lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bf2b3e3c-904b-43c9-a9eb-ab710ff6e7fc@suse.com>
Date: Tue, 22 Oct 2024 16:38:57 +0200
From: Petr Pavlu <petr.pavlu@...e.com>
To: Sami Tolvanen <samitolvanen@...gle.com>
Cc: Masahiro Yamada <masahiroy@...nel.org>,
 Luis Chamberlain <mcgrof@...nel.org>, Miguel Ojeda <ojeda@...nel.org>,
 Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
 Matthew Maurer <mmaurer@...gle.com>, Alex Gaynor <alex.gaynor@...il.com>,
 Gary Guo <gary@...yguo.net>, Petr Pavlu <petr.pavlu@...e.com>,
 Daniel Gomez <da.gomez@...sung.com>, Neal Gompa <neal@...pa.dev>,
 Hector Martin <marcan@...can.st>, Janne Grunau <j@...nau.net>,
 Miroslav Benes <mbenes@...e.cz>, Asahi Linux <asahi@...ts.linux.dev>,
 Sedat Dilek <sedat.dilek@...il.com>, linux-kbuild@...r.kernel.org,
 linux-kernel@...r.kernel.org, linux-modules@...r.kernel.org,
 rust-for-linux@...r.kernel.org
Subject: Re: [PATCH v4 14/19] gendwarfksyms: Add support for kABI rules

On 10/8/24 20:38, Sami Tolvanen wrote:
> Distributions that want to maintain a stable kABI need the ability
> to make ABI compatible changes to kernel without affecting symbol
> versions, either because of LTS updates or backports.
> 
> With genksyms, developers would typically hide these changes from
> version calculation with #ifndef __GENKSYMS__, which would result
> in the symbol version not changing even though the actual type has
> changed.  When we process precompiled object files, this isn't an
> option.
> 
> To support this use case, add a --stable command line flag that
> gates kABI stability features that are not needed in mainline
> kernels, but can be useful for distributions, and add support for
> kABI rules, which can be used to restrict gendwarfksyms output.
> 
> The rules are specified as a set of null-terminated strings stored
> in the .discard.gendwarfksyms.kabi_rules section. Each rule consists
> of four strings as follows:
> 
>   "version\0type\0target\0value"
> 
> The version string ensures the structure can be changed in a
> backwards compatible way. The type string indicates the type of the
> rule, and target and value strings contain rule-specific data.
> 
> Initially support two simple rules:
> 
>   1. Declaration-only structures
> 
>      A structure declaration can change into a full definition when
>      additional includes are pulled in to the TU, which changes the
>      versions of any symbol that references the struct. Add support
>      for defining declaration-only structs whose definition is not
>      expanded during versioning.
> 
>   2. Ignored enum fields
> 
>      It's possible to add new enum fields without changing the ABI,
>      but as the fields are included in symbol versioning, this would
>      change the versions. Add support for ignoring specific fields.
> 
> Add examples for using the rules under the examples/ directory.

Thanks for coming up with this approach. It makes sense to me.

> 
> Signed-off-by: Sami Tolvanen <samitolvanen@...gle.com>
> Acked-by: Neal Gompa <neal@...pa.dev>
> ---
>  scripts/gendwarfksyms/Makefile              |   1 +
>  scripts/gendwarfksyms/dwarf.c               |  19 +-
>  scripts/gendwarfksyms/examples/kabi.h       |  61 ++++++
>  scripts/gendwarfksyms/examples/kabi_rules.c |  56 +++++
>  scripts/gendwarfksyms/gendwarfksyms.c       |  11 +-
>  scripts/gendwarfksyms/gendwarfksyms.h       |  57 ++++++
>  scripts/gendwarfksyms/kabi.c                | 214 ++++++++++++++++++++
>  7 files changed, 415 insertions(+), 4 deletions(-)
>  create mode 100644 scripts/gendwarfksyms/examples/kabi.h
>  create mode 100644 scripts/gendwarfksyms/examples/kabi_rules.c
>  create mode 100644 scripts/gendwarfksyms/kabi.c
> 
> diff --git a/scripts/gendwarfksyms/Makefile b/scripts/gendwarfksyms/Makefile
> index 6540282dc746..27258c31e839 100644
> --- a/scripts/gendwarfksyms/Makefile
> +++ b/scripts/gendwarfksyms/Makefile
> @@ -5,6 +5,7 @@ gendwarfksyms-objs += gendwarfksyms.o
>  gendwarfksyms-objs += cache.o
>  gendwarfksyms-objs += die.o
>  gendwarfksyms-objs += dwarf.o
> +gendwarfksyms-objs += kabi.o
>  gendwarfksyms-objs += symbols.o
>  gendwarfksyms-objs += types.o
>  
> diff --git a/scripts/gendwarfksyms/dwarf.c b/scripts/gendwarfksyms/dwarf.c
> index a47a3a0f7a69..b15f1a5db452 100644
> --- a/scripts/gendwarfksyms/dwarf.c
> +++ b/scripts/gendwarfksyms/dwarf.c
> @@ -80,11 +80,12 @@ static bool match_export_symbol(struct state *state, Dwarf_Die *die)
>  	return !!state->sym;
>  }
>  
> -static bool is_declaration(Dwarf_Die *die)
> +static bool is_declaration(struct die *cache, Dwarf_Die *die)
>  {
>  	bool value;
>  
> -	return get_flag_attr(die, DW_AT_declaration, &value) && value;
> +	return (get_flag_attr(die, DW_AT_declaration, &value) && value) ||
> +	       kabi_is_struct_declonly(cache->fqn);
>  }
>  
>  /*
> @@ -472,10 +473,11 @@ static void __process_structure_type(struct state *state, struct die *cache,
>  	process(cache, " {");
>  	process_linebreak(cache, 1);
>  
> -	is_decl = is_declaration(die);
> +	is_decl = is_declaration(cache, die);
>  
>  	if (!is_decl && state->expand.expand) {
>  		cache_mark_expanded(&state->expansion_cache, die->addr);
> +		state->expand.current_fqn = cache->fqn;
>  		check(process_die_container(state, cache, die, process_func,
>  					    match_func));
>  	}
> @@ -508,6 +510,15 @@ static void process_enumerator_type(struct state *state, struct die *cache,
>  {
>  	Dwarf_Word value;
>  
> +	if (stable) {
> +		/* Get the fqn before we process anything */
> +		update_fqn(cache, die);
> +
> +		if (kabi_is_enumerator_ignored(state->expand.current_fqn,
> +					       cache->fqn))
> +			return;
> +	}
> +
>  	process_list_comma(state, cache);
>  	process(cache, "enumerator");
>  	process_fqn(cache, die);
> @@ -580,6 +591,7 @@ static void state_init(struct state *state)
>  	state->expand.expand = true;
>  	state->expand.ptr_depth = 0;
>  	state->expand.ptr_expansion_depth = 0;
> +	state->expand.current_fqn = NULL;
>  	hash_init(state->expansion_cache.cache);
>  }
>  
> @@ -589,6 +601,7 @@ static void expansion_state_restore(struct expansion_state *state,
>  	state->expand = saved->expand;
>  	state->ptr_depth = saved->ptr_depth;
>  	state->ptr_expansion_depth = saved->ptr_expansion_depth;
> +	state->current_fqn = saved->current_fqn;
>  }
>  
>  static void expansion_state_save(struct expansion_state *state,
> diff --git a/scripts/gendwarfksyms/examples/kabi.h b/scripts/gendwarfksyms/examples/kabi.h
> new file mode 100644
> index 000000000000..c53e8d4a7d2e
> --- /dev/null
> +++ b/scripts/gendwarfksyms/examples/kabi.h
> @@ -0,0 +1,61 @@
> +/* SPDX-License-Identifier: GPL-2.0 */
> +/*
> + * Copyright (C) 2024 Google LLC
> + *
> + * Example macros for maintaining kABI stability.
> + *
> + * This file is based on android_kabi.h, which has the following notice:
> + *
> + * Heavily influenced by rh_kabi.h which came from the RHEL/CENTOS kernel
> + * and was:
> + *	Copyright (c) 2014 Don Zickus
> + *	Copyright (c) 2015-2018 Jiri Benc
> + *	Copyright (c) 2015 Sabrina Dubroca, Hannes Frederic Sowa
> + *	Copyright (c) 2016-2018 Prarit Bhargava
> + *	Copyright (c) 2017 Paolo Abeni, Larry Woodman
> + */
> +
> +#ifndef __KABI_H__
> +#define __KABI_H__
> +
> +/* Kernel macros for userspace testing. */
> +#ifndef __aligned
> +#define __aligned(x) __attribute__((__aligned__(x)))
> +#endif
> +#ifndef __used
> +#define __used __attribute__((__used__))
> +#endif
> +#ifndef __section
> +#define __section(section) __attribute__((__section__(section)))
> +#endif
> +#ifndef __PASTE
> +#define ___PASTE(a, b) a##b
> +#define __PASTE(a, b) ___PASTE(a, b)
> +#endif
> +#ifndef __stringify
> +#define __stringify_1(x...) #x
> +#define __stringify(x...) __stringify_1(x)
> +#endif
> +
> +#define __KABI_RULE(hint, target, value)                             \
> +	static const char __PASTE(__gendwarfksyms_rule_,             \
> +				  __COUNTER__)[] __used __aligned(1) \
> +		__section(".discard.gendwarfksyms.kabi_rules") =     \
> +			"1\0" #hint "\0" #target "\0" #value
> +
> +/*
> + * KABI_USE_ARRAY(fqn)
> + *   Treat the struct fqn as a declaration, i.e. even if a definition
> + *   is available, don't expand the contents.
> + */
> +#define KABI_STRUCT_DECLONLY(fqn) __KABI_RULE(struct_declonly, fqn, ;)

