2014-01-27 06:23:15 +01:00
|
|
|
/** @file
|
2014-08-28 15:53:34 +02:00
|
|
|
Elf64 convert solution
|
2014-01-27 06:23:15 +01:00
|
|
|
|
2020-11-25 01:25:05 +01:00
|
|
|
Copyright (c) 2010 - 2021, Intel Corporation. All rights reserved.<BR>
|
2021-10-29 18:48:26 +02:00
|
|
|
Portions copyright (c) 2013-2022, ARM Ltd. All rights reserved.<BR>
|
2020-04-23 15:52:32 +02:00
|
|
|
Portions Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
|
2022-09-06 15:00:07 +02:00
|
|
|
Portions Copyright (c) 2022, Loongson Technology Corporation Limited. All rights reserved.<BR>
|
2014-01-27 06:23:15 +01:00
|
|
|
|
2019-04-04 01:03:11 +02:00
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
2014-01-27 06:23:15 +01:00
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
#include "WinNtInclude.h"
|
|
|
|
|
|
|
|
#ifndef __GNUC__
|
|
|
|
#include <windows.h>
|
|
|
|
#include <io.h>
|
|
|
|
#endif
|
|
|
|
#include <assert.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
|
|
|
|
#include <Common/UefiBaseTypes.h>
|
|
|
|
#include <IndustryStandard/PeImage.h>
|
|
|
|
|
|
|
|
#include "PeCoffLib.h"
|
|
|
|
#include "EfiUtilityMsgs.h"
|
|
|
|
|
|
|
|
#include "GenFw.h"
|
|
|
|
#include "ElfConvert.h"
|
|
|
|
#include "Elf64Convert.h"
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
ScanSections64 (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
BOOLEAN
|
|
|
|
WriteSections64 (
|
|
|
|
SECTION_FILTER_TYPES FilterType
|
|
|
|
);
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
WriteRelocations64 (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
WriteDebug64 (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
WriteExport64 (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
SetImageSize64 (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
CleanUp64 (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
|
|
|
//
|
2019-02-06 08:44:39 +01:00
|
|
|
// Rename ELF32 structures to common names to help when porting to ELF64.
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
typedef Elf64_Shdr Elf_Shdr;
|
|
|
|
typedef Elf64_Ehdr Elf_Ehdr;
|
|
|
|
typedef Elf64_Rel Elf_Rel;
|
|
|
|
typedef Elf64_Rela Elf_Rela;
|
|
|
|
typedef Elf64_Sym Elf_Sym;
|
|
|
|
typedef Elf64_Phdr Elf_Phdr;
|
|
|
|
typedef Elf64_Dyn Elf_Dyn;
|
|
|
|
#define ELFCLASS ELFCLASS64
|
|
|
|
#define ELF_R_TYPE(r) ELF64_R_TYPE(r)
|
|
|
|
#define ELF_R_SYM(r) ELF64_R_SYM(r)
|
|
|
|
|
|
|
|
//
|
|
|
|
// Well known ELF structures.
|
|
|
|
//
|
|
|
|
STATIC Elf_Ehdr *mEhdr;
|
|
|
|
STATIC Elf_Shdr *mShdrBase;
|
|
|
|
STATIC Elf_Phdr *mPhdrBase;
|
|
|
|
|
2018-07-09 14:58:15 +02:00
|
|
|
//
|
|
|
|
// GOT information
|
|
|
|
//
|
|
|
|
STATIC Elf_Shdr *mGOTShdr = NULL;
|
|
|
|
STATIC UINT32 mGOTShindex = 0;
|
|
|
|
STATIC UINT32 *mGOTCoffEntries = NULL;
|
|
|
|
STATIC UINT32 mGOTMaxCoffEntries = 0;
|
|
|
|
STATIC UINT32 mGOTNumCoffEntries = 0;
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// Coff information
|
|
|
|
//
|
2015-06-29 05:17:34 +02:00
|
|
|
STATIC UINT32 mCoffAlignment = 0x20;
|
2014-01-27 06:23:15 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// PE section alignment.
|
|
|
|
//
|
2022-03-14 06:27:21 +01:00
|
|
|
STATIC UINT16 mCoffNbrSections = 4;
|
2014-01-27 06:23:15 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// ELF sections to offset in Coff file.
|
|
|
|
//
|
|
|
|
STATIC UINT32 *mCoffSectionsOffset = NULL;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Offsets in COFF file
|
|
|
|
//
|
|
|
|
STATIC UINT32 mNtHdrOffset;
|
|
|
|
STATIC UINT32 mTextOffset;
|
|
|
|
STATIC UINT32 mDataOffset;
|
|
|
|
STATIC UINT32 mHiiRsrcOffset;
|
|
|
|
STATIC UINT32 mRelocOffset;
|
2015-07-27 15:49:54 +02:00
|
|
|
STATIC UINT32 mDebugOffset;
|
2022-03-14 06:27:21 +01:00
|
|
|
STATIC UINT32 mExportOffset;
|
2020-04-23 15:52:32 +02:00
|
|
|
//
|
|
|
|
// Used for RISC-V relocations.
|
|
|
|
//
|
|
|
|
STATIC UINT8 *mRiscVPass1Targ = NULL;
|
|
|
|
STATIC Elf_Shdr *mRiscVPass1Sym = NULL;
|
|
|
|
STATIC Elf64_Half mRiscVPass1SymSecIndex = 0;
|
2021-06-24 15:25:31 +02:00
|
|
|
STATIC INT32 mRiscVPass1Offset;
|
|
|
|
STATIC INT32 mRiscVPass1GotFixup;
|
2020-04-23 15:52:32 +02:00
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
//
|
|
|
|
// Used for Export section.
|
|
|
|
//
|
|
|
|
STATIC UINT32 mExportSize;
|
|
|
|
STATIC UINT32 mExportRVA[PRM_MODULE_EXPORT_SYMBOL_NUM];
|
|
|
|
STATIC UINT32 mExportSymNum;
|
|
|
|
STATIC CHAR8 mExportSymName[PRM_MODULE_EXPORT_SYMBOL_NUM][PRM_HANDLER_NAME_MAXIMUM_LENGTH];
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// Initialization Function
|
|
|
|
//
|
|
|
|
BOOLEAN
|
|
|
|
InitializeElf64 (
|
|
|
|
UINT8 *FileBuffer,
|
|
|
|
ELF_FUNCTION_TABLE *ElfFunctions
|
|
|
|
)
|
|
|
|
{
|
|
|
|
//
|
|
|
|
// Initialize data pointer and structures.
|
|
|
|
//
|
|
|
|
VerboseMsg ("Set EHDR");
|
|
|
|
mEhdr = (Elf_Ehdr*) FileBuffer;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check the ELF64 specific header information.
|
|
|
|
//
|
|
|
|
VerboseMsg ("Check ELF64 Header Information");
|
|
|
|
if (mEhdr->e_ident[EI_CLASS] != ELFCLASS64) {
|
|
|
|
Error (NULL, 0, 3000, "Unsupported", "ELF EI_DATA not ELFCLASS64");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
if (mEhdr->e_ident[EI_DATA] != ELFDATA2LSB) {
|
|
|
|
Error (NULL, 0, 3000, "Unsupported", "ELF EI_DATA not ELFDATA2LSB");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
if ((mEhdr->e_type != ET_EXEC) && (mEhdr->e_type != ET_DYN)) {
|
|
|
|
Error (NULL, 0, 3000, "Unsupported", "ELF e_type not ET_EXEC or ET_DYN");
|
|
|
|
return FALSE;
|
|
|
|
}
|
2022-09-06 15:00:07 +02:00
|
|
|
if (!((mEhdr->e_machine == EM_X86_64) || (mEhdr->e_machine == EM_AARCH64) || (mEhdr->e_machine == EM_RISCV64) || (mEhdr->e_machine == EM_LOONGARCH))) {
|
2020-11-25 01:25:05 +01:00
|
|
|
Warning (NULL, 0, 3000, "Unsupported", "ELF e_machine is not Elf64 machine.");
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
if (mEhdr->e_version != EV_CURRENT) {
|
|
|
|
Error (NULL, 0, 3000, "Unsupported", "ELF e_version (%u) not EV_CURRENT (%d)", (unsigned) mEhdr->e_version, EV_CURRENT);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
if (mExportFlag) {
|
2021-10-29 18:48:26 +02:00
|
|
|
if ((mEhdr->e_machine != EM_X86_64) && (mEhdr->e_machine != EM_AARCH64)) {
|
|
|
|
Error (NULL, 0, 3000, "Unsupported", "--prm option currently only supports X64 and AArch64 archs.");
|
2022-03-14 06:27:21 +01:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// Update section header pointers
|
|
|
|
//
|
|
|
|
VerboseMsg ("Update Header Pointers");
|
|
|
|
mShdrBase = (Elf_Shdr *)((UINT8 *)mEhdr + mEhdr->e_shoff);
|
|
|
|
mPhdrBase = (Elf_Phdr *)((UINT8 *)mEhdr + mEhdr->e_phoff);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Create COFF Section offset buffer and zero.
|
|
|
|
//
|
|
|
|
VerboseMsg ("Create COFF Section Offset Buffer");
|
|
|
|
mCoffSectionsOffset = (UINT32 *)malloc(mEhdr->e_shnum * sizeof (UINT32));
|
2016-10-11 04:20:14 +02:00
|
|
|
if (mCoffSectionsOffset == NULL) {
|
|
|
|
Error (NULL, 0, 4001, "Resource", "memory cannot be allocated!");
|
|
|
|
return FALSE;
|
|
|
|
}
|
2014-01-27 06:23:15 +01:00
|
|
|
memset(mCoffSectionsOffset, 0, mEhdr->e_shnum * sizeof(UINT32));
|
|
|
|
|
|
|
|
//
|
|
|
|
// Fill in function pointers.
|
|
|
|
//
|
|
|
|
VerboseMsg ("Fill in Function Pointers");
|
|
|
|
ElfFunctions->ScanSections = ScanSections64;
|
|
|
|
ElfFunctions->WriteSections = WriteSections64;
|
|
|
|
ElfFunctions->WriteRelocations = WriteRelocations64;
|
|
|
|
ElfFunctions->WriteDebug = WriteDebug64;
|
|
|
|
ElfFunctions->SetImageSize = SetImageSize64;
|
|
|
|
ElfFunctions->CleanUp = CleanUp64;
|
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
if (mExportFlag) {
|
|
|
|
mCoffNbrSections ++;
|
|
|
|
ElfFunctions->WriteExport = WriteExport64;
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
// Header by Index functions
|
|
|
|
//
|
|
|
|
STATIC
|
|
|
|
Elf_Shdr*
|
|
|
|
GetShdrByIndex (
|
|
|
|
UINT32 Num
|
|
|
|
)
|
|
|
|
{
|
2016-01-29 04:23:21 +01:00
|
|
|
if (Num >= mEhdr->e_shnum) {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "GetShdrByIndex: Index %u is too high.", Num);
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
return (Elf_Shdr*)((UINT8*)mShdrBase + Num * mEhdr->e_shentsize);
|
|
|
|
}
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
UINT32
|
|
|
|
CoffAlign (
|
|
|
|
UINT32 Offset
|
|
|
|
)
|
|
|
|
{
|
|
|
|
return (Offset + mCoffAlignment - 1) & ~(mCoffAlignment - 1);
|
|
|
|
}
|
|
|
|
|
2015-09-11 09:07:06 +02:00
|
|
|
STATIC
|
|
|
|
UINT32
|
|
|
|
DebugRvaAlign (
|
|
|
|
UINT32 Offset
|
|
|
|
)
|
|
|
|
{
|
|
|
|
return (Offset + 3) & ~3;
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// filter functions
|
|
|
|
//
|
|
|
|
STATIC
|
|
|
|
BOOLEAN
|
|
|
|
IsTextShdr (
|
|
|
|
Elf_Shdr *Shdr
|
|
|
|
)
|
|
|
|
{
|
2021-06-16 09:58:09 +02:00
|
|
|
return (BOOLEAN) (((Shdr->sh_flags & (SHF_EXECINSTR | SHF_ALLOC)) == (SHF_EXECINSTR | SHF_ALLOC)) ||
|
|
|
|
((Shdr->sh_flags & (SHF_WRITE | SHF_ALLOC)) == SHF_ALLOC));
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
BOOLEAN
|
|
|
|
IsHiiRsrcShdr (
|
|
|
|
Elf_Shdr *Shdr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
Elf_Shdr *Namedr = GetShdrByIndex(mEhdr->e_shstrndx);
|
|
|
|
|
|
|
|
return (BOOLEAN) (strcmp((CHAR8*)mEhdr + Namedr->sh_offset + Shdr->sh_name, ELF_HII_SECTION_NAME) == 0);
|
|
|
|
}
|
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
STATIC
|
|
|
|
BOOLEAN
|
|
|
|
IsSymbolShdr (
|
|
|
|
Elf_Shdr *Shdr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
Elf_Shdr *Namehdr = GetShdrByIndex(mEhdr->e_shstrndx);
|
|
|
|
|
|
|
|
return (BOOLEAN) (strcmp((CHAR8*)mEhdr + Namehdr->sh_offset + Shdr->sh_name, ELF_SYMBOL_SECTION_NAME) == 0);
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
STATIC
|
|
|
|
BOOLEAN
|
|
|
|
IsDataShdr (
|
|
|
|
Elf_Shdr *Shdr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if (IsHiiRsrcShdr(Shdr)) {
|
|
|
|
return FALSE;
|
|
|
|
}
|
2021-06-02 10:11:41 +02:00
|
|
|
return (BOOLEAN) (Shdr->sh_flags & (SHF_EXECINSTR | SHF_WRITE | SHF_ALLOC)) == (SHF_ALLOC | SHF_WRITE);
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
|
2016-01-29 05:17:13 +01:00
|
|
|
STATIC
|
|
|
|
BOOLEAN
|
|
|
|
IsStrtabShdr (
|
|
|
|
Elf_Shdr *Shdr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
Elf_Shdr *Namedr = GetShdrByIndex(mEhdr->e_shstrndx);
|
|
|
|
|
|
|
|
return (BOOLEAN) (strcmp((CHAR8*)mEhdr + Namedr->sh_offset + Shdr->sh_name, ELF_STRTAB_SECTION_NAME) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
Elf_Shdr *
|
|
|
|
FindStrtabShdr (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 i;
|
|
|
|
for (i = 0; i < mEhdr->e_shnum; i++) {
|
|
|
|
Elf_Shdr *shdr = GetShdrByIndex(i);
|
|
|
|
if (IsStrtabShdr(shdr)) {
|
|
|
|
return shdr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
const UINT8 *
|
|
|
|
GetSymName (
|
|
|
|
Elf_Sym *Sym
|
|
|
|
)
|
|
|
|
{
|
2017-03-06 02:56:02 +01:00
|
|
|
Elf_Shdr *StrtabShdr;
|
|
|
|
UINT8 *StrtabContents;
|
|
|
|
BOOLEAN foundEnd;
|
|
|
|
UINT32 i;
|
|
|
|
|
2016-01-29 05:17:13 +01:00
|
|
|
if (Sym->st_name == 0) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2017-03-06 02:56:02 +01:00
|
|
|
StrtabShdr = FindStrtabShdr();
|
2016-01-29 05:17:13 +01:00
|
|
|
if (StrtabShdr == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
assert(Sym->st_name < StrtabShdr->sh_size);
|
|
|
|
|
2017-03-06 02:56:02 +01:00
|
|
|
StrtabContents = (UINT8*)mEhdr + StrtabShdr->sh_offset;
|
2016-01-29 18:53:47 +01:00
|
|
|
|
2017-03-06 02:56:02 +01:00
|
|
|
foundEnd = FALSE;
|
2016-02-17 09:57:44 +01:00
|
|
|
for (i= Sym->st_name; (i < StrtabShdr->sh_size) && !foundEnd; i++) {
|
2017-03-06 02:56:02 +01:00
|
|
|
foundEnd = (BOOLEAN)(StrtabContents[i] == 0);
|
2016-01-29 18:53:47 +01:00
|
|
|
}
|
|
|
|
assert(foundEnd);
|
|
|
|
|
|
|
|
return StrtabContents + Sym->st_name;
|
2016-01-29 05:17:13 +01:00
|
|
|
}
|
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
//
|
|
|
|
// Get Prm Handler number and name
|
|
|
|
//
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
FindPrmHandler (
|
|
|
|
UINT64 Offset
|
|
|
|
)
|
|
|
|
{
|
|
|
|
PRM_MODULE_EXPORT_DESCRIPTOR_STRUCT_HEADER *PrmExport;
|
|
|
|
PRM_HANDLER_EXPORT_DESCRIPTOR_STRUCT *PrmHandler;
|
|
|
|
UINT32 HandlerNum;
|
|
|
|
|
|
|
|
PrmExport = (PRM_MODULE_EXPORT_DESCRIPTOR_STRUCT_HEADER*)((UINT8*)mEhdr + Offset);
|
|
|
|
PrmHandler = (PRM_HANDLER_EXPORT_DESCRIPTOR_STRUCT *)(PrmExport + 1);
|
|
|
|
|
|
|
|
for (HandlerNum = 0; HandlerNum < PrmExport->NumberPrmHandlers; HandlerNum++) {
|
|
|
|
strcpy(mExportSymName[mExportSymNum], PrmHandler->PrmHandlerName);
|
|
|
|
mExportSymNum ++;
|
|
|
|
PrmHandler += 1;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check if PRM handler number is larger than (PRM_MODULE_EXPORT_SYMBOL_NUM - 1)
|
|
|
|
//
|
|
|
|
if (mExportSymNum >= (PRM_MODULE_EXPORT_SYMBOL_NUM - 1)) {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "FindPrmHandler: Number %u is too high.", mExportSymNum);
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-09 14:58:15 +02:00
|
|
|
//
|
|
|
|
// Find the ELF section hosting the GOT from an ELF Rva
|
|
|
|
// of a single GOT entry. Normally, GOT is placed in
|
|
|
|
// ELF .text section, so assume once we find in which
|
|
|
|
// section the GOT is, all GOT entries are there, and
|
|
|
|
// just verify this.
|
|
|
|
//
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
FindElfGOTSectionFromGOTEntryElfRva (
|
|
|
|
Elf64_Addr GOTEntryElfRva
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 i;
|
|
|
|
if (mGOTShdr != NULL) {
|
|
|
|
if (GOTEntryElfRva >= mGOTShdr->sh_addr &&
|
|
|
|
GOTEntryElfRva < mGOTShdr->sh_addr + mGOTShdr->sh_size) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
Error (NULL, 0, 3000, "Unsupported", "FindElfGOTSectionFromGOTEntryElfRva: GOT entries found in multiple sections.");
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
for (i = 0; i < mEhdr->e_shnum; i++) {
|
|
|
|
Elf_Shdr *shdr = GetShdrByIndex(i);
|
|
|
|
if (GOTEntryElfRva >= shdr->sh_addr &&
|
|
|
|
GOTEntryElfRva < shdr->sh_addr + shdr->sh_size) {
|
|
|
|
mGOTShdr = shdr;
|
|
|
|
mGOTShindex = i;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "FindElfGOTSectionFromGOTEntryElfRva: ElfRva 0x%016LX for GOT entry not found in any section.", GOTEntryElfRva);
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Stores locations of GOT entries in COFF image.
|
|
|
|
// Returns TRUE if GOT entry is new.
|
|
|
|
// Simple implementation as number of GOT
|
|
|
|
// entries is expected to be low.
|
|
|
|
//
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
BOOLEAN
|
|
|
|
AccumulateCoffGOTEntries (
|
|
|
|
UINT32 GOTCoffEntry
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 i;
|
|
|
|
if (mGOTCoffEntries != NULL) {
|
|
|
|
for (i = 0; i < mGOTNumCoffEntries; i++) {
|
|
|
|
if (mGOTCoffEntries[i] == GOTCoffEntry) {
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (mGOTCoffEntries == NULL) {
|
|
|
|
mGOTCoffEntries = (UINT32*)malloc(5 * sizeof *mGOTCoffEntries);
|
|
|
|
if (mGOTCoffEntries == NULL) {
|
|
|
|
Error (NULL, 0, 4001, "Resource", "memory cannot be allocated!");
|
|
|
|
}
|
|
|
|
assert (mGOTCoffEntries != NULL);
|
|
|
|
mGOTMaxCoffEntries = 5;
|
|
|
|
mGOTNumCoffEntries = 0;
|
|
|
|
} else if (mGOTNumCoffEntries == mGOTMaxCoffEntries) {
|
|
|
|
mGOTCoffEntries = (UINT32*)realloc(mGOTCoffEntries, 2 * mGOTMaxCoffEntries * sizeof *mGOTCoffEntries);
|
|
|
|
if (mGOTCoffEntries == NULL) {
|
|
|
|
Error (NULL, 0, 4001, "Resource", "memory cannot be allocated!");
|
|
|
|
}
|
|
|
|
assert (mGOTCoffEntries != NULL);
|
|
|
|
mGOTMaxCoffEntries += mGOTMaxCoffEntries;
|
|
|
|
}
|
|
|
|
mGOTCoffEntries[mGOTNumCoffEntries++] = GOTCoffEntry;
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// 32-bit Unsigned integer comparator for qsort.
|
|
|
|
//
|
|
|
|
STATIC
|
|
|
|
int
|
|
|
|
UINT32Comparator (
|
|
|
|
const void* lhs,
|
|
|
|
const void* rhs
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if (*(const UINT32*)lhs < *(const UINT32*)rhs) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return *(const UINT32*)lhs > *(const UINT32*)rhs;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Emit accumulated Coff GOT entry relocations into
|
|
|
|
// Coff image. This function performs its job
|
|
|
|
// once and then releases the entry list, so
|
|
|
|
// it can safely be called multiple times.
|
|
|
|
//
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
EmitGOTRelocations (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 i;
|
|
|
|
if (mGOTCoffEntries == NULL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Emit Coff relocations with Rvas ordered.
|
|
|
|
//
|
|
|
|
qsort(
|
|
|
|
mGOTCoffEntries,
|
|
|
|
mGOTNumCoffEntries,
|
|
|
|
sizeof *mGOTCoffEntries,
|
|
|
|
UINT32Comparator);
|
|
|
|
for (i = 0; i < mGOTNumCoffEntries; i++) {
|
|
|
|
VerboseMsg ("EFI_IMAGE_REL_BASED_DIR64 Offset: 0x%08X", mGOTCoffEntries[i]);
|
|
|
|
CoffAddFixup(
|
|
|
|
mGOTCoffEntries[i],
|
|
|
|
EFI_IMAGE_REL_BASED_DIR64);
|
|
|
|
}
|
|
|
|
free(mGOTCoffEntries);
|
|
|
|
mGOTCoffEntries = NULL;
|
|
|
|
mGOTMaxCoffEntries = 0;
|
|
|
|
mGOTNumCoffEntries = 0;
|
|
|
|
}
|
2020-04-23 15:52:32 +02:00
|
|
|
//
|
|
|
|
// RISC-V 64 specific Elf WriteSection function.
|
|
|
|
//
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
WriteSectionRiscV64 (
|
|
|
|
Elf_Rela *Rel,
|
|
|
|
UINT8 *Targ,
|
|
|
|
Elf_Shdr *SymShdr,
|
|
|
|
Elf_Sym *Sym
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 Value;
|
|
|
|
UINT32 Value2;
|
2021-06-24 15:25:31 +02:00
|
|
|
Elf64_Addr GOTEntryRva;
|
2020-04-23 15:52:32 +02:00
|
|
|
|
|
|
|
switch (ELF_R_TYPE(Rel->r_info)) {
|
|
|
|
case R_RISCV_NONE:
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_32:
|
2021-06-24 15:25:31 +02:00
|
|
|
*(UINT64 *)Targ = Sym->st_value + Rel->r_addend;
|
2020-04-23 15:52:32 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_64:
|
2021-06-24 15:25:31 +02:00
|
|
|
*(UINT64 *)Targ = Sym->st_value + Rel->r_addend;
|
2020-04-23 15:52:32 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_HI20:
|
|
|
|
mRiscVPass1Targ = Targ;
|
|
|
|
mRiscVPass1Sym = SymShdr;
|
|
|
|
mRiscVPass1SymSecIndex = Sym->st_shndx;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_LO12_I:
|
|
|
|
if (mRiscVPass1Sym == SymShdr && mRiscVPass1Targ != NULL && mRiscVPass1SymSecIndex == Sym->st_shndx && mRiscVPass1SymSecIndex != 0) {
|
|
|
|
Value = (UINT32)(RV_X(*(UINT32 *)mRiscVPass1Targ, 12, 20) << 12);
|
|
|
|
Value2 = (UINT32)(RV_X(*(UINT32 *)Targ, 20, 12));
|
|
|
|
if (Value2 & (RISCV_IMM_REACH/2)) {
|
|
|
|
Value2 |= ~(RISCV_IMM_REACH-1);
|
|
|
|
}
|
|
|
|
Value += Value2;
|
|
|
|
Value = Value - (UINT32)SymShdr->sh_addr + mCoffSectionsOffset[Sym->st_shndx];
|
|
|
|
Value2 = RISCV_CONST_HIGH_PART (Value);
|
|
|
|
*(UINT32 *)mRiscVPass1Targ = (RV_X (Value2, 12, 20) << 12) | \
|
|
|
|
(RV_X (*(UINT32 *)mRiscVPass1Targ, 0, 12));
|
|
|
|
*(UINT32 *)Targ = (RV_X (Value, 0, 12) << 20) | \
|
|
|
|
(RV_X (*(UINT32 *)Targ, 0, 20));
|
|
|
|
}
|
|
|
|
mRiscVPass1Sym = NULL;
|
|
|
|
mRiscVPass1Targ = NULL;
|
|
|
|
mRiscVPass1SymSecIndex = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_LO12_S:
|
|
|
|
if (mRiscVPass1Sym == SymShdr && mRiscVPass1Targ != NULL && mRiscVPass1SymSecIndex == Sym->st_shndx && mRiscVPass1SymSecIndex != 0) {
|
|
|
|
Value = (UINT32)(RV_X(*(UINT32 *)mRiscVPass1Targ, 12, 20) << 12);
|
|
|
|
Value2 = (UINT32)(RV_X(*(UINT32 *)Targ, 7, 5) | (RV_X(*(UINT32 *)Targ, 25, 7) << 5));
|
|
|
|
if (Value2 & (RISCV_IMM_REACH/2)) {
|
|
|
|
Value2 |= ~(RISCV_IMM_REACH-1);
|
|
|
|
}
|
|
|
|
Value += Value2;
|
|
|
|
Value = Value - (UINT32)SymShdr->sh_addr + mCoffSectionsOffset[Sym->st_shndx];
|
|
|
|
Value2 = RISCV_CONST_HIGH_PART (Value);
|
|
|
|
*(UINT32 *)mRiscVPass1Targ = (RV_X (Value2, 12, 20) << 12) | \
|
|
|
|
(RV_X (*(UINT32 *)mRiscVPass1Targ, 0, 12));
|
|
|
|
Value2 = *(UINT32 *)Targ & 0x01fff07f;
|
|
|
|
Value &= RISCV_IMM_REACH - 1;
|
|
|
|
*(UINT32 *)Targ = Value2 | (UINT32)(((RV_X(Value, 0, 5) << 7) | (RV_X(Value, 5, 7) << 25)));
|
|
|
|
}
|
|
|
|
mRiscVPass1Sym = NULL;
|
|
|
|
mRiscVPass1Targ = NULL;
|
|
|
|
mRiscVPass1SymSecIndex = 0;
|
|
|
|
break;
|
|
|
|
|
2021-06-24 15:25:31 +02:00
|
|
|
case R_RISCV_GOT_HI20:
|
|
|
|
GOTEntryRva = (Sym->st_value - Rel->r_offset);
|
|
|
|
mRiscVPass1Offset = RV_X(GOTEntryRva, 0, 12);
|
|
|
|
Value = (UINT32)RV_X(GOTEntryRva, 12, 20);
|
|
|
|
*(UINT32 *)Targ = (Value << 12) | (RV_X(*(UINT32*)Targ, 0, 12));
|
|
|
|
|
|
|
|
mRiscVPass1Targ = Targ;
|
|
|
|
mRiscVPass1Sym = SymShdr;
|
|
|
|
mRiscVPass1SymSecIndex = Sym->st_shndx;
|
|
|
|
mRiscVPass1GotFixup = 1;
|
|
|
|
break;
|
|
|
|
|
2020-04-23 15:52:32 +02:00
|
|
|
case R_RISCV_PCREL_HI20:
|
|
|
|
mRiscVPass1Targ = Targ;
|
|
|
|
mRiscVPass1Sym = SymShdr;
|
|
|
|
mRiscVPass1SymSecIndex = Sym->st_shndx;
|
|
|
|
|
|
|
|
Value = (UINT32)(RV_X(*(UINT32 *)mRiscVPass1Targ, 12, 20));
|
|
|
|
break;
|
|
|
|
|
2021-07-10 08:31:14 +02:00
|
|
|
case R_RISCV_PCREL_LO12_S:
|
|
|
|
if (mRiscVPass1Targ != NULL && mRiscVPass1Sym != NULL && mRiscVPass1SymSecIndex != 0) {
|
|
|
|
int i;
|
|
|
|
Value2 = (UINT32)(RV_X(*(UINT32 *)mRiscVPass1Targ, 12, 20));
|
|
|
|
|
|
|
|
Value = ((UINT32)(RV_X(*(UINT32 *)Targ, 25, 7)) << 5);
|
|
|
|
Value = (Value | (UINT32)(RV_X(*(UINT32 *)Targ, 7, 5)));
|
|
|
|
|
|
|
|
if(Value & (RISCV_IMM_REACH/2)) {
|
|
|
|
Value |= ~(RISCV_IMM_REACH-1);
|
|
|
|
}
|
|
|
|
Value = Value - (UINT32)mRiscVPass1Sym->sh_addr + mCoffSectionsOffset[mRiscVPass1SymSecIndex];
|
|
|
|
|
|
|
|
if(-2048 > (INT32)Value) {
|
|
|
|
i = (((INT32)Value * -1) / 4096);
|
|
|
|
Value2 -= i;
|
|
|
|
Value += 4096 * i;
|
|
|
|
if(-2048 > (INT32)Value) {
|
|
|
|
Value2 -= 1;
|
|
|
|
Value += 4096;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if( 2047 < (INT32)Value) {
|
|
|
|
i = (Value / 4096);
|
|
|
|
Value2 += i;
|
|
|
|
Value -= 4096 * i;
|
|
|
|
if(2047 < (INT32)Value) {
|
|
|
|
Value2 += 1;
|
|
|
|
Value -= 4096;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the IMM of SD instruction
|
|
|
|
//
|
|
|
|
// |31 25|24 20|19 15|14 12 |11 7|6 0|
|
|
|
|
// |-------------------------------------------|-------|
|
|
|
|
// |imm[11:5] | rs2 | rs1 | funct3 |imm[4:0] | opcode|
|
|
|
|
// ---------------------------------------------------
|
|
|
|
|
|
|
|
// First Zero out current IMM
|
|
|
|
*(UINT32 *)Targ &= ~0xfe000f80;
|
|
|
|
|
|
|
|
// Update with new IMM
|
|
|
|
*(UINT32 *)Targ |= (RV_X(Value, 5, 7) << 25);
|
|
|
|
*(UINT32 *)Targ |= (RV_X(Value, 0, 5) << 7);
|
|
|
|
|
|
|
|
// Update previous instruction
|
|
|
|
*(UINT32 *)mRiscVPass1Targ = (RV_X(Value2, 0, 20)<<12) | (RV_X(*(UINT32 *)mRiscVPass1Targ, 0, 12));
|
|
|
|
}
|
|
|
|
mRiscVPass1Sym = NULL;
|
|
|
|
mRiscVPass1Targ = NULL;
|
|
|
|
mRiscVPass1SymSecIndex = 0;
|
|
|
|
break;
|
|
|
|
|
2020-04-23 15:52:32 +02:00
|
|
|
case R_RISCV_PCREL_LO12_I:
|
|
|
|
if (mRiscVPass1Targ != NULL && mRiscVPass1Sym != NULL && mRiscVPass1SymSecIndex != 0) {
|
|
|
|
int i;
|
|
|
|
Value2 = (UINT32)(RV_X(*(UINT32 *)mRiscVPass1Targ, 12, 20));
|
2021-06-24 15:25:31 +02:00
|
|
|
|
|
|
|
if(mRiscVPass1GotFixup) {
|
|
|
|
Value = (UINT32)(mRiscVPass1Offset);
|
|
|
|
} else {
|
|
|
|
Value = (UINT32)(RV_X(*(UINT32 *)Targ, 20, 12));
|
|
|
|
if(Value & (RISCV_IMM_REACH/2)) {
|
|
|
|
Value |= ~(RISCV_IMM_REACH-1);
|
|
|
|
}
|
2020-04-23 15:52:32 +02:00
|
|
|
}
|
|
|
|
Value = Value - (UINT32)mRiscVPass1Sym->sh_addr + mCoffSectionsOffset[mRiscVPass1SymSecIndex];
|
2021-06-24 15:25:31 +02:00
|
|
|
|
2020-04-23 15:52:32 +02:00
|
|
|
if(-2048 > (INT32)Value) {
|
|
|
|
i = (((INT32)Value * -1) / 4096);
|
|
|
|
Value2 -= i;
|
|
|
|
Value += 4096 * i;
|
|
|
|
if(-2048 > (INT32)Value) {
|
|
|
|
Value2 -= 1;
|
|
|
|
Value += 4096;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if( 2047 < (INT32)Value) {
|
|
|
|
i = (Value / 4096);
|
|
|
|
Value2 += i;
|
|
|
|
Value -= 4096 * i;
|
|
|
|
if(2047 < (INT32)Value) {
|
|
|
|
Value2 += 1;
|
|
|
|
Value -= 4096;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-24 15:25:31 +02:00
|
|
|
if(mRiscVPass1GotFixup) {
|
|
|
|
*(UINT32 *)Targ = (RV_X((UINT32)Value, 0, 12) << 20)
|
|
|
|
| (RV_X(*(UINT32*)Targ, 0, 20));
|
|
|
|
// Convert LD instruction to ADDI
|
|
|
|
//
|
|
|
|
// |31 20|19 15|14 12|11 7|6 0|
|
|
|
|
// |-----------------------------------------|
|
|
|
|
// |imm[11:0] | rs1 | 011 | rd | 0000011 | LD
|
|
|
|
// -----------------------------------------
|
|
|
|
|
|
|
|
// |-----------------------------------------|
|
|
|
|
// |imm[11:0] | rs1 | 000 | rd | 0010011 | ADDI
|
|
|
|
// -----------------------------------------
|
|
|
|
|
|
|
|
// To convert, let's first reset bits 12-14 and 0-6 using ~0x707f
|
|
|
|
// Then modify the opcode to ADDI (0010011)
|
|
|
|
// All other fields will remain same.
|
|
|
|
|
|
|
|
*(UINT32 *)Targ = ((*(UINT32 *)Targ & ~0x707f) | 0x13);
|
|
|
|
} else {
|
|
|
|
*(UINT32 *)Targ = (RV_X(Value, 0, 12) << 20) | (RV_X(*(UINT32*)Targ, 0, 20));
|
|
|
|
}
|
2020-04-23 15:52:32 +02:00
|
|
|
*(UINT32 *)mRiscVPass1Targ = (RV_X(Value2, 0, 20)<<12) | (RV_X(*(UINT32 *)mRiscVPass1Targ, 0, 12));
|
|
|
|
}
|
|
|
|
mRiscVPass1Sym = NULL;
|
|
|
|
mRiscVPass1Targ = NULL;
|
|
|
|
mRiscVPass1SymSecIndex = 0;
|
2021-06-24 15:25:31 +02:00
|
|
|
mRiscVPass1Offset = 0;
|
|
|
|
mRiscVPass1GotFixup = 0;
|
2020-04-23 15:52:32 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_ADD64:
|
|
|
|
case R_RISCV_SUB64:
|
|
|
|
case R_RISCV_ADD32:
|
|
|
|
case R_RISCV_SUB32:
|
|
|
|
case R_RISCV_BRANCH:
|
|
|
|
case R_RISCV_JAL:
|
|
|
|
case R_RISCV_GPREL_I:
|
|
|
|
case R_RISCV_GPREL_S:
|
|
|
|
case R_RISCV_CALL:
|
2021-06-24 15:25:31 +02:00
|
|
|
case R_RISCV_CALL_PLT:
|
2020-04-23 15:52:32 +02:00
|
|
|
case R_RISCV_RVC_BRANCH:
|
|
|
|
case R_RISCV_RVC_JUMP:
|
|
|
|
case R_RISCV_RELAX:
|
|
|
|
case R_RISCV_SUB6:
|
|
|
|
case R_RISCV_SET6:
|
|
|
|
case R_RISCV_SET8:
|
|
|
|
case R_RISCV_SET16:
|
|
|
|
case R_RISCV_SET32:
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteSections64(): %s unsupported ELF EM_RISCV64 relocation 0x%x.", mInImageName, (unsigned) ELF_R_TYPE(Rel->r_info));
|
|
|
|
}
|
|
|
|
}
|
2018-07-09 14:58:15 +02:00
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// Elf functions interface implementation
|
|
|
|
//
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
ScanSections64 (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 i;
|
|
|
|
EFI_IMAGE_DOS_HEADER *DosHdr;
|
|
|
|
EFI_IMAGE_OPTIONAL_HEADER_UNION *NtHdr;
|
|
|
|
UINT32 CoffEntry;
|
|
|
|
UINT32 SectionCount;
|
2015-02-11 09:20:17 +01:00
|
|
|
BOOLEAN FoundSection;
|
2022-03-14 06:27:21 +01:00
|
|
|
UINT32 Offset;
|
2014-01-27 06:23:15 +01:00
|
|
|
|
|
|
|
CoffEntry = 0;
|
|
|
|
mCoffOffset = 0;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Coff file start with a DOS header.
|
|
|
|
//
|
|
|
|
mCoffOffset = sizeof(EFI_IMAGE_DOS_HEADER) + 0x40;
|
|
|
|
mNtHdrOffset = mCoffOffset;
|
|
|
|
switch (mEhdr->e_machine) {
|
|
|
|
case EM_X86_64:
|
|
|
|
case EM_AARCH64:
|
2020-04-23 15:52:32 +02:00
|
|
|
case EM_RISCV64:
|
2022-09-06 15:00:07 +02:00
|
|
|
case EM_LOONGARCH:
|
2014-01-27 06:23:15 +01:00
|
|
|
mCoffOffset += sizeof (EFI_IMAGE_NT_HEADERS64);
|
|
|
|
break;
|
|
|
|
default:
|
2016-01-29 18:53:47 +01:00
|
|
|
VerboseMsg ("%s unknown e_machine type %hu. Assume X64", mInImageName, mEhdr->e_machine);
|
2014-01-27 06:23:15 +01:00
|
|
|
mCoffOffset += sizeof (EFI_IMAGE_NT_HEADERS64);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
mTableOffset = mCoffOffset;
|
|
|
|
mCoffOffset += mCoffNbrSections * sizeof(EFI_IMAGE_SECTION_HEADER);
|
|
|
|
|
2015-06-29 05:17:34 +02:00
|
|
|
//
|
|
|
|
// Set mCoffAlignment to the maximum alignment of the input sections
|
|
|
|
// we care about
|
|
|
|
//
|
|
|
|
for (i = 0; i < mEhdr->e_shnum; i++) {
|
|
|
|
Elf_Shdr *shdr = GetShdrByIndex(i);
|
|
|
|
if (shdr->sh_addralign <= mCoffAlignment) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (IsTextShdr(shdr) || IsDataShdr(shdr) || IsHiiRsrcShdr(shdr)) {
|
|
|
|
mCoffAlignment = (UINT32)shdr->sh_addralign;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-04 10:12:28 +02:00
|
|
|
//
|
|
|
|
// Check if mCoffAlignment is larger than MAX_COFF_ALIGNMENT
|
|
|
|
//
|
|
|
|
if (mCoffAlignment > MAX_COFF_ALIGNMENT) {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "Section alignment is larger than MAX_COFF_ALIGNMENT.");
|
|
|
|
assert (FALSE);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-27 15:50:09 +02:00
|
|
|
//
|
|
|
|
// Move the PE/COFF header right before the first section. This will help us
|
|
|
|
// save space when converting to TE.
|
|
|
|
//
|
|
|
|
if (mCoffAlignment > mCoffOffset) {
|
|
|
|
mNtHdrOffset += mCoffAlignment - mCoffOffset;
|
|
|
|
mTableOffset += mCoffAlignment - mCoffOffset;
|
|
|
|
mCoffOffset = mCoffAlignment;
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// First text sections.
|
|
|
|
//
|
|
|
|
mCoffOffset = CoffAlign(mCoffOffset);
|
2015-02-11 09:20:17 +01:00
|
|
|
mTextOffset = mCoffOffset;
|
|
|
|
FoundSection = FALSE;
|
2014-01-27 06:23:15 +01:00
|
|
|
SectionCount = 0;
|
|
|
|
for (i = 0; i < mEhdr->e_shnum; i++) {
|
|
|
|
Elf_Shdr *shdr = GetShdrByIndex(i);
|
|
|
|
if (IsTextShdr(shdr)) {
|
|
|
|
if ((shdr->sh_addralign != 0) && (shdr->sh_addralign != 1)) {
|
|
|
|
// the alignment field is valid
|
|
|
|
if ((shdr->sh_addr & (shdr->sh_addralign - 1)) == 0) {
|
|
|
|
// if the section address is aligned we must align PE/COFF
|
|
|
|
mCoffOffset = (UINT32) ((mCoffOffset + shdr->sh_addralign - 1) & ~(shdr->sh_addralign - 1));
|
2015-09-24 21:35:10 +02:00
|
|
|
} else {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "Section address not aligned to its own alignment.");
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Relocate entry. */
|
|
|
|
if ((mEhdr->e_entry >= shdr->sh_addr) &&
|
|
|
|
(mEhdr->e_entry < shdr->sh_addr + shdr->sh_size)) {
|
|
|
|
CoffEntry = (UINT32) (mCoffOffset + mEhdr->e_entry - shdr->sh_addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Set mTextOffset with the offset of the first '.text' section
|
|
|
|
//
|
2015-02-11 09:20:17 +01:00
|
|
|
if (!FoundSection) {
|
2014-01-27 06:23:15 +01:00
|
|
|
mTextOffset = mCoffOffset;
|
2015-02-11 09:20:17 +01:00
|
|
|
FoundSection = TRUE;
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
mCoffSectionsOffset[i] = mCoffOffset;
|
|
|
|
mCoffOffset += (UINT32) shdr->sh_size;
|
|
|
|
SectionCount ++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-05 03:17:46 +02:00
|
|
|
if (!FoundSection && mOutImageType != FW_ACPI_IMAGE) {
|
2014-01-27 06:23:15 +01:00
|
|
|
Error (NULL, 0, 3000, "Invalid", "Did not find any '.text' section.");
|
|
|
|
assert (FALSE);
|
|
|
|
}
|
|
|
|
|
2015-09-11 09:07:06 +02:00
|
|
|
mDebugOffset = DebugRvaAlign(mCoffOffset);
|
2015-09-24 21:35:10 +02:00
|
|
|
mCoffOffset = CoffAlign(mCoffOffset);
|
2014-01-27 06:23:15 +01:00
|
|
|
|
|
|
|
if (SectionCount > 1 && mOutImageType == FW_EFI_IMAGE) {
|
2019-02-06 08:44:39 +01:00
|
|
|
Warning (NULL, 0, 0, NULL, "Multiple sections in %s are merged into 1 text section. Source level debug might not work correctly.", mInImageName);
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Then data sections.
|
|
|
|
//
|
|
|
|
mDataOffset = mCoffOffset;
|
2015-02-11 09:20:17 +01:00
|
|
|
FoundSection = FALSE;
|
2014-01-27 06:23:15 +01:00
|
|
|
SectionCount = 0;
|
|
|
|
for (i = 0; i < mEhdr->e_shnum; i++) {
|
|
|
|
Elf_Shdr *shdr = GetShdrByIndex(i);
|
|
|
|
if (IsDataShdr(shdr)) {
|
|
|
|
if ((shdr->sh_addralign != 0) && (shdr->sh_addralign != 1)) {
|
|
|
|
// the alignment field is valid
|
|
|
|
if ((shdr->sh_addr & (shdr->sh_addralign - 1)) == 0) {
|
|
|
|
// if the section address is aligned we must align PE/COFF
|
|
|
|
mCoffOffset = (UINT32) ((mCoffOffset + shdr->sh_addralign - 1) & ~(shdr->sh_addralign - 1));
|
2015-09-24 21:35:10 +02:00
|
|
|
} else {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "Section address not aligned to its own alignment.");
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
}
|
2015-02-11 09:20:17 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// Set mDataOffset with the offset of the first '.data' section
|
|
|
|
//
|
|
|
|
if (!FoundSection) {
|
|
|
|
mDataOffset = mCoffOffset;
|
|
|
|
FoundSection = TRUE;
|
|
|
|
}
|
2014-01-27 06:23:15 +01:00
|
|
|
mCoffSectionsOffset[i] = mCoffOffset;
|
|
|
|
mCoffOffset += (UINT32) shdr->sh_size;
|
|
|
|
SectionCount ++;
|
|
|
|
}
|
|
|
|
}
|
2015-07-27 15:49:54 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// Make room for .debug data in .data (or .text if .data is empty) instead of
|
|
|
|
// putting it in a section of its own. This is explicitly allowed by the
|
|
|
|
// PE/COFF spec, and prevents bloat in the binary when using large values for
|
|
|
|
// section alignment.
|
|
|
|
//
|
|
|
|
if (SectionCount > 0) {
|
2015-09-11 09:07:06 +02:00
|
|
|
mDebugOffset = DebugRvaAlign(mCoffOffset);
|
2015-07-27 15:49:54 +02:00
|
|
|
}
|
|
|
|
mCoffOffset = mDebugOffset + sizeof(EFI_IMAGE_DEBUG_DIRECTORY_ENTRY) +
|
|
|
|
sizeof(EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY) +
|
|
|
|
strlen(mInImageName) + 1;
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
mCoffOffset = CoffAlign(mCoffOffset);
|
2015-07-27 15:49:54 +02:00
|
|
|
if (SectionCount == 0) {
|
|
|
|
mDataOffset = mCoffOffset;
|
|
|
|
}
|
2014-01-27 06:23:15 +01:00
|
|
|
|
|
|
|
if (SectionCount > 1 && mOutImageType == FW_EFI_IMAGE) {
|
2019-02-06 08:44:39 +01:00
|
|
|
Warning (NULL, 0, 0, NULL, "Multiple sections in %s are merged into 1 data section. Source level debug might not work correctly.", mInImageName);
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
//
|
|
|
|
// The Symbol sections.
|
|
|
|
//
|
|
|
|
if (mExportFlag) {
|
|
|
|
UINT32 SymIndex;
|
|
|
|
Elf_Sym *Sym;
|
|
|
|
UINT64 SymNum;
|
|
|
|
const UINT8 *SymName;
|
|
|
|
|
|
|
|
mExportOffset = mCoffOffset;
|
|
|
|
mExportSize = sizeof(EFI_IMAGE_EXPORT_DIRECTORY) + strlen(mInImageName) + 1;
|
|
|
|
|
|
|
|
for (i = 0; i < mEhdr->e_shnum; i++) {
|
|
|
|
|
|
|
|
//
|
|
|
|
// Determine if this is a symbol section.
|
|
|
|
//
|
|
|
|
Elf_Shdr *shdr = GetShdrByIndex(i);
|
|
|
|
if (!IsSymbolShdr(shdr)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
UINT8 *Symtab = (UINT8*)mEhdr + shdr->sh_offset;
|
|
|
|
SymNum = (shdr->sh_size) / (shdr->sh_entsize);
|
|
|
|
|
|
|
|
//
|
|
|
|
// First Get PrmModuleExportDescriptor
|
|
|
|
//
|
|
|
|
for (SymIndex = 0; SymIndex < SymNum; SymIndex++) {
|
|
|
|
Sym = (Elf_Sym *)(Symtab + SymIndex * shdr->sh_entsize);
|
|
|
|
SymName = GetSymName(Sym);
|
|
|
|
if (SymName == NULL) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (strcmp((CHAR8*)SymName, PRM_MODULE_EXPORT_DESCRIPTOR_NAME) == 0) {
|
|
|
|
//
|
|
|
|
// Find PrmHandler Number and Name
|
|
|
|
//
|
|
|
|
FindPrmHandler(Sym->st_value);
|
|
|
|
|
|
|
|
strcpy(mExportSymName[mExportSymNum], (CHAR8*)SymName);
|
|
|
|
mExportRVA[mExportSymNum] = (UINT32)(Sym->st_value);
|
|
|
|
mExportSize += 2 * EFI_IMAGE_EXPORT_ADDR_SIZE + EFI_IMAGE_EXPORT_ORDINAL_SIZE + strlen((CHAR8 *)SymName) + 1;
|
|
|
|
mExportSymNum ++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Second Get PrmHandler
|
|
|
|
//
|
|
|
|
for (SymIndex = 0; SymIndex < SymNum; SymIndex++) {
|
|
|
|
UINT32 ExpIndex;
|
|
|
|
Sym = (Elf_Sym *)(Symtab + SymIndex * shdr->sh_entsize);
|
|
|
|
SymName = GetSymName(Sym);
|
|
|
|
if (SymName == NULL) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (ExpIndex = 0; ExpIndex < (mExportSymNum -1); ExpIndex++) {
|
|
|
|
if (strcmp((CHAR8*)SymName, mExportSymName[ExpIndex]) != 0) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
mExportRVA[ExpIndex] = (UINT32)(Sym->st_value);
|
|
|
|
mExportSize += 2 * EFI_IMAGE_EXPORT_ADDR_SIZE + EFI_IMAGE_EXPORT_ORDINAL_SIZE + strlen((CHAR8 *)SymName) + 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
mCoffOffset += mExportSize;
|
|
|
|
mCoffOffset = CoffAlign(mCoffOffset);
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// The HII resource sections.
|
|
|
|
//
|
|
|
|
mHiiRsrcOffset = mCoffOffset;
|
|
|
|
for (i = 0; i < mEhdr->e_shnum; i++) {
|
|
|
|
Elf_Shdr *shdr = GetShdrByIndex(i);
|
|
|
|
if (IsHiiRsrcShdr(shdr)) {
|
|
|
|
if ((shdr->sh_addralign != 0) && (shdr->sh_addralign != 1)) {
|
|
|
|
// the alignment field is valid
|
|
|
|
if ((shdr->sh_addr & (shdr->sh_addralign - 1)) == 0) {
|
|
|
|
// if the section address is aligned we must align PE/COFF
|
|
|
|
mCoffOffset = (UINT32) ((mCoffOffset + shdr->sh_addralign - 1) & ~(shdr->sh_addralign - 1));
|
2015-09-24 21:35:10 +02:00
|
|
|
} else {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "Section address not aligned to its own alignment.");
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (shdr->sh_size != 0) {
|
2015-02-11 09:20:17 +01:00
|
|
|
mHiiRsrcOffset = mCoffOffset;
|
2014-01-27 06:23:15 +01:00
|
|
|
mCoffSectionsOffset[i] = mCoffOffset;
|
|
|
|
mCoffOffset += (UINT32) shdr->sh_size;
|
|
|
|
mCoffOffset = CoffAlign(mCoffOffset);
|
|
|
|
SetHiiResourceHeader ((UINT8*) mEhdr + shdr->sh_offset, mHiiRsrcOffset);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mRelocOffset = mCoffOffset;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Allocate base Coff file. Will be expanded later for relocations.
|
|
|
|
//
|
|
|
|
mCoffFile = (UINT8 *)malloc(mCoffOffset);
|
2016-10-11 04:20:14 +02:00
|
|
|
if (mCoffFile == NULL) {
|
|
|
|
Error (NULL, 0, 4001, "Resource", "memory cannot be allocated!");
|
|
|
|
}
|
|
|
|
assert (mCoffFile != NULL);
|
2014-01-27 06:23:15 +01:00
|
|
|
memset(mCoffFile, 0, mCoffOffset);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Fill headers.
|
|
|
|
//
|
|
|
|
DosHdr = (EFI_IMAGE_DOS_HEADER *)mCoffFile;
|
|
|
|
DosHdr->e_magic = EFI_IMAGE_DOS_SIGNATURE;
|
|
|
|
DosHdr->e_lfanew = mNtHdrOffset;
|
|
|
|
|
|
|
|
NtHdr = (EFI_IMAGE_OPTIONAL_HEADER_UNION*)(mCoffFile + mNtHdrOffset);
|
|
|
|
|
|
|
|
NtHdr->Pe32Plus.Signature = EFI_IMAGE_NT_SIGNATURE;
|
|
|
|
|
|
|
|
switch (mEhdr->e_machine) {
|
|
|
|
case EM_X86_64:
|
|
|
|
NtHdr->Pe32Plus.FileHeader.Machine = EFI_IMAGE_MACHINE_X64;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.Magic = EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC;
|
|
|
|
break;
|
|
|
|
case EM_AARCH64:
|
|
|
|
NtHdr->Pe32Plus.FileHeader.Machine = EFI_IMAGE_MACHINE_AARCH64;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.Magic = EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC;
|
|
|
|
break;
|
2020-04-23 15:52:32 +02:00
|
|
|
case EM_RISCV64:
|
|
|
|
NtHdr->Pe32Plus.FileHeader.Machine = EFI_IMAGE_MACHINE_RISCV64;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.Magic = EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC;
|
|
|
|
break;
|
2022-09-06 15:00:07 +02:00
|
|
|
case EM_LOONGARCH:
|
|
|
|
NtHdr->Pe32Plus.FileHeader.Machine = EFI_IMAGE_MACHINE_LOONGARCH64;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.Magic = EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC;
|
|
|
|
break;
|
2020-04-23 15:52:32 +02:00
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
default:
|
2022-11-08 18:17:59 +01:00
|
|
|
VerboseMsg ("%u unknown e_machine type. Assume X64", (UINTN)mEhdr->e_machine);
|
2014-01-27 06:23:15 +01:00
|
|
|
NtHdr->Pe32Plus.FileHeader.Machine = EFI_IMAGE_MACHINE_X64;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.Magic = EFI_IMAGE_NT_OPTIONAL_HDR64_MAGIC;
|
|
|
|
}
|
|
|
|
|
|
|
|
NtHdr->Pe32Plus.FileHeader.NumberOfSections = mCoffNbrSections;
|
|
|
|
NtHdr->Pe32Plus.FileHeader.TimeDateStamp = (UINT32) time(NULL);
|
|
|
|
mImageTimeStamp = NtHdr->Pe32Plus.FileHeader.TimeDateStamp;
|
|
|
|
NtHdr->Pe32Plus.FileHeader.PointerToSymbolTable = 0;
|
|
|
|
NtHdr->Pe32Plus.FileHeader.NumberOfSymbols = 0;
|
|
|
|
NtHdr->Pe32Plus.FileHeader.SizeOfOptionalHeader = sizeof(NtHdr->Pe32Plus.OptionalHeader);
|
|
|
|
NtHdr->Pe32Plus.FileHeader.Characteristics = EFI_IMAGE_FILE_EXECUTABLE_IMAGE
|
|
|
|
| EFI_IMAGE_FILE_LINE_NUMS_STRIPPED
|
|
|
|
| EFI_IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
|
|
|
| EFI_IMAGE_FILE_LARGE_ADDRESS_AWARE;
|
|
|
|
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.SizeOfCode = mDataOffset - mTextOffset;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.SizeOfInitializedData = mRelocOffset - mDataOffset;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.SizeOfUninitializedData = 0;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.AddressOfEntryPoint = CoffEntry;
|
|
|
|
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.BaseOfCode = mTextOffset;
|
|
|
|
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.ImageBase = 0;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.SectionAlignment = mCoffAlignment;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.FileAlignment = mCoffAlignment;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.SizeOfImage = 0;
|
|
|
|
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.SizeOfHeaders = mTextOffset;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.NumberOfRvaAndSizes = EFI_IMAGE_NUMBER_OF_DIRECTORY_ENTRIES;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Section headers.
|
|
|
|
//
|
|
|
|
if ((mDataOffset - mTextOffset) > 0) {
|
|
|
|
CreateSectionHeader (".text", mTextOffset, mDataOffset - mTextOffset,
|
|
|
|
EFI_IMAGE_SCN_CNT_CODE
|
|
|
|
| EFI_IMAGE_SCN_MEM_EXECUTE
|
|
|
|
| EFI_IMAGE_SCN_MEM_READ);
|
|
|
|
} else {
|
|
|
|
// Don't make a section of size 0.
|
|
|
|
NtHdr->Pe32Plus.FileHeader.NumberOfSections--;
|
|
|
|
}
|
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
//
|
|
|
|
// If found symbol, add edata section between data and rsrc section
|
|
|
|
//
|
|
|
|
if(mExportFlag) {
|
|
|
|
Offset = mExportOffset;
|
|
|
|
} else {
|
|
|
|
Offset = mHiiRsrcOffset;
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
if ((mHiiRsrcOffset - mDataOffset) > 0) {
|
2022-03-14 06:27:21 +01:00
|
|
|
CreateSectionHeader (".data", mDataOffset, Offset - mDataOffset,
|
2014-01-27 06:23:15 +01:00
|
|
|
EFI_IMAGE_SCN_CNT_INITIALIZED_DATA
|
|
|
|
| EFI_IMAGE_SCN_MEM_WRITE
|
|
|
|
| EFI_IMAGE_SCN_MEM_READ);
|
|
|
|
} else {
|
|
|
|
// Don't make a section of size 0.
|
|
|
|
NtHdr->Pe32Plus.FileHeader.NumberOfSections--;
|
|
|
|
}
|
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
if(mExportFlag) {
|
|
|
|
if ((mHiiRsrcOffset - mExportOffset) > 0) {
|
|
|
|
CreateSectionHeader (".edata", mExportOffset, mHiiRsrcOffset - mExportOffset,
|
|
|
|
EFI_IMAGE_SCN_CNT_INITIALIZED_DATA
|
|
|
|
| EFI_IMAGE_SCN_MEM_READ);
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_EXPORT].Size = mHiiRsrcOffset - mExportOffset;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_EXPORT].VirtualAddress = mExportOffset;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
// Don't make a section of size 0.
|
|
|
|
NtHdr->Pe32Plus.FileHeader.NumberOfSections--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
if ((mRelocOffset - mHiiRsrcOffset) > 0) {
|
|
|
|
CreateSectionHeader (".rsrc", mHiiRsrcOffset, mRelocOffset - mHiiRsrcOffset,
|
|
|
|
EFI_IMAGE_SCN_CNT_INITIALIZED_DATA
|
|
|
|
| EFI_IMAGE_SCN_MEM_READ);
|
|
|
|
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_RESOURCE].Size = mRelocOffset - mHiiRsrcOffset;
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_RESOURCE].VirtualAddress = mHiiRsrcOffset;
|
|
|
|
} else {
|
|
|
|
// Don't make a section of size 0.
|
|
|
|
NtHdr->Pe32Plus.FileHeader.NumberOfSections--;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
BOOLEAN
|
|
|
|
WriteSections64 (
|
|
|
|
SECTION_FILTER_TYPES FilterType
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 Idx;
|
|
|
|
Elf_Shdr *SecShdr;
|
|
|
|
UINT32 SecOffset;
|
|
|
|
BOOLEAN (*Filter)(Elf_Shdr *);
|
2018-07-09 14:58:15 +02:00
|
|
|
Elf64_Addr GOTEntryRva;
|
2014-01-27 06:23:15 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// Initialize filter pointer
|
|
|
|
//
|
|
|
|
switch (FilterType) {
|
|
|
|
case SECTION_TEXT:
|
|
|
|
Filter = IsTextShdr;
|
|
|
|
break;
|
|
|
|
case SECTION_HII:
|
|
|
|
Filter = IsHiiRsrcShdr;
|
|
|
|
break;
|
|
|
|
case SECTION_DATA:
|
|
|
|
Filter = IsDataShdr;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// First: copy sections.
|
|
|
|
//
|
|
|
|
for (Idx = 0; Idx < mEhdr->e_shnum; Idx++) {
|
|
|
|
Elf_Shdr *Shdr = GetShdrByIndex(Idx);
|
|
|
|
if ((*Filter)(Shdr)) {
|
|
|
|
switch (Shdr->sh_type) {
|
|
|
|
case SHT_PROGBITS:
|
|
|
|
/* Copy. */
|
2018-06-01 11:21:02 +02:00
|
|
|
if (Shdr->sh_offset + Shdr->sh_size > mFileBufferSize) {
|
|
|
|
return FALSE;
|
|
|
|
}
|
2014-01-27 06:23:15 +01:00
|
|
|
memcpy(mCoffFile + mCoffSectionsOffset[Idx],
|
|
|
|
(UINT8*)mEhdr + Shdr->sh_offset,
|
|
|
|
(size_t) Shdr->sh_size);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SHT_NOBITS:
|
|
|
|
memset(mCoffFile + mCoffSectionsOffset[Idx], 0, (size_t) Shdr->sh_size);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
//
|
2019-02-06 08:44:39 +01:00
|
|
|
// Ignore for unknown section type.
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
2018-07-13 05:28:33 +02:00
|
|
|
VerboseMsg ("%s unknown section type %x. We ignore this unknown section type.", mInImageName, (unsigned)Shdr->sh_type);
|
2014-01-27 06:23:15 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Second: apply relocations.
|
|
|
|
//
|
|
|
|
VerboseMsg ("Applying Relocations...");
|
|
|
|
for (Idx = 0; Idx < mEhdr->e_shnum; Idx++) {
|
|
|
|
//
|
|
|
|
// Determine if this is a relocation section.
|
|
|
|
//
|
|
|
|
Elf_Shdr *RelShdr = GetShdrByIndex(Idx);
|
|
|
|
if ((RelShdr->sh_type != SHT_REL) && (RelShdr->sh_type != SHT_RELA)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2016-08-22 12:00:08 +02:00
|
|
|
//
|
|
|
|
// If this is a ET_DYN (PIE) executable, we will encounter a dynamic SHT_RELA
|
|
|
|
// section that applies to the entire binary, and which will have its section
|
|
|
|
// index set to #0 (which is a NULL section with the SHF_ALLOC bit cleared).
|
|
|
|
//
|
2018-07-09 14:58:15 +02:00
|
|
|
// In the absence of GOT based relocations,
|
2016-08-22 12:00:08 +02:00
|
|
|
// this RELA section will contain redundant R_xxx_RELATIVE relocations, one
|
|
|
|
// for every R_xxx_xx64 relocation appearing in the per-section RELA sections.
|
|
|
|
// (i.e., .rela.text and .rela.data)
|
|
|
|
//
|
|
|
|
if (RelShdr->sh_info == 0) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// Relocation section found. Now extract section information that the relocations
|
|
|
|
// apply to in the ELF data and the new COFF data.
|
|
|
|
//
|
|
|
|
SecShdr = GetShdrByIndex(RelShdr->sh_info);
|
|
|
|
SecOffset = mCoffSectionsOffset[RelShdr->sh_info];
|
|
|
|
|
|
|
|
//
|
|
|
|
// Only process relocations for the current filter type.
|
|
|
|
//
|
|
|
|
if (RelShdr->sh_type == SHT_RELA && (*Filter)(SecShdr)) {
|
|
|
|
UINT64 RelIdx;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Determine the symbol table referenced by the relocation data.
|
|
|
|
//
|
|
|
|
Elf_Shdr *SymtabShdr = GetShdrByIndex(RelShdr->sh_link);
|
|
|
|
UINT8 *Symtab = (UINT8*)mEhdr + SymtabShdr->sh_offset;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Process all relocation entries for this section.
|
|
|
|
//
|
|
|
|
for (RelIdx = 0; RelIdx < RelShdr->sh_size; RelIdx += (UINT32) RelShdr->sh_entsize) {
|
|
|
|
|
|
|
|
//
|
|
|
|
// Set pointer to relocation entry
|
|
|
|
//
|
|
|
|
Elf_Rela *Rel = (Elf_Rela *)((UINT8*)mEhdr + RelShdr->sh_offset + RelIdx);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Set pointer to symbol table entry associated with the relocation entry.
|
|
|
|
//
|
|
|
|
Elf_Sym *Sym = (Elf_Sym *)(Symtab + ELF_R_SYM(Rel->r_info) * SymtabShdr->sh_entsize);
|
|
|
|
|
|
|
|
Elf_Shdr *SymShdr;
|
|
|
|
UINT8 *Targ;
|
|
|
|
|
BaseTools/GenFw AARCH64: Convert more types of explicit GOT references
Rebecca reports that builds of AArch64 DSCs that involve PIE linking
when using ELF based toolchains are failing in some cases, resulting in
an error message like
bad definition for symbol '_GLOBAL_OFFSET_TABLE_'@0x72d8 or
unsupported symbol type. For example, absolute and undefined symbols
are not supported.
The reason turns out to be that, while GenFw does carry some logic to
convert GOT based symbol references into direct ones (which is always
possible given that our ELF to PE/COFF conversion only supports fully
linked executables), it does not support all possible combinations of
relocations that the linker may emit to load symbol addresses from the
GOT.
In particular, when performing a non-LTO link on object code built with
GCC using -fpie, we may end up with GOT based references such as the one
below, where the address of the GOT itself is taken, and the offset of
the symbol in the GOT is reflected in the immediate offset of the
subsequent LDR instruction.
838: adrp x0, 16000
838: R_AARCH64_ADR_PREL_PG_HI21 _GLOBAL_OFFSET_TABLE_
83c: ldr x0, [x0, #2536]
83c: R_AARCH64_LD64_GOTPAGE_LO15 _gPcd_BinaryPatch_PcdFdBaseAddress
The reason that we omit GOT based symbol references when performing ELF to
PE/COFF conversion is that the GOT is not described by static ELF
relocations, which means that the ELF file lacks the metadata to
generate the PE/COFF relocations covering the GOT table in the PE/COFF
executable. Given that none of the usual motivations for using a GOT
(copy on write footprint, shared libraries) apply to EFI executables in
the first place, the easiest way around this is to convert all GOT based
symbol address loads to PC relative ADR/ADRP instructions.
So implement this handling for R_AARCH64_LD64_GOTPAGE_LO15 and
R_AARCH64_LD64_GOTOFF_LO15 relocations as well, and turn the LDR
instructions in question into ADR instructions that generate the
address immediately.
This leaves the reference to _GLOBAL_OFFSET_TABLE_ itself, which is what
generated the error to begin with. Considering that this symbol is never
referenced (i.e., it doesn't appear anywhere in the code) and is only
meaningful in combination with R_*_GOT_* based relocations that follow
it, we can just disregard any references to it entirely, given that we
convert all of those followup relocations into direct references.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Tested-by: Rebecca Cran <rebecca@bsdio.com>
Acked-by: Leif Lindholm <quic_llindhol@quicinc.com>
Acked-by: Bob Feng <bob.c.feng@intel.com>
2022-08-21 15:31:21 +02:00
|
|
|
//
|
|
|
|
// The _GLOBAL_OFFSET_TABLE_ symbol is not actually an absolute symbol,
|
|
|
|
// but carries the SHN_ABS section index for historical reasons.
|
|
|
|
// It must be accompanied by a R_*_GOT_* type relocation on a
|
|
|
|
// subsequent instruction, which we handle below, specifically to avoid
|
|
|
|
// the GOT indirection, and to refer to the symbol directly. This means
|
|
|
|
// we can simply disregard direct references to the GOT symbol itself,
|
|
|
|
// as the resulting value will never be used.
|
|
|
|
//
|
|
|
|
if (Sym->st_shndx == SHN_ABS) {
|
|
|
|
const UINT8 *SymName = GetSymName (Sym);
|
|
|
|
if (strcmp ((CHAR8 *)SymName, "_GLOBAL_OFFSET_TABLE_") == 0) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// Check section header index found in symbol table and get the section
|
|
|
|
// header location.
|
|
|
|
//
|
|
|
|
if (Sym->st_shndx == SHN_UNDEF
|
2016-01-29 05:17:13 +01:00
|
|
|
|| Sym->st_shndx >= mEhdr->e_shnum) {
|
|
|
|
const UINT8 *SymName = GetSymName(Sym);
|
|
|
|
if (SymName == NULL) {
|
|
|
|
SymName = (const UINT8 *)"<unknown>";
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:52:32 +02:00
|
|
|
//
|
2022-09-06 15:00:07 +02:00
|
|
|
// Skip error on EM_RISCV64 and EM_LOONGARCH because no symbol name is built
|
|
|
|
// from RISC-V and LoongArch toolchain.
|
2020-04-23 15:52:32 +02:00
|
|
|
//
|
2022-09-06 15:00:07 +02:00
|
|
|
if ((mEhdr->e_machine != EM_RISCV64) && (mEhdr->e_machine != EM_LOONGARCH)) {
|
2020-04-23 15:52:32 +02:00
|
|
|
Error (NULL, 0, 3000, "Invalid",
|
|
|
|
"%s: Bad definition for symbol '%s'@%#llx or unsupported symbol type. "
|
|
|
|
"For example, absolute and undefined symbols are not supported.",
|
|
|
|
mInImageName, SymName, Sym->st_value);
|
2016-01-29 05:17:13 +01:00
|
|
|
|
2020-04-23 15:52:32 +02:00
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
2021-06-02 10:11:41 +02:00
|
|
|
continue;
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
SymShdr = GetShdrByIndex(Sym->st_shndx);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Convert the relocation data to a pointer into the coff file.
|
|
|
|
//
|
|
|
|
// Note:
|
|
|
|
// r_offset is the virtual address of the storage unit to be relocated.
|
|
|
|
// sh_addr is the virtual address for the base of the section.
|
|
|
|
//
|
|
|
|
// r_offset in a memory address.
|
|
|
|
// Convert it to a pointer in the coff file.
|
|
|
|
//
|
|
|
|
Targ = mCoffFile + SecOffset + (Rel->r_offset - SecShdr->sh_addr);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Determine how to handle each relocation type based on the machine type.
|
|
|
|
//
|
|
|
|
if (mEhdr->e_machine == EM_X86_64) {
|
|
|
|
switch (ELF_R_TYPE(Rel->r_info)) {
|
|
|
|
case R_X86_64_NONE:
|
|
|
|
break;
|
|
|
|
case R_X86_64_64:
|
|
|
|
//
|
|
|
|
// Absolute relocation.
|
|
|
|
//
|
|
|
|
VerboseMsg ("R_X86_64_64");
|
2018-07-05 11:40:04 +02:00
|
|
|
VerboseMsg ("Offset: 0x%08X, Addend: 0x%016LX",
|
|
|
|
(UINT32)(SecOffset + (Rel->r_offset - SecShdr->sh_addr)),
|
2014-01-27 06:23:15 +01:00
|
|
|
*(UINT64 *)Targ);
|
|
|
|
*(UINT64 *)Targ = *(UINT64 *)Targ - SymShdr->sh_addr + mCoffSectionsOffset[Sym->st_shndx];
|
|
|
|
VerboseMsg ("Relocation: 0x%016LX", *(UINT64*)Targ);
|
|
|
|
break;
|
|
|
|
case R_X86_64_32:
|
|
|
|
VerboseMsg ("R_X86_64_32");
|
2018-07-05 11:40:04 +02:00
|
|
|
VerboseMsg ("Offset: 0x%08X, Addend: 0x%08X",
|
|
|
|
(UINT32)(SecOffset + (Rel->r_offset - SecShdr->sh_addr)),
|
2014-01-27 06:23:15 +01:00
|
|
|
*(UINT32 *)Targ);
|
|
|
|
*(UINT32 *)Targ = (UINT32)((UINT64)(*(UINT32 *)Targ) - SymShdr->sh_addr + mCoffSectionsOffset[Sym->st_shndx]);
|
|
|
|
VerboseMsg ("Relocation: 0x%08X", *(UINT32*)Targ);
|
|
|
|
break;
|
|
|
|
case R_X86_64_32S:
|
|
|
|
VerboseMsg ("R_X86_64_32S");
|
2018-07-05 11:40:04 +02:00
|
|
|
VerboseMsg ("Offset: 0x%08X, Addend: 0x%08X",
|
|
|
|
(UINT32)(SecOffset + (Rel->r_offset - SecShdr->sh_addr)),
|
2014-01-27 06:23:15 +01:00
|
|
|
*(UINT32 *)Targ);
|
|
|
|
*(INT32 *)Targ = (INT32)((INT64)(*(INT32 *)Targ) - SymShdr->sh_addr + mCoffSectionsOffset[Sym->st_shndx]);
|
|
|
|
VerboseMsg ("Relocation: 0x%08X", *(UINT32*)Targ);
|
|
|
|
break;
|
2016-08-04 10:39:29 +02:00
|
|
|
|
|
|
|
case R_X86_64_PLT32:
|
|
|
|
//
|
|
|
|
// Treat R_X86_64_PLT32 relocations as R_X86_64_PC32: this is
|
|
|
|
// possible since we know all code symbol references resolve to
|
|
|
|
// definitions in the same module (UEFI has no shared libraries),
|
|
|
|
// and so there is never a reason to jump via a PLT entry,
|
|
|
|
// allowing us to resolve the reference using the symbol directly.
|
|
|
|
//
|
|
|
|
VerboseMsg ("Treating R_X86_64_PLT32 as R_X86_64_PC32 ...");
|
|
|
|
/* fall through */
|
2014-01-27 06:23:15 +01:00
|
|
|
case R_X86_64_PC32:
|
|
|
|
//
|
|
|
|
// Relative relocation: Symbol - Ip + Addend
|
|
|
|
//
|
|
|
|
VerboseMsg ("R_X86_64_PC32");
|
2018-07-05 11:40:04 +02:00
|
|
|
VerboseMsg ("Offset: 0x%08X, Addend: 0x%08X",
|
|
|
|
(UINT32)(SecOffset + (Rel->r_offset - SecShdr->sh_addr)),
|
2014-01-27 06:23:15 +01:00
|
|
|
*(UINT32 *)Targ);
|
|
|
|
*(UINT32 *)Targ = (UINT32) (*(UINT32 *)Targ
|
|
|
|
+ (mCoffSectionsOffset[Sym->st_shndx] - SymShdr->sh_addr)
|
|
|
|
- (SecOffset - SecShdr->sh_addr));
|
|
|
|
VerboseMsg ("Relocation: 0x%08X", *(UINT32 *)Targ);
|
|
|
|
break;
|
2018-07-09 14:58:15 +02:00
|
|
|
case R_X86_64_GOTPCREL:
|
|
|
|
case R_X86_64_GOTPCRELX:
|
|
|
|
case R_X86_64_REX_GOTPCRELX:
|
|
|
|
VerboseMsg ("R_X86_64_GOTPCREL family");
|
|
|
|
VerboseMsg ("Offset: 0x%08X, Addend: 0x%08X",
|
|
|
|
(UINT32)(SecOffset + (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
*(UINT32 *)Targ);
|
|
|
|
GOTEntryRva = Rel->r_offset - Rel->r_addend + *(INT32 *)Targ;
|
|
|
|
FindElfGOTSectionFromGOTEntryElfRva(GOTEntryRva);
|
|
|
|
*(UINT32 *)Targ = (UINT32) (*(UINT32 *)Targ
|
|
|
|
+ (mCoffSectionsOffset[mGOTShindex] - mGOTShdr->sh_addr)
|
|
|
|
- (SecOffset - SecShdr->sh_addr));
|
|
|
|
VerboseMsg ("Relocation: 0x%08X", *(UINT32 *)Targ);
|
|
|
|
GOTEntryRva += (mCoffSectionsOffset[mGOTShindex] - mGOTShdr->sh_addr); // ELF Rva -> COFF Rva
|
|
|
|
if (AccumulateCoffGOTEntries((UINT32)GOTEntryRva)) {
|
|
|
|
//
|
|
|
|
// Relocate GOT entry if it's the first time we run into it
|
|
|
|
//
|
|
|
|
Targ = mCoffFile + GOTEntryRva;
|
|
|
|
//
|
|
|
|
// Limitation: The following three statements assume memory
|
|
|
|
// at *Targ is valid because the section containing the GOT
|
|
|
|
// has already been copied from the ELF image to the Coff image.
|
|
|
|
// This pre-condition presently holds because the GOT is placed
|
|
|
|
// in section .text, and the ELF text sections are all copied
|
|
|
|
// prior to reaching this point.
|
|
|
|
// If the pre-condition is violated in the future, this fixup
|
|
|
|
// either needs to be deferred after the GOT section is copied
|
|
|
|
// to the Coff image, or the fixup should be performed on the
|
|
|
|
// source Elf image instead of the destination Coff image.
|
|
|
|
//
|
|
|
|
VerboseMsg ("Offset: 0x%08X, Addend: 0x%016LX",
|
|
|
|
(UINT32)GOTEntryRva,
|
|
|
|
*(UINT64 *)Targ);
|
|
|
|
*(UINT64 *)Targ = *(UINT64 *)Targ - SymShdr->sh_addr + mCoffSectionsOffset[Sym->st_shndx];
|
|
|
|
VerboseMsg ("Relocation: 0x%016LX", *(UINT64*)Targ);
|
|
|
|
}
|
|
|
|
break;
|
2014-01-27 06:23:15 +01:00
|
|
|
default:
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "%s unsupported ELF EM_X86_64 relocation 0x%x.", mInImageName, (unsigned) ELF_R_TYPE(Rel->r_info));
|
|
|
|
}
|
|
|
|
} else if (mEhdr->e_machine == EM_AARCH64) {
|
|
|
|
|
|
|
|
switch (ELF_R_TYPE(Rel->r_info)) {
|
BaseTools/GenFw AARCH64: fix up GOT based relative relocations
We take great care to avoid GOT based relocations in EDK2 executables,
primarily because they are pointless - we don't care about things like
the CoW footprint or relocations that target read-only sections, and so
GOT entries only bloat the binary.
However, in some cases (e.g., when building the relocatable PrePi SEC
module in ArmVirtPkg with the CLANG38 toolchain), we may end up with
some GOT based relocations nonetheless, which break the build since
GenFw does not know how to deal with them.
The relocations emitted in this case are ADRP/LDR instruction pairs
that are annotated as GOT based, which means that it is the linker's
job to emit the GOT entry and tag it with an appropriate dynamic
relocation that ensures that the correct absolute value is stored into
the GOT entry when the executable is loaded. This dynamic relocation is
not visible to GenFw, and so populating the PE/COFF relocation section
for these entries is non-trivial.
Since each ADRP/LDR pair refers to a single symbol that is local to the
binary (given that shared libraries are not supported), we can actually
convert the ADRP/LDR pair into an ADRP/ADD pair that produces the symbol
address directly rather than loading it from memory. This leaves the
GOT entry in the binary, but since it is now unused, it is no longer
necessary to emit a PE/COFF relocation entry for it.
Acked-by: Liming Gao <liming.gao@intel.com>
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
2019-09-04 05:58:18 +02:00
|
|
|
INT64 Offset;
|
|
|
|
|
BaseTools/GenFw AARCH64: Convert more types of explicit GOT references
Rebecca reports that builds of AArch64 DSCs that involve PIE linking
when using ELF based toolchains are failing in some cases, resulting in
an error message like
bad definition for symbol '_GLOBAL_OFFSET_TABLE_'@0x72d8 or
unsupported symbol type. For example, absolute and undefined symbols
are not supported.
The reason turns out to be that, while GenFw does carry some logic to
convert GOT based symbol references into direct ones (which is always
possible given that our ELF to PE/COFF conversion only supports fully
linked executables), it does not support all possible combinations of
relocations that the linker may emit to load symbol addresses from the
GOT.
In particular, when performing a non-LTO link on object code built with
GCC using -fpie, we may end up with GOT based references such as the one
below, where the address of the GOT itself is taken, and the offset of
the symbol in the GOT is reflected in the immediate offset of the
subsequent LDR instruction.
838: adrp x0, 16000
838: R_AARCH64_ADR_PREL_PG_HI21 _GLOBAL_OFFSET_TABLE_
83c: ldr x0, [x0, #2536]
83c: R_AARCH64_LD64_GOTPAGE_LO15 _gPcd_BinaryPatch_PcdFdBaseAddress
The reason that we omit GOT based symbol references when performing ELF to
PE/COFF conversion is that the GOT is not described by static ELF
relocations, which means that the ELF file lacks the metadata to
generate the PE/COFF relocations covering the GOT table in the PE/COFF
executable. Given that none of the usual motivations for using a GOT
(copy on write footprint, shared libraries) apply to EFI executables in
the first place, the easiest way around this is to convert all GOT based
symbol address loads to PC relative ADR/ADRP instructions.
So implement this handling for R_AARCH64_LD64_GOTPAGE_LO15 and
R_AARCH64_LD64_GOTOFF_LO15 relocations as well, and turn the LDR
instructions in question into ADR instructions that generate the
address immediately.
This leaves the reference to _GLOBAL_OFFSET_TABLE_ itself, which is what
generated the error to begin with. Considering that this symbol is never
referenced (i.e., it doesn't appear anywhere in the code) and is only
meaningful in combination with R_*_GOT_* based relocations that follow
it, we can just disregard any references to it entirely, given that we
convert all of those followup relocations into direct references.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Tested-by: Rebecca Cran <rebecca@bsdio.com>
Acked-by: Leif Lindholm <quic_llindhol@quicinc.com>
Acked-by: Bob Feng <bob.c.feng@intel.com>
2022-08-21 15:31:21 +02:00
|
|
|
case R_AARCH64_LD64_GOTOFF_LO15:
|
|
|
|
case R_AARCH64_LD64_GOTPAGE_LO15:
|
|
|
|
//
|
|
|
|
// Convert into an ADR instruction that refers to the symbol directly.
|
|
|
|
//
|
|
|
|
Offset = Sym->st_value - Rel->r_offset;
|
|
|
|
|
|
|
|
*(UINT32 *)Targ &= 0x1000001f;
|
|
|
|
*(UINT32 *)Targ |= ((Offset & 0x1ffffc) << (5 - 2)) | ((Offset & 0x3) << 29);
|
|
|
|
|
|
|
|
if (Offset < -0x100000 || Offset > 0xfffff) {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteSections64(): %s failed to relax GOT based symbol reference - image is too big (>1 MiB).",
|
|
|
|
mInImageName);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
BaseTools/GenFw AARCH64: fix up GOT based relative relocations
We take great care to avoid GOT based relocations in EDK2 executables,
primarily because they are pointless - we don't care about things like
the CoW footprint or relocations that target read-only sections, and so
GOT entries only bloat the binary.
However, in some cases (e.g., when building the relocatable PrePi SEC
module in ArmVirtPkg with the CLANG38 toolchain), we may end up with
some GOT based relocations nonetheless, which break the build since
GenFw does not know how to deal with them.
The relocations emitted in this case are ADRP/LDR instruction pairs
that are annotated as GOT based, which means that it is the linker's
job to emit the GOT entry and tag it with an appropriate dynamic
relocation that ensures that the correct absolute value is stored into
the GOT entry when the executable is loaded. This dynamic relocation is
not visible to GenFw, and so populating the PE/COFF relocation section
for these entries is non-trivial.
Since each ADRP/LDR pair refers to a single symbol that is local to the
binary (given that shared libraries are not supported), we can actually
convert the ADRP/LDR pair into an ADRP/ADD pair that produces the symbol
address directly rather than loading it from memory. This leaves the
GOT entry in the binary, but since it is now unused, it is no longer
necessary to emit a PE/COFF relocation entry for it.
Acked-by: Liming Gao <liming.gao@intel.com>
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
2019-09-04 05:58:18 +02:00
|
|
|
case R_AARCH64_LD64_GOT_LO12_NC:
|
|
|
|
//
|
|
|
|
// Convert into an ADD instruction - see R_AARCH64_ADR_GOT_PAGE below.
|
|
|
|
//
|
|
|
|
*(UINT32 *)Targ &= 0x3ff;
|
|
|
|
*(UINT32 *)Targ |= 0x91000000 | ((Sym->st_value & 0xfff) << 10);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_AARCH64_ADR_GOT_PAGE:
|
|
|
|
//
|
|
|
|
// This relocation points to the GOT entry that contains the absolute
|
|
|
|
// address of the symbol we are referring to. Since EDK2 only uses
|
|
|
|
// fully linked binaries, we can avoid the indirection, and simply
|
|
|
|
// refer to the symbol directly. This implies having to patch the
|
|
|
|
// subsequent LDR instruction (covered by a R_AARCH64_LD64_GOT_LO12_NC
|
|
|
|
// relocation) into an ADD instruction - this is handled above.
|
|
|
|
//
|
|
|
|
Offset = (Sym->st_value - (Rel->r_offset & ~0xfff)) >> 12;
|
|
|
|
|
|
|
|
*(UINT32 *)Targ &= 0x9000001f;
|
|
|
|
*(UINT32 *)Targ |= ((Offset & 0x1ffffc) << (5 - 2)) | ((Offset & 0x3) << 29);
|
|
|
|
|
|
|
|
/* fall through */
|
2014-01-27 06:23:15 +01:00
|
|
|
|
2015-08-10 09:55:18 +02:00
|
|
|
case R_AARCH64_ADR_PREL_PG_HI21:
|
BaseTools/GenFw AARCH64: disregard ADRP instructions that are patched already
In order to permit the use of compilers that only implement the small
code model [which involves the use of ADRP instructions that require
4 KB segment alignment] for generating PE/COFF binaries with a small
footprint, we patch ADRP instructions into ADR instructions while doing
the ELF to PE/COFF conversion.
As it turns out, the linker may be doing the same, but for different
reasons: there is a silicon erratum #843419 for ARM Cortex-A53 which
affects ADRP instructions appearing at a certain offset in memory, and
one of the mitigations for this erratum is to patch them into ADR
instructions at link time if the symbol reference is within -/+ 1 MB.
However, the LD linker fails to update the static relocation tables, and
so we end up with an ADR instruction in the fully linked binary, but
with a relocation entry in the RELA section identifying it as an ADRP
instruction.
Since the linker has already updated the symbol reference, there is no
handling needed in GenFw for such instructions, and we can simply treat
it as an ordinary ADR. However, since it is guaranteed to be accompanied
by an add or load instruction with a LO12 relocation referencing the same
symbol, the section offset check we apply to ADR instructions is going to
take place anyway, so we can just disregard the ADR instruction entirely.
