From nobody Fri Apr 19 09:13:36 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org; dmarc=fail(p=quarantine dis=none) header.from=users.sourceforge.net Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1531141101202212.60554719292122; Mon, 9 Jul 2018 05:58:21 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id BB02E20965DD4; Mon, 9 Jul 2018 05:58:20 -0700 (PDT) Received: from sonic312-21.consmr.mail.ne1.yahoo.com (sonic312-21.consmr.mail.ne1.yahoo.com [66.163.191.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id F3D0920336AC9 for ; Mon, 9 Jul 2018 05:58:19 -0700 (PDT) Received: from sonic.gate.mail.ne1.yahoo.com by sonic312.consmr.mail.ne1.yahoo.com with HTTP; Mon, 9 Jul 2018 12:58:19 +0000 X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=66.163.191.202; helo=sonic312-21.consmr.mail.ne1.yahoo.com; envelope-from=zenith432@users.sourceforge.net; receiver=edk2-devel@lists.01.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1531141099; bh=KDjJFVVyEfCtW0MLVR2wdToJlJWzV9MKa25U23IX6Jw=; h=Date:From:Reply-To:To:Cc:Subject:References:From:Subject; b=NKWNhtg4CRXPdgR1aUyj8h6JNbrEBu0x17OQl1NUX73FXIfdDk4fmFhaVle8+lOFIEiEIRc0sjx96AscEtTW7520crSkLBCc5sIV/WuyetjH0pMVMoUuudUHhnOSr81Shlc/QnmXShlYabvMRzYpkPBDq80l+sVRITyCRufOsnXSalccu3AZRk3xG5vVphbrpYeudaTZ8SwQtCHaj+IEfC/uZS+0YJZcviJvtOXXErE/zRIYuyob1NU+L7zseXn3r+OikL1Fh20nGoBoSrAis3mjyT2T8Kzm3wvzf9/MMsAoIgZU0v0AhEEWISOZkEERE7rCt+yNdvoc4xNZoNjtMg== X-YMail-OSG: S3_GGbIVM1mr3.H.xz59H.pYubgn72Y84eUEHAooe.Sj31G5Wmd_KOAHJ56zQFv QcTTsPVkB3TtTx3cmuDoZget3Toi_dk_yjL.2.Izlxb8KnkWIIjMI5kL56htEs.Q9bCJWNhRev3d ClSU4WE8bs9EYzObi.dBUCfb.zu7XXo2eQR3HHlK9sl2Bz7oY0tua1kljg4axWgxLR6CnaaNWqVR yLaxKbl5jVRB0oqU9lqjKnku8EkWWoA7kiZABSOZI79gmOGHR5asbC7hUThWOMUxCpS3bdLuh_fe Qt7TyRNs.9nPYC498XH8rbytF3f0BEG1RpEtd.tfsJubu9ATZCzI3Vyvgr3usI9ZgrZ_h5nNGvBW Px834JbEXUsZ9w3eKy.TqBia8nkLT9yds2sC01XNyBtOIuHxm4bbj6QCuBDP9X_pSEH_0mJSogg_ .IGSJmsppoFI4T5p36G8iT6J1cSTlUzCLng9AgosgjhgiCSZH_9lj6mT8zRXPL6gtOzpPdWRM.md RtVFf6IOOUgWHjjC8dt5wJUdi.S7VPrleYvTM5sJjqytnayE3jasy5pT4FhfsD1umIFbrsqCLd18 tg97yp93ZT8uE9snTCpI1Fp1PDr4wF4E_zedbe_LK5fu00gSRo2qGkbbf1X2krcji1RdPVNHAPgr 73lX1xlOdwKDW7tLfQyTVxP9qIQKldrgkBtnEjF1SbIx9fP55Kih5_HMbk3pKBHZOHc1HKr9tOHf K9JfwNj9bqh1Qw90zq_NybzOCcw9qLufd5UpdSk0sScHBXeju7DPfLt10JiBJDSgbKjoVciHLvq0 z8bOYwvpdxvCKJnj3iVuV0hpGHy_9CWcQbsmaGFM4yzvOYdbjgzhw_3ADVRG8npEiCOO110o4gqE X4kEoDJ66.3Z1IdZwAAL1te5AFXG3LKfyM0LpJbhOieltCxlkw9J89h0YCnxOSPHYKNHCg3OXp6M dK8YgZY28peBQiBb4xuW80mPPNWxu70M93bQSRLJLrGrJWA-- Date: Mon, 9 Jul 2018 12:58:15 +0000 (UTC) From: Zenith432 To: Message-ID: <1442830504.1295133.1531141095532@mail.yahoo.com> MIME-Version: 1.0 References: <1442830504.1295133.1531141095532.ref@mail.yahoo.com> X-Mailer: WebService/1.1.12062 YahooMailBasic Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 Subject: [edk2] [PATCH v4] BaseTools/GenFw: Add X64 GOTPCREL Support to GenFw X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Zenith432 Cc: liming.gao@intel.com Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Adds