ubsan: som.c undefined shift in som_set_reloc_info
[binutils-gdb.git] / bfd / elf32-i386.c
1 /* Intel 80386/80486-specific support for 32-bit ELF
2 Copyright (C) 1993-2022 Free Software Foundation, Inc.
3
4 This file is part of BFD, the Binary File Descriptor library.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
20
21 #include "elfxx-x86.h"
22 #include "elf-vxworks.h"
23 #include "dwarf2.h"
24 #include "opcode/i386.h"
25
26 /* 386 uses REL relocations instead of RELA. */
27 #define USE_REL 1
28
29 static reloc_howto_type elf_howto_table[]=
30 {
31 HOWTO(R_386_NONE, 0, 0, 0, false, 0, complain_overflow_dont,
32 bfd_elf_generic_reloc, "R_386_NONE",
33 true, 0x00000000, 0x00000000, false),
34 HOWTO(R_386_32, 0, 4, 32, false, 0, complain_overflow_dont,
35 bfd_elf_generic_reloc, "R_386_32",
36 true, 0xffffffff, 0xffffffff, false),
37 HOWTO(R_386_PC32, 0, 4, 32, true, 0, complain_overflow_dont,
38 bfd_elf_generic_reloc, "R_386_PC32",
39 true, 0xffffffff, 0xffffffff, true),
40 HOWTO(R_386_GOT32, 0, 4, 32, false, 0, complain_overflow_dont,
41 bfd_elf_generic_reloc, "R_386_GOT32",
42 true, 0xffffffff, 0xffffffff, false),
43 HOWTO(R_386_PLT32, 0, 4, 32, true, 0, complain_overflow_dont,
44 bfd_elf_generic_reloc, "R_386_PLT32",
45 true, 0xffffffff, 0xffffffff, true),
46 HOWTO(R_386_COPY, 0, 4, 32, false, 0, complain_overflow_dont,
47 bfd_elf_generic_reloc, "R_386_COPY",
48 true, 0xffffffff, 0xffffffff, false),
49 HOWTO(R_386_GLOB_DAT, 0, 4, 32, false, 0, complain_overflow_dont,
50 bfd_elf_generic_reloc, "R_386_GLOB_DAT",
51 true, 0xffffffff, 0xffffffff, false),
52 HOWTO(R_386_JUMP_SLOT, 0, 4, 32, false, 0, complain_overflow_dont,
53 bfd_elf_generic_reloc, "R_386_JUMP_SLOT",
54 true, 0xffffffff, 0xffffffff, false),
55 HOWTO(R_386_RELATIVE, 0, 4, 32, false, 0, complain_overflow_dont,
56 bfd_elf_generic_reloc, "R_386_RELATIVE",
57 true, 0xffffffff, 0xffffffff, false),
58 HOWTO(R_386_GOTOFF, 0, 4, 32, false, 0, complain_overflow_dont,
59 bfd_elf_generic_reloc, "R_386_GOTOFF",
60 true, 0xffffffff, 0xffffffff, false),
61 HOWTO(R_386_GOTPC, 0, 4, 32, true, 0, complain_overflow_dont,
62 bfd_elf_generic_reloc, "R_386_GOTPC",
63 true, 0xffffffff, 0xffffffff, true),
64
65 /* We have a gap in the reloc numbers here.
66 R_386_standard counts the number up to this point, and
67 R_386_ext_offset is the value to subtract from a reloc type of
68 R_386_16 thru R_386_PC8 to form an index into this table. */
69 #define R_386_standard (R_386_GOTPC + 1)
70 #define R_386_ext_offset (R_386_TLS_TPOFF - R_386_standard)
71
72 /* These relocs are a GNU extension. */
73 HOWTO(R_386_TLS_TPOFF, 0, 4, 32, false, 0, complain_overflow_dont,
74 bfd_elf_generic_reloc, "R_386_TLS_TPOFF",
75 true, 0xffffffff, 0xffffffff, false),
76 HOWTO(R_386_TLS_IE, 0, 4, 32, false, 0, complain_overflow_dont,
77 bfd_elf_generic_reloc, "R_386_TLS_IE",
78 true, 0xffffffff, 0xffffffff, false),
79 HOWTO(R_386_TLS_GOTIE, 0, 4, 32, false, 0, complain_overflow_dont,
80 bfd_elf_generic_reloc, "R_386_TLS_GOTIE",
81 true, 0xffffffff, 0xffffffff, false),
82 HOWTO(R_386_TLS_LE, 0, 4, 32, false, 0, complain_overflow_dont,
83 bfd_elf_generic_reloc, "R_386_TLS_LE",
84 true, 0xffffffff, 0xffffffff, false),
85 HOWTO(R_386_TLS_GD, 0, 4, 32, false, 0, complain_overflow_dont,
86 bfd_elf_generic_reloc, "R_386_TLS_GD",
87 true, 0xffffffff, 0xffffffff, false),
88 HOWTO(R_386_TLS_LDM, 0, 4, 32, false, 0, complain_overflow_dont,
89 bfd_elf_generic_reloc, "R_386_TLS_LDM",
90 true, 0xffffffff, 0xffffffff, false),
91 HOWTO(R_386_16, 0, 2, 16, false, 0, complain_overflow_bitfield,
92 bfd_elf_generic_reloc, "R_386_16",
93 true, 0xffff, 0xffff, false),
94 HOWTO(R_386_PC16, 0, 2, 16, true, 0, complain_overflow_bitfield,
95 bfd_elf_generic_reloc, "R_386_PC16",
96 true, 0xffff, 0xffff, true),
97 HOWTO(R_386_8, 0, 1, 8, false, 0, complain_overflow_bitfield,
98 bfd_elf_generic_reloc, "R_386_8",
99 true, 0xff, 0xff, false),
100 HOWTO(R_386_PC8, 0, 1, 8, true, 0, complain_overflow_signed,
101 bfd_elf_generic_reloc, "R_386_PC8",
102 true, 0xff, 0xff, true),
103
104 #define R_386_ext (R_386_PC8 + 1 - R_386_ext_offset)
105 #define R_386_tls_offset (R_386_TLS_LDO_32 - R_386_ext)
106 /* These are common with Solaris TLS implementation. */
107 HOWTO(R_386_TLS_LDO_32, 0, 4, 32, false, 0, complain_overflow_dont,
108 bfd_elf_generic_reloc, "R_386_TLS_LDO_32",
109 true, 0xffffffff, 0xffffffff, false),
110 HOWTO(R_386_TLS_IE_32, 0, 4, 32, false, 0, complain_overflow_dont,
111 bfd_elf_generic_reloc, "R_386_TLS_IE_32",
112 true, 0xffffffff, 0xffffffff, false),
113 HOWTO(R_386_TLS_LE_32, 0, 4, 32, false, 0, complain_overflow_dont,
114 bfd_elf_generic_reloc, "R_386_TLS_LE_32",
115 true, 0xffffffff, 0xffffffff, false),
116 HOWTO(R_386_TLS_DTPMOD32, 0, 4, 32, false, 0, complain_overflow_dont,
117 bfd_elf_generic_reloc, "R_386_TLS_DTPMOD32",
118 true, 0xffffffff, 0xffffffff, false),
119 HOWTO(R_386_TLS_DTPOFF32, 0, 4, 32, false, 0, complain_overflow_dont,
120 bfd_elf_generic_reloc, "R_386_TLS_DTPOFF32",
121 true, 0xffffffff, 0xffffffff, false),
122 HOWTO(R_386_TLS_TPOFF32, 0, 4, 32, false, 0, complain_overflow_dont,
123 bfd_elf_generic_reloc, "R_386_TLS_TPOFF32",
124 true, 0xffffffff, 0xffffffff, false),
125 HOWTO(R_386_SIZE32, 0, 4, 32, false, 0, complain_overflow_dont,
126 bfd_elf_generic_reloc, "R_386_SIZE32",
127 true, 0xffffffff, 0xffffffff, false),
128 HOWTO(R_386_TLS_GOTDESC, 0, 4, 32, false, 0, complain_overflow_dont,
129 bfd_elf_generic_reloc, "R_386_TLS_GOTDESC",
130 true, 0xffffffff, 0xffffffff, false),
131 HOWTO(R_386_TLS_DESC_CALL, 0, 0, 0, false, 0, complain_overflow_dont,
132 bfd_elf_generic_reloc, "R_386_TLS_DESC_CALL",
133 false, 0, 0, false),
134 HOWTO(R_386_TLS_DESC, 0, 4, 32, false, 0, complain_overflow_dont,
135 bfd_elf_generic_reloc, "R_386_TLS_DESC",
136 true, 0xffffffff, 0xffffffff, false),
137 HOWTO(R_386_IRELATIVE, 0, 4, 32, false, 0, complain_overflow_dont,
138 bfd_elf_generic_reloc, "R_386_IRELATIVE",
139 true, 0xffffffff, 0xffffffff, false),
140 HOWTO(R_386_GOT32X, 0, 4, 32, false, 0, complain_overflow_dont,
141 bfd_elf_generic_reloc, "R_386_GOT32X",
142 true, 0xffffffff, 0xffffffff, false),
143
144 /* Another gap. */
145 #define R_386_ext2 (R_386_GOT32X + 1 - R_386_tls_offset)
146 #define R_386_vt_offset (R_386_GNU_VTINHERIT - R_386_ext2)
147
148 /* GNU extension to record C++ vtable hierarchy. */
149 HOWTO (R_386_GNU_VTINHERIT, /* type */
150 0, /* rightshift */
151 4, /* size */
152 0, /* bitsize */
153 false, /* pc_relative */
154 0, /* bitpos */
155 complain_overflow_dont, /* complain_on_overflow */
156 NULL, /* special_function */
157 "R_386_GNU_VTINHERIT", /* name */
158 false, /* partial_inplace */
159 0, /* src_mask */
160 0, /* dst_mask */
161 false), /* pcrel_offset */
162
163 /* GNU extension to record C++ vtable member usage. */
164 HOWTO (R_386_GNU_VTENTRY, /* type */
165 0, /* rightshift */
166 4, /* size */
167 0, /* bitsize */
168 false, /* pc_relative */
169 0, /* bitpos */
170 complain_overflow_dont, /* complain_on_overflow */
171 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
172 "R_386_GNU_VTENTRY", /* name */
173 false, /* partial_inplace */
174 0, /* src_mask */
175 0, /* dst_mask */
176 false) /* pcrel_offset */
177
178 #define R_386_vt (R_386_GNU_VTENTRY + 1 - R_386_vt_offset)
179
180 };
181
182 #ifdef DEBUG_GEN_RELOC
183 #define TRACE(str) \
184 fprintf (stderr, "i386 bfd reloc lookup %d (%s)\n", code, str)
185 #else
186 #define TRACE(str)
187 #endif
188
189 static reloc_howto_type *
190 elf_i386_reloc_type_lookup (bfd *abfd,
191 bfd_reloc_code_real_type code)
192 {
193 switch (code)
194 {
195 case BFD_RELOC_NONE:
196 TRACE ("BFD_RELOC_NONE");
197 return &elf_howto_table[R_386_NONE];
198
199 case BFD_RELOC_32:
200 TRACE ("BFD_RELOC_32");
201 return &elf_howto_table[R_386_32];
202
203 case BFD_RELOC_CTOR:
204 TRACE ("BFD_RELOC_CTOR");
205 return &elf_howto_table[R_386_32];
206
207 case BFD_RELOC_32_PCREL:
208 TRACE ("BFD_RELOC_PC32");
209 return &elf_howto_table[R_386_PC32];
210
211 case BFD_RELOC_386_GOT32:
212 TRACE ("BFD_RELOC_386_GOT32");
213 return &elf_howto_table[R_386_GOT32];
214
215 case BFD_RELOC_386_PLT32:
216 TRACE ("BFD_RELOC_386_PLT32");
217 return &elf_howto_table[R_386_PLT32];
218
219 case BFD_RELOC_386_COPY:
220 TRACE ("BFD_RELOC_386_COPY");
221 return &elf_howto_table[R_386_COPY];
222
223 case BFD_RELOC_386_GLOB_DAT:
224 TRACE ("BFD_RELOC_386_GLOB_DAT");
225 return &elf_howto_table[R_386_GLOB_DAT];
226
227 case BFD_RELOC_386_JUMP_SLOT:
228 TRACE ("BFD_RELOC_386_JUMP_SLOT");
229 return &elf_howto_table[R_386_JUMP_SLOT];
230
231 case BFD_RELOC_386_RELATIVE:
232 TRACE ("BFD_RELOC_386_RELATIVE");
233 return &elf_howto_table[R_386_RELATIVE];
234
235 case BFD_RELOC_386_GOTOFF:
236 TRACE ("BFD_RELOC_386_GOTOFF");
237 return &elf_howto_table[R_386_GOTOFF];
238
239 case BFD_RELOC_386_GOTPC:
240 TRACE ("BFD_RELOC_386_GOTPC");
241 return &elf_howto_table[R_386_GOTPC];
242
243 /* These relocs are a GNU extension. */
244 case BFD_RELOC_386_TLS_TPOFF:
245 TRACE ("BFD_RELOC_386_TLS_TPOFF");
246 return &elf_howto_table[R_386_TLS_TPOFF - R_386_ext_offset];
247
248 case BFD_RELOC_386_TLS_IE:
249 TRACE ("BFD_RELOC_386_TLS_IE");
250 return &elf_howto_table[R_386_TLS_IE - R_386_ext_offset];
251
252 case BFD_RELOC_386_TLS_GOTIE:
253 TRACE ("BFD_RELOC_386_TLS_GOTIE");
254 return &elf_howto_table[R_386_TLS_GOTIE - R_386_ext_offset];
255
256 case BFD_RELOC_386_TLS_LE:
257 TRACE ("BFD_RELOC_386_TLS_LE");
258 return &elf_howto_table[R_386_TLS_LE - R_386_ext_offset];
259
260 case BFD_RELOC_386_TLS_GD:
261 TRACE ("BFD_RELOC_386_TLS_GD");
262 return &elf_howto_table[R_386_TLS_GD - R_386_ext_offset];
263
264 case BFD_RELOC_386_TLS_LDM:
265 TRACE ("BFD_RELOC_386_TLS_LDM");
266 return &elf_howto_table[R_386_TLS_LDM - R_386_ext_offset];
267
268 case BFD_RELOC_16:
269 TRACE ("BFD_RELOC_16");
270 return &elf_howto_table[R_386_16 - R_386_ext_offset];
271
272 case BFD_RELOC_16_PCREL:
273 TRACE ("BFD_RELOC_16_PCREL");
274 return &elf_howto_table[R_386_PC16 - R_386_ext_offset];
275
276 case BFD_RELOC_8:
277 TRACE ("BFD_RELOC_8");
278 return &elf_howto_table[R_386_8 - R_386_ext_offset];
279
280 case BFD_RELOC_8_PCREL:
281 TRACE ("BFD_RELOC_8_PCREL");
282 return &elf_howto_table[R_386_PC8 - R_386_ext_offset];
283
284 /* Common with Sun TLS implementation. */
285 case BFD_RELOC_386_TLS_LDO_32:
286 TRACE ("BFD_RELOC_386_TLS_LDO_32");
287 return &elf_howto_table[R_386_TLS_LDO_32 - R_386_tls_offset];
288
289 case BFD_RELOC_386_TLS_IE_32:
290 TRACE ("BFD_RELOC_386_TLS_IE_32");
291 return &elf_howto_table[R_386_TLS_IE_32 - R_386_tls_offset];
292
293 case BFD_RELOC_386_TLS_LE_32:
294 TRACE ("BFD_RELOC_386_TLS_LE_32");
295 return &elf_howto_table[R_386_TLS_LE_32 - R_386_tls_offset];
296
297 case BFD_RELOC_386_TLS_DTPMOD32:
298 TRACE ("BFD_RELOC_386_TLS_DTPMOD32");
299 return &elf_howto_table[R_386_TLS_DTPMOD32 - R_386_tls_offset];
300
301 case BFD_RELOC_386_TLS_DTPOFF32:
302 TRACE ("BFD_RELOC_386_TLS_DTPOFF32");
303 return &elf_howto_table[R_386_TLS_DTPOFF32 - R_386_tls_offset];
304
305 case BFD_RELOC_386_TLS_TPOFF32:
306 TRACE ("BFD_RELOC_386_TLS_TPOFF32");
307 return &elf_howto_table[R_386_TLS_TPOFF32 - R_386_tls_offset];
308
309 case BFD_RELOC_SIZE32:
310 TRACE ("BFD_RELOC_SIZE32");
311 return &elf_howto_table[R_386_SIZE32 - R_386_tls_offset];
312
313 case BFD_RELOC_386_TLS_GOTDESC:
314 TRACE ("BFD_RELOC_386_TLS_GOTDESC");
315 return &elf_howto_table[R_386_TLS_GOTDESC - R_386_tls_offset];
316
317 case BFD_RELOC_386_TLS_DESC_CALL:
318 TRACE ("BFD_RELOC_386_TLS_DESC_CALL");
319 return &elf_howto_table[R_386_TLS_DESC_CALL - R_386_tls_offset];
320
321 case BFD_RELOC_386_TLS_DESC:
322 TRACE ("BFD_RELOC_386_TLS_DESC");
323 return &elf_howto_table[R_386_TLS_DESC - R_386_tls_offset];
324
325 case BFD_RELOC_386_IRELATIVE:
326 TRACE ("BFD_RELOC_386_IRELATIVE");
327 return &elf_howto_table[R_386_IRELATIVE - R_386_tls_offset];
328
329 case BFD_RELOC_386_GOT32X:
330 TRACE ("BFD_RELOC_386_GOT32X");
331 return &elf_howto_table[R_386_GOT32X - R_386_tls_offset];
332
333 case BFD_RELOC_VTABLE_INHERIT:
334 TRACE ("BFD_RELOC_VTABLE_INHERIT");
335 return &elf_howto_table[R_386_GNU_VTINHERIT - R_386_vt_offset];
336
337 case BFD_RELOC_VTABLE_ENTRY:
338 TRACE ("BFD_RELOC_VTABLE_ENTRY");
339 return &elf_howto_table[R_386_GNU_VTENTRY - R_386_vt_offset];
340
341 default:
342 TRACE ("Unknown");
343 /* xgettext:c-format */
344 _bfd_error_handler (_("%pB: unsupported relocation type: %#x"),
345 abfd, (int) code);
346 bfd_set_error (bfd_error_bad_value);
347 return NULL;
348 }
349 }
350
351 static reloc_howto_type *
352 elf_i386_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
353 const char *r_name)
354 {
355 unsigned int i;
356
357 for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
358 if (elf_howto_table[i].name != NULL
359 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
360 return &elf_howto_table[i];
361
362 return NULL;
363 }
364
365 static reloc_howto_type *
366 elf_i386_rtype_to_howto (unsigned r_type)
367 {
368 unsigned int indx;
369
370 if ((indx = r_type) >= R_386_standard
371 && ((indx = r_type - R_386_ext_offset) - R_386_standard
372 >= R_386_ext - R_386_standard)
373 && ((indx = r_type - R_386_tls_offset) - R_386_ext
374 >= R_386_ext2 - R_386_ext)
375 && ((indx = r_type - R_386_vt_offset) - R_386_ext2
376 >= R_386_vt - R_386_ext2))
377 return NULL;
378 /* PR 17512: file: 0f67f69d. */
379 if (elf_howto_table [indx].type != r_type)
380 return NULL;
381 return &elf_howto_table[indx];
382 }
383
384 static bool
385 elf_i386_info_to_howto_rel (bfd *abfd,
386 arelent *cache_ptr,
387 Elf_Internal_Rela *dst)
388 {
389 unsigned int r_type = ELF32_R_TYPE (dst->r_info);
390
391 if ((cache_ptr->howto = elf_i386_rtype_to_howto (r_type)) == NULL)
392 {
393 /* xgettext:c-format */
394 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
395 abfd, r_type);
396 bfd_set_error (bfd_error_bad_value);
397 return false;
398 }
399
400 return true;
401 }
402
403 /* Return whether a symbol name implies a local label. The UnixWare
404 2.1 cc generates temporary symbols that start with .X, so we
405 recognize them here. FIXME: do other SVR4 compilers also use .X?.
406 If so, we should move the .X recognition into
407 _bfd_elf_is_local_label_name. */
408
409 static bool
410 elf_i386_is_local_label_name (bfd *abfd, const char *name)
411 {
412 if (name[0] == '.' && name[1] == 'X')
413 return true;
414
415 return _bfd_elf_is_local_label_name (abfd, name);
416 }
417 \f
418 /* Support for core dump NOTE sections. */
419
420 static bool
421 elf_i386_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
422 {
423 int offset;
424 size_t size;
425
426 if (note->namesz == 8 && strcmp (note->namedata, "FreeBSD") == 0)
427 {
428 int pr_version = bfd_get_32 (abfd, note->descdata);
429
430 if (pr_version != 1)
431 return false;
432
433 /* pr_cursig */
434 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 20);
435
436 /* pr_pid */
437 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
438
439 /* pr_reg */
440 offset = 28;
441 size = bfd_get_32 (abfd, note->descdata + 8);
442 }
443 else
444 {
445 switch (note->descsz)
446 {
447 default:
448 return false;
449
450 case 144: /* Linux/i386 */
451 /* pr_cursig */
452 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
453
454 /* pr_pid */
455 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
456
457 /* pr_reg */
458 offset = 72;
459 size = 68;
460
461 break;
462 }
463 }
464
465 /* Make a ".reg/999" section. */
466 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
467 size, note->descpos + offset);
468 }
469
470 static bool
471 elf_i386_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
472 {
473 if (note->namesz == 8 && strcmp (note->namedata, "FreeBSD") == 0)
474 {
475 int pr_version = bfd_get_32 (abfd, note->descdata);
476
477 if (pr_version != 1)
478 return false;
479
480 elf_tdata (abfd)->core->program
481 = _bfd_elfcore_strndup (abfd, note->descdata + 8, 17);
482 elf_tdata (abfd)->core->command
483 = _bfd_elfcore_strndup (abfd, note->descdata + 25, 81);
484 }
485 else
486 {
487 switch (note->descsz)
488 {
489 default:
490 return false;
491
492 case 124: /* Linux/i386 elf_prpsinfo. */
493 elf_tdata (abfd)->core->pid
494 = bfd_get_32 (abfd, note->descdata + 12);
495 elf_tdata (abfd)->core->program
496 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
497 elf_tdata (abfd)->core->command
498 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
499 }
500 }
501
502 /* Note that for some reason, a spurious space is tacked
503 onto the end of the args in some (at least one anyway)
504 implementations, so strip it off if it exists. */
505 {
506 char *command = elf_tdata (abfd)->core->command;
507 int n = strlen (command);
508
509 if (0 < n && command[n - 1] == ' ')
510 command[n - 1] = '\0';
511 }
512
513 return true;
514 }
515 \f
516 /* Functions for the i386 ELF linker.
517
518 In order to gain some understanding of code in this file without
519 knowing all the intricate details of the linker, note the
520 following:
521
522 Functions named elf_i386_* are called by external routines, other
523 functions are only called locally. elf_i386_* functions appear
524 in this file more or less in the order in which they are called
525 from external routines. eg. elf_i386_scan_relocs is called
526 early in the link process, elf_i386_finish_dynamic_sections is
527 one of the last functions. */
528
529 /* The size in bytes of an entry in the lazy procedure linkage table. */
530
531 #define LAZY_PLT_ENTRY_SIZE 16
532
533 /* The size in bytes of an entry in the non-lazy procedure linkage
534 table. */
535
536 #define NON_LAZY_PLT_ENTRY_SIZE 8
537
538 /* The first entry in an absolute lazy procedure linkage table looks
539 like this. See the SVR4 ABI i386 supplement to see how this works.
540 Will be padded to LAZY_PLT_ENTRY_SIZE with lazy_plt->plt0_pad_byte. */
541
542 static const bfd_byte elf_i386_lazy_plt0_entry[12] =
543 {
544 0xff, 0x35, /* pushl contents of address */
545 0, 0, 0, 0, /* replaced with address of .got + 4. */
546 0xff, 0x25, /* jmp indirect */
547 0, 0, 0, 0 /* replaced with address of .got + 8. */
548 };
549
550 /* Subsequent entries in an absolute lazy procedure linkage table look
551 like this. */
552
553 static const bfd_byte elf_i386_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
554 {
555 0xff, 0x25, /* jmp indirect */
556 0, 0, 0, 0, /* replaced with address of this symbol in .got. */
557 0x68, /* pushl immediate */
558 0, 0, 0, 0, /* replaced with offset into relocation table. */
559 0xe9, /* jmp relative */
560 0, 0, 0, 0 /* replaced with offset to start of .plt. */
561 };
562
563 /* The first entry in a PIC lazy procedure linkage table look like
564 this. Will be padded to LAZY_PLT_ENTRY_SIZE with
565 lazy_plt->plt0_pad_byte. */
566
567 static const bfd_byte elf_i386_pic_lazy_plt0_entry[12] =
568 {
569 0xff, 0xb3, 4, 0, 0, 0, /* pushl 4(%ebx) */
570 0xff, 0xa3, 8, 0, 0, 0 /* jmp *8(%ebx) */
571 };
572
573 /* Subsequent entries in a PIC lazy procedure linkage table look like
574 this. */
575
576 static const bfd_byte elf_i386_pic_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
577 {
578 0xff, 0xa3, /* jmp *offset(%ebx) */
579 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
580 0x68, /* pushl immediate */
581 0, 0, 0, 0, /* replaced with offset into relocation table. */
582 0xe9, /* jmp relative */
583 0, 0, 0, 0 /* replaced with offset to start of .plt. */
584 };
585
586 /* Entries in the non-lazy procedure linkage table look like this. */
587
588 static const bfd_byte elf_i386_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
589 {
590 0xff, 0x25, /* jmp indirect */
591 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
592 0x66, 0x90 /* xchg %ax,%ax */
593 };
594
595 /* Entries in the PIC non-lazy procedure linkage table look like
596 this. */
597
598 static const bfd_byte elf_i386_pic_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
599 {
600 0xff, 0xa3, /* jmp *offset(%ebx) */
601 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
602 0x66, 0x90 /* xchg %ax,%ax */
603 };
604
605 /* The first entry in an absolute IBT-enabled lazy procedure linkage
606 table looks like this. */
607
608 static const bfd_byte elf_i386_lazy_ibt_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
609 {
610 0xff, 0x35, 0, 0, 0, 0, /* pushl GOT[1] */
611 0xff, 0x25, 0, 0, 0, 0, /* jmp *GOT[2] */
612 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
613 };
614
615 /* Subsequent entries for an absolute IBT-enabled lazy procedure linkage
616 table look like this. Subsequent entries for a PIC IBT-enabled lazy
617 procedure linkage table are the same. */
618
619 static const bfd_byte elf_i386_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
620 {
621 0xf3, 0x0f, 0x1e, 0xfb, /* endbr32 */
622 0x68, 0, 0, 0, 0, /* pushl immediate */
623 0xe9, 0, 0, 0, 0, /* jmp relative */
624 0x66, 0x90 /* xchg %ax,%ax */
625 };
626
627 /* The first entry in a PIC IBT-enabled lazy procedure linkage table
628 look like. */
629
630 static const bfd_byte elf_i386_pic_lazy_ibt_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
631 {
632 0xff, 0xb3, 4, 0, 0, 0, /* pushl 4(%ebx) */
633 0xff, 0xa3, 8, 0, 0, 0, /* jmp *8(%ebx) */
634 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
635 };
636
637 /* Entries for branches with IBT-enabled in the absolute non-lazey
638 procedure linkage table look like this. They have the same size
639 as the lazy PLT entry. */
640
641 static const bfd_byte elf_i386_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
642 {
643 0xf3, 0x0f, 0x1e, 0xfb, /* endbr32 */
644 0xff, 0x25, 0, 0, 0, 0, /* jmp *name@GOT */
645 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
646 };
647
648 /* Entries for branches with IBT-enabled in the PIC non-lazey procedure
649 linkage table look like this. They have the same size as the lazy
650 PLT entry. */
651
652 static const bfd_byte elf_i386_pic_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
653 {
654 0xf3, 0x0f, 0x1e, 0xfb, /* endbr32 */
655 0xff, 0xa3, 0, 0, 0, 0, /* jmp *name@GOT(%ebx) */
656 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
657 };
658
659 /* .eh_frame covering the lazy .plt section. */
660
661 static const bfd_byte elf_i386_eh_frame_lazy_plt[] =
662 {
663 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
664 0, 0, 0, 0, /* CIE ID */
665 1, /* CIE version */
666 'z', 'R', 0, /* Augmentation string */
667 1, /* Code alignment factor */
668 0x7c, /* Data alignment factor */
669 8, /* Return address column */
670 1, /* Augmentation size */
671 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
672 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
673 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
674 DW_CFA_nop, DW_CFA_nop,
675
676 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
677 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
678 0, 0, 0, 0, /* R_386_PC32 .plt goes here */
679 0, 0, 0, 0, /* .plt size goes here */
680 0, /* Augmentation size */
681 DW_CFA_def_cfa_offset, 8, /* DW_CFA_def_cfa_offset: 8 */
682 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
683 DW_CFA_def_cfa_offset, 12, /* DW_CFA_def_cfa_offset: 12 */
684 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
685 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
686 11, /* Block length */
687 DW_OP_breg4, 4, /* DW_OP_breg4 (esp): 4 */
688 DW_OP_breg8, 0, /* DW_OP_breg8 (eip): 0 */
689 DW_OP_lit15, DW_OP_and, DW_OP_lit11, DW_OP_ge,
690 DW_OP_lit2, DW_OP_shl, DW_OP_plus,
691 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
692 };
693
694 /* .eh_frame covering the lazy .plt section with IBT-enabled. */
695
696 static const bfd_byte elf_i386_eh_frame_lazy_ibt_plt[] =
697 {
698 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
699 0, 0, 0, 0, /* CIE ID */
700 1, /* CIE version */
701 'z', 'R', 0, /* Augmentation string */
702 1, /* Code alignment factor */
703 0x7c, /* Data alignment factor */
704 8, /* Return address column */
705 1, /* Augmentation size */
706 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
707 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
708 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
709 DW_CFA_nop, DW_CFA_nop,
710
711 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
712 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
713 0, 0, 0, 0, /* R_386_PC32 .plt goes here */
714 0, 0, 0, 0, /* .plt size goes here */
715 0, /* Augmentation size */
716 DW_CFA_def_cfa_offset, 8, /* DW_CFA_def_cfa_offset: 8 */
717 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
718 DW_CFA_def_cfa_offset, 12, /* DW_CFA_def_cfa_offset: 12 */
719 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
720 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
721 11, /* Block length */
722 DW_OP_breg4, 4, /* DW_OP_breg4 (esp): 4 */
723 DW_OP_breg8, 0, /* DW_OP_breg8 (eip): 0 */
724 DW_OP_lit15, DW_OP_and, DW_OP_lit9, DW_OP_ge,
725 DW_OP_lit2, DW_OP_shl, DW_OP_plus,
726 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
727 };
728
729 /* .eh_frame covering the non-lazy .plt section. */
730
731 static const bfd_byte elf_i386_eh_frame_non_lazy_plt[] =
732 {
733 #define PLT_GOT_FDE_LENGTH 16
734 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
735 0, 0, 0, 0, /* CIE ID */
736 1, /* CIE version */
737 'z', 'R', 0, /* Augmentation string */
738 1, /* Code alignment factor */
739 0x7c, /* Data alignment factor */
740 8, /* Return address column */
741 1, /* Augmentation size */
742 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
743 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
744 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
745 DW_CFA_nop, DW_CFA_nop,
746
747 PLT_GOT_FDE_LENGTH, 0, 0, 0, /* FDE length */
748 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
749 0, 0, 0, 0, /* the start of non-lazy .plt goes here */
750 0, 0, 0, 0, /* non-lazy .plt size goes here */
751 0, /* Augmentation size */
752 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
753 };
754
755 /* These are the standard parameters. */
756 static const struct elf_x86_lazy_plt_layout elf_i386_lazy_plt =
757 {
758 elf_i386_lazy_plt0_entry, /* plt0_entry */
759 sizeof (elf_i386_lazy_plt0_entry), /* plt0_entry_size */
760 elf_i386_lazy_plt_entry, /* plt_entry */
761 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
762 NULL, /* plt_tlsdesc_entry */
763 0, /* plt_tlsdesc_entry_size*/
764 0, /* plt_tlsdesc_got1_offset */
765 0, /* plt_tlsdesc_got2_offset */
766 0, /* plt_tlsdesc_got1_insn_end */
767 0, /* plt_tlsdesc_got2_insn_end */
768 2, /* plt0_got1_offset */
769 8, /* plt0_got2_offset */
770 0, /* plt0_got2_insn_end */
771 2, /* plt_got_offset */
772 7, /* plt_reloc_offset */
773 12, /* plt_plt_offset */
774 0, /* plt_got_insn_size */
775 0, /* plt_plt_insn_end */
776 6, /* plt_lazy_offset */
777 elf_i386_pic_lazy_plt0_entry, /* pic_plt0_entry */
778 elf_i386_pic_lazy_plt_entry, /* pic_plt_entry */
779 elf_i386_eh_frame_lazy_plt, /* eh_frame_plt */
780 sizeof (elf_i386_eh_frame_lazy_plt) /* eh_frame_plt_size */
781 };
782
783 static const struct elf_x86_non_lazy_plt_layout elf_i386_non_lazy_plt =
784 {
785 elf_i386_non_lazy_plt_entry, /* plt_entry */
786 elf_i386_pic_non_lazy_plt_entry, /* pic_plt_entry */
787 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
788 2, /* plt_got_offset */
789 0, /* plt_got_insn_size */
790 elf_i386_eh_frame_non_lazy_plt, /* eh_frame_plt */
791 sizeof (elf_i386_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
792 };
793
794 static const struct elf_x86_lazy_plt_layout elf_i386_lazy_ibt_plt =
795 {
796 elf_i386_lazy_ibt_plt0_entry, /* plt0_entry */
797 sizeof (elf_i386_lazy_ibt_plt0_entry), /* plt0_entry_size */
798 elf_i386_lazy_ibt_plt_entry, /* plt_entry */
799 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
800 NULL, /* plt_tlsdesc_entry */
801 0, /* plt_tlsdesc_entry_size*/
802 0, /* plt_tlsdesc_got1_offset */
803 0, /* plt_tlsdesc_got2_offset */
804 0, /* plt_tlsdesc_got1_insn_end */
805 0, /* plt_tlsdesc_got2_insn_end */
806 2, /* plt0_got1_offset */
807 8, /* plt0_got2_offset */
808 0, /* plt0_got2_insn_end */
809 4+2, /* plt_got_offset */
810 4+1, /* plt_reloc_offset */
811 4+6, /* plt_plt_offset */
812 0, /* plt_got_insn_size */
813 0, /* plt_plt_insn_end */
814 0, /* plt_lazy_offset */
815 elf_i386_pic_lazy_ibt_plt0_entry, /* pic_plt0_entry */
816 elf_i386_lazy_ibt_plt_entry, /* pic_plt_entry */
817 elf_i386_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
818 sizeof (elf_i386_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
819 };
820
821 static const struct elf_x86_non_lazy_plt_layout elf_i386_non_lazy_ibt_plt =
822 {
823 elf_i386_non_lazy_ibt_plt_entry, /* plt_entry */
824 elf_i386_pic_non_lazy_ibt_plt_entry,/* pic_plt_entry */
825 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
826 4+2, /* plt_got_offset */
827 0, /* plt_got_insn_size */
828 elf_i386_eh_frame_non_lazy_plt, /* eh_frame_plt */
829 sizeof (elf_i386_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
830 };
831 \f
832
833 /* On VxWorks, the .rel.plt.unloaded section has absolute relocations
834 for the PLTResolve stub and then for each PLT entry. */
835 #define PLTRESOLVE_RELOCS_SHLIB 0
836 #define PLTRESOLVE_RELOCS 2
837 #define PLT_NON_JUMP_SLOT_RELOCS 2
838
839 /* Return TRUE if the TLS access code sequence support transition
840 from R_TYPE. */
841
842 static bool
843 elf_i386_check_tls_transition (asection *sec,
844 bfd_byte *contents,
845 Elf_Internal_Shdr *symtab_hdr,
846 struct elf_link_hash_entry **sym_hashes,
847 unsigned int r_type,
848 const Elf_Internal_Rela *rel,
849 const Elf_Internal_Rela *relend)
850 {
851 unsigned int val, type, reg;
852 unsigned long r_symndx;
853 struct elf_link_hash_entry *h;
854 bfd_vma offset;
855 bfd_byte *call;
856 bool indirect_call;
857
858 offset = rel->r_offset;
859 switch (r_type)
860 {
861 case R_386_TLS_GD:
862 case R_386_TLS_LDM:
863 if (offset < 2 || (rel + 1) >= relend)
864 return false;
865
866 indirect_call = false;
867 call = contents + offset + 4;
868 val = *(call - 5);
869 type = *(call - 6);
870 if (r_type == R_386_TLS_GD)
871 {
872 /* Check transition from GD access model. Only
873 leal foo@tlsgd(,%ebx,1), %eax
874 call ___tls_get_addr@PLT
875 or
876 leal foo@tlsgd(%ebx) %eax
877 call ___tls_get_addr@PLT
878 nop
879 or
880 leal foo@tlsgd(%reg), %eax
881 call *___tls_get_addr@GOT(%reg)
882 which may be converted to
883 addr32 call ___tls_get_addr
884 can transit to different access model. */
885 if ((offset + 10) > sec->size
886 || (type != 0x8d && type != 0x04))
887 return false;
888
889 if (type == 0x04)
890 {
891 /* leal foo@tlsgd(,%ebx,1), %eax
892 call ___tls_get_addr@PLT */
893 if (offset < 3)
894 return false;
895
896 if (*(call - 7) != 0x8d
897 || val != 0x1d
898 || call[0] != 0xe8)
899 return false;
900 }
901 else
902 {
903 /* This must be
904 leal foo@tlsgd(%ebx), %eax
905 call ___tls_get_addr@PLT
906 nop
907 or
908 leal foo@tlsgd(%reg), %eax
909 call *___tls_get_addr@GOT(%reg)
910 which may be converted to
911 addr32 call ___tls_get_addr
912
913 %eax can't be used as the GOT base register since it
914 is used to pass parameter to ___tls_get_addr. */
915 reg = val & 7;
916 if ((val & 0xf8) != 0x80 || reg == 4 || reg == 0)
917 return false;
918
919 indirect_call = call[0] == 0xff;
920 if (!(reg == 3 && call[0] == 0xe8 && call[5] == 0x90)
921 && !(call[0] == 0x67 && call[1] == 0xe8)
922 && !(indirect_call
923 && (call[1] & 0xf8) == 0x90
924 && (call[1] & 0x7) == reg))
925 return false;
926 }
927 }
928 else
929 {
930 /* Check transition from LD access model. Only
931 leal foo@tlsldm(%ebx), %eax
932 call ___tls_get_addr@PLT
933 or
934 leal foo@tlsldm(%reg), %eax
935 call *___tls_get_addr@GOT(%reg)
936 which may be converted to
937 addr32 call ___tls_get_addr
938 can transit to different access model. */
939 if (type != 0x8d || (offset + 9) > sec->size)
940 return false;
941
942 /* %eax can't be used as the GOT base register since it is
943 used to pass parameter to ___tls_get_addr. */
944 reg = val & 7;
945 if ((val & 0xf8) != 0x80 || reg == 4 || reg == 0)
946 return false;
947
948 indirect_call = call[0] == 0xff;
949 if (!(reg == 3 && call[0] == 0xe8)
950 && !(call[0] == 0x67 && call[1] == 0xe8)
951 && !(indirect_call
952 && (call[1] & 0xf8) == 0x90
953 && (call[1] & 0x7) == reg))
954 return false;
955 }
956
957 r_symndx = ELF32_R_SYM (rel[1].r_info);
958 if (r_symndx < symtab_hdr->sh_info)
959 return false;
960
961 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
962 if (h == NULL
963 || !((struct elf_x86_link_hash_entry *) h)->tls_get_addr)
964 return false;
965 else if (indirect_call)
966 return (ELF32_R_TYPE (rel[1].r_info) == R_386_GOT32X);
967 else
968 return (ELF32_R_TYPE (rel[1].r_info) == R_386_PC32
969 || ELF32_R_TYPE (rel[1].r_info) == R_386_PLT32);
970
971 case R_386_TLS_IE:
972 /* Check transition from IE access model:
973 movl foo@indntpoff(%rip), %eax
974 movl foo@indntpoff(%rip), %reg
975 addl foo@indntpoff(%rip), %reg
976 */
977
978 if (offset < 1 || (offset + 4) > sec->size)
979 return false;
980
981 /* Check "movl foo@tpoff(%rip), %eax" first. */
982 val = bfd_get_8 (abfd, contents + offset - 1);
983 if (val == 0xa1)
984 return true;
985
986 if (offset < 2)
987 return false;
988
989 /* Check movl|addl foo@tpoff(%rip), %reg. */
990 type = bfd_get_8 (abfd, contents + offset - 2);
991 return ((type == 0x8b || type == 0x03)
992 && (val & 0xc7) == 0x05);
993
994 case R_386_TLS_GOTIE:
995 case R_386_TLS_IE_32:
996 /* Check transition from {IE_32,GOTIE} access model:
997 subl foo@{tpoff,gontoff}(%reg1), %reg2
998 movl foo@{tpoff,gontoff}(%reg1), %reg2
999 addl foo@{tpoff,gontoff}(%reg1), %reg2
1000 */
1001
1002 if (offset < 2 || (offset + 4) > sec->size)
1003 return false;
1004
1005 val = bfd_get_8 (abfd, contents + offset - 1);
1006 if ((val & 0xc0) != 0x80 || (val & 7) == 4)
1007 return false;
1008
1009 type = bfd_get_8 (abfd, contents + offset - 2);
1010 return type == 0x8b || type == 0x2b || type == 0x03;
1011
1012 case R_386_TLS_GOTDESC:
1013 /* Check transition from GDesc access model:
1014 leal x@tlsdesc(%ebx), %eax
1015
1016 Make sure it's a leal adding ebx to a 32-bit offset
1017 into any register, although it's probably almost always
1018 going to be eax. */
1019
1020 if (offset < 2 || (offset + 4) > sec->size)
1021 return false;
1022
1023 if (bfd_get_8 (abfd, contents + offset - 2) != 0x8d)
1024 return false;
1025
1026 val = bfd_get_8 (abfd, contents + offset - 1);
1027 return (val & 0xc7) == 0x83;
1028
1029 case R_386_TLS_DESC_CALL:
1030 /* Check transition from GDesc access model:
1031 call *x@tlsdesc(%eax)
1032 */
1033 if (offset + 2 <= sec->size)
1034 {
1035 /* Make sure that it's a call *x@tlsdesc(%eax). */
1036 call = contents + offset;
1037 return call[0] == 0xff && call[1] == 0x10;
1038 }
1039
1040 return false;
1041
1042 default:
1043 abort ();
1044 }
1045 }
1046
1047 /* Return TRUE if the TLS access transition is OK or no transition
1048 will be performed. Update R_TYPE if there is a transition. */
1049
1050 static bool
1051 elf_i386_tls_transition (struct bfd_link_info *info, bfd *abfd,
1052 asection *sec, bfd_byte *contents,
1053 Elf_Internal_Shdr *symtab_hdr,
1054 struct elf_link_hash_entry **sym_hashes,
1055 unsigned int *r_type, int tls_type,
1056 const Elf_Internal_Rela *rel,
1057 const Elf_Internal_Rela *relend,
1058 struct elf_link_hash_entry *h,
1059 unsigned long r_symndx,
1060 bool from_relocate_section)
1061 {
1062 unsigned int from_type = *r_type;
1063 unsigned int to_type = from_type;
1064 bool check = true;
1065
1066 /* Skip TLS transition for functions. */
1067 if (h != NULL
1068 && (h->type == STT_FUNC
1069 || h->type == STT_GNU_IFUNC))
1070 return true;
1071
1072 switch (from_type)
1073 {
1074 case R_386_TLS_GD:
1075 case R_386_TLS_GOTDESC:
1076 case R_386_TLS_DESC_CALL:
1077 case R_386_TLS_IE_32:
1078 case R_386_TLS_IE:
1079 case R_386_TLS_GOTIE:
1080 if (bfd_link_executable (info))
1081 {
1082 if (h == NULL)
1083 to_type = R_386_TLS_LE_32;
1084 else if (from_type != R_386_TLS_IE
1085 && from_type != R_386_TLS_GOTIE)
1086 to_type = R_386_TLS_IE_32;
1087 }
1088
1089 /* When we are called from elf_i386_relocate_section, there may
1090 be additional transitions based on TLS_TYPE. */
1091 if (from_relocate_section)
1092 {
1093 unsigned int new_to_type = to_type;
1094
1095 if (TLS_TRANSITION_IE_TO_LE_P (info, h, tls_type))
1096 new_to_type = R_386_TLS_LE_32;
1097
1098 if (to_type == R_386_TLS_GD
1099 || to_type == R_386_TLS_GOTDESC
1100 || to_type == R_386_TLS_DESC_CALL)
1101 {
1102 if (tls_type == GOT_TLS_IE_POS)
1103 new_to_type = R_386_TLS_GOTIE;
1104 else if (tls_type & GOT_TLS_IE)
1105 new_to_type = R_386_TLS_IE_32;
1106 }
1107
1108 /* We checked the transition before when we were called from
1109 elf_i386_scan_relocs. We only want to check the new
1110 transition which hasn't been checked before. */
1111 check = new_to_type != to_type && from_type == to_type;
1112 to_type = new_to_type;
1113 }
1114
1115 break;
1116
1117 case R_386_TLS_LDM:
1118 if (bfd_link_executable (info))
1119 to_type = R_386_TLS_LE_32;
1120 break;
1121
1122 default:
1123 return true;
1124 }
1125
1126 /* Return TRUE if there is no transition. */
1127 if (from_type == to_type)
1128 return true;
1129
1130 /* Check if the transition can be performed. */
1131 if (check
1132 && ! elf_i386_check_tls_transition (sec, contents,
1133 symtab_hdr, sym_hashes,
1134 from_type, rel, relend))
1135 {
1136 reloc_howto_type *from, *to;
1137 const char *name;
1138
1139 from = elf_i386_rtype_to_howto (from_type);
1140 to = elf_i386_rtype_to_howto (to_type);
1141
1142 if (h)
1143 name = h->root.root.string;
1144 else
1145 {
1146 struct elf_x86_link_hash_table *htab;
1147
1148 htab = elf_x86_hash_table (info, I386_ELF_DATA);
1149 if (htab == NULL)
1150 name = "*unknown*";
1151 else
1152 {
1153 Elf_Internal_Sym *isym;
1154
1155 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1156 abfd, r_symndx);
1157 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
1158 }
1159 }
1160
1161 _bfd_error_handler
1162 /* xgettext:c-format */
1163 (_("%pB: TLS transition from %s to %s against `%s'"
1164 " at %#" PRIx64 " in section `%pA' failed"),
1165 abfd, from->name, to->name, name,
1166 (uint64_t) rel->r_offset, sec);
1167 bfd_set_error (bfd_error_bad_value);
1168 return false;
1169 }
1170
1171 *r_type = to_type;
1172 return true;
1173 }
1174
1175 /* With the local symbol, foo, we convert
1176 mov foo@GOT[(%reg1)], %reg2
1177 to
1178 lea foo[@GOTOFF(%reg1)], %reg2
1179 and convert
1180 call/jmp *foo@GOT[(%reg)]
1181 to
1182 nop call foo/jmp foo nop
1183 When PIC is false, convert
1184 test %reg1, foo@GOT[(%reg2)]
1185 to
1186 test $foo, %reg1
1187 and convert
1188 binop foo@GOT[(%reg1)], %reg2
1189 to
1190 binop $foo, %reg2
1191 where binop is one of adc, add, and, cmp, or, sbb, sub, xor
1192 instructions. */
1193
1194 static
1195 bool
1196 elf_i386_convert_load_reloc (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
1197 bfd_byte *contents,
1198 unsigned int *r_type_p,
1199 Elf_Internal_Rela *irel,
1200 struct elf_link_hash_entry *h,
1201 bool *converted,
1202 struct bfd_link_info *link_info)
1203 {
1204 struct elf_x86_link_hash_table *htab;
1205 unsigned int opcode;
1206 unsigned int modrm;
1207 bool baseless;
1208 Elf_Internal_Sym *isym;
1209 unsigned int addend;
1210 unsigned int nop;
1211 bfd_vma nop_offset;
1212 bool is_pic;
1213 bool to_reloc_32;
1214 bool abs_symbol;
1215 unsigned int r_type;
1216 unsigned int r_symndx;
1217 bfd_vma roff = irel->r_offset;
1218 bool local_ref;
1219 struct elf_x86_link_hash_entry *eh;
1220
1221 if (roff < 2)
1222 return true;
1223
1224 /* Addend for R_386_GOT32X relocations must be 0. */
1225 addend = bfd_get_32 (abfd, contents + roff);
1226 if (addend != 0)
1227 return true;
1228
1229 htab = elf_x86_hash_table (link_info, I386_ELF_DATA);
1230 is_pic = bfd_link_pic (link_info);
1231
1232 r_type = *r_type_p;
1233 r_symndx = ELF32_R_SYM (irel->r_info);
1234
1235 modrm = bfd_get_8 (abfd, contents + roff - 1);
1236 baseless = (modrm & 0xc7) == 0x5;
1237
1238 if (h)
1239 {
1240 /* NB: Also set linker_def via SYMBOL_REFERENCES_LOCAL_P. */
1241 local_ref = SYMBOL_REFERENCES_LOCAL_P (link_info, h);
1242 isym = NULL;
1243 abs_symbol = ABS_SYMBOL_P (h);
1244 }
1245 else
1246 {
1247 local_ref = true;
1248 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache, abfd,
1249 r_symndx);
1250 abs_symbol = isym->st_shndx == SHN_ABS;
1251 }
1252
1253 if (baseless && is_pic)
1254 {
1255 /* For PIC, disallow R_386_GOT32X without a base register
1256 since we don't know what the GOT base is. */
1257 const char *name;
1258
1259 if (h == NULL)
1260 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
1261 else
1262 name = h->root.root.string;
1263
1264 _bfd_error_handler
1265 /* xgettext:c-format */
1266 (_("%pB: direct GOT relocation R_386_GOT32X against `%s' without base"
1267 " register can not be used when making a shared object"),
1268 abfd, name);
1269 return false;
1270 }
1271
1272 opcode = bfd_get_8 (abfd, contents + roff - 2);
1273
1274 /* Convert to R_386_32 if PIC is false or there is no base
1275 register. */
1276 to_reloc_32 = !is_pic || baseless;
1277
1278 eh = elf_x86_hash_entry (h);
1279
1280 /* Try to convert R_386_GOT32X. Get the symbol referred to by the
1281 reloc. */
1282 if (h == NULL)
1283 {
1284 if (opcode == 0x0ff)
1285 /* Convert "call/jmp *foo@GOT[(%reg)]". */
1286 goto convert_branch;
1287 else
1288 /* Convert "mov foo@GOT[(%reg1)], %reg2",
1289 "test %reg1, foo@GOT(%reg2)" and
1290 "binop foo@GOT[(%reg1)], %reg2". */
1291 goto convert_load;
1292 }
1293
1294 /* Undefined weak symbol is only bound locally in executable
1295 and its reference is resolved as 0. */
1296 if (h->root.type == bfd_link_hash_undefweak
1297 && !eh->linker_def
1298 && local_ref)
1299 {
1300 if (opcode == 0xff)
1301 {
1302 /* No direct branch to 0 for PIC. */
1303 if (is_pic)
1304 return true;
1305 else
1306 goto convert_branch;
1307 }
1308 else
1309 {
1310 /* We can convert load of address 0 to R_386_32. */
1311 to_reloc_32 = true;
1312 goto convert_load;
1313 }
1314 }
1315
1316 if (opcode == 0xff)
1317 {
1318 /* We have "call/jmp *foo@GOT[(%reg)]". */
1319 if ((h->root.type == bfd_link_hash_defined
1320 || h->root.type == bfd_link_hash_defweak)
1321 && local_ref)
1322 {
1323 /* The function is locally defined. */
1324 convert_branch:
1325 /* Convert R_386_GOT32X to R_386_PC32. */
1326 if (modrm == 0x15 || (modrm & 0xf8) == 0x90)
1327 {
1328 /* Convert to "nop call foo". ADDR_PREFIX_OPCODE
1329 is a nop prefix. */
1330 modrm = 0xe8;
1331 /* To support TLS optimization, always use addr32 prefix
1332 for "call *___tls_get_addr@GOT(%reg)". */
1333 if (eh && eh->tls_get_addr)
1334 {
1335 nop = 0x67;
1336 nop_offset = irel->r_offset - 2;
1337 }
1338 else
1339 {
1340 nop = htab->params->call_nop_byte;
1341 if (htab->params->call_nop_as_suffix)
1342 {
1343 nop_offset = roff + 3;
1344 irel->r_offset -= 1;
1345 }
1346 else
1347 nop_offset = roff - 2;
1348 }
1349 }
1350 else
1351 {
1352 /* Convert to "jmp foo nop". */
1353 modrm = 0xe9;
1354 nop = NOP_OPCODE;
1355 nop_offset = roff + 3;
1356 irel->r_offset -= 1;
1357 }
1358
1359 bfd_put_8 (abfd, nop, contents + nop_offset);
1360 bfd_put_8 (abfd, modrm, contents + irel->r_offset - 1);
1361 /* When converting to PC-relative relocation, we
1362 need to adjust addend by -4. */
1363 bfd_put_32 (abfd, -4, contents + irel->r_offset);
1364 irel->r_info = ELF32_R_INFO (r_symndx, R_386_PC32);
1365 *r_type_p = R_386_PC32;
1366 *converted = true;
1367 }
1368 }
1369 else
1370 {
1371 /* We have "mov foo@GOT[(%re1g)], %reg2",
1372 "test %reg1, foo@GOT(%reg2)" and
1373 "binop foo@GOT[(%reg1)], %reg2".
1374
1375 Avoid optimizing _DYNAMIC since ld.so may use its
1376 link-time address. */
1377 if (h == htab->elf.hdynamic)
1378 return true;
1379
1380 /* def_regular is set by an assignment in a linker script in
1381 bfd_elf_record_link_assignment. start_stop is set on
1382 __start_SECNAME/__stop_SECNAME which mark section SECNAME. */
1383 if (h->start_stop
1384 || eh->linker_def
1385 || ((h->def_regular
1386 || h->root.type == bfd_link_hash_defined
1387 || h->root.type == bfd_link_hash_defweak)
1388 && local_ref))
1389 {
1390 convert_load:
1391 if (opcode == 0x8b)
1392 {
1393 if (abs_symbol && local_ref)
1394 to_reloc_32 = true;
1395
1396 if (to_reloc_32)
1397 {
1398 /* Convert "mov foo@GOT[(%reg1)], %reg2" to
1399 "mov $foo, %reg2" with R_386_32. */
1400 r_type = R_386_32;
1401 modrm = 0xc0 | (modrm & 0x38) >> 3;
1402 bfd_put_8 (abfd, modrm, contents + roff - 1);
1403 opcode = 0xc7;
1404 }
1405 else
1406 {
1407 /* Convert "mov foo@GOT(%reg1), %reg2" to
1408 "lea foo@GOTOFF(%reg1), %reg2". */
1409 r_type = R_386_GOTOFF;
1410 opcode = 0x8d;
1411 }
1412 }
1413 else
1414 {
1415 /* Only R_386_32 is supported. */
1416 if (!to_reloc_32)
1417 return true;
1418
1419 if (opcode == 0x85)
1420 {
1421 /* Convert "test %reg1, foo@GOT(%reg2)" to
1422 "test $foo, %reg1". */
1423 modrm = 0xc0 | (modrm & 0x38) >> 3;
1424 opcode = 0xf7;
1425 }
1426 else
1427 {
1428 /* Convert "binop foo@GOT(%reg1), %reg2" to
1429 "binop $foo, %reg2". */
1430 modrm = (0xc0
1431 | (modrm & 0x38) >> 3
1432 | (opcode & 0x3c));
1433 opcode = 0x81;
1434 }
1435 bfd_put_8 (abfd, modrm, contents + roff - 1);
1436 r_type = R_386_32;
1437 }
1438
1439 bfd_put_8 (abfd, opcode, contents + roff - 2);
1440 irel->r_info = ELF32_R_INFO (r_symndx, r_type);
1441 *r_type_p = r_type;
1442 *converted = true;
1443 }
1444 }
1445
1446 return true;
1447 }
1448
1449 /* Look through the relocs for a section during the first phase, and
1450 calculate needed space in the global offset table, and procedure
1451 linkage table. */
1452
1453 static bool
1454 elf_i386_scan_relocs (bfd *abfd,
1455 struct bfd_link_info *info,
1456 asection *sec,
1457 const Elf_Internal_Rela *relocs)
1458 {
1459 struct elf_x86_link_hash_table *htab;
1460 Elf_Internal_Shdr *symtab_hdr;
1461 struct elf_link_hash_entry **sym_hashes;
1462 const Elf_Internal_Rela *rel;
1463 const Elf_Internal_Rela *rel_end;
1464 bfd_byte *contents;
1465 bool converted;
1466
1467 if (bfd_link_relocatable (info))
1468 return true;
1469
1470 htab = elf_x86_hash_table (info, I386_ELF_DATA);
1471 if (htab == NULL)
1472 {
1473 sec->check_relocs_failed = 1;
1474 return false;
1475 }
1476
1477 BFD_ASSERT (is_x86_elf (abfd, htab));
1478
1479 /* Get the section contents. */
1480 if (elf_section_data (sec)->this_hdr.contents != NULL)
1481 contents = elf_section_data (sec)->this_hdr.contents;
1482 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
1483 {
1484 sec->check_relocs_failed = 1;
1485 return false;
1486 }
1487
1488 symtab_hdr = &elf_symtab_hdr (abfd);
1489 sym_hashes = elf_sym_hashes (abfd);
1490
1491 converted = false;
1492
1493 rel_end = relocs + sec->reloc_count;
1494 for (rel = relocs; rel < rel_end; rel++)
1495 {
1496 unsigned int r_type;
1497 unsigned int r_symndx;
1498 struct elf_link_hash_entry *h;
1499 struct elf_x86_link_hash_entry *eh;
1500 Elf_Internal_Sym *isym;
1501 const char *name;
1502 bool size_reloc;
1503 bool no_dynreloc;
1504
1505 r_symndx = ELF32_R_SYM (rel->r_info);
1506 r_type = ELF32_R_TYPE (rel->r_info);
1507
1508 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
1509 {
1510 /* xgettext:c-format */
1511 _bfd_error_handler (_("%pB: bad symbol index: %d"),
1512 abfd, r_symndx);
1513 goto error_return;
1514 }
1515
1516 if (r_symndx < symtab_hdr->sh_info)
1517 {
1518 /* A local symbol. */
1519 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1520 abfd, r_symndx);
1521 if (isym == NULL)
1522 goto error_return;
1523
1524 /* Check relocation against local STT_GNU_IFUNC symbol. */
1525 if (ELF32_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1526 {
1527 h = _bfd_elf_x86_get_local_sym_hash (htab, abfd, rel, true);
1528 if (h == NULL)
1529 goto error_return;
1530
1531 /* Fake a STT_GNU_IFUNC symbol. */
1532 h->root.root.string = bfd_elf_sym_name (abfd, symtab_hdr,
1533 isym, NULL);
1534 h->type = STT_GNU_IFUNC;
1535 h->def_regular = 1;
1536 h->ref_regular = 1;
1537 h->forced_local = 1;
1538 h->root.type = bfd_link_hash_defined;
1539 }
1540 else
1541 h = NULL;
1542 }
1543 else
1544 {
1545 isym = NULL;
1546 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1547 while (h->root.type == bfd_link_hash_indirect
1548 || h->root.type == bfd_link_hash_warning)
1549 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1550 }
1551
1552 eh = (struct elf_x86_link_hash_entry *) h;
1553 if (h != NULL)
1554 {
1555 if (r_type == R_386_GOTOFF)
1556 eh->gotoff_ref = 1;
1557
1558 /* It is referenced by a non-shared object. */
1559 h->ref_regular = 1;
1560 }
1561
1562 if (r_type == R_386_GOT32X
1563 && (h == NULL || h->type != STT_GNU_IFUNC))
1564 {
1565 Elf_Internal_Rela *irel = (Elf_Internal_Rela *) rel;
1566 if (!elf_i386_convert_load_reloc (abfd, symtab_hdr, contents,
1567 &r_type, irel, h,
1568 &converted, info))
1569 goto error_return;
1570 }
1571
1572 if (!_bfd_elf_x86_valid_reloc_p (sec, info, htab, rel, h, isym,
1573 symtab_hdr, &no_dynreloc))
1574 return false;
1575
1576 if (! elf_i386_tls_transition (info, abfd, sec, contents,
1577 symtab_hdr, sym_hashes,
1578 &r_type, GOT_UNKNOWN,
1579 rel, rel_end, h, r_symndx, false))
1580 goto error_return;
1581
1582 /* Check if _GLOBAL_OFFSET_TABLE_ is referenced. */
1583 if (h == htab->elf.hgot)
1584 htab->got_referenced = true;
1585
1586 switch (r_type)
1587 {
1588 case R_386_TLS_LDM:
1589 htab->tls_ld_or_ldm_got.refcount = 1;
1590 goto create_got;
1591
1592 case R_386_PLT32:
1593 /* This symbol requires a procedure linkage table entry. We
1594 actually build the entry in adjust_dynamic_symbol,
1595 because this might be a case of linking PIC code which is
1596 never referenced by a dynamic object, in which case we
1597 don't need to generate a procedure linkage table entry
1598 after all. */
1599
1600 /* If this is a local symbol, we resolve it directly without
1601 creating a procedure linkage table entry. */
1602 if (h == NULL)
1603 continue;
1604
1605 eh->zero_undefweak &= 0x2;
1606 h->needs_plt = 1;
1607 h->plt.refcount = 1;
1608 break;
1609
1610 case R_386_SIZE32:
1611 size_reloc = true;
1612 goto do_size;
1613
1614 case R_386_TLS_IE_32:
1615 case R_386_TLS_IE:
1616 case R_386_TLS_GOTIE:
1617 if (!bfd_link_executable (info))
1618 info->flags |= DF_STATIC_TLS;
1619 /* Fall through */
1620
1621 case R_386_GOT32:
1622 case R_386_GOT32X:
1623 case R_386_TLS_GD:
1624 case R_386_TLS_GOTDESC:
1625 case R_386_TLS_DESC_CALL:
1626 /* This symbol requires a global offset table entry. */
1627 {
1628 int tls_type, old_tls_type;
1629
1630 switch (r_type)
1631 {
1632 default:
1633 case R_386_GOT32:
1634 case R_386_GOT32X:
1635 tls_type = GOT_NORMAL;
1636 break;
1637 case R_386_TLS_GD: tls_type = GOT_TLS_GD; break;
1638 case R_386_TLS_GOTDESC:
1639 case R_386_TLS_DESC_CALL:
1640 tls_type = GOT_TLS_GDESC; break;
1641 case R_386_TLS_IE_32:
1642 if (ELF32_R_TYPE (rel->r_info) == r_type)
1643 tls_type = GOT_TLS_IE_NEG;
1644 else
1645 /* If this is a GD->IE transition, we may use either of
1646 R_386_TLS_TPOFF and R_386_TLS_TPOFF32. */
1647 tls_type = GOT_TLS_IE;
1648 break;
1649 case R_386_TLS_IE:
1650 case R_386_TLS_GOTIE:
1651 tls_type = GOT_TLS_IE_POS; break;
1652 }
1653
1654 if (h != NULL)
1655 {
1656 h->got.refcount = 1;
1657 old_tls_type = elf_x86_hash_entry (h)->tls_type;
1658 }
1659 else
1660 {
1661 bfd_signed_vma *local_got_refcounts;
1662
1663 if (!elf_x86_allocate_local_got_info (abfd,
1664 symtab_hdr->sh_info))
1665 goto error_return;
1666
1667 /* This is a global offset table entry for a local symbol. */
1668 local_got_refcounts = elf_local_got_refcounts (abfd);
1669 local_got_refcounts[r_symndx] = 1;
1670 old_tls_type = elf_x86_local_got_tls_type (abfd) [r_symndx];
1671 }
1672
1673 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_IE))
1674 tls_type |= old_tls_type;
1675 /* If a TLS symbol is accessed using IE at least once,
1676 there is no point to use dynamic model for it. */
1677 else if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
1678 && (! GOT_TLS_GD_ANY_P (old_tls_type)
1679 || (tls_type & GOT_TLS_IE) == 0))
1680 {
1681 if ((old_tls_type & GOT_TLS_IE) && GOT_TLS_GD_ANY_P (tls_type))
1682 tls_type = old_tls_type;
1683 else if (GOT_TLS_GD_ANY_P (old_tls_type)
1684 && GOT_TLS_GD_ANY_P (tls_type))
1685 tls_type |= old_tls_type;
1686 else
1687 {
1688 if (h)
1689 name = h->root.root.string;
1690 else
1691 name = bfd_elf_sym_name (abfd, symtab_hdr, isym,
1692 NULL);
1693 _bfd_error_handler
1694 /* xgettext:c-format */
1695 (_("%pB: `%s' accessed both as normal and "
1696 "thread local symbol"),
1697 abfd, name);
1698 bfd_set_error (bfd_error_bad_value);
1699 goto error_return;
1700 }
1701 }
1702
1703 if (old_tls_type != tls_type)
1704 {
1705 if (h != NULL)
1706 elf_x86_hash_entry (h)->tls_type = tls_type;
1707 else
1708 elf_x86_local_got_tls_type (abfd) [r_symndx] = tls_type;
1709 }
1710 }
1711 /* Fall through */
1712
1713 case R_386_GOTOFF:
1714 case R_386_GOTPC:
1715 create_got:
1716 if (r_type != R_386_TLS_IE)
1717 {
1718 if (eh != NULL)
1719 {
1720 eh->zero_undefweak &= 0x2;
1721
1722 /* Need GOT to resolve undefined weak symbol to 0. */
1723 if (r_type == R_386_GOTOFF
1724 && h->root.type == bfd_link_hash_undefweak
1725 && bfd_link_executable (info))
1726 htab->got_referenced = true;
1727 }
1728 break;
1729 }
1730 /* Fall through */
1731
1732 case R_386_TLS_LE_32:
1733 case R_386_TLS_LE:
1734 if (eh != NULL)
1735 eh->zero_undefweak &= 0x2;
1736 if (bfd_link_executable (info))
1737 break;
1738 info->flags |= DF_STATIC_TLS;
1739 goto do_relocation;
1740
1741 case R_386_32:
1742 case R_386_PC32:
1743 if (eh != NULL && (sec->flags & SEC_CODE) != 0)
1744 eh->zero_undefweak |= 0x2;
1745 do_relocation:
1746 /* We are called after all symbols have been resolved. Only
1747 relocation against STT_GNU_IFUNC symbol must go through
1748 PLT. */
1749 if (h != NULL
1750 && (bfd_link_executable (info)
1751 || h->type == STT_GNU_IFUNC))
1752 {
1753 bool func_pointer_ref = false;
1754
1755 if (r_type == R_386_PC32)
1756 {
1757 /* Since something like ".long foo - ." may be used
1758 as pointer, make sure that PLT is used if foo is
1759 a function defined in a shared library. */
1760 if ((sec->flags & SEC_CODE) == 0)
1761 h->pointer_equality_needed = 1;
1762 else if (h->type == STT_GNU_IFUNC
1763 && bfd_link_pic (info))
1764 {
1765 _bfd_error_handler
1766 /* xgettext:c-format */
1767 (_("%pB: unsupported non-PIC call to IFUNC `%s'"),
1768 abfd, h->root.root.string);
1769 bfd_set_error (bfd_error_bad_value);
1770 goto error_return;
1771 }
1772 }
1773 else
1774 {
1775 /* R_386_32 can be resolved at run-time. Function
1776 pointer reference doesn't need PLT for pointer
1777 equality. */
1778 if (r_type == R_386_32
1779 && (sec->flags & SEC_READONLY) == 0)
1780 func_pointer_ref = true;
1781
1782 /* IFUNC symbol needs pointer equality in PDE so that
1783 function pointer reference will be resolved to its
1784 PLT entry directly. */
1785 if (!func_pointer_ref
1786 || (bfd_link_pde (info)
1787 && h->type == STT_GNU_IFUNC))
1788 h->pointer_equality_needed = 1;
1789 }
1790
1791 if (!func_pointer_ref)
1792 {
1793 /* If this reloc is in a read-only section, we might
1794 need a copy reloc. We can't check reliably at this
1795 stage whether the section is read-only, as input
1796 sections have not yet been mapped to output sections.
1797 Tentatively set the flag for now, and correct in
1798 adjust_dynamic_symbol. */
1799 h->non_got_ref = 1;
1800
1801 if (!elf_has_indirect_extern_access (sec->owner))
1802 eh->non_got_ref_without_indirect_extern_access = 1;
1803
1804 /* We may need a .plt entry if the symbol is a function
1805 defined in a shared lib or is a function referenced
1806 from the code or read-only section. */
1807 if (!h->def_regular
1808 || (sec->flags & (SEC_CODE | SEC_READONLY)) != 0)
1809 h->plt.refcount = 1;
1810
1811 if (h->pointer_equality_needed
1812 && h->type == STT_FUNC
1813 && eh->def_protected
1814 && !SYMBOL_DEFINED_NON_SHARED_P (h)
1815 && h->def_dynamic)
1816 {
1817 /* Disallow non-canonical reference to canonical
1818 protected function. */
1819 _bfd_error_handler
1820 /* xgettext:c-format */
1821 (_("%pB: non-canonical reference to canonical "
1822 "protected function `%s' in %pB"),
1823 abfd, h->root.root.string,
1824 h->root.u.def.section->owner);
1825 bfd_set_error (bfd_error_bad_value);
1826 goto error_return;
1827 }
1828 }
1829 }
1830
1831 size_reloc = false;
1832 do_size:
1833 if (!no_dynreloc
1834 && NEED_DYNAMIC_RELOCATION_P (false, info, false, h, sec,
1835 r_type, R_386_32))
1836 {
1837 struct elf_dyn_relocs *p;
1838 struct elf_dyn_relocs **head;
1839
1840 /* If this is a global symbol, we count the number of
1841 relocations we need for this symbol. */
1842 if (h != NULL)
1843 {
1844 head = &h->dyn_relocs;
1845 }
1846 else
1847 {
1848 /* Track dynamic relocs needed for local syms too.
1849 We really need local syms available to do this
1850 easily. Oh well. */
1851 void **vpp;
1852 asection *s;
1853
1854 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1855 abfd, r_symndx);
1856 if (isym == NULL)
1857 goto error_return;
1858
1859 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1860 if (s == NULL)
1861 s = sec;
1862
1863 vpp = &elf_section_data (s)->local_dynrel;
1864 head = (struct elf_dyn_relocs **)vpp;
1865 }
1866
1867 p = *head;
1868 if (p == NULL || p->sec != sec)
1869 {
1870 size_t amt = sizeof *p;
1871 p = (struct elf_dyn_relocs *) bfd_alloc (htab->elf.dynobj,
1872 amt);
1873 if (p == NULL)
1874 goto error_return;
1875 p->next = *head;
1876 *head = p;
1877 p->sec = sec;
1878 p->count = 0;
1879 p->pc_count = 0;
1880 }
1881
1882 p->count += 1;
1883 /* Count size relocation as PC-relative relocation. */
1884 if (r_type == R_386_PC32 || size_reloc)
1885 p->pc_count += 1;
1886 }
1887 break;
1888
1889 /* This relocation describes the C++ object vtable hierarchy.
1890 Reconstruct it for later use during GC. */
1891 case R_386_GNU_VTINHERIT:
1892 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1893 goto error_return;
1894 break;
1895
1896 /* This relocation describes which C++ vtable entries are actually
1897 used. Record for later use during GC. */
1898 case R_386_GNU_VTENTRY:
1899 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_offset))
1900 goto error_return;
1901 break;
1902
1903 default:
1904 break;
1905 }
1906 }
1907
1908 if (elf_section_data (sec)->this_hdr.contents != contents)
1909 {
1910 if (!converted && !_bfd_link_keep_memory (info))
1911 free (contents);
1912 else
1913 {
1914 /* Cache the section contents for elf_link_input_bfd if any
1915 load is converted or --no-keep-memory isn't used. */
1916 elf_section_data (sec)->this_hdr.contents = contents;
1917 info->cache_size += sec->size;
1918 }
1919 }
1920
1921 /* Cache relocations if any load is converted. */
1922 if (elf_section_data (sec)->relocs != relocs && converted)
1923 elf_section_data (sec)->relocs = (Elf_Internal_Rela *) relocs;
1924
1925 return true;
1926
1927 error_return:
1928 if (elf_section_data (sec)->this_hdr.contents != contents)
1929 free (contents);
1930 sec->check_relocs_failed = 1;
1931 return false;
1932 }
1933
1934 static bool
1935 elf_i386_always_size_sections (bfd *output_bfd,
1936 struct bfd_link_info *info)
1937 {
1938 bfd *abfd;
1939
1940 /* Scan relocations after rel_from_abs has been set on __ehdr_start. */
1941 for (abfd = info->input_bfds;
1942 abfd != (bfd *) NULL;
1943 abfd = abfd->link.next)
1944 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1945 && !_bfd_elf_link_iterate_on_relocs (abfd, info,
1946 elf_i386_scan_relocs))
1947 return false;
1948
1949 return _bfd_x86_elf_always_size_sections (output_bfd, info);
1950 }
1951
1952 /* Set the correct type for an x86 ELF section. We do this by the
1953 section name, which is a hack, but ought to work. */
1954
1955 static bool
1956 elf_i386_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1957 Elf_Internal_Shdr *hdr,
1958 asection *sec)
1959 {
1960 const char *name;
1961
1962 name = bfd_section_name (sec);
1963
1964 /* This is an ugly, but unfortunately necessary hack that is
1965 needed when producing EFI binaries on x86. It tells
1966 elf.c:elf_fake_sections() not to consider ".reloc" as a section
1967 containing ELF relocation info. We need this hack in order to
1968 be able to generate ELF binaries that can be translated into
1969 EFI applications (which are essentially COFF objects). Those
1970 files contain a COFF ".reloc" section inside an ELFNN object,
1971 which would normally cause BFD to segfault because it would
1972 attempt to interpret this section as containing relocation
1973 entries for section "oc". With this hack enabled, ".reloc"
1974 will be treated as a normal data section, which will avoid the
1975 segfault. However, you won't be able to create an ELFNN binary
1976 with a section named "oc" that needs relocations, but that's
1977 the kind of ugly side-effects you get when detecting section
1978 types based on their names... In practice, this limitation is
1979 unlikely to bite. */
1980 if (strcmp (name, ".reloc") == 0)
1981 hdr->sh_type = SHT_PROGBITS;
1982
1983 return true;
1984 }
1985
1986 /* Return the relocation value for @tpoff relocation
1987 if STT_TLS virtual address is ADDRESS. */
1988
1989 static bfd_vma
1990 elf_i386_tpoff (struct bfd_link_info *info, bfd_vma address)
1991 {
1992 struct elf_link_hash_table *htab = elf_hash_table (info);
1993 const struct elf_backend_data *bed = get_elf_backend_data (info->output_bfd);
1994 bfd_vma static_tls_size;
1995
1996 /* If tls_sec is NULL, we should have signalled an error already. */
1997 if (htab->tls_sec == NULL)
1998 return 0;
1999
2000 /* Consider special static TLS alignment requirements. */
2001 static_tls_size = BFD_ALIGN (htab->tls_size, bed->static_tls_alignment);
2002 return static_tls_size + htab->tls_sec->vma - address;
2003 }
2004
2005 /* Relocate an i386 ELF section. */
2006
2007 static int
2008 elf_i386_relocate_section (bfd *output_bfd,
2009 struct bfd_link_info *info,
2010 bfd *input_bfd,
2011 asection *input_section,
2012 bfd_byte *contents,
2013 Elf_Internal_Rela *relocs,
2014 Elf_Internal_Sym *local_syms,
2015 asection **local_sections)
2016 {
2017 struct elf_x86_link_hash_table *htab;
2018 Elf_Internal_Shdr *symtab_hdr;
2019 struct elf_link_hash_entry **sym_hashes;
2020 bfd_vma *local_got_offsets;
2021 bfd_vma *local_tlsdesc_gotents;
2022 Elf_Internal_Rela *rel;
2023 Elf_Internal_Rela *wrel;
2024 Elf_Internal_Rela *relend;
2025 bool is_vxworks_tls;
2026 unsigned plt_entry_size;
2027
2028 /* Skip if check_relocs or scan_relocs failed. */
2029 if (input_section->check_relocs_failed)
2030 return false;
2031
2032 htab = elf_x86_hash_table (info, I386_ELF_DATA);
2033 if (htab == NULL)
2034 return false;
2035
2036 if (!is_x86_elf (input_bfd, htab))
2037 {
2038 bfd_set_error (bfd_error_wrong_format);
2039 return false;
2040 }
2041
2042 symtab_hdr = &elf_symtab_hdr (input_bfd);
2043 sym_hashes = elf_sym_hashes (input_bfd);
2044 local_got_offsets = elf_local_got_offsets (input_bfd);
2045 local_tlsdesc_gotents = elf_x86_local_tlsdesc_gotent (input_bfd);
2046 /* We have to handle relocations in vxworks .tls_vars sections
2047 specially, because the dynamic loader is 'weird'. */
2048 is_vxworks_tls = (htab->elf.target_os == is_vxworks
2049 && bfd_link_pic (info)
2050 && !strcmp (input_section->output_section->name,
2051 ".tls_vars"));
2052
2053 _bfd_x86_elf_set_tls_module_base (info);
2054
2055 plt_entry_size = htab->plt.plt_entry_size;
2056
2057 rel = wrel = relocs;
2058 relend = relocs + input_section->reloc_count;
2059 for (; rel < relend; wrel++, rel++)
2060 {
2061 unsigned int r_type, r_type_tls;
2062 reloc_howto_type *howto;
2063 unsigned long r_symndx;
2064 struct elf_link_hash_entry *h;
2065 struct elf_x86_link_hash_entry *eh;
2066 Elf_Internal_Sym *sym;
2067 asection *sec;
2068 bfd_vma off, offplt, plt_offset;
2069 bfd_vma relocation;
2070 bool unresolved_reloc;
2071 bfd_reloc_status_type r;
2072 unsigned int indx;
2073 int tls_type;
2074 bfd_vma st_size;
2075 asection *resolved_plt;
2076 bool resolved_to_zero;
2077 bool relative_reloc;
2078
2079 r_type = ELF32_R_TYPE (rel->r_info);
2080 if (r_type == R_386_GNU_VTINHERIT
2081 || r_type == R_386_GNU_VTENTRY)
2082 {
2083 if (wrel != rel)
2084 *wrel = *rel;
2085 continue;
2086 }
2087
2088 howto = elf_i386_rtype_to_howto (r_type);
2089 if (howto == NULL)
2090 return _bfd_unrecognized_reloc (input_bfd, input_section, r_type);
2091
2092 r_symndx = ELF32_R_SYM (rel->r_info);
2093 h = NULL;
2094 sym = NULL;
2095 sec = NULL;
2096 unresolved_reloc = false;
2097 if (r_symndx < symtab_hdr->sh_info)
2098 {
2099 sym = local_syms + r_symndx;
2100 sec = local_sections[r_symndx];
2101 relocation = (sec->output_section->vma
2102 + sec->output_offset
2103 + sym->st_value);
2104 st_size = sym->st_size;
2105
2106 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION
2107 && ((sec->flags & SEC_MERGE) != 0
2108 || (bfd_link_relocatable (info)
2109 && sec->output_offset != 0)))
2110 {
2111 bfd_vma addend;
2112 bfd_byte *where = contents + rel->r_offset;
2113
2114 switch (bfd_get_reloc_size (howto))
2115 {
2116 case 1:
2117 addend = bfd_get_8 (input_bfd, where);
2118 if (howto->pc_relative)
2119 {
2120 addend = (addend ^ 0x80) - 0x80;
2121 addend += 1;
2122 }
2123 break;
2124 case 2:
2125 addend = bfd_get_16 (input_bfd, where);
2126 if (howto->pc_relative)
2127 {
2128 addend = (addend ^ 0x8000) - 0x8000;
2129 addend += 2;
2130 }
2131 break;
2132 case 4:
2133 addend = bfd_get_32 (input_bfd, where);
2134 if (howto->pc_relative)
2135 {
2136 addend = (addend ^ 0x80000000) - 0x80000000;
2137 addend += 4;
2138 }
2139 break;
2140 default:
2141 abort ();
2142 }
2143
2144 if (bfd_link_relocatable (info))
2145 addend += sec->output_offset;
2146 else
2147 {
2148 asection *msec = sec;
2149 addend = _bfd_elf_rel_local_sym (output_bfd, sym, &msec,
2150 addend);
2151 addend -= relocation;
2152 addend += msec->output_section->vma + msec->output_offset;
2153 }
2154
2155 switch (bfd_get_reloc_size (howto))
2156 {
2157 case 1:
2158 /* FIXME: overflow checks. */
2159 if (howto->pc_relative)
2160 addend -= 1;
2161 bfd_put_8 (input_bfd, addend, where);
2162 break;
2163 case 2:
2164 if (howto->pc_relative)
2165 addend -= 2;
2166 bfd_put_16 (input_bfd, addend, where);
2167 break;
2168 case 4:
2169 if (howto->pc_relative)
2170 addend -= 4;
2171 bfd_put_32 (input_bfd, addend, where);
2172 break;
2173 }
2174 }
2175 else if (!bfd_link_relocatable (info)
2176 && ELF32_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2177 {
2178 /* Relocate against local STT_GNU_IFUNC symbol. */
2179 h = _bfd_elf_x86_get_local_sym_hash (htab, input_bfd, rel,
2180 false);
2181 if (h == NULL)
2182 abort ();
2183
2184 /* Set STT_GNU_IFUNC symbol value. */
2185 h->root.u.def.value = sym->st_value;
2186 h->root.u.def.section = sec;
2187 }
2188 }
2189 else
2190 {
2191 bool warned ATTRIBUTE_UNUSED;
2192 bool ignored ATTRIBUTE_UNUSED;
2193
2194 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2195 r_symndx, symtab_hdr, sym_hashes,
2196 h, sec, relocation,
2197 unresolved_reloc, warned, ignored);
2198 st_size = h->size;
2199 }
2200
2201 if (sec != NULL && discarded_section (sec))
2202 {
2203 _bfd_clear_contents (howto, input_bfd, input_section,
2204 contents, rel->r_offset);
2205 wrel->r_offset = rel->r_offset;
2206 wrel->r_info = 0;
2207 wrel->r_addend = 0;
2208
2209 /* For ld -r, remove relocations in debug sections against
2210 sections defined in discarded sections. Not done for
2211 eh_frame editing code expects to be present. */
2212 if (bfd_link_relocatable (info)
2213 && (input_section->flags & SEC_DEBUGGING))
2214 wrel--;
2215
2216 continue;
2217 }
2218
2219 if (bfd_link_relocatable (info))
2220 {
2221 if (wrel != rel)
2222 *wrel = *rel;
2223 continue;
2224 }
2225
2226 eh = (struct elf_x86_link_hash_entry *) h;
2227
2228 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle
2229 it here if it is defined in a non-shared object. */
2230 if (h != NULL
2231 && h->type == STT_GNU_IFUNC
2232 && h->def_regular)
2233 {
2234 asection *gotplt, *base_got;
2235 bfd_vma plt_index;
2236 const char *name;
2237
2238 if ((input_section->flags & SEC_ALLOC) == 0)
2239 {
2240 /* If this is a SHT_NOTE section without SHF_ALLOC, treat
2241 STT_GNU_IFUNC symbol as STT_FUNC. */
2242 if (elf_section_type (input_section) == SHT_NOTE)
2243 goto skip_ifunc;
2244 /* Dynamic relocs are not propagated for SEC_DEBUGGING
2245 sections because such sections are not SEC_ALLOC and
2246 thus ld.so will not process them. */
2247 if ((input_section->flags & SEC_DEBUGGING) != 0)
2248 continue;
2249 abort ();
2250 }
2251
2252 /* STT_GNU_IFUNC symbol must go through PLT. */
2253 if (htab->elf.splt != NULL)
2254 {
2255 if (htab->plt_second != NULL)
2256 {
2257 resolved_plt = htab->plt_second;
2258 plt_offset = eh->plt_second.offset;
2259 }
2260 else
2261 {
2262 resolved_plt = htab->elf.splt;
2263 plt_offset = h->plt.offset;
2264 }
2265 gotplt = htab->elf.sgotplt;
2266 }
2267 else
2268 {
2269 resolved_plt = htab->elf.iplt;
2270 plt_offset = h->plt.offset;
2271 gotplt = htab->elf.igotplt;
2272 }
2273
2274 switch (r_type)
2275 {
2276 default:
2277 break;
2278
2279 case R_386_GOT32:
2280 case R_386_GOT32X:
2281 base_got = htab->elf.sgot;
2282 off = h->got.offset;
2283
2284 if (base_got == NULL)
2285 abort ();
2286
2287 if (off == (bfd_vma) -1)
2288 {
2289 /* We can't use h->got.offset here to save state, or
2290 even just remember the offset, as finish_dynamic_symbol
2291 would use that as offset into .got. */
2292
2293 if (h->plt.offset == (bfd_vma) -1)
2294 abort ();
2295
2296 if (htab->elf.splt != NULL)
2297 {
2298 plt_index = (h->plt.offset / plt_entry_size
2299 - htab->plt.has_plt0);
2300 off = (plt_index + 3) * 4;
2301 base_got = htab->elf.sgotplt;
2302 }
2303 else
2304 {
2305 plt_index = h->plt.offset / plt_entry_size;
2306 off = plt_index * 4;
2307 base_got = htab->elf.igotplt;
2308 }
2309
2310 if (h->dynindx == -1
2311 || h->forced_local
2312 || info->symbolic)
2313 {
2314 /* This references the local defitionion. We must
2315 initialize this entry in the global offset table.
2316 Since the offset must always be a multiple of 4,
2317 we use the least significant bit to record
2318 whether we have initialized it already.
2319
2320 When doing a dynamic link, we create a .rela.got
2321 relocation entry to initialize the value. This
2322 is done in the finish_dynamic_symbol routine. */
2323 if ((off & 1) != 0)
2324 off &= ~1;
2325 else
2326 {
2327 bfd_put_32 (output_bfd, relocation,
2328 base_got->contents + off);
2329 h->got.offset |= 1;
2330 }
2331 }
2332
2333 relocation = off;
2334 }
2335 else
2336 relocation = (base_got->output_section->vma
2337 + base_got->output_offset + off
2338 - gotplt->output_section->vma
2339 - gotplt->output_offset);
2340
2341 if (rel->r_offset > 1
2342 && (*(contents + rel->r_offset - 1) & 0xc7) == 0x5
2343 && *(contents + rel->r_offset - 2) != 0x8d)
2344 {
2345 if (bfd_link_pic (info))
2346 goto disallow_got32;
2347
2348 /* Add the GOT base if there is no base register. */
2349 relocation += (gotplt->output_section->vma
2350 + gotplt->output_offset);
2351 }
2352 else if (htab->elf.splt == NULL)
2353 {
2354 /* Adjust for static executables. */
2355 relocation += gotplt->output_offset;
2356 }
2357
2358 goto do_relocation;
2359 }
2360
2361 if (h->plt.offset == (bfd_vma) -1)
2362 {
2363 /* Handle static pointers of STT_GNU_IFUNC symbols. */
2364 if (r_type == R_386_32
2365 && (input_section->flags & SEC_CODE) == 0)
2366 goto do_ifunc_pointer;
2367 goto bad_ifunc_reloc;
2368 }
2369
2370 relocation = (resolved_plt->output_section->vma
2371 + resolved_plt->output_offset + plt_offset);
2372
2373 switch (r_type)
2374 {
2375 default:
2376 bad_ifunc_reloc:
2377 if (h->root.root.string)
2378 name = h->root.root.string;
2379 else
2380 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2381 NULL);
2382 _bfd_error_handler
2383 /* xgettext:c-format */
2384 (_("%pB: relocation %s against STT_GNU_IFUNC "
2385 "symbol `%s' isn't supported"), input_bfd,
2386 howto->name, name);
2387 bfd_set_error (bfd_error_bad_value);
2388 return false;
2389
2390 case R_386_32:
2391 /* Generate dynamic relcoation only when there is a
2392 non-GOT reference in a shared object. */
2393 if ((bfd_link_pic (info) && h->non_got_ref)
2394 || h->plt.offset == (bfd_vma) -1)
2395 {
2396 Elf_Internal_Rela outrel;
2397 asection *sreloc;
2398 bfd_vma offset;
2399
2400 do_ifunc_pointer:
2401 /* Need a dynamic relocation to get the real function
2402 adddress. */
2403 offset = _bfd_elf_section_offset (output_bfd,
2404 info,
2405 input_section,
2406 rel->r_offset);
2407 if (offset == (bfd_vma) -1
2408 || offset == (bfd_vma) -2)
2409 abort ();
2410
2411 outrel.r_offset = (input_section->output_section->vma
2412 + input_section->output_offset
2413 + offset);
2414
2415 if (POINTER_LOCAL_IFUNC_P (info, h))
2416 {
2417 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
2418 h->root.root.string,
2419 h->root.u.def.section->owner);
2420
2421 /* This symbol is resolved locally. */
2422 outrel.r_info = ELF32_R_INFO (0, R_386_IRELATIVE);
2423
2424 if (htab->params->report_relative_reloc)
2425 _bfd_x86_elf_link_report_relative_reloc
2426 (info, input_section, h, sym,
2427 "R_386_IRELATIVE", &outrel);
2428
2429 bfd_put_32 (output_bfd,
2430 (h->root.u.def.value
2431 + h->root.u.def.section->output_section->vma
2432 + h->root.u.def.section->output_offset),
2433 contents + offset);
2434 }
2435 else
2436 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2437
2438 /* Dynamic relocations are stored in
2439 1. .rel.ifunc section in PIC object.
2440 2. .rel.got section in dynamic executable.
2441 3. .rel.iplt section in static executable. */
2442 if (bfd_link_pic (info))
2443 sreloc = htab->elf.irelifunc;
2444 else if (htab->elf.splt != NULL)
2445 sreloc = htab->elf.srelgot;
2446 else
2447 sreloc = htab->elf.irelplt;
2448 elf_append_rel (output_bfd, sreloc, &outrel);
2449
2450 /* If this reloc is against an external symbol, we
2451 do not want to fiddle with the addend. Otherwise,
2452 we need to include the symbol value so that it
2453 becomes an addend for the dynamic reloc. For an
2454 internal symbol, we have updated addend. */
2455 continue;
2456 }
2457 /* FALLTHROUGH */
2458 case R_386_PC32:
2459 case R_386_PLT32:
2460 goto do_relocation;
2461
2462 case R_386_GOTOFF:
2463 /* NB: We can't use the PLT entry as the function address
2464 for PIC since the PIC register may not be set up
2465 properly for indirect call. */
2466 if (bfd_link_pic (info))
2467 goto bad_ifunc_reloc;
2468 relocation -= (gotplt->output_section->vma
2469 + gotplt->output_offset);
2470 goto do_relocation;
2471 }
2472 }
2473
2474 skip_ifunc:
2475 resolved_to_zero = (eh != NULL
2476 && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh));
2477
2478 switch (r_type)
2479 {
2480 case R_386_GOT32X:
2481 case R_386_GOT32:
2482 /* Relocation is to the entry for this symbol in the global
2483 offset table. */
2484 if (htab->elf.sgot == NULL)
2485 abort ();
2486
2487 relative_reloc = false;
2488 if (h != NULL)
2489 {
2490 off = h->got.offset;
2491 if (RESOLVED_LOCALLY_P (info, h, htab))
2492 {
2493 /* We must initialize this entry in the global offset
2494 table. Since the offset must always be a multiple
2495 of 4, we use the least significant bit to record
2496 whether we have initialized it already.
2497
2498 When doing a dynamic link, we create a .rel.got
2499 relocation entry to initialize the value. This
2500 is done in the finish_dynamic_symbol routine. */
2501 if ((off & 1) != 0)
2502 off &= ~1;
2503 else
2504 {
2505 bfd_put_32 (output_bfd, relocation,
2506 htab->elf.sgot->contents + off);
2507 h->got.offset |= 1;
2508 /* NB: Don't generate relative relocation here if
2509 it has been generated by DT_RELR. */
2510 if (!info->enable_dt_relr
2511 && GENERATE_RELATIVE_RELOC_P (info, h))
2512 {
2513 /* PR ld/21402: If this symbol isn't dynamic
2514 in PIC, generate R_386_RELATIVE here. */
2515 eh->no_finish_dynamic_symbol = 1;
2516 relative_reloc = true;
2517 }
2518 }
2519 }
2520 else
2521 unresolved_reloc = false;
2522 }
2523 else
2524 {
2525 if (local_got_offsets == NULL)
2526 abort ();
2527
2528 off = local_got_offsets[r_symndx];
2529
2530 /* The offset must always be a multiple of 4. We use
2531 the least significant bit to record whether we have
2532 already generated the necessary reloc. */
2533 if ((off & 1) != 0)
2534 off &= ~1;
2535 else
2536 {
2537 bfd_put_32 (output_bfd, relocation,
2538 htab->elf.sgot->contents + off);
2539 local_got_offsets[r_symndx] |= 1;
2540
2541 /* NB: Don't generate relative relocation here if it
2542 has been generated by DT_RELR. */
2543 if (!info->enable_dt_relr && bfd_link_pic (info))
2544 relative_reloc = true;
2545 }
2546 }
2547
2548 if (relative_reloc)
2549 {
2550 asection *s;
2551 Elf_Internal_Rela outrel;
2552
2553 s = htab->elf.srelgot;
2554 if (s == NULL)
2555 abort ();
2556
2557 outrel.r_offset = (htab->elf.sgot->output_section->vma
2558 + htab->elf.sgot->output_offset
2559 + off);
2560 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
2561
2562 if (htab->params->report_relative_reloc)
2563 _bfd_x86_elf_link_report_relative_reloc
2564 (info, input_section, h, sym, "R_386_RELATIVE",
2565 &outrel);
2566
2567 elf_append_rel (output_bfd, s, &outrel);
2568 }
2569
2570 if (off >= (bfd_vma) -2)
2571 abort ();
2572
2573 relocation = (htab->elf.sgot->output_section->vma
2574 + htab->elf.sgot->output_offset + off);
2575 if (rel->r_offset > 1
2576 && (*(contents + rel->r_offset - 1) & 0xc7) == 0x5
2577 && *(contents + rel->r_offset - 2) != 0x8d)
2578 {
2579 if (bfd_link_pic (info))
2580 {
2581 /* For PIC, disallow R_386_GOT32 without a base
2582 register, except for "lea foo@GOT, %reg", since
2583 we don't know what the GOT base is. */
2584 const char *name;
2585
2586 disallow_got32:
2587 if (h == NULL || h->root.root.string == NULL)
2588 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2589 NULL);
2590 else
2591 name = h->root.root.string;
2592
2593 _bfd_error_handler
2594 /* xgettext:c-format */
2595 (_("%pB: direct GOT relocation %s against `%s'"
2596 " without base register can not be used"
2597 " when making a shared object"),
2598 input_bfd, howto->name, name);
2599 bfd_set_error (bfd_error_bad_value);
2600 return false;
2601 }
2602 }
2603 else
2604 {
2605 /* Subtract the .got.plt section address only with a base
2606 register. */
2607 relocation -= (htab->elf.sgotplt->output_section->vma
2608 + htab->elf.sgotplt->output_offset);
2609 }
2610
2611 break;
2612
2613 case R_386_GOTOFF:
2614 /* Relocation is relative to the start of the global offset
2615 table. */
2616
2617 /* Check to make sure it isn't a protected function or data
2618 symbol for shared library since it may not be local when
2619 used as function address or with copy relocation. We also
2620 need to make sure that a symbol is referenced locally. */
2621 if (!bfd_link_executable (info) && h)
2622 {
2623 if (!h->def_regular)
2624 {
2625 const char *v;
2626
2627 switch (ELF_ST_VISIBILITY (h->other))
2628 {
2629 case STV_HIDDEN:
2630 v = _("hidden symbol");
2631 break;
2632 case STV_INTERNAL:
2633 v = _("internal symbol");
2634 break;
2635 case STV_PROTECTED:
2636 v = _("protected symbol");
2637 break;
2638 default:
2639 v = _("symbol");
2640 break;
2641 }
2642
2643 _bfd_error_handler
2644 /* xgettext:c-format */
2645 (_("%pB: relocation R_386_GOTOFF against undefined %s"
2646 " `%s' can not be used when making a shared object"),
2647 input_bfd, v, h->root.root.string);
2648 bfd_set_error (bfd_error_bad_value);
2649 return false;
2650 }
2651 else if (!SYMBOL_REFERENCES_LOCAL_P (info, h)
2652 && (h->type == STT_FUNC
2653 || h->type == STT_OBJECT)
2654 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
2655 {
2656 _bfd_error_handler
2657 /* xgettext:c-format */
2658 (_("%pB: relocation R_386_GOTOFF against protected %s"
2659 " `%s' can not be used when making a shared object"),
2660 input_bfd,
2661 h->type == STT_FUNC ? "function" : "data",
2662 h->root.root.string);
2663 bfd_set_error (bfd_error_bad_value);
2664 return false;
2665 }
2666 }
2667
2668 /* Note that sgot is not involved in this
2669 calculation. We always want the start of .got.plt. If we
2670 defined _GLOBAL_OFFSET_TABLE_ in a different way, as is
2671 permitted by the ABI, we might have to change this
2672 calculation. */
2673 relocation -= htab->elf.sgotplt->output_section->vma
2674 + htab->elf.sgotplt->output_offset;
2675 break;
2676
2677 case R_386_GOTPC:
2678 /* Use global offset table as symbol value. */
2679 relocation = htab->elf.sgotplt->output_section->vma
2680 + htab->elf.sgotplt->output_offset;
2681 unresolved_reloc = false;
2682 break;
2683
2684 case R_386_PLT32:
2685 /* Relocation is to the entry for this symbol in the
2686 procedure linkage table. */
2687
2688 /* Resolve a PLT32 reloc against a local symbol directly,
2689 without using the procedure linkage table. */
2690 if (h == NULL)
2691 break;
2692
2693 if ((h->plt.offset == (bfd_vma) -1
2694 && eh->plt_got.offset == (bfd_vma) -1)
2695 || htab->elf.splt == NULL)
2696 {
2697 /* We didn't make a PLT entry for this symbol. This
2698 happens when statically linking PIC code, or when
2699 using -Bsymbolic. */
2700 break;
2701 }
2702
2703 if (h->plt.offset != (bfd_vma) -1)
2704 {
2705 if (htab->plt_second != NULL)
2706 {
2707 resolved_plt = htab->plt_second;
2708 plt_offset = eh->plt_second.offset;
2709 }
2710 else
2711 {
2712 resolved_plt = htab->elf.splt;
2713 plt_offset = h->plt.offset;
2714 }
2715 }
2716 else
2717 {
2718 resolved_plt = htab->plt_got;
2719 plt_offset = eh->plt_got.offset;
2720 }
2721
2722 relocation = (resolved_plt->output_section->vma
2723 + resolved_plt->output_offset
2724 + plt_offset);
2725 unresolved_reloc = false;
2726 break;
2727
2728 case R_386_SIZE32:
2729 /* Set to symbol size. */
2730 relocation = st_size;
2731 /* Fall through. */
2732
2733 case R_386_32:
2734 case R_386_PC32:
2735 if ((input_section->flags & SEC_ALLOC) == 0
2736 || is_vxworks_tls)
2737 break;
2738
2739 if (GENERATE_DYNAMIC_RELOCATION_P (false, info, eh, r_type,
2740 sec, false,
2741 resolved_to_zero,
2742 (r_type == R_386_PC32)))
2743 {
2744 Elf_Internal_Rela outrel;
2745 bool skip, relocate;
2746 bool generate_dynamic_reloc = true;
2747 asection *sreloc;
2748
2749 /* When generating a shared object, these relocations
2750 are copied into the output file to be resolved at run
2751 time. */
2752
2753 skip = false;
2754 relocate = false;
2755
2756 outrel.r_offset =
2757 _bfd_elf_section_offset (output_bfd, info, input_section,
2758 rel->r_offset);
2759 if (outrel.r_offset == (bfd_vma) -1)
2760 skip = true;
2761 else if (outrel.r_offset == (bfd_vma) -2)
2762 skip = true, relocate = true;
2763 outrel.r_offset += (input_section->output_section->vma
2764 + input_section->output_offset);
2765
2766 if (skip)
2767 memset (&outrel, 0, sizeof outrel);
2768 else if (COPY_INPUT_RELOC_P (false, info, h, r_type))
2769 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2770 else
2771 {
2772 /* This symbol is local, or marked to become local. */
2773 relocate = true;
2774 /* NB: Don't generate relative relocation here if it
2775 has been generated by DT_RELR. */
2776 if (info->enable_dt_relr)
2777 generate_dynamic_reloc = false;
2778 else
2779 {
2780 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
2781
2782 if (htab->params->report_relative_reloc)
2783 _bfd_x86_elf_link_report_relative_reloc
2784 (info, input_section, h, sym, "R_386_RELATIVE",
2785 &outrel);
2786 }
2787 }
2788
2789 if (generate_dynamic_reloc)
2790 {
2791 sreloc = elf_section_data (input_section)->sreloc;
2792
2793 if (sreloc == NULL || sreloc->contents == NULL)
2794 {
2795 r = bfd_reloc_notsupported;
2796 goto check_relocation_error;
2797 }
2798
2799 elf_append_rel (output_bfd, sreloc, &outrel);
2800 }
2801
2802 /* If this reloc is against an external symbol, we do
2803 not want to fiddle with the addend. Otherwise, we
2804 need to include the symbol value so that it becomes
2805 an addend for the dynamic reloc. */
2806 if (! relocate)
2807 continue;
2808 }
2809 break;
2810
2811 case R_386_TLS_IE:
2812 if (!bfd_link_executable (info))
2813 {
2814 Elf_Internal_Rela outrel;
2815 asection *sreloc;
2816
2817 outrel.r_offset = rel->r_offset
2818 + input_section->output_section->vma
2819 + input_section->output_offset;
2820 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
2821
2822 if (htab->params->report_relative_reloc)
2823 _bfd_x86_elf_link_report_relative_reloc
2824 (info, input_section, h, sym, "R_386_RELATIVE",
2825 &outrel);
2826
2827 sreloc = elf_section_data (input_section)->sreloc;
2828 if (sreloc == NULL)
2829 abort ();
2830 elf_append_rel (output_bfd, sreloc, &outrel);
2831 }
2832 /* Fall through */
2833
2834 case R_386_TLS_GD:
2835 case R_386_TLS_GOTDESC:
2836 case R_386_TLS_DESC_CALL:
2837 case R_386_TLS_IE_32:
2838 case R_386_TLS_GOTIE:
2839 tls_type = GOT_UNKNOWN;
2840 if (h == NULL && local_got_offsets)
2841 tls_type = elf_x86_local_got_tls_type (input_bfd) [r_symndx];
2842 else if (h != NULL)
2843 tls_type = elf_x86_hash_entry(h)->tls_type;
2844 if (tls_type == GOT_TLS_IE)
2845 tls_type = GOT_TLS_IE_NEG;
2846
2847 r_type_tls = r_type;
2848 if (! elf_i386_tls_transition (info, input_bfd,
2849 input_section, contents,
2850 symtab_hdr, sym_hashes,
2851 &r_type_tls, tls_type, rel,
2852 relend, h, r_symndx, true))
2853 return false;
2854
2855 if (r_type_tls == R_386_TLS_LE_32)
2856 {
2857 BFD_ASSERT (! unresolved_reloc);
2858 if (r_type == R_386_TLS_GD)
2859 {
2860 unsigned int type;
2861 bfd_vma roff;
2862
2863 /* GD->LE transition. */
2864 type = *(contents + rel->r_offset - 2);
2865 if (type == 0x04)
2866 {
2867 /* Change
2868 leal foo@tlsgd(,%ebx,1), %eax
2869 call ___tls_get_addr@PLT
2870 into:
2871 movl %gs:0, %eax
2872 subl $foo@tpoff, %eax
2873 (6 byte form of subl). */
2874 roff = rel->r_offset + 5;
2875 }
2876 else
2877 {
2878 /* Change
2879 leal foo@tlsgd(%ebx), %eax
2880 call ___tls_get_addr@PLT
2881 nop
2882 or
2883 leal foo@tlsgd(%reg), %eax
2884 call *___tls_get_addr@GOT(%reg)
2885 which may be converted to
2886 addr32 call ___tls_get_addr
2887 into:
2888 movl %gs:0, %eax; subl $foo@tpoff, %eax
2889 (6 byte form of subl). */
2890 roff = rel->r_offset + 6;
2891 }
2892 memcpy (contents + roff - 8,
2893 "\x65\xa1\0\0\0\0\x81\xe8\0\0\0", 12);
2894 bfd_put_32 (output_bfd, elf_i386_tpoff (info, relocation),
2895 contents + roff);
2896 /* Skip R_386_PC32, R_386_PLT32 and R_386_GOT32X. */
2897 rel++;
2898 wrel++;
2899 continue;
2900 }
2901 else if (r_type == R_386_TLS_GOTDESC)
2902 {
2903 /* GDesc -> LE transition.
2904 It's originally something like:
2905 leal x@tlsdesc(%ebx), %eax
2906
2907 leal x@ntpoff, %eax
2908
2909 Registers other than %eax may be set up here. */
2910
2911 unsigned int val;
2912 bfd_vma roff;
2913
2914 roff = rel->r_offset;
2915 val = bfd_get_8 (input_bfd, contents + roff - 1);
2916
2917 /* Now modify the instruction as appropriate. */
2918 /* aoliva FIXME: remove the above and xor the byte
2919 below with 0x86. */
2920 bfd_put_8 (output_bfd, val ^ 0x86,
2921 contents + roff - 1);
2922 bfd_put_32 (output_bfd, -elf_i386_tpoff (info, relocation),
2923 contents + roff);
2924 continue;
2925 }
2926 else if (r_type == R_386_TLS_DESC_CALL)
2927 {
2928 /* GDesc -> LE transition.
2929 It's originally:
2930 call *(%eax)
2931 Turn it into:
2932 xchg %ax,%ax */
2933
2934 bfd_vma roff;
2935
2936 roff = rel->r_offset;
2937 bfd_put_8 (output_bfd, 0x66, contents + roff);
2938 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
2939 continue;
2940 }
2941 else if (r_type == R_386_TLS_IE)
2942 {
2943 unsigned int val;
2944
2945 /* IE->LE transition:
2946 Originally it can be one of:
2947 movl foo, %eax
2948 movl foo, %reg
2949 addl foo, %reg
2950 We change it into:
2951 movl $foo, %eax
2952 movl $foo, %reg
2953 addl $foo, %reg. */
2954 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
2955 if (val == 0xa1)
2956 {
2957 /* movl foo, %eax. */
2958 bfd_put_8 (output_bfd, 0xb8,
2959 contents + rel->r_offset - 1);
2960 }
2961 else
2962 {
2963 unsigned int type;
2964
2965 type = bfd_get_8 (input_bfd,
2966 contents + rel->r_offset - 2);
2967 switch (type)
2968 {
2969 case 0x8b:
2970 /* movl */
2971 bfd_put_8 (output_bfd, 0xc7,
2972 contents + rel->r_offset - 2);
2973 bfd_put_8 (output_bfd,
2974 0xc0 | ((val >> 3) & 7),
2975 contents + rel->r_offset - 1);
2976 break;
2977 case 0x03:
2978 /* addl */
2979 bfd_put_8 (output_bfd, 0x81,
2980 contents + rel->r_offset - 2);
2981 bfd_put_8 (output_bfd,
2982 0xc0 | ((val >> 3) & 7),
2983 contents + rel->r_offset - 1);
2984 break;
2985 default:
2986 BFD_FAIL ();
2987 break;
2988 }
2989 }
2990 bfd_put_32 (output_bfd, -elf_i386_tpoff (info, relocation),
2991 contents + rel->r_offset);
2992 continue;
2993 }
2994 else
2995 {
2996 unsigned int val, type;
2997
2998 /* {IE_32,GOTIE}->LE transition:
2999 Originally it can be one of:
3000 subl foo(%reg1), %reg2
3001 movl foo(%reg1), %reg2
3002 addl foo(%reg1), %reg2
3003 We change it into:
3004 subl $foo, %reg2
3005 movl $foo, %reg2 (6 byte form)
3006 addl $foo, %reg2. */
3007 type = bfd_get_8 (input_bfd, contents + rel->r_offset - 2);
3008 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
3009 if (type == 0x8b)
3010 {
3011 /* movl */
3012 bfd_put_8 (output_bfd, 0xc7,
3013 contents + rel->r_offset - 2);
3014 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
3015 contents + rel->r_offset - 1);
3016 }
3017 else if (type == 0x2b)
3018 {
3019 /* subl */
3020 bfd_put_8 (output_bfd, 0x81,
3021 contents + rel->r_offset - 2);
3022 bfd_put_8 (output_bfd, 0xe8 | ((val >> 3) & 7),
3023 contents + rel->r_offset - 1);
3024 }
3025 else if (type == 0x03)
3026 {
3027 /* addl */
3028 bfd_put_8 (output_bfd, 0x81,
3029 contents + rel->r_offset - 2);
3030 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
3031 contents + rel->r_offset - 1);
3032 }
3033 else
3034 BFD_FAIL ();
3035 if (r_type == R_386_TLS_GOTIE)
3036 bfd_put_32 (output_bfd, -elf_i386_tpoff (info, relocation),
3037 contents + rel->r_offset);
3038 else
3039 bfd_put_32 (output_bfd, elf_i386_tpoff (info, relocation),
3040 contents + rel->r_offset);
3041 continue;
3042 }
3043 }
3044
3045 if (htab->elf.sgot == NULL)
3046 abort ();
3047
3048 if (h != NULL)
3049 {
3050 off = h->got.offset;
3051 offplt = elf_x86_hash_entry (h)->tlsdesc_got;
3052 }
3053 else
3054 {
3055 if (local_got_offsets == NULL)
3056 abort ();
3057
3058 off = local_got_offsets[r_symndx];
3059 offplt = local_tlsdesc_gotents[r_symndx];
3060 }
3061
3062 if ((off & 1) != 0)
3063 off &= ~1;
3064 else
3065 {
3066 Elf_Internal_Rela outrel;
3067 int dr_type;
3068 asection *sreloc;
3069
3070 if (htab->elf.srelgot == NULL)
3071 abort ();
3072
3073 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3074
3075 if (GOT_TLS_GDESC_P (tls_type))
3076 {
3077 bfd_byte *loc;
3078 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_DESC);
3079 BFD_ASSERT (htab->sgotplt_jump_table_size + offplt + 8
3080 <= htab->elf.sgotplt->size);
3081 outrel.r_offset = (htab->elf.sgotplt->output_section->vma
3082 + htab->elf.sgotplt->output_offset
3083 + offplt
3084 + htab->sgotplt_jump_table_size);
3085 sreloc = htab->elf.srelplt;
3086 loc = sreloc->contents;
3087 loc += (htab->next_tls_desc_index++
3088 * sizeof (Elf32_External_Rel));
3089 BFD_ASSERT (loc + sizeof (Elf32_External_Rel)
3090 <= sreloc->contents + sreloc->size);
3091 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
3092 if (indx == 0)
3093 {
3094 BFD_ASSERT (! unresolved_reloc);
3095 bfd_put_32 (output_bfd,
3096 relocation - _bfd_x86_elf_dtpoff_base (info),
3097 htab->elf.sgotplt->contents + offplt
3098 + htab->sgotplt_jump_table_size + 4);
3099 }
3100 else
3101 {
3102 bfd_put_32 (output_bfd, 0,
3103 htab->elf.sgotplt->contents + offplt
3104 + htab->sgotplt_jump_table_size + 4);
3105 }
3106 }
3107
3108 sreloc = htab->elf.srelgot;
3109
3110 outrel.r_offset = (htab->elf.sgot->output_section->vma
3111 + htab->elf.sgot->output_offset + off);
3112
3113 if (GOT_TLS_GD_P (tls_type))
3114 dr_type = R_386_TLS_DTPMOD32;
3115 else if (GOT_TLS_GDESC_P (tls_type))
3116 goto dr_done;
3117 else if (tls_type == GOT_TLS_IE_POS)
3118 dr_type = R_386_TLS_TPOFF;
3119 else
3120 dr_type = R_386_TLS_TPOFF32;
3121
3122 if (dr_type == R_386_TLS_TPOFF && indx == 0)
3123 bfd_put_32 (output_bfd,
3124 relocation - _bfd_x86_elf_dtpoff_base (info),
3125 htab->elf.sgot->contents + off);
3126 else if (dr_type == R_386_TLS_TPOFF32 && indx == 0)
3127 bfd_put_32 (output_bfd,
3128 _bfd_x86_elf_dtpoff_base (info) - relocation,
3129 htab->elf.sgot->contents + off);
3130 else if (dr_type != R_386_TLS_DESC)
3131 bfd_put_32 (output_bfd, 0,
3132 htab->elf.sgot->contents + off);
3133 outrel.r_info = ELF32_R_INFO (indx, dr_type);
3134
3135 elf_append_rel (output_bfd, sreloc, &outrel);
3136
3137 if (GOT_TLS_GD_P (tls_type))
3138 {
3139 if (indx == 0)
3140 {
3141 BFD_ASSERT (! unresolved_reloc);
3142 bfd_put_32 (output_bfd,
3143 relocation - _bfd_x86_elf_dtpoff_base (info),
3144 htab->elf.sgot->contents + off + 4);
3145 }
3146 else
3147 {
3148 bfd_put_32 (output_bfd, 0,
3149 htab->elf.sgot->contents + off + 4);
3150 outrel.r_info = ELF32_R_INFO (indx,
3151 R_386_TLS_DTPOFF32);
3152 outrel.r_offset += 4;
3153 elf_append_rel (output_bfd, sreloc, &outrel);
3154 }
3155 }
3156 else if (tls_type == GOT_TLS_IE_BOTH)
3157 {
3158 bfd_put_32 (output_bfd,
3159 (indx == 0
3160 ? relocation - _bfd_x86_elf_dtpoff_base (info)
3161 : 0),
3162 htab->elf.sgot->contents + off + 4);
3163 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF);
3164 outrel.r_offset += 4;
3165 elf_append_rel (output_bfd, sreloc, &outrel);
3166 }
3167
3168 dr_done:
3169 if (h != NULL)
3170 h->got.offset |= 1;
3171 else
3172 local_got_offsets[r_symndx] |= 1;
3173 }
3174
3175 if (off >= (bfd_vma) -2
3176 && ! GOT_TLS_GDESC_P (tls_type))
3177 abort ();
3178 if (r_type_tls == R_386_TLS_GOTDESC
3179 || r_type_tls == R_386_TLS_DESC_CALL)
3180 {
3181 relocation = htab->sgotplt_jump_table_size + offplt;
3182 unresolved_reloc = false;
3183 }
3184 else if (r_type_tls == r_type)
3185 {
3186 bfd_vma g_o_t = htab->elf.sgotplt->output_section->vma
3187 + htab->elf.sgotplt->output_offset;
3188 relocation = htab->elf.sgot->output_section->vma
3189 + htab->elf.sgot->output_offset + off - g_o_t;
3190 if ((r_type == R_386_TLS_IE || r_type == R_386_TLS_GOTIE)
3191 && tls_type == GOT_TLS_IE_BOTH)
3192 relocation += 4;
3193 if (r_type == R_386_TLS_IE)
3194 relocation += g_o_t;
3195 unresolved_reloc = false;
3196 }
3197 else if (r_type == R_386_TLS_GD)
3198 {
3199 unsigned int val, type;
3200 bfd_vma roff;
3201
3202 /* GD->IE transition. */
3203 type = *(contents + rel->r_offset - 2);
3204 val = *(contents + rel->r_offset - 1);
3205 if (type == 0x04)
3206 {
3207 /* Change
3208 leal foo@tlsgd(,%ebx,1), %eax
3209 call ___tls_get_addr@PLT
3210 into:
3211 movl %gs:0, %eax
3212 subl $foo@gottpoff(%ebx), %eax. */
3213 val >>= 3;
3214 roff = rel->r_offset - 3;
3215 }
3216 else
3217 {
3218 /* Change
3219 leal foo@tlsgd(%ebx), %eax
3220 call ___tls_get_addr@PLT
3221 nop
3222 or
3223 leal foo@tlsgd(%reg), %eax
3224 call *___tls_get_addr@GOT(%reg)
3225 which may be converted to
3226 addr32 call ___tls_get_addr
3227 into:
3228 movl %gs:0, %eax;
3229 subl $foo@gottpoff(%reg), %eax. */
3230 roff = rel->r_offset - 2;
3231 }
3232 memcpy (contents + roff,
3233 "\x65\xa1\0\0\0\0\x2b\x80\0\0\0", 12);
3234 contents[roff + 7] = 0x80 | (val & 7);
3235 /* If foo is used only with foo@gotntpoff(%reg) and
3236 foo@indntpoff, but not with foo@gottpoff(%reg), change
3237 subl $foo@gottpoff(%reg), %eax
3238 into:
3239 addl $foo@gotntpoff(%reg), %eax. */
3240 if (tls_type == GOT_TLS_IE_POS)
3241 contents[roff + 6] = 0x03;
3242 bfd_put_32 (output_bfd,
3243 htab->elf.sgot->output_section->vma
3244 + htab->elf.sgot->output_offset + off
3245 - htab->elf.sgotplt->output_section->vma
3246 - htab->elf.sgotplt->output_offset,
3247 contents + roff + 8);
3248 /* Skip R_386_PLT32 and R_386_GOT32X. */
3249 rel++;
3250 wrel++;
3251 continue;
3252 }
3253 else if (r_type == R_386_TLS_GOTDESC)
3254 {
3255 /* GDesc -> IE transition.
3256 It's originally something like:
3257 leal x@tlsdesc(%ebx), %eax
3258
3259 Change it to:
3260 movl x@gotntpoff(%ebx), %eax # before xchg %ax,%ax
3261 or:
3262 movl x@gottpoff(%ebx), %eax # before negl %eax
3263
3264 Registers other than %eax may be set up here. */
3265
3266 bfd_vma roff;
3267
3268 /* First, make sure it's a leal adding ebx to a 32-bit
3269 offset into any register, although it's probably
3270 almost always going to be eax. */
3271 roff = rel->r_offset;
3272
3273 /* Now modify the instruction as appropriate. */
3274 /* To turn a leal into a movl in the form we use it, it
3275 suffices to change the first byte from 0x8d to 0x8b.
3276 aoliva FIXME: should we decide to keep the leal, all
3277 we have to do is remove the statement below, and
3278 adjust the relaxation of R_386_TLS_DESC_CALL. */
3279 bfd_put_8 (output_bfd, 0x8b, contents + roff - 2);
3280
3281 if (tls_type == GOT_TLS_IE_BOTH)
3282 off += 4;
3283
3284 bfd_put_32 (output_bfd,
3285 htab->elf.sgot->output_section->vma
3286 + htab->elf.sgot->output_offset + off
3287 - htab->elf.sgotplt->output_section->vma
3288 - htab->elf.sgotplt->output_offset,
3289 contents + roff);
3290 continue;
3291 }
3292 else if (r_type == R_386_TLS_DESC_CALL)
3293 {
3294 /* GDesc -> IE transition.
3295 It's originally:
3296 call *(%eax)
3297
3298 Change it to:
3299 xchg %ax,%ax
3300 or
3301 negl %eax
3302 depending on how we transformed the TLS_GOTDESC above.
3303 */
3304
3305 bfd_vma roff;
3306
3307 roff = rel->r_offset;
3308
3309 /* Now modify the instruction as appropriate. */
3310 if (tls_type != GOT_TLS_IE_NEG)
3311 {
3312 /* xchg %ax,%ax */
3313 bfd_put_8 (output_bfd, 0x66, contents + roff);
3314 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3315 }
3316 else
3317 {
3318 /* negl %eax */
3319 bfd_put_8 (output_bfd, 0xf7, contents + roff);
3320 bfd_put_8 (output_bfd, 0xd8, contents + roff + 1);
3321 }
3322
3323 continue;
3324 }
3325 else
3326 BFD_ASSERT (false);
3327 break;
3328
3329 case R_386_TLS_LDM:
3330 if (! elf_i386_tls_transition (info, input_bfd,
3331 input_section, contents,
3332 symtab_hdr, sym_hashes,
3333 &r_type, GOT_UNKNOWN, rel,
3334 relend, h, r_symndx, true))
3335 return false;
3336
3337 if (r_type != R_386_TLS_LDM)
3338 {
3339 /* LD->LE transition. Change
3340 leal foo@tlsldm(%ebx) %eax
3341 call ___tls_get_addr@PLT
3342 into:
3343 movl %gs:0, %eax
3344 nop
3345 leal 0(%esi,1), %esi
3346 or change
3347 leal foo@tlsldm(%reg) %eax
3348 call *___tls_get_addr@GOT(%reg)
3349 which may be converted to
3350 addr32 call ___tls_get_addr
3351 into:
3352 movl %gs:0, %eax
3353 leal 0(%esi), %esi */
3354 BFD_ASSERT (r_type == R_386_TLS_LE_32);
3355 if (*(contents + rel->r_offset + 4) == 0xff
3356 || *(contents + rel->r_offset + 4) == 0x67)
3357 memcpy (contents + rel->r_offset - 2,
3358 "\x65\xa1\0\0\0\0\x8d\xb6\0\0\0", 12);
3359 else
3360 memcpy (contents + rel->r_offset - 2,
3361 "\x65\xa1\0\0\0\0\x90\x8d\x74\x26", 11);
3362 /* Skip R_386_PC32/R_386_PLT32. */
3363 rel++;
3364 wrel++;
3365 continue;
3366 }
3367
3368 if (htab->elf.sgot == NULL)
3369 abort ();
3370
3371 off = htab->tls_ld_or_ldm_got.offset;
3372 if (off & 1)
3373 off &= ~1;
3374 else
3375 {
3376 Elf_Internal_Rela outrel;
3377
3378 if (htab->elf.srelgot == NULL)
3379 abort ();
3380
3381 outrel.r_offset = (htab->elf.sgot->output_section->vma
3382 + htab->elf.sgot->output_offset + off);
3383
3384 bfd_put_32 (output_bfd, 0,
3385 htab->elf.sgot->contents + off);
3386 bfd_put_32 (output_bfd, 0,
3387 htab->elf.sgot->contents + off + 4);
3388 outrel.r_info = ELF32_R_INFO (0, R_386_TLS_DTPMOD32);
3389 elf_append_rel (output_bfd, htab->elf.srelgot, &outrel);
3390 htab->tls_ld_or_ldm_got.offset |= 1;
3391 }
3392 relocation = htab->elf.sgot->output_section->vma
3393 + htab->elf.sgot->output_offset + off
3394 - htab->elf.sgotplt->output_section->vma
3395 - htab->elf.sgotplt->output_offset;
3396 unresolved_reloc = false;
3397 break;
3398
3399 case R_386_TLS_LDO_32:
3400 if (!bfd_link_executable (info)
3401 || (input_section->flags & SEC_CODE) == 0)
3402 relocation -= _bfd_x86_elf_dtpoff_base (info);
3403 else
3404 /* When converting LDO to LE, we must negate. */
3405 relocation = -elf_i386_tpoff (info, relocation);
3406 break;
3407
3408 case R_386_TLS_LE_32:
3409 case R_386_TLS_LE:
3410 if (!bfd_link_executable (info))
3411 {
3412 Elf_Internal_Rela outrel;
3413 asection *sreloc;
3414
3415 outrel.r_offset = rel->r_offset
3416 + input_section->output_section->vma
3417 + input_section->output_offset;
3418 if (h != NULL && h->dynindx != -1)
3419 indx = h->dynindx;
3420 else
3421 indx = 0;
3422 if (r_type == R_386_TLS_LE_32)
3423 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF32);
3424 else
3425 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF);
3426 sreloc = elf_section_data (input_section)->sreloc;
3427 if (sreloc == NULL)
3428 abort ();
3429 elf_append_rel (output_bfd, sreloc, &outrel);
3430 if (indx)
3431 continue;
3432 else if (r_type == R_386_TLS_LE_32)
3433 relocation = _bfd_x86_elf_dtpoff_base (info) - relocation;
3434 else
3435 relocation -= _bfd_x86_elf_dtpoff_base (info);
3436 }
3437 else if (r_type == R_386_TLS_LE_32)
3438 relocation = elf_i386_tpoff (info, relocation);
3439 else
3440 relocation = -elf_i386_tpoff (info, relocation);
3441 break;
3442
3443 default:
3444 break;
3445 }
3446
3447 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3448 because such sections are not SEC_ALLOC and thus ld.so will
3449 not process them. */
3450 if (unresolved_reloc
3451 && !((input_section->flags & SEC_DEBUGGING) != 0
3452 && h->def_dynamic)
3453 && _bfd_elf_section_offset (output_bfd, info, input_section,
3454 rel->r_offset) != (bfd_vma) -1)
3455 {
3456 _bfd_error_handler
3457 /* xgettext:c-format */
3458 (_("%pB(%pA+%#" PRIx64 "): unresolvable %s relocation against symbol `%s'"),
3459 input_bfd,
3460 input_section,
3461 (uint64_t) rel->r_offset,
3462 howto->name,
3463 h->root.root.string);
3464 return false;
3465 }
3466
3467 do_relocation:
3468 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3469 contents, rel->r_offset,
3470 relocation, 0);
3471
3472 check_relocation_error:
3473 if (r != bfd_reloc_ok)
3474 {
3475 const char *name;
3476
3477 if (h != NULL)
3478 name = h->root.root.string;
3479 else
3480 {
3481 name = bfd_elf_string_from_elf_section (input_bfd,
3482 symtab_hdr->sh_link,
3483 sym->st_name);
3484 if (name == NULL)
3485 return false;
3486 if (*name == '\0')
3487 name = bfd_section_name (sec);
3488 }
3489
3490 if (r == bfd_reloc_overflow)
3491 (*info->callbacks->reloc_overflow)
3492 (info, (h ? &h->root : NULL), name, howto->name,
3493 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3494 else
3495 {
3496 _bfd_error_handler
3497 /* xgettext:c-format */
3498 (_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
3499 input_bfd, input_section,
3500 (uint64_t) rel->r_offset, name, (int) r);
3501 return false;
3502 }
3503 }
3504
3505 if (wrel != rel)
3506 *wrel = *rel;
3507 }
3508
3509 if (wrel != rel)
3510 {
3511 Elf_Internal_Shdr *rel_hdr;
3512 size_t deleted = rel - wrel;
3513
3514 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
3515 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
3516 if (rel_hdr->sh_size == 0)
3517 {
3518 /* It is too late to remove an empty reloc section. Leave
3519 one NONE reloc.
3520 ??? What is wrong with an empty section??? */
3521 rel_hdr->sh_size = rel_hdr->sh_entsize;
3522 deleted -= 1;
3523 }
3524 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
3525 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
3526 input_section->reloc_count -= deleted;
3527 }
3528
3529 return true;
3530 }
3531
3532 /* Finish up dynamic symbol handling. We set the contents of various
3533 dynamic sections here. */
3534
3535 static bool
3536 elf_i386_finish_dynamic_symbol (bfd *output_bfd,
3537 struct bfd_link_info *info,
3538 struct elf_link_hash_entry *h,
3539 Elf_Internal_Sym *sym)
3540 {
3541 struct elf_x86_link_hash_table *htab;
3542 unsigned plt_entry_size;
3543 struct elf_x86_link_hash_entry *eh;
3544 bool local_undefweak;
3545 bool use_plt_second;
3546
3547 htab = elf_x86_hash_table (info, I386_ELF_DATA);
3548 if (htab == NULL)
3549 return false;
3550
3551 plt_entry_size = htab->plt.plt_entry_size;
3552
3553 /* Use the second PLT section only if there is .plt section. */
3554 use_plt_second = htab->elf.splt != NULL && htab->plt_second != NULL;
3555
3556 eh = (struct elf_x86_link_hash_entry *) h;
3557 if (eh->no_finish_dynamic_symbol)
3558 abort ();
3559
3560 /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for
3561 resolved undefined weak symbols in executable so that their
3562 references have value 0 at run-time. */
3563 local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh);
3564
3565 if (h->plt.offset != (bfd_vma) -1)
3566 {
3567 bfd_vma plt_index, plt_offset;
3568 bfd_vma got_offset;
3569 Elf_Internal_Rela rel;
3570 bfd_byte *loc;
3571 asection *plt, *resolved_plt, *gotplt, *relplt;
3572
3573 /* When building a static executable, use .iplt, .igot.plt and
3574 .rel.iplt sections for STT_GNU_IFUNC symbols. */
3575 if (htab->elf.splt != NULL)
3576 {
3577 plt = htab->elf.splt;
3578 gotplt = htab->elf.sgotplt;
3579 relplt = htab->elf.srelplt;
3580 }
3581 else
3582 {
3583 plt = htab->elf.iplt;
3584 gotplt = htab->elf.igotplt;
3585 relplt = htab->elf.irelplt;
3586 }
3587
3588 VERIFY_PLT_ENTRY (info, h, plt, gotplt, relplt, local_undefweak)
3589
3590 /* Get the index in the procedure linkage table which
3591 corresponds to this symbol. This is the index of this symbol
3592 in all the symbols for which we are making plt entries. The
3593 first entry in the procedure linkage table is reserved.
3594
3595 Get the offset into the .got table of the entry that
3596 corresponds to this function. Each .got entry is 4 bytes.
3597 The first three are reserved.
3598
3599 For static executables, we don't reserve anything. */
3600
3601 if (plt == htab->elf.splt)
3602 {
3603 got_offset = (h->plt.offset / plt_entry_size
3604 - htab->plt.has_plt0);
3605 got_offset = (got_offset + 3) * 4;
3606 }
3607 else
3608 {
3609 got_offset = h->plt.offset / plt_entry_size;
3610 got_offset = got_offset * 4;
3611 }
3612
3613 /* Fill in the entry in the procedure linkage table and update
3614 the first slot. */
3615 memcpy (plt->contents + h->plt.offset, htab->plt.plt_entry,
3616 plt_entry_size);
3617
3618 if (use_plt_second)
3619 {
3620 const bfd_byte *plt_entry;
3621 if (bfd_link_pic (info))
3622 plt_entry = htab->non_lazy_plt->pic_plt_entry;
3623 else
3624 plt_entry = htab->non_lazy_plt->plt_entry;
3625 memcpy (htab->plt_second->contents + eh->plt_second.offset,
3626 plt_entry, htab->non_lazy_plt->plt_entry_size);
3627
3628 resolved_plt = htab->plt_second;
3629 plt_offset = eh->plt_second.offset;
3630 }
3631 else
3632 {
3633 resolved_plt = plt;
3634 plt_offset = h->plt.offset;
3635 }
3636
3637 if (! bfd_link_pic (info))
3638 {
3639 bfd_put_32 (output_bfd,
3640 (gotplt->output_section->vma
3641 + gotplt->output_offset
3642 + got_offset),
3643 resolved_plt->contents + plt_offset
3644 + htab->plt.plt_got_offset);
3645
3646 if (htab->elf.target_os == is_vxworks)
3647 {
3648 int s, k, reloc_index;
3649
3650 /* Create the R_386_32 relocation referencing the GOT
3651 for this PLT entry. */
3652
3653 /* S: Current slot number (zero-based). */
3654 s = ((h->plt.offset - htab->plt.plt_entry_size)
3655 / htab->plt.plt_entry_size);
3656 /* K: Number of relocations for PLTResolve. */
3657 if (bfd_link_pic (info))
3658 k = PLTRESOLVE_RELOCS_SHLIB;
3659 else
3660 k = PLTRESOLVE_RELOCS;
3661 /* Skip the PLTresolve relocations, and the relocations for
3662 the other PLT slots. */
3663 reloc_index = k + s * PLT_NON_JUMP_SLOT_RELOCS;
3664 loc = (htab->srelplt2->contents + reloc_index
3665 * sizeof (Elf32_External_Rel));
3666
3667 rel.r_offset = (plt->output_section->vma
3668 + plt->output_offset
3669 + h->plt.offset + 2),
3670 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_386_32);
3671 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
3672
3673 /* Create the R_386_32 relocation referencing the beginning of
3674 the PLT for this GOT entry. */
3675 rel.r_offset = (htab->elf.sgotplt->output_section->vma
3676 + htab->elf.sgotplt->output_offset
3677 + got_offset);
3678 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_386_32);
3679 bfd_elf32_swap_reloc_out (output_bfd, &rel,
3680 loc + sizeof (Elf32_External_Rel));
3681 }
3682 }
3683 else
3684 {
3685 bfd_put_32 (output_bfd, got_offset,
3686 resolved_plt->contents + plt_offset
3687 + htab->plt.plt_got_offset);
3688 }
3689
3690 /* Fill in the entry in the global offset table. Leave the entry
3691 as zero for undefined weak symbol in PIE. No PLT relocation
3692 against undefined weak symbol in PIE. */
3693 if (!local_undefweak)
3694 {
3695 if (htab->plt.has_plt0)
3696 bfd_put_32 (output_bfd,
3697 (plt->output_section->vma
3698 + plt->output_offset
3699 + h->plt.offset
3700 + htab->lazy_plt->plt_lazy_offset),
3701 gotplt->contents + got_offset);
3702
3703 /* Fill in the entry in the .rel.plt section. */
3704 rel.r_offset = (gotplt->output_section->vma
3705 + gotplt->output_offset
3706 + got_offset);
3707 if (PLT_LOCAL_IFUNC_P (info, h))
3708 {
3709 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
3710 h->root.root.string,
3711 h->root.u.def.section->owner);
3712
3713 /* If an STT_GNU_IFUNC symbol is locally defined, generate
3714 R_386_IRELATIVE instead of R_386_JUMP_SLOT. Store addend
3715 in the .got.plt section. */
3716 bfd_put_32 (output_bfd,
3717 (h->root.u.def.value
3718 + h->root.u.def.section->output_section->vma
3719 + h->root.u.def.section->output_offset),
3720 gotplt->contents + got_offset);
3721 rel.r_info = ELF32_R_INFO (0, R_386_IRELATIVE);
3722
3723 if (htab->params->report_relative_reloc)
3724 _bfd_x86_elf_link_report_relative_reloc
3725 (info, relplt, h, sym, "R_386_IRELATIVE", &rel);
3726
3727 /* R_386_IRELATIVE comes last. */
3728 plt_index = htab->next_irelative_index--;
3729 }
3730 else
3731 {
3732 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_JUMP_SLOT);
3733 plt_index = htab->next_jump_slot_index++;
3734 }
3735
3736 loc = relplt->contents + plt_index * sizeof (Elf32_External_Rel);
3737 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
3738
3739 /* Don't fill the second and third slots in PLT entry for
3740 static executables nor without PLT0. */
3741 if (plt == htab->elf.splt && htab->plt.has_plt0)
3742 {
3743 bfd_put_32 (output_bfd,
3744 plt_index * sizeof (Elf32_External_Rel),
3745 plt->contents + h->plt.offset
3746 + htab->lazy_plt->plt_reloc_offset);
3747 bfd_put_32 (output_bfd,
3748 - (h->plt.offset
3749 + htab->lazy_plt->plt_plt_offset + 4),
3750 (plt->contents + h->plt.offset
3751 + htab->lazy_plt->plt_plt_offset));
3752 }
3753 }
3754 }
3755 else if (eh->plt_got.offset != (bfd_vma) -1)
3756 {
3757 bfd_vma got_offset, plt_offset;
3758 asection *plt, *got, *gotplt;
3759 const bfd_byte *got_plt_entry;
3760
3761 /* Set the entry in the GOT procedure linkage table. */
3762 plt = htab->plt_got;
3763 got = htab->elf.sgot;
3764 gotplt = htab->elf.sgotplt;
3765 got_offset = h->got.offset;
3766
3767 if (got_offset == (bfd_vma) -1
3768 || plt == NULL
3769 || got == NULL
3770 || gotplt == NULL)
3771 abort ();
3772
3773 /* Fill in the entry in the GOT procedure linkage table. */
3774 if (! bfd_link_pic (info))
3775 {
3776 got_plt_entry = htab->non_lazy_plt->plt_entry;
3777 got_offset += got->output_section->vma + got->output_offset;
3778 }
3779 else
3780 {
3781 got_plt_entry = htab->non_lazy_plt->pic_plt_entry;
3782 got_offset += (got->output_section->vma
3783 + got->output_offset
3784 - gotplt->output_section->vma
3785 - gotplt->output_offset);
3786 }
3787
3788 plt_offset = eh->plt_got.offset;
3789 memcpy (plt->contents + plt_offset, got_plt_entry,
3790 htab->non_lazy_plt->plt_entry_size);
3791 bfd_put_32 (output_bfd, got_offset,
3792 (plt->contents + plt_offset
3793 + htab->non_lazy_plt->plt_got_offset));
3794 }
3795
3796 if (!local_undefweak
3797 && !h->def_regular
3798 && (h->plt.offset != (bfd_vma) -1
3799 || eh->plt_got.offset != (bfd_vma) -1))
3800 {
3801 /* Mark the symbol as undefined, rather than as defined in
3802 the .plt section. Leave the value if there were any
3803 relocations where pointer equality matters (this is a clue
3804 for the dynamic linker, to make function pointer
3805 comparisons work between an application and shared
3806 library), otherwise set it to zero. If a function is only
3807 called from a binary, there is no need to slow down
3808 shared libraries because of that. */
3809 sym->st_shndx = SHN_UNDEF;
3810 if (!h->pointer_equality_needed)
3811 sym->st_value = 0;
3812 }
3813
3814 _bfd_x86_elf_link_fixup_ifunc_symbol (info, htab, h, sym);
3815
3816 /* Don't generate dynamic GOT relocation against undefined weak
3817 symbol in executable. */
3818 if (h->got.offset != (bfd_vma) -1
3819 && ! GOT_TLS_GD_ANY_P (elf_x86_hash_entry(h)->tls_type)
3820 && (elf_x86_hash_entry(h)->tls_type & GOT_TLS_IE) == 0
3821 && !local_undefweak)
3822 {
3823 Elf_Internal_Rela rel;
3824 asection *relgot = htab->elf.srelgot;
3825 const char *relative_reloc_name = NULL;
3826 bool generate_dynamic_reloc = true;
3827
3828 /* This symbol has an entry in the global offset table. Set it
3829 up. */
3830
3831 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3832 abort ();
3833
3834 rel.r_offset = (htab->elf.sgot->output_section->vma
3835 + htab->elf.sgot->output_offset
3836 + (h->got.offset & ~(bfd_vma) 1));
3837
3838 /* If this is a static link, or it is a -Bsymbolic link and the
3839 symbol is defined locally or was forced to be local because
3840 of a version file, we just want to emit a RELATIVE reloc.
3841 The entry in the global offset table will already have been
3842 initialized in the relocate_section function. */
3843 if (h->def_regular
3844 && h->type == STT_GNU_IFUNC)
3845 {
3846 if (h->plt.offset == (bfd_vma) -1)
3847 {
3848 /* STT_GNU_IFUNC is referenced without PLT. */
3849 if (htab->elf.splt == NULL)
3850 {
3851 /* use .rel[a].iplt section to store .got relocations
3852 in static executable. */
3853 relgot = htab->elf.irelplt;
3854 }
3855 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
3856 {
3857 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
3858 h->root.root.string,
3859 h->root.u.def.section->owner);
3860
3861 bfd_put_32 (output_bfd,
3862 (h->root.u.def.value
3863 + h->root.u.def.section->output_section->vma
3864 + h->root.u.def.section->output_offset),
3865 htab->elf.sgot->contents + h->got.offset);
3866 rel.r_info = ELF32_R_INFO (0, R_386_IRELATIVE);
3867 relative_reloc_name = "R_386_IRELATIVE";
3868 }
3869 else
3870 goto do_glob_dat;
3871 }
3872 else if (bfd_link_pic (info))
3873 {
3874 /* Generate R_386_GLOB_DAT. */
3875 goto do_glob_dat;
3876 }
3877 else
3878 {
3879 asection *plt;
3880 bfd_vma plt_offset;
3881
3882 if (!h->pointer_equality_needed)
3883 abort ();
3884
3885 /* For non-shared object, we can't use .got.plt, which
3886 contains the real function addres if we need pointer
3887 equality. We load the GOT entry with the PLT entry. */
3888 if (htab->plt_second != NULL)
3889 {
3890 plt = htab->plt_second;
3891 plt_offset = eh->plt_second.offset;
3892 }
3893 else
3894 {
3895 plt = htab->elf.splt ? htab->elf.splt : htab->elf.iplt;
3896 plt_offset = h->plt.offset;
3897 }
3898 bfd_put_32 (output_bfd,
3899 (plt->output_section->vma
3900 + plt->output_offset + plt_offset),
3901 htab->elf.sgot->contents + h->got.offset);
3902 return true;
3903 }
3904 }
3905 else if (bfd_link_pic (info)
3906 && SYMBOL_REFERENCES_LOCAL_P (info, h))
3907 {
3908 BFD_ASSERT((h->got.offset & 1) != 0);
3909 if (info->enable_dt_relr)
3910 generate_dynamic_reloc = false;
3911 else
3912 {
3913 rel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
3914 relative_reloc_name = "R_386_RELATIVE";
3915 }
3916 }
3917 else
3918 {
3919 BFD_ASSERT((h->got.offset & 1) == 0);
3920 do_glob_dat:
3921 bfd_put_32 (output_bfd, (bfd_vma) 0,
3922 htab->elf.sgot->contents + h->got.offset);
3923 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_GLOB_DAT);
3924 }
3925
3926 if (generate_dynamic_reloc)
3927 {
3928 if (relative_reloc_name != NULL
3929 && htab->params->report_relative_reloc)
3930 _bfd_x86_elf_link_report_relative_reloc
3931 (info, relgot, h, sym, relative_reloc_name, &rel);
3932
3933 elf_append_rel (output_bfd, relgot, &rel);
3934 }
3935 }
3936
3937 if (h->needs_copy)
3938 {
3939 Elf_Internal_Rela rel;
3940 asection *s;
3941
3942 /* This symbol needs a copy reloc. Set it up. */
3943 VERIFY_COPY_RELOC (h, htab)
3944
3945 rel.r_offset = (h->root.u.def.value
3946 + h->root.u.def.section->output_section->vma
3947 + h->root.u.def.section->output_offset);
3948 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_COPY);
3949 if (h->root.u.def.section == htab->elf.sdynrelro)
3950 s = htab->elf.sreldynrelro;
3951 else
3952 s = htab->elf.srelbss;
3953 elf_append_rel (output_bfd, s, &rel);
3954 }
3955
3956 return true;
3957 }
3958
3959 /* Finish up local dynamic symbol handling. We set the contents of
3960 various dynamic sections here. */
3961
3962 static int
3963 elf_i386_finish_local_dynamic_symbol (void **slot, void *inf)
3964 {
3965 struct elf_link_hash_entry *h
3966 = (struct elf_link_hash_entry *) *slot;
3967 struct bfd_link_info *info
3968 = (struct bfd_link_info *) inf;
3969
3970 return elf_i386_finish_dynamic_symbol (info->output_bfd, info,
3971 h, NULL);
3972 }
3973
3974 /* Finish up undefined weak symbol handling in PIE. Fill its PLT entry
3975 here since undefined weak symbol may not be dynamic and may not be
3976 called for elf_i386_finish_dynamic_symbol. */
3977
3978 static bool
3979 elf_i386_pie_finish_undefweak_symbol (struct bfd_hash_entry *bh,
3980 void *inf)
3981 {
3982 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) bh;
3983 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3984
3985 if (h->root.type != bfd_link_hash_undefweak
3986 || h->dynindx != -1)
3987 return true;
3988
3989 return elf_i386_finish_dynamic_symbol (info->output_bfd,
3990 info, h, NULL);
3991 }
3992
3993 /* Used to decide how to sort relocs in an optimal manner for the
3994 dynamic linker, before writing them out. */
3995
3996 static enum elf_reloc_type_class
3997 elf_i386_reloc_type_class (const struct bfd_link_info *info,
3998 const asection *rel_sec ATTRIBUTE_UNUSED,
3999 const Elf_Internal_Rela *rela)
4000 {
4001 bfd *abfd = info->output_bfd;
4002 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4003 struct elf_link_hash_table *htab = elf_hash_table (info);
4004
4005 if (htab->dynsym != NULL
4006 && htab->dynsym->contents != NULL)
4007 {
4008 /* Check relocation against STT_GNU_IFUNC symbol if there are
4009 dynamic symbols. */
4010 unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
4011 if (r_symndx != STN_UNDEF)
4012 {
4013 Elf_Internal_Sym sym;
4014 if (!bed->s->swap_symbol_in (abfd,
4015 (htab->dynsym->contents
4016 + r_symndx * sizeof (Elf32_External_Sym)),
4017 0, &sym))
4018 abort ();
4019
4020 if (ELF32_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
4021 return reloc_class_ifunc;
4022 }
4023 }
4024
4025 switch (ELF32_R_TYPE (rela->r_info))
4026 {
4027 case R_386_IRELATIVE:
4028 return reloc_class_ifunc;
4029 case R_386_RELATIVE:
4030 return reloc_class_relative;
4031 case R_386_JUMP_SLOT:
4032 return reloc_class_plt;
4033 case R_386_COPY:
4034 return reloc_class_copy;
4035 default:
4036 return reloc_class_normal;
4037 }
4038 }
4039
4040 /* Finish up the dynamic sections. */
4041
4042 static bool
4043 elf_i386_finish_dynamic_sections (bfd *output_bfd,
4044 struct bfd_link_info *info)
4045 {
4046 struct elf_x86_link_hash_table *htab;
4047
4048 htab = _bfd_x86_elf_finish_dynamic_sections (output_bfd, info);
4049 if (htab == NULL)
4050 return false;
4051
4052 if (!htab->elf.dynamic_sections_created)
4053 return true;
4054
4055 if (htab->elf.splt && htab->elf.splt->size > 0)
4056 {
4057 if (bfd_is_abs_section (htab->elf.splt->output_section))
4058 {
4059 info->callbacks->einfo
4060 (_("%F%P: discarded output section: `%pA'\n"),
4061 htab->elf.splt);
4062 return false;
4063 }
4064
4065 /* UnixWare sets the entsize of .plt to 4, although that doesn't
4066 really seem like the right value. */
4067 elf_section_data (htab->elf.splt->output_section)
4068 ->this_hdr.sh_entsize = 4;
4069
4070 if (htab->plt.has_plt0)
4071 {
4072 /* Fill in the special first entry in the procedure linkage
4073 table. */
4074 memcpy (htab->elf.splt->contents, htab->plt.plt0_entry,
4075 htab->lazy_plt->plt0_entry_size);
4076 memset (htab->elf.splt->contents + htab->lazy_plt->plt0_entry_size,
4077 htab->plt0_pad_byte,
4078 htab->plt.plt_entry_size - htab->lazy_plt->plt0_entry_size);
4079 if (!bfd_link_pic (info))
4080 {
4081 bfd_put_32 (output_bfd,
4082 (htab->elf.sgotplt->output_section->vma
4083 + htab->elf.sgotplt->output_offset
4084 + 4),
4085 htab->elf.splt->contents
4086 + htab->lazy_plt->plt0_got1_offset);
4087 bfd_put_32 (output_bfd,
4088 (htab->elf.sgotplt->output_section->vma
4089 + htab->elf.sgotplt->output_offset
4090 + 8),
4091 htab->elf.splt->contents
4092 + htab->lazy_plt->plt0_got2_offset);
4093
4094 if (htab->elf.target_os == is_vxworks)
4095 {
4096 Elf_Internal_Rela rel;
4097 int num_plts = (htab->elf.splt->size
4098 / htab->plt.plt_entry_size) - 1;
4099 unsigned char *p;
4100 asection *srelplt2 = htab->srelplt2;
4101
4102 /* Generate a relocation for _GLOBAL_OFFSET_TABLE_
4103 + 4. On IA32 we use REL relocations so the
4104 addend goes in the PLT directly. */
4105 rel.r_offset = (htab->elf.splt->output_section->vma
4106 + htab->elf.splt->output_offset
4107 + htab->lazy_plt->plt0_got1_offset);
4108 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
4109 R_386_32);
4110 bfd_elf32_swap_reloc_out (output_bfd, &rel,
4111 srelplt2->contents);
4112 /* Generate a relocation for _GLOBAL_OFFSET_TABLE_
4113 + 8. */
4114 rel.r_offset = (htab->elf.splt->output_section->vma
4115 + htab->elf.splt->output_offset
4116 + htab->lazy_plt->plt0_got2_offset);
4117 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
4118 R_386_32);
4119 bfd_elf32_swap_reloc_out (output_bfd, &rel,
4120 srelplt2->contents +
4121 sizeof (Elf32_External_Rel));
4122 /* Correct the .rel.plt.unloaded relocations. */
4123 p = srelplt2->contents;
4124 if (bfd_link_pic (info))
4125 p += PLTRESOLVE_RELOCS_SHLIB * sizeof (Elf32_External_Rel);
4126 else
4127 p += PLTRESOLVE_RELOCS * sizeof (Elf32_External_Rel);
4128
4129 for (; num_plts; num_plts--)
4130 {
4131 bfd_elf32_swap_reloc_in (output_bfd, p, &rel);
4132 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
4133 R_386_32);
4134 bfd_elf32_swap_reloc_out (output_bfd, &rel, p);
4135 p += sizeof (Elf32_External_Rel);
4136
4137 bfd_elf32_swap_reloc_in (output_bfd, p, &rel);
4138 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
4139 R_386_32);
4140 bfd_elf32_swap_reloc_out (output_bfd, &rel, p);
4141 p += sizeof (Elf32_External_Rel);
4142 }
4143 }
4144 }
4145 }
4146 }
4147
4148 /* Fill PLT entries for undefined weak symbols in PIE. */
4149 if (bfd_link_pie (info))
4150 bfd_hash_traverse (&info->hash->table,
4151 elf_i386_pie_finish_undefweak_symbol,
4152 info);
4153
4154 return true;
4155 }
4156
4157 /* Fill PLT/GOT entries and allocate dynamic relocations for local
4158 STT_GNU_IFUNC symbols, which aren't in the ELF linker hash table.
4159 It has to be done before elf_link_sort_relocs is called so that
4160 dynamic relocations are properly sorted. */
4161
4162 static bool
4163 elf_i386_output_arch_local_syms
4164 (bfd *output_bfd ATTRIBUTE_UNUSED,
4165 struct bfd_link_info *info,
4166 void *flaginfo ATTRIBUTE_UNUSED,
4167 int (*func) (void *, const char *,
4168 Elf_Internal_Sym *,
4169 asection *,
4170 struct elf_link_hash_entry *) ATTRIBUTE_UNUSED)
4171 {
4172 struct elf_x86_link_hash_table *htab
4173 = elf_x86_hash_table (info, I386_ELF_DATA);
4174 if (htab == NULL)
4175 return false;
4176
4177 /* Fill PLT and GOT entries for local STT_GNU_IFUNC symbols. */
4178 htab_traverse (htab->loc_hash_table,
4179 elf_i386_finish_local_dynamic_symbol,
4180 info);
4181
4182 return true;
4183 }
4184
4185 /* Similar to _bfd_elf_get_synthetic_symtab. Support PLTs with all
4186 dynamic relocations. */
4187
4188 static long
4189 elf_i386_get_synthetic_symtab (bfd *abfd,
4190 long symcount ATTRIBUTE_UNUSED,
4191 asymbol **syms ATTRIBUTE_UNUSED,
4192 long dynsymcount,
4193 asymbol **dynsyms,
4194 asymbol **ret)
4195 {
4196 long count, i, n;
4197 int j;
4198 bfd_byte *plt_contents;
4199 long relsize;
4200 const struct elf_x86_lazy_plt_layout *lazy_plt;
4201 const struct elf_x86_non_lazy_plt_layout *non_lazy_plt;
4202 const struct elf_x86_lazy_plt_layout *lazy_ibt_plt;
4203 const struct elf_x86_non_lazy_plt_layout *non_lazy_ibt_plt;
4204 asection *plt;
4205 bfd_vma got_addr;
4206 enum elf_x86_plt_type plt_type;
4207 struct elf_x86_plt plts[] =
4208 {
4209 { ".plt", NULL, NULL, plt_unknown, 0, 0, 0, 0 },
4210 { ".plt.got", NULL, NULL, plt_non_lazy, 0, 0, 0, 0 },
4211 { ".plt.sec", NULL, NULL, plt_second, 0, 0, 0, 0 },
4212 { NULL, NULL, NULL, plt_non_lazy, 0, 0, 0, 0 }
4213 };
4214
4215 *ret = NULL;
4216
4217 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
4218 return 0;
4219
4220 if (dynsymcount <= 0)
4221 return 0;
4222
4223 relsize = bfd_get_dynamic_reloc_upper_bound (abfd);
4224 if (relsize <= 0)
4225 return -1;
4226
4227 non_lazy_plt = NULL;
4228 /* Silence GCC 6. */
4229 lazy_plt = NULL;
4230 non_lazy_ibt_plt = NULL;
4231 lazy_ibt_plt = NULL;
4232 switch (get_elf_backend_data (abfd)->target_os)
4233 {
4234 case is_normal:
4235 case is_solaris:
4236 non_lazy_plt = &elf_i386_non_lazy_plt;
4237 lazy_ibt_plt = &elf_i386_lazy_ibt_plt;
4238 non_lazy_ibt_plt = &elf_i386_non_lazy_ibt_plt;
4239 /* Fall through */
4240 case is_vxworks:
4241 lazy_plt = &elf_i386_lazy_plt;
4242 break;
4243 default:
4244 abort ();
4245 }
4246
4247 got_addr = 0;
4248
4249 count = 0;
4250 for (j = 0; plts[j].name != NULL; j++)
4251 {
4252 plt = bfd_get_section_by_name (abfd, plts[j].name);
4253 if (plt == NULL || plt->size == 0)
4254 continue;
4255
4256 /* Get the PLT section contents. */
4257 plt_contents = (bfd_byte *) bfd_malloc (plt->size);
4258 if (plt_contents == NULL)
4259 break;
4260 if (!bfd_get_section_contents (abfd, (asection *) plt,
4261 plt_contents, 0, plt->size))
4262 {
4263 free (plt_contents);
4264 break;
4265 }
4266
4267 /* Check what kind of PLT it is. */
4268 plt_type = plt_unknown;
4269 if (plts[j].type == plt_unknown
4270 && (plt->size >= (lazy_plt->plt0_entry_size
4271 + lazy_plt->plt_entry_size)))
4272 {
4273 /* Match lazy PLT first. */
4274 if (memcmp (plt_contents, lazy_plt->plt0_entry,
4275 lazy_plt->plt0_got1_offset) == 0)
4276 {
4277 /* The fist entry in the lazy IBT PLT is the same as the
4278 normal lazy PLT. */
4279 if (lazy_ibt_plt != NULL
4280 && (memcmp (plt_contents + lazy_ibt_plt->plt0_entry_size,
4281 lazy_ibt_plt->plt_entry,
4282 lazy_ibt_plt->plt_got_offset) == 0))
4283 plt_type = plt_lazy | plt_second;
4284 else
4285 plt_type = plt_lazy;
4286 }
4287 else if (memcmp (plt_contents, lazy_plt->pic_plt0_entry,
4288 lazy_plt->plt0_got1_offset) == 0)
4289 {
4290 /* The fist entry in the PIC lazy IBT PLT is the same as
4291 the normal PIC lazy PLT. */
4292 if (lazy_ibt_plt != NULL
4293 && (memcmp (plt_contents + lazy_ibt_plt->plt0_entry_size,
4294 lazy_ibt_plt->pic_plt_entry,
4295 lazy_ibt_plt->plt_got_offset) == 0))
4296 plt_type = plt_lazy | plt_pic | plt_second;
4297 else
4298 plt_type = plt_lazy | plt_pic;
4299 }
4300 }
4301
4302 if (non_lazy_plt != NULL
4303 && (plt_type == plt_unknown || plt_type == plt_non_lazy)
4304 && plt->size >= non_lazy_plt->plt_entry_size)
4305 {
4306 /* Match non-lazy PLT. */
4307 if (memcmp (plt_contents, non_lazy_plt->plt_entry,
4308 non_lazy_plt->plt_got_offset) == 0)
4309 plt_type = plt_non_lazy;
4310 else if (memcmp (plt_contents, non_lazy_plt->pic_plt_entry,
4311 non_lazy_plt->plt_got_offset) == 0)
4312 plt_type = plt_pic;
4313 }
4314
4315 if ((non_lazy_ibt_plt != NULL)
4316 && (plt_type == plt_unknown || plt_type == plt_second)
4317 && plt->size >= non_lazy_ibt_plt->plt_entry_size)
4318 {
4319 if (memcmp (plt_contents,
4320 non_lazy_ibt_plt->plt_entry,
4321 non_lazy_ibt_plt->plt_got_offset) == 0)
4322 {
4323 /* Match IBT PLT. */
4324 plt_type = plt_second;
4325 non_lazy_plt = non_lazy_ibt_plt;
4326 }
4327 else if (memcmp (plt_contents,
4328 non_lazy_ibt_plt->pic_plt_entry,
4329 non_lazy_ibt_plt->plt_got_offset) == 0)
4330 {
4331 /* Match PIC IBT PLT. */
4332 plt_type = plt_second | plt_pic;
4333 non_lazy_plt = non_lazy_ibt_plt;
4334 }
4335 }
4336
4337 if (plt_type == plt_unknown)
4338 {
4339 free (plt_contents);
4340 continue;
4341 }
4342
4343 plts[j].sec = plt;
4344 plts[j].type = plt_type;
4345
4346 if ((plt_type & plt_lazy))
4347 {
4348 plts[j].plt_got_offset = lazy_plt->plt_got_offset;
4349 plts[j].plt_entry_size = lazy_plt->plt_entry_size;
4350 /* Skip PLT0 in lazy PLT. */
4351 i = 1;
4352 }
4353 else
4354 {
4355 plts[j].plt_got_offset = non_lazy_plt->plt_got_offset;
4356 plts[j].plt_entry_size = non_lazy_plt->plt_entry_size;
4357 i = 0;
4358 }
4359
4360 /* Skip lazy PLT when the second PLT is used. */
4361 if ((plt_type & (plt_lazy | plt_second))
4362 == (plt_lazy | plt_second))
4363 plts[j].count = 0;
4364 else
4365 {
4366 n = plt->size / plts[j].plt_entry_size;
4367 plts[j].count = n;
4368 count += n - i;
4369 }
4370
4371 plts[j].contents = plt_contents;
4372
4373 /* The _GLOBAL_OFFSET_TABLE_ address is needed. */
4374 if ((plt_type & plt_pic))
4375 got_addr = (bfd_vma) -1;
4376 }
4377
4378 return _bfd_x86_elf_get_synthetic_symtab (abfd, count, relsize,
4379 got_addr, plts, dynsyms,
4380 ret);
4381 }
4382
4383 /* Set up i386 GNU properties. Return the first relocatable ELF input
4384 with GNU properties if found. Otherwise, return NULL. */
4385
4386 static bfd *
4387 elf_i386_link_setup_gnu_properties (struct bfd_link_info *info)
4388 {
4389 struct elf_x86_init_table init_table;
4390
4391 switch (get_elf_backend_data (info->output_bfd)->target_os)
4392 {
4393 case is_normal:
4394 case is_solaris:
4395 init_table.plt0_pad_byte = 0x0;
4396 init_table.lazy_plt = &elf_i386_lazy_plt;
4397 init_table.non_lazy_plt = &elf_i386_non_lazy_plt;
4398 init_table.lazy_ibt_plt = &elf_i386_lazy_ibt_plt;
4399 init_table.non_lazy_ibt_plt = &elf_i386_non_lazy_ibt_plt;
4400 break;
4401 case is_vxworks:
4402 init_table.plt0_pad_byte = 0x90;
4403 init_table.lazy_plt = &elf_i386_lazy_plt;
4404 init_table.non_lazy_plt = NULL;
4405 init_table.lazy_ibt_plt = NULL;
4406 init_table.non_lazy_ibt_plt = NULL;
4407 break;
4408 default:
4409 abort ();
4410 }
4411
4412 init_table.r_info = elf32_r_info;
4413 init_table.r_sym = elf32_r_sym;
4414
4415 return _bfd_x86_elf_link_setup_gnu_properties (info, &init_table);
4416 }
4417
4418 #define TARGET_LITTLE_SYM i386_elf32_vec
4419 #define TARGET_LITTLE_NAME "elf32-i386"
4420 #define ELF_ARCH bfd_arch_i386
4421 #define ELF_TARGET_ID I386_ELF_DATA
4422 #define ELF_MACHINE_CODE EM_386
4423 #define ELF_MAXPAGESIZE 0x1000
4424
4425 #define elf_backend_can_gc_sections 1
4426 #define elf_backend_can_refcount 1
4427 #define elf_backend_want_got_plt 1
4428 #define elf_backend_plt_readonly 1
4429 #define elf_backend_want_plt_sym 0
4430 #define elf_backend_got_header_size 12
4431 #define elf_backend_plt_alignment 4
4432 #define elf_backend_dtrel_excludes_plt 1
4433 #define elf_backend_caches_rawsize 1
4434 #define elf_backend_want_dynrelro 1
4435
4436 /* Support RELA for objdump of prelink objects. */
4437 #define elf_info_to_howto elf_i386_info_to_howto_rel
4438 #define elf_info_to_howto_rel elf_i386_info_to_howto_rel
4439
4440 #define bfd_elf32_bfd_is_local_label_name elf_i386_is_local_label_name
4441 #define bfd_elf32_bfd_reloc_type_lookup elf_i386_reloc_type_lookup
4442 #define bfd_elf32_bfd_reloc_name_lookup elf_i386_reloc_name_lookup
4443 #define bfd_elf32_get_synthetic_symtab elf_i386_get_synthetic_symtab
4444
4445 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
4446 #define elf_backend_always_size_sections elf_i386_always_size_sections
4447 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
4448 #define elf_backend_fake_sections elf_i386_fake_sections
4449 #define elf_backend_finish_dynamic_sections elf_i386_finish_dynamic_sections
4450 #define elf_backend_finish_dynamic_symbol elf_i386_finish_dynamic_symbol
4451 #define elf_backend_output_arch_local_syms elf_i386_output_arch_local_syms
4452 #define elf_backend_grok_prstatus elf_i386_grok_prstatus
4453 #define elf_backend_grok_psinfo elf_i386_grok_psinfo
4454 #define elf_backend_reloc_type_class elf_i386_reloc_type_class
4455 #define elf_backend_relocate_section elf_i386_relocate_section
4456 #define elf_backend_setup_gnu_properties elf_i386_link_setup_gnu_properties
4457 #define elf_backend_hide_symbol _bfd_x86_elf_hide_symbol
4458
4459 #define elf_backend_linux_prpsinfo32_ugid16 true
4460
4461 #define elf32_bed elf32_i386_bed
4462
4463 #include "elf32-target.h"
4464
4465 /* FreeBSD support. */
4466
4467 #undef TARGET_LITTLE_SYM
4468 #define TARGET_LITTLE_SYM i386_elf32_fbsd_vec
4469 #undef TARGET_LITTLE_NAME
4470 #define TARGET_LITTLE_NAME "elf32-i386-freebsd"
4471 #undef ELF_OSABI
4472 #define ELF_OSABI ELFOSABI_FREEBSD
4473
4474 /* The kernel recognizes executables as valid only if they carry a
4475 "FreeBSD" label in the ELF header. So we put this label on all
4476 executables and (for simplicity) also all other object files. */
4477
4478 static bool
4479 elf_i386_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
4480 {
4481 if (!_bfd_elf_init_file_header (abfd, info))
4482 return false;
4483
4484 #ifdef OLD_FREEBSD_ABI_LABEL
4485 {
4486 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
4487 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
4488 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
4489 }
4490 #endif
4491 return true;
4492 }
4493
4494 #undef elf_backend_init_file_header
4495 #define elf_backend_init_file_header elf_i386_fbsd_init_file_header
4496 #undef elf32_bed
4497 #define elf32_bed elf32_i386_fbsd_bed
4498
4499 #undef elf_backend_add_symbol_hook
4500
4501 #include "elf32-target.h"
4502
4503 #undef elf_backend_init_file_header
4504
4505 /* Solaris 2. */
4506
4507 #undef TARGET_LITTLE_SYM
4508 #define TARGET_LITTLE_SYM i386_elf32_sol2_vec
4509 #undef TARGET_LITTLE_NAME
4510 #define TARGET_LITTLE_NAME "elf32-i386-sol2"
4511
4512 #undef ELF_TARGET_OS
4513 #define ELF_TARGET_OS is_solaris
4514
4515 /* Restore default: we cannot use ELFOSABI_SOLARIS, otherwise ELFOSABI_NONE
4516 objects won't be recognized. */
4517 #undef ELF_OSABI
4518
4519 #undef elf32_bed
4520 #define elf32_bed elf32_i386_sol2_bed
4521
4522 /* The 32-bit static TLS arena size is rounded to the nearest 8-byte
4523 boundary. */
4524 #undef elf_backend_static_tls_alignment
4525 #define elf_backend_static_tls_alignment 8
4526
4527 /* The Solaris 2 ABI requires a plt symbol on all platforms.
4528
4529 Cf. Linker and Libraries Guide, Ch. 2, Link-Editor, Generating the Output
4530 File, p.63. */
4531 #undef elf_backend_want_plt_sym
4532 #define elf_backend_want_plt_sym 1
4533
4534 #undef elf_backend_strtab_flags
4535 #define elf_backend_strtab_flags SHF_STRINGS
4536
4537 /* Called to set the sh_flags, sh_link and sh_info fields of OSECTION which
4538 has a type >= SHT_LOOS. Returns TRUE if these fields were initialised
4539 FALSE otherwise. ISECTION is the best guess matching section from the
4540 input bfd IBFD, but it might be NULL. */
4541
4542 static bool
4543 elf32_i386_copy_solaris_special_section_fields (const bfd *ibfd ATTRIBUTE_UNUSED,
4544 bfd *obfd ATTRIBUTE_UNUSED,
4545 const Elf_Internal_Shdr *isection ATTRIBUTE_UNUSED,
4546 Elf_Internal_Shdr *osection ATTRIBUTE_UNUSED)
4547 {
4548 /* PR 19938: FIXME: Need to add code for setting the sh_info
4549 and sh_link fields of Solaris specific section types. */
4550 return false;
4551
4552 /* Based upon Oracle Solaris 11.3 Linkers and Libraries Guide, Ch. 13,
4553 Object File Format, Table 13-9 ELF sh_link and sh_info Interpretation:
4554
4555 http://docs.oracle.com/cd/E53394_01/html/E54813/chapter6-94076.html#scrolltoc
4556
4557 The following values should be set:
4558
4559 Type Link Info
4560 -----------------------------------------------------------------------------
4561 SHT_SUNW_ancillary The section header index of 0
4562 [0x6fffffee] the associated string table.
4563
4564 SHT_SUNW_capinfo The section header index of For a dynamic object, the
4565 [0x6ffffff0] the associated symbol table. section header index of
4566 the associated
4567 SHT_SUNW_capchain table,
4568 otherwise 0.
4569
4570 SHT_SUNW_symsort The section header index of 0
4571 [0x6ffffff1] the associated symbol table.
4572
4573 SHT_SUNW_tlssort The section header index of 0
4574 [0x6ffffff2] the associated symbol table.
4575
4576 SHT_SUNW_LDYNSYM The section header index of One greater than the
4577 [0x6ffffff3] the associated string table. symbol table index of the
4578 This index is the same string last local symbol,
4579 table used by the SHT_DYNSYM STB_LOCAL. Since
4580 section. SHT_SUNW_LDYNSYM only
4581 contains local symbols,
4582 sh_info is equivalent to
4583 the number of symbols in
4584 the table.
4585
4586 SHT_SUNW_cap If symbol capabilities exist, If any capabilities refer
4587 [0x6ffffff5] the section header index of to named strings, the
4588 the associated section header index of
4589 SHT_SUNW_capinfo table, the associated string
4590 otherwise 0. table, otherwise 0.
4591
4592 SHT_SUNW_move The section header index of 0
4593 [0x6ffffffa] the associated symbol table.
4594
4595 SHT_SUNW_COMDAT 0 0
4596 [0x6ffffffb]
4597
4598 SHT_SUNW_syminfo The section header index of The section header index
4599 [0x6ffffffc] the associated symbol table. of the associated
4600 .dynamic section.
4601
4602 SHT_SUNW_verdef The section header index of The number of version
4603 [0x6ffffffd] the associated string table. definitions within the
4604 section.
4605
4606 SHT_SUNW_verneed The section header index of The number of version
4607 [0x6ffffffe] the associated string table. dependencies within the
4608 section.
4609
4610 SHT_SUNW_versym The section header index of 0
4611 [0x6fffffff] the associated symbol table. */
4612 }
4613
4614 #undef elf_backend_copy_special_section_fields
4615 #define elf_backend_copy_special_section_fields elf32_i386_copy_solaris_special_section_fields
4616
4617 #include "elf32-target.h"
4618
4619 /* Intel MCU support. */
4620
4621 static bool
4622 elf32_iamcu_elf_object_p (bfd *abfd)
4623 {
4624 /* Set the right machine number for an IAMCU elf32 file. */
4625 bfd_default_set_arch_mach (abfd, bfd_arch_iamcu, bfd_mach_i386_iamcu);
4626 return true;
4627 }
4628
4629 #undef TARGET_LITTLE_SYM
4630 #define TARGET_LITTLE_SYM iamcu_elf32_vec
4631 #undef TARGET_LITTLE_NAME
4632 #define TARGET_LITTLE_NAME "elf32-iamcu"
4633 #undef ELF_ARCH
4634 #define ELF_ARCH bfd_arch_iamcu
4635
4636 #undef ELF_MACHINE_CODE
4637 #define ELF_MACHINE_CODE EM_IAMCU
4638
4639 #undef ELF_TARGET_OS
4640 #undef ELF_OSABI
4641
4642 #undef elf32_bed
4643 #define elf32_bed elf32_iamcu_bed
4644
4645 #undef elf_backend_object_p
4646 #define elf_backend_object_p elf32_iamcu_elf_object_p
4647
4648 #undef elf_backend_static_tls_alignment
4649
4650 #undef elf_backend_want_plt_sym
4651 #define elf_backend_want_plt_sym 0
4652
4653 #undef elf_backend_strtab_flags
4654 #undef elf_backend_copy_special_section_fields
4655
4656 #include "elf32-target.h"
4657
4658 /* Restore defaults. */
4659 #undef ELF_ARCH
4660 #define ELF_ARCH bfd_arch_i386
4661 #undef ELF_MACHINE_CODE
4662 #define ELF_MACHINE_CODE EM_386
4663 #undef elf_backend_object_p
4664
4665 /* VxWorks support. */
4666
4667 #undef TARGET_LITTLE_SYM
4668 #define TARGET_LITTLE_SYM i386_elf32_vxworks_vec
4669 #undef TARGET_LITTLE_NAME
4670 #define TARGET_LITTLE_NAME "elf32-i386-vxworks"
4671 #undef ELF_OSABI
4672 #undef ELF_MAXPAGESIZE
4673 #define ELF_MAXPAGESIZE 0x1000
4674 #undef elf_backend_plt_alignment
4675 #define elf_backend_plt_alignment 4
4676
4677 #undef ELF_TARGET_OS
4678 #define ELF_TARGET_OS is_vxworks
4679
4680 #undef elf_backend_relocs_compatible
4681 #undef elf_backend_add_symbol_hook
4682 #define elf_backend_add_symbol_hook \
4683 elf_vxworks_add_symbol_hook
4684 #undef elf_backend_link_output_symbol_hook
4685 #define elf_backend_link_output_symbol_hook \
4686 elf_vxworks_link_output_symbol_hook
4687 #undef elf_backend_emit_relocs
4688 #define elf_backend_emit_relocs elf_vxworks_emit_relocs
4689 #undef elf_backend_final_write_processing
4690 #define elf_backend_final_write_processing \
4691 elf_vxworks_final_write_processing
4692 #undef elf_backend_static_tls_alignment
4693
4694 /* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
4695 define it. */
4696 #undef elf_backend_want_plt_sym
4697 #define elf_backend_want_plt_sym 1
4698
4699 #undef elf32_bed
4700 #define elf32_bed elf32_i386_vxworks_bed
4701
4702 #include "elf32-target.h"