1 /* Postprocess module symbol versions
2 *
3 * Copyright 2003 Kai Germaschewski
4 * Copyright 2002-2004 Rusty Russell, IBM Corporation
5 * Copyright 2006-2008 Sam Ravnborg
6 * Based in part on module-init-tools/depmod.c,file2alias
7 *
8 * This software may be used and distributed according to the terms
9 * of the GNU General Public License, incorporated herein by reference.
10 *
11 * Usage: modpost vmlinux module1.o module2.o ...
12 */
13
14 #define _GNU_SOURCE
15 #include <elf.h>
16 #include <fnmatch.h>
17 #include <stdio.h>
18 #include <ctype.h>
19 #include <string.h>
20 #include <limits.h>
21 #include <stdbool.h>
22 #include <errno.h>
23
24 #include <hashtable.h>
25 #include <list.h>
26 #include <xalloc.h>
27 #include "modpost.h"
28 #include "../../include/linux/license.h"
29
30 static bool module_enabled;
31 /* Are we using CONFIG_MODVERSIONS? */
32 static bool modversions;
33 /* Is CONFIG_MODULE_SRCVERSION_ALL set? */
34 static bool all_versions;
35 /* If we are modposting external module set to 1 */
36 static bool external_module;
37 /* Only warn about unresolved symbols */
38 static bool warn_unresolved;
39
40 static int sec_mismatch_count;
41 static bool sec_mismatch_warn_only = true;
42 /* Trim EXPORT_SYMBOLs that are unused by in-tree modules */
43 static bool trim_unused_exports;
44
45 /* ignore missing files */
46 static bool ignore_missing_files;
47 /* If set to 1, only warn (instead of error) about missing ns imports */
48 static bool allow_missing_ns_imports;
49
50 static bool error_occurred;
51
52 static bool extra_warn;
53
54 bool target_is_big_endian;
55 bool host_is_big_endian;
56
57 /*
58 * Cut off the warnings when there are too many. This typically occurs when
59 * vmlinux is missing. ('make modules' without building vmlinux.)
60 */
61 #define MAX_UNRESOLVED_REPORTS 10
62 static unsigned int nr_unresolved;
63
64 /* In kernel, this size is defined in linux/module.h;
65 * here we use Elf_Addr instead of long for covering cross-compile
66 */
67
68 #define MODULE_NAME_LEN (64 - sizeof(Elf_Addr))
69
modpost_log(bool is_error,const char * fmt,...)70 void modpost_log(bool is_error, const char *fmt, ...)
71 {
72 va_list arglist;
73
74 if (is_error) {
75 fprintf(stderr, "ERROR: ");
76 error_occurred = true;
77 } else {
78 fprintf(stderr, "WARNING: ");
79 }
80
81 fprintf(stderr, "modpost: ");
82
83 va_start(arglist, fmt);
84 vfprintf(stderr, fmt, arglist);
85 va_end(arglist);
86 }
87
strends(const char * str,const char * postfix)88 static inline bool strends(const char *str, const char *postfix)
89 {
90 if (strlen(str) < strlen(postfix))
91 return false;
92
93 return strcmp(str + strlen(str) - strlen(postfix), postfix) == 0;
94 }
95
read_text_file(const char * filename)96 char *read_text_file(const char *filename)
97 {
98 struct stat st;
99 size_t nbytes;
100 int fd;
101 char *buf;
102
103 fd = open(filename, O_RDONLY);
104 if (fd < 0) {
105 perror(filename);
106 exit(1);
107 }
108
109 if (fstat(fd, &st) < 0) {
110 perror(filename);
111 exit(1);
112 }
113
114 buf = xmalloc(st.st_size + 1);
115
116 nbytes = st.st_size;
117
118 while (nbytes) {
119 ssize_t bytes_read;
120
121 bytes_read = read(fd, buf, nbytes);
122 if (bytes_read < 0) {
123 perror(filename);
124 exit(1);
125 }
126
127 nbytes -= bytes_read;
128 }
129 buf[st.st_size] = '\0';
130
131 close(fd);
132
133 return buf;
134 }
135
get_line(char ** stringp)136 char *get_line(char **stringp)
137 {
138 char *orig = *stringp, *next;
139
140 /* do not return the unwanted extra line at EOF */
141 if (!orig || *orig == '\0')
142 return NULL;
143
144 /* don't use strsep here, it is not available everywhere */
145 next = strchr(orig, '\n');
146 if (next)
147 *next++ = '\0';
148
149 *stringp = next;
150
151 return orig;
152 }
153
154 /* A list of all modules we processed */
155 LIST_HEAD(modules);
156
find_module(const char * modname)157 static struct module *find_module(const char *modname)
158 {
159 struct module *mod;
160
161 list_for_each_entry(mod, &modules, list) {
162 if (strcmp(mod->name, modname) == 0)
163 return mod;
164 }
165 return NULL;
166 }
167
new_module(const char * name,size_t namelen)168 static struct module *new_module(const char *name, size_t namelen)
169 {
170 struct module *mod;
171
172 mod = xmalloc(sizeof(*mod) + namelen + 1);
173 memset(mod, 0, sizeof(*mod));
174
175 INIT_LIST_HEAD(&mod->exported_symbols);
176 INIT_LIST_HEAD(&mod->unresolved_symbols);
177 INIT_LIST_HEAD(&mod->missing_namespaces);
178 INIT_LIST_HEAD(&mod->imported_namespaces);
179
180 memcpy(mod->name, name, namelen);
181 mod->name[namelen] = '\0';
182 mod->is_vmlinux = (strcmp(mod->name, "vmlinux") == 0);
183
184 /*
185 * Set mod->is_gpl_compatible to true by default. If MODULE_LICENSE()
186 * is missing, do not check the use for EXPORT_SYMBOL_GPL() becasue
187 * modpost will exit wiht error anyway.
188 */
189 mod->is_gpl_compatible = true;
190
191 list_add_tail(&mod->list, &modules);
192
193 return mod;
194 }
195
196 struct symbol {
197 struct hlist_node hnode;/* link to hash table */
198 struct list_head list; /* link to module::exported_symbols or module::unresolved_symbols */
199 struct module *module;
200 char *namespace;
201 unsigned int crc;
202 bool crc_valid;
203 bool weak;
204 bool is_func;
205 bool is_gpl_only; /* exported by EXPORT_SYMBOL_GPL */
206 bool used; /* there exists a user of this symbol */
207 char name[];
208 };
209
210 static HASHTABLE_DEFINE(symbol_hashtable, 1U << 10);
211
212 /* This is based on the hash algorithm from gdbm, via tdb */
tdb_hash(const char * name)213 static inline unsigned int tdb_hash(const char *name)
214 {
215 unsigned value; /* Used to compute the hash value. */
216 unsigned i; /* Used to cycle through random values. */
217
218 /* Set the initial value from the key size. */
219 for (value = 0x238F13AF * strlen(name), i = 0; name[i]; i++)
220 value = (value + (((unsigned char *)name)[i] << (i*5 % 24)));
221
222 return (1103515243 * value + 12345);
223 }
224
225 /**
226 * Allocate a new symbols for use in the hash of exported symbols or
227 * the list of unresolved symbols per module
228 **/
alloc_symbol(const char * name)229 static struct symbol *alloc_symbol(const char *name)
230 {
231 struct symbol *s = xmalloc(sizeof(*s) + strlen(name) + 1);
232
233 memset(s, 0, sizeof(*s));
234 strcpy(s->name, name);
235
236 return s;
237 }
238
239 /* For the hash of exported symbols */
hash_add_symbol(struct symbol * sym)240 static void hash_add_symbol(struct symbol *sym)
241 {
242 hash_add(symbol_hashtable, &sym->hnode, tdb_hash(sym->name));
243 }
244
sym_add_unresolved(const char * name,struct module * mod,bool weak)245 static void sym_add_unresolved(const char *name, struct module *mod, bool weak)
246 {
247 struct symbol *sym;
248
249 sym = alloc_symbol(name);
250 sym->weak = weak;
251
252 list_add_tail(&sym->list, &mod->unresolved_symbols);
253 }
254
sym_find_with_module(const char * name,struct module * mod)255 static struct symbol *sym_find_with_module(const char *name, struct module *mod)
256 {
257 struct symbol *s;
258
259 /* For our purposes, .foo matches foo. PPC64 needs this. */
260 if (name[0] == '.')
261 name++;
262
263 hash_for_each_possible(symbol_hashtable, s, hnode, tdb_hash(name)) {
264 if (strcmp(s->name, name) == 0 && (!mod || s->module == mod))
265 return s;
266 }
267 return NULL;
268 }
269
find_symbol(const char * name)270 static struct symbol *find_symbol(const char *name)
271 {
272 return sym_find_with_module(name, NULL);
273 }
274
275 struct namespace_list {
276 struct list_head list;
277 char namespace[];
278 };
279
contains_namespace(struct list_head * head,const char * namespace)280 static bool contains_namespace(struct list_head *head, const char *namespace)
281 {
282 struct namespace_list *list;
283
284 /*
285 * The default namespace is null string "", which is always implicitly
286 * contained.
287 */
288 if (!namespace[0])
289 return true;
290
291 list_for_each_entry(list, head, list) {
292 if (!strcmp(list->namespace, namespace))
293 return true;
294 }
295
296 return false;
297 }
298
add_namespace(struct list_head * head,const char * namespace)299 static void add_namespace(struct list_head *head, const char *namespace)
300 {
301 struct namespace_list *ns_entry;
302
303 if (!contains_namespace(head, namespace)) {
304 ns_entry = xmalloc(sizeof(*ns_entry) + strlen(namespace) + 1);
305 strcpy(ns_entry->namespace, namespace);
306 list_add_tail(&ns_entry->list, head);
307 }
308 }
309
sym_get_data_by_offset(const struct elf_info * info,unsigned int secindex,unsigned long offset)310 static void *sym_get_data_by_offset(const struct elf_info *info,
311 unsigned int secindex, unsigned long offset)
312 {
313 Elf_Shdr *sechdr = &info->sechdrs[secindex];
314
315 return (void *)info->hdr + sechdr->sh_offset + offset;
316 }
317
sym_get_data(const struct elf_info * info,const Elf_Sym * sym)318 void *sym_get_data(const struct elf_info *info, const Elf_Sym *sym)
319 {
320 return sym_get_data_by_offset(info, get_secindex(info, sym),
321 sym->st_value);
322 }
323
sech_name(const struct elf_info * info,Elf_Shdr * sechdr)324 static const char *sech_name(const struct elf_info *info, Elf_Shdr *sechdr)
325 {
326 return sym_get_data_by_offset(info, info->secindex_strings,
327 sechdr->sh_name);
328 }
329
sec_name(const struct elf_info * info,unsigned int secindex)330 static const char *sec_name(const struct elf_info *info, unsigned int secindex)
331 {
332 /*
333 * If sym->st_shndx is a special section index, there is no
334 * corresponding section header.