support for the following X64 ELF relocations to GenFw R_X86_64_GOTPCREL R_X86_64_GOTPCRELX R_X86_64_REX_GOTPCRELX Background: The GCC49 and GCC5 toolchains use the small pie model for X64. In the small pie model, gcc emits a GOTPCREL relocation whenever C code takes the address of a global function. The emission of GOTPCREL is mitigated by several factors 1. In GCC49, all global symbols are declared hidden thereby eliminating the emission of GOTPCREL. 2. In GCC5, LTO is used. In LTO, the complier first creates intermediate representation (IR) files. During the static link stage, the LTO compiler combines all IR files as a single compilation unit, using linker symbol assistance to generate code. Any global symbols defined in the IR that are not referenced from outside the IR are converted to local symbols - thereby eliminating the emission of GOTPCREL for them. 3. The linker (binutils ld) further transforms any GOTPCREL used with the movq opcode to a direct rip-relative relocation used with the leaq opcode. This linker optimization can be disabled with the option -Wl,--no-relax. Furthermore, gcc is able to emit GOTPCREL with other opcodes - pushq opcode for passing arguments to functions. - addq/subq opcodes for pointer arithmetic. These other opcode uses are not transformed by the linker. Ultimately, in GCC5 there are some emissions of GOTPCREL that survive all these mitigations - if C code takes the address of a global function defined in assembly code - and performs pointer arithmetic on the address - then the GOTPCREL remains in the final linker product. A GOTPCREL relocation today causes the build to stop since GenFw does not handle them. It is possible to eliminate any remaining GOTPCREL emissions by manually declaring the global symbols causing them to have hidden visibility. This patch is offered instead to allow GenFw to handle any residual GOTPCREL. Cc: Shi Steven Cc: Yonghong Zhu Cc: Liming Gao Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Zenith432 Reviewed-by: Liming Gao --- BaseTools/Source/C/GenFw/Elf64Convert.c | 203 +++++++++++++++++++++++- BaseTools/Source/C/GenFw/elf_common.h | 17 ++ 2 files changed, 219 insertions(+), 1 deletion(-) diff --git a/BaseTools/Source/C/GenFw/Elf64Convert.c b/BaseTools/Source/C/G= enFw/Elf64Convert.c index 4636cfee..90351125 100644 --- a/BaseTools/Source/C/GenFw/Elf64Convert.c +++ b/BaseTools/Source/C/GenFw/Elf64Convert.c @@ -94,6 +94,15 @@ STATIC Elf_Ehdr *mEhdr; STATIC Elf_Shdr *mShdrBase; STATIC Elf_Phdr *mPhdrBase; =20 +// +// GOT information +// +STATIC Elf_Shdr *mGOTShdr =3D NULL; +STATIC UINT32 mGOTShindex =3D 0; +STATIC UINT32 *mGOTCoffEntries =3D NULL; +STATIC UINT32 mGOTMaxCoffEntries =3D 0; +STATIC UINT32 mGOTNumCoffEntries =3D 0; + // // Coff information // @@ -322,6 +331,134 @@ GetSymName ( return StrtabContents + Sym->st_name; } =20 +// +// Find the ELF section hosting the GOT from an ELF Rva +// of a single GOT entry. Normally, GOT is placed in +// ELF .text section, so assume once we find in which +// section the GOT is, all GOT entries are there, and +// just verify this. +// +STATIC +VOID +FindElfGOTSectionFromGOTEntryElfRva ( + Elf64_Addr GOTEntryElfRva + ) +{ + UINT32 i; + if (mGOTShdr !=3D NULL) { + if (GOTEntryElfRva >=3D mGOTShdr->sh_addr && + GOTEntryElfRva < mGOTShdr->sh_addr + mGOTShdr->sh_size) { + return; + } + Error (NULL, 0, 3000, "Unsupported", "FindElfGOTSectionFromGOTEntryElf= Rva: GOT entries found in multiple sections."); + exit(EXIT_FAILURE); + } + for (i =3D 0; i < mEhdr->e_shnum; i++) { + Elf_Shdr *shdr =3D GetShdrByIndex(i); + if (GOTEntryElfRva >=3D shdr->sh_addr && + GOTEntryElfRva < shdr->sh_addr + shdr->sh_size) { + mGOTShdr =3D shdr; + mGOTShindex =3D i; + return; + } + } + Error (NULL, 0, 3000, "Invalid", "FindElfGOTSectionFromGOTEntryElfRva: E= lfRva 0x%016LX for GOT entry not found in any section.", GOTEntryElfRva); + exit(EXIT_FAILURE); +} + +// +// Stores locations of GOT entries in COFF image. +// Returns TRUE if GOT entry is new. +// Simple implementation as number of GOT +// entries is expected to be low. +// + +STATIC +BOOLEAN +AccumulateCoffGOTEntries ( + UINT32 GOTCoffEntry + ) +{ + UINT32 i; + if (mGOTCoffEntries !=3D NULL) { + for (i =3D 0; i < mGOTNumCoffEntries; i++) { + if (mGOTCoffEntries[i] =3D=3D GOTCoffEntry) { + return FALSE; + } + } + } + if (mGOTCoffEntries =3D=3D NULL) { + mGOTCoffEntries =3D (UINT32*)malloc(5 * sizeof *mGOTCoffEntries); + if (mGOTCoffEntries =3D=3D NULL) { + Error (NULL, 0, 4001, "Resource", "memory cannot be allocated!"); + } + assert (mGOTCoffEntries !=3D NULL); + mGOTMaxCoffEntries =3D 5; + mGOTNumCoffEntries =3D 0; + } else if (mGOTNumCoffEntries =3D=3D mGOTMaxCoffEntries) { + mGOTCoffEntries =3D (UINT32*)realloc(mGOTCoffEntries, 2 * mGOTMaxCoffE= ntries * sizeof *mGOTCoffEntries); + if (mGOTCoffEntries =3D=3D NULL) { + Error (NULL, 0, 4001, "Resource", "memory cannot be allocated!"); + } + assert (mGOTCoffEntries !=3D NULL); + mGOTMaxCoffEntries +=3D mGOTMaxCoffEntries; + } + mGOTCoffEntries[mGOTNumCoffEntries++] =3D GOTCoffEntry; + return TRUE; +} + +// +// 32-bit Unsigned integer comparator for qsort. +// +STATIC +int +UINT32Comparator ( + const void* lhs, + const void* rhs + ) +{ + if (*(const UINT32*)lhs < *(const UINT32*)rhs) { + return -1; + } + return *(const UINT32*)lhs > *(const UINT32*)rhs; +} + +// +// Emit accumulated Coff GOT entry relocations into +// Coff image. This function performs its job +// once and then releases the entry list, so +// it can safely be called multiple times. +// +STATIC +VOID +EmitGOTRelocations ( + VOID + ) +{ + UINT32 i; + if (mGOTCoffEntries =3D=3D NULL) { + return; + } + // + // Emit Coff relocations with Rvas ordered. + // + qsort( + mGOTCoffEntries, + mGOTNumCoffEntries, + sizeof *mGOTCoffEntries, + UINT32Comparator); + for (i =3D 0; i < mGOTNumCoffEntries; i++) { + VerboseMsg ("EFI_IMAGE_REL_BASED_DIR64 Offset: 0x%08X", mGOTCoffEntrie= s[i]); + CoffAddFixup( + mGOTCoffEntries[i], + EFI_IMAGE_REL_BASED_DIR64); + } + free(mGOTCoffEntries); + mGOTCoffEntries =3D NULL; + mGOTMaxCoffEntries =3D 0; + mGOTNumCoffEntries =3D 0; +} + // // Elf functions interface implementation // @@ -643,6 +780,7 @@ WriteSections64 ( Elf_Shdr *SecShdr; UINT32 SecOffset; BOOLEAN (*Filter)(Elf_Shdr *); + Elf64_Addr GOTEntryRva; =20 // // Initialize filter pointer @@ -710,7 +848,7 @@ WriteSections64 ( // section that applies to the entire binary, and which will have its = section // index set to #0 (which is a NULL section with the SHF_ALLOC bit cle= ared). // - // In the absence of GOT based relocations (which we currently don't s= upport), + // In the absence of GOT based relocations, // this RELA section will contain redundant R_xxx_RELATIVE relocations= , one // for every R_xxx_xx64 relocation appearing in the per-section RELA s= ections. // (i.e., .rela.text and .rela.data) @@ -846,6 +984,44 @@ WriteSections64 ( - (SecOffset - SecShdr->sh_addr)); VerboseMsg ("Relocation: 0x%08X", *(UINT32 *)Targ); break; + case R_X86_64_GOTPCREL: + case R_X86_64_GOTPCRELX: + case R_X86_64_REX_GOTPCRELX: + VerboseMsg ("R_X86_64_GOTPCREL family"); + VerboseMsg ("Offset: 0x%08X, Addend: 0x%08X", + (UINT32)(SecOffset + (Rel->r_offset - SecShdr->sh_addr)), + *(UINT32 *)Targ); + GOTEntryRva =3D Rel->r_offset - Rel->r_addend + *(INT32 *)Targ; + FindElfGOTSectionFromGOTEntryElfRva(GOTEntryRva); + *(UINT32 *)Targ =3D (UINT32) (*(UINT32 *)Targ + + (mCoffSectionsOffset[mGOTShindex] - mGOTShdr->sh_addr) + - (SecOffset - SecShdr->sh_addr)); + VerboseMsg ("Relocation: 0x%08X", *(UINT32 *)Targ); + GOTEntryRva +=3D (mCoffSectionsOffset[mGOTShindex] - mGOTShdr-= >sh_addr); // ELF Rva -> COFF Rva + if (AccumulateCoffGOTEntries((UINT32)GOTEntryRva)) { + // + // Relocate GOT entry if it's the first time we run into it + // + Targ =3D mCoffFile + GOTEntryRva; + // + // Limitation: The following three statements assume memory + // at *Targ is valid because the section containing the GOT + // has already been copied from the ELF image to the Coff = image. + // This pre-condition presently holds because the GOT is p= laced + // in section .text, and the ELF text sections are all cop= ied + // prior to reaching this point. + // If the pre-condition is violated in the future, this fi= xup + // either needs to be deferred after the GOT section is co= pied + // to the Coff image, or the fixup should be performed on = the + // source Elf image instead of the destination Coff image. + // + VerboseMsg ("Offset: 0x%08X, Addend: 0x%016LX", + (UINT32)GOTEntryRva, + *(UINT64 *)Targ); + *(UINT64 *)Targ =3D *(UINT64 *)Targ - SymShdr->sh_addr + mCo= ffSectionsOffset[Sym->st_shndx]; + VerboseMsg ("Relocation: 0x%016LX", *(UINT64*)Targ); + } + break; default: Error (NULL, 0, 3000, "Invalid", "%s unsupported ELF EM_X86_64= relocation 0x%x.", mInImageName, (unsigned) ELF_R_TYPE(Rel->r_info)); } @@ -984,6 +1160,9 @@ WriteRelocations64 ( case R_X86_64_NONE: case R_X86_64_PC32: case R_X86_64_PLT32: + case R_X86_64_GOTPCREL: + case R_X86_64_GOTPCRELX: + case R_X86_64_REX_GOTPCRELX: break; case R_X86_64_64: VerboseMsg ("EFI_IMAGE_REL_BASED_DIR64 Offset: 0x%08X", @@ -1052,10 +1231,32 @@ WriteRelocations64 ( Error (NULL, 0, 3000, "Not Supported", "This tool does not sup= port relocations for ELF with e_machine %u (processor type).", (unsigned) m= Ehdr->e_machine); } } + if (mEhdr->e_machine =3D=3D EM_X86_64 && RelShdr->sh_info =3D=3D m= GOTShindex) { + // + // Tack relocations for GOT entries after other relocations for + // the section the GOT is in, as it's usually found at the end + // of the section. This is done in order to maintain Rva order + // of Coff relocations. + // + EmitGOTRelocations(); + } } } } =20 + if (mEhdr->e_machine =3D=3D EM_X86_64) { + // + // This is a safety net just in case the GOT is in a section + // with no other relocations and the first invocation of + // EmitGOTRelocations() above was skipped. This invocation + // does not maintain Rva order of Coff relocations. + // At present, with a single text section, all references to + // the GOT and the GOT itself reside in section .text, so + // if there's a GOT at all, the first invocation above + // is executed. + // + EmitGOTRelocations(); + } // // Pad by adding empty entries. // diff --git a/BaseTools/Source/C/GenFw/elf_common.h b/BaseTools/Source/C/Gen= Fw/elf_common.h index 242ad00a..03dec50c 100644 --- a/BaseTools/Source/C/GenFw/elf_common.h +++ b/BaseTools/Source/C/GenFw/elf_common.h @@ -1052,6 +1052,23 @@ typedef struct { #define R_X86_64_DTPOFF32 21 /* Offset in TLS block */ #define R_X86_64_GOTTPOFF 22 /* PC relative offset to IE GOT entry */ #define R_X86_64_TPOFF32 23 /* Offset in static TLS block */ +#define R_X86_64_PC64 24 /* PC relative 64 bit */ +#define R_X86_64_GOTOFF64 25 /* 64 bit offset to GOT */ +#define R_X86_64_GOTPC3 26 /* 32 bit signed pc relative offset to GOT */ +#define R_X86_64_GOT64 27 /* 64-bit GOT entry offset */ +#define R_X86_64_GOTPCREL64 28 /* 64-bit PC relative offset to GOT entr= y */ +#define R_X86_64_GOTPC64 29 /* 64-bit PC relative offset to GOT */ +#define R_X86_64_GOTPLT64 30 /* like GOT64, says PLT entry needed */ +#define R_X86_64_PLTOFF64 31 /* 64-bit GOT relative offset to PLT entry= */ +#define R_X86_64_SIZE32 32 /* Size of symbol plus 32-bit addend */ +#define R_X86_64_SIZE64 33 /* Size of symbol plus 64-bit addend */ +#define R_X86_64_GOTPC32_TLSDESC 34 /* GOT offset for TLS descriptor. */ +#define R_X86_64_TLSDESC_CALL 35 /* Marker for call through TLS descrip= tor. */ +#define R_X86_64_TLSDESC 36 /* TLS descriptor. */ +#define R_X86_64_IRELATIVE 37 /* Adjust indirectly by program base */ +#define R_X86_64_RELATIVE64 38 /* 64-bit adjust by program base */ +#define R_X86_64_GOTPCRELX 41 /* Load from 32 bit signed pc relative of= fset to GOT entry without REX prefix, relaxable. */ +#define R_X86_64_REX_GOTPCRELX 42 /* Load from 32 bit signed pc relativ= e offset to GOT entry with REX prefix, relaxable. */ =20 =20 #endif /* !_SYS_ELF_COMMON_H_ */ --=20 2.17.1 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel