blob: 29c89a6bad3d3ac34e539189e83769f1c63ddab3 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/* Postprocess module symbol versions
2 *
3 * Copyright 2003 Kai Germaschewski
4 * Copyright 2002-2004 Rusty Russell, IBM Corporation
Sam Ravnborgdf578e72008-01-11 19:17:15 +01005 * Copyright 2006-2008 Sam Ravnborg
Linus Torvalds1da177e2005-04-16 15:20:36 -07006 * Based in part on module-init-tools/depmod.c,file2alias
7 *
8 * This software may be used and distributed according to the terms
9 * of the GNU General Public License, incorporated herein by reference.
10 *
11 * Usage: modpost vmlinux module1.o module2.o ...
12 */
13
Mathieu Desnoyersb2e3e652008-02-13 15:03:39 -080014#define _GNU_SOURCE
15#include <stdio.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <ctype.h>
Andrew Morton5003bab2010-08-11 00:42:26 -070017#include <string.h>
Rusty Russell712f9b42013-04-04 17:37:38 +103018#include <limits.h>
Rusty Russelld4ef1c32013-04-04 17:37:32 +103019#include <stdbool.h>
Guenter Roeckeed380f2013-09-23 15:23:54 +093020#include <errno.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021#include "modpost.h"
Linus Torvalds5a865c02009-12-17 07:23:42 -080022#include "../../include/generated/autoconf.h"
Sam Ravnborgb817f6f2006-06-09 21:53:55 +020023#include "../../include/linux/license.h"
Rusty Russellb92021b2013-03-15 15:04:17 +103024#include "../../include/linux/export.h"
Alan Jenkins9e1b9b82009-11-07 21:03:54 +000025
Linus Torvalds1da177e2005-04-16 15:20:36 -070026/* Are we using CONFIG_MODVERSIONS? */
Mathias Krause7a3ee752014-08-27 20:28:53 +093027static int modversions = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070028/* Warn about undefined symbols? (do so if we have vmlinux) */
Mathias Krause7a3ee752014-08-27 20:28:53 +093029static int have_vmlinux = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070030/* Is CONFIG_MODULE_SRCVERSION_ALL set? */
31static int all_versions = 0;
Sam Ravnborg040fcc82006-01-28 22:15:55 +010032/* If we are modposting external module set to 1 */
33static int external_module = 0;
Sam Ravnborg8d8d8282007-07-20 22:36:56 +020034/* Warn about section mismatch in vmlinux if set to 1 */
35static int vmlinux_section_warnings = 1;
Kirill Korotaevc53ddac2006-09-07 13:08:54 -070036/* Only warn about unresolved symbols */
37static int warn_unresolved = 0;
Ram Paibd5cbce2006-06-08 22:12:53 -070038/* How a symbol is exported */
Sam Ravnborg588ccd72008-01-24 21:12:37 +010039static int sec_mismatch_count = 0;
40static int sec_mismatch_verbose = 1;
Nicolas Boichat47490ec2015-10-06 09:44:42 +103041static int sec_mismatch_fatal = 0;
Guenter Roeckeed380f2013-09-23 15:23:54 +093042/* ignore missing files */
43static int ignore_missing_files;
Sam Ravnborg588ccd72008-01-24 21:12:37 +010044
Sam Ravnborgc96fca22006-07-01 11:44:23 +020045enum export {
46 export_plain, export_unused, export_gpl,
47 export_unused_gpl, export_gpl_future, export_unknown
48};
Linus Torvalds1da177e2005-04-16 15:20:36 -070049
Andi Kleen6d9a89e2007-11-22 03:43:08 +010050#define PRINTF __attribute__ ((format (printf, 1, 2)))
51
52PRINTF void fatal(const char *fmt, ...)
Linus Torvalds1da177e2005-04-16 15:20:36 -070053{
54 va_list arglist;
55
56 fprintf(stderr, "FATAL: ");
57
58 va_start(arglist, fmt);
59 vfprintf(stderr, fmt, arglist);
60 va_end(arglist);
61
62 exit(1);
63}
64
Andi Kleen6d9a89e2007-11-22 03:43:08 +010065PRINTF void warn(const char *fmt, ...)
Linus Torvalds1da177e2005-04-16 15:20:36 -070066{
67 va_list arglist;
68
69 fprintf(stderr, "WARNING: ");
70
71 va_start(arglist, fmt);
72 vfprintf(stderr, fmt, arglist);
73 va_end(arglist);
74}
75
Andi Kleen6d9a89e2007-11-22 03:43:08 +010076PRINTF void merror(const char *fmt, ...)
Matthew Wilcox2a116652006-10-07 05:35:32 -060077{
78 va_list arglist;
79
80 fprintf(stderr, "ERROR: ");
81
82 va_start(arglist, fmt);
83 vfprintf(stderr, fmt, arglist);
84 va_end(arglist);
85}
86
Rusty Russelld4ef1c32013-04-04 17:37:32 +103087static inline bool strends(const char *str, const char *postfix)
88{
89 if (strlen(str) < strlen(postfix))
90 return false;
91
92 return strcmp(str + strlen(str) - strlen(postfix), postfix) == 0;
93}
94
Sam Ravnborg040fcc82006-01-28 22:15:55 +010095static int is_vmlinux(const char *modname)
96{
97 const char *myname;
98
Sam Ravnborgdf578e72008-01-11 19:17:15 +010099 myname = strrchr(modname, '/');
100 if (myname)
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100101 myname++;
102 else
103 myname = modname;
104
Sam Ravnborg741f98f2007-07-17 10:54:06 +0200105 return (strcmp(myname, "vmlinux") == 0) ||
106 (strcmp(myname, "vmlinux.o") == 0);
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100107}
108
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109void *do_nofail(void *ptr, const char *expr)
110{
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100111 if (!ptr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112 fatal("modpost: Memory allocation failure: %s.\n", expr);
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100113
Linus Torvalds1da177e2005-04-16 15:20:36 -0700114 return ptr;
115}
116
117/* A list of all modules we processed */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118static struct module *modules;
119
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100120static struct module *find_module(char *modname)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121{
122 struct module *mod;
123
124 for (mod = modules; mod; mod = mod->next)
125 if (strcmp(mod->name, modname) == 0)
126 break;
127 return mod;
128}
129
Rusty Russelld4ef1c32013-04-04 17:37:32 +1030130static struct module *new_module(const char *modname)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131{
132 struct module *mod;
Rusty Russelld4ef1c32013-04-04 17:37:32 +1030133 char *p;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100134
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135 mod = NOFAIL(malloc(sizeof(*mod)));
136 memset(mod, 0, sizeof(*mod));
137 p = NOFAIL(strdup(modname));
138
139 /* strip trailing .o */
Rusty Russelld4ef1c32013-04-04 17:37:32 +1030140 if (strends(p, ".o")) {
141 p[strlen(p) - 2] = '\0';
142 mod->is_dot_o = 1;
143 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144
145 /* add to list */
146 mod->name = p;
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200147 mod->gpl_compatible = -1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148 mod->next = modules;
149 modules = mod;
150
151 return mod;
152}
153
154/* A hash of all exported symbols,
155 * struct symbol is also used for lists of unresolved symbols */
156
157#define SYMBOL_HASH_SIZE 1024
158
159struct symbol {
160 struct symbol *next;
161 struct module *module;
162 unsigned int crc;
163 int crc_valid;
164 unsigned int weak:1;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100165 unsigned int vmlinux:1; /* 1 if symbol is defined in vmlinux */
166 unsigned int kernel:1; /* 1 if symbol is from kernel
167 * (only for external modules) **/
Rusty Russellb6568b12013-11-07 12:09:13 +1030168 unsigned int preloaded:1; /* 1 if symbol from Module.symvers, or crc */
Ram Paibd5cbce2006-06-08 22:12:53 -0700169 enum export export; /* Type of export */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700170 char name[0];
171};
172
173static struct symbol *symbolhash[SYMBOL_HASH_SIZE];
174
175/* This is based on the hash agorithm from gdbm, via tdb */
176static inline unsigned int tdb_hash(const char *name)
177{
178 unsigned value; /* Used to compute the hash value. */
179 unsigned i; /* Used to cycle through random values. */
180
181 /* Set the initial value from the key size. */
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100182 for (value = 0x238F13AF * strlen(name), i = 0; name[i]; i++)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700183 value = (value + (((unsigned char *)name)[i] << (i*5 % 24)));
184
185 return (1103515243 * value + 12345);
186}
187
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100188/**
189 * Allocate a new symbols for use in the hash of exported symbols or
190 * the list of unresolved symbols per module
191 **/
192static struct symbol *alloc_symbol(const char *name, unsigned int weak,
193 struct symbol *next)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194{
195 struct symbol *s = NOFAIL(malloc(sizeof(*s) + strlen(name) + 1));
196
197 memset(s, 0, sizeof(*s));
198 strcpy(s->name, name);
199 s->weak = weak;
200 s->next = next;
201 return s;
202}
203
204/* For the hash of exported symbols */
Ram Paibd5cbce2006-06-08 22:12:53 -0700205static struct symbol *new_symbol(const char *name, struct module *module,
206 enum export export)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700207{
208 unsigned int hash;
209 struct symbol *new;
210
211 hash = tdb_hash(name) % SYMBOL_HASH_SIZE;
212 new = symbolhash[hash] = alloc_symbol(name, 0, symbolhash[hash]);
213 new->module = module;
Ram Paibd5cbce2006-06-08 22:12:53 -0700214 new->export = export;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100215 return new;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700216}
217
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100218static struct symbol *find_symbol(const char *name)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700219{
220 struct symbol *s;
221
222 /* For our purposes, .foo matches foo. PPC64 needs this. */
223 if (name[0] == '.')
224 name++;
225
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100226 for (s = symbolhash[tdb_hash(name) % SYMBOL_HASH_SIZE]; s; s = s->next) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700227 if (strcmp(s->name, name) == 0)
228 return s;
229 }
230 return NULL;
231}
232
Mathias Krause7a3ee752014-08-27 20:28:53 +0930233static const struct {
Ram Paibd5cbce2006-06-08 22:12:53 -0700234 const char *str;
235 enum export export;
236} export_list[] = {
237 { .str = "EXPORT_SYMBOL", .export = export_plain },
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200238 { .str = "EXPORT_UNUSED_SYMBOL", .export = export_unused },
Ram Paibd5cbce2006-06-08 22:12:53 -0700239 { .str = "EXPORT_SYMBOL_GPL", .export = export_gpl },
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200240 { .str = "EXPORT_UNUSED_SYMBOL_GPL", .export = export_unused_gpl },
Ram Paibd5cbce2006-06-08 22:12:53 -0700241 { .str = "EXPORT_SYMBOL_GPL_FUTURE", .export = export_gpl_future },
242 { .str = "(unknown)", .export = export_unknown },
243};
244
245
246static const char *export_str(enum export ex)
247{
248 return export_list[ex].str;
249}
250
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100251static enum export export_no(const char *s)
Ram Paibd5cbce2006-06-08 22:12:53 -0700252{
253 int i;
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100254
Sam Ravnborg534b89a2006-07-01 10:10:19 +0200255 if (!s)
256 return export_unknown;
Ram Paibd5cbce2006-06-08 22:12:53 -0700257 for (i = 0; export_list[i].export != export_unknown; i++) {
258 if (strcmp(export_list[i].str, s) == 0)
259 return export_list[i].export;
260 }
261 return export_unknown;
262}
263
Alessio Igor Bogani62a26352011-07-14 08:51:16 +0200264static const char *sec_name(struct elf_info *elf, int secindex);
265
266#define strstarts(str, prefix) (strncmp(str, prefix, strlen(prefix)) == 0)
267
268static enum export export_from_secname(struct elf_info *elf, unsigned int sec)
269{
270 const char *secname = sec_name(elf, sec);
271
272 if (strstarts(secname, "___ksymtab+"))
273 return export_plain;
274 else if (strstarts(secname, "___ksymtab_unused+"))
275 return export_unused;
276 else if (strstarts(secname, "___ksymtab_gpl+"))
277 return export_gpl;
278 else if (strstarts(secname, "___ksymtab_unused_gpl+"))
279 return export_unused_gpl;
280 else if (strstarts(secname, "___ksymtab_gpl_future+"))
281 return export_gpl_future;
282 else
283 return export_unknown;
284}
285
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200286static enum export export_from_sec(struct elf_info *elf, unsigned int sec)
Ram Paibd5cbce2006-06-08 22:12:53 -0700287{
288 if (sec == elf->export_sec)
289 return export_plain;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200290 else if (sec == elf->export_unused_sec)
291 return export_unused;
Ram Paibd5cbce2006-06-08 22:12:53 -0700292 else if (sec == elf->export_gpl_sec)
293 return export_gpl;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200294 else if (sec == elf->export_unused_gpl_sec)
295 return export_unused_gpl;
Ram Paibd5cbce2006-06-08 22:12:53 -0700296 else if (sec == elf->export_gpl_future_sec)
297 return export_gpl_future;
298 else
299 return export_unknown;
300}
301
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100302/**
303 * Add an exported symbol - it may have already been added without a
304 * CRC, in this case just update the CRC
305 **/
Ram Paibd5cbce2006-06-08 22:12:53 -0700306static struct symbol *sym_add_exported(const char *name, struct module *mod,
307 enum export export)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700308{
309 struct symbol *s = find_symbol(name);
310
311 if (!s) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700312 s = new_symbol(name, mod, export);
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100313 } else {
314 if (!s->preloaded) {
Sam Ravnborg7b75b132006-03-05 13:48:58 +0100315 warn("%s: '%s' exported twice. Previous export "
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100316 "was in %s%s\n", mod->name, name,
317 s->module->name,
318 is_vmlinux(s->module->name) ?"":".ko");
Trent Piepho4b219602007-10-11 16:40:10 -0700319 } else {
Paul Bollebaec30e2014-04-16 18:05:35 +0200320 /* In case Module.symvers was out of date */
Trent Piepho4b219602007-10-11 16:40:10 -0700321 s->module = mod;
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100322 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700323 }
Sam Ravnborg8e70c452006-01-28 22:22:33 +0100324 s->preloaded = 0;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100325 s->vmlinux = is_vmlinux(mod->name);
326 s->kernel = 0;
Ram Paibd5cbce2006-06-08 22:12:53 -0700327 s->export = export;
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100328 return s;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700329}
330
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100331static void sym_update_crc(const char *name, struct module *mod,
Ram Paibd5cbce2006-06-08 22:12:53 -0700332 unsigned int crc, enum export export)
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100333{
334 struct symbol *s = find_symbol(name);
335
Rusty Russellb6568b12013-11-07 12:09:13 +1030336 if (!s) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700337 s = new_symbol(name, mod, export);
Rusty Russellb6568b12013-11-07 12:09:13 +1030338 /* Don't complain when we find it later. */
339 s->preloaded = 1;
340 }
Sam Ravnborg040fcc82006-01-28 22:15:55 +0100341 s->crc = crc;
342 s->crc_valid = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700343}
344
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100345void *grab_file(const char *filename, unsigned long *size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346{
347 struct stat st;
Jesper Juhleb3d5cc2012-05-23 22:28:49 +0930348 void *map = MAP_FAILED;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700349 int fd;
350
351 fd = open(filename, O_RDONLY);
Jesper Juhleb3d5cc2012-05-23 22:28:49 +0930352 if (fd < 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700353 return NULL;
Jesper Juhleb3d5cc2012-05-23 22:28:49 +0930354 if (fstat(fd, &st))
355 goto failed;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700356
357 *size = st.st_size;
358 map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700359
Jesper Juhleb3d5cc2012-05-23 22:28:49 +0930360failed:
361 close(fd);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700362 if (map == MAP_FAILED)
363 return NULL;
364 return map;
365}
366
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100367/**
368 * Return a copy of the next line in a mmap'ed file.