335 * Return "" if the index is out of range of info->sechdrs[] array.
336 */
337 if (secindex >= info->num_sections)
338 return "";
339
340 return sech_name(info, &info->sechdrs[secindex]);
341 }
342
343 #define strstarts(str, prefix) (strncmp(str, prefix, strlen(prefix)) == 0)
344
sym_add_exported(const char * name,struct module * mod,bool gpl_only,const char * namespace)345 static struct symbol *sym_add_exported(const char *name, struct module *mod,
346 bool gpl_only, const char *namespace)
347 {
348 struct symbol *s = find_symbol(name);
349
350 if (s && (!external_module || s->module->is_vmlinux || s->module == mod)) {
351 error("%s: '%s' exported twice. Previous export was in %s%s\n",
352 mod->name, name, s->module->name,
353 s->module->is_vmlinux ? "" : ".ko");
354 }
355
356 s = alloc_symbol(name);
357 s->module = mod;
358 s->is_gpl_only = gpl_only;
359 s->namespace = xstrdup(namespace);
360 list_add_tail(&s->list, &mod->exported_symbols);
361 hash_add_symbol(s);
362
363 return s;
364 }
365
sym_set_crc(struct symbol * sym,unsigned int crc)366 static void sym_set_crc(struct symbol *sym, unsigned int crc)
367 {
368 sym->crc = crc;
369 sym->crc_valid = true;
370 }
371
grab_file(const char * filename,size_t * size)372 static void *grab_file(const char *filename, size_t *size)
373 {
374 struct stat st;
375 void *map = MAP_FAILED;
376 int fd;
377
378 fd = open(filename, O_RDONLY);
379 if (fd < 0)
380 return NULL;
381 if (fstat(fd, &st))
382 goto failed;
383
384 *size = st.st_size;
385 map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
386
387 failed:
388 close(fd);
389 if (map == MAP_FAILED)
390 return NULL;
391 return map;
392 }
393
release_file(void * file,size_t size)394 static void release_file(void *file, size_t size)
395 {
396 munmap(file, size);
397 }
398
parse_elf(struct elf_info * info,const char * filename)399 static int parse_elf(struct elf_info *info, const char *filename)
400 {
401 unsigned int i;
402 Elf_Ehdr *hdr;
403 Elf_Shdr *sechdrs;
404 Elf_Sym *sym;
405 const char *secstrings;
406 unsigned int symtab_idx = ~0U, symtab_shndx_idx = ~0U;
407
408 hdr = grab_file(filename, &info->size);
409 if (!hdr) {
410 if (ignore_missing_files) {
411 fprintf(stderr, "%s: %s (ignored)\n", filename,
412 strerror(errno));
413 return 0;
414 }
415 perror(filename);
416 exit(1);
417 }
418 info->hdr = hdr;
419 if (info->size < sizeof(*hdr)) {
420 /* file too small, assume this is an empty .o file */
421 return 0;
422 }
423 /* Is this a valid ELF file? */
424 if ((hdr->e_ident[EI_MAG0] != ELFMAG0) ||
425 (hdr->e_ident[EI_MAG1] != ELFMAG1) ||
426 (hdr->e_ident[EI_MAG2] != ELFMAG2) ||
427 (hdr->e_ident[EI_MAG3] != ELFMAG3)) {
428 /* Not an ELF file - silently ignore it */
429 return 0;
430 }
431
432 switch (hdr->e_ident[EI_DATA]) {
433 case ELFDATA2LSB:
434 target_is_big_endian = false;
435 break;
436 case ELFDATA2MSB:
437 target_is_big_endian = true;
438 break;
439 default:
440 fatal("target endian is unknown\n");
441 }
442
443 /* Fix endianness in ELF header */
444 hdr->e_type = TO_NATIVE(hdr->e_type);
445 hdr->e_machine = TO_NATIVE(hdr->e_machine);
446 hdr->e_version = TO_NATIVE(hdr->e_version);
447 hdr->e_entry = TO_NATIVE(hdr->e_entry);
448 hdr->e_phoff = TO_NATIVE(hdr->e_phoff);
449 hdr->e_shoff = TO_NATIVE(hdr->e_shoff);
450 hdr->e_flags = TO_NATIVE(hdr->e_flags);
451 hdr->e_ehsize = TO_NATIVE(hdr->e_ehsize);
452 hdr->e_phentsize = TO_NATIVE(hdr->e_phentsize);
453 hdr->e_phnum = TO_NATIVE(hdr->e_phnum);
454 hdr->e_shentsize = TO_NATIVE(hdr->e_shentsize);
455 hdr->e_shnum = TO_NATIVE(hdr->e_shnum);
456 hdr->e_shstrndx = TO_NATIVE(hdr->e_shstrndx);
457 sechdrs = (void *)hdr + hdr->e_shoff;
458 info->sechdrs = sechdrs;
459
460 /* modpost only works for relocatable objects */
461 if (hdr->e_type != ET_REL)
462 fatal("%s: not relocatable object.", filename);
463
464 /* Check if file offset is correct */
465 if (hdr->e_shoff > info->size)
466 fatal("section header offset=%lu in file '%s' is bigger than filesize=%zu\n",
467 (unsigned long)hdr->e_shoff, filename, info->size);
468
469 if (hdr->e_shnum == SHN_UNDEF) {
470 /*
471 * There are more than 64k sections,
472 * read count from .sh_size.
473 */
474 info->num_sections = TO_NATIVE(sechdrs[0].sh_size);
475 }
476 else {
477 info->num_sections = hdr->e_shnum;
478 }
479 if (hdr->e_shstrndx == SHN_XINDEX) {
480 info->secindex_strings = TO_NATIVE(sechdrs[0].sh_link);
481 }
482 else {
483 info->secindex_strings = hdr->e_shstrndx;
484 }
485
486 /* Fix endianness in section headers */
487 for (i = 0; i < info->num_sections; i++) {
488 sechdrs[i].sh_name = TO_NATIVE(sechdrs[i].sh_name);
489 sechdrs[i].sh_type = TO_NATIVE(sechdrs[i].sh_type);
490 sechdrs[i].sh_flags = TO_NATIVE(sechdrs[i].sh_flags);
491 sechdrs[i].sh_addr = TO_NATIVE(sechdrs[i].sh_addr);
492 sechdrs[i].sh_offset = TO_NATIVE(sechdrs[i].sh_offset);
493 sechdrs[i].sh_size = TO_NATIVE(sechdrs[i].sh_size);
494 sechdrs[i].sh_link = TO_NATIVE(sechdrs[i].sh_link);
495 sechdrs[i].sh_info = TO_NATIVE(sechdrs[i].sh_info);
496 sechdrs[i].sh_addralign = TO_NATIVE(sechdrs[i].sh_addralign);
497 sechdrs[i].sh_entsize = TO_NATIVE(sechdrs[i].sh_entsize);
498 }
499 /* Find symbol table. */
500 secstrings = (void *)hdr + sechdrs[info->secindex_strings].sh_offset;
501 for (i = 1; i < info->num_sections; i++) {
502 const char *secname;
503 int nobits = sechdrs[i].sh_type == SHT_NOBITS;
504
505 if (!nobits && sechdrs[i].sh_offset > info->size)
506 fatal("%s is truncated. sechdrs[i].sh_offset=%lu > sizeof(*hrd)=%zu\n",
507 filename, (unsigned long)sechdrs[i].sh_offset,
508 sizeof(*hdr));
509
510 secname = secstrings + sechdrs[i].sh_name;
511 if (strcmp(secname, ".modinfo") == 0) {
512 if (nobits)
513 fatal("%s has NOBITS .modinfo\n", filename);
514 info->modinfo = (void *)hdr + sechdrs[i].sh_offset;
515 info->modinfo_len = sechdrs[i].sh_size;
516 } else if (!strcmp(secname, ".export_symbol")) {
517 info->export_symbol_secndx = i;
518 }
519
520 if (sechdrs[i].sh_type == SHT_SYMTAB) {
521 unsigned int sh_link_idx;
522 symtab_idx = i;
523 info->symtab_start = (void *)hdr +
524 sechdrs[i].sh_offset;
525 info->symtab_stop = (void *)hdr +
526 sechdrs[i].sh_offset + sechdrs[i].sh_size;
527 sh_link_idx = sechdrs[i].sh_link;
528 info->strtab = (void *)hdr +
529 sechdrs[sh_link_idx].sh_offset;
530 }
531
532 /* 32bit section no. table? ("more than 64k sections") */
533 if (sechdrs[i].sh_type == SHT_SYMTAB_SHNDX) {
534 symtab_shndx_idx = i;
535 info->symtab_shndx_start = (void *)hdr +
536 sechdrs[i].sh_offset;
537 info->symtab_shndx_stop = (void *)hdr +
538 sechdrs[i].sh_offset + sechdrs[i].sh_size;
539 }
540 }
541 if (!info->symtab_start)
542 fatal("%s has no symtab?\n", filename);
543
544 /* Fix endianness in symbols */
545 for (sym = info->symtab_start; sym < info->symtab_stop; sym++) {
546 sym->st_shndx = TO_NATIVE(sym->st_shndx);
547 sym->st_name = TO_NATIVE(sym->st_name);
548 sym->st_value = TO_NATIVE(sym->st_value);
549 sym->st_size = TO_NATIVE(sym->st_size);
550 }
551
552 if (symtab_shndx_idx != ~0U) {
553 Elf32_Word *p;
554 if (symtab_idx != sechdrs[symtab_shndx_idx].sh_link)
555 fatal("%s: SYMTAB_SHNDX has bad sh_link: %u!=%u\n",
556 filename, sechdrs[symtab_shndx_idx].sh_link,
557 symtab_idx);
558 /* Fix endianness */
559 for (p = info->symtab_shndx_start; p < info->symtab_shndx_stop;
560 p++)
561 *p = TO_NATIVE(*p);
562 }
563
564 symsearch_init(info);
565
566 return 1;
567 }
568
parse_elf_finish(struct elf_info * info)569 static void parse_elf_finish(struct elf_info *info)
570 {
571 symsearch_finish(info);
572 release_file(info->hdr, info->size);
573 }
574
ignore_undef_symbol(struct elf_info * info,const char * symname)575 static int ignore_undef_symbol(struct elf_info *info, const char *symname)
576 {
577 /* ignore __this_module, it will be resolved shortly */
578 if (strcmp(symname, "__this_module") == 0)
579 return 1;
580 /* ignore global offset table */
581 if (strcmp(symname, "_GLOBAL_OFFSET_TABLE_") == 0)
582 return 1;
583 if (info->hdr->e_machine == EM_PPC)
584 /* Special register function linked on all modules during final link of .ko */
585 if (strstarts(symname, "_restgpr_") ||
