]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf64-x86-64.c
x86: Remove bfd_arch_l1om and bfd_arch_k1om
[thirdparty/binutils-gdb.git] / bfd / elf64-x86-64.c
1 /* X86-64 specific support for ELF
2 Copyright (C) 2000-2022 Free Software Foundation, Inc.
3 Contributed by Jan Hubicka <jh@suse.cz>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "elfxx-x86.h"
23 #include "dwarf2.h"
24 #include "libiberty.h"
25
26 #include "opcode/i386.h"
27
28 #ifdef CORE_HEADER
29 #include <stdarg.h>
30 #include CORE_HEADER
31 #endif
32
33 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value. */
34 #define MINUS_ONE (~ (bfd_vma) 0)
35
36 /* Since both 32-bit and 64-bit x86-64 encode relocation type in the
37 identical manner, we use ELF32_R_TYPE instead of ELF64_R_TYPE to get
38 relocation type. We also use ELF_ST_TYPE instead of ELF64_ST_TYPE
39 since they are the same. */
40
41 /* The relocation "howto" table. Order of fields:
42 type, rightshift, size, bitsize, pc_relative, bitpos, complain_on_overflow,
43 special_function, name, partial_inplace, src_mask, dst_mask, pcrel_offset. */
44 static reloc_howto_type x86_64_elf_howto_table[] =
45 {
46 HOWTO(R_X86_64_NONE, 0, 3, 0, false, 0, complain_overflow_dont,
47 bfd_elf_generic_reloc, "R_X86_64_NONE", false, 0, 0x00000000,
48 false),
49 HOWTO(R_X86_64_64, 0, 4, 64, false, 0, complain_overflow_dont,
50 bfd_elf_generic_reloc, "R_X86_64_64", false, 0, MINUS_ONE,
51 false),
52 HOWTO(R_X86_64_PC32, 0, 2, 32, true, 0, complain_overflow_signed,
53 bfd_elf_generic_reloc, "R_X86_64_PC32", false, 0, 0xffffffff,
54 true),
55 HOWTO(R_X86_64_GOT32, 0, 2, 32, false, 0, complain_overflow_signed,
56 bfd_elf_generic_reloc, "R_X86_64_GOT32", false, 0, 0xffffffff,
57 false),
58 HOWTO(R_X86_64_PLT32, 0, 2, 32, true, 0, complain_overflow_signed,
59 bfd_elf_generic_reloc, "R_X86_64_PLT32", false, 0, 0xffffffff,
60 true),
61 HOWTO(R_X86_64_COPY, 0, 2, 32, false, 0, complain_overflow_bitfield,
62 bfd_elf_generic_reloc, "R_X86_64_COPY", false, 0, 0xffffffff,
63 false),
64 HOWTO(R_X86_64_GLOB_DAT, 0, 4, 64, false, 0, complain_overflow_dont,
65 bfd_elf_generic_reloc, "R_X86_64_GLOB_DAT", false, 0, MINUS_ONE,
66 false),
67 HOWTO(R_X86_64_JUMP_SLOT, 0, 4, 64, false, 0, complain_overflow_dont,
68 bfd_elf_generic_reloc, "R_X86_64_JUMP_SLOT", false, 0, MINUS_ONE,
69 false),
70 HOWTO(R_X86_64_RELATIVE, 0, 4, 64, false, 0, complain_overflow_dont,
71 bfd_elf_generic_reloc, "R_X86_64_RELATIVE", false, 0, MINUS_ONE,
72 false),
73 HOWTO(R_X86_64_GOTPCREL, 0, 2, 32, true, 0, complain_overflow_signed,
74 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL", false, 0, 0xffffffff,
75 true),
76 HOWTO(R_X86_64_32, 0, 2, 32, false, 0, complain_overflow_unsigned,
77 bfd_elf_generic_reloc, "R_X86_64_32", false, 0, 0xffffffff,
78 false),
79 HOWTO(R_X86_64_32S, 0, 2, 32, false, 0, complain_overflow_signed,
80 bfd_elf_generic_reloc, "R_X86_64_32S", false, 0, 0xffffffff,
81 false),
82 HOWTO(R_X86_64_16, 0, 1, 16, false, 0, complain_overflow_bitfield,
83 bfd_elf_generic_reloc, "R_X86_64_16", false, 0, 0xffff, false),
84 HOWTO(R_X86_64_PC16, 0, 1, 16, true, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_X86_64_PC16", false, 0, 0xffff, true),
86 HOWTO(R_X86_64_8, 0, 0, 8, false, 0, complain_overflow_bitfield,
87 bfd_elf_generic_reloc, "R_X86_64_8", false, 0, 0xff, false),
88 HOWTO(R_X86_64_PC8, 0, 0, 8, true, 0, complain_overflow_signed,
89 bfd_elf_generic_reloc, "R_X86_64_PC8", false, 0, 0xff, true),
90 HOWTO(R_X86_64_DTPMOD64, 0, 4, 64, false, 0, complain_overflow_dont,
91 bfd_elf_generic_reloc, "R_X86_64_DTPMOD64", false, 0, MINUS_ONE,
92 false),
93 HOWTO(R_X86_64_DTPOFF64, 0, 4, 64, false, 0, complain_overflow_dont,
94 bfd_elf_generic_reloc, "R_X86_64_DTPOFF64", false, 0, MINUS_ONE,
95 false),
96 HOWTO(R_X86_64_TPOFF64, 0, 4, 64, false, 0, complain_overflow_dont,
97 bfd_elf_generic_reloc, "R_X86_64_TPOFF64", false, 0, MINUS_ONE,
98 false),
99 HOWTO(R_X86_64_TLSGD, 0, 2, 32, true, 0, complain_overflow_signed,
100 bfd_elf_generic_reloc, "R_X86_64_TLSGD", false, 0, 0xffffffff,
101 true),
102 HOWTO(R_X86_64_TLSLD, 0, 2, 32, true, 0, complain_overflow_signed,
103 bfd_elf_generic_reloc, "R_X86_64_TLSLD", false, 0, 0xffffffff,
104 true),
105 HOWTO(R_X86_64_DTPOFF32, 0, 2, 32, false, 0, complain_overflow_signed,
106 bfd_elf_generic_reloc, "R_X86_64_DTPOFF32", false, 0, 0xffffffff,
107 false),
108 HOWTO(R_X86_64_GOTTPOFF, 0, 2, 32, true, 0, complain_overflow_signed,
109 bfd_elf_generic_reloc, "R_X86_64_GOTTPOFF", false, 0, 0xffffffff,
110 true),
111 HOWTO(R_X86_64_TPOFF32, 0, 2, 32, false, 0, complain_overflow_signed,
112 bfd_elf_generic_reloc, "R_X86_64_TPOFF32", false, 0, 0xffffffff,
113 false),
114 HOWTO(R_X86_64_PC64, 0, 4, 64, true, 0, complain_overflow_dont,
115 bfd_elf_generic_reloc, "R_X86_64_PC64", false, 0, MINUS_ONE,
116 true),
117 HOWTO(R_X86_64_GOTOFF64, 0, 4, 64, false, 0, complain_overflow_dont,
118 bfd_elf_generic_reloc, "R_X86_64_GOTOFF64", false, 0, MINUS_ONE,
119 false),
120 HOWTO(R_X86_64_GOTPC32, 0, 2, 32, true, 0, complain_overflow_signed,
121 bfd_elf_generic_reloc, "R_X86_64_GOTPC32", false, 0, 0xffffffff,
122 true),
123 HOWTO(R_X86_64_GOT64, 0, 4, 64, false, 0, complain_overflow_signed,
124 bfd_elf_generic_reloc, "R_X86_64_GOT64", false, 0, MINUS_ONE,
125 false),
126 HOWTO(R_X86_64_GOTPCREL64, 0, 4, 64, true, 0, complain_overflow_signed,
127 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL64", false, 0, MINUS_ONE,
128 true),
129 HOWTO(R_X86_64_GOTPC64, 0, 4, 64, true, 0, complain_overflow_signed,
130 bfd_elf_generic_reloc, "R_X86_64_GOTPC64", false, 0, MINUS_ONE,
131 true),
132 HOWTO(R_X86_64_GOTPLT64, 0, 4, 64, false, 0, complain_overflow_signed,
133 bfd_elf_generic_reloc, "R_X86_64_GOTPLT64", false, 0, MINUS_ONE,
134 false),
135 HOWTO(R_X86_64_PLTOFF64, 0, 4, 64, false, 0, complain_overflow_signed,
136 bfd_elf_generic_reloc, "R_X86_64_PLTOFF64", false, 0, MINUS_ONE,
137 false),
138 HOWTO(R_X86_64_SIZE32, 0, 2, 32, false, 0, complain_overflow_unsigned,
139 bfd_elf_generic_reloc, "R_X86_64_SIZE32", false, 0, 0xffffffff,
140 false),
141 HOWTO(R_X86_64_SIZE64, 0, 4, 64, false, 0, complain_overflow_dont,
142 bfd_elf_generic_reloc, "R_X86_64_SIZE64", false, 0, MINUS_ONE,
143 false),
144 HOWTO(R_X86_64_GOTPC32_TLSDESC, 0, 2, 32, true, 0,
145 complain_overflow_bitfield, bfd_elf_generic_reloc,
146 "R_X86_64_GOTPC32_TLSDESC", false, 0, 0xffffffff, true),
147 HOWTO(R_X86_64_TLSDESC_CALL, 0, 3, 0, false, 0,
148 complain_overflow_dont, bfd_elf_generic_reloc,
149 "R_X86_64_TLSDESC_CALL",
150 false, 0, 0, false),
151 HOWTO(R_X86_64_TLSDESC, 0, 4, 64, false, 0,
152 complain_overflow_dont, bfd_elf_generic_reloc,
153 "R_X86_64_TLSDESC", false, 0, MINUS_ONE, false),
154 HOWTO(R_X86_64_IRELATIVE, 0, 4, 64, false, 0, complain_overflow_dont,
155 bfd_elf_generic_reloc, "R_X86_64_IRELATIVE", false, 0, MINUS_ONE,
156 false),
157 HOWTO(R_X86_64_RELATIVE64, 0, 4, 64, false, 0, complain_overflow_dont,
158 bfd_elf_generic_reloc, "R_X86_64_RELATIVE64", false, 0, MINUS_ONE,
159 false),
160 HOWTO(R_X86_64_PC32_BND, 0, 2, 32, true, 0, complain_overflow_signed,
161 bfd_elf_generic_reloc, "R_X86_64_PC32_BND", false, 0, 0xffffffff,
162 true),
163 HOWTO(R_X86_64_PLT32_BND, 0, 2, 32, true, 0, complain_overflow_signed,
164 bfd_elf_generic_reloc, "R_X86_64_PLT32_BND", false, 0, 0xffffffff,
165 true),
166 HOWTO(R_X86_64_GOTPCRELX, 0, 2, 32, true, 0, complain_overflow_signed,
167 bfd_elf_generic_reloc, "R_X86_64_GOTPCRELX", false, 0, 0xffffffff,
168 true),
169 HOWTO(R_X86_64_REX_GOTPCRELX, 0, 2, 32, true, 0, complain_overflow_signed,
170 bfd_elf_generic_reloc, "R_X86_64_REX_GOTPCRELX", false, 0, 0xffffffff,
171 true),
172
173 /* We have a gap in the reloc numbers here.
174 R_X86_64_standard counts the number up to this point, and
175 R_X86_64_vt_offset is the value to subtract from a reloc type of
176 R_X86_64_GNU_VT* to form an index into this table. */
177 #define R_X86_64_standard (R_X86_64_REX_GOTPCRELX + 1)
178 #define R_X86_64_vt_offset (R_X86_64_GNU_VTINHERIT - R_X86_64_standard)
179
180 /* GNU extension to record C++ vtable hierarchy. */
181 HOWTO (R_X86_64_GNU_VTINHERIT, 0, 4, 0, false, 0, complain_overflow_dont,
182 NULL, "R_X86_64_GNU_VTINHERIT", false, 0, 0, false),
183
184 /* GNU extension to record C++ vtable member usage. */
185 HOWTO (R_X86_64_GNU_VTENTRY, 0, 4, 0, false, 0, complain_overflow_dont,
186 _bfd_elf_rel_vtable_reloc_fn, "R_X86_64_GNU_VTENTRY", false, 0, 0,
187 false),
188
189 /* Use complain_overflow_bitfield on R_X86_64_32 for x32. */
190 HOWTO(R_X86_64_32, 0, 2, 32, false, 0, complain_overflow_bitfield,
191 bfd_elf_generic_reloc, "R_X86_64_32", false, 0, 0xffffffff,
192 false)
193 };
194
195 /* Map BFD relocs to the x86_64 elf relocs. */
196 struct elf_reloc_map
197 {
198 bfd_reloc_code_real_type bfd_reloc_val;
199 unsigned char elf_reloc_val;
200 };
201
202 static const struct elf_reloc_map x86_64_reloc_map[] =
203 {
204 { BFD_RELOC_NONE, R_X86_64_NONE, },
205 { BFD_RELOC_64, R_X86_64_64, },
206 { BFD_RELOC_32_PCREL, R_X86_64_PC32, },
207 { BFD_RELOC_X86_64_GOT32, R_X86_64_GOT32,},
208 { BFD_RELOC_X86_64_PLT32, R_X86_64_PLT32,},
209 { BFD_RELOC_X86_64_COPY, R_X86_64_COPY, },
210 { BFD_RELOC_X86_64_GLOB_DAT, R_X86_64_GLOB_DAT, },
211 { BFD_RELOC_X86_64_JUMP_SLOT, R_X86_64_JUMP_SLOT, },
212 { BFD_RELOC_X86_64_RELATIVE, R_X86_64_RELATIVE, },
213 { BFD_RELOC_X86_64_GOTPCREL, R_X86_64_GOTPCREL, },
214 { BFD_RELOC_32, R_X86_64_32, },
215 { BFD_RELOC_X86_64_32S, R_X86_64_32S, },
216 { BFD_RELOC_16, R_X86_64_16, },
217 { BFD_RELOC_16_PCREL, R_X86_64_PC16, },
218 { BFD_RELOC_8, R_X86_64_8, },
219 { BFD_RELOC_8_PCREL, R_X86_64_PC8, },
220 { BFD_RELOC_X86_64_DTPMOD64, R_X86_64_DTPMOD64, },
221 { BFD_RELOC_X86_64_DTPOFF64, R_X86_64_DTPOFF64, },
222 { BFD_RELOC_X86_64_TPOFF64, R_X86_64_TPOFF64, },
223 { BFD_RELOC_X86_64_TLSGD, R_X86_64_TLSGD, },
224 { BFD_RELOC_X86_64_TLSLD, R_X86_64_TLSLD, },
225 { BFD_RELOC_X86_64_DTPOFF32, R_X86_64_DTPOFF32, },
226 { BFD_RELOC_X86_64_GOTTPOFF, R_X86_64_GOTTPOFF, },
227 { BFD_RELOC_X86_64_TPOFF32, R_X86_64_TPOFF32, },
228 { BFD_RELOC_64_PCREL, R_X86_64_PC64, },
229 { BFD_RELOC_X86_64_GOTOFF64, R_X86_64_GOTOFF64, },
230 { BFD_RELOC_X86_64_GOTPC32, R_X86_64_GOTPC32, },
231 { BFD_RELOC_X86_64_GOT64, R_X86_64_GOT64, },
232 { BFD_RELOC_X86_64_GOTPCREL64,R_X86_64_GOTPCREL64, },
233 { BFD_RELOC_X86_64_GOTPC64, R_X86_64_GOTPC64, },
234 { BFD_RELOC_X86_64_GOTPLT64, R_X86_64_GOTPLT64, },
235 { BFD_RELOC_X86_64_PLTOFF64, R_X86_64_PLTOFF64, },
236 { BFD_RELOC_SIZE32, R_X86_64_SIZE32, },
237 { BFD_RELOC_SIZE64, R_X86_64_SIZE64, },
238 { BFD_RELOC_X86_64_GOTPC32_TLSDESC, R_X86_64_GOTPC32_TLSDESC, },
239 { BFD_RELOC_X86_64_TLSDESC_CALL, R_X86_64_TLSDESC_CALL, },
240 { BFD_RELOC_X86_64_TLSDESC, R_X86_64_TLSDESC, },
241 { BFD_RELOC_X86_64_IRELATIVE, R_X86_64_IRELATIVE, },
242 { BFD_RELOC_X86_64_PC32_BND, R_X86_64_PC32_BND, },
243 { BFD_RELOC_X86_64_PLT32_BND, R_X86_64_PLT32_BND, },
244 { BFD_RELOC_X86_64_GOTPCRELX, R_X86_64_GOTPCRELX, },
245 { BFD_RELOC_X86_64_REX_GOTPCRELX, R_X86_64_REX_GOTPCRELX, },
246 { BFD_RELOC_VTABLE_INHERIT, R_X86_64_GNU_VTINHERIT, },
247 { BFD_RELOC_VTABLE_ENTRY, R_X86_64_GNU_VTENTRY, },
248 };
249
250 static reloc_howto_type *
251 elf_x86_64_rtype_to_howto (bfd *abfd, unsigned r_type)
252 {
253 unsigned i;
254
255 if (r_type == (unsigned int) R_X86_64_32)
256 {
257 if (ABI_64_P (abfd))
258 i = r_type;
259 else
260 i = ARRAY_SIZE (x86_64_elf_howto_table) - 1;
261 }
262 else if (r_type < (unsigned int) R_X86_64_GNU_VTINHERIT
263 || r_type >= (unsigned int) R_X86_64_max)
264 {
265 if (r_type >= (unsigned int) R_X86_64_standard)
266 {
267 /* xgettext:c-format */
268 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
269 abfd, r_type);
270 bfd_set_error (bfd_error_bad_value);
271 return NULL;
272 }
273 i = r_type;
274 }
275 else
276 i = r_type - (unsigned int) R_X86_64_vt_offset;
277 BFD_ASSERT (x86_64_elf_howto_table[i].type == r_type);
278 return &x86_64_elf_howto_table[i];
279 }
280
281 /* Given a BFD reloc type, return a HOWTO structure. */
282 static reloc_howto_type *
283 elf_x86_64_reloc_type_lookup (bfd *abfd,
284 bfd_reloc_code_real_type code)
285 {
286 unsigned int i;
287
288 for (i = 0; i < sizeof (x86_64_reloc_map) / sizeof (struct elf_reloc_map);
289 i++)
290 {
291 if (x86_64_reloc_map[i].bfd_reloc_val == code)
292 return elf_x86_64_rtype_to_howto (abfd,
293 x86_64_reloc_map[i].elf_reloc_val);
294 }
295 return NULL;
296 }
297
298 static reloc_howto_type *
299 elf_x86_64_reloc_name_lookup (bfd *abfd,
300 const char *r_name)
301 {
302 unsigned int i;
303
304 if (!ABI_64_P (abfd) && strcasecmp (r_name, "R_X86_64_32") == 0)
305 {
306 /* Get x32 R_X86_64_32. */
307 reloc_howto_type *reloc
308 = &x86_64_elf_howto_table[ARRAY_SIZE (x86_64_elf_howto_table) - 1];
309 BFD_ASSERT (reloc->type == (unsigned int) R_X86_64_32);
310 return reloc;
311 }
312
313 for (i = 0; i < ARRAY_SIZE (x86_64_elf_howto_table); i++)
314 if (x86_64_elf_howto_table[i].name != NULL
315 && strcasecmp (x86_64_elf_howto_table[i].name, r_name) == 0)
316 return &x86_64_elf_howto_table[i];
317
318 return NULL;
319 }
320
321 /* Given an x86_64 ELF reloc type, fill in an arelent structure. */
322
323 static bool
324 elf_x86_64_info_to_howto (bfd *abfd, arelent *cache_ptr,
325 Elf_Internal_Rela *dst)
326 {
327 unsigned r_type;
328
329 r_type = ELF32_R_TYPE (dst->r_info);
330 cache_ptr->howto = elf_x86_64_rtype_to_howto (abfd, r_type);
331 if (cache_ptr->howto == NULL)
332 return false;
333 BFD_ASSERT (r_type == cache_ptr->howto->type || cache_ptr->howto->type == R_X86_64_NONE);
334 return true;
335 }
336 \f
337 /* Support for core dump NOTE sections. */
338 static bool
339 elf_x86_64_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
340 {
341 int offset;
342 size_t size;
343
344 switch (note->descsz)
345 {
346 default:
347 return false;
348
349 case 296: /* sizeof(istruct elf_prstatus) on Linux/x32 */
350 /* pr_cursig */
351 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
352
353 /* pr_pid */
354 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
355
356 /* pr_reg */
357 offset = 72;
358 size = 216;
359
360 break;
361
362 case 336: /* sizeof(istruct elf_prstatus) on Linux/x86_64 */
363 /* pr_cursig */
364 elf_tdata (abfd)->core->signal
365 = bfd_get_16 (abfd, note->descdata + 12);
366
367 /* pr_pid */
368 elf_tdata (abfd)->core->lwpid
369 = bfd_get_32 (abfd, note->descdata + 32);
370
371 /* pr_reg */
372 offset = 112;
373 size = 216;
374
375 break;
376 }
377
378 /* Make a ".reg/999" section. */
379 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
380 size, note->descpos + offset);
381 }
382
383 static bool
384 elf_x86_64_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
385 {
386 switch (note->descsz)
387 {
388 default:
389 return false;
390
391 case 124: /* sizeof(struct elf_prpsinfo) on Linux/x32 */
392 elf_tdata (abfd)->core->pid
393 = bfd_get_32 (abfd, note->descdata + 12);
394 elf_tdata (abfd)->core->program
395 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
396 elf_tdata (abfd)->core->command
397 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
398 break;
399
400 case 136: /* sizeof(struct elf_prpsinfo) on Linux/x86_64 */
401 elf_tdata (abfd)->core->pid
402 = bfd_get_32 (abfd, note->descdata + 24);
403 elf_tdata (abfd)->core->program
404 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
405 elf_tdata (abfd)->core->command
406 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
407 }
408
409 /* Note that for some reason, a spurious space is tacked
410 onto the end of the args in some (at least one anyway)
411 implementations, so strip it off if it exists. */
412
413 {
414 char *command = elf_tdata (abfd)->core->command;
415 int n = strlen (command);
416
417 if (0 < n && command[n - 1] == ' ')
418 command[n - 1] = '\0';
419 }
420
421 return true;
422 }
423
424 #ifdef CORE_HEADER
425 # if GCC_VERSION >= 8000
426 # pragma GCC diagnostic push
427 # pragma GCC diagnostic ignored "-Wstringop-truncation"
428 # endif
429 static char *
430 elf_x86_64_write_core_note (bfd *abfd, char *buf, int *bufsiz,
431 int note_type, ...)
432 {
433 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
434 va_list ap;
435 const char *fname, *psargs;
436 long pid;
437 int cursig;
438 const void *gregs;
439
440 switch (note_type)
441 {
442 default:
443 return NULL;
444
445 case NT_PRPSINFO:
446 va_start (ap, note_type);
447 fname = va_arg (ap, const char *);
448 psargs = va_arg (ap, const char *);
449 va_end (ap);
450
451 if (bed->s->elfclass == ELFCLASS32)
452 {
453 prpsinfo32_t data;
454 memset (&data, 0, sizeof (data));
455 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
456 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
457 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
458 &data, sizeof (data));
459 }
460 else
461 {
462 prpsinfo64_t data;
463 memset (&data, 0, sizeof (data));
464 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
465 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
466 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
467 &data, sizeof (data));
468 }
469 /* NOTREACHED */
470
471 case NT_PRSTATUS:
472 va_start (ap, note_type);
473 pid = va_arg (ap, long);
474 cursig = va_arg (ap, int);
475 gregs = va_arg (ap, const void *);
476 va_end (ap);
477
478 if (bed->s->elfclass == ELFCLASS32)
479 {
480 if (bed->elf_machine_code == EM_X86_64)
481 {
482 prstatusx32_t prstat;
483 memset (&prstat, 0, sizeof (prstat));
484 prstat.pr_pid = pid;
485 prstat.pr_cursig = cursig;
486 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
487 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
488 &prstat, sizeof (prstat));
489 }
490 else
491 {
492 prstatus32_t prstat;
493 memset (&prstat, 0, sizeof (prstat));
494 prstat.pr_pid = pid;
495 prstat.pr_cursig = cursig;
496 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
497 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
498 &prstat, sizeof (prstat));
499 }
500 }
501 else
502 {
503 prstatus64_t prstat;
504 memset (&prstat, 0, sizeof (prstat));
505 prstat.pr_pid = pid;
506 prstat.pr_cursig = cursig;
507 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
508 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
509 &prstat, sizeof (prstat));
510 }
511 }
512 /* NOTREACHED */
513 }
514 # if GCC_VERSION >= 8000
515 # pragma GCC diagnostic pop
516 # endif
517 #endif
518 \f
519 /* Functions for the x86-64 ELF linker. */
520
521 /* The size in bytes of an entry in the global offset table. */
522
523 #define GOT_ENTRY_SIZE 8
524
525 /* The size in bytes of an entry in the lazy procedure linkage table. */
526
527 #define LAZY_PLT_ENTRY_SIZE 16
528
529 /* The size in bytes of an entry in the non-lazy procedure linkage
530 table. */
531
532 #define NON_LAZY_PLT_ENTRY_SIZE 8
533
534 /* The first entry in a lazy procedure linkage table looks like this.
