| /*** |
| This file is part of systemd. |
| |
| Copyright 2010 Lennart Poettering |
| |
| systemd is free software; you can redistribute it and/or modify it |
| under the terms of the GNU Lesser General Public License as published by |
| the Free Software Foundation; either version 2.1 of the License, or |
| (at your option) any later version. |
| |
| systemd is distributed in the hope that it will be useful, but |
| WITHOUT ANY WARRANTY; without even the implied warranty of |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| Lesser General Public License for more details. |
| |
| You should have received a copy of the GNU Lesser General Public License |
| along with systemd; If not, see <http://www.gnu.org/licenses/>. |
| ***/ |
| |
| #include <ftw.h> |
| #include <string.h> |
| #include <unistd.h> |
| |
| #ifdef HAVE_KMOD |
| #include <libkmod.h> |
| #endif |
| |
| #include "alloc-util.h" |
| #include "bus-util.h" |
| #include "capability-util.h" |
| #include "fileio.h" |
| #include "kmod-setup.h" |
| #include "macro.h" |
| #include "string-util.h" |
| |
| #ifdef HAVE_KMOD |
| static void systemd_kmod_log( |
| void *data, |
| int priority, |
| const char *file, int line, |
| const char *fn, |
| const char *format, |
| va_list args) { |
| |
| /* library logging is enabled at debug only */ |
| DISABLE_WARNING_FORMAT_NONLITERAL; |
| log_internalv(LOG_DEBUG, 0, file, line, fn, format, args); |
| REENABLE_WARNING; |
| } |
| #endif |
| |
| static int has_virtio_rng_nftw_cb( |
| const char *fpath, |
| const struct stat *sb, |
| int tflag, |
| struct FTW *ftwbuf) { |
| |
| _cleanup_free_ char *alias = NULL; |
| int r; |
| |
| if ((FTW_D == tflag) && (ftwbuf->level > 2)) |
| return FTW_SKIP_SUBTREE; |
| |
| if (FTW_F != tflag) |
| return FTW_CONTINUE; |
| |
| if (!endswith(fpath, "/modalias")) |
| return FTW_CONTINUE; |
| |
| r = read_one_line_file(fpath, &alias); |
| if (r < 0) |
| return FTW_SKIP_SIBLINGS; |
| |
| if (startswith(alias, "pci:v00001AF4d00001005")) |
| return FTW_STOP; |
| |
| if (startswith(alias, "pci:v00001AF4d00001044")) |
| return FTW_STOP; |
| |
| return FTW_SKIP_SIBLINGS; |
| } |
| |
| static bool has_virtio_rng(void) { |
| return (nftw("/sys/devices/pci0000:00", has_virtio_rng_nftw_cb, 64, FTW_MOUNT|FTW_PHYS|FTW_ACTIONRETVAL) == FTW_STOP); |
| } |
| |
| int kmod_setup(void) { |
| #ifdef HAVE_KMOD |
| |
| static const struct { |
| const char *module; |
| const char *path; |
| bool warn_if_unavailable:1; |
| bool warn_if_module:1; |
| bool (*condition_fn)(void); |
| } kmod_table[] = { |
| /* auto-loading on use doesn't work before udev is up */ |
| { "autofs4", "/sys/class/misc/autofs", true, false, NULL }, |
| |
| /* early configure of ::1 on the loopback device */ |
| { "ipv6", "/sys/module/ipv6", false, true, NULL }, |
| |
| /* this should never be a module */ |
| { "unix", "/proc/net/unix", true, true, NULL }, |
| |
| #ifdef HAVE_LIBIPTC |
| /* netfilter is needed by networkd, nspawn among others, and cannot be autoloaded */ |
| { "ip_tables", "/proc/net/ip_tables_names", false, false, NULL }, |
| #endif |
| /* virtio_rng would be loaded by udev later, but real entropy might be needed very early */ |
| { "virtio_rng", NULL, false, false, has_virtio_rng }, |
| }; |
| struct kmod_ctx *ctx = NULL; |
| unsigned int i; |
| int r; |
| |
| if (have_effective_cap(CAP_SYS_MODULE) == 0) |
| return 0; |
| |
| for (i = 0; i < ELEMENTSOF(kmod_table); i++) { |
| struct kmod_module *mod; |
| |
| if (kmod_table[i].path && access(kmod_table[i].path, F_OK) >= 0) |
| continue; |
| |
| if (kmod_table[i].condition_fn && !kmod_table[i].condition_fn()) |
| continue; |
| |
| if (kmod_table[i].warn_if_module) |
| log_debug("Your kernel apparently lacks built-in %s support. Might be " |
| "a good idea to compile it in. We'll now try to work around " |
| "this by loading the module...", kmod_table[i].module); |
| |
| if (!ctx) { |
| ctx = kmod_new(NULL, NULL); |
| if (!ctx) |
| return log_oom(); |
| |
| kmod_set_log_fn(ctx, systemd_kmod_log, NULL); |
| kmod_load_resources(ctx); |
| } |
| |
| r = kmod_module_new_from_name(ctx, kmod_table[i].module, &mod); |
| if (r < 0) { |
| log_error("Failed to lookup module '%s'", kmod_table[i].module); |
| continue; |
| } |
| |
| r = kmod_module_probe_insert_module(mod, KMOD_PROBE_APPLY_BLACKLIST, NULL, NULL, NULL, NULL); |
| if (r == 0) |
| log_debug("Inserted module '%s'", kmod_module_get_name(mod)); |
| else if (r == KMOD_PROBE_APPLY_BLACKLIST) |
| log_info("Module '%s' is blacklisted", kmod_module_get_name(mod)); |
| else { |
| bool print_warning = kmod_table[i].warn_if_unavailable || (r < 0 && r != -ENOENT); |
| |
| log_full_errno(print_warning ? LOG_WARNING : LOG_DEBUG, r, |
| "Failed to insert module '%s': %m", kmod_module_get_name(mod)); |
| } |
| |
| kmod_module_unref(mod); |
| } |
| |
| if (ctx) |
| kmod_unref(ctx); |
| |
| #endif |
| return 0; |
| } |