369 * spaces in the beginning of the line is trimmed away.
370 * Return a pointer to a static buffer.
371 **/
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100372char *get_next_line(unsigned long *pos, void *file, unsigned long size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700373{
374 static char line[4096];
375 int skip = 1;
376 size_t len = 0;
377 signed char *p = (signed char *)file + *pos;
378 char *s = line;
379
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100380 for (; *pos < size ; (*pos)++) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700381 if (skip && isspace(*p)) {
382 p++;
383 continue;
384 }
385 skip = 0;
386 if (*p != '\n' && (*pos < size)) {
387 len++;
388 *s++ = *p++;
389 if (len > 4095)
390 break; /* Too long, stop */
391 } else {
392 /* End of string */
393 *s = '\0';
394 return line;
395 }
396 }
397 /* End of buffer */
398 return NULL;
399}
400
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100401void release_file(void *file, unsigned long size)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700402{
403 munmap(file, size);
404}
405
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100406static int parse_elf(struct elf_info *info, const char *filename)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700407{
408 unsigned int i;
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100409 Elf_Ehdr *hdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700410 Elf_Shdr *sechdrs;
411 Elf_Sym *sym;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200412 const char *secstrings;
413 unsigned int symtab_idx = ~0U, symtab_shndx_idx = ~0U;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700414
415 hdr = grab_file(filename, &info->size);
416 if (!hdr) {
Guenter Roeckeed380f2013-09-23 15:23:54 +0930417 if (ignore_missing_files) {
418 fprintf(stderr, "%s: %s (ignored)\n", filename,
419 strerror(errno));
420 return 0;
421 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700422 perror(filename);
Sam Ravnborg6803dc02006-06-24 23:46:54 +0200423 exit(1);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700424 }
425 info->hdr = hdr;
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100426 if (info->size < sizeof(*hdr)) {
427 /* file too small, assume this is an empty .o file */
428 return 0;
429 }
430 /* Is this a valid ELF file? */
431 if ((hdr->e_ident[EI_MAG0] != ELFMAG0) ||
432 (hdr->e_ident[EI_MAG1] != ELFMAG1) ||
433 (hdr->e_ident[EI_MAG2] != ELFMAG2) ||
434 (hdr->e_ident[EI_MAG3] != ELFMAG3)) {
435 /* Not an ELF file - silently ignore it */
436 return 0;
437 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700438 /* Fix endianness in ELF header */
Anders Kaseorg7d875a02009-05-03 22:02:55 +0200439 hdr->e_type = TO_NATIVE(hdr->e_type);
440 hdr->e_machine = TO_NATIVE(hdr->e_machine);
441 hdr->e_version = TO_NATIVE(hdr->e_version);
442 hdr->e_entry = TO_NATIVE(hdr->e_entry);
443 hdr->e_phoff = TO_NATIVE(hdr->e_phoff);
444 hdr->e_shoff = TO_NATIVE(hdr->e_shoff);
445 hdr->e_flags = TO_NATIVE(hdr->e_flags);
446 hdr->e_ehsize = TO_NATIVE(hdr->e_ehsize);
447 hdr->e_phentsize = TO_NATIVE(hdr->e_phentsize);
448 hdr->e_phnum = TO_NATIVE(hdr->e_phnum);
449 hdr->e_shentsize = TO_NATIVE(hdr->e_shentsize);
450 hdr->e_shnum = TO_NATIVE(hdr->e_shnum);
451 hdr->e_shstrndx = TO_NATIVE(hdr->e_shstrndx);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700452 sechdrs = (void *)hdr + hdr->e_shoff;
453 info->sechdrs = sechdrs;
454
Petr Stetiara83710e2007-08-27 12:15:07 +0200455 /* Check if file offset is correct */
456 if (hdr->e_shoff > info->size) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100457 fatal("section header offset=%lu in file '%s' is bigger than "
458 "filesize=%lu\n", (unsigned long)hdr->e_shoff,
459 filename, info->size);
Petr Stetiara83710e2007-08-27 12:15:07 +0200460 return 0;
461 }
462
Anders Kaseorg68457562011-05-19 16:55:27 -0600463 if (hdr->e_shnum == SHN_UNDEF) {
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200464 /*
465 * There are more than 64k sections,
466 * read count from .sh_size.
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200467 */
468 info->num_sections = TO_NATIVE(sechdrs[0].sh_size);
469 }
470 else {
471 info->num_sections = hdr->e_shnum;
472 }
473 if (hdr->e_shstrndx == SHN_XINDEX) {
Anders Kaseorg68457562011-05-19 16:55:27 -0600474 info->secindex_strings = TO_NATIVE(sechdrs[0].sh_link);
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200475 }
476 else {
477 info->secindex_strings = hdr->e_shstrndx;
478 }
479
Linus Torvalds1da177e2005-04-16 15:20:36 -0700480 /* Fix endianness in section headers */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200481 for (i = 0; i < info->num_sections; i++) {
Anders Kaseorg7d875a02009-05-03 22:02:55 +0200482 sechdrs[i].sh_name = TO_NATIVE(sechdrs[i].sh_name);
483 sechdrs[i].sh_type = TO_NATIVE(sechdrs[i].sh_type);
484 sechdrs[i].sh_flags = TO_NATIVE(sechdrs[i].sh_flags);
485 sechdrs[i].sh_addr = TO_NATIVE(sechdrs[i].sh_addr);
486 sechdrs[i].sh_offset = TO_NATIVE(sechdrs[i].sh_offset);
487 sechdrs[i].sh_size = TO_NATIVE(sechdrs[i].sh_size);
488 sechdrs[i].sh_link = TO_NATIVE(sechdrs[i].sh_link);
489 sechdrs[i].sh_info = TO_NATIVE(sechdrs[i].sh_info);
490 sechdrs[i].sh_addralign = TO_NATIVE(sechdrs[i].sh_addralign);
491 sechdrs[i].sh_entsize = TO_NATIVE(sechdrs[i].sh_entsize);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700492 }
493 /* Find symbol table. */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200494 secstrings = (void *)hdr + sechdrs[info->secindex_strings].sh_offset;
495 for (i = 1; i < info->num_sections; i++) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700496 const char *secname;
Tejun Heo56fc82c2009-02-06 00:48:02 +0900497 int nobits = sechdrs[i].sh_type == SHT_NOBITS;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700498
Tejun Heo56fc82c2009-02-06 00:48:02 +0900499 if (!nobits && sechdrs[i].sh_offset > info->size) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100500 fatal("%s is truncated. sechdrs[i].sh_offset=%lu > "
501 "sizeof(*hrd)=%zu\n", filename,
502 (unsigned long)sechdrs[i].sh_offset,
503 sizeof(*hdr));
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100504 return 0;
505 }
Ram Paibd5cbce2006-06-08 22:12:53 -0700506 secname = secstrings + sechdrs[i].sh_name;
507 if (strcmp(secname, ".modinfo") == 0) {
Tejun Heo56fc82c2009-02-06 00:48:02 +0900508 if (nobits)
509 fatal("%s has NOBITS .modinfo\n", filename);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700510 info->modinfo = (void *)hdr + sechdrs[i].sh_offset;
511 info->modinfo_len = sechdrs[i].sh_size;
Ram Paibd5cbce2006-06-08 22:12:53 -0700512 } else if (strcmp(secname, "__ksymtab") == 0)
513 info->export_sec = i;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200514 else if (strcmp(secname, "__ksymtab_unused") == 0)
515 info->export_unused_sec = i;
Ram Paibd5cbce2006-06-08 22:12:53 -0700516 else if (strcmp(secname, "__ksymtab_gpl") == 0)
517 info->export_gpl_sec = i;
Sam Ravnborgc96fca22006-07-01 11:44:23 +0200518 else if (strcmp(secname, "__ksymtab_unused_gpl") == 0)
519 info->export_unused_gpl_sec = i;
Ram Paibd5cbce2006-06-08 22:12:53 -0700520 else if (strcmp(secname, "__ksymtab_gpl_future") == 0)
521 info->export_gpl_future_sec = i;
522
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200523 if (sechdrs[i].sh_type == SHT_SYMTAB) {
524 unsigned int sh_link_idx;
525 symtab_idx = i;
526 info->symtab_start = (void *)hdr +
527 sechdrs[i].sh_offset;
528 info->symtab_stop = (void *)hdr +
529 sechdrs[i].sh_offset + sechdrs[i].sh_size;
Anders Kaseorg68457562011-05-19 16:55:27 -0600530 sh_link_idx = sechdrs[i].sh_link;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200531 info->strtab = (void *)hdr +
532 sechdrs[sh_link_idx].sh_offset;
533 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700534
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200535 /* 32bit section no. table? ("more than 64k sections") */
536 if (sechdrs[i].sh_type == SHT_SYMTAB_SHNDX) {
537 symtab_shndx_idx = i;
538 info->symtab_shndx_start = (void *)hdr +
539 sechdrs[i].sh_offset;
540 info->symtab_shndx_stop = (void *)hdr +
541 sechdrs[i].sh_offset + sechdrs[i].sh_size;
542 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700543 }
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100544 if (!info->symtab_start)
Sam Ravnborgcb805142006-01-28 16:57:26 +0100545 fatal("%s has no symtab?\n", filename);
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100546
Linus Torvalds1da177e2005-04-16 15:20:36 -0700547 /* Fix endianness in symbols */
548 for (sym = info->symtab_start; sym < info->symtab_stop; sym++) {
549 sym->st_shndx = TO_NATIVE(sym->st_shndx);
550 sym->st_name = TO_NATIVE(sym->st_name);
551 sym->st_value = TO_NATIVE(sym->st_value);
552 sym->st_size = TO_NATIVE(sym->st_size);
553 }
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200554
555 if (symtab_shndx_idx != ~0U) {
556 Elf32_Word *p;
Anders Kaseorg68457562011-05-19 16:55:27 -0600557 if (symtab_idx != sechdrs[symtab_shndx_idx].sh_link)
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200558 fatal("%s: SYMTAB_SHNDX has bad sh_link: %u!=%u\n",
Anders Kaseorg68457562011-05-19 16:55:27 -0600559 filename, sechdrs[symtab_shndx_idx].sh_link,
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200560 symtab_idx);
561 /* Fix endianness */
562 for (p = info->symtab_shndx_start; p < info->symtab_shndx_stop;
563 p++)
564 *p = TO_NATIVE(*p);
565 }
566
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +0100567 return 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700568}
569
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100570static void parse_elf_finish(struct elf_info *info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700571{
572 release_file(info->hdr, info->size);
573}
574
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200575static int ignore_undef_symbol(struct elf_info *info, const char *symname)
576{
577 /* ignore __this_module, it will be resolved shortly */
Rusty Russellb92021b2013-03-15 15:04:17 +1030578 if (strcmp(symname, VMLINUX_SYMBOL_STR(__this_module)) == 0)
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200579 return 1;
580 /* ignore global offset table */
581 if (strcmp(symname, "_GLOBAL_OFFSET_TABLE_") == 0)
582 return 1;
583 if (info->hdr->e_machine == EM_PPC)
584 /* Special register function linked on all modules during final link of .ko */
585 if (strncmp(symname, "_restgpr_", sizeof("_restgpr_") - 1) == 0 ||
586 strncmp(symname, "_savegpr_", sizeof("_savegpr_") - 1) == 0 ||
587 strncmp(symname, "_rest32gpr_", sizeof("_rest32gpr_") - 1) == 0 ||
Andreas Schwab8fe9c932013-12-30 15:31:17 +0100588 strncmp(symname, "_save32gpr_", sizeof("_save32gpr_") - 1) == 0 ||
589 strncmp(symname, "_restvr_", sizeof("_restvr_") - 1) == 0 ||
590 strncmp(symname, "_savevr_", sizeof("_savevr_") - 1) == 0)
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200591 return 1;
Stephen Rothwell7fca5dc2010-06-29 20:08:42 +0000592 if (info->hdr->e_machine == EM_PPC64)
593 /* Special register function linked on all modules during final link of .ko */
594 if (strncmp(symname, "_restgpr0_", sizeof("_restgpr0_") - 1) == 0 ||
Andreas Schwab8fe9c932013-12-30 15:31:17 +0100595 strncmp(symname, "_savegpr0_", sizeof("_savegpr0_") - 1) == 0 ||
596 strncmp(symname, "_restvr_", sizeof("_restvr_") - 1) == 0 ||
Alan Modrac1536932016-01-15 20:52:22 +1100597 strncmp(symname, "_savevr_", sizeof("_savevr_") - 1) == 0 ||
598 strcmp(symname, ".TOC.") == 0)
Stephen Rothwell7fca5dc2010-06-29 20:08:42 +0000599 return 1;
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200600 /* Do not ignore this symbol */
601 return 0;
602}
603
Rusty Russellb92021b2013-03-15 15:04:17 +1030604#define CRC_PFX VMLINUX_SYMBOL_STR(__crc_)
605#define KSYMTAB_PFX VMLINUX_SYMBOL_STR(__ksymtab_)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700606
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100607static void handle_modversions(struct module *mod, struct elf_info *info,
608 Elf_Sym *sym, const char *symname)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700609{
610 unsigned int crc;
Alessio Igor Bogani62a26352011-07-14 08:51:16 +0200611 enum export export;
Nicholas Piggind8c1eb82016-11-24 03:41:42 +1100612 bool is_crc = false;
Alessio Igor Bogani62a26352011-07-14 08:51:16 +0200613
Frank Rowand258f7422012-04-09 17:59:03 -0700614 if ((!is_vmlinux(mod->name) || mod->is_dot_o) &&
615 strncmp(symname, "__ksymtab", 9) == 0)
Alessio Igor Bogani62a26352011-07-14 08:51:16 +0200616 export = export_from_secname(info, get_secindex(info, sym));
617 else
618 export = export_from_sec(info, get_secindex(info, sym));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700619
Andi Kleenb5064652013-11-12 15:08:38 -0800620 /* CRC'd symbol */
621 if (strncmp(symname, CRC_PFX, strlen(CRC_PFX)) == 0) {
Nicholas Piggind8c1eb82016-11-24 03:41:42 +1100622 is_crc = true;
Andi Kleenb5064652013-11-12 15:08:38 -0800623 crc = (unsigned int) sym->st_value;
624 sym_update_crc(symname + strlen(CRC_PFX), mod, crc,
625 export);
626 }
627
Linus Torvalds1da177e2005-04-16 15:20:36 -0700628 switch (sym->st_shndx) {
629 case SHN_COMMON:
Andi Kleenef178f92014-02-08 09:01:17 +0100630 if (!strncmp(symname, "__gnu_lto_", sizeof("__gnu_lto_")-1)) {
631 /* Should warn here, but modpost runs before the linker */
632 } else
633 warn("\"%s\" [%s] is COMMON symbol\n", symname, mod->name);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700634 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700635 case SHN_UNDEF:
636 /* undefined symbol */
637 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
638 ELF_ST_BIND(sym->st_info) != STB_WEAK)
639 break;
Sam Ravnborg4d7365d2008-06-12 15:02:55 +0200640 if (ignore_undef_symbol(info, symname))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700641 break;
Ben Colline8d529012005-08-19 13:44:57 -0700642/* cope with newer glibc (2.3.4 or higher) STT_ definition in elf.h */
643#if defined(STT_REGISTER) || defined(STT_SPARC_REGISTER)
644/* add compatibility with older glibc */
645#ifndef STT_SPARC_REGISTER
646#define STT_SPARC_REGISTER STT_REGISTER
647#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700648 if (info->hdr->e_machine == EM_SPARC ||
649 info->hdr->e_machine == EM_SPARCV9) {
650 /* Ignore register directives. */
Ben Colline8d529012005-08-19 13:44:57 -0700651 if (ELF_ST_TYPE(sym->st_info) == STT_SPARC_REGISTER)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700652 break;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100653 if (symname[0] == '.') {
654 char *munged = strdup(symname);
655 munged[0] = '_';
656 munged[1] = toupper(munged[1]);
657 symname = munged;
658 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700659 }
660#endif
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100661
Rusty Russellb92021b2013-03-15 15:04:17 +1030662#ifdef CONFIG_HAVE_UNDERSCORE_SYMBOL_PREFIX
663 if (symname[0] != '_')
