 kobj_free((void *)shp->sh_addr,
2228 2228 shp->sh_size);
2229 2229 break;
2230 2230 }
2231 2231 }
2232 2232 err_free_done:
2233 2233 if (!(mp->flags & KOBJ_PRIM)) {
2234 2234 kobj_free(mp->shdrs,
2235 2235 mp->hdr.e_shentsize * mp->hdr.e_shnum);
2236 2236 }
2237 2237 }
2238 2238
2239 2239 if (mp->bss)
2240 2240 vmem_free(data_arena, (void *)mp->bss, mp->bss_size);
2241 2241
2242 2242 if (mp->fbt_tab)
2243 2243 kobj_texthole_free(mp->fbt_tab, mp->fbt_size);
2244 2244
2245 2245 if (mp->textwin_base)
2246 2246 kobj_textwin_free(mp);
2247 2247
2248 2248 if (mp->sdt_probes != NULL) {
2249 2249 sdt_probedesc_t *sdp = mp->sdt_probes, *next;
2250 2250
2251 2251 while (sdp != NULL) {
2252 2252 next = sdp->sdpd_next;
2253 2253 kobj_free(sdp->sdpd_name, strlen(sdp->sdpd_name) + 1);
2254 2254 kobj_free(sdp, sizeof (sdt_probedesc_t));
2255 2255 sdp = next;
2256 2256 }
2257 2257 }
2258 2258
2259 2259 if (mp->sdt_tab)
2260 2260 kobj_texthole_free(mp->sdt_tab, mp->sdt_size);
2261 2261 if (mp->text)
2262 2262 vmem_free(text_arena, mp->text, mp->text_size);
2263 2263 if (mp->data)
2264 2264 vmem_free(data_arena, mp->data, mp->data_size);
2265 2265 if (mp->depends_on)
2266 2266 kobj_free(mp->depends_on, strlen(mp->depends_on)+1);
2267 2267 if (mp->filename)
2268 2268 kobj_free(mp->filename, strlen(mp->filename)+1);
2269 2269
2270 2270 kobj_free((char *)mp, sizeof (*mp));
2271 2271 }
2272 2272
2273 2273 static int
2274 2274 get_progbits(struct module *mp, struct _buf *file)
2275 2275 {
2276 2276 struct proginfo *tp, *dp, *sdp;
2277 2277 Shdr *shp;
2278 2278 reloc_dest_t dest = NULL;
2279 2279 uintptr_t bits_ptr;
2280 2280 uintptr_t text = 0, data, textptr;
2281 2281 uint_t shn;
2282 2282 int err = -1;
2283 2283
2284 2284 tp = kobj_zalloc(sizeof (struct proginfo), KM_WAIT|KM_TMP);
2285 2285 dp = kobj_zalloc(sizeof (struct proginfo), KM_WAIT|KM_TMP);
2286 2286 sdp = kobj_zalloc(sizeof (struct proginfo), KM_WAIT|KM_TMP);
2287 2287 /*
2288 2288 * loop through sections to find out how much space we need
2289 2289 * for text, data, (also bss that is already assigned)
2290 2290 */
2291 2291 if (get_progbits_size(mp, tp, dp, sdp) < 0)
2292 2292 goto done;
2293 2293
2294 2294 mp->text_size = tp->size;
2295 2295 mp->data_size = dp->size;
2296 2296
2297 2297 if (standalone) {
2298 2298 caddr_t limit = _data;
2299 2299
2300 2300 if (lg_pagesize && _text + lg_pagesize < limit)
2301 2301 limit = _text + lg_pagesize;
2302 2302
2303 2303 mp->text = kobj_segbrk(&_etext, mp->text_size,
2304 2304 tp->align, limit);
2305 2305 /*
2306 2306 * If we can't grow the text segment, try the
2307 2307 * data segment before failing.
2308 2308 */
2309 2309 if (mp->text == NULL) {
2310 2310 mp->text = kobj_segbrk(&_edata, mp->text_size,
2311 2311 tp->align, 0);
2312 2312 }
2313 2313
2314 2314 mp->data = kobj_segbrk(&_edata, mp->data_size, dp->align, 0);
2315 2315
2316 2316 if (mp->text == NULL || mp->data == NULL)
2317 2317 goto done;
2318 2318
2319 2319 } else {
2320 2320 if (text_arena == NULL)
2321 2321 kobj_vmem_init(&text_arena, &data_arena);
2322 2322
2323 2323 /*
2324 2324 * some architectures may want to load the module on a
2325 2325 * page that is currently read only. It may not be
2326 2326 * possible for those architectures to remap their page
2327 2327 * on the fly. So we provide a facility for them to hang
2328 2328 * a private hook where the memory they assign the module
2329 2329 * is not the actual place where the module loads.
2330 2330 *
2331 2331 * In this case there are two addresses that deal with the
2332 2332 * modload.
2333 2333 * 1) the final destination of the module
2334 2334 * 2) the address that is used to view the newly
2335 2335 * loaded module until all the relocations relative to 1
2336 2336 * above are completed.
2337 2337 *
2338 2338 * That is what dest is used for below.
2339 2339 */
2340 2340 mp->text_size += tp->align;
2341 2341 mp->data_size += dp->align;
2342 2342
2343 2343 mp->text = kobj_text_alloc(text_arena, mp->text_size);
2344 2344
2345 2345 /*
2346 2346 * a remap is taking place. Align the text ptr relative
2347 2347 * to the secondary mapping. That is where the bits will
2348 2348 * be read in.
2349 2349 */
2350 2350 if (kvseg.s_base != NULL && !vmem_contains(heaptext_arena,
2351 2351 mp->text, mp->text_size)) {
2352 2352 off_t off = (uintptr_t)mp->text & PAGEOFFSET;
2353 2353 size_t size = P2ROUNDUP(mp->text_size + off, PAGESIZE);
2354 2354 caddr_t map = vmem_alloc(heap_arena, size, VM_SLEEP);
2355 2355 caddr_t orig = mp->text - off;
2356 2356 pgcnt_t pages = size / PAGESIZE;
2357 2357
2358 2358 dest = (reloc_dest_t)(map + off);
2359 2359 text = ALIGN((uintptr_t)dest, tp->align);
2360 2360
2361 2361 while (pages--) {
2362 2362 hat_devload(kas.a_hat, map, PAGESIZE,
2363 2363 hat_getpfnum(kas.a_hat, orig),
2364 2364 PROT_READ | PROT_WRITE | PROT_EXEC,
2365 2365 HAT_LOAD_NOCONSIST | HAT_LOAD_LOCK);
2366 2366 map += PAGESIZE;
2367 2367 orig += PAGESIZE;
2368 2368 }
2369 2369 /*
2370 2370 * Since we set up a non-cacheable mapping, we need
2371 2371 * to flush any old entries in the cache that might
2372 2372 * be left around from the read-only mapping.
2373 2373 */
2374 2374 dcache_flushall();
2375 2375 }
2376 2376 if (mp->data_size)
2377 2377 mp->data = vmem_alloc(data_arena, mp->data_size,
2378 2378 VM_SLEEP | VM_BESTFIT);
2379 2379 }
2380 2380 textptr = (uintptr_t)mp->text;
2381 2381 textptr = ALIGN(textptr, tp->align);
2382 2382 mp->destination = dest;
2383 2383
2384 2384 /*
2385 2385 * This is the case where a remap is not being done.
2386 2386 */
2387 2387 if (text == 0)
2388 2388 text = ALIGN((uintptr_t)mp->text, tp->align);
2389 2389 data = ALIGN((uintptr_t)mp->data, dp->align);
2390 2390
2391 2391 /* now loop though sections assigning addresses and loading the data */
2392 2392 for (shn = 1; shn < mp->hdr.e_shnum; shn++) {
2393 2393 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize);
2394 2394 if (!(shp->sh_flags & SHF_ALLOC))
2395 2395 continue;
2396 2396
2397 2397 if ((shp->sh_flags & SHF_WRITE) == 0)
2398 2398 bits_ptr = text;
2399 2399 else
2400 2400 bits_ptr = data;
2401 2401
2402 2402 bits_ptr = ALIGN(bits_ptr, shp->sh_addralign);
2403 2403
2404 2404 if (shp->sh_type == SHT_NOBITS) {
2405 2405 /*
2406 2406 * Zero bss.
2407 2407 */
2408 2408 bzero((caddr_t)bits_ptr, shp->sh_size);
2409 2409 shp->sh_type = SHT_PROGBITS;
2410 2410 } else {
2411 2411 if (kobj_read_file(file, (char *)bits_ptr,
2412 2412 shp->sh_size, shp->sh_offset) < 0)
2413 2413 goto done;
2414 2414 }
2415 2415
2416 2416 if (shp->sh_flags & SHF_WRITE) {
2417 2417 shp->sh_addr = bits_ptr;
2418 2418 } else {
2419 2419 textptr = ALIGN(textptr, shp->sh_addralign);
2420 2420 shp->sh_addr = textptr;
2421 2421 textptr += shp->sh_size;
2422 2422 }
2423 2423
2424 2424 bits_ptr += shp->sh_size;
2425 2425 if ((shp->sh_flags & SHF_WRITE) == 0)
2426 2426 text = bits_ptr;
2427 2427 else
2428 2428 data = bits_ptr;
2429 2429 }
2430 2430
2431 2431 err = 0;
2432 2432 done:
2433 2433 /*
2434 2434 * Free and mark as freed the section headers here so that
2435 2435 * free_module_data() does not have to worry about this buffer.
2436 2436 *
2437 2437 * This buffer is freed here because one of the possible reasons
2438 2438 * for error is a section with non-zero sh_addr and in that case
2439 2439 * free_module_data() would have no way of recognizing that this
2440 2440 * buffer was unallocated.
2441 2441 */
2442 2442 if (err != 0) {
2443 2443 kobj_free(mp->shdrs, mp->hdr.e_shentsize * mp->hdr.e_shnum);
2444 2444 mp->shdrs = NULL;
2445 2445 }
2446 2446
2447 2447 (void) kobj_free(tp, sizeof (struct proginfo));
2448 2448 (void) kobj_free(dp, sizeof (struct proginfo));
2449 2449 (void) kobj_free(sdp, sizeof (struct proginfo));
2450 2450
2451 2451 return (err);
2452 2452 }
2453 2453
2454 2454 /*
2455 2455 * Go through suppress_sym_list to see if "multiply defined"
2456 2456 * warning of this symbol should be suppressed. Return 1 if
2457 2457 * warning should be suppressed, 0 otherwise.
2458 2458 */
2459 2459 static int
2460 2460 kobj_suppress_warning(char *symname)
2461 2461 {
2462 2462 int i;
2463 2463
2464 2464 for (i = 0; suppress_sym_list[i] != NULL; i++) {
2465 2465 if (strcmp(suppress_sym_list[i], symname) == 0)
2466 2466 return (1);
2467 2467 }
2468 2468
2469 2469 return (0);
2470 2470 }
2471 2471
2472 2472 static int
2473 2473 get_syms(struct module *mp, struct _buf *file)
2474 2474 {
2475 2475 uint_t shn;
2476 2476 Shdr *shp;
2477 2477 uint_t i;
2478 2478 Sym *sp, *ksp;
2479 2479 char *symname;
2480 2480 int dosymtab = 0;
2481 2481
2482 2482 /*
2483 2483 * Find the interesting sections.
2484 2484 */
2485 2485 for (shn = 1; shn < mp->hdr.e_shnum; shn++) {
2486 2486 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize);
2487 2487 switch (shp->sh_type) {
2488 2488 case SHT_SYMTAB:
2489 2489 mp->symtbl_section = shn;
2490 2490 mp->symhdr = shp;
2491 2491 dosymtab++;
2492 2492 break;
2493 2493
2494 2494 case SHT_RELA:
2495 2495 case SHT_REL:
2496 2496 /*
2497 2497 * Already loaded.
2498 2498 */
2499 2499 if (shp->sh_addr)
2500 2500 continue;
2501 2501
2502 2502 /* KM_TMP since kobj_free'd in do_relocations */
2503 2503 shp->sh_addr = (Addr)
2504 2504 kobj_alloc(shp->sh_size, KM_WAIT|KM_TMP);
2505 2505
2506 2506 if (kobj_read_file(file, (char *)shp->sh_addr,
2507 2507 shp->sh_size, shp->sh_offset) < 0) {
2508 2508 _kobj_printf(ops, "krtld: get_syms: %s, ",
2509 2509 mp->filename);
2510 2510 _kobj_printf(ops, "error reading section %d\n",
2511 2511 shn);
2512 2512 return (-1);
2513 2513 }
2514 2514 break;
2515 2515 }
2516 2516 }
2517 2517
2518 2518 /*
2519 2519 * This is true for a stripped executable. In the case of
2520 2520 * 'unix' it can be stripped but it still contains the SHT_DYNSYM,
2521 2521 * and since that symbol information is still present everything
2522 2522 * is just fine.
2523 2523 */
2524 2524 if (!dosymtab) {
2525 2525 if (mp->flags & KOBJ_EXEC)
2526 2526 return (0);
2527 2527 _kobj_printf(ops, "krtld: get_syms: %s ",
2528 2528 mp->filename);
2529 2529 _kobj_printf(ops, "no SHT_SYMTAB symbol table found\n");
2530 2530 return (-1);
2531 2531 }
2532 2532
2533 2533 /*
2534 2534 * get the associated string table header
2535 2535 */
2536 2536 if ((mp->symhdr == 0) || (mp->symhdr->sh_link >= mp->hdr.e_shnum))
2537 2537 return (-1);
2538 2538 mp->strhdr = (Shdr *)
2539 2539 (mp->shdrs + mp->symhdr->sh_link * mp->hdr.e_shentsize);
2540 2540
2541 2541 mp->nsyms = mp->symhdr->sh_size / mp->symhdr->sh_entsize;
2542 2542 mp->hashsize = kobj_gethashsize(mp->nsyms);
2543 2543
2544 2544 /*
2545 2545 * Allocate space for the symbol table, buckets, chains, and strings.
2546 2546 */
2547 2547 mp->symsize = mp->symhdr->sh_size +
2548 2548 (mp->hashsize + mp->nsyms) * sizeof (symid_t) + mp->strhdr->sh_size;
2549 2549 mp->symspace = kobj_zalloc(mp->symsize, KM_WAIT|KM_SCRATCH);
2550 2550
2551 2551 mp->symtbl = mp->symspace;
2552 2552 mp->buckets = (symid_t *)(mp->symtbl + mp->symhdr->sh_size);
2553 2553 mp->chains = mp->buckets + mp->hashsize;
2554 2554 mp->strings = (char *)(mp->chains + mp->nsyms);
2555 2555
2556 2556 if (kobj_read_file(file, mp->symtbl,
2557 2557 mp->symhdr->sh_size, mp->symhdr->sh_offset) < 0 ||
2558 2558 kobj_read_file(file, mp->strings,
2559 2559 mp->strhdr->sh_size, mp->strhdr->sh_offset) < 0)
2560 2560 return (-1);
2561 2561
2562 2562 /*
2563 2563 * loop through the symbol table adjusting values to account
2564 2564 * for where each section got loaded into memory. Also
2565 2565 * fill in the hash table.
2566 2566 */
2567 2567 for (i = 1; i < mp->nsyms; i++) {
2568 2568 sp = (Sym *)(mp->symtbl + i * mp->symhdr->sh_entsize);
2569 2569 if (sp->st_shndx < SHN_LORESERVE) {
2570 2570 if (sp->st_shndx >= mp->hdr.e_shnum) {
2571 2571 _kobj_printf(ops, "%s bad shndx ",
2572 2572 file->_name);
2573 2573 _kobj_printf(ops, "in symbol %d\n", i);
2574 2574 return (-1);
2575 2575 }
2576 2576 shp = (Shdr *)
2577 2577 (mp->shdrs +
2578 2578 sp->st_shndx * mp->hdr.e_shentsize);
2579 2579 if (!(mp->flags & KOBJ_EXEC))
2580 2580 sp->st_value += shp->sh_addr;
2581 2581 }
2582 2582
2583 2583 if (sp->st_name == 0 || sp->st_shndx == SHN_UNDEF)
2584 2584 continue;
2585 2585 if (sp->st_name >= mp->strhdr->sh_size)
2586 2586 return (-1);
2587 2587
2588 2588 symname = mp->strings + sp->st_name;
2589 2589
2590 2590 if (!(mp->flags & KOBJ_EXEC) &&
2591 2591 ELF_ST_BIND(sp->st_info) == STB_GLOBAL) {
2592 2592 ksp = kobj_lookup_all(mp, symname, 0);
2593 2593
2594 2594 if (ksp && ELF_ST_BIND(ksp->st_info) == STB_GLOBAL &&
2595 2595 !kobj_suppress_warning(symname) &&
2596 2596 sp->st_shndx != SHN_UNDEF &&
2597 2597 sp->st_shndx != SHN_COMMON &&
2598 2598 ksp->st_shndx != SHN_UNDEF &&
2599 2599 ksp->st_shndx != SHN_COMMON) {
2600 2600 /*
2601 2601 * Unless this symbol is a stub, it's multiply
2602 2602 * defined. Multiply-defined symbols are
2603 2603 * usually bad, but some objects (kmdb) have
2604 2604 * a legitimate need to have their own
2605 2605 * copies of common functions.
2606 2606 */
2607 2607 if ((standalone ||
2608 2608 ksp->st_value < (uintptr_t)stubs_base ||
2609 2609 ksp->st_value >= (uintptr_t)stubs_end) &&
2610 2610 !(mp->flags & KOBJ_IGNMULDEF)) {
2611 2611 _kobj_printf(ops,
2612 2612 "%s symbol ", file->_name);
2613 2613 _kobj_printf(ops,
2614 2614 "%s multiply defined\n", symname);
2615 2615 }
2616 2616 }
2617 2617 }
2618 2618
2619 2619 sym_insert(mp, symname, i);
2620 2620 }
2621 2621
2622 2622 return (0);
2623 2623 }
2624 2624
2625 2625 static int
2626 2626 get_ctf(struct module *mp, struct _buf *file)
2627 2627 {
2628 2628 char *shstrtab, *ctfdata;
2629 2629 size_t shstrlen;
2630 2630 Shdr *shp;
2631 2631 uint_t i;
2632 2632
2633 2633 if (_moddebug & MODDEBUG_NOCTF)
2634 2634 return (0); /* do not attempt to even load CTF data */
2635 2635
2636 2636 if (mp->hdr.e_shstrndx >= mp->hdr.e_shnum) {
2637 2637 _kobj_printf(ops, "krtld: get_ctf: %s, ",
2638 2638 mp->filename);
2639 2639 _kobj_printf(ops, "corrupt e_shstrndx %u\n",
2640 2640 mp->hdr.e_shstrndx);
2641 2641 return (-1);
2642 2642 }
2643 2643
2644 2644 shp = (Shdr *)(mp->shdrs + mp->hdr.e_shstrndx * mp->hdr.e_shentsize);
2645 2645 shstrlen = shp->sh_size;
2646 2646 shstrtab = kobj_alloc(shstrlen, KM_WAIT|KM_TMP);
2647 2647
2648 2648 if (kobj_read_file(file, shstrtab, shstrlen, shp->sh_offset) < 0) {
2649 2649 _kobj_printf(ops, "krtld: get_ctf: %s, ",
2650 2650 mp->filename);
2651 2651 _kobj_printf(ops, "error reading section %u\n",
2652 2652 mp->hdr.e_shstrndx);
2653 2653 kobj_free(shstrtab, shstrlen);
2654 2654 return (-1);
2655 2655 }
2656 2656
2657 2657 for (i = 0; i < mp->hdr.e_shnum; i++) {
2658 2658 shp = (Shdr *)(mp->shdrs + i * mp->hdr.e_shentsize);
2659 2659
2660 2660 if (shp->sh_size != 0 && shp->sh_name < shstrlen &&
2661 2661 strcmp(shstrtab + shp->sh_name, ".SUNW_ctf") == 0) {
2662 2662 ctfdata = kobj_alloc(shp->sh_size, KM_WAIT|KM_SCRATCH);
2663 2663
2664 2664 if (kobj_read_file(file, ctfdata, shp->sh_size,
2665 2665 shp->sh_offset) < 0) {
2666 2666 _kobj_printf(ops, "krtld: get_ctf: %s, error "
2667 2667 "reading .SUNW_ctf data\n", mp->filename);
2668 2668 kobj_free(ctfdata, shp->sh_size);
2669 2669 kobj_free(shstrtab, shstrlen);
2670 2670 return (-1);
2671 2671 }
2672 2672
2673 2673 mp->ctfdata = ctfdata;
2674 2674 mp->ctfsize = shp->sh_size;
2675 2675 break;
2676 2676 }
2677 2677 }
2678 2678
2679 2679 kobj_free(shstrtab, shstrlen);
2680 2680 return (0);
2681 2681 }
2682 2682
2683 2683 #define SHA1_DIGEST_LENGTH 20 /* SHA1 digest length in bytes */
2684 2684
2685 2685 /*
2686 2686 * Return the hash of the ELF sections that are memory resident.
2687 2687 * i.e. text and data. We skip a SHT_NOBITS section since it occupies
2688 2688 * no space in the file. We use SHA1 here since libelfsign uses
2689 2689 * it and both places need to use the same algorithm.
2690 2690 */
2691 2691 static void
2692 2692 crypto_es_hash(struct module *mp, char *hash, char *shstrtab)
2693 2693 {
2694 2694 uint_t shn;
2695 2695 Shdr *shp;
2696 2696 SHA1_CTX ctx;
2697 2697
2698 2698 SHA1Init(&ctx);
2699 2699
2700 2700 for (shn = 1; shn < mp->hdr.e_shnum; shn++) {
2701 2701 shp = (Shdr *)(mp->shdrs + shn * mp->hdr.e_shentsize);
2702 2702 if (!(shp->sh_flags & SHF_ALLOC) || shp->sh_size == 0)
2703 2703 continue;
2704 2704
2705 2705 /*
2706 2706 * The check should ideally be shp->sh_type == SHT_NOBITS.
2707 2707 * However, we can't do that check here as get_progbits()
2708 2708 * resets the type.
2709 2709 */
2710 2710 if (strcmp(shstrtab + shp->sh_name, ".bss") == 0)
2711 2711 continue;
2712 2712 #ifdef KOBJ_DEBUG
2713 2713 if (kobj_debug & D_DEBUG)
2714 2714 _kobj_printf(ops,
2715 2715 "krtld: crypto_es_hash: updating hash with"
2716 2716 " %s data size=%d\n", shstrtab + shp->sh_name,
2717 2717 shp->sh_size);
2718 2718 #endif
2719 2719 ASSERT(shp->sh_addr != NULL);
2720 2720 SHA1Update(&ctx, (const uint8_t *)shp->sh_addr, shp->sh_size);
2721 2721 }
2722 2722
2723 2723 SHA1Final((uchar_t *)hash, &ctx);
2724 2724 }
2725 2725
2726 2726 /*
2727 2727 * Get the .SUNW_signature section for the module, it it exists.
2728 2728 *
2729 2729 * This section exists only for crypto modules. None of the
2730 2730 * primary modules have this section currently.
2731 2731 */
2732 2732 static void
2733 2733 get_signature(struct module *mp, struct _buf *file)
2734 2734 {
2735 2735 char *shstrtab, *sigdata = NULL;
2736 2736 size_t shstrlen;
2737 2737 Shdr *shp;
2738 2738 uint_t i;
2739 2739
2740 2740 if (mp->hdr.e_shstrndx >= mp->hdr.e_shnum) {
2741 2741 _kobj_printf(ops, "krtld: get_signature: %s, ",
2742 2742 mp->filename);
2743 2743 _kobj_printf(ops, "corrupt e_shstrndx %u\n",
2744 2744 mp->hdr.e_shstrndx);
2745 2745 return;
2746 2746 }
2747 2747
2748 2748 shp = (Shdr *)(mp->shdrs + mp->hdr.e_shstrndx * mp->hdr.e_shentsize);
2749 2749 shstrlen = shp->sh_size;
2750 2750 shstrtab = kobj_alloc(shstrlen, KM_WAIT|KM_TMP);
2751 2751
2752 2752 if (kobj_read_file(file, shstrtab, shstrlen, shp->sh_offset) < 0) {
2753 2753 _kobj_printf(ops, "krtld: get_signature: %s, ",
2754 2754 mp->filename);
2755 2755 _kobj_printf(ops, "error reading section %u\n",
2756 2756 mp->hdr.e_shstrndx);
2757 2757 kobj_free(shstrtab, shstrlen);
2758 2758 return;
2759 2759 }
2760 2760
2761 2761 for (i = 0; i < mp->hdr.e_shnum; i++) {
2762 2762 shp = (Shdr *)(mp->shdrs + i * mp->hdr.e_shentsize);
2763 2763 if (shp->sh_size != 0 && shp->sh_name < shstrlen &&
2764 2764 strcmp(shstrtab + shp->sh_name,
2765 2765 ELF_SIGNATURE_SECTION) == 0) {
2766 2766 filesig_vers_t filesig_version;
2767 2767 size_t sigsize = shp->sh_size + SHA1_DIGEST_LENGTH;
2768 2768 sigdata = kobj_alloc(sigsize, KM_WAIT|KM_SCRATCH);
2769 2769
2770 2770 if (kobj_read_file(file, sigdata, shp->sh_size,
2771 2771 shp->sh_offset) < 0) {
2772 2772 _kobj_printf(ops, "krtld: get_signature: %s,"
2773 2773 " error reading .SUNW_signature data\n",
2774 2774 mp->filename);
2775 2775 kobj_free(sigdata, sigsize);
2776 2776 kobj_free(shstrtab, shstrlen);
2777 2777 return;
2778 2778 }
2779 2779 filesig_version = ((struct filesignatures *)sigdata)->
2780 2780 filesig_sig.filesig_version;
2781 2781 if (!(filesig_version == FILESIG_VERSION1 ||
2782 2782 filesig_version == FILESIG_VERSION3)) {
2783 2783 /* skip versions we don't understand */
2784 2784 kobj_free(sigdata, sigsize);
2785 2785 kobj_free(shstrtab, shstrlen);
2786 2786 return;
2787 2787 }
2788 2788
2789 2789 mp->sigdata = sigdata;
2790 2790 mp->sigsize = sigsize;
2791 2791 break;
2792 2792 }
2793 2793 }
2794 2794
2795 2795 if (sigdata != NULL) {
2796 2796 crypto_es_hash(mp, sigdata + shp->sh_size, shstrtab);
2797 2797 }
2798 2798
2799 2799 kobj_free(shstrtab, shstrlen);
2800 2800 }
2801 2801
2802 2802 static void
2803 2803 add_dependent(struct module *mp, struct module *dep)
2804 2804 {
2805 2805 struct module_list *lp;
2806 2806
2807 2807 for (lp = mp->head; lp; lp = lp->next) {
2808 2808 if (lp->mp == dep)
2809 2809 return; /* already on the list */
2810 2810 }
2811 2811
2812 2812 if (lp == NULL) {
2813 2813 lp = kobj_zalloc(sizeof (*lp), KM_WAIT);
2814 2814
2815 2815 lp->mp = dep;
2816 2816 lp->next = NULL;
2817 2817 if (mp->tail)
2818 2818 mp->tail->next = lp;
2819 2819 else
2820 2820 mp->head = lp;
2821 2821 mp->tail = lp;
2822 2822 }
2823 2823 }
2824 2824
2825 2825 static int
2826 2826 do_dependents(struct modctl *modp, char *modname, size_t modnamelen)
2827 2827 {
2828 2828 struct module *mp;
2829 2829 struct modctl *req;
2830 2830 char *d, *p, *q;
2831 2831 int c;
2832 2832 char *err_modname = NULL;
2833 2833
2834 2834 mp = modp->mod_mp;
2835 2835
2836 2836 if ((p = mp->depends_on) == NULL)
2837 2837 return (0);
2838 2838
2839 2839 for (;;) {
2840 2840 /*
2841 2841 * Skip space.