586 strstarts(symname, "_savegpr_") ||
587 strstarts(symname, "_rest32gpr_") ||
588 strstarts(symname, "_save32gpr_") ||
589 strstarts(symname, "_restvr_") ||
590 strstarts(symname, "_savevr_"))
591 return 1;
592 if (info->hdr->e_machine == EM_PPC64)
593 /* Special register function linked on all modules during final link of .ko */
594 if (strstarts(symname, "_restgpr0_") ||
595 strstarts(symname, "_savegpr0_") ||
596 strstarts(symname, "_restvr_") ||
597 strstarts(symname, "_savevr_") ||
598 strcmp(symname, ".TOC.") == 0)
599 return 1;
600 /* Do not ignore this symbol */
601 return 0;
602 }
603
handle_symbol(struct module * mod,struct elf_info * info,const Elf_Sym * sym,const char * symname)604 static void handle_symbol(struct module *mod, struct elf_info *info,
605 const Elf_Sym *sym, const char *symname)
606 {
607 switch (sym->st_shndx) {
608 case SHN_COMMON:
609 if (strstarts(symname, "__gnu_lto_")) {
610 /* Should warn here, but modpost runs before the linker */
611 } else
612 warn("\"%s\" [%s] is COMMON symbol\n", symname, mod->name);
613 break;
614 case SHN_UNDEF:
615 /* undefined symbol */
616 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
617 ELF_ST_BIND(sym->st_info) != STB_WEAK)
618 break;
619 if (ignore_undef_symbol(info, symname))
620 break;
621 if (info->hdr->e_machine == EM_SPARC ||
622 info->hdr->e_machine == EM_SPARCV9) {
623 /* Ignore register directives. */
624 if (ELF_ST_TYPE(sym->st_info) == STT_SPARC_REGISTER)
625 break;
626 if (symname[0] == '.') {
627 char *munged = xstrdup(symname);
628 munged[0] = '_';
629 munged[1] = toupper(munged[1]);
630 symname = munged;
631 }
632 }
633
634 sym_add_unresolved(symname, mod,
635 ELF_ST_BIND(sym->st_info) == STB_WEAK);
636 break;
637 default:
638 if (strcmp(symname, "init_module") == 0)
639 mod->has_init = true;
640 if (strcmp(symname, "cleanup_module") == 0)
641 mod->has_cleanup = true;
642 break;
643 }
644 }
645
646 /**
647 * Parse tag=value strings from .modinfo section
648 **/
next_string(char * string,unsigned long * secsize)649 static char *next_string(char *string, unsigned long *secsize)
650 {
651 /* Skip non-zero chars */
652 while (string[0]) {
653 string++;
654 if ((*secsize)-- <= 1)
655 return NULL;
656 }
657
658 /* Skip any zero padding. */
659 while (!string[0]) {
660 string++;
661 if ((*secsize)-- <= 1)
662 return NULL;
663 }
664 return string;
665 }
666
get_next_modinfo(struct elf_info * info,const char * tag,char * prev)667 static char *get_next_modinfo(struct elf_info *info, const char *tag,
668 char *prev)
669 {
670 char *p;
671 unsigned int taglen = strlen(tag);
672 char *modinfo = info->modinfo;
673 unsigned long size = info->modinfo_len;
674
675 if (prev) {
676 size -= prev - modinfo;
677 modinfo = next_string(prev, &size);
678 }
679
680 for (p = modinfo; p; p = next_string(p, &size)) {
681 if (strncmp(p, tag, taglen) == 0 && p[taglen] == '=')
682 return p + taglen + 1;
683 }
684 return NULL;
685 }
686
get_modinfo(struct elf_info * info,const char * tag)687 static char *get_modinfo(struct elf_info *info, const char *tag)
688
689 {
690 return get_next_modinfo(info, tag, NULL);
691 }
692
sym_name(struct elf_info * elf,Elf_Sym * sym)693 static const char *sym_name(struct elf_info *elf, Elf_Sym *sym)
694 {
695 return sym ? elf->strtab + sym->st_name : "";
696 }
697
698 /*
699 * Check whether the 'string' argument matches one of the 'patterns',
700 * an array of shell wildcard patterns (glob).
701 *
702 * Return true is there is a match.
703 */
match(const char * string,const char * const patterns[])704 static bool match(const char *string, const char *const patterns[])
705 {
706 const char *pattern;
707
708 while ((pattern = *patterns++)) {
709 if (!fnmatch(pattern, string, 0))
710 return true;
711 }
712
713 return false;
714 }
715
716 /* useful to pass patterns to match() directly */
717 #define PATTERNS(...) \
718 ({ \
719 static const char *const patterns[] = {__VA_ARGS__, NULL}; \
720 patterns; \
721 })
722
723 /* sections that we do not want to do full section mismatch check on */
724 static const char *const section_white_list[] =
725 {
726 ".comment*",
727 ".debug*",
728 ".zdebug*", /* Compressed debug sections. */
729 ".GCC.command.line", /* record-gcc-switches */
730 ".mdebug*", /* alpha, score, mips etc. */
731 ".pdr", /* alpha, score, mips etc. */
732 ".stab*",
733 ".note*",
734 ".got*",
735 ".toc*",
736 ".xt.prop", /* xtensa */
737 ".xt.lit", /* xtensa */
738 ".arcextmap*", /* arc */
739 ".gnu.linkonce.arcext*", /* arc : modules */
740 ".cmem*", /* EZchip */
741 ".fmt_slot*", /* EZchip */
742 ".gnu.lto*",
743 ".discard.*",
744 ".llvm.call-graph-profile", /* call graph */
745 NULL
746 };
747
748 /*
749 * This is used to find sections missing the SHF_ALLOC flag.
750 * The cause of this is often a section specified in assembler
751 * without "ax" / "aw".
752 */
check_section(const char * modname,struct elf_info * elf,Elf_Shdr * sechdr)753 static void check_section(const char *modname, struct elf_info *elf,
754 Elf_Shdr *sechdr)
755 {
756 const char *sec = sech_name(elf, sechdr);
757
758 if (sechdr->sh_type == SHT_PROGBITS &&
759 !(sechdr->sh_flags & SHF_ALLOC) &&
760 !match(sec, section_white_list)) {
761 warn("%s (%s): unexpected non-allocatable section.\n"
762 "Did you forget to use \"ax\"/\"aw\" in a .S file?\n"
763 "Note that for example <linux/init.h> contains\n"
764 "section definitions for use in .S files.\n\n",
765 modname, sec);
766 }
767 }
768
769
770
771 #define ALL_INIT_DATA_SECTIONS \
772 ".init.setup", ".init.rodata", ".init.data"
773
774 #define ALL_PCI_INIT_SECTIONS \
775 ".pci_fixup_early", ".pci_fixup_header", ".pci_fixup_final", \
776 ".pci_fixup_enable", ".pci_fixup_resume", \
777 ".pci_fixup_resume_early", ".pci_fixup_suspend"
778
779 #define ALL_INIT_SECTIONS ".init.*"
780 #define ALL_EXIT_SECTIONS ".exit.*"
781
782 #define DATA_SECTIONS ".data", ".data.rel"
783 #define TEXT_SECTIONS ".text", ".text.*", ".sched.text", \
784 ".kprobes.text", ".cpuidle.text", ".noinstr.text", \
785 ".ltext", ".ltext.*"
786 #define OTHER_TEXT_SECTIONS ".ref.text", ".head.text", ".spinlock.text", \
787 ".fixup", ".entry.text", ".exception.text", \
788 ".coldtext", ".softirqentry.text"
789
790 #define ALL_TEXT_SECTIONS ".init.text", ".exit.text", \
791 TEXT_SECTIONS, OTHER_TEXT_SECTIONS
792
793 enum mismatch {
794 TEXTDATA_TO_ANY_INIT_EXIT,
795 XXXINIT_TO_SOME_INIT,
796 ANY_INIT_TO_ANY_EXIT,
797 ANY_EXIT_TO_ANY_INIT,
798 EXTABLE_TO_NON_TEXT,
799 };
800
801 /**
802 * Describe how to match sections on different criteria:
803 *
804 * @fromsec: Array of sections to be matched.
805 *
806 * @bad_tosec: Relocations applied to a section in @fromsec to a section in
807 * this array is forbidden (black-list). Can be empty.
808 *
809 * @good_tosec: Relocations applied to a section in @fromsec must be
810 * targeting sections in this array (white-list). Can be empty.
811 *
812 * @mismatch: Type of mismatch.
813 */
814 struct sectioncheck {
815 const char *fromsec[20];
816 const char *bad_tosec[20];
817 const char *good_tosec[20];
818 enum mismatch mismatch;
819 };
820
821 static const struct sectioncheck sectioncheck[] = {
822 /* Do not reference init/exit code/data from
823 * normal code and data
824 */
825 {
826 .fromsec = { TEXT_SECTIONS, DATA_SECTIONS, NULL },
827 .bad_tosec = { ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS, NULL },
828 .mismatch = TEXTDATA_TO_ANY_INIT_EXIT,
829 },
830 /* Do not use exit code/data from init code */
831 {
832 .fromsec = { ALL_INIT_SECTIONS, NULL },
833 .bad_tosec = { ALL_EXIT_SECTIONS, NULL },
834 .mismatch = ANY_INIT_TO_ANY_EXIT,
835 },
836 /* Do not use init code/data from exit code */
837 {
838 .fromsec = { ALL_EXIT_SECTIONS, NULL },
839 .bad_tosec = { ALL_INIT_SECTIONS, NULL },
840 .mismatch = ANY_EXIT_TO_ANY_INIT,
841 },
842 {
843 .fromsec = { ALL_PCI_INIT_SECTIONS, NULL },
844 .bad_tosec = { ALL_INIT_SECTIONS, NULL },
845 .mismatch = ANY_INIT_TO_ANY_EXIT,
846 },
847 {
848 .fromsec = { "__ex_table", NULL },
849 /* If you're adding any new black-listed sections in here, consider
850 * adding a special 'printer' for them in scripts/check_extable.
