modpost: do not try to match the SHT_NUL section.
[deliverable/linux.git] / scripts / mod / modpost.c
CommitLineData
1da177e4
LT
1/* Postprocess module symbol versions
2 *
3 * Copyright 2003 Kai Germaschewski
4 * Copyright 2002-2004 Rusty Russell, IBM Corporation
df578e7d 5 * Copyright 2006-2008 Sam Ravnborg
1da177e4
LT
6 * Based in part on module-init-tools/depmod.c,file2alias
7 *
8 * This software may be used and distributed according to the terms
9 * of the GNU General Public License, incorporated herein by reference.
10 *
11 * Usage: modpost vmlinux module1.o module2.o ...
12 */
13
b2e3e658
MD
14#define _GNU_SOURCE
15#include <stdio.h>
1da177e4 16#include <ctype.h>
5003bab8 17#include <string.h>
712f9b46 18#include <limits.h>
d4ef1c30 19#include <stdbool.h>
eed380f3 20#include <errno.h>
1da177e4 21#include "modpost.h"
5a865c06 22#include "../../include/generated/autoconf.h"
b817f6fe 23#include "../../include/linux/license.h"
b92021b0 24#include "../../include/linux/export.h"
9e1b9b80 25
1da177e4 26/* Are we using CONFIG_MODVERSIONS? */
7a3ee753 27static int modversions = 0;
1da177e4 28/* Warn about undefined symbols? (do so if we have vmlinux) */
7a3ee753 29static int have_vmlinux = 0;
1da177e4
LT
30/* Is CONFIG_MODULE_SRCVERSION_ALL set? */
31static int all_versions = 0;
040fcc81
SR
32/* If we are modposting external module set to 1 */
33static int external_module = 0;
8d8d8289
SR
34/* Warn about section mismatch in vmlinux if set to 1 */
35static int vmlinux_section_warnings = 1;
c53ddacd
KK
36/* Only warn about unresolved symbols */
37static int warn_unresolved = 0;
bd5cbced 38/* How a symbol is exported */
588ccd73
SR
39static int sec_mismatch_count = 0;
40static int sec_mismatch_verbose = 1;
eed380f3
GR
41/* ignore missing files */
42static int ignore_missing_files;
588ccd73 43
c96fca21
SR
44enum export {
45 export_plain, export_unused, export_gpl,
46 export_unused_gpl, export_gpl_future, export_unknown
47};
1da177e4 48
6d9a89ea
AK
49#define PRINTF __attribute__ ((format (printf, 1, 2)))
50
51PRINTF void fatal(const char *fmt, ...)
1da177e4
LT
52{
53 va_list arglist;
54
55 fprintf(stderr, "FATAL: ");
56
57 va_start(arglist, fmt);
58 vfprintf(stderr, fmt, arglist);
59 va_end(arglist);
60
61 exit(1);
62}
63
6d9a89ea 64PRINTF void warn(const char *fmt, ...)
1da177e4
LT
65{
66 va_list arglist;
67
68 fprintf(stderr, "WARNING: ");
69
70 va_start(arglist, fmt);
71 vfprintf(stderr, fmt, arglist);
72 va_end(arglist);
73}
74
6d9a89ea 75PRINTF void merror(const char *fmt, ...)
2a116659
MW
76{
77 va_list arglist;
78
79 fprintf(stderr, "ERROR: ");
80
81 va_start(arglist, fmt);
82 vfprintf(stderr, fmt, arglist);
83 va_end(arglist);
84}
85
d4ef1c30
RR
86static inline bool strends(const char *str, const char *postfix)
87{
88 if (strlen(str) < strlen(postfix))
89 return false;
90
91 return strcmp(str + strlen(str) - strlen(postfix), postfix) == 0;
92}
93
040fcc81
SR
94static int is_vmlinux(const char *modname)
95{
96 const char *myname;
97
df578e7d
SR
98 myname = strrchr(modname, '/');
99 if (myname)
040fcc81
SR
100 myname++;
101 else
102 myname = modname;
103
741f98fe
SR
104 return (strcmp(myname, "vmlinux") == 0) ||
105 (strcmp(myname, "vmlinux.o") == 0);
040fcc81
SR
106}
107
1da177e4
LT
108void *do_nofail(void *ptr, const char *expr)
109{
df578e7d 110 if (!ptr)
1da177e4 111 fatal("modpost: Memory allocation failure: %s.\n", expr);
df578e7d 112
1da177e4
LT
113 return ptr;
114}
115
116/* A list of all modules we processed */
1da177e4
LT
117static struct module *modules;
118
5c3ead8c 119static struct module *find_module(char *modname)
1da177e4
LT
120{
121 struct module *mod;
122
123 for (mod = modules; mod; mod = mod->next)
124 if (strcmp(mod->name, modname) == 0)
125 break;
126 return mod;
127}
128
d4ef1c30 129static struct module *new_module(const char *modname)
1da177e4
LT
130{
131 struct module *mod;
d4ef1c30 132 char *p;
62070fa4 133
1da177e4
LT
134 mod = NOFAIL(malloc(sizeof(*mod)));
135 memset(mod, 0, sizeof(*mod));
136 p = NOFAIL(strdup(modname));
137
138 /* strip trailing .o */
d4ef1c30
RR
139 if (strends(p, ".o")) {
140 p[strlen(p) - 2] = '\0';
141 mod->is_dot_o = 1;
142 }
1da177e4
LT
143
144 /* add to list */
145 mod->name = p;
b817f6fe 146 mod->gpl_compatible = -1;
1da177e4
LT
147 mod->next = modules;
148 modules = mod;
149
150 return mod;
151}
152
153/* A hash of all exported symbols,
154 * struct symbol is also used for lists of unresolved symbols */
155
156#define SYMBOL_HASH_SIZE 1024
157
158struct symbol {
159 struct symbol *next;
160 struct module *module;
161 unsigned int crc;
162 int crc_valid;
163 unsigned int weak:1;
040fcc81
SR
164 unsigned int vmlinux:1; /* 1 if symbol is defined in vmlinux */
165 unsigned int kernel:1; /* 1 if symbol is from kernel
166 * (only for external modules) **/
b6568b1a 167 unsigned int preloaded:1; /* 1 if symbol from Module.symvers, or crc */
bd5cbced 168 enum export export; /* Type of export */
1da177e4
LT
169 char name[0];
170};
171
172static struct symbol *symbolhash[SYMBOL_HASH_SIZE];
173
174/* This is based on the hash agorithm from gdbm, via tdb */
175static inline unsigned int tdb_hash(const char *name)
176{
177 unsigned value; /* Used to compute the hash value. */
178 unsigned i; /* Used to cycle through random values. */
179
180 /* Set the initial value from the key size. */
df578e7d 181 for (value = 0x238F13AF * strlen(name), i = 0; name[i]; i++)
1da177e4
LT
182 value = (value + (((unsigned char *)name)[i] << (i*5 % 24)));
183
184 return (1103515243 * value + 12345);
185}
186
5c3ead8c
SR
187/**
188 * Allocate a new symbols for use in the hash of exported symbols or
189 * the list of unresolved symbols per module
190 **/
191static struct symbol *alloc_symbol(const char *name, unsigned int weak,
192 struct symbol *next)
1da177e4
LT
193{
194 struct symbol *s = NOFAIL(malloc(sizeof(*s) + strlen(name) + 1));
195
196 memset(s, 0, sizeof(*s));
197 strcpy(s->name, name);
198 s->weak = weak;
199 s->next = next;
200 return s;
201}
202
203/* For the hash of exported symbols */
bd5cbced
RP
204static struct symbol *new_symbol(const char *name, struct module *module,
205 enum export export)
1da177e4
LT
206{
207 unsigned int hash;
208 struct symbol *new;
209
210 hash = tdb_hash(name) % SYMBOL_HASH_SIZE;
211 new = symbolhash[hash] = alloc_symbol(name, 0, symbolhash[hash]);
212 new->module = module;
bd5cbced 213 new->export = export;
040fcc81 214 return new;
1da177e4
LT
215}
216
5c3ead8c 217static struct symbol *find_symbol(const char *name)
1da177e4
LT
218{
219 struct symbol *s;
220
221 /* For our purposes, .foo matches foo. PPC64 needs this. */
222 if (name[0] == '.')
223 name++;
224
df578e7d 225 for (s = symbolhash[tdb_hash(name) % SYMBOL_HASH_SIZE]; s; s = s->next) {
1da177e4
LT
226 if (strcmp(s->name, name) == 0)
227 return s;
228 }
229 return NULL;
230}
231
7a3ee753 232static const struct {
bd5cbced
RP
233 const char *str;
234 enum export export;
235} export_list[] = {
236 { .str = "EXPORT_SYMBOL", .export = export_plain },
c96fca21 237 { .str = "EXPORT_UNUSED_SYMBOL", .export = export_unused },
bd5cbced 238 { .str = "EXPORT_SYMBOL_GPL", .export = export_gpl },
c96fca21 239 { .str = "EXPORT_UNUSED_SYMBOL_GPL", .export = export_unused_gpl },
bd5cbced
RP
240 { .str = "EXPORT_SYMBOL_GPL_FUTURE", .export = export_gpl_future },
241 { .str = "(unknown)", .export = export_unknown },
242};
243
244
245static const char *export_str(enum export ex)
246{
247 return export_list[ex].str;
248}
249
df578e7d 250static enum export export_no(const char *s)
bd5cbced
RP
251{
252 int i;
df578e7d 253
534b89a9
SR
254 if (!s)
255 return export_unknown;
bd5cbced
RP
256 for (i = 0; export_list[i].export != export_unknown; i++) {
257 if (strcmp(export_list[i].str, s) == 0)
258 return export_list[i].export;
259 }
260 return export_unknown;
261}
262
62a26356
AIB
263static const char *sec_name(struct elf_info *elf, int secindex);
264
265#define strstarts(str, prefix) (strncmp(str, prefix, strlen(prefix)) == 0)
266
267static enum export export_from_secname(struct elf_info *elf, unsigned int sec)
268{
269 const char *secname = sec_name(elf, sec);
270
271 if (strstarts(secname, "___ksymtab+"))
272 return export_plain;
273 else if (strstarts(secname, "___ksymtab_unused+"))
274 return export_unused;
275 else if (strstarts(secname, "___ksymtab_gpl+"))
276 return export_gpl;
277 else if (strstarts(secname, "___ksymtab_unused_gpl+"))
278 return export_unused_gpl;
279 else if (strstarts(secname, "___ksymtab_gpl_future+"))
280 return export_gpl_future;
281 else
282 return export_unknown;
283}
284
1ce53adf 285static enum export export_from_sec(struct elf_info *elf, unsigned int sec)
bd5cbced
RP
286{
287 if (sec == elf->export_sec)
288 return export_plain;
c96fca21
SR
289 else if (sec == elf->export_unused_sec)
290 return export_unused;
bd5cbced
RP
291 else if (sec == elf->export_gpl_sec)
292 return export_gpl;
c96fca21
SR
293 else if (sec == elf->export_unused_gpl_sec)
294 return export_unused_gpl;
bd5cbced
RP
295 else if (sec == elf->export_gpl_future_sec)
296 return export_gpl_future;
297 else
298 return export_unknown;
299}
300
5c3ead8c
SR
301/**
302 * Add an exported symbol - it may have already been added without a
303 * CRC, in this case just update the CRC
304 **/
bd5cbced
RP
305static struct symbol *sym_add_exported(const char *name, struct module *mod,
306 enum export export)
1da177e4
LT
307{
308 struct symbol *s = find_symbol(name);
309
310 if (!s) {
bd5cbced 311 s = new_symbol(name, mod, export);
8e70c458
SR
312 } else {
313 if (!s->preloaded) {
7b75b13c 314 warn("%s: '%s' exported twice. Previous export "
8e70c458
SR
315 "was in %s%s\n", mod->name, name,
316 s->module->name,
317 is_vmlinux(s->module->name) ?"":".ko");
4b21960f 318 } else {
baec30e4 319 /* In case Module.symvers was out of date */
4b21960f 320 s->module = mod;
8e70c458 321 }
1da177e4 322 }
8e70c458 323 s->preloaded = 0;
040fcc81
SR
324 s->vmlinux = is_vmlinux(mod->name);
325 s->kernel = 0;
bd5cbced 326 s->export = export;
040fcc81
SR
327 return s;
328}
329
330static void sym_update_crc(const char *name, struct module *mod,
bd5cbced 331 unsigned int crc, enum export export)
040fcc81
SR
332{
333 struct symbol *s = find_symbol(name);
334
b6568b1a 335 if (!s) {
bd5cbced 336 s = new_symbol(name, mod, export);
b6568b1a
RR
337 /* Don't complain when we find it later. */
338 s->preloaded = 1;
339 }
040fcc81
SR
340 s->crc = crc;
341 s->crc_valid = 1;
1da177e4
LT
342}
343
5c3ead8c 344void *grab_file(const char *filename, unsigned long *size)
1da177e4
LT
345{
346 struct stat st;
eb3d5cc6 347 void *map = MAP_FAILED;
1da177e4
LT
348 int fd;
349
350 fd = open(filename, O_RDONLY);
eb3d5cc6 351 if (fd < 0)
1da177e4 352 return NULL;
eb3d5cc6
JJ
353 if (fstat(fd, &st))
354 goto failed;
1da177e4
LT
355
356 *size = st.st_size;
357 map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
1da177e4 358
eb3d5cc6
JJ
359failed:
360 close(fd);
1da177e4
LT
361 if (map == MAP_FAILED)
362 return NULL;
363 return map;
364}
365
5c3ead8c
SR
366/**
367 * Return a copy of the next line in a mmap'ed file.
368 * spaces in the beginning of the line is trimmed away.
369 * Return a pointer to a static buffer.
370 **/
df578e7d 371char *get_next_line(unsigned long *pos, void *file, unsigned long size)
1da177e4
LT
372{
373 static char line[4096];
374 int skip = 1;
375 size_t len = 0;
376 signed char *p = (signed char *)file + *pos;
377 char *s = line;
378
df578e7d 379 for (; *pos < size ; (*pos)++) {
1da177e4
LT
380 if (skip && isspace(*p)) {
381 p++;
382 continue;
383 }
384 skip = 0;
385 if (*p != '\n' && (*pos < size)) {
386 len++;
387 *s++ = *p++;
388 if (len > 4095)
389 break; /* Too long, stop */
390 } else {
391 /* End of string */
392 *s = '\0';
393 return line;
394 }
395 }
396 /* End of buffer */
397 return NULL;
398}
399
5c3ead8c 400void release_file(void *file, unsigned long size)
1da177e4
LT
401{
402 munmap(file, size);
403}
404
85bd2fdd 405static int parse_elf(struct elf_info *info, const char *filename)
1da177e4
LT
406{
407 unsigned int i;
85bd2fdd 408 Elf_Ehdr *hdr;
1da177e4
LT
409 Elf_Shdr *sechdrs;
410 Elf_Sym *sym;
1ce53adf
DV
411 const char *secstrings;
412 unsigned int symtab_idx = ~0U, symtab_shndx_idx = ~0U;
1da177e4
LT
413
414 hdr = grab_file(filename, &info->size);
415 if (!hdr) {
eed380f3
GR
416 if (ignore_missing_files) {
417 fprintf(stderr, "%s: %s (ignored)\n", filename,
418 strerror(errno));
419 return 0;
420 }
1da177e4 421 perror(filename);
6803dc0e 422 exit(1);
1da177e4
LT
423 }
424 info->hdr = hdr;
85bd2fdd
SR
425 if (info->size < sizeof(*hdr)) {
426 /* file too small, assume this is an empty .o file */
427 return 0;
428 }
429 /* Is this a valid ELF file? */
430 if ((hdr->e_ident[EI_MAG0] != ELFMAG0) ||
431 (hdr->e_ident[EI_MAG1] != ELFMAG1) ||
432 (hdr->e_ident[EI_MAG2] != ELFMAG2) ||
433 (hdr->e_ident[EI_MAG3] != ELFMAG3)) {
434 /* Not an ELF file - silently ignore it */
435 return 0;
436 }
1da177e4 437 /* Fix endianness in ELF header */
7d875a02
AK
438 hdr->e_type = TO_NATIVE(hdr->e_type);
439 hdr->e_machine = TO_NATIVE(hdr->e_machine);
440 hdr->e_version = TO_NATIVE(hdr->e_version);
441 hdr->e_entry = TO_NATIVE(hdr->e_entry);
442 hdr->e_phoff = TO_NATIVE(hdr->e_phoff);
443 hdr->e_shoff = TO_NATIVE(hdr->e_shoff);
444 hdr->e_flags = TO_NATIVE(hdr->e_flags);
445 hdr->e_ehsize = TO_NATIVE(hdr->e_ehsize);
446 hdr->e_phentsize = TO_NATIVE(hdr->e_phentsize);
447 hdr->e_phnum = TO_NATIVE(hdr->e_phnum);
448 hdr->e_shentsize = TO_NATIVE(hdr->e_shentsize);
449 hdr->e_shnum = TO_NATIVE(hdr->e_shnum);
450 hdr->e_shstrndx = TO_NATIVE(hdr->e_shstrndx);
1da177e4
LT
451 sechdrs = (void *)hdr + hdr->e_shoff;
452 info->sechdrs = sechdrs;
453
a83710e5
PS
454 /* Check if file offset is correct */
455 if (hdr->e_shoff > info->size) {
df578e7d
SR
456 fatal("section header offset=%lu in file '%s' is bigger than "
457 "filesize=%lu\n", (unsigned long)hdr->e_shoff,
458 filename, info->size);
a83710e5
PS
459 return 0;
460 }
461
6845756b 462 if (hdr->e_shnum == SHN_UNDEF) {
1ce53adf
DV
463 /*
464 * There are more than 64k sections,
465 * read count from .sh_size.
1ce53adf
DV
466 */
467 info->num_sections = TO_NATIVE(sechdrs[0].sh_size);
468 }
469 else {
470 info->num_sections = hdr->e_shnum;
471 }
472 if (hdr->e_shstrndx == SHN_XINDEX) {
6845756b 473 info->secindex_strings = TO_NATIVE(sechdrs[0].sh_link);
1ce53adf
DV
474 }
475 else {
476 info->secindex_strings = hdr->e_shstrndx;
477 }
478
1da177e4 479 /* Fix endianness in section headers */
1ce53adf 480 for (i = 0; i < info->num_sections; i++) {
7d875a02
AK
481 sechdrs[i].sh_name = TO_NATIVE(sechdrs[i].sh_name);
482 sechdrs[i].sh_type = TO_NATIVE(sechdrs[i].sh_type);
483 sechdrs[i].sh_flags = TO_NATIVE(sechdrs[i].sh_flags);
484 sechdrs[i].sh_addr = TO_NATIVE(sechdrs[i].sh_addr);
485 sechdrs[i].sh_offset = TO_NATIVE(sechdrs[i].sh_offset);
486 sechdrs[i].sh_size = TO_NATIVE(sechdrs[i].sh_size);
487 sechdrs[i].sh_link = TO_NATIVE(sechdrs[i].sh_link);
488 sechdrs[i].sh_info = TO_NATIVE(sechdrs[i].sh_info);
489 sechdrs[i].sh_addralign = TO_NATIVE(sechdrs[i].sh_addralign);
490 sechdrs[i].sh_entsize = TO_NATIVE(sechdrs[i].sh_entsize);
1da177e4
LT
491 }
492 /* Find symbol table. */
1ce53adf
DV
493 secstrings = (void *)hdr + sechdrs[info->secindex_strings].sh_offset;
494 for (i = 1; i < info->num_sections; i++) {
bd5cbced 495 const char *secname;
56fc82c5 496 int nobits = sechdrs[i].sh_type == SHT_NOBITS;
1da177e4 497
56fc82c5 498 if (!nobits && sechdrs[i].sh_offset > info->size) {
df578e7d
SR
499 fatal("%s is truncated. sechdrs[i].sh_offset=%lu > "
500 "sizeof(*hrd)=%zu\n", filename,
501 (unsigned long)sechdrs[i].sh_offset,
502 sizeof(*hdr));
85bd2fdd
SR
503 return 0;
504 }
bd5cbced
RP
505 secname = secstrings + sechdrs[i].sh_name;
506 if (strcmp(secname, ".modinfo") == 0) {
56fc82c5
TH
507 if (nobits)
508 fatal("%s has NOBITS .modinfo\n", filename);
1da177e4
LT
509 info->modinfo = (void *)hdr + sechdrs[i].sh_offset;
510 info->modinfo_len = sechdrs[i].sh_size;
bd5cbced
RP
511 } else if (strcmp(secname, "__ksymtab") == 0)
512 info->export_sec = i;
c96fca21
SR
513 else if (strcmp(secname, "__ksymtab_unused") == 0)
514 info->export_unused_sec = i;
bd5cbced
RP
515 else if (strcmp(secname, "__ksymtab_gpl") == 0)
516 info->export_gpl_sec = i;
c96fca21
SR
517 else if (strcmp(secname, "__ksymtab_unused_gpl") == 0)
518 info->export_unused_gpl_sec = i;
bd5cbced
RP
519 else if (strcmp(secname, "__ksymtab_gpl_future") == 0)
520 info->export_gpl_future_sec = i;
521
1ce53adf
DV
522 if (sechdrs[i].sh_type == SHT_SYMTAB) {
523 unsigned int sh_link_idx;
524 symtab_idx = i;
525 info->symtab_start = (void *)hdr +
526 sechdrs[i].sh_offset;
527 info->symtab_stop = (void *)hdr +
528 sechdrs[i].sh_offset + sechdrs[i].sh_size;
6845756b 529 sh_link_idx = sechdrs[i].sh_link;
1ce53adf
DV
530 info->strtab = (void *)hdr +
531 sechdrs[sh_link_idx].sh_offset;
532 }
1da177e4 533
1ce53adf
DV
534 /* 32bit section no. table? ("more than 64k sections") */
535 if (sechdrs[i].sh_type == SHT_SYMTAB_SHNDX) {
536 symtab_shndx_idx = i;
537 info->symtab_shndx_start = (void *)hdr +
538 sechdrs[i].sh_offset;
539 info->symtab_shndx_stop = (void *)hdr +
540 sechdrs[i].sh_offset + sechdrs[i].sh_size;
541 }
1da177e4 542 }
df578e7d 543 if (!info->symtab_start)
cb80514d 544 fatal("%s has no symtab?\n", filename);
df578e7d 545
1da177e4
LT
546 /* Fix endianness in symbols */
547 for (sym = info->symtab_start; sym < info->symtab_stop; sym++) {
548 sym->st_shndx = TO_NATIVE(sym->st_shndx);
549 sym->st_name = TO_NATIVE(sym->st_name);
550 sym->st_value = TO_NATIVE(sym->st_value);
551 sym->st_size = TO_NATIVE(sym->st_size);
552 }
1ce53adf
DV
553
554 if (symtab_shndx_idx != ~0U) {
555 Elf32_Word *p;
6845756b 556 if (symtab_idx != sechdrs[symtab_shndx_idx].sh_link)
1ce53adf 557 fatal("%s: SYMTAB_SHNDX has bad sh_link: %u!=%u\n",
6845756b 558 filename, sechdrs[symtab_shndx_idx].sh_link,
1ce53adf
DV
559 symtab_idx);
560 /* Fix endianness */
561 for (p = info->symtab_shndx_start; p < info->symtab_shndx_stop;
562 p++)
563 *p = TO_NATIVE(*p);
564 }
565
85bd2fdd 566 return 1;
1da177e4
LT
567}
568
5c3ead8c 569static void parse_elf_finish(struct elf_info *info)
1da177e4
LT
570{
571 release_file(info->hdr, info->size);
572}
573
4d7365d6
SR
574static int ignore_undef_symbol(struct elf_info *info, const char *symname)
575{
576 /* ignore __this_module, it will be resolved shortly */
b92021b0 577 if (strcmp(symname, VMLINUX_SYMBOL_STR(__this_module)) == 0)
4d7365d6
SR
578 return 1;
579 /* ignore global offset table */
580 if (strcmp(symname, "_GLOBAL_OFFSET_TABLE_") == 0)
581 return 1;
582 if (info->hdr->e_machine == EM_PPC)
583 /* Special register function linked on all modules during final link of .ko */
584 if (strncmp(symname, "_restgpr_", sizeof("_restgpr_") - 1) == 0 ||
585 strncmp(symname, "_savegpr_", sizeof("_savegpr_") - 1) == 0 ||
586 strncmp(symname, "_rest32gpr_", sizeof("_rest32gpr_") - 1) == 0 ||
8fe9c93e
AS
587 strncmp(symname, "_save32gpr_", sizeof("_save32gpr_") - 1) == 0 ||
588 strncmp(symname, "_restvr_", sizeof("_restvr_") - 1) == 0 ||
589 strncmp(symname, "_savevr_", sizeof("_savevr_") - 1) == 0)
4d7365d6 590 return 1;
7fca5dc8
SR
591 if (info->hdr->e_machine == EM_PPC64)
592 /* Special register function linked on all modules during final link of .ko */
593 if (strncmp(symname, "_restgpr0_", sizeof("_restgpr0_") - 1) == 0 ||
8fe9c93e
AS
594 strncmp(symname, "_savegpr0_", sizeof("_savegpr0_") - 1) == 0 ||
595 strncmp(symname, "_restvr_", sizeof("_restvr_") - 1) == 0 ||
596 strncmp(symname, "_savevr_", sizeof("_savevr_") - 1) == 0)
7fca5dc8 597 return 1;
4d7365d6
SR
598 /* Do not ignore this symbol */
599 return 0;
600}
601
b92021b0
RR
602#define CRC_PFX VMLINUX_SYMBOL_STR(__crc_)
603#define KSYMTAB_PFX VMLINUX_SYMBOL_STR(__ksymtab_)
1da177e4 604
5c3ead8c
SR
605static void handle_modversions(struct module *mod, struct elf_info *info,
606 Elf_Sym *sym, const char *symname)
1da177e4
LT
607{
608 unsigned int crc;
62a26356
AIB
609 enum export export;
610
258f7426
FR
611 if ((!is_vmlinux(mod->name) || mod->is_dot_o) &&
612 strncmp(symname, "__ksymtab", 9) == 0)
62a26356
AIB
613 export = export_from_secname(info, get_secindex(info, sym));
614 else
615 export = export_from_sec(info, get_secindex(info, sym));
1da177e4 616
b5064654
AK
617 /* CRC'd symbol */
618 if (strncmp(symname, CRC_PFX, strlen(CRC_PFX)) == 0) {
619 crc = (unsigned int) sym->st_value;
620 sym_update_crc(symname + strlen(CRC_PFX), mod, crc,
621 export);
622 }
623
1da177e4
LT
624 switch (sym->st_shndx) {
625 case SHN_COMMON:
ef178f92
AK
626 if (!strncmp(symname, "__gnu_lto_", sizeof("__gnu_lto_")-1)) {
627 /* Should warn here, but modpost runs before the linker */
628 } else
629 warn("\"%s\" [%s] is COMMON symbol\n", symname, mod->name);
1da177e4 630 break;
1da177e4
LT
631 case SHN_UNDEF:
