xref: /linux/scripts/mod/modpost.c (revision 224e74511041c2d33dcf24adf54d447eb72399c8)
1 /* Postprocess module symbol versions
2  *
3  * Copyright 2003       Kai Germaschewski
4  * Copyright 2002-2004  Rusty Russell, IBM Corporation
5  * Copyright 2006-2008  Sam Ravnborg
6  * Based in part on module-init-tools/depmod.c,file2alias
7  *
8  * This software may be used and distributed according to the terms
9  * of the GNU General Public License, incorporated herein by reference.
10  *
11  * Usage: modpost vmlinux module1.o module2.o ...
12  */
13 
14 #define _GNU_SOURCE
15 #include <elf.h>
16 #include <fnmatch.h>
17 #include <stdio.h>
18 #include <ctype.h>
19 #include <string.h>
20 #include <limits.h>
21 #include <stdbool.h>
22 #include <errno.h>
23 
24 #include <hash.h>
25 #include <hashtable.h>
26 #include <list.h>
27 #include <xalloc.h>
28 #include "modpost.h"
29 #include "../../include/linux/license.h"
30 
31 static bool module_enabled;
32 /* Are we using CONFIG_MODVERSIONS? */
33 static bool modversions;
34 /* Is CONFIG_MODULE_SRCVERSION_ALL set? */
35 static bool all_versions;
36 /* Is CONFIG_BASIC_MODVERSIONS set? */
37 static bool basic_modversions;
38 /* Is CONFIG_EXTENDED_MODVERSIONS set? */
39 static bool extended_modversions;
40 /* If we are modposting external module set to 1 */
41 static bool external_module;
42 /* Only warn about unresolved symbols */
43 static bool warn_unresolved;
44 
45 static int sec_mismatch_count;
46 static bool sec_mismatch_warn_only = true;
47 /* Trim EXPORT_SYMBOLs that are unused by in-tree modules */
48 static bool trim_unused_exports;
49 
50 /* ignore missing files */
51 static bool ignore_missing_files;
52 /* If set to 1, only warn (instead of error) about missing ns imports */
53 static bool allow_missing_ns_imports;
54 
55 static bool error_occurred;
56 
57 static bool extra_warn;
58 
59 bool target_is_big_endian;
60 bool host_is_big_endian;
61 
62 /*
63  * Cut off the warnings when there are too many. This typically occurs when
64  * vmlinux is missing. ('make modules' without building vmlinux.)
65  */
66 #define MAX_UNRESOLVED_REPORTS	10
67 static unsigned int nr_unresolved;
68 
69 /* In kernel, this size is defined in linux/module.h;
70  * here we use Elf_Addr instead of long for covering cross-compile
71  */
72 
73 #define MODULE_NAME_LEN (64 - sizeof(Elf_Addr))
74 
75 void modpost_log(bool is_error, const char *fmt, ...)
76 {
77 	va_list arglist;
78 
79 	if (is_error) {
80 		fprintf(stderr, "ERROR: ");
81 		error_occurred = true;
82 	} else {
83 		fprintf(stderr, "WARNING: ");
84 	}
85 
86 	fprintf(stderr, "modpost: ");
87 
88 	va_start(arglist, fmt);
89 	vfprintf(stderr, fmt, arglist);
90 	va_end(arglist);
91 }
92 
93 static inline bool strends(const char *str, const char *postfix)
94 {
95 	if (strlen(str) < strlen(postfix))
96 		return false;
97 
98 	return strcmp(str + strlen(str) - strlen(postfix), postfix) == 0;
99 }
100 
101 char *read_text_file(const char *filename)
102 {
103 	struct stat st;
104 	size_t nbytes;
105 	int fd;
106 	char *buf;
107 
108 	fd = open(filename, O_RDONLY);
109 	if (fd < 0) {
110 		perror(filename);
111 		exit(1);
112 	}
113 
114 	if (fstat(fd, &st) < 0) {
115 		perror(filename);
116 		exit(1);
117 	}
118 
119 	buf = xmalloc(st.st_size + 1);
120 
121 	nbytes = st.st_size;
122 
123 	while (nbytes) {
124 		ssize_t bytes_read;
125 
126 		bytes_read = read(fd, buf, nbytes);
127 		if (bytes_read < 0) {
128 			perror(filename);
129 			exit(1);
130 		}
131 
132 		nbytes -= bytes_read;
133 	}
134 	buf[st.st_size] = '\0';
135 
136 	close(fd);
137 
138 	return buf;
139 }
140 
141 char *get_line(char **stringp)
142 {
143 	char *orig = *stringp, *next;
144 
145 	/* do not return the unwanted extra line at EOF */
146 	if (!orig || *orig == '\0')
147 		return NULL;
148 
149 	/* don't use strsep here, it is not available everywhere */
150 	next = strchr(orig, '\n');
151 	if (next)
152 		*next++ = '\0';
153 
154 	*stringp = next;
155 
156 	return orig;
157 }
158 
159 /* A list of all modules we processed */
160 LIST_HEAD(modules);
161 
162 static struct module *find_module(const char *filename, const char *modname)
163 {
164 	struct module *mod;
165 
166 	list_for_each_entry(mod, &modules, list) {
167 		if (!strcmp(mod->dump_file, filename) &&
168 		    !strcmp(mod->name, modname))
169 			return mod;
170 	}
171 	return NULL;
172 }
173 
174 static struct module *new_module(const char *name, size_t namelen)
175 {
176 	struct module *mod;
177 
178 	mod = xmalloc(sizeof(*mod) + namelen + 1);
179 	memset(mod, 0, sizeof(*mod));
180 
181 	INIT_LIST_HEAD(&mod->exported_symbols);
182 	INIT_LIST_HEAD(&mod->unresolved_symbols);
183 	INIT_LIST_HEAD(&mod->missing_namespaces);
184 	INIT_LIST_HEAD(&mod->imported_namespaces);
185 	INIT_LIST_HEAD(&mod->aliases);
186 
187 	memcpy(mod->name, name, namelen);
188 	mod->name[namelen] = '\0';
189 	mod->is_vmlinux = (strcmp(mod->name, "vmlinux") == 0);
190 
191 	/*
192 	 * Set mod->is_gpl_compatible to true by default. If MODULE_LICENSE()
193 	 * is missing, do not check the use for EXPORT_SYMBOL_GPL() because
194 	 * modpost will exit with an error anyway.
195 	 */
196 	mod->is_gpl_compatible = true;
197 
198 	list_add_tail(&mod->list, &modules);
199 
200 	return mod;
201 }
202 
203 struct symbol {
204 	struct hlist_node hnode;/* link to hash table */
205 	struct list_head list;	/* link to module::exported_symbols or module::unresolved_symbols */
206 	struct module *module;
207 	char *namespace;
208 	unsigned int crc;
209 	bool crc_valid;
210 	bool weak;
211 	bool is_func;
212 	bool is_gpl_only;	/* exported by EXPORT_SYMBOL_GPL */
213 	bool used;		/* there exists a user of this symbol */
214 	char name[];
215 };
216 
217 static HASHTABLE_DEFINE(symbol_hashtable, 1U << 10);
218 
219 /**
220  * Allocate a new symbols for use in the hash of exported symbols or
221  * the list of unresolved symbols per module
222  **/
223 static struct symbol *alloc_symbol(const char *name)
224 {
225 	struct symbol *s = xmalloc(sizeof(*s) + strlen(name) + 1);
226 
227 	memset(s, 0, sizeof(*s));
228 	strcpy(s->name, name);
229 
230 	return s;
231 }
232 
233 /* For the hash of exported symbols */
234 static void hash_add_symbol(struct symbol *sym)
235 {
236 	hash_add(symbol_hashtable, &sym->hnode, hash_str(sym->name));
237 }
238 
239 static void sym_add_unresolved(const char *name, struct module *mod, bool weak)
240 {
241 	struct symbol *sym;
242 
243 	sym = alloc_symbol(name);
244 	sym->weak = weak;
245 
246 	list_add_tail(&sym->list, &mod->unresolved_symbols);
247 }
248 
249 static struct symbol *sym_find_with_module(const char *name, struct module *mod)
250 {
251 	struct symbol *s;
252 
253 	/* For our purposes, .foo matches foo.  PPC64 needs this. */
254 	if (name[0] == '.')
255 		name++;
256 
257 	hash_for_each_possible(symbol_hashtable, s, hnode, hash_str(name)) {
258 		if (strcmp(s->name, name) == 0 && (!mod || s->module == mod))
259 			return s;
260 	}
261 	return NULL;
262 }
263 
264 static struct symbol *find_symbol(const char *name)
265 {
266 	return sym_find_with_module(name, NULL);
267 }
268 
269 struct namespace_list {
270 	struct list_head list;
271 	char namespace[];
272 };
273 
274 static bool contains_namespace(struct list_head *head, const char *namespace)
275 {
276 	struct namespace_list *list;
277 
278 	/*
279 	 * The default namespace is null string "", which is always implicitly
280 	 * contained.
281 	 */
282 	if (!namespace[0])
283 		return true;
284 
285 	list_for_each_entry(list, head, list) {
286 		if (!strcmp(list->namespace, namespace))
287 			return true;
288 	}
289 
290 	return false;
291 }
292 
293 static void add_namespace(struct list_head *head, const char *namespace)
294 {
295 	struct namespace_list *ns_entry;
296 
297 	if (!contains_namespace(head, namespace)) {
298 		ns_entry = xmalloc(sizeof(*ns_entry) + strlen(namespace) + 1);
299 		strcpy(ns_entry->namespace, namespace);
300 		list_add_tail(&ns_entry->list, head);
301 	}
302 }
303 
304 static void *sym_get_data_by_offset(const struct elf_info *info,
305 				    unsigned int secindex, unsigned long offset)
306 {
307 	Elf_Shdr *sechdr = &info->sechdrs[secindex];
308 
309 	return (void *)info->hdr + sechdr->sh_offset + offset;
310 }
311 
312 void *sym_get_data(const struct elf_info *info, const Elf_Sym *sym)
313 {
314 	return sym_get_data_by_offset(info, get_secindex(info, sym),
315 				      sym->st_value);
316 }
317 
318 static const char *sech_name(const struct elf_info *info, Elf_Shdr *sechdr)
319 {
320 	return sym_get_data_by_offset(info, info->secindex_strings,
321 				      sechdr->sh_name);
322 }
323 
324 static const char *sec_name(const struct elf_info *info, unsigned int secindex)
325 {
326 	/*
327 	 * If sym->st_shndx is a special section index, there is no
328 	 * corresponding section header.
329 	 * Return "" if the index is out of range of info->sechdrs[] array.