664 break;
665 else
666 symname++;
667#endif
Nicholas Piggind8c1eb82016-11-24 03:41:42 +1100668 if (is_crc) {
669 const char *e = is_vmlinux(mod->name) ?"":".ko";
670 warn("EXPORT symbol \"%s\" [%s%s] version generation failed, symbol will not be versioned.\n", symname + strlen(CRC_PFX), mod->name, e);
671 }
Rusty Russellb92021b2013-03-15 15:04:17 +1030672 mod->unres = alloc_symbol(symname,
673 ELF_ST_BIND(sym->st_info) == STB_WEAK,
674 mod->unres);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700675 break;
676 default:
677 /* All exported symbols */
Michal Marek8d995132009-12-12 12:02:24 +0100678 if (strncmp(symname, KSYMTAB_PFX, strlen(KSYMTAB_PFX)) == 0) {
Ram Paibd5cbce2006-06-08 22:12:53 -0700679 sym_add_exported(symname + strlen(KSYMTAB_PFX), mod,
680 export);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700681 }
Rusty Russellb92021b2013-03-15 15:04:17 +1030682 if (strcmp(symname, VMLINUX_SYMBOL_STR(init_module)) == 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700683 mod->has_init = 1;
Rusty Russellb92021b2013-03-15 15:04:17 +1030684 if (strcmp(symname, VMLINUX_SYMBOL_STR(cleanup_module)) == 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700685 mod->has_cleanup = 1;
686 break;
687 }
688}
689
Sam Ravnborg5c3ead82006-01-28 17:19:35 +0100690/**
691 * Parse tag=value strings from .modinfo section
692 **/
Linus Torvalds1da177e2005-04-16 15:20:36 -0700693static char *next_string(char *string, unsigned long *secsize)
694{
695 /* Skip non-zero chars */
696 while (string[0]) {
697 string++;
698 if ((*secsize)-- <= 1)
699 return NULL;
700 }
701
702 /* Skip any zero padding. */
703 while (!string[0]) {
704 string++;
705 if ((*secsize)-- <= 1)
706 return NULL;
707 }
708 return string;
709}
710
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200711static char *get_next_modinfo(void *modinfo, unsigned long modinfo_len,
712 const char *tag, char *info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700713{
714 char *p;
715 unsigned int taglen = strlen(tag);
716 unsigned long size = modinfo_len;
717
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200718 if (info) {
719 size -= info - (char *)modinfo;
720 modinfo = next_string(info, &size);
721 }
722
Linus Torvalds1da177e2005-04-16 15:20:36 -0700723 for (p = modinfo; p; p = next_string(p, &size)) {
724 if (strncmp(p, tag, taglen) == 0 && p[taglen] == '=')
725 return p + taglen + 1;
726 }
727 return NULL;
728}
729
Sam Ravnborgb817f6f2006-06-09 21:53:55 +0200730static char *get_modinfo(void *modinfo, unsigned long modinfo_len,
731 const char *tag)
732
733{
734 return get_next_modinfo(modinfo, modinfo_len, tag, NULL);
735}
736
Sam Ravnborg93684d32006-02-19 11:53:35 +0100737/**
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100738 * Test if string s ends in string sub
739 * return 0 if match
740 **/
741static int strrcmp(const char *s, const char *sub)
742{
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100743 int slen, sublen;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100744
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100745 if (!s || !sub)
746 return 1;
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100747
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100748 slen = strlen(s);
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100749 sublen = strlen(sub);
Sam Ravnborg62070fa2006-03-03 16:46:04 +0100750
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100751 if ((slen == 0) || (sublen == 0))
752 return 1;
753
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100754 if (sublen > slen)
755 return 1;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100756
Sam Ravnborgdf578e72008-01-11 19:17:15 +0100757 return memcmp(s + slen - sublen, sub, sublen);
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +0100758}
759
Sam Ravnborgff13f922008-01-23 19:54:27 +0100760static const char *sym_name(struct elf_info *elf, Elf_Sym *sym)
761{
Sam Ravnborg58fb0d42008-01-23 21:13:50 +0100762 if (sym)
763 return elf->strtab + sym->st_name;
764 else
Sam Ravnborgf6667512008-02-06 21:51:18 +0100765 return "(unknown)";
Sam Ravnborgff13f922008-01-23 19:54:27 +0100766}
767
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200768static const char *sec_name(struct elf_info *elf, int secindex)
Sam Ravnborgff13f922008-01-23 19:54:27 +0100769{
770 Elf_Shdr *sechdrs = elf->sechdrs;
771 return (void *)elf->hdr +
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200772 elf->sechdrs[elf->secindex_strings].sh_offset +
773 sechdrs[secindex].sh_name;
Sam Ravnborgff13f922008-01-23 19:54:27 +0100774}
775
776static const char *sech_name(struct elf_info *elf, Elf_Shdr *sechdr)
777{
778 return (void *)elf->hdr +
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +0200779 elf->sechdrs[elf->secindex_strings].sh_offset +
780 sechdr->sh_name;
Sam Ravnborgff13f922008-01-23 19:54:27 +0100781}
782
Sam Ravnborg10668222008-01-13 22:21:31 +0100783/* The pattern is an array of simple patterns.
784 * "foo" will match an exact string equal to "foo"
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100785 * "*foo" will match a string that ends with "foo"
Sam Ravnborg10668222008-01-13 22:21:31 +0100786 * "foo*" will match a string that begins with "foo"
Paul Gortmaker09c20c02015-04-20 10:20:26 +0930787 * "*foo*" will match a string that contains "foo"
Sam Ravnborg10668222008-01-13 22:21:31 +0100788 */
Trevor Keith5c725132009-09-22 16:43:38 -0700789static int match(const char *sym, const char * const pat[])
Sam Ravnborg10668222008-01-13 22:21:31 +0100790{
791 const char *p;
792 while (*pat) {
793 p = *pat++;
794 const char *endp = p + strlen(p) - 1;
795
Paul Gortmaker09c20c02015-04-20 10:20:26 +0930796 /* "*foo*" */
797 if (*p == '*' && *endp == '*') {
798 char *here, *bare = strndup(p + 1, strlen(p) - 2);
799
800 here = strstr(sym, bare);
801 free(bare);
802 if (here != NULL)
803 return 1;
804 }
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100805 /* "*foo" */
Paul Gortmaker09c20c02015-04-20 10:20:26 +0930806 else if (*p == '*') {
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100807 if (strrcmp(sym, p + 1) == 0)
808 return 1;
809 }
Sam Ravnborg10668222008-01-13 22:21:31 +0100810 /* "foo*" */
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100811 else if (*endp == '*') {
Sam Ravnborg10668222008-01-13 22:21:31 +0100812 if (strncmp(sym, p, strlen(p) - 1) == 0)
813 return 1;
814 }
Sam Ravnborg10668222008-01-13 22:21:31 +0100815 /* no wildcards */
816 else {
817 if (strcmp(p, sym) == 0)
818 return 1;
819 }
820 }
821 /* no match */
822 return 0;
823}
824
Sam Ravnborg10668222008-01-13 22:21:31 +0100825/* sections that we do not want to do full section mismatch check on */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930826static const char *const section_white_list[] =
Sam Ravnborg4391ed62009-05-04 13:05:26 +0200827{
828 ".comment*",
829 ".debug*",
Chen Gang4d10c222013-08-20 15:33:19 +0930830 ".cranges", /* sh64 */
H.J. Lu11215842010-12-15 17:11:22 -0800831 ".zdebug*", /* Compressed debug sections. */
David Howells019fca82010-08-12 16:54:47 +0100832 ".GCC-command-line", /* mn10300 */
Jonathan Kliegman76b27642012-10-04 16:32:19 -0400833 ".GCC.command.line", /* record-gcc-switches, non mn10300 */
Sam Ravnborg4391ed62009-05-04 13:05:26 +0200834 ".mdebug*", /* alpha, score, mips etc. */
835 ".pdr", /* alpha, score, mips etc. */
836 ".stab*",
837 ".note*",
838 ".got*",
839 ".toc*",
Max Filippovaf42e972012-09-17 05:44:38 +0400840 ".xt.prop", /* xtensa */
841 ".xt.lit", /* xtensa */
Vineet Guptaf2e207f2013-01-21 17:18:57 +1030842 ".arcextmap*", /* arc */
843 ".gnu.linkonce.arcext*", /* arc : modules */
Noam Camusd1189c62015-10-26 19:51:46 +1030844 ".cmem*", /* EZchip */
845 ".fmt_slot*", /* EZchip */
Andi Kleenef178f92014-02-08 09:01:17 +0100846 ".gnu.lto*",
Sam Ravnborg4391ed62009-05-04 13:05:26 +0200847 NULL
848};
Sam Ravnborg10668222008-01-13 22:21:31 +0100849
Sam Ravnborge241a632008-01-28 20:13:13 +0100850/*
Anders Kaseorgb614a692009-04-23 16:49:33 -0400851 * This is used to find sections missing the SHF_ALLOC flag.
Sam Ravnborge241a632008-01-28 20:13:13 +0100852 * The cause of this is often a section specified in assembler
Anders Kaseorgb614a692009-04-23 16:49:33 -0400853 * without "ax" / "aw".
Sam Ravnborge241a632008-01-28 20:13:13 +0100854 */
Anders Kaseorgb614a692009-04-23 16:49:33 -0400855static void check_section(const char *modname, struct elf_info *elf,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +0900856 Elf_Shdr *sechdr)
Sam Ravnborge241a632008-01-28 20:13:13 +0100857{
Anders Kaseorgb614a692009-04-23 16:49:33 -0400858 const char *sec = sech_name(elf, sechdr);
Sam Ravnborge241a632008-01-28 20:13:13 +0100859
Anders Kaseorgb614a692009-04-23 16:49:33 -0400860 if (sechdr->sh_type == SHT_PROGBITS &&
861 !(sechdr->sh_flags & SHF_ALLOC) &&
862 !match(sec, section_white_list)) {
863 warn("%s (%s): unexpected non-allocatable section.\n"
864 "Did you forget to use \"ax\"/\"aw\" in a .S file?\n"
865 "Note that for example <linux/init.h> contains\n"
866 "section definitions for use in .S files.\n\n",
867 modname, sec);
Sam Ravnborge241a632008-01-28 20:13:13 +0100868 }
Sam Ravnborge241a632008-01-28 20:13:13 +0100869}
870
871
872
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100873#define ALL_INIT_DATA_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930874 ".init.setup", ".init.rodata", ".meminit.rodata", \
875 ".init.data", ".meminit.data"
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100876#define ALL_EXIT_DATA_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930877 ".exit.data", ".memexit.data"
Sam Ravnborg10668222008-01-13 22:21:31 +0100878
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100879#define ALL_INIT_TEXT_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930880 ".init.text", ".meminit.text"
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100881#define ALL_EXIT_TEXT_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930882 ".exit.text", ".memexit.text"
Sam Ravnborg10668222008-01-13 22:21:31 +0100883
Sebastian Andrzej Siewiorbb15d8d2012-06-03 20:48:17 +0200884#define ALL_PCI_INIT_SECTIONS \
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930885 ".pci_fixup_early", ".pci_fixup_header", ".pci_fixup_final", \
886 ".pci_fixup_enable", ".pci_fixup_resume", \
887 ".pci_fixup_resume_early", ".pci_fixup_suspend"
Sebastian Andrzej Siewiorbb15d8d2012-06-03 20:48:17 +0200888
Paul Gortmakere24f6622013-06-19 19:30:48 -0400889#define ALL_XXXINIT_SECTIONS MEM_INIT_SECTIONS
890#define ALL_XXXEXIT_SECTIONS MEM_EXIT_SECTIONS
Uwe Kleine-König4a31a222010-01-29 12:04:26 +0100891
892#define ALL_INIT_SECTIONS INIT_SECTIONS, ALL_XXXINIT_SECTIONS
893#define ALL_EXIT_SECTIONS EXIT_SECTIONS, ALL_XXXEXIT_SECTIONS
Sam Ravnborg10668222008-01-13 22:21:31 +0100894
Rasmus Villemoesa0d8f802014-07-27 07:28:01 +0930895#define DATA_SECTIONS ".data", ".data.rel"
Quentin Casasnovas157d1972015-04-13 20:42:52 +0930896#define TEXT_SECTIONS ".text", ".text.unlikely", ".sched.text", \
Chris Metcalf6727ad92016-10-07 17:02:55 -0700897 ".kprobes.text", ".cpuidle.text"
Quentin Casasnovas52dc0592015-04-13 20:52:53 +0930898#define OTHER_TEXT_SECTIONS ".ref.text", ".head.text", ".spinlock.text", \
Chris Metcalf673c2c32015-07-08 17:07:41 -0400899 ".fixup", ".entry.text", ".exception.text", ".text.*", \
900 ".coldtext"
Sam Ravnborg10668222008-01-13 22:21:31 +0100901
Jan Beulichfd6c3a82009-03-12 10:58:33 +0000902#define INIT_SECTIONS ".init.*"
Jan Beulichfd6c3a82009-03-12 10:58:33 +0000903#define MEM_INIT_SECTIONS ".meminit.*"
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100904
Jan Beulichfd6c3a82009-03-12 10:58:33 +0000905#define EXIT_SECTIONS ".exit.*"
Jan Beulichfd6c3a82009-03-12 10:58:33 +0000906#define MEM_EXIT_SECTIONS ".memexit.*"
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100907
Quentin Casasnovas52dc0592015-04-13 20:52:53 +0930908#define ALL_TEXT_SECTIONS ALL_INIT_TEXT_SECTIONS, ALL_EXIT_TEXT_SECTIONS, \
909 TEXT_SECTIONS, OTHER_TEXT_SECTIONS
910
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100911/* init data sections */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930912static const char *const init_data_sections[] =
913 { ALL_INIT_DATA_SECTIONS, NULL };
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100914
915/* all init sections */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930916static const char *const init_sections[] = { ALL_INIT_SECTIONS, NULL };
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100917
918/* All init and exit sections (code + data) */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930919static const char *const init_exit_sections[] =
Sam Ravnborgeb8f6892008-01-20 20:07:28 +0100920 {ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS, NULL };
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100921
Paul Gortmaker4a3893d2015-04-20 10:20:40 +0930922/* all text sections */
923static const char *const text_sections[] = { ALL_TEXT_SECTIONS, NULL };
924
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100925/* data section */
Mathias Krause7a3ee752014-08-27 20:28:53 +0930926static const char *const data_sections[] = { DATA_SECTIONS, NULL };
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100927
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100928
929/* symbols in .data that may refer to init/exit sections */
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100930#define DEFAULT_SYMBOL_WHITE_LIST \
931 "*driver", \
932 "*_template", /* scsi uses *_template a lot */ \
933 "*_timer", /* arm uses ops structures named _timer a lot */ \
934 "*_sht", /* scsi also used *_sht to some extent */ \
935 "*_ops", \
936 "*_probe", \
937 "*_probe_one", \
938 "*_console"
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100939
Mathias Krause7a3ee752014-08-27 20:28:53 +0930940static const char *const head_sections[] = { ".head.text*", NULL };
941static const char *const linker_symbols[] =
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100942 { "__init_begin", "_sinittext", "_einittext", NULL };
Paul Gortmaker4a3893d2015-04-20 10:20:40 +0930943static const char *const optim_symbols[] = { "*.constprop.*", NULL };
Sam Ravnborg6c5bd232008-01-20 10:43:27 +0100944
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100945enum mismatch {
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +0100946 TEXT_TO_ANY_INIT,
947 DATA_TO_ANY_INIT,
948 TEXT_TO_ANY_EXIT,
949 DATA_TO_ANY_EXIT,
950 XXXINIT_TO_SOME_INIT,
951 XXXEXIT_TO_SOME_EXIT,
952 ANY_INIT_TO_ANY_EXIT,
953 ANY_EXIT_TO_ANY_INIT,
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100954 EXPORT_TO_INIT_EXIT,
Quentin Casasnovas52dc0592015-04-13 20:52:53 +0930955 EXTABLE_TO_NON_TEXT,
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100956};
957
Quentin Casasnovase5d8f592015-04-13 20:55:15 +0930958/**
959 * Describe how to match sections on different criterias:
960 *
961 * @fromsec: Array of sections to be matched.
