blob: d439856f81760b7e12497e2167d641120ccb4a39 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/* Postprocess module symbol versions
2 *
3 * Copyright 2003 Kai Germaschewski
4 * Copyright 2002-2004 Rusty Russell, IBM Corporation
Sam Ravnborgdf578e72008-01-11 19:17:15 +01005 * Copyright 2006-2008 Sam Ravnborg
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 * Based in part on module-init-tools/depmod.c,file2alias
7 *
8 * This software may be used and distributed according to the terms
9 * of the GNU General Public License, incorporated herein by reference.
10 *
11 * Usage: modpost vmlinux module1.o module2.o ...
12 */
13
Mathieu Desnoyersb2e3e652008-02-13 15:03:39 -080014#define _GNU_SOURCE
15#include <stdio.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <ctype.h>
Andrew Morton5003bab2010-08-11 00:42:26 -070017#include <string.h>
Rusty Russell712f9b42013-04-04 17:37:38 +103018#include <limits.h>
Rusty Russelld4ef1c32013-04-04 17:37:32 +103019#include <stdbool.h>
Guenter Roeckeed380f2013-09-23 15:23:54 +093020#include <errno.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021#include "modpost.h"
Linus Torvalds5a865c02009-12-17 07:23:42 -080022#include "../../include/generated/autoconf.h"
Sam Ravnborgb817f6f2006-06-09 21:53:55 +020023#include "../../include/linux/license.h"
Rusty Russellb92021b2013-03-15 15:04:17 +103024#include "../../include/linux/export.h"
Alan Jenkins9e1b9b82009-11-07 21:03:54 +000025
Linus Torvalds1da177e2005-04-16 15:20:36 -070026/* Are we using CONFIG_MODVERSIONS? */
Mathias Krause7a3ee752014-08-27 20:28:53 +093027static int modversions = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070028/* Warn about undefined symbols? (do so if we have vmlinux) */
Mathias Krause7a3ee752014-08-27 20:28:53 +093029static int have_vmlinux = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070030/* Is CONFIG_MODULE_SRCVERSION_ALL set? */
31static int all_versions = 0;
Sam Ravnborg040fcc82006-01-28 22:15:55 +010032/* If we are modposting external module set to 1 */
33static int external_module = 0;
Sam Ravnborg8d8d8282007-07-20 22:36:56 +020034/* Warn about section mismatch in vmlinux if set to 1 */
35static int vmlinux_section_warnings = 1;
Kirill Korotaevc53ddac2006-09-07 13:08:54 -070036/* Only warn about unresolved symbols */
37static int warn_unresolved = 0;
Ram Paibd5cbce2006-06-08 22:12:53 -070038/* How a symbol is exported */
Sam Ravnborg588ccd72008-01-24 21:12:37 +010039static int sec_mismatch_count = 0;
40static int sec_mismatch_verbose = 1;
Guenter Roeckeed380f2013-09-23 15:23:54 +093041/* ignore missing files */
42static int ignore_missing_files;
Sam Ravnborg588ccd72008-01-24 21:12:37 +010043
Sam Ravnborgc96fca22006-07-01 11:44:23 +020044enum export {
45 export_plain, export_unused, export_gpl,
46 export_unused_gpl, export_gpl_future, export_unknown
47};
Linus Torvalds1da177e2005-04-16 15:20:36 -070048
Andi Kleen6d9a89e2007-11-22 03:43:08 +010049#define PRINTF __attribute__ ((format (printf, 1, 2)))
50
51PRINTF void fatal(const char *fmt, ...)
Linus Torvalds1da177e2005-04-16 15:20:36 -070052{
53 va_list arglist;
54
55 fprintf(stderr, "FATAL: ");
56
57 va_start(arglist, fmt);
58 vfprintf(stderr, fmt, arglist);
59 va_end(arglist);
60
61 exit(1);
62}
63
Andi Kleen6d9a89e2007-11-22 03:43:08 +010064PRINTF void warn(const char *fmt, ...)
Linus Torvalds1da177e2005-04-16 15:20:36 -070065{
66 va_list arglist;
67
68 fprintf(stderr, "WARNING: ");
69
70 va_start(arglist, fmt);
71 vfprintf(stderr, fmt, arglist);
72 va_end(arglist);
73}
74
Andi Kleen6d9a89e2007-11-22 03:43:08 +010075PRINTF void merror(const char *fmt, ...)
Matthew Wilcox2a116652006-10-07 05:35:32 -060076{
77 va_list arglist;
78
79 fprintf(stderr, "ERROR: ");
80
81 va_start(arglist, fmt);
82 vfprintf(stderr, fmt, arglist);
83 va_end(arglist);
84}
85
Rusty Russelld4ef1c32013-04-04 17:37:32 +103086static inline bool strends(const char *str, const char *postfix)
87{
88 if (strlen(str) < strlen(postfix))
89 return false;
90
91 return strcmp(str + strlen(str) - strlen(postfix), postfix) == 0;
92}
93
Sam Ravnborg040fcc82006-01-28 22:15:55 +010094static int is_vmlinux(const char *modname)
95{
96 const char *myname;
97
Sam Ravnborgdf578e72008-01-11 19:17:15 +010098 myname = strrchr(modname, '/');
99 if (myname)
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100100 myname++;
101 else
102 myname = modname;
103
Sam Ravnborg741f98f2007-07-17 10:54:06 +0200104 return (strcmp(myname, "vmlinux") == 0) ||
105 (strcmp(myname, "vmlinux.o") == 0);
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100106}
107
Linus Torvalds1da177e2005-04-16 15:20:36 -0700108void *do_nofail(void *ptr, const char *expr)
109{
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100110 if (!ptr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111 fatal("modpost: Memory allocation failure: %s.\n", expr);
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100112
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113 return ptr;
114}
115
116/* A list of all modules we processed */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700117static struct module *modules;
118
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100119static struct module *find_module(char *modname)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700120{
121 struct module *mod;
122
123 for (mod = modules; mod; mod = mod->next)
124 if (strcmp(mod->name, modname) == 0)
125 break;
126 return mod;
127}
128
Rusty Russelld4ef1c32013-04-04 17:37:32 +1030129static struct module *new_module(const char *modname)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130{
131 struct module *mod;
Rusty Russelld4ef1c32013-04-04 17:37:32 +1030132 char *p;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100133
Linus Torvalds1da177e2005-04-16 15:20:36 -0700134 mod = NOFAIL(malloc(sizeof(*mod)));
135 memset(mod, 0, sizeof(*mod));
136 p = NOFAIL(strdup(modname));
137
138 /* strip trailing .o */
Rusty Russelld4ef1c32013-04-04 17:37:32 +1030139 if (strends(p, ".o")) {
140 p[strlen(p) - 2] = '\0';
141 mod->is_dot_o = 1;
142 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700143
144 /* add to list */
145 mod->name = p;
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200146 mod->gpl_compatible = -1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700147 mod->next = modules;
148 modules = mod;
149
150 return mod;
151}
152
153/* A hash of all exported symbols,
154 * struct symbol is also used for lists of unresolved symbols */
155
156#define SYMBOL_HASH_SIZE 1024
157
158struct symbol {
159 struct symbol *next;
160 struct module *module;
161 unsigned int crc;
162 int crc_valid;
163 unsigned int weak:1;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100164 unsigned int vmlinux:1; /* 1 if symbol is defined in vmlinux */
165 unsigned int kernel:1; /* 1 if symbol is from kernel
166 * (only for external modules) **/
Rusty Russellb6568b12013-11-07 12:09:13 +1030167 unsigned int preloaded:1; /* 1 if symbol from Module.symvers, or crc */
Ram Paibd5cbce2006-06-08 22:12:53 -0700168 enum export export; /* Type of export */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700169 char name[0];
170};
171
172static struct symbol *symbolhash[SYMBOL_HASH_SIZE];
173
174/* This is based on the hash agorithm from gdbm, via tdb */
175static inline unsigned int tdb_hash(const char *name)
176{
177 unsigned value; /* Used to compute the hash value. */
178 unsigned i; /* Used to cycle through random values. */
179
180 /* Set the initial value from the key size. */
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100181 for (value = 0x238F13AF * strlen(name), i = 0; name[i]; i++)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700182 value = (value + (((unsigned char *)name)[i] << (i*5 % 24)));
183
184 return (1103515243 * value + 12345);
185}
186
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100187/**
188 * Allocate a new symbols for use in the hash of exported symbols or
189 * the list of unresolved symbols per module
190 **/
191static struct symbol *alloc_symbol(const char *name, unsigned int weak,
192 struct symbol *next)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700193{
194 struct symbol *s = NOFAIL(malloc(sizeof(*s) + strlen(name) + 1));
195
196 memset(s, 0, sizeof(*s));
197 strcpy(s->name, name);
198 s->weak = weak;
199 s->next = next;
200 return s;
201}
202
203/* For the hash of exported symbols */
Ram Paibd5cbce2006-06-08 22:12:53 -0700204static struct symbol *new_symbol(const char *name, struct module *module,
205 enum export export)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700206{
207 unsigned int hash;
208 struct symbol *new;
209
210 hash = tdb_hash(name) % SYMBOL_HASH_SIZE;
211 new = symbolhash[hash] = alloc_symbol(name, 0, symbolhash[hash]);
212 new->module = module;
Ram Paibd5cbce2006-06-08 22:12:53 -0700213 new->export = export;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100214 return new;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215}
216
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100217static struct symbol *find_symbol(const char *name)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700218{
219 struct symbol *s;
220
221 /* For our purposes, .foo matches foo. PPC64 needs this. */
222 if (name[0] == '.')
223 name++;
224
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100225 for (s = symbolhash[tdb_hash(name) % SYMBOL_HASH_SIZE]; s; s = s->next) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700226 if (strcmp(s->name, name) == 0)
227 return s;
228 }
229 return NULL;
230}
231
Mathias Krause7a3ee752014-08-27 20:28:53 +0930232static const struct {
Ram Paibd5cbce2006-06-08 22:12:53 -0700233 const char *str;
234 enum export export;
235} export_list[] = {
236 { .str = "EXPORT_SYMBOL", .export = export_plain },
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200237 { .str = "EXPORT_UNUSED_SYMBOL", .export = export_unused },
Ram Paibd5cbce2006-06-08 22:12:53 -0700238 { .str = "EXPORT_SYMBOL_GPL", .export = export_gpl },
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200239 { .str = "EXPORT_UNUSED_SYMBOL_GPL", .export = export_unused_gpl },
Ram Paibd5cbce2006-06-08 22:12:53 -0700240 { .str = "EXPORT_SYMBOL_GPL_FUTURE", .export = export_gpl_future },
241 { .str = "(unknown)", .export = export_unknown },
242};
243
244
245static const char *export_str(enum export ex)
246{
247 return export_list[ex].str;
248}
249
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100250static enum export export_no(const char *s)
Ram Paibd5cbce2006-06-08 22:12:53 -0700251{
252 int i;
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100253
Sam Ravnborg534b89a2006-07-01 10:10:19 +0200254 if (!s)
255 return export_unknown;
Ram Paibd5cbce2006-06-08 22:12:53 -0700256 for (i = 0; export_list[i].export != export_unknown; i++) {
257 if (strcmp(export_list[i].str, s) == 0)
258 return export_list[i].export;
259 }
260 return export_unknown;
261}
262
Alessio Igor Bogani62a26352011-07-14 08:51:16 +0200263static const char *sec_name(struct elf_info *elf, int secindex);
264
265#define strstarts(str, prefix) (strncmp(str, prefix, strlen(prefix)) == 0)
266
267static enum export export_from_secname(struct elf_info *elf, unsigned int sec)
268{
269 const char *secname = sec_name(elf, sec);
270
271 if (strstarts(secname, "___ksymtab+"))
272 return export_plain;
273 else if (strstarts(secname, "___ksymtab_unused+"))
274 return export_unused;
275 else if (strstarts(secname, "___ksymtab_gpl+"))
276 return export_gpl;
277 else if (strstarts(secname, "___ksymtab_unused_gpl+"))
278 return export_unused_gpl;
279 else if (strstarts(secname, "___ksymtab_gpl_future+"))
280 return export_gpl_future;
281 else
282 return export_unknown;
283}
284
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200285static enum export export_from_sec(struct elf_info *elf, unsigned int sec)
Ram Paibd5cbce2006-06-08 22:12:53 -0700286{
287 if (sec == elf->export_sec)
288 return export_plain;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200289 else if (sec == elf->export_unused_sec)
290 return export_unused;
Ram Paibd5cbce2006-06-08 22:12:53 -0700291 else if (sec == elf->export_gpl_sec)
292 return export_gpl;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200293 else if (sec == elf->export_unused_gpl_sec)
294 return export_unused_gpl;
Ram Paibd5cbce2006-06-08 22:12:53 -0700295 else if (sec == elf->export_gpl_future_sec)
296 return export_gpl_future;
297 else
298 return export_unknown;
299}
300
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100301/**
302 * Add an exported symbol - it may have already been added without a
303 * CRC, in this case just update the CRC
304 **/
Ram Paibd5cbce2006-06-08 22:12:53 -0700305static struct symbol *sym_add_exported(const char *name, struct module *mod,
306 enum export export)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700307{
308 struct symbol *s = find_symbol(name);
309
310 if (!s) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700311 s = new_symbol(name, mod, export);
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100312 } else {
313 if (!s->preloaded) {
Sam Ravnborg7b75b132006-03-05 13:48:58 +0100314 warn("%s: '%s' exported twice. Previous export "
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100315 "was in %s%s\n", mod->name, name,
316 s->module->name,
317 is_vmlinux(s->module->name) ?"":".ko");
Trent Piepho4b219602007-10-11 16:40:10 -0700318 } else {
Paul Bollebaec30e2014-04-16 18:05:35 +0200319 /* In case Module.symvers was out of date */
Trent Piepho4b219602007-10-11 16:40:10 -0700320 s->module = mod;
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100321 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700322 }
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100323 s->preloaded = 0;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100324 s->vmlinux = is_vmlinux(mod->name);
325 s->kernel = 0;
Ram Paibd5cbce2006-06-08 22:12:53 -0700326 s->export = export;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100327 return s;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700328}
329
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100330static void sym_update_crc(const char *name, struct module *mod,
Ram Paibd5cbce2006-06-08 22:12:53 -0700331 unsigned int crc, enum export export)
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100332{
333 struct symbol *s = find_symbol(name);
334
Rusty Russellb6568b12013-11-07 12:09:13 +1030335 if (!s) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700336 s = new_symbol(name, mod, export);
Rusty Russellb6568b12013-11-07 12:09:13 +1030337 /* Don't complain when we find it later. */
338 s->preloaded = 1;
339 }
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100340 s->crc = crc;
341 s->crc_valid = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700342}
343
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100344void *grab_file(const char *filename, unsigned long *size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700345{
346 struct stat st;
Jesper Juhleb3d5cc2012-05-23 22:28:49 +0930347 void *map = MAP_FAILED;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700348 int fd;
349
350 fd = open(filename, O_RDONLY);
Jesper Juhleb3d5cc2012-05-23 22:28:49 +0930351 if (fd < 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700352 return NULL;
Jesper Juhleb3d5cc2012-05-23 22:28:49 +0930353 if (fstat(fd, &st))
354 goto failed;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700355
356 *size = st.st_size;
357 map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700358
Jesper Juhleb3d5cc2012-05-23 22:28:49 +0930359failed:
360 close(fd);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700361 if (map == MAP_FAILED)
362 return NULL;
363 return map;
364}
365
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100366/**
367 * Return a copy of the next line in a mmap'ed file.