330 	 */
331 	if (secindex >= info->num_sections)
332 		return "";
333 
334 	return sech_name(info, &info->sechdrs[secindex]);
335 }
336 
337 static struct symbol *sym_add_exported(const char *name, struct module *mod,
338 				       bool gpl_only, const char *namespace)
339 {
340 	struct symbol *s = find_symbol(name);
341 
342 	if (s && (!external_module || s->module->is_vmlinux || s->module == mod)) {
343 		error("%s: '%s' exported twice. Previous export was in %s%s\n",
344 		      mod->name, name, s->module->name,
345 		      s->module->is_vmlinux ? "" : ".ko");
346 	}
347 
348 	s = alloc_symbol(name);
349 	s->module = mod;
350 	s->is_gpl_only = gpl_only;
351 	s->namespace = xstrdup(namespace);
352 	list_add_tail(&s->list, &mod->exported_symbols);
353 	hash_add_symbol(s);
354 
355 	return s;
356 }
357 
358 static void sym_set_crc(struct symbol *sym, unsigned int crc)
359 {
360 	sym->crc = crc;
361 	sym->crc_valid = true;
362 }
363 
364 static void *grab_file(const char *filename, size_t *size)
365 {
366 	struct stat st;
367 	void *map = MAP_FAILED;
368 	int fd;
369 
370 	fd = open(filename, O_RDONLY);
371 	if (fd < 0)
372 		return NULL;
373 	if (fstat(fd, &st))
374 		goto failed;
375 
376 	*size = st.st_size;
377 	map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
378 
379 failed:
380 	close(fd);
381 	if (map == MAP_FAILED)
382 		return NULL;
383 	return map;
384 }
385 
386 static void release_file(void *file, size_t size)
387 {
388 	munmap(file, size);
389 }
390 
391 static int parse_elf(struct elf_info *info, const char *filename)
392 {
393 	unsigned int i;
394 	Elf_Ehdr *hdr;
395 	Elf_Shdr *sechdrs;
396 	Elf_Sym  *sym;
397 	const char *secstrings;
398 	unsigned int symtab_idx = ~0U, symtab_shndx_idx = ~0U;
399 
400 	hdr = grab_file(filename, &info->size);
401 	if (!hdr) {
402 		if (ignore_missing_files) {
403 			fprintf(stderr, "%s: %s (ignored)\n", filename,
404 				strerror(errno));
405 			return 0;
406 		}
407 		perror(filename);
408 		exit(1);
409 	}
410 	info->hdr = hdr;
411 	if (info->size < sizeof(*hdr)) {
412 		/* file too small, assume this is an empty .o file */
413 		return 0;
414 	}
415 	/* Is this a valid ELF file? */
416 	if ((hdr->e_ident[EI_MAG0] != ELFMAG0) ||
417 	    (hdr->e_ident[EI_MAG1] != ELFMAG1) ||
418 	    (hdr->e_ident[EI_MAG2] != ELFMAG2) ||
419 	    (hdr->e_ident[EI_MAG3] != ELFMAG3)) {
420 		/* Not an ELF file - silently ignore it */
421 		return 0;
422 	}
423 
424 	switch (hdr->e_ident[EI_DATA]) {
425 	case ELFDATA2LSB:
426 		target_is_big_endian = false;
427 		break;
428 	case ELFDATA2MSB:
429 		target_is_big_endian = true;
430 		break;
431 	default:
432 		fatal("target endian is unknown\n");
433 	}
434 
435 	/* Fix endianness in ELF header */
436 	hdr->e_type      = TO_NATIVE(hdr->e_type);
437 	hdr->e_machine   = TO_NATIVE(hdr->e_machine);
438 	hdr->e_version   = TO_NATIVE(hdr->e_version);
439 	hdr->e_entry     = TO_NATIVE(hdr->e_entry);
440 	hdr->e_phoff     = TO_NATIVE(hdr->e_phoff);
441 	hdr->e_shoff     = TO_NATIVE(hdr->e_shoff);
442 	hdr->e_flags     = TO_NATIVE(hdr->e_flags);
443 	hdr->e_ehsize    = TO_NATIVE(hdr->e_ehsize);
444 	hdr->e_phentsize = TO_NATIVE(hdr->e_phentsize);
445 	hdr->e_phnum     = TO_NATIVE(hdr->e_phnum);
446 	hdr->e_shentsize = TO_NATIVE(hdr->e_shentsize);
447 	hdr->e_shnum     = TO_NATIVE(hdr->e_shnum);
448 	hdr->e_shstrndx  = TO_NATIVE(hdr->e_shstrndx);
449 	sechdrs = (void *)hdr + hdr->e_shoff;
450 	info->sechdrs = sechdrs;
451 
452 	/* modpost only works for relocatable objects */
453 	if (hdr->e_type != ET_REL)
454 		fatal("%s: not relocatable object.", filename);
455 
456 	/* Check if file offset is correct */
457 	if (hdr->e_shoff > info->size)
458 		fatal("section header offset=%lu in file '%s' is bigger than filesize=%zu\n",
459 		      (unsigned long)hdr->e_shoff, filename, info->size);
460 
461 	if (hdr->e_shnum == SHN_UNDEF) {
462 		/*
463 		 * There are more than 64k sections,
464 		 * read count from .sh_size.
465 		 */
466 		info->num_sections = TO_NATIVE(sechdrs[0].sh_size);
467 	}
468 	else {
469 		info->num_sections = hdr->e_shnum;
470 	}
471 	if (hdr->e_shstrndx == SHN_XINDEX) {
472 		info->secindex_strings = TO_NATIVE(sechdrs[0].sh_link);
473 	}
474 	else {
475 		info->secindex_strings = hdr->e_shstrndx;
476 	}
477 
478 	/* Fix endianness in section headers */
479 	for (i = 0; i < info->num_sections; i++) {
480 		sechdrs[i].sh_name      = TO_NATIVE(sechdrs[i].sh_name);
481 		sechdrs[i].sh_type      = TO_NATIVE(sechdrs[i].sh_type);
482 		sechdrs[i].sh_flags     = TO_NATIVE(sechdrs[i].sh_flags);
483 		sechdrs[i].sh_addr      = TO_NATIVE(sechdrs[i].sh_addr);
484 		sechdrs[i].sh_offset    = TO_NATIVE(sechdrs[i].sh_offset);
485 		sechdrs[i].sh_size      = TO_NATIVE(sechdrs[i].sh_size);
486 		sechdrs[i].sh_link      = TO_NATIVE(sechdrs[i].sh_link);
487 		sechdrs[i].sh_info      = TO_NATIVE(sechdrs[i].sh_info);
488 		sechdrs[i].sh_addralign = TO_NATIVE(sechdrs[i].sh_addralign);
489 		sechdrs[i].sh_entsize   = TO_NATIVE(sechdrs[i].sh_entsize);
490 	}
491 	/* Find symbol table. */
492 	secstrings = (void *)hdr + sechdrs[info->secindex_strings].sh_offset;
493 	for (i = 1; i < info->num_sections; i++) {
494 		const char *secname;
495 		int nobits = sechdrs[i].sh_type == SHT_NOBITS;
496 
497 		if (!nobits && sechdrs[i].sh_offset > info->size)
498 			fatal("%s is truncated. sechdrs[i].sh_offset=%lu > sizeof(*hrd)=%zu\n",
499 			      filename, (unsigned long)sechdrs[i].sh_offset,
500 			      sizeof(*hdr));
501 
502 		secname = secstrings + sechdrs[i].sh_name;
503 		if (strcmp(secname, ".modinfo") == 0) {
504 			if (nobits)
505 				fatal("%s has NOBITS .modinfo\n", filename);
506 			info->modinfo = (void *)hdr + sechdrs[i].sh_offset;
507 			info->modinfo_len = sechdrs[i].sh_size;
508 		} else if (!strcmp(secname, ".export_symbol")) {
509 			info->export_symbol_secndx = i;
510 		} else if (!strcmp(secname, ".no_trim_symbol")) {
511 			info->no_trim_symbol = (void *)hdr + sechdrs[i].sh_offset;
512 			info->no_trim_symbol_len = sechdrs[i].sh_size;
513 		}
514 
515 		if (sechdrs[i].sh_type == SHT_SYMTAB) {
516 			unsigned int sh_link_idx;
517 			symtab_idx = i;
518 			info->symtab_start = (void *)hdr +
519 			    sechdrs[i].sh_offset;
520 			info->symtab_stop  = (void *)hdr +
521 			    sechdrs[i].sh_offset + sechdrs[i].sh_size;
522 			sh_link_idx = sechdrs[i].sh_link;
523 			info->strtab       = (void *)hdr +
524 			    sechdrs[sh_link_idx].sh_offset;
525 		}
526 
527 		/* 32bit section no. table? ("more than 64k sections") */
528 		if (sechdrs[i].sh_type == SHT_SYMTAB_SHNDX) {
529 			symtab_shndx_idx = i;
530 			info->symtab_shndx_start = (void *)hdr +
531 			    sechdrs[i].sh_offset;
532 			info->symtab_shndx_stop  = (void *)hdr +
533 			    sechdrs[i].sh_offset + sechdrs[i].sh_size;
534 		}
535 	}
536 	if (!info->symtab_start)
537 		fatal("%s has no symtab?\n", filename);
538 
539 	/* Fix endianness in symbols */
540 	for (sym = info->symtab_start; sym < info->symtab_stop; sym++) {
541 		sym->st_shndx = TO_NATIVE(sym->st_shndx);
542 		sym->st_name  = TO_NATIVE(sym->st_name);
543 		sym->st_value = TO_NATIVE(sym->st_value);
544 		sym->st_size  = TO_NATIVE(sym->st_size);
545 	}
546 
547 	if (symtab_shndx_idx != ~0U) {
548 		Elf32_Word *p;
549 		if (symtab_idx != sechdrs[symtab_shndx_idx].sh_link)
550 			fatal("%s: SYMTAB_SHNDX has bad sh_link: %u!=%u\n",
551 			      filename, sechdrs[symtab_shndx_idx].sh_link,
552 			      symtab_idx);
553 		/* Fix endianness */
554 		for (p = info->symtab_shndx_start; p < info->symtab_shndx_stop;
555 		     p++)
556 			*p = TO_NATIVE(*p);
557 	}
558 
559 	symsearch_init(info);
560 
561 	return 1;
562 }
563 
564 static void parse_elf_finish(struct elf_info *info)
565 {
566 	symsearch_finish(info);
567 	release_file(info->hdr, info->size);
568 }
569 
570 static int ignore_undef_symbol(struct elf_info *info, const char *symname)
571 {
572 	/* ignore __this_module, it will be resolved shortly */
573 	if (strcmp(symname, "__this_module") == 0)
574 		return 1;
575 	/* ignore global offset table */
576 	if (strcmp(symname, "_GLOBAL_OFFSET_TABLE_") == 0)
577 		return 1;
578 	if (info->hdr->e_machine == EM_PPC)
579 		/* Special register function linked on all modules during final link of .ko */
580 		if (strstarts(symname, "_restgpr_") ||
581 		    strstarts(symname, "_savegpr_") ||
582 		    strstarts(symname, "_rest32gpr_") ||
583 		    strstarts(symname, "_save32gpr_") ||
584 		    strstarts(symname, "_restvr_") ||
585 		    strstarts(symname, "_savevr_"))
586 			return 1;
587 	if (info->hdr->e_machine == EM_PPC64)
588 		/* Special register function linked on all modules during final link of .ko */
589 		if (strstarts(symname, "_restgpr0_") ||
590 		    strstarts(symname, "_savegpr0_") ||
