2001-07-23 04:31:03 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
|
|
|
/*
|
2002-07-26 21:24:20 +05:30
|
|
|
* Modprobe written from scratch for BusyBox
|
2002-04-26 11:34:01 +05:30
|
|
|
*
|
2008-09-13 20:29:38 +05:30
|
|
|
* Copyright (c) 2008 Timo Teras <timo.teras@iki.fi>
|
|
|
|
* Copyright (c) 2008 Vladimir Dronnikov
|
2002-08-05 08:27:12 +05:30
|
|
|
*
|
2010-08-16 23:44:46 +05:30
|
|
|
* Licensed under GPLv2 or later, see file LICENSE in this source tree.
|
2008-09-13 20:29:38 +05:30
|
|
|
*/
|
2016-11-23 12:24:52 +05:30
|
|
|
//config:config MODPROBE
|
2018-12-28 07:50:17 +05:30
|
|
|
//config: bool "modprobe (28 kb)"
|
2016-12-23 19:42:27 +05:30
|
|
|
//config: default y
|
2016-11-23 12:24:52 +05:30
|
|
|
//config: help
|
2017-07-21 13:20:55 +05:30
|
|
|
//config: Handle the loading of modules, and their dependencies on a high
|
|
|
|
//config: level.
|
2016-11-23 12:24:52 +05:30
|
|
|
//config:
|
|
|
|
//config:config FEATURE_MODPROBE_BLACKLIST
|
|
|
|
//config: bool "Blacklist support"
|
2016-12-23 19:42:27 +05:30
|
|
|
//config: default y
|
|
|
|
//config: depends on MODPROBE && !MODPROBE_SMALL
|
2016-11-23 12:24:52 +05:30
|
|
|
//config: help
|
2017-07-21 13:20:55 +05:30
|
|
|
//config: Say 'y' here to enable support for the 'blacklist' command in
|
|
|
|
//config: modprobe.conf. This prevents the alias resolver to resolve
|
|
|
|
//config: blacklisted modules. This is useful if you want to prevent your
|
|
|
|
//config: hardware autodetection scripts to load modules like evdev, frame
|
|
|
|
//config: buffer drivers etc.
|
2001-07-23 04:31:03 +05:30
|
|
|
|
2017-08-04 06:26:39 +05:30
|
|
|
//applet:IF_MODPROBE(IF_NOT_MODPROBE_SMALL(APPLET_NOEXEC(modprobe, modprobe, BB_DIR_SBIN, BB_SUID_DROP, modprobe)))
|
2009-03-07 04:18:11 +05:30
|
|
|
|
2016-12-23 19:42:27 +05:30
|
|
|
//kbuild:ifneq ($(CONFIG_MODPROBE_SMALL),y)
|
2016-11-23 12:24:52 +05:30
|
|
|
//kbuild:lib-$(CONFIG_MODPROBE) += modprobe.o modutils.o
|
2016-12-23 19:42:27 +05:30
|
|
|
//kbuild:endif
|
2016-11-23 12:24:52 +05:30
|
|
|
|
2010-12-28 08:48:18 +05:30
|
|
|
#include "libbb.h"
|
|
|
|
#include "modutils.h"
|
|
|
|
#include <sys/utsname.h>
|
|
|
|
#include <fnmatch.h>
|
|
|
|
|
2015-01-15 07:18:36 +05:30
|
|
|
#if 1
|
2010-12-28 08:48:18 +05:30
|
|
|
#define DBG(...) ((void)0)
|
2015-01-15 07:18:36 +05:30
|
|
|
#else
|
|
|
|
#define DBG(fmt, ...) bb_error_msg("%s: " fmt, __func__, ## __VA_ARGS__)
|
|
|
|
#endif
|
2010-12-28 08:48:18 +05:30
|
|
|
|
|
|
|
/* Note that unlike older versions of modules.dep/depmod (busybox and m-i-t),
|
|
|
|
* we expect the full dependency list to be specified in modules.dep.
|
|
|
|
* Older versions would only export the direct dependency list.
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
2010-06-07 04:46:45 +05:30
|
|
|
//usage:#if !ENABLE_MODPROBE_SMALL
|
|
|
|
//usage:#define modprobe_notes_usage
|
|
|
|
//usage: "modprobe can (un)load a stack of modules, passing each module options (when\n"
|
|
|
|
//usage: "loading). modprobe uses a configuration file to determine what option(s) to\n"
|
|
|
|
//usage: "pass each module it loads.\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: "The configuration file is searched (in this order):\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: " /etc/modprobe.conf (2.6 only)\n"
|
|
|
|
//usage: " /etc/modules.conf\n"
|
|
|
|
//usage: " /etc/conf.modules (deprecated)\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: "They all have the same syntax (see below). If none is present, it is\n"
|
|
|
|
//usage: "_not_ an error; each loaded module is then expected to load without\n"
|
|
|
|
//usage: "options. Once a file is found, the others are tested for.\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: "/etc/modules.conf entry format:\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: " alias <alias_name> <mod_name>\n"
|
|
|
|
//usage: " Makes it possible to modprobe alias_name, when there is no such module.\n"
|
|
|
|
//usage: " It makes sense if your mod_name is long, or you want a more representative\n"
|
|
|
|
//usage: " name for that module (eg. 'scsi' in place of 'aha7xxx').\n"
|
|
|
|
//usage: " This makes it also possible to use a different set of options (below) for\n"
|
|
|
|
//usage: " the module and the alias.\n"
|
|
|
|
//usage: " A module can be aliased more than once.\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: " options <mod_name|alias_name> <symbol=value...>\n"
|
|
|
|
//usage: " When loading module mod_name (or the module aliased by alias_name), pass\n"
|
|
|
|
