kernel/
module_param.rs

1// SPDX-License-Identifier: GPL-2.0
2
3//! Support for module parameters.
4//!
5//! C header: [`include/linux/moduleparam.h`](srctree/include/linux/moduleparam.h)
6
7use crate::prelude::*;
8use crate::str::BStr;
9use bindings;
10use kernel::sync::SetOnce;
11
12/// Newtype to make `bindings::kernel_param` [`Sync`].
13#[repr(transparent)]
14#[doc(hidden)]
15pub struct KernelParam(bindings::kernel_param);
16
17impl KernelParam {
18    #[doc(hidden)]
19    pub const fn new(val: bindings::kernel_param) -> Self {
20        Self(val)
21    }
22}
23
24// SAFETY: C kernel handles serializing access to this type. We never access it
25// from Rust module.
26unsafe impl Sync for KernelParam {}
27
28/// Types that can be used for module parameters.
29// NOTE: This trait is `Copy` because drop could produce unsoundness during teardown.
30pub trait ModuleParam: Sized + Copy {
31    /// Parse a parameter argument into the parameter value.
32    fn try_from_param_arg(arg: &BStr) -> Result<Self>;
33}
34
35/// Set the module parameter from a string.
36///
37/// Used to set the parameter value at kernel initialization, when loading
38/// the module or when set through `sysfs`.
39///
40/// See `struct kernel_param_ops.set`.
41///
42/// # Safety
43///
44/// - If `val` is non-null then it must point to a valid null-terminated string that must be valid
45///   for reads for the duration of the call.
46/// - `param` must be a pointer to a `bindings::kernel_param` initialized by the rust module macro.
47///   The pointee must be valid for reads for the duration of the call.
48///
49/// # Note
50///
51/// - The safety requirements are satisfied by C API contract when this function is invoked by the
52///   module subsystem C code.
53/// - Currently, we only support read-only parameters that are not readable from `sysfs`. Thus, this
54///   function is only called at kernel initialization time, or at module load time, and we have
55///   exclusive access to the parameter for the duration of the function.
56///
57/// [`module!`]: macros::module
58unsafe extern "C" fn set_param<T>(val: *const c_char, param: *const bindings::kernel_param) -> c_int
59where
60    T: ModuleParam,
61{
62    // NOTE: If we start supporting arguments without values, val _is_ allowed
63    // to be null here.
64    if val.is_null() {
65        // TODO: Use pr_warn_once available.
66        crate::pr_warn!("Null pointer passed to `module_param::set_param`");
67        return EINVAL.to_errno();
68    }
69
70    // SAFETY: By function safety requirement, val is non-null, null-terminated
71    // and valid for reads for the duration of this function.
72    let arg = unsafe { CStr::from_char_ptr(val) };
73    let arg: &BStr = arg.as_ref();
74
75    crate::error::from_result(|| {
76        let new_value = T::try_from_param_arg(arg)?;
77
78        // SAFETY: By function safety requirements, this access is safe.
79        let container = unsafe { &*((*param).__bindgen_anon_1.arg.cast::<SetOnce<T>>()) };
80
81        container
82            .populate(new_value)
83            .then_some(0)
84            .ok_or(kernel::error::code::EEXIST)
85    })
86}
87
88macro_rules! impl_int_module_param {
89    ($ty:ident) => {
90        impl ModuleParam for $ty {
91            fn try_from_param_arg(arg: &BStr) -> Result<Self> {
92                <$ty as crate::str::parse_int::ParseInt>::from_str(arg)
93            }
94        }
95    };
96}
97
98impl_int_module_param!(i8);
99impl_int_module_param!(u8);
100impl_int_module_param!(i16);
101impl_int_module_param!(u16);
102impl_int_module_param!(i32);
103impl_int_module_param!(u32);
104impl_int_module_param!(i64);
105impl_int_module_param!(u64);
106impl_int_module_param!(isize);
107impl_int_module_param!(usize);
108
109/// A wrapper for kernel parameters.
110///
111/// This type is instantiated by the [`module!`] macro when module parameters are
112/// defined. You should never need to instantiate this type directly.
113///
114/// Note: This type is `pub` because it is used by module crates to access
115/// parameter values.
116pub struct ModuleParamAccess<T> {
117    value: SetOnce<T>,
118    default: T,
119}
120
121// SAFETY: We only create shared references to the contents of this container,
122// so if `T` is `Sync`, so is `ModuleParamAccess`.
123unsafe impl<T: Sync> Sync for ModuleParamAccess<T> {}
124
125impl<T> ModuleParamAccess<T> {
126    #[doc(hidden)]
127    pub const fn new(default: T) -> Self {
128        Self {
129            value: SetOnce::new(),
130            default,
131        }
132    }
133
134    /// Get a shared reference to the parameter value.
135    // Note: When sysfs access to parameters are enabled, we have to pass in a
136    // held lock guard here.
137    pub fn value(&self) -> &T {
138        self.value.as_ref().unwrap_or(&self.default)
139    }
140
141    /// Get a mutable pointer to `self`.
142    ///
143    /// NOTE: In most cases it is not safe deref the returned pointer.
144    pub const fn as_void_ptr(&self) -> *mut c_void {
145        core::ptr::from_ref(self).cast_mut().cast()
146    }
147}
148
149#[doc(hidden)]
150/// Generate a static [`kernel_param_ops`](srctree/include/linux/moduleparam.h) struct.
151///
152/// # Examples
153///
154/// ```ignore
155/// make_param_ops!(
156///     /// Documentation for new param ops.
157///     PARAM_OPS_MYTYPE, // Name for the static.
158///     MyType // A type which implements [`ModuleParam`].
159/// );
160/// ```
161macro_rules! make_param_ops {
162    ($ops:ident, $ty:ty) => {
163        #[doc(hidden)]
164        pub static $ops: $crate::bindings::kernel_param_ops = $crate::bindings::kernel_param_ops {
165            flags: 0,
166            set: Some(set_param::<$ty>),
167            get: None,
168            free: None,
169        };
170    };
171}
172
173make_param_ops!(PARAM_OPS_I8, i8);
174make_param_ops!(PARAM_OPS_U8, u8);
175make_param_ops!(PARAM_OPS_I16, i16);
176make_param_ops!(PARAM_OPS_U16, u16);
177make_param_ops!(PARAM_OPS_I32, i32);
178make_param_ops!(PARAM_OPS_U32, u32);
179make_param_ops!(PARAM_OPS_I64, i64);
180make_param_ops!(PARAM_OPS_U64, u64);
181make_param_ops!(PARAM_OPS_ISIZE, isize);
182make_param_ops!(PARAM_OPS_USIZE, usize);