x86: Make protected symbols local for -shared
[binutils-gdb.git] / bfd / elf64-x86-64.c
1 /* X86-64 specific support for ELF
2 Copyright (C) 2000-2022 Free Software Foundation, Inc.
3 Contributed by Jan Hubicka <jh@suse.cz>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "elfxx-x86.h"
23 #include "dwarf2.h"
24 #include "libiberty.h"
25
26 #include "opcode/i386.h"
27
28 #ifdef CORE_HEADER
29 #include <stdarg.h>
30 #include CORE_HEADER
31 #endif
32
33 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value. */
34 #define MINUS_ONE (~ (bfd_vma) 0)
35
36 /* Since both 32-bit and 64-bit x86-64 encode relocation type in the
37 identical manner, we use ELF32_R_TYPE instead of ELF64_R_TYPE to get
38 relocation type. We also use ELF_ST_TYPE instead of ELF64_ST_TYPE
39 since they are the same. */
40
41 /* The relocation "howto" table. Order of fields:
42 type, rightshift, size, bitsize, pc_relative, bitpos, complain_on_overflow,
43 special_function, name, partial_inplace, src_mask, dst_mask, pcrel_offset. */
44 static reloc_howto_type x86_64_elf_howto_table[] =
45 {
46 HOWTO(R_X86_64_NONE, 0, 0, 0, false, 0, complain_overflow_dont,
47 bfd_elf_generic_reloc, "R_X86_64_NONE", false, 0, 0x00000000,
48 false),
49 HOWTO(R_X86_64_64, 0, 8, 64, false, 0, complain_overflow_dont,
50 bfd_elf_generic_reloc, "R_X86_64_64", false, 0, MINUS_ONE,
51 false),
52 HOWTO(R_X86_64_PC32, 0, 4, 32, true, 0, complain_overflow_signed,
53 bfd_elf_generic_reloc, "R_X86_64_PC32", false, 0, 0xffffffff,
54 true),
55 HOWTO(R_X86_64_GOT32, 0, 4, 32, false, 0, complain_overflow_signed,
56 bfd_elf_generic_reloc, "R_X86_64_GOT32", false, 0, 0xffffffff,
57 false),
58 HOWTO(R_X86_64_PLT32, 0, 4, 32, true, 0, complain_overflow_signed,
59 bfd_elf_generic_reloc, "R_X86_64_PLT32", false, 0, 0xffffffff,
60 true),
61 HOWTO(R_X86_64_COPY, 0, 4, 32, false, 0, complain_overflow_bitfield,
62 bfd_elf_generic_reloc, "R_X86_64_COPY", false, 0, 0xffffffff,
63 false),
64 HOWTO(R_X86_64_GLOB_DAT, 0, 8, 64, false, 0, complain_overflow_dont,
65 bfd_elf_generic_reloc, "R_X86_64_GLOB_DAT", false, 0, MINUS_ONE,
66 false),
67 HOWTO(R_X86_64_JUMP_SLOT, 0, 8, 64, false, 0, complain_overflow_dont,
68 bfd_elf_generic_reloc, "R_X86_64_JUMP_SLOT", false, 0, MINUS_ONE,
69 false),
70 HOWTO(R_X86_64_RELATIVE, 0, 8, 64, false, 0, complain_overflow_dont,
71 bfd_elf_generic_reloc, "R_X86_64_RELATIVE", false, 0, MINUS_ONE,
72 false),
73 HOWTO(R_X86_64_GOTPCREL, 0, 4, 32, true, 0, complain_overflow_signed,
74 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL", false, 0, 0xffffffff,
75 true),
76 HOWTO(R_X86_64_32, 0, 4, 32, false, 0, complain_overflow_unsigned,
77 bfd_elf_generic_reloc, "R_X86_64_32", false, 0, 0xffffffff,
78 false),
79 HOWTO(R_X86_64_32S, 0, 4, 32, false, 0, complain_overflow_signed,
80 bfd_elf_generic_reloc, "R_X86_64_32S", false, 0, 0xffffffff,
81 false),
82 HOWTO(R_X86_64_16, 0, 2, 16, false, 0, complain_overflow_bitfield,
83 bfd_elf_generic_reloc, "R_X86_64_16", false, 0, 0xffff, false),
84 HOWTO(R_X86_64_PC16, 0, 2, 16, true, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_X86_64_PC16", false, 0, 0xffff, true),
86 HOWTO(R_X86_64_8, 0, 1, 8, false, 0, complain_overflow_bitfield,
87 bfd_elf_generic_reloc, "R_X86_64_8", false, 0, 0xff, false),
88 HOWTO(R_X86_64_PC8, 0, 1, 8, true, 0, complain_overflow_signed,
89 bfd_elf_generic_reloc, "R_X86_64_PC8", false, 0, 0xff, true),
90 HOWTO(R_X86_64_DTPMOD64, 0, 8, 64, false, 0, complain_overflow_dont,
91 bfd_elf_generic_reloc, "R_X86_64_DTPMOD64", false, 0, MINUS_ONE,
92 false),
93 HOWTO(R_X86_64_DTPOFF64, 0, 8, 64, false, 0, complain_overflow_dont,
94 bfd_elf_generic_reloc, "R_X86_64_DTPOFF64", false, 0, MINUS_ONE,
95 false),
96 HOWTO(R_X86_64_TPOFF64, 0, 8, 64, false, 0, complain_overflow_dont,
97 bfd_elf_generic_reloc, "R_X86_64_TPOFF64", false, 0, MINUS_ONE,
98 false),
99 HOWTO(R_X86_64_TLSGD, 0, 4, 32, true, 0, complain_overflow_signed,
100 bfd_elf_generic_reloc, "R_X86_64_TLSGD", false, 0, 0xffffffff,
101 true),
102 HOWTO(R_X86_64_TLSLD, 0, 4, 32, true, 0, complain_overflow_signed,
103 bfd_elf_generic_reloc, "R_X86_64_TLSLD", false, 0, 0xffffffff,
104 true),
105 HOWTO(R_X86_64_DTPOFF32, 0, 4, 32, false, 0, complain_overflow_signed,
106 bfd_elf_generic_reloc, "R_X86_64_DTPOFF32", false, 0, 0xffffffff,
107 false),
108 HOWTO(R_X86_64_GOTTPOFF, 0, 4, 32, true, 0, complain_overflow_signed,
109 bfd_elf_generic_reloc, "R_X86_64_GOTTPOFF", false, 0, 0xffffffff,
110 true),
111 HOWTO(R_X86_64_TPOFF32, 0, 4, 32, false, 0, complain_overflow_signed,
112 bfd_elf_generic_reloc, "R_X86_64_TPOFF32", false, 0, 0xffffffff,
113 false),
114 HOWTO(R_X86_64_PC64, 0, 8, 64, true, 0, complain_overflow_dont,
115 bfd_elf_generic_reloc, "R_X86_64_PC64", false, 0, MINUS_ONE,
116 true),
117 HOWTO(R_X86_64_GOTOFF64, 0, 8, 64, false, 0, complain_overflow_dont,
118 bfd_elf_generic_reloc, "R_X86_64_GOTOFF64", false, 0, MINUS_ONE,
119 false),
120 HOWTO(R_X86_64_GOTPC32, 0, 4, 32, true, 0, complain_overflow_signed,
121 bfd_elf_generic_reloc, "R_X86_64_GOTPC32", false, 0, 0xffffffff,
122 true),
123 HOWTO(R_X86_64_GOT64, 0, 8, 64, false, 0, complain_overflow_signed,
124 bfd_elf_generic_reloc, "R_X86_64_GOT64", false, 0, MINUS_ONE,
125 false),
126 HOWTO(R_X86_64_GOTPCREL64, 0, 8, 64, true, 0, complain_overflow_signed,
127 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL64", false, 0, MINUS_ONE,
128 true),
129 HOWTO(R_X86_64_GOTPC64, 0, 8, 64, true, 0, complain_overflow_signed,
130 bfd_elf_generic_reloc, "R_X86_64_GOTPC64", false, 0, MINUS_ONE,
131 true),
132 HOWTO(R_X86_64_GOTPLT64, 0, 8, 64, false, 0, complain_overflow_signed,
133 bfd_elf_generic_reloc, "R_X86_64_GOTPLT64", false, 0, MINUS_ONE,
134 false),
135 HOWTO(R_X86_64_PLTOFF64, 0, 8, 64, false, 0, complain_overflow_signed,
136 bfd_elf_generic_reloc, "R_X86_64_PLTOFF64", false, 0, MINUS_ONE,
137 false),
138 HOWTO(R_X86_64_SIZE32, 0, 4, 32, false, 0, complain_overflow_unsigned,
139 bfd_elf_generic_reloc, "R_X86_64_SIZE32", false, 0, 0xffffffff,
140 false),
141 HOWTO(R_X86_64_SIZE64, 0, 8, 64, false, 0, complain_overflow_dont,
142 bfd_elf_generic_reloc, "R_X86_64_SIZE64", false, 0, MINUS_ONE,
143 false),
144 HOWTO(R_X86_64_GOTPC32_TLSDESC, 0, 4, 32, true, 0,
145 complain_overflow_bitfield, bfd_elf_generic_reloc,
146 "R_X86_64_GOTPC32_TLSDESC", false, 0, 0xffffffff, true),
147 HOWTO(R_X86_64_TLSDESC_CALL, 0, 0, 0, false, 0,
148 complain_overflow_dont, bfd_elf_generic_reloc,
149 "R_X86_64_TLSDESC_CALL",
150 false, 0, 0, false),
151 HOWTO(R_X86_64_TLSDESC, 0, 8, 64, false, 0,
152 complain_overflow_dont, bfd_elf_generic_reloc,
153 "R_X86_64_TLSDESC", false, 0, MINUS_ONE, false),
154 HOWTO(R_X86_64_IRELATIVE, 0, 8, 64, false, 0, complain_overflow_dont,
155 bfd_elf_generic_reloc, "R_X86_64_IRELATIVE", false, 0, MINUS_ONE,
156 false),
157 HOWTO(R_X86_64_RELATIVE64, 0, 8, 64, false, 0, complain_overflow_dont,
158 bfd_elf_generic_reloc, "R_X86_64_RELATIVE64", false, 0, MINUS_ONE,
159 false),
160 HOWTO(R_X86_64_PC32_BND, 0, 4, 32, true, 0, complain_overflow_signed,
161 bfd_elf_generic_reloc, "R_X86_64_PC32_BND", false, 0, 0xffffffff,
162 true),
163 HOWTO(R_X86_64_PLT32_BND, 0, 4, 32, true, 0, complain_overflow_signed,
164 bfd_elf_generic_reloc, "R_X86_64_PLT32_BND", false, 0, 0xffffffff,
165 true),
166 HOWTO(R_X86_64_GOTPCRELX, 0, 4, 32, true, 0, complain_overflow_signed,
167 bfd_elf_generic_reloc, "R_X86_64_GOTPCRELX", false, 0, 0xffffffff,
168 true),
169 HOWTO(R_X86_64_REX_GOTPCRELX, 0, 4, 32, true, 0, complain_overflow_signed,
170 bfd_elf_generic_reloc, "R_X86_64_REX_GOTPCRELX", false, 0, 0xffffffff,
171 true),
172
173 /* We have a gap in the reloc numbers here.
174 R_X86_64_standard counts the number up to this point, and
175 R_X86_64_vt_offset is the value to subtract from a reloc type of
176 R_X86_64_GNU_VT* to form an index into this table. */
177 #define R_X86_64_standard (R_X86_64_REX_GOTPCRELX + 1)
178 #define R_X86_64_vt_offset (R_X86_64_GNU_VTINHERIT - R_X86_64_standard)
179
180 /* GNU extension to record C++ vtable hierarchy. */
181 HOWTO (R_X86_64_GNU_VTINHERIT, 0, 8, 0, false, 0, complain_overflow_dont,
182 NULL, "R_X86_64_GNU_VTINHERIT", false, 0, 0, false),
183
184 /* GNU extension to record C++ vtable member usage. */
185 HOWTO (R_X86_64_GNU_VTENTRY, 0, 8, 0, false, 0, complain_overflow_dont,
186 _bfd_elf_rel_vtable_reloc_fn, "R_X86_64_GNU_VTENTRY", false, 0, 0,
187 false),
188
189 /* Use complain_overflow_bitfield on R_X86_64_32 for x32. */
190 HOWTO(R_X86_64_32, 0, 4, 32, false, 0, complain_overflow_bitfield,
191 bfd_elf_generic_reloc, "R_X86_64_32", false, 0, 0xffffffff,
192 false)
193 };
194
195 /* Map BFD relocs to the x86_64 elf relocs. */
196 struct elf_reloc_map
197 {
198 bfd_reloc_code_real_type bfd_reloc_val;
199 unsigned char elf_reloc_val;
200 };
201
202 static const struct elf_reloc_map x86_64_reloc_map[] =
203 {
204 { BFD_RELOC_NONE, R_X86_64_NONE, },
205 { BFD_RELOC_64, R_X86_64_64, },
206 { BFD_RELOC_32_PCREL, R_X86_64_PC32, },
207 { BFD_RELOC_X86_64_GOT32, R_X86_64_GOT32,},
208 { BFD_RELOC_X86_64_PLT32, R_X86_64_PLT32,},
209 { BFD_RELOC_X86_64_COPY, R_X86_64_COPY, },
210 { BFD_RELOC_X86_64_GLOB_DAT, R_X86_64_GLOB_DAT, },
211 { BFD_RELOC_X86_64_JUMP_SLOT, R_X86_64_JUMP_SLOT, },
212 { BFD_RELOC_X86_64_RELATIVE, R_X86_64_RELATIVE, },
213 { BFD_RELOC_X86_64_GOTPCREL, R_X86_64_GOTPCREL, },
214 { BFD_RELOC_32, R_X86_64_32, },
215 { BFD_RELOC_X86_64_32S, R_X86_64_32S, },
216 { BFD_RELOC_16, R_X86_64_16, },
217 { BFD_RELOC_16_PCREL, R_X86_64_PC16, },
218 { BFD_RELOC_8, R_X86_64_8, },
219 { BFD_RELOC_8_PCREL, R_X86_64_PC8, },
220 { BFD_RELOC_X86_64_DTPMOD64, R_X86_64_DTPMOD64, },
221 { BFD_RELOC_X86_64_DTPOFF64, R_X86_64_DTPOFF64, },
222 { BFD_RELOC_X86_64_TPOFF64, R_X86_64_TPOFF64, },
223 { BFD_RELOC_X86_64_TLSGD, R_X86_64_TLSGD, },
224 { BFD_RELOC_X86_64_TLSLD, R_X86_64_TLSLD, },
225 { BFD_RELOC_X86_64_DTPOFF32, R_X86_64_DTPOFF32, },
226 { BFD_RELOC_X86_64_GOTTPOFF, R_X86_64_GOTTPOFF, },
227 { BFD_RELOC_X86_64_TPOFF32, R_X86_64_TPOFF32, },
228 { BFD_RELOC_64_PCREL, R_X86_64_PC64, },
229 { BFD_RELOC_X86_64_GOTOFF64, R_X86_64_GOTOFF64, },
230 { BFD_RELOC_X86_64_GOTPC32, R_X86_64_GOTPC32, },
231 { BFD_RELOC_X86_64_GOT64, R_X86_64_GOT64, },
232 { BFD_RELOC_X86_64_GOTPCREL64,R_X86_64_GOTPCREL64, },
233 { BFD_RELOC_X86_64_GOTPC64, R_X86_64_GOTPC64, },
234 { BFD_RELOC_X86_64_GOTPLT64, R_X86_64_GOTPLT64, },
235 { BFD_RELOC_X86_64_PLTOFF64, R_X86_64_PLTOFF64, },
236 { BFD_RELOC_SIZE32, R_X86_64_SIZE32, },
237 { BFD_RELOC_SIZE64, R_X86_64_SIZE64, },
238 { BFD_RELOC_X86_64_GOTPC32_TLSDESC, R_X86_64_GOTPC32_TLSDESC, },
239 { BFD_RELOC_X86_64_TLSDESC_CALL, R_X86_64_TLSDESC_CALL, },
240 { BFD_RELOC_X86_64_TLSDESC, R_X86_64_TLSDESC, },
241 { BFD_RELOC_X86_64_IRELATIVE, R_X86_64_IRELATIVE, },
242 { BFD_RELOC_X86_64_PC32_BND, R_X86_64_PC32_BND, },
243 { BFD_RELOC_X86_64_PLT32_BND, R_X86_64_PLT32_BND, },
244 { BFD_RELOC_X86_64_GOTPCRELX, R_X86_64_GOTPCRELX, },
245 { BFD_RELOC_X86_64_REX_GOTPCRELX, R_X86_64_REX_GOTPCRELX, },
246 { BFD_RELOC_VTABLE_INHERIT, R_X86_64_GNU_VTINHERIT, },
247 { BFD_RELOC_VTABLE_ENTRY, R_X86_64_GNU_VTENTRY, },
248 };
249
250 static reloc_howto_type *
251 elf_x86_64_rtype_to_howto (bfd *abfd, unsigned r_type)
252 {
253 unsigned i;
254
255 if (r_type == (unsigned int) R_X86_64_32)
256 {
257 if (ABI_64_P (abfd))
258 i = r_type;
259 else
260 i = ARRAY_SIZE (x86_64_elf_howto_table) - 1;
261 }
262 else if (r_type < (unsigned int) R_X86_64_GNU_VTINHERIT
263 || r_type >= (unsigned int) R_X86_64_max)
264 {
265 if (r_type >= (unsigned int) R_X86_64_standard)
266 {
267 /* xgettext:c-format */
268 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
269 abfd, r_type);
270 bfd_set_error (bfd_error_bad_value);
271 return NULL;
272 }
273 i = r_type;
274 }
275 else
276 i = r_type - (unsigned int) R_X86_64_vt_offset;
277 BFD_ASSERT (x86_64_elf_howto_table[i].type == r_type);
278 return &x86_64_elf_howto_table[i];
279 }
280
281 /* Given a BFD reloc type, return a HOWTO structure. */
282 static reloc_howto_type *
283 elf_x86_64_reloc_type_lookup (bfd *abfd,
284 bfd_reloc_code_real_type code)
285 {
286 unsigned int i;
287
288 for (i = 0; i < sizeof (x86_64_reloc_map) / sizeof (struct elf_reloc_map);
289 i++)
290 {
291 if (x86_64_reloc_map[i].bfd_reloc_val == code)
292 return elf_x86_64_rtype_to_howto (abfd,
293 x86_64_reloc_map[i].elf_reloc_val);
294 }
295 return NULL;
296 }
297
298 static reloc_howto_type *
299 elf_x86_64_reloc_name_lookup (bfd *abfd,
300 const char *r_name)
301 {
302 unsigned int i;
303
304 if (!ABI_64_P (abfd) && strcasecmp (r_name, "R_X86_64_32") == 0)
305 {
306 /* Get x32 R_X86_64_32. */
307 reloc_howto_type *reloc
308 = &x86_64_elf_howto_table[ARRAY_SIZE (x86_64_elf_howto_table) - 1];
309 BFD_ASSERT (reloc->type == (unsigned int) R_X86_64_32);
310 return reloc;
311 }
312
313 for (i = 0; i < ARRAY_SIZE (x86_64_elf_howto_table); i++)
314 if (x86_64_elf_howto_table[i].name != NULL
315 && strcasecmp (x86_64_elf_howto_table[i].name, r_name) == 0)
316 return &x86_64_elf_howto_table[i];
317
318 return NULL;
319 }
320
321 /* Given an x86_64 ELF reloc type, fill in an arelent structure. */
322
323 static bool
324 elf_x86_64_info_to_howto (bfd *abfd, arelent *cache_ptr,
325 Elf_Internal_Rela *dst)
326 {
327 unsigned r_type;
328
329 r_type = ELF32_R_TYPE (dst->r_info);
330 cache_ptr->howto = elf_x86_64_rtype_to_howto (abfd, r_type);
331 if (cache_ptr->howto == NULL)
332 return false;
333 BFD_ASSERT (r_type == cache_ptr->howto->type || cache_ptr->howto->type == R_X86_64_NONE);
334 return true;
335 }
336 \f
337 /* Support for core dump NOTE sections. */
338 static bool
339 elf_x86_64_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
340 {
341 int offset;
342 size_t size;
343
344 switch (note->descsz)
345 {
346 default:
347 return false;
348
349 case 296: /* sizeof(istruct elf_prstatus) on Linux/x32 */
350 /* pr_cursig */
351 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
352
353 /* pr_pid */
354 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
355
356 /* pr_reg */
357 offset = 72;
358 size = 216;
359
360 break;
361
362 case 336: /* sizeof(istruct elf_prstatus) on Linux/x86_64 */
363 /* pr_cursig */
364 elf_tdata (abfd)->core->signal
365 = bfd_get_16 (abfd, note->descdata + 12);
366
367 /* pr_pid */
368 elf_tdata (abfd)->core->lwpid
369 = bfd_get_32 (abfd, note->descdata + 32);
370
371 /* pr_reg */
372 offset = 112;
373 size = 216;
374
375 break;
376 }
377
378 /* Make a ".reg/999" section. */
379 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
380 size, note->descpos + offset);
381 }
382
383 static bool
384 elf_x86_64_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
385 {
386 switch (note->descsz)
387 {
388 default:
389 return false;
390
391 case 124: /* sizeof(struct elf_prpsinfo) on Linux/x32 */
392 elf_tdata (abfd)->core->pid
393 = bfd_get_32 (abfd, note->descdata + 12);
394 elf_tdata (abfd)->core->program
395 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
396 elf_tdata (abfd)->core->command
397 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
398 break;
399
400 case 136: /* sizeof(struct elf_prpsinfo) on Linux/x86_64 */
401 elf_tdata (abfd)->core->pid
402 = bfd_get_32 (abfd, note->descdata + 24);
403 elf_tdata (abfd)->core->program
404 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
405 elf_tdata (abfd)->core->command
406 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
407 }
408
409 /* Note that for some reason, a spurious space is tacked
410 onto the end of the args in some (at least one anyway)
411 implementations, so strip it off if it exists. */
412
413 {
414 char *command = elf_tdata (abfd)->core->command;
415 int n = strlen (command);
416
417 if (0 < n && command[n - 1] == ' ')
418 command[n - 1] = '\0';
419 }
420
421 return true;
422 }
423
424 #ifdef CORE_HEADER
425 # if GCC_VERSION >= 8000
426 # pragma GCC diagnostic push
427 # pragma GCC diagnostic ignored "-Wstringop-truncation"
428 # endif
429 static char *
430 elf_x86_64_write_core_note (bfd *abfd, char *buf, int *bufsiz,
431 int note_type, ...)
432 {
433 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
434 va_list ap;
435 const char *fname, *psargs;
436 long pid;
437 int cursig;
438 const void *gregs;
439
440 switch (note_type)
441 {
442 default:
443 return NULL;
444
445 case NT_PRPSINFO:
446 va_start (ap, note_type);
447 fname = va_arg (ap, const char *);
448 psargs = va_arg (ap, const char *);
449 va_end (ap);
450
451 if (bed->s->elfclass == ELFCLASS32)
452 {
453 prpsinfo32_t data;
454 memset (&data, 0, sizeof (data));
455 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
456 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
457 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
458 &data, sizeof (data));
459 }
460 else
461 {
462 prpsinfo64_t data;
463 memset (&data, 0, sizeof (data));
464 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
465 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
466 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
467 &data, sizeof (data));
468 }
469 /* NOTREACHED */
470
471 case NT_PRSTATUS:
472 va_start (ap, note_type);
473 pid = va_arg (ap, long);
474 cursig = va_arg (ap, int);
475 gregs = va_arg (ap, const void *);
476 va_end (ap);
477
478 if (bed->s->elfclass == ELFCLASS32)
479 {
480 if (bed->elf_machine_code == EM_X86_64)
481 {
482 prstatusx32_t prstat;
483 memset (&prstat, 0, sizeof (prstat));
484 prstat.pr_pid = pid;
485 prstat.pr_cursig = cursig;
486 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
487 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
488 &prstat, sizeof (prstat));
489 }
490 else
491 {
492 prstatus32_t prstat;
493 memset (&prstat, 0, sizeof (prstat));
494 prstat.pr_pid = pid;
495 prstat.pr_cursig = cursig;
496 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
497 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
498 &prstat, sizeof (prstat));
499 }
500 }
501 else
502 {
503 prstatus64_t prstat;
504 memset (&prstat, 0, sizeof (prstat));
505 prstat.pr_pid = pid;
506 prstat.pr_cursig = cursig;
507 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
508 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
509 &prstat, sizeof (prstat));
510 }
511 }
512 /* NOTREACHED */
513 }
514 # if GCC_VERSION >= 8000
515 # pragma GCC diagnostic pop
516 # endif
517 #endif
518 \f
519 /* Functions for the x86-64 ELF linker. */
520
521 /* The size in bytes of an entry in the global offset table. */
522
523 #define GOT_ENTRY_SIZE 8
524
525 /* The size in bytes of an entry in the lazy procedure linkage table. */
526
527 #define LAZY_PLT_ENTRY_SIZE 16
528
529 /* The size in bytes of an entry in the non-lazy procedure linkage
530 table. */
531
532 #define NON_LAZY_PLT_ENTRY_SIZE 8
533
534 /* The first entry in a lazy procedure linkage table looks like this.