962 *
963 * @bad_tosec: Relocations applied to a section in @fromsec to a section in
964 * this array is forbidden (black-list). Can be empty.
965 *
966 * @good_tosec: Relocations applied to a section in @fromsec must be
967 * targetting sections in this array (white-list). Can be empty.
968 *
969 * @mismatch: Type of mismatch.
970 *
971 * @symbol_white_list: Do not match a relocation to a symbol in this list
972 * even if it is targetting a section in @bad_to_sec.
973 *
974 * @handler: Specific handler to call when a match is found. If NULL,
975 * default_mismatch_handler() will be called.
976 *
977 */
Sam Ravnborg10668222008-01-13 22:21:31 +0100978struct sectioncheck {
979 const char *fromsec[20];
Quentin Casasnovas050e57f2015-04-13 20:41:04 +0930980 const char *bad_tosec[20];
981 const char *good_tosec[20];
Sam Ravnborg588ccd72008-01-24 21:12:37 +0100982 enum mismatch mismatch;
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +0100983 const char *symbol_white_list[20];
Quentin Casasnovas644e8f12015-04-13 20:43:17 +0930984 void (*handler)(const char *modname, struct elf_info *elf,
985 const struct sectioncheck* const mismatch,
986 Elf_Rela *r, Elf_Sym *sym, const char *fromsec);
987
Sam Ravnborg10668222008-01-13 22:21:31 +0100988};
989
Quentin Casasnovas52dc0592015-04-13 20:52:53 +0930990static void extable_mismatch_handler(const char *modname, struct elf_info *elf,
991 const struct sectioncheck* const mismatch,
992 Elf_Rela *r, Elf_Sym *sym,
993 const char *fromsec);
994
Mathias Krause7a3ee752014-08-27 20:28:53 +0930995static const struct sectioncheck sectioncheck[] = {
Sam Ravnborg10668222008-01-13 22:21:31 +0100996/* Do not reference init/exit code/data from
997 * normal code and data
998 */
999{
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001000 .fromsec = { TEXT_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301001 .bad_tosec = { ALL_INIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001002 .mismatch = TEXT_TO_ANY_INIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001003 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001004},
1005{
1006 .fromsec = { DATA_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301007 .bad_tosec = { ALL_XXXINIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001008 .mismatch = DATA_TO_ANY_INIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001009 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001010},
1011{
Uwe Kleine-König0db252452010-01-30 21:14:23 +01001012 .fromsec = { DATA_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301013 .bad_tosec = { INIT_SECTIONS, NULL },
Uwe Kleine-König0db252452010-01-30 21:14:23 +01001014 .mismatch = DATA_TO_ANY_INIT,
1015 .symbol_white_list = {
1016 "*_template", "*_timer", "*_sht", "*_ops",
1017 "*_probe", "*_probe_one", "*_console", NULL
1018 },
1019},
1020{
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001021 .fromsec = { TEXT_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301022 .bad_tosec = { ALL_EXIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001023 .mismatch = TEXT_TO_ANY_EXIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001024 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001025},
1026{
1027 .fromsec = { DATA_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301028 .bad_tosec = { ALL_EXIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001029 .mismatch = DATA_TO_ANY_EXIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001030 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborgeb8f6892008-01-20 20:07:28 +01001031},
Paul Gortmakere24f6622013-06-19 19:30:48 -04001032/* Do not reference init code/data from meminit code/data */
Sam Ravnborgeb8f6892008-01-20 20:07:28 +01001033{
Uwe Kleine-König4a31a222010-01-29 12:04:26 +01001034 .fromsec = { ALL_XXXINIT_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301035 .bad_tosec = { INIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001036 .mismatch = XXXINIT_TO_SOME_INIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001037 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborgeb8f6892008-01-20 20:07:28 +01001038},
Paul Gortmakere24f6622013-06-19 19:30:48 -04001039/* Do not reference exit code/data from memexit code/data */
Sam Ravnborgeb8f6892008-01-20 20:07:28 +01001040{
Uwe Kleine-König4a31a222010-01-29 12:04:26 +01001041 .fromsec = { ALL_XXXEXIT_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301042 .bad_tosec = { EXIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001043 .mismatch = XXXEXIT_TO_SOME_EXIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001044 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg10668222008-01-13 22:21:31 +01001045},
1046/* Do not use exit code/data from init code */
1047{
Sam Ravnborgeb8f6892008-01-20 20:07:28 +01001048 .fromsec = { ALL_INIT_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301049 .bad_tosec = { ALL_EXIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001050 .mismatch = ANY_INIT_TO_ANY_EXIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001051 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg10668222008-01-13 22:21:31 +01001052},
1053/* Do not use init code/data from exit code */
1054{
Sam Ravnborgeb8f6892008-01-20 20:07:28 +01001055 .fromsec = { ALL_EXIT_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301056 .bad_tosec = { ALL_INIT_SECTIONS, NULL },
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001057 .mismatch = ANY_EXIT_TO_ANY_INIT,
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001058 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Sam Ravnborg10668222008-01-13 22:21:31 +01001059},
Sebastian Andrzej Siewiorbb15d8d2012-06-03 20:48:17 +02001060{
1061 .fromsec = { ALL_PCI_INIT_SECTIONS, NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301062 .bad_tosec = { INIT_SECTIONS, NULL },
Sebastian Andrzej Siewiorbb15d8d2012-06-03 20:48:17 +02001063 .mismatch = ANY_INIT_TO_ANY_EXIT,
1064 .symbol_white_list = { NULL },
1065},
Sam Ravnborg10668222008-01-13 22:21:31 +01001066/* Do not export init/exit functions or data */
1067{
1068 .fromsec = { "__ksymtab*", NULL },
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301069 .bad_tosec = { INIT_SECTIONS, EXIT_SECTIONS, NULL },
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001070 .mismatch = EXPORT_TO_INIT_EXIT,
1071 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
Quentin Casasnovas52dc0592015-04-13 20:52:53 +09301072},
1073{
1074 .fromsec = { "__ex_table", NULL },
1075 /* If you're adding any new black-listed sections in here, consider
1076 * adding a special 'printer' for them in scripts/check_extable.
1077 */
1078 .bad_tosec = { ".altinstr_replacement", NULL },
1079 .good_tosec = {ALL_TEXT_SECTIONS , NULL},
1080 .mismatch = EXTABLE_TO_NON_TEXT,
1081 .handler = extable_mismatch_handler,
Sam Ravnborg10668222008-01-13 22:21:31 +01001082}
1083};
1084
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001085static const struct sectioncheck *section_mismatch(
1086 const char *fromsec, const char *tosec)
Sam Ravnborg10668222008-01-13 22:21:31 +01001087{
1088 int i;
1089 int elems = sizeof(sectioncheck) / sizeof(struct sectioncheck);
1090 const struct sectioncheck *check = &sectioncheck[0];
1091
Quentin Casasnovasc5c34392015-04-16 13:16:41 +09301092 /*
1093 * The target section could be the SHT_NUL section when we're
1094 * handling relocations to un-resolved symbols, trying to match it
1095 * doesn't make much sense and causes build failures on parisc and
1096 * mn10300 architectures.
1097 */
1098 if (*tosec == '\0')
1099 return NULL;
1100
Sam Ravnborg10668222008-01-13 22:21:31 +01001101 for (i = 0; i < elems; i++) {
Quentin Casasnovas050e57f2015-04-13 20:41:04 +09301102 if (match(fromsec, check->fromsec)) {
1103 if (check->bad_tosec[0] && match(tosec, check->bad_tosec))
1104 return check;
1105 if (check->good_tosec[0] && !match(tosec, check->good_tosec))
1106 return check;
1107 }
Sam Ravnborg10668222008-01-13 22:21:31 +01001108 check++;
1109 }
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001110 return NULL;
Sam Ravnborg10668222008-01-13 22:21:31 +01001111}
1112
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001113/**
1114 * Whitelist to allow certain references to pass with no warning.
Sam Ravnborg0e0d3142007-05-17 20:14:48 +02001115 *
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001116 * Pattern 1:
1117 * If a module parameter is declared __initdata and permissions=0
1118 * then this is legal despite the warning generated.
1119 * We cannot see value of permissions here, so just ignore
1120 * this pattern.
1121 * The pattern is identified by:
1122 * tosec = .init.data
Sam Ravnborg9209aed2006-03-05 00:16:26 +01001123 * fromsec = .data*
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001124 * atsym =__param*
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001125 *
Rusty Russell6a841522010-08-11 23:04:16 -06001126 * Pattern 1a:
1127 * module_param_call() ops can refer to __init set function if permissions=0
1128 * The pattern is identified by:
1129 * tosec = .init.text
1130 * fromsec = .data*
1131 * atsym = __param_ops_*
1132 *
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001133 * Pattern 2:
Randy Dunlap72ee59b2006-04-15 11:17:12 -07001134 * Many drivers utilise a *driver container with references to
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001135 * add, remove, probe functions etc.
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001136 * the pattern is identified by:
Sam Ravnborg83cda2b2007-07-25 21:52:31 +02001137 * tosec = init or exit section
1138 * fromsec = data section
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001139 * atsym = *driver, *_template, *_sht, *_ops, *_probe,
1140 * *probe_one, *_console, *_timer
Vivek Goyalee6a8542007-01-11 01:52:44 +01001141 *
1142 * Pattern 3:
Sam Ravnborgc9939712009-04-26 11:17:42 +02001143 * Whitelist all references from .head.text to any init section
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001144 *
Sam Ravnborg1d8af552007-06-03 00:41:22 +02001145 * Pattern 4:
Vivek Goyalee6a8542007-01-11 01:52:44 +01001146 * Some symbols belong to init section but still it is ok to reference
1147 * these from non-init sections as these symbols don't have any memory
1148 * allocated for them and symbol address and value are same. So even
1149 * if init section is freed, its ok to reference those symbols.
1150 * For ex. symbols marking the init section boundaries.
1151 * This pattern is identified by
1152 * refsymname = __init_begin, _sinittext, _einittext
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001153 *
Paul Gortmaker4a3893d2015-04-20 10:20:40 +09301154 * Pattern 5:
1155 * GCC may optimize static inlines when fed constant arg(s) resulting
1156 * in functions like cpumask_empty() -- generating an associated symbol
1157 * cpumask_empty.constprop.3 that appears in the audit. If the const that
1158 * is passed in comes from __init, like say nmi_ipi_mask, we get a
1159 * meaningless section warning. May need to add isra symbols too...
1160 * This pattern is identified by
1161 * tosec = init section
1162 * fromsec = text section
1163 * refsymname = *.constprop.*
1164 *
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001165 **/
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001166static int secref_whitelist(const struct sectioncheck *mismatch,
1167 const char *fromsec, const char *fromsym,
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001168 const char *tosec, const char *tosym)
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001169{
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001170 /* Check for pattern 1 */
Sam Ravnborg6c5bd232008-01-20 10:43:27 +01001171 if (match(tosec, init_data_sections) &&
1172 match(fromsec, data_sections) &&
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001173 (strncmp(fromsym, "__param", strlen("__param")) == 0))
1174 return 0;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001175
Rusty Russell6a841522010-08-11 23:04:16 -06001176 /* Check for pattern 1a */
1177 if (strcmp(tosec, ".init.text") == 0 &&
1178 match(fromsec, data_sections) &&
1179 (strncmp(fromsym, "__param_ops_", strlen("__param_ops_")) == 0))
1180 return 0;
1181
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001182 /* Check for pattern 2 */
Sam Ravnborg6c5bd232008-01-20 10:43:27 +01001183 if (match(tosec, init_exit_sections) &&
1184 match(fromsec, data_sections) &&
Uwe Kleine-Königaf92a822010-01-30 20:52:50 +01001185 match(fromsym, mismatch->symbol_white_list))
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001186 return 0;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001187
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001188 /* Check for pattern 3 */
Sam Ravnborg6c5bd232008-01-20 10:43:27 +01001189 if (match(fromsec, head_sections) &&
1190 match(tosec, init_sections))
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001191 return 0;
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001192
Sam Ravnborg1d8af552007-06-03 00:41:22 +02001193 /* Check for pattern 4 */
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001194 if (match(tosym, linker_symbols))
1195 return 0;
Sam Ravnborg9bf8cb92007-02-26 17:49:06 +01001196
Paul Gortmaker4a3893d2015-04-20 10:20:40 +09301197 /* Check for pattern 5 */
1198 if (match(fromsec, text_sections) &&
1199 match(tosec, init_sections) &&
1200 match(fromsym, optim_symbols))
1201 return 0;
1202
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001203 return 1;
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001204}
1205
1206/**
Sam Ravnborg93684d32006-02-19 11:53:35 +01001207 * Find symbol based on relocation record info.