//usage: " the \"symbol=value\" pairs as option to that module.\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: "Sample /etc/modules.conf file:\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: " options tulip irq=3\n"
|
|
|
|
//usage: " alias tulip tulip2\n"
|
|
|
|
//usage: " options tulip2 irq=4 io=0x308\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: "Other functionality offered by 'classic' modprobe is not available in\n"
|
|
|
|
//usage: "this implementation.\n"
|
|
|
|
//usage: "\n"
|
|
|
|
//usage: "If module options are present both in the config file, and on the command line,\n"
|
|
|
|
//usage: "then the options from the command line will be passed to the module _after_\n"
|
|
|
|
//usage: "the options from the config file. That way, you can have defaults in the config\n"
|
|
|
|
//usage: "file, and override them for a specific usage from the command line.\n"
|
|
|
|
//usage:#define modprobe_example_usage
|
|
|
|
//usage: "(with the above /etc/modules.conf):\n\n"
|
|
|
|
//usage: "$ modprobe tulip\n"
|
|
|
|
//usage: " will load the module 'tulip' with default option 'irq=3'\n\n"
|
|
|
|
//usage: "$ modprobe tulip irq=5\n"
|
|
|
|
//usage: " will load the module 'tulip' with option 'irq=5', thus overriding the default\n\n"
|
|
|
|
//usage: "$ modprobe tulip2\n"
|
|
|
|
//usage: " will load the module 'tulip' with default options 'irq=4 io=0x308',\n"
|
|
|
|
//usage: " which are the default for alias 'tulip2'\n\n"
|
|
|
|
//usage: "$ modprobe tulip2 irq=8\n"
|
|
|
|
//usage: " will load the module 'tulip' with default options 'irq=4 io=0x308 irq=8',\n"
|
|
|
|
//usage: " which are the default for alias 'tulip2' overridden by the option 'irq=8'\n\n"
|
|
|
|
//usage: " from the command line\n\n"
|
|
|
|
//usage: "$ modprobe tulip2 irq=2 io=0x210\n"
|
|
|
|
//usage: " will load the module 'tulip' with default options 'irq=4 io=0x308 irq=4 io=0x210',\n"
|
|
|
|
//usage: " which are the default for alias 'tulip2' overridden by the options 'irq=2 io=0x210'\n\n"
|
|
|
|
//usage: " from the command line\n"
|
|
|
|
//usage:
|
|
|
|
//usage:#define modprobe_trivial_usage
|
2010-12-28 08:48:18 +05:30
|
|
|
//usage: "[-alrqvsD" IF_FEATURE_MODPROBE_BLACKLIST("b") "]"
|
2017-01-31 18:39:17 +05:30
|
|
|
//usage: " MODULE" IF_FEATURE_CMDLINE_MODULE_OPTIONS(" [SYMBOL=VALUE]...")
|
2010-06-07 04:46:45 +05:30
|
|
|
//usage:#define modprobe_full_usage "\n\n"
|
2011-06-05 07:28:28 +05:30
|
|
|
//usage: " -a Load multiple MODULEs"
|
2010-12-28 08:48:18 +05:30
|
|
|
//usage: "\n -l List (MODULE is a pattern)"
|
|
|
|
//usage: "\n -r Remove MODULE (stacks) or do autoclean"
|
|
|
|
//usage: "\n -q Quiet"
|
|
|
|
//usage: "\n -v Verbose"
|
|
|
|
//usage: "\n -s Log to syslog"
|
|
|
|
//usage: "\n -D Show dependencies"
|
2010-06-07 04:46:45 +05:30
|
|
|
//usage: IF_FEATURE_MODPROBE_BLACKLIST(
|
2010-12-28 08:48:18 +05:30
|
|
|
//usage: "\n -b Apply blacklist to module names too"
|
2010-06-07 04:46:45 +05:30
|
|
|
//usage: )
|
|
|
|
//usage:#endif /* !ENABLE_MODPROBE_SMALL */
|
|
|
|
|
2012-01-31 19:25:15 +05:30
|
|
|
/* Note: usage text doesn't document various 2.4 options
|
|
|
|
* we pull in through INSMOD_OPTS define
|
|
|
|
* Note2: -b is always accepted, but if !FEATURE_MODPROBE_BLACKLIST,
|
|
|
|
* it is a no-op.
|
|
|
|
*/
|
|
|
|
#define MODPROBE_OPTS "alrDb"
|
2010-12-28 08:48:18 +05:30
|
|
|
/* -a and -D _are_ in fact compatible */
|
2017-08-09 01:25:02 +05:30
|
|
|
#define MODPROBE_COMPLEMENTARY "q-v:v-q:l--arD:r--alD:a--lr:D--rl"
|
2012-01-31 19:25:15 +05:30
|
|
|
//#define MODPROBE_OPTS "acd:lnrt:C:b"
|
2010-12-26 06:26:19 +05:30
|
|
|
//#define MODPROBE_COMPLEMENTARY "q-v:v-q:l--acr:a--lr:r--al"
|
2010-06-07 04:46:45 +05:30
|
|
|
enum {
|
2010-12-26 06:26:19 +05:30
|
|
|
OPT_INSERT_ALL = (INSMOD_OPT_UNUSED << 0), /* a */
|
|
|
|
//OPT_DUMP_ONLY = (INSMOD_OPT_UNUSED << x), /* c */
|
|
|
|
//OPT_DIRNAME = (INSMOD_OPT_UNUSED << x), /* d */
|
|
|
|
OPT_LIST_ONLY = (INSMOD_OPT_UNUSED << 1), /* l */
|
|
|
|
//OPT_SHOW_ONLY = (INSMOD_OPT_UNUSED << x), /* n */
|
|
|
|
OPT_REMOVE = (INSMOD_OPT_UNUSED << 2), /* r */
|
|
|
|
//OPT_RESTRICT = (INSMOD_OPT_UNUSED << x), /* t */
|
|
|
|
//OPT_VERONLY = (INSMOD_OPT_UNUSED << x), /* V */
|
2010-12-28 08:48:18 +05:30
|
|
|
//OPT_CONFIGFILE = (INSMOD_OPT_UNUSED << x), /* C */
|
|
|
|
OPT_SHOW_DEPS = (INSMOD_OPT_UNUSED << 3), /* D */
|
|
|
|
OPT_BLACKLIST = (INSMOD_OPT_UNUSED << 4) * ENABLE_FEATURE_MODPROBE_BLACKLIST,
|
2010-06-07 04:46:45 +05:30
|
|
|
};
|
2010-12-28 08:48:18 +05:30
|
|
|
#if ENABLE_LONG_OPTS
|
|
|
|
static const char modprobe_longopts[] ALIGN1 =
|
|
|
|
/* nobody asked for long opts (yet) */
