gdb: add target_ops::supports_displaced_step
[deliverable/binutils-gdb.git] / bfd / elf32-i386.c
1 /* Intel 80386/80486-specific support for 32-bit ELF
2 Copyright (C) 1993-2020 Free Software Foundation, Inc.
3
4 This file is part of BFD, the Binary File Descriptor library.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
20
21 #include "elfxx-x86.h"
22 #include "elf-nacl.h"
23 #include "elf-vxworks.h"
24 #include "dwarf2.h"
25 #include "opcode/i386.h"
26
27 /* 386 uses REL relocations instead of RELA. */
28 #define USE_REL 1
29
30 #include "elf/i386.h"
31
32 static reloc_howto_type elf_howto_table[]=
33 {
34 HOWTO(R_386_NONE, 0, 3, 0, FALSE, 0, complain_overflow_dont,
35 bfd_elf_generic_reloc, "R_386_NONE",
36 TRUE, 0x00000000, 0x00000000, FALSE),
37 HOWTO(R_386_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
38 bfd_elf_generic_reloc, "R_386_32",
39 TRUE, 0xffffffff, 0xffffffff, FALSE),
40 HOWTO(R_386_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
41 bfd_elf_generic_reloc, "R_386_PC32",
42 TRUE, 0xffffffff, 0xffffffff, TRUE),
43 HOWTO(R_386_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
44 bfd_elf_generic_reloc, "R_386_GOT32",
45 TRUE, 0xffffffff, 0xffffffff, FALSE),
46 HOWTO(R_386_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
47 bfd_elf_generic_reloc, "R_386_PLT32",
48 TRUE, 0xffffffff, 0xffffffff, TRUE),
49 HOWTO(R_386_COPY, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
50 bfd_elf_generic_reloc, "R_386_COPY",
51 TRUE, 0xffffffff, 0xffffffff, FALSE),
52 HOWTO(R_386_GLOB_DAT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
53 bfd_elf_generic_reloc, "R_386_GLOB_DAT",
54 TRUE, 0xffffffff, 0xffffffff, FALSE),
55 HOWTO(R_386_JUMP_SLOT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
56 bfd_elf_generic_reloc, "R_386_JUMP_SLOT",
57 TRUE, 0xffffffff, 0xffffffff, FALSE),
58 HOWTO(R_386_RELATIVE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
59 bfd_elf_generic_reloc, "R_386_RELATIVE",
60 TRUE, 0xffffffff, 0xffffffff, FALSE),
61 HOWTO(R_386_GOTOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
62 bfd_elf_generic_reloc, "R_386_GOTOFF",
63 TRUE, 0xffffffff, 0xffffffff, FALSE),
64 HOWTO(R_386_GOTPC, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
65 bfd_elf_generic_reloc, "R_386_GOTPC",
66 TRUE, 0xffffffff, 0xffffffff, TRUE),
67
68 /* We have a gap in the reloc numbers here.
69 R_386_standard counts the number up to this point, and
70 R_386_ext_offset is the value to subtract from a reloc type of
71 R_386_16 thru R_386_PC8 to form an index into this table. */
72 #define R_386_standard (R_386_GOTPC + 1)
73 #define R_386_ext_offset (R_386_TLS_TPOFF - R_386_standard)
74
75 /* These relocs are a GNU extension. */
76 HOWTO(R_386_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
77 bfd_elf_generic_reloc, "R_386_TLS_TPOFF",
78 TRUE, 0xffffffff, 0xffffffff, FALSE),
79 HOWTO(R_386_TLS_IE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
80 bfd_elf_generic_reloc, "R_386_TLS_IE",
81 TRUE, 0xffffffff, 0xffffffff, FALSE),
82 HOWTO(R_386_TLS_GOTIE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
83 bfd_elf_generic_reloc, "R_386_TLS_GOTIE",
84 TRUE, 0xffffffff, 0xffffffff, FALSE),
85 HOWTO(R_386_TLS_LE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
86 bfd_elf_generic_reloc, "R_386_TLS_LE",
87 TRUE, 0xffffffff, 0xffffffff, FALSE),
88 HOWTO(R_386_TLS_GD, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
89 bfd_elf_generic_reloc, "R_386_TLS_GD",
90 TRUE, 0xffffffff, 0xffffffff, FALSE),
91 HOWTO(R_386_TLS_LDM, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
92 bfd_elf_generic_reloc, "R_386_TLS_LDM",
93 TRUE, 0xffffffff, 0xffffffff, FALSE),
94 HOWTO(R_386_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
95 bfd_elf_generic_reloc, "R_386_16",
96 TRUE, 0xffff, 0xffff, FALSE),
97 HOWTO(R_386_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
98 bfd_elf_generic_reloc, "R_386_PC16",
99 TRUE, 0xffff, 0xffff, TRUE),
100 HOWTO(R_386_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
101 bfd_elf_generic_reloc, "R_386_8",
102 TRUE, 0xff, 0xff, FALSE),
103 HOWTO(R_386_PC8, 0, 0, 8, TRUE, 0, complain_overflow_signed,
104 bfd_elf_generic_reloc, "R_386_PC8",
105 TRUE, 0xff, 0xff, TRUE),
106
107 #define R_386_ext (R_386_PC8 + 1 - R_386_ext_offset)
108 #define R_386_tls_offset (R_386_TLS_LDO_32 - R_386_ext)
109 /* These are common with Solaris TLS implementation. */
110 HOWTO(R_386_TLS_LDO_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
111 bfd_elf_generic_reloc, "R_386_TLS_LDO_32",
112 TRUE, 0xffffffff, 0xffffffff, FALSE),
113 HOWTO(R_386_TLS_IE_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
114 bfd_elf_generic_reloc, "R_386_TLS_IE_32",
115 TRUE, 0xffffffff, 0xffffffff, FALSE),
116 HOWTO(R_386_TLS_LE_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
117 bfd_elf_generic_reloc, "R_386_TLS_LE_32",
118 TRUE, 0xffffffff, 0xffffffff, FALSE),
119 HOWTO(R_386_TLS_DTPMOD32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
120 bfd_elf_generic_reloc, "R_386_TLS_DTPMOD32",
121 TRUE, 0xffffffff, 0xffffffff, FALSE),
122 HOWTO(R_386_TLS_DTPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
123 bfd_elf_generic_reloc, "R_386_TLS_DTPOFF32",
124 TRUE, 0xffffffff, 0xffffffff, FALSE),
125 HOWTO(R_386_TLS_TPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
126 bfd_elf_generic_reloc, "R_386_TLS_TPOFF32",
127 TRUE, 0xffffffff, 0xffffffff, FALSE),
128 HOWTO(R_386_SIZE32, 0, 2, 32, FALSE, 0, complain_overflow_unsigned,
129 bfd_elf_generic_reloc, "R_386_SIZE32",
130 TRUE, 0xffffffff, 0xffffffff, FALSE),
131 HOWTO(R_386_TLS_GOTDESC, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
132 bfd_elf_generic_reloc, "R_386_TLS_GOTDESC",
133 TRUE, 0xffffffff, 0xffffffff, FALSE),
134 HOWTO(R_386_TLS_DESC_CALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
135 bfd_elf_generic_reloc, "R_386_TLS_DESC_CALL",
136 FALSE, 0, 0, FALSE),
137 HOWTO(R_386_TLS_DESC, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
138 bfd_elf_generic_reloc, "R_386_TLS_DESC",
139 TRUE, 0xffffffff, 0xffffffff, FALSE),
140 HOWTO(R_386_IRELATIVE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
141 bfd_elf_generic_reloc, "R_386_IRELATIVE",
142 TRUE, 0xffffffff, 0xffffffff, FALSE),
143 HOWTO(R_386_GOT32X, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
144 bfd_elf_generic_reloc, "R_386_GOT32X",
145 TRUE, 0xffffffff, 0xffffffff, FALSE),
146
147 /* Another gap. */
148 #define R_386_ext2 (R_386_GOT32X + 1 - R_386_tls_offset)
149 #define R_386_vt_offset (R_386_GNU_VTINHERIT - R_386_ext2)
150
151 /* GNU extension to record C++ vtable hierarchy. */
152 HOWTO (R_386_GNU_VTINHERIT, /* type */
153 0, /* rightshift */
154 2, /* size (0 = byte, 1 = short, 2 = long) */
155 0, /* bitsize */
156 FALSE, /* pc_relative */
157 0, /* bitpos */
158 complain_overflow_dont, /* complain_on_overflow */
159 NULL, /* special_function */
160 "R_386_GNU_VTINHERIT", /* name */
161 FALSE, /* partial_inplace */
162 0, /* src_mask */
163 0, /* dst_mask */
164 FALSE), /* pcrel_offset */
165
166 /* GNU extension to record C++ vtable member usage. */
167 HOWTO (R_386_GNU_VTENTRY, /* type */
168 0, /* rightshift */
169 2, /* size (0 = byte, 1 = short, 2 = long) */
170 0, /* bitsize */
171 FALSE, /* pc_relative */
172 0, /* bitpos */
173 complain_overflow_dont, /* complain_on_overflow */
174 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
175 "R_386_GNU_VTENTRY", /* name */
176 FALSE, /* partial_inplace */
177 0, /* src_mask */
178 0, /* dst_mask */
179 FALSE) /* pcrel_offset */
180
181 #define R_386_vt (R_386_GNU_VTENTRY + 1 - R_386_vt_offset)
182
183 };
184
185 #define X86_PCREL_TYPE_P(TYPE) ((TYPE) == R_386_PC32)
186
187 #define X86_SIZE_TYPE_P(TYPE) ((TYPE) == R_386_SIZE32)
188
189 #ifdef DEBUG_GEN_RELOC
190 #define TRACE(str) \
191 fprintf (stderr, "i386 bfd reloc lookup %d (%s)\n", code, str)
192 #else
193 #define TRACE(str)
194 #endif
195
196 static reloc_howto_type *
197 elf_i386_reloc_type_lookup (bfd *abfd,
198 bfd_reloc_code_real_type code)
199 {
200 switch (code)
201 {
202 case BFD_RELOC_NONE:
203 TRACE ("BFD_RELOC_NONE");
204 return &elf_howto_table[R_386_NONE];
205
206 case BFD_RELOC_32:
207 TRACE ("BFD_RELOC_32");
208 return &elf_howto_table[R_386_32];
209
210 case BFD_RELOC_CTOR:
211 TRACE ("BFD_RELOC_CTOR");
212 return &elf_howto_table[R_386_32];
213
214 case BFD_RELOC_32_PCREL:
215 TRACE ("BFD_RELOC_PC32");
216 return &elf_howto_table[R_386_PC32];
217
218 case BFD_RELOC_386_GOT32:
219 TRACE ("BFD_RELOC_386_GOT32");
220 return &elf_howto_table[R_386_GOT32];
221
222 case BFD_RELOC_386_PLT32:
223 TRACE ("BFD_RELOC_386_PLT32");
224 return &elf_howto_table[R_386_PLT32];
225
226 case BFD_RELOC_386_COPY:
227 TRACE ("BFD_RELOC_386_COPY");
228 return &elf_howto_table[R_386_COPY];
229
230 case BFD_RELOC_386_GLOB_DAT:
231 TRACE ("BFD_RELOC_386_GLOB_DAT");
232 return &elf_howto_table[R_386_GLOB_DAT];
233
234 case BFD_RELOC_386_JUMP_SLOT:
235 TRACE ("BFD_RELOC_386_JUMP_SLOT");
236 return &elf_howto_table[R_386_JUMP_SLOT];
237
238 case BFD_RELOC_386_RELATIVE:
239 TRACE ("BFD_RELOC_386_RELATIVE");
240 return &elf_howto_table[R_386_RELATIVE];
241
242 case BFD_RELOC_386_GOTOFF:
243 TRACE ("BFD_RELOC_386_GOTOFF");
244 return &elf_howto_table[R_386_GOTOFF];
245
246 case BFD_RELOC_386_GOTPC:
247 TRACE ("BFD_RELOC_386_GOTPC");
248 return &elf_howto_table[R_386_GOTPC];
249
250 /* These relocs are a GNU extension. */
251 case BFD_RELOC_386_TLS_TPOFF:
252 TRACE ("BFD_RELOC_386_TLS_TPOFF");
253 return &elf_howto_table[R_386_TLS_TPOFF - R_386_ext_offset];
254
255 case BFD_RELOC_386_TLS_IE:
256 TRACE ("BFD_RELOC_386_TLS_IE");
257 return &elf_howto_table[R_386_TLS_IE - R_386_ext_offset];
258
259 case BFD_RELOC_386_TLS_GOTIE:
260 TRACE ("BFD_RELOC_386_TLS_GOTIE");
261 return &elf_howto_table[R_386_TLS_GOTIE - R_386_ext_offset];
262
263 case BFD_RELOC_386_TLS_LE:
264 TRACE ("BFD_RELOC_386_TLS_LE");
265 return &elf_howto_table[R_386_TLS_LE - R_386_ext_offset];
266
267 case BFD_RELOC_386_TLS_GD:
268 TRACE ("BFD_RELOC_386_TLS_GD");
269 return &elf_howto_table[R_386_TLS_GD - R_386_ext_offset];
270
271 case BFD_RELOC_386_TLS_LDM:
272 TRACE ("BFD_RELOC_386_TLS_LDM");
273 return &elf_howto_table[R_386_TLS_LDM - R_386_ext_offset];
274
275 case BFD_RELOC_16:
276 TRACE ("BFD_RELOC_16");
277 return &elf_howto_table[R_386_16 - R_386_ext_offset];
278
279 case BFD_RELOC_16_PCREL:
280 TRACE ("BFD_RELOC_16_PCREL");
281 return &elf_howto_table[R_386_PC16 - R_386_ext_offset];
282
283 case BFD_RELOC_8:
284 TRACE ("BFD_RELOC_8");
285 return &elf_howto_table[R_386_8 - R_386_ext_offset];
286
287 case BFD_RELOC_8_PCREL:
288 TRACE ("BFD_RELOC_8_PCREL");
289 return &elf_howto_table[R_386_PC8 - R_386_ext_offset];
290
291 /* Common with Sun TLS implementation. */
292 case BFD_RELOC_386_TLS_LDO_32:
293 TRACE ("BFD_RELOC_386_TLS_LDO_32");
294 return &elf_howto_table[R_386_TLS_LDO_32 - R_386_tls_offset];
295
296 case BFD_RELOC_386_TLS_IE_32:
297 TRACE ("BFD_RELOC_386_TLS_IE_32");
298 return &elf_howto_table[R_386_TLS_IE_32 - R_386_tls_offset];
299
300 case BFD_RELOC_386_TLS_LE_32:
301 TRACE ("BFD_RELOC_386_TLS_LE_32");
302 return &elf_howto_table[R_386_TLS_LE_32 - R_386_tls_offset];
303
304 case BFD_RELOC_386_TLS_DTPMOD32:
305 TRACE ("BFD_RELOC_386_TLS_DTPMOD32");
306 return &elf_howto_table[R_386_TLS_DTPMOD32 - R_386_tls_offset];
307
308 case BFD_RELOC_386_TLS_DTPOFF32:
309 TRACE ("BFD_RELOC_386_TLS_DTPOFF32");
310 return &elf_howto_table[R_386_TLS_DTPOFF32 - R_386_tls_offset];
311
312 case BFD_RELOC_386_TLS_TPOFF32:
313 TRACE ("BFD_RELOC_386_TLS_TPOFF32");
314 return &elf_howto_table[R_386_TLS_TPOFF32 - R_386_tls_offset];
315
316 case BFD_RELOC_SIZE32:
317 TRACE ("BFD_RELOC_SIZE32");
318 return &elf_howto_table[R_386_SIZE32 - R_386_tls_offset];
319
320 case BFD_RELOC_386_TLS_GOTDESC:
321 TRACE ("BFD_RELOC_386_TLS_GOTDESC");
322 return &elf_howto_table[R_386_TLS_GOTDESC - R_386_tls_offset];
323
324 case BFD_RELOC_386_TLS_DESC_CALL:
325 TRACE ("BFD_RELOC_386_TLS_DESC_CALL");
326 return &elf_howto_table[R_386_TLS_DESC_CALL - R_386_tls_offset];
327
328 case BFD_RELOC_386_TLS_DESC:
329 TRACE ("BFD_RELOC_386_TLS_DESC");
330 return &elf_howto_table[R_386_TLS_DESC - R_386_tls_offset];
331
332 case BFD_RELOC_386_IRELATIVE:
333 TRACE ("BFD_RELOC_386_IRELATIVE");
334 return &elf_howto_table[R_386_IRELATIVE - R_386_tls_offset];
335
336 case BFD_RELOC_386_GOT32X:
337 TRACE ("BFD_RELOC_386_GOT32X");
338 return &elf_howto_table[R_386_GOT32X - R_386_tls_offset];
339
340 case BFD_RELOC_VTABLE_INHERIT:
341 TRACE ("BFD_RELOC_VTABLE_INHERIT");
342 return &elf_howto_table[R_386_GNU_VTINHERIT - R_386_vt_offset];
343
344 case BFD_RELOC_VTABLE_ENTRY:
345 TRACE ("BFD_RELOC_VTABLE_ENTRY");
346 return &elf_howto_table[R_386_GNU_VTENTRY - R_386_vt_offset];
347
348 default:
349 TRACE ("Unknown");
350 /* xgettext:c-format */
351 _bfd_error_handler (_("%pB: unsupported relocation type: %#x"),
352 abfd, (int) code);
353 bfd_set_error (bfd_error_bad_value);
354 return NULL;
355 }
356 }
357
358 static reloc_howto_type *
359 elf_i386_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
360 const char *r_name)
361 {
362 unsigned int i;
363
364 for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
365 if (elf_howto_table[i].name != NULL
366 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
367 return &elf_howto_table[i];
368
369 return NULL;
370 }
371
372 static reloc_howto_type *
373 elf_i386_rtype_to_howto (unsigned r_type)
374 {
375 unsigned int indx;
376
377 if ((indx = r_type) >= R_386_standard
378 && ((indx = r_type - R_386_ext_offset) - R_386_standard
379 >= R_386_ext - R_386_standard)
380 && ((indx = r_type - R_386_tls_offset) - R_386_ext
381 >= R_386_ext2 - R_386_ext)
382 && ((indx = r_type - R_386_vt_offset) - R_386_ext2
383 >= R_386_vt - R_386_ext2))
384 return NULL;
385 /* PR 17512: file: 0f67f69d. */
386 if (elf_howto_table [indx].type != r_type)
387 return NULL;
388 return &elf_howto_table[indx];
389 }
390
391 static bfd_boolean
392 elf_i386_info_to_howto_rel (bfd *abfd,
393 arelent *cache_ptr,
394 Elf_Internal_Rela *dst)
395 {
396 unsigned int r_type = ELF32_R_TYPE (dst->r_info);
397
398 if ((cache_ptr->howto = elf_i386_rtype_to_howto (r_type)) == NULL)
399 {
400 /* xgettext:c-format */
401 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
402 abfd, r_type);
403 bfd_set_error (bfd_error_bad_value);
404 return FALSE;
405 }
406
407 return TRUE;
408 }
409
410 /* Return whether a symbol name implies a local label. The UnixWare
411 2.1 cc generates temporary symbols that start with .X, so we
412 recognize them here. FIXME: do other SVR4 compilers also use .X?.
413 If so, we should move the .X recognition into
414 _bfd_elf_is_local_label_name. */
415
416 static bfd_boolean
417 elf_i386_is_local_label_name (bfd *abfd, const char *name)
418 {
419 if (name[0] == '.' && name[1] == 'X')
420 return TRUE;
421
422 return _bfd_elf_is_local_label_name (abfd, name);
423 }
424 \f
425 /* Support for core dump NOTE sections. */
426
427 static bfd_boolean
428 elf_i386_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
429 {
430 int offset;
431 size_t size;
432
433 if (note->namesz == 8 && strcmp (note->namedata, "FreeBSD") == 0)
434 {
435 int pr_version = bfd_get_32 (abfd, note->descdata);
436
437 if (pr_version != 1)
438 return FALSE;
439
440 /* pr_cursig */
441 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 20);
442
443 /* pr_pid */
444 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
445
446 /* pr_reg */
447 offset = 28;
448 size = bfd_get_32 (abfd, note->descdata + 8);
449 }
450 else
451 {
452 switch (note->descsz)
453 {
454 default:
455 return FALSE;
456
457 case 144: /* Linux/i386 */
458 /* pr_cursig */
459 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
460
461 /* pr_pid */
462 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
463
464 /* pr_reg */
465 offset = 72;
466 size = 68;
467
468 break;
469 }
470 }
471
472 /* Make a ".reg/999" section. */
473 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
474 size, note->descpos + offset);
475 }
476
477 static bfd_boolean
478 elf_i386_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
479 {
480 if (note->namesz == 8 && strcmp (note->namedata, "FreeBSD") == 0)
481 {
482 int pr_version = bfd_get_32 (abfd, note->descdata);
483
484 if (pr_version != 1)
485 return FALSE;
486
487 elf_tdata (abfd)->core->program
488 = _bfd_elfcore_strndup (abfd, note->descdata + 8, 17);
489 elf_tdata (abfd)->core->command
490 = _bfd_elfcore_strndup (abfd, note->descdata + 25, 81);
491 }
492 else
493 {
494 switch (note->descsz)
495 {
496 default:
497 return FALSE;
498
499 case 124: /* Linux/i386 elf_prpsinfo. */
500 elf_tdata (abfd)->core->pid
501 = bfd_get_32 (abfd, note->descdata + 12);
502 elf_tdata (abfd)->core->program
503 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
504 elf_tdata (abfd)->core->command
505 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
506 }
507 }
508
509 /* Note that for some reason, a spurious space is tacked
510 onto the end of the args in some (at least one anyway)
511 implementations, so strip it off if it exists. */
512 {
513 char *command = elf_tdata (abfd)->core->command;
514 int n = strlen (command);
515
516 if (0 < n && command[n - 1] == ' ')
517 command[n - 1] = '\0';
518 }
519
520 return TRUE;
521 }
522 \f
523 /* Functions for the i386 ELF linker.
524
525 In order to gain some understanding of code in this file without
526 knowing all the intricate details of the linker, note the
527 following:
528
529 Functions named elf_i386_* are called by external routines, other
530 functions are only called locally. elf_i386_* functions appear
531 in this file more or less in the order in which they are called
532 from external routines. eg. elf_i386_check_relocs is called
533 early in the link process, elf_i386_finish_dynamic_sections is
534 one of the last functions. */
535
536 /* The size in bytes of an entry in the lazy procedure linkage table. */
537
538 #define LAZY_PLT_ENTRY_SIZE 16
539
540 /* The size in bytes of an entry in the non-lazy procedure linkage
541 table. */
542
543 #define NON_LAZY_PLT_ENTRY_SIZE 8
544
545 /* The first entry in an absolute lazy procedure linkage table looks
546 like this. See the SVR4 ABI i386 supplement to see how this works.
547 Will be padded to LAZY_PLT_ENTRY_SIZE with lazy_plt->plt0_pad_byte. */
548
549 static const bfd_byte elf_i386_lazy_plt0_entry[12] =
550 {
551 0xff, 0x35, /* pushl contents of address */
552 0, 0, 0, 0, /* replaced with address of .got + 4. */
553 0xff, 0x25, /* jmp indirect */
554 0, 0, 0, 0 /* replaced with address of .got + 8. */
555 };
556
557 /* Subsequent entries in an absolute lazy procedure linkage table look
558 like this. */
559
560 static const bfd_byte elf_i386_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
561 {
562 0xff, 0x25, /* jmp indirect */
563 0, 0, 0, 0, /* replaced with address of this symbol in .got. */
564 0x68, /* pushl immediate */
565 0, 0, 0, 0, /* replaced with offset into relocation table. */
566 0xe9, /* jmp relative */
567 0, 0, 0, 0 /* replaced with offset to start of .plt. */
568 };
569
570 /* The first entry in a PIC lazy procedure linkage table look like
571 this. Will be padded to LAZY_PLT_ENTRY_SIZE with
572 lazy_plt->plt0_pad_byte. */
573
574 static const bfd_byte elf_i386_pic_lazy_plt0_entry[12] =
575 {
576 0xff, 0xb3, 4, 0, 0, 0, /* pushl 4(%ebx) */
577 0xff, 0xa3, 8, 0, 0, 0 /* jmp *8(%ebx) */
578 };
579
580 /* Subsequent entries in a PIC lazy procedure linkage table look like
581 this. */
582
583 static const bfd_byte elf_i386_pic_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
584 {
585 0xff, 0xa3, /* jmp *offset(%ebx) */
586 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
587 0x68, /* pushl immediate */
588 0, 0, 0, 0, /* replaced with offset into relocation table. */
589 0xe9, /* jmp relative */
590 0, 0, 0, 0 /* replaced with offset to start of .plt. */
591 };
592
593 /* Entries in the non-lazy procedure linkage table look like this. */
594
595 static const bfd_byte elf_i386_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
596 {
597 0xff, 0x25, /* jmp indirect */
598 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
599 0x66, 0x90 /* xchg %ax,%ax */
600 };
601
602 /* Entries in the PIC non-lazy procedure linkage table look like
603 this. */
604
605 static const bfd_byte elf_i386_pic_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
606 {
607 0xff, 0xa3, /* jmp *offset(%ebx) */
608 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
609 0x66, 0x90 /* xchg %ax,%ax */
610 };
611
612 /* The first entry in an absolute IBT-enabled lazy procedure linkage
613 table looks like this. */
614
615 static const bfd_byte elf_i386_lazy_ibt_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
616 {
617 0xff, 0x35, 0, 0, 0, 0, /* pushl GOT[1] */
618 0xff, 0x25, 0, 0, 0, 0, /* jmp *GOT[2] */
619 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
620 };
621
622 /* Subsequent entries for an absolute IBT-enabled lazy procedure linkage
623 table look like this. Subsequent entries for a PIC IBT-enabled lazy
624 procedure linkage table are the same. */
625
626 static const bfd_byte elf_i386_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
627 {
628 0xf3, 0x0f, 0x1e, 0xfb, /* endbr32 */
629 0x68, 0, 0, 0, 0, /* pushl immediate */
630 0xe9, 0, 0, 0, 0, /* jmp relative */
631 0x66, 0x90 /* xchg %ax,%ax */
632 };
633
634 /* The first entry in a PIC IBT-enabled lazy procedure linkage table
635 look like. */
636
637 static const bfd_byte elf_i386_pic_lazy_ibt_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
638 {
639 0xff, 0xb3, 4, 0, 0, 0, /* pushl 4(%ebx) */
640 0xff, 0xa3, 8, 0, 0, 0, /* jmp *8(%ebx) */
641 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
642 };
643
644 /* Entries for branches with IBT-enabled in the absolute non-lazey
645 procedure linkage table look like this. They have the same size
646 as the lazy PLT entry. */
647
648 static const bfd_byte elf_i386_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
649 {
650 0xf3, 0x0f, 0x1e, 0xfb, /* endbr32 */
651 0xff, 0x25, 0, 0, 0, 0, /* jmp *name@GOT */
652 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
653 };
654
655 /* Entries for branches with IBT-enabled in the PIC non-lazey procedure
656 linkage table look like this. They have the same size as the lazy
657 PLT entry. */
658
659 static const bfd_byte elf_i386_pic_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
660 {
661 0xf3, 0x0f, 0x1e, 0xfb, /* endbr32 */
662 0xff, 0xa3, 0, 0, 0, 0, /* jmp *name@GOT(%ebx) */
663 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
664 };
665
666 /* .eh_frame covering the lazy .plt section. */
667
668 static const bfd_byte elf_i386_eh_frame_lazy_plt[] =
669 {
670 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
671 0, 0, 0, 0, /* CIE ID */
672 1, /* CIE version */
673 'z', 'R', 0, /* Augmentation string */
674 1, /* Code alignment factor */
675 0x7c, /* Data alignment factor */
676 8, /* Return address column */
677 1, /* Augmentation size */
678 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
679 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
680 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
681 DW_CFA_nop, DW_CFA_nop,
682
683 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
684 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
685 0, 0, 0, 0, /* R_386_PC32 .plt goes here */
686 0, 0, 0, 0, /* .plt size goes here */
687 0, /* Augmentation size */
688 DW_CFA_def_cfa_offset, 8, /* DW_CFA_def_cfa_offset: 8 */
689 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
690 DW_CFA_def_cfa_offset, 12, /* DW_CFA_def_cfa_offset: 12 */
691 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
692 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
693 11, /* Block length */
694 DW_OP_breg4, 4, /* DW_OP_breg4 (esp): 4 */
695 DW_OP_breg8, 0, /* DW_OP_breg8 (eip): 0 */
696 DW_OP_lit15, DW_OP_and, DW_OP_lit11, DW_OP_ge,
697 DW_OP_lit2, DW_OP_shl, DW_OP_plus,
698 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
699 };
700
701 /* .eh_frame covering the lazy .plt section with IBT-enabled. */
702
703 static const bfd_byte elf_i386_eh_frame_lazy_ibt_plt[] =
704 {
705 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
706 0, 0, 0, 0, /* CIE ID */
707 1, /* CIE version */
708 'z', 'R', 0, /* Augmentation string */
709 1, /* Code alignment factor */
710 0x7c, /* Data alignment factor */
711 8, /* Return address column */
712 1, /* Augmentation size */
713 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
714 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
715 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
716 DW_CFA_nop, DW_CFA_nop,
717
718 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
719 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
720 0, 0, 0, 0, /* R_386_PC32 .plt goes here */
721 0, 0, 0, 0, /* .plt size goes here */
722 0, /* Augmentation size */
723 DW_CFA_def_cfa_offset, 8, /* DW_CFA_def_cfa_offset: 8 */
724 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
725 DW_CFA_def_cfa_offset, 12, /* DW_CFA_def_cfa_offset: 12 */
726 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
727 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
728 11, /* Block length */
729 DW_OP_breg4, 4, /* DW_OP_breg4 (esp): 4 */
730 DW_OP_breg8, 0, /* DW_OP_breg8 (eip): 0 */
731 DW_OP_lit15, DW_OP_and, DW_OP_lit9, DW_OP_ge,
732 DW_OP_lit2, DW_OP_shl, DW_OP_plus,
733 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
734 };
735
736 /* .eh_frame covering the non-lazy .plt section. */
737
738 static const bfd_byte elf_i386_eh_frame_non_lazy_plt[] =
739 {
740 #define PLT_GOT_FDE_LENGTH 16
741 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
742 0, 0, 0, 0, /* CIE ID */
743 1, /* CIE version */
744 'z', 'R', 0, /* Augmentation string */
745 1, /* Code alignment factor */
746 0x7c, /* Data alignment factor */
747 8, /* Return address column */
748 1, /* Augmentation size */
749 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
750 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
751 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
752 DW_CFA_nop, DW_CFA_nop,
753
754 PLT_GOT_FDE_LENGTH, 0, 0, 0, /* FDE length */
755 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
756 0, 0, 0, 0, /* the start of non-lazy .plt goes here */
757 0, 0, 0, 0, /* non-lazy .plt size goes here */
758 0, /* Augmentation size */
759 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
760 };
761
762 /* These are the standard parameters. */
763 static const struct elf_x86_lazy_plt_layout elf_i386_lazy_plt =
764 {
765 elf_i386_lazy_plt0_entry, /* plt0_entry */
766 sizeof (elf_i386_lazy_plt0_entry), /* plt0_entry_size */
767 elf_i386_lazy_plt_entry, /* plt_entry */
768 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
769 NULL, /* plt_tlsdesc_entry */
770 0, /* plt_tlsdesc_entry_size*/
771 0, /* plt_tlsdesc_got1_offset */
772 0, /* plt_tlsdesc_got2_offset */
773 0, /* plt_tlsdesc_got1_insn_end */
774 0, /* plt_tlsdesc_got2_insn_end */
775 2, /* plt0_got1_offset */
776 8, /* plt0_got2_offset */
777 0, /* plt0_got2_insn_end */
778 2, /* plt_got_offset */
779 7, /* plt_reloc_offset */
780 12, /* plt_plt_offset */
781 0, /* plt_got_insn_size */
782 0, /* plt_plt_insn_end */
783 6, /* plt_lazy_offset */
784 elf_i386_pic_lazy_plt0_entry, /* pic_plt0_entry */
785 elf_i386_pic_lazy_plt_entry, /* pic_plt_entry */
786 elf_i386_eh_frame_lazy_plt, /* eh_frame_plt */
787 sizeof (elf_i386_eh_frame_lazy_plt) /* eh_frame_plt_size */
788 };
789
790 static const struct elf_x86_non_lazy_plt_layout elf_i386_non_lazy_plt =
791 {
792 elf_i386_non_lazy_plt_entry, /* plt_entry */
793 elf_i386_pic_non_lazy_plt_entry, /* pic_plt_entry */
794 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
795 2, /* plt_got_offset */
796 0, /* plt_got_insn_size */
797 elf_i386_eh_frame_non_lazy_plt, /* eh_frame_plt */
798 sizeof (elf_i386_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
799 };
800
801 static const struct elf_x86_lazy_plt_layout elf_i386_lazy_ibt_plt =
802 {
803 elf_i386_lazy_ibt_plt0_entry, /* plt0_entry */
804 sizeof (elf_i386_lazy_ibt_plt0_entry), /* plt0_entry_size */
805 elf_i386_lazy_ibt_plt_entry, /* plt_entry */
806 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
807 NULL, /* plt_tlsdesc_entry */
808 0, /* plt_tlsdesc_entry_size*/
809 0, /* plt_tlsdesc_got1_offset */
810 0, /* plt_tlsdesc_got2_offset */
811 0, /* plt_tlsdesc_got1_insn_end */
812 0, /* plt_tlsdesc_got2_insn_end */
813 2, /* plt0_got1_offset */
814 8, /* plt0_got2_offset */
815 0, /* plt0_got2_insn_end */
816 4+2, /* plt_got_offset */
817 4+1, /* plt_reloc_offset */
818 4+6, /* plt_plt_offset */
819 0, /* plt_got_insn_size */
820 0, /* plt_plt_insn_end */
821 0, /* plt_lazy_offset */
822 elf_i386_pic_lazy_ibt_plt0_entry, /* pic_plt0_entry */
823 elf_i386_lazy_ibt_plt_entry, /* pic_plt_entry */
824 elf_i386_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
825 sizeof (elf_i386_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
826 };
827
828 static const struct elf_x86_non_lazy_plt_layout elf_i386_non_lazy_ibt_plt =
829 {
830 elf_i386_non_lazy_ibt_plt_entry, /* plt_entry */
831 elf_i386_pic_non_lazy_ibt_plt_entry,/* pic_plt_entry */
832 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
833 4+2, /* plt_got_offset */
834 0, /* plt_got_insn_size */
835 elf_i386_eh_frame_non_lazy_plt, /* eh_frame_plt */
836 sizeof (elf_i386_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
837 };
838 \f
839
840 /* On VxWorks, the .rel.plt.unloaded section has absolute relocations
841 for the PLTResolve stub and then for each PLT entry. */
842 #define PLTRESOLVE_RELOCS_SHLIB 0
843 #define PLTRESOLVE_RELOCS 2
844 #define PLT_NON_JUMP_SLOT_RELOCS 2
845
846 /* These are the standard parameters. */
847 static const struct elf_x86_backend_data elf_i386_arch_bed =
848 {
849 is_normal /* os */
850 };
851
852 #define elf_backend_arch_data &elf_i386_arch_bed
853
854 /* Return TRUE if the TLS access code sequence support transition
855 from R_TYPE. */
856
857 static bfd_boolean
858 elf_i386_check_tls_transition (asection *sec,
859 bfd_byte *contents,
860 Elf_Internal_Shdr *symtab_hdr,
861 struct elf_link_hash_entry **sym_hashes,
862 unsigned int r_type,
863 const Elf_Internal_Rela *rel,
864 const Elf_Internal_Rela *relend)
865 {
866 unsigned int val, type, reg;
867 unsigned long r_symndx;
868 struct elf_link_hash_entry *h;
869 bfd_vma offset;
870 bfd_byte *call;
871 bfd_boolean indirect_call;
872
873 offset = rel->r_offset;
874 switch (r_type)
875 {
876 case R_386_TLS_GD:
877 case R_386_TLS_LDM:
878 if (offset < 2 || (rel + 1) >= relend)
879 return FALSE;
880
881 indirect_call = FALSE;
882 call = contents + offset + 4;
883 val = *(call - 5);
884 type = *(call - 6);
885 if (r_type == R_386_TLS_GD)
886 {
887 /* Check transition from GD access model. Only
888 leal foo@tlsgd(,%ebx,1), %eax
889 call ___tls_get_addr@PLT
890 or
891 leal foo@tlsgd(%ebx) %eax
892 call ___tls_get_addr@PLT
893 nop
894 or
895 leal foo@tlsgd(%reg), %eax
896 call *___tls_get_addr@GOT(%reg)
897 which may be converted to
898 addr32 call ___tls_get_addr
899 can transit to different access model. */
900 if ((offset + 10) > sec->size
901 || (type != 0x8d && type != 0x04))
902 return FALSE;
903
904 if (type == 0x04)
905 {
906 /* leal foo@tlsgd(,%ebx,1), %eax
907 call ___tls_get_addr@PLT */
908 if (offset < 3)
909 return FALSE;
910
911 if (*(call - 7) != 0x8d
912 || val != 0x1d
913 || call[0] != 0xe8)
914 return FALSE;
915 }
916 else
917 {
918 /* This must be
919 leal foo@tlsgd(%ebx), %eax
920 call ___tls_get_addr@PLT
921 nop
922 or
923 leal foo@tlsgd(%reg), %eax
924 call *___tls_get_addr@GOT(%reg)
925 which may be converted to
926 addr32 call ___tls_get_addr
927
928 %eax can't be used as the GOT base register since it
929 is used to pass parameter to ___tls_get_addr. */
930 reg = val & 7;
931 if ((val & 0xf8) != 0x80 || reg == 4 || reg == 0)
932 return FALSE;
933
934 indirect_call = call[0] == 0xff;
935 if (!(reg == 3 && call[0] == 0xe8 && call[5] == 0x90)
936 && !(call[0] == 0x67 && call[1] == 0xe8)
937 && !(indirect_call
938 && (call[1] & 0xf8) == 0x90
939 && (call[1] & 0x7) == reg))
940 return FALSE;
941 }
942 }
943 else
944 {
945 /* Check transition from LD access model. Only
946 leal foo@tlsldm(%ebx), %eax
947 call ___tls_get_addr@PLT
948 or
949 leal foo@tlsldm(%reg), %eax
950 call *___tls_get_addr@GOT(%reg)
951 which may be converted to
952 addr32 call ___tls_get_addr
953 can transit to different access model. */
954 if (type != 0x8d || (offset + 9) > sec->size)
955 return FALSE;
956
957 /* %eax can't be used as the GOT base register since it is
958 used to pass parameter to ___tls_get_addr. */
959 reg = val & 7;
960 if ((val & 0xf8) != 0x80 || reg == 4 || reg == 0)
961 return FALSE;
962
963 indirect_call = call[0] == 0xff;
964 if (!(reg == 3 && call[0] == 0xe8)
965 && !(call[0] == 0x67 && call[1] == 0xe8)
966 && !(indirect_call
967 && (call[1] & 0xf8) == 0x90
968 && (call[1] & 0x7) == reg))
969 return FALSE;
970 }
971
972 r_symndx = ELF32_R_SYM (rel[1].r_info);
973 if (r_symndx < symtab_hdr->sh_info)
974 return FALSE;
975
976 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
977 if (h == NULL
978 || !((struct elf_x86_link_hash_entry *) h)->tls_get_addr)
979 return FALSE;
980 else if (indirect_call)
981 return (ELF32_R_TYPE (rel[1].r_info) == R_386_GOT32X);
982 else
983 return (ELF32_R_TYPE (rel[1].r_info) == R_386_PC32
984 || ELF32_R_TYPE (rel[1].r_info) == R_386_PLT32);
985
986 case R_386_TLS_IE:
987 /* Check transition from IE access model:
988 movl foo@indntpoff(%rip), %eax
989 movl foo@indntpoff(%rip), %reg
990 addl foo@indntpoff(%rip), %reg
991 */
992
993 if (offset < 1 || (offset + 4) > sec->size)
994 return FALSE;
995
996 /* Check "movl foo@tpoff(%rip), %eax" first. */
997 val = bfd_get_8 (abfd, contents + offset - 1);
998 if (val == 0xa1)
999 return TRUE;
1000
1001 if (offset < 2)
1002 return FALSE;
1003
1004 /* Check movl|addl foo@tpoff(%rip), %reg. */
1005 type = bfd_get_8 (abfd, contents + offset - 2);
1006 return ((type == 0x8b || type == 0x03)
1007 && (val & 0xc7) == 0x05);
1008
1009 case R_386_TLS_GOTIE:
1010 case R_386_TLS_IE_32:
1011 /* Check transition from {IE_32,GOTIE} access model:
1012 subl foo@{tpoff,gontoff}(%reg1), %reg2
1013 movl foo@{tpoff,gontoff}(%reg1), %reg2
1014 addl foo@{tpoff,gontoff}(%reg1), %reg2
1015 */
1016
1017 if (offset < 2 || (offset + 4) > sec->size)
1018 return FALSE;
1019
1020 val = bfd_get_8 (abfd, contents + offset - 1);
1021 if ((val & 0xc0) != 0x80 || (val & 7) == 4)
1022 return FALSE;
1023
1024 type = bfd_get_8 (abfd, contents + offset - 2);
1025 return type == 0x8b || type == 0x2b || type == 0x03;
1026
1027 case R_386_TLS_GOTDESC:
1028 /* Check transition from GDesc access model:
1029 leal x@tlsdesc(%ebx), %eax
1030
1031 Make sure it's a leal adding ebx to a 32-bit offset
1032 into any register, although it's probably almost always
1033 going to be eax. */
1034
1035 if (offset < 2 || (offset + 4) > sec->size)
1036 return FALSE;
1037
1038 if (bfd_get_8 (abfd, contents + offset - 2) != 0x8d)
1039 return FALSE;
1040
1041 val = bfd_get_8 (abfd, contents + offset - 1);
1042 return (val & 0xc7) == 0x83;
1043
1044 case R_386_TLS_DESC_CALL:
1045 /* Check transition from GDesc access model:
1046 call *x@tlsdesc(%eax)
1047 */
1048 if (offset + 2 <= sec->size)
1049 {
1050 /* Make sure that it's a call *x@tlsdesc(%eax). */
1051 call = contents + offset;
1052 return call[0] == 0xff && call[1] == 0x10;
1053 }
1054
1055 return FALSE;
1056
1057 default:
1058 abort ();
1059 }
1060 }
1061
1062 /* Return TRUE if the TLS access transition is OK or no transition
1063 will be performed. Update R_TYPE if there is a transition. */
1064
1065 static bfd_boolean
1066 elf_i386_tls_transition (struct bfd_link_info *info, bfd *abfd,
1067 asection *sec, bfd_byte *contents,
1068 Elf_Internal_Shdr *symtab_hdr,
1069 struct elf_link_hash_entry **sym_hashes,
1070 unsigned int *r_type, int tls_type,
1071 const Elf_Internal_Rela *rel,
1072 const Elf_Internal_Rela *relend,
1073 struct elf_link_hash_entry *h,
1074 unsigned long r_symndx,
1075 bfd_boolean from_relocate_section)
1076 {
1077 unsigned int from_type = *r_type;
1078 unsigned int to_type = from_type;
1079 bfd_boolean check = TRUE;
1080
1081 /* Skip TLS transition for functions. */
1082 if (h != NULL
1083 && (h->type == STT_FUNC
1084 || h->type == STT_GNU_IFUNC))
1085 return TRUE;
1086
1087 switch (from_type)
1088 {
1089 case R_386_TLS_GD:
1090 case R_386_TLS_GOTDESC:
1091 case R_386_TLS_DESC_CALL:
1092 case R_386_TLS_IE_32:
1093 case R_386_TLS_IE:
1094 case R_386_TLS_GOTIE:
1095 if (bfd_link_executable (info))
1096 {
1097 if (h == NULL)
1098 to_type = R_386_TLS_LE_32;
1099 else if (from_type != R_386_TLS_IE
1100 && from_type != R_386_TLS_GOTIE)
1101 to_type = R_386_TLS_IE_32;
1102 }
1103
1104 /* When we are called from elf_i386_relocate_section, there may
1105 be additional transitions based on TLS_TYPE. */
1106 if (from_relocate_section)
1107 {
1108 unsigned int new_to_type = to_type;
1109
1110 if (TLS_TRANSITION_IE_TO_LE_P (info, h, tls_type))
1111 new_to_type = R_386_TLS_LE_32;
1112
1113 if (to_type == R_386_TLS_GD
1114 || to_type == R_386_TLS_GOTDESC
1115 || to_type == R_386_TLS_DESC_CALL)
1116 {
1117 if (tls_type == GOT_TLS_IE_POS)
1118 new_to_type = R_386_TLS_GOTIE;
1119 else if (tls_type & GOT_TLS_IE)
1120 new_to_type = R_386_TLS_IE_32;
1121 }
1122
1123 /* We checked the transition before when we were called from
1124 elf_i386_check_relocs. We only want to check the new
1125 transition which hasn't been checked before. */
1126 check = new_to_type != to_type && from_type == to_type;
1127 to_type = new_to_type;
1128 }
1129
1130 break;
1131
1132 case R_386_TLS_LDM:
1133 if (bfd_link_executable (info))
1134 to_type = R_386_TLS_LE_32;
1135 break;
1136
1137 default:
1138 return TRUE;
1139 }
1140
1141 /* Return TRUE if there is no transition. */
1142 if (from_type == to_type)
1143 return TRUE;
1144
1145 /* Check if the transition can be performed. */
1146 if (check
1147 && ! elf_i386_check_tls_transition (sec, contents,
1148 symtab_hdr, sym_hashes,
1149 from_type, rel, relend))
1150 {
1151 reloc_howto_type *from, *to;
1152 const char *name;
1153
1154 from = elf_i386_rtype_to_howto (from_type);
1155 to = elf_i386_rtype_to_howto (to_type);
1156
1157 if (h)
1158 name = h->root.root.string;
1159 else
1160 {
1161 struct elf_x86_link_hash_table *htab;
1162
1163 htab = elf_x86_hash_table (info, I386_ELF_DATA);
1164 if (htab == NULL)
1165 name = "*unknown*";
1166 else
1167 {
1168 Elf_Internal_Sym *isym;
1169
1170 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1171 abfd, r_symndx);
1172 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
1173 }
1174 }
1175
1176 _bfd_error_handler
1177 /* xgettext:c-format */
1178 (_("%pB: TLS transition from %s to %s against `%s'"
1179 " at %#" PRIx64 " in section `%pA' failed"),
1180 abfd, from->name, to->name, name,
1181 (uint64_t) rel->r_offset, sec);
1182 bfd_set_error (bfd_error_bad_value);
1183 return FALSE;
1184 }
1185
1186 *r_type = to_type;
1187 return TRUE;
1188 }
1189
1190 /* With the local symbol, foo, we convert
1191 mov foo@GOT[(%reg1)], %reg2
1192 to
1193 lea foo[@GOTOFF(%reg1)], %reg2
1194 and convert
1195 call/jmp *foo@GOT[(%reg)]
1196 to
1197 nop call foo/jmp foo nop
1198 When PIC is false, convert
1199 test %reg1, foo@GOT[(%reg2)]
1200 to
1201 test $foo, %reg1
1202 and convert
1203 binop foo@GOT[(%reg1)], %reg2
1204 to
1205 binop $foo, %reg2
1206 where binop is one of adc, add, and, cmp, or, sbb, sub, xor
1207 instructions. */
1208
1209 static
1210 bfd_boolean
1211 elf_i386_convert_load_reloc (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
1212 bfd_byte *contents,
1213 unsigned int *r_type_p,
1214 Elf_Internal_Rela *irel,
1215 struct elf_link_hash_entry *h,
1216 bfd_boolean *converted,
1217 struct bfd_link_info *link_info)
1218 {
1219 struct elf_x86_link_hash_table *htab;
1220 unsigned int opcode;
1221 unsigned int modrm;
1222 bfd_boolean baseless;
1223 Elf_Internal_Sym *isym;
1224 unsigned int addend;
1225 unsigned int nop;
1226 bfd_vma nop_offset;
1227 bfd_boolean is_pic;
1228 bfd_boolean to_reloc_32;
1229 bfd_boolean abs_symbol;
1230 unsigned int r_type;
1231 unsigned int r_symndx;
1232 bfd_vma roff = irel->r_offset;
1233 bfd_boolean local_ref;
1234 struct elf_x86_link_hash_entry *eh;
1235
1236 if (roff < 2)
1237 return TRUE;
1238
1239 /* Addend for R_386_GOT32X relocations must be 0. */
1240 addend = bfd_get_32 (abfd, contents + roff);
1241 if (addend != 0)
1242 return TRUE;
1243
1244 htab = elf_x86_hash_table (link_info, I386_ELF_DATA);
1245 is_pic = bfd_link_pic (link_info);
1246
1247 r_type = *r_type_p;
1248 r_symndx = ELF32_R_SYM (irel->r_info);
1249
1250 modrm = bfd_get_8 (abfd, contents + roff - 1);
1251 baseless = (modrm & 0xc7) == 0x5;
1252
1253 if (h)
1254 {
1255 /* NB: Also set linker_def via SYMBOL_REFERENCES_LOCAL_P. */
1256 local_ref = SYMBOL_REFERENCES_LOCAL_P (link_info, h);
1257 isym = NULL;
1258 abs_symbol = ABS_SYMBOL_P (h);
1259 }
1260 else
1261 {
1262 local_ref = TRUE;
1263 isym = bfd_sym_from_r_symndx (&htab->sym_cache, abfd,
1264 r_symndx);
1265 abs_symbol = isym->st_shndx == SHN_ABS;
1266 }
1267
1268 if (baseless && is_pic)
1269 {
1270 /* For PIC, disallow R_386_GOT32X without a base register
1271 since we don't know what the GOT base is. */
1272 const char *name;
1273
1274 if (h == NULL)
1275 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
1276 else
1277 name = h->root.root.string;
1278
1279 _bfd_error_handler
1280 /* xgettext:c-format */
1281 (_("%pB: direct GOT relocation R_386_GOT32X against `%s' without base"
1282 " register can not be used when making a shared object"),
1283 abfd, name);
1284 return FALSE;
1285 }
1286
1287 opcode = bfd_get_8 (abfd, contents + roff - 2);
1288
1289 /* Convert to R_386_32 if PIC is false or there is no base
1290 register. */
1291 to_reloc_32 = !is_pic || baseless;
1292
1293 eh = elf_x86_hash_entry (h);
1294
1295 /* Try to convert R_386_GOT32X. Get the symbol referred to by the
1296 reloc. */
1297 if (h == NULL)
1298 {
1299 if (opcode == 0x0ff)
1300 /* Convert "call/jmp *foo@GOT[(%reg)]". */
1301 goto convert_branch;
1302 else
1303 /* Convert "mov foo@GOT[(%reg1)], %reg2",
1304 "test %reg1, foo@GOT(%reg2)" and
1305 "binop foo@GOT[(%reg1)], %reg2". */
1306 goto convert_load;
1307 }
1308
1309 /* Undefined weak symbol is only bound locally in executable
1310 and its reference is resolved as 0. */
1311 if (h->root.type == bfd_link_hash_undefweak
1312 && !eh->linker_def
1313 && local_ref)
1314 {
1315 if (opcode == 0xff)
1316 {
1317 /* No direct branch to 0 for PIC. */
1318 if (is_pic)
1319 return TRUE;
1320 else
1321 goto convert_branch;
1322 }
1323 else
1324 {
1325 /* We can convert load of address 0 to R_386_32. */
1326 to_reloc_32 = TRUE;
1327 goto convert_load;
1328 }
1329 }
1330
1331 if (opcode == 0xff)
1332 {
1333 /* We have "call/jmp *foo@GOT[(%reg)]". */
1334 if ((h->root.type == bfd_link_hash_defined
1335 || h->root.type == bfd_link_hash_defweak)
1336 && local_ref)
1337 {
1338 /* The function is locally defined. */
1339 convert_branch:
1340 /* Convert R_386_GOT32X to R_386_PC32. */
1341 if (modrm == 0x15 || (modrm & 0xf8) == 0x90)
1342 {
1343 /* Convert to "nop call foo". ADDR_PREFIX_OPCODE
1344 is a nop prefix. */
1345 modrm = 0xe8;
1346 /* To support TLS optimization, always use addr32 prefix
1347 for "call *___tls_get_addr@GOT(%reg)". */
1348 if (eh && eh->tls_get_addr)
1349 {
1350 nop = 0x67;
1351 nop_offset = irel->r_offset - 2;
1352 }
1353 else
1354 {
1355 nop = htab->params->call_nop_byte;
1356 if (htab->params->call_nop_as_suffix)
1357 {
1358 nop_offset = roff + 3;
1359 irel->r_offset -= 1;
1360 }
1361 else
1362 nop_offset = roff - 2;
1363 }
1364 }
1365 else
1366 {
1367 /* Convert to "jmp foo nop". */
1368 modrm = 0xe9;
1369 nop = NOP_OPCODE;
1370 nop_offset = roff + 3;
1371 irel->r_offset -= 1;
1372 }
1373
1374 bfd_put_8 (abfd, nop, contents + nop_offset);
1375 bfd_put_8 (abfd, modrm, contents + irel->r_offset - 1);
1376 /* When converting to PC-relative relocation, we
1377 need to adjust addend by -4. */
1378 bfd_put_32 (abfd, -4, contents + irel->r_offset);
1379 irel->r_info = ELF32_R_INFO (r_symndx, R_386_PC32);
1380 *r_type_p = R_386_PC32;
1381 *converted = TRUE;
1382 }
1383 }
1384 else
1385 {
1386 /* We have "mov foo@GOT[(%re1g)], %reg2",
1387 "test %reg1, foo@GOT(%reg2)" and
1388 "binop foo@GOT[(%reg1)], %reg2".
1389
1390 Avoid optimizing _DYNAMIC since ld.so may use its
1391 link-time address. */
1392 if (h == htab->elf.hdynamic)
1393 return TRUE;
1394
1395 /* def_regular is set by an assignment in a linker script in
1396 bfd_elf_record_link_assignment. start_stop is set on
1397 __start_SECNAME/__stop_SECNAME which mark section SECNAME. */
1398 if (h->start_stop
1399 || eh->linker_def
1400 || ((h->def_regular
1401 || h->root.type == bfd_link_hash_defined
1402 || h->root.type == bfd_link_hash_defweak)
1403 && local_ref))
1404 {
1405 convert_load:
1406 if (opcode == 0x8b)
1407 {
1408 if (abs_symbol && local_ref)
1409 to_reloc_32 = TRUE;
1410
1411 if (to_reloc_32)
1412 {
1413 /* Convert "mov foo@GOT[(%reg1)], %reg2" to
1414 "mov $foo, %reg2" with R_386_32. */
1415 r_type = R_386_32;
1416 modrm = 0xc0 | (modrm & 0x38) >> 3;
1417 bfd_put_8 (abfd, modrm, contents + roff - 1);
1418 opcode = 0xc7;
1419 }
1420 else
1421 {
1422 /* Convert "mov foo@GOT(%reg1), %reg2" to
1423 "lea foo@GOTOFF(%reg1), %reg2". */
1424 r_type = R_386_GOTOFF;
1425 opcode = 0x8d;
1426 }
1427 }
1428 else
1429 {
1430 /* Only R_386_32 is supported. */
1431 if (!to_reloc_32)
1432 return TRUE;
1433
1434 if (opcode == 0x85)
1435 {
1436 /* Convert "test %reg1, foo@GOT(%reg2)" to
1437 "test $foo, %reg1". */
1438 modrm = 0xc0 | (modrm & 0x38) >> 3;
1439 opcode = 0xf7;
1440 }
1441 else
1442 {
1443 /* Convert "binop foo@GOT(%reg1), %reg2" to
1444 "binop $foo, %reg2". */
1445 modrm = (0xc0
1446 | (modrm & 0x38) >> 3
1447 | (opcode & 0x3c));
1448 opcode = 0x81;
1449 }
1450 bfd_put_8 (abfd, modrm, contents + roff - 1);
1451 r_type = R_386_32;
1452 }
1453
1454 bfd_put_8 (abfd, opcode, contents + roff - 2);
1455 irel->r_info = ELF32_R_INFO (r_symndx, r_type);
1456 *r_type_p = r_type;
1457 *converted = TRUE;
1458 }
1459 }
1460
1461 return TRUE;
1462 }
1463
1464 /* Rename some of the generic section flags to better document how they
1465 are used here. */
1466 #define check_relocs_failed sec_flg0
1467
1468 /* Look through the relocs for a section during the first phase, and
1469 calculate needed space in the global offset table, procedure linkage
1470 table, and dynamic reloc sections. */
1471
1472 static bfd_boolean
1473 elf_i386_check_relocs (bfd *abfd,
1474 struct bfd_link_info *info,
1475 asection *sec,
1476 const Elf_Internal_Rela *relocs)
1477 {
1478 struct elf_x86_link_hash_table *htab;
1479 Elf_Internal_Shdr *symtab_hdr;
1480 struct elf_link_hash_entry **sym_hashes;
1481 const Elf_Internal_Rela *rel;
1482 const Elf_Internal_Rela *rel_end;
1483 asection *sreloc;
1484 bfd_byte *contents;
1485 bfd_boolean converted;
1486
1487 if (bfd_link_relocatable (info))
1488 return TRUE;
1489
1490 /* Don't do anything special with non-loaded, non-alloced sections.
1491 In particular, any relocs in such sections should not affect GOT
1492 and PLT reference counting (ie. we don't allow them to create GOT
1493 or PLT entries), there's no possibility or desire to optimize TLS
1494 relocs, and there's not much point in propagating relocs to shared
1495 libs that the dynamic linker won't relocate. */
1496 if ((sec->flags & SEC_ALLOC) == 0)
1497 return TRUE;
1498
1499 htab = elf_x86_hash_table (info, I386_ELF_DATA);
1500 if (htab == NULL)
1501 {
1502 sec->check_relocs_failed = 1;
1503 return FALSE;
1504 }
1505
1506 BFD_ASSERT (is_x86_elf (abfd, htab));
1507
1508 /* Get the section contents. */
1509 if (elf_section_data (sec)->this_hdr.contents != NULL)
1510 contents = elf_section_data (sec)->this_hdr.contents;
1511 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
1512 {
1513 sec->check_relocs_failed = 1;
1514 return FALSE;
1515 }
1516
1517 symtab_hdr = &elf_symtab_hdr (abfd);
1518 sym_hashes = elf_sym_hashes (abfd);
1519
1520 converted = FALSE;
1521
1522 sreloc = NULL;
1523
1524 rel_end = relocs + sec->reloc_count;
1525 for (rel = relocs; rel < rel_end; rel++)
1526 {
1527 unsigned int r_type;
1528 unsigned int r_symndx;
1529 struct elf_link_hash_entry *h;
1530 struct elf_x86_link_hash_entry *eh;
1531 Elf_Internal_Sym *isym;
1532 const char *name;
1533 bfd_boolean size_reloc;
1534 bfd_boolean no_dynreloc;
1535
1536 r_symndx = ELF32_R_SYM (rel->r_info);
1537 r_type = ELF32_R_TYPE (rel->r_info);
1538
1539 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
1540 {
1541 /* xgettext:c-format */
1542 _bfd_error_handler (_("%pB: bad symbol index: %d"),
1543 abfd, r_symndx);
1544 goto error_return;
1545 }
1546
1547 if (r_symndx < symtab_hdr->sh_info)
1548 {
1549 /* A local symbol. */
1550 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1551 abfd, r_symndx);
1552 if (isym == NULL)
1553 goto error_return;
1554
1555 /* Check relocation against local STT_GNU_IFUNC symbol. */
1556 if (ELF32_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1557 {
1558 h = _bfd_elf_x86_get_local_sym_hash (htab, abfd, rel, TRUE);
1559 if (h == NULL)
1560 goto error_return;
1561
1562 /* Fake a STT_GNU_IFUNC symbol. */
1563 h->root.root.string = bfd_elf_sym_name (abfd, symtab_hdr,
1564 isym, NULL);
1565 h->type = STT_GNU_IFUNC;
1566 h->def_regular = 1;
1567 h->ref_regular = 1;
1568 h->forced_local = 1;
1569 h->root.type = bfd_link_hash_defined;
1570 }
1571 else
1572 h = NULL;
1573 }
1574 else
1575 {
1576 isym = NULL;
1577 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1578 while (h->root.type == bfd_link_hash_indirect
1579 || h->root.type == bfd_link_hash_warning)
1580 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1581 }
1582
1583 eh = (struct elf_x86_link_hash_entry *) h;
1584 if (h != NULL)
1585 {
1586 if (r_type == R_386_GOTOFF)
1587 eh->gotoff_ref = 1;
1588
1589 /* It is referenced by a non-shared object. */
1590 h->ref_regular = 1;
1591 }
1592
1593 if (r_type == R_386_GOT32X
1594 && (h == NULL || h->type != STT_GNU_IFUNC))
1595 {
1596 Elf_Internal_Rela *irel = (Elf_Internal_Rela *) rel;
1597 if (!elf_i386_convert_load_reloc (abfd, symtab_hdr, contents,
1598 &r_type, irel, h,
1599 &converted, info))
1600 goto error_return;
1601 }
1602
1603 if (!_bfd_elf_x86_valid_reloc_p (sec, info, htab, rel, h, isym,
1604 symtab_hdr, &no_dynreloc))
1605 return FALSE;
1606
1607 if (! elf_i386_tls_transition (info, abfd, sec, contents,
1608 symtab_hdr, sym_hashes,
1609 &r_type, GOT_UNKNOWN,
1610 rel, rel_end, h, r_symndx, FALSE))
1611 goto error_return;
1612
1613 /* Check if _GLOBAL_OFFSET_TABLE_ is referenced. */
1614 if (h == htab->elf.hgot)
1615 htab->got_referenced = TRUE;
1616
1617 switch (r_type)
1618 {
1619 case R_386_TLS_LDM:
1620 htab->tls_ld_or_ldm_got.refcount = 1;
1621 goto create_got;
1622
1623 case R_386_PLT32:
1624 /* This symbol requires a procedure linkage table entry. We
1625 actually build the entry in adjust_dynamic_symbol,
1626 because this might be a case of linking PIC code which is
1627 never referenced by a dynamic object, in which case we
1628 don't need to generate a procedure linkage table entry
1629 after all. */
1630
1631 /* If this is a local symbol, we resolve it directly without
1632 creating a procedure linkage table entry. */
1633 if (h == NULL)
1634 continue;
1635
1636 eh->zero_undefweak &= 0x2;
1637 h->needs_plt = 1;
1638 h->plt.refcount = 1;
1639 break;
1640
1641 case R_386_SIZE32:
1642 size_reloc = TRUE;
1643 goto do_size;
1644
1645 case R_386_TLS_IE_32:
1646 case R_386_TLS_IE:
1647 case R_386_TLS_GOTIE:
1648 if (!bfd_link_executable (info))
1649 info->flags |= DF_STATIC_TLS;
1650 /* Fall through */
1651
1652 case R_386_GOT32:
1653 case R_386_GOT32X:
1654 case R_386_TLS_GD:
1655 case R_386_TLS_GOTDESC:
1656 case R_386_TLS_DESC_CALL:
1657 /* This symbol requires a global offset table entry. */
1658 {
1659 int tls_type, old_tls_type;
1660
1661 switch (r_type)
1662 {
1663 default:
1664 case R_386_GOT32:
1665 case R_386_GOT32X:
1666 tls_type = GOT_NORMAL;
1667 break;
1668 case R_386_TLS_GD: tls_type = GOT_TLS_GD; break;
1669 case R_386_TLS_GOTDESC:
1670 case R_386_TLS_DESC_CALL:
1671 tls_type = GOT_TLS_GDESC; break;
1672 case R_386_TLS_IE_32:
1673 if (ELF32_R_TYPE (rel->r_info) == r_type)
1674 tls_type = GOT_TLS_IE_NEG;
1675 else
1676 /* If this is a GD->IE transition, we may use either of
1677 R_386_TLS_TPOFF and R_386_TLS_TPOFF32. */
1678 tls_type = GOT_TLS_IE;
1679 break;
1680 case R_386_TLS_IE:
1681 case R_386_TLS_GOTIE:
1682 tls_type = GOT_TLS_IE_POS; break;
1683 }
1684
1685 if (h != NULL)
1686 {
1687 h->got.refcount = 1;
1688 old_tls_type = elf_x86_hash_entry (h)->tls_type;
1689 }
1690 else
1691 {
1692 bfd_signed_vma *local_got_refcounts;
1693
1694 /* This is a global offset table entry for a local symbol. */
1695 local_got_refcounts = elf_local_got_refcounts (abfd);
1696 if (local_got_refcounts == NULL)
1697 {
1698 bfd_size_type size;
1699
1700 size = symtab_hdr->sh_info;
1701 size *= (sizeof (bfd_signed_vma)
1702 + sizeof (bfd_vma) + sizeof(char));
1703 local_got_refcounts = (bfd_signed_vma *)
1704 bfd_zalloc (abfd, size);
1705 if (local_got_refcounts == NULL)
1706 goto error_return;
1707 elf_local_got_refcounts (abfd) = local_got_refcounts;
1708 elf_x86_local_tlsdesc_gotent (abfd)
1709 = (bfd_vma *) (local_got_refcounts + symtab_hdr->sh_info);
1710 elf_x86_local_got_tls_type (abfd)
1711 = (char *) (local_got_refcounts + 2 * symtab_hdr->sh_info);
1712 }
1713 local_got_refcounts[r_symndx] = 1;
1714 old_tls_type = elf_x86_local_got_tls_type (abfd) [r_symndx];
1715 }
1716
1717 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_IE))
1718 tls_type |= old_tls_type;
1719 /* If a TLS symbol is accessed using IE at least once,
1720 there is no point to use dynamic model for it. */
1721 else if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
1722 && (! GOT_TLS_GD_ANY_P (old_tls_type)
1723 || (tls_type & GOT_TLS_IE) == 0))
1724 {
1725 if ((old_tls_type & GOT_TLS_IE) && GOT_TLS_GD_ANY_P (tls_type))
1726 tls_type = old_tls_type;
1727 else if (GOT_TLS_GD_ANY_P (old_tls_type)
1728 && GOT_TLS_GD_ANY_P (tls_type))
1729 tls_type |= old_tls_type;
1730 else
1731 {
1732 if (h)
1733 name = h->root.root.string;
1734 else
1735 name = bfd_elf_sym_name (abfd, symtab_hdr, isym,
1736 NULL);
1737 _bfd_error_handler
1738 /* xgettext:c-format */
1739 (_("%pB: `%s' accessed both as normal and "
1740 "thread local symbol"),
1741 abfd, name);
1742 bfd_set_error (bfd_error_bad_value);
1743 goto error_return;
1744 }
1745 }
1746
1747 if (old_tls_type != tls_type)
1748 {
1749 if (h != NULL)
1750 elf_x86_hash_entry (h)->tls_type = tls_type;
1751 else
1752 elf_x86_local_got_tls_type (abfd) [r_symndx] = tls_type;
1753 }
1754 }
1755 /* Fall through */
1756
1757 case R_386_GOTOFF:
1758 case R_386_GOTPC:
1759 create_got:
1760 if (r_type != R_386_TLS_IE)
1761 {
1762 if (eh != NULL)
1763 {
1764 eh->zero_undefweak &= 0x2;
1765
1766 /* Need GOT to resolve undefined weak symbol to 0. */
1767 if (r_type == R_386_GOTOFF
1768 && h->root.type == bfd_link_hash_undefweak
1769 && bfd_link_executable (info))
1770 htab->got_referenced = TRUE;
1771 }
1772 break;
1773 }
1774 /* Fall through */
1775
1776 case R_386_TLS_LE_32:
1777 case R_386_TLS_LE:
1778 if (eh != NULL)
1779 eh->zero_undefweak &= 0x2;
1780 if (bfd_link_executable (info))
1781 break;
1782 info->flags |= DF_STATIC_TLS;
1783 goto do_relocation;
1784
1785 case R_386_32:
1786 case R_386_PC32:
1787 if (eh != NULL && (sec->flags & SEC_CODE) != 0)
1788 eh->zero_undefweak |= 0x2;
1789 do_relocation:
1790 /* We are called after all symbols have been resolved. Only
1791 relocation against STT_GNU_IFUNC symbol must go through
1792 PLT. */
1793 if (h != NULL
1794 && (bfd_link_executable (info)
1795 || h->type == STT_GNU_IFUNC))
1796 {
1797 bfd_boolean func_pointer_ref = FALSE;
1798
1799 if (r_type == R_386_PC32)
1800 {
1801 /* Since something like ".long foo - ." may be used
1802 as pointer, make sure that PLT is used if foo is
1803 a function defined in a shared library. */
1804 if ((sec->flags & SEC_CODE) == 0)
1805 h->pointer_equality_needed = 1;
1806 else if (h->type == STT_GNU_IFUNC
1807 && bfd_link_pic (info))
1808 {
1809 _bfd_error_handler
1810 /* xgettext:c-format */
1811 (_("%pB: unsupported non-PIC call to IFUNC `%s'"),
1812 abfd, h->root.root.string);
1813 bfd_set_error (bfd_error_bad_value);
1814 goto error_return;
1815 }
1816 }
1817 else
1818 {
1819 h->pointer_equality_needed = 1;
1820 /* R_386_32 can be resolved at run-time. */
1821 if (r_type == R_386_32
1822 && (sec->flags & SEC_READONLY) == 0)
1823 func_pointer_ref = TRUE;
1824 }
1825
1826 if (!func_pointer_ref)
1827 {
1828 /* If this reloc is in a read-only section, we might
1829 need a copy reloc. We can't check reliably at this
1830 stage whether the section is read-only, as input
1831 sections have not yet been mapped to output sections.
1832 Tentatively set the flag for now, and correct in
1833 adjust_dynamic_symbol. */
1834 h->non_got_ref = 1;
1835
1836 /* We may need a .plt entry if the symbol is a function
1837 defined in a shared lib or is a function referenced
1838 from the code or read-only section. */
1839 if (!h->def_regular
1840 || (sec->flags & (SEC_CODE | SEC_READONLY)) != 0)
1841 h->plt.refcount = 1;
1842 }
1843 }
1844
1845 size_reloc = FALSE;
1846 do_size:
1847 if (!no_dynreloc
1848 && NEED_DYNAMIC_RELOCATION_P (info, FALSE, h, sec, r_type,
1849 R_386_32))
1850 {
1851 struct elf_dyn_relocs *p;
1852 struct elf_dyn_relocs **head;
1853
1854 /* We must copy these reloc types into the output file.
1855 Create a reloc section in dynobj and make room for
1856 this reloc. */
1857 if (sreloc == NULL)
1858 {
1859 sreloc = _bfd_elf_make_dynamic_reloc_section
1860 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ FALSE);
1861
1862 if (sreloc == NULL)
1863 goto error_return;
1864 }
1865
1866 /* If this is a global symbol, we count the number of
1867 relocations we need for this symbol. */
1868 if (h != NULL)
1869 {
1870 head = &h->dyn_relocs;
1871 }
1872 else
1873 {
1874 /* Track dynamic relocs needed for local syms too.
1875 We really need local syms available to do this
1876 easily. Oh well. */
1877 void **vpp;
1878 asection *s;
1879
1880 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1881 abfd, r_symndx);
1882 if (isym == NULL)
1883 goto error_return;
1884
1885 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1886 if (s == NULL)
1887 s = sec;
1888
1889 vpp = &elf_section_data (s)->local_dynrel;
1890 head = (struct elf_dyn_relocs **)vpp;
1891 }
1892
1893 p = *head;
1894 if (p == NULL || p->sec != sec)
1895 {
1896 size_t amt = sizeof *p;
1897 p = (struct elf_dyn_relocs *) bfd_alloc (htab->elf.dynobj,
1898 amt);
1899 if (p == NULL)
1900 goto error_return;
1901 p->next = *head;
1902 *head = p;
1903 p->sec = sec;
1904 p->count = 0;
1905 p->pc_count = 0;
1906 }
1907
1908 p->count += 1;
1909 /* Count size relocation as PC-relative relocation. */
1910 if (r_type == R_386_PC32 || size_reloc)
1911 p->pc_count += 1;
1912 }
1913 break;
1914
1915 /* This relocation describes the C++ object vtable hierarchy.
1916 Reconstruct it for later use during GC. */
1917 case R_386_GNU_VTINHERIT:
1918 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1919 goto error_return;
1920 break;
1921
1922 /* This relocation describes which C++ vtable entries are actually
1923 used. Record for later use during GC. */
1924 case R_386_GNU_VTENTRY:
1925 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_offset))
1926 goto error_return;
1927 break;
1928
1929 default:
1930 break;
1931 }
1932 }
1933
1934 if (elf_section_data (sec)->this_hdr.contents != contents)
1935 {
1936 if (!converted && !info->keep_memory)
1937 free (contents);
1938 else
1939 {
1940 /* Cache the section contents for elf_link_input_bfd if any
1941 load is converted or --no-keep-memory isn't used. */
1942 elf_section_data (sec)->this_hdr.contents = contents;
1943 }
1944 }
1945
1946 /* Cache relocations if any load is converted. */
1947 if (elf_section_data (sec)->relocs != relocs && converted)
1948 elf_section_data (sec)->relocs = (Elf_Internal_Rela *) relocs;
1949
1950 return TRUE;
1951
1952 error_return:
1953 if (elf_section_data (sec)->this_hdr.contents != contents)
1954 free (contents);
1955 sec->check_relocs_failed = 1;
1956 return FALSE;
1957 }
1958
1959 /* Set the correct type for an x86 ELF section. We do this by the
1960 section name, which is a hack, but ought to work. */
1961
1962 static bfd_boolean
1963 elf_i386_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1964 Elf_Internal_Shdr *hdr,
1965 asection *sec)
1966 {
1967 const char *name;
1968
1969 name = bfd_section_name (sec);
1970
1971 /* This is an ugly, but unfortunately necessary hack that is
1972 needed when producing EFI binaries on x86. It tells
1973 elf.c:elf_fake_sections() not to consider ".reloc" as a section
1974 containing ELF relocation info. We need this hack in order to
1975 be able to generate ELF binaries that can be translated into
1976 EFI applications (which are essentially COFF objects). Those
1977 files contain a COFF ".reloc" section inside an ELFNN object,
1978 which would normally cause BFD to segfault because it would
1979 attempt to interpret this section as containing relocation
1980 entries for section "oc". With this hack enabled, ".reloc"
1981 will be treated as a normal data section, which will avoid the
1982 segfault. However, you won't be able to create an ELFNN binary
1983 with a section named "oc" that needs relocations, but that's
1984 the kind of ugly side-effects you get when detecting section
1985 types based on their names... In practice, this limitation is
1986 unlikely to bite. */
1987 if (strcmp (name, ".reloc") == 0)
1988 hdr->sh_type = SHT_PROGBITS;
1989
1990 return TRUE;
1991 }
1992
1993 /* Return the relocation value for @tpoff relocation
1994 if STT_TLS virtual address is ADDRESS. */
1995
1996 static bfd_vma
1997 elf_i386_tpoff (struct bfd_link_info *info, bfd_vma address)
1998 {
1999 struct elf_link_hash_table *htab = elf_hash_table (info);
2000 const struct elf_backend_data *bed = get_elf_backend_data (info->output_bfd);
2001 bfd_vma static_tls_size;
2002
2003 /* If tls_sec is NULL, we should have signalled an error already. */
2004 if (htab->tls_sec == NULL)
2005 return 0;
2006
2007 /* Consider special static TLS alignment requirements. */
2008 static_tls_size = BFD_ALIGN (htab->tls_size, bed->static_tls_alignment);
2009 return static_tls_size + htab->tls_sec->vma - address;
2010 }
2011
2012 /* Relocate an i386 ELF section. */
2013
2014 static bfd_boolean
2015 elf_i386_relocate_section (bfd *output_bfd,
2016 struct bfd_link_info *info,
2017 bfd *input_bfd,
2018 asection *input_section,
2019 bfd_byte *contents,
2020 Elf_Internal_Rela *relocs,
2021 Elf_Internal_Sym *local_syms,
2022 asection **local_sections)
2023 {
2024 struct elf_x86_link_hash_table *htab;
2025 Elf_Internal_Shdr *symtab_hdr;
2026 struct elf_link_hash_entry **sym_hashes;
2027 bfd_vma *local_got_offsets;
2028 bfd_vma *local_tlsdesc_gotents;
2029 Elf_Internal_Rela *rel;
2030 Elf_Internal_Rela *wrel;
2031 Elf_Internal_Rela *relend;
2032 bfd_boolean is_vxworks_tls;
2033 unsigned plt_entry_size;
2034
2035 /* Skip if check_relocs failed. */
2036 if (input_section->check_relocs_failed)
2037 return FALSE;
2038
2039 htab = elf_x86_hash_table (info, I386_ELF_DATA);
2040 if (htab == NULL)
2041 return FALSE;
2042
2043 if (!is_x86_elf (input_bfd, htab))
2044 {
2045 bfd_set_error (bfd_error_wrong_format);
2046 return FALSE;
2047 }
2048
2049 symtab_hdr = &elf_symtab_hdr (input_bfd);
2050 sym_hashes = elf_sym_hashes (input_bfd);
2051 local_got_offsets = elf_local_got_offsets (input_bfd);
2052 local_tlsdesc_gotents = elf_x86_local_tlsdesc_gotent (input_bfd);
2053 /* We have to handle relocations in vxworks .tls_vars sections
2054 specially, because the dynamic loader is 'weird'. */
2055 is_vxworks_tls = (htab->target_os == is_vxworks
2056 && bfd_link_pic (info)
2057 && !strcmp (input_section->output_section->name,
2058 ".tls_vars"));
2059
2060 _bfd_x86_elf_set_tls_module_base (info);
2061
2062 plt_entry_size = htab->plt.plt_entry_size;
2063
2064 rel = wrel = relocs;
2065 relend = relocs + input_section->reloc_count;
