gdb: add target_ops::supports_displaced_step
[deliverable/binutils-gdb.git] / bfd / elf32-i386.c
CommitLineData
252b5132 1/* Intel 80386/80486-specific support for 32-bit ELF
b3adc24a 2 Copyright (C) 1993-2020 Free Software Foundation, Inc.
252b5132 3
571fe01f 4 This file is part of BFD, the Binary File Descriptor library.
252b5132 5
571fe01f
NC
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
cd123cb7 8 the Free Software Foundation; either version 3 of the License, or
571fe01f 9 (at your option) any later version.
252b5132 10
571fe01f
NC
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
252b5132 15
571fe01f
NC
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
cd123cb7
NC
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
252b5132 20
0afcef53 21#include "elfxx-x86.h"
5a68afcf 22#include "elf-nacl.h"
eac338cf 23#include "elf-vxworks.h"
e41b3a13 24#include "dwarf2.h"
02a86693 25#include "opcode/i386.h"
252b5132 26
55fd94b0
AM
27/* 386 uses REL relocations instead of RELA. */
28#define USE_REL 1
252b5132
RH
29
30#include "elf/i386.h"
31
32static reloc_howto_type elf_howto_table[]=
33{
6346d5ca 34 HOWTO(R_386_NONE, 0, 3, 0, FALSE, 0, complain_overflow_dont,
1b452ec6 35 bfd_elf_generic_reloc, "R_386_NONE",
b34976b6
AM
36 TRUE, 0x00000000, 0x00000000, FALSE),
37 HOWTO(R_386_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 38 bfd_elf_generic_reloc, "R_386_32",
b34976b6
AM
39 TRUE, 0xffffffff, 0xffffffff, FALSE),
40 HOWTO(R_386_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
1b452ec6 41 bfd_elf_generic_reloc, "R_386_PC32",
b34976b6
AM
42 TRUE, 0xffffffff, 0xffffffff, TRUE),
43 HOWTO(R_386_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 44 bfd_elf_generic_reloc, "R_386_GOT32",
b34976b6
AM
45 TRUE, 0xffffffff, 0xffffffff, FALSE),
46 HOWTO(R_386_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
1b452ec6 47 bfd_elf_generic_reloc, "R_386_PLT32",
b34976b6
AM
48 TRUE, 0xffffffff, 0xffffffff, TRUE),
49 HOWTO(R_386_COPY, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 50 bfd_elf_generic_reloc, "R_386_COPY",
b34976b6
AM
51 TRUE, 0xffffffff, 0xffffffff, FALSE),
52 HOWTO(R_386_GLOB_DAT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 53 bfd_elf_generic_reloc, "R_386_GLOB_DAT",
b34976b6
AM
54 TRUE, 0xffffffff, 0xffffffff, FALSE),
55 HOWTO(R_386_JUMP_SLOT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 56 bfd_elf_generic_reloc, "R_386_JUMP_SLOT",
b34976b6
AM
57 TRUE, 0xffffffff, 0xffffffff, FALSE),
58 HOWTO(R_386_RELATIVE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 59 bfd_elf_generic_reloc, "R_386_RELATIVE",
b34976b6
AM
60 TRUE, 0xffffffff, 0xffffffff, FALSE),
61 HOWTO(R_386_GOTOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 62 bfd_elf_generic_reloc, "R_386_GOTOFF",
b34976b6
AM
63 TRUE, 0xffffffff, 0xffffffff, FALSE),
64 HOWTO(R_386_GOTPC, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
1b452ec6 65 bfd_elf_generic_reloc, "R_386_GOTPC",
b34976b6 66 TRUE, 0xffffffff, 0xffffffff, TRUE),
1b452ec6 67
dc47f327
AM
68 /* We have a gap in the reloc numbers here.
69 R_386_standard counts the number up to this point, and
70 R_386_ext_offset is the value to subtract from a reloc type of
71 R_386_16 thru R_386_PC8 to form an index into this table. */
55fd94b0
AM
72#define R_386_standard (R_386_GOTPC + 1)
73#define R_386_ext_offset (R_386_TLS_TPOFF - R_386_standard)
1b452ec6 74
37e55690 75 /* These relocs are a GNU extension. */
b34976b6 76 HOWTO(R_386_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
37e55690 77 bfd_elf_generic_reloc, "R_386_TLS_TPOFF",
b34976b6
AM
78 TRUE, 0xffffffff, 0xffffffff, FALSE),
79 HOWTO(R_386_TLS_IE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
37e55690 80 bfd_elf_generic_reloc, "R_386_TLS_IE",
b34976b6
AM
81 TRUE, 0xffffffff, 0xffffffff, FALSE),
82 HOWTO(R_386_TLS_GOTIE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
37e55690 83 bfd_elf_generic_reloc, "R_386_TLS_GOTIE",
b34976b6
AM
84 TRUE, 0xffffffff, 0xffffffff, FALSE),
85 HOWTO(R_386_TLS_LE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 86 bfd_elf_generic_reloc, "R_386_TLS_LE",
b34976b6
AM
87 TRUE, 0xffffffff, 0xffffffff, FALSE),
88 HOWTO(R_386_TLS_GD, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 89 bfd_elf_generic_reloc, "R_386_TLS_GD",
b34976b6
AM
90 TRUE, 0xffffffff, 0xffffffff, FALSE),
91 HOWTO(R_386_TLS_LDM, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 92 bfd_elf_generic_reloc, "R_386_TLS_LDM",
b34976b6
AM
93 TRUE, 0xffffffff, 0xffffffff, FALSE),
94 HOWTO(R_386_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
1b452ec6 95 bfd_elf_generic_reloc, "R_386_16",
b34976b6 96 TRUE, 0xffff, 0xffff, FALSE),
b0360d8c 97 HOWTO(R_386_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
1b452ec6 98 bfd_elf_generic_reloc, "R_386_PC16",
b34976b6
AM
99 TRUE, 0xffff, 0xffff, TRUE),
100 HOWTO(R_386_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
1b452ec6 101 bfd_elf_generic_reloc, "R_386_8",
b34976b6
AM
102 TRUE, 0xff, 0xff, FALSE),
103 HOWTO(R_386_PC8, 0, 0, 8, TRUE, 0, complain_overflow_signed,
1b452ec6 104 bfd_elf_generic_reloc, "R_386_PC8",
b34976b6 105 TRUE, 0xff, 0xff, TRUE),
dc47f327 106
55fd94b0
AM
107#define R_386_ext (R_386_PC8 + 1 - R_386_ext_offset)
108#define R_386_tls_offset (R_386_TLS_LDO_32 - R_386_ext)
13ae64f3 109 /* These are common with Solaris TLS implementation. */
b34976b6 110 HOWTO(R_386_TLS_LDO_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 111 bfd_elf_generic_reloc, "R_386_TLS_LDO_32",
b34976b6
AM
112 TRUE, 0xffffffff, 0xffffffff, FALSE),
113 HOWTO(R_386_TLS_IE_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 114 bfd_elf_generic_reloc, "R_386_TLS_IE_32",
b34976b6
AM
115 TRUE, 0xffffffff, 0xffffffff, FALSE),
116 HOWTO(R_386_TLS_LE_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 117 bfd_elf_generic_reloc, "R_386_TLS_LE_32",
b34976b6
AM
118 TRUE, 0xffffffff, 0xffffffff, FALSE),
119 HOWTO(R_386_TLS_DTPMOD32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 120 bfd_elf_generic_reloc, "R_386_TLS_DTPMOD32",
b34976b6
AM
121 TRUE, 0xffffffff, 0xffffffff, FALSE),
122 HOWTO(R_386_TLS_DTPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 123 bfd_elf_generic_reloc, "R_386_TLS_DTPOFF32",
b34976b6
AM
124 TRUE, 0xffffffff, 0xffffffff, FALSE),
125 HOWTO(R_386_TLS_TPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 126 bfd_elf_generic_reloc, "R_386_TLS_TPOFF32",
b34976b6 127 TRUE, 0xffffffff, 0xffffffff, FALSE),
1788fc08
L
128 HOWTO(R_386_SIZE32, 0, 2, 32, FALSE, 0, complain_overflow_unsigned,
129 bfd_elf_generic_reloc, "R_386_SIZE32",
130 TRUE, 0xffffffff, 0xffffffff, FALSE),
67a4f2b7
AO
131 HOWTO(R_386_TLS_GOTDESC, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
132 bfd_elf_generic_reloc, "R_386_TLS_GOTDESC",
133 TRUE, 0xffffffff, 0xffffffff, FALSE),
134 HOWTO(R_386_TLS_DESC_CALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
135 bfd_elf_generic_reloc, "R_386_TLS_DESC_CALL",
136 FALSE, 0, 0, FALSE),
137 HOWTO(R_386_TLS_DESC, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
138 bfd_elf_generic_reloc, "R_386_TLS_DESC",
139 TRUE, 0xffffffff, 0xffffffff, FALSE),
cbe950e9
L
140 HOWTO(R_386_IRELATIVE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
141 bfd_elf_generic_reloc, "R_386_IRELATIVE",
142 TRUE, 0xffffffff, 0xffffffff, FALSE),
02a86693
L
143 HOWTO(R_386_GOT32X, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
144 bfd_elf_generic_reloc, "R_386_GOT32X",
145 TRUE, 0xffffffff, 0xffffffff, FALSE),
13ae64f3
JJ
146
147 /* Another gap. */
02a86693 148#define R_386_ext2 (R_386_GOT32X + 1 - R_386_tls_offset)
c74be520 149#define R_386_vt_offset (R_386_GNU_VTINHERIT - R_386_ext2)
252b5132
RH
150
151/* GNU extension to record C++ vtable hierarchy. */
252b5132
RH
152 HOWTO (R_386_GNU_VTINHERIT, /* type */
153 0, /* rightshift */
154 2, /* size (0 = byte, 1 = short, 2 = long) */
155 0, /* bitsize */
b34976b6 156 FALSE, /* pc_relative */
252b5132
RH
157 0, /* bitpos */
158 complain_overflow_dont, /* complain_on_overflow */
159 NULL, /* special_function */
160 "R_386_GNU_VTINHERIT", /* name */
b34976b6 161 FALSE, /* partial_inplace */
252b5132
RH
162 0, /* src_mask */
163 0, /* dst_mask */
b34976b6 164 FALSE), /* pcrel_offset */
252b5132
RH
165
166/* GNU extension to record C++ vtable member usage. */
252b5132
RH
167 HOWTO (R_386_GNU_VTENTRY, /* type */
168 0, /* rightshift */
169 2, /* size (0 = byte, 1 = short, 2 = long) */
170 0, /* bitsize */
b34976b6 171 FALSE, /* pc_relative */
252b5132
RH
172 0, /* bitpos */
173 complain_overflow_dont, /* complain_on_overflow */
174 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
175 "R_386_GNU_VTENTRY", /* name */
b34976b6 176 FALSE, /* partial_inplace */
252b5132
RH
177 0, /* src_mask */
178 0, /* dst_mask */
b34976b6 179 FALSE) /* pcrel_offset */
dc47f327 180
55fd94b0 181#define R_386_vt (R_386_GNU_VTENTRY + 1 - R_386_vt_offset)
dc47f327
AM
182
183};
184
daf1c414
L
185#define X86_PCREL_TYPE_P(TYPE) ((TYPE) == R_386_PC32)
186
aebcc8ff
L
187#define X86_SIZE_TYPE_P(TYPE) ((TYPE) == R_386_SIZE32)
188
252b5132 189#ifdef DEBUG_GEN_RELOC
55fd94b0
AM
190#define TRACE(str) \
191 fprintf (stderr, "i386 bfd reloc lookup %d (%s)\n", code, str)
252b5132
RH
192#else
193#define TRACE(str)
194#endif
195
196static reloc_howto_type *
f3185997 197elf_i386_reloc_type_lookup (bfd *abfd,
55fd94b0 198 bfd_reloc_code_real_type code)
252b5132
RH
199{
200 switch (code)
201 {
202 case BFD_RELOC_NONE:
203 TRACE ("BFD_RELOC_NONE");
55fd94b0 204 return &elf_howto_table[R_386_NONE];
252b5132
RH
205
206 case BFD_RELOC_32:
207 TRACE ("BFD_RELOC_32");
55fd94b0 208 return &elf_howto_table[R_386_32];
252b5132
RH
209
210 case BFD_RELOC_CTOR:
211 TRACE ("BFD_RELOC_CTOR");
55fd94b0 212 return &elf_howto_table[R_386_32];
252b5132
RH
213
214 case BFD_RELOC_32_PCREL:
215 TRACE ("BFD_RELOC_PC32");
55fd94b0 216 return &elf_howto_table[R_386_PC32];
252b5132
RH
217
218 case BFD_RELOC_386_GOT32:
219 TRACE ("BFD_RELOC_386_GOT32");
55fd94b0 220 return &elf_howto_table[R_386_GOT32];
252b5132
RH
221
222 case BFD_RELOC_386_PLT32:
223 TRACE ("BFD_RELOC_386_PLT32");
55fd94b0 224 return &elf_howto_table[R_386_PLT32];
252b5132
RH
225
226 case BFD_RELOC_386_COPY:
227 TRACE ("BFD_RELOC_386_COPY");
55fd94b0 228 return &elf_howto_table[R_386_COPY];
252b5132
RH
229
230 case BFD_RELOC_386_GLOB_DAT:
231 TRACE ("BFD_RELOC_386_GLOB_DAT");
55fd94b0 232 return &elf_howto_table[R_386_GLOB_DAT];
252b5132
RH
233
234 case BFD_RELOC_386_JUMP_SLOT:
235 TRACE ("BFD_RELOC_386_JUMP_SLOT");
55fd94b0 236 return &elf_howto_table[R_386_JUMP_SLOT];
252b5132
RH
237
238 case BFD_RELOC_386_RELATIVE:
239 TRACE ("BFD_RELOC_386_RELATIVE");
55fd94b0 240 return &elf_howto_table[R_386_RELATIVE];
252b5132
RH
241
242 case BFD_RELOC_386_GOTOFF:
243 TRACE ("BFD_RELOC_386_GOTOFF");
55fd94b0 244 return &elf_howto_table[R_386_GOTOFF];
252b5132
RH
245
246 case BFD_RELOC_386_GOTPC:
247 TRACE ("BFD_RELOC_386_GOTPC");
55fd94b0 248 return &elf_howto_table[R_386_GOTPC];
252b5132 249
37e55690
JJ
250 /* These relocs are a GNU extension. */
251 case BFD_RELOC_386_TLS_TPOFF:
252 TRACE ("BFD_RELOC_386_TLS_TPOFF");
55fd94b0 253 return &elf_howto_table[R_386_TLS_TPOFF - R_386_ext_offset];
37e55690
JJ
254
255 case BFD_RELOC_386_TLS_IE:
256 TRACE ("BFD_RELOC_386_TLS_IE");
55fd94b0 257 return &elf_howto_table[R_386_TLS_IE - R_386_ext_offset];
37e55690
JJ
258
259 case BFD_RELOC_386_TLS_GOTIE:
260 TRACE ("BFD_RELOC_386_TLS_GOTIE");
55fd94b0 261 return &elf_howto_table[R_386_TLS_GOTIE - R_386_ext_offset];
37e55690 262
13ae64f3
JJ
263 case BFD_RELOC_386_TLS_LE:
264 TRACE ("BFD_RELOC_386_TLS_LE");
55fd94b0 265 return &elf_howto_table[R_386_TLS_LE - R_386_ext_offset];
13ae64f3
JJ
266
267 case BFD_RELOC_386_TLS_GD:
268 TRACE ("BFD_RELOC_386_TLS_GD");
55fd94b0 269 return &elf_howto_table[R_386_TLS_GD - R_386_ext_offset];
13ae64f3
JJ
270
271 case BFD_RELOC_386_TLS_LDM:
272 TRACE ("BFD_RELOC_386_TLS_LDM");
55fd94b0 273 return &elf_howto_table[R_386_TLS_LDM - R_386_ext_offset];
13ae64f3 274
252b5132
RH
275 case BFD_RELOC_16:
276 TRACE ("BFD_RELOC_16");
55fd94b0 277 return &elf_howto_table[R_386_16 - R_386_ext_offset];
252b5132
RH
278
279 case BFD_RELOC_16_PCREL:
280 TRACE ("BFD_RELOC_16_PCREL");
55fd94b0 281 return &elf_howto_table[R_386_PC16 - R_386_ext_offset];
252b5132
RH
282
283 case BFD_RELOC_8:
284 TRACE ("BFD_RELOC_8");
55fd94b0 285 return &elf_howto_table[R_386_8 - R_386_ext_offset];
252b5132
RH
286
287 case BFD_RELOC_8_PCREL:
288 TRACE ("BFD_RELOC_8_PCREL");
55fd94b0 289 return &elf_howto_table[R_386_PC8 - R_386_ext_offset];
252b5132 290
13ae64f3
JJ
291 /* Common with Sun TLS implementation. */
292 case BFD_RELOC_386_TLS_LDO_32:
293 TRACE ("BFD_RELOC_386_TLS_LDO_32");
55fd94b0 294 return &elf_howto_table[R_386_TLS_LDO_32 - R_386_tls_offset];
13ae64f3
JJ
295
296 case BFD_RELOC_386_TLS_IE_32:
297 TRACE ("BFD_RELOC_386_TLS_IE_32");
55fd94b0 298 return &elf_howto_table[R_386_TLS_IE_32 - R_386_tls_offset];
13ae64f3
JJ
299
300 case BFD_RELOC_386_TLS_LE_32:
301 TRACE ("BFD_RELOC_386_TLS_LE_32");
55fd94b0 302 return &elf_howto_table[R_386_TLS_LE_32 - R_386_tls_offset];
13ae64f3
JJ
303
304 case BFD_RELOC_386_TLS_DTPMOD32:
305 TRACE ("BFD_RELOC_386_TLS_DTPMOD32");
55fd94b0 306 return &elf_howto_table[R_386_TLS_DTPMOD32 - R_386_tls_offset];
13ae64f3
JJ
307
308 case BFD_RELOC_386_TLS_DTPOFF32:
309 TRACE ("BFD_RELOC_386_TLS_DTPOFF32");
55fd94b0 310 return &elf_howto_table[R_386_TLS_DTPOFF32 - R_386_tls_offset];
13ae64f3
JJ
311
312 case BFD_RELOC_386_TLS_TPOFF32:
313 TRACE ("BFD_RELOC_386_TLS_TPOFF32");
55fd94b0 314 return &elf_howto_table[R_386_TLS_TPOFF32 - R_386_tls_offset];
13ae64f3 315
1788fc08
L
316 case BFD_RELOC_SIZE32:
317 TRACE ("BFD_RELOC_SIZE32");
318 return &elf_howto_table[R_386_SIZE32 - R_386_tls_offset];
319
67a4f2b7
AO
320 case BFD_RELOC_386_TLS_GOTDESC:
321 TRACE ("BFD_RELOC_386_TLS_GOTDESC");
322 return &elf_howto_table[R_386_TLS_GOTDESC - R_386_tls_offset];
323
324 case BFD_RELOC_386_TLS_DESC_CALL:
325 TRACE ("BFD_RELOC_386_TLS_DESC_CALL");
326 return &elf_howto_table[R_386_TLS_DESC_CALL - R_386_tls_offset];
327
328 case BFD_RELOC_386_TLS_DESC:
329 TRACE ("BFD_RELOC_386_TLS_DESC");
330 return &elf_howto_table[R_386_TLS_DESC - R_386_tls_offset];
331
cbe950e9
L
332 case BFD_RELOC_386_IRELATIVE:
333 TRACE ("BFD_RELOC_386_IRELATIVE");
2a750708 334 return &elf_howto_table[R_386_IRELATIVE - R_386_tls_offset];
cbe950e9 335
02a86693
L
336 case BFD_RELOC_386_GOT32X:
337 TRACE ("BFD_RELOC_386_GOT32X");
338 return &elf_howto_table[R_386_GOT32X - R_386_tls_offset];
339
252b5132
RH
340 case BFD_RELOC_VTABLE_INHERIT:
341 TRACE ("BFD_RELOC_VTABLE_INHERIT");
55fd94b0 342 return &elf_howto_table[R_386_GNU_VTINHERIT - R_386_vt_offset];
252b5132
RH
343
344 case BFD_RELOC_VTABLE_ENTRY:
345 TRACE ("BFD_RELOC_VTABLE_ENTRY");
55fd94b0 346 return &elf_howto_table[R_386_GNU_VTENTRY - R_386_vt_offset];
252b5132
RH
347
348 default:
f3185997
NC
349 TRACE ("Unknown");
350 /* xgettext:c-format */
e8f5af78 351 _bfd_error_handler (_("%pB: unsupported relocation type: %#x"),
f3185997
NC
352 abfd, (int) code);
353 bfd_set_error (bfd_error_bad_value);
354 return NULL;
252b5132 355 }
252b5132
RH
356}
357
157090f7
AM
358static reloc_howto_type *
359elf_i386_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
360 const char *r_name)
361{
362 unsigned int i;
363
364 for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
365 if (elf_howto_table[i].name != NULL
366 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
367 return &elf_howto_table[i];
368
369 return NULL;
370}
371
142411ca 372static reloc_howto_type *
b366503e 373elf_i386_rtype_to_howto (unsigned r_type)
252b5132 374{
dc47f327
AM
375 unsigned int indx;
376
377 if ((indx = r_type) >= R_386_standard
378 && ((indx = r_type - R_386_ext_offset) - R_386_standard
379 >= R_386_ext - R_386_standard)
13ae64f3 380 && ((indx = r_type - R_386_tls_offset) - R_386_ext
c74be520
L
381 >= R_386_ext2 - R_386_ext)
382 && ((indx = r_type - R_386_vt_offset) - R_386_ext2
383 >= R_386_vt - R_386_ext2))
f3185997 384 return NULL;
06614111
NC
385 /* PR 17512: file: 0f67f69d. */
386 if (elf_howto_table [indx].type != r_type)
387 return NULL;
142411ca
L
388 return &elf_howto_table[indx];
389}
390
f3185997
NC
391static bfd_boolean
392elf_i386_info_to_howto_rel (bfd *abfd,
142411ca
L
393 arelent *cache_ptr,
394 Elf_Internal_Rela *dst)
395{
396 unsigned int r_type = ELF32_R_TYPE (dst->r_info);
f3185997 397
b366503e 398 if ((cache_ptr->howto = elf_i386_rtype_to_howto (r_type)) == NULL)
f3185997
NC
399 {
400 /* xgettext:c-format */
401 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
402 abfd, r_type);
403 bfd_set_error (bfd_error_bad_value);
404 return FALSE;
405 }
406
407 return TRUE;
252b5132
RH
408}
409
410/* Return whether a symbol name implies a local label. The UnixWare
411 2.1 cc generates temporary symbols that start with .X, so we
412 recognize them here. FIXME: do other SVR4 compilers also use .X?.
413 If so, we should move the .X recognition into
414 _bfd_elf_is_local_label_name. */
415
b34976b6 416static bfd_boolean
55fd94b0 417elf_i386_is_local_label_name (bfd *abfd, const char *name)
252b5132
RH
418{
419 if (name[0] == '.' && name[1] == 'X')
b34976b6 420 return TRUE;
252b5132
RH
421
422 return _bfd_elf_is_local_label_name (abfd, name);
423}
424\f
38701953 425/* Support for core dump NOTE sections. */
61adc1a4 426
b34976b6 427static bfd_boolean
55fd94b0 428elf_i386_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
38701953
AM
429{
430 int offset;
eea6121a 431 size_t size;
38701953 432
61adc1a4 433 if (note->namesz == 8 && strcmp (note->namedata, "FreeBSD") == 0)
38701953 434 {
61adc1a4
NC
435 int pr_version = bfd_get_32 (abfd, note->descdata);
436
437 if (pr_version != 1)
07d6d2b8 438 return FALSE;
61adc1a4
NC
439
440 /* pr_cursig */
228e534f 441 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 20);
61adc1a4
NC
442
443 /* pr_pid */
228e534f 444 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
61adc1a4
NC
445
446 /* pr_reg */
447 offset = 28;
eea6121a 448 size = bfd_get_32 (abfd, note->descdata + 8);
61adc1a4
NC
449 }
450 else
451 {
452 switch (note->descsz)
453 {
454 default:
455 return FALSE;
38701953 456
61adc1a4
NC
457 case 144: /* Linux/i386 */
458 /* pr_cursig */
228e534f 459 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
38701953 460
61adc1a4 461 /* pr_pid */
228e534f 462 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
38701953 463
61adc1a4
NC
464 /* pr_reg */
465 offset = 72;
eea6121a 466 size = 68;
38701953 467
61adc1a4
NC
468 break;
469 }
38701953
AM
470 }
471
472 /* Make a ".reg/999" section. */
473 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 474 size, note->descpos + offset);
38701953
AM
475}
476
b34976b6 477static bfd_boolean
55fd94b0 478elf_i386_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
38701953 479{
61adc1a4 480 if (note->namesz == 8 && strcmp (note->namedata, "FreeBSD") == 0)
38701953 481 {
61adc1a4
NC
482 int pr_version = bfd_get_32 (abfd, note->descdata);
483
484 if (pr_version != 1)
b34976b6 485 return FALSE;
38701953 486
228e534f 487 elf_tdata (abfd)->core->program
61adc1a4 488 = _bfd_elfcore_strndup (abfd, note->descdata + 8, 17);
228e534f 489 elf_tdata (abfd)->core->command
61adc1a4
NC
490 = _bfd_elfcore_strndup (abfd, note->descdata + 25, 81);
491 }
492 else
493 {
494 switch (note->descsz)
495 {
496 default:
497 return FALSE;
498
499 case 124: /* Linux/i386 elf_prpsinfo. */
228e534f 500 elf_tdata (abfd)->core->pid
261b8d08 501 = bfd_get_32 (abfd, note->descdata + 12);
228e534f 502 elf_tdata (abfd)->core->program
61adc1a4 503 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
228e534f 504 elf_tdata (abfd)->core->command
61adc1a4
NC
505 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
506 }
38701953
AM
507 }
508
509 /* Note that for some reason, a spurious space is tacked
510 onto the end of the args in some (at least one anyway)
511 implementations, so strip it off if it exists. */
38701953 512 {
228e534f 513 char *command = elf_tdata (abfd)->core->command;
38701953
AM
514 int n = strlen (command);
515
516 if (0 < n && command[n - 1] == ' ')
517 command[n - 1] = '\0';
518 }
519
b34976b6 520 return TRUE;
38701953
AM
521}
522\f
523/* Functions for the i386 ELF linker.
524
525 In order to gain some understanding of code in this file without
526 knowing all the intricate details of the linker, note the
527 following:
528
529 Functions named elf_i386_* are called by external routines, other
530 functions are only called locally. elf_i386_* functions appear
531 in this file more or less in the order in which they are called
532 from external routines. eg. elf_i386_check_relocs is called
533 early in the link process, elf_i386_finish_dynamic_sections is
534 one of the last functions. */
535
f604c2a2 536/* The size in bytes of an entry in the lazy procedure linkage table. */
252b5132 537
f604c2a2 538#define LAZY_PLT_ENTRY_SIZE 16
252b5132 539
f604c2a2
L
540/* The size in bytes of an entry in the non-lazy procedure linkage
541 table. */
252b5132 542
f604c2a2
L
543#define NON_LAZY_PLT_ENTRY_SIZE 8
544
545/* The first entry in an absolute lazy procedure linkage table looks
546 like this. See the SVR4 ABI i386 supplement to see how this works.
