Loading...
1/* Postprocess module symbol versions
2 *
3 * Copyright 2003 Kai Germaschewski
4 * Copyright 2002-2004 Rusty Russell, IBM Corporation
5 * Copyright 2006-2008 Sam Ravnborg
6 * Based in part on module-init-tools/depmod.c,file2alias
7 *
8 * This software may be used and distributed according to the terms
9 * of the GNU General Public License, incorporated herein by reference.
10 *
11 * Usage: modpost vmlinux module1.o module2.o ...
12 */
13
14#define _GNU_SOURCE
15#include <elf.h>
16#include <fnmatch.h>
17#include <stdio.h>
18#include <ctype.h>
19#include <string.h>
20#include <limits.h>
21#include <stdbool.h>
22#include <errno.h>
23#include "modpost.h"
24#include "../../include/linux/license.h"
25
26static bool module_enabled;
27/* Are we using CONFIG_MODVERSIONS? */
28static bool modversions;
29/* Is CONFIG_MODULE_SRCVERSION_ALL set? */
30static bool all_versions;
31/* If we are modposting external module set to 1 */
32static bool external_module;
33/* Only warn about unresolved symbols */
34static bool warn_unresolved;
35
36static int sec_mismatch_count;
37static bool sec_mismatch_warn_only = true;
38/* Trim EXPORT_SYMBOLs that are unused by in-tree modules */
39static bool trim_unused_exports;
40
41/* ignore missing files */
42static bool ignore_missing_files;
43/* If set to 1, only warn (instead of error) about missing ns imports */
44static bool allow_missing_ns_imports;
45
46static bool error_occurred;
47
48static bool extra_warn;
49
50/*
51 * Cut off the warnings when there are too many. This typically occurs when
52 * vmlinux is missing. ('make modules' without building vmlinux.)
53 */
54#define MAX_UNRESOLVED_REPORTS 10
55static unsigned int nr_unresolved;
56
57/* In kernel, this size is defined in linux/module.h;
58 * here we use Elf_Addr instead of long for covering cross-compile
59 */
60
61#define MODULE_NAME_LEN (64 - sizeof(Elf_Addr))
62
63void modpost_log(enum loglevel loglevel, const char *fmt, ...)
64{
65 va_list arglist;
66
67 switch (loglevel) {
68 case LOG_WARN:
69 fprintf(stderr, "WARNING: ");
70 break;
71 case LOG_ERROR:
72 fprintf(stderr, "ERROR: ");
73 error_occurred = true;
74 break;
75 default: /* invalid loglevel, ignore */
76 break;
77 }
78
79 fprintf(stderr, "modpost: ");
80
81 va_start(arglist, fmt);
82 vfprintf(stderr, fmt, arglist);
83 va_end(arglist);
84}
85
86static inline bool strends(const char *str, const char *postfix)
87{
88 if (strlen(str) < strlen(postfix))
89 return false;
90
91 return strcmp(str + strlen(str) - strlen(postfix), postfix) == 0;
92}
93
94void *do_nofail(void *ptr, const char *expr)
95{
96 if (!ptr)
97 fatal("Memory allocation failure: %s.\n", expr);
98
99 return ptr;
100}
101
102char *read_text_file(const char *filename)
103{
104 struct stat st;
105 size_t nbytes;
106 int fd;
107 char *buf;
108
109 fd = open(filename, O_RDONLY);
110 if (fd < 0) {
111 perror(filename);
112 exit(1);
113 }
114
115 if (fstat(fd, &st) < 0) {
116 perror(filename);
117 exit(1);
118 }
119
120 buf = NOFAIL(malloc(st.st_size + 1));
121
122 nbytes = st.st_size;
123
124 while (nbytes) {
125 ssize_t bytes_read;
126
127 bytes_read = read(fd, buf, nbytes);
128 if (bytes_read < 0) {
129 perror(filename);
130 exit(1);
131 }
132
133 nbytes -= bytes_read;
134 }
135 buf[st.st_size] = '\0';
136
137 close(fd);
138
139 return buf;
140}
141
142char *get_line(char **stringp)
143{
144 char *orig = *stringp, *next;
145
146 /* do not return the unwanted extra line at EOF */
147 if (!orig || *orig == '\0')
148 return NULL;
149
150 /* don't use strsep here, it is not available everywhere */
151 next = strchr(orig, '\n');
152 if (next)
153 *next++ = '\0';
154
155 *stringp = next;
156
157 return orig;
158}
159
160/* A list of all modules we processed */
161LIST_HEAD(modules);
162
163static struct module *find_module(const char *modname)
164{
165 struct module *mod;
166
167 list_for_each_entry(mod, &modules, list) {
168 if (strcmp(mod->name, modname) == 0)
169 return mod;
170 }
171 return NULL;
172}
173
174static struct module *new_module(const char *name, size_t namelen)
175{
176 struct module *mod;
177
178 mod = NOFAIL(malloc(sizeof(*mod) + namelen + 1));
179 memset(mod, 0, sizeof(*mod));
180
181 INIT_LIST_HEAD(&mod->exported_symbols);
182 INIT_LIST_HEAD(&mod->unresolved_symbols);
183 INIT_LIST_HEAD(&mod->missing_namespaces);
184 INIT_LIST_HEAD(&mod->imported_namespaces);
185
186 memcpy(mod->name, name, namelen);
187 mod->name[namelen] = '\0';
188 mod->is_vmlinux = (strcmp(mod->name, "vmlinux") == 0);
189
190 /*
191 * Set mod->is_gpl_compatible to true by default. If MODULE_LICENSE()
192 * is missing, do not check the use for EXPORT_SYMBOL_GPL() becasue
193 * modpost will exit wiht error anyway.
194 */
195 mod->is_gpl_compatible = true;
196
197 list_add_tail(&mod->list, &modules);
198
199 return mod;
200}
201
202/* A hash of all exported symbols,
203 * struct symbol is also used for lists of unresolved symbols */
204
205#define SYMBOL_HASH_SIZE 1024
206
207struct symbol {
208 struct symbol *next;
209 struct list_head list; /* link to module::exported_symbols or module::unresolved_symbols */
210 struct module *module;
211 char *namespace;
212 unsigned int crc;
213 bool crc_valid;
214 bool weak;
215 bool is_func;
216 bool is_gpl_only; /* exported by EXPORT_SYMBOL_GPL */
217 bool used; /* there exists a user of this symbol */
218 char name[];
219};
220
221static struct symbol *symbolhash[SYMBOL_HASH_SIZE];
222
223/* This is based on the hash algorithm from gdbm, via tdb */
224static inline unsigned int tdb_hash(const char *name)
225{
226 unsigned value; /* Used to compute the hash value. */
227 unsigned i; /* Used to cycle through random values. */
228
229 /* Set the initial value from the key size. */
230 for (value = 0x238F13AF * strlen(name), i = 0; name[i]; i++)
231 value = (value + (((unsigned char *)name)[i] << (i*5 % 24)));
232
233 return (1103515243 * value + 12345);
234}
235
236/**
237 * Allocate a new symbols for use in the hash of exported symbols or
238 * the list of unresolved symbols per module
239 **/
240static struct symbol *alloc_symbol(const char *name)
241{
242 struct symbol *s = NOFAIL(malloc(sizeof(*s) + strlen(name) + 1));
243
244 memset(s, 0, sizeof(*s));
245 strcpy(s->name, name);
246
247 return s;
248}
249
250/* For the hash of exported symbols */
251static void hash_add_symbol(struct symbol *sym)
252{
253 unsigned int hash;
254
255 hash = tdb_hash(sym->name) % SYMBOL_HASH_SIZE;
256 sym->next = symbolhash[hash];
257 symbolhash[hash] = sym;
258}
259
260static void sym_add_unresolved(const char *name, struct module *mod, bool weak)
261{
262 struct symbol *sym;
263
264 sym = alloc_symbol(name);
265 sym->weak = weak;
266
267 list_add_tail(&sym->list, &mod->unresolved_symbols);
268}
269
270static struct symbol *sym_find_with_module(const char *name, struct module *mod)
271{
272 struct symbol *s;
273
274 /* For our purposes, .foo matches foo. PPC64 needs this. */
275 if (name[0] == '.')
276 name++;
277
278 for (s = symbolhash[tdb_hash(name) % SYMBOL_HASH_SIZE]; s; s = s->next) {
279 if (strcmp(s->name, name) == 0 && (!mod || s->module == mod))
280 return s;
281 }
282 return NULL;
283}
284
285static struct symbol *find_symbol(const char *name)
286{
287 return sym_find_with_module(name, NULL);
288}
289
290struct namespace_list {
291 struct list_head list;
292 char namespace[];
293};
294
295static bool contains_namespace(struct list_head *head, const char *namespace)
296{
297 struct namespace_list *list;
298
299 /*
300 * The default namespace is null string "", which is always implicitly
301 * contained.
302 */
303 if (!namespace[0])
304 return true;
305
306 list_for_each_entry(list, head, list) {
307 if (!strcmp(list->namespace, namespace))
308 return true;
309 }
310
311 return false;
312}
313
314static void add_namespace(struct list_head *head, const char *namespace)
315{
316 struct namespace_list *ns_entry;
317
318 if (!contains_namespace(head, namespace)) {
319 ns_entry = NOFAIL(malloc(sizeof(*ns_entry) +
320 strlen(namespace) + 1));
321 strcpy(ns_entry->namespace, namespace);
322 list_add_tail(&ns_entry->list, head);
323 }
324}
325
326static void *sym_get_data_by_offset(const struct elf_info *info,
327 unsigned int secindex, unsigned long offset)
328{
329 Elf_Shdr *sechdr = &info->sechdrs[secindex];
330
331 return (void *)info->hdr + sechdr->sh_offset + offset;
332}
333
334void *sym_get_data(const struct elf_info *info, const Elf_Sym *sym)
335{
336 return sym_get_data_by_offset(info, get_secindex(info, sym),
337 sym->st_value);
338}
339
340static const char *sech_name(const struct elf_info *info, Elf_Shdr *sechdr)
341{
342 return sym_get_data_by_offset(info, info->secindex_strings,
343 sechdr->sh_name);
344}
345
346static const char *sec_name(const struct elf_info *info, unsigned int secindex)
347{
348 /*
349 * If sym->st_shndx is a special section index, there is no
350 * corresponding section header.
351 * Return "" if the index is out of range of info->sechdrs[] array.
352 */
353 if (secindex >= info->num_sections)
354 return "";
355
356 return sech_name(info, &info->sechdrs[secindex]);
357}
358
359#define strstarts(str, prefix) (strncmp(str, prefix, strlen(prefix)) == 0)
360
361static struct symbol *sym_add_exported(const char *name, struct module *mod,
362 bool gpl_only, const char *namespace)
363{
364 struct symbol *s = find_symbol(name);
365
366 if (s && (!external_module || s->module->is_vmlinux || s->module == mod)) {
367 error("%s: '%s' exported twice. Previous export was in %s%s\n",
368 mod->name, name, s->module->name,
369 s->module->is_vmlinux ? "" : ".ko");
370 }
371
372 s = alloc_symbol(name);
373 s->module = mod;
374 s->is_gpl_only = gpl_only;
375 s->namespace = NOFAIL(strdup(namespace));
376 list_add_tail(&s->list, &mod->exported_symbols);
377 hash_add_symbol(s);
378
379 return s;
380}
381
382static void sym_set_crc(struct symbol *sym, unsigned int crc)
383{
384 sym->crc = crc;
385 sym->crc_valid = true;
386}
387
388static void *grab_file(const char *filename, size_t *size)
389{
390 struct stat st;
391 void *map = MAP_FAILED;
392 int fd;
393
394 fd = open(filename, O_RDONLY);
395 if (fd < 0)
396 return NULL;
397 if (fstat(fd, &st))
398 goto failed;
399
400 *size = st.st_size;
401 map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
402
403failed:
404 close(fd);
405 if (map == MAP_FAILED)
406 return NULL;
407 return map;
408}
409
410static void release_file(void *file, size_t size)
411{
412 munmap(file, size);
413}
414
415static int parse_elf(struct elf_info *info, const char *filename)
416{
417 unsigned int i;
418 Elf_Ehdr *hdr;
419 Elf_Shdr *sechdrs;
420 Elf_Sym *sym;
421 const char *secstrings;
422 unsigned int symtab_idx = ~0U, symtab_shndx_idx = ~0U;
423
424 hdr = grab_file(filename, &info->size);
425 if (!hdr) {
426 if (ignore_missing_files) {
427 fprintf(stderr, "%s: %s (ignored)\n", filename,
428 strerror(errno));
429 return 0;
430 }
431 perror(filename);
432 exit(1);
433 }
434 info->hdr = hdr;
435 if (info->size < sizeof(*hdr)) {
436 /* file too small, assume this is an empty .o file */
437 return 0;
438 }
439 /* Is this a valid ELF file? */
440 if ((hdr->e_ident[EI_MAG0] != ELFMAG0) ||
441 (hdr->e_ident[EI_MAG1] != ELFMAG1) ||
442 (hdr->e_ident[EI_MAG2] != ELFMAG2) ||
443 (hdr->e_ident[EI_MAG3] != ELFMAG3)) {
444 /* Not an ELF file - silently ignore it */
445 return 0;
446 }
447 /* Fix endianness in ELF header */
448 hdr->e_type = TO_NATIVE(hdr->e_type);
449 hdr->e_machine = TO_NATIVE(hdr->e_machine);
450 hdr->e_version = TO_NATIVE(hdr->e_version);
451 hdr->e_entry = TO_NATIVE(hdr->e_entry);
452 hdr->e_phoff = TO_NATIVE(hdr->e_phoff);
453 hdr->e_shoff = TO_NATIVE(hdr->e_shoff);
454 hdr->e_flags = TO_NATIVE(hdr->e_flags);
455 hdr->e_ehsize = TO_NATIVE(hdr->e_ehsize);
456 hdr->e_phentsize = TO_NATIVE(hdr->e_phentsize);
457 hdr->e_phnum = TO_NATIVE(hdr->e_phnum);
458 hdr->e_shentsize = TO_NATIVE(hdr->e_shentsize);
459 hdr->e_shnum = TO_NATIVE(hdr->e_shnum);
460 hdr->e_shstrndx = TO_NATIVE(hdr->e_shstrndx);
461 sechdrs = (void *)hdr + hdr->e_shoff;
462 info->sechdrs = sechdrs;
463
464 /* modpost only works for relocatable objects */
465 if (hdr->e_type != ET_REL)
466 fatal("%s: not relocatable object.", filename);
467
468 /* Check if file offset is correct */
469 if (hdr->e_shoff > info->size)
470 fatal("section header offset=%lu in file '%s' is bigger than filesize=%zu\n",
471 (unsigned long)hdr->e_shoff, filename, info->size);
472
473 if (hdr->e_shnum == SHN_UNDEF) {
474 /*
475 * There are more than 64k sections,
476 * read count from .sh_size.
477 */
478 info->num_sections = TO_NATIVE(sechdrs[0].sh_size);
479 }
480 else {
481 info->num_sections = hdr->e_shnum;
482 }
483 if (hdr->e_shstrndx == SHN_XINDEX) {
484 info->secindex_strings = TO_NATIVE(sechdrs[0].sh_link);
485 }
486 else {
487 info->secindex_strings = hdr->e_shstrndx;
488 }
489
490 /* Fix endianness in section headers */
491 for (i = 0; i < info->num_sections; i++) {
492 sechdrs[i].sh_name = TO_NATIVE(sechdrs[i].sh_name);
493 sechdrs[i].sh_type = TO_NATIVE(sechdrs[i].sh_type);
494 sechdrs[i].sh_flags = TO_NATIVE(sechdrs[i].sh_flags);
495 sechdrs[i].sh_addr = TO_NATIVE(sechdrs[i].sh_addr);
496 sechdrs[i].sh_offset = TO_NATIVE(sechdrs[i].sh_offset);
497 sechdrs[i].sh_size = TO_NATIVE(sechdrs[i].sh_size);
498 sechdrs[i].sh_link = TO_NATIVE(sechdrs[i].sh_link);
499 sechdrs[i].sh_info = TO_NATIVE(sechdrs[i].sh_info);
500 sechdrs[i].sh_addralign = TO_NATIVE(sechdrs[i].sh_addralign);
501 sechdrs[i].sh_entsize = TO_NATIVE(sechdrs[i].sh_entsize);
502 }
503 /* Find symbol table. */
504 secstrings = (void *)hdr + sechdrs[info->secindex_strings].sh_offset;
505 for (i = 1; i < info->num_sections; i++) {
506 const char *secname;
507 int nobits = sechdrs[i].sh_type == SHT_NOBITS;
508
509 if (!nobits && sechdrs[i].sh_offset > info->size)
510 fatal("%s is truncated. sechdrs[i].sh_offset=%lu > sizeof(*hrd)=%zu\n",
511 filename, (unsigned long)sechdrs[i].sh_offset,
512 sizeof(*hdr));
513
514 secname = secstrings + sechdrs[i].sh_name;
515 if (strcmp(secname, ".modinfo") == 0) {
516 if (nobits)
517 fatal("%s has NOBITS .modinfo\n", filename);
518 info->modinfo = (void *)hdr + sechdrs[i].sh_offset;
519 info->modinfo_len = sechdrs[i].sh_size;
520 } else if (!strcmp(secname, ".export_symbol")) {
521 info->export_symbol_secndx = i;
522 }
523
524 if (sechdrs[i].sh_type == SHT_SYMTAB) {
525 unsigned int sh_link_idx;
526 symtab_idx = i;
527 info->symtab_start = (void *)hdr +
528 sechdrs[i].sh_offset;
529 info->symtab_stop = (void *)hdr +
530 sechdrs[i].sh_offset + sechdrs[i].sh_size;
531 sh_link_idx = sechdrs[i].sh_link;
532 info->strtab = (void *)hdr +
533 sechdrs[sh_link_idx].sh_offset;
534 }
535
536 /* 32bit section no. table? ("more than 64k sections") */
537 if (sechdrs[i].sh_type == SHT_SYMTAB_SHNDX) {
538 symtab_shndx_idx = i;
539 info->symtab_shndx_start = (void *)hdr +
540 sechdrs[i].sh_offset;
541 info->symtab_shndx_stop = (void *)hdr +
542 sechdrs[i].sh_offset + sechdrs[i].sh_size;
543 }
544 }
545 if (!info->symtab_start)
546 fatal("%s has no symtab?\n", filename);
547
548 /* Fix endianness in symbols */
549 for (sym = info->symtab_start; sym < info->symtab_stop; sym++) {
550 sym->st_shndx = TO_NATIVE(sym->st_shndx);
551 sym->st_name = TO_NATIVE(sym->st_name);
552 sym->st_value = TO_NATIVE(sym->st_value);
553 sym->st_size = TO_NATIVE(sym->st_size);
554 }
555
556 if (symtab_shndx_idx != ~0U) {
557 Elf32_Word *p;
558 if (symtab_idx != sechdrs[symtab_shndx_idx].sh_link)
559 fatal("%s: SYMTAB_SHNDX has bad sh_link: %u!=%u\n",
560 filename, sechdrs[symtab_shndx_idx].sh_link,
561 symtab_idx);
562 /* Fix endianness */
563 for (p = info->symtab_shndx_start; p < info->symtab_shndx_stop;
564 p++)
565 *p = TO_NATIVE(*p);
566 }
567
568 symsearch_init(info);
569
570 return 1;
571}
572
573static void parse_elf_finish(struct elf_info *info)
574{
575 symsearch_finish(info);
576 release_file(info->hdr, info->size);
577}
578
579static int ignore_undef_symbol(struct elf_info *info, const char *symname)
580{
581 /* ignore __this_module, it will be resolved shortly */
582 if (strcmp(symname, "__this_module") == 0)
583 return 1;
584 /* ignore global offset table */
585 if (strcmp(symname, "_GLOBAL_OFFSET_TABLE_") == 0)
586 return 1;
587 if (info->hdr->e_machine == EM_PPC)
588 /* Special register function linked on all modules during final link of .ko */
589 if (strstarts(symname, "_restgpr_") ||
590 strstarts(symname, "_savegpr_") ||
591 strstarts(symname, "_rest32gpr_") ||
592 strstarts(symname, "_save32gpr_") ||
593 strstarts(symname, "_restvr_") ||
594 strstarts(symname, "_savevr_"))
595 return 1;
596 if (info->hdr->e_machine == EM_PPC64)
597 /* Special register function linked on all modules during final link of .ko */
598 if (strstarts(symname, "_restgpr0_") ||
599 strstarts(symname, "_savegpr0_") ||
600 strstarts(symname, "_restvr_") ||
601 strstarts(symname, "_savevr_") ||
602 strcmp(symname, ".TOC.") == 0)
603 return 1;
604
605 if (info->hdr->e_machine == EM_S390)
606 /* Expoline thunks are linked on all kernel modules during final link of .ko */
607 if (strstarts(symname, "__s390_indirect_jump_r"))
608 return 1;
609 /* Do not ignore this symbol */
610 return 0;
611}
612
613static void handle_symbol(struct module *mod, struct elf_info *info,
614 const Elf_Sym *sym, const char *symname)
615{
616 switch (sym->st_shndx) {
617 case SHN_COMMON:
618 if (strstarts(symname, "__gnu_lto_")) {
619 /* Should warn here, but modpost runs before the linker */
620 } else
621 warn("\"%s\" [%s] is COMMON symbol\n", symname, mod->name);
622 break;
623 case SHN_UNDEF:
624 /* undefined symbol */
625 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
626 ELF_ST_BIND(sym->st_info) != STB_WEAK)
627 break;
628 if (ignore_undef_symbol(info, symname))
629 break;
630 if (info->hdr->e_machine == EM_SPARC ||
631 info->hdr->e_machine == EM_SPARCV9) {
632 /* Ignore register directives. */
633 if (ELF_ST_TYPE(sym->st_info) == STT_SPARC_REGISTER)
634 break;
635 if (symname[0] == '.') {
636 char *munged = NOFAIL(strdup(symname));
637 munged[0] = '_';
638 munged[1] = toupper(munged[1]);
639 symname = munged;
640 }
641 }
642
643 sym_add_unresolved(symname, mod,
644 ELF_ST_BIND(sym->st_info) == STB_WEAK);
645 break;
646 default:
647 if (strcmp(symname, "init_module") == 0)
648 mod->has_init = true;
649 if (strcmp(symname, "cleanup_module") == 0)
650 mod->has_cleanup = true;
651 break;
652 }
653}
654
655/**
656 * Parse tag=value strings from .modinfo section
657 **/
658static char *next_string(char *string, unsigned long *secsize)
659{
660 /* Skip non-zero chars */
661 while (string[0]) {
662 string++;
663 if ((*secsize)-- <= 1)
664 return NULL;
665 }
666
667 /* Skip any zero padding. */
668 while (!string[0]) {
669 string++;
670 if ((*secsize)-- <= 1)
671 return NULL;
672 }
673 return string;
674}
675
676static char *get_next_modinfo(struct elf_info *info, const char *tag,
677 char *prev)
678{
679 char *p;
680 unsigned int taglen = strlen(tag);
681 char *modinfo = info->modinfo;
682 unsigned long size = info->modinfo_len;
683
684 if (prev) {
685 size -= prev - modinfo;
686 modinfo = next_string(prev, &size);
687 }
688
689 for (p = modinfo; p; p = next_string(p, &size)) {
690 if (strncmp(p, tag, taglen) == 0 && p[taglen] == '=')
691 return p + taglen + 1;
692 }
693 return NULL;
694}
695
696static char *get_modinfo(struct elf_info *info, const char *tag)
697
698{
699 return get_next_modinfo(info, tag, NULL);
700}
701
702static const char *sym_name(struct elf_info *elf, Elf_Sym *sym)
703{
704 if (sym)
705 return elf->strtab + sym->st_name;
706 else
707 return "(unknown)";
708}
709
710/*
711 * Check whether the 'string' argument matches one of the 'patterns',
712 * an array of shell wildcard patterns (glob).