Nit: s/KABI_USE_ARRAY/KABI_STRUCT_DECLONLY/ in the preceding comment.

> +
> +/*
> + * KABI_ENUMERATOR_IGNORE(fqn, field)
> + *   When expanding enum fqn, skip the provided field. This makes it
> + *   possible to hide added enum fields from versioning.
> + */
> +#define KABI_ENUMERATOR_IGNORE(fqn, field) \
> +	__KABI_RULE(enumerator_ignore, fqn, field)
> +
> +#endif /* __KABI_H__ */
> diff --git a/scripts/gendwarfksyms/examples/kabi_rules.c b/scripts/gendwarfksyms/examples/kabi_rules.c
> new file mode 100644
> index 000000000000..446818e67d80
> --- /dev/null
> +++ b/scripts/gendwarfksyms/examples/kabi_rules.c
> @@ -0,0 +1,56 @@
> +// SPDX-License-Identifier: GPL-2.0
> +/*
> + * Copyright (C) 2024 Google LLC
> + *
> + * Examples for kABI rules with --stable.
> + */
> +
> +/*
> + * The comments below each example contain the expected gendwarfksyms
> + * output which can be verified using LLVM's FileCheck tool:
> + *
> + * https://llvm.org/docs/CommandGuide/FileCheck.html
> + *
> + * RUN: gcc -g -c examples/kabi_rules.c -o examples/kabi_rules.o
> + *
> + * Verify --stable output:
> + *
> + * RUN: echo -e "ex0\nex1" | \
> + * RUN:   ./gendwarfksyms --stable --dump-dies \
> + * RUN:   	examples/kabi_rules.o 2>&1 >/dev/null | \
> + * RUN:   FileCheck examples/kabi_rules.c --check-prefix=STABLE
> + */

It would be useful to make this test automated. Overall, I believe
gendwarfksyms should have a set of automated tests to verify its
functionality. At a minimum, I think we would want to work out some
blueprint how to write them. Should they be added to kselftests, or
would something like kconfig/tests be more appropriate? How to write
tests with stable DWARF data that ideally work across all platforms?
More tests can be then added incrementally.

> +
> +#include "kabi.h"
> +
> +struct s {
> +	int a;
> +};
> +
> +KABI_STRUCT_DECLONLY(s);
> +
> +struct s e0;
> +
> +/*
> + * STABLE:      variable structure_type s {
> + * STABLE-NEXT: }
> + */
> +
> +enum e {
> +	A,
> +	B,
> +	C,
> +	D,
> +};
> +
> +KABI_ENUMERATOR_IGNORE(e, B);
> +KABI_ENUMERATOR_IGNORE(e, C);
> +
> +enum e e1;
> +
> +/*
> + * STABLE:      variable enumeration_type e {
> + * STABLE-NEXT:   enumerator A = 0 ,
> + * STABLE-NEXT:   enumerator D = 3
> + * STABLE-NEXT: } byte_size(4)
> + */
> diff --git a/scripts/gendwarfksyms/gendwarfksyms.c b/scripts/gendwarfksyms/gendwarfksyms.c
> index e90d909d259b..21abf1c98366 100644
> --- a/scripts/gendwarfksyms/gendwarfksyms.c
> +++ b/scripts/gendwarfksyms/gendwarfksyms.c
> @@ -25,6 +25,8 @@ int dump_die_map;
>  int dump_types;
>  /* Print out expanded type strings used for symbol versions */
>  int dump_versions;
> +/* Support kABI stability features */
> +int stable;
>  /* Write a symtypes file */
>  int symtypes;
>  static const char *symtypes_file;
> @@ -38,6 +40,7 @@ static void usage(void)
>  	      "      --dump-die-map   Print debugging information about die_map changes\n"
>  	      "      --dump-types     Dump type strings\n"
>  	      "      --dump-versions  Dump expanded type strings used for symbol versions\n"
> +	      "  -s, --stable         Support kABI stability features\n"
>  	      "  -T, --symtypes file  Write a symtypes file\n"
>  	      "  -h, --help           Print this message\n"
>  	      "\n",
> @@ -97,17 +100,21 @@ int main(int argc, char **argv)
>  				 { "dump-die-map", 0, &dump_die_map, 1 },
>  				 { "dump-types", 0, &dump_types, 1 },
>  				 { "dump-versions", 0, &dump_versions, 1 },
> +				 { "stable", 0, NULL, 's' },
>  				 { "symtypes", 1, NULL, 'T' },
>  				 { "help", 0, NULL, 'h' },
>  				 { 0, 0, NULL, 0 } };
>  
> -	while ((opt = getopt_long(argc, argv, "dT:h", opts, NULL)) != EOF) {
> +	while ((opt = getopt_long(argc, argv, "dsT:h", opts, NULL)) != EOF) {
>  		switch (opt) {
>  		case 0:
>  			break;
>  		case 'd':
>  			debug = 1;
>  			break;
> +		case 's':
> +			stable = 1;
> +			break;
>  		case 'T':
>  			symtypes = 1;
>  			symtypes_file = optarg;
> @@ -151,6 +158,7 @@ int main(int argc, char **argv)
>  			      strerror(errno));
>  
>  		symbol_read_symtab(fd);
> +		kabi_read_rules(fd);
>  
>  		dwfl = dwfl_begin(&callbacks);
>  		if (!dwfl)
> @@ -167,6 +175,7 @@ int main(int argc, char **argv)
>  			error("dwfl_getmodules failed for '%s'", argv[n]);
>  
>  		dwfl_end(dwfl);
> +		kabi_free();
>  	}
>  
>  	if (symfile)
> diff --git a/scripts/gendwarfksyms/gendwarfksyms.h b/scripts/gendwarfksyms/gendwarfksyms.h
> index 814f53ef799e..f32ad4389b58 100644
> --- a/scripts/gendwarfksyms/gendwarfksyms.h
> +++ b/scripts/gendwarfksyms/gendwarfksyms.h
> @@ -27,6 +27,7 @@ extern int dump_dies;
>  extern int dump_die_map;
>  extern int dump_types;
>  extern int dump_versions;
> +extern int stable;
>  extern int symtypes;
>  
>  /*
> @@ -225,6 +226,7 @@ struct expansion_state {
>  	bool expand;
>  	unsigned int ptr_depth;
>  	unsigned int ptr_expansion_depth;
> +	const char *current_fqn;
>  };
>  
>  struct state {
> @@ -256,4 +258,59 @@ void process_cu(Dwarf_Die *cudie);
>  
>  void generate_symtypes_and_versions(FILE *file);
>  
> +/*
> + * kabi.c
> + */
> +
> +#define KABI_RULE_SECTION ".discard.gendwarfksyms.kabi_rules"
> +#define KABI_RULE_VERSION "1"
> +
> +/*
> + * The rule section consists of four null-terminated strings per
> + * entry:
> + *
> + *   1. version
> + *      Entry format version. Must match KABI_RULE_VERSION.
> + *
> + *   2. type
> + *      Type of the kABI rule. Must be one of the tags defined below.
> + *
> + *   3. target
> + *      Rule-dependent target, typically the fully qualified name of
> + *      the target DIE.
> + *
> + *   4. value
> + *      Rule-dependent value.
> + */
> +#define KABI_RULE_MIN_ENTRY_SIZE                                       \
> +	(/* version\0 */ 2 + /* type\0 */ 2 + /* target\0" */ 2 + \
> +	 /* value\0 */ 2)
> +#define KABI_RULE_EMPTY_VALUE ";"

Hmm, is there a reason why an empty value is ";" instead of just ""?

