cranelift: Add COFF TLS Support (#4546)

* cranelift: Implement COFF TLS Relocations

* cranelift: Emit SecRel relocations

* cranelift: Handle _tls_index symbol in backend
This commit is contained in:
Afonso Bordado
2022-08-11 17:33:40 +01:00
committed by GitHub
parent a40b253792
commit c5bc368cfe
10 changed files with 153 additions and 29 deletions

View File

@@ -35,6 +35,10 @@ pub enum Reloc {
X86CallPLTRel4, X86CallPLTRel4,
/// x86 GOT PC-relative 4-byte /// x86 GOT PC-relative 4-byte
X86GOTPCRel4, X86GOTPCRel4,
/// The 32-bit offset of the target from the beginning of its section.
/// Equivalent to `IMAGE_REL_AMD64_SECREL`.
/// See: [PE Format](https://docs.microsoft.com/en-us/windows/win32/debug/pe-format)
X86SecRel,
/// Arm32 call target /// Arm32 call target
Arm32Call, Arm32Call,
/// Arm64 call target. Encoded as bottom 26 bits of instruction. This /// Arm64 call target. Encoded as bottom 26 bits of instruction. This
@@ -81,6 +85,7 @@ impl fmt::Display for Reloc {
Self::X86CallPCRel4 => write!(f, "CallPCRel4"), Self::X86CallPCRel4 => write!(f, "CallPCRel4"),
Self::X86CallPLTRel4 => write!(f, "CallPLTRel4"), Self::X86CallPLTRel4 => write!(f, "CallPLTRel4"),
Self::X86GOTPCRel4 => write!(f, "GOTPCRel4"), Self::X86GOTPCRel4 => write!(f, "GOTPCRel4"),
Self::X86SecRel => write!(f, "SecRel"),
Self::Arm32Call | Self::Arm64Call => write!(f, "Call"), Self::Arm32Call | Self::Arm64Call => write!(f, "Call"),
Self::ElfX86_64TlsGd => write!(f, "ElfX86_64TlsGd"), Self::ElfX86_64TlsGd => write!(f, "ElfX86_64TlsGd"),

View File

@@ -9,6 +9,9 @@ use serde::{Deserialize, Serialize};
pub enum KnownSymbol { pub enum KnownSymbol {
/// ELF well-known linker symbol _GLOBAL_OFFSET_TABLE_ /// ELF well-known linker symbol _GLOBAL_OFFSET_TABLE_
ElfGlobalOffsetTable, ElfGlobalOffsetTable,
/// TLS index symbol for the current thread.
/// Used in COFF/PE file formats.
CoffTlsIndex,
} }
impl fmt::Display for KnownSymbol { impl fmt::Display for KnownSymbol {
@@ -23,6 +26,7 @@ impl FromStr for KnownSymbol {
fn from_str(s: &str) -> Result<Self, Self::Err> { fn from_str(s: &str) -> Result<Self, Self::Err> {
match s { match s {
"ElfGlobalOffsetTable" => Ok(Self::ElfGlobalOffsetTable), "ElfGlobalOffsetTable" => Ok(Self::ElfGlobalOffsetTable),
"CoffTlsIndex" => Ok(Self::CoffTlsIndex),
_ => Err(()), _ => Err(()),
} }
} }
@@ -38,5 +42,6 @@ mod tests {
"ElfGlobalOffsetTable".parse(), "ElfGlobalOffsetTable".parse(),
Ok(KnownSymbol::ElfGlobalOffsetTable) Ok(KnownSymbol::ElfGlobalOffsetTable)
); );
assert_eq!("CoffTlsIndex".parse(), Ok(KnownSymbol::CoffTlsIndex));
} }
} }

View File

@@ -493,6 +493,10 @@
;; `rax`. ;; `rax`.
(MachOTlsGetAddr (symbol ExternalName)) (MachOTlsGetAddr (symbol ExternalName))
;; A Coff TLS symbol access. Returns address of the TLS symbol in
;; `rax`.
(CoffTlsGetAddr (symbol ExternalName))
;; An unwind pseudoinstruction describing the state of the machine at ;; An unwind pseudoinstruction describing the state of the machine at
;; this program point. ;; this program point.
(Unwind (inst UnwindInst)) (Unwind (inst UnwindInst))

