Message ID | 20231220132305.459519-1-cupertino.miranda@oracle.com |
---|---|
State | Accepted |
Headers |
Return-Path: <binutils-bounces+ouuuleilei=gmail.com@sourceware.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:24d3:b0:fb:cd0c:d3e with SMTP id r19csp2632386dyi; Wed, 20 Dec 2023 05:23:52 -0800 (PST) X-Google-Smtp-Source: AGHT+IHHuB04mdDkw8WyHSWdFm6muGlFXXTQS8y4qKYUJ4T7zO5TFX6xYCyns6BjdikSCOEYtF5T X-Received: by 2002:ac8:59d3:0:b0:423:82dc:61b7 with SMTP id f19-20020ac859d3000000b0042382dc61b7mr31839406qtf.30.1703078632623; Wed, 20 Dec 2023 05:23:52 -0800 (PST) ARC-Seal: i=3; a=rsa-sha256; t=1703078632; cv=pass; d=google.com; s=arc-20160816; b=tYEZM965YHR+6phSEziqCqcHVr5EIV0noEf+nlJBc+Tu1TdoEPBsnilEhBT/5FFj/J oE/RJdjBK7FOB9s6Qge32i43T8ewIQ4FgLEMczGwBYdGhrLeckEbQH1ZGgbSspIiJD7X m+CMQ+lhnzmRX8aL/bsm2P6kkVepGfVBECWRjRvVJwjZghem7Z94GMg42tVQoSf8mZPP nmnqoMLxXQpJk82ih65RmHBDvie7z9x8fEcr2lU1f+HWlAsC/J3UOZU8hlGhic5PyN6w DNBxvuSX4I2fNo86HmqMwqbOnVcCTmgvryhE1c5sacda4DZ85BkQKzyUAvEogtTJJdlU efcg== ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:mime-version :content-transfer-encoding:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature:arc-filter:dmarc-filter:delivered-to; bh=zOWIo5jsbuF0rQQmk/Q+5t+FvWo9SEtCSRy4nUMOddM=; fh=1sNJnojMmPCZCdFSbI5w/snCdnPQCOkvv+iduYvL91A=; b=VISfGjGv+X+Udr2e4a5K8qGw2lAWvHq1BuTEsIOpoWd4hZjcoTZp1oaTy1zUPKdHuq Xa6O3cVfmbWQ6jjxc0U7BMpFfvDs3f2SXIQGmTVgNUBhNC6Urrph3bAuFR6KZyEt0AWG psMEQHxPdgqy4UjTataGAA9sq0z4DrKZExlGTyBtjBaRKUNl1OAJkTU6rHOIBY1WwQcc Vn0VGT+pVpqJRbQsVBjxE/K+Zuw8IpxSUDBLkX4YWr605RImtgB7oJL3GwMSY3PefWJG W+7/bwsA0+d0QpoqQ/8SRP0UycEFpNDRRJPrNxGwCE4XHPz9qg6ZaOox+NUyvjij47iQ 0kZw== ARC-Authentication-Results: i=3; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-11-20 header.b=csXW9x9C; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=S9PRndXz; arc=pass (i=2); spf=pass (google.com: domain of binutils-bounces+ouuuleilei=gmail.com@sourceware.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) smtp.mailfrom="binutils-bounces+ouuuleilei=gmail.com@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from server2.sourceware.org (server2.sourceware.org. [2620:52:3:1:0:246e:9693:128c]) by mx.google.com with ESMTPS id s14-20020ac85cce000000b004278e2b4708si693061qta.726.2023.12.20.05.23.52 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 Dec 2023 05:23:52 -0800 (PST) Received-SPF: pass (google.com: domain of binutils-bounces+ouuuleilei=gmail.com@sourceware.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) client-ip=2620:52:3:1:0:246e:9693:128c; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-11-20 header.b=csXW9x9C; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=S9PRndXz; arc=pass (i=2); spf=pass (google.com: domain of binutils-bounces+ouuuleilei=gmail.com@sourceware.org designates 2620:52:3:1:0:246e:9693:128c as permitted sender) smtp.mailfrom="binutils-bounces+ouuuleilei=gmail.com@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 55540386100D for <ouuuleilei@gmail.com>; Wed, 20 Dec 2023 13:23:52 +0000 (GMT) X-Original-To: binutils@sourceware.org Delivered-To: binutils@sourceware.org Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by sourceware.org (Postfix) with ESMTPS id 8F9A23858D20 for <binutils@sourceware.org>; Wed, 20 Dec 2023 13:23:45 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 8F9A23858D20 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=oracle.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=oracle.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 8F9A23858D20 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=205.220.177.32 ARC-Seal: i=2; a=rsa-sha256; d=sourceware.org; s=key; t=1703078626; cv=pass; b=ODxaj1v3SGtGkx6dwMLTGuljewLQdeCcOTxB8xDoQdTHmUSc2VrjQZHDDo7GLlj3nabrRXhiQkdQkYdPCwvy4KlDKFq3xlJj0fB36WJeRspzIm6O4J1pPdtvhOWANQXl651GzCYxF3BTDdBEIbUvbkXuvesGlQN6PNII4O0ymw4= ARC-Message-Signature: i=2; a=rsa-sha256; d=sourceware.org; s=key; t=1703078626; c=relaxed/simple; bh=wNP9XAHeVFnKLrQgpxiK6uazlp8h20L/uqPCfAgo4I0=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-Id: MIME-Version; b=alUEV0EqA1PbSBcJOmSxUQGfVUl07ZkfakyBmkeTMaF1p4mwNfmazbYgD3QHUWvsDGKeubhZCD0PscZiLTFDEdz0yfhDN46TpKgVteCASM1dRPsUj3+u4befokXIOxbCA8Ua74bk3rK5fqpWQx7LRjeW66c+vyyXLbWmExDs2XI= ARC-Authentication-Results: i=2; server2.sourceware.org Received: from pps.filterd (m0246631.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 3BK5Su3e032266; Wed, 20 Dec 2023 13:23:44 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : content-transfer-encoding : content-type : mime-version; s=corp-2023-11-20; bh=zOWIo5jsbuF0rQQmk/Q+5t+FvWo9SEtCSRy4nUMOddM=; b=csXW9x9CI4l/k+jy2qIYVCukmVaxdULrwmEcQuYGJo59Erp1flOVTjtSdVi2JQ4Ioa9g TUPnmyUquCQ1/+a9xM++4LyJLUHuy71VWADV7JV10KAmg/xZwBpY1hvCBwt8zZEO5Abp HwAK/EOLih0TtoSjJ1BJdYn6i1fTvKpHD7h0ns5SWtPECLP5wDbby3u2SAZW+axEN/vt kHl471pYK0oAunwJ1l/YH418dEdvjKGcVIoQnvIzNGD3zbc0WtmudLoyYfG8ju5bAcfc WXMMmorFRPqtbVVFCqPPj1pbHY9AiuDAgrvtng91g0Aqjdg8BrxgXEuDicVu9p5FxbiV 5A== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3v12p48gm3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 20 Dec 2023 13:23:43 +0000 Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 3BKCFNeH019989; Wed, 20 Dec 2023 13:23:43 GMT Received: from nam10-mw2-obe.outbound.protection.outlook.com (mail-mw2nam10lp2100.outbound.protection.outlook.com [104.47.55.100]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3v12benf7b-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 20 Dec 2023 13:23:41 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AYcgMyaVTuhGjyIi2TNG5Z7UVXNYIr3GZGYRiJbGflap+XY+1V/wr8BlLBVvc2QrlW2Y82UsQAisqSsL3ZJgvPdsYB+0NqyyHb9559nzLlP8X6JXqcEUwCZZwOX5oOm+WFR/x5PCsnPgzmFu9x7Zc70cunoIpM875GqwKfMZ+jy+LLE7SR57pi3u5njtExi/H24/MA37M/K98YPEgFJlMtCEMLomVE869opidl+G5yaUH7DSxnYwgxqTS9yKXmqjYR0PTJCrY2PQlGxtJ77l3l6hFKiOGmleYfGjn96G/WX/xfTmYdPX0rBuOtyI9SyAUMhbDWXFwAJRIZTev1gpzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=zOWIo5jsbuF0rQQmk/Q+5t+FvWo9SEtCSRy4nUMOddM=; b=k6fthJ89U1fcqyFs7745YQF4Yg8xhCl0TLqxmGqDIrxk1EXEorgm/1z2eqsA6vcjL2H3gxbHGpLD8UYM11Bp+cvWvfOpIiOkUaWROLtNMmKotS+OWWs9HBEO9SPix3+Cf37C5lzDyLmrebcBCqGd0+Dkuh501wNvdWklBgnEwpntpMcHMoG6GwbKCup7hM8fVL/QDP/eYKYoXbj36jp7jDXZtvH/pvi76P6IOyXKTFL6R93UNx1xqdnSNIcb1AEgqpeawqUEKnu/oYcd/MHTQN6HEJvJuaT4PlZmvrIRpBhIfwRKhLrkPJgcddzy/K2aXw47ubXQPVRWsJueebXeRA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zOWIo5jsbuF0rQQmk/Q+5t+FvWo9SEtCSRy4nUMOddM=; b=S9PRndXz2EHv579wW9izGfw+7YbRISBr1WcoEUeyG1njD19tDTNB3JRYKEHURt54bUv37t3KeHQqM3AUjGTz/ATuqQ74QhRKXsKotNPzlEgLKCjAwrsmV3cLmUlF6qevZ8FT+qOYKy4chI1rmLkpzTxZ9yDvWkyDizuy0jSYV+4= Received: from BN6PR1001MB2340.namprd10.prod.outlook.com (2603:10b6:405:30::36) by LV3PR10MB7867.namprd10.prod.outlook.com (2603:10b6:408:1b0::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7091.38; Wed, 20 Dec 2023 13:23:12 +0000 Received: from BN6PR1001MB2340.namprd10.prod.outlook.com ([fe80::fec4:3a58:6118:aab2]) by BN6PR1001MB2340.namprd10.prod.outlook.com ([fe80::fec4:3a58:6118:aab2%6]) with mapi id 15.20.7113.016; Wed, 20 Dec 2023 13:23:12 +0000 From: Cupertino Miranda <cupertino.miranda@oracle.com> To: binutils@sourceware.org Cc: nickc@redhat.com, elena.zannoni@oracle.com, jose.marchesi@oracle.com, Cupertino Miranda <cupertino.miranda@oracle.com> Subject: [PATCH] bpf: Added linker support for R_BPF_64_NODYLD32. Date: Wed, 20 Dec 2023 13:23:05 +0000 Message-Id: <20231220132305.459519-1-cupertino.miranda@oracle.com> X-Mailer: git-send-email 2.30.2 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: AM0PR01CA0144.eurprd01.prod.exchangelabs.com (2603:10a6:208:168::49) To BN6PR1001MB2340.namprd10.prod.outlook.com (2603:10b6:405:30::36) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN6PR1001MB2340:EE_|LV3PR10MB7867:EE_ X-MS-Office365-Filtering-Correlation-Id: 3db64dae-51bf-43c2-212b-08dc015ed105 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN6PR1001MB2340.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376002)(136003)(366004)(346002)(396003)(39860400002)(230922051799003)(1800799012)(451199024)(186009)(64100799003)(38100700002)(6512007)(6916009)(316002)(66476007)(966005)(66946007)(86362001)(66556008)(2616005)(44832011)(8936002)(83380400001)(6486002)(107886003)(8676002)(1076003)(2906002)(4326008)(6506007)(6666004)(478600001)(5660300002)(41300700001)(36756003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3db64dae-51bf-43c2-212b-08dc015ed105 X-MS-Exchange-CrossTenant-AuthSource: BN6PR1001MB2340.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Dec 2023 13:23:12.8420 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: gj52hDHW+vz8OJGSN9+LMO4vkI84ylg0kvdtxPDU1K653hZibCpSayjCi6mwFsTpa/5C8Rg2PSl9jiSDeWuovDdiWt1GV6rTqrsKbUZ8TEk= X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV3PR10MB7867 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.997,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-12-20_02,2023-12-14_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 suspectscore=0 spamscore=0 mlxlogscore=888 malwarescore=0 bulkscore=0 phishscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311290000 definitions=main-2312200095 X-Proofpoint-GUID: -ioHwwOLLYlY3_rplJm5qkfdBr7y-LWF X-Proofpoint-ORIG-GUID: -ioHwwOLLYlY3_rplJm5qkfdBr7y-LWF X-Spam-Status: No, score=-12.5 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5, RCVD_IN_MSPIKE_WL, SPF_HELO_NONE, SPF_NONE, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: binutils@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Binutils mailing list <binutils.sourceware.org> List-Unsubscribe: <https://sourceware.org/mailman/options/binutils>, <mailto:binutils-request@sourceware.org?subject=unsubscribe> List-Archive: <https://sourceware.org/pipermail/binutils/> List-Post: <mailto:binutils@sourceware.org> List-Help: <mailto:binutils-request@sourceware.org?subject=help> List-Subscribe: <https://sourceware.org/mailman/listinfo/binutils>, <mailto:binutils-request@sourceware.org?subject=subscribe> Errors-To: binutils-bounces+ouuuleilei=gmail.com@sourceware.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1785807380460079271 X-GMAIL-MSGID: 1785807380460079271 |
