svn commit: [25969] trunk/busybox/modutils

vda at busybox.net vda at busybox.net
Sun Apr 5 23:25:10 UTC 2009


Author: vda
Date: 2009-04-05 23:25:09 +0000 (Sun, 05 Apr 2009)
New Revision: 25969

Log:
modprobe/insmod for 2.4: support compressed modules.
 by Guenter (lists AT gknw.net)

function                                             old     new   delta
bb_init_module_24                                   4551    4570     +19
obj_load                                             786     794      +8
------------------------------------------------------------------------------
(add/remove: 0/0 grow/shrink: 2/0 up/down: 27/0)               Total: 27 bytes



Modified:
   trunk/busybox/modutils/modutils-24.c


Changeset:
Modified: trunk/busybox/modutils/modutils-24.c
===================================================================
--- trunk/busybox/modutils/modutils-24.c	2009-04-05 22:17:04 UTC (rev 25968)
+++ trunk/busybox/modutils/modutils-24.c	2009-04-05 23:25:09 UTC (rev 25969)
@@ -625,7 +625,11 @@
 
 static int obj_relocate(struct obj_file *f, ElfW(Addr) base);
 
-static struct obj_file *obj_load(int fd, int loadprogbits);
+#if !LOADBITS
+#define obj_load(image, image_size, loadprogbits) \
+	obj_load(image, image_size)
+#endif
+static struct obj_file *obj_load(char *image, size_t image_size, int loadprogbits);
 
 static int obj_create_image(struct obj_file *f, char *image);
 
@@ -3191,7 +3195,7 @@
 
 /*======================================================================*/
 
-static struct obj_file *obj_load(int fd, int loadprogbits UNUSED_PARAM)
+static struct obj_file *obj_load(char *image, size_t image_size, int loadprogbits)
 {
 #if BB_LITTLE_ENDIAN
 # define ELFMAG_U32 ((uint32_t)(ELFMAG0 + 0x100 * (ELFMAG1 + (0x100 * (ELFMAG2 + 0x100 * ELFMAG3)))))
@@ -3210,8 +3214,9 @@
 	f->symbol_hash = obj_elf_hash;
 	f->load_order_search_start = &f->load_order;
 
-	xlseek(fd, 0, SEEK_SET);
-	xread(fd, &f->header, sizeof(f->header));
+	if (image_size < sizeof(f->header))
+		bb_error_msg_and_die("error while loading ELF header");
+	memcpy(&f->header, image, sizeof(f->header));
 
 	if (*(uint32_t*)(&f->header.e_ident) != ELFMAG_U32) {
 		bb_error_msg_and_die("not an ELF file");
@@ -3242,8 +3247,9 @@
 	f->sections = xzalloc(sizeof(f->sections[0]) * (shnum + 4));
 
 	section_headers = alloca(sizeof(ElfW(Shdr)) * shnum);
-	xlseek(fd, f->header.e_shoff, SEEK_SET);
-	xread(fd, section_headers, sizeof(ElfW(Shdr)) * shnum);
+	if (image_size < f->header.e_shoff + sizeof(ElfW(Shdr)) * shnum)
+		bb_error_msg_and_die("error while loading section headers");
+	memcpy(section_headers, image + f->header.e_shoff, sizeof(ElfW(Shdr)) * shnum);
 
 	/* Read the section data.  */
 
@@ -3275,8 +3281,9 @@
 				sec->contents = NULL;
 				if (sec->header.sh_size > 0) {
 					sec->contents = xmalloc(sec->header.sh_size);
-					xlseek(fd, sec->header.sh_offset, SEEK_SET);
-					xread(fd, sec->contents, sec->header.sh_size);
+					if (image_size < (sec->header.sh_offset + sec->header.sh_size))
+						bb_error_msg_and_die("error while loading section data");
+					memcpy(sec->contents, image + sec->header.sh_offset, sec->header.sh_size);
 				}
 				break;
 #if SHT_RELM == SHT_REL
@@ -3392,7 +3399,7 @@
  * kernel for the module
  */
 
-static int obj_load_progbits(int fd, struct obj_file *f, char *imagebase)
+static int obj_load_progbits(char *image, size_t image_size, struct obj_file *f, char *imagebase)
 {
 	ElfW(Addr) base = f->baseaddr;
 	struct obj_section* sec;
@@ -3404,12 +3411,11 @@
 		if (sec->header.sh_size == 0)
 			continue;
 		sec->contents = imagebase + (sec->header.sh_addr - base);
-		xlseek(fd, sec->header.sh_offset, SEEK_SET);
-		errno = 0; /* read may be short without errno being set */
-		if (full_read(fd, sec->contents, sec->header.sh_size) != sec->header.sh_size) {
-			bb_perror_msg("error reading ELF section data");
-			return 0;
+		if (image_size < (sec->header.sh_offset + sec->header.sh_size)) {
+			bb_error_msg("error reading ELF section data");
+			return 0; /* need to delete half-loaded module! */
 		}
+		memcpy(sec->contents, image + sec->header.sh_offset, sec->header.sh_size);
 	}
 	return 1;
 }
@@ -3771,23 +3777,26 @@
 	struct utsname uts;
 	int exit_status = EXIT_FAILURE;
 	int m_has_modinfo;
-	char *m_name, *p;
+	char *m_name;
 #if ENABLE_FEATURE_INSMOD_VERSION_CHECKING
 	char m_strversion[STRVERSIONLEN];
 	int m_version, m_crcs;
 #endif
-	int fd;
+	char *image;
+	size_t image_size = 64 * 1024 * 1024;
 
 	uname(&uts);
-	fd = open_or_warn(m_filename, O_RDONLY);
-	if (fd < 0)
+
+	/* Load module into memory and unzip if compressed */
+	image = xmalloc_open_zipped_read_close(m_filename, &image_size);
+	if (!image)
 		return EXIT_FAILURE;
 
 	m_name = xstrdup(bb_basename(m_filename));
-	p = strrchr(m_name, '.');
-	if (p) *p = '\0';
+	/* "module.o[.gz]" -> "module" */
+	*strchrnul(m_name, '.') = '\0';
 
-	f = obj_load(fd, LOADBITS);
+	f = obj_load(image, image_size, LOADBITS);
 
 	m_has_modinfo = (get_modinfo_value(f, "kernel_version") != NULL);
 
@@ -3816,7 +3825,7 @@
 #endif
 
 	if (query_module(NULL, 0, NULL, 0, NULL))
-		bb_error_msg_and_die("not configured to support old kernels");
+		bb_error_msg_and_die("old (unsupported) kernel");
 	new_get_kernel_symbols();
 	k_crcs = new_is_kernel_checksummed();
 
@@ -3869,7 +3878,7 @@
 	 * the PROGBITS section was not loaded by the obj_load
 	 * now we can load them directly into the kernel memory
 	 */
-	if (!obj_load_progbits(fd, f, (char*)m_addr)) {
+	if (!obj_load_progbits(image, image_size, f, (char*)m_addr)) {
 		delete_module(m_name, 0);
 		goto out;
 	}
@@ -3891,7 +3900,7 @@
 	exit_status = EXIT_SUCCESS;
 
  out:
-	close(fd);
+	free(image);
 	free(m_name);
 
 	return exit_status;



More information about the busybox-cvs mailing list