|
|
|
|
// "all\0" No_argument "a"
|
|
|
|
// "list\0" No_argument "l"
|
|
|
|
// "remove\0" No_argument "r"
|
|
|
|
// "quiet\0" No_argument "q"
|
|
|
|
// "verbose\0" No_argument "v"
|
|
|
|
// "syslog\0" No_argument "s"
|
|
|
|
/* module-init-tools 3.11.1 has only long opt --show-depends
|
|
|
|
* but no short -D, we provide long opt for scripts which
|
|
|
|
* were written for 3.11.1: */
|
2012-01-31 19:25:15 +05:30
|
|
|
"show-depends\0" No_argument "D"
|
2010-12-28 08:48:18 +05:30
|
|
|
// "use-blacklist\0" No_argument "b"
|
|
|
|
;
|
|
|
|
#endif
|
2010-06-07 04:46:45 +05:30
|
|
|
|
2009-06-17 22:16:06 +05:30
|
|
|
#define MODULE_FLAG_LOADED 0x0001
|
|
|
|
#define MODULE_FLAG_NEED_DEPS 0x0002
|
2009-03-07 04:18:11 +05:30
|
|
|
/* "was seen in modules.dep": */
|
2009-06-17 22:16:06 +05:30
|
|
|
#define MODULE_FLAG_FOUND_IN_MODDEP 0x0004
|
|
|
|
#define MODULE_FLAG_BLACKLISTED 0x0008
|
2017-04-06 15:24:04 +05:30
|
|
|
#define MODULE_FLAG_BUILTIN 0x0010
|
2009-03-05 22:02:27 +05:30
|
|
|
|
|
|
|
struct globals {
|
|
|
|
llist_t *probes; /* MEs of module(s) requested on cmdline */
|
2017-01-31 18:39:17 +05:30
|
|
|
#if ENABLE_FEATURE_CMDLINE_MODULE_OPTIONS
|
2009-03-07 04:18:11 +05:30
|
|
|
char *cmdline_mopts; /* module options from cmdline */
|
2017-01-31 18:39:17 +05:30
|
|
|
#endif
|
2009-03-07 04:18:11 +05:30
|
|
|
int num_unresolved_deps;
|
2009-03-05 22:02:27 +05:30
|
|
|
/* bool. "Did we have 'symbol:FOO' requested on cmdline?" */
|
|
|
|
smallint need_symbols;
|
2010-12-26 06:26:19 +05:30
|
|
|
struct utsname uts;
|
2015-11-05 23:24:55 +05:30
|
|
|
module_db db;
|
2010-02-04 19:30:15 +05:30
|
|
|
} FIX_ALIASING;
|
2011-06-20 13:08:13 +05:30
|
|
|
#define G (*ptr_to_globals)
|
|
|
|
#define INIT_G() do { \
|
2013-07-30 15:22:58 +05:30
|
|
|
SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
|
2011-06-20 13:08:13 +05:30
|
|
|
} while (0)
|
2008-07-29 05:49:44 +05:30
|
|
|
|
|
|
|
|
2009-03-05 22:02:27 +05:30
|
|
|
static int read_config(const char *path);
|
|
|
|
|
2009-03-07 04:18:11 +05:30
|
|
|
static char *gather_options_str(char *opts, const char *append)
|
|
|
|
{
|
|
|
|
/* Speed-optimized. We call gather_options_str many times. */
|
2010-01-26 12:47:45 +05:30
|
|
|
if (append) {
|
|
|
|
if (opts == NULL) {
|
|
|
|
opts = xstrdup(append);
|
|
|
|
} else {
|
|
|
|
int optlen = strlen(opts);
|
|
|
|
opts = xrealloc(opts, optlen + strlen(append) + 2);
|
|
|
|
sprintf(opts + optlen, " %s", append);
|
|
|
|
}
|
2009-03-07 04:18:11 +05:30
|
|
|
}
|
|
|
|
return opts;
|
|
|
|
}
|
|
|
|
|
2015-11-05 23:24:55 +05:30
|
|
|
static struct module_entry *get_or_add_modentry(const char *module)
|
2009-03-05 22:02:27 +05:30
|
|
|
{
|
2015-11-05 23:24:55 +05:30
|
|
|
return moddb_get_or_create(&G.db, module);
|
2009-03-05 22:02:27 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
static void add_probe(const char *name)
|
|
|
|
{
|
|
|
|
struct module_entry *m;
|
|
|
|
|
|
|
|
m = get_or_add_modentry(name);
|
2010-12-26 06:26:19 +05:30
|
|
|
if (!(option_mask32 & (OPT_REMOVE | OPT_SHOW_DEPS))
|
2017-04-06 15:24:04 +05:30
|
|
|
&& (m->flags & (MODULE_FLAG_LOADED | MODULE_FLAG_BUILTIN))
|
2009-05-26 16:18:34 +05:30
|
|
|
) {
|
2009-03-07 04:18:11 +05:30
|
|
|
DBG("skipping %s, it is already loaded", name);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-05-06 05:43:45 +05:30
|
|
|
DBG("queuing %s", name);
|
2009-03-05 22:02:27 +05:30
|
|
|
m->probed_name = name;
|
|
|
|
m->flags |= MODULE_FLAG_NEED_DEPS;
|
2009-03-07 04:18:11 +05:30
|
|
|
llist_add_to_end(&G.probes, m);
|
|
|
|
G.num_unresolved_deps++;
|
2009-03-05 22:02:27 +05:30
|
|
|
if (ENABLE_FEATURE_MODUTILS_SYMBOLS
|
2015-03-12 22:18:34 +05:30
|
|
|
&& is_prefixed_with(m->modname, "symbol:")
|
2009-03-07 04:18:11 +05:30
|
|
|
) {
|
2009-03-05 22:02:27 +05:30
|
|
|
G.need_symbols = 1;
|
2009-03-07 04:18:11 +05:30
|
|
|
}
|
2008-07-29 05:49:44 +05:30
|
|
|
}
|
|
|
|
|
2020-10-02 01:22:16 +05:30
|
|
|
static int FAST_FUNC config_file_action(struct recursive_state *state,
|
|
|
|
const char *filename,
|
|
|
|
struct stat *statbuf UNUSED_PARAM)
|
2008-07-29 05:49:44 +05:30
|
|
|
{
|
2009-03-07 04:18:11 +05:30
|
|
|
char *tokens[3];
|
2008-09-13 20:29:38 +05:30
|
|
|
parser_t *p;
|
2009-06-17 22:16:06 +05:30
|
|
|
struct module_entry *m;
|
2008-09-13 20:29:38 +05:30
|
|
|
int rc = TRUE;
|
2018-11-27 15:56:48 +05:30
|
|
|
const char *base;
|
2008-07-29 05:49:44 +05:30
|
|
|
|
2016-03-29 22:53:55 +05:30
|
|
|
/* Skip files that begin with a "." */
|
2016-02-13 09:56:51 +05:30
|
|
|
base = bb_basename(filename);
|
|
|
|
if (base[0] == '.')