2842 2842 */
2843 2843 while (*p && (*p == ' ' || *p == '\t'))
2844 2844 p++;
2845 2845 /*
2846 2846 * Get module name.
2847 2847 */
2848 2848 d = p;
2849 2849 q = modname;
2850 2850 c = 0;
2851 2851 while (*p && *p != ' ' && *p != '\t') {
2852 2852 if (c < modnamelen - 1) {
2853 2853 *q++ = *p;
2854 2854 c++;
2855 2855 }
2856 2856 p++;
2857 2857 }
2858 2858
2859 2859 if (q == modname)
2860 2860 break;
2861 2861
2862 2862 if (c == modnamelen - 1) {
2863 2863 char *dep = kobj_alloc(p - d + 1, KM_WAIT|KM_TMP);
2864 2864
2865 2865 (void) strncpy(dep, d, p - d + 1);
2866 2866 dep[p - d] = '\0';
2867 2867
2868 2868 _kobj_printf(ops, "%s: dependency ", modp->mod_modname);
2869 2869 _kobj_printf(ops, "'%s' too long ", dep);
2870 2870 _kobj_printf(ops, "(max %d chars)\n", modnamelen);
2871 2871
2872 2872 kobj_free(dep, p - d + 1);
2873 2873
2874 2874 return (-1);
2875 2875 }
2876 2876
2877 2877 *q = '\0';
2878 2878 if ((req = mod_load_requisite(modp, modname)) == NULL) {
2879 2879 #ifndef KOBJ_DEBUG
2880 2880 if (_moddebug & MODDEBUG_LOADMSG) {
2881 2881 #endif /* KOBJ_DEBUG */
2882 2882 _kobj_printf(ops,
2883 2883 "%s: unable to resolve dependency, ",
2884 2884 modp->mod_modname);
2885 2885 _kobj_printf(ops, "cannot load module '%s'\n",
2886 2886 modname);
2887 2887 #ifndef KOBJ_DEBUG
2888 2888 }
2889 2889 #endif /* KOBJ_DEBUG */
2890 2890 if (err_modname == NULL) {
2891 2891 /*
2892 2892 * This must be the same size as the modname
2893 2893 * one.
2894 2894 */
2895 2895 err_modname = kobj_zalloc(MODMAXNAMELEN,
2896 2896 KM_WAIT);
2897 2897
2898 2898 /*
2899 2899 * We can use strcpy() here without fearing
2900 2900 * the NULL terminator because the size of
2901 2901 * err_modname is the same as one of modname,
2902 2902 * and it's filled with zeros.
2903 2903 */
2904 2904 (void) strcpy(err_modname, modname);
2905 2905 }
2906 2906 continue;
2907 2907 }
2908 2908
2909 2909 add_dependent(mp, req->mod_mp);
2910 2910 mod_release_mod(req);
2911 2911
2912 2912 }
2913 2913
2914 2914 if (err_modname != NULL) {
2915 2915 /*
2916 2916 * Copy the first module name where you detect an error to keep
2917 2917 * its behavior the same as before.
2918 2918 * This way keeps minimizing the memory use for error
2919 2919 * modules, and this might be important at boot time because
2920 2920 * the memory usage is a crucial factor for booting in most
2921 2921 * cases. You can expect more verbose messages when using
2922 2922 * a debug kernel or setting a bit in moddebug.
2923 2923 */
2924 2924 bzero(modname, MODMAXNAMELEN);
2925 2925 (void) strcpy(modname, err_modname);
2926 2926 kobj_free(err_modname, MODMAXNAMELEN);
2927 2927 return (-1);
2928 2928 }
2929 2929
2930 2930 return (0);
2931 2931 }
2932 2932
2933 2933 static int
2934 2934 do_common(struct module *mp)
2935 2935 {
2936 2936 int err;
2937 2937
2938 2938 /*
2939 2939 * first time through, assign all symbols defined in other
2940 2940 * modules, and count up how much common space will be needed
2941 2941 * (bss_size and bss_align)
2942 2942 */
2943 2943 if ((err = do_symbols(mp, 0)) < 0)
2944 2944 return (err);
2945 2945 /*
2946 2946 * increase bss_size by the maximum delta that could be
2947 2947 * computed by the ALIGN below
2948 2948 */
2949 2949 mp->bss_size += mp->bss_align;
2950 2950 if (mp->bss_size) {
2951 2951 if (standalone)
2952 2952 mp->bss = (uintptr_t)kobj_segbrk(&_edata, mp->bss_size,
2953 2953 MINALIGN, 0);
2954 2954 else
2955 2955 mp->bss = (uintptr_t)vmem_alloc(data_arena,
2956 2956 mp->bss_size, VM_SLEEP | VM_BESTFIT);
2957 2957 bzero((void *)mp->bss, mp->bss_size);
2958 2958 /* now assign addresses to all common symbols */
2959 2959 if ((err = do_symbols(mp, ALIGN(mp->bss, mp->bss_align))) < 0)
2960 2960 return (err);
2961 2961 }
2962 2962 return (0);
2963 2963 }
2964 2964
2965 2965 static int
2966 2966 do_symbols(struct module *mp, Elf64_Addr bss_base)
2967 2967 {
2968 2968 int bss_align;
2969 2969 uintptr_t bss_ptr;
2970 2970 int err;
2971 2971 int i;
2972 2972 Sym *sp, *sp1;
2973 2973 char *name;
2974 2974 int assign;
2975 2975 int resolved = 1;
2976 2976
2977 2977 /*
2978 2978 * Nothing left to do (optimization).
2979 2979 */
2980 2980 if (mp->flags & KOBJ_RESOLVED)
2981 2981 return (0);
2982 2982
2983 2983 assign = (bss_base) ? 1 : 0;
2984 2984 bss_ptr = bss_base;
2985 2985 bss_align = 0;
2986 2986 err = 0;
2987 2987
2988 2988 for (i = 1; i < mp->nsyms; i++) {
2989 2989 sp = (Sym *)(mp->symtbl + mp->symhdr->sh_entsize * i);
2990 2990 /*
2991 2991 * we know that st_name is in bounds, since get_sections
2992 2992 * has already checked all of the symbols
2993 2993 */
2994 2994 name = mp->strings + sp->st_name;
2995 2995 if (sp->st_shndx != SHN_UNDEF && sp->st_shndx != SHN_COMMON)
2996 2996 continue;
2997 2997 #if defined(__sparc)
2998 2998 /*
2999 2999 * Register symbols are ignored in the kernel
3000 3000 */
3001 3001 if (ELF_ST_TYPE(sp->st_info) == STT_SPARC_REGISTER) {
3002 3002 if (*name != '\0') {
3003 3003 _kobj_printf(ops, "%s: named REGISTER symbol ",
3004 3004 mp->filename);
3005 3005 _kobj_printf(ops, "not supported '%s'\n",
3006 3006 name);
3007 3007 err = DOSYM_UNDEF;
3008 3008 }
3009 3009 continue;
3010 3010 }
3011 3011 #endif /* __sparc */
3012 3012 /*
3013 3013 * TLS symbols are ignored in the kernel
3014 3014 */
3015 3015 if (ELF_ST_TYPE(sp->st_info) == STT_TLS) {
3016 3016 _kobj_printf(ops, "%s: TLS symbol ",
3017 3017 mp->filename);
3018 3018 _kobj_printf(ops, "not supported '%s'\n",
3019 3019 name);
3020 3020 err = DOSYM_UNDEF;
3021 3021 continue;
3022 3022 }
3023 3023
3024 3024 if (ELF_ST_BIND(sp->st_info) != STB_LOCAL) {
3025 3025 if ((sp1 = kobj_lookup_all(mp, name, 0)) != NULL) {
3026 3026 sp->st_shndx = SHN_ABS;
3027 3027 sp->st_value = sp1->st_value;
3028 3028 continue;
3029 3029 }
3030 3030 }
3031 3031
3032 3032 if (sp->st_shndx == SHN_UNDEF) {
3033 3033 resolved = 0;
3034 3034
3035 3035 if (strncmp(name, sdt_prefix, strlen(sdt_prefix)) == 0)
3036 3036 continue;
3037 3037
3038 3038 /*
3039 3039 * If it's not a weak reference and it's
3040 3040 * not a primary object, it's an error.
3041 3041 * (Primary objects may take more than
3042 3042 * one pass to resolve)
3043 3043 */
3044 3044 if (!(mp->flags & KOBJ_PRIM) &&
3045 3045 ELF_ST_BIND(sp->st_info) != STB_WEAK) {
3046 3046 _kobj_printf(ops, "%s: undefined symbol",
3047 3047 mp->filename);
3048 3048 _kobj_printf(ops, " '%s'\n", name);
3049 3049 /*
3050 3050 * Try to determine whether this symbol
3051 3051 * represents a dependency on obsolete
3052 3052 * unsafe driver support. This is just
3053 3053 * to make the warning more informative.
3054 3054 */
3055 3055 if (strcmp(name, "sleep") == 0 ||
3056 3056 strcmp(name, "unsleep") == 0 ||
3057 3057 strcmp(name, "wakeup") == 0 ||
3058 3058 strcmp(name, "bsd_compat_ioctl") == 0 ||
3059 3059 strcmp(name, "unsafe_driver") == 0 ||
3060 3060 strncmp(name, "spl", 3) == 0 ||
3061 3061 strncmp(name, "i_ddi_spl", 9) == 0)
3062 3062 err = DOSYM_UNSAFE;
3063 3063 if (err == 0)
3064 3064 err = DOSYM_UNDEF;
3065 3065 }
3066 3066 continue;
3067 3067 }
3068 3068 /*
3069 3069 * It's a common symbol - st_value is the
3070 3070 * required alignment.
3071 3071 */
3072 3072 if (sp->st_value > bss_align)
3073 3073 bss_align = sp->st_value;
3074 3074 bss_ptr = ALIGN(bss_ptr, sp->st_value);
3075 3075 if (assign) {
3076 3076 sp->st_shndx = SHN_ABS;
3077 3077 sp->st_value = bss_ptr;
3078 3078 }
3079 3079 bss_ptr += sp->st_size;
3080 3080 }
3081 3081 if (err)
3082 3082 return (err);
3083 3083 if (assign == 0 && mp->bss == NULL) {
3084 3084 mp->bss_align = bss_align;
3085 3085 mp->bss_size = bss_ptr;
3086 3086 } else if (resolved) {
3087 3087 mp->flags |= KOBJ_RESOLVED;
3088 3088 }
3089 3089
3090 3090 return (0);
3091 3091 }
3092 3092
3093 3093 uint_t
3094 3094 kobj_hash_name(const char *p)
3095 3095 {
3096 3096 uint_t g;
3097 3097 uint_t hval;
3098 3098
3099 3099 hval = 0;
3100 3100 while (*p) {
3101 3101 hval = (hval << 4) + *p++;
3102 3102 if ((g = (hval & 0xf0000000)) != 0)
3103 3103 hval ^= g >> 24;
3104 3104 hval &= ~g;
3105 3105 }
3106 3106 return (hval);
3107 3107 }
3108 3108
3109 3109 /* look for name in all modules */
3110 3110 uintptr_t
3111 3111 kobj_getsymvalue(char *name, int kernelonly)
3112 3112 {
3113 3113 Sym *sp;
3114 3114 struct modctl *modp;
3115 3115 struct module *mp;
3116 3116 uintptr_t value = 0;
3117 3117
3118 3118 if ((sp = kobj_lookup_kernel(name)) != NULL)
3119 3119 return ((uintptr_t)sp->st_value);
3120 3120
3121 3121 if (kernelonly)
3122 3122 return (0); /* didn't find it in the kernel so give up */
3123 3123
3124 3124 mutex_enter(&mod_lock);
3125 3125 modp = &modules;
3126 3126 do {
3127 3127 mp = (struct module *)modp->mod_mp;
3128 3128 if (mp && !(mp->flags & KOBJ_PRIM) && modp->mod_loaded &&
3129 3129 (sp = lookup_one(mp, name))) {
3130 3130 value = (uintptr_t)sp->st_value;
3131 3131 break;
3132 3132 }
3133 3133 } while ((modp = modp->mod_next) != &modules);
3134 3134 mutex_exit(&mod_lock);
3135 3135 return (value);
3136 3136 }
3137 3137
3138 3138 /* look for a symbol near value. */
3139 3139 char *
3140 3140 kobj_getsymname(uintptr_t value, ulong_t *offset)
3141 3141 {
3142 3142 char *name = NULL;
3143 3143 struct modctl *modp;
3144 3144
3145 3145 struct modctl_list *lp;
3146 3146 struct module *mp;
3147 3147
3148 3148 /*
3149 3149 * Loop through the primary kernel modules.