368 * spaces in the beginning of the line is trimmed away.
369 * Return a pointer to a static buffer.
370 **/
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100371char *get_next_line(unsigned long *pos, void *file, unsigned long size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700372{
373 static char line[4096];
374 int skip = 1;
375 size_t len = 0;
376 signed char *p = (signed char *)file + *pos;
377 char *s = line;
378
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100379 for (; *pos < size ; (*pos)++) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380 if (skip && isspace(*p)) {
381 p++;
382 continue;
383 }
384 skip = 0;
385 if (*p != '\n' && (*pos < size)) {
386 len++;
387 *s++ = *p++;
388 if (len > 4095)
389 break; /* Too long, stop */
390 } else {
391 /* End of string */
392 *s = '\0';
393 return line;
394 }
395 }
396 /* End of buffer */
397 return NULL;
398}
399
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100400void release_file(void *file, unsigned long size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700401{
402 munmap(file, size);
403}
404
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100405static int parse_elf(struct elf_info *info, const char *filename)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700406{
407 unsigned int i;
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100408 Elf_Ehdr *hdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409 Elf_Shdr *sechdrs;
410 Elf_Sym *sym;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200411 const char *secstrings;
412 unsigned int symtab_idx = ~0U, symtab_shndx_idx = ~0U;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700413
414 hdr = grab_file(filename, &info->size);
415 if (!hdr) {
Guenter Roeckeed380f2013-09-23 15:23:54 +0930416 if (ignore_missing_files) {
417 fprintf(stderr, "%s: %s (ignored)\n", filename,
418 strerror(errno));
419 return 0;
420 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700421 perror(filename);
Sam Ravnborg6803dc02006-06-24 23:46:54 +0200422 exit(1);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700423 }
424 info->hdr = hdr;
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100425 if (info->size < sizeof(*hdr)) {
426 /* file too small, assume this is an empty .o file */
427 return 0;
428 }
429 /* Is this a valid ELF file? */
430 if ((hdr->e_ident[EI_MAG0] != ELFMAG0) ||
431 (hdr->e_ident[EI_MAG1] != ELFMAG1) ||
432 (hdr->e_ident[EI_MAG2] != ELFMAG2) ||
433 (hdr->e_ident[EI_MAG3] != ELFMAG3)) {
434 /* Not an ELF file - silently ignore it */
435 return 0;
436 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437 /* Fix endianness in ELF header */
Anders Kaseorg7d875a02009-05-03 22:02:55 +0200438 hdr->e_type = TO_NATIVE(hdr->e_type);
439 hdr->e_machine = TO_NATIVE(hdr->e_machine);
440 hdr->e_version = TO_NATIVE(hdr->e_version);
441 hdr->e_entry = TO_NATIVE(hdr->e_entry);
442 hdr->e_phoff = TO_NATIVE(hdr->e_phoff);
443 hdr->e_shoff = TO_NATIVE(hdr->e_shoff);
444 hdr->e_flags = TO_NATIVE(hdr->e_flags);
445 hdr->e_ehsize = TO_NATIVE(hdr->e_ehsize);
446 hdr->e_phentsize = TO_NATIVE(hdr->e_phentsize);
447 hdr->e_phnum = TO_NATIVE(hdr->e_phnum);
448 hdr->e_shentsize = TO_NATIVE(hdr->e_shentsize);
449 hdr->e_shnum = TO_NATIVE(hdr->e_shnum);
450 hdr->e_shstrndx = TO_NATIVE(hdr->e_shstrndx);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700451 sechdrs = (void *)hdr + hdr->e_shoff;
452 info->sechdrs = sechdrs;
453
Petr Stetiara83710e2007-08-27 12:15:07 +0200454 /* Check if file offset is correct */
455 if (hdr->e_shoff > info->size) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100456 fatal("section header offset=%lu in file '%s' is bigger than "
457 "filesize=%lu\n", (unsigned long)hdr->e_shoff,
458 filename, info->size);
Petr Stetiara83710e2007-08-27 12:15:07 +0200459 return 0;
460 }
461
Anders Kaseorg68457562011-05-19 16:55:27 -0600462 if (hdr->e_shnum == SHN_UNDEF) {
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200463 /*
464 * There are more than 64k sections,
465 * read count from .sh_size.
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200466 */
467 info->num_sections = TO_NATIVE(sechdrs[0].sh_size);
468 }
469 else {
470 info->num_sections = hdr->e_shnum;
471 }
472 if (hdr->e_shstrndx == SHN_XINDEX) {
Anders Kaseorg68457562011-05-19 16:55:27 -0600473 info->secindex_strings = TO_NATIVE(sechdrs[0].sh_link);
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200474 }
475 else {
476 info->secindex_strings = hdr->e_shstrndx;
477 }
478
Linus Torvalds1da177e2005-04-16 15:20:36 -0700479 /* Fix endianness in section headers */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200480 for (i = 0; i < info->num_sections; i++) {
Anders Kaseorg7d875a02009-05-03 22:02:55 +0200481 sechdrs[i].sh_name = TO_NATIVE(sechdrs[i].sh_name);
482 sechdrs[i].sh_type = TO_NATIVE(sechdrs[i].sh_type);
483 sechdrs[i].sh_flags = TO_NATIVE(sechdrs[i].sh_flags);
484 sechdrs[i].sh_addr = TO_NATIVE(sechdrs[i].sh_addr);
485 sechdrs[i].sh_offset = TO_NATIVE(sechdrs[i].sh_offset);
486 sechdrs[i].sh_size = TO_NATIVE(sechdrs[i].sh_size);
487 sechdrs[i].sh_link = TO_NATIVE(sechdrs[i].sh_link);
488 sechdrs[i].sh_info = TO_NATIVE(sechdrs[i].sh_info);
489 sechdrs[i].sh_addralign = TO_NATIVE(sechdrs[i].sh_addralign);
490 sechdrs[i].sh_entsize = TO_NATIVE(sechdrs[i].sh_entsize);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491 }
492 /* Find symbol table. */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200493 secstrings = (void *)hdr + sechdrs[info->secindex_strings].sh_offset;
494 for (i = 1; i < info->num_sections; i++) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700495 const char *secname;
Tejun Heo56fc82c2009-02-06 00:48:02 +0900496 int nobits = sechdrs[i].sh_type == SHT_NOBITS;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700497
Tejun Heo56fc82c2009-02-06 00:48:02 +0900498 if (!nobits && sechdrs[i].sh_offset > info->size) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100499 fatal("%s is truncated. sechdrs[i].sh_offset=%lu > "
500 "sizeof(*hrd)=%zu\n", filename,
501 (unsigned long)sechdrs[i].sh_offset,
502 sizeof(*hdr));
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100503 return 0;
504 }
Ram Paibd5cbce2006-06-08 22:12:53 -0700505 secname = secstrings + sechdrs[i].sh_name;
506 if (strcmp(secname, ".modinfo") == 0) {
Tejun Heo56fc82c2009-02-06 00:48:02 +0900507 if (nobits)
508 fatal("%s has NOBITS .modinfo\n", filename);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700509 info->modinfo = (void *)hdr + sechdrs[i].sh_offset;
510 info->modinfo_len = sechdrs[i].sh_size;
Ram Paibd5cbce2006-06-08 22:12:53 -0700511 } else if (strcmp(secname, "__ksymtab") == 0)
512 info->export_sec = i;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200513 else if (strcmp(secname, "__ksymtab_unused") == 0)
514 info->export_unused_sec = i;
Ram Paibd5cbce2006-06-08 22:12:53 -0700515 else if (strcmp(secname, "__ksymtab_gpl") == 0)
516 info->export_gpl_sec = i;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200517 else if (strcmp(secname, "__ksymtab_unused_gpl") == 0)
518 info->export_unused_gpl_sec = i;
Ram Paibd5cbce2006-06-08 22:12:53 -0700519 else if (strcmp(secname, "__ksymtab_gpl_future") == 0)
520 info->export_gpl_future_sec = i;
521
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200522 if (sechdrs[i].sh_type == SHT_SYMTAB) {
523 unsigned int sh_link_idx;
524 symtab_idx = i;
525 info->symtab_start = (void *)hdr +
526 sechdrs[i].sh_offset;
527 info->symtab_stop = (void *)hdr +
528 sechdrs[i].sh_offset + sechdrs[i].sh_size;
Anders Kaseorg68457562011-05-19 16:55:27 -0600529 sh_link_idx = sechdrs[i].sh_link;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200530 info->strtab = (void *)hdr +
531 sechdrs[sh_link_idx].sh_offset;
532 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700533
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200534 /* 32bit section no. table? ("more than 64k sections") */
535 if (sechdrs[i].sh_type == SHT_SYMTAB_SHNDX) {
536 symtab_shndx_idx = i;
537 info->symtab_shndx_start = (void *)hdr +
538 sechdrs[i].sh_offset;
539 info->symtab_shndx_stop = (void *)hdr +
540 sechdrs[i].sh_offset + sechdrs[i].sh_size;
541 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700542 }
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100543 if (!info->symtab_start)
Sam Ravnborgcb805142006-01-28 16:57:26 +0100544 fatal("%s has no symtab?\n", filename);
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100545
Linus Torvalds1da177e2005-04-16 15:20:36 -0700546 /* Fix endianness in symbols */
547 for (sym = info->symtab_start; sym < info->symtab_stop; sym++) {
548 sym->st_shndx = TO_NATIVE(sym->st_shndx);
549 sym->st_name = TO_NATIVE(sym->st_name);
550 sym->st_value = TO_NATIVE(sym->st_value);
551 sym->st_size = TO_NATIVE(sym->st_size);
552 }
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200553
554 if (symtab_shndx_idx != ~0U) {
555 Elf32_Word *p;
Anders Kaseorg68457562011-05-19 16:55:27 -0600556 if (symtab_idx != sechdrs[symtab_shndx_idx].sh_link)
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200557 fatal("%s: SYMTAB_SHNDX has bad sh_link: %u!=%u\n",
Anders Kaseorg68457562011-05-19 16:55:27 -0600558 filename, sechdrs[symtab_shndx_idx].sh_link,
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200559 symtab_idx);
560 /* Fix endianness */
561 for (p = info->symtab_shndx_start; p < info->symtab_shndx_stop;
562 p++)
563 *p = TO_NATIVE(*p);
564 }
565
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100566 return 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700567}
568
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100569static void parse_elf_finish(struct elf_info *info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700570{
571 release_file(info->hdr, info->size);
572}
573
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200574static int ignore_undef_symbol(struct elf_info *info, const char *symname)
575{
576 /* ignore __this_module, it will be resolved shortly */
Rusty Russellb92021b2013-03-15 15:04:17 +1030577 if (strcmp(symname, VMLINUX_SYMBOL_STR(__this_module)) == 0)
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200578 return 1;
579 /* ignore global offset table */
580 if (strcmp(symname, "_GLOBAL_OFFSET_TABLE_") == 0)
581 return 1;
582 if (info->hdr->e_machine == EM_PPC)
583 /* Special register function linked on all modules during final link of .ko */
584 if (strncmp(symname, "_restgpr_", sizeof("_restgpr_") - 1) == 0 ||
585 strncmp(symname, "_savegpr_", sizeof("_savegpr_") - 1) == 0 ||
586 strncmp(symname, "_rest32gpr_", sizeof("_rest32gpr_") - 1) == 0 ||
Andreas Schwab8fe9c932013-12-30 15:31:17 +0100587 strncmp(symname, "_save32gpr_", sizeof("_save32gpr_") - 1) == 0 ||
588 strncmp(symname, "_restvr_", sizeof("_restvr_") - 1) == 0 ||
589 strncmp(symname, "_savevr_", sizeof("_savevr_") - 1) == 0)
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200590 return 1;
