1 /* Postprocess module symbol versions 2 * 3 * Copyright 2003 Kai Germaschewski 4 * Copyright 2002-2004 Rusty Russell, IBM Corporation 5 * Copyright 2006-2008 Sam Ravnborg 6 * Based in part on module-init-tools/depmod.c,file2alias 7 * 8 * This software may be used and distributed according to the terms 9 * of the GNU General Public License, incorporated herein by reference. 10 * 11 * Usage: modpost vmlinux module1.o module2.o ... 12 */ 13 14 #define _GNU_SOURCE 15 #include <elf.h> 16 #include <fnmatch.h> 17 #include <stdio.h> 18 #include <ctype.h> 19 #include <string.h> 20 #include <limits.h> 21 #include <stdbool.h> 22 #include <errno.h> 23 24 #include <hashtable.h> 25 #include <list.h> 26 #include <xalloc.h> 27 #include "modpost.h" 28 #include "../../include/linux/license.h" 29 30 static bool module_enabled; 31 /* Are we using CONFIG_MODVERSIONS? */ 32 static bool modversions; 33 /* Is CONFIG_MODULE_SRCVERSION_ALL set? */ 34 static bool all_versions; 35 /* If we are modposting external module set to 1 */ 36 static bool external_module; 37 /* Only warn about unresolved symbols */ 38 static bool warn_unresolved; 39 40 static int sec_mismatch_count; 41 static bool sec_mismatch_warn_only = true; 42 /* Trim EXPORT_SYMBOLs that are unused by in-tree modules */ 43 static bool trim_unused_exports; 44 45 /* ignore missing files */ 46 static bool ignore_missing_files; 47 /* If set to 1, only warn (instead of error) about missing ns imports */ 48 static bool allow_missing_ns_imports; 49 50 static bool error_occurred; 51 52 static bool extra_warn; 53 54 bool target_is_big_endian; 55 bool host_is_big_endian; 56 57 /* 58 * Cut off the warnings when there are too many. This typically occurs when 59 * vmlinux is missing. ('make modules' without building vmlinux.) 60 */ 61 #define MAX_UNRESOLVED_REPORTS 10 62 static unsigned int nr_unresolved; 63 64 /* In kernel, this size is defined in linux/module.h; 65 * here we use Elf_Addr instead of long for covering cross-compile 66 */ 67 68 #define MODULE_NAME_LEN (64 - sizeof(Elf_Addr)) 69 70 void modpost_log(bool is_error, const char *fmt, ...) 71 { 72 va_list arglist; 73 74 if (is_error) { 75 fprintf(stderr, "ERROR: "); 76 error_occurred = true; 77 } else { 78 fprintf(stderr, "WARNING: "); 79 } 80 81 fprintf(stderr, "modpost: "); 82 83 va_start(arglist, fmt); 84 vfprintf(stderr, fmt, arglist); 85 va_end(arglist); 86 } 87 88 static inline bool strends(const char *str, const char *postfix) 89 { 90 if (strlen(str) < strlen(postfix)) 91 return false; 92 93 return strcmp(str + strlen(str) - strlen(postfix), postfix) == 0; 94 } 95 96 char *read_text_file(const char *filename) 97 { 98 struct stat st; 99 size_t nbytes; 100 int fd; 101 char *buf; 102 103 fd = open(filename, O_RDONLY); 104 if (fd < 0) { 105 perror(filename); 106 exit(1); 107 } 108 109 if (fstat(fd, &st) < 0) { 110 perror(filename); 111 exit(1); 112 } 113 114 buf = xmalloc(st.st_size + 1); 115 116 nbytes = st.st_size; 117 118 while (nbytes) { 119 ssize_t bytes_read; 120 121 bytes_read = read(fd, buf, nbytes); 122 if (bytes_read < 0) { 123 perror(filename); 124 exit(1); 125 } 126 127 nbytes -= bytes_read; 128 } 129 buf[st.st_size] = '\0'; 130 131 close(fd); 132 133 return buf; 134 } 135 136 char *get_line(char **stringp) 137 { 138 char *orig = *stringp, *next; 139 140 /* do not return the unwanted extra line at EOF */ 141 if (!orig || *orig == '\0') 142 return NULL; 143 144 /* don't use strsep here, it is not available everywhere */ 145 next = strchr(orig, '\n'); 146 if (next) 147 *next++ = '\0'; 148 149 *stringp = next; 150 151 return orig; 152 } 153 154 /* A list of all modules we processed */ 155 LIST_HEAD(modules); 156 157 static struct module *find_module(const char *modname) 158 { 159 struct module *mod; 160 161 list_for_each_entry(mod, &modules, list) { 162 if (strcmp(mod->name, modname) == 0) 163 return mod; 164 } 165 return NULL; 166 } 167 168 static struct module *new_module(const char *name, size_t namelen) 169 { 170 struct module *mod; 171 172 mod = xmalloc(sizeof(*mod) + namelen + 1); 173 memset(mod, 0, sizeof(*mod)); 174 175 INIT_LIST_HEAD(&mod->exported_symbols); 176 INIT_LIST_HEAD(&mod->unresolved_symbols); 177 INIT_LIST_HEAD(&mod->missing_namespaces); 178 INIT_LIST_HEAD(&mod->imported_namespaces); 179 180 memcpy(mod->name, name, namelen); 181 mod->name[namelen] = '\0'; 182 mod->is_vmlinux = (strcmp(mod->name, "vmlinux") == 0); 183 184 /* 185 * Set mod->is_gpl_compatible to true by default. If MODULE_LICENSE() 186 * is missing, do not check the use for EXPORT_SYMBOL_GPL() becasue 187 * modpost will exit wiht error anyway. 188 */ 189 mod->is_gpl_compatible = true; 190 191 list_add_tail(&mod->list, &modules); 192 193 return mod; 194 } 195 196 struct symbol { 197 struct hlist_node hnode;/* link to hash table */ 198 struct list_head list; /* link to module::exported_symbols or module::unresolved_symbols */ 199 struct module *module; 200 char *namespace; 201 unsigned int crc; 202 bool crc_valid; 203 bool weak; 204 bool is_func; 205 bool is_gpl_only; /* exported by EXPORT_SYMBOL_GPL */ 206 bool used; /* there exists a user of this symbol */ 207 char name[]; 208 }; 209 210 static HASHTABLE_DEFINE(symbol_hashtable, 1U << 10); 211 212 /* This is based on the hash algorithm from gdbm, via tdb */ 213 static inline unsigned int tdb_hash(const char *name) 214 { 215 unsigned value; /* Used to compute the hash value. */ 216 unsigned i; /* Used to cycle through random values. */ 217 218 /* Set the initial value from the key size. */ 219 for (value = 0x238F13AF * strlen(name), i = 0; name[i]; i++) 220 value = (value + (((unsigned char *)name)[i] << (i*5 % 24))); 221 222 return (1103515243 * value + 12345); 223 } 224 225 /** 226 * Allocate a new symbols for use in the hash of exported symbols or 227 * the list of unresolved symbols per module 228 **/ 229 static struct symbol *alloc_symbol(const char *name) 230 { 231 struct symbol *s = xmalloc(sizeof(*s) + strlen(name) + 1); 232 233 memset(s, 0, sizeof(*s)); 234 strcpy(s->name, name); 235 236 return s; 237 } 238 239 /* For the hash of exported symbols */ 240 static void hash_add_symbol(struct symbol *sym) 241 { 242 hash_add(symbol_hashtable, &sym->hnode, tdb_hash(sym->name)); 243 } 244 245 static void sym_add_unresolved(const char *name, struct module *mod, bool weak) 246 { 247 struct symbol *sym; 248 249 sym = alloc_symbol(name); 250 sym->weak = weak; 251 252 list_add_tail(&sym->list, &mod->unresolved_symbols); 253 } 254 255 static struct symbol *sym_find_with_module(const char *name, struct module *mod) 256 { 257 struct symbol *s; 258 259 /* For our purposes, .foo matches foo. PPC64 needs this. */ 260 if (name[0] == '.') 261 name++; 262 263 hash_for_each_possible(symbol_hashtable, s, hnode, tdb_hash(name)) { 264 if (strcmp(s->name, name) == 0 && (!mod || s->module == mod)) 265 return s; 266 } 267 return NULL; 268 } 269 270 static struct symbol *find_symbol(const char *name) 271 { 272 return sym_find_with_module(name, NULL); 273 } 274 275 struct namespace_list { 276 struct list_head list; 277 char namespace[]; 278 }; 279 280 static bool contains_namespace(struct list_head *head, const char *namespace) 281 { 282 struct namespace_list *list; 283 284 /* 285 * The default namespace is null string "", which is always implicitly 286 * contained. 