547 Will be padded to LAZY_PLT_ENTRY_SIZE with lazy_plt->plt0_pad_byte. */
548
549static const bfd_byte elf_i386_lazy_plt0_entry[12] =
252b5132
RH
550{
551 0xff, 0x35, /* pushl contents of address */
552 0, 0, 0, 0, /* replaced with address of .got + 4. */
553 0xff, 0x25, /* jmp indirect */
eac338cf 554 0, 0, 0, 0 /* replaced with address of .got + 8. */
252b5132
RH
555};
556
f604c2a2
L
557/* Subsequent entries in an absolute lazy procedure linkage table look
558 like this. */
252b5132 559
f604c2a2 560static const bfd_byte elf_i386_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
252b5132
RH
561{
562 0xff, 0x25, /* jmp indirect */
563 0, 0, 0, 0, /* replaced with address of this symbol in .got. */
564 0x68, /* pushl immediate */
565 0, 0, 0, 0, /* replaced with offset into relocation table. */
566 0xe9, /* jmp relative */
567 0, 0, 0, 0 /* replaced with offset to start of .plt. */
568};
569
f604c2a2
L
570/* The first entry in a PIC lazy procedure linkage table look like
571 this. Will be padded to LAZY_PLT_ENTRY_SIZE with
572 lazy_plt->plt0_pad_byte. */
252b5132 573
f604c2a2 574static const bfd_byte elf_i386_pic_lazy_plt0_entry[12] =
252b5132
RH
575{
576 0xff, 0xb3, 4, 0, 0, 0, /* pushl 4(%ebx) */
eac338cf 577 0xff, 0xa3, 8, 0, 0, 0 /* jmp *8(%ebx) */
252b5132
RH
578};
579
f604c2a2
L
580/* Subsequent entries in a PIC lazy procedure linkage table look like
581 this. */
252b5132 582
f604c2a2 583static const bfd_byte elf_i386_pic_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
252b5132
RH
584{
585 0xff, 0xa3, /* jmp *offset(%ebx) */
586 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
587 0x68, /* pushl immediate */
588 0, 0, 0, 0, /* replaced with offset into relocation table. */
589 0xe9, /* jmp relative */
590 0, 0, 0, 0 /* replaced with offset to start of .plt. */
591};
592
f604c2a2 593/* Entries in the non-lazy procedure linkage table look like this. */
dd7e64d4 594
f604c2a2 595static const bfd_byte elf_i386_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
dd7e64d4
L
596{
597 0xff, 0x25, /* jmp indirect */
598 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
599 0x66, 0x90 /* xchg %ax,%ax */
600};
601
f604c2a2
L
602/* Entries in the PIC non-lazy procedure linkage table look like
603 this. */
dd7e64d4 604
f604c2a2 605static const bfd_byte elf_i386_pic_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
dd7e64d4
L
606{
607 0xff, 0xa3, /* jmp *offset(%ebx) */
608 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
609 0x66, 0x90 /* xchg %ax,%ax */
610};
611
ee2fdd6f
L
612/* The first entry in an absolute IBT-enabled lazy procedure linkage
613 table looks like this. */
614
615static const bfd_byte elf_i386_lazy_ibt_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
616{
07d6d2b8
AM
617 0xff, 0x35, 0, 0, 0, 0, /* pushl GOT[1] */
618 0xff, 0x25, 0, 0, 0, 0, /* jmp *GOT[2] */
619 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
ee2fdd6f
L
620};
621
622/* Subsequent entries for an absolute IBT-enabled lazy procedure linkage
623 table look like this. Subsequent entries for a PIC IBT-enabled lazy
624 procedure linkage table are the same. */
625
626static const bfd_byte elf_i386_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
627{
07d6d2b8
AM
628 0xf3, 0x0f, 0x1e, 0xfb, /* endbr32 */
629 0x68, 0, 0, 0, 0, /* pushl immediate */
630 0xe9, 0, 0, 0, 0, /* jmp relative */
631 0x66, 0x90 /* xchg %ax,%ax */
ee2fdd6f
L
632};
633
634/* The first entry in a PIC IBT-enabled lazy procedure linkage table
635 look like. */
636
637static const bfd_byte elf_i386_pic_lazy_ibt_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
638{
639 0xff, 0xb3, 4, 0, 0, 0, /* pushl 4(%ebx) */
07d6d2b8
AM
640 0xff, 0xa3, 8, 0, 0, 0, /* jmp *8(%ebx) */
641 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
ee2fdd6f
L
642};
643
644/* Entries for branches with IBT-enabled in the absolute non-lazey
645 procedure linkage table look like this. They have the same size
646 as the lazy PLT entry. */
647
648static const bfd_byte elf_i386_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
649{
07d6d2b8 650 0xf3, 0x0f, 0x1e, 0xfb, /* endbr32 */
ee2fdd6f
L
651 0xff, 0x25, 0, 0, 0, 0, /* jmp *name@GOT */
652 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
653};
654
655/* Entries for branches with IBT-enabled in the PIC non-lazey procedure
656 linkage table look like this. They have the same size as the lazy
657 PLT entry. */
658
659static const bfd_byte elf_i386_pic_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
660{
07d6d2b8 661 0xf3, 0x0f, 0x1e, 0xfb, /* endbr32 */
ee2fdd6f
L
662 0xff, 0xa3, 0, 0, 0, 0, /* jmp *name@GOT(%ebx) */
663 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
664};
665
f604c2a2 666/* .eh_frame covering the lazy .plt section. */
e41b3a13 667
f604c2a2 668static const bfd_byte elf_i386_eh_frame_lazy_plt[] =
e41b3a13 669{
e41b3a13
JJ
670 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
671 0, 0, 0, 0, /* CIE ID */
672 1, /* CIE version */
673 'z', 'R', 0, /* Augmentation string */
674 1, /* Code alignment factor */
675 0x7c, /* Data alignment factor */
676 8, /* Return address column */
677 1, /* Augmentation size */
678 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
679 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
680 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
681 DW_CFA_nop, DW_CFA_nop,
682
683 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
684 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
685 0, 0, 0, 0, /* R_386_PC32 .plt goes here */
686 0, 0, 0, 0, /* .plt size goes here */
687 0, /* Augmentation size */
688 DW_CFA_def_cfa_offset, 8, /* DW_CFA_def_cfa_offset: 8 */
689 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
690 DW_CFA_def_cfa_offset, 12, /* DW_CFA_def_cfa_offset: 12 */
691 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
692 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
693 11, /* Block length */
694 DW_OP_breg4, 4, /* DW_OP_breg4 (esp): 4 */
695 DW_OP_breg8, 0, /* DW_OP_breg8 (eip): 0 */
696 DW_OP_lit15, DW_OP_and, DW_OP_lit11, DW_OP_ge,
28ede8be 697 DW_OP_lit2, DW_OP_shl, DW_OP_plus,
e41b3a13
JJ
698 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
699};
700
ee2fdd6f
L
701/* .eh_frame covering the lazy .plt section with IBT-enabled. */
702
703static const bfd_byte elf_i386_eh_frame_lazy_ibt_plt[] =
704{
705 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
706 0, 0, 0, 0, /* CIE ID */
707 1, /* CIE version */
708 'z', 'R', 0, /* Augmentation string */
709 1, /* Code alignment factor */
710 0x7c, /* Data alignment factor */
711 8, /* Return address column */
712 1, /* Augmentation size */
713 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
714 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
715 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
716 DW_CFA_nop, DW_CFA_nop,
717
718 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
719 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
720 0, 0, 0, 0, /* R_386_PC32 .plt goes here */
721 0, 0, 0, 0, /* .plt size goes here */
722 0, /* Augmentation size */
723 DW_CFA_def_cfa_offset, 8, /* DW_CFA_def_cfa_offset: 8 */
724 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
725 DW_CFA_def_cfa_offset, 12, /* DW_CFA_def_cfa_offset: 12 */
726 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
727 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
728 11, /* Block length */
729 DW_OP_breg4, 4, /* DW_OP_breg4 (esp): 4 */
730 DW_OP_breg8, 0, /* DW_OP_breg8 (eip): 0 */
731 DW_OP_lit15, DW_OP_and, DW_OP_lit9, DW_OP_ge,
732 DW_OP_lit2, DW_OP_shl, DW_OP_plus,
733 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
734};
735
f604c2a2 736/* .eh_frame covering the non-lazy .plt section. */
fff53dae 737
f604c2a2 738static const bfd_byte elf_i386_eh_frame_non_lazy_plt[] =
fff53dae
L
739{
740#define PLT_GOT_FDE_LENGTH 16
741 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
742 0, 0, 0, 0, /* CIE ID */
743 1, /* CIE version */
744 'z', 'R', 0, /* Augmentation string */
745 1, /* Code alignment factor */
746 0x7c, /* Data alignment factor */
747 8, /* Return address column */
748 1, /* Augmentation size */
749 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
750 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
751 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
752 DW_CFA_nop, DW_CFA_nop,
753
754 PLT_GOT_FDE_LENGTH, 0, 0, 0, /* FDE length */
755 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
f604c2a2
L
756 0, 0, 0, 0, /* the start of non-lazy .plt goes here */
757 0, 0, 0, 0, /* non-lazy .plt size goes here */
fff53dae
L
758 0, /* Augmentation size */
759 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
760};
761
25e762b9 762/* These are the standard parameters. */
765e526c 763static const struct elf_x86_lazy_plt_layout elf_i386_lazy_plt =
25e762b9 764 {
07d6d2b8
AM
765 elf_i386_lazy_plt0_entry, /* plt0_entry */
766 sizeof (elf_i386_lazy_plt0_entry), /* plt0_entry_size */
767 elf_i386_lazy_plt_entry, /* plt_entry */
768 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
92e68c1d
L
769 NULL, /* plt_tlsdesc_entry */
770 0, /* plt_tlsdesc_entry_size*/
771 0, /* plt_tlsdesc_got1_offset */
772 0, /* plt_tlsdesc_got2_offset */
773 0, /* plt_tlsdesc_got1_insn_end */
774 0, /* plt_tlsdesc_got2_insn_end */
07d6d2b8
AM
775 2, /* plt0_got1_offset */
776 8, /* plt0_got2_offset */
777 0, /* plt0_got2_insn_end */
778 2, /* plt_got_offset */
779 7, /* plt_reloc_offset */
780 12, /* plt_plt_offset */
781 0, /* plt_got_insn_size */
782 0, /* plt_plt_insn_end */
783 6, /* plt_lazy_offset */
784 elf_i386_pic_lazy_plt0_entry, /* pic_plt0_entry */
785 elf_i386_pic_lazy_plt_entry, /* pic_plt_entry */
786 elf_i386_eh_frame_lazy_plt, /* eh_frame_plt */
f604c2a2
L
787 sizeof (elf_i386_eh_frame_lazy_plt) /* eh_frame_plt_size */
788 };
789
765e526c 790static const struct elf_x86_non_lazy_plt_layout elf_i386_non_lazy_plt =
f604c2a2 791 {
07d6d2b8
AM
792 elf_i386_non_lazy_plt_entry, /* plt_entry */
793 elf_i386_pic_non_lazy_plt_entry, /* pic_plt_entry */
794 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
795 2, /* plt_got_offset */
796 0, /* plt_got_insn_size */
797 elf_i386_eh_frame_non_lazy_plt, /* eh_frame_plt */
f604c2a2 798 sizeof (elf_i386_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
25e762b9 799 };
ee2fdd6f 800
765e526c 801static const struct elf_x86_lazy_plt_layout elf_i386_lazy_ibt_plt =
ee2fdd6f 802 {
07d6d2b8 803 elf_i386_lazy_ibt_plt0_entry, /* plt0_entry */
ee2fdd6f 804 sizeof (elf_i386_lazy_ibt_plt0_entry), /* plt0_entry_size */
07d6d2b8
AM
805 elf_i386_lazy_ibt_plt_entry, /* plt_entry */
806 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
92e68c1d
L
807 NULL, /* plt_tlsdesc_entry */
808 0, /* plt_tlsdesc_entry_size*/
809 0, /* plt_tlsdesc_got1_offset */
810 0, /* plt_tlsdesc_got2_offset */
811 0, /* plt_tlsdesc_got1_insn_end */
812 0, /* plt_tlsdesc_got2_insn_end */
07d6d2b8
AM
813 2, /* plt0_got1_offset */
814 8, /* plt0_got2_offset */
815 0, /* plt0_got2_insn_end */
816 4+2, /* plt_got_offset */
817 4+1, /* plt_reloc_offset */
818 4+6, /* plt_plt_offset */
819 0, /* plt_got_insn_size */
820 0, /* plt_plt_insn_end */
821 0, /* plt_lazy_offset */
822 elf_i386_pic_lazy_ibt_plt0_entry, /* pic_plt0_entry */
823 elf_i386_lazy_ibt_plt_entry, /* pic_plt_entry */
824 elf_i386_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
ee2fdd6f
L
825 sizeof (elf_i386_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
826 };
827
765e526c 828static const struct elf_x86_non_lazy_plt_layout elf_i386_non_lazy_ibt_plt =
ee2fdd6f 829 {
07d6d2b8 830 elf_i386_non_lazy_ibt_plt_entry, /* plt_entry */
ee2fdd6f 831 elf_i386_pic_non_lazy_ibt_plt_entry,/* pic_plt_entry */
07d6d2b8
AM
832 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
833 4+2, /* plt_got_offset */
834 0, /* plt_got_insn_size */
835 elf_i386_eh_frame_non_lazy_plt, /* eh_frame_plt */
ee2fdd6f
L
836 sizeof (elf_i386_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
837 };
25e762b9
RM
838\f
839
eac338cf
PB
840/* On VxWorks, the .rel.plt.unloaded section has absolute relocations
841 for the PLTResolve stub and then for each PLT entry. */
842#define PLTRESOLVE_RELOCS_SHLIB 0
843#define PLTRESOLVE_RELOCS 2
844#define PLT_NON_JUMP_SLOT_RELOCS 2
845
23209a78 846/* These are the standard parameters. */
851b6fa1 847static const struct elf_x86_backend_data elf_i386_arch_bed =
23209a78 848 {
07d6d2b8 849 is_normal /* os */
23209a78
RM
850 };
851
852#define elf_backend_arch_data &elf_i386_arch_bed
853
142411ca
L
854/* Return TRUE if the TLS access code sequence support transition
855 from R_TYPE. */
856
857static bfd_boolean
bedfd056 858elf_i386_check_tls_transition (asection *sec,
142411ca
L
859 bfd_byte *contents,
860 Elf_Internal_Shdr *symtab_hdr,
861 struct elf_link_hash_entry **sym_hashes,
862 unsigned int r_type,
863 const Elf_Internal_Rela *rel,
864 const Elf_Internal_Rela *relend)
13ae64f3 865{
6eaa7fb5 866 unsigned int val, type, reg;
142411ca
L
867 unsigned long r_symndx;
868 struct elf_link_hash_entry *h;
869 bfd_vma offset;
6eaa7fb5 870 bfd_byte *call;
1d4af308 871 bfd_boolean indirect_call;
142411ca 872
142411ca 873 offset = rel->r_offset;
13ae64f3 874 switch (r_type)
142411ca
L
875 {
876 case R_386_TLS_GD:
877 case R_386_TLS_LDM:
878 if (offset < 2 || (rel + 1) >= relend)
879 return FALSE;
880
6eaa7fb5
L
881 indirect_call = FALSE;
882 call = contents + offset + 4;
883 val = *(call - 5);
884 type = *(call - 6);
142411ca
L
885 if (r_type == R_386_TLS_GD)
886 {
09e8c3bf 887 /* Check transition from GD access model. Only
6eaa7fb5
L
888 leal foo@tlsgd(,%ebx,1), %eax
889 call ___tls_get_addr@PLT
890 or
891 leal foo@tlsgd(%ebx) %eax
892 call ___tls_get_addr@PLT
893 nop
894 or
895 leal foo@tlsgd(%reg), %eax
896 call *___tls_get_addr@GOT(%reg)
897 which may be converted to
898 addr32 call ___tls_get_addr
142411ca 899 can transit to different access model. */
6eaa7fb5
L
900 if ((offset + 10) > sec->size
901 || (type != 0x8d && type != 0x04))
142411ca
L
902 return FALSE;
903
142411ca
L
904 if (type == 0x04)
905 {
6eaa7fb5
L
906 /* leal foo@tlsgd(,%ebx,1), %eax
907 call ___tls_get_addr@PLT */
142411ca
L
908 if (offset < 3)
909 return FALSE;
910
6eaa7fb5
L
911 if (*(call - 7) != 0x8d
912 || val != 0x1d
913 || call[0] != 0xe8)
142411ca
L
914 return FALSE;
915 }
916 else
917 {
6eaa7fb5
L
918 /* This must be
919 leal foo@tlsgd(%ebx), %eax
920 call ___tls_get_addr@PLT
921 nop
922 or
923 leal foo@tlsgd(%reg), %eax
924 call *___tls_get_addr@GOT(%reg)
925 which may be converted to
926 addr32 call ___tls_get_addr
927
928 %eax can't be used as the GOT base register since it
929 is used to pass parameter to ___tls_get_addr. */
930 reg = val & 7;
931 if ((val & 0xf8) != 0x80 || reg == 4 || reg == 0)
142411ca
L
932 return FALSE;
933
6eaa7fb5
L
934 indirect_call = call[0] == 0xff;
935 if (!(reg == 3 && call[0] == 0xe8 && call[5] == 0x90)
936 && !(call[0] == 0x67 && call[1] == 0xe8)
937 && !(indirect_call
938 && (call[1] & 0xf8) == 0x90
939 && (call[1] & 0x7) == reg))
142411ca
L
940 return FALSE;
941 }
942 }
943 else
944 {
945 /* Check transition from LD access model. Only
6eaa7fb5
L
946 leal foo@tlsldm(%ebx), %eax
947 call ___tls_get_addr@PLT
948 or
949 leal foo@tlsldm(%reg), %eax
950 call *___tls_get_addr@GOT(%reg)
951 which may be converted to
952 addr32 call ___tls_get_addr
142411ca
L
953 can transit to different access model. */
954 if (type != 0x8d || (offset + 9) > sec->size)
955 return FALSE;
956
6eaa7fb5
L
957 /* %eax can't be used as the GOT base register since it is
958 used to pass parameter to ___tls_get_addr. */
959 reg = val & 7;
960 if ((val & 0xf8) != 0x80 || reg == 4 || reg == 0)
142411ca 961 return FALSE;
142411ca 962
6eaa7fb5
L
963 indirect_call = call[0] == 0xff;
964 if (!(reg == 3 && call[0] == 0xe8)
965 && !(call[0] == 0x67 && call[1] == 0xe8)
966 && !(indirect_call
967 && (call[1] & 0xf8) == 0x90
968 && (call[1] & 0x7) == reg))
969 return FALSE;
970 }
142411ca
L
971
972 r_symndx = ELF32_R_SYM (rel[1].r_info);
973 if (r_symndx < symtab_hdr->sh_info)
974 return FALSE;
975
976 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1d4af308 977 if (h == NULL
0afcef53 978 || !((struct elf_x86_link_hash_entry *) h)->tls_get_addr)
6eaa7fb5
L
979 return FALSE;
980 else if (indirect_call)
981 return (ELF32_R_TYPE (rel[1].r_info) == R_386_GOT32X);
982 else
983 return (ELF32_R_TYPE (rel[1].r_info) == R_386_PC32
984 || ELF32_R_TYPE (rel[1].r_info) == R_386_PLT32);
142411ca
L
985
986 case R_386_TLS_IE:
987 /* Check transition from IE access model:
988 movl foo@indntpoff(%rip), %eax
989 movl foo@indntpoff(%rip), %reg
990 addl foo@indntpoff(%rip), %reg
991 */
992
993 if (offset < 1 || (offset + 4) > sec->size)
994 return FALSE;
995
996 /* Check "movl foo@tpoff(%rip), %eax" first. */
997 val = bfd_get_8 (abfd, contents + offset - 1);
998 if (val == 0xa1)
999 return TRUE;
1000
1001 if (offset < 2)
1002 return FALSE;
1003
1004 /* Check movl|addl foo@tpoff(%rip), %reg. */
1005 type = bfd_get_8 (abfd, contents + offset - 2);
1006 return ((type == 0x8b || type == 0x03)
1007 && (val & 0xc7) == 0x05);
1008
1009 case R_386_TLS_GOTIE:
1010 case R_386_TLS_IE_32:
1011 /* Check transition from {IE_32,GOTIE} access model:
1012 subl foo@{tpoff,gontoff}(%reg1), %reg2
1013 movl foo@{tpoff,gontoff}(%reg1), %reg2
1014 addl foo@{tpoff,gontoff}(%reg1), %reg2
1015 */
1016
1017 if (offset < 2 || (offset + 4) > sec->size)
1018 return FALSE;
1019
1020 val = bfd_get_8 (abfd, contents + offset - 1);
1021 if ((val & 0xc0) != 0x80 || (val & 7) == 4)
1022 return FALSE;
1023
1024 type = bfd_get_8 (abfd, contents + offset - 2);
1025 return type == 0x8b || type == 0x2b || type == 0x03;
1026
1027 case R_386_TLS_GOTDESC:
1028 /* Check transition from GDesc access model:
1029 leal x@tlsdesc(%ebx), %eax
1030
1031 Make sure it's a leal adding ebx to a 32-bit offset
1032 into any register, although it's probably almost always
1033 going to be eax. */
1034
1035 if (offset < 2 || (offset + 4) > sec->size)
1036 return FALSE;
1037
1038 if (bfd_get_8 (abfd, contents + offset - 2) != 0x8d)
1039 return FALSE;
1040
1041 val = bfd_get_8 (abfd, contents + offset - 1);
1042 return (val & 0xc7) == 0x83;
1043
1044 case R_386_TLS_DESC_CALL:
1045 /* Check transition from GDesc access model:
6eaa7fb5 1046 call *x@tlsdesc(%eax)
142411ca
L
1047 */
1048 if (offset + 2 <= sec->size)
1049 {
6eaa7fb5
L
1050 /* Make sure that it's a call *x@tlsdesc(%eax). */
1051 call = contents + offset;
1052 return call[0] == 0xff && call[1] == 0x10;
142411ca
L
1053 }
1054
1055 return FALSE;
1056
1057 default:
1058 abort ();
1059 }
1060}
1061
1062/* Return TRUE if the TLS access transition is OK or no transition
1063 will be performed. Update R_TYPE if there is a transition. */
1064
1065static bfd_boolean
1066elf_i386_tls_transition (struct bfd_link_info *info, bfd *abfd,
1067 asection *sec, bfd_byte *contents,
1068 Elf_Internal_Shdr *symtab_hdr,
1069 struct elf_link_hash_entry **sym_hashes,
1070 unsigned int *r_type, int tls_type,
1071 const Elf_Internal_Rela *rel,
1072 const Elf_Internal_Rela *relend,
4c544807 1073 struct elf_link_hash_entry *h,
bedfd056
L
1074 unsigned long r_symndx,
1075 bfd_boolean from_relocate_section)
142411ca
L
1076{
1077 unsigned int from_type = *r_type;
1078 unsigned int to_type = from_type;
1079 bfd_boolean check = TRUE;
1080
bb1cb422
L
1081 /* Skip TLS transition for functions. */
1082 if (h != NULL
1083 && (h->type == STT_FUNC
1084 || h->type == STT_GNU_IFUNC))
1085 return TRUE;
1086
142411ca 1087 switch (from_type)
13ae64f3
JJ
1088 {
1089 case R_386_TLS_GD:
67a4f2b7
AO
1090 case R_386_TLS_GOTDESC:
1091 case R_386_TLS_DESC_CALL:
13ae64f3 1092 case R_386_TLS_IE_32:
37e55690
JJ
1093 case R_386_TLS_IE:
1094 case R_386_TLS_GOTIE:
0e1862bb 1095 if (bfd_link_executable (info))
142411ca
L
1096 {
1097 if (h == NULL)
1098 to_type = R_386_TLS_LE_32;
1099 else if (from_type != R_386_TLS_IE
1100 && from_type != R_386_TLS_GOTIE)
1101 to_type = R_386_TLS_IE_32;
1102 }
1103
bedfd056
L
1104 /* When we are called from elf_i386_relocate_section, there may
1105 be additional transitions based on TLS_TYPE. */
1106 if (from_relocate_section)
142411ca
L
1107 {
1108 unsigned int new_to_type = to_type;
1109
51537393 1110 if (TLS_TRANSITION_IE_TO_LE_P (info, h, tls_type))
142411ca
L
1111 new_to_type = R_386_TLS_LE_32;
1112
1113 if (to_type == R_386_TLS_GD
1114 || to_type == R_386_TLS_GOTDESC
1115 || to_type == R_386_TLS_DESC_CALL)
1116 {
1117 if (tls_type == GOT_TLS_IE_POS)
1118 new_to_type = R_386_TLS_GOTIE;
1119 else if (tls_type & GOT_TLS_IE)
1120 new_to_type = R_386_TLS_IE_32;
1121 }
1122
1123 /* We checked the transition before when we were called from
1124 elf_i386_check_relocs. We only want to check the new
1125 transition which hasn't been checked before. */
1126 check = new_to_type != to_type && from_type == to_type;
1127 to_type = new_to_type;
1128 }
1129
1130 break;
1131
13ae64f3 1132 case R_386_TLS_LDM:
0e1862bb 1133 if (bfd_link_executable (info))
142411ca
L
1134 to_type = R_386_TLS_LE_32;
1135 break;
1136
1137 default:
1138 return TRUE;
1139 }
1140
1141 /* Return TRUE if there is no transition. */
1142 if (from_type == to_type)
1143 return TRUE;
1144
1145 /* Check if the transition can be performed. */
1146 if (check
bedfd056 1147 && ! elf_i386_check_tls_transition (sec, contents,
142411ca
L
1148 symtab_hdr, sym_hashes,
1149 from_type, rel, relend))
1150 {
2f629d23 1151 reloc_howto_type *from, *to;
4c544807 1152 const char *name;
142411ca 1153
b366503e
L