3150 3150 */
3151 3151 for (lp = kobj_lm_lookup(KOBJ_LM_PRIMARY); lp; lp = lp->modl_next) {
3152 3152 mp = mod(lp);
3153 3153
3154 3154 if ((name = kobj_searchsym(mp, value, offset)) != NULL)
3155 3155 return (name);
3156 3156 }
3157 3157
3158 3158 mutex_enter(&mod_lock);
3159 3159 modp = &modules;
3160 3160 do {
3161 3161 mp = (struct module *)modp->mod_mp;
3162 3162 if (mp && !(mp->flags & KOBJ_PRIM) && modp->mod_loaded &&
3163 3163 (name = kobj_searchsym(mp, value, offset)))
3164 3164 break;
3165 3165 } while ((modp = modp->mod_next) != &modules);
3166 3166 mutex_exit(&mod_lock);
3167 3167 return (name);
3168 3168 }
3169 3169
3170 3170 /* return address of symbol and size */
3171 3171
3172 3172 uintptr_t
3173 3173 kobj_getelfsym(char *name, void *mp, int *size)
3174 3174 {
3175 3175 Sym *sp;
3176 3176
3177 3177 if (mp == NULL)
3178 3178 sp = kobj_lookup_kernel(name);
3179 3179 else
3180 3180 sp = lookup_one(mp, name);
3181 3181
3182 3182 if (sp == NULL)
3183 3183 return (0);
3184 3184
3185 3185 *size = (int)sp->st_size;
3186 3186 return ((uintptr_t)sp->st_value);
3187 3187 }
3188 3188
3189 3189 uintptr_t
3190 3190 kobj_lookup(struct module *mod, const char *name)
3191 3191 {
3192 3192 Sym *sp;
3193 3193
3194 3194 sp = lookup_one(mod, name);
3195 3195
3196 3196 if (sp == NULL)
3197 3197 return (0);
3198 3198
3199 3199 return ((uintptr_t)sp->st_value);
3200 3200 }
3201 3201
3202 3202 char *
3203 3203 kobj_searchsym(struct module *mp, uintptr_t value, ulong_t *offset)
3204 3204 {
3205 3205 Sym *symtabptr;
3206 3206 char *strtabptr;
3207 3207 int symnum;
3208 3208 Sym *sym;
3209 3209 Sym *cursym;
3210 3210 uintptr_t curval;
3211 3211
3212 3212 *offset = (ulong_t)-1l; /* assume not found */
3213 3213 cursym = NULL;
3214 3214
3215 3215 if (kobj_addrcheck(mp, (void *)value) != 0)
3216 3216 return (NULL); /* not in this module */
3217 3217
3218 3218 strtabptr = mp->strings;
3219 3219 symtabptr = (Sym *)mp->symtbl;
3220 3220
3221 3221 /*
3222 3222 * Scan the module's symbol table for a symbol <= value
3223 3223 */
3224 3224 for (symnum = 1, sym = symtabptr + 1;
3225 3225 symnum < mp->nsyms; symnum++, sym = (Sym *)
3226 3226 ((uintptr_t)sym + mp->symhdr->sh_entsize)) {
3227 3227 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL) {
3228 3228 if (ELF_ST_BIND(sym->st_info) != STB_LOCAL)
3229 3229 continue;
3230 3230 if (ELF_ST_TYPE(sym->st_info) != STT_OBJECT &&
3231 3231 ELF_ST_TYPE(sym->st_info) != STT_FUNC)
3232 3232 continue;
3233 3233 }
3234 3234
3235 3235 curval = (uintptr_t)sym->st_value;
3236 3236
3237 3237 if (curval > value)
3238 3238 continue;
3239 3239
3240 3240 /*
3241 3241 * If one or both are functions...
3242 3242 */
3243 3243 if (ELF_ST_TYPE(sym->st_info) == STT_FUNC || (cursym != NULL &&
3244 3244 ELF_ST_TYPE(cursym->st_info) == STT_FUNC)) {
3245 3245 /* Ignore if the address is out of the bounds */
3246 3246 if (value - sym->st_value >= sym->st_size)
3247 3247 continue;
3248 3248
3249 3249 if (cursym != NULL &&
3250 3250 ELF_ST_TYPE(cursym->st_info) == STT_FUNC) {
3251 3251 /* Prefer the function to the non-function */
3252 3252 if (ELF_ST_TYPE(sym->st_info) != STT_FUNC)
3253 3253 continue;
3254 3254
3255 3255 /* Prefer the larger of the two functions */
3256 3256 if (sym->st_size <= cursym->st_size)
3257 3257 continue;
3258 3258 }
3259 3259 } else if (value - curval >= *offset) {
3260 3260 continue;
3261 3261 }
3262 3262
3263 3263 *offset = (ulong_t)(value - curval);
3264 3264 cursym = sym;
3265 3265 }
3266 3266 if (cursym == NULL)
3267 3267 return (NULL);
3268 3268
3269 3269 return (strtabptr + cursym->st_name);
3270 3270 }
3271 3271
3272 3272 Sym *
3273 3273 kobj_lookup_all(struct module *mp, char *name, int include_self)
3274 3274 {
3275 3275 Sym *sp;
3276 3276 struct module_list *mlp;
3277 3277 struct modctl_list *clp;
3278 3278 struct module *mmp;
3279 3279
3280 3280 if (include_self && (sp = lookup_one(mp, name)) != NULL)
3281 3281 return (sp);
3282 3282
3283 3283 for (mlp = mp->head; mlp; mlp = mlp->next) {
3284 3284 if ((sp = lookup_one(mlp->mp, name)) != NULL &&
3285 3285 ELF_ST_BIND(sp->st_info) != STB_LOCAL)
3286 3286 return (sp);
3287 3287 }
3288 3288
3289 3289 /*
3290 3290 * Loop through the primary kernel modules.
3291 3291 */
3292 3292 for (clp = kobj_lm_lookup(KOBJ_LM_PRIMARY); clp; clp = clp->modl_next) {
3293 3293 mmp = mod(clp);
3294 3294
3295 3295 if (mmp == NULL || mp == mmp)
3296 3296 continue;
3297 3297
3298 3298 if ((sp = lookup_one(mmp, name)) != NULL &&
3299 3299 ELF_ST_BIND(sp->st_info) != STB_LOCAL)
3300 3300 return (sp);
3301 3301 }
3302 3302 return (NULL);
3303 3303 }
3304 3304
3305 3305 Sym *
3306 3306 kobj_lookup_kernel(const char *name)
3307 3307 {
3308 3308 struct modctl_list *lp;
3309 3309 struct module *mp;
3310 3310 Sym *sp;
3311 3311
3312 3312 /*
3313 3313 * Loop through the primary kernel modules.
3314 3314 */
3315 3315 for (lp = kobj_lm_lookup(KOBJ_LM_PRIMARY); lp; lp = lp->modl_next) {
3316 3316 mp = mod(lp);
3317 3317
3318 3318 if (mp == NULL)
3319 3319 continue;
3320 3320
3321 3321 if ((sp = lookup_one(mp, name)) != NULL)
3322 3322 return (sp);
3323 3323 }
3324 3324 return (NULL);
3325 3325 }
3326 3326
3327 3327 static Sym *
3328 3328 lookup_one(struct module *mp, const char *name)
3329 3329 {
3330 3330 symid_t *ip;
3331 3331 char *name1;
3332 3332 Sym *sp;
3333 3333
3334 3334 for (ip = &mp->buckets[kobj_hash_name(name) % mp->hashsize]; *ip;
3335 3335 ip = &mp->chains[*ip]) {
3336 3336 sp = (Sym *)(mp->symtbl +
3337 3337 mp->symhdr->sh_entsize * *ip);
3338 3338 name1 = mp->strings + sp->st_name;
3339 3339 if (strcmp(name, name1) == 0 &&
3340 3340 ELF_ST_TYPE(sp->st_info) != STT_FILE &&
3341 3341 sp->st_shndx != SHN_UNDEF &&
3342 3342 sp->st_shndx != SHN_COMMON)
3343 3343 return (sp);
3344 3344 }
3345 3345 return (NULL);
3346 3346 }
3347 3347
3348 3348 /*
3349 3349 * Lookup a given symbol pointer in the module's symbol hash. If the symbol
3350 3350 * is hashed, return the symbol pointer; otherwise return NULL.
3351 3351 */
3352 3352 static Sym *
3353 3353 sym_lookup(struct module *mp, Sym *ksp)
3354 3354 {
3355 3355 char *name = mp->strings + ksp->st_name;
3356 3356 symid_t *ip;
3357 3357 Sym *sp;
3358 3358
3359 3359 for (ip = &mp->buckets[kobj_hash_name(name) % mp->hashsize]; *ip;
3360 3360 ip = &mp->chains[*ip]) {
3361 3361 sp = (Sym *)(mp->symtbl + mp->symhdr->sh_entsize * *ip);
3362 3362 if (sp == ksp)
3363 3363 return (ksp);
3364 3364 }
3365 3365 return (NULL);
3366 3366 }
3367 3367
3368 3368 static void
3369 3369 sym_insert(struct module *mp, char *name, symid_t index)
3370 3370 {
3371 3371 symid_t *ip;
3372 3372
3373 3373 #ifdef KOBJ_DEBUG
3374 3374 if (kobj_debug & D_SYMBOLS) {
3375 3375 static struct module *lastmp = NULL;
3376 3376 Sym *sp;
3377 3377 if (lastmp != mp) {
3378 3378 _kobj_printf(ops,
3379 3379 "krtld: symbol entry: file=%s\n",
3380 3380 mp->filename);
3381 3381 _kobj_printf(ops,
3382 3382 "krtld:\tsymndx\tvalue\t\t"
3383 3383 "symbol name\n");
3384 3384 lastmp = mp;
3385 3385 }
3386 3386 sp = (Sym *)(mp->symtbl +
3387 3387 index * mp->symhdr->sh_entsize);
3388 3388 _kobj_printf(ops, "krtld:\t[%3d]", index);
3389 3389 _kobj_printf(ops, "\t0x%lx", sp->st_value);
3390 3390 _kobj_printf(ops, "\t%s\n", name);
3391 3391 }
3392 3392
3393 3393 #endif
3394 3394 for (ip = &mp->buckets[kobj_hash_name(name) % mp->hashsize]; *ip;
3395 3395 ip = &mp->chains[*ip]) {
3396 3396 ;
3397 3397 }
3398 3398 *ip = index;
3399 3399 }
3400 3400
3401 3401 struct modctl *
3402 3402 kobj_boot_mod_lookup(const char *modname)
3403 3403 {
3404 3404 struct modctl *mctl = kobj_modules;
3405 3405
3406 3406 do {
3407 3407 if (strcmp(modname, mctl->mod_modname) == 0)
3408 3408 return (mctl);
3409 3409 } while ((mctl = mctl->mod_next) != kobj_modules);
3410 3410
3411 3411 return (NULL);
3412 3412 }
3413 3413
3414 3414 /*
3415 3415 * Determine if the module exists.
3416 3416 */
3417 3417 int
3418 3418 kobj_path_exists(char *name, int use_path)
3419 3419 {
3420 3420 struct _buf *file;
3421 3421
3422 3422 file = kobj_open_path(name, use_path, 1);
3423 3423 #ifdef MODDIR_SUFFIX
3424 3424 if (file == (struct _buf *)-1)
3425 3425 file = kobj_open_path(name, use_path, 0);
3426 3426 #endif /* MODDIR_SUFFIX */
3427 3427 if (file == (struct _buf *)-1)
3428 3428 return (0);
3429 3429 kobj_close_file(file);
3430 3430 return (1);
3431 3431 }
3432 3432
3433 3433 /*
3434 3434 * fullname is dynamically allocated to be able to hold the
3435 3435 * maximum size string that can be constructed from name.
3436 3436 * path is exactly like the shell PATH variable.