535 See the SVR4 ABI i386 supplement and the x86-64 ABI to see how this
536 works. */
537
538 static const bfd_byte elf_x86_64_lazy_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
539 {
540 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
541 0xff, 0x25, 16, 0, 0, 0, /* jmpq *GOT+16(%rip) */
542 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
543 };
544
545 /* Subsequent entries in a lazy procedure linkage table look like this. */
546
547 static const bfd_byte elf_x86_64_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
548 {
549 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
550 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
551 0x68, /* pushq immediate */
552 0, 0, 0, 0, /* replaced with index into relocation table. */
553 0xe9, /* jmp relative */
554 0, 0, 0, 0 /* replaced with offset to start of .plt0. */
555 };
556
557 /* The first entry in a lazy procedure linkage table with BND prefix
558 like this. */
559
560 static const bfd_byte elf_x86_64_lazy_bnd_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
561 {
562 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
563 0xf2, 0xff, 0x25, 16, 0, 0, 0, /* bnd jmpq *GOT+16(%rip) */
564 0x0f, 0x1f, 0 /* nopl (%rax) */
565 };
566
567 /* Subsequent entries for branches with BND prefx in a lazy procedure
568 linkage table look like this. */
569
570 static const bfd_byte elf_x86_64_lazy_bnd_plt_entry[LAZY_PLT_ENTRY_SIZE] =
571 {
572 0x68, 0, 0, 0, 0, /* pushq immediate */
573 0xf2, 0xe9, 0, 0, 0, 0, /* bnd jmpq relative */
574 0x0f, 0x1f, 0x44, 0, 0 /* nopl 0(%rax,%rax,1) */
575 };
576
577 /* The first entry in the IBT-enabled lazy procedure linkage table is the
578 the same as the lazy PLT with BND prefix so that bound registers are
579 preserved when control is passed to dynamic linker. Subsequent
580 entries for a IBT-enabled lazy procedure linkage table look like
581 this. */
582
583 static const bfd_byte elf_x86_64_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
584 {
585 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
586 0x68, 0, 0, 0, 0, /* pushq immediate */
587 0xf2, 0xe9, 0, 0, 0, 0, /* bnd jmpq relative */
588 0x90 /* nop */
589 };
590
591 /* The first entry in the x32 IBT-enabled lazy procedure linkage table
592 is the same as the normal lazy PLT. Subsequent entries for an
593 x32 IBT-enabled lazy procedure linkage table look like this. */
594
595 static const bfd_byte elf_x32_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
596 {
597 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
598 0x68, 0, 0, 0, 0, /* pushq immediate */
599 0xe9, 0, 0, 0, 0, /* jmpq relative */
600 0x66, 0x90 /* xchg %ax,%ax */
601 };
602
603 /* Entries in the non-lazey procedure linkage table look like this. */
604
605 static const bfd_byte elf_x86_64_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
606 {
607 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
608 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
609 0x66, 0x90 /* xchg %ax,%ax */
610 };
611
612 /* Entries for branches with BND prefix in the non-lazey procedure
613 linkage table look like this. */
614
615 static const bfd_byte elf_x86_64_non_lazy_bnd_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
616 {
617 0xf2, 0xff, 0x25, /* bnd jmpq *name@GOTPC(%rip) */
618 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
619 0x90 /* nop */
620 };
621
622 /* Entries for branches with IBT-enabled in the non-lazey procedure
623 linkage table look like this. They have the same size as the lazy
624 PLT entry. */
625
626 static const bfd_byte elf_x86_64_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
627 {
628 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
629 0xf2, 0xff, 0x25, /* bnd jmpq *name@GOTPC(%rip) */
630 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
631 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopl 0x0(%rax,%rax,1) */
632 };
633
634 /* Entries for branches with IBT-enabled in the x32 non-lazey procedure
635 linkage table look like this. They have the same size as the lazy
636 PLT entry. */
637
638 static const bfd_byte elf_x32_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
639 {
640 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
641 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
642 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
643 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
644 };
645
646 /* The TLSDESC entry in a lazy procedure linkage table. */
647 static const bfd_byte elf_x86_64_tlsdesc_plt_entry[LAZY_PLT_ENTRY_SIZE] =
648 {
649 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
650 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
651 0xff, 0x25, 16, 0, 0, 0 /* jmpq *GOT+TDG(%rip) */
652 };
653
654 /* .eh_frame covering the lazy .plt section. */
655
656 static const bfd_byte elf_x86_64_eh_frame_lazy_plt[] =
657 {
658 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
659 0, 0, 0, 0, /* CIE ID */
660 1, /* CIE version */
661 'z', 'R', 0, /* Augmentation string */
662 1, /* Code alignment factor */
663 0x78, /* Data alignment factor */
664 16, /* Return address column */
665 1, /* Augmentation size */
666 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
667 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
668 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
669 DW_CFA_nop, DW_CFA_nop,
670
671 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
672 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
673 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
674 0, 0, 0, 0, /* .plt size goes here */
675 0, /* Augmentation size */
676 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
677 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
678 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
679 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
680 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
681 11, /* Block length */
682 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
683 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
684 DW_OP_lit15, DW_OP_and, DW_OP_lit11, DW_OP_ge,
685 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
686 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
687 };
688
689 /* .eh_frame covering the lazy BND .plt section. */
690
691 static const bfd_byte elf_x86_64_eh_frame_lazy_bnd_plt[] =
692 {
693 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
694 0, 0, 0, 0, /* CIE ID */
695 1, /* CIE version */
696 'z', 'R', 0, /* Augmentation string */
697 1, /* Code alignment factor */
698 0x78, /* Data alignment factor */
699 16, /* Return address column */
700 1, /* Augmentation size */
701 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
702 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
703 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
704 DW_CFA_nop, DW_CFA_nop,
705
706 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
707 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
708 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
709 0, 0, 0, 0, /* .plt size goes here */
710 0, /* Augmentation size */
711 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
712 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
713 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
714 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
715 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
716 11, /* Block length */
717 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
718 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
719 DW_OP_lit15, DW_OP_and, DW_OP_lit5, DW_OP_ge,
720 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
721 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
722 };
723
724 /* .eh_frame covering the lazy .plt section with IBT-enabled. */
725
726 static const bfd_byte elf_x86_64_eh_frame_lazy_ibt_plt[] =
727 {
728 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
729 0, 0, 0, 0, /* CIE ID */
730 1, /* CIE version */
731 'z', 'R', 0, /* Augmentation string */
732 1, /* Code alignment factor */
733 0x78, /* Data alignment factor */
734 16, /* Return address column */
735 1, /* Augmentation size */
736 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
737 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
738 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
739 DW_CFA_nop, DW_CFA_nop,
740
741 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
742 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
743 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
744 0, 0, 0, 0, /* .plt size goes here */
745 0, /* Augmentation size */
746 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
747 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
748 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
749 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
750 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
751 11, /* Block length */
752 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
753 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
754 DW_OP_lit15, DW_OP_and, DW_OP_lit10, DW_OP_ge,
755 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
756 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
757 };
758
759 /* .eh_frame covering the x32 lazy .plt section with IBT-enabled. */
760
761 static const bfd_byte elf_x32_eh_frame_lazy_ibt_plt[] =
762 {
763 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
764 0, 0, 0, 0, /* CIE ID */
765 1, /* CIE version */
766 'z', 'R', 0, /* Augmentation string */
767 1, /* Code alignment factor */
768 0x78, /* Data alignment factor */
769 16, /* Return address column */
770 1, /* Augmentation size */
771 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
772 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
773 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
774 DW_CFA_nop, DW_CFA_nop,
775
776 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
777 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
778 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
779 0, 0, 0, 0, /* .plt size goes here */
780 0, /* Augmentation size */
781 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
782 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
783 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
784 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
785 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
786 11, /* Block length */
787 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
788 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
789 DW_OP_lit15, DW_OP_and, DW_OP_lit9, DW_OP_ge,
790 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
791 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
792 };
793
794 /* .eh_frame covering the non-lazy .plt section. */
795
796 static const bfd_byte elf_x86_64_eh_frame_non_lazy_plt[] =
797 {
798 #define PLT_GOT_FDE_LENGTH 20
799 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
800 0, 0, 0, 0, /* CIE ID */
801 1, /* CIE version */
802 'z', 'R', 0, /* Augmentation string */
803 1, /* Code alignment factor */
804 0x78, /* Data alignment factor */
805 16, /* Return address column */
806 1, /* Augmentation size */
807 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
808 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
809 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
810 DW_CFA_nop, DW_CFA_nop,
811
812 PLT_GOT_FDE_LENGTH, 0, 0, 0, /* FDE length */
813 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
814 0, 0, 0, 0, /* the start of non-lazy .plt goes here */
815 0, 0, 0, 0, /* non-lazy .plt size goes here */
816 0, /* Augmentation size */
817 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop,
818 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
819 };
820
821 /* These are the standard parameters. */
822 static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_plt =
823 {
824 elf_x86_64_lazy_plt0_entry, /* plt0_entry */
825 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
826 elf_x86_64_lazy_plt_entry, /* plt_entry */
827 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
828 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
829 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
830 6, /* plt_tlsdesc_got1_offset */
831 12, /* plt_tlsdesc_got2_offset */
832 10, /* plt_tlsdesc_got1_insn_end */
833 16, /* plt_tlsdesc_got2_insn_end */
834 2, /* plt0_got1_offset */
835 8, /* plt0_got2_offset */
836 12, /* plt0_got2_insn_end */
837 2, /* plt_got_offset */
838 7, /* plt_reloc_offset */
839 12, /* plt_plt_offset */
840 6, /* plt_got_insn_size */
841 LAZY_PLT_ENTRY_SIZE, /* plt_plt_insn_end */
842 6, /* plt_lazy_offset */
843 elf_x86_64_lazy_plt0_entry, /* pic_plt0_entry */
844 elf_x86_64_lazy_plt_entry, /* pic_plt_entry */
845 elf_x86_64_eh_frame_lazy_plt, /* eh_frame_plt */
846 sizeof (elf_x86_64_eh_frame_lazy_plt) /* eh_frame_plt_size */
847 };
848
849 static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_plt =
850 {
851 elf_x86_64_non_lazy_plt_entry, /* plt_entry */
852 elf_x86_64_non_lazy_plt_entry, /* pic_plt_entry */
853 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
854 2, /* plt_got_offset */
855 6, /* plt_got_insn_size */
856 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
857 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
858 };
859
860 static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_bnd_plt =
861 {
862 elf_x86_64_lazy_bnd_plt0_entry, /* plt0_entry */
863 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
864 elf_x86_64_lazy_bnd_plt_entry, /* plt_entry */
865 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
866 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
867 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
868 6, /* plt_tlsdesc_got1_offset */
869 12, /* plt_tlsdesc_got2_offset */
870 10, /* plt_tlsdesc_got1_insn_end */
871 16, /* plt_tlsdesc_got2_insn_end */
872 2, /* plt0_got1_offset */
873 1+8, /* plt0_got2_offset */
874 1+12, /* plt0_got2_insn_end */
875 1+2, /* plt_got_offset */
876 1, /* plt_reloc_offset */
877 7, /* plt_plt_offset */
878 1+6, /* plt_got_insn_size */
879 11, /* plt_plt_insn_end */
880 0, /* plt_lazy_offset */
881 elf_x86_64_lazy_bnd_plt0_entry, /* pic_plt0_entry */
882 elf_x86_64_lazy_bnd_plt_entry, /* pic_plt_entry */
883 elf_x86_64_eh_frame_lazy_bnd_plt, /* eh_frame_plt */
884 sizeof (elf_x86_64_eh_frame_lazy_bnd_plt) /* eh_frame_plt_size */
885 };
886
887 static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_bnd_plt =
888 {
889 elf_x86_64_non_lazy_bnd_plt_entry, /* plt_entry */
890 elf_x86_64_non_lazy_bnd_plt_entry, /* pic_plt_entry */
891 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
892 1+2, /* plt_got_offset */
893 1+6, /* plt_got_insn_size */
894 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
895 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
896 };
897
898 static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_ibt_plt =
899 {
900 elf_x86_64_lazy_bnd_plt0_entry, /* plt0_entry */
901 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
902 elf_x86_64_lazy_ibt_plt_entry, /* plt_entry */
903 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
904 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
905 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
906 6, /* plt_tlsdesc_got1_offset */
907 12, /* plt_tlsdesc_got2_offset */
908 10, /* plt_tlsdesc_got1_insn_end */
909 16, /* plt_tlsdesc_got2_insn_end */
910 2, /* plt0_got1_offset */
911 1+8, /* plt0_got2_offset */
912 1+12, /* plt0_got2_insn_end */
913 4+1+2, /* plt_got_offset */
914 4+1, /* plt_reloc_offset */
915 4+1+6, /* plt_plt_offset */
916 4+1+6, /* plt_got_insn_size */
917 4+1+5+5, /* plt_plt_insn_end */
918 0, /* plt_lazy_offset */
919 elf_x86_64_lazy_bnd_plt0_entry, /* pic_plt0_entry */
920 elf_x86_64_lazy_ibt_plt_entry, /* pic_plt_entry */
921 elf_x86_64_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
922 sizeof (elf_x86_64_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
923 };
924
925 static const struct elf_x86_lazy_plt_layout elf_x32_lazy_ibt_plt =
926 {
927 elf_x86_64_lazy_plt0_entry, /* plt0_entry */
928 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
929 elf_x32_lazy_ibt_plt_entry, /* plt_entry */
930 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
931 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
932 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
933 6, /* plt_tlsdesc_got1_offset */
934 12, /* plt_tlsdesc_got2_offset */
935 10, /* plt_tlsdesc_got1_insn_end */
936 16, /* plt_tlsdesc_got2_insn_end */
937 2, /* plt0_got1_offset */
938 8, /* plt0_got2_offset */
939 12, /* plt0_got2_insn_end */
940 4+2, /* plt_got_offset */
941 4+1, /* plt_reloc_offset */
942 4+6, /* plt_plt_offset */
943 4+6, /* plt_got_insn_size */
944 4+5+5, /* plt_plt_insn_end */
945 0, /* plt_lazy_offset */
946 elf_x86_64_lazy_plt0_entry, /* pic_plt0_entry */
947 elf_x32_lazy_ibt_plt_entry, /* pic_plt_entry */
948 elf_x32_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
949 sizeof (elf_x32_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
950 };
951
952 static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_ibt_plt =
953 {
954 elf_x86_64_non_lazy_ibt_plt_entry, /* plt_entry */
955 elf_x86_64_non_lazy_ibt_plt_entry, /* pic_plt_entry */
956 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
957 4+1+2, /* plt_got_offset */
958 4+1+6, /* plt_got_insn_size */
959 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
960 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
961 };
962
963 static const struct elf_x86_non_lazy_plt_layout elf_x32_non_lazy_ibt_plt =
964 {
965 elf_x32_non_lazy_ibt_plt_entry, /* plt_entry */
966 elf_x32_non_lazy_ibt_plt_entry, /* pic_plt_entry */
967 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
968 4+2, /* plt_got_offset */
969 4+6, /* plt_got_insn_size */
970 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
971 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
972 };
973
974
975 static bool
976 elf64_x86_64_elf_object_p (bfd *abfd)
977 {
978 /* Set the right machine number for an x86-64 elf64 file. */
979 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x86_64);
980 return true;
981 }
982
983 static bool
984 elf32_x86_64_elf_object_p (bfd *abfd)
985 {
986 /* Set the right machine number for an x86-64 elf32 file. */
987 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x64_32);
988 return true;
989 }
990
991 /* Return TRUE if the TLS access code sequence support transition
992 from R_TYPE. */
993
994 static bool
995 elf_x86_64_check_tls_transition (bfd *abfd,
996 struct bfd_link_info *info,
997 asection *sec,
998 bfd_byte *contents,
999 Elf_Internal_Shdr *symtab_hdr,
1000 struct elf_link_hash_entry **sym_hashes,
1001 unsigned int r_type,
1002 const Elf_Internal_Rela *rel,
1003 const Elf_Internal_Rela *relend)
1004 {
1005 unsigned int val;
1006 unsigned long r_symndx;
1007 bool largepic = false;
1008 struct elf_link_hash_entry *h;
1009 bfd_vma offset;
1010 struct elf_x86_link_hash_table *htab;
1011 bfd_byte *call;
1012 bool indirect_call;
1013
1014 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
1015 offset = rel->r_offset;
1016 switch (r_type)
1017 {
1018 case R_X86_64_TLSGD:
1019 case R_X86_64_TLSLD:
1020 if ((rel + 1) >= relend)
1021 return false;
1022
1023 if (r_type == R_X86_64_TLSGD)
1024 {
1025 /* Check transition from GD access model. For 64bit, only
1026 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
1027 .word 0x6666; rex64; call __tls_get_addr@PLT
1028 or
1029 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
1030 .byte 0x66; rex64
1031 call *__tls_get_addr@GOTPCREL(%rip)
1032 which may be converted to
1033 addr32 call __tls_get_addr
1034 can transit to different access model. For 32bit, only
1035 leaq foo@tlsgd(%rip), %rdi
1036 .word 0x6666; rex64; call __tls_get_addr@PLT
1037 or
1038 leaq foo@tlsgd(%rip), %rdi
1039 .byte 0x66; rex64
1040 call *__tls_get_addr@GOTPCREL(%rip)
1041 which may be converted to
1042 addr32 call __tls_get_addr
1043 can transit to different access model. For largepic,
1044 we also support:
1045 leaq foo@tlsgd(%rip), %rdi
1046 movabsq $__tls_get_addr@pltoff, %rax
1047 addq $r15, %rax
1048 call *%rax
1049 or
1050 leaq foo@tlsgd(%rip), %rdi
1051 movabsq $__tls_get_addr@pltoff, %rax
1052 addq $rbx, %rax
1053 call *%rax */
1054
1055 static const unsigned char leaq[] = { 0x66, 0x48, 0x8d, 0x3d };
1056
1057 if ((offset + 12) > sec->size)
1058 return false;
1059
1060 call = contents + offset + 4;
1061 if (call[0] != 0x66
1062 || !((call[1] == 0x48
1063 && call[2] == 0xff
1064 && call[3] == 0x15)
1065 || (call[1] == 0x48
1066 && call[2] == 0x67
1067 && call[3] == 0xe8)
1068 || (call[1] == 0x66
1069 && call[2] == 0x48
1070 && call[3] == 0xe8)))
1071 {
1072 if (!ABI_64_P (abfd)
1073 || (offset + 19) > sec->size
1074 || offset < 3
1075 || memcmp (call - 7, leaq + 1, 3) != 0
1076 || memcmp (call, "\x48\xb8", 2) != 0
1077 || call[11] != 0x01
1078 || call[13] != 0xff
1079 || call[14] != 0xd0
1080 || !((call[10] == 0x48 && call[12] == 0xd8)
1081 || (call[10] == 0x4c && call[12] == 0xf8)))
1082 return false;
1083 largepic = true;
1084 }
1085 else if (ABI_64_P (abfd))
1086 {
1087 if (offset < 4
1088 || memcmp (contents + offset - 4, leaq, 4) != 0)
1089 return false;
1090 }
1091 else
1092 {
1093 if (offset < 3
1094 || memcmp (contents + offset - 3, leaq + 1, 3) != 0)
1095 return false;
1096 }
1097 indirect_call = call[2] == 0xff;
1098 }
1099 else
1100 {
1101 /* Check transition from LD access model. Only
1102 leaq foo@tlsld(%rip), %rdi;
1103 call __tls_get_addr@PLT
1104 or
1105 leaq foo@tlsld(%rip), %rdi;
1106 call *__tls_get_addr@GOTPCREL(%rip)
1107 which may be converted to
1108 addr32 call __tls_get_addr
1109 can transit to different access model. For largepic
1110 we also support:
1111 leaq foo@tlsld(%rip), %rdi
1112 movabsq $__tls_get_addr@pltoff, %rax
1113 addq $r15, %rax
1114 call *%rax
1115 or
1116 leaq foo@tlsld(%rip), %rdi
1117 movabsq $__tls_get_addr@pltoff, %rax
1118 addq $rbx, %rax
1119 call *%rax */
1120
1121 static const unsigned char lea[] = { 0x48, 0x8d, 0x3d };
1122
1123 if (offset < 3 || (offset + 9) > sec->size)
1124 return false;
1125
1126 if (memcmp (contents + offset - 3, lea, 3) != 0)
1127 return false;
1128
1129 call = contents + offset + 4;
1130 if (!(call[0] == 0xe8
1131 || (call[0] == 0xff && call[1] == 0x15)
1132 || (call[0] == 0x67 && call[1] == 0xe8)))
1133 {
1134 if (!ABI_64_P (abfd)
1135 || (offset + 19) > sec->size
1136 || memcmp (call, "\x48\xb8", 2) != 0
1137 || call[11] != 0x01
1138 || call[13] != 0xff
1139 || call[14] != 0xd0
1140 || !((call[10] == 0x48 && call[12] == 0xd8)
1141 || (call[10] == 0x4c && call[12] == 0xf8)))
1142 return false;
1143 largepic = true;
1144 }
1145 indirect_call = call[0] == 0xff;
1146 }
1147
1148 r_symndx = htab->r_sym (rel[1].r_info);
1149 if (r_symndx < symtab_hdr->sh_info)
1150 return false;
1151
1152 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1153 if (h == NULL
1154 || !((struct elf_x86_link_hash_entry *) h)->tls_get_addr)
1155 return false;
1156 else
1157 {
1158 r_type = (ELF32_R_TYPE (rel[1].r_info)
1159 & ~R_X86_64_converted_reloc_bit);
1160 if (largepic)
1161 return r_type == R_X86_64_PLTOFF64;
1162 else if (indirect_call)
1163 return r_type == R_X86_64_GOTPCRELX;
1164 else
1165 return (r_type == R_X86_64_PC32 || r_type == R_X86_64_PLT32);
1166 }
1167
1168 case R_X86_64_GOTTPOFF:
1169 /* Check transition from IE access model:
1170 mov foo@gottpoff(%rip), %reg
1171 add foo@gottpoff(%rip), %reg
1172 */
1173
1174 /* Check REX prefix first. */
1175 if (offset >= 3 && (offset + 4) <= sec->size)
1176 {
1177 val = bfd_get_8 (abfd, contents + offset - 3);
1178 if (val != 0x48 && val != 0x4c)
1179 {
1180 /* X32 may have 0x44 REX prefix or no REX prefix. */
1181 if (ABI_64_P (abfd))
1182 return false;
1183 }
1184 }
1185 else
1186 {
1187 /* X32 may not have any REX prefix. */
1188 if (ABI_64_P (abfd))
1189 return false;
1190 if (offset < 2 || (offset + 3) > sec->size)
1191 return false;
1192 }
1193
1194 val = bfd_get_8 (abfd, contents + offset - 2);
1195 if (val != 0x8b && val != 0x03)
1196 return false;
1197
1198 val = bfd_get_8 (abfd, contents + offset - 1);
1199 return (val & 0xc7) == 5;
1200
1201 case R_X86_64_GOTPC32_TLSDESC:
1202 /* Check transition from GDesc access model:
1203 leaq x@tlsdesc(%rip), %rax <--- LP64 mode.
1204 rex leal x@tlsdesc(%rip), %eax <--- X32 mode.
1205
1206 Make sure it's a leaq adding rip to a 32-bit offset
1207 into any register, although it's probably almost always
1208 going to be rax. */
1209
1210 if (offset < 3 || (offset + 4) > sec->size)
1211 return false;
1212
1213 val = bfd_get_8 (abfd, contents + offset - 3);
1214 val &= 0xfb;
1215 if (val != 0x48 && (ABI_64_P (abfd) || val != 0x40))
1216 return false;
1217
1218 if (bfd_get_8 (abfd, contents + offset - 2) != 0x8d)
1219 return false;
1220
1221 val = bfd_get_8 (abfd, contents + offset - 1);
1222 return (val & 0xc7) == 0x05;
1223
1224 case R_X86_64_TLSDESC_CALL:
1225 /* Check transition from GDesc access model:
1226 call *x@tlsdesc(%rax) <--- LP64 mode.
1227 call *x@tlsdesc(%eax) <--- X32 mode.
1228 */
1229 if (offset + 2 <= sec->size)
1230 {
1231 unsigned int prefix;
1232 call = contents + offset;
1233 prefix = 0;
1234 if (!ABI_64_P (abfd))
1235 {
1236 /* Check for call *x@tlsdesc(%eax). */
1237 if (call[0] == 0x67)
1238 {
1239 prefix = 1;
1240 if (offset + 3 > sec->size)
1241 return false;
1242 }
1243 }
1244 /* Make sure that it's a call *x@tlsdesc(%rax). */
1245 return call[prefix] == 0xff && call[1 + prefix] == 0x10;
1246 }
1247
1248 return false;
1249
1250 default:
1251 abort ();
1252 }
1253 }
1254
1255 /* Return TRUE if the TLS access transition is OK or no transition
1256 will be performed. Update R_TYPE if there is a transition. */
1257
1258 static bool
1259 elf_x86_64_tls_transition (struct bfd_link_info *info, bfd *abfd,
1260 asection *sec, bfd_byte *contents,
1261 Elf_Internal_Shdr *symtab_hdr,
1262 struct elf_link_hash_entry **sym_hashes,
1263 unsigned int *r_type, int tls_type,
1264 const Elf_Internal_Rela *rel,
1265 const Elf_Internal_Rela *relend,
1266 struct elf_link_hash_entry *h,
1267 unsigned long r_symndx,
1268 bool from_relocate_section)
1269 {
1270 unsigned int from_type = *r_type;
1271 unsigned int to_type = from_type;
1272 bool check = true;
1273
1274 /* Skip TLS transition for functions. */
1275 if (h != NULL
1276 && (h->type == STT_FUNC
1277 || h->type == STT_GNU_IFUNC))
1278 return true;
1279
1280 switch (from_type)
1281 {
1282 case R_X86_64_TLSGD:
1283 case R_X86_64_GOTPC32_TLSDESC:
1284 case R_X86_64_TLSDESC_CALL:
1285 case R_X86_64_GOTTPOFF:
1286 if (bfd_link_executable (info))
1287 {
1288 if (h == NULL)
1289 to_type = R_X86_64_TPOFF32;
1290 else
1291 to_type = R_X86_64_GOTTPOFF;
1292 }
1293
1294 /* When we are called from elf_x86_64_relocate_section, there may
1295 be additional transitions based on TLS_TYPE. */
1296 if (from_relocate_section)
1297 {
1298 unsigned int new_to_type = to_type;
1299
1300 if (TLS_TRANSITION_IE_TO_LE_P (info, h, tls_type))
1301 new_to_type = R_X86_64_TPOFF32;
1302
1303 if (to_type == R_X86_64_TLSGD
1304 || to_type == R_X86_64_GOTPC32_TLSDESC
1305 || to_type == R_X86_64_TLSDESC_CALL)
1306 {
1307 if (tls_type == GOT_TLS_IE)
1308 new_to_type = R_X86_64_GOTTPOFF;
1309 }
1310
1311 /* We checked the transition before when we were called from
1312 elf_x86_64_scan_relocs. We only want to check the new
1313 transition which hasn't been checked before. */
1314 check = new_to_type != to_type && from_type == to_type;
1315 to_type = new_to_type;
1316 }
1317
1318 break;
1319
1320 case R_X86_64_TLSLD:
1321 if (bfd_link_executable (info))
1322 to_type = R_X86_64_TPOFF32;
1323 break;
1324
1325 default:
1326 return true;
1327 }
1328
1329 /* Return TRUE if there is no transition. */
1330 if (from_type == to_type)
1331 return true;
1332
1333 /* Check if the transition can be performed. */
1334 if (check
1335 && ! elf_x86_64_check_tls_transition (abfd, info, sec, contents,
1336 symtab_hdr, sym_hashes,
1337 from_type, rel, relend))
1338 {
1339 reloc_howto_type *from, *to;
1340 const char *name;
1341
1342 from = elf_x86_64_rtype_to_howto (abfd, from_type);
1343 to = elf_x86_64_rtype_to_howto (abfd, to_type);
1344
1345 if (from == NULL || to == NULL)
1346 return false;
1347
1348 if (h)
1349 name = h->root.root.string;
1350 else
1351 {
1352 struct elf_x86_link_hash_table *htab;
1353
1354 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
1355 if (htab == NULL)
1356 name = "*unknown*";
1357 else
1358 {
1359 Elf_Internal_Sym *isym;
1360
1361 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1362 abfd, r_symndx);
1363 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
1364 }
1365 }
1366
1367 _bfd_error_handler
1368 /* xgettext:c-format */
1369 (_("%pB: TLS transition from %s to %s against `%s' at %#" PRIx64
1370 " in section `%pA' failed"),
1371 abfd, from->name, to->name, name, (uint64_t) rel->r_offset, sec);
1372 bfd_set_error (bfd_error_bad_value);
1373 return false;
1374 }
1375
1376 *r_type = to_type;
1377 return true;
1378 }
1379
1380 static bool
1381 elf_x86_64_need_pic (struct bfd_link_info *info,
1382 bfd *input_bfd, asection *sec,
1383 struct elf_link_hash_entry *h,
1384 Elf_Internal_Shdr *symtab_hdr,
1385 Elf_Internal_Sym *isym,
1386 reloc_howto_type *howto)
1387 {
1388 const char *v = "";
1389 const char *und = "";
1390 const char *pic = "";
1391 const char *object;
1392
1393 const char *name;
1394 if (h)
1395 {
1396 name = h->root.root.string;
1397 switch (ELF_ST_VISIBILITY (h->other))
1398 {
1399 case STV_HIDDEN:
1400 v = _("hidden symbol ");
1401 break;
1402 case STV_INTERNAL:
1403 v = _("internal symbol ");
1404 break;
1405 case STV_PROTECTED:
1406 v = _("protected symbol ");
1407 break;
1408 default:
1409 if (((struct elf_x86_link_hash_entry *) h)->def_protected)
1410 v = _("protected symbol ");
1411 else
1412 v = _("symbol ");
1413 pic = NULL;
1414 break;
1415 }
1416
1417 if (!SYMBOL_DEFINED_NON_SHARED_P (h) && !h->def_dynamic)
1418 und = _("undefined ");
1419 }
1420 else
1421 {
1422 name = bfd_elf_sym_name (input_bfd, symtab_hdr, isym, NULL);
1423 pic = NULL;
1424 }
1425
1426 if (bfd_link_dll (info))
1427 {
1428 object = _("a shared object");
1429 if (!pic)
1430 pic = _("; recompile with -fPIC");
1431 }
1432 else
1433 {
1434 if (bfd_link_pie (info))
1435 object = _("a PIE object");
1436 else
1437 object = _("a PDE object");
1438 if (!pic)
1439 pic = _("; recompile with -fPIE");
1440 }
1441
1442 /* xgettext:c-format */
1443 _bfd_error_handler (_("%pB: relocation %s against %s%s`%s' can "
1444 "not be used when making %s%s"),
1445 input_bfd, howto->name, und, v, name,
1446 object, pic);
1447 bfd_set_error (bfd_error_bad_value);
1448 sec->check_relocs_failed = 1;
1449 return false;
1450 }
1451
1452 /* With the local symbol, foo, we convert
1453 mov foo@GOTPCREL(%rip), %reg
1454 to
1455 lea foo(%rip), %reg
1456 and convert
1457 call/jmp *foo@GOTPCREL(%rip)
1458 to
1459 nop call foo/jmp foo nop
1460 When PIC is false, convert
1461 test %reg, foo@GOTPCREL(%rip)
1462 to
1463 test $foo, %reg
1464 and convert
1465 binop foo@GOTPCREL(%rip), %reg
1466 to
1467 binop $foo, %reg
1468 where binop is one of adc, add, and, cmp, or, sbb, sub, xor
1469 instructions. */
1470
1471 static bool
1472 elf_x86_64_convert_load_reloc (bfd *abfd,
1473 bfd_byte *contents,
1474 unsigned int *r_type_p,
1475 Elf_Internal_Rela *irel,
1476 struct elf_link_hash_entry *h,
1477 bool *converted,
1478 struct bfd_link_info *link_info)
1479 {
1480 struct elf_x86_link_hash_table *htab;
1481 bool is_pic;
1482 bool no_overflow;
1483 bool relocx;
1484 bool to_reloc_pc32;
1485 bool abs_symbol;
1486 bool local_ref;
1487 asection *tsec;
1488 bfd_signed_vma raddend;
1489 unsigned int opcode;
1490 unsigned int modrm;
1491 unsigned int r_type = *r_type_p;
1492 unsigned int r_symndx;
1493 bfd_vma roff = irel->r_offset;
1494 bfd_vma abs_relocation;
1495
1496 if (roff < (r_type == R_X86_64_REX_GOTPCRELX ? 3 : 2))
1497 return true;
1498
1499 raddend = irel->r_addend;
1500 /* Addend for 32-bit PC-relative relocation must be -4. */
1501 if (raddend != -4)
1502 return true;
1503
1504 htab = elf_x86_hash_table (link_info, X86_64_ELF_DATA);
1505 is_pic = bfd_link_pic (link_info);
1506
1507 relocx = (r_type == R_X86_64_GOTPCRELX
1508 || r_type == R_X86_64_REX_GOTPCRELX);
1509
1510 /* TRUE if --no-relax is used. */
1511 no_overflow = link_info->disable_target_specific_optimizations > 1;
1512
1513 r_symndx = htab->r_sym (irel->r_info);
1514
1515 opcode = bfd_get_8 (abfd, contents + roff - 2);
1516
1517 /* Convert mov to lea since it has been done for a while. */
1518 if (opcode != 0x8b)
1519 {
1520 /* Only convert R_X86_64_GOTPCRELX and R_X86_64_REX_GOTPCRELX
1521 for call, jmp or one of adc, add, and, cmp, or, sbb, sub,
1522 test, xor instructions. */
1523 if (!relocx)
1524 return true;
1525 }
1526
1527 /* We convert only to R_X86_64_PC32:
1528 1. Branch.
1529 2. R_X86_64_GOTPCREL since we can't modify REX byte.
1530 3. no_overflow is true.
1531 4. PIC.
1532 */
1533 to_reloc_pc32 = (opcode == 0xff
1534 || !relocx
1535 || no_overflow
1536 || is_pic);
1537
1538 abs_symbol = false;
1539 abs_relocation = 0;
1540
1541 /* Get the symbol referred to by the reloc. */
1542 if (h == NULL)
1543 {
1544 Elf_Internal_Sym *isym
1545 = bfd_sym_from_r_symndx (&htab->elf.sym_cache, abfd, r_symndx);
1546
1547 /* Skip relocation against undefined symbols. */
1548 if (isym->st_shndx == SHN_UNDEF)
1549 return true;
1550
1551 local_ref = true;
1552 if (isym->st_shndx == SHN_ABS)
1553 {
1554 tsec = bfd_abs_section_ptr;
1555 abs_symbol = true;
1556 abs_relocation = isym->st_value;
1557 }
1558 else if (isym->st_shndx == SHN_COMMON)
1559 tsec = bfd_com_section_ptr;
1560 else if (isym->st_shndx == SHN_X86_64_LCOMMON)
1561 tsec = &_bfd_elf_large_com_section;
1562 else
1563 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
1564 }
1565 else
1566 {
1567 /* Undefined weak symbol is only bound locally in executable
1568 and its reference is resolved as 0 without relocation
1569 overflow. We can only perform this optimization for
1570 GOTPCRELX relocations since we need to modify REX byte.
1571 It is OK convert mov with R_X86_64_GOTPCREL to
1572 R_X86_64_PC32. */
1573 struct elf_x86_link_hash_entry *eh = elf_x86_hash_entry (h);
1574
1575 abs_symbol = ABS_SYMBOL_P (h);
1576 abs_relocation = h->root.u.def.value;
1577
1578 /* NB: Also set linker_def via SYMBOL_REFERENCES_LOCAL_P. */
1579 local_ref = SYMBOL_REFERENCES_LOCAL_P (link_info, h);
1580 if ((relocx || opcode == 0x8b)
1581 && (h->root.type == bfd_link_hash_undefweak
1582 && !eh->linker_def
1583 && local_ref))
1584 {
1585 if (opcode == 0xff)
1586 {
1587 /* Skip for branch instructions since R_X86_64_PC32
1588 may overflow. */
1589 if (no_overflow)
1590 return true;
1591 }
1592 else if (relocx)
1593 {
1594 /* For non-branch instructions, we can convert to
1595 R_X86_64_32/R_X86_64_32S since we know if there
1596 is a REX byte. */
1597 to_reloc_pc32 = false;
1598 }
1599
1600 /* Since we don't know the current PC when PIC is true,
1601 we can't convert to R_X86_64_PC32. */
1602 if (to_reloc_pc32 && is_pic)
1603 return true;
1604
1605 goto convert;
1606 }
1607 /* Avoid optimizing GOTPCREL relocations againt _DYNAMIC since
1608 ld.so may use its link-time address. */
1609 else if (h->start_stop
1610 || eh->linker_def
1611 || ((h->def_regular
1612 || h->root.type == bfd_link_hash_defined
1613 || h->root.type == bfd_link_hash_defweak)
1614 && h != htab->elf.hdynamic
1615 && local_ref))
1616 {
1617 /* bfd_link_hash_new or bfd_link_hash_undefined is
1618 set by an assignment in a linker script in
1619 bfd_elf_record_link_assignment. start_stop is set
1620 on __start_SECNAME/__stop_SECNAME which mark section
1621 SECNAME. */
1622 if (h->start_stop
1623 || eh->linker_def
1624 || (h->def_regular
1625 && (h->root.type == bfd_link_hash_new
1626 || h->root.type == bfd_link_hash_undefined
1627 || ((h->root.type == bfd_link_hash_defined
1628 || h->root.type == bfd_link_hash_defweak)
1629 && h->root.u.def.section == bfd_und_section_ptr))))
1630 {
1631 /* Skip since R_X86_64_32/R_X86_64_32S may overflow. */
1632 if (no_overflow)
1633 return true;
1634 goto convert;
1635 }
1636 tsec = h->root.u.def.section;
1637 }
1638 else
1639 return true;
1640 }
1641
1642 /* Don't convert GOTPCREL relocation against large section. */
1643 if (elf_section_data (tsec) != NULL
1644 && (elf_section_flags (tsec) & SHF_X86_64_LARGE) != 0)
1645 return true;
1646
1647 /* Skip since R_X86_64_PC32/R_X86_64_32/R_X86_64_32S may overflow. */
1648 if (no_overflow)
1649 return true;
1650
1651 convert:
1652 if (opcode == 0xff)
1653 {
1654 /* We have "call/jmp *foo@GOTPCREL(%rip)". */
1655 unsigned int nop;
1656 unsigned int disp;
1657 bfd_vma nop_offset;
1658
1659 /* Convert R_X86_64_GOTPCRELX and R_X86_64_REX_GOTPCRELX to
1660 R_X86_64_PC32. */
1661 modrm = bfd_get_8 (abfd, contents + roff - 1);
1662 if (modrm == 0x25)
1663 {
1664 /* Convert to "jmp foo nop". */
1665 modrm = 0xe9;
1666 nop = NOP_OPCODE;
1667 nop_offset = irel->r_offset + 3;
1668 disp = bfd_get_32 (abfd, contents + irel->r_offset);
1669 irel->r_offset -= 1;
1670 bfd_put_32 (abfd, disp, contents + irel->r_offset);
1671 }
1672 else
1673 {
1674 struct elf_x86_link_hash_entry *eh
1675 = (struct elf_x86_link_hash_entry *) h;
1676
1677 /* Convert to "nop call foo". ADDR_PREFIX_OPCODE
1678 is a nop prefix. */
1679 modrm = 0xe8;
1680 /* To support TLS optimization, always use addr32 prefix for
1681 "call *__tls_get_addr@GOTPCREL(%rip)". */
1682 if (eh && eh->tls_get_addr)
1683 {
1684 nop = 0x67;
1685 nop_offset = irel->r_offset - 2;
1686 }
1687 else
1688 {
1689 nop = htab->params->call_nop_byte;
1690 if (htab->params->call_nop_as_suffix)
1691 {
1692 nop_offset = irel->r_offset + 3;
1693 disp = bfd_get_32 (abfd, contents + irel->r_offset);
1694 irel->r_offset -= 1;
1695 bfd_put_32 (abfd, disp, contents + irel->r_offset);
1696 }
1697 else
1698 nop_offset = irel->r_offset - 2;
1699 }
1700 }
1701 bfd_put_8 (abfd, nop, contents + nop_offset);
1702 bfd_put_8 (abfd, modrm, contents + irel->r_offset - 1);
1703 r_type = R_X86_64_PC32;
1704 }
1705 else
1706 {
1707 unsigned int rex;
1708 unsigned int rex_mask = REX_R;
1709
1710 if (r_type == R_X86_64_REX_GOTPCRELX)
1711 rex = bfd_get_8 (abfd, contents + roff - 3);
1712 else
1713 rex = 0;
1714
1715 if (opcode == 0x8b)
1716 {
1717 if (abs_symbol && local_ref && relocx)
1718 to_reloc_pc32 = false;
1719
1720 if (to_reloc_pc32)
1721 {
1722 /* Convert "mov foo@GOTPCREL(%rip), %reg" to
1723 "lea foo(%rip), %reg". */
1724 opcode = 0x8d;
1725 r_type = R_X86_64_PC32;
1726 }
1727 else
1728 {
1729 /* Convert "mov foo@GOTPCREL(%rip), %reg" to
1730 "mov $foo, %reg". */
1731 opcode = 0xc7;
1732 modrm = bfd_get_8 (abfd, contents + roff - 1);
1733 modrm = 0xc0 | (modrm & 0x38) >> 3;
1734 if ((rex & REX_W) != 0
1735 && ABI_64_P (link_info->output_bfd))
1736 {
1737 /* Keep the REX_W bit in REX byte for LP64. */
1738 r_type = R_X86_64_32S;
1739 goto rewrite_modrm_rex;
1740 }
1741 else
1742 {
1743 /* If the REX_W bit in REX byte isn't needed,
1744 use R_X86_64_32 and clear the W bit to avoid
1745 sign-extend imm32 to imm64. */
1746 r_type = R_X86_64_32;
1747 /* Clear the W bit in REX byte. */
1748 rex_mask |= REX_W;
1749 goto rewrite_modrm_rex;
1750 }
1751 }
1752 }
1753 else
1754 {
1755 /* R_X86_64_PC32 isn't supported. */
1756 if (to_reloc_pc32)
1757 return true;
1758
1759 modrm = bfd_get_8 (abfd, contents + roff - 1);
1760 if (opcode == 0x85)
1761 {
1762 /* Convert "test %reg, foo@GOTPCREL(%rip)" to
1763 "test $foo, %reg". */
1764 modrm = 0xc0 | (modrm & 0x38) >> 3;
1765 opcode = 0xf7;
1766 }
1767 else
1768 {
1769 /* Convert "binop foo@GOTPCREL(%rip), %reg" to
1770 "binop $foo, %reg". */
1771 modrm = 0xc0 | (modrm & 0x38) >> 3 | (opcode & 0x3c);
1772 opcode = 0x81;
1773 }
1774
1775 /* Use R_X86_64_32 with 32-bit operand to avoid relocation
1776 overflow when sign-extending imm32 to imm64. */
1777 r_type = (rex & REX_W) != 0 ? R_X86_64_32S : R_X86_64_32;
1778
1779 rewrite_modrm_rex:
1780 if (abs_relocation)
1781 {
1782 /* Check if R_X86_64_32S/R_X86_64_32 fits. */
1783 if (r_type == R_X86_64_32S)
1784 {
1785 if ((abs_relocation + 0x80000000) > 0xffffffff)
1786 return true;
1787 }
1788 else
1789 {
1790 if (abs_relocation > 0xffffffff)
1791 return true;
1792 }
1793 }
1794
1795 bfd_put_8 (abfd, modrm, contents + roff - 1);
1796
1797 if (rex)
1798 {
1799 /* Move the R bit to the B bit in REX byte. */
1800 rex = (rex & ~rex_mask) | (rex & REX_R) >> 2;
1801 bfd_put_8 (abfd, rex, contents + roff - 3);
1802 }
1803
1804 /* No addend for R_X86_64_32/R_X86_64_32S relocations. */
1805 irel->r_addend = 0;
1806 }
1807
1808 bfd_put_8 (abfd, opcode, contents + roff - 2);
1809 }
1810
1811 *r_type_p = r_type;
1812 irel->r_info = htab->r_info (r_symndx,
1813 r_type | R_X86_64_converted_reloc_bit);
1814
1815 *converted = true;
1816
1817 return true;
1818 }
1819
1820 /* Look through the relocs for a section during the first phase, and
1821 calculate needed space in the global offset table, and procedure
1822 linkage table. */
1823
1824 static bool
1825 elf_x86_64_scan_relocs (bfd *abfd, struct bfd_link_info *info,
1826 asection *sec,
1827 const Elf_Internal_Rela *relocs)
1828 {
1829 struct elf_x86_link_hash_table *htab;
1830 Elf_Internal_Shdr *symtab_hdr;
1831 struct elf_link_hash_entry **sym_hashes;
1832 const Elf_Internal_Rela *rel;
1833 const Elf_Internal_Rela *rel_end;
1834 bfd_byte *contents;
1835 bool converted;
1836
1837 if (bfd_link_relocatable (info))
1838 return true;
1839
1840 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
1841 if (htab == NULL)
1842 {
1843 sec->check_relocs_failed = 1;
1844 return false;
1845 }
1846
1847 BFD_ASSERT (is_x86_elf (abfd, htab));
1848
1849 /* Get the section contents. */
1850 if (elf_section_data (sec)->this_hdr.contents != NULL)
1851 contents = elf_section_data (sec)->this_hdr.contents;
1852 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
1853 {
1854 sec->check_relocs_failed = 1;
1855 return false;
1856 }
1857
1858 symtab_hdr = &elf_symtab_hdr (abfd);
1859 sym_hashes = elf_sym_hashes (abfd);
1860
1861 converted = false;
1862
1863 rel_end = relocs + sec->reloc_count;
1864 for (rel = relocs; rel < rel_end; rel++)
1865 {
1866 unsigned int r_type;
1867 unsigned int r_symndx;
1868 struct elf_link_hash_entry *h;
1869 struct elf_x86_link_hash_entry *eh;
1870 Elf_Internal_Sym *isym;
1871 const char *name;
1872 bool size_reloc;
1873 bool converted_reloc;
1874 bool no_dynreloc;
1875
1876 r_symndx = htab->r_sym (rel->r_info);
1877 r_type = ELF32_R_TYPE (rel->r_info);
1878
1879 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
1880 {
1881 /* xgettext:c-format */
1882 _bfd_error_handler (_("%pB: bad symbol index: %d"),
1883 abfd, r_symndx);
1884 goto error_return;
1885 }
1886
1887 if (r_symndx < symtab_hdr->sh_info)
1888 {
1889 /* A local symbol. */
1890 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1891 abfd, r_symndx);
1892 if (isym == NULL)
1893 goto error_return;
1894
1895 /* Check relocation against local STT_GNU_IFUNC symbol. */
1896 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1897 {
1898 h = _bfd_elf_x86_get_local_sym_hash (htab, abfd, rel,
1899 true);
1900 if (h == NULL)
1901 goto error_return;
1902
1903 /* Fake a STT_GNU_IFUNC symbol. */
1904 h->root.root.string = bfd_elf_sym_name (abfd, symtab_hdr,
1905 isym, NULL);
1906 h->type = STT_GNU_IFUNC;
1907 h->def_regular = 1;
1908 h->ref_regular = 1;
1909 h->forced_local = 1;
1910 h->root.type = bfd_link_hash_defined;
1911 }
1912 else
1913 h = NULL;
1914 }
1915 else
1916 {
1917 isym = NULL;
1918 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1919 while (h->root.type == bfd_link_hash_indirect
1920 || h->root.type == bfd_link_hash_warning)
1921 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1922 }
1923
1924 /* Check invalid x32 relocations. */
1925 if (!ABI_64_P (abfd))
1926 switch (r_type)
1927 {
1928 default:
1929 break;
1930
1931 case R_X86_64_DTPOFF64:
1932 case R_X86_64_TPOFF64:
1933 case R_X86_64_PC64:
1934 case R_X86_64_GOTOFF64:
1935 case R_X86_64_GOT64:
1936 case R_X86_64_GOTPCREL64:
1937 case R_X86_64_GOTPC64:
1938 case R_X86_64_GOTPLT64:
1939 case R_X86_64_PLTOFF64:
1940 {
1941 if (h)
1942 name = h->root.root.string;
1943 else
1944 name = bfd_elf_sym_name (abfd, symtab_hdr, isym,
1945 NULL);
1946 _bfd_error_handler
1947 /* xgettext:c-format */
1948 (_("%pB: relocation %s against symbol `%s' isn't "
1949 "supported in x32 mode"), abfd,
1950 x86_64_elf_howto_table[r_type].name, name);
1951 bfd_set_error (bfd_error_bad_value);
1952 goto error_return;
1953 }
1954 break;
1955 }
1956
1957 eh = (struct elf_x86_link_hash_entry *) h;
1958
1959 if (h != NULL)
1960 {
1961 /* It is referenced by a non-shared object. */
1962 h->ref_regular = 1;
1963 }
1964
1965 converted_reloc = false;
1966 if ((r_type == R_X86_64_GOTPCREL
1967 || r_type == R_X86_64_GOTPCRELX
1968 || r_type == R_X86_64_REX_GOTPCRELX)
1969 && (h == NULL || h->type != STT_GNU_IFUNC))
1970 {
1971 Elf_Internal_Rela *irel = (Elf_Internal_Rela *) rel;
1972 if (!elf_x86_64_convert_load_reloc (abfd, contents, &r_type,
1973 irel, h, &converted_reloc,
1974 info))
1975 goto error_return;
1976
1977 if (converted_reloc)
1978 converted = true;
1979 }
1980
1981 if (!_bfd_elf_x86_valid_reloc_p (sec, info, htab, rel, h, isym,
1982 symtab_hdr, &no_dynreloc))
1983 return false;
1984
1985 if (! elf_x86_64_tls_transition (info, abfd, sec, contents,
1986 symtab_hdr, sym_hashes,
1987 &r_type, GOT_UNKNOWN,
1988 rel, rel_end, h, r_symndx, false))
1989 goto error_return;
1990
1991 /* Check if _GLOBAL_OFFSET_TABLE_ is referenced. */
1992 if (h == htab->elf.hgot)
1993 htab->got_referenced = true;
1994
1995 switch (r_type)
1996 {
1997 case R_X86_64_TLSLD:
1998 htab->tls_ld_or_ldm_got.refcount = 1;
1999 goto create_got;
2000
2001 case R_X86_64_TPOFF32:
2002 if (!bfd_link_executable (info) && ABI_64_P (abfd))
2003 return elf_x86_64_need_pic (info, abfd, sec, h, symtab_hdr, isym,
2004 &x86_64_elf_howto_table[r_type]);
2005 if (eh != NULL)
2006 eh->zero_undefweak &= 0x2;
2007 break;
2008
2009 case R_X86_64_GOTTPOFF:
2010 if (!bfd_link_executable (info))
2011 info->flags |= DF_STATIC_TLS;
2012 /* Fall through */
2013
2014 case R_X86_64_GOT32:
2015 case R_X86_64_GOTPCREL:
2016 case R_X86_64_GOTPCRELX:
2017 case R_X86_64_REX_GOTPCRELX:
2018 case R_X86_64_TLSGD:
2019 case R_X86_64_GOT64:
2020 case R_X86_64_GOTPCREL64:
2021 case R_X86_64_GOTPLT64:
2022 case R_X86_64_GOTPC32_TLSDESC:
2023 case R_X86_64_TLSDESC_CALL:
2024 /* This symbol requires a global offset table entry. */
2025 {
2026 int tls_type, old_tls_type;
2027
2028 switch (r_type)
2029 {
2030 default:
2031 tls_type = GOT_NORMAL;
2032 if (h)
2033 {
2034 if (ABS_SYMBOL_P (h))
2035 tls_type = GOT_ABS;
2036 }
2037 else if (isym->st_shndx == SHN_ABS)
2038 tls_type = GOT_ABS;
2039 break;
2040 case R_X86_64_TLSGD:
2041 tls_type = GOT_TLS_GD;
2042 break;
2043 case R_X86_64_GOTTPOFF:
2044 tls_type = GOT_TLS_IE;
2045 break;
2046 case R_X86_64_GOTPC32_TLSDESC:
2047 case R_X86_64_TLSDESC_CALL:
2048 tls_type = GOT_TLS_GDESC;
2049 break;
2050 }
2051
2052 if (h != NULL)
2053 {
2054 h->got.refcount = 1;
2055 old_tls_type = eh->tls_type;
2056 }
2057 else
2058 {
2059 bfd_signed_vma *local_got_refcounts;
2060
2061 if (!elf_x86_allocate_local_got_info (abfd,
2062 symtab_hdr->sh_info))
2063 goto error_return;
2064
2065 /* This is a global offset table entry for a local symbol. */
2066 local_got_refcounts = elf_local_got_refcounts (abfd);
2067 local_got_refcounts[r_symndx] = 1;
2068 old_tls_type
2069 = elf_x86_local_got_tls_type (abfd) [r_symndx];
2070 }
2071
2072 /* If a TLS symbol is accessed using IE at least once,
2073 there is no point to use dynamic model for it. */
2074 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
2075 && (! GOT_TLS_GD_ANY_P (old_tls_type)
2076 || tls_type != GOT_TLS_IE))
2077 {
2078 if (old_tls_type == GOT_TLS_IE && GOT_TLS_GD_ANY_P (tls_type))
2079 tls_type = old_tls_type;
2080 else if (GOT_TLS_GD_ANY_P (old_tls_type)
2081 && GOT_TLS_GD_ANY_P (tls_type))
2082 tls_type |= old_tls_type;
2083 else
2084 {
2085 if (h)
2086 name = h->root.root.string;
2087 else
2088 name = bfd_elf_sym_name (abfd, symtab_hdr,
2089 isym, NULL);
2090 _bfd_error_handler
2091 /* xgettext:c-format */
2092 (_("%pB: '%s' accessed both as normal and"
2093 " thread local symbol"),
2094 abfd, name);
2095 bfd_set_error (bfd_error_bad_value);
2096 goto error_return;
2097 }
2098 }
2099
2100 if (old_tls_type != tls_type)
2101 {
2102 if (eh != NULL)
2103 eh->tls_type = tls_type;
2104 else
2105 elf_x86_local_got_tls_type (abfd) [r_symndx] = tls_type;
2106 }
2107 }
2108 /* Fall through */
2109
2110 case R_X86_64_GOTOFF64:
2111 case R_X86_64_GOTPC32:
2112 case R_X86_64_GOTPC64:
2113 create_got:
2114 if (eh != NULL)
2115 eh->zero_undefweak &= 0x2;
2116 break;
2117
2118 case R_X86_64_PLT32:
2119 case R_X86_64_PLT32_BND:
2120 /* This symbol requires a procedure linkage table entry. We
2121 actually build the entry in adjust_dynamic_symbol,
2122 because this might be a case of linking PIC code which is
2123 never referenced by a dynamic object, in which case we
2124 don't need to generate a procedure linkage table entry
2125 after all. */
2126
2127 /* If this is a local symbol, we resolve it directly without
2128 creating a procedure linkage table entry. */
2129 if (h == NULL)
2130 continue;
2131
2132 eh->zero_undefweak &= 0x2;
2133 h->needs_plt = 1;
2134 h->plt.refcount = 1;
2135 break;
2136
2137 case R_X86_64_PLTOFF64:
2138 /* This tries to form the 'address' of a function relative
2139 to GOT. For global symbols we need a PLT entry. */
2140 if (h != NULL)
2141 {
2142 h->needs_plt = 1;
2143 h->plt.refcount = 1;
2144 }
2145 goto create_got;
2146
2147 case R_X86_64_SIZE32:
2148 case R_X86_64_SIZE64:
2149 size_reloc = true;
2150 goto do_size;
2151
2152 case R_X86_64_32:
2153 if (!ABI_64_P (abfd))
2154 goto pointer;
2155 /* Fall through. */
2156 case R_X86_64_8:
2157 case R_X86_64_16:
2158 case R_X86_64_32S:
2159 /* Check relocation overflow as these relocs may lead to
2160 run-time relocation overflow. Don't error out for
2161 sections we don't care about, such as debug sections or
2162 when relocation overflow check is disabled. */
2163 if (!htab->params->no_reloc_overflow_check
2164 && !converted_reloc
2165 && (bfd_link_pic (info)
2166 || (bfd_link_executable (info)
2167 && h != NULL
2168 && !h->def_regular
2169 && h->def_dynamic
2170 && (sec->flags & SEC_READONLY) == 0)))
2171 return elf_x86_64_need_pic (info, abfd, sec, h, symtab_hdr, isym,
2172 &x86_64_elf_howto_table[r_type]);
2173 /* Fall through. */
2174
2175 case R_X86_64_PC8:
2176 case R_X86_64_PC16:
2177 case R_X86_64_PC32:
2178 case R_X86_64_PC32_BND:
2179 case R_X86_64_PC64:
2180 case R_X86_64_64:
2181 pointer:
2182 if (eh != NULL && (sec->flags & SEC_CODE) != 0)
2183 eh->zero_undefweak |= 0x2;
2184 /* We are called after all symbols have been resolved. Only
2185 relocation against STT_GNU_IFUNC symbol must go through
2186 PLT. */
2187 if (h != NULL
2188 && (bfd_link_executable (info)
2189 || h->type == STT_GNU_IFUNC))
2190 {
2191 bool func_pointer_ref = false;
2192
2193 if (r_type == R_X86_64_PC32)
2194 {
2195 /* Since something like ".long foo - ." may be used
2196 as pointer, make sure that PLT is used if foo is
2197 a function defined in a shared library. */
2198 if ((sec->flags & SEC_CODE) == 0)
2199 {
2200 h->pointer_equality_needed = 1;
2201 if (bfd_link_pie (info)
2202 && h->type == STT_FUNC
2203 && !h->def_regular
2204 && h->def_dynamic)
2205 {
2206 h->needs_plt = 1;
2207 h->plt.refcount = 1;
2208 }
2209 }
2210 }
2211 else if (r_type != R_X86_64_PC32_BND
2212 && r_type != R_X86_64_PC64)
2213 {
2214 /* At run-time, R_X86_64_64 can be resolved for both
2215 x86-64 and x32. But R_X86_64_32 and R_X86_64_32S
2216 can only be resolved for x32. Function pointer
2217 reference doesn't need PLT for pointer equality. */
2218 if ((sec->flags & SEC_READONLY) == 0
2219 && (r_type == R_X86_64_64
2220 || (!ABI_64_P (abfd)
2221 && (r_type == R_X86_64_32
2222 || r_type == R_X86_64_32S))))
2223 func_pointer_ref = true;
2224
2225 /* IFUNC symbol needs pointer equality in PDE so that
2226 function pointer reference will be resolved to its
2227 PLT entry directly. */
2228 if (!func_pointer_ref
2229 || (bfd_link_pde (info)
2230 && h->type == STT_GNU_IFUNC))
2231 h->pointer_equality_needed = 1;
2232 }
2233
2234 if (!func_pointer_ref)
2235 {
2236 /* If this reloc is in a read-only section, we might
2237 need a copy reloc. We can't check reliably at this
2238 stage whether the section is read-only, as input
2239 sections have not yet been mapped to output sections.
2240 Tentatively set the flag for now, and correct in
2241 adjust_dynamic_symbol. */
2242 h->non_got_ref = 1;
2243
2244 if (!elf_has_indirect_extern_access (sec->owner))
2245 eh->non_got_ref_without_indirect_extern_access = 1;
2246
2247 /* We may need a .plt entry if the symbol is a function
2248 defined in a shared lib or is a function referenced
2249 from the code or read-only section. */
2250 if (!h->def_regular
2251 || (sec->flags & (SEC_CODE | SEC_READONLY)) != 0)
2252 h->plt.refcount = 1;
2253
2254 if (h->pointer_equality_needed
2255 && h->type == STT_FUNC
2256 && eh->def_protected
2257 && !SYMBOL_DEFINED_NON_SHARED_P (h)
2258 && h->def_dynamic
2259 && elf_has_indirect_extern_access (h->root.u.def.section->owner))
2260 {
2261 /* Disallow non-canonical reference to canonical
2262 protected function. */
2263 _bfd_error_handler
2264 /* xgettext:c-format */
2265 (_("%pB: non-canonical reference to canonical "
2266 "protected function `%s' in %pB"),
2267 abfd, h->root.root.string,
2268 h->root.u.def.section->owner);
2269 bfd_set_error (bfd_error_bad_value);
2270 goto error_return;
2271 }
2272 }
2273 }
2274
2275 size_reloc = false;
2276 do_size:
2277 if (!no_dynreloc
2278 && NEED_DYNAMIC_RELOCATION_P (true, info, true, h, sec,
2279 r_type,
2280 htab->pointer_r_type))
2281 {
2282 struct elf_dyn_relocs *p;
2283 struct elf_dyn_relocs **head;
2284
2285 /* If this is a global symbol, we count the number of
2286 relocations we need for this symbol. */
2287 if (h != NULL)
2288 head = &h->dyn_relocs;
2289 else
2290 {
2291 /* Track dynamic relocs needed for local syms too.
2292 We really need local syms available to do this
2293 easily. Oh well. */
2294 asection *s;
2295 void **vpp;
2296
2297 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
2298 abfd, r_symndx);
2299 if (isym == NULL)
2300 goto error_return;
2301
2302 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
2303 if (s == NULL)
2304 s = sec;
2305
2306 /* Beware of type punned pointers vs strict aliasing
2307 rules. */
2308 vpp = &(elf_section_data (s)->local_dynrel);
2309 head = (struct elf_dyn_relocs **)vpp;
2310 }
2311
2312 p = *head;
2313 if (p == NULL || p->sec != sec)
2314 {
2315 size_t amt = sizeof *p;
2316
2317 p = ((struct elf_dyn_relocs *)
2318 bfd_alloc (htab->elf.dynobj, amt));
2319 if (p == NULL)
2320 goto error_return;
2321 p->next = *head;
2322 *head = p;
2323 p->sec = sec;
2324 p->count = 0;
2325 p->pc_count = 0;
2326 }
2327
2328 p->count += 1;
2329 /* Count size relocation as PC-relative relocation. */
2330 if (X86_PCREL_TYPE_P (true, r_type) || size_reloc)
2331 p->pc_count += 1;
2332 }
2333 break;
2334
2335 /* This relocation describes the C++ object vtable hierarchy.
2336 Reconstruct it for later use during GC. */
2337 case R_X86_64_GNU_VTINHERIT:
2338 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
2339 goto error_return;
2340 break;
2341
2342 /* This relocation describes which C++ vtable entries are actually
2343 used. Record for later use during GC. */
2344 case R_X86_64_GNU_VTENTRY:
2345 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
2346 goto error_return;
2347 break;
2348
2349 default:
2350 break;
2351 }
2352 }
2353
2354 if (elf_section_data (sec)->this_hdr.contents != contents)
2355 {
2356 if (!converted && !_bfd_link_keep_memory (info))
2357 free (contents);
2358 else
2359 {
2360 /* Cache the section contents for elf_link_input_bfd if any
2361 load is converted or --no-keep-memory isn't used. */
2362 elf_section_data (sec)->this_hdr.contents = contents;
2363 info->cache_size += sec->size;
2364 }
2365 }
2366
2367 /* Cache relocations if any load is converted. */
2368 if (elf_section_data (sec)->relocs != relocs && converted)
2369 elf_section_data (sec)->relocs = (Elf_Internal_Rela *) relocs;
2370
2371 return true;
2372
2373 error_return:
2374 if (elf_section_data (sec)->this_hdr.contents != contents)
2375 free (contents);
2376 sec->check_relocs_failed = 1;
2377 return false;
2378 }
2379
2380 static bool
2381 elf_x86_64_always_size_sections (bfd *output_bfd,
2382 struct bfd_link_info *info)
2383 {
2384 bfd *abfd;
2385
2386 /* Scan relocations after rel_from_abs has been set on __ehdr_start. */
2387 for (abfd = info->input_bfds;
2388 abfd != (bfd *) NULL;
2389 abfd = abfd->link.next)
2390 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
2391 && !_bfd_elf_link_iterate_on_relocs (abfd, info,
2392 elf_x86_64_scan_relocs))
2393 return false;
2394
2395 return _bfd_x86_elf_always_size_sections (output_bfd, info);
2396 }
2397
2398 /* Return the relocation value for @tpoff relocation
2399 if STT_TLS virtual address is ADDRESS. */
2400
2401 static bfd_vma
2402 elf_x86_64_tpoff (struct bfd_link_info *info, bfd_vma address)
2403 {
2404 struct elf_link_hash_table *htab = elf_hash_table (info);
2405 const struct elf_backend_data *bed = get_elf_backend_data (info->output_bfd);
2406 bfd_vma static_tls_size;
2407
2408 /* If tls_segment is NULL, we should have signalled an error already. */
2409 if (htab->tls_sec == NULL)
2410 return 0;
2411
2412 /* Consider special static TLS alignment requirements. */
2413 static_tls_size = BFD_ALIGN (htab->tls_size, bed->static_tls_alignment);
2414 return address - static_tls_size - htab->tls_sec->vma;
2415 }
2416
2417 /* Relocate an x86_64 ELF section. */
2418
2419 static int
2420 elf_x86_64_relocate_section (bfd *output_bfd,
2421 struct bfd_link_info *info,
2422 bfd *input_bfd,
2423 asection *input_section,
2424 bfd_byte *contents,
2425 Elf_Internal_Rela *relocs,
2426 Elf_Internal_Sym *local_syms,
2427 asection **local_sections)
2428 {
2429 struct elf_x86_link_hash_table *htab;
2430 Elf_Internal_Shdr *symtab_hdr;
2431 struct elf_link_hash_entry **sym_hashes;
2432 bfd_vma *local_got_offsets;
2433 bfd_vma *local_tlsdesc_gotents;
2434 Elf_Internal_Rela *rel;
2435 Elf_Internal_Rela *wrel;
2436 Elf_Internal_Rela *relend;
2437 unsigned int plt_entry_size;
2438 bool status;
2439
2440 /* Skip if check_relocs or scan_relocs failed. */
2441 if (input_section->check_relocs_failed)
2442 return false;
2443
2444 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
2445 if (htab == NULL)
2446 return false;
2447
2448 if (!is_x86_elf (input_bfd, htab))
2449 {
2450 bfd_set_error (bfd_error_wrong_format);
2451 return false;
2452 }
2453
2454 plt_entry_size = htab->plt.plt_entry_size;
2455 symtab_hdr = &elf_symtab_hdr (input_bfd);
2456 sym_hashes = elf_sym_hashes (input_bfd);
2457 local_got_offsets = elf_local_got_offsets (input_bfd);
2458 local_tlsdesc_gotents = elf_x86_local_tlsdesc_gotent (input_bfd);
2459
2460 _bfd_x86_elf_set_tls_module_base (info);
2461
2462 status = true;
2463 rel = wrel = relocs;
2464 relend = relocs + input_section->reloc_count;
2465 for (; rel < relend; wrel++, rel++)
2466 {
2467 unsigned int r_type, r_type_tls;
2468 reloc_howto_type *howto;
2469 unsigned long r_symndx;
2470 struct elf_link_hash_entry *h;
2471 struct elf_x86_link_hash_entry *eh;
2472 Elf_Internal_Sym *sym;
2473 asection *sec;
2474 bfd_vma off, offplt, plt_offset;
2475 bfd_vma relocation;
2476 bool unresolved_reloc;
2477 bfd_reloc_status_type r;
2478 int tls_type;
2479 asection *base_got, *resolved_plt;
2480 bfd_vma st_size;
2481 bool resolved_to_zero;
2482 bool relative_reloc;
2483 bool converted_reloc;
2484 bool need_copy_reloc_in_pie;
2485 bool no_copyreloc_p;
2486
2487 r_type = ELF32_R_TYPE (rel->r_info);
2488 if (r_type == (int) R_X86_64_GNU_VTINHERIT
2489 || r_type == (int) R_X86_64_GNU_VTENTRY)
2490 {
2491 if (wrel != rel)
2492 *wrel = *rel;
2493 continue;
2494 }
2495
2496 r_symndx = htab->r_sym (rel->r_info);
2497 converted_reloc = (r_type & R_X86_64_converted_reloc_bit) != 0;
2498 if (converted_reloc)
2499 {
2500 r_type &= ~R_X86_64_converted_reloc_bit;
2501 rel->r_info = htab->r_info (r_symndx, r_type);
2502 }
2503
2504 howto = elf_x86_64_rtype_to_howto (input_bfd, r_type);
2505 if (howto == NULL)
2506 return _bfd_unrecognized_reloc (input_bfd, input_section, r_type);
2507
2508 h = NULL;
2509 sym = NULL;
2510 sec = NULL;
2511 unresolved_reloc = false;
2512 if (r_symndx < symtab_hdr->sh_info)
2513 {
2514 sym = local_syms + r_symndx;
2515 sec = local_sections[r_symndx];
2516
2517 relocation = _bfd_elf_rela_local_sym (output_bfd, sym,
2518 &sec, rel);
2519 st_size = sym->st_size;
2520
2521 /* Relocate against local STT_GNU_IFUNC symbol. */
2522 if (!bfd_link_relocatable (info)
2523 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2524 {
2525 h = _bfd_elf_x86_get_local_sym_hash (htab, input_bfd,
2526 rel, false);
2527 if (h == NULL)
2528 abort ();
2529
2530 /* Set STT_GNU_IFUNC symbol value. */
2531 h->root.u.def.value = sym->st_value;
2532 h->root.u.def.section = sec;
2533 }
2534 }
2535 else
2536 {
2537 bool warned ATTRIBUTE_UNUSED;
2538 bool ignored ATTRIBUTE_UNUSED;
2539
2540 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2541 r_symndx, symtab_hdr, sym_hashes,
2542 h, sec, relocation,
2543 unresolved_reloc, warned, ignored);
2544 st_size = h->size;
2545 }
2546
2547 if (sec != NULL && discarded_section (sec))
2548 {
2549 _bfd_clear_contents (howto, input_bfd, input_section,
2550 contents, rel->r_offset);
2551 wrel->r_offset = rel->r_offset;
2552 wrel->r_info = 0;
2553 wrel->r_addend = 0;
2554
2555 /* For ld -r, remove relocations in debug sections against
2556 sections defined in discarded sections. Not done for
2557 eh_frame editing code expects to be present. */
2558 if (bfd_link_relocatable (info)
2559 && (input_section->flags & SEC_DEBUGGING))
2560 wrel--;
2561
2562 continue;
2563 }
2564
2565 if (bfd_link_relocatable (info))
2566 {
2567 if (wrel != rel)
2568 *wrel = *rel;
2569 continue;
2570 }
2571
2572 if (rel->r_addend == 0 && !ABI_64_P (output_bfd))
2573 {
2574 if (r_type == R_X86_64_64)
2575 {
2576 /* For x32, treat R_X86_64_64 like R_X86_64_32 and
2577 zero-extend it to 64bit if addend is zero. */
2578 r_type = R_X86_64_32;
2579 memset (contents + rel->r_offset + 4, 0, 4);
2580 }
2581 else if (r_type == R_X86_64_SIZE64)
2582 {
2583 /* For x32, treat R_X86_64_SIZE64 like R_X86_64_SIZE32 and
2584 zero-extend it to 64bit if addend is zero. */
2585 r_type = R_X86_64_SIZE32;
2586 memset (contents + rel->r_offset + 4, 0, 4);
2587 }
2588 }
2589
2590 eh = (struct elf_x86_link_hash_entry *) h;
2591
2592 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle
2593 it here if it is defined in a non-shared object. */
2594 if (h != NULL
2595 && h->type == STT_GNU_IFUNC
2596 && h->def_regular)
2597 {
2598 bfd_vma plt_index;
2599 const char *name;
2600
2601 if ((input_section->flags & SEC_ALLOC) == 0)
2602 {
2603 /* If this is a SHT_NOTE section without SHF_ALLOC, treat
2604 STT_GNU_IFUNC symbol as STT_FUNC. */
2605 if (elf_section_type (input_section) == SHT_NOTE)
2606 goto skip_ifunc;
2607 /* Dynamic relocs are not propagated for SEC_DEBUGGING
2608 sections because such sections are not SEC_ALLOC and
2609 thus ld.so will not process them. */
2610 if ((input_section->flags & SEC_DEBUGGING) != 0)
2611 continue;
2612 abort ();
2613 }
2614
2615 switch (r_type)
2616 {
2617 default:
2618 break;
2619
2620 case R_X86_64_GOTPCREL:
2621 case R_X86_64_GOTPCRELX:
2622 case R_X86_64_REX_GOTPCRELX:
2623 case R_X86_64_GOTPCREL64:
2624 base_got = htab->elf.sgot;
2625 off = h->got.offset;
2626
2627 if (base_got == NULL)
2628 abort ();
2629
2630 if (off == (bfd_vma) -1)
2631 {
2632 /* We can't use h->got.offset here to save state, or
2633 even just remember the offset, as finish_dynamic_symbol
2634 would use that as offset into .got. */
2635
2636 if (h->plt.offset == (bfd_vma) -1)
2637 abort ();
2638
2639 if (htab->elf.splt != NULL)
2640 {
2641 plt_index = (h->plt.offset / plt_entry_size
2642 - htab->plt.has_plt0);
2643 off = (plt_index + 3) * GOT_ENTRY_SIZE;
2644 base_got = htab->elf.sgotplt;
2645 }
2646 else
2647 {
2648 plt_index = h->plt.offset / plt_entry_size;
2649 off = plt_index * GOT_ENTRY_SIZE;
2650 base_got = htab->elf.igotplt;
2651 }
2652
2653 if (h->dynindx == -1
2654 || h->forced_local
2655 || info->symbolic)
2656 {
2657 /* This references the local defitionion. We must
2658 initialize this entry in the global offset table.
2659 Since the offset must always be a multiple of 8,
2660 we use the least significant bit to record
2661 whether we have initialized it already.
2662
2663 When doing a dynamic link, we create a .rela.got
2664 relocation entry to initialize the value. This
2665 is done in the finish_dynamic_symbol routine. */
2666 if ((off & 1) != 0)
2667 off &= ~1;
2668 else
2669 {
2670 bfd_put_64 (output_bfd, relocation,
2671 base_got->contents + off);
2672 /* Note that this is harmless for the GOTPLT64
2673 case, as -1 | 1 still is -1. */
2674 h->got.offset |= 1;
2675 }
2676 }
2677 }
2678
2679 relocation = (base_got->output_section->vma
2680 + base_got->output_offset + off);
2681
2682 goto do_relocation;
2683 }
2684
2685 if (h->plt.offset == (bfd_vma) -1)
2686 {
2687 /* Handle static pointers of STT_GNU_IFUNC symbols. */
2688 if (r_type == htab->pointer_r_type
2689 && (input_section->flags & SEC_CODE) == 0)
2690 goto do_ifunc_pointer;
2691 goto bad_ifunc_reloc;
2692 }
2693
2694 /* STT_GNU_IFUNC symbol must go through PLT. */
2695 if (htab->elf.splt != NULL)
2696 {
2697 if (htab->plt_second != NULL)
2698 {
2699 resolved_plt = htab->plt_second;
2700 plt_offset = eh->plt_second.offset;
2701 }
2702 else
2703 {
2704 resolved_plt = htab->elf.splt;
2705 plt_offset = h->plt.offset;
2706 }
2707 }
2708 else
2709 {
2710 resolved_plt = htab->elf.iplt;
2711 plt_offset = h->plt.offset;
2712 }
2713
2714 relocation = (resolved_plt->output_section->vma
2715 + resolved_plt->output_offset + plt_offset);
2716
2717 switch (r_type)
2718 {
2719 default:
2720 bad_ifunc_reloc:
2721 if (h->root.root.string)
2722 name = h->root.root.string;
2723 else
2724 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2725 NULL);
2726 _bfd_error_handler
2727 /* xgettext:c-format */
2728 (_("%pB: relocation %s against STT_GNU_IFUNC "
2729 "symbol `%s' isn't supported"), input_bfd,
2730 howto->name, name);
2731 bfd_set_error (bfd_error_bad_value);
2732 return false;
2733
2734 case R_X86_64_32S:
2735 if (bfd_link_pic (info))
2736 abort ();
2737 goto do_relocation;
2738
2739 case R_X86_64_32:
2740 if (ABI_64_P (output_bfd))
2741 goto do_relocation;
2742 /* FALLTHROUGH */
2743 case R_X86_64_64:
2744 do_ifunc_pointer:
2745 if (rel->r_addend != 0)
2746 {
2747 if (h->root.root.string)
2748 name = h->root.root.string;
2749 else
2750 name = bfd_elf_sym_name (input_bfd, symtab_hdr,
2751 sym, NULL);
2752 _bfd_error_handler
2753 /* xgettext:c-format */
2754 (_("%pB: relocation %s against STT_GNU_IFUNC "
2755 "symbol `%s' has non-zero addend: %" PRId64),
2756 input_bfd, howto->name, name, (int64_t) rel->r_addend);
2757 bfd_set_error (bfd_error_bad_value);
2758 return false;
2759 }
2760
2761 /* Generate dynamic relcoation only when there is a
2762 non-GOT reference in a shared object or there is no
2763 PLT. */
2764 if ((bfd_link_pic (info) && h->non_got_ref)
2765 || h->plt.offset == (bfd_vma) -1)
2766 {
2767 Elf_Internal_Rela outrel;
2768 asection *sreloc;
2769
2770 /* Need a dynamic relocation to get the real function
2771 address. */
2772 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2773 info,
2774 input_section,
2775 rel->r_offset);
2776 if (outrel.r_offset == (bfd_vma) -1
2777 || outrel.r_offset == (bfd_vma) -2)
2778 abort ();
2779
2780 outrel.r_offset += (input_section->output_section->vma
2781 + input_section->output_offset);
2782
2783 if (POINTER_LOCAL_IFUNC_P (info, h))
2784 {
2785 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
2786 h->root.root.string,
2787 h->root.u.def.section->owner);
2788
2789 /* This symbol is resolved locally. */
2790 outrel.r_info = htab->r_info (0, R_X86_64_IRELATIVE);
2791 outrel.r_addend = (h->root.u.def.value
2792 + h->root.u.def.section->output_section->vma
2793 + h->root.u.def.section->output_offset);
2794
2795 if (htab->params->report_relative_reloc)
2796 _bfd_x86_elf_link_report_relative_reloc
2797 (info, input_section, h, sym,
2798 "R_X86_64_IRELATIVE", &outrel);
2799 }
2800 else
2801 {
2802 outrel.r_info = htab->r_info (h->dynindx, r_type);
2803 outrel.r_addend = 0;
2804 }
2805
2806 /* Dynamic relocations are stored in
2807 1. .rela.ifunc section in PIC object.
2808 2. .rela.got section in dynamic executable.
2809 3. .rela.iplt section in static executable. */
2810 if (bfd_link_pic (info))
2811 sreloc = htab->elf.irelifunc;
2812 else if (htab->elf.splt != NULL)
2813 sreloc = htab->elf.srelgot;
2814 else
2815 sreloc = htab->elf.irelplt;
2816 elf_append_rela (output_bfd, sreloc, &outrel);
2817
2818 /* If this reloc is against an external symbol, we
2819 do not want to fiddle with the addend. Otherwise,
2820 we need to include the symbol value so that it
2821 becomes an addend for the dynamic reloc. For an
2822 internal symbol, we have updated addend. */
2823 continue;
2824 }
2825 /* FALLTHROUGH */
2826 case R_X86_64_PC32:
2827 case R_X86_64_PC32_BND:
2828 case R_X86_64_PC64:
2829 case R_X86_64_PLT32:
2830 case R_X86_64_PLT32_BND:
2831 goto do_relocation;
2832 }
2833 }
2834
2835 skip_ifunc:
2836 resolved_to_zero = (eh != NULL
2837 && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh));
2838
2839 /* When generating a shared object, the relocations handled here are
2840 copied into the output file to be resolved at run time. */
2841 switch (r_type)
2842 {
2843 case R_X86_64_GOT32:
2844 case R_X86_64_GOT64:
2845 /* Relocation is to the entry for this symbol in the global
2846 offset table. */
2847 case R_X86_64_GOTPCREL:
2848 case R_X86_64_GOTPCRELX:
2849 case R_X86_64_REX_GOTPCRELX:
2850 case R_X86_64_GOTPCREL64:
2851 /* Use global offset table entry as symbol value. */
2852 case R_X86_64_GOTPLT64:
2853 /* This is obsolete and treated the same as GOT64. */
2854 base_got = htab->elf.sgot;
2855
2856 if (htab->elf.sgot == NULL)
2857 abort ();
2858
2859 relative_reloc = false;
2860 if (h != NULL)
2861 {
2862 off = h->got.offset;
2863 if (h->needs_plt
2864 && h->plt.offset != (bfd_vma)-1
2865 && off == (bfd_vma)-1)
2866 {
2867 /* We can't use h->got.offset here to save
2868 state, or even just remember the offset, as
2869 finish_dynamic_symbol would use that as offset into
2870 .got. */
2871 bfd_vma plt_index = (h->plt.offset / plt_entry_size
2872 - htab->plt.has_plt0);
2873 off = (plt_index + 3) * GOT_ENTRY_SIZE;
2874 base_got = htab->elf.sgotplt;
2875 }
2876
2877 if (RESOLVED_LOCALLY_P (info, h, htab))
2878 {
2879 /* We must initialize this entry in the global offset
2880 table. Since the offset must always be a multiple
2881 of 8, we use the least significant bit to record
2882 whether we have initialized it already.
2883
2884 When doing a dynamic link, we create a .rela.got
2885 relocation entry to initialize the value. This is
2886 done in the finish_dynamic_symbol routine. */
2887 if ((off & 1) != 0)
2888 off &= ~1;
2889 else
2890 {
2891 bfd_put_64 (output_bfd, relocation,
2892 base_got->contents + off);
2893 /* Note that this is harmless for the GOTPLT64 case,
2894 as -1 | 1 still is -1. */
2895 h->got.offset |= 1;
2896
2897 /* NB: Don't generate relative relocation here if
2898 it has been generated by DT_RELR. */
2899 if (!info->enable_dt_relr
2900 && GENERATE_RELATIVE_RELOC_P (info, h))
2901 {
2902 /* If this symbol isn't dynamic in PIC,
2903 generate R_X86_64_RELATIVE here. */
2904 eh->no_finish_dynamic_symbol = 1;
2905 relative_reloc = true;
2906 }
2907 }
2908 }
2909 else
2910 unresolved_reloc = false;
2911 }
2912 else
2913 {
2914 if (local_got_offsets == NULL)
2915 abort ();
2916
2917 off = local_got_offsets[r_symndx];
2918
2919 /* The offset must always be a multiple of 8. We use
2920 the least significant bit to record whether we have
2921 already generated the necessary reloc. */
2922 if ((off & 1) != 0)
2923 off &= ~1;
2924 else
2925 {
2926 bfd_put_64 (output_bfd, relocation,
2927 base_got->contents + off);
2928 local_got_offsets[r_symndx] |= 1;
2929
2930 /* NB: GOTPCREL relocations against local absolute
2931 symbol store relocation value in the GOT slot
2932 without relative relocation. Don't generate
2933 relative relocation here if it has been generated
2934 by DT_RELR. */
2935 if (!info->enable_dt_relr
2936 && bfd_link_pic (info)
2937 && !(sym->st_shndx == SHN_ABS
2938 && (r_type == R_X86_64_GOTPCREL
2939 || r_type == R_X86_64_GOTPCRELX
2940 || r_type == R_X86_64_REX_GOTPCRELX)))
2941 relative_reloc = true;
2942 }
2943 }
2944
2945 if (relative_reloc)
2946 {
2947 asection *s;
2948 Elf_Internal_Rela outrel;
2949
2950 /* We need to generate a R_X86_64_RELATIVE reloc
2951 for the dynamic linker. */
2952 s = htab->elf.srelgot;
2953 if (s == NULL)
2954 abort ();
2955
2956 outrel.r_offset = (base_got->output_section->vma
2957 + base_got->output_offset
2958 + off);
2959 outrel.r_info = htab->r_info (0, R_X86_64_RELATIVE);
2960 outrel.r_addend = relocation;
2961
2962 if (htab->params->report_relative_reloc)
2963 _bfd_x86_elf_link_report_relative_reloc
2964 (info, input_section, h, sym, "R_X86_64_RELATIVE",
2965 &outrel);
2966
2967 elf_append_rela (output_bfd, s, &outrel);
2968 }
2969
2970 if (off >= (bfd_vma) -2)
2971 abort ();
2972
2973 relocation = base_got->output_section->vma
2974 + base_got->output_offset + off;
2975 if (r_type != R_X86_64_GOTPCREL
2976 && r_type != R_X86_64_GOTPCRELX
2977 && r_type != R_X86_64_REX_GOTPCRELX
2978 && r_type != R_X86_64_GOTPCREL64)
2979 relocation -= htab->elf.sgotplt->output_section->vma
2980 - htab->elf.sgotplt->output_offset;
2981
2982 break;
2983
2984 case R_X86_64_GOTOFF64:
2985 /* Relocation is relative to the start of the global offset
2986 table. */
2987
2988 /* Check to make sure it isn't a protected function or data
2989 symbol for shared library since it may not be local when
2990 used as function address or with copy relocation. We also
2991 need to make sure that a symbol is referenced locally. */
2992 if (bfd_link_pic (info) && h)
2993 {
2994 if (!h->def_regular)
2995 {
2996 const char *v;
2997
2998 switch (ELF_ST_VISIBILITY (h->other))
2999 {
3000 case STV_HIDDEN:
3001 v = _("hidden symbol");
3002 break;
3003 case STV_INTERNAL:
3004 v = _("internal symbol");
3005 break;
3006 case STV_PROTECTED:
3007 v = _("protected symbol");
3008 break;
3009 default:
3010 v = _("symbol");
3011 break;
3012 }
3013
3014 _bfd_error_handler
3015 /* xgettext:c-format */
3016 (_("%pB: relocation R_X86_64_GOTOFF64 against undefined %s"
3017 " `%s' can not be used when making a shared object"),
3018 input_bfd, v, h->root.root.string);
3019 bfd_set_error (bfd_error_bad_value);
3020 return false;
3021 }
3022 else if (!bfd_link_executable (info)
3023 && !SYMBOL_REFERENCES_LOCAL_P (info, h)
3024 && (h->type == STT_FUNC
3025 || h->type == STT_OBJECT)
3026 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
3027 {
3028 _bfd_error_handler
3029 /* xgettext:c-format */
3030 (_("%pB: relocation R_X86_64_GOTOFF64 against protected %s"
3031 " `%s' can not be used when making a shared object"),
3032 input_bfd,
3033 h->type == STT_FUNC ? "function" : "data",
3034 h->root.root.string);
3035 bfd_set_error (bfd_error_bad_value);
3036 return false;
3037 }
3038 }
3039
3040 /* Note that sgot is not involved in this
3041 calculation. We always want the start of .got.plt. If we
3042 defined _GLOBAL_OFFSET_TABLE_ in a different way, as is
3043 permitted by the ABI, we might have to change this
3044 calculation. */
3045 relocation -= htab->elf.sgotplt->output_section->vma
3046 + htab->elf.sgotplt->output_offset;
3047 break;
3048
3049 case R_X86_64_GOTPC32:
3050 case R_X86_64_GOTPC64:
3051 /* Use global offset table as symbol value. */
3052 relocation = htab->elf.sgotplt->output_section->vma
3053 + htab->elf.sgotplt->output_offset;
3054 unresolved_reloc = false;
3055 break;
3056
3057 case R_X86_64_PLTOFF64:
3058 /* Relocation is PLT entry relative to GOT. For local
3059 symbols it's the symbol itself relative to GOT. */
3060 if (h != NULL
3061 /* See PLT32 handling. */
3062 && (h->plt.offset != (bfd_vma) -1
3063 || eh->plt_got.offset != (bfd_vma) -1)
3064 && htab->elf.splt != NULL)
3065 {
3066 if (eh->plt_got.offset != (bfd_vma) -1)
3067 {
3068 /* Use the GOT PLT. */
3069 resolved_plt = htab->plt_got;
3070 plt_offset = eh->plt_got.offset;
3071 }
3072 else if (htab->plt_second != NULL)
3073 {
3074 resolved_plt = htab->plt_second;
3075 plt_offset = eh->plt_second.offset;
3076 }
3077 else
3078 {
3079 resolved_plt = htab->elf.splt;
3080 plt_offset = h->plt.offset;
3081 }
3082
3083 relocation = (resolved_plt->output_section->vma
3084 + resolved_plt->output_offset
3085 + plt_offset);
3086 unresolved_reloc = false;
3087 }
3088
3089 relocation -= htab->elf.sgotplt->output_section->vma
3090 + htab->elf.sgotplt->output_offset;
3091 break;
3092
3093 case R_X86_64_PLT32:
3094 case R_X86_64_PLT32_BND:
3095 /* Relocation is to the entry for this symbol in the
3096 procedure linkage table. */
3097
3098 /* Resolve a PLT32 reloc against a local symbol directly,
3099 without using the procedure linkage table. */
3100 if (h == NULL)
3101 break;
3102
3103 if ((h->plt.offset == (bfd_vma) -1
3104 && eh->plt_got.offset == (bfd_vma) -1)
3105 || htab->elf.splt == NULL)
3106 {
3107 /* We didn't make a PLT entry for this symbol. This
3108 happens when statically linking PIC code, or when
3109 using -Bsymbolic. */
3110 break;
3111 }
3112
3113 use_plt:
3114 if (h->plt.offset != (bfd_vma) -1)
3115 {
3116 if (htab->plt_second != NULL)
3117 {
3118 resolved_plt = htab->plt_second;
3119 plt_offset = eh->plt_second.offset;
3120 }
3121 else
3122 {
3123 resolved_plt = htab->elf.splt;
3124 plt_offset = h->plt.offset;
3125 }
3126 }
3127 else
3128 {
3129 /* Use the GOT PLT. */
3130 resolved_plt = htab->plt_got;
3131 plt_offset = eh->plt_got.offset;
3132 }
3133
3134 relocation = (resolved_plt->output_section->vma
3135 + resolved_plt->output_offset
3136 + plt_offset);
3137 unresolved_reloc = false;
3138 break;
3139
3140 case R_X86_64_SIZE32:
3141 case R_X86_64_SIZE64:
3142 /* Set to symbol size. */
3143 relocation = st_size;
3144 goto direct;
3145
3146 case R_X86_64_PC8:
3147 case R_X86_64_PC16:
3148 case R_X86_64_PC32:
3149 case R_X86_64_PC32_BND:
3150 /* Don't complain about -fPIC if the symbol is undefined when
3151 building executable unless it is unresolved weak symbol,
3152 references a dynamic definition in PIE or -z nocopyreloc
3153 is used. */
3154 no_copyreloc_p
3155 = (info->nocopyreloc
3156 || (h != NULL
3157 && !h->root.linker_def
3158 && !h->root.ldscript_def
3159 && eh->def_protected
3160 && elf_has_no_copy_on_protected (h->root.u.def.section->owner)));
3161
3162 if ((input_section->flags & SEC_ALLOC) != 0
3163 && (input_section->flags & SEC_READONLY) != 0
3164 && h != NULL
3165 && ((bfd_link_executable (info)
3166 && ((h->root.type == bfd_link_hash_undefweak
3167 && (eh == NULL
3168 || !UNDEFINED_WEAK_RESOLVED_TO_ZERO (info,
3169 eh)))
3170 || (bfd_link_pie (info)
3171 && !SYMBOL_DEFINED_NON_SHARED_P (h)
3172 && h->def_dynamic)
3173 || (no_copyreloc_p
3174 && h->def_dynamic
3175 && !(h->root.u.def.section->flags & SEC_CODE))))
3176 || (bfd_link_pie (info)
3177 && h->root.type == bfd_link_hash_undefweak)
3178 || bfd_link_dll (info)))
3179 {
3180 bool fail = false;
3181 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
3182 {
3183 /* Symbol is referenced locally. Make sure it is
3184 defined locally. */
3185 fail = !SYMBOL_DEFINED_NON_SHARED_P (h);
3186 }
3187 else if (bfd_link_pie (info))
3188 {
3189 /* We can only use PC-relative relocations in PIE
3190 from non-code sections. */
3191 if (h->root.type == bfd_link_hash_undefweak
3192 || (h->type == STT_FUNC
3193 && (sec->flags & SEC_CODE) != 0))
3194 fail = true;
3195 }
3196 else if (no_copyreloc_p || bfd_link_dll (info))
3197 {
3198 /* Symbol doesn't need copy reloc and isn't
3199 referenced locally. Don't allow PC-relative
3200 relocations against default and protected
3201 symbols since address of protected function
3202 and location of protected data may not be in
3203 the shared object. */
3204 fail = (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3205 || ELF_ST_VISIBILITY (h->other) == STV_PROTECTED);
3206 }
3207
3208 if (fail)
3209 return elf_x86_64_need_pic (info, input_bfd, input_section,
3210 h, NULL, NULL, howto);
3211 }
3212 /* Since x86-64 has PC-relative PLT, we can use PLT in PIE
3213 as function address. */
3214 else if (h != NULL
3215 && (input_section->flags & SEC_CODE) == 0
3216 && bfd_link_pie (info)
3217 && h->type == STT_FUNC
3218 && !h->def_regular
3219 && h->def_dynamic)
3220 goto use_plt;
3221 /* Fall through. */
3222
3223 case R_X86_64_8:
3224 case R_X86_64_16:
3225 case R_X86_64_32:
3226 case R_X86_64_PC64:
3227 case R_X86_64_64:
3228 /* FIXME: The ABI says the linker should make sure the value is
3229 the same when it's zeroextended to 64 bit. */
3230
3231 direct:
3232 if ((input_section->flags & SEC_ALLOC) == 0)
3233 break;
3234
3235 need_copy_reloc_in_pie = (bfd_link_pie (info)
3236 && h != NULL
3237 && (h->needs_copy
3238 || eh->needs_copy
3239 || (h->root.type
3240 == bfd_link_hash_undefined))
3241 && (X86_PCREL_TYPE_P (true, r_type)
3242 || X86_SIZE_TYPE_P (true,
3243 r_type)));
3244
3245 if (GENERATE_DYNAMIC_RELOCATION_P (true, info, eh, r_type, sec,
3246 need_copy_reloc_in_pie,
3247 resolved_to_zero, false))
3248 {
3249 Elf_Internal_Rela outrel;
3250 bool skip, relocate;
3251 bool generate_dynamic_reloc = true;
3252 asection *sreloc;
3253 const char *relative_reloc_name = NULL;
3254
3255 /* When generating a shared object, these relocations
3256 are copied into the output file to be resolved at run
3257 time. */
3258 skip = false;
3259 relocate = false;
3260
3261 outrel.r_offset =
3262 _bfd_elf_section_offset (output_bfd, info, input_section,
3263 rel->r_offset);
3264 if (outrel.r_offset == (bfd_vma) -1)
3265 skip = true;
3266 else if (outrel.r_offset == (bfd_vma) -2)
3267 skip = true, relocate = true;
3268
3269 outrel.r_offset += (input_section->output_section->vma
3270 + input_section->output_offset);
3271
3272 if (skip)
3273 memset (&outrel, 0, sizeof outrel);
3274
3275 else if (COPY_INPUT_RELOC_P (true, info, h, r_type))
3276 {
3277 outrel.r_info = htab->r_info (h->dynindx, r_type);
3278 outrel.r_addend = rel->r_addend;
3279 }
3280 else
3281 {
3282 /* This symbol is local, or marked to become local.
3283 When relocation overflow check is disabled, we
3284 convert R_X86_64_32 to dynamic R_X86_64_RELATIVE. */
3285 if (r_type == htab->pointer_r_type
3286 || (r_type == R_X86_64_32
3287 && htab->params->no_reloc_overflow_check))
3288 {
3289 relocate = true;
3290 /* NB: Don't generate relative relocation here if
3291 it has been generated by DT_RELR. */
3292 if (info->enable_dt_relr)
3293 generate_dynamic_reloc = false;
3294 else
3295 {
3296 outrel.r_info =
3297 htab->r_info (0, R_X86_64_RELATIVE);
3298 outrel.r_addend = relocation + rel->r_addend;
3299 relative_reloc_name = "R_X86_64_RELATIVE";
3300 }
3301 }
3302 else if (r_type == R_X86_64_64
3303 && !ABI_64_P (output_bfd))
3304 {
3305 relocate = true;
3306 outrel.r_info = htab->r_info (0,
3307 R_X86_64_RELATIVE64);
3308 outrel.r_addend = relocation + rel->r_addend;
3309 relative_reloc_name = "R_X86_64_RELATIVE64";
3310 /* Check addend overflow. */
3311 if ((outrel.r_addend & 0x80000000)
3312 != (rel->r_addend & 0x80000000))
3313 {
3314 const char *name;
3315 int addend = rel->r_addend;
3316 if (h && h->root.root.string)
3317 name = h->root.root.string;
3318 else
3319 name = bfd_elf_sym_name (input_bfd, symtab_hdr,
3320 sym, NULL);
3321 _bfd_error_handler
3322 /* xgettext:c-format */
3323 (_("%pB: addend %s%#x in relocation %s against "
3324 "symbol `%s' at %#" PRIx64
3325 " in section `%pA' is out of range"),
3326 input_bfd, addend < 0 ? "-" : "", addend,
3327 howto->name, name, (uint64_t) rel->r_offset,
3328 input_section);
3329 bfd_set_error (bfd_error_bad_value);
3330 return false;
3331 }
3332 }
3333 else
3334 {
3335 long sindx;
3336
3337 if (bfd_is_abs_section (sec))
3338 sindx = 0;
3339 else if (sec == NULL || sec->owner == NULL)
3340 {
3341 bfd_set_error (bfd_error_bad_value);
3342 return false;
3343 }
3344 else
3345 {
3346 asection *osec;
3347
3348 /* We are turning this relocation into one
3349 against a section symbol. It would be
3350 proper to subtract the symbol's value,
3351 osec->vma, from the emitted reloc addend,
3352 but ld.so expects buggy relocs. */
3353 osec = sec->output_section;
3354 sindx = elf_section_data (osec)->dynindx;
3355 if (sindx == 0)
3356 {
3357 asection *oi = htab->elf.text_index_section;
3358 sindx = elf_section_data (oi)->dynindx;
3359 }
3360 BFD_ASSERT (sindx != 0);
3361 }
3362
3363 outrel.r_info = htab->r_info (sindx, r_type);
3364 outrel.r_addend = relocation + rel->r_addend;
3365 }
3366 }
3367
3368 if (generate_dynamic_reloc)
3369 {
3370 sreloc = elf_section_data (input_section)->sreloc;
3371
3372 if (sreloc == NULL || sreloc->contents == NULL)
3373 {
3374 r = bfd_reloc_notsupported;
3375 goto check_relocation_error;
3376 }
3377
3378 if (relative_reloc_name
3379 && htab->params->report_relative_reloc)
3380 _bfd_x86_elf_link_report_relative_reloc
3381 (info, input_section, h, sym,
3382 relative_reloc_name, &outrel);
3383
3384 elf_append_rela (output_bfd, sreloc, &outrel);
3385 }
3386
3387 /* If this reloc is against an external symbol, we do
3388 not want to fiddle with the addend. Otherwise, we
3389 need to include the symbol value so that it becomes
3390 an addend for the dynamic reloc. */
3391 if (! relocate)
3392 continue;
3393 }
3394
3395 break;
3396
3397 case R_X86_64_TLSGD:
3398 case R_X86_64_GOTPC32_TLSDESC:
3399 case R_X86_64_TLSDESC_CALL:
3400 case R_X86_64_GOTTPOFF:
3401 tls_type = GOT_UNKNOWN;
3402 if (h == NULL && local_got_offsets)
3403 tls_type = elf_x86_local_got_tls_type (input_bfd) [r_symndx];
3404 else if (h != NULL)
3405 tls_type = elf_x86_hash_entry (h)->tls_type;
3406
3407 r_type_tls = r_type;
3408 if (! elf_x86_64_tls_transition (info, input_bfd,
3409 input_section, contents,
3410 symtab_hdr, sym_hashes,
3411 &r_type_tls, tls_type, rel,
3412 relend, h, r_symndx, true))
3413 return false;
3414
3415 if (r_type_tls == R_X86_64_TPOFF32)
3416 {
3417 bfd_vma roff = rel->r_offset;
3418
3419 BFD_ASSERT (! unresolved_reloc);
3420
3421 if (r_type == R_X86_64_TLSGD)
3422 {
3423 /* GD->LE transition. For 64bit, change
3424 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3425 .word 0x6666; rex64; call __tls_get_addr@PLT
3426 or
3427 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3428 .byte 0x66; rex64
3429 call *__tls_get_addr@GOTPCREL(%rip)
3430 which may be converted to
3431 addr32 call __tls_get_addr
3432 into:
3433 movq %fs:0, %rax
3434 leaq foo@tpoff(%rax), %rax
3435 For 32bit, change
3436 leaq foo@tlsgd(%rip), %rdi
3437 .word 0x6666; rex64; call __tls_get_addr@PLT
3438 or
3439 leaq foo@tlsgd(%rip), %rdi
3440 .byte 0x66; rex64
3441 call *__tls_get_addr@GOTPCREL(%rip)
3442 which may be converted to
3443 addr32 call __tls_get_addr
3444 into:
3445 movl %fs:0, %eax
3446 leaq foo@tpoff(%rax), %rax
3447 For largepic, change:
3448 leaq foo@tlsgd(%rip), %rdi
3449 movabsq $__tls_get_addr@pltoff, %rax
3450 addq %r15, %rax
3451 call *%rax
3452 into:
3453 movq %fs:0, %rax
3454 leaq foo@tpoff(%rax), %rax
3455 nopw 0x0(%rax,%rax,1) */
3456 int largepic = 0;
3457 if (ABI_64_P (output_bfd))
3458 {
3459 if (contents[roff + 5] == 0xb8)
3460 {
3461 if (roff < 3
3462 || (roff - 3 + 22) > input_section->size)
3463 {
3464 corrupt_input:
3465 info->callbacks->einfo
3466 (_("%F%P: corrupt input: %pB\n"),
3467 input_bfd);
3468 return false;
3469 }
3470 memcpy (contents + roff - 3,
3471 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80"
3472 "\0\0\0\0\x66\x0f\x1f\x44\0", 22);
3473 largepic = 1;
3474 }
3475 else
3476 {
3477 if (roff < 4
3478 || (roff - 4 + 16) > input_section->size)
3479 goto corrupt_input;
3480 memcpy (contents + roff - 4,
3481 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
3482 16);
3483 }
3484 }
3485 else
3486 {
3487 if (roff < 3
3488 || (roff - 3 + 15) > input_section->size)
3489 goto corrupt_input;
3490 memcpy (contents + roff - 3,
3491 "\x64\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
3492 15);
3493 }
3494 bfd_put_32 (output_bfd,
3495 elf_x86_64_tpoff (info, relocation),
3496 contents + roff + 8 + largepic);
3497 /* Skip R_X86_64_PC32, R_X86_64_PLT32,
3498 R_X86_64_GOTPCRELX and R_X86_64_PLTOFF64. */
3499 rel++;
3500 wrel++;
3501 continue;
3502 }
3503 else if (r_type == R_X86_64_GOTPC32_TLSDESC)
3504 {
3505 /* GDesc -> LE transition.
3506 It's originally something like:
3507 leaq x@tlsdesc(%rip), %rax <--- LP64 mode.
3508 rex leal x@tlsdesc(%rip), %eax <--- X32 mode.
3509
3510 Change it to:
3511 movq $x@tpoff, %rax <--- LP64 mode.
3512 rex movl $x@tpoff, %eax <--- X32 mode.
3513 */
3514
3515 unsigned int val, type;
3516
3517 if (roff < 3)
3518 goto corrupt_input;
3519 type = bfd_get_8 (input_bfd, contents + roff - 3);
3520 val = bfd_get_8 (input_bfd, contents + roff - 1);
3521 bfd_put_8 (output_bfd,
3522 (type & 0x48) | ((type >> 2) & 1),
3523 contents + roff - 3);
3524 bfd_put_8 (output_bfd, 0xc7, contents + roff - 2);
3525 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
3526 contents + roff - 1);
3527 bfd_put_32 (output_bfd,
3528 elf_x86_64_tpoff (info, relocation),
3529 contents + roff);
3530 continue;
3531 }
3532 else if (r_type == R_X86_64_TLSDESC_CALL)
3533 {
3534 /* GDesc -> LE transition.
3535 It's originally:
3536 call *(%rax) <--- LP64 mode.
3537 call *(%eax) <--- X32 mode.
3538 Turn it into:
3539 xchg %ax,%ax <-- LP64 mode.
3540 nopl (%rax) <-- X32 mode.
3541 */
3542 unsigned int prefix = 0;
3543 if (!ABI_64_P (input_bfd))
3544 {
3545 /* Check for call *x@tlsdesc(%eax). */
3546 if (contents[roff] == 0x67)
3547 prefix = 1;
3548 }
3549 if (prefix)
3550 {
3551 bfd_put_8 (output_bfd, 0x0f, contents + roff);
3552 bfd_put_8 (output_bfd, 0x1f, contents + roff + 1);
3553 bfd_put_8 (output_bfd, 0x00, contents + roff + 2);
3554 }
3555 else
3556 {
3557 bfd_put_8 (output_bfd, 0x66, contents + roff);
3558 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3559 }
3560 continue;
3561 }
3562 else if (r_type == R_X86_64_GOTTPOFF)
3563 {
3564 /* IE->LE transition:
3565 For 64bit, originally it can be one of:
3566 movq foo@gottpoff(%rip), %reg
3567 addq foo@gottpoff(%rip), %reg
3568 We change it into:
3569 movq $foo, %reg
3570 leaq foo(%reg), %reg
3571 addq $foo, %reg.
3572 For 32bit, originally it can be one of:
3573 movq foo@gottpoff(%rip), %reg
3574 addl foo@gottpoff(%rip), %reg
3575 We change it into:
3576 movq $foo, %reg
3577 leal foo(%reg), %reg
3578 addl $foo, %reg. */
3579
3580 unsigned int val, type, reg;
3581
3582 if (roff >= 3)
3583 val = bfd_get_8 (input_bfd, contents + roff - 3);
3584 else
3585 {
3586 if (roff < 2)
3587 goto corrupt_input;
3588 val = 0;
3589 }
3590 type = bfd_get_8 (input_bfd, contents + roff - 2);
3591 reg = bfd_get_8 (input_bfd, contents + roff - 1);
3592 reg >>= 3;
3593 if (type == 0x8b)
3594 {
3595 /* movq */
3596 if (val == 0x4c)
3597 {
3598 if (roff < 3)
3599 goto corrupt_input;
3600 bfd_put_8 (output_bfd, 0x49,
3601 contents + roff - 3);
3602 }
3603 else if (!ABI_64_P (output_bfd) && val == 0x44)
3604 {
3605 if (roff < 3)
3606 goto corrupt_input;
3607 bfd_put_8 (output_bfd, 0x41,
3608 contents + roff - 3);
3609 }
3610 bfd_put_8 (output_bfd, 0xc7,
3611 contents + roff - 2);
3612 bfd_put_8 (output_bfd, 0xc0 | reg,
3613 contents + roff - 1);
3614 }
3615 else if (reg == 4)
3616 {
3617 /* addq/addl -> addq/addl - addressing with %rsp/%r12
3618 is special */
3619 if (val == 0x4c)
3620 {
3621 if (roff < 3)
3622 goto corrupt_input;
3623 bfd_put_8 (output_bfd, 0x49,
3624 contents + roff - 3);
3625 }
3626 else if (!ABI_64_P (output_bfd) && val == 0x44)
3627 {
3628 if (roff < 3)
3629 goto corrupt_input;
3630 bfd_put_8 (output_bfd, 0x41,
3631 contents + roff - 3);
3632 }
3633 bfd_put_8 (output_bfd, 0x81,
3634 contents + roff - 2);
3635 bfd_put_8 (output_bfd, 0xc0 | reg,
3636 contents + roff - 1);
3637 }
3638 else
3639 {
3640 /* addq/addl -> leaq/leal */
3641 if (val == 0x4c)
3642 {
3643 if (roff < 3)
3644 goto corrupt_input;
3645 bfd_put_8 (output_bfd, 0x4d,
3646 contents + roff - 3);
3647 }
3648 else if (!ABI_64_P (output_bfd) && val == 0x44)
3649 {
3650 if (roff < 3)
3651 goto corrupt_input;
3652 bfd_put_8 (output_bfd, 0x45,
3653 contents + roff - 3);
3654 }
3655 bfd_put_8 (output_bfd, 0x8d,
3656 contents + roff - 2);
3657 bfd_put_8 (output_bfd, 0x80 | reg | (reg << 3),
3658 contents + roff - 1);
3659 }
3660 bfd_put_32 (output_bfd,
3661 elf_x86_64_tpoff (info, relocation),
3662 contents + roff);
3663 continue;
3664 }
3665 else
3666 BFD_ASSERT (false);
3667 }
3668
3669 if (htab->elf.sgot == NULL)
3670 abort ();
3671
3672 if (h != NULL)
3673 {
3674 off = h->got.offset;
3675 offplt = elf_x86_hash_entry (h)->tlsdesc_got;
3676 }
3677 else
3678 {
3679 if (local_got_offsets == NULL)
3680 abort ();
3681
3682 off = local_got_offsets[r_symndx];
3683 offplt = local_tlsdesc_gotents[r_symndx];
3684 }
3685
3686 if ((off & 1) != 0)
3687 off &= ~1;
3688 else
3689 {
3690 Elf_Internal_Rela outrel;
3691 int dr_type, indx;
3692 asection *sreloc;
3693
3694 if (htab->elf.srelgot == NULL)
3695 abort ();
3696
3697 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3698
3699 if (GOT_TLS_GDESC_P (tls_type))
3700 {
3701 outrel.r_info = htab->r_info (indx, R_X86_64_TLSDESC);
3702 BFD_ASSERT (htab->sgotplt_jump_table_size + offplt
3703 + 2 * GOT_ENTRY_SIZE <= htab->elf.sgotplt->size);
3704 outrel.r_offset = (htab->elf.sgotplt->output_section->vma
3705 + htab->elf.sgotplt->output_offset
3706 + offplt
3707 + htab->sgotplt_jump_table_size);
3708 sreloc = htab->elf.srelplt;
3709 if (indx == 0)
3710 outrel.r_addend = relocation - _bfd_x86_elf_dtpoff_base (info);
3711 else
3712 outrel.r_addend = 0;
3713 elf_append_rela (output_bfd, sreloc, &outrel);
3714 }
3715
3716 sreloc = htab->elf.srelgot;
3717
3718 outrel.r_offset = (htab->elf.sgot->output_section->vma
3719 + htab->elf.sgot->output_offset + off);
3720
3721 if (GOT_TLS_GD_P (tls_type))
3722 dr_type = R_X86_64_DTPMOD64;
3723 else if (GOT_TLS_GDESC_P (tls_type))
3724 goto dr_done;
3725 else
3726 dr_type = R_X86_64_TPOFF64;
3727
3728 bfd_put_64 (output_bfd, 0, htab->elf.sgot->contents + off);
3729 outrel.r_addend = 0;
3730 if ((dr_type == R_X86_64_TPOFF64
3731 || dr_type == R_X86_64_TLSDESC) && indx == 0)
3732 outrel.r_addend = relocation - _bfd_x86_elf_dtpoff_base (info);
3733 outrel.r_info = htab->r_info (indx, dr_type);
3734
3735 elf_append_rela (output_bfd, sreloc, &outrel);
3736
3737 if (GOT_TLS_GD_P (tls_type))
3738 {
3739 if (indx == 0)
3740 {
3741 BFD_ASSERT (! unresolved_reloc);
3742 bfd_put_64 (output_bfd,
3743 relocation - _bfd_x86_elf_dtpoff_base (info),
3744 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3745 }
3746 else
3747 {
3748 bfd_put_64 (output_bfd, 0,
3749 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3750 outrel.r_info = htab->r_info (indx,
3751 R_X86_64_DTPOFF64);
3752 outrel.r_offset += GOT_ENTRY_SIZE;
3753 elf_append_rela (output_bfd, sreloc,
3754 &outrel);
3755 }
3756 }
3757
3758 dr_done:
3759 if (h != NULL)
3760 h->got.offset |= 1;
3761 else
3762 local_got_offsets[r_symndx] |= 1;
3763 }
3764
3765 if (off >= (bfd_vma) -2
3766 && ! GOT_TLS_GDESC_P (tls_type))
3767 abort ();
3768 if (r_type_tls == r_type)
3769 {
3770 if (r_type == R_X86_64_GOTPC32_TLSDESC
3771 || r_type == R_X86_64_TLSDESC_CALL)
3772 relocation = htab->elf.sgotplt->output_section->vma
3773 + htab->elf.sgotplt->output_offset
3774 + offplt + htab->sgotplt_jump_table_size;
3775 else
3776 relocation = htab->elf.sgot->output_section->vma
3777 + htab->elf.sgot->output_offset + off;
3778 unresolved_reloc = false;
3779 }
3780 else
3781 {
3782 bfd_vma roff = rel->r_offset;
3783
3784 if (r_type == R_X86_64_TLSGD)
3785 {
3786 /* GD->IE transition. For 64bit, change
3787 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3788 .word 0x6666; rex64; call __tls_get_addr@PLT
3789 or
3790 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3791 .byte 0x66; rex64
3792 call *__tls_get_addr@GOTPCREL(%rip
3793 which may be converted to
3794 addr32 call __tls_get_addr
3795 into:
3796 movq %fs:0, %rax
3797 addq foo@gottpoff(%rip), %rax
3798 For 32bit, change
3799 leaq foo@tlsgd(%rip), %rdi
3800 .word 0x6666; rex64; call __tls_get_addr@PLT
3801 or
3802 leaq foo@tlsgd(%rip), %rdi
3803 .byte 0x66; rex64;
3804 call *__tls_get_addr@GOTPCREL(%rip)
3805 which may be converted to
3806 addr32 call __tls_get_addr
3807 into:
3808 movl %fs:0, %eax
3809 addq foo@gottpoff(%rip), %rax
3810 For largepic, change:
3811 leaq foo@tlsgd(%rip), %rdi
3812 movabsq $__tls_get_addr@pltoff, %rax
3813 addq %r15, %rax
3814 call *%rax
3815 into:
3816 movq %fs:0, %rax
3817 addq foo@gottpoff(%rax), %rax
3818 nopw 0x0(%rax,%rax,1) */
3819 int largepic = 0;
3820 if (ABI_64_P (output_bfd))
3821 {
3822 if (contents[roff + 5] == 0xb8)
3823 {
3824 if (roff < 3
3825 || (roff - 3 + 22) > input_section->size)
3826 goto corrupt_input;
3827 memcpy (contents + roff - 3,
3828 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05"
3829 "\0\0\0\0\x66\x0f\x1f\x44\0", 22);
3830 largepic = 1;
3831 }
3832 else
3833 {
3834 if (roff < 4
3835 || (roff - 4 + 16) > input_section->size)
3836 goto corrupt_input;
3837 memcpy (contents + roff - 4,
3838 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
3839 16);
3840 }
3841 }
3842 else
3843 {
3844 if (roff < 3
3845 || (roff - 3 + 15) > input_section->size)
3846 goto corrupt_input;
3847 memcpy (contents + roff - 3,
3848 "\x64\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
3849 15);
3850 }
3851
3852 relocation = (htab->elf.sgot->output_section->vma
3853 + htab->elf.sgot->output_offset + off
3854 - roff
3855 - largepic
3856 - input_section->output_section->vma
3857 - input_section->output_offset
3858 - 12);
3859 bfd_put_32 (output_bfd, relocation,
3860 contents + roff + 8 + largepic);
3861 /* Skip R_X86_64_PLT32/R_X86_64_PLTOFF64. */
3862 rel++;
3863 wrel++;
3864 continue;
3865 }
3866 else if (r_type == R_X86_64_GOTPC32_TLSDESC)
3867 {
3868 /* GDesc -> IE transition.
3869 It's originally something like:
3870 leaq x@tlsdesc(%rip), %rax <--- LP64 mode.
3871 rex leal x@tlsdesc(%rip), %eax <--- X32 mode.
3872
3873 Change it to:
3874 # before xchg %ax,%ax in LP64 mode.
3875 movq x@gottpoff(%rip), %rax
3876 # before nopl (%rax) in X32 mode.
3877 rex movl x@gottpoff(%rip), %eax
3878 */
3879
3880 /* Now modify the instruction as appropriate. To
3881 turn a lea into a mov in the form we use it, it
3882 suffices to change the second byte from 0x8d to
3883 0x8b. */
3884 if (roff < 2)
3885 goto corrupt_input;
3886 bfd_put_8 (output_bfd, 0x8b, contents + roff - 2);
3887
3888 bfd_put_32 (output_bfd,
3889 htab->elf.sgot->output_section->vma
3890 + htab->elf.sgot->output_offset + off
3891 - rel->r_offset
3892 - input_section->output_section->vma
3893 - input_section->output_offset
3894 - 4,
3895 contents + roff);
3896 continue;
3897 }
3898 else if (r_type == R_X86_64_TLSDESC_CALL)
3899 {
3900 /* GDesc -> IE transition.
3901 It's originally:
3902 call *(%rax) <--- LP64 mode.
3903 call *(%eax) <--- X32 mode.
3904
3905 Change it to:
3906 xchg %ax, %ax <-- LP64 mode.
3907 nopl (%rax) <-- X32 mode.
3908 */
3909
3910 unsigned int prefix = 0;
3911 if (!ABI_64_P (input_bfd))
3912 {
3913 /* Check for call *x@tlsdesc(%eax). */
3914 if (contents[roff] == 0x67)
3915 prefix = 1;
3916 }
3917 if (prefix)
3918 {
3919 bfd_put_8 (output_bfd, 0x0f, contents + roff);
3920 bfd_put_8 (output_bfd, 0x1f, contents + roff + 1);
3921 bfd_put_8 (output_bfd, 0x00, contents + roff + 2);
3922 }
3923 else
3924 {
3925 bfd_put_8 (output_bfd, 0x66, contents + roff);
3926 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3927 }
3928 continue;
3929 }
3930 else
3931 BFD_ASSERT (false);
3932 }
3933 break;
3934
3935 case R_X86_64_TLSLD:
3936 if (! elf_x86_64_tls_transition (info, input_bfd,
3937 input_section, contents,
3938 symtab_hdr, sym_hashes,
3939 &r_type, GOT_UNKNOWN, rel,
3940 relend, h, r_symndx, true))
3941 return false;
3942
3943 if (r_type != R_X86_64_TLSLD)
3944 {
3945 /* LD->LE transition:
3946 leaq foo@tlsld(%rip), %rdi
3947 call __tls_get_addr@PLT
3948 For 64bit, we change it into:
3949 .word 0x6666; .byte 0x66; movq %fs:0, %rax
3950 For 32bit, we change it into:
3951 nopl 0x0(%rax); movl %fs:0, %eax
3952 Or
3953 leaq foo@tlsld(%rip), %rdi;
3954 call *__tls_get_addr@GOTPCREL(%rip)
3955 which may be converted to
3956 addr32 call __tls_get_addr
3957 For 64bit, we change it into:
3958 .word 0x6666; .word 0x6666; movq %fs:0, %rax
3959 For 32bit, we change it into:
3960 nopw 0x0(%rax); movl %fs:0, %eax
3961 For largepic, change:
3962 leaq foo@tlsgd(%rip), %rdi
3963 movabsq $__tls_get_addr@pltoff, %rax
3964 addq %rbx, %rax
3965 call *%rax
3966 into
3967 data16 data16 data16 nopw %cs:0x0(%rax,%rax,1)
3968 movq %fs:0, %eax */
3969
3970 BFD_ASSERT (r_type == R_X86_64_TPOFF32);
3971 if (ABI_64_P (output_bfd))
3972 {
3973 if ((rel->r_offset + 5) >= input_section->size)
3974 goto corrupt_input;
3975 if (contents[rel->r_offset + 5] == 0xb8)
3976 {
3977 if (rel->r_offset < 3
3978 || (rel->r_offset - 3 + 22) > input_section->size)
3979 goto corrupt_input;
3980 memcpy (contents + rel->r_offset - 3,
3981 "\x66\x66\x66\x66\x2e\x0f\x1f\x84\0\0\0\0\0"
3982 "\x64\x48\x8b\x04\x25\0\0\0", 22);
3983 }
3984 else if (contents[rel->r_offset + 4] == 0xff
3985 || contents[rel->r_offset + 4] == 0x67)
3986 {
3987 if (rel->r_offset < 3
3988 || (rel->r_offset - 3 + 13) > input_section->size)
3989 goto corrupt_input;
3990 memcpy (contents + rel->r_offset - 3,
3991 "\x66\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0",
3992 13);
3993
3994 }
3995 else
3996 {
3997 if (rel->r_offset < 3
3998 || (rel->r_offset - 3 + 12) > input_section->size)
3999 goto corrupt_input;
4000 memcpy (contents + rel->r_offset - 3,
4001 "\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0", 12);
4002 }
4003 }
4004 else
4005 {
4006 if ((rel->r_offset + 4) >= input_section->size)
4007 goto corrupt_input;
4008 if (contents[rel->r_offset + 4] == 0xff)
4009 {
4010 if (rel->r_offset < 3
4011 || (rel->r_offset - 3 + 13) > input_section->size)
4012 goto corrupt_input;
4013 memcpy (contents + rel->r_offset - 3,
4014 "\x66\x0f\x1f\x40\x00\x64\x8b\x04\x25\0\0\0",
4015 13);
4016 }
4017 else
4018 {
4019 if (rel->r_offset < 3
4020 || (rel->r_offset - 3 + 12) > input_section->size)
4021 goto corrupt_input;
4022 memcpy (contents + rel->r_offset - 3,
4023 "\x0f\x1f\x40\x00\x64\x8b\x04\x25\0\0\0", 12);
4024 }
4025 }
4026 /* Skip R_X86_64_PC32, R_X86_64_PLT32, R_X86_64_GOTPCRELX
4027 and R_X86_64_PLTOFF64. */
4028 rel++;
4029 wrel++;
4030 continue;
4031 }
4032
4033 if (htab->elf.sgot == NULL)
4034 abort ();
4035
4036 off = htab->tls_ld_or_ldm_got.offset;
4037 if (off & 1)
4038 off &= ~1;
4039 else
4040 {
4041 Elf_Internal_Rela outrel;
4042
4043 if (htab->elf.srelgot == NULL)
4044 abort ();
4045
4046 outrel.r_offset = (htab->elf.sgot->output_section->vma
4047 + htab->elf.sgot->output_offset + off);
4048
4049 bfd_put_64 (output_bfd, 0,
4050 htab->elf.sgot->contents + off);
4051 bfd_put_64 (output_bfd, 0,
4052 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
4053 outrel.r_info = htab->r_info (0, R_X86_64_DTPMOD64);
4054 outrel.r_addend = 0;
4055 elf_append_rela (output_bfd, htab->elf.srelgot,
4056 &outrel);
4057 htab->tls_ld_or_ldm_got.offset |= 1;
4058 }
4059 relocation = htab->elf.sgot->output_section->vma
4060 + htab->elf.sgot->output_offset + off;
4061 unresolved_reloc = false;
4062 break;
4063
4064 case R_X86_64_DTPOFF32:
4065 if (!bfd_link_executable (info)
4066 || (input_section->flags & SEC_CODE) == 0)
4067 relocation -= _bfd_x86_elf_dtpoff_base (info);
4068 else
4069 relocation = elf_x86_64_tpoff (info, relocation);
4070 break;
4071
4072 case R_X86_64_TPOFF32:
4073 case R_X86_64_TPOFF64:
4074 BFD_ASSERT (bfd_link_executable (info));
4075 relocation = elf_x86_64_tpoff (info, relocation);
4076 break;
4077
4078 case R_X86_64_DTPOFF64:
4079 BFD_ASSERT ((input_section->flags & SEC_CODE) == 0);
4080 relocation -= _bfd_x86_elf_dtpoff_base (info);
4081 break;
4082
4083 default:
4084 break;
4085 }
4086
4087 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
4088 because such sections are not SEC_ALLOC and thus ld.so will
4089 not process them. */
4090 if (unresolved_reloc
4091 && !((input_section->flags & SEC_DEBUGGING) != 0
4092 && h->def_dynamic)
4093 && _bfd_elf_section_offset (output_bfd, info, input_section,
4094 rel->r_offset) != (bfd_vma) -1)
4095 {
4096 switch (r_type)
4097 {
4098 case R_X86_64_32S:
4099 sec = h->root.u.def.section;
4100 if ((info->nocopyreloc
4101 || (eh->def_protected
4102 && elf_has_no_copy_on_protected (h->root.u.def.section->owner)))
4103 && !(h->root.u.def.section->flags & SEC_CODE))
4104 return elf_x86_64_need_pic (info, input_bfd, input_section,
4105 h, NULL, NULL, howto);
4106 /* Fall through. */
4107
4108 default:
4109 _bfd_error_handler
4110 /* xgettext:c-format */
4111 (_("%pB(%pA+%#" PRIx64 "): "
4112 "unresolvable %s relocation against symbol `%s'"),
4113 input_bfd,
4114 input_section,
4115 (uint64_t) rel->r_offset,
4116 howto->name,
4117 h->root.root.string);
4118 return false;
4119 }
4120 }
4121
4122 do_relocation:
4123 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4124 contents, rel->r_offset,
4125 relocation, rel->r_addend);
4126
4127 check_relocation_error:
4128 if (r != bfd_reloc_ok)
4129 {
4130 const char *name;
4131
4132 if (h != NULL)
4133 name = h->root.root.string;
4134 else
4135 {
4136 name = bfd_elf_string_from_elf_section (input_bfd,
4137 symtab_hdr->sh_link,
4138 sym->st_name);
4139 if (name == NULL)
4140 return false;
4141 if (*name == '\0')
4142 name = bfd_section_name (sec);
4143 }
4144
4145 if (r == bfd_reloc_overflow)
4146 {
4147 if (converted_reloc)
4148 {
4149 info->callbacks->einfo
4150 ("%X%H:", input_bfd, input_section, rel->r_offset);
4151 info->callbacks->einfo
4152 (_(" failed to convert GOTPCREL relocation against "
4153 "'%s'; relink with --no-relax\n"),
4154 name);
4155 status = false;
4156 continue;
4157 }
4158 (*info->callbacks->reloc_overflow)
4159 (info, (h ? &h->root : NULL), name, howto->name,
4160 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
4161 }
4162 else
4163 {
4164 _bfd_error_handler
4165 /* xgettext:c-format */
4166 (_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
4167 input_bfd, input_section,
4168 (uint64_t) rel->r_offset, name, (int) r);
4169 return false;
4170 }
4171 }
4172
4173 if (wrel != rel)
4174 *wrel = *rel;
4175 }
4176
4177 if (wrel != rel)
4178 {
4179 Elf_Internal_Shdr *rel_hdr;
4180 size_t deleted = rel - wrel;
4181
4182 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
4183 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
4184 if (rel_hdr->sh_size == 0)
4185 {
4186 /* It is too late to remove an empty reloc section. Leave
4187 one NONE reloc.
4188 ??? What is wrong with an empty section??? */
4189 rel_hdr->sh_size = rel_hdr->sh_entsize;
4190 deleted -= 1;
4191 }
4192 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
4193 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
4194 input_section->reloc_count -= deleted;
4195 }
4196
4197 return status;
4198 }
4199
4200 /* Finish up dynamic symbol handling. We set the contents of various
4201 dynamic sections here. */
4202
4203 static bool
4204 elf_x86_64_finish_dynamic_symbol (bfd *output_bfd,
4205 struct bfd_link_info *info,
4206 struct elf_link_hash_entry *h,
4207 Elf_Internal_Sym *sym)
4208 {
4209 struct elf_x86_link_hash_table *htab;
4210 bool use_plt_second;
4211 struct elf_x86_link_hash_entry *eh;
4212 bool local_undefweak;
4213
4214 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
4215 if (htab == NULL)
4216 return false;
4217
4218 /* Use the second PLT section only if there is .plt section. */
4219 use_plt_second = htab->elf.splt != NULL && htab->plt_second != NULL;
4220
4221 eh = (struct elf_x86_link_hash_entry *) h;
4222 if (eh->no_finish_dynamic_symbol)
4223 abort ();
4224
4225 /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for
4226 resolved undefined weak symbols in executable so that their
4227 references have value 0 at run-time. */
4228 local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh);
4229
4230 if (h->plt.offset != (bfd_vma) -1)
4231 {
4232 bfd_vma plt_index;
4233 bfd_vma got_offset, plt_offset;
4234 Elf_Internal_Rela rela;
4235 bfd_byte *loc;
4236 asection *plt, *gotplt, *relplt, *resolved_plt;
4237 const struct elf_backend_data *bed;
4238 bfd_vma plt_got_pcrel_offset;
4239
4240 /* When building a static executable, use .iplt, .igot.plt and
4241 .rela.iplt sections for STT_GNU_IFUNC symbols. */
4242 if (htab->elf.splt != NULL)
4243 {
4244 plt = htab->elf.splt;
4245 gotplt = htab->elf.sgotplt;
4246 relplt = htab->elf.srelplt;
4247 }
4248 else
4249 {
4250 plt = htab->elf.iplt;
4251 gotplt = htab->elf.igotplt;
4252 relplt = htab->elf.irelplt;
4253 }
4254
4255 VERIFY_PLT_ENTRY (info, h, plt, gotplt, relplt, local_undefweak)
4256
4257 /* Get the index in the procedure linkage table which
4258 corresponds to this symbol. This is the index of this symbol
4259 in all the symbols for which we are making plt entries. The
4260 first entry in the procedure linkage table is reserved.
4261
4262 Get the offset into the .got table of the entry that
4263 corresponds to this function. Each .got entry is GOT_ENTRY_SIZE
4264 bytes. The first three are reserved for the dynamic linker.
4265
4266 For static executables, we don't reserve anything. */
4267
4268 if (plt == htab->elf.splt)
4269 {
4270 got_offset = (h->plt.offset / htab->plt.plt_entry_size
4271 - htab->plt.has_plt0);
4272 got_offset = (got_offset + 3) * GOT_ENTRY_SIZE;
4273 }
4274 else
4275 {
4276 got_offset = h->plt.offset / htab->plt.plt_entry_size;
4277 got_offset = got_offset * GOT_ENTRY_SIZE;
4278 }
4279
4280 /* Fill in the entry in the procedure linkage table. */
4281 memcpy (plt->contents + h->plt.offset, htab->plt.plt_entry,
4282 htab->plt.plt_entry_size);
4283 if (use_plt_second)
4284 {
4285 memcpy (htab->plt_second->contents + eh->plt_second.offset,
4286 htab->non_lazy_plt->plt_entry,
4287 htab->non_lazy_plt->plt_entry_size);
4288
4289 resolved_plt = htab->plt_second;
4290 plt_offset = eh->plt_second.offset;
4291 }
4292 else
4293 {
4294 resolved_plt = plt;
4295 plt_offset = h->plt.offset;
4296 }
4297
4298 /* Insert the relocation positions of the plt section. */
4299
4300 /* Put offset the PC-relative instruction referring to the GOT entry,
4301 subtracting the size of that instruction. */
4302 plt_got_pcrel_offset = (gotplt->output_section->vma
4303 + gotplt->output_offset
4304 + got_offset
4305 - resolved_plt->output_section->vma
4306 - resolved_plt->output_offset
4307 - plt_offset
4308 - htab->plt.plt_got_insn_size);
4309
4310 /* Check PC-relative offset overflow in PLT entry. */
4311 if ((plt_got_pcrel_offset + 0x80000000) > 0xffffffff)
4312 /* xgettext:c-format */
4313 info->callbacks->einfo (_("%F%pB: PC-relative offset overflow in PLT entry for `%s'\n"),
4314 output_bfd, h->root.root.string);
4315
4316 bfd_put_32 (output_bfd, plt_got_pcrel_offset,
4317 (resolved_plt->contents + plt_offset
4318 + htab->plt.plt_got_offset));
4319
4320 /* Fill in the entry in the global offset table, initially this
4321 points to the second part of the PLT entry. Leave the entry
4322 as zero for undefined weak symbol in PIE. No PLT relocation
4323 against undefined weak symbol in PIE. */
4324 if (!local_undefweak)
4325 {
4326 if (htab->plt.has_plt0)
4327 bfd_put_64 (output_bfd, (plt->output_section->vma
4328 + plt->output_offset
4329 + h->plt.offset
4330 + htab->lazy_plt->plt_lazy_offset),
4331 gotplt->contents + got_offset);
4332
4333 /* Fill in the entry in the .rela.plt section. */
4334 rela.r_offset = (gotplt->output_section->vma
4335 + gotplt->output_offset
4336 + got_offset);
4337 if (PLT_LOCAL_IFUNC_P (info, h))
4338 {
4339 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
4340 h->root.root.string,
4341 h->root.u.def.section->owner);
4342
4343 /* If an STT_GNU_IFUNC symbol is locally defined, generate
4344 R_X86_64_IRELATIVE instead of R_X86_64_JUMP_SLOT. */
4345 rela.r_info = htab->r_info (0, R_X86_64_IRELATIVE);
4346 rela.r_addend = (h->root.u.def.value
4347 + h->root.u.def.section->output_section->vma
4348 + h->root.u.def.section->output_offset);
4349
4350 if (htab->params->report_relative_reloc)
4351 _bfd_x86_elf_link_report_relative_reloc
4352 (info, relplt, h, sym, "R_X86_64_IRELATIVE", &rela);
4353
4354 /* R_X86_64_IRELATIVE comes last. */
4355 plt_index = htab->next_irelative_index--;
4356 }
4357 else
4358 {
4359 rela.r_info = htab->r_info (h->dynindx, R_X86_64_JUMP_SLOT);
4360 rela.r_addend = 0;
4361 plt_index = htab->next_jump_slot_index++;
4362 }
4363
4364 /* Don't fill the second and third slots in PLT entry for
4365 static executables nor without PLT0. */
4366 if (plt == htab->elf.splt && htab->plt.has_plt0)
4367 {
4368 bfd_vma plt0_offset
4369 = h->plt.offset + htab->lazy_plt->plt_plt_insn_end;
4370
4371 /* Put relocation index. */
4372 bfd_put_32 (output_bfd, plt_index,
4373 (plt->contents + h->plt.offset
4374 + htab->lazy_plt->plt_reloc_offset));
4375
4376 /* Put offset for jmp .PLT0 and check for overflow. We don't
4377 check relocation index for overflow since branch displacement
4378 will overflow first. */
4379 if (plt0_offset > 0x80000000)
4380 /* xgettext:c-format */
4381 info->callbacks->einfo (_("%F%pB: branch displacement overflow in PLT entry for `%s'\n"),
4382 output_bfd, h->root.root.string);
4383 bfd_put_32 (output_bfd, - plt0_offset,
4384 (plt->contents + h->plt.offset
4385 + htab->lazy_plt->plt_plt_offset));
4386 }
4387
4388 bed = get_elf_backend_data (output_bfd);
4389 loc = relplt->contents + plt_index * bed->s->sizeof_rela;
4390 bed->s->swap_reloca_out (output_bfd, &rela, loc);
4391 }
4392 }
4393 else if (eh->plt_got.offset != (bfd_vma) -1)
4394 {
4395 bfd_vma got_offset, plt_offset;
4396 asection *plt, *got;
4397 bool got_after_plt;
4398 int32_t got_pcrel_offset;
4399
4400 /* Set the entry in the GOT procedure linkage table. */
4401 plt = htab->plt_got;
4402 got = htab->elf.sgot;
4403 got_offset = h->got.offset;
4404
4405 if (got_offset == (bfd_vma) -1
4406 || (h->type == STT_GNU_IFUNC && h->def_regular)
4407 || plt == NULL
4408 || got == NULL)
4409 abort ();
4410
4411 /* Use the non-lazy PLT entry template for the GOT PLT since they
4412 are the identical. */
4413 /* Fill in the entry in the GOT procedure linkage table. */
4414 plt_offset = eh->plt_got.offset;
4415 memcpy (plt->contents + plt_offset,
4416 htab->non_lazy_plt->plt_entry,
4417 htab->non_lazy_plt->plt_entry_size);
4418
4419 /* Put offset the PC-relative instruction referring to the GOT
4420 entry, subtracting the size of that instruction. */
4421 got_pcrel_offset = (got->output_section->vma
4422 + got->output_offset
4423 + got_offset
4424 - plt->output_section->vma
4425 - plt->output_offset
4426 - plt_offset
4427 - htab->non_lazy_plt->plt_got_insn_size);
4428
4429 /* Check PC-relative offset overflow in GOT PLT entry. */
4430 got_after_plt = got->output_section->vma > plt->output_section->vma;
4431 if ((got_after_plt && got_pcrel_offset < 0)
4432 || (!got_after_plt && got_pcrel_offset > 0))
4433 /* xgettext:c-format */
4434 info->callbacks->einfo (_("%F%pB: PC-relative offset overflow in GOT PLT entry for `%s'\n"),
4435 output_bfd, h->root.root.string);
4436
4437 bfd_put_32 (output_bfd, got_pcrel_offset,
4438 (plt->contents + plt_offset
4439 + htab->non_lazy_plt->plt_got_offset));
4440 }
4441
4442 if (!local_undefweak
4443 && !h->def_regular
4444 && (h->plt.offset != (bfd_vma) -1
4445 || eh->plt_got.offset != (bfd_vma) -1))
4446 {
4447 /* Mark the symbol as undefined, rather than as defined in
4448 the .plt section. Leave the value if there were any
4449 relocations where pointer equality matters (this is a clue
4450 for the dynamic linker, to make function pointer
4451 comparisons work between an application and shared
4452 library), otherwise set it to zero. If a function is only
4453 called from a binary, there is no need to slow down
4454 shared libraries because of that. */
4455 sym->st_shndx = SHN_UNDEF;
4456 if (!h->pointer_equality_needed)
4457 sym->st_value = 0;
4458 }
4459
4460 _bfd_x86_elf_link_fixup_ifunc_symbol (info, htab, h, sym);
4461
4462 /* Don't generate dynamic GOT relocation against undefined weak
4463 symbol in executable. */
4464 if (h->got.offset != (bfd_vma) -1
4465 && ! GOT_TLS_GD_ANY_P (elf_x86_hash_entry (h)->tls_type)
4466 && elf_x86_hash_entry (h)->tls_type != GOT_TLS_IE
4467 && !local_undefweak)
4468 {
4469 Elf_Internal_Rela rela;
4470 asection *relgot = htab->elf.srelgot;
4471 const char *relative_reloc_name = NULL;
4472 bool generate_dynamic_reloc = true;
4473
4474 /* This symbol has an entry in the global offset table. Set it
4475 up. */
4476 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
4477 abort ();
4478
4479 rela.r_offset = (htab->elf.sgot->output_section->vma
4480 + htab->elf.sgot->output_offset
4481 + (h->got.offset &~ (bfd_vma) 1));
4482
4483 /* If this is a static link, or it is a -Bsymbolic link and the
4484 symbol is defined locally or was forced to be local because
4485 of a version file, we just want to emit a RELATIVE reloc.
4486 The entry in the global offset table will already have been
4487 initialized in the relocate_section function. */
4488 if (h->def_regular
4489 && h->type == STT_GNU_IFUNC)
4490 {
4491 if (h->plt.offset == (bfd_vma) -1)
4492 {
4493 /* STT_GNU_IFUNC is referenced without PLT. */
4494 if (htab->elf.splt == NULL)
4495 {
4496 /* use .rel[a].iplt section to store .got relocations
4497 in static executable. */
4498 relgot = htab->elf.irelplt;
4499 }
4500 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
4501 {
4502 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
4503 h->root.root.string,
4504 h->root.u.def.section->owner);
4505
4506 rela.r_info = htab->r_info (0,
4507 R_X86_64_IRELATIVE);
4508 rela.r_addend = (h->root.u.def.value
4509 + h->root.u.def.section->output_section->vma
4510 + h->root.u.def.section->output_offset);
4511 relative_reloc_name = "R_X86_64_IRELATIVE";
4512 }
4513 else
4514 goto do_glob_dat;
4515 }
4516 else if (bfd_link_pic (info))
4517 {
4518 /* Generate R_X86_64_GLOB_DAT. */
4519 goto do_glob_dat;
4520 }
4521 else
4522 {
4523 asection *plt;
4524 bfd_vma plt_offset;
4525
4526 if (!h->pointer_equality_needed)
4527 abort ();
4528
4529 /* For non-shared object, we can't use .got.plt, which
4530 contains the real function addres if we need pointer
4531 equality. We load the GOT entry with the PLT entry. */
4532 if (htab->plt_second != NULL)
4533 {
4534 plt = htab->plt_second;
4535 plt_offset = eh->plt_second.offset;
4536 }
4537 else
4538 {
4539 plt = htab->elf.splt ? htab->elf.splt : htab->elf.iplt;
4540 plt_offset = h->plt.offset;
4541 }
4542 bfd_put_64 (output_bfd, (plt->output_section->vma
4543 + plt->output_offset
4544 + plt_offset),
4545 htab->elf.sgot->contents + h->got.offset);
4546 return true;
4547 }
4548 }
4549 else if (bfd_link_pic (info)
4550 && SYMBOL_REFERENCES_LOCAL_P (info, h))
4551 {
4552 if (!SYMBOL_DEFINED_NON_SHARED_P (h))
4553 return false;
4554 BFD_ASSERT((h->got.offset & 1) != 0);
4555 if (info->enable_dt_relr)
4556 generate_dynamic_reloc = false;
4557 else
4558 {
4559 rela.r_info = htab->r_info (0, R_X86_64_RELATIVE);
4560 rela.r_addend = (h->root.u.def.value
4561 + h->root.u.def.section->output_section->vma
4562 + h->root.u.def.section->output_offset);
4563 relative_reloc_name = "R_X86_64_RELATIVE";
4564 }
4565 }
4566 else
4567 {
4568 BFD_ASSERT((h->got.offset & 1) == 0);
4569 do_glob_dat:
4570 bfd_put_64 (output_bfd, (bfd_vma) 0,
4571 htab->elf.sgot->contents + h->got.offset);
4572 rela.r_info = htab->r_info (h->dynindx, R_X86_64_GLOB_DAT);
4573 rela.r_addend = 0;
4574 }
4575
4576 if (generate_dynamic_reloc)
4577 {
4578 if (relative_reloc_name != NULL
4579 && htab->params->report_relative_reloc)
4580 _bfd_x86_elf_link_report_relative_reloc
4581 (info, relgot, h, sym, relative_reloc_name, &rela);
4582
4583 elf_append_rela (output_bfd, relgot, &rela);
4584 }
4585 }
4586
4587 if (h->needs_copy)
4588 {
4589 Elf_Internal_Rela rela;
4590 asection *s;
4591
4592 /* This symbol needs a copy reloc. Set it up. */
4593 VERIFY_COPY_RELOC (h, htab)
4594
4595 rela.r_offset = (h->root.u.def.value
4596 + h->root.u.def.section->output_section->vma
4597 + h->root.u.def.section->output_offset);
4598 rela.r_info = htab->r_info (h->dynindx, R_X86_64_COPY);
4599 rela.r_addend = 0;
4600 if (h->root.u.def.section == htab->elf.sdynrelro)
4601 s = htab->elf.sreldynrelro;
4602 else
4603 s = htab->elf.srelbss;
4604 elf_append_rela (output_bfd, s, &rela);
4605 }
4606
4607 return true;
4608 }
4609
4610 /* Finish up local dynamic symbol handling. We set the contents of
4611 various dynamic sections here. */
4612
4613 static int
4614 elf_x86_64_finish_local_dynamic_symbol (void **slot, void *inf)
4615 {
4616 struct elf_link_hash_entry *h
4617 = (struct elf_link_hash_entry *) *slot;
4618 struct bfd_link_info *info
4619 = (struct bfd_link_info *) inf;
4620
4621 return elf_x86_64_finish_dynamic_symbol (info->output_bfd,
4622 info, h, NULL);
4623 }
4624
4625 /* Finish up undefined weak symbol handling in PIE. Fill its PLT entry
4626 here since undefined weak symbol may not be dynamic and may not be
4627 called for elf_x86_64_finish_dynamic_symbol. */
4628
4629 static bool
4630 elf_x86_64_pie_finish_undefweak_symbol (struct bfd_hash_entry *bh,
4631 void *inf)
4632 {
4633 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) bh;
4634 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4635
4636 if (h->root.type != bfd_link_hash_undefweak
4637 || h->dynindx != -1)
4638 return true;
4639
4640 return elf_x86_64_finish_dynamic_symbol (info->output_bfd,
4641 info, h, NULL);
4642 }
4643
4644 /* Used to decide how to sort relocs in an optimal manner for the
4645 dynamic linker, before writing them out. */
4646
4647 static enum elf_reloc_type_class
4648 elf_x86_64_reloc_type_class (const struct bfd_link_info *info,
4649 const asection *rel_sec ATTRIBUTE_UNUSED,
4650 const Elf_Internal_Rela *rela)
4651 {
4652 bfd *abfd = info->output_bfd;
4653 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4654 struct elf_x86_link_hash_table *htab
4655 = elf_x86_hash_table (info, X86_64_ELF_DATA);
4656
4657 if (htab->elf.dynsym != NULL
4658 && htab->elf.dynsym->contents != NULL)
4659 {
4660 /* Check relocation against STT_GNU_IFUNC symbol if there are
4661 dynamic symbols. */
4662 unsigned long r_symndx = htab->r_sym (rela->r_info);
4663 if (r_symndx != STN_UNDEF)
4664 {
4665 Elf_Internal_Sym sym;
4666 if (!bed->s->swap_symbol_in (abfd,
4667 (htab->elf.dynsym->contents
4668 + r_symndx * bed->s->sizeof_sym),
4669 0, &sym))
4670 abort ();
4671
4672 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
4673 return reloc_class_ifunc;
4674 }
4675 }
4676
4677 switch ((int) ELF32_R_TYPE (rela->r_info))
4678 {
4679 case R_X86_64_IRELATIVE:
4680 return reloc_class_ifunc;
4681 case R_X86_64_RELATIVE:
4682 case R_X86_64_RELATIVE64:
4683 return reloc_class_relative;
4684 case R_X86_64_JUMP_SLOT:
4685 return reloc_class_plt;
4686 case R_X86_64_COPY:
4687 return reloc_class_copy;
4688 default:
4689 return reloc_class_normal;
4690 }
4691 }
4692
4693 /* Finish up the dynamic sections. */
4694
4695 static bool
4696 elf_x86_64_finish_dynamic_sections (bfd *output_bfd,
4697 struct bfd_link_info *info)
4698 {
4699 struct elf_x86_link_hash_table *htab;
4700
4701 htab = _bfd_x86_elf_finish_dynamic_sections (output_bfd, info);
4702 if (htab == NULL)
4703 return false;
4704
4705 if (! htab->elf.dynamic_sections_created)
4706 return true;
4707
4708 if (htab->elf.splt && htab->elf.splt->size > 0)
4709 {
4710 if (bfd_is_abs_section (htab->elf.splt->output_section))
4711 {
4712 info->callbacks->einfo
4713 (_("%F%P: discarded output section: `%pA'\n"),
4714 htab->elf.splt);
4715 return false;
4716 }
4717
4718 elf_section_data (htab->elf.splt->output_section)
4719 ->this_hdr.sh_entsize = htab->plt.plt_entry_size;
4720
4721 if (htab->plt.has_plt0)
4722 {
4723 /* Fill in the special first entry in the procedure linkage
4724 table. */
4725 memcpy (htab->elf.splt->contents,
4726 htab->lazy_plt->plt0_entry,
4727 htab->lazy_plt->plt0_entry_size);
4728 /* Add offset for pushq GOT+8(%rip), since the instruction
4729 uses 6 bytes subtract this value. */
4730 bfd_put_32 (output_bfd,
4731 (htab->elf.sgotplt->output_section->vma
4732 + htab->elf.sgotplt->output_offset
4733 + 8
4734 - htab->elf.splt->output_section->vma
4735 - htab->elf.splt->output_offset
4736 - 6),
4737 (htab->elf.splt->contents
4738 + htab->lazy_plt->plt0_got1_offset));
4739 /* Add offset for the PC-relative instruction accessing
4740 GOT+16, subtracting the offset to the end of that
4741 instruction. */
4742 bfd_put_32 (output_bfd,
4743 (htab->elf.sgotplt->output_section->vma
4744 + htab->elf.sgotplt->output_offset
4745 + 16
4746 - htab->elf.splt->output_section->vma
4747 - htab->elf.splt->output_offset
4748 - htab->lazy_plt->plt0_got2_insn_end),
4749 (htab->elf.splt->contents
4750 + htab->lazy_plt->plt0_got2_offset));
4751 }
4752
4753 if (htab->elf.tlsdesc_plt)
4754 {
4755 bfd_put_64 (output_bfd, (bfd_vma) 0,
4756 htab->elf.sgot->contents + htab->elf.tlsdesc_got);
4757
4758 memcpy (htab->elf.splt->contents + htab->elf.tlsdesc_plt,
4759 htab->lazy_plt->plt_tlsdesc_entry,
4760 htab->lazy_plt->plt_tlsdesc_entry_size);
4761
4762 /* Add offset for pushq GOT+8(%rip), since ENDBR64 uses 4
4763 bytes and the instruction uses 6 bytes, subtract these
4764 values. */
4765 bfd_put_32 (output_bfd,
4766 (htab->elf.sgotplt->output_section->vma
4767 + htab->elf.sgotplt->output_offset
4768 + 8
4769 - htab->elf.splt->output_section->vma
4770 - htab->elf.splt->output_offset
4771 - htab->elf.tlsdesc_plt
4772 - htab->lazy_plt->plt_tlsdesc_got1_insn_end),
4773 (htab->elf.splt->contents
4774 + htab->elf.tlsdesc_plt
4775 + htab->lazy_plt->plt_tlsdesc_got1_offset));
4776 /* Add offset for indirect branch via GOT+TDG, where TDG
4777 stands for htab->tlsdesc_got, subtracting the offset
4778 to the end of that instruction. */
4779 bfd_put_32 (output_bfd,
4780 (htab->elf.sgot->output_section->vma
4781 + htab->elf.sgot->output_offset
4782 + htab->elf.tlsdesc_got
4783 - htab->elf.splt->output_section->vma
4784 - htab->elf.splt->output_offset
4785 - htab->elf.tlsdesc_plt
4786 - htab->lazy_plt->plt_tlsdesc_got2_insn_end),
4787 (htab->elf.splt->contents
4788 + htab->elf.tlsdesc_plt
4789 + htab->lazy_plt->plt_tlsdesc_got2_offset));
4790 }
4791 }
4792
4793 /* Fill PLT entries for undefined weak symbols in PIE. */
4794 if (bfd_link_pie (info))
4795 bfd_hash_traverse (&info->hash->table,
4796 elf_x86_64_pie_finish_undefweak_symbol,
4797 info);
4798
4799 return true;
4800 }
4801
4802 /* Fill PLT/GOT entries and allocate dynamic relocations for local
4803 STT_GNU_IFUNC symbols, which aren't in the ELF linker hash table.
4804 It has to be done before elf_link_sort_relocs is called so that
4805 dynamic relocations are properly sorted. */
4806
4807 static bool
4808 elf_x86_64_output_arch_local_syms
4809 (bfd *output_bfd ATTRIBUTE_UNUSED,
4810 struct bfd_link_info *info,
4811 void *flaginfo ATTRIBUTE_UNUSED,
4812 int (*func) (void *, const char *,
4813 Elf_Internal_Sym *,
4814 asection *,
4815 struct elf_link_hash_entry *) ATTRIBUTE_UNUSED)
4816 {
4817 struct elf_x86_link_hash_table *htab
4818 = elf_x86_hash_table (info, X86_64_ELF_DATA);
4819 if (htab == NULL)
4820 return false;
4821
4822 /* Fill PLT and GOT entries for local STT_GNU_IFUNC symbols. */
4823 htab_traverse (htab->loc_hash_table,
4824 elf_x86_64_finish_local_dynamic_symbol,
4825 info);
4826
4827 return true;
4828 }
4829
4830 /* Similar to _bfd_elf_get_synthetic_symtab. Support PLTs with all
4831 dynamic relocations. */
4832
4833 static long
4834 elf_x86_64_get_synthetic_symtab (bfd *abfd,
4835 long symcount ATTRIBUTE_UNUSED,
4836 asymbol **syms ATTRIBUTE_UNUSED,
4837 long dynsymcount,
4838 asymbol **dynsyms,
4839 asymbol **ret)
4840 {
4841 long count, i, n;
4842 int j;
4843 bfd_byte *plt_contents;
4844 long relsize;
4845 const struct elf_x86_lazy_plt_layout *lazy_plt;
4846 const struct elf_x86_non_lazy_plt_layout *non_lazy_plt;
4847 const struct elf_x86_lazy_plt_layout *lazy_bnd_plt;
4848 const struct elf_x86_non_lazy_plt_layout *non_lazy_bnd_plt;
4849 const struct elf_x86_lazy_plt_layout *lazy_ibt_plt;
4850 const struct elf_x86_non_lazy_plt_layout *non_lazy_ibt_plt;
4851 asection *plt;
4852 enum elf_x86_plt_type plt_type;
4853 struct elf_x86_plt plts[] =
4854 {
4855 { ".plt", NULL, NULL, plt_unknown, 0, 0, 0, 0 },
4856 { ".plt.got", NULL, NULL, plt_non_lazy, 0, 0, 0, 0 },
4857 { ".plt.sec", NULL, NULL, plt_second, 0, 0, 0, 0 },
4858 { ".plt.bnd", NULL, NULL, plt_second, 0, 0, 0, 0 },
4859 { NULL, NULL, NULL, plt_non_lazy, 0, 0, 0, 0 }
4860 };
4861
4862 *ret = NULL;
4863
4864 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
4865 return 0;
4866
4867 if (dynsymcount <= 0)
4868 return 0;
4869
4870 relsize = bfd_get_dynamic_reloc_upper_bound (abfd);
4871 if (relsize <= 0)
4872 return -1;
4873
4874 lazy_plt = &elf_x86_64_lazy_plt;
4875 non_lazy_plt = &elf_x86_64_non_lazy_plt;
4876 lazy_bnd_plt = &elf_x86_64_lazy_bnd_plt;
4877 non_lazy_bnd_plt = &elf_x86_64_non_lazy_bnd_plt;
4878 if (ABI_64_P (abfd))
4879 {
4880 lazy_ibt_plt = &elf_x86_64_lazy_ibt_plt;
4881 non_lazy_ibt_plt = &elf_x86_64_non_lazy_ibt_plt;
4882 }
4883 else
4884 {
4885 lazy_ibt_plt = &elf_x32_lazy_ibt_plt;
4886 non_lazy_ibt_plt = &elf_x32_non_lazy_ibt_plt;
4887 }
4888
4889 count = 0;
4890 for (j = 0; plts[j].name != NULL; j++)
4891 {
4892 plt = bfd_get_section_by_name (abfd, plts[j].name);
4893 if (plt == NULL || plt->size == 0)
4894 continue;
4895
4896 /* Get the PLT section contents. */
4897 if (!bfd_malloc_and_get_section (abfd, plt, &plt_contents))
4898 break;
4899
4900 /* Check what kind of PLT it is. */
4901 plt_type = plt_unknown;
4902 if (plts[j].type == plt_unknown
4903 && (plt->size >= (lazy_plt->plt_entry_size
4904 + lazy_plt->plt_entry_size)))
4905 {
4906 /* Match lazy PLT first. Need to check the first two
4907 instructions. */
4908 if ((memcmp (plt_contents, lazy_plt->plt0_entry,
4909 lazy_plt->plt0_got1_offset) == 0)
4910 && (memcmp (plt_contents + 6, lazy_plt->plt0_entry + 6,
4911 2) == 0))
4912 plt_type = plt_lazy;
4913 else if (lazy_bnd_plt != NULL
4914 && (memcmp (plt_contents, lazy_bnd_plt->plt0_entry,
4915 lazy_bnd_plt->plt0_got1_offset) == 0)
4916 && (memcmp (plt_contents + 6,
4917 lazy_bnd_plt->plt0_entry + 6, 3) == 0))
4918 {
4919 plt_type = plt_lazy | plt_second;
4920 /* The fist entry in the lazy IBT PLT is the same as the
4921 lazy BND PLT. */
4922 if ((memcmp (plt_contents + lazy_ibt_plt->plt_entry_size,
4923 lazy_ibt_plt->plt_entry,
4924 lazy_ibt_plt->plt_got_offset) == 0))
4925 lazy_plt = lazy_ibt_plt;
4926 else
4927 lazy_plt = lazy_bnd_plt;
4928 }
4929 }
4930
4931 if (non_lazy_plt != NULL
4932 && (plt_type == plt_unknown || plt_type == plt_non_lazy)
4933 && plt->size >= non_lazy_plt->plt_entry_size)
4934 {
4935 /* Match non-lazy PLT. */
4936 if (memcmp (plt_contents, non_lazy_plt->plt_entry,
4937 non_lazy_plt->plt_got_offset) == 0)
4938 plt_type = plt_non_lazy;
4939 }
4940
4941 if (plt_type == plt_unknown || plt_type == plt_second)
4942 {
4943 if (non_lazy_bnd_plt != NULL
4944 && plt->size >= non_lazy_bnd_plt->plt_entry_size
4945 && (memcmp (plt_contents, non_lazy_bnd_plt->plt_entry,
4946 non_lazy_bnd_plt->plt_got_offset) == 0))
4947 {
4948 /* Match BND PLT. */
4949 plt_type = plt_second;
4950 non_lazy_plt = non_lazy_bnd_plt;
4951 }
4952 else if (non_lazy_ibt_plt != NULL
4953 && plt->size >= non_lazy_ibt_plt->plt_entry_size
4954 && (memcmp (plt_contents,
4955 non_lazy_ibt_plt->plt_entry,
4956 non_lazy_ibt_plt->plt_got_offset) == 0))
4957 {
4958 /* Match IBT PLT. */
4959 plt_type = plt_second;
4960 non_lazy_plt = non_lazy_ibt_plt;
4961 }
4962 }
4963
4964 if (plt_type == plt_unknown)
4965 {
4966 free (plt_contents);
4967 continue;
4968 }
4969
4970 plts[j].sec = plt;
4971 plts[j].type = plt_type;
4972
4973 if ((plt_type & plt_lazy))
4974 {
4975 plts[j].plt_got_offset = lazy_plt->plt_got_offset;
4976 plts[j].plt_got_insn_size = lazy_plt->plt_got_insn_size;
4977 plts[j].plt_entry_size = lazy_plt->plt_entry_size;
4978 /* Skip PLT0 in lazy PLT. */
4979 i = 1;
4980 }
4981 else
4982 {
4983 plts[j].plt_got_offset = non_lazy_plt->plt_got_offset;
4984 plts[j].plt_got_insn_size = non_lazy_plt->plt_got_insn_size;
4985 plts[j].plt_entry_size = non_lazy_plt->plt_entry_size;
4986 i = 0;
4987 }
4988
4989 /* Skip lazy PLT when the second PLT is used. */
4990 if (plt_type == (plt_lazy | plt_second))
4991 plts[j].count = 0;
4992 else
4993 {
4994 n = plt->size / plts[j].plt_entry_size;
4995 plts[j].count = n;
4996 count += n - i;
4997 }
4998
4999 plts[j].contents = plt_contents;
5000 }
5001
5002 return _bfd_x86_elf_get_synthetic_symtab (abfd, count, relsize,
5003 (bfd_vma) 0, plts, dynsyms,
5004 ret);
5005 }
5006
5007 /* Handle an x86-64 specific section when reading an object file. This
5008 is called when elfcode.h finds a section with an unknown type. */
5009
5010 static bool
5011 elf_x86_64_section_from_shdr (bfd *abfd, Elf_Internal_Shdr *hdr,
5012 const char *name, int shindex)
5013 {
5014 if (hdr->sh_type != SHT_X86_64_UNWIND)
5015 return false;
5016
5017 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
5018 return false;
5019
5020 return true;
5021 }
5022
5023 /* Hook called by the linker routine which adds symbols from an object
5024 file. We use it to put SHN_X86_64_LCOMMON items in .lbss, instead
5025 of .bss. */
5026
5027 static bool
5028 elf_x86_64_add_symbol_hook (bfd *abfd,
5029 struct bfd_link_info *info ATTRIBUTE_UNUSED,
5030 Elf_Internal_Sym *sym,
5031 const char **namep ATTRIBUTE_UNUSED,
5032 flagword *flagsp ATTRIBUTE_UNUSED,
5033 asection **secp,
5034 bfd_vma *valp)
5035 {
5036 asection *lcomm;
5037
5038 switch (sym->st_shndx)
5039 {
5040 case SHN_X86_64_LCOMMON:
5041 lcomm = bfd_get_section_by_name (abfd, "LARGE_COMMON");
5042 if (lcomm == NULL)
5043 {
5044 lcomm = bfd_make_section_with_flags (abfd,
5045 "LARGE_COMMON",
5046 (SEC_ALLOC
5047 | SEC_IS_COMMON
5048 | SEC_LINKER_CREATED));
5049 if (lcomm == NULL)
5050 return false;
5051 elf_section_flags (lcomm) |= SHF_X86_64_LARGE;
5052 }
5053 *secp = lcomm;
5054 *valp = sym->st_size;
5055 return true;
5056 }
5057
5058 return true;
5059 }
5060
5061
5062 /* Given a BFD section, try to locate the corresponding ELF section
5063 index. */
5064
5065 static bool
5066 elf_x86_64_elf_section_from_bfd_section (bfd *abfd ATTRIBUTE_UNUSED,
5067 asection *sec, int *index_return)
5068 {
5069 if (sec == &_bfd_elf_large_com_section)
5070 {
5071 *index_return = SHN_X86_64_LCOMMON;
5072 return true;
5073 }
5074 return false;
5075 }
5076
5077 /* Process a symbol. */
5078
5079 static void
5080 elf_x86_64_symbol_processing (bfd *abfd ATTRIBUTE_UNUSED,
5081 asymbol *asym)
5082 {
5083 elf_symbol_type *elfsym = (elf_symbol_type *) asym;
5084
5085 switch (elfsym->internal_elf_sym.st_shndx)
5086 {
5087 case SHN_X86_64_LCOMMON:
5088 asym->section = &_bfd_elf_large_com_section;
5089 asym->value = elfsym->internal_elf_sym.st_size;
5090 /* Common symbol doesn't set BSF_GLOBAL. */
5091 asym->flags &= ~BSF_GLOBAL;
5092 break;
5093 }
5094 }
5095
5096 static bool
5097 elf_x86_64_common_definition (Elf_Internal_Sym *sym)
5098 {
5099 return (sym->st_shndx == SHN_COMMON
5100 || sym->st_shndx == SHN_X86_64_LCOMMON);
5101 }
5102
5103 static unsigned int
5104 elf_x86_64_common_section_index (asection *sec)
5105 {
5106 if ((elf_section_flags (sec) & SHF_X86_64_LARGE) == 0)
5107 return SHN_COMMON;
5108 else
5109 return SHN_X86_64_LCOMMON;
5110 }
5111
5112 static asection *
5113 elf_x86_64_common_section (asection *sec)
5114 {
5115 if ((elf_section_flags (sec) & SHF_X86_64_LARGE) == 0)
5116 return bfd_com_section_ptr;
5117 else
5118 return &_bfd_elf_large_com_section;
5119 }
5120
5121 static bool
5122 elf_x86_64_merge_symbol (struct elf_link_hash_entry *h,
5123 const Elf_Internal_Sym *sym,
5124 asection **psec,
5125 bool newdef,
5126 bool olddef,
5127 bfd *oldbfd,
5128 const asection *oldsec)
5129 {
5130 /* A normal common symbol and a large common symbol result in a
5131 normal common symbol. We turn the large common symbol into a
5132 normal one. */
5133 if (!olddef
5134 && h->root.type == bfd_link_hash_common
5135 && !newdef
5136 && bfd_is_com_section (*psec)
5137 && oldsec != *psec)
5138 {
5139 if (sym->st_shndx == SHN_COMMON
5140 && (elf_section_flags (oldsec) & SHF_X86_64_LARGE) != 0)
5141 {
5142 h->root.u.c.p->section
5143 = bfd_make_section_old_way (oldbfd, "COMMON");
5144 h->root.u.c.p->section->flags = SEC_ALLOC;
5145 }
5146 else if (sym->st_shndx == SHN_X86_64_LCOMMON
5147 && (elf_section_flags (oldsec) & SHF_X86_64_LARGE) == 0)
5148 *psec = bfd_com_section_ptr;
5149 }
5150
5151 return true;
5152 }
5153
5154 static int
5155 elf_x86_64_additional_program_headers (bfd *abfd,
5156 struct bfd_link_info *info ATTRIBUTE_UNUSED)
5157 {
5158 asection *s;
5159 int count = 0;
5160
5161 /* Check to see if we need a large readonly segment. */
5162 s = bfd_get_section_by_name (abfd, ".lrodata");
5163 if (s && (s->flags & SEC_LOAD))
5164 count++;
5165
5166 /* Check to see if we need a large data segment. Since .lbss sections
5167 is placed right after the .bss section, there should be no need for
5168 a large data segment just because of .lbss. */
5169 s = bfd_get_section_by_name (abfd, ".ldata");
5170 if (s && (s->flags & SEC_LOAD))
5171 count++;
5172
5173 return count;
5174 }
5175
5176 /* Return TRUE iff relocations for INPUT are compatible with OUTPUT. */
5177
5178 static bool
5179 elf_x86_64_relocs_compatible (const bfd_target *input,
5180 const bfd_target *output)
5181 {
5182 return ((xvec_get_elf_backend_data (input)->s->elfclass
5183 == xvec_get_elf_backend_data (output)->s->elfclass)
5184 && _bfd_elf_relocs_compatible (input, output));
5185 }
5186
5187 /* Set up x86-64 GNU properties. Return the first relocatable ELF input
5188 with GNU properties if found. Otherwise, return NULL. */
5189
5190 static bfd *
5191 elf_x86_64_link_setup_gnu_properties (struct bfd_link_info *info)
5192 {
5193 struct elf_x86_init_table init_table;
5194 const struct elf_backend_data *bed;
5195 struct elf_x86_link_hash_table *htab;
5196
5197 if ((int) R_X86_64_standard >= (int) R_X86_64_converted_reloc_bit
5198 || (int) R_X86_64_max <= (int) R_X86_64_converted_reloc_bit
5199 || ((int) (R_X86_64_GNU_VTINHERIT | R_X86_64_converted_reloc_bit)
5200 != (int) R_X86_64_GNU_VTINHERIT)
5201 || ((int) (R_X86_64_GNU_VTENTRY | R_X86_64_converted_reloc_bit)
5202 != (int) R_X86_64_GNU_VTENTRY))
5203 abort ();
5204
5205 /* This is unused for x86-64. */
5206 init_table.plt0_pad_byte = 0x90;
5207
5208 bed = get_elf_backend_data (info->output_bfd);
5209 htab = elf_x86_hash_table (info, bed->target_id);
5210 if (!htab)
5211 abort ();
5212 if (htab->params->bndplt)
5213 {
5214 init_table.lazy_plt = &elf_x86_64_lazy_bnd_plt;
5215 init_table.non_lazy_plt = &elf_x86_64_non_lazy_bnd_plt;
5216 }
5217 else
5218 {
5219 init_table.lazy_plt = &elf_x86_64_lazy_plt;
5220 init_table.non_lazy_plt = &elf_x86_64_non_lazy_plt;
5221 }
5222
5223 if (ABI_64_P (info->output_bfd))
5224 {
5225 init_table.lazy_ibt_plt = &elf_x86_64_lazy_ibt_plt;
5226 init_table.non_lazy_ibt_plt = &elf_x86_64_non_lazy_ibt_plt;
5227 }
5228 else
5229 {
5230 init_table.lazy_ibt_plt = &elf_x32_lazy_ibt_plt;
5231 init_table.non_lazy_ibt_plt = &elf_x32_non_lazy_ibt_plt;
5232 }
5233
5234 if (ABI_64_P (info->output_bfd))
5235 {
5236 init_table.r_info = elf64_r_info;
5237 init_table.r_sym = elf64_r_sym;
5238 }
5239 else
5240 {
5241 init_table.r_info = elf32_r_info;
5242 init_table.r_sym = elf32_r_sym;
5243 }
5244
5245 return _bfd_x86_elf_link_setup_gnu_properties (info, &init_table);
5246 }
5247
5248 static const struct bfd_elf_special_section
5249 elf_x86_64_special_sections[]=
5250 {
5251 { STRING_COMMA_LEN (".gnu.linkonce.lb"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5252 { STRING_COMMA_LEN (".gnu.linkonce.lr"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_X86_64_LARGE},
5253 { STRING_COMMA_LEN (".gnu.linkonce.lt"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR + SHF_X86_64_LARGE},
5254 { STRING_COMMA_LEN (".lbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5255 { STRING_COMMA_LEN (".ldata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5256 { STRING_COMMA_LEN (".lrodata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_X86_64_LARGE},
5257 { NULL, 0, 0, 0, 0 }
5258 };
5259
5260 #define TARGET_LITTLE_SYM x86_64_elf64_vec
5261 #define TARGET_LITTLE_NAME "elf64-x86-64"
5262 #define ELF_ARCH bfd_arch_i386
5263 #define ELF_TARGET_ID X86_64_ELF_DATA
5264 #define ELF_MACHINE_CODE EM_X86_64
5265 #if DEFAULT_LD_Z_SEPARATE_CODE
5266 # define ELF_MAXPAGESIZE 0x1000
5267 #else
5268 # define ELF_MAXPAGESIZE 0x200000
5269 #endif
5270 #define ELF_COMMONPAGESIZE 0x1000
5271
5272 #define elf_backend_can_gc_sections 1
5273 #define elf_backend_can_refcount 1
5274 #define elf_backend_want_got_plt 1
5275 #define elf_backend_plt_readonly 1
5276 #define elf_backend_want_plt_sym 0
5277 #define elf_backend_got_header_size (GOT_ENTRY_SIZE*3)
5278 #define elf_backend_rela_normal 1
5279 #define elf_backend_plt_alignment 4
5280 #define elf_backend_caches_rawsize 1
5281 #define elf_backend_dtrel_excludes_plt 1
5282 #define elf_backend_want_dynrelro 1
5283
5284 #define elf_info_to_howto elf_x86_64_info_to_howto
5285
5286 #define bfd_elf64_bfd_reloc_type_lookup elf_x86_64_reloc_type_lookup
5287 #define bfd_elf64_bfd_reloc_name_lookup \
5288 elf_x86_64_reloc_name_lookup
5289
5290 #define elf_backend_relocs_compatible elf_x86_64_relocs_compatible
5291 #define elf_backend_always_size_sections elf_x86_64_always_size_sections
5292 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
5293 #define elf_backend_finish_dynamic_sections elf_x86_64_finish_dynamic_sections
5294 #define elf_backend_finish_dynamic_symbol elf_x86_64_finish_dynamic_symbol
5295 #define elf_backend_output_arch_local_syms elf_x86_64_output_arch_local_syms
5296 #define elf_backend_grok_prstatus elf_x86_64_grok_prstatus
5297 #define elf_backend_grok_psinfo elf_x86_64_grok_psinfo
5298 #ifdef CORE_HEADER
5299 #define elf_backend_write_core_note elf_x86_64_write_core_note
5300 #endif
5301 #define elf_backend_reloc_type_class elf_x86_64_reloc_type_class
5302 #define elf_backend_relocate_section elf_x86_64_relocate_section
5303 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
5304 #define elf_backend_object_p elf64_x86_64_elf_object_p
5305 #define bfd_elf64_get_synthetic_symtab elf_x86_64_get_synthetic_symtab
5306
5307 #define elf_backend_section_from_shdr \
5308 elf_x86_64_section_from_shdr
5309
5310 #define elf_backend_section_from_bfd_section \
5311 elf_x86_64_elf_section_from_bfd_section
5312 #define elf_backend_add_symbol_hook \
5313 elf_x86_64_add_symbol_hook
5314 #define elf_backend_symbol_processing \
5315 elf_x86_64_symbol_processing
5316 #define elf_backend_common_section_index \
5317 elf_x86_64_common_section_index
5318 #define elf_backend_common_section \
5319 elf_x86_64_common_section
5320 #define elf_backend_common_definition \
5321 elf_x86_64_common_definition
5322 #define elf_backend_merge_symbol \
5323 elf_x86_64_merge_symbol
5324 #define elf_backend_special_sections \
5325 elf_x86_64_special_sections
5326 #define elf_backend_additional_program_headers \
5327 elf_x86_64_additional_program_headers
5328 #define elf_backend_setup_gnu_properties \
5329 elf_x86_64_link_setup_gnu_properties
5330 #define elf_backend_hide_symbol \
5331 _bfd_x86_elf_hide_symbol
5332
5333 #undef elf64_bed
5334 #define elf64_bed elf64_x86_64_bed
5335
5336 #include "elf64-target.h"
5337
5338 /* CloudABI support. */
5339
5340 #undef TARGET_LITTLE_SYM
5341 #define TARGET_LITTLE_SYM x86_64_elf64_cloudabi_vec
5342 #undef TARGET_LITTLE_NAME
5343 #define TARGET_LITTLE_NAME "elf64-x86-64-cloudabi"
5344
5345 #undef ELF_OSABI
5346 #define ELF_OSABI ELFOSABI_CLOUDABI
5347
5348 #undef elf64_bed
5349 #define elf64_bed elf64_x86_64_cloudabi_bed
5350
5351 #include "elf64-target.h"
5352
5353 /* FreeBSD support. */
5354
5355 #undef TARGET_LITTLE_SYM
5356 #define TARGET_LITTLE_SYM x86_64_elf64_fbsd_vec
5357 #undef TARGET_LITTLE_NAME
5358 #define TARGET_LITTLE_NAME "elf64-x86-64-freebsd"
5359
5360 #undef ELF_OSABI
5361 #define ELF_OSABI ELFOSABI_FREEBSD
5362
5363 #undef elf64_bed
5364 #define elf64_bed elf64_x86_64_fbsd_bed
5365
5366 #include "elf64-target.h"
5367
5368 /* Solaris 2 support. */
5369
5370 #undef TARGET_LITTLE_SYM
5371 #define TARGET_LITTLE_SYM x86_64_elf64_sol2_vec
5372 #undef TARGET_LITTLE_NAME
5373 #define TARGET_LITTLE_NAME "elf64-x86-64-sol2"
5374
5375 #undef ELF_TARGET_OS
5376 #define ELF_TARGET_OS is_solaris
5377
5378 /* Restore default: we cannot use ELFOSABI_SOLARIS, otherwise ELFOSABI_NONE
5379 objects won't be recognized. */
5380 #undef ELF_OSABI
5381
5382 #undef elf64_bed
5383 #define elf64_bed elf64_x86_64_sol2_bed
5384
5385 /* The 64-bit static TLS arena size is rounded to the nearest 16-byte
5386 boundary. */
5387 #undef elf_backend_static_tls_alignment
5388 #define elf_backend_static_tls_alignment 16
5389
5390 /* The Solaris 2 ABI requires a plt symbol on all platforms.
5391
5392 Cf. Linker and Libraries Guide, Ch. 2, Link-Editor, Generating the Output
5393 File, p.63. */
5394 #undef elf_backend_want_plt_sym
5395 #define elf_backend_want_plt_sym 1
5396
5397 #undef elf_backend_strtab_flags
5398 #define elf_backend_strtab_flags SHF_STRINGS
5399
5400 static bool
5401 elf64_x86_64_copy_solaris_special_section_fields (const bfd *ibfd ATTRIBUTE_UNUSED,
5402 bfd *obfd ATTRIBUTE_UNUSED,
5403 const Elf_Internal_Shdr *isection ATTRIBUTE_UNUSED,
5404 Elf_Internal_Shdr *osection ATTRIBUTE_UNUSED)
5405 {
5406 /* PR 19938: FIXME: Need to add code for setting the sh_info
5407 and sh_link fields of Solaris specific section types. */
5408 return false;
5409 }
5410
5411 #undef elf_backend_copy_special_section_fields
5412 #define elf_backend_copy_special_section_fields elf64_x86_64_copy_solaris_special_section_fields
5413
5414 #include "elf64-target.h"
5415
5416 /* Restore defaults. */
5417 #undef ELF_OSABI
5418 #undef elf_backend_static_tls_alignment
5419 #undef elf_backend_want_plt_sym
5420 #define elf_backend_want_plt_sym 0
5421 #undef elf_backend_strtab_flags
5422 #undef elf_backend_copy_special_section_fields
5423
5424 /* 32bit x86-64 support. */
5425
5426 #undef TARGET_LITTLE_SYM
5427 #define TARGET_LITTLE_SYM x86_64_elf32_vec
5428 #undef TARGET_LITTLE_NAME
5429 #define TARGET_LITTLE_NAME "elf32-x86-64"
5430 #undef elf32_bed
5431 #define elf32_bed elf32_x86_64_bed
5432
5433 #undef ELF_ARCH
5434 #define ELF_ARCH bfd_arch_i386
5435
5436 #undef ELF_MACHINE_CODE
5437 #define ELF_MACHINE_CODE EM_X86_64
5438
5439 #undef ELF_TARGET_OS
5440 #undef ELF_OSABI
5441
5442 #define bfd_elf32_bfd_reloc_type_lookup \
5443 elf_x86_64_reloc_type_lookup
5444 #define bfd_elf32_bfd_reloc_name_lookup \
5445 elf_x86_64_reloc_name_lookup
5446 #define bfd_elf32_get_synthetic_symtab \
5447 elf_x86_64_get_synthetic_symtab
5448
5449 #undef elf_backend_object_p
5450 #define elf_backend_object_p \
5451 elf32_x86_64_elf_object_p
5452
5453 #undef elf_backend_bfd_from_remote_memory
5454 #define elf_backend_bfd_from_remote_memory \
5455 _bfd_elf32_bfd_from_remote_memory
5456
5457 #undef elf_backend_size_info
5458 #define elf_backend_size_info \
5459 _bfd_elf32_size_info
5460
5461 #include "elf32-target.h"