632 /* undefined symbol */
633 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
634 ELF_ST_BIND(sym->st_info) != STB_WEAK)
635 break;
4d7365d6 636 if (ignore_undef_symbol(info, symname))
1da177e4 637 break;
8d529014
BC
638/* cope with newer glibc (2.3.4 or higher) STT_ definition in elf.h */
639#if defined(STT_REGISTER) || defined(STT_SPARC_REGISTER)
640/* add compatibility with older glibc */
641#ifndef STT_SPARC_REGISTER
642#define STT_SPARC_REGISTER STT_REGISTER
643#endif
1da177e4
LT
644 if (info->hdr->e_machine == EM_SPARC ||
645 info->hdr->e_machine == EM_SPARCV9) {
646 /* Ignore register directives. */
8d529014 647 if (ELF_ST_TYPE(sym->st_info) == STT_SPARC_REGISTER)
1da177e4 648 break;
62070fa4
SR
649 if (symname[0] == '.') {
650 char *munged = strdup(symname);
651 munged[0] = '_';
652 munged[1] = toupper(munged[1]);
653 symname = munged;
654 }
1da177e4
LT
655 }
656#endif
62070fa4 657
b92021b0
RR
658#ifdef CONFIG_HAVE_UNDERSCORE_SYMBOL_PREFIX
659 if (symname[0] != '_')
660 break;
661 else
662 symname++;
663#endif
664 mod->unres = alloc_symbol(symname,
665 ELF_ST_BIND(sym->st_info) == STB_WEAK,
666 mod->unres);
1da177e4
LT
667 break;
668 default:
669 /* All exported symbols */
8d99513c 670 if (strncmp(symname, KSYMTAB_PFX, strlen(KSYMTAB_PFX)) == 0) {
bd5cbced
RP
671 sym_add_exported(symname + strlen(KSYMTAB_PFX), mod,
672 export);
1da177e4 673 }
b92021b0 674 if (strcmp(symname, VMLINUX_SYMBOL_STR(init_module)) == 0)
1da177e4 675 mod->has_init = 1;
b92021b0 676 if (strcmp(symname, VMLINUX_SYMBOL_STR(cleanup_module)) == 0)
1da177e4
LT
677 mod->has_cleanup = 1;
678 break;
679 }
680}
681
5c3ead8c
SR
682/**
683 * Parse tag=value strings from .modinfo section
684 **/
1da177e4
LT
685static char *next_string(char *string, unsigned long *secsize)
686{
687 /* Skip non-zero chars */
688 while (string[0]) {
689 string++;
690 if ((*secsize)-- <= 1)
691 return NULL;
692 }
693
694 /* Skip any zero padding. */
695 while (!string[0]) {
696 string++;
697 if ((*secsize)-- <= 1)
698 return NULL;
699 }
700 return string;
701}
702
b817f6fe
SR
703static char *get_next_modinfo(void *modinfo, unsigned long modinfo_len,
704 const char *tag, char *info)
1da177e4
LT
705{
706 char *p;
707 unsigned int taglen = strlen(tag);
708 unsigned long size = modinfo_len;
709
b817f6fe
SR
710 if (info) {
711 size -= info - (char *)modinfo;
712 modinfo = next_string(info, &size);
713 }
714
1da177e4
LT
715 for (p = modinfo; p; p = next_string(p, &size)) {
716 if (strncmp(p, tag, taglen) == 0 && p[taglen] == '=')
717 return p + taglen + 1;
718 }
719 return NULL;
720}
721
b817f6fe
SR
722static char *get_modinfo(void *modinfo, unsigned long modinfo_len,
723 const char *tag)
724
725{
726 return get_next_modinfo(modinfo, modinfo_len, tag, NULL);
727}
728
4c8fbca5
SR
729/**
730 * Test if string s ends in string sub
731 * return 0 if match
732 **/
733static int strrcmp(const char *s, const char *sub)
734{
df578e7d 735 int slen, sublen;
62070fa4 736
4c8fbca5
SR
737 if (!s || !sub)
738 return 1;
62070fa4 739
4c8fbca5 740 slen = strlen(s);
df578e7d 741 sublen = strlen(sub);
62070fa4 742
4c8fbca5
SR
743 if ((slen == 0) || (sublen == 0))
744 return 1;
745
df578e7d
SR
746 if (sublen > slen)
747 return 1;
4c8fbca5 748
df578e7d 749 return memcmp(s + slen - sublen, sub, sublen);
4c8fbca5
SR
750}
751
ff13f926
SR
752static const char *sym_name(struct elf_info *elf, Elf_Sym *sym)
753{
58fb0d4f
SR
754 if (sym)
755 return elf->strtab + sym->st_name;
756 else
f666751a 757 return "(unknown)";
ff13f926
SR
758}
759
1ce53adf 760static const char *sec_name(struct elf_info *elf, int secindex)
ff13f926
SR
761{
762 Elf_Shdr *sechdrs = elf->sechdrs;
763 return (void *)elf->hdr +
1ce53adf
DV
764 elf->sechdrs[elf->secindex_strings].sh_offset +
765 sechdrs[secindex].sh_name;
ff13f926
SR
766}
767
768static const char *sech_name(struct elf_info *elf, Elf_Shdr *sechdr)
769{
770 return (void *)elf->hdr +
1ce53adf
DV
771 elf->sechdrs[elf->secindex_strings].sh_offset +
772 sechdr->sh_name;
ff13f926
SR
773}
774
10668220
SR
775/* The pattern is an array of simple patterns.
776 * "foo" will match an exact string equal to "foo"
6c5bd235 777 * "*foo" will match a string that ends with "foo"
10668220 778 * "foo*" will match a string that begins with "foo"
10668220 779 */
5c725138 780static int match(const char *sym, const char * const pat[])
10668220
SR
781{
782 const char *p;
783 while (*pat) {
784 p = *pat++;
785 const char *endp = p + strlen(p) - 1;
786
6c5bd235
SR
787 /* "*foo" */
788 if (*p == '*') {
789 if (strrcmp(sym, p + 1) == 0)
790 return 1;
791 }
10668220 792 /* "foo*" */
6c5bd235 793 else if (*endp == '*') {
10668220
SR
794 if (strncmp(sym, p, strlen(p) - 1) == 0)
795 return 1;
796 }
10668220
SR
797 /* no wildcards */
798 else {
799 if (strcmp(p, sym) == 0)
800 return 1;
801 }
802 }
803 /* no match */
804 return 0;
805}
806
10668220 807/* sections that we do not want to do full section mismatch check on */
7a3ee753 808static const char *const section_white_list[] =
4391ed6a
SR
809{
810 ".comment*",
811 ".debug*",
4d10c223 812 ".cranges", /* sh64 */
1121584f 813 ".zdebug*", /* Compressed debug sections. */
019fca84 814 ".GCC-command-line", /* mn10300 */
76b27645 815 ".GCC.command.line", /* record-gcc-switches, non mn10300 */
4391ed6a
SR
816 ".mdebug*", /* alpha, score, mips etc. */
817 ".pdr", /* alpha, score, mips etc. */
818 ".stab*",
819 ".note*",
820 ".got*",
821 ".toc*",
af42e970
MF
822 ".xt.prop", /* xtensa */
823 ".xt.lit", /* xtensa */
f2e207f3
VG
824 ".arcextmap*", /* arc */
825 ".gnu.linkonce.arcext*", /* arc : modules */
ef178f92 826 ".gnu.lto*",
4391ed6a
SR
827 NULL
828};
10668220 829
e241a630 830/*
b614a697 831 * This is used to find sections missing the SHF_ALLOC flag.
e241a630 832 * The cause of this is often a section specified in assembler
b614a697 833 * without "ax" / "aw".
e241a630 834 */
b614a697 835static void check_section(const char *modname, struct elf_info *elf,
bb66fc67 836 Elf_Shdr *sechdr)
e241a630 837{
b614a697
AK
838 const char *sec = sech_name(elf, sechdr);
839
840 if (sechdr->sh_type == SHT_PROGBITS &&
841 !(sechdr->sh_flags & SHF_ALLOC) &&
842 !match(sec, section_white_list)) {
843 warn("%s (%s): unexpected non-allocatable section.\n"
844 "Did you forget to use \"ax\"/\"aw\" in a .S file?\n"
845 "Note that for example <linux/init.h> contains\n"
846 "section definitions for use in .S files.\n\n",
847 modname, sec);
e241a630 848 }
e241a630
SR
849}
850
851
852
eb8f6890 853#define ALL_INIT_DATA_SECTIONS \
a0d8f803
RV
854 ".init.setup", ".init.rodata", ".meminit.rodata", \
855 ".init.data", ".meminit.data"
eb8f6890 856#define ALL_EXIT_DATA_SECTIONS \
a0d8f803 857 ".exit.data", ".memexit.data"
10668220 858
eb8f6890 859#define ALL_INIT_TEXT_SECTIONS \
a0d8f803 860 ".init.text", ".meminit.text"
eb8f6890 861#define ALL_EXIT_TEXT_SECTIONS \
a0d8f803 862 ".exit.text", ".memexit.text"
10668220 863
bb15d8db 864#define ALL_PCI_INIT_SECTIONS \
a0d8f803
RV
865 ".pci_fixup_early", ".pci_fixup_header", ".pci_fixup_final", \
866 ".pci_fixup_enable", ".pci_fixup_resume", \
867 ".pci_fixup_resume_early", ".pci_fixup_suspend"
bb15d8db 868
e24f6628
PG
869#define ALL_XXXINIT_SECTIONS MEM_INIT_SECTIONS
870#define ALL_XXXEXIT_SECTIONS MEM_EXIT_SECTIONS
4a31a229
UKK
871
872#define ALL_INIT_SECTIONS INIT_SECTIONS, ALL_XXXINIT_SECTIONS
873#define ALL_EXIT_SECTIONS EXIT_SECTIONS, ALL_XXXEXIT_SECTIONS
10668220 874
a0d8f803 875#define DATA_SECTIONS ".data", ".data.rel"
157d1972
QC
876#define TEXT_SECTIONS ".text", ".text.unlikely", ".sched.text", \
877 ".kprobes.text"
52dc0595 878#define OTHER_TEXT_SECTIONS ".ref.text", ".head.text", ".spinlock.text", \
6c730bfc 879 ".fixup", ".entry.text", ".exception.text", ".text.*"
10668220 880
fd6c3a8d 881#define INIT_SECTIONS ".init.*"
fd6c3a8d 882#define MEM_INIT_SECTIONS ".meminit.*"
eb8f6890 883
fd6c3a8d 884#define EXIT_SECTIONS ".exit.*"
fd6c3a8d 885#define MEM_EXIT_SECTIONS ".memexit.*"
eb8f6890 886
52dc0595
QC
887#define ALL_TEXT_SECTIONS ALL_INIT_TEXT_SECTIONS, ALL_EXIT_TEXT_SECTIONS, \
888 TEXT_SECTIONS, OTHER_TEXT_SECTIONS
889
6c5bd235 890/* init data sections */
7a3ee753
MK
891static const char *const init_data_sections[] =
892 { ALL_INIT_DATA_SECTIONS, NULL };
6c5bd235
SR
893
894/* all init sections */
7a3ee753 895static const char *const init_sections[] = { ALL_INIT_SECTIONS, NULL };
6c5bd235
SR
896
897/* All init and exit sections (code + data) */
7a3ee753 898static const char *const init_exit_sections[] =
eb8f6890 899 {ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS, NULL };
6c5bd235
SR
900
901/* data section */
7a3ee753 902static const char *const data_sections[] = { DATA_SECTIONS, NULL };
6c5bd235 903
6c5bd235
SR
904
905/* symbols in .data that may refer to init/exit sections */
af92a82d
UKK
906#define DEFAULT_SYMBOL_WHITE_LIST \
907 "*driver", \
908 "*_template", /* scsi uses *_template a lot */ \
909 "*_timer", /* arm uses ops structures named _timer a lot */ \
910 "*_sht", /* scsi also used *_sht to some extent */ \
911 "*_ops", \
912 "*_probe", \
913 "*_probe_one", \
914 "*_console"
6c5bd235 915
7a3ee753
MK
916static const char *const head_sections[] = { ".head.text*", NULL };
917static const char *const linker_symbols[] =
6c5bd235
SR
918 { "__init_begin", "_sinittext", "_einittext", NULL };
919
588ccd73 920enum mismatch {
bbd3f4fb
UKK
921 TEXT_TO_ANY_INIT,
922 DATA_TO_ANY_INIT,
923 TEXT_TO_ANY_EXIT,
924 DATA_TO_ANY_EXIT,
925 XXXINIT_TO_SOME_INIT,
926 XXXEXIT_TO_SOME_EXIT,
927 ANY_INIT_TO_ANY_EXIT,
928 ANY_EXIT_TO_ANY_INIT,
588ccd73 929 EXPORT_TO_INIT_EXIT,
52dc0595 930 EXTABLE_TO_NON_TEXT,
588ccd73
SR
931};
932
e5d8f59a
QC
933/**
934 * Describe how to match sections on different criterias:
935 *
936 * @fromsec: Array of sections to be matched.