|
|
|
|
goto error;
|
|
|
|
|
2017-04-06 18:52:24 +05:30
|
|
|
/* "man modprobe.d" from kmod version 22 suggests
|
|
|
|
* that we shouldn't recurse into /etc/modprobe.d/dir/
|
|
|
|
* _subdirectories_:
|
|
|
|
*/
|
2020-10-02 01:22:16 +05:30
|
|
|
if (state->depth > 1)
|
2017-04-06 18:52:24 +05:30
|
|
|
return SKIP; /* stop recursing */
|
|
|
|
//TODO: instead, can use dirAction in recursive_action() to SKIP dirs
|
|
|
|
//on depth == 1 level. But that's more code...
|
|
|
|
|
2016-03-29 22:53:55 +05:30
|
|
|
/* In dir recursion, skip files that do not end with a ".conf"
|
|
|
|
* depth==0: read_config("modules.{symbols,alias}") must work,
|
|
|
|
* "include FILE_NOT_ENDING_IN_CONF" must work too.
|
|
|
|
*/
|
2020-10-02 01:22:16 +05:30
|
|
|
if (state->depth != 0) {
|
2018-11-27 15:56:48 +05:30
|
|
|
if (!is_suffixed_with(base, ".conf"))
|
2016-03-29 22:53:55 +05:30
|
|
|
goto error;
|
|
|
|
}
|
2006-04-10 21:39:52 +05:30
|
|
|
|
2008-09-13 20:29:38 +05:30
|
|
|
p = config_open2(filename, fopen_for_read);
|
|
|
|
if (p == NULL) {
|
|
|
|
rc = FALSE;
|
|
|
|
goto error;
|
|
|
|
}
|
2008-07-29 05:49:44 +05:30
|
|
|
|
2008-09-13 20:29:38 +05:30
|
|
|
while (config_read(p, tokens, 3, 2, "# \t", PARSE_NORMAL)) {
|
2009-03-05 22:02:27 +05:30
|
|
|
//Use index_in_strings?
|
2008-09-13 20:29:38 +05:30
|
|
|
if (strcmp(tokens[0], "alias") == 0) {
|
2009-03-07 04:18:11 +05:30
|
|
|
/* alias <wildcard> <modulename> */
|
|
|
|
llist_t *l;
|
|
|
|
char wildcard[MODULE_NAME_LEN];
|
|
|
|
char *rmod;
|
|
|
|
|
2009-03-05 22:02:27 +05:30
|
|
|
if (tokens[2] == NULL)
|
|
|
|
continue;
|
2009-03-07 04:18:11 +05:30
|
|
|
filename2modname(tokens[1], wildcard);
|
2009-03-05 22:02:27 +05:30
|
|
|
|
2011-06-20 13:08:13 +05:30
|
|
|
for (l = G.probes; l; l = l->link) {
|
2009-03-05 22:02:27 +05:30
|
|
|
m = (struct module_entry *) l->data;
|
2009-03-07 04:18:11 +05:30
|
|
|
if (fnmatch(wildcard, m->modname, 0) != 0)
|
2009-03-05 22:02:27 +05:30
|
|
|
continue;
|
|
|
|
rmod = filename2modname(tokens[2], NULL);
|
2009-03-07 04:18:11 +05:30
|
|
|
llist_add_to(&m->realnames, rmod);
|
2009-03-05 22:02:27 +05:30
|
|
|
|
|
|
|
if (m->flags & MODULE_FLAG_NEED_DEPS) {
|
|
|
|
m->flags &= ~MODULE_FLAG_NEED_DEPS;
|
2009-03-07 04:18:11 +05:30
|
|
|
G.num_unresolved_deps--;
|
2009-03-05 22:02:27 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
m = get_or_add_modentry(rmod);
|
2009-03-07 04:18:11 +05:30
|
|
|
if (!(m->flags & MODULE_FLAG_NEED_DEPS)) {
|
|
|
|
m->flags |= MODULE_FLAG_NEED_DEPS;
|
|
|
|
G.num_unresolved_deps++;
|
|
|
|
}
|
2009-03-05 22:02:27 +05:30
|
|
|
}
|
2008-09-13 20:29:38 +05:30
|
|
|
} else if (strcmp(tokens[0], "options") == 0) {
|
2009-03-07 04:18:11 +05:30
|
|
|
/* options <modulename> <option...> */
|
2009-03-05 22:02:27 +05:30
|
|
|
if (tokens[2] == NULL)
|
|
|
|
continue;
|
|
|
|
m = get_or_add_modentry(tokens[1]);
|
2009-03-07 04:18:11 +05:30
|
|
|
m->options = gather_options_str(m->options, tokens[2]);
|
2008-09-13 20:29:38 +05:30
|
|
|
} else if (strcmp(tokens[0], "include") == 0) {
|
2016-03-29 22:53:55 +05:30
|
|
|
/* include <filename>/<dirname> (yes, directories also must work) */
|
2009-03-05 22:02:27 +05:30
|
|
|
read_config(tokens[1]);
|
|
|
|
} else if (ENABLE_FEATURE_MODPROBE_BLACKLIST
|
|
|
|
&& strcmp(tokens[0], "blacklist") == 0
|
|
|
|
) {
|
2009-03-07 04:18:11 +05:30
|
|
|
/* blacklist <modulename> */
|
2009-03-05 22:02:27 +05:30
|
|
|
get_or_add_modentry(tokens[1])->flags |= MODULE_FLAG_BLACKLISTED;
|
2006-04-10 21:39:52 +05:30
|
|
|
}
|
2003-12-20 02:34:19 +05:30
|
|
|
}
|
2008-09-13 20:29:38 +05:30
|
|
|
config_close(p);
|
2009-06-17 22:16:06 +05:30
|
|
|
error:
|
2008-09-13 20:29:38 +05:30
|
|
|
return rc;
|
2003-09-08 06:02:49 +05:30
|
|
|
}
|
2002-04-26 11:34:01 +05:30
|
|
|
|
2009-03-05 22:02:27 +05:30
|
|
|
static int read_config(const char *path)
|
2002-04-26 11:34:01 +05:30
|
|
|
{
|
2008-09-13 20:29:38 +05:30
|
|
|
return recursive_action(path, ACTION_RECURSE | ACTION_QUIET,
|
2020-10-02 01:22:16 +05:30
|
|
|
config_file_action, NULL, NULL);
|
2002-05-15 05:12:08 +05:30
|
|
|
}
|
|
|
|
|
2009-06-18 00:03:50 +05:30
|
|
|
static const char *humanly_readable_name(struct module_entry *m)
|
|
|
|
{
|
|
|
|
/* probed_name may be NULL. modname always exists. */
|
|
|
|
return m->probed_name ? m->probed_name : m->modname;
|
|
|
|
}
|
|
|
|
|
2015-09-09 18:25:07 +05:30
|
|
|
/* Like strsep(&stringp, "\n\t ") but quoted text goes to single token
|
|
|
|
* even if it contains whitespace.