2066 for (; rel < relend; wrel++, rel++)
2067 {
2068 unsigned int r_type, r_type_tls;
2069 reloc_howto_type *howto;
2070 unsigned long r_symndx;
2071 struct elf_link_hash_entry *h;
2072 struct elf_x86_link_hash_entry *eh;
2073 Elf_Internal_Sym *sym;
2074 asection *sec;
2075 bfd_vma off, offplt, plt_offset;
2076 bfd_vma relocation;
2077 bfd_boolean unresolved_reloc;
2078 bfd_reloc_status_type r;
2079 unsigned int indx;
2080 int tls_type;
2081 bfd_vma st_size;
2082 asection *resolved_plt;
2083 bfd_boolean resolved_to_zero;
2084 bfd_boolean relative_reloc;
2085
2086 r_type = ELF32_R_TYPE (rel->r_info);
2087 if (r_type == R_386_GNU_VTINHERIT
2088 || r_type == R_386_GNU_VTENTRY)
2089 {
2090 if (wrel != rel)
2091 *wrel = *rel;
2092 continue;
2093 }
2094
2095 howto = elf_i386_rtype_to_howto (r_type);
2096 if (howto == NULL)
2097 return _bfd_unrecognized_reloc (input_bfd, input_section, r_type);
2098
2099 r_symndx = ELF32_R_SYM (rel->r_info);
2100 h = NULL;
2101 sym = NULL;
2102 sec = NULL;
2103 unresolved_reloc = FALSE;
2104 if (r_symndx < symtab_hdr->sh_info)
2105 {
2106 sym = local_syms + r_symndx;
2107 sec = local_sections[r_symndx];
2108 relocation = (sec->output_section->vma
2109 + sec->output_offset
2110 + sym->st_value);
2111 st_size = sym->st_size;
2112
2113 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION
2114 && ((sec->flags & SEC_MERGE) != 0
2115 || (bfd_link_relocatable (info)
2116 && sec->output_offset != 0)))
2117 {
2118 bfd_vma addend;
2119 bfd_byte *where = contents + rel->r_offset;
2120
2121 switch (howto->size)
2122 {
2123 case 0:
2124 addend = bfd_get_8 (input_bfd, where);
2125 if (howto->pc_relative)
2126 {
2127 addend = (addend ^ 0x80) - 0x80;
2128 addend += 1;
2129 }
2130 break;
2131 case 1:
2132 addend = bfd_get_16 (input_bfd, where);
2133 if (howto->pc_relative)
2134 {
2135 addend = (addend ^ 0x8000) - 0x8000;
2136 addend += 2;
2137 }
2138 break;
2139 case 2:
2140 addend = bfd_get_32 (input_bfd, where);
2141 if (howto->pc_relative)
2142 {
2143 addend = (addend ^ 0x80000000) - 0x80000000;
2144 addend += 4;
2145 }
2146 break;
2147 default:
2148 abort ();
2149 }
2150
2151 if (bfd_link_relocatable (info))
2152 addend += sec->output_offset;
2153 else
2154 {
2155 asection *msec = sec;
2156 addend = _bfd_elf_rel_local_sym (output_bfd, sym, &msec,
2157 addend);
2158 addend -= relocation;
2159 addend += msec->output_section->vma + msec->output_offset;
2160 }
2161
2162 switch (howto->size)
2163 {
2164 case 0:
2165 /* FIXME: overflow checks. */
2166 if (howto->pc_relative)
2167 addend -= 1;
2168 bfd_put_8 (input_bfd, addend, where);
2169 break;
2170 case 1:
2171 if (howto->pc_relative)
2172 addend -= 2;
2173 bfd_put_16 (input_bfd, addend, where);
2174 break;
2175 case 2:
2176 if (howto->pc_relative)
2177 addend -= 4;
2178 bfd_put_32 (input_bfd, addend, where);
2179 break;
2180 }
2181 }
2182 else if (!bfd_link_relocatable (info)
2183 && ELF32_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2184 {
2185 /* Relocate against local STT_GNU_IFUNC symbol. */
2186 h = _bfd_elf_x86_get_local_sym_hash (htab, input_bfd, rel,
2187 FALSE);
2188 if (h == NULL)
2189 abort ();
2190
2191 /* Set STT_GNU_IFUNC symbol value. */
2192 h->root.u.def.value = sym->st_value;
2193 h->root.u.def.section = sec;
2194 }
2195 }
2196 else
2197 {
2198 bfd_boolean warned ATTRIBUTE_UNUSED;
2199 bfd_boolean ignored ATTRIBUTE_UNUSED;
2200
2201 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2202 r_symndx, symtab_hdr, sym_hashes,
2203 h, sec, relocation,
2204 unresolved_reloc, warned, ignored);
2205 st_size = h->size;
2206 }
2207
2208 if (sec != NULL && discarded_section (sec))
2209 {
2210 _bfd_clear_contents (howto, input_bfd, input_section,
2211 contents, rel->r_offset);
2212 wrel->r_offset = rel->r_offset;
2213 wrel->r_info = 0;
2214 wrel->r_addend = 0;
2215
2216 /* For ld -r, remove relocations in debug sections against
2217 sections defined in discarded sections. Not done for
2218 eh_frame editing code expects to be present. */
2219 if (bfd_link_relocatable (info)
2220 && (input_section->flags & SEC_DEBUGGING))
2221 wrel--;
2222
2223 continue;
2224 }
2225
2226 if (bfd_link_relocatable (info))
2227 {
2228 if (wrel != rel)
2229 *wrel = *rel;
2230 continue;
2231 }
2232
2233 eh = (struct elf_x86_link_hash_entry *) h;
2234
2235 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle
2236 it here if it is defined in a non-shared object. */
2237 if (h != NULL
2238 && h->type == STT_GNU_IFUNC
2239 && h->def_regular)
2240 {
2241 asection *gotplt, *base_got;
2242 bfd_vma plt_index;
2243 const char *name;
2244
2245 if ((input_section->flags & SEC_ALLOC) == 0)
2246 {
2247 /* If this is a SHT_NOTE section without SHF_ALLOC, treat
2248 STT_GNU_IFUNC symbol as STT_FUNC. */
2249 if (elf_section_type (input_section) == SHT_NOTE)
2250 goto skip_ifunc;
2251 /* Dynamic relocs are not propagated for SEC_DEBUGGING
2252 sections because such sections are not SEC_ALLOC and
2253 thus ld.so will not process them. */
2254 if ((input_section->flags & SEC_DEBUGGING) != 0)
2255 continue;
2256 abort ();
2257 }
2258
2259 /* STT_GNU_IFUNC symbol must go through PLT. */
2260 if (htab->elf.splt != NULL)
2261 {
2262 if (htab->plt_second != NULL)
2263 {
2264 resolved_plt = htab->plt_second;
2265 plt_offset = eh->plt_second.offset;
2266 }
2267 else
2268 {
2269 resolved_plt = htab->elf.splt;
2270 plt_offset = h->plt.offset;
2271 }
2272 gotplt = htab->elf.sgotplt;
2273 }
2274 else
2275 {
2276 resolved_plt = htab->elf.iplt;
2277 plt_offset = h->plt.offset;
2278 gotplt = htab->elf.igotplt;
2279 }
2280
2281 switch (r_type)
2282 {
2283 default:
2284 break;
2285
2286 case R_386_GOT32:
2287 case R_386_GOT32X:
2288 base_got = htab->elf.sgot;
2289 off = h->got.offset;
2290
2291 if (base_got == NULL)
2292 abort ();
2293
2294 if (off == (bfd_vma) -1)
2295 {
2296 /* We can't use h->got.offset here to save state, or
2297 even just remember the offset, as finish_dynamic_symbol
2298 would use that as offset into .got. */
2299
2300 if (h->plt.offset == (bfd_vma) -1)
2301 abort ();
2302
2303 if (htab->elf.splt != NULL)
2304 {
2305 plt_index = (h->plt.offset / plt_entry_size
2306 - htab->plt.has_plt0);
2307 off = (plt_index + 3) * 4;
2308 base_got = htab->elf.sgotplt;
2309 }
2310 else
2311 {
2312 plt_index = h->plt.offset / plt_entry_size;
2313 off = plt_index * 4;
2314 base_got = htab->elf.igotplt;
2315 }
2316
2317 if (h->dynindx == -1
2318 || h->forced_local
2319 || info->symbolic)
2320 {
2321 /* This references the local defitionion. We must
2322 initialize this entry in the global offset table.
2323 Since the offset must always be a multiple of 8,
2324 we use the least significant bit to record
2325 whether we have initialized it already.
2326
2327 When doing a dynamic link, we create a .rela.got
2328 relocation entry to initialize the value. This
2329 is done in the finish_dynamic_symbol routine. */
2330 if ((off & 1) != 0)
2331 off &= ~1;
2332 else
2333 {
2334 bfd_put_32 (output_bfd, relocation,
2335 base_got->contents + off);
2336 h->got.offset |= 1;
2337 }
2338 }
2339
2340 relocation = off;
2341 }
2342 else
2343 relocation = (base_got->output_section->vma
2344 + base_got->output_offset + off
2345 - gotplt->output_section->vma
2346 - gotplt->output_offset);
2347
2348 if (rel->r_offset > 1
2349 && (*(contents + rel->r_offset - 1) & 0xc7) == 0x5
2350 && *(contents + rel->r_offset - 2) != 0x8d)
2351 {
2352 if (bfd_link_pic (info))
2353 goto disallow_got32;
2354
2355 /* Add the GOT base if there is no base register. */
2356 relocation += (gotplt->output_section->vma
2357 + gotplt->output_offset);
2358 }
2359 else if (htab->elf.splt == NULL)
2360 {
2361 /* Adjust for static executables. */
2362 relocation += gotplt->output_offset;
2363 }
2364
2365 goto do_relocation;
2366 }
2367
2368 if (h->plt.offset == (bfd_vma) -1)
2369 {
2370 /* Handle static pointers of STT_GNU_IFUNC symbols. */
2371 if (r_type == R_386_32
2372 && (input_section->flags & SEC_CODE) == 0)
2373 goto do_ifunc_pointer;
2374 goto bad_ifunc_reloc;
2375 }
2376
2377 relocation = (resolved_plt->output_section->vma
2378 + resolved_plt->output_offset + plt_offset);
2379
2380 switch (r_type)
2381 {
2382 default:
2383 bad_ifunc_reloc:
2384 if (h->root.root.string)
2385 name = h->root.root.string;
2386 else
2387 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2388 NULL);
2389 _bfd_error_handler
2390 /* xgettext:c-format */
2391 (_("%pB: relocation %s against STT_GNU_IFUNC "
2392 "symbol `%s' isn't supported"), input_bfd,
2393 howto->name, name);
2394 bfd_set_error (bfd_error_bad_value);
2395 return FALSE;
2396
2397 case R_386_32:
2398 /* Generate dynamic relcoation only when there is a
2399 non-GOT reference in a shared object. */
2400 if ((bfd_link_pic (info) && h->non_got_ref)
2401 || h->plt.offset == (bfd_vma) -1)
2402 {
2403 Elf_Internal_Rela outrel;
2404 asection *sreloc;
2405 bfd_vma offset;
2406
2407 do_ifunc_pointer:
2408 /* Need a dynamic relocation to get the real function
2409 adddress. */
2410 offset = _bfd_elf_section_offset (output_bfd,
2411 info,
2412 input_section,
2413 rel->r_offset);
2414 if (offset == (bfd_vma) -1
2415 || offset == (bfd_vma) -2)
2416 abort ();
2417
2418 outrel.r_offset = (input_section->output_section->vma
2419 + input_section->output_offset
2420 + offset);
2421
2422 if (POINTER_LOCAL_IFUNC_P (info, h))
2423 {
2424 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
2425 h->root.root.string,
2426 h->root.u.def.section->owner);
2427
2428 /* This symbol is resolved locally. */
2429 outrel.r_info = ELF32_R_INFO (0, R_386_IRELATIVE);
2430 bfd_put_32 (output_bfd,
2431 (h->root.u.def.value
2432 + h->root.u.def.section->output_section->vma
2433 + h->root.u.def.section->output_offset),
2434 contents + offset);
2435 }
2436 else
2437 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2438
2439 /* Dynamic relocations are stored in
2440 1. .rel.ifunc section in PIC object.
2441 2. .rel.got section in dynamic executable.