287 */ 288 if (!namespace[0]) 289 return true; 290 291 list_for_each_entry(list, head, list) { 292 if (!strcmp(list->namespace, namespace)) 293 return true; 294 } 295 296 return false; 297 } 298 299 static void add_namespace(struct list_head *head, const char *namespace) 300 { 301 struct namespace_list *ns_entry; 302 303 if (!contains_namespace(head, namespace)) { 304 ns_entry = xmalloc(sizeof(*ns_entry) + strlen(namespace) + 1); 305 strcpy(ns_entry->namespace, namespace); 306 list_add_tail(&ns_entry->list, head); 307 } 308 } 309 310 static void *sym_get_data_by_offset(const struct elf_info *info, 311 unsigned int secindex, unsigned long offset) 312 { 313 Elf_Shdr *sechdr = &info->sechdrs[secindex]; 314 315 return (void *)info->hdr + sechdr->sh_offset + offset; 316 } 317 318 void *sym_get_data(const struct elf_info *info, const Elf_Sym *sym) 319 { 320 return sym_get_data_by_offset(info, get_secindex(info, sym), 321 sym->st_value); 322 } 323 324 static const char *sech_name(const struct elf_info *info, Elf_Shdr *sechdr) 325 { 326 return sym_get_data_by_offset(info, info->secindex_strings, 327 sechdr->sh_name); 328 } 329 330 static const char *sec_name(const struct elf_info *info, unsigned int secindex) 331 { 332 /* 333 * If sym->st_shndx is a special section index, there is no 334 * corresponding section header. 335 * Return "" if the index is out of range of info->sechdrs[] array. 336 */ 337 if (secindex >= info->num_sections) 338 return ""; 339 340 return sech_name(info, &info->sechdrs[secindex]); 341 } 342 343 #define strstarts(str, prefix) (strncmp(str, prefix, strlen(prefix)) == 0) 344 345 static struct symbol *sym_add_exported(const char *name, struct module *mod, 346 bool gpl_only, const char *namespace) 347 { 348 struct symbol *s = find_symbol(name); 349 350 if (s && (!external_module || s->module->is_vmlinux || s->module == mod)) { 351 error("%s: '%s' exported twice. Previous export was in %s%s\n", 352 mod->name, name, s->module->name, 353 s->module->is_vmlinux ? "" : ".ko"); 354 } 355 356 s = alloc_symbol(name); 357 s->module = mod; 358 s->is_gpl_only = gpl_only; 359 s->namespace = xstrdup(namespace); 360 list_add_tail(&s->list, &mod->exported_symbols); 361 hash_add_symbol(s); 362 363 return s; 364 } 365 366 static void sym_set_crc(struct symbol *sym, unsigned int crc) 367 { 368 sym->crc = crc; 369 sym->crc_valid = true; 370 } 371 372 static void *grab_file(const char *filename, size_t *size) 373 { 374 struct stat st; 375 void *map = MAP_FAILED; 376 int fd; 377 378 fd = open(filename, O_RDONLY); 379 if (fd < 0) 380 return NULL; 381 if (fstat(fd, &st)) 382 goto failed; 383 384 *size = st.st_size; 385 map = mmap(NULL, *size, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0); 386 387 failed: 388 close(fd); 389 if (map == MAP_FAILED) 390 return NULL; 391 return map; 392 } 393 394 static void release_file(void *file, size_t size) 395 { 396 munmap(file, size); 397 } 398 399 static int parse_elf(struct elf_info *info, const char *filename) 400 { 401 unsigned int i; 402 Elf_Ehdr *hdr; 403 Elf_Shdr *sechdrs; 404 Elf_Sym *sym; 405 const char *secstrings; 406 unsigned int symtab_idx = ~0U, symtab_shndx_idx = ~0U; 407 408 hdr = grab_file(filename, &info->size); 409 if (!hdr) { 410 if (ignore_missing_files) { 411 fprintf(stderr, "%s: %s (ignored)\n", filename, 412 strerror(errno)); 413 return 0; 414 } 415 perror(filename); 416 exit(1); 417 } 418 info->hdr = hdr; 419 if (info->size < sizeof(*hdr)) { 420 /* file too small, assume this is an empty .o file */ 421 return 0; 422 } 423 /* Is this a valid ELF file? */ 424 if ((hdr->e_ident[EI_MAG0] != ELFMAG0) || 425 (hdr->e_ident[EI_MAG1] != ELFMAG1) || 426 (hdr->e_ident[EI_MAG2] != ELFMAG2) || 427 (hdr->e_ident[EI_MAG3] != ELFMAG3)) { 428 /* Not an ELF file - silently ignore it */ 429 return 0; 430 } 431 432 switch (hdr->e_ident[EI_DATA]) { 433 case ELFDATA2LSB: 434 target_is_big_endian = false; 435 break; 436 case ELFDATA2MSB: 437 target_is_big_endian = true; 438 break; 439 default: 440 fatal("target endian is unknown\n"); 441 } 442 443 /* Fix endianness in ELF header */ 444 hdr->e_type = TO_NATIVE(hdr->e_type); 445 hdr->e_machine = TO_NATIVE(hdr->e_machine); 446 hdr->e_version = TO_NATIVE(hdr->e_version); 447 hdr->e_entry = TO_NATIVE(hdr->e_entry); 448 hdr->e_phoff = TO_NATIVE(hdr->e_phoff); 449 hdr->e_shoff = TO_NATIVE(hdr->e_shoff); 450 hdr->e_flags = TO_NATIVE(hdr->e_flags); 451 hdr->e_ehsize = TO_NATIVE(hdr->e_ehsize); 452 hdr->e_phentsize = TO_NATIVE(hdr->e_phentsize); 453 hdr->e_phnum = TO_NATIVE(hdr->e_phnum); 454 hdr->e_shentsize = TO_NATIVE(hdr->e_shentsize); 455 hdr->e_shnum = TO_NATIVE(hdr->e_shnum); 456 hdr->e_shstrndx = TO_NATIVE(hdr->e_shstrndx); 457 sechdrs = (void *)hdr + hdr->e_shoff; 458 info->sechdrs = sechdrs; 459 460 /* modpost only works for relocatable objects */ 461 if (hdr->e_type != ET_REL) 462 fatal("%s: not relocatable object.", filename); 463 464 /* Check if file offset is correct */ 465 if (hdr->e_shoff > info->size) 466 fatal("section header offset=%lu in file '%s' is bigger than filesize=%zu\n", 467 (unsigned long)hdr->e_shoff, filename, info->size); 468 469 if (hdr->e_shnum == SHN_UNDEF) { 470 /* 471 * There are more than 64k sections, 472 * read count from .sh_size. 473 */ 474 info->num_sections = TO_NATIVE(sechdrs[0].sh_size); 475 } 476 else { 477 info->num_sections = hdr->e_shnum; 478 } 479 if (hdr->e_shstrndx == SHN_XINDEX) { 480 info->secindex_strings = TO_NATIVE(sechdrs[0].sh_link); 481 } 482 else { 483 info->secindex_strings = hdr->e_shstrndx; 484 } 485 486 /* Fix endianness in section headers */ 487 for (i = 0; i < info->num_sections; i++) { 488 sechdrs[i].sh_name = TO_NATIVE(sechdrs[i].sh_name); 489 sechdrs[i].sh_type = TO_NATIVE(sechdrs[i].sh_type); 490 sechdrs[i].sh_flags = TO_NATIVE(sechdrs[i].sh_flags); 491 sechdrs[i].sh_addr = TO_NATIVE(sechdrs[i].sh_addr); 492 sechdrs[i].sh_offset = TO_NATIVE(sechdrs[i].sh_offset); 493 sechdrs[i].sh_size = TO_NATIVE(sechdrs[i].sh_size); 494 sechdrs[i].sh_link = TO_NATIVE(sechdrs[i].sh_link); 495 sechdrs[i].sh_info = TO_NATIVE(sechdrs[i].sh_info); 496 sechdrs[i].sh_addralign = TO_NATIVE(sechdrs[i].sh_addralign); 497 sechdrs[i].sh_entsize = TO_NATIVE(sechdrs[i].sh_entsize); 498 } 499 /* Find symbol table. */ 500 secstrings = (void *)hdr + sechdrs[info->secindex_strings].sh_offset; 501 for (i = 1; i < info->num_sections; i++) { 502 const char *secname; 503 int nobits = sechdrs[i].sh_type == SHT_NOBITS; 504 505 if (!nobits && sechdrs[i].sh_offset > info->size) 506 fatal("%s is truncated. sechdrs[i].sh_offset=%lu > sizeof(*hrd)=%zu\n", 507 filename, (unsigned long)sechdrs[i].sh_offset, 508 sizeof(*hdr)); 509 510 secname = secstrings + sechdrs[i].sh_name; 511 if (strcmp(secname, ".modinfo") == 0) { 512 if (nobits) 513 fatal("%s has NOBITS .modinfo\n", filename); 514 info->modinfo = (void *)hdr + sechdrs[i].sh_offset; 515 info->modinfo_len = sechdrs[i].sh_size; 516 } else if (!strcmp(secname, ".export_symbol")) { 517 info->export_symbol_secndx = i; 518 } 519 520 if (sechdrs[i].sh_type == SHT_SYMTAB) { 521 unsigned int sh_link_idx; 522 symtab_idx = i; 523 info->symtab_start = (void *)hdr + 524 sechdrs[i].sh_offset; 525 info->symtab_stop = (void *)hdr + 526 sechdrs[i].sh_offset + sechdrs[i].sh_size; 527 sh_link_idx = sechdrs[i].sh_link; 528 info->strtab = (void *)hdr + 529 sechdrs[sh_link_idx].sh_offset; 530 } 531 532 /* 32bit section no. table? ("more than 64k sections") */ 533 if (sechdrs[i].sh_type == SHT_SYMTAB_SHNDX) { 534 symtab_shndx_idx = i; 535 info->symtab_shndx_start = (void *)hdr + 536 sechdrs[i].sh_offset; 537 info->symtab_shndx_stop = (void *)hdr + 538 sechdrs[i].sh_offset + sechdrs[i].sh_size; 539 } 540 } 541 if (!info->symtab_start) 542 fatal("%s has no symtab?\n", filename); 543 544 /* Fix endianness in symbols */ 545 for (sym = info->symtab_start; sym < info->symtab_stop; sym++) { 546 sym->st_shndx = TO_NATIVE(sym->st_shndx); 547 sym->st_name = TO_NATIVE(sym->st_name); 548 sym->st_value = TO_NATIVE(sym->st_value); 549 sym->st_size = TO_NATIVE(sym->st_size); 550 } 551 552 if (symtab_shndx_idx != ~0U) { 553 Elf32_Word *p; 554 if (symtab_idx != sechdrs[symtab_shndx_idx].sh_link) 555 fatal("%s: SYMTAB_SHNDX has bad sh_link: %u!