|
|
|
|
*/
|
|
|
|
static char *strsep_quotes(char **stringp)
|
|
|
|
{
|
|
|
|
char *s, *start = *stringp;
|
|
|
|
|
|
|
|
if (!start)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
for (s = start; ; s++) {
|
|
|
|
switch (*s) {
|
|
|
|
case '"':
|
|
|
|
s = strchrnul(s + 1, '"'); /* find trailing quote */
|
|
|
|
if (*s != '\0')
|
|
|
|
s++; /* skip trailing quote */
|
|
|
|
/* fall through */
|
|
|
|
case '\0':
|
|
|
|
case '\n':
|
|
|
|
case '\t':
|
|
|
|
case ' ':
|
|
|
|
if (*s != '\0') {
|
|
|
|
*s = '\0';
|
|
|
|
*stringp = s + 1;
|
|
|
|
} else {
|
|
|
|
*stringp = NULL;
|
|
|
|
}
|
|
|
|
return start;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-02-28 03:45:22 +05:30
|
|
|
static char *parse_and_add_kcmdline_module_options(char *options, const char *modulename)
|
|
|
|
{
|
2010-03-03 08:50:33 +05:30
|
|
|
char *kcmdline_buf;
|
2010-02-28 03:45:22 +05:30
|
|
|
char *kcmdline;
|
|
|
|
char *kptr;
|
|
|
|
|
2010-03-03 08:50:33 +05:30
|
|
|
kcmdline_buf = xmalloc_open_read_close("/proc/cmdline", NULL);
|
|
|
|
if (!kcmdline_buf)
|
2010-02-28 03:45:22 +05:30
|
|
|
return options;
|
|
|
|
|
|
|
|
kcmdline = kcmdline_buf;
|
2015-09-09 18:25:07 +05:30
|
|
|
while ((kptr = strsep_quotes(&kcmdline)) != NULL) {
|
2015-03-12 22:18:34 +05:30
|
|
|
char *after_modulename = is_prefixed_with(kptr, modulename);
|
|
|
|
if (!after_modulename || *after_modulename != '.')
|
2010-02-28 03:45:22 +05:30
|
|
|
continue;
|
|
|
|
/* It is "modulename.xxxx" */
|
2015-03-12 22:18:34 +05:30
|
|
|
kptr = after_modulename + 1;
|
2010-02-28 03:45:22 +05:30
|
|
|
if (strchr(kptr, '=') != NULL) {
|
|
|
|
/* It is "modulename.opt=[val]" */
|
|
|
|
options = gather_options_str(options, kptr);
|
|
|
|
}
|
|
|
|
}
|
2010-03-03 08:50:33 +05:30
|
|
|
free(kcmdline_buf);
|
2010-02-28 03:45:22 +05:30
|
|
|
|
|
|
|
return options;
|
|
|
|
}
|
|
|
|
|
2009-06-17 22:16:06 +05:30
|
|
|
/* Return: similar to bb_init_module:
|
|
|
|
* 0 on success,
|
|
|
|
* -errno on open/read error,
|
|
|
|
* errno on init_module() error
|
|
|
|
*/
|
2010-06-07 04:46:45 +05:30
|
|
|
/* NB: INSMOD_OPT_SILENT bit suppresses ONLY non-existent modules,
|
|
|
|
* not deleted ones (those are still listed in modules.dep).
|
|
|
|
* module-init-tools version 3.4:
|
|
|
|
* # modprobe bogus
|
|
|
|
* FATAL: Module bogus not found. [exitcode 1]
|
|
|
|
* # modprobe -q bogus [silent, exitcode still 1]
|
|
|
|
* but:
|
|
|
|
* # rm kernel/drivers/net/dummy.ko
|
|
|
|
* # modprobe -q dummy
|
|
|
|
* FATAL: Could not open '/lib/modules/xxx/kernel/drivers/net/dummy.ko': No such file or directory
|
|
|
|
* [exitcode 1]
|
|
|
|
*/
|
2009-03-05 22:02:27 +05:30
|
|
|
static int do_modprobe(struct module_entry *m)
|
2002-05-15 05:12:08 +05:30
|
|
|
{
|
2009-05-28 07:24:29 +05:30
|
|
|
int rc, first;
|
2008-09-13 20:29:38 +05:30
|
|
|
|
2009-03-07 04:18:11 +05:30
|
|
|
if (!(m->flags & MODULE_FLAG_FOUND_IN_MODDEP)) {
|
2009-06-17 22:16:06 +05:30
|
|
|
if (!(option_mask32 & INSMOD_OPT_SILENT))
|
2017-04-06 15:24:04 +05:30
|
|
|
bb_error_msg((m->flags & MODULE_FLAG_BUILTIN) ?
