mirror of
https://sourceware.org/git/glibc.git
synced 2025-01-15 21:40:05 +00:00
6ae0737d43
While porting ARCv2 to elfutils [1], it was brought up that the necessary changes to the project's libelf/elf.h must come from glibc, because they sync it from glibc [2]. Therefore, this patch is to update ARC entries in elf/elf.h. The majority of the update is about adding new definitions, specially for the relocations. However, there is one rename, one deletion, and one change: - R_ARC_JUMP_SLOT renamed to R_ARC_JMP_SLOT to match binutils. - R_ARC_B26 removed because it is unused and deprecated. - R_ARC_TLS_DTPOFF_S9 changed from 0x4a to the correct value 0x49. Finally, a specific SHT class for ARC has been added to glibcelf.py. Else, it would result in a collision: _register_elf_h(Sht, ranges=True, File "/src/glibc/scripts/glibcelf.py", line x, in _register_elf_h raise ValueError('duplicate value {}: {}, {}'.format( ValueError: duplicate value 1879048193: SHT_ARC_ATTRIBUTES, SHT_X86_64_UNWIND [1] https://sourceware.org/pipermail/elfutils-devel/2022q4/005530.html [2] https://sourceware.org/pipermail/elfutils-devel/2022q4/005548.html No regression has been observed after applying this patch. Below follows the result: UNSUPPORTED: crypt/cert UNSUPPORTED: elf/tst-audit22 FAIL: elf/tst-audit25a FAIL: elf/tst-audit25b FAIL: elf/tst-bz15311 FAIL: elf/tst-bz28937 FAIL: elf/tst-dlmopen4 UNSUPPORTED: elf/tst-dlopen-self-container UNSUPPORTED: elf/tst-dlopen-tlsmodid-container UNSUPPORTED: elf/tst-glibc-hwcaps-prepend-cache UNSUPPORTED: elf/tst-ldconfig-bad-aux-cache UNSUPPORTED: elf/tst-ldconfig-ld_so_conf-update UNSUPPORTED: elf/tst-pldd UNSUPPORTED: elf/tst-preload-pthread-libc XPASS: elf/tst-protected1a XPASS: elf/tst-protected1b FAIL: elf/tst-tls-allocation-failure-static-patched FAIL: elf/tst-tls1 FAIL: elf/tst-tls3 FAIL: elf/tst-tlsalign-extern UNSUPPORTED: elf/tst-valgrind-smoke UNSUPPORTED: grp/tst-initgroups1 UNSUPPORTED: grp/tst-initgroups2 UNSUPPORTED: io/tst-getcwd-smallbuff UNSUPPORTED: locale/tst-localedef-path-norm FAIL: localedata/sort-test UNSUPPORTED: localedata/tst-localedef-hardlinks FAIL: malloc/tst-malloc-thread-fail-malloc-check FAIL: malloc/tst-malloc_info-malloc-check UNSUPPORTED: math/test-fesetexcept-traps UNSUPPORTED: math/test-fexcept-traps UNSUPPORTED: math/test-nearbyint-except UNSUPPORTED: math/test-nearbyint-except-2 UNSUPPORTED: misc/tst-adjtimex UNSUPPORTED: misc/tst-clock_adjtime FAIL: misc/tst-misalign-clone FAIL: misc/tst-misalign-clone-internal UNSUPPORTED: misc/tst-ntp_adjtime UNSUPPORTED: misc/tst-pkey