=%u\n", 556 filename, sechdrs[symtab_shndx_idx].sh_link, 557 symtab_idx); 558 /* Fix endianness */ 559 for (p = info->symtab_shndx_start; p < info->symtab_shndx_stop; 560 p++) 561 *p = TO_NATIVE(*p); 562 } 563 564 symsearch_init(info); 565 566 return 1; 567 } 568 569 static void parse_elf_finish(struct elf_info *info) 570 { 571 symsearch_finish(info); 572 release_file(info->hdr, info->size); 573 } 574 575 static int ignore_undef_symbol(struct elf_info *info, const char *symname) 576 { 577 /* ignore __this_module, it will be resolved shortly */ 578 if (strcmp(symname, "__this_module") == 0) 579 return 1; 580 /* ignore global offset table */ 581 if (strcmp(symname, "_GLOBAL_OFFSET_TABLE_") == 0) 582 return 1; 583 if (info->hdr->e_machine == EM_PPC) 584 /* Special register function linked on all modules during final link of .ko */ 585 if (strstarts(symname, "_restgpr_") || 586 strstarts(symname, "_savegpr_") || 587 strstarts(symname, "_rest32gpr_") || 588 strstarts(symname, "_save32gpr_") || 589 strstarts(symname, "_restvr_") || 590 strstarts(symname, "_savevr_")) 591 return 1; 592 if (info->hdr->e_machine == EM_PPC64) 593 /* Special register function linked on all modules during final link of .ko */ 594 if (strstarts(symname, "_restgpr0_") || 595 strstarts(symname, "_savegpr0_") || 596 strstarts(symname, "_restvr_") || 597 strstarts(symname, "_savevr_") || 598 strcmp(symname, ".TOC.") == 0) 599 return 1; 600 /* Do not ignore this symbol */ 601 return 0; 602 } 603 604 static void handle_symbol(struct module *mod, struct elf_info *info, 605 const Elf_Sym *sym, const char *symname) 606 { 607 switch (sym->st_shndx) { 608 case SHN_COMMON: 609 if (strstarts(symname, "__gnu_lto_")) { 610 /* Should warn here, but modpost runs before the linker */ 611 } else 612 warn("\"%s\" [%s] is COMMON symbol\n", symname, mod->name); 613 break; 614 case SHN_UNDEF: 615 /* undefined symbol */ 616 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL && 617 ELF_ST_BIND(sym->st_info) != STB_WEAK) 618 break; 619 if (ignore_undef_symbol(info, symname)) 620 break; 621 if (info->hdr->e_machine == EM_SPARC || 622 info->hdr->e_machine == EM_SPARCV9) { 623 /* Ignore register directives. */ 624 if (ELF_ST_TYPE(sym->st_info) == STT_SPARC_REGISTER) 625 break; 626 if (symname[0] == '.') { 627 char *munged = xstrdup(symname); 628 munged[0] = '_'; 629 munged[1] = toupper(munged[1]); 630 symname = munged; 631 } 632 } 633 634 sym_add_unresolved(symname, mod, 635 ELF_ST_BIND(sym->st_info) == STB_WEAK); 636 break; 637 default: 638 if (strcmp(symname, "init_module") == 0) 639 mod->has_init = true; 640 if (strcmp(symname, "cleanup_module") == 0) 641 mod->has_cleanup = true; 642 break; 643 } 644 } 645 646 /** 647 * Parse tag=value strings from .modinfo section 648 **/ 649 static char *next_string(char *string, unsigned long *secsize) 650 { 651 /* Skip non-zero chars */ 652 while (string[0]) { 653 string++; 654 if ((*secsize)-- <= 1) 655 return NULL; 656 } 657 658 /* Skip any zero padding. */ 659 while (!string[0]) { 660 string++; 661 if ((*secsize)-- <= 1) 662 return NULL; 663 } 664 return string; 665 } 666 667 static char *get_next_modinfo(struct elf_info *info, const char *tag, 668 char *prev) 669 { 670 char *p; 671 unsigned int taglen = strlen(tag); 672 char *modinfo = info->modinfo; 673 unsigned long size = info->modinfo_len; 674 675 if (prev) { 676 size -= prev - modinfo; 677 modinfo = next_string(prev, &size); 678 } 679 680 for (p = modinfo; p; p = next_string(p, &size)) { 681 if (strncmp(p, tag, taglen) == 0 && p[taglen] == '=') 682 return p + taglen + 1; 683 } 684 return NULL; 685 } 686 687 static char *get_modinfo(struct elf_info *info, const char *tag) 688 689 { 690 return get_next_modinfo(info, tag, NULL); 691 } 692 693 static const char *sym_name(struct elf_info *elf, Elf_Sym *sym) 694 { 695 return sym ? elf->strtab + sym->st_name : ""; 696 } 697 698 /* 699 * Check whether the 'string' argument matches one of the 'patterns', 700 * an array of shell wildcard patterns (glob). 701 * 702 * Return true is there is a match. 703 */ 704 static bool match(const char *string, const char *const patterns[]) 705 { 706 const char *pattern; 707 708 while ((pattern = *patterns++)) { 709 if (!fnmatch(pattern, string, 0)) 710 return true; 711 } 712 713 return false; 714 } 715 716 /* useful to pass patterns to match() directly */ 717 #define PATTERNS(...) \ 718 ({ \ 719 static const char *const patterns[] = {__VA_ARGS__, NULL}; \ 720 patterns; \ 721 }) 722 723 /* sections that we do not want to do full section mismatch check on */ 724 static const char *const section_white_list[] = 725 { 726 ".comment*", 727 ".debug*", 728 ".zdebug*", /* Compressed debug sections. */ 729 ".GCC.command.line", /* record-gcc-switches */ 730 ".mdebug*", /* alpha, score, mips etc. */ 731 ".pdr", /* alpha, score, mips etc. */ 732 ".stab*", 733 ".note*", 734 ".got*", 735 ".toc*", 736 ".xt.prop", /* xtensa */ 737 ".xt.lit", /* xtensa */ 738 ".arcextmap*", /* arc */ 739 ".gnu.linkonce.arcext*", /* arc : modules */ 740 ".cmem*", /* EZchip */ 741 ".fmt_slot*", /* EZchip */ 742 ".gnu.lto*", 743 ".discard.*", 744 ".llvm.call-graph-profile", /* call graph */ 745 NULL 746 }; 747 748 /* 749 * This is used to find sections missing the SHF_ALLOC flag. 750 * The cause of this is often a section specified in assembler 751 * without "ax" / "aw". 752 */ 753 static void check_section(const char *modname, struct elf_info *elf, 754 Elf_Shdr *sechdr) 755 { 756 const char *sec = sech_name(elf, sechdr); 757 758 if (sechdr->sh_type == SHT_PROGBITS && 759 !(sechdr->sh_flags & SHF_ALLOC) && 760 !match(sec, section_white_list)) { 761 warn("%s (%s): unexpected non-allocatable section.\n" 762 "Did you forget to use \"ax\"/\"aw\" in a .S file?\n" 763 "Note that for example <linux/init.h> contains\n" 764 "section definitions for use in .S files.\n\n", 765 modname, sec); 766 } 767 } 768 769 770 771 #define ALL_INIT_DATA_SECTIONS \ 772 ".init.setup", ".init.rodata", ".init.data" 773 774 #define ALL_PCI_INIT_SECTIONS \ 775 ".pci_fixup_early", ".pci_fixup_header", ".pci_fixup_final", \ 776 ".pci_fixup_enable", ".pci_fixup_resume", \ 777 ".pci_fixup_resume_early", ".pci_fixup_suspend" 778 779 #define ALL_INIT_SECTIONS ".init.*" 780 #define ALL_EXIT_SECTIONS ".exit.*" 781 782 #define DATA_SECTIONS ".data", ".data.rel" 783 #define TEXT_SECTIONS ".text", ".text.*", ".sched.text", \ 784 ".kprobes.text", ".cpuidle.text", ".noinstr.text", \ 785 ".ltext", ".ltext.*" 786 #define OTHER_TEXT_SECTIONS ".ref.text", ".head.text", ".spinlock.text", \ 787 ".fixup", ".entry.text", ".exception.text", \ 788 ".coldtext", ".softirqentry.text" 789 790 #define ALL_TEXT_SECTIONS ".init.text", ".exit.text", \ 791 TEXT_SECTIONS, OTHER_TEXT_SECTIONS 792 793 enum mismatch { 794 TEXTDATA_TO_ANY_INIT_EXIT, 795 XXXINIT_TO_SOME_INIT, 796 ANY_INIT_TO_ANY_EXIT, 797 ANY_EXIT_TO_ANY_INIT, 798 EXTABLE_TO_NON_TEXT, 799 }; 800 801 /** 802 * Describe how to match sections on different criteria: 803 * 804 * @fromsec: Array of sections to be matched. 805 * 806 * @bad_tosec: Relocations applied to a section in @fromsec to a section in 807 * this array is forbidden (black-list). Can be empty. 808 * 809 * @good_tosec: Relocations applied to a section in @fromsec must be 810 * targeting sections in this array (white-list). Can be empty. 811 * 812 * @mismatch: Type of mismatch. 