> +
> +/*
> + * Rule: struct_declonly
> + * - For the struct in the target field, treat it as a declaration
> + *   only even if a definition is available.
> + */
> +#define KABI_RULE_TAG_STRUCT_DECLONLY "struct_declonly"
> +
> +/*
> + * Rule: enumerator_ignore
> + * - For the enum in the target field, ignore the named enumerator
> + *   in the value field.
> + */
> +#define KABI_RULE_TAG_ENUMERATOR_IGNORE "enumerator_ignore"
> +
> +enum kabi_rule_type {
> +	KABI_RULE_TYPE_UNKNOWN,
> +	KABI_RULE_TYPE_STRUCT_DECLONLY,
> +	KABI_RULE_TYPE_ENUMERATOR_IGNORE,
> +};

Nit: All new KABI_* defines and the enum kabi_rule_type added in
gendwarfksyms.h are used only locally from kabi.c, so they could be
moved in that file.

> +
> +bool kabi_is_enumerator_ignored(const char *fqn, const char *field);
> +bool kabi_is_struct_declonly(const char *fqn);
> +
> +void kabi_read_rules(int fd);
> +void kabi_free(void);
> +
>  #endif /* __GENDWARFKSYMS_H */
> diff --git a/scripts/gendwarfksyms/kabi.c b/scripts/gendwarfksyms/kabi.c
> new file mode 100644
> index 000000000000..a5414382782c
> --- /dev/null
> +++ b/scripts/gendwarfksyms/kabi.c
> @@ -0,0 +1,214 @@
> +// SPDX-License-Identifier: GPL-2.0
> +/*
> + * Copyright (C) 2024 Google LLC
> + */
> +
> +#include "gendwarfksyms.h"
> +
> +#define RULE_HASH_BITS 10
> +
> +struct rule {
> +	enum kabi_rule_type type;
> +	const char *target;
> +	const char *value;
> +	struct hlist_node hash;
> +};

What is the idea behind using 'const char *' instead of 'char *' for
owned strings in structures?

> +
> +/* { type, target, value } -> struct rule */
> +static HASHTABLE_DEFINE(rules, 1 << RULE_HASH_BITS);
> +
> +static inline unsigned int rule_hash(enum kabi_rule_type type,
> +				     const char *target, const char *value)
> +{
> +	return hash_32(type) ^ hash_str(target) ^ hash_str(value);
> +}
> +
> +static inline unsigned int __rule_hash(const struct rule *rule)
> +{
> +	return rule_hash(rule->type, rule->target, rule->value);
> +}

Nit: Perhaps call the two hash functions rule_values_hash() and
rule_hash() to avoid the "__" prefix?

As a general comment, I believe the gendwarfksyms code overuses the "__"
prefix. Similarly, I find harder to navigate its code when, in a few
instances, there is a function named <verb>_<object>() and another as
<object>_<verb>(). An example of both would be the functions
expand_type(), type_expand() and __type_expand().

> +
> +static inline const char *get_rule_field(const char **pos, ssize_t *left)
> +{
> +	const char *start = *pos;
> +	size_t len;
> +
> +	if (*left <= 1)
> +		error("unexpected end of kABI rules");
> +
> +	len = strnlen(start, *left);
> +	if (!len)
> +		error("empty kABI rule field");
> +
> +	len += 1;
> +	*pos += len;
> +	*left -= len;
> +
> +	return start;
> +}
> +
> +void kabi_read_rules(int fd)
> +{
> +	GElf_Shdr shdr_mem;
> +	GElf_Shdr *shdr;
> +	Elf_Data *rule_data = NULL;
> +	Elf_Scn *scn;
> +	Elf *elf;
> +	size_t shstrndx;
> +	const char *rule_str;
> +	ssize_t left;
> +	int i;
> +
> +	const struct {
> +		enum kabi_rule_type type;
> +		const char *tag;
> +	} rule_types[] = {
> +		{
> +			.type = KABI_RULE_TYPE_STRUCT_DECLONLY,
> +			.tag = KABI_RULE_TAG_STRUCT_DECLONLY,
> +		},
> +		{
> +			.type = KABI_RULE_TYPE_ENUMERATOR_IGNORE,
> +			.tag = KABI_RULE_TAG_ENUMERATOR_IGNORE,
> +		},
> +	};
> +
> +	if (!stable)
> +		return;
> +
> +	if (elf_version(EV_CURRENT) != EV_CURRENT)
> +		error("elf_version failed: %s", elf_errmsg(-1));
> +
> +	elf = elf_begin(fd, ELF_C_READ_MMAP, NULL);
> +	if (!elf)
> +		error("elf_begin failed: %s", elf_errmsg(-1));
> +
> +	if (elf_getshdrstrndx(elf, &shstrndx) < 0)
> +		error("elf_getshdrstrndx failed: %s", elf_errmsg(-1));
> +
> +	scn = elf_nextscn(elf, NULL);
> +
> +	while (scn) {
> +		shdr = gelf_getshdr(scn, &shdr_mem);
> +		if (shdr) {

Isn't it an error when gelf_getshdr() returns NULL and as such it should
be reported with error()? If this makes sense then the same handling
should be implemented in symbols.c:elf_for_each_global().