713 *
714 * Return true is there is a match.
715 */
716static bool match(const char *string, const char *const patterns[])
717{
718 const char *pattern;
719
720 while ((pattern = *patterns++)) {
721 if (!fnmatch(pattern, string, 0))
722 return true;
723 }
724
725 return false;
726}
727
728/* useful to pass patterns to match() directly */
729#define PATTERNS(...) \
730 ({ \
731 static const char *const patterns[] = {__VA_ARGS__, NULL}; \
732 patterns; \
733 })
734
735/* sections that we do not want to do full section mismatch check on */
736static const char *const section_white_list[] =
737{
738 ".comment*",
739 ".debug*",
740 ".zdebug*", /* Compressed debug sections. */
741 ".GCC.command.line", /* record-gcc-switches */
742 ".mdebug*", /* alpha, score, mips etc. */
743 ".pdr", /* alpha, score, mips etc. */
744 ".stab*",
745 ".note*",
746 ".got*",
747 ".toc*",
748 ".xt.prop", /* xtensa */
749 ".xt.lit", /* xtensa */
750 ".arcextmap*", /* arc */
751 ".gnu.linkonce.arcext*", /* arc : modules */
752 ".cmem*", /* EZchip */
753 ".fmt_slot*", /* EZchip */
754 ".gnu.lto*",
755 ".discard.*",
756 ".llvm.call-graph-profile", /* call graph */
757 NULL
758};
759
760/*
761 * This is used to find sections missing the SHF_ALLOC flag.
762 * The cause of this is often a section specified in assembler
763 * without "ax" / "aw".
764 */
765static void check_section(const char *modname, struct elf_info *elf,
766 Elf_Shdr *sechdr)
767{
768 const char *sec = sech_name(elf, sechdr);
769
770 if (sechdr->sh_type == SHT_PROGBITS &&
771 !(sechdr->sh_flags & SHF_ALLOC) &&
772 !match(sec, section_white_list)) {
773 warn("%s (%s): unexpected non-allocatable section.\n"
774 "Did you forget to use \"ax\"/\"aw\" in a .S file?\n"
775 "Note that for example <linux/init.h> contains\n"
776 "section definitions for use in .S files.\n\n",
777 modname, sec);
778 }
779}
780
781
782
783#define ALL_INIT_DATA_SECTIONS \
784 ".init.setup", ".init.rodata", ".meminit.rodata", \
785 ".init.data", ".meminit.data"
786
787#define ALL_PCI_INIT_SECTIONS \
788 ".pci_fixup_early", ".pci_fixup_header", ".pci_fixup_final", \
789 ".pci_fixup_enable", ".pci_fixup_resume", \
790 ".pci_fixup_resume_early", ".pci_fixup_suspend"
791
792#define ALL_XXXINIT_SECTIONS ".meminit.*"
793
794#define ALL_INIT_SECTIONS INIT_SECTIONS, ALL_XXXINIT_SECTIONS
795#define ALL_EXIT_SECTIONS ".exit.*"
796
797#define DATA_SECTIONS ".data", ".data.rel"
798#define TEXT_SECTIONS ".text", ".text.*", ".sched.text", \
799 ".kprobes.text", ".cpuidle.text", ".noinstr.text", \
800 ".ltext", ".ltext.*"
801#define OTHER_TEXT_SECTIONS ".ref.text", ".head.text", ".spinlock.text", \
802 ".fixup", ".entry.text", ".exception.text", \
803 ".coldtext", ".softirqentry.text"
804
805#define INIT_SECTIONS ".init.*"
806
807#define ALL_TEXT_SECTIONS ".init.text", ".meminit.text", ".exit.text", \
808 TEXT_SECTIONS, OTHER_TEXT_SECTIONS
809
810enum mismatch {
811 TEXTDATA_TO_ANY_INIT_EXIT,
812 XXXINIT_TO_SOME_INIT,
813 ANY_INIT_TO_ANY_EXIT,
814 ANY_EXIT_TO_ANY_INIT,
815 EXTABLE_TO_NON_TEXT,
816};
817
818/**
819 * Describe how to match sections on different criteria:
820 *
821 * @fromsec: Array of sections to be matched.
822 *
823 * @bad_tosec: Relocations applied to a section in @fromsec to a section in
824 * this array is forbidden (black-list). Can be empty.
825 *
826 * @good_tosec: Relocations applied to a section in @fromsec must be
827 * targeting sections in this array (white-list). Can be empty.
828 *
829 * @mismatch: Type of mismatch.
830 */
831struct sectioncheck {
832 const char *fromsec[20];
833 const char *bad_tosec[20];
834 const char *good_tosec[20];
835 enum mismatch mismatch;
836};
837
838static const struct sectioncheck sectioncheck[] = {
839/* Do not reference init/exit code/data from
840 * normal code and data
841 */
842{
843 .fromsec = { TEXT_SECTIONS, DATA_SECTIONS, NULL },
844 .bad_tosec = { ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS, NULL },
845 .mismatch = TEXTDATA_TO_ANY_INIT_EXIT,
846},
847/* Do not reference init code/data from meminit code/data */
848{
849 .fromsec = { ALL_XXXINIT_SECTIONS, NULL },
850 .bad_tosec = { INIT_SECTIONS, NULL },
851 .mismatch = XXXINIT_TO_SOME_INIT,
852},
853/* Do not use exit code/data from init code */
854{
855 .fromsec = { ALL_INIT_SECTIONS, NULL },
856 .bad_tosec = { ALL_EXIT_SECTIONS, NULL },
857 .mismatch = ANY_INIT_TO_ANY_EXIT,
858},
859/* Do not use init code/data from exit code */
860{
861 .fromsec = { ALL_EXIT_SECTIONS, NULL },
862 .bad_tosec = { ALL_INIT_SECTIONS, NULL },
863 .mismatch = ANY_EXIT_TO_ANY_INIT,
864},
865{
866 .fromsec = { ALL_PCI_INIT_SECTIONS, NULL },
867 .bad_tosec = { INIT_SECTIONS, NULL },
868 .mismatch = ANY_INIT_TO_ANY_EXIT,
869},
870{
871 .fromsec = { "__ex_table", NULL },
872 /* If you're adding any new black-listed sections in here, consider
873 * adding a special 'printer' for them in scripts/check_extable.
874 */
875 .bad_tosec = { ".altinstr_replacement", NULL },
876 .good_tosec = {ALL_TEXT_SECTIONS , NULL},
877 .mismatch = EXTABLE_TO_NON_TEXT,
878}
879};
880
881static const struct sectioncheck *section_mismatch(
882 const char *fromsec, const char *tosec)
883{
884 int i;
885
886 /*
887 * The target section could be the SHT_NUL section when we're
888 * handling relocations to un-resolved symbols, trying to match it
889 * doesn't make much sense and causes build failures on parisc
890 * architectures.
891 */
892 if (*tosec == '\0')
893 return NULL;
894
895 for (i = 0; i < ARRAY_SIZE(sectioncheck); i++) {
896 const struct sectioncheck *check = §ioncheck[i];
897
898 if (match(fromsec, check->fromsec)) {
899 if (check->bad_tosec[0] && match(tosec, check->bad_tosec))
900 return check;
901 if (check->good_tosec[0] && !match(tosec, check->good_tosec))
902 return check;
903 }
904 }
905 return NULL;
906}
907
908/**
909 * Whitelist to allow certain references to pass with no warning.
910 *
911 * Pattern 1:
912 * If a module parameter is declared __initdata and permissions=0
913 * then this is legal despite the warning generated.
914 * We cannot see value of permissions here, so just ignore
915 * this pattern.
916 * The pattern is identified by:
917 * tosec = .init.data
918 * fromsec = .data*
919 * atsym =__param*
920 *
921 * Pattern 1a:
922 * module_param_call() ops can refer to __init set function if permissions=0
923 * The pattern is identified by:
924 * tosec = .init.text
925 * fromsec = .data*
926 * atsym = __param_ops_*
927 *
928 * Pattern 3:
929 * Whitelist all references from .head.text to any init section
930 *
931 * Pattern 4:
932 * Some symbols belong to init section but still it is ok to reference
933 * these from non-init sections as these symbols don't have any memory
934 * allocated for them and symbol address and value are same. So even
935 * if init section is freed, its ok to reference those symbols.
936 * For ex. symbols marking the init section boundaries.
937 * This pattern is identified by
938 * refsymname = __init_begin, _sinittext, _einittext
939 *
940 * Pattern 5:
941 * GCC may optimize static inlines when fed constant arg(s) resulting
942 * in functions like cpumask_empty() -- generating an associated symbol
943 * cpumask_empty.constprop.3 that appears in the audit. If the const that
944 * is passed in comes from __init, like say nmi_ipi_mask, we get a
945 * meaningless section warning. May need to add isra symbols too...
946 * This pattern is identified by
947 * tosec = init section
948 * fromsec = text section
949 * refsymname = *.constprop.*
950 *
951 **/
952static int secref_whitelist(const char *fromsec, const char *fromsym,
953 const char *tosec, const char *tosym)
954{
955 /* Check for pattern 1 */
956 if (match(tosec, PATTERNS(ALL_INIT_DATA_SECTIONS)) &&
957 match(fromsec, PATTERNS(DATA_SECTIONS)) &&
958 strstarts(fromsym, "__param"))
959 return 0;
960
961 /* Check for pattern 1a */
962 if (strcmp(tosec, ".init.text") == 0 &&
963 match(fromsec, PATTERNS(DATA_SECTIONS)) &&
964 strstarts(fromsym, "__param_ops_"))
965 return 0;
966
967 /* symbols in data sections that may refer to any init/exit sections */
968 if (match(fromsec, PATTERNS(DATA_SECTIONS)) &&
969 match(tosec, PATTERNS(ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS)) &&
970 match(fromsym, PATTERNS("*_ops", "*_probe", "*_console")))
971 return 0;
972
973 /*
974 * symbols in data sections must not refer to .exit.*, but there are
975 * quite a few offenders, so hide these unless for W=1 builds until
976 * these are fixed.
977 */
978 if (!extra_warn &&
979 match(fromsec, PATTERNS(DATA_SECTIONS)) &&
980 match(tosec, PATTERNS(ALL_EXIT_SECTIONS)) &&
981 match(fromsym, PATTERNS("*driver")))
982 return 0;
983
984 /* Check for pattern 3 */
985 if (strstarts(fromsec, ".head.text") &&
986 match(tosec, PATTERNS(ALL_INIT_SECTIONS)))
987 return 0;
988
989 /* Check for pattern 4 */
990 if (match(tosym, PATTERNS("__init_begin", "_sinittext", "_einittext")))
991 return 0;
992
993 /* Check for pattern 5 */
994 if (match(fromsec, PATTERNS(ALL_TEXT_SECTIONS)) &&
995 match(tosec, PATTERNS(ALL_INIT_SECTIONS)) &&
996 match(fromsym, PATTERNS("*.constprop.*")))
997 return 0;
998
999 return 1;
1000}
1001
1002static Elf_Sym *find_fromsym(struct elf_info *elf, Elf_Addr addr,
1003 unsigned int secndx)
1004{
1005 return symsearch_find_nearest(elf, addr, secndx, false, ~0);
1006}
1007
1008static Elf_Sym *find_tosym(struct elf_info *elf, Elf_Addr addr, Elf_Sym *sym)
1009{
1010 /* If the supplied symbol has a valid name, return it */
1011 if (is_valid_name(elf, sym))
1012 return sym;
1013
1014 /*
1015 * Strive to find a better symbol name, but the resulting name may not
1016 * match the symbol referenced in the original code.
1017 */
1018 return symsearch_find_nearest(elf, addr, get_secindex(elf, sym),
1019 true, 20);
1020}
1021
1022static bool is_executable_section(struct elf_info *elf, unsigned int secndx)
1023{
1024 if (secndx >= elf->num_sections)
1025 return false;
1026
1027 return (elf->sechdrs[secndx].sh_flags & SHF_EXECINSTR) != 0;
1028}
1029
1030static void default_mismatch_handler(const char *modname, struct elf_info *elf,
1031 const struct sectioncheck* const mismatch,
1032 Elf_Sym *tsym,
1033 unsigned int fsecndx, const char *fromsec, Elf_Addr faddr,
1034 const char *tosec, Elf_Addr taddr)
1035{
1036 Elf_Sym *from;
1037 const char *tosym;
1038 const char *fromsym;
1039
1040 from = find_fromsym(elf, faddr, fsecndx);
1041 fromsym = sym_name(elf, from);
1042
1043 tsym = find_tosym(elf, taddr, tsym);
1044 tosym = sym_name(elf, tsym);
1045
1046 /* check whitelist - we may ignore it */
1047 if (!secref_whitelist(fromsec, fromsym, tosec, tosym))
1048 return;
1049
1050 sec_mismatch_count++;
1051
1052 warn("%s: section mismatch in reference: %s+0x%x (section: %s) -> %s (section: %s)\n",
1053 modname, fromsym, (unsigned int)(faddr - from->st_value), fromsec, tosym, tosec);
1054
1055 if (mismatch->mismatch == EXTABLE_TO_NON_TEXT) {
1056 if (match(tosec, mismatch->bad_tosec))
1057 fatal("The relocation at %s+0x%lx references\n"
1058 "section \"%s\" which is black-listed.\n"
1059 "Something is seriously wrong and should be fixed.\n"
1060 "You might get more information about where this is\n"
1061 "coming from by using scripts/check_extable.sh %s\n",
1062 fromsec, (long)faddr, tosec, modname);
1063 else if (is_executable_section(elf, get_secindex(elf, tsym)))
1064 warn("The relocation at %s+0x%lx references\n"
1065 "section \"%s\" which is not in the list of\n"
1066 "authorized sections. If you're adding a new section\n"
1067 "and/or if this reference is valid, add \"%s\" to the\n"
1068 "list of authorized sections to jump to on fault.\n"
1069 "This can be achieved by adding \"%s\" to\n"
1070 "OTHER_TEXT_SECTIONS in scripts/mod/modpost.c.\n",
1071 fromsec, (long)faddr, tosec, tosec, tosec);
1072 else
1073 error("%s+0x%lx references non-executable section '%s'\n",
1074 fromsec, (long)faddr, tosec);
1075 }
1076}
1077
1078static void check_export_symbol(struct module *mod, struct elf_info *elf,
1079 Elf_Addr faddr, const char *secname,
1080 Elf_Sym *sym)
1081{
1082 static const char *prefix = "__export_symbol_";
1083 const char *label_name, *name, *data;
1084 Elf_Sym *label;
1085 struct symbol *s;
1086 bool is_gpl;
1087
1088 label = find_fromsym(elf, faddr, elf->export_symbol_secndx);
1089 label_name = sym_name(elf, label);
1090
1091 if (!strstarts(label_name, prefix)) {
1092 error("%s: .export_symbol section contains strange symbol '%s'\n",
1093 mod->name, label_name);
1094 return;
1095 }
1096
1097 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
1098 ELF_ST_BIND(sym->st_info) != STB_WEAK) {
1099 error("%s: local symbol '%s' was exported\n", mod->name,
1100 label_name + strlen(prefix));
1101 return;
1102 }
1103
1104 name = sym_name(elf, sym);
1105 if (strcmp(label_name + strlen(prefix), name)) {
1106 error("%s: .export_symbol section references '%s', but it does not seem to be an export symbol\n",
1107 mod->name, name);
1108 return;
1109 }
1110
1111 data = sym_get_data(elf, label); /* license */
1112 if (!strcmp(data, "GPL")) {
1113 is_gpl = true;
1114 } else if (!strcmp(data, "")) {
1115 is_gpl = false;
1116 } else {
1117 error("%s: unknown license '%s' was specified for '%s'\n",
1118 mod->name, data, name);
1119 return;
1120 }
1121
1122 data += strlen(data) + 1; /* namespace */
1123 s = sym_add_exported(name, mod, is_gpl, data);
1124
1125 /*
1126 * We need to be aware whether we are exporting a function or
1127 * a data on some architectures.