Stephen Rothwell7fca5dc2010-06-29 20:08:42 +0000591 if (info->hdr->e_machine == EM_PPC64)
592 /* Special register function linked on all modules during final link of .ko */
593 if (strncmp(symname, "_restgpr0_", sizeof("_restgpr0_") - 1) == 0 ||
Andreas Schwab8fe9c932013-12-30 15:31:17 +0100594 strncmp(symname, "_savegpr0_", sizeof("_savegpr0_") - 1) == 0 ||
595 strncmp(symname, "_restvr_", sizeof("_restvr_") - 1) == 0 ||
596 strncmp(symname, "_savevr_", sizeof("_savevr_") - 1) == 0)
Stephen Rothwell7fca5dc2010-06-29 20:08:42 +0000597 return 1;
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200598 /* Do not ignore this symbol */
599 return 0;
600}
601
Rusty Russellb92021b2013-03-15 15:04:17 +1030602#define CRC_PFX VMLINUX_SYMBOL_STR(__crc_)
603#define KSYMTAB_PFX VMLINUX_SYMBOL_STR(__ksymtab_)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700604
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100605static void handle_modversions(struct module *mod, struct elf_info *info,
606 Elf_Sym *sym, const char *symname)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700607{
608 unsigned int crc;
Alessio Igor Bogani62a26352011-07-14 08:51:16 +0200609 enum export export;
610
Frank Rowand258f7422012-04-09 17:59:03 -0700611 if ((!is_vmlinux(mod->name) || mod->is_dot_o) &&
612 strncmp(symname, "__ksymtab", 9) == 0)
Alessio Igor Bogani62a26352011-07-14 08:51:16 +0200613 export = export_from_secname(info, get_secindex(info, sym));
614 else
615 export = export_from_sec(info, get_secindex(info, sym));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700616
Andi Kleenb5064652013-11-12 15:08:38 -0800617 /* CRC'd symbol */
618 if (strncmp(symname, CRC_PFX, strlen(CRC_PFX)) == 0) {
619 crc = (unsigned int) sym->st_value;
620 sym_update_crc(symname + strlen(CRC_PFX), mod, crc,
621 export);
622 }
623
Linus Torvalds1da177e2005-04-16 15:20:36 -0700624 switch (sym->st_shndx) {
625 case SHN_COMMON:
Andi Kleenef178f92014-02-08 09:01:17 +0100626 if (!strncmp(symname, "__gnu_lto_", sizeof("__gnu_lto_")-1)) {
627 /* Should warn here, but modpost runs before the linker */
628 } else
629 warn("\"%s\" [%s] is COMMON symbol\n", symname, mod->name);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700630 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700631 case SHN_UNDEF:
632 /* undefined symbol */
633 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
634 ELF_ST_BIND(sym->st_info) != STB_WEAK)
635 break;
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200636 if (ignore_undef_symbol(info, symname))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700637 break;
Ben Colline8d529012005-08-19 13:44:57 -0700638/* cope with newer glibc (2.3.4 or higher) STT_ definition in elf.h */
639#if defined(STT_REGISTER) || defined(STT_SPARC_REGISTER)
640/* add compatibility with older glibc */
641#ifndef STT_SPARC_REGISTER
642#define STT_SPARC_REGISTER STT_REGISTER
643#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700644 if (info->hdr->e_machine == EM_SPARC ||
645 info->hdr->e_machine == EM_SPARCV9) {
646 /* Ignore register directives. */
Ben Colline8d529012005-08-19 13:44:57 -0700647 if (ELF_ST_TYPE(sym->st_info) == STT_SPARC_REGISTER)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700648 break;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100649 if (symname[0] == '.') {
650 char *munged = strdup(symname);
651 munged[0] = '_';
652 munged[1] = toupper(munged[1]);
653 symname = munged;
654 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700655 }
656#endif
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100657
Rusty Russellb92021b2013-03-15 15:04:17 +1030658#ifdef CONFIG_HAVE_UNDERSCORE_SYMBOL_PREFIX
659 if (symname[0] != '_')
660 break;
661 else
662 symname++;
663#endif
664 mod->unres = alloc_symbol(symname,
665 ELF_ST_BIND(sym->st_info) == STB_WEAK,
666 mod->unres);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700667 break;
668 default:
669 /* All exported symbols */
Michal Marek8d995132009-12-12 12:02:24 +0100670 if (strncmp(symname, KSYMTAB_PFX, strlen(KSYMTAB_PFX)) == 0) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700671 sym_add_exported(symname + strlen(KSYMTAB_PFX), mod,
672 export);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700673 }
Rusty Russellb92021b2013-03-15 15:04:17 +1030674 if (strcmp(symname, VMLINUX_SYMBOL_STR(init_module)) == 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700675 mod->has_init = 1;
Rusty Russellb92021b2013-03-15 15:04:17 +1030676 if (strcmp(symname, VMLINUX_SYMBOL_STR(cleanup_module)) == 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700677 mod->has_cleanup = 1;
678 break;
679 }
680}
681
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100682/**
683 * Parse tag=value strings from .modinfo section
684 **/
Linus Torvalds1da177e2005-04-16 15:20:36 -0700685static char *next_string(char *string, unsigned long *secsize)
686{
687 /* Skip non-zero chars */
688 while (string[0]) {
689 string++;
690 if ((*secsize)-- <= 1)
691 return NULL;
692 }
693
694 /* Skip any zero padding. */
695 while (!string[0]) {
696 string++;
697 if ((*secsize)-- <= 1)
698 return NULL;
699 }
700 return string;
701}
702
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200703static char *get_next_modinfo(void *modinfo, unsigned long modinfo_len,
704 const char *tag, char *info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700705{
706 char *p;
707 unsigned int taglen = strlen(tag);
708 unsigned long size = modinfo_len;
709
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200710 if (info) {
711 size -= info - (char *)modinfo;
712 modinfo = next_string(info, &size);
713 }
714
Linus Torvalds1da177e2005-04-16 15:20:36 -0700715 for (p = modinfo; p; p = next_string(p, &size)) {
716 if (strncmp(p, tag, taglen) == 0 && p[taglen] == '=')
717 return p + taglen + 1;
718 }
719 return NULL;
720}
721
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200722static char *get_modinfo(void *modinfo, unsigned long modinfo_len,
723 const char *tag)
724
725{
726 return get_next_modinfo(modinfo, modinfo_len, tag, NULL);
727}
728
Sam Ravnborg93684d32006-02-19 11:53:35 +0100729/**
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100730 * Test if string s ends in string sub
731 * return 0 if match
732 **/
733static int strrcmp(const char *s, const char *sub)
734{
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100735 int slen, sublen;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100736
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100737 if (!s || !sub)
738 return 1;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100739
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100740 slen = strlen(s);
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100741 sublen = strlen(sub);
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100742
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100743 if ((slen == 0) || (sublen == 0))
744 return 1;
745
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100746 if (sublen > slen)
747 return 1;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100748
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100749 return memcmp(s + slen - sublen, sub, sublen);
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100750}
751
Sam Ravnborgff13f922008-01-23 19:54:27 +0100752static const char *sym_name(struct elf_info *elf, Elf_Sym *sym)
753{
Sam Ravnborg58fb0d42008-01-23 21:13:50 +0100754 if (sym)
755 return elf->strtab + sym->st_name;
756 else
Sam Ravnborgf6667512008-02-06 21:51:18 +0100757 return "(unknown)";
Sam Ravnborgff13f922008-01-23 19:54:27 +0100758}
759
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200760static const char *sec_name(struct elf_info *elf, int secindex)
Sam Ravnborgff13f922008-01-23 19:54:27 +0100761{
762 Elf_Shdr *sechdrs = elf->sechdrs;
763 return (void *)elf->hdr +
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200764 elf->sechdrs[elf->secindex_strings].sh_offset +
765 sechdrs[secindex].sh_name;
Sam Ravnborgff13f922008-01-23 19:54:27 +0100766}
767
768static const char *sech_name(struct elf_info *elf, Elf_Shdr *sechdr)
769{
770 return (void *)elf->hdr +
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200771 elf->sechdrs[elf->secindex_strings].sh_offset +
772 sechdr->sh_name;
Sam Ravnborgff13f922008-01-23 19:54:27 +0100773}
774
Sam Ravnborg10668222008-01-13 22:21:31 +0100775/* The pattern is an array of simple patterns.
776 * "foo" will match an exact string equal to "foo"
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100777 * "*foo" will match a string that ends with "foo"
Sam Ravnborg10668222008-01-13 22:21:31 +0100778 * "foo*" will match a string that begins with "foo"
Sam Ravnborg10668222008-01-13 22:21:31 +0100779 */
Trevor Keith5c725132009-09-22 16:43:38 -0700780static int match(const char *sym, const char * const pat[])
Sam Ravnborg10668222008-01-13 22:21:31 +0100781{
782 const char *p;
783 while (*pat) {
784 p = *pat++;
785 const char *endp = p + strlen(p) - 1;
786
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100787 /* "*foo" */
788 if (*p == '*') {
789 if (strrcmp(sym, p + 1) == 0)
790 return 1;
791 }
Sam Ravnborg10668222008-01-13 22:21:31 +0100792 /* "foo*" */
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100793 else if (*endp == '*') {
Sam Ravnborg10668222008-01-13 22:21:31 +0100794 if (strncmp(sym, p, strlen(p) - 1) == 0)
795 return 1;
796 }
Sam Ravnborg10668222008-01-13 22:21:31 +0100797 /* no wildcards */
798 else {
799 if (strcmp(p, sym) == 0)
800 return 1;
801 }
802 }
803 /* no match */
804 return 0;
805}
806
Sam Ravnborg10668222008-01-13 22:21:31 +0100807/* sections that we do not want to do full section mismatch check on */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930808static const char *const section_white_list[] =
Sam Ravnborg4391ed62009-05-04 13:05:26 +0200809{
810 ".comment*",
811 ".debug*",
Chen Gang4d10c222013-08-20 15:33:19 +0930812 ".cranges", /* sh64 */
H.J. Lu11215842010-12-15 17:11:22 -0800813 ".zdebug*", /* Compressed debug sections. */
David Howells019fca82010-08-12 16:54:47 +0100814 ".GCC-command-line", /* mn10300 */
Jonathan Kliegman76b27642012-10-04 16:32:19 -0400815 ".GCC.command.line", /* record-gcc-switches, non mn10300 */
Sam Ravnborg4391ed62009-05-04 13:05:26 +0200816 ".mdebug*", /* alpha, score, mips etc. */
817 ".pdr", /* alpha, score, mips etc. */
818 ".stab*",
819 ".note*",
820 ".got*",
821 ".toc*",
Max Filippovaf42e972012-09-17 05:44:38 +0400822 ".xt.prop", /* xtensa */
823 ".xt.lit", /* xtensa */
Vineet Guptaf2e207f2013-01-21 17:18:57 +1030824 ".arcextmap*", /* arc */
825 ".gnu.linkonce.arcext*", /* arc : modules */
Andi Kleenef178f92014-02-08 09:01:17 +0100826 ".gnu.lto*",
Sam Ravnborg4391ed62009-05-04 13:05:26 +0200827 NULL
828};
Sam Ravnborg10668222008-01-13 22:21:31 +0100829
Sam Ravnborge241a632008-01-28 20:13:13 +0100830/*
Anders Kaseorgb614a692009-04-23 16:49:33 -0400831 * This is used to find sections missing the SHF_ALLOC flag.
