From: Sascha Hauer <s.hauer@pengutronix.de>
To: BAREBOX <barebox@lists.infradead.org>
Cc: "Claude Sonnet 4.5" <noreply@anthropic.com>
Subject: [PATCH 04/19] ARM: implement elf_apply_relocations() for ELF relocation support
Date: Mon, 05 Jan 2026 12:26:45 +0100 [thread overview]
Message-ID: <20260105-pbl-load-elf-v1-4-e97853f98232@pengutronix.de> (raw)
In-Reply-To: <20260105-pbl-load-elf-v1-0-e97853f98232@pengutronix.de>
Implement architecture-specific ELF relocation handlers for ARM32 and ARM64.
ARM32 implementation (arch/arm/lib32/elf_reloc.c):
- Handles REL-format relocations (no explicit addend)
- Supports R_ARM_RELATIVE and R_ARM_ABS32 relocation types
- Addend is read from the target location
ARM64 implementation (arch/arm/lib64/elf_reloc.c):
- Handles RELA-format relocations (with explicit addend)
- Supports R_AARCH64_RELATIVE and R_AARCH64_ABS64 relocation types
- Addend is provided in relocation entry
Both implementations:
- Parse PT_DYNAMIC segment to locate relocation tables
- Validate relocation table format and entry sizes
- Apply relocations based on the computed load offset
- Return appropriate errors for unsupported relocation types
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
---
arch/arm/include/asm/elf.h | 11 +++++
arch/arm/lib32/Makefile | 1 +
arch/arm/lib32/elf_reloc.c | 105 +++++++++++++++++++++++++++++++++++++++++++++
arch/arm/lib64/Makefile | 1 +
arch/arm/lib64/elf_reloc.c | 105 +++++++++++++++++++++++++++++++++++++++++++++
5 files changed, 223 insertions(+)
diff --git a/arch/arm/include/asm/elf.h b/arch/arm/include/asm/elf.h
index 4043e6fd5b991eb5cccb3fa0ea28d208006ee1fc..cceb92ee1a5f63c37b0e981c263676bd35a261c0 100644
--- a/arch/arm/include/asm/elf.h
+++ b/arch/arm/include/asm/elf.h
@@ -36,6 +36,17 @@ typedef struct user_fp elf_fpregset_t;
#define R_ARM_THM_CALL 10
#define R_ARM_THM_JUMP24 30
+/* Additional relocation types for dynamic linking */
+#define R_ARM_RELATIVE 23
+#define R_ARM_GLOB_DAT 21
+#define R_ARM_JUMP_SLOT 22
+
+#define R_AARCH64_NONE 0
+#define R_AARCH64_ABS64 257
+#define R_AARCH64_RELATIVE 1027
+#define R_AARCH64_GLOB_DAT 1025
+#define R_AARCH64_JUMP_SLOT 1026
+
/*
* These are used to set parameters in the core dumps.
*/
diff --git a/arch/arm/lib32/Makefile b/arch/arm/lib32/Makefile
index f76010e93350375a11e673d9b68fb1d216983404..579d8bc0f0d0f7f0edf5761530be614d36495e69 100644
--- a/arch/arm/lib32/Makefile
+++ b/arch/arm/lib32/Makefile
@@ -7,6 +7,7 @@ obj-$(CONFIG_BOOTM_OPTEE) += start-kernel-optee.o
obj-$(CONFIG_CMD_BOOTU) += bootu.o
obj-$(CONFIG_BOOT_ATAGS) += atags.o
obj-y += div0.o
+obj-pbl-$(CONFIG_ELF) += elf_reloc.o
obj-y += findbit.o
obj-y += io.o
obj-y += io-readsb.o
diff --git a/arch/arm/lib32/elf_reloc.c b/arch/arm/lib32/elf_reloc.c
new file mode 100644
index 0000000000000000000000000000000000000000..2b44270d965412ef348be7919022a607fa3fa020
--- /dev/null
+++ b/arch/arm/lib32/elf_reloc.c
@@ -0,0 +1,105 @@
+// SPDX-License-Identifier: GPL-2.0
+
+#include <common.h>
+#include <elf.h>
+#include <errno.h>
+#include <asm/elf.h>
+
+/*
+ * Parse dynamic section and extract relocation info for ARM32
+ */
+static int parse_dynamic_section(struct elf_image *elf, Elf32_Dyn *dyn,
+ Elf32_Rel **rel_out, u64 *relsz_out)
+{
+ Elf32_Rel *rel = NULL;
+ u64 relsz = 0, relent = 0;
+ int i;
+ phys_addr_t base = (phys_addr_t)elf->reloc_offset;
+
+ /* Iterate through dynamic entries until DT_NULL */
+ for (i = 0; dyn[i].d_tag != DT_NULL; i++) {
+ switch (dyn[i].d_tag) {
+ case DT_REL:
+ /* REL table address - needs to be adjusted by load offset */
+ rel = (Elf32_Rel *)(base + dyn[i].d_un.d_ptr);
+ break;
+ case DT_RELSZ:
+ relsz = dyn[i].d_un.d_val;
+ break;
+ case DT_RELENT:
+ relent = dyn[i].d_un.d_val;
+ break;
+ case DT_RELA:
+ pr_err("ARM32 uses REL, not RELA relocations\n");
+ return -EINVAL;
+ default:
+ break;
+ }
+ }
+
+ if (!rel || !relsz || relent != sizeof(Elf32_Rel)) {
+ pr_debug("No relocations or invalid relocation info\n");
+ return -EINVAL;
+ }
+
+ *rel_out = rel;
+ *relsz_out = relsz;
+ return 0;
+}
+
+/*
+ * Apply ARM32 ELF relocations
+ */
+int elf_apply_relocations(struct elf_image *elf, void *dyn_seg)
+{
+ Elf32_Dyn *dyn = dyn_seg;
+ Elf32_Rel *rel;
+ u64 relsz;
+ phys_addr_t base = (phys_addr_t)elf->reloc_offset;
+ int ret;
+
+ if (elf->class != ELFCLASS32) {
+ pr_err("Wrong ELF class for ARM32 relocation\n");
+ return -EINVAL;
+ }
+
+ ret = parse_dynamic_section(elf, dyn, &rel, &relsz);
+ if (ret)
+ return ret;
+
+ /* Apply each relocation */
+ while (relsz > 0) {
+ u32 *fixup_addr;
+ u32 reloc_type = ELF32_R_TYPE(rel->r_info);
+
+ /* Calculate address to fix up */
+ fixup_addr = (u32 *)(base + rel->r_offset);
+
+ switch (reloc_type) {
+ case R_ARM_NONE:
+ /* No operation */
+ break;
+
+ case R_ARM_RELATIVE:
+ /* B(P) = S + A */
+ /* For REL format: A = *fixup_addr, S = base */
+ *fixup_addr = *fixup_addr + base;
+ break;
+
+ case R_ARM_ABS32:
+ /* B(P) = (S + A) | T */
+ *fixup_addr = *fixup_addr + base;
+ break;
+
+ default:
+ pr_err("Unsupported ARM32 relocation type: %u at offset 0x%x\n",
+ reloc_type, rel->r_offset);
+ return -EINVAL;
+ }
+
+ rel++;
+ relsz -= sizeof(Elf32_Rel);
+ }
+
+ return 0;
+}
diff --git a/arch/arm/lib64/Makefile b/arch/arm/lib64/Makefile
index e86a2e5a2f3d6fa220179835a33ff1e1af358c9a..2890a41c37c676ab3e6f78ef6596447a06909651 100644
--- a/arch/arm/lib64/Makefile
+++ b/arch/arm/lib64/Makefile
@@ -3,6 +3,7 @@
obj-y += stacktrace.o
obj-$(CONFIG_ARM_LINUX) += armlinux.o
obj-y += div0.o
+obj-pbl-$(CONFIG_ELF) += elf_reloc.o
obj-$(CONFIG_ARM_OPTIMZED_STRING_FUNCTIONS) += memcpy.o
obj-$(CONFIG_ARM_OPTIMZED_STRING_FUNCTIONS) += memset.o string.o
extra-y += barebox.lds
diff --git a/arch/arm/lib64/elf_reloc.c b/arch/arm/lib64/elf_reloc.c
new file mode 100644
index 0000000000000000000000000000000000000000..22adb4cdafb37f7bd2939e84bc0c6e8133d2d998
--- /dev/null
+++ b/arch/arm/lib64/elf_reloc.c
@@ -0,0 +1,105 @@
+// SPDX-License-Identifier: GPL-2.0
+
+#include <common.h>
+#include <elf.h>
+#include <errno.h>
+#include <asm/elf.h>
+
+/*
+ * Parse dynamic section and extract relocation info for ARM64
+ */
+static int parse_dynamic_section(struct elf_image *elf, Elf64_Dyn *dyn,
+ Elf64_Rela **rela_out, u64 *relasz_out)
+{
+ Elf64_Rela *rela = NULL;
+ u64 relasz = 0, relaent = 0;
+ int i;
+ phys_addr_t base = (phys_addr_t)elf->reloc_offset;
+
+ /* Iterate through dynamic entries until DT_NULL */
+ for (i = 0; dyn[i].d_tag != DT_NULL; i++) {
+ switch (dyn[i].d_tag) {
+ case DT_RELA:
+ /* RELA table address - needs to be adjusted by load offset */
+ rela = (Elf64_Rela *)(base + dyn[i].d_un.d_ptr);
+ break;
+ case DT_RELASZ:
+ relasz = dyn[i].d_un.d_val;
+ break;
+ case DT_RELAENT:
+ relaent = dyn[i].d_un.d_val;
+ break;
+ case DT_REL:
+ pr_err("ARM64 uses RELA, not REL relocations\n");
+ return -EINVAL;
+ default:
+ break;
+ }
+ }
+
+ if (!rela || !relasz || relaent != sizeof(Elf64_Rela)) {
+ pr_debug("No relocations or invalid relocation info\n");
+ return -EINVAL;
+ }
+
+ *rela_out = rela;
+ *relasz_out = relasz;
+ return 0;
+}
+
+/*
+ * Apply ARM64 ELF relocations
+ */
+int elf_apply_relocations(struct elf_image *elf, void *dyn_seg)
+{
+ Elf64_Dyn *dyn = dyn_seg;
+ Elf64_Rela *rela;
+ u64 relasz;
+ phys_addr_t base = (phys_addr_t)elf->reloc_offset;
+ int ret;
+
+ if (elf->class != ELFCLASS64) {
+ pr_err("Wrong ELF class for ARM64 relocation\n");
+ return -EINVAL;
+ }
+
+ ret = parse_dynamic_section(elf, dyn, &rela, &relasz);
+ if (ret)
+ return ret;
+
+ /* Apply each relocation */
+ while (relasz > 0) {
+ u64 *fixup_addr;
+ u32 reloc_type = ELF64_R_TYPE(rela->r_info);
+
+ /* Calculate address to fix up */
+ fixup_addr = (u64 *)(base + rela->r_offset);
+
+ switch (reloc_type) {
+ case R_AARCH64_NONE:
+ /* No operation */
+ break;
+
+ case R_AARCH64_RELATIVE:
+ /* B(P) = Delta(S) + A */
+ /* For RELA format: A = r_addend, Delta(S) = base */
+ *fixup_addr = base + rela->r_addend;
+ break;
+
+ case R_AARCH64_ABS64:
+ /* B(P) = S + A */
+ *fixup_addr = base + rela->r_addend;
+ break;
+
+ default:
+ pr_err("Unsupported ARM64 relocation type: %u at offset 0x%llx\n",
+ reloc_type, rela->r_offset);
+ return -EINVAL;
+ }
+
+ rela++;
+ relasz -= sizeof(Elf64_Rela);
+ }
+
+ return 0;
+}
--
2.47.3
next prev parent reply other threads:[~2026-01-05 11:27 UTC|newest]
Thread overview: 49+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-01-05 11:26 [PATCH 00/19] PBL: Add PBL ELF loading support with dynamic relocations Sascha Hauer
2026-01-05 11:26 ` [PATCH 01/19] elf: Use memcmp to make suitable for PBL Sascha Hauer
2026-01-05 11:46 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 02/19] elf: build for PBL as well Sascha Hauer
2026-01-05 11:26 ` [PATCH 03/19] elf: add dynamic relocation support Sascha Hauer
2026-01-05 14:05 ` Ahmad Fatoum
2026-01-05 11:26 ` Sascha Hauer [this message]
2026-01-05 11:58 ` [PATCH 04/19] ARM: implement elf_apply_relocations() for ELF " Ahmad Fatoum
2026-01-05 19:53 ` Sascha Hauer
2026-01-05 11:26 ` [PATCH 05/19] riscv: " Sascha Hauer
2026-01-05 11:26 ` [PATCH 06/19] elf: implement elf_load_inplace() Sascha Hauer
2026-01-05 13:37 ` Ahmad Fatoum
2026-01-05 22:42 ` Sascha Hauer
2026-01-06 8:18 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 07/19] elf: create elf_open_binary_into() Sascha Hauer
2026-01-05 11:26 ` [PATCH 08/19] Makefile: add barebox.elf build target Sascha Hauer
2026-01-05 12:22 ` Ahmad Fatoum
2026-01-05 15:43 ` Sascha Hauer
2026-01-05 17:11 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 09/19] PBL: allow to link ELF image into PBL Sascha Hauer
2026-01-05 12:11 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 10/19] mmu: add MAP_CACHED_RO mapping type Sascha Hauer
2026-01-05 12:14 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 11/19] mmu: introduce pbl_remap_range() Sascha Hauer
2026-01-05 12:15 ` Ahmad Fatoum
2026-01-06 8:50 ` Ahmad Fatoum
2026-01-06 9:25 ` Sascha Hauer
2026-01-05 11:26 ` [PATCH 12/19] ARM: use relative jumps in exception table Sascha Hauer
2026-01-05 11:44 ` Ahmad Fatoum
2026-01-05 12:29 ` Sascha Hauer
2026-01-05 12:31 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 13/19] ARM: exceptions: make in-binary exception table const Sascha Hauer
2026-01-05 11:26 ` [PATCH 14/19] ARM: linker script: create separate PT_LOAD segments for text, rodata, and data Sascha Hauer
2026-01-05 13:11 ` Ahmad Fatoum
2026-01-05 23:01 ` Sascha Hauer
2026-01-06 7:59 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 15/19] ARM: link ELF image into PBL Sascha Hauer
2026-01-05 12:27 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 16/19] ARM: PBL: setup MMU with proper permissions from ELF segments Sascha Hauer
2026-01-05 12:58 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 17/19] riscv: link ELF image into PBL Sascha Hauer
2026-01-05 13:12 ` Ahmad Fatoum
2026-01-05 11:26 ` [PATCH 18/19] riscv: linker script: create separate PT_LOAD segments for text, rodata, and data Sascha Hauer
2026-01-05 13:40 ` Ahmad Fatoum
2026-01-05 11:27 ` [PATCH 19/19] riscv: add ELF segment-based memory protection with MMU Sascha Hauer
2026-01-05 13:58 ` Ahmad Fatoum
2026-01-05 14:08 ` [PATCH 00/19] PBL: Add PBL ELF loading support with dynamic relocations Ahmad Fatoum
2026-01-05 16:47 ` Sascha Hauer
2026-01-06 8:35 ` Ahmad Fatoum
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260105-pbl-load-elf-v1-4-e97853f98232@pengutronix.de \
--to=s.hauer@pengutronix.de \
--cc=barebox@lists.infradead.org \
--cc=noreply@anthropic.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox