2012-01-16 23:50:58 +00:00
|
|
|
//===-- RuntimeDyldELF.cpp - Run-time dynamic linker for MC-JIT -*- C++ -*-===//
|
2012-01-16 08:56:09 +00:00
|
|
|
//
|
|
|
|
// The LLVM Compiler Infrastructure
|
|
|
|
//
|
|
|
|
// This file is distributed under the University of Illinois Open Source
|
|
|
|
// License. See LICENSE.TXT for details.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// Implementation of ELF support for the MC-JIT runtime dynamic linker.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
|
2012-10-02 21:18:39 +00:00
|
|
|
#include "RuntimeDyldELF.h"
|
|
|
|
#include "JITRegistrar.h"
|
|
|
|
#include "ObjectImageCommon.h"
|
2012-12-03 16:50:05 +00:00
|
|
|
#include "llvm/ADT/IntervalMap.h"
|
2012-01-16 08:56:09 +00:00
|
|
|
#include "llvm/ADT/STLExtras.h"
|
2012-12-03 16:50:05 +00:00
|
|
|
#include "llvm/ADT/StringRef.h"
|
2012-01-16 08:56:09 +00:00
|
|
|
#include "llvm/ADT/Triple.h"
|
2012-12-03 16:50:05 +00:00
|
|
|
#include "llvm/ExecutionEngine/ObjectBuffer.h"
|
|
|
|
#include "llvm/ExecutionEngine/ObjectImage.h"
|
2013-08-08 22:27:13 +00:00
|
|
|
#include "llvm/Object/ELFObjectFile.h"
|
2012-12-03 16:50:05 +00:00
|
|
|
#include "llvm/Object/ObjectFile.h"
|
|
|
|
#include "llvm/Support/ELF.h"
|
2014-08-27 23:06:08 +00:00
|
|
|
#include "llvm/Support/Endian.h"
|
2014-01-08 04:09:09 +00:00
|
|
|
#include "llvm/Support/MemoryBuffer.h"
|
|
|
|
|
2012-01-16 08:56:09 +00:00
|
|
|
using namespace llvm;
|
|
|
|
using namespace llvm::object;
|
|
|
|
|
2014-04-22 03:04:17 +00:00
|
|
|
#define DEBUG_TYPE "dyld"
|
|
|
|
|
2012-04-16 22:12:58 +00:00
|
|
|
namespace {
|
|
|
|
|
2014-06-13 02:24:39 +00:00
|
|
|
static inline std::error_code check(std::error_code Err) {
|
2012-10-25 13:13:48 +00:00
|
|
|
if (Err) {
|
|
|
|
report_fatal_error(Err.message());
|
|
|
|
}
|
|
|
|
return Err;
|
|
|
|
}
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
template <class ELFT> class DyldELFObject : public ELFObjectFile<ELFT> {
|
2013-04-17 21:20:55 +00:00
|
|
|
LLVM_ELF_IMPORT_TYPES_ELFT(ELFT)
|
2012-04-16 22:12:58 +00:00
|
|
|
|
2013-01-15 07:44:25 +00:00
|
|
|
typedef Elf_Shdr_Impl<ELFT> Elf_Shdr;
|
|
|
|
typedef Elf_Sym_Impl<ELFT> Elf_Sym;
|
2014-03-21 20:28:42 +00:00
|
|
|
typedef Elf_Rel_Impl<ELFT, false> Elf_Rel;
|
|
|
|
typedef Elf_Rel_Impl<ELFT, true> Elf_Rela;
|
2012-04-16 22:12:58 +00:00
|
|
|
|
2013-01-15 07:44:25 +00:00
|
|
|
typedef Elf_Ehdr_Impl<ELFT> Elf_Ehdr;
|
2012-04-16 22:12:58 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
typedef typename ELFDataTypeTypedefHelper<ELFT>::value_type addr_type;
|
2012-04-16 22:12:58 +00:00
|
|
|
|
2014-04-29 21:52:46 +00:00
|
|
|
std::unique_ptr<ObjectFile> UnderlyingFile;
|
|
|
|
|
2012-04-16 22:12:58 +00:00
|
|
|
public:
|
2014-04-29 21:52:46 +00:00
|
|
|
DyldELFObject(std::unique_ptr<ObjectFile> UnderlyingFile,
|
2014-08-19 18:44:46 +00:00
|
|
|
MemoryBufferRef Wrapper, std::error_code &ec);
|
2014-04-29 21:52:46 +00:00
|
|
|
|
2014-08-19 18:44:46 +00:00
|
|
|
DyldELFObject(MemoryBufferRef Wrapper, std::error_code &ec);
|
2012-04-16 22:12:58 +00:00
|
|
|
|
|
|
|
void updateSectionAddress(const SectionRef &Sec, uint64_t Addr);
|
|
|
|
void updateSymbolAddress(const SymbolRef &Sym, uint64_t Addr);
|
|
|
|
|
2012-07-27 17:52:42 +00:00
|
|
|
// Methods for type inquiry through isa, cast and dyn_cast
|
2012-04-16 22:12:58 +00:00
|
|
|
static inline bool classof(const Binary *v) {
|
2014-03-21 20:28:42 +00:00
|
|
|
return (isa<ELFObjectFile<ELFT>>(v) &&
|
|
|
|
classof(cast<ELFObjectFile<ELFT>>(v)));
|
2012-04-16 22:12:58 +00:00
|
|
|
}
|
2014-03-21 20:28:42 +00:00
|
|
|
static inline bool classof(const ELFObjectFile<ELFT> *v) {
|
2012-04-16 22:12:58 +00:00
|
|
|
return v->isDyldType();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
template <class ELFT> class ELFObjectImage : public ObjectImageCommon {
|
|
|
|
bool Registered;
|
2012-04-16 22:12:58 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
public:
|
2014-09-03 19:48:09 +00:00
|
|
|
ELFObjectImage(std::unique_ptr<ObjectBuffer> Input,
|
|
|
|
std::unique_ptr<DyldELFObject<ELFT>> Obj)
|
|
|
|
: ObjectImageCommon(std::move(Input), std::move(Obj)), Registered(false) {
|
|
|
|
}
|
2012-04-16 22:12:58 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
virtual ~ELFObjectImage() {
|
|
|
|
if (Registered)
|
|
|
|
deregisterWithDebugger();
|
|
|
|
}
|
2012-04-16 22:12:58 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
// Subclasses can override these methods to update the image with loaded
|
|
|
|
// addresses for sections and common symbols
|
|
|
|
void updateSectionAddress(const SectionRef &Sec, uint64_t Addr) override {
|
2014-04-29 21:52:46 +00:00
|
|
|
static_cast<DyldELFObject<ELFT>*>(getObjectFile())
|
|
|
|
->updateSectionAddress(Sec, Addr);
|
2014-03-21 20:28:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void updateSymbolAddress(const SymbolRef &Sym, uint64_t Addr) override {
|
2014-04-29 21:52:46 +00:00
|
|
|
static_cast<DyldELFObject<ELFT>*>(getObjectFile())
|
|
|
|
->updateSymbolAddress(Sym, Addr);
|
2014-03-21 20:28:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void registerWithDebugger() override {
|
|
|
|
JITRegistrar::getGDBRegistrar().registerObject(*Buffer);
|
|
|
|
Registered = true;
|
|
|
|
}
|
|
|
|
void deregisterWithDebugger() override {
|
|
|
|
JITRegistrar::getGDBRegistrar().deregisterObject(*Buffer);
|
|
|
|
}
|
2012-04-16 22:12:58 +00:00
|
|
|
};
|
|
|
|
|
2012-10-02 21:18:39 +00:00
|
|
|
// The MemoryBuffer passed into this constructor is just a wrapper around the
|
|
|
|
// actual memory. Ultimately, the Binary parent class will take ownership of
|
|
|
|
// this MemoryBuffer object but not the underlying memory.
|
2014-03-21 20:28:42 +00:00
|
|
|
template <class ELFT>
|
2014-08-19 18:44:46 +00:00
|
|
|
DyldELFObject<ELFT>::DyldELFObject(MemoryBufferRef Wrapper, std::error_code &EC)
|
|
|
|
: ELFObjectFile<ELFT>(Wrapper, EC) {
|
2012-04-16 22:12:58 +00:00
|
|
|
this->isDyldELFObject = true;
|
|
|
|
}
|
|
|
|
|
2014-04-29 21:52:46 +00:00
|
|
|
template <class ELFT>
|
|
|
|
DyldELFObject<ELFT>::DyldELFObject(std::unique_ptr<ObjectFile> UnderlyingFile,
|
2014-08-19 18:44:46 +00:00
|
|
|
MemoryBufferRef Wrapper, std::error_code &EC)
|
|
|
|
: ELFObjectFile<ELFT>(Wrapper, EC),
|
2014-04-29 21:52:46 +00:00
|
|
|
UnderlyingFile(std::move(UnderlyingFile)) {
|
|
|
|
this->isDyldELFObject = true;
|
|
|
|
}
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
template <class ELFT>
|
2013-01-15 07:44:25 +00:00
|
|
|
void DyldELFObject<ELFT>::updateSectionAddress(const SectionRef &Sec,
|
|
|
|
uint64_t Addr) {
|
2012-04-16 22:12:58 +00:00
|
|
|
DataRefImpl ShdrRef = Sec.getRawDataRefImpl();
|
2014-03-21 20:28:42 +00:00
|
|
|
Elf_Shdr *shdr =
|
|
|
|
const_cast<Elf_Shdr *>(reinterpret_cast<const Elf_Shdr *>(ShdrRef.p));
|
2012-04-16 22:12:58 +00:00
|
|
|
|
|
|
|
// This assumes the address passed in matches the target address bitness
|
|
|
|
// The template-based type cast handles everything else.
|
|
|
|
shdr->sh_addr = static_cast<addr_type>(Addr);
|
|
|
|
}
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
template <class ELFT>
|
2013-01-15 07:44:25 +00:00
|
|
|
void DyldELFObject<ELFT>::updateSymbolAddress(const SymbolRef &SymRef,
|
|
|
|
uint64_t Addr) {
|
2012-04-16 22:12:58 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
Elf_Sym *sym = const_cast<Elf_Sym *>(
|
|
|
|
ELFObjectFile<ELFT>::getSymbol(SymRef.getRawDataRefImpl()));
|
2012-04-16 22:12:58 +00:00
|
|
|
|
|
|
|
// This assumes the address passed in matches the target address bitness
|
|
|
|
// The template-based type cast handles everything else.
|
|
|
|
sym->st_value = static_cast<addr_type>(Addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
2012-01-16 08:56:09 +00:00
|
|
|
namespace llvm {
|
|
|
|
|
2013-10-11 21:25:48 +00:00
|
|
|
void RuntimeDyldELF::registerEHFrames() {
|
|
|
|
if (!MemMgr)
|
|
|
|
return;
|
|
|
|
for (int i = 0, e = UnregisteredEHFrameSections.size(); i != e; ++i) {
|
|
|
|
SID EHFrameSID = UnregisteredEHFrameSections[i];
|
|
|
|
uint8_t *EHFrameAddr = Sections[EHFrameSID].Address;
|
|
|
|
uint64_t EHFrameLoadAddr = Sections[EHFrameSID].LoadAddress;
|
|
|
|
size_t EHFrameSize = Sections[EHFrameSID].Size;
|
|
|
|
MemMgr->registerEHFrames(EHFrameAddr, EHFrameLoadAddr, EHFrameSize);
|
2013-10-16 00:14:21 +00:00
|
|
|
RegisteredEHFrameSections.push_back(EHFrameSID);
|
2013-05-05 20:43:10 +00:00
|
|
|
}
|
2013-10-11 21:25:48 +00:00
|
|
|
UnregisteredEHFrameSections.clear();
|
2013-05-05 20:43:10 +00:00
|
|
|
}
|
|
|
|
|
2013-10-16 00:14:21 +00:00
|
|
|
void RuntimeDyldELF::deregisterEHFrames() {
|
|
|
|
if (!MemMgr)
|
|
|
|
return;
|
|
|
|
for (int i = 0, e = RegisteredEHFrameSections.size(); i != e; ++i) {
|
|
|
|
SID EHFrameSID = RegisteredEHFrameSections[i];
|
|
|
|
uint8_t *EHFrameAddr = Sections[EHFrameSID].Address;
|
|
|
|
uint64_t EHFrameLoadAddr = Sections[EHFrameSID].LoadAddress;
|
|
|
|
size_t EHFrameSize = Sections[EHFrameSID].Size;
|
|
|
|
MemMgr->deregisterEHFrames(EHFrameAddr, EHFrameLoadAddr, EHFrameSize);
|
|
|
|
}
|
|
|
|
RegisteredEHFrameSections.clear();
|
|
|
|
}
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
ObjectImage *
|
2014-04-29 21:52:46 +00:00
|
|
|
RuntimeDyldELF::createObjectImageFromFile(std::unique_ptr<object::ObjectFile> ObjFile) {
|
2014-01-08 04:09:09 +00:00
|
|
|
if (!ObjFile)
|
2014-04-24 06:44:33 +00:00
|
|
|
return nullptr;
|
2014-01-08 04:09:09 +00:00
|
|
|
|
2014-06-13 02:24:39 +00:00
|
|
|
std::error_code ec;
|
2014-08-19 18:44:46 +00:00
|
|
|
MemoryBufferRef Buffer = ObjFile->getMemoryBufferRef();
|
2014-01-08 04:09:09 +00:00
|
|
|
|
|
|
|
if (ObjFile->getBytesInAddress() == 4 && ObjFile->isLittleEndian()) {
|
2014-04-29 23:54:52 +00:00
|
|
|
auto Obj =
|
|
|
|
llvm::make_unique<DyldELFObject<ELFType<support::little, 2, false>>>(
|
2014-08-19 18:44:46 +00:00
|
|
|
std::move(ObjFile), Buffer, ec);
|
2014-04-29 21:52:46 +00:00
|
|
|
return new ELFObjectImage<ELFType<support::little, 2, false>>(
|
|
|
|
nullptr, std::move(Obj));
|
2014-03-21 20:28:42 +00:00
|
|
|
} else if (ObjFile->getBytesInAddress() == 4 && !ObjFile->isLittleEndian()) {
|
2014-04-29 23:54:52 +00:00
|
|
|
auto Obj =
|
|
|
|
llvm::make_unique<DyldELFObject<ELFType<support::big, 2, false>>>(
|
2014-08-19 18:44:46 +00:00
|
|
|
std::move(ObjFile), Buffer, ec);
|
2014-04-29 21:52:46 +00:00
|
|
|
return new ELFObjectImage<ELFType<support::big, 2, false>>(nullptr, std::move(Obj));
|
2014-03-21 20:28:42 +00:00
|
|
|
} else if (ObjFile->getBytesInAddress() == 8 && !ObjFile->isLittleEndian()) {
|
2014-04-29 23:54:52 +00:00
|
|
|
auto Obj = llvm::make_unique<DyldELFObject<ELFType<support::big, 2, true>>>(
|
2014-08-19 18:44:46 +00:00
|
|
|
std::move(ObjFile), Buffer, ec);
|
2014-04-29 21:52:46 +00:00
|
|
|
return new ELFObjectImage<ELFType<support::big, 2, true>>(nullptr,
|
|
|
|
std::move(Obj));
|
2014-03-21 20:28:42 +00:00
|
|
|
} else if (ObjFile->getBytesInAddress() == 8 && ObjFile->isLittleEndian()) {
|
2014-04-29 23:54:52 +00:00
|
|
|
auto Obj =
|
|
|
|
llvm::make_unique<DyldELFObject<ELFType<support::little, 2, true>>>(
|
2014-08-19 18:44:46 +00:00
|
|
|
std::move(ObjFile), Buffer, ec);
|
2014-04-29 21:52:46 +00:00
|
|
|
return new ELFObjectImage<ELFType<support::little, 2, true>>(
|
|
|
|
nullptr, std::move(Obj));
|
2014-03-21 20:28:42 +00:00
|
|
|
} else
|
2014-01-08 04:09:09 +00:00
|
|
|
llvm_unreachable("Unexpected ELF format");
|
|
|
|
}
|
|
|
|
|
2014-09-03 19:48:09 +00:00
|
|
|
std::unique_ptr<ObjectImage>
|
|
|
|
RuntimeDyldELF::createObjectImage(std::unique_ptr<ObjectBuffer> Buffer) {
|
2012-10-02 21:18:39 +00:00
|
|
|
if (Buffer->getBufferSize() < ELF::EI_NIDENT)
|
|
|
|
llvm_unreachable("Unexpected ELF object size");
|
2014-03-21 20:28:42 +00:00
|
