From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: mx.groups.io; dkim=pass header.i=@linaro.org header.s=google header.b=zjehhL3s; spf=pass (domain: linaro.org, ip: 209.85.210.195, mailfrom: ard.biesheuvel@linaro.org) Received: from mail-pf1-f195.google.com (mail-pf1-f195.google.com [209.85.210.195]) by groups.io with SMTP; Tue, 03 Sep 2019 21:17:50 -0700 Received: by mail-pf1-f195.google.com with SMTP id y9so12374531pfl.4 for ; Tue, 03 Sep 2019 21:17:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=a8hbpEGLqe36zVfgyzWOmhvfKkgO8iPHaiwF7gBsrc8=; b=zjehhL3scGHB9czymsYi7FLSF5WQhtMI1z+NLgPKRtu1YR6nll0plCdIedhTUgAum/ V5ljOZEs7S8nxuioDpVOV4oB/B2Kqaj1ZYoEqsQvecklnI1SUhVIjg6StCsJZnpukUq/ tmQKfNIZ9iRD6xQcaR+2ggsrgWTAVEPU9WJA46XYQGOaz4mzLEbsHAKYD04cG8QSV+zO 1Oo1BY3AT9z7QHzkK8v9Jm0sCa/dXoI3Qn3G6Jsa1gZLRc7PrSGvYcOIwHl9i4jU+SBC gXJok47S+4rpgROgTzW1a0dy/xmaw75TdrC2xGokxxEYLtWedoVN2eyKw8c7HCi70ytS G9Zw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=a8hbpEGLqe36zVfgyzWOmhvfKkgO8iPHaiwF7gBsrc8=; b=ge1lBc7Q4OqWBm3vvM45BLc3NQwboy1goFpNMLsbX1MGm08JRG6KP0OYqepBTgLaie +KxTAtjEzBW5uxUWi9ljbJR3etTSJUsATyjUmyzZ2JEKt9VWd604GEis1AJtkvReMAzg wv+2aDJXKwagsGJmmw+9WUiTapAi4pAS3FJa3fGN9HbFF141VL4T95Grblntszraw67j 6xUJMPpn3UxTxsWL0bIOs5yiA3AR3FqYcKTNE3kVVRVk/tL51IThGcSKYrC5mZTNz60H 4M7qK6RduOb94rVjcnypVgTOs8k/7s3y2NSDoQZfu3IVMAguRJNlkA1YZ9kNIm0mkbhm ++Tw== X-Gm-Message-State: APjAAAV+4Wde4PuI8l2chmn8ygVwwp3bwE/zD0xgZWIN83uAcvzh9rX0 yGTe74PzCqMHDX+nJf+ORjfCvnRZ+SLeiCZV X-Google-Smtp-Source: APXvYqwI44TtII/uQR/j6yzId6Fb4SHHeDCSxCTOjuGVM6KrzVOlKW6o1Ej4tiQJ61c4/fP/5W9f3A== X-Received: by 2002:a17:90a:8541:: with SMTP id a1mr230089pjw.31.1567570669675; Tue, 03 Sep 2019 21:17:49 -0700 (PDT) Return-Path: Received: from e111045-lin.nice.arm.com ([8.25.222.2]) by smtp.gmail.com with ESMTPSA id k64sm36770593pge.65.2019.09.03.21.17.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Sep 2019 21:17:48 -0700 (PDT) From: "Ard Biesheuvel" To: devel@edk2.groups.io Cc: leif.lindholm@linaro.org, liming.gao@intel.com, Ard Biesheuvel Subject: [PATCH] BaseTools/GenFw AARCH64: fix up GOT based relative relocations Date: Tue, 3 Sep 2019 21:17:33 -0700 Message-Id: <20190904041733.12741-1-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.17.1 We take great care to avoid GOT based relocations in EDK2 executables, primarily because they are pointless - we don't care about things like the CoW footprint or relocations that target read-only sections, and so GOT entries only bloat the binary. However, in some cases (e.g., when building the relocatable PrePi SEC module in ArmVirtPkg with the CLANG38 toolchain), we may end up with some GOT based relocations nonetheless, which break the build since GenFw does not know how to deal with them. The relocations emitted in this case are ADRP/LDR instruction pairs that are annotated as GOT based, which means that it is the linker's job to emit the GOT entry and tag it with an appropriate dynamic relocation that ensures that the correct absolute value is stored into the GOT entry when the executable is loaded. This dynamic relocation not visible to GenFw, and so populating the PE/COFF relocation section for these entries is non-trivial. Since each ADRP/LDR pair refers to a single symbol that is local to the binary (given that shared libraries are not supported), we can actually convert the ADRP/LDR pair into an ADRP/ADD pair that produces the symbol address directly rather than loading it from memory. This leaves the GOT entry in the binary, but since it is now unused, it is no longer necessary to emit a PE/COFF relocation entry for it. Signed-off-by: Ard Biesheuvel --- BaseTools/Source/C/GenFw/Elf64Convert.c | 28 +++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) diff --git a/BaseTools/Source/C/GenFw/Elf64Convert.c b/BaseTools/Source/C/GenFw/Elf64Convert.c index 3d6319c821e9..d574300ac4fe 100644 --- a/BaseTools/Source/C/GenFw/Elf64Convert.c +++ b/BaseTools/Source/C/GenFw/Elf64Convert.c @@ -1017,6 +1017,31 @@ WriteSections64 ( } else if (mEhdr->e_machine == EM_AARCH64) { switch (ELF_R_TYPE(Rel->r_info)) { + INT64 Offset; + + case R_AARCH64_LD64_GOT_LO12_NC: + // + // Convert into an ADD instruction - see R_AARCH64_ADR_GOT_PAGE below. + // + *(UINT32 *)Targ &= 0x3ff; + *(UINT32 *)Targ |= 0x91000000 | ((Sym->st_value & 0xfff) << 10); + break; + + case R_AARCH64_ADR_GOT_PAGE: + // + // This relocation points to the GOT entry that contains the absolute + // address of the symbol we are referring to. Since EDK2 only uses + // fully linked binaries, we can avoid the indirection, and simply + // refer to the symbol directly. This implies having to patch the + // subsequent LDR instruction (covered by a R_AARCH64_LD64_GOT_LO12_NC + // relocation) into an ADD instruction - this is handled above. + // + Offset = (Sym->st_value - (Rel->r_offset & ~0xfff)) >> 12; + + *(UINT32 *)Targ &= 0x9000001f; + *(UINT32 *)Targ |= ((Offset & 0x1ffffc) << (5 - 2)) | ((Offset & 0x3) << 29); + + /* fall through */ case R_AARCH64_ADR_PREL_PG_HI21: // @@ -1037,7 +1062,6 @@ WriteSections64 ( // Attempt to convert the ADRP into an ADR instruction. // This is only possible if the symbol is within +/- 1 MB. // - INT64 Offset; // Decode the ADRP instruction Offset = (INT32)((*(UINT32 *)Targ & 0xffffe0) << 8); @@ -1212,6 +1236,8 @@ WriteRelocations64 ( case R_AARCH64_LDST32_ABS_LO12_NC: case R_AARCH64_LDST64_ABS_LO12_NC: case R_AARCH64_LDST128_ABS_LO12_NC: + case R_AARCH64_ADR_GOT_PAGE: + case R_AARCH64_LD64_GOT_LO12_NC: // // No fixups are required for relative relocations, provided that // the relative offsets between sections have been preserved in -- 2.17.1