937 *
938 * @bad_tosec: Relocations applied to a section in @fromsec to a section in
939 * this array is forbidden (black-list). Can be empty.
940 *
941 * @good_tosec: Relocations applied to a section in @fromsec must be
942 * targetting sections in this array (white-list). Can be empty.
943 *
944 * @mismatch: Type of mismatch.
945 *
946 * @symbol_white_list: Do not match a relocation to a symbol in this list
947 * even if it is targetting a section in @bad_to_sec.
948 *
949 * @handler: Specific handler to call when a match is found. If NULL,
950 * default_mismatch_handler() will be called.
951 *
952 */
10668220
SR
953struct sectioncheck {
954 const char *fromsec[20];
050e57fd
QC
955 const char *bad_tosec[20];
956 const char *good_tosec[20];
588ccd73 957 enum mismatch mismatch;
af92a82d 958 const char *symbol_white_list[20];
644e8f14
QC
959 void (*handler)(const char *modname, struct elf_info *elf,
960 const struct sectioncheck* const mismatch,
961 Elf_Rela *r, Elf_Sym *sym, const char *fromsec);
962
10668220
SR
963};
964
52dc0595
QC
965static void extable_mismatch_handler(const char *modname, struct elf_info *elf,
966 const struct sectioncheck* const mismatch,
967 Elf_Rela *r, Elf_Sym *sym,
968 const char *fromsec);
969
7a3ee753 970static const struct sectioncheck sectioncheck[] = {
10668220
SR
971/* Do not reference init/exit code/data from
972 * normal code and data
973 */
974{
588ccd73 975 .fromsec = { TEXT_SECTIONS, NULL },
050e57fd 976 .bad_tosec = { ALL_INIT_SECTIONS, NULL },
bbd3f4fb 977 .mismatch = TEXT_TO_ANY_INIT,
af92a82d 978 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
588ccd73
SR
979},
980{
981 .fromsec = { DATA_SECTIONS, NULL },
050e57fd 982 .bad_tosec = { ALL_XXXINIT_SECTIONS, NULL },
bbd3f4fb 983 .mismatch = DATA_TO_ANY_INIT,
af92a82d 984 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
588ccd73 985},
0db25245
UKK
986{
987 .fromsec = { DATA_SECTIONS, NULL },
050e57fd 988 .bad_tosec = { INIT_SECTIONS, NULL },
0db25245
UKK
989 .mismatch = DATA_TO_ANY_INIT,
990 .symbol_white_list = {
991 "*_template", "*_timer", "*_sht", "*_ops",
992 "*_probe", "*_probe_one", "*_console", NULL
993 },
994},
588ccd73
SR
995{
996 .fromsec = { TEXT_SECTIONS, NULL },
050e57fd 997 .bad_tosec = { ALL_EXIT_SECTIONS, NULL },
bbd3f4fb 998 .mismatch = TEXT_TO_ANY_EXIT,
af92a82d 999 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
588ccd73
SR
1000},
1001{
1002 .fromsec = { DATA_SECTIONS, NULL },
050e57fd 1003 .bad_tosec = { ALL_EXIT_SECTIONS, NULL },
bbd3f4fb 1004 .mismatch = DATA_TO_ANY_EXIT,
af92a82d 1005 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
eb8f6890 1006},
e24f6628 1007/* Do not reference init code/data from meminit code/data */
eb8f6890 1008{
4a31a229 1009 .fromsec = { ALL_XXXINIT_SECTIONS, NULL },
050e57fd 1010 .bad_tosec = { INIT_SECTIONS, NULL },
bbd3f4fb 1011 .mismatch = XXXINIT_TO_SOME_INIT,
af92a82d 1012 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
eb8f6890 1013},
e24f6628 1014/* Do not reference exit code/data from memexit code/data */
eb8f6890 1015{
4a31a229 1016 .fromsec = { ALL_XXXEXIT_SECTIONS, NULL },
050e57fd 1017 .bad_tosec = { EXIT_SECTIONS, NULL },
bbd3f4fb 1018 .mismatch = XXXEXIT_TO_SOME_EXIT,
af92a82d 1019 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
10668220
SR
1020},
1021/* Do not use exit code/data from init code */
1022{
eb8f6890 1023 .fromsec = { ALL_INIT_SECTIONS, NULL },
050e57fd 1024 .bad_tosec = { ALL_EXIT_SECTIONS, NULL },
bbd3f4fb 1025 .mismatch = ANY_INIT_TO_ANY_EXIT,
af92a82d 1026 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
10668220
SR
1027},
1028/* Do not use init code/data from exit code */
1029{
eb8f6890 1030 .fromsec = { ALL_EXIT_SECTIONS, NULL },
050e57fd 1031 .bad_tosec = { ALL_INIT_SECTIONS, NULL },
bbd3f4fb 1032 .mismatch = ANY_EXIT_TO_ANY_INIT,
af92a82d 1033 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
10668220 1034},
bb15d8db
SAS
1035{
1036 .fromsec = { ALL_PCI_INIT_SECTIONS, NULL },
050e57fd 1037 .bad_tosec = { INIT_SECTIONS, NULL },
bb15d8db
SAS
1038 .mismatch = ANY_INIT_TO_ANY_EXIT,
1039 .symbol_white_list = { NULL },
1040},
10668220
SR
1041/* Do not export init/exit functions or data */
1042{
1043 .fromsec = { "__ksymtab*", NULL },
050e57fd 1044 .bad_tosec = { INIT_SECTIONS, EXIT_SECTIONS, NULL },
af92a82d
UKK
1045 .mismatch = EXPORT_TO_INIT_EXIT,
1046 .symbol_white_list = { DEFAULT_SYMBOL_WHITE_LIST, NULL },
52dc0595
QC
1047},
1048{
1049 .fromsec = { "__ex_table", NULL },
1050 /* If you're adding any new black-listed sections in here, consider
1051 * adding a special 'printer' for them in scripts/check_extable.
1052 */
1053 .bad_tosec = { ".altinstr_replacement", NULL },
1054 .good_tosec = {ALL_TEXT_SECTIONS , NULL},
1055 .mismatch = EXTABLE_TO_NON_TEXT,
1056 .handler = extable_mismatch_handler,
10668220
SR
1057}
1058};
1059
0d2a636e
UKK
1060static const struct sectioncheck *section_mismatch(
1061 const char *fromsec, const char *tosec)
10668220
SR
1062{
1063 int i;
1064 int elems = sizeof(sectioncheck) / sizeof(struct sectioncheck);
1065 const struct sectioncheck *check = &sectioncheck[0];
1066
c5c3439a
QC
1067 /*
1068 * The target section could be the SHT_NUL section when we're
1069 * handling relocations to un-resolved symbols, trying to match it
1070 * doesn't make much sense and causes build failures on parisc and
1071 * mn10300 architectures.
1072 */
1073 if (*tosec == '\0')
1074 return NULL;
1075
10668220 1076 for (i = 0; i < elems; i++) {
050e57fd
QC
1077 if (match(fromsec, check->fromsec)) {
1078 if (check->bad_tosec[0] && match(tosec, check->bad_tosec))
1079 return check;
1080 if (check->good_tosec[0] && !match(tosec, check->good_tosec))
1081 return check;
1082 }
10668220
SR
1083 check++;
1084 }
0d2a636e 1085 return NULL;
10668220
SR
1086}
1087
4c8fbca5
SR
1088/**
1089 * Whitelist to allow certain references to pass with no warning.
0e0d314e 1090 *
4c8fbca5
SR
1091 * Pattern 1:
1092 * If a module parameter is declared __initdata and permissions=0
1093 * then this is legal despite the warning generated.
1094 * We cannot see value of permissions here, so just ignore
1095 * this pattern.
1096 * The pattern is identified by:
1097 * tosec = .init.data
9209aed0 1098 * fromsec = .data*
4c8fbca5 1099 * atsym =__param*
62070fa4 1100 *
6a841528
RR
1101 * Pattern 1a:
1102 * module_param_call() ops can refer to __init set function if permissions=0
1103 * The pattern is identified by:
1104 * tosec = .init.text
1105 * fromsec = .data*
1106 * atsym = __param_ops_*
1107 *
4c8fbca5 1108 * Pattern 2:
72ee59b5 1109 * Many drivers utilise a *driver container with references to
4c8fbca5 1110 * add, remove, probe functions etc.
4c8fbca5 1111 * the pattern is identified by:
83cda2bb
SR
1112 * tosec = init or exit section
1113 * fromsec = data section
df578e7d
SR
1114 * atsym = *driver, *_template, *_sht, *_ops, *_probe,
1115 * *probe_one, *_console, *_timer
ee6a8545
VG
1116 *
1117 * Pattern 3:
c993971f 1118 * Whitelist all references from .head.text to any init section
9bf8cb9b 1119 *
1d8af559 1120 * Pattern 4:
ee6a8545
VG
1121 * Some symbols belong to init section but still it is ok to reference
1122 * these from non-init sections as these symbols don't have any memory
1123 * allocated for them and symbol address and value are same. So even
1124 * if init section is freed, its ok to reference those symbols.
1125 * For ex. symbols marking the init section boundaries.
1126 * This pattern is identified by
1127 * refsymname = __init_begin, _sinittext, _einittext
9bf8cb9b 1128 *
4c8fbca5 1129 **/
af92a82d
UKK
1130static int secref_whitelist(const struct sectioncheck *mismatch,
1131 const char *fromsec, const char *fromsym,
58fb0d4f 1132 const char *tosec, const char *tosym)
4c8fbca5 1133{
4c8fbca5 1134 /* Check for pattern 1 */
6c5bd235
SR
1135 if (match(tosec, init_data_sections) &&
1136 match(fromsec, data_sections) &&
58fb0d4f
SR
1137 (strncmp(fromsym, "__param", strlen("__param")) == 0))
1138 return 0;
4c8fbca5 1139
6a841528
RR
1140 /* Check for pattern 1a */
1141 if (strcmp(tosec, ".init.text") == 0 &&
1142 match(fromsec, data_sections) &&
1143 (strncmp(fromsym, "__param_ops_", strlen("__param_ops_")) == 0))
1144 return 0;
1145
4c8fbca5 1146 /* Check for pattern 2 */
6c5bd235
SR
1147 if (match(tosec, init_exit_sections) &&
1148 match(fromsec, data_sections) &&
af92a82d 1149 match(fromsym, mismatch->symbol_white_list))
58fb0d4f 1150 return 0;
4c8fbca5 1151
9bf8cb9b 1152 /* Check for pattern 3 */
6c5bd235
SR
1153 if (match(fromsec, head_sections) &&
1154 match(tosec, init_sections))
58fb0d4f 1155 return 0;
9bf8cb9b 1156
1d8af559 1157 /* Check for pattern 4 */
58fb0d4f
SR
1158 if (match(tosym, linker_symbols))
1159 return 0;
9bf8cb9b 1160
58fb0d4f 1161 return 1;
4c8fbca5
SR
1162}
1163
93684d3b
SR
1164/**
1165 * Find symbol based on relocation record info.
1166 * In some cases the symbol supplied is a valid symbol so
1167 * return refsym. If st_name != 0 we assume this is a valid symbol.
1168 * In other cases the symbol needs to be looked up in the symbol table
1169 * based on section and address.
1170 * **/
9ad21c3f 1171static Elf_Sym *find_elf_symbol(struct elf_info *elf, Elf64_Sword addr,
93684d3b
SR
1172 Elf_Sym *relsym)
1173{
1174 Elf_Sym *sym;
9ad21c3f
SR
1175 Elf_Sym *near = NULL;
1176 Elf64_Sword distance = 20;
1177 Elf64_Sword d;
1ce53adf 1178 unsigned int relsym_secindex;
93684d3b
SR
1179
1180 if (relsym->st_name != 0)
1181 return relsym;
1ce53adf
DV
1182
1183 relsym_secindex = get_secindex(elf, relsym);
93684d3b 1184 for (sym = elf->symtab_start; sym < elf->symtab_stop; sym++) {
1ce53adf 1185 if (get_secindex(elf, sym) != relsym_secindex)
93684d3b 1186 continue;
ae4ac123
AN
1187 if (ELF_ST_TYPE(sym->st_info) == STT_SECTION)
1188 continue;
93684d3b
SR
1189 if (sym->st_value == addr)
1190 return sym;
9ad21c3f
SR
1191 /* Find a symbol nearby - addr are maybe negative */
1192 d = sym->st_value - addr;
1193 if (d < 0)
1194 d = addr - sym->st_value;
1195 if (d < distance) {
1196 distance = d;
1197 near = sym;
1198 }
93684d3b 1199 }
9ad21c3f
SR
1200 /* We need a close match */
1201 if (distance < 20)
1202 return near;
1203 else
1204 return NULL;
93684d3b
SR
1205}
1206
da68d61f
DB
1207static inline int is_arm_mapping_symbol(const char *str)
1208{
6c34f1f5 1209 return str[0] == '$' && strchr("axtd", str[1])
da68d61f
DB
1210 && (str[2] == '\0' || str[2] == '.');
1211}
1212
1213/*
1214 * If there's no name there, ignore it; likewise, ignore it if it's
1215 * one of the magic symbols emitted used by current ARM tools.
1216 *
1217 * Otherwise if find_symbols_between() returns those symbols, they'll
1218 * fail the whitelist tests and cause lots of false alarms ... fixable
1219 * only by merging __exit and __init sections into __text, bloating
1220 * the kernel (which is especially evil on embedded platforms).
1221 */
1222static inline int is_valid_name(struct elf_info *elf, Elf_Sym *sym)
1223{
1224 const char *name = elf->strtab + sym->st_name;
1225
1226 if (!name || !strlen(name))
1227 return 0;
1228 return !is_arm_mapping_symbol(name);
1229}
1230
b39927cf 1231/*
43c74d17
SR
1232 * Find symbols before or equal addr and after addr - in the section sec.
1233 * If we find two symbols with equal offset prefer one with a valid name.
1234 * The ELF format may have a better way to detect what type of symbol
1235 * it is, but this works for now.
b39927cf 1236 **/
157c23c8
SR
1237static Elf_Sym *find_elf_symbol2(struct elf_info *elf, Elf_Addr addr,
1238 const char *sec)
b39927cf
SR
1239{
1240 Elf_Sym *sym;
157c23c8 1241 Elf_Sym *near = NULL;
157c23c8 1242 Elf_Addr distance = ~0;
62070fa4 1243
b39927cf
SR
1244 for (sym = elf->symtab_start; sym < elf->symtab_stop; sym++) {
1245 const char *symsec;
1246
1ce53adf 1247 if (is_shndx_special(sym->st_shndx))
b39927cf 1248 continue;
1ce53adf 1249 symsec = sec_name(elf, get_secindex(elf, sym));
b39927cf
SR
1250 if (strcmp(symsec, sec) != 0)
1251 continue;
da68d61f
DB
1252 if (!is_valid_name(elf, sym))
1253 continue;
b39927cf 1254 if (sym->st_value <= addr) {
157c23c8
SR
1255 if ((addr - sym->st_value) < distance) {
1256 distance = addr - sym->st_value;
1257 near = sym;
1258 } else if ((addr - sym->st_value) == distance) {
1259 near = sym;
43c74d17 1260 }
b39927cf
SR
1261 }
1262 }
157c23c8 1263 return near;
b39927cf
SR
1264}
1265
588ccd73
SR
1266/*
1267 * Convert a section name to the function/data attribute
1268 * .init.text => __init
588ccd73
SR
1269 * .memexitconst => __memconst
1270 * etc.
cbcf14a9
AS
1271 *
1272 * The memory of returned value has been allocated on a heap. The user of this
1273 * method should free it after usage.
588ccd73
SR
1274*/
1275static char *sec2annotation(const char *s)
1276{
1277 if (match(s, init_exit_sections)) {
1278 char *p = malloc(20);
1279 char *r = p;
1280
1281 *p++ = '_';
1282 *p++ = '_';
1283 if (*s == '.')
1284 s++;
1285 while (*s && *s != '.')
1286 *p++ = *s++;
1287 *p = '\0';
1288 if (*s == '.')
1289 s++;
1290 if (strstr(s, "rodata") != NULL)
1291 strcat(p, "const ");
1292 else if (strstr(s, "data") != NULL)
1293 strcat(p, "data ");
1294 else
1295 strcat(p, " ");
cbcf14a9 1296 return r;
588ccd73 1297 } else {
5003bab8 1298 return strdup("");
588ccd73
SR
1299 }
1300}
1301
1302static int is_function(Elf_Sym *sym)
1303{
1304 if (sym)
1305 return ELF_ST_TYPE(sym->st_info) == STT_FUNC;
1306 else
f666751a 1307 return -1;
588ccd73
SR
1308}
1309
00759c0e
RD
1310static void print_section_list(const char * const list[20])
1311{
1312 const char *const *s = list;
1313
1314 while (*s) {
1315 fprintf(stderr, "%s", *s);
1316 s++;
1317 if (*s)
1318 fprintf(stderr, ", ");
1319 }
1320 fprintf(stderr, "\n");
1321}
1322
356ad538
QC
1323static inline void get_pretty_name(int is_func, const char** name, const char** name_p)
1324{
1325 switch (is_func) {
1326 case 0: *name = "variable"; *name_p = ""; break;
1327 case 1: *name = "function"; *name_p = "()"; break;
1328 default: *name = "(unknown reference)"; *name_p = ""; break;
1329 }
1330}
1331
58fb0d4f 1332/*
b39927cf
SR
1333 * Print a warning about a section mismatch.
1334 * Try to find symbols near it so user can find it.
4c8fbca5 1335 * Check whitelist before warning - it may be a false positive.
58fb0d4f 1336 */
0d2a636e
UKK
1337static void report_sec_mismatch(const char *modname,
1338 const struct sectioncheck *mismatch,
bb66fc67
MY
1339 const char *fromsec,
1340 unsigned long long fromaddr,
1341 const char *fromsym,
1342 int from_is_func,
1343 const char *tosec, const char *tosym,
1344 int to_is_func)
588ccd73
SR
1345{
1346 const char *from, *from_p;
1347 const char *to, *to_p;
37ed19d5
AF
1348 char *prl_from;
1349 char *prl_to;
f666751a 1350
e5f95c8b
SR
1351 sec_mismatch_count++;
1352 if (!sec_mismatch_verbose)
1353 return;
1354
356ad538
QC
1355 get_pretty_name(from_is_func, &from, &from_p);
1356 get_pretty_name(to_is_func, &to, &to_p);
1357
7c0ac495
GU
1358 warn("%s(%s+0x%llx): Section mismatch in reference from the %s %s%s "
1359 "to the %s %s:%s%s\n",
1360 modname, fromsec, fromaddr, from, fromsym, from_p, to, tosec,
1361 tosym, to_p);
588ccd73 1362
0d2a636e 1363 switch (mismatch->mismatch) {
bbd3f4fb 1364 case TEXT_TO_ANY_INIT:
37ed19d5
AF
1365 prl_from = sec2annotation(fromsec);
1366 prl_to = sec2annotation(tosec);
588ccd73 1367 fprintf(stderr,
f666751a 1368 "The function %s%s() references\n"
588ccd73
SR
1369 "the %s %s%s%s.\n"
1370 "This is often because %s lacks a %s\n"
1371 "annotation or the annotation of %s is wrong.\n",
37ed19d5
AF
1372 prl_from, fromsym,
1373 to, prl_to, tosym, to_p,
1374 fromsym, prl_to, tosym);
1375 free(prl_from);
1376 free(prl_to);
588ccd73 1377 break;
bbd3f4fb 1378 case DATA_TO_ANY_INIT: {
37ed19d5 1379 prl_to = sec2annotation(tosec);
588ccd73
SR
1380 fprintf(stderr,
1381 "The variable %s references\n"
1382 "the %s %s%s%s\n"
1383 "If the reference is valid then annotate the\n"
8b8b76c0 1384 "variable with __init* or __refdata (see linux/init.h) "
588ccd73 1385 "or name the variable:\n",
37ed19d5 1386 fromsym, to, prl_to, tosym, to_p);
00759c0e 1387 print_section_list(mismatch->symbol_white_list);
37ed19d5 1388 free(prl_to);
588ccd73 1389 break;
58fb0d4f 1390 }
bbd3f4fb 1391 case TEXT_TO_ANY_EXIT:
37ed19d5 1392 prl_to = sec2annotation(tosec);
588ccd73
SR
1393 fprintf(stderr,
1394 "The function %s() references a %s in an exit section.\n"
1395 "Often the %s %s%s has valid usage outside the exit section\n"
1396 "and the fix is to remove the %sannotation of %s.\n",
37ed19d5
AF
1397 fromsym, to, to, tosym, to_p, prl_to, tosym);
1398 free(prl_to);
588ccd73 1399 break;
bbd3f4fb 1400 case DATA_TO_ANY_EXIT: {
37ed19d5 1401 prl_to = sec2annotation(tosec);
588ccd73
SR
1402 fprintf(stderr,
1403 "The variable %s references\n"
1404 "the %s %s%s%s\n"
1405 "If the reference is valid then annotate the\n"
1406 "variable with __exit* (see linux/init.h) or "
1407 "name the variable:\n",
37ed19d5 1408 fromsym, to, prl_to, tosym, to_p);
00759c0e 1409 print_section_list(mismatch->symbol_white_list);
37ed19d5 1410 free(prl_to);
588ccd73
SR
1411 break;
1412 }
bbd3f4fb
UKK
1413 case XXXINIT_TO_SOME_INIT:
1414 case XXXEXIT_TO_SOME_EXIT:
37ed19d5
AF
1415 prl_from = sec2annotation(fromsec);
1416 prl_to = sec2annotation(tosec);
588ccd73
SR
1417 fprintf(stderr,
1418 "The %s %s%s%s references\n"
1419 "a %s %s%s%s.\n"
1420 "If %s is only used by %s then\n"
1421 "annotate %s with a matching annotation.\n",
37ed19d5
AF
1422 from, prl_from, fromsym, from_p,
1423 to, prl_to, tosym, to_p,
b1d2675a 1424 tosym, fromsym, tosym);
37ed19d5
AF
1425 free(prl_from);
1426 free(prl_to);
588ccd73 1427 break;
bbd3f4fb 1428 case ANY_INIT_TO_ANY_EXIT:
37ed19d5
AF
1429 prl_from = sec2annotation(fromsec);
1430 prl_to = sec2annotation(tosec);
588ccd73
SR
1431 fprintf(stderr,
1432 "The %s %s%s%s references\n"
1433 "a %s %s%s%s.\n"
1434 "This is often seen when error handling "
1435 "in the init function\n"
1436 "uses functionality in the exit path.\n"
1437 "The fix is often to remove the %sannotation of\n"
1438 "%s%s so it may be used outside an exit section.\n",
37ed19d5
AF
1439 from, prl_from, fromsym, from_p,
1440 to, prl_to, tosym, to_p,
5003bab8 1441 prl_to, tosym, to_p);
37ed19d5
AF
1442 free(prl_from);
1443 free(prl_to);
588ccd73 1444 break;
bbd3f4fb 1445 case ANY_EXIT_TO_ANY_INIT:
37ed19d5
AF
1446 prl_from = sec2annotation(fromsec);
1447 prl_to = sec2annotation(tosec);
588ccd73
SR
1448 fprintf(stderr,
1449 "The %s %s%s%s references\n"
1450 "a %s %s%s%s.\n"
1451 "This is often seen when error handling "
1452 "in the exit function\n"
1453 "uses functionality in the init path.\n"
1454 "The fix is often to remove the %sannotation of\n"
1455 "%s%s so it may be used outside an init section.\n",
37ed19d5
AF
1456 from, prl_from, fromsym, from_p,
1457 to, prl_to, tosym, to_p,
1458 prl_to, tosym, to_p);
1459 free(prl_from);
1460 free(prl_to);
588ccd73
SR
1461 break;
1462 case EXPORT_TO_INIT_EXIT:
37ed19d5 1463 prl_to = sec2annotation(tosec);
588ccd73
SR
1464 fprintf(stderr,
1465 "The symbol %s is exported and annotated %s\n"
1466 "Fix this by removing the %sannotation of %s "
1467 "or drop the export.\n",
37ed19d5
AF
1468 tosym, prl_to, prl_to, tosym);
1469 free(prl_to);
588ccd73 1470 break;
52dc0595
QC
1471 case EXTABLE_TO_NON_TEXT:
1472 fatal("There's a special handler for this mismatch type, "
1473 "we should never get here.");
1474 break;
588ccd73
SR
1475 }
1476 fprintf(stderr, "\n");
58fb0d4f
SR
1477}
1478
644e8f14
QC
1479static void default_mismatch_handler(const char *modname, struct elf_info *elf,
1480 const struct sectioncheck* const mismatch,
1481 Elf_Rela *r, Elf_Sym *sym, const char *fromsec)
58fb0d4f
SR
1482{
1483 const char *tosec;
644e8f14
QC
1484 Elf_Sym *to;
1485 Elf_Sym *from;
1486 const char *tosym;
1487 const char *fromsym;
58fb0d4f 1488
644e8f14
QC
1489 from = find_elf_symbol2(elf, r->r_offset, fromsec);
1490 fromsym = sym_name(elf, from);
644e8f14
QC
1491
1492 if (!strncmp(fromsym, "reference___initcall",
1493 sizeof("reference___initcall")-1))
1494 return;
1495
c7a65e06
QC
1496 tosec = sec_name(elf, get_secindex(elf, sym));
1497 to = find_elf_symbol(elf, r->r_addend, sym);
1498 tosym = sym_name(elf, to);
1499
644e8f14
QC
1500 /* check whitelist - we may ignore it */
1501 if (secref_whitelist(mismatch,
1502 fromsec, fromsym, tosec, tosym)) {
1503 report_sec_mismatch(modname, mismatch,
1504 fromsec, r->r_offset, fromsym,
1505 is_function(from), tosec, tosym,
1506 is_function(to));
1507 }
1508}
1509
52dc0595
QC
1510static int is_executable_section(struct elf_info* elf, unsigned int section_index)
1511{
1512 if (section_index > elf->num_sections)
1513 fatal("section_index is outside elf->num_sections!\n");
1514
1515 return ((elf->sechdrs[section_index].sh_flags & SHF_EXECINSTR) == SHF_EXECINSTR);
1516}
1517
1518/*
1519 * We rely on a gross hack in section_rel[a]() calling find_extable_entry_size()
1520 * to know the sizeof(struct exception_table_entry) for the target architecture.
