]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf64-x86-64.c
x86: Properly handle function pointer reference
[thirdparty/binutils-gdb.git] / bfd / elf64-x86-64.c
1 /* X86-64 specific support for ELF
2 Copyright (C) 2000-2022 Free Software Foundation, Inc.
3 Contributed by Jan Hubicka <jh@suse.cz>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "elfxx-x86.h"
23 #include "dwarf2.h"
24 #include "libiberty.h"
25
26 #include "opcode/i386.h"
27
28 #ifdef CORE_HEADER
29 #include <stdarg.h>
30 #include CORE_HEADER
31 #endif
32
33 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value. */
34 #define MINUS_ONE (~ (bfd_vma) 0)
35
36 /* Since both 32-bit and 64-bit x86-64 encode relocation type in the
37 identical manner, we use ELF32_R_TYPE instead of ELF64_R_TYPE to get
38 relocation type. We also use ELF_ST_TYPE instead of ELF64_ST_TYPE
39 since they are the same. */
40
41 /* The relocation "howto" table. Order of fields:
42 type, rightshift, size, bitsize, pc_relative, bitpos, complain_on_overflow,
43 special_function, name, partial_inplace, src_mask, dst_mask, pcrel_offset. */
44 static reloc_howto_type x86_64_elf_howto_table[] =
45 {
46 HOWTO(R_X86_64_NONE, 0, 3, 0, false, 0, complain_overflow_dont,
47 bfd_elf_generic_reloc, "R_X86_64_NONE", false, 0, 0x00000000,
48 false),
49 HOWTO(R_X86_64_64, 0, 4, 64, false, 0, complain_overflow_dont,
50 bfd_elf_generic_reloc, "R_X86_64_64", false, 0, MINUS_ONE,
51 false),
52 HOWTO(R_X86_64_PC32, 0, 2, 32, true, 0, complain_overflow_signed,
53 bfd_elf_generic_reloc, "R_X86_64_PC32", false, 0, 0xffffffff,
54 true),
55 HOWTO(R_X86_64_GOT32, 0, 2, 32, false, 0, complain_overflow_signed,
56 bfd_elf_generic_reloc, "R_X86_64_GOT32", false, 0, 0xffffffff,
57 false),
58 HOWTO(R_X86_64_PLT32, 0, 2, 32, true, 0, complain_overflow_signed,
59 bfd_elf_generic_reloc, "R_X86_64_PLT32", false, 0, 0xffffffff,
60 true),
61 HOWTO(R_X86_64_COPY, 0, 2, 32, false, 0, complain_overflow_bitfield,
62 bfd_elf_generic_reloc, "R_X86_64_COPY", false, 0, 0xffffffff,
63 false),
64 HOWTO(R_X86_64_GLOB_DAT, 0, 4, 64, false, 0, complain_overflow_dont,
65 bfd_elf_generic_reloc, "R_X86_64_GLOB_DAT", false, 0, MINUS_ONE,
66 false),
67 HOWTO(R_X86_64_JUMP_SLOT, 0, 4, 64, false, 0, complain_overflow_dont,
68 bfd_elf_generic_reloc, "R_X86_64_JUMP_SLOT", false, 0, MINUS_ONE,
69 false),
70 HOWTO(R_X86_64_RELATIVE, 0, 4, 64, false, 0, complain_overflow_dont,
71 bfd_elf_generic_reloc, "R_X86_64_RELATIVE", false, 0, MINUS_ONE,
72 false),
73 HOWTO(R_X86_64_GOTPCREL, 0, 2, 32, true, 0, complain_overflow_signed,
74 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL", false, 0, 0xffffffff,
75 true),
76 HOWTO(R_X86_64_32, 0, 2, 32, false, 0, complain_overflow_unsigned,
77 bfd_elf_generic_reloc, "R_X86_64_32", false, 0, 0xffffffff,
78 false),
79 HOWTO(R_X86_64_32S, 0, 2, 32, false, 0, complain_overflow_signed,
80 bfd_elf_generic_reloc, "R_X86_64_32S", false, 0, 0xffffffff,
81 false),
82 HOWTO(R_X86_64_16, 0, 1, 16, false, 0, complain_overflow_bitfield,
83 bfd_elf_generic_reloc, "R_X86_64_16", false, 0, 0xffff, false),
84 HOWTO(R_X86_64_PC16, 0, 1, 16, true, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_X86_64_PC16", false, 0, 0xffff, true),
86 HOWTO(R_X86_64_8, 0, 0, 8, false, 0, complain_overflow_bitfield,
87 bfd_elf_generic_reloc, "R_X86_64_8", false, 0, 0xff, false),
88 HOWTO(R_X86_64_PC8, 0, 0, 8, true, 0, complain_overflow_signed,
89 bfd_elf_generic_reloc, "R_X86_64_PC8", false, 0, 0xff, true),
90 HOWTO(R_X86_64_DTPMOD64, 0, 4, 64, false, 0, complain_overflow_dont,
91 bfd_elf_generic_reloc, "R_X86_64_DTPMOD64", false, 0, MINUS_ONE,
92 false),
93 HOWTO(R_X86_64_DTPOFF64, 0, 4, 64, false, 0, complain_overflow_dont,
94 bfd_elf_generic_reloc, "R_X86_64_DTPOFF64", false, 0, MINUS_ONE,
95 false),
96 HOWTO(R_X86_64_TPOFF64, 0, 4, 64, false, 0, complain_overflow_dont,
97 bfd_elf_generic_reloc, "R_X86_64_TPOFF64", false, 0, MINUS_ONE,
98 false),
99 HOWTO(R_X86_64_TLSGD, 0, 2, 32, true, 0, complain_overflow_signed,
100 bfd_elf_generic_reloc, "R_X86_64_TLSGD", false, 0, 0xffffffff,
101 true),
102 HOWTO(R_X86_64_TLSLD, 0, 2, 32, true, 0, complain_overflow_signed,
103 bfd_elf_generic_reloc, "R_X86_64_TLSLD", false, 0, 0xffffffff,
104 true),
105 HOWTO(R_X86_64_DTPOFF32, 0, 2, 32, false, 0, complain_overflow_signed,
106 bfd_elf_generic_reloc, "R_X86_64_DTPOFF32", false, 0, 0xffffffff,
107 false),
108 HOWTO(R_X86_64_GOTTPOFF, 0, 2, 32, true, 0, complain_overflow_signed,
109 bfd_elf_generic_reloc, "R_X86_64_GOTTPOFF", false, 0, 0xffffffff,
110 true),
111 HOWTO(R_X86_64_TPOFF32, 0, 2, 32, false, 0, complain_overflow_signed,
112 bfd_elf_generic_reloc, "R_X86_64_TPOFF32", false, 0, 0xffffffff,
113 false),
114 HOWTO(R_X86_64_PC64, 0, 4, 64, true, 0, complain_overflow_dont,
115 bfd_elf_generic_reloc, "R_X86_64_PC64", false, 0, MINUS_ONE,
116 true),
117 HOWTO(R_X86_64_GOTOFF64, 0, 4, 64, false, 0, complain_overflow_dont,
118 bfd_elf_generic_reloc, "R_X86_64_GOTOFF64", false, 0, MINUS_ONE,
119 false),
120 HOWTO(R_X86_64_GOTPC32, 0, 2, 32, true, 0, complain_overflow_signed,
121 bfd_elf_generic_reloc, "R_X86_64_GOTPC32", false, 0, 0xffffffff,
122 true),
123 HOWTO(R_X86_64_GOT64, 0, 4, 64, false, 0, complain_overflow_signed,
124 bfd_elf_generic_reloc, "R_X86_64_GOT64", false, 0, MINUS_ONE,
125 false),
126 HOWTO(R_X86_64_GOTPCREL64, 0, 4, 64, true, 0, complain_overflow_signed,
127 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL64", false, 0, MINUS_ONE,
128 true),
129 HOWTO(R_X86_64_GOTPC64, 0, 4, 64, true, 0, complain_overflow_signed,
130 bfd_elf_generic_reloc, "R_X86_64_GOTPC64", false, 0, MINUS_ONE,
131 true),
132 HOWTO(R_X86_64_GOTPLT64, 0, 4, 64, false, 0, complain_overflow_signed,
133 bfd_elf_generic_reloc, "R_X86_64_GOTPLT64", false, 0, MINUS_ONE,
134 false),
135 HOWTO(R_X86_64_PLTOFF64, 0, 4, 64, false, 0, complain_overflow_signed,
136 bfd_elf_generic_reloc, "R_X86_64_PLTOFF64", false, 0, MINUS_ONE,
137 false),
138 HOWTO(R_X86_64_SIZE32, 0, 2, 32, false, 0, complain_overflow_unsigned,
139 bfd_elf_generic_reloc, "R_X86_64_SIZE32", false, 0, 0xffffffff,
140 false),
141 HOWTO(R_X86_64_SIZE64, 0, 4, 64, false, 0, complain_overflow_dont,
142 bfd_elf_generic_reloc, "R_X86_64_SIZE64", false, 0, MINUS_ONE,
143 false),
144 HOWTO(R_X86_64_GOTPC32_TLSDESC, 0, 2, 32, true, 0,
145 complain_overflow_bitfield, bfd_elf_generic_reloc,
146 "R_X86_64_GOTPC32_TLSDESC", false, 0, 0xffffffff, true),
147 HOWTO(R_X86_64_TLSDESC_CALL, 0, 3, 0, false, 0,
148 complain_overflow_dont, bfd_elf_generic_reloc,
149 "R_X86_64_TLSDESC_CALL",
150 false, 0, 0, false),
151 HOWTO(R_X86_64_TLSDESC, 0, 4, 64, false, 0,
152 complain_overflow_dont, bfd_elf_generic_reloc,
153 "R_X86_64_TLSDESC", false, 0, MINUS_ONE, false),
154 HOWTO(R_X86_64_IRELATIVE, 0, 4, 64, false, 0, complain_overflow_dont,
155 bfd_elf_generic_reloc, "R_X86_64_IRELATIVE", false, 0, MINUS_ONE,
156 false),
157 HOWTO(R_X86_64_RELATIVE64, 0, 4, 64, false, 0, complain_overflow_dont,
158 bfd_elf_generic_reloc, "R_X86_64_RELATIVE64", false, 0, MINUS_ONE,
159 false),
160 HOWTO(R_X86_64_PC32_BND, 0, 2, 32, true, 0, complain_overflow_signed,
161 bfd_elf_generic_reloc, "R_X86_64_PC32_BND", false, 0, 0xffffffff,
162 true),
163 HOWTO(R_X86_64_PLT32_BND, 0, 2, 32, true, 0, complain_overflow_signed,
164 bfd_elf_generic_reloc, "R_X86_64_PLT32_BND", false, 0, 0xffffffff,
165 true),
166 HOWTO(R_X86_64_GOTPCRELX, 0, 2, 32, true, 0, complain_overflow_signed,
167 bfd_elf_generic_reloc, "R_X86_64_GOTPCRELX", false, 0, 0xffffffff,
168 true),
169 HOWTO(R_X86_64_REX_GOTPCRELX, 0, 2, 32, true, 0, complain_overflow_signed,
170 bfd_elf_generic_reloc, "R_X86_64_REX_GOTPCRELX", false, 0, 0xffffffff,
171 true),
172
173 /* We have a gap in the reloc numbers here.
174 R_X86_64_standard counts the number up to this point, and
175 R_X86_64_vt_offset is the value to subtract from a reloc type of
176 R_X86_64_GNU_VT* to form an index into this table. */
177 #define R_X86_64_standard (R_X86_64_REX_GOTPCRELX + 1)
178 #define R_X86_64_vt_offset (R_X86_64_GNU_VTINHERIT - R_X86_64_standard)
179
180 /* GNU extension to record C++ vtable hierarchy. */
181 HOWTO (R_X86_64_GNU_VTINHERIT, 0, 4, 0, false, 0, complain_overflow_dont,
182 NULL, "R_X86_64_GNU_VTINHERIT", false, 0, 0, false),
183
184 /* GNU extension to record C++ vtable member usage. */
185 HOWTO (R_X86_64_GNU_VTENTRY, 0, 4, 0, false, 0, complain_overflow_dont,
186 _bfd_elf_rel_vtable_reloc_fn, "R_X86_64_GNU_VTENTRY", false, 0, 0,
187 false),
188
189 /* Use complain_overflow_bitfield on R_X86_64_32 for x32. */
190 HOWTO(R_X86_64_32, 0, 2, 32, false, 0, complain_overflow_bitfield,
191 bfd_elf_generic_reloc, "R_X86_64_32", false, 0, 0xffffffff,
192 false)
193 };
194
195 /* Map BFD relocs to the x86_64 elf relocs. */
196 struct elf_reloc_map
197 {
198 bfd_reloc_code_real_type bfd_reloc_val;
199 unsigned char elf_reloc_val;
200 };
201
202 static const struct elf_reloc_map x86_64_reloc_map[] =
203 {
204 { BFD_RELOC_NONE, R_X86_64_NONE, },
205 { BFD_RELOC_64, R_X86_64_64, },
206 { BFD_RELOC_32_PCREL, R_X86_64_PC32, },
207 { BFD_RELOC_X86_64_GOT32, R_X86_64_GOT32,},
208 { BFD_RELOC_X86_64_PLT32, R_X86_64_PLT32,},
209 { BFD_RELOC_X86_64_COPY, R_X86_64_COPY, },
210 { BFD_RELOC_X86_64_GLOB_DAT, R_X86_64_GLOB_DAT, },
211 { BFD_RELOC_X86_64_JUMP_SLOT, R_X86_64_JUMP_SLOT, },
212 { BFD_RELOC_X86_64_RELATIVE, R_X86_64_RELATIVE, },
213 { BFD_RELOC_X86_64_GOTPCREL, R_X86_64_GOTPCREL, },
214 { BFD_RELOC_32, R_X86_64_32, },
215 { BFD_RELOC_X86_64_32S, R_X86_64_32S, },
216 { BFD_RELOC_16, R_X86_64_16, },
217 { BFD_RELOC_16_PCREL, R_X86_64_PC16, },
218 { BFD_RELOC_8, R_X86_64_8, },
219 { BFD_RELOC_8_PCREL, R_X86_64_PC8, },
220 { BFD_RELOC_X86_64_DTPMOD64, R_X86_64_DTPMOD64, },
221 { BFD_RELOC_X86_64_DTPOFF64, R_X86_64_DTPOFF64, },
222 { BFD_RELOC_X86_64_TPOFF64, R_X86_64_TPOFF64, },
223 { BFD_RELOC_X86_64_TLSGD, R_X86_64_TLSGD, },
224 { BFD_RELOC_X86_64_TLSLD, R_X86_64_TLSLD, },
225 { BFD_RELOC_X86_64_DTPOFF32, R_X86_64_DTPOFF32, },
226 { BFD_RELOC_X86_64_GOTTPOFF, R_X86_64_GOTTPOFF, },
227 { BFD_RELOC_X86_64_TPOFF32, R_X86_64_TPOFF32, },
228 { BFD_RELOC_64_PCREL, R_X86_64_PC64, },
229 { BFD_RELOC_X86_64_GOTOFF64, R_X86_64_GOTOFF64, },
230 { BFD_RELOC_X86_64_GOTPC32, R_X86_64_GOTPC32, },
231 { BFD_RELOC_X86_64_GOT64, R_X86_64_GOT64, },
232 { BFD_RELOC_X86_64_GOTPCREL64,R_X86_64_GOTPCREL64, },
233 { BFD_RELOC_X86_64_GOTPC64, R_X86_64_GOTPC64, },
234 { BFD_RELOC_X86_64_GOTPLT64, R_X86_64_GOTPLT64, },
235 { BFD_RELOC_X86_64_PLTOFF64, R_X86_64_PLTOFF64, },
236 { BFD_RELOC_SIZE32, R_X86_64_SIZE32, },
237 { BFD_RELOC_SIZE64, R_X86_64_SIZE64, },
238 { BFD_RELOC_X86_64_GOTPC32_TLSDESC, R_X86_64_GOTPC32_TLSDESC, },
239 { BFD_RELOC_X86_64_TLSDESC_CALL, R_X86_64_TLSDESC_CALL, },
240 { BFD_RELOC_X86_64_TLSDESC, R_X86_64_TLSDESC, },
241 { BFD_RELOC_X86_64_IRELATIVE, R_X86_64_IRELATIVE, },
242 { BFD_RELOC_X86_64_PC32_BND, R_X86_64_PC32_BND, },
243 { BFD_RELOC_X86_64_PLT32_BND, R_X86_64_PLT32_BND, },
244 { BFD_RELOC_X86_64_GOTPCRELX, R_X86_64_GOTPCRELX, },
245 { BFD_RELOC_X86_64_REX_GOTPCRELX, R_X86_64_REX_GOTPCRELX, },
246 { BFD_RELOC_VTABLE_INHERIT, R_X86_64_GNU_VTINHERIT, },
247 { BFD_RELOC_VTABLE_ENTRY, R_X86_64_GNU_VTENTRY, },
248 };
249
250 static reloc_howto_type *
251 elf_x86_64_rtype_to_howto (bfd *abfd, unsigned r_type)
252 {
253 unsigned i;
254
255 if (r_type == (unsigned int) R_X86_64_32)
256 {
257 if (ABI_64_P (abfd))
258 i = r_type;
259 else
260 i = ARRAY_SIZE (x86_64_elf_howto_table) - 1;
261 }
262 else if (r_type < (unsigned int) R_X86_64_GNU_VTINHERIT
263 || r_type >= (unsigned int) R_X86_64_max)
264 {
265 if (r_type >= (unsigned int) R_X86_64_standard)
266 {
267 /* xgettext:c-format */
268 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
269 abfd, r_type);
270 bfd_set_error (bfd_error_bad_value);
271 return NULL;
272 }
273 i = r_type;
274 }
275 else
276 i = r_type - (unsigned int) R_X86_64_vt_offset;
277 BFD_ASSERT (x86_64_elf_howto_table[i].type == r_type);
278 return &x86_64_elf_howto_table[i];
279 }
280
281 /* Given a BFD reloc type, return a HOWTO structure. */
282 static reloc_howto_type *
283 elf_x86_64_reloc_type_lookup (bfd *abfd,
284 bfd_reloc_code_real_type code)
285 {
286 unsigned int i;
287
288 for (i = 0; i < sizeof (x86_64_reloc_map) / sizeof (struct elf_reloc_map);
289 i++)
290 {
291 if (x86_64_reloc_map[i].bfd_reloc_val == code)
292 return elf_x86_64_rtype_to_howto (abfd,
293 x86_64_reloc_map[i].elf_reloc_val);
294 }
295 return NULL;
296 }
297
298 static reloc_howto_type *
299 elf_x86_64_reloc_name_lookup (bfd *abfd,
300 const char *r_name)
301 {
302 unsigned int i;
303
304 if (!ABI_64_P (abfd) && strcasecmp (r_name, "R_X86_64_32") == 0)
305 {
306 /* Get x32 R_X86_64_32. */
307 reloc_howto_type *reloc
308 = &x86_64_elf_howto_table[ARRAY_SIZE (x86_64_elf_howto_table) - 1];
309 BFD_ASSERT (reloc->type == (unsigned int) R_X86_64_32);
310 return reloc;
311 }
312
313 for (i = 0; i < ARRAY_SIZE (x86_64_elf_howto_table); i++)
314 if (x86_64_elf_howto_table[i].name != NULL
315 && strcasecmp (x86_64_elf_howto_table[i].name, r_name) == 0)
316 return &x86_64_elf_howto_table[i];
317
318 return NULL;
319 }
320
321 /* Given an x86_64 ELF reloc type, fill in an arelent structure. */
322
323 static bool
324 elf_x86_64_info_to_howto (bfd *abfd, arelent *cache_ptr,
325 Elf_Internal_Rela *dst)
326 {
327 unsigned r_type;
328
329 r_type = ELF32_R_TYPE (dst->r_info);
330 cache_ptr->howto = elf_x86_64_rtype_to_howto (abfd, r_type);
331 if (cache_ptr->howto == NULL)
332 return false;
333 BFD_ASSERT (r_type == cache_ptr->howto->type || cache_ptr->howto->type == R_X86_64_NONE);
334 return true;
335 }
336 \f
337 /* Support for core dump NOTE sections. */
338 static bool
339 elf_x86_64_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
340 {
341 int offset;
342 size_t size;
343
344 switch (note->descsz)
345 {
346 default:
347 return false;
348
349 case 296: /* sizeof(istruct elf_prstatus) on Linux/x32 */
350 /* pr_cursig */
351 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
352
353 /* pr_pid */
354 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
355
356 /* pr_reg */
357 offset = 72;
358 size = 216;
359
360 break;
361
362 case 336: /* sizeof(istruct elf_prstatus) on Linux/x86_64 */
363 /* pr_cursig */
364 elf_tdata (abfd)->core->signal
365 = bfd_get_16 (abfd, note->descdata + 12);
366
367 /* pr_pid */
368 elf_tdata (abfd)->core->lwpid
369 = bfd_get_32 (abfd, note->descdata + 32);
370
371 /* pr_reg */
372 offset = 112;
373 size = 216;
374
375 break;
376 }
377
378 /* Make a ".reg/999" section. */
379 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
380 size, note->descpos + offset);
381 }
382
383 static bool
384 elf_x86_64_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
385 {
386 switch (note->descsz)
387 {
388 default:
389 return false;
390
391 case 124: /* sizeof(struct elf_prpsinfo) on Linux/x32 */
392 elf_tdata (abfd)->core->pid
393 = bfd_get_32 (abfd, note->descdata + 12);
394 elf_tdata (abfd)->core->program
395 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
396 elf_tdata (abfd)->core->command
397 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
398 break;
399
400 case 136: /* sizeof(struct elf_prpsinfo) on Linux/x86_64 */
401 elf_tdata (abfd)->core->pid
402 = bfd_get_32 (abfd, note->descdata + 24);
403 elf_tdata (abfd)->core->program
404 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
405 elf_tdata (abfd)->core->command
406 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
407 }
408
409 /* Note that for some reason, a spurious space is tacked
410 onto the end of the args in some (at least one anyway)
411 implementations, so strip it off if it exists. */
412
413 {
414 char *command = elf_tdata (abfd)->core->command;
415 int n = strlen (command);
416
417 if (0 < n && command[n - 1] == ' ')
418 command[n - 1] = '\0';
419 }
420
421 return true;
422 }
423
424 #ifdef CORE_HEADER
425 # if GCC_VERSION >= 8000
426 # pragma GCC diagnostic push
427 # pragma GCC diagnostic ignored "-Wstringop-truncation"
428 # endif
429 static char *
430 elf_x86_64_write_core_note (bfd *abfd, char *buf, int *bufsiz,
431 int note_type, ...)
432 {
433 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
434 va_list ap;
435 const char *fname, *psargs;
436 long pid;
437 int cursig;
438 const void *gregs;
439
440 switch (note_type)
441 {
442 default:
443 return NULL;
444
445 case NT_PRPSINFO:
446 va_start (ap, note_type);
447 fname = va_arg (ap, const char *);
448 psargs = va_arg (ap, const char *);
449 va_end (ap);
450
451 if (bed->s->elfclass == ELFCLASS32)
452 {
453 prpsinfo32_t data;
454 memset (&data, 0, sizeof (data));
455 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
456 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
457 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
458 &data, sizeof (data));
459 }
460 else
461 {
462 prpsinfo64_t data;
463 memset (&data, 0, sizeof (data));
464 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
465 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
466 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
467 &data, sizeof (data));
468 }
469 /* NOTREACHED */
470
471 case NT_PRSTATUS:
472 va_start (ap, note_type);
473 pid = va_arg (ap, long);
474 cursig = va_arg (ap, int);
475 gregs = va_arg (ap, const void *);
476 va_end (ap);
477
478 if (bed->s->elfclass == ELFCLASS32)
479 {
480 if (bed->elf_machine_code == EM_X86_64)
481 {
482 prstatusx32_t prstat;
483 memset (&prstat, 0, sizeof (prstat));
484 prstat.pr_pid = pid;
485 prstat.pr_cursig = cursig;
486 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
487 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
488 &prstat, sizeof (prstat));
489 }
490 else
491 {
492 prstatus32_t prstat;
493 memset (&prstat, 0, sizeof (prstat));
494 prstat.pr_pid = pid;
495 prstat.pr_cursig = cursig;
496 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
497 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
498 &prstat, sizeof (prstat));
499 }
500 }
501 else
502 {
503 prstatus64_t prstat;
504 memset (&prstat, 0, sizeof (prstat));
505 prstat.pr_pid = pid;
506 prstat.pr_cursig = cursig;
507 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
508 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
509 &prstat, sizeof (prstat));
510 }
511 }
512 /* NOTREACHED */
513 }
514 # if GCC_VERSION >= 8000
515 # pragma GCC diagnostic pop
516 # endif
517 #endif
518 \f
519 /* Functions for the x86-64 ELF linker. */
520
521 /* The size in bytes of an entry in the global offset table. */
522
523 #define GOT_ENTRY_SIZE 8
524
525 /* The size in bytes of an entry in the lazy procedure linkage table. */
526
527 #define LAZY_PLT_ENTRY_SIZE 16
528
529 /* The size in bytes of an entry in the non-lazy procedure linkage
530 table. */
531
532 #define NON_LAZY_PLT_ENTRY_SIZE 8
533
534 /* The first entry in a lazy procedure linkage table looks like this.
