Skip to main content

rustc_codegen_ssa/back/
metadata.rs

1//! Reading of the rustc metadata for rlibs and dylibs
2
3use std::borrow::Cow;
4use std::fs::File;
5use std::io::Write;
6use std::path::Path;
7
8use itertools::Itertools;
9use object::write::{self, StandardSegment, Symbol, SymbolSection};
10use object::{
11    Architecture, BinaryFormat, Endianness, FileFlags, Object, ObjectSection, ObjectSymbol,
12    SectionFlags, SectionKind, SymbolFlags, SymbolKind, SymbolScope, elf, pe, xcoff,
13};
14use rustc_abi::Endian;
15use rustc_data_structures::memmap::Mmap;
16use rustc_data_structures::owned_slice::{OwnedSlice, try_slice_owned};
17use rustc_metadata::EncodedMetadata;
18use rustc_metadata::creader::MetadataLoader;
19use rustc_metadata::fs::METADATA_FILENAME;
20use rustc_middle::bug;
21use rustc_session::Session;
22use rustc_span::sym;
23use rustc_target::spec::{CfgAbi, LlvmAbi, Os, RelocModel, Target, ef_avr_arch};
24use tracing::debug;
25
26use super::apple;
27
28/// The default metadata loader. This is used by cg_llvm and cg_clif.
29///
30/// # Metadata location
31///
32/// <dl>
33/// <dt>rlib</dt>
34/// <dd>The metadata can be found in the `lib.rmeta` file inside of the ar archive.</dd>
35/// <dt>dylib</dt>
36/// <dd>The metadata can be found in the `.rustc` section of the shared library.</dd>
37/// </dl>
38#[derive(#[automatically_derived]
impl ::core::fmt::Debug for DefaultMetadataLoader {
    #[inline]
    fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
        ::core::fmt::Formatter::write_str(f, "DefaultMetadataLoader")
    }
}Debug)]
39pub(crate) struct DefaultMetadataLoader;
40
41static AIX_METADATA_SYMBOL_NAME: &'static str = "__aix_rust_metadata";
42
43fn load_metadata_with(
44    path: &Path,
45    f: impl for<'a> FnOnce(&'a [u8]) -> Result<&'a [u8], String>,
46) -> Result<OwnedSlice, String> {
47    let file =
48        File::open(path).map_err(|e| ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to open file \'{0}\': {1}",
                path.display(), e))
    })format!("failed to open file '{}': {}", path.display(), e))?;
49
50    unsafe { Mmap::map(file) }
51        .map_err(|e| ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to mmap file \'{0}\': {1}",
                path.display(), e))
    })format!("failed to mmap file '{}': {}", path.display(), e))
52        .and_then(|mmap| try_slice_owned(mmap, |mmap| f(mmap)))
53}
54
55impl MetadataLoader for DefaultMetadataLoader {
56    fn get_rlib_metadata(&self, target: &Target, path: &Path) -> Result<OwnedSlice, String> {
57        {
    use ::tracing::__macro_support::Callsite as _;
    static __CALLSITE: ::tracing::callsite::DefaultCallsite =
        {
            static META: ::tracing::Metadata<'static> =
                {
                    ::tracing_core::metadata::Metadata::new("event compiler/rustc_codegen_ssa/src/back/metadata.rs:57",
                        "rustc_codegen_ssa::back::metadata",
                        ::tracing::Level::DEBUG,
                        ::tracing_core::__macro_support::Option::Some("compiler/rustc_codegen_ssa/src/back/metadata.rs"),
                        ::tracing_core::__macro_support::Option::Some(57u32),
                        ::tracing_core::__macro_support::Option::Some("rustc_codegen_ssa::back::metadata"),
                        ::tracing_core::field::FieldSet::new(&["message"],
                            ::tracing_core::callsite::Identifier(&__CALLSITE)),
                        ::tracing::metadata::Kind::EVENT)
                };
            ::tracing::callsite::DefaultCallsite::new(&META)
        };
    let enabled =
        ::tracing::Level::DEBUG <= ::tracing::level_filters::STATIC_MAX_LEVEL
                &&
                ::tracing::Level::DEBUG <=
                    ::tracing::level_filters::LevelFilter::current() &&
            {
                let interest = __CALLSITE.interest();
                !interest.is_never() &&
                    ::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
                        interest)
            };
    if enabled {
        (|value_set: ::tracing::field::ValueSet|
                    {
                        let meta = __CALLSITE.metadata();
                        ::tracing::Event::dispatch(meta, &value_set);
                        ;
                    })({
                #[allow(unused_imports)]
                use ::tracing::field::{debug, display, Value};
                let mut iter = __CALLSITE.metadata().fields().iter();
                __CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
                                    ::tracing::__macro_support::Option::Some(&format_args!("getting rlib metadata for {0}",
                                                    path.display()) as &dyn Value))])
            });
    } else { ; }
};debug!("getting rlib metadata for {}", path.display());
58        load_metadata_with(path, |data| {
59            let archive = object::read::archive::ArchiveFile::parse(&*data)
60                .map_err(|e| ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to parse rlib \'{0}\': {1}",
                path.display(), e))
    })format!("failed to parse rlib '{}': {}", path.display(), e))?;
61
62            for entry_result in archive.members() {
63                let entry = entry_result
64                    .map_err(|e| ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to parse rlib \'{0}\': {1}",
                path.display(), e))
    })format!("failed to parse rlib '{}': {}", path.display(), e))?;
65                if entry.name() == METADATA_FILENAME.as_bytes() {
66                    let data = entry
67                        .data(data)
68                        .map_err(|e| ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to parse rlib \'{0}\': {1}",
                path.display(), e))
    })format!("failed to parse rlib '{}': {}", path.display(), e))?;
69                    if target.is_like_aix {
70                        return get_metadata_xcoff(path, data);
71                    } else {
72                        return search_for_section(path, data, ".rmeta");
73                    }
74                }
75            }
76
77            Err(::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("metadata not found in rlib \'{0}\'",
                path.display()))
    })format!("metadata not found in rlib '{}'", path.display()))
78        })
79    }
80
81    fn get_dylib_metadata(&self, target: &Target, path: &Path) -> Result<OwnedSlice, String> {
82        {
    use ::tracing::__macro_support::Callsite as _;
    static __CALLSITE: ::tracing::callsite::DefaultCallsite =
        {
            static META: ::tracing::Metadata<'static> =
                {
                    ::tracing_core::metadata::Metadata::new("event compiler/rustc_codegen_ssa/src/back/metadata.rs:82",
                        "rustc_codegen_ssa::back::metadata",
                        ::tracing::Level::DEBUG,
                        ::tracing_core::__macro_support::Option::Some("compiler/rustc_codegen_ssa/src/back/metadata.rs"),
                        ::tracing_core::__macro_support::Option::Some(82u32),
                        ::tracing_core::__macro_support::Option::Some("rustc_codegen_ssa::back::metadata"),
                        ::tracing_core::field::FieldSet::new(&["message"],
                            ::tracing_core::callsite::Identifier(&__CALLSITE)),
                        ::tracing::metadata::Kind::EVENT)
                };
            ::tracing::callsite::DefaultCallsite::new(&META)
        };
    let enabled =
        ::tracing::Level::DEBUG <= ::tracing::level_filters::STATIC_MAX_LEVEL
                &&
                ::tracing::Level::DEBUG <=
                    ::tracing::level_filters::LevelFilter::current() &&
            {
                let interest = __CALLSITE.interest();
                !interest.is_never() &&
                    ::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
                        interest)
            };
    if enabled {
        (|value_set: ::tracing::field::ValueSet|
                    {
                        let meta = __CALLSITE.metadata();
                        ::tracing::Event::dispatch(meta, &value_set);
                        ;
                    })({
                #[allow(unused_imports)]
                use ::tracing::field::{debug, display, Value};
                let mut iter = __CALLSITE.metadata().fields().iter();
                __CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
                                    ::tracing::__macro_support::Option::Some(&format_args!("getting dylib metadata for {0}",
                                                    path.display()) as &dyn Value))])
            });
    } else { ; }
};debug!("getting dylib metadata for {}", path.display());
83        if target.is_like_aix {
84            load_metadata_with(path, |data| {
85                let archive = object::read::archive::ArchiveFile::parse(&*data).map_err(|e| {
86                    ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to parse aix dylib \'{0}\': {1}",
                path.display(), e))
    })format!("failed to parse aix dylib '{}': {}", path.display(), e)
87                })?;
88
89                match archive.members().exactly_one() {
90                    Ok(lib) => {
91                        let lib = lib.map_err(|e| {
92                            ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to parse aix dylib \'{0}\': {1}",
                path.display(), e))
    })format!("failed to parse aix dylib '{}': {}", path.display(), e)
93                        })?;
94                        let data = lib.data(data).map_err(|e| {
95                            ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to parse aix dylib \'{0}\': {1}",
                path.display(), e))
    })format!("failed to parse aix dylib '{}': {}", path.display(), e)
96                        })?;
97                        get_metadata_xcoff(path, data)
98                    }
99                    Err(e) => Err(::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to parse aix dylib \'{0}\': {1}",
                path.display(), e))
    })format!("failed to parse aix dylib '{}': {}", path.display(), e)),
100                }
101            })
102        } else {
103            load_metadata_with(path, |data| search_for_section(path, data, ".rustc"))
104        }
105    }
106}
107
108pub(super) fn search_for_section<'a>(
109    path: &Path,
110    bytes: &'a [u8],
111    section: &str,
112) -> Result<&'a [u8], String> {
113    let Ok(file) = object::File::parse(bytes) else {
114        // The parse above could fail for odd reasons like corruption, but for
115        // now we just interpret it as this target doesn't support metadata
116        // emission in object files so the entire byte slice itself is probably
117        // a metadata file. Ideally though if necessary we could at least check
118        // the prefix of bytes to see if it's an actual metadata object and if
119        // not forward the error along here.
120        return Ok(bytes);
121    };
122    file.section_by_name(section)
123        .ok_or_else(|| ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("no `{0}` section in \'{1}\'",
                section, path.display()))
    })format!("no `{}` section in '{}'", section, path.display()))?
124        .data()
125        .map_err(|e| ::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("failed to read {0} section in \'{1}\': {2}",
                section, path.display(), e))
    })format!("failed to read {} section in '{}': {}", section, path.display(), e))
126}
127
128fn add_gnu_property_note(
129    file: &mut write::Object<'static>,
130    architecture: Architecture,
131    binary_format: BinaryFormat,
132    endianness: Endianness,
133) {
134    // check bti protection
135    if binary_format != BinaryFormat::Elf
136        || !#[allow(non_exhaustive_omitted_patterns)] match architecture {
    Architecture::X86_64 | Architecture::Aarch64 => true,
    _ => false,
}matches!(architecture, Architecture::X86_64 | Architecture::Aarch64)
137    {
138        return;
139    }
140
141    let section = file.add_section(
142        file.segment_name(StandardSegment::Data).to_vec(),
143        b".note.gnu.property".to_vec(),
144        SectionKind::Note,
145    );
146    let mut data: Vec<u8> = Vec::new();
147    let n_namsz: u32 = 4; // Size of the n_name field
148    let n_descsz: u32 = 16; // Size of the n_desc field
149    let n_type: u32 = object::elf::NT_GNU_PROPERTY_TYPE_0; // Type of note descriptor
150    let header_values = [n_namsz, n_descsz, n_type];
151    header_values.iter().for_each(|v| {
152        data.extend_from_slice(&match endianness {
153            Endianness::Little => v.to_le_bytes(),
154            Endianness::Big => v.to_be_bytes(),
155        })
156    });
157    data.extend_from_slice(b"GNU\0"); // Owner of the program property note
158    let pr_type: u32 = match architecture {
159        Architecture::X86_64 => object::elf::GNU_PROPERTY_X86_FEATURE_1_AND,
160        Architecture::Aarch64 => object::elf::GNU_PROPERTY_AARCH64_FEATURE_1_AND,
161        _ => ::core::panicking::panic("internal error: entered unreachable code")unreachable!(),
162    };
163    let pr_datasz: u32 = 4; //size of the pr_data field
164    let pr_data: u32 = 3; //program property descriptor
165    let pr_padding: u32 = 0;
166    let property_values = [pr_type, pr_datasz, pr_data, pr_padding];
167    property_values.iter().for_each(|v| {
168        data.extend_from_slice(&match endianness {
169            Endianness::Little => v.to_le_bytes(),
170            Endianness::Big => v.to_be_bytes(),
171        })
172    });
173    file.append_section_data(section, &data, 8);
174}
175
176pub(super) fn get_metadata_xcoff<'a>(path: &Path, data: &'a [u8]) -> Result<&'a [u8], String> {
177    let Ok(file) = object::File::parse(data) else {
178        return Ok(data);
179    };
180    let info_data = search_for_section(path, data, ".info")?;
181    if let Some(metadata_symbol) =
182        file.symbols().find(|sym| sym.name() == Ok(AIX_METADATA_SYMBOL_NAME))
183    {
184        let offset = metadata_symbol.address() as usize;
185        // The offset specifies the location of rustc metadata in the .info section of XCOFF.
186        // Each string stored in .info section of XCOFF is preceded by a 4-byte length field.
187        if offset < 4 {
188            return Err(::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("Invalid metadata symbol offset: {0}",
                offset))
    })format!("Invalid metadata symbol offset: {offset}"));
189        }
190        // XCOFF format uses big-endian byte order.
191        let len = u32::from_be_bytes(info_data[(offset - 4)..offset].try_into().unwrap()) as usize;
192        if offset + len > (info_data.len() as usize) {
193            return Err(::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("Metadata at offset {0} with size {1} is beyond .info section",
                offset, len))
    })format!(
194                "Metadata at offset {offset} with size {len} is beyond .info section"
195            ));
196        }
197        Ok(&info_data[offset..(offset + len)])
198    } else {
199        Err(::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("Unable to find symbol {0}",
                AIX_METADATA_SYMBOL_NAME))
    })format!("Unable to find symbol {AIX_METADATA_SYMBOL_NAME}"))
200    }
201}
202
203pub(crate) fn create_object_file(sess: &Session) -> Option<write::Object<'static>> {
204    let endianness = match sess.target.options.endian {
205        Endian::Little => Endianness::Little,
206        Endian::Big => Endianness::Big,
207    };
208    let Some((architecture, sub_architecture)) =
209        sess.target.object_architecture(&sess.unstable_target_features)
210    else {
211        return None;
212    };
213    let binary_format = sess.target.binary_format.to_object();
214
215    let mut file = write::Object::new(binary_format, architecture, endianness);
216    file.set_sub_architecture(sub_architecture);
217    if sess.target.is_like_darwin {
218        if macho_is_arm64e(&sess.target) {
219            file.set_macho_cpu_subtype(
220                object::macho::CPU_SUBTYPE_ARM64E | object::macho::CPU_SUBTYPE_PTRAUTH_ABI,
221            );
222        }
223
224        file.set_macho_build_version(macho_object_build_version_for_target(sess))
225    }
226    if binary_format == BinaryFormat::Coff {
227        // Disable the default mangler to avoid mangling the special "@feat.00" symbol name.
228        let original_mangling = file.mangling();
229        file.set_mangling(object::write::Mangling::None);
230
231        let mut feature = 0;
232
233        if file.architecture() == object::Architecture::I386 {
234            // When linking with /SAFESEH on x86, lld requires that all linker inputs be marked as
235            // safe exception handling compatible. Metadata files masquerade as regular COFF
236            // objects and are treated as linker inputs, despite containing no actual code. Thus,
237            // they still need to be marked as safe exception handling compatible. See #96498.
238            // Reference: https://docs.microsoft.com/en-us/windows/win32/debug/pe-format
239            feature |= 1;
240        }
241
242        file.add_symbol(object::write::Symbol {
243            name: "@feat.00".into(),
244            value: feature,
245            size: 0,
246            kind: object::SymbolKind::Data,
247            scope: object::SymbolScope::Compilation,
248            weak: false,
249            section: object::write::SymbolSection::Absolute,
250            flags: object::SymbolFlags::None,
251        });
252
253        file.set_mangling(original_mangling);
254    }
255    let e_flags = elf_e_flags(architecture, sess);
256    // adapted from LLVM's `MCELFObjectTargetWriter::getOSABI`
257    let os_abi = elf_os_abi(sess);
258    let abi_version = 0;
259    add_gnu_property_note(&mut file, architecture, binary_format, endianness);
260    file.flags = FileFlags::Elf { os_abi, abi_version, e_flags };
261    Some(file)
262}
263
264pub(super) fn elf_os_abi(sess: &Session) -> u8 {
265    match sess.target.options.os {
266        Os::Hermit => elf::ELFOSABI_STANDALONE,
267        Os::FreeBsd => elf::ELFOSABI_FREEBSD,
268        Os::Solaris => elf::ELFOSABI_SOLARIS,
269        _ => elf::ELFOSABI_NONE,
270    }
271}
272
273pub(super) fn elf_e_flags(architecture: Architecture, sess: &Session) -> u32 {
274    match architecture {
275        Architecture::Mips | Architecture::Mips64 | Architecture::Mips64_N32 => {
276            // "N32" indicates an "ILP32" data model on a 64-bit MIPS CPU
277            // like SPARC's "v8+", x86_64's "x32", or the watchOS "arm64_32".
278            let is_32bit = architecture == Architecture::Mips;
279            let mut e_flags = match sess.target.options.cpu.as_ref() {
280                "mips1" if is_32bit => elf::EF_MIPS_ARCH_1,
281                "mips2" if is_32bit => elf::EF_MIPS_ARCH_2,
282                "mips3" => elf::EF_MIPS_ARCH_3,
283                "mips4" => elf::EF_MIPS_ARCH_4,
284                "mips5" => elf::EF_MIPS_ARCH_5,
285                "mips32r2" if is_32bit => elf::EF_MIPS_ARCH_32R2,
286                "mips32r6" if is_32bit => elf::EF_MIPS_ARCH_32R6,
287                "mips64r2" if !is_32bit => elf::EF_MIPS_ARCH_64R2,
288                "mips64r6" if !is_32bit => elf::EF_MIPS_ARCH_64R6,
289                s if s.starts_with("mips32") && !is_32bit => {
290                    sess.dcx().fatal(::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("invalid CPU `{0}` for 64-bit MIPS target",
                s))
    })format!("invalid CPU `{}` for 64-bit MIPS target", s))
291                }
292                s if s.starts_with("mips64") && is_32bit => {
293                    sess.dcx().fatal(::alloc::__export::must_use({
        ::alloc::fmt::format(format_args!("invalid CPU `{0}` for 32-bit MIPS target",
                s))
    })format!("invalid CPU `{}` for 32-bit MIPS target", s))
294                }
295                _ if is_32bit => elf::EF_MIPS_ARCH_32R2,
296                _ => elf::EF_MIPS_ARCH_64R2,
297            };
298
299            // Use the explicitly given ABI.
300            match &sess.target.options.llvm_abiname {
301                LlvmAbi::O32 if is_32bit => e_flags |= elf::EF_MIPS_ABI_O32,
302                LlvmAbi::N32 if !is_32bit => e_flags |= elf::EF_MIPS_ABI2,
303                LlvmAbi::N64 if !is_32bit => {}
304                // The rest is invalid (which is already ensured by the target spec check).
305                s => ::rustc_middle::util::bug::bug_fmt(format_args!("invalid LLVM ABI `{0}` for MIPS target",
        s))bug!("invalid LLVM ABI `{}` for MIPS target", s),
306            };
307
308            if sess.target.options.relocation_model != RelocModel::Static {
309                // PIC means position-independent code. CPIC means "calls PIC".
310                // CPIC was mutually exclusive with PIC according to
311                // the SVR4 MIPS ABI https://refspecs.linuxfoundation.org/elf/mipsabi.pdf
312                // and should have only appeared on static objects with dynamically calls.
313                // At some point someone (GCC?) decided to set CPIC even for PIC.
314                // Nowadays various things expect both set on the same object file
315                // and may even error if you mix CPIC and non-CPIC object files,
316                // despite that being the entire point of the CPIC ABI extension!
317                // As we are in Rome, we do as the Romans do.
318                e_flags |= elf::EF_MIPS_PIC | elf::EF_MIPS_CPIC;
319            }
320            if sess.target.options.cpu.contains("r6") {
321                e_flags |= elf::EF_MIPS_NAN2008;
322            }
323            e_flags
324        }
325        Architecture::Riscv32 | Architecture::Riscv64 => {
326            // Source: https://github.com/riscv-non-isa/riscv-elf-psabi-doc/blob/079772828bd10933d34121117a222b4cc0ee2200/riscv-elf.adoc
327            let mut e_flags: u32 = 0x0;
328
329            // Check if compression is enabled
330            if sess.target_features.contains(&sym::zca) {
331                e_flags |= elf::EF_RISCV_RVC;
332            }
333
334            // Check if RVTSO is enabled
335            if sess.target_features.contains(&sym::ztso) {
336                e_flags |= elf::EF_RISCV_TSO;
337            }
338
339            // Set the appropriate flag based on ABI
340            // This needs to match LLVM `RISCVELFStreamer.cpp`
341            match &sess.target.llvm_abiname {
342                LlvmAbi::Ilp32 | LlvmAbi::Lp64 => (),
343                LlvmAbi::Ilp32f | LlvmAbi::Lp64f => e_flags |= elf::EF_RISCV_FLOAT_ABI_SINGLE,
344                LlvmAbi::Ilp32d | LlvmAbi::Lp64d => e_flags |= elf::EF_RISCV_FLOAT_ABI_DOUBLE,
345                // Note that the `lp64e` is still unstable as it's not (yet) part of the ELF psABI.
346                LlvmAbi::Ilp32e | LlvmAbi::Lp64e => e_flags |= elf::EF_RISCV_RVE,
347                _ => ::rustc_middle::util::bug::bug_fmt(format_args!("unknown RISC-V ABI name"))bug!("unknown RISC-V ABI name"),
348            }
349
350            e_flags
351        }
352        Architecture::LoongArch32 | Architecture::LoongArch64 => {
353            // Source: https://github.com/loongson/la-abi-specs/blob/release/laelf.adoc#e_flags-identifies-abi-type-and-version
354            let mut e_flags: u32 = elf::EF_LARCH_OBJABI_V1;
355
356            // Set the appropriate flag based on ABI
357            // This needs to match LLVM `LoongArchELFStreamer.cpp`
358            match &sess.target.llvm_abiname {
359                LlvmAbi::Ilp32s | LlvmAbi::Lp64s => e_flags |= elf::EF_LARCH_ABI_SOFT_FLOAT,
360                LlvmAbi::Ilp32f | LlvmAbi::Lp64f => e_flags |= elf::EF_LARCH_ABI_SINGLE_FLOAT,
361                LlvmAbi::Ilp32d | LlvmAbi::Lp64d => e_flags |= elf::EF_LARCH_ABI_DOUBLE_FLOAT,
362                _ => ::rustc_middle::util::bug::bug_fmt(format_args!("unknown LoongArch ABI name"))bug!("unknown LoongArch ABI name"),
363            }
364
365            e_flags
366        }
367        Architecture::Avr => {
368            // Resolve the ISA revision and set
369            // the appropriate EF_AVR_ARCH flag.
370            if let Some(ref cpu) = sess.opts.cg.target_cpu {
371                ef_avr_arch(cpu)
372            } else {
373                ::rustc_middle::util::bug::bug_fmt(format_args!("AVR CPU not explicitly specified"))bug!("AVR CPU not explicitly specified")
374            }
375        }
376        Architecture::Csky => {
377            if #[allow(non_exhaustive_omitted_patterns)] match sess.target.options.cfg_abi {
    CfgAbi::AbiV2 => true,
    _ => false,
}matches!(sess.target.options.cfg_abi, CfgAbi::AbiV2) {
378                elf::EF_CSKY_ABIV2
379            } else {
380                elf::EF_CSKY_ABIV1
381            }
382        }
383        Architecture::PowerPc64 => {
384            const EF_PPC64_ABI_UNKNOWN: u32 = 0;
385            const EF_PPC64_ABI_ELF_V1: u32 = 1;
386            const EF_PPC64_ABI_ELF_V2: u32 = 2;
387
388            match sess.target.options.llvm_abiname {
389                // If the flags do not correctly indicate the ABI,
390                // linkers such as ld.lld assume that the ppc64 object files are always ELFv2
391                // which leads to broken binaries if ELFv1 is used for the object files.
392                LlvmAbi::ElfV1 => EF_PPC64_ABI_ELF_V1,
393                LlvmAbi::ElfV2 => EF_PPC64_ABI_ELF_V2,
394                _ if sess.target.options.binary_format.to_object() == BinaryFormat::Elf => {
395                    ::rustc_middle::util::bug::bug_fmt(format_args!("invalid ABI specified for this PPC64 ELF target"));bug!("invalid ABI specified for this PPC64 ELF target");
396                }
397                // Fall back
398                _ => EF_PPC64_ABI_UNKNOWN,
399            }
400        }
401        Architecture::Sparc32Plus => elf::EF_SPARC_32PLUS,
402        _ => 0,
403    }
404}
405
406/// Mach-O files contain information about:
407/// - The platform/OS they were built for (macOS/watchOS/Mac Catalyst/iOS simulator etc).
408/// - The minimum OS version / deployment target.
409/// - The version of the SDK they were targetting.
410///
411/// In the past, this was accomplished using the LC_VERSION_MIN_MACOSX, LC_VERSION_MIN_IPHONEOS,
412/// LC_VERSION_MIN_TVOS or LC_VERSION_MIN_WATCHOS load commands, which each contain information
413/// about the deployment target and SDK version, and implicitly, by their presence, which OS they
414/// target. Simulator targets were determined if the architecture was x86_64, but there was e.g. a
415/// LC_VERSION_MIN_IPHONEOS present.
416///
417/// This is of course brittle and limited, so modern tooling emit the LC_BUILD_VERSION load
418/// command (which contains all three pieces of information in one) when the deployment target is
419/// high enough, or the target is something that wouldn't be encodable with the old load commands
420/// (such as Mac Catalyst, or Aarch64 iOS simulator).
421///
422/// Since Xcode 15, Apple's LD apparently requires object files to use this load command, so this
423/// returns the `MachOBuildVersion` for the target to do so.
424fn macho_object_build_version_for_target(sess: &Session) -> object::write::MachOBuildVersion {
425    /// The `object` crate demands "X.Y.Z encoded in nibbles as xxxx.yy.zz"
426    /// e.g. minOS 14.0 = 0x000E0000, or SDK 16.2 = 0x00100200
427    fn pack_version(apple::OSVersion { major, minor, patch }: apple::OSVersion) -> u32 {
428        let (major, minor, patch) = (major as u32, minor as u32, patch as u32);
429        (major << 16) | (minor << 8) | patch
430    }
431
432    let platform = apple::macho_platform(&sess.target);
433    let min_os = sess.apple_deployment_target();
434
435    let mut build_version = object::write::MachOBuildVersion::default();
436    build_version.platform = platform;
437    build_version.minos = pack_version(min_os);
438    // The version here does not _really_ matter, since it is only used at runtime, and we specify
439    // it when linking the final binary, so we will omit the version. This is also what LLVM does,
440    // and the tooling also allows this (and shows the SDK version as `n/a`). Finally, it is the
441    // semantically correct choice, as the SDK has not influenced the binary generated by rustc at
442    // this point in time.
443    build_version.sdk = 0;
444
445    build_version
446}
447
448/// Is Apple's CPU subtype `arm64e`s
449fn macho_is_arm64e(target: &Target) -> bool {
450    target.llvm_target.starts_with("arm64e")
451}
452
453pub(crate) enum MetadataPosition {
454    First,
455    Last,
456}
457
458/// For rlibs we "pack" rustc metadata into a dummy object file.
459///
460/// Historically it was needed because rustc linked rlibs as whole-archive in some cases.
461/// In that case linkers try to include all files located in an archive, so if metadata is stored
462/// in an archive then it needs to be of a form that the linker is able to process.
463/// Now it's not clear whether metadata still needs to be wrapped into an object file or not.
464///
465/// Note, though, that we don't actually want this metadata to show up in any
466/// final output of the compiler. Instead this is purely for rustc's own
467/// metadata tracking purposes.
468///
469/// With the above in mind, each "flavor" of object format gets special
470/// handling here depending on the target:
471///
472/// * MachO - macos-like targets will insert the metadata into a section that
473///   is sort of fake dwarf debug info. Inspecting the source of the macos
474///   linker this causes these sections to be skipped automatically because
475///   it's not in an allowlist of otherwise well known dwarf section names to
476///   go into the final artifact.
477///
478/// * WebAssembly - this uses wasm files themselves as the object file format
479///   so an empty file with no linking metadata but a single custom section is
480///   created holding our metadata.
481///
482/// * COFF - Windows-like targets create an object with a section that has
483///   the `IMAGE_SCN_LNK_REMOVE` flag set which ensures that if the linker
484///   ever sees the section it doesn't process it and it's removed.
485///
486/// * ELF - All other targets are similar to Windows in that there's a
487///   `SHF_EXCLUDE` flag we can set on sections in an object file to get
488///   automatically removed from the final output.
489pub(crate) fn create_wrapper_file(
490    sess: &Session,
491    section_name: String,
492    data: &[u8],
493) -> (Vec<u8>, MetadataPosition) {
494    let Some(mut file) = create_object_file(sess) else {
495        if sess.target.is_like_wasm {
496            return (
497                create_metadata_file_for_wasm(sess, data, &section_name),
498                MetadataPosition::First,
499            );
500        }
501
502        // Targets using this branch don't have support implemented here yet or
503        // they're not yet implemented in the `object` crate and will likely
504        // fill out this module over time.
505        return (data.to_vec(), MetadataPosition::Last);
506    };
507    let section = if file.format() == BinaryFormat::Xcoff {
508        file.add_section(Vec::new(), b".info".to_vec(), SectionKind::Debug)
509    } else {
510        file.add_section(
511            file.segment_name(StandardSegment::Debug).to_vec(),
512            section_name.into_bytes(),
513            SectionKind::Debug,
514        )
515    };
516    match file.format() {
517        BinaryFormat::Coff => {
518            file.section_mut(section).flags =
519                SectionFlags::Coff { characteristics: pe::IMAGE_SCN_LNK_REMOVE };
520        }
521        BinaryFormat::Elf => {
522            file.section_mut(section).flags =
523                SectionFlags::Elf { sh_flags: elf::SHF_EXCLUDE as u64 };
524        }
525        BinaryFormat::Xcoff => {
526            // AIX system linker may aborts if it meets a valid XCOFF file in archive with no .text, no .data and no .bss.
527            file.add_section(Vec::new(), b".text".to_vec(), SectionKind::Text);
528            file.section_mut(section).flags =
529                SectionFlags::Xcoff { s_flags: xcoff::STYP_INFO as u32 };
530            // Encode string stored in .info section of XCOFF.
531            // FIXME: The length of data here is not guaranteed to fit in a u32.
532            // We may have to split the data into multiple pieces in order to
533            // store in .info section.
534            let len: u32 = data.len().try_into().unwrap();
535            let offset = file.append_section_data(section, &len.to_be_bytes(), 1);
536            // Add a symbol referring to the data in .info section.
537            file.add_symbol(Symbol {
538                name: AIX_METADATA_SYMBOL_NAME.into(),
539                value: offset + 4,
540                size: 0,
541                kind: SymbolKind::Unknown,
542                scope: SymbolScope::Compilation,
543                weak: false,
544                section: SymbolSection::Section(section),
545                flags: SymbolFlags::Xcoff {
546                    n_sclass: xcoff::C_INFO,
547                    x_smtyp: xcoff::C_HIDEXT,
548                    x_smclas: xcoff::C_HIDEXT,
549                    containing_csect: None,
550                },
551            });
552        }
553        _ => {}
554    };
555    file.append_section_data(section, data, 1);
556    (file.write().unwrap(), MetadataPosition::First)
557}
558
559// Historical note:
560//
561// When using link.exe it was seen that the section name `.note.rustc`
562// was getting shortened to `.note.ru`, and according to the PE and COFF
563// specification:
564//
565// > Executable images do not use a string table and do not support
566// > section names longer than 8 characters
567//
568// https://docs.microsoft.com/en-us/windows/win32/debug/pe-format
569//
570// As a result, we choose a slightly shorter name! As to why
571// `.note.rustc` works on MinGW, see
572// https://github.com/llvm/llvm-project/blob/llvmorg-12.0.0/lld/COFF/Writer.cpp#L1190-L1197
573pub fn create_compressed_metadata_file(
574    sess: &Session,
575    metadata: &EncodedMetadata,
576    symbol_name: &str,
577) -> Vec<u8> {
578    let mut packed_metadata = rustc_metadata::METADATA_HEADER.to_vec();
579    packed_metadata.write_all(&(metadata.stub_or_full().len() as u64).to_le_bytes()).unwrap();
580    packed_metadata.extend(metadata.stub_or_full());
581
582    let Some(mut file) = create_object_file(sess) else {
583        if sess.target.is_like_wasm {
584            return create_metadata_file_for_wasm(sess, &packed_metadata, ".rustc");
585        }
586        return packed_metadata.to_vec();
587    };
588    if file.format() == BinaryFormat::Xcoff {
589        return create_compressed_metadata_file_for_xcoff(file, &packed_metadata, symbol_name);
590    }
591    let section = file.add_section(
592        file.segment_name(StandardSegment::Data).to_vec(),
593        b".rustc".to_vec(),
594        SectionKind::ReadOnlyData,
595    );
596    match file.format() {
597        BinaryFormat::Elf => {
598            // Explicitly set no flags to avoid SHF_ALLOC default for data section.
599            file.section_mut(section).flags = SectionFlags::Elf { sh_flags: 0 };
600        }
601        _ => {}
602    };
603    let offset = file.append_section_data(section, &packed_metadata, 1);
604
605    // For MachO and probably PE this is necessary to prevent the linker from throwing away the
606    // .rustc section. For ELF this isn't necessary, but it also doesn't harm.
607    file.add_symbol(Symbol {
608        name: symbol_name.as_bytes().to_vec(),
609        value: offset,
610        size: packed_metadata.len() as u64,
611        kind: SymbolKind::Data,
612        scope: SymbolScope::Dynamic,
613        weak: false,
614        section: SymbolSection::Section(section),
615        flags: SymbolFlags::None,
616    });
617
618    file.write().unwrap()
619}
620
621/// * Xcoff - On AIX, custom sections are merged into predefined sections,
622///   so custom .rustc section is not preserved during linking.
623///   For this reason, we store metadata in predefined .info section, and
624///   define a symbol to reference the metadata. To preserve metadata during
625///   linking on AIX, we have to
626///   1. Create an empty .text section, a empty .data section.
627///   2. Define an empty symbol named `symbol_name` inside .data section.
628///   3. Define an symbol named `AIX_METADATA_SYMBOL_NAME` referencing
629///      data inside .info section.
630///   From XCOFF's view, (2) creates a csect entry in the symbol table, the
631///   symbol created by (3) is a info symbol for the preceding csect. Thus
632///   two symbols are preserved during linking and we can use the second symbol
633///   to reference the metadata.
634pub fn create_compressed_metadata_file_for_xcoff(
635    mut file: write::Object<'_>,
636    data: &[u8],
637    symbol_name: &str,
638) -> Vec<u8> {
639    if !(file.format() == BinaryFormat::Xcoff) {
    ::core::panicking::panic("assertion failed: file.format() == BinaryFormat::Xcoff")
};assert!(file.format() == BinaryFormat::Xcoff);
640    // AIX system linker may aborts if it meets a valid XCOFF file in archive with no .text, no .data and no .bss.
641    file.add_section(Vec::new(), b".text".to_vec(), SectionKind::Text);
642    let data_section = file.add_section(Vec::new(), b".data".to_vec(), SectionKind::Data);
643    let section = file.add_section(Vec::new(), b".info".to_vec(), SectionKind::Debug);
644    file.add_file_symbol("lib.rmeta".into());
645    file.section_mut(section).flags = SectionFlags::Xcoff { s_flags: xcoff::STYP_INFO as u32 };
646    // Add a global symbol to data_section.
647    file.add_symbol(Symbol {
648        name: symbol_name.as_bytes().into(),
649        value: 0,
650        size: 0,
651        kind: SymbolKind::Data,
652        scope: SymbolScope::Dynamic,
653        weak: true,
654        section: SymbolSection::Section(data_section),
655        flags: SymbolFlags::None,
656    });
657    let len: u32 = data.len().try_into().unwrap();
658    let offset = file.append_section_data(section, &len.to_be_bytes(), 1);
659    // Add a symbol referring to the rustc metadata.
660    file.add_symbol(Symbol {
661        name: AIX_METADATA_SYMBOL_NAME.into(),
662        value: offset + 4, // The metadata is preceded by a 4-byte length field.
663        size: 0,
664        kind: SymbolKind::Unknown,
665        scope: SymbolScope::Dynamic,
666        weak: false,
667        section: SymbolSection::Section(section),
668        flags: SymbolFlags::Xcoff {
669            n_sclass: xcoff::C_INFO,
670            x_smtyp: xcoff::C_HIDEXT,
671            x_smclas: xcoff::C_HIDEXT,
672            containing_csect: None,
673        },
674    });
675    file.append_section_data(section, data, 1);
676    file.write().unwrap()
677}
678
679/// Creates a simple WebAssembly object file, which is itself a wasm module,
680/// that contains a custom section of the name `section_name` with contents
681/// `data`.
682///
683/// NB: the `object` crate does not yet have support for writing the wasm
684/// object file format. In lieu of that the `wasm-encoder` crate is used to
685/// build a wasm file by hand.
686///
687/// The wasm object file format is defined at
688/// <https://github.com/WebAssembly/tool-conventions/blob/main/Linking.md>
689/// and mainly consists of a `linking` custom section. In this case the custom
690/// section there is empty except for a version marker indicating what format
691/// it's in.
692///
693/// The main purpose of this is to contain a custom section with `section_name`,
694/// which is then appended after `linking`.
695///
696/// As a further detail the object needs to have a 64-bit memory if `wasm64` is
697/// the target or otherwise it's interpreted as a 32-bit object which is
698/// incompatible with 64-bit ones.
699pub fn create_metadata_file_for_wasm(sess: &Session, data: &[u8], section_name: &str) -> Vec<u8> {
700    if !sess.target.is_like_wasm {
    ::core::panicking::panic("assertion failed: sess.target.is_like_wasm")
};assert!(sess.target.is_like_wasm);
701    let mut module = wasm_encoder::Module::new();
702    let mut imports = wasm_encoder::ImportSection::new();
703
704    if sess.target.pointer_width == 64 {
705        imports.import(
706            "env",
707            "__linear_memory",
708            wasm_encoder::MemoryType {
709                minimum: 0,
710                maximum: None,
711                memory64: true,
712                shared: false,
713                page_size_log2: None,
714            },
715        );
716    }
717
718    if imports.len() > 0 {
719        module.section(&imports);
720    }
721    module.section(&wasm_encoder::CustomSection {
722        name: "linking".into(),
723        data: Cow::Borrowed(&[2]),
724    });
725    module.section(&wasm_encoder::CustomSection { name: section_name.into(), data: data.into() });
726    module.finish()
727}