1521 */
1522static unsigned int extable_entry_size = 0;
e84048aa 1523static void find_extable_entry_size(const char* const sec, const Elf_Rela* r)
52dc0595
QC
1524{
1525 /*
1526 * If we're currently checking the second relocation within __ex_table,
1527 * that relocation offset tells us the offsetof(struct
1528 * exception_table_entry, fixup) which is equal to sizeof(struct
1529 * exception_table_entry) divided by two. We use that to our advantage
1530 * since there's no portable way to get that size as every architecture
1531 * seems to go with different sized types. Not pretty but better than
1532 * hard-coding the size for every architecture..
1533 */
e84048aa 1534 if (!extable_entry_size)
52dc0595
QC
1535 extable_entry_size = r->r_offset * 2;
1536}
e84048aa 1537
52dc0595
QC
1538static inline bool is_extable_fault_address(Elf_Rela *r)
1539{
d3df4de7
QC
1540 /*
1541 * extable_entry_size is only discovered after we've handled the
1542 * _second_ relocation in __ex_table, so only abort when we're not
1543 * handling the first reloc and extable_entry_size is zero.
1544 */
1545 if (r->r_offset && extable_entry_size == 0)
52dc0595
QC
1546 fatal("extable_entry size hasn't been discovered!\n");
1547
1548 return ((r->r_offset == 0) ||
1549 (r->r_offset % extable_entry_size == 0));
1550}
1551
e84048aa
QC
1552#define is_second_extable_reloc(Start, Cur, Sec) \
1553 (((Cur) == (Start) + 1) && (strcmp("__ex_table", (Sec)) == 0))
1554
52dc0595
QC
1555static void report_extable_warnings(const char* modname, struct elf_info* elf,
1556 const struct sectioncheck* const mismatch,
1557 Elf_Rela* r, Elf_Sym* sym,
1558 const char* fromsec, const char* tosec)
1559{
1560 Elf_Sym* fromsym = find_elf_symbol2(elf, r->r_offset, fromsec);
1561 const char* fromsym_name = sym_name(elf, fromsym);
1562 Elf_Sym* tosym = find_elf_symbol(elf, r->r_addend, sym);
1563 const char* tosym_name = sym_name(elf, tosym);
1564 const char* from_pretty_name;
1565 const char* from_pretty_name_p;
1566 const char* to_pretty_name;
1567 const char* to_pretty_name_p;
1568
1569 get_pretty_name(is_function(fromsym),
1570 &from_pretty_name, &from_pretty_name_p);
1571 get_pretty_name(is_function(tosym),
1572 &to_pretty_name, &to_pretty_name_p);
1573
1574 warn("%s(%s+0x%lx): Section mismatch in reference"
1575 " from the %s %s%s to the %s %s:%s%s\n",
1576 modname, fromsec, (long)r->r_offset, from_pretty_name,
1577 fromsym_name, from_pretty_name_p,
1578 to_pretty_name, tosec, tosym_name, to_pretty_name_p);
1579
1580 if (!match(tosec, mismatch->bad_tosec) &&
1581 is_executable_section(elf, get_secindex(elf, sym)))
1582 fprintf(stderr,
1583 "The relocation at %s+0x%lx references\n"
1584 "section \"%s\" which is not in the list of\n"
1585 "authorized sections. If you're adding a new section\n"
1586 "and/or if this reference is valid, add \"%s\" to the\n"
1587 "list of authorized sections to jump to on fault.\n"
1588 "This can be achieved by adding \"%s\" to \n"
1589 "OTHER_TEXT_SECTIONS in scripts/mod/modpost.c.\n",
1590 fromsec, (long)r->r_offset, tosec, tosec, tosec);
1591}
1592
1593static void extable_mismatch_handler(const char* modname, struct elf_info *elf,
1594 const struct sectioncheck* const mismatch,
1595 Elf_Rela* r, Elf_Sym* sym,
1596 const char *fromsec)
1597{
1598 const char* tosec = sec_name(elf, get_secindex(elf, sym));
1599
1600 sec_mismatch_count++;
1601
1602 if (sec_mismatch_verbose)
1603 report_extable_warnings(modname, elf, mismatch, r, sym,
1604 fromsec, tosec);
1605
1606 if (match(tosec, mismatch->bad_tosec))
1607 fatal("The relocation at %s+0x%lx references\n"
1608 "section \"%s\" which is black-listed.\n"
1609 "Something is seriously wrong and should be fixed.\n"
1610 "You might get more information about where this is\n"
1611 "coming from by using scripts/check_extable.sh %s\n",
1612 fromsec, (long)r->r_offset, tosec, modname);
1613 else if (!is_executable_section(elf, get_secindex(elf, sym))) {
1614 if (is_extable_fault_address(r))
1615 fatal("The relocation at %s+0x%lx references\n"
1616 "section \"%s\" which is not executable, IOW\n"
1617 "it is not possible for the kernel to fault\n"
1618 "at that address. Something is seriously wrong\n"
1619 "and should be fixed.\n",
1620 fromsec, (long)r->r_offset, tosec);
1621 else
1622 fatal("The relocation at %s+0x%lx references\n"
1623 "section \"%s\" which is not executable, IOW\n"
1624 "the kernel will fault if it ever tries to\n"
1625 "jump to it. Something is seriously wrong\n"
1626 "and should be fixed.\n",
1627 fromsec, (long)r->r_offset, tosec);
1628 }
1629}
1630
644e8f14
QC
1631static void check_section_mismatch(const char *modname, struct elf_info *elf,
1632 Elf_Rela *r, Elf_Sym *sym, const char *fromsec)
1633{
1634 const char *tosec = sec_name(elf, get_secindex(elf, sym));;
1635 const struct sectioncheck *mismatch = section_mismatch(fromsec, tosec);
1636
0d2a636e 1637 if (mismatch) {
644e8f14
QC
1638 if (mismatch->handler)
1639 mismatch->handler(modname, elf, mismatch,
1640 r, sym, fromsec);
1641 else
1642 default_mismatch_handler(modname, elf, mismatch,
1643 r, sym, fromsec);
b39927cf
SR
1644 }
1645}
1646
ae4ac123 1647static unsigned int *reloc_location(struct elf_info *elf,
5b24c071 1648 Elf_Shdr *sechdr, Elf_Rela *r)
ae4ac123
AN
1649{
1650 Elf_Shdr *sechdrs = elf->sechdrs;
6845756b 1651 int section = sechdr->sh_info;
ae4ac123
AN
1652
1653 return (void *)elf->hdr + sechdrs[section].sh_offset +
731ece41 1654 r->r_offset;
ae4ac123
AN
1655}
1656
5b24c071 1657static int addend_386_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
ae4ac123
AN
1658{
1659 unsigned int r_typ = ELF_R_TYPE(r->r_info);
5b24c071 1660 unsigned int *location = reloc_location(elf, sechdr, r);
ae4ac123
AN
1661
1662 switch (r_typ) {
1663 case R_386_32:
1664 r->r_addend = TO_NATIVE(*location);
1665 break;
1666 case R_386_PC32:
1667 r->r_addend = TO_NATIVE(*location) + 4;
1668 /* For CONFIG_RELOCATABLE=y */
1669 if (elf->hdr->e_type == ET_EXEC)
1670 r->r_addend += r->r_offset;
1671 break;
1672 }
1673 return 0;
1674}
1675
6e2e340b
TL
1676#ifndef R_ARM_CALL
1677#define R_ARM_CALL 28
1678#endif
1679#ifndef R_ARM_JUMP24
1680#define R_ARM_JUMP24 29
1681#endif
1682
c9698e5c
DL
1683#ifndef R_ARM_THM_CALL
1684#define R_ARM_THM_CALL 10
1685#endif
1686#ifndef R_ARM_THM_JUMP24
1687#define R_ARM_THM_JUMP24 30
1688#endif
1689#ifndef R_ARM_THM_JUMP19
1690#define R_ARM_THM_JUMP19 51
1691#endif
1692
5b24c071 1693static int addend_arm_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
56a974fa
SR
1694{
1695 unsigned int r_typ = ELF_R_TYPE(r->r_info);
1696
1697 switch (r_typ) {
1698 case R_ARM_ABS32:
1699 /* From ARM ABI: (S + A) | T */
df578e7d 1700 r->r_addend = (int)(long)
bb66fc67 1701 (elf->symtab_start + ELF_R_SYM(r->r_info));
56a974fa
SR
1702 break;
1703 case R_ARM_PC24:
6e2e340b
TL
1704 case R_ARM_CALL:
1705 case R_ARM_JUMP24:
c9698e5c
DL
1706 case R_ARM_THM_CALL:
1707 case R_ARM_THM_JUMP24:
1708 case R_ARM_THM_JUMP19:
56a974fa 1709 /* From ARM ABI: ((S + A) | T) - P */
df578e7d 1710 r->r_addend = (int)(long)(elf->hdr +
bb66fc67
MY
1711 sechdr->sh_offset +
1712 (r->r_offset - sechdr->sh_addr));
56a974fa
SR
1713 break;
1714 default:
1715 return 1;
1716 }
1717 return 0;
1718}
1719
5b24c071 1720static int addend_mips_rel(struct elf_info *elf, Elf_Shdr *sechdr, Elf_Rela *r)
ae4ac123
AN
1721{
1722 unsigned int r_typ = ELF_R_TYPE(r->r_info);
5b24c071 1723 unsigned int *location = reloc_location(elf, sechdr, r);
ae4ac123
AN
1724 unsigned int inst;
1725
1726 if (r_typ == R_MIPS_HI16)
1727 return 1; /* skip this */
1728 inst = TO_NATIVE(*location);
1729 switch (r_typ) {
1730 case R_MIPS_LO16:
1731 r->r_addend = inst & 0xffff;
1732 break;
1733 case R_MIPS_26:
1734 r->r_addend = (inst & 0x03ffffff) << 2;
1735 break;
1736 case R_MIPS_32:
1737 r->r_addend = inst;
1738 break;
1739 }
1740 return 0;
1741}
1742
5b24c071 1743static void section_rela(const char *modname, struct elf_info *elf,
bb66fc67 1744 Elf_Shdr *sechdr)
5b24c071
SR
1745{
1746 Elf_Sym *sym;
1747 Elf_Rela *rela;
1748 Elf_Rela r;
1749 unsigned int r_sym;
1750 const char *fromsec;
5b24c071 1751
ff13f926 1752 Elf_Rela *start = (void *)elf->hdr + sechdr->sh_offset;
5b24c071
SR
1753 Elf_Rela *stop = (void *)start + sechdr->sh_size;
1754
ff13f926 1755 fromsec = sech_name(elf, sechdr);
5b24c071
SR
1756 fromsec += strlen(".rela");
1757 /* if from section (name) is know good then skip it */
b614a697 1758 if (match(fromsec, section_white_list))
5b24c071 1759 return;
e241a630 1760
5b24c071
SR
1761 for (rela = start; rela < stop; rela++) {
1762 r.r_offset = TO_NATIVE(rela->r_offset);
1763#if KERNEL_ELFCLASS == ELFCLASS64
ff13f926 1764 if (elf->hdr->e_machine == EM_MIPS) {
5b24c071
SR
1765 unsigned int r_typ;
1766 r_sym = ELF64_MIPS_R_SYM(rela->r_info);
1767 r_sym = TO_NATIVE(r_sym);
1768 r_typ = ELF64_MIPS_R_TYPE(rela->r_info);
1769 r.r_info = ELF64_R_INFO(r_sym, r_typ);
1770 } else {
1771 r.r_info = TO_NATIVE(rela->r_info);
1772 r_sym = ELF_R_SYM(r.r_info);
1773 }
1774#else
1775 r.r_info = TO_NATIVE(rela->r_info);
1776 r_sym = ELF_R_SYM(r.r_info);
1777#endif
1778 r.r_addend = TO_NATIVE(rela->r_addend);
1779 sym = elf->symtab_start + r_sym;
1780 /* Skip special sections */
1ce53adf 1781 if (is_shndx_special(sym->st_shndx))
5b24c071 1782 continue;
e84048aa
QC
1783 if (is_second_extable_reloc(start, rela, fromsec))
1784 find_extable_entry_size(fromsec, &r);
58fb0d4f 1785 check_section_mismatch(modname, elf, &r, sym, fromsec);
5b24c071
SR
1786 }
1787}
1788
1789static void section_rel(const char *modname, struct elf_info *elf,
bb66fc67 1790 Elf_Shdr *sechdr)
5b24c071
SR
1791{
1792 Elf_Sym *sym;
1793 Elf_Rel *rel;
1794 Elf_Rela r;
1795 unsigned int r_sym;
1796 const char *fromsec;
5b24c071 1797
ff13f926 1798 Elf_Rel *start = (void *)elf->hdr + sechdr->sh_offset;
5b24c071
SR
1799 Elf_Rel *stop = (void *)start + sechdr->sh_size;
1800
ff13f926 1801 fromsec = sech_name(elf, sechdr);
5b24c071
SR
1802 fromsec += strlen(".rel");
1803 /* if from section (name) is know good then skip it */
b614a697 1804 if (match(fromsec, section_white_list))
5b24c071
SR
1805 return;
1806
1807 for (rel = start; rel < stop; rel++) {
1808 r.r_offset = TO_NATIVE(rel->r_offset);
1809#if KERNEL_ELFCLASS == ELFCLASS64
ff13f926 1810 if (elf->hdr->e_machine == EM_MIPS) {
5b24c071
SR
1811 unsigned int r_typ;
1812 r_sym = ELF64_MIPS_R_SYM(rel->r_info);
1813 r_sym = TO_NATIVE(r_sym);
1814 r_typ = ELF64_MIPS_R_TYPE(rel->r_info);
1815 r.r_info = ELF64_R_INFO(r_sym, r_typ);
1816 } else {
1817 r.r_info = TO_NATIVE(rel->r_info);
1818 r_sym = ELF_R_SYM(r.r_info);
1819 }
1820#else
1821 r.r_info = TO_NATIVE(rel->r_info);
1822 r_sym = ELF_R_SYM(r.r_info);
1823#endif
1824 r.r_addend = 0;
ff13f926 1825 switch (elf->hdr->e_machine) {
5b24c071
SR
1826 case EM_386:
1827 if (addend_386_rel(elf, sechdr, &r))
1828 continue;
1829 break;
1830 case EM_ARM:
1831 if (addend_arm_rel(elf, sechdr, &r))
1832 continue;
1833 break;
1834 case EM_MIPS:
1835 if (addend_mips_rel(elf, sechdr, &r))
1836 continue;
1837 break;
1838 }
1839 sym = elf->symtab_start + r_sym;
1840 /* Skip special sections */
1ce53adf 1841 if (is_shndx_special(sym->st_shndx))
5b24c071 1842 continue;
e84048aa
QC
1843 if (is_second_extable_reloc(start, rel, fromsec))
1844 find_extable_entry_size(fromsec, &r);
58fb0d4f 1845 check_section_mismatch(modname, elf, &r, sym, fromsec);
5b24c071
SR
1846 }
1847}
1848
b39927cf
SR
1849/**
1850 * A module includes a number of sections that are discarded
1851 * either when loaded or when used as built-in.
