Index: lib/ExecutionEngine/RuntimeDyld/Targets/RuntimeDyldCOFFX86_64.h =================================================================== --- lib/ExecutionEngine/RuntimeDyld/Targets/RuntimeDyldCOFFX86_64.h +++ lib/ExecutionEngine/RuntimeDyld/Targets/RuntimeDyldCOFFX86_64.h @@ -128,6 +128,13 @@ break; } + case COFF::IMAGE_REL_AMD64_SECREL: { + assert(static_cast(RE.Addend) <= INT32_MAX && "Relocation overflow"); + assert(static_cast(RE.Addend) >= INT32_MIN && "Relocation underflow"); + writeBytesUnaligned(RE.Addend, Target, 4); + break; + } + default: llvm_unreachable("Relocation type not implemented yet!"); break; Index: test/ExecutionEngine/RuntimeDyld/X86/COFF_x86_64_IMGREL.s =================================================================== --- test/ExecutionEngine/RuntimeDyld/X86/COFF_x86_64_IMGREL.s +++ test/ExecutionEngine/RuntimeDyld/X86/COFF_x86_64_IMGREL.s @@ -24,3 +24,17 @@ # rtdyld-check: decode_operand(inst2, 3) = section_addr(COFF_x86_64_IMGREL.o, .rdata)+5-40960000000000 inst2: mov %ebx, (__constdata@imgrel+5) + .data + .space 375 +rel1: +# rtdyld-check: *{4}rel1 = string - section_addr(COFF_x86_64_IMGREL.o, .data) + .secrel32 string + +# We explicitly add padding to put string outside of the 16bit address space +# (absolute and as an offset from .data), so that relocations involving +# 32bit addresses / offsets are not accidentally truncated to 16 bits. + .space 65536 + .global string + .align 1 +string: + .asciz "Hello World\n"