535 See the SVR4 ABI i386 supplement and the x86-64 ABI to see how this
536 works. */
537
538 static const bfd_byte elf_x86_64_lazy_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
539 {
540 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
541 0xff, 0x25, 16, 0, 0, 0, /* jmpq *GOT+16(%rip) */
542 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
543 };
544
545 /* Subsequent entries in a lazy procedure linkage table look like this. */
546
547 static const bfd_byte elf_x86_64_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
548 {
549 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
550 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
551 0x68, /* pushq immediate */
552 0, 0, 0, 0, /* replaced with index into relocation table. */
553 0xe9, /* jmp relative */
554 0, 0, 0, 0 /* replaced with offset to start of .plt0. */
555 };
556
557 /* The first entry in a lazy procedure linkage table with BND prefix
558 like this. */
559
560 static const bfd_byte elf_x86_64_lazy_bnd_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
561 {
562 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
563 0xf2, 0xff, 0x25, 16, 0, 0, 0, /* bnd jmpq *GOT+16(%rip) */
564 0x0f, 0x1f, 0 /* nopl (%rax) */
565 };
566
567 /* Subsequent entries for branches with BND prefx in a lazy procedure
568 linkage table look like this. */
569
570 static const bfd_byte elf_x86_64_lazy_bnd_plt_entry[LAZY_PLT_ENTRY_SIZE] =
571 {
572 0x68, 0, 0, 0, 0, /* pushq immediate */
573 0xf2, 0xe9, 0, 0, 0, 0, /* bnd jmpq relative */
574 0x0f, 0x1f, 0x44, 0, 0 /* nopl 0(%rax,%rax,1) */
575 };
576
577 /* The first entry in the IBT-enabled lazy procedure linkage table is the
578 the same as the lazy PLT with BND prefix so that bound registers are
579 preserved when control is passed to dynamic linker. Subsequent
580 entries for a IBT-enabled lazy procedure linkage table look like
581 this. */
582
583 static const bfd_byte elf_x86_64_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
584 {
585 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
586 0x68, 0, 0, 0, 0, /* pushq immediate */
587 0xf2, 0xe9, 0, 0, 0, 0, /* bnd jmpq relative */
588 0x90 /* nop */
589 };
590
591 /* The first entry in the x32 IBT-enabled lazy procedure linkage table
592 is the same as the normal lazy PLT. Subsequent entries for an
593 x32 IBT-enabled lazy procedure linkage table look like this. */
594
595 static const bfd_byte elf_x32_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
596 {
597 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
598 0x68, 0, 0, 0, 0, /* pushq immediate */
599 0xe9, 0, 0, 0, 0, /* jmpq relative */
600 0x66, 0x90 /* xchg %ax,%ax */
601 };
602
603 /* Entries in the non-lazey procedure linkage table look like this. */
604
605 static const bfd_byte elf_x86_64_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
606 {
607 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
608 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
609 0x66, 0x90 /* xchg %ax,%ax */
610 };
611
612 /* Entries for branches with BND prefix in the non-lazey procedure
613 linkage table look like this. */
614
615 static const bfd_byte elf_x86_64_non_lazy_bnd_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
616 {
617 0xf2, 0xff, 0x25, /* bnd jmpq *name@GOTPC(%rip) */
618 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
619 0x90 /* nop */
620 };
621
622 /* Entries for branches with IBT-enabled in the non-lazey procedure
623 linkage table look like this. They have the same size as the lazy
624 PLT entry. */
625
626 static const bfd_byte elf_x86_64_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
627 {
628 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
629 0xf2, 0xff, 0x25, /* bnd jmpq *name@GOTPC(%rip) */
630 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
631 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopl 0x0(%rax,%rax,1) */
632 };
633
634 /* Entries for branches with IBT-enabled in the x32 non-lazey procedure
635 linkage table look like this. They have the same size as the lazy
636 PLT entry. */
637
638 static const bfd_byte elf_x32_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
639 {
640 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
641 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
642 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
643 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
644 };
645
646 /* The TLSDESC entry in a lazy procedure linkage table. */
647 static const bfd_byte elf_x86_64_tlsdesc_plt_entry[LAZY_PLT_ENTRY_SIZE] =
648 {
649 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
650 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
651 0xff, 0x25, 16, 0, 0, 0 /* jmpq *GOT+TDG(%rip) */
652 };
653
654 /* .eh_frame covering the lazy .plt section. */
655
656 static const bfd_byte elf_x86_64_eh_frame_lazy_plt[] =
657 {
658 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
659 0, 0, 0, 0, /* CIE ID */
660 1, /* CIE version */
661 'z', 'R', 0, /* Augmentation string */
662 1, /* Code alignment factor */
663 0x78, /* Data alignment factor */
664 16, /* Return address column */
665 1, /* Augmentation size */
666 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
667 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
668 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
669 DW_CFA_nop, DW_CFA_nop,
670
671 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
672 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
673 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
674 0, 0, 0, 0, /* .plt size goes here */
675 0, /* Augmentation size */
676 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
677 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
678 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
679 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
680 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
681 11, /* Block length */
682 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
683 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
684 DW_OP_lit15, DW_OP_and, DW_OP_lit11, DW_OP_ge,
685 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
686 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
687 };
688
689 /* .eh_frame covering the lazy BND .plt section. */
690
691 static const bfd_byte elf_x86_64_eh_frame_lazy_bnd_plt[] =
692 {
693 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
694 0, 0, 0, 0, /* CIE ID */
695 1, /* CIE version */
696 'z', 'R', 0, /* Augmentation string */
697 1, /* Code alignment factor */
698 0x78, /* Data alignment factor */
699 16, /* Return address column */
700 1, /* Augmentation size */
701 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
702 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
703 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
704 DW_CFA_nop, DW_CFA_nop,
705
706 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
707 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
708 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
709 0, 0, 0, 0, /* .plt size goes here */
710 0, /* Augmentation size */
711 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
712 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
713 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
714 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
715 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
716 11, /* Block length */
717 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
718 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
719 DW_OP_lit15, DW_OP_and, DW_OP_lit5, DW_OP_ge,
720 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
721 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
722 };
723
724 /* .eh_frame covering the lazy .plt section with IBT-enabled. */
725
726 static const bfd_byte elf_x86_64_eh_frame_lazy_ibt_plt[] =
727 {
728 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
729 0, 0, 0, 0, /* CIE ID */
730 1, /* CIE version */
731 'z', 'R', 0, /* Augmentation string */
732 1, /* Code alignment factor */
733 0x78, /* Data alignment factor */
734 16, /* Return address column */
735 1, /* Augmentation size */
736 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
737 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
738 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
739 DW_CFA_nop, DW_CFA_nop,
740
741 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
742 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
743 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
744 0, 0, 0, 0, /* .plt size goes here */
745 0, /* Augmentation size */
746 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
747 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
748 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
749 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
750 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
751 11, /* Block length */
752 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
753 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
754 DW_OP_lit15, DW_OP_and, DW_OP_lit10, DW_OP_ge,
755 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
756 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
757 };
758
759 /* .eh_frame covering the x32 lazy .plt section with IBT-enabled. */
760
761 static const bfd_byte elf_x32_eh_frame_lazy_ibt_plt[] =
762 {
763 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
764 0, 0, 0, 0, /* CIE ID */
765 1, /* CIE version */
766 'z', 'R', 0, /* Augmentation string */
767 1, /* Code alignment factor */
768 0x78, /* Data alignment factor */
769 16, /* Return address column */
770 1, /* Augmentation size */
771 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
772 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
773 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
774 DW_CFA_nop, DW_CFA_nop,
775
776 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
777 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
778 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
779 0, 0, 0, 0, /* .plt size goes here */
780 0, /* Augmentation size */
781 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
782 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
783 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
784 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
785 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
786 11, /* Block length */
787 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
788 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
789 DW_OP_lit15, DW_OP_and, DW_OP_lit9, DW_OP_ge,
790 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
791 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
792 };
793
794 /* .eh_frame covering the non-lazy .plt section. */
795
796 static const bfd_byte elf_x86_64_eh_frame_non_lazy_plt[] =
797 {
798 #define PLT_GOT_FDE_LENGTH 20
799 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
800 0, 0, 0, 0, /* CIE ID */
801 1, /* CIE version */
802 'z', 'R', 0, /* Augmentation string */
803 1, /* Code alignment factor */
804 0x78, /* Data alignment factor */
805 16, /* Return address column */
806 1, /* Augmentation size */
807 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
808 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
809 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
810 DW_CFA_nop, DW_CFA_nop,
811
812 PLT_GOT_FDE_LENGTH, 0, 0, 0, /* FDE length */
813 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
814 0, 0, 0, 0, /* the start of non-lazy .plt goes here */
815 0, 0, 0, 0, /* non-lazy .plt size goes here */
816 0, /* Augmentation size */
817 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop,
818 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
819 };
820
821 /* These are the standard parameters. */
822 static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_plt =
823 {
824 elf_x86_64_lazy_plt0_entry, /* plt0_entry */
825 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
826 elf_x86_64_lazy_plt_entry, /* plt_entry */
827 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
828 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
829 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
830 6, /* plt_tlsdesc_got1_offset */
831 12, /* plt_tlsdesc_got2_offset */
832 10, /* plt_tlsdesc_got1_insn_end */
833 16, /* plt_tlsdesc_got2_insn_end */
834 2, /* plt0_got1_offset */
835 8, /* plt0_got2_offset */
836 12, /* plt0_got2_insn_end */
837 2, /* plt_got_offset */
838 7, /* plt_reloc_offset */
839 12, /* plt_plt_offset */
840 6, /* plt_got_insn_size */
841 LAZY_PLT_ENTRY_SIZE, /* plt_plt_insn_end */
842 6, /* plt_lazy_offset */
843 elf_x86_64_lazy_plt0_entry, /* pic_plt0_entry */
844 elf_x86_64_lazy_plt_entry, /* pic_plt_entry */
845 elf_x86_64_eh_frame_lazy_plt, /* eh_frame_plt */
846 sizeof (elf_x86_64_eh_frame_lazy_plt) /* eh_frame_plt_size */
847 };
848
849 static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_plt =
850 {
851 elf_x86_64_non_lazy_plt_entry, /* plt_entry */
852 elf_x86_64_non_lazy_plt_entry, /* pic_plt_entry */
853 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
854 2, /* plt_got_offset */
855 6, /* plt_got_insn_size */
856 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
857 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
858 };
859
860 static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_bnd_plt =
861 {
862 elf_x86_64_lazy_bnd_plt0_entry, /* plt0_entry */
863 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
864 elf_x86_64_lazy_bnd_plt_entry, /* plt_entry */
865 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
866 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
867 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
868 6, /* plt_tlsdesc_got1_offset */
869 12, /* plt_tlsdesc_got2_offset */
870 10, /* plt_tlsdesc_got1_insn_end */
871 16, /* plt_tlsdesc_got2_insn_end */
872 2, /* plt0_got1_offset */
873 1+8, /* plt0_got2_offset */
874 1+12, /* plt0_got2_insn_end */
875 1+2, /* plt_got_offset */
876 1, /* plt_reloc_offset */
877 7, /* plt_plt_offset */
878 1+6, /* plt_got_insn_size */
879 11, /* plt_plt_insn_end */
880 0, /* plt_lazy_offset */
881 elf_x86_64_lazy_bnd_plt0_entry, /* pic_plt0_entry */
882 elf_x86_64_lazy_bnd_plt_entry, /* pic_plt_entry */
883 elf_x86_64_eh_frame_lazy_bnd_plt, /* eh_frame_plt */
884 sizeof (elf_x86_64_eh_frame_lazy_bnd_plt) /* eh_frame_plt_size */
885 };
886
887 static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_bnd_plt =
888 {
889 elf_x86_64_non_lazy_bnd_plt_entry, /* plt_entry */
890 elf_x86_64_non_lazy_bnd_plt_entry, /* pic_plt_entry */
891 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
892 1+2, /* plt_got_offset */
893 1+6, /* plt_got_insn_size */
894 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
895 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
896 };
897
898 static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_ibt_plt =
899 {
900 elf_x86_64_lazy_bnd_plt0_entry, /* plt0_entry */
901 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
902 elf_x86_64_lazy_ibt_plt_entry, /* plt_entry */
903 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
904 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
905 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
906 6, /* plt_tlsdesc_got1_offset */
907 12, /* plt_tlsdesc_got2_offset */
908 10, /* plt_tlsdesc_got1_insn_end */
909 16, /* plt_tlsdesc_got2_insn_end */
910 2, /* plt0_got1_offset */
911 1+8, /* plt0_got2_offset */
912 1+12, /* plt0_got2_insn_end */
913 4+1+2, /* plt_got_offset */
914 4+1, /* plt_reloc_offset */
915 4+1+6, /* plt_plt_offset */
916 4+1+6, /* plt_got_insn_size */
917 4+1+5+5, /* plt_plt_insn_end */
918 0, /* plt_lazy_offset */
919 elf_x86_64_lazy_bnd_plt0_entry, /* pic_plt0_entry */
920 elf_x86_64_lazy_ibt_plt_entry, /* pic_plt_entry */
921 elf_x86_64_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
922 sizeof (elf_x86_64_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
923 };
924
925 static const struct elf_x86_lazy_plt_layout elf_x32_lazy_ibt_plt =
926 {
927 elf_x86_64_lazy_plt0_entry, /* plt0_entry */
928 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
929 elf_x32_lazy_ibt_plt_entry, /* plt_entry */
930 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
931 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
932 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
933 6, /* plt_tlsdesc_got1_offset */
934 12, /* plt_tlsdesc_got2_offset */
935 10, /* plt_tlsdesc_got1_insn_end */
936 16, /* plt_tlsdesc_got2_insn_end */
937 2, /* plt0_got1_offset */
938 8, /* plt0_got2_offset */
939 12, /* plt0_got2_insn_end */
940 4+2, /* plt_got_offset */
941 4+1, /* plt_reloc_offset */
942 4+6, /* plt_plt_offset */
943 4+6, /* plt_got_insn_size */
944 4+5+5, /* plt_plt_insn_end */
945 0, /* plt_lazy_offset */
946 elf_x86_64_lazy_plt0_entry, /* pic_plt0_entry */
947 elf_x32_lazy_ibt_plt_entry, /* pic_plt_entry */
948 elf_x32_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
949 sizeof (elf_x32_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
950 };
951
952 static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_ibt_plt =
953 {
954 elf_x86_64_non_lazy_ibt_plt_entry, /* plt_entry */
955 elf_x86_64_non_lazy_ibt_plt_entry, /* pic_plt_entry */
956 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
957 4+1+2, /* plt_got_offset */
958 4+1+6, /* plt_got_insn_size */
959 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
960 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
961 };
962
963 static const struct elf_x86_non_lazy_plt_layout elf_x32_non_lazy_ibt_plt =
964 {
965 elf_x32_non_lazy_ibt_plt_entry, /* plt_entry */
966 elf_x32_non_lazy_ibt_plt_entry, /* pic_plt_entry */
967 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
968 4+2, /* plt_got_offset */
969 4+6, /* plt_got_insn_size */
970 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
971 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
972 };
973
974
975 static bool
976 elf64_x86_64_elf_object_p (bfd *abfd)
977 {
978 /* Set the right machine number for an x86-64 elf64 file. */
979 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x86_64);
980 return true;
981 }
982
983 static bool
984 elf32_x86_64_elf_object_p (bfd *abfd)
985 {
986 /* Set the right machine number for an x86-64 elf32 file. */
987 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x64_32);
988 return true;
989 }
990
991 /* Return TRUE if the TLS access code sequence support transition
992 from R_TYPE. */
993
994 static bool
995 elf_x86_64_check_tls_transition (bfd *abfd,
996 struct bfd_link_info *info,
997 asection *sec,
998 bfd_byte *contents,
999 Elf_Internal_Shdr *symtab_hdr,
1000 struct elf_link_hash_entry **sym_hashes,
1001 unsigned int r_type,
1002 const Elf_Internal_Rela *rel,
1003 const Elf_Internal_Rela *relend)
1004 {
1005 unsigned int val;
1006 unsigned long r_symndx;
1007 bool largepic = false;
1008 struct elf_link_hash_entry *h;
1009 bfd_vma offset;
1010 struct elf_x86_link_hash_table *htab;
1011 bfd_byte *call;
1012 bool indirect_call;
1013
1014 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
1015 offset = rel->r_offset;
1016 switch (r_type)
1017 {
1018 case R_X86_64_TLSGD:
1019 case R_X86_64_TLSLD:
1020 if ((rel + 1) >= relend)
1021 return false;
1022
1023 if (r_type == R_X86_64_TLSGD)
1024 {
1025 /* Check transition from GD access model. For 64bit, only
1026 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
1027 .word 0x6666; rex64; call __tls_get_addr@PLT
1028 or
1029 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
1030 .byte 0x66; rex64
1031 call *__tls_get_addr@GOTPCREL(%rip)
1032 which may be converted to
1033 addr32 call __tls_get_addr
1034 can transit to different access model. For 32bit, only
1035 leaq foo@tlsgd(%rip), %rdi
1036 .word 0x6666; rex64; call __tls_get_addr@PLT
1037 or
1038 leaq foo@tlsgd(%rip), %rdi
1039 .byte 0x66; rex64
1040 call *__tls_get_addr@GOTPCREL(%rip)
1041 which may be converted to
1042 addr32 call __tls_get_addr
1043 can transit to different access model. For largepic,
1044 we also support:
1045 leaq foo@tlsgd(%rip), %rdi
1046 movabsq $__tls_get_addr@pltoff, %rax
1047 addq $r15, %rax
1048 call *%rax
1049 or
1050 leaq foo@tlsgd(%rip), %rdi
1051 movabsq $__tls_get_addr@pltoff, %rax
1052 addq $rbx, %rax
1053 call *%rax */
1054
1055 static const unsigned char leaq[] = { 0x66, 0x48, 0x8d, 0x3d };
1056
1057 if ((offset + 12) > sec->size)
1058 return false;
1059
1060 call = contents + offset + 4;
1061 if (call[0] != 0x66
1062 || !((call[1] == 0x48
1063 && call[2] == 0xff
1064 && call[3] == 0x15)
1065 || (call[1] == 0x48
1066 && call[2] == 0x67
1067 && call[3] == 0xe8)
1068 || (call[1] == 0x66
1069 && call[2] == 0x48
1070 && call[3] == 0xe8)))
1071 {
1072 if (!ABI_64_P (abfd)
1073 || (offset + 19) > sec->size
1074 || offset < 3
1075 || memcmp (call - 7, leaq + 1, 3) != 0
1076 || memcmp (call, "\x48\xb8", 2) != 0
1077 || call[11] != 0x01
1078 || call[13] != 0xff
1079 || call[14] != 0xd0
1080 || !((call[10] == 0x48 && call[12] == 0xd8)
1081 || (call[10] == 0x4c && call[12] == 0xf8)))
1082 return false;
1083 largepic = true;
1084 }
1085 else if (ABI_64_P (abfd))
1086 {
1087 if (offset < 4
1088 || memcmp (contents + offset - 4, leaq, 4) != 0)
1089 return false;
1090 }
1091 else
1092 {
1093 if (offset < 3
1094 || memcmp (contents + offset - 3, leaq + 1, 3) != 0)
1095 return false;
1096 }
1097 indirect_call = call[2] == 0xff;
1098 }
1099 else
1100 {
1101 /* Check transition from LD access model. Only
1102 leaq foo@tlsld(%rip), %rdi;
1103 call __tls_get_addr@PLT
1104 or
1105 leaq foo@tlsld(%rip), %rdi;
1106 call *__tls_get_addr@GOTPCREL(%rip)
1107 which may be converted to
1108 addr32 call __tls_get_addr
1109 can transit to different access model. For largepic
1110 we also support:
1111 leaq foo@tlsld(%rip), %rdi
1112 movabsq $__tls_get_addr@pltoff, %rax
1113 addq $r15, %rax
1114 call *%rax
1115 or
1116 leaq foo@tlsld(%rip), %rdi
1117 movabsq $__tls_get_addr@pltoff, %rax
1118 addq $rbx, %rax
1119 call *%rax */
1120
1121 static const unsigned char lea[] = { 0x48, 0x8d, 0x3d };
1122
1123 if (offset < 3 || (offset + 9) > sec->size)
1124 return false;
1125
1126 if (memcmp (contents + offset - 3, lea, 3) != 0)
1127 return false;
1128
1129 call = contents + offset + 4;
1130 if (!(call[0] == 0xe8
1131 || (call[0] == 0xff && call[1] == 0x15)
1132 || (call[0] == 0x67 && call[1] == 0xe8)))
1133 {
1134 if (!ABI_64_P (abfd)
1135 || (offset + 19) > sec->size
1136 || memcmp (call, "\x48\xb8", 2) != 0
1137 || call[11] != 0x01
1138 || call[13] != 0xff
1139 || call[14] != 0xd0
1140 || !((call[10] == 0x48 && call[12] == 0xd8)
1141 || (call[10] == 0x4c && call[12] == 0xf8)))
1142 return false;
1143 largepic = true;
1144 }
1145 indirect_call = call[0] == 0xff;
1146 }
1147
1148 r_symndx = htab->r_sym (rel[1].r_info);
1149 if (r_symndx < symtab_hdr->sh_info)
1150 return false;
1151
1152 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1153 if (h == NULL
1154 || !((struct elf_x86_link_hash_entry *) h)->tls_get_addr)
1155 return false;
1156 else
1157 {
1158 r_type = (ELF32_R_TYPE (rel[1].r_info)
1159 & ~R_X86_64_converted_reloc_bit);
1160 if (largepic)
1161 return r_type == R_X86_64_PLTOFF64;
1162 else if (indirect_call)
1163 return r_type == R_X86_64_GOTPCRELX;
1164 else
1165 return (r_type == R_X86_64_PC32 || r_type == R_X86_64_PLT32);
1166 }
1167
1168 case R_X86_64_GOTTPOFF:
1169 /* Check transition from IE access model:
1170 mov foo@gottpoff(%rip), %reg
1171 add foo@gottpoff(%rip), %reg
1172 */
1173
1174 /* Check REX prefix first. */
1175 if (offset >= 3 && (offset + 4) <= sec->size)
1176 {
1177 val = bfd_get_8 (abfd, contents + offset - 3);
1178 if (val != 0x48 && val != 0x4c)
1179 {
1180 /* X32 may have 0x44 REX prefix or no REX prefix. */
1181 if (ABI_64_P (abfd))
1182 return false;
1183 }
1184 }
1185 else
1186 {
1187 /* X32 may not have any REX prefix. */
1188 if (ABI_64_P (abfd))
1189 return false;
1190 if (offset < 2 || (offset + 3) > sec->size)
1191 return false;
1192 }
1193
1194 val = bfd_get_8 (abfd, contents + offset - 2);
1195 if (val != 0x8b && val != 0x03)
1196 return false;
1197
1198 val = bfd_get_8 (abfd, contents + offset - 1);
1199 return (val & 0xc7) == 5;
1200
1201 case R_X86_64_GOTPC32_TLSDESC:
1202 /* Check transition from GDesc access model:
1203 leaq x@tlsdesc(%rip), %rax <--- LP64 mode.
1204 rex leal x@tlsdesc(%rip), %eax <--- X32 mode.
1205
1206 Make sure it's a leaq adding rip to a 32-bit offset
1207 into any register, although it's probably almost always
1208 going to be rax. */
1209
1210 if (offset < 3 || (offset + 4) > sec->size)
1211 return false;
1212
1213 val = bfd_get_8 (abfd, contents + offset - 3);
1214 val &= 0xfb;
1215 if (val != 0x48 && (ABI_64_P (abfd) || val != 0x40))
1216 return false;
1217
1218 if (bfd_get_8 (abfd, contents + offset - 2) != 0x8d)
1219 return false;
1220
1221 val = bfd_get_8 (abfd, contents + offset - 1);
1222 return (val & 0xc7) == 0x05;
1223
1224 case R_X86_64_TLSDESC_CALL:
1225 /* Check transition from GDesc access model:
1226 call *x@tlsdesc(%rax) <--- LP64 mode.
1227 call *x@tlsdesc(%eax) <--- X32 mode.
