diff options
Diffstat (limited to 'llvm/lib/Object/DXContainer.cpp')
-rw-r--r-- | llvm/lib/Object/DXContainer.cpp | 111 |
1 files changed, 111 insertions, 0 deletions
diff --git a/llvm/lib/Object/DXContainer.cpp b/llvm/lib/Object/DXContainer.cpp new file mode 100644 index 000000000000..ca859c1f69ae --- /dev/null +++ b/llvm/lib/Object/DXContainer.cpp @@ -0,0 +1,111 @@ +//===- DXContainer.cpp - DXContainer object file implementation -----------===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#include "llvm/Object/DXContainer.h" +#include "llvm/BinaryFormat/DXContainer.h" +#include "llvm/Object/Error.h" + +using namespace llvm; +using namespace llvm::object; + +static Error parseFailed(const Twine &Msg) { + return make_error<GenericBinaryError>(Msg.str(), object_error::parse_failed); +} + +template <typename T> +static Error readStruct(StringRef Buffer, const char *Src, T &Struct) { + // Don't read before the beginning or past the end of the file + if (Src < Buffer.begin() || Src + sizeof(T) > Buffer.end()) + return parseFailed("Reading structure out of file bounds"); + + memcpy(&Struct, Src, sizeof(T)); + // DXContainer is always little endian + if (sys::IsBigEndianHost) + Struct.swapBytes(); + return Error::success(); +} + +template <typename T> +static Error readInteger(StringRef Buffer, const char *Src, T &Val) { + static_assert(std::is_integral<T>::value, + "Cannot call readInteger on non-integral type."); + assert(reinterpret_cast<uintptr_t>(Src) % alignof(T) == 0 && + "Unaligned read of value from buffer!"); + // Don't read before the beginning or past the end of the file + if (Src < Buffer.begin() || Src + sizeof(T) > Buffer.end()) + return parseFailed("Reading structure out of file bounds"); + + Val = *reinterpret_cast<const T *>(Src); + // DXContainer is always little endian + if (sys::IsBigEndianHost) + sys::swapByteOrder(Val); + return Error::success(); +} + +DXContainer::DXContainer(MemoryBufferRef O) : Data(O) {} + +Error DXContainer::parseHeader() { + return readStruct(Data.getBuffer(), Data.getBuffer().data(), Header); +} + +Error DXContainer::parseDXILHeader(uint32_t Offset) { + if (DXIL) + return parseFailed("More than one DXIL part is present in the file"); + const char *Current = Data.getBuffer().data() + Offset; + dxbc::ProgramHeader Header; + if (Error Err = readStruct(Data.getBuffer(), Current, Header)) + return Err; + Current += offsetof(dxbc::ProgramHeader, Bitcode) + Header.Bitcode.Offset; + DXIL.emplace(std::make_pair(Header, Current)); + return Error::success(); +} + +Error DXContainer::parsePartOffsets() { + const char *Current = Data.getBuffer().data() + sizeof(dxbc::Header); + for (uint32_t Part = 0; Part < Header.PartCount; ++Part) { + uint32_t PartOffset; + if (Error Err = readInteger(Data.getBuffer(), Current, PartOffset)) + return Err; + Current += sizeof(uint32_t); + // We need to ensure that each part offset leaves enough space for a part + // header. To prevent overflow, we subtract the part header size from the + // buffer size, rather than adding to the offset. Since the file header is + // larger than the part header we can't reach this code unless the buffer + // is larger than the part header, so this can't underflow. + if (PartOffset > Data.getBufferSize() - sizeof(dxbc::PartHeader)) + return parseFailed("Part offset points beyond boundary of the file"); + PartOffsets.push_back(PartOffset); + + // If this isn't a dxil part stop here... + if (Data.getBuffer().substr(PartOffset, 4) != "DXIL") + continue; + if (Error Err = parseDXILHeader(PartOffset + sizeof(dxbc::PartHeader))) + return Err; + } + return Error::success(); +} + +Expected<DXContainer> DXContainer::create(MemoryBufferRef Object) { + DXContainer Container(Object); + if (Error Err = Container.parseHeader()) + return std::move(Err); + if (Error Err = Container.parsePartOffsets()) + return std::move(Err); + return Container; +} + +void DXContainer::PartIterator::updateIteratorImpl(const uint32_t Offset) { + StringRef Buffer = Container.Data.getBuffer(); + const char *Current = Buffer.data() + Offset; + // Offsets are validated during parsing, so all offsets in the container are + // valid and contain enough readable data to read a header. + cantFail(readStruct(Buffer, Current, IteratorState.Part)); + IteratorState.Data = + StringRef(Current + sizeof(dxbc::PartHeader), IteratorState.Part.Size); + IteratorState.Offset = Offset; +} |