]> jfr.im git - solanum.git/blame - ircd/modules.c
ircd/authproc.c: avoid crash on lack of any configured DNSBLs
[solanum.git] / ircd / modules.c
CommitLineData
212380e3
AC
1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * modules.c: A module loader.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
212380e3
AC
23 */
24
25#include "stdinc.h"
212380e3 26#include "modules.h"
4016731b 27#include "logger.h"
212380e3
AC
28#include "ircd.h"
29#include "client.h"
30#include "send.h"
31#include "s_conf.h"
32#include "s_newconf.h"
33#include "numeric.h"
34#include "parse.h"
35#include "ircd_defs.h"
4562c604 36#include "match.h"
15feac53 37#include "s_serv.h"
8e9c6a75 38#include "capability.h"
7b641013 39#include "hash.h"
212380e3 40
f272e7ab
AC
41#include <ltdl.h>
42
9abdcf1c 43#ifndef LT_MODULE_EXT
a6f63a82 44# error "Solanum requires loadable module support."
9abdcf1c
EM
45#endif
46
e55a9d6a
AC
47rb_dlink_list module_list;
48rb_dlink_list mod_paths;
212380e3
AC
49
50static const char *core_module_table[] = {
431a1a27 51 "m_ban",
212380e3
AC
52 "m_die",
53 "m_error",
94613c78 54 "m_identified",
212380e3
AC
55 "m_join",
56 "m_kick",
57 "m_kill",
58 "m_message",
59 "m_mode",
78946542 60 "m_modules",
212380e3
AC
61 "m_nick",
62 "m_part",
63 "m_quit",
64 "m_server",
212380e3
AC
65 "m_squit",
66 NULL
67};
68
81204be8
EM
69#define MOD_WARN_DELTA (90 * 86400) /* time in seconds, 86400 seconds in a day */
70
212380e3 71void
92dad483 72init_modules(void)
212380e3 73{
f272e7ab
AC
74 if(lt_dlinit())
75 {
76 ilog(L_MAIN, "lt_dlinit failed");
c173a8ad 77 exit(EXIT_FAILURE);
f272e7ab
AC
78 }
79
212380e3 80 /* Add the default paths we look in to the module system --nenolod */
4d8cfacd
AC
81 mod_add_path(ircd_paths[IRCD_PATH_MODULES]);
82 mod_add_path(ircd_paths[IRCD_PATH_AUTOLOAD_MODULES]);
212380e3
AC
83}
84
28cc8bb9
EK
85static unsigned int prev_caps;
86
87void
88mod_remember_clicaps(void)
89{
90 prev_caps = capability_index_mask(cli_capindex);
91}
92
93void
94mod_notify_clicaps(void)
95{
96 unsigned int cur_caps = capability_index_mask(cli_capindex);
97 unsigned int del = prev_caps & ~cur_caps;
98 unsigned int new = cur_caps & ~prev_caps;
99
100 if (del)
101 sendto_local_clients_with_capability(CLICAP_CAP_NOTIFY, ":%s CAP * DEL :%s",
102 me.name, capability_index_list(cli_capindex, del));
103 if (new)
104 sendto_local_clients_with_capability(CLICAP_CAP_NOTIFY, ":%s CAP * NEW :%s",
105 me.name, capability_index_list(cli_capindex, new));
106}
107
212380e3
AC
108/* mod_find_path()
109 *
110 * input - path
111 * output - none
112 * side effects - returns a module path from path
113 */
26c6ac3d 114static char *
212380e3
AC
115mod_find_path(const char *path)
116{
330fc5c1 117 rb_dlink_node *ptr;
26c6ac3d 118 char *mpath;
212380e3 119
5cefa1d6 120 RB_DLINK_FOREACH(ptr, mod_paths.head)
212380e3
AC
121 {
122 mpath = ptr->data;
123
26c6ac3d 124 if(!strcmp(path, mpath))
212380e3
AC
125 return mpath;
126 }
127
128 return NULL;
129}
130
131/* mod_add_path
132 *
133 * input - path