|
|
|
|
"module %s is builtin" :
|
|
|
|
"module %s not found in modules.dep",
|
|
|
|
humanly_readable_name(m));
|
2009-03-05 22:02:27 +05:30
|
|
|
return -ENOENT;
|
2009-03-07 04:18:11 +05:30
|
|
|
}
|
|
|
|
DBG("do_modprob'ing %s", m->modname);
|
2008-09-13 20:29:38 +05:30
|
|
|
|
2010-12-26 06:26:19 +05:30
|
|
|
if (!(option_mask32 & OPT_REMOVE))
|
2009-03-05 22:02:27 +05:30
|
|
|
m->deps = llist_rev(m->deps);
|
2008-09-13 20:29:38 +05:30
|
|
|
|
2011-06-20 13:08:13 +05:30
|
|
|
if (0) {
|
|
|
|
llist_t *l;
|
|
|
|
for (l = m->deps; l; l = l->link)
|
|
|
|
DBG("dep: %s", l->data);
|
|
|
|
}
|
2009-05-06 05:43:45 +05:30
|
|
|
|
2009-05-28 07:24:29 +05:30
|
|
|
first = 1;
|
2008-09-13 20:29:38 +05:30
|
|
|
rc = 0;
|
2009-06-17 22:16:06 +05:30
|
|
|
while (m->deps) {
|
2010-12-28 08:48:18 +05:30
|
|
|
struct module_entry *m2;
|
|
|
|
char *fn, *options;
|
|
|
|
|
2009-06-17 22:16:06 +05:30
|
|
|
rc = 0;
|
|
|
|
fn = llist_pop(&m->deps); /* we leak it */
|
2015-01-16 18:23:05 +05:30
|
|
|
m2 = get_or_add_modentry(bb_get_last_path_component_nostrip(fn));
|
2009-06-17 22:16:06 +05:30
|
|
|
|
2010-12-26 06:26:19 +05:30
|
|
|
if (option_mask32 & OPT_REMOVE) {
|
2009-06-17 22:16:06 +05:30
|
|
|
/* modprobe -r */
|
2009-05-28 07:24:29 +05:30
|
|
|
if (m2->flags & MODULE_FLAG_LOADED) {
|
2009-06-17 22:16:06 +05:30
|
|
|
rc = bb_delete_module(m2->modname, O_EXCL);
|
|
|
|
if (rc) {
|
|
|
|
if (first) {
|
2015-10-24 07:49:56 +05:30
|
|
|
bb_perror_msg("can't unload module '%s'",
|
2015-10-24 07:47:04 +05:30
|
|
|
humanly_readable_name(m2));
|
2009-06-17 22:16:06 +05:30
|
|
|
break;
|
|
|
|
}
|
2009-05-28 07:24:29 +05:30
|
|
|
} else {
|
|
|
|
m2->flags &= ~MODULE_FLAG_LOADED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* do not error out if *deps* fail to unload */
|
|
|
|
first = 0;
|
2009-06-17 22:16:06 +05:30
|
|
|
continue;
|
2004-01-10 16:59:31 +05:30
|
|
|
}
|
2003-12-25 02:00:45 +05:30
|
|
|
|
2009-06-17 22:16:06 +05:30
|
|
|
options = m2->options;
|
|
|
|
m2->options = NULL;
|
2010-02-28 03:45:22 +05:30
|
|
|
options = parse_and_add_kcmdline_module_options(options, m2->modname);
|
2017-01-31 18:39:17 +05:30
|
|
|
#if ENABLE_FEATURE_CMDLINE_MODULE_OPTIONS
|
2009-06-17 22:16:06 +05:30
|
|
|
if (m == m2)
|
|
|
|
options = gather_options_str(options, G.cmdline_mopts);
|
2017-01-31 18:39:17 +05:30
|
|
|
#endif
|
2010-12-28 08:48:18 +05:30
|
|
|
|
|
|
|
if (option_mask32 & OPT_SHOW_DEPS) {
|
|
|
|
printf(options ? "insmod %s/%s/%s %s\n"
|
|
|
|
: "insmod %s/%s/%s\n",
|
|
|
|
CONFIG_DEFAULT_MODULES_DIR, G.uts.release, fn,
|
|
|
|
options);
|
|
|
|
free(options);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (m2->flags & MODULE_FLAG_LOADED) {
|
|
|
|
DBG("%s is already loaded, skipping", fn);
|
|
|
|
free(options);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2009-06-17 22:16:06 +05:30
|
|
|
rc = bb_init_module(fn, options);
|
|
|
|
DBG("loaded %s '%s', rc:%d", fn, options, rc);
|
2010-01-10 09:22:45 +05:30
|
|
|
if (rc == EEXIST)
|
|
|
|
rc = 0;
|
2009-06-17 22:16:06 +05:30
|
|
|
free(options);
|
|
|
|
if (rc) {
|
2010-03-23 20:55:17 +05:30
|
|
|
bb_error_msg("can't load module %s (%s): %s",
|
2009-06-18 00:03:50 +05:30
|
|
|
humanly_readable_name(m2),
|
2009-06-17 22:16:06 +05:30
|
|
|
fn,
|
|
|
|
moderror(rc)
|
|
|
|
);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
m2->flags |= MODULE_FLAG_LOADED;
|
2009-03-05 22:02:27 +05:30
|
|
|
}
|
2009-03-04 00:17:56 +05:30
|
|
|
|
2003-06-20 15:26:37 +05:30
|
|
|
return rc;
|
2002-05-15 05:12:08 +05:30
|
|
|
}
|
|
|
|
|
2009-03-05 22:02:27 +05:30
|
|
|
static void load_modules_dep(void)
|
|
|
|
{
|
|
|
|
struct module_entry *m;
|
|
|
|
char *colon, *tokens[2];
|
|
|
|
parser_t *p;
|
|
|
|
|
2009-06-17 22:16:06 +05:30
|
|
|
/* Modprobe does not work at all without modules.dep,
|
2009-03-05 22:02:27 +05:30
|
|
|
* even if the full module name is given. Returning error here
|
|
|
|
* was making us later confuse user with this message:
|
|
|
|
* "module /full/path/to/existing/file/module.ko not found".
|
2009-03-07 04:18:11 +05:30
|
|
|
* It's better to die immediately, with good message.