535 See the SVR4 ABI i386 supplement and the x86-64 ABI to see how this
536 works. */
537
538 static const bfd_byte elf_x86_64_lazy_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
539 {
540 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
541 0xff, 0x25, 16, 0, 0, 0, /* jmpq *GOT+16(%rip) */
542 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
543 };
544
545 /* Subsequent entries in a lazy procedure linkage table look like this. */
546
547 static const bfd_byte elf_x86_64_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
548 {
549 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
550 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
551 0x68, /* pushq immediate */
552 0, 0, 0, 0, /* replaced with index into relocation table. */
553 0xe9, /* jmp relative */
554 0, 0, 0, 0 /* replaced with offset to start of .plt0. */
555 };
556
557 /* The first entry in a lazy procedure linkage table with BND prefix
558 like this. */
559
560 static const bfd_byte elf_x86_64_lazy_bnd_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
561 {
562 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
563 0xf2, 0xff, 0x25, 16, 0, 0, 0, /* bnd jmpq *GOT+16(%rip) */
564 0x0f, 0x1f, 0 /* nopl (%rax) */
565 };
566
567 /* Subsequent entries for branches with BND prefx in a lazy procedure
568 linkage table look like this. */
569
570 static const bfd_byte elf_x86_64_lazy_bnd_plt_entry[LAZY_PLT_ENTRY_SIZE] =
571 {
572 0x68, 0, 0, 0, 0, /* pushq immediate */
573 0xf2, 0xe9, 0, 0, 0, 0, /* bnd jmpq relative */
574 0x0f, 0x1f, 0x44, 0, 0 /* nopl 0(%rax,%rax,1) */
575 };
576
577 /* The first entry in the IBT-enabled lazy procedure linkage table is the
578 the same as the lazy PLT with BND prefix so that bound registers are
579 preserved when control is passed to dynamic linker. Subsequent
580 entries for a IBT-enabled lazy procedure linkage table look like
581 this. */
582
583 static const bfd_byte elf_x86_64_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
584 {
585 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
586 0x68, 0, 0, 0, 0, /* pushq immediate */
587 0xf2, 0xe9, 0, 0, 0, 0, /* bnd jmpq relative */
588 0x90 /* nop */
589 };
590
591 /* The first entry in the x32 IBT-enabled lazy procedure linkage table
592 is the same as the normal lazy PLT. Subsequent entries for an
593 x32 IBT-enabled lazy procedure linkage table look like this. */
594
595 static const bfd_byte elf_x32_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
596 {
597 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
598 0x68, 0, 0, 0, 0, /* pushq immediate */
599 0xe9, 0, 0, 0, 0, /* jmpq relative */
600 0x66, 0x90 /* xchg %ax,%ax */
601 };
602
603 /* Entries in the non-lazey procedure linkage table look like this. */
604
605 static const bfd_byte elf_x86_64_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
606 {
607 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
608 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
609 0x66, 0x90 /* xchg %ax,%ax */
610 };
611
612 /* Entries for branches with BND prefix in the non-lazey procedure
613 linkage table look like this. */
614
615 static const bfd_byte elf_x86_64_non_lazy_bnd_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
616 {
617 0xf2, 0xff, 0x25, /* bnd jmpq *name@GOTPC(%rip) */
618 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
619 0x90 /* nop */
620 };
621
622 /* Entries for branches with IBT-enabled in the non-lazey procedure
623 linkage table look like this. They have the same size as the lazy
624 PLT entry. */
625
626 static const bfd_byte elf_x86_64_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
627 {
628 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
629 0xf2, 0xff, 0x25, /* bnd jmpq *name@GOTPC(%rip) */
630 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
631 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopl 0x0(%rax,%rax,1) */
632 };
633
634 /* Entries for branches with IBT-enabled in the x32 non-lazey procedure
635 linkage table look like this. They have the same size as the lazy
636 PLT entry. */
637
638 static const bfd_byte elf_x32_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
639 {
640 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
641 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
642 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
643 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
644 };
645
646 /* The TLSDESC entry in a lazy procedure linkage table. */
647 static const bfd_byte elf_x86_64_tlsdesc_plt_entry[LAZY_PLT_ENTRY_SIZE] =
648 {
649 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
650 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
651 0xff, 0x25, 16, 0, 0, 0 /* jmpq *GOT+TDG(%rip) */
652 };
653
654 /* .eh_frame covering the lazy .plt section. */
655
656 static const bfd_byte elf_x86_64_eh_frame_lazy_plt[] =
657 {
658 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
659 0, 0, 0, 0, /* CIE ID */
660 1, /* CIE version */
661 'z', 'R', 0, /* Augmentation string */
662 1, /* Code alignment factor */
663 0x78, /* Data alignment factor */
664 16, /* Return address column */
665 1, /* Augmentation size */
666 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
667 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
668 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
669 DW_CFA_nop, DW_CFA_nop,
670
671 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
672 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
673 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
674 0, 0, 0, 0, /* .plt size goes here */
675 0, /* Augmentation size */
676 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
677 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
678 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
679 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
680 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
681 11, /* Block length */
682 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
683 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
684 DW_OP_lit15, DW_OP_and, DW_OP_lit11, DW_OP_ge,
685 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
686 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
687 };
688
689 /* .eh_frame covering the lazy BND .plt section. */
690
691 static const bfd_byte elf_x86_64_eh_frame_lazy_bnd_plt[] =
692 {
693 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
694 0, 0, 0, 0, /* CIE ID */
695 1, /* CIE version */
696 'z', 'R', 0, /* Augmentation string */
697 1, /* Code alignment factor */
698 0x78, /* Data alignment factor */
699 16, /* Return address column */
700 1, /* Augmentation size */
701 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
702 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
703 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
704 DW_CFA_nop, DW_CFA_nop,
705
706 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
707 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
708 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
709 0, 0, 0, 0, /* .plt size goes here */
710 0, /* Augmentation size */
711 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
712 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
713 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
714 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
715 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
716 11, /* Block length */
717 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
718 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
719 DW_OP_lit15, DW_OP_and, DW_OP_lit5, DW_OP_ge,
720 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
721 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
722 };
723
724 /* .eh_frame covering the lazy .plt section with IBT-enabled. */
725
726 static const bfd_byte elf_x86_64_eh_frame_lazy_ibt_plt[] =
727 {
728 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
729 0, 0, 0, 0, /* CIE ID */
730 1, /* CIE version */
731 'z', 'R', 0, /* Augmentation string */
732 1, /* Code alignment factor */
733 0x78, /* Data alignment factor */
734 16, /* Return address column */
735 1, /* Augmentation size */
736 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
737 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
738 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
739 DW_CFA_nop, DW_CFA_nop,
740
741 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
742 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
743 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
744 0, 0, 0, 0, /* .plt size goes here */
745 0, /* Augmentation size */
746 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
747 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
748 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
749 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
750 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
751 11, /* Block length */
752 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
753 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
754 DW_OP_lit15, DW_OP_and, DW_OP_lit10, DW_OP_ge,
755 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
756 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
757 };
758
759 /* .eh_frame covering the x32 lazy .plt section with IBT-enabled. */
760
761 static const bfd_byte elf_x32_eh_frame_lazy_ibt_plt[] =
762 {
763 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
764 0, 0, 0, 0, /* CIE ID */
765 1, /* CIE version */
766 'z', 'R', 0, /* Augmentation string */
767 1, /* Code alignment factor */
768 0x78, /* Data alignment factor */
769 16, /* Return address column */
770 1, /* Augmentation size */
771 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
772 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
773 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
774 DW_CFA_nop, DW_CFA_nop,
775
776 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
777 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
778 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
779 0, 0, 0, 0, /* .plt size goes here */
780 0, /* Augmentation size */
781 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
782 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
783 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
784 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
785 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
786 11, /* Block length */
787 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
788 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
789 DW_OP_lit15, DW_OP_and, DW_OP_lit9, DW_OP_ge,
790 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
791 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
792 };
793
794 /* .eh_frame covering the non-lazy .plt section. */
795
796 static const bfd_byte elf_x86_64_eh_frame_non_lazy_plt[] =
797 {
798 #define PLT_GOT_FDE_LENGTH 20
799 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
800 0, 0, 0, 0, /* CIE ID */
801 1, /* CIE version */
802 'z', 'R', 0, /* Augmentation string */
803 1, /* Code alignment factor */
804 0x78, /* Data alignment factor */
805 16, /* Return address column */
806 1, /* Augmentation size */
807 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
808 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
809 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
810 DW_CFA_nop, DW_CFA_nop,
811
812 PLT_GOT_FDE_LENGTH, 0, 0, 0, /* FDE length */
813 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
814 0, 0, 0, 0, /* the start of non-lazy .plt goes here */
815 0, 0, 0, 0, /* non-lazy .plt size goes here */
816 0, /* Augmentation size */
817 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop,
818 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
819 };
820
821 /* These are the standard parameters. */
822 static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_plt =
823 {
824 elf_x86_64_lazy_plt0_entry, /* plt0_entry */
825 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
826 elf_x86_64_lazy_plt_entry, /* plt_entry */
827 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
828 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
829 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
830 6, /* plt_tlsdesc_got1_offset */
831 12, /* plt_tlsdesc_got2_offset */
832 10, /* plt_tlsdesc_got1_insn_end */
833 16, /* plt_tlsdesc_got2_insn_end */
834 2, /* plt0_got1_offset */
835 8, /* plt0_got2_offset */
836 12, /* plt0_got2_insn_end */
837 2, /* plt_got_offset */
838 7, /* plt_reloc_offset */
839 12, /* plt_plt_offset */
840 6, /* plt_got_insn_size */
841 LAZY_PLT_ENTRY_SIZE, /* plt_plt_insn_end */
842 6, /* plt_lazy_offset */
843 elf_x86_64_lazy_plt0_entry, /* pic_plt0_entry */
844 elf_x86_64_lazy_plt_entry, /* pic_plt_entry */
845 elf_x86_64_eh_frame_lazy_plt, /* eh_frame_plt */
846 sizeof (elf_x86_64_eh_frame_lazy_plt) /* eh_frame_plt_size */
847 };
848
849 static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_plt =
850 {
851 elf_x86_64_non_lazy_plt_entry, /* plt_entry */
852 elf_x86_64_non_lazy_plt_entry, /* pic_plt_entry */
853 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
854 2, /* plt_got_offset */
855 6, /* plt_got_insn_size */
856 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
857 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
858 };
859
860 static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_bnd_plt =
861 {
862 elf_x86_64_lazy_bnd_plt0_entry, /* plt0_entry */
863 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
864 elf_x86_64_lazy_bnd_plt_entry, /* plt_entry */
865 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
866 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
867 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
868 6, /* plt_tlsdesc_got1_offset */
869 12, /* plt_tlsdesc_got2_offset */
870 10, /* plt_tlsdesc_got1_insn_end */
871 16, /* plt_tlsdesc_got2_insn_end */
872 2, /* plt0_got1_offset */
873 1+8, /* plt0_got2_offset */
874 1+12, /* plt0_got2_insn_end */
875 1+2, /* plt_got_offset */
876 1, /* plt_reloc_offset */
877 7, /* plt_plt_offset */
878 1+6, /* plt_got_insn_size */
879 11, /* plt_plt_insn_end */
880 0, /* plt_lazy_offset */
881 elf_x86_64_lazy_bnd_plt0_entry, /* pic_plt0_entry */
882 elf_x86_64_lazy_bnd_plt_entry, /* pic_plt_entry */
883 elf_x86_64_eh_frame_lazy_bnd_plt, /* eh_frame_plt */
884 sizeof (elf_x86_64_eh_frame_lazy_bnd_plt) /* eh_frame_plt_size */
885 };
886
887 static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_bnd_plt =
888 {
889 elf_x86_64_non_lazy_bnd_plt_entry, /* plt_entry */
890 elf_x86_64_non_lazy_bnd_plt_entry, /* pic_plt_entry */
891 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
892 1+2, /* plt_got_offset */
893 1+6, /* plt_got_insn_size */
894 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
895 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
896 };
897
898 static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_ibt_plt =
899 {
900 elf_x86_64_lazy_bnd_plt0_entry, /* plt0_entry */
901 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
902 elf_x86_64_lazy_ibt_plt_entry, /* plt_entry */
903 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
904 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
905 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
906 6, /* plt_tlsdesc_got1_offset */
907 12, /* plt_tlsdesc_got2_offset */
908 10, /* plt_tlsdesc_got1_insn_end */
909 16, /* plt_tlsdesc_got2_insn_end */
910 2, /* plt0_got1_offset */
911 1+8, /* plt0_got2_offset */
912 1+12, /* plt0_got2_insn_end */
913 4+1+2, /* plt_got_offset */
914 4+1, /* plt_reloc_offset */
915 4+1+6, /* plt_plt_offset */
916 4+1+6, /* plt_got_insn_size */
917 4+1+5+5, /* plt_plt_insn_end */
918 0, /* plt_lazy_offset */
919 elf_x86_64_lazy_bnd_plt0_entry, /* pic_plt0_entry */
920 elf_x86_64_lazy_ibt_plt_entry, /* pic_plt_entry */
921 elf_x86_64_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
922 sizeof (elf_x86_64_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
923 };
924
925 static const struct elf_x86_lazy_plt_layout elf_x32_lazy_ibt_plt =
926 {
927 elf_x86_64_lazy_plt0_entry, /* plt0_entry */
928 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
929 elf_x32_lazy_ibt_plt_entry, /* plt_entry */
930 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
931 elf_x86_64_tlsdesc_plt_entry, /* plt_tlsdesc_entry */
932 LAZY_PLT_ENTRY_SIZE, /* plt_tlsdesc_entry_size */
933 6, /* plt_tlsdesc_got1_offset */
934 12, /* plt_tlsdesc_got2_offset */
935 10, /* plt_tlsdesc_got1_insn_end */
936 16, /* plt_tlsdesc_got2_insn_end */
937 2, /* plt0_got1_offset */
938 8, /* plt0_got2_offset */
939 12, /* plt0_got2_insn_end */
940 4+2, /* plt_got_offset */
941 4+1, /* plt_reloc_offset */
942 4+6, /* plt_plt_offset */
943 4+6, /* plt_got_insn_size */
944 4+5+5, /* plt_plt_insn_end */
945 0, /* plt_lazy_offset */
946 elf_x86_64_lazy_plt0_entry, /* pic_plt0_entry */
947 elf_x32_lazy_ibt_plt_entry, /* pic_plt_entry */
948 elf_x32_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
949 sizeof (elf_x32_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
950 };
951
952 static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_ibt_plt =
953 {
954 elf_x86_64_non_lazy_ibt_plt_entry, /* plt_entry */
955 elf_x86_64_non_lazy_ibt_plt_entry, /* pic_plt_entry */
956 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
957 4+1+2, /* plt_got_offset */
958 4+1+6, /* plt_got_insn_size */
959 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
960 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
961 };
962
963 static const struct elf_x86_non_lazy_plt_layout elf_x32_non_lazy_ibt_plt =
964 {
965 elf_x32_non_lazy_ibt_plt_entry, /* plt_entry */
966 elf_x32_non_lazy_ibt_plt_entry, /* pic_plt_entry */
967 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
968 4+2, /* plt_got_offset */
969 4+6, /* plt_got_insn_size */
970 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
971 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
972 };
973
974
975 static bool
976 elf64_x86_64_elf_object_p (bfd *abfd)
977 {
978 /* Set the right machine number for an x86-64 elf64 file. */
979 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x86_64);
980 return true;
981 }
982
983 static bool
984 elf32_x86_64_elf_object_p (bfd *abfd)
985 {
986 /* Set the right machine number for an x86-64 elf32 file. */
987 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x64_32);
988 return true;
989 }
990
991 /* Return TRUE if the TLS access code sequence support transition
992 from R_TYPE. */
993
994 static bool
995 elf_x86_64_check_tls_transition (bfd *abfd,
996 struct bfd_link_info *info,
997 asection *sec,
998 bfd_byte *contents,
999 Elf_Internal_Shdr *symtab_hdr,
1000 struct elf_link_hash_entry **sym_hashes,
1001 unsigned int r_type,
1002 const Elf_Internal_Rela *rel,
1003 const Elf_Internal_Rela *relend)
1004 {
1005 unsigned int val;
1006 unsigned long r_symndx;
1007 bool largepic = false;
1008 struct elf_link_hash_entry *h;
1009 bfd_vma offset;
1010 struct elf_x86_link_hash_table *htab;
1011 bfd_byte *call;
1012 bool indirect_call;
1013
1014 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
1015 offset = rel->r_offset;
1016 switch (r_type)
1017 {
1018 case R_X86_64_TLSGD:
1019 case R_X86_64_TLSLD:
1020 if ((rel + 1) >= relend)
1021 return false;
1022
1023 if (r_type == R_X86_64_TLSGD)
1024 {
1025 /* Check transition from GD access model. For 64bit, only
1026 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
1027 .word 0x6666; rex64; call __tls_get_addr@PLT
1028 or
1029 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
1030 .byte 0x66; rex64
1031 call *__tls_get_addr@GOTPCREL(%rip)
1032 which may be converted to
1033 addr32 call __tls_get_addr
1034 can transit to different access model. For 32bit, only
1035 leaq foo@tlsgd(%rip), %rdi
1036 .word 0x6666; rex64; call __tls_get_addr@PLT
1037 or
1038 leaq foo@tlsgd(%rip), %rdi
1039 .byte 0x66; rex64
1040 call *__tls_get_addr@GOTPCREL(%rip)
1041 which may be converted to
1042 addr32 call __tls_get_addr
1043 can transit to different access model. For largepic,
1044 we also support:
1045 leaq foo@tlsgd(%rip), %rdi
1046 movabsq $__tls_get_addr@pltoff, %rax
1047 addq $r15, %rax
1048 call *%rax
1049 or
1050 leaq foo@tlsgd(%rip), %rdi
1051 movabsq $__tls_get_addr@pltoff, %rax
1052 addq $rbx, %rax
1053 call *%rax */
1054
1055 static const unsigned char leaq[] = { 0x66, 0x48, 0x8d, 0x3d };
1056
1057 if ((offset + 12) > sec->size)
1058 return false;
1059
1060 call = contents + offset + 4;
1061 if (call[0] != 0x66
1062 || !((call[1] == 0x48
1063 && call[2] == 0xff
1064 && call[3] == 0x15)
1065 || (call[1] == 0x48
1066 && call[2] == 0x67
1067 && call[3] == 0xe8)
1068 || (call[1] == 0x66
1069 && call[2] == 0x48
1070 && call[3] == 0xe8)))
1071 {
1072 if (!ABI_64_P (abfd)
1073 || (offset + 19) > sec->size
1074 || offset < 3
1075 || memcmp (call - 7, leaq + 1, 3) != 0
1076 || memcmp (call, "\x48\xb8", 2) != 0
1077 || call[11] != 0x01
1078 || call[13] != 0xff
1079 || call[14] != 0xd0
1080 || !((call[10] == 0x48 && call[12] == 0xd8)
1081 || (call[10] == 0x4c && call[12] == 0xf8)))
1082 return false;
1083 largepic = true;
1084 }
1085 else if (ABI_64_P (abfd))
1086 {
1087 if (offset < 4
1088 || memcmp (contents + offset - 4, leaq, 4) != 0)
1089 return false;
1090 }
1091 else
1092 {
1093 if (offset < 3
1094 || memcmp (contents + offset - 3, leaq + 1, 3) != 0)
1095 return false;
1096 }
1097 indirect_call = call[2] == 0xff;
1098 }
1099 else
1100 {
1101 /* Check transition from LD access model. Only
1102 leaq foo@tlsld(%rip), %rdi;
1103 call __tls_get_addr@PLT
1104 or
1105 leaq foo@tlsld(%rip), %rdi;
1106 call *__tls_get_addr@GOTPCREL(%rip)
1107 which may be converted to
1108 addr32 call __tls_get_addr
1109 can transit to different access model. For largepic
1110 we also support:
1111 leaq foo@tlsld(%rip), %rdi
1112 movabsq $__tls_get_addr@pltoff, %rax
1113 addq $r15, %rax
1114 call *%rax
1115 or
1116 leaq foo@tlsld(%rip), %rdi
1117 movabsq $__tls_get_addr@pltoff, %rax
1118 addq $rbx, %rax
1119 call *%rax */
1120
1121 static const unsigned char lea[] = { 0x48, 0x8d, 0x3d };
1122
1123 if (offset < 3 || (offset + 9) > sec->size)
1124 return false;
1125
1126 if (memcmp (contents + offset - 3, lea, 3) != 0)
1127 return false;
1128
1129 call = contents + offset + 4;
1130 if (!(call[0] == 0xe8
1131 || (call[0] == 0xff && call[1] == 0x15)
1132 || (call[0] == 0x67 && call[1] == 0xe8)))
1133 {
1134 if (!ABI_64_P (abfd)
1135 || (offset + 19) > sec->size
1136 || memcmp (call, "\x48\xb8", 2) != 0
1137 || call[11] != 0x01
1138 || call[13] != 0xff
1139 || call[14] != 0xd0
1140 || !((call[10] == 0x48 && call[12] == 0xd8)
1141 || (call[10] == 0x4c && call[12] == 0xf8)))
1142 return false;
1143 largepic = true;
1144 }
1145 indirect_call = call[0] == 0xff;
1146 }
1147
1148 r_symndx = htab->r_sym (rel[1].r_info);
1149 if (r_symndx < symtab_hdr->sh_info)
1150 return false;
1151
1152 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1153 if (h == NULL
1154 || !((struct elf_x86_link_hash_entry *) h)->tls_get_addr)
1155 return false;
1156 else
1157 {
1158 r_type = (ELF32_R_TYPE (rel[1].r_info)
1159 & ~R_X86_64_converted_reloc_bit);
1160 if (largepic)
1161 return r_type == R_X86_64_PLTOFF64;
1162 else if (indirect_call)
1163 return r_type == R_X86_64_GOTPCRELX;
1164 else
1165 return (r_type == R_X86_64_PC32 || r_type == R_X86_64_PLT32);
1166 }
1167
1168 case R_X86_64_GOTTPOFF:
1169 /* Check transition from IE access model:
1170 mov foo@gottpoff(%rip), %reg
1171 add foo@gottpoff(%rip), %reg
1172 */
1173
1174 /* Check REX prefix first. */
1175 if (offset >= 3 && (offset + 4) <= sec->size)
1176 {
1177 val = bfd_get_8 (abfd, contents + offset - 3);
1178 if (val != 0x48 && val != 0x4c)
1179 {
1180 /* X32 may have 0x44 REX prefix or no REX prefix. */
1181 if (ABI_64_P (abfd))
1182 return false;
1183 }
1184 }
1185 else
1186 {
1187 /* X32 may not have any REX prefix. */
1188 if (ABI_64_P (abfd))
1189 return false;
1190 if (offset < 2 || (offset + 3) > sec->size)
1191 return false;
1192 }
1193
1194 val = bfd_get_8 (abfd, contents + offset - 2);
1195 if (val != 0x8b && val != 0x03)
1196 return false;
1197
1198 val = bfd_get_8 (abfd, contents + offset - 1);
1199 return (val & 0xc7) == 5;
1200
1201 case R_X86_64_GOTPC32_TLSDESC:
1202 /* Check transition from GDesc access model:
1203 leaq x@tlsdesc(%rip), %rax <--- LP64 mode.
1204 rex leal x@tlsdesc(%rip), %eax <--- X32 mode.
1205
1206 Make sure it's a leaq adding rip to a 32-bit offset
1207 into any register, although it's probably almost always
1208 going to be rax. */
1209
1210 if (offset < 3 || (offset + 4) > sec->size)
1211 return false;
1212
1213 val = bfd_get_8 (abfd, contents + offset - 3);
1214 val &= 0xfb;
1215 if (val != 0x48 && (ABI_64_P (abfd) || val != 0x40))
1216 return false;
1217
1218 if (bfd_get_8 (abfd, contents + offset - 2) != 0x8d)
1219 return false;
1220
1221 val = bfd_get_8 (abfd, contents + offset - 1);
1222 return (val & 0xc7) == 0x05;
1223
1224 case R_X86_64_TLSDESC_CALL:
1225 /* Check transition from GDesc access model:
1226 call *x@tlsdesc(%rax) <--- LP64 mode.
1227 call *x@tlsdesc(%eax) <--- X32 mode.