1128 */
1129 s->is_func = (ELF_ST_TYPE(sym->st_info) == STT_FUNC);
1130
1131 /*
1132 * For parisc64, symbols prefixed $$ from the library have the symbol type
1133 * STT_LOPROC. They should be handled as functions too.
1134 */
1135 if (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64 &&
1136 elf->hdr->e_machine == EM_PARISC &&
1137 ELF_ST_TYPE(sym->st_info) == STT_LOPROC)
1138 s->is_func = true;
1139
1140 if (match(secname, PATTERNS(ALL_INIT_SECTIONS)))
1141 warn("%s: %s: EXPORT_SYMBOL used for init symbol. Remove __init or EXPORT_SYMBOL.\n",
1142 mod->name, name);
1143 else if (match(secname, PATTERNS(ALL_EXIT_SECTIONS)))
1144 warn("%s: %s: EXPORT_SYMBOL used for exit symbol. Remove __exit or EXPORT_SYMBOL.\n",
1145 mod->name, name);
1146}
1147
1148static void check_section_mismatch(struct module *mod, struct elf_info *elf,
1149 Elf_Sym *sym,
1150 unsigned int fsecndx, const char *fromsec,
1151 Elf_Addr faddr, Elf_Addr taddr)
1152{
1153 const char *tosec = sec_name(elf, get_secindex(elf, sym));
1154 const struct sectioncheck *mismatch;
1155
1156 if (module_enabled && elf->export_symbol_secndx == fsecndx) {
1157 check_export_symbol(mod, elf, faddr, tosec, sym);
1158 return;
1159 }
1160
1161 mismatch = section_mismatch(fromsec, tosec);
1162 if (!mismatch)
1163 return;
1164
1165 default_mismatch_handler(mod->name, elf, mismatch, sym,
1166 fsecndx, fromsec, faddr,
1167 tosec, taddr);
1168}
1169
1170static Elf_Addr addend_386_rel(uint32_t *location, unsigned int r_type)
1171{
1172 switch (r_type) {
1173 case R_386_32:
1174 return TO_NATIVE(*location);
1175 case R_386_PC32:
1176 return TO_NATIVE(*location) + 4;
1177 }
1178
1179 return (Elf_Addr)(-1);
1180}
1181
1182#ifndef R_ARM_CALL
1183#define R_ARM_CALL 28
1184#endif
1185#ifndef R_ARM_JUMP24
1186#define R_ARM_JUMP24 29
1187#endif
1188
1189#ifndef R_ARM_THM_CALL
1190#define R_ARM_THM_CALL 10
1191#endif
1192#ifndef R_ARM_THM_JUMP24
1193#define R_ARM_THM_JUMP24 30
1194#endif
1195
1196#ifndef R_ARM_MOVW_ABS_NC
1197#define R_ARM_MOVW_ABS_NC 43
1198#endif
1199
1200#ifndef R_ARM_MOVT_ABS
1201#define R_ARM_MOVT_ABS 44
1202#endif
1203
1204#ifndef R_ARM_THM_MOVW_ABS_NC
1205#define R_ARM_THM_MOVW_ABS_NC 47
1206#endif
1207
1208#ifndef R_ARM_THM_MOVT_ABS
1209#define R_ARM_THM_MOVT_ABS 48
1210#endif
1211
1212#ifndef R_ARM_THM_JUMP19
1213#define R_ARM_THM_JUMP19 51
1214#endif
1215
1216static int32_t sign_extend32(int32_t value, int index)
1217{
1218 uint8_t shift = 31 - index;
1219
1220 return (int32_t)(value << shift) >> shift;
1221}
1222
1223static Elf_Addr addend_arm_rel(void *loc, Elf_Sym *sym, unsigned int r_type)
1224{
1225 uint32_t inst, upper, lower, sign, j1, j2;
1226 int32_t offset;
1227
1228 switch (r_type) {
1229 case R_ARM_ABS32:
1230 case R_ARM_REL32:
1231 inst = TO_NATIVE(*(uint32_t *)loc);
1232 return inst + sym->st_value;
1233 case R_ARM_MOVW_ABS_NC:
1234 case R_ARM_MOVT_ABS:
1235 inst = TO_NATIVE(*(uint32_t *)loc);
1236 offset = sign_extend32(((inst & 0xf0000) >> 4) | (inst & 0xfff),
1237 15);
1238 return offset + sym->st_value;
1239 case R_ARM_PC24:
1240 case R_ARM_CALL:
1241 case R_ARM_JUMP24:
1242 inst = TO_NATIVE(*(uint32_t *)loc);
1243 offset = sign_extend32((inst & 0x00ffffff) << 2, 25);
1244 return offset + sym->st_value + 8;
1245 case R_ARM_THM_MOVW_ABS_NC:
1246 case R_ARM_THM_MOVT_ABS:
1247 upper = TO_NATIVE(*(uint16_t *)loc);
1248 lower = TO_NATIVE(*((uint16_t *)loc + 1));
1249 offset = sign_extend32(((upper & 0x000f) << 12) |
1250 ((upper & 0x0400) << 1) |
1251 ((lower & 0x7000) >> 4) |
1252 (lower & 0x00ff),
1253 15);
1254 return offset + sym->st_value;
1255 case R_ARM_THM_JUMP19:
1256 /*
1257 * Encoding T3:
1258 * S = upper[10]
1259 * imm6 = upper[5:0]
1260 * J1 = lower[13]
1261 * J2 = lower[11]
1262 * imm11 = lower[10:0]
1263 * imm32 = SignExtend(S:J2:J1:imm6:imm11:'0')
1264 */
1265 upper = TO_NATIVE(*(uint16_t *)loc);
1266 lower = TO_NATIVE(*((uint16_t *)loc + 1));
1267
1268 sign = (upper >> 10) & 1;
1269 j1 = (lower >> 13) & 1;
1270 j2 = (lower >> 11) & 1;
1271 offset = sign_extend32((sign << 20) | (j2 << 19) | (j1 << 18) |
1272 ((upper & 0x03f) << 12) |
1273 ((lower & 0x07ff) << 1),
1274 20);
1275 return offset + sym->st_value + 4;
1276 case R_ARM_THM_CALL:
1277 case R_ARM_THM_JUMP24:
1278 /*
1279 * Encoding T4:
1280 * S = upper[10]
1281 * imm10 = upper[9:0]
1282 * J1 = lower[13]
1283 * J2 = lower[11]
1284 * imm11 = lower[10:0]
1285 * I1 = NOT(J1 XOR S)
1286 * I2 = NOT(J2 XOR S)
1287 * imm32 = SignExtend(S:I1:I2:imm10:imm11:'0')
1288 */
1289 upper = TO_NATIVE(*(uint16_t *)loc);
1290 lower = TO_NATIVE(*((uint16_t *)loc + 1));
1291
1292 sign = (upper >> 10) & 1;
1293 j1 = (lower >> 13) & 1;
1294 j2 = (lower >> 11) & 1;
1295 offset = sign_extend32((sign << 24) |
1296 ((~(j1 ^ sign) & 1) << 23) |
1297 ((~(j2 ^ sign) & 1) << 22) |
1298 ((upper & 0x03ff) << 12) |
1299 ((lower & 0x07ff) << 1),
1300 24);
1301 return offset + sym->st_value + 4;
1302 }
1303
1304 return (Elf_Addr)(-1);
1305}
1306
1307static Elf_Addr addend_mips_rel(uint32_t *location, unsigned int r_type)
1308{
1309 uint32_t inst;
1310
1311 inst = TO_NATIVE(*location);
1312 switch (r_type) {
1313 case R_MIPS_LO16:
1314 return inst & 0xffff;
1315 case R_MIPS_26:
1316 return (inst & 0x03ffffff) << 2;
1317 case R_MIPS_32:
1318 return inst;
1319 }
1320 return (Elf_Addr)(-1);
1321}
1322
1323#ifndef EM_RISCV
1324#define EM_RISCV 243
1325#endif
1326
1327#ifndef R_RISCV_SUB32
1328#define R_RISCV_SUB32 39
1329#endif
1330
1331#ifndef EM_LOONGARCH
1332#define EM_LOONGARCH 258
1333#endif
1334
1335#ifndef R_LARCH_SUB32
1336#define R_LARCH_SUB32 55
1337#endif
1338
1339#ifndef R_LARCH_RELAX
1340#define R_LARCH_RELAX 100
1341#endif
1342
1343#ifndef R_LARCH_ALIGN
1344#define R_LARCH_ALIGN 102
1345#endif
1346
1347static void get_rel_type_and_sym(struct elf_info *elf, uint64_t r_info,
1348 unsigned int *r_type, unsigned int *r_sym)
1349{
1350 typedef struct {
1351 Elf64_Word r_sym; /* Symbol index */
1352 unsigned char r_ssym; /* Special symbol for 2nd relocation */
1353 unsigned char r_type3; /* 3rd relocation type */
1354 unsigned char r_type2; /* 2nd relocation type */
1355 unsigned char r_type; /* 1st relocation type */
1356 } Elf64_Mips_R_Info;
1357
1358 bool is_64bit = (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64);
1359
1360 if (elf->hdr->e_machine == EM_MIPS && is_64bit) {
1361 Elf64_Mips_R_Info *mips64_r_info = (void *)&r_info;
1362
1363 *r_type = mips64_r_info->r_type;
1364 *r_sym = TO_NATIVE(mips64_r_info->r_sym);
1365 return;
1366 }
1367
1368 if (is_64bit)
1369 r_info = TO_NATIVE((Elf64_Xword)r_info);
1370 else
1371 r_info = TO_NATIVE((Elf32_Word)r_info);
1372
1373 *r_type = ELF_R_TYPE(r_info);
1374 *r_sym = ELF_R_SYM(r_info);
1375}
1376
1377static void section_rela(struct module *mod, struct elf_info *elf,
1378 unsigned int fsecndx, const char *fromsec,
1379 const Elf_Rela *start, const Elf_Rela *stop)
1380{
1381 const Elf_Rela *rela;
1382
1383 for (rela = start; rela < stop; rela++) {
1384 Elf_Sym *tsym;
1385 Elf_Addr taddr, r_offset;
1386 unsigned int r_type, r_sym;
1387
1388 r_offset = TO_NATIVE(rela->r_offset);
1389 get_rel_type_and_sym(elf, rela->r_info, &r_type, &r_sym);
1390
1391 tsym = elf->symtab_start + r_sym;
1392 taddr = tsym->st_value + TO_NATIVE(rela->r_addend);
1393
1394 switch (elf->hdr->e_machine) {
1395 case EM_RISCV:
1396 if (!strcmp("__ex_table", fromsec) &&
1397 r_type == R_RISCV_SUB32)
1398 continue;
1399 break;
1400 case EM_LOONGARCH:
1401 switch (r_type) {
1402 case R_LARCH_SUB32:
1403 if (!strcmp("__ex_table", fromsec))
1404 continue;
1405 break;
1406 case R_LARCH_RELAX:
1407 case R_LARCH_ALIGN:
1408 /* These relocs do not refer to symbols */
1409 continue;
1410 }
1411 break;
1412 }
1413
1414 check_section_mismatch(mod, elf, tsym,
1415 fsecndx, fromsec, r_offset, taddr);
1416 }
1417}
1418
1419static void section_rel(struct module *mod, struct elf_info *elf,
1420 unsigned int fsecndx, const char *fromsec,
1421 const Elf_Rel *start, const Elf_Rel *stop)
1422{
1423 const Elf_Rel *rel;
1424
1425 for (rel = start; rel < stop; rel++) {
1426 Elf_Sym *tsym;
1427 Elf_Addr taddr, r_offset;
1428 unsigned int r_type, r_sym;
1429 void *loc;
1430
1431 r_offset = TO_NATIVE(rel->r_offset);
1432 get_rel_type_and_sym(elf, rel->r_info, &r_type, &r_sym);
1433
1434 loc = sym_get_data_by_offset(elf, fsecndx, r_offset);
1435 tsym = elf->symtab_start + r_sym;
1436
1437 switch (elf->hdr->e_machine) {
1438 case EM_386:
1439 taddr = addend_386_rel(loc, r_type);
1440 break;
1441 case EM_ARM:
1442 taddr = addend_arm_rel(loc, tsym, r_type);
1443 break;
1444 case EM_MIPS:
1445 taddr = addend_mips_rel(loc, r_type);
1446 break;
1447 default:
1448 fatal("Please add code to calculate addend for this architecture\n");
1449 }
1450
1451 check_section_mismatch(mod, elf, tsym,
1452 fsecndx, fromsec, r_offset, taddr);
1453 }
1454}
1455
1456/**
1457 * A module includes a number of sections that are discarded
1458 * either when loaded or when used as built-in.
1459 * For loaded modules all functions marked __init and all data
1460 * marked __initdata will be discarded when the module has been initialized.
1461 * Likewise for modules used built-in the sections marked __exit
1462 * are discarded because __exit marked function are supposed to be called
1463 * only when a module is unloaded which never happens for built-in modules.
1464 * The check_sec_ref() function traverses all relocation records
1465 * to find all references to a section that reference a section that will
1466 * be discarded and warns about it.
1467 **/
1468static void check_sec_ref(struct module *mod, struct elf_info *elf)
1469{
1470 int i;
1471
1472 /* Walk through all sections */
1473 for (i = 0; i < elf->num_sections; i++) {
1474 Elf_Shdr *sechdr = &elf->sechdrs[i];
1475
1476 check_section(mod->name, elf, sechdr);
1477 /* We want to process only relocation sections and not .init */
1478 if (sechdr->sh_type == SHT_REL || sechdr->sh_type == SHT_RELA) {
1479 /* section to which the relocation applies */
1480 unsigned int secndx = sechdr->sh_info;
1481 const char *secname = sec_name(elf, secndx);
1482 const void *start, *stop;
1483
1484 /* If the section is known good, skip it */
1485 if (match(secname, section_white_list))
1486 continue;
1487
1488 start = sym_get_data_by_offset(elf, i, 0);
1489 stop = start + sechdr->sh_size;
1490
1491 if (sechdr->sh_type == SHT_RELA)
1492 section_rela(mod, elf, secndx, secname,
1493 start, stop);
1494 else
1495 section_rel(mod, elf, secndx, secname,
1496 start, stop);
1497 }
1498 }
1499}
1500
1501static char *remove_dot(char *s)
1502{
1503 size_t n = strcspn(s, ".");
1504
1505 if (n && s[n]) {
1506 size_t m = strspn(s + n + 1, "0123456789");
1507 if (m && (s[n + m + 1] == '.' || s[n + m + 1] == 0))
1508 s[n] = 0;
1509 }
1510 return s;
1511}
1512
1513/*
1514 * The CRCs are recorded in .*.cmd files in the form of:
1515 * #SYMVER <name> <crc>
1516 */
1517static void extract_crcs_for_object(const char *object, struct module *mod)
1518{
1519 char cmd_file[PATH_MAX];
1520 char *buf, *p;
1521 const char *base;
1522 int dirlen, ret;
1523
1524 base = strrchr(object, '/');
1525 if (base) {
1526 base++;
1527 dirlen = base - object;
1528 } else {
1529 dirlen = 0;
1530 base = object;
1531 }
1532
1533 ret = snprintf(cmd_file, sizeof(cmd_file), "%.*s.%s.cmd",
1534 dirlen, object, base);
1535 if (ret >= sizeof(cmd_file)) {
1536 error("%s: too long path was truncated\n", cmd_file);
1537 return;
1538 }
1539
1540 buf = read_text_file(cmd_file);
1541 p = buf;
1542
1543 while ((p = strstr(p, "\n#SYMVER "))) {
1544 char *name;
1545 size_t namelen;
1546 unsigned int crc;
1547 struct symbol *sym;
1548
1549 name = p + strlen("\n#SYMVER ");
1550
1551 p = strchr(name, ' ');
1552 if (!p)
1553 break;
1554
1555 namelen = p - name;
1556 p++;
1557
1558 if (!isdigit(*p))
1559 continue; /* skip this line */
1560
1561 crc = strtoul(p, &p, 0);
1562 if (*p != '\n')
1563 continue; /* skip this line */
1564
1565 name[namelen] = '\0';
1566
1567 /*
1568 * sym_find_with_module() may return NULL here.
1569 * It typically occurs when CONFIG_TRIM_UNUSED_KSYMS=y.
1570 * Since commit e1327a127703, genksyms calculates CRCs of all
1571 * symbols, including trimmed ones. Ignore orphan CRCs.
1572 */
1573 sym = sym_find_with_module(name, mod);
1574 if (sym)
1575 sym_set_crc(sym, crc);
1576 }
1577
1578 free(buf);
1579}
1580
1581/*
1582 * The symbol versions (CRC) are recorded in the .*.cmd files.
1583 * Parse them to retrieve CRCs for the current module.
1584 */
1585static void mod_set_crcs(struct module *mod)
1586{
1587 char objlist[PATH_MAX];
1588 char *buf, *p, *obj;
1589 int ret;
1590
1591 if (mod->is_vmlinux) {
1592 strcpy(objlist, ".vmlinux.objs");
1593 } else {
1594 /* objects for a module are listed in the *.mod file. */
1595 ret = snprintf(objlist, sizeof(objlist), "%s.mod", mod->name);
1596 if (ret >= sizeof(objlist)) {
1597 error("%s: too long path was truncated\n", objlist);
1598 return;
1599 }
1600 }
1601
1602 buf = read_text_file(objlist);
1603 p = buf;
1604
1605 while ((obj = strsep(&p, "\n")) && obj[0])
1606 extract_crcs_for_object(obj, mod);
1607
1608 free(buf);
1609}
1610
1611static void read_symbols(const char *modname)
1612{
1613 const char *symname;
1614 char *version;
1615 char *license;
1616 char *namespace;
1617 struct module *mod;
1618 struct elf_info info = { };
1619 Elf_Sym *sym;
1620
1621 if (!parse_elf(&info, modname))
1622 return;
1623
1624 if (!strends(modname, ".o")) {
1625 error("%s: filename must be suffixed with .o\n", modname);
1626 return;
1627 }
1628
1629 /* strip trailing .o */
1630 mod = new_module(modname, strlen(modname) - strlen(".o"));
1631
1632 if (!mod->is_vmlinux) {
1633 license = get_modinfo(&info, "license");
1634 if (!license)
1635 error("missing MODULE_LICENSE() in %s\n", modname);
1636 while (license) {
1637 if (!license_is_gpl_compatible(license)) {
1638 mod->is_gpl_compatible = false;
1639 break;
1640 }
1641 license = get_next_modinfo(&info, "license", license);
1642 }
1643
1644 namespace = get_modinfo(&info, "import_ns");
1645 while (namespace) {
1646 add_namespace(&mod->imported_namespaces, namespace);
1647 namespace = get_next_modinfo(&info, "import_ns",
1648 namespace);
1649 }
1650 }
1651
1652 if (extra_warn && !get_modinfo(&info, "description"))
1653 warn("missing MODULE_DESCRIPTION() in %s\n", modname);
1654 for (sym = info.symtab_start; sym < info.symtab_stop; sym++) {
1655 symname = remove_dot(info.strtab + sym->st_name);
1656
1657 handle_symbol(mod, &info, sym, symname);
1658 handle_moddevtable(mod, &info, sym, symname);
1659 }
1660
1661 check_sec_ref(mod, &info);
1662
1663 if (!mod->is_vmlinux) {
1664 version = get_modinfo(&info, "version");
1665 if (version || all_versions)
1666 get_src_version(mod->name, mod->srcversion,
1667 sizeof(mod->srcversion) - 1);
1668 }
1669
1670 parse_elf_finish(&info);
1671
1672 if (modversions) {
1673 /*
1674 * Our trick to get versioning for module struct etc. - it's
1675 * never passed as an argument to an exported function, so
1676 * the automatic versioning doesn't pick it up, but it's really
1677 * important anyhow.
