Writing Modules and the Interfaces To Be Used By Them: A Gentle Guide.
Copyright 2002, Rusty Russell IBM Corportation
Modules are running parts of the kernel which can be added, and
sometimes removed, while the kernel is operational.
There are several delicate issues involved in this procedure which
indicate special care should be taken.
There are three cases you need to be careful:
1) Any code which creates an interface for callbacks (ie. almost any
function called register_*)
=> See Rule #1
2) Any modules which use (old) interfaces which do not obey Rule #1
=> See Rule #2
Rule #1: Module-safe Interfaces. Any interface which allows
registration of callbacks, must also allow registration of a
"struct module *owner", either in the structure or as a
function parameter, and it must use them to protect the
callbacks. See "MAKING INTERFACES SAFE".
Exception #1: As an optimization, you may skip this protection if you
*know* that the callbacks are non-preemtible and never
sleep (eg. registration of interrupt handlers).
Rule #2: Modules using unsafe interfaces. If your module is using any
interface which does not obey rule number 1, that means your
module functions may be called from the rest of the kernel
without the caller first doing a successful try_module_get().
You must not register a "module_cleanup" handler, and your module
cannot be unloaded except by force. You must be especially
careful in this case with initialization: see "INITIALIZING
MODULES WHICH USE UNSAFE INTERFACES".
MAKING INTERFACES SAFE
A caller must always call "try_module_get()" on a function pointers's
owner before calling through that function pointer. If
"try_module_get()" returns 0 (false), the function pointer must *not*
be called, and the caller should pretend that registration does not
exist: this means the (module) owner is closing down and doesn't want
any more calls, or in the process of starting up and isn't ready yet.
For many interfaces, this can be optimized by assuming that a
structure containing function pointers has the same owner, and knowing
that one function is always called before the others, such as the
filesystem code which knows a mount must succeed before any other
methods can be accessed.
You must call "module_put()" on the owner sometime after you have
called the function(s).
If you cannot make your interface module-safe in this way, you can at
least split registration into a "reserve" stage and an "activate"
stage, so that modules can use the interface, even if they cannot
(easily) unload.
INITIALIZING MODULES WHICH USE UNSAFE INTERFACES
Safe interfaces will never enter your module before module_init() has
successfully finished, but unsafe interfaces may. The rule is simple:
your init_module() function *must* succeed (by returning 0) if it has
successfully used any unsafe interfaces.
So, if you are only using ONE unsafe interface, simply use that
interface last. Otherwise you will have to use printk() to report
failure and leave the module initialized (but possibly useless).
If you have questions about how to apply this document to your own
modules, please ask rusty@rustcorp.com.au or linux-kernel@vger.kernel.org.
Thankyou,
Rusty.
-- Anyone who quotes me in their sig is an idiot. -- Rusty Russell. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/