591 		    strstarts(symname, "_restvr_") ||
592 		    strstarts(symname, "_savevr_") ||
593 		    strcmp(symname, ".TOC.") == 0)
594 			return 1;
595 	/* Do not ignore this symbol */
596 	return 0;
597 }
598 
599 static void handle_symbol(struct module *mod, struct elf_info *info,
600 			  const Elf_Sym *sym, const char *symname)
601 {
602 	switch (sym->st_shndx) {
603 	case SHN_COMMON:
604 		if (strstarts(symname, "__gnu_lto_")) {
605 			/* Should warn here, but modpost runs before the linker */
606 		} else
607 			warn("\"%s\" [%s] is COMMON symbol\n", symname, mod->name);
608 		break;
609 	case SHN_UNDEF:
610 		/* undefined symbol */
611 		if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
612 		    ELF_ST_BIND(sym->st_info) != STB_WEAK)
613 			break;
614 		if (ignore_undef_symbol(info, symname))
615 			break;
616 		if (info->hdr->e_machine == EM_SPARC ||
617 		    info->hdr->e_machine == EM_SPARCV9) {
618 			/* Ignore register directives. */
619 			if (ELF_ST_TYPE(sym->st_info) == STT_SPARC_REGISTER)
620 				break;
621 			if (symname[0] == '.') {
622 				char *munged = xstrdup(symname);
623 				munged[0] = '_';
624 				munged[1] = toupper(munged[1]);
625 				symname = munged;
626 			}
627 		}
628 
629 		sym_add_unresolved(symname, mod,
630 				   ELF_ST_BIND(sym->st_info) == STB_WEAK);
631 		break;
632 	default:
633 		if (strcmp(symname, "init_module") == 0)
634 			mod->has_init = true;
635 		if (strcmp(symname, "cleanup_module") == 0)
636 			mod->has_cleanup = true;
637 		break;
638 	}
639 }
640 
641 /**
642  * Parse tag=value strings from .modinfo section
643  **/
644 static char *next_string(char *string, unsigned long *secsize)
645 {
646 	/* Skip non-zero chars */
647 	while (string[0]) {
648 		string++;
649 		if ((*secsize)-- <= 1)
650 			return NULL;
651 	}
652 
653 	/* Skip any zero padding. */
654 	while (!string[0]) {
655 		string++;
656 		if ((*secsize)-- <= 1)
657 			return NULL;
658 	}
659 	return string;
660 }
661 
662 static char *get_next_modinfo(struct elf_info *info, const char *tag,
663 			      char *prev)
664 {
665 	char *p;
666 	unsigned int taglen = strlen(tag);
667 	char *modinfo = info->modinfo;
668 	unsigned long size = info->modinfo_len;
669 
670 	if (prev) {
671 		size -= prev - modinfo;
672 		modinfo = next_string(prev, &size);
673 	}
674 
675 	for (p = modinfo; p; p = next_string(p, &size)) {
676 		if (strncmp(p, tag, taglen) == 0 && p[taglen] == '=')
677 			return p + taglen + 1;
678 	}
679 	return NULL;
680 }
681 
682 static char *get_modinfo(struct elf_info *info, const char *tag)
683 
684 {
685 	return get_next_modinfo(info, tag, NULL);
686 }
687 
688 static const char *sym_name(struct elf_info *elf, Elf_Sym *sym)
689 {
690 	return sym ? elf->strtab + sym->st_name : "";
691 }
692 
693 /*
694  * Check whether the 'string' argument matches one of the 'patterns',
695  * an array of shell wildcard patterns (glob).
696  *
697  * Return true is there is a match.
698  */
699 static bool match(const char *string, const char *const patterns[])
700 {
701 	const char *pattern;
702 
703 	while ((pattern = *patterns++)) {
704 		if (!fnmatch(pattern, string, 0))
705 			return true;
706 	}
707 
708 	return false;
709 }
710 
711 /* useful to pass patterns to match() directly */
712 #define PATTERNS(...) \
713 	({ \
714 		static const char *const patterns[] = {__VA_ARGS__, NULL}; \
715 		patterns; \
716 	})
717 
718 /* sections that we do not want to do full section mismatch check on */
719 static const char *const section_white_list[] =
720 {
721 	".comment*",
722 	".debug*",
723 	".zdebug*",		/* Compressed debug sections. */
724 	".GCC.command.line",	/* record-gcc-switches */
725 	".mdebug*",        /* alpha, score, mips etc. */
726 	".pdr",            /* alpha, score, mips etc. */
727 	".stab*",
728 	".note*",
729 	".got*",
730 	".toc*",
731 	".xt.prop",				 /* xtensa */
732 	".xt.lit",         /* xtensa */
733 	".arcextmap*",			/* arc */
734 	".gnu.linkonce.arcext*",	/* arc : modules */
735 	".cmem*",			/* EZchip */
736 	".fmt_slot*",			/* EZchip */
737 	".gnu.lto*",
738 	".discard.*",
739 	".llvm.call-graph-profile",	/* call graph */
740 	NULL
741 };
742 
743 /*
744  * This is used to find sections missing the SHF_ALLOC flag.
745  * The cause of this is often a section specified in assembler
746  * without "ax" / "aw".
747  */
748 static void check_section(const char *modname, struct elf_info *elf,
749 			  Elf_Shdr *sechdr)
750 {
751 	const char *sec = sech_name(elf, sechdr);
752 
753 	if (sechdr->sh_type == SHT_PROGBITS &&
754 	    !(sechdr->sh_flags & SHF_ALLOC) &&
755 	    !match(sec, section_white_list)) {
756 		warn("%s (%s): unexpected non-allocatable section.\n"
757 		     "Did you forget to use \"ax\"/\"aw\" in a .S file?\n"
758 		     "Note that for example <linux/init.h> contains\n"
759 		     "section definitions for use in .S files.\n\n",
760 		     modname, sec);
761 	}
762 }
763 
764 
765 
766 #define ALL_INIT_DATA_SECTIONS \
767 	".init.setup", ".init.rodata", ".init.data"
768 
769 #define ALL_PCI_INIT_SECTIONS	\
770 	".pci_fixup_early", ".pci_fixup_header", ".pci_fixup_final", \
771 	".pci_fixup_enable", ".pci_fixup_resume", \
772 	".pci_fixup_resume_early", ".pci_fixup_suspend"
773 
774 #define ALL_INIT_SECTIONS ".init.*"
775 #define ALL_EXIT_SECTIONS ".exit.*"
776 
777 #define DATA_SECTIONS ".data", ".data.rel"
778 #define TEXT_SECTIONS ".text", ".text.*", ".sched.text", \
779 		".kprobes.text", ".cpuidle.text", ".noinstr.text", \
780 		".ltext", ".ltext.*"
781 #define OTHER_TEXT_SECTIONS ".ref.text", ".head.text", ".spinlock.text", \
782 		".fixup", ".entry.text", ".exception.text", \
783 		".coldtext", ".softirqentry.text", ".irqentry.text"
784 
785 #define ALL_TEXT_SECTIONS  ".init.text", ".exit.text", \
786 		TEXT_SECTIONS, OTHER_TEXT_SECTIONS
787 
788 enum mismatch {
789 	TEXTDATA_TO_ANY_INIT_EXIT,
790 	XXXINIT_TO_SOME_INIT,
791 	ANY_INIT_TO_ANY_EXIT,
792 	ANY_EXIT_TO_ANY_INIT,
793 	EXTABLE_TO_NON_TEXT,
794 };
795 
796 /**
797  * Describe how to match sections on different criteria:
798  *
799  * @fromsec: Array of sections to be matched.
800  *
801  * @bad_tosec: Relocations applied to a section in @fromsec to a section in
802  * this array is forbidden (black-list).  Can be empty.
803  *
804  * @good_tosec: Relocations applied to a section in @fromsec must be
805  * targeting sections in this array (white-list).  Can be empty.
806  *
807  * @mismatch: Type of mismatch.
808  */
809 struct sectioncheck {
810 	const char *fromsec[20];
811 	const char *bad_tosec[20];
812 	const char *good_tosec[20];
813 	enum mismatch mismatch;
814 };
815 
816 static const struct sectioncheck sectioncheck[] = {
817 /* Do not reference init/exit code/data from
818  * normal code and data
819  */
820 {
821 	.fromsec = { TEXT_SECTIONS, DATA_SECTIONS, NULL },
822 	.bad_tosec = { ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS, NULL },
823 	.mismatch = TEXTDATA_TO_ANY_INIT_EXIT,
824 },
825 /* Do not use exit code/data from init code */
826 {
827 	.fromsec = { ALL_INIT_SECTIONS, NULL },
828 	.bad_tosec = { ALL_EXIT_SECTIONS, NULL },
829 	.mismatch = ANY_INIT_TO_ANY_EXIT,
830 },
831 /* Do not use init code/data from exit code */
832 {
833 	.fromsec = { ALL_EXIT_SECTIONS, NULL },
834 	.bad_tosec = { ALL_INIT_SECTIONS, NULL },
835 	.mismatch = ANY_EXIT_TO_ANY_INIT,
836 },
837 {
838 	.fromsec = { ALL_PCI_INIT_SECTIONS, NULL },
839 	.bad_tosec = { ALL_INIT_SECTIONS, NULL },
840 	.mismatch = ANY_INIT_TO_ANY_EXIT,
841 },
842 {
843 	.fromsec = { "__ex_table", NULL },
844 	/* If you're adding any new black-listed sections in here, consider
845 	 * adding a special 'printer' for them in scripts/check_extable.
846 	 */
847 	.bad_tosec = { ".altinstr_replacement", NULL },
848 	.good_tosec = {ALL_TEXT_SECTIONS , NULL},
849 	.mismatch = EXTABLE_TO_NON_TEXT,
850 }
851 };
852 
853 static const struct sectioncheck *section_mismatch(
854 		const char *fromsec, const char *tosec)
855 {
856 	int i;
857 
858 	/*
859 	 * The target section could be the SHT_NUL section when we're
860 	 * handling relocations to un-resolved symbols, trying to match it
861 	 * doesn't make much sense and causes build failures on parisc
862 	 * architectures.
863 	 */
864 	if (*tosec == '\0')
865 		return NULL;
866 
867 	for (i = 0; i < ARRAY_SIZE(sectioncheck); i++) {
868 		const struct sectioncheck *check = &sectioncheck[i];
869 
870 		if (match(fromsec, check->fromsec)) {
871 			if (check->bad_tosec[0] && match(tosec, check->bad_tosec))
872 				return check;
873 			if (check->good_tosec[0] && !match(tosec, check->good_tosec))
874 				return check;
875 		}
876 	}
877 	return NULL;
878 }
879 
880 /**
881  * Whitelist to allow certain references to pass with no warning.
882  *
883  * Pattern 1:
884  *   If a module parameter is declared __initdata and permissions=0
885  *   then this is legal despite the warning generated.
886  *   We cannot see value of permissions here, so just ignore
887  *   this pattern.
888  *   The pattern is identified by:
889  *   tosec   = .init.data
890  *   fromsec = .data*
891  *   atsym   =__param*
892  *
893  * Pattern 1a:
894  *   module_param_call() ops can refer to __init set function if permissions=0
895  *   The pattern is identified by:
896  *   tosec   = .init.text
897  *   fromsec = .data*
898  *   atsym   = __param_ops_*
899  *
900  * Pattern 3:
901  *   Whitelist all references from .head.text to any init section
902  *
903  * Pattern 4:
904  *   Some symbols belong to init section but still it is ok to reference
905  *   these from non-init sections as these symbols don't have any memory
906  *   allocated for them and symbol address and value are same. So even
907  *   if init section is freed, its ok to reference those symbols.
908  *   For ex. symbols marking the init section boundaries.
909  *   This pattern is identified by
910  *   refsymname = __init_begin, _sinittext, _einittext
911  *
912  * Pattern 5:
913  *   GCC may optimize static inlines when fed constant arg(s) resulting
914  *   in functions like cpumask_empty() -- generating an associated symbol
915  *   cpumask_empty.constprop.3 that appears in the audit.  If the const that
916  *   is passed in comes from __init, like say nmi_ipi_mask, we get a
917  *   meaningless section warning.  May need to add isra symbols too...
918  *   This pattern is identified by
919  *   tosec   = init section
920  *   fromsec = text section
921  *   refsymname = *.constprop.*
922  *
923  **/
924 static int secref_whitelist(const char *fromsec, const char *fromsym,
925 			    const char *tosec, const char *tosym)
926 {
927 	/* Check for pattern 1 */
928 	if (match(tosec, PATTERNS(ALL_INIT_DATA_SECTIONS)) &&
929 	    match(fromsec, PATTERNS(DATA_SECTIONS)) &&
930 	    strstarts(fromsym, "__param"))
931 		return 0;
932 
933 	/* Check for pattern 1a */
934 	if (strcmp(tosec, ".init.text") == 0 &&
935 	    match(fromsec, PATTERNS(DATA_SECTIONS)) &&
936 	    strstarts(fromsym, "__param_ops_"))
937 		return 0;
938 
939 	/* symbols in data sections that may refer to any init/exit sections */
940 	if (match(fromsec, PATTERNS(DATA_SECTIONS)) &&
941 	    match(tosec, PATTERNS(ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS)) &&
942 	    match(fromsym, PATTERNS("*_ops", "*_probe", "*_console")))
943 		return 0;
944 
945 	/* Check for pattern 3 */
946 	if (strstarts(fromsec, ".head.text") &&
947 	    match(tosec, PATTERNS(ALL_INIT_SECTIONS)))
948 		return 0;
949 
950 	/* Check for pattern 4 */
951 	if (match(tosym, PATTERNS("__init_begin", "_sinittext", "_einittext")))
952 		return 0;
953 
954 	/* Check for pattern 5 */
955 	if (match(fromsec, PATTERNS(ALL_TEXT_SECTIONS)) &&
956 	    match(tosec, PATTERNS(ALL_INIT_SECTIONS)) &&
957 	    match(fromsym, PATTERNS("*.constprop.*")))
958 		return 0;
959 
960 	return 1;
961 }
962 
963 static Elf_Sym *find_fromsym(struct elf_info *elf, Elf_Addr addr,
964 			     unsigned int secndx)
965 {
966 	return symsearch_find_nearest(elf, addr, secndx, false, ~0);
967 }
968 
969 static Elf_Sym *find_tosym(struct elf_info *elf, Elf_Addr addr, Elf_Sym *sym)
970 {
971 	Elf_Sym *new_sym;
972 
973 	/* If the supplied symbol has a valid name, return it */
974 	if (is_valid_name(elf, sym))
975 		return sym;
976 
977 	/*
978 	 * Strive to find a better symbol name, but the resulting name may not
979 	 * match the symbol referenced in the original code.
980 	 */
981 	new_sym = symsearch_find_nearest(elf, addr, get_secindex(elf, sym),
982 					 true, 20);
983 	return new_sym ? new_sym : sym;
984 }
985 
986 static bool is_executable_section(struct elf_info *elf, unsigned int secndx)
987 {
988 	if (secndx >= elf->num_sections)
989 		return false;
990 
991 	return (elf->sechdrs[secndx].sh_flags & SHF_EXECINSTR) != 0;
992 }
993 
994 static void default_mismatch_handler(const char *modname, struct elf_info *elf,
995 				     const struct sectioncheck* const mismatch,
996 				     Elf_Sym *tsym,
997 				     unsigned int fsecndx, const char *fromsec, Elf_Addr faddr,
998 				     const char *tosec, Elf_Addr taddr)
999 {
1000 	Elf_Sym *from;
1001 	const char *tosym;
1002 	const char *fromsym;
1003 	char taddr_str[16];
1004 
1005 	from = find_fromsym(elf, faddr, fsecndx);
1006 	fromsym = sym_name(elf, from);
1007 
1008 	tsym = find_tosym(elf, taddr, tsym);
1009 	tosym = sym_name(elf, tsym);
1010 
1011 	/* check whitelist - we may ignore it */
1012 	if (!secref_whitelist(fromsec, fromsym, tosec, tosym))
1013 		return;
1014 
1015 	sec_mismatch_count++;
1016 
1017 	if (!tosym[0])
1018 		snprintf(taddr_str, sizeof(taddr_str), "0x%x", (unsigned int)taddr);
1019 
1020 	/*
1021 	 * The format for the reference source:      <symbol_name>+<offset> or <address>
1022 	 * The format for the reference destination: <symbol_name>          or <address>
1023 	 */
1024 	warn("%s: section mismatch in reference: %s%s0x%x (section: %s) -> %s (section: %s)\n",
1025 	     modname, fromsym, fromsym[0] ? "+" : "",
1026 	     (unsigned int)(faddr - (fromsym[0] ? from->st_value : 0)),
1027 	     fromsec, tosym[0] ? tosym : taddr_str, tosec);
1028 
1029 	if (mismatch->mismatch == EXTABLE_TO_NON_TEXT) {
1030 		if (match(tosec, mismatch->bad_tosec))
1031 			fatal("The relocation at %s+0x%lx references\n"
1032 			      "section \"%s\" which is black-listed.\n"
1033 			      "Something is seriously wrong and should be fixed.\n"
1034 			      "You might get more information about where this is\n"
1035 			      "coming from by using scripts/check_extable.sh %s\n",
1036 			      fromsec, (long)faddr, tosec, modname);
1037 		else if (is_executable_section(elf, get_secindex(elf, tsym)))
1038 			warn("The relocation at %s+0x%lx references\n"
1039 			     "section \"%s\" which is not in the list of\n"
1040 			     "authorized sections.  If you're adding a new section\n"
1041 			     "and/or if this reference is valid, add \"%s\" to the\n"
1042 			     "list of authorized sections to jump to on fault.\n"
1043 			     "This can be achieved by adding \"%s\" to\n"
1044 			     "OTHER_TEXT_SECTIONS in scripts/mod/modpost.c.\n",
1045 			     fromsec, (long)faddr, tosec, tosec, tosec);
1046 		else
1047 			error("%s+0x%lx references non-executable section '%s'\n",
1048 			      fromsec, (long)faddr, tosec);
1049 	}
1050 }
1051 
1052 static void check_export_symbol(struct module *mod, struct elf_info *elf,
1053 				Elf_Addr faddr, const char *secname,
1054 				Elf_Sym *sym)
1055 {
1056 	static const char *prefix = "__export_symbol_";
1057 	const char *label_name, *name, *data;
1058 	Elf_Sym *label;
1059 	struct symbol *s;
1060 	bool is_gpl;
1061 
1062 	label = find_fromsym(elf, faddr, elf->export_symbol_secndx);
1063 	label_name = sym_name(elf, label);
1064 
1065 	if (!strstarts(label_name, prefix)) {
1066 		error("%s: .export_symbol section contains strange symbol '%s'\n",
1067 		      mod->name, label_name);
1068 		return;
1069 	}
1070 
1071 	if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL &&
1072 	    ELF_ST_BIND(sym->st_info) != STB_WEAK) {
1073 		error("%s: local symbol '%s' was exported\n", mod->name,
1074 		      label_name + strlen(prefix));
1075 		return;
1076 	}
1077 
1078 	name = sym_name(elf, sym);
1079 	if (strcmp(label_name + strlen(prefix), name)) {
1080 		error("%s: .export_symbol section references '%s', but it does not seem to be an export symbol\n",
1081 		      mod->name, name);
1082 		return;
1083 	}
1084 
1085 	data = sym_get_data(elf, label);	/* license */
1086 	if (!strcmp(data, "GPL")) {
1087 		is_gpl = true;
1088 	} else if (!strcmp(data, "")) {
1089 		is_gpl = false;
1090 	} else {
1091 		error("%s: unknown license '%s' was specified for '%s'\n",
1092 		      mod->name, data, name);
1093 		return;
1094 	}
1095 
1096 	data += strlen(data) + 1;	/* namespace */
1097 	s = sym_add_exported(name, mod, is_gpl, data);
1098 
1099 	/*
1100 	 * We need to be aware whether we are exporting a function or
1101 	 * a data on some architectures.
1102 	 */
1103 	s->is_func = (ELF_ST_TYPE(sym->st_info) == STT_FUNC);
1104 
1105 	/*
1106 	 * For parisc64, symbols prefixed $$ from the library have the symbol type
1107 	 * STT_LOPROC. They should be handled as functions too.