813 */ 814 struct sectioncheck { 815 const char *fromsec[20]; 816 const char *bad_tosec[20]; 817 const char *good_tosec[20]; 818 enum mismatch mismatch; 819 }; 820 821 static const struct sectioncheck sectioncheck[] = { 822 /* Do not reference init/exit code/data from 823 * normal code and data 824 */ 825 { 826 .fromsec = { TEXT_SECTIONS, DATA_SECTIONS, NULL }, 827 .bad_tosec = { ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS, NULL }, 828 .mismatch = TEXTDATA_TO_ANY_INIT_EXIT, 829 }, 830 /* Do not use exit code/data from init code */ 831 { 832 .fromsec = { ALL_INIT_SECTIONS, NULL }, 833 .bad_tosec = { ALL_EXIT_SECTIONS, NULL }, 834 .mismatch = ANY_INIT_TO_ANY_EXIT, 835 }, 836 /* Do not use init code/data from exit code */ 837 { 838 .fromsec = { ALL_EXIT_SECTIONS, NULL }, 839 .bad_tosec = { ALL_INIT_SECTIONS, NULL }, 840 .mismatch = ANY_EXIT_TO_ANY_INIT, 841 }, 842 { 843 .fromsec = { ALL_PCI_INIT_SECTIONS, NULL }, 844 .bad_tosec = { ALL_INIT_SECTIONS, NULL }, 845 .mismatch = ANY_INIT_TO_ANY_EXIT, 846 }, 847 { 848 .fromsec = { "__ex_table", NULL }, 849 /* If you're adding any new black-listed sections in here, consider 850 * adding a special 'printer' for them in scripts/check_extable. 851 */ 852 .bad_tosec = { ".altinstr_replacement", NULL }, 853 .good_tosec = {ALL_TEXT_SECTIONS , NULL}, 854 .mismatch = EXTABLE_TO_NON_TEXT, 855 } 856 }; 857 858 static const struct sectioncheck *section_mismatch( 859 const char *fromsec, const char *tosec) 860 { 861 int i; 862 863 /* 864 * The target section could be the SHT_NUL section when we're 865 * handling relocations to un-resolved symbols, trying to match it 866 * doesn't make much sense and causes build failures on parisc 867 * architectures. 868 */ 869 if (*tosec == '\0') 870 return NULL; 871 872 for (i = 0; i < ARRAY_SIZE(sectioncheck); i++) { 873 const struct sectioncheck *check = §ioncheck[i]; 874 875 if (match(fromsec, check->fromsec)) { 876 if (check->bad_tosec[0] && match(tosec, check->bad_tosec)) 877 return check; 878 if (check->good_tosec[0] && !match(tosec, check->good_tosec)) 879 return check; 880 } 881 } 882 return NULL; 883 } 884 885 /** 886 * Whitelist to allow certain references to pass with no warning. 887 * 888 * Pattern 1: 889 * If a module parameter is declared __initdata and permissions=0 890 * then this is legal despite the warning generated. 891 * We cannot see value of permissions here, so just ignore 892 * this pattern. 893 * The pattern is identified by: 894 * tosec = .init.data 895 * fromsec = .data* 896 * atsym =__param* 897 * 898 * Pattern 1a: 899 * module_param_call() ops can refer to __init set function if permissions=0 900 * The pattern is identified by: 901 * tosec = .init.text 902 * fromsec = .data* 903 * atsym = __param_ops_* 904 * 905 * Pattern 3: 906 * Whitelist all references from .head.text to any init section 907 * 908 * Pattern 4: 909 * Some symbols belong to init section but still it is ok to reference 910 * these from non-init sections as these symbols don't have any memory 911 * allocated for them and symbol address and value are same. So even 912 * if init section is freed, its ok to reference those symbols. 913 * For ex. symbols marking the init section boundaries. 914 * This pattern is identified by 915 * refsymname = __init_begin, _sinittext, _einittext 916 * 917 * Pattern 5: 918 * GCC may optimize static inlines when fed constant arg(s) resulting 919 * in functions like cpumask_empty() -- generating an associated symbol 920 * cpumask_empty.constprop.3 that appears in the audit. If the const that 921 * is passed in comes from __init, like say nmi_ipi_mask, we get a 922 * meaningless section warning. May need to add isra symbols too... 923 * This pattern is identified by 924 * tosec = init section 925 * fromsec = text section 926 * refsymname = *.constprop.* 927 * 928 **/ 929 static int secref_whitelist(const char *fromsec, const char *fromsym, 930 const char *tosec, const char *tosym) 931 { 932 /* Check for pattern 1 */ 933 if (match(tosec, PATTERNS(ALL_INIT_DATA_SECTIONS)) && 934 match(fromsec, PATTERNS(DATA_SECTIONS)) && 935 strstarts(fromsym, "__param")) 936 return 0; 937 938 /* Check for pattern 1a */ 939 if (strcmp(tosec, ".init.text") == 0 && 940 match(fromsec, PATTERNS(DATA_SECTIONS)) && 941 strstarts(fromsym, "__param_ops_")) 942 return 0; 943 944 /* symbols in data sections that may refer to any init/exit sections */ 945 if (match(fromsec, PATTERNS(DATA_SECTIONS)) && 946 match(tosec, PATTERNS(ALL_INIT_SECTIONS, ALL_EXIT_SECTIONS)) && 947 match(fromsym, PATTERNS("*_ops", "*_probe", "*_console"))) 948 return 0; 949 950 /* Check for pattern 3 */ 951 if (strstarts(fromsec, ".head.text") && 952 match(tosec, PATTERNS(ALL_INIT_SECTIONS))) 953 return 0; 954 955 /* Check for pattern 4 */ 956 if (match(tosym, PATTERNS("__init_begin", "_sinittext", "_einittext"))) 957 return 0; 958 959 /* Check for pattern 5 */ 960 if (match(fromsec, PATTERNS(ALL_TEXT_SECTIONS)) && 961 match(tosec, PATTERNS(ALL_INIT_SECTIONS)) && 962 match(fromsym, PATTERNS("*.constprop.*"))) 963 return 0; 964 965 return 1; 966 } 967 968 static Elf_Sym *find_fromsym(struct elf_info *elf, Elf_Addr addr, 969 unsigned int secndx) 970 { 971 return symsearch_find_nearest(elf, addr, secndx, false, ~0); 972 } 973 974 static Elf_Sym *find_tosym(struct elf_info *elf, Elf_Addr addr, Elf_Sym *sym) 975 { 976 Elf_Sym *new_sym; 977 978 /* If the supplied symbol has a valid name, return it */ 979 if (is_valid_name(elf, sym)) 980 return sym; 981 982 /* 983 * Strive to find a better symbol name, but the resulting name may not 984 * match the symbol referenced in the original code. 985 */ 986 new_sym = symsearch_find_nearest(elf, addr, get_secindex(elf, sym), 987 true, 20); 988 return new_sym ? new_sym : sym; 989 } 990 991 static bool is_executable_section(struct elf_info *elf, unsigned int secndx) 992 { 993 if (secndx >= elf->num_sections) 994 return false; 995 996 return (elf->sechdrs[secndx].sh_flags & SHF_EXECINSTR) != 0; 997 } 998 999 static void default_mismatch_handler(const char *modname, struct elf_info *elf, 1000 const struct sectioncheck* const mismatch, 1001 Elf_Sym *tsym, 1002 unsigned int fsecndx, const char *fromsec, Elf_Addr faddr, 1003 const char *tosec, Elf_Addr taddr) 1004 { 1005 Elf_Sym *from; 1006 const char *tosym; 1007 const char *fromsym; 1008 char taddr_str[16]; 1009 1010 from = find_fromsym(elf, faddr, fsecndx); 1011 fromsym = sym_name(elf, from); 1012 1013 tsym = find_tosym(elf, taddr, tsym); 1014 tosym = sym_name(elf, tsym); 1015 1016 /* check whitelist - we may ignore it */ 1017 if (!secref_whitelist(fromsec, fromsym, tosec, tosym)) 1018 return; 1019 1020 sec_mismatch_count++; 1021 1022 if (!tosym[0]) 1023 snprintf(taddr_str, sizeof(taddr_str), "0x%x", (unsigned int)taddr); 1024 1025 /* 1026 * The format for the reference source: <symbol_name>+<offset> or <address> 1027 * The format for the reference destination: <symbol_name> or <address> 1028 */ 1029 warn("%s: section mismatch in reference: %s%s0x%x (section: %s) -> %s (section: %s)\n", 1030 modname, fromsym, fromsym[0] ? "+" : "", 1031 (unsigned int)(faddr - (fromsym[0] ? from->st_value : 0)), 1032 fromsec, tosym[0] ? tosym : taddr_str, tosec); 1033 1034 if (mismatch->mismatch == EXTABLE_TO_NON_TEXT) { 1035 if (match(tosec, mismatch->bad_tosec)) 1036 fatal("The relocation at %s+0x%lx references\n" 1037 "section \"%s\" which is black-listed.\n" 1038 "Something is seriously wrong and should be fixed.\n" 1039 "You might get more information about where this is\n" 1040 "coming from by using scripts/check_extable.sh %s\n", 1041 fromsec, (long)faddr, tosec, modname); 1042 else if (is_executable_section(elf, get_secindex(elf, tsym))) 1043 warn("The relocation at %s+0x%lx references\n" 1044 "section \"%s\" which is not in the list of\n" 1045 "authorized sections. If you're adding a new section\n" 1046 "and/or if this reference is valid, add \"%s\" to the\n" 1047 "list of authorized sections to jump to on fault.\n" 1048 "This can be achieved by adding \"%s\" to\n" 1049 "OTHER_TEXT_SECTIONS in scripts/mod/modpost.c.