Sam Ravnborge241a632008-01-28 20:13:13 +0100832 * The cause of this is often a section specified in assembler
Anders Kaseorgb614a692009-04-23 16:49:33 -0400833 * without "ax" / "aw".
Sam Ravnborge241a632008-01-28 20:13:13 +0100834 */
Anders Kaseorgb614a692009-04-23 16:49:33 -0400835static void check_section(const char *modname, struct elf_info *elf,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +0900836 Elf_Shdr *sechdr)
Sam Ravnborge241a632008-01-28 20:13:13 +0100837{
Anders Kaseorgb614a692009-04-23 16:49:33 -0400838 const char *sec = sech_name(elf, sechdr);
Sam Ravnborge241a632008-01-28 20:13:13 +0100839
Anders Kaseorgb614a692009-04-23 16:49:33 -0400840 if (sechdr->sh_type == SHT_PROGBITS &&
841 !(sechdr->sh_flags & SHF_ALLOC) &&
842 !match(sec, section_white_list)) {
843 warn("%s (%s): unexpected non-allocatable section.\n"
844 "Did you forget to use \"ax\"/\"aw\" in a .S file?\n"
845 "Note that for example <linux/init.h> contains\n"
846 "section definitions for use in .S files.\n\n",
847 modname, sec);
Sam Ravnborge241a632008-01-28 20:13:13 +0100848 }
Sam Ravnborge241a632008-01-28 20:13:13 +0100849}
850
851
852
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100853#define ALL_INIT_DATA_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930854 ".init.setup", ".init.rodata", ".meminit.rodata", \
855 ".init.data", ".meminit.data"
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100856#define ALL_EXIT_DATA_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930857 ".exit.data", ".memexit.data"
Sam Ravnborg10668222008-01-13 22:21:31 +0100858
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100859#define ALL_INIT_TEXT_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930860 ".init.text", ".meminit.text"
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100861#define ALL_EXIT_TEXT_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930862 ".exit.text", ".memexit.text"
Sam Ravnborg10668222008-01-13 22:21:31 +0100863
Sebastian Andrzej Siewiorbb15d8d2012-06-03 20:48:17 +0200864#define ALL_PCI_INIT_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930865 ".pci_fixup_early", ".pci_fixup_header", ".pci_fixup_final", \
866 ".pci_fixup_enable", ".pci_fixup_resume", \
867 ".pci_fixup_resume_early", ".pci_fixup_suspend"
Sebastian Andrzej Siewiorbb15d8d2012-06-03 20:48:17 +0200868
Paul Gortmakere24f66282013-06-19 19:30:48 -0400869#define ALL_XXXINIT_SECTIONS MEM_INIT_SECTIONS
870#define ALL_XXXEXIT_SECTIONS MEM_EXIT_SECTIONS
Uwe Kleine-König4a31a222010-01-29 12:04:26 +0100871
872#define ALL_INIT_SECTIONS INIT_SECTIONS, ALL_XXXINIT_SECTIONS
873#define ALL_EXIT_SECTIONS EXIT_SECTIONS, ALL_XXXEXIT_SECTIONS
Sam Ravnborg10668222008-01-13 22:21:31 +0100874
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930875#define DATA_SECTIONS ".data", ".data.rel"
876#define TEXT_SECTIONS ".text", ".text.unlikely"
Sam Ravnborg10668222008-01-13 22:21:31 +0100877
Jan Beulichfd6c3a82009-03-12 10:58:33 +0000878#define INIT_SECTIONS ".init.*"
Jan Beulichfd6c3a82009-03-12 10:58:33 +0000879#define MEM_INIT_SECTIONS ".meminit.*"
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100880
Jan Beulichfd6c3a82009-03-12 10:58:33 +0000881#define EXIT_SECTIONS ".exit.*"
Jan Beulichfd6c3a82009-03-12 10:58:33 +0000882#define MEM_EXIT_SECTIONS ".memexit.*"
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100883
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100884/* init data sections */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930885static const char *const init_data_sections[] =
886 { ALL_INIT_DATA_SECTIONS, NULL };
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100887
888/* all init sections */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930889static const char *const init_sections[] = { ALL_INIT_SECTIONS, NULL };
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100890
891/* All init and exit sections (code + data) */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930892static const char *const init_exit_sections[] =
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100893 {ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS, NULL };
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100894
895/* data section */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930896static const char *const data_sections[] = { DATA_SECTIONS, NULL };
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100897
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100898
899/* symbols in .data that may refer to init/exit sections */
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100900#define DEFAULT_SYMBOL_WHITE_LIST \
901 "*driver", \
902 "*_template", /* scsi uses *_template a lot */ \
903 "*_timer", /* arm uses ops structures named _timer a lot */ \
904 "*_sht", /* scsi also used *_sht to some extent */ \
905 "*_ops", \
906 "*_probe", \
907 "*_probe_one", \
908 "*_console"
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100909
Mathias Krause7a3ee752014-08-27 20:28:53 +0930910static const char *const head_sections[] = { ".head.text*", NULL };
911static const char *const linker_symbols[] =
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100912 { "__init_begin", "_sinittext", "_einittext", NULL };
913
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100914enum mismatch {
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100915 TEXT_TO_ANY_INIT,
916 DATA_TO_ANY_INIT,
917 TEXT_TO_ANY_EXIT,
918 DATA_TO_ANY_EXIT,
919 XXXINIT_TO_SOME_INIT,
920 XXXEXIT_TO_SOME_EXIT,
921 ANY_INIT_TO_ANY_EXIT,
922 ANY_EXIT_TO_ANY_INIT,
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100923 EXPORT_TO_INIT_EXIT,
924};
925
Sam Ravnborg10668222008-01-13 22:21:31 +0100926struct sectioncheck {
927 const char *fromsec[20];
928 const char *tosec[20];
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100929 enum mismatch mismatch;
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100930 const char *symbol_white_list[20];
Sam Ravnborg10668222008-01-13 22:21:31 +0100931};
932
Mathias Krause7a3ee752014-08-27 20:28:53 +0930933static const struct sectioncheck sectioncheck[] = {
Sam Ravnborg10668222008-01-13 22:21:31 +0100934/* Do not reference init/exit code/data from
935 * normal code and data
936 */
937{
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100938 .fromsec = { TEXT_SECTIONS, NULL },
939 .tosec = { ALL_INIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100940 .mismatch = TEXT_TO_ANY_INIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100941 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100942},
943{
944 .fromsec = { DATA_SECTIONS, NULL },
Uwe Kleine-König0db252452010-01-30 21:14:23 +0100945 .tosec = { ALL_XXXINIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100946 .mismatch = DATA_TO_ANY_INIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100947 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100948},
949{
Uwe Kleine-König0db252452010-01-30 21:14:23 +0100950 .fromsec = { DATA_SECTIONS, NULL },
951 .tosec = { INIT_SECTIONS, NULL },
952 .mismatch = DATA_TO_ANY_INIT,
953 .symbol_white_list = {
954 "*_template", "*_timer", "*_sht", "*_ops",
955 "*_probe", "*_probe_one", "*_console", NULL
956 },
957},
958{
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100959 .fromsec = { TEXT_SECTIONS, NULL },
960 .tosec = { ALL_EXIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100961 .mismatch = TEXT_TO_ANY_EXIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100962 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100963},
964{
965 .fromsec = { DATA_SECTIONS, NULL },
966 .tosec = { ALL_EXIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100967 .mismatch = DATA_TO_ANY_EXIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100968 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100969},
Paul Gortmakere24f66282013-06-19 19:30:48 -0400970/* Do not reference init code/data from meminit code/data */
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100971{
Uwe Kleine-König4a31a222010-01-29 12:04:26 +0100972 .fromsec = { ALL_XXXINIT_SECTIONS, NULL },
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100973 .tosec = { INIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100974 .mismatch = XXXINIT_TO_SOME_INIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100975 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100976},
Paul Gortmakere24f66282013-06-19 19:30:48 -0400977/* Do not reference exit code/data from memexit code/data */
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100978{
Uwe Kleine-König4a31a222010-01-29 12:04:26 +0100979 .fromsec = { ALL_XXXEXIT_SECTIONS, NULL },
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100980 .tosec = { EXIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100981 .mismatch = XXXEXIT_TO_SOME_EXIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100982 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg10668222008-01-13 22:21:31 +0100983},
984/* Do not use exit code/data from init code */
985{
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100986 .fromsec = { ALL_INIT_SECTIONS, NULL },
987 .tosec = { ALL_EXIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100988 .mismatch = ANY_INIT_TO_ANY_EXIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100989 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg10668222008-01-13 22:21:31 +0100990},
991/* Do not use init code/data from exit code */
992{
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100993 .fromsec = { ALL_EXIT_SECTIONS, NULL },
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100994 .tosec = { ALL_INIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100995 .mismatch = ANY_EXIT_TO_ANY_INIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100996 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg10668222008-01-13 22:21:31 +0100997},
Sebastian Andrzej Siewiorbb15d8d2012-06-03 20:48:17 +0200998{
999 .fromsec = { ALL_PCI_INIT_SECTIONS, NULL },
1000 .tosec = { INIT_SECTIONS, NULL },
1001 .mismatch = ANY_INIT_TO_ANY_EXIT,
1002 .symbol_white_list = { NULL },
1003},
Sam Ravnborg10668222008-01-13 22:21:31 +01001004/* Do not export init/exit functions or data */
1005{
1006 .fromsec = { "__ksymtab*", NULL },
Sam Ravnborgfa95eb12008-02-02 23:30:22 +01001007 .tosec = { INIT_SECTIONS, EXIT_SECTIONS, NULL },
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001008 .mismatch = EXPORT_TO_INIT_EXIT,
1009 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg10668222008-01-13 22:21:31 +01001010}
1011};
1012
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001013static const struct sectioncheck *section_mismatch(
1014 const char *fromsec, const char *tosec)
Sam Ravnborg10668222008-01-13 22:21:31 +01001015{
1016 int i;
1017 int elems = sizeof(sectioncheck) / sizeof(struct sectioncheck);
1018 const struct sectioncheck *check = &sectioncheck[0];
1019
1020 for (i = 0; i < elems; i++) {
1021 if (match(fromsec, check->fromsec) &&
1022 match(tosec, check->tosec))
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001023 return check;
Sam Ravnborg10668222008-01-13 22:21:31 +01001024 check++;
1025 }
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001026 return NULL;
Sam Ravnborg10668222008-01-13 22:21:31 +01001027}
1028
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001029/**
1030 * Whitelist to allow certain references to pass with no warning.
Sam Ravnborg0e0d3142007-05-17 20:14:48 +02001031 *
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001032 * Pattern 1:
1033 * If a module parameter is declared __initdata and permissions=0
1034 * then this is legal despite the warning generated.
1035 * We cannot see value of permissions here, so just ignore
1036 * this pattern.
1037 * The pattern is identified by:
1038 * tosec = .init.data
Sam Ravnborg9209aed2006-03-05 00:16:26 +01001039 * fromsec = .data*
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001040 * atsym =__param*
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001041 *
Rusty Russell6a841522010-08-11 23:04:16 -06001042 * Pattern 1a:
1043 * module_param_call() ops can refer to __init set function if permissions=0
1044 * The pattern is identified by:
1045 * tosec = .init.text
1046 * fromsec = .data*
1047 * atsym = __param_ops_*
1048 *
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001049 * Pattern 2:
Randy Dunlap72ee59b2006-04-15 11:17:12 -07001050 * Many drivers utilise a *driver container with references to
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001051 * add, remove, probe functions etc.
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001052 * the pattern is identified by:
Sam Ravnborg83cda2b2007-07-25 21:52:31 +02001053 * tosec = init or exit section
1054 * fromsec = data section
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001055 * atsym = *driver, *_template, *_sht, *_ops, *_probe,
1056 * *probe_one, *_console, *_timer
Vivek Goyalee6a8542007-01-11 01:52:44 +01001057 *
1058 * Pattern 3:
Sam Ravnborgc9939712009-04-26 11:17:42 +02001059 * Whitelist all references from .head.text to any init section
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001060 *
Sam Ravnborg1d8af552007-06-03 00:41:22 +02001061 * Pattern 4:
Vivek Goyalee6a8542007-01-11 01:52:44 +01001062 * Some symbols belong to init section but still it is ok to reference
1063 * these from non-init sections as these symbols don't have any memory
1064 * allocated for them and symbol address and value are same. So even
1065 * if init section is freed, its ok to reference those symbols.
1066 * For ex. symbols marking the init section boundaries.
1067 * This pattern is identified by
1068 * refsymname = __init_begin, _sinittext, _einittext
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001069 *
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001070 **/
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001071static int secref_whitelist(const struct sectioncheck *mismatch,
1072 const char *fromsec, const char *fromsym,
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001073 const char *tosec, const char *tosym)
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001074{
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001075 /* Check for pattern 1 */
Sam Ravnborg6c5bd232008-01-20 10:43:27 +01001076 if (match(tosec, init_data_sections) &&
1077 match(fromsec, data_sections) &&
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001078 (strncmp(fromsym, "__param", strlen("__param")) == 0))
1079 return 0;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001080
Rusty Russell6a841522010-08-11 23:04:16 -06001081 /* Check for pattern 1a */
1082 if (strcmp(tosec, ".init.text") == 0 &&
1083 match(fromsec, data_sections) &&
1084 (strncmp(fromsym, "__param_ops_", strlen("__param_ops_")) == 0))
1085 return 0;
1086
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001087 /* Check for pattern 2 */
Sam Ravnborg6c5bd232008-01-20 10:43:27 +01001088 if (match(tosec, init_exit_sections) &&
1089 match(fromsec, data_sections) &&
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001090 match(fromsym, mismatch->symbol_white_list))
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001091 return 0;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001092
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001093 /* Check for pattern 3 */
Sam Ravnborg6c5bd232008-01-20 10:43:27 +01001094 if (match(fromsec, head_sections) &&
1095 match(tosec, init_sections))
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001096 return 0;
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001097
Sam Ravnborg1d8af552007-06-03 00:41:22 +02001098 /* Check for pattern 4 */
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001099 if (match(tosym, linker_symbols))
1100 return 0;
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001101
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001102 return 1;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001103}
1104
1105/**
Sam Ravnborg93684d32006-02-19 11:53:35 +01001106 * Find symbol based on relocation record info.
1107 * In some cases the symbol supplied is a valid symbol so
1108 * return refsym. If st_name != 0 we assume this is a valid symbol.
1109 * In other cases the symbol needs to be looked up in the symbol table
1110 * based on section and address.
1111 * **/
Sam Ravnborg9ad21c32008-01-18 21:04:34 +01001112static Elf_Sym *find_elf_symbol(struct elf_info *elf, Elf64_Sword addr,
Sam Ravnborg93684d32006-02-19 11:53:35 +01001113 Elf_Sym *relsym)
1114{
1115 Elf_Sym *sym;
Sam Ravnborg9ad21c32008-01-18 21:04:34 +01001116 Elf_Sym *near = NULL;
1117 Elf64_Sword distance = 20;
1118 Elf64_Sword d;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001119 unsigned int relsym_secindex;
Sam Ravnborg93684d32006-02-19 11:53:35 +01001120
1121 if (relsym->st_name != 0)
1122 return relsym;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001123
1124 relsym_secindex = get_secindex(elf, relsym);
Sam Ravnborg93684d32006-02-19 11:53:35 +01001125 for (sym = elf->symtab_start; sym < elf->symtab_stop; sym++) {
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001126 if (get_secindex(elf, sym) != relsym_secindex)
Sam Ravnborg93684d32006-02-19 11:53:35 +01001127 continue;
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001128 if (ELF_ST_TYPE(sym->st_info) == STT_SECTION)
1129 continue;
Sam Ravnborg93684d32006-02-19 11:53:35 +01001130 if (sym->st_value == addr)
1131 return sym;
Sam Ravnborg9ad21c32008-01-18 21:04:34 +01001132 /* Find a symbol nearby - addr are maybe negative */
1133 d = sym->st_value - addr;
1134 if (d < 0)
1135 d = addr - sym->st_value;
1136 if (d < distance) {
1137 distance = d;
1138 near = sym;
1139 }
Sam Ravnborg93684d32006-02-19 11:53:35 +01001140 }
Sam Ravnborg9ad21c32008-01-18 21:04:34 +01001141 /* We need a close match */
1142 if (distance < 20)
1143 return near;
1144 else
1145 return NULL;
Sam Ravnborg93684d32006-02-19 11:53:35 +01001146}
1147
David Brownellda68d612007-02-20 13:58:16 -08001148static inline int is_arm_mapping_symbol(const char *str)
1149{
Kyle McMartin6c34f1f2014-09-16 22:37:18 +01001150 return str[0] == '$' && strchr("axtd", str[1])
David Brownellda68d612007-02-20 13:58:16 -08001151 && (str[2] == '\0' || str[2] == '.');
1152}
1153
1154/*
1155 * If there's no name there, ignore it; likewise, ignore it if it's
1156 * one of the magic symbols emitted used by current ARM tools.
1157 *
1158 * Otherwise if find_symbols_between() returns those symbols, they'll
1159 * fail the whitelist tests and cause lots of false alarms ... fixable
1160 * only by merging __exit and __init sections into __text, bloating
1161 * the kernel (which is especially evil on embedded platforms).
1162 */
1163static inline int is_valid_name(struct elf_info *elf, Elf_Sym *sym)
1164{
1165 const char *name = elf->strtab + sym->st_name;
1166
1167 if (!name || !strlen(name))
1168 return 0;
1169 return !is_arm_mapping_symbol(name);
1170}
1171
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001172/*
Sam Ravnborg43c74d12006-03-05 12:02:46 +01001173 * Find symbols before or equal addr and after addr - in the section sec.
1174 * If we find two symbols with equal offset prefer one with a valid name.
1175 * The ELF format may have a better way to detect what type of symbol
1176 * it is, but this works for now.
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001177 **/
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001178static Elf_Sym *find_elf_symbol2(struct elf_info *elf, Elf_Addr addr,
1179 const char *sec)
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001180{
1181 Elf_Sym *sym;
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001182 Elf_Sym *near = NULL;
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001183 Elf_Addr distance = ~0;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001184
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001185 for (sym = elf->symtab_start; sym < elf->symtab_stop; sym++) {
1186 const char *symsec;
1187
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001188 if (is_shndx_special(sym->st_shndx))
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001189 continue;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001190 symsec = sec_name(elf, get_secindex(elf, sym));
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001191 if (strcmp(symsec, sec) != 0)
1192 continue;
David Brownellda68d612007-02-20 13:58:16 -08001193 if (!is_valid_name(elf, sym))
1194 continue;
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001195 if (sym->st_value <= addr) {
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001196 if ((addr - sym->st_value) < distance) {
1197 distance = addr - sym->st_value;
1198 near = sym;
1199 } else if ((addr - sym->st_value) == distance) {
1200 near = sym;
Sam Ravnborg43c74d12006-03-05 12:02:46 +01001201 }
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001202 }
1203 }
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001204 return near;
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001205}
1206
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001207/*
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001208 * Convert a section name to the function/data attribute
1209 * .init.text => __init
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001210 * .memexitconst => __memconst
1211 * etc.
Andy Shevchenkocbcf14a92010-08-17 13:36:40 +03001212 *
1213 * The memory of returned value has been allocated on a heap. The user of this
1214 * method should free it after usage.
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001215*/
1216static char *sec2annotation(const char *s)
1217{
1218 if (match(s, init_exit_sections)) {
1219 char *p = malloc(20);
1220 char *r = p;
1221
1222 *p++ = '_';
1223 *p++ = '_';
1224 if (*s == '.')
1225 s++;
1226 while (*s && *s != '.')
1227 *p++ = *s++;
1228 *p = '\0';
1229 if (*s == '.')
1230 s++;
1231 if (strstr(s, "rodata") != NULL)
1232 strcat(p, "const ");
1233 else if (strstr(s, "data") != NULL)
1234 strcat(p, "data ");
1235 else
1236 strcat(p, " ");
Andy Shevchenkocbcf14a92010-08-17 13:36:40 +03001237 return r;
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001238 } else {
Andrew Morton5003bab2010-08-11 00:42:26 -07001239 return strdup("");
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001240 }
1241}
1242
1243static int is_function(Elf_Sym *sym)
1244{
1245 if (sym)
1246 return ELF_ST_TYPE(sym->st_info) == STT_FUNC;
1247 else
Sam Ravnborgf6667512008-02-06 21:51:18 +01001248 return -1;
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001249}
1250
Randy Dunlap00759c0e2011-03-15 14:13:47 -07001251static void print_section_list(const char * const list[20])
1252{
1253 const char *const *s = list;
1254
1255 while (*s) {
1256 fprintf(stderr, "%s", *s);
1257 s++;
1258 if (*s)
1259 fprintf(stderr, ", ");
1260 }
1261 fprintf(stderr, "\n");
1262}
1263
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001264/*
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001265 * Print a warning about a section mismatch.
1266 * Try to find symbols near it so user can find it.
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001267 * Check whitelist before warning - it may be a false positive.
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001268 */
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001269static void report_sec_mismatch(const char *modname,
1270 const struct sectioncheck *mismatch,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001271 const char *fromsec,
1272 unsigned long long fromaddr,
1273 const char *fromsym,
1274 int from_is_func,
1275 const char *tosec, const char *tosym,
1276 int to_is_func)
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001277{
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001278 const char *from, *from_p;
1279 const char *to, *to_p;
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001280 char *prl_from;
1281 char *prl_to;
Sam Ravnborgf6667512008-02-06 21:51:18 +01001282
1283 switch (from_is_func) {
1284 case 0: from = "variable"; from_p = ""; break;
1285 case 1: from = "function"; from_p = "()"; break;
1286 default: from = "(unknown reference)"; from_p = ""; break;
1287 }
1288 switch (to_is_func) {
1289 case 0: to = "variable"; to_p = ""; break;
1290 case 1: to = "function"; to_p = "()"; break;
1291 default: to = "(unknown reference)"; to_p = ""; break;
1292 }
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001293
Sam Ravnborge5f95c82008-02-02 18:57:18 +01001294 sec_mismatch_count++;
1295 if (!sec_mismatch_verbose)
1296 return;
1297
Geert Uytterhoeven7c0ac492008-02-05 11:38:49 +01001298 warn("%s(%s+0x%llx): Section mismatch in reference from the %s %s%s "
1299 "to the %s %s:%s%s\n",
1300 modname, fromsec, fromaddr, from, fromsym, from_p, to, tosec,
1301 tosym, to_p);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001302
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001303 switch (mismatch->mismatch) {
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001304 case TEXT_TO_ANY_INIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001305 prl_from = sec2annotation(fromsec);
1306 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001307 fprintf(stderr,
Sam Ravnborgf6667512008-02-06 21:51:18 +01001308 "The function %s%s() references\n"
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001309 "the %s %s%s%s.\n"
1310 "This is often because %s lacks a %s\n"
1311 "annotation or the annotation of %s is wrong.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001312 prl_from, fromsym,
1313 to, prl_to, tosym, to_p,
1314 fromsym, prl_to, tosym);
1315 free(prl_from);
1316 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001317 break;
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001318 case DATA_TO_ANY_INIT: {
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001319 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001320 fprintf(stderr,
1321 "The variable %s references\n"
1322 "the %s %s%s%s\n"
1323 "If the reference is valid then annotate the\n"
Sam Ravnborg8b8b76c2009-06-06 00:18:05 +02001324 "variable with __init* or __refdata (see linux/init.h) "
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001325 "or name the variable:\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001326 fromsym, to, prl_to, tosym, to_p);
Randy Dunlap00759c0e2011-03-15 14:13:47 -07001327 print_section_list(mismatch->symbol_white_list);
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001328 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001329 break;
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001330 }
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001331 case TEXT_TO_ANY_EXIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001332 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001333 fprintf(stderr,
1334 "The function %s() references a %s in an exit section.\n"
1335 "Often the %s %s%s has valid usage outside the exit section\n"
1336 "and the fix is to remove the %sannotation of %s.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001337 fromsym, to, to, tosym, to_p, prl_to, tosym);
1338 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001339 break;
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001340 case DATA_TO_ANY_EXIT: {
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001341 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001342 fprintf(stderr,
1343 "The variable %s references\n"
1344 "the %s %s%s%s\n"
1345 "If the reference is valid then annotate the\n"
1346 "variable with __exit* (see linux/init.h) or "
1347 "name the variable:\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001348 fromsym, to, prl_to, tosym, to_p);
Randy Dunlap00759c0e2011-03-15 14:13:47 -07001349 print_section_list(mismatch->symbol_white_list);
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001350 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001351 break;
1352 }
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001353 case XXXINIT_TO_SOME_INIT:
1354 case XXXEXIT_TO_SOME_EXIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001355 prl_from = sec2annotation(fromsec);
1356 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001357 fprintf(stderr,
1358 "The %s %s%s%s references\n"
1359 "a %s %s%s%s.\n"
1360 "If %s is only used by %s then\n"
1361 "annotate %s with a matching annotation.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001362 from, prl_from, fromsym, from_p,
1363 to, prl_to, tosym, to_p,
Geert Uytterhoevenb1d26752008-02-17 14:12:10 +01001364 tosym, fromsym, tosym);
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001365 free(prl_from);
1366 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001367 break;
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001368 case ANY_INIT_TO_ANY_EXIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001369 prl_from = sec2annotation(fromsec);
1370 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001371 fprintf(stderr,
1372 "The %s %s%s%s references\n"
1373 "a %s %s%s%s.\n"
1374 "This is often seen when error handling "
1375 "in the init function\n"
1376 "uses functionality in the exit path.\n"
1377 "The fix is often to remove the %sannotation of\n"
1378 "%s%s so it may be used outside an exit section.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001379 from, prl_from, fromsym, from_p,
1380 to, prl_to, tosym, to_p,
Andrew Morton5003bab2010-08-11 00:42:26 -07001381 prl_to, tosym, to_p);
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001382 free(prl_from);
1383 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001384 break;
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001385 case ANY_EXIT_TO_ANY_INIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001386 prl_from = sec2annotation(fromsec);
1387 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001388 fprintf(stderr,
1389 "The %s %s%s%s references\n"
1390 "a %s %s%s%s.\n"
1391 "This is often seen when error handling "
1392 "in the exit function\n"
1393 "uses functionality in the init path.\n"
1394 "The fix is often to remove the %sannotation of\n"
1395 "%s%s so it may be used outside an init section.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001396 from, prl_from, fromsym, from_p,
1397 to, prl_to, tosym, to_p,
1398 prl_to, tosym, to_p);
1399 free(prl_from);
1400 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001401 break;
1402 case EXPORT_TO_INIT_EXIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001403 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001404 fprintf(stderr,
1405 "The symbol %s is exported and annotated %s\n"
1406 "Fix this by removing the %sannotation of %s "
1407 "or drop the export.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001408 tosym, prl_to, prl_to, tosym);
1409 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001410 break;
1411 }
1412 fprintf(stderr, "\n");
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001413}
1414
1415static void check_section_mismatch(const char *modname, struct elf_info *elf,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001416 Elf_Rela *r, Elf_Sym *sym, const char *fromsec)
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001417{
1418 const char *tosec;
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001419 const struct sectioncheck *mismatch;
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001420
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001421 tosec = sec_name(elf, get_secindex(elf, sym));
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001422 mismatch = section_mismatch(fromsec, tosec);
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001423 if (mismatch) {
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001424 Elf_Sym *to;
1425 Elf_Sym *from;
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001426 const char *tosym;
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001427 const char *fromsym;
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001428
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001429 from = find_elf_symbol2(elf, r->r_offset, fromsec);
1430 fromsym = sym_name(elf, from);
1431 to = find_elf_symbol(elf, r->r_addend, sym);
1432 tosym = sym_name(elf, to);
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001433
Andi Kleen77ab21a2014-02-08 09:01:11 +01001434 if (!strncmp(fromsym, "reference___initcall",
1435 sizeof("reference___initcall")-1))
1436 return;
1437
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001438 /* check whitelist - we may ignore it */
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001439 if (secref_whitelist(mismatch,
1440 fromsec, fromsym, tosec, tosym)) {
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001441 report_sec_mismatch(modname, mismatch,
1442 fromsec, r->r_offset, fromsym,
1443 is_function(from), tosec, tosym,
1444 is_function(to));
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001445 }
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001446 }
1447}
1448
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001449static unsigned int *reloc_location(struct elf_info *elf,
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001450 Elf_Shdr *sechdr, Elf_Rela *r)
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001451{
1452 Elf_Shdr *sechdrs = elf->sechdrs;
Anders Kaseorg68457562011-05-19 16:55:27 -06001453 int section = sechdr->sh_info;
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001454
1455 return (void *)elf->hdr + sechdrs[section].sh_offset +
Olof Johansson731ece42010-12-10 02:09:23 -06001456 r->r_offset;
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001457}
1458
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001459static int addend_386_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001460{
1461 unsigned int r_typ = ELF_R_TYPE(r->r_info);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001462 unsigned int *location = reloc_location(elf, sechdr, r);
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001463
1464 switch (r_typ) {
1465 case R_386_32:
1466 r->r_addend = TO_NATIVE(*location);
1467 break;
1468 case R_386_PC32:
1469 r->r_addend = TO_NATIVE(*location) + 4;
1470 /* For CONFIG_RELOCATABLE=y */
1471 if (elf->hdr->e_type == ET_EXEC)
1472 r->r_addend += r->r_offset;
1473 break;
1474 }
1475 return 0;
1476}
1477
Tony Lindgren6e2e3402012-02-14 21:58:56 +01001478#ifndef R_ARM_CALL
1479#define R_ARM_CALL 28
1480#endif
1481#ifndef R_ARM_JUMP24
1482#define R_ARM_JUMP24 29
1483#endif
1484
David A. Longc9698e52014-02-14 22:41:18 +01001485#ifndef R_ARM_THM_CALL
1486#define R_ARM_THM_CALL 10
1487#endif
1488#ifndef R_ARM_THM_JUMP24
1489#define R_ARM_THM_JUMP24 30
1490#endif
1491#ifndef R_ARM_THM_JUMP19
1492#define R_ARM_THM_JUMP19 51
1493#endif
1494
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001495static int addend_arm_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001496{
1497 unsigned int r_typ = ELF_R_TYPE(r->r_info);
1498
1499 switch (r_typ) {
1500 case R_ARM_ABS32:
1501 /* From ARM ABI: (S + A) | T */
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001502 r->r_addend = (int)(long)
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001503 (elf->symtab_start + ELF_R_SYM(r->r_info));
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001504 break;
1505 case R_ARM_PC24:
Tony Lindgren6e2e3402012-02-14 21:58:56 +01001506 case R_ARM_CALL:
1507 case R_ARM_JUMP24:
David A. Longc9698e52014-02-14 22:41:18 +01001508 case R_ARM_THM_CALL:
1509 case R_ARM_THM_JUMP24:
1510 case R_ARM_THM_JUMP19:
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001511 /* From ARM ABI: ((S + A) | T) - P */
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001512 r->r_addend = (int)(long)(elf->hdr +
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001513 sechdr->sh_offset +
1514 (r->r_offset - sechdr->sh_addr));
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001515 break;
1516 default:
1517 return 1;
1518 }
1519 return 0;
1520}
1521
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001522static int addend_mips_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001523{
1524 unsigned int r_typ = ELF_R_TYPE(r->r_info);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001525 unsigned int *location = reloc_location(elf, sechdr, r);
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001526 unsigned int inst;
1527
1528 if (r_typ == R_MIPS_HI16)
1529 return 1; /* skip this */
1530 inst = TO_NATIVE(*location);
1531 switch (r_typ) {
1532 case R_MIPS_LO16:
1533 r->r_addend = inst & 0xffff;
1534 break;
1535 case R_MIPS_26:
1536 r->r_addend = (inst & 0x03ffffff) << 2;
1537 break;
1538 case R_MIPS_32:
1539 r->r_addend = inst;
1540 break;
1541 }
1542 return 0;
1543}
1544
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001545static void section_rela(const char *modname, struct elf_info *elf,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001546 Elf_Shdr *sechdr)
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001547{
1548 Elf_Sym *sym;
1549 Elf_Rela *rela;
1550 Elf_Rela r;
1551 unsigned int r_sym;
1552 const char *fromsec;
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001553
Sam Ravnborgff13f922008-01-23 19:54:27 +01001554 Elf_Rela *start = (void *)elf->hdr + sechdr->sh_offset;
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001555 Elf_Rela *stop = (void *)start + sechdr->sh_size;
1556
Sam Ravnborgff13f922008-01-23 19:54:27 +01001557 fromsec = sech_name(elf, sechdr);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001558 fromsec += strlen(".rela");
1559 /* if from section (name) is know good then skip it */
Anders Kaseorgb614a692009-04-23 16:49:33 -04001560 if (match(fromsec, section_white_list))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001561 return;
Sam Ravnborge241a632008-01-28 20:13:13 +01001562
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001563 for (rela = start; rela < stop; rela++) {
1564 r.r_offset = TO_NATIVE(rela->r_offset);
1565#if KERNEL_ELFCLASS == ELFCLASS64
Sam Ravnborgff13f922008-01-23 19:54:27 +01001566 if (elf->hdr->e_machine == EM_MIPS) {
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001567 unsigned int r_typ;
1568 r_sym = ELF64_MIPS_R_SYM(rela->r_info);
1569 r_sym = TO_NATIVE(r_sym);
1570 r_typ = ELF64_MIPS_R_TYPE(rela->r_info);
1571 r.r_info = ELF64_R_INFO(r_sym, r_typ);
1572 } else {
1573 r.r_info = TO_NATIVE(rela->r_info);
1574 r_sym = ELF_R_SYM(r.r_info);
1575 }
1576#else
1577 r.r_info = TO_NATIVE(rela->r_info);
1578 r_sym = ELF_R_SYM(r.r_info);
1579#endif
1580 r.r_addend = TO_NATIVE(rela->r_addend);
1581 sym = elf->symtab_start + r_sym;
1582 /* Skip special sections */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001583 if (is_shndx_special(sym->st_shndx))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001584 continue;
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001585 check_section_mismatch(modname, elf, &r, sym, fromsec);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001586 }
1587}
1588
1589static void section_rel(const char *modname, struct elf_info *elf,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001590 Elf_Shdr *sechdr)
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001591{
1592 Elf_Sym *sym;
1593 Elf_Rel *rel;
1594 Elf_Rela r;
1595 unsigned int r_sym;
1596 const char *fromsec;
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001597
Sam Ravnborgff13f922008-01-23 19:54:27 +01001598 Elf_Rel *start = (void *)elf->hdr + sechdr->sh_offset;
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001599 Elf_Rel *stop = (void *)start + sechdr->sh_size;
1600
Sam Ravnborgff13f922008-01-23 19:54:27 +01001601 fromsec = sech_name(elf, sechdr);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001602 fromsec += strlen(".rel");
1603 /* if from section (name) is know good then skip it */
Anders Kaseorgb614a692009-04-23 16:49:33 -04001604 if (match(fromsec, section_white_list))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001605 return;
1606
1607 for (rel = start; rel < stop; rel++) {
1608 r.r_offset = TO_NATIVE(rel->r_offset);
1609#if KERNEL_ELFCLASS == ELFCLASS64
Sam Ravnborgff13f922008-01-23 19:54:27 +01001610 if (elf->hdr->e_machine == EM_MIPS) {
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001611 unsigned int r_typ;
1612 r_sym = ELF64_MIPS_R_SYM(rel->r_info);
1613 r_sym = TO_NATIVE(r_sym);
1614 r_typ = ELF64_MIPS_R_TYPE(rel->r_info);
1615 r.r_info = ELF64_R_INFO(r_sym, r_typ);
1616 } else {
1617 r.r_info = TO_NATIVE(rel->r_info);
1618 r_sym = ELF_R_SYM(r.r_info);
1619 }
1620#else
1621 r.r_info = TO_NATIVE(rel->r_info);
1622 r_sym = ELF_R_SYM(r.r_info);
1623#endif
1624 r.r_addend = 0;
Sam Ravnborgff13f922008-01-23 19:54:27 +01001625 switch (elf->hdr->e_machine) {
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001626 case EM_386:
1627 if (addend_386_rel(elf, sechdr, &r))
1628 continue;
1629 break;
1630 case EM_ARM:
1631 if (addend_arm_rel(elf, sechdr, &r))
1632 continue;
1633 break;
1634 case EM_MIPS:
1635 if (addend_mips_rel(elf, sechdr, &r))
1636 continue;
1637 break;
1638 }
1639 sym = elf->symtab_start + r_sym;
1640 /* Skip special sections */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001641 if (is_shndx_special(sym->st_shndx))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001642 continue;
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001643 check_section_mismatch(modname, elf, &r, sym, fromsec);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001644 }
1645}
1646
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001647/**
1648 * A module includes a number of sections that are discarded
1649 * either when loaded or when used as built-in.