Series |
bpf: Added linker support for R_BPF_64_NODYLD32.
|
|
Checks
Context | Check | Description |
---|---|---|
snail/binutils-gdb-check | success | Github commit url |
Commit Message
Cupertino Miranda
Dec. 20, 2023, 1:23 p.m. UTC
Hi everyone, This patch is in context of Nick Cliftons request in thread: https://sourceware.org/pipermail/binutils/2023-October/130194.html due to bug reported in: https://bugzilla.redhat.com/show_bug.cgi?id=2245296 For the time being the linker is not used in BPF infrastructure. Considering that and without a proper way to validate the code, the following patch is what I think is missing in order to add linker support for the particular relocation. Looking forward to your review. Best regards, Cupertino This patch adds linker support to patch R_BPF_64_NODYLD32 relocations. The implementation was based on comments and code in LLVM, as the GNU toolchain does not uses this relocation type. --- bfd/elf64-bpf.c | 1 + 1 file changed, 1 insertion(+)
Comments
Hi Cuper. > Hi everyone, > > This patch is in context of Nick Cliftons request in thread: > https://sourceware.org/pipermail/binutils/2023-October/130194.html > due to bug reported in: > https://bugzilla.redhat.com/show_bug.cgi?id=2245296 > > For the time being the linker is not used in BPF infrastructure. > Considering that and without a proper way to validate the code, the > following patch is what I think is missing in order to add linker > support for the particular relocation. > > Looking forward to your review. > > Best regards, > Cupertino > > This patch adds linker support to patch R_BPF_64_NODYLD32 relocations. > The implementation was based on comments and code in LLVM, as the GNU > toolchain does not uses this relocation type. > --- > bfd/elf64-bpf.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/bfd/elf64-bpf.c b/bfd/elf64-bpf.c > index aefad7da5ac..5820dd3d7d4 100644 > --- a/bfd/elf64-bpf.c > +++ b/bfd/elf64-bpf.c > @@ -276,6 +276,7 @@ bpf_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED, > } > case R_BPF_64_ABS64: > case R_BPF_64_ABS32: > + case R_BPF_64_NODYLD32: I would add here a comment explaining that R_BPF_64_NODYLD32 shall be handled/resolved like R_BPF_64_ABS32 and that it differs from ABS32 only in that the LLVM execution engine is not supposed to resolve it. Given that, the patch is OK. Thanks! > { > addend = bfd_get (howto->bitsize, input_bfd, where); > relocation += addend;
Hi Jose, Thanks for your review. I realized I missed to update the macro for the relocation where the properties like size, overflow check, (etc.) are defined. I have added the comment near the relocation macro definition. Sending the patch for review once again. Regards, Cupertino Jose E. Marchesi writes: > Hi Cuper. > >> Hi everyone, >> >> This patch is in context of Nick Cliftons request in thread: >> https://sourceware.org/pipermail/binutils/2023-October/130194.html >> due to bug reported in: >> https://bugzilla.redhat.com/show_bug.cgi?id=2245296 >> >> For the time being the linker is not used in BPF infrastructure. >> Considering that and without a proper way to validate the code, the >> following patch is what I think is missing in order to add linker >> support for the particular relocation. >> >> Looking forward to your review. >> >> Best regards, >> Cupertino >> >> This patch adds linker support to patch R_BPF_64_NODYLD32 relocations. >> The implementation was based on comments and code in LLVM, as the GNU >> toolchain does not uses this relocation type. >> --- >> bfd/elf64-bpf.c | 1 + >> 1 file changed, 1 insertion(+) >> >> diff --git a/bfd/elf64-bpf.c b/bfd/elf64-bpf.c >> index aefad7da5ac..5820dd3d7d4 100644 >> --- a/bfd/elf64-bpf.c >> +++ b/bfd/elf64-bpf.c >> @@ -276,6 +276,7 @@ bpf_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED, >> } >> case R_BPF_64_ABS64: >> case R_BPF_64_ABS32: >> + case R_BPF_64_NODYLD32: > > I would add here a comment explaining that R_BPF_64_NODYLD32 shall be > handled/resolved like R_BPF_64_ABS32 and that it differs from ABS32 only > in that the LLVM execution engine is not supposed to resolve it. > > Given that, the patch is OK. > Thanks! > >> { >> addend = bfd_get (howto->bitsize, input_bfd, where); >> relocation += addend;
Hi Cuper. OK, thanks. > Hi Jose, > > Thanks for your review. > I realized I missed to update the macro for the relocation where the > properties like size, overflow check, (etc.) are defined. > I have added the comment near the relocation macro definition. > > Sending the patch for review once again. > > Regards, > Cupertino > > From bb8afde9a8f17d42393067c3a667bec1f08b252a Mon Sep 17 00:00:00 2001 > From: Cupertino Miranda <cupertino.miranda@oracle.com> > Date: Wed, 20 Dec 2023 12:24:03 +0000 > Subject: [PATCH] bpf: Added linker support for R_BPF_64_NODYLD32. > > This patch adds linker support to patch R_BPF_64_NODYLD32 relocations. > The implementation was based on comments and code in LLVM, as the GNU > toolchain does not uses this relocation type. > --- > bfd/bpf-reloc.def | 17 ++++++++++------- > bfd/elf64-bpf.c | 1 + > 2 files changed, 11 insertions(+), 7 deletions(-) > > diff --git a/bfd/bpf-reloc.def b/bfd/bpf-reloc.def > index 7e7497892fa..42ba1a169ea 100644 > --- a/bfd/bpf-reloc.def > +++ b/bfd/bpf-reloc.def > @@ -90,17 +90,20 @@ > > /* R_BPF_64_NODYLD32 is not used by GNU tools - but it is generated by LLVM. > We provide an entry here so that tools like strip can safely handle BPF > - binaries generated by other tools. */ > + binaries generated by other tools. > + R_BPF_64_NODYLD32 should be fixed at linker like a R_BPF_64_ABS32. > + The difference to ABS32 is that LLVM execution engine does not resolve > + R_BPF_64_NODYLD32 relocations. */ > BPF_HOWTO (R_BPF_64_NODYLD32, /* type */ > 0, /* rightshift */ > - 0, /* size */ > - 0, /* bitsize */ > + 4, /* size */ > + 32, /* bitsize */ > false, /* pc_relative */ > 0, /* bitpos */ > - complain_overflow_dont, /* complain_on_overflow */ > + complain_overflow_bitfield, /* complain_on_overflow */ > bpf_elf_generic_reloc, /* special_function */ > "R_BPF_64_NODYLD32", /* name */ > false, /* partial_inplace */ > - 0, /* src_mask */ > - 0, /* dst_mask */ > - false) /* pcrel_offset */ > + 0xffffffff, /* src_mask */ > + 0xffffffff, /* dst_mask */ > + true) /* pcrel_offset */ > diff --git a/bfd/elf64-bpf.c b/bfd/elf64-bpf.c > index c932a4024ba..0bffe2c5717 100644 > --- a/bfd/elf64-bpf.c > +++ b/bfd/elf64-bpf.c > @@ -276,6 +276,7 @@ bpf_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED, > } > case R_BPF_64_ABS64: > case R_BPF_64_ABS32: > + case R_BPF_64_NODYLD32: > { > addend = bfd_get (howto->bitsize, input_bfd, where); > relocation += addend;