1154 from = elf_i386_rtype_to_howto (from_type);
1155 to = elf_i386_rtype_to_howto (to_type);
142411ca 1156
4c544807
L
1157 if (h)
1158 name = h->root.root.string;
1159 else
1160 {
0afcef53 1161 struct elf_x86_link_hash_table *htab;
4dfe6ac6 1162
0afcef53 1163 htab = elf_x86_hash_table (info, I386_ELF_DATA);
4dfe6ac6
NC
1164 if (htab == NULL)
1165 name = "*unknown*";
1166 else
1167 {
1168 Elf_Internal_Sym *isym;
1169
1170 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1171 abfd, r_symndx);
1172 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
1173 }
4c544807
L
1174 }
1175
4eca0228 1176 _bfd_error_handler
695344c0 1177 /* xgettext:c-format */
2dcf00ce
AM
1178 (_("%pB: TLS transition from %s to %s against `%s'"
1179 " at %#" PRIx64 " in section `%pA' failed"),
c08bb8dd 1180 abfd, from->name, to->name, name,
2dcf00ce 1181 (uint64_t) rel->r_offset, sec);
142411ca
L
1182 bfd_set_error (bfd_error_bad_value);
1183 return FALSE;
13ae64f3
JJ
1184 }
1185
142411ca
L
1186 *r_type = to_type;
1187 return TRUE;
13ae64f3
JJ
1188}
1189
c175a657
L
1190/* With the local symbol, foo, we convert
1191 mov foo@GOT[(%reg1)], %reg2
1192 to
1193 lea foo[@GOTOFF(%reg1)], %reg2
1194 and convert
1195 call/jmp *foo@GOT[(%reg)]
1196 to
1197 nop call foo/jmp foo nop
1198 When PIC is false, convert
1199 test %reg1, foo@GOT[(%reg2)]
1200 to
1201 test $foo, %reg1
1202 and convert
1203 binop foo@GOT[(%reg1)], %reg2
1204 to
1205 binop $foo, %reg2
1206 where binop is one of adc, add, and, cmp, or, sbb, sub, xor
1207 instructions. */
1208
1209static
1210bfd_boolean
1211elf_i386_convert_load_reloc (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
1212 bfd_byte *contents,
6999821f 1213 unsigned int *r_type_p,
c175a657
L
1214 Elf_Internal_Rela *irel,
1215 struct elf_link_hash_entry *h,
5e5e02ae 1216 bfd_boolean *converted,
c175a657
L
1217 struct bfd_link_info *link_info)
1218{
0afcef53 1219 struct elf_x86_link_hash_table *htab;
c175a657
L
1220 unsigned int opcode;
1221 unsigned int modrm;
1222 bfd_boolean baseless;
1223 Elf_Internal_Sym *isym;
1224 unsigned int addend;
1225 unsigned int nop;
1226 bfd_vma nop_offset;
1227 bfd_boolean is_pic;
1228 bfd_boolean to_reloc_32;
382aae06 1229 bfd_boolean abs_symbol;
c175a657
L
1230 unsigned int r_type;
1231 unsigned int r_symndx;
1232 bfd_vma roff = irel->r_offset;
0a27fed7
L
1233 bfd_boolean local_ref;
1234 struct elf_x86_link_hash_entry *eh;
c175a657
L
1235
1236 if (roff < 2)
1237 return TRUE;
1238
7d4d9709 1239 /* Addend for R_386_GOT32X relocations must be 0. */
c175a657
L
1240 addend = bfd_get_32 (abfd, contents + roff);
1241 if (addend != 0)
1242 return TRUE;
1243
0afcef53 1244 htab = elf_x86_hash_table (link_info, I386_ELF_DATA);
c175a657
L
1245 is_pic = bfd_link_pic (link_info);
1246
6999821f 1247 r_type = *r_type_p;
c175a657
L
1248 r_symndx = ELF32_R_SYM (irel->r_info);
1249
1250 modrm = bfd_get_8 (abfd, contents + roff - 1);
1251 baseless = (modrm & 0xc7) == 0x5;
1252
382aae06
L
1253 if (h)
1254 {
1255 /* NB: Also set linker_def via SYMBOL_REFERENCES_LOCAL_P. */
1256 local_ref = SYMBOL_REFERENCES_LOCAL_P (link_info, h);
1257 isym = NULL;
1258 abs_symbol = ABS_SYMBOL_P (h);
1259 }
1260 else
1261 {
1262 local_ref = TRUE;
1263 isym = bfd_sym_from_r_symndx (&htab->sym_cache, abfd,
1264 r_symndx);
1265 abs_symbol = isym->st_shndx == SHN_ABS;
1266 }
1267
7d4d9709 1268 if (baseless && is_pic)
c175a657
L
1269 {
1270 /* For PIC, disallow R_386_GOT32X without a base register
7d4d9709 1271 since we don't know what the GOT base is. */
c175a657
L
1272 const char *name;
1273
1274 if (h == NULL)
382aae06 1275 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
c175a657
L
1276 else
1277 name = h->root.root.string;
1278
4eca0228 1279 _bfd_error_handler
695344c0 1280 /* xgettext:c-format */
871b3ab2 1281 (_("%pB: direct GOT relocation R_386_GOT32X against `%s' without base"
63a5468a 1282 " register can not be used when making a shared object"),
c175a657
L
1283 abfd, name);
1284 return FALSE;
1285 }
1286
1287 opcode = bfd_get_8 (abfd, contents + roff - 2);
1288
c175a657
L
1289 /* Convert to R_386_32 if PIC is false or there is no base
1290 register. */
1291 to_reloc_32 = !is_pic || baseless;
1292
0a27fed7
L
1293 eh = elf_x86_hash_entry (h);
1294
7d4d9709
L
1295 /* Try to convert R_386_GOT32X. Get the symbol referred to by the
1296 reloc. */
c175a657
L
1297 if (h == NULL)
1298 {
1299 if (opcode == 0x0ff)
1300 /* Convert "call/jmp *foo@GOT[(%reg)]". */
1301 goto convert_branch;
1302 else
1303 /* Convert "mov foo@GOT[(%reg1)], %reg2",
1304 "test %reg1, foo@GOT(%reg2)" and
1305 "binop foo@GOT[(%reg1)], %reg2". */
1306 goto convert_load;
1307 }
1308
1309 /* Undefined weak symbol is only bound locally in executable
1310 and its reference is resolved as 0. */
0a27fed7
L
1311 if (h->root.type == bfd_link_hash_undefweak
1312 && !eh->linker_def
1313 && local_ref)
c175a657
L
1314 {
1315 if (opcode == 0xff)
1316 {
1317 /* No direct branch to 0 for PIC. */
1318 if (is_pic)
1319 return TRUE;
1320 else
1321 goto convert_branch;
1322 }
1323 else
1324 {
1325 /* We can convert load of address 0 to R_386_32. */
1326 to_reloc_32 = TRUE;
1327 goto convert_load;
1328 }
1329 }
1330
1331 if (opcode == 0xff)
1332 {
1333 /* We have "call/jmp *foo@GOT[(%reg)]". */
1334 if ((h->root.type == bfd_link_hash_defined
1335 || h->root.type == bfd_link_hash_defweak)
0a27fed7 1336 && local_ref)
c175a657
L
1337 {
1338 /* The function is locally defined. */
dc1e8a47 1339 convert_branch:
c175a657
L
1340 /* Convert R_386_GOT32X to R_386_PC32. */
1341 if (modrm == 0x15 || (modrm & 0xf8) == 0x90)
1342 {
1343 /* Convert to "nop call foo". ADDR_PREFIX_OPCODE
1344 is a nop prefix. */
1345 modrm = 0xe8;
6eaa7fb5
L
1346 /* To support TLS optimization, always use addr32 prefix
1347 for "call *___tls_get_addr@GOT(%reg)". */
1d4af308 1348 if (eh && eh->tls_get_addr)
c175a657 1349 {
6eaa7fb5
L
1350 nop = 0x67;
1351 nop_offset = irel->r_offset - 2;
c175a657
L
1352 }
1353 else
6eaa7fb5 1354 {
5b9c07b2
L
1355 nop = htab->params->call_nop_byte;
1356 if (htab->params->call_nop_as_suffix)
6eaa7fb5
L
1357 {
1358 nop_offset = roff + 3;
1359 irel->r_offset -= 1;
1360 }
1361 else
1362 nop_offset = roff - 2;
1363 }
c175a657
L
1364 }
1365 else
1366 {
1367 /* Convert to "jmp foo nop". */
1368 modrm = 0xe9;
1369 nop = NOP_OPCODE;
1370 nop_offset = roff + 3;
1371 irel->r_offset -= 1;
1372 }
1373
1374 bfd_put_8 (abfd, nop, contents + nop_offset);
1375 bfd_put_8 (abfd, modrm, contents + irel->r_offset - 1);
1376 /* When converting to PC-relative relocation, we
1377 need to adjust addend by -4. */
1378 bfd_put_32 (abfd, -4, contents + irel->r_offset);
1379 irel->r_info = ELF32_R_INFO (r_symndx, R_386_PC32);
6999821f 1380 *r_type_p = R_386_PC32;
5e5e02ae 1381 *converted = TRUE;
c175a657
L
1382 }
1383 }
1384 else
1385 {
1386 /* We have "mov foo@GOT[(%re1g)], %reg2",
1387 "test %reg1, foo@GOT(%reg2)" and
1388 "binop foo@GOT[(%reg1)], %reg2".
1389
1390 Avoid optimizing _DYNAMIC since ld.so may use its
1391 link-time address. */
1392 if (h == htab->elf.hdynamic)
1393 return TRUE;
1394
1395 /* def_regular is set by an assignment in a linker script in
cbd0eecf
L
1396 bfd_elf_record_link_assignment. start_stop is set on
1397 __start_SECNAME/__stop_SECNAME which mark section SECNAME. */
1398 if (h->start_stop
0a27fed7 1399 || eh->linker_def
cbd0eecf
L
1400 || ((h->def_regular
1401 || h->root.type == bfd_link_hash_defined
1402 || h->root.type == bfd_link_hash_defweak)
0a27fed7 1403 && local_ref))
c175a657 1404 {
dc1e8a47 1405 convert_load:
c175a657
L
1406 if (opcode == 0x8b)
1407 {
382aae06
L
1408 if (abs_symbol && local_ref)
1409 to_reloc_32 = TRUE;
1410
c175a657
L
1411 if (to_reloc_32)
1412 {
1413 /* Convert "mov foo@GOT[(%reg1)], %reg2" to
1414 "mov $foo, %reg2" with R_386_32. */
1415 r_type = R_386_32;
1416 modrm = 0xc0 | (modrm & 0x38) >> 3;
1417 bfd_put_8 (abfd, modrm, contents + roff - 1);
1418 opcode = 0xc7;
1419 }
1420 else
1421 {
1422 /* Convert "mov foo@GOT(%reg1), %reg2" to
1423 "lea foo@GOTOFF(%reg1), %reg2". */
1424 r_type = R_386_GOTOFF;
1425 opcode = 0x8d;
1426 }
1427 }
1428 else
1429 {
1430 /* Only R_386_32 is supported. */
1431 if (!to_reloc_32)
1432 return TRUE;
1433
1434 if (opcode == 0x85)
1435 {
1436 /* Convert "test %reg1, foo@GOT(%reg2)" to
1437 "test $foo, %reg1". */
1438 modrm = 0xc0 | (modrm & 0x38) >> 3;
1439 opcode = 0xf7;
1440 }
1441 else
1442 {
1443 /* Convert "binop foo@GOT(%reg1), %reg2" to
1444 "binop $foo, %reg2". */
1445 modrm = (0xc0
1446 | (modrm & 0x38) >> 3
1447 | (opcode & 0x3c));
1448 opcode = 0x81;
1449 }
1450 bfd_put_8 (abfd, modrm, contents + roff - 1);
1451 r_type = R_386_32;
1452 }
1453
1454 bfd_put_8 (abfd, opcode, contents + roff - 2);
1455 irel->r_info = ELF32_R_INFO (r_symndx, r_type);
6999821f 1456 *r_type_p = r_type;
5e5e02ae 1457 *converted = TRUE;
c175a657
L
1458 }
1459 }
1460
1461 return TRUE;
1462}
1463
c1d11331
L
1464/* Rename some of the generic section flags to better document how they
1465 are used here. */
6999821f 1466#define check_relocs_failed sec_flg0
c1d11331 1467
252b5132 1468/* Look through the relocs for a section during the first phase, and
0ac8d2ca
AM
1469 calculate needed space in the global offset table, procedure linkage
1470 table, and dynamic reloc sections. */
252b5132 1471
b34976b6 1472static bfd_boolean
55fd94b0
AM
1473elf_i386_check_relocs (bfd *abfd,
1474 struct bfd_link_info *info,
1475 asection *sec,
1476 const Elf_Internal_Rela *relocs)
252b5132 1477{
0afcef53 1478 struct elf_x86_link_hash_table *htab;
252b5132
RH
1479 Elf_Internal_Shdr *symtab_hdr;
1480 struct elf_link_hash_entry **sym_hashes;
252b5132
RH
1481 const Elf_Internal_Rela *rel;
1482 const Elf_Internal_Rela *rel_end;
252b5132 1483 asection *sreloc;
bedfd056 1484 bfd_byte *contents;
5e5e02ae 1485 bfd_boolean converted;
252b5132 1486
0e1862bb 1487 if (bfd_link_relocatable (info))
b34976b6 1488 return TRUE;
252b5132 1489
081b1afe
L
1490 /* Don't do anything special with non-loaded, non-alloced sections.
1491 In particular, any relocs in such sections should not affect GOT
1492 and PLT reference counting (ie. we don't allow them to create GOT
1493 or PLT entries), there's no possibility or desire to optimize TLS
1494 relocs, and there's not much point in propagating relocs to shared
1495 libs that the dynamic linker won't relocate. */
1496 if ((sec->flags & SEC_ALLOC) == 0)
1497 return TRUE;
1498
0afcef53 1499 htab = elf_x86_hash_table (info, I386_ELF_DATA);
4dfe6ac6 1500 if (htab == NULL)
c337a162
L
1501 {
1502 sec->check_relocs_failed = 1;
1503 return FALSE;
1504 }
4dfe6ac6 1505
fe53b4a4
L
1506 BFD_ASSERT (is_x86_elf (abfd, htab));
1507
bedfd056
L
1508 /* Get the section contents. */
1509 if (elf_section_data (sec)->this_hdr.contents != NULL)
1510 contents = elf_section_data (sec)->this_hdr.contents;
1511 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
1512 {
1513 sec->check_relocs_failed = 1;
1514 return FALSE;
1515 }
1516
0ffa91dd 1517 symtab_hdr = &elf_symtab_hdr (abfd);
252b5132 1518 sym_hashes = elf_sym_hashes (abfd);
252b5132 1519
5e5e02ae
L
1520 converted = FALSE;
1521
252b5132
RH
1522 sreloc = NULL;
1523
1524 rel_end = relocs + sec->reloc_count;
1525 for (rel = relocs; rel < rel_end; rel++)
1526 {
13ae64f3 1527 unsigned int r_type;
d42c267e 1528 unsigned int r_symndx;
252b5132 1529 struct elf_link_hash_entry *h;
0afcef53 1530 struct elf_x86_link_hash_entry *eh;
4c544807
L
1531 Elf_Internal_Sym *isym;
1532 const char *name;
06a6a421 1533 bfd_boolean size_reloc;
382aae06 1534 bfd_boolean no_dynreloc;
252b5132
RH
1535
1536 r_symndx = ELF32_R_SYM (rel->r_info);
13ae64f3 1537 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1538
d9bc7a44 1539 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
f5f31454 1540 {
695344c0 1541 /* xgettext:c-format */
871b3ab2 1542 _bfd_error_handler (_("%pB: bad symbol index: %d"),
4eca0228 1543 abfd, r_symndx);
c337a162 1544 goto error_return;
f5f31454
L
1545 }
1546
252b5132 1547 if (r_symndx < symtab_hdr->sh_info)
c25bc9fc
L
1548 {
1549 /* A local symbol. */
c2e61a4e
L
1550 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1551 abfd, r_symndx);
1552 if (isym == NULL)
c337a162 1553 goto error_return;
c25bc9fc
L
1554
1555 /* Check relocation against local STT_GNU_IFUNC symbol. */
c25bc9fc
L
1556 if (ELF32_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1557 {
0afcef53 1558 h = _bfd_elf_x86_get_local_sym_hash (htab, abfd, rel, TRUE);
c25bc9fc 1559 if (h == NULL)
c337a162 1560 goto error_return;
6bbec505 1561
c25bc9fc 1562 /* Fake a STT_GNU_IFUNC symbol. */
6322e5c5
L
1563 h->root.root.string = bfd_elf_sym_name (abfd, symtab_hdr,
1564 isym, NULL);
c25bc9fc
L
1565 h->type = STT_GNU_IFUNC;
1566 h->def_regular = 1;
1567 h->ref_regular = 1;
1568 h->forced_local = 1;
1569 h->root.type = bfd_link_hash_defined;
1570 }
1571 else
1572 h = NULL;
1573 }
252b5132 1574 else
71cb9464 1575 {
4c544807 1576 isym = NULL;
71cb9464
L
1577 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1578 while (h->root.type == bfd_link_hash_indirect
1579 || h->root.type == bfd_link_hash_warning)
1580 h = (struct elf_link_hash_entry *) h->root.u.i.link;
c25bc9fc 1581 }
cbe950e9 1582
0afcef53 1583 eh = (struct elf_x86_link_hash_entry *) h;
c25bc9fc
L
1584 if (h != NULL)
1585 {
f604c2a2
L
1586 if (r_type == R_386_GOTOFF)
1587 eh->gotoff_ref = 1;
cbe950e9 1588
ad1e85de
L
1589 /* It is referenced by a non-shared object. */
1590 h->ref_regular = 1;
71cb9464 1591 }
252b5132 1592
6999821f
L
1593 if (r_type == R_386_GOT32X
1594 && (h == NULL || h->type != STT_GNU_IFUNC))
1595 {
1596 Elf_Internal_Rela *irel = (Elf_Internal_Rela *) rel;
1597 if (!elf_i386_convert_load_reloc (abfd, symtab_hdr, contents,
5e5e02ae
L
1598 &r_type, irel, h,
1599 &converted, info))
6999821f
L
1600 goto error_return;
1601 }
1602
382aae06
L
1603 if (!_bfd_elf_x86_valid_reloc_p (sec, info, htab, rel, h, isym,
1604 symtab_hdr, &no_dynreloc))
1605 return FALSE;
1606
bedfd056 1607 if (! elf_i386_tls_transition (info, abfd, sec, contents,
142411ca
L
1608 symtab_hdr, sym_hashes,
1609 &r_type, GOT_UNKNOWN,
bedfd056 1610 rel, rel_end, h, r_symndx, FALSE))
c337a162 1611 goto error_return;
13ae64f3 1612
cd048363
L
1613 /* Check if _GLOBAL_OFFSET_TABLE_ is referenced. */
1614 if (h == htab->elf.hgot)
1615 htab->got_referenced = TRUE;
1616
13ae64f3 1617 switch (r_type)
252b5132 1618 {
37e55690 1619 case R_386_TLS_LDM:
0f09b4d8 1620 htab->tls_ld_or_ldm_got.refcount = 1;
37e55690
JJ
1621 goto create_got;
1622
1623 case R_386_PLT32:
1624 /* This symbol requires a procedure linkage table entry. We
1625 actually build the entry in adjust_dynamic_symbol,
1626 because this might be a case of linking PIC code which is
1627 never referenced by a dynamic object, in which case we
1628 don't need to generate a procedure linkage table entry
1629 after all. */
1630
1631 /* If this is a local symbol, we resolve it directly without
1632 creating a procedure linkage table entry. */
1633 if (h == NULL)
1634 continue;
1635
98b273dc 1636 eh->zero_undefweak &= 0x2;
f5385ebf 1637 h->needs_plt = 1;
79b0c981 1638 h->plt.refcount = 1;
37e55690
JJ
1639 break;
1640
6a3e1bae 1641 case R_386_SIZE32:
06a6a421 1642 size_reloc = TRUE;
6a3e1bae
L
1643 goto do_size;
1644
13ae64f3 1645 case R_386_TLS_IE_32:
37e55690
JJ
1646 case R_386_TLS_IE:
1647 case R_386_TLS_GOTIE:
0e1862bb 1648 if (!bfd_link_executable (info))
13ae64f3 1649 info->flags |= DF_STATIC_TLS;
37e55690
JJ
1650 /* Fall through */
1651
252b5132 1652 case R_386_GOT32:
02a86693 1653 case R_386_GOT32X:
13ae64f3 1654 case R_386_TLS_GD:
67a4f2b7
AO
1655 case R_386_TLS_GOTDESC:
1656 case R_386_TLS_DESC_CALL:
252b5132 1657 /* This symbol requires a global offset table entry. */
13ae64f3
JJ
1658 {
1659 int tls_type, old_tls_type;
1660
1661 switch (r_type)
1662 {
1663 default:
02a86693
L
1664 case R_386_GOT32:
1665 case R_386_GOT32X:
1666 tls_type = GOT_NORMAL;
1667 break;
13ae64f3 1668 case R_386_TLS_GD: tls_type = GOT_TLS_GD; break;
67a4f2b7
AO
1669 case R_386_TLS_GOTDESC:
1670 case R_386_TLS_DESC_CALL:
1671 tls_type = GOT_TLS_GDESC; break;
37e55690
JJ
1672 case R_386_TLS_IE_32:
1673 if (ELF32_R_TYPE (rel->r_info) == r_type)
1674 tls_type = GOT_TLS_IE_NEG;
1675 else
ebcfb3c0
JJ
1676 /* If this is a GD->IE transition, we may use either of
1677 R_386_TLS_TPOFF and R_386_TLS_TPOFF32. */
37e55690
JJ
1678 tls_type = GOT_TLS_IE;
1679 break;
1680 case R_386_TLS_IE:
1681 case R_386_TLS_GOTIE:
1682 tls_type = GOT_TLS_IE_POS; break;
13ae64f3
JJ
1683 }
1684
1685 if (h != NULL)
1686 {
0f09b4d8 1687 h->got.refcount = 1;
0afcef53 1688 old_tls_type = elf_x86_hash_entry (h)->tls_type;
13ae64f3
JJ
1689 }
1690 else
1691 {
1692 bfd_signed_vma *local_got_refcounts;
1693
1694 /* This is a global offset table entry for a local symbol. */
1695 local_got_refcounts = elf_local_got_refcounts (abfd);
1696 if (local_got_refcounts == NULL)
1697 {
1698 bfd_size_type size;
1699
1700 size = symtab_hdr->sh_info;
67a4f2b7
AO
1701 size *= (sizeof (bfd_signed_vma)
1702 + sizeof (bfd_vma) + sizeof(char));
a50b1753 1703 local_got_refcounts = (bfd_signed_vma *)
07d6d2b8 1704 bfd_zalloc (abfd, size);
13ae64f3 1705 if (local_got_refcounts == NULL)
c337a162 1706 goto error_return;
13ae64f3 1707 elf_local_got_refcounts (abfd) = local_got_refcounts;
0afcef53 1708 elf_x86_local_tlsdesc_gotent (abfd)
67a4f2b7 1709 = (bfd_vma *) (local_got_refcounts + symtab_hdr->sh_info);
0afcef53 1710 elf_x86_local_got_tls_type (abfd)
67a4f2b7 1711 = (char *) (local_got_refcounts + 2 * symtab_hdr->sh_info);
13ae64f3 1712 }
0f09b4d8 1713 local_got_refcounts[r_symndx] = 1;
0afcef53 1714 old_tls_type = elf_x86_local_got_tls_type (abfd) [r_symndx];
13ae64f3
JJ
1715 }
1716
37e55690
JJ
1717 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_IE))
1718 tls_type |= old_tls_type;
13ae64f3
JJ
1719 /* If a TLS symbol is accessed using IE at least once,
1720 there is no point to use dynamic model for it. */
ebcfb3c0 1721 else if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
67a4f2b7 1722 && (! GOT_TLS_GD_ANY_P (old_tls_type)
37e55690 1723 || (tls_type & GOT_TLS_IE) == 0))
13ae64f3 1724 {
67a4f2b7 1725 if ((old_tls_type & GOT_TLS_IE) && GOT_TLS_GD_ANY_P (tls_type))
37e55690 1726 tls_type = old_tls_type;
67a4f2b7
AO
1727 else if (GOT_TLS_GD_ANY_P (old_tls_type)
1728 && GOT_TLS_GD_ANY_P (tls_type))
1729 tls_type |= old_tls_type;
13ae64f3
JJ
1730 else
1731 {
09a24cbf 1732 if (h)
4c544807
L
1733 name = h->root.root.string;
1734 else
1735 name = bfd_elf_sym_name (abfd, symtab_hdr, isym,
1736 NULL);
4eca0228 1737 _bfd_error_handler
695344c0 1738 /* xgettext:c-format */
871b3ab2 1739 (_("%pB: `%s' accessed both as normal and "
55fd94b0 1740 "thread local symbol"),
4c544807 1741 abfd, name);
68c4a57e 1742 bfd_set_error (bfd_error_bad_value);
c337a162 1743 goto error_return;
13ae64f3
JJ
1744 }
1745 }
1746
1747 if (old_tls_type != tls_type)
1748 {
1749 if (h != NULL)
0afcef53 1750 elf_x86_hash_entry (h)->tls_type = tls_type;
13ae64f3 1751 else
0afcef53 1752 elf_x86_local_got_tls_type (abfd) [r_symndx] = tls_type;
13ae64f3
JJ
1753 }
1754 }
0ac8d2ca
AM
1755 /* Fall through */
1756
1757 case R_386_GOTOFF:
1758 case R_386_GOTPC:
dc1e8a47 1759 create_got:
37e55690 1760 if (r_type != R_386_TLS_IE)
aec6b87e
L
1761 {
1762 if (eh != NULL)
cd048363
L
1763 {
1764 eh->zero_undefweak &= 0x2;
1765
1766 /* Need GOT to resolve undefined weak symbol to 0. */
1767 if (r_type == R_386_GOTOFF
1768 && h->root.type == bfd_link_hash_undefweak
1769 && bfd_link_executable (info))
1770 htab->got_referenced = TRUE;
1771 }
aec6b87e
L
1772 break;
1773 }
37e55690 1774 /* Fall through */
252b5132 1775
37e55690
JJ
1776 case R_386_TLS_LE_32:
1777 case R_386_TLS_LE:
aec6b87e 1778 if (eh != NULL)
98b273dc 1779 eh->zero_undefweak &= 0x2;
0e1862bb 1780 if (bfd_link_executable (info))
37e55690 1781 break;
bffbf940 1782 info->flags |= DF_STATIC_TLS;
aec6b87e 1783 goto do_relocation;
252b5132
RH
1784
1785 case R_386_32:
1786 case R_386_PC32:
aec6b87e 1787 if (eh != NULL && (sec->flags & SEC_CODE) != 0)
98b273dc 1788 eh->zero_undefweak |= 0x2;
dc1e8a47 1789 do_relocation:
bf52d7c7
L
1790 /* We are called after all symbols have been resolved. Only
1791 relocation against STT_GNU_IFUNC symbol must go through
1792 PLT. */
d1ed1c7d
L
1793 if (h != NULL
1794 && (bfd_link_executable (info)
bf52d7c7 1795 || h->type == STT_GNU_IFUNC))
6725bdbf 1796 {
79b0c981 1797 bfd_boolean func_pointer_ref = FALSE;
233cc9c1 1798
4b627c18
L
1799 if (r_type == R_386_PC32)
1800 {
1801 /* Since something like ".long foo - ." may be used
1802 as pointer, make sure that PLT is used if foo is
1803 a function defined in a shared library. */
1804 if ((sec->flags & SEC_CODE) == 0)
1805 h->pointer_equality_needed = 1;
74437ea2
L
1806 else if (h->type == STT_GNU_IFUNC
1807 && bfd_link_pic (info))
1808 {
6322e5c5
L
1809 _bfd_error_handler
1810 /* xgettext:c-format */
871b3ab2 1811 (_("%pB: unsupported non-PIC call to IFUNC `%s'"),
6322e5c5 1812 abfd, h->root.root.string);
74437ea2
L
1813 bfd_set_error (bfd_error_bad_value);
1814 goto error_return;
1815 }
4b627c18
L
1816 }
1817 else
04ebc307
L
1818 {
1819 h->pointer_equality_needed = 1;
1820 /* R_386_32 can be resolved at run-time. */
1821 if (r_type == R_386_32
1822 && (sec->flags & SEC_READONLY) == 0)
79b0c981
L
1823 func_pointer_ref = TRUE;
1824 }
1825
1826 if (!func_pointer_ref)
1827 {
1828 /* If this reloc is in a read-only section, we might
1829 need a copy reloc. We can't check reliably at this
1830 stage whether the section is read-only, as input
1831 sections have not yet been mapped to output sections.
1832 Tentatively set the flag for now, and correct in
1833 adjust_dynamic_symbol. */
1834 h->non_got_ref = 1;
1835
1836 /* We may need a .plt entry if the symbol is a function
1837 defined in a shared lib or is a function referenced
1838 from the code or read-only section. */
1839 if (!h->def_regular
1840 || (sec->flags & (SEC_CODE | SEC_READONLY)) != 0)
1841 h->plt.refcount = 1;
04ebc307 1842 }
6725bdbf 1843 }
7843f00e 1844
06a6a421 1845 size_reloc = FALSE;
dc1e8a47 1846 do_size:
382aae06
L
1847 if (!no_dynreloc
1848 && NEED_DYNAMIC_RELOCATION_P (info, FALSE, h, sec, r_type,
1849 R_386_32))
252b5132 1850 {
e03a8ed8
L
1851 struct elf_dyn_relocs *p;
1852 struct elf_dyn_relocs **head;
ec338859 1853
12d0ee4a
AM
1854 /* We must copy these reloc types into the output file.
1855 Create a reloc section in dynobj and make room for
1856 this reloc. */
252b5132
RH
1857 if (sreloc == NULL)
1858 {
83bac4b0
NC
1859 sreloc = _bfd_elf_make_dynamic_reloc_section
1860 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ FALSE);
1861
252b5132 1862 if (sreloc == NULL)
c337a162 1863 goto error_return;
252b5132
RH
1864 }
1865
0c715baa
AM
1866 /* If this is a global symbol, we count the number of
1867 relocations we need for this symbol. */
1868 if (h != NULL)
252b5132 1869 {
190eb1dd 1870 head = &h->dyn_relocs;
0c715baa
AM
1871 }
1872 else
1873 {
ec338859
AM
1874 /* Track dynamic relocs needed for local syms too.
1875 We really need local syms available to do this
1876 easily. Oh well. */
87d72d41 1877 void **vpp;
ec338859 1878 asection *s;
87d72d41
AM
1879
1880 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1881 abfd, r_symndx);
1882 if (isym == NULL)
c337a162 1883 goto error_return;
87d72d41
AM
1884
1885 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
ec338859 1886 if (s == NULL)
87d72d41 1887 s = sec;
ec338859 1888
e81d3500 1889 vpp = &elf_section_data (s)->local_dynrel;
e03a8ed8 1890 head = (struct elf_dyn_relocs **)vpp;
ec338859
AM
1891 }
1892
1893 p = *head;
1894 if (p == NULL || p->sec != sec)
1895 {
986f0783 1896 size_t amt = sizeof *p;
a50b1753 1897 p = (struct elf_dyn_relocs *) bfd_alloc (htab->elf.dynobj,
07d6d2b8 1898 amt);
ec338859 1899 if (p == NULL)
c337a162 1900 goto error_return;
ec338859
AM
1901 p->next = *head;
1902 *head = p;
1903 p->sec = sec;
1904 p->count = 0;
1905 p->pc_count = 0;
252b5132 1906 }
ec338859
AM
1907
1908 p->count += 1;
06a6a421
L
1909 /* Count size relocation as PC-relative relocation. */
1910 if (r_type == R_386_PC32 || size_reloc)
ec338859 1911 p->pc_count += 1;
252b5132 1912 }
252b5132
RH
1913 break;
1914
1915 /* This relocation describes the C++ object vtable hierarchy.
1916 Reconstruct it for later use during GC. */
1917 case R_386_GNU_VTINHERIT:
d17e0c6e 1918 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
c337a162 1919 goto error_return;
252b5132
RH
1920 break;
1921
1922 /* This relocation describes which C++ vtable entries are actually
1923 used. Record for later use during GC. */
1924 case R_386_GNU_VTENTRY:
a0ea3a14 1925 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_offset))
c337a162 1926 goto error_return;
252b5132
RH
1927 break;
1928
1929 default:
1930 break;
1931 }
1932 }
1933
bedfd056
L
1934 if (elf_section_data (sec)->this_hdr.contents != contents)
1935 {
5e5e02ae 1936 if (!converted && !info->keep_memory)
bedfd056
L
1937 free (contents);
1938 else
1939 {
5e5e02ae
L
1940 /* Cache the section contents for elf_link_input_bfd if any
1941 load is converted or --no-keep-memory isn't used. */
bedfd056
L
1942 elf_section_data (sec)->this_hdr.contents = contents;
1943 }
1944 }
1945
5e5e02ae
L
1946 /* Cache relocations if any load is converted. */
1947 if (elf_section_data (sec)->relocs != relocs && converted)
1948 elf_section_data (sec)->relocs = (Elf_Internal_Rela *) relocs;
1949
b34976b6 1950 return TRUE;
c337a162 1951
dc1e8a47 1952 error_return:
bedfd056
L
1953 if (elf_section_data (sec)->this_hdr.contents != contents)
1954 free (contents);
c337a162
L
1955 sec->check_relocs_failed = 1;
1956 return FALSE;
252b5132
RH
1957}
1958
38701953
AM
1959/* Set the correct type for an x86 ELF section. We do this by the
1960 section name, which is a hack, but ought to work. */
1961
b34976b6 1962static bfd_boolean
55fd94b0
AM
1963elf_i386_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1964 Elf_Internal_Shdr *hdr,
1965 asection *sec)
38701953 1966{
91d6fa6a 1967 const char *name;
38701953 1968
fd361982 1969 name = bfd_section_name (sec);
38701953
AM
1970
1971 /* This is an ugly, but unfortunately necessary hack that is
1972 needed when producing EFI binaries on x86. It tells
1973 elf.c:elf_fake_sections() not to consider ".reloc" as a section
1974 containing ELF relocation info. We need this hack in order to
1975 be able to generate ELF binaries that can be translated into
1976 EFI applications (which are essentially COFF objects). Those
1977 files contain a COFF ".reloc" section inside an ELFNN object,
1978 which would normally cause BFD to segfault because it would
1979 attempt to interpret this section as containing relocation
1980 entries for section "oc". With this hack enabled, ".reloc"
1981 will be treated as a normal data section, which will avoid the
1982 segfault. However, you won't be able to create an ELFNN binary
1983 with a section named "oc" that needs relocations, but that's
1984 the kind of ugly side-effects you get when detecting section
1985 types based on their names... In practice, this limitation is
1986 unlikely to bite. */
1987 if (strcmp (name, ".reloc") == 0)
1988 hdr->sh_type = SHT_PROGBITS;
1989
b34976b6 1990 return TRUE;
38701953
AM
1991}
1992
13ae64f3
JJ
1993/* Return the relocation value for @tpoff relocation
1994 if STT_TLS virtual address is ADDRESS. */
1995
1996static bfd_vma
eb4ff4d6 1997elf_i386_tpoff (struct bfd_link_info *info, bfd_vma address)
13ae64f3 1998{
e1918d23 1999 struct elf_link_hash_table *htab = elf_hash_table (info);
7dc98aea
RO
2000 const struct elf_backend_data *bed = get_elf_backend_data (info->output_bfd);
2001 bfd_vma static_tls_size;
13ae64f3 2002
e1918d23
AM
2003 /* If tls_sec is NULL, we should have signalled an error already. */
2004 if (htab->tls_sec == NULL)
6a30718d 2005 return 0;
7dc98aea
RO
2006
2007 /* Consider special static TLS alignment requirements. */
2008 static_tls_size = BFD_ALIGN (htab->tls_size, bed->static_tls_alignment);
2009 return static_tls_size + htab->tls_sec->vma - address;
13ae64f3
JJ
2010}
2011
252b5132
RH
2012/* Relocate an i386 ELF section. */
2013
b34976b6 2014static bfd_boolean
55fd94b0
AM
2015elf_i386_relocate_section (bfd *output_bfd,
2016 struct bfd_link_info *info,
2017 bfd *input_bfd,
2018 asection *input_section,
2019 bfd_byte *contents,
2020 Elf_Internal_Rela *relocs,
2021 Elf_Internal_Sym *local_syms,
2022 asection **local_sections)
252b5132 2023{
0afcef53 2024 struct elf_x86_link_hash_table *htab;
252b5132
RH
2025 Elf_Internal_Shdr *symtab_hdr;
2026 struct elf_link_hash_entry **sym_hashes;
2027 bfd_vma *local_got_offsets;
67a4f2b7 2028 bfd_vma *local_tlsdesc_gotents;
252b5132 2029 Elf_Internal_Rela *rel;
60f2e42e 2030 Elf_Internal_Rela *wrel;
252b5132 2031 Elf_Internal_Rela *relend;
3348747a 2032 bfd_boolean is_vxworks_tls;
25e762b9 2033 unsigned plt_entry_size;
252b5132 2034
c337a162
L
2035 /* Skip if check_relocs failed. */
2036 if (input_section->check_relocs_failed)
2037 return FALSE;
2038
0afcef53 2039 htab = elf_x86_hash_table (info, I386_ELF_DATA);
4dfe6ac6
NC
2040 if (htab == NULL)
2041 return FALSE;
fe53b4a4 2042
7af5d5c4
AM
2043 if (!is_x86_elf (input_bfd, htab))
2044 {
2045 bfd_set_error (bfd_error_wrong_format);
2046 return FALSE;
2047 }
fe53b4a4 2048
0ffa91dd 2049 symtab_hdr = &elf_symtab_hdr (input_bfd);
252b5132
RH
2050 sym_hashes = elf_sym_hashes (input_bfd);
2051 local_got_offsets = elf_local_got_offsets (input_bfd);
0afcef53 2052 local_tlsdesc_gotents = elf_x86_local_tlsdesc_gotent (input_bfd);
3348747a
NS
2053 /* We have to handle relocations in vxworks .tls_vars sections
2054 specially, because the dynamic loader is 'weird'. */
851b6fa1 2055 is_vxworks_tls = (htab->target_os == is_vxworks
07d6d2b8 2056 && bfd_link_pic (info)
3348747a
NS
2057 && !strcmp (input_section->output_section->name,
2058 ".tls_vars"));
252b5132 2059
0afcef53 2060 _bfd_x86_elf_set_tls_module_base (info);
9f03412a 2061
765e526c 2062 plt_entry_size = htab->plt.plt_entry_size;
25e762b9 2063
60f2e42e 2064 rel = wrel = relocs;
252b5132 2065 relend = relocs + input_section->reloc_count;
60f2e42e 2066 for (; rel < relend; wrel++, rel++)
252b5132 2067 {
419414ea 2068 unsigned int r_type, r_type_tls;
252b5132
RH
2069 reloc_howto_type *howto;
2070 unsigned long r_symndx;
2071 struct elf_link_hash_entry *h;
0afcef53 2072 struct elf_x86_link_hash_entry *eh;
252b5132
RH
2073 Elf_Internal_Sym *sym;
2074 asection *sec;
dd7e64d4 2075 bfd_vma off, offplt, plt_offset;
252b5132 2076 bfd_vma relocation;
b34976b6 2077 bfd_boolean unresolved_reloc;
252b5132 2078 bfd_reloc_status_type r;
1b452ec6 2079 unsigned int indx;
13ae64f3 2080 int tls_type;
1788fc08 2081 bfd_vma st_size;
dd7e64d4 2082 asection *resolved_plt;
aec6b87e 2083 bfd_boolean resolved_to_zero;
e133d005 2084 bfd_boolean relative_reloc;
252b5132
RH
2085
2086 r_type = ELF32_R_TYPE (rel->r_info);
55fd94b0
AM
2087 if (r_type == R_386_GNU_VTINHERIT
2088 || r_type == R_386_GNU_VTENTRY)
18954b29
L
2089 {
2090 if (wrel != rel)
2091 *wrel = *rel;
2092 continue;
2093 }
dc47f327 2094
b366503e 2095 howto = elf_i386_rtype_to_howto (r_type);
76268e02 2096 if (howto == NULL)
47aeb64c
NC
2097 return _bfd_unrecognized_reloc (input_bfd, input_section, r_type);
2098
252b5132 2099 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132
RH
2100 h = NULL;
2101 sym = NULL;
2102 sec = NULL;
b34976b6 2103 unresolved_reloc = FALSE;
252b5132
RH
2104 if (r_symndx < symtab_hdr->sh_info)
2105 {
2106 sym = local_syms + r_symndx;
2107 sec = local_sections[r_symndx];
2108 relocation = (sec->output_section->vma
2109 + sec->output_offset
2110 + sym->st_value);
1788fc08 2111 st_size = sym->st_size;
ab96bf03
AM
2112
2113 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION
2114 && ((sec->flags & SEC_MERGE) != 0
0e1862bb 2115 || (bfd_link_relocatable (info)
ab96bf03 2116 && sec->output_offset != 0)))
f8df10f4 2117 {
f8df10f4 2118 bfd_vma addend;
4a335f3d 2119 bfd_byte *where = contents + rel->r_offset;
f8df10f4 2120
4a335f3d 2121 switch (howto->size)
f8df10f4 2122 {
4a335f3d
AM
2123 case 0:
2124 addend = bfd_get_8 (input_bfd, where);
2125 if (howto->pc_relative)
2126 {
2127 addend = (addend ^ 0x80) - 0x80;
2128 addend += 1;
2129 }
2130 break;
2131 case 1:
2132 addend = bfd_get_16 (input_bfd, where);
2133 if (howto->pc_relative)
2134 {
2135 addend = (addend ^ 0x8000) - 0x8000;
2136 addend += 2;
2137 }
2138 break;
2139 case 2:
2140 addend = bfd_get_32 (input_bfd, where);
2141 if (howto->pc_relative)
2142 {
2143 addend = (addend ^ 0x80000000) - 0x80000000;
2144 addend += 4;
2145 }
2146 break;
2147 default:
2148 abort ();
f8df10f4
JJ
2149 }
2150
0e1862bb 2151 if (bfd_link_relocatable (info))
ab96bf03
AM
2152 addend += sec->output_offset;
2153 else
2154 {
2155 asection *msec = sec;
2156 addend = _bfd_elf_rel_local_sym (output_bfd, sym, &msec,
2157 addend);
2158 addend -= relocation;
2159 addend += msec->output_section->vma + msec->output_offset;
2160 }
4a335f3d
AM
2161
2162 switch (howto->size)
2163 {
2164 case 0:
16a10388 2165 /* FIXME: overflow checks. */
4a335f3d
AM
2166 if (howto->pc_relative)
2167 addend -= 1;
2168 bfd_put_8 (input_bfd, addend, where);
4a335f3d
AM
2169 break;
2170 case 1:
2171 if (howto->pc_relative)
2172 addend -= 2;
2173 bfd_put_16 (input_bfd, addend, where);
4a335f3d
AM
2174 break;
2175 case 2:
2176 if (howto->pc_relative)
2177 addend -= 4;
2178 bfd_put_32 (input_bfd, addend, where);
2179 break;
2180 }
f8df10f4 2181 }
0e1862bb 2182 else if (!bfd_link_relocatable (info)
1f85278f 2183 && ELF32_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
c25bc9fc
L
2184 {
2185 /* Relocate against local STT_GNU_IFUNC symbol. */
0afcef53
L
2186 h = _bfd_elf_x86_get_local_sym_hash (htab, input_bfd, rel,
2187 FALSE);
c25bc9fc
L
2188 if (h == NULL)
2189 abort ();
2190
23209a78 2191 /* Set STT_GNU_IFUNC symbol value. */
c25bc9fc
L
2192 h->root.u.def.value = sym->st_value;
2193 h->root.u.def.section = sec;
2194 }
252b5132
RH
2195 }
2196 else
2197 {
3d540e93 2198 bfd_boolean warned ATTRIBUTE_UNUSED;
62d887d4 2199 bfd_boolean ignored ATTRIBUTE_UNUSED;
ffb2e45b 2200
b2a8e766
AM
2201 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2202 r_symndx, symtab_hdr, sym_hashes,
2203 h, sec, relocation,
62d887d4 2204 unresolved_reloc, warned, ignored);
1788fc08 2205 st_size = h->size;
252b5132
RH
2206 }
2207
dbaa2011 2208 if (sec != NULL && discarded_section (sec))
60f2e42e
L
2209 {
2210 _bfd_clear_contents (howto, input_bfd, input_section,
0930cb30 2211 contents, rel->r_offset);
60f2e42e
L
2212 wrel->r_offset = rel->r_offset;
2213 wrel->r_info = 0;
2214 wrel->r_addend = 0;
2215
2216 /* For ld -r, remove relocations in debug sections against
2217 sections defined in discarded sections. Not done for
2218 eh_frame editing code expects to be present. */
2219 if (bfd_link_relocatable (info)
2220 && (input_section->flags & SEC_DEBUGGING))
2221 wrel--;
2222
2223 continue;
2224 }
9635fe29 2225
0e1862bb 2226 if (bfd_link_relocatable (info))
2d5da473
L
2227 {
2228 if (wrel != rel)
2229 *wrel = *rel;
2230 continue;
2231 }
ab96bf03 2232
0afcef53 2233 eh = (struct elf_x86_link_hash_entry *) h;
ee2fdd6f 2234
cbe950e9
L
2235 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle
2236 it here if it is defined in a non-shared object. */
2237 if (h != NULL
2238 && h->type == STT_GNU_IFUNC
2239 && h->def_regular)
2240 {
ee2fdd6f 2241 asection *gotplt, *base_got;
cbe950e9 2242 bfd_vma plt_index;
4c544807 2243 const char *name;
cbe950e9 2244
97dc35c8
L
2245 if ((input_section->flags & SEC_ALLOC) == 0)
2246 {
347a8774
L
2247 /* If this is a SHT_NOTE section without SHF_ALLOC, treat
2248 STT_GNU_IFUNC symbol as STT_FUNC. */
2249 if (elf_section_type (input_section) == SHT_NOTE)
2250 goto skip_ifunc;
97dc35c8
L
2251 /* Dynamic relocs are not propagated for SEC_DEBUGGING
2252 sections because such sections are not SEC_ALLOC and
2253 thus ld.so will not process them. */
2254 if ((input_section->flags & SEC_DEBUGGING) != 0)
0eace210 2255 continue;
97dc35c8
L
2256 abort ();
2257 }
cbe950e9
L
2258
2259 /* STT_GNU_IFUNC symbol must go through PLT. */
6de2ae4a 2260 if (htab->elf.splt != NULL)
cbe950e9 2261 {
ee2fdd6f
L
2262 if (htab->plt_second != NULL)
2263 {
2264 resolved_plt = htab->plt_second;
2265 plt_offset = eh->plt_second.offset;
2266 }
2267 else
2268 {
2269 resolved_plt = htab->elf.splt;
2270 plt_offset = h->plt.offset;
2271 }
6de2ae4a 2272 gotplt = htab->elf.sgotplt;
cbe950e9
L
2273 }
2274 else
2275 {
ee2fdd6f
L
2276 resolved_plt = htab->elf.iplt;
2277 plt_offset = h->plt.offset;
6de2ae4a 2278 gotplt = htab->elf.igotplt;
cbe950e9
L
2279 }
2280
cbe950e9
L
2281 switch (r_type)
2282 {
2283 default:
233cc9c1 2284 break;
cbe950e9
L
2285
2286 case R_386_GOT32:
02a86693 2287 case R_386_GOT32X:
6de2ae4a 2288 base_got = htab->elf.sgot;
cbe950e9
L
2289 off = h->got.offset;
2290
7afd84dc 2291 if (base_got == NULL)
cbe950e9
L
2292 abort ();
2293
7afd84dc 2294 if (off == (bfd_vma) -1)
cbe950e9 2295 {
7afd84dc
L
2296 /* We can't use h->got.offset here to save state, or
2297 even just remember the offset, as finish_dynamic_symbol
2298 would use that as offset into .got. */
6bbec505 2299
233cc9c1
L
2300 if (h->plt.offset == (bfd_vma) -1)
2301 abort ();
2302
6de2ae4a 2303 if (htab->elf.splt != NULL)
7afd84dc 2304 {
f604c2a2 2305 plt_index = (h->plt.offset / plt_entry_size
765e526c 2306 - htab->plt.has_plt0);
7afd84dc 2307 off = (plt_index + 3) * 4;
6de2ae4a 2308 base_got = htab->elf.sgotplt;
7afd84dc 2309 }
cbe950e9
L
2310 else
2311 {
25e762b9 2312 plt_index = h->plt.offset / plt_entry_size;
7afd84dc 2313 off = plt_index * 4;
6de2ae4a 2314 base_got = htab->elf.igotplt;
7afd84dc
L
2315 }
2316
2317 if (h->dynindx == -1
2318 || h->forced_local
2319 || info->symbolic)
2320 {
2321 /* This references the local defitionion. We must
2322 initialize this entry in the global offset table.
2323 Since the offset must always be a multiple of 8,
2324 we use the least significant bit to record
2325 whether we have initialized it already.
2326
2327 When doing a dynamic link, we create a .rela.got
2328 relocation entry to initialize the value. This
2329 is done in the finish_dynamic_symbol routine. */
2330 if ((off & 1) != 0)
2331 off &= ~1;
2332 else
2333 {
2334 bfd_put_32 (output_bfd, relocation,
2335 base_got->contents + off);
2336 h->got.offset |= 1;
2337 }
cbe950e9 2338 }
cbe950e9 2339
7afd84dc 2340 relocation = off;
7afd84dc
L
2341 }
2342 else
ca8c86ef
L
2343 relocation = (base_got->output_section->vma
2344 + base_got->output_offset + off
2345 - gotplt->output_section->vma
2346 - gotplt->output_offset);
2347
2a568401
L
2348 if (rel->r_offset > 1
2349 && (*(contents + rel->r_offset - 1) & 0xc7) == 0x5
2350 && *(contents + rel->r_offset - 2) != 0x8d)
712ec279
L
2351 {
2352 if (bfd_link_pic (info))
2353 goto disallow_got32;
2354
2355 /* Add the GOT base if there is no base register. */
2356 relocation += (gotplt->output_section->vma
2357 + gotplt->output_offset);
2358 }
2359 else if (htab->elf.splt == NULL)
2360 {
2361 /* Adjust for static executables. */
2362 relocation += gotplt->output_offset;
2363 }
0018b0a3 2364
cbe950e9 2365 goto do_relocation;
233cc9c1
L
2366 }
2367
2368 if (h->plt.offset == (bfd_vma) -1)
2369 {
2370 /* Handle static pointers of STT_GNU_IFUNC symbols. */
2371 if (r_type == R_386_32
2372 && (input_section->flags & SEC_CODE) == 0)
2373 goto do_ifunc_pointer;
2374 goto bad_ifunc_reloc;
2375 }
2376
ee2fdd6f
L
2377 relocation = (resolved_plt->output_section->vma
2378 + resolved_plt->output_offset + plt_offset);
233cc9c1
L
2379
2380 switch (r_type)
2381 {
2382 default:
dc1e8a47 2383 bad_ifunc_reloc:
233cc9c1
L
2384 if (h->root.root.string)
2385 name = h->root.root.string;
2386 else
2387 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2388 NULL);
4eca0228 2389 _bfd_error_handler
695344c0 2390 /* xgettext:c-format */
871b3ab2 2391 (_("%pB: relocation %s against STT_GNU_IFUNC "
233cc9c1
L
2392 "symbol `%s' isn't supported"), input_bfd,
2393 howto->name, name);
2394 bfd_set_error (bfd_error_bad_value);
2395 return FALSE;
2396
2397 case R_386_32:
2398 /* Generate dynamic relcoation only when there is a
2399 non-GOT reference in a shared object. */
2400 if ((bfd_link_pic (info) && h->non_got_ref)
2401 || h->plt.offset == (bfd_vma) -1)
2402 {
2403 Elf_Internal_Rela outrel;
2404 asection *sreloc;
2405 bfd_vma offset;
2406
dc1e8a47 2407 do_ifunc_pointer:
233cc9c1
L
2408 /* Need a dynamic relocation to get the real function
2409 adddress. */
2410 offset = _bfd_elf_section_offset (output_bfd,
2411 info,
2412 input_section,
2413 rel->r_offset);
2414 if (offset == (bfd_vma) -1
2415 || offset == (bfd_vma) -2)
2416 abort ();
2417
2418 outrel.r_offset = (input_section->output_section->vma
2419 + input_section->output_offset
2420 + offset);
2421
cf1070f1 2422 if (POINTER_LOCAL_IFUNC_P (info, h))
233cc9c1 2423 {
871b3ab2 2424 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
6322e5c5
L
2425 h->root.root.string,
2426 h->root.u.def.section->owner);
2427
233cc9c1
L
2428 /* This symbol is resolved locally. */
2429 outrel.r_info = ELF32_R_INFO (0, R_386_IRELATIVE);
2430 bfd_put_32 (output_bfd,
2431 (h->root.u.def.value
2432 + h->root.u.def.section->output_section->vma
2433 + h->root.u.def.section->output_offset),
2434 contents + offset);
2435 }
2436 else
2437 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2438
2439 /* Dynamic relocations are stored in
2440 1. .rel.ifunc section in PIC object.
2441 2. .rel.got section in dynamic executable.
2442 3. .rel.iplt section in static executable. */
2443 if (bfd_link_pic (info))
2444 sreloc = htab->elf.irelifunc;
2445 else if (htab->elf.splt != NULL)
2446 sreloc = htab->elf.srelgot;
2447 else
2448 sreloc = htab->elf.irelplt;
2449 elf_append_rel (output_bfd, sreloc, &outrel);
2450
2451 /* If this reloc is against an external symbol, we
2452 do not want to fiddle with the addend. Otherwise,
2453 we need to include the symbol value so that it
2454 becomes an addend for the dynamic reloc. For an
2455 internal symbol, we have updated addend. */
2456 continue;
2457 }
2458 /* FALLTHROUGH */
2459 case R_386_PC32:
2460 case R_386_PLT32:
2461 goto do_relocation;
cbe950e9
L
2462
2463 case R_386_GOTOFF:
2464 relocation -= (gotplt->output_section->vma
2465 + gotplt->output_offset);
2466 goto do_relocation;
2467 }
2468 }
2469
dc1e8a47 2470 skip_ifunc:
aec6b87e 2471 resolved_to_zero = (eh != NULL
c5bce5c6 2472 && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh));
aec6b87e 2473
252b5132
RH
2474 switch (r_type)
2475 {
02a86693 2476 case R_386_GOT32X:
252b5132
RH
2477 case R_386_GOT32:
2478 /* Relocation is to the entry for this symbol in the global
2479 offset table. */
6de2ae4a 2480 if (htab->elf.sgot == NULL)
ffb2e45b 2481 abort ();
252b5132 2482
e133d005 2483 relative_reloc = FALSE;
252b5132
RH
2484 if (h != NULL)
2485 {
252b5132 2486 off = h->got.offset;
2eba97c2 2487 if (RESOLVED_LOCALLY_P (info, h, htab))
252b5132 2488 {
2eba97c2
L
2489 /* We must initialize this entry in the global offset
2490 table. Since the offset must always be a multiple
2491 of 4, we use the least significant bit to record
2492 whether we have initialized it already.
252b5132
RH
2493
2494 When doing a dynamic link, we create a .rel.got
2495 relocation entry to initialize the value. This
2496 is done in the finish_dynamic_symbol routine. */
2497 if ((off & 1) != 0)
2498 off &= ~1;
2499 else
2500 {
2501 bfd_put_32 (output_bfd, relocation,
6de2ae4a 2502 htab->elf.sgot->contents + off);
252b5132 2503 h->got.offset |= 1;
e133d005 2504
f70656b2 2505 if (GENERATE_RELATIVE_RELOC_P (info, h))
e133d005
L
2506 {
2507 /* PR ld/21402: If this symbol isn't dynamic
0dc9a308 2508 in PIC, generate R_386_RELATIVE here. */
e133d005
L
2509 eh->no_finish_dynamic_symbol = 1;
2510 relative_reloc = TRUE;
2511 }
252b5132
RH
2512 }
2513 }
8c694914 2514 else
b34976b6 2515 unresolved_reloc = FALSE;
252b5132
RH
2516 }
2517 else
2518 {
ffb2e45b
AM
2519 if (local_got_offsets == NULL)
2520 abort ();
252b5132
RH
2521
2522 off = local_got_offsets[r_symndx];
2523
2524 /* The offset must always be a multiple of 4. We use
83be169b
AM
2525 the least significant bit to record whether we have
2526 already generated the necessary reloc. */
252b5132
RH
2527 if ((off & 1) != 0)
2528 off &= ~1;
2529 else
2530 {
6725bdbf 2531 bfd_put_32 (output_bfd, relocation,
6de2ae4a 2532 htab->elf.sgot->contents + off);
e133d005 2533 local_got_offsets[r_symndx] |= 1;
252b5132 2534
0e1862bb 2535 if (bfd_link_pic (info))
e133d005 2536 relative_reloc = TRUE;
252b5132 2537 }
252b5132
RH
2538 }
2539
e133d005
L
2540 if (relative_reloc)
2541 {
2542 asection *s;
2543 Elf_Internal_Rela outrel;
2544
2545 s = htab->elf.srelgot;
2546 if (s == NULL)
2547 abort ();
2548
2549 outrel.r_offset = (htab->elf.sgot->output_section->vma
2550 + htab->elf.sgot->output_offset
2551 + off);
2552 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
2553 elf_append_rel (output_bfd, s, &outrel);
2554 }
2555
ffb2e45b
AM
2556 if (off >= (bfd_vma) -2)
2557 abort ();
2558
74d7f0aa
L
2559 relocation = (htab->elf.sgot->output_section->vma
2560 + htab->elf.sgot->output_offset + off);
2a568401
L
2561 if (rel->r_offset > 1
2562 && (*(contents + rel->r_offset - 1) & 0xc7) == 0x5
2563 && *(contents + rel->r_offset - 2) != 0x8d)
74d7f0aa
L
2564 {
2565 if (bfd_link_pic (info))
2566 {
2567 /* For PIC, disallow R_386_GOT32 without a base
2a568401
L
2568 register, except for "lea foo@GOT, %reg", since
2569 we don't know what the GOT base is. */
74d7f0aa
L
2570 const char *name;
2571
dc1e8a47 2572 disallow_got32:
a5def14f 2573 if (h == NULL || h->root.root.string == NULL)
74d7f0aa
L
2574 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2575 NULL);
2576 else
2577 name = h->root.root.string;
2578
4eca0228 2579 _bfd_error_handler
695344c0 2580 /* xgettext:c-format */
871b3ab2 2581 (_("%pB: direct GOT relocation %s against `%s'"
63a5468a
AM
2582 " without base register can not be used"
2583 " when making a shared object"),
712ec279 2584 input_bfd, howto->name, name);
74d7f0aa
L
2585 bfd_set_error (bfd_error_bad_value);
2586 return FALSE;
2587 }
2588 }
2589 else
2590 {
2591 /* Subtract the .got.plt section address only with a base
2592 register. */
2593 relocation -= (htab->elf.sgotplt->output_section->vma
2594 + htab->elf.sgotplt->output_offset);
2595 }
2596
252b5132
RH
2597 break;
2598
2599 case R_386_GOTOFF:
2600 /* Relocation is relative to the start of the global offset
2601 table. */
2602
3d949995
L
2603 /* Check to make sure it isn't a protected function or data
2604 symbol for shared library since it may not be local when
2605 used as function address or with copy relocation. We also
e3c0e327 2606 need to make sure that a symbol is referenced locally. */
0e1862bb 2607 if (!bfd_link_executable (info) && h)
90f487df 2608 {
41bed6dd
L
2609 if (!h->def_regular)
2610 {
2611 const char *v;
2612
2613 switch (ELF_ST_VISIBILITY (h->other))
2614 {
2615 case STV_HIDDEN:
2616 v = _("hidden symbol");
2617 break;
2618 case STV_INTERNAL:
2619 v = _("internal symbol");
2620 break;
2621 case STV_PROTECTED:
2622 v = _("protected symbol");
2623 break;
2624 default:
2625 v = _("symbol");
2626 break;
2627 }
2628
4eca0228 2629 _bfd_error_handler
695344c0 2630 /* xgettext:c-format */
871b3ab2 2631 (_("%pB: relocation R_386_GOTOFF against undefined %s"
63a5468a 2632 " `%s' can not be used when making a shared object"),
41bed6dd
L
2633 input_bfd, v, h->root.root.string);
2634 bfd_set_error (bfd_error_bad_value);
2635 return FALSE;
2636 }
6999821f 2637 else if (!SYMBOL_REFERENCES_LOCAL_P (info, h)
3d949995
L
2638 && (h->type == STT_FUNC
2639 || h->type == STT_OBJECT)
41bed6dd
L
2640 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
2641 {
4eca0228 2642 _bfd_error_handler
695344c0 2643 /* xgettext:c-format */
871b3ab2 2644 (_("%pB: relocation R_386_GOTOFF against protected %s"
63a5468a 2645 " `%s' can not be used when making a shared object"),
3d949995
L
2646 input_bfd,
2647 h->type == STT_FUNC ? "function" : "data",
2648 h->root.root.string);
41bed6dd
L
2649 bfd_set_error (bfd_error_bad_value);
2650 return FALSE;
2651 }
90f487df
L
2652 }
2653
8c37241b
JJ
2654 /* Note that sgot is not involved in this
2655 calculation. We always want the start of .got.plt. If we
2656 defined _GLOBAL_OFFSET_TABLE_ in a different way, as is
252b5132
RH
2657 permitted by the ABI, we might have to change this
2658 calculation. */
6de2ae4a
L
2659 relocation -= htab->elf.sgotplt->output_section->vma
2660 + htab->elf.sgotplt->output_offset;
252b5132
RH
2661 break;
2662
2663 case R_386_GOTPC:
2664 /* Use global offset table as symbol value. */
6de2ae4a
L
2665 relocation = htab->elf.sgotplt->output_section->vma
2666 + htab->elf.sgotplt->output_offset;
b34976b6 2667 unresolved_reloc = FALSE;
252b5132
RH
2668 break;
2669
2670 case R_386_PLT32:
2671 /* Relocation is to the entry for this symbol in the
2672 procedure linkage table. */
2673
dd5724d5 2674 /* Resolve a PLT32 reloc against a local symbol directly,
83be169b 2675 without using the procedure linkage table. */
252b5132
RH
2676 if (h == NULL)
2677 break;
2678
dd7e64d4
L
2679 if ((h->plt.offset == (bfd_vma) -1
2680 && eh->plt_got.offset == (bfd_vma) -1)
6de2ae4a 2681 || htab->elf.splt == NULL)
252b5132
RH
2682 {
2683 /* We didn't make a PLT entry for this symbol. This
83be169b
AM
2684 happens when statically linking PIC code, or when
2685 using -Bsymbolic. */
252b5132
RH
2686 break;
2687 }
2688
dd7e64d4
L
2689 if (h->plt.offset != (bfd_vma) -1)
2690 {
ee2fdd6f
L
2691 if (htab->plt_second != NULL)
2692 {
2693 resolved_plt = htab->plt_second;
2694 plt_offset = eh->plt_second.offset;
2695 }
2696 else
2697 {
2698 resolved_plt = htab->elf.splt;
2699 plt_offset = h->plt.offset;
2700 }
dd7e64d4
L
2701 }
2702 else
2703 {
2704 resolved_plt = htab->plt_got;
2705 plt_offset = eh->plt_got.offset;
2706 }
2707
2708 relocation = (resolved_plt->output_section->vma
2709 + resolved_plt->output_offset
2710 + plt_offset);
b34976b6 2711 unresolved_reloc = FALSE;
252b5132
RH
2712 break;
2713
1788fc08 2714 case R_386_SIZE32:
1788fc08
L
2715 /* Set to symbol size. */
2716 relocation = st_size;
2717 /* Fall through. */
2718
252b5132
RH
2719 case R_386_32:
2720 case R_386_PC32:
3348747a
NS
2721 if ((input_section->flags & SEC_ALLOC) == 0
2722 || is_vxworks_tls)
ec338859
AM
2723 break;
2724
382aae06 2725 if (GENERATE_DYNAMIC_RELOCATION_P (info, eh, r_type, sec,
aebcc8ff
L
2726 FALSE, resolved_to_zero,
2727 (r_type == R_386_PC32)))
252b5132 2728 {
947216bf 2729 Elf_Internal_Rela outrel;
b34976b6 2730 bfd_boolean skip, relocate;
0c715baa 2731 asection *sreloc;
252b5132
RH
2732
2733 /* When generating a shared object, these relocations
2734 are copied into the output file to be resolved at run
2735 time. */
2736
b34976b6
AM
2737 skip = FALSE;
2738 relocate = FALSE;
252b5132 2739
c629eae0
JJ
2740 outrel.r_offset =
2741 _bfd_elf_section_offset (output_bfd, info, input_section,
2742 rel->r_offset);
2743 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2744 skip = TRUE;
0bb2d96a 2745 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2746 skip = TRUE, relocate = TRUE;
252b5132
RH
2747 outrel.r_offset += (input_section->output_section->vma
2748 + input_section->output_offset);
2749
2750 if (skip)
0bb2d96a 2751 memset (&outrel, 0, sizeof outrel);
e74399c4 2752 else if (COPY_INPUT_RELOC_P (info, h, r_type))
0bb2d96a 2753 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
252b5132
RH
2754 else
2755 {
5a15f56f 2756 /* This symbol is local, or marked to become local. */
b34976b6 2757 relocate = TRUE;
5a15f56f 2758 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
252b5132
RH
2759 }
2760
cbe950e9 2761 sreloc = elf_section_data (input_section)->sreloc;
e7c33416 2762
62d78908
L
2763 if (sreloc == NULL || sreloc->contents == NULL)
2764 {
2765 r = bfd_reloc_notsupported;
2766 goto check_relocation_error;
2767 }
0c715baa 2768
59d6ffb2 2769 elf_append_rel (output_bfd, sreloc, &outrel);
252b5132
RH
2770
2771 /* If this reloc is against an external symbol, we do
2772 not want to fiddle with the addend. Otherwise, we
2773 need to include the symbol value so that it becomes
2774 an addend for the dynamic reloc. */
0f88be7a 2775 if (! relocate)
252b5132
RH
2776 continue;
2777 }
252b5132
RH
2778 break;
2779
37e55690 2780 case R_386_TLS_IE:
0e1862bb 2781 if (!bfd_link_executable (info))
37e55690 2782 {
947216bf 2783 Elf_Internal_Rela outrel;
37e55690 2784 asection *sreloc;
37e55690
JJ
2785
2786 outrel.r_offset = rel->r_offset
2787 + input_section->output_section->vma
2788 + input_section->output_offset;
2789 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
2790 sreloc = elf_section_data (input_section)->sreloc;
2791 if (sreloc == NULL)
2792 abort ();
59d6ffb2 2793 elf_append_rel (output_bfd, sreloc, &outrel);
37e55690
JJ
2794 }
2795 /* Fall through */
2796
13ae64f3 2797 case R_386_TLS_GD:
67a4f2b7
AO
2798 case R_386_TLS_GOTDESC:
2799 case R_386_TLS_DESC_CALL:
13ae64f3 2800 case R_386_TLS_IE_32:
37e55690 2801 case R_386_TLS_GOTIE:
13ae64f3
JJ
2802 tls_type = GOT_UNKNOWN;
2803 if (h == NULL && local_got_offsets)
0afcef53 2804 tls_type = elf_x86_local_got_tls_type (input_bfd) [r_symndx];
13ae64f3 2805 else if (h != NULL)
0afcef53 2806 tls_type = elf_x86_hash_entry(h)->tls_type;
37e55690
JJ
2807 if (tls_type == GOT_TLS_IE)
2808 tls_type = GOT_TLS_IE_NEG;
142411ca 2809
419414ea 2810 r_type_tls = r_type;
142411ca
L
2811 if (! elf_i386_tls_transition (info, input_bfd,
2812 input_section, contents,
2813 symtab_hdr, sym_hashes,
419414ea 2814 &r_type_tls, tls_type, rel,
bedfd056 2815 relend, h, r_symndx, TRUE))
142411ca 2816 return FALSE;
13ae64f3 2817
419414ea 2818 if (r_type_tls == R_386_TLS_LE_32)
13ae64f3 2819 {
82e51918 2820 BFD_ASSERT (! unresolved_reloc);
419414ea 2821 if (r_type == R_386_TLS_GD)
13ae64f3 2822 {
142411ca 2823 unsigned int type;
13ae64f3
JJ
2824 bfd_vma roff;
2825
2826 /* GD->LE transition. */
6eaa7fb5 2827 type = *(contents + rel->r_offset - 2);
13ae64f3
JJ
2828 if (type == 0x04)
2829 {
6eaa7fb5
L
2830 /* Change
2831 leal foo@tlsgd(,%ebx,1), %eax
2832 call ___tls_get_addr@PLT
2833 into:
2834 movl %gs:0, %eax
2835 subl $foo@tpoff, %eax
13ae64f3 2836 (6 byte form of subl). */
142411ca 2837 roff = rel->r_offset + 5;
13ae64f3
JJ
2838 }
2839 else
2840 {
6eaa7fb5
L
2841 /* Change
2842 leal foo@tlsgd(%ebx), %eax
2843 call ___tls_get_addr@PLT
2844 nop
2845 or
2846 leal foo@tlsgd(%reg), %eax
2847 call *___tls_get_addr@GOT(%reg)
2848 which may be converted to
2849 addr32 call ___tls_get_addr
2850 into:
2851 movl %gs:0, %eax; subl $foo@tpoff, %eax
142411ca 2852 (6 byte form of subl). */
142411ca 2853 roff = rel->r_offset + 6;
13ae64f3 2854 }
6eaa7fb5
L
2855 memcpy (contents + roff - 8,
2856 "\x65\xa1\0\0\0\0\x81\xe8\0\0\0", 12);
eb4ff4d6 2857 bfd_put_32 (output_bfd, elf_i386_tpoff (info, relocation),
13ae64f3 2858 contents + roff);
6eaa7fb5 2859 /* Skip R_386_PC32, R_386_PLT32 and R_386_GOT32X. */
13ae64f3 2860 rel++;
60f2e42e 2861 wrel++;
13ae64f3
JJ
2862 continue;
2863 }
419414ea 2864 else if (r_type == R_386_TLS_GOTDESC)
67a4f2b7
AO
2865 {
2866 /* GDesc -> LE transition.
2867 It's originally something like:
2868 leal x@tlsdesc(%ebx), %eax
2869
2870 leal x@ntpoff, %eax
2871
2872 Registers other than %eax may be set up here. */
2873
142411ca 2874 unsigned int val;
67a4f2b7
AO
2875 bfd_vma roff;
2876
67a4f2b7 2877 roff = rel->r_offset;
67a4f2b7 2878 val = bfd_get_8 (input_bfd, contents + roff - 1);
67a4f2b7
AO
2879
2880 /* Now modify the instruction as appropriate. */
2881 /* aoliva FIXME: remove the above and xor the byte
2882 below with 0x86. */
2883 bfd_put_8 (output_bfd, val ^ 0x86,
2884 contents + roff - 1);
eb4ff4d6 2885 bfd_put_32 (output_bfd, -elf_i386_tpoff (info, relocation),
67a4f2b7
AO
2886 contents + roff);
2887 continue;
2888 }
419414ea 2889 else if (r_type == R_386_TLS_DESC_CALL)
67a4f2b7
AO
2890 {
2891 /* GDesc -> LE transition.
2892 It's originally:
2893 call *(%eax)
2894 Turn it into:
142411ca 2895 xchg %ax,%ax */
67a4f2b7 2896
67a4f2b7 2897 bfd_vma roff;
6bbec505 2898
67a4f2b7 2899 roff = rel->r_offset;
10efb593 2900 bfd_put_8 (output_bfd, 0x66, contents + roff);
67a4f2b7
AO
2901 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
2902 continue;
2903 }
419414ea 2904 else if (r_type == R_386_TLS_IE)
13ae64f3 2905 {
142411ca 2906 unsigned int val;
13ae64f3
JJ
2907
2908 /* IE->LE transition:
37e55690
JJ
2909 Originally it can be one of:
2910 movl foo, %eax
2911 movl foo, %reg
2912 addl foo, %reg
2913 We change it into:
2914 movl $foo, %eax
2915 movl $foo, %reg
2916 addl $foo, %reg. */
37e55690 2917 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
37e55690
JJ
2918 if (val == 0xa1)
2919 {
2920 /* movl foo, %eax. */
55fd94b0
AM
2921 bfd_put_8 (output_bfd, 0xb8,
2922 contents + rel->r_offset - 1);
37e55690 2923 }
299bf759 2924 else
37e55690 2925 {
142411ca
L
2926 unsigned int type;
2927
55fd94b0
AM
2928 type = bfd_get_8 (input_bfd,
2929 contents + rel->r_offset - 2);
299bf759 2930 switch (type)
26e41594 2931 {
299bf759
L
2932 case 0x8b:
2933 /* movl */
299bf759
L
2934 bfd_put_8 (output_bfd, 0xc7,
2935 contents + rel->r_offset - 2);
2936 bfd_put_8 (output_bfd,
2937 0xc0 | ((val >> 3) & 7),
2938 contents + rel->r_offset - 1);
2939 break;
2940 case 0x03:
2941 /* addl */
299bf759
L
2942 bfd_put_8 (output_bfd, 0x81,
2943 contents + rel->r_offset - 2);
2944 bfd_put_8 (output_bfd,
2945 0xc0 | ((val >> 3) & 7),
2946 contents + rel->r_offset - 1);
2947 break;
2948 default:
2949 BFD_FAIL ();
2950 break;
26e41594 2951 }
37e55690 2952 }
eb4ff4d6 2953 bfd_put_32 (output_bfd, -elf_i386_tpoff (info, relocation),
37e55690
JJ
2954 contents + rel->r_offset);
2955 continue;
2956 }
2957 else
2958 {
2959 unsigned int val, type;
2960
2961 /* {IE_32,GOTIE}->LE transition:
2962 Originally it can be one of:
13ae64f3 2963 subl foo(%reg1), %reg2
13ae64f3 2964 movl foo(%reg1), %reg2
37e55690 2965 addl foo(%reg1), %reg2
13ae64f3
JJ
2966 We change it into:
2967 subl $foo, %reg2
37e55690
JJ
2968 movl $foo, %reg2 (6 byte form)
2969 addl $foo, %reg2. */
13ae64f3
JJ
2970 type = bfd_get_8 (input_bfd, contents + rel->r_offset - 2);
2971 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
13ae64f3
JJ
2972 if (type == 0x8b)
2973 {
2974 /* movl */
13ae64f3
JJ
2975 bfd_put_8 (output_bfd, 0xc7,
2976 contents + rel->r_offset - 2);
2977 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
2978 contents + rel->r_offset - 1);
2979 }
2980 else if (type == 0x2b)
2981 {
2982 /* subl */
13ae64f3
JJ
2983 bfd_put_8 (output_bfd, 0x81,
2984 contents + rel->r_offset - 2);
2985 bfd_put_8 (output_bfd, 0xe8 | ((val >> 3) & 7),
2986 contents + rel->r_offset - 1);
2987 }
37e55690
JJ
2988 else if (type == 0x03)
2989 {
2990 /* addl */
2991 bfd_put_8 (output_bfd, 0x81,
2992 contents + rel->r_offset - 2);
2993 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
2994 contents + rel->r_offset - 1);
2995 }
13ae64f3
JJ
2996 else
2997 BFD_FAIL ();
419414ea 2998 if (r_type == R_386_TLS_GOTIE)
eb4ff4d6 2999 bfd_put_32 (output_bfd, -elf_i386_tpoff (info, relocation),
37e55690
JJ
3000 contents + rel->r_offset);
3001 else
eb4ff4d6 3002 bfd_put_32 (output_bfd, elf_i386_tpoff (info, relocation),
37e55690 3003 contents + rel->r_offset);
13ae64f3
JJ
3004 continue;
3005 }
3006 }
3007
6de2ae4a 3008 if (htab->elf.sgot == NULL)
13ae64f3
JJ
3009 abort ();
3010
3011 if (h != NULL)
67a4f2b7
AO
3012 {
3013 off = h->got.offset;
0afcef53 3014 offplt = elf_x86_hash_entry (h)->tlsdesc_got;
67a4f2b7 3015 }
13ae64f3
JJ
3016 else
3017 {
3018 if (local_got_offsets == NULL)
3019 abort ();
3020
3021 off = local_got_offsets[r_symndx];
67a4f2b7 3022 offplt = local_tlsdesc_gotents[r_symndx];
13ae64f3
JJ
3023 }
3024
3025 if ((off & 1) != 0)
3026 off &= ~1;
26e41594 3027 else
13ae64f3 3028 {
947216bf 3029 Elf_Internal_Rela outrel;
91d6fa6a 3030 int dr_type;
67a4f2b7 3031 asection *sreloc;
13ae64f3 3032
6de2ae4a 3033 if (htab->elf.srelgot == NULL)
13ae64f3
JJ
3034 abort ();
3035
67a4f2b7
AO
3036 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3037
3038 if (GOT_TLS_GDESC_P (tls_type))
3039 {
59d6ffb2 3040 bfd_byte *loc;
67a4f2b7
AO
3041 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_DESC);
3042 BFD_ASSERT (htab->sgotplt_jump_table_size + offplt + 8
6de2ae4a
L
3043 <= htab->elf.sgotplt->size);
3044 outrel.r_offset = (htab->elf.sgotplt->output_section->vma
3045 + htab->elf.sgotplt->output_offset
67a4f2b7
AO
3046 + offplt
3047 + htab->sgotplt_jump_table_size);
6de2ae4a 3048 sreloc = htab->elf.srelplt;
67a4f2b7 3049 loc = sreloc->contents;
765e526c 3050 loc += (htab->next_tls_desc_index++
5ae0bfb6 3051 * sizeof (Elf32_External_Rel));
67a4f2b7 3052 BFD_ASSERT (loc + sizeof (Elf32_External_Rel)
c3b02097 3053 <= sreloc->contents + sreloc->size);
67a4f2b7
AO
3054 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
3055 if (indx == 0)
3056 {
3057 BFD_ASSERT (! unresolved_reloc);
3058 bfd_put_32 (output_bfd,
0afcef53 3059 relocation - _bfd_x86_elf_dtpoff_base (info),
6de2ae4a 3060 htab->elf.sgotplt->contents + offplt
67a4f2b7
AO
3061 + htab->sgotplt_jump_table_size + 4);
3062 }
3063 else
3064 {
3065 bfd_put_32 (output_bfd, 0,
6de2ae4a 3066 htab->elf.sgotplt->contents + offplt
67a4f2b7
AO
3067 + htab->sgotplt_jump_table_size + 4);
3068 }
3069 }
3070
6de2ae4a 3071 sreloc = htab->elf.srelgot;
67a4f2b7 3072
6de2ae4a
L
3073 outrel.r_offset = (htab->elf.sgot->output_section->vma
3074 + htab->elf.sgot->output_offset + off);
13ae64f3 3075
67a4f2b7 3076 if (GOT_TLS_GD_P (tls_type))
13ae64f3 3077 dr_type = R_386_TLS_DTPMOD32;
67a4f2b7
AO
3078 else if (GOT_TLS_GDESC_P (tls_type))
3079 goto dr_done;
37e55690
JJ
3080 else if (tls_type == GOT_TLS_IE_POS)
3081 dr_type = R_386_TLS_TPOFF;
13ae64f3
JJ
3082 else
3083 dr_type = R_386_TLS_TPOFF32;
67a4f2b7 3084
37e55690 3085 if (dr_type == R_386_TLS_TPOFF && indx == 0)
eb4ff4d6 3086 bfd_put_32 (output_bfd,
0afcef53 3087 relocation - _bfd_x86_elf_dtpoff_base (info),
6de2ae4a 3088 htab->elf.sgot->contents + off);
37e55690 3089 else if (dr_type == R_386_TLS_TPOFF32 && indx == 0)
23209a78 3090 bfd_put_32 (output_bfd,
0afcef53 3091 _bfd_x86_elf_dtpoff_base (info) - relocation,
6de2ae4a 3092 htab->elf.sgot->contents + off);
67a4f2b7 3093 else if (dr_type != R_386_TLS_DESC)
c366c25e 3094 bfd_put_32 (output_bfd, 0,
6de2ae4a 3095 htab->elf.sgot->contents + off);
13ae64f3 3096 outrel.r_info = ELF32_R_INFO (indx, dr_type);
67a4f2b7 3097
59d6ffb2 3098 elf_append_rel (output_bfd, sreloc, &outrel);
13ae64f3 3099
67a4f2b7 3100 if (GOT_TLS_GD_P (tls_type))
13ae64f3
JJ
3101 {
3102 if (indx == 0)
3103 {
07d6d2b8 3104 BFD_ASSERT (! unresolved_reloc);
13ae64f3 3105 bfd_put_32 (output_bfd,
0afcef53 3106 relocation - _bfd_x86_elf_dtpoff_base (info),
6de2ae4a 3107 htab->elf.sgot->contents + off + 4);
13ae64f3
JJ
3108 }
3109 else
3110 {
3111 bfd_put_32 (output_bfd, 0,
6de2ae4a 3112 htab->elf.sgot->contents + off + 4);
13ae64f3
JJ
3113 outrel.r_info = ELF32_R_INFO (indx,
3114 R_386_TLS_DTPOFF32);
3115 outrel.r_offset += 4;
59d6ffb2 3116 elf_append_rel (output_bfd, sreloc, &outrel);
13ae64f3
JJ
3117 }
3118 }
37e55690
JJ
3119 else if (tls_type == GOT_TLS_IE_BOTH)
3120 {
3121 bfd_put_32 (output_bfd,
eb4ff4d6 3122 (indx == 0
0afcef53 3123 ? relocation - _bfd_x86_elf_dtpoff_base (info)
eb4ff4d6 3124 : 0),
6de2ae4a 3125 htab->elf.sgot->contents + off + 4);
37e55690
JJ
3126 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF);
3127 outrel.r_offset += 4;
59d6ffb2 3128 elf_append_rel (output_bfd, sreloc, &outrel);
37e55690 3129 }
13ae64f3 3130
67a4f2b7 3131 dr_done:
13ae64f3
JJ
3132 if (h != NULL)
3133 h->got.offset |= 1;
3134 else
3135 local_got_offsets[r_symndx] |= 1;
3136 }
3137
67a4f2b7
AO
3138 if (off >= (bfd_vma) -2
3139 && ! GOT_TLS_GDESC_P (tls_type))
13ae64f3 3140 abort ();
419414ea
L
3141 if (r_type_tls == R_386_TLS_GOTDESC
3142 || r_type_tls == R_386_TLS_DESC_CALL)
67a4f2b7
AO
3143 {
3144 relocation = htab->sgotplt_jump_table_size + offplt;
3145 unresolved_reloc = FALSE;
3146 }
419414ea 3147 else if (r_type_tls == r_type)
13ae64f3 3148 {
6de2ae4a
L
3149 bfd_vma g_o_t = htab->elf.sgotplt->output_section->vma
3150 + htab->elf.sgotplt->output_offset;
3151 relocation = htab->elf.sgot->output_section->vma
3152 + htab->elf.sgot->output_offset + off - g_o_t;
37e55690
JJ
3153 if ((r_type == R_386_TLS_IE || r_type == R_386_TLS_GOTIE)
3154 && tls_type == GOT_TLS_IE_BOTH)
3155 relocation += 4;
3156 if (r_type == R_386_TLS_IE)
8c37241b 3157 relocation += g_o_t;
b34976b6 3158 unresolved_reloc = FALSE;
13ae64f3 3159 }
419414ea 3160 else if (r_type == R_386_TLS_GD)
13ae64f3
JJ
3161 {
3162 unsigned int val, type;
3163 bfd_vma roff;
3164
3165 /* GD->IE transition. */
6eaa7fb5
L
3166 type = *(contents + rel->r_offset - 2);
3167 val = *(contents + rel->r_offset - 1);
13ae64f3
JJ
3168 if (type == 0x04)
3169 {
6eaa7fb5
L
3170 /* Change
3171 leal foo@tlsgd(,%ebx,1), %eax
3172 call ___tls_get_addr@PLT
3173 into:
3174 movl %gs:0, %eax
3175 subl $foo@gottpoff(%ebx), %eax. */
13ae64f3 3176 val >>= 3;
142411ca 3177 roff = rel->r_offset - 3;
13ae64f3
JJ
3178 }
3179 else
3180 {
6eaa7fb5
L
3181 /* Change
3182 leal foo@tlsgd(%ebx), %eax
3183 call ___tls_get_addr@PLT
3184 nop
3185 or
3186 leal foo@tlsgd(%reg), %eax
3187 call *___tls_get_addr@GOT(%reg)
3188 which may be converted to
3189 addr32 call ___tls_get_addr
3190 into:
3191 movl %gs:0, %eax;
3192 subl $foo@gottpoff(%reg), %eax. */
13ae64f3
JJ
3193 roff = rel->r_offset - 2;
3194 }
3195 memcpy (contents + roff,
3196 "\x65\xa1\0\0\0\0\x2b\x80\0\0\0", 12);
3197 contents[roff + 7] = 0x80 | (val & 7);
37e55690
JJ
3198 /* If foo is used only with foo@gotntpoff(%reg) and
3199 foo@indntpoff, but not with foo@gottpoff(%reg), change
3200 subl $foo@gottpoff(%reg), %eax
3201 into:
3202 addl $foo@gotntpoff(%reg), %eax. */
ebcfb3c0
JJ
3203 if (tls_type == GOT_TLS_IE_POS)
3204 contents[roff + 6] = 0x03;
8c37241b 3205 bfd_put_32 (output_bfd,
6de2ae4a
L
3206 htab->elf.sgot->output_section->vma
3207 + htab->elf.sgot->output_offset + off
3208 - htab->elf.sgotplt->output_section->vma
3209 - htab->elf.sgotplt->output_offset,
13ae64f3 3210 contents + roff + 8);
6eaa7fb5 3211 /* Skip R_386_PLT32 and R_386_GOT32X. */
13ae64f3 3212 rel++;
60f2e42e 3213 wrel++;
13ae64f3
JJ
3214 continue;
3215 }
419414ea 3216 else if (r_type == R_386_TLS_GOTDESC)
67a4f2b7
AO
3217 {
3218 /* GDesc -> IE transition.
3219 It's originally something like:
3220 leal x@tlsdesc(%ebx), %eax
3221
3222 Change it to:
142411ca 3223 movl x@gotntpoff(%ebx), %eax # before xchg %ax,%ax
67a4f2b7
AO
3224 or:
3225 movl x@gottpoff(%ebx), %eax # before negl %eax
3226
3227 Registers other than %eax may be set up here. */
3228
67a4f2b7
AO
3229 bfd_vma roff;
3230
3231 /* First, make sure it's a leal adding ebx to a 32-bit
3232 offset into any register, although it's probably
3233 almost always going to be eax. */
3234 roff = rel->r_offset;
67a4f2b7
AO
3235
3236 /* Now modify the instruction as appropriate. */
3237 /* To turn a leal into a movl in the form we use it, it
3238 suffices to change the first byte from 0x8d to 0x8b.
3239 aoliva FIXME: should we decide to keep the leal, all
3240 we have to do is remove the statement below, and
3241 adjust the relaxation of R_386_TLS_DESC_CALL. */
3242 bfd_put_8 (output_bfd, 0x8b, contents + roff - 2);
3243
3244 if (tls_type == GOT_TLS_IE_BOTH)
3245 off += 4;
3246
3247 bfd_put_32 (output_bfd,
6de2ae4a
L
3248 htab->elf.sgot->output_section->vma
3249 + htab->elf.sgot->output_offset + off
3250 - htab->elf.sgotplt->output_section->vma
3251 - htab->elf.sgotplt->output_offset,
67a4f2b7
AO
3252 contents + roff);
3253 continue;
3254 }
419414ea 3255 else if (r_type == R_386_TLS_DESC_CALL)
67a4f2b7
AO
3256 {
3257 /* GDesc -> IE transition.
3258 It's originally:
3259 call *(%eax)
3260
3261 Change it to:
142411ca 3262 xchg %ax,%ax
67a4f2b7
AO
3263 or
3264 negl %eax
3265 depending on how we transformed the TLS_GOTDESC above.
3266 */
3267
67a4f2b7
AO
3268 bfd_vma roff;
3269
67a4f2b7 3270 roff = rel->r_offset;
67a4f2b7
AO
3271
3272 /* Now modify the instruction as appropriate. */
3273 if (tls_type != GOT_TLS_IE_NEG)
3274 {
10efb593
L
3275 /* xchg %ax,%ax */
3276 bfd_put_8 (output_bfd, 0x66, contents + roff);
67a4f2b7
AO
3277 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3278 }
3279 else
3280 {
3281 /* negl %eax */
3282 bfd_put_8 (output_bfd, 0xf7, contents + roff);
3283 bfd_put_8 (output_bfd, 0xd8, contents + roff + 1);
3284 }
3285
3286 continue;
3287 }
3288 else
3289 BFD_ASSERT (FALSE);
13ae64f3
JJ
3290 break;
3291
3292 case R_386_TLS_LDM:
142411ca
L
3293 if (! elf_i386_tls_transition (info, input_bfd,
3294 input_section, contents,
3295 symtab_hdr, sym_hashes,
3296 &r_type, GOT_UNKNOWN, rel,
bedfd056 3297 relend, h, r_symndx, TRUE))
142411ca 3298 return FALSE;
13ae64f3 3299
142411ca
L
3300 if (r_type != R_386_TLS_LDM)
3301 {
6eaa7fb5
L
3302 /* LD->LE transition. Change
3303 leal foo@tlsldm(%ebx) %eax
3304 call ___tls_get_addr@PLT
3305 into:
3306 movl %gs:0, %eax
3307 nop
3308 leal 0(%esi,1), %esi
3309 or change
3310 leal foo@tlsldm(%reg) %eax
3311 call *___tls_get_addr@GOT(%reg)
3312 which may be converted to
3313 addr32 call ___tls_get_addr
3314 into:
3315 movl %gs:0, %eax
3316 leal 0(%esi), %esi */
142411ca 3317 BFD_ASSERT (r_type == R_386_TLS_LE_32);
6eaa7fb5
L
3318 if (*(contents + rel->r_offset + 4) == 0xff
3319 || *(contents + rel->r_offset + 4) == 0x67)
3320 memcpy (contents + rel->r_offset - 2,
3321 "\x65\xa1\0\0\0\0\x8d\xb6\0\0\0", 12);
3322 else
3323 memcpy (contents + rel->r_offset - 2,
3324 "\x65\xa1\0\0\0\0\x90\x8d\x74\x26", 11);
a3fadc9a 3325 /* Skip R_386_PC32/R_386_PLT32. */
13ae64f3 3326 rel++;
60f2e42e 3327 wrel++;
13ae64f3
JJ
3328 continue;
3329 }
3330
6de2ae4a 3331 if (htab->elf.sgot == NULL)
13ae64f3
JJ
3332 abort ();
3333
0afcef53 3334 off = htab->tls_ld_or_ldm_got.offset;
13ae64f3
JJ
3335 if (off & 1)
3336 off &= ~1;
3337 else
3338 {
947216bf 3339 Elf_Internal_Rela outrel;
13ae64f3 3340
6de2ae4a 3341 if (htab->elf.srelgot == NULL)
13ae64f3
JJ
3342 abort ();
3343
6de2ae4a
L
3344 outrel.r_offset = (htab->elf.sgot->output_section->vma
3345 + htab->elf.sgot->output_offset + off);
13ae64f3
JJ
3346
3347 bfd_put_32 (output_bfd, 0,
6de2ae4a 3348 htab->elf.sgot->contents + off);
13ae64f3 3349 bfd_put_32 (output_bfd, 0,
6de2ae4a 3350 htab->elf.sgot->contents + off + 4);
13ae64f3 3351 outrel.r_info = ELF32_R_INFO (0, R_386_TLS_DTPMOD32);
59d6ffb2 3352 elf_append_rel (output_bfd, htab->elf.srelgot, &outrel);
0afcef53 3353 htab->tls_ld_or_ldm_got.offset |= 1;
13ae64f3 3354 }
6de2ae4a
L
3355 relocation = htab->elf.sgot->output_section->vma
3356 + htab->elf.sgot->output_offset + off
3357 - htab->elf.sgotplt->output_section->vma
3358 - htab->elf.sgotplt->output_offset;
b34976b6 3359 unresolved_reloc = FALSE;
13ae64f3
JJ
3360 break;
3361
3362 case R_386_TLS_LDO_32:
0e1862bb
L
3363 if (!bfd_link_executable (info)
3364 || (input_section->flags & SEC_CODE) == 0)
0afcef53 3365 relocation -= _bfd_x86_elf_dtpoff_base (info);
13ae64f3
JJ
3366 else
3367 /* When converting LDO to LE, we must negate. */
eb4ff4d6 3368 relocation = -elf_i386_tpoff (info, relocation);
13ae64f3
JJ
3369 break;
3370
3371 case R_386_TLS_LE_32:
13ae64f3 3372 case R_386_TLS_LE:
0e1862bb 3373 if (!bfd_link_executable (info))
37e55690 3374 {
947216bf 3375 Elf_Internal_Rela outrel;
37e55690 3376 asection *sreloc;
37e55690
JJ
3377
3378 outrel.r_offset = rel->r_offset
3379 + input_section->output_section->vma
3380 + input_section->output_offset;
3381 if (h != NULL && h->dynindx != -1)
3382 indx = h->dynindx;
3383 else
3384 indx = 0;
3385 if (r_type == R_386_TLS_LE_32)
3386 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF32);
3387 else
3388 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF);
3389 sreloc = elf_section_data (input_section)->sreloc;
3390 if (sreloc == NULL)
3391 abort ();
59d6ffb2 3392 elf_append_rel (output_bfd, sreloc, &outrel);
37e55690
JJ
3393 if (indx)
3394 continue;
3395 else if (r_type == R_386_TLS_LE_32)
0afcef53 3396 relocation = _bfd_x86_elf_dtpoff_base (info) - relocation;
37e55690 3397 else
0afcef53 3398 relocation -= _bfd_x86_elf_dtpoff_base (info);
37e55690
JJ
3399 }
3400 else if (r_type == R_386_TLS_LE_32)
eb4ff4d6 3401 relocation = elf_i386_tpoff (info, relocation);
37e55690 3402 else
eb4ff4d6 3403 relocation = -elf_i386_tpoff (info, relocation);
13ae64f3
JJ
3404 break;
3405
252b5132
RH
3406 default:
3407 break;
3408 }
3409
239e1f3a
AM
3410 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3411 because such sections are not SEC_ALLOC and thus ld.so will
3412 not process them. */
8c694914 3413 if (unresolved_reloc
239e1f3a 3414 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
3415 && h->def_dynamic)
3416 && _bfd_elf_section_offset (output_bfd, info, input_section,
3417 rel->r_offset) != (bfd_vma) -1)
6a30718d 3418 {
4eca0228 3419 _bfd_error_handler
695344c0 3420 /* xgettext:c-format */
2dcf00ce 3421 (_("%pB(%pA+%#" PRIx64 "): unresolvable %s relocation against symbol `%s'"),
d003868e
AM
3422 input_bfd,
3423 input_section,
2dcf00ce 3424 (uint64_t) rel->r_offset,
843fe662 3425 howto->name,
6a30718d 3426 h->root.root.string);
b34976b6 3427 return FALSE;
6a30718d 3428 }
83be169b 3429
dc1e8a47 3430 do_relocation:
252b5132
RH
3431 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3432 contents, rel->r_offset,
55fd94b0 3433 relocation, 0);
252b5132 3434
dc1e8a47 3435 check_relocation_error:
cf5c0c5b 3436 if (r != bfd_reloc_ok)
252b5132 3437 {
cf5c0c5b 3438 const char *name;
ffb2e45b 3439
cf5c0c5b
AM
3440 if (h != NULL)
3441 name = h->root.root.string;
3442 else
3443 {
3444 name = bfd_elf_string_from_elf_section (input_bfd,
3445 symtab_hdr->sh_link,
3446 sym->st_name);
3447 if (name == NULL)
b34976b6 3448 return FALSE;
cf5c0c5b 3449 if (*name == '\0')
fd361982 3450 name = bfd_section_name (sec);
cf5c0c5b 3451 }
ffb2e45b 3452
cf5c0c5b 3453 if (r == bfd_reloc_overflow)
1a72702b
AM
3454 (*info->callbacks->reloc_overflow)
3455 (info, (h ? &h->root : NULL), name, howto->name,
3456 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
cf5c0c5b
AM
3457 else
3458 {
4eca0228 3459 _bfd_error_handler
695344c0 3460 /* xgettext:c-format */
2dcf00ce 3461 (_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
d003868e 3462 input_bfd, input_section,
2dcf00ce 3463 (uint64_t) rel->r_offset, name, (int) r);
b34976b6 3464 return FALSE;
cf5c0c5b 3465 }
252b5132 3466 }
60f2e42e
L
3467
3468 if (wrel != rel)
3469 *wrel = *rel;
3470 }
3471
3472 if (wrel != rel)
3473 {
3474 Elf_Internal_Shdr *rel_hdr;
3475 size_t deleted = rel - wrel;
3476
3477 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
3478 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
3479 if (rel_hdr->sh_size == 0)
3480 {
3481 /* It is too late to remove an empty reloc section. Leave
3482 one NONE reloc.
3483 ??? What is wrong with an empty section??? */
3484 rel_hdr->sh_size = rel_hdr->sh_entsize;
3485 deleted -= 1;
3486 }
3487 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
3488 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
3489 input_section->reloc_count -= deleted;
252b5132
RH
3490 }
3491
b34976b6 3492 return TRUE;
252b5132
RH
3493}
3494
3495/* Finish up dynamic symbol handling. We set the contents of various
3496 dynamic sections here. */
3497
b34976b6 3498static bfd_boolean
55fd94b0
AM
3499elf_i386_finish_dynamic_symbol (bfd *output_bfd,
3500 struct bfd_link_info *info,
3501 struct elf_link_hash_entry *h,
3502 Elf_Internal_Sym *sym)
252b5132 3503{
0afcef53 3504 struct elf_x86_link_hash_table *htab;
25e762b9 3505 unsigned plt_entry_size;
0afcef53 3506 struct elf_x86_link_hash_entry *eh;
aec6b87e 3507 bfd_boolean local_undefweak;
ee2fdd6f 3508 bfd_boolean use_plt_second;
252b5132 3509
0afcef53 3510 htab = elf_x86_hash_table (info, I386_ELF_DATA);
4dfe6ac6
NC
3511 if (htab == NULL)
3512 return FALSE;
252b5132 3513
765e526c 3514 plt_entry_size = htab->plt.plt_entry_size;
25e762b9 3515
ee2fdd6f
L
3516 /* Use the second PLT section only if there is .plt section. */
3517 use_plt_second = htab->elf.splt != NULL && htab->plt_second != NULL;
3518
0afcef53 3519 eh = (struct elf_x86_link_hash_entry *) h;
e133d005
L
3520 if (eh->no_finish_dynamic_symbol)
3521 abort ();
dd7e64d4 3522
aec6b87e
L
3523 /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for
3524 resolved undefined weak symbols in executable so that their
3525 references have value 0 at run-time. */
c5bce5c6 3526 local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh);
aec6b87e 3527
252b5132
RH
3528 if (h->plt.offset != (bfd_vma) -1)
3529 {
ee2fdd6f 3530 bfd_vma plt_index, plt_offset;
252b5132 3531 bfd_vma got_offset;
947216bf
AM
3532 Elf_Internal_Rela rel;
3533 bfd_byte *loc;
ee2fdd6f 3534 asection *plt, *resolved_plt, *gotplt, *relplt;
cbe950e9
L
3535
3536 /* When building a static executable, use .iplt, .igot.plt and
3537 .rel.iplt sections for STT_GNU_IFUNC symbols. */
6de2ae4a 3538 if (htab->elf.splt != NULL)
cbe950e9 3539 {
6de2ae4a
L
3540 plt = htab->elf.splt;
3541 gotplt = htab->elf.sgotplt;
3542 relplt = htab->elf.srelplt;
cbe950e9
L
3543 }
3544 else
3545 {
6de2ae4a
L
3546 plt = htab->elf.iplt;
3547 gotplt = htab->elf.igotplt;
3548 relplt = htab->elf.irelplt;
cbe950e9 3549 }
252b5132 3550
f3180fa9 3551 VERIFY_PLT_ENTRY (info, h, plt, gotplt, relplt, local_undefweak)
252b5132
RH
3552
3553 /* Get the index in the procedure linkage table which
3554 corresponds to this symbol. This is the index of this symbol
3555 in all the symbols for which we are making plt entries. The
cbe950e9 3556 first entry in the procedure linkage table is reserved.
252b5132 3557
cbe950e9 3558 Get the offset into the .got table of the entry that
252b5132 3559 corresponds to this function. Each .got entry is 4 bytes.
cbe950e9 3560 The first three are reserved.
6bbec505 3561
cbe950e9
L
3562 For static executables, we don't reserve anything. */
3563
6de2ae4a 3564 if (plt == htab->elf.splt)
cbe950e9 3565 {
f604c2a2 3566 got_offset = (h->plt.offset / plt_entry_size
765e526c 3567 - htab->plt.has_plt0);
e1f98742 3568 got_offset = (got_offset + 3) * 4;
cbe950e9
L
3569 }
3570 else
3571 {
e1f98742
L
3572 got_offset = h->plt.offset / plt_entry_size;
3573 got_offset = got_offset * 4;
cbe950e9 3574 }
252b5132 3575
f604c2a2
L
3576 /* Fill in the entry in the procedure linkage table and update
3577 the first slot. */
765e526c 3578 memcpy (plt->contents + h->plt.offset, htab->plt.plt_entry,
f604c2a2 3579 plt_entry_size);
ee2fdd6f
L
3580
3581 if (use_plt_second)
3582 {
3583 const bfd_byte *plt_entry;
3584 if (bfd_link_pic (info))
765e526c 3585 plt_entry = htab->non_lazy_plt->pic_plt_entry;
ee2fdd6f 3586 else
765e526c 3587 plt_entry = htab->non_lazy_plt->plt_entry;
ee2fdd6f 3588 memcpy (htab->plt_second->contents + eh->plt_second.offset,
765e526c 3589 plt_entry, htab->non_lazy_plt->plt_entry_size);
ee2fdd6f
L
3590
3591 resolved_plt = htab->plt_second;
3592 plt_offset = eh->plt_second.offset;
3593 }
3594 else
3595 {
3596 resolved_plt = plt;
3597 plt_offset = h->plt.offset;
3598 }
3599
0e1862bb 3600 if (! bfd_link_pic (info))
252b5132 3601 {
252b5132 3602 bfd_put_32 (output_bfd,
cbe950e9
L
3603 (gotplt->output_section->vma
3604 + gotplt->output_offset
252b5132 3605 + got_offset),
ee2fdd6f 3606 resolved_plt->contents + plt_offset
07d6d2b8 3607 + htab->plt.plt_got_offset);
eac338cf 3608
851b6fa1 3609 if (htab->target_os == is_vxworks)
eac338cf
PB
3610 {
3611 int s, k, reloc_index;
3612
3613 /* Create the R_386_32 relocation referencing the GOT
3614 for this PLT entry. */
3615
3616 /* S: Current slot number (zero-based). */
765e526c 3617 s = ((h->plt.offset - htab->plt.plt_entry_size)
07d6d2b8 3618 / htab->plt.plt_entry_size);
eac338cf 3619 /* K: Number of relocations for PLTResolve. */
0e1862bb 3620 if (bfd_link_pic (info))
eac338cf
PB
3621 k = PLTRESOLVE_RELOCS_SHLIB;
3622 else
3623 k = PLTRESOLVE_RELOCS;
3624 /* Skip the PLTresolve relocations, and the relocations for
3625 the other PLT slots. */
3626 reloc_index = k + s * PLT_NON_JUMP_SLOT_RELOCS;
765e526c 3627 loc = (htab->srelplt2->contents + reloc_index
eac338cf
PB
3628 * sizeof (Elf32_External_Rel));
3629
ee2fdd6f
L
3630 rel.r_offset = (plt->output_section->vma
3631 + plt->output_offset
eac338cf 3632 + h->plt.offset + 2),
7325306f 3633 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_386_32);
eac338cf
PB
3634 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
3635
3636 /* Create the R_386_32 relocation referencing the beginning of
3637 the PLT for this GOT entry. */
6de2ae4a
L
3638 rel.r_offset = (htab->elf.sgotplt->output_section->vma
3639 + htab->elf.sgotplt->output_offset
eac338cf 3640 + got_offset);
7325306f 3641 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_386_32);
eac338cf 3642 bfd_elf32_swap_reloc_out (output_bfd, &rel,
13ca3149 3643 loc + sizeof (Elf32_External_Rel));
eac338cf 3644 }
252b5132
RH
3645 }
3646 else
3647 {
252b5132 3648 bfd_put_32 (output_bfd, got_offset,
ee2fdd6f 3649 resolved_plt->contents + plt_offset
07d6d2b8 3650 + htab->plt.plt_got_offset);
252b5132
RH
3651 }
3652
aec6b87e
L
3653 /* Fill in the entry in the global offset table. Leave the entry
3654 as zero for undefined weak symbol in PIE. No PLT relocation
3655 against undefined weak symbol in PIE. */
3656 if (!local_undefweak)
cbe950e9 3657 {
765e526c 3658 if (htab->plt.has_plt0)
f604c2a2
L
3659 bfd_put_32 (output_bfd,
3660 (plt->output_section->vma
3661 + plt->output_offset
3662 + h->plt.offset
765e526c 3663 + htab->lazy_plt->plt_lazy_offset),
f604c2a2 3664 gotplt->contents + got_offset);
252b5132 3665
aec6b87e
L
3666 /* Fill in the entry in the .rel.plt section. */
3667 rel.r_offset = (gotplt->output_section->vma
3668 + gotplt->output_offset
3669 + got_offset);
cf1070f1 3670 if (PLT_LOCAL_IFUNC_P (info, h))
aec6b87e 3671 {
871b3ab2 3672 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
6322e5c5
L
3673 h->root.root.string,
3674 h->root.u.def.section->owner);
3675
aec6b87e
L
3676 /* If an STT_GNU_IFUNC symbol is locally defined, generate
3677 R_386_IRELATIVE instead of R_386_JUMP_SLOT. Store addend
3678 in the .got.plt section. */
3679 bfd_put_32 (output_bfd,
3680 (h->root.u.def.value
3681 + h->root.u.def.section->output_section->vma
3682 + h->root.u.def.section->output_offset),
3683 gotplt->contents + got_offset);
3684 rel.r_info = ELF32_R_INFO (0, R_386_IRELATIVE);
3685 /* R_386_IRELATIVE comes last. */
3686 plt_index = htab->next_irelative_index--;
3687 }
3688 else
3689 {
3690 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_JUMP_SLOT);
3691 plt_index = htab->next_jump_slot_index++;
3692 }
3693
3694 loc = relplt->contents + plt_index * sizeof (Elf32_External_Rel);
3695 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
3696
f604c2a2
L
3697 /* Don't fill the second and third slots in PLT entry for
3698 static executables nor without PLT0. */
765e526c 3699 if (plt == htab->elf.splt && htab->plt.has_plt0)
aec6b87e
L
3700 {
3701 bfd_put_32 (output_bfd,
3702 plt_index * sizeof (Elf32_External_Rel),
3703 plt->contents + h->plt.offset
765e526c 3704 + htab->lazy_plt->plt_reloc_offset);
f604c2a2
L
3705 bfd_put_32 (output_bfd,
3706 - (h->plt.offset
765e526c 3707 + htab->lazy_plt->plt_plt_offset + 4),
f604c2a2 3708 (plt->contents + h->plt.offset
765e526c 3709 + htab->lazy_plt->plt_plt_offset));
aec6b87e 3710 }
e1f98742 3711 }
dd7e64d4
L
3712 }
3713 else if (eh->plt_got.offset != (bfd_vma) -1)
3714 {
3715 bfd_vma got_offset, plt_offset;
3716 asection *plt, *got, *gotplt;
3717 const bfd_byte *got_plt_entry;
3718
dd7e64d4
L
3719 /* Set the entry in the GOT procedure linkage table. */
3720 plt = htab->plt_got;
3721 got = htab->elf.sgot;
3722 gotplt = htab->elf.sgotplt;
3723 got_offset = h->got.offset;
3724
3725 if (got_offset == (bfd_vma) -1
3726 || plt == NULL
3727 || got == NULL
3728 || gotplt == NULL)
3729 abort ();
3730
3731 /* Fill in the entry in the GOT procedure linkage table. */
0e1862bb 3732 if (! bfd_link_pic (info))
252b5132 3733 {
765e526c 3734 got_plt_entry = htab->non_lazy_plt->plt_entry;
dd7e64d4 3735 got_offset += got->output_section->vma + got->output_offset;
252b5132 3736 }
dd7e64d4
L
3737 else
3738 {
765e526c 3739 got_plt_entry = htab->non_lazy_plt->pic_plt_entry;
dd7e64d4
L
3740 got_offset += (got->output_section->vma
3741 + got->output_offset
3742 - gotplt->output_section->vma
3743 - gotplt->output_offset);
3744 }
3745
3746 plt_offset = eh->plt_got.offset;
3747 memcpy (plt->contents + plt_offset, got_plt_entry,
765e526c 3748 htab->non_lazy_plt->plt_entry_size);
dd7e64d4 3749 bfd_put_32 (output_bfd, got_offset,
f604c2a2 3750 (plt->contents + plt_offset
765e526c 3751 + htab->non_lazy_plt->plt_got_offset));
dd7e64d4
L
3752 }
3753
aec6b87e
L
3754 if (!local_undefweak
3755 && !h->def_regular
dd7e64d4
L
3756 && (h->plt.offset != (bfd_vma) -1
3757 || eh->plt_got.offset != (bfd_vma) -1))
3758 {
3759 /* Mark the symbol as undefined, rather than as defined in
3760 the .plt section. Leave the value if there were any
3761 relocations where pointer equality matters (this is a clue
3762 for the dynamic linker, to make function pointer
3763 comparisons work between an application and shared
3764 library), otherwise set it to zero. If a function is only
3765 called from a binary, there is no need to slow down
3766 shared libraries because of that. */
3767 sym->st_shndx = SHN_UNDEF;
3768 if (!h->pointer_equality_needed)
3769 sym->st_value = 0;
252b5132
RH
3770 }
3771
4ec09950
L
3772 _bfd_x86_elf_link_fixup_ifunc_symbol (info, htab, h, sym);
3773
aec6b87e
L
3774 /* Don't generate dynamic GOT relocation against undefined weak
3775 symbol in executable. */
13ae64f3 3776 if (h->got.offset != (bfd_vma) -1
0afcef53
L
3777 && ! GOT_TLS_GD_ANY_P (elf_x86_hash_entry(h)->tls_type)
3778 && (elf_x86_hash_entry(h)->tls_type & GOT_TLS_IE) == 0
aec6b87e 3779 && !local_undefweak)
252b5132 3780 {
947216bf 3781 Elf_Internal_Rela rel;
233cc9c1 3782 asection *relgot = htab->elf.srelgot;
252b5132
RH
3783
3784 /* This symbol has an entry in the global offset table. Set it
3785 up. */
3786
6de2ae4a 3787 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
ffb2e45b 3788 abort ();
252b5132 3789
6de2ae4a
L
3790 rel.r_offset = (htab->elf.sgot->output_section->vma
3791 + htab->elf.sgot->output_offset
dc810e39 3792 + (h->got.offset & ~(bfd_vma) 1));
252b5132 3793
dd5724d5
AM
3794 /* If this is a static link, or it is a -Bsymbolic link and the
3795 symbol is defined locally or was forced to be local because
3796 of a version file, we just want to emit a RELATIVE reloc.
252b5132
RH
3797 The entry in the global offset table will already have been
3798 initialized in the relocate_section function. */
710ab287 3799 if (h->def_regular
0018b0a3
L
3800 && h->type == STT_GNU_IFUNC)
3801 {
233cc9c1
L
3802 if (h->plt.offset == (bfd_vma) -1)
3803 {
3804 /* STT_GNU_IFUNC is referenced without PLT. */
3805 if (htab->elf.splt == NULL)
3806 {
3807 /* use .rel[a].iplt section to store .got relocations
3808 in static executable. */
3809 relgot = htab->elf.irelplt;
3810 }
6999821f 3811 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
233cc9c1 3812 {
871b3ab2 3813 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
6322e5c5
L
3814 h->root.root.string,
3815 h->root.u.def.section->owner);
3816
233cc9c1
L
3817 bfd_put_32 (output_bfd,
3818 (h->root.u.def.value
3819 + h->root.u.def.section->output_section->vma
3820 + h->root.u.def.section->output_offset),
3821 htab->elf.sgot->contents + h->got.offset);
3822 rel.r_info = ELF32_R_INFO (0, R_386_IRELATIVE);
3823 }
3824 else
3825 goto do_glob_dat;
3826 }
3827 else if (bfd_link_pic (info))
710ab287
L
3828 {
3829 /* Generate R_386_GLOB_DAT. */
3830 goto do_glob_dat;
3831 }
3832 else
3833 {
cd2b2c10 3834 asection *plt;
ee2fdd6f 3835 bfd_vma plt_offset;
cd2b2c10 3836
710ab287
L
3837 if (!h->pointer_equality_needed)
3838 abort ();
3839
3840 /* For non-shared object, we can't use .got.plt, which
3841 contains the real function addres if we need pointer
3842 equality. We load the GOT entry with the PLT entry. */
ee2fdd6f
L
3843 if (htab->plt_second != NULL)
3844 {
3845 plt = htab->plt_second;
3846 plt_offset = eh->plt_second.offset;
3847 }
3848 else
3849 {
3850 plt = htab->elf.splt ? htab->elf.splt : htab->elf.iplt;
3851 plt_offset = h->plt.offset;
3852 }
710ab287
L
3853 bfd_put_32 (output_bfd,
3854 (plt->output_section->vma
ee2fdd6f 3855 + plt->output_offset + plt_offset),
6de2ae4a 3856 htab->elf.sgot->contents + h->got.offset);
710ab287
L
3857 return TRUE;
3858 }
0018b0a3 3859 }
0e1862bb 3860 else if (bfd_link_pic (info)
6999821f 3861 && SYMBOL_REFERENCES_LOCAL_P (info, h))
dd5724d5 3862 {
6725bdbf 3863 BFD_ASSERT((h->got.offset & 1) != 0);
dd5724d5
AM
3864 rel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
3865 }
252b5132
RH
3866 else
3867 {
dd5724d5 3868 BFD_ASSERT((h->got.offset & 1) == 0);
dc1e8a47 3869 do_glob_dat:
6725bdbf 3870 bfd_put_32 (output_bfd, (bfd_vma) 0,
6de2ae4a 3871 htab->elf.sgot->contents + h->got.offset);
252b5132
RH
3872 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_GLOB_DAT);
3873 }
3874
233cc9c1 3875 elf_append_rel (output_bfd, relgot, &rel);
252b5132
RH
3876 }
3877
f5385ebf 3878 if (h->needs_copy)
252b5132 3879 {
947216bf 3880 Elf_Internal_Rela rel;
5474d94f 3881 asection *s;
252b5132
RH
3882
3883 /* This symbol needs a copy reloc. Set it up. */
ff38b4cc 3884 VERIFY_COPY_RELOC (h, htab)
252b5132
RH
3885
3886 rel.r_offset = (h->root.u.def.value
3887 + h->root.u.def.section->output_section->vma
3888 + h->root.u.def.section->output_offset);
3889 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_COPY);
afbf7e8e 3890 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
3891 s = htab->elf.sreldynrelro;
3892 else
3893 s = htab->elf.srelbss;
3894 elf_append_rel (output_bfd, s, &rel);
252b5132
RH
3895 }
3896
b34976b6 3897 return TRUE;
252b5132
RH
3898}
3899
c25bc9fc
L
3900/* Finish up local dynamic symbol handling. We set the contents of
3901 various dynamic sections here. */
3902
3903static bfd_boolean
3904elf_i386_finish_local_dynamic_symbol (void **slot, void *inf)
3905{
3906 struct elf_link_hash_entry *h
3907 = (struct elf_link_hash_entry *) *slot;
3908 struct bfd_link_info *info
23209a78 3909 = (struct bfd_link_info *) inf;
c25bc9fc
L
3910
3911 return elf_i386_finish_dynamic_symbol (info->output_bfd, info,
3912 h, NULL);
3913}
3914
aec6b87e
L
3915/* Finish up undefined weak symbol handling in PIE. Fill its PLT entry
3916 here since undefined weak symbol may not be dynamic and may not be
3917 called for elf_i386_finish_dynamic_symbol. */
3918
3919static bfd_boolean
3920elf_i386_pie_finish_undefweak_symbol (struct bfd_hash_entry *bh,
3921 void *inf)
3922{
3923 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) bh;
3924 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3925
3926 if (h->root.type != bfd_link_hash_undefweak
3927 || h->dynindx != -1)
3928 return TRUE;
3929
3930 return elf_i386_finish_dynamic_symbol (info->output_bfd,
5f0f0847 3931 info, h, NULL);
aec6b87e
L
3932}
3933
38701953
AM
3934/* Used to decide how to sort relocs in an optimal manner for the
3935 dynamic linker, before writing them out. */
3936
3937static enum elf_reloc_type_class
cae1fbbb 3938elf_i386_reloc_type_class (const struct bfd_link_info *info,
7e612e98
AM
3939 const asection *rel_sec ATTRIBUTE_UNUSED,
3940 const Elf_Internal_Rela *rela)
38701953 3941{
cae1fbbb
L
3942 bfd *abfd = info->output_bfd;
3943 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3944 struct elf_link_hash_table *htab = elf_hash_table (info);
cae1fbbb 3945
d9e3b590
L
3946 if (htab->dynsym != NULL
3947 && htab->dynsym->contents != NULL)
3948 {
3949 /* Check relocation against STT_GNU_IFUNC symbol if there are
07d6d2b8 3950 dynamic symbols. */
d9e3b590 3951 unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
c428ce9d
L
3952 if (r_symndx != STN_UNDEF)
3953 {
3954 Elf_Internal_Sym sym;
3955 if (!bed->s->swap_symbol_in (abfd,
3956 (htab->dynsym->contents
3957 + r_symndx * sizeof (Elf32_External_Sym)),
3958 0, &sym))
3959 abort ();
d9e3b590 3960
c428ce9d
L
3961 if (ELF32_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3962 return reloc_class_ifunc;
3963 }
d9e3b590 3964 }
cae1fbbb 3965
55fd94b0 3966 switch (ELF32_R_TYPE (rela->r_info))
38701953 3967 {
c428ce9d
L
3968 case R_386_IRELATIVE:
3969 return reloc_class_ifunc;
38701953
AM
3970 case R_386_RELATIVE:
3971 return reloc_class_relative;
3972 case R_386_JUMP_SLOT:
3973 return reloc_class_plt;
3974 case R_386_COPY:
3975 return reloc_class_copy;
3976 default:
3977 return reloc_class_normal;
3978 }
3979}
3980
252b5132
RH
3981/* Finish up the dynamic sections. */
3982
b34976b6 3983static bfd_boolean
55fd94b0
AM
3984elf_i386_finish_dynamic_sections (bfd *output_bfd,
3985 struct bfd_link_info *info)
252b5132 3986{
0afcef53 3987 struct elf_x86_link_hash_table *htab;
252b5132 3988
9577f60b 3989 htab = _bfd_x86_elf_finish_dynamic_sections (output_bfd, info);
4dfe6ac6
NC
3990 if (htab == NULL)
3991 return FALSE;
3992
9577f60b
L
3993 if (!htab->elf.dynamic_sections_created)
3994 return TRUE;
252b5132 3995
9577f60b 3996 if (htab->elf.splt && htab->elf.splt->size > 0)
252b5132 3997 {
9577f60b
L
3998 /* UnixWare sets the entsize of .plt to 4, although that doesn't
3999 really seem like the right value. */
4000 elf_section_data (htab->elf.splt->output_section)
4001 ->this_hdr.sh_entsize = 4;
252b5132 4002
9577f60b 4003 if (htab->plt.has_plt0)
252b5132 4004 {
9577f60b
L
4005 /* Fill in the special first entry in the procedure linkage
4006 table. */
9577f60b
L
4007 memcpy (htab->elf.splt->contents, htab->plt.plt0_entry,
4008 htab->lazy_plt->plt0_entry_size);
4009 memset (htab->elf.splt->contents + htab->lazy_plt->plt0_entry_size,
851b6fa1 4010 htab->plt0_pad_byte,
9577f60b
L
4011 htab->plt.plt_entry_size - htab->lazy_plt->plt0_entry_size);
4012 if (!bfd_link_pic (info))
252b5132 4013 {
9577f60b
L
4014 bfd_put_32 (output_bfd,
4015 (htab->elf.sgotplt->output_section->vma
4016 + htab->elf.sgotplt->output_offset
4017 + 4),
4018 htab->elf.splt->contents
4019 + htab->lazy_plt->plt0_got1_offset);
4020 bfd_put_32 (output_bfd,
4021 (htab->elf.sgotplt->output_section->vma
4022 + htab->elf.sgotplt->output_offset
4023 + 8),
4024 htab->elf.splt->contents
4025 + htab->lazy_plt->plt0_got2_offset);
1f78f649 4026
851b6fa1 4027 if (htab->target_os == is_vxworks)
eac338cf 4028 {
9577f60b
L
4029 Elf_Internal_Rela rel;
4030 int num_plts = (htab->elf.splt->size
4031 / htab->plt.plt_entry_size) - 1;
4032 unsigned char *p;
4033 asection *srelplt2 = htab->srelplt2;
4034
4035 /* Generate a relocation for _GLOBAL_OFFSET_TABLE_
4036 + 4. On IA32 we use REL relocations so the
4037 addend goes in the PLT directly. */
4038 rel.r_offset = (htab->elf.splt->output_section->vma
4039 + htab->elf.splt->output_offset
4040 + htab->lazy_plt->plt0_got1_offset);
4041 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
4042 R_386_32);
4043 bfd_elf32_swap_reloc_out (output_bfd, &rel,
4044 srelplt2->contents);
4045 /* Generate a relocation for _GLOBAL_OFFSET_TABLE_
4046 + 8. */
4047 rel.r_offset = (htab->elf.splt->output_section->vma
4048 + htab->elf.splt->output_offset
4049 + htab->lazy_plt->plt0_got2_offset);
4050 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
4051 R_386_32);
4052 bfd_elf32_swap_reloc_out (output_bfd, &rel,
4053 srelplt2->contents +
4054 sizeof (Elf32_External_Rel));
4055 /* Correct the .rel.plt.unloaded relocations. */
4056 p = srelplt2->contents;
4057 if (bfd_link_pic (info))
4058 p += PLTRESOLVE_RELOCS_SHLIB * sizeof (Elf32_External_Rel);
4059 else
4060 p += PLTRESOLVE_RELOCS * sizeof (Elf32_External_Rel);
eac338cf 4061
9577f60b 4062 for (; num_plts; num_plts--)
1f78f649 4063 {
9577f60b 4064 bfd_elf32_swap_reloc_in (output_bfd, p, &rel);
f604c2a2 4065 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
1f78f649 4066 R_386_32);
9577f60b
L
4067 bfd_elf32_swap_reloc_out (output_bfd, &rel, p);
4068 p += sizeof (Elf32_External_Rel);
f604c2a2 4069
9577f60b
L
4070 bfd_elf32_swap_reloc_in (output_bfd, p, &rel);
4071 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
4072 R_386_32);
4073 bfd_elf32_swap_reloc_out (output_bfd, &rel, p);
4074 p += sizeof (Elf32_External_Rel);
1f78f649 4075 }
eac338cf
PB
4076 }
4077 }
252b5132 4078 }
fff53dae
L
4079 }
4080
aec6b87e
L
4081 /* Fill PLT entries for undefined weak symbols in PIE. */
4082 if (bfd_link_pie (info))
4083 bfd_hash_traverse (&info->hash->table,
4084 elf_i386_pie_finish_undefweak_symbol,
4085 info);
4086
b34976b6 4087 return TRUE;
252b5132
RH
4088}
4089
233cc9c1
L
4090/* Fill PLT/GOT entries and allocate dynamic relocations for local
4091 STT_GNU_IFUNC symbols, which aren't in the ELF linker hash table.
4092 It has to be done before elf_link_sort_relocs is called so that
4093 dynamic relocations are properly sorted. */
4094
4095static bfd_boolean
4096elf_i386_output_arch_local_syms
4097 (bfd *output_bfd ATTRIBUTE_UNUSED,
4098 struct bfd_link_info *info,
4099 void *flaginfo ATTRIBUTE_UNUSED,
4100 int (*func) (void *, const char *,
4101 Elf_Internal_Sym *,
4102 asection *,
4103 struct elf_link_hash_entry *) ATTRIBUTE_UNUSED)
4104{
0afcef53
L
4105 struct elf_x86_link_hash_table *htab
4106 = elf_x86_hash_table (info, I386_ELF_DATA);
233cc9c1
L
4107 if (htab == NULL)
4108 return FALSE;
4109
4110 /* Fill PLT and GOT entries for local STT_GNU_IFUNC symbols. */
4111 htab_traverse (htab->loc_hash_table,
4112 elf_i386_finish_local_dynamic_symbol,
4113 info);
4114
4115 return TRUE;
4116}
4117
f604c2a2 4118/* Forward declaration. */
765e526c 4119static const struct elf_x86_lazy_plt_layout elf_i386_nacl_plt;
f604c2a2
L
4120
4121/* Similar to _bfd_elf_get_synthetic_symtab. Support PLTs with all
4122 dynamic relocations. */
4123
4124static long
4125elf_i386_get_synthetic_symtab (bfd *abfd,
4126 long symcount ATTRIBUTE_UNUSED,
4127 asymbol **syms ATTRIBUTE_UNUSED,
4128 long dynsymcount,
4129 asymbol **dynsyms,
4130 asymbol **ret)
4131{
f493882d 4132 long count, i, n;
f604c2a2 4133 int j;
f604c2a2 4134 bfd_byte *plt_contents;
f493882d 4135 long relsize;
765e526c
L
4136 const struct elf_x86_lazy_plt_layout *lazy_plt;
4137 const struct elf_x86_non_lazy_plt_layout *non_lazy_plt;
4138 const struct elf_x86_lazy_plt_layout *lazy_ibt_plt;
4139 const struct elf_x86_non_lazy_plt_layout *non_lazy_ibt_plt;
f604c2a2
L
4140 asection *plt;
4141 bfd_vma got_addr;
f493882d
L
4142 enum elf_x86_plt_type plt_type;
4143 struct elf_x86_plt plts[] =
3972882e 4144 {
f493882d
L
4145 { ".plt", NULL, NULL, plt_unknown, 0, 0, 0, 0 },
4146 { ".plt.got", NULL, NULL, plt_non_lazy, 0, 0, 0, 0 },
4147 { ".plt.sec", NULL, NULL, plt_second, 0, 0, 0, 0 },
4148 { NULL, NULL, NULL, plt_non_lazy, 0, 0, 0, 0 }
f604c2a2 4149 };
144bed8d 4150
f604c2a2 4151 *ret = NULL;
144bed8d 4152
f604c2a2
L
4153 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
4154 return 0;
3972882e 4155
f604c2a2
L
4156 if (dynsymcount <= 0)
4157 return 0;
cca5b8b6 4158
f604c2a2
L
4159 relsize = bfd_get_dynamic_reloc_upper_bound (abfd);
4160 if (relsize <= 0)
4161 return -1;
cca5b8b6 4162
f604c2a2
L
4163 non_lazy_plt = NULL;
4164 /* Silence GCC 6. */
4165 lazy_plt = NULL;
ee2fdd6f
L
4166 non_lazy_ibt_plt = NULL;
4167 lazy_ibt_plt = NULL;
851b6fa1 4168 switch (get_elf_x86_backend_data (abfd)->target_os)
144bed8d 4169 {
f604c2a2 4170 case is_normal:
3b4c3844 4171 case is_solaris:
f604c2a2 4172 non_lazy_plt = &elf_i386_non_lazy_plt;
ee2fdd6f
L
4173 lazy_ibt_plt = &elf_i386_lazy_ibt_plt;
4174 non_lazy_ibt_plt = &elf_i386_non_lazy_ibt_plt;
f604c2a2
L
4175 /* Fall through */
4176 case is_vxworks:
4177 lazy_plt = &elf_i386_lazy_plt;
4178 break;
4179 case is_nacl:
4180 lazy_plt = &elf_i386_nacl_plt;
4181 break;
4182 }
4183
4184 got_addr = 0;
3972882e 4185
f604c2a2
L
4186 count = 0;
4187 for (j = 0; plts[j].name != NULL; j++)
4188 {
4189 plt = bfd_get_section_by_name (abfd, plts[j].name);
90efb642 4190 if (plt == NULL || plt->size == 0)
6f25f223 4191 continue;
533d0af0 4192
f604c2a2
L
4193 /* Get the PLT section contents. */
4194 plt_contents = (bfd_byte *) bfd_malloc (plt->size);
4195 if (plt_contents == NULL)
4196 break;
4197 if (!bfd_get_section_contents (abfd, (asection *) plt,
4198 plt_contents, 0, plt->size))
4199 {
4200 free (plt_contents);
4201 break;
4202 }
4203
4204 /* Check what kind of PLT it is. */
4205 plt_type = plt_unknown;
90efb642
L
4206 if (plts[j].type == plt_unknown
4207 && (plt->size >= (lazy_plt->plt0_entry_size
4208 + lazy_plt->plt_entry_size)))
f604c2a2
L
4209 {
4210 /* Match lazy PLT first. */
4211 if (memcmp (plt_contents, lazy_plt->plt0_entry,
4212 lazy_plt->plt0_got1_offset) == 0)
ee2fdd6f
L
4213 {
4214 /* The fist entry in the lazy IBT PLT is the same as the
4215 normal lazy PLT. */
4216 if (lazy_ibt_plt != NULL
90efb642 4217 && (memcmp (plt_contents + lazy_ibt_plt->plt0_entry_size,
ee2fdd6f
L
4218 lazy_ibt_plt->plt_entry,
4219 lazy_ibt_plt->plt_got_offset) == 0))
4220 plt_type = plt_lazy | plt_second;
4221 else
4222 plt_type = plt_lazy;
4223 }
f604c2a2
L
4224 else if (memcmp (plt_contents, lazy_plt->pic_plt0_entry,
4225 lazy_plt->plt0_got1_offset) == 0)
ee2fdd6f
L
4226 {
4227 /* The fist entry in the PIC lazy IBT PLT is the same as
4228 the normal PIC lazy PLT. */
4229 if (lazy_ibt_plt != NULL
90efb642 4230 && (memcmp (plt_contents + lazy_ibt_plt->plt0_entry_size,
ee2fdd6f
L
4231 lazy_ibt_plt->pic_plt_entry,
4232 lazy_ibt_plt->plt_got_offset) == 0))
4233 plt_type = plt_lazy | plt_pic | plt_second;
4234 else
4235 plt_type = plt_lazy | plt_pic;
4236 }
f604c2a2
L
4237 }
4238
4239 if (non_lazy_plt != NULL
90efb642
L
4240 && (plt_type == plt_unknown || plt_type == plt_non_lazy)
4241 && plt->size >= non_lazy_plt->plt_entry_size)
f604c2a2
L
4242 {
4243 /* Match non-lazy PLT. */
4244 if (memcmp (plt_contents, non_lazy_plt->plt_entry,
4245 non_lazy_plt->plt_got_offset) == 0)
4246 plt_type = plt_non_lazy;
4247 else if (memcmp (plt_contents, non_lazy_plt->pic_plt_entry,
4248 non_lazy_plt->plt_got_offset) == 0)
4249 plt_type = plt_pic;
4250 }
4251
ee2fdd6f 4252 if ((non_lazy_ibt_plt != NULL)
90efb642
L
4253 && (plt_type == plt_unknown || plt_type == plt_second)
4254 && plt->size >= non_lazy_ibt_plt->plt_entry_size)
ee2fdd6f
L
4255 {
4256 if (memcmp (plt_contents,
4257 non_lazy_ibt_plt->plt_entry,
4258 non_lazy_ibt_plt->plt_got_offset) == 0)
4259 {
4260 /* Match IBT PLT. */
4261 plt_type = plt_second;
4262 non_lazy_plt = non_lazy_ibt_plt;
4263 }
4264 else if (memcmp (plt_contents,
4265 non_lazy_ibt_plt->pic_plt_entry,
4266 non_lazy_ibt_plt->plt_got_offset) == 0)
4267 {
4268 /* Match PIC IBT PLT. */
4269 plt_type = plt_second | plt_pic;
4270 non_lazy_plt = non_lazy_ibt_plt;
4271 }
4272 }
4273
f604c2a2 4274 if (plt_type == plt_unknown)
37c0b6ee
L
4275 {
4276 free (plt_contents);
4277 continue;
4278 }
3972882e 4279
f604c2a2
L
4280 plts[j].sec = plt;
4281 plts[j].type = plt_type;
ec1f73bb 4282
f604c2a2
L
4283 if ((plt_type & plt_lazy))
4284 {
4285 plts[j].plt_got_offset = lazy_plt->plt_got_offset;
4286 plts[j].plt_entry_size = lazy_plt->plt_entry_size;
4287 /* Skip PLT0 in lazy PLT. */
4288 i = 1;
4289 }
4290 else
4291 {
4292 plts[j].plt_got_offset = non_lazy_plt->plt_got_offset;
4293 plts[j].plt_entry_size = non_lazy_plt->plt_entry_size;
4294 i = 0;
4295 }
fca6ae69 4296
ee2fdd6f
L
4297 /* Skip lazy PLT when the second PLT is used. */
4298 if ((plt_type & (plt_lazy | plt_second))
4299 == (plt_lazy | plt_second))
4300 plts[j].count = 0;
4301 else
4302 {
4303 n = plt->size / plts[j].plt_entry_size;
4304 plts[j].count = n;
4305 count += n - i;
4306 }
f604c2a2
L
4307
4308 plts[j].contents = plt_contents;
4309
4310 /* The _GLOBAL_OFFSET_TABLE_ address is needed. */
4311 if ((plt_type & plt_pic))
4312 got_addr = (bfd_vma) -1;
144bed8d
L
4313 }
4314
f493882d
L
4315 return _bfd_x86_elf_get_synthetic_symtab (abfd, count, relsize,
4316 got_addr, plts, dynsyms,
4317 ret);
4c45e5c9
JJ
4318}
4319
f604c2a2
L
4320/* Set up i386 GNU properties. Return the first relocatable ELF input
4321 with GNU properties if found. Otherwise, return NULL. */
4322
4323static bfd *
4324elf_i386_link_setup_gnu_properties (struct bfd_link_info *info)
4325{
1de031c8 4326 struct elf_x86_init_table init_table;
f604c2a2 4327
851b6fa1 4328 switch (get_elf_x86_backend_data (info->output_bfd)->target_os)
f604c2a2
L
4329 {
4330 case is_normal:
3b4c3844 4331 case is_solaris:
851b6fa1 4332 init_table.plt0_pad_byte = 0x0;
1de031c8
L
4333 init_table.lazy_plt = &elf_i386_lazy_plt;
4334 init_table.non_lazy_plt = &elf_i386_non_lazy_plt;
4335 init_table.lazy_ibt_plt = &elf_i386_lazy_ibt_plt;
4336 init_table.non_lazy_ibt_plt = &elf_i386_non_lazy_ibt_plt;
f604c2a2
L
4337 break;
4338 case is_vxworks:
851b6fa1 4339 init_table.plt0_pad_byte = 0x90;
1de031c8
L
4340 init_table.lazy_plt = &elf_i386_lazy_plt;
4341 init_table.non_lazy_plt = NULL;
4342 init_table.lazy_ibt_plt = NULL;
4343 init_table.non_lazy_ibt_plt = NULL;
f604c2a2
L
4344 break;
4345 case is_nacl:
851b6fa1 4346 init_table.plt0_pad_byte = 0x90;
1de031c8
L
4347 init_table.lazy_plt = &elf_i386_nacl_plt;
4348 init_table.non_lazy_plt = NULL;
4349 init_table.lazy_ibt_plt = NULL;
4350 init_table.non_lazy_ibt_plt = NULL;
f604c2a2
L
4351 break;
4352 }
4353
1de031c8
L
4354 init_table.r_info = elf32_r_info;
4355 init_table.r_sym = elf32_r_sym;
7a382c1c 4356
1de031c8 4357 return _bfd_x86_elf_link_setup_gnu_properties (info, &init_table);
f604c2a2
L
4358}
4359
6d00b590 4360#define TARGET_LITTLE_SYM i386_elf32_vec
252b5132
RH
4361#define TARGET_LITTLE_NAME "elf32-i386"
4362#define ELF_ARCH bfd_arch_i386
ae95ffa6 4363#define ELF_TARGET_ID I386_ELF_DATA
252b5132
RH
4364#define ELF_MACHINE_CODE EM_386
4365#define ELF_MAXPAGESIZE 0x1000
252b5132
RH
4366
4367#define elf_backend_can_gc_sections 1
51b64d56 4368#define elf_backend_can_refcount 1
252b5132
RH
4369#define elf_backend_want_got_plt 1
4370#define elf_backend_plt_readonly 1
4371#define elf_backend_want_plt_sym 0