1108 	 */
1109 	if (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64 &&
1110 	    elf->hdr->e_machine == EM_PARISC &&
1111 	    ELF_ST_TYPE(sym->st_info) == STT_LOPROC)
1112 		s->is_func = true;
1113 
1114 	if (match(secname, PATTERNS(ALL_INIT_SECTIONS)))
1115 		warn("%s: %s: EXPORT_SYMBOL used for init symbol. Remove __init or EXPORT_SYMBOL.\n",
1116 		     mod->name, name);
1117 	else if (match(secname, PATTERNS(ALL_EXIT_SECTIONS)))
1118 		warn("%s: %s: EXPORT_SYMBOL used for exit symbol. Remove __exit or EXPORT_SYMBOL.\n",
1119 		     mod->name, name);
1120 }
1121 
1122 static void check_section_mismatch(struct module *mod, struct elf_info *elf,
1123 				   Elf_Sym *sym,
1124 				   unsigned int fsecndx, const char *fromsec,
1125 				   Elf_Addr faddr, Elf_Addr taddr)
1126 {
1127 	const char *tosec = sec_name(elf, get_secindex(elf, sym));
1128 	const struct sectioncheck *mismatch;
1129 
1130 	if (module_enabled && elf->export_symbol_secndx == fsecndx) {
1131 		check_export_symbol(mod, elf, faddr, tosec, sym);
1132 		return;
1133 	}
1134 
1135 	mismatch = section_mismatch(fromsec, tosec);
1136 	if (!mismatch)
1137 		return;
1138 
1139 	default_mismatch_handler(mod->name, elf, mismatch, sym,
1140 				 fsecndx, fromsec, faddr,
1141 				 tosec, taddr);
1142 }
1143 
1144 static Elf_Addr addend_386_rel(uint32_t *location, unsigned int r_type)
1145 {
1146 	switch (r_type) {
1147 	case R_386_32:
1148 		return get_unaligned_native(location);
1149 	case R_386_PC32:
1150 		return get_unaligned_native(location) + 4;
1151 	}
1152 
1153 	return (Elf_Addr)(-1);
1154 }
1155 
1156 static int32_t sign_extend32(int32_t value, int index)
1157 {
1158 	uint8_t shift = 31 - index;
1159 
1160 	return (int32_t)(value << shift) >> shift;
1161 }
1162 
1163 static Elf_Addr addend_arm_rel(void *loc, Elf_Sym *sym, unsigned int r_type)
1164 {
1165 	uint32_t inst, upper, lower, sign, j1, j2;
1166 	int32_t offset;
1167 
1168 	switch (r_type) {
1169 	case R_ARM_ABS32:
1170 	case R_ARM_REL32:
1171 		inst = get_unaligned_native((uint32_t *)loc);
1172 		return inst + sym->st_value;
1173 	case R_ARM_MOVW_ABS_NC:
1174 	case R_ARM_MOVT_ABS:
1175 		inst = get_unaligned_native((uint32_t *)loc);
1176 		offset = sign_extend32(((inst & 0xf0000) >> 4) | (inst & 0xfff),
1177 				       15);
1178 		return offset + sym->st_value;
1179 	case R_ARM_PC24:
1180 	case R_ARM_CALL:
1181 	case R_ARM_JUMP24:
1182 		inst = get_unaligned_native((uint32_t *)loc);
1183 		offset = sign_extend32((inst & 0x00ffffff) << 2, 25);
1184 		return offset + sym->st_value + 8;
1185 	case R_ARM_THM_MOVW_ABS_NC:
1186 	case R_ARM_THM_MOVT_ABS:
1187 		upper = get_unaligned_native((uint16_t *)loc);
1188 		lower = get_unaligned_native((uint16_t *)loc + 1);
1189 		offset = sign_extend32(((upper & 0x000f) << 12) |
1190 				       ((upper & 0x0400) << 1) |
1191 				       ((lower & 0x7000) >> 4) |
1192 				       (lower & 0x00ff),
1193 				       15);
1194 		return offset + sym->st_value;
1195 	case R_ARM_THM_JUMP19:
1196 		/*
1197 		 * Encoding T3:
1198 		 * S     = upper[10]
1199 		 * imm6  = upper[5:0]
1200 		 * J1    = lower[13]
1201 		 * J2    = lower[11]
1202 		 * imm11 = lower[10:0]
1203 		 * imm32 = SignExtend(S:J2:J1:imm6:imm11:'0')
1204 		 */
1205 		upper = get_unaligned_native((uint16_t *)loc);
1206 		lower = get_unaligned_native((uint16_t *)loc + 1);
1207 
1208 		sign = (upper >> 10) & 1;
1209 		j1 = (lower >> 13) & 1;
1210 		j2 = (lower >> 11) & 1;
1211 		offset = sign_extend32((sign << 20) | (j2 << 19) | (j1 << 18) |
1212 				       ((upper & 0x03f) << 12) |
1213 				       ((lower & 0x07ff) << 1),
1214 				       20);
1215 		return offset + sym->st_value + 4;
1216 	case R_ARM_THM_PC22:
1217 	case R_ARM_THM_JUMP24:
1218 		/*
1219 		 * Encoding T4:
1220 		 * S     = upper[10]
1221 		 * imm10 = upper[9:0]
1222 		 * J1    = lower[13]
1223 		 * J2    = lower[11]
1224 		 * imm11 = lower[10:0]
1225 		 * I1    = NOT(J1 XOR S)
1226 		 * I2    = NOT(J2 XOR S)
1227 		 * imm32 = SignExtend(S:I1:I2:imm10:imm11:'0')
1228 		 */
1229 		upper = get_unaligned_native((uint16_t *)loc);
1230 		lower = get_unaligned_native((uint16_t *)loc + 1);
1231 
1232 		sign = (upper >> 10) & 1;
1233 		j1 = (lower >> 13) & 1;
1234 		j2 = (lower >> 11) & 1;
1235 		offset = sign_extend32((sign << 24) |
1236 				       ((~(j1 ^ sign) & 1) << 23) |
1237 				       ((~(j2 ^ sign) & 1) << 22) |
1238 				       ((upper & 0x03ff) << 12) |
1239 				       ((lower & 0x07ff) << 1),
1240 				       24);
1241 		return offset + sym->st_value + 4;
1242 	}
1243 
1244 	return (Elf_Addr)(-1);
1245 }
1246 
1247 static Elf_Addr addend_mips_rel(uint32_t *location, unsigned int r_type)
1248 {
1249 	uint32_t inst;
1250 
1251 	inst = get_unaligned_native(location);
1252 	switch (r_type) {
1253 	case R_MIPS_LO16:
1254 		return inst & 0xffff;
1255 	case R_MIPS_26:
1256 		return (inst & 0x03ffffff) << 2;
1257 	case R_MIPS_32:
1258 		return inst;
1259 	}
1260 	return (Elf_Addr)(-1);
1261 }
1262 
1263 #ifndef EM_RISCV
1264 #define EM_RISCV		243
1265 #endif
1266 
1267 #ifndef R_RISCV_SUB32
1268 #define R_RISCV_SUB32		39
1269 #endif
1270 
1271 #ifndef EM_LOONGARCH
1272 #define EM_LOONGARCH		258
1273 #endif
1274 
1275 #ifndef R_LARCH_SUB32
1276 #define R_LARCH_SUB32		55
1277 #endif
1278 
1279 #ifndef R_LARCH_RELAX
1280 #define R_LARCH_RELAX		100
1281 #endif
1282 
1283 #ifndef R_LARCH_ALIGN
1284 #define R_LARCH_ALIGN		102
1285 #endif
1286 
1287 static void get_rel_type_and_sym(struct elf_info *elf, uint64_t r_info,
1288 				 unsigned int *r_type, unsigned int *r_sym)
1289 {
1290 	typedef struct {
1291 		Elf64_Word    r_sym;	/* Symbol index */
1292 		unsigned char r_ssym;	/* Special symbol for 2nd relocation */
1293 		unsigned char r_type3;	/* 3rd relocation type */
1294 		unsigned char r_type2;	/* 2nd relocation type */
1295 		unsigned char r_type;	/* 1st relocation type */
1296 	} Elf64_Mips_R_Info;
1297 
1298 	bool is_64bit = (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64);
1299 
1300 	if (elf->hdr->e_machine == EM_MIPS && is_64bit) {
1301 		Elf64_Mips_R_Info *mips64_r_info = (void *)&r_info;
1302 
1303 		*r_type = mips64_r_info->r_type;
1304 		*r_sym = TO_NATIVE(mips64_r_info->r_sym);
1305 		return;
1306 	}
1307 
1308 	if (is_64bit)
1309 		r_info = TO_NATIVE((Elf64_Xword)r_info);
1310 	else
1311 		r_info = TO_NATIVE((Elf32_Word)r_info);
1312 
1313 	*r_type = ELF_R_TYPE(r_info);
1314 	*r_sym = ELF_R_SYM(r_info);
1315 }
1316 
1317 static void section_rela(struct module *mod, struct elf_info *elf,
1318 			 unsigned int fsecndx, const char *fromsec,
1319 			 const Elf_Rela *start, const Elf_Rela *stop)
1320 {
1321 	const Elf_Rela *rela;
1322 
1323 	for (rela = start; rela < stop; rela++) {
1324 		Elf_Sym *tsym;
1325 		Elf_Addr taddr, r_offset;
1326 		unsigned int r_type, r_sym;
1327 
1328 		r_offset = TO_NATIVE(rela->r_offset);
1329 		get_rel_type_and_sym(elf, rela->r_info, &r_type, &r_sym);
1330 
1331 		tsym = elf->symtab_start + r_sym;
1332 		taddr = tsym->st_value + TO_NATIVE(rela->r_addend);
1333 
1334 		switch (elf->hdr->e_machine) {
1335 		case EM_RISCV:
1336 			if (!strcmp("__ex_table", fromsec) &&
1337 			    r_type == R_RISCV_SUB32)
1338 				continue;
1339 			break;
1340 		case EM_LOONGARCH:
1341 			switch (r_type) {
1342 			case R_LARCH_SUB32:
1343 				if (!strcmp("__ex_table", fromsec))
1344 					continue;
1345 				break;
1346 			case R_LARCH_RELAX:
1347 			case R_LARCH_ALIGN:
1348 				/* These relocs do not refer to symbols */
1349 				continue;
1350 			}
1351 			break;
1352 		}
1353 
1354 		check_section_mismatch(mod, elf, tsym,
1355 				       fsecndx, fromsec, r_offset, taddr);
1356 	}
1357 }
1358 
1359 static void section_rel(struct module *mod, struct elf_info *elf,
1360 			unsigned int fsecndx, const char *fromsec,
1361 			const Elf_Rel *start, const Elf_Rel *stop)
1362 {
1363 	const Elf_Rel *rel;
1364 
1365 	for (rel = start; rel < stop; rel++) {
1366 		Elf_Sym *tsym;
1367 		Elf_Addr taddr, r_offset;
1368 		unsigned int r_type, r_sym;
1369 		void *loc;
1370 
1371 		r_offset = TO_NATIVE(rel->r_offset);
1372 		get_rel_type_and_sym(elf, rel->r_info, &r_type, &r_sym);
1373 
1374 		loc = sym_get_data_by_offset(elf, fsecndx, r_offset);
1375 		tsym = elf->symtab_start + r_sym;
1376 
1377 		switch (elf->hdr->e_machine) {
1378 		case EM_386:
1379 			taddr = addend_386_rel(loc, r_type);
1380 			break;
1381 		case EM_ARM:
1382 			taddr = addend_arm_rel(loc, tsym, r_type);
1383 			break;
1384 		case EM_MIPS:
1385 			taddr = addend_mips_rel(loc, r_type);
1386 			break;
1387 		default:
1388 			fatal("Please add code to calculate addend for this architecture\n");
1389 		}
1390 
1391 		check_section_mismatch(mod, elf, tsym,
1392 				       fsecndx, fromsec, r_offset, taddr);
1393 	}
1394 }
1395 
1396 /**
1397  * A module includes a number of sections that are discarded
1398  * either when loaded or when used as built-in.