55abcbb2 134 * ouput -
212380e3
AC
135 * side effects - adds path to list
136 */
137void
138mod_add_path(const char *path)
139{
26c6ac3d 140 char *pathst;
212380e3
AC
141
142 if(mod_find_path(path))
143 return;
144
26c6ac3d 145 pathst = rb_strdup(path);
330fc5c1 146 rb_dlinkAddAlloc(pathst, &mod_paths);
212380e3
AC
147}
148
149/* mod_clear_paths()
150 *
151 * input -
152 * output -
153 * side effects - clear the lists of paths
154 */
155void
156mod_clear_paths(void)
157{
637c4932 158 rb_dlink_node *ptr, *next_ptr;
212380e3 159
637c4932 160 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, mod_paths.head)
212380e3 161 {
637c4932 162 rb_free(ptr->data);
30106156 163 rb_free_rb_dlink_node(ptr);
212380e3
AC
164 }
165
166 mod_paths.head = mod_paths.tail = NULL;
167 mod_paths.length = 0;
168}
169
212380e3
AC
170/* findmodule_byname
171 *
aa483e55
EM
172 * input - module to load
173 * output - index of module on success, -1 on failure
174 * side effects - none
212380e3 175 */
e55a9d6a 176struct module *
212380e3
AC
177findmodule_byname(const char *name)
178{
e55a9d6a 179 rb_dlink_node *ptr;
c9108ea0
AC
180 char name_ext[PATH_MAX + 1];
181
dd92c99b
AC
182 rb_strlcpy(name_ext, name, sizeof name_ext);
183 rb_strlcat(name_ext, LT_MODULE_EXT, sizeof name_ext);
212380e3 184
e55a9d6a 185 RB_DLINK_FOREACH(ptr, module_list.head)
212380e3 186 {
e55a9d6a
AC
187 struct module *mod = ptr->data;
188
189 if(!irccmp(mod->name, name))
190 return mod;
c9108ea0 191
e55a9d6a
AC
192 if(!irccmp(mod->name, name_ext))
193 return mod;
212380e3 194 }
c9108ea0 195
e55a9d6a 196 return NULL;
212380e3
AC
197}
198
199/* load_all_modules()
200 *
201 * input -
202 * output -
203 * side effects -
204 */
205void
aa483e55 206load_all_modules(bool warn)
212380e3
AC
207{
208 DIR *system_module_dir = NULL;
209 struct dirent *ldirent = NULL;
210 char module_fq_name[PATH_MAX + 1];
1db8a313
EM
211 size_t module_ext_len = strlen(LT_MODULE_EXT);
212
4d8cfacd 213 system_module_dir = opendir(ircd_paths[IRCD_PATH_AUTOLOAD_MODULES]);
212380e3
AC
214
215 if(system_module_dir == NULL)
216 {
4d8cfacd 217 ilog(L_MAIN, "Could not load modules from %s: %s", ircd_paths[IRCD_PATH_AUTOLOAD_MODULES], strerror(errno));
212380e3
AC
218 return;
219 }
220
221 while ((ldirent = readdir(system_module_dir)) != NULL)
222 {
66031753 223 size_t len = strlen(ldirent->d_name);
9abdcf1c 224
66031753 225 if(len > module_ext_len &&
f956cb0f 226 rb_strncasecmp(ldirent->d_name + (len - module_ext_len), LT_MODULE_EXT, module_ext_len) == 0)
5203cba5 227 {
8f0c3422 228 (void) snprintf(module_fq_name, sizeof(module_fq_name), "%s/%s",
229 ircd_paths[IRCD_PATH_AUTOLOAD_MODULES], ldirent->d_name);
aa483e55 230 (void) load_a_module(module_fq_name, warn, MAPI_ORIGIN_CORE, false);
5203cba5 231 }
212380e3
AC
232
233 }
234 (void) closedir(system_module_dir);
235}
236
237/* load_core_modules()
238 *
239 * input -
240 * output -
241 * side effects - core modules are loaded, if any fail, kill ircd
242 */
243void