1208 * In some cases the symbol supplied is a valid symbol so
1209 * return refsym. If st_name != 0 we assume this is a valid symbol.
1210 * In other cases the symbol needs to be looked up in the symbol table
1211 * based on section and address.
1212 * **/
Sam Ravnborg9ad21c32008-01-18 21:04:34 +01001213static Elf_Sym *find_elf_symbol(struct elf_info *elf, Elf64_Sword addr,
Sam Ravnborg93684d32006-02-19 11:53:35 +01001214 Elf_Sym *relsym)
1215{
1216 Elf_Sym *sym;
Sam Ravnborg9ad21c32008-01-18 21:04:34 +01001217 Elf_Sym *near = NULL;
1218 Elf64_Sword distance = 20;
1219 Elf64_Sword d;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001220 unsigned int relsym_secindex;
Sam Ravnborg93684d32006-02-19 11:53:35 +01001221
1222 if (relsym->st_name != 0)
1223 return relsym;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001224
1225 relsym_secindex = get_secindex(elf, relsym);
Sam Ravnborg93684d32006-02-19 11:53:35 +01001226 for (sym = elf->symtab_start; sym < elf->symtab_stop; sym++) {
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001227 if (get_secindex(elf, sym) != relsym_secindex)
Sam Ravnborg93684d32006-02-19 11:53:35 +01001228 continue;
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001229 if (ELF_ST_TYPE(sym->st_info) == STT_SECTION)
1230 continue;
Sam Ravnborg93684d32006-02-19 11:53:35 +01001231 if (sym->st_value == addr)
1232 return sym;
Sam Ravnborg9ad21c32008-01-18 21:04:34 +01001233 /* Find a symbol nearby - addr are maybe negative */
1234 d = sym->st_value - addr;
1235 if (d < 0)
1236 d = addr - sym->st_value;
1237 if (d < distance) {
1238 distance = d;
1239 near = sym;
1240 }
Sam Ravnborg93684d32006-02-19 11:53:35 +01001241 }
Sam Ravnborg9ad21c32008-01-18 21:04:34 +01001242 /* We need a close match */
1243 if (distance < 20)
1244 return near;
1245 else
1246 return NULL;
Sam Ravnborg93684d32006-02-19 11:53:35 +01001247}
1248
David Brownellda68d612007-02-20 13:58:16 -08001249static inline int is_arm_mapping_symbol(const char *str)
1250{
Kyle McMartin6c34f1f2014-09-16 22:37:18 +01001251 return str[0] == '$' && strchr("axtd", str[1])
David Brownellda68d612007-02-20 13:58:16 -08001252 && (str[2] == '\0' || str[2] == '.');
1253}
1254
1255/*
1256 * If there's no name there, ignore it; likewise, ignore it if it's
1257 * one of the magic symbols emitted used by current ARM tools.
1258 *
1259 * Otherwise if find_symbols_between() returns those symbols, they'll
1260 * fail the whitelist tests and cause lots of false alarms ... fixable
1261 * only by merging __exit and __init sections into __text, bloating
1262 * the kernel (which is especially evil on embedded platforms).
1263 */
1264static inline int is_valid_name(struct elf_info *elf, Elf_Sym *sym)
1265{
1266 const char *name = elf->strtab + sym->st_name;
1267
1268 if (!name || !strlen(name))
1269 return 0;
1270 return !is_arm_mapping_symbol(name);
1271}
1272
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001273/*
Sam Ravnborg43c74d12006-03-05 12:02:46 +01001274 * Find symbols before or equal addr and after addr - in the section sec.
1275 * If we find two symbols with equal offset prefer one with a valid name.
1276 * The ELF format may have a better way to detect what type of symbol
1277 * it is, but this works for now.
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001278 **/
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001279static Elf_Sym *find_elf_symbol2(struct elf_info *elf, Elf_Addr addr,
1280 const char *sec)
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001281{
1282 Elf_Sym *sym;
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001283 Elf_Sym *near = NULL;
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001284 Elf_Addr distance = ~0;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001285
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001286 for (sym = elf->symtab_start; sym < elf->symtab_stop; sym++) {
1287 const char *symsec;
1288
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001289 if (is_shndx_special(sym->st_shndx))
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001290 continue;
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001291 symsec = sec_name(elf, get_secindex(elf, sym));
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001292 if (strcmp(symsec, sec) != 0)
1293 continue;
David Brownellda68d612007-02-20 13:58:16 -08001294 if (!is_valid_name(elf, sym))
1295 continue;
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001296 if (sym->st_value <= addr) {
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001297 if ((addr - sym->st_value) < distance) {
1298 distance = addr - sym->st_value;
1299 near = sym;
1300 } else if ((addr - sym->st_value) == distance) {
1301 near = sym;
Sam Ravnborg43c74d12006-03-05 12:02:46 +01001302 }
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001303 }
1304 }
Sam Ravnborg157c23c2008-01-22 21:44:32 +01001305 return near;
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001306}
1307
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001308/*
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001309 * Convert a section name to the function/data attribute
1310 * .init.text => __init
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001311 * .memexitconst => __memconst
1312 * etc.
Andy Shevchenkocbcf14a92010-08-17 13:36:40 +03001313 *
1314 * The memory of returned value has been allocated on a heap. The user of this
1315 * method should free it after usage.
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001316*/
1317static char *sec2annotation(const char *s)
1318{
1319 if (match(s, init_exit_sections)) {
1320 char *p = malloc(20);
1321 char *r = p;
1322
1323 *p++ = '_';
1324 *p++ = '_';
1325 if (*s == '.')
1326 s++;
1327 while (*s && *s != '.')
1328 *p++ = *s++;
1329 *p = '\0';
1330 if (*s == '.')
1331 s++;
1332 if (strstr(s, "rodata") != NULL)
1333 strcat(p, "const ");
1334 else if (strstr(s, "data") != NULL)
1335 strcat(p, "data ");
1336 else
1337 strcat(p, " ");
Andy Shevchenkocbcf14a92010-08-17 13:36:40 +03001338 return r;
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001339 } else {
Andrew Morton5003bab2010-08-11 00:42:26 -07001340 return strdup("");
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001341 }
1342}
1343
1344static int is_function(Elf_Sym *sym)
1345{
1346 if (sym)
1347 return ELF_ST_TYPE(sym->st_info) == STT_FUNC;
1348 else
Sam Ravnborgf6667512008-02-06 21:51:18 +01001349 return -1;
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001350}
1351
Randy Dunlap00759c02011-03-15 14:13:47 -07001352static void print_section_list(const char * const list[20])
1353{
1354 const char *const *s = list;
1355
1356 while (*s) {
1357 fprintf(stderr, "%s", *s);
1358 s++;
1359 if (*s)
1360 fprintf(stderr, ", ");
1361 }
1362 fprintf(stderr, "\n");
1363}
1364
Quentin Casasnovas356ad532015-04-13 20:43:34 +09301365static inline void get_pretty_name(int is_func, const char** name, const char** name_p)
1366{
1367 switch (is_func) {
1368 case 0: *name = "variable"; *name_p = ""; break;
1369 case 1: *name = "function"; *name_p = "()"; break;
1370 default: *name = "(unknown reference)"; *name_p = ""; break;
1371 }
1372}
1373
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001374/*
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001375 * Print a warning about a section mismatch.
1376 * Try to find symbols near it so user can find it.
Sam Ravnborg4c8fbca2006-02-26 22:18:11 +01001377 * Check whitelist before warning - it may be a false positive.
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001378 */
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001379static void report_sec_mismatch(const char *modname,
1380 const struct sectioncheck *mismatch,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001381 const char *fromsec,
1382 unsigned long long fromaddr,
1383 const char *fromsym,
1384 int from_is_func,
1385 const char *tosec, const char *tosym,
1386 int to_is_func)
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001387{
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001388 const char *from, *from_p;
1389 const char *to, *to_p;
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001390 char *prl_from;
1391 char *prl_to;
Sam Ravnborgf6667512008-02-06 21:51:18 +01001392
Sam Ravnborge5f95c82008-02-02 18:57:18 +01001393 sec_mismatch_count++;
1394 if (!sec_mismatch_verbose)
1395 return;
1396
Quentin Casasnovas356ad532015-04-13 20:43:34 +09301397 get_pretty_name(from_is_func, &from, &from_p);
1398 get_pretty_name(to_is_func, &to, &to_p);
1399
Geert Uytterhoeven7c0ac492008-02-05 11:38:49 +01001400 warn("%s(%s+0x%llx): Section mismatch in reference from the %s %s%s "
1401 "to the %s %s:%s%s\n",
1402 modname, fromsec, fromaddr, from, fromsym, from_p, to, tosec,
1403 tosym, to_p);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001404
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001405 switch (mismatch->mismatch) {
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001406 case TEXT_TO_ANY_INIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001407 prl_from = sec2annotation(fromsec);
1408 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001409 fprintf(stderr,
Sam Ravnborgf6667512008-02-06 21:51:18 +01001410 "The function %s%s() references\n"
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001411 "the %s %s%s%s.\n"
1412 "This is often because %s lacks a %s\n"
1413 "annotation or the annotation of %s is wrong.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001414 prl_from, fromsym,
1415 to, prl_to, tosym, to_p,
1416 fromsym, prl_to, tosym);
1417 free(prl_from);
1418 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001419 break;
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001420 case DATA_TO_ANY_INIT: {
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001421 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001422 fprintf(stderr,
1423 "The variable %s references\n"
1424 "the %s %s%s%s\n"
1425 "If the reference is valid then annotate the\n"
Sam Ravnborg8b8b76c2009-06-06 00:18:05 +02001426 "variable with __init* or __refdata (see linux/init.h) "
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001427 "or name the variable:\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001428 fromsym, to, prl_to, tosym, to_p);
Randy Dunlap00759c02011-03-15 14:13:47 -07001429 print_section_list(mismatch->symbol_white_list);
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001430 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001431 break;
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001432 }
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001433 case TEXT_TO_ANY_EXIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001434 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001435 fprintf(stderr,
1436 "The function %s() references a %s in an exit section.\n"
1437 "Often the %s %s%s has valid usage outside the exit section\n"
1438 "and the fix is to remove the %sannotation of %s.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001439 fromsym, to, to, tosym, to_p, prl_to, tosym);
1440 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001441 break;
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001442 case DATA_TO_ANY_EXIT: {
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001443 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001444 fprintf(stderr,
1445 "The variable %s references\n"
1446 "the %s %s%s%s\n"
1447 "If the reference is valid then annotate the\n"
1448 "variable with __exit* (see linux/init.h) or "
1449 "name the variable:\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001450 fromsym, to, prl_to, tosym, to_p);
Randy Dunlap00759c02011-03-15 14:13:47 -07001451 print_section_list(mismatch->symbol_white_list);
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001452 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001453 break;
1454 }
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001455 case XXXINIT_TO_SOME_INIT:
1456 case XXXEXIT_TO_SOME_EXIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001457 prl_from = sec2annotation(fromsec);
1458 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001459 fprintf(stderr,
1460 "The %s %s%s%s references\n"
1461 "a %s %s%s%s.\n"
1462 "If %s is only used by %s then\n"
1463 "annotate %s with a matching annotation.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001464 from, prl_from, fromsym, from_p,
1465 to, prl_to, tosym, to_p,
Geert Uytterhoevenb1d26752008-02-17 14:12:10 +01001466 tosym, fromsym, tosym);
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001467 free(prl_from);
1468 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001469 break;
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001470 case ANY_INIT_TO_ANY_EXIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001471 prl_from = sec2annotation(fromsec);
1472 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001473 fprintf(stderr,
1474 "The %s %s%s%s references\n"
1475 "a %s %s%s%s.\n"
1476 "This is often seen when error handling "
1477 "in the init function\n"
1478 "uses functionality in the exit path.\n"
1479 "The fix is often to remove the %sannotation of\n"
1480 "%s%s so it may be used outside an exit section.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001481 from, prl_from, fromsym, from_p,
1482 to, prl_to, tosym, to_p,
Andrew Morton5003bab2010-08-11 00:42:26 -07001483 prl_to, tosym, to_p);
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001484 free(prl_from);
1485 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001486 break;
Uwe Kleine-Königbbd3f4f2010-01-30 16:35:47 +01001487 case ANY_EXIT_TO_ANY_INIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001488 prl_from = sec2annotation(fromsec);
1489 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001490 fprintf(stderr,
1491 "The %s %s%s%s references\n"
1492 "a %s %s%s%s.\n"
1493 "This is often seen when error handling "
1494 "in the exit function\n"
1495 "uses functionality in the init path.\n"
1496 "The fix is often to remove the %sannotation of\n"
1497 "%s%s so it may be used outside an init section.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001498 from, prl_from, fromsym, from_p,
1499 to, prl_to, tosym, to_p,
1500 prl_to, tosym, to_p);
1501 free(prl_from);
1502 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001503 break;
1504 case EXPORT_TO_INIT_EXIT:
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001505 prl_to = sec2annotation(tosec);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001506 fprintf(stderr,
1507 "The symbol %s is exported and annotated %s\n"
1508 "Fix this by removing the %sannotation of %s "
1509 "or drop the export.\n",
Alexey Fomenko37ed19d2010-08-09 17:20:24 -07001510 tosym, prl_to, prl_to, tosym);
1511 free(prl_to);
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001512 break;
Quentin Casasnovas52dc0592015-04-13 20:52:53 +09301513 case EXTABLE_TO_NON_TEXT:
1514 fatal("There's a special handler for this mismatch type, "
1515 "we should never get here.");
1516 break;
Sam Ravnborg588ccd72008-01-24 21:12:37 +01001517 }
1518 fprintf(stderr, "\n");
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001519}
1520
Quentin Casasnovas644e8f12015-04-13 20:43:17 +09301521static void default_mismatch_handler(const char *modname, struct elf_info *elf,
1522 const struct sectioncheck* const mismatch,
1523 Elf_Rela *r, Elf_Sym *sym, const char *fromsec)
1524{
1525 const char *tosec;
1526 Elf_Sym *to;
1527 Elf_Sym *from;
1528 const char *tosym;
1529 const char *fromsym;
1530
Quentin Casasnovas644e8f12015-04-13 20:43:17 +09301531 from = find_elf_symbol2(elf, r->r_offset, fromsec);
1532 fromsym = sym_name(elf, from);
Quentin Casasnovas644e8f12015-04-13 20:43:17 +09301533
1534 if (!strncmp(fromsym, "reference___initcall",
1535 sizeof("reference___initcall")-1))
1536 return;
1537
Quentin Casasnovasc7a65e02015-04-13 20:43:45 +09301538 tosec = sec_name(elf, get_secindex(elf, sym));
1539 to = find_elf_symbol(elf, r->r_addend, sym);
1540 tosym = sym_name(elf, to);
1541
Quentin Casasnovas644e8f12015-04-13 20:43:17 +09301542 /* check whitelist - we may ignore it */
1543 if (secref_whitelist(mismatch,
1544 fromsec, fromsym, tosec, tosym)) {
1545 report_sec_mismatch(modname, mismatch,
1546 fromsec, r->r_offset, fromsym,
1547 is_function(from), tosec, tosym,
1548 is_function(to));
1549 }
1550}
1551
Quentin Casasnovas52dc0592015-04-13 20:52:53 +09301552static int is_executable_section(struct elf_info* elf, unsigned int section_index)
1553{
1554 if (section_index > elf->num_sections)
1555 fatal("section_index is outside elf->num_sections!\n");
1556
1557 return ((elf->sechdrs[section_index].sh_flags & SHF_EXECINSTR) == SHF_EXECINSTR);
1558}
1559
1560/*
1561 * We rely on a gross hack in section_rel[a]() calling find_extable_entry_size()
1562 * to know the sizeof(struct exception_table_entry) for the target architecture.
