| /* |
| * Copyright (C) 2016 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include "linker/relative_patcher_test.h" |
| #include "linker/mips64/relative_patcher_mips64.h" |
| |
| namespace art { |
| namespace linker { |
| |
| class Mips64RelativePatcherTest : public RelativePatcherTest { |
| public: |
| Mips64RelativePatcherTest() : RelativePatcherTest(kMips64, "default") {} |
| |
| protected: |
| static const uint8_t kUnpatchedPcRelativeRawCode[]; |
| static const uint8_t kUnpatchedPcRelativeCallRawCode[]; |
| static const uint32_t kLiteralOffset; |
| static const uint32_t kAnchorOffset; |
| static const ArrayRef<const uint8_t> kUnpatchedPcRelativeCode; |
| static const ArrayRef<const uint8_t> kUnpatchedPcRelativeCallCode; |
| |
| uint32_t GetMethodOffset(uint32_t method_idx) { |
| auto result = method_offset_map_.FindMethodOffset(MethodRef(method_idx)); |
| CHECK(result.first); |
| return result.second; |
| } |
| |
| void CheckPcRelativePatch(const ArrayRef<const LinkerPatch>& patches, uint32_t target_offset); |
| void TestDexCacheReference(uint32_t dex_cache_arrays_begin, uint32_t element_offset); |
| void TestStringReference(uint32_t string_offset); |
| }; |
| |
| const uint8_t Mips64RelativePatcherTest::kUnpatchedPcRelativeRawCode[] = { |
| 0x34, 0x12, 0x5E, 0xEE, // auipc s2, high(diff); placeholder = 0x1234 |
| 0x78, 0x56, 0x52, 0x66, // daddiu s2, s2, low(diff); placeholder = 0x5678 |
| }; |
| const uint8_t Mips64RelativePatcherTest::kUnpatchedPcRelativeCallRawCode[] = { |
| 0x34, 0x12, 0x3E, 0xEC, // auipc at, high(diff); placeholder = 0x1234 |
| 0x78, 0x56, 0x01, 0xF8, // jialc at, low(diff); placeholder = 0x5678 |
| }; |
| const uint32_t Mips64RelativePatcherTest::kLiteralOffset = 0; // At auipc (where patching starts). |
| const uint32_t Mips64RelativePatcherTest::kAnchorOffset = 0; // At auipc (where PC+0 points). |
| const ArrayRef<const uint8_t> Mips64RelativePatcherTest::kUnpatchedPcRelativeCode( |
| kUnpatchedPcRelativeRawCode); |
| const ArrayRef<const uint8_t> Mips64RelativePatcherTest::kUnpatchedPcRelativeCallCode( |
| kUnpatchedPcRelativeCallRawCode); |
| |
| void Mips64RelativePatcherTest::CheckPcRelativePatch(const ArrayRef<const LinkerPatch>& patches, |
| uint32_t target_offset) { |
| AddCompiledMethod(MethodRef(1u), kUnpatchedPcRelativeCode, ArrayRef<const LinkerPatch>(patches)); |
| Link(); |
| |
| auto result = method_offset_map_.FindMethodOffset(MethodRef(1u)); |
| ASSERT_TRUE(result.first); |
| |
| uint32_t diff = target_offset - (result.second + kAnchorOffset); |
| diff += (diff & 0x8000) << 1; // Account for sign extension in instruction following auipc. |
| |
| const uint8_t expected_code[] = { |
| static_cast<uint8_t>(diff >> 16), static_cast<uint8_t>(diff >> 24), 0x5E, 0xEE, |
| static_cast<uint8_t>(diff), static_cast<uint8_t>(diff >> 8), 0x52, 0x66, |
| }; |
| EXPECT_TRUE(CheckLinkedMethod(MethodRef(1u), ArrayRef<const uint8_t>(expected_code))); |
| } |
| |
| void Mips64RelativePatcherTest::TestDexCacheReference(uint32_t dex_cache_arrays_begin, |
| uint32_t element_offset) { |
| dex_cache_arrays_begin_ = dex_cache_arrays_begin; |
| LinkerPatch patches[] = { |
| LinkerPatch::DexCacheArrayPatch(kLiteralOffset, nullptr, kAnchorOffset, element_offset) |
| }; |
| CheckPcRelativePatch(ArrayRef<const LinkerPatch>(patches), |
| dex_cache_arrays_begin_ + element_offset); |
| } |
| |
| TEST_F(Mips64RelativePatcherTest, DexCacheReference) { |
| TestDexCacheReference(/* dex_cache_arrays_begin */ 0x12345678, /* element_offset */ 0x1234); |
| } |
| |
| TEST_F(Mips64RelativePatcherTest, CallOther) { |
| LinkerPatch method1_patches[] = { |
| LinkerPatch::RelativeCodePatch(kLiteralOffset, nullptr, 2u), |
| }; |
| AddCompiledMethod(MethodRef(1u), |
| kUnpatchedPcRelativeCallCode, |
| ArrayRef<const LinkerPatch>(method1_patches)); |
| LinkerPatch method2_patches[] = { |
| LinkerPatch::RelativeCodePatch(kLiteralOffset, nullptr, 1u), |
| }; |
| AddCompiledMethod(MethodRef(2u), |
| kUnpatchedPcRelativeCallCode, |
| ArrayRef<const LinkerPatch>(method2_patches)); |
| Link(); |
| |
| uint32_t method1_offset = GetMethodOffset(1u); |
| uint32_t method2_offset = GetMethodOffset(2u); |
| uint32_t diff_after = method2_offset - (method1_offset + kAnchorOffset /* PC adjustment */); |
| diff_after += (diff_after & 0x8000) << 1; // Account for sign extension in jialc. |
| static const uint8_t method1_expected_code[] = { |
| static_cast<uint8_t>(diff_after >> 16), static_cast<uint8_t>(diff_after >> 24), 0x3E, 0xEC, |
| static_cast<uint8_t>(diff_after), static_cast<uint8_t>(diff_after >> 8), 0x01, 0xF8, |
| }; |
| EXPECT_TRUE(CheckLinkedMethod(MethodRef(1u), ArrayRef<const uint8_t>(method1_expected_code))); |
| uint32_t diff_before = method1_offset - (method2_offset + kAnchorOffset /* PC adjustment */); |
| diff_before += (diff_before & 0x8000) << 1; // Account for sign extension in jialc. |
| static const uint8_t method2_expected_code[] = { |
| static_cast<uint8_t>(diff_before >> 16), static_cast<uint8_t>(diff_before >> 24), 0x3E, 0xEC, |
| static_cast<uint8_t>(diff_before), static_cast<uint8_t>(diff_before >> 8), 0x01, 0xF8, |
| }; |
| EXPECT_TRUE(CheckLinkedMethod(MethodRef(2u), ArrayRef<const uint8_t>(method2_expected_code))); |
| } |
| |
| } // namespace linker |
| } // namespace art |