blob: 01752cdc6a9da3c19fc5dca906341094d69205dd [file] [log] [blame]
Rui Ueyama411c63602015-05-28 19:09:30 +00001//===- Chunks.cpp ---------------------------------------------------------===//
2//
Chandler Carruth2946cd72019-01-19 08:50:56 +00003// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
Rui Ueyama411c63602015-05-28 19:09:30 +00006//
7//===----------------------------------------------------------------------===//
8
9#include "Chunks.h"
Amy Huang6f7483b2021-09-16 16:48:26 -070010#include "COFFLinkerContext.h"
Rui Ueyama411c63602015-05-28 19:09:30 +000011#include "InputFiles.h"
Amy Huang6f7483b2021-09-16 16:48:26 -070012#include "SymbolTable.h"
Rui Ueyama67fcd1a02015-08-05 19:51:28 +000013#include "Symbols.h"
Reid Klecknera1001b82017-06-28 17:06:35 +000014#include "Writer.h"
Dmitri Gribenkoaba43032022-07-23 15:14:14 +020015#include "llvm/ADT/STLExtras.h"
Elliot Goodrichb0abd482023-06-17 13:18:23 +010016#include "llvm/ADT/StringExtras.h"
Joe Loser1173ecf2022-09-09 12:43:07 -060017#include "llvm/ADT/Twine.h"
Zachary Turner264b5d92017-06-07 03:48:56 +000018#include "llvm/BinaryFormat/COFF.h"
Rui Ueyama411c63602015-05-28 19:09:30 +000019#include "llvm/Object/COFF.h"
Rui Ueyama411c63602015-05-28 19:09:30 +000020#include "llvm/Support/Debug.h"
21#include "llvm/Support/Endian.h"
22#include "llvm/Support/raw_ostream.h"
Rui Ueyama5e31d0b2015-06-20 07:25:45 +000023#include <algorithm>
Joe Loser1173ecf2022-09-09 12:43:07 -060024#include <iterator>
Rui Ueyama411c63602015-05-28 19:09:30 +000025
Rui Ueyamac6ea0572015-06-06 22:46:15 +000026using namespace llvm;
Rui Ueyama411c63602015-05-28 19:09:30 +000027using namespace llvm::object;
Jacek Caban71bbafb2024-12-05 13:07:41 +010028using namespace llvm::support;
Rui Ueyama411c63602015-05-28 19:09:30 +000029using namespace llvm::support::endian;
30using namespace llvm::COFF;
Rui Ueyamacd3f99b2015-07-24 23:51:14 +000031using llvm::support::ulittle32_t;
Rui Ueyama411c63602015-05-28 19:09:30 +000032
Nico Weber7c266412022-08-08 11:32:26 -040033namespace lld::coff {
Rui Ueyama411c63602015-05-28 19:09:30 +000034
Jacek Cabanfed8e382024-06-18 11:14:01 +020035SectionChunk::SectionChunk(ObjFile *f, const coff_section *h, Kind k)
36 : Chunk(k), file(f), header(h), repl(this) {
Fangrui Song2e2038b2019-07-16 08:26:38 +000037 // Initialize relocs.
Martin Storsjö33b71ec2021-04-29 14:06:24 +030038 if (file)
39 setRelocs(file->getCOFFObj()->getRelocations(header));
Reid Kleckner0a1b1d62019-05-03 20:17:14 +000040
Fangrui Song2e2038b2019-07-16 08:26:38 +000041 // Initialize sectionName.
Rui Ueyama136d27a2019-07-11 05:40:30 +000042 StringRef sectionName;
Martin Storsjö33b71ec2021-04-29 14:06:24 +030043 if (file) {
44 if (Expected<StringRef> e = file->getCOFFObj()->getSectionName(header))
45 sectionName = *e;
46 }
Rui Ueyama136d27a2019-07-11 05:40:30 +000047 sectionNameData = sectionName.data();
48 sectionNameSize = sectionName.size();
Rui Ueyama8b33f592015-06-10 04:21:47 +000049
Rui Ueyama136d27a2019-07-11 05:40:30 +000050 setAlignment(header->getAlignment());
Rui Ueyama4dbff202015-09-16 21:40:47 +000051
Rui Ueyama136d27a2019-07-11 05:40:30 +000052 hasData = !(header->Characteristics & IMAGE_SCN_CNT_UNINITIALIZED_DATA);
Reid Klecknera431dd72019-05-24 20:25:40 +000053
Reid Kleckner79ac99b2017-06-16 20:47:19 +000054 // If linker GC is disabled, every chunk starts out alive. If linker GC is
55 // enabled, treat non-comdat sections as roots. Generally optimized object
56 // files will be built with -ffunction-sections or /Gy, so most things worth
57 // stripping will be in a comdat.
Amy Huang5a58b192023-01-09 23:37:28 -050058 if (file)
Jacek Caban6b493ba2024-12-15 12:45:34 +010059 live = !file->symtab.ctx.config.doGC || !isCOMDAT();
Martin Storsjö33b71ec2021-04-29 14:06:24 +030060 else
61 live = true;
Rui Ueyama411c63602015-05-28 19:09:30 +000062}
63
Jacek Cabanf8f01b52025-04-11 16:13:46 +020064MachineTypes SectionChunk::getMachine() const {
65 MachineTypes machine = file->getMachineType();
66 // On ARM64EC, the IMAGE_SCN_GPREL flag is repurposed to indicate that section
67 // code is x86_64. This enables embedding x86_64 code within ARM64EC object
68 // files. MSVC uses this for export thunks in .exp files.
69 if (isArm64EC(machine) && (header->Characteristics & IMAGE_SCN_GPREL))
70 machine = AMD64;
71 return machine;
72}
73
Reid Klecknercc525c92019-04-02 22:11:58 +000074// SectionChunk is one of the most frequently allocated classes, so it is
75// important to keep it as compact as possible. As of this writing, the number
76// below is the size of this class on x64 platforms.
Reid Klecknera431dd72019-05-24 20:25:40 +000077static_assert(sizeof(SectionChunk) <= 88, "SectionChunk grew unexpectedly");
Reid Klecknercc525c92019-04-02 22:11:58 +000078
Rui Ueyama136d27a2019-07-11 05:40:30 +000079static void add16(uint8_t *p, int16_t v) { write16le(p, read16le(p) + v); }
80static void add32(uint8_t *p, int32_t v) { write32le(p, read32le(p) + v); }
81static void add64(uint8_t *p, int64_t v) { write64le(p, read64le(p) + v); }
82static void or16(uint8_t *p, uint16_t v) { write16le(p, read16le(p) | v); }
83static void or32(uint8_t *p, uint32_t v) { write32le(p, read32le(p) | v); }
Rui Ueyama42aa00b2015-06-25 00:33:38 +000084
Rui Ueyama03c7f3a2018-02-17 20:28:15 +000085// Verify that given sections are appropriate targets for SECREL
86// relocations. This check is relaxed because unfortunately debug
87// sections have section-relative relocations against absolute symbols.
Rui Ueyama136d27a2019-07-11 05:40:30 +000088static bool checkSecRel(const SectionChunk *sec, OutputSection *os) {
89 if (os)
Rui Ueyama03c7f3a2018-02-17 20:28:15 +000090 return true;
Rui Ueyama136d27a2019-07-11 05:40:30 +000091 if (sec->isCodeView())
Rui Ueyama03c7f3a2018-02-17 20:28:15 +000092 return false;
Martin Storsjo6c67e042018-08-22 11:34:58 +000093 error("SECREL relocation cannot be applied to absolute symbols");
94 return false;
Rui Ueyama03c7f3a2018-02-17 20:28:15 +000095}
96
Rui Ueyama136d27a2019-07-11 05:40:30 +000097static void applySecRel(const SectionChunk *sec, uint8_t *off,
98 OutputSection *os, uint64_t s) {
99 if (!checkSecRel(sec, os))
Rui Ueyama03c7f3a2018-02-17 20:28:15 +0000100 return;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000101 uint64_t secRel = s - os->getRVA();
102 if (secRel > UINT32_MAX) {
103 error("overflow in SECREL relocation in section: " + sec->getSectionName());
Shoaib Meenaie61ca352017-09-20 00:21:58 +0000104 return;
105 }
Rui Ueyama136d27a2019-07-11 05:40:30 +0000106 add32(off, secRel);
Reid Kleckner84564112017-06-22 23:33:04 +0000107}
108
Amy Huang5a58b192023-01-09 23:37:28 -0500109static void applySecIdx(uint8_t *off, OutputSection *os,
110 unsigned numOutputSections) {
111 // numOutputSections is the largest valid section index. Make sure that
112 // it fits in 16 bits.
113 assert(numOutputSections <= 0xffff && "size of outputSections is too big");
114
Rui Ueyamab3107472018-02-17 20:41:38 +0000115 // Absolute symbol doesn't have section index, but section index relocation
116 // against absolute symbol should be resolved to one plus the last output
117 // section index. This is required for compatibility with MSVC.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000118 if (os)
119 add16(off, os->sectionIndex);
Rui Ueyamab3107472018-02-17 20:41:38 +0000120 else
Amy Huang5a58b192023-01-09 23:37:28 -0500121 add16(off, numOutputSections + 1);
Reid Klecknera1001b82017-06-28 17:06:35 +0000122}
123
Rui Ueyama136d27a2019-07-11 05:40:30 +0000124void SectionChunk::applyRelX64(uint8_t *off, uint16_t type, OutputSection *os,
Amy Huang5a58b192023-01-09 23:37:28 -0500125 uint64_t s, uint64_t p,
126 uint64_t imageBase) const {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000127 switch (type) {
Amy Huang5a58b192023-01-09 23:37:28 -0500128 case IMAGE_REL_AMD64_ADDR32:
129 add32(off, s + imageBase);
130 break;
131 case IMAGE_REL_AMD64_ADDR64:
132 add64(off, s + imageBase);
133 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000134 case IMAGE_REL_AMD64_ADDR32NB: add32(off, s); break;
135 case IMAGE_REL_AMD64_REL32: add32(off, s - p - 4); break;
136 case IMAGE_REL_AMD64_REL32_1: add32(off, s - p - 5); break;
137 case IMAGE_REL_AMD64_REL32_2: add32(off, s - p - 6); break;
138 case IMAGE_REL_AMD64_REL32_3: add32(off, s - p - 7); break;
139 case IMAGE_REL_AMD64_REL32_4: add32(off, s - p - 8); break;
140 case IMAGE_REL_AMD64_REL32_5: add32(off, s - p - 9); break;
Amy Huang5a58b192023-01-09 23:37:28 -0500141 case IMAGE_REL_AMD64_SECTION:
Jacek Caban6b493ba2024-12-15 12:45:34 +0100142 applySecIdx(off, os, file->symtab.ctx.outputSections.size());
Amy Huang5a58b192023-01-09 23:37:28 -0500143 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000144 case IMAGE_REL_AMD64_SECREL: applySecRel(this, off, os, s); break;
Rui Ueyama661a4e7a2015-07-07 22:49:21 +0000145 default:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000146 error("unsupported relocation type 0x" + Twine::utohexstr(type) + " in " +
147 toString(file));
Rui Ueyama661a4e7a2015-07-07 22:49:21 +0000148 }
149}
150
Rui Ueyama136d27a2019-07-11 05:40:30 +0000151void SectionChunk::applyRelX86(uint8_t *off, uint16_t type, OutputSection *os,
Amy Huang5a58b192023-01-09 23:37:28 -0500152 uint64_t s, uint64_t p,
153 uint64_t imageBase) const {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000154 switch (type) {
Rui Ueyama11863b4a2015-07-08 01:45:29 +0000155 case IMAGE_REL_I386_ABSOLUTE: break;
Amy Huang5a58b192023-01-09 23:37:28 -0500156 case IMAGE_REL_I386_DIR32:
157 add32(off, s + imageBase);
158 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000159 case IMAGE_REL_I386_DIR32NB: add32(off, s); break;
160 case IMAGE_REL_I386_REL32: add32(off, s - p - 4); break;
Amy Huang5a58b192023-01-09 23:37:28 -0500161 case IMAGE_REL_I386_SECTION:
Jacek Caban6b493ba2024-12-15 12:45:34 +0100162 applySecIdx(off, os, file->symtab.ctx.outputSections.size());
Amy Huang5a58b192023-01-09 23:37:28 -0500163 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000164 case IMAGE_REL_I386_SECREL: applySecRel(this, off, os, s); break;
Rui Ueyama11863b4a2015-07-08 01:45:29 +0000165 default:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000166 error("unsupported relocation type 0x" + Twine::utohexstr(type) + " in " +
167 toString(file));
Rui Ueyama11863b4a2015-07-08 01:45:29 +0000168 }
169}
170
Rui Ueyama136d27a2019-07-11 05:40:30 +0000171static void applyMOV(uint8_t *off, uint16_t v) {
172 write16le(off, (read16le(off) & 0xfbf0) | ((v & 0x800) >> 1) | ((v >> 12) & 0xf));
173 write16le(off + 2, (read16le(off + 2) & 0x8f00) | ((v & 0x700) << 4) | (v & 0xff));
Saleem Abdulrasoolfd063e72016-08-05 18:20:31 +0000174}
175
Rui Ueyama136d27a2019-07-11 05:40:30 +0000176static uint16_t readMOV(uint8_t *off, bool movt) {
177 uint16_t op1 = read16le(off);
178 if ((op1 & 0xfbf0) != (movt ? 0xf2c0 : 0xf240))
179 error("unexpected instruction in " + Twine(movt ? "MOVT" : "MOVW") +
Martin Storsjoc4b00612018-08-27 06:04:36 +0000180 " instruction in MOV32T relocation");
Rui Ueyama136d27a2019-07-11 05:40:30 +0000181 uint16_t op2 = read16le(off + 2);
182 if ((op2 & 0x8000) != 0)
183 error("unexpected instruction in " + Twine(movt ? "MOVT" : "MOVW") +
Martin Storsjoc4b00612018-08-27 06:04:36 +0000184 " instruction in MOV32T relocation");
Rui Ueyama136d27a2019-07-11 05:40:30 +0000185 return (op2 & 0x00ff) | ((op2 >> 4) & 0x0700) | ((op1 << 1) & 0x0800) |
186 ((op1 & 0x000f) << 12);
Rui Ueyama237fca12015-07-25 03:03:46 +0000187}
188
Rui Ueyama136d27a2019-07-11 05:40:30 +0000189void applyMOV32T(uint8_t *off, uint32_t v) {
190 uint16_t immW = readMOV(off, false); // read MOVW operand
191 uint16_t immT = readMOV(off + 4, true); // read MOVT operand
192 uint32_t imm = immW | (immT << 16);
193 v += imm; // add the immediate offset
194 applyMOV(off, v); // set MOVW operand
195 applyMOV(off + 4, v >> 16); // set MOVT operand
Rui Ueyamaba7c0412015-08-05 19:40:07 +0000196}
197
Rui Ueyama136d27a2019-07-11 05:40:30 +0000198static void applyBranch20T(uint8_t *off, int32_t v) {
199 if (!isInt<21>(v))
Martin Storsjo6c67e042018-08-22 11:34:58 +0000200 error("relocation out of range");
Rui Ueyama136d27a2019-07-11 05:40:30 +0000201 uint32_t s = v < 0 ? 1 : 0;
202 uint32_t j1 = (v >> 19) & 1;
203 uint32_t j2 = (v >> 18) & 1;
204 or16(off, (s << 10) | ((v >> 12) & 0x3f));
205 or16(off + 2, (j1 << 13) | (j2 << 11) | ((v >> 1) & 0x7ff));
Rui Ueyamaba7c0412015-08-05 19:40:07 +0000206}
207
Rui Ueyama136d27a2019-07-11 05:40:30 +0000208void applyBranch24T(uint8_t *off, int32_t v) {
209 if (!isInt<25>(v))
Martin Storsjo6c67e042018-08-22 11:34:58 +0000210 error("relocation out of range");
Rui Ueyama136d27a2019-07-11 05:40:30 +0000211 uint32_t s = v < 0 ? 1 : 0;
212 uint32_t j1 = ((~v >> 23) & 1) ^ s;
213 uint32_t j2 = ((~v >> 22) & 1) ^ s;
214 or16(off, (s << 10) | ((v >> 12) & 0x3ff));
Saleem Abdulrasool8202c6d2016-08-05 17:28:21 +0000215 // Clear out the J1 and J2 bits which may be set.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000216 write16le(off + 2, (read16le(off + 2) & 0xd000) | (j1 << 13) | (j2 << 11) | ((v >> 1) & 0x7ff));
Rui Ueyama3d9c8632015-07-25 03:19:34 +0000217}
218
Rui Ueyama136d27a2019-07-11 05:40:30 +0000219void SectionChunk::applyRelARM(uint8_t *off, uint16_t type, OutputSection *os,
Amy Huang5a58b192023-01-09 23:37:28 -0500220 uint64_t s, uint64_t p,
221 uint64_t imageBase) const {
Rui Ueyama8bc43a12015-07-29 19:25:00 +0000222 // Pointer to thumb code must have the LSB set.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000223 uint64_t sx = s;
224 if (os && (os->header.Characteristics & IMAGE_SCN_MEM_EXECUTE))
225 sx |= 1;
226 switch (type) {
Amy Huang5a58b192023-01-09 23:37:28 -0500227 case IMAGE_REL_ARM_ADDR32:
228 add32(off, sx + imageBase);
229 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000230 case IMAGE_REL_ARM_ADDR32NB: add32(off, sx); break;
Amy Huang5a58b192023-01-09 23:37:28 -0500231 case IMAGE_REL_ARM_MOV32T:
232 applyMOV32T(off, sx + imageBase);
233 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000234 case IMAGE_REL_ARM_BRANCH20T: applyBranch20T(off, sx - p - 4); break;
235 case IMAGE_REL_ARM_BRANCH24T: applyBranch24T(off, sx - p - 4); break;
236 case IMAGE_REL_ARM_BLX23T: applyBranch24T(off, sx - p - 4); break;
Amy Huang5a58b192023-01-09 23:37:28 -0500237 case IMAGE_REL_ARM_SECTION:
Jacek Caban6b493ba2024-12-15 12:45:34 +0100238 applySecIdx(off, os, file->symtab.ctx.outputSections.size());
Amy Huang5a58b192023-01-09 23:37:28 -0500239 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000240 case IMAGE_REL_ARM_SECREL: applySecRel(this, off, os, s); break;
241 case IMAGE_REL_ARM_REL32: add32(off, sx - p - 4); break;
Rui Ueyama237fca12015-07-25 03:03:46 +0000242 default:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000243 error("unsupported relocation type 0x" + Twine::utohexstr(type) + " in " +
244 toString(file));
Rui Ueyama237fca12015-07-25 03:03:46 +0000245 }
246}
247
Martin Storsjo38608c02017-07-26 20:51:47 +0000248// Interpret the existing immediate value as a byte offset to the
249// target symbol, then update the instruction with the immediate as
250// the page offset from the current instruction to the target.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000251void applyArm64Addr(uint8_t *off, uint64_t s, uint64_t p, int shift) {
252 uint32_t orig = read32le(off);
Martin Storsjö7c15da62021-11-20 19:55:18 +0200253 int64_t imm =
254 SignExtend64<21>(((orig >> 29) & 0x3) | ((orig >> 3) & 0x1FFFFC));
Rui Ueyama136d27a2019-07-11 05:40:30 +0000255 s += imm;
256 imm = (s >> shift) - (p >> shift);
257 uint32_t immLo = (imm & 0x3) << 29;
258 uint32_t immHi = (imm & 0x1FFFFC) << 3;
259 uint64_t mask = (0x3 << 29) | (0x1FFFFC << 3);
260 write32le(off, (orig & ~mask) | immLo | immHi);
Martin Storsjo27791652017-07-11 07:22:44 +0000261}
262
263// Update the immediate field in a AARCH64 ldr, str, and add instruction.
Martin Storsjo38608c02017-07-26 20:51:47 +0000264// Optionally limit the range of the written immediate by one or more bits
Fangrui Song2e2038b2019-07-16 08:26:38 +0000265// (rangeLimit).
Rui Ueyama136d27a2019-07-11 05:40:30 +0000266void applyArm64Imm(uint8_t *off, uint64_t imm, uint32_t rangeLimit) {
267 uint32_t orig = read32le(off);
268 imm += (orig >> 10) & 0xFFF;
269 orig &= ~(0xFFF << 10);
270 write32le(off, orig | ((imm & (0xFFF >> rangeLimit)) << 10));
Martin Storsjo27791652017-07-11 07:22:44 +0000271}
272
Martin Storsjo38608c02017-07-26 20:51:47 +0000273// Add the 12 bit page offset to the existing immediate.
274// Ldr/str instructions store the opcode immediate scaled
275// by the load/store size (giving a larger range for larger
276// loads/stores). The immediate is always (both before and after
277// fixing up the relocation) stored scaled similarly.