1650 * For loaded modules all functions marked __init and all data
Uwe Kleine-Königb5950762010-11-01 15:38:34 -04001651 * marked __initdata will be discarded when the module has been initialized.
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001652 * Likewise for modules used built-in the sections marked __exit
1653 * are discarded because __exit marked function are supposed to be called
Ben Dooks32be1d22008-07-29 22:33:44 -07001654 * only when a module is unloaded which never happens for built-in modules.
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001655 * The check_sec_ref() function traverses all relocation records
1656 * to find all references to a section that reference a section that will
1657 * be discarded and warns about it.
1658 **/
1659static void check_sec_ref(struct module *mod, const char *modname,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001660 struct elf_info *elf)
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001661{
1662 int i;
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001663 Elf_Shdr *sechdrs = elf->sechdrs;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001664
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001665 /* Walk through all sections */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001666 for (i = 0; i < elf->num_sections; i++) {
Anders Kaseorgb614a692009-04-23 16:49:33 -04001667 check_section(modname, elf, &elf->sechdrs[i]);
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001668 /* We want to process only relocation sections and not .init */
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001669 if (sechdrs[i].sh_type == SHT_RELA)
Sam Ravnborg10668222008-01-13 22:21:31 +01001670 section_rela(modname, elf, &elf->sechdrs[i]);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001671 else if (sechdrs[i].sh_type == SHT_REL)
Sam Ravnborg10668222008-01-13 22:21:31 +01001672 section_rel(modname, elf, &elf->sechdrs[i]);
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001673 }
1674}
1675
Andi Kleen7d02b492014-02-08 09:01:12 +01001676static char *remove_dot(char *s)
1677{
Michal Nazarewiczfcd38ed2014-07-27 07:27:01 +09301678 size_t n = strcspn(s, ".");
Andi Kleen7d02b492014-02-08 09:01:12 +01001679
Michal Nazarewiczfcd38ed2014-07-27 07:27:01 +09301680 if (n && s[n]) {
1681 size_t m = strspn(s + n + 1, "0123456789");
1682 if (m && (s[n + m] == '.' || s[n + m] == 0))
Andi Kleen7d02b492014-02-08 09:01:12 +01001683 s[n] = 0;
1684 }
1685 return s;
1686}
1687
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001688static void read_symbols(char *modname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001689{
1690 const char *symname;
1691 char *version;
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001692 char *license;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001693 struct module *mod;
1694 struct elf_info info = { };
1695 Elf_Sym *sym;
1696
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +01001697 if (!parse_elf(&info, modname))
1698 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001699
1700 mod = new_module(modname);
1701
1702 /* When there's no vmlinux, don't print warnings about
1703 * unresolved symbols (since there'll be too many ;) */
1704 if (is_vmlinux(modname)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001705 have_vmlinux = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001706 mod->skip = 1;
1707 }
1708
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001709 license = get_modinfo(info.modinfo, info.modinfo_len, "license");
Sam Ravnborg2fa36562008-04-26 21:07:26 +02001710 if (info.modinfo && !license && !is_vmlinux(modname))
1711 warn("modpost: missing MODULE_LICENSE() in %s\n"
1712 "see include/linux/module.h for "
1713 "more information\n", modname);
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001714 while (license) {
1715 if (license_is_gpl_compatible(license))
1716 mod->gpl_compatible = 1;
1717 else {
1718 mod->gpl_compatible = 0;
1719 break;
1720 }
1721 license = get_next_modinfo(info.modinfo, info.modinfo_len,
1722 "license", license);
1723 }
1724
Linus Torvalds1da177e2005-04-16 15:20:36 -07001725 for (sym = info.symtab_start; sym < info.symtab_stop; sym++) {
Andi Kleen7d02b492014-02-08 09:01:12 +01001726 symname = remove_dot(info.strtab + sym->st_name);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001727
1728 handle_modversions(mod, &info, sym, symname);
1729 handle_moddevtable(mod, &info, sym, symname);
1730 }
Sam Ravnborgd1f25e62008-01-17 21:17:42 +01001731 if (!is_vmlinux(modname) ||
Sam Ravnborg10668222008-01-13 22:21:31 +01001732 (is_vmlinux(modname) && vmlinux_section_warnings))
1733 check_sec_ref(mod, modname, &info);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001734
1735 version = get_modinfo(info.modinfo, info.modinfo_len, "version");
1736 if (version)
1737 maybe_frob_rcs_version(modname, version, info.modinfo,
1738 version - (char *)info.hdr);
1739 if (version || (all_versions && !is_vmlinux(modname)))
1740 get_src_version(modname, mod->srcversion,
1741 sizeof(mod->srcversion)-1);
1742
1743 parse_elf_finish(&info);
1744
Rusty Russell8c8ef422009-03-31 13:05:34 -06001745 /* Our trick to get versioning for module struct etc. - it's
Linus Torvalds1da177e2005-04-16 15:20:36 -07001746 * never passed as an argument to an exported function, so
1747 * the automatic versioning doesn't pick it up, but it's really
1748 * important anyhow */
1749 if (modversions)
Rusty Russell8c8ef422009-03-31 13:05:34 -06001750 mod->unres = alloc_symbol("module_layout", 0, mod->unres);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001751}
1752
Rusty Russell712f9b42013-04-04 17:37:38 +10301753static void read_symbols_from_files(const char *filename)
1754{
1755 FILE *in = stdin;
1756 char fname[PATH_MAX];
1757
1758 if (strcmp(filename, "-") != 0) {
1759 in = fopen(filename, "r");
1760 if (!in)
1761 fatal("Can't open filenames file %s: %m", filename);
1762 }
1763
1764 while (fgets(fname, PATH_MAX, in) != NULL) {
1765 if (strends(fname, "\n"))
1766 fname[strlen(fname)-1] = '\0';
1767 read_symbols(fname);
1768 }
1769
1770 if (in != stdin)
1771 fclose(in);
1772}
1773
Linus Torvalds1da177e2005-04-16 15:20:36 -07001774#define SZ 500
1775
1776/* We first write the generated file into memory using the
1777 * following helper, then compare to the file on disk and
1778 * only update the later if anything changed */
1779
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001780void __attribute__((format(printf, 2, 3))) buf_printf(struct buffer *buf,
1781 const char *fmt, ...)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001782{
1783 char tmp[SZ];
1784 int len;
1785 va_list ap;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001786
Linus Torvalds1da177e2005-04-16 15:20:36 -07001787 va_start(ap, fmt);
1788 len = vsnprintf(tmp, SZ, fmt, ap);
Sam Ravnborg7670f022006-03-16 23:04:08 -08001789 buf_write(buf, tmp, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001790 va_end(ap);
1791}
1792
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001793void buf_write(struct buffer *buf, const char *s, int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001794{
1795 if (buf->size - buf->pos < len) {
Sam Ravnborg7670f022006-03-16 23:04:08 -08001796 buf->size += len + SZ;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001797 buf->p = realloc(buf->p, buf->size);
1798 }
1799 strncpy(buf->p + buf->pos, s, len);
1800 buf->pos += len;
1801}
1802
Sam Ravnborgc96fca22006-07-01 11:44:23 +02001803static void check_for_gpl_usage(enum export exp, const char *m, const char *s)
1804{
1805 const char *e = is_vmlinux(m) ?"":".ko";
1806
1807 switch (exp) {
1808 case export_gpl:
1809 fatal("modpost: GPL-incompatible module %s%s "
1810 "uses GPL-only symbol '%s'\n", m, e, s);
1811 break;
1812 case export_unused_gpl:
1813 fatal("modpost: GPL-incompatible module %s%s "
1814 "uses GPL-only symbol marked UNUSED '%s'\n", m, e, s);
1815 break;
1816 case export_gpl_future:
1817 warn("modpost: GPL-incompatible module %s%s "
1818 "uses future GPL-only symbol '%s'\n", m, e, s);
1819 break;
1820 case export_plain:
1821 case export_unused:
1822 case export_unknown:
1823 /* ignore */
1824 break;
1825 }
1826}
1827
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001828static void check_for_unused(enum export exp, const char *m, const char *s)
Sam Ravnborgc96fca22006-07-01 11:44:23 +02001829{
1830 const char *e = is_vmlinux(m) ?"":".ko";
1831
1832 switch (exp) {
1833 case export_unused:
1834 case export_unused_gpl:
1835 warn("modpost: module %s%s "
1836 "uses symbol '%s' marked UNUSED\n", m, e, s);
1837 break;
1838 default:
1839 /* ignore */
1840 break;
1841 }
1842}
1843
1844static void check_exports(struct module *mod)
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001845{
1846 struct symbol *s, *exp;
1847
1848 for (s = mod->unres; s; s = s->next) {
Andrew Morton6449bd62006-06-09 20:45:06 -07001849 const char *basename;
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001850 exp = find_symbol(s->name);
1851 if (!exp || exp->module == mod)
1852 continue;
Andrew Morton6449bd62006-06-09 20:45:06 -07001853 basename = strrchr(mod->name, '/');
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001854 if (basename)
1855 basename++;
Sam Ravnborgc96fca22006-07-01 11:44:23 +02001856 else
1857 basename = mod->name;
1858 if (!mod->gpl_compatible)
1859 check_for_gpl_usage(exp->export, basename, exp->name);
1860 check_for_unused(exp->export, basename, exp->name);
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001861 }
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001862}
1863
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001864/**
1865 * Header for the generated file
1866 **/
1867static void add_header(struct buffer *b, struct module *mod)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001868{
1869 buf_printf(b, "#include <linux/module.h>\n");
1870 buf_printf(b, "#include <linux/vermagic.h>\n");
1871 buf_printf(b, "#include <linux/compiler.h>\n");
1872 buf_printf(b, "\n");
1873 buf_printf(b, "MODULE_INFO(vermagic, VERMAGIC_STRING);\n");
1874 buf_printf(b, "\n");
Andi Kleene0f244c2013-10-23 10:57:58 +10301875 buf_printf(b, "__visible struct module __this_module\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001876 buf_printf(b, "__attribute__((section(\".gnu.linkonce.this_module\"))) = {\n");
Greg Kroah-Hartman3c7ec942012-04-25 11:10:15 -07001877 buf_printf(b, "\t.name = KBUILD_MODNAME,\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001878 if (mod->has_init)
Greg Kroah-Hartman3c7ec942012-04-25 11:10:15 -07001879 buf_printf(b, "\t.init = init_module,\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001880 if (mod->has_cleanup)
1881 buf_printf(b, "#ifdef CONFIG_MODULE_UNLOAD\n"
Greg Kroah-Hartman3c7ec942012-04-25 11:10:15 -07001882 "\t.exit = cleanup_module,\n"
Linus Torvalds1da177e2005-04-16 15:20:36 -07001883 "#endif\n");
Greg Kroah-Hartman3c7ec942012-04-25 11:10:15 -07001884 buf_printf(b, "\t.arch = MODULE_ARCH_INIT,\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001885 buf_printf(b, "};\n");
1886}
1887
Ben Hutchings2449b8b2011-10-24 15:12:28 +02001888static void add_intree_flag(struct buffer *b, int is_intree)
1889{
1890 if (is_intree)
1891 buf_printf(b, "\nMODULE_INFO(intree, \"Y\");\n");
1892}
1893
Trevor Keith5c725132009-09-22 16:43:38 -07001894static void add_staging_flag(struct buffer *b, const char *name)
Greg Kroah-Hartmana9860bf2008-09-24 14:46:44 -07001895{
1896 static const char *staging_dir = "drivers/staging";
1897
1898 if (strncmp(staging_dir, name, strlen(staging_dir)) == 0)
1899 buf_printf(b, "\nMODULE_INFO(staging, \"Y\");\n");
1900}
1901
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001902/**
1903 * Record CRCs for unresolved symbols
1904 **/
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001905static int add_versions(struct buffer *b, struct module *mod)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001906{
1907 struct symbol *s, *exp;
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001908 int err = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001909
1910 for (s = mod->unres; s; s = s->next) {
1911 exp = find_symbol(s->name);
1912 if (!exp || exp->module == mod) {
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001913 if (have_vmlinux && !s->weak) {
Matthew Wilcox2a116652006-10-07 05:35:32 -06001914 if (warn_unresolved) {
1915 warn("\"%s\" [%s.ko] undefined!\n",
1916 s->name, mod->name);
1917 } else {
1918 merror("\"%s\" [%s.ko] undefined!\n",
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001919 s->name, mod->name);
Matthew Wilcox2a116652006-10-07 05:35:32 -06001920 err = 1;
1921 }
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001922 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001923 continue;
1924 }
1925 s->module = exp->module;
1926 s->crc_valid = exp->crc_valid;
1927 s->crc = exp->crc;
1928 }
1929
1930 if (!modversions)
