fca8e23c31
This patch makes the elf64bpf emulation to use it's own linker script, based on elf.sc. At the moment, the only change is that the BPF executable doesn't define an entry symbol (BPF programs feature several entry points scattered in several sections.) This is a step towards the goal of generating proper ELF executables that would be loaded by the kernel's libbpf. We are not there yet: BPF "programs" should still be linked with -r. This change removes a warning while linking executables, decreases the number of unsupported tests in the target from 47 to 29, and increases the number of expected passes from 104 to 145. Regtested in x86_64 for all targets. No regressions. ld/ChangeLog: 2019-08-07 Jose E. Marchesi <jose.marchesi@oracle.com> * scripttempl/elf64bpf.sc: Adapted from elf.sc. * emulparams/elf64bpf.sh (SCRIPT_NAME): Use elf64bpf. (EMBEDDED): Define. * testsuite/ld-bpf/call-1.d: Do not expect a warning regarding an undefined entry symbol. * testsuite/ld-bpf/jump-1.d: Likewise. * testsuite/ld-undefined/undefined.exp: Do not pass '-e entry' to ld in BPF targets, and do not expect line number information. * testsuite/ld-srec/srec.exp (run_srec_test): xfail s-record tests in BPF targets.
12 lines
261 B
Bash
12 lines
261 B
Bash
TEMPLATE_NAME=elf32
|
|
SCRIPT_NAME=elf64bpf
|
|
BIG_OUTPUT_FORMAT="elf64-bpfbe"
|
|
LITTLE_OUTPUT_FORMAT="elf64-bpfle"
|
|
OUTPUT_FORMAT="$LITTLE_OUTPUT_FORMAT"
|
|
ARCH=bpf
|
|
MACHINE=
|
|
TARGET_PAGE_SIZE=0x1000
|
|
# XXX this is arbitrary, for now
|
|
TEXT_START_ADDR=0x00400000
|
|
EMBEDDED=yes
|