aa483e55 244load_core_modules(bool warn)
212380e3 245{
d74fa5b5 246 char module_name[PATH_MAX];
212380e3
AC
247 int i;
248
249
250 for (i = 0; core_module_table[i]; i++)
251 {
8f0c3422 252 snprintf(module_name, sizeof(module_name), "%s/%s", ircd_paths[IRCD_PATH_MODULES], core_module_table[i]);
212380e3 253
aa483e55 254 if(load_a_module(module_name, warn, MAPI_ORIGIN_CORE, true) == false)
212380e3
AC
255 {
256 ilog(L_MAIN,
9abdcf1c
EM
257 "Error loading core module %s: terminating ircd",
258 core_module_table[i]);
c173a8ad 259 exit(EXIT_FAILURE);
212380e3
AC
260 }
261 }
262}
263
264/* load_one_module()
265 *
266 * input -
267 * output -
268 * side effects -
269 */
aa483e55
EM
270bool
271load_one_module(const char *path, int origin, bool coremodule)
212380e3 272{
d74fa5b5 273 char modpath[PATH_MAX];
330fc5c1 274 rb_dlink_node *pathst;
212380e3 275
503727d1 276 if (server_state_foreground)
55abcbb2 277 inotice("loading module %s ...", path);
212380e3 278
aa483e55 279 if(coremodule)
216d70e9 280 origin = MAPI_ORIGIN_CORE;
216d70e9 281
5cefa1d6 282 RB_DLINK_FOREACH(pathst, mod_paths.head)
212380e3 283 {
aa483e55
EM
284 struct stat statbuf;
285 const char *mpath = pathst->data;
212380e3 286
8f0c3422 287 snprintf(modpath, sizeof(modpath), "%s/%s%s", mpath, path, LT_MODULE_EXT);
212380e3
AC
288 if((strstr(modpath, "../") == NULL) && (strstr(modpath, "/..") == NULL))
289 {
aa483e55 290 if(stat(modpath, &statbuf) == 0 && S_ISREG(statbuf.st_mode))
212380e3 291 {
aa483e55
EM
292 /* Regular files only please */
293 return load_a_module(modpath, true, origin, coremodule);
212380e3
AC
294 }
295
296 }
297 }
298
a9227555 299 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "Cannot locate module %s", path);
f598ba38
AJ
300
301 if (server_state_foreground)
302 ierror("cannot locate module %s", path);
303
aa483e55 304 return false;
212380e3
AC
305}
306
212380e3 307static char unknown_ver[] = "<unknown>";
8e9c6a75 308static char unknown_description[] = "<none>";
212380e3 309
212380e3
AC
310/* unload_one_module()
311 *
312 * inputs - name of module to unload
aa483e55
EM
313 * - true to say modules unloaded, false to not
314 * output - true if successful, false if error
212380e3
AC
315 * side effects - module is unloaded
316 */
aa483e55
EM
317bool
318unload_one_module(const char *name, bool warn)
212380e3 319{
e55a9d6a 320 struct module *mod;
212380e3 321
e55a9d6a 322 if((mod = findmodule_byname(name)) == NULL)
aa483e55 323 return false;
b5cfad03 324
212380e3
AC
325 /*
326 ** XXX - The type system in C does not allow direct conversion between
327 ** data and function pointers, but as it happens, most C compilers will
55abcbb2
KB
328 ** safely do this, however it is a theoretical overlow to cast as we
329 ** must do here. I have library functions to take care of this, but
330 ** despite being more "correct" for the C language, this is more
212380e3
AC
331 ** practical. Removing the abuse of the ability to cast ANY pointer
332 ** to and from an integer value here will break some compilers.