1678 */
1679 sym_add_unresolved("module_layout", mod, false);
1680
1681 mod_set_crcs(mod);
1682 }
1683}
1684
1685static void read_symbols_from_files(const char *filename)
1686{
1687 FILE *in = stdin;
1688 char fname[PATH_MAX];
1689
1690 in = fopen(filename, "r");
1691 if (!in)
1692 fatal("Can't open filenames file %s: %m", filename);
1693
1694 while (fgets(fname, PATH_MAX, in) != NULL) {
1695 if (strends(fname, "\n"))
1696 fname[strlen(fname)-1] = '\0';
1697 read_symbols(fname);
1698 }
1699
1700 fclose(in);
1701}
1702
1703#define SZ 500
1704
1705/* We first write the generated file into memory using the
1706 * following helper, then compare to the file on disk and
1707 * only update the later if anything changed */
1708
1709void __attribute__((format(printf, 2, 3))) buf_printf(struct buffer *buf,
1710 const char *fmt, ...)
1711{
1712 char tmp[SZ];
1713 int len;
1714 va_list ap;
1715
1716 va_start(ap, fmt);
1717 len = vsnprintf(tmp, SZ, fmt, ap);
1718 buf_write(buf, tmp, len);
1719 va_end(ap);
1720}
1721
1722void buf_write(struct buffer *buf, const char *s, int len)
1723{
1724 if (buf->size - buf->pos < len) {
1725 buf->size += len + SZ;
1726 buf->p = NOFAIL(realloc(buf->p, buf->size));
1727 }
1728 strncpy(buf->p + buf->pos, s, len);
1729 buf->pos += len;
1730}
1731
1732static void check_exports(struct module *mod)
1733{
1734 struct symbol *s, *exp;
1735
1736 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1737 const char *basename;
1738 exp = find_symbol(s->name);
1739 if (!exp) {
1740 if (!s->weak && nr_unresolved++ < MAX_UNRESOLVED_REPORTS)
1741 modpost_log(warn_unresolved ? LOG_WARN : LOG_ERROR,
1742 "\"%s\" [%s.ko] undefined!\n",
1743 s->name, mod->name);
1744 continue;
1745 }
1746 if (exp->module == mod) {
1747 error("\"%s\" [%s.ko] was exported without definition\n",
1748 s->name, mod->name);
1749 continue;
1750 }
1751
1752 exp->used = true;
1753 s->module = exp->module;
1754 s->crc_valid = exp->crc_valid;
1755 s->crc = exp->crc;
1756
1757 basename = strrchr(mod->name, '/');
1758 if (basename)
1759 basename++;
1760 else
1761 basename = mod->name;
1762
1763 if (!contains_namespace(&mod->imported_namespaces, exp->namespace)) {
1764 modpost_log(allow_missing_ns_imports ? LOG_WARN : LOG_ERROR,
1765 "module %s uses symbol %s from namespace %s, but does not import it.\n",
1766 basename, exp->name, exp->namespace);
1767 add_namespace(&mod->missing_namespaces, exp->namespace);
1768 }
1769
1770 if (!mod->is_gpl_compatible && exp->is_gpl_only)
1771 error("GPL-incompatible module %s.ko uses GPL-only symbol '%s'\n",
1772 basename, exp->name);
1773 }
1774}
1775
1776static void handle_white_list_exports(const char *white_list)
1777{
1778 char *buf, *p, *name;
1779
1780 buf = read_text_file(white_list);
1781 p = buf;
1782
1783 while ((name = strsep(&p, "\n"))) {
1784 struct symbol *sym = find_symbol(name);
1785
1786 if (sym)
1787 sym->used = true;
1788 }
1789
1790 free(buf);
1791}
1792
1793static void check_modname_len(struct module *mod)
1794{
1795 const char *mod_name;
1796
1797 mod_name = strrchr(mod->name, '/');
1798 if (mod_name == NULL)
1799 mod_name = mod->name;
1800 else
1801 mod_name++;
1802 if (strlen(mod_name) >= MODULE_NAME_LEN)
1803 error("module name is too long [%s.ko]\n", mod->name);
1804}
1805
1806/**
1807 * Header for the generated file
1808 **/
1809static void add_header(struct buffer *b, struct module *mod)
1810{
1811 buf_printf(b, "#include <linux/module.h>\n");
1812 /*
1813 * Include build-salt.h after module.h in order to
1814 * inherit the definitions.
1815 */
1816 buf_printf(b, "#define INCLUDE_VERMAGIC\n");
1817 buf_printf(b, "#include <linux/build-salt.h>\n");
1818 buf_printf(b, "#include <linux/elfnote-lto.h>\n");
1819 buf_printf(b, "#include <linux/export-internal.h>\n");
1820 buf_printf(b, "#include <linux/vermagic.h>\n");
1821 buf_printf(b, "#include <linux/compiler.h>\n");
1822 buf_printf(b, "\n");
1823 buf_printf(b, "#ifdef CONFIG_UNWINDER_ORC\n");
1824 buf_printf(b, "#include <asm/orc_header.h>\n");
1825 buf_printf(b, "ORC_HEADER;\n");
1826 buf_printf(b, "#endif\n");
1827 buf_printf(b, "\n");
1828 buf_printf(b, "BUILD_SALT;\n");
1829 buf_printf(b, "BUILD_LTO_INFO;\n");
1830 buf_printf(b, "\n");
1831 buf_printf(b, "MODULE_INFO(vermagic, VERMAGIC_STRING);\n");
1832 buf_printf(b, "MODULE_INFO(name, KBUILD_MODNAME);\n");
1833 buf_printf(b, "\n");
1834 buf_printf(b, "__visible struct module __this_module\n");
1835 buf_printf(b, "__section(\".gnu.linkonce.this_module\") = {\n");
1836 buf_printf(b, "\t.name = KBUILD_MODNAME,\n");
1837 if (mod->has_init)
1838 buf_printf(b, "\t.init = init_module,\n");
1839 if (mod->has_cleanup)
1840 buf_printf(b, "#ifdef CONFIG_MODULE_UNLOAD\n"
1841 "\t.exit = cleanup_module,\n"
1842 "#endif\n");
1843 buf_printf(b, "\t.arch = MODULE_ARCH_INIT,\n");
1844 buf_printf(b, "};\n");
1845
1846 if (!external_module)
1847 buf_printf(b, "\nMODULE_INFO(intree, \"Y\");\n");
1848
1849 buf_printf(b,
1850 "\n"
1851 "#ifdef CONFIG_RETPOLINE\n"
1852 "MODULE_INFO(retpoline, \"Y\");\n"
1853 "#endif\n");
1854
1855 if (strstarts(mod->name, "drivers/staging"))
1856 buf_printf(b, "\nMODULE_INFO(staging, \"Y\");\n");
1857
1858 if (strstarts(mod->name, "tools/testing"))
1859 buf_printf(b, "\nMODULE_INFO(test, \"Y\");\n");
1860}
1861
1862static void add_exported_symbols(struct buffer *buf, struct module *mod)
1863{
1864 struct symbol *sym;
1865
1866 /* generate struct for exported symbols */
1867 buf_printf(buf, "\n");
1868 list_for_each_entry(sym, &mod->exported_symbols, list) {
1869 if (trim_unused_exports && !sym->used)
1870 continue;
1871
1872 buf_printf(buf, "KSYMTAB_%s(%s, \"%s\", \"%s\");\n",
1873 sym->is_func ? "FUNC" : "DATA", sym->name,
1874 sym->is_gpl_only ? "_gpl" : "", sym->namespace);
1875 }
1876
1877 if (!modversions)
1878 return;
1879
1880 /* record CRCs for exported symbols */
1881 buf_printf(buf, "\n");
1882 list_for_each_entry(sym, &mod->exported_symbols, list) {
1883 if (trim_unused_exports && !sym->used)
1884 continue;
1885
1886 if (!sym->crc_valid)
1887 warn("EXPORT symbol \"%s\" [%s%s] version generation failed, symbol will not be versioned.\n"
1888 "Is \"%s\" prototyped in <asm/asm-prototypes.h>?\n",
1889 sym->name, mod->name, mod->is_vmlinux ? "" : ".ko",
1890 sym->name);
1891
1892 buf_printf(buf, "SYMBOL_CRC(%s, 0x%08x, \"%s\");\n",
1893 sym->name, sym->crc, sym->is_gpl_only ? "_gpl" : "");
1894 }
1895}
1896
1897/**
1898 * Record CRCs for unresolved symbols
1899 **/
1900static void add_versions(struct buffer *b, struct module *mod)
1901{
1902 struct symbol *s;
1903
1904 if (!modversions)
1905 return;
1906
1907 buf_printf(b, "\n");
1908 buf_printf(b, "static const struct modversion_info ____versions[]\n");
1909 buf_printf(b, "__used __section(\"__versions\") = {\n");
1910
1911 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1912 if (!s->module)
1913 continue;
1914 if (!s->crc_valid) {
1915 warn("\"%s\" [%s.ko] has no CRC!\n",
1916 s->name, mod->name);
1917 continue;
1918 }
1919 if (strlen(s->name) >= MODULE_NAME_LEN) {
1920 error("too long symbol \"%s\" [%s.ko]\n",
1921 s->name, mod->name);
1922 break;
1923 }
1924 buf_printf(b, "\t{ %#8x, \"%s\" },\n",
1925 s->crc, s->name);
1926 }
1927
1928 buf_printf(b, "};\n");
1929}
1930
1931static void add_depends(struct buffer *b, struct module *mod)
1932{
1933 struct symbol *s;
1934 int first = 1;
1935
1936 /* Clear ->seen flag of modules that own symbols needed by this. */
1937 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1938 if (s->module)
1939 s->module->seen = s->module->is_vmlinux;
1940 }
1941
1942 buf_printf(b, "\n");
1943 buf_printf(b, "MODULE_INFO(depends, \"");
1944 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1945 const char *p;
1946 if (!s->module)
1947 continue;
1948
1949 if (s->module->seen)
1950 continue;
1951
1952 s->module->seen = true;
1953 p = strrchr(s->module->name, '/');
1954 if (p)
1955 p++;
1956 else
1957 p = s->module->name;
1958 buf_printf(b, "%s%s", first ? "" : ",", p);
1959 first = 0;
1960 }
1961 buf_printf(b, "\");\n");
1962}
1963
1964static void add_srcversion(struct buffer *b, struct module *mod)
1965{
1966 if (mod->srcversion[0]) {
1967 buf_printf(b, "\n");
1968 buf_printf(b, "MODULE_INFO(srcversion, \"%s\");\n",
1969 mod->srcversion);
1970 }
1971}
1972
1973static void write_buf(struct buffer *b, const char *fname)
1974{
1975 FILE *file;
1976
1977 if (error_occurred)
1978 return;
1979
1980 file = fopen(fname, "w");
1981 if (!file) {
1982 perror(fname);
1983 exit(1);
1984 }
1985 if (fwrite(b->p, 1, b->pos, file) != b->pos) {
1986 perror(fname);
1987 exit(1);
1988 }
1989 if (fclose(file) != 0) {
1990 perror(fname);
1991 exit(1);
1992 }
1993}
1994
1995static void write_if_changed(struct buffer *b, const char *fname)
1996{
1997 char *tmp;
1998 FILE *file;
1999 struct stat st;
2000
2001 file = fopen(fname, "r");
2002 if (!file)
2003 goto write;
2004
2005 if (fstat(fileno(file), &st) < 0)
2006 goto close_write;
2007
2008 if (st.st_size != b->pos)
2009 goto close_write;
2010
2011 tmp = NOFAIL(malloc(b->pos));
2012 if (fread(tmp, 1, b->pos, file) != b->pos)
2013 goto free_write;
2014
2015 if (memcmp(tmp, b->p, b->pos) != 0)
2016 goto free_write;
2017
2018 free(tmp);
2019 fclose(file);
2020 return;
2021
2022 free_write:
2023 free(tmp);
2024 close_write:
2025 fclose(file);
2026 write:
2027 write_buf(b, fname);
2028}
2029
2030static void write_vmlinux_export_c_file(struct module *mod)
2031{
2032 struct buffer buf = { };
2033
2034 buf_printf(&buf,
2035 "#include <linux/export-internal.h>\n");
2036
2037 add_exported_symbols(&buf, mod);
2038 write_if_changed(&buf, ".vmlinux.export.c");
2039 free(buf.p);
2040}
2041
2042/* do sanity checks, and generate *.mod.c file */
2043static void write_mod_c_file(struct module *mod)
2044{
2045 struct buffer buf = { };
2046 char fname[PATH_MAX];
2047 int ret;
2048
2049 add_header(&buf, mod);
2050 add_exported_symbols(&buf, mod);
2051 add_versions(&buf, mod);
2052 add_depends(&buf, mod);
2053 add_moddevtable(&buf, mod);
2054 add_srcversion(&buf, mod);
2055
2056 ret = snprintf(fname, sizeof(fname), "%s.mod.c", mod->name);
2057 if (ret >= sizeof(fname)) {
2058 error("%s: too long path was truncated\n", fname);
2059 goto free;
2060 }
2061
2062 write_if_changed(&buf, fname);
2063
2064free:
2065 free(buf.p);
2066}
2067
2068/* parse Module.symvers file. line format:
2069 * 0x12345678<tab>symbol<tab>module<tab>export<tab>namespace
2070 **/
2071static void read_dump(const char *fname)
2072{
2073 char *buf, *pos, *line;
2074
2075 buf = read_text_file(fname);
2076 if (!buf)
2077 /* No symbol versions, silently ignore */
2078 return;
2079
2080 pos = buf;
2081
2082 while ((line = get_line(&pos))) {
2083 char *symname, *namespace, *modname, *d, *export;
2084 unsigned int crc;
2085 struct module *mod;
2086 struct symbol *s;
2087 bool gpl_only;
2088
2089 if (!(symname = strchr(line, '\t')))
2090 goto fail;
2091 *symname++ = '\0';
2092 if (!(modname = strchr(symname, '\t')))
2093 goto fail;
2094 *modname++ = '\0';
2095 if (!(export = strchr(modname, '\t')))
2096 goto fail;
2097 *export++ = '\0';
2098 if (!(namespace = strchr(export, '\t')))
2099 goto fail;
2100 *namespace++ = '\0';
2101
2102 crc = strtoul(line, &d, 16);
2103 if (*symname == '\0' || *modname == '\0' || *d != '\0')
2104 goto fail;
2105
2106 if (!strcmp(export, "EXPORT_SYMBOL_GPL")) {
2107 gpl_only = true;
2108 } else if (!strcmp(export, "EXPORT_SYMBOL")) {
2109 gpl_only = false;
2110 } else {
2111 error("%s: unknown license %s. skip", symname, export);
2112 continue;
2113 }
2114
2115 mod = find_module(modname);
2116 if (!mod) {
2117 mod = new_module(modname, strlen(modname));
2118 mod->from_dump = true;
2119 }
2120 s = sym_add_exported(symname, mod, gpl_only, namespace);
2121 sym_set_crc(s, crc);
2122 }
2123 free(buf);
2124 return;
2125fail:
2126 free(buf);
2127 fatal("parse error in symbol dump file\n");
2128}
2129
2130static void write_dump(const char *fname)
2131{
2132 struct buffer buf = { };
2133 struct module *mod;
2134 struct symbol *sym;
2135
2136 list_for_each_entry(mod, &modules, list) {
2137 if (mod->from_dump)
2138 continue;
2139 list_for_each_entry(sym, &mod->exported_symbols, list) {
2140 if (trim_unused_exports && !sym->used)
2141 continue;
2142
2143 buf_printf(&buf, "0x%08x\t%s\t%s\tEXPORT_SYMBOL%s\t%s\n",
2144 sym->crc, sym->name, mod->name,
2145 sym->is_gpl_only ? "_GPL" : "",
2146 sym->namespace);
2147 }
2148 }
2149 write_buf(&buf, fname);
2150 free(buf.p);
2151}
2152
2153static void write_namespace_deps_files(const char *fname)
2154{
2155 struct module *mod;
2156 struct namespace_list *ns;
2157 struct buffer ns_deps_buf = {};
2158
2159 list_for_each_entry(mod, &modules, list) {
2160
2161 if (mod->from_dump || list_empty(&mod->missing_namespaces))
2162 continue;
2163
2164 buf_printf(&ns_deps_buf, "%s.ko:", mod->name);
2165
2166 list_for_each_entry(ns, &mod->missing_namespaces, list)
2167 buf_printf(&ns_deps_buf, " %s", ns->namespace);
2168
2169 buf_printf(&ns_deps_buf, "\n");
2170 }
2171
2172 write_if_changed(&ns_deps_buf, fname);
2173 free(ns_deps_buf.p);
2174}
2175
2176struct dump_list {
2177 struct list_head list;
2178 const char *file;
2179};
2180
2181int main(int argc, char **argv)
2182{
2183 struct module *mod;
2184 char *missing_namespace_deps = NULL;
2185 char *unused_exports_white_list = NULL;
2186 char *dump_write = NULL, *files_source = NULL;
2187 int opt;
2188 LIST_HEAD(dump_lists);
2189 struct dump_list *dl, *dl2;
2190
2191 while ((opt = getopt(argc, argv, "ei:MmnT:to:au:WwENd:")) != -1) {
2192 switch (opt) {
2193 case 'e':
2194 external_module = true;
2195 break;
2196 case 'i':
2197 dl = NOFAIL(malloc(sizeof(*dl)));
2198 dl->file = optarg;
2199 list_add_tail(&dl->list, &dump_lists);
2200 break;
2201 case 'M':
2202 module_enabled = true;
2203 break;
2204 case 'm':
2205 modversions = true;
2206 break;
2207 case 'n':
2208 ignore_missing_files = true;
2209 break;
2210 case 'o':
2211 dump_write = optarg;
2212 break;
2213 case 'a':
2214 all_versions = true;
2215 break;
2216 case 'T':
2217 files_source = optarg;
2218 break;
2219 case 't':
2220 trim_unused_exports = true;
2221 break;
2222 case 'u':
2223 unused_exports_white_list = optarg;
2224 break;
2225 case 'W':
2226 extra_warn = true;
2227 break;
2228 case 'w':
2229 warn_unresolved = true;
2230 break;
2231 case 'E':
2232 sec_mismatch_warn_only = false;
2233 break;
2234 case 'N':
2235 allow_missing_ns_imports = true;
2236 break;
2237 case 'd':
2238 missing_namespace_deps = optarg;
2239 break;
2240 default:
2241 exit(1);
2242 }
2243 }
2244
2245 list_for_each_entry_safe(dl, dl2, &dump_lists, list) {
2246 read_dump(dl->file);
2247 list_del(&dl->list);
2248 free(dl);
2249 }
2250
2251 while (optind < argc)
2252 read_symbols(argv[optind++]);
2253
2254 if (files_source)
2255 read_symbols_from_files(files_source);
2256
2257 list_for_each_entry(mod, &modules, list) {
2258 if (mod->from_dump || mod->is_vmlinux)
2259 continue;
2260
2261 check_modname_len(mod);
2262 check_exports(mod);
2263 }
2264
2265 if (unused_exports_white_list)
2266 handle_white_list_exports(unused_exports_white_list);
2267
2268 list_for_each_entry(mod, &modules, list) {
2269 if (mod->from_dump)
2270 continue;
2271
2272 if (mod->is_vmlinux)
2273 write_vmlinux_export_c_file(mod);
2274 else
2275 write_mod_c_file(mod);
2276 }
2277
2278 if (missing_namespace_deps)
2279 write_namespace_deps_files(missing_namespace_deps);
2280
2281 if (dump_write)
2282 write_dump(dump_write);
2283 if (sec_mismatch_count && !sec_mismatch_warn_only)
2284 error("Section mismatches detected.\n"
2285 "Set CONFIG_SECTION_MISMATCH_WARN_ONLY=y to allow them.\n");
2286
2287 if (nr_unresolved > MAX_UNRESOLVED_REPORTS)
2288 warn("suppressed %u unresolved symbol warnings because there were too many)\n",
2289 nr_unresolved - MAX_UNRESOLVED_REPORTS);
2290
2291 return error_occurred ? 1 : 0;
2292}
1/* Postprocess module symbol versions
2 *
3 * Copyright 2003 Kai Germaschewski
4 * Copyright 2002-2004 Rusty Russell, IBM Corporation
5 * Copyright 2006-2008 Sam Ravnborg
6 * Based in part on module-init-tools/depmod.c,file2alias
7 *
8 * This software may be used and distributed according to the terms
9 * of the GNU General Public License, incorporated herein by reference.
10 *
11 * Usage: modpost vmlinux module1.o module2.o ...
12 */
13
14#define _GNU_SOURCE
15#include <elf.h>
16#include <fnmatch.h>
17#include <stdio.h>
18#include <ctype.h>
19#include <string.h>
20#include <limits.h>
21#include <stdbool.h>
22#include <errno.h>
23
24#include <hash.h>
25#include <hashtable.h>
26#include <list.h>
27#include <xalloc.h>
28#include "modpost.h"
29#include "../../include/linux/license.h"
30
31static bool module_enabled;
32/* Are we using CONFIG_MODVERSIONS? */
33static bool modversions;
34/* Is CONFIG_MODULE_SRCVERSION_ALL set? */
35static bool all_versions;
36/* If we are modposting external module set to 1 */
37static bool external_module;
38/* Only warn about unresolved symbols */
39static bool warn_unresolved;
40
41static int sec_mismatch_count;
42static bool sec_mismatch_warn_only = true;
43/* Trim EXPORT_SYMBOLs that are unused by in-tree modules */
44static bool trim_unused_exports;
45
46/* ignore missing files */
47static bool ignore_missing_files;
48/* If set to 1, only warn (instead of error) about missing ns imports */
49static bool allow_missing_ns_imports;
50
51static bool error_occurred;
52
53static bool extra_warn;
54
55bool target_is_big_endian;
56bool host_is_big_endian;
57
58/*
59 * Cut off the warnings when there are too many. This typically occurs when
60 * vmlinux is missing. ('make modules' without building vmlinux.)
61 */
62#define MAX_UNRESOLVED_REPORTS 10
63static unsigned int nr_unresolved;
64
65/* In kernel, this size is defined in linux/module.h;
66 * here we use Elf_Addr instead of long for covering cross-compile
67 */
68
69#define MODULE_NAME_LEN (64 - sizeof(Elf_Addr))
70
71void modpost_log(bool is_error, const char *fmt, ...)
72{
73 va_list arglist;
74
75 if (is_error) {
76 fprintf(stderr, "ERROR: ");
77 error_occurred = true;
78 } else {
79 fprintf(stderr, "WARNING: ");
80 }
81
82 fprintf(stderr, "modpost: ");
83
84 va_start(arglist, fmt);
85 vfprintf(stderr, fmt, arglist);
86 va_end(arglist);
87}
88
89static inline bool strends(const char *str, const char *postfix)
90{
91 if (strlen(str) < strlen(postfix))
92 return false;
93
94 return strcmp(str + strlen(str) - strlen(postfix), postfix) == 0;
95}
96
97char *read_text_file(const char *filename)
98{
99 struct stat st;
100 size_t nbytes;
101 int fd;
102 char *buf;
103
104 fd = open(filename, O_RDONLY);
105 if (fd < 0) {
106 perror(filename);
107 exit(1);
108 }
109
110 if (fstat(fd, &st) < 0) {
111 perror(filename);
112 exit(1);
113 }
114
115 buf = xmalloc(st.st_size + 1);
116
117 nbytes = st.st_size;
118
119 while (nbytes) {
120 ssize_t bytes_read;
121
122 bytes_read = read(fd, buf, nbytes);
123 if (bytes_read < 0) {
124 perror(filename);
125 exit(1);
126 }
127
128 nbytes -= bytes_read;
129 }
130 buf[st.st_size] = '\0';
131
132 close(fd);
133
134 return buf;
135}
136
137char *get_line(char **stringp)
138{
139 char *orig = *stringp, *next;
140
141 /* do not return the unwanted extra line at EOF */
142 if (!orig || *orig == '\0')
143 return NULL;
144
145 /* don't use strsep here, it is not available everywhere */
146 next = strchr(orig, '\n');
147 if (next)
148 *next++ = '\0';
149
150 *stringp = next;
151
152 return orig;
153}
154
155/* A list of all modules we processed */
156LIST_HEAD(modules);
157
158static struct module *find_module(const char *filename, const char *modname)
159{
160 struct module *mod;
161
162 list_for_each_entry(mod, &modules, list) {
163 if (!strcmp(mod->dump_file, filename) &&
164 !strcmp(mod->name, modname))
165 return mod;
166 }
167 return NULL;
168}
169
170static struct module *new_module(const char *name, size_t namelen)
171{
172 struct module *mod;
173
174 mod = xmalloc(sizeof(*mod) + namelen + 1);
175 memset(mod, 0, sizeof(*mod));
176
177 INIT_LIST_HEAD(&mod->exported_symbols);
178 INIT_LIST_HEAD(&mod->unresolved_symbols);
179 INIT_LIST_HEAD(&mod->missing_namespaces);
180 INIT_LIST_HEAD(&mod->imported_namespaces);
181 INIT_LIST_HEAD(&mod->aliases);
182
183 memcpy(mod->name, name, namelen);
184 mod->name[namelen] = '\0';
185 mod->is_vmlinux = (strcmp(mod->name, "vmlinux") == 0);
186
187 /*
188 * Set mod->is_gpl_compatible to true by default. If MODULE_LICENSE()
189 * is missing, do not check the use for EXPORT_SYMBOL_GPL() becasue
190 * modpost will exit wiht error anyway.
191 */
192 mod->is_gpl_compatible = true;
193
194 list_add_tail(&mod->list, &modules);
195
196 return mod;
197}
198
199struct symbol {
200 struct hlist_node hnode;/* link to hash table */
201 struct list_head list; /* link to module::exported_symbols or module::unresolved_symbols */
202 struct module *module;
203 char *namespace;
204 unsigned int crc;
205 bool crc_valid;
206 bool weak;
207 bool is_func;
208 bool is_gpl_only; /* exported by EXPORT_SYMBOL_GPL */
209 bool used; /* there exists a user of this symbol */
210 char name[];
211};
212
213static HASHTABLE_DEFINE(symbol_hashtable, 1U << 10);
214
215/**
216 * Allocate a new symbols for use in the hash of exported symbols or
217 * the list of unresolved symbols per module
218 **/
219static struct symbol *alloc_symbol(const char *name)
220{
221 struct symbol *s = xmalloc(sizeof(*s) + strlen(name) + 1);
222
223 memset(s, 0, sizeof(*s));
224 strcpy(s->name, name);
225
226 return s;
227}
228
229/* For the hash of exported symbols */
230static void hash_add_symbol(struct symbol *sym)
231{
232 hash_add(symbol_hashtable, &sym->hnode, hash_str(sym->name));
233}
234
235static void sym_add_unresolved(const char *name, struct module *mod, bool weak)
236{
237 struct symbol *sym;
238
239 sym = alloc_symbol(name);
240 sym->weak = weak;
241
242 list_add_tail(&sym->list, &mod->unresolved_symbols);
243}
244
245static struct symbol *sym_find_with_module(const char *name, struct module *mod)
246{
247 struct symbol *s;
248
249 /* For our purposes, .foo matches foo. PPC64 needs this. */
250 if (name[0] == '.')
251 name++;
252
253 hash_for_each_possible(symbol_hashtable, s, hnode, hash_str(name)) {
254 if (strcmp(s->name, name) == 0 && (!mod || s->module == mod))
255 return s;
256 }
257 return NULL;
258}
259
260static struct symbol *find_symbol(const char *name)
261{
262 return sym_find_with_module(name, NULL);
263}
264
265struct namespace_list {
266 struct list_head list;
267 char namespace[];
268};
269
270static bool contains_namespace(struct list_head *head, const char *namespace)
271{
272 struct namespace_list *list;
273
274 /*
275 * The default namespace is null string "", which is always implicitly
276 * contained.
277 */
278 if (!namespace[0])
279 return true;
280
281 list_for_each_entry(list, head, list) {
282 if (!strcmp(list->namespace, namespace))
283 return true;
284 }
285
286 return false;
287}
288
289static void add_namespace(struct list_head *head, const char *namespace)
290{
291 struct namespace_list *ns_entry;
292
293 if (!contains_namespace(head, namespace)) {
294 ns_entry = xmalloc(sizeof(*ns_entry) + strlen(namespace) + 1);
295 strcpy(ns_entry->namespace, namespace);
296 list_add_tail(&ns_entry->list, head);
297 }
298}
299
300static void *sym_get_data_by_offset(const struct elf_info *info,
301 unsigned int secindex, unsigned long offset)
302{
303 Elf_Shdr *sechdr = &info->sechdrs[secindex];
304
305 return (void *)info->hdr + sechdr->sh_offset + offset;
306}
307
308void *sym_get_data(const struct elf_info *info, const Elf_Sym *sym)
309{
310 return sym_get_data_by_offset(info, get_secindex(info, sym),
311 sym->st_value);
312}
313
314static const char *sech_name(const struct elf_info *info, Elf_Shdr *sechdr)
315{
316 return sym_get_data_by_offset(info, info->secindex_strings,
317 sechdr->sh_name);
318}
319
320static const char *sec_name(const struct elf_info *info, unsigned int secindex)
321{
322 /*
323 * If sym->st_shndx is a special section index, there is no
324 * corresponding section header.
325 * Return "" if the index is out of range of info->sechdrs[] array.
326 */
327 if (secindex >= info->num_sections)
328 return "";
329
330 return sech_name(info, &info->sechdrs[secindex]);
331}
332
333static struct symbol *sym_add_exported(const char *name, struct module *mod,
334 bool gpl_only, const char *namespace)
335{
336 struct symbol *s = find_symbol(name);
337
338 if (s && (!external_module || s->module->is_vmlinux || s->module == mod)) {
339 error("%s: '%s' exported twice. Previous export was in %s%s\n",
340 mod->name, name, s->module->name,
341 s->module->is_vmlinux ? "" : ".ko");
342 }
343
344 s = alloc_symbol(name);
345 s->module = mod;
346 s->is_gpl_only = gpl_only;
347 s->namespace = xstrdup(namespace);
348 list_add_tail(&s->list, &mod->exported_symbols);
349 hash_add_symbol(s);
350
351 return s;
352}
353
354static void sym_set_crc(struct symbol *sym, unsigned int crc)
355{
356 sym->crc = crc;
357 sym->crc_valid = true;
358}
359
360static void *grab_file(const char *filename, size_t *size)
361{
362 struct stat st;
363 void *map = MAP_FAILED;
364 int fd;
365
366 fd = open(filename, O_RDONLY);
367 if (fd < 0)
368 return NULL;
369 if (fstat(fd, &st))
370 goto failed;
371
372 *size = st.st_size;
373 map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
374
375failed:
376 close(fd);
377 if (map == MAP_FAILED)
378 return NULL;
379 return map;
380}
381
382static void release_file(void *file, size_t size)
383{
384 munmap(file, size);
385}
386
387static int parse_elf(struct elf_info *info, const char *filename)
388{
389 unsigned int i;
390 Elf_Ehdr *hdr;
391 Elf_Shdr *sechdrs;
392 Elf_Sym *sym;
393 const char *secstrings;
394 unsigned int symtab_idx = ~0U, symtab_shndx_idx = ~0U;
395
396 hdr = grab_file(filename, &info->size);
397 if (!hdr) {
398 if (ignore_missing_files) {
399 fprintf(stderr, "%s: %s (ignored)\n", filename,
400 strerror(errno));
401 return 0;
402 }
403 perror(filename);
404 exit(1);
405 }
406 info->hdr = hdr;
407 if (info->size < sizeof(*hdr)) {
408 /* file too small, assume this is an empty .o file */
409 return 0;
410 }
411 /* Is this a valid ELF file? */
412 if ((hdr->e_ident[EI_MAG0] != ELFMAG0) ||
413 (hdr->e_ident[EI_MAG1] != ELFMAG1) ||
414 (hdr->e_ident[EI_MAG2] != ELFMAG2) ||
415 (hdr->e_ident[EI_MAG3] != ELFMAG3)) {
416 /* Not an ELF file - silently ignore it */
417 return 0;
418 }
419
420 switch (hdr->e_ident[EI_DATA]) {
421 case ELFDATA2LSB:
422 target_is_big_endian = false;
423 break;
424 case ELFDATA2MSB:
425 target_is_big_endian = true;
426 break;
427 default:
428 fatal("target endian is unknown\n");
429 }
430
431 /* Fix endianness in ELF header */
432 hdr->e_type = TO_NATIVE(hdr->e_type);
433 hdr->e_machine = TO_NATIVE(hdr->e_machine);
434 hdr->e_version = TO_NATIVE(hdr->e_version);
435 hdr->e_entry = TO_NATIVE(hdr->e_entry);
436 hdr->e_phoff = TO_NATIVE(hdr->e_phoff);
437 hdr->e_shoff = TO_NATIVE(hdr->e_shoff);
438 hdr->e_flags = TO_NATIVE(hdr->e_flags);
439 hdr->e_ehsize = TO_NATIVE(hdr->e_ehsize);
440 hdr->e_phentsize = TO_NATIVE(hdr->e_phentsize);
441 hdr->e_phnum = TO_NATIVE(hdr->e_phnum);
442 hdr->e_shentsize = TO_NATIVE(hdr->e_shentsize);
443 hdr->e_shnum = TO_NATIVE(hdr->e_shnum);
444 hdr->e_shstrndx = TO_NATIVE(hdr->e_shstrndx);
445 sechdrs = (void *)hdr + hdr->e_shoff;
446 info->sechdrs = sechdrs;
447
448 /* modpost only works for relocatable objects */
449 if (hdr->e_type != ET_REL)
450 fatal("%s: not relocatable object.", filename);
451
452 /* Check if file offset is correct */
453 if (hdr->e_shoff > info->size)
454 fatal("section header offset=%lu in file '%s' is bigger than filesize=%zu\n",
455 (unsigned long)hdr->e_shoff, filename, info->size);
456
457 if (hdr->e_shnum == SHN_UNDEF) {
458 /*
459 * There are more than 64k sections,
460 * read count from .sh_size.