1563 */
1564static unsigned int extable_entry_size = 0;
Quentin Casasnovase84048a2015-04-16 13:05:36 +09301565static void find_extable_entry_size(const char* const sec, const Elf_Rela* r)
Quentin Casasnovas52dc0592015-04-13 20:52:53 +09301566{
1567 /*
1568 * If we're currently checking the second relocation within __ex_table,
1569 * that relocation offset tells us the offsetof(struct
1570 * exception_table_entry, fixup) which is equal to sizeof(struct
1571 * exception_table_entry) divided by two. We use that to our advantage
1572 * since there's no portable way to get that size as every architecture
1573 * seems to go with different sized types. Not pretty but better than
1574 * hard-coding the size for every architecture..
1575 */
Quentin Casasnovase84048a2015-04-16 13:05:36 +09301576 if (!extable_entry_size)
Quentin Casasnovas52dc0592015-04-13 20:52:53 +09301577 extable_entry_size = r->r_offset * 2;
1578}
Quentin Casasnovase84048a2015-04-16 13:05:36 +09301579
Quentin Casasnovas52dc0592015-04-13 20:52:53 +09301580static inline bool is_extable_fault_address(Elf_Rela *r)
1581{
Quentin Casasnovasd3df4de2015-04-16 13:03:32 +09301582 /*
1583 * extable_entry_size is only discovered after we've handled the
1584 * _second_ relocation in __ex_table, so only abort when we're not
1585 * handling the first reloc and extable_entry_size is zero.
1586 */
1587 if (r->r_offset && extable_entry_size == 0)
Quentin Casasnovas52dc0592015-04-13 20:52:53 +09301588 fatal("extable_entry size hasn't been discovered!\n");
1589
1590 return ((r->r_offset == 0) ||
1591 (r->r_offset % extable_entry_size == 0));
1592}
1593
Quentin Casasnovase84048a2015-04-16 13:05:36 +09301594#define is_second_extable_reloc(Start, Cur, Sec) \
1595 (((Cur) == (Start) + 1) && (strcmp("__ex_table", (Sec)) == 0))
1596
Quentin Casasnovas52dc0592015-04-13 20:52:53 +09301597static void report_extable_warnings(const char* modname, struct elf_info* elf,
1598 const struct sectioncheck* const mismatch,
1599 Elf_Rela* r, Elf_Sym* sym,
1600 const char* fromsec, const char* tosec)
1601{
1602 Elf_Sym* fromsym = find_elf_symbol2(elf, r->r_offset, fromsec);
1603 const char* fromsym_name = sym_name(elf, fromsym);
1604 Elf_Sym* tosym = find_elf_symbol(elf, r->r_addend, sym);
1605 const char* tosym_name = sym_name(elf, tosym);
1606 const char* from_pretty_name;
1607 const char* from_pretty_name_p;
1608 const char* to_pretty_name;
1609 const char* to_pretty_name_p;
1610
1611 get_pretty_name(is_function(fromsym),
1612 &from_pretty_name, &from_pretty_name_p);
1613 get_pretty_name(is_function(tosym),
1614 &to_pretty_name, &to_pretty_name_p);
1615
1616 warn("%s(%s+0x%lx): Section mismatch in reference"
1617 " from the %s %s%s to the %s %s:%s%s\n",
1618 modname, fromsec, (long)r->r_offset, from_pretty_name,
1619 fromsym_name, from_pretty_name_p,
1620 to_pretty_name, tosec, tosym_name, to_pretty_name_p);
1621
1622 if (!match(tosec, mismatch->bad_tosec) &&
1623 is_executable_section(elf, get_secindex(elf, sym)))
1624 fprintf(stderr,
1625 "The relocation at %s+0x%lx references\n"
1626 "section \"%s\" which is not in the list of\n"
1627 "authorized sections. If you're adding a new section\n"
1628 "and/or if this reference is valid, add \"%s\" to the\n"
1629 "list of authorized sections to jump to on fault.\n"
1630 "This can be achieved by adding \"%s\" to \n"
1631 "OTHER_TEXT_SECTIONS in scripts/mod/modpost.c.\n",
1632 fromsec, (long)r->r_offset, tosec, tosec, tosec);
1633}
1634
1635static void extable_mismatch_handler(const char* modname, struct elf_info *elf,
1636 const struct sectioncheck* const mismatch,
1637 Elf_Rela* r, Elf_Sym* sym,
1638 const char *fromsec)
1639{
1640 const char* tosec = sec_name(elf, get_secindex(elf, sym));
1641
1642 sec_mismatch_count++;
1643
1644 if (sec_mismatch_verbose)
1645 report_extable_warnings(modname, elf, mismatch, r, sym,
1646 fromsec, tosec);
1647
1648 if (match(tosec, mismatch->bad_tosec))
1649 fatal("The relocation at %s+0x%lx references\n"
1650 "section \"%s\" which is black-listed.\n"
1651 "Something is seriously wrong and should be fixed.\n"
1652 "You might get more information about where this is\n"
1653 "coming from by using scripts/check_extable.sh %s\n",
1654 fromsec, (long)r->r_offset, tosec, modname);
1655 else if (!is_executable_section(elf, get_secindex(elf, sym))) {
1656 if (is_extable_fault_address(r))
1657 fatal("The relocation at %s+0x%lx references\n"
1658 "section \"%s\" which is not executable, IOW\n"
1659 "it is not possible for the kernel to fault\n"
1660 "at that address. Something is seriously wrong\n"
1661 "and should be fixed.\n",
1662 fromsec, (long)r->r_offset, tosec);
1663 else
1664 fatal("The relocation at %s+0x%lx references\n"
1665 "section \"%s\" which is not executable, IOW\n"
1666 "the kernel will fault if it ever tries to\n"
1667 "jump to it. Something is seriously wrong\n"
1668 "and should be fixed.\n",
1669 fromsec, (long)r->r_offset, tosec);
1670 }
1671}
1672
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001673static void check_section_mismatch(const char *modname, struct elf_info *elf,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001674 Elf_Rela *r, Elf_Sym *sym, const char *fromsec)
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001675{
Quentin Casasnovas644e8f12015-04-13 20:43:17 +09301676 const char *tosec = sec_name(elf, get_secindex(elf, sym));;
1677 const struct sectioncheck *mismatch = section_mismatch(fromsec, tosec);
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001678
Uwe Kleine-König0d2a6362010-01-30 16:56:20 +01001679 if (mismatch) {
Quentin Casasnovas644e8f12015-04-13 20:43:17 +09301680 if (mismatch->handler)
1681 mismatch->handler(modname, elf, mismatch,
1682 r, sym, fromsec);
1683 else
1684 default_mismatch_handler(modname, elf, mismatch,
1685 r, sym, fromsec);
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001686 }
1687}
1688
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001689static unsigned int *reloc_location(struct elf_info *elf,
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001690 Elf_Shdr *sechdr, Elf_Rela *r)
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001691{
1692 Elf_Shdr *sechdrs = elf->sechdrs;
Anders Kaseorg68457562011-05-19 16:55:27 -06001693 int section = sechdr->sh_info;
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001694
1695 return (void *)elf->hdr + sechdrs[section].sh_offset +
Olof Johansson731ece42010-12-10 02:09:23 -06001696 r->r_offset;
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001697}
1698
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001699static int addend_386_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001700{
1701 unsigned int r_typ = ELF_R_TYPE(r->r_info);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001702 unsigned int *location = reloc_location(elf, sechdr, r);
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001703
1704 switch (r_typ) {
1705 case R_386_32:
1706 r->r_addend = TO_NATIVE(*location);
1707 break;
1708 case R_386_PC32:
1709 r->r_addend = TO_NATIVE(*location) + 4;
1710 /* For CONFIG_RELOCATABLE=y */
1711 if (elf->hdr->e_type == ET_EXEC)
1712 r->r_addend += r->r_offset;
1713 break;
1714 }
1715 return 0;
1716}
1717
Tony Lindgren6e2e3402012-02-14 21:58:56 +01001718#ifndef R_ARM_CALL
1719#define R_ARM_CALL 28
1720#endif
1721#ifndef R_ARM_JUMP24
1722#define R_ARM_JUMP24 29
1723#endif
1724
David A. Longc9698e52014-02-14 22:41:18 +01001725#ifndef R_ARM_THM_CALL
1726#define R_ARM_THM_CALL 10
1727#endif
1728#ifndef R_ARM_THM_JUMP24
1729#define R_ARM_THM_JUMP24 30
1730#endif
1731#ifndef R_ARM_THM_JUMP19
1732#define R_ARM_THM_JUMP19 51
1733#endif
1734
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001735static int addend_arm_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001736{
1737 unsigned int r_typ = ELF_R_TYPE(r->r_info);
1738
1739 switch (r_typ) {
1740 case R_ARM_ABS32:
1741 /* From ARM ABI: (S + A) | T */
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001742 r->r_addend = (int)(long)
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001743 (elf->symtab_start + ELF_R_SYM(r->r_info));
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001744 break;
1745 case R_ARM_PC24:
Tony Lindgren6e2e3402012-02-14 21:58:56 +01001746 case R_ARM_CALL:
1747 case R_ARM_JUMP24:
David A. Longc9698e52014-02-14 22:41:18 +01001748 case R_ARM_THM_CALL:
1749 case R_ARM_THM_JUMP24:
1750 case R_ARM_THM_JUMP19:
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001751 /* From ARM ABI: ((S + A) | T) - P */
Sam Ravnborgdf578e72008-01-11 19:17:15 +01001752 r->r_addend = (int)(long)(elf->hdr +
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001753 sechdr->sh_offset +
1754 (r->r_offset - sechdr->sh_addr));
Sam Ravnborg56a974f2007-07-16 22:39:35 +02001755 break;
1756 default:
1757 return 1;
1758 }
1759 return 0;
1760}
1761
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001762static int addend_mips_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001763{
1764 unsigned int r_typ = ELF_R_TYPE(r->r_info);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001765 unsigned int *location = reloc_location(elf, sechdr, r);
Atsushi Nemotoae4ac122007-05-22 18:27:39 +09001766 unsigned int inst;
1767
1768 if (r_typ == R_MIPS_HI16)
1769 return 1; /* skip this */
1770 inst = TO_NATIVE(*location);
1771 switch (r_typ) {
1772 case R_MIPS_LO16:
1773 r->r_addend = inst & 0xffff;
1774 break;
1775 case R_MIPS_26:
1776 r->r_addend = (inst & 0x03ffffff) << 2;
1777 break;
1778 case R_MIPS_32:
1779 r->r_addend = inst;
1780 break;
1781 }
1782 return 0;
1783}
1784
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001785static void section_rela(const char *modname, struct elf_info *elf,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001786 Elf_Shdr *sechdr)
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001787{
1788 Elf_Sym *sym;
1789 Elf_Rela *rela;
1790 Elf_Rela r;
1791 unsigned int r_sym;
1792 const char *fromsec;
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001793
Sam Ravnborgff13f922008-01-23 19:54:27 +01001794 Elf_Rela *start = (void *)elf->hdr + sechdr->sh_offset;
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001795 Elf_Rela *stop = (void *)start + sechdr->sh_size;
1796
Sam Ravnborgff13f922008-01-23 19:54:27 +01001797 fromsec = sech_name(elf, sechdr);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001798 fromsec += strlen(".rela");
1799 /* if from section (name) is know good then skip it */
Anders Kaseorgb614a692009-04-23 16:49:33 -04001800 if (match(fromsec, section_white_list))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001801 return;
Sam Ravnborge241a632008-01-28 20:13:13 +01001802
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001803 for (rela = start; rela < stop; rela++) {
1804 r.r_offset = TO_NATIVE(rela->r_offset);
1805#if KERNEL_ELFCLASS == ELFCLASS64
Sam Ravnborgff13f922008-01-23 19:54:27 +01001806 if (elf->hdr->e_machine == EM_MIPS) {
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001807 unsigned int r_typ;
1808 r_sym = ELF64_MIPS_R_SYM(rela->r_info);
1809 r_sym = TO_NATIVE(r_sym);
1810 r_typ = ELF64_MIPS_R_TYPE(rela->r_info);
1811 r.r_info = ELF64_R_INFO(r_sym, r_typ);
1812 } else {
1813 r.r_info = TO_NATIVE(rela->r_info);
1814 r_sym = ELF_R_SYM(r.r_info);
1815 }
1816#else
1817 r.r_info = TO_NATIVE(rela->r_info);
1818 r_sym = ELF_R_SYM(r.r_info);
1819#endif
1820 r.r_addend = TO_NATIVE(rela->r_addend);
1821 sym = elf->symtab_start + r_sym;
1822 /* Skip special sections */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001823 if (is_shndx_special(sym->st_shndx))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001824 continue;
Quentin Casasnovase84048a2015-04-16 13:05:36 +09301825 if (is_second_extable_reloc(start, rela, fromsec))
1826 find_extable_entry_size(fromsec, &r);
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001827 check_section_mismatch(modname, elf, &r, sym, fromsec);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001828 }
1829}
1830
1831static void section_rel(const char *modname, struct elf_info *elf,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001832 Elf_Shdr *sechdr)
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001833{
1834 Elf_Sym *sym;
1835 Elf_Rel *rel;
1836 Elf_Rela r;
1837 unsigned int r_sym;
1838 const char *fromsec;
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001839
Sam Ravnborgff13f922008-01-23 19:54:27 +01001840 Elf_Rel *start = (void *)elf->hdr + sechdr->sh_offset;
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001841 Elf_Rel *stop = (void *)start + sechdr->sh_size;
1842
Sam Ravnborgff13f922008-01-23 19:54:27 +01001843 fromsec = sech_name(elf, sechdr);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001844 fromsec += strlen(".rel");
1845 /* if from section (name) is know good then skip it */
Anders Kaseorgb614a692009-04-23 16:49:33 -04001846 if (match(fromsec, section_white_list))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001847 return;
1848
1849 for (rel = start; rel < stop; rel++) {
1850 r.r_offset = TO_NATIVE(rel->r_offset);
1851#if KERNEL_ELFCLASS == ELFCLASS64
Sam Ravnborgff13f922008-01-23 19:54:27 +01001852 if (elf->hdr->e_machine == EM_MIPS) {
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001853 unsigned int r_typ;
1854 r_sym = ELF64_MIPS_R_SYM(rel->r_info);
1855 r_sym = TO_NATIVE(r_sym);
1856 r_typ = ELF64_MIPS_R_TYPE(rel->r_info);
1857 r.r_info = ELF64_R_INFO(r_sym, r_typ);
1858 } else {
1859 r.r_info = TO_NATIVE(rel->r_info);
1860 r_sym = ELF_R_SYM(r.r_info);
1861 }
1862#else
1863 r.r_info = TO_NATIVE(rel->r_info);
1864 r_sym = ELF_R_SYM(r.r_info);
1865#endif
1866 r.r_addend = 0;
Sam Ravnborgff13f922008-01-23 19:54:27 +01001867 switch (elf->hdr->e_machine) {
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001868 case EM_386:
1869 if (addend_386_rel(elf, sechdr, &r))
1870 continue;
1871 break;
1872 case EM_ARM:
1873 if (addend_arm_rel(elf, sechdr, &r))
1874 continue;
1875 break;
1876 case EM_MIPS:
1877 if (addend_mips_rel(elf, sechdr, &r))
1878 continue;
1879 break;
1880 }
1881 sym = elf->symtab_start + r_sym;
1882 /* Skip special sections */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001883 if (is_shndx_special(sym->st_shndx))
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001884 continue;
Quentin Casasnovase84048a2015-04-16 13:05:36 +09301885 if (is_second_extable_reloc(start, rel, fromsec))
1886 find_extable_entry_size(fromsec, &r);
Sam Ravnborg58fb0d42008-01-23 21:13:50 +01001887 check_section_mismatch(modname, elf, &r, sym, fromsec);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001888 }
1889}
1890
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001891/**
1892 * A module includes a number of sections that are discarded
1893 * either when loaded or when used as built-in.