278// Even if larger loads/stores have a larger range, limit the
279// effective offset to 12 bit, since it is intended to be a
280// page offset.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000281static void applyArm64Ldr(uint8_t *off, uint64_t imm) {
282 uint32_t orig = read32le(off);
283 uint32_t size = orig >> 30;
Martin Storsjo5ae76492017-07-20 16:48:33 +0000284 // 0x04000000 indicates SIMD/FP registers
285 // 0x00800000 indicates 128 bit
Rui Ueyama136d27a2019-07-11 05:40:30 +0000286 if ((orig & 0x4800000) == 0x4800000)
287 size += 4;
288 if ((imm & ((1 << size) - 1)) != 0)
Martin Storsjo6c67e042018-08-22 11:34:58 +0000289 error("misaligned ldr/str offset");
Rui Ueyama136d27a2019-07-11 05:40:30 +0000290 applyArm64Imm(off, imm >> size, size);
Martin Storsjo27791652017-07-11 07:22:44 +0000291}
292
Rui Ueyama136d27a2019-07-11 05:40:30 +0000293static void applySecRelLow12A(const SectionChunk *sec, uint8_t *off,
294 OutputSection *os, uint64_t s) {
295 if (checkSecRel(sec, os))
296 applyArm64Imm(off, (s - os->getRVA()) & 0xfff, 0);
Rui Ueyama03c7f3a2018-02-17 20:28:15 +0000297}
298
Rui Ueyama136d27a2019-07-11 05:40:30 +0000299static void applySecRelHigh12A(const SectionChunk *sec, uint8_t *off,
300 OutputSection *os, uint64_t s) {
301 if (!checkSecRel(sec, os))
Rui Ueyama03c7f3a2018-02-17 20:28:15 +0000302 return;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000303 uint64_t secRel = (s - os->getRVA()) >> 12;
304 if (0xfff < secRel) {
Martin Storsjoef4f78b2018-02-16 22:02:38 +0000305 error("overflow in SECREL_HIGH12A relocation in section: " +
Rui Ueyama136d27a2019-07-11 05:40:30 +0000306 sec->getSectionName());
Martin Storsjoef4f78b2018-02-16 22:02:38 +0000307 return;
308 }
Rui Ueyama136d27a2019-07-11 05:40:30 +0000309 applyArm64Imm(off, secRel & 0xfff, 0);
Martin Storsjoef4f78b2018-02-16 22:02:38 +0000310}
311
Rui Ueyama136d27a2019-07-11 05:40:30 +0000312static void applySecRelLdr(const SectionChunk *sec, uint8_t *off,
313 OutputSection *os, uint64_t s) {
314 if (checkSecRel(sec, os))
315 applyArm64Ldr(off, (s - os->getRVA()) & 0xfff);
Martin Storsjoef4f78b2018-02-16 22:02:38 +0000316}
317
Rui Ueyama136d27a2019-07-11 05:40:30 +0000318void applyArm64Branch26(uint8_t *off, int64_t v) {
319 if (!isInt<28>(v))
Martin Storsjo6c67e042018-08-22 11:34:58 +0000320 error("relocation out of range");
Rui Ueyama136d27a2019-07-11 05:40:30 +0000321 or32(off, (v & 0x0FFFFFFC) >> 2);
Martin Storsjocc807762018-05-04 06:06:27 +0000322}
323
Rui Ueyama136d27a2019-07-11 05:40:30 +0000324static void applyArm64Branch19(uint8_t *off, int64_t v) {
325 if (!isInt<21>(v))
Martin Storsjo6c67e042018-08-22 11:34:58 +0000326 error("relocation out of range");
Rui Ueyama136d27a2019-07-11 05:40:30 +0000327 or32(off, (v & 0x001FFFFC) << 3);
Martin Storsjocc807762018-05-04 06:06:27 +0000328}
329
Rui Ueyama136d27a2019-07-11 05:40:30 +0000330static void applyArm64Branch14(uint8_t *off, int64_t v) {
331 if (!isInt<16>(v))
Martin Storsjo6c67e042018-08-22 11:34:58 +0000332 error("relocation out of range");
Rui Ueyama136d27a2019-07-11 05:40:30 +0000333 or32(off, (v & 0x0000FFFC) << 3);
Martin Storsjocc807762018-05-04 06:06:27 +0000334}
335
Rui Ueyama136d27a2019-07-11 05:40:30 +0000336void SectionChunk::applyRelARM64(uint8_t *off, uint16_t type, OutputSection *os,
Amy Huang5a58b192023-01-09 23:37:28 -0500337 uint64_t s, uint64_t p,
338 uint64_t imageBase) const {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000339 switch (type) {
340 case IMAGE_REL_ARM64_PAGEBASE_REL21: applyArm64Addr(off, s, p, 12); break;
341 case IMAGE_REL_ARM64_REL21: applyArm64Addr(off, s, p, 0); break;
342 case IMAGE_REL_ARM64_PAGEOFFSET_12A: applyArm64Imm(off, s & 0xfff, 0); break;
343 case IMAGE_REL_ARM64_PAGEOFFSET_12L: applyArm64Ldr(off, s & 0xfff); break;
344 case IMAGE_REL_ARM64_BRANCH26: applyArm64Branch26(off, s - p); break;
345 case IMAGE_REL_ARM64_BRANCH19: applyArm64Branch19(off, s - p); break;
346 case IMAGE_REL_ARM64_BRANCH14: applyArm64Branch14(off, s - p); break;
Amy Huang5a58b192023-01-09 23:37:28 -0500347 case IMAGE_REL_ARM64_ADDR32:
348 add32(off, s + imageBase);
349 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000350 case IMAGE_REL_ARM64_ADDR32NB: add32(off, s); break;
Amy Huang5a58b192023-01-09 23:37:28 -0500351 case IMAGE_REL_ARM64_ADDR64:
352 add64(off, s + imageBase);
353 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000354 case IMAGE_REL_ARM64_SECREL: applySecRel(this, off, os, s); break;
355 case IMAGE_REL_ARM64_SECREL_LOW12A: applySecRelLow12A(this, off, os, s); break;
356 case IMAGE_REL_ARM64_SECREL_HIGH12A: applySecRelHigh12A(this, off, os, s); break;
357 case IMAGE_REL_ARM64_SECREL_LOW12L: applySecRelLdr(this, off, os, s); break;
Amy Huang5a58b192023-01-09 23:37:28 -0500358 case IMAGE_REL_ARM64_SECTION:
Jacek Caban6b493ba2024-12-15 12:45:34 +0100359 applySecIdx(off, os, file->symtab.ctx.outputSections.size());
Amy Huang5a58b192023-01-09 23:37:28 -0500360 break;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000361 case IMAGE_REL_ARM64_REL32: add32(off, s - p - 4); break;
Martin Storsjo27791652017-07-11 07:22:44 +0000362 default:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000363 error("unsupported relocation type 0x" + Twine::utohexstr(type) + " in " +
364 toString(file));
Martin Storsjo27791652017-07-11 07:22:44 +0000365 }
366}
367
Rui Ueyama136d27a2019-07-11 05:40:30 +0000368static void maybeReportRelocationToDiscarded(const SectionChunk *fromChunk,
369 Defined *sym,
Amy Huang5a58b192023-01-09 23:37:28 -0500370 const coff_relocation &rel,
371 bool isMinGW) {
Reid Kleckner551acf02018-11-13 18:30:31 +0000372 // Don't report these errors when the relocation comes from a debug info
373 // section or in mingw mode. MinGW mode object files (built by GCC) can
374 // have leftover sections with relocations against discarded comdat
375 // sections. Such sections are left as is, with relocations untouched.
Amy Huang5a58b192023-01-09 23:37:28 -0500376 if (fromChunk->isCodeView() || fromChunk->isDWARF() || isMinGW)
Reid Kleckner551acf02018-11-13 18:30:31 +0000377 return;
378
379 // Get the name of the symbol. If it's null, it was discarded early, so we
380 // have to go back to the object file.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000381 ObjFile *file = fromChunk->file;
Nico Weberd73ef972024-12-13 19:35:51 -0500382 std::string name;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000383 if (sym) {
Jacek Caban6b493ba2024-12-15 12:45:34 +0100384 name = toString(file->symtab.ctx, *sym);
Reid Kleckner551acf02018-11-13 18:30:31 +0000385 } else {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000386 COFFSymbolRef coffSym =
387 check(file->getCOFFObj()->getSymbol(rel.SymbolTableIndex));
Nico Weberd73ef972024-12-13 19:35:51 -0500388 name = maybeDemangleSymbol(
Jacek Caban6b493ba2024-12-15 12:45:34 +0100389 file->symtab.ctx, check(file->getCOFFObj()->getSymbolName(coffSym)));
Reid Kleckner551acf02018-11-13 18:30:31 +0000390 }
391
Rui Ueyama136d27a2019-07-11 05:40:30 +0000392 std::vector<std::string> symbolLocations =
393 getSymbolLocations(file, rel.SymbolTableIndex);
Nico Weber0142b9c2019-06-25 09:55:55 +0000394
Rui Ueyama136d27a2019-07-11 05:40:30 +0000395 std::string out;
396 llvm::raw_string_ostream os(out);
397 os << "relocation against symbol in discarded section: " + name;
398 for (const std::string &s : symbolLocations)
399 os << s;
JOE19944b27b582024-09-15 04:21:07 -0400400 error(out);
Reid Kleckner551acf02018-11-13 18:30:31 +0000401}
402
Rui Ueyama136d27a2019-07-11 05:40:30 +0000403void SectionChunk::writeTo(uint8_t *buf) const {
404 if (!hasData)
Rui Ueyama9aefa0c2015-05-28 20:04:51 +0000405 return;
Rui Ueyama743afa02015-06-06 04:07:39 +0000406 // Copy section contents from source object file to output file.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000407 ArrayRef<uint8_t> a = getContents();
408 if (!a.empty())
409 memcpy(buf, a.data(), a.size());
Rui Ueyama743afa02015-06-06 04:07:39 +0000410
411 // Apply relocations.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000412 size_t inputSize = getSize();
Reid Kleckner69e0bc72021-01-20 11:00:58 -0800413 for (const coff_relocation &rel : getRelocs()) {
Reid Kleckner3b8acb22017-07-13 20:29:59 +0000414 // Check for an invalid relocation offset. This check isn't perfect, because
415 // we don't have the relocation size, which is only known after checking the
416 // machine and relocation type. As a result, a relocation may overwrite the
417 // beginning of the following input section.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000418 if (rel.VirtualAddress >= inputSize) {
Martin Storsjo6c67e042018-08-22 11:34:58 +0000419 error("relocation points beyond the end of its parent section");
420 continue;
421 }
Reid Kleckner3b8acb22017-07-13 20:29:59 +0000422
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800423 applyRelocation(buf + rel.VirtualAddress, rel);
424 }
Jacek Cabanfed8e382024-06-18 11:14:01 +0200425
426 // Write the offset to EC entry thunk preceding section contents. The low bit
427 // is always set, so it's effectively an offset from the last byte of the
428 // offset.
429 if (Defined *entryThunk = getEntryThunk())
430 write32le(buf - sizeof(uint32_t), entryThunk->getRVA() - rva + 1);
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800431}
Reid Klecknera1001b82017-06-28 17:06:35 +0000432
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800433void SectionChunk::applyRelocation(uint8_t *off,
434 const coff_relocation &rel) const {
435 auto *sym = dyn_cast_or_null<Defined>(file->getSymbol(rel.SymbolTableIndex));
Martin Storsjo0f8f0d62018-09-30 18:31:03 +0000436
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800437 // Get the output section of the symbol for this relocation. The output
438 // section is needed to compute SECREL and SECTION relocations used in debug
439 // info.
440 Chunk *c = sym ? sym->getChunk() : nullptr;
Jacek Caban6b493ba2024-12-15 12:45:34 +0100441 COFFLinkerContext &ctx = file->symtab.ctx;
442 OutputSection *os = c ? ctx.getOutputSection(c) : nullptr;
Reid Klecknera1001b82017-06-28 17:06:35 +0000443
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800444 // Skip the relocation if it refers to a discarded section, and diagnose it
445 // as an error if appropriate. If a symbol was discarded early, it may be
446 // null. If it was discarded late, the output section will be null, unless
447 // it was an absolute or synthetic symbol.
448 if (!sym ||
449 (!os && !isa<DefinedAbsolute>(sym) && !isa<DefinedSynthetic>(sym))) {
Jacek Caban6b493ba2024-12-15 12:45:34 +0100450 maybeReportRelocationToDiscarded(this, sym, rel, ctx.config.mingw);
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800451 return;
452 }
453
454 uint64_t s = sym->getRVA();
455
456 // Compute the RVA of the relocation for relative relocations.
457 uint64_t p = rva + rel.VirtualAddress;
Jacek Caban6b493ba2024-12-15 12:45:34 +0100458 uint64_t imageBase = ctx.config.imageBase;
Jacek Caban8f9903d2024-04-04 14:41:50 +0200459 switch (getArch()) {
460 case Triple::x86_64:
Amy Huang5a58b192023-01-09 23:37:28 -0500461 applyRelX64(off, rel.Type, os, s, p, imageBase);
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800462 break;
Jacek Caban8f9903d2024-04-04 14:41:50 +0200463 case Triple::x86:
Amy Huang5a58b192023-01-09 23:37:28 -0500464 applyRelX86(off, rel.Type, os, s, p, imageBase);
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800465 break;
Jacek Caban8f9903d2024-04-04 14:41:50 +0200466 case Triple::thumb:
Amy Huang5a58b192023-01-09 23:37:28 -0500467 applyRelARM(off, rel.Type, os, s, p, imageBase);
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800468 break;
Jacek Caban8f9903d2024-04-04 14:41:50 +0200469 case Triple::aarch64:
Amy Huang5a58b192023-01-09 23:37:28 -0500470 applyRelARM64(off, rel.Type, os, s, p, imageBase);
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800471 break;
472 default:
473 llvm_unreachable("unknown machine type");
474 }
475}
476
477// Defend against unsorted relocations. This may be overly conservative.
478void SectionChunk::sortRelocations() {
479 auto cmpByVa = [](const coff_relocation &l, const coff_relocation &r) {
480 return l.VirtualAddress < r.VirtualAddress;
481 };
482 if (llvm::is_sorted(getRelocs(), cmpByVa))
483 return;
484 warn("some relocations in " + file->getName() + " are not sorted");
485 MutableArrayRef<coff_relocation> newRelocs(
Alexandre Ganea83d59e02022-01-20 14:53:18 -0500486 bAlloc().Allocate<coff_relocation>(relocsSize), relocsSize);
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800487 memcpy(newRelocs.data(), relocsData, relocsSize * sizeof(coff_relocation));
488 llvm::sort(newRelocs, cmpByVa);
489 setRelocs(newRelocs);
490}
491
492// Similar to writeTo, but suitable for relocating a subsection of the overall
493// section.
494void SectionChunk::writeAndRelocateSubsection(ArrayRef<uint8_t> sec,
495 ArrayRef<uint8_t> subsec,
496 uint32_t &nextRelocIndex,
497 uint8_t *buf) const {
498 assert(!subsec.empty() && !sec.empty());
499 assert(sec.begin() <= subsec.begin() && subsec.end() <= sec.end() &&
500 "subsection is not part of this section");
501 size_t vaBegin = std::distance(sec.begin(), subsec.begin());
502 size_t vaEnd = std::distance(sec.begin(), subsec.end());
503 memcpy(buf, subsec.data(), subsec.size());
504 for (; nextRelocIndex < relocsSize; ++nextRelocIndex) {
505 const coff_relocation &rel = relocsData[nextRelocIndex];
506 // Only apply relocations that apply to this subsection. These checks
507 // assume that all subsections completely contain their relocations.
508 // Relocations must not straddle the beginning or end of a subsection.
509 if (rel.VirtualAddress < vaBegin)
Martin Storsjo6c67e042018-08-22 11:34:58 +0000510 continue;
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800511 if (rel.VirtualAddress + 1 >= vaEnd)
Rui Ueyama11863b4a2015-07-08 01:45:29 +0000512 break;
Reid Klecknerb69db4a2021-03-10 14:51:52 -0800513 applyRelocation(&buf[rel.VirtualAddress - vaBegin], rel);
Rui Ueyama42aa00b2015-06-25 00:33:38 +0000514 }
Rui Ueyama411c63602015-05-28 19:09:30 +0000515}
516
Rui Ueyama136d27a2019-07-11 05:40:30 +0000517void SectionChunk::addAssociative(SectionChunk *child) {
Reid Kleckner18a9b182021-04-14 10:39:48 -0700518 // Insert the child section into the list of associated children. Keep the
519 // list ordered by section name so that ICF does not depend on section order.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000520 assert(child->assocChildren == nullptr &&
Reid Klecknercc525c92019-04-02 22:11:58 +0000521 "associated sections cannot have their own associated children");
Reid Kleckner18a9b182021-04-14 10:39:48 -0700522 SectionChunk *prev = this;
523 SectionChunk *next = assocChildren;
524 for (; next != nullptr; prev = next, next = next->assocChildren) {
525 if (next->getSectionName() <= child->getSectionName())
526 break;
527 }
528
529 // Insert child between prev and next.
530 assert(prev->assocChildren == next);
531 prev->assocChildren = child;
532 child->assocChildren = next;
Rui Ueyama411c63602015-05-28 19:09:30 +0000533}
534
Amy Huang5a58b192023-01-09 23:37:28 -0500535static uint8_t getBaserelType(const coff_relocation &rel,
Jacek Caban8f9903d2024-04-04 14:41:50 +0200536 Triple::ArchType arch) {
537 switch (arch) {
538 case Triple::x86_64:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000539 if (rel.Type == IMAGE_REL_AMD64_ADDR64)
Rui Ueyama3afd5bf2015-07-25 01:44:32 +0000540 return IMAGE_REL_BASED_DIR64;
Axel Y. Rivera4fb131b2021-05-21 23:31:03 +0300541 if (rel.Type == IMAGE_REL_AMD64_ADDR32)
542 return IMAGE_REL_BASED_HIGHLOW;
Rui Ueyama3afd5bf2015-07-25 01:44:32 +0000543 return IMAGE_REL_BASED_ABSOLUTE;
Jacek Caban8f9903d2024-04-04 14:41:50 +0200544 case Triple::x86:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000545 if (rel.Type == IMAGE_REL_I386_DIR32)
Rui Ueyama3afd5bf2015-07-25 01:44:32 +0000546 return IMAGE_REL_BASED_HIGHLOW;
547 return IMAGE_REL_BASED_ABSOLUTE;
Jacek Caban8f9903d2024-04-04 14:41:50 +0200548 case Triple::thumb:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000549 if (rel.Type == IMAGE_REL_ARM_ADDR32)
Rui Ueyama237fca12015-07-25 03:03:46 +0000550 return IMAGE_REL_BASED_HIGHLOW;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000551 if (rel.Type == IMAGE_REL_ARM_MOV32T)
Rui Ueyama237fca12015-07-25 03:03:46 +0000552 return IMAGE_REL_BASED_ARM_MOV32T;
553 return IMAGE_REL_BASED_ABSOLUTE;
Jacek Caban8f9903d2024-04-04 14:41:50 +0200554 case Triple::aarch64:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000555 if (rel.Type == IMAGE_REL_ARM64_ADDR64)
Martin Storsjo27791652017-07-11 07:22:44 +0000556 return IMAGE_REL_BASED_DIR64;
557 return IMAGE_REL_BASED_ABSOLUTE;
Rui Ueyama93b45712015-07-09 20:36:59 +0000558 default:
559 llvm_unreachable("unknown machine type");
560 }
561}
562
Rui Ueyama588e8322015-06-15 01:23:58 +0000563// Windows-specific.
Rui Ueyama93b45712015-07-09 20:36:59 +0000564// Collect all locations that contain absolute addresses, which need to be
565// fixed by the loader if load-time relocation is needed.
Rui Ueyama588e8322015-06-15 01:23:58 +0000566// Only called when base relocation is enabled.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000567void SectionChunk::getBaserels(std::vector<Baserel> *res) {
Reid Kleckner69e0bc72021-01-20 11:00:58 -0800568 for (const coff_relocation &rel : getRelocs()) {
Jacek Caban8f9903d2024-04-04 14:41:50 +0200569 uint8_t ty = getBaserelType(rel, getArch());
Rui Ueyama136d27a2019-07-11 05:40:30 +0000570 if (ty == IMAGE_REL_BASED_ABSOLUTE)
Rui Ueyama588e8322015-06-15 01:23:58 +0000571 continue;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000572 Symbol *target = file->getSymbol(rel.SymbolTableIndex);
573 if (!target || isa<DefinedAbsolute>(target))
Rui Ueyama588e8322015-06-15 01:23:58 +0000574 continue;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000575 res->emplace_back(rva + rel.VirtualAddress, ty);
Rui Ueyama588e8322015-06-15 01:23:58 +0000576 }
Jacek Caban84087222025-01-09 21:48:16 +0100577
578 // Insert a 64-bit relocation for CHPEMetadataPointer in the native load
579 // config of a hybrid ARM64X image. Its value will be set in prepareLoadConfig
580 // to match the value in the EC load config, which is expected to be
581 // a relocatable pointer to the __chpe_metadata symbol.
582 COFFLinkerContext &ctx = file->symtab.ctx;
Jacek Caban5b057282025-05-15 02:38:24 -0700583 if (ctx.config.machine == ARM64X && ctx.hybridSymtab->loadConfigSym &&
Jacek Caban1c05c612025-04-11 15:53:25 +0200584 ctx.hybridSymtab->loadConfigSym->getChunk() == this &&
585 ctx.symtab.loadConfigSym &&
586 ctx.hybridSymtab->loadConfigSize >=
Jacek Caban84087222025-01-09 21:48:16 +0100587 offsetof(coff_load_configuration64, CHPEMetadataPointer) +
588 sizeof(coff_load_configuration64::CHPEMetadataPointer))
589 res->emplace_back(
Jacek Caban1c05c612025-04-11 15:53:25 +0200590 ctx.hybridSymtab->loadConfigSym->getRVA() +
Jacek Caban84087222025-01-09 21:48:16 +0100591 offsetof(coff_load_configuration64, CHPEMetadataPointer),
592 IMAGE_REL_BASED_DIR64);
Rui Ueyama588e8322015-06-15 01:23:58 +0000593}
594
Martin Storsjoeac1b052018-08-27 08:43:31 +0000595// MinGW specific.
596// Check whether a static relocation of type Type can be deferred and
597// handled at runtime as a pseudo relocation (for references to a module
598// local variable, which turned out to actually need to be imported from
599// another DLL) This returns the size the relocation is supposed to update,
600// in bits, or 0 if the relocation cannot be handled as a runtime pseudo
601// relocation.
Jacek Caban31a6dbe2024-10-28 18:44:23 +0100602static int getRuntimePseudoRelocSize(uint16_t type, Triple::ArchType arch) {
Martin Storsjoeac1b052018-08-27 08:43:31 +0000603 // Relocations that either contain an absolute address, or a plain
604 // relative offset, since the runtime pseudo reloc implementation
605 // adds 8/16/32/64 bit values to a memory address.
606 //
607 // Given a pseudo relocation entry,
608 //
609 // typedef struct {
610 // DWORD sym;
611 // DWORD target;
612 // DWORD flags;
613 // } runtime_pseudo_reloc_item_v2;
614 //
615 // the runtime relocation performs this adjustment:
616 // *(base + .target) += *(base + .sym) - (base + .sym)
617 //
618 // This works for both absolute addresses (IMAGE_REL_*_ADDR32/64,
619 // IMAGE_REL_I386_DIR32, where the memory location initially contains
620 // the address of the IAT slot, and for relative addresses (IMAGE_REL*_REL32),
621 // where the memory location originally contains the relative offset to the
622 // IAT slot.
623 //
624 // This requires the target address to be writable, either directly out of
625 // the image, or temporarily changed at runtime with VirtualProtect.
626 // Since this only operates on direct address values, it doesn't work for
627 // ARM/ARM64 relocations, other than the plain ADDR32/ADDR64 relocations.
Jacek Caban31a6dbe2024-10-28 18:44:23 +0100628 switch (arch) {
629 case Triple::x86_64:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000630 switch (type) {
Martin Storsjoeac1b052018-08-27 08:43:31 +0000631 case IMAGE_REL_AMD64_ADDR64:
632 return 64;
633 case IMAGE_REL_AMD64_ADDR32:
634 case IMAGE_REL_AMD64_REL32:
635 case IMAGE_REL_AMD64_REL32_1:
636 case IMAGE_REL_AMD64_REL32_2:
637 case IMAGE_REL_AMD64_REL32_3:
638 case IMAGE_REL_AMD64_REL32_4:
639 case IMAGE_REL_AMD64_REL32_5:
640 return 32;
641 default:
642 return 0;
643 }
Jacek Caban31a6dbe2024-10-28 18:44:23 +0100644 case Triple::x86:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000645 switch (type) {
Martin Storsjoeac1b052018-08-27 08:43:31 +0000646 case IMAGE_REL_I386_DIR32:
647 case IMAGE_REL_I386_REL32:
648 return 32;
649 default:
650 return 0;
651 }
Jacek Caban31a6dbe2024-10-28 18:44:23 +0100652 case Triple::thumb:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000653 switch (type) {
Martin Storsjoeac1b052018-08-27 08:43:31 +0000654 case IMAGE_REL_ARM_ADDR32:
655 return 32;
656 default:
657 return 0;
658 }
Jacek Caban31a6dbe2024-10-28 18:44:23 +0100659 case Triple::aarch64:
Rui Ueyama136d27a2019-07-11 05:40:30 +0000660 switch (type) {
Martin Storsjoeac1b052018-08-27 08:43:31 +0000661 case IMAGE_REL_ARM64_ADDR64:
662 return 64;
663 case IMAGE_REL_ARM64_ADDR32:
664 return 32;
665 default:
666 return 0;
667 }
668 default:
669 llvm_unreachable("unknown machine type");
670 }
671}
672
673// MinGW specific.
674// Append information to the provided vector about all relocations that
675// need to be handled at runtime as runtime pseudo relocations (references
676// to a module local variable, which turned out to actually need to be
677// imported from another DLL).
678void SectionChunk::getRuntimePseudoRelocs(
Rui Ueyama136d27a2019-07-11 05:40:30 +0000679 std::vector<RuntimePseudoReloc> &res) {
680 for (const coff_relocation &rel : getRelocs()) {
681 auto *target =
682 dyn_cast_or_null<Defined>(file->getSymbol(rel.SymbolTableIndex));
683 if (!target || !target->isRuntimePseudoReloc)
Martin Storsjoeac1b052018-08-27 08:43:31 +0000684 continue;
Martin Storsjö9c970d52024-04-15 20:14:07 +0300685 // If the target doesn't have a chunk allocated, it may be a
686 // DefinedImportData symbol which ended up unnecessary after GC.
687 // Normally we wouldn't eliminate section chunks that are referenced, but
688 // references within DWARF sections don't count for keeping section chunks
689 // alive. Thus such dangling references in DWARF sections are expected.
690 if (!target->getChunk())
691 continue;
Jacek Caban31a6dbe2024-10-28 18:44:23 +0100692 int sizeInBits = getRuntimePseudoRelocSize(rel.Type, getArch());
Rui Ueyama136d27a2019-07-11 05:40:30 +0000693 if (sizeInBits == 0) {
694 error("unable to automatically import from " + target->getName() +
Martin Storsjoeac1b052018-08-27 08:43:31 +0000695 " with relocation type " +
Rui Ueyama136d27a2019-07-11 05:40:30 +0000696 file->getCOFFObj()->getRelocationTypeName(rel.Type) + " in " +
697 toString(file));
Martin Storsjoeac1b052018-08-27 08:43:31 +0000698 continue;
699 }
Jacek Caban6b493ba2024-12-15 12:45:34 +0100700 int addressSizeInBits = file->symtab.ctx.config.is64() ? 64 : 32;
Martin Storsjö6daa4b92023-07-06 01:04:12 +0300701 if (sizeInBits < addressSizeInBits) {
702 warn("runtime pseudo relocation in " + toString(file) + " against " +
703 "symbol " + target->getName() + " is too narrow (only " +
704 Twine(sizeInBits) + " bits wide); this can fail at runtime " +
705 "depending on memory layout");
706 }
Fangrui Song2e2038b2019-07-16 08:26:38 +0000707 // sizeInBits is used to initialize the Flags field; currently no
Martin Storsjoeac1b052018-08-27 08:43:31 +0000708 // other flags are defined.
Jez Ng3df4c5a2023-01-26 20:28:58 -0500709 res.emplace_back(target, this, rel.VirtualAddress, sizeInBits);
Martin Storsjoeac1b052018-08-27 08:43:31 +0000710 }
711}
712
Rui Ueyama411c63602015-05-28 19:09:30 +0000713bool SectionChunk::isCOMDAT() const {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000714 return header->Characteristics & IMAGE_SCN_LNK_COMDAT;
Rui Ueyama411c63602015-05-28 19:09:30 +0000715}
716
Rui Ueyamafc510f42015-06-25 19:10:58 +0000717void SectionChunk::printDiscardedMessage() const {
Rui Ueyama4bce7bc2015-09-16 21:30:40 +0000718 // Removed by dead-stripping. If it's removed by ICF, ICF already
719 // printed out the name, so don't repeat that here.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000720 if (sym && this == repl)
Nico Weber5730d112022-01-05 11:24:44 -0500721 log("Discarded " + sym->getName());
Rui Ueyama411c63602015-05-28 19:09:30 +0000722}
723
Reid Klecknera431dd72019-05-24 20:25:40 +0000724StringRef SectionChunk::getDebugName() const {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000725 if (sym)
726 return sym->getName();
Rui Ueyama6a883b02015-08-21 07:01:10 +0000727 return "";
Rui Ueyama6a60be72015-06-24 00:00:52 +0000728}
729
Rui Ueyamaf34c0882015-06-25 17:56:36 +0000730ArrayRef<uint8_t> SectionChunk::getContents() const {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000731 ArrayRef<uint8_t> a;
732 cantFail(file->getCOFFObj()->getSectionContents(header, a));
733 return a;
Rui Ueyamaf34c0882015-06-25 17:56:36 +0000734}
735
Alexandre Ganead307c4c2019-02-23 01:46:18 +0000736ArrayRef<uint8_t> SectionChunk::consumeDebugMagic() {
737 assert(isCodeView());
Reid Kleckner0a1b1d62019-05-03 20:17:14 +0000738 return consumeDebugMagic(getContents(), getSectionName());
Alexandre Ganead307c4c2019-02-23 01:46:18 +0000739}
740
Rui Ueyama136d27a2019-07-11 05:40:30 +0000741ArrayRef<uint8_t> SectionChunk::consumeDebugMagic(ArrayRef<uint8_t> data,
742 StringRef sectionName) {
743 if (data.empty())
Alexandre Ganead307c4c2019-02-23 01:46:18 +0000744 return {};
745
746 // First 4 bytes are section magic.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000747 if (data.size() < 4)
748 fatal("the section is too short: " + sectionName);
Alexandre Ganead307c4c2019-02-23 01:46:18 +0000749
Fangrui Song8d85c962023-06-05 14:36:19 -0700750 if (!sectionName.starts_with(".debug$"))
Rui Ueyama136d27a2019-07-11 05:40:30 +0000751 fatal("invalid section: " + sectionName);
Alexandre Ganead307c4c2019-02-23 01:46:18 +0000752
Rui Ueyama136d27a2019-07-11 05:40:30 +0000753 uint32_t magic = support::endian::read32le(data.data());
754 uint32_t expectedMagic = sectionName == ".debug$H"
Alexandre Ganead307c4c2019-02-23 01:46:18 +0000755 ? DEBUG_HASHES_SECTION_MAGIC
756 : DEBUG_SECTION_MAGIC;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000757 if (magic != expectedMagic) {
758 warn("ignoring section " + sectionName + " with unrecognized magic 0x" +
759 utohexstr(magic));
Reid Klecknerefc01ea2019-06-12 22:22:44 +0000760 return {};
761 }
Rui Ueyama136d27a2019-07-11 05:40:30 +0000762 return data.slice(4);
Alexandre Ganead307c4c2019-02-23 01:46:18 +0000763}
764
Rui Ueyama136d27a2019-07-11 05:40:30 +0000765SectionChunk *SectionChunk::findByName(ArrayRef<SectionChunk *> sections,
766 StringRef name) {
767 for (SectionChunk *c : sections)
768 if (c->getSectionName() == name)
769 return c;
Alexandre Ganead307c4c2019-02-23 01:46:18 +0000770 return nullptr;
771}
772
Rui Ueyama136d27a2019-07-11 05:40:30 +0000773void SectionChunk::replace(SectionChunk *other) {
774 p2Align = std::max(p2Align, other->p2Align);
775 other->repl = repl;
776 other->live = false;
Rui Ueyamaddf71fc2015-06-24 04:36:52 +0000777}
778
Alexandre Ganea149de8d2018-10-05 12:56:46 +0000779uint32_t SectionChunk::getSectionNumber() const {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000780 DataRefImpl r;
781 r.p = reinterpret_cast<uintptr_t>(header);
782 SectionRef s(r, file->getCOFFObj());
783 return s.getIndex() + 1;
Alexandre Ganea149de8d2018-10-05 12:56:46 +0000784}
785
Rui Ueyama136d27a2019-07-11 05:40:30 +0000786CommonChunk::CommonChunk(const COFFSymbolRef s) : sym(s) {
Reid Kleckneree4e0a22019-05-22 20:21:52 +0000787 // The value of a common symbol is its size. Align all common symbols smaller
788 // than 32 bytes naturally, i.e. round the size up to the next power of two.
Rui Ueyama5e31d0b2015-06-20 07:25:45 +0000789 // This is what MSVC link.exe does.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000790 setAlignment(std::min(32U, uint32_t(PowerOf2Ceil(sym.getValue()))));
791 hasData = false;
Martin Storsjod2752aa2017-08-14 19:07:27 +0000792}
793
Peter Collingbournefa322ab2018-04-19 20:03:24 +0000794uint32_t CommonChunk::getOutputCharacteristics() const {
Rui Ueyama411c63602015-05-28 19:09:30 +0000795 return IMAGE_SCN_CNT_UNINITIALIZED_DATA | IMAGE_SCN_MEM_READ |
796 IMAGE_SCN_MEM_WRITE;
797}
798
Rui Ueyama136d27a2019-07-11 05:40:30 +0000799void StringChunk::writeTo(uint8_t *buf) const {
800 memcpy(buf, str.data(), str.size());
801 buf[str.size()] = '\0';
Rui Ueyamad6fefba42015-05-28 19:45:43 +0000802}
803
Jacek Caban6be9be52024-09-13 15:42:05 +0200804ImportThunkChunk::ImportThunkChunk(COFFLinkerContext &ctx, Defined *s)
805 : NonSectionCodeChunk(ImportThunkKind), live(!ctx.config.doGC),
806 impSymbol(s), ctx(ctx) {}
807
Amy Huang5a58b192023-01-09 23:37:28 -0500808ImportThunkChunkX64::ImportThunkChunkX64(COFFLinkerContext &ctx, Defined *s)
809 : ImportThunkChunk(ctx, s) {
Rui Ueyama73835622015-06-26 18:28:56 +0000810 // Intel Optimization Manual says that all branch targets
811 // should be 16-byte aligned. MSVC linker does this too.
Reid Kleckneree4e0a22019-05-22 20:21:52 +0000812 setAlignment(16);
Rui Ueyama73835622015-06-26 18:28:56 +0000813}
814
Rui Ueyama136d27a2019-07-11 05:40:30 +0000815void ImportThunkChunkX64::writeTo(uint8_t *buf) const {
816 memcpy(buf, importThunkX86, sizeof(importThunkX86));
Rui Ueyama28df0422015-07-25 01:16:06 +0000817 // The first two bytes is a JMP instruction. Fill its operand.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000818 write32le(buf + 2, impSymbol->getRVA() - rva - getSize());
Rui Ueyama33fb2cb2015-07-15 00:25:38 +0000819}
820
Rui Ueyama136d27a2019-07-11 05:40:30 +0000821void ImportThunkChunkX86::getBaserels(std::vector<Baserel> *res) {
Amy Huang5a58b192023-01-09 23:37:28 -0500822 res->emplace_back(getRVA() + 2, ctx.config.machine);
Rui Ueyama28df0422015-07-25 01:16:06 +0000823}
824
Rui Ueyama136d27a2019-07-11 05:40:30 +0000825void ImportThunkChunkX86::writeTo(uint8_t *buf) const {
826 memcpy(buf, importThunkX86, sizeof(importThunkX86));
Rui Ueyama743afa02015-06-06 04:07:39 +0000827 // The first two bytes is a JMP instruction. Fill its operand.
Amy Huang5a58b192023-01-09 23:37:28 -0500828 write32le(buf + 2, impSymbol->getRVA() + ctx.config.imageBase);
Rui Ueyama411c63602015-05-28 19:09:30 +0000829}
830
Rui Ueyama136d27a2019-07-11 05:40:30 +0000831void ImportThunkChunkARM::getBaserels(std::vector<Baserel> *res) {
832 res->emplace_back(getRVA(), IMAGE_REL_BASED_ARM_MOV32T);
Rui Ueyama3dd93722015-07-25 03:39:29 +0000833}
834
Rui Ueyama136d27a2019-07-11 05:40:30 +0000835void ImportThunkChunkARM::writeTo(uint8_t *buf) const {
836 memcpy(buf, importThunkARM, sizeof(importThunkARM));
Rui Ueyama3dd93722015-07-25 03:39:29 +0000837 // Fix mov.w and mov.t operands.
Amy Huang5a58b192023-01-09 23:37:28 -0500838 applyMOV32T(buf, impSymbol->getRVA() + ctx.config.imageBase);
Rui Ueyama3dd93722015-07-25 03:39:29 +0000839}
840
Rui Ueyama136d27a2019-07-11 05:40:30 +0000841void ImportThunkChunkARM64::writeTo(uint8_t *buf) const {
842 int64_t off = impSymbol->getRVA() & 0xfff;
843 memcpy(buf, importThunkARM64, sizeof(importThunkARM64));
844 applyArm64Addr(buf, impSymbol->getRVA(), rva, 12);
845 applyArm64Ldr(buf + 4, off);
Martin Storsjo27791652017-07-11 07:22:44 +0000846}
847
Martin Storsjo57ddec02018-09-25 10:59:29 +0000848// A Thumb2, PIC, non-interworking range extension thunk.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000849const uint8_t armThunk[] = {
Martin Storsjo57ddec02018-09-25 10:59:29 +0000850 0x40, 0xf2, 0x00, 0x0c, // P: movw ip,:lower16:S - (P + (L1-P) + 4)
851 0xc0, 0xf2, 0x00, 0x0c, // movt ip,:upper16:S - (P + (L1-P) + 4)
852 0xe7, 0x44, // L1: add pc, ip
853};
854
Martin Storsjoc9f4d252019-02-01 22:08:09 +0000855size_t RangeExtensionThunkARM::getSize() const {
Amy Huang5a58b192023-01-09 23:37:28 -0500856 assert(ctx.config.machine == ARMNT);
857 (void)&ctx;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000858 return sizeof(armThunk);
Martin Storsjo57ddec02018-09-25 10:59:29 +0000859}
860
Rui Ueyama136d27a2019-07-11 05:40:30 +0000861void RangeExtensionThunkARM::writeTo(uint8_t *buf) const {
Amy Huang5a58b192023-01-09 23:37:28 -0500862 assert(ctx.config.machine == ARMNT);
Rui Ueyama136d27a2019-07-11 05:40:30 +0000863 uint64_t offset = target->getRVA() - rva - 12;
864 memcpy(buf, armThunk, sizeof(armThunk));
865 applyMOV32T(buf, uint32_t(offset));
Martin Storsjo57ddec02018-09-25 10:59:29 +0000866}
867
Martin Storsjoc9f4d252019-02-01 22:08:09 +0000868// A position independent ARM64 adrp+add thunk, with a maximum range of
869// +/- 4 GB, which is enough for any PE-COFF.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000870const uint8_t arm64Thunk[] = {
Martin Storsjoc9f4d252019-02-01 22:08:09 +0000871 0x10, 0x00, 0x00, 0x90, // adrp x16, Dest
872 0x10, 0x02, 0x00, 0x91, // add x16, x16, :lo12:Dest
873 0x00, 0x02, 0x1f, 0xd6, // br x16
874};
875
Jacek Cabanefad5612024-08-29 10:19:32 +0200876size_t RangeExtensionThunkARM64::getSize() const { return sizeof(arm64Thunk); }
Martin Storsjoc9f4d252019-02-01 22:08:09 +0000877
Rui Ueyama136d27a2019-07-11 05:40:30 +0000878void RangeExtensionThunkARM64::writeTo(uint8_t *buf) const {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000879 memcpy(buf, arm64Thunk, sizeof(arm64Thunk));
880 applyArm64Addr(buf + 0, target->getRVA(), rva, 12);
881 applyArm64Imm(buf + 4, target->getRVA() & 0xfff, 0);
Martin Storsjoc9f4d252019-02-01 22:08:09 +0000882}
883
Amy Huang5a58b192023-01-09 23:37:28 -0500884LocalImportChunk::LocalImportChunk(COFFLinkerContext &c, Defined *s)
885 : sym(s), ctx(c) {
886 setAlignment(ctx.config.wordsize);
Amy Huang7370ff62022-07-14 15:53:32 -0400887}
888
Amy Huang5a58b192023-01-09 23:37:28 -0500889void LocalImportChunk::getBaserels(std::vector<Baserel> *res) {
890 res->emplace_back(getRVA(), ctx.config.machine);
891}
892
893size_t LocalImportChunk::getSize() const { return ctx.config.wordsize; }
Rui Ueyamad4b351f2015-07-09 21:15:58 +0000894
Rui Ueyama136d27a2019-07-11 05:40:30 +0000895void LocalImportChunk::writeTo(uint8_t *buf) const {
Amy Huang5a58b192023-01-09 23:37:28 -0500896 if (ctx.config.is64()) {
897 write64le(buf, sym->getRVA() + ctx.config.imageBase);
Rui Ueyamad4b351f2015-07-09 21:15:58 +0000898 } else {
Amy Huang5a58b192023-01-09 23:37:28 -0500899 write32le(buf, sym->getRVA() + ctx.config.imageBase);
Rui Ueyamad4b351f2015-07-09 21:15:58 +0000900 }
Rui Ueyama7a333c62015-07-02 20:33:50 +0000901}
902
Rui Ueyama136d27a2019-07-11 05:40:30 +0000903void RVATableChunk::writeTo(uint8_t *buf) const {
904 ulittle32_t *begin = reinterpret_cast<ulittle32_t *>(buf);
905 size_t cnt = 0;
906 for (const ChunkAndOffset &co : syms)
907 begin[cnt++] = co.inputChunk->getRVA() + co.offset;
Dmitri Gribenkoaba43032022-07-23 15:14:14 +0200908 llvm::sort(begin, begin + cnt);
Rui Ueyama136d27a2019-07-11 05:40:30 +0000909 assert(std::unique(begin, begin + cnt) == begin + cnt &&
Reid Kleckneraf2f7da2018-02-06 01:58:26 +0000910 "RVA tables should be de-duplicated");
Rui Ueyamacd3f99b2015-07-24 23:51:14 +0000911}
912
Pengfei Wang184377d2021-04-14 14:21:52 +0800913void RVAFlagTableChunk::writeTo(uint8_t *buf) const {
914 struct RVAFlag {
915 ulittle32_t rva;
916 uint8_t flag;
917 };
David Blaikiee5b66a32021-05-24 16:51:31 -0700918 auto flags =
Joe Losera288d7f2023-01-15 21:39:16 -0700919 MutableArrayRef(reinterpret_cast<RVAFlag *>(buf), syms.size());
David Blaikiee5b66a32021-05-24 16:51:31 -0700920 for (auto t : zip(syms, flags)) {
921 const auto &sym = std::get<0>(t);
922 auto &flag = std::get<1>(t);
923 flag.rva = sym.inputChunk->getRVA() + sym.offset;
924 flag.flag = 0;
Pengfei Wang184377d2021-04-14 14:21:52 +0800925 }
David Blaikiee5b66a32021-05-24 16:51:31 -0700926 llvm::sort(flags,
927 [](const RVAFlag &a, const RVAFlag &b) { return a.rva < b.rva; });
928 assert(llvm::unique(flags, [](const RVAFlag &a,
929 const RVAFlag &b) { return a.rva == b.rva; }) ==
930 flags.end() &&
Pengfei Wang184377d2021-04-14 14:21:52 +0800931 "RVA tables should be de-duplicated");
932}
933
Jacek Cabanfe2bd122023-11-15 12:35:45 +0100934size_t ECCodeMapChunk::getSize() const {
935 return map.size() * sizeof(chpe_range_entry);
936}
937
938void ECCodeMapChunk::writeTo(uint8_t *buf) const {
939 auto table = reinterpret_cast<chpe_range_entry *>(buf);
940 for (uint32_t i = 0; i < map.size(); i++) {
941 const ECCodeMapEntry &entry = map[i];
942 uint32_t start = entry.first->getRVA();
943 table[i].StartOffset = start | entry.type;
944 table[i].Length = entry.last->getRVA() + entry.last->getSize() - start;
945 }
946}
947
Martin Storsjoeac1b052018-08-27 08:43:31 +0000948// MinGW specific, for the "automatic import of variables from DLLs" feature.
949size_t PseudoRelocTableChunk::getSize() const {
Rui Ueyama136d27a2019-07-11 05:40:30 +0000950 if (relocs.empty())
Martin Storsjoeac1b052018-08-27 08:43:31 +0000951 return 0;
Rui Ueyama136d27a2019-07-11 05:40:30 +0000952 return 12 + 12 * relocs.size();
Martin Storsjoeac1b052018-08-27 08:43:31 +0000953}
954
955// MinGW specific.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000956void PseudoRelocTableChunk::writeTo(uint8_t *buf) const {
957 if (relocs.empty())
Martin Storsjoeac1b052018-08-27 08:43:31 +0000958 return;
959
Rui Ueyama136d27a2019-07-11 05:40:30 +0000960 ulittle32_t *table = reinterpret_cast<ulittle32_t *>(buf);
Martin Storsjoeac1b052018-08-27 08:43:31 +0000961 // This is the list header, to signal the runtime pseudo relocation v2
962 // format.
Rui Ueyama136d27a2019-07-11 05:40:30 +0000963 table[0] = 0;
964 table[1] = 0;
965 table[2] = 1;
Martin Storsjoeac1b052018-08-27 08:43:31 +0000966
Rui Ueyama136d27a2019-07-11 05:40:30 +0000967 size_t idx = 3;
968 for (const RuntimePseudoReloc &rpr : relocs) {
969 table[idx + 0] = rpr.sym->getRVA();
970 table[idx + 1] = rpr.target->getRVA() + rpr.targetOffset;
971 table[idx + 2] = rpr.flags;
972 idx += 3;
Martin Storsjoeac1b052018-08-27 08:43:31 +0000973 }
974}
975
Rui Ueyama1a7f6af2017-04-25 03:31:10 +0000976// Windows-specific. This class represents a block in .reloc section.
977// The format is described here.
978//
979// On Windows, each DLL is linked against a fixed base address and
980// usually loaded to that address. However, if there's already another
981// DLL that overlaps, the loader has to relocate it. To do that, DLLs
982// contain .reloc sections which contain offsets that need to be fixed
Rui Ueyama04171722017-04-26 20:20:05 +0000983// up at runtime. If the loader finds that a DLL cannot be loaded to its
Rui Ueyama1a7f6af2017-04-25 03:31:10 +0000984// desired base address, it loads it to somewhere else, and add <actual
985// base address> - <desired base address> to each offset that is
Rui Ueyama04171722017-04-26 20:20:05 +0000986// specified by the .reloc section. In ELF terms, .reloc sections
987// contain relative relocations in REL format (as opposed to RELA.)
Rui Ueyama1a7f6af2017-04-25 03:31:10 +0000988//
Rui Ueyama04171722017-04-26 20:20:05 +0000989// This already significantly reduces the size of relocations compared
990// to ELF .rel.dyn, but Windows does more to reduce it (probably because
991// it was invented for PCs in the late '80s or early '90s.) Offsets in
992// .reloc are grouped by page where the page size is 12 bits, and
993// offsets sharing the same page address are stored consecutively to
994// represent them with less space. This is very similar to the page
995// table which is grouped by (multiple stages of) pages.
Rui Ueyama1a7f6af2017-04-25 03:31:10 +0000996//
Rui Ueyama04171722017-04-26 20:20:05 +0000997// For example, let's say we have 0x00030, 0x00500, 0x00700, 0x00A00,
998// 0x20004, and 0x20008 in a .reloc section for x64. The uppermost 4
999// bits have a type IMAGE_REL_BASED_DIR64 or 0xA. In the section, they
1000// are represented like this:
Rui Ueyama1a7f6af2017-04-25 03:31:10 +00001001//
1002// 0x00000 -- page address (4 bytes)
1003// 16 -- size of this block (4 bytes)
Rui Ueyama04171722017-04-26 20:20:05 +00001004// 0xA030 -- entries (2 bytes each)
1005// 0xA500
1006// 0xA700
1007// 0xAA00
Rui Ueyama1a7f6af2017-04-25 03:31:10 +00001008// 0x20000 -- page address (4 bytes)
1009// 12 -- size of this block (4 bytes)
Rui Ueyama04171722017-04-26 20:20:05 +00001010// 0xA004 -- entries (2 bytes each)
1011// 0xA008
Rui Ueyama1a7f6af2017-04-25 03:31:10 +00001012//
Rui Ueyama04171722017-04-26 20:20:05 +00001013// Usually we have a lot of relocations for each page, so the number of
Rui Ueyama6cef17c2017-04-26 19:50:49 +00001014// bytes for one .reloc entry is close to 2 bytes on average.
Rui Ueyama136d27a2019-07-11 05:40:30 +00001015BaserelChunk::BaserelChunk(uint32_t page, Baserel *begin, Baserel *end) {
Rui Ueyama588e8322015-06-15 01:23:58 +00001016 // Block header consists of 4 byte page RVA and 4 byte block size.
1017 // Each entry is 2 byte. Last entry may be padding.
Rui Ueyama136d27a2019-07-11 05:40:30 +00001018 data.resize(alignTo((end - begin) * 2 + 8, 4));
1019 uint8_t *p = data.data();
1020 write32le(p, page);
1021 write32le(p + 4, data.size());
1022 p += 8;
1023 for (Baserel *i = begin; i != end; ++i) {
1024 write16le(p, (i->type << 12) | (i->rva - page));
1025 p += 2;
Rui Ueyama588e8322015-06-15 01:23:58 +00001026 }
1027}
1028
Rui Ueyama136d27a2019-07-11 05:40:30 +00001029void BaserelChunk::writeTo(uint8_t *buf) const {
1030 memcpy(buf, data.data(), data.size());
Rui Ueyama588e8322015-06-15 01:23:58 +00001031}
1032
Amy Huang5a58b192023-01-09 23:37:28 -05001033uint8_t Baserel::getDefaultType(llvm::COFF::MachineTypes machine) {
Jacek Caban233ed512024-09-05 15:57:20 +02001034 return is64Bit(machine) ? IMAGE_REL_BASED_DIR64 : IMAGE_REL_BASED_HIGHLOW;
Rui Ueyama3afd5bf2015-07-25 01:44:32 +00001035}
1036
Rui Ueyama136d27a2019-07-11 05:40:30 +00001037MergeChunk::MergeChunk(uint32_t alignment)
Guillaume Chatelet173f62d2022-12-02 12:42:43 +00001038 : builder(StringTableBuilder::RAW, llvm::Align(alignment)) {
Rui Ueyama136d27a2019-07-11 05:40:30 +00001039 setAlignment(alignment);
Peter Collingbournef1a11f82018-03-15 21:14:02 +00001040}
1041
Amy Huang6f7483b2021-09-16 16:48:26 -07001042void MergeChunk::addSection(COFFLinkerContext &ctx, SectionChunk *c) {
Rui Ueyama136d27a2019-07-11 05:40:30 +00001043 assert(isPowerOf2_32(c->getAlignment()));
1044 uint8_t p2Align = llvm::Log2_32(c->getAlignment());
Joe Loser1173ecf2022-09-09 12:43:07 -06001045 assert(p2Align < std::size(ctx.mergeChunkInstances));
Amy Huang6f7483b2021-09-16 16:48:26 -07001046 auto *&mc = ctx.mergeChunkInstances[p2Align];
Rui Ueyama136d27a2019-07-11 05:40:30 +00001047 if (!mc)
1048 mc = make<MergeChunk>(c->getAlignment());
1049 mc->sections.push_back(c);
Peter Collingbournef1a11f82018-03-15 21:14:02 +00001050}
1051
1052void MergeChunk::finalizeContents() {
Rui Ueyama136d27a2019-07-11 05:40:30 +00001053 assert(!finalized && "should only finalize once");
1054 for (SectionChunk *c : sections)
1055 if (c->live)
1056 builder.add(toStringRef(c->getContents()));
1057 builder.finalize();
1058 finalized = true;
Reid Kleckner11c141e2019-05-24 00:02:00 +00001059}
Peter Collingbournef1a11f82018-03-15 21:14:02 +00001060
Reid Kleckner11c141e2019-05-24 00:02:00 +00001061void MergeChunk::assignSubsectionRVAs() {
Rui Ueyama136d27a2019-07-11 05:40:30 +00001062 for (SectionChunk *c : sections) {
1063 if (!c->live)
Peter Collingbournef1a11f82018-03-15 21:14:02 +00001064 continue;
Rui Ueyama136d27a2019-07-11 05:40:30 +00001065 size_t off = builder.getOffset(toStringRef(c->getContents()));
1066 c->setRVA(rva + off);
Peter Collingbournef1a11f82018-03-15 21:14:02 +00001067 }
1068}
1069
Peter Collingbournefa322ab2018-04-19 20:03:24 +00001070uint32_t MergeChunk::getOutputCharacteristics() const {
Peter Collingbournef1a11f82018-03-15 21:14:02 +00001071 return IMAGE_SCN_MEM_READ | IMAGE_SCN_CNT_INITIALIZED_DATA;
1072}
1073
1074size_t MergeChunk::getSize() const {
Rui Ueyama136d27a2019-07-11 05:40:30 +00001075 return builder.getSize();
Peter Collingbournef1a11f82018-03-15 21:14:02 +00001076}
1077
Rui Ueyama136d27a2019-07-11 05:40:30 +00001078void MergeChunk::writeTo(uint8_t *buf) const {
1079 builder.write(buf);
Peter Collingbournef1a11f82018-03-15 21:14:02 +00001080}
1081
Martin Storsjo7a416932018-09-14 22:26:59 +00001082// MinGW specific.
Jacek Cabana92bfaa2025-02-17 21:34:12 +01001083size_t AbsolutePointerChunk::getSize() const {
1084 return symtab.ctx.config.wordsize;
1085}
Martin Storsjo7a416932018-09-14 22:26:59 +00001086
Rui Ueyama136d27a2019-07-11 05:40:30 +00001087void AbsolutePointerChunk::writeTo(uint8_t *buf) const {
Jacek Cabana92bfaa2025-02-17 21:34:12 +01001088 if (symtab.ctx.config.is64()) {
Rui Ueyama136d27a2019-07-11 05:40:30 +00001089 write64le(buf, value);
Martin Storsjo7a416932018-09-14 22:26:59 +00001090 } else {
Rui Ueyama136d27a2019-07-11 05:40:30 +00001091 write32le(buf, value);
Martin Storsjo7a416932018-09-14 22:26:59 +00001092 }
1093}
1094
Jacek Cabana92bfaa2025-02-17 21:34:12 +01001095MachineTypes AbsolutePointerChunk::getMachine() const { return symtab.machine; }
1096
Jacek Cabana2d87432024-08-22 22:03:05 +02001097void ECExportThunkChunk::writeTo(uint8_t *buf) const {
1098 memcpy(buf, ECExportThunkCode, sizeof(ECExportThunkCode));
1099 write32le(buf + 10, target->getRVA() - rva - 14);
1100}
1101
Jacek Caban52a71162024-08-23 21:17:38 +02001102size_t CHPECodeRangesChunk::getSize() const {
1103 return exportThunks.size() * sizeof(chpe_code_range_entry);
1104}
1105
1106void CHPECodeRangesChunk::writeTo(uint8_t *buf) const {
1107 auto ranges = reinterpret_cast<chpe_code_range_entry *>(buf);
1108
1109 for (uint32_t i = 0; i < exportThunks.size(); i++) {
1110 Chunk *thunk = exportThunks[i].first;
1111 uint32_t start = thunk->getRVA();
1112 ranges[i].StartRva = start;
1113 ranges[i].EndRva = start + thunk->getSize();
1114 ranges[i].EntryPoint = start;
1115 }
1116}
1117
Jacek Cabancaa844e2024-08-23 20:29:19 +02001118size_t CHPERedirectionChunk::getSize() const {
Jacek Cabandafbc972024-11-07 12:44:45 +01001119 // Add an extra +1 for a terminator entry.
1120 return (exportThunks.size() + 1) * sizeof(chpe_redirection_entry);
Jacek Cabancaa844e2024-08-23 20:29:19 +02001121}
1122
1123void CHPERedirectionChunk::writeTo(uint8_t *buf) const {
1124 auto entries = reinterpret_cast<chpe_redirection_entry *>(buf);
1125
1126 for (uint32_t i = 0; i < exportThunks.size(); i++) {
1127 entries[i].Source = exportThunks[i].first->getRVA();
1128 entries[i].Destination = exportThunks[i].second->getRVA();
1129 }
1130}
1131
Jacek Caban99a23542024-09-11 14:46:40 +02001132ImportThunkChunkARM64EC::ImportThunkChunkARM64EC(ImportFile *file)
Jacek Caban6b493ba2024-12-15 12:45:34 +01001133 : ImportThunkChunk(file->symtab.ctx, file->impSym), file(file) {}
Jacek Caban99a23542024-09-11 14:46:40 +02001134
Jacek Cabanf661e6952024-09-26 10:44:40 +02001135size_t ImportThunkChunkARM64EC::getSize() const {
1136 if (!extended)
1137 return sizeof(importThunkARM64EC);
1138 // The last instruction is replaced with an inline range extension thunk.
1139 return sizeof(importThunkARM64EC) + sizeof(arm64Thunk) - sizeof(uint32_t);
1140}
1141
Jacek Caban99a23542024-09-11 14:46:40 +02001142void ImportThunkChunkARM64EC::writeTo(uint8_t *buf) const {
1143 memcpy(buf, importThunkARM64EC, sizeof(importThunkARM64EC));
1144 applyArm64Addr(buf, file->impSym->getRVA(), rva, 12);
1145 applyArm64Ldr(buf + 4, file->impSym->getRVA() & 0xfff);
1146
1147 // The exit thunk may be missing. This can happen if the application only
1148 // references a function by its address (in which case the thunk is never
1149 // actually used, but is still required to fill the auxiliary IAT), or in
1150 // cases of hand-written assembly calling an imported ARM64EC function (where
1151 // the exit thunk is ignored by __icall_helper_arm64ec). In such cases, MSVC
1152 // link.exe uses 0 as the RVA.
1153 uint32_t exitThunkRVA = exitThunk ? exitThunk->getRVA() : 0;
1154 applyArm64Addr(buf + 8, exitThunkRVA, rva + 8, 12);
1155 applyArm64Imm(buf + 12, exitThunkRVA & 0xfff, 0);
1156
Jacek Caban6b493ba2024-12-15 12:45:34 +01001157 Defined *helper = cast<Defined>(file->symtab.ctx.config.arm64ECIcallHelper);
Jacek Cabanf661e6952024-09-26 10:44:40 +02001158 if (extended) {
1159 // Replace last instruction with an inline range extension thunk.
1160 memcpy(buf + 16, arm64Thunk, sizeof(arm64Thunk));
1161 applyArm64Addr(buf + 16, helper->getRVA(), rva + 16, 12);
1162 applyArm64Imm(buf + 20, helper->getRVA() & 0xfff, 0);
1163 } else {
1164 applyArm64Branch26(buf + 16, helper->getRVA() - rva - 16);
1165 }
1166}
1167
1168bool ImportThunkChunkARM64EC::verifyRanges() {
1169 if (extended)
1170 return true;
Jacek Caban6b493ba2024-12-15 12:45:34 +01001171 auto helper = cast<Defined>(file->symtab.ctx.config.arm64ECIcallHelper);
Jacek Cabanf661e6952024-09-26 10:44:40 +02001172 return isInt<28>(helper->getRVA() - rva - 16);
1173}
1174
1175uint32_t ImportThunkChunkARM64EC::extendRanges() {
1176 if (extended || verifyRanges())
1177 return 0;
1178 extended = true;
1179 // The last instruction is replaced with an inline range extension thunk.
1180 return sizeof(arm64Thunk) - sizeof(uint32_t);
Jacek Caban99a23542024-09-11 14:46:40 +02001181}
1182
Jacek Caban3b0dafff2025-01-10 21:50:07 +01001183uint64_t Arm64XRelocVal::get() const {
Jacek Caban659e66e2025-01-21 22:24:00 +01001184 return (sym ? sym->getRVA() : 0) + (chunk ? chunk->getRVA() : 0) + value;
Jacek Caban3b0dafff2025-01-10 21:50:07 +01001185}
1186
Jacek Caban71bbafb2024-12-05 13:07:41 +01001187size_t Arm64XDynamicRelocEntry::getSize() const {
1188 switch (type) {
Jacek Cabanfb01a282025-01-26 22:11:40 +01001189 case IMAGE_DVRT_ARM64X_FIXUP_TYPE_ZEROFILL:
1190 return sizeof(uint16_t); // Just a header.
Jacek Caban71bbafb2024-12-05 13:07:41 +01001191 case IMAGE_DVRT_ARM64X_FIXUP_TYPE_VALUE:
1192 return sizeof(uint16_t) + size; // A header and a payload.
1193 case IMAGE_DVRT_ARM64X_FIXUP_TYPE_DELTA:
Jacek Cabanfb01a282025-01-26 22:11:40 +01001194 return 2 * sizeof(uint16_t); // A header and a delta.
Jacek Caban71bbafb2024-12-05 13:07:41 +01001195 }
Jacek Caban799e9882025-01-10 14:38:22 +01001196 llvm_unreachable("invalid type");
Jacek Caban71bbafb2024-12-05 13:07:41 +01001197}
1198
1199void Arm64XDynamicRelocEntry::writeTo(uint8_t *buf) const {
1200 auto out = reinterpret_cast<ulittle16_t *>(buf);
Jacek Cabana16adaf2025-01-20 11:38:54 +01001201 *out = (offset.get() & 0xfff) | (type << 12);
Jacek Caban71bbafb2024-12-05 13:07:41 +01001202
1203 switch (type) {
Jacek Cabanfb01a282025-01-26 22:11:40 +01001204 case IMAGE_DVRT_ARM64X_FIXUP_TYPE_ZEROFILL:
1205 *out |= ((bit_width(size) - 1) << 14); // Encode the size.
1206 break;
Jacek Caban71bbafb2024-12-05 13:07:41 +01001207 case IMAGE_DVRT_ARM64X_FIXUP_TYPE_VALUE:
1208 *out |= ((bit_width(size) - 1) << 14); // Encode the size.
1209 switch (size) {
1210 case 2:
Jacek Caban3b0dafff2025-01-10 21:50:07 +01001211 out[1] = value.get();
Jacek Caban71bbafb2024-12-05 13:07:41 +01001212 break;
1213 case 4:
Jacek Caban3b0dafff2025-01-10 21:50:07 +01001214 *reinterpret_cast<ulittle32_t *>(out + 1) = value.get();
Jacek Caban71bbafb2024-12-05 13:07:41 +01001215 break;
1216 case 8:
Jacek Caban3b0dafff2025-01-10 21:50:07 +01001217 *reinterpret_cast<ulittle64_t *>(out + 1) = value.get();
Jacek Caban71bbafb2024-12-05 13:07:41 +01001218 break;
1219 default:
1220 llvm_unreachable("invalid size");
1221 }
1222 break;
1223 case IMAGE_DVRT_ARM64X_FIXUP_TYPE_DELTA:
Jacek Cabanfb01a282025-01-26 22:11:40 +01001224 int delta = value.get();
1225 // Negative offsets use a sign bit in the header.
1226 if (delta < 0) {
1227 *out |= 1 << 14;
1228 delta = -delta;
1229 }
1230 // Depending on the value, the delta is encoded with a shift of 2 or 3 bits.
1231 if (delta & 7) {
1232 assert(!(delta & 3));
1233 delta >>= 2;
1234 } else {
1235 *out |= (1 << 15);
1236 delta >>= 3;
1237 }
1238 out[1] = delta;
1239 assert(!(delta & ~0xffff));
1240 break;
Jacek Caban71bbafb2024-12-05 13:07:41 +01001241 }
1242}
1243
1244void DynamicRelocsChunk::finalize() {
1245 llvm::stable_sort(arm64xRelocs, [=](const Arm64XDynamicRelocEntry &a,
1246 const Arm64XDynamicRelocEntry &b) {
Jacek Cabana16adaf2025-01-20 11:38:54 +01001247 return a.offset.get() < b.offset.get();
Jacek Caban71bbafb2024-12-05 13:07:41 +01001248 });
1249
Jacek Cabana16adaf2025-01-20 11:38:54 +01001250 size = sizeof(coff_dynamic_reloc_table) + sizeof(coff_dynamic_relocation64);
1251 uint32_t prevPage = 0xfff;
Jacek Caban71bbafb2024-12-05 13:07:41 +01001252
1253 for (const Arm64XDynamicRelocEntry &entry : arm64xRelocs) {
Jacek Cabana16adaf2025-01-20 11:38:54 +01001254 uint32_t page = entry.offset.get() & ~0xfff;
1255 if (page != prevPage) {
1256 size = alignTo(size, sizeof(uint32_t)) +
1257 sizeof(coff_base_reloc_block_header);
1258 prevPage = page;
1259 }
Jacek Caban71bbafb2024-12-05 13:07:41 +01001260 size += entry.getSize();
1261 }
1262
1263 size = alignTo(size, sizeof(uint32_t));
1264}
1265
Jacek Caban659e66e2025-01-21 22:24:00 +01001266// Set the reloc value. The reloc entry must be allocated beforehand.
1267void DynamicRelocsChunk::set(uint32_t rva, Arm64XRelocVal value) {
1268 auto entry =
1269 llvm::find_if(arm64xRelocs, [rva](const Arm64XDynamicRelocEntry &e) {
1270 return e.offset.get() == rva;
1271 });
1272 assert(entry != arm64xRelocs.end());
1273 assert(!entry->value.get());
1274 entry->value = value;
1275}
1276
Jacek Caban71bbafb2024-12-05 13:07:41 +01001277void DynamicRelocsChunk::writeTo(uint8_t *buf) const {
1278 auto table = reinterpret_cast<coff_dynamic_reloc_table *>(buf);
1279 table->Version = 1;
1280 table->Size = sizeof(coff_dynamic_relocation64);
1281 buf += sizeof(*table);
1282
1283 auto header = reinterpret_cast<coff_dynamic_relocation64 *>(buf);
1284 header->Symbol = IMAGE_DYNAMIC_RELOCATION_ARM64X;
1285 buf += sizeof(*header);
1286
Jacek Cabana16adaf2025-01-20 11:38:54 +01001287 coff_base_reloc_block_header *pageHeader = nullptr;
1288 size_t relocSize = 0;
Jacek Caban71bbafb2024-12-05 13:07:41 +01001289 for (const Arm64XDynamicRelocEntry &entry : arm64xRelocs) {
Jacek Cabana16adaf2025-01-20 11:38:54 +01001290 uint32_t page = entry.offset.get() & ~0xfff;
1291 if (!pageHeader || page != pageHeader->PageRVA) {
1292 relocSize = alignTo(relocSize, sizeof(uint32_t));
1293 if (pageHeader)
1294 pageHeader->BlockSize =
1295 buf + relocSize - reinterpret_cast<uint8_t *>(pageHeader);
1296 pageHeader =
1297 reinterpret_cast<coff_base_reloc_block_header *>(buf + relocSize);
1298 pageHeader->PageRVA = page;
1299 relocSize += sizeof(*pageHeader);
1300 }
Jacek Caban71bbafb2024-12-05 13:07:41 +01001301
Jacek Cabana16adaf2025-01-20 11:38:54 +01001302 entry.writeTo(buf + relocSize);
1303 relocSize += entry.getSize();
1304 }
1305 relocSize = alignTo(relocSize, sizeof(uint32_t));
1306 pageHeader->BlockSize =
1307 buf + relocSize - reinterpret_cast<uint8_t *>(pageHeader);
1308
1309 header->BaseRelocSize = relocSize;
1310 table->Size += relocSize;
1311 assert(size == sizeof(*table) + sizeof(*header) + relocSize);
Jacek Caban71bbafb2024-12-05 13:07:41 +01001312}
1313
Nico Weber7c266412022-08-08 11:32:26 -04001314} // namespace lld::coff