|
|
|
|
* xfopen_for_read provides that. */
|
|
|
|
p = config_open2(CONFIG_DEFAULT_DEPMOD_FILE, xfopen_for_read);
|
2009-03-05 22:02:27 +05:30
|
|
|
|
2009-03-07 04:18:11 +05:30
|
|
|
while (G.num_unresolved_deps
|
2009-03-05 22:02:27 +05:30
|
|
|
&& config_read(p, tokens, 2, 1, "# \t", PARSE_NORMAL)
|
|
|
|
) {
|
|
|
|
colon = last_char_is(tokens[0], ':');
|
|
|
|
if (colon == NULL)
|
|
|
|
continue;
|
2015-01-15 07:34:23 +05:30
|
|
|
*colon = '\0';
|
2009-03-05 22:02:27 +05:30
|
|
|
|
2015-11-05 23:24:55 +05:30
|
|
|
m = moddb_get(&G.db, bb_get_last_path_component_nostrip(tokens[0]));
|
2009-03-05 22:02:27 +05:30
|
|
|
if (m == NULL)
|
|
|
|
continue;
|
|
|
|
|
2009-03-07 04:18:11 +05:30
|
|
|
/* Optimization... */
|
|
|
|
if ((m->flags & MODULE_FLAG_LOADED)
|
2010-12-26 06:26:19 +05:30
|
|
|
&& !(option_mask32 & (OPT_REMOVE | OPT_SHOW_DEPS))
|
2009-03-07 04:18:11 +05:30
|
|
|
) {
|
|
|
|
DBG("skip deps of %s, it's already loaded", tokens[0]);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
m->flags |= MODULE_FLAG_FOUND_IN_MODDEP;
|
2009-03-05 22:02:27 +05:30
|
|
|
if ((m->flags & MODULE_FLAG_NEED_DEPS) && (m->deps == NULL)) {
|
2009-03-07 04:18:11 +05:30
|
|
|
G.num_unresolved_deps--;
|
2009-03-05 22:02:27 +05:30
|
|
|
llist_add_to(&m->deps, xstrdup(tokens[0]));
|
|
|
|
if (tokens[1])
|
2009-08-14 05:40:54 +05:30
|
|
|
string_to_llist(tokens[1], &m->deps, " \t");
|
2009-05-06 05:43:45 +05:30
|
|
|
} else
|
|
|
|
DBG("skipping dep line");
|
2009-03-05 22:02:27 +05:30
|
|
|
}
|
|
|
|
config_close(p);
|
|
|
|
}
|
|
|
|
|
2007-10-11 15:35:36 +05:30
|
|
|
int modprobe_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
2008-08-06 06:21:43 +05:30
|
|
|
int modprobe_main(int argc UNUSED_PARAM, char **argv)
|
2001-07-23 04:31:03 +05:30
|
|
|
{
|
2008-10-31 07:34:28 +05:30
|
|
|
int rc;
|
|
|
|
unsigned opt;
|
2009-03-05 22:02:27 +05:30
|
|
|
struct module_entry *me;
|
2002-05-23 05:04:35 +05:30
|
|
|
|
2010-12-26 06:26:19 +05:30
|
|
|
INIT_G();
|
|
|
|
|
2017-08-09 01:25:02 +05:30
|
|
|
opt = getopt32long(argv, "^" INSMOD_OPTS MODPROBE_OPTS "\0" MODPROBE_COMPLEMENTARY,
|
|
|
|
modprobe_longopts
|
|
|
|
INSMOD_ARGS
|
|
|
|
);
|
2008-08-06 06:21:43 +05:30
|
|
|
argv += optind;
|
2008-09-13 20:29:38 +05:30
|
|
|
|
2010-07-08 13:52:30 +05:30
|
|
|
/* Goto modules location */
|
|
|
|
xchdir(CONFIG_DEFAULT_MODULES_DIR);
|
2010-12-26 06:26:19 +05:30
|
|
|
uname(&G.uts);
|
|
|
|
xchdir(G.uts.release);
|
2010-07-08 13:52:30 +05:30
|
|
|
|
2010-12-26 06:26:19 +05:30
|
|
|
if (opt & OPT_LIST_ONLY) {
|
2011-02-15 06:47:31 +05:30
|
|
|
int i;
|
2010-06-07 04:46:45 +05:30
|
|
|
char *colon, *tokens[2];
|
|
|
|
parser_t *p = config_open2(CONFIG_DEFAULT_DEPMOD_FILE, xfopen_for_read);
|
|
|
|
|
2011-02-15 06:47:31 +05:30
|
|
|
for (i = 0; argv[i]; i++)
|
|
|
|
replace(argv[i], '-', '_');
|
|
|
|
|
2010-06-07 04:46:45 +05:30
|
|
|
while (config_read(p, tokens, 2, 1, "# \t", PARSE_NORMAL)) {
|
|
|
|
colon = last_char_is(tokens[0], ':');
|
|
|
|
if (!colon)
|
|
|
|
continue;
|
|
|
|
*colon = '\0';
|
|
|
|
if (!argv[0])
|
|
|
|
puts(tokens[0]);
|
|
|
|
else {
|
2015-01-15 07:18:36 +05:30
|
|
|
char name[MODULE_NAME_LEN];
|
|
|
|
filename2modname(
|
|
|
|
bb_get_last_path_component_nostrip(tokens[0]),
|
|
|
|
name
|
|
|
|
);
|
2010-06-07 04:46:45 +05:30
|
|
|
for (i = 0; argv[i]; i++) {
|
|
|
|
if (fnmatch(argv[i], name, 0) == 0) {
|
|
|
|
puts(tokens[0]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return EXIT_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Yes, for some reason -l ignores -s... */
|
|
|
|
if (opt & INSMOD_OPT_SYSLOG)
|
|
|
|
logmode = LOGMODE_SYSLOG;
|
2008-09-13 20:29:38 +05:30
|
|
|
|
2008-10-31 07:34:28 +05:30
|
|
|
if (!argv[0]) {
|
2010-12-26 06:26:19 +05:30
|
|
|
if (opt & OPT_REMOVE) {
|
2009-03-07 04:18:11 +05:30
|
|
|
/* "modprobe -r" (w/o params).
|
|
|
|
* "If name is NULL, all unused modules marked
|
|
|
|
* autoclean will be removed".