333 ** -jmallett
334 */
335 /* Left the comment in but the code isn't here any more -larne */
e55a9d6a 336 switch (mod->mapi_version)
212380e3
AC
337 {
338 case 1:
339 {
e55a9d6a 340 struct mapi_mheader_av1 *mheader = mod->mapi_header;
212380e3
AC
341 if(mheader->mapi_command_list)
342 {
343 struct Message **m;
344 for (m = mheader->mapi_command_list; *m; ++m)
345 mod_del_cmd(*m);
346 }
347
348 /* hook events are never removed, we simply lose the
349 * ability to call them --fl
350 */
351 if(mheader->mapi_hfn_list)
352 {
353 mapi_hfn_list_av1 *m;
354 for (m = mheader->mapi_hfn_list; m->hapi_name; ++m)
355 remove_hook(m->hapi_name, m->fn);
356 }
357
358 if(mheader->mapi_unregister)
359 mheader->mapi_unregister();
360 break;
361 }
8e9c6a75
EM
362 case 2:
363 {
e55a9d6a 364 struct mapi_mheader_av2 *mheader = mod->mapi_header;
8e9c6a75
EM
365
366 /* XXX duplicate code :( */
367 if(mheader->mapi_command_list)
368 {
369 struct Message **m;
370 for (m = mheader->mapi_command_list; *m; ++m)
371 mod_del_cmd(*m);
372 }
373
374 /* hook events are never removed, we simply lose the
375 * ability to call them --fl
376 */
377 if(mheader->mapi_hfn_list)
378 {
379 mapi_hfn_list_av1 *m;
380 for (m = mheader->mapi_hfn_list; m->hapi_name; ++m)
381 remove_hook(m->hapi_name, m->fn);
382 }
383
384 if(mheader->mapi_unregister)
385 mheader->mapi_unregister();
386
387 if(mheader->mapi_cap_list)
388 {
389 mapi_cap_list_av2 *m;
390 for (m = mheader->mapi_cap_list; m->cap_name; ++m)
391 {
392 struct CapabilityIndex *idx;
393
978b7232 394 switch (m->cap_index)
8e9c6a75
EM
395 {
396 case MAPI_CAP_CLIENT:
397 idx = cli_capindex;
398 break;
399 case MAPI_CAP_SERVER:
400 idx = serv_capindex;
401 break;
402 default:
a9227555 403 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
8e9c6a75 404 "Unknown/unsupported CAP index found of type %d on capability %s when unloading %s",
e55a9d6a 405 m->cap_index, m->cap_name, mod->name);
8e9c6a75
EM
406 ilog(L_MAIN,
407 "Unknown/unsupported CAP index found of type %d on capability %s when unloading %s",
e55a9d6a 408 m->cap_index, m->cap_name, mod->name);
8e9c6a75
EM
409 continue;
410 }
411
33c01426 412 capability_orphan(idx, m->cap_name);
8e9c6a75
EM
413 }
414 }
e8de2bfa 415 break;
8e9c6a75 416 }
212380e3 417 default:
a9227555 418 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
212380e3 419 "Unknown/unsupported MAPI version %d when unloading %s!",
e55a9d6a 420 mod->mapi_version, mod->name);
212380e3 421 ilog(L_MAIN, "Unknown/unsupported MAPI version %d when unloading %s!",
e55a9d6a 422 mod->mapi_version, mod->name);
212380e3
AC
423 break;
424 }
425
e55a9d6a 426 lt_dlclose(mod->address);
212380e3 427
e55a9d6a
AC
428 rb_dlinkDelete(&mod->node, &module_list);
429 rb_free(mod->name);
df7e3dab 430 rb_free(mod->path);
e55a9d6a 431 rb_free(mod);
212380e3 432
aa483e55 433 if(warn)
212380e3
AC
434 {
435 ilog(L_MAIN, "Module %s unloaded", name);
a9227555 436 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "Module %s unloaded", name);
212380e3
AC
437 }
438
aa483e55 439 return true;
212380e3
AC
440}
441
212380e3
AC
442/*
443 * load_a_module()
444 *
aa483e55
EM
445 * inputs - path name of module, bool to notice, int of origin, bool if core
446 * output - false if error true if success
212380e3
AC
447 * side effects - loads a module if successful
448 */
aa483e55
EM
449bool
450load_a_module(const char *path, bool warn, int origin, bool core)
212380e3 451{
e55a9d6a 452 struct module *mod;
f272e7ab 453 lt_dlhandle tmpptr;
0a87075b 454 char *mod_displayname, *c;
8e9c6a75 455 const char *ver, *description = NULL;
212380e3
AC
456
457 int *mapi_version;
458
0a87075b
EM
459 mod_displayname = rb_basename(path);
460
461 /* Trim off the ending for the display name if we have to */
462 if((c = rb_strcasestr(mod_displayname, LT_MODULE_EXT)) != NULL)
463 *c = '\0';
212380e3 464
9abdcf1c 465 tmpptr = lt_dlopenext(path);
212380e3
AC
466
467 if(tmpptr == NULL)
468 {
f272e7ab 469 const char *err = lt_dlerror();
212380e3 470
a9227555 471 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
0a87075b
EM
472 "Error loading module %s: %s", mod_displayname, err);
473 ilog(L_MAIN, "Error loading module %s: %s", mod_displayname, err);
474 rb_free(mod_displayname);
aa483e55 475 return false;
212380e3
AC
476 }
477
212380e3
AC
478 /*
479 * _mheader is actually a struct mapi_mheader_*, but mapi_version
480 * is always the first member of this structure, so we treate it
481 * as a single int in order to determine the API version.
482 * -larne.
483 */
f272e7ab 484 mapi_version = (int *) (uintptr_t) lt_dlsym(tmpptr, "_mheader");
212380e3 485 if((mapi_version == NULL
f272e7ab 486 && (mapi_version = (int *) (uintptr_t) lt_dlsym(tmpptr, "__mheader")) == NULL)
212380e3
AC
487 || MAPI_MAGIC(*mapi_version) != MAPI_MAGIC_HDR)
488 {
a9227555 489 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
212380e3 490 "Data format error: module %s has no MAPI header.",
0a87075b
EM
491 mod_displayname);
492 ilog(L_MAIN, "Data format error: module %s has no MAPI header.", mod_displayname);
f272e7ab 493 (void) lt_dlclose(tmpptr);
0a87075b 494 rb_free(mod_displayname);
aa483e55 495 return false;
212380e3
AC
496 }
497
498 switch (MAPI_VERSION(*mapi_version))
499 {
500 case 1:
501 {
29c92cf9 502 struct mapi_mheader_av1 *mheader = (struct mapi_mheader_av1 *)(void *)mapi_version; /* see above */
212380e3
AC
503 if(mheader->mapi_register && (mheader->mapi_register() == -1))
504 {
505 ilog(L_MAIN, "Module %s indicated failure during load.",
0a87075b 506 mod_displayname);
a9227555 507 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
212380e3 508 "Module %s indicated failure during load.",
0a87075b 509 mod_displayname);
f272e7ab 510 lt_dlclose(tmpptr);
0a87075b 511 rb_free(mod_displayname);
aa483e55 512 return false;
212380e3
AC
513 }
514 if(mheader->mapi_command_list)
515 {
516 struct Message **m;
517 for (m = mheader->mapi_command_list; *m; ++m)
518 mod_add_cmd(*m);
519 }
520
521 if(mheader->mapi_hook_list)
522 {
523 mapi_hlist_av1 *m;
524 for (m = mheader->mapi_hook_list; m->hapi_name; ++m)
525 *m->hapi_id = register_hook(m->hapi_name);
526 }
527
528 if(mheader->mapi_hfn_list)
529 {
530 mapi_hfn_list_av1 *m;
531 for (m = mheader->mapi_hfn_list; m->hapi_name; ++m)
532 add_hook(m->hapi_name, m->fn);
533 }
534
535 ver = mheader->mapi_module_version;
536 break;
537 }
8e9c6a75
EM
538 case 2:
539 {
540 struct mapi_mheader_av2 *mheader = (struct mapi_mheader_av2 *)(void *)mapi_version; /* see above */
212380e3 541
33c01426
EK
542 if(mheader->mapi_cap_list)
543 {
544 mapi_cap_list_av2 *m;
545 for (m = mheader->mapi_cap_list; m->cap_name; ++m)
546 {
547 struct CapabilityIndex *idx;
548 int result;
549
550 switch (m->cap_index)
551 {
552 case MAPI_CAP_CLIENT:
553 idx = cli_capindex;
554 break;
555 case MAPI_CAP_SERVER:
556 idx = serv_capindex;
557 break;
558 default:
a9227555 559 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
33c01426
EK
560 "Unknown/unsupported CAP index found of type %d on capability %s when loading %s",
561 m->cap_index, m->cap_name, mod_displayname);
562 ilog(L_MAIN,
563 "Unknown/unsupported CAP index found of type %d on capability %s when loading %s",
564 m->cap_index, m->cap_name, mod_displayname);
565 continue;
566 }
567
568 result = capability_put(idx, m->cap_name, m->cap_ownerdata);
569 if (m->cap_id != NULL)
570 *(m->cap_id) = result;
571 }
572 }
573
8e9c6a75 574 /* XXX duplicated code :( */
5eb3d7a7 575 if(mheader->mapi_register && (mheader->mapi_register() == -1))
8e9c6a75
EM
576 {
577 ilog(L_MAIN, "Module %s indicated failure during load.",
0a87075b 578 mod_displayname);
a9227555 579 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
8e9c6a75 580 "Module %s indicated failure during load.",
0a87075b 581 mod_displayname);
33c01426
EK
582 if(mheader->mapi_cap_list)
583 {
584 mapi_cap_list_av2 *m;
585 for (m = mheader->mapi_cap_list; m->cap_name; ++m)
586 {
587 struct CapabilityIndex *idx;
588 switch (m->cap_index)
589 {
590 case MAPI_CAP_CLIENT:
591 idx = cli_capindex;
592 break;
593 case MAPI_CAP_SERVER:
594 idx = serv_capindex;
595 break;
596 default:
597 continue;
598 }
599 capability_orphan(idx, m->cap_name);
600 }
601 }
8e9c6a75 602 lt_dlclose(tmpptr);
0a87075b 603 rb_free(mod_displayname);
aa483e55 604 return false;
8e9c6a75 605 }
81204be8
EM
606
607 /* Basic date code checks
608 *
609 * Don't make them fatal, but do complain about differences within a certain time frame.
610 * Later on if there are major API changes we can add fatal checks.
611 * -- Elizafox
612 */
613 if(mheader->mapi_datecode != datecode && mheader->mapi_datecode > 0)
614 {
3089f59c 615 long int delta = datecode - mheader->mapi_datecode;
81204be8
EM
616 if (delta > MOD_WARN_DELTA)
617 {
618 delta /= 86400;
881acf00 619 iwarn("Module %s build date is out of sync with ircd build date by %ld days, expect problems",
0a87075b 620 mod_displayname, delta);
a9227555 621 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
81204be8 622 "Module %s build date is out of sync with ircd build date by %ld days, expect problems",
0a87075b 623 mod_displayname, delta);
81204be8
EM
624 }
625 }
626
8e9c6a75
EM
627 if(mheader->mapi_command_list)
628 {
629 struct Message **m;
630 for (m = mheader->mapi_command_list; *m; ++m)
631 mod_add_cmd(*m);
632 }
633
634 if(mheader->mapi_hook_list)
635 {
636 mapi_hlist_av1 *m;
637 for (m = mheader->mapi_hook_list; m->hapi_name; ++m)
638 *m->hapi_id = register_hook(m->hapi_name);
639 }
640
641 if(mheader->mapi_hfn_list)
642 {
643 mapi_hfn_list_av1 *m;
644 for (m = mheader->mapi_hfn_list; m->hapi_name; ++m)
91b12782
EK
645 {
646 int priority = m->priority;
647 if (priority == 0)
648 priority = HOOK_NORMAL;
eed4099e 649 add_hook_prio(m->hapi_name, m->fn, priority);
91b12782 650 }
8e9c6a75
EM
651 }
652
653 /* New in MAPI v2 - version replacement */
654 ver = mheader->mapi_module_version ? mheader->mapi_module_version : ircd_version;
655 description = mheader->mapi_module_description;
8e9c6a75 656 }
0e5bf029
EM
657
658 break;
212380e3
AC
659 default:
660 ilog(L_MAIN, "Module %s has unknown/unsupported MAPI version %d.",
0a87075b 661 mod_displayname, MAPI_VERSION(*mapi_version));
a9227555 662 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
212380e3 663 "Module %s has unknown/unsupported MAPI version %d.",
0a87075b 664 mod_displayname, *mapi_version);
f272e7ab 665 lt_dlclose(tmpptr);
0a87075b 666 rb_free(mod_displayname);
aa483e55 667 return false;
212380e3
AC
668 }
669
670 if(ver == NULL)
671 ver = unknown_ver;
672
8e9c6a75
EM
673 if(description == NULL)
674 description = unknown_description;
675
e55a9d6a
AC
676 mod = rb_malloc(sizeof(struct module));
677 mod->address = tmpptr;
678 mod->version = ver;
679 mod->description = description;
680 mod->core = core;
681 mod->name = rb_strdup(mod_displayname);
682 mod->mapi_header = mapi_version;
683 mod->mapi_version = MAPI_VERSION(*mapi_version);
684 mod->origin = origin;
df7e3dab 685 mod->path = rb_strdup(path);
e55a9d6a 686 rb_dlinkAdd(mod, &mod->node, &module_list);
212380e3 687
aa483e55 688 if(warn)
212380e3 689 {
c63aeb44
EM
690 const char *o;
691
978b7232 692 switch (origin)
c63aeb44 693 {
c63aeb44
EM
694 case MAPI_ORIGIN_EXTENSION:
695 o = "extension";
696 break;
697 case MAPI_ORIGIN_CORE:
698 o = "core";
699 break;
700 default:
701 o = "unknown";
702 break;
703 }
704
a9227555 705 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
02831b6f 706 "Module %s [version: %s; MAPI version: %d; origin: %s; description: \"%s\"] loaded at %p",
0a87075b 707 mod_displayname, ver, MAPI_VERSION(*mapi_version), o, description,
02831b6f
AC
708 (void *) tmpptr);
709 ilog(L_MAIN, "Module %s [version: %s; MAPI version: %d; origin: %s; description: \"%s\"] loaded at %p",
0a87075b 710 mod_displayname, ver, MAPI_VERSION(*mapi_version), o, description, (void *) tmpptr);
212380e3 711 }
0a87075b 712 rb_free(mod_displayname);
aa483e55 713 return true;
212380e3 714}
41390bfe 715
7b641013
EK
716void
717modules_do_reload(void *info_)
718{
719 struct modreload *info = info_;
720 struct module *mod;
721 int check_core;
6aa5c725 722 int origin;
7b641013 723 char *m_bn = rb_basename(info->module);
df7e3dab 724 char *path;
7b641013
EK
725 struct Client *source_p = find_id(info->id);
726
727 if((mod = findmodule_byname(m_bn)) == NULL)
728 {
729 if (source_p) sendto_one_notice(source_p, ":Module %s is not loaded", m_bn);
730 rb_free(info);
731 rb_free(m_bn);
732 return;
733 }
734
6aa5c725 735 origin = mod->origin;
7b641013 736 check_core = mod->core;
df7e3dab 737 path = rb_strdup(mod->path);
7b641013
EK
738
739 mod_remember_clicaps();
740
741 if(unload_one_module(m_bn, true) == false)
742 {
743 if (source_p) sendto_one_notice(source_p, ":Module %s is not loaded", m_bn);
744 rb_free(info);
745 rb_free(m_bn);
df7e3dab 746 rb_free(path);
7b641013
EK
747 return;
748 }
749
df7e3dab 750 if((load_a_module(path, true, origin, check_core) == false) && check_core)
7b641013
EK
751 {
752 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
753 "Error reloading core module: %s: terminating ircd", m_bn);
754 ilog(L_MAIN, "Error loading core module %s: terminating ircd", m_bn);
755 exit(0);
756 }
757
758 mod_notify_clicaps();
759
760 rb_free(info);
761 rb_free(m_bn);
df7e3dab 762 rb_free(path);
7b641013
EK
763}
764
41390bfe
AJ
765void
766modules_do_restart(void *unused)
767{
768 unsigned int modnum = 0;
769 rb_dlink_node *ptr, *nptr;
770
28cc8bb9
EK
771 mod_remember_clicaps();
772
41390bfe
AJ
773 RB_DLINK_FOREACH_SAFE(ptr, nptr, module_list.head)
774 {
775 struct module *mod = ptr->data;
776 if(!unload_one_module(mod->name, false))
777 {
778 ilog(L_MAIN, "Module Restart: %s was not unloaded %s",
779 mod->name,
780 mod->core? "(core module)" : "");
781
782 if(!mod->core)
783 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
784 "Module Restart: %s failed to unload",
785 mod->name);
786 continue;
787 }
788
789 modnum++;
790 }
791
792 load_all_modules(false);
793 load_core_modules(false);
794 rehash(false);
795
28cc8bb9
EK
796 mod_notify_clicaps();
797
41390bfe
AJ
798 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
799 "Module Restart: %u modules unloaded, %lu modules loaded",
800 modnum, rb_dlink_list_length(&module_list));
801 ilog(L_MAIN, "Module Restart: %u modules unloaded, %lu modules loaded", modnum, rb_dlink_list_length(&module_list));
802}