851 */
852 .bad_tosec = { ".altinstr_replacement", NULL },
853 .good_tosec = {ALL_TEXT_SECTIONS , NULL},
854 .mismatch = EXTABLE_TO_NON_TEXT,
855 }
856 };
857
section_mismatch(const char * fromsec,const char * tosec)858 static const struct sectioncheck *section_mismatch(
859 const char *fromsec, const char *tosec)
860 {
861 int i;
862
863 /*
864 * The target section could be the SHT_NUL section when we're
865 * handling relocations to un-resolved symbols, trying to match it
866 * doesn't make much sense and causes build failures on parisc
867 * architectures.
868 */
869 if (*tosec == '\0')
870 return NULL;
871
872 for (i = 0; i < ARRAY_SIZE(sectioncheck); i++) {
873 const struct sectioncheck *check = §ioncheck[i];
874
875 if (match(fromsec, check->fromsec)) {
876 if (check->bad_tosec[0] && match(tosec, check->bad_tosec))
877 return check;
878 if (check->good_tosec[0] && !match(tosec, check->good_tosec))
879 return check;
880 }
881 }
882 return NULL;
883 }
884
885 /**
886 * Whitelist to allow certain references to pass with no warning.
887 *
888 * Pattern 1:
889 * If a module parameter is declared __initdata and permissions=0
890 * then this is legal despite the warning generated.
891 * We cannot see value of permissions here, so just ignore
892 * this pattern.
893 * The pattern is identified by:
894 * tosec = .init.data
895 * fromsec = .data*
896 * atsym =__param*
897 *
898 * Pattern 1a:
899 * module_param_call() ops can refer to __init set function if permissions=0
900 * The pattern is identified by:
901 * tosec = .init.text
902 * fromsec = .data*
903 * atsym = __param_ops_*
904 *
905 * Pattern 3:
906 * Whitelist all references from .head.text to any init section
907 *
908 * Pattern 4:
909 * Some symbols belong to init section but still it is ok to reference
910 * these from non-init sections as these symbols don't have any memory
911 * allocated for them and symbol address and value are same. So even
912 * if init section is freed, its ok to reference those symbols.
913 * For ex. symbols marking the init section boundaries.
914 * This pattern is identified by
915 * refsymname = __init_begin, _sinittext, _einittext
916 *
917 * Pattern 5:
918 * GCC may optimize static inlines when fed constant arg(s) resulting
919 * in functions like cpumask_empty() -- generating an associated symbol
920 * cpumask_empty.constprop.3 that appears in the audit. If the const that
921 * is passed in comes from __init, like say nmi_ipi_mask, we get a
922 * meaningless section warning. May need to add isra symbols too...
923 * This pattern is identified by
924 * tosec = init section
925 * fromsec = text section
926 * refsymname = *.constprop.*
927 *
928 **/
secref_whitelist(const char * fromsec,const char * fromsym,const char * tosec,const char * tosym)929 static int secref_whitelist(const char *fromsec, const char *fromsym,
930 const char *tosec, const char *tosym)
931 {
932 /* Check for pattern 1 */
933 if (match(tosec, PATTERNS(ALL_INIT_DATA_SECTIONS)) &&
934 match(fromsec, PATTERNS(DATA_SECTIONS)) &&
935 strstarts(fromsym, "__param"))
936 return 0;
937
938 /* Check for pattern 1a */
939 if (strcmp(tosec, ".init.text") == 0 &&
940 match(fromsec, PATTERNS(DATA_SECTIONS)) &&
941 strstarts(fromsym, "__param_ops_"))
942 return 0;
943
944 /* symbols in data sections that may refer to any init/exit sections */
945 if (match(fromsec, PATTERNS(DATA_SECTIONS)) &&
946 match(tosec, PATTERNS(ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS)) &&
947 match(fromsym, PATTERNS("*_ops", "*_probe", "*_console")))
948 return 0;
949
950 /* Check for pattern 3 */
951 if (strstarts(fromsec, ".head.text") &&
952 match(tosec, PATTERNS(ALL_INIT_SECTIONS)))
953 return 0;
954
955 /* Check for pattern 4 */
956 if (match(tosym, PATTERNS("__init_begin", "_sinittext", "_einittext")))
957 return 0;
958
959 /* Check for pattern 5 */
960 if (match(fromsec, PATTERNS(ALL_TEXT_SECTIONS)) &&
961 match(tosec, PATTERNS(ALL_INIT_SECTIONS)) &&
962 match(fromsym, PATTERNS("*.constprop.*")))
963 return 0;
964
965 return 1;
966 }
967
find_fromsym(struct elf_info * elf,Elf_Addr addr,unsigned int secndx)968 static Elf_Sym *find_fromsym(struct elf_info *elf, Elf_Addr addr,
969 unsigned int secndx)
970 {
971 return symsearch_find_nearest(elf, addr, secndx, false, ~0);
972 }
973
find_tosym(struct elf_info * elf,Elf_Addr addr,Elf_Sym * sym)974 static Elf_Sym *find_tosym(struct elf_info *elf, Elf_Addr addr, Elf_Sym *sym)
975 {
976 Elf_Sym *new_sym;
977
978 /* If the supplied symbol has a valid name, return it */
979 if (is_valid_name(elf, sym))
980 return sym;
981
982 /*
983 * Strive to find a better symbol name, but the resulting name may not
984 * match the symbol referenced in the original code.
985 */
986 new_sym = symsearch_find_nearest(elf, addr, get_secindex(elf, sym),
987 true, 20);
988 return new_sym ? new_sym : sym;
989 }
990
is_executable_section(struct elf_info * elf,unsigned int secndx)991 static bool is_executable_section(struct elf_info *elf, unsigned int secndx)
992 {
993 if (secndx >= elf->num_sections)
994 return false;
995
996 return (elf->sechdrs[secndx].sh_flags & SHF_EXECINSTR) != 0;
997 }
998
default_mismatch_handler(const char * modname,struct elf_info * elf,const struct sectioncheck * const mismatch,Elf_Sym * tsym,unsigned int fsecndx,const char * fromsec,Elf_Addr faddr,const char * tosec,Elf_Addr taddr)999 static void default_mismatch_handler(const char *modname, struct elf_info *elf,
1000 const struct sectioncheck* const mismatch,
1001 Elf_Sym *tsym,
1002 unsigned int fsecndx, const char *fromsec, Elf_Addr faddr,
1003 const char *tosec, Elf_Addr taddr)
1004 {
1005 Elf_Sym *from;
1006 const char *tosym;
1007 const char *fromsym;
1008 char taddr_str[16];
1009
1010 from = find_fromsym(elf, faddr, fsecndx);
1011 fromsym = sym_name(elf, from);
1012
1013 tsym = find_tosym(elf, taddr, tsym);
1014 tosym = sym_name(elf, tsym);
1015
1016 /* check whitelist - we may ignore it */
1017 if (!secref_whitelist(fromsec, fromsym, tosec, tosym))
1018 return;
1019
1020 sec_mismatch_count++;
1021
1022 if (!tosym[0])
1023 snprintf(taddr_str, sizeof(taddr_str), "0x%x", (unsigned int)taddr);
1024
1025 /*
1026 * The format for the reference source: <symbol_name>+<offset> or <address>
1027 * The format for the reference destination: <symbol_name> or <address>
1028 */
1029 warn("%s: section mismatch in reference: %s%s0x%x (section: %s) -> %s (section: %s)\n",
1030 modname, fromsym, fromsym[0] ? "+" : "",
1031 (unsigned int)(faddr - (fromsym[0] ? from->st_value : 0)),
1032 fromsec, tosym[0] ? tosym : taddr_str, tosec);
1033
1034 if (mismatch->mismatch == EXTABLE_TO_NON_TEXT) {
1035 if (match(tosec, mismatch->bad_tosec))
1036 fatal("The relocation at %s+0x%lx references\n"
1037 "section \"%s\" which is black-listed.\n"
1038 "Something is seriously wrong and should be fixed.\n"
1039 "You might get more information about where this is\n"
1040 "coming from by using scripts/check_extable.sh %s\n",
1041 fromsec, (long)faddr, tosec, modname);
1042 else if (is_executable_section(elf, get_secindex(elf, tsym)))
1043 warn("The relocation at %s+0x%lx references\n"
1044 "section \"%s\" which is not in the list of\n"
1045 "authorized sections. If you're adding a new section\n"
1046 "and/or if this reference is valid, add \"%s\" to the\n"
1047 "list of authorized sections to jump to on fault.\n"
1048 "This can be achieved by adding \"%s\" to\n"
1049 "OTHER_TEXT_SECTIONS in scripts/mod/modpost.c.\n",
1050 fromsec, (long)faddr, tosec, tosec, tosec);
1051 else
1052 error("%s+0x%lx references non-executable section '%s'\n",
1053 fromsec, (long)faddr, tosec);
1054 }
1055 }
1056
check_export_symbol(struct module * mod,struct elf_info * elf,Elf_Addr faddr,const char * secname,Elf_Sym * sym)1057 static void check_export_symbol(struct module *mod, struct elf_info *elf,
1058 Elf_Addr faddr, const char *secname,
1059 Elf_Sym *sym)
1060 {
1061 static const char *prefix = "__export_symbol_";
1062 const char *label_name, *name, *data;
1063 Elf_Sym *label;
1064 struct symbol *s;
1065 bool is_gpl;
1066
1067 label = find_fromsym(elf, faddr, elf->export_symbol_secndx);
1068 label_name = sym_name(elf, label);
1069
1070 if (!strstarts(label_name, prefix)) {
1071 error("%s: .export_symbol section contains strange symbol '%s'\n",
1072 mod->name, label_name);
1073 return;
1074 }
1075
1076 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
1077 ELF_ST_BIND(sym->st_info) != STB_WEAK) {
1078 error("%s: local symbol '%s' was exported\n", mod->name,
1079 label_name + strlen(prefix));
1080 return;
1081 }
1082
1083 name = sym_name(elf, sym);
1084 if (strcmp(label_name + strlen(prefix), name)) {
1085 error("%s: .export_symbol section references '%s', but it does not seem to be an export symbol\n",
1086 mod->name, name);
1087 return;
1088 }
1089
1090 data = sym_get_data(elf, label); /* license */
1091 if (!strcmp(data, "GPL")) {
1092 is_gpl = true;
1093 } else if (!strcmp(data, "")) {
1094 is_gpl = false;
1095 } else {
1096 error("%s: unknown license '%s' was specified for '%s'\n",
1097 mod->name, data, name);
1098 return;
1099 }
1100
1101 data += strlen(data) + 1; /* namespace */
1102 s = sym_add_exported(name, mod, is_gpl, data);
1103
1104 /*
1105 * We need to be aware whether we are exporting a function or
1106 * a data on some architectures.