4372#define elf_backend_got_header_size 12
e41b3a13 4373#define elf_backend_plt_alignment 4
64f52338 4374#define elf_backend_dtrel_excludes_plt 1
f7483970 4375#define elf_backend_extern_protected_data 1
bedfd056 4376#define elf_backend_caches_rawsize 1
5474d94f 4377#define elf_backend_want_dynrelro 1
252b5132 4378
8c29f035
AM
4379/* Support RELA for objdump of prelink objects. */
4380#define elf_info_to_howto elf_i386_info_to_howto_rel
dd5724d5
AM
4381#define elf_info_to_howto_rel elf_i386_info_to_howto_rel
4382
dd5724d5 4383#define bfd_elf32_bfd_is_local_label_name elf_i386_is_local_label_name
dd5724d5 4384#define bfd_elf32_bfd_reloc_type_lookup elf_i386_reloc_type_lookup
13285a1b 4385#define bfd_elf32_bfd_reloc_name_lookup elf_i386_reloc_name_lookup
3972882e 4386#define bfd_elf32_get_synthetic_symtab elf_i386_get_synthetic_symtab
dd5724d5 4387
13285a1b 4388#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
dd5724d5 4389#define elf_backend_check_relocs elf_i386_check_relocs
f604c2a2 4390#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
0ac8d2ca 4391#define elf_backend_fake_sections elf_i386_fake_sections
dd5724d5
AM
4392#define elf_backend_finish_dynamic_sections elf_i386_finish_dynamic_sections
4393#define elf_backend_finish_dynamic_symbol elf_i386_finish_dynamic_symbol
233cc9c1 4394#define elf_backend_output_arch_local_syms elf_i386_output_arch_local_syms
c5fccbec
DJ
4395#define elf_backend_grok_prstatus elf_i386_grok_prstatus
4396#define elf_backend_grok_psinfo elf_i386_grok_psinfo
db6751f2 4397#define elf_backend_reloc_type_class elf_i386_reloc_type_class
0ac8d2ca 4398#define elf_backend_relocate_section elf_i386_relocate_section
f604c2a2 4399#define elf_backend_setup_gnu_properties elf_i386_link_setup_gnu_properties
9f857535 4400#define elf_backend_hide_symbol _bfd_x86_elf_hide_symbol
dd5724d5 4401
a2f63b2e
MR
4402#define elf_backend_linux_prpsinfo32_ugid16 TRUE
4403
8f56f7a2
L
4404#define elf32_bed elf32_i386_bed
4405
252b5132 4406#include "elf32-target.h"
2bc3c89a
AM
4407
4408/* FreeBSD support. */
4409
4410#undef TARGET_LITTLE_SYM
6d00b590 4411#define TARGET_LITTLE_SYM i386_elf32_fbsd_vec
2bc3c89a
AM
4412#undef TARGET_LITTLE_NAME
4413#define TARGET_LITTLE_NAME "elf32-i386-freebsd"
d1036acb
L
4414#undef ELF_OSABI
4415#define ELF_OSABI ELFOSABI_FREEBSD
2bc3c89a
AM
4416
4417/* The kernel recognizes executables as valid only if they carry a
4418 "FreeBSD" label in the ELF header. So we put this label on all
4419 executables and (for simplicity) also all other object files. */
4420
ed7e9d0b
AM
4421static bfd_boolean
4422elf_i386_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2bc3c89a 4423{
ed7e9d0b
AM
4424 if (!_bfd_elf_init_file_header (abfd, info))
4425 return FALSE;
2bc3c89a 4426
2bc3c89a 4427#ifdef OLD_FREEBSD_ABI_LABEL
cf7363b4
L
4428 {
4429 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
4430 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
4431 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
4432 }
caf47ea6 4433#endif
ed7e9d0b 4434 return TRUE;
2bc3c89a
AM
4435}
4436
ed7e9d0b
AM
4437#undef elf_backend_init_file_header
4438#define elf_backend_init_file_header elf_i386_fbsd_init_file_header
571fe01f
NC
4439#undef elf32_bed
4440#define elf32_bed elf32_i386_fbsd_bed
2bc3c89a 4441
d8045f23
NC
4442#undef elf_backend_add_symbol_hook
4443
2bc3c89a 4444#include "elf32-target.h"
eac338cf 4445
ed7e9d0b
AM
4446#undef elf_backend_init_file_header
4447
a6cc6b3b
RO
4448/* Solaris 2. */
4449
4450#undef TARGET_LITTLE_SYM
6d00b590 4451#define TARGET_LITTLE_SYM i386_elf32_sol2_vec
a6cc6b3b
RO
4452#undef TARGET_LITTLE_NAME
4453#define TARGET_LITTLE_NAME "elf32-i386-sol2"
4454
3b4c3844
L
4455static const struct elf_x86_backend_data elf_i386_solaris_arch_bed =
4456 {
4457 is_solaris /* os */
4458 };
4459
4460#undef elf_backend_arch_data
4461#define elf_backend_arch_data &elf_i386_solaris_arch_bed
4462
a6cc6b3b
RO
4463/* Restore default: we cannot use ELFOSABI_SOLARIS, otherwise ELFOSABI_NONE
4464 objects won't be recognized. */
4465#undef ELF_OSABI
4466
4467#undef elf32_bed
4468#define elf32_bed elf32_i386_sol2_bed
4469
7dc98aea
RO
4470/* The 32-bit static TLS arena size is rounded to the nearest 8-byte
4471 boundary. */
84865015 4472#undef elf_backend_static_tls_alignment
7dc98aea
RO
4473#define elf_backend_static_tls_alignment 8
4474
a6cc6b3b
RO
4475/* The Solaris 2 ABI requires a plt symbol on all platforms.
4476
4477 Cf. Linker and Libraries Guide, Ch. 2, Link-Editor, Generating the Output
4478 File, p.63. */
84865015 4479#undef elf_backend_want_plt_sym
a6cc6b3b
RO
4480#define elf_backend_want_plt_sym 1
4481
84865015
NC
4482#undef elf_backend_strtab_flags
4483#define elf_backend_strtab_flags SHF_STRINGS
4484
5522f910 4485/* Called to set the sh_flags, sh_link and sh_info fields of OSECTION which
07d6d2b8 4486 has a type >= SHT_LOOS. Returns TRUE if these fields were initialised
5522f910
NC
4487 FALSE otherwise. ISECTION is the best guess matching section from the
4488 input bfd IBFD, but it might be NULL. */
4489
84865015 4490static bfd_boolean
5522f910
NC
4491elf32_i386_copy_solaris_special_section_fields (const bfd *ibfd ATTRIBUTE_UNUSED,
4492 bfd *obfd ATTRIBUTE_UNUSED,
4493 const Elf_Internal_Shdr *isection ATTRIBUTE_UNUSED,
4494 Elf_Internal_Shdr *osection ATTRIBUTE_UNUSED)
84865015
NC
4495{
4496 /* PR 19938: FIXME: Need to add code for setting the sh_info
5522f910
NC
4497 and sh_link fields of Solaris specific section types. */
4498 return FALSE;
84865015 4499
5522f910 4500 /* Based upon Oracle Solaris 11.3 Linkers and Libraries Guide, Ch. 13,
84865015
NC
4501 Object File Format, Table 13-9 ELF sh_link and sh_info Interpretation:
4502
4503http://docs.oracle.com/cd/E53394_01/html/E54813/chapter6-94076.html#scrolltoc
4504
4505 The following values should be set:
07d6d2b8
AM
4506
4507Type Link Info
84865015
NC
4508-----------------------------------------------------------------------------
4509SHT_SUNW_ancillary The section header index of 0
07d6d2b8
AM
4510 [0x6fffffee] the associated string table.
4511
84865015 4512SHT_SUNW_capinfo The section header index of For a dynamic object, the
07d6d2b8
AM
4513 [0x6ffffff0] the associated symbol table. section header index of
4514 the associated
84865015
NC
4515 SHT_SUNW_capchain table,
4516 otherwise 0.
4517
4518SHT_SUNW_symsort The section header index of 0
07d6d2b8 4519 [0x6ffffff1] the associated symbol table.
84865015
NC
4520
4521SHT_SUNW_tlssort The section header index of 0
07d6d2b8
AM
4522 [0x6ffffff2] the associated symbol table.
4523
4524SHT_SUNW_LDYNSYM The section header index of One greater than the
4525 [0x6ffffff3] the associated string table. symbol table index of the
4526 This index is the same string last local symbol,
84865015 4527 table used by the SHT_DYNSYM STB_LOCAL. Since
07d6d2b8
AM
4528 section. SHT_SUNW_LDYNSYM only
4529 contains local symbols,
84865015
NC
4530 sh_info is equivalent to
4531 the number of symbols in
4532 the table.
4533
07d6d2b8
AM
4534SHT_SUNW_cap If symbol capabilities exist, If any capabilities refer
4535 [0x6ffffff5] the section header index of to named strings, the
4536 the associated section header index of
4537 SHT_SUNW_capinfo table, the associated string
4538 otherwise 0. table, otherwise 0.
84865015 4539
07d6d2b8
AM
4540SHT_SUNW_move The section header index of 0
4541 [0x6ffffffa] the associated symbol table.
4542
4543SHT_SUNW_COMDAT 0 0
84865015
NC
4544 [0x6ffffffb]
4545
4546SHT_SUNW_syminfo The section header index of The section header index
07d6d2b8
AM
4547 [0x6ffffffc] the associated symbol table. of the associated
4548 .dynamic section.
84865015 4549
07d6d2b8
AM
4550SHT_SUNW_verdef The section header index of The number of version
4551 [0x6ffffffd] the associated string table. definitions within the
4552 section.
84865015
NC
4553
4554SHT_SUNW_verneed The section header index of The number of version
07d6d2b8
AM
4555 [0x6ffffffe] the associated string table. dependencies within the
4556 section.
84865015 4557
07d6d2b8
AM
4558SHT_SUNW_versym The section header index of 0
4559 [0x6fffffff] the associated symbol table. */
84865015
NC
4560}
4561
5522f910
NC
4562#undef elf_backend_copy_special_section_fields
4563#define elf_backend_copy_special_section_fields elf32_i386_copy_solaris_special_section_fields
84865015 4564
a6cc6b3b
RO
4565#include "elf32-target.h"
4566
bf64a951
L
4567/* Intel MCU support. */
4568
4569static bfd_boolean
4570elf32_iamcu_elf_object_p (bfd *abfd)
4571{
4572 /* Set the right machine number for an IAMCU elf32 file. */
4573 bfd_default_set_arch_mach (abfd, bfd_arch_iamcu, bfd_mach_i386_iamcu);
4574 return TRUE;
4575}
4576
4577#undef TARGET_LITTLE_SYM
4578#define TARGET_LITTLE_SYM iamcu_elf32_vec
4579#undef TARGET_LITTLE_NAME
4580#define TARGET_LITTLE_NAME "elf32-iamcu"
84865015 4581#undef ELF_ARCH
bf64a951
L
4582#define ELF_ARCH bfd_arch_iamcu
4583
4584#undef ELF_MACHINE_CODE
4585#define ELF_MACHINE_CODE EM_IAMCU
4586
3b4c3844
L
4587#undef elf_backend_arch_data
4588#define elf_backend_arch_data &elf_i386_arch_bed
4589
bf64a951
L
4590#undef ELF_OSABI
4591
4592#undef elf32_bed
4593#define elf32_bed elf32_iamcu_bed
4594
4595#undef elf_backend_object_p
4596#define elf_backend_object_p elf32_iamcu_elf_object_p
4597
4598#undef elf_backend_static_tls_alignment
4599
4600#undef elf_backend_want_plt_sym
07d6d2b8 4601#define elf_backend_want_plt_sym 0
bf64a951 4602
84865015 4603#undef elf_backend_strtab_flags
5522f910 4604#undef elf_backend_copy_special_section_fields
84865015 4605
bf64a951
L
4606#include "elf32-target.h"
4607
4608/* Restore defaults. */
4609#undef ELF_ARCH
4610#define ELF_ARCH bfd_arch_i386
4611#undef ELF_MACHINE_CODE
4612#define ELF_MACHINE_CODE EM_386
4613
a27e4371
RM
4614/* Native Client support. */
4615
4616#undef TARGET_LITTLE_SYM
6d00b590 4617#define TARGET_LITTLE_SYM i386_elf32_nacl_vec
a27e4371
RM
4618#undef TARGET_LITTLE_NAME
4619#define TARGET_LITTLE_NAME "elf32-i386-nacl"
4620#undef elf32_bed
4621#define elf32_bed elf32_i386_nacl_bed
4622
4623#undef ELF_MAXPAGESIZE
4624#define ELF_MAXPAGESIZE 0x10000
4625
4626/* Restore defaults. */
4627#undef ELF_OSABI
4628#undef elf_backend_want_plt_sym
4629#define elf_backend_want_plt_sym 0
a27e4371
RM
4630#undef elf_backend_static_tls_alignment
4631
4632/* NaCl uses substantially different PLT entries for the same effects. */
4633
4634#undef elf_backend_plt_alignment
4635#define elf_backend_plt_alignment 5
4636#define NACL_PLT_ENTRY_SIZE 64
4637#define NACLMASK 0xe0 /* 32-byte alignment mask. */
4638
4639static const bfd_byte elf_i386_nacl_plt0_entry[] =
4640 {
4641 0xff, 0x35, /* pushl contents of address */
07d6d2b8
AM
4642 0, 0, 0, 0, /* replaced with address of .got + 4. */
4643 0x8b, 0x0d, /* movl contents of address, %ecx */
4644 0, 0, 0, 0, /* replaced with address of .got + 8. */
a27e4371
RM
4645 0x83, 0xe1, NACLMASK, /* andl $NACLMASK, %ecx */
4646 0xff, 0xe1 /* jmp *%ecx */
4647 };
4648
4649static const bfd_byte elf_i386_nacl_plt_entry[NACL_PLT_ENTRY_SIZE] =
4650 {
4651 0x8b, 0x0d, /* movl contents of address, %ecx */
4652 0, 0, 0, 0, /* replaced with GOT slot address. */
4653 0x83, 0xe1, NACLMASK, /* andl $NACLMASK, %ecx */
4654 0xff, 0xe1, /* jmp *%ecx */
4655
07d6d2b8 4656 /* Pad to the next 32-byte boundary with nop instructions. */
a27e4371
RM
4657 0x90,
4658 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4659 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4660
4661 /* Lazy GOT entries point here (32-byte aligned). */
4662 0x68, /* pushl immediate */
4663 0, 0, 0, 0, /* replaced with reloc offset. */
4664 0xe9, /* jmp relative */
07d6d2b8 4665 0, 0, 0, 0, /* replaced with offset to .plt. */
a27e4371 4666
07d6d2b8 4667 /* Pad to the next 32-byte boundary with nop instructions. */
a27e4371
RM
4668 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4669 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4670 0x90, 0x90
4671 };
4672
4673static const bfd_byte
4674elf_i386_nacl_pic_plt0_entry[sizeof (elf_i386_nacl_plt0_entry)] =
4675 {
4676 0xff, 0x73, 0x04, /* pushl 4(%ebx) */
4677 0x8b, 0x4b, 0x08, /* mov 0x8(%ebx), %ecx */
4678 0x83, 0xe1, 0xe0, /* and $NACLMASK, %ecx */
4679 0xff, 0xe1, /* jmp *%ecx */
caa0075c
RM
4680
4681 /* This is expected to be the same size as elf_i386_nacl_plt0_entry,
4682 so pad to that size with nop instructions. */
4683 0x90, 0x90, 0x90, 0x90, 0x90, 0x90
a27e4371
RM
4684 };
4685
4686static const bfd_byte elf_i386_nacl_pic_plt_entry[NACL_PLT_ENTRY_SIZE] =
4687 {
07d6d2b8
AM
4688 0x8b, 0x8b, /* movl offset(%ebx), %ecx */
4689 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
4690 0x83, 0xe1, 0xe0, /* andl $NACLMASK, %ecx */
4691 0xff, 0xe1, /* jmp *%ecx */
a27e4371 4692
07d6d2b8 4693 /* Pad to the next 32-byte boundary with nop instructions. */
a27e4371
RM
4694 0x90,
4695 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4696 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4697
4698 /* Lazy GOT entries point here (32-byte aligned). */
07d6d2b8
AM
4699 0x68, /* pushl immediate */
4700 0, 0, 0, 0, /* replaced with offset into relocation table. */
4701 0xe9, /* jmp relative */
4702 0, 0, 0, 0, /* replaced with offset to start of .plt. */
a27e4371 4703
07d6d2b8 4704 /* Pad to the next 32-byte boundary with nop instructions. */
a27e4371
RM
4705 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4706 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4707 0x90, 0x90
4708 };
4709
4710static const bfd_byte elf_i386_nacl_eh_frame_plt[] =
4711 {
07d6d2b8
AM
4712#if (PLT_CIE_LENGTH != 20 \
4713 || PLT_FDE_LENGTH != 36 \
4714 || PLT_FDE_START_OFFSET != 4 + PLT_CIE_LENGTH + 8 \
a27e4371 4715 || PLT_FDE_LEN_OFFSET != 4 + PLT_CIE_LENGTH + 12)
851b6fa1 4716# error "Need elf_x86_backend_data parameters for eh_frame_plt offsets!"
a27e4371
RM
4717#endif
4718 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
07d6d2b8
AM
4719 0, 0, 0, 0, /* CIE ID */
4720 1, /* CIE version */
4721 'z', 'R', 0, /* Augmentation string */
4722 1, /* Code alignment factor */
4723 0x7c, /* Data alignment factor: -4 */
4724 8, /* Return address column */
a27e4371
RM
4725 1, /* Augmentation size */
4726 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
4727 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
4728 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
4729 DW_CFA_nop, DW_CFA_nop,
4730
07d6d2b8 4731 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
a27e4371 4732 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
07d6d2b8
AM
4733 0, 0, 0, 0, /* R_386_PC32 .plt goes here */
4734 0, 0, 0, 0, /* .plt size goes here */
4735 0, /* Augmentation size */
4736 DW_CFA_def_cfa_offset, 8, /* DW_CFA_def_cfa_offset: 8 */
4737 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
4738 DW_CFA_def_cfa_offset, 12, /* DW_CFA_def_cfa_offset: 12 */
4739 DW_CFA_advance_loc + 58, /* DW_CFA_advance_loc: 58 to __PLT__+64 */
4740 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
4741 13, /* Block length */
4742 DW_OP_breg4, 4, /* DW_OP_breg4 (esp): 4 */
4743 DW_OP_breg8, 0, /* DW_OP_breg8 (eip): 0 */
a27e4371
RM
4744 DW_OP_const1u, 63, DW_OP_and, DW_OP_const1u, 37, DW_OP_ge,
4745 DW_OP_lit2, DW_OP_shl, DW_OP_plus,
4746 DW_CFA_nop, DW_CFA_nop
4747 };
4748
765e526c 4749static const struct elf_x86_lazy_plt_layout elf_i386_nacl_plt =
a27e4371
RM
4750 {
4751 elf_i386_nacl_plt0_entry, /* plt0_entry */
4752 sizeof (elf_i386_nacl_plt0_entry), /* plt0_entry_size */
a27e4371
RM
4753 elf_i386_nacl_plt_entry, /* plt_entry */
4754 NACL_PLT_ENTRY_SIZE, /* plt_entry_size */
92e68c1d
L
4755 NULL, /* plt_tlsdesc_entry */
4756 0, /* plt_tlsdesc_entry_size*/
4757 0, /* plt_tlsdesc_got1_offset */
4758 0, /* plt_tlsdesc_got2_offset */
4759 0, /* plt_tlsdesc_got1_insn_end */
4760 0, /* plt_tlsdesc_got2_insn_end */
765e526c
L
4761 2, /* plt0_got1_offset */
4762 8, /* plt0_got2_offset */
4763 0, /* plt0_got2_insn_end */
a27e4371
RM
4764 2, /* plt_got_offset */
4765 33, /* plt_reloc_offset */
4766 38, /* plt_plt_offset */
765e526c
L
4767 0, /* plt_got_insn_size */
4768 0, /* plt_plt_insn_end */
a27e4371
RM
4769 32, /* plt_lazy_offset */
4770 elf_i386_nacl_pic_plt0_entry, /* pic_plt0_entry */
4771 elf_i386_nacl_pic_plt_entry, /* pic_plt_entry */
4772 elf_i386_nacl_eh_frame_plt, /* eh_frame_plt */
f604c2a2 4773 sizeof (elf_i386_nacl_eh_frame_plt) /* eh_frame_plt_size */
a27e4371
RM
4774 };
4775
851b6fa1 4776static const struct elf_x86_backend_data elf_i386_nacl_arch_bed =
a27e4371 4777 {
07d6d2b8 4778 is_nacl /* os */
a27e4371
RM
4779 };
4780
64b384e1
RM
4781static bfd_boolean
4782elf32_i386_nacl_elf_object_p (bfd *abfd)
4783{
4784 /* Set the right machine number for a NaCl i386 ELF32 file. */
4785 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_i386_i386_nacl);
4786 return TRUE;
4787}
4788
a27e4371
RM
4789#undef elf_backend_arch_data
4790#define elf_backend_arch_data &elf_i386_nacl_arch_bed
4791
64b384e1
RM
4792#undef elf_backend_object_p
4793#define elf_backend_object_p elf32_i386_nacl_elf_object_p
5a68afcf
RM
4794#undef elf_backend_modify_segment_map
4795#define elf_backend_modify_segment_map nacl_modify_segment_map
6d6c25c8
AM
4796#undef elf_backend_modify_headers
4797#define elf_backend_modify_headers nacl_modify_headers
887badb3
RM
4798#undef elf_backend_final_write_processing
4799#define elf_backend_final_write_processing nacl_final_write_processing
5a68afcf 4800
a27e4371
RM
4801#include "elf32-target.h"
4802
5a68afcf 4803/* Restore defaults. */
64b384e1 4804#undef elf_backend_object_p
5a68afcf 4805#undef elf_backend_modify_segment_map
6d6c25c8 4806#undef elf_backend_modify_headers
887badb3 4807#undef elf_backend_final_write_processing
5a68afcf 4808
eac338cf
PB
4809/* VxWorks support. */
4810
4811#undef TARGET_LITTLE_SYM
6d00b590 4812#define TARGET_LITTLE_SYM i386_elf32_vxworks_vec
eac338cf
PB
4813#undef TARGET_LITTLE_NAME
4814#define TARGET_LITTLE_NAME "elf32-i386-vxworks"
d1036acb 4815#undef ELF_OSABI
1587442d
L
4816#undef ELF_MAXPAGESIZE
4817#define ELF_MAXPAGESIZE 0x1000
a27e4371
RM
4818#undef elf_backend_plt_alignment
4819#define elf_backend_plt_alignment 4
eac338cf 4820
851b6fa1 4821static const struct elf_x86_backend_data elf_i386_vxworks_arch_bed =
23209a78 4822 {
07d6d2b8 4823 is_vxworks /* os */
23209a78 4824 };
eac338cf 4825
23209a78
RM
4826#undef elf_backend_arch_data
4827#define elf_backend_arch_data &elf_i386_vxworks_arch_bed
eac338cf 4828
13285a1b 4829#undef elf_backend_relocs_compatible
eac338cf
PB
4830#undef elf_backend_add_symbol_hook
4831#define elf_backend_add_symbol_hook \
4832 elf_vxworks_add_symbol_hook
4833#undef elf_backend_link_output_symbol_hook
4834#define elf_backend_link_output_symbol_hook \
9c72ff84 4835 elf_vxworks_link_output_symbol_hook
eac338cf
PB
4836#undef elf_backend_emit_relocs
4837#define elf_backend_emit_relocs elf_vxworks_emit_relocs
4838#undef elf_backend_final_write_processing
4839#define elf_backend_final_write_processing \
4840 elf_vxworks_final_write_processing
7dc98aea 4841#undef elf_backend_static_tls_alignment
eac338cf
PB
4842
4843/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
4844 define it. */
4845#undef elf_backend_want_plt_sym
4846#define elf_backend_want_plt_sym 1
4847
4848#undef elf32_bed
4849#define elf32_bed elf32_i386_vxworks_bed
4850
4851#include "elf32-target.h"
This page took 1.566361 seconds and 4 git commands to generate.