/* $NetBSD: sys_module.c,v 1.22 2017/06/01 02:45:13 chs Exp $ */ /*- * Copyright (c) 2008 The NetBSD Foundation, Inc. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ /* * System calls relating to loadable modules. */ #include __KERNEL_RCSID(0, "$NetBSD: sys_module.c,v 1.22 2017/06/01 02:45:13 chs Exp $"); #ifdef _KERNEL_OPT #include "opt_modular.h" #endif #include #include #include #include #include #include #include #include #include #include /* * Arbitrary limit to avoid DoS for excessive memory allocation. */ #define MAXPROPSLEN 4096 int handle_modctl_load(const char *ml_filename, int ml_flags, const char *ml_props, size_t ml_propslen) { char *path; char *props; int error; prop_dictionary_t dict; size_t propslen = 0; if ((ml_props != NULL && ml_propslen == 0) || (ml_props == NULL && ml_propslen > 0)) { return EINVAL; } path = PNBUF_GET(); error = copyinstr(ml_filename, path, MAXPATHLEN, NULL); if (error != 0) goto out1; if (ml_props != NULL) { if (ml_propslen > MAXPROPSLEN) { error = ENOMEM; goto out1; } propslen = ml_propslen + 1; props = kmem_alloc(propslen, KM_SLEEP); error = copyinstr(ml_props, props, propslen, NULL); if (error != 0) goto out2; dict = prop_dictionary_internalize(props); if (dict == NULL) { error = EINVAL; goto out2; } } else { dict = NULL; props = NULL; } error = module_load(path, ml_flags, dict, MODULE_CLASS_ANY); if (dict != NULL) { prop_object_release(dict); } out2: if (props != NULL) { kmem_free(props, propslen); } out1: PNBUF_PUT(path); return error; } static int handle_modctl_stat(struct iovec *iov, void *arg) { modstat_t *ms, *mso; modinfo_t *mi; module_t *mod; vaddr_t addr; size_t size; size_t mslen; int error; kernconfig_lock(); mslen = (module_count+module_builtinlist+1) * sizeof(modstat_t); mso = kmem_zalloc(mslen, KM_SLEEP); ms = mso; TAILQ_FOREACH(mod, &module_list, mod_chain) { mi = mod->mod_info; strlcpy(ms->ms_name, mi->mi_name, sizeof(ms->ms_name)); if (mi->mi_required != NULL) { strlcpy(ms->ms_required, mi->mi_required, sizeof(ms->ms_required)); } if (mod->mod_kobj != NULL) { kobj_stat(mod->mod_kobj, &addr, &size); ms->ms_addr = addr; ms->ms_size = size; } ms->ms_class = mi->mi_class; ms->ms_refcnt = mod->mod_refcnt; ms->ms_source = mod->mod_source; ms->ms_flags = mod->mod_flags; ms++; } TAILQ_FOREACH(mod, &module_builtins, mod_chain) { mi = mod->mod_info; strlcpy(ms->ms_name, mi->mi_name, sizeof(ms->ms_name)); if (mi->mi_required != NULL) { strlcpy(ms->ms_required, mi->mi_required, sizeof(ms->ms_required)); } if (mod->mod_kobj != NULL) { kobj_stat(mod->mod_kobj, &addr, &size); ms->ms_addr = addr; ms->ms_size = size; } ms->ms_class = mi->mi_class; ms->ms_refcnt = -1; KASSERT(mod->mod_source == MODULE_SOURCE_KERNEL); ms->ms_source = mod->mod_source; ms++; } kernconfig_unlock(); error = copyout(mso, iov->iov_base, min(mslen - sizeof(modstat_t), iov->iov_len)); kmem_free(mso, mslen); if (error == 0) { iov->iov_len = mslen - sizeof(modstat_t); error = copyout(iov, arg, sizeof(*iov)); } return error; } int sys_modctl(struct lwp *l, const struct sys_modctl_args *uap, register_t *retval) { /* { syscallarg(int) cmd; syscallarg(void *) arg; } */ char buf[MAXMODNAME]; struct iovec iov; modctl_load_t ml; int error; void *arg; #ifdef MODULAR uintptr_t loadtype; #endif arg = SCARG(uap, arg); switch (SCARG(uap, cmd)) { case MODCTL_LOAD: error = copyin(arg, &ml, sizeof(ml)); if (error != 0) break; error = handle_modctl_load(ml.ml_filename, ml.ml_flags, ml.ml_props, ml.ml_propslen); break; case MODCTL_UNLOAD: error = copyinstr(arg, buf, sizeof(buf), NULL); if (error == 0) { error = module_unload(buf); } break; case MODCTL_STAT: error = copyin(arg, &iov, sizeof(iov)); if (error != 0) { break; } error = handle_modctl_stat(&iov, arg); break; case MODCTL_EXISTS: #ifndef MODULAR error = ENOSYS; #else loadtype = (uintptr_t)arg; switch (loadtype) { /* 0 = modload, 1 = autoload */ case 0: /* FALLTHROUGH */ case 1: error = kauth_authorize_system(kauth_cred_get(), KAUTH_SYSTEM_MODULE, 0, (void *)(uintptr_t)MODCTL_LOAD, (void *)loadtype, NULL); break; default: error = EINVAL; break; } #endif break; default: error = EINVAL; break; } return error; }