461 */
462 info->num_sections = TO_NATIVE(sechdrs[0].sh_size);
463 }
464 else {
465 info->num_sections = hdr->e_shnum;
466 }
467 if (hdr->e_shstrndx == SHN_XINDEX) {
468 info->secindex_strings = TO_NATIVE(sechdrs[0].sh_link);
469 }
470 else {
471 info->secindex_strings = hdr->e_shstrndx;
472 }
473
474 /* Fix endianness in section headers */
475 for (i = 0; i < info->num_sections; i++) {
476 sechdrs[i].sh_name = TO_NATIVE(sechdrs[i].sh_name);
477 sechdrs[i].sh_type = TO_NATIVE(sechdrs[i].sh_type);
478 sechdrs[i].sh_flags = TO_NATIVE(sechdrs[i].sh_flags);
479 sechdrs[i].sh_addr = TO_NATIVE(sechdrs[i].sh_addr);
480 sechdrs[i].sh_offset = TO_NATIVE(sechdrs[i].sh_offset);
481 sechdrs[i].sh_size = TO_NATIVE(sechdrs[i].sh_size);
482 sechdrs[i].sh_link = TO_NATIVE(sechdrs[i].sh_link);
483 sechdrs[i].sh_info = TO_NATIVE(sechdrs[i].sh_info);
484 sechdrs[i].sh_addralign = TO_NATIVE(sechdrs[i].sh_addralign);
485 sechdrs[i].sh_entsize = TO_NATIVE(sechdrs[i].sh_entsize);
486 }
487 /* Find symbol table. */
488 secstrings = (void *)hdr + sechdrs[info->secindex_strings].sh_offset;
489 for (i = 1; i < info->num_sections; i++) {
490 const char *secname;
491 int nobits = sechdrs[i].sh_type == SHT_NOBITS;
492
493 if (!nobits && sechdrs[i].sh_offset > info->size)
494 fatal("%s is truncated. sechdrs[i].sh_offset=%lu > sizeof(*hrd)=%zu\n",
495 filename, (unsigned long)sechdrs[i].sh_offset,
496 sizeof(*hdr));
497
498 secname = secstrings + sechdrs[i].sh_name;
499 if (strcmp(secname, ".modinfo") == 0) {
500 if (nobits)
501 fatal("%s has NOBITS .modinfo\n", filename);
502 info->modinfo = (void *)hdr + sechdrs[i].sh_offset;
503 info->modinfo_len = sechdrs[i].sh_size;
504 } else if (!strcmp(secname, ".export_symbol")) {
505 info->export_symbol_secndx = i;
506 }
507
508 if (sechdrs[i].sh_type == SHT_SYMTAB) {
509 unsigned int sh_link_idx;
510 symtab_idx = i;
511 info->symtab_start = (void *)hdr +
512 sechdrs[i].sh_offset;
513 info->symtab_stop = (void *)hdr +
514 sechdrs[i].sh_offset + sechdrs[i].sh_size;
515 sh_link_idx = sechdrs[i].sh_link;
516 info->strtab = (void *)hdr +
517 sechdrs[sh_link_idx].sh_offset;
518 }
519
520 /* 32bit section no. table? ("more than 64k sections") */
521 if (sechdrs[i].sh_type == SHT_SYMTAB_SHNDX) {
522 symtab_shndx_idx = i;
523 info->symtab_shndx_start = (void *)hdr +
524 sechdrs[i].sh_offset;
525 info->symtab_shndx_stop = (void *)hdr +
526 sechdrs[i].sh_offset + sechdrs[i].sh_size;
527 }
528 }
529 if (!info->symtab_start)
530 fatal("%s has no symtab?\n", filename);
531
532 /* Fix endianness in symbols */
533 for (sym = info->symtab_start; sym < info->symtab_stop; sym++) {
534 sym->st_shndx = TO_NATIVE(sym->st_shndx);
535 sym->st_name = TO_NATIVE(sym->st_name);
536 sym->st_value = TO_NATIVE(sym->st_value);
537 sym->st_size = TO_NATIVE(sym->st_size);
538 }
539
540 if (symtab_shndx_idx != ~0U) {
541 Elf32_Word *p;
542 if (symtab_idx != sechdrs[symtab_shndx_idx].sh_link)
543 fatal("%s: SYMTAB_SHNDX has bad sh_link: %u!=%u\n",
544 filename, sechdrs[symtab_shndx_idx].sh_link,
545 symtab_idx);
546 /* Fix endianness */
547 for (p = info->symtab_shndx_start; p < info->symtab_shndx_stop;
548 p++)
549 *p = TO_NATIVE(*p);
550 }
551
552 symsearch_init(info);
553
554 return 1;
555}
556
557static void parse_elf_finish(struct elf_info *info)
558{
559 symsearch_finish(info);
560 release_file(info->hdr, info->size);
561}
562
563static int ignore_undef_symbol(struct elf_info *info, const char *symname)
564{
565 /* ignore __this_module, it will be resolved shortly */
566 if (strcmp(symname, "__this_module") == 0)
567 return 1;
568 /* ignore global offset table */
569 if (strcmp(symname, "_GLOBAL_OFFSET_TABLE_") == 0)
570 return 1;
571 if (info->hdr->e_machine == EM_PPC)
572 /* Special register function linked on all modules during final link of .ko */
573 if (strstarts(symname, "_restgpr_") ||
574 strstarts(symname, "_savegpr_") ||
575 strstarts(symname, "_rest32gpr_") ||
576 strstarts(symname, "_save32gpr_") ||
577 strstarts(symname, "_restvr_") ||
578 strstarts(symname, "_savevr_"))
579 return 1;
580 if (info->hdr->e_machine == EM_PPC64)
581 /* Special register function linked on all modules during final link of .ko */
582 if (strstarts(symname, "_restgpr0_") ||
583 strstarts(symname, "_savegpr0_") ||
584 strstarts(symname, "_restvr_") ||
585 strstarts(symname, "_savevr_") ||
586 strcmp(symname, ".TOC.") == 0)
587 return 1;
588 /* Do not ignore this symbol */
589 return 0;
590}
591
592static void handle_symbol(struct module *mod, struct elf_info *info,
593 const Elf_Sym *sym, const char *symname)
594{
595 switch (sym->st_shndx) {
596 case SHN_COMMON:
597 if (strstarts(symname, "__gnu_lto_")) {
598 /* Should warn here, but modpost runs before the linker */
599 } else
600 warn("\"%s\" [%s] is COMMON symbol\n", symname, mod->name);
601 break;
602 case SHN_UNDEF:
603 /* undefined symbol */
604 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
605 ELF_ST_BIND(sym->st_info) != STB_WEAK)
606 break;
607 if (ignore_undef_symbol(info, symname))
608 break;
609 if (info->hdr->e_machine == EM_SPARC ||
610 info->hdr->e_machine == EM_SPARCV9) {
611 /* Ignore register directives. */
612 if (ELF_ST_TYPE(sym->st_info) == STT_SPARC_REGISTER)
613 break;
614 if (symname[0] == '.') {
615 char *munged = xstrdup(symname);
616 munged[0] = '_';
617 munged[1] = toupper(munged[1]);
618 symname = munged;
619 }
620 }
621
622 sym_add_unresolved(symname, mod,
623 ELF_ST_BIND(sym->st_info) == STB_WEAK);
624 break;
625 default:
626 if (strcmp(symname, "init_module") == 0)
627 mod->has_init = true;
628 if (strcmp(symname, "cleanup_module") == 0)
629 mod->has_cleanup = true;
630 break;
631 }
632}
633
634/**
635 * Parse tag=value strings from .modinfo section
636 **/
637static char *next_string(char *string, unsigned long *secsize)
638{
639 /* Skip non-zero chars */
640 while (string[0]) {
641 string++;
642 if ((*secsize)-- <= 1)
643 return NULL;
644 }
645
646 /* Skip any zero padding. */
647 while (!string[0]) {
648 string++;
649 if ((*secsize)-- <= 1)
650 return NULL;
651 }
652 return string;
653}
654
655static char *get_next_modinfo(struct elf_info *info, const char *tag,
656 char *prev)
657{
658 char *p;
659 unsigned int taglen = strlen(tag);
660 char *modinfo = info->modinfo;
661 unsigned long size = info->modinfo_len;
662
663 if (prev) {
664 size -= prev - modinfo;
665 modinfo = next_string(prev, &size);
666 }
667
668 for (p = modinfo; p; p = next_string(p, &size)) {
669 if (strncmp(p, tag, taglen) == 0 && p[taglen] == '=')
670 return p + taglen + 1;
671 }
672 return NULL;
673}
674
675static char *get_modinfo(struct elf_info *info, const char *tag)
676
677{
678 return get_next_modinfo(info, tag, NULL);
679}
680
681static const char *sym_name(struct elf_info *elf, Elf_Sym *sym)
682{
683 return sym ? elf->strtab + sym->st_name : "";
684}
685
686/*
687 * Check whether the 'string' argument matches one of the 'patterns',
688 * an array of shell wildcard patterns (glob).
689 *
690 * Return true is there is a match.
691 */
692static bool match(const char *string, const char *const patterns[])
693{
694 const char *pattern;
695
696 while ((pattern = *patterns++)) {
697 if (!fnmatch(pattern, string, 0))
698 return true;
699 }
700
701 return false;
702}
703
704/* useful to pass patterns to match() directly */
705#define PATTERNS(...) \
706 ({ \
707 static const char *const patterns[] = {__VA_ARGS__, NULL}; \
708 patterns; \
709 })
710
711/* sections that we do not want to do full section mismatch check on */
712static const char *const section_white_list[] =
713{
714 ".comment*",
715 ".debug*",
716 ".zdebug*", /* Compressed debug sections. */
717 ".GCC.command.line", /* record-gcc-switches */
718 ".mdebug*", /* alpha, score, mips etc. */
719 ".pdr", /* alpha, score, mips etc. */
720 ".stab*",
721 ".note*",
722 ".got*",
723 ".toc*",
724 ".xt.prop", /* xtensa */
725 ".xt.lit", /* xtensa */
726 ".arcextmap*", /* arc */
727 ".gnu.linkonce.arcext*", /* arc : modules */
728 ".cmem*", /* EZchip */
729 ".fmt_slot*", /* EZchip */
730 ".gnu.lto*",
731 ".discard.*",
732 ".llvm.call-graph-profile", /* call graph */
733 NULL
734};
735
736/*
737 * This is used to find sections missing the SHF_ALLOC flag.
738 * The cause of this is often a section specified in assembler
739 * without "ax" / "aw".
740 */
741static void check_section(const char *modname, struct elf_info *elf,
742 Elf_Shdr *sechdr)
743{
744 const char *sec = sech_name(elf, sechdr);
745
746 if (sechdr->sh_type == SHT_PROGBITS &&
747 !(sechdr->sh_flags & SHF_ALLOC) &&
748 !match(sec, section_white_list)) {
749 warn("%s (%s): unexpected non-allocatable section.\n"
750 "Did you forget to use \"ax\"/\"aw\" in a .S file?\n"
751 "Note that for example <linux/init.h> contains\n"
752 "section definitions for use in .S files.\n\n",
753 modname, sec);
754 }
755}
756
757
758
759#define ALL_INIT_DATA_SECTIONS \
760 ".init.setup", ".init.rodata", ".init.data"
761
762#define ALL_PCI_INIT_SECTIONS \
763 ".pci_fixup_early", ".pci_fixup_header", ".pci_fixup_final", \
764 ".pci_fixup_enable", ".pci_fixup_resume", \
765 ".pci_fixup_resume_early", ".pci_fixup_suspend"
766
767#define ALL_INIT_SECTIONS ".init.*"
768#define ALL_EXIT_SECTIONS ".exit.*"
769
770#define DATA_SECTIONS ".data", ".data.rel"
771#define TEXT_SECTIONS ".text", ".text.*", ".sched.text", \
772 ".kprobes.text", ".cpuidle.text", ".noinstr.text", \
773 ".ltext", ".ltext.*"
774#define OTHER_TEXT_SECTIONS ".ref.text", ".head.text", ".spinlock.text", \
775 ".fixup", ".entry.text", ".exception.text", \
776 ".coldtext", ".softirqentry.text", ".irqentry.text"
777
778#define ALL_TEXT_SECTIONS ".init.text", ".exit.text", \
779 TEXT_SECTIONS, OTHER_TEXT_SECTIONS
780
781enum mismatch {
782 TEXTDATA_TO_ANY_INIT_EXIT,
783 XXXINIT_TO_SOME_INIT,
784 ANY_INIT_TO_ANY_EXIT,
785 ANY_EXIT_TO_ANY_INIT,
786 EXTABLE_TO_NON_TEXT,
787};
788
789/**
790 * Describe how to match sections on different criteria:
791 *
792 * @fromsec: Array of sections to be matched.
793 *
794 * @bad_tosec: Relocations applied to a section in @fromsec to a section in
795 * this array is forbidden (black-list). Can be empty.
796 *
797 * @good_tosec: Relocations applied to a section in @fromsec must be
798 * targeting sections in this array (white-list). Can be empty.
799 *
800 * @mismatch: Type of mismatch.
801 */
802struct sectioncheck {
803 const char *fromsec[20];
804 const char *bad_tosec[20];
805 const char *good_tosec[20];
806 enum mismatch mismatch;
807};
808
809static const struct sectioncheck sectioncheck[] = {
810/* Do not reference init/exit code/data from
811 * normal code and data
812 */
813{
814 .fromsec = { TEXT_SECTIONS, DATA_SECTIONS, NULL },
815 .bad_tosec = { ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS, NULL },
816 .mismatch = TEXTDATA_TO_ANY_INIT_EXIT,
817},
818/* Do not use exit code/data from init code */
819{
820 .fromsec = { ALL_INIT_SECTIONS, NULL },
821 .bad_tosec = { ALL_EXIT_SECTIONS, NULL },
822 .mismatch = ANY_INIT_TO_ANY_EXIT,
823},
824/* Do not use init code/data from exit code */
825{
826 .fromsec = { ALL_EXIT_SECTIONS, NULL },
827 .bad_tosec = { ALL_INIT_SECTIONS, NULL },
828 .mismatch = ANY_EXIT_TO_ANY_INIT,
829},
830{
831 .fromsec = { ALL_PCI_INIT_SECTIONS, NULL },
832 .bad_tosec = { ALL_INIT_SECTIONS, NULL },
833 .mismatch = ANY_INIT_TO_ANY_EXIT,
834},
835{
836 .fromsec = { "__ex_table", NULL },
837 /* If you're adding any new black-listed sections in here, consider
838 * adding a special 'printer' for them in scripts/check_extable.
839 */
840 .bad_tosec = { ".altinstr_replacement", NULL },
841 .good_tosec = {ALL_TEXT_SECTIONS , NULL},
842 .mismatch = EXTABLE_TO_NON_TEXT,
843}
844};
845
846static const struct sectioncheck *section_mismatch(
847 const char *fromsec, const char *tosec)
848{
849 int i;
850
851 /*
852 * The target section could be the SHT_NUL section when we're
853 * handling relocations to un-resolved symbols, trying to match it
854 * doesn't make much sense and causes build failures on parisc
855 * architectures.
856 */
857 if (*tosec == '\0')
858 return NULL;
859
860 for (i = 0; i < ARRAY_SIZE(sectioncheck); i++) {
861 const struct sectioncheck *check = §ioncheck[i];
862
863 if (match(fromsec, check->fromsec)) {
864 if (check->bad_tosec[0] && match(tosec, check->bad_tosec))
865 return check;
866 if (check->good_tosec[0] && !match(tosec, check->good_tosec))
867 return check;
868 }
869 }
870 return NULL;
871}
872
873/**
874 * Whitelist to allow certain references to pass with no warning.
875 *
876 * Pattern 1:
877 * If a module parameter is declared __initdata and permissions=0
878 * then this is legal despite the warning generated.
879 * We cannot see value of permissions here, so just ignore
880 * this pattern.
881 * The pattern is identified by:
882 * tosec = .init.data
883 * fromsec = .data*
884 * atsym =__param*
885 *
886 * Pattern 1a:
887 * module_param_call() ops can refer to __init set function if permissions=0
888 * The pattern is identified by:
889 * tosec = .init.text
890 * fromsec = .data*
891 * atsym = __param_ops_*
892 *
893 * Pattern 3:
894 * Whitelist all references from .head.text to any init section
895 *
896 * Pattern 4:
897 * Some symbols belong to init section but still it is ok to reference
898 * these from non-init sections as these symbols don't have any memory
899 * allocated for them and symbol address and value are same. So even
900 * if init section is freed, its ok to reference those symbols.
901 * For ex. symbols marking the init section boundaries.
902 * This pattern is identified by
903 * refsymname = __init_begin, _sinittext, _einittext
904 *
905 * Pattern 5:
906 * GCC may optimize static inlines when fed constant arg(s) resulting
907 * in functions like cpumask_empty() -- generating an associated symbol
908 * cpumask_empty.constprop.3 that appears in the audit. If the const that
909 * is passed in comes from __init, like say nmi_ipi_mask, we get a
910 * meaningless section warning. May need to add isra symbols too...
911 * This pattern is identified by
912 * tosec = init section
913 * fromsec = text section
914 * refsymname = *.constprop.*
915 *
916 **/
917static int secref_whitelist(const char *fromsec, const char *fromsym,
918 const char *tosec, const char *tosym)
919{
920 /* Check for pattern 1 */
921 if (match(tosec, PATTERNS(ALL_INIT_DATA_SECTIONS)) &&
922 match(fromsec, PATTERNS(DATA_SECTIONS)) &&
923 strstarts(fromsym, "__param"))
924 return 0;
925
926 /* Check for pattern 1a */
927 if (strcmp(tosec, ".init.text") == 0 &&
928 match(fromsec, PATTERNS(DATA_SECTIONS)) &&
929 strstarts(fromsym, "__param_ops_"))
930 return 0;
931
932 /* symbols in data sections that may refer to any init/exit sections */
933 if (match(fromsec, PATTERNS(DATA_SECTIONS)) &&
934 match(tosec, PATTERNS(ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS)) &&
935 match(fromsym, PATTERNS("*_ops", "*_probe", "*_console")))
936 return 0;
937
938 /* Check for pattern 3 */
939 if (strstarts(fromsec, ".head.text") &&
940 match(tosec, PATTERNS(ALL_INIT_SECTIONS)))
941 return 0;
942
943 /* Check for pattern 4 */
944 if (match(tosym, PATTERNS("__init_begin", "_sinittext", "_einittext")))
945 return 0;
946
947 /* Check for pattern 5 */
948 if (match(fromsec, PATTERNS(ALL_TEXT_SECTIONS)) &&
949 match(tosec, PATTERNS(ALL_INIT_SECTIONS)) &&
950 match(fromsym, PATTERNS("*.constprop.*")))
951 return 0;
952
953 return 1;
954}
955
956static Elf_Sym *find_fromsym(struct elf_info *elf, Elf_Addr addr,
957 unsigned int secndx)
958{
959 return symsearch_find_nearest(elf, addr, secndx, false, ~0);
960}
961
962static Elf_Sym *find_tosym(struct elf_info *elf, Elf_Addr addr, Elf_Sym *sym)
963{
964 Elf_Sym *new_sym;
965
966 /* If the supplied symbol has a valid name, return it */
967 if (is_valid_name(elf, sym))
968 return sym;
969
970 /*
971 * Strive to find a better symbol name, but the resulting name may not
972 * match the symbol referenced in the original code.
973 */
974 new_sym = symsearch_find_nearest(elf, addr, get_secindex(elf, sym),
975 true, 20);
976 return new_sym ? new_sym : sym;
977}
978
979static bool is_executable_section(struct elf_info *elf, unsigned int secndx)
980{
981 if (secndx >= elf->num_sections)
982 return false;
983
984 return (elf->sechdrs[secndx].sh_flags & SHF_EXECINSTR) != 0;
985}
986
987static void default_mismatch_handler(const char *modname, struct elf_info *elf,
988 const struct sectioncheck* const mismatch,
989 Elf_Sym *tsym,
990 unsigned int fsecndx, const char *fromsec, Elf_Addr faddr,
991 const char *tosec, Elf_Addr taddr)
992{
993 Elf_Sym *from;
994 const char *tosym;
995 const char *fromsym;
996 char taddr_str[16];
997
998 from = find_fromsym(elf, faddr, fsecndx);
999 fromsym = sym_name(elf, from);
1000
1001 tsym = find_tosym(elf, taddr, tsym);
1002 tosym = sym_name(elf, tsym);
1003
1004 /* check whitelist - we may ignore it */
1005 if (!secref_whitelist(fromsec, fromsym, tosec, tosym))
1006 return;
1007
1008 sec_mismatch_count++;
1009
1010 if (!tosym[0])
1011 snprintf(taddr_str, sizeof(taddr_str), "0x%x", (unsigned int)taddr);
1012
1013 /*
1014 * The format for the reference source: <symbol_name>+<offset> or <address>
1015 * The format for the reference destination: <symbol_name> or <address>
1016 */
1017 warn("%s: section mismatch in reference: %s%s0x%x (section: %s) -> %s (section: %s)\n",
1018 modname, fromsym, fromsym[0] ? "+" : "",
1019 (unsigned int)(faddr - (fromsym[0] ? from->st_value : 0)),
1020 fromsec, tosym[0] ? tosym : taddr_str, tosec);
1021
1022 if (mismatch->mismatch == EXTABLE_TO_NON_TEXT) {
1023 if (match(tosec, mismatch->bad_tosec))
1024 fatal("The relocation at %s+0x%lx references\n"
1025 "section \"%s\" which is black-listed.\n"
1026 "Something is seriously wrong and should be fixed.\n"
1027 "You might get more information about where this is\n"
1028 "coming from by using scripts/check_extable.sh %s\n",
1029 fromsec, (long)faddr, tosec, modname);
1030 else if (is_executable_section(elf, get_secindex(elf, tsym)))
1031 warn("The relocation at %s+0x%lx references\n"
1032 "section \"%s\" which is not in the list of\n"
1033 "authorized sections. If you're adding a new section\n"
1034 "and/or if this reference is valid, add \"%s\" to the\n"
1035 "list of authorized sections to jump to on fault.\n"
1036 "This can be achieved by adding \"%s\" to\n"
1037 "OTHER_TEXT_SECTIONS in scripts/mod/modpost.c.\n",
1038 fromsec, (long)faddr, tosec, tosec, tosec);
1039 else
1040 error("%s+0x%lx references non-executable section '%s'\n",
1041 fromsec, (long)faddr, tosec);
1042 }
1043}
1044
1045static void check_export_symbol(struct module *mod, struct elf_info *elf,
1046 Elf_Addr faddr, const char *secname,
1047 Elf_Sym *sym)
1048{
1049 static const char *prefix = "__export_symbol_";
1050 const char *label_name, *name, *data;
1051 Elf_Sym *label;
1052 struct symbol *s;
1053 bool is_gpl;
1054
1055 label = find_fromsym(elf, faddr, elf->export_symbol_secndx);
1056 label_name = sym_name(elf, label);
1057
1058 if (!strstarts(label_name, prefix)) {
1059 error("%s: .export_symbol section contains strange symbol '%s'\n",
1060 mod->name, label_name);
1061 return;
1062 }
1063
1064 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
1065 ELF_ST_BIND(sym->st_info) != STB_WEAK) {
1066 error("%s: local symbol '%s' was exported\n", mod->name,
1067 label_name + strlen(prefix));
1068 return;
1069 }
1070
1071 name = sym_name(elf, sym);
1072 if (strcmp(label_name + strlen(prefix), name)) {
1073 error("%s: .export_symbol section references '%s', but it does not seem to be an export symbol\n",
1074 mod->name, name);
1075 return;
1076 }
1077
1078 data = sym_get_data(elf, label); /* license */
1079 if (!strcmp(data, "GPL")) {
1080 is_gpl = true;
1081 } else if (!strcmp(data, "")) {
1082 is_gpl = false;
1083 } else {
1084 error("%s: unknown license '%s' was specified for '%s'\n",
1085 mod->name, data, name);
1086 return;
1087 }
1088
1089 data += strlen(data) + 1; /* namespace */
1090 s = sym_add_exported(name, mod, is_gpl, data);
1091
1092 /*
1093 * We need to be aware whether we are exporting a function or
1094 * a data on some architectures.