1399  * For loaded modules all functions marked __init and all data
1400  * marked __initdata will be discarded when the module has been initialized.
1401  * Likewise for modules used built-in the sections marked __exit
1402  * are discarded because __exit marked function are supposed to be called
1403  * only when a module is unloaded which never happens for built-in modules.
1404  * The check_sec_ref() function traverses all relocation records
1405  * to find all references to a section that reference a section that will
1406  * be discarded and warns about it.
1407  **/
1408 static void check_sec_ref(struct module *mod, struct elf_info *elf)
1409 {
1410 	int i;
1411 
1412 	/* Walk through all sections */
1413 	for (i = 0; i < elf->num_sections; i++) {
1414 		Elf_Shdr *sechdr = &elf->sechdrs[i];
1415 
1416 		check_section(mod->name, elf, sechdr);
1417 		/* We want to process only relocation sections and not .init */
1418 		if (sechdr->sh_type == SHT_REL || sechdr->sh_type == SHT_RELA) {
1419 			/* section to which the relocation applies */
1420 			unsigned int secndx = sechdr->sh_info;
1421 			const char *secname = sec_name(elf, secndx);
1422 			const void *start, *stop;
1423 
1424 			/* If the section is known good, skip it */
1425 			if (match(secname, section_white_list))
1426 				continue;
1427 
1428 			start = sym_get_data_by_offset(elf, i, 0);
1429 			stop = start + sechdr->sh_size;
1430 
1431 			if (sechdr->sh_type == SHT_RELA)
1432 				section_rela(mod, elf, secndx, secname,
1433 					     start, stop);
1434 			else
1435 				section_rel(mod, elf, secndx, secname,
1436 					    start, stop);
1437 		}
1438 	}
1439 }
1440 
1441 static char *remove_dot(char *s)
1442 {
1443 	size_t n = strcspn(s, ".");
1444 
1445 	if (n && s[n]) {
1446 		size_t m = strspn(s + n + 1, "0123456789");
1447 		if (m && (s[n + m + 1] == '.' || s[n + m + 1] == 0))
1448 			s[n] = 0;
1449 	}
1450 	return s;
1451 }
1452 
1453 /*
1454  * The CRCs are recorded in .*.cmd files in the form of:
1455  * #SYMVER <name> <crc>
1456  */
1457 static void extract_crcs_for_object(const char *object, struct module *mod)
1458 {
1459 	char cmd_file[PATH_MAX];
1460 	char *buf, *p;
1461 	const char *base;
1462 	int dirlen, ret;
1463 
1464 	base = strrchr(object, '/');
1465 	if (base) {
1466 		base++;
1467 		dirlen = base - object;
1468 	} else {
1469 		dirlen = 0;
1470 		base = object;
1471 	}
1472 
1473 	ret = snprintf(cmd_file, sizeof(cmd_file), "%.*s.%s.cmd",
1474 		       dirlen, object, base);
1475 	if (ret >= sizeof(cmd_file)) {
1476 		error("%s: too long path was truncated\n", cmd_file);
1477 		return;
1478 	}
1479 
1480 	buf = read_text_file(cmd_file);
1481 	p = buf;
1482 
1483 	while ((p = strstr(p, "\n#SYMVER "))) {
1484 		char *name;
1485 		size_t namelen;
1486 		unsigned int crc;
1487 		struct symbol *sym;
1488 
1489 		name = p + strlen("\n#SYMVER ");
1490 
1491 		p = strchr(name, ' ');
1492 		if (!p)
1493 			break;
1494 
1495 		namelen = p - name;
1496 		p++;
1497 
1498 		if (!isdigit(*p))
1499 			continue;	/* skip this line */
1500 
1501 		crc = strtoul(p, &p, 0);
1502 		if (*p != '\n')
1503 			continue;	/* skip this line */
1504 
1505 		name[namelen] = '\0';
1506 
1507 		/*
1508 		 * sym_find_with_module() may return NULL here.
1509 		 * It typically occurs when CONFIG_TRIM_UNUSED_KSYMS=y.
1510 		 * Since commit e1327a127703, genksyms calculates CRCs of all
1511 		 * symbols, including trimmed ones. Ignore orphan CRCs.
1512 		 */
1513 		sym = sym_find_with_module(name, mod);
1514 		if (sym)
1515 			sym_set_crc(sym, crc);
1516 	}
1517 
1518 	free(buf);
1519 }
1520 
1521 /*
1522  * The symbol versions (CRC) are recorded in the .*.cmd files.
1523  * Parse them to retrieve CRCs for the current module.
1524  */
1525 static void mod_set_crcs(struct module *mod)
1526 {
1527 	char objlist[PATH_MAX];
1528 	char *buf, *p, *obj;
1529 	int ret;
1530 
1531 	if (mod->is_vmlinux) {
1532 		strcpy(objlist, ".vmlinux.objs");
1533 	} else {
1534 		/* objects for a module are listed in the *.mod file. */
1535 		ret = snprintf(objlist, sizeof(objlist), "%s.mod", mod->name);
1536 		if (ret >= sizeof(objlist)) {
1537 			error("%s: too long path was truncated\n", objlist);
1538 			return;
1539 		}
1540 	}
1541 
1542 	buf = read_text_file(objlist);
1543 	p = buf;
1544 
1545 	while ((obj = strsep(&p, "\n")) && obj[0])
1546 		extract_crcs_for_object(obj, mod);
1547 
1548 	free(buf);
1549 }
1550 
1551 static void read_symbols(const char *modname)
1552 {
1553 	const char *symname;
1554 	char *version;
1555 	char *license;
1556 	char *namespace;
1557 	struct module *mod;
1558 	struct elf_info info = { };
1559 	Elf_Sym *sym;
1560 
1561 	if (!parse_elf(&info, modname))
1562 		return;
1563 
1564 	if (!strends(modname, ".o")) {
1565 		error("%s: filename must be suffixed with .o\n", modname);
1566 		return;
1567 	}
1568 
1569 	/* strip trailing .o */
1570 	mod = new_module(modname, strlen(modname) - strlen(".o"));
1571 
1572 	/* save .no_trim_symbol section for later use */
1573 	if (info.no_trim_symbol_len) {
1574 		mod->no_trim_symbol = xmalloc(info.no_trim_symbol_len);
1575 		memcpy(mod->no_trim_symbol, info.no_trim_symbol,
1576 		       info.no_trim_symbol_len);
1577 		mod->no_trim_symbol_len = info.no_trim_symbol_len;
1578 	}
1579 
1580 	if (!mod->is_vmlinux) {
1581 		license = get_modinfo(&info, "license");
1582 		if (!license)
1583 			error("missing MODULE_LICENSE() in %s\n", modname);
1584 		while (license) {
1585 			if (!license_is_gpl_compatible(license)) {
1586 				mod->is_gpl_compatible = false;
1587 				break;
1588 			}
1589 			license = get_next_modinfo(&info, "license", license);
1590 		}
1591 
1592 		namespace = get_modinfo(&info, "import_ns");
1593 		while (namespace) {
1594 			add_namespace(&mod->imported_namespaces, namespace);
1595 			namespace = get_next_modinfo(&info, "import_ns",
1596 						     namespace);
1597 		}
1598 
1599 		if (extra_warn && !get_modinfo(&info, "description"))
1600 			warn("missing MODULE_DESCRIPTION() in %s\n", modname);
1601 	}
1602 
1603 	for (sym = info.symtab_start; sym < info.symtab_stop; sym++) {
1604 		symname = remove_dot(info.strtab + sym->st_name);
1605 
1606 		handle_symbol(mod, &info, sym, symname);
1607 		handle_moddevtable(mod, &info, sym, symname);
1608 	}
1609 
1610 	check_sec_ref(mod, &info);
1611 
1612 	if (!mod->is_vmlinux) {
1613 		version = get_modinfo(&info, "version");
1614 		if (version || all_versions)
1615 			get_src_version(mod->name, mod->srcversion,
1616 					sizeof(mod->srcversion) - 1);
1617 	}
1618 
1619 	parse_elf_finish(&info);
1620 
1621 	if (modversions) {
1622 		/*
1623 		 * Our trick to get versioning for module struct etc. - it's
1624 		 * never passed as an argument to an exported function, so
1625 		 * the automatic versioning doesn't pick it up, but it's really
1626 		 * important anyhow.
1627 		 */
1628 		sym_add_unresolved("module_layout", mod, false);
1629 
1630 		mod_set_crcs(mod);
1631 	}
1632 }
1633 
1634 static void read_symbols_from_files(const char *filename)
1635 {
1636 	FILE *in = stdin;
1637 	char fname[PATH_MAX];
1638 
1639 	in = fopen(filename, "r");
1640 	if (!in)
1641 		fatal("Can't open filenames file %s: %m", filename);
1642 
1643 	while (fgets(fname, PATH_MAX, in) != NULL) {
1644 		if (strends(fname, "\n"))
1645 			fname[strlen(fname)-1] = '\0';
1646 		read_symbols(fname);
1647 	}
1648 
1649 	fclose(in);
1650 }
1651 
1652 #define SZ 500
1653 
1654 /* We first write the generated file into memory using the
1655  * following helper, then compare to the file on disk and
1656  * only update the later if anything changed */
1657 
1658 void __attribute__((format(printf, 2, 3))) buf_printf(struct buffer *buf,
1659 						      const char *fmt, ...)
1660 {
1661 	char tmp[SZ];
1662 	int len;
1663 	va_list ap;
1664 
1665 	va_start(ap, fmt);
1666 	len = vsnprintf(tmp, SZ, fmt, ap);
1667 	buf_write(buf, tmp, len);
1668 	va_end(ap);
1669 }
1670 
1671 void buf_write(struct buffer *buf, const char *s, int len)
1672 {
1673 	if (buf->size - buf->pos < len) {
1674 		buf->size += len + SZ;
1675 		buf->p = xrealloc(buf->p, buf->size);
1676 	}
1677 	strncpy(buf->p + buf->pos, s, len);
1678 	buf->pos += len;
1679 }
1680 
1681 static void check_exports(struct module *mod)
1682 {
1683 	struct symbol *s, *exp;
1684 
1685 	list_for_each_entry(s, &mod->unresolved_symbols, list) {
1686 		const char *basename;
1687 		exp = find_symbol(s->name);
1688 		if (!exp) {
1689 			if (!s->weak && nr_unresolved++ < MAX_UNRESOLVED_REPORTS)
1690 				modpost_log(!warn_unresolved,
1691 					    "\"%s\" [%s.ko] undefined!\n",
1692 					    s->name, mod->name);
1693 			continue;
1694 		}
1695 		if (exp->module == mod) {
1696 			error("\"%s\" [%s.ko] was exported without definition\n",
1697 			      s->name, mod->name);
1698 			continue;
1699 		}
1700 
1701 		exp->used = true;
1702 		s->module = exp->module;
1703 		s->crc_valid = exp->crc_valid;
1704 		s->crc = exp->crc;
1705 
1706 		basename = strrchr(mod->name, '/');
1707 		if (basename)
1708 			basename++;
1709 		else
1710 			basename = mod->name;
1711 
1712 		if (!contains_namespace(&mod->imported_namespaces, exp->namespace)) {
1713 			modpost_log(!allow_missing_ns_imports,
1714 				    "module %s uses symbol %s from namespace %s, but does not import it.\n",
1715 				    basename, exp->name, exp->namespace);
1716 			add_namespace(&mod->missing_namespaces, exp->namespace);
1717 		}
1718 
1719 		if (!mod->is_gpl_compatible && exp->is_gpl_only)
1720 			error("GPL-incompatible module %s.ko uses GPL-only symbol '%s'\n",
1721 			      basename, exp->name);
1722 	}
1723 }
1724 
1725 static void handle_white_list_exports(const char *white_list)
1726 {
1727 	char *buf, *p, *name;
1728 
1729 	buf = read_text_file(white_list);
1730 	p = buf;
1731 
1732 	while ((name = strsep(&p, "\n"))) {
1733 		struct symbol *sym = find_symbol(name);
1734 
1735 		if (sym)
1736 			sym->used = true;
1737 	}
1738 
1739 	free(buf);
1740 }
1741 
1742 /*
1743  * Keep symbols recorded in the .no_trim_symbol section. This is necessary to
1744  * prevent CONFIG_TRIM_UNUSED_KSYMS from dropping EXPORT_SYMBOL because
1745  * symbol_get() relies on the symbol being present in the ksymtab for lookups.
1746  */
1747 static void keep_no_trim_symbols(struct module *mod)
1748 {
1749 	unsigned long size = mod->no_trim_symbol_len;
1750 
1751 	for (char *s = mod->no_trim_symbol; s; s = next_string(s , &size)) {
1752 		struct symbol *sym;
1753 
1754 		/*
1755 		 * If find_symbol() returns NULL, this symbol is not provided
1756 		 * by any module, and symbol_get() will fail.
1757 		 */
1758 		sym = find_symbol(s);
1759 		if (sym)
1760 			sym->used = true;
1761 	}
1762 }
1763 
1764 static void check_modname_len(struct module *mod)
1765 {
1766 	const char *mod_name;
1767 
1768 	mod_name = strrchr(mod->name, '/');
1769 	if (mod_name == NULL)
1770 		mod_name = mod->name;
1771 	else
1772 		mod_name++;
1773 	if (strlen(mod_name) >= MODULE_NAME_LEN)
1774 		error("module name is too long [%s.ko]\n", mod->name);
1775 }
1776 
1777 /**
1778  * Header for the generated file
1779  **/
1780 static void add_header(struct buffer *b, struct module *mod)
1781 {
1782 	buf_printf(b, "#include <linux/module.h>\n");
1783 	buf_printf(b, "#include <linux/export-internal.h>\n");
1784 	buf_printf(b, "#include <linux/compiler.h>\n");
1785 	buf_printf(b, "\n");
1786 	buf_printf(b, "MODULE_INFO(name, KBUILD_MODNAME);\n");
1787 	buf_printf(b, "\n");
1788 	buf_printf(b, "__visible struct module __this_module\n");
1789 	buf_printf(b, "__section(\".gnu.linkonce.this_module\") = {\n");
1790 	buf_printf(b, "\t.name = KBUILD_MODNAME,\n");
1791 	if (mod->has_init)
1792 		buf_printf(b, "\t.init = init_module,\n");
1793 	if (mod->has_cleanup)
1794 		buf_printf(b, "#ifdef CONFIG_MODULE_UNLOAD\n"
1795 			      "\t.exit = cleanup_module,\n"
1796 			      "#endif\n");
1797 	buf_printf(b, "\t.arch = MODULE_ARCH_INIT,\n");
1798 	buf_printf(b, "};\n");
1799 
1800 	if (!external_module)
1801 		buf_printf(b, "\nMODULE_INFO(intree, \"Y\");\n");
1802 
1803 	if (strstarts(mod->name, "drivers/staging"))
1804 		buf_printf(b, "\nMODULE_INFO(staging, \"Y\");\n");
1805 
1806 	if (strstarts(mod->name, "tools/testing"))
1807 		buf_printf(b, "\nMODULE_INFO(test, \"Y\");\n");
1808 }
1809 
1810 static void add_exported_symbols(struct buffer *buf, struct module *mod)
1811 {
1812 	struct symbol *sym;
1813 
1814 	/* generate struct for exported symbols */
1815 	buf_printf(buf, "\n");
1816 	list_for_each_entry(sym, &mod->exported_symbols, list) {
1817 		if (trim_unused_exports && !sym->used)
1818 			continue;
1819 
1820 		buf_printf(buf, "KSYMTAB_%s(%s, \"%s\", \"%s\");\n",
1821 			   sym->is_func ? "FUNC" : "DATA", sym->name,
1822 			   sym->is_gpl_only ? "_gpl" : "", sym->namespace);
1823 	}
1824 
1825 	if (!modversions)
1826 		return;
1827 
1828 	/* record CRCs for exported symbols */
1829 	buf_printf(buf, "\n");
1830 	list_for_each_entry(sym, &mod->exported_symbols, list) {
1831 		if (trim_unused_exports && !sym->used)
1832 			continue;
1833 
1834 		if (!sym->crc_valid)
1835 			warn("EXPORT symbol \"%s\" [%s%s] version generation failed, symbol will not be versioned.\n"
1836 			     "Is \"%s\" prototyped in <asm/asm-prototypes.h>?\n",
1837 			     sym->name, mod->name, mod->is_vmlinux ? "" : ".ko",
1838 			     sym->name);
1839 
1840 		buf_printf(buf, "SYMBOL_CRC(%s, 0x%08x, \"%s\");\n",
1841 			   sym->name, sym->crc, sym->is_gpl_only ? "_gpl" : "");
1842 	}
1843 }
1844 
1845 /**
1846  * Record CRCs for unresolved symbols, supporting long names
1847  */
1848 static void add_extended_versions(struct buffer *b, struct module *mod)
1849 {
1850 	struct symbol *s;
1851 
1852 	if (!extended_modversions)
1853 		return;
1854 
1855 	buf_printf(b, "\n");
1856 	buf_printf(b, "static const u32 ____version_ext_crcs[]\n");
1857 	buf_printf(b, "__used __section(\"__version_ext_crcs\") = {\n");
1858 	list_for_each_entry(s, &mod->unresolved_symbols, list) {
1859 		if (!s->module)
1860 			continue;
1861 		if (!s->crc_valid) {
1862 			warn("\"%s\" [%s.ko] has no CRC!\n",
1863 				s->name, mod->name);
1864 			continue;
1865 		}
1866 		buf_printf(b, "\t0x%08x,\n", s->crc);
1867 	}
1868 	buf_printf(b, "};\n");
1869 
1870 	buf_printf(b, "static const char ____version_ext_names[]\n");
1871 	buf_printf(b, "__used __section(\"__version_ext_names\") =\n");
1872 	list_for_each_entry(s, &mod->unresolved_symbols, list) {
1873 		if (!s->module)
1874 			continue;
1875 		if (!s->crc_valid)
1876 			/*
1877 			 * We already warned on this when producing the crc
1878 			 * table.
1879 			 * We need to skip its name too, as the indexes in
1880 			 * both tables need to align.
1881 			 */
1882 			continue;
1883 		buf_printf(b, "\t\"%s\\0\"\n", s->name);
1884 	}
1885 	buf_printf(b, ";\n");
1886 }
1887 
1888 /**
1889  * Record CRCs for unresolved symbols
1890  **/
1891 static void add_versions(struct buffer *b, struct module *mod)
1892 {
1893 	struct symbol *s;
1894 
1895 	if (!basic_modversions)
1896 		return;
1897 
1898 	buf_printf(b, "\n");
1899 	buf_printf(b, "static const struct modversion_info ____versions[]\n");
1900 	buf_printf(b, "__used __section(\"__versions\") = {\n");
1901 
1902 	list_for_each_entry(s, &mod->unresolved_symbols, list) {
1903 		if (!s->module)
1904 			continue;
1905 		if (!s->crc_valid) {
1906 			warn("\"%s\" [%s.ko] has no CRC!\n",
1907 				s->name, mod->name);
1908 			continue;
1909 		}
1910 		if (strlen(s->name) >= MODULE_NAME_LEN) {
1911 			if (extended_modversions) {
1912 				/* this symbol will only be in the extended info */
1913 				continue;
1914 			} else {
1915 				error("too long symbol \"%s\" [%s.ko]\n",
1916 				      s->name, mod->name);
1917 				break;
1918 			}
1919 		}
1920 		buf_printf(b, "\t{ 0x%08x, \"%s\" },\n",
1921 			   s->crc, s->name);
1922 	}
1923 
1924 	buf_printf(b, "};\n");
1925 }
1926 
1927 static void add_depends(struct buffer *b, struct module *mod)
1928 {
1929 	struct symbol *s;
1930 	int first = 1;
1931 
1932 	/* Clear ->seen flag of modules that own symbols needed by this. */
1933 	list_for_each_entry(s, &mod->unresolved_symbols, list) {
1934 		if (s->module)
1935 			s->module->seen = s->module->is_vmlinux;
1936 	}
1937 
1938 	buf_printf(b, "\n");
1939 	buf_printf(b, "MODULE_INFO(depends, \"");
1940 	list_for_each_entry(s, &mod->unresolved_symbols, list) {
1941 		const char *p;
1942 		if (!s->module)
1943 			continue;
1944 
1945 		if (s->module->seen)
1946 			continue;
1947 
1948 		s->module->seen = true;
1949 		p = strrchr(s->module->name, '/');
1950 		if (p)
1951 			p++;
1952 		else
1953 			p = s->module->name;
1954 		buf_printf(b, "%s%s", first ? "" : ",", p);
1955 		first = 0;
1956 	}
1957 	buf_printf(b, "\");\n");
1958 }
1959 
1960 static void add_srcversion(struct buffer *b, struct module *mod)
1961 {
1962 	if (mod->srcversion[0]) {
1963 		buf_printf(b, "\n");
1964 		buf_printf(b, "MODULE_INFO(srcversion, \"%s\");\n",
1965 			   mod->srcversion);
1966 	}
1967 }
1968 
1969 static void write_buf(struct buffer *b, const char *fname)
1970 {
1971 	FILE *file;
1972 
1973 	if (error_occurred)
1974 		return;
1975 
1976 	file = fopen(fname, "w");
1977 	if (!file) {
1978 		perror(fname);
1979 		exit(1);
1980 	}
1981 	if (fwrite(b->p, 1, b->pos, file) != b->pos) {
1982 		perror(fname);
1983 		exit(1);
1984 	}
1985 	if (fclose(file) != 0) {
1986 		perror(fname);
1987 		exit(1);
1988 	}
1989 }
1990 
1991 static void write_if_changed(struct buffer *b, const char *fname)
1992 {
1993 	char *tmp;
1994 	FILE *file;
1995 	struct stat st;
1996 
1997 	file = fopen(fname, "r");
1998 	if (!file)
1999 		goto write;
2000 
2001 	if (fstat(fileno(file), &st) < 0)
2002 		goto close_write;
2003 
2004 	if (st.st_size != b->pos)
2005 		goto close_write;
2006 
2007 	tmp = xmalloc(b->pos);
2008 	if (fread(tmp, 1, b->pos, file) != b->pos)
2009 		goto free_write;
2010 
2011 	if (memcmp(tmp, b->p, b->pos) != 0)
2012 		goto free_write;
2013 
2014 	free(tmp);
2015 	fclose(file);
2016 	return;
2017 
2018  free_write:
2019 	free(tmp);
2020  close_write:
2021 	fclose(file);
2022  write:
2023 	write_buf(b, fname);
2024 }
2025 
2026 static void write_vmlinux_export_c_file(struct module *mod)
2027 {
2028 	struct buffer buf = { };
2029 
2030 	buf_printf(&buf,
2031 		   "#include <linux/export-internal.h>\n");
2032 
2033 	add_exported_symbols(&buf, mod);
2034 	write_if_changed(&buf, ".vmlinux.export.c");
2035 	free(buf.p);
2036 }
2037 
2038 /* do sanity checks, and generate *.mod.c file */
2039 static void write_mod_c_file(struct module *mod)
2040 {
2041 	struct buffer buf = { };
2042 	struct module_alias *alias, *next;
2043 	char fname[PATH_MAX];
2044 	int ret;
2045 
2046 	add_header(&buf, mod);
2047 	add_exported_symbols(&buf, mod);
2048 	add_versions(&buf, mod);
2049 	add_extended_versions(&buf, mod);
2050 	add_depends(&buf, mod);
2051 
2052 	buf_printf(&buf, "\n");
2053 	list_for_each_entry_safe(alias, next, &mod->aliases, node) {
2054 		buf_printf(&buf, "MODULE_ALIAS(\"%s\");\n", alias->str);
2055 		list_del(&alias->node);
2056 		free(alias);
2057 	}
2058 
2059 	add_srcversion(&buf, mod);
2060 
2061 	ret = snprintf(fname, sizeof(fname), "%s.mod.c", mod->name);
2062 	if (ret >= sizeof(fname)) {
2063 		error("%s: too long path was truncated\n", fname);
2064 		goto free;
2065 	}
2066 
2067 	write_if_changed(&buf, fname);
2068 
2069 free:
2070 	free(buf.p);
2071 }
2072 
2073 /* parse Module.symvers file. line format:
2074  * 0x12345678<tab>symbol<tab>module<tab>export<tab>namespace
2075  **/
2076 static void read_dump(const char *fname)
2077 {
2078 	char *buf, *pos, *line;
2079 
2080 	buf = read_text_file(fname);
2081 	if (!buf)
2082 		/* No symbol versions, silently ignore */
2083 		return;
2084 
2085 	pos = buf;
2086 
2087 	while ((line = get_line(&pos))) {
2088 		char *symname, *namespace, *modname, *d, *export;
2089 		unsigned int crc;
2090 		struct module *mod;
2091 		struct symbol *s;
2092 		bool gpl_only;
2093 
2094 		if (!(symname = strchr(line, '\t')))
2095 			goto fail;
2096 		*symname++ = '\0';
2097 		if (!(modname = strchr(symname, '\t')))
2098 			goto fail;
2099 		*modname++ = '\0';
2100 		if (!(export = strchr(modname, '\t')))
2101 			goto fail;
2102 		*export++ = '\0';
2103 		if (!(namespace = strchr(export, '\t')))
2104 			goto fail;
2105 		*namespace++ = '\0';
2106 
2107 		crc = strtoul(line, &d, 16);
2108 		if (*symname == '\0' || *modname == '\0' || *d != '\0')
2109 			goto fail;
2110 
2111 		if (!strcmp(export, "EXPORT_SYMBOL_GPL")) {
2112 			gpl_only = true;
2113 		} else if (!strcmp(export, "EXPORT_SYMBOL")) {
2114 			gpl_only = false;
2115 		} else {
2116 			error("%s: unknown license %s. skip", symname, export);
2117 			continue;
2118 		}
2119 
2120 		mod = find_module(fname, modname);
2121 		if (!mod) {
2122 			mod = new_module(modname, strlen(modname));
2123 			mod->dump_file = fname;
2124 		}
2125 		s = sym_add_exported(symname, mod, gpl_only, namespace);
2126 		sym_set_crc(s, crc);
2127 	}
2128 	free(buf);
2129 	return;
2130 fail:
2131 	free(buf);
2132 	fatal("parse error in symbol dump file\n");
2133 }
2134 
2135 static void write_dump(const char *fname)
2136 {
2137 	struct buffer buf = { };
2138 	struct module *mod;
2139 	struct symbol *sym;
2140 
2141 	list_for_each_entry(mod, &modules, list) {
2142 		if (mod->dump_file)
2143 			continue;
2144 		list_for_each_entry(sym, &mod->exported_symbols, list) {
2145 			if (trim_unused_exports && !sym->used)
2146 				continue;
2147 
2148 			buf_printf(&buf, "0x%08x\t%s\t%s\tEXPORT_SYMBOL%s\t%s\n",
2149 				   sym->crc, sym->name, mod->name,
2150 				   sym->is_gpl_only ? "_GPL" : "",
2151 				   sym->namespace);
2152 		}
2153 	}
2154 	write_buf(&buf, fname);
2155 	free(buf.p);
2156 }
2157 
2158 static void write_namespace_deps_files(const char *fname)
2159 {
2160 	struct module *mod;
2161 	struct namespace_list *ns;
2162 	struct buffer ns_deps_buf = {};
2163 
2164 	list_for_each_entry(mod, &modules, list) {
2165 
2166 		if (mod->dump_file || list_empty(&mod->missing_namespaces))
2167 			continue;
2168 
2169 		buf_printf(&ns_deps_buf, "%s.ko:", mod->name);
2170 
2171 		list_for_each_entry(ns, &mod->missing_namespaces, list)
2172 			buf_printf(&ns_deps_buf, " %s", ns->namespace);
2173 
2174 		buf_printf(&ns_deps_buf, "\n");
2175 	}
2176 
2177 	write_if_changed(&ns_deps_buf, fname);
2178 	free(ns_deps_buf.p);
2179 }
2180 
2181 struct dump_list {
2182 	struct list_head list;
2183 	const char *file;
2184 };
2185 
2186 static void check_host_endian(void)
2187 {
2188 	static const union {
2189 		short s;
2190 		char c[2];
2191 	} endian_test = { .c = {0x01, 0x02} };
2192 
2193 	switch (endian_test.s) {
2194 	case 0x0102:
2195 		host_is_big_endian = true;
2196 		break;
2197 	case 0x0201:
2198 		host_is_big_endian = false;
2199 		break;
2200 	default:
2201 		fatal("Unknown host endian\n");
2202 	}
2203 }
2204 
2205 int main(int argc, char **argv)
2206 {
2207 	struct module *mod;
2208 	char *missing_namespace_deps = NULL;
2209 	char *unused_exports_white_list = NULL;
2210 	char *dump_write = NULL, *files_source = NULL;
2211 	int opt;
2212 	LIST_HEAD(dump_lists);
2213 	struct dump_list *dl, *dl2;
2214 
2215 	while ((opt = getopt(argc, argv, "ei:MmnT:to:au:WwENd:xb")) != -1) {
2216 		switch (opt) {
2217 		case 'e':
2218 			external_module = true;
2219 			break;
2220 		case 'i':
2221 			dl = xmalloc(sizeof(*dl));
2222 			dl->file = optarg;
2223 			list_add_tail(&dl->list, &dump_lists);
2224 			break;
2225 		case 'M':
2226 			module_enabled = true;
2227 			break;
2228 		case 'm':
2229 			modversions = true;
2230 			break;
2231 		case 'n':
2232 			ignore_missing_files = true;
2233 			break;
2234 		case 'o':
2235 			dump_write = optarg;
2236 			break;
2237 		case 'a':
2238 			all_versions = true;
2239 			break;
2240 		case 'T':
2241 			files_source = optarg;
2242 			break;
2243 		case 't':
2244 			trim_unused_exports = true;
2245 			break;
2246 		case 'u':
2247 			unused_exports_white_list = optarg;
2248 			break;
2249 		case 'W':
2250 			extra_warn = true;
2251 			break;
2252 		case 'w':
2253 			warn_unresolved = true;
2254 			break;
2255 		case 'E':
2256 			sec_mismatch_warn_only = false;
2257 			break;
2258 		case 'N':
2259 			allow_missing_ns_imports = true;
2260 			break;
2261 		case 'd':
2262 			missing_namespace_deps = optarg;
2263 			break;
2264 		case 'b':
2265 			basic_modversions = true;
2266 			break;
2267 		case 'x':
2268 			extended_modversions = true;
2269 			break;
2270 		default:
2271 			exit(1);
2272 		}
2273 	}
2274 
2275 	check_host_endian();
2276 
2277 	list_for_each_entry_safe(dl, dl2, &dump_lists, list) {
2278 		read_dump(dl->file);
2279 		list_del(&dl->list);
2280 		free(dl);
2281 	}
2282 
2283 	while (optind < argc)
2284 		read_symbols(argv[optind++]);
2285 
2286 	if (files_source)
2287 		read_symbols_from_files(files_source);
2288 
2289 	list_for_each_entry(mod, &modules, list) {
2290 		keep_no_trim_symbols(mod);
2291 
2292 		if (mod->dump_file || mod->is_vmlinux)
2293 			continue;
2294 
2295 		check_modname_len(mod);
2296 		check_exports(mod);
2297 	}
2298 
2299 	if (unused_exports_white_list)
2300 		handle_white_list_exports(unused_exports_white_list);
2301 
2302 	list_for_each_entry(mod, &modules, list) {
2303 		if (mod->dump_file)
2304 			continue;
2305 
2306 		if (mod->is_vmlinux)
2307 			write_vmlinux_export_c_file(mod);
2308 		else
2309 			write_mod_c_file(mod);
2310 	}
2311 
2312 	if (missing_namespace_deps)
2313 		write_namespace_deps_files(missing_namespace_deps);
2314 
2315 	if (dump_write)
2316 		write_dump(dump_write);
2317 	if (sec_mismatch_count && !sec_mismatch_warn_only)
2318 		error("Section mismatches detected.\n"
2319 		      "Set CONFIG_SECTION_MISMATCH_WARN_ONLY=y to allow them.\n");
2320 
2321 	if (nr_unresolved > MAX_UNRESOLVED_REPORTS)
2322 		warn("suppressed %u unresolved symbol warnings because there were too many)\n",
2323 		     nr_unresolved - MAX_UNRESOLVED_REPORTS);
2324 
2325 	return error_occurred ? 1 : 0;
2326 }
2327