3437 3437 */
3438 3438 struct _buf *
3439 3439 kobj_open_path(char *name, int use_path, int use_moddir_suffix)
3440 3440 {
3441 3441 char *p, *q;
3442 3442 char *pathp;
3443 3443 char *pathpsave;
3444 3444 char *fullname;
3445 3445 int maxpathlen;
3446 3446 struct _buf *file;
3447 3447
3448 3448 #if !defined(MODDIR_SUFFIX)
3449 3449 use_moddir_suffix = B_FALSE;
3450 3450 #endif
3451 3451
3452 3452 if (!use_path)
3453 3453 pathp = ""; /* use name as specified */
3454 3454 else
3455 3455 pathp = kobj_module_path;
3456 3456 /* use configured default path */
3457 3457
3458 3458 pathpsave = pathp; /* keep this for error reporting */
3459 3459
3460 3460 /*
3461 3461 * Allocate enough space for the largest possible fullname.
3462 3462 * since path is of the form <directory> : <directory> : ...
3463 3463 * we're potentially allocating a little more than we need to
3464 3464 * but we'll allocate the exact amount when we find the right directory.
3465 3465 * (The + 3 below is one for NULL terminator and one for the '/'
3466 3466 * we might have to add at the beginning of path and one for
3467 3467 * the '/' between path and name.)
3468 3468 */
3469 3469 maxpathlen = strlen(pathp) + strlen(name) + 3;
3470 3470 /* sizeof includes null */
3471 3471 maxpathlen += sizeof (slash_moddir_suffix_slash) - 1;
3472 3472 fullname = kobj_zalloc(maxpathlen, KM_WAIT);
3473 3473
3474 3474 for (;;) {
3475 3475 p = fullname;
3476 3476 if (*pathp != '\0' && *pathp != '/')
3477 3477 *p++ = '/'; /* path must start with '/' */
3478 3478 while (*pathp && *pathp != ':' && *pathp != ' ')
3479 3479 *p++ = *pathp++;
3480 3480 if (p != fullname && p[-1] != '/')
3481 3481 *p++ = '/';
3482 3482 if (use_moddir_suffix) {
3483 3483 char *b = basename(name);
3484 3484 char *s;
3485 3485
3486 3486 /* copy everything up to the base name */
3487 3487 q = name;
3488 3488 while (q != b && *q)
3489 3489 *p++ = *q++;
3490 3490 s = slash_moddir_suffix_slash;
3491 3491 while (*s)
3492 3492 *p++ = *s++;
3493 3493 /* copy the rest */
3494 3494 while (*b)
3495 3495 *p++ = *b++;
3496 3496 } else {
3497 3497 q = name;
3498 3498 while (*q)
3499 3499 *p++ = *q++;
3500 3500 }
3501 3501 *p = 0;
3502 3502 if ((file = kobj_open_file(fullname)) != (struct _buf *)-1) {
3503 3503 kobj_free(fullname, maxpathlen);
3504 3504 return (file);
3505 3505 }
3506 3506 while (*pathp == ' ' || *pathp == ':')
3507 3507 pathp++;
3508 3508 if (*pathp == 0)
3509 3509 break;
3510 3510
3511 3511 }
3512 3512 kobj_free(fullname, maxpathlen);
3513 3513 if (_moddebug & MODDEBUG_ERRMSG) {
3514 3514 _kobj_printf(ops, "can't open %s,", name);
3515 3515 _kobj_printf(ops, " path is %s\n", pathpsave);
3516 3516 }
3517 3517 return ((struct _buf *)-1);
3518 3518 }
3519 3519
3520 3520 intptr_t
3521 3521 kobj_open(char *filename)
3522 3522 {
3523 3523 struct vnode *vp;
3524 3524 int fd;
3525 3525
3526 3526 if (_modrootloaded) {
3527 3527 struct kobjopen_tctl *ltp = kobjopen_alloc(filename);
3528 3528 int Errno;
3529 3529
3530 3530 /*
3531 3531 * Hand off the open to a thread who has a
3532 3532 * stack size capable handling the request.
3533 3533 */
3534 3534 if (curthread != &t0) {
3535 3535 (void) thread_create(NULL, DEFAULTSTKSZ * 2,
3536 3536 kobjopen_thread, ltp, 0, &p0, TS_RUN, maxclsyspri);
3537 3537 sema_p(<p->sema);
3538 3538 Errno = ltp->Errno;
3539 3539 vp = ltp->vp;
3540 3540 } else {
3541 3541 /*
3542 3542 * 1098067: module creds should not be those of the
3543 3543 * caller
3544 3544 */
3545 3545 cred_t *saved_cred = curthread->t_cred;
3546 3546 curthread->t_cred = kcred;
3547 3547 Errno = vn_openat(filename, UIO_SYSSPACE, FREAD, 0, &vp,
3548 3548 0, 0, rootdir, -1);
3549 3549 curthread->t_cred = saved_cred;
3550 3550 }
3551 3551 kobjopen_free(ltp);
3552 3552
3553 3553 if (Errno) {
3554 3554 if (_moddebug & MODDEBUG_ERRMSG) {
3555 3555 _kobj_printf(ops,
3556 3556 "kobj_open: vn_open of %s fails, ",
3557 3557 filename);
3558 3558 _kobj_printf(ops, "Errno = %d\n", Errno);
3559 3559 }
3560 3560 return (-1);
3561 3561 } else {
3562 3562 if (_moddebug & MODDEBUG_ERRMSG) {
3563 3563 _kobj_printf(ops, "kobj_open: '%s'", filename);
3564 3564 _kobj_printf(ops, " vp = %p\n", vp);
3565 3565 }
3566 3566 return ((intptr_t)vp);
3567 3567 }
3568 3568 } else {
3569 3569 fd = kobj_boot_open(filename, 0);
3570 3570
3571 3571 if (_moddebug & MODDEBUG_ERRMSG) {
3572 3572 if (fd < 0)
3573 3573 _kobj_printf(ops,
3574 3574 "kobj_open: can't open %s\n", filename);
3575 3575 else {
3576 3576 _kobj_printf(ops, "kobj_open: '%s'", filename);
3577 3577 _kobj_printf(ops, " descr = 0x%x\n", fd);
3578 3578 }
3579 3579 }
3580 3580 return ((intptr_t)fd);
3581 3581 }
3582 3582 }
3583 3583
3584 3584 /*
3585 3585 * Calls to kobj_open() are handled off to this routine as a separate thread.
3586 3586 */
3587 3587 static void
3588 3588 kobjopen_thread(struct kobjopen_tctl *ltp)
3589 3589 {
3590 3590 kmutex_t cpr_lk;
3591 3591 callb_cpr_t cpr_i;
3592 3592
3593 3593 mutex_init(&cpr_lk, NULL, MUTEX_DEFAULT, NULL);
3594 3594 CALLB_CPR_INIT(&cpr_i, &cpr_lk, callb_generic_cpr, "kobjopen");
3595 3595 ltp->Errno = vn_open(ltp->name, UIO_SYSSPACE, FREAD, 0, &(ltp->vp),
3596 3596 0, 0);
3597 3597 sema_v(<p->sema);
3598 3598 mutex_enter(&cpr_lk);
3599 3599 CALLB_CPR_EXIT(&cpr_i);
3600 3600 mutex_destroy(&cpr_lk);
3601 3601 thread_exit();
3602 3602 }
3603 3603
3604 3604 /*
3605 3605 * allocate and initialize a kobjopen thread structure
3606 3606 */
3607 3607 static struct kobjopen_tctl *
3608 3608 kobjopen_alloc(char *filename)
3609 3609 {
3610 3610 struct kobjopen_tctl *ltp = kmem_zalloc(sizeof (*ltp), KM_SLEEP);
3611 3611
3612 3612 ASSERT(filename != NULL);
3613 3613
3614 3614 ltp->name = kmem_alloc(strlen(filename) + 1, KM_SLEEP);
3615 3615 bcopy(filename, ltp->name, strlen(filename) + 1);
3616 3616 sema_init(<p->sema, 0, NULL, SEMA_DEFAULT, NULL);
3617 3617 return (ltp);
3618 3618 }
3619 3619
3620 3620 /*
3621 3621 * free a kobjopen thread control structure
3622 3622 */
3623 3623 static void
3624 3624 kobjopen_free(struct kobjopen_tctl *ltp)
3625 3625 {
3626 3626 sema_destroy(<p->sema);
3627 3627 kmem_free(ltp->name, strlen(ltp->name) + 1);
3628 3628 kmem_free(ltp, sizeof (*ltp));
3629 3629 }
3630 3630
3631 3631 int
3632 3632 kobj_read(intptr_t descr, char *buf, uint_t size, uint_t offset)
3633 3633 {
3634 3634 int stat;
3635 3635 ssize_t resid;
3636 3636
3637 3637 if (_modrootloaded) {
3638 3638 if ((stat = vn_rdwr(UIO_READ, (struct vnode *)descr, buf, size,
3639 3639 (offset_t)offset, UIO_SYSSPACE, 0, (rlim64_t)0, CRED(),
3640 3640 &resid)) != 0) {
3641 3641 _kobj_printf(ops,
3642 3642 "vn_rdwr failed with error 0x%x\n", stat);
3643 3643 return (-1);
3644 3644 }
3645 3645 return (size - resid);
3646 3646 } else {
3647 3647 int count = 0;
3648 3648
3649 3649 if (kobj_boot_seek((int)descr, (off_t)0, offset) != 0) {
3650 3650 _kobj_printf(ops,
3651 3651 "kobj_read: seek 0x%x failed\n", offset);
3652 3652 return (-1);
3653 3653 }
3654 3654
3655 3655 count = kobj_boot_read((int)descr, buf, size);
3656 3656 if (count < size) {
3657 3657 if (_moddebug & MODDEBUG_ERRMSG) {
3658 3658 _kobj_printf(ops,
3659 3659 "kobj_read: req %d bytes, ", size);
3660 3660 _kobj_printf(ops, "got %d\n", count);
3661 3661 }
3662 3662 }
3663 3663 return (count);
3664 3664 }
3665 3665 }
3666 3666
3667 3667 void
3668 3668 kobj_close(intptr_t descr)
3669 3669 {
3670 3670 if (_moddebug & MODDEBUG_ERRMSG)
3671 3671 _kobj_printf(ops, "kobj_close: 0x%lx\n", descr);
3672 3672
3673 3673 if (_modrootloaded) {
3674 3674 struct vnode *vp = (struct vnode *)descr;
3675 3675 (void) VOP_CLOSE(vp, FREAD, 1, (offset_t)0, CRED(), NULL);
3676 3676 VN_RELE(vp);
3677 3677 } else
3678 3678 (void) kobj_boot_close((int)descr);
3679 3679 }
3680 3680
3681 3681 int
3682 3682 kobj_fstat(intptr_t descr, struct bootstat *buf)
3683 3683 {
3684 3684 if (buf == NULL)
3685 3685 return (-1);
3686 3686
3687 3687 if (_modrootloaded) {
3688 3688 vattr_t vattr;
3689 3689 struct vnode *vp = (struct vnode *)descr;
3690 3690 if (VOP_GETATTR(vp, &vattr, 0, kcred, NULL) != 0)
3691 3691 return (-1);
3692 3692
3693 3693 /*
3694 3694 * The vattr and bootstat structures are similar, but not
3695 3695 * identical. We do our best to fill in the bootstat structure
3696 3696 * from the contents of vattr (transfering only the ones that
3697 3697 * are obvious.
3698 3698 */
3699 3699
3700 3700 buf->st_mode = (uint32_t)vattr.va_mode;
3701 3701 buf->st_nlink = (uint32_t)vattr.va_nlink;
3702 3702 buf->st_uid = (int32_t)vattr.va_uid;
3703 3703 buf->st_gid = (int32_t)vattr.va_gid;
3704 3704 buf->st_rdev = (uint64_t)vattr.va_rdev;
3705 3705 buf->st_size = (uint64_t)vattr.va_size;
3706 3706 buf->st_atim.tv_sec = (int64_t)vattr.va_atime.tv_sec;
3707 3707 buf->st_atim.tv_nsec = (int64_t)vattr.va_atime.tv_nsec;
3708 3708 buf->st_mtim.tv_sec = (int64_t)vattr.va_mtime.tv_sec;
3709 3709 buf->st_mtim.tv_nsec = (int64_t)vattr.va_mtime.tv_nsec;
3710 3710 buf->st_ctim.tv_sec = (int64_t)vattr.va_ctime.tv_sec;
3711 3711 buf->st_ctim.tv_nsec = (int64_t)vattr.va_ctime.tv_nsec;
3712 3712 buf->st_blksize = (int32_t)vattr.va_blksize;
3713 3713 buf->st_blocks = (int64_t)vattr.va_nblocks;
3714 3714
3715 3715 return (0);
3716 3716 }
3717 3717
3718 3718 return (kobj_boot_fstat((int)descr, buf));
3719 3719 }
3720 3720
3721 3721
3722 3722 struct _buf *
3723 3723 kobj_open_file(char *name)
3724 3724 {
3725 3725 struct _buf *file;
3726 3726 struct compinfo cbuf;
3727 3727 intptr_t fd;
3728 3728
3729 3729 if ((fd = kobj_open(name)) == -1) {
3730 3730 return ((struct _buf *)-1);
3731 3731 }
3732 3732
3733 3733 file = kobj_zalloc(sizeof (struct _buf), KM_WAIT|KM_TMP);
3734 3734 file->_fd = fd;
3735 3735 file->_name = kobj_alloc(strlen(name)+1, KM_WAIT|KM_TMP);
3736 3736 file->_cnt = file->_size = file->_off = 0;
3737 3737 file->_ln = 1;
3738 3738 file->_ptr = file->_base;
3739 3739 (void) strcpy(file->_name, name);
3740 3740
3741 3741 /*
3742 3742 * Before root is mounted, we must check
3743 3743 * for a compressed file and do our own
3744 3744 * buffering.
3745 3745 */
3746 3746 if (_modrootloaded) {
3747 3747 file->_base = kobj_zalloc(MAXBSIZE, KM_WAIT);
3748 3748 file->_bsize = MAXBSIZE;
3749 3749
3750 3750 /* Check if the file is compressed */
3751 3751 file->_iscmp = kobj_is_compressed(fd);
3752 3752 } else {
3753 3753 if (kobj_boot_compinfo(fd, &cbuf) != 0) {
3754 3754 kobj_close_file(file);
3755 3755 return ((struct _buf *)-1);
3756 3756 }
3757 3757 file->_iscmp = cbuf.iscmp;
3758 3758 if (file->_iscmp) {
3759 3759 if (kobj_comp_setup(file, &cbuf) != 0) {
3760 3760 kobj_close_file(file);
3761 3761 return ((struct _buf *)-1);
3762 3762 }
3763 3763 } else {
3764 3764 file->_base = kobj_zalloc(cbuf.blksize, KM_WAIT|KM_TMP);
3765 3765 file->_bsize = cbuf.blksize;
3766 3766 }
3767 3767 }
3768 3768 return (file);
3769 3769 }
3770 3770
3771 3771 static int
3772 3772 kobj_comp_setup(struct _buf *file, struct compinfo *cip)
3773 3773 {
3774 3774 struct comphdr *hdr;
3775 3775
3776 3776 /*
3777 3777 * read the compressed image into memory,
3778 3778 * so we can deompress from there
3779 3779 */
↓ open down ↓ |
3779 lines elided |
↑ open up ↑ |
3780 3780 file->_dsize = cip->fsize;
3781 3781 file->_dbuf = kobj_alloc(cip->fsize, KM_WAIT|KM_TMP);
3782 3782 if (kobj_read(file->_fd, file->_dbuf, cip->fsize, 0) != cip->fsize) {
3783 3783 kobj_free(file->_dbuf, cip->fsize);
3784 3784 return (-1);
3785 3785 }
3786 3786
3787 3787 hdr = kobj_comphdr(file);
3788 3788 if (hdr->ch_magic != CH_MAGIC_ZLIB || hdr->ch_version != CH_VERSION ||
3789 3789 hdr->ch_algorithm != CH_ALG_ZLIB || hdr->ch_fsize == 0 ||
3790 - (hdr->ch_blksize & (hdr->ch_blksize - 1)) != 0) {
3790 + !ISP2(hdr->ch_blksize)) {
3791 3791 kobj_free(file->_dbuf, cip->fsize);
3792 3792 return (-1);
3793 3793 }
3794 3794 file->_base = kobj_alloc(hdr->ch_blksize, KM_WAIT|KM_TMP);
3795 3795 file->_bsize = hdr->ch_blksize;
3796 3796 return (0);
3797 3797 }
3798 3798
3799 3799 void
3800 3800 kobj_close_file(struct _buf *file)
3801 3801 {
3802 3802 kobj_close(file->_fd);
3803 3803 if (file->_base != NULL)
3804 3804 kobj_free(file->_base, file->_bsize);
3805 3805 if (file->_dbuf != NULL)
3806 3806 kobj_free(file->_dbuf, file->_dsize);
3807 3807 kobj_free(file->_name, strlen(file->_name)+1);
3808 3808 kobj_free(file, sizeof (struct _buf));
3809 3809 }
3810 3810
3811 3811 int
3812 3812 kobj_read_file(struct _buf *file, char *buf, uint_t size, uint_t off)
3813 3813 {
3814 3814 int b_size, c_size;
3815 3815 int b_off; /* Offset into buffer for start of bcopy */
3816 3816 int count = 0;
3817 3817 int page_addr;
3818 3818
3819 3819 if (_moddebug & MODDEBUG_ERRMSG) {
3820 3820 _kobj_printf(ops, "kobj_read_file: size=%x,", size);
3821 3821 _kobj_printf(ops, " offset=%x at", off);
3822 3822 _kobj_printf(ops, " buf=%x\n", buf);
3823 3823 }
3824 3824
3825 3825 /*
3826 3826 * Handle compressed (gzip for now) file here. First get the
3827 3827 * compressed size, then read the image into memory and finally
3828 3828 * call zlib to decompress the image at the supplied memory buffer.
3829 3829 */
3830 3830 if (file->_iscmp == CH_MAGIC_GZIP) {
3831 3831 ulong_t dlen;
3832 3832 vattr_t vattr;
3833 3833 struct vnode *vp = (struct vnode *)file->_fd;
3834 3834 ssize_t resid;
3835 3835 int err = 0;
3836 3836
3837 3837 if (VOP_GETATTR(vp, &vattr, 0, kcred, NULL) != 0)
3838 3838 return (-1);
3839 3839
3840 3840 file->_dbuf = kobj_alloc(vattr.va_size, KM_WAIT|KM_TMP);
3841 3841 file->_dsize = vattr.va_size;
3842 3842
3843 3843 /* Read the compressed file into memory */
3844 3844 if ((err = vn_rdwr(UIO_READ, vp, file->_dbuf, vattr.va_size,
3845 3845 (offset_t)(0), UIO_SYSSPACE, 0, (rlim64_t)0, CRED(),
3846 3846 &resid)) != 0) {
3847 3847
3848 3848 _kobj_printf(ops, "kobj_read_file :vn_rdwr() failed, "
3849 3849 "error code 0x%x\n", err);
3850 3850 return (-1);
3851 3851 }
3852 3852
3853 3853 dlen = size;
3854 3854
3855 3855 /* Decompress the image at the supplied memory buffer */
3856 3856 if ((err = z_uncompress(buf, &dlen, file->_dbuf,
3857 3857 vattr.va_size)) != Z_OK) {
3858 3858 _kobj_printf(ops, "kobj_read_file: z_uncompress "
3859 3859 "failed, error code : 0x%x\n", err);
3860 3860 return (-1);
3861 3861 }
3862 3862
3863 3863 if (dlen != size) {
3864 3864 _kobj_printf(ops, "kobj_read_file: z_uncompress "
3865 3865 "failed to uncompress (size returned 0x%x , "
3866 3866 "expected size: 0x%x)\n", dlen, size);
3867 3867 return (-1);
3868 3868 }
3869 3869
3870 3870 return (0);
3871 3871 }
3872 3872
3873 3873 while (size) {
3874 3874 page_addr = F_PAGE(file, off);
3875 3875 b_size = file->_size;
3876 3876 /*
3877 3877 * If we have the filesystem page the caller's referring to
3878 3878 * and we have something in the buffer,
3879 3879 * satisfy as much of the request from the buffer as we can.
3880 3880 */
3881 3881 if (page_addr == file->_off && b_size > 0) {
3882 3882 b_off = B_OFFSET(file, off);
3883 3883 c_size = b_size - b_off;
3884 3884 /*
3885 3885 * If there's nothing to copy, we're at EOF.
3886 3886 */
3887 3887 if (c_size <= 0)
3888 3888 break;
3889 3889 if (c_size > size)
3890 3890 c_size = size;
3891 3891 if (buf) {
3892 3892 if (_moddebug & MODDEBUG_ERRMSG)
3893 3893 _kobj_printf(ops, "copying %x bytes\n",
3894 3894 c_size);
3895 3895 bcopy(file->_base+b_off, buf, c_size);
3896 3896 size -= c_size;
3897 3897 off += c_size;
3898 3898 buf += c_size;
3899 3899 count += c_size;
3900 3900 } else {
3901 3901 _kobj_printf(ops, "kobj_read: system error");
3902 3902 count = -1;
3903 3903 break;
3904 3904 }
3905 3905 } else {
3906 3906 /*
3907 3907 * If the caller's offset is page aligned and
3908 3908 * the caller want's at least a filesystem page and
3909 3909 * the caller provided a buffer,
3910 3910 * read directly into the caller's buffer.
3911 3911 */
3912 3912 if (page_addr == off &&
3913 3913 (c_size = F_BLKS(file, size)) && buf) {
3914 3914 c_size = kobj_read_blks(file, buf, c_size,
3915 3915 page_addr);
3916 3916 if (c_size < 0) {
3917 3917 count = -1;
3918 3918 break;
3919 3919 }
3920 3920 count += c_size;
3921 3921 if (c_size != F_BLKS(file, size))
3922 3922 break;
3923 3923 size -= c_size;
3924 3924 off += c_size;
3925 3925 buf += c_size;
3926 3926 /*
3927 3927 * Otherwise, read into our buffer and copy next time
3928 3928 * around the loop.
3929 3929 */
3930 3930 } else {
3931 3931 file->_off = page_addr;
3932 3932 c_size = kobj_read_blks(file, file->_base,
3933 3933 file->_bsize, page_addr);
3934 3934 file->_ptr = file->_base;
3935 3935 file->_cnt = c_size;
3936 3936 file->_size = c_size;
3937 3937 /*
3938 3938 * If a _filbuf call or nothing read, break.
3939 3939 */
3940 3940 if (buf == NULL || c_size <= 0) {
3941 3941 count = c_size;
3942 3942 break;
3943 3943 }
3944 3944 }
3945 3945 if (_moddebug & MODDEBUG_ERRMSG)
3946 3946 _kobj_printf(ops, "read %x bytes\n", c_size);
3947 3947 }
3948 3948 }
3949 3949 if (_moddebug & MODDEBUG_ERRMSG)
3950 3950 _kobj_printf(ops, "count = %x\n", count);
3951 3951
3952 3952 return (count);
3953 3953 }
3954 3954
3955 3955 static int
3956 3956 kobj_read_blks(struct _buf *file, char *buf, uint_t size, uint_t off)
3957 3957 {
3958 3958 int ret;
3959 3959
3960 3960 ASSERT(B_OFFSET(file, size) == 0 && B_OFFSET(file, off) == 0);
3961 3961 if (file->_iscmp) {
3962 3962 uint_t blks;
3963 3963 int nret;
3964 3964
3965 3965 ret = 0;
3966 3966 for (blks = size / file->_bsize; blks != 0; blks--) {
3967 3967 nret = kobj_uncomp_blk(file, buf, off);
3968 3968 if (nret == -1)
3969 3969 return (-1);
3970 3970 buf += nret;
3971 3971 off += nret;
3972 3972 ret += nret;
3973 3973 if (nret < file->_bsize)
3974 3974 break;
3975 3975 }
3976 3976 } else
3977 3977 ret = kobj_read(file->_fd, buf, size, off);
3978 3978 return (ret);
3979 3979 }
3980 3980
3981 3981 static int
3982 3982 kobj_uncomp_blk(struct _buf *file, char *buf, uint_t off)
3983 3983 {
3984 3984 struct comphdr *hdr = kobj_comphdr(file);
3985 3985 ulong_t dlen, slen;
3986 3986 caddr_t src;
3987 3987 int i;
3988 3988
3989 3989 dlen = file->_bsize;
3990 3990 i = off / file->_bsize;
3991 3991 src = file->_dbuf + hdr->ch_blkmap[i];
3992 3992 if (i == hdr->ch_fsize / file->_bsize)
3993 3993 slen = file->_dsize - hdr->ch_blkmap[i];
3994 3994 else
3995 3995 slen = hdr->ch_blkmap[i + 1] - hdr->ch_blkmap[i];
3996 3996 if (z_uncompress(buf, &dlen, src, slen) != Z_OK)
3997 3997 return (-1);
3998 3998 return (dlen);
3999 3999 }
4000 4000
4001 4001 int
4002 4002 kobj_filbuf(struct _buf *f)
4003 4003 {
4004 4004 if (kobj_read_file(f, NULL, f->_bsize, f->_off + f->_size) > 0)
4005 4005 return (kobj_getc(f));
4006 4006 return (-1);
4007 4007 }
4008 4008
4009 4009 void
4010 4010 kobj_free(void *address, size_t size)
4011 4011 {
4012 4012 if (standalone)
4013 4013 return;
4014 4014
4015 4015 kmem_free(address, size);
4016 4016 kobj_stat.nfree_calls++;
4017 4017 kobj_stat.nfree += size;
4018 4018 }
4019 4019
4020 4020 void *
4021 4021 kobj_zalloc(size_t size, int flag)
4022 4022 {
4023 4023 void *v;
4024 4024
4025 4025 if ((v = kobj_alloc(size, flag)) != 0) {
4026 4026 bzero(v, size);
4027 4027 }
4028 4028
4029 4029 return (v);
4030 4030 }
4031 4031
4032 4032 void *
4033 4033 kobj_alloc(size_t size, int flag)
4034 4034 {
4035 4035 /*
4036 4036 * If we are running standalone in the
4037 4037 * linker, we ask boot for memory.
4038 4038 * Either it's temporary memory that we lose
4039 4039 * once boot is mapped out or we allocate it
4040 4040 * permanently using the dynamic data segment.
4041 4041 */
4042 4042 if (standalone) {
4043 4043 #if defined(_OBP)
4044 4044 if (flag & (KM_TMP | KM_SCRATCH))
4045 4045 return (bop_temp_alloc(size, MINALIGN));
4046 4046 #else
4047 4047 if (flag & (KM_TMP | KM_SCRATCH))
4048 4048 return (BOP_ALLOC(ops, 0, size, MINALIGN));
4049 4049 #endif
4050 4050 return (kobj_segbrk(&_edata, size, MINALIGN, 0));
4051 4051 }
4052 4052
4053 4053 kobj_stat.nalloc_calls++;
4054 4054 kobj_stat.nalloc += size;
4055 4055
4056 4056 return (kmem_alloc(size, (flag & KM_NOWAIT) ? KM_NOSLEEP : KM_SLEEP));
4057 4057 }
4058 4058
4059 4059 /*
4060 4060 * Allow the "mod" system to sync up with the work
4061 4061 * already done by kobj during the initial loading
4062 4062 * of the kernel. This also gives us a chance
4063 4063 * to reallocate memory that belongs to boot.
4064 4064 */
4065 4065 void
4066 4066 kobj_sync(void)
4067 4067 {
4068 4068 struct modctl_list *lp, **lpp;
4069 4069
4070 4070 /*
4071 4071 * The module path can be set in /etc/system via 'moddir' commands
4072 4072 */
4073 4073 if (default_path != NULL)
4074 4074 kobj_module_path = default_path;
4075 4075 else
4076 4076 default_path = kobj_module_path;
4077 4077
4078 4078 ksyms_arena = vmem_create("ksyms", NULL, 0, sizeof (uint64_t),
4079 4079 segkmem_alloc, segkmem_free, heap_arena, 0, VM_SLEEP);
4080 4080
4081 4081 ctf_arena = vmem_create("ctf", NULL, 0, sizeof (uint_t),
4082 4082 segkmem_alloc, segkmem_free, heap_arena, 0, VM_SLEEP);
4083 4083
4084 4084 /*
4085 4085 * Move symbol tables from boot memory to ksyms_arena.
4086 4086 */
4087 4087 for (lpp = kobj_linkmaps; *lpp != NULL; lpp++) {
4088 4088 for (lp = *lpp; lp != NULL; lp = lp->modl_next)
4089 4089 kobj_export_module(mod(lp));
4090 4090 }
4091 4091 }
4092 4092
4093 4093 caddr_t
4094 4094 kobj_segbrk(caddr_t *spp, size_t size, size_t align, caddr_t limit)
4095 4095 {
4096 4096 uintptr_t va, pva;
4097 4097 size_t alloc_pgsz = kobj_mmu_pagesize;
4098 4098 size_t alloc_align = BO_NO_ALIGN;
4099 4099 size_t alloc_size;
4100 4100
4101 4101 /*
4102 4102 * If we are using "large" mappings for the kernel,
4103 4103 * request aligned memory from boot using the
4104 4104 * "large" pagesize.
4105 4105 */
4106 4106 if (lg_pagesize) {
4107 4107 alloc_align = lg_pagesize;
4108 4108 alloc_pgsz = lg_pagesize;
4109 4109 }
4110 4110
4111 4111 #if defined(__sparc)
4112 4112 /* account for redzone */
4113 4113 if (limit)
4114 4114 limit -= alloc_pgsz;
4115 4115 #endif /* __sparc */
4116 4116
4117 4117 va = ALIGN((uintptr_t)*spp, align);
4118 4118 pva = P2ROUNDUP((uintptr_t)*spp, alloc_pgsz);
4119 4119 /*
4120 4120 * Need more pages?
4121 4121 */
4122 4122 if (va + size > pva) {
4123 4123 uintptr_t npva;
4124 4124
4125 4125 alloc_size = P2ROUNDUP(size - (pva - va), alloc_pgsz);
4126 4126 /*
4127 4127 * Check for overlapping segments.
4128 4128 */
4129 4129 if (limit && limit <= *spp + alloc_size) {
4130 4130 return ((caddr_t)0);
4131 4131 }
4132 4132
4133 4133 npva = (uintptr_t)BOP_ALLOC(ops, (caddr_t)pva,
4134 4134 alloc_size, alloc_align);
4135 4135
4136 4136 if (npva == NULL) {
4137 4137 _kobj_printf(ops, "BOP_ALLOC failed, 0x%lx bytes",
4138 4138 alloc_size);
4139 4139 _kobj_printf(ops, " aligned %lx", alloc_align);
4140 4140 _kobj_printf(ops, " at 0x%lx\n", pva);
4141 4141 return (NULL);
4142 4142 }
4143 4143 }
4144 4144 *spp = (caddr_t)(va + size);
4145 4145
4146 4146 return ((caddr_t)va);
4147 4147 }
4148 4148
4149 4149 /*
4150 4150 * Calculate the number of output hash buckets.
4151 4151 * We use the next prime larger than n / 4,
4152 4152 * so the average hash chain is about 4 entries.
4153 4153 * More buckets would just be a waste of memory.
4154 4154 */
4155 4155 uint_t
4156 4156 kobj_gethashsize(uint_t n)
4157 4157 {
4158 4158 int f;
4159 4159 int hsize = MAX(n / 4, 2);
4160 4160
4161 4161 for (f = 2; f * f <= hsize; f++)
4162 4162 if (hsize % f == 0)
4163 4163 hsize += f = 1;
4164 4164
4165 4165 return (hsize);
4166 4166 }
4167 4167
4168 4168 /*
4169 4169 * Get the file size.
4170 4170 *
4171 4171 * Before root is mounted, files are compressed in the boot_archive ramdisk
4172 4172 * (in the memory). kobj_fstat would return the compressed file size.
4173 4173 * In order to get the uncompressed file size, read the file to the end and
4174 4174 * count its size.
4175 4175 */
4176 4176 int
4177 4177 kobj_get_filesize(struct _buf *file, uint64_t *size)
4178 4178 {
4179 4179 int err = 0;
4180 4180 ssize_t resid;
4181 4181 uint32_t buf;
4182 4182
4183 4183 if (_modrootloaded) {
4184 4184 struct bootstat bst;
4185 4185
4186 4186 if (kobj_fstat(file->_fd, &bst) != 0)
4187 4187 return (EIO);
4188 4188 *size = bst.st_size;
4189 4189
4190 4190 if (file->_iscmp == CH_MAGIC_GZIP) {
4191 4191 /*
4192 4192 * Read the last 4 bytes of the compressed (gzip)
4193 4193 * image to get the size of its uncompressed
4194 4194 * version.
4195 4195 */
4196 4196 if ((err = vn_rdwr(UIO_READ, (struct vnode *)file->_fd,
4197 4197 (char *)(&buf), 4, (offset_t)(*size - 4),
4198 4198 UIO_SYSSPACE, 0, (rlim64_t)0, CRED(), &resid))
4199 4199 != 0) {
4200 4200 _kobj_printf(ops, "kobj_get_filesize: "
4201 4201 "vn_rdwr() failed with error 0x%x\n", err);
4202 4202 return (-1);
4203 4203 }
4204 4204
4205 4205 *size = (uint64_t)buf;
4206 4206 }
4207 4207 } else {
4208 4208
4209 4209 #if defined(_OBP)
4210 4210 struct bootstat bsb;
4211 4211
4212 4212 if (file->_iscmp) {
4213 4213 struct comphdr *hdr = kobj_comphdr(file);
4214 4214
4215 4215 *size = hdr->ch_fsize;
4216 4216 } else if (kobj_boot_fstat(file->_fd, &bsb) != 0)
4217 4217 return (EIO);
4218 4218 else
4219 4219 *size = bsb.st_size;
4220 4220 #else
4221 4221 char *buf;
4222 4222 int count;
4223 4223 uint64_t offset = 0;
4224 4224
4225 4225 buf = kmem_alloc(MAXBSIZE, KM_SLEEP);
4226 4226 do {
4227 4227 count = kobj_read_file(file, buf, MAXBSIZE, offset);
4228 4228 if (count < 0) {
4229 4229 kmem_free(buf, MAXBSIZE);
4230 4230 return (EIO);
4231 4231 }
4232 4232 offset += count;
4233 4233 } while (count == MAXBSIZE);
4234 4234 kmem_free(buf, MAXBSIZE);
4235 4235
4236 4236 *size = offset;
4237 4237 #endif
4238 4238 }
4239 4239
4240 4240 return (0);
4241 4241 }
4242 4242
4243 4243 static char *
4244 4244 basename(char *s)
4245 4245 {
4246 4246 char *p, *q;
4247 4247
4248 4248 q = NULL;
4249 4249 p = s;
4250 4250 do {
4251 4251 if (*p == '/')
4252 4252 q = p;
4253 4253 } while (*p++);
4254 4254 return (q ? q + 1 : s);
4255 4255 }
4256 4256
4257 4257 void
4258 4258 kobj_stat_get(kobj_stat_t *kp)
4259 4259 {
4260 4260 *kp = kobj_stat;
4261 4261 }
4262 4262
4263 4263 int
4264 4264 kobj_getpagesize()
4265 4265 {
4266 4266 return (lg_pagesize);
4267 4267 }
4268 4268
4269 4269 void
4270 4270 kobj_textwin_alloc(struct module *mp)
4271 4271 {
4272 4272 ASSERT(MUTEX_HELD(&mod_lock));
4273 4273
4274 4274 if (mp->textwin != NULL)
4275 4275 return;
4276 4276
4277 4277 /*
4278 4278 * If the text is not contained in the heap, then it is not contained
4279 4279 * by a writable mapping. (Specifically, it's on the nucleus page.)
4280 4280 * We allocate a read/write mapping for this module's text to allow
4281 4281 * the text to be patched without calling hot_patch_kernel_text()
4282 4282 * (which is quite slow).
4283 4283 */
4284 4284 if (!vmem_contains(heaptext_arena, mp->text, mp->text_size)) {
4285 4285 uintptr_t text = (uintptr_t)mp->text;
4286 4286 uintptr_t size = (uintptr_t)mp->text_size;
4287 4287 uintptr_t i;
4288 4288 caddr_t va;
4289 4289 size_t sz = ((text + size + PAGESIZE - 1) & PAGEMASK) -
4290 4290 (text & PAGEMASK);
4291 4291
4292 4292 va = mp->textwin_base = vmem_alloc(heap_arena, sz, VM_SLEEP);
4293 4293
4294 4294 for (i = text & PAGEMASK; i < text + size; i += PAGESIZE) {
4295 4295 hat_devload(kas.a_hat, va, PAGESIZE,
4296 4296 hat_getpfnum(kas.a_hat, (caddr_t)i),
4297 4297 PROT_READ | PROT_WRITE,
4298 4298 HAT_LOAD_LOCK | HAT_LOAD_NOCONSIST);
4299 4299 va += PAGESIZE;
4300 4300 }
4301 4301
4302 4302 mp->textwin = mp->textwin_base + (text & PAGEOFFSET);
4303 4303 } else {
4304 4304 mp->textwin = mp->text;
4305 4305 }
4306 4306 }
4307 4307
4308 4308 void
4309 4309 kobj_textwin_free(struct module *mp)
4310 4310 {
4311 4311 uintptr_t text = (uintptr_t)mp->text;
4312 4312 uintptr_t tsize = (uintptr_t)mp->text_size;
4313 4313 size_t size = (((text + tsize + PAGESIZE - 1) & PAGEMASK) -
4314 4314 (text & PAGEMASK));
4315 4315
4316 4316 mp->textwin = NULL;
4317 4317
4318 4318 if (mp->textwin_base == NULL)
4319 4319 return;
4320 4320
4321 4321 hat_unload(kas.a_hat, mp->textwin_base, size, HAT_UNLOAD_UNLOCK);
4322 4322 vmem_free(heap_arena, mp->textwin_base, size);
4323 4323 mp->textwin_base = NULL;
4324 4324 }
4325 4325
4326 4326 static char *
4327 4327 find_libmacro(char *name)
4328 4328 {
4329 4329 int lmi;
4330 4330
4331 4331 for (lmi = 0; lmi < NLIBMACROS; lmi++) {
4332 4332 if (strcmp(name, libmacros[lmi].lmi_macroname) == 0)
4333 4333 return (libmacros[lmi].lmi_list);
4334 4334 }
4335 4335 return (NULL);
4336 4336 }
4337 4337
4338 4338 /*
4339 4339 * Check for $MACRO in tail (string to expand) and expand it in path at pathend
4340 4340 * returns path if successful, else NULL
4341 4341 * Support multiple $MACROs expansion and the first valid path will be returned
4342 4342 * Caller's responsibility to provide enough space in path to expand
4343 4343 */
4344 4344 char *
4345 4345 expand_libmacro(char *tail, char *path, char *pathend)
4346 4346 {
4347 4347 char c, *p, *p1, *p2, *path2, *endp;
4348 4348 int diff, lmi, macrolen, valid_macro, more_macro;
4349 4349 struct _buf *file;
4350 4350
4351 4351 /*
4352 4352 * check for $MACROS between nulls or slashes
4353 4353 */
4354 4354 p = strchr(tail, '$');
4355 4355 if (p == NULL)
4356 4356 return (NULL);
4357 4357 for (lmi = 0; lmi < NLIBMACROS; lmi++) {
4358 4358 macrolen = libmacros[lmi].lmi_macrolen;
4359 4359 if (strncmp(p + 1, libmacros[lmi].lmi_macroname, macrolen) == 0)
4360 4360 break;
4361 4361 }
4362 4362
4363 4363 valid_macro = 0;
4364 4364 if (lmi < NLIBMACROS) {
4365 4365 /*
4366 4366 * The following checks are used to restrict expansion of
4367 4367 * macros to those that form a full directory/file name
4368 4368 * and to keep the behavior same as before. If this
4369 4369 * restriction is removed or no longer valid in the future,
4370 4370 * the checks below can be deleted.
4371 4371 */
4372 4372 if ((p == tail) || (*(p - 1) == '/')) {
4373 4373 c = *(p + macrolen + 1);
4374 4374 if (c == '/' || c == '\0')
4375 4375 valid_macro = 1;
4376 4376 }
4377 4377 }
4378 4378
4379 4379 if (!valid_macro) {
4380 4380 p2 = strchr(p, '/');
4381 4381 /*
4382 4382 * if no more macro to expand, then just copy whatever left
4383 4383 * and check whether it exists
4384 4384 */
4385 4385 if (p2 == NULL || strchr(p2, '$') == NULL) {
4386 4386 (void) strcpy(pathend, tail);
4387 4387 if ((file = kobj_open_path(path, 1, 1)) !=
4388 4388 (struct _buf *)-1) {
4389 4389 kobj_close_file(file);
4390 4390 return (path);
4391 4391 } else
4392 4392 return (NULL);
4393 4393 } else {
4394 4394 /*
4395 4395 * copy all chars before '/' and call expand_libmacro()
4396 4396 * again
4397 4397 */
4398 4398 diff = p2 - tail;
4399 4399 bcopy(tail, pathend, diff);
4400 4400 pathend += diff;
4401 4401 *(pathend) = '\0';
4402 4402 return (expand_libmacro(p2, path, pathend));
4403 4403 }
4404 4404 }
4405 4405
4406 4406 more_macro = 0;
4407 4407 if (c != '\0') {
4408 4408 endp = p + macrolen + 1;
4409 4409 if (strchr(endp, '$') != NULL)
4410 4410 more_macro = 1;
4411 4411 } else
4412 4412 endp = NULL;
4413 4413
4414 4414 /*
4415 4415 * copy lmi_list and split it into components.
4416 4416 * then put the part of tail before $MACRO into path
4417 4417 * at pathend
4418 4418 */
4419 4419 diff = p - tail;
4420 4420 if (diff > 0)
4421 4421 bcopy(tail, pathend, diff);
4422 4422 path2 = pathend + diff;
4423 4423 p1 = libmacros[lmi].lmi_list;
4424 4424 while (p1 && (*p1 != '\0')) {
4425 4425 p2 = strchr(p1, ':');
4426 4426 if (p2) {
4427 4427 diff = p2 - p1;
4428 4428 bcopy(p1, path2, diff);
4429 4429 *(path2 + diff) = '\0';
4430 4430 } else {
4431 4431 diff = strlen(p1);
4432 4432 bcopy(p1, path2, diff + 1);
4433 4433 }
4434 4434 /* copy endp only if there isn't any more macro to expand */
4435 4435 if (!more_macro && (endp != NULL))
4436 4436 (void) strcat(path2, endp);
4437 4437 file = kobj_open_path(path, 1, 1);
4438 4438 if (file != (struct _buf *)-1) {
4439 4439 kobj_close_file(file);
4440 4440 /*
4441 4441 * if more macros to expand then call expand_libmacro(),
4442 4442 * else return path which has the whole path
4443 4443 */
4444 4444 if (!more_macro || (expand_libmacro(endp, path,
4445 4445 path2 + diff) != NULL)) {
4446 4446 return (path);
4447 4447 }
4448 4448 }
4449 4449 if (p2)
4450 4450 p1 = ++p2;
4451 4451 else
4452 4452 return (NULL);
4453 4453 }
4454 4454 return (NULL);
4455 4455 }
4456 4456
4457 4457 static void
4458 4458 tnf_add_notifyunload(kobj_notify_f *fp)
4459 4459 {
4460 4460 kobj_notify_list_t *entry;
4461 4461
4462 4462 entry = kobj_alloc(sizeof (kobj_notify_list_t), KM_WAIT);
4463 4463 entry->kn_type = KOBJ_NOTIFY_MODUNLOADING;
4464 4464 entry->kn_func = fp;
4465 4465 (void) kobj_notify_add(entry);
4466 4466 }
4467 4467
4468 4468 /* ARGSUSED */
4469 4469 static void
4470 4470 tnf_unsplice_probes(uint_t what, struct modctl *mod)
4471 4471 {
4472 4472 tnf_probe_control_t **p;
4473 4473 tnf_tag_data_t **q;
4474 4474 struct module *mp = mod->mod_mp;
4475 4475
4476 4476 if (!(mp->flags & KOBJ_TNF_PROBE))
4477 4477 return;
4478 4478
4479 4479 for (p = &__tnf_probe_list_head; *p; )
4480 4480 if (kobj_addrcheck(mp, (char *)*p) == 0)
4481 4481 *p = (*p)->next;
4482 4482 else
4483 4483 p = &(*p)->next;
4484 4484
4485 4485 for (q = &__tnf_tag_list_head; *q; )
4486 4486 if (kobj_addrcheck(mp, (char *)*q) == 0)
4487 4487 *q = (tnf_tag_data_t *)(*q)->tag_version;
4488 4488 else
4489 4489 q = (tnf_tag_data_t **)&(*q)->tag_version;
4490 4490
4491 4491 tnf_changed_probe_list = 1;
4492 4492 }
4493 4493
4494 4494 int
4495 4495 tnf_splice_probes(int boot_load, tnf_probe_control_t *plist,
4496 4496 tnf_tag_data_t *tlist)
4497 4497 {
4498 4498 int result = 0;
4499 4499 static int add_notify = 1;
4500 4500
4501 4501 if (plist) {
4502 4502 tnf_probe_control_t *pl;
4503 4503
4504 4504 for (pl = plist; pl->next; )
4505 4505 pl = pl->next;
4506 4506
4507 4507 if (!boot_load)
4508 4508 mutex_enter(&mod_lock);
4509 4509 tnf_changed_probe_list = 1;
4510 4510 pl->next = __tnf_probe_list_head;
4511 4511 __tnf_probe_list_head = plist;
4512 4512 if (!boot_load)
4513 4513 mutex_exit(&mod_lock);
4514 4514 result = 1;
4515 4515 }
4516 4516
4517 4517 if (tlist) {
4518 4518 tnf_tag_data_t *tl;
4519 4519
4520 4520 for (tl = tlist; tl->tag_version; )
4521 4521 tl = (tnf_tag_data_t *)tl->tag_version;
4522 4522
4523 4523 if (!boot_load)
4524 4524 mutex_enter(&mod_lock);
4525 4525 tl->tag_version = (tnf_tag_version_t *)__tnf_tag_list_head;
4526 4526 __tnf_tag_list_head = tlist;
4527 4527 if (!boot_load)
4528 4528 mutex_exit(&mod_lock);
4529 4529 result = 1;
4530 4530 }
4531 4531 if (!boot_load && result && add_notify) {
4532 4532 tnf_add_notifyunload(tnf_unsplice_probes);
4533 4533 add_notify = 0;
4534 4534 }
4535 4535 return (result);
4536 4536 }
4537 4537
4538 4538 char *kobj_file_buf;
4539 4539 int kobj_file_bufsize;
4540 4540
4541 4541 /*
4542 4542 * This code is for the purpose of manually recording which files
4543 4543 * needs to go into the boot archive on any given system.
4544 4544 *
4545 4545 * To enable the code, set kobj_file_bufsize in /etc/system
4546 4546 * and reboot the system, then use mdb to look at kobj_file_buf.
4547 4547 */
4548 4548 static void
4549 4549 kobj_record_file(char *filename)
4550 4550 {
4551 4551 static char *buf;
4552 4552 static int size = 0;
4553 4553 int n;
4554 4554
4555 4555 if (kobj_file_bufsize == 0) /* don't bother */
4556 4556 return;
4557 4557
4558 4558 if (kobj_file_buf == NULL) { /* allocate buffer */
4559 4559 size = kobj_file_bufsize;
4560 4560 buf = kobj_file_buf = kobj_alloc(size, KM_WAIT|KM_TMP);
4561 4561 }
4562 4562
4563 4563 n = snprintf(buf, size, "%s\n", filename);
4564 4564 if (n > size)
4565 4565 n = size;
4566 4566 size -= n;
4567 4567 buf += n;
4568 4568 }
4569 4569
4570 4570 static int
4571 4571 kobj_boot_fstat(int fd, struct bootstat *stp)
4572 4572 {
4573 4573 #if defined(_OBP)
4574 4574 if (!standalone && _ioquiesced)
4575 4575 return (-1);
4576 4576 return (BOP_FSTAT(ops, fd, stp));
4577 4577 #else
4578 4578 return (BRD_FSTAT(bfs_ops, fd, stp));
4579 4579 #endif
4580 4580 }
4581 4581
4582 4582 static int
4583 4583 kobj_boot_open(char *filename, int flags)
4584 4584 {
4585 4585 #if defined(_OBP)
4586 4586
4587 4587 /*
4588 4588 * If io via bootops is quiesced, it means boot is no longer
4589 4589 * available to us. We make it look as if we can't open the
4590 4590 * named file - which is reasonably accurate.
4591 4591 */
4592 4592 if (!standalone && _ioquiesced)
4593 4593 return (-1);
4594 4594
4595 4595 kobj_record_file(filename);
4596 4596 return (BOP_OPEN(filename, flags));
4597 4597 #else /* x86 */
4598 4598 kobj_record_file(filename);
4599 4599 return (BRD_OPEN(bfs_ops, filename, flags));
4600 4600 #endif
4601 4601 }
4602 4602
4603 4603 static int
4604 4604 kobj_boot_close(int fd)
4605 4605 {
4606 4606 #if defined(_OBP)
4607 4607 if (!standalone && _ioquiesced)
4608 4608 return (-1);
4609 4609
4610 4610 return (BOP_CLOSE(fd));
4611 4611 #else /* x86 */
4612 4612 return (BRD_CLOSE(bfs_ops, fd));
4613 4613 #endif
4614 4614 }
4615 4615
4616 4616 /*ARGSUSED*/
4617 4617 static int
4618 4618 kobj_boot_seek(int fd, off_t hi, off_t lo)
4619 4619 {
4620 4620 #if defined(_OBP)
4621 4621 return (BOP_SEEK(fd, lo) == -1 ? -1 : 0);
4622 4622 #else
4623 4623 return (BRD_SEEK(bfs_ops, fd, lo, SEEK_SET));
4624 4624 #endif
4625 4625 }
4626 4626
4627 4627 static int
4628 4628 kobj_boot_read(int fd, caddr_t buf, size_t size)
4629 4629 {
4630 4630 #if defined(_OBP)
4631 4631 return (BOP_READ(fd, buf, size));
4632 4632 #else
4633 4633 return (BRD_READ(bfs_ops, fd, buf, size));
4634 4634 #endif
4635 4635 }
4636 4636
4637 4637 static int
4638 4638 kobj_boot_compinfo(int fd, struct compinfo *cb)
4639 4639 {
4640 4640 return (boot_compinfo(fd, cb));
4641 4641 }
4642 4642
4643 4643 /*
4644 4644 * Check if the file is compressed (for now we handle only gzip).
4645 4645 * It returns CH_MAGIC_GZIP if the file is compressed and 0 otherwise.
4646 4646 */
4647 4647 static int
4648 4648 kobj_is_compressed(intptr_t fd)
4649 4649 {
4650 4650 struct vnode *vp = (struct vnode *)fd;
4651 4651 ssize_t resid;
4652 4652 uint16_t magic_buf;
4653 4653 int err = 0;
4654 4654
4655 4655 if ((err = vn_rdwr(UIO_READ, vp, (caddr_t)((intptr_t)&magic_buf),
4656 4656 sizeof (magic_buf), (offset_t)(0),
4657 4657 UIO_SYSSPACE, 0, (rlim64_t)0, CRED(), &resid)) != 0) {
4658 4658
4659 4659 _kobj_printf(ops, "kobj_is_compressed: vn_rdwr() failed, "
4660 4660 "error code 0x%x\n", err);
4661 4661 return (0);
4662 4662 }
4663 4663
4664 4664 if (magic_buf == CH_MAGIC_GZIP)
4665 4665 return (CH_MAGIC_GZIP);
4666 4666
4667 4667 return (0);
4668 4668 }
↓ open down ↓ |
868 lines elided |
↑ open up ↑ |
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX