Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp3753056rdg; Wed, 18 Oct 2023 05:18:31 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEx1I6anUO3Dpy1EJsYcMIa2Fx1f5UNLj9dEqjrKFfUBXtsxdQzvC7acMCPEsM3cN1RMnwU X-Received: by 2002:a05:6871:5318:b0:1e9:bda0:771 with SMTP id hx24-20020a056871531800b001e9bda00771mr5758526oac.4.1697631511171; Wed, 18 Oct 2023 05:18:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697631511; cv=none; d=google.com; s=arc-20160816; b=HcDQ7Pq+Zj0a7pJnGH+fc57E6uFTnYLsy3NEsrhoPKycvtMF0vvFufAqNqHVVhYagY evXPR+ifZYYsR9v9iRqcYgmIAjrSCMCmF1oCcUBAgEPl5JXprG59ey9P42JC3QEyNH94 4zGmivSAsOwRHUhEutcxKOH6/r0LI2x5odykA4do9v5mC8VgMWm1ywx80o0a91xnV3Ss DquXRTaCMVpg4zzTc6p0ZOY5hijrWYiTeKuu72wwQozKjBN2TjCRjRcCfXKIM+anXF7H ybOP12uo/+XcFXYy0u3GplFZRqn88O+HU5i+fDepuPIYsZ5DbNfQ7ECRL3YDb+gzo0jn GCMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:mime-version :references:in-reply-to:from:dkim-signature; bh=9JEjALsOVS6EpRdOMeKAgdLdy8unJkD+oLph4vQm3Qc=; fh=ovDF+HeOJZKFEzQJS2n92cC1MuF8DWNh/mJf80GhX74=; b=detxPQrNXH9DY51nwO//4lQ3TlvvIS/9QhGYsiU7kbqDdoF5nrHLa1u653DpIkI73X S874sQ28tjD+1aRt/fkVLRAp2iohaL0qSb8movlGqGiNMWNHY6Q9BD+qvBbLdjMRiXip eY2Kvfc9MVagantSGkwjukyoNrBkHNM88b+Q8TX3//RyIvjPGfs6g4NhnNr0PfPDfhmI b9CG5l3MuHRBDkdabqR1r2sBsp9Xp7hA4qLUq+1UUEndaVihEoGzx5uyT0Ge0SrkGodq HkgDtGlVgqlpbwhhhH6g98eNqJR7Z+JtMlfmXR8ty/V6Y+X7G39GFbrsUKSecfXNgNSX BqbA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b="Z3N/gwhS"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id bs191-20020a6328c8000000b005abdf91a0c4si1963192pgb.611.2023.10.18.05.18.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 Oct 2023 05:18:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b="Z3N/gwhS"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 3D44E8108375; Wed, 18 Oct 2023 05:18:27 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231371AbjJRMRy (ORCPT + 99 others); Wed, 18 Oct 2023 08:17:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55790 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231362AbjJRMRx (ORCPT ); Wed, 18 Oct 2023 08:17:53 -0400 Received: from smtp-relay-internal-1.canonical.com (smtp-relay-internal-1.canonical.com [185.125.188.123]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3E98B98 for ; Wed, 18 Oct 2023 05:17:49 -0700 (PDT) Received: from mail-qt1-f200.google.com (mail-qt1-f200.google.com [209.85.160.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 8633A4061F for ; Wed, 18 Oct 2023 12:17:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1697631466; bh=9JEjALsOVS6EpRdOMeKAgdLdy8unJkD+oLph4vQm3Qc=; h=From:In-Reply-To:References:Mime-Version:Date:Message-ID:Subject: To:Cc:Content-Type; b=Z3N/gwhSu9jMPd7HziYBoeHmKdP1C1iUYpYc4scJzGp9MgsW3OxrKsT0HjdXKZSqj j9Qg/VHs7nZRDVv83xEqUuyM7QTXb5kMkUx0aXlCRSTc37Y4gl6z5Pitut38b8Sa3L xeV+FjA4dJsQ2ovEQ+rNB/iLkY2XdYvgyogQQ02DLmI8Mz/qZFCqWJKSJG5kKiSbU1 Qha9vNuj74EyqQudEYuQaZQ1G+WrO6lQht8OvzS4ZCVkt5UCFVfhREQJKT+qZpY5tQ FWiYnMdBBmF//dQ8PlwDLyy7LyvsK4KRruo1i7HyGTDUGvgy3KkH6dSmDPjIyf169E shACBqv1X6qKQ== Received: by mail-qt1-f200.google.com with SMTP id d75a77b69052e-4180de770f5so78672631cf.2 for ; Wed, 18 Oct 2023 05:17:46 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697631465; x=1698236265; h=cc:to:subject:message-id:date:mime-version:references:in-reply-to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=9JEjALsOVS6EpRdOMeKAgdLdy8unJkD+oLph4vQm3Qc=; b=bWLx6FhNRNHyP0XuE59+gN93iqU03oPirvMSno5nA7QLBBtm65xYJWOf3cTKb0UFU5 8h78DiovLxSoCBBfWFH87BGRHsDRuEI7B0Palm0G+GGzb255q4PO22qy6mNc8/tNot7J c5Zqi88AMpkL1W0j6bD4LHzN05n2lZOn2UCgkk+TJDHSGKc7VB1TeyfNTeW0tTYlhvYm epT0uyN1An+vOVZ2+evHbso1MG2VdBx1T6lqdj+qbg7Ok3XNMVrhugAl3lYI+mYDm9pT qppYhDTY6oBrxjrT39nQPGHKi14udCpl6XV0VxDiThjenS4J/6wpmVQLgRrYlBacYZZ7 pQ8w== X-Gm-Message-State: AOJu0Yz5stsU72rk3WdVsC7fDCfxq6RpNmzbyR2kNBzGq1mgrGA/GZx2 GfjlGG3V7IyM9q40A44VqDZEVpV8/ccTbXdbeZnFr6huIDw6V1wd70AIirrNGoKY6nvD4Nb7iqc CbrHec0tbP06UgHYfo0/9YMTj/UHO9HqYk+Ts3RXUKYUtv6WWvq7UpO/fQA== X-Received: by 2002:ac8:5881:0:b0:417:a2f9:bba6 with SMTP id t1-20020ac85881000000b00417a2f9bba6mr6082681qta.60.1697631465487; Wed, 18 Oct 2023 05:17:45 -0700 (PDT) X-Received: by 2002:ac8:5881:0:b0:417:a2f9:bba6 with SMTP id t1-20020ac85881000000b00417a2f9bba6mr6082652qta.60.1697631465119; Wed, 18 Oct 2023 05:17:45 -0700 (PDT) Received: from 348282803490 named unknown by gmailapi.google.com with HTTPREST; Wed, 18 Oct 2023 05:17:44 -0700 From: Emil Renner Berthing In-Reply-To: <20231017-module_relocations-v4-1-937f5ef316f0@rivosinc.com> References: <20231017-module_relocations-v4-0-937f5ef316f0@rivosinc.com> <20231017-module_relocations-v4-1-937f5ef316f0@rivosinc.com> Mime-Version: 1.0 Date: Wed, 18 Oct 2023 05:17:44 -0700 Message-ID: Subject: Re: [PATCH v4 1/2] riscv: Add remaining module relocations To: Charlie Jenkins , linux-riscv@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Cc: Eric Biederman , Kees Cook , Paul Walmsley , Palmer Dabbelt , Albert Ou Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Wed, 18 Oct 2023 05:18:27 -0700 (PDT) Charlie Jenkins wrote: > Add all final module relocations and add error logs explaining the ones > that are not supported. > > Signed-off-by: Charlie Jenkins > --- > arch/riscv/include/uapi/asm/elf.h | 5 +- > arch/riscv/kernel/module.c | 207 +++++++++++++++++++++++++++++++++----- > 2 files changed, 186 insertions(+), 26 deletions(-) > > diff --git a/arch/riscv/include/uapi/asm/elf.h b/arch/riscv/include/uapi/asm/elf.h > index d696d6610231..11a71b8533d5 100644 > --- a/arch/riscv/include/uapi/asm/elf.h > +++ b/arch/riscv/include/uapi/asm/elf.h > @@ -49,6 +49,7 @@ typedef union __riscv_fp_state elf_fpregset_t; > #define R_RISCV_TLS_DTPREL64 9 > #define R_RISCV_TLS_TPREL32 10 > #define R_RISCV_TLS_TPREL64 11 > +#define R_RISCV_IRELATIVE 58 > > /* Relocation types not used by the dynamic linker */ > #define R_RISCV_BRANCH 16 > @@ -81,7 +82,6 @@ typedef union __riscv_fp_state elf_fpregset_t; > #define R_RISCV_ALIGN 43 > #define R_RISCV_RVC_BRANCH 44 > #define R_RISCV_RVC_JUMP 45 > -#define R_RISCV_LUI 46 > #define R_RISCV_GPREL_I 47 > #define R_RISCV_GPREL_S 48 > #define R_RISCV_TPREL_I 49 > @@ -93,6 +93,9 @@ typedef union __riscv_fp_state elf_fpregset_t; > #define R_RISCV_SET16 55 > #define R_RISCV_SET32 56 > #define R_RISCV_32_PCREL 57 > +#define R_RISCV_PLT32 59 > +#define R_RISCV_SET_ULEB128 60 > +#define R_RISCV_SUB_ULEB128 61 > > > #endif /* _UAPI_ASM_RISCV_ELF_H */ > diff --git a/arch/riscv/kernel/module.c b/arch/riscv/kernel/module.c > index 7c651d55fcbd..e860726352ac 100644 > --- a/arch/riscv/kernel/module.c > +++ b/arch/riscv/kernel/module.c > @@ -7,6 +7,7 @@ > #include > #include > #include > +#include > #include > #include > #include > @@ -268,6 +269,12 @@ static int apply_r_riscv_align_rela(struct module *me, u32 *location, > return -EINVAL; > } > > +static int apply_r_riscv_add8_rela(struct module *me, u32 *location, Elf_Addr v) > +{ > + *(u8 *)location += (u8)v; > + return 0; > +} > + > static int apply_r_riscv_add16_rela(struct module *me, u32 *location, > Elf_Addr v) > { > @@ -289,6 +296,12 @@ static int apply_r_riscv_add64_rela(struct module *me, u32 *location, > return 0; > } > > +static int apply_r_riscv_sub8_rela(struct module *me, u32 *location, Elf_Addr v) > +{ > + *(u8 *)location -= (u8)v; > + return 0; > +} > + > static int apply_r_riscv_sub16_rela(struct module *me, u32 *location, > Elf_Addr v) > { > @@ -310,31 +323,149 @@ static int apply_r_riscv_sub64_rela(struct module *me, u32 *location, > return 0; > } > > -static int (*reloc_handlers_rela[]) (struct module *me, u32 *location, > - Elf_Addr v) = { > - [R_RISCV_32] = apply_r_riscv_32_rela, > - [R_RISCV_64] = apply_r_riscv_64_rela, > - [R_RISCV_BRANCH] = apply_r_riscv_branch_rela, > - [R_RISCV_JAL] = apply_r_riscv_jal_rela, > - [R_RISCV_RVC_BRANCH] = apply_r_riscv_rvc_branch_rela, > - [R_RISCV_RVC_JUMP] = apply_r_riscv_rvc_jump_rela, > - [R_RISCV_PCREL_HI20] = apply_r_riscv_pcrel_hi20_rela, > - [R_RISCV_PCREL_LO12_I] = apply_r_riscv_pcrel_lo12_i_rela, > - [R_RISCV_PCREL_LO12_S] = apply_r_riscv_pcrel_lo12_s_rela, > - [R_RISCV_HI20] = apply_r_riscv_hi20_rela, > - [R_RISCV_LO12_I] = apply_r_riscv_lo12_i_rela, > - [R_RISCV_LO12_S] = apply_r_riscv_lo12_s_rela, > - [R_RISCV_GOT_HI20] = apply_r_riscv_got_hi20_rela, > - [R_RISCV_CALL_PLT] = apply_r_riscv_call_plt_rela, > - [R_RISCV_CALL] = apply_r_riscv_call_rela, > - [R_RISCV_RELAX] = apply_r_riscv_relax_rela, > - [R_RISCV_ALIGN] = apply_r_riscv_align_rela, > - [R_RISCV_ADD16] = apply_r_riscv_add16_rela, > - [R_RISCV_ADD32] = apply_r_riscv_add32_rela, > - [R_RISCV_ADD64] = apply_r_riscv_add64_rela, > - [R_RISCV_SUB16] = apply_r_riscv_sub16_rela, > - [R_RISCV_SUB32] = apply_r_riscv_sub32_rela, > - [R_RISCV_SUB64] = apply_r_riscv_sub64_rela, > +static int dynamic_linking_not_supported(struct module *me, u32 *location, > + Elf_Addr v) > +{ > + pr_err("%s: Dynamic linking not supported in kernel modules PC = %p\n", > + me->name, location); > + return -EINVAL; > +} > + > +static int tls_not_supported(struct module *me, u32 *location, Elf_Addr v) > +{ > + pr_err("%s: Thread local storage not supported in kernel modules PC = %p\n", > + me->name, location); > + return -EINVAL; > +} > + > +static int apply_r_riscv_sub6_rela(struct module *me, u32 *location, Elf_Addr v) > +{ > + *(u8 *)location = (*location - ((u8)v & 0x3F)) & 0x3F; > + return 0; > +} > + > +static int apply_r_riscv_set6_rela(struct module *me, u32 *location, Elf_Addr v) > +{ > + *(u8 *)location = (*(u8 *)location & 0xc0) | ((u8)v & 0x3F); > + return 