\n", 1050 fromsec, (long)faddr, tosec, tosec, tosec); 1051 else 1052 error("%s+0x%lx references non-executable section '%s'\n", 1053 fromsec, (long)faddr, tosec); 1054 } 1055 } 1056 1057 static void check_export_symbol(struct module *mod, struct elf_info *elf, 1058 Elf_Addr faddr, const char *secname, 1059 Elf_Sym *sym) 1060 { 1061 static const char *prefix = "__export_symbol_"; 1062 const char *label_name, *name, *data; 1063 Elf_Sym *label; 1064 struct symbol *s; 1065 bool is_gpl; 1066 1067 label = find_fromsym(elf, faddr, elf->export_symbol_secndx); 1068 label_name = sym_name(elf, label); 1069 1070 if (!strstarts(label_name, prefix)) { 1071 error("%s: .export_symbol section contains strange symbol '%s'\n", 1072 mod->name, label_name); 1073 return; 1074 } 1075 1076 if (ELF_ST_BIND(sym->st_info) != STB_GLOBAL && 1077 ELF_ST_BIND(sym->st_info) != STB_WEAK) { 1078 error("%s: local symbol '%s' was exported\n", mod->name, 1079 label_name + strlen(prefix)); 1080 return; 1081 } 1082 1083 name = sym_name(elf, sym); 1084 if (strcmp(label_name + strlen(prefix), name)) { 1085 error("%s: .export_symbol section references '%s', but it does not seem to be an export symbol\n", 1086 mod->name, name); 1087 return; 1088 } 1089 1090 data = sym_get_data(elf, label); /* license */ 1091 if (!strcmp(data, "GPL")) { 1092 is_gpl = true; 1093 } else if (!strcmp(data, "")) { 1094 is_gpl = false; 1095 } else { 1096 error("%s: unknown license '%s' was specified for '%s'\n", 1097 mod->name, data, name); 1098 return; 1099 } 1100 1101 data += strlen(data) + 1; /* namespace */ 1102 s = sym_add_exported(name, mod, is_gpl, data); 1103 1104 /* 1105 * We need to be aware whether we are exporting a function or 1106 * a data on some architectures. 1107 */ 1108 s->is_func = (ELF_ST_TYPE(sym->st_info) == STT_FUNC); 1109 1110 /* 1111 * For parisc64, symbols prefixed $$ from the library have the symbol type 1112 * STT_LOPROC. They should be handled as functions too. 1113 */ 1114 if (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64 && 1115 elf->hdr->e_machine == EM_PARISC && 1116 ELF_ST_TYPE(sym->st_info) == STT_LOPROC) 1117 s->is_func = true; 1118 1119 if (match(secname, PATTERNS(ALL_INIT_SECTIONS))) 1120 warn("%s: %s: EXPORT_SYMBOL used for init symbol. Remove __init or EXPORT_SYMBOL.\n", 1121 mod->name, name); 1122 else if (match(secname, PATTERNS(ALL_EXIT_SECTIONS))) 1123 warn("%s: %s: EXPORT_SYMBOL used for exit symbol. Remove __exit or EXPORT_SYMBOL.\n", 1124 mod->name, name); 1125 } 1126 1127 static void check_section_mismatch(struct module *mod, struct elf_info *elf, 1128 Elf_Sym *sym, 1129 unsigned int fsecndx, const char *fromsec, 1130 Elf_Addr faddr, Elf_Addr taddr) 1131 { 1132 const char *tosec = sec_name(elf, get_secindex(elf, sym)); 1133 const struct sectioncheck *mismatch; 1134 1135 if (module_enabled && elf->export_symbol_secndx == fsecndx) { 1136 check_export_symbol(mod, elf, faddr, tosec, sym); 1137 return; 1138 } 1139 1140 mismatch = section_mismatch(fromsec, tosec); 1141 if (!mismatch) 1142 return; 1143 1144 default_mismatch_handler(mod->name, elf, mismatch, sym, 1145 fsecndx, fromsec, faddr, 1146 tosec, taddr); 1147 } 1148 1149 static Elf_Addr addend_386_rel(uint32_t *location, unsigned int r_type) 1150 { 1151 switch (r_type) { 1152 case R_386_32: 1153 return TO_NATIVE(*location); 1154 case R_386_PC32: 1155 return TO_NATIVE(*location) + 4; 1156 } 1157 1158 return (Elf_Addr)(-1); 1159 } 1160 1161 static int32_t sign_extend32(int32_t value, int index) 1162 { 1163 uint8_t shift = 31 - index; 1164 1165 return (int32_t)(value << shift) >> shift; 1166 } 1167 1168 static Elf_Addr addend_arm_rel(void *loc, Elf_Sym *sym, unsigned int r_type) 1169 { 1170 uint32_t inst, upper, lower, sign, j1, j2; 1171 int32_t offset; 1172 1173 switch (r_type) { 1174 case R_ARM_ABS32: 1175 case R_ARM_REL32: 1176 inst = TO_NATIVE(*(uint32_t *)loc); 1177 return inst + sym->st_value; 1178 case R_ARM_MOVW_ABS_NC: 1179 case R_ARM_MOVT_ABS: 1180 inst = TO_NATIVE(*(uint32_t *)loc); 1181 offset = sign_extend32(((inst & 0xf0000) >> 4) | (inst & 0xfff), 1182 15); 1183 return offset + sym->st_value; 1184 case R_ARM_PC24: 1185 case R_ARM_CALL: 1186 case R_ARM_JUMP24: 1187 inst = TO_NATIVE(*(uint32_t *)loc); 1188 offset = sign_extend32((inst & 0x00ffffff) << 2, 25); 1189 return offset + sym->st_value + 8; 1190 case R_ARM_THM_MOVW_ABS_NC: 1191 case R_ARM_THM_MOVT_ABS: 1192 upper = TO_NATIVE(*(uint16_t *)loc); 1193 lower = TO_NATIVE(*((uint16_t *)loc + 1)); 1194 offset = sign_extend32(((upper & 0x000f) << 12) | 1195 ((upper & 0x0400) << 1) | 1196 ((lower & 0x7000) >> 4) | 1197 (lower & 0x00ff), 1198 15); 1199 return offset + sym->st_value; 1200 case R_ARM_THM_JUMP19: 1201 /* 1202 * Encoding T3: 1203 * S = upper[10] 1204 * imm6 = upper[5:0] 1205 * J1 = lower[13] 1206 * J2 = lower[11] 1207 * imm11 = lower[10:0] 1208 * imm32 = SignExtend(S:J2:J1:imm6:imm11:'0') 1209 */ 1210 upper = TO_NATIVE(*(uint16_t *)loc); 1211 lower = TO_NATIVE(*((uint16_t *)loc + 1)); 1212 1213 sign = (upper >> 10) & 1; 1214 j1 = (lower >> 13) & 1; 1215 j2 = (lower >> 11) & 1; 1216 offset = sign_extend32((sign << 20) | (j2 << 19) | (j1 << 18) | 1217 ((upper & 0x03f) << 12) | 1218 ((lower & 0x07ff) << 1), 1219 20); 1220 return offset + sym->st_value + 4; 1221 case R_ARM_THM_PC22: 1222 case R_ARM_THM_JUMP24: 1223 /* 1224 * Encoding T4: 1225 * S = upper[10] 1226 * imm10 = upper[9:0] 1227 * J1 = lower[13] 1228 * J2 = lower[11] 1229 * imm11 = lower[10:0] 1230 * I1 = NOT(J1 XOR S) 1231 * I2 = NOT(J2 XOR S) 1232 * imm32 = SignExtend(S:I1:I2:imm10:imm11:'0') 1233 */ 1234 upper = TO_NATIVE(*(uint16_t *)loc); 1235 lower = TO_NATIVE(*((uint16_t *)loc + 1)); 1236 1237 sign = (upper >> 10) & 1; 1238 j1 = (lower >> 13) & 1; 1239 j2 = (lower >> 11) & 1; 1240 offset = sign_extend32((sign << 24) | 1241 ((~(j1 ^ sign) & 1) << 23) | 1242 ((~(j2 ^ sign) & 1) << 22) | 1243 ((upper & 0x03ff) << 12) | 1244 ((lower & 0x07ff) << 1), 1245 24); 1246 return offset + sym->st_value + 4; 1247 } 1248 1249 return (Elf_Addr)(-1); 1250 } 1251 1252 static Elf_Addr addend_mips_rel(uint32_t *location, unsigned int r_type) 1253 { 1254 uint32_t inst; 1255 1256 inst = TO_NATIVE(*location); 1257 switch (r_type) { 1258 case R_MIPS_LO16: 1259 return inst & 0xffff; 1260 case R_MIPS_26: 1261 return (inst & 0x03ffffff) << 2; 1262 case R_MIPS_32: 1263 return inst; 1264 } 1265 return (Elf_Addr)(-1); 1266 } 1267 1268 #ifndef EM_RISCV 1269 #define EM_RISCV 243 1270 #endif 1271 1272 #ifndef R_RISCV_SUB32 1273 #define R_RISCV_SUB32 39 1274 #endif 1275 1276 #ifndef EM_LOONGARCH 1277 #define EM_LOONGARCH 258 1278 #endif 1279 1280 #ifndef R_LARCH_SUB32 1281 #define R_LARCH_SUB32 55 1282 #endif 1283 1284 #ifndef R_LARCH_RELAX 1285 #define R_LARCH_RELAX 100 1286 #endif 1287 1288 #ifndef R_LARCH_ALIGN 1289 #define R_LARCH_ALIGN 102 1290 #endif 1291 1292 static void get_rel_type_and_sym(struct elf_info *elf, uint64_t r_info, 1293 unsigned int *r_type, unsigned int *r_sym) 1294 { 1295 typedef struct { 1296 Elf64_Word r_sym; /* Symbol index */ 1297 unsigned char r_ssym; /* Special symbol for 2nd relocation */ 1298 unsigned char r_type3; /* 3rd relocation type */ 1299 unsigned char r_type2; /* 2nd relocation type */ 1300 unsigned char r_type; /* 1st relocation type */ 1301 } Elf64_Mips_R_Info; 1302 1303 bool is_64bit = (elf->hdr->e_ident[EI_CLASS] == ELFCLASS64); 1304 1305 if (elf->hdr->e_machine == EM_MIPS && is_64bit) { 1306 Elf64_Mips_R_Info *mips64_r_info = (void *)&r_info; 1307 1308 *r_type = mips64_r_info->r_type; 1309 *r_sym = TO_NATIVE(mips64_r_info->r_sym); 1310 return; 1311 } 1312 1313 if (is_64bit) 1314 r_info = TO_NATIVE((Elf64_Xword)r_info); 1315 else 1316 r_info = TO_NATIVE((Elf32_Word)r_info); 1317 1318 *r_type = ELF_R_TYPE(r_info); 1319 *r_sym = ELF_R_SYM(r_info); 1320 } 1321 1322 static void section_rela(struct module *mod, struct elf_info *elf, 1323 unsigned int fsecndx, const char *fromsec, 1324 const Elf_Rela *start, const Elf_Rela *stop) 1325 { 1326 const Elf_Rela *rela; 1327 1328 for (rela = start; rela < stop; rela++) { 1329 Elf_Sym *tsym; 1330 Elf_Addr taddr, r_offset; 1331 unsigned int r_type, r_sym; 1332 1333 r_offset = TO_NATIVE(rela->r_offset); 1334 get_rel_type_and_sym(elf, rela->r_info, &r_type, &r_sym); 1335 1336 tsym = elf->symtab_start + r_sym; 1337 taddr = tsym->st_value + TO_NATIVE(rela->r_addend); 1338 1339 switch (elf->hdr->e_machine) { 1340 case EM_RISCV: 1341 if (!strcmp("__ex_table", fromsec) && 1342 r_type == R_RISCV_SUB32) 1343 continue; 1344 break; 1345 case EM_LOONGARCH: 1346 switch (r_type) { 1347 case R_LARCH_SUB32: 1348 if (!strcmp("__ex_table", fromsec)) 1349 continue; 1350 break; 1351 case R_LARCH_RELAX: 1352 case R_LARCH_ALIGN: 1353 /* These relocs do not refer to symbols */ 1354 continue; 1355 } 1356 break; 1357 } 1358 1359 check_section_mismatch(mod, elf, tsym, 1360 fsecndx, fromsec, r_offset, taddr); 1361 } 1362 } 1363 1364 static void section_rel(struct module *mod, struct elf_info *elf, 1365 unsigned int fsecndx, const char *fromsec, 1366 const Elf_Rel *start, const Elf_Rel *stop) 1367 { 1368 const Elf_Rel *rel; 1369 1370 for (rel = start; rel < stop; rel++) { 1371 Elf_Sym *tsym; 1372 Elf_Addr taddr, r_offset; 1373 unsigned int r_type, r_sym; 1374 void *loc; 1375 1376 r_offset = TO_NATIVE(rel->r_offset); 1377 get_rel_type_and_sym(elf, rel->r_info, &r_type, &r_sym); 1378 1379 loc = sym_get_data_by_offset(elf, fsecndx, r_offset); 1380 tsym = elf->symtab_start + r_sym; 1381 1382 switch (elf->hdr->e_machine) { 1383 case EM_386: 1384 taddr = addend_386_rel(loc, r_type); 1385 break; 1386 case EM_ARM: 1387 taddr = addend_arm_rel(loc, tsym, r_type); 1388 break; 1389 case EM_MIPS: 1390 taddr = addend_mips_rel(loc, r_type); 1391 break; 1392 default: 1393 fatal("Please add code to calculate addend for this architecture\n"); 1394 } 1395 1396 check_section_mismatch(mod, elf, tsym, 1397 fsecndx, fromsec, r_offset, taddr); 1398 } 1399 } 1400 1401 /** 1402 * A module includes a number of sections that are discarded 1403 * either when loaded or when used as built-in. 1404 * For loaded modules all functions marked __init and all data 1405 * marked __initdata will be discarded when the module has been initialized. 1406 * Likewise for modules used built-in the sections marked __exit 1407 * are discarded because __exit marked function are supposed to be called 1408 * only when a module is unloaded which never happens for built-in modules. 1409 * The check_sec_ref() function traverses all relocation records 1410 * to find all references to a section that reference a section that will 1411 * be discarded and warns about it. 1412 **/ 1413 static void check_sec_ref(struct module *mod, struct elf_info *elf) 1414 { 1415 int i; 1416 1417 /* Walk through all sections */ 1418 for (i = 0; i < elf->num_sections; i++) { 1419 Elf_Shdr *sechdr = &elf->sechdrs[i]; 1420 1421 check_section(mod->name, elf, sechdr); 1422 /* We want to process only relocation sections and not .init */ 1423 if (sechdr->sh_type == SHT_REL || sechdr->sh_type == SHT_RELA) { 1424 /* section to which the relocation applies */ 1425 unsigned int secndx = sechdr->sh_info; 1426 const char *secname = sec_name(elf, secndx); 1427 const void *start, *stop; 1428 1429 /* If the section is known good, skip it */ 1430 if (match(secname, section_white_list)) 1431 continue; 1432 1433 start = sym_get_data_by_offset(elf, i, 0); 1434 stop = start + sechdr->sh_size; 1435 1436 if (sechdr->sh_type == SHT_RELA) 1437 section_rela(mod, elf, secndx, secname, 1438 start, stop); 1439 else 1440 section_rel(mod, elf, secndx, secname, 1441 start, stop); 1442 } 1443 } 1444 } 1445 1446 static char *remove_dot(char *s) 1447 { 1448 size_t n = strcspn(s, "."); 1449 1450 if (n && s[n]) { 1451 size_t m = strspn(s + n + 1, "0123456789"); 1452 if (m && (s[n + m + 1] == '.' || s[n + m + 1] == 0)) 1453 s[n] = 0; 1454 } 1455 return s; 1456 } 1457 1458 /* 1459 * The CRCs are recorded in .*.cmd files in the form of: 1460 * #SYMVER <name> <crc> 1461 */ 1462 static void extract_crcs_for_object(const char *object, struct module *mod) 1463 { 1464 char cmd_file[PATH_MAX]; 1465 char *buf, *p; 1466 const char *base; 1467 int dirlen, ret; 1468 1469 base = strrchr(object, '/'); 1470 if (base) { 1471 base++; 1472 dirlen = base - object; 1473 } else { 1474 dirlen = 0; 1475 base = object; 1476 } 1477 1478 ret = snprintf(cmd_file, sizeof(cmd_file), "%.*s.%s.cmd", 1479 dirlen, object, base); 1480 if (ret >= sizeof(cmd_file)) { 1481 error("%s: too long path was truncated\n", cmd_file); 1482 return; 1483 } 1484 1485 buf = read_text_file(cmd_file); 1486 p = buf; 1487 1488 while ((p = strstr(p, "\n#SYMVER "))) { 1489 char *name; 1490 size_t namelen; 1491 unsigned int crc; 1492 struct symbol *sym; 1493 1494 name = p + strlen("\n#SYMVER "); 1495 1496 p = strchr(name, ' '); 1497 if (!p) 1498 break; 1499 1500 namelen = p - name; 1501 p++; 1502 1503 if (!isdigit(*p)) 1504 continue; /* skip this line */ 1505 1506 crc = strtoul(p, &p, 0); 1507 if (*p != '\n') 1508 continue; /* skip this line */ 1509 1510 name[namelen] = '\0'; 1511 1512 /* 1513 * sym_find_with_module() may return NULL here. 1514 * It typically occurs when CONFIG_TRIM_UNUSED_KSYMS=y. 1515 * Since commit e1327a127703, genksyms calculates CRCs of all 1516 * symbols, including trimmed ones. Ignore orphan CRCs. 1517 */ 1518 sym = sym_find_with_module(name, mod); 1519 if (sym) 1520 sym_set_crc(sym, crc); 1521 } 1522 1523 free(buf); 1524 } 1525 1526 /* 1527 * The symbol versions (CRC) are recorded in the .*.cmd files. 1528 * Parse them to retrieve CRCs for the current module. 1529 */ 1530 static void mod_set_crcs(struct module *mod) 1531 { 1532 char objlist[PATH_MAX]; 1533 char *buf, *p, *obj; 1534 int ret; 1535 1536 if (mod->is_vmlinux) { 1537 strcpy(objlist, ".vmlinux.objs"); 1538 } else { 1539 /* objects for a module are listed in the *.mod file. */ 1540 ret = snprintf(objlist, sizeof(objlist), "%s.mod", mod->name); 1541 if (ret >= sizeof(objlist)) { 1542 error("%s: too long path was truncated\n", objlist); 1543 return; 1544 } 1545 } 1546 1547 buf = read_text_file(objlist); 1548 p = buf; 1549 1550 while ((obj = strsep(&p, "\n")) && obj[0]) 1551 extract_crcs_for_object(obj, mod); 1552 1553 free(buf); 1554 } 1555 1556 static void read_symbols(const char *modname) 1557 { 1558 const char *symname; 1559 char *version; 1560 char *license; 1561 char *namespace; 1562 struct module *mod; 1563 struct elf_info info = { }; 1564 Elf_Sym *sym; 1565 1566 if (!parse_elf(&info, modname)) 1567 return; 1568 1569 if (!strends(modname, ".o")) { 1570 error("%s: filename must be suffixed with .o\n", modname); 1571 return; 1572 } 1573 1574 /* strip trailing .o */ 1575 mod = new_module(modname, strlen(modname) - strlen(".o")); 1576 1577 if (!mod->is_vmlinux) { 1578 license = get_modinfo(&info, "license"); 1579 if (!license) 1580 error("missing MODULE_LICENSE() in %s\n", modname); 1581 while (license) { 1582 if (!license_is_gpl_compatible(license)) { 1583 mod->is_gpl_compatible = false; 1584 break; 1585 } 1586 license = get_next_modinfo(&info, "license", license); 1587 } 1588 1589 namespace = get_modinfo(&info, "import_ns"); 1590 while (namespace) { 1591 add_namespace(&mod->imported_namespaces, namespace); 1592 namespace = get_next_modinfo(&info, "import_ns", 1593 namespace); 1594 } 1595 1596 if (extra_warn && !get_modinfo(&info, "description")) 1597 warn("missing MODULE_DESCRIPTION() in %s\n", modname); 1598 } 1599 1600 for (sym = info.symtab_start; sym < info.symtab_stop; sym++) { 1601 symname = remove_dot(info.strtab + sym->st_name); 1602 1603 handle_symbol(mod, &info, sym, symname); 1604 handle_moddevtable(mod, &info, sym, symname); 1605 } 1606 1607 check_sec_ref(mod, &info); 1608 1609 if (!mod->is_vmlinux) { 1610 version = get_modinfo(&info, "version"); 1611 if (version || all_versions) 1612 get_src_version(mod->name, mod->srcversion, 1613 sizeof(mod->srcversion) - 1); 1614 } 1615 1616 parse_elf_finish(&info); 1617 1618 if (modversions) { 1619 /* 1620 * Our trick to get versioning for module struct etc. - it's 1621 * never passed as an argument to an exported function, so 1622 * the automatic versioning doesn't pick it up, but it's really 1623 * important anyhow. 1624 */ 1625 sym_add_unresolved("module_layout", mod, false); 1626 1627 mod_set_crcs(mod); 1628 } 1629 } 1630 1631 static void read_symbols_from_files(const char *filename) 1632 { 1633 FILE *in = stdin; 1634 char fname[PATH_MAX]; 1635 1636 in = fopen(filename, "r"); 1637 if (!in) 1638 fatal("Can't open filenames file %s: %m", filename); 1639 1640 while (fgets(fname, PATH_MAX, in) != NULL) { 1641 if (strends(fname, "\n")) 1642 fname[strlen(fname)-1] = '\0'; 1643 read_symbols(fname); 1644 } 1645 1646 fclose(in); 1647 } 1648 1649 #define SZ 500 1650 1651 /* We first write the generated file into memory using the 1652 * following helper, then compare to the file on disk and 1653 * only update the later if anything changed */ 1654 1655 void __attribute__((format(printf, 2, 3))) buf_printf(struct buffer *buf, 1656 const char *fmt, ...) 1657 { 1658 char tmp[SZ]; 1659 int len; 1660 va_list ap; 1661 1662 va_start(ap, fmt); 1663 len = vsnprintf(tmp, SZ, fmt, ap); 1664 buf_write(buf, tmp, len); 1665 va_end(ap); 1666 } 1667 1668 void buf_write(struct buffer *buf, const char *s, int len) 1669 { 1670 if (buf->size - buf->pos < len) { 1671 buf->size += len + SZ; 1672 buf->p = xrealloc(buf->p, buf->size); 1673 } 1674 strncpy(buf->p + buf->pos, s, len); 1675 buf->pos += len; 1676 } 1677 1678 static void check_exports(struct module *mod) 1679 { 1680 struct symbol *s, *exp; 1681 1682 list_for_each_entry(s, &mod->unresolved_symbols, list) { 1683 const char *basename; 1684 exp = find_symbol(s->name); 1685 if (!exp) { 1686 if (!s->weak && nr_unresolved++ < MAX_UNRESOLVED_REPORTS) 1687 modpost_log(!warn_unresolved, 1688 "\"%s\" [%s.ko] undefined!\n", 1689 s->name, mod->name); 1690 continue; 1691 } 1692 if (exp->module == mod) { 1693 error("\"%s\" [%s.ko] was exported without definition\n", 1694 s->name, mod->name); 1695 continue; 1696 } 1697 1698 exp->used = true; 1699 s->module = exp->module; 1700 s->crc_valid = exp->crc_valid; 1701 s->crc = exp->crc; 1702 1703 basename = strrchr(mod->name, '/'); 1704 if (basename) 1705 basename++; 1706 else 1707 basename = mod->name; 1708 1709 if (!contains_namespace(&mod->imported_namespaces, exp->namespace)) { 1710 modpost_log(!allow_missing_ns_imports, 1711 "module %s uses symbol %s from namespace %s, but does not import it.\n", 1712 basename, exp->name, exp->namespace); 1713 add_namespace(&mod->missing_namespaces, exp->namespace); 1714 } 1715 1716 if (!mod->is_gpl_compatible && exp->is_gpl_only) 1717 error("GPL-incompatible module %s.ko uses GPL-only symbol '%s'\n", 1718 basename, exp->name); 1719 } 1720 } 1721 1722 static void handle_white_list_exports(const char *white_list) 1723 { 1724 char *buf, *p, *name; 1725 1726 buf = read_text_file(white_list); 1727 p = buf; 1728 1729 while ((name = strsep(&p, "\n"))) { 1730 struct symbol *sym = find_symbol(name); 1731 1732 if (sym) 1733 sym->used = true; 1734 } 1735 1736 free(buf); 1737 } 1738 1739 static void check_modname_len(struct module *mod) 1740 { 1741 const char *mod_name; 1742 1743 mod_name = strrchr(mod->name, '/'); 1744 if (mod_name == NULL) 1745 mod_name = mod->name; 1746 else 1747 mod_name++; 1748 if (strlen(mod_name) >= MODULE_NAME_LEN) 1749 error("module name is too long [%s.ko]\n", mod->name); 1750 } 1751 1752 /** 1753 * Header for the generated file 1754 **/ 1755 static void add_header(struct buffer *b, struct module *mod) 1756 { 1757 buf_printf(b, "#include <linux/module.h>\n"); 1758 buf_printf(b, "#include <linux/export-internal.h>\n"); 1759 buf_printf(b, "#include <linux/compiler.h>\n"); 1760 buf_printf(b, "\n"); 1761 buf_printf(b, "MODULE_INFO(name, KBUILD_MODNAME);\n"); 1762 buf_printf(b, "\n"); 1763 buf_printf(b, "__visible struct module __this_module\n"); 1764 buf_printf(b, "__section(\".gnu.linkonce.this_module\") = {\n"); 1765 buf_printf(b, "\t.name = KBUILD_MODNAME,\n"); 1766 if (mod->has_init) 1767 buf_printf(b, "\t.init = init_module,\n"); 1768 if (mod->has_cleanup) 1769 buf_printf(b, "#ifdef CONFIG_MODULE_UNLOAD\n" 1770 "\t.exit = cleanup_module,\n" 1771 "#endif\n"); 1772 buf_printf(b, "\t.arch = MODULE_ARCH_INIT,\n"); 1773 buf_printf(b, "};\n"); 1774 1775 if (!external_module) 1776 buf_printf(b, "\nMODULE_INFO(intree, \"Y\");\n"); 1777 1778 if (strstarts(mod->name, "drivers/staging")) 1779 buf_printf(b, "\nMODULE_INFO(staging, \"Y\");\n"); 1780 1781 if (strstarts(mod->name, "tools/testing")) 1782 buf_printf(b, "\nMODULE_INFO(test, \"Y\");\n"); 1783 } 1784 1785 static void add_exported_symbols(struct buffer *buf, struct module *mod) 1786 { 1787 struct symbol *sym; 1788 1789 /* generate struct for exported symbols */ 1790 buf_printf(buf, "\n"); 1791 list_for_each_entry(sym, &mod->exported_symbols, list) { 1792 if (trim_unused_exports && !sym->used) 1793 continue; 1794 1795 buf_printf(buf, "KSYMTAB_%s(%s, \"%s\", \"%s\");\n", 1796 sym->is_func ? "FUNC" : "DATA", sym->name, 1797 sym->is_gpl_only ? "_gpl" : "", sym->namespace); 1798 } 1799 1800 if (!modversions) 1801 return; 1802 1803 /* record CRCs for exported symbols */ 1804 buf_printf(buf, "\n"); 1805 list_for_each_entry(sym, &mod->exported_symbols, list) { 1806 if (trim_unused_exports && !sym->used) 1807 continue; 1808 1809 if (!sym->crc_valid) 1810 warn("EXPORT symbol \"%s\" [%s%s] version generation failed, symbol will not be versioned.\n" 1811 "Is \"%s\" prototyped in <asm/asm-prototypes.h>?\n", 1812 sym->name, mod->name, mod->is_vmlinux ? "" : ".ko", 1813 sym->name); 1814 1815 buf_printf(buf, "SYMBOL_CRC(%s, 0x%08x, \"%s\");\n", 1816 sym->name, sym->crc, sym->is_gpl_only ? "_gpl" : ""); 1817 } 1818 } 1819 1820 /** 1821 * Record CRCs for unresolved symbols 1822 **/ 1823 static void add_versions(struct buffer *b, struct module *mod) 1824 { 1825 struct symbol *s; 1826 1827 if (!modversions) 1828 return; 1829 1830 buf_printf(b, "\n"); 1831 buf_printf(b, "static const struct modversion_info ____versions[]\n"); 1832 buf_printf(b, "__used __section(\"__versions\") = {\n"); 1833 1834 list_for_each_entry(s, &mod->unresolved_symbols, list) { 1835 if (!s->module) 1836 continue; 1837 if (!s->crc_valid) { 1838 warn("\"%s\" [%s.ko] has no CRC!\n", 1839 s->name, mod->name); 1840 continue; 1841 } 1842 if (strlen(s->name) >= MODULE_NAME_LEN) { 1843 error("too long symbol \"%s\" [%s.ko]\n", 1844 s->name, mod->name); 1845 break; 1846 } 1847 buf_printf(b, "\t{ %#8x, \"%s\" },\n", 1848 s->crc, s->name); 1849 } 1850 1851 buf_printf(b, "};\n"); 1852 } 1853 1854 static void add_depends(struct buffer *b, struct module *mod) 1855 { 1856 struct symbol *s; 1857 int first = 1; 1858 1859 /* Clear ->seen flag of modules that own symbols needed by this. */ 1860 list_for_each_entry(s, &mod->unresolved_symbols, list) { 1861 if (s->module) 1862 s->module->seen = s->module->is_vmlinux; 1863 } 1864 1865 buf_printf(b, "\n"); 1866 buf_printf(b, "MODULE_INFO(depends, \""); 1867 list_for_each_entry(s, &mod->unresolved_symbols, list) { 1868 const char *p; 1869 if (!s->module) 1870 continue; 1871 1872 if (s->module->seen) 1873 continue; 1874 1875 s->module->seen = true; 1876 p = strrchr(s->module->name, '/'); 1877 if (p) 1878 p++; 1879 else 1880 p = s->module->name; 1881 buf_printf(b, "%s%s", first ? "" : ",", p); 1882 first = 0; 1883 } 1884 buf_printf(b, "\");\n"); 1885 } 1886 1887 static void add_srcversion(struct buffer *b, struct module *mod) 1888 { 1889 if (mod->srcversion[0]) { 1890 buf_printf(b, "\n"); 1891 buf_printf(b, "MODULE_INFO(srcversion, \"%s\");\n", 1892 mod->srcversion); 1893 } 1894 } 1895 1896 static void write_buf(struct buffer *b, const char *fname) 1897 { 1898 FILE *file; 1899 1900 if (error_occurred) 1901 return; 1902 1903 file = fopen(fname, "w"); 1904 if (!file) { 1905 perror(fname); 1906 exit(1); 1907 } 1908 if (fwrite(b->p, 1, b->pos, file) != b->pos) { 1909 perror(fname); 1910 exit(1); 1911 } 1912 if (fclose(file) != 0) { 1913 perror(fname); 1914 exit(1); 1915 } 1916 } 1917 1918 static void write_if_changed(struct buffer *b, const char *fname) 1919 { 1920 char *tmp; 1921 FILE *file; 1922 struct stat st; 1923 1924 file = fopen(fname, "r"); 1925 if (!file) 1926 goto write; 1927 1928 if (fstat(fileno(file), &st) < 0) 1929 goto close_write; 1930 1931 if (st.st_size != b->pos) 1932 goto close_write; 1933 1934 tmp = xmalloc(b->pos); 1935 if (fread(tmp, 1, b->pos, file) != b->pos) 1936 goto free_write; 1937 1938 if (memcmp(tmp, b->p, b->pos) != 0) 1939 goto free_write; 1940 1941 free(tmp); 1942 fclose(file); 1943 return; 1944 1945 free_write: 1946 free(tmp); 1947 close_write: 1948 fclose(file); 1949 write: 1950 write_buf(b, fname); 1951 } 1952 1953 static void write_vmlinux_export_c_file(struct module *mod) 1954 { 1955 struct buffer buf = { }; 1956 1957 buf_printf(&buf, 1958 "#include <linux/export-internal.h>\n"); 1959 1960 add_exported_symbols(&buf, mod); 1961 write_if_changed(&buf, ".vmlinux.export.c"); 1962 free(buf.p); 1963 } 1964 1965 /* do sanity checks, and generate *.mod.c file */ 1966 static void write_mod_c_file(struct module *mod) 1967 { 1968 struct buffer buf = { }; 1969 char fname[PATH_MAX]; 1970 int ret; 1971 1972 add_header(&buf, mod); 1973 add_exported_symbols(&buf, mod); 1974 add_versions(&buf, mod); 1975 add_depends(&buf, mod); 1976 add_moddevtable(&buf, mod); 1977 add_srcversion(&buf, mod); 1978 1979 ret = snprintf(fname, sizeof(fname), "%s.mod.c", mod->name); 1980 if (ret >= sizeof(fname)) { 1981 error("%s: too long path was truncated\n", fname); 1982 goto free; 1983 } 1984 1985 write_if_changed(&buf, fname); 1986 1987 free: 1988 free(buf.p); 1989 } 1990 1991 /* parse Module.symvers file. line format: 1992 * 0x12345678<tab>symbol<tab>module<tab>export<tab>namespace 1993 **/ 1994 static void read_dump(const char *fname) 1995 { 1996 char *buf, *pos, *line; 1997 1998 buf = read_text_file(fname); 1999 if (!buf) 2000 /* No symbol versions, silently ignore */ 2001 return; 2002 2003 pos = buf; 2004 2005 while ((line = get_line(&pos))) { 2006 char *symname, *namespace, *modname, *d, *export; 2007 unsigned int crc; 2008 struct module *mod; 2009 struct symbol *s; 2010 bool gpl_only; 2011 2012 if (!(symname = strchr(line, '\t'))) 2013 goto fail; 2014 *symname++ = '\0'; 2015 if (!(modname = strchr(symname, '\t'))) 2016 goto fail; 2017 *modname++ = '\0'; 2018 if (!(export = strchr(modname, '\t'))) 2019 goto fail; 2020 *export++ = '\0'; 2021 if (!(namespace = strchr(export, '\t'))) 2022 goto fail; 2023 *namespace++ = '\0'; 2024 2025 crc = strtoul(line, &d, 16); 2026 if (*symname == '\0' || *modname == '\0' || *d != '\0') 2027 goto fail; 2028 2029 if (!strcmp(export, "EXPORT_SYMBOL_GPL")) { 2030 gpl_only = true; 2031 } else if (!strcmp(export, "EXPORT_SYMBOL")) { 2032 gpl_only = false; 2033 } else { 2034 error("%s: unknown license %s. skip", symname, export); 2035 continue; 2036 } 2037 2038 mod = find_module(modname); 2039 if (!mod) { 2040 mod = new_module(modname, strlen(modname)); 2041 mod->from_dump = true; 2042 } 2043 s = sym_add_exported(symname, mod, gpl_only, namespace); 2044 sym_set_crc(s, crc); 2045 } 2046 free(buf); 2047 return; 2048 fail: 2049 free(buf); 2050 fatal("parse error in symbol dump file\n"); 2051 } 2052 2053 static void write_dump(const char *fname) 2054 { 2055 struct buffer buf = { }; 2056 struct module *mod; 2057 struct symbol *sym; 2058 2059 list_for_each_entry(mod, &modules, list) { 2060 if (mod->from_dump) 2061 continue; 2062 list_for_each_entry(sym, &mod->exported_symbols, list) { 2063 if (trim_unused_exports && !sym->used) 2064 continue; 2065 2066 buf_printf(&buf, "0x%08x\t%s\t%s\tEXPORT_SYMBOL%s\t%s\n", 2067 sym->crc, sym->name, mod->name, 2068 sym->is_gpl_only ? "_GPL" : "", 2069 sym->namespace); 2070 } 2071 } 2072 write_buf(&buf, fname); 2073 free(buf.p); 2074 } 2075 2076 static void write_namespace_deps_files(const char *fname) 2077 { 2078 struct module *mod; 2079 struct namespace_list *ns; 2080 struct buffer ns_deps_buf = {}; 2081 2082 list_for_each_entry(mod, &modules, list) { 2083 2084 if (mod->from_dump || list_empty(&mod->missing_namespaces)) 2085 continue; 2086 2087 buf_printf(&ns_deps_buf, "%s.ko:", mod->name); 2088 2089 list_for_each_entry(ns, &mod->missing_namespaces, list) 2090 buf_printf(&ns_deps_buf, " %s", ns->namespace); 2091 2092 buf_printf(&ns_deps_buf, "\n"); 2093 } 2094 2095 write_if_changed(&ns_deps_buf, fname); 2096 free(ns_deps_buf.p); 2097 } 2098 2099 struct dump_list { 2100 struct list_head list; 2101 const char *file; 2102 }; 2103 2104 static void check_host_endian(void) 2105 { 2106 static const union { 2107 short s; 2108 char c[2]; 2109 } endian_test = { .c = {0x01, 0x02} }; 2110 2111 switch (endian_test.s) { 2112 case 0x0102: 2113 host_is_big_endian = true; 2114 break; 2115 case 0x0201: 2116 host_is_big_endian = false; 2117 break; 2118 default: 2119 fatal("Unknown host endian\n"); 2120 } 2121 } 2122 2123 int main(int argc, char **argv) 2124 { 2125 struct module *mod; 2126 char *missing_namespace_deps = NULL; 2127 char *unused_exports_white_list = NULL; 2128 char *dump_write = NULL, *files_source = NULL; 2129 int opt; 2130 LIST_HEAD(dump_lists); 2131 struct dump_list *dl, *dl2; 2132 2133 while ((opt = getopt(argc, argv, "ei:MmnT:to:au:WwENd:")) != -1) { 2134 switch (opt) { 2135 case 'e': 2136 external_module = true; 2137 break; 2138 case 'i': 2139 dl = xmalloc(sizeof(*dl)); 2140 dl->file = optarg; 2141 list_add_tail(&dl->list, &dump_lists); 2142 break; 2143 case 'M': 2144 module_enabled = true; 2145 break; 2146 case 'm': 2147 modversions = true; 2148 break; 2149 case 'n': 2150 ignore_missing_files = true; 2151 break; 2152 case 'o': 2153 dump_write = optarg; 2154 break; 2155 case 'a': 2156 all_versions = true; 2157 break; 2158 case 'T': 2159 files_source = optarg; 2160 break; 2161 case 't': 2162 trim_unused_exports = true; 2163 break; 2164 case 'u': 2165 unused_exports_white_list = optarg; 2166 break; 2167 case 'W': 2168 extra_warn = true; 2169 break; 2170 case 'w': 2171 warn_unresolved = true; 2172 break; 2173 case 'E': 2174 sec_mismatch_warn_only = false; 2175 break; 2176 case 'N': 2177 allow_missing_ns_imports = true; 2178 break; 2179 case 'd': 2180 missing_namespace_deps = optarg; 2181 break; 2182 default: 2183 exit(1); 2184 } 2185 } 2186 2187 check_host_endian(); 2188 2189 list_for_each_entry_safe(dl, dl2, &dump_lists, list) { 2190 read_dump(dl->file); 2191 list_del(&dl->list); 2192 free(dl); 2193 } 2194 2195 while (optind < argc) 2196 read_symbols(argv[optind++]); 2197 2198 if (files_source) 2199 read_symbols_from_files(files_source); 2200 2201 list_for_each_entry(mod, &modules, list) { 2202 if (mod->from_dump || mod->is_vmlinux) 2203 continue; 2204 2205 check_modname_len(mod); 2206 check_exports(mod); 2207 } 2208 2209 if (unused_exports_white_list) 2210 handle_white_list_exports(unused_exports_white_list); 2211 2212 list_for_each_entry(mod, &modules, list) { 2213 if (mod->from_dump) 2214 continue; 2215 2216 if (mod->is_vmlinux) 2217 write_vmlinux_export_c_file(mod); 2218 else 2219 write_mod_c_file(mod); 2220 } 2221 2222 if (missing_namespace_deps) 2223 write_namespace_deps_files(missing_namespace_deps); 2224 2225 if (dump_write) 2226 write_dump(dump_write); 2227 if (sec_mismatch_count && !sec_mismatch_warn_only) 2228 error("Section mismatches detected.\n" 2229 "Set CONFIG_SECTION_MISMATCH_WARN_ONLY=y to allow them.\n"); 2230 2231 if (nr_unresolved > MAX_UNRESOLVED_REPORTS) 2232 warn("suppressed %u unresolved symbol warnings because there were too many)\n", 2233 nr_unresolved - MAX_UNRESOLVED_REPORTS); 2234 2235 return error_occurred ? 1 : 0; 2236 } 2237