1228 */
1229 if (offset + 2 <= sec->size)
1230 {
1231 unsigned int prefix;
1232 call = contents + offset;
1233 prefix = 0;
1234 if (!ABI_64_P (abfd))
1235 {
1236 /* Check for call *x@tlsdesc(%eax). */
1237 if (call[0] == 0x67)
1238 {
1239 prefix = 1;
1240 if (offset + 3 > sec->size)
1241 return false;
1242 }
1243 }
1244 /* Make sure that it's a call *x@tlsdesc(%rax). */
1245 return call[prefix] == 0xff && call[1 + prefix] == 0x10;
1246 }
1247
1248 return false;
1249
1250 default:
1251 abort ();
1252 }
1253 }
1254
1255 /* Return TRUE if the TLS access transition is OK or no transition
1256 will be performed. Update R_TYPE if there is a transition. */
1257
1258 static bool
1259 elf_x86_64_tls_transition (struct bfd_link_info *info, bfd *abfd,
1260 asection *sec, bfd_byte *contents,
1261 Elf_Internal_Shdr *symtab_hdr,
1262 struct elf_link_hash_entry **sym_hashes,
1263 unsigned int *r_type, int tls_type,
1264 const Elf_Internal_Rela *rel,
1265 const Elf_Internal_Rela *relend,
1266 struct elf_link_hash_entry *h,
1267 unsigned long r_symndx,
1268 bool from_relocate_section)
1269 {
1270 unsigned int from_type = *r_type;
1271 unsigned int to_type = from_type;
1272 bool check = true;
1273
1274 /* Skip TLS transition for functions. */
1275 if (h != NULL
1276 && (h->type == STT_FUNC
1277 || h->type == STT_GNU_IFUNC))
1278 return true;
1279
1280 switch (from_type)
1281 {
1282 case R_X86_64_TLSGD:
1283 case R_X86_64_GOTPC32_TLSDESC:
1284 case R_X86_64_TLSDESC_CALL:
1285 case R_X86_64_GOTTPOFF:
1286 if (bfd_link_executable (info))
1287 {
1288 if (h == NULL)
1289 to_type = R_X86_64_TPOFF32;
1290 else
1291 to_type = R_X86_64_GOTTPOFF;
1292 }
1293
1294 /* When we are called from elf_x86_64_relocate_section, there may
1295 be additional transitions based on TLS_TYPE. */
1296 if (from_relocate_section)
1297 {
1298 unsigned int new_to_type = to_type;
1299
1300 if (TLS_TRANSITION_IE_TO_LE_P (info, h, tls_type))
1301 new_to_type = R_X86_64_TPOFF32;
1302
1303 if (to_type == R_X86_64_TLSGD
1304 || to_type == R_X86_64_GOTPC32_TLSDESC
1305 || to_type == R_X86_64_TLSDESC_CALL)
1306 {
1307 if (tls_type == GOT_TLS_IE)
1308 new_to_type = R_X86_64_GOTTPOFF;
1309 }
1310
1311 /* We checked the transition before when we were called from
1312 elf_x86_64_scan_relocs. We only want to check the new
1313 transition which hasn't been checked before. */
1314 check = new_to_type != to_type && from_type == to_type;
1315 to_type = new_to_type;
1316 }
1317
1318 break;
1319
1320 case R_X86_64_TLSLD:
1321 if (bfd_link_executable (info))
1322 to_type = R_X86_64_TPOFF32;
1323 break;
1324
1325 default:
1326 return true;
1327 }
1328
1329 /* Return TRUE if there is no transition. */
1330 if (from_type == to_type)
1331 return true;
1332
1333 /* Check if the transition can be performed. */
1334 if (check
1335 && ! elf_x86_64_check_tls_transition (abfd, info, sec, contents,
1336 symtab_hdr, sym_hashes,
1337 from_type, rel, relend))
1338 {
1339 reloc_howto_type *from, *to;
1340 const char *name;
1341
1342 from = elf_x86_64_rtype_to_howto (abfd, from_type);
1343 to = elf_x86_64_rtype_to_howto (abfd, to_type);
1344
1345 if (from == NULL || to == NULL)
1346 return false;
1347
1348 if (h)
1349 name = h->root.root.string;
1350 else
1351 {
1352 struct elf_x86_link_hash_table *htab;
1353
1354 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
1355 if (htab == NULL)
1356 name = "*unknown*";
1357 else
1358 {
1359 Elf_Internal_Sym *isym;
1360
1361 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1362 abfd, r_symndx);
1363 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
1364 }
1365 }
1366
1367 _bfd_error_handler
1368 /* xgettext:c-format */
1369 (_("%pB: TLS transition from %s to %s against `%s' at %#" PRIx64
1370 " in section `%pA' failed"),
1371 abfd, from->name, to->name, name, (uint64_t) rel->r_offset, sec);
1372 bfd_set_error (bfd_error_bad_value);
1373 return false;
1374 }
1375
1376 *r_type = to_type;
1377 return true;
1378 }
1379
1380 static bool
1381 elf_x86_64_need_pic (struct bfd_link_info *info,
1382 bfd *input_bfd, asection *sec,
1383 struct elf_link_hash_entry *h,
1384 Elf_Internal_Shdr *symtab_hdr,
1385 Elf_Internal_Sym *isym,
1386 reloc_howto_type *howto)
1387 {
1388 const char *v = "";
1389 const char *und = "";
1390 const char *pic = "";
1391 const char *object;
1392
1393 const char *name;
1394 if (h)
1395 {
1396 name = h->root.root.string;
1397 switch (ELF_ST_VISIBILITY (h->other))
1398 {
1399 case STV_HIDDEN:
1400 v = _("hidden symbol ");
1401 break;
1402 case STV_INTERNAL:
1403 v = _("internal symbol ");
1404 break;
1405 case STV_PROTECTED:
1406 v = _("protected symbol ");
1407 break;
1408 default:
1409 if (((struct elf_x86_link_hash_entry *) h)->def_protected)
1410 v = _("protected symbol ");
1411 else
1412 v = _("symbol ");
1413 pic = NULL;
1414 break;
1415 }
1416
1417 if (!SYMBOL_DEFINED_NON_SHARED_P (h) && !h->def_dynamic)
1418 und = _("undefined ");
1419 }
1420 else
1421 {
1422 name = bfd_elf_sym_name (input_bfd, symtab_hdr, isym, NULL);
1423 pic = NULL;
1424 }
1425
1426 if (bfd_link_dll (info))
1427 {
1428 object = _("a shared object");
1429 if (!pic)
1430 pic = _("; recompile with -fPIC");
1431 }
1432 else
1433 {
1434 if (bfd_link_pie (info))
1435 object = _("a PIE object");
1436 else
1437 object = _("a PDE object");
1438 if (!pic)
1439 pic = _("; recompile with -fPIE");
1440 }
1441
1442 /* xgettext:c-format */
1443 _bfd_error_handler (_("%pB: relocation %s against %s%s`%s' can "
1444 "not be used when making %s%s"),
1445 input_bfd, howto->name, und, v, name,
1446 object, pic);
1447 bfd_set_error (bfd_error_bad_value);
1448 sec->check_relocs_failed = 1;
1449 return false;
1450 }
1451
1452 /* With the local symbol, foo, we convert
1453 mov foo@GOTPCREL(%rip), %reg
1454 to
1455 lea foo(%rip), %reg
1456 and convert
1457 call/jmp *foo@GOTPCREL(%rip)
1458 to
1459 nop call foo/jmp foo nop
1460 When PIC is false, convert
1461 test %reg, foo@GOTPCREL(%rip)
1462 to
1463 test $foo, %reg
1464 and convert
1465 binop foo@GOTPCREL(%rip), %reg
1466 to
1467 binop $foo, %reg
1468 where binop is one of adc, add, and, cmp, or, sbb, sub, xor
1469 instructions. */
1470
1471 static bool
1472 elf_x86_64_convert_load_reloc (bfd *abfd,
1473 bfd_byte *contents,
1474 unsigned int *r_type_p,
1475 Elf_Internal_Rela *irel,
1476 struct elf_link_hash_entry *h,
1477 bool *converted,
1478 struct bfd_link_info *link_info)
1479 {
1480 struct elf_x86_link_hash_table *htab;
1481 bool is_pic;
1482 bool no_overflow;
1483 bool relocx;
1484 bool to_reloc_pc32;
1485 bool abs_symbol;
1486 bool local_ref;
1487 asection *tsec;
1488 bfd_signed_vma raddend;
1489 unsigned int opcode;
1490 unsigned int modrm;
1491 unsigned int r_type = *r_type_p;
1492 unsigned int r_symndx;
1493 bfd_vma roff = irel->r_offset;
1494 bfd_vma abs_relocation;
1495
1496 if (roff < (r_type == R_X86_64_REX_GOTPCRELX ? 3 : 2))
1497 return true;
1498
1499 raddend = irel->r_addend;
1500 /* Addend for 32-bit PC-relative relocation must be -4. */
1501 if (raddend != -4)
1502 return true;
1503
1504 htab = elf_x86_hash_table (link_info, X86_64_ELF_DATA);
1505 is_pic = bfd_link_pic (link_info);
1506
1507 relocx = (r_type == R_X86_64_GOTPCRELX
1508 || r_type == R_X86_64_REX_GOTPCRELX);
1509
1510 /* TRUE if --no-relax is used. */
1511 no_overflow = link_info->disable_target_specific_optimizations > 1;
1512
1513 r_symndx = htab->r_sym (irel->r_info);
1514
1515 opcode = bfd_get_8 (abfd, contents + roff - 2);
1516
1517 /* Convert mov to lea since it has been done for a while. */
1518 if (opcode != 0x8b)
1519 {
1520 /* Only convert R_X86_64_GOTPCRELX and R_X86_64_REX_GOTPCRELX
1521 for call, jmp or one of adc, add, and, cmp, or, sbb, sub,
1522 test, xor instructions. */
1523 if (!relocx)
1524 return true;
1525 }
1526
1527 /* We convert only to R_X86_64_PC32:
1528 1. Branch.
1529 2. R_X86_64_GOTPCREL since we can't modify REX byte.
1530 3. no_overflow is true.
1531 4. PIC.
1532 */
1533 to_reloc_pc32 = (opcode == 0xff
1534 || !relocx
1535 || no_overflow
1536 || is_pic);
1537
1538 abs_symbol = false;
1539 abs_relocation = 0;
1540
1541 /* Get the symbol referred to by the reloc. */
1542 if (h == NULL)
1543 {
1544 Elf_Internal_Sym *isym
1545 = bfd_sym_from_r_symndx (&htab->elf.sym_cache, abfd, r_symndx);
1546
1547 /* Skip relocation against undefined symbols. */
1548 if (isym->st_shndx == SHN_UNDEF)
1549 return true;
1550
1551 local_ref = true;
1552 if (isym->st_shndx == SHN_ABS)
1553 {
1554 tsec = bfd_abs_section_ptr;
1555 abs_symbol = true;
1556 abs_relocation = isym->st_value;
1557 }
1558 else if (isym->st_shndx == SHN_COMMON)
1559 tsec = bfd_com_section_ptr;
1560 else if (isym->st_shndx == SHN_X86_64_LCOMMON)
1561 tsec = &_bfd_elf_large_com_section;
1562 else
1563 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
1564 }
1565 else
1566 {
1567 /* Undefined weak symbol is only bound locally in executable
1568 and its reference is resolved as 0 without relocation
1569 overflow. We can only perform this optimization for
1570 GOTPCRELX relocations since we need to modify REX byte.
1571 It is OK convert mov with R_X86_64_GOTPCREL to
1572 R_X86_64_PC32. */
1573 struct elf_x86_link_hash_entry *eh = elf_x86_hash_entry (h);
1574
1575 abs_symbol = ABS_SYMBOL_P (h);
1576 abs_relocation = h->root.u.def.value;
1577
1578 /* NB: Also set linker_def via SYMBOL_REFERENCES_LOCAL_P. */
1579 local_ref = SYMBOL_REFERENCES_LOCAL_P (link_info, h);
1580 if ((relocx || opcode == 0x8b)
1581 && (h->root.type == bfd_link_hash_undefweak
1582 && !eh->linker_def
1583 && local_ref))
1584 {
1585 if (opcode == 0xff)
1586 {
1587 /* Skip for branch instructions since R_X86_64_PC32
1588 may overflow. */
1589 if (no_overflow)
1590 return true;
1591 }
1592 else if (relocx)
1593 {
1594 /* For non-branch instructions, we can convert to
1595 R_X86_64_32/R_X86_64_32S since we know if there
1596 is a REX byte. */
1597 to_reloc_pc32 = false;
1598 }
1599
1600 /* Since we don't know the current PC when PIC is true,
1601 we can't convert to R_X86_64_PC32. */
1602 if (to_reloc_pc32 && is_pic)
1603 return true;
1604
1605 goto convert;
1606 }
1607 /* Avoid optimizing GOTPCREL relocations againt _DYNAMIC since
1608 ld.so may use its link-time address. */
1609 else if (h->start_stop
1610 || eh->linker_def
1611 || ((h->def_regular
1612 || h->root.type == bfd_link_hash_defined
1613 || h->root.type == bfd_link_hash_defweak)
1614 && h != htab->elf.hdynamic
1615 && local_ref))
1616 {
1617 /* bfd_link_hash_new or bfd_link_hash_undefined is
1618 set by an assignment in a linker script in
1619 bfd_elf_record_link_assignment. start_stop is set
1620 on __start_SECNAME/__stop_SECNAME which mark section
1621 SECNAME. */
1622 if (h->start_stop
1623 || eh->linker_def
1624 || (h->def_regular
1625 && (h->root.type == bfd_link_hash_new
1626 || h->root.type == bfd_link_hash_undefined
1627 || ((h->root.type == bfd_link_hash_defined
1628 || h->root.type == bfd_link_hash_defweak)
1629 && h->root.u.def.section == bfd_und_section_ptr))))
1630 {
1631 /* Skip since R_X86_64_32/R_X86_64_32S may overflow. */
1632 if (no_overflow)
1633 return true;
1634 goto convert;
1635 }
1636 tsec = h->root.u.def.section;
1637 }
1638 else
1639 return true;
1640 }
1641
1642 /* Don't convert GOTPCREL relocation against large section. */
1643 if (elf_section_data (tsec) != NULL
1644 && (elf_section_flags (tsec) & SHF_X86_64_LARGE) != 0)
1645 return true;
1646
1647 /* Skip since R_X86_64_PC32/R_X86_64_32/R_X86_64_32S may overflow. */
1648 if (no_overflow)
1649 return true;
1650
1651 convert:
1652 if (opcode == 0xff)
1653 {
1654 /* We have "call/jmp *foo@GOTPCREL(%rip)". */
1655 unsigned int nop;
1656 unsigned int disp;
1657 bfd_vma nop_offset;
1658
1659 /* Convert R_X86_64_GOTPCRELX and R_X86_64_REX_GOTPCRELX to
1660 R_X86_64_PC32. */
1661 modrm = bfd_get_8 (abfd, contents + roff - 1);
1662 if (modrm == 0x25)
1663 {
1664 /* Convert to "jmp foo nop". */
1665 modrm = 0xe9;
1666 nop = NOP_OPCODE;
1667 nop_offset = irel->r_offset + 3;
1668 disp = bfd_get_32 (abfd, contents + irel->r_offset);
1669 irel->r_offset -= 1;
1670 bfd_put_32 (abfd, disp, contents + irel->r_offset);
1671 }
1672 else
1673 {
1674 struct elf_x86_link_hash_entry *eh
1675 = (struct elf_x86_link_hash_entry *) h;
1676
1677 /* Convert to "nop call foo". ADDR_PREFIX_OPCODE
1678 is a nop prefix. */
1679 modrm = 0xe8;
1680 /* To support TLS optimization, always use addr32 prefix for
1681 "call *__tls_get_addr@GOTPCREL(%rip)". */
1682 if (eh && eh->tls_get_addr)
1683 {
1684 nop = 0x67;
1685 nop_offset = irel->r_offset - 2;
1686 }
1687 else
1688 {
1689 nop = htab->params->call_nop_byte;
1690 if (htab->params->call_nop_as_suffix)
1691 {
1692 nop_offset = irel->r_offset + 3;
1693 disp = bfd_get_32 (abfd, contents + irel->r_offset);
1694 irel->r_offset -= 1;
1695 bfd_put_32 (abfd, disp, contents + irel->r_offset);
1696 }
1697 else
1698 nop_offset = irel->r_offset - 2;
1699 }
1700 }
1701 bfd_put_8 (abfd, nop, contents + nop_offset);
1702 bfd_put_8 (abfd, modrm, contents + irel->r_offset - 1);
1703 r_type = R_X86_64_PC32;
1704 }
1705 else
1706 {
1707 unsigned int rex;
1708 unsigned int rex_mask = REX_R;
1709
1710 if (r_type == R_X86_64_REX_GOTPCRELX)
1711 rex = bfd_get_8 (abfd, contents + roff - 3);
1712 else
1713 rex = 0;
1714
1715 if (opcode == 0x8b)
1716 {
1717 if (abs_symbol && local_ref && relocx)
1718 to_reloc_pc32 = false;
1719
1720 if (to_reloc_pc32)
1721 {
1722 /* Convert "mov foo@GOTPCREL(%rip), %reg" to
1723 "lea foo(%rip), %reg". */
1724 opcode = 0x8d;
1725 r_type = R_X86_64_PC32;
1726 }
1727 else
1728 {
1729 /* Convert "mov foo@GOTPCREL(%rip), %reg" to
1730 "mov $foo, %reg". */
1731 opcode = 0xc7;
1732 modrm = bfd_get_8 (abfd, contents + roff - 1);
1733 modrm = 0xc0 | (modrm & 0x38) >> 3;
1734 if ((rex & REX_W) != 0
1735 && ABI_64_P (link_info->output_bfd))
1736 {
1737 /* Keep the REX_W bit in REX byte for LP64. */
1738 r_type = R_X86_64_32S;
1739 goto rewrite_modrm_rex;
1740 }
1741 else
1742 {
1743 /* If the REX_W bit in REX byte isn't needed,
1744 use R_X86_64_32 and clear the W bit to avoid
1745 sign-extend imm32 to imm64. */
1746 r_type = R_X86_64_32;
1747 /* Clear the W bit in REX byte. */
1748 rex_mask |= REX_W;
1749 goto rewrite_modrm_rex;
1750 }
1751 }
1752 }
1753 else
1754 {
1755 /* R_X86_64_PC32 isn't supported. */
1756 if (to_reloc_pc32)
1757 return true;
1758
1759 modrm = bfd_get_8 (abfd, contents + roff - 1);
1760 if (opcode == 0x85)
1761 {
1762 /* Convert "test %reg, foo@GOTPCREL(%rip)" to
1763 "test $foo, %reg". */
1764 modrm = 0xc0 | (modrm & 0x38) >> 3;
1765 opcode = 0xf7;
1766 }
1767 else
1768 {
1769 /* Convert "binop foo@GOTPCREL(%rip), %reg" to
1770 "binop $foo, %reg". */
1771 modrm = 0xc0 | (modrm & 0x38) >> 3 | (opcode & 0x3c);
1772 opcode = 0x81;
1773 }
1774
1775 /* Use R_X86_64_32 with 32-bit operand to avoid relocation
1776 overflow when sign-extending imm32 to imm64. */
1777 r_type = (rex & REX_W) != 0 ? R_X86_64_32S : R_X86_64_32;
1778
1779 rewrite_modrm_rex:
1780 if (abs_relocation)
1781 {
1782 /* Check if R_X86_64_32S/R_X86_64_32 fits. */
1783 if (r_type == R_X86_64_32S)
1784 {
1785 if ((abs_relocation + 0x80000000) > 0xffffffff)
1786 return true;
1787 }
1788 else
1789 {
1790 if (abs_relocation > 0xffffffff)
1791 return true;
1792 }
1793 }
1794
1795 bfd_put_8 (abfd, modrm, contents + roff - 1);
1796
1797 if (rex)
1798 {
1799 /* Move the R bit to the B bit in REX byte. */
1800 rex = (rex & ~rex_mask) | (rex & REX_R) >> 2;
1801 bfd_put_8 (abfd, rex, contents + roff - 3);
1802 }
1803
1804 /* No addend for R_X86_64_32/R_X86_64_32S relocations. */
1805 irel->r_addend = 0;
1806 }
1807
1808 bfd_put_8 (abfd, opcode, contents + roff - 2);
1809 }
1810
1811 *r_type_p = r_type;
1812 irel->r_info = htab->r_info (r_symndx,
1813 r_type | R_X86_64_converted_reloc_bit);
1814
1815 *converted = true;
1816
1817 return true;
1818 }
1819
1820 /* Look through the relocs for a section during the first phase, and
1821 calculate needed space in the global offset table, and procedure
1822 linkage table. */
1823
1824 static bool
1825 elf_x86_64_scan_relocs (bfd *abfd, struct bfd_link_info *info,
1826 asection *sec,
1827 const Elf_Internal_Rela *relocs)
1828 {
1829 struct elf_x86_link_hash_table *htab;
1830 Elf_Internal_Shdr *symtab_hdr;
1831 struct elf_link_hash_entry **sym_hashes;
1832 const Elf_Internal_Rela *rel;
1833 const Elf_Internal_Rela *rel_end;
1834 bfd_byte *contents;
1835 bool converted;
1836
1837 if (bfd_link_relocatable (info))
1838 return true;
1839
1840 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
1841 if (htab == NULL)
1842 {
1843 sec->check_relocs_failed = 1;
1844 return false;
1845 }
1846
1847 BFD_ASSERT (is_x86_elf (abfd, htab));
1848
1849 /* Get the section contents. */
1850 if (elf_section_data (sec)->this_hdr.contents != NULL)
1851 contents = elf_section_data (sec)->this_hdr.contents;
1852 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
1853 {
1854 sec->check_relocs_failed = 1;
1855 return false;
1856 }
1857
1858 symtab_hdr = &elf_symtab_hdr (abfd);
1859 sym_hashes = elf_sym_hashes (abfd);
1860
1861 converted = false;
1862
1863 rel_end = relocs + sec->reloc_count;
1864 for (rel = relocs; rel < rel_end; rel++)
1865 {
1866 unsigned int r_type;
1867 unsigned int r_symndx;
1868 struct elf_link_hash_entry *h;
1869 struct elf_x86_link_hash_entry *eh;
1870 Elf_Internal_Sym *isym;
1871 const char *name;
1872 bool size_reloc;
1873 bool converted_reloc;
1874 bool no_dynreloc;
1875
1876 r_symndx = htab->r_sym (rel->r_info);
1877 r_type = ELF32_R_TYPE (rel->r_info);
1878
1879 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
1880 {
1881 /* xgettext:c-format */
1882 _bfd_error_handler (_("%pB: bad symbol index: %d"),
1883 abfd, r_symndx);
1884 goto error_return;
1885 }
1886
1887 if (r_symndx < symtab_hdr->sh_info)
1888 {
1889 /* A local symbol. */
1890 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1891 abfd, r_symndx);
1892 if (isym == NULL)
1893 goto error_return;
1894
1895 /* Check relocation against local STT_GNU_IFUNC symbol. */
1896 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1897 {
1898 h = _bfd_elf_x86_get_local_sym_hash (htab, abfd, rel,
1899 true);
1900 if (h == NULL)
1901 goto error_return;
1902
1903 /* Fake a STT_GNU_IFUNC symbol. */
1904 h->root.root.string = bfd_elf_sym_name (abfd, symtab_hdr,
1905 isym, NULL);
1906 h->type = STT_GNU_IFUNC;
1907 h->def_regular = 1;
1908 h->ref_regular = 1;
1909 h->forced_local = 1;
1910 h->root.type = bfd_link_hash_defined;
1911 }
1912 else
1913 h = NULL;
1914 }
1915 else
1916 {
1917 isym = NULL;
1918 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1919 while (h->root.type == bfd_link_hash_indirect
1920 || h->root.type == bfd_link_hash_warning)
1921 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1922 }
1923
1924 /* Check invalid x32 relocations. */
1925 if (!ABI_64_P (abfd))
1926 switch (r_type)
1927 {
1928 default:
1929 break;
1930
1931 case R_X86_64_DTPOFF64:
1932 case R_X86_64_TPOFF64:
1933 case R_X86_64_PC64:
1934 case R_X86_64_GOTOFF64:
1935 case R_X86_64_GOT64:
1936 case R_X86_64_GOTPCREL64:
1937 case R_X86_64_GOTPC64:
1938 case R_X86_64_GOTPLT64:
1939 case R_X86_64_PLTOFF64:
1940 {
1941 if (h)
1942 name = h->root.root.string;
1943 else
1944 name = bfd_elf_sym_name (abfd, symtab_hdr, isym,
1945 NULL);
1946 _bfd_error_handler
1947 /* xgettext:c-format */
1948 (_("%pB: relocation %s against symbol `%s' isn't "
1949 "supported in x32 mode"), abfd,
1950 x86_64_elf_howto_table[r_type].name, name);
1951 bfd_set_error (bfd_error_bad_value);
1952 goto error_return;
1953 }
1954 break;
1955 }
1956
1957 eh = (struct elf_x86_link_hash_entry *) h;
1958
1959 if (h != NULL)
1960 {
1961 /* It is referenced by a non-shared object. */
1962 h->ref_regular = 1;
1963 }
1964
1965 converted_reloc = false;
1966 if ((r_type == R_X86_64_GOTPCREL
1967 || r_type == R_X86_64_GOTPCRELX
1968 || r_type == R_X86_64_REX_GOTPCRELX)
1969 && (h == NULL || h->type != STT_GNU_IFUNC))
1970 {
1971 Elf_Internal_Rela *irel = (Elf_Internal_Rela *) rel;
1972 if (!elf_x86_64_convert_load_reloc (abfd, contents, &r_type,
1973 irel, h, &converted_reloc,
1974 info))
1975 goto error_return;
1976
1977 if (converted_reloc)
1978 converted = true;
1979 }
1980
1981 if (!_bfd_elf_x86_valid_reloc_p (sec, info, htab, rel, h, isym,
1982 symtab_hdr, &no_dynreloc))
1983 return false;
1984
1985 if (! elf_x86_64_tls_transition (info, abfd, sec, contents,
1986 symtab_hdr, sym_hashes,
1987 &r_type, GOT_UNKNOWN,
1988 rel, rel_end, h, r_symndx, false))
1989 goto error_return;
1990
1991 /* Check if _GLOBAL_OFFSET_TABLE_ is referenced. */
1992 if (h == htab->elf.hgot)
1993 htab->got_referenced = true;
1994
1995 switch (r_type)
1996 {
1997 case R_X86_64_TLSLD:
1998 htab->tls_ld_or_ldm_got.refcount = 1;
1999 goto create_got;
2000
2001 case R_X86_64_TPOFF32:
2002 if (!bfd_link_executable (info) && ABI_64_P (abfd))
2003 return elf_x86_64_need_pic (info, abfd, sec, h, symtab_hdr, isym,
2004 &x86_64_elf_howto_table[r_type]);
2005 if (eh != NULL)
2006 eh->zero_undefweak &= 0x2;
2007 break;
2008
2009 case R_X86_64_GOTTPOFF:
2010 if (!bfd_link_executable (info))
2011 info->flags |= DF_STATIC_TLS;
2012 /* Fall through */
2013
2014 case R_X86_64_GOT32:
2015 case R_X86_64_GOTPCREL:
2016 case R_X86_64_GOTPCRELX:
2017 case R_X86_64_REX_GOTPCRELX:
2018 case R_X86_64_TLSGD:
2019 case R_X86_64_GOT64:
2020 case R_X86_64_GOTPCREL64:
2021 case R_X86_64_GOTPLT64:
2022 case R_X86_64_GOTPC32_TLSDESC:
2023 case R_X86_64_TLSDESC_CALL:
2024 /* This symbol requires a global offset table entry. */
2025 {
2026 int tls_type, old_tls_type;
2027
2028 switch (r_type)
2029 {
2030 default:
2031 tls_type = GOT_NORMAL;
2032 if (h)
2033 {
2034 if (ABS_SYMBOL_P (h))
2035 tls_type = GOT_ABS;
2036 }
2037 else if (isym->st_shndx == SHN_ABS)
2038 tls_type = GOT_ABS;
2039 break;
2040 case R_X86_64_TLSGD:
2041 tls_type = GOT_TLS_GD;
2042 break;
2043 case R_X86_64_GOTTPOFF:
2044 tls_type = GOT_TLS_IE;
2045 break;
2046 case R_X86_64_GOTPC32_TLSDESC:
2047 case R_X86_64_TLSDESC_CALL:
2048 tls_type = GOT_TLS_GDESC;
2049 break;
2050 }
2051
2052 if (h != NULL)
2053 {
2054 h->got.refcount = 1;
2055 old_tls_type = eh->tls_type;
2056 }
2057 else
2058 {
2059 bfd_signed_vma *local_got_refcounts;
2060
2061 if (!elf_x86_allocate_local_got_info (abfd,
2062 symtab_hdr->sh_info))
2063 goto error_return;
2064
2065 /* This is a global offset table entry for a local symbol. */
2066 local_got_refcounts = elf_local_got_refcounts (abfd);
2067 local_got_refcounts[r_symndx] = 1;
2068 old_tls_type
2069 = elf_x86_local_got_tls_type (abfd) [r_symndx];
2070 }
2071
2072 /* If a TLS symbol is accessed using IE at least once,
2073 there is no point to use dynamic model for it. */
2074 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
2075 && (! GOT_TLS_GD_ANY_P (old_tls_type)
2076 || tls_type != GOT_TLS_IE))
2077 {
2078 if (old_tls_type == GOT_TLS_IE && GOT_TLS_GD_ANY_P (tls_type))
2079 tls_type = old_tls_type;
2080 else if (GOT_TLS_GD_ANY_P (old_tls_type)
2081 && GOT_TLS_GD_ANY_P (tls_type))
2082 tls_type |= old_tls_type;
2083 else
2084 {
2085 if (h)
2086 name = h->root.root.string;
2087 else
2088 name = bfd_elf_sym_name (abfd, symtab_hdr,
2089 isym, NULL);
2090 _bfd_error_handler
2091 /* xgettext:c-format */
2092 (_("%pB: '%s' accessed both as normal and"
2093 " thread local symbol"),
2094 abfd, name);
2095 bfd_set_error (bfd_error_bad_value);
2096 goto error_return;
2097 }
2098 }
2099
2100 if (old_tls_type != tls_type)
2101 {
2102 if (eh != NULL)
2103 eh->tls_type = tls_type;
2104 else
2105 elf_x86_local_got_tls_type (abfd) [r_symndx] = tls_type;
2106 }
2107 }
2108 /* Fall through */
2109
2110 case R_X86_64_GOTOFF64:
2111 case R_X86_64_GOTPC32:
2112 case R_X86_64_GOTPC64:
2113 create_got:
2114 if (eh != NULL)
2115 eh->zero_undefweak &= 0x2;
2116 break;
2117
2118 case R_X86_64_PLT32:
2119 case R_X86_64_PLT32_BND:
2120 /* This symbol requires a procedure linkage table entry. We
2121 actually build the entry in adjust_dynamic_symbol,
2122 because this might be a case of linking PIC code which is
2123 never referenced by a dynamic object, in which case we
2124 don't need to generate a procedure linkage table entry
2125 after all. */
2126
2127 /* If this is a local symbol, we resolve it directly without
2128 creating a procedure linkage table entry. */
2129 if (h == NULL)
2130 continue;
2131
2132 eh->zero_undefweak &= 0x2;
2133 h->needs_plt = 1;
2134 h->plt.refcount = 1;
2135 break;
2136
2137 case R_X86_64_PLTOFF64:
2138 /* This tries to form the 'address' of a function relative
2139 to GOT. For global symbols we need a PLT entry. */
2140 if (h != NULL)
2141 {
2142 h->needs_plt = 1;
2143 h->plt.refcount = 1;
2144 }
2145 goto create_got;
2146
2147 case R_X86_64_SIZE32:
2148 case R_X86_64_SIZE64:
2149 size_reloc = true;
2150 goto do_size;
2151
2152 case R_X86_64_32:
2153 if (!ABI_64_P (abfd))
2154 goto pointer;
2155 /* Fall through. */
2156 case R_X86_64_8:
2157 case R_X86_64_16:
2158 case R_X86_64_32S:
2159 /* Check relocation overflow as these relocs may lead to
2160 run-time relocation overflow. Don't error out for
2161 sections we don't care about, such as debug sections or
2162 when relocation overflow check is disabled. */
2163 if (!htab->params->no_reloc_overflow_check
2164 && !converted_reloc
2165 && (bfd_link_pic (info)
2166 || (bfd_link_executable (info)
2167 && h != NULL
2168 && !h->def_regular
2169 && h->def_dynamic
2170 && (sec->flags & SEC_READONLY) == 0)))
2171 return elf_x86_64_need_pic (info, abfd, sec, h, symtab_hdr, isym,
2172 &x86_64_elf_howto_table[r_type]);
2173 /* Fall through. */
2174
2175 case R_X86_64_PC8:
2176 case R_X86_64_PC16:
2177 case R_X86_64_PC32:
2178 case R_X86_64_PC32_BND:
2179 case R_X86_64_PC64:
2180 case R_X86_64_64:
2181 pointer:
2182 if (eh != NULL && (sec->flags & SEC_CODE) != 0)
2183 eh->zero_undefweak |= 0x2;
2184 /* We are called after all symbols have been resolved. Only
2185 relocation against STT_GNU_IFUNC symbol must go through
2186 PLT. */
2187 if (h != NULL
2188 && (bfd_link_executable (info)
2189 || h->type == STT_GNU_IFUNC))
2190 {
2191 bool func_pointer_ref = false;
2192
2193 if (r_type == R_X86_64_PC32)
2194 {
2195 /* Since something like ".long foo - ." may be used
2196 as pointer, make sure that PLT is used if foo is
2197 a function defined in a shared library. */
2198 if ((sec->flags & SEC_CODE) == 0)
2199 {
2200 h->pointer_equality_needed = 1;
2201 if (bfd_link_pie (info)
2202 && h->type == STT_FUNC
2203 && !h->def_regular
2204 && h->def_dynamic)
2205 {
2206 h->needs_plt = 1;
2207 h->plt.refcount = 1;
2208 }
2209 }
2210 }
2211 else if (r_type != R_X86_64_PC32_BND
2212 && r_type != R_X86_64_PC64)
2213 {
2214 h->pointer_equality_needed = 1;
2215 /* At run-time, R_X86_64_64 can be resolved for both
2216 x86-64 and x32. But R_X86_64_32 and R_X86_64_32S
2217 can only be resolved for x32. */
2218 if ((sec->flags & SEC_READONLY) == 0
2219 && (r_type == R_X86_64_64
2220 || (!ABI_64_P (abfd)
2221 && (r_type == R_X86_64_32
2222 || r_type == R_X86_64_32S))))
2223 func_pointer_ref = true;
2224 }
2225
2226 if (h->pointer_equality_needed
2227 && h->type == STT_FUNC
2228 && eh->def_protected
2229 && elf_has_indirect_extern_access (h->root.u.def.section->owner))
2230 {
2231 /* Disallow non-canonical reference to canonical
2232 protected function. */
2233 _bfd_error_handler
2234 /* xgettext:c-format */
2235 (_("%pB: non-canonical reference to canonical "
2236 "protected function `%s' in %pB"),
2237 abfd, h->root.root.string,
2238 h->root.u.def.section->owner);
2239 bfd_set_error (bfd_error_bad_value);
2240 goto error_return;
2241 }
2242
2243 if (!func_pointer_ref)
2244 {
2245 /* If this reloc is in a read-only section, we might
2246 need a copy reloc. We can't check reliably at this
2247 stage whether the section is read-only, as input
2248 sections have not yet been mapped to output sections.
2249 Tentatively set the flag for now, and correct in
2250 adjust_dynamic_symbol. */
2251 h->non_got_ref = 1;
2252
2253 if (!elf_has_indirect_extern_access (sec->owner))
2254 eh->non_got_ref_without_indirect_extern_access = 1;
2255
2256 /* We may need a .plt entry if the symbol is a function
2257 defined in a shared lib or is a function referenced
2258 from the code or read-only section. */
2259 if (!h->def_regular
2260 || (sec->flags & (SEC_CODE | SEC_READONLY)) != 0)
2261 h->plt.refcount = 1;
2262 }
2263 }
2264
2265 size_reloc = false;
2266 do_size:
2267 if (!no_dynreloc
2268 && NEED_DYNAMIC_RELOCATION_P (true, info, true, h, sec,
2269 r_type,
2270 htab->pointer_r_type))
2271 {
2272 struct elf_dyn_relocs *p;
2273 struct elf_dyn_relocs **head;
2274
2275 /* If this is a global symbol, we count the number of
2276 relocations we need for this symbol. */
2277 if (h != NULL)
2278 head = &h->dyn_relocs;
2279 else
2280 {
2281 /* Track dynamic relocs needed for local syms too.
2282 We really need local syms available to do this
2283 easily. Oh well. */
2284 asection *s;
2285 void **vpp;
2286
2287 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
2288 abfd, r_symndx);
2289 if (isym == NULL)
2290 goto error_return;
2291
2292 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
2293 if (s == NULL)
2294 s = sec;
2295
2296 /* Beware of type punned pointers vs strict aliasing
2297 rules. */
2298 vpp = &(elf_section_data (s)->local_dynrel);
2299 head = (struct elf_dyn_relocs **)vpp;
2300 }
2301
2302 p = *head;
2303 if (p == NULL || p->sec != sec)
2304 {
2305 size_t amt = sizeof *p;
2306
2307 p = ((struct elf_dyn_relocs *)
2308 bfd_alloc (htab->elf.dynobj, amt));
2309 if (p == NULL)
2310 goto error_return;
2311 p->next = *head;
2312 *head = p;
2313 p->sec = sec;
2314 p->count = 0;
2315 p->pc_count = 0;
2316 }
2317
2318 p->count += 1;
2319 /* Count size relocation as PC-relative relocation. */
2320 if (X86_PCREL_TYPE_P (true, r_type) || size_reloc)
2321 p->pc_count += 1;
2322 }
2323 break;
2324
2325 /* This relocation describes the C++ object vtable hierarchy.
2326 Reconstruct it for later use during GC. */
2327 case R_X86_64_GNU_VTINHERIT:
2328 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
2329 goto error_return;
2330 break;
2331
2332 /* This relocation describes which C++ vtable entries are actually
2333 used. Record for later use during GC. */
2334 case R_X86_64_GNU_VTENTRY:
2335 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
2336 goto error_return;
2337 break;
2338
2339 default:
2340 break;
2341 }
2342 }
2343
2344 if (elf_section_data (sec)->this_hdr.contents != contents)
2345 {
2346 if (!converted && !_bfd_link_keep_memory (info))
2347 free (contents);
2348 else
2349 {
2350 /* Cache the section contents for elf_link_input_bfd if any
2351 load is converted or --no-keep-memory isn't used. */
2352 elf_section_data (sec)->this_hdr.contents = contents;
2353 info->cache_size += sec->size;
2354 }
2355 }
2356
2357 /* Cache relocations if any load is converted. */
2358 if (elf_section_data (sec)->relocs != relocs && converted)
2359 elf_section_data (sec)->relocs = (Elf_Internal_Rela *) relocs;
2360
2361 return true;
2362
2363 error_return:
2364 if (elf_section_data (sec)->this_hdr.contents != contents)
2365 free (contents);
2366 sec->check_relocs_failed = 1;
2367 return false;
2368 }
2369
2370 static bool
2371 elf_x86_64_always_size_sections (bfd *output_bfd,
2372 struct bfd_link_info *info)
2373 {
2374 bfd *abfd;
2375
2376 /* Scan relocations after rel_from_abs has been set on __ehdr_start. */
2377 for (abfd = info->input_bfds;
2378 abfd != (bfd *) NULL;
2379 abfd = abfd->link.next)
2380 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
2381 && !_bfd_elf_link_iterate_on_relocs (abfd, info,
2382 elf_x86_64_scan_relocs))
2383 return false;
2384
2385 return _bfd_x86_elf_always_size_sections (output_bfd, info);
2386 }
2387
2388 /* Return the relocation value for @tpoff relocation
2389 if STT_TLS virtual address is ADDRESS. */
2390
2391 static bfd_vma
2392 elf_x86_64_tpoff (struct bfd_link_info *info, bfd_vma address)
2393 {
2394 struct elf_link_hash_table *htab = elf_hash_table (info);
2395 const struct elf_backend_data *bed = get_elf_backend_data (info->output_bfd);
2396 bfd_vma static_tls_size;
2397
2398 /* If tls_segment is NULL, we should have signalled an error already. */
2399 if (htab->tls_sec == NULL)
2400 return 0;
2401
2402 /* Consider special static TLS alignment requirements. */
2403 static_tls_size = BFD_ALIGN (htab->tls_size, bed->static_tls_alignment);
2404 return address - static_tls_size - htab->tls_sec->vma;
2405 }
2406
2407 /* Relocate an x86_64 ELF section. */
2408
2409 static int
2410 elf_x86_64_relocate_section (bfd *output_bfd,
2411 struct bfd_link_info *info,
2412 bfd *input_bfd,
2413 asection *input_section,
2414 bfd_byte *contents,
2415 Elf_Internal_Rela *relocs,
2416 Elf_Internal_Sym *local_syms,
2417 asection **local_sections)
2418 {
2419 struct elf_x86_link_hash_table *htab;
2420 Elf_Internal_Shdr *symtab_hdr;
2421 struct elf_link_hash_entry **sym_hashes;
2422 bfd_vma *local_got_offsets;
2423 bfd_vma *local_tlsdesc_gotents;
2424 Elf_Internal_Rela *rel;
2425 Elf_Internal_Rela *wrel;
2426 Elf_Internal_Rela *relend;
2427 unsigned int plt_entry_size;
2428 bool status;
2429
2430 /* Skip if check_relocs or scan_relocs failed. */
2431 if (input_section->check_relocs_failed)
2432 return false;
2433
2434 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
2435 if (htab == NULL)
2436 return false;
2437
2438 if (!is_x86_elf (input_bfd, htab))
2439 {
2440 bfd_set_error (bfd_error_wrong_format);
2441 return false;
2442 }
2443
2444 plt_entry_size = htab->plt.plt_entry_size;
2445 symtab_hdr = &elf_symtab_hdr (input_bfd);
2446 sym_hashes = elf_sym_hashes (input_bfd);
2447 local_got_offsets = elf_local_got_offsets (input_bfd);
2448 local_tlsdesc_gotents = elf_x86_local_tlsdesc_gotent (input_bfd);
2449
2450 _bfd_x86_elf_set_tls_module_base (info);
2451
2452 status = true;
2453 rel = wrel = relocs;
2454 relend = relocs + input_section->reloc_count;
2455 for (; rel < relend; wrel++, rel++)
2456 {
2457 unsigned int r_type, r_type_tls;
2458 reloc_howto_type *howto;
2459 unsigned long r_symndx;
2460 struct elf_link_hash_entry *h;
2461 struct elf_x86_link_hash_entry *eh;
2462 Elf_Internal_Sym *sym;
2463 asection *sec;
2464 bfd_vma off, offplt, plt_offset;
2465 bfd_vma relocation;
2466 bool unresolved_reloc;
2467 bfd_reloc_status_type r;
2468 int tls_type;
2469 asection *base_got, *resolved_plt;
2470 bfd_vma st_size;
2471 bool resolved_to_zero;
2472 bool relative_reloc;
2473 bool converted_reloc;
2474 bool need_copy_reloc_in_pie;
2475 bool no_copyreloc_p;
2476
2477 r_type = ELF32_R_TYPE (rel->r_info);
2478 if (r_type == (int) R_X86_64_GNU_VTINHERIT
2479 || r_type == (int) R_X86_64_GNU_VTENTRY)
2480 {
2481 if (wrel != rel)
2482 *wrel = *rel;
2483 continue;
2484 }
2485
2486 r_symndx = htab->r_sym (rel->r_info);
2487 converted_reloc = (r_type & R_X86_64_converted_reloc_bit) != 0;
2488 if (converted_reloc)
2489 {
2490 r_type &= ~R_X86_64_converted_reloc_bit;
2491 rel->r_info = htab->r_info (r_symndx, r_type);
2492 }
2493
2494 howto = elf_x86_64_rtype_to_howto (input_bfd, r_type);
2495 if (howto == NULL)
2496 return _bfd_unrecognized_reloc (input_bfd, input_section, r_type);
2497
2498 h = NULL;
2499 sym = NULL;
2500 sec = NULL;
2501 unresolved_reloc = false;
2502 if (r_symndx < symtab_hdr->sh_info)
2503 {
2504 sym = local_syms + r_symndx;
2505 sec = local_sections[r_symndx];
2506
2507 relocation = _bfd_elf_rela_local_sym (output_bfd, sym,
2508 &sec, rel);
2509 st_size = sym->st_size;
2510
2511 /* Relocate against local STT_GNU_IFUNC symbol. */
2512 if (!bfd_link_relocatable (info)
2513 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2514 {
2515 h = _bfd_elf_x86_get_local_sym_hash (htab, input_bfd,
2516 rel, false);
2517 if (h == NULL)
2518 abort ();
2519
2520 /* Set STT_GNU_IFUNC symbol value. */
2521 h->root.u.def.value = sym->st_value;
2522 h->root.u.def.section = sec;
2523 }
2524 }
2525 else
2526 {
2527 bool warned ATTRIBUTE_UNUSED;
2528 bool ignored ATTRIBUTE_UNUSED;
2529
2530 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2531 r_symndx, symtab_hdr, sym_hashes,
2532 h, sec, relocation,
2533 unresolved_reloc, warned, ignored);
2534 st_size = h->size;
2535 }
2536
2537 if (sec != NULL && discarded_section (sec))
2538 {
2539 _bfd_clear_contents (howto, input_bfd, input_section,
2540 contents, rel->r_offset);
2541 wrel->r_offset = rel->r_offset;
2542 wrel->r_info = 0;
2543 wrel->r_addend = 0;
2544
2545 /* For ld -r, remove relocations in debug sections against
2546 sections defined in discarded sections. Not done for
2547 eh_frame editing code expects to be present. */
2548 if (bfd_link_relocatable (info)
2549 && (input_section->flags & SEC_DEBUGGING))
2550 wrel--;
2551
2552 continue;
2553 }
2554
2555 if (bfd_link_relocatable (info))
2556 {
2557 if (wrel != rel)
2558 *wrel = *rel;
2559 continue;
2560 }
2561
2562 if (rel->r_addend == 0 && !ABI_64_P (output_bfd))
2563 {
2564 if (r_type == R_X86_64_64)
2565 {
2566 /* For x32, treat R_X86_64_64 like R_X86_64_32 and
2567 zero-extend it to 64bit if addend is zero. */
2568 r_type = R_X86_64_32;
2569 memset (contents + rel->r_offset + 4, 0, 4);
2570 }
2571 else if (r_type == R_X86_64_SIZE64)
2572 {
2573 /* For x32, treat R_X86_64_SIZE64 like R_X86_64_SIZE32 and
2574 zero-extend it to 64bit if addend is zero. */
2575 r_type = R_X86_64_SIZE32;
2576 memset (contents + rel->r_offset + 4, 0, 4);
2577 }
2578 }
2579
2580 eh = (struct elf_x86_link_hash_entry *) h;
2581
2582 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle
2583 it here if it is defined in a non-shared object. */
2584 if (h != NULL
2585 && h->type == STT_GNU_IFUNC
2586 && h->def_regular)
2587 {
2588 bfd_vma plt_index;
2589 const char *name;
2590
2591 if ((input_section->flags & SEC_ALLOC) == 0)
2592 {
2593 /* If this is a SHT_NOTE section without SHF_ALLOC, treat
2594 STT_GNU_IFUNC symbol as STT_FUNC. */
2595 if (elf_section_type (input_section) == SHT_NOTE)
2596 goto skip_ifunc;
2597 /* Dynamic relocs are not propagated for SEC_DEBUGGING
2598 sections because such sections are not SEC_ALLOC and
2599 thus ld.so will not process them. */
2600 if ((input_section->flags & SEC_DEBUGGING) != 0)
2601 continue;
2602 abort ();
2603 }
2604
2605 switch (r_type)
2606 {
2607 default:
2608 break;
2609
2610 case R_X86_64_GOTPCREL:
2611 case R_X86_64_GOTPCRELX:
2612 case R_X86_64_REX_GOTPCRELX:
2613 case R_X86_64_GOTPCREL64:
2614 base_got = htab->elf.sgot;
2615 off = h->got.offset;
2616
2617 if (base_got == NULL)
2618 abort ();
2619
2620 if (off == (bfd_vma) -1)
2621 {
2622 /* We can't use h->got.offset here to save state, or
2623 even just remember the offset, as finish_dynamic_symbol
2624 would use that as offset into .got. */
2625
2626 if (h->plt.offset == (bfd_vma) -1)
2627 abort ();
2628
2629 if (htab->elf.splt != NULL)
2630 {
2631 plt_index = (h->plt.offset / plt_entry_size
2632 - htab->plt.has_plt0);
2633 off = (plt_index + 3) * GOT_ENTRY_SIZE;
2634 base_got = htab->elf.sgotplt;
2635 }
2636 else
2637 {
2638 plt_index = h->plt.offset / plt_entry_size;
2639 off = plt_index * GOT_ENTRY_SIZE;
2640 base_got = htab->elf.igotplt;
2641 }
2642
2643 if (h->dynindx == -1
2644 || h->forced_local
2645 || info->symbolic)
2646 {
2647 /* This references the local defitionion. We must
2648 initialize this entry in the global offset table.
2649 Since the offset must always be a multiple of 8,
2650 we use the least significant bit to record
2651 whether we have initialized it already.
2652
2653 When doing a dynamic link, we create a .rela.got
2654 relocation entry to initialize the value. This
2655 is done in the finish_dynamic_symbol routine. */
2656 if ((off & 1) != 0)
2657 off &= ~1;
2658 else
2659 {
2660 bfd_put_64 (output_bfd, relocation,
2661 base_got->contents + off);
2662 /* Note that this is harmless for the GOTPLT64
2663 case, as -1 | 1 still is -1. */
2664 h->got.offset |= 1;
2665 }
2666 }
2667 }
2668
2669 relocation = (base_got->output_section->vma
2670 + base_got->output_offset + off);
2671
2672 goto do_relocation;
2673 }
2674
2675 if (h->plt.offset == (bfd_vma) -1)
2676 {
2677 /* Handle static pointers of STT_GNU_IFUNC symbols. */
2678 if (r_type == htab->pointer_r_type
2679 && (input_section->flags & SEC_CODE) == 0)
2680 goto do_ifunc_pointer;
2681 goto bad_ifunc_reloc;
2682 }
2683
2684 /* STT_GNU_IFUNC symbol must go through PLT. */
2685 if (htab->elf.splt != NULL)
2686 {
2687 if (htab->plt_second != NULL)
2688 {
2689 resolved_plt = htab->plt_second;
2690 plt_offset = eh->plt_second.offset;
2691 }
2692 else
2693 {
2694 resolved_plt = htab->elf.splt;
2695 plt_offset = h->plt.offset;
2696 }
2697 }
2698 else
2699 {
2700 resolved_plt = htab->elf.iplt;
2701 plt_offset = h->plt.offset;
2702 }
2703
2704 relocation = (resolved_plt->output_section->vma
2705 + resolved_plt->output_offset + plt_offset);
2706
2707 switch (r_type)
2708 {
2709 default:
2710 bad_ifunc_reloc:
2711 if (h->root.root.string)
2712 name = h->root.root.string;
2713 else
2714 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2715 NULL);
2716 _bfd_error_handler
2717 /* xgettext:c-format */
2718 (_("%pB: relocation %s against STT_GNU_IFUNC "
2719 "symbol `%s' isn't supported"), input_bfd,
2720 howto->name, name);
2721 bfd_set_error (bfd_error_bad_value);
2722 return false;
2723
2724 case R_X86_64_32S:
2725 if (bfd_link_pic (info))
2726 abort ();
2727 goto do_relocation;
2728
2729 case R_X86_64_32:
2730 if (ABI_64_P (output_bfd))
2731 goto do_relocation;
2732 /* FALLTHROUGH */
2733 case R_X86_64_64:
2734 do_ifunc_pointer:
2735 if (rel->r_addend != 0)
2736 {
2737 if (h->root.root.string)
2738 name = h->root.root.string;
2739 else
2740 name = bfd_elf_sym_name (input_bfd, symtab_hdr,
2741 sym, NULL);
2742 _bfd_error_handler
2743 /* xgettext:c-format */
2744 (_("%pB: relocation %s against STT_GNU_IFUNC "
2745 "symbol `%s' has non-zero addend: %" PRId64),
2746 input_bfd, howto->name, name, (int64_t) rel->r_addend);
2747 bfd_set_error (bfd_error_bad_value);
2748 return false;
2749 }
2750
2751 /* Generate dynamic relcoation only when there is a
2752 non-GOT reference in a shared object or there is no
2753 PLT. */
2754 if ((bfd_link_pic (info) && h->non_got_ref)
2755 || h->plt.offset == (bfd_vma) -1)
2756 {
2757 Elf_Internal_Rela outrel;
2758 asection *sreloc;
2759
2760 /* Need a dynamic relocation to get the real function
2761 address. */
2762 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2763 info,
2764 input_section,
2765 rel->r_offset);
2766 if (outrel.r_offset == (bfd_vma) -1
2767 || outrel.r_offset == (bfd_vma) -2)
2768 abort ();
2769
2770 outrel.r_offset += (input_section->output_section->vma
2771 + input_section->output_offset);
2772
2773 if (POINTER_LOCAL_IFUNC_P (info, h))
2774 {
2775 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
2776 h->root.root.string,
2777 h->root.u.def.section->owner);
2778
2779 /* This symbol is resolved locally. */
2780 outrel.r_info = htab->r_info (0, R_X86_64_IRELATIVE);
2781 outrel.r_addend = (h->root.u.def.value
2782 + h->root.u.def.section->output_section->vma
2783 + h->root.u.def.section->output_offset);
2784
2785 if (htab->params->report_relative_reloc)
2786 _bfd_x86_elf_link_report_relative_reloc
2787 (info, input_section, h, sym,
2788 "R_X86_64_IRELATIVE", &outrel);
2789 }
2790 else
2791 {
2792 outrel.r_info = htab->r_info (h->dynindx, r_type);
2793 outrel.r_addend = 0;
2794 }
2795
2796 /* Dynamic relocations are stored in
2797 1. .rela.ifunc section in PIC object.
2798 2. .rela.got section in dynamic executable.
2799 3. .rela.iplt section in static executable. */
2800 if (bfd_link_pic (info))
2801 sreloc = htab->elf.irelifunc;
2802 else if (htab->elf.splt != NULL)
2803 sreloc = htab->elf.srelgot;
2804 else
2805 sreloc = htab->elf.irelplt;
2806 elf_append_rela (output_bfd, sreloc, &outrel);
2807
2808 /* If this reloc is against an external symbol, we
2809 do not want to fiddle with the addend. Otherwise,
2810 we need to include the symbol value so that it
2811 becomes an addend for the dynamic reloc. For an
2812 internal symbol, we have updated addend. */
2813 continue;
2814 }
2815 /* FALLTHROUGH */
2816 case R_X86_64_PC32:
2817 case R_X86_64_PC32_BND:
2818 case R_X86_64_PC64:
2819 case R_X86_64_PLT32:
2820 case R_X86_64_PLT32_BND:
2821 goto do_relocation;
2822 }
2823 }
2824
2825 skip_ifunc:
2826 resolved_to_zero = (eh != NULL
2827 && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh));
2828
2829 /* When generating a shared object, the relocations handled here are
2830 copied into the output file to be resolved at run time. */
2831 switch (r_type)
2832 {
2833 case R_X86_64_GOT32:
2834 case R_X86_64_GOT64:
2835 /* Relocation is to the entry for this symbol in the global
2836 offset table. */
2837 case R_X86_64_GOTPCREL:
2838 case R_X86_64_GOTPCRELX:
2839 case R_X86_64_REX_GOTPCRELX:
2840 case R_X86_64_GOTPCREL64:
2841 /* Use global offset table entry as symbol value. */
2842 case R_X86_64_GOTPLT64:
2843 /* This is obsolete and treated the same as GOT64. */
2844 base_got = htab->elf.sgot;
2845
2846 if (htab->elf.sgot == NULL)
2847 abort ();
2848
2849 relative_reloc = false;
2850 if (h != NULL)
2851 {
2852 off = h->got.offset;
2853 if (h->needs_plt
2854 && h->plt.offset != (bfd_vma)-1
2855 && off == (bfd_vma)-1)
2856 {
2857 /* We can't use h->got.offset here to save
2858 state, or even just remember the offset, as
2859 finish_dynamic_symbol would use that as offset into
2860 .got. */
2861 bfd_vma plt_index = (h->plt.offset / plt_entry_size
2862 - htab->plt.has_plt0);
2863 off = (plt_index + 3) * GOT_ENTRY_SIZE;
2864 base_got = htab->elf.sgotplt;
2865 }
2866
2867 if (RESOLVED_LOCALLY_P (info, h, htab))
2868 {
2869 /* We must initialize this entry in the global offset
2870 table. Since the offset must always be a multiple
2871 of 8, we use the least significant bit to record
2872 whether we have initialized it already.
2873
2874 When doing a dynamic link, we create a .rela.got
2875 relocation entry to initialize the value. This is
2876 done in the finish_dynamic_symbol routine. */
2877 if ((off & 1) != 0)
2878 off &= ~1;
2879 else
2880 {
2881 bfd_put_64 (output_bfd, relocation,
2882 base_got->contents + off);
2883 /* Note that this is harmless for the GOTPLT64 case,
2884 as -1 | 1 still is -1. */
2885 h->got.offset |= 1;
2886
2887 /* NB: Don't generate relative relocation here if
2888 it has been generated by DT_RELR. */
2889 if (!info->enable_dt_relr
2890 && GENERATE_RELATIVE_RELOC_P (info, h))
2891 {
2892 /* If this symbol isn't dynamic in PIC,
2893 generate R_X86_64_RELATIVE here. */
2894 eh->no_finish_dynamic_symbol = 1;
2895 relative_reloc = true;
2896 }
2897 }
2898 }
2899 else
2900 unresolved_reloc = false;
2901 }
2902 else
2903 {
2904 if (local_got_offsets == NULL)
2905 abort ();
2906
2907 off = local_got_offsets[r_symndx];
2908
2909 /* The offset must always be a multiple of 8. We use
2910 the least significant bit to record whether we have
2911 already generated the necessary reloc. */
2912 if ((off & 1) != 0)
2913 off &= ~1;
2914 else
2915 {
2916 bfd_put_64 (output_bfd, relocation,
2917 base_got->contents + off);
2918 local_got_offsets[r_symndx] |= 1;
2919
2920 /* NB: GOTPCREL relocations against local absolute
2921 symbol store relocation value in the GOT slot
2922 without relative relocation. Don't generate
2923 relative relocation here if it has been generated
2924 by DT_RELR. */
2925 if (!info->enable_dt_relr
2926 && bfd_link_pic (info)
2927 && !(sym->st_shndx == SHN_ABS
2928 && (r_type == R_X86_64_GOTPCREL
2929 || r_type == R_X86_64_GOTPCRELX
2930 || r_type == R_X86_64_REX_GOTPCRELX)))
2931 relative_reloc = true;
2932 }
2933 }
2934
2935 if (relative_reloc)
2936 {
2937 asection *s;
2938 Elf_Internal_Rela outrel;
2939
2940 /* We need to generate a R_X86_64_RELATIVE reloc
2941 for the dynamic linker. */
2942 s = htab->elf.srelgot;
2943 if (s == NULL)
2944 abort ();
2945
2946 outrel.r_offset = (base_got->output_section->vma
2947 + base_got->output_offset
2948 + off);
2949 outrel.r_info = htab->r_info (0, R_X86_64_RELATIVE);
2950 outrel.r_addend = relocation;
2951
2952 if (htab->params->report_relative_reloc)
2953 _bfd_x86_elf_link_report_relative_reloc
2954 (info, input_section, h, sym, "R_X86_64_RELATIVE",
2955 &outrel);
2956
2957 elf_append_rela (output_bfd, s, &outrel);
2958 }
2959
2960 if (off >= (bfd_vma) -2)
2961 abort ();
2962
2963 relocation = base_got->output_section->vma
2964 + base_got->output_offset + off;
2965 if (r_type != R_X86_64_GOTPCREL
2966 && r_type != R_X86_64_GOTPCRELX
2967 && r_type != R_X86_64_REX_GOTPCRELX
2968 && r_type != R_X86_64_GOTPCREL64)
2969 relocation -= htab->elf.sgotplt->output_section->vma
2970 - htab->elf.sgotplt->output_offset;
2971
2972 break;
2973
2974 case R_X86_64_GOTOFF64:
2975 /* Relocation is relative to the start of the global offset
2976 table. */
2977
2978 /* Check to make sure it isn't a protected function or data
2979 symbol for shared library since it may not be local when
2980 used as function address or with copy relocation. We also
2981 need to make sure that a symbol is referenced locally. */
2982 if (bfd_link_pic (info) && h)
2983 {
2984 if (!h->def_regular)
2985 {
2986 const char *v;
2987
2988 switch (ELF_ST_VISIBILITY (h->other))
2989 {
2990 case STV_HIDDEN:
2991 v = _("hidden symbol");
2992 break;
2993 case STV_INTERNAL:
2994 v = _("internal symbol");
2995 break;
2996 case STV_PROTECTED:
2997 v = _("protected symbol");
2998 break;
2999 default:
3000 v = _("symbol");
3001 break;
3002 }
3003
3004 _bfd_error_handler
3005 /* xgettext:c-format */
3006 (_("%pB: relocation R_X86_64_GOTOFF64 against undefined %s"
3007 " `%s' can not be used when making a shared object"),
3008 input_bfd, v, h->root.root.string);
3009 bfd_set_error (bfd_error_bad_value);
3010 return false;
3011 }
3012 else if (!bfd_link_executable (info)
3013 && !SYMBOL_REFERENCES_LOCAL_P (info, h)
3014 && (h->type == STT_FUNC
3015 || h->type == STT_OBJECT)
3016 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
3017 {
3018 _bfd_error_handler
3019 /* xgettext:c-format */
3020 (_("%pB: relocation R_X86_64_GOTOFF64 against protected %s"
3021 " `%s' can not be used when making a shared object"),
3022 input_bfd,
3023 h->type == STT_FUNC ? "function" : "data",
3024 h->root.root.string);
3025 bfd_set_error (bfd_error_bad_value);
3026 return false;
3027 }
3028 }
3029
3030 /* Note that sgot is not involved in this
3031 calculation. We always want the start of .got.plt. If we
3032 defined _GLOBAL_OFFSET_TABLE_ in a different way, as is
3033 permitted by the ABI, we might have to change this
3034 calculation. */
3035 relocation -= htab->elf.sgotplt->output_section->vma
3036 + htab->elf.sgotplt->output_offset;
3037 break;
3038
3039 case R_X86_64_GOTPC32:
3040 case R_X86_64_GOTPC64:
3041 /* Use global offset table as symbol value. */
3042 relocation = htab->elf.sgotplt->output_section->vma
3043 + htab->elf.sgotplt->output_offset;
3044 unresolved_reloc = false;
3045 break;
3046
3047 case R_X86_64_PLTOFF64:
3048 /* Relocation is PLT entry relative to GOT. For local
3049 symbols it's the symbol itself relative to GOT. */
3050 if (h != NULL
3051 /* See PLT32 handling. */
3052 && (h->plt.offset != (bfd_vma) -1
3053 || eh->plt_got.offset != (bfd_vma) -1)
3054 && htab->elf.splt != NULL)
3055 {
3056 if (eh->plt_got.offset != (bfd_vma) -1)
3057 {
3058 /* Use the GOT PLT. */
3059 resolved_plt = htab->plt_got;
3060 plt_offset = eh->plt_got.offset;
3061 }
3062 else if (htab->plt_second != NULL)
3063 {
3064 resolved_plt = htab->plt_second;
3065 plt_offset = eh->plt_second.offset;
3066 }
3067 else
3068 {
3069 resolved_plt = htab->elf.splt;
3070 plt_offset = h->plt.offset;
3071 }
3072
3073 relocation = (resolved_plt->output_section->vma
3074 + resolved_plt->output_offset
3075 + plt_offset);
3076 unresolved_reloc = false;
3077 }
3078
3079 relocation -= htab->elf.sgotplt->output_section->vma
3080 + htab->elf.sgotplt->output_offset;
3081 break;
3082
3083 case R_X86_64_PLT32:
3084 case R_X86_64_PLT32_BND:
3085 /* Relocation is to the entry for this symbol in the
3086 procedure linkage table. */
3087
3088 /* Resolve a PLT32 reloc against a local symbol directly,
3089 without using the procedure linkage table. */
3090 if (h == NULL)
3091 break;
3092
3093 if ((h->plt.offset == (bfd_vma) -1
3094 && eh->plt_got.offset == (bfd_vma) -1)
3095 || htab->elf.splt == NULL)
3096 {
3097 /* We didn't make a PLT entry for this symbol. This
3098 happens when statically linking PIC code, or when
3099 using -Bsymbolic. */
3100 break;
3101 }
3102
3103 use_plt:
3104 if (h->plt.offset != (bfd_vma) -1)
3105 {
3106 if (htab->plt_second != NULL)
3107 {
3108 resolved_plt = htab->plt_second;
3109 plt_offset = eh->plt_second.offset;
3110 }
3111 else
3112 {
3113 resolved_plt = htab->elf.splt;
3114 plt_offset = h->plt.offset;
3115 }
3116 }
3117 else
3118 {
3119 /* Use the GOT PLT. */
3120 resolved_plt = htab->plt_got;
3121 plt_offset = eh->plt_got.offset;
3122 }
3123
3124 relocation = (resolved_plt->output_section->vma
3125 + resolved_plt->output_offset
3126 + plt_offset);
3127 unresolved_reloc = false;
3128 break;
3129
3130 case R_X86_64_SIZE32:
3131 case R_X86_64_SIZE64:
3132 /* Set to symbol size. */
3133 relocation = st_size;
3134 goto direct;
3135
3136 case R_X86_64_PC8:
3137 case R_X86_64_PC16:
3138 case R_X86_64_PC32:
3139 case R_X86_64_PC32_BND:
3140 /* Don't complain about -fPIC if the symbol is undefined when
3141 building executable unless it is unresolved weak symbol,
3142 references a dynamic definition in PIE or -z nocopyreloc
3143 is used. */
3144 no_copyreloc_p
3145 = (info->nocopyreloc
3146 || (h != NULL
3147 && !h->root.linker_def
3148 && !h->root.ldscript_def
3149 && eh->def_protected
3150 && elf_has_no_copy_on_protected (h->root.u.def.section->owner)));
3151
3152 if ((input_section->flags & SEC_ALLOC) != 0
3153 && (input_section->flags & SEC_READONLY) != 0
3154 && h != NULL
3155 && ((bfd_link_executable (info)
3156 && ((h->root.type == bfd_link_hash_undefweak
3157 && (eh == NULL
3158 || !UNDEFINED_WEAK_RESOLVED_TO_ZERO (info,
3159 eh)))
3160 || (bfd_link_pie (info)
3161 && !SYMBOL_DEFINED_NON_SHARED_P (h)
3162 && h->def_dynamic)
3163 || (no_copyreloc_p
3164 && h->def_dynamic
3165 && !(h->root.u.def.section->flags & SEC_CODE))))
3166 || (bfd_link_pie (info)
3167 && h->root.type == bfd_link_hash_undefweak)
3168 || bfd_link_dll (info)))
3169 {
3170 bool fail = false;
3171 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
3172 {
3173 /* Symbol is referenced locally. Make sure it is
3174 defined locally. */
3175 fail = !SYMBOL_DEFINED_NON_SHARED_P (h);
3176 }
3177 else if (bfd_link_pie (info))
3178 {
3179 /* We can only use PC-relative relocations in PIE
3180 from non-code sections. */
3181 if (h->root.type == bfd_link_hash_undefweak
3182 || (h->type == STT_FUNC
3183 && (sec->flags & SEC_CODE) != 0))
3184 fail = true;
3185 }
3186 else if (no_copyreloc_p || bfd_link_dll (info))
3187 {
3188 /* Symbol doesn't need copy reloc and isn't
3189 referenced locally. Don't allow PC-relative
3190 relocations against default and protected
3191 symbols since address of protected function
3192 and location of protected data may not be in
3193 the shared object. */
3194 fail = (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3195 || ELF_ST_VISIBILITY (h->other) == STV_PROTECTED);
3196 }
3197
3198 if (fail)
3199 return elf_x86_64_need_pic (info, input_bfd, input_section,
3200 h, NULL, NULL, howto);
3201 }
3202 /* Since x86-64 has PC-relative PLT, we can use PLT in PIE
3203 as function address. */
3204 else if (h != NULL
3205 && (input_section->flags & SEC_CODE) == 0
3206 && bfd_link_pie (info)
3207 && h->type == STT_FUNC
3208 && !h->def_regular
3209 && h->def_dynamic)
3210 goto use_plt;
3211 /* Fall through. */
3212
3213 case R_X86_64_8:
3214 case R_X86_64_16:
3215 case R_X86_64_32:
3216 case R_X86_64_PC64:
3217 case R_X86_64_64:
3218 /* FIXME: The ABI says the linker should make sure the value is
3219 the same when it's zeroextended to 64 bit. */
3220
3221 direct:
3222 if ((input_section->flags & SEC_ALLOC) == 0)
3223 break;
3224
3225 need_copy_reloc_in_pie = (bfd_link_pie (info)
3226 && h != NULL
3227 && (h->needs_copy
3228 || eh->needs_copy
3229 || (h->root.type
3230 == bfd_link_hash_undefined))
3231 && (X86_PCREL_TYPE_P (true, r_type)
3232 || X86_SIZE_TYPE_P (true,
3233 r_type)));
3234
3235 if (GENERATE_DYNAMIC_RELOCATION_P (true, info, eh, r_type, sec,
3236 need_copy_reloc_in_pie,
3237 resolved_to_zero, false))
3238 {
3239 Elf_Internal_Rela outrel;
3240 bool skip, relocate;
3241 bool generate_dynamic_reloc = true;
3242 asection *sreloc;
3243 const char *relative_reloc_name = NULL;
3244
3245 /* When generating a shared object, these relocations
3246 are copied into the output file to be resolved at run
3247 time. */
3248 skip = false;
3249 relocate = false;
3250
3251 outrel.r_offset =
3252 _bfd_elf_section_offset (output_bfd, info, input_section,
3253 rel->r_offset);
3254 if (outrel.r_offset == (bfd_vma) -1)
3255 skip = true;
3256 else if (outrel.r_offset == (bfd_vma) -2)
3257 skip = true, relocate = true;
3258
3259 outrel.r_offset += (input_section->output_section->vma
3260 + input_section->output_offset);
3261
3262 if (skip)
3263 memset (&outrel, 0, sizeof outrel);
3264
3265 else if (COPY_INPUT_RELOC_P (true, info, h, r_type))
3266 {
3267 outrel.r_info = htab->r_info (h->dynindx, r_type);
3268 outrel.r_addend = rel->r_addend;
3269 }
3270 else
3271 {
3272 /* This symbol is local, or marked to become local.
3273 When relocation overflow check is disabled, we
3274 convert R_X86_64_32 to dynamic R_X86_64_RELATIVE. */
3275 if (r_type == htab->pointer_r_type
3276 || (r_type == R_X86_64_32
3277 && htab->params->no_reloc_overflow_check))
3278 {
3279 relocate = true;
3280 /* NB: Don't generate relative relocation here if
3281 it has been generated by DT_RELR. */
3282 if (info->enable_dt_relr)
3283 generate_dynamic_reloc = false;
3284 else
3285 {
3286 outrel.r_info =
3287 htab->r_info (0, R_X86_64_RELATIVE);
3288 outrel.r_addend = relocation + rel->r_addend;
3289 relative_reloc_name = "R_X86_64_RELATIVE";
3290 }
3291 }
3292 else if (r_type == R_X86_64_64
3293 && !ABI_64_P (output_bfd))
3294 {
3295 relocate = true;
3296 outrel.r_info = htab->r_info (0,
3297 R_X86_64_RELATIVE64);
3298 outrel.r_addend = relocation + rel->r_addend;
3299 relative_reloc_name = "R_X86_64_RELATIVE64";
3300 /* Check addend overflow. */
3301 if ((outrel.r_addend & 0x80000000)
3302 != (rel->r_addend & 0x80000000))
3303 {
3304 const char *name;
3305 int addend = rel->r_addend;
3306 if (h && h->root.root.string)
3307 name = h->root.root.string;
3308 else
3309 name = bfd_elf_sym_name (input_bfd, symtab_hdr,
3310 sym, NULL);
3311 _bfd_error_handler
3312 /* xgettext:c-format */
3313 (_("%pB: addend %s%#x in relocation %s against "
3314 "symbol `%s' at %#" PRIx64
3315 " in section `%pA' is out of range"),
3316 input_bfd, addend < 0 ? "-" : "", addend,
3317 howto->name, name, (uint64_t) rel->r_offset,
3318 input_section);
3319 bfd_set_error (bfd_error_bad_value);
3320 return false;
3321 }
3322 }
3323 else
3324 {
3325 long sindx;
3326
3327 if (bfd_is_abs_section (sec))
3328 sindx = 0;
3329 else if (sec == NULL || sec->owner == NULL)
3330 {
3331 bfd_set_error (bfd_error_bad_value);
3332 return false;
3333 }
3334 else
3335 {
3336 asection *osec;
3337
3338 /* We are turning this relocation into one
3339 against a section symbol. It would be
3340 proper to subtract the symbol's value,
3341 osec->vma, from the emitted reloc addend,
3342 but ld.so expects buggy relocs. */
3343 osec = sec->output_section;
3344 sindx = elf_section_data (osec)->dynindx;
3345 if (sindx == 0)
3346 {
3347 asection *oi = htab->elf.text_index_section;
3348 sindx = elf_section_data (oi)->dynindx;
3349 }
3350 BFD_ASSERT (sindx != 0);
3351 }
3352
3353 outrel.r_info = htab->r_info (sindx, r_type);
3354 outrel.r_addend = relocation + rel->r_addend;
3355 }
3356 }
3357
3358 if (generate_dynamic_reloc)
3359 {
3360 sreloc = elf_section_data (input_section)->sreloc;
3361
3362 if (sreloc == NULL || sreloc->contents == NULL)
3363 {
3364 r = bfd_reloc_notsupported;
3365 goto check_relocation_error;
3366 }
3367
3368 if (relative_reloc_name
3369 && htab->params->report_relative_reloc)
3370 _bfd_x86_elf_link_report_relative_reloc
3371 (info, input_section, h, sym,
3372 relative_reloc_name, &outrel);
3373
3374 elf_append_rela (output_bfd, sreloc, &outrel);
3375 }
3376
3377 /* If this reloc is against an external symbol, we do
3378 not want to fiddle with the addend. Otherwise, we
3379 need to include the symbol value so that it becomes
3380 an addend for the dynamic reloc. */
3381 if (! relocate)
3382 continue;
3383 }
3384
3385 break;
3386
3387 case R_X86_64_TLSGD:
3388 case R_X86_64_GOTPC32_TLSDESC:
3389 case R_X86_64_TLSDESC_CALL:
3390 case R_X86_64_GOTTPOFF:
3391 tls_type = GOT_UNKNOWN;
3392 if (h == NULL && local_got_offsets)
3393 tls_type = elf_x86_local_got_tls_type (input_bfd) [r_symndx];
3394 else if (h != NULL)
3395 tls_type = elf_x86_hash_entry (h)->tls_type;
3396
3397 r_type_tls = r_type;
3398 if (! elf_x86_64_tls_transition (info, input_bfd,
3399 input_section, contents,
3400 symtab_hdr, sym_hashes,
3401 &r_type_tls, tls_type, rel,
3402 relend, h, r_symndx, true))
3403 return false;
3404
3405 if (r_type_tls == R_X86_64_TPOFF32)
3406 {
3407 bfd_vma roff = rel->r_offset;
3408
3409 BFD_ASSERT (! unresolved_reloc);
3410
3411 if (r_type == R_X86_64_TLSGD)
3412 {
3413 /* GD->LE transition. For 64bit, change
3414 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3415 .word 0x6666; rex64; call __tls_get_addr@PLT
3416 or
3417 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3418 .byte 0x66; rex64
3419 call *__tls_get_addr@GOTPCREL(%rip)
3420 which may be converted to
3421 addr32 call __tls_get_addr
3422 into:
3423 movq %fs:0, %rax
3424 leaq foo@tpoff(%rax), %rax
3425 For 32bit, change
3426 leaq foo@tlsgd(%rip), %rdi
3427 .word 0x6666; rex64; call __tls_get_addr@PLT
3428 or
3429 leaq foo@tlsgd(%rip), %rdi
3430 .byte 0x66; rex64
3431 call *__tls_get_addr@GOTPCREL(%rip)
3432 which may be converted to
3433 addr32 call __tls_get_addr
3434 into:
3435 movl %fs:0, %eax
3436 leaq foo@tpoff(%rax), %rax
3437 For largepic, change:
3438 leaq foo@tlsgd(%rip), %rdi
3439 movabsq $__tls_get_addr@pltoff, %rax
3440 addq %r15, %rax
3441 call *%rax
3442 into:
3443 movq %fs:0, %rax
3444 leaq foo@tpoff(%rax), %rax
3445 nopw 0x0(%rax,%rax,1) */
3446 int largepic = 0;
3447 if (ABI_64_P (output_bfd))
3448 {
3449 if (contents[roff + 5] == 0xb8)
3450 {
3451 if (roff < 3
3452 || (roff - 3 + 22) > input_section->size)
3453 {
3454 corrupt_input:
3455 info->callbacks->einfo
3456 (_("%F%P: corrupt input: %pB\n"),
3457 input_bfd);
3458 return false;
3459 }
3460 memcpy (contents + roff - 3,
3461 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80"
3462 "\0\0\0\0\x66\x0f\x1f\x44\0", 22);
3463 largepic = 1;
3464 }
3465 else
3466 {
3467 if (roff < 4
3468 || (roff - 4 + 16) > input_section->size)
3469 goto corrupt_input;
3470 memcpy (contents + roff - 4,
3471 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
3472 16);
3473 }
3474 }
3475 else
3476 {
3477 if (roff < 3
3478 || (roff - 3 + 15) > input_section->size)
3479 goto corrupt_input;
3480 memcpy (contents + roff - 3,
3481 "\x64\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
3482 15);
3483 }
3484 bfd_put_32 (output_bfd,
3485 elf_x86_64_tpoff (info, relocation),
3486 contents + roff + 8 + largepic);
3487 /* Skip R_X86_64_PC32, R_X86_64_PLT32,
3488 R_X86_64_GOTPCRELX and R_X86_64_PLTOFF64. */
3489 rel++;
3490 wrel++;
3491 continue;
3492 }
3493 else if (r_type == R_X86_64_GOTPC32_TLSDESC)
3494 {
3495 /* GDesc -> LE transition.
3496 It's originally something like:
3497 leaq x@tlsdesc(%rip), %rax <--- LP64 mode.
3498 rex leal x@tlsdesc(%rip), %eax <--- X32 mode.
3499
3500 Change it to:
3501 movq $x@tpoff, %rax <--- LP64 mode.
3502 rex movl $x@tpoff, %eax <--- X32 mode.
3503 */
3504
3505 unsigned int val, type;
3506
3507 if (roff < 3)
3508 goto corrupt_input;
3509 type = bfd_get_8 (input_bfd, contents + roff - 3);
3510 val = bfd_get_8 (input_bfd, contents + roff - 1);
3511 bfd_put_8 (output_bfd,
3512 (type & 0x48) | ((type >> 2) & 1),
3513 contents + roff - 3);
3514 bfd_put_8 (output_bfd, 0xc7, contents + roff - 2);
3515 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
3516 contents + roff - 1);
3517 bfd_put_32 (output_bfd,
3518 elf_x86_64_tpoff (info, relocation),
3519 contents + roff);
3520 continue;
3521 }
3522 else if (r_type == R_X86_64_TLSDESC_CALL)
3523 {
3524 /* GDesc -> LE transition.
3525 It's originally:
3526 call *(%rax) <--- LP64 mode.
3527 call *(%eax) <--- X32 mode.
3528 Turn it into:
3529 xchg %ax,%ax <-- LP64 mode.
3530 nopl (%rax) <-- X32 mode.
3531 */
3532 unsigned int prefix = 0;
3533 if (!ABI_64_P (input_bfd))
3534 {
3535 /* Check for call *x@tlsdesc(%eax). */
3536 if (contents[roff] == 0x67)
3537 prefix = 1;
3538 }
3539 if (prefix)
3540 {
3541 bfd_put_8 (output_bfd, 0x0f, contents + roff);
3542 bfd_put_8 (output_bfd, 0x1f, contents + roff + 1);
3543 bfd_put_8 (output_bfd, 0x00, contents + roff + 2);
3544 }
3545 else
3546 {
3547 bfd_put_8 (output_bfd, 0x66, contents + roff);
3548 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3549 }
3550 continue;
3551 }
3552 else if (r_type == R_X86_64_GOTTPOFF)
3553 {
3554 /* IE->LE transition:
3555 For 64bit, originally it can be one of:
3556 movq foo@gottpoff(%rip), %reg
3557 addq foo@gottpoff(%rip), %reg
3558 We change it into:
3559 movq $foo, %reg
3560 leaq foo(%reg), %reg
3561 addq $foo, %reg.
3562 For 32bit, originally it can be one of:
3563 movq foo@gottpoff(%rip), %reg
3564 addl foo@gottpoff(%rip), %reg
3565 We change it into:
3566 movq $foo, %reg
3567 leal foo(%reg), %reg
3568 addl $foo, %reg. */
3569
3570 unsigned int val, type, reg;
3571
3572 if (roff >= 3)
3573 val = bfd_get_8 (input_bfd, contents + roff - 3);
3574 else
3575 {
3576 if (roff < 2)
3577 goto corrupt_input;
3578 val = 0;
3579 }
3580 type = bfd_get_8 (input_bfd, contents + roff - 2);
3581 reg = bfd_get_8 (input_bfd, contents + roff - 1);
3582 reg >>= 3;
3583 if (type == 0x8b)
3584 {
3585 /* movq */
3586 if (val == 0x4c)
3587 {
3588 if (roff < 3)
3589 goto corrupt_input;
3590 bfd_put_8 (output_bfd, 0x49,
3591 contents + roff - 3);
3592 }
3593 else if (!ABI_64_P (output_bfd) && val == 0x44)
3594 {
3595 if (roff < 3)
3596 goto corrupt_input;
3597 bfd_put_8 (output_bfd, 0x41,
3598 contents + roff - 3);
3599 }
3600 bfd_put_8 (output_bfd, 0xc7,
3601 contents + roff - 2);
3602 bfd_put_8 (output_bfd, 0xc0 | reg,
3603 contents + roff - 1);
3604 }
3605 else if (reg == 4)
3606 {
3607 /* addq/addl -> addq/addl - addressing with %rsp/%r12
3608 is special */
3609 if (val == 0x4c)
3610 {
3611 if (roff < 3)
3612 goto corrupt_input;
3613 bfd_put_8 (output_bfd, 0x49,
3614 contents + roff - 3);
3615 }
3616 else if (!ABI_64_P (output_bfd) && val == 0x44)
3617 {
3618 if (roff < 3)
3619 goto corrupt_input;
3620 bfd_put_8 (output_bfd, 0x41,
3621 contents + roff - 3);
3622 }
3623 bfd_put_8 (output_bfd, 0x81,
3624 contents + roff - 2);
3625 bfd_put_8 (output_bfd, 0xc0 | reg,
3626 contents + roff - 1);
3627 }
3628 else
3629 {
3630 /* addq/addl -> leaq/leal */
3631 if (val == 0x4c)
3632 {
3633 if (roff < 3)
3634 goto corrupt_input;
3635 bfd_put_8 (output_bfd, 0x4d,
3636 contents + roff - 3);
3637 }
3638 else if (!ABI_64_P (output_bfd) && val == 0x44)
3639 {
3640 if (roff < 3)
3641 goto corrupt_input;
3642 bfd_put_8 (output_bfd, 0x45,
3643 contents + roff - 3);
3644 }
3645 bfd_put_8 (output_bfd, 0x8d,
3646 contents + roff - 2);
3647 bfd_put_8 (output_bfd, 0x80 | reg | (reg << 3),
3648 contents + roff - 1);
3649 }
3650 bfd_put_32 (output_bfd,
3651 elf_x86_64_tpoff (info, relocation),
3652 contents + roff);
3653 continue;
3654 }
3655 else
3656 BFD_ASSERT (false);
3657 }
3658
3659 if (htab->elf.sgot == NULL)
3660 abort ();
3661
3662 if (h != NULL)
3663 {
3664 off = h->got.offset;
3665 offplt = elf_x86_hash_entry (h)->tlsdesc_got;
3666 }
3667 else
3668 {
3669 if (local_got_offsets == NULL)
3670 abort ();
3671
3672 off = local_got_offsets[r_symndx];
3673 offplt = local_tlsdesc_gotents[r_symndx];
3674 }
3675
3676 if ((off & 1) != 0)
3677 off &= ~1;
3678 else
3679 {
3680 Elf_Internal_Rela outrel;
3681 int dr_type, indx;
3682 asection *sreloc;
3683
3684 if (htab->elf.srelgot == NULL)
3685 abort ();
3686
3687 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3688
3689 if (GOT_TLS_GDESC_P (tls_type))
3690 {
3691 outrel.r_info = htab->r_info (indx, R_X86_64_TLSDESC);
3692 BFD_ASSERT (htab->sgotplt_jump_table_size + offplt
3693 + 2 * GOT_ENTRY_SIZE <= htab->elf.sgotplt->size);
3694 outrel.r_offset = (htab->elf.sgotplt->output_section->vma
3695 + htab->elf.sgotplt->output_offset
3696 + offplt
3697 + htab->sgotplt_jump_table_size);
3698 sreloc = htab->elf.srelplt;
3699 if (indx == 0)
3700 outrel.r_addend = relocation - _bfd_x86_elf_dtpoff_base (info);
3701 else
3702 outrel.r_addend = 0;
3703 elf_append_rela (output_bfd, sreloc, &outrel);
3704 }
3705
3706 sreloc = htab->elf.srelgot;
3707
3708 outrel.r_offset = (htab->elf.sgot->output_section->vma
3709 + htab->elf.sgot->output_offset + off);
3710
3711 if (GOT_TLS_GD_P (tls_type))
3712 dr_type = R_X86_64_DTPMOD64;
3713 else if (GOT_TLS_GDESC_P (tls_type))
3714 goto dr_done;
3715 else
3716 dr_type = R_X86_64_TPOFF64;
3717
3718 bfd_put_64 (output_bfd, 0, htab->elf.sgot->contents + off);
3719 outrel.r_addend = 0;
3720 if ((dr_type == R_X86_64_TPOFF64
3721 || dr_type == R_X86_64_TLSDESC) && indx == 0)
3722 outrel.r_addend = relocation - _bfd_x86_elf_dtpoff_base (info);
3723 outrel.r_info = htab->r_info (indx, dr_type);
3724
3725 elf_append_rela (output_bfd, sreloc, &outrel);
3726
3727 if (GOT_TLS_GD_P (tls_type))
3728 {
3729 if (indx == 0)
3730 {
3731 BFD_ASSERT (! unresolved_reloc);
3732 bfd_put_64 (output_bfd,
3733 relocation - _bfd_x86_elf_dtpoff_base (info),
3734 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3735 }
3736 else
3737 {
3738 bfd_put_64 (output_bfd, 0,
3739 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3740 outrel.r_info = htab->r_info (indx,
3741 R_X86_64_DTPOFF64);
3742 outrel.r_offset += GOT_ENTRY_SIZE;
3743 elf_append_rela (output_bfd, sreloc,
3744 &outrel);
3745 }
3746 }
3747
3748 dr_done:
3749 if (h != NULL)
3750 h->got.offset |= 1;
3751 else
3752 local_got_offsets[r_symndx] |= 1;
3753 }
3754
3755 if (off >= (bfd_vma) -2
3756 && ! GOT_TLS_GDESC_P (tls_type))
3757 abort ();
3758 if (r_type_tls == r_type)
3759 {
3760 if (r_type == R_X86_64_GOTPC32_TLSDESC
3761 || r_type == R_X86_64_TLSDESC_CALL)
3762 relocation = htab->elf.sgotplt->output_section->vma
3763 + htab->elf.sgotplt->output_offset
3764 + offplt + htab->sgotplt_jump_table_size;
3765 else
3766 relocation = htab->elf.sgot->output_section->vma
3767 + htab->elf.sgot->output_offset + off;
3768 unresolved_reloc = false;
3769 }
3770 else
3771 {
3772 bfd_vma roff = rel->r_offset;
3773
3774 if (r_type == R_X86_64_TLSGD)
3775 {
3776 /* GD->IE transition. For 64bit, change
3777 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3778 .word 0x6666; rex64; call __tls_get_addr@PLT
3779 or
3780 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3781 .byte 0x66; rex64
3782 call *__tls_get_addr@GOTPCREL(%rip
3783 which may be converted to
3784 addr32 call __tls_get_addr
3785 into:
3786 movq %fs:0, %rax
3787 addq foo@gottpoff(%rip), %rax
3788 For 32bit, change
3789 leaq foo@tlsgd(%rip), %rdi
3790 .word 0x6666; rex64; call __tls_get_addr@PLT
3791 or
3792 leaq foo@tlsgd(%rip), %rdi
3793 .byte 0x66; rex64;
3794 call *__tls_get_addr@GOTPCREL(%rip)
3795 which may be converted to
3796 addr32 call __tls_get_addr
3797 into:
3798 movl %fs:0, %eax
3799 addq foo@gottpoff(%rip), %rax
3800 For largepic, change:
3801 leaq foo@tlsgd(%rip), %rdi
3802 movabsq $__tls_get_addr@pltoff, %rax
3803 addq %r15, %rax
3804 call *%rax
3805 into:
3806 movq %fs:0, %rax
3807 addq foo@gottpoff(%rax), %rax
3808 nopw 0x0(%rax,%rax,1) */
3809 int largepic = 0;
3810 if (ABI_64_P (output_bfd))
3811 {
3812 if (contents[roff + 5] == 0xb8)
3813 {
3814 if (roff < 3
3815 || (roff - 3 + 22) > input_section->size)
3816 goto corrupt_input;
3817 memcpy (contents + roff - 3,
3818 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05"
3819 "\0\0\0\0\x66\x0f\x1f\x44\0", 22);
3820 largepic = 1;
3821 }
3822 else
3823 {
3824 if (roff < 4
3825 || (roff - 4 + 16) > input_section->size)
3826 goto corrupt_input;
3827 memcpy (contents + roff - 4,
3828 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
3829 16);
3830 }
3831 }
3832 else
3833 {
3834 if (roff < 3
3835 || (roff - 3 + 15) > input_section->size)
3836 goto corrupt_input;
3837 memcpy (contents + roff - 3,
3838 "\x64\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
3839 15);
3840 }
3841
3842 relocation = (htab->elf.sgot->output_section->vma
3843 + htab->elf.sgot->output_offset + off
3844 - roff
3845 - largepic
3846 - input_section->output_section->vma
3847 - input_section->output_offset
3848 - 12);
3849 bfd_put_32 (output_bfd, relocation,
3850 contents + roff + 8 + largepic);
3851 /* Skip R_X86_64_PLT32/R_X86_64_PLTOFF64. */
3852 rel++;
3853 wrel++;
3854 continue;
3855 }
3856 else if (r_type == R_X86_64_GOTPC32_TLSDESC)
3857 {
3858 /* GDesc -> IE transition.
3859 It's originally something like:
3860 leaq x@tlsdesc(%rip), %rax <--- LP64 mode.
3861 rex leal x@tlsdesc(%rip), %eax <--- X32 mode.
3862
3863 Change it to:
3864 # before xchg %ax,%ax in LP64 mode.
3865 movq x@gottpoff(%rip), %rax
3866 # before nopl (%rax) in X32 mode.
3867 rex movl x@gottpoff(%rip), %eax
3868 */
3869
3870 /* Now modify the instruction as appropriate. To
3871 turn a lea into a mov in the form we use it, it
3872 suffices to change the second byte from 0x8d to
3873 0x8b. */
3874 if (roff < 2)
3875 goto corrupt_input;
3876 bfd_put_8 (output_bfd, 0x8b, contents + roff - 2);
3877
3878 bfd_put_32 (output_bfd,
3879 htab->elf.sgot->output_section->vma
3880 + htab->elf.sgot->output_offset + off
3881 - rel->r_offset
3882 - input_section->output_section->vma
3883 - input_section->output_offset
3884 - 4,
3885 contents + roff);
3886 continue;
3887 }
3888 else if (r_type == R_X86_64_TLSDESC_CALL)
3889 {
3890 /* GDesc -> IE transition.
3891 It's originally:
3892 call *(%rax) <--- LP64 mode.
3893 call *(%eax) <--- X32 mode.
3894
3895 Change it to:
3896 xchg %ax, %ax <-- LP64 mode.
3897 nopl (%rax) <-- X32 mode.
3898 */
3899
3900 unsigned int prefix = 0;
3901 if (!ABI_64_P (input_bfd))
3902 {
3903 /* Check for call *x@tlsdesc(%eax). */
3904 if (contents[roff] == 0x67)
3905 prefix = 1;
3906 }
3907 if (prefix)
3908 {
3909 bfd_put_8 (output_bfd, 0x0f, contents + roff);
3910 bfd_put_8 (output_bfd, 0x1f, contents + roff + 1);
3911 bfd_put_8 (output_bfd, 0x00, contents + roff + 2);
3912 }
3913 else
3914 {
3915 bfd_put_8 (output_bfd, 0x66, contents + roff);
3916 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3917 }
3918 continue;
3919 }
3920 else
3921 BFD_ASSERT (false);
3922 }
3923 break;
3924
3925 case R_X86_64_TLSLD:
3926 if (! elf_x86_64_tls_transition (info, input_bfd,
3927 input_section, contents,
3928 symtab_hdr, sym_hashes,
3929 &r_type, GOT_UNKNOWN, rel,
3930 relend, h, r_symndx, true))
3931 return false;
3932
3933 if (r_type != R_X86_64_TLSLD)
3934 {
3935 /* LD->LE transition:
3936 leaq foo@tlsld(%rip), %rdi
3937 call __tls_get_addr@PLT
3938 For 64bit, we change it into:
3939 .word 0x6666; .byte 0x66; movq %fs:0, %rax
3940 For 32bit, we change it into:
3941 nopl 0x0(%rax); movl %fs:0, %eax
3942 Or
3943 leaq foo@tlsld(%rip), %rdi;
3944 call *__tls_get_addr@GOTPCREL(%rip)
3945 which may be converted to
3946 addr32 call __tls_get_addr
3947 For 64bit, we change it into:
3948 .word 0x6666; .word 0x6666; movq %fs:0, %rax
3949 For 32bit, we change it into:
3950 nopw 0x0(%rax); movl %fs:0, %eax
3951 For largepic, change:
3952 leaq foo@tlsgd(%rip), %rdi
3953 movabsq $__tls_get_addr@pltoff, %rax
3954 addq %rbx, %rax
3955 call *%rax
3956 into
3957 data16 data16 data16 nopw %cs:0x0(%rax,%rax,1)
3958 movq %fs:0, %eax */
3959
3960 BFD_ASSERT (r_type == R_X86_64_TPOFF32);
3961 if (ABI_64_P (output_bfd))
3962 {
3963 if ((rel->r_offset + 5) >= input_section->size)
3964 goto corrupt_input;
3965 if (contents[rel->r_offset + 5] == 0xb8)
3966 {
3967 if (rel->r_offset < 3
3968 || (rel->r_offset - 3 + 22) > input_section->size)
3969 goto corrupt_input;
3970 memcpy (contents + rel->r_offset - 3,
3971 "\x66\x66\x66\x66\x2e\x0f\x1f\x84\0\0\0\0\0"
3972 "\x64\x48\x8b\x04\x25\0\0\0", 22);
3973 }
3974 else if (contents[rel->r_offset + 4] == 0xff
3975 || contents[rel->r_offset + 4] == 0x67)
3976 {
3977 if (rel->r_offset < 3
3978 || (rel->r_offset - 3 + 13) > input_section->size)
3979 goto corrupt_input;
3980 memcpy (contents + rel->r_offset - 3,
3981 "\x66\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0",
3982 13);
3983
3984 }
3985 else
3986 {
3987 if (rel->r_offset < 3
3988 || (rel->r_offset - 3 + 12) > input_section->size)
3989 goto corrupt_input;
3990 memcpy (contents + rel->r_offset - 3,
3991 "\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0", 12);
3992 }
3993 }
3994 else
3995 {
3996 if ((rel->r_offset + 4) >= input_section->size)
3997 goto corrupt_input;
3998 if (contents[rel->r_offset + 4] == 0xff)
3999 {
4000 if (rel->r_offset < 3
4001 || (rel->r_offset - 3 + 13) > input_section->size)
4002 goto corrupt_input;
4003 memcpy (contents + rel->r_offset - 3,
4004 "\x66\x0f\x1f\x40\x00\x64\x8b\x04\x25\0\0\0",
4005 13);
4006 }
4007 else
4008 {
4009 if (rel->r_offset < 3
4010 || (rel->r_offset - 3 + 12) > input_section->size)
4011 goto corrupt_input;
4012 memcpy (contents + rel->r_offset - 3,
4013 "\x0f\x1f\x40\x00\x64\x8b\x04\x25\0\0\0", 12);
4014 }
4015 }
4016 /* Skip R_X86_64_PC32, R_X86_64_PLT32, R_X86_64_GOTPCRELX
4017 and R_X86_64_PLTOFF64. */
4018 rel++;
4019 wrel++;
4020 continue;
4021 }
4022
4023 if (htab->elf.sgot == NULL)
4024 abort ();
4025
4026 off = htab->tls_ld_or_ldm_got.offset;
4027 if (off & 1)
4028 off &= ~1;
4029 else
4030 {
4031 Elf_Internal_Rela outrel;
4032
4033 if (htab->elf.srelgot == NULL)
4034 abort ();
4035
4036 outrel.r_offset = (htab->elf.sgot->output_section->vma
4037 + htab->elf.sgot->output_offset + off);
4038
4039 bfd_put_64 (output_bfd, 0,
4040 htab->elf.sgot->contents + off);
4041 bfd_put_64 (output_bfd, 0,
4042 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
4043 outrel.r_info = htab->r_info (0, R_X86_64_DTPMOD64);
4044 outrel.r_addend = 0;
4045 elf_append_rela (output_bfd, htab->elf.srelgot,
4046 &outrel);
4047 htab->tls_ld_or_ldm_got.offset |= 1;
4048 }
4049 relocation = htab->elf.sgot->output_section->vma
4050 + htab->elf.sgot->output_offset + off;
4051 unresolved_reloc = false;
4052 break;
4053
4054 case R_X86_64_DTPOFF32:
4055 if (!bfd_link_executable (info)
4056 || (input_section->flags & SEC_CODE) == 0)
4057 relocation -= _bfd_x86_elf_dtpoff_base (info);
4058 else
4059 relocation = elf_x86_64_tpoff (info, relocation);
4060 break;
4061
4062 case R_X86_64_TPOFF32:
4063 case R_X86_64_TPOFF64:
4064 BFD_ASSERT (bfd_link_executable (info));
4065 relocation = elf_x86_64_tpoff (info, relocation);
4066 break;
4067
4068 case R_X86_64_DTPOFF64:
4069 BFD_ASSERT ((input_section->flags & SEC_CODE) == 0);
4070 relocation -= _bfd_x86_elf_dtpoff_base (info);
4071 break;
4072
4073 default:
4074 break;
4075 }
4076
4077 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
4078 because such sections are not SEC_ALLOC and thus ld.so will
4079 not process them. */
4080 if (unresolved_reloc
4081 && !((input_section->flags & SEC_DEBUGGING) != 0
4082 && h->def_dynamic)
4083 && _bfd_elf_section_offset (output_bfd, info, input_section,
4084 rel->r_offset) != (bfd_vma) -1)
4085 {
4086 switch (r_type)
4087 {
4088 case R_X86_64_32S:
4089 sec = h->root.u.def.section;
4090 if ((info->nocopyreloc
4091 || (eh->def_protected
4092 && elf_has_no_copy_on_protected (h->root.u.def.section->owner)))
4093 && !(h->root.u.def.section->flags & SEC_CODE))
4094 return elf_x86_64_need_pic (info, input_bfd, input_section,
4095 h, NULL, NULL, howto);
4096 /* Fall through. */
4097
4098 default:
4099 _bfd_error_handler
4100 /* xgettext:c-format */
4101 (_("%pB(%pA+%#" PRIx64 "): "
4102 "unresolvable %s relocation against symbol `%s'"),
4103 input_bfd,
4104 input_section,
4105 (uint64_t) rel->r_offset,
4106 howto->name,
4107 h->root.root.string);
4108 return false;
4109 }
4110 }
4111
4112 do_relocation:
4113 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4114 contents, rel->r_offset,
4115 relocation, rel->r_addend);
4116
4117 check_relocation_error:
4118 if (r != bfd_reloc_ok)
4119 {
4120 const char *name;
4121
4122 if (h != NULL)
4123 name = h->root.root.string;
4124 else
4125 {
4126 name = bfd_elf_string_from_elf_section (input_bfd,
4127 symtab_hdr->sh_link,
4128 sym->st_name);
4129 if (name == NULL)
4130 return false;
4131 if (*name == '\0')
4132 name = bfd_section_name (sec);
4133 }
4134
4135 if (r == bfd_reloc_overflow)
4136 {
4137 if (converted_reloc)
4138 {
4139 info->callbacks->einfo
4140 ("%X%H:", input_bfd, input_section, rel->r_offset);
4141 info->callbacks->einfo
4142 (_(" failed to convert GOTPCREL relocation against "
4143 "'%s'; relink with --no-relax\n"),
4144 name);
4145 status = false;
4146 continue;
4147 }
4148 (*info->callbacks->reloc_overflow)
4149 (info, (h ? &h->root : NULL), name, howto->name,
4150 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
4151 }
4152 else
4153 {
4154 _bfd_error_handler
4155 /* xgettext:c-format */
4156 (_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
4157 input_bfd, input_section,
4158 (uint64_t) rel->r_offset, name, (int) r);
4159 return false;
4160 }
4161 }
4162
4163 if (wrel != rel)
4164 *wrel = *rel;
4165 }
4166
4167 if (wrel != rel)
4168 {
4169 Elf_Internal_Shdr *rel_hdr;
4170 size_t deleted = rel - wrel;
4171
4172 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
4173 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
4174 if (rel_hdr->sh_size == 0)
4175 {
4176 /* It is too late to remove an empty reloc section. Leave
4177 one NONE reloc.
4178 ??? What is wrong with an empty section??? */
4179 rel_hdr->sh_size = rel_hdr->sh_entsize;
4180 deleted -= 1;
4181 }
4182 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
4183 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
4184 input_section->reloc_count -= deleted;
4185 }
4186
4187 return status;
4188 }
4189
4190 /* Finish up dynamic symbol handling. We set the contents of various
4191 dynamic sections here. */
4192
4193 static bool
4194 elf_x86_64_finish_dynamic_symbol (bfd *output_bfd,
4195 struct bfd_link_info *info,
4196 struct elf_link_hash_entry *h,
4197 Elf_Internal_Sym *sym)
4198 {
4199 struct elf_x86_link_hash_table *htab;
4200 bool use_plt_second;
4201 struct elf_x86_link_hash_entry *eh;
4202 bool local_undefweak;
4203
4204 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
4205 if (htab == NULL)
4206 return false;
4207
4208 /* Use the second PLT section only if there is .plt section. */
4209 use_plt_second = htab->elf.splt != NULL && htab->plt_second != NULL;
4210
4211 eh = (struct elf_x86_link_hash_entry *) h;
4212 if (eh->no_finish_dynamic_symbol)
4213 abort ();
4214
4215 /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for
4216 resolved undefined weak symbols in executable so that their
4217 references have value 0 at run-time. */
4218 local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh);
4219
4220 if (h->plt.offset != (bfd_vma) -1)
4221 {
4222 bfd_vma plt_index;
4223 bfd_vma got_offset, plt_offset;
4224 Elf_Internal_Rela rela;
4225 bfd_byte *loc;
4226 asection *plt, *gotplt, *relplt, *resolved_plt;
4227 const struct elf_backend_data *bed;
4228 bfd_vma plt_got_pcrel_offset;
4229
4230 /* When building a static executable, use .iplt, .igot.plt and
4231 .rela.iplt sections for STT_GNU_IFUNC symbols. */
4232 if (htab->elf.splt != NULL)
4233 {
4234 plt = htab->elf.splt;
4235 gotplt = htab->elf.sgotplt;
4236 relplt = htab->elf.srelplt;
4237 }
4238 else
4239 {
4240 plt = htab->elf.iplt;
4241 gotplt = htab->elf.igotplt;
4242 relplt = htab->elf.irelplt;
4243 }
4244
4245 VERIFY_PLT_ENTRY (info, h, plt, gotplt, relplt, local_undefweak)
4246
4247 /* Get the index in the procedure linkage table which
4248 corresponds to this symbol. This is the index of this symbol
4249 in all the symbols for which we are making plt entries. The
4250 first entry in the procedure linkage table is reserved.
4251
4252 Get the offset into the .got table of the entry that
4253 corresponds to this function. Each .got entry is GOT_ENTRY_SIZE
4254 bytes. The first three are reserved for the dynamic linker.
4255
4256 For static executables, we don't reserve anything. */
4257
4258 if (plt == htab->elf.splt)
4259 {
4260 got_offset = (h->plt.offset / htab->plt.plt_entry_size
4261 - htab->plt.has_plt0);
4262 got_offset = (got_offset + 3) * GOT_ENTRY_SIZE;
4263 }
4264 else
4265 {
4266 got_offset = h->plt.offset / htab->plt.plt_entry_size;
4267 got_offset = got_offset * GOT_ENTRY_SIZE;
4268 }
4269
4270 /* Fill in the entry in the procedure linkage table. */
4271 memcpy (plt->contents + h->plt.offset, htab->plt.plt_entry,
4272 htab->plt.plt_entry_size);
4273 if (use_plt_second)
4274 {
4275 memcpy (htab->plt_second->contents + eh->plt_second.offset,
4276 htab->non_lazy_plt->plt_entry,
4277 htab->non_lazy_plt->plt_entry_size);
4278
4279 resolved_plt = htab->plt_second;
4280 plt_offset = eh->plt_second.offset;
4281 }
4282 else
4283 {
4284 resolved_plt = plt;
4285 plt_offset = h->plt.offset;
4286 }
4287
4288 /* Insert the relocation positions of the plt section. */
4289
4290 /* Put offset the PC-relative instruction referring to the GOT entry,
4291 subtracting the size of that instruction. */
4292 plt_got_pcrel_offset = (gotplt->output_section->vma
4293 + gotplt->output_offset
4294 + got_offset
4295 - resolved_plt->output_section->vma
4296 - resolved_plt->output_offset
4297 - plt_offset
4298 - htab->plt.plt_got_insn_size);
4299
4300 /* Check PC-relative offset overflow in PLT entry. */
4301 if ((plt_got_pcrel_offset + 0x80000000) > 0xffffffff)
4302 /* xgettext:c-format */
4303 info->callbacks->einfo (_("%F%pB: PC-relative offset overflow in PLT entry for `%s'\n"),
4304 output_bfd, h->root.root.string);
4305
4306 bfd_put_32 (output_bfd, plt_got_pcrel_offset,
4307 (resolved_plt->contents + plt_offset
4308 + htab->plt.plt_got_offset));
4309
4310 /* Fill in the entry in the global offset table, initially this
4311 points to the second part of the PLT entry. Leave the entry
4312 as zero for undefined weak symbol in PIE. No PLT relocation
4313 against undefined weak symbol in PIE. */
4314 if (!local_undefweak)
4315 {
4316 if (htab->plt.has_plt0)
4317 bfd_put_64 (output_bfd, (plt->output_section->vma
4318 + plt->output_offset
4319 + h->plt.offset
4320 + htab->lazy_plt->plt_lazy_offset),
4321 gotplt->contents + got_offset);
4322
4323 /* Fill in the entry in the .rela.plt section. */
4324 rela.r_offset = (gotplt->output_section->vma
4325 + gotplt->output_offset
4326 + got_offset);
4327 if (PLT_LOCAL_IFUNC_P (info, h))
4328 {
4329 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
4330 h->root.root.string,
4331 h->root.u.def.section->owner);
4332
4333 /* If an STT_GNU_IFUNC symbol is locally defined, generate
4334 R_X86_64_IRELATIVE instead of R_X86_64_JUMP_SLOT. */
4335 rela.r_info = htab->r_info (0, R_X86_64_IRELATIVE);
4336 rela.r_addend = (h->root.u.def.value
4337 + h->root.u.def.section->output_section->vma
4338 + h->root.u.def.section->output_offset);
4339
4340 if (htab->params->report_relative_reloc)
4341 _bfd_x86_elf_link_report_relative_reloc
4342 (info, relplt, h, sym, "R_X86_64_IRELATIVE", &rela);
4343
4344 /* R_X86_64_IRELATIVE comes last. */
4345 plt_index = htab->next_irelative_index--;
4346 }
4347 else
4348 {
4349 rela.r_info = htab->r_info (h->dynindx, R_X86_64_JUMP_SLOT);
4350 rela.r_addend = 0;
4351 plt_index = htab->next_jump_slot_index++;
4352 }
4353
4354 /* Don't fill the second and third slots in PLT entry for
4355 static executables nor without PLT0. */
4356 if (plt == htab->elf.splt && htab->plt.has_plt0)
4357 {
4358 bfd_vma plt0_offset
4359 = h->plt.offset + htab->lazy_plt->plt_plt_insn_end;
4360
4361 /* Put relocation index. */
4362 bfd_put_32 (output_bfd, plt_index,
4363 (plt->contents + h->plt.offset
4364 + htab->lazy_plt->plt_reloc_offset));
4365
4366 /* Put offset for jmp .PLT0 and check for overflow. We don't
4367 check relocation index for overflow since branch displacement
4368 will overflow first. */
4369 if (plt0_offset > 0x80000000)
4370 /* xgettext:c-format */
4371 info->callbacks->einfo (_("%F%pB: branch displacement overflow in PLT entry for `%s'\n"),
4372 output_bfd, h->root.root.string);
4373 bfd_put_32 (output_bfd, - plt0_offset,
4374 (plt->contents + h->plt.offset
4375 + htab->lazy_plt->plt_plt_offset));
4376 }
4377
4378 bed = get_elf_backend_data (output_bfd);
4379 loc = relplt->contents + plt_index * bed->s->sizeof_rela;
4380 bed->s->swap_reloca_out (output_bfd, &rela, loc);
4381 }
4382 }
4383 else if (eh->plt_got.offset != (bfd_vma) -1)
4384 {
4385 bfd_vma got_offset, plt_offset;
4386 asection *plt, *got;
4387 bool got_after_plt;
4388 int32_t got_pcrel_offset;
4389
4390 /* Set the entry in the GOT procedure linkage table. */
4391 plt = htab->plt_got;
4392 got = htab->elf.sgot;
4393 got_offset = h->got.offset;
4394
4395 if (got_offset == (bfd_vma) -1
4396 || (h->type == STT_GNU_IFUNC && h->def_regular)
4397 || plt == NULL
4398 || got == NULL)
4399 abort ();
4400
4401 /* Use the non-lazy PLT entry template for the GOT PLT since they
4402 are the identical. */
4403 /* Fill in the entry in the GOT procedure linkage table. */
4404 plt_offset = eh->plt_got.offset;
4405 memcpy (plt->contents + plt_offset,
4406 htab->non_lazy_plt->plt_entry,
4407 htab->non_lazy_plt->plt_entry_size);
4408
4409 /* Put offset the PC-relative instruction referring to the GOT
4410 entry, subtracting the size of that instruction. */
4411 got_pcrel_offset = (got->output_section->vma
4412 + got->output_offset
4413 + got_offset
4414 - plt->output_section->vma
4415 - plt->output_offset
4416 - plt_offset
4417 - htab->non_lazy_plt->plt_got_insn_size);
4418
4419 /* Check PC-relative offset overflow in GOT PLT entry. */
4420 got_after_plt = got->output_section->vma > plt->output_section->vma;
4421 if ((got_after_plt && got_pcrel_offset < 0)
4422 || (!got_after_plt && got_pcrel_offset > 0))
4423 /* xgettext:c-format */
4424 info->callbacks->einfo (_("%F%pB: PC-relative offset overflow in GOT PLT entry for `%s'\n"),
4425 output_bfd, h->root.root.string);
4426
4427 bfd_put_32 (output_bfd, got_pcrel_offset,
4428 (plt->contents + plt_offset
4429 + htab->non_lazy_plt->plt_got_offset));
4430 }
4431
4432 if (!local_undefweak
4433 && !h->def_regular
4434 && (h->plt.offset != (bfd_vma) -1
4435 || eh->plt_got.offset != (bfd_vma) -1))
4436 {
4437 /* Mark the symbol as undefined, rather than as defined in
4438 the .plt section. Leave the value if there were any
4439 relocations where pointer equality matters (this is a clue
4440 for the dynamic linker, to make function pointer
4441 comparisons work between an application and shared
4442 library), otherwise set it to zero. If a function is only
4443 called from a binary, there is no need to slow down
4444 shared libraries because of that. */
4445 sym->st_shndx = SHN_UNDEF;
4446 if (!h->pointer_equality_needed)
4447 sym->st_value = 0;
4448 }
4449
4450 _bfd_x86_elf_link_fixup_ifunc_symbol (info, htab, h, sym);
4451
4452 /* Don't generate dynamic GOT relocation against undefined weak
4453 symbol in executable. */
4454 if (h->got.offset != (bfd_vma) -1
4455 && ! GOT_TLS_GD_ANY_P (elf_x86_hash_entry (h)->tls_type)
4456 && elf_x86_hash_entry (h)->tls_type != GOT_TLS_IE
4457 && !local_undefweak)
4458 {
4459 Elf_Internal_Rela rela;
4460 asection *relgot = htab->elf.srelgot;
4461 const char *relative_reloc_name = NULL;
4462 bool generate_dynamic_reloc = true;
4463
4464 /* This symbol has an entry in the global offset table. Set it
4465 up. */
4466 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
4467 abort ();
4468
4469 rela.r_offset = (htab->elf.sgot->output_section->vma
4470 + htab->elf.sgot->output_offset
4471 + (h->got.offset &~ (bfd_vma) 1));
4472
4473 /* If this is a static link, or it is a -Bsymbolic link and the
4474 symbol is defined locally or was forced to be local because
4475 of a version file, we just want to emit a RELATIVE reloc.
4476 The entry in the global offset table will already have been
4477 initialized in the relocate_section function. */
4478 if (h->def_regular
4479 && h->type == STT_GNU_IFUNC)
4480 {
4481 if (h->plt.offset == (bfd_vma) -1)
4482 {
4483 /* STT_GNU_IFUNC is referenced without PLT. */
4484 if (htab->elf.splt == NULL)
4485 {
4486 /* use .rel[a].iplt section to store .got relocations
4487 in static executable. */
4488 relgot = htab->elf.irelplt;
4489 }
4490 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
4491 {
4492 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
4493 h->root.root.string,
4494 h->root.u.def.section->owner);
4495
4496 rela.r_info = htab->r_info (0,
4497 R_X86_64_IRELATIVE);
4498 rela.r_addend = (h->root.u.def.value
4499 + h->root.u.def.section->output_section->vma
4500 + h->root.u.def.section->output_offset);
4501 relative_reloc_name = "R_X86_64_IRELATIVE";
4502 }
4503 else
4504 goto do_glob_dat;
4505 }
4506 else if (bfd_link_pic (info))
4507 {
4508 /* Generate R_X86_64_GLOB_DAT. */
4509 goto do_glob_dat;
4510 }
4511 else
4512 {
4513 asection *plt;
4514 bfd_vma plt_offset;
4515
4516 if (!h->pointer_equality_needed)
4517 abort ();
4518
4519 /* For non-shared object, we can't use .got.plt, which
4520 contains the real function addres if we need pointer
4521 equality. We load the GOT entry with the PLT entry. */
4522 if (htab->plt_second != NULL)
4523 {
4524 plt = htab->plt_second;
4525 plt_offset = eh->plt_second.offset;
4526 }
4527 else
4528 {
4529 plt = htab->elf.splt ? htab->elf.splt : htab->elf.iplt;
4530 plt_offset = h->plt.offset;
4531 }
4532 bfd_put_64 (output_bfd, (plt->output_section->vma
4533 + plt->output_offset
4534 + plt_offset),
4535 htab->elf.sgot->contents + h->got.offset);
4536 return true;
4537 }
4538 }
4539 else if (bfd_link_pic (info)
4540 && SYMBOL_REFERENCES_LOCAL_P (info, h))
4541 {
4542 if (!SYMBOL_DEFINED_NON_SHARED_P (h))
4543 return false;
4544 BFD_ASSERT((h->got.offset & 1) != 0);
4545 if (info->enable_dt_relr)
4546 generate_dynamic_reloc = false;
4547 else
4548 {
4549 rela.r_info = htab->r_info (0, R_X86_64_RELATIVE);
4550 rela.r_addend = (h->root.u.def.value
4551 + h->root.u.def.section->output_section->vma
4552 + h->root.u.def.section->output_offset);
4553 relative_reloc_name = "R_X86_64_RELATIVE";
4554 }
4555 }
4556 else
4557 {
4558 BFD_ASSERT((h->got.offset & 1) == 0);
4559 do_glob_dat:
4560 bfd_put_64 (output_bfd, (bfd_vma) 0,
4561 htab->elf.sgot->contents + h->got.offset);
4562 rela.r_info = htab->r_info (h->dynindx, R_X86_64_GLOB_DAT);
4563 rela.r_addend = 0;
4564 }
4565
4566 if (generate_dynamic_reloc)
4567 {
4568 if (relative_reloc_name != NULL
4569 && htab->params->report_relative_reloc)
4570 _bfd_x86_elf_link_report_relative_reloc
4571 (info, relgot, h, sym, relative_reloc_name, &rela);
4572
4573 elf_append_rela (output_bfd, relgot, &rela);
4574 }
4575 }
4576
4577 if (h->needs_copy)
4578 {
4579 Elf_Internal_Rela rela;
4580 asection *s;
4581
4582 /* This symbol needs a copy reloc. Set it up. */
4583 VERIFY_COPY_RELOC (h, htab)
4584
4585 rela.r_offset = (h->root.u.def.value
4586 + h->root.u.def.section->output_section->vma
4587 + h->root.u.def.section->output_offset);
4588 rela.r_info = htab->r_info (h->dynindx, R_X86_64_COPY);
4589 rela.r_addend = 0;
4590 if (h->root.u.def.section == htab->elf.sdynrelro)
4591 s = htab->elf.sreldynrelro;
4592 else
4593 s = htab->elf.srelbss;
4594 elf_append_rela (output_bfd, s, &rela);
4595 }
4596
4597 return true;
4598 }
4599
4600 /* Finish up local dynamic symbol handling. We set the contents of
4601 various dynamic sections here. */
4602
4603 static int
4604 elf_x86_64_finish_local_dynamic_symbol (void **slot, void *inf)
4605 {
4606 struct elf_link_hash_entry *h
4607 = (struct elf_link_hash_entry *) *slot;
4608 struct bfd_link_info *info
4609 = (struct bfd_link_info *) inf;
4610
4611 return elf_x86_64_finish_dynamic_symbol (info->output_bfd,
4612 info, h, NULL);
4613 }
4614
4615 /* Finish up undefined weak symbol handling in PIE. Fill its PLT entry
4616 here since undefined weak symbol may not be dynamic and may not be
4617 called for elf_x86_64_finish_dynamic_symbol. */
4618
4619 static bool
4620 elf_x86_64_pie_finish_undefweak_symbol (struct bfd_hash_entry *bh,
4621 void *inf)
4622 {
4623 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) bh;
4624 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4625
4626 if (h->root.type != bfd_link_hash_undefweak
4627 || h->dynindx != -1)
4628 return true;
4629
4630 return elf_x86_64_finish_dynamic_symbol (info->output_bfd,
4631 info, h, NULL);
4632 }
4633
4634 /* Used to decide how to sort relocs in an optimal manner for the
4635 dynamic linker, before writing them out. */
4636
4637 static enum elf_reloc_type_class
4638 elf_x86_64_reloc_type_class (const struct bfd_link_info *info,
4639 const asection *rel_sec ATTRIBUTE_UNUSED,
4640 const Elf_Internal_Rela *rela)
4641 {
4642 bfd *abfd = info->output_bfd;
4643 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4644 struct elf_x86_link_hash_table *htab
4645 = elf_x86_hash_table (info, X86_64_ELF_DATA);
4646
4647 if (htab->elf.dynsym != NULL
4648 && htab->elf.dynsym->contents != NULL)
4649 {
4650 /* Check relocation against STT_GNU_IFUNC symbol if there are
4651 dynamic symbols. */
4652 unsigned long r_symndx = htab->r_sym (rela->r_info);
4653 if (r_symndx != STN_UNDEF)
4654 {
4655 Elf_Internal_Sym sym;
4656 if (!bed->s->swap_symbol_in (abfd,
4657 (htab->elf.dynsym->contents
4658 + r_symndx * bed->s->sizeof_sym),
4659 0, &sym))
4660 abort ();
4661
4662 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
4663 return reloc_class_ifunc;
4664 }
4665 }
4666
4667 switch ((int) ELF32_R_TYPE (rela->r_info))
4668 {
4669 case R_X86_64_IRELATIVE:
4670 return reloc_class_ifunc;
4671 case R_X86_64_RELATIVE:
4672 case R_X86_64_RELATIVE64:
4673 return reloc_class_relative;
4674 case R_X86_64_JUMP_SLOT:
4675 return reloc_class_plt;
4676 case R_X86_64_COPY:
4677 return reloc_class_copy;
4678 default:
4679 return reloc_class_normal;
4680 }
4681 }
4682
4683 /* Finish up the dynamic sections. */
4684
4685 static bool
4686 elf_x86_64_finish_dynamic_sections (bfd *output_bfd,
4687 struct bfd_link_info *info)
4688 {
4689 struct elf_x86_link_hash_table *htab;
4690
4691 htab = _bfd_x86_elf_finish_dynamic_sections (output_bfd, info);
4692 if (htab == NULL)
4693 return false;
4694
4695 if (! htab->elf.dynamic_sections_created)
4696 return true;
4697
4698 if (htab->elf.splt && htab->elf.splt->size > 0)
4699 {
4700 if (bfd_is_abs_section (htab->elf.splt->output_section))
4701 {
4702 info->callbacks->einfo
4703 (_("%F%P: discarded output section: `%pA'\n"),
4704 htab->elf.splt);
4705 return false;
4706 }
4707
4708 elf_section_data (htab->elf.splt->output_section)
4709 ->this_hdr.sh_entsize = htab->plt.plt_entry_size;
4710
4711 if (htab->plt.has_plt0)
4712 {
4713 /* Fill in the special first entry in the procedure linkage
4714 table. */
4715 memcpy (htab->elf.splt->contents,
4716 htab->lazy_plt->plt0_entry,
4717 htab->lazy_plt->plt0_entry_size);
4718 /* Add offset for pushq GOT+8(%rip), since the instruction
4719 uses 6 bytes subtract this value. */
4720 bfd_put_32 (output_bfd,
4721 (htab->elf.sgotplt->output_section->vma
4722 + htab->elf.sgotplt->output_offset
4723 + 8
4724 - htab->elf.splt->output_section->vma
4725 - htab->elf.splt->output_offset
4726 - 6),
4727 (htab->elf.splt->contents
4728 + htab->lazy_plt->plt0_got1_offset));
4729 /* Add offset for the PC-relative instruction accessing
4730 GOT+16, subtracting the offset to the end of that
4731 instruction. */
4732 bfd_put_32 (output_bfd,
4733 (htab->elf.sgotplt->output_section->vma
4734 + htab->elf.sgotplt->output_offset
4735 + 16
4736 - htab->elf.splt->output_section->vma
4737 - htab->elf.splt->output_offset
4738 - htab->lazy_plt->plt0_got2_insn_end),
4739 (htab->elf.splt->contents
4740 + htab->lazy_plt->plt0_got2_offset));
4741 }
4742
4743 if (htab->elf.tlsdesc_plt)
4744 {
4745 bfd_put_64 (output_bfd, (bfd_vma) 0,
4746 htab->elf.sgot->contents + htab->elf.tlsdesc_got);
4747
4748 memcpy (htab->elf.splt->contents + htab->elf.tlsdesc_plt,
4749 htab->lazy_plt->plt_tlsdesc_entry,
4750 htab->lazy_plt->plt_tlsdesc_entry_size);
4751
4752 /* Add offset for pushq GOT+8(%rip), since ENDBR64 uses 4
4753 bytes and the instruction uses 6 bytes, subtract these
4754 values. */
4755 bfd_put_32 (output_bfd,
4756 (htab->elf.sgotplt->output_section->vma
4757 + htab->elf.sgotplt->output_offset
4758 + 8
4759 - htab->elf.splt->output_section->vma
4760 - htab->elf.splt->output_offset
4761 - htab->elf.tlsdesc_plt
4762 - htab->lazy_plt->plt_tlsdesc_got1_insn_end),
4763 (htab->elf.splt->contents
4764 + htab->elf.tlsdesc_plt
4765 + htab->lazy_plt->plt_tlsdesc_got1_offset));
4766 /* Add offset for indirect branch via GOT+TDG, where TDG
4767 stands for htab->tlsdesc_got, subtracting the offset
4768 to the end of that instruction. */
4769 bfd_put_32 (output_bfd,
4770 (htab->elf.sgot->output_section->vma
4771 + htab->elf.sgot->output_offset
4772 + htab->elf.tlsdesc_got
4773 - htab->elf.splt->output_section->vma
4774 - htab->elf.splt->output_offset
4775 - htab->elf.tlsdesc_plt
4776 - htab->lazy_plt->plt_tlsdesc_got2_insn_end),
4777 (htab->elf.splt->contents
4778 + htab->elf.tlsdesc_plt
4779 + htab->lazy_plt->plt_tlsdesc_got2_offset));
4780 }
4781 }
4782
4783 /* Fill PLT entries for undefined weak symbols in PIE. */
4784 if (bfd_link_pie (info))
4785 bfd_hash_traverse (&info->hash->table,
4786 elf_x86_64_pie_finish_undefweak_symbol,
4787 info);
4788
4789 return true;
4790 }
4791
4792 /* Fill PLT/GOT entries and allocate dynamic relocations for local
4793 STT_GNU_IFUNC symbols, which aren't in the ELF linker hash table.
4794 It has to be done before elf_link_sort_relocs is called so that
4795 dynamic relocations are properly sorted. */
4796
4797 static bool
4798 elf_x86_64_output_arch_local_syms
4799 (bfd *output_bfd ATTRIBUTE_UNUSED,
4800 struct bfd_link_info *info,
4801 void *flaginfo ATTRIBUTE_UNUSED,
4802 int (*func) (void *, const char *,
4803 Elf_Internal_Sym *,
4804 asection *,
4805 struct elf_link_hash_entry *) ATTRIBUTE_UNUSED)
4806 {
4807 struct elf_x86_link_hash_table *htab
4808 = elf_x86_hash_table (info, X86_64_ELF_DATA);
4809 if (htab == NULL)
4810 return false;
4811
4812 /* Fill PLT and GOT entries for local STT_GNU_IFUNC symbols. */
4813 htab_traverse (htab->loc_hash_table,
4814 elf_x86_64_finish_local_dynamic_symbol,
4815 info);
4816
4817 return true;
4818 }
4819
4820 /* Similar to _bfd_elf_get_synthetic_symtab. Support PLTs with all
4821 dynamic relocations. */
4822
4823 static long
4824 elf_x86_64_get_synthetic_symtab (bfd *abfd,
4825 long symcount ATTRIBUTE_UNUSED,
4826 asymbol **syms ATTRIBUTE_UNUSED,
4827 long dynsymcount,
4828 asymbol **dynsyms,
4829 asymbol **ret)
4830 {
4831 long count, i, n;
4832 int j;
4833 bfd_byte *plt_contents;
4834 long relsize;
4835 const struct elf_x86_lazy_plt_layout *lazy_plt;
4836 const struct elf_x86_non_lazy_plt_layout *non_lazy_plt;
4837 const struct elf_x86_lazy_plt_layout *lazy_bnd_plt;
4838 const struct elf_x86_non_lazy_plt_layout *non_lazy_bnd_plt;
4839 const struct elf_x86_lazy_plt_layout *lazy_ibt_plt;
4840 const struct elf_x86_non_lazy_plt_layout *non_lazy_ibt_plt;
4841 asection *plt;
4842 enum elf_x86_plt_type plt_type;
4843 struct elf_x86_plt plts[] =
4844 {
4845 { ".plt", NULL, NULL, plt_unknown, 0, 0, 0, 0 },
4846 { ".plt.got", NULL, NULL, plt_non_lazy, 0, 0, 0, 0 },
4847 { ".plt.sec", NULL, NULL, plt_second, 0, 0, 0, 0 },
4848 { ".plt.bnd", NULL, NULL, plt_second, 0, 0, 0, 0 },
4849 { NULL, NULL, NULL, plt_non_lazy, 0, 0, 0, 0 }
4850 };
4851
4852 *ret = NULL;
4853
4854 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
4855 return 0;
4856
4857 if (dynsymcount <= 0)
4858 return 0;
4859
4860 relsize = bfd_get_dynamic_reloc_upper_bound (abfd);
4861 if (relsize <= 0)
4862 return -1;
4863
4864 lazy_plt = &elf_x86_64_lazy_plt;
4865 non_lazy_plt = &elf_x86_64_non_lazy_plt;
4866 lazy_bnd_plt = &elf_x86_64_lazy_bnd_plt;
4867 non_lazy_bnd_plt = &elf_x86_64_non_lazy_bnd_plt;
4868 if (ABI_64_P (abfd))
4869 {
4870 lazy_ibt_plt = &elf_x86_64_lazy_ibt_plt;
4871 non_lazy_ibt_plt = &elf_x86_64_non_lazy_ibt_plt;
4872 }
4873 else
4874 {
4875 lazy_ibt_plt = &elf_x32_lazy_ibt_plt;
4876 non_lazy_ibt_plt = &elf_x32_non_lazy_ibt_plt;
4877 }
4878
4879 count = 0;
4880 for (j = 0; plts[j].name != NULL; j++)
4881 {
4882 plt = bfd_get_section_by_name (abfd, plts[j].name);
4883 if (plt == NULL || plt->size == 0)
4884 continue;
4885
4886 /* Get the PLT section contents. */
4887 if (!bfd_malloc_and_get_section (abfd, plt, &plt_contents))
4888 break;
4889
4890 /* Check what kind of PLT it is. */
4891 plt_type = plt_unknown;
4892 if (plts[j].type == plt_unknown
4893 && (plt->size >= (lazy_plt->plt_entry_size
4894 + lazy_plt->plt_entry_size)))
4895 {
4896 /* Match lazy PLT first. Need to check the first two
4897 instructions. */
4898 if ((memcmp (plt_contents, lazy_plt->plt0_entry,
4899 lazy_plt->plt0_got1_offset) == 0)
4900 && (memcmp (plt_contents + 6, lazy_plt->plt0_entry + 6,
4901 2) == 0))
4902 plt_type = plt_lazy;
4903 else if (lazy_bnd_plt != NULL
4904 && (memcmp (plt_contents, lazy_bnd_plt->plt0_entry,
4905 lazy_bnd_plt->plt0_got1_offset) == 0)
4906 && (memcmp (plt_contents + 6,
4907 lazy_bnd_plt->plt0_entry + 6, 3) == 0))
4908 {
4909 plt_type = plt_lazy | plt_second;
4910 /* The fist entry in the lazy IBT PLT is the same as the
4911 lazy BND PLT. */
4912 if ((memcmp (plt_contents + lazy_ibt_plt->plt_entry_size,
4913 lazy_ibt_plt->plt_entry,
4914 lazy_ibt_plt->plt_got_offset) == 0))
4915 lazy_plt = lazy_ibt_plt;
4916 else
4917 lazy_plt = lazy_bnd_plt;
4918 }
4919 }
4920
4921 if (non_lazy_plt != NULL
4922 && (plt_type == plt_unknown || plt_type == plt_non_lazy)
4923 && plt->size >= non_lazy_plt->plt_entry_size)
4924 {
4925 /* Match non-lazy PLT. */
4926 if (memcmp (plt_contents, non_lazy_plt->plt_entry,
4927 non_lazy_plt->plt_got_offset) == 0)
4928 plt_type = plt_non_lazy;
4929 }
4930
4931 if (plt_type == plt_unknown || plt_type == plt_second)
4932 {
4933 if (non_lazy_bnd_plt != NULL
4934 && plt->size >= non_lazy_bnd_plt->plt_entry_size
4935 && (memcmp (plt_contents, non_lazy_bnd_plt->plt_entry,
4936 non_lazy_bnd_plt->plt_got_offset) == 0))
4937 {
4938 /* Match BND PLT. */
4939 plt_type = plt_second;
4940 non_lazy_plt = non_lazy_bnd_plt;
4941 }
4942 else if (non_lazy_ibt_plt != NULL
4943 && plt->size >= non_lazy_ibt_plt->plt_entry_size
4944 && (memcmp (plt_contents,
4945 non_lazy_ibt_plt->plt_entry,
4946 non_lazy_ibt_plt->plt_got_offset) == 0))
4947 {
4948 /* Match IBT PLT. */
4949 plt_type = plt_second;
4950 non_lazy_plt = non_lazy_ibt_plt;
4951 }
4952 }
4953
4954 if (plt_type == plt_unknown)
4955 {
4956 free (plt_contents);
4957 continue;
4958 }
4959
4960 plts[j].sec = plt;
4961 plts[j].type = plt_type;
4962
4963 if ((plt_type & plt_lazy))
4964 {
4965 plts[j].plt_got_offset = lazy_plt->plt_got_offset;
4966 plts[j].plt_got_insn_size = lazy_plt->plt_got_insn_size;
4967 plts[j].plt_entry_size = lazy_plt->plt_entry_size;
4968 /* Skip PLT0 in lazy PLT. */
4969 i = 1;
4970 }
4971 else
4972 {
4973 plts[j].plt_got_offset = non_lazy_plt->plt_got_offset;
4974 plts[j].plt_got_insn_size = non_lazy_plt->plt_got_insn_size;
4975 plts[j].plt_entry_size = non_lazy_plt->plt_entry_size;
4976 i = 0;
4977 }
4978
4979 /* Skip lazy PLT when the second PLT is used. */
4980 if (plt_type == (plt_lazy | plt_second))
4981 plts[j].count = 0;
4982 else
4983 {
4984 n = plt->size / plts[j].plt_entry_size;
4985 plts[j].count = n;
4986 count += n - i;
4987 }
4988
4989 plts[j].contents = plt_contents;
4990 }
4991
4992 return _bfd_x86_elf_get_synthetic_symtab (abfd, count, relsize,
4993 (bfd_vma) 0, plts, dynsyms,
4994 ret);
4995 }
4996
4997 /* Handle an x86-64 specific section when reading an object file. This
4998 is called when elfcode.h finds a section with an unknown type. */
4999
5000 static bool
5001 elf_x86_64_section_from_shdr (bfd *abfd, Elf_Internal_Shdr *hdr,
5002 const char *name, int shindex)
5003 {
5004 if (hdr->sh_type != SHT_X86_64_UNWIND)
5005 return false;
5006
5007 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
5008 return false;
5009
5010 return true;
5011 }
5012
5013 /* Hook called by the linker routine which adds symbols from an object
5014 file. We use it to put SHN_X86_64_LCOMMON items in .lbss, instead
5015 of .bss. */
5016
5017 static bool
5018 elf_x86_64_add_symbol_hook (bfd *abfd,
5019 struct bfd_link_info *info ATTRIBUTE_UNUSED,
5020 Elf_Internal_Sym *sym,
5021 const char **namep ATTRIBUTE_UNUSED,
5022 flagword *flagsp ATTRIBUTE_UNUSED,
5023 asection **secp,
5024 bfd_vma *valp)
5025 {
5026 asection *lcomm;
5027
5028 switch (sym->st_shndx)
5029 {
5030 case SHN_X86_64_LCOMMON:
5031 lcomm = bfd_get_section_by_name (abfd, "LARGE_COMMON");
5032 if (lcomm == NULL)
5033 {
5034 lcomm = bfd_make_section_with_flags (abfd,
5035 "LARGE_COMMON",
5036 (SEC_ALLOC
5037 | SEC_IS_COMMON
5038 | SEC_LINKER_CREATED));
5039 if (lcomm == NULL)
5040 return false;
5041 elf_section_flags (lcomm) |= SHF_X86_64_LARGE;
5042 }
5043 *secp = lcomm;
5044 *valp = sym->st_size;
5045 return true;
5046 }
5047
5048 return true;
5049 }
5050
5051
5052 /* Given a BFD section, try to locate the corresponding ELF section
5053 index. */
5054
5055 static bool
5056 elf_x86_64_elf_section_from_bfd_section (bfd *abfd ATTRIBUTE_UNUSED,
5057 asection *sec, int *index_return)
5058 {
5059 if (sec == &_bfd_elf_large_com_section)
5060 {
5061 *index_return = SHN_X86_64_LCOMMON;
5062 return true;
5063 }
5064 return false;
5065 }
5066
5067 /* Process a symbol. */
5068
5069 static void
5070 elf_x86_64_symbol_processing (bfd *abfd ATTRIBUTE_UNUSED,
5071 asymbol *asym)
5072 {
5073 elf_symbol_type *elfsym = (elf_symbol_type *) asym;
5074
5075 switch (elfsym->internal_elf_sym.st_shndx)
5076 {
5077 case SHN_X86_64_LCOMMON:
5078 asym->section = &_bfd_elf_large_com_section;
5079 asym->value = elfsym->internal_elf_sym.st_size;
5080 /* Common symbol doesn't set BSF_GLOBAL. */
5081 asym->flags &= ~BSF_GLOBAL;
5082 break;
5083 }
5084 }
5085
5086 static bool
5087 elf_x86_64_common_definition (Elf_Internal_Sym *sym)
5088 {
5089 return (sym->st_shndx == SHN_COMMON
5090 || sym->st_shndx == SHN_X86_64_LCOMMON);
5091 }
5092
5093 static unsigned int
5094 elf_x86_64_common_section_index (asection *sec)
5095 {
5096 if ((elf_section_flags (sec) & SHF_X86_64_LARGE) == 0)
5097 return SHN_COMMON;
5098 else
5099 return SHN_X86_64_LCOMMON;
5100 }
5101
5102 static asection *
5103 elf_x86_64_common_section (asection *sec)
5104 {
5105 if ((elf_section_flags (sec) & SHF_X86_64_LARGE) == 0)
5106 return bfd_com_section_ptr;
5107 else
5108 return &_bfd_elf_large_com_section;
5109 }
5110
5111 static bool
5112 elf_x86_64_merge_symbol (struct elf_link_hash_entry *h,
5113 const Elf_Internal_Sym *sym,
5114 asection **psec,
5115 bool newdef,
5116 bool olddef,
5117 bfd *oldbfd,
5118 const asection *oldsec)
5119 {
5120 /* A normal common symbol and a large common symbol result in a
5121 normal common symbol. We turn the large common symbol into a
5122 normal one. */
5123 if (!olddef
5124 && h->root.type == bfd_link_hash_common
5125 && !newdef
5126 && bfd_is_com_section (*psec)
5127 && oldsec != *psec)
5128 {
5129 if (sym->st_shndx == SHN_COMMON
5130 && (elf_section_flags (oldsec) & SHF_X86_64_LARGE) != 0)
5131 {
5132 h->root.u.c.p->section
5133 = bfd_make_section_old_way (oldbfd, "COMMON");
5134 h->root.u.c.p->section->flags = SEC_ALLOC;
5135 }
5136 else if (sym->st_shndx == SHN_X86_64_LCOMMON
5137 && (elf_section_flags (oldsec) & SHF_X86_64_LARGE) == 0)
5138 *psec = bfd_com_section_ptr;
5139 }
5140
5141 return true;
5142 }
5143
5144 static int
5145 elf_x86_64_additional_program_headers (bfd *abfd,
5146 struct bfd_link_info *info ATTRIBUTE_UNUSED)
5147 {
5148 asection *s;
5149 int count = 0;
5150
5151 /* Check to see if we need a large readonly segment. */
5152 s = bfd_get_section_by_name (abfd, ".lrodata");
5153 if (s && (s->flags & SEC_LOAD))
5154 count++;
5155
5156 /* Check to see if we need a large data segment. Since .lbss sections
5157 is placed right after the .bss section, there should be no need for
5158 a large data segment just because of .lbss. */
5159 s = bfd_get_section_by_name (abfd, ".ldata");
5160 if (s && (s->flags & SEC_LOAD))
5161 count++;
5162
5163 return count;
5164 }
5165
5166 /* Return TRUE iff relocations for INPUT are compatible with OUTPUT. */
5167
5168 static bool
5169 elf_x86_64_relocs_compatible (const bfd_target *input,
5170 const bfd_target *output)
5171 {
5172 return ((xvec_get_elf_backend_data (input)->s->elfclass
5173 == xvec_get_elf_backend_data (output)->s->elfclass)
5174 && _bfd_elf_relocs_compatible (input, output));
5175 }
5176
5177 /* Set up x86-64 GNU properties. Return the first relocatable ELF input
5178 with GNU properties if found. Otherwise, return NULL. */
5179
5180 static bfd *
5181 elf_x86_64_link_setup_gnu_properties (struct bfd_link_info *info)
5182 {
5183 struct elf_x86_init_table init_table;
5184 const struct elf_backend_data *bed;
5185 struct elf_x86_link_hash_table *htab;
5186
5187 if ((int) R_X86_64_standard >= (int) R_X86_64_converted_reloc_bit
5188 || (int) R_X86_64_max <= (int) R_X86_64_converted_reloc_bit
5189 || ((int) (R_X86_64_GNU_VTINHERIT | R_X86_64_converted_reloc_bit)
5190 != (int) R_X86_64_GNU_VTINHERIT)
5191 || ((int) (R_X86_64_GNU_VTENTRY | R_X86_64_converted_reloc_bit)
5192 != (int) R_X86_64_GNU_VTENTRY))
5193 abort ();
5194
5195 /* This is unused for x86-64. */
5196 init_table.plt0_pad_byte = 0x90;
5197
5198 bed = get_elf_backend_data (info->output_bfd);
5199 htab = elf_x86_hash_table (info, bed->target_id);
5200 if (!htab)
5201 abort ();
5202 if (htab->params->bndplt)
5203 {
5204 init_table.lazy_plt = &elf_x86_64_lazy_bnd_plt;
5205 init_table.non_lazy_plt = &elf_x86_64_non_lazy_bnd_plt;
5206 }
5207 else
5208 {
5209 init_table.lazy_plt = &elf_x86_64_lazy_plt;
5210 init_table.non_lazy_plt = &elf_x86_64_non_lazy_plt;
5211 }
5212
5213 if (ABI_64_P (info->output_bfd))
5214 {
5215 init_table.lazy_ibt_plt = &elf_x86_64_lazy_ibt_plt;
5216 init_table.non_lazy_ibt_plt = &elf_x86_64_non_lazy_ibt_plt;
5217 }
5218 else
5219 {
5220 init_table.lazy_ibt_plt = &elf_x32_lazy_ibt_plt;
5221 init_table.non_lazy_ibt_plt = &elf_x32_non_lazy_ibt_plt;
5222 }
5223
5224 if (ABI_64_P (info->output_bfd))
5225 {
5226 init_table.r_info = elf64_r_info;
5227 init_table.r_sym = elf64_r_sym;
5228 }
5229 else
5230 {
5231 init_table.r_info = elf32_r_info;
5232 init_table.r_sym = elf32_r_sym;
5233 }
5234
5235 return _bfd_x86_elf_link_setup_gnu_properties (info, &init_table);
5236 }
5237
5238 static const struct bfd_elf_special_section
5239 elf_x86_64_special_sections[]=
5240 {
5241 { STRING_COMMA_LEN (".gnu.linkonce.lb"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5242 { STRING_COMMA_LEN (".gnu.linkonce.lr"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_X86_64_LARGE},
5243 { STRING_COMMA_LEN (".gnu.linkonce.lt"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR + SHF_X86_64_LARGE},
5244 { STRING_COMMA_LEN (".lbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5245 { STRING_COMMA_LEN (".ldata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5246 { STRING_COMMA_LEN (".lrodata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_X86_64_LARGE},
5247 { NULL, 0, 0, 0, 0 }
5248 };
5249
5250 #define TARGET_LITTLE_SYM x86_64_elf64_vec
5251 #define TARGET_LITTLE_NAME "elf64-x86-64"
5252 #define ELF_ARCH bfd_arch_i386
5253 #define ELF_TARGET_ID X86_64_ELF_DATA
5254 #define ELF_MACHINE_CODE EM_X86_64
5255 #if DEFAULT_LD_Z_SEPARATE_CODE
5256 # define ELF_MAXPAGESIZE 0x1000
5257 #else
5258 # define ELF_MAXPAGESIZE 0x200000
5259 #endif
5260 #define ELF_COMMONPAGESIZE 0x1000
5261
5262 #define elf_backend_can_gc_sections 1
5263 #define elf_backend_can_refcount 1
5264 #define elf_backend_want_got_plt 1
5265 #define elf_backend_plt_readonly 1
5266 #define elf_backend_want_plt_sym 0
5267 #define elf_backend_got_header_size (GOT_ENTRY_SIZE*3)
5268 #define elf_backend_rela_normal 1
5269 #define elf_backend_plt_alignment 4
5270 #define elf_backend_extern_protected_data 1
5271 #define elf_backend_caches_rawsize 1
5272 #define elf_backend_dtrel_excludes_plt 1
5273 #define elf_backend_want_dynrelro 1
5274
5275 #define elf_info_to_howto elf_x86_64_info_to_howto
5276
5277 #define bfd_elf64_bfd_reloc_type_lookup elf_x86_64_reloc_type_lookup
5278 #define bfd_elf64_bfd_reloc_name_lookup \
5279 elf_x86_64_reloc_name_lookup
5280
5281 #define elf_backend_relocs_compatible elf_x86_64_relocs_compatible
5282 #define elf_backend_always_size_sections elf_x86_64_always_size_sections
5283 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
5284 #define elf_backend_finish_dynamic_sections elf_x86_64_finish_dynamic_sections
5285 #define elf_backend_finish_dynamic_symbol elf_x86_64_finish_dynamic_symbol
5286 #define elf_backend_output_arch_local_syms elf_x86_64_output_arch_local_syms
5287 #define elf_backend_grok_prstatus elf_x86_64_grok_prstatus
5288 #define elf_backend_grok_psinfo elf_x86_64_grok_psinfo
5289 #ifdef CORE_HEADER
5290 #define elf_backend_write_core_note elf_x86_64_write_core_note
5291 #endif
5292 #define elf_backend_reloc_type_class elf_x86_64_reloc_type_class
5293 #define elf_backend_relocate_section elf_x86_64_relocate_section
5294 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
5295 #define elf_backend_object_p elf64_x86_64_elf_object_p
5296 #define bfd_elf64_get_synthetic_symtab elf_x86_64_get_synthetic_symtab
5297
5298 #define elf_backend_section_from_shdr \
5299 elf_x86_64_section_from_shdr
5300
5301 #define elf_backend_section_from_bfd_section \
5302 elf_x86_64_elf_section_from_bfd_section
5303 #define elf_backend_add_symbol_hook \
5304 elf_x86_64_add_symbol_hook
5305 #define elf_backend_symbol_processing \
5306 elf_x86_64_symbol_processing
5307 #define elf_backend_common_section_index \
5308 elf_x86_64_common_section_index
5309 #define elf_backend_common_section \
5310 elf_x86_64_common_section
5311 #define elf_backend_common_definition \
5312 elf_x86_64_common_definition
5313 #define elf_backend_merge_symbol \
5314 elf_x86_64_merge_symbol
5315 #define elf_backend_special_sections \
5316 elf_x86_64_special_sections
5317 #define elf_backend_additional_program_headers \
5318 elf_x86_64_additional_program_headers
5319 #define elf_backend_setup_gnu_properties \
5320 elf_x86_64_link_setup_gnu_properties
5321 #define elf_backend_hide_symbol \
5322 _bfd_x86_elf_hide_symbol
5323
5324 #undef elf64_bed
5325 #define elf64_bed elf64_x86_64_bed
5326
5327 #include "elf64-target.h"
5328
5329 /* CloudABI support. */
5330
5331 #undef TARGET_LITTLE_SYM
5332 #define TARGET_LITTLE_SYM x86_64_elf64_cloudabi_vec
5333 #undef TARGET_LITTLE_NAME
5334 #define TARGET_LITTLE_NAME "elf64-x86-64-cloudabi"
5335
5336 #undef ELF_OSABI
5337 #define ELF_OSABI ELFOSABI_CLOUDABI
5338
5339 #undef elf64_bed
5340 #define elf64_bed elf64_x86_64_cloudabi_bed
5341
5342 #include "elf64-target.h"
5343
5344 /* FreeBSD support. */
5345
5346 #undef TARGET_LITTLE_SYM
5347 #define TARGET_LITTLE_SYM x86_64_elf64_fbsd_vec
5348 #undef TARGET_LITTLE_NAME
5349 #define TARGET_LITTLE_NAME "elf64-x86-64-freebsd"
5350
5351 #undef ELF_OSABI
5352 #define ELF_OSABI ELFOSABI_FREEBSD
5353
5354 #undef elf64_bed
5355 #define elf64_bed elf64_x86_64_fbsd_bed
5356
5357 #include "elf64-target.h"
5358
5359 /* Solaris 2 support. */
5360
5361 #undef TARGET_LITTLE_SYM
5362 #define TARGET_LITTLE_SYM x86_64_elf64_sol2_vec
5363 #undef TARGET_LITTLE_NAME
5364 #define TARGET_LITTLE_NAME "elf64-x86-64-sol2"
5365
5366 #undef ELF_TARGET_OS
5367 #define ELF_TARGET_OS is_solaris
5368
5369 /* Restore default: we cannot use ELFOSABI_SOLARIS, otherwise ELFOSABI_NONE
5370 objects won't be recognized. */
5371 #undef ELF_OSABI
5372
5373 #undef elf64_bed
5374 #define elf64_bed elf64_x86_64_sol2_bed
5375
5376 /* The 64-bit static TLS arena size is rounded to the nearest 16-byte
5377 boundary. */
5378 #undef elf_backend_static_tls_alignment
5379 #define elf_backend_static_tls_alignment 16
5380
5381 /* The Solaris 2 ABI requires a plt symbol on all platforms.
5382
5383 Cf. Linker and Libraries Guide, Ch. 2, Link-Editor, Generating the Output
5384 File, p.63. */
5385 #undef elf_backend_want_plt_sym
5386 #define elf_backend_want_plt_sym 1
5387
5388 #undef elf_backend_strtab_flags
5389 #define elf_backend_strtab_flags SHF_STRINGS
5390
5391 static bool
5392 elf64_x86_64_copy_solaris_special_section_fields (const bfd *ibfd ATTRIBUTE_UNUSED,
5393 bfd *obfd ATTRIBUTE_UNUSED,
5394 const Elf_Internal_Shdr *isection ATTRIBUTE_UNUSED,
5395 Elf_Internal_Shdr *osection ATTRIBUTE_UNUSED)
5396 {
5397 /* PR 19938: FIXME: Need to add code for setting the sh_info
5398 and sh_link fields of Solaris specific section types. */
5399 return false;
5400 }
5401
5402 #undef elf_backend_copy_special_section_fields
5403 #define elf_backend_copy_special_section_fields elf64_x86_64_copy_solaris_special_section_fields
5404
5405 #include "elf64-target.h"
5406
5407 /* Restore defaults. */
5408 #undef ELF_OSABI
5409 #undef elf_backend_static_tls_alignment
5410 #undef elf_backend_want_plt_sym
5411 #define elf_backend_want_plt_sym 0
5412 #undef elf_backend_strtab_flags
5413 #undef elf_backend_copy_special_section_fields
5414
5415 /* 32bit x86-64 support. */
5416
5417 #undef TARGET_LITTLE_SYM
5418 #define TARGET_LITTLE_SYM x86_64_elf32_vec
5419 #undef TARGET_LITTLE_NAME
5420 #define TARGET_LITTLE_NAME "elf32-x86-64"
5421 #undef elf32_bed
5422 #define elf32_bed elf32_x86_64_bed
5423
5424 #undef ELF_ARCH
5425 #define ELF_ARCH bfd_arch_i386
5426
5427 #undef ELF_MACHINE_CODE
5428 #define ELF_MACHINE_CODE EM_X86_64
5429
5430 #undef ELF_TARGET_OS
5431 #undef ELF_OSABI
5432
5433 #define bfd_elf32_bfd_reloc_type_lookup \
5434 elf_x86_64_reloc_type_lookup
5435 #define bfd_elf32_bfd_reloc_name_lookup \
5436 elf_x86_64_reloc_name_lookup
5437 #define bfd_elf32_get_synthetic_symtab \
5438 elf_x86_64_get_synthetic_symtab
5439
5440 #undef elf_backend_object_p
5441 #define elf_backend_object_p \
5442 elf32_x86_64_elf_object_p
5443
5444 #undef elf_backend_bfd_from_remote_memory
5445 #define elf_backend_bfd_from_remote_memory \
5446 _bfd_elf32_bfd_from_remote_memory
5447
5448 #undef elf_backend_size_info
5449 #define elf_backend_size_info \
5450 _bfd_elf32_size_info
5451
5452 #include "elf32-target.h"