1095 */
1096 s->is_func = (ELF_ST_TYPE(sym->st_info) == STT_FUNC);
1097
1098 /*
1099 * For parisc64, symbols prefixed $$ from the library have the symbol type
1100 * STT_LOPROC. They should be handled as functions too.
1101 */
1102 if (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64 &&
1103 elf->hdr->e_machine == EM_PARISC &&
1104 ELF_ST_TYPE(sym->st_info) == STT_LOPROC)
1105 s->is_func = true;
1106
1107 if (match(secname, PATTERNS(ALL_INIT_SECTIONS)))
1108 warn("%s: %s: EXPORT_SYMBOL used for init symbol. Remove __init or EXPORT_SYMBOL.\n",
1109 mod->name, name);
1110 else if (match(secname, PATTERNS(ALL_EXIT_SECTIONS)))
1111 warn("%s: %s: EXPORT_SYMBOL used for exit symbol. Remove __exit or EXPORT_SYMBOL.\n",
1112 mod->name, name);
1113}
1114
1115static void check_section_mismatch(struct module *mod, struct elf_info *elf,
1116 Elf_Sym *sym,
1117 unsigned int fsecndx, const char *fromsec,
1118 Elf_Addr faddr, Elf_Addr taddr)
1119{
1120 const char *tosec = sec_name(elf, get_secindex(elf, sym));
1121 const struct sectioncheck *mismatch;
1122
1123 if (module_enabled && elf->export_symbol_secndx == fsecndx) {
1124 check_export_symbol(mod, elf, faddr, tosec, sym);
1125 return;
1126 }
1127
1128 mismatch = section_mismatch(fromsec, tosec);
1129 if (!mismatch)
1130 return;
1131
1132 default_mismatch_handler(mod->name, elf, mismatch, sym,
1133 fsecndx, fromsec, faddr,
1134 tosec, taddr);
1135}
1136
1137static Elf_Addr addend_386_rel(uint32_t *location, unsigned int r_type)
1138{
1139 switch (r_type) {
1140 case R_386_32:
1141 return get_unaligned_native(location);
1142 case R_386_PC32:
1143 return get_unaligned_native(location) + 4;
1144 }
1145
1146 return (Elf_Addr)(-1);
1147}
1148
1149static int32_t sign_extend32(int32_t value, int index)
1150{
1151 uint8_t shift = 31 - index;
1152
1153 return (int32_t)(value << shift) >> shift;
1154}
1155
1156static Elf_Addr addend_arm_rel(void *loc, Elf_Sym *sym, unsigned int r_type)
1157{
1158 uint32_t inst, upper, lower, sign, j1, j2;
1159 int32_t offset;
1160
1161 switch (r_type) {
1162 case R_ARM_ABS32:
1163 case R_ARM_REL32:
1164 inst = get_unaligned_native((uint32_t *)loc);
1165 return inst + sym->st_value;
1166 case R_ARM_MOVW_ABS_NC:
1167 case R_ARM_MOVT_ABS:
1168 inst = get_unaligned_native((uint32_t *)loc);
1169 offset = sign_extend32(((inst & 0xf0000) >> 4) | (inst & 0xfff),
1170 15);
1171 return offset + sym->st_value;
1172 case R_ARM_PC24:
1173 case R_ARM_CALL:
1174 case R_ARM_JUMP24:
1175 inst = get_unaligned_native((uint32_t *)loc);
1176 offset = sign_extend32((inst & 0x00ffffff) << 2, 25);
1177 return offset + sym->st_value + 8;
1178 case R_ARM_THM_MOVW_ABS_NC:
1179 case R_ARM_THM_MOVT_ABS:
1180 upper = get_unaligned_native((uint16_t *)loc);
1181 lower = get_unaligned_native((uint16_t *)loc + 1);
1182 offset = sign_extend32(((upper & 0x000f) << 12) |
1183 ((upper & 0x0400) << 1) |
1184 ((lower & 0x7000) >> 4) |
1185 (lower & 0x00ff),
1186 15);
1187 return offset + sym->st_value;
1188 case R_ARM_THM_JUMP19:
1189 /*
1190 * Encoding T3:
1191 * S = upper[10]
1192 * imm6 = upper[5:0]
1193 * J1 = lower[13]
1194 * J2 = lower[11]
1195 * imm11 = lower[10:0]
1196 * imm32 = SignExtend(S:J2:J1:imm6:imm11:'0')
1197 */
1198 upper = get_unaligned_native((uint16_t *)loc);
1199 lower = get_unaligned_native((uint16_t *)loc + 1);
1200
1201 sign = (upper >> 10) & 1;
1202 j1 = (lower >> 13) & 1;
1203 j2 = (lower >> 11) & 1;
1204 offset = sign_extend32((sign << 20) | (j2 << 19) | (j1 << 18) |
1205 ((upper & 0x03f) << 12) |
1206 ((lower & 0x07ff) << 1),
1207 20);
1208 return offset + sym->st_value + 4;
1209 case R_ARM_THM_PC22:
1210 case R_ARM_THM_JUMP24:
1211 /*
1212 * Encoding T4:
1213 * S = upper[10]
1214 * imm10 = upper[9:0]
1215 * J1 = lower[13]
1216 * J2 = lower[11]
1217 * imm11 = lower[10:0]
1218 * I1 = NOT(J1 XOR S)
1219 * I2 = NOT(J2 XOR S)
1220 * imm32 = SignExtend(S:I1:I2:imm10:imm11:'0')
1221 */
1222 upper = get_unaligned_native((uint16_t *)loc);
1223 lower = get_unaligned_native((uint16_t *)loc + 1);
1224
1225 sign = (upper >> 10) & 1;
1226 j1 = (lower >> 13) & 1;
1227 j2 = (lower >> 11) & 1;
1228 offset = sign_extend32((sign << 24) |
1229 ((~(j1 ^ sign) & 1) << 23) |
1230 ((~(j2 ^ sign) & 1) << 22) |
1231 ((upper & 0x03ff) << 12) |
1232 ((lower & 0x07ff) << 1),
1233 24);
1234 return offset + sym->st_value + 4;
1235 }
1236
1237 return (Elf_Addr)(-1);
1238}
1239
1240static Elf_Addr addend_mips_rel(uint32_t *location, unsigned int r_type)
1241{
1242 uint32_t inst;
1243
1244 inst = get_unaligned_native(location);
1245 switch (r_type) {
1246 case R_MIPS_LO16:
1247 return inst & 0xffff;
1248 case R_MIPS_26:
1249 return (inst & 0x03ffffff) << 2;
1250 case R_MIPS_32:
1251 return inst;
1252 }
1253 return (Elf_Addr)(-1);
1254}
1255
1256#ifndef EM_RISCV
1257#define EM_RISCV 243
1258#endif
1259
1260#ifndef R_RISCV_SUB32
1261#define R_RISCV_SUB32 39
1262#endif
1263
1264#ifndef EM_LOONGARCH
1265#define EM_LOONGARCH 258
1266#endif
1267
1268#ifndef R_LARCH_SUB32
1269#define R_LARCH_SUB32 55
1270#endif
1271
1272#ifndef R_LARCH_RELAX
1273#define R_LARCH_RELAX 100
1274#endif
1275
1276#ifndef R_LARCH_ALIGN
1277#define R_LARCH_ALIGN 102
1278#endif
1279
1280static void get_rel_type_and_sym(struct elf_info *elf, uint64_t r_info,
1281 unsigned int *r_type, unsigned int *r_sym)
1282{
1283 typedef struct {
1284 Elf64_Word r_sym; /* Symbol index */
1285 unsigned char r_ssym; /* Special symbol for 2nd relocation */
1286 unsigned char r_type3; /* 3rd relocation type */
1287 unsigned char r_type2; /* 2nd relocation type */
1288 unsigned char r_type; /* 1st relocation type */
1289 } Elf64_Mips_R_Info;
1290
1291 bool is_64bit = (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64);
1292
1293 if (elf->hdr->e_machine == EM_MIPS && is_64bit) {
1294 Elf64_Mips_R_Info *mips64_r_info = (void *)&r_info;
1295
1296 *r_type = mips64_r_info->r_type;
1297 *r_sym = TO_NATIVE(mips64_r_info->r_sym);
1298 return;
1299 }
1300
1301 if (is_64bit)
1302 r_info = TO_NATIVE((Elf64_Xword)r_info);
1303 else
1304 r_info = TO_NATIVE((Elf32_Word)r_info);
1305
1306 *r_type = ELF_R_TYPE(r_info);
1307 *r_sym = ELF_R_SYM(r_info);
1308}
1309
1310static void section_rela(struct module *mod, struct elf_info *elf,
1311 unsigned int fsecndx, const char *fromsec,
1312 const Elf_Rela *start, const Elf_Rela *stop)
1313{
1314 const Elf_Rela *rela;
1315
1316 for (rela = start; rela < stop; rela++) {
1317 Elf_Sym *tsym;
1318 Elf_Addr taddr, r_offset;
1319 unsigned int r_type, r_sym;
1320
1321 r_offset = TO_NATIVE(rela->r_offset);
1322 get_rel_type_and_sym(elf, rela->r_info, &r_type, &r_sym);
1323
1324 tsym = elf->symtab_start + r_sym;
1325 taddr = tsym->st_value + TO_NATIVE(rela->r_addend);
1326
1327 switch (elf->hdr->e_machine) {
1328 case EM_RISCV:
1329 if (!strcmp("__ex_table", fromsec) &&
1330 r_type == R_RISCV_SUB32)
1331 continue;
1332 break;
1333 case EM_LOONGARCH:
1334 switch (r_type) {
1335 case R_LARCH_SUB32:
1336 if (!strcmp("__ex_table", fromsec))
1337 continue;
1338 break;
1339 case R_LARCH_RELAX:
1340 case R_LARCH_ALIGN:
1341 /* These relocs do not refer to symbols */
1342 continue;
1343 }
1344 break;
1345 }
1346
1347 check_section_mismatch(mod, elf, tsym,
1348 fsecndx, fromsec, r_offset, taddr);
1349 }
1350}
1351
1352static void section_rel(struct module *mod, struct elf_info *elf,
1353 unsigned int fsecndx, const char *fromsec,
1354 const Elf_Rel *start, const Elf_Rel *stop)
1355{
1356 const Elf_Rel *rel;
1357
1358 for (rel = start; rel < stop; rel++) {
1359 Elf_Sym *tsym;
1360 Elf_Addr taddr, r_offset;
1361 unsigned int r_type, r_sym;
1362 void *loc;
1363
1364 r_offset = TO_NATIVE(rel->r_offset);
1365 get_rel_type_and_sym(elf, rel->r_info, &r_type, &r_sym);
1366
1367 loc = sym_get_data_by_offset(elf, fsecndx, r_offset);
1368 tsym = elf->symtab_start + r_sym;
1369
1370 switch (elf->hdr->e_machine) {
1371 case EM_386:
1372 taddr = addend_386_rel(loc, r_type);
1373 break;
1374 case EM_ARM:
1375 taddr = addend_arm_rel(loc, tsym, r_type);
1376 break;
1377 case EM_MIPS:
1378 taddr = addend_mips_rel(loc, r_type);
1379 break;
1380 default:
1381 fatal("Please add code to calculate addend for this architecture\n");
1382 }
1383
1384 check_section_mismatch(mod, elf, tsym,
1385 fsecndx, fromsec, r_offset, taddr);
1386 }
1387}
1388
1389/**
1390 * A module includes a number of sections that are discarded
1391 * either when loaded or when used as built-in.
1392 * For loaded modules all functions marked __init and all data
1393 * marked __initdata will be discarded when the module has been initialized.
1394 * Likewise for modules used built-in the sections marked __exit
1395 * are discarded because __exit marked function are supposed to be called
1396 * only when a module is unloaded which never happens for built-in modules.
1397 * The check_sec_ref() function traverses all relocation records
1398 * to find all references to a section that reference a section that will
1399 * be discarded and warns about it.
1400 **/
1401static void check_sec_ref(struct module *mod, struct elf_info *elf)
1402{
1403 int i;
1404
1405 /* Walk through all sections */
1406 for (i = 0; i < elf->num_sections; i++) {
1407 Elf_Shdr *sechdr = &elf->sechdrs[i];
1408
1409 check_section(mod->name, elf, sechdr);
1410 /* We want to process only relocation sections and not .init */
1411 if (sechdr->sh_type == SHT_REL || sechdr->sh_type == SHT_RELA) {
1412 /* section to which the relocation applies */
1413 unsigned int secndx = sechdr->sh_info;
1414 const char *secname = sec_name(elf, secndx);
1415 const void *start, *stop;
1416
1417 /* If the section is known good, skip it */
1418 if (match(secname, section_white_list))
1419 continue;
1420
1421 start = sym_get_data_by_offset(elf, i, 0);
1422 stop = start + sechdr->sh_size;
1423
1424 if (sechdr->sh_type == SHT_RELA)
1425 section_rela(mod, elf, secndx, secname,
1426 start, stop);
1427 else
1428 section_rel(mod, elf, secndx, secname,
1429 start, stop);
1430 }
1431 }
1432}
1433
1434static char *remove_dot(char *s)
1435{
1436 size_t n = strcspn(s, ".");
1437
1438 if (n && s[n]) {
1439 size_t m = strspn(s + n + 1, "0123456789");
1440 if (m && (s[n + m + 1] == '.' || s[n + m + 1] == 0))
1441 s[n] = 0;
1442 }
1443 return s;
1444}
1445
1446/*
1447 * The CRCs are recorded in .*.cmd files in the form of:
1448 * #SYMVER <name> <crc>
1449 */
1450static void extract_crcs_for_object(const char *object, struct module *mod)
1451{
1452 char cmd_file[PATH_MAX];
1453 char *buf, *p;
1454 const char *base;
1455 int dirlen, ret;
1456
1457 base = strrchr(object, '/');
1458 if (base) {
1459 base++;
1460 dirlen = base - object;
1461 } else {
1462 dirlen = 0;
1463 base = object;
1464 }
1465
1466 ret = snprintf(cmd_file, sizeof(cmd_file), "%.*s.%s.cmd",
1467 dirlen, object, base);
1468 if (ret >= sizeof(cmd_file)) {
1469 error("%s: too long path was truncated\n", cmd_file);
1470 return;
1471 }
1472
1473 buf = read_text_file(cmd_file);
1474 p = buf;
1475
1476 while ((p = strstr(p, "\n#SYMVER "))) {
1477 char *name;
1478 size_t namelen;
1479 unsigned int crc;
1480 struct symbol *sym;
1481
1482 name = p + strlen("\n#SYMVER ");
1483
1484 p = strchr(name, ' ');
1485 if (!p)
1486 break;
1487
1488 namelen = p - name;
1489 p++;
1490
1491 if (!isdigit(*p))
1492 continue; /* skip this line */
1493
1494 crc = strtoul(p, &p, 0);
1495 if (*p != '\n')
1496 continue; /* skip this line */
1497
1498 name[namelen] = '\0';
1499
1500 /*
1501 * sym_find_with_module() may return NULL here.
1502 * It typically occurs when CONFIG_TRIM_UNUSED_KSYMS=y.
1503 * Since commit e1327a127703, genksyms calculates CRCs of all
1504 * symbols, including trimmed ones. Ignore orphan CRCs.
1505 */
1506 sym = sym_find_with_module(name, mod);
1507 if (sym)
1508 sym_set_crc(sym, crc);
1509 }
1510
1511 free(buf);
1512}
1513
1514/*
1515 * The symbol versions (CRC) are recorded in the .*.cmd files.
1516 * Parse them to retrieve CRCs for the current module.
1517 */
1518static void mod_set_crcs(struct module *mod)
1519{
1520 char objlist[PATH_MAX];
1521 char *buf, *p, *obj;
1522 int ret;
1523
1524 if (mod->is_vmlinux) {
1525 strcpy(objlist, ".vmlinux.objs");
1526 } else {
1527 /* objects for a module are listed in the *.mod file. */
1528 ret = snprintf(objlist, sizeof(objlist), "%s.mod", mod->name);
1529 if (ret >= sizeof(objlist)) {
1530 error("%s: too long path was truncated\n", objlist);
1531 return;
1532 }
1533 }
1534
1535 buf = read_text_file(objlist);
1536 p = buf;
1537
1538 while ((obj = strsep(&p, "\n")) && obj[0])
1539 extract_crcs_for_object(obj, mod);
1540
1541 free(buf);
1542}
1543
1544static void read_symbols(const char *modname)
1545{
1546 const char *symname;
1547 char *version;
1548 char *license;
1549 char *namespace;
1550 struct module *mod;
1551 struct elf_info info = { };
1552 Elf_Sym *sym;
1553
1554 if (!parse_elf(&info, modname))
1555 return;
1556
1557 if (!strends(modname, ".o")) {
1558 error("%s: filename must be suffixed with .o\n", modname);
1559 return;
1560 }
1561
1562 /* strip trailing .o */
1563 mod = new_module(modname, strlen(modname) - strlen(".o"));
1564
1565 if (!mod->is_vmlinux) {
1566 license = get_modinfo(&info, "license");
1567 if (!license)
1568 error("missing MODULE_LICENSE() in %s\n", modname);
1569 while (license) {
1570 if (!license_is_gpl_compatible(license)) {
1571 mod->is_gpl_compatible = false;
1572 break;
1573 }
1574 license = get_next_modinfo(&info, "license", license);
1575 }
1576
1577 namespace = get_modinfo(&info, "import_ns");
1578 while (namespace) {
1579 add_namespace(&mod->imported_namespaces, namespace);
1580 namespace = get_next_modinfo(&info, "import_ns",
1581 namespace);
1582 }
1583
1584 if (extra_warn && !get_modinfo(&info, "description"))
1585 warn("missing MODULE_DESCRIPTION() in %s\n", modname);
1586 }
1587
1588 for (sym = info.symtab_start; sym < info.symtab_stop; sym++) {
1589 symname = remove_dot(info.strtab + sym->st_name);
1590
1591 handle_symbol(mod, &info, sym, symname);
1592 handle_moddevtable(mod, &info, sym, symname);
1593 }
1594
1595 check_sec_ref(mod, &info);
1596
1597 if (!mod->is_vmlinux) {
1598 version = get_modinfo(&info, "version");
1599 if (version || all_versions)
1600 get_src_version(mod->name, mod->srcversion,
1601 sizeof(mod->srcversion) - 1);
1602 }
1603
1604 parse_elf_finish(&info);
1605
1606 if (modversions) {
1607 /*
1608 * Our trick to get versioning for module struct etc. - it's
1609 * never passed as an argument to an exported function, so
1610 * the automatic versioning doesn't pick it up, but it's really
1611 * important anyhow.