1228 */
1229 if (offset + 2 <= sec->size)
1230 {
1231 unsigned int prefix;
1232 call = contents + offset;
1233 prefix = 0;
1234 if (!ABI_64_P (abfd))
1235 {
1236 /* Check for call *x@tlsdesc(%eax). */
1237 if (call[0] == 0x67)
1238 {
1239 prefix = 1;
1240 if (offset + 3 > sec->size)
1241 return false;
1242 }
1243 }
1244 /* Make sure that it's a call *x@tlsdesc(%rax). */
1245 return call[prefix] == 0xff && call[1 + prefix] == 0x10;
1246 }
1247
1248 return false;
1249
1250 default:
1251 abort ();
1252 }
1253 }
1254
1255 /* Return TRUE if the TLS access transition is OK or no transition
1256 will be performed. Update R_TYPE if there is a transition. */
1257
1258 static bool
1259 elf_x86_64_tls_transition (struct bfd_link_info *info, bfd *abfd,
1260 asection *sec, bfd_byte *contents,
1261 Elf_Internal_Shdr *symtab_hdr,
1262 struct elf_link_hash_entry **sym_hashes,
1263 unsigned int *r_type, int tls_type,
1264 const Elf_Internal_Rela *rel,
1265 const Elf_Internal_Rela *relend,
1266 struct elf_link_hash_entry *h,
1267 unsigned long r_symndx,
1268 bool from_relocate_section)
1269 {
1270 unsigned int from_type = *r_type;
1271 unsigned int to_type = from_type;
1272 bool check = true;
1273
1274 /* Skip TLS transition for functions. */
1275 if (h != NULL
1276 && (h->type == STT_FUNC
1277 || h->type == STT_GNU_IFUNC))
1278 return true;
1279
1280 switch (from_type)
1281 {
1282 case R_X86_64_TLSGD:
1283 case R_X86_64_GOTPC32_TLSDESC:
1284 case R_X86_64_TLSDESC_CALL:
1285 case R_X86_64_GOTTPOFF:
1286 if (bfd_link_executable (info))
1287 {
1288 if (h == NULL)
1289 to_type = R_X86_64_TPOFF32;
1290 else
1291 to_type = R_X86_64_GOTTPOFF;
1292 }
1293
1294 /* When we are called from elf_x86_64_relocate_section, there may
1295 be additional transitions based on TLS_TYPE. */
1296 if (from_relocate_section)
1297 {
1298 unsigned int new_to_type = to_type;
1299
1300 if (TLS_TRANSITION_IE_TO_LE_P (info, h, tls_type))
1301 new_to_type = R_X86_64_TPOFF32;
1302
1303 if (to_type == R_X86_64_TLSGD
1304 || to_type == R_X86_64_GOTPC32_TLSDESC
1305 || to_type == R_X86_64_TLSDESC_CALL)
1306 {
1307 if (tls_type == GOT_TLS_IE)
1308 new_to_type = R_X86_64_GOTTPOFF;
1309 }
1310
1311 /* We checked the transition before when we were called from
1312 elf_x86_64_scan_relocs. We only want to check the new
1313 transition which hasn't been checked before. */
1314 check = new_to_type != to_type && from_type == to_type;
1315 to_type = new_to_type;
1316 }
1317
1318 break;
1319
1320 case R_X86_64_TLSLD:
1321 if (bfd_link_executable (info))
1322 to_type = R_X86_64_TPOFF32;
1323 break;
1324
1325 default:
1326 return true;
1327 }
1328
1329 /* Return TRUE if there is no transition. */
1330 if (from_type == to_type)
1331 return true;
1332
1333 /* Check if the transition can be performed. */
1334 if (check
1335 && ! elf_x86_64_check_tls_transition (abfd, info, sec, contents,
1336 symtab_hdr, sym_hashes,
1337 from_type, rel, relend))
1338 {
1339 reloc_howto_type *from, *to;
1340 const char *name;
1341
1342 from = elf_x86_64_rtype_to_howto (abfd, from_type);
1343 to = elf_x86_64_rtype_to_howto (abfd, to_type);
1344
1345 if (from == NULL || to == NULL)
1346 return false;
1347
1348 if (h)
1349 name = h->root.root.string;
1350 else
1351 {
1352 struct elf_x86_link_hash_table *htab;
1353
1354 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
1355 if (htab == NULL)
1356 name = "*unknown*";
1357 else
1358 {
1359 Elf_Internal_Sym *isym;
1360
1361 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1362 abfd, r_symndx);
1363 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
1364 }
1365 }
1366
1367 _bfd_error_handler
1368 /* xgettext:c-format */
1369 (_("%pB: TLS transition from %s to %s against `%s' at %#" PRIx64
1370 " in section `%pA' failed"),
1371 abfd, from->name, to->name, name, (uint64_t) rel->r_offset, sec);
1372 bfd_set_error (bfd_error_bad_value);
1373 return false;
1374 }
1375
1376 *r_type = to_type;
1377 return true;
1378 }
1379
1380 static bool
1381 elf_x86_64_need_pic (struct bfd_link_info *info,
1382 bfd *input_bfd, asection *sec,
1383 struct elf_link_hash_entry *h,
1384 Elf_Internal_Shdr *symtab_hdr,
1385 Elf_Internal_Sym *isym,
1386 reloc_howto_type *howto)
1387 {
1388 const char *v = "";
1389 const char *und = "";
1390 const char *pic = "";
1391 const char *object;
1392
1393 const char *name;
1394 if (h)
1395 {
1396 name = h->root.root.string;
1397 switch (ELF_ST_VISIBILITY (h->other))
1398 {
1399 case STV_HIDDEN:
1400 v = _("hidden symbol ");
1401 break;
1402 case STV_INTERNAL:
1403 v = _("internal symbol ");
1404 break;
1405 case STV_PROTECTED:
1406 v = _("protected symbol ");
1407 break;
1408 default:
1409 if (((struct elf_x86_link_hash_entry *) h)->def_protected)
1410 v = _("protected symbol ");
1411 else
1412 v = _("symbol ");
1413 pic = NULL;
1414 break;
1415 }
1416
1417 if (!SYMBOL_DEFINED_NON_SHARED_P (h) && !h->def_dynamic)
1418 und = _("undefined ");
1419 }
1420 else
1421 {
1422 name = bfd_elf_sym_name (input_bfd, symtab_hdr, isym, NULL);
1423 pic = NULL;
1424 }
1425
1426 if (bfd_link_dll (info))
1427 {
1428 object = _("a shared object");
1429 if (!pic)
1430 pic = _("; recompile with -fPIC");
1431 }
1432 else
1433 {
1434 if (bfd_link_pie (info))
1435 object = _("a PIE object");
1436 else
1437 object = _("a PDE object");
1438 if (!pic)
1439 pic = _("; recompile with -fPIE");
1440 }
1441
1442 /* xgettext:c-format */
1443 _bfd_error_handler (_("%pB: relocation %s against %s%s`%s' can "
1444 "not be used when making %s%s"),
1445 input_bfd, howto->name, und, v, name,
1446 object, pic);
1447 bfd_set_error (bfd_error_bad_value);
1448 sec->check_relocs_failed = 1;
1449 return false;
1450 }
1451
1452 /* With the local symbol, foo, we convert
1453 mov foo@GOTPCREL(%rip), %reg
1454 to
1455 lea foo(%rip), %reg
1456 and convert
1457 call/jmp *foo@GOTPCREL(%rip)
1458 to
1459 nop call foo/jmp foo nop
1460 When PIC is false, convert
1461 test %reg, foo@GOTPCREL(%rip)
1462 to
1463 test $foo, %reg
1464 and convert
1465 binop foo@GOTPCREL(%rip), %reg
1466 to
1467 binop $foo, %reg
1468 where binop is one of adc, add, and, cmp, or, sbb, sub, xor
1469 instructions. */
1470
1471 static bool
1472 elf_x86_64_convert_load_reloc (bfd *abfd,
1473 bfd_byte *contents,
1474 unsigned int *r_type_p,
1475 Elf_Internal_Rela *irel,
1476 struct elf_link_hash_entry *h,
1477 bool *converted,
1478 struct bfd_link_info *link_info)
1479 {
1480 struct elf_x86_link_hash_table *htab;
1481 bool is_pic;
1482 bool no_overflow;
1483 bool relocx;
1484 bool to_reloc_pc32;
1485 bool abs_symbol;
1486 bool local_ref;
1487 asection *tsec;
1488 bfd_signed_vma raddend;
1489 unsigned int opcode;
1490 unsigned int modrm;
1491 unsigned int r_type = *r_type_p;
1492 unsigned int r_symndx;
1493 bfd_vma roff = irel->r_offset;
1494 bfd_vma abs_relocation;
1495
1496 if (roff < (r_type == R_X86_64_REX_GOTPCRELX ? 3 : 2))
1497 return true;
1498
1499 raddend = irel->r_addend;
1500 /* Addend for 32-bit PC-relative relocation must be -4. */
1501 if (raddend != -4)
1502 return true;
1503
1504 htab = elf_x86_hash_table (link_info, X86_64_ELF_DATA);
1505 is_pic = bfd_link_pic (link_info);
1506
1507 relocx = (r_type == R_X86_64_GOTPCRELX
1508 || r_type == R_X86_64_REX_GOTPCRELX);
1509
1510 /* TRUE if --no-relax is used. */
1511 no_overflow = link_info->disable_target_specific_optimizations > 1;
1512
1513 r_symndx = htab->r_sym (irel->r_info);
1514
1515 opcode = bfd_get_8 (abfd, contents + roff - 2);
1516
1517 /* Convert mov to lea since it has been done for a while. */
1518 if (opcode != 0x8b)
1519 {
1520 /* Only convert R_X86_64_GOTPCRELX and R_X86_64_REX_GOTPCRELX
1521 for call, jmp or one of adc, add, and, cmp, or, sbb, sub,
1522 test, xor instructions. */
1523 if (!relocx)
1524 return true;
1525 }
1526
1527 /* We convert only to R_X86_64_PC32:
1528 1. Branch.
1529 2. R_X86_64_GOTPCREL since we can't modify REX byte.
1530 3. no_overflow is true.
1531 4. PIC.
1532 */
1533 to_reloc_pc32 = (opcode == 0xff
1534 || !relocx
1535 || no_overflow
1536 || is_pic);
1537
1538 abs_symbol = false;
1539 abs_relocation = 0;
1540
1541 /* Get the symbol referred to by the reloc. */
1542 if (h == NULL)
1543 {
1544 Elf_Internal_Sym *isym
1545 = bfd_sym_from_r_symndx (&htab->elf.sym_cache, abfd, r_symndx);
1546
1547 /* Skip relocation against undefined symbols. */
1548 if (isym->st_shndx == SHN_UNDEF)
1549 return true;
1550
1551 local_ref = true;
1552 if (isym->st_shndx == SHN_ABS)
1553 {
1554 tsec = bfd_abs_section_ptr;
1555 abs_symbol = true;
1556 abs_relocation = isym->st_value;
1557 }
1558 else if (isym->st_shndx == SHN_COMMON)
1559 tsec = bfd_com_section_ptr;
1560 else if (isym->st_shndx == SHN_X86_64_LCOMMON)
1561 tsec = &_bfd_elf_large_com_section;
1562 else
1563 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
1564 }
1565 else
1566 {
1567 /* Undefined weak symbol is only bound locally in executable
1568 and its reference is resolved as 0 without relocation
1569 overflow. We can only perform this optimization for
1570 GOTPCRELX relocations since we need to modify REX byte.
1571 It is OK convert mov with R_X86_64_GOTPCREL to
1572 R_X86_64_PC32. */
1573 struct elf_x86_link_hash_entry *eh = elf_x86_hash_entry (h);
1574
1575 abs_symbol = ABS_SYMBOL_P (h);
1576 abs_relocation = h->root.u.def.value;
1577
1578 /* NB: Also set linker_def via SYMBOL_REFERENCES_LOCAL_P. */
1579 local_ref = SYMBOL_REFERENCES_LOCAL_P (link_info, h);
1580 if ((relocx || opcode == 0x8b)
1581 && (h->root.type == bfd_link_hash_undefweak
1582 && !eh->linker_def
1583 && local_ref))
1584 {
1585 if (opcode == 0xff)
1586 {
1587 /* Skip for branch instructions since R_X86_64_PC32
1588 may overflow. */
1589 if (no_overflow)
1590 return true;
1591 }
1592 else if (relocx)
1593 {
1594 /* For non-branch instructions, we can convert to
1595 R_X86_64_32/R_X86_64_32S since we know if there
1596 is a REX byte. */
1597 to_reloc_pc32 = false;
1598 }
1599
1600 /* Since we don't know the current PC when PIC is true,
1601 we can't convert to R_X86_64_PC32. */
1602 if (to_reloc_pc32 && is_pic)
1603 return true;
1604
1605 goto convert;
1606 }
1607 /* Avoid optimizing GOTPCREL relocations againt _DYNAMIC since
1608 ld.so may use its link-time address. */
1609 else if (h->start_stop
1610 || eh->linker_def
1611 || ((h->def_regular
1612 || h->root.type == bfd_link_hash_defined
1613 || h->root.type == bfd_link_hash_defweak)
1614 && h != htab->elf.hdynamic
1615 && local_ref))
1616 {
1617 /* bfd_link_hash_new or bfd_link_hash_undefined is
1618 set by an assignment in a linker script in
1619 bfd_elf_record_link_assignment. start_stop is set
1620 on __start_SECNAME/__stop_SECNAME which mark section
1621 SECNAME. */
1622 if (h->start_stop
1623 || eh->linker_def
1624 || (h->def_regular
1625 && (h->root.type == bfd_link_hash_new
1626 || h->root.type == bfd_link_hash_undefined
1627 || ((h->root.type == bfd_link_hash_defined
1628 || h->root.type == bfd_link_hash_defweak)
1629 && h->root.u.def.section == bfd_und_section_ptr))))
1630 {
1631 /* Skip since R_X86_64_32/R_X86_64_32S may overflow. */
1632 if (no_overflow)
1633 return true;
1634 goto convert;
1635 }
1636 tsec = h->root.u.def.section;
1637 }
1638 else
1639 return true;
1640 }
1641
1642 /* Don't convert GOTPCREL relocation against large section. */
1643 if (elf_section_data (tsec) != NULL
1644 && (elf_section_flags (tsec) & SHF_X86_64_LARGE) != 0)
1645 return true;
1646
1647 /* Skip since R_X86_64_PC32/R_X86_64_32/R_X86_64_32S may overflow. */
1648 if (no_overflow)
1649 return true;
1650
1651 convert:
1652 if (opcode == 0xff)
1653 {
1654 /* We have "call/jmp *foo@GOTPCREL(%rip)". */
1655 unsigned int nop;
1656 unsigned int disp;
1657 bfd_vma nop_offset;
1658
1659 /* Convert R_X86_64_GOTPCRELX and R_X86_64_REX_GOTPCRELX to
1660 R_X86_64_PC32. */
1661 modrm = bfd_get_8 (abfd, contents + roff - 1);
1662 if (modrm == 0x25)
1663 {
1664 /* Convert to "jmp foo nop". */
1665 modrm = 0xe9;
1666 nop = NOP_OPCODE;
1667 nop_offset = irel->r_offset + 3;
1668 disp = bfd_get_32 (abfd, contents + irel->r_offset);
1669 irel->r_offset -= 1;
1670 bfd_put_32 (abfd, disp, contents + irel->r_offset);
1671 }
1672 else
1673 {
1674 struct elf_x86_link_hash_entry *eh
1675 = (struct elf_x86_link_hash_entry *) h;
1676
1677 /* Convert to "nop call foo". ADDR_PREFIX_OPCODE
1678 is a nop prefix. */
1679 modrm = 0xe8;
1680 /* To support TLS optimization, always use addr32 prefix for
1681 "call *__tls_get_addr@GOTPCREL(%rip)". */
1682 if (eh && eh->tls_get_addr)
1683 {
1684 nop = 0x67;
1685 nop_offset = irel->r_offset - 2;
1686 }
1687 else
1688 {
1689 nop = htab->params->call_nop_byte;
1690 if (htab->params->call_nop_as_suffix)
1691 {
1692 nop_offset = irel->r_offset + 3;
1693 disp = bfd_get_32 (abfd, contents + irel->r_offset);
1694 irel->r_offset -= 1;
1695 bfd_put_32 (abfd, disp, contents + irel->r_offset);
1696 }
1697 else
1698 nop_offset = irel->r_offset - 2;
1699 }
1700 }
1701 bfd_put_8 (abfd, nop, contents + nop_offset);
1702 bfd_put_8 (abfd, modrm, contents + irel->r_offset - 1);
1703 r_type = R_X86_64_PC32;
1704 }
1705 else
1706 {
1707 unsigned int rex;
1708 unsigned int rex_mask = REX_R;
1709
1710 if (r_type == R_X86_64_REX_GOTPCRELX)
1711 rex = bfd_get_8 (abfd, contents + roff - 3);
1712 else
1713 rex = 0;
1714
1715 if (opcode == 0x8b)
1716 {
1717 if (abs_symbol && local_ref && relocx)
1718 to_reloc_pc32 = false;
1719
1720 if (to_reloc_pc32)
1721 {
1722 /* Convert "mov foo@GOTPCREL(%rip), %reg" to
1723 "lea foo(%rip), %reg". */
1724 opcode = 0x8d;
1725 r_type = R_X86_64_PC32;
1726 }
1727 else
1728 {
1729 /* Convert "mov foo@GOTPCREL(%rip), %reg" to
1730 "mov $foo, %reg". */
1731 opcode = 0xc7;
1732 modrm = bfd_get_8 (abfd, contents + roff - 1);
1733 modrm = 0xc0 | (modrm & 0x38) >> 3;
1734 if ((rex & REX_W) != 0
1735 && ABI_64_P (link_info->output_bfd))
1736 {
1737 /* Keep the REX_W bit in REX byte for LP64. */
1738 r_type = R_X86_64_32S;
1739 goto rewrite_modrm_rex;
1740 }
1741 else
1742 {
1743 /* If the REX_W bit in REX byte isn't needed,
1744 use R_X86_64_32 and clear the W bit to avoid
1745 sign-extend imm32 to imm64. */
1746 r_type = R_X86_64_32;
1747 /* Clear the W bit in REX byte. */
1748 rex_mask |= REX_W;
1749 goto rewrite_modrm_rex;
1750 }
1751 }
1752 }
1753 else
1754 {
1755 /* R_X86_64_PC32 isn't supported. */
1756 if (to_reloc_pc32)
1757 return true;
1758
1759 modrm = bfd_get_8 (abfd, contents + roff - 1);
1760 if (opcode == 0x85)
1761 {
1762 /* Convert "test %reg, foo@GOTPCREL(%rip)" to
1763 "test $foo, %reg". */
1764 modrm = 0xc0 | (modrm & 0x38) >> 3;
1765 opcode = 0xf7;
1766 }
1767 else
1768 {
1769 /* Convert "binop foo@GOTPCREL(%rip), %reg" to
1770 "binop $foo, %reg". */
1771 modrm = 0xc0 | (modrm & 0x38) >> 3 | (opcode & 0x3c);
1772 opcode = 0x81;
1773 }
1774
1775 /* Use R_X86_64_32 with 32-bit operand to avoid relocation
1776 overflow when sign-extending imm32 to imm64. */
1777 r_type = (rex & REX_W) != 0 ? R_X86_64_32S : R_X86_64_32;
1778
1779 rewrite_modrm_rex:
1780 if (abs_relocation)
1781 {
1782 /* Check if R_X86_64_32S/R_X86_64_32 fits. */
1783 if (r_type == R_X86_64_32S)
1784 {
1785 if ((abs_relocation + 0x80000000) > 0xffffffff)
1786 return true;
1787 }
1788 else
1789 {
1790 if (abs_relocation > 0xffffffff)
1791 return true;
1792 }
1793 }
1794
1795 bfd_put_8 (abfd, modrm, contents + roff - 1);
1796
1797 if (rex)
1798 {
1799 /* Move the R bit to the B bit in REX byte. */
1800 rex = (rex & ~rex_mask) | (rex & REX_R) >> 2;
1801 bfd_put_8 (abfd, rex, contents + roff - 3);
1802 }
1803
1804 /* No addend for R_X86_64_32/R_X86_64_32S relocations. */
1805 irel->r_addend = 0;
1806 }
1807
1808 bfd_put_8 (abfd, opcode, contents + roff - 2);
1809 }
1810
1811 *r_type_p = r_type;
1812 irel->r_info = htab->r_info (r_symndx,
1813 r_type | R_X86_64_converted_reloc_bit);
1814
1815 *converted = true;
1816
1817 return true;
1818 }
1819
1820 /* Look through the relocs for a section during the first phase, and
1821 calculate needed space in the global offset table, and procedure
1822 linkage table. */
1823
1824 static bool
1825 elf_x86_64_scan_relocs (bfd *abfd, struct bfd_link_info *info,
1826 asection *sec,
1827 const Elf_Internal_Rela *relocs)
1828 {
1829 struct elf_x86_link_hash_table *htab;
1830 Elf_Internal_Shdr *symtab_hdr;
1831 struct elf_link_hash_entry **sym_hashes;
1832 const Elf_Internal_Rela *rel;
1833 const Elf_Internal_Rela *rel_end;
1834 bfd_byte *contents;
1835 bool converted;
1836
1837 if (bfd_link_relocatable (info))
1838 return true;
1839
1840 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
1841 if (htab == NULL)
1842 {
1843 sec->check_relocs_failed = 1;
1844 return false;
1845 }
1846
1847 BFD_ASSERT (is_x86_elf (abfd, htab));
1848
1849 /* Get the section contents. */
1850 if (elf_section_data (sec)->this_hdr.contents != NULL)
1851 contents = elf_section_data (sec)->this_hdr.contents;
1852 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
1853 {
1854 sec->check_relocs_failed = 1;
1855 return false;
1856 }
1857
1858 symtab_hdr = &elf_symtab_hdr (abfd);
1859 sym_hashes = elf_sym_hashes (abfd);
1860
1861 converted = false;
1862
1863 rel_end = relocs + sec->reloc_count;
1864 for (rel = relocs; rel < rel_end; rel++)
1865 {
1866 unsigned int r_type;
1867 unsigned int r_symndx;
1868 struct elf_link_hash_entry *h;
1869 struct elf_x86_link_hash_entry *eh;
1870 Elf_Internal_Sym *isym;
1871 const char *name;
1872 bool size_reloc;
1873 bool converted_reloc;
1874 bool no_dynreloc;
1875
1876 r_symndx = htab->r_sym (rel->r_info);
1877 r_type = ELF32_R_TYPE (rel->r_info);
1878
1879 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
1880 {
1881 /* xgettext:c-format */
1882 _bfd_error_handler (_("%pB: bad symbol index: %d"),
1883 abfd, r_symndx);
1884 goto error_return;
1885 }
1886
1887 if (r_symndx < symtab_hdr->sh_info)
1888 {
1889 /* A local symbol. */
1890 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1891 abfd, r_symndx);
1892 if (isym == NULL)
1893 goto error_return;
1894
1895 /* Check relocation against local STT_GNU_IFUNC symbol. */
1896 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1897 {
1898 h = _bfd_elf_x86_get_local_sym_hash (htab, abfd, rel,
1899 true);
1900 if (h == NULL)
1901 goto error_return;
1902
1903 /* Fake a STT_GNU_IFUNC symbol. */
1904 h->root.root.string = bfd_elf_sym_name (abfd, symtab_hdr,
1905 isym, NULL);
1906 h->type = STT_GNU_IFUNC;
1907 h->def_regular = 1;
1908 h->ref_regular = 1;
1909 h->forced_local = 1;
1910 h->root.type = bfd_link_hash_defined;
1911 }
1912 else
1913 h = NULL;
1914 }
1915 else
1916 {
1917 isym = NULL;
1918 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1919 while (h->root.type == bfd_link_hash_indirect
1920 || h->root.type == bfd_link_hash_warning)
1921 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1922 }
1923
1924 /* Check invalid x32 relocations. */
1925 if (!ABI_64_P (abfd))
1926 switch (r_type)
1927 {
1928 default:
1929 break;
1930
1931 case R_X86_64_DTPOFF64:
1932 case R_X86_64_TPOFF64:
1933 case R_X86_64_PC64:
1934 case R_X86_64_GOTOFF64:
1935 case R_X86_64_GOT64:
1936 case R_X86_64_GOTPCREL64:
1937 case R_X86_64_GOTPC64:
1938 case R_X86_64_GOTPLT64:
1939 case R_X86_64_PLTOFF64:
1940 {
1941 if (h)
1942 name = h->root.root.string;
1943 else
1944 name = bfd_elf_sym_name (abfd, symtab_hdr, isym,
1945 NULL);
1946 _bfd_error_handler
1947 /* xgettext:c-format */
1948 (_("%pB: relocation %s against symbol `%s' isn't "
1949 "supported in x32 mode"), abfd,
1950 x86_64_elf_howto_table[r_type].name, name);
1951 bfd_set_error (bfd_error_bad_value);
1952 goto error_return;
1953 }
1954 break;
1955 }
1956
1957 eh = (struct elf_x86_link_hash_entry *) h;
1958
1959 if (h != NULL)
1960 {
1961 /* It is referenced by a non-shared object. */
1962 h->ref_regular = 1;
1963 }
1964
1965 converted_reloc = false;
1966 if ((r_type == R_X86_64_GOTPCREL
1967 || r_type == R_X86_64_GOTPCRELX
1968 || r_type == R_X86_64_REX_GOTPCRELX)
1969 && (h == NULL || h->type != STT_GNU_IFUNC))
1970 {
1971 Elf_Internal_Rela *irel = (Elf_Internal_Rela *) rel;
1972 if (!elf_x86_64_convert_load_reloc (abfd, contents, &r_type,
1973 irel, h, &converted_reloc,
1974 info))
1975 goto error_return;
1976
1977 if (converted_reloc)
1978 converted = true;
1979 }
1980
1981 if (!_bfd_elf_x86_valid_reloc_p (sec, info, htab, rel, h, isym,
1982 symtab_hdr, &no_dynreloc))
1983 return false;
1984
1985 if (! elf_x86_64_tls_transition (info, abfd, sec, contents,
1986 symtab_hdr, sym_hashes,
1987 &r_type, GOT_UNKNOWN,
1988 rel, rel_end, h, r_symndx, false))
1989 goto error_return;
1990
1991 /* Check if _GLOBAL_OFFSET_TABLE_ is referenced. */
1992 if (h == htab->elf.hgot)
1993 htab->got_referenced = true;
1994
1995 switch (r_type)
1996 {
1997 case R_X86_64_TLSLD:
1998 htab->tls_ld_or_ldm_got.refcount = 1;
1999 goto create_got;
2000
2001 case R_X86_64_TPOFF32:
2002 if (!bfd_link_executable (info) && ABI_64_P (abfd))
2003 return elf_x86_64_need_pic (info, abfd, sec, h, symtab_hdr, isym,
2004 &x86_64_elf_howto_table[r_type]);
2005 if (eh != NULL)
2006 eh->zero_undefweak &= 0x2;
2007 break;
2008
2009 case R_X86_64_GOTTPOFF:
2010 if (!bfd_link_executable (info))
2011 info->flags |= DF_STATIC_TLS;
2012 /* Fall through */
2013
2014 case R_X86_64_GOT32:
2015 case R_X86_64_GOTPCREL:
2016 case R_X86_64_GOTPCRELX:
2017 case R_X86_64_REX_GOTPCRELX:
2018 case R_X86_64_TLSGD:
2019 case R_X86_64_GOT64:
2020 case R_X86_64_GOTPCREL64:
2021 case R_X86_64_GOTPLT64:
2022 case R_X86_64_GOTPC32_TLSDESC:
2023 case R_X86_64_TLSDESC_CALL:
2024 /* This symbol requires a global offset table entry. */
2025 {
2026 int tls_type, old_tls_type;
2027
2028 switch (r_type)
2029 {
2030 default:
2031 tls_type = GOT_NORMAL;
2032 if (h)
2033 {
2034 if (ABS_SYMBOL_P (h))
2035 tls_type = GOT_ABS;
2036 }
2037 else if (isym->st_shndx == SHN_ABS)
2038 tls_type = GOT_ABS;
