mirror of
https://github.com/systemd/systemd.git
synced 2024-11-07 18:27:04 +03:00
3dfb265083
The mount() system call, which we issue before loading modules, will trigger a modprobe by the kernel and block until it returns. Trying to load it again later, will have exactly the same result as the first time.
105 lines
3.5 KiB
C
105 lines
3.5 KiB
C
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
|
|
|
/***
|
|
This file is part of systemd.
|
|
|
|
Copyright 2010 Lennart Poettering
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
(at your option) any later version.
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
***/
|
|
|
|
#include <sys/wait.h>
|
|
#include <unistd.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <libkmod.h>
|
|
|
|
#include "macro.h"
|
|
#include "execute.h"
|
|
|
|
#include "kmod-setup.h"
|
|
|
|
typedef struct Kmodule {
|
|
const char *name;
|
|
const char *directory;
|
|
bool (*condition_fn)(void);
|
|
} KModule;
|
|
|
|
static const KModule kmod_table[] = {
|
|
{ "autofs4", "/sys/class/misc/autofs", NULL } ,
|
|
{ "ipv6", "/sys/module/ipv6", NULL },
|
|
{ "unix", "/proc/net/unix", NULL } ,
|
|
};
|
|
|
|
#pragma GCC diagnostic push
|
|
#pragma GCC diagnostic ignored "-Wformat-nonliteral"
|
|
static void systemd_kmod_log(void *data, int priority, const char *file, int line,
|
|
const char *fn, const char *format, va_list args)
|
|
{
|
|
/* library logging is enabled at debug only */
|
|
log_metav(LOG_DEBUG, file, line, fn, format, args);
|
|
}
|
|
#pragma GCC diagnostic pop
|
|
|
|
int kmod_setup(void) {
|
|
unsigned i;
|
|
struct kmod_ctx *ctx = NULL;
|
|
struct kmod_module *mod;
|
|
int err;
|
|
|
|
for (i = 0; i < ELEMENTSOF(kmod_table); i += 2) {
|
|
if (kmod_table[i].condition_fn && !kmod_table[i].condition_fn())
|
|
continue;
|
|
|
|
if (access(kmod_table[i].directory, F_OK) >= 0)
|
|
continue;
|
|
|
|
log_debug("Your kernel apparently lacks built-in %s support. Might be a good idea to compile it in. "
|
|
"We'll now try to work around this by loading the module...",
|
|
kmod_table[i].name);
|
|
|
|
if (!ctx) {
|
|
ctx = kmod_new(NULL, NULL);
|
|
if (!ctx) {
|
|
log_error("Failed to allocate memory for kmod");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
kmod_set_log_fn(ctx, systemd_kmod_log, NULL);
|
|
kmod_load_resources(ctx);
|
|
}
|
|
|
|
err = kmod_module_new_from_name(ctx, kmod_table[i].name, &mod);
|
|
if (err < 0) {
|
|
log_error("Failed to lookup module '%s'", kmod_table[i].name);
|
|
continue;
|
|
}
|
|
|
|
err = kmod_module_probe_insert_module(mod, KMOD_PROBE_APPLY_BLACKLIST, NULL, NULL, NULL, NULL);
|
|
if (err == 0)
|
|
log_info("Inserted module '%s'", kmod_module_get_name(mod));
|
|
else if (err == KMOD_PROBE_APPLY_BLACKLIST)
|
|
log_info("Module '%s' is blacklisted", kmod_module_get_name(mod));
|
|
else
|
|
log_error("Failed to insert module '%s'", kmod_module_get_name(mod));
|
|
|
|
kmod_module_unref(mod);
|
|
}
|
|
|
|
if (ctx)
|
|
kmod_unref(ctx);
|
|
|
|
return 0;
|
|
}
|