1852 * For loaded modules all functions marked __init and all data
b595076a 1853 * marked __initdata will be discarded when the module has been initialized.
b39927cf
SR
1854 * Likewise for modules used built-in the sections marked __exit
1855 * are discarded because __exit marked function are supposed to be called
32be1d22 1856 * only when a module is unloaded which never happens for built-in modules.
b39927cf
SR
1857 * The check_sec_ref() function traverses all relocation records
1858 * to find all references to a section that reference a section that will
1859 * be discarded and warns about it.
1860 **/
1861static void check_sec_ref(struct module *mod, const char *modname,
bb66fc67 1862 struct elf_info *elf)
b39927cf
SR
1863{
1864 int i;
b39927cf 1865 Elf_Shdr *sechdrs = elf->sechdrs;
62070fa4 1866
b39927cf 1867 /* Walk through all sections */
1ce53adf 1868 for (i = 0; i < elf->num_sections; i++) {
b614a697 1869 check_section(modname, elf, &elf->sechdrs[i]);
b39927cf 1870 /* We want to process only relocation sections and not .init */
5b24c071 1871 if (sechdrs[i].sh_type == SHT_RELA)
10668220 1872 section_rela(modname, elf, &elf->sechdrs[i]);
5b24c071 1873 else if (sechdrs[i].sh_type == SHT_REL)
10668220 1874 section_rel(modname, elf, &elf->sechdrs[i]);
b39927cf
SR
1875 }
1876}
1877
7d02b490
AK
1878static char *remove_dot(char *s)
1879{
fcd38ed0 1880 size_t n = strcspn(s, ".");
7d02b490 1881
fcd38ed0
MN
1882 if (n && s[n]) {
1883 size_t m = strspn(s + n + 1, "0123456789");
1884 if (m && (s[n + m] == '.' || s[n + m] == 0))
7d02b490
AK
1885 s[n] = 0;
1886 }
1887 return s;
1888}
1889
5c3ead8c 1890static void read_symbols(char *modname)
1da177e4
LT
1891{
1892 const char *symname;
1893 char *version;
b817f6fe 1894 char *license;
1da177e4
LT
1895 struct module *mod;
1896 struct elf_info info = { };
1897 Elf_Sym *sym;
1898
85bd2fdd
SR
1899 if (!parse_elf(&info, modname))
1900 return;
1da177e4
LT
1901
1902 mod = new_module(modname);
1903
1904 /* When there's no vmlinux, don't print warnings about
1905 * unresolved symbols (since there'll be too many ;) */
1906 if (is_vmlinux(modname)) {
1da177e4 1907 have_vmlinux = 1;
1da177e4
LT
1908 mod->skip = 1;
1909 }
1910
b817f6fe 1911 license = get_modinfo(info.modinfo, info.modinfo_len, "license");
2fa36568
SR
1912 if (info.modinfo && !license && !is_vmlinux(modname))
1913 warn("modpost: missing MODULE_LICENSE() in %s\n"
1914 "see include/linux/module.h for "
1915 "more information\n", modname);
b817f6fe
SR
1916 while (license) {
1917 if (license_is_gpl_compatible(license))
1918 mod->gpl_compatible = 1;
1919 else {
1920 mod->gpl_compatible = 0;
1921 break;
1922 }
1923 license = get_next_modinfo(info.modinfo, info.modinfo_len,
1924 "license", license);
1925 }
1926
1da177e4 1927 for (sym = info.symtab_start; sym < info.symtab_stop; sym++) {
7d02b490 1928 symname = remove_dot(info.strtab + sym->st_name);
1da177e4
LT
1929
1930 handle_modversions(mod, &info, sym, symname);
1931 handle_moddevtable(mod, &info, sym, symname);
1932 }
d1f25e66 1933 if (!is_vmlinux(modname) ||
10668220
SR
1934 (is_vmlinux(modname) && vmlinux_section_warnings))
1935 check_sec_ref(mod, modname, &info);
1da177e4
LT
1936
1937 version = get_modinfo(info.modinfo, info.modinfo_len, "version");
1938 if (version)
1939 maybe_frob_rcs_version(modname, version, info.modinfo,
1940 version - (char *)info.hdr);
1941 if (version || (all_versions && !is_vmlinux(modname)))
1942 get_src_version(modname, mod->srcversion,
1943 sizeof(mod->srcversion)-1);
1944
1945 parse_elf_finish(&info);
1946
8c8ef42a 1947 /* Our trick to get versioning for module struct etc. - it's
1da177e4
LT
1948 * never passed as an argument to an exported function, so
1949 * the automatic versioning doesn't pick it up, but it's really
1950 * important anyhow */
1951 if (modversions)
8c8ef42a 1952 mod->unres = alloc_symbol("module_layout", 0, mod->unres);
1da177e4
LT
1953}
1954
712f9b46
RR
1955static void read_symbols_from_files(const char *filename)
1956{
1957 FILE *in = stdin;
1958 char fname[PATH_MAX];
1959
1960 if (strcmp(filename, "-") != 0) {
1961 in = fopen(filename, "r");
1962 if (!in)
1963 fatal("Can't open filenames file %s: %m", filename);
1964 }
1965
1966 while (fgets(fname, PATH_MAX, in) != NULL) {
1967 if (strends(fname, "\n"))
1968 fname[strlen(fname)-1] = '\0';
1969 read_symbols(fname);
1970 }
1971
1972 if (in != stdin)
1973 fclose(in);
1974}
1975
1da177e4
LT
1976#define SZ 500
1977
1978/* We first write the generated file into memory using the
1979 * following helper, then compare to the file on disk and
1980 * only update the later if anything changed */
1981
5c3ead8c
SR
1982void __attribute__((format(printf, 2, 3))) buf_printf(struct buffer *buf,
1983 const char *fmt, ...)
1da177e4
LT
1984{
1985 char tmp[SZ];
1986 int len;
1987 va_list ap;
62070fa4 1988
1da177e4
LT
1989 va_start(ap, fmt);
1990 len = vsnprintf(tmp, SZ, fmt, ap);
7670f023 1991 buf_write(buf, tmp, len);
1da177e4
LT
1992 va_end(ap);
1993}
1994
5c3ead8c 1995void buf_write(struct buffer *buf, const char *s, int len)
1da177e4
LT
1996{
1997 if (buf->size - buf->pos < len) {
7670f023 1998 buf->size += len + SZ;
1da177e4
LT
1999 buf->p = realloc(buf->p, buf->size);
2000 }
2001 strncpy(buf->p + buf->pos, s, len);
2002 buf->pos += len;
2003}
2004
c96fca21
SR
2005static void check_for_gpl_usage(enum export exp, const char *m, const char *s)
2006{
2007 const char *e = is_vmlinux(m) ?"":".ko";
2008
2009 switch (exp) {
2010 case export_gpl:
2011 fatal("modpost: GPL-incompatible module %s%s "
2012 "uses GPL-only symbol '%s'\n", m, e, s);
2013 break;
2014 case export_unused_gpl:
2015 fatal("modpost: GPL-incompatible module %s%s "
2016 "uses GPL-only symbol marked UNUSED '%s'\n", m, e, s);
2017 break;
2018 case export_gpl_future:
2019 warn("modpost: GPL-incompatible module %s%s "
2020 "uses future GPL-only symbol '%s'\n", m, e, s);
2021 break;
2022 case export_plain:
2023 case export_unused:
2024 case export_unknown:
2025 /* ignore */
2026 break;
2027 }
2028}
2029
df578e7d 2030static void check_for_unused(enum export exp, const char *m, const char *s)
c96fca21
SR
2031{
2032 const char *e = is_vmlinux(m) ?"":".ko";
2033
2034 switch (exp) {
2035 case export_unused:
2036 case export_unused_gpl:
2037 warn("modpost: module %s%s "
2038 "uses symbol '%s' marked UNUSED\n", m, e, s);
2039 break;
2040 default:
2041 /* ignore */
2042 break;
2043 }
2044}
2045
2046static void check_exports(struct module *mod)
b817f6fe
SR
2047{
2048 struct symbol *s, *exp;
2049
2050 for (s = mod->unres; s; s = s->next) {
6449bd62 2051 const char *basename;
b817f6fe
SR
2052 exp = find_symbol(s->name);
2053 if (!exp || exp->module == mod)
2054 continue;
6449bd62 2055 basename = strrchr(mod->name, '/');
b817f6fe
SR
2056 if (basename)
2057 basename++;
c96fca21
SR
2058 else
2059 basename = mod->name;
2060 if (!mod->gpl_compatible)
2061 check_for_gpl_usage(exp->export, basename, exp->name);
2062 check_for_unused(exp->export, basename, exp->name);
df578e7d 2063 }
b817f6fe
SR
2064}
2065
5c3ead8c
SR
2066/**
2067 * Header for the generated file
2068 **/
2069static void add_header(struct buffer *b, struct module *mod)
1da177e4
LT
2070{
2071 buf_printf(b, "#include <linux/module.h>\n");
2072 buf_printf(b, "#include <linux/vermagic.h>\n");
2073 buf_printf(b, "#include <linux/compiler.h>\n");
2074 buf_printf(b, "\n");
2075 buf_printf(b, "MODULE_INFO(vermagic, VERMAGIC_STRING);\n");
2076 buf_printf(b, "\n");
e0f244c6 2077 buf_printf(b, "__visible struct module __this_module\n");
1da177e4 2078 buf_printf(b, "__attribute__((section(\".gnu.linkonce.this_module\"))) = {\n");
3c7ec94d 2079 buf_printf(b, "\t.name = KBUILD_MODNAME,\n");
1da177e4 2080 if (mod->has_init)
3c7ec94d 2081 buf_printf(b, "\t.init = init_module,\n");
1da177e4
LT
2082 if (mod->has_cleanup)
2083 buf_printf(b, "#ifdef CONFIG_MODULE_UNLOAD\n"
3c7ec94d 2084 "\t.exit = cleanup_module,\n"
1da177e4 2085 "#endif\n");
3c7ec94d 2086 buf_printf(b, "\t.arch = MODULE_ARCH_INIT,\n");
1da177e4
LT
2087 buf_printf(b, "};\n");
2088}
2089
2449b8ba
BH
2090static void add_intree_flag(struct buffer *b, int is_intree)
2091{
2092 if (is_intree)
2093 buf_printf(b, "\nMODULE_INFO(intree, \"Y\");\n");
2094}
2095
5c725138 2096static void add_staging_flag(struct buffer *b, const char *name)
a9860bf0
GKH
2097{
2098 static const char *staging_dir = "drivers/staging";
2099
2100 if (strncmp(staging_dir, name, strlen(staging_dir)) == 0)
2101 buf_printf(b, "\nMODULE_INFO(staging, \"Y\");\n");
2102}
2103
5c3ead8c
SR
2104/**
2105 * Record CRCs for unresolved symbols
2106 **/
c53ddacd 2107static int add_versions(struct buffer *b, struct module *mod)
1da177e4
LT
2108{
2109 struct symbol *s, *exp;
c53ddacd 2110 int err = 0;
1da177e4
LT
2111
2112 for (s = mod->unres; s; s = s->next) {
2113 exp = find_symbol(s->name);
2114 if (!exp || exp->module == mod) {
c53ddacd 2115 if (have_vmlinux && !s->weak) {
2a116659
MW
2116 if (warn_unresolved) {
2117 warn("\"%s\" [%s.ko] undefined!\n",
2118 s->name, mod->name);
2119 } else {