2039 break;
2040 case R_X86_64_TLSGD:
2041 tls_type = GOT_TLS_GD;
2042 break;
2043 case R_X86_64_GOTTPOFF:
2044 tls_type = GOT_TLS_IE;
2045 break;
2046 case R_X86_64_GOTPC32_TLSDESC:
2047 case R_X86_64_TLSDESC_CALL:
2048 tls_type = GOT_TLS_GDESC;
2049 break;
2050 }
2051
2052 if (h != NULL)
2053 {
2054 h->got.refcount = 1;
2055 old_tls_type = eh->tls_type;
2056 }
2057 else
2058 {
2059 bfd_signed_vma *local_got_refcounts;
2060
2061 if (!elf_x86_allocate_local_got_info (abfd,
2062 symtab_hdr->sh_info))
2063 goto error_return;
2064
2065 /* This is a global offset table entry for a local symbol. */
2066 local_got_refcounts = elf_local_got_refcounts (abfd);
2067 local_got_refcounts[r_symndx] = 1;
2068 old_tls_type
2069 = elf_x86_local_got_tls_type (abfd) [r_symndx];
2070 }
2071
2072 /* If a TLS symbol is accessed using IE at least once,
2073 there is no point to use dynamic model for it. */
2074 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
2075 && (! GOT_TLS_GD_ANY_P (old_tls_type)
2076 || tls_type != GOT_TLS_IE))
2077 {
2078 if (old_tls_type == GOT_TLS_IE && GOT_TLS_GD_ANY_P (tls_type))
2079 tls_type = old_tls_type;
2080 else if (GOT_TLS_GD_ANY_P (old_tls_type)
2081 && GOT_TLS_GD_ANY_P (tls_type))
2082 tls_type |= old_tls_type;
2083 else
2084 {
2085 if (h)
2086 name = h->root.root.string;
2087 else
2088 name = bfd_elf_sym_name (abfd, symtab_hdr,
2089 isym, NULL);
2090 _bfd_error_handler
2091 /* xgettext:c-format */
2092 (_("%pB: '%s' accessed both as normal and"
2093 " thread local symbol"),
2094 abfd, name);
2095 bfd_set_error (bfd_error_bad_value);
2096 goto error_return;
2097 }
2098 }
2099
2100 if (old_tls_type != tls_type)
2101 {
2102 if (eh != NULL)
2103 eh->tls_type = tls_type;
2104 else
2105 elf_x86_local_got_tls_type (abfd) [r_symndx] = tls_type;
2106 }
2107 }
2108 /* Fall through */
2109
2110 case R_X86_64_GOTOFF64:
2111 case R_X86_64_GOTPC32:
2112 case R_X86_64_GOTPC64:
2113 create_got:
2114 if (eh != NULL)
2115 eh->zero_undefweak &= 0x2;
2116 break;
2117
2118 case R_X86_64_PLT32:
2119 case R_X86_64_PLT32_BND:
2120 /* This symbol requires a procedure linkage table entry. We
2121 actually build the entry in adjust_dynamic_symbol,
2122 because this might be a case of linking PIC code which is
2123 never referenced by a dynamic object, in which case we
2124 don't need to generate a procedure linkage table entry
2125 after all. */
2126
2127 /* If this is a local symbol, we resolve it directly without
2128 creating a procedure linkage table entry. */
2129 if (h == NULL)
2130 continue;
2131
2132 eh->zero_undefweak &= 0x2;
2133 h->needs_plt = 1;
2134 h->plt.refcount = 1;
2135 break;
2136
2137 case R_X86_64_PLTOFF64:
2138 /* This tries to form the 'address' of a function relative
2139 to GOT. For global symbols we need a PLT entry. */
2140 if (h != NULL)
2141 {
2142 h->needs_plt = 1;
2143 h->plt.refcount = 1;
2144 }
2145 goto create_got;
2146
2147 case R_X86_64_SIZE32:
2148 case R_X86_64_SIZE64:
2149 size_reloc = true;
2150 goto do_size;
2151
2152 case R_X86_64_32:
2153 if (!ABI_64_P (abfd))
2154 goto pointer;
2155 /* Fall through. */
2156 case R_X86_64_8:
2157 case R_X86_64_16:
2158 case R_X86_64_32S:
2159 /* Check relocation overflow as these relocs may lead to
2160 run-time relocation overflow. Don't error out for
2161 sections we don't care about, such as debug sections or
2162 when relocation overflow check is disabled. */
2163 if (!htab->params->no_reloc_overflow_check
2164 && !converted_reloc
2165 && (bfd_link_pic (info)
2166 || (bfd_link_executable (info)
2167 && h != NULL
2168 && !h->def_regular
2169 && h->def_dynamic
2170 && (sec->flags & SEC_READONLY) == 0)))
2171 return elf_x86_64_need_pic (info, abfd, sec, h, symtab_hdr, isym,
2172 &x86_64_elf_howto_table[r_type]);
2173 /* Fall through. */
2174
2175 case R_X86_64_PC8:
2176 case R_X86_64_PC16:
2177 case R_X86_64_PC32:
2178 case R_X86_64_PC32_BND:
2179 case R_X86_64_PC64:
2180 case R_X86_64_64:
2181 pointer:
2182 if (eh != NULL && (sec->flags & SEC_CODE) != 0)
2183 eh->zero_undefweak |= 0x2;
2184 /* We are called after all symbols have been resolved. Only
2185 relocation against STT_GNU_IFUNC symbol must go through
2186 PLT. */
2187 if (h != NULL
2188 && (bfd_link_executable (info)
2189 || h->type == STT_GNU_IFUNC))
2190 {
2191 bool func_pointer_ref = false;
2192
2193 if (r_type == R_X86_64_PC32)
2194 {
2195 /* Since something like ".long foo - ." may be used
2196 as pointer, make sure that PLT is used if foo is
2197 a function defined in a shared library. */
2198 if ((sec->flags & SEC_CODE) == 0)
2199 {
2200 h->pointer_equality_needed = 1;
2201 if (bfd_link_pie (info)
2202 && h->type == STT_FUNC
2203 && !h->def_regular
2204 && h->def_dynamic)
2205 {
2206 h->needs_plt = 1;
2207 h->plt.refcount = 1;
2208 }
2209 }
2210 }
2211 else if (r_type != R_X86_64_PC32_BND
2212 && r_type != R_X86_64_PC64)
2213 {
2214 /* At run-time, R_X86_64_64 can be resolved for both
2215 x86-64 and x32. But R_X86_64_32 and R_X86_64_32S
2216 can only be resolved for x32. Function pointer
2217 reference doesn't need PLT for pointer equality. */
2218 if ((sec->flags & SEC_READONLY) == 0
2219 && (r_type == R_X86_64_64
2220 || (!ABI_64_P (abfd)
2221 && (r_type == R_X86_64_32
2222 || r_type == R_X86_64_32S))))
2223 func_pointer_ref = true;
2224 else
2225 h->pointer_equality_needed = 1;
2226 }
2227
2228 if (!func_pointer_ref)
2229 {
2230 /* If this reloc is in a read-only section, we might
2231 need a copy reloc. We can't check reliably at this
2232 stage whether the section is read-only, as input
2233 sections have not yet been mapped to output sections.
2234 Tentatively set the flag for now, and correct in
2235 adjust_dynamic_symbol. */
2236 h->non_got_ref = 1;
2237
2238 if (!elf_has_indirect_extern_access (sec->owner))
2239 eh->non_got_ref_without_indirect_extern_access = 1;
2240
2241 /* We may need a .plt entry if the symbol is a function
2242 defined in a shared lib or is a function referenced
2243 from the code or read-only section. */
2244 if (!h->def_regular
2245 || (sec->flags & (SEC_CODE | SEC_READONLY)) != 0)
2246 h->plt.refcount = 1;
2247
2248 if (h->pointer_equality_needed
2249 && h->type == STT_FUNC
2250 && eh->def_protected
2251 && elf_has_indirect_extern_access (h->root.u.def.section->owner))
2252 {
2253 /* Disallow non-canonical reference to canonical
2254 protected function. */
2255 _bfd_error_handler
2256 /* xgettext:c-format */
2257 (_("%pB: non-canonical reference to canonical "
2258 "protected function `%s' in %pB"),
2259 abfd, h->root.root.string,
2260 h->root.u.def.section->owner);
2261 bfd_set_error (bfd_error_bad_value);
2262 goto error_return;
2263 }
2264 }
2265 }
2266
2267 size_reloc = false;
2268 do_size:
2269 if (!no_dynreloc
2270 && NEED_DYNAMIC_RELOCATION_P (true, info, true, h, sec,
2271 r_type,
2272 htab->pointer_r_type))
2273 {
2274 struct elf_dyn_relocs *p;
2275 struct elf_dyn_relocs **head;
2276
2277 /* If this is a global symbol, we count the number of
2278 relocations we need for this symbol. */
2279 if (h != NULL)
2280 head = &h->dyn_relocs;
2281 else
2282 {
2283 /* Track dynamic relocs needed for local syms too.
2284 We really need local syms available to do this
2285 easily. Oh well. */
2286 asection *s;
2287 void **vpp;
2288
2289 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
2290 abfd, r_symndx);
2291 if (isym == NULL)
2292 goto error_return;
2293
2294 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
2295 if (s == NULL)
2296 s = sec;
2297
2298 /* Beware of type punned pointers vs strict aliasing
2299 rules. */
2300 vpp = &(elf_section_data (s)->local_dynrel);
2301 head = (struct elf_dyn_relocs **)vpp;
2302 }
2303
2304 p = *head;
2305 if (p == NULL || p->sec != sec)
2306 {
2307 size_t amt = sizeof *p;
2308
2309 p = ((struct elf_dyn_relocs *)
2310 bfd_alloc (htab->elf.dynobj, amt));
2311 if (p == NULL)
2312 goto error_return;
2313 p->next = *head;
2314 *head = p;
2315 p->sec = sec;
2316 p->count = 0;
2317 p->pc_count = 0;
2318 }
2319
2320 p->count += 1;
2321 /* Count size relocation as PC-relative relocation. */
2322 if (X86_PCREL_TYPE_P (true, r_type) || size_reloc)
2323 p->pc_count += 1;
2324 }
2325 break;
2326
2327 /* This relocation describes the C++ object vtable hierarchy.
2328 Reconstruct it for later use during GC. */
2329 case R_X86_64_GNU_VTINHERIT:
2330 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
2331 goto error_return;
2332 break;
2333
2334 /* This relocation describes which C++ vtable entries are actually
2335 used. Record for later use during GC. */
2336 case R_X86_64_GNU_VTENTRY:
2337 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
2338 goto error_return;
2339 break;
2340
2341 default:
2342 break;
2343 }
2344 }
2345
2346 if (elf_section_data (sec)->this_hdr.contents != contents)
2347 {
2348 if (!converted && !_bfd_link_keep_memory (info))
2349 free (contents);
2350 else
2351 {
2352 /* Cache the section contents for elf_link_input_bfd if any
2353 load is converted or --no-keep-memory isn't used. */
2354 elf_section_data (sec)->this_hdr.contents = contents;
2355 info->cache_size += sec->size;
2356 }
2357 }
2358
2359 /* Cache relocations if any load is converted. */
2360 if (elf_section_data (sec)->relocs != relocs && converted)
2361 elf_section_data (sec)->relocs = (Elf_Internal_Rela *) relocs;
2362
2363 return true;
2364
2365 error_return:
2366 if (elf_section_data (sec)->this_hdr.contents != contents)
2367 free (contents);
2368 sec->check_relocs_failed = 1;
2369 return false;
2370 }
2371
2372 static bool
2373 elf_x86_64_always_size_sections (bfd *output_bfd,
2374 struct bfd_link_info *info)
2375 {
2376 bfd *abfd;
2377
2378 /* Scan relocations after rel_from_abs has been set on __ehdr_start. */
2379 for (abfd = info->input_bfds;
2380 abfd != (bfd *) NULL;
2381 abfd = abfd->link.next)
2382 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
2383 && !_bfd_elf_link_iterate_on_relocs (abfd, info,
2384 elf_x86_64_scan_relocs))
2385 return false;
2386
2387 return _bfd_x86_elf_always_size_sections (output_bfd, info);
2388 }
2389
2390 /* Return the relocation value for @tpoff relocation
2391 if STT_TLS virtual address is ADDRESS. */
2392
2393 static bfd_vma
2394 elf_x86_64_tpoff (struct bfd_link_info *info, bfd_vma address)
2395 {
2396 struct elf_link_hash_table *htab = elf_hash_table (info);
2397 const struct elf_backend_data *bed = get_elf_backend_data (info->output_bfd);
2398 bfd_vma static_tls_size;
2399
2400 /* If tls_segment is NULL, we should have signalled an error already. */
2401 if (htab->tls_sec == NULL)
2402 return 0;
2403
2404 /* Consider special static TLS alignment requirements. */
2405 static_tls_size = BFD_ALIGN (htab->tls_size, bed->static_tls_alignment);
2406 return address - static_tls_size - htab->tls_sec->vma;
2407 }
2408
2409 /* Relocate an x86_64 ELF section. */
2410
2411 static int
2412 elf_x86_64_relocate_section (bfd *output_bfd,
2413 struct bfd_link_info *info,
2414 bfd *input_bfd,
2415 asection *input_section,
2416 bfd_byte *contents,
2417 Elf_Internal_Rela *relocs,
2418 Elf_Internal_Sym *local_syms,
2419 asection **local_sections)
2420 {
2421 struct elf_x86_link_hash_table *htab;
2422 Elf_Internal_Shdr *symtab_hdr;
2423 struct elf_link_hash_entry **sym_hashes;
2424 bfd_vma *local_got_offsets;
2425 bfd_vma *local_tlsdesc_gotents;
2426 Elf_Internal_Rela *rel;
2427 Elf_Internal_Rela *wrel;
2428 Elf_Internal_Rela *relend;
2429 unsigned int plt_entry_size;
2430 bool status;
2431
2432 /* Skip if check_relocs or scan_relocs failed. */
2433 if (input_section->check_relocs_failed)
2434 return false;
2435
2436 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
2437 if (htab == NULL)
2438 return false;
2439
2440 if (!is_x86_elf (input_bfd, htab))
2441 {
2442 bfd_set_error (bfd_error_wrong_format);
2443 return false;
2444 }
2445
2446 plt_entry_size = htab->plt.plt_entry_size;
2447 symtab_hdr = &elf_symtab_hdr (input_bfd);
2448 sym_hashes = elf_sym_hashes (input_bfd);
2449 local_got_offsets = elf_local_got_offsets (input_bfd);
2450 local_tlsdesc_gotents = elf_x86_local_tlsdesc_gotent (input_bfd);
2451
2452 _bfd_x86_elf_set_tls_module_base (info);
2453
2454 status = true;
2455 rel = wrel = relocs;
2456 relend = relocs + input_section->reloc_count;
2457 for (; rel < relend; wrel++, rel++)
2458 {
2459 unsigned int r_type, r_type_tls;
2460 reloc_howto_type *howto;
2461 unsigned long r_symndx;
2462 struct elf_link_hash_entry *h;
2463 struct elf_x86_link_hash_entry *eh;
2464 Elf_Internal_Sym *sym;
2465 asection *sec;
2466 bfd_vma off, offplt, plt_offset;
2467 bfd_vma relocation;
2468 bool unresolved_reloc;
2469 bfd_reloc_status_type r;
2470 int tls_type;
2471 asection *base_got, *resolved_plt;
2472 bfd_vma st_size;
2473 bool resolved_to_zero;
2474 bool relative_reloc;
2475 bool converted_reloc;
2476 bool need_copy_reloc_in_pie;
2477 bool no_copyreloc_p;
2478
2479 r_type = ELF32_R_TYPE (rel->r_info);
2480 if (r_type == (int) R_X86_64_GNU_VTINHERIT
2481 || r_type == (int) R_X86_64_GNU_VTENTRY)
2482 {
2483 if (wrel != rel)
2484 *wrel = *rel;
2485 continue;
2486 }
2487
2488 r_symndx = htab->r_sym (rel->r_info);
2489 converted_reloc = (r_type & R_X86_64_converted_reloc_bit) != 0;
2490 if (converted_reloc)
2491 {
2492 r_type &= ~R_X86_64_converted_reloc_bit;
2493 rel->r_info = htab->r_info (r_symndx, r_type);
2494 }
2495
2496 howto = elf_x86_64_rtype_to_howto (input_bfd, r_type);
2497 if (howto == NULL)
2498 return _bfd_unrecognized_reloc (input_bfd, input_section, r_type);
2499
2500 h = NULL;
2501 sym = NULL;
2502 sec = NULL;
2503 unresolved_reloc = false;
2504 if (r_symndx < symtab_hdr->sh_info)
2505 {
2506 sym = local_syms + r_symndx;
2507 sec = local_sections[r_symndx];
2508
2509 relocation = _bfd_elf_rela_local_sym (output_bfd, sym,
2510 &sec, rel);
2511 st_size = sym->st_size;
2512
2513 /* Relocate against local STT_GNU_IFUNC symbol. */
2514 if (!bfd_link_relocatable (info)
2515 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2516 {
2517 h = _bfd_elf_x86_get_local_sym_hash (htab, input_bfd,
2518 rel, false);
2519 if (h == NULL)
2520 abort ();
2521
2522 /* Set STT_GNU_IFUNC symbol value. */
2523 h->root.u.def.value = sym->st_value;
2524 h->root.u.def.section = sec;
2525 }
2526 }
2527 else
2528 {
2529 bool warned ATTRIBUTE_UNUSED;
2530 bool ignored ATTRIBUTE_UNUSED;
2531
2532 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2533 r_symndx, symtab_hdr, sym_hashes,
2534 h, sec, relocation,
2535 unresolved_reloc, warned, ignored);
2536 st_size = h->size;
2537 }
2538
2539 if (sec != NULL && discarded_section (sec))
2540 {
2541 _bfd_clear_contents (howto, input_bfd, input_section,
2542 contents, rel->r_offset);
2543 wrel->r_offset = rel->r_offset;
2544 wrel->r_info = 0;
2545 wrel->r_addend = 0;
2546
2547 /* For ld -r, remove relocations in debug sections against
2548 sections defined in discarded sections. Not done for
2549 eh_frame editing code expects to be present. */
2550 if (bfd_link_relocatable (info)
2551 && (input_section->flags & SEC_DEBUGGING))
2552 wrel--;
2553
2554 continue;
2555 }
2556
2557 if (bfd_link_relocatable (info))
2558 {
2559 if (wrel != rel)
2560 *wrel = *rel;
2561 continue;
2562 }
2563
2564 if (rel->r_addend == 0 && !ABI_64_P (output_bfd))
2565 {
2566 if (r_type == R_X86_64_64)
2567 {
2568 /* For x32, treat R_X86_64_64 like R_X86_64_32 and
2569 zero-extend it to 64bit if addend is zero. */
2570 r_type = R_X86_64_32;
2571 memset (contents + rel->r_offset + 4, 0, 4);
2572 }
2573 else if (r_type == R_X86_64_SIZE64)
2574 {
2575 /* For x32, treat R_X86_64_SIZE64 like R_X86_64_SIZE32 and
2576 zero-extend it to 64bit if addend is zero. */
2577 r_type = R_X86_64_SIZE32;
2578 memset (contents + rel->r_offset + 4, 0, 4);
2579 }
2580 }
2581
2582 eh = (struct elf_x86_link_hash_entry *) h;
2583
2584 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle
2585 it here if it is defined in a non-shared object. */
2586 if (h != NULL
2587 && h->type == STT_GNU_IFUNC
2588 && h->def_regular)
2589 {
2590 bfd_vma plt_index;
2591 const char *name;
2592
2593 if ((input_section->flags & SEC_ALLOC) == 0)
2594 {
2595 /* If this is a SHT_NOTE section without SHF_ALLOC, treat
2596 STT_GNU_IFUNC symbol as STT_FUNC. */
2597 if (elf_section_type (input_section) == SHT_NOTE)
2598 goto skip_ifunc;
2599 /* Dynamic relocs are not propagated for SEC_DEBUGGING
2600 sections because such sections are not SEC_ALLOC and
2601 thus ld.so will not process them. */
2602 if ((input_section->flags & SEC_DEBUGGING) != 0)
2603 continue;
2604 abort ();
2605 }
2606
2607 switch (r_type)
2608 {
2609 default:
2610 break;
2611
2612 case R_X86_64_GOTPCREL:
2613 case R_X86_64_GOTPCRELX:
2614 case R_X86_64_REX_GOTPCRELX:
2615 case R_X86_64_GOTPCREL64:
2616 base_got = htab->elf.sgot;
2617 off = h->got.offset;
2618
2619 if (base_got == NULL)
2620 abort ();
2621
2622 if (off == (bfd_vma) -1)
2623 {
2624 /* We can't use h->got.offset here to save state, or
2625 even just remember the offset, as finish_dynamic_symbol
2626 would use that as offset into .got. */
2627
2628 if (h->plt.offset == (bfd_vma) -1)
2629 abort ();
2630
2631 if (htab->elf.splt != NULL)
2632 {
2633 plt_index = (h->plt.offset / plt_entry_size
2634 - htab->plt.has_plt0);
2635 off = (plt_index + 3) * GOT_ENTRY_SIZE;
2636 base_got = htab->elf.sgotplt;
2637 }
2638 else
2639 {
2640 plt_index = h->plt.offset / plt_entry_size;
2641 off = plt_index * GOT_ENTRY_SIZE;
2642 base_got = htab->elf.igotplt;
2643 }
2644
2645 if (h->dynindx == -1
2646 || h->forced_local
2647 || info->symbolic)
2648 {
2649 /* This references the local defitionion. We must
2650 initialize this entry in the global offset table.
2651 Since the offset must always be a multiple of 8,
2652 we use the least significant bit to record
2653 whether we have initialized it already.
2654
2655 When doing a dynamic link, we create a .rela.got
2656 relocation entry to initialize the value. This
2657 is done in the finish_dynamic_symbol routine. */
2658 if ((off & 1) != 0)
2659 off &= ~1;
2660 else
2661 {
2662 bfd_put_64 (output_bfd, relocation,
2663 base_got->contents + off);
2664 /* Note that this is harmless for the GOTPLT64
2665 case, as -1 | 1 still is -1. */
2666 h->got.offset |= 1;
2667 }
2668 }
2669 }
2670
2671 relocation = (base_got->output_section->vma
2672 + base_got->output_offset + off);
2673
2674 goto do_relocation;
2675 }
2676
2677 if (h->plt.offset == (bfd_vma) -1)
2678 {
2679 /* Handle static pointers of STT_GNU_IFUNC symbols. */
2680 if (r_type == htab->pointer_r_type
2681 && (input_section->flags & SEC_CODE) == 0)
2682 goto do_ifunc_pointer;
2683 goto bad_ifunc_reloc;
2684 }
2685
2686 /* STT_GNU_IFUNC symbol must go through PLT. */
2687 if (htab->elf.splt != NULL)
2688 {
2689 if (htab->plt_second != NULL)
2690 {
2691 resolved_plt = htab->plt_second;
2692 plt_offset = eh->plt_second.offset;
2693 }
2694 else
2695 {
2696 resolved_plt = htab->elf.splt;
2697 plt_offset = h->plt.offset;
2698 }
2699 }
2700 else
2701 {
2702 resolved_plt = htab->elf.iplt;
2703 plt_offset = h->plt.offset;
2704 }
2705
2706 relocation = (resolved_plt->output_section->vma
2707 + resolved_plt->output_offset + plt_offset);
2708
2709 switch (r_type)
2710 {
2711 default:
2712 bad_ifunc_reloc:
2713 if (h->root.root.string)
2714 name = h->root.root.string;
2715 else
2716 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2717 NULL);
2718 _bfd_error_handler
2719 /* xgettext:c-format */
2720 (_("%pB: relocation %s against STT_GNU_IFUNC "
2721 "symbol `%s' isn't supported"), input_bfd,
2722 howto->name, name);
2723 bfd_set_error (bfd_error_bad_value);
2724 return false;
2725
2726 case R_X86_64_32S:
2727 if (bfd_link_pic (info))
2728 abort ();
2729 goto do_relocation;
2730
2731 case R_X86_64_32:
2732 if (ABI_64_P (output_bfd))
2733 goto do_relocation;
2734 /* FALLTHROUGH */
2735 case R_X86_64_64:
2736 do_ifunc_pointer:
2737 if (rel->r_addend != 0)
2738 {
2739 if (h->root.root.string)
2740 name = h->root.root.string;
2741 else
2742 name = bfd_elf_sym_name (input_bfd, symtab_hdr,
2743 sym, NULL);
2744 _bfd_error_handler
2745 /* xgettext:c-format */
2746 (_("%pB: relocation %s against STT_GNU_IFUNC "
2747 "symbol `%s' has non-zero addend: %" PRId64),
2748 input_bfd, howto->name, name, (int64_t) rel->r_addend);
2749 bfd_set_error (bfd_error_bad_value);
2750 return false;
2751 }
2752
2753 /* Generate dynamic relcoation only when there is a
2754 non-GOT reference in a shared object or there is no
2755 PLT. */
2756 if ((bfd_link_pic (info) && h->non_got_ref)
2757 || h->plt.offset == (bfd_vma) -1)
2758 {
2759 Elf_Internal_Rela outrel;
2760 asection *sreloc;
2761
2762 /* Need a dynamic relocation to get the real function
2763 address. */
2764 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2765 info,
2766 input_section,
2767 rel->r_offset);
2768 if (outrel.r_offset == (bfd_vma) -1
2769 || outrel.r_offset == (bfd_vma) -2)
2770 abort ();
2771
2772 outrel.r_offset += (input_section->output_section->vma
2773 + input_section->output_offset);
2774
2775 if (POINTER_LOCAL_IFUNC_P (info, h))
2776 {
2777 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
2778 h->root.root.string,
2779 h->root.u.def.section->owner);
2780
2781 /* This symbol is resolved locally. */
2782 outrel.r_info = htab->r_info (0, R_X86_64_IRELATIVE);
2783 outrel.r_addend = (h->root.u.def.value
2784 + h->root.u.def.section->output_section->vma
2785 + h->root.u.def.section->output_offset);
2786
2787 if (htab->params->report_relative_reloc)
2788 _bfd_x86_elf_link_report_relative_reloc
2789 (info, input_section, h, sym,
2790 "R_X86_64_IRELATIVE", &outrel);
2791 }
2792 else
2793 {
2794 outrel.r_info = htab->r_info (h->dynindx, r_type);
2795 outrel.r_addend = 0;
2796 }
2797
2798 /* Dynamic relocations are stored in
2799 1. .rela.ifunc section in PIC object.
2800 2. .rela.got section in dynamic executable.
2801 3. .rela.iplt section in static executable. */
2802 if (bfd_link_pic (info))
2803 sreloc = htab->elf.irelifunc;
2804 else if (htab->elf.splt != NULL)
2805 sreloc = htab->elf.srelgot;
2806 else
2807 sreloc = htab->elf.irelplt;
2808 elf_append_rela (output_bfd, sreloc, &outrel);
2809
2810 /* If this reloc is against an external symbol, we
2811 do not want to fiddle with the addend. Otherwise,
2812 we need to include the symbol value so that it
2813 becomes an addend for the dynamic reloc. For an
2814 internal symbol, we have updated addend. */
2815 continue;
2816 }
2817 /* FALLTHROUGH */
2818 case R_X86_64_PC32:
2819 case R_X86_64_PC32_BND:
2820 case R_X86_64_PC64:
2821 case R_X86_64_PLT32:
2822 case R_X86_64_PLT32_BND:
2823 goto do_relocation;
2824 }
2825 }
2826
2827 skip_ifunc:
2828 resolved_to_zero = (eh != NULL
2829 && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh));
2830
2831 /* When generating a shared object, the relocations handled here are
2832 copied into the output file to be resolved at run time. */
2833 switch (r_type)
2834 {
2835 case R_X86_64_GOT32:
2836 case R_X86_64_GOT64:
2837 /* Relocation is to the entry for this symbol in the global
2838 offset table. */
2839 case R_X86_64_GOTPCREL:
2840 case R_X86_64_GOTPCRELX:
2841 case R_X86_64_REX_GOTPCRELX:
2842 case R_X86_64_GOTPCREL64:
2843 /* Use global offset table entry as symbol value. */
2844 case R_X86_64_GOTPLT64:
2845 /* This is obsolete and treated the same as GOT64. */
2846 base_got = htab->elf.sgot;
2847
2848 if (htab->elf.sgot == NULL)
2849 abort ();
2850
2851 relative_reloc = false;
2852 if (h != NULL)
2853 {
2854 off = h->got.offset;
2855 if (h->needs_plt
2856 && h->plt.offset != (bfd_vma)-1
2857 && off == (bfd_vma)-1)
2858 {
2859 /* We can't use h->got.offset here to save
2860 state, or even just remember the offset, as
2861 finish_dynamic_symbol would use that as offset into
2862 .got. */
2863 bfd_vma plt_index = (h->plt.offset / plt_entry_size
2864 - htab->plt.has_plt0);
2865 off = (plt_index + 3) * GOT_ENTRY_SIZE;
2866 base_got = htab->elf.sgotplt;
2867 }
2868
2869 if (RESOLVED_LOCALLY_P (info, h, htab))
2870 {
2871 /* We must initialize this entry in the global offset
2872 table. Since the offset must always be a multiple
2873 of 8, we use the least significant bit to record
2874 whether we have initialized it already.
2875
2876 When doing a dynamic link, we create a .rela.got
2877 relocation entry to initialize the value. This is
2878 done in the finish_dynamic_symbol routine. */
2879 if ((off & 1) != 0)
2880 off &= ~1;
2881 else
2882 {
2883 bfd_put_64 (output_bfd, relocation,
2884 base_got->contents + off);
2885 /* Note that this is harmless for the GOTPLT64 case,
2886 as -1 | 1 still is -1. */
2887 h->got.offset |= 1;
2888
2889 /* NB: Don't generate relative relocation here if
2890 it has been generated by DT_RELR. */
2891 if (!info->enable_dt_relr
2892 && GENERATE_RELATIVE_RELOC_P (info, h))
2893 {
2894 /* If this symbol isn't dynamic in PIC,
2895 generate R_X86_64_RELATIVE here. */
2896 eh->no_finish_dynamic_symbol = 1;
2897 relative_reloc = true;
2898 }
2899 }
2900 }
2901 else
2902 unresolved_reloc = false;
2903 }
2904 else
2905 {
2906 if (local_got_offsets == NULL)
2907 abort ();
2908
2909 off = local_got_offsets[r_symndx];
2910
2911 /* The offset must always be a multiple of 8. We use
2912 the least significant bit to record whether we have
2913 already generated the necessary reloc. */
2914 if ((off & 1) != 0)
2915 off &= ~1;
2916 else
2917 {
2918 bfd_put_64 (output_bfd, relocation,
2919 base_got->contents + off);
2920 local_got_offsets[r_symndx] |= 1;
2921
2922 /* NB: GOTPCREL relocations against local absolute
2923 symbol store relocation value in the GOT slot
2924 without relative relocation. Don't generate
2925 relative relocation here if it has been generated
2926 by DT_RELR. */
2927 if (!info->enable_dt_relr
2928 && bfd_link_pic (info)
2929 && !(sym->st_shndx == SHN_ABS
2930 && (r_type == R_X86_64_GOTPCREL
2931 || r_type == R_X86_64_GOTPCRELX
2932 || r_type == R_X86_64_REX_GOTPCRELX)))
2933 relative_reloc = true;
2934 }
2935 }
2936
2937 if (relative_reloc)
2938 {
2939 asection *s;
2940 Elf_Internal_Rela outrel;
2941
2942 /* We need to generate a R_X86_64_RELATIVE reloc
2943 for the dynamic linker. */
2944 s = htab->elf.srelgot;
2945 if (s == NULL)
2946 abort ();
2947
2948 outrel.r_offset = (base_got->output_section->vma
2949 + base_got->output_offset
2950 + off);
2951 outrel.r_info = htab->r_info (0, R_X86_64_RELATIVE);
2952 outrel.r_addend = relocation;
2953
2954 if (htab->params->report_relative_reloc)
2955 _bfd_x86_elf_link_report_relative_reloc
2956 (info, input_section, h, sym, "R_X86_64_RELATIVE",
2957 &outrel);
2958
2959 elf_append_rela (output_bfd, s, &outrel);
2960 }
2961
2962 if (off >= (bfd_vma) -2)
2963 abort ();
2964
2965 relocation = base_got->output_section->vma
2966 + base_got->output_offset + off;
2967 if (r_type != R_X86_64_GOTPCREL
2968 && r_type != R_X86_64_GOTPCRELX
2969 && r_type != R_X86_64_REX_GOTPCRELX
2970 && r_type != R_X86_64_GOTPCREL64)
2971 relocation -= htab->elf.sgotplt->output_section->vma
2972 - htab->elf.sgotplt->output_offset;
2973
2974 break;
2975
2976 case R_X86_64_GOTOFF64:
2977 /* Relocation is relative to the start of the global offset
2978 table. */
2979
2980 /* Check to make sure it isn't a protected function or data
2981 symbol for shared library since it may not be local when
2982 used as function address or with copy relocation. We also
2983 need to make sure that a symbol is referenced locally. */
2984 if (bfd_link_pic (info) && h)
2985 {
2986 if (!h->def_regular)
2987 {
2988 const char *v;
2989
2990 switch (ELF_ST_VISIBILITY (h->other))
2991 {
2992 case STV_HIDDEN:
2993 v = _("hidden symbol");
2994 break;
2995 case STV_INTERNAL:
2996 v = _("internal symbol");
2997 break;
2998 case STV_PROTECTED:
2999 v = _("protected symbol");
3000 break;
3001 default:
3002 v = _("symbol");
3003 break;
3004 }
3005
3006 _bfd_error_handler
3007 /* xgettext:c-format */
3008 (_("%pB: relocation R_X86_64_GOTOFF64 against undefined %s"
3009 " `%s' can not be used when making a shared object"),
3010 input_bfd, v, h->root.root.string);
3011 bfd_set_error (bfd_error_bad_value);
3012 return false;
3013 }
3014 else if (!bfd_link_executable (info)
3015 && !SYMBOL_REFERENCES_LOCAL_P (info, h)
3016 && (h->type == STT_FUNC
3017 || h->type == STT_OBJECT)
3018 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
3019 {
3020 _bfd_error_handler
3021 /* xgettext:c-format */
3022 (_("%pB: relocation R_X86_64_GOTOFF64 against protected %s"
3023 " `%s' can not be used when making a shared object"),
3024 input_bfd,
3025 h->type == STT_FUNC ? "function" : "data",
3026 h->root.root.string);
3027 bfd_set_error (bfd_error_bad_value);
3028 return false;
3029 }
3030 }
3031
3032 /* Note that sgot is not involved in this
3033 calculation. We always want the start of .got.plt. If we
3034 defined _GLOBAL_OFFSET_TABLE_ in a different way, as is
3035 permitted by the ABI, we might have to change this
3036 calculation. */
3037 relocation -= htab->elf.sgotplt->output_section->vma
3038 + htab->elf.sgotplt->output_offset;
3039 break;
3040
3041 case R_X86_64_GOTPC32:
3042 case R_X86_64_GOTPC64:
3043 /* Use global offset table as symbol value. */
3044 relocation = htab->elf.sgotplt->output_section->vma
3045 + htab->elf.sgotplt->output_offset;
3046 unresolved_reloc = false;
3047 break;
3048
3049 case R_X86_64_PLTOFF64:
3050 /* Relocation is PLT entry relative to GOT. For local
3051 symbols it's the symbol itself relative to GOT. */
3052 if (h != NULL
3053 /* See PLT32 handling. */
3054 && (h->plt.offset != (bfd_vma) -1
3055 || eh->plt_got.offset != (bfd_vma) -1)
3056 && htab->elf.splt != NULL)
3057 {
3058 if (eh->plt_got.offset != (bfd_vma) -1)
3059 {
3060 /* Use the GOT PLT. */
3061 resolved_plt = htab->plt_got;
3062 plt_offset = eh->plt_got.offset;
3063 }
3064 else if (htab->plt_second != NULL)
3065 {
3066 resolved_plt = htab->plt_second;
3067 plt_offset = eh->plt_second.offset;
3068 }
3069 else
3070 {
3071 resolved_plt = htab->elf.splt;
3072 plt_offset = h->plt.offset;
3073 }
3074
3075 relocation = (resolved_plt->output_section->vma
3076 + resolved_plt->output_offset
3077 + plt_offset);
3078 unresolved_reloc = false;
3079 }
3080
3081 relocation -= htab->elf.sgotplt->output_section->vma
3082 + htab->elf.sgotplt->output_offset;
3083 break;
3084
3085 case R_X86_64_PLT32:
3086 case R_X86_64_PLT32_BND:
3087 /* Relocation is to the entry for this symbol in the
3088 procedure linkage table. */
3089
3090 /* Resolve a PLT32 reloc against a local symbol directly,
3091 without using the procedure linkage table. */
3092 if (h == NULL)
3093 break;
3094
3095 if ((h->plt.offset == (bfd_vma) -1
3096 && eh->plt_got.offset == (bfd_vma) -1)
3097 || htab->elf.splt == NULL)
3098 {
3099 /* We didn't make a PLT entry for this symbol. This
3100 happens when statically linking PIC code, or when
3101 using -Bsymbolic. */
3102 break;
3103 }
3104
3105 use_plt:
3106 if (h->plt.offset != (bfd_vma) -1)
3107 {
3108 if (htab->plt_second != NULL)
3109 {
3110 resolved_plt = htab->plt_second;
3111 plt_offset = eh->plt_second.offset;
3112 }
3113 else
3114 {
3115 resolved_plt = htab->elf.splt;
3116 plt_offset = h->plt.offset;
3117 }
3118 }
3119 else
3120 {
3121 /* Use the GOT PLT. */
3122 resolved_plt = htab->plt_got;
3123 plt_offset = eh->plt_got.offset;
3124 }
3125
3126 relocation = (resolved_plt->output_section->vma
3127 + resolved_plt->output_offset
3128 + plt_offset);
3129 unresolved_reloc = false;
3130 break;
3131
3132 case R_X86_64_SIZE32:
3133 case R_X86_64_SIZE64:
3134 /* Set to symbol size. */
3135 relocation = st_size;
3136 goto direct;
3137
3138 case R_X86_64_PC8:
3139 case R_X86_64_PC16:
3140 case R_X86_64_PC32:
3141 case R_X86_64_PC32_BND:
3142 /* Don't complain about -fPIC if the symbol is undefined when
3143 building executable unless it is unresolved weak symbol,
3144 references a dynamic definition in PIE or -z nocopyreloc
3145 is used. */
3146 no_copyreloc_p
3147 = (info->nocopyreloc
3148 || (h != NULL
3149 && !h->root.linker_def
3150 && !h->root.ldscript_def
3151 && eh->def_protected
3152 && elf_has_no_copy_on_protected (h->root.u.def.section->owner)));
3153
3154 if ((input_section->flags & SEC_ALLOC) != 0
3155 && (input_section->flags & SEC_READONLY) != 0
3156 && h != NULL
3157 && ((bfd_link_executable (info)
3158 && ((h->root.type == bfd_link_hash_undefweak
3159 && (eh == NULL
3160 || !UNDEFINED_WEAK_RESOLVED_TO_ZERO (info,
3161 eh)))
3162 || (bfd_link_pie (info)
3163 && !SYMBOL_DEFINED_NON_SHARED_P (h)
3164 && h->def_dynamic)
3165 || (no_copyreloc_p
3166 && h->def_dynamic
3167 && !(h->root.u.def.section->flags & SEC_CODE))))
3168 || (bfd_link_pie (info)
3169 && h->root.type == bfd_link_hash_undefweak)
3170 || bfd_link_dll (info)))
3171 {
3172 bool fail = false;
3173 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
3174 {
3175 /* Symbol is referenced locally. Make sure it is
3176 defined locally. */
3177 fail = !SYMBOL_DEFINED_NON_SHARED_P (h);
3178 }
3179 else if (bfd_link_pie (info))
3180 {
3181 /* We can only use PC-relative relocations in PIE
3182 from non-code sections. */
3183 if (h->root.type == bfd_link_hash_undefweak
3184 || (h->type == STT_FUNC
3185 && (sec->flags & SEC_CODE) != 0))
3186 fail = true;
3187 }
3188 else if (no_copyreloc_p || bfd_link_dll (info))
3189 {
3190 /* Symbol doesn't need copy reloc and isn't
3191 referenced locally. Don't allow PC-relative
3192 relocations against default and protected
3193 symbols since address of protected function
3194 and location of protected data may not be in
3195 the shared object. */
3196 fail = (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3197 || ELF_ST_VISIBILITY (h->other) == STV_PROTECTED);
3198 }
3199
3200 if (fail)
3201 return elf_x86_64_need_pic (info, input_bfd, input_section,
3202 h, NULL, NULL, howto);
3203 }
3204 /* Since x86-64 has PC-relative PLT, we can use PLT in PIE
3205 as function address. */
3206 else if (h != NULL
3207 && (input_section->flags & SEC_CODE) == 0
3208 && bfd_link_pie (info)
3209 && h->type == STT_FUNC
3210 && !h->def_regular
3211 && h->def_dynamic)
3212 goto use_plt;
3213 /* Fall through. */
3214
3215 case R_X86_64_8:
3216 case R_X86_64_16:
3217 case R_X86_64_32:
3218 case R_X86_64_PC64:
3219 case R_X86_64_64:
3220 /* FIXME: The ABI says the linker should make sure the value is
3221 the same when it's zeroextended to 64 bit. */
3222
3223 direct:
3224 if ((input_section->flags & SEC_ALLOC) == 0)
3225 break;
3226
3227 need_copy_reloc_in_pie = (bfd_link_pie (info)
3228 && h != NULL
3229 && (h->needs_copy
3230 || eh->needs_copy
3231 || (h->root.type
3232 == bfd_link_hash_undefined))
3233 && (X86_PCREL_TYPE_P (true, r_type)
3234 || X86_SIZE_TYPE_P (true,
3235 r_type)));
3236
3237 if (GENERATE_DYNAMIC_RELOCATION_P (true, info, eh, r_type, sec,
3238 need_copy_reloc_in_pie,
3239 resolved_to_zero, false))
3240 {
3241 Elf_Internal_Rela outrel;
3242 bool skip, relocate;
3243 bool generate_dynamic_reloc = true;
3244 asection *sreloc;
3245 const char *relative_reloc_name = NULL;
3246
3247 /* When generating a shared object, these relocations
3248 are copied into the output file to be resolved at run
3249 time. */
3250 skip = false;
3251 relocate = false;
3252
3253 outrel.r_offset =
3254 _bfd_elf_section_offset (output_bfd, info, input_section,
3255 rel->r_offset);
3256 if (outrel.r_offset == (bfd_vma) -1)
3257 skip = true;
3258 else if (outrel.r_offset == (bfd_vma) -2)
3259 skip = true, relocate = true;
3260
3261 outrel.r_offset += (input_section->output_section->vma
3262 + input_section->output_offset);
3263
3264 if (skip)
3265 memset (&outrel, 0, sizeof outrel);
3266
3267 else if (COPY_INPUT_RELOC_P (true, info, h, r_type))
3268 {
3269 outrel.r_info = htab->r_info (h->dynindx, r_type);
3270 outrel.r_addend = rel->r_addend;
3271 }
3272 else
3273 {
3274 /* This symbol is local, or marked to become local.
3275 When relocation overflow check is disabled, we
3276 convert R_X86_64_32 to dynamic R_X86_64_RELATIVE. */
3277 if (r_type == htab->pointer_r_type
3278 || (r_type == R_X86_64_32
3279 && htab->params->no_reloc_overflow_check))
3280 {
3281 relocate = true;
3282 /* NB: Don't generate relative relocation here if
3283 it has been generated by DT_RELR. */
3284 if (info->enable_dt_relr)
3285 generate_dynamic_reloc = false;
3286 else
3287 {
3288 outrel.r_info =
3289 htab->r_info (0, R_X86_64_RELATIVE);
3290 outrel.r_addend = relocation + rel->r_addend;
3291 relative_reloc_name = "R_X86_64_RELATIVE";
3292 }
3293 }
3294 else if (r_type == R_X86_64_64
3295 && !ABI_64_P (output_bfd))
3296 {
3297 relocate = true;
3298 outrel.r_info = htab->r_info (0,
3299 R_X86_64_RELATIVE64);
3300 outrel.r_addend = relocation + rel->r_addend;
3301 relative_reloc_name = "R_X86_64_RELATIVE64";
3302 /* Check addend overflow. */
3303 if ((outrel.r_addend & 0x80000000)
3304 != (rel->r_addend & 0x80000000))
3305 {
3306 const char *name;
3307 int addend = rel->r_addend;
3308 if (h && h->root.root.string)
3309 name = h->root.root.string;
3310 else
3311 name = bfd_elf_sym_name (input_bfd, symtab_hdr,
3312 sym, NULL);
3313 _bfd_error_handler
3314 /* xgettext:c-format */
3315 (_("%pB: addend %s%#x in relocation %s against "
3316 "symbol `%s' at %#" PRIx64
3317 " in section `%pA' is out of range"),
3318 input_bfd, addend < 0 ? "-" : "", addend,
3319 howto->name, name, (uint64_t) rel->r_offset,
3320 input_section);
3321 bfd_set_error (bfd_error_bad_value);
3322 return false;
3323 }
3324 }
3325 else
3326 {
3327 long sindx;
3328
3329 if (bfd_is_abs_section (sec))
3330 sindx = 0;
3331 else if (sec == NULL || sec->owner == NULL)
3332 {
3333 bfd_set_error (bfd_error_bad_value);
3334 return false;
3335 }
3336 else
3337 {
3338 asection *osec;
3339
3340 /* We are turning this relocation into one
3341 against a section symbol. It would be
3342 proper to subtract the symbol's value,
3343 osec->vma, from the emitted reloc addend,
3344 but ld.so expects buggy relocs. */
3345 osec = sec->output_section;
3346 sindx = elf_section_data (osec)->dynindx;
3347 if (sindx == 0)
3348 {
3349 asection *oi = htab->elf.text_index_section;
3350 sindx = elf_section_data (oi)->dynindx;
3351 }
3352 BFD_ASSERT (sindx != 0);
3353 }
3354
3355 outrel.r_info = htab->r_info (sindx, r_type);
3356 outrel.r_addend = relocation + rel->r_addend;
3357 }
3358 }
3359
3360 if (generate_dynamic_reloc)
3361 {
3362 sreloc = elf_section_data (input_section)->sreloc;
3363
3364 if (sreloc == NULL || sreloc->contents == NULL)
3365 {
3366 r = bfd_reloc_notsupported;
3367 goto check_relocation_error;
3368 }
3369
3370 if (relative_reloc_name
3371 && htab->params->report_relative_reloc)
3372 _bfd_x86_elf_link_report_relative_reloc
3373 (info, input_section, h, sym,
3374 relative_reloc_name, &outrel);
3375
3376 elf_append_rela (output_bfd, sreloc, &outrel);
3377 }
3378
3379 /* If this reloc is against an external symbol, we do
3380 not want to fiddle with the addend. Otherwise, we
3381 need to include the symbol value so that it becomes
3382 an addend for the dynamic reloc. */
3383 if (! relocate)
3384 continue;
3385 }
3386
3387 break;
3388
3389 case R_X86_64_TLSGD:
3390 case R_X86_64_GOTPC32_TLSDESC:
3391 case R_X86_64_TLSDESC_CALL:
3392 case R_X86_64_GOTTPOFF:
3393 tls_type = GOT_UNKNOWN;
3394 if (h == NULL && local_got_offsets)
3395 tls_type = elf_x86_local_got_tls_type (input_bfd) [r_symndx];
3396 else if (h != NULL)
3397 tls_type = elf_x86_hash_entry (h)->tls_type;
3398
3399 r_type_tls = r_type;
3400 if (! elf_x86_64_tls_transition (info, input_bfd,
3401 input_section, contents,
3402 symtab_hdr, sym_hashes,
3403 &r_type_tls, tls_type, rel,
3404 relend, h, r_symndx, true))
3405 return false;
3406
3407 if (r_type_tls == R_X86_64_TPOFF32)
3408 {
3409 bfd_vma roff = rel->r_offset;
3410
3411 BFD_ASSERT (! unresolved_reloc);
3412
3413 if (r_type == R_X86_64_TLSGD)
3414 {
3415 /* GD->LE transition. For 64bit, change
3416 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3417 .word 0x6666; rex64; call __tls_get_addr@PLT
3418 or
3419 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3420 .byte 0x66; rex64
3421 call *__tls_get_addr@GOTPCREL(%rip)
3422 which may be converted to
3423 addr32 call __tls_get_addr
3424 into:
3425 movq %fs:0, %rax
3426 leaq foo@tpoff(%rax), %rax
3427 For 32bit, change
3428 leaq foo@tlsgd(%rip), %rdi
3429 .word 0x6666; rex64; call __tls_get_addr@PLT
3430 or
3431 leaq foo@tlsgd(%rip), %rdi
3432 .byte 0x66; rex64
3433 call *__tls_get_addr@GOTPCREL(%rip)
3434 which may be converted to
3435 addr32 call __tls_get_addr
3436 into:
3437 movl %fs:0, %eax
3438 leaq foo@tpoff(%rax), %rax
3439 For largepic, change:
3440 leaq foo@tlsgd(%rip), %rdi
3441 movabsq $__tls_get_addr@pltoff, %rax
3442 addq %r15, %rax
3443 call *%rax
3444 into:
3445 movq %fs:0, %rax
3446 leaq foo@tpoff(%rax), %rax
3447 nopw 0x0(%rax,%rax,1) */
3448 int largepic = 0;
3449 if (ABI_64_P (output_bfd))
3450 {
3451 if (contents[roff + 5] == 0xb8)
3452 {
3453 if (roff < 3
3454 || (roff - 3 + 22) > input_section->size)
3455 {
3456 corrupt_input:
3457 info->callbacks->einfo
3458 (_("%F%P: corrupt input: %pB\n"),
3459 input_bfd);
3460 return false;
3461 }
3462 memcpy (contents + roff - 3,
3463 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80"
3464 "\0\0\0\0\x66\x0f\x1f\x44\0", 22);
3465 largepic = 1;
3466 }
3467 else
3468 {
3469 if (roff < 4
3470 || (roff - 4 + 16) > input_section->size)
3471 goto corrupt_input;
3472 memcpy (contents + roff - 4,
3473 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
3474 16);
3475 }
3476 }
3477 else
3478 {
3479 if (roff < 3
3480 || (roff - 3 + 15) > input_section->size)
3481 goto corrupt_input;
3482 memcpy (contents + roff - 3,
3483 "\x64\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
3484 15);
3485 }
3486 bfd_put_32 (output_bfd,
3487 elf_x86_64_tpoff (info, relocation),
3488 contents + roff + 8 + largepic);
3489 /* Skip R_X86_64_PC32, R_X86_64_PLT32,
3490 R_X86_64_GOTPCRELX and R_X86_64_PLTOFF64. */
3491 rel++;
3492 wrel++;
3493 continue;
3494 }
3495 else if (r_type == R_X86_64_GOTPC32_TLSDESC)
3496 {
3497 /* GDesc -> LE transition.