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001931 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001932
1933 buf_printf(b, "\n");
1934 buf_printf(b, "static const struct modversion_info ____versions[]\n");
Adrian Bunk3ff6eec2008-01-24 22:16:20 +01001935 buf_printf(b, "__used\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001936 buf_printf(b, "__attribute__((section(\"__versions\"))) = {\n");
1937
1938 for (s = mod->unres; s; s = s->next) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001939 if (!s->module)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001940 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001941 if (!s->crc_valid) {
Sam Ravnborgcb805142006-01-28 16:57:26 +01001942 warn("\"%s\" [%s.ko] has no CRC!\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -07001943 s->name, mod->name);
1944 continue;
1945 }
James Hogana53a11f32013-04-29 11:36:59 +09301946 buf_printf(b, "\t{ %#8x, __VMLINUX_SYMBOL_STR(%s) },\n",
James Hogana4b6a772013-03-18 19:38:56 +10301947 s->crc, s->name);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001948 }
1949
1950 buf_printf(b, "};\n");
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07001951
1952 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001953}
1954
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001955static void add_depends(struct buffer *b, struct module *mod,
1956 struct module *modules)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001957{
1958 struct symbol *s;
1959 struct module *m;
1960 int first = 1;
1961
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001962 for (m = modules; m; m = m->next)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001963 m->seen = is_vmlinux(m->name);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001964
1965 buf_printf(b, "\n");
1966 buf_printf(b, "static const char __module_depends[]\n");
Adrian Bunk3ff6eec2008-01-24 22:16:20 +01001967 buf_printf(b, "__used\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001968 buf_printf(b, "__attribute__((section(\".modinfo\"))) =\n");
1969 buf_printf(b, "\"depends=");
1970 for (s = mod->unres; s; s = s->next) {
Sam Ravnborga61b2df2007-02-26 19:46:52 +01001971 const char *p;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001972 if (!s->module)
1973 continue;
1974
1975 if (s->module->seen)
1976 continue;
1977
1978 s->module->seen = 1;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001979 p = strrchr(s->module->name, '/');
1980 if (p)
Sam Ravnborga61b2df2007-02-26 19:46:52 +01001981 p++;
1982 else
1983 p = s->module->name;
1984 buf_printf(b, "%s%s", first ? "" : ",", p);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001985 first = 0;
1986 }
1987 buf_printf(b, "\";\n");
1988}
1989
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001990static void add_srcversion(struct buffer *b, struct module *mod)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001991{
1992 if (mod->srcversion[0]) {
1993 buf_printf(b, "\n");
1994 buf_printf(b, "MODULE_INFO(srcversion, \"%s\");\n",
1995 mod->srcversion);
1996 }
1997}
1998
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001999static void write_if_changed(struct buffer *b, const char *fname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002000{
2001 char *tmp;
2002 FILE *file;
2003 struct stat st;
2004
2005 file = fopen(fname, "r");
2006 if (!file)
2007 goto write;
2008
2009 if (fstat(fileno(file), &st) < 0)
2010 goto close_write;
2011
2012 if (st.st_size != b->pos)
2013 goto close_write;
2014
2015 tmp = NOFAIL(malloc(b->pos));
2016 if (fread(tmp, 1, b->pos, file) != b->pos)
2017 goto free_write;
2018
2019 if (memcmp(tmp, b->p, b->pos) != 0)
2020 goto free_write;
2021
2022 free(tmp);
2023 fclose(file);
2024 return;
2025
2026 free_write:
2027 free(tmp);
2028 close_write:
2029 fclose(file);
2030 write:
2031 file = fopen(fname, "w");
2032 if (!file) {
2033 perror(fname);
2034 exit(1);
2035 }
2036 if (fwrite(b->p, 1, b->pos, file) != b->pos) {
2037 perror(fname);
2038 exit(1);
2039 }
2040 fclose(file);
2041}
2042
Ram Paibd5cbce2006-06-08 22:12:53 -07002043/* parse Module.symvers file. line format:
Sam Ravnborg534b89a2006-07-01 10:10:19 +02002044 * 0x12345678<tab>symbol<tab>module[[<tab>export]<tab>something]
Ram Paibd5cbce2006-06-08 22:12:53 -07002045 **/
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002046static void read_dump(const char *fname, unsigned int kernel)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002047{
2048 unsigned long size, pos = 0;
2049 void *file = grab_file(fname, &size);
2050 char *line;
2051
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002052 if (!file)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002053 /* No symbol versions, silently ignore */
2054 return;
2055
2056 while ((line = get_next_line(&pos, file, size))) {
Sam Ravnborg534b89a2006-07-01 10:10:19 +02002057 char *symname, *modname, *d, *export, *end;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002058 unsigned int crc;
2059 struct module *mod;
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002060 struct symbol *s;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002061
2062 if (!(symname = strchr(line, '\t')))
2063 goto fail;
2064 *symname++ = '\0';
2065 if (!(modname = strchr(symname, '\t')))
2066 goto fail;
2067 *modname++ = '\0';
Laurent Riffard9ac545b2006-06-11 08:02:06 +02002068 if ((export = strchr(modname, '\t')) != NULL)
Ram Paibd5cbce2006-06-08 22:12:53 -07002069 *export++ = '\0';
Sam Ravnborg534b89a2006-07-01 10:10:19 +02002070 if (export && ((end = strchr(export, '\t')) != NULL))
2071 *end = '\0';
Linus Torvalds1da177e2005-04-16 15:20:36 -07002072 crc = strtoul(line, &d, 16);
2073 if (*symname == '\0' || *modname == '\0' || *d != '\0')
2074 goto fail;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002075 mod = find_module(modname);
2076 if (!mod) {
2077 if (is_vmlinux(modname))
Linus Torvalds1da177e2005-04-16 15:20:36 -07002078 have_vmlinux = 1;
Jan Beulich0fa3a882009-03-12 12:28:30 +00002079 mod = new_module(modname);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002080 mod->skip = 1;
2081 }
Ram Paibd5cbce2006-06-08 22:12:53 -07002082 s = sym_add_exported(symname, mod, export_no(export));
Sam Ravnborg8e70c452006-01-28 22:22:33 +01002083 s->kernel = kernel;
2084 s->preloaded = 1;
Ram Paibd5cbce2006-06-08 22:12:53 -07002085 sym_update_crc(symname, mod, crc, export_no(export));
Linus Torvalds1da177e2005-04-16 15:20:36 -07002086 }
Christian Engelmayer2ee41e62014-04-28 11:34:32 +09302087 release_file(file, size);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002088 return;
2089fail:
Christian Engelmayer2ee41e62014-04-28 11:34:32 +09302090 release_file(file, size);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002091 fatal("parse error in symbol dump file\n");
2092}
2093
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002094/* For normal builds always dump all symbols.
2095 * For external modules only dump symbols
2096 * that are not read from kernel Module.symvers.
2097 **/
2098static int dump_sym(struct symbol *sym)
2099{
2100 if (!external_module)
2101 return 1;
2102 if (sym->vmlinux || sym->kernel)
2103 return 0;
2104 return 1;
2105}
Sam Ravnborg62070fa2006-03-03 16:46:04 +01002106
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002107static void write_dump(const char *fname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002108{
2109 struct buffer buf = { };
2110 struct symbol *symbol;
2111 int n;
2112
2113 for (n = 0; n < SYMBOL_HASH_SIZE ; n++) {
2114 symbol = symbolhash[n];
2115 while (symbol) {
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002116 if (dump_sym(symbol))
Ram Paibd5cbce2006-06-08 22:12:53 -07002117 buf_printf(&buf, "0x%08x\t%s\t%s\t%s\n",
Sam Ravnborg62070fa2006-03-03 16:46:04 +01002118 symbol->crc, symbol->name,
Ram Paibd5cbce2006-06-08 22:12:53 -07002119 symbol->module->name,
2120 export_str(symbol->export));
Linus Torvalds1da177e2005-04-16 15:20:36 -07002121 symbol = symbol->next;
2122 }
2123 }
2124 write_if_changed(&buf, fname);
2125}
2126
Richard Hacker2d04b5a2008-02-28 09:40:52 +01002127struct ext_sym_list {
2128 struct ext_sym_list *next;
2129 const char *file;
2130};
2131
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002132int main(int argc, char **argv)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002133{
2134 struct module *mod;
2135 struct buffer buf = { };
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002136 char *kernel_read = NULL, *module_read = NULL;
Rusty Russell712f9b42013-04-04 17:37:38 +10302137 char *dump_write = NULL, *files_source = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002138 int opt;
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002139 int err;
Richard Hacker2d04b5a2008-02-28 09:40:52 +01002140 struct ext_sym_list *extsym_iter;
2141 struct ext_sym_list *extsym_start = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002142
Guenter Roeckeed380f2013-09-23 15:23:54 +09302143 while ((opt = getopt(argc, argv, "i:I:e:mnsST:o:awM:K:")) != -1) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002144 switch (opt) {
2145 case 'i':
2146 kernel_read = optarg;
2147 break;
2148 case 'I':
2149 module_read = optarg;
2150 external_module = 1;
2151 break;
Richard Hacker2d04b5a2008-02-28 09:40:52 +01002152 case 'e':
2153 external_module = 1;
2154 extsym_iter =
2155 NOFAIL(malloc(sizeof(*extsym_iter)));
2156 extsym_iter->next = extsym_start;
2157 extsym_iter->file = optarg;
2158 extsym_start = extsym_iter;
2159 break;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002160 case 'm':
2161 modversions = 1;
2162 break;
Guenter Roeckeed380f2013-09-23 15:23:54 +09302163 case 'n':
2164 ignore_missing_files = 1;
2165 break;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002166 case 'o':
2167 dump_write = optarg;
2168 break;
2169 case 'a':
2170 all_versions = 1;
2171 break;
2172 case 's':
2173 vmlinux_section_warnings = 0;
2174 break;
Sam Ravnborg588ccd72008-01-24 21:12:37 +01002175 case 'S':
2176 sec_mismatch_verbose = 0;
2177 break;
Rusty Russell712f9b42013-04-04 17:37:38 +10302178 case 'T':
2179 files_source = optarg;
2180 break;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002181 case 'w':
2182 warn_unresolved = 1;
2183 break;
2184 default:
2185 exit(1);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002186 }
2187 }
2188
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002189 if (kernel_read)
2190 read_dump(kernel_read, 1);
2191 if (module_read)
2192 read_dump(module_read, 0);
Richard Hacker2d04b5a2008-02-28 09:40:52 +01002193 while (extsym_start) {
2194 read_dump(extsym_start->file, 0);
2195 extsym_iter = extsym_start->next;
2196 free(extsym_start);
2197 extsym_start = extsym_iter;
2198 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07002199
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002200 while (optind < argc)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002201 read_symbols(argv[optind++]);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002202
Rusty Russell712f9b42013-04-04 17:37:38 +10302203 if (files_source)
2204 read_symbols_from_files(files_source);
2205
Linus Torvalds1da177e2005-04-16 15:20:36 -07002206 for (mod = modules; mod; mod = mod->next) {
2207 if (mod->skip)
2208 continue;
Sam Ravnborgc96fca22006-07-01 11:44:23 +02002209 check_exports(mod);
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002210 }
2211
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002212 err = 0;
2213
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002214 for (mod = modules; mod; mod = mod->next) {
Mathias Kraused93e1712014-08-27 20:28:56 +09302215 char fname[PATH_MAX];
Andi Kleen666ab412007-11-22 03:43:10 +01002216
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002217 if (mod->skip)
2218 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002219
2220 buf.pos = 0;
2221
2222 add_header(&buf, mod);
Ben Hutchings2449b8b2011-10-24 15:12:28 +02002223 add_intree_flag(&buf, !external_module);
Greg Kroah-Hartmana9860bf2008-09-24 14:46:44 -07002224 add_staging_flag(&buf, mod->name);
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002225 err |= add_versions(&buf, mod);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002226 add_depends(&buf, mod, modules);
2227 add_moddevtable(&buf, mod);
2228 add_srcversion(&buf, mod);
2229
2230 sprintf(fname, "%s.mod.c", mod->name);
2231 write_if_changed(&buf, fname);
2232 }
2233
2234 if (dump_write)
2235 write_dump(dump_write);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01002236 if (sec_mismatch_count && !sec_mismatch_verbose)
Geert Uytterhoeven7c0ac492008-02-05 11:38:49 +01002237 warn("modpost: Found %d section mismatch(es).\n"
2238 "To see full details build your kernel with:\n"
2239 "'make CONFIG_DEBUG_SECTION_MISMATCH=y'\n",
2240 sec_mismatch_count);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002241
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002242 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002243}