2120 merror("\"%s\" [%s.ko] undefined!\n",
bb66fc67 2121 s->name, mod->name);
2a116659
MW
2122 err = 1;
2123 }
c53ddacd 2124 }
1da177e4
LT
2125 continue;
2126 }
2127 s->module = exp->module;
2128 s->crc_valid = exp->crc_valid;
2129 s->crc = exp->crc;
2130 }
2131
2132 if (!modversions)
c53ddacd 2133 return err;
1da177e4
LT
2134
2135 buf_printf(b, "\n");
2136 buf_printf(b, "static const struct modversion_info ____versions[]\n");
3ff6eecc 2137 buf_printf(b, "__used\n");
1da177e4
LT
2138 buf_printf(b, "__attribute__((section(\"__versions\"))) = {\n");
2139
2140 for (s = mod->unres; s; s = s->next) {
df578e7d 2141 if (!s->module)
1da177e4 2142 continue;
1da177e4 2143 if (!s->crc_valid) {
cb80514d 2144 warn("\"%s\" [%s.ko] has no CRC!\n",
1da177e4
LT
2145 s->name, mod->name);
2146 continue;
2147 }
a53a11f3 2148 buf_printf(b, "\t{ %#8x, __VMLINUX_SYMBOL_STR(%s) },\n",
a4b6a77b 2149 s->crc, s->name);
1da177e4
LT
2150 }
2151
2152 buf_printf(b, "};\n");
c53ddacd
KK
2153
2154 return err;
1da177e4
LT
2155}
2156
5c3ead8c
SR
2157static void add_depends(struct buffer *b, struct module *mod,
2158 struct module *modules)
1da177e4
LT
2159{
2160 struct symbol *s;
2161 struct module *m;
2162 int first = 1;
2163
df578e7d 2164 for (m = modules; m; m = m->next)
1da177e4 2165 m->seen = is_vmlinux(m->name);
1da177e4
LT
2166
2167 buf_printf(b, "\n");
2168 buf_printf(b, "static const char __module_depends[]\n");
3ff6eecc 2169 buf_printf(b, "__used\n");
1da177e4
LT
2170 buf_printf(b, "__attribute__((section(\".modinfo\"))) =\n");
2171 buf_printf(b, "\"depends=");
2172 for (s = mod->unres; s; s = s->next) {
a61b2dfd 2173 const char *p;
1da177e4
LT
2174 if (!s->module)
2175 continue;
2176
2177 if (s->module->seen)
2178 continue;
2179
2180 s->module->seen = 1;
df578e7d
SR
2181 p = strrchr(s->module->name, '/');
2182 if (p)
a61b2dfd
SR
2183 p++;
2184 else
2185 p = s->module->name;
2186 buf_printf(b, "%s%s", first ? "" : ",", p);
1da177e4
LT
2187 first = 0;
2188 }
2189 buf_printf(b, "\";\n");
2190}
2191
5c3ead8c 2192static void add_srcversion(struct buffer *b, struct module *mod)
1da177e4
LT
2193{
2194 if (mod->srcversion[0]) {
2195 buf_printf(b, "\n");
2196 buf_printf(b, "MODULE_INFO(srcversion, \"%s\");\n",
2197 mod->srcversion);
2198 }
2199}
2200
5c3ead8c 2201static void write_if_changed(struct buffer *b, const char *fname)
1da177e4
LT
2202{
2203 char *tmp;
2204 FILE *file;
2205 struct stat st;
2206
2207 file = fopen(fname, "r");
2208 if (!file)
2209 goto write;
2210
2211 if (fstat(fileno(file), &st) < 0)
2212 goto close_write;
2213
2214 if (st.st_size != b->pos)
2215 goto close_write;
2216
2217 tmp = NOFAIL(malloc(b->pos));
2218 if (fread(tmp, 1, b->pos, file) != b->pos)
2219 goto free_write;
2220
2221 if (memcmp(tmp, b->p, b->pos) != 0)
2222 goto free_write;
2223
2224 free(tmp);
2225 fclose(file);
2226 return;
2227
2228 free_write:
2229 free(tmp);
2230 close_write:
2231 fclose(file);
2232 write:
2233 file = fopen(fname, "w");
2234 if (!file) {
2235 perror(fname);
2236 exit(1);
2237 }
2238 if (fwrite(b->p, 1, b->pos, file) != b->pos) {
2239 perror(fname);
2240 exit(1);
2241 }
2242 fclose(file);
2243}
2244
bd5cbced 2245/* parse Module.symvers file. line format:
534b89a9 2246 * 0x12345678<tab>symbol<tab>module[[<tab>export]<tab>something]
bd5cbced 2247 **/
040fcc81 2248static void read_dump(const char *fname, unsigned int kernel)
1da177e4
LT
2249{
2250 unsigned long size, pos = 0;
2251 void *file = grab_file(fname, &size);
2252 char *line;
2253
df578e7d 2254 if (!file)
1da177e4
LT
2255 /* No symbol versions, silently ignore */
2256 return;
2257
2258 while ((line = get_next_line(&pos, file, size))) {
534b89a9 2259 char *symname, *modname, *d, *export, *end;
1da177e4
LT
2260 unsigned int crc;
2261 struct module *mod;
040fcc81 2262 struct symbol *s;
1da177e4
LT
2263
2264 if (!(symname = strchr(line, '\t')))
2265 goto fail;
2266 *symname++ = '\0';
2267 if (!(modname = strchr(symname, '\t')))
2268 goto fail;
2269 *modname++ = '\0';
9ac545b0 2270 if ((export = strchr(modname, '\t')) != NULL)
bd5cbced 2271 *export++ = '\0';
534b89a9
SR
2272 if (export && ((end = strchr(export, '\t')) != NULL))
2273 *end = '\0';
1da177e4
LT
2274 crc = strtoul(line, &d, 16);
2275 if (*symname == '\0' || *modname == '\0' || *d != '\0')
2276 goto fail;
df578e7d
SR
2277 mod = find_module(modname);
2278 if (!mod) {
2279 if (is_vmlinux(modname))
1da177e4 2280 have_vmlinux = 1;
0fa3a88c 2281 mod = new_module(modname);
1da177e4
LT
2282 mod->skip = 1;
2283 }
bd5cbced 2284 s = sym_add_exported(symname, mod, export_no(export));
8e70c458
SR
2285 s->kernel = kernel;
2286 s->preloaded = 1;
bd5cbced 2287 sym_update_crc(symname, mod, crc, export_no(export));
1da177e4 2288 }
2ee41e62 2289 release_file(file, size);
1da177e4
LT
2290 return;
2291fail:
2ee41e62 2292 release_file(file, size);
1da177e4
LT
2293 fatal("parse error in symbol dump file\n");
2294}
2295
040fcc81
SR
2296/* For normal builds always dump all symbols.
2297 * For external modules only dump symbols
2298 * that are not read from kernel Module.symvers.
2299 **/
2300static int dump_sym(struct symbol *sym)
2301{
2302 if (!external_module)
2303 return 1;
2304 if (sym->vmlinux || sym->kernel)
2305 return 0;
2306 return 1;
2307}
62070fa4 2308
5c3ead8c 2309static void write_dump(const char *fname)
1da177e4
LT
2310{
2311 struct buffer buf = { };
2312 struct symbol *symbol;
2313 int n;
2314
2315 for (n = 0; n < SYMBOL_HASH_SIZE ; n++) {
2316 symbol = symbolhash[n];
2317 while (symbol) {
040fcc81 2318 if (dump_sym(symbol))
bd5cbced 2319 buf_printf(&buf, "0x%08x\t%s\t%s\t%s\n",
62070fa4 2320 symbol->crc, symbol->name,
bd5cbced
RP
2321 symbol->module->name,
2322 export_str(symbol->export));
1da177e4
LT
2323 symbol = symbol->next;
2324 }
2325 }
2326 write_if_changed(&buf, fname);
2327}
2328
2d04b5ae
RH
2329struct ext_sym_list {
2330 struct ext_sym_list *next;
2331 const char *file;
2332};
2333
5c3ead8c 2334int main(int argc, char **argv)
1da177e4
LT
2335{
2336 struct module *mod;
2337 struct buffer buf = { };
040fcc81 2338 char *kernel_read = NULL, *module_read = NULL;
712f9b46 2339 char *dump_write = NULL, *files_source = NULL;
1da177e4 2340 int opt;
c53ddacd 2341 int err;
2d04b5ae
RH
2342 struct ext_sym_list *extsym_iter;
2343 struct ext_sym_list *extsym_start = NULL;
1da177e4 2344
eed380f3 2345 while ((opt = getopt(argc, argv, "i:I:e:mnsST:o:awM:K:")) != -1) {
df578e7d
SR
2346 switch (opt) {
2347 case 'i':
2348 kernel_read = optarg;
2349 break;
2350 case 'I':
2351 module_read = optarg;
2352 external_module = 1;
2353 break;
2d04b5ae
RH
2354 case 'e':
2355 external_module = 1;
2356 extsym_iter =
2357 NOFAIL(malloc(sizeof(*extsym_iter)));
2358 extsym_iter->next = extsym_start;
2359 extsym_iter->file = optarg;
2360 extsym_start = extsym_iter;
2361 break;
df578e7d
SR
2362 case 'm':
2363 modversions = 1;
2364 break;
eed380f3
GR
2365 case 'n':
2366 ignore_missing_files = 1;
2367 break;
df578e7d
SR
2368 case 'o':
2369 dump_write = optarg;
2370 break;
2371 case 'a':
2372 all_versions = 1;
2373 break;
2374 case 's':
2375 vmlinux_section_warnings = 0;
2376 break;
588ccd73
SR
2377 case 'S':
2378 sec_mismatch_verbose = 0;
2379 break;
712f9b46
RR
2380 case 'T':
2381 files_source = optarg;
2382 break;
df578e7d
SR
2383 case 'w':
2384 warn_unresolved = 1;
2385 break;
2386 default:
2387 exit(1);
1da177e4
LT
2388 }
2389 }
2390
040fcc81
SR
2391 if (kernel_read)
2392 read_dump(kernel_read, 1);
2393 if (module_read)
2394 read_dump(module_read, 0);
2d04b5ae
RH
2395 while (extsym_start) {
2396 read_dump(extsym_start->file, 0);
2397 extsym_iter = extsym_start->next;
2398 free(extsym_start);
2399 extsym_start = extsym_iter;
2400 }
1da177e4 2401
df578e7d 2402 while (optind < argc)
1da177e4 2403 read_symbols(argv[optind++]);
1da177e4 2404
712f9b46
RR
2405 if (files_source)
2406 read_symbols_from_files(files_source);
2407
b817f6fe
SR
2408 for (mod = modules; mod; mod = mod->next) {
2409 if (mod->skip)
2410 continue;
c96fca21 2411 check_exports(mod);
b817f6fe
SR
2412 }
2413
c53ddacd
KK
2414 err = 0;
2415
1da177e4 2416 for (mod = modules; mod; mod = mod->next) {
d93e1719 2417 char fname[PATH_MAX];
666ab414 2418
1da177e4
LT
2419 if (mod->skip)
2420 continue;
2421
2422 buf.pos = 0;
2423
2424 add_header(&buf, mod);
2449b8ba 2425 add_intree_flag(&buf, !external_module);
a9860bf0 2426 add_staging_flag(&buf, mod->name);
c53ddacd 2427 err |= add_versions(&buf, mod);
1da177e4
LT
2428 add_depends(&buf, mod, modules);
2429 add_moddevtable(&buf, mod);
2430 add_srcversion(&buf, mod);
2431
2432 sprintf(fname, "%s.mod.c", mod->name);
2433 write_if_changed(&buf, fname);
2434 }
2435
2436 if (dump_write)
2437 write_dump(dump_write);
588ccd73 2438 if (sec_mismatch_count && !sec_mismatch_verbose)
7c0ac495
GU
2439 warn("modpost: Found %d section mismatch(es).\n"
2440 "To see full details build your kernel with:\n"
2441 "'make CONFIG_DEBUG_SECTION_MISMATCH=y'\n",
2442 sec_mismatch_count);
1da177e4 2443
c53ddacd 2444 return err;
1da177e4 2445}
This page took 0.883274 seconds and 5 git commands to generate.