1107 */
1108 s->is_func = (ELF_ST_TYPE(sym->st_info) == STT_FUNC);
1109
1110 /*
1111 * For parisc64, symbols prefixed $$ from the library have the symbol type
1112 * STT_LOPROC. They should be handled as functions too.
1113 */
1114 if (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64 &&
1115 elf->hdr->e_machine == EM_PARISC &&
1116 ELF_ST_TYPE(sym->st_info) == STT_LOPROC)
1117 s->is_func = true;
1118
1119 if (match(secname, PATTERNS(ALL_INIT_SECTIONS)))
1120 warn("%s: %s: EXPORT_SYMBOL used for init symbol. Remove __init or EXPORT_SYMBOL.\n",
1121 mod->name, name);
1122 else if (match(secname, PATTERNS(ALL_EXIT_SECTIONS)))
1123 warn("%s: %s: EXPORT_SYMBOL used for exit symbol. Remove __exit or EXPORT_SYMBOL.\n",
1124 mod->name, name);
1125 }
1126
check_section_mismatch(struct module * mod,struct elf_info * elf,Elf_Sym * sym,unsigned int fsecndx,const char * fromsec,Elf_Addr faddr,Elf_Addr taddr)1127 static void check_section_mismatch(struct module *mod, struct elf_info *elf,
1128 Elf_Sym *sym,
1129 unsigned int fsecndx, const char *fromsec,
1130 Elf_Addr faddr, Elf_Addr taddr)
1131 {
1132 const char *tosec = sec_name(elf, get_secindex(elf, sym));
1133 const struct sectioncheck *mismatch;
1134
1135 if (module_enabled && elf->export_symbol_secndx == fsecndx) {
1136 check_export_symbol(mod, elf, faddr, tosec, sym);
1137 return;
1138 }
1139
1140 mismatch = section_mismatch(fromsec, tosec);
1141 if (!mismatch)
1142 return;
1143
1144 default_mismatch_handler(mod->name, elf, mismatch, sym,
1145 fsecndx, fromsec, faddr,
1146 tosec, taddr);
1147 }
1148
addend_386_rel(uint32_t * location,unsigned int r_type)1149 static Elf_Addr addend_386_rel(uint32_t *location, unsigned int r_type)
1150 {
1151 switch (r_type) {
1152 case R_386_32:
1153 return TO_NATIVE(*location);
1154 case R_386_PC32:
1155 return TO_NATIVE(*location) + 4;
1156 }
1157
1158 return (Elf_Addr)(-1);
1159 }
1160
sign_extend32(int32_t value,int index)1161 static int32_t sign_extend32(int32_t value, int index)
1162 {
1163 uint8_t shift = 31 - index;
1164
1165 return (int32_t)(value << shift) >> shift;
1166 }
1167
addend_arm_rel(void * loc,Elf_Sym * sym,unsigned int r_type)1168 static Elf_Addr addend_arm_rel(void *loc, Elf_Sym *sym, unsigned int r_type)
1169 {
1170 uint32_t inst, upper, lower, sign, j1, j2;
1171 int32_t offset;
1172
1173 switch (r_type) {
1174 case R_ARM_ABS32:
1175 case R_ARM_REL32:
1176 inst = TO_NATIVE(*(uint32_t *)loc);
1177 return inst + sym->st_value;
1178 case R_ARM_MOVW_ABS_NC:
1179 case R_ARM_MOVT_ABS:
1180 inst = TO_NATIVE(*(uint32_t *)loc);
1181 offset = sign_extend32(((inst & 0xf0000) >> 4) | (inst & 0xfff),
1182 15);
1183 return offset + sym->st_value;
1184 case R_ARM_PC24:
1185 case R_ARM_CALL:
1186 case R_ARM_JUMP24:
1187 inst = TO_NATIVE(*(uint32_t *)loc);
1188 offset = sign_extend32((inst & 0x00ffffff) << 2, 25);
1189 return offset + sym->st_value + 8;
1190 case R_ARM_THM_MOVW_ABS_NC:
1191 case R_ARM_THM_MOVT_ABS:
1192 upper = TO_NATIVE(*(uint16_t *)loc);
1193 lower = TO_NATIVE(*((uint16_t *)loc + 1));
1194 offset = sign_extend32(((upper & 0x000f) << 12) |
1195 ((upper & 0x0400) << 1) |
1196 ((lower & 0x7000) >> 4) |
1197 (lower & 0x00ff),
1198 15);
1199 return offset + sym->st_value;
1200 case R_ARM_THM_JUMP19:
1201 /*
1202 * Encoding T3:
1203 * S = upper[10]
1204 * imm6 = upper[5:0]
1205 * J1 = lower[13]
1206 * J2 = lower[11]
1207 * imm11 = lower[10:0]
1208 * imm32 = SignExtend(S:J2:J1:imm6:imm11:'0')
1209 */
1210 upper = TO_NATIVE(*(uint16_t *)loc);
1211 lower = TO_NATIVE(*((uint16_t *)loc + 1));
1212
1213 sign = (upper >> 10) & 1;
1214 j1 = (lower >> 13) & 1;
1215 j2 = (lower >> 11) & 1;
1216 offset = sign_extend32((sign << 20) | (j2 << 19) | (j1 << 18) |
1217 ((upper & 0x03f) << 12) |
1218 ((lower & 0x07ff) << 1),
1219 20);
1220 return offset + sym->st_value + 4;
1221 case R_ARM_THM_PC22:
1222 case R_ARM_THM_JUMP24:
1223 /*
1224 * Encoding T4:
1225 * S = upper[10]
1226 * imm10 = upper[9:0]
1227 * J1 = lower[13]
1228 * J2 = lower[11]
1229 * imm11 = lower[10:0]
1230 * I1 = NOT(J1 XOR S)
1231 * I2 = NOT(J2 XOR S)
1232 * imm32 = SignExtend(S:I1:I2:imm10:imm11:'0')
1233 */
1234 upper = TO_NATIVE(*(uint16_t *)loc);
1235 lower = TO_NATIVE(*((uint16_t *)loc + 1));
1236
1237 sign = (upper >> 10) & 1;
1238 j1 = (lower >> 13) & 1;
1239 j2 = (lower >> 11) & 1;
1240 offset = sign_extend32((sign << 24) |
1241 ((~(j1 ^ sign) & 1) << 23) |
1242 ((~(j2 ^ sign) & 1) << 22) |
1243 ((upper & 0x03ff) << 12) |
1244 ((lower & 0x07ff) << 1),
1245 24);
1246 return offset + sym->st_value + 4;
1247 }
1248
1249 return (Elf_Addr)(-1);
1250 }
1251
addend_mips_rel(uint32_t * location,unsigned int r_type)1252 static Elf_Addr addend_mips_rel(uint32_t *location, unsigned int r_type)
1253 {
1254 uint32_t inst;
1255
1256 inst = TO_NATIVE(*location);
1257 switch (r_type) {
1258 case R_MIPS_LO16:
1259 return inst & 0xffff;
1260 case R_MIPS_26:
1261 return (inst & 0x03ffffff) << 2;
1262 case R_MIPS_32:
1263 return inst;
1264 }
1265 return (Elf_Addr)(-1);
1266 }
1267
1268 #ifndef EM_RISCV
1269 #define EM_RISCV 243
1270 #endif
1271
1272 #ifndef R_RISCV_SUB32
1273 #define R_RISCV_SUB32 39
1274 #endif
1275
1276 #ifndef EM_LOONGARCH
1277 #define EM_LOONGARCH 258
1278 #endif
1279
1280 #ifndef R_LARCH_SUB32
1281 #define R_LARCH_SUB32 55
1282 #endif
1283
1284 #ifndef R_LARCH_RELAX
1285 #define R_LARCH_RELAX 100
1286 #endif
1287
1288 #ifndef R_LARCH_ALIGN
1289 #define R_LARCH_ALIGN 102
1290 #endif
1291
get_rel_type_and_sym(struct elf_info * elf,uint64_t r_info,unsigned int * r_type,unsigned int * r_sym)1292 static void get_rel_type_and_sym(struct elf_info *elf, uint64_t r_info,
1293 unsigned int *r_type, unsigned int *r_sym)
1294 {
1295 typedef struct {
1296 Elf64_Word r_sym; /* Symbol index */
1297 unsigned char r_ssym; /* Special symbol for 2nd relocation */
1298 unsigned char r_type3; /* 3rd relocation type */
1299 unsigned char r_type2; /* 2nd relocation type */
1300 unsigned char r_type; /* 1st relocation type */
1301 } Elf64_Mips_R_Info;
1302
1303 bool is_64bit = (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64);
1304
1305 if (elf->hdr->e_machine == EM_MIPS && is_64bit) {
1306 Elf64_Mips_R_Info *mips64_r_info = (void *)&r_info;
1307
1308 *r_type = mips64_r_info->r_type;
1309 *r_sym = TO_NATIVE(mips64_r_info->r_sym);
1310 return;
1311 }
1312
1313 if (is_64bit)
1314 r_info = TO_NATIVE((Elf64_Xword)r_info);
1315 else
1316 r_info = TO_NATIVE((Elf32_Word)r_info);
1317
1318 *r_type = ELF_R_TYPE(r_info);
1319 *r_sym = ELF_R_SYM(r_info);
1320 }
1321
section_rela(struct module * mod,struct elf_info * elf,unsigned int fsecndx,const char * fromsec,const Elf_Rela * start,const Elf_Rela * stop)1322 static void section_rela(struct module *mod, struct elf_info *elf,
1323 unsigned int fsecndx, const char *fromsec,
1324 const Elf_Rela *start, const Elf_Rela *stop)
1325 {
1326 const Elf_Rela *rela;
1327
1328 for (rela = start; rela < stop; rela++) {
1329 Elf_Sym *tsym;
1330 Elf_Addr taddr, r_offset;
1331 unsigned int r_type, r_sym;
1332
1333 r_offset = TO_NATIVE(rela->r_offset);
1334 get_rel_type_and_sym(elf, rela->r_info, &r_type, &r_sym);
1335
1336 tsym = elf->symtab_start + r_sym;
1337 taddr = tsym->st_value + TO_NATIVE(rela->r_addend);
1338
1339 switch (elf->hdr->e_machine) {
1340 case EM_RISCV:
1341 if (!strcmp("__ex_table", fromsec) &&
1342 r_type == R_RISCV_SUB32)
1343 continue;
1344 break;
1345 case EM_LOONGARCH:
1346 switch (r_type) {
1347 case R_LARCH_SUB32:
1348 if (!strcmp("__ex_table", fromsec))
1349 continue;
1350 break;
1351 case R_LARCH_RELAX:
1352 case R_LARCH_ALIGN:
1353 /* These relocs do not refer to symbols */
1354 continue;
1355 }
1356 break;
1357 }
1358
1359 check_section_mismatch(mod, elf, tsym,
1360 fsecndx, fromsec, r_offset, taddr);
1361 }
1362 }
1363
section_rel(struct module * mod,struct elf_info * elf,unsigned int fsecndx,const char * fromsec,const Elf_Rel * start,const Elf_Rel * stop)1364 static void section_rel(struct module *mod, struct elf_info *elf,
1365 unsigned int fsecndx, const char *fromsec,
1366 const Elf_Rel *start, const Elf_Rel *stop)
1367 {
1368 const Elf_Rel *rel;
1369
1370 for (rel = start; rel < stop; rel++) {
1371 Elf_Sym *tsym;
1372 Elf_Addr taddr, r_offset;
1373 unsigned int r_type, r_sym;
1374 void *loc;
1375
1376 r_offset = TO_NATIVE(rel->r_offset);
1377 get_rel_type_and_sym(elf, rel->r_info, &r_type, &r_sym);
1378
1379 loc = sym_get_data_by_offset(elf, fsecndx, r_offset);
1380 tsym = elf->symtab_start + r_sym;
1381
1382 switch (elf->hdr->e_machine) {
1383 case EM_386:
1384 taddr = addend_386_rel(loc, r_type);
1385 break;
1386 case EM_ARM:
1387 taddr = addend_arm_rel(loc, tsym, r_type);
1388 break;
1389 case EM_MIPS:
1390 taddr = addend_mips_rel(loc, r_type);
1391 break;
1392 default:
1393 fatal("Please add code to calculate addend for this architecture\n");
1394 }
1395
1396 check_section_mismatch(mod, elf, tsym,
1397 fsecndx, fromsec, r_offset, taddr);
1398 }
1399 }
1400
1401 /**
1402 * A module includes a number of sections that are discarded
1403 * either when loaded or when used as built-in.
1404 * For loaded modules all functions marked __init and all data
1405 * marked __initdata will be discarded when the module has been initialized.
1406 * Likewise for modules used built-in the sections marked __exit
1407 * are discarded because __exit marked function are supposed to be called
1408 * only when a module is unloaded which never happens for built-in modules.
1409 * The check_sec_ref() function traverses all relocation records
1410 * to find all references to a section that reference a section that will
1411 * be discarded and warns about it.
1412 **/
check_sec_ref(struct module * mod,struct elf_info * elf)1413 static void check_sec_ref(struct module *mod, struct elf_info *elf)
1414 {
1415 int i;
1416
1417 /* Walk through all sections */
1418 for (i = 0; i < elf->num_sections; i++) {
1419 Elf_Shdr *sechdr = &elf->sechdrs[i];
1420
1421 check_section(mod->name, elf, sechdr);
1422 /* We want to process only relocation sections and not .init */
1423 if (sechdr->sh_type == SHT_REL || sechdr->sh_type == SHT_RELA) {
1424 /* section to which the relocation applies */
1425 unsigned int secndx = sechdr->sh_info;
1426 const char *secname = sec_name(elf, secndx);
1427 const void *start, *stop;
1428
1429 /* If the section is known good, skip it */
1430 if (match(secname, section_white_list))
1431 continue;
1432
1433 start = sym_get_data_by_offset(elf, i, 0);
1434 stop = start + sechdr->sh_size;
1435
1436 if (sechdr->sh_type == SHT_RELA)
1437 section_rela(mod, elf, secndx, secname,
1438 start, stop);
1439 else
1440 section_rel(mod, elf, secndx, secname,
1441 start, stop);
1442 }
1443 }
1444 }
1445
remove_dot(char * s)1446 static char *remove_dot(char *s)
1447 {
1448 size_t n = strcspn(s, ".");
1449
1450 if (n && s[n]) {
1451 size_t m = strspn(s + n + 1, "0123456789");
1452 if (m && (s[n + m + 1] == '.' || s[n + m + 1] == 0))
1453 s[n] = 0;
1454 }
1455 return s;
1456 }
1457
1458 /*
1459 * The CRCs are recorded in .*.cmd files in the form of:
1460 * #SYMVER <name> <crc>
1461 */
extract_crcs_for_object(const char * object,struct module * mod)1462 static void extract_crcs_for_object(const char *object, struct module *mod)
1463 {
1464 char cmd_file[PATH_MAX];
1465 char *buf, *p;
1466 const char *base;
1467 int dirlen, ret;
1468
1469 base = strrchr(object, '/');
1470 if (base) {
1471 base++;
1472 dirlen = base - object;
1473 } else {
1474 dirlen = 0;
1475 base = object;
1476 }
1477
1478 ret = snprintf(cmd_file, sizeof(cmd_file), "%.*s.%s.cmd",
1479 dirlen, object, base);
1480 if (ret >= sizeof(cmd_file)) {
1481 error("%s: too long path was truncated\n", cmd_file);
1482 return;
1483 }
1484
1485 buf = read_text_file(cmd_file);
1486 p = buf;
1487
1488 while ((p = strstr(p, "\n#SYMVER "))) {
1489 char *name;
1490 size_t namelen;
1491 unsigned int crc;
1492 struct symbol *sym;
1493
1494 name = p + strlen("\n#SYMVER ");
1495
1496 p = strchr(name, ' ');
1497 if (!p)
1498 break;
1499
1500 namelen = p - name;
1501 p++;
1502
1503 if (!isdigit(*p))
1504 continue; /* skip this line */
1505
1506 crc = strtoul(p, &p, 0);
1507 if (*p != '\n')
1508 continue; /* skip this line */
1509
1510 name[namelen] = '\0';
1511
1512 /*
1513 * sym_find_with_module() may return NULL here.
1514 * It typically occurs when CONFIG_TRIM_UNUSED_KSYMS=y.
1515 * Since commit e1327a127703, genksyms calculates CRCs of all
1516 * symbols, including trimmed ones. Ignore orphan CRCs.
1517 */
1518 sym = sym_find_with_module(name, mod);
1519 if (sym)
1520 sym_set_crc(sym, crc);
1521 }
1522
1523 free(buf);
1524 }
1525
1526 /*
1527 * The symbol versions (CRC) are recorded in the .*.cmd files.
1528 * Parse them to retrieve CRCs for the current module.
1529 */
mod_set_crcs(struct module * mod)1530 static void mod_set_crcs(struct module *mod)
1531 {
1532 char objlist[PATH_MAX];
1533 char *buf, *p, *obj;
1534 int ret;
1535
1536 if (mod->is_vmlinux) {
1537 strcpy(objlist, ".vmlinux.objs");
1538 } else {
1539 /* objects for a module are listed in the *.mod file. */
1540 ret = snprintf(objlist, sizeof(objlist), "%s.mod", mod->name);
1541 if (ret >= sizeof(objlist)) {
1542 error("%s: too long path was truncated\n", objlist);
1543 return;
1544 }
1545 }
1546
1547 buf = read_text_file(objlist);
1548 p = buf;
1549
1550 while ((obj = strsep(&p, "\n")) && obj[0])
1551 extract_crcs_for_object(obj, mod);
1552
1553 free(buf);
1554 }
1555
read_symbols(const char * modname)1556 static void read_symbols(const char *modname)
1557 {
1558 const char *symname;
1559 char *version;
1560 char *license;
1561 char *namespace;
1562 struct module *mod;
1563 struct elf_info info = { };
1564 Elf_Sym *sym;
1565
1566 if (!parse_elf(&info, modname))
1567 return;
1568
1569 if (!strends(modname, ".o")) {
1570 error("%s: filename must be suffixed with .o\n", modname);
1571 return;
1572 }
1573
1574 /* strip trailing .o */
1575 mod = new_module(modname, strlen(modname) - strlen(".o"));
1576
1577 if (!mod->is_vmlinux) {
1578 license = get_modinfo(&info, "license");
1579 if (!license)
1580 error("missing MODULE_LICENSE() in %s\n", modname);
1581 while (license) {
1582 if (!license_is_gpl_compatible(license)) {
1583 mod->is_gpl_compatible = false;
1584 break;
1585 }
1586 license = get_next_modinfo(&info, "license", license);
1587 }
1588
1589 namespace = get_modinfo(&info, "import_ns");
1590 while (namespace) {
1591 add_namespace(&mod->imported_namespaces, namespace);
1592 namespace = get_next_modinfo(&info, "import_ns",
1593 namespace);
1594 }
1595
1596 if (extra_warn && !get_modinfo(&info, "description"))
1597 warn("missing MODULE_DESCRIPTION() in %s\n", modname);
1598 }
1599
1600 for (sym = info.symtab_start; sym < info.symtab_stop; sym++) {
1601 symname = remove_dot(info.strtab + sym->st_name);
1602
1603 handle_symbol(mod, &info, sym, symname);
1604 handle_moddevtable(mod, &info, sym, symname);
1605 }
1606
1607 check_sec_ref(mod, &info);
1608
1609 if (!mod->is_vmlinux) {
1610 version = get_modinfo(&info, "version");
1611 if (version || all_versions)
1612 get_src_version(mod->name, mod->srcversion,
1613 sizeof(mod->srcversion) - 1);
1614 }
1615
1616 parse_elf_finish(&info);
1617
1618 if (modversions) {
1619 /*
1620 * Our trick to get versioning for module struct etc. - it's
1621 * never passed as an argument to an exported function, so
1622 * the automatic versioning doesn't pick it up, but it's really
1623 * important anyhow.
1624 */
1625 sym_add_unresolved("module_layout", mod, false);
1626
1627 mod_set_crcs(mod);
1628 }
1629 }
1630
read_symbols_from_files(const char * filename)1631 static void read_symbols_from_files(const char *filename)
1632 {
1633 FILE *in = stdin;
1634 char fname[PATH_MAX];
1635
1636 in = fopen(filename, "r");
1637 if (!in)
1638 fatal("Can't open filenames file %s: %m", filename);
1639
1640 while (fgets(fname, PATH_MAX, in) != NULL) {
1641 if (strends(fname, "\n"))
1642 fname[strlen(fname)-1] = '\0';
1643 read_symbols(fname);
1644 }
1645
1646 fclose(in);
1647 }
1648
1649 #define SZ 500
1650
1651 /* We first write the generated file into memory using the
1652 * following helper, then compare to the file on disk and
1653 * only update the later if anything changed */
1654
buf_printf(struct buffer * buf,const char * fmt,...)1655 void __attribute__((format(printf, 2, 3))) buf_printf(struct buffer *buf,
1656 const char *fmt, ...)
1657 {
1658 char tmp[SZ];
1659 int len;
1660 va_list ap;
1661
1662 va_start(ap, fmt);
1663 len = vsnprintf(tmp, SZ, fmt, ap);
1664 buf_write(buf, tmp, len);
1665 va_end(ap);
1666 }
1667
buf_write(struct buffer * buf,const char * s,int len)1668 void buf_write(struct buffer *buf, const char *s, int len)
1669 {
1670 if (buf->size - buf->pos < len) {
1671 buf->size += len + SZ;
1672 buf->p = xrealloc(buf->p, buf->size);
1673 }
1674 strncpy(buf->p + buf->pos, s, len);
1675 buf->pos += len;
1676 }
1677
check_exports(struct module * mod)1678 static void check_exports(struct module *mod)
1679 {
1680 struct symbol *s, *exp;
1681
1682 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1683 const char *basename;
1684 exp = find_symbol(s->name);
1685 if (!exp) {
1686 if (!s->weak && nr_unresolved++ < MAX_UNRESOLVED_REPORTS)
1687 modpost_log(!warn_unresolved,
1688 "\"%s\" [%s.ko] undefined!\n",
1689 s->name, mod->name);
1690 continue;
1691 }
1692 if (exp->module == mod) {
1693 error("\"%s\" [%s.ko] was exported without definition\n",
1694 s->name, mod->name);
1695 continue;
1696 }
1697
1698 exp->used = true;
1699 s->module = exp->module;
1700 s->crc_valid = exp->crc_valid;
1701 s->crc = exp->crc;
1702
1703 basename = strrchr(mod->name, '/');
1704 if (basename)
1705 basename++;
1706 else
1707 basename = mod->name;
1708
1709 if (!contains_namespace(&mod->imported_namespaces, exp->namespace)) {
1710 modpost_log(!allow_missing_ns_imports,
1711 "module %s uses symbol %s from namespace %s, but does not import it.\n",
1712 basename, exp->name, exp->namespace);
1713 add_namespace(&mod->missing_namespaces, exp->namespace);
1714 }
1715
1716 if (!mod->is_gpl_compatible && exp->is_gpl_only)
1717 error("GPL-incompatible module %s.ko uses GPL-only symbol '%s'\n",
1718 basename, exp->name);
1719 }
1720 }
1721
handle_white_list_exports(const char * white_list)1722 static void handle_white_list_exports(const char *white_list)
1723 {
1724 char *buf, *p, *name;
1725
1726 buf = read_text_file(white_list);
1727 p = buf;
1728
1729 while ((name = strsep(&p, "\n"))) {
1730 struct symbol *sym = find_symbol(name);
1731
1732 if (sym)
1733 sym->used = true;
1734 }
1735
1736 free(buf);
1737 }
1738
check_modname_len(struct module * mod)1739 static void check_modname_len(struct module *mod)
1740 {
1741 const char *mod_name;
1742
1743 mod_name = strrchr(mod->name, '/');
1744 if (mod_name == NULL)
1745 mod_name = mod->name;
1746 else
1747 mod_name++;
1748 if (strlen(mod_name) >= MODULE_NAME_LEN)
1749 error("module name is too long [%s.ko]\n", mod->name);
1750 }
1751
1752 /**
1753 * Header for the generated file
1754 **/
add_header(struct buffer * b,struct module * mod)1755 static void add_header(struct buffer *b, struct module *mod)
1756 {
1757 buf_printf(b, "#include <linux/module.h>\n");
1758 buf_printf(b, "#include <linux/export-internal.h>\n");
1759 buf_printf(b, "#include <linux/compiler.h>\n");
1760 buf_printf(b, "\n");
1761 buf_printf(b, "MODULE_INFO(name, KBUILD_MODNAME);\n");
1762 buf_printf(b, "\n");
1763 buf_printf(b, "__visible struct module __this_module\n");
1764 buf_printf(b, "__section(\".gnu.linkonce.this_module\") = {\n");
1765 buf_printf(b, "\t.name = KBUILD_MODNAME,\n");
1766 if (mod->has_init)
1767 buf_printf(b, "\t.init = init_module,\n");
1768 if (mod->has_cleanup)
1769 buf_printf(b, "#ifdef CONFIG_MODULE_UNLOAD\n"
1770 "\t.exit = cleanup_module,\n"
1771 "#endif\n");
1772 buf_printf(b, "\t.arch = MODULE_ARCH_INIT,\n");
1773 buf_printf(b, "};\n");
1774
1775 if (!external_module)
1776 buf_printf(b, "\nMODULE_INFO(intree, \"Y\");\n");
1777
1778 if (strstarts(mod->name, "drivers/staging"))
1779 buf_printf(b, "\nMODULE_INFO(staging, \"Y\");\n");
1780
1781 if (strstarts(mod->name, "tools/testing"))
1782 buf_printf(b, "\nMODULE_INFO(test, \"Y\");\n");
1783 }
1784
add_exported_symbols(struct buffer * buf,struct module * mod)1785 static void add_exported_symbols(struct buffer *buf, struct module *mod)
1786 {
1787 struct symbol *sym;
1788
1789 /* generate struct for exported symbols */
1790 buf_printf(buf, "\n");
1791 list_for_each_entry(sym, &mod->exported_symbols, list) {
1792 if (trim_unused_exports && !sym->used)
1793 continue;
1794
1795 buf_printf(buf, "KSYMTAB_%s(%s, \"%s\", \"%s\");\n",
1796 sym->is_func ? "FUNC" : "DATA", sym->name,
1797 sym->is_gpl_only ? "_gpl" : "", sym->namespace);
1798 }
1799
1800 if (!modversions)
1801 return;
1802
1803 /* record CRCs for exported symbols */
1804 buf_printf(buf, "\n");
1805 list_for_each_entry(sym, &mod->exported_symbols, list) {
1806 if (trim_unused_exports && !sym->used)
1807 continue;
1808
1809 if (!sym->crc_valid)
1810 warn("EXPORT symbol \"%s\" [%s%s] version generation failed, symbol will not be versioned.\n"
1811 "Is \"%s\" prototyped in <asm/asm-prototypes.h>?\n",
1812 sym->name, mod->name, mod->is_vmlinux ? "" : ".ko",
1813 sym->name);
1814
1815 buf_printf(buf, "SYMBOL_CRC(%s, 0x%08x, \"%s\");\n",
1816 sym->name, sym->crc, sym->is_gpl_only ? "_gpl" : "");
1817 }
1818 }
1819
1820 /**
1821 * Record CRCs for unresolved symbols
1822 **/
add_versions(struct buffer * b,struct module * mod)1823 static void add_versions(struct buffer *b, struct module *mod)
1824 {
1825 struct symbol *s;
1826
1827 if (!modversions)
1828 return;
1829
1830 buf_printf(b, "\n");
1831 buf_printf(b, "static const struct modversion_info ____versions[]\n");
1832 buf_printf(b, "__used __section(\"__versions\") = {\n");
1833
1834 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1835 if (!s->module)
1836 continue;
1837 if (!s->crc_valid) {
1838 warn("\"%s\" [%s.ko] has no CRC!\n",
1839 s->name, mod->name);
1840 continue;
1841 }
1842 if (strlen(s->name) >= MODULE_NAME_LEN) {
1843 error("too long symbol \"%s\" [%s.ko]\n",
1844 s->name, mod->name);
1845 break;
1846 }
1847 buf_printf(b, "\t{ %#8x, \"%s\" },\n",
1848 s->crc, s->name);
1849 }
1850
1851 buf_printf(b, "};\n");
1852 }
1853
add_depends(struct buffer * b,struct module * mod)1854 static void add_depends(struct buffer *b, struct module *mod)
1855 {
1856 struct symbol *s;
1857 int first = 1;
1858
1859 /* Clear ->seen flag of modules that own symbols needed by this. */
1860 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1861 if (s->module)
1862 s->module->seen = s->module->is_vmlinux;
1863 }
1864
1865 buf_printf(b, "\n");
1866 buf_printf(b, "MODULE_INFO(depends, \"");
1867 list_for_each_entry(s, &mod->unresolved_symbols, list) {
1868 const char *p;
1869 if (!s->module)
1870 continue;
1871
1872 if (s->module->seen)
1873 continue;
1874
1875 s->module->seen = true;
1876 p = strrchr(s->module->name, '/');
1877 if (p)
1878 p++;
1879 else
1880 p = s->module->name;
1881 buf_printf(b, "%s%s", first ? "" : ",", p);
1882 first = 0;
1883 }
1884 buf_printf(b, "\");\n");
1885 }
1886
add_srcversion(struct buffer * b,struct module * mod)1887 static void add_srcversion(struct buffer *b, struct module *mod)
1888 {
1889 if (mod->srcversion[0]) {
1890 buf_printf(b, "\n");
1891 buf_printf(b, "MODULE_INFO(srcversion, \"%s\");\n",
1892 mod->srcversion);
1893 }
1894 }
1895
write_buf(struct buffer * b,const char * fname)1896 static void write_buf(struct buffer *b, const char *fname)
1897 {
1898 FILE *file;
1899
1900 if (error_occurred)
1901 return;
1902
1903 file = fopen(fname, "w");
1904 if (!file) {
1905 perror(fname);
1906 exit(1);
1907 }
1908 if (fwrite(b->p, 1, b->pos, file) != b->pos) {
1909 perror(fname);
1910 exit(1);
1911 }
1912 if (fclose(file) != 0) {
1913 perror(fname);
1914 exit(1);
1915 }
1916 }
1917
write_if_changed(struct buffer * b,const char * fname)1918 static void write_if_changed(struct buffer *b, const char *fname)
1919 {
1920 char *tmp;
1921 FILE *file;
1922 struct stat st;
1923
1924 file = fopen(fname, "r");
1925 if (!file)
1926 goto write;
1927
1928 if (fstat(fileno(file), &st) < 0)
1929 goto close_write;
1930
1931 if (st.st_size != b->pos)
1932 goto close_write;
1933
1934 tmp = xmalloc(b->pos);
1935 if (fread(tmp, 1, b->pos, file) != b->pos)
1936 goto free_write;
1937
1938 if (memcmp(tmp, b->p, b->pos) != 0)
1939 goto free_write;
1940
1941 free(tmp);
1942 fclose(file);
1943 return;
1944
1945 free_write:
1946 free(tmp);
1947 close_write:
1948 fclose(file);
1949 write:
1950 write_buf(b, fname);
1951 }
1952
write_vmlinux_export_c_file(struct module * mod)1953 static void write_vmlinux_export_c_file(struct module *mod)
1954 {
1955 struct buffer buf = { };
1956
1957 buf_printf(&buf,
1958 "#include <linux/export-internal.h>\n");
1959
1960 add_exported_symbols(&buf, mod);
1961 write_if_changed(&buf, ".vmlinux.export.c");
1962 free(buf.p);
1963 }
1964
1965 /* do sanity checks, and generate *.mod.c file */
write_mod_c_file(struct module * mod)1966 static void write_mod_c_file(struct module *mod)
1967 {
1968 struct buffer buf = { };
1969 char fname[PATH_MAX];
1970 int ret;
1971
1972 add_header(&buf, mod);
1973 add_exported_symbols(&buf, mod);
1974 add_versions(&buf, mod);
1975 add_depends(&buf, mod);
1976 add_moddevtable(&buf, mod);
1977 add_srcversion(&buf, mod);
1978
1979 ret = snprintf(fname, sizeof(fname), "%s.mod.c", mod->name);
1980 if (ret >= sizeof(fname)) {
1981 error("%s: too long path was truncated\n", fname);
1982 goto free;
1983 }
1984
1985 write_if_changed(&buf, fname);
1986
1987 free:
1988 free(buf.p);
1989 }
1990
1991 /* parse Module.symvers file. line format:
1992 * 0x12345678<tab>symbol<tab>module<tab>export<tab>namespace
1993 **/
read_dump(const char * fname)1994 static void read_dump(const char *fname)
1995 {
1996 char *buf, *pos, *line;
1997
1998 buf = read_text_file(fname);
1999 if (!buf)
2000 /* No symbol versions, silently ignore */
2001 return;
2002
2003 pos = buf;
2004
2005 while ((line = get_line(&pos))) {
2006 char *symname, *namespace, *modname, *d, *export;
2007 unsigned int crc;
2008 struct module *mod;
2009 struct symbol *s;
2010 bool gpl_only;
2011
2012 if (!(symname = strchr(line, '\t')))
2013 goto fail;
2014 *symname++ = '\0';
2015 if (!(modname = strchr(symname, '\t')))
2016 goto fail;
2017 *modname++ = '\0';
2018 if (!(export = strchr(modname, '\t')))
2019 goto fail;
2020 *export++ = '\0';
2021 if (!(namespace = strchr(export, '\t')))
2022 goto fail;
2023 *namespace++ = '\0';
2024
2025 crc = strtoul(line, &d, 16);
2026 if (*symname == '\0' || *modname == '\0' || *d != '\0')
2027 goto fail;
2028
2029 if (!strcmp(export, "EXPORT_SYMBOL_GPL")) {
2030 gpl_only = true;
2031 } else if (!strcmp(export, "EXPORT_SYMBOL")) {
2032 gpl_only = false;
2033 } else {
2034 error("%s: unknown license %s. skip", symname, export);
2035 continue;
2036 }
2037
2038 mod = find_module(modname);
2039 if (!mod) {
2040 mod = new_module(modname, strlen(modname));
2041 mod->from_dump = true;
2042 }
2043 s = sym_add_exported(symname, mod, gpl_only, namespace);
2044 sym_set_crc(s, crc);
2045 }
2046 free(buf);
2047 return;
2048 fail:
2049 free(buf);
2050 fatal("parse error in symbol dump file\n");
2051 }
2052
write_dump(const char * fname)2053 static void write_dump(const char *fname)
2054 {
2055 struct buffer buf = { };
2056 struct module *mod;
2057 struct symbol *sym;
2058
2059 list_for_each_entry(mod, &modules, list) {
2060 if (mod->from_dump)
2061 continue;
2062 list_for_each_entry(sym, &mod->exported_symbols, list) {
2063 if (trim_unused_exports && !sym->used)
2064 continue;
2065
2066 buf_printf(&buf, "0x%08x\t%s\t%s\tEXPORT_SYMBOL%s\t%s\n",
2067 sym->crc, sym->name, mod->name,
2068 sym->is_gpl_only ? "_GPL" : "",
2069 sym->namespace);
2070 }
2071 }
2072 write_buf(&buf, fname);
2073 free(buf.p);
2074 }
2075
write_namespace_deps_files(const char * fname)2076 static void write_namespace_deps_files(const char *fname)
2077 {
2078 struct module *mod;
2079 struct namespace_list *ns;
2080 struct buffer ns_deps_buf = {};
2081
2082 list_for_each_entry(mod, &modules, list) {
2083
2084 if (mod->from_dump || list_empty(&mod->missing_namespaces))
2085 continue;
2086
2087 buf_printf(&ns_deps_buf, "%s.ko:", mod->name);
2088
2089 list_for_each_entry(ns, &mod->missing_namespaces, list)
2090 buf_printf(&ns_deps_buf, " %s", ns->namespace);
2091
2092 buf_printf(&ns_deps_buf, "\n");
2093 }
2094
2095 write_if_changed(&ns_deps_buf, fname);
2096 free(ns_deps_buf.p);
2097 }
2098
2099 struct dump_list {
2100 struct list_head list;
2101 const char *file;
2102 };
2103
check_host_endian(void)2104 static void check_host_endian(void)
2105 {
2106 static const union {
2107 short s;
2108 char c[2];
2109 } endian_test = { .c = {0x01, 0x02} };
2110
2111 switch (endian_test.s) {
2112 case 0x0102:
2113 host_is_big_endian = true;
2114 break;
2115 case 0x0201:
2116 host_is_big_endian = false;
2117 break;
2118 default:
2119 fatal("Unknown host endian\n");
2120 }
2121 }
2122
main(int argc,char ** argv)2123 int main(int argc, char **argv)
2124 {
2125 struct module *mod;
2126 char *missing_namespace_deps = NULL;
2127 char *unused_exports_white_list = NULL;
2128 char *dump_write = NULL, *files_source = NULL;
2129 int opt;
2130 LIST_HEAD(dump_lists);
2131 struct dump_list *dl, *dl2;
2132
2133 while ((opt = getopt(argc, argv, "ei:MmnT:to:au:WwENd:")) != -1) {
2134 switch (opt) {
2135 case 'e':
2136 external_module = true;
2137 break;
2138 case 'i':
2139 dl = xmalloc(sizeof(*dl));
2140 dl->file = optarg;
2141 list_add_tail(&dl->list, &dump_lists);
2142 break;
2143 case 'M':
2144 module_enabled = true;
2145 break;
2146 case 'm':
2147 modversions = true;
2148 break;
2149 case 'n':
2150 ignore_missing_files = true;
2151 break;
2152 case 'o':
2153 dump_write = optarg;
2154 break;
2155 case 'a':
2156 all_versions = true;
2157 break;
2158 case 'T':
2159 files_source = optarg;
2160 break;
2161 case 't':
2162 trim_unused_exports = true;
2163 break;
2164 case 'u':
2165 unused_exports_white_list = optarg;
2166 break;
2167 case 'W':
2168 extra_warn = true;
2169 break;
2170 case 'w':
2171 warn_unresolved = true;
2172 break;
2173 case 'E':
2174 sec_mismatch_warn_only = false;
2175 break;
2176 case 'N':
2177 allow_missing_ns_imports = true;
2178 break;
2179 case 'd':
2180 missing_namespace_deps = optarg;
2181 break;
2182 default:
2183 exit(1);
2184 }
2185 }
2186
2187 check_host_endian();
2188
2189 list_for_each_entry_safe(dl, dl2, &dump_lists, list) {
2190 read_dump(dl->file);
2191 list_del(&dl->list);
2192 free(dl);
2193 }
2194
2195 while (optind < argc)
2196 read_symbols(argv[optind++]);
2197
2198 if (files_source)
2199 read_symbols_from_files(files_source);
2200
2201 list_for_each_entry(mod, &modules, list) {
2202 if (mod->from_dump || mod->is_vmlinux)
2203 continue;
2204
2205 check_modname_len(mod);
2206 check_exports(mod);
2207 }
2208
2209 if (unused_exports_white_list)
2210 handle_white_list_exports(unused_exports_white_list);
2211
2212 list_for_each_entry(mod, &modules, list) {
2213 if (mod->from_dump)
2214 continue;
2215
2216 if (mod->is_vmlinux)
2217 write_vmlinux_export_c_file(mod);
2218 else
2219 write_mod_c_file(mod);
2220 }
2221
2222 if (missing_namespace_deps)
2223 write_namespace_deps_files(missing_namespace_deps);
2224
2225 if (dump_write)
2226 write_dump(dump_write);
2227 if (sec_mismatch_count && !sec_mismatch_warn_only)
2228 error("Section mismatches detected.\n"
2229 "Set CONFIG_SECTION_MISMATCH_WARN_ONLY=y to allow them.\n");
2230
2231 if (nr_unresolved > MAX_UNRESOLVED_REPORTS)
2232 warn("suppressed %u unresolved symbol warnings because there were too many)\n",
2233 nr_unresolved - MAX_UNRESOLVED_REPORTS);
2234
2235 return error_occurred ? 1 : 0;
2236 }
2237