|
|
std::pair<unsigned char, unsigned char> Ident =
|
|
|
|
std::make_pair((uint8_t)Buffer->getBufferStart()[ELF::EI_CLASS],
|
|
|
|
(uint8_t)Buffer->getBufferStart()[ELF::EI_DATA]);
|
2014-06-13 02:24:39 +00:00
|
|
|
std::error_code ec;
|
2012-04-16 22:12:58 +00:00
|
|
|
|
2014-08-19 18:44:46 +00:00
|
|
|
MemoryBufferRef Buf = Buffer->getMemBuffer();
|
2014-06-24 13:56:32 +00:00
|
|
|
|
2012-04-16 22:12:58 +00:00
|
|
|
if (Ident.first == ELF::ELFCLASS32 && Ident.second == ELF::ELFDATA2LSB) {
|
2014-04-29 23:54:52 +00:00
|
|
|
auto Obj =
|
|
|
|
llvm::make_unique<DyldELFObject<ELFType<support::little, 4, false>>>(
|
2014-08-19 18:44:46 +00:00
|
|
|
Buf, ec);
|
2014-09-03 19:48:09 +00:00
|
|
|
return llvm::make_unique<
|
|
|
|
ELFObjectImage<ELFType<support::little, 4, false>>>(std::move(Buffer),
|
|
|
|
std::move(Obj));
|
|
|
|
}
|
|
|
|
if (Ident.first == ELF::ELFCLASS32 && Ident.second == ELF::ELFDATA2MSB) {
|
2014-04-29 21:52:46 +00:00
|
|
|
auto Obj =
|
2014-08-19 18:44:46 +00:00
|
|
|
llvm::make_unique<DyldELFObject<ELFType<support::big, 4, false>>>(Buf,
|
|
|
|
ec);
|
2014-09-03 19:48:09 +00:00
|
|
|
return llvm::make_unique<ELFObjectImage<ELFType<support::big, 4, false>>>(
|
|
|
|
std::move(Buffer), std::move(Obj));
|
|
|
|
}
|
|
|
|
if (Ident.first == ELF::ELFCLASS64 && Ident.second == ELF::ELFDATA2MSB) {
|
2014-04-29 23:54:52 +00:00
|
|
|
auto Obj = llvm::make_unique<DyldELFObject<ELFType<support::big, 8, true>>>(
|
2014-08-19 18:44:46 +00:00
|
|
|
Buf, ec);
|
2014-09-03 19:48:09 +00:00
|
|
|
return llvm::make_unique<ELFObjectImage<ELFType<support::big, 8, true>>>(
|
|
|
|
std::move(Buffer), std::move(Obj));
|
|
|
|
}
|
|
|
|
assert(Ident.first == ELF::ELFCLASS64 && Ident.second == ELF::ELFDATA2LSB &&
|
|
|
|
"Unexpected ELF format");
|
|
|
|
auto Obj =
|
|
|
|
llvm::make_unique<DyldELFObject<ELFType<support::little, 8, true>>>(Buf,
|
|
|
|
ec);
|
|
|
|
return llvm::make_unique<ELFObjectImage<ELFType<support::little, 8, true>>>(
|
|
|
|
std::move(Buffer), std::move(Obj));
|
2012-04-16 22:12:58 +00:00
|
|
|
}
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
RuntimeDyldELF::~RuntimeDyldELF() {}
|
2012-01-16 08:56:09 +00:00
|
|
|
|
2012-11-02 19:45:23 +00:00
|
|
|
void RuntimeDyldELF::resolveX86_64Relocation(const SectionEntry &Section,
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t Offset, uint64_t Value,
|
|
|
|
uint32_t Type, int64_t Addend,
|
2013-08-19 23:27:43 +00:00
|
|
|
uint64_t SymOffset) {
|
2012-03-30 16:45:19 +00:00
|
|
|
switch (Type) {
|
|
|
|
default:
|
|
|
|
llvm_unreachable("Relocation type not implemented yet!");
|
2014-03-21 20:28:42 +00:00
|
|
|
break;
|
2012-01-16 08:56:09 +00:00
|
|
|
case ELF::R_X86_64_64: {
|
2014-08-27 23:06:08 +00:00
|
|
|
support::ulittle64_t::ref(Section.Address + Offset) = Value + Addend;
|
2014-03-21 20:28:42 +00:00
|
|
|
DEBUG(dbgs() << "Writing " << format("%p", (Value + Addend)) << " at "
|
2014-08-27 23:06:08 +00:00
|
|
|
<< format("%p\n", Section.Address + Offset));
|
2012-01-16 08:56:09 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_X86_64_32:
|
|
|
|
case ELF::R_X86_64_32S: {
|
2012-03-30 16:45:19 +00:00
|
|
|
Value += Addend;
|
2012-07-27 20:30:12 +00:00
|
|
|
assert((Type == ELF::R_X86_64_32 && (Value <= UINT32_MAX)) ||
|
2013-01-04 20:36:28 +00:00
|
|
|
(Type == ELF::R_X86_64_32S &&
|
2014-03-21 20:28:42 +00:00
|
|
|
((int64_t)Value <= INT32_MAX && (int64_t)Value >= INT32_MIN)));
|
2012-01-16 08:56:09 +00:00
|
|
|
uint32_t TruncatedAddr = (Value & 0xFFFFFFFF);
|
2014-08-27 23:06:08 +00:00
|
|
|
support::ulittle32_t::ref(Section.Address + Offset) = TruncatedAddr;
|
2014-03-21 20:28:42 +00:00
|
|
|
DEBUG(dbgs() << "Writing " << format("%p", TruncatedAddr) << " at "
|
2014-08-27 23:06:08 +00:00
|
|
|
<< format("%p\n", Section.Address + Offset));
|
2012-01-16 08:56:09 +00:00
|
|
|
break;
|
|
|
|
}
|
2013-08-19 23:27:43 +00:00
|
|
|
case ELF::R_X86_64_GOTPCREL: {
|
|
|
|
// findGOTEntry returns the 'G + GOT' part of the relocation calculation
|
|
|
|
// based on the load/target address of the GOT (not the current/local addr).
|
|
|
|
uint64_t GOTAddr = findGOTEntry(Value, SymOffset);
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t FinalAddress = Section.LoadAddress + Offset;
|
2013-08-19 23:27:43 +00:00
|
|
|
// The processRelocationRef method combines the symbol offset and the addend
|
|
|
|
// and in most cases that's what we want. For this relocation type, we need
|
|
|
|
// the raw addend, so we subtract the symbol offset to get it.
|
|
|
|
int64_t RealOffset = GOTAddr + Addend - SymOffset - FinalAddress;
|
|
|
|
assert(RealOffset <= INT32_MAX && RealOffset >= INT32_MIN);
|
|
|
|
int32_t TruncOffset = (RealOffset & 0xFFFFFFFF);
|
2014-08-27 23:06:08 +00:00
|
|
|
support::ulittle32_t::ref(Section.Address + Offset) = TruncOffset;
|
2013-08-19 23:27:43 +00:00
|
|
|
break;
|
|
|
|
}
|
2012-01-16 08:56:09 +00:00
|
|
|
case ELF::R_X86_64_PC32: {
|
2012-11-02 19:45:23 +00:00
|
|
|
// Get the placeholder value from the generated object since
|
|
|
|
// a previous relocation attempt may have overwritten the loaded version
|
2014-08-27 23:06:08 +00:00
|
|
|
support::ulittle32_t::ref Placeholder(
|
|
|
|
(void *)(Section.ObjAddress + Offset));
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t FinalAddress = Section.LoadAddress + Offset;
|
2014-08-27 23:06:08 +00:00
|
|
|
int64_t RealOffset = Placeholder + Value + Addend - FinalAddress;
|
2012-07-27 20:30:12 +00:00
|
|
|
assert(RealOffset <= INT32_MAX && RealOffset >= INT32_MIN);
|
2012-03-30 16:45:19 +00:00
|
|
|
int32_t TruncOffset = (RealOffset & 0xFFFFFFFF);
|
2014-08-27 23:06:08 +00:00
|
|
|
support::ulittle32_t::ref(Section.Address + Offset) = TruncOffset;
|
2012-01-16 08:56:09 +00:00
|
|
|
break;
|
|
|
|
}
|
2013-08-19 23:27:43 +00:00
|
|
|
case ELF::R_X86_64_PC64: {
|
|
|
|
// Get the placeholder value from the generated object since
|
|
|
|
// a previous relocation attempt may have overwritten the loaded version
|
2014-08-27 23:06:08 +00:00
|
|
|
support::ulittle64_t::ref Placeholder(
|
|
|
|
(void *)(Section.ObjAddress + Offset));
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t FinalAddress = Section.LoadAddress + Offset;
|
2014-08-27 23:06:08 +00:00
|
|
|
support::ulittle64_t::ref(Section.Address + Offset) =
|
|
|
|
Placeholder + Value + Addend - FinalAddress;
|
2013-08-19 23:27:43 +00:00
|
|
|
break;
|
|
|
|
}
|
2012-01-16 08:56:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-02 19:45:23 +00:00
|
|
|
void RuntimeDyldELF::resolveX86Relocation(const SectionEntry &Section,
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t Offset, uint32_t Value,
|
|
|
|
uint32_t Type, int32_t Addend) {
|
2012-03-30 16:45:19 +00:00
|
|
|
switch (Type) {
|
2012-01-16 08:56:09 +00:00
|
|
|
case ELF::R_386_32: {
|
2012-11-02 19:45:23 +00:00
|
|
|
// Get the placeholder value from the generated object since
|
|
|
|
// a previous relocation attempt may have overwritten the loaded version
|
2014-08-27 23:06:08 +00:00
|
|
|
support::ulittle32_t::ref Placeholder(
|
|
|
|
(void *)(Section.ObjAddress + Offset));
|
|
|
|
support::ulittle32_t::ref(Section.Address + Offset) =
|
|
|
|
Placeholder + Value + Addend;
|
2012-01-16 08:56:09 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_386_PC32: {
|
2012-11-02 19:45:23 +00:00
|
|
|
// Get the placeholder value from the generated object since
|
|
|
|
// a previous relocation attempt may have overwritten the loaded version
|
2014-08-27 23:06:08 +00:00
|
|
|
support::ulittle32_t::ref Placeholder(
|
|
|
|
(void *)(Section.ObjAddress + Offset));
|
2014-03-21 20:28:42 +00:00
|
|
|
uint32_t FinalAddress = ((Section.LoadAddress + Offset) & 0xFFFFFFFF);
|
2014-08-27 23:06:08 +00:00
|
|
|
uint32_t RealOffset = Placeholder + Value + Addend - FinalAddress;
|
|
|
|
support::ulittle32_t::ref(Section.Address + Offset) = RealOffset;
|
2012-01-16 08:56:09 +00:00
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
}
|
|
|
|
default:
|
|
|
|
// There are other relocation types, but it appears these are the
|
|
|
|
// only ones currently used by the LLVM ELF object writer
|
|
|
|
llvm_unreachable("Relocation type not implemented yet!");
|
|
|
|
break;
|
2012-01-16 08:56:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-04 20:13:59 +00:00
|
|
|
void RuntimeDyldELF::resolveAArch64Relocation(const SectionEntry &Section,
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t Offset, uint64_t Value,
|
|
|
|
uint32_t Type, int64_t Addend) {
|
|
|
|
uint32_t *TargetPtr = reinterpret_cast<uint32_t *>(Section.Address + Offset);
|
2013-05-04 20:13:59 +00:00
|
|
|
uint64_t FinalAddress = Section.LoadAddress + Offset;
|
|
|
|
|
|
|
|
DEBUG(dbgs() << "resolveAArch64Relocation, LocalAddress: 0x"
|
|
|
|
<< format("%llx", Section.Address + Offset)
|
2014-03-21 20:28:42 +00:00
|
|
|
<< " FinalAddress: 0x" << format("%llx", FinalAddress)
|
|
|
|
<< " Value: 0x" << format("%llx", Value) << " Type: 0x"
|
|
|
|
<< format("%x", Type) << " Addend: 0x" << format("%llx", Addend)
|
2013-05-04 20:13:59 +00:00
|
|
|
<< "\n");
|
|
|
|
|
|
|
|
switch (Type) {
|
|
|
|
default:
|
|
|
|
llvm_unreachable("Relocation type not implemented yet!");
|
|
|
|
break;
|
2013-05-04 20:14:14 +00:00
|
|
|
case ELF::R_AARCH64_ABS64: {
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t *TargetPtr =
|
|
|
|
reinterpret_cast<uint64_t *>(Section.Address + Offset);
|
2013-05-04 20:14:14 +00:00
|
|
|
*TargetPtr = Value + Addend;
|
|
|
|
break;
|
|
|
|
}
|
2013-05-19 15:39:03 +00:00
|
|
|
case ELF::R_AARCH64_PREL32: {
|
2013-05-04 20:13:59 +00:00
|
|
|
uint64_t Result = Value + Addend - FinalAddress;
|
2013-08-08 22:27:13 +00:00
|
|
|
assert(static_cast<int64_t>(Result) >= INT32_MIN &&
|
2013-05-04 20:13:59 +00:00
|
|
|
static_cast<int64_t>(Result) <= UINT32_MAX);
|
|
|
|
*TargetPtr = static_cast<uint32_t>(Result & 0xffffffffU);
|
|
|
|
break;
|
|
|
|
}
|
2013-05-04 20:14:09 +00:00
|
|
|
case ELF::R_AARCH64_CALL26: // fallthrough
|
|
|
|
case ELF::R_AARCH64_JUMP26: {
|
|
|
|
// Operation: S+A-P. Set Call or B immediate value to bits fff_fffc of the
|
|
|
|
// calculation.
|
|
|
|
uint64_t BranchImm = Value + Addend - FinalAddress;
|
|
|
|
|
|
|
|
// "Check that -2^27 <= result < 2^27".
|
2013-08-08 22:27:13 +00:00
|
|
|
assert(-(1LL << 27) <= static_cast<int64_t>(BranchImm) &&
|
2013-05-04 20:14:09 +00:00
|
|
|
static_cast<int64_t>(BranchImm) < (1LL << 27));
|
2013-05-19 15:39:03 +00:00
|
|
|
|
|
|
|
// AArch64 code is emitted with .rela relocations. The data already in any
|
|
|
|
// bits affected by the relocation on entry is garbage.
|
|
|
|
*TargetPtr &= 0xfc000000U;
|
2013-05-04 20:14:09 +00:00
|
|
|
// Immediate goes in bits 25:0 of B and BL.
|
|
|
|
*TargetPtr |= static_cast<uint32_t>(BranchImm & 0xffffffcU) >> 2;
|
|
|
|
break;
|
|
|
|
}
|
2013-05-04 20:14:04 +00:00
|
|
|
case ELF::R_AARCH64_MOVW_UABS_G3: {
|
|
|
|
uint64_t Result = Value + Addend;
|
2013-05-19 15:39:03 +00:00
|
|
|
|
|
|
|
// AArch64 code is emitted with .rela relocations. The data already in any
|
|
|
|
// bits affected by the relocation on entry is garbage.
|
2013-07-25 12:42:52 +00:00
|
|
|
*TargetPtr &= 0xffe0001fU;
|
2013-05-04 20:14:04 +00:00
|
|
|
// Immediate goes in bits 20:5 of MOVZ/MOVK instruction
|
|
|
|
*TargetPtr |= Result >> (48 - 5);
|
2013-07-01 19:23:10 +00:00
|
|
|
// Shift must be "lsl #48", in bits 22:21
|
|
|
|
assert((*TargetPtr >> 21 & 0x3) == 3 && "invalid shift for relocation");
|
2013-05-04 20:14:04 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_AARCH64_MOVW_UABS_G2_NC: {
|
|
|
|
uint64_t Result = Value + Addend;
|
2013-05-19 15:39:03 +00:00
|
|
|
|
|
|
|
// AArch64 code is emitted with .rela relocations. The data already in any
|
|
|
|
// bits affected by the relocation on entry is garbage.
|
2013-07-25 12:42:52 +00:00
|
|
|
*TargetPtr &= 0xffe0001fU;
|
2013-05-04 20:14:04 +00:00
|
|
|
// Immediate goes in bits 20:5 of MOVZ/MOVK instruction
|
|
|
|
*TargetPtr |= ((Result & 0xffff00000000ULL) >> (32 - 5));
|
2013-07-01 19:23:10 +00:00
|
|
|
// Shift must be "lsl #32", in bits 22:21
|
|
|
|
assert((*TargetPtr >> 21 & 0x3) == 2 && "invalid shift for relocation");
|
2013-05-04 20:14:04 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_AARCH64_MOVW_UABS_G1_NC: {
|
|
|
|
uint64_t Result = Value + Addend;
|
2013-05-19 15:39:03 +00:00
|
|
|
|
|
|
|
// AArch64 code is emitted with .rela relocations. The data already in any
|
|
|
|
// bits affected by the relocation on entry is garbage.
|
2013-07-25 12:42:52 +00:00
|
|
|
*TargetPtr &= 0xffe0001fU;
|
2013-05-04 20:14:04 +00:00
|
|
|
// Immediate goes in bits 20:5 of MOVZ/MOVK instruction
|
|
|
|
*TargetPtr |= ((Result & 0xffff0000U) >> (16 - 5));
|
2013-07-01 19:23:10 +00:00
|
|
|
// Shift must be "lsl #16", in bits 22:2
|
|
|
|
assert((*TargetPtr >> 21 & 0x3) == 1 && "invalid shift for relocation");
|
2013-05-04 20:14:04 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_AARCH64_MOVW_UABS_G0_NC: {
|
|
|
|
uint64_t Result = Value + Addend;
|
2013-05-19 15:39:03 +00:00
|
|
|
|
|
|
|
// AArch64 code is emitted with .rela relocations. The data already in any
|
|
|
|
// bits affected by the relocation on entry is garbage.
|
2013-07-25 12:42:52 +00:00
|
|
|
*TargetPtr &= 0xffe0001fU;
|
2013-05-04 20:14:04 +00:00
|
|
|
// Immediate goes in bits 20:5 of MOVZ/MOVK instruction
|
|
|
|
*TargetPtr |= ((Result & 0xffffU) << 5);
|
2013-07-01 19:23:10 +00:00
|
|
|
// Shift must be "lsl #0", in bits 22:21.
|
|
|
|
assert((*TargetPtr >> 21 & 0x3) == 0 && "invalid shift for relocation");
|
2013-05-04 20:14:04 +00:00
|
|
|
break;
|
|
|
|
}
|
2014-02-11 12:59:09 +00:00
|
|
|
case ELF::R_AARCH64_ADR_PREL_PG_HI21: {
|
|
|
|
// Operation: Page(S+A) - Page(P)
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t Result =
|
|
|
|
((Value + Addend) & ~0xfffULL) - (FinalAddress & ~0xfffULL);
|
2014-02-11 12:59:09 +00:00
|
|
|
|
|
|
|
// Check that -2^32 <= X < 2^32
|
|
|
|
assert(static_cast<int64_t>(Result) >= (-1LL << 32) &&
|
|
|
|
static_cast<int64_t>(Result) < (1LL << 32) &&
|
|
|
|
"overflow check failed for relocation");
|
|
|
|
|
|
|
|
// AArch64 code is emitted with .rela relocations. The data already in any
|
|
|
|
// bits affected by the relocation on entry is garbage.
|
|
|
|
*TargetPtr &= 0x9f00001fU;
|
|
|
|
// Immediate goes in bits 30:29 + 5:23 of ADRP instruction, taken
|
|
|
|
// from bits 32:12 of X.
|
|
|
|
*TargetPtr |= ((Result & 0x3000U) << (29 - 12));
|
|
|
|
*TargetPtr |= ((Result & 0x1ffffc000ULL) >> (14 - 5));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_AARCH64_LDST32_ABS_LO12_NC: {
|
|
|
|
// Operation: S + A
|
|
|
|
uint64_t Result = Value + Addend;
|
|
|
|
|
|
|
|
// AArch64 code is emitted with .rela relocations. The data already in any
|
|
|
|
// bits affected by the relocation on entry is garbage.
|
|
|
|
*TargetPtr &= 0xffc003ffU;
|
|
|
|
// Immediate goes in bits 21:10 of LD/ST instruction, taken
|
|
|
|
// from bits 11:2 of X
|
|
|
|
*TargetPtr |= ((Result & 0xffc) << (10 - 2));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_AARCH64_LDST64_ABS_LO12_NC: {
|
|
|
|
// Operation: S + A
|
|
|
|
uint64_t Result = Value + Addend;
|
|
|
|
|
|
|
|
// AArch64 code is emitted with .rela relocations. The data already in any
|
|
|
|
// bits affected by the relocation on entry is garbage.
|
|
|
|
*TargetPtr &= 0xffc003ffU;
|
|
|
|
// Immediate goes in bits 21:10 of LD/ST instruction, taken
|
|
|
|
// from bits 11:3 of X
|
|
|
|
*TargetPtr |= ((Result & 0xff8) << (10 - 3));
|
|
|
|
break;
|
|
|
|
}
|
2013-05-04 20:13:59 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-02 19:45:23 +00:00
|
|
|
void RuntimeDyldELF::resolveARMRelocation(const SectionEntry &Section,
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t Offset, uint32_t Value,
|
|
|
|
uint32_t Type, int32_t Addend) {
|
2012-03-30 16:45:19 +00:00
|
|
|
// TODO: Add Thumb relocations.
|
2014-03-21 20:28:42 +00:00
|
|
|
uint32_t *Placeholder =
|
|
|
|
reinterpret_cast<uint32_t *>(Section.ObjAddress + Offset);
|
|
|
|
uint32_t *TargetPtr = (uint32_t *)(Section.Address + Offset);
|
2012-11-02 19:45:23 +00:00
|
|
|
uint32_t FinalAddress = ((Section.LoadAddress + Offset) & 0xFFFFFFFF);
|
2012-03-30 16:45:19 +00:00
|
|
|
Value += Addend;
|
|
|
|
|
2012-11-02 19:45:23 +00:00
|
|
|
DEBUG(dbgs() << "resolveARMRelocation, LocalAddress: "
|
|
|
|
<< Section.Address + Offset
|
2014-03-21 20:28:42 +00:00
|
|
|
<< " FinalAddress: " << format("%p", FinalAddress) << " Value: "
|
|
|
|
<< format("%x", Value) << " Type: " << format("%x", Type)
|
|
|
|
<< " Addend: " << format("%x", Addend) << "\n");
|
2012-03-30 16:45:19 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
switch (Type) {
|
2012-03-30 16:45:19 +00:00
|
|
|
default:
|
|
|
|
llvm_unreachable("Not implemented relocation type!");
|
|
|
|
|
2014-01-29 11:50:56 +00:00
|
|
|
case ELF::R_ARM_NONE:
|
|
|
|
break;
|
2013-01-04 20:36:28 +00:00
|
|
|
// Write a 32bit value to relocation address, taking into account the
|
2012-10-03 16:29:42 +00:00
|
|
|
// implicit addend encoded in the target.
|
2014-01-29 11:50:56 +00:00
|
|
|
case ELF::R_ARM_PREL31:
|
2013-05-28 19:48:19 +00:00
|
|
|
case ELF::R_ARM_TARGET1:
|
|
|
|
case ELF::R_ARM_ABS32:
|
|
|
|
*TargetPtr = *Placeholder + Value;
|
2012-03-30 16:45:19 +00:00
|
|
|
break;
|
|
|
|
// Write first 16 bit of 32 bit value to the mov instruction.
|
|
|
|
// Last 4 bit should be shifted.
|
2013-05-28 19:48:19 +00:00
|
|
|
case ELF::R_ARM_MOVW_ABS_NC:
|
2012-10-03 16:29:42 +00:00
|
|
|
// We are not expecting any other addend in the relocation address.
|
2013-01-04 20:36:28 +00:00
|
|
|
// Using 0x000F0FFF because MOVW has its 16 bit immediate split into 2
|
2012-10-03 16:29:42 +00:00
|
|
|
// non-contiguous fields.
|
2013-05-28 19:48:19 +00:00
|
|
|
assert((*Placeholder & 0x000F0FFF) == 0);
|
2012-03-30 16:45:19 +00:00
|
|
|
Value = Value & 0xFFFF;
|
2013-05-28 19:48:19 +00:00
|
|
|
*TargetPtr = *Placeholder | (Value & 0xFFF);
|
2012-03-30 16:45:19 +00:00
|
|
|
*TargetPtr |= ((Value >> 12) & 0xF) << 16;
|
|
|
|
break;
|
|
|
|
// Write last 16 bit of 32 bit value to the mov instruction.
|
|
|
|
// Last 4 bit should be shifted.
|
2013-05-28 19:48:19 +00:00
|
|
|
case ELF::R_ARM_MOVT_ABS:
|
2012-10-03 16:29:42 +00:00
|
|
|
// We are not expecting any other addend in the relocation address.
|
|
|
|
// Use 0x000F0FFF for the same reason as R_ARM_MOVW_ABS_NC.
|
2013-05-28 19:48:19 +00:00
|
|
|
assert((*Placeholder & 0x000F0FFF) == 0);
|
|
|
|
|
2012-03-30 16:45:19 +00:00
|
|
|
Value = (Value >> 16) & 0xFFFF;
|
2013-05-28 19:48:19 +00:00
|
|
|
*TargetPtr = *Placeholder | (Value & 0xFFF);
|
2012-03-30 16:45:19 +00:00
|
|
|
*TargetPtr |= ((Value >> 12) & 0xF) << 16;
|
|
|
|
break;
|
|
|
|
// Write 24 bit relative value to the branch instruction.
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_ARM_PC24: // Fall through.
|
|
|
|
case ELF::R_ARM_CALL: // Fall through.
|
2013-05-28 19:48:19 +00:00
|
|
|
case ELF::R_ARM_JUMP24: {
|
2012-03-30 16:45:19 +00:00
|
|
|
int32_t RelValue = static_cast<int32_t>(Value - FinalAddress - 8);
|
|
|
|
RelValue = (RelValue & 0x03FFFFFC) >> 2;
|
2013-05-28 19:48:19 +00:00
|
|
|
assert((*TargetPtr & 0xFFFFFF) == 0xFFFFFE);
|
2012-03-30 16:45:19 +00:00
|
|
|
*TargetPtr &= 0xFF000000;
|
|
|
|
*TargetPtr |= RelValue;
|
|
|
|
break;
|
|
|
|
}
|
2013-05-28 19:48:19 +00:00
|
|
|
case ELF::R_ARM_PRIVATE_0:
|
|
|
|
// This relocation is reserved by the ARM ELF ABI for internal use. We
|
|
|
|
// appropriate it here to act as an R_ARM_ABS32 without any addend for use
|
|
|
|
// in the stubs created during JIT (which can't put an addend into the
|
|
|
|
// original object file).
|
|
|
|
*TargetPtr = Value;
|
|
|
|
break;
|
|
|
|
}
|
2012-01-16 08:56:09 +00:00
|
|
|
}
|
|
|
|
|
2012-11-02 19:45:23 +00:00
|
|
|
void RuntimeDyldELF::resolveMIPSRelocation(const SectionEntry &Section,
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t Offset, uint32_t Value,
|
|
|
|
uint32_t Type, int32_t Addend) {
|
|
|
|
uint32_t *Placeholder =
|
|
|
|
reinterpret_cast<uint32_t *>(Section.ObjAddress + Offset);
|
|
|
|
uint32_t *TargetPtr = (uint32_t *)(Section.Address + Offset);
|
2012-08-17 21:28:04 +00:00
|
|
|
Value += Addend;
|
|
|
|
|
2012-11-02 19:45:23 +00:00
|
|
|
DEBUG(dbgs() << "resolveMipselocation, LocalAddress: "
|
2014-03-21 20:28:42 +00:00
|
|
|
<< Section.Address + Offset << " FinalAddress: "
|
|
|
|
<< format("%p", Section.LoadAddress + Offset) << " Value: "
|
|
|
|
<< format("%x", Value) << " Type: " << format("%x", Type)
|
|
|
|
<< " Addend: " << format("%x", Addend) << "\n");
|
2012-08-17 21:28:04 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
switch (Type) {
|
2012-08-17 21:28:04 +00:00
|
|
|
default:
|
|
|
|
llvm_unreachable("Not implemented relocation type!");
|
|
|
|
break;
|
|
|
|
case ELF::R_MIPS_32:
|
2013-07-24 01:58:40 +00:00
|
|
|
*TargetPtr = Value + (*Placeholder);
|
2012-08-17 21:28:04 +00:00
|
|
|
break;
|
|
|
|
case ELF::R_MIPS_26:
|
2014-03-21 20:28:42 +00:00
|
|
|
*TargetPtr = ((*Placeholder) & 0xfc000000) | ((Value & 0x0fffffff) >> 2);
|
2012-08-17 21:28:04 +00:00
|
|
|
break;
|
|
|
|
case ELF::R_MIPS_HI16:
|
|
|
|
// Get the higher 16-bits. Also add 1 if bit 15 is 1.
|
2013-07-24 01:58:40 +00:00
|
|
|
Value += ((*Placeholder) & 0x0000ffff) << 16;
|
2014-03-21 20:28:42 +00:00
|
|
|
*TargetPtr =
|
|
|
|
((*Placeholder) & 0xffff0000) | (((Value + 0x8000) >> 16) & 0xffff);
|
2013-07-24 01:58:40 +00:00
|
|
|
break;
|
|
|
|
case ELF::R_MIPS_LO16:
|
|
|
|
Value += ((*Placeholder) & 0x0000ffff);
|
|
|
|
*TargetPtr = ((*Placeholder) & 0xffff0000) | (Value & 0xffff);
|
|
|
|
break;
|
|
|
|
case ELF::R_MIPS_UNUSED1:
|
|
|
|
// Similar to ELF::R_ARM_PRIVATE_0, R_MIPS_UNUSED1 and R_MIPS_UNUSED2
|
|
|
|
// are used for internal JIT purpose. These relocations are similar to
|
|
|
|
// R_MIPS_HI16 and R_MIPS_LO16, but they do not take any addend into
|
|
|
|
// account.
|
2014-03-21 20:28:42 +00:00
|
|
|
*TargetPtr =
|
|
|
|
((*TargetPtr) & 0xffff0000) | (((Value + 0x8000) >> 16) & 0xffff);
|
2012-08-17 21:28:04 +00:00
|
|
|
break;
|
2013-07-24 01:58:40 +00:00
|
|
|
case ELF::R_MIPS_UNUSED2:
|
2012-08-17 21:28:04 +00:00
|
|
|
*TargetPtr = ((*TargetPtr) & 0xffff0000) | (Value & 0xffff);
|
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
}
|
2012-08-17 21:28:04 +00:00
|
|
|
}
|
|
|
|
|
[RuntimeDyld, PowerPC] Fix/improve handling of TOC relocations
Current PPC64 RuntimeDyld code to handle TOC relocations has two
problems:
- With recent linkers, in addition to the relocations that implicitly
refer to the TOC base (R_PPC64_TOC*), you can now also use the .TOC.
magic symbol with any other relocation to refer to the TOC base
explicitly. This isn't currently used much in ELFv1 code (although
it could be), but it is essential in ELFv2 code.
- In a complex JIT environment with multiple modules, each module may
have its own .toc section, and TOC relocations in one module must
refer to *its own* TOC section. The current findPPC64TOC implementation
does not correctly implement this; in fact, it will always return the
address of the first TOC section it finds anywhere. (Note that at the
time findPPC64TOC is called, we don't even *know* which module the
relocation originally resided in, so it is not even possible to fix
this routine as-is.)
This commit fixes both problems by handling TOC relocations earlier, in
processRelocationRef. To do this, I've removed the findPPC64TOC routine
and replaced it by a new routine findPPC64TOCSection, which works
analogously to findOPDEntrySection in scanning the sections of the
ObjImage provided by its caller, processRelocationRef. This solves the
issue of finding the correct TOC section associated with the current
module.
This makes it straightforward to implement both R_PPC64_TOC relocations,
and relocations explicitly refering to the .TOC. symbol, directly in
processRelocationRef. There is now a new problem in implementing the
R_PPC64_TOC16* relocations, because those can now in theory involve
*three* different sections: the relocation may be applied in section A,
refer explicitly to a symbol in section B, and refer implicitly to the
TOC section C. The final processing of the relocation thus may only
happen after all three of these sections have been assigned final
addresses. There is currently no obvious means to implement this in
its general form with the common-code RuntimeDyld infrastructure.
Fortunately, ppc64 code usually makes no use of this most general form;
in fact, TOC16 relocations are only ever generated by LLVM for symbols
residing themselves in the TOC, which means "section B" == "section C"
in the above terminology. This special case can easily be handled with
the current infrastructure, and that is what this patch does.
[ Unhandled cases result in an explicit error, unlike the current code
which silently returns the wrong TOC base address ... ]
This patch makes the JIT work on both BE and LE (ELFv2 requires
additional patches, of course), and allowed me to successfully run
complex JIT scenarios (via mesa/llvmpipe).
Reviewed by Hal Finkel.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@211885 91177308-0d34-0410-b5e6-96231b3b80d8
2014-06-27 10:32:14 +00:00
|
|
|
// Return the .TOC. section and offset.
|
|
|
|
void RuntimeDyldELF::findPPC64TOCSection(ObjectImage &Obj,
|
|
|
|
ObjSectionToIDMap &LocalSections,
|
|
|
|
RelocationValueRef &Rel) {
|
|
|
|
// Set a default SectionID in case we do not find a TOC section below.
|
|
|
|
// This may happen for references to TOC base base (sym@toc, .odp
|
|
|
|
// relocation) without a .toc directive. In this case just use the
|
|
|
|
// first section (which is usually the .odp) since the code won't
|
|
|
|
// reference the .toc base directly.
|
|
|
|
Rel.SymbolName = NULL;
|
|
|
|
Rel.SectionID = 0;
|
|
|
|
|
2012-10-25 13:13:48 +00:00
|
|
|
// The TOC consists of sections .got, .toc, .tocbss, .plt in that
|
|
|
|
// order. The TOC starts where the first of these sections starts.
|
[RuntimeDyld, PowerPC] Fix/improve handling of TOC relocations
Current PPC64 RuntimeDyld code to handle TOC relocations has two
problems:
- With recent linkers, in addition to the relocations that implicitly
refer to the TOC base (R_PPC64_TOC*), you can now also use the .TOC.
magic symbol with any other relocation to refer to the TOC base
explicitly. This isn't currently used much in ELFv1 code (although
it could be), but it is essential in ELFv2 code.
- In a complex JIT environment with multiple modules, each module may
have its own .toc section, and TOC relocations in one module must
refer to *its own* TOC section. The current findPPC64TOC implementation
does not correctly implement this; in fact, it will always return the
address of the first TOC section it finds anywhere. (Note that at the
time findPPC64TOC is called, we don't even *know* which module the
relocation originally resided in, so it is not even possible to fix
this routine as-is.)
This commit fixes both problems by handling TOC relocations earlier, in
processRelocationRef. To do this, I've removed the findPPC64TOC routine
and replaced it by a new routine findPPC64TOCSection, which works
analogously to findOPDEntrySection in scanning the sections of the
ObjImage provided by its caller, processRelocationRef. This solves the
issue of finding the correct TOC section associated with the current
module.
This makes it straightforward to implement both R_PPC64_TOC relocations,
and relocations explicitly refering to the .TOC. symbol, directly in
processRelocationRef. There is now a new problem in implementing the
R_PPC64_TOC16* relocations, because those can now in theory involve
*three* different sections: the relocation may be applied in section A,
refer explicitly to a symbol in section B, and refer implicitly to the
TOC section C. The final processing of the relocation thus may only
happen after all three of these sections have been assigned final
addresses. There is currently no obvious means to implement this in
its general form with the common-code RuntimeDyld infrastructure.
Fortunately, ppc64 code usually makes no use of this most general form;
in fact, TOC16 relocations are only ever generated by LLVM for symbols
residing themselves in the TOC, which means "section B" == "section C"
in the above terminology. This special case can easily be handled with
the current infrastructure, and that is what this patch does.
[ Unhandled cases result in an explicit error, unlike the current code
which silently returns the wrong TOC base address ... ]
This patch makes the JIT work on both BE and LE (ELFv2 requires
additional patches, of course), and allowed me to successfully run
complex JIT scenarios (via mesa/llvmpipe).
Reviewed by Hal Finkel.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@211885 91177308-0d34-0410-b5e6-96231b3b80d8
2014-06-27 10:32:14 +00:00
|
|
|
for (section_iterator si = Obj.begin_sections(), se = Obj.end_sections();
|
|
|
|
si != se; ++si) {
|
|
|
|
|
|
|
|
StringRef SectionName;
|
|
|
|
check(si->getName(SectionName));
|
|
|
|
|
|
|
|
if (SectionName == ".got"
|
|
|
|
|| SectionName == ".toc"
|
|
|
|
|| SectionName == ".tocbss"
|
|
|
|
|| SectionName == ".plt") {
|
|
|
|
Rel.SectionID = findOrEmitSection(Obj, *si, false, LocalSections);
|
2012-10-25 13:13:48 +00:00
|
|
|
break;
|
[RuntimeDyld, PowerPC] Fix/improve handling of TOC relocations
Current PPC64 RuntimeDyld code to handle TOC relocations has two
problems:
- With recent linkers, in addition to the relocations that implicitly
refer to the TOC base (R_PPC64_TOC*), you can now also use the .TOC.
magic symbol with any other relocation to refer to the TOC base
explicitly. This isn't currently used much in ELFv1 code (although
it could be), but it is essential in ELFv2 code.
- In a complex JIT environment with multiple modules, each module may
have its own .toc section, and TOC relocations in one module must
refer to *its own* TOC section. The current findPPC64TOC implementation
does not correctly implement this; in fact, it will always return the
address of the first TOC section it finds anywhere. (Note that at the
time findPPC64TOC is called, we don't even *know* which module the
relocation originally resided in, so it is not even possible to fix
this routine as-is.)
This commit fixes both problems by handling TOC relocations earlier, in
processRelocationRef. To do this, I've removed the findPPC64TOC routine
and replaced it by a new routine findPPC64TOCSection, which works
analogously to findOPDEntrySection in scanning the sections of the
ObjImage provided by its caller, processRelocationRef. This solves the
issue of finding the correct TOC section associated with the current
module.
This makes it straightforward to implement both R_PPC64_TOC relocations,
and relocations explicitly refering to the .TOC. symbol, directly in
processRelocationRef. There is now a new problem in implementing the
R_PPC64_TOC16* relocations, because those can now in theory involve
*three* different sections: the relocation may be applied in section A,
refer explicitly to a symbol in section B, and refer implicitly to the
TOC section C. The final processing of the relocation thus may only
happen after all three of these sections have been assigned final
addresses. There is currently no obvious means to implement this in
its general form with the common-code RuntimeDyld infrastructure.
Fortunately, ppc64 code usually makes no use of this most general form;
in fact, TOC16 relocations are only ever generated by LLVM for symbols
residing themselves in the TOC, which means "section B" == "section C"
in the above terminology. This special case can easily be handled with
the current infrastructure, and that is what this patch does.
[ Unhandled cases result in an explicit error, unlike the current code
which silently returns the wrong TOC base address ... ]
This patch makes the JIT work on both BE and LE (ELFv2 requires
additional patches, of course), and allowed me to successfully run
complex JIT scenarios (via mesa/llvmpipe).
Reviewed by Hal Finkel.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@211885 91177308-0d34-0410-b5e6-96231b3b80d8
2014-06-27 10:32:14 +00:00
|
|
|
}
|
2012-10-25 13:13:48 +00:00
|
|
|
}
|
[RuntimeDyld, PowerPC] Fix/improve handling of TOC relocations
Current PPC64 RuntimeDyld code to handle TOC relocations has two
problems:
- With recent linkers, in addition to the relocations that implicitly
refer to the TOC base (R_PPC64_TOC*), you can now also use the .TOC.
magic symbol with any other relocation to refer to the TOC base
explicitly. This isn't currently used much in ELFv1 code (although
it could be), but it is essential in ELFv2 code.
- In a complex JIT environment with multiple modules, each module may
have its own .toc section, and TOC relocations in one module must
refer to *its own* TOC section. The current findPPC64TOC implementation
does not correctly implement this; in fact, it will always return the
address of the first TOC section it finds anywhere. (Note that at the
time findPPC64TOC is called, we don't even *know* which module the
relocation originally resided in, so it is not even possible to fix
this routine as-is.)
This commit fixes both problems by handling TOC relocations earlier, in
processRelocationRef. To do this, I've removed the findPPC64TOC routine
and replaced it by a new routine findPPC64TOCSection, which works
analogously to findOPDEntrySection in scanning the sections of the
ObjImage provided by its caller, processRelocationRef. This solves the
issue of finding the correct TOC section associated with the current
module.
This makes it straightforward to implement both R_PPC64_TOC relocations,
and relocations explicitly refering to the .TOC. symbol, directly in
processRelocationRef. There is now a new problem in implementing the
R_PPC64_TOC16* relocations, because those can now in theory involve
*three* different sections: the relocation may be applied in section A,
refer explicitly to a symbol in section B, and refer implicitly to the
TOC section C. The final processing of the relocation thus may only
happen after all three of these sections have been assigned final
addresses. There is currently no obvious means to implement this in
its general form with the common-code RuntimeDyld infrastructure.
Fortunately, ppc64 code usually makes no use of this most general form;
in fact, TOC16 relocations are only ever generated by LLVM for symbols
residing themselves in the TOC, which means "section B" == "section C"
in the above terminology. This special case can easily be handled with
the current infrastructure, and that is what this patch does.
[ Unhandled cases result in an explicit error, unlike the current code
which silently returns the wrong TOC base address ... ]
This patch makes the JIT work on both BE and LE (ELFv2 requires
additional patches, of course), and allowed me to successfully run
complex JIT scenarios (via mesa/llvmpipe).
Reviewed by Hal Finkel.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@211885 91177308-0d34-0410-b5e6-96231b3b80d8
2014-06-27 10:32:14 +00:00
|
|
|
|
2012-10-25 13:13:48 +00:00
|
|
|
// Per the ppc64-elf-linux ABI, The TOC base is TOC value plus 0x8000
|
|
|
|
// thus permitting a full 64 Kbytes segment.
|
[RuntimeDyld, PowerPC] Fix/improve handling of TOC relocations
Current PPC64 RuntimeDyld code to handle TOC relocations has two
problems:
- With recent linkers, in addition to the relocations that implicitly
refer to the TOC base (R_PPC64_TOC*), you can now also use the .TOC.
magic symbol with any other relocation to refer to the TOC base
explicitly. This isn't currently used much in ELFv1 code (although
it could be), but it is essential in ELFv2 code.
- In a complex JIT environment with multiple modules, each module may
have its own .toc section, and TOC relocations in one module must
refer to *its own* TOC section. The current findPPC64TOC implementation
does not correctly implement this; in fact, it will always return the
address of the first TOC section it finds anywhere. (Note that at the
time findPPC64TOC is called, we don't even *know* which module the
relocation originally resided in, so it is not even possible to fix
this routine as-is.)
This commit fixes both problems by handling TOC relocations earlier, in
processRelocationRef. To do this, I've removed the findPPC64TOC routine
and replaced it by a new routine findPPC64TOCSection, which works
analogously to findOPDEntrySection in scanning the sections of the
ObjImage provided by its caller, processRelocationRef. This solves the
issue of finding the correct TOC section associated with the current
module.
This makes it straightforward to implement both R_PPC64_TOC relocations,
and relocations explicitly refering to the .TOC. symbol, directly in
processRelocationRef. There is now a new problem in implementing the
R_PPC64_TOC16* relocations, because those can now in theory involve
*three* different sections: the relocation may be applied in section A,
refer explicitly to a symbol in section B, and refer implicitly to the
TOC section C. The final processing of the relocation thus may only
happen after all three of these sections have been assigned final
addresses. There is currently no obvious means to implement this in
its general form with the common-code RuntimeDyld infrastructure.
Fortunately, ppc64 code usually makes no use of this most general form;
in fact, TOC16 relocations are only ever generated by LLVM for symbols
residing themselves in the TOC, which means "section B" == "section C"
in the above terminology. This special case can easily be handled with
the current infrastructure, and that is what this patch does.
[ Unhandled cases result in an explicit error, unlike the current code
which silently returns the wrong TOC base address ... ]
This patch makes the JIT work on both BE and LE (ELFv2 requires
additional patches, of course), and allowed me to successfully run
complex JIT scenarios (via mesa/llvmpipe).
Reviewed by Hal Finkel.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@211885 91177308-0d34-0410-b5e6-96231b3b80d8
2014-06-27 10:32:14 +00:00
|
|
|
Rel.Addend = 0x8000;
|
2012-10-25 13:13:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Returns the sections and offset associated with the ODP entry referenced
|
|
|
|
// by Symbol.
|
|
|
|
void RuntimeDyldELF::findOPDEntrySection(ObjectImage &Obj,
|
|
|
|
ObjSectionToIDMap &LocalSections,
|
|
|
|
RelocationValueRef &Rel) {
|
|
|
|
// Get the ELF symbol value (st_value) to compare with Relocation offset in
|
|
|
|
// .opd entries
|
2014-01-30 02:49:50 +00:00
|
|
|
for (section_iterator si = Obj.begin_sections(), se = Obj.end_sections();
|
|
|
|
si != se; ++si) {
|
2013-06-03 19:37:34 +00:00
|
|
|
section_iterator RelSecI = si->getRelocatedSection();
|
|
|
|
if (RelSecI == Obj.end_sections())
|
|
|
|
continue;
|
|
|
|
|
|
|
|
StringRef RelSectionName;
|
|
|
|
check(RelSecI->getName(RelSectionName));
|
|
|
|
if (RelSectionName != ".opd")
|
2012-10-25 13:13:48 +00:00
|
|
|
continue;
|
|
|
|
|
2014-02-10 20:24:04 +00:00
|
|
|
for (relocation_iterator i = si->relocation_begin(),
|
2014-03-21 20:28:42 +00:00
|
|
|
e = si->relocation_end();
|
|
|
|
i != e;) {
|
2012-10-25 13:13:48 +00:00
|
|
|
// The R_PPC64_ADDR64 relocation indicates the first field
|
|
|
|
// of a .opd entry
|
|
|
|
uint64_t TypeFunc;
|
|
|
|
check(i->getType(TypeFunc));
|
|
|
|
if (TypeFunc != ELF::R_PPC64_ADDR64) {
|
2014-01-30 02:49:50 +00:00
|
|
|
++i;
|
2012-10-25 13:13:48 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t TargetSymbolOffset;
|
2013-06-05 01:33:53 +00:00
|
|
|
symbol_iterator TargetSymbol = i->getSymbol();
|
2012-10-25 13:13:48 +00:00
|
|
|
check(i->getOffset(TargetSymbolOffset));
|
2013-05-09 03:39:05 +00:00
|
|
|
int64_t Addend;
|
|
|
|
check(getELFRelocationAddend(*i, Addend));
|
2012-10-25 13:13:48 +00:00
|
|
|
|
2014-01-30 02:49:50 +00:00
|
|
|
++i;
|
2012-10-25 13:13:48 +00:00
|
|
|
if (i == e)
|
|
|
|
break;
|
|
|
|
|
|
|
|
// Just check if following relocation is a R_PPC64_TOC
|
|
|
|
uint64_t TypeTOC;
|
|
|
|
check(i->getType(TypeTOC));
|
|
|
|
if (TypeTOC != ELF::R_PPC64_TOC)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
// Finally compares the Symbol value and the target symbol offset
|
|
|
|
// to check if this .opd entry refers to the symbol the relocation
|
|
|
|
// points to.
|
2013-08-19 23:27:43 +00:00
|
|
|
if (Rel.Addend != (int64_t)TargetSymbolOffset)
|
2012-10-25 13:13:48 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
section_iterator tsi(Obj.end_sections());
|
2013-06-05 01:33:53 +00:00
|
|
|
check(TargetSymbol->getSection(tsi));
|
2014-02-18 21:46:39 +00:00
|
|
|
bool IsCode = false;
|
|
|
|
tsi->isText(IsCode);
|
|
|
|
Rel.SectionID = findOrEmitSection(Obj, (*tsi), IsCode, LocalSections);
|
2013-05-09 03:39:05 +00:00
|
|
|
Rel.Addend = (intptr_t)Addend;
|
2012-10-25 13:13:48 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
llvm_unreachable("Attempting to get address of ODP entry!");
|
|
|
|
}
|
|
|
|
|
2014-06-20 17:51:47 +00:00
|
|
|
// Relocation masks following the #lo(value), #hi(value), #ha(value),
|
|
|
|
// #higher(value), #highera(value), #highest(value), and #highesta(value)
|
|
|
|
// macros defined in section 4.5.1. Relocation Types of the PPC-elf64abi
|
|
|
|
// document.
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
static inline uint16_t applyPPClo(uint64_t value) { return value & 0xffff; }
|
2012-10-25 13:13:48 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
static inline uint16_t applyPPChi(uint64_t value) {
|
2012-10-25 13:13:48 +00:00
|
|
|
return (value >> 16) & 0xffff;
|
|
|
|
}
|
|
|
|
|
2014-06-20 17:51:47 +00:00
|
|
|
static inline uint16_t applyPPCha (uint64_t value) {
|
|
|
|
return ((value + 0x8000) >> 16) & 0xffff;
|
|
|
|
}
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
static inline uint16_t applyPPChigher(uint64_t value) {
|
2012-10-25 13:13:48 +00:00
|
|
|
return (value >> 32) & 0xffff;
|
|
|
|
}
|
|
|
|
|
2014-06-20 17:51:47 +00:00
|
|
|
static inline uint16_t applyPPChighera (uint64_t value) {
|
|
|
|
return ((value + 0x8000) >> 32) & 0xffff;
|
|
|
|
}
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
static inline uint16_t applyPPChighest(uint64_t value) {
|
2012-10-25 13:13:48 +00:00
|
|
|
return (value >> 48) & 0xffff;
|
|
|
|
}
|
|
|
|
|
2014-06-20 17:51:47 +00:00
|
|
|
static inline uint16_t applyPPChighesta (uint64_t value) {
|
|
|
|
return ((value + 0x8000) >> 48) & 0xffff;
|
|
|
|
}
|
|
|
|
|
2012-11-02 19:45:23 +00:00
|
|
|
void RuntimeDyldELF::resolvePPC64Relocation(const SectionEntry &Section,
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t Offset, uint64_t Value,
|
|
|
|
uint32_t Type, int64_t Addend) {
|
|
|
|
uint8_t *LocalAddress = Section.Address + Offset;
|
2012-10-25 13:13:48 +00:00
|
|
|
switch (Type) {
|
|
|
|
default:
|
|
|
|
llvm_unreachable("Relocation type not implemented yet!");
|
|
|
|
break;
|
2014-06-20 17:51:47 +00:00
|
|
|
case ELF::R_PPC64_ADDR16:
|
|
|
|
writeInt16BE(LocalAddress, applyPPClo(Value + Addend));
|
|
|
|
break;
|
|
|
|
case ELF::R_PPC64_ADDR16_DS:
|
|
|
|
writeInt16BE(LocalAddress, applyPPClo(Value + Addend) & ~3);
|
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_PPC64_ADDR16_LO:
|
|
|
|
writeInt16BE(LocalAddress, applyPPClo(Value + Addend));
|
|
|
|
break;
|
2014-06-20 17:51:47 +00:00
|
|
|
case ELF::R_PPC64_ADDR16_LO_DS:
|
|
|
|
writeInt16BE(LocalAddress, applyPPClo(Value + Addend) & ~3);
|
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_PPC64_ADDR16_HI:
|
|
|
|
writeInt16BE(LocalAddress, applyPPChi(Value + Addend));
|
2012-10-25 13:13:48 +00:00
|
|
|
break;
|
2014-06-20 17:51:47 +00:00
|
|
|
case ELF::R_PPC64_ADDR16_HA:
|
|
|
|
writeInt16BE(LocalAddress, applyPPCha(Value + Addend));
|
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_PPC64_ADDR16_HIGHER:
|
|
|
|
writeInt16BE(LocalAddress, applyPPChigher(Value + Addend));
|
2012-10-25 13:13:48 +00:00
|
|
|
break;
|
2014-06-20 17:51:47 +00:00
|
|
|
case ELF::R_PPC64_ADDR16_HIGHERA:
|
|
|
|
writeInt16BE(LocalAddress, applyPPChighera(Value + Addend));
|
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_PPC64_ADDR16_HIGHEST:
|
|
|
|
writeInt16BE(LocalAddress, applyPPChighest(Value + Addend));
|
2012-10-25 13:13:48 +00:00
|
|
|
break;
|
2014-06-20 17:51:47 +00:00
|
|
|
case ELF::R_PPC64_ADDR16_HIGHESTA:
|
|
|
|
writeInt16BE(LocalAddress, applyPPChighesta(Value + Addend));
|
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_PPC64_ADDR14: {
|
2012-10-25 13:13:48 +00:00
|
|
|
assert(((Value + Addend) & 3) == 0);
|
|
|
|
// Preserve the AA/LK bits in the branch instruction
|
2014-03-21 20:28:42 +00:00
|
|
|
uint8_t aalk = *(LocalAddress + 3);
|
2012-10-25 13:13:48 +00:00
|
|
|
writeInt16BE(LocalAddress + 2, (aalk & 3) | ((Value + Addend) & 0xfffc));
|
|
|
|
} break;
|
2014-06-20 17:51:47 +00:00
|
|
|
case ELF::R_PPC64_REL16_LO: {
|
|
|
|
uint64_t FinalAddress = (Section.LoadAddress + Offset);
|
|
|
|
uint64_t Delta = Value - FinalAddress + Addend;
|
|
|
|
writeInt16BE(LocalAddress, applyPPClo(Delta));
|
|
|
|
} break;
|
|
|
|
case ELF::R_PPC64_REL16_HI: {
|
|
|
|
uint64_t FinalAddress = (Section.LoadAddress + Offset);
|
|
|
|
uint64_t Delta = Value - FinalAddress + Addend;
|
|
|
|
writeInt16BE(LocalAddress, applyPPChi(Delta));
|
|
|
|
} break;
|
|
|
|
case ELF::R_PPC64_REL16_HA: {
|
|
|
|
uint64_t FinalAddress = (Section.LoadAddress + Offset);
|
|
|
|
uint64_t Delta = Value - FinalAddress + Addend;
|
|
|
|
writeInt16BE(LocalAddress, applyPPCha(Delta));
|
|
|
|
} break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_PPC64_ADDR32: {
|
2013-01-04 19:08:13 +00:00
|
|
|
int32_t Result = static_cast<int32_t>(Value + Addend);
|
|
|
|
if (SignExtend32<32>(Result) != Result)
|
2013-01-09 17:08:15 +00:00
|
|
|
llvm_unreachable("Relocation R_PPC64_ADDR32 overflow");
|
2013-01-04 19:08:13 +00:00
|
|
|
writeInt32BE(LocalAddress, Result);
|
|
|
|
} break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_PPC64_REL24: {
|
2012-11-02 19:45:23 +00:00
|
|
|
uint64_t FinalAddress = (Section.LoadAddress + Offset);
|
2012-10-25 13:13:48 +00:00
|
|
|
int32_t delta = static_cast<int32_t>(Value - FinalAddress + Addend);
|
|
|
|
if (SignExtend32<24>(delta) != delta)
|
|
|
|
llvm_unreachable("Relocation R_PPC64_REL24 overflow");
|
|
|
|
// Generates a 'bl <address>' instruction
|
|
|
|
writeInt32BE(LocalAddress, 0x48000001 | (delta & 0x03FFFFFC));
|
|
|
|
} break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_PPC64_REL32: {
|
2013-01-09 17:08:15 +00:00
|
|
|
uint64_t FinalAddress = (Section.LoadAddress + Offset);
|
|
|
|
int32_t delta = static_cast<int32_t>(Value - FinalAddress + Addend);
|
|
|
|
if (SignExtend32<32>(delta) != delta)
|
|
|
|
llvm_unreachable("Relocation R_PPC64_REL32 overflow");
|
|
|
|
writeInt32BE(LocalAddress, delta);
|
|
|
|
} break;
|
2013-05-06 17:21:23 +00:00
|
|
|
case ELF::R_PPC64_REL64: {
|
|
|
|
uint64_t FinalAddress = (Section.LoadAddress + Offset);
|
|
|
|
uint64_t Delta = Value - FinalAddress + Addend;
|
|
|
|
writeInt64BE(LocalAddress, Delta);
|
|
|
|
} break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case ELF::R_PPC64_ADDR64:
|
2012-10-25 13:13:48 +00:00
|
|
|
writeInt64BE(LocalAddress, Value + Addend);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-03 14:15:35 +00:00
|
|
|
void RuntimeDyldELF::resolveSystemZRelocation(const SectionEntry &Section,
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t Offset, uint64_t Value,
|
|
|
|
uint32_t Type, int64_t Addend) {
|
2013-05-03 14:15:35 +00:00
|
|
|
uint8_t *LocalAddress = Section.Address + Offset;
|
|
|
|
switch (Type) {
|
|
|
|
default:
|
|
|
|
llvm_unreachable("Relocation type not implemented yet!");
|
|
|
|
break;
|
|
|
|
case ELF::R_390_PC16DBL:
|
|
|
|
case ELF::R_390_PLT16DBL: {
|
|
|
|
int64_t Delta = (Value + Addend) - (Section.LoadAddress + Offset);
|
|
|
|
assert(int16_t(Delta / 2) * 2 == Delta && "R_390_PC16DBL overflow");
|
|
|
|
writeInt16BE(LocalAddress, Delta / 2);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_390_PC32DBL:
|
|
|
|
case ELF::R_390_PLT32DBL: {
|
|
|
|
int64_t Delta = (Value + Addend) - (Section.LoadAddress + Offset);
|
|
|
|
assert(int32_t(Delta / 2) * 2 == Delta && "R_390_PC32DBL overflow");
|
|
|
|
writeInt32BE(LocalAddress, Delta / 2);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_390_PC32: {
|
|
|
|
int64_t Delta = (Value + Addend) - (Section.LoadAddress + Offset);
|
|
|
|
assert(int32_t(Delta) == Delta && "R_390_PC32 overflow");
|
|
|
|
writeInt32BE(LocalAddress, Delta);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case ELF::R_390_64:
|
|
|
|
writeInt64BE(LocalAddress, Value + Addend);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-19 19:38:06 +00:00
|
|
|
// The target location for the relocation is described by RE.SectionID and
|
|
|
|
// RE.Offset. RE.SectionID can be used to find the SectionEntry. Each
|
|
|
|
// SectionEntry has three members describing its location.
|
|
|
|
// SectionEntry::Address is the address at which the section has been loaded
|
|
|
|
// into memory in the current (host) process. SectionEntry::LoadAddress is the
|
|
|
|
// address that the section will have in the target process.
|
|
|
|
// SectionEntry::ObjAddress is the address of the bits for this section in the
|
|
|
|
// original emitted object image (also in the current address space).
|
|
|
|
//
|
|
|
|
// Relocations will be applied as if the section were loaded at
|
|
|
|
// SectionEntry::LoadAddress, but they will be applied at an address based
|
|
|
|
// on SectionEntry::Address. SectionEntry::ObjAddress will be used to refer to
|
|
|
|
// Target memory contents if they are required for value calculations.
|
|
|
|
//
|
|
|
|
// The Value parameter here is the load address of the symbol for the
|
|
|
|
// relocation to be applied. For relocations which refer to symbols in the
|
|
|
|
// current object Value will be the LoadAddress of the section in which
|
|
|
|
// the symbol resides (RE.Addend provides additional information about the
|
|
|
|
// symbol location). For external symbols, Value will be the address of the
|
|
|
|
// symbol in the target address space.
|
2013-04-29 17:24:34 +00:00
|
|
|
void RuntimeDyldELF::resolveRelocation(const RelocationEntry &RE,
|
2013-08-19 19:38:06 +00:00
|
|
|
uint64_t Value) {
|
2013-04-29 17:24:34 +00:00
|
|
|
const SectionEntry &Section = Sections[RE.SectionID];
|
2013-08-19 23:27:43 +00:00
|
|
|
return resolveRelocation(Section, RE.Offset, Value, RE.RelType, RE.Addend,
|
|
|
|
RE.SymOffset);
|
2013-04-29 17:24:34 +00:00
|
|
|
}
|
|
|
|
|
2012-11-02 19:45:23 +00:00
|
|
|
void RuntimeDyldELF::resolveRelocation(const SectionEntry &Section,
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t Offset, uint64_t Value,
|
|
|
|
uint32_t Type, int64_t Addend,
|
2013-08-19 23:27:43 +00:00
|
|
|
uint64_t SymOffset) {
|
2012-01-16 08:56:09 +00:00
|
|
|
switch (Arch) {
|
|
|
|
case Triple::x86_64:
|
2013-08-19 23:27:43 +00:00
|
|
|
resolveX86_64Relocation(Section, Offset, Value, Type, Addend, SymOffset);
|
2012-01-16 08:56:09 +00:00
|
|
|
break;
|
|
|
|
case Triple::x86:
|
2014-03-21 20:28:42 +00:00
|
|
|
resolveX86Relocation(Section, Offset, (uint32_t)(Value & 0xffffffffL), Type,
|
2012-03-30 16:45:19 +00:00
|
|
|
(uint32_t)(Addend & 0xffffffffL));
|
2012-01-16 08:56:09 +00:00
|
|
|
break;
|
2013-05-04 20:13:59 +00:00
|
|
|
case Triple::aarch64:
|
2014-03-26 14:57:32 +00:00
|
|
|
case Triple::aarch64_be:
|
2013-05-04 20:13:59 +00:00
|
|
|
resolveAArch64Relocation(Section, Offset, Value, Type, Addend);
|
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case Triple::arm: // Fall through.
|
2014-03-28 14:35:30 +00:00
|
|
|
case Triple::armeb:
|
2012-03-30 16:45:19 +00:00
|
|
|
case Triple::thumb:
|
2014-03-28 14:35:30 +00:00
|
|
|
case Triple::thumbeb:
|
2014-03-21 20:28:42 +00:00
|
|
|
resolveARMRelocation(Section, Offset, (uint32_t)(Value & 0xffffffffL), Type,
|
2012-03-30 16:45:19 +00:00
|
|
|
(uint32_t)(Addend & 0xffffffffL));
|
2012-01-16 08:56:09 +00:00
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case Triple::mips: // Fall through.
|
2012-08-17 21:28:04 +00:00
|
|
|
case Triple::mipsel:
|
2014-03-21 20:28:42 +00:00
|
|
|
resolveMIPSRelocation(Section, Offset, (uint32_t)(Value & 0xffffffffL),
|
|
|
|
Type, (uint32_t)(Addend & 0xffffffffL));
|
2012-08-17 21:28:04 +00:00
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
case Triple::ppc64: // Fall through.
|
2013-07-26 01:35:43 +00:00
|
|
|
case Triple::ppc64le:
|
2012-11-02 19:45:23 +00:00
|
|
|
resolvePPC64Relocation(Section, Offset, Value, Type, Addend);
|
2012-10-25 13:13:48 +00:00
|
|
|
break;
|
2013-05-03 14:15:35 +00:00
|
|
|
case Triple::systemz:
|
|
|
|
resolveSystemZRelocation(Section, Offset, Value, Type, Addend);
|
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
default:
|
|
|
|
llvm_unreachable("Unsupported CPU type!");
|
2012-01-16 08:56:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
relocation_iterator RuntimeDyldELF::processRelocationRef(
|
|
|
|
unsigned SectionID, relocation_iterator RelI, ObjectImage &Obj,
|
|
|
|
ObjSectionToIDMap &ObjSectionToID, const SymbolTableMap &Symbols,
|
|
|
|
StubMap &Stubs) {
|
2013-04-29 14:44:23 +00:00
|
|
|
uint64_t RelType;
|
2014-03-21 07:26:41 +00:00
|
|
|
Check(RelI->getType(RelType));
|
2013-04-29 14:44:23 +00:00
|
|
|
int64_t Addend;
|
2014-03-21 07:26:41 +00:00
|
|
|
Check(getELFRelocationAddend(*RelI, Addend));
|
|
|
|
symbol_iterator Symbol = RelI->getSymbol();
|
2012-05-01 10:41:12 +00:00
|
|
|
|
|
|
|
// Obtain the symbol name which is referenced in the relocation
|
|
|
|
StringRef TargetName;
|
2013-06-05 02:55:01 +00:00
|
|
|
if (Symbol != Obj.end_symbols())
|
|
|
|
Symbol->getName(TargetName);
|
2014-03-21 20:28:42 +00:00
|
|
|
DEBUG(dbgs() << "\t\tRelType: " << RelType << " Addend: " << Addend
|
|
|
|
<< " TargetName: " << TargetName << "\n");
|
2012-05-01 10:41:12 +00:00
|
|
|
RelocationValueRef Value;
|
|
|
|
// First search for the symbol in the local symbol table
|
2013-06-05 02:55:01 +00:00
|
|
|
SymbolTableMap::const_iterator lsi = Symbols.end();
|
|
|
|
SymbolRef::Type SymType = SymbolRef::ST_Unknown;
|
|
|
|
if (Symbol != Obj.end_symbols()) {
|
|
|
|
lsi = Symbols.find(TargetName.data());
|
|
|
|
Symbol->getType(SymType);
|
|
|
|
}
|
2012-03-30 16:45:19 +00:00
|
|
|
if (lsi != Symbols.end()) {
|
|
|
|
Value.SectionID = lsi->second.first;
|
2013-08-19 23:27:43 +00:00
|
|
|
Value.Offset = lsi->second.second;
|
2013-04-05 13:29:04 +00:00
|
|
|
Value.Addend = lsi->second.second + Addend;
|
2012-03-30 16:45:19 +00:00
|
|
|
} else {
|
2012-05-01 10:41:12 +00:00
|
|
|
// Search for the symbol in the global symbol table
|
2013-06-05 02:55:01 +00:00
|
|
|
SymbolTableMap::const_iterator gsi = GlobalSymbolTable.end();
|
|
|
|
if (Symbol != Obj.end_symbols())
|
|
|
|
gsi = GlobalSymbolTable.find(TargetName.data());
|
2012-05-01 06:58:59 +00:00
|
|
|
if (gsi != GlobalSymbolTable.end()) {
|
2012-03-30 16:45:19 +00:00
|
|
|
Value.SectionID = gsi->second.first;
|
2013-08-19 23:27:43 +00:00
|
|
|
Value.Offset = gsi->second.second;
|
2013-04-05 13:29:04 +00:00
|
|
|
Value.Addend = gsi->second.second + Addend;
|
2012-03-30 16:45:19 +00:00
|
|
|
} else {
|
|
|
|
switch (SymType) {
|
2014-03-21 20:28:42 +00:00
|
|
|
case SymbolRef::ST_Debug: {
|
|
|
|
// TODO: Now ELF SymbolRef::ST_Debug = STT_SECTION, it's not obviously
|
|
|
|
// and can be changed by another developers. Maybe best way is add
|
|
|
|
// a new symbol type ST_Section to SymbolRef and use it.
|
|
|
|
section_iterator si(Obj.end_sections());
|
|
|
|
Symbol->getSection(si);
|
|
|
|
if (si == Obj.end_sections())
|
|
|
|
llvm_unreachable("Symbol section not found, bad object file format!");
|
|
|
|
DEBUG(dbgs() << "\t\tThis is section symbol\n");
|
|
|
|
// Default to 'true' in case isText fails (though it never does).
|
|
|
|
bool isCode = true;
|
|
|
|
si->isText(isCode);
|
|
|
|
Value.SectionID = findOrEmitSection(Obj, (*si), isCode, ObjSectionToID);
|
|
|
|
Value.Addend = Addend;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case SymbolRef::ST_Data:
|
|
|
|
case SymbolRef::ST_Unknown: {
|
|
|
|
Value.SymbolName = TargetName.data();
|
|
|
|
Value.Addend = Addend;
|
|
|
|
|
|
|
|
// Absolute relocations will have a zero symbol ID (STN_UNDEF), which
|
|
|
|
// will manifest here as a NULL symbol name.
|
|
|
|
// We can set this as a valid (but empty) symbol name, and rely
|
|
|
|
// on addRelocationForSymbol to handle this.
|
|
|
|
if (!Value.SymbolName)
|
|
|
|
Value.SymbolName = "";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
llvm_unreachable("Unresolved symbol type!");
|
|
|
|
break;
|
2012-03-30 16:45:19 +00:00
|
|
|
}
|
|
|
|
}
|
2012-01-16 08:56:09 +00:00
|
|
|
}
|
2013-04-29 14:44:23 +00:00
|
|
|
uint64_t Offset;
|
2014-03-21 07:26:41 +00:00
|
|
|
Check(RelI->getOffset(Offset));
|
2013-04-29 14:44:23 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
DEBUG(dbgs() << "\t\tSectionID: " << SectionID << " Offset: " << Offset
|
2012-03-30 16:45:19 +00:00
|
|
|
<< "\n");
|
2014-07-23 12:32:47 +00:00
|
|
|
if ((Arch == Triple::aarch64 || Arch == Triple::aarch64_be) &&
|
2014-03-21 20:28:42 +00:00
|
|
|
(RelType == ELF::R_AARCH64_CALL26 || RelType == ELF::R_AARCH64_JUMP26)) {
|
2013-05-04 20:14:09 +00:00
|
|
|
// This is an AArch64 branch relocation, need to use a stub function.
|
|
|
|
DEBUG(dbgs() << "\t\tThis is an AArch64 branch relocation.");
|
|
|
|
SectionEntry &Section = Sections[SectionID];
|
|
|
|
|
|
|
|
// Look for an existing stub.
|
|
|
|
StubMap::const_iterator i = Stubs.find(Value);
|
|
|
|
if (i != Stubs.end()) {
|
2014-03-21 20:28:42 +00:00
|
|
|
resolveRelocation(Section, Offset, (uint64_t)Section.Address + i->second,
|
|
|
|
RelType, 0);
|
2013-05-04 20:14:09 +00:00
|
|
|
DEBUG(dbgs() << " Stub function found\n");
|
|
|
|
} else {
|
|
|
|
// Create a new stub function.
|
|
|
|
DEBUG(dbgs() << " Create a new stub function\n");
|
|
|
|
Stubs[Value] = Section.StubOffset;
|
2014-03-21 20:28:42 +00:00
|
|
|
uint8_t *StubTargetAddr =
|
|
|
|
createStubFunction(Section.Address + Section.StubOffset);
|
2013-05-04 20:14:09 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
RelocationEntry REmovz_g3(SectionID, StubTargetAddr - Section.Address,
|
2014-09-07 04:13:13 +00:00
|
|
|
ELF::R_AARCH64_MOVW_UABS_G3, Value.Addend);
|
2014-03-21 20:28:42 +00:00
|
|
|
RelocationEntry REmovk_g2(SectionID, StubTargetAddr - Section.Address + 4,
|
2014-09-07 04:13:13 +00:00
|
|
|
ELF::R_AARCH64_MOVW_UABS_G2_NC, Value.Addend);
|
2014-03-21 20:28:42 +00:00
|
|
|
RelocationEntry REmovk_g1(SectionID, StubTargetAddr - Section.Address + 8,
|
2014-09-07 04:13:13 +00:00
|
|
|
ELF::R_AARCH64_MOVW_UABS_G1_NC, Value.Addend);
|
2013-05-04 20:14:09 +00:00
|
|
|
RelocationEntry REmovk_g0(SectionID,
|
|
|
|
StubTargetAddr - Section.Address + 12,
|
|
|
|
ELF::R_AARCH64_MOVW_UABS_G0_NC, Value.Addend);
|
|
|
|
|
|
|
|
if (Value.SymbolName) {
|
|
|
|
addRelocationForSymbol(REmovz_g3, Value.SymbolName);
|
|
|
|
addRelocationForSymbol(REmovk_g2, Value.SymbolName);
|
|
|
|
addRelocationForSymbol(REmovk_g1, Value.SymbolName);
|
|
|
|
addRelocationForSymbol(REmovk_g0, Value.SymbolName);
|
|
|
|
} else {
|
|
|
|
addRelocationForSection(REmovz_g3, Value.SectionID);
|
|
|
|
addRelocationForSection(REmovk_g2, Value.SectionID);
|
|
|
|
addRelocationForSection(REmovk_g1, Value.SectionID);
|
|
|
|
addRelocationForSection(REmovk_g0, Value.SectionID);
|
|
|
|
}
|
|
|
|
resolveRelocation(Section, Offset,
|
2014-03-21 20:28:42 +00:00
|
|
|
(uint64_t)Section.Address + Section.StubOffset, RelType,
|
|
|
|
0);
|
2013-05-04 20:14:09 +00:00
|
|
|
Section.StubOffset += getMaxStubSize();
|
|
|
|
}
|
|
|
|
} else if (Arch == Triple::arm &&
|
2014-03-21 20:28:42 +00:00
|
|
|
(RelType == ELF::R_ARM_PC24 || RelType == ELF::R_ARM_CALL ||
|
|
|
|
RelType == ELF::R_ARM_JUMP24)) {
|
2012-03-30 16:45:19 +00:00
|
|
|
// This is an ARM branch relocation, need to use a stub function.
|
|
|
|
DEBUG(dbgs() << "\t\tThis is an ARM branch relocation.");
|
2013-04-29 14:44:23 +00:00
|
|
|
SectionEntry &Section = Sections[SectionID];
|
2012-03-30 16:45:19 +00:00
|
|
|
|
2012-10-23 17:19:15 +00:00
|
|
|
// Look for an existing stub.
|
2012-03-30 16:45:19 +00:00
|
|
|
StubMap::const_iterator i = Stubs.find(Value);
|
|
|
|
if (i != Stubs.end()) {
|
2014-03-21 20:28:42 +00:00
|
|
|
resolveRelocation(Section, Offset, (uint64_t)Section.Address + i->second,
|
|
|
|
RelType, 0);
|
2012-03-30 16:45:19 +00:00
|
|
|
DEBUG(dbgs() << " Stub function found\n");
|
|
|
|
} else {
|
|
|
|
// Create a new stub function.
|
|
|
|
DEBUG(dbgs() << " Create a new stub function\n");
|
|
|
|
Stubs[Value] = Section.StubOffset;
|
2014-03-21 20:28:42 +00:00
|
|
|
uint8_t *StubTargetAddr =
|
|
|
|
createStubFunction(Section.Address + Section.StubOffset);
|
2013-04-29 14:44:23 +00:00
|
|
|
RelocationEntry RE(SectionID, StubTargetAddr - Section.Address,
|
2013-05-28 19:48:19 +00:00
|
|
|
ELF::R_ARM_PRIVATE_0, Value.Addend);
|
2012-05-01 10:41:12 +00:00
|
|
|
if (Value.SymbolName)
|
|
|
|
addRelocationForSymbol(RE, Value.SymbolName);
|
|
|
|
else
|
|
|
|
addRelocationForSection(RE, Value.SectionID);
|
|
|
|
|
2013-04-29 14:44:23 +00:00
|
|
|
resolveRelocation(Section, Offset,
|
2014-03-21 20:28:42 +00:00
|
|
|
(uint64_t)Section.Address + Section.StubOffset, RelType,
|
|
|
|
0);
|
2012-03-30 16:45:19 +00:00
|
|
|
Section.StubOffset += getMaxStubSize();
|
|
|
|
}
|
2012-12-03 23:12:19 +00:00
|
|
|
} else if ((Arch == Triple::mipsel || Arch == Triple::mips) &&
|
|
|
|
RelType == ELF::R_MIPS_26) {
|
2012-08-17 21:28:04 +00:00
|
|
|
// This is an Mips branch relocation, need to use a stub function.
|
|
|
|
DEBUG(dbgs() << "\t\tThis is a Mips branch relocation.");
|
2013-04-29 14:44:23 +00:00
|
|
|
SectionEntry &Section = Sections[SectionID];
|
|
|
|
uint8_t *Target = Section.Address + Offset;
|
2012-08-17 21:28:04 +00:00
|
|
|
uint32_t *TargetAddress = (uint32_t *)Target;
|
|
|
|
|
|
|
|
// Extract the addend from the instruction.
|
|
|
|
uint32_t Addend = ((*TargetAddress) & 0x03ffffff) << 2;
|
|
|
|
|
|
|
|
Value.Addend += Addend;
|
|
|
|
|
|
|
|
// Look up for existing stub.
|
|
|
|
StubMap::const_iterator i = Stubs.find(Value);
|
|
|
|
if (i != Stubs.end()) {
|
2013-11-19 21:56:00 +00:00
|
|
|
RelocationEntry RE(SectionID, Offset, RelType, i->second);
|
|
|
|
addRelocationForSection(RE, SectionID);
|
2012-08-17 21:28:04 +00:00
|
|
|
DEBUG(dbgs() << " Stub function found\n");
|
|
|
|
} else {
|
|
|
|
// Create a new stub function.
|
|
|
|
DEBUG(dbgs() << " Create a new stub function\n");
|
|
|
|
Stubs[Value] = Section.StubOffset;
|
2014-03-21 20:28:42 +00:00
|
|
|
uint8_t *StubTargetAddr =
|
|
|
|
createStubFunction(Section.Address + Section.StubOffset);
|
2012-08-17 21:28:04 +00:00
|
|
|
|
|
|
|
// Creating Hi and Lo relocations for the filled stub instructions.
|
2014-03-21 20:28:42 +00:00
|
|
|
RelocationEntry REHi(SectionID, StubTargetAddr - Section.Address,
|
2013-07-24 01:58:40 +00:00
|
|
|
ELF::R_MIPS_UNUSED1, Value.Addend);
|
2014-03-21 20:28:42 +00:00
|
|
|
RelocationEntry RELo(SectionID, StubTargetAddr - Section.Address + 4,
|
2013-07-24 01:58:40 +00:00
|
|
|
ELF::R_MIPS_UNUSED2, Value.Addend);
|
2012-08-17 21:28:04 +00:00
|
|
|
|
|
|
|
if (Value.SymbolName) {
|
|
|
|
addRelocationForSymbol(REHi, Value.SymbolName);
|
|
|
|
addRelocationForSymbol(RELo, Value.SymbolName);
|
|
|
|
} else {
|
|
|
|
addRelocationForSection(REHi, Value.SectionID);
|
|
|
|
addRelocationForSection(RELo, Value.SectionID);
|
|
|
|
}
|
|
|
|
|
2013-11-19 21:56:00 +00:00
|
|
|
RelocationEntry RE(SectionID, Offset, RelType, Section.StubOffset);
|
|
|
|
addRelocationForSection(RE, SectionID);
|
2012-08-17 21:28:04 +00:00
|
|
|
Section.StubOffset += getMaxStubSize();
|
|
|
|
}
|
2013-07-26 01:35:43 +00:00
|
|
|
} else if (Arch == Triple::ppc64 || Arch == Triple::ppc64le) {
|
2012-10-25 13:13:48 +00:00
|
|
|
if (RelType == ELF::R_PPC64_REL24) {
|
2014-07-20 23:53:14 +00:00
|
|
|
// Determine ABI variant in use for this object.
|
|
|
|
unsigned AbiVariant;
|
|
|
|
Obj.getObjectFile()->getPlatformFlags(AbiVariant);
|
|
|
|
AbiVariant &= ELF::EF_PPC64_ABI;
|
2012-10-25 13:13:48 +00:00
|
|
|
// A PPC branch relocation will need a stub function if the target is
|
|
|
|
// an external symbol (Symbol::ST_Unknown) or if the target address
|
|
|
|
// is not within the signed 24-bits branch address.
|
2013-04-29 14:44:23 +00:00
|
|
|
SectionEntry &Section = Sections[SectionID];
|
|
|
|
uint8_t *Target = Section.Address + Offset;
|
2012-10-25 13:13:48 +00:00
|
|
|
bool RangeOverflow = false;
|
|
|
|
if (SymType != SymbolRef::ST_Unknown) {
|
2014-07-20 23:53:14 +00:00
|
|
|
if (AbiVariant != 2) {
|
|
|
|
// In the ELFv1 ABI, a function call may point to the .opd entry,
|
|
|
|
// so the final symbol value is calculated based on the relocation
|
|
|
|
// values in the .opd section.
|
|
|
|
findOPDEntrySection(Obj, ObjSectionToID, Value);
|
|
|
|
} else {
|
|
|
|
// In the ELFv2 ABI, a function symbol may provide a local entry
|
|
|
|
// point, which must be used for direct calls.
|
|
|
|
uint8_t SymOther;
|
|
|
|
Symbol->getOther(SymOther);
|
|
|
|
Value.Addend += ELF::decodePPC64LocalEntryOffset(SymOther);
|
|
|
|
}
|
2012-10-25 13:13:48 +00:00
|
|
|
uint8_t *RelocTarget = Sections[Value.SectionID].Address + Value.Addend;
|
|
|
|
int32_t delta = static_cast<int32_t>(Target - RelocTarget);
|
|
|
|
// If it is within 24-bits branch range, just set the branch target
|
|
|
|
if (SignExtend32<24>(delta) == delta) {
|
2013-04-29 14:44:23 +00:00
|
|
|
RelocationEntry RE(SectionID, Offset, RelType, Value.Addend);
|
2012-10-25 13:13:48 +00:00
|
|
|
if (Value.SymbolName)
|
|
|
|
addRelocationForSymbol(RE, Value.SymbolName);
|
|
|
|
else
|
|
|
|
addRelocationForSection(RE, Value.SectionID);
|
|
|
|
} else {
|
|
|
|
RangeOverflow = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (SymType == SymbolRef::ST_Unknown || RangeOverflow == true) {
|
|
|
|
// It is an external symbol (SymbolRef::ST_Unknown) or within a range
|
|
|
|
// larger than 24-bits.
|
|
|
|
StubMap::const_iterator i = Stubs.find(Value);
|
|
|
|
if (i != Stubs.end()) {
|
|
|
|
// Symbol function stub already created, just relocate to it
|
2013-04-29 14:44:23 +00:00
|
|
|
resolveRelocation(Section, Offset,
|
2012-11-02 19:45:23 +00:00
|
|
|
(uint64_t)Section.Address + i->second, RelType, 0);
|
2012-10-25 13:13:48 +00:00
|
|
|
DEBUG(dbgs() << " Stub function found\n");
|
|
|
|
} else {
|
|
|
|
// Create a new stub function.
|
|
|
|
DEBUG(dbgs() << " Create a new stub function\n");
|
|
|
|
Stubs[Value] = Section.StubOffset;
|
2014-03-21 20:28:42 +00:00
|
|
|
uint8_t *StubTargetAddr =
|
2014-07-20 23:53:14 +00:00
|
|
|
createStubFunction(Section.Address + Section.StubOffset,
|
|
|
|
AbiVariant);
|
2013-04-29 14:44:23 +00:00
|
|
|
RelocationEntry RE(SectionID, StubTargetAddr - Section.Address,
|
2012-10-25 13:13:48 +00:00
|
|
|
ELF::R_PPC64_ADDR64, Value.Addend);
|
|
|
|
|
|
|
|
// Generates the 64-bits address loads as exemplified in section
|
2014-06-20 18:17:56 +00:00
|
|
|
// 4.5.1 in PPC64 ELF ABI. Note that the relocations need to
|
|
|
|
// apply to the low part of the instructions, so we have to update
|
|
|
|
// the offset according to the target endianness.
|
|
|
|
uint64_t StubRelocOffset = StubTargetAddr - Section.Address;
|
|
|
|
if (!IsTargetLittleEndian)
|
|
|
|
StubRelocOffset += 2;
|
|
|
|
|
|
|
|
RelocationEntry REhst(SectionID, StubRelocOffset + 0,
|
2012-10-25 13:13:48 +00:00
|
|
|
ELF::R_PPC64_ADDR16_HIGHEST, Value.Addend);
|
2014-06-20 18:17:56 +00:00
|
|
|
RelocationEntry REhr(SectionID, StubRelocOffset + 4,
|
2012-10-25 13:13:48 +00:00
|
|
|
ELF::R_PPC64_ADDR16_HIGHER, Value.Addend);
|
2014-06-20 18:17:56 +00:00
|
|
|
RelocationEntry REh(SectionID, StubRelocOffset + 12,
|
2012-10-25 13:13:48 +00:00
|
|
|
ELF::R_PPC64_ADDR16_HI, Value.Addend);
|
2014-06-20 18:17:56 +00:00
|
|
|
RelocationEntry REl(SectionID, StubRelocOffset + 16,
|
2012-10-25 13:13:48 +00:00
|
|
|
ELF::R_PPC64_ADDR16_LO, Value.Addend);
|
|
|
|
|
|
|
|
if (Value.SymbolName) {
|
|
|
|
addRelocationForSymbol(REhst, Value.SymbolName);
|
2014-03-21 20:28:42 +00:00
|
|
|
addRelocationForSymbol(REhr, Value.SymbolName);
|
|
|
|
addRelocationForSymbol(REh, Value.SymbolName);
|
|
|
|
addRelocationForSymbol(REl, Value.SymbolName);
|
2012-10-25 13:13:48 +00:00
|
|
|
} else {
|
|
|
|
addRelocationForSection(REhst, Value.SectionID);
|
2014-03-21 20:28:42 +00:00
|
|
|
addRelocationForSection(REhr, Value.SectionID);
|
|
|
|
addRelocationForSection(REh, Value.SectionID);
|
|
|
|
addRelocationForSection(REl, Value.SectionID);
|
2012-10-25 13:13:48 +00:00
|
|
|
}
|
|
|
|
|
2013-04-29 14:44:23 +00:00
|
|
|
resolveRelocation(Section, Offset,
|
2012-11-02 19:45:23 +00:00
|
|
|
(uint64_t)Section.Address + Section.StubOffset,
|
|
|
|
RelType, 0);
|
2012-10-25 13:13:48 +00:00
|
|
|
Section.StubOffset += getMaxStubSize();
|
|
|
|
}
|
2014-07-20 23:53:14 +00:00
|
|
|
if (SymType == SymbolRef::ST_Unknown) {
|
2014-03-11 15:26:27 +00:00
|
|
|
// Restore the TOC for external calls
|
2014-07-20 23:53:14 +00:00
|
|
|
if (AbiVariant == 2)
|
|
|
|
writeInt32BE(Target + 4, 0xE8410018); // ld r2,28(r1)
|
|
|
|
else
|
|
|
|
writeInt32BE(Target + 4, 0xE8410028); // ld r2,40(r1)
|
|
|
|
}
|
2012-10-25 13:13:48 +00:00
|
|
|
}
|
[RuntimeDyld, PowerPC] Fix/improve handling of TOC relocations
Current PPC64 RuntimeDyld code to handle TOC relocations has two
problems:
- With recent linkers, in addition to the relocations that implicitly
refer to the TOC base (R_PPC64_TOC*), you can now also use the .TOC.
magic symbol with any other relocation to refer to the TOC base
explicitly. This isn't currently used much in ELFv1 code (although
it could be), but it is essential in ELFv2 code.
- In a complex JIT environment with multiple modules, each module may
have its own .toc section, and TOC relocations in one module must
refer to *its own* TOC section. The current findPPC64TOC implementation
does not correctly implement this; in fact, it will always return the
address of the first TOC section it finds anywhere. (Note that at the
time findPPC64TOC is called, we don't even *know* which module the
relocation originally resided in, so it is not even possible to fix
this routine as-is.)
This commit fixes both problems by handling TOC relocations earlier, in
processRelocationRef. To do this, I've removed the findPPC64TOC routine
and replaced it by a new routine findPPC64TOCSection, which works
analogously to findOPDEntrySection in scanning the sections of the
ObjImage provided by its caller, processRelocationRef. This solves the
issue of finding the correct TOC section associated with the current
module.
This makes it straightforward to implement both R_PPC64_TOC relocations,
and relocations explicitly refering to the .TOC. symbol, directly in
processRelocationRef. There is now a new problem in implementing the
R_PPC64_TOC16* relocations, because those can now in theory involve
*three* different sections: the relocation may be applied in section A,
refer explicitly to a symbol in section B, and refer implicitly to the
TOC section C. The final processing of the relocation thus may only
happen after all three of these sections have been assigned final
addresses. There is currently no obvious means to implement this in
its general form with the common-code RuntimeDyld infrastructure.
Fortunately, ppc64 code usually makes no use of this most general form;
in fact, TOC16 relocations are only ever generated by LLVM for symbols
residing themselves in the TOC, which means "section B" == "section C"
in the above terminology. This special case can easily be handled with
the current infrastructure, and that is what this patch does.
[ Unhandled cases result in an explicit error, unlike the current code
which silently returns the wrong TOC base address ... ]
This patch makes the JIT work on both BE and LE (ELFv2 requires
additional patches, of course), and allowed me to successfully run
complex JIT scenarios (via mesa/llvmpipe).
Reviewed by Hal Finkel.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@211885 91177308-0d34-0410-b5e6-96231b3b80d8
2014-06-27 10:32:14 +00:00
|
|
|
} else if (RelType == ELF::R_PPC64_TOC16 ||
|
|
|
|
RelType == ELF::R_PPC64_TOC16_DS ||
|
|
|
|
RelType == ELF::R_PPC64_TOC16_LO ||
|
|
|
|
RelType == ELF::R_PPC64_TOC16_LO_DS ||
|
|
|
|
RelType == ELF::R_PPC64_TOC16_HI ||
|
|
|
|
RelType == ELF::R_PPC64_TOC16_HA) {
|
|
|
|
// These relocations are supposed to subtract the TOC address from
|
|
|
|
// the final value. This does not fit cleanly into the RuntimeDyld
|
|
|
|
// scheme, since there may be *two* sections involved in determining
|
|
|
|
// the relocation value (the section of the symbol refered to by the
|
|
|
|
// relocation, and the TOC section associated with the current module).
|
|
|
|
//
|
|
|
|
// Fortunately, these relocations are currently only ever generated
|
|
|
|
// refering to symbols that themselves reside in the TOC, which means
|
|
|
|
// that the two sections are actually the same. Thus they cancel out
|
|
|
|
// and we can immediately resolve the relocation right now.
|
|
|
|
switch (RelType) {
|
|
|
|
case ELF::R_PPC64_TOC16: RelType = ELF::R_PPC64_ADDR16; break;
|
|
|
|
case ELF::R_PPC64_TOC16_DS: RelType = ELF::R_PPC64_ADDR16_DS; break;
|
|
|
|
case ELF::R_PPC64_TOC16_LO: RelType = ELF::R_PPC64_ADDR16_LO; break;
|
|
|
|
case ELF::R_PPC64_TOC16_LO_DS: RelType = ELF::R_PPC64_ADDR16_LO_DS; break;
|
|
|
|
case ELF::R_PPC64_TOC16_HI: RelType = ELF::R_PPC64_ADDR16_HI; break;
|
|
|
|
case ELF::R_PPC64_TOC16_HA: RelType = ELF::R_PPC64_ADDR16_HA; break;
|
|
|
|
default: llvm_unreachable("Wrong relocation type.");
|
|
|
|
}
|
|
|
|
|
|
|
|
RelocationValueRef TOCValue;
|
|
|
|
findPPC64TOCSection(Obj, ObjSectionToID, TOCValue);
|
|
|
|
if (Value.SymbolName || Value.SectionID != TOCValue.SectionID)
|
|
|
|
llvm_unreachable("Unsupported TOC relocation.");
|
|
|
|
Value.Addend -= TOCValue.Addend;
|
|
|
|
resolveRelocation(Sections[SectionID], Offset, Value.Addend, RelType, 0);
|
2012-10-25 13:13:48 +00:00
|
|
|
} else {
|
[RuntimeDyld, PowerPC] Fix/improve handling of TOC relocations
Current PPC64 RuntimeDyld code to handle TOC relocations has two
problems:
- With recent linkers, in addition to the relocations that implicitly
refer to the TOC base (R_PPC64_TOC*), you can now also use the .TOC.
magic symbol with any other relocation to refer to the TOC base
explicitly. This isn't currently used much in ELFv1 code (although
it could be), but it is essential in ELFv2 code.
- In a complex JIT environment with multiple modules, each module may
have its own .toc section, and TOC relocations in one module must
refer to *its own* TOC section. The current findPPC64TOC implementation
does not correctly implement this; in fact, it will always return the
address of the first TOC section it finds anywhere. (Note that at the
time findPPC64TOC is called, we don't even *know* which module the
relocation originally resided in, so it is not even possible to fix
this routine as-is.)
This commit fixes both problems by handling TOC relocations earlier, in
processRelocationRef. To do this, I've removed the findPPC64TOC routine
and replaced it by a new routine findPPC64TOCSection, which works
analogously to findOPDEntrySection in scanning the sections of the
ObjImage provided by its caller, processRelocationRef. This solves the
issue of finding the correct TOC section associated with the current
module.
This makes it straightforward to implement both R_PPC64_TOC relocations,
and relocations explicitly refering to the .TOC. symbol, directly in
processRelocationRef. There is now a new problem in implementing the
R_PPC64_TOC16* relocations, because those can now in theory involve
*three* different sections: the relocation may be applied in section A,
refer explicitly to a symbol in section B, and refer implicitly to the
TOC section C. The final processing of the relocation thus may only
happen after all three of these sections have been assigned final
addresses. There is currently no obvious means to implement this in
its general form with the common-code RuntimeDyld infrastructure.
Fortunately, ppc64 code usually makes no use of this most general form;
in fact, TOC16 relocations are only ever generated by LLVM for symbols
residing themselves in the TOC, which means "section B" == "section C"
in the above terminology. This special case can easily be handled with
the current infrastructure, and that is what this patch does.
[ Unhandled cases result in an explicit error, unlike the current code
which silently returns the wrong TOC base address ... ]
This patch makes the JIT work on both BE and LE (ELFv2 requires
additional patches, of course), and allowed me to successfully run
complex JIT scenarios (via mesa/llvmpipe).
Reviewed by Hal Finkel.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@211885 91177308-0d34-0410-b5e6-96231b3b80d8
2014-06-27 10:32:14 +00:00
|
|
|
// There are two ways to refer to the TOC address directly: either
|
|
|
|
// via a ELF::R_PPC64_TOC relocation (where both symbol and addend are
|
|
|
|
// ignored), or via any relocation that refers to the magic ".TOC."
|
|
|
|
// symbols (in which case the addend is respected).
|
|
|
|
if (RelType == ELF::R_PPC64_TOC) {
|
|
|
|
RelType = ELF::R_PPC64_ADDR64;
|
|
|
|
findPPC64TOCSection(Obj, ObjSectionToID, Value);
|
|
|
|
} else if (TargetName == ".TOC.") {
|
|
|
|
findPPC64TOCSection(Obj, ObjSectionToID, Value);
|
|
|
|
Value.Addend += Addend;
|
|
|
|
}
|
|
|
|
|
2013-04-29 14:44:23 +00:00
|
|
|
RelocationEntry RE(SectionID, Offset, RelType, Value.Addend);
|
2013-08-16 18:54:26 +00:00
|
|
|
|
|
|
|
if (Value.SymbolName)
|
2012-10-25 13:13:48 +00:00
|
|
|
addRelocationForSymbol(RE, Value.SymbolName);
|
|
|
|
else
|
|
|
|
addRelocationForSection(RE, Value.SectionID);
|
|
|
|
}
|
2013-05-03 14:15:35 +00:00
|
|
|
} else if (Arch == Triple::systemz &&
|
2014-03-21 20:28:42 +00:00
|
|
|
(RelType == ELF::R_390_PLT32DBL || RelType == ELF::R_390_GOTENT)) {
|
2013-05-03 14:15:35 +00:00
|
|
|
// Create function stubs for both PLT and GOT references, regardless of
|
|
|
|
// whether the GOT reference is to data or code. The stub contains the
|
|
|
|
// full address of the symbol, as needed by GOT references, and the
|
|
|
|
// executable part only adds an overhead of 8 bytes.
|
|
|
|
//
|
|
|
|
// We could try to conserve space by allocating the code and data
|
|
|
|
// parts of the stub separately. However, as things stand, we allocate
|
|
|
|
// a stub for every relocation, so using a GOT in JIT code should be
|
|
|
|
// no less space efficient than using an explicit constant pool.
|
|
|
|
DEBUG(dbgs() << "\t\tThis is a SystemZ indirect relocation.");
|
|
|
|
SectionEntry &Section = Sections[SectionID];
|
|
|
|
|
|
|
|
// Look for an existing stub.
|
|
|
|
StubMap::const_iterator i = Stubs.find(Value);
|
|
|
|
uintptr_t StubAddress;
|
|
|
|
if (i != Stubs.end()) {
|
|
|
|
StubAddress = uintptr_t(Section.Address) + i->second;
|
|
|
|
DEBUG(dbgs() << " Stub function found\n");
|
|
|
|
} else {
|
|
|
|
// Create a new stub function.
|
|
|
|
DEBUG(dbgs() << " Create a new stub function\n");
|
|
|
|
|
|
|
|
uintptr_t BaseAddress = uintptr_t(Section.Address);
|
|
|
|
uintptr_t StubAlignment = getStubAlignment();
|
2014-03-21 20:28:42 +00:00
|
|
|
StubAddress = (BaseAddress + Section.StubOffset + StubAlignment - 1) &
|
|
|
|
-StubAlignment;
|
2013-05-03 14:15:35 +00:00
|
|
|
unsigned StubOffset = StubAddress - BaseAddress;
|
|
|
|
|
|
|
|
Stubs[Value] = StubOffset;
|
|
|
|
createStubFunction((uint8_t *)StubAddress);
|
2014-03-21 20:28:42 +00:00
|
|
|
RelocationEntry RE(SectionID, StubOffset + 8, ELF::R_390_64,
|
2014-08-25 23:33:48 +00:00
|
|
|
Value.Offset);
|
2013-05-03 14:15:35 +00:00
|
|
|
if (Value.SymbolName)
|
|
|
|
addRelocationForSymbol(RE, Value.SymbolName);
|
|
|
|
else
|
|
|
|
addRelocationForSection(RE, Value.SectionID);
|
|
|
|
Section.StubOffset = StubOffset + getMaxStubSize();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (RelType == ELF::R_390_GOTENT)
|
2014-03-21 20:28:42 +00:00
|
|
|
resolveRelocation(Section, Offset, StubAddress + 8, ELF::R_390_PC32DBL,
|
|
|
|
Addend);
|
2013-05-03 14:15:35 +00:00
|
|
|
else
|
|
|
|
resolveRelocation(Section, Offset, StubAddress, RelType, Addend);
|
2013-08-19 23:27:43 +00:00
|
|
|
} else if (Arch == Triple::x86_64 && RelType == ELF::R_X86_64_PLT32) {
|
2014-03-21 20:28:42 +00:00
|
|
|
// The way the PLT relocations normally work is that the linker allocates
|
|
|
|
// the
|
2013-08-19 23:27:43 +00:00
|
|
|
// PLT and this relocation makes a PC-relative call into the PLT. The PLT
|
2014-03-21 20:28:42 +00:00
|
|
|
// entry will then jump to an address provided by the GOT. On first call,
|
|
|
|
// the
|
|
|
|
// GOT address will point back into PLT code that resolves the symbol. After
|
2013-08-19 23:27:43 +00:00
|
|
|
// the first call, the GOT entry points to the actual function.
|
|
|
|
//
|
|
|
|
// For local functions we're ignoring all of that here and just replacing
|
|
|
|
// the PLT32 relocation type with PC32, which will translate the relocation
|
|
|
|
// into a PC-relative call directly to the function. For external symbols we
|
|
|
|
// can't be sure the function will be within 2^32 bytes of the call site, so
|
|
|
|
// we need to create a stub, which calls into the GOT. This case is
|
|
|
|
// equivalent to the usual PLT implementation except that we use the stub
|
|
|
|
// mechanism in RuntimeDyld (which puts stubs at the end of the section)
|
|
|
|
// rather than allocating a PLT section.
|
|
|
|
if (Value.SymbolName) {
|
|
|
|
// This is a call to an external function.
|
|
|
|
// Look for an existing stub.
|
|
|
|
SectionEntry &Section = Sections[SectionID];
|
|
|
|
StubMap::const_iterator i = Stubs.find(Value);
|
|
|
|
uintptr_t StubAddress;
|
|
|
|
if (i != Stubs.end()) {
|
|
|
|
StubAddress = uintptr_t(Section.Address) + i->second;
|
|
|
|
DEBUG(dbgs() << " Stub function found\n");
|
|
|
|
} else {
|
|
|
|
// Create a new stub function (equivalent to a PLT entry).
|
|
|
|
DEBUG(dbgs() << " Create a new stub function\n");
|
|
|
|
|
|
|
|
uintptr_t BaseAddress = uintptr_t(Section.Address);
|
|
|
|
uintptr_t StubAlignment = getStubAlignment();
|
2014-03-21 20:28:42 +00:00
|
|
|
StubAddress = (BaseAddress + Section.StubOffset + StubAlignment - 1) &
|
|
|
|
-StubAlignment;
|
2013-08-19 23:27:43 +00:00
|
|
|
unsigned StubOffset = StubAddress - BaseAddress;
|
|
|
|
Stubs[Value] = StubOffset;
|
|
|
|
createStubFunction((uint8_t *)StubAddress);
|
|
|
|
|
|
|
|
// Create a GOT entry for the external function.
|
|
|
|
GOTEntries.push_back(Value);
|
|
|
|
|
|
|
|
// Make our stub function a relative call to the GOT entry.
|
2014-03-21 20:28:42 +00:00
|
|
|
RelocationEntry RE(SectionID, StubOffset + 2, ELF::R_X86_64_GOTPCREL,
|
|
|
|
-4);
|
2013-08-19 23:27:43 +00:00
|
|
|
addRelocationForSymbol(RE, Value.SymbolName);
|
|
|
|
|
|
|
|
// Bump our stub offset counter
|
|
|
|
Section.StubOffset = StubOffset + getMaxStubSize();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make the target call a call into the stub table.
|
2014-03-21 20:28:42 +00:00
|
|
|
resolveRelocation(Section, Offset, StubAddress, ELF::R_X86_64_PC32,
|
|
|
|
Addend);
|
2013-08-19 23:27:43 +00:00
|
|
|
} else {
|
|
|
|
RelocationEntry RE(SectionID, Offset, ELF::R_X86_64_PC32, Value.Addend,
|
|
|
|
Value.Offset);
|
|
|
|
addRelocationForSection(RE, Value.SectionID);
|
|
|
|
}
|
2012-05-01 10:41:12 +00:00
|
|
|
} else {
|
2013-08-19 23:27:43 +00:00
|
|
|
if (Arch == Triple::x86_64 && RelType == ELF::R_X86_64_GOTPCREL) {
|
|
|
|
GOTEntries.push_back(Value);
|
|
|
|
}
|
|
|
|
RelocationEntry RE(SectionID, Offset, RelType, Value.Addend, Value.Offset);
|
2012-05-01 10:41:12 +00:00
|
|
|
if (Value.SymbolName)
|
|
|
|
addRelocationForSymbol(RE, Value.SymbolName);
|
|
|
|
else
|
|
|
|
addRelocationForSection(RE, Value.SectionID);
|
|
|
|
}
|
2014-03-21 07:26:41 +00:00
|
|
|
return ++RelI;
|
2012-01-16 22:26:39 +00:00
|
|
|
}
|
|
|
|
|
2013-08-19 23:27:43 +00:00
|
|
|
void RuntimeDyldELF::updateGOTEntries(StringRef Name, uint64_t Addr) {
|
2013-10-05 01:52:09 +00:00
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
SmallVectorImpl<std::pair<SID, GOTRelocations>>::iterator it;
|
|
|
|
SmallVectorImpl<std::pair<SID, GOTRelocations>>::iterator end = GOTs.end();
|
2013-10-05 01:52:09 +00:00
|
|
|
|
|
|
|
for (it = GOTs.begin(); it != end; ++it) {
|
|
|
|
GOTRelocations &GOTEntries = it->second;
|
|
|
|
for (int i = 0, e = GOTEntries.size(); i != e; ++i) {
|
2014-04-24 06:44:33 +00:00
|
|
|
if (GOTEntries[i].SymbolName != nullptr &&
|
|
|
|
GOTEntries[i].SymbolName == Name) {
|
2013-10-05 01:52:09 +00:00
|
|
|
GOTEntries[i].Offset = Addr;
|
|
|
|
}
|
2013-08-19 23:27:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t RuntimeDyldELF::getGOTEntrySize() {
|
|
|
|
// We don't use the GOT in all of these cases, but it's essentially free
|
|
|
|
// to put them all here.
|
|
|
|
size_t Result = 0;
|
|
|
|
switch (Arch) {
|
|
|
|
case Triple::x86_64:
|
|
|
|
case Triple::aarch64:
|
2014-04-30 10:15:41 +00:00
|
|
|
case Triple::aarch64_be:
|
2013-08-19 23:27:43 +00:00
|
|
|
case Triple::ppc64:
|
|
|
|
case Triple::ppc64le:
|
|
|
|
case Triple::systemz:
|
|
|
|
Result = sizeof(uint64_t);
|
|
|
|
break;
|
|
|
|
case Triple::x86:
|
|
|
|
case Triple::arm:
|
|
|
|
case Triple::thumb:
|
|
|
|
case Triple::mips:
|
|
|
|
case Triple::mipsel:
|
|
|
|
Result = sizeof(uint32_t);
|
|
|
|
break;
|
2014-03-21 20:28:42 +00:00
|
|
|
default:
|
|
|
|
llvm_unreachable("Unsupported CPU type!");
|
2013-08-19 23:27:43 +00:00
|
|
|
}
|
|
|
|
return Result;
|
|
|
|
}
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t RuntimeDyldELF::findGOTEntry(uint64_t LoadAddress, uint64_t Offset) {
|
2013-08-19 23:27:43 +00:00
|
|
|
|
2013-10-05 01:52:09 +00:00
|
|
|
const size_t GOTEntrySize = getGOTEntrySize();
|
|
|
|
|
2014-03-21 20:28:42 +00:00
|
|
|
SmallVectorImpl<std::pair<SID, GOTRelocations>>::const_iterator it;
|
|
|
|
SmallVectorImpl<std::pair<SID, GOTRelocations>>::const_iterator end =
|
|
|
|
GOTs.end();
|
2013-08-19 23:27:43 +00:00
|
|
|
|
|
|
|
int GOTIndex = -1;
|
2013-10-05 01:52:09 +00:00
|
|
|
for (it = GOTs.begin(); it != end; ++it) {
|
|
|
|
SID GOTSectionID = it->first;
|
|
|
|
const GOTRelocations &GOTEntries = it->second;
|
|
|
|
|
|
|
|
// Find the matching entry in our vector.
|
|
|
|
uint64_t SymbolOffset = 0;
|
|
|
|
for (int i = 0, e = GOTEntries.size(); i != e; ++i) {
|
2014-04-24 06:44:33 +00:00
|
|
|
if (!GOTEntries[i].SymbolName) {
|
2013-10-05 01:52:09 +00:00
|
|
|
if (getSectionLoadAddress(GOTEntries[i].SectionID) == LoadAddress &&
|
|
|
|
GOTEntries[i].Offset == Offset) {
|
|
|
|
GOTIndex = i;
|
|
|
|
SymbolOffset = GOTEntries[i].Offset;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// GOT entries for external symbols use the addend as the address when
|
|
|
|
// the external symbol has been resolved.
|
|
|
|
if (GOTEntries[i].Offset == LoadAddress) {
|
|
|
|
GOTIndex = i;
|
|
|
|
// Don't use the Addend here. The relocation handler will use it.
|
|
|
|
break;
|
|
|
|
}
|
2013-08-19 23:27:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-05 01:52:09 +00:00
|
|
|
if (GOTIndex != -1) {
|
|
|
|
if (GOTEntrySize == sizeof(uint64_t)) {
|
2014-03-21 20:28:42 +00:00
|
|
|
uint64_t *LocalGOTAddr = (uint64_t *)getSectionAddress(GOTSectionID);
|
2013-10-05 01:52:09 +00:00
|
|
|
// Fill in this entry with the address of the symbol being referenced.
|
|
|
|
LocalGOTAddr[GOTIndex] = LoadAddress + SymbolOffset;
|
|
|
|
} else {
|
2014-03-21 20:28:42 +00:00
|
|
|
uint32_t *LocalGOTAddr = (uint32_t *)getSectionAddress(GOTSectionID);
|
2013-10-05 01:52:09 +00:00
|
|
|
// Fill in this entry with the address of the symbol being referenced.
|
|
|
|
LocalGOTAddr[GOTIndex] = (uint32_t)(LoadAddress + SymbolOffset);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Calculate the load address of this entry
|
|
|
|
return getSectionLoadAddress(GOTSectionID) + (GOTIndex * GOTEntrySize);
|
|
|
|
}
|
2013-08-19 23:27:43 +00:00
|
|
|
}
|
|
|
|
|
2013-10-05 01:52:09 +00:00
|
|
|
assert(GOTIndex != -1 && "Unable to find requested GOT entry.");
|
|
|
|
return 0;
|
2013-08-19 23:27:43 +00:00
|
|
|
}
|
|
|
|
|
2014-05-12 21:39:59 +00:00
|
|
|
void RuntimeDyldELF::finalizeLoad(ObjectImage &ObjImg,
|
|
|
|
ObjSectionToIDMap &SectionMap) {
|
2013-10-11 21:25:48 +00:00
|
|
|
// If necessary, allocate the global offset table
|
2013-10-05 01:52:09 +00:00
|
|
|
if (MemMgr) {
|
|
|
|
// Allocate the GOT if necessary
|
|
|
|
size_t numGOTEntries = GOTEntries.size();
|
|
|
|
if (numGOTEntries != 0) {
|
|
|
|
// Allocate memory for the section
|
|
|
|
unsigned SectionID = Sections.size();
|
|
|
|
size_t TotalSize = numGOTEntries * getGOTEntrySize();
|
|
|
|
uint8_t *Addr = MemMgr->allocateDataSection(TotalSize, getGOTEntrySize(),
|
|
|
|
SectionID, ".got", false);
|
|
|
|
if (!Addr)
|
|
|
|
report_fatal_error("Unable to allocate memory for GOT!");
|
|
|
|
|
|
|
|
GOTs.push_back(std::make_pair(SectionID, GOTEntries));
|
|
|
|
Sections.push_back(SectionEntry(".got", Addr, TotalSize, 0));
|
|
|
|
// For now, initialize all GOT entries to zero. We'll fill them in as
|
|
|
|
// needed when GOT-based relocations are applied.
|
|
|
|
memset(Addr, 0, TotalSize);
|
|
|
|
}
|
2014-03-21 20:28:42 +00:00
|
|
|
} else {
|
2013-10-05 01:52:09 +00:00
|
|
|
report_fatal_error("Unable to allocate memory for GOT!");
|
2013-08-19 23:27:43 +00:00
|
|
|
}
|
2013-10-11 21:25:48 +00:00
|
|
|
|
|
|
|
// Look for and record the EH frame section.
|
|
|
|
ObjSectionToIDMap::iterator i, e;
|
|
|
|
for (i = SectionMap.begin(), e = SectionMap.end(); i != e; ++i) {
|
|
|
|
const SectionRef &Section = i->first;
|
|
|
|
StringRef Name;
|
|
|
|
Section.getName(Name);
|
|
|
|
if (Name == ".eh_frame") {
|
|
|
|
UnregisteredEHFrameSections.push_back(i->second);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2013-08-19 23:27:43 +00:00
|
|
|
}
|
|
|
|
|
2012-10-02 21:18:39 +00:00
|
|
|
bool RuntimeDyldELF::isCompatibleFormat(const ObjectBuffer *Buffer) const {
|
|
|
|
if (Buffer->getBufferSize() < strlen(ELF::ElfMagic))
|
|
|
|
return false;
|
2014-03-21 20:28:42 +00:00
|
|
|
return (memcmp(Buffer->getBufferStart(), ELF::ElfMagic,
|
|
|
|
strlen(ELF::ElfMagic))) == 0;
|
2012-01-16 08:56:09 +00:00
|
|
|
}
|
2014-01-08 04:09:09 +00:00
|
|
|
|
|
|
|
bool RuntimeDyldELF::isCompatibleFile(const object::ObjectFile *Obj) const {
|
|
|
|
return Obj->isELF();
|
|
|
|
}
|
|
|
|
|
2012-01-16 08:56:09 +00:00
|
|
|
} // namespace llvm
|