Thanks! Committed. Jose E. Marchesi writes: > Hi Cuper. > OK, thanks. > >> Hi Jose, >> >> Thanks for your review. >> I realized I missed to update the macro for the relocation where the >> properties like size, overflow check, (etc.) are defined. >> I have added the comment near the relocation macro definition. >> >> Sending the patch for review once again. >> >> Regards, >> Cupertino >> >> From bb8afde9a8f17d42393067c3a667bec1f08b252a Mon Sep 17 00:00:00 2001 >> From: Cupertino Miranda <cupertino.miranda@oracle.com> >> Date: Wed, 20 Dec 2023 12:24:03 +0000 >> Subject: [PATCH] bpf: Added linker support for R_BPF_64_NODYLD32. >> >> This patch adds linker support to patch R_BPF_64_NODYLD32 relocations. >> The implementation was based on comments and code in LLVM, as the GNU >> toolchain does not uses this relocation type. >> --- >> bfd/bpf-reloc.def | 17 ++++++++++------- >> bfd/elf64-bpf.c | 1 + >> 2 files changed, 11 insertions(+), 7 deletions(-) >> >> diff --git a/bfd/bpf-reloc.def b/bfd/bpf-reloc.def >> index 7e7497892fa..42ba1a169ea 100644 >> --- a/bfd/bpf-reloc.def >> +++ b/bfd/bpf-reloc.def >> @@ -90,17 +90,20 @@ >> >> /* R_BPF_64_NODYLD32 is not used by GNU tools - but it is generated by LLVM. >> We provide an entry here so that tools like strip can safely handle BPF >> - binaries generated by other tools. */ >> + binaries generated by other tools. >> + R_BPF_64_NODYLD32 should be fixed at linker like a R_BPF_64_ABS32. >> + The difference to ABS32 is that LLVM execution engine does not resolve >> + R_BPF_64_NODYLD32 relocations. */ >> BPF_HOWTO (R_BPF_64_NODYLD32, /* type */ >> 0, /* rightshift */ >> - 0, /* size */ >> - 0, /* bitsize */ >> + 4, /* size */ >> + 32, /* bitsize */ >> false, /* pc_relative */ >> 0, /* bitpos */ >> - complain_overflow_dont, /* complain_on_overflow */ >> + complain_overflow_bitfield, /* complain_on_overflow */ >> bpf_elf_generic_reloc, /* special_function */ >> "R_BPF_64_NODYLD32", /* name */ >> false, /* partial_inplace */ >> - 0, /* src_mask */ >> - 0, /* dst_mask */ >> - false) /* pcrel_offset */ >> + 0xffffffff, /* src_mask */ >> + 0xffffffff, /* dst_mask */ >> + true) /* pcrel_offset */ >> diff --git a/bfd/elf64-bpf.c b/bfd/elf64-bpf.c >> index c932a4024ba..0bffe2c5717 100644 >> --- a/bfd/elf64-bpf.c >> +++ b/bfd/elf64-bpf.c >> @@ -276,6 +276,7 @@ bpf_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED, >> } >> case R_BPF_64_ABS64: >> case R_BPF_64_ABS32: >> + case R_BPF_64_NODYLD32: >> { >> addend = bfd_get (howto->bitsize, input_bfd, where); >> relocation += addend;
diff --git a/bfd/elf64-bpf.c b/bfd/elf64-bpf.c index aefad7da5ac..5820dd3d7d4 100644 --- a/bfd/elf64-bpf.c +++ b/bfd/elf64-bpf.c @@ -276,6 +276,7 @@ bpf_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED, } case R_BPF_64_ABS64: case R_BPF_64_ABS32: + case R_BPF_64_NODYLD32: { addend = bfd_get (howto->bitsize, input_bfd, where); relocation += addend;