Re: [PATCH v5 04/13] powerpc: Factor out relocation code from module_64.c to elf_util_64.c.

From: Thiago Jung Bauermann
Date: Mon Aug 15 2016 - 19:28:23 EST


Am Montag, 15 August 2016, 17:46:34 schrieb Balbir Singh:
> On Thu, Aug 11, 2016 at 08:08:09PM -0300, Thiago Jung Bauermann wrote:
> > +/**
> > + * elf64_apply_relocate_add - apply 64 bit RELA relocations
> > + * @elf_info: Support information for the ELF binary being
relocated.
> > + * @strtab: String table for the associated symbol
table.
> > + * @symindex: Section header index for the associated
symbol table.
> > + * @relsec: Section header index for the relocations to
apply.
> > + * @obj_name: The name of the ELF binary, for information
messages.
> > + */
> > +int elf64_apply_relocate_add(const struct elf_info *elf_info,
> > + const char *strtab, unsigned int symindex,
> > + unsigned int relsec, const char *obj_name)
> > +{
> > + unsigned int i;
> > + Elf64_Shdr *sechdrs = elf_info->sechdrs;
> > + Elf64_Rela *rela = (void *)sechdrs[relsec].sh_addr;
> > + Elf64_Sym *sym;
> > + unsigned long *location;
> > + unsigned long value;
> > +
>
> For the relocatable kernel we expect only
>
> R_PPC64_RELATIVE
> R_PPC64_NONE
> R_PPC64_ADDR64
>
> In the future we can use this to check/assert the usage of this
> for the core kernel (vmlinux) when loaded.
>
> Did we check elf64_apply_relocate_add with zImage and vmlinux?

kexec_file_load doesn't call call elf64_apply_relocate_add on the kernel
image, it only uses it to relocate the purgatory. So whether it is loading a
zImage or a vmlinux file, the function will work in the same way since the
purgatory binary is the same regardless of the kernel image format.

For the same reason, as it currently stands kexec_file_load can't check the
relocation types used in the kernel image. But it is possible to add such a
check/assertion in kexec_elf_64.c:build_elf_exec_info if we want.

I tested kexec_file_load on both relocatable and non-relocatable vmlinux and
it works correctly.

I hadn't tested with zImage yet. I just did, and I had two problems:

1. For some reason, it has an INTERP segment. This patch series doesn't
support loading program interpreters for ELF binaries, so
kexec_elf_64.c:build_elf_exec_info refuses to load them.

2. If I disable the check for the INTERP segment, the zImage file loads
correctly, but then I get an exception during reboot when loading the kexec
image, right before jumping into the purgatory. I suspect this is because
the LOAD segment has a virtual address of 0, and the first kernel is not
coping well with that. But I still have to debug it further.

Is there a reason for the zImage ELF header to request an interpreter and to
have a virtual address of 0?

--
[]'s
Thiago Jung Bauermann
IBM Linux Technology Center