UNSUPPORTED: misc/tst-rseq UNSUPPORTED: misc/tst-rseq-disable UNSUPPORTED: misc/tst-syslog UNSUPPORTED: misc/tst-ttyname FAIL: nptl/test-cond-printers FAIL: nptl/test-condattr-printers FAIL: nptl/test-mutex-printers FAIL: nptl/test-mutexattr-printers FAIL: nptl/test-rwlock-printers FAIL: nptl/test-rwlockattr-printers UNSUPPORTED: nptl/tst-pthread-gdb-attach UNSUPPORTED: nptl/tst-pthread-gdb-attach-static UNSUPPORTED: nptl/tst-pthread-getattr UNSUPPORTED: nptl/tst-rseq-nptl UNSUPPORTED: nss/tst-nss-compat1 UNSUPPORTED: nss/tst-nss-db-endgrent UNSUPPORTED: nss/tst-nss-db-endpwent UNSUPPORTED: nss/tst-nss-files-hosts-long UNSUPPORTED: nss/tst-nss-gai-actions UNSUPPORTED: nss/tst-nss-test3 UNSUPPORTED: nss/tst-reload1 UNSUPPORTED: nss/tst-reload2 UNSUPPORTED: posix/bug-ga2 UNSUPPORTED: posix/bug-ga2-mem FAIL: posix/globtest UNSUPPORTED: posix/tst-vfork3 UNSUPPORTED: posix/tst-vfork3-mem UNSUPPORTED: resolv/mtrace-tst-leaks2 UNSUPPORTED: resolv/tst-leaks2 UNSUPPORTED: resolv/tst-resolv-ai_idn UNSUPPORTED: resolv/tst-resolv-ai_idn-latin1 UNSUPPORTED: resolv/tst-resolv-res_init UNSUPPORTED: resolv/tst-resolv-res_init-thread UNSUPPORTED: rt/tst-bz28213 UNSUPPORTED: rt/tst-mqueue1 UNSUPPORTED: rt/tst-mqueue10 UNSUPPORTED: rt/tst-mqueue2 UNSUPPORTED: rt/tst-mqueue3 UNSUPPORTED: rt/tst-mqueue4 UNSUPPORTED: rt/tst-mqueue5 UNSUPPORTED: rt/tst-mqueue6 UNSUPPORTED: rt/tst-mqueue8 UNSUPPORTED: rt/tst-mqueue8x UNSUPPORTED: rt/tst-mqueue9 UNSUPPORTED: stdlib/test-bz22786 UNSUPPORTED: stdlib/tst-system UNSUPPORTED: string/test-bcopy UNSUPPORTED: string/test-memmove UNSUPPORTED: string/tst-memmove-overflow UNSUPPORTED: string/tst-strerror UNSUPPORTED: string/tst-strsignal UNSUPPORTED: time/tst-clock_settime UNSUPPORTED: time/tst-settimeofday Summary of test results: 21 FAIL 4184 PASS 69 UNSUPPORTED 16 XFAIL 2 XPASS Signed-off-by: Shahab Vahedi <shahab@synopsys.com> Signed-off-by: Vineet Gupta <vineet.gupta@linux.dev>
331 lines
11 KiB
C
331 lines
11 KiB
C
/* Machine-dependent ELF dynamic relocation inline functions. ARC version.
|
|
Copyright (C) 2020-2022 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library. If not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
#ifndef dl_machine_h
|
|
#define dl_machine_h
|
|
|
|
#define ELF_MACHINE_NAME "arc"
|
|
|
|
#include <entry.h>
|
|
|
|
#ifndef ENTRY_POINT
|
|
# error ENTRY_POINT needs to be defined for ARC
|
|
#endif
|
|
|
|
#include <string.h>
|
|
#include <link.h>
|
|
#include <dl-tls.h>
|
|
#include <dl-static-tls.h>
|
|
#include <dl-machine-rel.h>
|
|
|
|
/* Dynamic Linking ABI for ARCv2 ISA.
|
|
|
|
PLT
|
|
-------------------------------- <---- DT_PLTGOT
|
|
| ld r11, [pcl, off-to-GOT[1] | 0
|
|
| | 4
|
|
plt0 | ld r10, [pcl, off-to-GOT[2] | 8
|
|
| | 12
|
|
| j [r10] | 16
|
|
--------------------------------
|
|
| Base address of GOT | 20
|
|
--------------------------------
|
|
| ld r12, [pcl, off-to-GOT[3] | 24
|
|
plt1 | |
|
|
| j.d [r12] | 32
|
|
| mov r12, pcl | 36
|
|
--------------------------------
|
|
| | 40
|
|
~ ~
|
|
~ ~
|
|
| |
|
|
--------------------------------
|
|
|
|
.got
|
|
--------------
|
|
| [0] |
|
|
| ... | Runtime address for data symbols
|
|
| [n] |
|
|
--------------
|
|
|
|
.got.plt
|
|
--------------
|
|
| [0] | Build address of .dynamic
|
|
--------------
|
|
| [1] | Module info - setup by ld.so
|
|
--------------
|
|
| [2] | resolver entry point
|
|
--------------
|
|
| [3] |
|
|
| ... | Runtime address for function symbols
|
|
| [f] |
|
|
--------------
|
|
|
|
For ARCompact, the PLT is 12 bytes due to short instructions
|
|
|
|
--------------------------------
|
|
| ld r12, [pcl, off-to-GOT[3] | 24 (12 bytes each)
|
|
plt1 | |
|
|
| j_s.d [r12] | 32
|
|
| mov_s r12, pcl | 34
|
|
--------------------------------
|
|
| | 36 */
|
|
|
|
/* Return nonzero iff ELF header is compatible with the running host. */
|
|
static inline int
|
|
elf_machine_matches_host (const ElfW(Ehdr) *ehdr)
|
|
{
|
|
return (ehdr->e_machine == EM_ARCV2 /* ARC HS. */
|
|
|| ehdr->e_machine == EM_ARC_COMPACT); /* ARC 700. */
|
|
}
|
|
|
|
/* Get build time address of .dynamic as setup in GOT[0]
|
|
This is called very early in _dl_start so it has not been relocated to
|
|
runtime value. */
|
|
static inline ElfW(Addr)
|
|
elf_machine_dynamic (void)
|
|
{
|
|
extern const ElfW(Addr) _GLOBAL_OFFSET_TABLE_[] attribute_hidden;
|
|
return _GLOBAL_OFFSET_TABLE_[0];
|
|
}
|
|
|
|
|
|
/* Return the run-time load address of the shared object. */
|
|
static inline ElfW(Addr)
|
|
elf_machine_load_address (void)
|
|
{
|
|
ElfW(Addr) build_addr, run_addr;
|
|
|
|
/* For build address, below generates
|
|
ld r0, [pcl, _GLOBAL_OFFSET_TABLE_@pcl]. */
|
|
build_addr = elf_machine_dynamic ();
|
|
__asm__ ("add %0, pcl, _DYNAMIC@pcl \n" : "=r" (run_addr));
|
|
|
|
return run_addr - build_addr;
|
|
}
|
|
|
|
/* Set up the loaded object described by L so its unrelocated PLT
|
|
entries will jump to the on-demand fixup code in dl-runtime.c. */
|
|
|
|
static inline int
|
|
__attribute__ ((always_inline))
|
|
elf_machine_runtime_setup (struct link_map *l, struct r_scope_elem *scope[],
|
|
int lazy, int profile)
|
|
{
|
|
extern void _dl_runtime_resolve (void);
|
|
|
|
if (l->l_info[DT_JMPREL] && lazy)
|
|
{
|
|
/* On ARC DT_PLTGOT point to .plt whose 5th word (after the PLT header)
|
|
contains the address of .got. */
|
|
ElfW(Addr) *plt_base = (ElfW(Addr) *) D_PTR (l, l_info[DT_PLTGOT]);
|
|
ElfW(Addr) *got = (ElfW(Addr) *) (plt_base[5] + l->l_addr);
|
|
|
|
got[1] = (ElfW(Addr)) l; /* Identify this shared object. */
|
|
|
|
/* This function will get called to fix up the GOT entry indicated by
|
|
the offset on the stack, and then jump to the resolved address. */
|
|
got[2] = (ElfW(Addr)) &_dl_runtime_resolve;
|
|
}
|
|
|
|
return lazy;
|
|
}
|
|
|
|
/* What this code does:
|
|
-ldso starts execution here when kernel returns from execve
|
|
-calls into generic ldso entry point _dl_start
|
|
-optionally adjusts argc for executable if exec passed as cmd
|
|
-calls into app main with address of finaliser. */
|
|
|
|
#define RTLD_START asm ("\
|
|
.text \n\
|
|
.globl __start \n\
|
|
.type __start, @function \n\
|
|
__start: \n\
|
|
/* (1). bootstrap ld.so. */ \n\
|
|
bl.d _dl_start \n\
|
|
mov_s r0, sp /* pass ptr to aux vector tbl. */ \n\
|
|
mov r13, r0 /* safekeep app elf entry point. */ \n\
|
|
ld_s r1, [sp] /* orig argc. */ \n\
|
|
\n\
|
|
/* (2). call preinit stuff. */ \n\
|
|
ld r0, [pcl, _rtld_local@pcl] \n\
|
|
add r2, sp, 4 ; argv \n\
|
|
add2 r3, r2, r1 \n\
|
|
add r3, r3, 4 ; env \n\
|
|
bl _dl_init@plt \n\
|
|
\n\
|
|
/* (3) call app elf entry point. */ \n\
|
|
add r0, pcl, _dl_fini@pcl \n\
|
|
j [r13] \n\
|
|
\n\
|
|
.size __start,.-__start \n\
|
|
.previous \n\
|
|
");
|
|
|
|
/* ELF_RTYPE_CLASS_PLT iff TYPE describes relocation of a PLT entry, so
|
|
PLT entries should not be allowed to define the value.
|
|
ELF_RTYPE_CLASS_NOCOPY iff TYPE should not be allowed to resolve to one
|
|
of the main executable's symbols, as for a COPY reloc. */
|
|
#define elf_machine_type_class(type) \
|
|
((((type) == R_ARC_JMP_SLOT \
|
|
|| (type) == R_ARC_TLS_DTPMOD \
|
|
|| (type) == R_ARC_TLS_DTPOFF \
|
|
|| (type) == R_ARC_TLS_TPOFF) * ELF_RTYPE_CLASS_PLT) \
|
|
| (((type) == R_ARC_COPY) * ELF_RTYPE_CLASS_COPY))
|
|
|
|
/* A reloc type used for ld.so cmdline arg lookups to reject PLT entries. */
|
|
#define ELF_MACHINE_JMP_SLOT R_ARC_JMP_SLOT
|
|
|
|
/* Fixup a PLT entry to bounce directly to the function at VALUE. */
|
|
|
|
static inline ElfW(Addr)
|
|
elf_machine_fixup_plt (struct link_map *map, lookup_t t,
|
|
const ElfW(Sym) *refsym, const ElfW(Sym) *sym,
|
|
const ElfW(Rela) *reloc,
|
|
ElfW(Addr) *reloc_addr, ElfW(Addr) value)
|
|
{
|
|
return *reloc_addr = value;
|
|
}
|
|
|
|
/* Return the final value of a plt relocation. */
|
|
#define elf_machine_plt_value(map, reloc, value) (value)
|
|
|
|
/* Names of the architecture-specific auditing callback functions. */
|
|
#define ARCH_LA_PLTENTER arc_gnu_pltenter
|
|
#define ARCH_LA_PLTEXIT arc_gnu_pltexit
|
|
|
|
#endif /* dl_machine_h */
|
|
|
|
#ifdef RESOLVE_MAP
|
|
|
|
static inline void
|
|
__attribute__ ((always_inline))
|
|
elf_machine_rela (struct link_map *map, struct r_scope_elem *scope[],
|
|
const ElfW(Rela) *reloc, const ElfW(Sym) *sym,
|
|
const struct r_found_version *version,
|
|
void *const reloc_addr_arg, int skip_ifunc)
|
|
{
|
|
ElfW(Addr) r_info = reloc->r_info;
|
|
const unsigned long int r_type = ELFW (R_TYPE) (r_info);
|
|
ElfW(Addr) *const reloc_addr = reloc_addr_arg;
|
|
|
|
if (__glibc_unlikely (r_type == R_ARC_RELATIVE))
|
|
*reloc_addr += map->l_addr;
|
|
else if (__glibc_unlikely (r_type == R_ARC_NONE))
|
|
return;
|
|
else
|
|
{
|
|
const ElfW(Sym) *const refsym = sym;
|
|
struct link_map *sym_map = RESOLVE_MAP (map, scope, &sym, version,
|
|
r_type);
|
|
ElfW(Addr) value = SYMBOL_ADDRESS (sym_map, sym, true);
|
|
|
|
switch (r_type)
|
|
{
|
|
case R_ARC_COPY:
|
|
if (__glibc_unlikely (sym == NULL))
|
|
/* This can happen in trace mode if an object could not be
|
|
found. */
|
|
break;
|
|
|
|
size_t size = sym->st_size;
|
|
if (__glibc_unlikely (size != refsym->st_size))
|
|
{
|
|
const char *strtab = (const void *) D_PTR (map, l_info[DT_STRTAB]);
|
|
if (sym->st_size > refsym->st_size)
|
|
size = refsym->st_size;
|
|
if (sym->st_size > refsym->st_size || GLRO(dl_verbose))
|
|
_dl_error_printf ("\
|
|
%s: Symbol `%s' has different size in shared object, consider re-linking\n",
|
|
rtld_progname ?: "<program name unknown>",
|
|
strtab + refsym->st_name);
|
|
}
|
|
|
|
memcpy (reloc_addr_arg, (void *) value, size);
|
|
break;
|
|
|
|
case R_ARC_GLOB_DAT:
|
|
case R_ARC_JMP_SLOT:
|
|
*reloc_addr = value;
|
|
break;
|
|
|
|
case R_ARC_TLS_DTPMOD:
|
|
if (sym_map != NULL)
|
|
/* Get the information from the link map returned by the
|
|
resolv function. */
|
|
*reloc_addr = sym_map->l_tls_modid;
|
|
break;
|
|
|
|
case R_ARC_TLS_DTPOFF:
|
|
if (sym != NULL)
|
|
/* Offset set by the linker in the GOT entry would be overwritten
|
|
by dynamic loader instead of added to the symbol location.
|
|
Other target have the same approach on DTPOFF relocs. */
|
|
*reloc_addr += sym->st_value;
|
|
break;
|
|
|
|
case R_ARC_TLS_TPOFF:
|
|
if (sym != NULL)
|
|
{
|
|
CHECK_STATIC_TLS (map, sym_map);
|
|
*reloc_addr = sym_map->l_tls_offset + sym->st_value + reloc->r_addend;
|
|
}
|
|
break;
|
|
|
|
case R_ARC_32:
|
|
*reloc_addr += value + reloc->r_addend;
|
|
break;
|
|
|
|
case R_ARC_PC32:
|
|
*reloc_addr += value + reloc->r_addend - (unsigned long int) reloc_addr;
|
|
break;
|
|
|
|
default:
|
|
_dl_reloc_bad_type (map, r_type, 0);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
static inline void
|
|
__attribute__ ((always_inline))
|
|
elf_machine_rela_relative (ElfW(Addr) l_addr, const ElfW(Rela) *reloc,
|
|
void *const reloc_addr_arg)
|
|
{
|
|
ElfW(Addr) *const reloc_addr = reloc_addr_arg;
|
|
*reloc_addr += l_addr;
|
|
}
|
|
|
|
static inline void
|
|
__attribute__ ((always_inline))
|
|
elf_machine_lazy_rel (struct link_map *map, struct r_scope_elem *scope[],
|
|
ElfW(Addr) l_addr, const ElfW(Rela) *reloc,
|
|
int skip_ifunc)
|
|
{
|
|
ElfW(Addr) *const reloc_addr = (void *) (l_addr + reloc->r_offset);
|
|
const unsigned int r_type = ELFW (R_TYPE) (reloc->r_info);
|
|
|
|
if (r_type == R_ARC_JMP_SLOT)
|
|
*reloc_addr += l_addr;
|
|
else
|
|
_dl_reloc_bad_type (map, r_type, 1);
|
|
}
|
|
|
|
#endif /* RESOLVE_MAP */
|