0; > +} > + > +static int apply_r_riscv_set8_rela(struct module *me, u32 *location, Elf_Addr v) > +{ > + *(u8 *)location = (u8)v; > + return 0; > +} > + > +static int apply_r_riscv_set16_rela(struct module *me, u32 *location, > + Elf_Addr v) > +{ > + *(u16 *)location = (u16)v; > + return 0; > +} > + > +static int apply_r_riscv_set32_rela(struct module *me, u32 *location, > + Elf_Addr v) > +{ > + *(u32 *)location = (u32)v; > + return 0; > +} > + > +static int apply_r_riscv_32_pcrel_rela(struct module *me, u32 *location, > + Elf_Addr v) > +{ > + *(u32 *)location = (u32)v; > + return 0; > +} > + > +static int apply_r_riscv_plt32_rela(struct module *me, u32 *location, > + Elf_Addr v) > +{ > + *(u32 *)location = (u32)v; > + return 0; > +} > + > +static int apply_r_riscv_set_uleb128(struct module *me, u32 *location, Elf_Addr v) > +{ > + /* > + * Relocation is only performed if R_RISCV_SET_ULEB128 is followed by > + * R_RISCV_SUB_ULEB128 so do computation there > + */ > + return 0; > +} > + > +static int apply_r_riscv_sub_uleb128(struct module *me, u32 *location, Elf_Addr v) > +{ > + if (v >= 128) { > + pr_err("%s: uleb128 must be in [0, 127] (not %ld) at PC = %p\n", > + me->name, (unsigned long)v, location); > + return -EINVAL; > + } > + > + *location = v; > + return 0; > +} > + > +/* > + * Relocations defined in the riscv-elf-psabi-doc. > + * This handles static linking only. > + */ > +static int (*reloc_handlers_rela[])(struct module *me, u32 *location, > + Elf_Addr v) = { > + [R_RISCV_32] = apply_r_riscv_32_rela, > + [R_RISCV_64] = apply_r_riscv_64_rela, > + [R_RISCV_RELATIVE] = dynamic_linking_not_supported, > + [R_RISCV_COPY] = dynamic_linking_not_supported, > + [R_RISCV_JUMP_SLOT] = dynamic_linking_not_supported, > + [R_RISCV_TLS_DTPMOD32] = dynamic_linking_not_supported, > + [R_RISCV_TLS_DTPMOD64] = dynamic_linking_not_supported, > + [R_RISCV_TLS_DTPREL32] = dynamic_linking_not_supported, > + [R_RISCV_TLS_DTPREL64] = dynamic_linking_not_supported, > + [R_RISCV_TLS_TPREL32] = dynamic_linking_not_supported, > + [R_RISCV_TLS_TPREL64] = dynamic_linking_not_supported, > + /* 12-15 undefined */ > + [R_RISCV_BRANCH] = apply_r_riscv_branch_rela, > + [R_RISCV_JAL] = apply_r_riscv_jal_rela, > + [R_RISCV_CALL] = apply_r_riscv_call_rela, > + [R_RISCV_CALL_PLT] = apply_r_riscv_call_plt_rela, > + [R_RISCV_GOT_HI20] = apply_r_riscv_got_hi20_rela, > + [R_RISCV_TLS_GOT_HI20] = tls_not_supported, > + [R_RISCV_TLS_GD_HI20] = tls_not_supported, > + [R_RISCV_PCREL_HI20] = apply_r_riscv_pcrel_hi20_rela, > + [R_RISCV_PCREL_LO12_I] = apply_r_riscv_pcrel_lo12_i_rela, > + [R_RISCV_PCREL_LO12_S] = apply_r_riscv_pcrel_lo12_s_rela, > + [R_RISCV_HI20] = apply_r_riscv_hi20_rela, > + [R_RISCV_LO12_I] = apply_r_riscv_lo12_i_rela, > + [R_RISCV_LO12_S] = apply_r_riscv_lo12_s_rela, > + [R_RISCV_TPREL_HI20] = tls_not_supported, > + [R_RISCV_TPREL_LO12_I] = tls_not_supported, > + [R_RISCV_TPREL_LO12_S] = tls_not_supported, > + [R_RISCV_TPREL_ADD] = tls_not_supported, > + [R_RISCV_ADD8] = apply_r_riscv_add8_rela, > + [R_RISCV_ADD16] = apply_r_riscv_add16_rela, > + [R_RISCV_ADD32] = apply_r_riscv_add32_rela, > + [R_RISCV_ADD64] = apply_r_riscv_add64_rela, > + [R_RISCV_SUB8] = apply_r_riscv_sub8_rela, > + [R_RISCV_SUB16] = apply_r_riscv_sub16_rela, > + [R_RISCV_SUB32] = apply_r_riscv_sub32_rela, > + [R_RISCV_SUB64] = apply_r_riscv_sub64_rela, > + /* 