View File

@@ -1,7 +1,7 @@
use crate::binemit::{Addend, Reloc}; use crate::binemit::{Addend, Reloc};
use crate::ir::immediates::{Ieee32, Ieee64}; use crate::ir::immediates::{Ieee32, Ieee64};
use crate::ir::LibCall;
use crate::ir::TrapCode; use crate::ir::TrapCode;
use crate::ir::{KnownSymbol, LibCall};
use crate::isa::x64::encoding::evex::{EvexInstruction, EvexVectorLength}; use crate::isa::x64::encoding::evex::{EvexInstruction, EvexVectorLength};
use crate::isa::x64::encoding::rex::{ use crate::isa::x64::encoding::rex::{
emit_simm, emit_std_enc_enc, emit_std_enc_mem, emit_std_reg_mem, emit_std_reg_reg, int_reg_enc, emit_simm, emit_std_enc_enc, emit_std_enc_mem, emit_std_reg_mem, emit_std_reg_reg, int_reg_enc,
@@ -2952,6 +2952,52 @@ pub(crate) fn emit(
sink.put1(0x17); sink.put1(0x17);
} }
Inst::CoffTlsGetAddr { ref symbol } => {
// See: https://gcc.godbolt.org/z/M8or9x6ss
// And: https://github.com/bjorn3/rustc_codegen_cranelift/issues/388#issuecomment-532930282
// Emit the following sequence
// movl (%rip), %eax ; IMAGE_REL_AMD64_REL32 _tls_index
// movq %gs:88, %rcx
// movq (%rcx,%rax,8), %rax
// leaq (%rax), %rax ; Reloc: IMAGE_REL_AMD64_SECREL symbol
// Load TLS index for current thread
// movl (%rip), %eax
sink.put1(0x8b); // mov
sink.put1(0x05);
emit_reloc(
sink,
Reloc::X86PCRel4,
&ExternalName::KnownSymbol(KnownSymbol::CoffTlsIndex),
-4,
);
sink.put4(0); // offset
// movq %gs:88, %rcx
// Load the TLS Storage Array pointer
// The gs segment register refers to the base address of the TEB on x64.
// 0x58 is the offset in the TEB for the ThreadLocalStoragePointer member on x64:
sink.put_data(&[
0x65, 0x48, // REX.W
0x8b, // MOV
0x0c, 0x25, 0x58, // 0x58 - ThreadLocalStoragePointer offset
0x00, 0x00, 0x00,
]);
// movq (%rcx,%rax,8), %rax
// Load the actual TLS entry for this thread.
// Computes ThreadLocalStoragePointer + _tls_index*8
sink.put_data(&[0x48, 0x8b, 0x04, 0xc1]);
// leaq (%rax), %rax
sink.put1(0x48);
sink.put1(0x8d);
sink.put1(0x80);
emit_reloc(sink, Reloc::X86SecRel, symbol, 0);
sink.put4(0); // offset
}
Inst::Unwind { ref inst } => { Inst::Unwind { ref inst } => {
sink.add_unwind(inst.clone()); sink.add_unwind(inst.clone());
} }

View File

@@ -4688,6 +4688,17 @@ fn test_x64_emit() {
"%rax = macho_tls_get_addr User { namespace: 0, index: 0 }", "%rax = macho_tls_get_addr User { namespace: 0, index: 0 }",
)); ));
insns.push((
Inst::CoffTlsGetAddr {
symbol: ExternalName::User {
namespace: 0,
index: 0,
},
},
"8B050000000065488B0C2558000000488B04C1488D8000000000",
"%rax = coff_tls_get_addr User { namespace: 0, index: 0 }",
));
// ======================================================== // ========================================================
// Actually run the tests! // Actually run the tests!
let mut flag_builder = settings::builder(); let mut flag_builder = settings::builder();

View File

@@ -116,6 +116,7 @@ impl Inst {
| Inst::XmmUninitializedValue { .. } | Inst::XmmUninitializedValue { .. }
| Inst::ElfTlsGetAddr { .. } | Inst::ElfTlsGetAddr { .. }
| Inst::MachOTlsGetAddr { .. } | Inst::MachOTlsGetAddr { .. }
| Inst::CoffTlsGetAddr { .. }
| Inst::Unwind { .. } | Inst::Unwind { .. }
| Inst::DummyUse { .. } => smallvec![], | Inst::DummyUse { .. } => smallvec![],
@@ -1709,6 +1710,10 @@ impl PrettyPrint for Inst {
format!("%rax = macho_tls_get_addr {:?}", symbol) format!("%rax = macho_tls_get_addr {:?}", symbol)
} }
Inst::CoffTlsGetAddr { ref symbol } => {
format!("%rax = coff_tls_get_addr {:?}", symbol)
}
Inst::Unwind { inst } => { Inst::Unwind { inst } => {
format!("unwind {:?}", inst) format!("unwind {:?}", inst)
} }
@@ -2155,6 +2160,17 @@ fn x64_get_operands<F: Fn(VReg) -> VReg>(inst: &Inst, collector: &mut OperandCol
collector.reg_clobbers(clobbers); collector.reg_clobbers(clobbers);
} }
Inst::CoffTlsGetAddr { .. } => {
// We also use the gs register. But that register is not allocatable by the
// register allocator, so we don't need to mark it as used here.
// We use %rax to set the address
collector.reg_def(Writable::from_reg(regs::rax()));
// We use %rcx as a temporary variable to load the _tls_index
collector.reg_def(Writable::from_reg(regs::rcx()));
}
Inst::Unwind { .. } => {} Inst::Unwind { .. } => {}
Inst::DummyUse { reg } => { Inst::DummyUse { reg } => {

View File

@@ -2222,28 +2222,30 @@ fn lower_insn_to_regs<C: LowerCtx<I = Inst>>(
ctx.emit(Inst::gen_move(dst_hi, src.regs()[1], types::I64)); ctx.emit(Inst::gen_move(dst_hi, src.regs()[1], types::I64));
} }
Opcode::TlsValue => match flags.tls_model() { Opcode::TlsValue => {
TlsModel::ElfGd => {
let dst = get_output_reg(ctx, outputs[0]).only_reg().unwrap(); let dst = get_output_reg(ctx, outputs[0]).only_reg().unwrap();
let (name, _, _) = ctx.symbol_value(insn).unwrap(); let (name, _, _) = ctx.symbol_value(insn).unwrap();
let symbol = name.clone(); let symbol = name.clone();
match flags.tls_model() {
TlsModel::ElfGd => {
ctx.emit(Inst::ElfTlsGetAddr { symbol }); ctx.emit(Inst::ElfTlsGetAddr { symbol });
ctx.emit(Inst::gen_move(dst, regs::rax(), types::I64)); ctx.emit(Inst::gen_move(dst, regs::rax(), types::I64));
} }
TlsModel::Macho => { TlsModel::Macho => {
let dst = get_output_reg(ctx, outputs[0]).only_reg().unwrap();
let (name, _, _) = ctx.symbol_value(insn).unwrap();
let symbol = name.clone();
ctx.emit(Inst::MachOTlsGetAddr { symbol }); ctx.emit(Inst::MachOTlsGetAddr { symbol });
ctx.emit(Inst::gen_move(dst, regs::rax(), types::I64)); ctx.emit(Inst::gen_move(dst, regs::rax(), types::I64));
} }
_ => { TlsModel::Coff => {
todo!( ctx.emit(Inst::CoffTlsGetAddr { symbol });
ctx.emit(Inst::gen_move(dst, regs::rax(), types::I64));
}
_ => todo!(
"Unimplemented TLS model in x64 backend: {:?}", "Unimplemented TLS model in x64 backend: {:?}",
flags.tls_model() flags.tls_model()
); ),
}
} }
},
Opcode::SqmulRoundSat => { Opcode::SqmulRoundSat => {
// Lane-wise saturating rounding multiplication in Q15 format // Lane-wise saturating rounding multiplication in Q15 format

View File

@@ -0,0 +1,20 @@
test compile precise-output
set tls_model=coff
target x86_64
function u0:0(i32) -> i64 {
gv0 = symbol colocated tls u1:0
block0(v0: i32):
v1 = global_value.i64 gv0
return v1
}
; pushq %rbp
; movq %rsp, %rbp
; block0:
; %rax = coff_tls_get_addr User { namespace: 1, index: 0 }
; movq %rbp, %rsp
; popq %rbp
; ret

View File

@@ -50,8 +50,8 @@ pub use crate::traps::TrapSite;
/// Version number of this crate. /// Version number of this crate.
pub const VERSION: &str = env!("CARGO_PKG_VERSION"); pub const VERSION: &str = env!("CARGO_PKG_VERSION");
/// Default names for `ir::LibCall`s. A function by this name is imported into the object as /// Default names for [ir::LibCall]s. A function by this name is imported into the object as
/// part of the translation of a `ir::ExternalName::LibCall` variant. /// part of the translation of a [ir::ExternalName::LibCall] variant.
pub fn default_libcall_names() -> Box<dyn Fn(ir::LibCall) -> String + Send + Sync> { pub fn default_libcall_names() -> Box<dyn Fn(ir::LibCall) -> String + Send + Sync> {
Box::new(move |libcall| match libcall { Box::new(move |libcall| match libcall {
ir::LibCall::Probestack => "__cranelift_probestack".to_owned(), ir::LibCall::Probestack => "__cranelift_probestack".to_owned(),

View File

@@ -40,10 +40,10 @@ impl ObjectBuilder {
/// Create a new `ObjectBuilder` using the given Cranelift target, that /// Create a new `ObjectBuilder` using the given Cranelift target, that
/// can be passed to [`ObjectModule::new`]. /// can be passed to [`ObjectModule::new`].
/// ///
/// The `libcall_names` function provides a way to translate `cranelift_codegen`'s `ir::LibCall` /// The `libcall_names` function provides a way to translate `cranelift_codegen`'s [ir::LibCall]
/// enum to symbols. LibCalls are inserted in the IR as part of the legalization for certain /// enum to symbols. LibCalls are inserted in the IR as part of the legalization for certain
/// floating point instructions, and for stack probes. If you don't know what to use for this /// floating point instructions, and for stack probes. If you don't know what to use for this
/// argument, use `cranelift_module::default_libcall_names()`. /// argument, use [cranelift_module::default_libcall_names]().
pub fn new<V: Into<Vec<u8>>>( pub fn new<V: Into<Vec<u8>>>(
isa: Box<dyn TargetIsa>, isa: Box<dyn TargetIsa>,
name: V, name: V,
@@ -556,9 +556,9 @@ impl ObjectModule {
if let Some(symbol) = self.known_symbols.get(known_symbol) { if let Some(symbol) = self.known_symbols.get(known_symbol) {
*symbol *symbol
} else { } else {
let symbol = match known_symbol { let symbol = self.object.add_symbol(match known_symbol {
ir::KnownSymbol::ElfGlobalOffsetTable => self.object.add_symbol(Symbol { ir::KnownSymbol::ElfGlobalOffsetTable => Symbol {
name: "_GLOBAL_OFFSET_TABLE_".as_bytes().to_vec(), name: b"_GLOBAL_OFFSET_TABLE_".to_vec(),
value: 0, value: 0,
size: 0, size: 0,
kind: SymbolKind::Data, kind: SymbolKind::Data,
@@ -566,8 +566,18 @@ impl ObjectModule {
weak: false, weak: false,
section: SymbolSection::Undefined, section: SymbolSection::Undefined,
flags: SymbolFlags::None, flags: SymbolFlags::None,
}), },
}; ir::KnownSymbol::CoffTlsIndex => Symbol {
name: b"_tls_index".to_vec(),
value: 0,
size: 32,
kind: SymbolKind::Tls,
scope: SymbolScope::Unknown,
weak: false,
section: SymbolSection::Undefined,
flags: SymbolFlags::None,
},
});
self.known_symbols.insert(*known_symbol, symbol); self.known_symbols.insert(*known_symbol, symbol);
symbol symbol
} }
@@ -590,6 +600,11 @@ impl ObjectModule {
RelocationEncoding::X86Branch, RelocationEncoding::X86Branch,
32, 32,
), ),
Reloc::X86SecRel => (
RelocationKind::SectionOffset,
RelocationEncoding::Generic,
32,
),
Reloc::X86GOTPCRel4 => (RelocationKind::GotRelative, RelocationEncoding::Generic, 32), Reloc::X86GOTPCRel4 => (RelocationKind::GotRelative, RelocationEncoding::Generic, 32),
Reloc::Arm64Call => ( Reloc::Arm64Call => (
RelocationKind::Relative, RelocationKind::Relative,