blob: 6c206b9212b16d7a944189e01c0057be7d5d65af [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/* Postprocess module symbol versions
2 *
3 * Copyright 2003 Kai Germaschewski
4 * Copyright 2002-2004 Rusty Russell, IBM Corporation
Sam Ravnborgdf578e72008-01-11 19:17:15 +01005 * Copyright 2006-2008 Sam Ravnborg
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 * Based in part on module-init-tools/depmod.c,file2alias
7 *
8 * This software may be used and distributed according to the terms
9 * of the GNU General Public License, incorporated herein by reference.
10 *
11 * Usage: modpost vmlinux module1.o module2.o ...
12 */
13
14#include <ctype.h>
15#include "modpost.h"
Sam Ravnborgb817f6f2006-06-09 21:53:55 +020016#include "../../include/linux/license.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070017
18/* Are we using CONFIG_MODVERSIONS? */
19int modversions = 0;
20/* Warn about undefined symbols? (do so if we have vmlinux) */
21int have_vmlinux = 0;
22/* Is CONFIG_MODULE_SRCVERSION_ALL set? */
23static int all_versions = 0;
Sam Ravnborg040fcc82006-01-28 22:15:55 +010024/* If we are modposting external module set to 1 */
25static int external_module = 0;
Sam Ravnborg8d8d8282007-07-20 22:36:56 +020026/* Warn about section mismatch in vmlinux if set to 1 */
27static int vmlinux_section_warnings = 1;
Kirill Korotaevc53ddac2006-09-07 13:08:54 -070028/* Only warn about unresolved symbols */
29static int warn_unresolved = 0;
Ram Paibd5cbce2006-06-08 22:12:53 -070030/* How a symbol is exported */
Sam Ravnborgc96fca22006-07-01 11:44:23 +020031enum export {
32 export_plain, export_unused, export_gpl,
33 export_unused_gpl, export_gpl_future, export_unknown
34};
Linus Torvalds1da177e2005-04-16 15:20:36 -070035
Andi Kleen6d9a89e2007-11-22 03:43:08 +010036#define PRINTF __attribute__ ((format (printf, 1, 2)))
37
38PRINTF void fatal(const char *fmt, ...)
Linus Torvalds1da177e2005-04-16 15:20:36 -070039{
40 va_list arglist;
41
42 fprintf(stderr, "FATAL: ");
43
44 va_start(arglist, fmt);
45 vfprintf(stderr, fmt, arglist);
46 va_end(arglist);
47
48 exit(1);
49}
50
Andi Kleen6d9a89e2007-11-22 03:43:08 +010051PRINTF void warn(const char *fmt, ...)
Linus Torvalds1da177e2005-04-16 15:20:36 -070052{
53 va_list arglist;
54
55 fprintf(stderr, "WARNING: ");
56
57 va_start(arglist, fmt);
58 vfprintf(stderr, fmt, arglist);
59 va_end(arglist);
60}
61
Andi Kleen6d9a89e2007-11-22 03:43:08 +010062PRINTF void merror(const char *fmt, ...)
Matthew Wilcox2a116652006-10-07 05:35:32 -060063{
64 va_list arglist;
65
66 fprintf(stderr, "ERROR: ");
67
68 va_start(arglist, fmt);
69 vfprintf(stderr, fmt, arglist);
70 va_end(arglist);
71}
72
Sam Ravnborg040fcc82006-01-28 22:15:55 +010073static int is_vmlinux(const char *modname)
74{
75 const char *myname;
76
Sam Ravnborgdf578e72008-01-11 19:17:15 +010077 myname = strrchr(modname, '/');
78 if (myname)
Sam Ravnborg040fcc82006-01-28 22:15:55 +010079 myname++;
80 else
81 myname = modname;
82
Sam Ravnborg741f98f2007-07-17 10:54:06 +020083 return (strcmp(myname, "vmlinux") == 0) ||
84 (strcmp(myname, "vmlinux.o") == 0);
Sam Ravnborg040fcc82006-01-28 22:15:55 +010085}
86
Linus Torvalds1da177e2005-04-16 15:20:36 -070087void *do_nofail(void *ptr, const char *expr)
88{
Sam Ravnborgdf578e72008-01-11 19:17:15 +010089 if (!ptr)
Linus Torvalds1da177e2005-04-16 15:20:36 -070090 fatal("modpost: Memory allocation failure: %s.\n", expr);
Sam Ravnborgdf578e72008-01-11 19:17:15 +010091
Linus Torvalds1da177e2005-04-16 15:20:36 -070092 return ptr;
93}
94
95/* A list of all modules we processed */
Linus Torvalds1da177e2005-04-16 15:20:36 -070096static struct module *modules;
97
Sam Ravnborg5c3ead82006-01-28 17:19:35 +010098static struct module *find_module(char *modname)
Linus Torvalds1da177e2005-04-16 15:20:36 -070099{
100 struct module *mod;
101
102 for (mod = modules; mod; mod = mod->next)
103 if (strcmp(mod->name, modname) == 0)
104 break;
105 return mod;
106}
107
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100108static struct module *new_module(char *modname)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109{
110 struct module *mod;
111 char *p, *s;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100112
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113 mod = NOFAIL(malloc(sizeof(*mod)));
114 memset(mod, 0, sizeof(*mod));
115 p = NOFAIL(strdup(modname));
116
117 /* strip trailing .o */
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100118 s = strrchr(p, '.');
119 if (s != NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700120 if (strcmp(s, ".o") == 0)
121 *s = '\0';
122
123 /* add to list */
124 mod->name = p;
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200125 mod->gpl_compatible = -1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126 mod->next = modules;
127 modules = mod;
128
129 return mod;
130}
131
132/* A hash of all exported symbols,
133 * struct symbol is also used for lists of unresolved symbols */
134
135#define SYMBOL_HASH_SIZE 1024
136
137struct symbol {
138 struct symbol *next;
139 struct module *module;
140 unsigned int crc;
141 int crc_valid;
142 unsigned int weak:1;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100143 unsigned int vmlinux:1; /* 1 if symbol is defined in vmlinux */
144 unsigned int kernel:1; /* 1 if symbol is from kernel
145 * (only for external modules) **/
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100146 unsigned int preloaded:1; /* 1 if symbol from Module.symvers */
Ram Paibd5cbce2006-06-08 22:12:53 -0700147 enum export export; /* Type of export */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148 char name[0];
149};
150
151static struct symbol *symbolhash[SYMBOL_HASH_SIZE];
152
153/* This is based on the hash agorithm from gdbm, via tdb */
154static inline unsigned int tdb_hash(const char *name)
155{
156 unsigned value; /* Used to compute the hash value. */
157 unsigned i; /* Used to cycle through random values. */
158
159 /* Set the initial value from the key size. */
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100160 for (value = 0x238F13AF * strlen(name), i = 0; name[i]; i++)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700161 value = (value + (((unsigned char *)name)[i] << (i*5 % 24)));
162
163 return (1103515243 * value + 12345);
164}
165
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100166/**
167 * Allocate a new symbols for use in the hash of exported symbols or
168 * the list of unresolved symbols per module
169 **/
170static struct symbol *alloc_symbol(const char *name, unsigned int weak,
171 struct symbol *next)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700172{
173 struct symbol *s = NOFAIL(malloc(sizeof(*s) + strlen(name) + 1));
174
175 memset(s, 0, sizeof(*s));
176 strcpy(s->name, name);
177 s->weak = weak;
178 s->next = next;
179 return s;
180}
181
182/* For the hash of exported symbols */
Ram Paibd5cbce2006-06-08 22:12:53 -0700183static struct symbol *new_symbol(const char *name, struct module *module,
184 enum export export)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700185{
186 unsigned int hash;
187 struct symbol *new;
188
189 hash = tdb_hash(name) % SYMBOL_HASH_SIZE;
190 new = symbolhash[hash] = alloc_symbol(name, 0, symbolhash[hash]);
191 new->module = module;
Ram Paibd5cbce2006-06-08 22:12:53 -0700192 new->export = export;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100193 return new;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194}
195
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100196static struct symbol *find_symbol(const char *name)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700197{
198 struct symbol *s;
199
200 /* For our purposes, .foo matches foo. PPC64 needs this. */
201 if (name[0] == '.')