> +			const char *sname =
> +				elf_strptr(elf, shstrndx, shdr->sh_name);
> +
> +			if (sname && !strcmp(sname, KABI_RULE_SECTION)) {
> +				rule_data = elf_getdata(scn, NULL);

Similarly here for elf_strptr() and elf_getdata().

> +				break;
> +			}
> +		}
> +
> +		scn = elf_nextscn(elf, scn);
> +	}
> +
> +	if (!rule_data) {
> +		debug("kABI rules not found");
> +		return;
> +	}
> +
> +	rule_str = rule_data->d_buf;
> +	left = shdr->sh_size;
> +
> +	if (left < KABI_RULE_MIN_ENTRY_SIZE)
> +		error("kABI rule section too small: %zd bytes", left);
> +
> +	if (rule_str[left - 1] != '\0')
> +		error("kABI rules are not null-terminated");
> +
> +	while (left > KABI_RULE_MIN_ENTRY_SIZE) {
> +		enum kabi_rule_type type = KABI_RULE_TYPE_UNKNOWN;
> +		const char *field;
> +		struct rule *rule;
> +
> +		/* version */
> +		field = get_rule_field(&rule_str, &left);
> +
> +		if (strcmp(field, KABI_RULE_VERSION))
> +			error("unsupported kABI rule version: '%s'", field);
> +
> +		/* type */
> +		field = get_rule_field(&rule_str, &left);
> +
> +		for (i = 0; i < ARRAY_SIZE(rule_types); i++) {
> +			if (!strcmp(field, rule_types[i].tag)) {
> +				type = rule_types[i].type;
> +				break;
> +			}
> +		}
> +
> +		if (type == KABI_RULE_TYPE_UNKNOWN)
> +			error("unsupported kABI rule type: '%s'", field);
> +
> +		rule = xmalloc(sizeof(struct rule));
> +
> +		rule->type = type;
> +		rule->target = xstrdup(get_rule_field(&rule_str, &left));
> +		rule->value = xstrdup(get_rule_field(&rule_str, &left));
> +
> +		hash_add(rules, &rule->hash, __rule_hash(rule));
> +
> +		debug("kABI rule: type: '%s', target: '%s', value: '%s'", field,
> +		      rule->target, rule->value);
> +	}
> +
> +	if (left > 0)
> +		warn("unexpected data at the end of the kABI rules section");
> +
> +	check(elf_end(elf));
> +}
> +
> +bool kabi_is_struct_declonly(const char *fqn)
> +{
> +	struct rule *rule;
> +
> +	if (!stable)
> +		return false;
> +	if (!fqn || !*fqn)
> +		return false;
> +
> +	hash_for_each_possible(rules, rule, hash,
> +			       rule_hash(KABI_RULE_TYPE_STRUCT_DECLONLY, fqn,
> +					 KABI_RULE_EMPTY_VALUE)) {
> +		if (rule->type == KABI_RULE_TYPE_STRUCT_DECLONLY &&
> +		    !strcmp(fqn, rule->target))
> +			return true;
> +	}
> +
> +	return false;
> +}
> +
> +bool kabi_is_enumerator_ignored(const char *fqn, const char *field)
> +{
> +	struct rule *rule;
> +
> +	if (!stable)
> +		return false;
> +	if (!fqn || !*fqn || !field || !*field)
> +		return false;
> +
> +	hash_for_each_possible(rules, rule, hash,
> +			       rule_hash(KABI_RULE_TYPE_ENUMERATOR_IGNORE, fqn,
> +					 field)) {
> +		if (rule->type == KABI_RULE_TYPE_ENUMERATOR_IGNORE &&
> +		    !strcmp(fqn, rule->target) && !strcmp(field, rule->value))
> +			return true;
> +	}
> +
> +	return false;
> +}
> +
> +void kabi_free(void)
> +{
> +	struct hlist_node *tmp;
> +	struct rule *rule;
> +
> +	hash_for_each_safe(rules, rule, tmp, hash) {
> +		free((void *)rule->target);
> +		free((void *)rule->value);
> +		free(rule);
> +	}
> +
> +	hash_init(rules);
> +}

-- 
Thanks,
Petr

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