Reported-by: Eugene Cohen <eugene@hp.com>
Suggested-by: Eugene Cohen <eugene@hp.com>
Tested-by: Eugene Cohen <eugene@hp.com>
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
Acked-by: Liming Gao <liming.gao@intel.com>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
2019-11-08 08:58:15 +01:00
|
|
|
//
|
|
|
|
// In order to handle Cortex-A53 erratum #843419, the LD linker may
|
|
|
|
// convert ADRP instructions into ADR instructions, but without
|
|
|
|
// updating the static relocation type, and so we may end up here
|
|
|
|
// while the instruction in question is actually ADR. So let's
|
|
|
|
// just disregard it: the section offset check we apply below to
|
|
|
|
// ADR instructions will trigger for its R_AARCH64_xxx_ABS_LO12_NC
|
|
|
|
// companion instruction as well, so it is safe to omit it here.
|
|
|
|
//
|
|
|
|
if ((*(UINT32 *)Targ & BIT31) == 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-08-10 09:55:18 +02:00
|
|
|
//
|
|
|
|
// AArch64 PG_H21 relocations are typically paired with ABS_LO12
|
|
|
|
// relocations, where a PC-relative reference with +/- 4 GB range is
|
|
|
|
// split into a relative high part and an absolute low part. Since
|
|
|
|
// the absolute low part represents the offset into a 4 KB page, we
|
BaseTools/GenFw AARCH64: convert ADRP to ADR instructions if binary size allows it
The ADRP instruction in the AArch64 ISA requires the link time and load time
offsets of a binary to be equal modulo 4 KB. The reason is that this instruction
always produces a multiple of 4 KB, and relies on a subsequent ADD or LDR
instruction to set the offset into the page. The resulting symbol reference
only produces the correct value if the symbol in question resides at that
exact offset into the page, and so loading the binary at arbitrary offsets
is not possible.
Due to the various levels of padding when packing FVs into FVs into FDs, this
alignment is very costly for XIP code, and so we would like to relax this
alignment requirement if possible.
Given that symbols that are sufficiently close (within 1 MB) of the reference
can also be reached using an ADR instruction which does not suffer from this
alignment issue, let's replace ADRP instructions with ADR after linking if
the offset can be encoded in this instruction's immediate field. Note that
this only makes sense if the section alignment is < 4 KB. Otherwise,
replacing the ADRP has no benefit, considering that the subsequent ADD or
LDR instruction is retained, and that micro-architectures are more likely
to be optimized for ADRP/ADD pairs (i.e., via micro op fusing) than for
ADR/ADD pairs, which are non-typical.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
2016-07-26 16:37:37 +02:00
|
|
|
// either have to convert the ADRP into an ADR instruction, or we
|
|
|
|
// need to use a section alignment of at least 4 KB, so that the
|
|
|
|
// binary appears at a correct offset at runtime. In any case, we
|
2015-08-10 09:55:18 +02:00
|
|
|
// have to make sure that the 4 KB relative offsets of both the
|
|
|
|
// section containing the reference as well as the section to which
|
|
|
|
// it refers have not been changed during PE/COFF conversion (i.e.,
|
|
|
|
// in ScanSections64() above).
|
|
|
|
//
|
BaseTools/GenFw AARCH64: convert ADRP to ADR instructions if binary size allows it
The ADRP instruction in the AArch64 ISA requires the link time and load time
offsets of a binary to be equal modulo 4 KB. The reason is that this instruction
always produces a multiple of 4 KB, and relies on a subsequent ADD or LDR
instruction to set the offset into the page. The resulting symbol reference
only produces the correct value if the symbol in question resides at that
exact offset into the page, and so loading the binary at arbitrary offsets
is not possible.
Due to the various levels of padding when packing FVs into FVs into FDs, this
alignment is very costly for XIP code, and so we would like to relax this
alignment requirement if possible.
Given that symbols that are sufficiently close (within 1 MB) of the reference
can also be reached using an ADR instruction which does not suffer from this
alignment issue, let's replace ADRP instructions with ADR after linking if
the offset can be encoded in this instruction's immediate field. Note that
this only makes sense if the section alignment is < 4 KB. Otherwise,
replacing the ADRP has no benefit, considering that the subsequent ADD or
LDR instruction is retained, and that micro-architectures are more likely
to be optimized for ADRP/ADD pairs (i.e., via micro op fusing) than for
ADR/ADD pairs, which are non-typical.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
2016-07-26 16:37:37 +02:00
|
|
|
if (mCoffAlignment < 0x1000) {
|
|
|
|
//
|
|
|
|
// Attempt to convert the ADRP into an ADR instruction.
|
|
|
|
// This is only possible if the symbol is within +/- 1 MB.
|
|
|
|
//
|
|
|
|
|
|
|
|
// Decode the ADRP instruction
|
|
|
|
Offset = (INT32)((*(UINT32 *)Targ & 0xffffe0) << 8);
|
|
|
|
Offset = (Offset << (6 - 5)) | ((*(UINT32 *)Targ & 0x60000000) >> (29 - 12));
|
|
|
|
|
|
|
|
//
|
|
|
|
// ADRP offset is relative to the previous page boundary,
|
|
|
|
// whereas ADR offset is relative to the instruction itself.
|
|
|
|
// So fix up the offset so it points to the page containing
|
|
|
|
// the symbol.
|
|
|
|
//
|
|
|
|
Offset -= (UINTN)(Targ - mCoffFile) & 0xfff;
|
|
|
|
|
|
|
|
if (Offset < -0x100000 || Offset > 0xfffff) {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteSections64(): %s due to its size (> 1 MB), this module requires 4 KB section alignment.",
|
|
|
|
mInImageName);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Re-encode the offset as an ADR instruction
|
|
|
|
*(UINT32 *)Targ &= 0x1000001f;
|
|
|
|
*(UINT32 *)Targ |= ((Offset & 0x1ffffc) << (5 - 2)) | ((Offset & 0x3) << 29);
|
|
|
|
}
|
|
|
|
/* fall through */
|
|
|
|
|
|
|
|
case R_AARCH64_ADD_ABS_LO12_NC:
|
|
|
|
case R_AARCH64_LDST8_ABS_LO12_NC:
|
|
|
|
case R_AARCH64_LDST16_ABS_LO12_NC:
|
|
|
|
case R_AARCH64_LDST32_ABS_LO12_NC:
|
|
|
|
case R_AARCH64_LDST64_ABS_LO12_NC:
|
|
|
|
case R_AARCH64_LDST128_ABS_LO12_NC:
|
2015-08-10 09:55:18 +02:00
|
|
|
if (((SecShdr->sh_addr ^ SecOffset) & 0xfff) != 0 ||
|
BaseTools/GenFw AARCH64: convert ADRP to ADR instructions if binary size allows it
The ADRP instruction in the AArch64 ISA requires the link time and load time
offsets of a binary to be equal modulo 4 KB. The reason is that this instruction
always produces a multiple of 4 KB, and relies on a subsequent ADD or LDR
instruction to set the offset into the page. The resulting symbol reference
only produces the correct value if the symbol in question resides at that
exact offset into the page, and so loading the binary at arbitrary offsets
is not possible.
Due to the various levels of padding when packing FVs into FVs into FDs, this
alignment is very costly for XIP code, and so we would like to relax this
alignment requirement if possible.
Given that symbols that are sufficiently close (within 1 MB) of the reference
can also be reached using an ADR instruction which does not suffer from this
alignment issue, let's replace ADRP instructions with ADR after linking if
the offset can be encoded in this instruction's immediate field. Note that
this only makes sense if the section alignment is < 4 KB. Otherwise,
replacing the ADRP has no benefit, considering that the subsequent ADD or
LDR instruction is retained, and that micro-architectures are more likely
to be optimized for ADRP/ADD pairs (i.e., via micro op fusing) than for
ADR/ADD pairs, which are non-typical.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
2016-07-26 16:37:37 +02:00
|
|
|
((SymShdr->sh_addr ^ mCoffSectionsOffset[Sym->st_shndx]) & 0xfff) != 0) {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteSections64(): %s AARCH64 small code model requires identical ELF and PE/COFF section offsets modulo 4 KB.",
|
2015-08-10 09:55:18 +02:00
|
|
|
mInImageName);
|
|
|
|
break;
|
2014-08-04 10:44:11 +02:00
|
|
|
}
|
2015-08-10 09:55:18 +02:00
|
|
|
/* fall through */
|
2014-08-04 10:44:11 +02:00
|
|
|
|
2015-08-10 09:55:18 +02:00
|
|
|
case R_AARCH64_ADR_PREL_LO21:
|
2014-08-04 10:44:11 +02:00
|
|
|
case R_AARCH64_CONDBR19:
|
2014-01-27 06:23:15 +01:00
|
|
|
case R_AARCH64_LD_PREL_LO19:
|
|
|
|
case R_AARCH64_CALL26:
|
|
|
|
case R_AARCH64_JUMP26:
|
2016-02-12 10:06:58 +01:00
|
|
|
case R_AARCH64_PREL64:
|
|
|
|
case R_AARCH64_PREL32:
|
|
|
|
case R_AARCH64_PREL16:
|
2015-08-10 09:55:18 +02:00
|
|
|
//
|
|
|
|
// The GCC toolchains (i.e., binutils) may corrupt section relative
|
|
|
|
// relocations when emitting relocation sections into fully linked
|
|
|
|
// binaries. More specifically, they tend to fail to take into
|
|
|
|
// account the fact that a '.rodata + XXX' relocation needs to have
|
|
|
|
// its addend recalculated once .rodata is merged into the .text
|
|
|
|
// section, and the relocation emitted into the .rela.text section.
|
|
|
|
//
|
|
|
|
// We cannot really recover from this loss of information, so the
|
|
|
|
// only workaround is to prevent having to recalculate any relative
|
|
|
|
// relocations at all, by using a linker script that ensures that
|
|
|
|
// the offset between the Place and the Symbol is the same in both
|
|
|
|
// the ELF and the PE/COFF versions of the binary.
|
|
|
|
//
|
|
|
|
if ((SymShdr->sh_addr - SecShdr->sh_addr) !=
|
|
|
|
(mCoffSectionsOffset[Sym->st_shndx] - SecOffset)) {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteSections64(): %s AARCH64 relative relocations require identical ELF and PE/COFF section offsets",
|
|
|
|
mInImageName);
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
// Absolute relocations.
|
|
|
|
case R_AARCH64_ABS64:
|
|
|
|
*(UINT64 *)Targ = *(UINT64 *)Targ - SymShdr->sh_addr + mCoffSectionsOffset[Sym->st_shndx];
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteSections64(): %s unsupported ELF EM_AARCH64 relocation 0x%x.", mInImageName, (unsigned) ELF_R_TYPE(Rel->r_info));
|
|
|
|
}
|
2020-04-23 15:52:32 +02:00
|
|
|
} else if (mEhdr->e_machine == EM_RISCV64) {
|
|
|
|
//
|
|
|
|
// Write section for RISC-V 64 architecture.
|
|
|
|
//
|
|
|
|
WriteSectionRiscV64 (Rel, Targ, SymShdr, Sym);
|
2022-09-06 15:00:07 +02:00
|
|
|
} else if (mEhdr->e_machine == EM_LOONGARCH) {
|
|
|
|
switch (ELF_R_TYPE(Rel->r_info)) {
|
|
|
|
INT64 Offset;
|
|
|
|
INT32 Lo, Hi;
|
|
|
|
|
|
|
|
case R_LARCH_SOP_PUSH_ABSOLUTE:
|
|
|
|
//
|
|
|
|
// Absolute relocation.
|
|
|
|
//
|
|
|
|
*(UINT64 *)Targ = *(UINT64 *)Targ - SymShdr->sh_addr + mCoffSectionsOffset[Sym->st_shndx];
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_LARCH_MARK_LA:
|
|
|
|
case R_LARCH_64:
|
|
|
|
case R_LARCH_NONE:
|
|
|
|
case R_LARCH_32:
|
|
|
|
case R_LARCH_RELATIVE:
|
|
|
|
case R_LARCH_COPY:
|
|
|
|
case R_LARCH_JUMP_SLOT:
|
|
|
|
case R_LARCH_TLS_DTPMOD32:
|
|
|
|
case R_LARCH_TLS_DTPMOD64:
|
|
|
|
case R_LARCH_TLS_DTPREL32:
|
|
|
|
case R_LARCH_TLS_DTPREL64:
|
|
|
|
case R_LARCH_TLS_TPREL32:
|
|
|
|
case R_LARCH_TLS_TPREL64:
|
|
|
|
case R_LARCH_IRELATIVE:
|
|
|
|
case R_LARCH_MARK_PCREL:
|
|
|
|
case R_LARCH_SOP_PUSH_PCREL:
|
|
|
|
case R_LARCH_SOP_PUSH_DUP:
|
|
|
|
case R_LARCH_SOP_PUSH_GPREL:
|
|
|
|
case R_LARCH_SOP_PUSH_TLS_TPREL:
|
|
|
|
case R_LARCH_SOP_PUSH_TLS_GOT:
|
|
|
|
case R_LARCH_SOP_PUSH_TLS_GD:
|
|
|
|
case R_LARCH_SOP_PUSH_PLT_PCREL:
|
|
|
|
case R_LARCH_SOP_ASSERT:
|
|
|
|
case R_LARCH_SOP_NOT:
|
|
|
|
case R_LARCH_SOP_SUB:
|
|
|
|
case R_LARCH_SOP_SL:
|
|
|
|
case R_LARCH_SOP_SR:
|
|
|
|
case R_LARCH_SOP_ADD:
|
|
|
|
case R_LARCH_SOP_AND:
|
|
|
|
case R_LARCH_SOP_IF_ELSE:
|
|
|
|
case R_LARCH_SOP_POP_32_S_10_5:
|
|
|
|
case R_LARCH_SOP_POP_32_U_10_12:
|
|
|
|
case R_LARCH_SOP_POP_32_S_10_12:
|
|
|
|
case R_LARCH_SOP_POP_32_S_10_16:
|
|
|
|
case R_LARCH_SOP_POP_32_S_10_16_S2:
|
|
|
|
case R_LARCH_SOP_POP_32_S_5_20:
|
|
|
|
case R_LARCH_SOP_POP_32_S_0_5_10_16_S2:
|
|
|
|
case R_LARCH_SOP_POP_32_S_0_10_10_16_S2:
|
|
|
|
case R_LARCH_SOP_POP_32_U:
|
|
|
|
case R_LARCH_ADD8:
|
|
|
|
case R_LARCH_ADD16:
|
|
|
|
case R_LARCH_ADD24:
|
|
|
|
case R_LARCH_ADD32:
|
|
|
|
case R_LARCH_ADD64:
|
|
|
|
case R_LARCH_SUB8:
|
|
|
|
case R_LARCH_SUB16:
|
|
|
|
case R_LARCH_SUB24:
|
|
|
|
case R_LARCH_SUB32:
|
|
|
|
case R_LARCH_SUB64:
|
|
|
|
case R_LARCH_GNU_VTINHERIT:
|
|
|
|
case R_LARCH_GNU_VTENTRY:
|
|
|
|
case R_LARCH_B16:
|
|
|
|
case R_LARCH_B21:
|
|
|
|
case R_LARCH_B26:
|
|
|
|
case R_LARCH_ABS_HI20:
|
|
|
|
case R_LARCH_ABS_LO12:
|
|
|
|
case R_LARCH_ABS64_LO20:
|
|
|
|
case R_LARCH_ABS64_HI12:
|
|
|
|
case R_LARCH_PCALA_LO12:
|
|
|
|
case R_LARCH_PCALA64_LO20:
|
|
|
|
case R_LARCH_PCALA64_HI12:
|
|
|
|
case R_LARCH_GOT_PC_LO12:
|
|
|
|
case R_LARCH_GOT64_PC_LO20:
|
|
|
|
case R_LARCH_GOT64_PC_HI12:
|
|
|
|
case R_LARCH_GOT64_HI20:
|
|
|
|
case R_LARCH_GOT64_LO12:
|
|
|
|
case R_LARCH_GOT64_LO20:
|
|
|
|
case R_LARCH_GOT64_HI12:
|
|
|
|
case R_LARCH_TLS_LE_HI20:
|
|
|
|
case R_LARCH_TLS_LE_LO12:
|
|
|
|
case R_LARCH_TLS_LE64_LO20:
|
|
|
|
case R_LARCH_TLS_LE64_HI12:
|
|
|
|
case R_LARCH_TLS_IE_PC_HI20:
|
|
|
|
case R_LARCH_TLS_IE_PC_LO12:
|
|
|
|
case R_LARCH_TLS_IE64_PC_LO20:
|
|
|
|
case R_LARCH_TLS_IE64_PC_HI12:
|
|
|
|
case R_LARCH_TLS_IE64_HI20:
|
|
|
|
case R_LARCH_TLS_IE64_LO12:
|
|
|
|
case R_LARCH_TLS_IE64_LO20:
|
|
|
|
case R_LARCH_TLS_IE64_HI12:
|
|
|
|
case R_LARCH_TLS_LD_PC_HI20:
|
|
|
|
case R_LARCH_TLS_LD64_HI20:
|
|
|
|
case R_LARCH_TLS_GD_PC_HI20:
|
|
|
|
case R_LARCH_TLS_GD64_HI20:
|
|
|
|
case R_LARCH_RELAX:
|
|
|
|
//
|
|
|
|
// These types are not used or do not require fixup.
|
|
|
|
//
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_LARCH_GOT_PC_HI20:
|
|
|
|
Offset = Sym->st_value - (UINTN)(Targ - mCoffFile);
|
|
|
|
if (Offset < 0) {
|
|
|
|
Offset = (UINTN)(Targ - mCoffFile) - Sym->st_value;
|
|
|
|
Hi = Offset & ~0xfff;
|
|
|
|
Lo = (INT32)((Offset & 0xfff) << 20) >> 20;
|
|
|
|
if ((Lo < 0) && (Lo > -2048)) {
|
|
|
|
Hi += 0x1000;
|
|
|
|
Lo = ~(0x1000 - Lo) + 1;
|
|
|
|
}
|
|
|
|
Hi = ~Hi + 1;
|
|
|
|
Lo = ~Lo + 1;
|
|
|
|
} else {
|
|
|
|
Hi = Offset & ~0xfff;
|
|
|
|
Lo = (INT32)((Offset & 0xfff) << 20) >> 20;
|
|
|
|
if (Lo < 0) {
|
|
|
|
Hi += 0x1000;
|
|
|
|
Lo = ~(0x1000 - Lo) + 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Re-encode the offset as PCADDU12I + ADDI.D(Convert LD.D) instruction
|
|
|
|
*(UINT32 *)Targ &= 0x1f;
|
|
|
|
*(UINT32 *)Targ |= 0x1c000000;
|
|
|
|
*(UINT32 *)Targ |= (((Hi >> 12) & 0xfffff) << 5);
|
|
|
|
*(UINT32 *)(Targ + 4) &= 0x3ff;
|
|
|
|
*(UINT32 *)(Targ + 4) |= 0x2c00000 | ((Lo & 0xfff) << 10);
|
|
|
|
break;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Attempt to convert instruction.
|
|
|
|
//
|
|
|
|
case R_LARCH_PCALA_HI20:
|
|
|
|
// Decode the PCALAU12I instruction and the instruction that following it.
|
|
|
|
Offset = ((INT32)((*(UINT32 *)Targ & 0x1ffffe0) << 7));
|
|
|
|
Offset += ((INT32)((*(UINT32 *)(Targ + 4) & 0x3ffc00) << 10) >> 20);
|
|
|
|
//
|
|
|
|
// PCALA offset is relative to the previous page boundary,
|
|
|
|
// whereas PCADD offset is relative to the instruction itself.
|
|
|
|
// So fix up the offset so it points to the page containing
|
|
|
|
// the symbol.
|
|
|
|
//
|
|
|
|
Offset -= (UINTN)(Targ - mCoffFile) & 0xfff;
|
|
|
|
if (Offset < 0) {
|
|
|
|
Offset = -Offset;
|
|
|
|
Hi = Offset & ~0xfff;
|
|
|
|
Lo = (INT32)((Offset & 0xfff) << 20) >> 20;
|
|
|
|
if ((Lo < 0) && (Lo > -2048)) {
|
|
|
|
Hi += 0x1000;
|
|
|
|
Lo = ~(0x1000 - Lo) + 1;
|
|
|
|
}
|
|
|
|
Hi = ~Hi + 1;
|
|
|
|
Lo = ~Lo + 1;
|
|
|
|
} else {
|
|
|
|
Hi = Offset & ~0xfff;
|
|
|
|
Lo = (INT32)((Offset & 0xfff) << 20) >> 20;
|
|
|
|
if (Lo < 0) {
|
|
|
|
Hi += 0x1000;
|
|
|
|
Lo = ~(0x1000 - Lo) + 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Convert the first instruction from PCALAU12I to PCADDU12I and re-encode the offset into them.
|
|
|
|
*(UINT32 *)Targ &= 0x1f;
|
|
|
|
*(UINT32 *)Targ |= 0x1c000000;
|
|
|
|
*(UINT32 *)Targ |= (((Hi >> 12) & 0xfffff) << 5);
|
|
|
|
*(UINT32 *)(Targ + 4) &= 0xffc003ff;
|
|
|
|
*(UINT32 *)(Targ + 4) |= (Lo & 0xfff) << 10;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteSections64(): %s unsupported ELF EM_LOONGARCH relocation 0x%x.", mInImageName, (unsigned) ELF64_R_TYPE(Rel->r_info));
|
|
|
|
}
|
2014-01-27 06:23:15 +01:00
|
|
|
} else {
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "Not a supported machine type");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
WriteRelocations64 (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 Index;
|
|
|
|
EFI_IMAGE_OPTIONAL_HEADER_UNION *NtHdr;
|
|
|
|
EFI_IMAGE_DATA_DIRECTORY *Dir;
|
2020-04-23 15:52:32 +02:00
|
|
|
UINT32 RiscVRelType;
|
2014-01-27 06:23:15 +01:00
|
|
|
|
|
|
|
for (Index = 0; Index < mEhdr->e_shnum; Index++) {
|
|
|
|
Elf_Shdr *RelShdr = GetShdrByIndex(Index);
|
|
|
|
if ((RelShdr->sh_type == SHT_REL) || (RelShdr->sh_type == SHT_RELA)) {
|
|
|
|
Elf_Shdr *SecShdr = GetShdrByIndex (RelShdr->sh_info);
|
|
|
|
if (IsTextShdr(SecShdr) || IsDataShdr(SecShdr)) {
|
|
|
|
UINT64 RelIdx;
|
|
|
|
|
|
|
|
for (RelIdx = 0; RelIdx < RelShdr->sh_size; RelIdx += RelShdr->sh_entsize) {
|
|
|
|
Elf_Rela *Rel = (Elf_Rela *)((UINT8*)mEhdr + RelShdr->sh_offset + RelIdx);
|
|
|
|
|
|
|
|
if (mEhdr->e_machine == EM_X86_64) {
|
|
|
|
switch (ELF_R_TYPE(Rel->r_info)) {
|
|
|
|
case R_X86_64_NONE:
|
|
|
|
case R_X86_64_PC32:
|
2016-08-04 10:39:29 +02:00
|
|
|
case R_X86_64_PLT32:
|
2018-07-09 14:58:15 +02:00
|
|
|
case R_X86_64_GOTPCREL:
|
|
|
|
case R_X86_64_GOTPCRELX:
|
|
|
|
case R_X86_64_REX_GOTPCRELX:
|
2014-01-27 06:23:15 +01:00
|
|
|
break;
|
|
|
|
case R_X86_64_64:
|
2022-11-08 18:17:59 +01:00
|
|
|
VerboseMsg ("EFI_IMAGE_REL_BASED_DIR64 Offset: 0x%08llX",
|
2014-01-27 06:23:15 +01:00
|
|
|
mCoffSectionsOffset[RelShdr->sh_info] + (Rel->r_offset - SecShdr->sh_addr));
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_DIR64);
|
|
|
|
break;
|
2018-07-10 10:50:36 +02:00
|
|
|
//
|
|
|
|
// R_X86_64_32 and R_X86_64_32S are ELF64 relocations emitted when using
|
|
|
|
// the SYSV X64 ABI small non-position-independent code model.
|
|
|
|
// R_X86_64_32 is used for unsigned 32-bit immediates with a 32-bit operand
|
|
|
|
// size. The value is either not extended, or zero-extended to 64 bits.
|
|
|
|
// R_X86_64_32S is used for either signed 32-bit non-rip-relative displacements
|
|
|
|
// or signed 32-bit immediates with a 64-bit operand size. The value is
|
|
|
|
// sign-extended to 64 bits.
|
|
|
|
// EFI_IMAGE_REL_BASED_HIGHLOW is a PE relocation that uses 32-bit arithmetic
|
|
|
|
// for rebasing an image.
|
|
|
|
// EFI PE binaries declare themselves EFI_IMAGE_FILE_LARGE_ADDRESS_AWARE and
|
|
|
|
// may load above 2GB. If an EFI PE binary with a converted R_X86_64_32S
|
|
|
|
// relocation is loaded above 2GB, the value will get sign-extended to the
|
|
|
|
// negative part of the 64-bit address space. The negative part of the 64-bit
|
|
|
|
// address space is unmapped, so accessing such an address page-faults.
|
|
|
|
// In order to support R_X86_64_32S, it is necessary to unset
|
|
|
|
// EFI_IMAGE_FILE_LARGE_ADDRESS_AWARE, and the EFI PE loader must implement
|
|
|
|
// this flag and abstain from loading such a PE binary above 2GB.
|
|
|
|
// Since this feature is not supported, support for R_X86_64_32S (and hence
|
|
|
|
// the small non-position-independent code model) is disabled.
|
|
|
|
//
|
|
|
|
// case R_X86_64_32S:
|
2014-01-27 06:23:15 +01:00
|
|
|
case R_X86_64_32:
|
2022-11-08 18:17:59 +01:00
|
|
|
VerboseMsg ("EFI_IMAGE_REL_BASED_HIGHLOW Offset: 0x%08llX",
|
2014-01-27 06:23:15 +01:00
|
|
|
mCoffSectionsOffset[RelShdr->sh_info] + (Rel->r_offset - SecShdr->sh_addr));
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_HIGHLOW);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "%s unsupported ELF EM_X86_64 relocation 0x%x.", mInImageName, (unsigned) ELF_R_TYPE(Rel->r_info));
|
|
|
|
}
|
|
|
|
} else if (mEhdr->e_machine == EM_AARCH64) {
|
2015-08-10 09:55:18 +02:00
|
|
|
|
2014-01-27 06:23:15 +01:00
|
|
|
switch (ELF_R_TYPE(Rel->r_info)) {
|
2014-08-04 10:44:11 +02:00
|
|
|
case R_AARCH64_ADR_PREL_LO21:
|
|
|
|
case R_AARCH64_CONDBR19:
|
2014-01-27 06:23:15 +01:00
|
|
|
case R_AARCH64_LD_PREL_LO19:
|
|
|
|
case R_AARCH64_CALL26:
|
|
|
|
case R_AARCH64_JUMP26:
|
2016-02-12 10:06:58 +01:00
|
|
|
case R_AARCH64_PREL64:
|
|
|
|
case R_AARCH64_PREL32:
|
|
|
|
case R_AARCH64_PREL16:
|
2014-01-27 06:23:15 +01:00
|
|
|
case R_AARCH64_ADR_PREL_PG_HI21:
|
|
|
|
case R_AARCH64_ADD_ABS_LO12_NC:
|
2015-08-10 09:55:18 +02:00
|
|
|
case R_AARCH64_LDST8_ABS_LO12_NC:
|
|
|
|
case R_AARCH64_LDST16_ABS_LO12_NC:
|
|
|
|
case R_AARCH64_LDST32_ABS_LO12_NC:
|
|
|
|
case R_AARCH64_LDST64_ABS_LO12_NC:
|
|
|
|
case R_AARCH64_LDST128_ABS_LO12_NC:
|
BaseTools/GenFw AARCH64: fix up GOT based relative relocations
We take great care to avoid GOT based relocations in EDK2 executables,
primarily because they are pointless - we don't care about things like
the CoW footprint or relocations that target read-only sections, and so
GOT entries only bloat the binary.
However, in some cases (e.g., when building the relocatable PrePi SEC
module in ArmVirtPkg with the CLANG38 toolchain), we may end up with
some GOT based relocations nonetheless, which break the build since
GenFw does not know how to deal with them.
The relocations emitted in this case are ADRP/LDR instruction pairs
that are annotated as GOT based, which means that it is the linker's
job to emit the GOT entry and tag it with an appropriate dynamic
relocation that ensures that the correct absolute value is stored into
the GOT entry when the executable is loaded. This dynamic relocation is
not visible to GenFw, and so populating the PE/COFF relocation section
for these entries is non-trivial.
Since each ADRP/LDR pair refers to a single symbol that is local to the
binary (given that shared libraries are not supported), we can actually
convert the ADRP/LDR pair into an ADRP/ADD pair that produces the symbol
address directly rather than loading it from memory. This leaves the
GOT entry in the binary, but since it is now unused, it is no longer
necessary to emit a PE/COFF relocation entry for it.
Acked-by: Liming Gao <liming.gao@intel.com>
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
2019-09-04 05:58:18 +02:00
|
|
|
case R_AARCH64_ADR_GOT_PAGE:
|
|
|
|
case R_AARCH64_LD64_GOT_LO12_NC:
|
BaseTools/GenFw AARCH64: Convert more types of explicit GOT references
Rebecca reports that builds of AArch64 DSCs that involve PIE linking
when using ELF based toolchains are failing in some cases, resulting in
an error message like
bad definition for symbol '_GLOBAL_OFFSET_TABLE_'@0x72d8 or
unsupported symbol type. For example, absolute and undefined symbols
are not supported.
The reason turns out to be that, while GenFw does carry some logic to
convert GOT based symbol references into direct ones (which is always
possible given that our ELF to PE/COFF conversion only supports fully
linked executables), it does not support all possible combinations of
relocations that the linker may emit to load symbol addresses from the
GOT.
In particular, when performing a non-LTO link on object code built with
GCC using -fpie, we may end up with GOT based references such as the one
below, where the address of the GOT itself is taken, and the offset of
the symbol in the GOT is reflected in the immediate offset of the
subsequent LDR instruction.
838: adrp x0, 16000
838: R_AARCH64_ADR_PREL_PG_HI21 _GLOBAL_OFFSET_TABLE_
83c: ldr x0, [x0, #2536]
83c: R_AARCH64_LD64_GOTPAGE_LO15 _gPcd_BinaryPatch_PcdFdBaseAddress
The reason that we omit GOT based symbol references when performing ELF to
PE/COFF conversion is that the GOT is not described by static ELF
relocations, which means that the ELF file lacks the metadata to
generate the PE/COFF relocations covering the GOT table in the PE/COFF
executable. Given that none of the usual motivations for using a GOT
(copy on write footprint, shared libraries) apply to EFI executables in
the first place, the easiest way around this is to convert all GOT based
symbol address loads to PC relative ADR/ADRP instructions.
So implement this handling for R_AARCH64_LD64_GOTPAGE_LO15 and
R_AARCH64_LD64_GOTOFF_LO15 relocations as well, and turn the LDR
instructions in question into ADR instructions that generate the
address immediately.
This leaves the reference to _GLOBAL_OFFSET_TABLE_ itself, which is what
generated the error to begin with. Considering that this symbol is never
referenced (i.e., it doesn't appear anywhere in the code) and is only
meaningful in combination with R_*_GOT_* based relocations that follow
it, we can just disregard any references to it entirely, given that we
convert all of those followup relocations into direct references.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Tested-by: Rebecca Cran <rebecca@bsdio.com>
Acked-by: Leif Lindholm <quic_llindhol@quicinc.com>
Acked-by: Bob Feng <bob.c.feng@intel.com>
2022-08-21 15:31:21 +02:00
|
|
|
case R_AARCH64_LD64_GOTOFF_LO15:
|
|
|
|
case R_AARCH64_LD64_GOTPAGE_LO15:
|
2016-02-12 10:06:58 +01:00
|
|
|
//
|
|
|
|
// No fixups are required for relative relocations, provided that
|
|
|
|
// the relative offsets between sections have been preserved in
|
|
|
|
// the ELF to PE/COFF conversion. We have already asserted that
|
|
|
|
// this is the case in WriteSections64 ().
|
|
|
|
//
|
2014-01-27 06:23:15 +01:00
|
|
|
break;
|
|
|
|
|
|
|
|
case R_AARCH64_ABS64:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_DIR64);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_AARCH64_ABS32:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_HIGHLOW);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteRelocations64(): %s unsupported ELF EM_AARCH64 relocation 0x%x.", mInImageName, (unsigned) ELF_R_TYPE(Rel->r_info));
|
|
|
|
}
|
2020-04-23 15:52:32 +02:00
|
|
|
} else if (mEhdr->e_machine == EM_RISCV64) {
|
|
|
|
RiscVRelType = ELF_R_TYPE(Rel->r_info);
|
|
|
|
switch (RiscVRelType) {
|
|
|
|
case R_RISCV_NONE:
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_32:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_HIGHLOW);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_64:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_DIR64);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_HI20:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_RISCV_HI20);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_LO12_I:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_RISCV_LOW12I);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_LO12_S:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_RISCV_LOW12S);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_ADD64:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_ABSOLUTE);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_SUB64:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_ABSOLUTE);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_ADD32:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_ABSOLUTE);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_SUB32:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_ABSOLUTE);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_BRANCH:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_ABSOLUTE);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_JAL:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_ABSOLUTE);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case R_RISCV_GPREL_I:
|
|
|
|
case R_RISCV_GPREL_S:
|
|
|
|
case R_RISCV_CALL:
|
2021-06-24 15:25:31 +02:00
|
|
|
case R_RISCV_CALL_PLT:
|
2020-04-23 15:52:32 +02:00
|
|
|
case R_RISCV_RVC_BRANCH:
|
|
|
|
case R_RISCV_RVC_JUMP:
|
|
|
|
case R_RISCV_RELAX:
|
|
|
|
case R_RISCV_SUB6:
|
|
|
|
case R_RISCV_SET6:
|
|
|
|
case R_RISCV_SET8:
|
|
|
|
case R_RISCV_SET16:
|
|
|
|
case R_RISCV_SET32:
|
|
|
|
case R_RISCV_PCREL_HI20:
|
2021-06-24 15:25:31 +02:00
|
|
|
case R_RISCV_GOT_HI20:
|
2020-04-23 15:52:32 +02:00
|
|
|
case R_RISCV_PCREL_LO12_I:
|
2021-07-10 08:31:14 +02:00
|
|
|
case R_RISCV_PCREL_LO12_S:
|
2020-04-23 15:52:32 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteRelocations64(): %s unsupported ELF EM_RISCV64 relocation 0x%x.", mInImageName, (unsigned) ELF_R_TYPE(Rel->r_info));
|
|
|
|
}
|
2022-09-06 15:00:07 +02:00
|
|
|
} else if (mEhdr->e_machine == EM_LOONGARCH) {
|
|
|
|
switch (ELF_R_TYPE(Rel->r_info)) {
|
|
|
|
case R_LARCH_MARK_LA:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_LOONGARCH64_MARK_LA);
|
|
|
|
break;
|
|
|
|
case R_LARCH_64:
|
|
|
|
CoffAddFixup(
|
|
|
|
(UINT32) ((UINT64) mCoffSectionsOffset[RelShdr->sh_info]
|
|
|
|
+ (Rel->r_offset - SecShdr->sh_addr)),
|
|
|
|
EFI_IMAGE_REL_BASED_DIR64);
|
|
|
|
break;
|
|
|
|
case R_LARCH_NONE:
|
|
|
|
case R_LARCH_32:
|
|
|
|
case R_LARCH_RELATIVE:
|
|
|
|
case R_LARCH_COPY:
|
|
|
|
case R_LARCH_JUMP_SLOT:
|
|
|
|
case R_LARCH_TLS_DTPMOD32:
|
|
|
|
case R_LARCH_TLS_DTPMOD64:
|
|
|
|
case R_LARCH_TLS_DTPREL32:
|
|
|
|
case R_LARCH_TLS_DTPREL64:
|
|
|
|
case R_LARCH_TLS_TPREL32:
|
|
|
|
case R_LARCH_TLS_TPREL64:
|
|
|
|
case R_LARCH_IRELATIVE:
|
|
|
|
case R_LARCH_MARK_PCREL:
|
|
|
|
case R_LARCH_SOP_PUSH_PCREL:
|
|
|
|
case R_LARCH_SOP_PUSH_ABSOLUTE:
|
|
|
|
case R_LARCH_SOP_PUSH_DUP:
|
|
|
|
case R_LARCH_SOP_PUSH_GPREL:
|
|
|
|
case R_LARCH_SOP_PUSH_TLS_TPREL:
|
|
|
|
case R_LARCH_SOP_PUSH_TLS_GOT:
|
|
|
|
case R_LARCH_SOP_PUSH_TLS_GD:
|
|
|
|
case R_LARCH_SOP_PUSH_PLT_PCREL:
|
|
|
|
case R_LARCH_SOP_ASSERT:
|
|
|
|
case R_LARCH_SOP_NOT:
|
|
|
|
case R_LARCH_SOP_SUB:
|
|
|
|
case R_LARCH_SOP_SL:
|
|
|
|
case R_LARCH_SOP_SR:
|
|
|
|
case R_LARCH_SOP_ADD:
|
|
|
|
case R_LARCH_SOP_AND:
|
|
|
|
case R_LARCH_SOP_IF_ELSE:
|
|
|
|
case R_LARCH_SOP_POP_32_S_10_5:
|
|
|
|
case R_LARCH_SOP_POP_32_U_10_12:
|
|
|
|
case R_LARCH_SOP_POP_32_S_10_12:
|
|
|
|
case R_LARCH_SOP_POP_32_S_10_16:
|
|
|
|
case R_LARCH_SOP_POP_32_S_10_16_S2:
|
|
|
|
case R_LARCH_SOP_POP_32_S_5_20:
|
|
|
|
case R_LARCH_SOP_POP_32_S_0_5_10_16_S2:
|
|
|
|
case R_LARCH_SOP_POP_32_S_0_10_10_16_S2:
|
|
|
|
case R_LARCH_SOP_POP_32_U:
|
|
|
|
case R_LARCH_ADD8:
|
|
|
|
case R_LARCH_ADD16:
|
|
|
|
case R_LARCH_ADD24:
|
|
|
|
case R_LARCH_ADD32:
|
|
|
|
case R_LARCH_ADD64:
|
|
|
|
case R_LARCH_SUB8:
|
|
|
|
case R_LARCH_SUB16:
|
|
|
|
case R_LARCH_SUB24:
|
|
|
|
case R_LARCH_SUB32:
|
|
|
|
case R_LARCH_SUB64:
|
|
|
|
case R_LARCH_GNU_VTINHERIT:
|
|
|
|
case R_LARCH_GNU_VTENTRY:
|
|
|
|
case R_LARCH_B16:
|
|
|
|
case R_LARCH_B21:
|
|
|
|
case R_LARCH_B26:
|
|
|
|
case R_LARCH_ABS_HI20:
|
|
|
|
case R_LARCH_ABS_LO12:
|
|
|
|
case R_LARCH_ABS64_LO20:
|
|
|
|
case R_LARCH_ABS64_HI12:
|
|
|
|
case R_LARCH_PCALA_HI20:
|
|
|
|
case R_LARCH_PCALA_LO12:
|
|
|
|
case R_LARCH_PCALA64_LO20:
|
|
|
|
case R_LARCH_PCALA64_HI12:
|
|
|
|
case R_LARCH_GOT_PC_HI20:
|
|
|
|
case R_LARCH_GOT_PC_LO12:
|
|
|
|
case R_LARCH_GOT64_PC_LO20:
|
|
|
|
case R_LARCH_GOT64_PC_HI12:
|
|
|
|
case R_LARCH_GOT64_HI20:
|
|
|
|
case R_LARCH_GOT64_LO12:
|
|
|
|
case R_LARCH_GOT64_LO20:
|
|
|
|
case R_LARCH_GOT64_HI12:
|
|
|
|
case R_LARCH_TLS_LE_HI20:
|
|
|
|
case R_LARCH_TLS_LE_LO12:
|
|
|
|
case R_LARCH_TLS_LE64_LO20:
|
|
|
|
case R_LARCH_TLS_LE64_HI12:
|
|
|
|
case R_LARCH_TLS_IE_PC_HI20:
|
|
|
|
case R_LARCH_TLS_IE_PC_LO12:
|
|
|
|
case R_LARCH_TLS_IE64_PC_LO20:
|
|
|
|
case R_LARCH_TLS_IE64_PC_HI12:
|
|
|
|
case R_LARCH_TLS_IE64_HI20:
|
|
|
|
case R_LARCH_TLS_IE64_LO12:
|
|
|
|
case R_LARCH_TLS_IE64_LO20:
|
|
|
|
case R_LARCH_TLS_IE64_HI12:
|
|
|
|
case R_LARCH_TLS_LD_PC_HI20:
|
|
|
|
case R_LARCH_TLS_LD64_HI20:
|
|
|
|
case R_LARCH_TLS_GD_PC_HI20:
|
|
|
|
case R_LARCH_TLS_GD64_HI20:
|
|
|
|
case R_LARCH_RELAX:
|
|
|
|
//
|
|
|
|
// These types are not used or do not require fixup in PE format files.
|
|
|
|
//
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
Error (NULL, 0, 3000, "Invalid", "WriteRelocations64(): %s unsupported ELF EM_LOONGARCH relocation 0x%x.", mInImageName, (unsigned) ELF64_R_TYPE(Rel->r_info));
|
|
|
|
}
|
2014-01-27 06:23:15 +01:00
|
|
|
} else {
|
|
|
|
Error (NULL, 0, 3000, "Not Supported", "This tool does not support relocations for ELF with e_machine %u (processor type).", (unsigned) mEhdr->e_machine);
|
|
|
|
}
|
|
|
|
}
|
2018-07-09 14:58:15 +02:00
|
|
|
if (mEhdr->e_machine == EM_X86_64 && RelShdr->sh_info == mGOTShindex) {
|
|
|
|
//
|
|
|
|
// Tack relocations for GOT entries after other relocations for
|
|
|
|
// the section the GOT is in, as it's usually found at the end
|
|
|
|
// of the section. This is done in order to maintain Rva order
|
|
|
|
// of Coff relocations.
|
|
|
|
//
|
|
|
|
EmitGOTRelocations();
|
|
|
|
}
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-09 14:58:15 +02:00
|
|
|
if (mEhdr->e_machine == EM_X86_64) {
|
|
|
|
//
|
|
|
|
// This is a safety net just in case the GOT is in a section
|
|
|
|
// with no other relocations and the first invocation of
|
|
|
|
// EmitGOTRelocations() above was skipped. This invocation
|
|
|
|
// does not maintain Rva order of Coff relocations.
|
|
|
|
// At present, with a single text section, all references to
|
|
|
|
// the GOT and the GOT itself reside in section .text, so
|
|
|
|
// if there's a GOT at all, the first invocation above
|
|
|
|
// is executed.
|
|
|
|
//
|
|
|
|
EmitGOTRelocations();
|
|
|
|
}
|
2014-01-27 06:23:15 +01:00
|
|
|
//
|
|
|
|
// Pad by adding empty entries.
|
|
|
|
//
|
|
|
|
while (mCoffOffset & (mCoffAlignment - 1)) {
|
|
|
|
CoffAddFixupEntry(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
NtHdr = (EFI_IMAGE_OPTIONAL_HEADER_UNION *)(mCoffFile + mNtHdrOffset);
|
|
|
|
Dir = &NtHdr->Pe32Plus.OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_BASERELOC];
|
|
|
|
Dir->Size = mCoffOffset - mRelocOffset;
|
|
|
|
if (Dir->Size == 0) {
|
|
|
|
// If no relocations, null out the directory entry and don't add the .reloc section
|
|
|
|
Dir->VirtualAddress = 0;
|
|
|
|
NtHdr->Pe32Plus.FileHeader.NumberOfSections--;
|
|
|
|
} else {
|
|
|
|
Dir->VirtualAddress = mRelocOffset;
|
|
|
|
CreateSectionHeader (".reloc", mRelocOffset, mCoffOffset - mRelocOffset,
|
|
|
|
EFI_IMAGE_SCN_CNT_INITIALIZED_DATA
|
|
|
|
| EFI_IMAGE_SCN_MEM_DISCARDABLE
|
|
|
|
| EFI_IMAGE_SCN_MEM_READ);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
WriteDebug64 (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 Len;
|
|
|
|
EFI_IMAGE_OPTIONAL_HEADER_UNION *NtHdr;
|
|
|
|
EFI_IMAGE_DATA_DIRECTORY *DataDir;
|
|
|
|
EFI_IMAGE_DEBUG_DIRECTORY_ENTRY *Dir;
|
|
|
|
EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY *Nb10;
|
|
|
|
|
|
|
|
Len = strlen(mInImageName) + 1;
|
|
|
|
|
2015-07-27 15:49:54 +02:00
|
|
|
Dir = (EFI_IMAGE_DEBUG_DIRECTORY_ENTRY*)(mCoffFile + mDebugOffset);
|
2014-01-27 06:23:15 +01:00
|
|
|
Dir->Type = EFI_IMAGE_DEBUG_TYPE_CODEVIEW;
|
|
|
|
Dir->SizeOfData = sizeof(EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY) + Len;
|
2015-07-27 15:49:54 +02:00
|
|
|
Dir->RVA = mDebugOffset + sizeof(EFI_IMAGE_DEBUG_DIRECTORY_ENTRY);
|
|
|
|
Dir->FileOffset = mDebugOffset + sizeof(EFI_IMAGE_DEBUG_DIRECTORY_ENTRY);
|
2014-01-27 06:23:15 +01:00
|
|
|
|
|
|
|
Nb10 = (EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY*)(Dir + 1);
|
|
|
|
Nb10->Signature = CODEVIEW_SIGNATURE_NB10;
|
|
|
|
strcpy ((char *)(Nb10 + 1), mInImageName);
|
|
|
|
|
|
|
|
|
|
|
|
NtHdr = (EFI_IMAGE_OPTIONAL_HEADER_UNION *)(mCoffFile + mNtHdrOffset);
|
|
|
|
DataDir = &NtHdr->Pe32Plus.OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_DEBUG];
|
2015-07-27 15:49:54 +02:00
|
|
|
DataDir->VirtualAddress = mDebugOffset;
|
BaseTools/GenFw: disregard payload in PE debug directory entry size
Currently, the PE/COFF conversion routines in GenFw add a so-called
NB10 CodeView debug record to the image, and update the associated
directory entry in the PE/COFF optional header to contain its relative
virtual address (RVA) and size.
However, there are two levels of indirection at work here: the actual
NB10 CodeView record (which is simply a magic number and some unused
data fields followed by the NUL terminated filename) is emitted
separately, and a separate descriptor is emitted that identifies the
NB10 CodeView record as type EFI_IMAGE_DEBUG_TYPE_CODEVIEW, and records
its size. The directory entry in the PE/COFF optional header should
refer to this intermediate descriptor's address and size only, but
the WriteDebug## () routines in GenFw erroneously record the size of
both the descriptor and the NB10 CodeView record.
This problem was exposed by commit e4129b0e5897 ("BaseTools: Update
GenFw to clear unused debug entry generated by VS tool chain",
2017-06-19), and GenFw now crashes when it attempts to iterate over
what it thinks are multiple intermediate descriptors for different
kinds of debug data embedded in the image.
The error is understandable, given that both are carved out of the
same file space allocation, but this is really an implementation detail
of GenFw, and is not required. (Note that the intermediate descriptor
does not require a RVA and so it does not even need to be inside a
section)
So omit the size of the NB10 CodeView record from the size recorded
in the optional header.
Link: https://lists.01.org/pipermail/edk2-devel/2017-July/012162.html
Link: https://lists.01.org/pipermail/edk2-devel/2017-July/012181.html
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Co-debugged-or-whatever-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Liming Gao <liming.gao@intel.com>
2017-07-05 20:33:59 +02:00
|
|
|
DataDir->Size = sizeof(EFI_IMAGE_DEBUG_DIRECTORY_ENTRY);
|
2014-01-27 06:23:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
SetImageSize64 (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_IMAGE_OPTIONAL_HEADER_UNION *NtHdr;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Set image size
|
|
|
|
//
|
|
|
|
NtHdr = (EFI_IMAGE_OPTIONAL_HEADER_UNION *)(mCoffFile + mNtHdrOffset);
|
|
|
|
NtHdr->Pe32Plus.OptionalHeader.SizeOfImage = mCoffOffset;
|
|
|
|
}
|
|
|
|
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
CleanUp64 (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if (mCoffSectionsOffset != NULL) {
|
|
|
|
free (mCoffSectionsOffset);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-14 06:27:21 +01:00
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
WriteExport64 (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_IMAGE_OPTIONAL_HEADER_UNION *NtHdr;
|
|
|
|
EFI_IMAGE_EXPORT_DIRECTORY *ExportDir;
|
|
|
|
EFI_IMAGE_DATA_DIRECTORY *DataDir;
|
|
|
|
UINT32 FileNameOffset;
|
|
|
|
UINT32 NameOffset;
|
|
|
|
UINT16 Index;
|
|
|
|
UINT8 *Tdata = NULL;
|
|
|
|
|
|
|
|
ExportDir = (EFI_IMAGE_EXPORT_DIRECTORY*)(mCoffFile + mExportOffset);
|
|
|
|
ExportDir->Characteristics = 0;
|
|
|
|
ExportDir->TimeDateStamp = 0;
|
|
|
|
ExportDir->MajorVersion = 0;
|
|
|
|
ExportDir->MinorVersion =0;
|
|
|
|
ExportDir->Name = 0;
|
|
|
|
ExportDir->NumberOfFunctions = mExportSymNum;
|
|
|
|
ExportDir->NumberOfNames = mExportSymNum;
|
|
|
|
ExportDir->Base = EFI_IMAGE_EXPORT_ORDINAL_BASE;
|
|
|
|
ExportDir->AddressOfFunctions = mExportOffset + sizeof(EFI_IMAGE_EXPORT_DIRECTORY);
|
|
|
|
ExportDir->AddressOfNames = ExportDir->AddressOfFunctions + EFI_IMAGE_EXPORT_ADDR_SIZE * mExportSymNum;
|
|
|
|
ExportDir->AddressOfNameOrdinals = ExportDir->AddressOfNames + EFI_IMAGE_EXPORT_ADDR_SIZE * mExportSymNum;
|
|
|
|
|
|
|
|
FileNameOffset = ExportDir->AddressOfNameOrdinals + EFI_IMAGE_EXPORT_ORDINAL_SIZE * mExportSymNum;
|
|
|
|
NameOffset = FileNameOffset + strlen(mInImageName) + 1;
|
|
|
|
|
|
|
|
// Write Input image Name RVA
|
|
|
|
ExportDir->Name = FileNameOffset;
|
|
|
|
|
|
|
|
// Write Input image Name
|
|
|
|
strcpy((char *)(mCoffFile + FileNameOffset), mInImageName);
|
|
|
|
|
|
|
|
for (Index = 0; Index < mExportSymNum; Index++) {
|
|
|
|
//
|
|
|
|
// Write Export Address Table
|
|
|
|
//
|
|
|
|
Tdata = mCoffFile + ExportDir->AddressOfFunctions + Index * EFI_IMAGE_EXPORT_ADDR_SIZE;
|
|
|
|
*(UINT32 *)Tdata = mExportRVA[Index];
|
|
|
|
|
|
|
|
//
|
|
|
|
// Write Export Name Pointer Table
|
|
|
|
//
|
|
|
|
Tdata = mCoffFile + ExportDir->AddressOfNames + Index * EFI_IMAGE_EXPORT_ADDR_SIZE;
|
|
|
|
*(UINT32 *)Tdata = NameOffset;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Write Export Ordinal table
|
|
|
|
//
|
|
|
|
Tdata = mCoffFile + ExportDir->AddressOfNameOrdinals + Index * EFI_IMAGE_EXPORT_ORDINAL_SIZE;
|
|
|
|
*(UINT16 *)Tdata = Index;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Write Export Name Table
|
|
|
|
//
|
|
|
|
strcpy((char *)(mCoffFile + NameOffset), mExportSymName[Index]);
|
|
|
|
NameOffset += strlen(mExportSymName[Index]) + 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
NtHdr = (EFI_IMAGE_OPTIONAL_HEADER_UNION *)(mCoffFile + mNtHdrOffset);
|
|
|
|
DataDir = &NtHdr->Pe32Plus.OptionalHeader.DataDirectory[EFI_IMAGE_DIRECTORY_ENTRY_EXPORT];
|
|
|
|
DataDir->VirtualAddress = mExportOffset;
|
|
|
|
DataDir->Size = mExportSize;
|
|
|
|
|
|
|
|
}
|
2014-01-27 06:23:15 +01:00
|
|
|
|