1894 * For loaded modules all functions marked __init and all data
Uwe Kleine-Königb5950762010-11-01 15:38:34 -04001895 * marked __initdata will be discarded when the module has been initialized.
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001896 * Likewise for modules used built-in the sections marked __exit
1897 * are discarded because __exit marked function are supposed to be called
Ben Dooks32be1d22008-07-29 22:33:44 -07001898 * only when a module is unloaded which never happens for built-in modules.
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001899 * The check_sec_ref() function traverses all relocation records
1900 * to find all references to a section that reference a section that will
1901 * be discarded and warns about it.
1902 **/
1903static void check_sec_ref(struct module *mod, const char *modname,
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09001904 struct elf_info *elf)
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001905{
1906 int i;
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001907 Elf_Shdr *sechdrs = elf->sechdrs;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01001908
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001909 /* Walk through all sections */
Denys Vlasenko1ce53ad2010-07-29 01:47:53 +02001910 for (i = 0; i < elf->num_sections; i++) {
Anders Kaseorgb614a692009-04-23 16:49:33 -04001911 check_section(modname, elf, &elf->sechdrs[i]);
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001912 /* We want to process only relocation sections and not .init */
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001913 if (sechdrs[i].sh_type == SHT_RELA)
Sam Ravnborg10668222008-01-13 22:21:31 +01001914 section_rela(modname, elf, &elf->sechdrs[i]);
Sam Ravnborg5b24c072008-01-18 21:49:29 +01001915 else if (sechdrs[i].sh_type == SHT_REL)
Sam Ravnborg10668222008-01-13 22:21:31 +01001916 section_rel(modname, elf, &elf->sechdrs[i]);
Sam Ravnborgb39927c2006-02-17 22:42:02 +01001917 }
1918}
1919
Andi Kleen7d02b492014-02-08 09:01:12 +01001920static char *remove_dot(char *s)
1921{
Michal Nazarewiczfcd38ed2014-07-27 07:27:01 +09301922 size_t n = strcspn(s, ".");
Andi Kleen7d02b492014-02-08 09:01:12 +01001923
Michal Nazarewiczfcd38ed2014-07-27 07:27:01 +09301924 if (n && s[n]) {
1925 size_t m = strspn(s + n + 1, "0123456789");
1926 if (m && (s[n + m] == '.' || s[n + m] == 0))
Andi Kleen7d02b492014-02-08 09:01:12 +01001927 s[n] = 0;
1928 }
1929 return s;
1930}
1931
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01001932static void read_symbols(char *modname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001933{
1934 const char *symname;
1935 char *version;
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001936 char *license;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001937 struct module *mod;
1938 struct elf_info info = { };
1939 Elf_Sym *sym;
1940
Sam Ravnborg85bd2fd2007-02-26 15:33:52 +01001941 if (!parse_elf(&info, modname))
1942 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001943
1944 mod = new_module(modname);
1945
1946 /* When there's no vmlinux, don't print warnings about
1947 * unresolved symbols (since there'll be too many ;) */
1948 if (is_vmlinux(modname)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001949 have_vmlinux = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001950 mod->skip = 1;
1951 }
1952
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001953 license = get_modinfo(info.modinfo, info.modinfo_len, "license");
Sam Ravnborg2fa36562008-04-26 21:07:26 +02001954 if (info.modinfo && !license && !is_vmlinux(modname))
1955 warn("modpost: missing MODULE_LICENSE() in %s\n"
1956 "see include/linux/module.h for "
1957 "more information\n", modname);
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02001958 while (license) {
1959 if (license_is_gpl_compatible(license))
1960 mod->gpl_compatible = 1;
1961 else {
1962 mod->gpl_compatible = 0;
1963 break;
1964 }
1965 license = get_next_modinfo(info.modinfo, info.modinfo_len,
1966 "license", license);
1967 }
1968
Linus Torvalds1da177e2005-04-16 15:20:36 -07001969 for (sym = info.symtab_start; sym < info.symtab_stop; sym++) {
Andi Kleen7d02b492014-02-08 09:01:12 +01001970 symname = remove_dot(info.strtab + sym->st_name);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001971
1972 handle_modversions(mod, &info, sym, symname);
1973 handle_moddevtable(mod, &info, sym, symname);
1974 }
Sam Ravnborgd1f25e62008-01-17 21:17:42 +01001975 if (!is_vmlinux(modname) ||
Sam Ravnborg10668222008-01-13 22:21:31 +01001976 (is_vmlinux(modname) && vmlinux_section_warnings))
1977 check_sec_ref(mod, modname, &info);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001978
1979 version = get_modinfo(info.modinfo, info.modinfo_len, "version");
1980 if (version)
1981 maybe_frob_rcs_version(modname, version, info.modinfo,
1982 version - (char *)info.hdr);
1983 if (version || (all_versions && !is_vmlinux(modname)))
1984 get_src_version(modname, mod->srcversion,
1985 sizeof(mod->srcversion)-1);
1986
1987 parse_elf_finish(&info);
1988
Rusty Russell8c8ef422009-03-31 13:05:34 -06001989 /* Our trick to get versioning for module struct etc. - it's
Linus Torvalds1da177e2005-04-16 15:20:36 -07001990 * never passed as an argument to an exported function, so
1991 * the automatic versioning doesn't pick it up, but it's really
1992 * important anyhow */
1993 if (modversions)
Rusty Russell8c8ef422009-03-31 13:05:34 -06001994 mod->unres = alloc_symbol("module_layout", 0, mod->unres);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001995}
1996
Rusty Russell712f9b42013-04-04 17:37:38 +10301997static void read_symbols_from_files(const char *filename)
1998{
1999 FILE *in = stdin;
2000 char fname[PATH_MAX];
2001
2002 if (strcmp(filename, "-") != 0) {
2003 in = fopen(filename, "r");
2004 if (!in)
2005 fatal("Can't open filenames file %s: %m", filename);
2006 }
2007
2008 while (fgets(fname, PATH_MAX, in) != NULL) {
2009 if (strends(fname, "\n"))
2010 fname[strlen(fname)-1] = '\0';
2011 read_symbols(fname);
2012 }
2013
2014 if (in != stdin)
2015 fclose(in);
2016}
2017
Linus Torvalds1da177e2005-04-16 15:20:36 -07002018#define SZ 500
2019
2020/* We first write the generated file into memory using the
2021 * following helper, then compare to the file on disk and
2022 * only update the later if anything changed */
2023
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002024void __attribute__((format(printf, 2, 3))) buf_printf(struct buffer *buf,
2025 const char *fmt, ...)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002026{
2027 char tmp[SZ];
2028 int len;
2029 va_list ap;
Sam Ravnborg62070fa2006-03-03 16:46:04 +01002030
Linus Torvalds1da177e2005-04-16 15:20:36 -07002031 va_start(ap, fmt);
2032 len = vsnprintf(tmp, SZ, fmt, ap);
Sam Ravnborg7670f022006-03-16 23:04:08 -08002033 buf_write(buf, tmp, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002034 va_end(ap);
2035}
2036
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002037void buf_write(struct buffer *buf, const char *s, int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002038{
2039 if (buf->size - buf->pos < len) {
Sam Ravnborg7670f022006-03-16 23:04:08 -08002040 buf->size += len + SZ;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002041 buf->p = realloc(buf->p, buf->size);
2042 }
2043 strncpy(buf->p + buf->pos, s, len);
2044 buf->pos += len;
2045}
2046
Sam Ravnborgc96fca22006-07-01 11:44:23 +02002047static void check_for_gpl_usage(enum export exp, const char *m, const char *s)
2048{
2049 const char *e = is_vmlinux(m) ?"":".ko";
2050
2051 switch (exp) {
2052 case export_gpl:
2053 fatal("modpost: GPL-incompatible module %s%s "
2054 "uses GPL-only symbol '%s'\n", m, e, s);
2055 break;
2056 case export_unused_gpl:
2057 fatal("modpost: GPL-incompatible module %s%s "
2058 "uses GPL-only symbol marked UNUSED '%s'\n", m, e, s);
2059 break;
2060 case export_gpl_future:
2061 warn("modpost: GPL-incompatible module %s%s "
2062 "uses future GPL-only symbol '%s'\n", m, e, s);
2063 break;
2064 case export_plain:
2065 case export_unused:
2066 case export_unknown:
2067 /* ignore */
2068 break;
2069 }
2070}
2071
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002072static void check_for_unused(enum export exp, const char *m, const char *s)
Sam Ravnborgc96fca22006-07-01 11:44:23 +02002073{
2074 const char *e = is_vmlinux(m) ?"":".ko";
2075
2076 switch (exp) {
2077 case export_unused:
2078 case export_unused_gpl:
2079 warn("modpost: module %s%s "
2080 "uses symbol '%s' marked UNUSED\n", m, e, s);
2081 break;
2082 default:
2083 /* ignore */
2084 break;
2085 }
2086}
2087
2088static void check_exports(struct module *mod)
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002089{
2090 struct symbol *s, *exp;
2091
2092 for (s = mod->unres; s; s = s->next) {
Andrew Morton6449bd62006-06-09 20:45:06 -07002093 const char *basename;
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002094 exp = find_symbol(s->name);
2095 if (!exp || exp->module == mod)
2096 continue;
Andrew Morton6449bd62006-06-09 20:45:06 -07002097 basename = strrchr(mod->name, '/');
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002098 if (basename)
2099 basename++;
Sam Ravnborgc96fca22006-07-01 11:44:23 +02002100 else
2101 basename = mod->name;
2102 if (!mod->gpl_compatible)
2103 check_for_gpl_usage(exp->export, basename, exp->name);
2104 check_for_unused(exp->export, basename, exp->name);
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002105 }
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002106}
2107
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002108/**
2109 * Header for the generated file
2110 **/
2111static void add_header(struct buffer *b, struct module *mod)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002112{
2113 buf_printf(b, "#include <linux/module.h>\n");
2114 buf_printf(b, "#include <linux/vermagic.h>\n");
2115 buf_printf(b, "#include <linux/compiler.h>\n");
2116 buf_printf(b, "\n");
2117 buf_printf(b, "MODULE_INFO(vermagic, VERMAGIC_STRING);\n");
2118 buf_printf(b, "\n");
Andi Kleene0f244c2013-10-23 10:57:58 +10302119 buf_printf(b, "__visible struct module __this_module\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07002120 buf_printf(b, "__attribute__((section(\".gnu.linkonce.this_module\"))) = {\n");
Greg Kroah-Hartman3c7ec942012-04-25 11:10:15 -07002121 buf_printf(b, "\t.name = KBUILD_MODNAME,\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07002122 if (mod->has_init)
Greg Kroah-Hartman3c7ec942012-04-25 11:10:15 -07002123 buf_printf(b, "\t.init = init_module,\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07002124 if (mod->has_cleanup)
2125 buf_printf(b, "#ifdef CONFIG_MODULE_UNLOAD\n"
Greg Kroah-Hartman3c7ec942012-04-25 11:10:15 -07002126 "\t.exit = cleanup_module,\n"
Linus Torvalds1da177e2005-04-16 15:20:36 -07002127 "#endif\n");
Greg Kroah-Hartman3c7ec942012-04-25 11:10:15 -07002128 buf_printf(b, "\t.arch = MODULE_ARCH_INIT,\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07002129 buf_printf(b, "};\n");
2130}
2131
Ben Hutchings2449b8b2011-10-24 15:12:28 +02002132static void add_intree_flag(struct buffer *b, int is_intree)
2133{
2134 if (is_intree)
2135 buf_printf(b, "\nMODULE_INFO(intree, \"Y\");\n");
2136}
2137
Trevor Keith5c725132009-09-22 16:43:38 -07002138static void add_staging_flag(struct buffer *b, const char *name)
Greg Kroah-Hartmana9860bf2008-09-24 14:46:44 -07002139{
2140 static const char *staging_dir = "drivers/staging";
2141
2142 if (strncmp(staging_dir, name, strlen(staging_dir)) == 0)
2143 buf_printf(b, "\nMODULE_INFO(staging, \"Y\");\n");
2144}
2145
Takashi Iwai5cfb2032015-08-08 15:16:20 +09302146/* In kernel, this size is defined in linux/module.h;
2147 * here we use Elf_Addr instead of long for covering cross-compile
2148 */
2149#define MODULE_NAME_LEN (64 - sizeof(Elf_Addr))
2150
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002151/**
2152 * Record CRCs for unresolved symbols
2153 **/
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002154static int add_versions(struct buffer *b, struct module *mod)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002155{
2156 struct symbol *s, *exp;
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002157 int err = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002158
2159 for (s = mod->unres; s; s = s->next) {
2160 exp = find_symbol(s->name);
2161 if (!exp || exp->module == mod) {
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002162 if (have_vmlinux && !s->weak) {
Matthew Wilcox2a116652006-10-07 05:35:32 -06002163 if (warn_unresolved) {
2164 warn("\"%s\" [%s.ko] undefined!\n",
2165 s->name, mod->name);
2166 } else {
2167 merror("\"%s\" [%s.ko] undefined!\n",
Masahiro Yamadabb66fc62014-06-10 19:08:13 +09002168 s->name, mod->name);
Matthew Wilcox2a116652006-10-07 05:35:32 -06002169 err = 1;
2170 }
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002171 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07002172 continue;
2173 }
2174 s->module = exp->module;
2175 s->crc_valid = exp->crc_valid;
2176 s->crc = exp->crc;
2177 }
2178
2179 if (!modversions)
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002180 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002181
2182 buf_printf(b, "\n");
2183 buf_printf(b, "static const struct modversion_info ____versions[]\n");
Adrian Bunk3ff6eec2008-01-24 22:16:20 +01002184 buf_printf(b, "__used\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07002185 buf_printf(b, "__attribute__((section(\"__versions\"))) = {\n");
2186
2187 for (s = mod->unres; s; s = s->next) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002188 if (!s->module)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002189 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002190 if (!s->crc_valid) {
Sam Ravnborgcb805142006-01-28 16:57:26 +01002191 warn("\"%s\" [%s.ko] has no CRC!\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -07002192 s->name, mod->name);
2193 continue;
2194 }
Takashi Iwai5cfb2032015-08-08 15:16:20 +09302195 if (strlen(s->name) >= MODULE_NAME_LEN) {
2196 merror("too long symbol \"%s\" [%s.ko]\n",
2197 s->name, mod->name);
2198 err = 1;
2199 break;
2200 }
James Hogana53a11f32013-04-29 11:36:59 +09302201 buf_printf(b, "\t{ %#8x, __VMLINUX_SYMBOL_STR(%s) },\n",
James Hogana4b6a772013-03-18 19:38:56 +10302202 s->crc, s->name);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002203 }
2204
2205 buf_printf(b, "};\n");
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002206
2207 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002208}
2209
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002210static void add_depends(struct buffer *b, struct module *mod,
2211 struct module *modules)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002212{
2213 struct symbol *s;
2214 struct module *m;
2215 int first = 1;
2216
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002217 for (m = modules; m; m = m->next)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002218 m->seen = is_vmlinux(m->name);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002219
2220 buf_printf(b, "\n");
2221 buf_printf(b, "static const char __module_depends[]\n");
Adrian Bunk3ff6eec2008-01-24 22:16:20 +01002222 buf_printf(b, "__used\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -07002223 buf_printf(b, "__attribute__((section(\".modinfo\"))) =\n");
2224 buf_printf(b, "\"depends=");
2225 for (s = mod->unres; s; s = s->next) {
Sam Ravnborga61b2df2007-02-26 19:46:52 +01002226 const char *p;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002227 if (!s->module)
2228 continue;
2229
2230 if (s->module->seen)
2231 continue;
2232
2233 s->module->seen = 1;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002234 p = strrchr(s->module->name, '/');
2235 if (p)
Sam Ravnborga61b2df2007-02-26 19:46:52 +01002236 p++;
2237 else
2238 p = s->module->name;
2239 buf_printf(b, "%s%s", first ? "" : ",", p);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002240 first = 0;
2241 }
2242 buf_printf(b, "\";\n");
2243}
2244
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002245static void add_srcversion(struct buffer *b, struct module *mod)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002246{
2247 if (mod->srcversion[0]) {
2248 buf_printf(b, "\n");
2249 buf_printf(b, "MODULE_INFO(srcversion, \"%s\");\n",
2250 mod->srcversion);
2251 }
2252}
2253
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002254static void write_if_changed(struct buffer *b, const char *fname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002255{
2256 char *tmp;
2257 FILE *file;
2258 struct stat st;
2259
2260 file = fopen(fname, "r");
2261 if (!file)
2262 goto write;
2263
2264 if (fstat(fileno(file), &st) < 0)
2265 goto close_write;
2266
2267 if (st.st_size != b->pos)
2268 goto close_write;
2269
2270 tmp = NOFAIL(malloc(b->pos));
2271 if (fread(tmp, 1, b->pos, file) != b->pos)
2272 goto free_write;
2273
2274 if (memcmp(tmp, b->p, b->pos) != 0)
2275 goto free_write;
2276
2277 free(tmp);
2278 fclose(file);
2279 return;
2280
2281 free_write:
2282 free(tmp);
2283 close_write:
2284 fclose(file);
2285 write:
2286 file = fopen(fname, "w");
2287 if (!file) {
2288 perror(fname);
2289 exit(1);
2290 }
2291 if (fwrite(b->p, 1, b->pos, file) != b->pos) {
2292 perror(fname);
2293 exit(1);
2294 }
2295 fclose(file);
2296}
2297
Ram Paibd5cbce2006-06-08 22:12:53 -07002298/* parse Module.symvers file. line format:
Sam Ravnborg534b89a2006-07-01 10:10:19 +02002299 * 0x12345678<tab>symbol<tab>module[[<tab>export]<tab>something]
Ram Paibd5cbce2006-06-08 22:12:53 -07002300 **/
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002301static void read_dump(const char *fname, unsigned int kernel)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002302{
2303 unsigned long size, pos = 0;
2304 void *file = grab_file(fname, &size);
2305 char *line;
2306
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002307 if (!file)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002308 /* No symbol versions, silently ignore */
2309 return;
2310
2311 while ((line = get_next_line(&pos, file, size))) {
Sam Ravnborg534b89a2006-07-01 10:10:19 +02002312 char *symname, *modname, *d, *export, *end;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002313 unsigned int crc;
2314 struct module *mod;
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002315 struct symbol *s;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002316
2317 if (!(symname = strchr(line, '\t')))
2318 goto fail;
2319 *symname++ = '\0';
2320 if (!(modname = strchr(symname, '\t')))
2321 goto fail;
2322 *modname++ = '\0';
Laurent Riffard9ac545b2006-06-11 08:02:06 +02002323 if ((export = strchr(modname, '\t')) != NULL)
Ram Paibd5cbce2006-06-08 22:12:53 -07002324 *export++ = '\0';
Sam Ravnborg534b89a2006-07-01 10:10:19 +02002325 if (export && ((end = strchr(export, '\t')) != NULL))
2326 *end = '\0';
Linus Torvalds1da177e2005-04-16 15:20:36 -07002327 crc = strtoul(line, &d, 16);
2328 if (*symname == '\0' || *modname == '\0' || *d != '\0')
2329 goto fail;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002330 mod = find_module(modname);
2331 if (!mod) {
2332 if (is_vmlinux(modname))
Linus Torvalds1da177e2005-04-16 15:20:36 -07002333 have_vmlinux = 1;
Jan Beulich0fa3a882009-03-12 12:28:30 +00002334 mod = new_module(modname);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002335 mod->skip = 1;
2336 }
Ram Paibd5cbce2006-06-08 22:12:53 -07002337 s = sym_add_exported(symname, mod, export_no(export));
Sam Ravnborg8e70c452006-01-28 22:22:33 +01002338 s->kernel = kernel;
2339 s->preloaded = 1;
Ram Paibd5cbce2006-06-08 22:12:53 -07002340 sym_update_crc(symname, mod, crc, export_no(export));
Linus Torvalds1da177e2005-04-16 15:20:36 -07002341 }
Christian Engelmayer2ee41e62014-04-28 11:34:32 +09302342 release_file(file, size);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002343 return;
2344fail:
Christian Engelmayer2ee41e62014-04-28 11:34:32 +09302345 release_file(file, size);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002346 fatal("parse error in symbol dump file\n");
2347}
2348
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002349/* For normal builds always dump all symbols.
2350 * For external modules only dump symbols
2351 * that are not read from kernel Module.symvers.
2352 **/
2353static int dump_sym(struct symbol *sym)
2354{
2355 if (!external_module)
2356 return 1;
2357 if (sym->vmlinux || sym->kernel)
2358 return 0;
2359 return 1;
2360}
Sam Ravnborg62070fa2006-03-03 16:46:04 +01002361
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002362static void write_dump(const char *fname)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002363{
2364 struct buffer buf = { };
2365 struct symbol *symbol;
2366 int n;
2367
2368 for (n = 0; n < SYMBOL_HASH_SIZE ; n++) {
2369 symbol = symbolhash[n];
2370 while (symbol) {
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002371 if (dump_sym(symbol))
Ram Paibd5cbce2006-06-08 22:12:53 -07002372 buf_printf(&buf, "0x%08x\t%s\t%s\t%s\n",
Sam Ravnborg62070fa2006-03-03 16:46:04 +01002373 symbol->crc, symbol->name,
Ram Paibd5cbce2006-06-08 22:12:53 -07002374 symbol->module->name,
2375 export_str(symbol->export));
Linus Torvalds1da177e2005-04-16 15:20:36 -07002376 symbol = symbol->next;
2377 }
2378 }
2379 write_if_changed(&buf, fname);
Heinrich Schuchardtc7d47f22016-08-02 21:43:01 +02002380 free(buf.p);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002381}
2382
Richard Hacker2d04b5a2008-02-28 09:40:52 +01002383struct ext_sym_list {
2384 struct ext_sym_list *next;
2385 const char *file;
2386};
2387
Sam Ravnborg5c3ead82006-01-28 17:19:35 +01002388int main(int argc, char **argv)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002389{
2390 struct module *mod;
2391 struct buffer buf = { };
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002392 char *kernel_read = NULL, *module_read = NULL;
Rusty Russell712f9b42013-04-04 17:37:38 +10302393 char *dump_write = NULL, *files_source = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002394 int opt;
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002395 int err;
Richard Hacker2d04b5a2008-02-28 09:40:52 +01002396 struct ext_sym_list *extsym_iter;
2397 struct ext_sym_list *extsym_start = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002398
Nicolas Boichat47490ec2015-10-06 09:44:42 +10302399 while ((opt = getopt(argc, argv, "i:I:e:mnsST:o:awM:K:E")) != -1) {
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002400 switch (opt) {
2401 case 'i':
2402 kernel_read = optarg;
2403 break;
2404 case 'I':
2405 module_read = optarg;
2406 external_module = 1;
2407 break;
Richard Hacker2d04b5a2008-02-28 09:40:52 +01002408 case 'e':
2409 external_module = 1;
2410 extsym_iter =
2411 NOFAIL(malloc(sizeof(*extsym_iter)));
2412 extsym_iter->next = extsym_start;
2413 extsym_iter->file = optarg;
2414 extsym_start = extsym_iter;
2415 break;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002416 case 'm':
2417 modversions = 1;
2418 break;
Guenter Roeckeed380f2013-09-23 15:23:54 +09302419 case 'n':
2420 ignore_missing_files = 1;
2421 break;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002422 case 'o':
2423 dump_write = optarg;
2424 break;
2425 case 'a':
2426 all_versions = 1;
2427 break;
2428 case 's':
2429 vmlinux_section_warnings = 0;
2430 break;
Sam Ravnborg588ccd72008-01-24 21:12:37 +01002431 case 'S':
2432 sec_mismatch_verbose = 0;
2433 break;
Rusty Russell712f9b42013-04-04 17:37:38 +10302434 case 'T':
2435 files_source = optarg;
2436 break;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002437 case 'w':
2438 warn_unresolved = 1;
2439 break;
Nicolas Boichat47490ec2015-10-06 09:44:42 +10302440 case 'E':
2441 sec_mismatch_fatal = 1;
2442 break;
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002443 default:
2444 exit(1);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002445 }
2446 }
2447
Sam Ravnborg040fcc82006-01-28 22:15:55 +01002448 if (kernel_read)
2449 read_dump(kernel_read, 1);
2450 if (module_read)
2451 read_dump(module_read, 0);
Richard Hacker2d04b5a2008-02-28 09:40:52 +01002452 while (extsym_start) {
2453 read_dump(extsym_start->file, 0);
2454 extsym_iter = extsym_start->next;
2455 free(extsym_start);
2456 extsym_start = extsym_iter;
2457 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07002458
Sam Ravnborgdf578e72008-01-11 19:17:15 +01002459 while (optind < argc)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002460 read_symbols(argv[optind++]);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002461
Rusty Russell712f9b42013-04-04 17:37:38 +10302462 if (files_source)
2463 read_symbols_from_files(files_source);
2464
Linus Torvalds1da177e2005-04-16 15:20:36 -07002465 for (mod = modules; mod; mod = mod->next) {
2466 if (mod->skip)
2467 continue;
Sam Ravnborgc96fca22006-07-01 11:44:23 +02002468 check_exports(mod);
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002469 }
2470
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002471 err = 0;
2472
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002473 for (mod = modules; mod; mod = mod->next) {
Mathias Kraused93e1712014-08-27 20:28:56 +09302474 char fname[PATH_MAX];
Andi Kleen666ab412007-11-22 03:43:10 +01002475
Sam Ravnborgb817f6f2006-06-09 21:53:55 +02002476 if (mod->skip)
2477 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002478
2479 buf.pos = 0;
2480
2481 add_header(&buf, mod);
Ben Hutchings2449b8b2011-10-24 15:12:28 +02002482 add_intree_flag(&buf, !external_module);
Greg Kroah-Hartmana9860bf2008-09-24 14:46:44 -07002483 add_staging_flag(&buf, mod->name);
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002484 err |= add_versions(&buf, mod);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002485 add_depends(&buf, mod, modules);
2486 add_moddevtable(&buf, mod);
2487 add_srcversion(&buf, mod);
2488
2489 sprintf(fname, "%s.mod.c", mod->name);
2490 write_if_changed(&buf, fname);
2491 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07002492 if (dump_write)
2493 write_dump(dump_write);
Nicolas Boichat47490ec2015-10-06 09:44:42 +10302494 if (sec_mismatch_count) {
2495 if (!sec_mismatch_verbose) {
2496 warn("modpost: Found %d section mismatch(es).\n"
2497 "To see full details build your kernel with:\n"
2498 "'make CONFIG_DEBUG_SECTION_MISMATCH=y'\n",
2499 sec_mismatch_count);
2500 }
2501 if (sec_mismatch_fatal) {
2502 fatal("modpost: Section mismatches detected.\n"
2503 "Set CONFIG_SECTION_MISMATCH_WARN_ONLY=y to allow them.\n");
2504 }
2505 }
Heinrich Schuchardtc7d47f22016-08-02 21:43:01 +02002506 free(buf.p);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002507
Kirill Korotaevc53ddac2006-09-07 13:08:54 -07002508 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002509}