1612 */
1613 sym_add_unresolved("module_layout", mod, false);
1614
1615 mod_set_crcs(mod);
1616 }
1617}
1618
1619static void read_symbols_from_files(const char *filename)
1620{
1621 FILE *in = stdin;
1622 char fname[PATH_MAX];
1623
1624 in = fopen(filename, "r");
1625 if (!in)
1626 fatal("Can't open filenames file %s: %m", filename);
1627
1628 while (fgets(fname, PATH_MAX, in) != NULL) {
1629 if (strends(fname, "\n"))
1630 fname[strlen(fname)-1] = '\0';
1631 read_symbols(fname);
1632 }
1633
1634 fclose(in);
1635}
1636
1637#define SZ 500
1638
1639/* We first write the generated file into memory using the
1640 * following helper, then compare to the file on disk and
1641 * only update the later if anything changed */
1642
1643void __attribute__((format(printf, 2, 3))) buf_printf(struct buffer *buf,
1644 const char *fmt, ...)
1645{
1646 char tmp[SZ];
1647 int len;
1648 va_list ap;
1649
1650 va_start(ap, fmt);
1651 len = vsnprintf(tmp, SZ, fmt, ap);
1652 buf_write(buf, tmp, len);
1653 va_end(ap);
1654}
1655
1656void buf_write(struct buffer *buf, const char *s, int len)
1657{
1658 if (buf->size - buf->pos < len) {
1659 buf->size += len + SZ;
1660 buf->p = xrealloc(buf->p, buf->size);
1661 }
1662 strncpy(buf->p + buf->pos, s, len);
1663 buf->pos += len;
1664}
1665
1666static void check_exports(struct module *mod)
1667{
1668 struct symbol *s, *exp;
1669
1670 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1671 const char *basename;
1672 exp = find_symbol(s->name);
1673 if (!exp) {
1674 if (!s->weak && nr_unresolved++ < MAX_UNRESOLVED_REPORTS)
1675 modpost_log(!warn_unresolved,
1676 "\"%s\" [%s.ko] undefined!\n",
1677 s->name, mod->name);
1678 continue;
1679 }
1680 if (exp->module == mod) {
1681 error("\"%s\" [%s.ko] was exported without definition\n",
1682 s->name, mod->name);
1683 continue;
1684 }
1685
1686 exp->used = true;
1687 s->module = exp->module;
1688 s->crc_valid = exp->crc_valid;
1689 s->crc = exp->crc;
1690
1691 basename = strrchr(mod->name, '/');
1692 if (basename)
1693 basename++;
1694 else
1695 basename = mod->name;
1696
1697 if (!contains_namespace(&mod->imported_namespaces, exp->namespace)) {
1698 modpost_log(!allow_missing_ns_imports,
1699 "module %s uses symbol %s from namespace %s, but does not import it.\n",
1700 basename, exp->name, exp->namespace);
1701 add_namespace(&mod->missing_namespaces, exp->namespace);
1702 }
1703
1704 if (!mod->is_gpl_compatible && exp->is_gpl_only)
1705 error("GPL-incompatible module %s.ko uses GPL-only symbol '%s'\n",
1706 basename, exp->name);
1707 }
1708}
1709
1710static void handle_white_list_exports(const char *white_list)
1711{
1712 char *buf, *p, *name;
1713
1714 buf = read_text_file(white_list);
1715 p = buf;
1716
1717 while ((name = strsep(&p, "\n"))) {
1718 struct symbol *sym = find_symbol(name);
1719
1720 if (sym)
1721 sym->used = true;
1722 }
1723
1724 free(buf);
1725}
1726
1727static void check_modname_len(struct module *mod)
1728{
1729 const char *mod_name;
1730
1731 mod_name = strrchr(mod->name, '/');
1732 if (mod_name == NULL)
1733 mod_name = mod->name;
1734 else
1735 mod_name++;
1736 if (strlen(mod_name) >= MODULE_NAME_LEN)
1737 error("module name is too long [%s.ko]\n", mod->name);
1738}
1739
1740/**
1741 * Header for the generated file
1742 **/
1743static void add_header(struct buffer *b, struct module *mod)
1744{
1745 buf_printf(b, "#include <linux/module.h>\n");
1746 buf_printf(b, "#include <linux/export-internal.h>\n");
1747 buf_printf(b, "#include <linux/compiler.h>\n");
1748 buf_printf(b, "\n");
1749 buf_printf(b, "MODULE_INFO(name, KBUILD_MODNAME);\n");
1750 buf_printf(b, "\n");
1751 buf_printf(b, "__visible struct module __this_module\n");
1752 buf_printf(b, "__section(\".gnu.linkonce.this_module\") = {\n");
1753 buf_printf(b, "\t.name = KBUILD_MODNAME,\n");
1754 if (mod->has_init)
1755 buf_printf(b, "\t.init = init_module,\n");
1756 if (mod->has_cleanup)
1757 buf_printf(b, "#ifdef CONFIG_MODULE_UNLOAD\n"
1758 "\t.exit = cleanup_module,\n"
1759 "#endif\n");
1760 buf_printf(b, "\t.arch = MODULE_ARCH_INIT,\n");
1761 buf_printf(b, "};\n");
1762
1763 if (!external_module)
1764 buf_printf(b, "\nMODULE_INFO(intree, \"Y\");\n");
1765
1766 if (strstarts(mod->name, "drivers/staging"))
1767 buf_printf(b, "\nMODULE_INFO(staging, \"Y\");\n");
1768
1769 if (strstarts(mod->name, "tools/testing"))
1770 buf_printf(b, "\nMODULE_INFO(test, \"Y\");\n");
1771}
1772
1773static void add_exported_symbols(struct buffer *buf, struct module *mod)
1774{
1775 struct symbol *sym;
1776
1777 /* generate struct for exported symbols */
1778 buf_printf(buf, "\n");
1779 list_for_each_entry(sym, &mod->exported_symbols, list) {
1780 if (trim_unused_exports && !sym->used)
1781 continue;
1782
1783 buf_printf(buf, "KSYMTAB_%s(%s, \"%s\", \"%s\");\n",
1784 sym->is_func ? "FUNC" : "DATA", sym->name,
1785 sym->is_gpl_only ? "_gpl" : "", sym->namespace);
1786 }
1787
1788 if (!modversions)
1789 return;
1790
1791 /* record CRCs for exported symbols */
1792 buf_printf(buf, "\n");
1793 list_for_each_entry(sym, &mod->exported_symbols, list) {
1794 if (trim_unused_exports && !sym->used)
1795 continue;
1796
1797 if (!sym->crc_valid)
1798 warn("EXPORT symbol \"%s\" [%s%s] version generation failed, symbol will not be versioned.\n"
1799 "Is \"%s\" prototyped in <asm/asm-prototypes.h>?\n",
1800 sym->name, mod->name, mod->is_vmlinux ? "" : ".ko",
1801 sym->name);
1802
1803 buf_printf(buf, "SYMBOL_CRC(%s, 0x%08x, \"%s\");\n",
1804 sym->name, sym->crc, sym->is_gpl_only ? "_gpl" : "");
1805 }
1806}
1807
1808/**
1809 * Record CRCs for unresolved symbols
1810 **/
1811static void add_versions(struct buffer *b, struct module *mod)
1812{
1813 struct symbol *s;
1814
1815 if (!modversions)
1816 return;
1817
1818 buf_printf(b, "\n");
1819 buf_printf(b, "static const struct modversion_info ____versions[]\n");
1820 buf_printf(b, "__used __section(\"__versions\") = {\n");
1821
1822 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1823 if (!s->module)
1824 continue;
1825 if (!s->crc_valid) {
1826 warn("\"%s\" [%s.ko] has no CRC!\n",
1827 s->name, mod->name);
1828 continue;
1829 }
1830 if (strlen(s->name) >= MODULE_NAME_LEN) {
1831 error("too long symbol \"%s\" [%s.ko]\n",
1832 s->name, mod->name);
1833 break;
1834 }
1835 buf_printf(b, "\t{ %#8x, \"%s\" },\n",
1836 s->crc, s->name);
1837 }
1838
1839 buf_printf(b, "};\n");
1840}
1841
1842static void add_depends(struct buffer *b, struct module *mod)
1843{
1844 struct symbol *s;
1845 int first = 1;
1846
1847 /* Clear ->seen flag of modules that own symbols needed by this. */
1848 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1849 if (s->module)
1850 s->module->seen = s->module->is_vmlinux;
1851 }
1852
1853 buf_printf(b, "\n");
1854 buf_printf(b, "MODULE_INFO(depends, \"");
1855 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1856 const char *p;
1857 if (!s->module)
1858 continue;
1859
1860 if (s->module->seen)
1861 continue;
1862
1863 s->module->seen = true;
1864 p = strrchr(s->module->name, '/');
1865 if (p)
1866 p++;
1867 else
1868 p = s->module->name;
1869 buf_printf(b, "%s%s", first ? "" : ",", p);
1870 first = 0;
1871 }
1872 buf_printf(b, "\");\n");
1873}
1874
1875static void add_srcversion(struct buffer *b, struct module *mod)
1876{
1877 if (mod->srcversion[0]) {
1878 buf_printf(b, "\n");
1879 buf_printf(b, "MODULE_INFO(srcversion, \"%s\");\n",
1880 mod->srcversion);
1881 }
1882}
1883
1884static void write_buf(struct buffer *b, const char *fname)
1885{
1886 FILE *file;
1887
1888 if (error_occurred)
1889 return;
1890
1891 file = fopen(fname, "w");
1892 if (!file) {
1893 perror(fname);
1894 exit(1);
1895 }
1896 if (fwrite(b->p, 1, b->pos, file) != b->pos) {
1897 perror(fname);
1898 exit(1);
1899 }
1900 if (fclose(file) != 0) {
1901 perror(fname);
1902 exit(1);
1903 }
1904}
1905
1906static void write_if_changed(struct buffer *b, const char *fname)
1907{
1908 char *tmp;
1909 FILE *file;
1910 struct stat st;
1911
1912 file = fopen(fname, "r");
1913 if (!file)
1914 goto write;
1915
1916 if (fstat(fileno(file), &st) < 0)
1917 goto close_write;
1918
1919 if (st.st_size != b->pos)
1920 goto close_write;
1921
1922 tmp = xmalloc(b->pos);
1923 if (fread(tmp, 1, b->pos, file) != b->pos)
1924 goto free_write;
1925
1926 if (memcmp(tmp, b->p, b->pos) != 0)
1927 goto free_write;
1928
1929 free(tmp);
1930 fclose(file);
1931 return;
1932
1933 free_write:
1934 free(tmp);
1935 close_write:
1936 fclose(file);
1937 write:
1938 write_buf(b, fname);
1939}
1940
1941static void write_vmlinux_export_c_file(struct module *mod)
1942{
1943 struct buffer buf = { };
1944
1945 buf_printf(&buf,
1946 "#include <linux/export-internal.h>\n");
1947
1948 add_exported_symbols(&buf, mod);
1949 write_if_changed(&buf, ".vmlinux.export.c");
1950 free(buf.p);
1951}
1952
1953/* do sanity checks, and generate *.mod.c file */
1954static void write_mod_c_file(struct module *mod)
1955{
1956 struct buffer buf = { };
1957 struct module_alias *alias, *next;
1958 char fname[PATH_MAX];
1959 int ret;
1960
1961 add_header(&buf, mod);
1962 add_exported_symbols(&buf, mod);
1963 add_versions(&buf, mod);
1964 add_depends(&buf, mod);
1965
1966 buf_printf(&buf, "\n");
1967 list_for_each_entry_safe(alias, next, &mod->aliases, node) {
1968 buf_printf(&buf, "MODULE_ALIAS(\"%s\");\n", alias->str);
1969 list_del(&alias->node);
1970 free(alias);
1971 }
1972
1973 add_srcversion(&buf, mod);
1974
1975 ret = snprintf(fname, sizeof(fname), "%s.mod.c", mod->name);
1976 if (ret >= sizeof(fname)) {
1977 error("%s: too long path was truncated\n", fname);
1978 goto free;
1979 }
1980
1981 write_if_changed(&buf, fname);
1982
1983free:
1984 free(buf.p);
1985}
1986
1987/* parse Module.symvers file. line format:
1988 * 0x12345678<tab>symbol<tab>module<tab>export<tab>namespace
1989 **/
1990static void read_dump(const char *fname)
1991{
1992 char *buf, *pos, *line;
1993
1994 buf = read_text_file(fname);
1995 if (!buf)
1996 /* No symbol versions, silently ignore */
1997 return;
1998
1999 pos = buf;
2000
2001 while ((line = get_line(&pos))) {
2002 char *symname, *namespace, *modname, *d, *export;
2003 unsigned int crc;
2004 struct module *mod;
2005 struct symbol *s;
2006 bool gpl_only;
2007
2008 if (!(symname = strchr(line, '\t')))
2009 goto fail;
2010 *symname++ = '\0';
2011 if (!(modname = strchr(symname, '\t')))
2012 goto fail;
2013 *modname++ = '\0';
2014 if (!(export = strchr(modname, '\t')))
2015 goto fail;
2016 *export++ = '\0';
2017 if (!(namespace = strchr(export, '\t')))
2018 goto fail;
2019 *namespace++ = '\0';
2020
2021 crc = strtoul(line, &d, 16);
2022 if (*symname == '\0' || *modname == '\0' || *d != '\0')
2023 goto fail;
2024
2025 if (!strcmp(export, "EXPORT_SYMBOL_GPL")) {
2026 gpl_only = true;
2027 } else if (!strcmp(export, "EXPORT_SYMBOL")) {
2028 gpl_only = false;
2029 } else {
2030 error("%s: unknown license %s. skip", symname, export);
2031 continue;
2032 }
2033
2034 mod = find_module(fname, modname);
2035 if (!mod) {
2036 mod = new_module(modname, strlen(modname));
2037 mod->dump_file = fname;
2038 }
2039 s = sym_add_exported(symname, mod, gpl_only, namespace);
2040 sym_set_crc(s, crc);
2041 }
2042 free(buf);
2043 return;
2044fail:
2045 free(buf);
2046 fatal("parse error in symbol dump file\n");
2047}
2048
2049static void write_dump(const char *fname)
2050{
2051 struct buffer buf = { };
2052 struct module *mod;
2053 struct symbol *sym;
2054
2055 list_for_each_entry(mod, &modules, list) {
2056 if (mod->dump_file)
2057 continue;
2058 list_for_each_entry(sym, &mod->exported_symbols, list) {
2059 if (trim_unused_exports && !sym->used)
2060 continue;
2061
2062 buf_printf(&buf, "0x%08x\t%s\t%s\tEXPORT_SYMBOL%s\t%s\n",
2063 sym->crc, sym->name, mod->name,
2064 sym->is_gpl_only ? "_GPL" : "",
2065 sym->namespace);
2066 }
2067 }
2068 write_buf(&buf, fname);
2069 free(buf.p);
2070}
2071
2072static void write_namespace_deps_files(const char *fname)
2073{
2074 struct module *mod;
2075 struct namespace_list *ns;
2076 struct buffer ns_deps_buf = {};
2077
2078 list_for_each_entry(mod, &modules, list) {
2079
2080 if (mod->dump_file || list_empty(&mod->missing_namespaces))
2081 continue;
2082
2083 buf_printf(&ns_deps_buf, "%s.ko:", mod->name);
2084
2085 list_for_each_entry(ns, &mod->missing_namespaces, list)
2086 buf_printf(&ns_deps_buf, " %s", ns->namespace);
2087
2088 buf_printf(&ns_deps_buf, "\n");
2089 }
2090
2091 write_if_changed(&ns_deps_buf, fname);
2092 free(ns_deps_buf.p);
2093}
2094
2095struct dump_list {
2096 struct list_head list;
2097 const char *file;
2098};
2099
2100static void check_host_endian(void)
2101{
2102 static const union {
2103 short s;
2104 char c[2];
2105 } endian_test = { .c = {0x01, 0x02} };
2106
2107 switch (endian_test.s) {
2108 case 0x0102:
2109 host_is_big_endian = true;
2110 break;
2111 case 0x0201:
2112 host_is_big_endian = false;
2113 break;
2114 default:
2115 fatal("Unknown host endian\n");
2116 }
2117}
2118
2119int main(int argc, char **argv)
2120{
2121 struct module *mod;
2122 char *missing_namespace_deps = NULL;
2123 char *unused_exports_white_list = NULL;
2124 char *dump_write = NULL, *files_source = NULL;
2125 int opt;
2126 LIST_HEAD(dump_lists);
2127 struct dump_list *dl, *dl2;
2128
2129 while ((opt = getopt(argc, argv, "ei:MmnT:to:au:WwENd:")) != -1) {
2130 switch (opt) {
2131 case 'e':
2132 external_module = true;
2133 break;
2134 case 'i':
2135 dl = xmalloc(sizeof(*dl));
2136 dl->file = optarg;
2137 list_add_tail(&dl->list, &dump_lists);
2138 break;
2139 case 'M':
2140 module_enabled = true;
2141 break;
2142 case 'm':
2143 modversions = true;
2144 break;
2145 case 'n':
2146 ignore_missing_files = true;
2147 break;
2148 case 'o':
2149 dump_write = optarg;
2150 break;
2151 case 'a':
2152 all_versions = true;
2153 break;
2154 case 'T':
2155 files_source = optarg;
2156 break;
2157 case 't':
2158 trim_unused_exports = true;
2159 break;
2160 case 'u':
2161 unused_exports_white_list = optarg;
2162 break;
2163 case 'W':
2164 extra_warn = true;
2165 break;
2166 case 'w':
2167 warn_unresolved = true;
2168 break;
2169 case 'E':
2170 sec_mismatch_warn_only = false;
2171 break;
2172 case 'N':
2173 allow_missing_ns_imports = true;
2174 break;
2175 case 'd':
2176 missing_namespace_deps = optarg;
2177 break;
2178 default:
2179 exit(1);
2180 }
2181 }
2182
2183 check_host_endian();
2184
2185 list_for_each_entry_safe(dl, dl2, &dump_lists, list) {
2186 read_dump(dl->file);
2187 list_del(&dl->list);
2188 free(dl);
2189 }
2190
2191 while (optind < argc)
2192 read_symbols(argv[optind++]);
2193
2194 if (files_source)
2195 read_symbols_from_files(files_source);
2196
2197 list_for_each_entry(mod, &modules, list) {
2198 if (mod->dump_file || mod->is_vmlinux)
2199 continue;
2200
2201 check_modname_len(mod);
2202 check_exports(mod);
2203 }
2204
2205 if (unused_exports_white_list)
2206 handle_white_list_exports(unused_exports_white_list);
2207
2208 list_for_each_entry(mod, &modules, list) {
2209 if (mod->dump_file)
2210 continue;
2211
2212 if (mod->is_vmlinux)
2213 write_vmlinux_export_c_file(mod);
2214 else
2215 write_mod_c_file(mod);
2216 }
2217
2218 if (missing_namespace_deps)
2219 write_namespace_deps_files(missing_namespace_deps);
2220
2221 if (dump_write)
2222 write_dump(dump_write);
2223 if (sec_mismatch_count && !sec_mismatch_warn_only)
2224 error("Section mismatches detected.\n"
2225 "Set CONFIG_SECTION_MISMATCH_WARN_ONLY=y to allow them.\n");
2226
2227 if (nr_unresolved > MAX_UNRESOLVED_REPORTS)
2228 warn("suppressed %u unresolved symbol warnings because there were too many)\n",
2229 nr_unresolved - MAX_UNRESOLVED_REPORTS);
2230
2231 return error_occurred ? 1 : 0;
2232}