|
|
|
|
*/
|
2009-11-12 01:35:42 +05:30
|
|
|
if (bb_delete_module(NULL, O_NONBLOCK | O_EXCL) != 0)
|
2015-10-24 07:47:04 +05:30
|
|
|
bb_perror_nomsg_and_die();
|
2008-09-13 20:29:38 +05:30
|
|
|
}
|
2008-10-31 07:34:28 +05:30
|
|
|
return EXIT_SUCCESS;
|
|
|
|
}
|
2009-03-05 22:02:27 +05:30
|
|
|
|
2009-03-07 04:18:11 +05:30
|
|
|
/* Retrieve module names of already loaded modules */
|
|
|
|
{
|
|
|
|
char *s;
|
|
|
|
parser_t *parser = config_open2("/proc/modules", fopen_for_read);
|
|
|
|
while (config_read(parser, &s, 1, 1, "# \t", PARSE_NORMAL & ~PARSE_GREEDY))
|
|
|
|
get_or_add_modentry(s)->flags |= MODULE_FLAG_LOADED;
|
|
|
|
config_close(parser);
|
2017-04-06 15:24:04 +05:30
|
|
|
|
|
|
|
parser = config_open2("modules.builtin", fopen_for_read);
|
|
|
|
while (config_read(parser, &s, 1, 1, "# \t", PARSE_NORMAL))
|
|
|
|
get_or_add_modentry(s)->flags |= MODULE_FLAG_BUILTIN;
|
|
|
|
config_close(parser);
|
2009-03-07 04:18:11 +05:30
|
|
|
}
|
|
|
|
|
2010-12-26 06:26:19 +05:30
|
|
|
if (opt & (OPT_INSERT_ALL | OPT_REMOVE)) {
|
2009-03-05 22:02:27 +05:30
|
|
|
/* Each argument is a module name */
|
|
|
|
do {
|
2009-05-06 05:43:45 +05:30
|
|
|
DBG("adding module %s", *argv);
|
2009-03-05 22:02:27 +05:30
|
|
|
add_probe(*argv++);
|
|
|
|
} while (*argv);
|
|
|
|
} else {
|
|
|
|
/* First argument is module name, rest are parameters */
|
2009-05-06 05:43:45 +05:30
|
|
|
DBG("probing just module %s", *argv);
|
2009-03-05 22:02:27 +05:30
|
|
|
add_probe(argv[0]);
|
2017-01-31 18:39:17 +05:30
|
|
|
#if ENABLE_FEATURE_CMDLINE_MODULE_OPTIONS
|
2011-02-02 04:30:36 +05:30
|
|
|
G.cmdline_mopts = parse_cmdline_module_options(argv, /*quote_spaces:*/ 1);
|
2017-01-31 18:39:17 +05:30
|
|
|
#endif
|
2008-09-13 20:29:38 +05:30
|
|
|
}
|
2003-12-25 02:00:45 +05:30
|
|
|
|
2009-03-07 04:18:11 +05:30
|
|
|
/* Happens if all requested modules are already loaded */
|
|
|
|
if (G.probes == NULL)
|
|
|
|
return EXIT_SUCCESS;
|
2001-07-23 04:31:03 +05:30
|
|
|
|
2009-03-05 22:02:27 +05:30
|
|
|
read_config("/etc/modprobe.conf");
|
|
|
|
read_config("/etc/modprobe.d");
|
|
|
|
if (ENABLE_FEATURE_MODUTILS_SYMBOLS && G.need_symbols)
|
|
|
|
read_config("modules.symbols");
|
|
|
|
load_modules_dep();
|
2009-03-07 04:18:11 +05:30
|
|
|
if (ENABLE_FEATURE_MODUTILS_ALIAS && G.num_unresolved_deps) {
|
2009-03-05 22:02:27 +05:30
|
|
|
read_config("modules.alias");
|
|
|
|
load_modules_dep();
|
|
|
|
}
|
2008-09-13 20:29:38 +05:30
|
|
|
|
2020-11-03 21:02:12 +05:30
|
|
|
/* Handle modprobe.blacklist=module1,module2,... */
|
|
|
|
if (ENABLE_FEATURE_MODPROBE_BLACKLIST) {
|
|
|
|
char *options;
|
|
|
|
char *substr;
|
|
|
|
|
|
|
|
options = parse_and_add_kcmdline_module_options(NULL, "modprobe");
|
|
|
|
while ((substr = strsep(&options, " ")) != NULL) {
|
|
|
|
char *fn = is_prefixed_with(substr, "blacklist=");
|
|
|
|
if (!fn)
|
|
|
|
continue;
|
|
|
|
while ((substr = strsep(&fn, ",")) != NULL) {
|
|
|
|
/* blacklist <modulename> */
|
|
|
|
get_or_add_modentry(substr)->flags |= MODULE_FLAG_BLACKLISTED;
|
|
|
|
DBG("blacklist: %s", substr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*free(options); - WRONG, strsep may have advanced it */
|
|
|
|
}
|
|
|
|
|
2009-06-17 22:16:06 +05:30
|
|
|
rc = 0;
|
2009-03-05 22:02:27 +05:30
|
|
|
while ((me = llist_pop(&G.probes)) != NULL) {
|
2009-03-07 04:18:11 +05:30
|
|
|
if (me->realnames == NULL) {
|
2009-06-17 22:16:06 +05:30
|
|
|
DBG("probing by module name");
|
2009-03-07 04:18:11 +05:30
|
|
|
/* This is not an alias. Literal names are blacklisted
|
|
|
|
* only if '-b' is given.
|
|
|
|
*/
|
2010-12-26 06:26:19 +05:30
|
|
|
if (!(opt & OPT_BLACKLIST)
|
2009-03-05 22:02:27 +05:30
|
|
|
|| !(me->flags & MODULE_FLAG_BLACKLISTED)
|
|
|
|
) {
|
2009-06-17 22:16:06 +05:30
|
|
|
rc |= do_modprobe(me);
|
2008-09-13 20:29:38 +05:30
|
|
|
}
|
2009-06-17 22:16:06 +05:30
|
|
|
continue;
|
2008-09-13 20:29:38 +05:30
|
|
|
}
|
2009-06-17 22:16:06 +05:30
|
|
|
|
|
|
|
/* Probe all real names for the alias */
|
|
|
|
do {
|
|
|
|
char *realname = llist_pop(&me->realnames);
|
|
|
|
struct module_entry *m2;
|
|
|
|
|
|
|
|
DBG("probing alias %s by realname %s", me->modname, realname);
|
|
|
|
m2 = get_or_add_modentry(realname);
|
|
|
|
if (!(m2->flags & MODULE_FLAG_BLACKLISTED)
|
|
|
|
&& (!(m2->flags & MODULE_FLAG_LOADED)
|
2010-12-26 06:26:19 +05:30
|
|
|
|| (opt & (OPT_REMOVE | OPT_SHOW_DEPS)))
|
2009-06-17 22:16:06 +05:30
|
|
|
) {
|
|
|
|
//TODO: we can pass "me" as 2nd param to do_modprobe,
|
|
|
|
//and make do_modprobe emit more meaningful error messages
|
|
|
|
//with alias name included, not just module name alias resolves to.
|
|
|
|
rc |= do_modprobe(m2);
|
|
|
|
}
|
|
|
|
free(realname);
|
|
|
|
} while (me->realnames != NULL);
|
2008-09-13 20:29:38 +05:30
|
|
|
}
|
2003-12-25 02:00:45 +05:30
|
|
|
|
2015-11-05 23:24:55 +05:30
|
|
|
if (ENABLE_FEATURE_CLEAN_UP)
|
|
|
|
moddb_free(&G.db);
|
|
|
|
|
2009-06-17 22:16:06 +05:30
|
|
|
return (rc != 0);
|
2001-07-23 04:31:03 +05:30
|
|
|
}
|