202 name++;
203
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100204 for (s = symbolhash[tdb_hash(name) % SYMBOL_HASH_SIZE]; s; s = s->next) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700205 if (strcmp(s->name, name) == 0)
206 return s;
207 }
208 return NULL;
209}
210
Ram Paibd5cbce2006-06-08 22:12:53 -0700211static struct {
212 const char *str;
213 enum export export;
214} export_list[] = {
215 { .str = "EXPORT_SYMBOL", .export = export_plain },
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200216 { .str = "EXPORT_UNUSED_SYMBOL", .export = export_unused },
Ram Paibd5cbce2006-06-08 22:12:53 -0700217 { .str = "EXPORT_SYMBOL_GPL", .export = export_gpl },
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200218 { .str = "EXPORT_UNUSED_SYMBOL_GPL", .export = export_unused_gpl },
Ram Paibd5cbce2006-06-08 22:12:53 -0700219 { .str = "EXPORT_SYMBOL_GPL_FUTURE", .export = export_gpl_future },
220 { .str = "(unknown)", .export = export_unknown },
221};
222
223
224static const char *export_str(enum export ex)
225{
226 return export_list[ex].str;
227}
228
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100229static enum export export_no(const char *s)
Ram Paibd5cbce2006-06-08 22:12:53 -0700230{
231 int i;
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100232
Sam Ravnborg534b89a2006-07-01 10:10:19 +0200233 if (!s)
234 return export_unknown;
Ram Paibd5cbce2006-06-08 22:12:53 -0700235 for (i = 0; export_list[i].export != export_unknown; i++) {
236 if (strcmp(export_list[i].str, s) == 0)
237 return export_list[i].export;
238 }
239 return export_unknown;
240}
241
242static enum export export_from_sec(struct elf_info *elf, Elf_Section sec)
243{
244 if (sec == elf->export_sec)
245 return export_plain;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200246 else if (sec == elf->export_unused_sec)
247 return export_unused;
Ram Paibd5cbce2006-06-08 22:12:53 -0700248 else if (sec == elf->export_gpl_sec)
249 return export_gpl;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200250 else if (sec == elf->export_unused_gpl_sec)
251 return export_unused_gpl;
Ram Paibd5cbce2006-06-08 22:12:53 -0700252 else if (sec == elf->export_gpl_future_sec)
253 return export_gpl_future;
254 else
255 return export_unknown;
256}
257
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100258/**
259 * Add an exported symbol - it may have already been added without a
260 * CRC, in this case just update the CRC
261 **/
Ram Paibd5cbce2006-06-08 22:12:53 -0700262static struct symbol *sym_add_exported(const char *name, struct module *mod,
263 enum export export)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700264{
265 struct symbol *s = find_symbol(name);
266
267 if (!s) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700268 s = new_symbol(name, mod, export);
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100269 } else {
270 if (!s->preloaded) {
Sam Ravnborg7b75b132006-03-05 13:48:58 +0100271 warn("%s: '%s' exported twice. Previous export "
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100272 "was in %s%s\n", mod->name, name,
273 s->module->name,
274 is_vmlinux(s->module->name) ?"":".ko");
Trent Piepho4b219602007-10-11 16:40:10 -0700275 } else {
276 /* In case Modules.symvers was out of date */
277 s->module = mod;
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100278 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700279 }
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100280 s->preloaded = 0;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100281 s->vmlinux = is_vmlinux(mod->name);
282 s->kernel = 0;
Ram Paibd5cbce2006-06-08 22:12:53 -0700283 s->export = export;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100284 return s;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285}
286
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100287static void sym_update_crc(const char *name, struct module *mod,
Ram Paibd5cbce2006-06-08 22:12:53 -0700288 unsigned int crc, enum export export)
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100289{
290 struct symbol *s = find_symbol(name);
291
292 if (!s)
Ram Paibd5cbce2006-06-08 22:12:53 -0700293 s = new_symbol(name, mod, export);
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100294 s->crc = crc;
295 s->crc_valid = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700296}
297
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100298void *grab_file(const char *filename, unsigned long *size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700299{
300 struct stat st;
301 void *map;
302 int fd;
303
304 fd = open(filename, O_RDONLY);
305 if (fd < 0 || fstat(fd, &st) != 0)
306 return NULL;
307
308 *size = st.st_size;
309 map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
310 close(fd);
311
312 if (map == MAP_FAILED)
313 return NULL;
314 return map;
315}
316
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100317/**
318 * Return a copy of the next line in a mmap'ed file.
319 * spaces in the beginning of the line is trimmed away.
320 * Return a pointer to a static buffer.
321 **/
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100322char *get_next_line(unsigned long *pos, void *file, unsigned long size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700323{
324 static char line[4096];
325 int skip = 1;
326 size_t len = 0;
327 signed char *p = (signed char *)file + *pos;
328 char *s = line;
329
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100330 for (; *pos < size ; (*pos)++) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700331 if (skip && isspace(*p)) {
332 p++;
333 continue;
334 }
335 skip = 0;
336 if (*p != '\n' && (*pos < size)) {
337 len++;
338 *s++ = *p++;
339 if (len > 4095)
340 break; /* Too long, stop */
341 } else {
342 /* End of string */
343 *s = '\0';
344 return line;
345 }
346 }
347 /* End of buffer */
348 return NULL;
349}
350
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100351void release_file(void *file, unsigned long size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700352{
353 munmap(file, size);
354}
355
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100356static int parse_elf(struct elf_info *info, const char *filename)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700357{
358 unsigned int i;
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100359 Elf_Ehdr *hdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700360 Elf_Shdr *sechdrs;
361 Elf_Sym *sym;
362
363 hdr = grab_file(filename, &info->size);
364 if (!hdr) {
365 perror(filename);
Sam Ravnborg6803dc02006-06-24 23:46:54 +0200366 exit(1);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700367 }
368 info->hdr = hdr;
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100369 if (info->size < sizeof(*hdr)) {
370 /* file too small, assume this is an empty .o file */
371 return 0;
372 }
373 /* Is this a valid ELF file? */
374 if ((hdr->e_ident[EI_MAG0] != ELFMAG0) ||
375 (hdr->e_ident[EI_MAG1] != ELFMAG1) ||
376 (hdr->e_ident[EI_MAG2] != ELFMAG2) ||
377 (hdr->e_ident[EI_MAG3] != ELFMAG3)) {
378 /* Not an ELF file - silently ignore it */
379 return 0;
380 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700381 /* Fix endianness in ELF header */
382 hdr->e_shoff = TO_NATIVE(hdr->e_shoff);
383 hdr->e_shstrndx = TO_NATIVE(hdr->e_shstrndx);
384 hdr->e_shnum = TO_NATIVE(hdr->e_shnum);
385 hdr->e_machine = TO_NATIVE(hdr->e_machine);
Atsushi Nemotoae4ac122007-05-22 18:27:39 +0900386 hdr->e_type = TO_NATIVE(hdr->e_type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 sechdrs = (void *)hdr + hdr->e_shoff;
388 info->sechdrs = sechdrs;
389
Petr Stetiara83710e2007-08-27 12:15:07 +0200390 /* Check if file offset is correct */
391 if (hdr->e_shoff > info->size) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100392 fatal("section header offset=%lu in file '%s' is bigger than "
393 "filesize=%lu\n", (unsigned long)hdr->e_shoff,
394 filename, info->size);
Petr Stetiara83710e2007-08-27 12:15:07 +0200395 return 0;
396 }
397
Linus Torvalds1da177e2005-04-16 15:20:36 -0700398 /* Fix endianness in section headers */
399 for (i = 0; i < hdr->e_shnum; i++) {
400 sechdrs[i].sh_type = TO_NATIVE(sechdrs[i].sh_type);
401 sechdrs[i].sh_offset = TO_NATIVE(sechdrs[i].sh_offset);
402 sechdrs[i].sh_size = TO_NATIVE(sechdrs[i].sh_size);
403 sechdrs[i].sh_link = TO_NATIVE(sechdrs[i].sh_link);
404 sechdrs[i].sh_name = TO_NATIVE(sechdrs[i].sh_name);
Atsushi Nemotoae4ac122007-05-22 18:27:39 +0900405 sechdrs[i].sh_info = TO_NATIVE(sechdrs[i].sh_info);
406 sechdrs[i].sh_addr = TO_NATIVE(sechdrs[i].sh_addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700407 }
408 /* Find symbol table. */
409 for (i = 1; i < hdr->e_shnum; i++) {
410 const char *secstrings
411 = (void *)hdr + sechdrs[hdr->e_shstrndx].sh_offset;
Ram Paibd5cbce2006-06-08 22:12:53 -0700412 const char *secname;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700413
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100414 if (sechdrs[i].sh_offset > info->size) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100415 fatal("%s is truncated. sechdrs[i].sh_offset=%lu > "
416 "sizeof(*hrd)=%zu\n", filename,
417 (unsigned long)sechdrs[i].sh_offset,
418 sizeof(*hdr));
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100419 return 0;
420 }
Ram Paibd5cbce2006-06-08 22:12:53 -0700421 secname = secstrings + sechdrs[i].sh_name;
422 if (strcmp(secname, ".modinfo") == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700423 info->modinfo = (void *)hdr + sechdrs[i].sh_offset;
424 info->modinfo_len = sechdrs[i].sh_size;
Ram Paibd5cbce2006-06-08 22:12:53 -0700425 } else if (strcmp(secname, "__ksymtab") == 0)