41-42 reserved for future standard use */ > + [R_RISCV_ALIGN] = apply_r_riscv_align_rela, > + [R_RISCV_RVC_BRANCH] = apply_r_riscv_rvc_branch_rela, > + [R_RISCV_RVC_JUMP] = apply_r_riscv_rvc_jump_rela, > + /* 46-50 reserved for future standard use */ > + [R_RISCV_RELAX] = apply_r_riscv_relax_rela, > + [R_RISCV_SUB6] = apply_r_riscv_sub6_rela, > + [R_RISCV_SET6] = apply_r_riscv_set6_rela, > + [R_RISCV_SET8] = apply_r_riscv_set8_rela, > + [R_RISCV_SET16] = apply_r_riscv_set16_rela, > + [R_RISCV_SET32] = apply_r_riscv_set32_rela, > + [R_RISCV_32_PCREL] = apply_r_riscv_32_pcrel_rela, > + [R_RISCV_IRELATIVE] = dynamic_linking_not_supported, > + [R_RISCV_PLT32] = apply_r_riscv_plt32_rela, > + [R_RISCV_SET_ULEB128] = apply_r_riscv_set_uleb128, > + [R_RISCV_SUB_ULEB128] = apply_r_riscv_sub_uleb128, > + /* 62-191 reserved for future standard use */ > + /* 192-255 nonstandard ABI extensions */ > }; Hi Charlie, This is not a critique of this patch, but all these callbacks take a u32 *location and because of the compressed instructions this pointer may not be aligned, so a lot of the callbacks end up doing unaligned access which may fault to an M-mode handler on some platforms. I once sent a patch to fix this: https://lore.kernel.org/linux-riscv/20220224152456.493365-2-kernel@esmil.dk/ Maybe that's something you want to look into while touching this code anyway. /Emil > > int apply_relocate_add(Elf_Shdr *sechdrs, const char *strtab, > @@ -348,6 +479,10 @@ int apply_relocate_add(Elf_Shdr *sechdrs, const char *strtab, > unsigned int i, type; > Elf_Addr v; > int res; > + bool uleb128_set_exists = false; > + u32 *uleb128_set_loc; > + unsigned long uleb128_set_sym_val; > + > > pr_debug("Applying relocate section %u to %u\n", relsec, > sechdrs[relsec].sh_info); > @@ -425,6 +560,28 @@ int apply_relocate_add(Elf_Shdr *sechdrs, const char *strtab, > me->name); > return -EINVAL; > } > + } else if (type == R_RISCV_SET_ULEB128) { > + if (uleb128_set_exists) { > + pr_err("%s: riscv psABI requires the next ULEB128 relocation to come after a R_RISCV_SET_ULEB128 is an R_RISCV_SUB_ULEB128, not another R_RISCV_SET_ULEB128.\n", > + me->name); > + return -EINVAL; > + } > + uleb128_set_exists = true; > + uleb128_set_loc = location; > + uleb128_set_sym_val = > + ((Elf_Sym *)sechdrs[symindex].sh_addr + > + ELF_RISCV_R_SYM(rel[i].r_info)) > + ->st_value + > + rel[i].r_addend; > + } else if (type == R_RISCV_SUB_ULEB128) { > + if (uleb128_set_exists && uleb128_set_loc == location) { > + /* Calculate set and subtraction */ > + v = uleb128_set_sym_val - v; > + } else { > + pr_err("%s: R_RISCV_SUB_ULEB128 must always be paired with the first R_RISCV_SET_ULEB128 that comes before it. PC = %p\n", > + me->name, location); > + return -EINVAL; > + } > } > > res = handler(me, location, v); > > -- > 2.34.1 > > > _______________________________________________ > linux-riscv mailing list > linux-riscv@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/linux-riscv