//===---- ELF_x86_64.cpp -JIT linker implementation for ELF/x86-64 ----===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // // ELF/x86-64 jit-link implementation. // //===----------------------------------------------------------------------===// #include "llvm/ExecutionEngine/JITLink/ELF_x86_64.h" #include "llvm/ExecutionEngine/JITLink/DWARFRecordSectionSplitter.h" #include "llvm/ExecutionEngine/JITLink/JITLink.h" #include "llvm/ExecutionEngine/JITLink/TableManager.h" #include "llvm/ExecutionEngine/JITLink/x86_64.h" #include "llvm/Object/ELFObjectFile.h" #include "DefineExternalSectionStartAndEndSymbols.h" #include "EHFrameSupportImpl.h" #include "ELFLinkGraphBuilder.h" #include "JITLinkGeneric.h" #define DEBUG_TYPE "jitlink" using namespace llvm; using namespace llvm::jitlink; namespace { constexpr StringRef ELFGOTSymbolName = "_GLOBAL_OFFSET_TABLE_"; constexpr StringRef ELFTLSInfoSectionName = "$__TLSINFO"; class TLSInfoTableManager_ELF_x86_64 : public TableManager { public: static const uint8_t TLSInfoEntryContent[16]; static StringRef getSectionName() { return ELFTLSInfoSectionName; } bool visitEdge(LinkGraph &G, Block *B, Edge &E) { if (E.getKind() == x86_64::RequestTLSDescInGOTAndTransformToDelta32) { LLVM_DEBUG({ dbgs() << " Fixing " << G.getEdgeKindName(E.getKind()) << " edge at " << formatv("{0:x}", B->getFixupAddress(E)) << " (" << formatv("{0:x}", B->getAddress()) << " + " << formatv("{0:x}", E.getOffset()) << ")\n"; }); E.setKind(x86_64::Delta32); E.setTarget(getEntryForTarget(G, E.getTarget())); return true; } return false; } Symbol &createEntry(LinkGraph &G, Symbol &Target) { // the TLS Info entry's key value will be written by the fixTLVSectionByName // pass, so create mutable content. auto &TLSInfoEntry = G.createMutableContentBlock( getTLSInfoSection(G), G.allocateContent(getTLSInfoEntryContent()), orc::ExecutorAddr(), 8, 0); TLSInfoEntry.addEdge(x86_64::Pointer64, 8, Target, 0); return G.addAnonymousSymbol(TLSInfoEntry, 0, 16, false, false); } private: Section &getTLSInfoSection(LinkGraph &G) { if (!TLSInfoTable) TLSInfoTable = &G.createSection(ELFTLSInfoSectionName, orc::MemProt::Read); return *TLSInfoTable; } ArrayRef getTLSInfoEntryContent() const { return {reinterpret_cast(TLSInfoEntryContent), sizeof(TLSInfoEntryContent)}; } Section *TLSInfoTable = nullptr; }; const uint8_t TLSInfoTableManager_ELF_x86_64::TLSInfoEntryContent[16] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, /*pthread key */ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 /*data address*/ }; Error buildTables_ELF_x86_64(LinkGraph &G) { LLVM_DEBUG(dbgs() << "Visiting edges in graph:\n"); x86_64::GOTTableManager GOT; x86_64::PLTTableManager PLT(GOT); TLSInfoTableManager_ELF_x86_64 TLSInfo; visitExistingEdges(G, GOT, PLT, TLSInfo); return Error::success(); } } // namespace namespace llvm { namespace jitlink { class ELFLinkGraphBuilder_x86_64 : public ELFLinkGraphBuilder { private: using ELFT = object::ELF64LE; Error addRelocations() override { LLVM_DEBUG(dbgs() << "Processing relocations:\n"); using Base = ELFLinkGraphBuilder; using Self = ELFLinkGraphBuilder_x86_64; for (const auto &RelSect : Base::Sections) { // Validate the section to read relocation entries from. if (RelSect.sh_type == ELF::SHT_REL) return make_error( "No SHT_REL in valid x64 ELF object files", inconvertibleErrorCode()); if (Error Err = Base::forEachRelaRelocation(RelSect, this, &Self::addSingleRelocation)) return Err; } return Error::success(); } Error addSingleRelocation(const typename ELFT::Rela &Rel, const typename ELFT::Shdr &FixupSection, Block &BlockToFix) { using Base = ELFLinkGraphBuilder; auto ELFReloc = Rel.getType(false); // R_X86_64_NONE is a no-op. if (LLVM_UNLIKELY(ELFReloc == ELF::R_X86_64_NONE)) return Error::success(); uint32_t SymbolIndex = Rel.getSymbol(false); auto ObjSymbol = Base::Obj.getRelocationSymbol(Rel, Base::SymTabSec); if (!ObjSymbol) return ObjSymbol.takeError(); Symbol *GraphSymbol = Base::getGraphSymbol(SymbolIndex); if (!GraphSymbol) return make_error( formatv("Could not find symbol at given index, did you add it to " "JITSymbolTable? index: {0}, shndx: {1} Size of table: {2}", SymbolIndex, (*ObjSymbol)->st_shndx, Base::GraphSymbols.size()), inconvertibleErrorCode()); // Validate the relocation kind. int64_t Addend = Rel.r_addend; Edge::Kind Kind = Edge::Invalid; switch (ELFReloc) { case ELF::R_X86_64_PC32: case ELF::R_X86_64_GOTPC32: Kind = x86_64::Delta32; break; case ELF::R_X86_64_PC64: case ELF::R_X86_64_GOTPC64: Kind = x86_64::Delta64; break; case ELF::R_X86_64_32: Kind = x86_64::Pointer32; break; case ELF::R_X86_64_16: Kind = x86_64::Pointer16; break; case ELF::R_X86_64_8: Kind = x86_64::Pointer8; break; case ELF::R_X86_64_32S: Kind = x86_64::Pointer32Signed; break; case ELF::R_X86_64_64: Kind = x86_64::Pointer64; break; case ELF::R_X86_64_GOTPCREL: Kind = x86_64::RequestGOTAndTransformToDelta32; break; case ELF::R_X86_64_REX_GOTPCRELX: Kind = x86_64::RequestGOTAndTransformToPCRel32GOTLoadREXRelaxable; Addend = 0; break; case ELF::R_X86_64_TLSGD: Kind = x86_64::RequestTLSDescInGOTAndTransformToDelta32; break; case ELF::R_X86_64_GOTPCRELX: Kind = x86_64::RequestGOTAndTransformToPCRel32GOTLoadRelaxable; Addend = 0; break; case ELF::R_X86_64_GOTPCREL64: Kind = x86_64::RequestGOTAndTransformToDelta64; break; case ELF::R_X86_64_GOT64: Kind = x86_64::RequestGOTAndTransformToDelta64FromGOT; break; case ELF::R_X86_64_GOTOFF64: Kind = x86_64::Delta64FromGOT; break; case ELF::R_X86_64_PLT32: Kind = x86_64::BranchPCRel32; // BranchPCRel32 implicitly handles the '-4' PC adjustment, so we have to // adjust the addend by '+4' to compensate. Addend += 4; break; default: return make_error( "In " + G->getName() + ": Unsupported x86-64 relocation type " + object::getELFRelocationTypeName(ELF::EM_X86_64, ELFReloc)); } auto FixupAddress = orc::ExecutorAddr(FixupSection.sh_addr) + Rel.r_offset; Edge::OffsetT Offset = FixupAddress - BlockToFix.getAddress(); Edge GE(Kind, Offset, *GraphSymbol, Addend); LLVM_DEBUG({ dbgs() << " "; printEdge(dbgs(), BlockToFix, GE, x86_64::getEdgeKindName(Kind)); dbgs() << "\n"; }); BlockToFix.addEdge(std::move(GE)); return Error::success(); } public: ELFLinkGraphBuilder_x86_64(StringRef FileName, const object::ELFFile &Obj, SubtargetFeatures Features) : ELFLinkGraphBuilder(Obj, Triple("x86_64-unknown-linux"), std::move(Features), FileName, x86_64::getEdgeKindName) {} }; class ELFJITLinker_x86_64 : public JITLinker { friend class JITLinker; public: ELFJITLinker_x86_64(std::unique_ptr Ctx, std::unique_ptr G, PassConfiguration PassConfig) : JITLinker(std::move(Ctx), std::move(G), std::move(PassConfig)) { if (shouldAddDefaultTargetPasses(getGraph().getTargetTriple())) getPassConfig().PostAllocationPasses.push_back( [this](LinkGraph &G) { return getOrCreateGOTSymbol(G); }); } private: Symbol *GOTSymbol = nullptr; Error getOrCreateGOTSymbol(LinkGraph &G) { auto DefineExternalGOTSymbolIfPresent = createDefineExternalSectionStartAndEndSymbolsPass( [&](LinkGraph &LG, Symbol &Sym) -> SectionRangeSymbolDesc { if (Sym.getName() == ELFGOTSymbolName) if (auto *GOTSection = G.findSectionByName( x86_64::GOTTableManager::getSectionName())) { GOTSymbol = &Sym; return {*GOTSection, true}; } return {}; }); // Try to attach _GLOBAL_OFFSET_TABLE_ to the GOT if it's defined as an // external. if (auto Err = DefineExternalGOTSymbolIfPresent(G)) return Err; // If we succeeded then we're done. if (GOTSymbol) return Error::success(); // Otherwise look for a GOT section: If it already has a start symbol we'll // record it, otherwise we'll create our own. // If there's a GOT section but we didn't find an external GOT symbol... if (auto *GOTSection = G.findSectionByName(x86_64::GOTTableManager::getSectionName())) { // Check for an existing defined symbol. for (auto *Sym : GOTSection->symbols()) if (Sym->getName() == ELFGOTSymbolName) { GOTSymbol = Sym; return Error::success(); } // If there's no defined symbol then create one. SectionRange SR(*GOTSection); if (SR.empty()) GOTSymbol = &G.addAbsoluteSymbol(ELFGOTSymbolName, orc::ExecutorAddr(), 0, Linkage::Strong, Scope::Local, true); else GOTSymbol = &G.addDefinedSymbol(*SR.getFirstBlock(), 0, ELFGOTSymbolName, 0, Linkage::Strong, Scope::Local, false, true); } // If we still haven't found a GOT symbol then double check the externals. // We may have a GOT-relative reference but no GOT section, in which case // we just need to point the GOT symbol at some address in this graph. if (!GOTSymbol) { for (auto *Sym : G.external_symbols()) { if (Sym->getName() == ELFGOTSymbolName) { auto Blocks = G.blocks(); if (!Blocks.empty()) { G.makeAbsolute(*Sym, (*Blocks.begin())->getAddress()); GOTSymbol = Sym; break; } } } } return Error::success(); } Error applyFixup(LinkGraph &G, Block &B, const Edge &E) const { return x86_64::applyFixup(G, B, E, GOTSymbol); } }; Expected> createLinkGraphFromELFObject_x86_64(MemoryBufferRef ObjectBuffer) { LLVM_DEBUG({ dbgs() << "Building jitlink graph for new input " << ObjectBuffer.getBufferIdentifier() << "...\n"; }); auto ELFObj = object::ObjectFile::createELFObjectFile(ObjectBuffer); if (!ELFObj) return ELFObj.takeError(); auto Features = (*ELFObj)->getFeatures(); if (!Features) return Features.takeError(); auto &ELFObjFile = cast>(**ELFObj); return ELFLinkGraphBuilder_x86_64((*ELFObj)->getFileName(), ELFObjFile.getELFFile(), std::move(*Features)) .buildGraph(); } static SectionRangeSymbolDesc identifyELFSectionStartAndEndSymbols(LinkGraph &G, Symbol &Sym) { constexpr StringRef StartSymbolPrefix = "__start"; constexpr StringRef EndSymbolPrefix = "__end"; auto SymName = Sym.getName(); if (SymName.starts_with(StartSymbolPrefix)) { if (auto *Sec = G.findSectionByName(SymName.drop_front(StartSymbolPrefix.size()))) return {*Sec, true}; } else if (SymName.starts_with(EndSymbolPrefix)) { if (auto *Sec = G.findSectionByName(SymName.drop_front(EndSymbolPrefix.size()))) return {*Sec, false}; } return {}; } void link_ELF_x86_64(std::unique_ptr G, std::unique_ptr Ctx) { PassConfiguration Config; if (Ctx->shouldAddDefaultTargetPasses(G->getTargetTriple())) { Config.PrePrunePasses.push_back(DWARFRecordSectionSplitter(".eh_frame")); Config.PrePrunePasses.push_back(EHFrameEdgeFixer( ".eh_frame", x86_64::PointerSize, x86_64::Pointer32, x86_64::Pointer64, x86_64::Delta32, x86_64::Delta64, x86_64::NegDelta32)); Config.PrePrunePasses.push_back(EHFrameNullTerminator(".eh_frame")); // Construct a JITLinker and run the link function. // Add a mark-live pass. if (auto MarkLive = Ctx->getMarkLivePass(G->getTargetTriple())) Config.PrePrunePasses.push_back(std::move(MarkLive)); else Config.PrePrunePasses.push_back(markAllSymbolsLive); // Add an in-place GOT/Stubs/TLSInfoEntry build pass. Config.PostPrunePasses.push_back(buildTables_ELF_x86_64); // Resolve any external section start / end symbols. Config.PostAllocationPasses.push_back( createDefineExternalSectionStartAndEndSymbolsPass( identifyELFSectionStartAndEndSymbols)); // Add GOT/Stubs optimizer pass. Config.PreFixupPasses.push_back(x86_64::optimizeGOTAndStubAccesses); } if (auto Err = Ctx->modifyPassConfig(*G, Config)) return Ctx->notifyFailed(std::move(Err)); ELFJITLinker_x86_64::link(std::move(Ctx), std::move(G), std::move(Config)); } } // end namespace jitlink } // end namespace llvm