426 info->export_sec = i;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200427 else if (strcmp(secname, "__ksymtab_unused") == 0)
428 info->export_unused_sec = i;
Ram Paibd5cbce2006-06-08 22:12:53 -0700429 else if (strcmp(secname, "__ksymtab_gpl") == 0)
430 info->export_gpl_sec = i;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200431 else if (strcmp(secname, "__ksymtab_unused_gpl") == 0)
432 info->export_unused_gpl_sec = i;
Ram Paibd5cbce2006-06-08 22:12:53 -0700433 else if (strcmp(secname, "__ksymtab_gpl_future") == 0)
434 info->export_gpl_future_sec = i;
435
Linus Torvalds1da177e2005-04-16 15:20:36 -0700436 if (sechdrs[i].sh_type != SHT_SYMTAB)
437 continue;
438
439 info->symtab_start = (void *)hdr + sechdrs[i].sh_offset;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100440 info->symtab_stop = (void *)hdr + sechdrs[i].sh_offset
Linus Torvalds1da177e2005-04-16 15:20:36 -0700441 + sechdrs[i].sh_size;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100442 info->strtab = (void *)hdr +
Linus Torvalds1da177e2005-04-16 15:20:36 -0700443 sechdrs[sechdrs[i].sh_link].sh_offset;
444 }
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100445 if (!info->symtab_start)
Sam Ravnborgcb805142006-01-28 16:57:26 +0100446 fatal("%s has no symtab?\n", filename);
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100447
Linus Torvalds1da177e2005-04-16 15:20:36 -0700448 /* Fix endianness in symbols */
449 for (sym = info->symtab_start; sym < info->symtab_stop; sym++) {
450 sym->st_shndx = TO_NATIVE(sym->st_shndx);
451 sym->st_name = TO_NATIVE(sym->st_name);
452 sym->st_value = TO_NATIVE(sym->st_value);
453 sym->st_size = TO_NATIVE(sym->st_size);
454 }
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100455 return 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700456}
457
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100458static void parse_elf_finish(struct elf_info *info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700459{
460 release_file(info->hdr, info->size);
461}
462
Luke Yangf7b05e62006-03-02 18:35:31 +0800463#define CRC_PFX MODULE_SYMBOL_PREFIX "__crc_"
464#define KSYMTAB_PFX MODULE_SYMBOL_PREFIX "__ksymtab_"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100466static void handle_modversions(struct module *mod, struct elf_info *info,
467 Elf_Sym *sym, const char *symname)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700468{
469 unsigned int crc;
Ram Paibd5cbce2006-06-08 22:12:53 -0700470 enum export export = export_from_sec(info, sym->st_shndx);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700471
472 switch (sym->st_shndx) {
473 case SHN_COMMON:
Sam Ravnborgcb805142006-01-28 16:57:26 +0100474 warn("\"%s\" [%s] is COMMON symbol\n", symname, mod->name);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700475 break;
476 case SHN_ABS:
477 /* CRC'd symbol */
478 if (memcmp(symname, CRC_PFX, strlen(CRC_PFX)) == 0) {
479 crc = (unsigned int) sym->st_value;
Ram Paibd5cbce2006-06-08 22:12:53 -0700480 sym_update_crc(symname + strlen(CRC_PFX), mod, crc,
481 export);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700482 }
483 break;
484 case SHN_UNDEF:
485 /* undefined symbol */
486 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
487 ELF_ST_BIND(sym->st_info) != STB_WEAK)
488 break;
489 /* ignore global offset table */
490 if (strcmp(symname, "_GLOBAL_OFFSET_TABLE_") == 0)
491 break;
492 /* ignore __this_module, it will be resolved shortly */
493 if (strcmp(symname, MODULE_SYMBOL_PREFIX "__this_module") == 0)
494 break;
Ben Colline8d529012005-08-19 13:44:57 -0700495/* cope with newer glibc (2.3.4 or higher) STT_ definition in elf.h */
496#if defined(STT_REGISTER) || defined(STT_SPARC_REGISTER)
497/* add compatibility with older glibc */
498#ifndef STT_SPARC_REGISTER
499#define STT_SPARC_REGISTER STT_REGISTER
500#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700501 if (info->hdr->e_machine == EM_SPARC ||
502 info->hdr->e_machine == EM_SPARCV9) {
503 /* Ignore register directives. */
Ben Colline8d529012005-08-19 13:44:57 -0700504 if (ELF_ST_TYPE(sym->st_info) == STT_SPARC_REGISTER)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700505 break;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100506 if (symname[0] == '.') {
507 char *munged = strdup(symname);
508 munged[0] = '_';
509 munged[1] = toupper(munged[1]);
510 symname = munged;
511 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700512 }
513#endif
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100514
Linus Torvalds1da177e2005-04-16 15:20:36 -0700515 if (memcmp(symname, MODULE_SYMBOL_PREFIX,
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100516 strlen(MODULE_SYMBOL_PREFIX)) == 0) {
517 mod->unres =
518 alloc_symbol(symname +
519 strlen(MODULE_SYMBOL_PREFIX),
520 ELF_ST_BIND(sym->st_info) == STB_WEAK,
521 mod->unres);
522 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700523 break;
524 default:
525 /* All exported symbols */
526 if (memcmp(symname, KSYMTAB_PFX, strlen(KSYMTAB_PFX)) == 0) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700527 sym_add_exported(symname + strlen(KSYMTAB_PFX), mod,
528 export);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700529 }
530 if (strcmp(symname, MODULE_SYMBOL_PREFIX "init_module") == 0)
531 mod->has_init = 1;
532 if (strcmp(symname, MODULE_SYMBOL_PREFIX "cleanup_module") == 0)
533 mod->has_cleanup = 1;
534 break;
535 }
536}
537
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100538/**
539 * Parse tag=value strings from .modinfo section
540 **/
Linus Torvalds1da177e2005-04-16 15:20:36 -0700541static char *next_string(char *string, unsigned long *secsize)
542{
543 /* Skip non-zero chars */
544 while (string[0]) {
545 string++;
546 if ((*secsize)-- <= 1)
547 return NULL;
548 }
549
550 /* Skip any zero padding. */
551 while (!string[0]) {
552 string++;
553 if ((*secsize)-- <= 1)
554 return NULL;
555 }
556 return string;
557}
558
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200559static char *get_next_modinfo(void *modinfo, unsigned long modinfo_len,
560 const char *tag, char *info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700561{
562 char *p;
563 unsigned int taglen = strlen(tag);
564 unsigned long size = modinfo_len;
565
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200566 if (info) {
567 size -= info - (char *)modinfo;
568 modinfo = next_string(info, &size);
569 }
570
Linus Torvalds1da177e2005-04-16 15:20:36 -0700571 for (p = modinfo; p; p = next_string(p, &size)) {
572 if (strncmp(p, tag, taglen) == 0 && p[taglen] == '=')
573 return p + taglen + 1;
574 }
575 return NULL;
576}
577
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200578static char *get_modinfo(void *modinfo, unsigned long modinfo_len,
579 const char *tag)
580
581{
582 return get_next_modinfo(modinfo, modinfo_len, tag, NULL);
583}
584
Sam Ravnborg93684d32006-02-19 11:53:35 +0100585/**
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100586 * Test if string s ends in string sub
587 * return 0 if match
588 **/
589static int strrcmp(const char *s, const char *sub)
590{
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100591 int slen, sublen;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100592
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100593 if (!s || !sub)
594 return 1;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100595
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100596 slen = strlen(s);
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100597 sublen = strlen(sub);
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100598
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100599 if ((slen == 0) || (sublen == 0))
600 return 1;
601
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100602 if (sublen > slen)
603 return 1;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100604
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100605 return memcmp(s + slen - sublen, sub, sublen);
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100606}
607
Sam Ravnborg10668222008-01-13 22:21:31 +0100608/* if sym is empty or point to a string
609 * like ".[0-9]+" then return 1.
610 * This is the optional prefix added by ld to some sections
611 */
612static int number_prefix(const char *sym)
613{
614 if (*sym++ == '\0')
615 return 1;
616 if (*sym != '.')
617 return 0;
618 do {
619 char c = *sym++;
620 if (c < '0' || c > '9')
621 return 0;
622 } while (*sym);
623 return 1;
624}
625
626/* The pattern is an array of simple patterns.
627 * "foo" will match an exact string equal to "foo"
628 * "foo*" will match a string that begins with "foo"
629 * "foo$" will match a string equal to "foo" or "foo.1"
630 * where the '1' can be any number including several digits.
631 * The $ syntax is for sections where ld append a dot number
632 * to make section name unique.
633 */
634int match(const char *sym, const char * const pat[])
635{
636 const char *p;
637 while (*pat) {
638 p = *pat++;
639 const char *endp = p + strlen(p) - 1;
640
641 /* "foo*" */
642 if (*endp == '*') {
643 if (strncmp(sym, p, strlen(p) - 1) == 0)
644 return 1;
645 }
646 /* "foo$" */
647 else if (*endp == '$') {
648 if (strncmp(sym, p, strlen(p) - 1) == 0) {
649 if (number_prefix(sym + strlen(p) - 1))
650 return 1;
651 }
652 }
653 /* no wildcards */
654 else {
655 if (strcmp(p, sym) == 0)
656 return 1;
657 }
658 }
659 /* no match */
660 return 0;
661}
662
Sam Ravnborg2f5ee612007-07-25 21:46:40 +0200663/*
664 * Functions used only during module init is marked __init and is stored in
665 * a .init.text section. Likewise data is marked __initdata and stored in
666 * a .init.data section.
