return ((elf->sechdrs[section_index].sh_flags & SHF_EXECINSTR) == SHF_EXECINSTR);
 }
 
-/*
- * We rely on a gross hack in section_rel[a]() calling find_extable_entry_size()
- * to know the sizeof(struct exception_table_entry) for the target architecture.
- */
-static unsigned int extable_entry_size = 0;
-static void find_extable_entry_size(const char* const sec, const Elf_Rela* r)
-{
-       /*
-        * If we're currently checking the second relocation within __ex_table,
-        * that relocation offset tells us the offsetof(struct
-        * exception_table_entry, fixup) which is equal to sizeof(struct
-        * exception_table_entry) divided by two.  We use that to our advantage
-        * since there's no portable way to get that size as every architecture
-        * seems to go with different sized types.  Not pretty but better than
-        * hard-coding the size for every architecture..
-        */
-       if (!extable_entry_size)
-               extable_entry_size = r->r_offset * 2;
-}
-
-static inline bool is_extable_fault_address(Elf_Rela *r)
-{
-       /*
-        * extable_entry_size is only discovered after we've handled the
-        * _second_ relocation in __ex_table, so only abort when we're not
-        * handling the first reloc and extable_entry_size is zero.
-        */
-       if (r->r_offset && extable_entry_size == 0)
-               fatal("extable_entry size hasn't been discovered!\n");
-
-       return ((r->r_offset == 0) ||
-               (r->r_offset % extable_entry_size == 0));
-}
-
-#define is_second_extable_reloc(Start, Cur, Sec)                       \
-       (((Cur) == (Start) + 1) && (strcmp("__ex_table", (Sec)) == 0))
-
 static void report_extable_warnings(const char* modname, struct elf_info* elf,
                                    const struct sectioncheck* const mismatch,
                                    Elf_Rela* r, Elf_Sym* sym,
                      "You might get more information about where this is\n"
                      "coming from by using scripts/check_extable.sh %s\n",
                      fromsec, (long)r->r_offset, tosec, modname);
-       else if (!is_executable_section(elf, get_secindex(elf, sym))) {
-               if (is_extable_fault_address(r))
-                       fatal("The relocation at %s+0x%lx references\n"
-                             "section \"%s\" which is not executable, IOW\n"
-                             "it is not possible for the kernel to fault\n"
-                             "at that address.  Something is seriously wrong\n"
-                             "and should be fixed.\n",
-                             fromsec, (long)r->r_offset, tosec);
-               else
-                       fatal("The relocation at %s+0x%lx references\n"
-                             "section \"%s\" which is not executable, IOW\n"
-                             "the kernel will fault if it ever tries to\n"
-                             "jump to it.  Something is seriously wrong\n"
-                             "and should be fixed.\n",
-                             fromsec, (long)r->r_offset, tosec);
-       }
+       else if (!is_executable_section(elf, get_secindex(elf, sym)))
+               error("%s+0x%lx references non-executable section '%s'\n",
+                     fromsec, (long)r->r_offset, tosec);
 }
 
 static void check_section_mismatch(const char *modname, struct elf_info *elf,
                /* Skip special sections */
                if (is_shndx_special(sym->st_shndx))
                        continue;
-               if (is_second_extable_reloc(start, rela, fromsec))
-                       find_extable_entry_size(fromsec, &r);
                check_section_mismatch(modname, elf, &r, sym, fromsec);
        }
 }
                /* Skip special sections */
                if (is_shndx_special(sym->st_shndx))
                        continue;
-               if (is_second_extable_reloc(start, rel, fromsec))
-                       find_extable_entry_size(fromsec, &r);
                check_section_mismatch(modname, elf, &r, sym, fromsec);
        }
 }