3498 It's originally something like:
3499 leaq x@tlsdesc(%rip), %rax <--- LP64 mode.
3500 rex leal x@tlsdesc(%rip), %eax <--- X32 mode.
3501
3502 Change it to:
3503 movq $x@tpoff, %rax <--- LP64 mode.
3504 rex movl $x@tpoff, %eax <--- X32 mode.
3505 */
3506
3507 unsigned int val, type;
3508
3509 if (roff < 3)
3510 goto corrupt_input;
3511 type = bfd_get_8 (input_bfd, contents + roff - 3);
3512 val = bfd_get_8 (input_bfd, contents + roff - 1);
3513 bfd_put_8 (output_bfd,
3514 (type & 0x48) | ((type >> 2) & 1),
3515 contents + roff - 3);
3516 bfd_put_8 (output_bfd, 0xc7, contents + roff - 2);
3517 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
3518 contents + roff - 1);
3519 bfd_put_32 (output_bfd,
3520 elf_x86_64_tpoff (info, relocation),
3521 contents + roff);
3522 continue;
3523 }
3524 else if (r_type == R_X86_64_TLSDESC_CALL)
3525 {
3526 /* GDesc -> LE transition.
3527 It's originally:
3528 call *(%rax) <--- LP64 mode.
3529 call *(%eax) <--- X32 mode.
3530 Turn it into:
3531 xchg %ax,%ax <-- LP64 mode.
3532 nopl (%rax) <-- X32 mode.
3533 */
3534 unsigned int prefix = 0;
3535 if (!ABI_64_P (input_bfd))
3536 {
3537 /* Check for call *x@tlsdesc(%eax). */
3538 if (contents[roff] == 0x67)
3539 prefix = 1;
3540 }
3541 if (prefix)
3542 {
3543 bfd_put_8 (output_bfd, 0x0f, contents + roff);
3544 bfd_put_8 (output_bfd, 0x1f, contents + roff + 1);
3545 bfd_put_8 (output_bfd, 0x00, contents + roff + 2);
3546 }
3547 else
3548 {
3549 bfd_put_8 (output_bfd, 0x66, contents + roff);
3550 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3551 }
3552 continue;
3553 }
3554 else if (r_type == R_X86_64_GOTTPOFF)
3555 {
3556 /* IE->LE transition:
3557 For 64bit, originally it can be one of:
3558 movq foo@gottpoff(%rip), %reg
3559 addq foo@gottpoff(%rip), %reg
3560 We change it into:
3561 movq $foo, %reg
3562 leaq foo(%reg), %reg
3563 addq $foo, %reg.
3564 For 32bit, originally it can be one of:
3565 movq foo@gottpoff(%rip), %reg
3566 addl foo@gottpoff(%rip), %reg
3567 We change it into:
3568 movq $foo, %reg
3569 leal foo(%reg), %reg
3570 addl $foo, %reg. */
3571
3572 unsigned int val, type, reg;
3573
3574 if (roff >= 3)
3575 val = bfd_get_8 (input_bfd, contents + roff - 3);
3576 else
3577 {
3578 if (roff < 2)
3579 goto corrupt_input;
3580 val = 0;
3581 }
3582 type = bfd_get_8 (input_bfd, contents + roff - 2);
3583 reg = bfd_get_8 (input_bfd, contents + roff - 1);
3584 reg >>= 3;
3585 if (type == 0x8b)
3586 {
3587 /* movq */
3588 if (val == 0x4c)
3589 {
3590 if (roff < 3)
3591 goto corrupt_input;
3592 bfd_put_8 (output_bfd, 0x49,
3593 contents + roff - 3);
3594 }
3595 else if (!ABI_64_P (output_bfd) && val == 0x44)
3596 {
3597 if (roff < 3)
3598 goto corrupt_input;
3599 bfd_put_8 (output_bfd, 0x41,
3600 contents + roff - 3);
3601 }
3602 bfd_put_8 (output_bfd, 0xc7,
3603 contents + roff - 2);
3604 bfd_put_8 (output_bfd, 0xc0 | reg,
3605 contents + roff - 1);
3606 }
3607 else if (reg == 4)
3608 {
3609 /* addq/addl -> addq/addl - addressing with %rsp/%r12
3610 is special */
3611 if (val == 0x4c)
3612 {
3613 if (roff < 3)
3614 goto corrupt_input;
3615 bfd_put_8 (output_bfd, 0x49,
3616 contents + roff - 3);
3617 }
3618 else if (!ABI_64_P (output_bfd) && val == 0x44)
3619 {
3620 if (roff < 3)
3621 goto corrupt_input;
3622 bfd_put_8 (output_bfd, 0x41,
3623 contents + roff - 3);
3624 }
3625 bfd_put_8 (output_bfd, 0x81,
3626 contents + roff - 2);
3627 bfd_put_8 (output_bfd, 0xc0 | reg,
3628 contents + roff - 1);
3629 }
3630 else
3631 {
3632 /* addq/addl -> leaq/leal */
3633 if (val == 0x4c)
3634 {
3635 if (roff < 3)
3636 goto corrupt_input;
3637 bfd_put_8 (output_bfd, 0x4d,
3638 contents + roff - 3);
3639 }
3640 else if (!ABI_64_P (output_bfd) && val == 0x44)
3641 {
3642 if (roff < 3)
3643 goto corrupt_input;
3644 bfd_put_8 (output_bfd, 0x45,
3645 contents + roff - 3);
3646 }
3647 bfd_put_8 (output_bfd, 0x8d,
3648 contents + roff - 2);
3649 bfd_put_8 (output_bfd, 0x80 | reg | (reg << 3),
3650 contents + roff - 1);
3651 }
3652 bfd_put_32 (output_bfd,
3653 elf_x86_64_tpoff (info, relocation),
3654 contents + roff);
3655 continue;
3656 }
3657 else
3658 BFD_ASSERT (false);
3659 }
3660
3661 if (htab->elf.sgot == NULL)
3662 abort ();
3663
3664 if (h != NULL)
3665 {
3666 off = h->got.offset;
3667 offplt = elf_x86_hash_entry (h)->tlsdesc_got;
3668 }
3669 else
3670 {
3671 if (local_got_offsets == NULL)
3672 abort ();
3673
3674 off = local_got_offsets[r_symndx];
3675 offplt = local_tlsdesc_gotents[r_symndx];
3676 }
3677
3678 if ((off & 1) != 0)
3679 off &= ~1;
3680 else
3681 {
3682 Elf_Internal_Rela outrel;
3683 int dr_type, indx;
3684 asection *sreloc;
3685
3686 if (htab->elf.srelgot == NULL)
3687 abort ();
3688
3689 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3690
3691 if (GOT_TLS_GDESC_P (tls_type))
3692 {
3693 outrel.r_info = htab->r_info (indx, R_X86_64_TLSDESC);
3694 BFD_ASSERT (htab->sgotplt_jump_table_size + offplt
3695 + 2 * GOT_ENTRY_SIZE <= htab->elf.sgotplt->size);
3696 outrel.r_offset = (htab->elf.sgotplt->output_section->vma
3697 + htab->elf.sgotplt->output_offset
3698 + offplt
3699 + htab->sgotplt_jump_table_size);
3700 sreloc = htab->elf.srelplt;
3701 if (indx == 0)
3702 outrel.r_addend = relocation - _bfd_x86_elf_dtpoff_base (info);
3703 else
3704 outrel.r_addend = 0;
3705 elf_append_rela (output_bfd, sreloc, &outrel);
3706 }
3707
3708 sreloc = htab->elf.srelgot;
3709
3710 outrel.r_offset = (htab->elf.sgot->output_section->vma
3711 + htab->elf.sgot->output_offset + off);
3712
3713 if (GOT_TLS_GD_P (tls_type))
3714 dr_type = R_X86_64_DTPMOD64;
3715 else if (GOT_TLS_GDESC_P (tls_type))
3716 goto dr_done;
3717 else
3718 dr_type = R_X86_64_TPOFF64;
3719
3720 bfd_put_64 (output_bfd, 0, htab->elf.sgot->contents + off);
3721 outrel.r_addend = 0;
3722 if ((dr_type == R_X86_64_TPOFF64
3723 || dr_type == R_X86_64_TLSDESC) && indx == 0)
3724 outrel.r_addend = relocation - _bfd_x86_elf_dtpoff_base (info);
3725 outrel.r_info = htab->r_info (indx, dr_type);
3726
3727 elf_append_rela (output_bfd, sreloc, &outrel);
3728
3729 if (GOT_TLS_GD_P (tls_type))
3730 {
3731 if (indx == 0)
3732 {
3733 BFD_ASSERT (! unresolved_reloc);
3734 bfd_put_64 (output_bfd,
3735 relocation - _bfd_x86_elf_dtpoff_base (info),
3736 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3737 }
3738 else
3739 {
3740 bfd_put_64 (output_bfd, 0,
3741 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3742 outrel.r_info = htab->r_info (indx,
3743 R_X86_64_DTPOFF64);
3744 outrel.r_offset += GOT_ENTRY_SIZE;
3745 elf_append_rela (output_bfd, sreloc,
3746 &outrel);
3747 }
3748 }
3749
3750 dr_done:
3751 if (h != NULL)
3752 h->got.offset |= 1;
3753 else
3754 local_got_offsets[r_symndx] |= 1;
3755 }
3756
3757 if (off >= (bfd_vma) -2
3758 && ! GOT_TLS_GDESC_P (tls_type))
3759 abort ();
3760 if (r_type_tls == r_type)
3761 {
3762 if (r_type == R_X86_64_GOTPC32_TLSDESC
3763 || r_type == R_X86_64_TLSDESC_CALL)
3764 relocation = htab->elf.sgotplt->output_section->vma
3765 + htab->elf.sgotplt->output_offset
3766 + offplt + htab->sgotplt_jump_table_size;
3767 else
3768 relocation = htab->elf.sgot->output_section->vma
3769 + htab->elf.sgot->output_offset + off;
3770 unresolved_reloc = false;
3771 }
3772 else
3773 {
3774 bfd_vma roff = rel->r_offset;
3775
3776 if (r_type == R_X86_64_TLSGD)
3777 {
3778 /* GD->IE transition. For 64bit, change
3779 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3780 .word 0x6666; rex64; call __tls_get_addr@PLT
3781 or
3782 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3783 .byte 0x66; rex64
3784 call *__tls_get_addr@GOTPCREL(%rip
3785 which may be converted to
3786 addr32 call __tls_get_addr
3787 into:
3788 movq %fs:0, %rax
3789 addq foo@gottpoff(%rip), %rax
3790 For 32bit, change
3791 leaq foo@tlsgd(%rip), %rdi
3792 .word 0x6666; rex64; call __tls_get_addr@PLT
3793 or
3794 leaq foo@tlsgd(%rip), %rdi
3795 .byte 0x66; rex64;
3796 call *__tls_get_addr@GOTPCREL(%rip)
3797 which may be converted to
3798 addr32 call __tls_get_addr
3799 into:
3800 movl %fs:0, %eax
3801 addq foo@gottpoff(%rip), %rax
3802 For largepic, change:
3803 leaq foo@tlsgd(%rip), %rdi
3804 movabsq $__tls_get_addr@pltoff, %rax
3805 addq %r15, %rax
3806 call *%rax
3807 into:
3808 movq %fs:0, %rax
3809 addq foo@gottpoff(%rax), %rax
3810 nopw 0x0(%rax,%rax,1) */
3811 int largepic = 0;
3812 if (ABI_64_P (output_bfd))
3813 {
3814 if (contents[roff + 5] == 0xb8)
3815 {
3816 if (roff < 3
3817 || (roff - 3 + 22) > input_section->size)
3818 goto corrupt_input;
3819 memcpy (contents + roff - 3,
3820 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05"
3821 "\0\0\0\0\x66\x0f\x1f\x44\0", 22);
3822 largepic = 1;
3823 }
3824 else
3825 {
3826 if (roff < 4
3827 || (roff - 4 + 16) > input_section->size)
3828 goto corrupt_input;
3829 memcpy (contents + roff - 4,
3830 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
3831 16);
3832 }
3833 }
3834 else
3835 {
3836 if (roff < 3
3837 || (roff - 3 + 15) > input_section->size)
3838 goto corrupt_input;
3839 memcpy (contents + roff - 3,
3840 "\x64\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
3841 15);
3842 }
3843
3844 relocation = (htab->elf.sgot->output_section->vma
3845 + htab->elf.sgot->output_offset + off
3846 - roff
3847 - largepic
3848 - input_section->output_section->vma
3849 - input_section->output_offset
3850 - 12);
3851 bfd_put_32 (output_bfd, relocation,
3852 contents + roff + 8 + largepic);
3853 /* Skip R_X86_64_PLT32/R_X86_64_PLTOFF64. */
3854 rel++;
3855 wrel++;
3856 continue;
3857 }
3858 else if (r_type == R_X86_64_GOTPC32_TLSDESC)
3859 {
3860 /* GDesc -> IE transition.
3861 It's originally something like:
3862 leaq x@tlsdesc(%rip), %rax <--- LP64 mode.
3863 rex leal x@tlsdesc(%rip), %eax <--- X32 mode.
3864
3865 Change it to:
3866 # before xchg %ax,%ax in LP64 mode.
3867 movq x@gottpoff(%rip), %rax
3868 # before nopl (%rax) in X32 mode.
3869 rex movl x@gottpoff(%rip), %eax
3870 */
3871
3872 /* Now modify the instruction as appropriate. To
3873 turn a lea into a mov in the form we use it, it
3874 suffices to change the second byte from 0x8d to
3875 0x8b. */
3876 if (roff < 2)
3877 goto corrupt_input;
3878 bfd_put_8 (output_bfd, 0x8b, contents + roff - 2);
3879
3880 bfd_put_32 (output_bfd,
3881 htab->elf.sgot->output_section->vma
3882 + htab->elf.sgot->output_offset + off
3883 - rel->r_offset
3884 - input_section->output_section->vma
3885 - input_section->output_offset
3886 - 4,
3887 contents + roff);
3888 continue;
3889 }
3890 else if (r_type == R_X86_64_TLSDESC_CALL)
3891 {
3892 /* GDesc -> IE transition.
3893 It's originally:
3894 call *(%rax) <--- LP64 mode.
3895 call *(%eax) <--- X32 mode.
3896
3897 Change it to:
3898 xchg %ax, %ax <-- LP64 mode.
3899 nopl (%rax) <-- X32 mode.
3900 */
3901
3902 unsigned int prefix = 0;
3903 if (!ABI_64_P (input_bfd))
3904 {
3905 /* Check for call *x@tlsdesc(%eax). */
3906 if (contents[roff] == 0x67)
3907 prefix = 1;
3908 }
3909 if (prefix)
3910 {
3911 bfd_put_8 (output_bfd, 0x0f, contents + roff);
3912 bfd_put_8 (output_bfd, 0x1f, contents + roff + 1);
3913 bfd_put_8 (output_bfd, 0x00, contents + roff + 2);
3914 }
3915 else
3916 {
3917 bfd_put_8 (output_bfd, 0x66, contents + roff);
3918 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3919 }
3920 continue;
3921 }
3922 else
3923 BFD_ASSERT (false);
3924 }
3925 break;
3926
3927 case R_X86_64_TLSLD:
3928 if (! elf_x86_64_tls_transition (info, input_bfd,
3929 input_section, contents,
3930 symtab_hdr, sym_hashes,
3931 &r_type, GOT_UNKNOWN, rel,
3932 relend, h, r_symndx, true))
3933 return false;
3934
3935 if (r_type != R_X86_64_TLSLD)
3936 {
3937 /* LD->LE transition:
3938 leaq foo@tlsld(%rip), %rdi
3939 call __tls_get_addr@PLT
3940 For 64bit, we change it into:
3941 .word 0x6666; .byte 0x66; movq %fs:0, %rax
3942 For 32bit, we change it into:
3943 nopl 0x0(%rax); movl %fs:0, %eax
3944 Or
3945 leaq foo@tlsld(%rip), %rdi;
3946 call *__tls_get_addr@GOTPCREL(%rip)
3947 which may be converted to
3948 addr32 call __tls_get_addr
3949 For 64bit, we change it into:
3950 .word 0x6666; .word 0x6666; movq %fs:0, %rax
3951 For 32bit, we change it into:
3952 nopw 0x0(%rax); movl %fs:0, %eax
3953 For largepic, change:
3954 leaq foo@tlsgd(%rip), %rdi
3955 movabsq $__tls_get_addr@pltoff, %rax
3956 addq %rbx, %rax
3957 call *%rax
3958 into
3959 data16 data16 data16 nopw %cs:0x0(%rax,%rax,1)
3960 movq %fs:0, %eax */
3961
3962 BFD_ASSERT (r_type == R_X86_64_TPOFF32);
3963 if (ABI_64_P (output_bfd))
3964 {
3965 if ((rel->r_offset + 5) >= input_section->size)
3966 goto corrupt_input;
3967 if (contents[rel->r_offset + 5] == 0xb8)
3968 {
3969 if (rel->r_offset < 3
3970 || (rel->r_offset - 3 + 22) > input_section->size)
3971 goto corrupt_input;
3972 memcpy (contents + rel->r_offset - 3,
3973 "\x66\x66\x66\x66\x2e\x0f\x1f\x84\0\0\0\0\0"
3974 "\x64\x48\x8b\x04\x25\0\0\0", 22);
3975 }
3976 else if (contents[rel->r_offset + 4] == 0xff
3977 || contents[rel->r_offset + 4] == 0x67)
3978 {
3979 if (rel->r_offset < 3
3980 || (rel->r_offset - 3 + 13) > input_section->size)
3981 goto corrupt_input;
3982 memcpy (contents + rel->r_offset - 3,
3983 "\x66\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0",
3984 13);
3985
3986 }
3987 else
3988 {
3989 if (rel->r_offset < 3
3990 || (rel->r_offset - 3 + 12) > input_section->size)
3991 goto corrupt_input;
3992 memcpy (contents + rel->r_offset - 3,
3993 "\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0", 12);
3994 }
3995 }
3996 else
3997 {
3998 if ((rel->r_offset + 4) >= input_section->size)
3999 goto corrupt_input;
4000 if (contents[rel->r_offset + 4] == 0xff)
4001 {
4002 if (rel->r_offset < 3
4003 || (rel->r_offset - 3 + 13) > input_section->size)
4004 goto corrupt_input;
4005 memcpy (contents + rel->r_offset - 3,
4006 "\x66\x0f\x1f\x40\x00\x64\x8b\x04\x25\0\0\0",
4007 13);
4008 }
4009 else
4010 {
4011 if (rel->r_offset < 3
4012 || (rel->r_offset - 3 + 12) > input_section->size)
4013 goto corrupt_input;
4014 memcpy (contents + rel->r_offset - 3,
4015 "\x0f\x1f\x40\x00\x64\x8b\x04\x25\0\0\0", 12);
4016 }
4017 }
4018 /* Skip R_X86_64_PC32, R_X86_64_PLT32, R_X86_64_GOTPCRELX
4019 and R_X86_64_PLTOFF64. */
4020 rel++;
4021 wrel++;
4022 continue;
4023 }
4024
4025 if (htab->elf.sgot == NULL)
4026 abort ();
4027
4028 off = htab->tls_ld_or_ldm_got.offset;
4029 if (off & 1)
4030 off &= ~1;
4031 else
4032 {
4033 Elf_Internal_Rela outrel;
4034
4035 if (htab->elf.srelgot == NULL)
4036 abort ();
4037
4038 outrel.r_offset = (htab->elf.sgot->output_section->vma
4039 + htab->elf.sgot->output_offset + off);
4040
4041 bfd_put_64 (output_bfd, 0,
4042 htab->elf.sgot->contents + off);
4043 bfd_put_64 (output_bfd, 0,
4044 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
4045 outrel.r_info = htab->r_info (0, R_X86_64_DTPMOD64);
4046 outrel.r_addend = 0;
4047 elf_append_rela (output_bfd, htab->elf.srelgot,
4048 &outrel);
4049 htab->tls_ld_or_ldm_got.offset |= 1;
4050 }
4051 relocation = htab->elf.sgot->output_section->vma
4052 + htab->elf.sgot->output_offset + off;
4053 unresolved_reloc = false;
4054 break;
4055
4056 case R_X86_64_DTPOFF32:
4057 if (!bfd_link_executable (info)
4058 || (input_section->flags & SEC_CODE) == 0)
4059 relocation -= _bfd_x86_elf_dtpoff_base (info);
4060 else
4061 relocation = elf_x86_64_tpoff (info, relocation);
4062 break;
4063
4064 case R_X86_64_TPOFF32:
4065 case R_X86_64_TPOFF64:
4066 BFD_ASSERT (bfd_link_executable (info));
4067 relocation = elf_x86_64_tpoff (info, relocation);
4068 break;
4069
4070 case R_X86_64_DTPOFF64:
4071 BFD_ASSERT ((input_section->flags & SEC_CODE) == 0);
4072 relocation -= _bfd_x86_elf_dtpoff_base (info);
4073 break;
4074
4075 default:
4076 break;
4077 }
4078
4079 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
4080 because such sections are not SEC_ALLOC and thus ld.so will
4081 not process them. */
4082 if (unresolved_reloc
4083 && !((input_section->flags & SEC_DEBUGGING) != 0
4084 && h->def_dynamic)
4085 && _bfd_elf_section_offset (output_bfd, info, input_section,
4086 rel->r_offset) != (bfd_vma) -1)
4087 {
4088 switch (r_type)
4089 {
4090 case R_X86_64_32S:
4091 sec = h->root.u.def.section;
4092 if ((info->nocopyreloc
4093 || (eh->def_protected
4094 && elf_has_no_copy_on_protected (h->root.u.def.section->owner)))
4095 && !(h->root.u.def.section->flags & SEC_CODE))
4096 return elf_x86_64_need_pic (info, input_bfd, input_section,
4097 h, NULL, NULL, howto);
4098 /* Fall through. */
4099
4100 default:
4101 _bfd_error_handler
4102 /* xgettext:c-format */
4103 (_("%pB(%pA+%#" PRIx64 "): "
4104 "unresolvable %s relocation against symbol `%s'"),
4105 input_bfd,
4106 input_section,
4107 (uint64_t) rel->r_offset,
4108 howto->name,
4109 h->root.root.string);
4110 return false;
4111 }
4112 }
4113
4114 do_relocation:
4115 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4116 contents, rel->r_offset,
4117 relocation, rel->r_addend);
4118
4119 check_relocation_error:
4120 if (r != bfd_reloc_ok)
4121 {
4122 const char *name;
4123
4124 if (h != NULL)
4125 name = h->root.root.string;
4126 else
4127 {
4128 name = bfd_elf_string_from_elf_section (input_bfd,
4129 symtab_hdr->sh_link,
4130 sym->st_name);
4131 if (name == NULL)
4132 return false;
4133 if (*name == '\0')
4134 name = bfd_section_name (sec);
4135 }
4136
4137 if (r == bfd_reloc_overflow)
4138 {
4139 if (converted_reloc)
4140 {
4141 info->callbacks->einfo
4142 ("%X%H:", input_bfd, input_section, rel->r_offset);
4143 info->callbacks->einfo
4144 (_(" failed to convert GOTPCREL relocation against "
4145 "'%s'; relink with --no-relax\n"),
4146 name);
4147 status = false;
4148 continue;
4149 }
4150 (*info->callbacks->reloc_overflow)
4151 (info, (h ? &h->root : NULL), name, howto->name,
4152 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
4153 }
4154 else
4155 {
4156 _bfd_error_handler
4157 /* xgettext:c-format */
4158 (_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
4159 input_bfd, input_section,
4160 (uint64_t) rel->r_offset, name, (int) r);
4161 return false;
4162 }
4163 }
4164
4165 if (wrel != rel)
4166 *wrel = *rel;
4167 }
4168
4169 if (wrel != rel)
4170 {
4171 Elf_Internal_Shdr *rel_hdr;
4172 size_t deleted = rel - wrel;
4173
4174 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
4175 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
4176 if (rel_hdr->sh_size == 0)
4177 {
4178 /* It is too late to remove an empty reloc section. Leave
4179 one NONE reloc.
4180 ??? What is wrong with an empty section??? */
4181 rel_hdr->sh_size = rel_hdr->sh_entsize;
4182 deleted -= 1;
4183 }
4184 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
4185 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
4186 input_section->reloc_count -= deleted;
4187 }
4188
4189 return status;
4190 }
4191
4192 /* Finish up dynamic symbol handling. We set the contents of various
4193 dynamic sections here. */
4194
4195 static bool
4196 elf_x86_64_finish_dynamic_symbol (bfd *output_bfd,
4197 struct bfd_link_info *info,
4198 struct elf_link_hash_entry *h,
4199 Elf_Internal_Sym *sym)
4200 {
4201 struct elf_x86_link_hash_table *htab;
4202 bool use_plt_second;
4203 struct elf_x86_link_hash_entry *eh;
4204 bool local_undefweak;
4205
4206 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
4207 if (htab == NULL)
4208 return false;
4209
4210 /* Use the second PLT section only if there is .plt section. */
4211 use_plt_second = htab->elf.splt != NULL && htab->plt_second != NULL;
4212
4213 eh = (struct elf_x86_link_hash_entry *) h;
4214 if (eh->no_finish_dynamic_symbol)
4215 abort ();
4216
4217 /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for
4218 resolved undefined weak symbols in executable so that their
4219 references have value 0 at run-time. */
4220 local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh);
4221
4222 if (h->plt.offset != (bfd_vma) -1)
4223 {
4224 bfd_vma plt_index;
4225 bfd_vma got_offset, plt_offset;
4226 Elf_Internal_Rela rela;
4227 bfd_byte *loc;
4228 asection *plt, *gotplt, *relplt, *resolved_plt;
4229 const struct elf_backend_data *bed;
4230 bfd_vma plt_got_pcrel_offset;
4231
4232 /* When building a static executable, use .iplt, .igot.plt and
4233 .rela.iplt sections for STT_GNU_IFUNC symbols. */
4234 if (htab->elf.splt != NULL)
4235 {
4236 plt = htab->elf.splt;
4237 gotplt = htab->elf.sgotplt;
4238 relplt = htab->elf.srelplt;
4239 }
4240 else
4241 {
4242 plt = htab->elf.iplt;
4243 gotplt = htab->elf.igotplt;
4244 relplt = htab->elf.irelplt;
4245 }
4246
4247 VERIFY_PLT_ENTRY (info, h, plt, gotplt, relplt, local_undefweak)
4248
4249 /* Get the index in the procedure linkage table which
4250 corresponds to this symbol. This is the index of this symbol
4251 in all the symbols for which we are making plt entries. The
4252 first entry in the procedure linkage table is reserved.
4253
4254 Get the offset into the .got table of the entry that
4255 corresponds to this function. Each .got entry is GOT_ENTRY_SIZE
4256 bytes. The first three are reserved for the dynamic linker.
4257
4258 For static executables, we don't reserve anything. */
4259
4260 if (plt == htab->elf.splt)
4261 {
4262 got_offset = (h->plt.offset / htab->plt.plt_entry_size
4263 - htab->plt.has_plt0);
4264 got_offset = (got_offset + 3) * GOT_ENTRY_SIZE;
4265 }
4266 else
4267 {
4268 got_offset = h->plt.offset / htab->plt.plt_entry_size;
4269 got_offset = got_offset * GOT_ENTRY_SIZE;
4270 }
4271
4272 /* Fill in the entry in the procedure linkage table. */
4273 memcpy (plt->contents + h->plt.offset, htab->plt.plt_entry,
4274 htab->plt.plt_entry_size);
4275 if (use_plt_second)
4276 {
4277 memcpy (htab->plt_second->contents + eh->plt_second.offset,
4278 htab->non_lazy_plt->plt_entry,
4279 htab->non_lazy_plt->plt_entry_size);
4280
4281 resolved_plt = htab->plt_second;
4282 plt_offset = eh->plt_second.offset;
4283 }
4284 else
4285 {
4286 resolved_plt = plt;
4287 plt_offset = h->plt.offset;
4288 }
4289
4290 /* Insert the relocation positions of the plt section. */
4291
4292 /* Put offset the PC-relative instruction referring to the GOT entry,
4293 subtracting the size of that instruction. */
4294 plt_got_pcrel_offset = (gotplt->output_section->vma
4295 + gotplt->output_offset
4296 + got_offset
4297 - resolved_plt->output_section->vma
4298 - resolved_plt->output_offset
4299 - plt_offset
4300 - htab->plt.plt_got_insn_size);
4301
4302 /* Check PC-relative offset overflow in PLT entry. */
4303 if ((plt_got_pcrel_offset + 0x80000000) > 0xffffffff)
4304 /* xgettext:c-format */
4305 info->callbacks->einfo (_("%F%pB: PC-relative offset overflow in PLT entry for `%s'\n"),
4306 output_bfd, h->root.root.string);
4307
4308 bfd_put_32 (output_bfd, plt_got_pcrel_offset,
4309 (resolved_plt->contents + plt_offset
4310 + htab->plt.plt_got_offset));
4311
4312 /* Fill in the entry in the global offset table, initially this
4313 points to the second part of the PLT entry. Leave the entry
4314 as zero for undefined weak symbol in PIE. No PLT relocation
4315 against undefined weak symbol in PIE. */
4316 if (!local_undefweak)
4317 {
4318 if (htab->plt.has_plt0)
4319 bfd_put_64 (output_bfd, (plt->output_section->vma
4320 + plt->output_offset
4321 + h->plt.offset
4322 + htab->lazy_plt->plt_lazy_offset),
4323 gotplt->contents + got_offset);
4324
4325 /* Fill in the entry in the .rela.plt section. */
4326 rela.r_offset = (gotplt->output_section->vma
4327 + gotplt->output_offset
4328 + got_offset);
4329 if (PLT_LOCAL_IFUNC_P (info, h))
4330 {
4331 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
4332 h->root.root.string,
4333 h->root.u.def.section->owner);
4334
4335 /* If an STT_GNU_IFUNC symbol is locally defined, generate
4336 R_X86_64_IRELATIVE instead of R_X86_64_JUMP_SLOT. */
4337 rela.r_info = htab->r_info (0, R_X86_64_IRELATIVE);
4338 rela.r_addend = (h->root.u.def.value
4339 + h->root.u.def.section->output_section->vma
4340 + h->root.u.def.section->output_offset);
4341
4342 if (htab->params->report_relative_reloc)
4343 _bfd_x86_elf_link_report_relative_reloc
4344 (info, relplt, h, sym, "R_X86_64_IRELATIVE", &rela);
4345
4346 /* R_X86_64_IRELATIVE comes last. */
4347 plt_index = htab->next_irelative_index--;
4348 }
4349 else
4350 {
4351 rela.r_info = htab->r_info (h->dynindx, R_X86_64_JUMP_SLOT);
4352 rela.r_addend = 0;
4353 plt_index = htab->next_jump_slot_index++;
4354 }
4355
4356 /* Don't fill the second and third slots in PLT entry for
4357 static executables nor without PLT0. */
4358 if (plt == htab->elf.splt && htab->plt.has_plt0)
4359 {
4360 bfd_vma plt0_offset
4361 = h->plt.offset + htab->lazy_plt->plt_plt_insn_end;
4362
4363 /* Put relocation index. */
4364 bfd_put_32 (output_bfd, plt_index,
4365 (plt->contents + h->plt.offset
4366 + htab->lazy_plt->plt_reloc_offset));
4367
4368 /* Put offset for jmp .PLT0 and check for overflow. We don't
4369 check relocation index for overflow since branch displacement
4370 will overflow first. */
4371 if (plt0_offset > 0x80000000)
4372 /* xgettext:c-format */
4373 info->callbacks->einfo (_("%F%pB: branch displacement overflow in PLT entry for `%s'\n"),
4374 output_bfd, h->root.root.string);
4375 bfd_put_32 (output_bfd, - plt0_offset,
4376 (plt->contents + h->plt.offset
4377 + htab->lazy_plt->plt_plt_offset));
4378 }
4379
4380 bed = get_elf_backend_data (output_bfd);
4381 loc = relplt->contents + plt_index * bed->s->sizeof_rela;
4382 bed->s->swap_reloca_out (output_bfd, &rela, loc);
4383 }
4384 }
4385 else if (eh->plt_got.offset != (bfd_vma) -1)
4386 {
4387 bfd_vma got_offset, plt_offset;
4388 asection *plt, *got;
4389 bool got_after_plt;
4390 int32_t got_pcrel_offset;
4391
4392 /* Set the entry in the GOT procedure linkage table. */
4393 plt = htab->plt_got;
4394 got = htab->elf.sgot;
4395 got_offset = h->got.offset;
4396
4397 if (got_offset == (bfd_vma) -1
4398 || (h->type == STT_GNU_IFUNC && h->def_regular)
4399 || plt == NULL
4400 || got == NULL)
4401 abort ();
4402
4403 /* Use the non-lazy PLT entry template for the GOT PLT since they
4404 are the identical. */
4405 /* Fill in the entry in the GOT procedure linkage table. */
4406 plt_offset = eh->plt_got.offset;
4407 memcpy (plt->contents + plt_offset,
4408 htab->non_lazy_plt->plt_entry,
4409 htab->non_lazy_plt->plt_entry_size);
4410
4411 /* Put offset the PC-relative instruction referring to the GOT
4412 entry, subtracting the size of that instruction. */
4413 got_pcrel_offset = (got->output_section->vma
4414 + got->output_offset
4415 + got_offset
4416 - plt->output_section->vma
4417 - plt->output_offset
4418 - plt_offset
4419 - htab->non_lazy_plt->plt_got_insn_size);
4420
4421 /* Check PC-relative offset overflow in GOT PLT entry. */
4422 got_after_plt = got->output_section->vma > plt->output_section->vma;
4423 if ((got_after_plt && got_pcrel_offset < 0)
4424 || (!got_after_plt && got_pcrel_offset > 0))
4425 /* xgettext:c-format */
4426 info->callbacks->einfo (_("%F%pB: PC-relative offset overflow in GOT PLT entry for `%s'\n"),
4427 output_bfd, h->root.root.string);
4428
4429 bfd_put_32 (output_bfd, got_pcrel_offset,
4430 (plt->contents + plt_offset
4431 + htab->non_lazy_plt->plt_got_offset));
4432 }
4433
4434 if (!local_undefweak
4435 && !h->def_regular
4436 && (h->plt.offset != (bfd_vma) -1
4437 || eh->plt_got.offset != (bfd_vma) -1))
4438 {
4439 /* Mark the symbol as undefined, rather than as defined in
4440 the .plt section. Leave the value if there were any
4441 relocations where pointer equality matters (this is a clue
4442 for the dynamic linker, to make function pointer
4443 comparisons work between an application and shared
4444 library), otherwise set it to zero. If a function is only
4445 called from a binary, there is no need to slow down
4446 shared libraries because of that. */
4447 sym->st_shndx = SHN_UNDEF;
4448 if (!h->pointer_equality_needed)
4449 sym->st_value = 0;
4450 }
4451
4452 _bfd_x86_elf_link_fixup_ifunc_symbol (info, htab, h, sym);
4453
4454 /* Don't generate dynamic GOT relocation against undefined weak
4455 symbol in executable. */
4456 if (h->got.offset != (bfd_vma) -1
4457 && ! GOT_TLS_GD_ANY_P (elf_x86_hash_entry (h)->tls_type)
4458 && elf_x86_hash_entry (h)->tls_type != GOT_TLS_IE
4459 && !local_undefweak)
4460 {
4461 Elf_Internal_Rela rela;
4462 asection *relgot = htab->elf.srelgot;
4463 const char *relative_reloc_name = NULL;
4464 bool generate_dynamic_reloc = true;
4465
4466 /* This symbol has an entry in the global offset table. Set it
4467 up. */
4468 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
4469 abort ();
4470
4471 rela.r_offset = (htab->elf.sgot->output_section->vma
4472 + htab->elf.sgot->output_offset
4473 + (h->got.offset &~ (bfd_vma) 1));
4474
4475 /* If this is a static link, or it is a -Bsymbolic link and the
4476 symbol is defined locally or was forced to be local because
4477 of a version file, we just want to emit a RELATIVE reloc.
4478 The entry in the global offset table will already have been
4479 initialized in the relocate_section function. */
4480 if (h->def_regular
4481 && h->type == STT_GNU_IFUNC)
4482 {
4483 if (h->plt.offset == (bfd_vma) -1)
4484 {
4485 /* STT_GNU_IFUNC is referenced without PLT. */
4486 if (htab->elf.splt == NULL)
4487 {
4488 /* use .rel[a].iplt section to store .got relocations
4489 in static executable. */
4490 relgot = htab->elf.irelplt;
4491 }
4492 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
4493 {
4494 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
4495 h->root.root.string,
4496 h->root.u.def.section->owner);
4497
4498 rela.r_info = htab->r_info (0,
4499 R_X86_64_IRELATIVE);
4500 rela.r_addend = (h->root.u.def.value
4501 + h->root.u.def.section->output_section->vma
4502 + h->root.u.def.section->output_offset);
4503 relative_reloc_name = "R_X86_64_IRELATIVE";
4504 }
4505 else
4506 goto do_glob_dat;
4507 }
4508 else if (bfd_link_pic (info))
4509 {
4510 /* Generate R_X86_64_GLOB_DAT. */
4511 goto do_glob_dat;
4512 }
4513 else
4514 {
4515 asection *plt;
4516 bfd_vma plt_offset;
4517
4518 if (!h->pointer_equality_needed)
4519 abort ();
4520
4521 /* For non-shared object, we can't use .got.plt, which
4522 contains the real function addres if we need pointer
4523 equality. We load the GOT entry with the PLT entry. */
4524 if (htab->plt_second != NULL)
4525 {
4526 plt = htab->plt_second;
4527 plt_offset = eh->plt_second.offset;
4528 }
4529 else
4530 {
4531 plt = htab->elf.splt ? htab->elf.splt : htab->elf.iplt;
4532 plt_offset = h->plt.offset;
4533 }
4534 bfd_put_64 (output_bfd, (plt->output_section->vma
4535 + plt->output_offset
4536 + plt_offset),
4537 htab->elf.sgot->contents + h->got.offset);
4538 return true;
4539 }
4540 }
4541 else if (bfd_link_pic (info)
4542 && SYMBOL_REFERENCES_LOCAL_P (info, h))
4543 {
4544 if (!SYMBOL_DEFINED_NON_SHARED_P (h))
4545 return false;
4546 BFD_ASSERT((h->got.offset & 1) != 0);
4547 if (info->enable_dt_relr)
4548 generate_dynamic_reloc = false;
4549 else
4550 {
4551 rela.r_info = htab->r_info (0, R_X86_64_RELATIVE);
4552 rela.r_addend = (h->root.u.def.value
4553 + h->root.u.def.section->output_section->vma
4554 + h->root.u.def.section->output_offset);
4555 relative_reloc_name = "R_X86_64_RELATIVE";
4556 }
4557 }
4558 else
4559 {
4560 BFD_ASSERT((h->got.offset & 1) == 0);
4561 do_glob_dat:
4562 bfd_put_64 (output_bfd, (bfd_vma) 0,
4563 htab->elf.sgot->contents + h->got.offset);
4564 rela.r_info = htab->r_info (h->dynindx, R_X86_64_GLOB_DAT);
4565 rela.r_addend = 0;
4566 }
4567
4568 if (generate_dynamic_reloc)
4569 {
4570 if (relative_reloc_name != NULL
4571 && htab->params->report_relative_reloc)
4572 _bfd_x86_elf_link_report_relative_reloc
4573 (info, relgot, h, sym, relative_reloc_name, &rela);
4574
4575 elf_append_rela (output_bfd, relgot, &rela);
4576 }
4577 }
4578
4579 if (h->needs_copy)
4580 {
4581 Elf_Internal_Rela rela;
4582 asection *s;
4583
4584 /* This symbol needs a copy reloc. Set it up. */
4585 VERIFY_COPY_RELOC (h, htab)
4586
4587 rela.r_offset = (h->root.u.def.value
4588 + h->root.u.def.section->output_section->vma
4589 + h->root.u.def.section->output_offset);
4590 rela.r_info = htab->r_info (h->dynindx, R_X86_64_COPY);
4591 rela.r_addend = 0;
4592 if (h->root.u.def.section == htab->elf.sdynrelro)
4593 s = htab->elf.sreldynrelro;
4594 else
4595 s = htab->elf.srelbss;
4596 elf_append_rela (output_bfd, s, &rela);
4597 }
4598
4599 return true;
4600 }
4601
4602 /* Finish up local dynamic symbol handling. We set the contents of
4603 various dynamic sections here. */
4604
4605 static int
4606 elf_x86_64_finish_local_dynamic_symbol (void **slot, void *inf)
4607 {
4608 struct elf_link_hash_entry *h
4609 = (struct elf_link_hash_entry *) *slot;
4610 struct bfd_link_info *info
4611 = (struct bfd_link_info *) inf;
4612
4613 return elf_x86_64_finish_dynamic_symbol (info->output_bfd,
4614 info, h, NULL);
4615 }
4616
4617 /* Finish up undefined weak symbol handling in PIE. Fill its PLT entry
4618 here since undefined weak symbol may not be dynamic and may not be
4619 called for elf_x86_64_finish_dynamic_symbol. */
4620
4621 static bool
4622 elf_x86_64_pie_finish_undefweak_symbol (struct bfd_hash_entry *bh,
4623 void *inf)
4624 {
4625 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) bh;
4626 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4627
4628 if (h->root.type != bfd_link_hash_undefweak
4629 || h->dynindx != -1)
4630 return true;
4631
4632 return elf_x86_64_finish_dynamic_symbol (info->output_bfd,
4633 info, h, NULL);
4634 }
4635
4636 /* Used to decide how to sort relocs in an optimal manner for the
4637 dynamic linker, before writing them out. */
4638
4639 static enum elf_reloc_type_class
4640 elf_x86_64_reloc_type_class (const struct bfd_link_info *info,
4641 const asection *rel_sec ATTRIBUTE_UNUSED,
4642 const Elf_Internal_Rela *rela)
4643 {
4644 bfd *abfd = info->output_bfd;
4645 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4646 struct elf_x86_link_hash_table *htab
4647 = elf_x86_hash_table (info, X86_64_ELF_DATA);
4648
4649 if (htab->elf.dynsym != NULL
4650 && htab->elf.dynsym->contents != NULL)
4651 {
4652 /* Check relocation against STT_GNU_IFUNC symbol if there are
4653 dynamic symbols. */
4654 unsigned long r_symndx = htab->r_sym (rela->r_info);
4655 if (r_symndx != STN_UNDEF)
4656 {
4657 Elf_Internal_Sym sym;
4658 if (!bed->s->swap_symbol_in (abfd,
4659 (htab->elf.dynsym->contents
4660 + r_symndx * bed->s->sizeof_sym),
4661 0, &sym))
4662 abort ();
4663
4664 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
4665 return reloc_class_ifunc;
4666 }
4667 }
4668
4669 switch ((int) ELF32_R_TYPE (rela->r_info))
4670 {
4671 case R_X86_64_IRELATIVE:
4672 return reloc_class_ifunc;
4673 case R_X86_64_RELATIVE:
4674 case R_X86_64_RELATIVE64:
4675 return reloc_class_relative;
4676 case R_X86_64_JUMP_SLOT:
4677 return reloc_class_plt;
4678 case R_X86_64_COPY:
4679 return reloc_class_copy;
4680 default:
4681 return reloc_class_normal;
4682 }
4683 }
4684
4685 /* Finish up the dynamic sections. */
4686
4687 static bool
4688 elf_x86_64_finish_dynamic_sections (bfd *output_bfd,
4689 struct bfd_link_info *info)
4690 {
4691 struct elf_x86_link_hash_table *htab;
4692
4693 htab = _bfd_x86_elf_finish_dynamic_sections (output_bfd, info);
4694 if (htab == NULL)
4695 return false;
4696
4697 if (! htab->elf.dynamic_sections_created)
4698 return true;
4699
4700 if (htab->elf.splt && htab->elf.splt->size > 0)
4701 {
4702 if (bfd_is_abs_section (htab->elf.splt->output_section))
4703 {
4704 info->callbacks->einfo
4705 (_("%F%P: discarded output section: `%pA'\n"),
4706 htab->elf.splt);
4707 return false;
4708 }
4709
4710 elf_section_data (htab->elf.splt->output_section)
4711 ->this_hdr.sh_entsize = htab->plt.plt_entry_size;
4712
4713 if (htab->plt.has_plt0)
4714 {
4715 /* Fill in the special first entry in the procedure linkage
4716 table. */
4717 memcpy (htab->elf.splt->contents,
4718 htab->lazy_plt->plt0_entry,
4719 htab->lazy_plt->plt0_entry_size);
4720 /* Add offset for pushq GOT+8(%rip), since the instruction
4721 uses 6 bytes subtract this value. */
4722 bfd_put_32 (output_bfd,
4723 (htab->elf.sgotplt->output_section->vma
4724 + htab->elf.sgotplt->output_offset
4725 + 8
4726 - htab->elf.splt->output_section->vma
4727 - htab->elf.splt->output_offset
4728 - 6),
4729 (htab->elf.splt->contents
4730 + htab->lazy_plt->plt0_got1_offset));
4731 /* Add offset for the PC-relative instruction accessing
4732 GOT+16, subtracting the offset to the end of that
4733 instruction. */
4734 bfd_put_32 (output_bfd,
4735 (htab->elf.sgotplt->output_section->vma
4736 + htab->elf.sgotplt->output_offset
4737 + 16
4738 - htab->elf.splt->output_section->vma
4739 - htab->elf.splt->output_offset
4740 - htab->lazy_plt->plt0_got2_insn_end),
4741 (htab->elf.splt->contents
4742 + htab->lazy_plt->plt0_got2_offset));
4743 }
4744
4745 if (htab->elf.tlsdesc_plt)
4746 {
4747 bfd_put_64 (output_bfd, (bfd_vma) 0,
4748 htab->elf.sgot->contents + htab->elf.tlsdesc_got);
4749
4750 memcpy (htab->elf.splt->contents + htab->elf.tlsdesc_plt,
4751 htab->lazy_plt->plt_tlsdesc_entry,
4752 htab->lazy_plt->plt_tlsdesc_entry_size);
4753
4754 /* Add offset for pushq GOT+8(%rip), since ENDBR64 uses 4
4755 bytes and the instruction uses 6 bytes, subtract these
4756 values. */
4757 bfd_put_32 (output_bfd,
4758 (htab->elf.sgotplt->output_section->vma
4759 + htab->elf.sgotplt->output_offset
4760 + 8
4761 - htab->elf.splt->output_section->vma
4762 - htab->elf.splt->output_offset
4763 - htab->elf.tlsdesc_plt
4764 - htab->lazy_plt->plt_tlsdesc_got1_insn_end),
4765 (htab->elf.splt->contents
4766 + htab->elf.tlsdesc_plt
4767 + htab->lazy_plt->plt_tlsdesc_got1_offset));
4768 /* Add offset for indirect branch via GOT+TDG, where TDG
4769 stands for htab->tlsdesc_got, subtracting the offset
4770 to the end of that instruction. */
4771 bfd_put_32 (output_bfd,
4772 (htab->elf.sgot->output_section->vma
4773 + htab->elf.sgot->output_offset
4774 + htab->elf.tlsdesc_got
4775 - htab->elf.splt->output_section->vma
4776 - htab->elf.splt->output_offset
4777 - htab->elf.tlsdesc_plt
4778 - htab->lazy_plt->plt_tlsdesc_got2_insn_end),
4779 (htab->elf.splt->contents
4780 + htab->elf.tlsdesc_plt
4781 + htab->lazy_plt->plt_tlsdesc_got2_offset));
4782 }
4783 }
4784
4785 /* Fill PLT entries for undefined weak symbols in PIE. */
4786 if (bfd_link_pie (info))
4787 bfd_hash_traverse (&info->hash->table,
4788 elf_x86_64_pie_finish_undefweak_symbol,
4789 info);
4790
4791 return true;
4792 }
4793
4794 /* Fill PLT/GOT entries and allocate dynamic relocations for local
4795 STT_GNU_IFUNC symbols, which aren't in the ELF linker hash table.
4796 It has to be done before elf_link_sort_relocs is called so that
4797 dynamic relocations are properly sorted. */
4798
4799 static bool
4800 elf_x86_64_output_arch_local_syms
4801 (bfd *output_bfd ATTRIBUTE_UNUSED,
4802 struct bfd_link_info *info,
4803 void *flaginfo ATTRIBUTE_UNUSED,
4804 int (*func) (void *, const char *,
4805 Elf_Internal_Sym *,
4806 asection *,
4807 struct elf_link_hash_entry *) ATTRIBUTE_UNUSED)
4808 {
4809 struct elf_x86_link_hash_table *htab
4810 = elf_x86_hash_table (info, X86_64_ELF_DATA);
4811 if (htab == NULL)
4812 return false;
4813
4814 /* Fill PLT and GOT entries for local STT_GNU_IFUNC symbols. */
4815 htab_traverse (htab->loc_hash_table,
4816 elf_x86_64_finish_local_dynamic_symbol,
4817 info);
4818
4819 return true;
4820 }
4821
4822 /* Similar to _bfd_elf_get_synthetic_symtab. Support PLTs with all
4823 dynamic relocations. */
4824
4825 static long
4826 elf_x86_64_get_synthetic_symtab (bfd *abfd,
4827 long symcount ATTRIBUTE_UNUSED,
4828 asymbol **syms ATTRIBUTE_UNUSED,
4829 long dynsymcount,
4830 asymbol **dynsyms,
4831 asymbol **ret)
4832 {
4833 long count, i, n;
4834 int j;
4835 bfd_byte *plt_contents;
4836 long relsize;
4837 const struct elf_x86_lazy_plt_layout *lazy_plt;
4838 const struct elf_x86_non_lazy_plt_layout *non_lazy_plt;
4839 const struct elf_x86_lazy_plt_layout *lazy_bnd_plt;
4840 const struct elf_x86_non_lazy_plt_layout *non_lazy_bnd_plt;
4841 const struct elf_x86_lazy_plt_layout *lazy_ibt_plt;
4842 const struct elf_x86_non_lazy_plt_layout *non_lazy_ibt_plt;
4843 asection *plt;
4844 enum elf_x86_plt_type plt_type;
4845 struct elf_x86_plt plts[] =
4846 {
4847 { ".plt", NULL, NULL, plt_unknown, 0, 0, 0, 0 },
4848 { ".plt.got", NULL, NULL, plt_non_lazy, 0, 0, 0, 0 },
4849 { ".plt.sec", NULL, NULL, plt_second, 0, 0, 0, 0 },
4850 { ".plt.bnd", NULL, NULL, plt_second, 0, 0, 0, 0 },
4851 { NULL, NULL, NULL, plt_non_lazy, 0, 0, 0, 0 }
4852 };
4853
4854 *ret = NULL;
4855
4856 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
4857 return 0;
4858
4859 if (dynsymcount <= 0)
4860 return 0;
4861
4862 relsize = bfd_get_dynamic_reloc_upper_bound (abfd);
4863 if (relsize <= 0)
4864 return -1;
4865
4866 lazy_plt = &elf_x86_64_lazy_plt;
4867 non_lazy_plt = &elf_x86_64_non_lazy_plt;
4868 lazy_bnd_plt = &elf_x86_64_lazy_bnd_plt;
4869 non_lazy_bnd_plt = &elf_x86_64_non_lazy_bnd_plt;
4870 if (ABI_64_P (abfd))
4871 {
4872 lazy_ibt_plt = &elf_x86_64_lazy_ibt_plt;
4873 non_lazy_ibt_plt = &elf_x86_64_non_lazy_ibt_plt;
4874 }
4875 else
4876 {
4877 lazy_ibt_plt = &elf_x32_lazy_ibt_plt;
4878 non_lazy_ibt_plt = &elf_x32_non_lazy_ibt_plt;
4879 }
4880
4881 count = 0;
4882 for (j = 0; plts[j].name != NULL; j++)
4883 {
4884 plt = bfd_get_section_by_name (abfd, plts[j].name);
4885 if (plt == NULL || plt->size == 0)
4886 continue;
4887
4888 /* Get the PLT section contents. */
4889 if (!bfd_malloc_and_get_section (abfd, plt, &plt_contents))
4890 break;
4891
4892 /* Check what kind of PLT it is. */
4893 plt_type = plt_unknown;
4894 if (plts[j].type == plt_unknown
4895 && (plt->size >= (lazy_plt->plt_entry_size
4896 + lazy_plt->plt_entry_size)))
4897 {
4898 /* Match lazy PLT first. Need to check the first two
4899 instructions. */
4900 if ((memcmp (plt_contents, lazy_plt->plt0_entry,
4901 lazy_plt->plt0_got1_offset) == 0)
4902 && (memcmp (plt_contents + 6, lazy_plt->plt0_entry + 6,
4903 2) == 0))
4904 plt_type = plt_lazy;
4905 else if (lazy_bnd_plt != NULL
4906 && (memcmp (plt_contents, lazy_bnd_plt->plt0_entry,
4907 lazy_bnd_plt->plt0_got1_offset) == 0)
4908 && (memcmp (plt_contents + 6,
4909 lazy_bnd_plt->plt0_entry + 6, 3) == 0))
4910 {
4911 plt_type = plt_lazy | plt_second;
4912 /* The fist entry in the lazy IBT PLT is the same as the
4913 lazy BND PLT. */
4914 if ((memcmp (plt_contents + lazy_ibt_plt->plt_entry_size,
4915 lazy_ibt_plt->plt_entry,
4916 lazy_ibt_plt->plt_got_offset) == 0))
4917 lazy_plt = lazy_ibt_plt;
4918 else
4919 lazy_plt = lazy_bnd_plt;
4920 }
4921 }
4922
4923 if (non_lazy_plt != NULL
4924 && (plt_type == plt_unknown || plt_type == plt_non_lazy)
4925 && plt->size >= non_lazy_plt->plt_entry_size)
4926 {
4927 /* Match non-lazy PLT. */
4928 if (memcmp (plt_contents, non_lazy_plt->plt_entry,
4929 non_lazy_plt->plt_got_offset) == 0)
4930 plt_type = plt_non_lazy;
4931 }
4932
4933 if (plt_type == plt_unknown || plt_type == plt_second)
4934 {
4935 if (non_lazy_bnd_plt != NULL
4936 && plt->size >= non_lazy_bnd_plt->plt_entry_size
4937 && (memcmp (plt_contents, non_lazy_bnd_plt->plt_entry,
4938 non_lazy_bnd_plt->plt_got_offset) == 0))
4939 {
4940 /* Match BND PLT. */
4941 plt_type = plt_second;
4942 non_lazy_plt = non_lazy_bnd_plt;
4943 }
4944 else if (non_lazy_ibt_plt != NULL
4945 && plt->size >= non_lazy_ibt_plt->plt_entry_size
4946 && (memcmp (plt_contents,
4947 non_lazy_ibt_plt->plt_entry,
4948 non_lazy_ibt_plt->plt_got_offset) == 0))
4949 {
4950 /* Match IBT PLT. */
4951 plt_type = plt_second;
4952 non_lazy_plt = non_lazy_ibt_plt;
4953 }
4954 }
4955
4956 if (plt_type == plt_unknown)
4957 {
4958 free (plt_contents);
4959 continue;
4960 }
4961
4962 plts[j].sec = plt;
4963 plts[j].type = plt_type;
4964
4965 if ((plt_type & plt_lazy))
4966 {
4967 plts[j].plt_got_offset = lazy_plt->plt_got_offset;
4968 plts[j].plt_got_insn_size = lazy_plt->plt_got_insn_size;
4969 plts[j].plt_entry_size = lazy_plt->plt_entry_size;
4970 /* Skip PLT0 in lazy PLT. */
4971 i = 1;
4972 }
4973 else
4974 {
4975 plts[j].plt_got_offset = non_lazy_plt->plt_got_offset;
4976 plts[j].plt_got_insn_size = non_lazy_plt->plt_got_insn_size;
4977 plts[j].plt_entry_size = non_lazy_plt->plt_entry_size;
4978 i = 0;
4979 }
4980
4981 /* Skip lazy PLT when the second PLT is used. */
4982 if (plt_type == (plt_lazy | plt_second))
4983 plts[j].count = 0;
4984 else
4985 {
4986 n = plt->size / plts[j].plt_entry_size;
4987 plts[j].count = n;
4988 count += n - i;
4989 }
4990
4991 plts[j].contents = plt_contents;
4992 }
4993
4994 return _bfd_x86_elf_get_synthetic_symtab (abfd, count, relsize,
4995 (bfd_vma) 0, plts, dynsyms,
4996 ret);
4997 }
4998
4999 /* Handle an x86-64 specific section when reading an object file. This
5000 is called when elfcode.h finds a section with an unknown type. */
5001
5002 static bool
5003 elf_x86_64_section_from_shdr (bfd *abfd, Elf_Internal_Shdr *hdr,
5004 const char *name, int shindex)
5005 {
5006 if (hdr->sh_type != SHT_X86_64_UNWIND)
5007 return false;
5008
5009 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
5010 return false;
5011
5012 return true;
5013 }
5014
5015 /* Hook called by the linker routine which adds symbols from an object
5016 file. We use it to put SHN_X86_64_LCOMMON items in .lbss, instead
5017 of .bss. */
5018
5019 static bool
5020 elf_x86_64_add_symbol_hook (bfd *abfd,
5021 struct bfd_link_info *info ATTRIBUTE_UNUSED,
5022 Elf_Internal_Sym *sym,
5023 const char **namep ATTRIBUTE_UNUSED,
5024 flagword *flagsp ATTRIBUTE_UNUSED,
5025 asection **secp,
5026 bfd_vma *valp)
5027 {
5028 asection *lcomm;
5029
5030 switch (sym->st_shndx)
5031 {
5032 case SHN_X86_64_LCOMMON:
5033 lcomm = bfd_get_section_by_name (abfd, "LARGE_COMMON");
5034 if (lcomm == NULL)
5035 {
5036 lcomm = bfd_make_section_with_flags (abfd,
5037 "LARGE_COMMON",
5038 (SEC_ALLOC
5039 | SEC_IS_COMMON
5040 | SEC_LINKER_CREATED));
5041 if (lcomm == NULL)
5042 return false;
5043 elf_section_flags (lcomm) |= SHF_X86_64_LARGE;
5044 }
5045 *secp = lcomm;
5046 *valp = sym->st_size;
5047 return true;
5048 }
5049
5050 return true;
5051 }
5052
5053
5054 /* Given a BFD section, try to locate the corresponding ELF section
5055 index. */
5056
5057 static bool
5058 elf_x86_64_elf_section_from_bfd_section (bfd *abfd ATTRIBUTE_UNUSED,
5059 asection *sec, int *index_return)
5060 {
5061 if (sec == &_bfd_elf_large_com_section)
5062 {
5063 *index_return = SHN_X86_64_LCOMMON;
5064 return true;
5065 }
5066 return false;
5067 }
5068
5069 /* Process a symbol. */
5070
5071 static void
5072 elf_x86_64_symbol_processing (bfd *abfd ATTRIBUTE_UNUSED,
5073 asymbol *asym)
5074 {
5075 elf_symbol_type *elfsym = (elf_symbol_type *) asym;
5076
5077 switch (elfsym->internal_elf_sym.st_shndx)
5078 {
5079 case SHN_X86_64_LCOMMON:
5080 asym->section = &_bfd_elf_large_com_section;
5081 asym->value = elfsym->internal_elf_sym.st_size;
5082 /* Common symbol doesn't set BSF_GLOBAL. */
5083 asym->flags &= ~BSF_GLOBAL;
5084 break;
5085 }
5086 }
5087
5088 static bool
5089 elf_x86_64_common_definition (Elf_Internal_Sym *sym)
5090 {
5091 return (sym->st_shndx == SHN_COMMON
5092 || sym->st_shndx == SHN_X86_64_LCOMMON);
5093 }
5094
5095 static unsigned int
5096 elf_x86_64_common_section_index (asection *sec)
5097 {
5098 if ((elf_section_flags (sec) & SHF_X86_64_LARGE) == 0)
5099 return SHN_COMMON;
5100 else
5101 return SHN_X86_64_LCOMMON;
5102 }
5103
5104 static asection *
5105 elf_x86_64_common_section (asection *sec)
5106 {
5107 if ((elf_section_flags (sec) & SHF_X86_64_LARGE) == 0)
5108 return bfd_com_section_ptr;
5109 else
5110 return &_bfd_elf_large_com_section;
5111 }
5112
5113 static bool
5114 elf_x86_64_merge_symbol (struct elf_link_hash_entry *h,
5115 const Elf_Internal_Sym *sym,
5116 asection **psec,
5117 bool newdef,
5118 bool olddef,
5119 bfd *oldbfd,
5120 const asection *oldsec)
5121 {
5122 /* A normal common symbol and a large common symbol result in a
5123 normal common symbol. We turn the large common symbol into a
5124 normal one. */
5125 if (!olddef
5126 && h->root.type == bfd_link_hash_common
5127 && !newdef
5128 && bfd_is_com_section (*psec)
5129 && oldsec != *psec)
5130 {
5131 if (sym->st_shndx == SHN_COMMON
5132 && (elf_section_flags (oldsec) & SHF_X86_64_LARGE) != 0)
5133 {
5134 h->root.u.c.p->section
5135 = bfd_make_section_old_way (oldbfd, "COMMON");
5136 h->root.u.c.p->section->flags = SEC_ALLOC;
5137 }
5138 else if (sym->st_shndx == SHN_X86_64_LCOMMON
5139 && (elf_section_flags (oldsec) & SHF_X86_64_LARGE) == 0)
5140 *psec = bfd_com_section_ptr;
5141 }
5142
5143 return true;
5144 }
5145
5146 static int
5147 elf_x86_64_additional_program_headers (bfd *abfd,
5148 struct bfd_link_info *info ATTRIBUTE_UNUSED)
5149 {
5150 asection *s;
5151 int count = 0;
5152
5153 /* Check to see if we need a large readonly segment. */
5154 s = bfd_get_section_by_name (abfd, ".lrodata");
5155 if (s && (s->flags & SEC_LOAD))
5156 count++;
5157
5158 /* Check to see if we need a large data segment. Since .lbss sections
5159 is placed right after the .bss section, there should be no need for
5160 a large data segment just because of .lbss. */
5161 s = bfd_get_section_by_name (abfd, ".ldata");
5162 if (s && (s->flags & SEC_LOAD))
5163 count++;
5164
5165 return count;
5166 }
5167
5168 /* Return TRUE iff relocations for INPUT are compatible with OUTPUT. */
5169
5170 static bool
5171 elf_x86_64_relocs_compatible (const bfd_target *input,
5172 const bfd_target *output)
5173 {
5174 return ((xvec_get_elf_backend_data (input)->s->elfclass
5175 == xvec_get_elf_backend_data (output)->s->elfclass)
5176 && _bfd_elf_relocs_compatible (input, output));
5177 }
5178
5179 /* Set up x86-64 GNU properties. Return the first relocatable ELF input
5180 with GNU properties if found. Otherwise, return NULL. */
5181
5182 static bfd *
5183 elf_x86_64_link_setup_gnu_properties (struct bfd_link_info *info)
5184 {
5185 struct elf_x86_init_table init_table;
5186 const struct elf_backend_data *bed;
5187 struct elf_x86_link_hash_table *htab;
5188
5189 if ((int) R_X86_64_standard >= (int) R_X86_64_converted_reloc_bit
5190 || (int) R_X86_64_max <= (int) R_X86_64_converted_reloc_bit
5191 || ((int) (R_X86_64_GNU_VTINHERIT | R_X86_64_converted_reloc_bit)
5192 != (int) R_X86_64_GNU_VTINHERIT)
5193 || ((int) (R_X86_64_GNU_VTENTRY | R_X86_64_converted_reloc_bit)
5194 != (int) R_X86_64_GNU_VTENTRY))
5195 abort ();
5196
5197 /* This is unused for x86-64. */
5198 init_table.plt0_pad_byte = 0x90;
5199
5200 bed = get_elf_backend_data (info->output_bfd);
5201 htab = elf_x86_hash_table (info, bed->target_id);
5202 if (!htab)
5203 abort ();
5204 if (htab->params->bndplt)
5205 {
5206 init_table.lazy_plt = &elf_x86_64_lazy_bnd_plt;
5207 init_table.non_lazy_plt = &elf_x86_64_non_lazy_bnd_plt;
5208 }
5209 else
5210 {
5211 init_table.lazy_plt = &elf_x86_64_lazy_plt;
5212 init_table.non_lazy_plt = &elf_x86_64_non_lazy_plt;
5213 }
5214
5215 if (ABI_64_P (info->output_bfd))
5216 {
5217 init_table.lazy_ibt_plt = &elf_x86_64_lazy_ibt_plt;
5218 init_table.non_lazy_ibt_plt = &elf_x86_64_non_lazy_ibt_plt;
5219 }
5220 else
5221 {
5222 init_table.lazy_ibt_plt = &elf_x32_lazy_ibt_plt;
5223 init_table.non_lazy_ibt_plt = &elf_x32_non_lazy_ibt_plt;
5224 }
5225
5226 if (ABI_64_P (info->output_bfd))
5227 {
5228 init_table.r_info = elf64_r_info;
5229 init_table.r_sym = elf64_r_sym;
5230 }
5231 else
5232 {
5233 init_table.r_info = elf32_r_info;
5234 init_table.r_sym = elf32_r_sym;
5235 }
5236
5237 return _bfd_x86_elf_link_setup_gnu_properties (info, &init_table);
5238 }
5239
5240 static const struct bfd_elf_special_section
5241 elf_x86_64_special_sections[]=
5242 {
5243 { STRING_COMMA_LEN (".gnu.linkonce.lb"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5244 { STRING_COMMA_LEN (".gnu.linkonce.lr"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_X86_64_LARGE},
5245 { STRING_COMMA_LEN (".gnu.linkonce.lt"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR + SHF_X86_64_LARGE},
5246 { STRING_COMMA_LEN (".lbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5247 { STRING_COMMA_LEN (".ldata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5248 { STRING_COMMA_LEN (".lrodata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_X86_64_LARGE},
5249 { NULL, 0, 0, 0, 0 }
5250 };
5251
5252 #define TARGET_LITTLE_SYM x86_64_elf64_vec
5253 #define TARGET_LITTLE_NAME "elf64-x86-64"
5254 #define ELF_ARCH bfd_arch_i386
5255 #define ELF_TARGET_ID X86_64_ELF_DATA
5256 #define ELF_MACHINE_CODE EM_X86_64
5257 #if DEFAULT_LD_Z_SEPARATE_CODE
5258 # define ELF_MAXPAGESIZE 0x1000
5259 #else
5260 # define ELF_MAXPAGESIZE 0x200000
5261 #endif
5262 #define ELF_COMMONPAGESIZE 0x1000
5263
5264 #define elf_backend_can_gc_sections 1
5265 #define elf_backend_can_refcount 1
5266 #define elf_backend_want_got_plt 1
5267 #define elf_backend_plt_readonly 1
5268 #define elf_backend_want_plt_sym 0
5269 #define elf_backend_got_header_size (GOT_ENTRY_SIZE*3)
5270 #define elf_backend_rela_normal 1
5271 #define elf_backend_plt_alignment 4
5272 #define elf_backend_extern_protected_data 1
5273 #define elf_backend_caches_rawsize 1
5274 #define elf_backend_dtrel_excludes_plt 1
5275 #define elf_backend_want_dynrelro 1
5276
5277 #define elf_info_to_howto elf_x86_64_info_to_howto
5278
5279 #define bfd_elf64_bfd_reloc_type_lookup elf_x86_64_reloc_type_lookup
5280 #define bfd_elf64_bfd_reloc_name_lookup \
5281 elf_x86_64_reloc_name_lookup
5282
5283 #define elf_backend_relocs_compatible elf_x86_64_relocs_compatible
5284 #define elf_backend_always_size_sections elf_x86_64_always_size_sections
5285 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
5286 #define elf_backend_finish_dynamic_sections elf_x86_64_finish_dynamic_sections
5287 #define elf_backend_finish_dynamic_symbol elf_x86_64_finish_dynamic_symbol
5288 #define elf_backend_output_arch_local_syms elf_x86_64_output_arch_local_syms
5289 #define elf_backend_grok_prstatus elf_x86_64_grok_prstatus
5290 #define elf_backend_grok_psinfo elf_x86_64_grok_psinfo
5291 #ifdef CORE_HEADER
5292 #define elf_backend_write_core_note elf_x86_64_write_core_note
5293 #endif
5294 #define elf_backend_reloc_type_class elf_x86_64_reloc_type_class
5295 #define elf_backend_relocate_section elf_x86_64_relocate_section
5296 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
5297 #define elf_backend_object_p elf64_x86_64_elf_object_p
5298 #define bfd_elf64_get_synthetic_symtab elf_x86_64_get_synthetic_symtab
5299
5300 #define elf_backend_section_from_shdr \
5301 elf_x86_64_section_from_shdr
5302
5303 #define elf_backend_section_from_bfd_section \
5304 elf_x86_64_elf_section_from_bfd_section
5305 #define elf_backend_add_symbol_hook \
5306 elf_x86_64_add_symbol_hook
5307 #define elf_backend_symbol_processing \
5308 elf_x86_64_symbol_processing
5309 #define elf_backend_common_section_index \
5310 elf_x86_64_common_section_index
5311 #define elf_backend_common_section \
5312 elf_x86_64_common_section
5313 #define elf_backend_common_definition \
5314 elf_x86_64_common_definition
5315 #define elf_backend_merge_symbol \
5316 elf_x86_64_merge_symbol
5317 #define elf_backend_special_sections \
5318 elf_x86_64_special_sections
5319 #define elf_backend_additional_program_headers \
5320 elf_x86_64_additional_program_headers
5321 #define elf_backend_setup_gnu_properties \
5322 elf_x86_64_link_setup_gnu_properties
5323 #define elf_backend_hide_symbol \
5324 _bfd_x86_elf_hide_symbol
5325
5326 #undef elf64_bed
5327 #define elf64_bed elf64_x86_64_bed
5328
5329 #include "elf64-target.h"
5330
5331 /* CloudABI support. */
5332
5333 #undef TARGET_LITTLE_SYM
5334 #define TARGET_LITTLE_SYM x86_64_elf64_cloudabi_vec
5335 #undef TARGET_LITTLE_NAME
5336 #define TARGET_LITTLE_NAME "elf64-x86-64-cloudabi"
5337
5338 #undef ELF_OSABI
5339 #define ELF_OSABI ELFOSABI_CLOUDABI
5340
5341 #undef elf64_bed
5342 #define elf64_bed elf64_x86_64_cloudabi_bed
5343
5344 #include "elf64-target.h"
5345
5346 /* FreeBSD support. */
5347
5348 #undef TARGET_LITTLE_SYM
5349 #define TARGET_LITTLE_SYM x86_64_elf64_fbsd_vec
5350 #undef TARGET_LITTLE_NAME
5351 #define TARGET_LITTLE_NAME "elf64-x86-64-freebsd"
5352
5353 #undef ELF_OSABI
5354 #define ELF_OSABI ELFOSABI_FREEBSD
5355
5356 #undef elf64_bed
5357 #define elf64_bed elf64_x86_64_fbsd_bed
5358
5359 #include "elf64-target.h"
5360
5361 /* Solaris 2 support. */
5362
5363 #undef TARGET_LITTLE_SYM
5364 #define TARGET_LITTLE_SYM x86_64_elf64_sol2_vec
5365 #undef TARGET_LITTLE_NAME
5366 #define TARGET_LITTLE_NAME "elf64-x86-64-sol2"
5367
5368 #undef ELF_TARGET_OS
5369 #define ELF_TARGET_OS is_solaris
5370
5371 /* Restore default: we cannot use ELFOSABI_SOLARIS, otherwise ELFOSABI_NONE
5372 objects won't be recognized. */
5373 #undef ELF_OSABI
5374
5375 #undef elf64_bed
5376 #define elf64_bed elf64_x86_64_sol2_bed
5377
5378 /* The 64-bit static TLS arena size is rounded to the nearest 16-byte
5379 boundary. */
5380 #undef elf_backend_static_tls_alignment
5381 #define elf_backend_static_tls_alignment 16
5382
5383 /* The Solaris 2 ABI requires a plt symbol on all platforms.
5384
5385 Cf. Linker and Libraries Guide, Ch. 2, Link-Editor, Generating the Output
5386 File, p.63. */
5387 #undef elf_backend_want_plt_sym
5388 #define elf_backend_want_plt_sym 1
5389
5390 #undef elf_backend_strtab_flags
5391 #define elf_backend_strtab_flags SHF_STRINGS
5392
5393 static bool
5394 elf64_x86_64_copy_solaris_special_section_fields (const bfd *ibfd ATTRIBUTE_UNUSED,
5395 bfd *obfd ATTRIBUTE_UNUSED,
5396 const Elf_Internal_Shdr *isection ATTRIBUTE_UNUSED,
5397 Elf_Internal_Shdr *osection ATTRIBUTE_UNUSED)
5398 {
5399 /* PR 19938: FIXME: Need to add code for setting the sh_info
5400 and sh_link fields of Solaris specific section types. */
5401 return false;
5402 }
5403
5404 #undef elf_backend_copy_special_section_fields
5405 #define elf_backend_copy_special_section_fields elf64_x86_64_copy_solaris_special_section_fields
5406
5407 #include "elf64-target.h"
5408
5409 /* Restore defaults. */
5410 #undef ELF_OSABI
5411 #undef elf_backend_static_tls_alignment
5412 #undef elf_backend_want_plt_sym
5413 #define elf_backend_want_plt_sym 0
5414 #undef elf_backend_strtab_flags
5415 #undef elf_backend_copy_special_section_fields
5416
5417 /* 32bit x86-64 support. */
5418
5419 #undef TARGET_LITTLE_SYM
5420 #define TARGET_LITTLE_SYM x86_64_elf32_vec
5421 #undef TARGET_LITTLE_NAME
5422 #define TARGET_LITTLE_NAME "elf32-x86-64"
5423 #undef elf32_bed
5424 #define elf32_bed elf32_x86_64_bed
5425
5426 #undef ELF_ARCH
5427 #define ELF_ARCH bfd_arch_i386
5428
5429 #undef ELF_MACHINE_CODE
5430 #define ELF_MACHINE_CODE EM_X86_64
5431
5432 #undef ELF_TARGET_OS
5433 #undef ELF_OSABI
5434
5435 #define bfd_elf32_bfd_reloc_type_lookup \
5436 elf_x86_64_reloc_type_lookup
5437 #define bfd_elf32_bfd_reloc_name_lookup \
5438 elf_x86_64_reloc_name_lookup
5439 #define bfd_elf32_get_synthetic_symtab \
5440 elf_x86_64_get_synthetic_symtab
5441
5442 #undef elf_backend_object_p
5443 #define elf_backend_object_p \
5444 elf32_x86_64_elf_object_p
5445
5446 #undef elf_backend_bfd_from_remote_memory
5447 #define elf_backend_bfd_from_remote_memory \
5448 _bfd_elf32_bfd_from_remote_memory
5449
5450 #undef elf_backend_size_info
5451 #define elf_backend_size_info \
5452 _bfd_elf32_size_info
5453
5454 #include "elf32-target.h"