667 * If this section is one of these sections return 1
668 * See include/linux/init.h for the details
669 */
670static int init_section(const char *name)
671{
672 if (strcmp(name, ".init") == 0)
673 return 1;
674 if (strncmp(name, ".init.", strlen(".init.")) == 0)
675 return 1;
676 return 0;
677}
678
679/*
680 * Functions used only during module exit is marked __exit and is stored in
681 * a .exit.text section. Likewise data is marked __exitdata and stored in
682 * a .exit.data section.
683 * If this section is one of these sections return 1
684 * See include/linux/init.h for the details
685 **/
686static int exit_section(const char *name)
687{
688 if (strcmp(name, ".exit.text") == 0)
689 return 1;
690 if (strcmp(name, ".exit.data") == 0)
691 return 1;
692 return 0;
693
694}
695
696/*
697 * Data sections are named like this:
698 * .data | .data.rel | .data.rel.*
699 * Return 1 if the specified section is a data section
700 */
701static int data_section(const char *name)
702{
703 if ((strcmp(name, ".data") == 0) ||
704 (strcmp(name, ".data.rel") == 0) ||
705 (strncmp(name, ".data.rel.", strlen(".data.rel.")) == 0))
706 return 1;
707 else
708 return 0;
709}
710
Sam Ravnborg10668222008-01-13 22:21:31 +0100711/* sections that we do not want to do full section mismatch check on */
712static const char *section_white_list[] =
713 { ".debug*", ".stab*", ".note*", ".got*", ".toc*", NULL };
714
715#define INIT_DATA_SECTIONS ".init.data$"
716#define EXIT_DATA_SECTIONS ".exit.data$"
717
718#define INIT_TEXT_SECTIONS ".init.text$"
719#define EXIT_TEXT_SECTIONS ".exit.text$"
720
721#define INIT_SECTIONS INIT_DATA_SECTIONS, INIT_TEXT_SECTIONS
722#define EXIT_SECTIONS EXIT_DATA_SECTIONS, EXIT_TEXT_SECTIONS
723
724#define DATA_SECTIONS ".data$"
725#define TEXT_SECTIONS ".text$"
726
727struct sectioncheck {
728 const char *fromsec[20];
729 const char *tosec[20];
730};
731
732const struct sectioncheck sectioncheck[] = {
733/* Do not reference init/exit code/data from
734 * normal code and data
735 */
736{
737 .fromsec = { TEXT_SECTIONS, DATA_SECTIONS, NULL },
738 .tosec = { INIT_SECTIONS, EXIT_SECTIONS, NULL }
739},
740/* Do not use exit code/data from init code */
741{
742 .fromsec = { INIT_SECTIONS, NULL },
743 .tosec = { EXIT_SECTIONS, NULL },
744},
745/* Do not use init code/data from exit code */
746{
747 .fromsec = { EXIT_SECTIONS, NULL },
748 .tosec = { INIT_SECTIONS, NULL }
749},
750/* Do not export init/exit functions or data */
751{
752 .fromsec = { "__ksymtab*", NULL },
753 .tosec = { INIT_SECTIONS, EXIT_SECTIONS, NULL }
754}
755};
756
757static int section_mismatch(const char *fromsec, const char *tosec)
758{
759 int i;
760 int elems = sizeof(sectioncheck) / sizeof(struct sectioncheck);
761 const struct sectioncheck *check = &sectioncheck[0];
762
763 for (i = 0; i < elems; i++) {
764 if (match(fromsec, check->fromsec) &&
765 match(tosec, check->tosec))
766 return 1;
767 check++;
768 }
769 return 0;
770}
771
772
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100773/**
774 * Whitelist to allow certain references to pass with no warning.
Sam Ravnborg0e0d3142007-05-17 20:14:48 +0200775 *
776 * Pattern 0:
777 * Do not warn if funtion/data are marked with __init_refok/__initdata_refok.
778 * The pattern is identified by:
Sam Ravnborgcb7e51d2007-07-25 22:24:52 +0200779 * fromsec = .text.init.refok* | .data.init.refok*
Sam Ravnborg0e0d3142007-05-17 20:14:48 +0200780 *
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100781 * Pattern 1:
782 * If a module parameter is declared __initdata and permissions=0
783 * then this is legal despite the warning generated.
784 * We cannot see value of permissions here, so just ignore
785 * this pattern.
786 * The pattern is identified by:
787 * tosec = .init.data
Sam Ravnborg9209aed2006-03-05 00:16:26 +0100788 * fromsec = .data*
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100789 * atsym =__param*
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100790 *
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100791 * Pattern 2:
Randy Dunlap72ee59b2006-04-15 11:17:12 -0700792 * Many drivers utilise a *driver container with references to
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100793 * add, remove, probe functions etc.
794 * These functions may often be marked __init and we do not want to
795 * warn here.
796 * the pattern is identified by:
Sam Ravnborg83cda2b2007-07-25 21:52:31 +0200797 * tosec = init or exit section
798 * fromsec = data section
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100799 * atsym = *driver, *_template, *_sht, *_ops, *_probe,
800 * *probe_one, *_console, *_timer
Vivek Goyalee6a8542007-01-11 01:52:44 +0100801 *
802 * Pattern 3:
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +0100803 * Whitelist all refereces from .text.head to .init.data
804 * Whitelist all refereces from .text.head to .init.text
805 *
Sam Ravnborg1d8af552007-06-03 00:41:22 +0200806 * Pattern 4:
Vivek Goyalee6a8542007-01-11 01:52:44 +0100807 * Some symbols belong to init section but still it is ok to reference
808 * these from non-init sections as these symbols don't have any memory
809 * allocated for them and symbol address and value are same. So even
810 * if init section is freed, its ok to reference those symbols.
811 * For ex. symbols marking the init section boundaries.
812 * This pattern is identified by
813 * refsymname = __init_begin, _sinittext, _einittext
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +0100814 *
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100815 **/
Magnus Damm9e157a52006-08-08 17:32:11 +0900816static int secref_whitelist(const char *modname, const char *tosec,
Vivek Goyalee6a8542007-01-11 01:52:44 +0100817 const char *fromsec, const char *atsym,
818 const char *refsymname)
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100819{
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100820 const char **s;
821 const char *pat2sym[] = {
Randy Dunlap72ee59b2006-04-15 11:17:12 -0700822 "driver",
Sam Ravnborg5ecdd0f2006-04-14 23:54:13 +0200823 "_template", /* scsi uses *_template a lot */
Sam Ravnborg1e29a702007-06-03 22:19:24 +0200824 "_timer", /* arm uses ops structures named _timer a lot */
Sam Ravnborg5ecdd0f2006-04-14 23:54:13 +0200825 "_sht", /* scsi also used *_sht to some extent */
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100826 "_ops",
827 "_probe",
828 "_probe_one",
Vivek Goyal118c0ac2007-01-11 01:52:44 +0100829 "_console",
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100830 NULL
831 };
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100832
Vivek Goyalee6a8542007-01-11 01:52:44 +0100833 const char *pat3refsym[] = {
834 "__init_begin",
835 "_sinittext",
836 "_einittext",
837 NULL
838 };
839
Sam Ravnborg0e0d3142007-05-17 20:14:48 +0200840 /* Check for pattern 0 */
Sam Ravnborgcb7e51d2007-07-25 22:24:52 +0200841 if ((strncmp(fromsec, ".text.init.refok", strlen(".text.init.refok")) == 0) ||
Pavel Emelyanov46650792007-10-08 20:38:39 -0700842 (strncmp(fromsec, ".exit.text.refok", strlen(".exit.text.refok")) == 0) ||
Sam Ravnborgcb7e51d2007-07-25 22:24:52 +0200843 (strncmp(fromsec, ".data.init.refok", strlen(".data.init.refok")) == 0))
Sam Ravnborg0e0d3142007-05-17 20:14:48 +0200844 return 1;
845
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100846 /* Check for pattern 1 */
Sam Ravnborg83cda2b2007-07-25 21:52:31 +0200847 if ((strcmp(tosec, ".init.data") == 0) &&
848 (strncmp(fromsec, ".data", strlen(".data")) == 0) &&
849 (strncmp(atsym, "__param", strlen("__param")) == 0))
850 return 1;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100851
852 /* Check for pattern 2 */
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100853 if ((init_section(tosec) || exit_section(tosec))
854 && data_section(fromsec))
Sam Ravnborg83cda2b2007-07-25 21:52:31 +0200855 for (s = pat2sym; *s; s++)
856 if (strrcmp(atsym, *s) == 0)
857 return 1;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100858
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +0100859 /* Check for pattern 3 */
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +0100860 if ((strcmp(fromsec, ".text.head") == 0) &&
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100861 ((strcmp(tosec, ".init.data") == 0) ||
862 (strcmp(tosec, ".init.text") == 0)))
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +0100863 return 1;
864
Sam Ravnborg1d8af552007-06-03 00:41:22 +0200865 /* Check for pattern 4 */
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +0100866 for (s = pat3refsym; *s; s++)
867 if (strcmp(refsymname, *s) == 0)
868 return 1;
869
Sam Ravnborg93659af2006-08-09 08:23:55 +0200870 return 0;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100871}
872
873/**
Sam Ravnborg93684d32006-02-19 11:53:35 +0100874 * Find symbol based on relocation record info.
875 * In some cases the symbol supplied is a valid symbol so
876 * return refsym. If st_name != 0 we assume this is a valid symbol.
877 * In other cases the symbol needs to be looked up in the symbol table
878 * based on section and address.
879 * **/
Sam Ravnborg9ad21c32008-01-18 21:04:34 +0100880static Elf_Sym *find_elf_symbol(struct elf_info *elf, Elf64_Sword addr,
Sam Ravnborg93684d32006-02-19 11:53:35 +0100881 Elf_Sym *relsym)
882{
883 Elf_Sym *sym;
Sam Ravnborg9ad21c32008-01-18 21:04:34 +0100884 Elf_Sym *near = NULL;
885 Elf64_Sword distance = 20;
886 Elf64_Sword d;
Sam Ravnborg93684d32006-02-19 11:53:35 +0100887
888 if (relsym->st_name != 0)
889 return relsym;
890 for (sym = elf->symtab_start; sym < elf->symtab_stop; sym++) {
891 if (sym->st_shndx != relsym->st_shndx)
892 continue;
Atsushi Nemotoae4ac122007-05-22 18:27:39 +0900893 if (ELF_ST_TYPE(sym->st_info) == STT_SECTION)
894 continue;
Sam Ravnborg93684d32006-02-19 11:53:35 +0100895 if (sym->st_value == addr)
896 return sym;
Sam Ravnborg9ad21c32008-01-18 21:04:34 +0100897 /* Find a symbol nearby - addr are maybe negative */
898 d = sym->st_value - addr;
899 if (d < 0)
900 d = addr - sym->st_value;
901 if (d < distance) {
902 distance = d;
903 near = sym;
904 }
Sam Ravnborg93684d32006-02-19 11:53:35 +0100905 }
Sam Ravnborg9ad21c32008-01-18 21:04:34 +0100906 /* We need a close match */
907 if (distance < 20)
908 return near;
909 else
910 return NULL;
Sam Ravnborg93684d32006-02-19 11:53:35 +0100911}
912
David Brownellda68d612007-02-20 13:58:16 -0800913static inline int is_arm_mapping_symbol(const char *str)
914{
915 return str[0] == '$' && strchr("atd", str[1])
916 && (str[2] == '\0' || str[2] == '.');
917}
918
919/*
920 * If there's no name there, ignore it; likewise, ignore it if it's
921 * one of the magic symbols emitted used by current ARM tools.
922 *
923 * Otherwise if find_symbols_between() returns those symbols, they'll
924 * fail the whitelist tests and cause lots of false alarms ... fixable
925 * only by merging __exit and __init sections into __text, bloating
926 * the kernel (which is especially evil on embedded platforms).
927 */
928static inline int is_valid_name(struct elf_info *elf, Elf_Sym *sym)
929{
930 const char *name = elf->strtab + sym->st_name;
931
932 if (!name || !strlen(name))
933 return 0;
934 return !is_arm_mapping_symbol(name);
935}
936
Sam Ravnborgb39927c2006-02-17 22:42:02 +0100937/*
Sam Ravnborg43c74d12006-03-05 12:02:46 +0100938 * Find symbols before or equal addr and after addr - in the section sec.
939 * If we find two symbols with equal offset prefer one with a valid name.
940 * The ELF format may have a better way to detect what type of symbol
941 * it is, but this works for now.
Sam Ravnborgb39927c2006-02-17 22:42:02 +0100942 **/
943static void find_symbols_between(struct elf_info *elf, Elf_Addr addr,
944 const char *sec,
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100945 Elf_Sym **before, Elf_Sym **after)
Sam Ravnborgb39927c2006-02-17 22:42:02 +0100946{
947 Elf_Sym *sym;
948 Elf_Ehdr *hdr = elf->hdr;
949 Elf_Addr beforediff = ~0;
950 Elf_Addr afterdiff = ~0;
951 const char *secstrings = (void *)hdr +
952 elf->sechdrs[hdr->e_shstrndx].sh_offset;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100953
Sam Ravnborgb39927c2006-02-17 22:42:02 +0100954 *before = NULL;
955 *after = NULL;
956
957 for (sym = elf->symtab_start; sym < elf->symtab_stop; sym++) {
958 const char *symsec;
959
960 if (sym->st_shndx >= SHN_LORESERVE)
961 continue;
962 symsec = secstrings + elf->sechdrs[sym->st_shndx].sh_name;
963 if (strcmp(symsec, sec) != 0)
964 continue;
David Brownellda68d612007-02-20 13:58:16 -0800965 if (!is_valid_name(elf, sym))
966 continue;
Sam Ravnborgb39927c2006-02-17 22:42:02 +0100967 if (sym->st_value <= addr) {
968 if ((addr - sym->st_value) < beforediff) {
969 beforediff = addr - sym->st_value;
970 *before = sym;
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100971 } else if ((addr - sym->st_value) == beforediff) {
David Brownellda68d612007-02-20 13:58:16 -0800972 *before = sym;
Sam Ravnborg43c74d12006-03-05 12:02:46 +0100973 }
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100974 } else {
Sam Ravnborgb39927c2006-02-17 22:42:02 +0100975 if ((sym->st_value - addr) < afterdiff) {
976 afterdiff = sym->st_value - addr;
977 *after = sym;
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100978 } else if ((sym->st_value - addr) == afterdiff)
David Brownellda68d612007-02-20 13:58:16 -0800979 *after = sym;
Sam Ravnborgb39927c2006-02-17 22:42:02 +0100980 }
981 }
982}
983
984/**
985 * Print a warning about a section mismatch.
986 * Try to find symbols near it so user can find it.
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100987 * Check whitelist before warning - it may be a false positive.
Sam Ravnborgb39927c2006-02-17 22:42:02 +0100988 **/
989static void warn_sec_mismatch(const char *modname, const char *fromsec,
990 struct elf_info *elf, Elf_Sym *sym, Elf_Rela r)
991{
Sam Ravnborg93684d32006-02-19 11:53:35 +0100992 const char *refsymname = "";
993 Elf_Sym *before, *after;
994 Elf_Sym *refsym;
Sam Ravnborgb39927c2006-02-17 22:42:02 +0100995 Elf_Ehdr *hdr = elf->hdr;
996 Elf_Shdr *sechdrs = elf->sechdrs;
997 const char *secstrings = (void *)hdr +
998 sechdrs[hdr->e_shstrndx].sh_offset;
999 const char *secname = secstrings + sechdrs[sym->st_shndx].sh_name;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001000
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001001 find_symbols_between(elf, r.r_offset, fromsec, &before, &after);
1002
Sam Ravnborg93684d32006-02-19 11:53:35 +01001003 refsym = find_elf_symbol(elf, r.r_addend, sym);
1004 if (refsym && strlen(elf->strtab + refsym->st_name))
1005 refsymname = elf->strtab + refsym->st_name;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001006
1007 /* check whitelist - we may ignore it */
Sam Ravnborgcb7e51d2007-07-25 22:24:52 +02001008 if (secref_whitelist(modname, secname, fromsec,
1009 before ? elf->strtab + before->st_name : "",
1010 refsymname))
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001011 return;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001012
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001013 if (before && after) {
Russell King256012092007-05-10 23:03:25 +01001014 warn("%s(%s+0x%llx): Section mismatch: reference to %s:%s "
1015 "(between '%s' and '%s')\n",
1016 modname, fromsec, (unsigned long long)r.r_offset,
1017 secname, refsymname,
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001018 elf->strtab + before->st_name,
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001019 elf->strtab + after->st_name);
1020 } else if (before) {
Russell King256012092007-05-10 23:03:25 +01001021 warn("%s(%s+0x%llx): Section mismatch: reference to %s:%s "
1022 "(after '%s')\n",
1023 modname, fromsec, (unsigned long long)r.r_offset,
1024 secname, refsymname,
1025 elf->strtab + before->st_name);
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001026 } else if (after) {
Russell King256012092007-05-10 23:03:25 +01001027 warn("%s(%s+0x%llx): Section mismatch: reference to %s:%s "
Sam Ravnborg93684d32006-02-19 11:53:35 +01001028 "before '%s' (at offset -0x%llx)\n",
Russell King256012092007-05-10 23:03:25 +01001029 modname, fromsec, (unsigned long long)r.r_offset,
1030 secname, refsymname,
Andi Kleen58b7a682007-11-22 03:43:09 +01001031 elf->strtab + after->st_name,
1032 (unsigned long long)r.r_offset);
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001033 } else {
Russell King256012092007-05-10 23:03:25 +01001034 warn("%s(%s+0x%llx): Section mismatch: reference to %s:%s\n",
1035 modname, fromsec, (unsigned long long)r.r_offset,
1036 secname, refsymname);
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001037 }
1038}
1039
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001040static unsigned int *reloc_location(struct elf_info *elf,
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001041 Elf_Shdr *sechdr, Elf_Rela *r)
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001042{
1043 Elf_Shdr *sechdrs = elf->sechdrs;
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001044 int section = sechdr->sh_info;
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001045
1046 return (void *)elf->hdr + sechdrs[section].sh_offset +
1047 (r->r_offset - sechdrs[section].sh_addr);
1048}
1049
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001050static int addend_386_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001051{
1052 unsigned int r_typ = ELF_R_TYPE(r->r_info);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001053 unsigned int *location = reloc_location(elf, sechdr, r);
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001054
1055 switch (r_typ) {
1056 case R_386_32:
1057 r->r_addend = TO_NATIVE(*location);
1058 break;
1059 case R_386_PC32:
1060 r->r_addend = TO_NATIVE(*location) + 4;
1061 /* For CONFIG_RELOCATABLE=y */
1062 if (elf->hdr->e_type == ET_EXEC)
1063 r->r_addend += r->r_offset;
1064 break;
1065 }
1066 return 0;
1067}
1068
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001069static int addend_arm_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001070{
1071 unsigned int r_typ = ELF_R_TYPE(r->r_info);
1072
1073 switch (r_typ) {
1074 case R_ARM_ABS32:
1075 /* From ARM ABI: (S + A) | T */
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001076 r->r_addend = (int)(long)
1077 (elf->symtab_start + ELF_R_SYM(r->r_info));
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001078 break;
1079 case R_ARM_PC24:
1080 /* From ARM ABI: ((S + A) | T) - P */
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001081 r->r_addend = (int)(long)(elf->hdr +
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001082 sechdr->sh_offset +
1083 (r->r_offset - sechdr->sh_addr));
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001084 break;
1085 default:
1086 return 1;
1087 }
1088 return 0;
1089}
1090
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001091static int addend_mips_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001092{
1093 unsigned int r_typ = ELF_R_TYPE(r->r_info);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001094 unsigned int *location = reloc_location(elf, sechdr, r);
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001095 unsigned int inst;
1096
1097 if (r_typ == R_MIPS_HI16)
1098 return 1; /* skip this */
1099 inst = TO_NATIVE(*location);
1100 switch (r_typ) {
1101 case R_MIPS_LO16:
1102 r->r_addend = inst & 0xffff;
1103 break;
1104 case R_MIPS_26:
1105 r->r_addend = (inst & 0x03ffffff) << 2;
1106 break;
1107 case R_MIPS_32:
1108 r->r_addend = inst;
1109 break;
1110 }
1111 return 0;
1112}
1113
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001114static void section_rela(const char *modname, struct elf_info *elf,
Sam Ravnborg10668222008-01-13 22:21:31 +01001115 Elf_Shdr *sechdr)
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001116{
1117 Elf_Sym *sym;
1118 Elf_Rela *rela;
1119 Elf_Rela r;
1120 unsigned int r_sym;
1121 const char *fromsec;
1122 const char * tosec;
1123
1124 Elf_Ehdr *hdr = elf->hdr;
1125 Elf_Rela *start = (void *)hdr + sechdr->sh_offset;
1126 Elf_Rela *stop = (void *)start + sechdr->sh_size;
1127
1128 const char *secstrings = (void *)hdr +
1129 elf->sechdrs[hdr->e_shstrndx].sh_offset;
1130
1131 fromsec = secstrings + sechdr->sh_name;
1132 fromsec += strlen(".rela");
1133 /* if from section (name) is know good then skip it */
Sam Ravnborg10668222008-01-13 22:21:31 +01001134 if (match(fromsec, section_white_list))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001135 return;
1136
1137 for (rela = start; rela < stop; rela++) {
1138 r.r_offset = TO_NATIVE(rela->r_offset);
1139#if KERNEL_ELFCLASS == ELFCLASS64
1140 if (hdr->e_machine == EM_MIPS) {
1141 unsigned int r_typ;
1142 r_sym = ELF64_MIPS_R_SYM(rela->r_info);
1143 r_sym = TO_NATIVE(r_sym);
1144 r_typ = ELF64_MIPS_R_TYPE(rela->r_info);
1145 r.r_info = ELF64_R_INFO(r_sym, r_typ);
1146 } else {
1147 r.r_info = TO_NATIVE(rela->r_info);
1148 r_sym = ELF_R_SYM(r.r_info);
1149 }
1150#else
1151 r.r_info = TO_NATIVE(rela->r_info);
1152 r_sym = ELF_R_SYM(r.r_info);
1153#endif
1154 r.r_addend = TO_NATIVE(rela->r_addend);
1155 sym = elf->symtab_start + r_sym;
1156 /* Skip special sections */
1157 if (sym->st_shndx >= SHN_LORESERVE)
1158 continue;
1159
1160 tosec = secstrings +
1161 elf->sechdrs[sym->st_shndx].sh_name;
Sam Ravnborg10668222008-01-13 22:21:31 +01001162 if (section_mismatch(fromsec, tosec))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001163 warn_sec_mismatch(modname, fromsec, elf, sym, r);
1164 }
1165}
1166
1167static void section_rel(const char *modname, struct elf_info *elf,
Sam Ravnborg10668222008-01-13 22:21:31 +01001168 Elf_Shdr *sechdr)
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001169{
1170 Elf_Sym *sym;
1171 Elf_Rel *rel;
1172 Elf_Rela r;
1173 unsigned int r_sym;
1174 const char *fromsec;
1175 const char * tosec;
1176
1177 Elf_Ehdr *hdr = elf->hdr;
1178 Elf_Rel *start = (void *)hdr + sechdr->sh_offset;
1179 Elf_Rel *stop = (void *)start + sechdr->sh_size;
1180
1181 const char *secstrings = (void *)hdr +
1182 elf->sechdrs[hdr->e_shstrndx].sh_offset;
1183
1184 fromsec = secstrings + sechdr->sh_name;
1185 fromsec += strlen(".rel");
1186 /* if from section (name) is know good then skip it */
Sam Ravnborg10668222008-01-13 22:21:31 +01001187 if (match(fromsec, section_white_list))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001188 return;
1189
1190 for (rel = start; rel < stop; rel++) {
1191 r.r_offset = TO_NATIVE(rel->r_offset);
1192#if KERNEL_ELFCLASS == ELFCLASS64
1193 if (hdr->e_machine == EM_MIPS) {
1194 unsigned int r_typ;
1195 r_sym = ELF64_MIPS_R_SYM(rel->r_info);
1196 r_sym = TO_NATIVE(r_sym);
1197 r_typ = ELF64_MIPS_R_TYPE(rel->r_info);
1198 r.r_info = ELF64_R_INFO(r_sym, r_typ);
1199 } else {
1200 r.r_info = TO_NATIVE(rel->r_info);
1201 r_sym = ELF_R_SYM(r.r_info);
1202 }
1203#else
1204 r.r_info = TO_NATIVE(rel->r_info);
1205 r_sym = ELF_R_SYM(r.r_info);
1206#endif
1207 r.r_addend = 0;
1208 switch (hdr->e_machine) {
1209 case EM_386:
1210 if (addend_386_rel(elf, sechdr, &r))
1211 continue;
1212 break;
1213 case EM_ARM:
1214 if (addend_arm_rel(elf, sechdr, &r))
1215 continue;
1216 break;
1217 case EM_MIPS:
1218 if (addend_mips_rel(elf, sechdr, &r))
1219 continue;
1220 break;
1221 }
1222 sym = elf->symtab_start + r_sym;
1223 /* Skip special sections */
1224 if (sym->st_shndx >= SHN_LORESERVE)
1225 continue;
1226
1227 tosec = secstrings +
1228 elf->sechdrs[sym->st_shndx].sh_name;
Sam Ravnborg10668222008-01-13 22:21:31 +01001229 if (section_mismatch(fromsec, tosec))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001230 warn_sec_mismatch(modname, fromsec, elf, sym, r);
1231 }
1232}
1233
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001234/**
1235 * A module includes a number of sections that are discarded
1236 * either when loaded or when used as built-in.
1237 * For loaded modules all functions marked __init and all data
1238 * marked __initdata will be discarded when the module has been intialized.
1239 * Likewise for modules used built-in the sections marked __exit
1240 * are discarded because __exit marked function are supposed to be called
1241 * only when a moduel is unloaded which never happes for built-in modules.
1242 * The check_sec_ref() function traverses all relocation records
1243 * to find all references to a section that reference a section that will
1244 * be discarded and warns about it.
1245 **/
1246static void check_sec_ref(struct module *mod, const char *modname,
Sam Ravnborg10668222008-01-13 22:21:31 +01001247 struct elf_info *elf)
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001248{
1249 int i;
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001250 Elf_Ehdr *hdr = elf->hdr;
1251 Elf_Shdr *sechdrs = elf->sechdrs;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001252
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001253 /* Walk through all sections */
1254 for (i = 0; i < hdr->e_shnum; i++) {
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001255 /* We want to process only relocation sections and not .init */
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001256 if (sechdrs[i].sh_type == SHT_RELA)
Sam Ravnborg10668222008-01-13 22:21:31 +01001257 section_rela(modname, elf, &elf->sechdrs[i]);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001258 else if (sechdrs[i].sh_type == SHT_REL)
Sam Ravnborg10668222008-01-13 22:21:31 +01001259 section_rel(modname, elf, &elf->sechdrs[i]);
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001260 }
1261}
1262
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001263static void read_symbols(char *modname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001264{
1265 const char *symname;
1266 char *version;
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001267 char *license;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001268 struct module *mod;
1269 struct elf_info info = { };
1270 Elf_Sym *sym;
1271
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +01001272 if (!parse_elf(&info, modname))
1273 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001274
1275 mod = new_module(modname);
1276
1277 /* When there's no vmlinux, don't print warnings about
1278 * unresolved symbols (since there'll be too many ;) */
1279 if (is_vmlinux(modname)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001280 have_vmlinux = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001281 mod->skip = 1;
1282 }
1283
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001284 license = get_modinfo(info.modinfo, info.modinfo_len, "license");
1285 while (license) {
1286 if (license_is_gpl_compatible(license))
1287 mod->gpl_compatible = 1;
1288 else {
1289 mod->gpl_compatible = 0;
1290 break;
1291 }
1292 license = get_next_modinfo(info.modinfo, info.modinfo_len,
1293 "license", license);
1294 }
1295
Linus Torvalds1da177e2005-04-16 15:20:36 -07001296 for (sym = info.symtab_start; sym < info.symtab_stop; sym++) {
1297 symname = info.strtab + sym->st_name;
1298
1299 handle_modversions(mod, &info, sym, symname);
1300 handle_moddevtable(mod, &info, sym, symname);
1301 }
Sam Ravnborgd1f25e62008-01-17 21:17:42 +01001302 if (!is_vmlinux(modname) ||
Sam Ravnborg10668222008-01-13 22:21:31 +01001303 (is_vmlinux(modname) && vmlinux_section_warnings))
1304 check_sec_ref(mod, modname, &info);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001305
1306 version = get_modinfo(info.modinfo, info.modinfo_len, "version");
1307 if (version)
1308 maybe_frob_rcs_version(modname, version, info.modinfo,
1309 version - (char *)info.hdr);
1310 if (version || (all_versions && !is_vmlinux(modname)))
1311 get_src_version(modname, mod->srcversion,
1312 sizeof(mod->srcversion)-1);
1313
1314 parse_elf_finish(&info);
1315
1316 /* Our trick to get versioning for struct_module - it's
1317 * never passed as an argument to an exported function, so
1318 * the automatic versioning doesn't pick it up, but it's really
1319 * important anyhow */
1320 if (modversions)
1321 mod->unres = alloc_symbol("struct_module", 0, mod->unres);
1322}
1323
1324#define SZ 500
1325
1326/* We first write the generated file into memory using the
1327 * following helper, then compare to the file on disk and
1328 * only update the later if anything changed */
1329
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001330void __attribute__((format(printf, 2, 3))) buf_printf(struct buffer *buf,
1331 const char *fmt, ...)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001332{
1333 char tmp[SZ];
1334 int len;
1335 va_list ap;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001336
Linus Torvalds1da177e2005-04-16 15:20:36 -07001337 va_start(ap, fmt);
1338 len = vsnprintf(tmp, SZ, fmt, ap);
Sam Ravnborg7670f022006-03-16 23:04:08 -08001339 buf_write(buf, tmp, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001340 va_end(ap);
1341}
1342
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001343void buf_write(struct buffer *buf, const char *s, int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001344{
1345 if (buf->size - buf->pos < len) {
Sam Ravnborg7670f022006-03-16 23:04:08 -08001346 buf->size += len + SZ;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001347 buf->p = realloc(buf->p, buf->size);
1348 }
1349 strncpy(buf->p + buf->pos, s, len);
1350 buf->pos += len;
1351}
1352
Sam Ravnborgc96fca22006-07-01 11:44:23 +02001353static void check_for_gpl_usage(enum export exp, const char *m, const char *s)
1354{
1355 const char *e = is_vmlinux(m) ?"":".ko";
1356
1357 switch (exp) {
1358 case export_gpl:
1359 fatal("modpost: GPL-incompatible module %s%s "
1360 "uses GPL-only symbol '%s'\n", m, e, s);
1361 break;
1362 case export_unused_gpl:
1363 fatal("modpost: GPL-incompatible module %s%s "
1364 "uses GPL-only symbol marked UNUSED '%s'\n", m, e, s);
1365 break;
1366 case export_gpl_future:
1367 warn("modpost: GPL-incompatible module %s%s "
1368 "uses future GPL-only symbol '%s'\n", m, e, s);
1369 break;
1370 case export_plain:
1371 case export_unused:
1372 case export_unknown:
1373 /* ignore */
1374 break;
1375 }
1376}
1377
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001378static void check_for_unused(enum export exp, const char *m, const char *s)
Sam Ravnborgc96fca22006-07-01 11:44:23 +02001379{
1380 const char *e = is_vmlinux(m) ?"":".ko";
1381
1382 switch (exp) {
1383 case export_unused:
1384 case export_unused_gpl:
1385 warn("modpost: module %s%s "
1386 "uses symbol '%s' marked UNUSED\n", m, e, s);
1387 break;
1388 default:
1389 /* ignore */
1390 break;
1391 }
1392}
1393
1394static void check_exports(struct module *mod)
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001395{
1396 struct symbol *s, *exp;
1397
1398 for (s = mod->unres; s; s = s->next) {
Andrew Morton6449bd62006-06-09 20:45:06 -07001399 const char *basename;
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001400 exp = find_symbol(s->name);
1401 if (!exp || exp->module == mod)
1402 continue;
Andrew Morton6449bd62006-06-09 20:45:06 -07001403 basename = strrchr(mod->name, '/');
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001404 if (basename)
1405 basename++;
Sam Ravnborgc96fca22006-07-01 11:44:23 +02001406 else
1407 basename = mod->name;
1408 if (!mod->gpl_compatible)
1409 check_for_gpl_usage(exp->export, basename, exp->name);
1410 check_for_unused(exp->export, basename, exp->name);
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001411 }
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001412}
1413
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001414/**
1415 * Header for the generated file
1416 **/
1417static void add_header(struct buffer *b, struct module *mod)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001418{
1419 buf_printf(b, "#include <linux/module.h>\n");
1420 buf_printf(b, "#include <linux/vermagic.h>\n");
1421 buf_printf(b, "#include <linux/compiler.h>\n");
1422 buf_printf(b, "\n");
1423 buf_printf(b, "MODULE_INFO(vermagic, VERMAGIC_STRING);\n");
1424 buf_printf(b, "\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001425 buf_printf(b, "struct module __this_module\n");
1426 buf_printf(b, "__attribute__((section(\".gnu.linkonce.this_module\"))) = {\n");
Ustyugov Romanf83b5e32005-09-23 08:42:11 +04001427 buf_printf(b, " .name = KBUILD_MODNAME,\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001428 if (mod->has_init)
1429 buf_printf(b, " .init = init_module,\n");
1430 if (mod->has_cleanup)
1431 buf_printf(b, "#ifdef CONFIG_MODULE_UNLOAD\n"
1432 " .exit = cleanup_module,\n"
1433 "#endif\n");
Roman Zippele61a1c12007-05-09 02:35:15 -07001434 buf_printf(b, " .arch = MODULE_ARCH_INIT,\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001435 buf_printf(b, "};\n");
1436}
1437
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001438/**
1439 * Record CRCs for unresolved symbols
1440 **/
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001441static int add_versions(struct buffer *b, struct module *mod)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001442{
1443 struct symbol *s, *exp;
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001444 int err = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001445
1446 for (s = mod->unres; s; s = s->next) {
1447 exp = find_symbol(s->name);
1448 if (!exp || exp->module == mod) {
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001449 if (have_vmlinux && !s->weak) {
Matthew Wilcox2a116652006-10-07 05:35:32 -06001450 if (warn_unresolved) {
1451 warn("\"%s\" [%s.ko] undefined!\n",
1452 s->name, mod->name);
1453 } else {
1454 merror("\"%s\" [%s.ko] undefined!\n",
1455 s->name, mod->name);
1456 err = 1;
1457 }
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001458 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001459 continue;
1460 }
1461 s->module = exp->module;
1462 s->crc_valid = exp->crc_valid;
1463 s->crc = exp->crc;
1464 }
1465
1466 if (!modversions)
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001467 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001468
1469 buf_printf(b, "\n");
1470 buf_printf(b, "static const struct modversion_info ____versions[]\n");
1471 buf_printf(b, "__attribute_used__\n");
1472 buf_printf(b, "__attribute__((section(\"__versions\"))) = {\n");
1473
1474 for (s = mod->unres; s; s = s->next) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001475 if (!s->module)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001476 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001477 if (!s->crc_valid) {
Sam Ravnborgcb805142006-01-28 16:57:26 +01001478 warn("\"%s\" [%s.ko] has no CRC!\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -07001479 s->name, mod->name);
1480 continue;
1481 }
1482 buf_printf(b, "\t{ %#8x, \"%s\" },\n", s->crc, s->name);
1483 }
1484
1485 buf_printf(b, "};\n");
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001486
1487 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001488}
1489
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001490static void add_depends(struct buffer *b, struct module *mod,
1491 struct module *modules)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001492{
1493 struct symbol *s;
1494 struct module *m;
1495 int first = 1;
1496
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001497 for (m = modules; m; m = m->next)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001498 m->seen = is_vmlinux(m->name);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001499
1500 buf_printf(b, "\n");
1501 buf_printf(b, "static const char __module_depends[]\n");
1502 buf_printf(b, "__attribute_used__\n");
1503 buf_printf(b, "__attribute__((section(\".modinfo\"))) =\n");
1504 buf_printf(b, "\"depends=");
1505 for (s = mod->unres; s; s = s->next) {
Sam Ravnborga61b2df2007-02-26 19:46:52 +01001506 const char *p;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001507 if (!s->module)
1508 continue;
1509
1510 if (s->module->seen)
1511 continue;
1512
1513 s->module->seen = 1;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001514 p = strrchr(s->module->name, '/');
1515 if (p)
Sam Ravnborga61b2df2007-02-26 19:46:52 +01001516 p++;
1517 else
1518 p = s->module->name;
1519 buf_printf(b, "%s%s", first ? "" : ",", p);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001520 first = 0;
1521 }
1522 buf_printf(b, "\";\n");
1523}
1524
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001525static void add_srcversion(struct buffer *b, struct module *mod)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001526{
1527 if (mod->srcversion[0]) {
1528 buf_printf(b, "\n");
1529 buf_printf(b, "MODULE_INFO(srcversion, \"%s\");\n",
1530 mod->srcversion);
1531 }
1532}
1533
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001534static void write_if_changed(struct buffer *b, const char *fname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001535{
1536 char *tmp;
1537 FILE *file;
1538 struct stat st;
1539
1540 file = fopen(fname, "r");
1541 if (!file)
1542 goto write;
1543
1544 if (fstat(fileno(file), &st) < 0)
1545 goto close_write;
1546
1547 if (st.st_size != b->pos)
1548 goto close_write;
1549
1550 tmp = NOFAIL(malloc(b->pos));
1551 if (fread(tmp, 1, b->pos, file) != b->pos)
1552 goto free_write;
1553
1554 if (memcmp(tmp, b->p, b->pos) != 0)
1555 goto free_write;
1556
1557 free(tmp);
1558 fclose(file);
1559 return;
1560
1561 free_write:
1562 free(tmp);
1563 close_write:
1564 fclose(file);
1565 write:
1566 file = fopen(fname, "w");
1567 if (!file) {
1568 perror(fname);
1569 exit(1);
1570 }
1571 if (fwrite(b->p, 1, b->pos, file) != b->pos) {
1572 perror(fname);
1573 exit(1);
1574 }
1575 fclose(file);
1576}
1577
Ram Paibd5cbce2006-06-08 22:12:53 -07001578/* parse Module.symvers file. line format:
Sam Ravnborg534b89a2006-07-01 10:10:19 +02001579 * 0x12345678<tab>symbol<tab>module[[<tab>export]<tab>something]
Ram Paibd5cbce2006-06-08 22:12:53 -07001580 **/
Sam Ravnborg040fcc82006-01-28 22:15:55 +01001581static void read_dump(const char *fname, unsigned int kernel)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001582{
1583 unsigned long size, pos = 0;
1584 void *file = grab_file(fname, &size);
1585 char *line;
1586
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001587 if (!file)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001588 /* No symbol versions, silently ignore */
1589 return;
1590
1591 while ((line = get_next_line(&pos, file, size))) {
Sam Ravnborg534b89a2006-07-01 10:10:19 +02001592 char *symname, *modname, *d, *export, *end;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001593 unsigned int crc;
1594 struct module *mod;
Sam Ravnborg040fcc82006-01-28 22:15:55 +01001595 struct symbol *s;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001596
1597 if (!(symname = strchr(line, '\t')))
1598 goto fail;
1599 *symname++ = '\0';
1600 if (!(modname = strchr(symname, '\t')))
1601 goto fail;
1602 *modname++ = '\0';
Laurent Riffard9ac545b2006-06-11 08:02:06 +02001603 if ((export = strchr(modname, '\t')) != NULL)
Ram Paibd5cbce2006-06-08 22:12:53 -07001604 *export++ = '\0';
Sam Ravnborg534b89a2006-07-01 10:10:19 +02001605 if (export && ((end = strchr(export, '\t')) != NULL))
1606 *end = '\0';
Linus Torvalds1da177e2005-04-16 15:20:36 -07001607 crc = strtoul(line, &d, 16);
1608 if (*symname == '\0' || *modname == '\0' || *d != '\0')
1609 goto fail;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001610 mod = find_module(modname);
1611 if (!mod) {
1612 if (is_vmlinux(modname))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001613 have_vmlinux = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001614 mod = new_module(NOFAIL(strdup(modname)));
1615 mod->skip = 1;
1616 }
Ram Paibd5cbce2006-06-08 22:12:53 -07001617 s = sym_add_exported(symname, mod, export_no(export));
Sam Ravnborg8e70c452006-01-28 22:22:33 +01001618 s->kernel = kernel;
1619 s->preloaded = 1;
Ram Paibd5cbce2006-06-08 22:12:53 -07001620 sym_update_crc(symname, mod, crc, export_no(export));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001621 }
1622 return;
1623fail:
1624 fatal("parse error in symbol dump file\n");
1625}
1626
Sam Ravnborg040fcc82006-01-28 22:15:55 +01001627/* For normal builds always dump all symbols.
1628 * For external modules only dump symbols
1629 * that are not read from kernel Module.symvers.
1630 **/
1631static int dump_sym(struct symbol *sym)
1632{
1633 if (!external_module)
1634 return 1;
1635 if (sym->vmlinux || sym->kernel)
1636 return 0;
1637 return 1;
1638}
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001639
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001640static void write_dump(const char *fname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001641{
1642 struct buffer buf = { };
1643 struct symbol *symbol;
1644 int n;
1645
1646 for (n = 0; n < SYMBOL_HASH_SIZE ; n++) {
1647 symbol = symbolhash[n];
1648 while (symbol) {
Sam Ravnborg040fcc82006-01-28 22:15:55 +01001649 if (dump_sym(symbol))
Ram Paibd5cbce2006-06-08 22:12:53 -07001650 buf_printf(&buf, "0x%08x\t%s\t%s\t%s\n",
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001651 symbol->crc, symbol->name,
Ram Paibd5cbce2006-06-08 22:12:53 -07001652 symbol->module->name,
1653 export_str(symbol->export));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001654 symbol = symbol->next;
1655 }
1656 }
1657 write_if_changed(&buf, fname);
1658}
1659
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001660int main(int argc, char **argv)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001661{
1662 struct module *mod;
1663 struct buffer buf = { };
Sam Ravnborg040fcc82006-01-28 22:15:55 +01001664 char *kernel_read = NULL, *module_read = NULL;
1665 char *dump_write = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001666 int opt;
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001667 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001668
Sam Ravnborg8d8d8282007-07-20 22:36:56 +02001669 while ((opt = getopt(argc, argv, "i:I:mso:aw")) != -1) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001670 switch (opt) {
1671 case 'i':
1672 kernel_read = optarg;
1673 break;
1674 case 'I':
1675 module_read = optarg;
1676 external_module = 1;
1677 break;
1678 case 'm':
1679 modversions = 1;
1680 break;
1681 case 'o':
1682 dump_write = optarg;
1683 break;
1684 case 'a':
1685 all_versions = 1;
1686 break;
1687 case 's':
1688 vmlinux_section_warnings = 0;
1689 break;
1690 case 'w':
1691 warn_unresolved = 1;
1692 break;
1693 default:
1694 exit(1);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001695 }
1696 }
1697
Sam Ravnborg040fcc82006-01-28 22:15:55 +01001698 if (kernel_read)
1699 read_dump(kernel_read, 1);
1700 if (module_read)
1701 read_dump(module_read, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001702
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001703 while (optind < argc)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001704 read_symbols(argv[optind++]);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001705
1706 for (mod = modules; mod; mod = mod->next) {
1707 if (mod->skip)
1708 continue;
Sam Ravnborgc96fca22006-07-01 11:44:23 +02001709 check_exports(mod);
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001710 }
1711
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001712 err = 0;
1713
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001714 for (mod = modules; mod; mod = mod->next) {
Andi Kleen666ab412007-11-22 03:43:10 +01001715 char fname[strlen(mod->name) + 10];
1716
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001717 if (mod->skip)
1718 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001719
1720 buf.pos = 0;
1721
1722 add_header(&buf, mod);
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001723 err |= add_versions(&buf, mod);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001724 add_depends(&buf, mod, modules);
1725 add_moddevtable(&buf, mod);
1726 add_srcversion(&buf, mod);
1727
1728 sprintf(fname, "%s.mod.c", mod->name);
1729 write_if_changed(&buf, fname);
1730 }
1731
1732 if (dump_write)
1733 write_dump(dump_write);
1734
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001735 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001736}