2442 3. .rel.iplt section in static executable. */
2443 if (bfd_link_pic (info))
2444 sreloc = htab->elf.irelifunc;
2445 else if (htab->elf.splt != NULL)
2446 sreloc = htab->elf.srelgot;
2447 else
2448 sreloc = htab->elf.irelplt;
2449 elf_append_rel (output_bfd, sreloc, &outrel);
2450
2451 /* If this reloc is against an external symbol, we
2452 do not want to fiddle with the addend. Otherwise,
2453 we need to include the symbol value so that it
2454 becomes an addend for the dynamic reloc. For an
2455 internal symbol, we have updated addend. */
2456 continue;
2457 }
2458 /* FALLTHROUGH */
2459 case R_386_PC32:
2460 case R_386_PLT32:
2461 goto do_relocation;
2462
2463 case R_386_GOTOFF:
2464 relocation -= (gotplt->output_section->vma
2465 + gotplt->output_offset);
2466 goto do_relocation;
2467 }
2468 }
2469
2470 skip_ifunc:
2471 resolved_to_zero = (eh != NULL
2472 && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh));
2473
2474 switch (r_type)
2475 {
2476 case R_386_GOT32X:
2477 case R_386_GOT32:
2478 /* Relocation is to the entry for this symbol in the global
2479 offset table. */
2480 if (htab->elf.sgot == NULL)
2481 abort ();
2482
2483 relative_reloc = FALSE;
2484 if (h != NULL)
2485 {
2486 off = h->got.offset;
2487 if (RESOLVED_LOCALLY_P (info, h, htab))
2488 {
2489 /* We must initialize this entry in the global offset
2490 table. Since the offset must always be a multiple
2491 of 4, we use the least significant bit to record
2492 whether we have initialized it already.
2493
2494 When doing a dynamic link, we create a .rel.got
2495 relocation entry to initialize the value. This
2496 is done in the finish_dynamic_symbol routine. */
2497 if ((off & 1) != 0)
2498 off &= ~1;
2499 else
2500 {
2501 bfd_put_32 (output_bfd, relocation,
2502 htab->elf.sgot->contents + off);
2503 h->got.offset |= 1;
2504
2505 if (GENERATE_RELATIVE_RELOC_P (info, h))
2506 {
2507 /* PR ld/21402: If this symbol isn't dynamic
2508 in PIC, generate R_386_RELATIVE here. */
2509 eh->no_finish_dynamic_symbol = 1;
2510 relative_reloc = TRUE;
2511 }
2512 }
2513 }
2514 else
2515 unresolved_reloc = FALSE;
2516 }
2517 else
2518 {
2519 if (local_got_offsets == NULL)
2520 abort ();
2521
2522 off = local_got_offsets[r_symndx];
2523
2524 /* The offset must always be a multiple of 4. We use
2525 the least significant bit to record whether we have
2526 already generated the necessary reloc. */
2527 if ((off & 1) != 0)
2528 off &= ~1;
2529 else
2530 {
2531 bfd_put_32 (output_bfd, relocation,
2532 htab->elf.sgot->contents + off);
2533 local_got_offsets[r_symndx] |= 1;
2534
2535 if (bfd_link_pic (info))
2536 relative_reloc = TRUE;
2537 }
2538 }
2539
2540 if (relative_reloc)
2541 {
2542 asection *s;
2543 Elf_Internal_Rela outrel;
2544
2545 s = htab->elf.srelgot;
2546 if (s == NULL)
2547 abort ();
2548
2549 outrel.r_offset = (htab->elf.sgot->output_section->vma
2550 + htab->elf.sgot->output_offset
2551 + off);
2552 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
2553 elf_append_rel (output_bfd, s, &outrel);
2554 }
2555
2556 if (off >= (bfd_vma) -2)
2557 abort ();
2558
2559 relocation = (htab->elf.sgot->output_section->vma
2560 + htab->elf.sgot->output_offset + off);
2561 if (rel->r_offset > 1
2562 && (*(contents + rel->r_offset - 1) & 0xc7) == 0x5
2563 && *(contents + rel->r_offset - 2) != 0x8d)
2564 {
2565 if (bfd_link_pic (info))
2566 {
2567 /* For PIC, disallow R_386_GOT32 without a base
2568 register, except for "lea foo@GOT, %reg", since
2569 we don't know what the GOT base is. */
2570 const char *name;
2571
2572 disallow_got32:
2573 if (h == NULL || h->root.root.string == NULL)
2574 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2575 NULL);
2576 else
2577 name = h->root.root.string;
2578
2579 _bfd_error_handler
2580 /* xgettext:c-format */
2581 (_("%pB: direct GOT relocation %s against `%s'"
2582 " without base register can not be used"
2583 " when making a shared object"),
2584 input_bfd, howto->name, name);
2585 bfd_set_error (bfd_error_bad_value);
2586 return FALSE;
2587 }
2588 }
2589 else
2590 {
2591 /* Subtract the .got.plt section address only with a base
2592 register. */
2593 relocation -= (htab->elf.sgotplt->output_section->vma
2594 + htab->elf.sgotplt->output_offset);
2595 }
2596
2597 break;
2598
2599 case R_386_GOTOFF:
2600 /* Relocation is relative to the start of the global offset
2601 table. */
2602
2603 /* Check to make sure it isn't a protected function or data
2604 symbol for shared library since it may not be local when
2605 used as function address or with copy relocation. We also
2606 need to make sure that a symbol is referenced locally. */
2607 if (!bfd_link_executable (info) && h)
2608 {
2609 if (!h->def_regular)
2610 {
2611 const char *v;
2612
2613 switch (ELF_ST_VISIBILITY (h->other))
2614 {
2615 case STV_HIDDEN:
2616 v = _("hidden symbol");
2617 break;
2618 case STV_INTERNAL:
2619 v = _("internal symbol");
2620 break;
2621 case STV_PROTECTED:
2622 v = _("protected symbol");
2623 break;
2624 default:
2625 v = _("symbol");
2626 break;
2627 }
2628
2629 _bfd_error_handler
2630 /* xgettext:c-format */
2631 (_("%pB: relocation R_386_GOTOFF against undefined %s"
2632 " `%s' can not be used when making a shared object"),
2633 input_bfd, v, h->root.root.string);
2634 bfd_set_error (bfd_error_bad_value);
2635 return FALSE;
2636 }
2637 else if (!SYMBOL_REFERENCES_LOCAL_P (info, h)
2638 && (h->type == STT_FUNC
2639 || h->type == STT_OBJECT)
2640 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
2641 {
2642 _bfd_error_handler
2643 /* xgettext:c-format */
2644 (_("%pB: relocation R_386_GOTOFF against protected %s"
2645 " `%s' can not be used when making a shared object"),
2646 input_bfd,
2647 h->type == STT_FUNC ? "function" : "data",
2648 h->root.root.string);
2649 bfd_set_error (bfd_error_bad_value);
2650 return FALSE;
2651 }
2652 }
2653
2654 /* Note that sgot is not involved in this
2655 calculation. We always want the start of .got.plt. If we
2656 defined _GLOBAL_OFFSET_TABLE_ in a different way, as is
2657 permitted by the ABI, we might have to change this
2658 calculation. */
2659 relocation -= htab->elf.sgotplt->output_section->vma
2660 + htab->elf.sgotplt->output_offset;
2661 break;
2662
2663 case R_386_GOTPC:
2664 /* Use global offset table as symbol value. */
2665 relocation = htab->elf.sgotplt->output_section->vma
2666 + htab->elf.sgotplt->output_offset;
2667 unresolved_reloc = FALSE;
2668 break;
2669
2670 case R_386_PLT32:
2671 /* Relocation is to the entry for this symbol in the
2672 procedure linkage table. */
2673
2674 /* Resolve a PLT32 reloc against a local symbol directly,
2675 without using the procedure linkage table. */
2676 if (h == NULL)
2677 break;
2678
2679 if ((h->plt.offset == (bfd_vma) -1
2680 && eh->plt_got.offset == (bfd_vma) -1)
2681 || htab->elf.splt == NULL)
2682 {
2683 /* We didn't make a PLT entry for this symbol. This
2684 happens when statically linking PIC code, or when
2685 using -Bsymbolic. */
2686 break;
2687 }
2688
2689 if (h->plt.offset != (bfd_vma) -1)
2690 {
2691 if (htab->plt_second != NULL)
2692 {
2693 resolved_plt = htab->plt_second;
2694 plt_offset = eh->plt_second.offset;
2695 }
2696 else
2697 {
2698 resolved_plt = htab->elf.splt;
2699 plt_offset = h->plt.offset;
2700 }
2701 }
2702 else
2703 {
2704 resolved_plt = htab->plt_got;
2705 plt_offset = eh->plt_got.offset;
2706 }
2707
2708 relocation = (resolved_plt->output_section->vma
2709 + resolved_plt->output_offset
2710 + plt_offset);
2711 unresolved_reloc = FALSE;
2712 break;
2713
2714 case R_386_SIZE32:
2715 /* Set to symbol size. */
2716 relocation = st_size;
2717 /* Fall through. */
2718
2719 case R_386_32:
2720 case R_386_PC32:
2721 if ((input_section->flags & SEC_ALLOC) == 0
2722 || is_vxworks_tls)
2723 break;
2724
2725 if (GENERATE_DYNAMIC_RELOCATION_P (info, eh, r_type, sec,
2726 FALSE, resolved_to_zero,
2727 (r_type == R_386_PC32)))
2728 {
2729 Elf_Internal_Rela outrel;
2730 bfd_boolean skip, relocate;
2731 asection *sreloc;
2732
2733 /* When generating a shared object, these relocations
2734 are copied into the output file to be resolved at run
2735 time. */
2736
2737 skip = FALSE;
2738 relocate = FALSE;
2739
2740 outrel.r_offset =
2741 _bfd_elf_section_offset (output_bfd, info, input_section,
2742 rel->r_offset);
2743 if (outrel.r_offset == (bfd_vma) -1)
2744 skip = TRUE;
2745 else if (outrel.r_offset == (bfd_vma) -2)
2746 skip = TRUE, relocate = TRUE;
2747 outrel.r_offset += (input_section->output_section->vma
2748 + input_section->output_offset);
2749
2750 if (skip)
2751 memset (&outrel, 0, sizeof outrel);
2752 else if (COPY_INPUT_RELOC_P (info, h, r_type))
2753 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2754 else
2755 {
2756 /* This symbol is local, or marked to become local. */
2757 relocate = TRUE;
2758 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
2759 }
2760
2761 sreloc = elf_section_data (input_section)->sreloc;
2762
2763 if (sreloc == NULL || sreloc->contents == NULL)
2764 {
2765 r = bfd_reloc_notsupported;
2766 goto check_relocation_error;
2767 }
2768
2769 elf_append_rel (output_bfd, sreloc, &outrel);
2770
2771 /* If this reloc is against an external symbol, we do
2772 not want to fiddle with the addend. Otherwise, we
2773 need to include the symbol value so that it becomes
2774 an addend for the dynamic reloc. */
2775 if (! relocate)
2776 continue;
2777 }
2778 break;
2779
2780 case R_386_TLS_IE:
2781 if (!bfd_link_executable (info))
2782 {
2783 Elf_Internal_Rela outrel;
2784 asection *sreloc;
2785
2786 outrel.r_offset = rel->r_offset
2787 + input_section->output_section->vma
2788 + input_section->output_offset;
2789 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
2790 sreloc = elf_section_data (input_section)->sreloc;
2791 if (sreloc == NULL)
2792 abort ();
2793 elf_append_rel (output_bfd, sreloc, &outrel);
2794 }
2795 /* Fall through */
2796
2797 case R_386_TLS_GD:
2798 case R_386_TLS_GOTDESC:
2799 case R_386_TLS_DESC_CALL:
2800 case R_386_TLS_IE_32:
2801 case R_386_TLS_GOTIE:
2802 tls_type = GOT_UNKNOWN;
2803 if (h == NULL && local_got_offsets)
2804 tls_type = elf_x86_local_got_tls_type (input_bfd) [r_symndx];
2805 else if (h != NULL)
2806 tls_type = elf_x86_hash_entry(h)->tls_type;
2807 if (tls_type == GOT_TLS_IE)
2808 tls_type = GOT_TLS_IE_NEG;
2809
2810 r_type_tls = r_type;
2811 if (! elf_i386_tls_transition (info, input_bfd,
2812 input_section, contents,
2813 symtab_hdr, sym_hashes,
2814 &r_type_tls, tls_type, rel,
2815 relend, h, r_symndx, TRUE))
2816 return FALSE;
2817
2818 if (r_type_tls == R_386_TLS_LE_32)
2819 {
2820 BFD_ASSERT (! unresolved_reloc);
2821 if (r_type == R_386_TLS_GD)
2822 {
2823 unsigned int type;
2824 bfd_vma roff;
2825
2826 /* GD->LE transition. */
2827 type = *(contents + rel->r_offset - 2);
2828 if (type == 0x04)
2829 {
2830 /* Change
2831 leal foo@tlsgd(,%ebx,1), %eax
2832 call ___tls_get_addr@PLT
2833 into:
2834 movl %gs:0, %eax
2835 subl $foo@tpoff, %eax
2836 (6 byte form of subl). */
2837 roff = rel->r_offset + 5;
2838 }
2839 else
2840 {
2841 /* Change
2842 leal foo@tlsgd(%ebx), %eax
2843 call ___tls_get_addr@PLT
2844 nop
2845 or
2846 leal foo@tlsgd(%reg), %eax
2847 call *___tls_get_addr@GOT(%reg)
2848 which may be converted to
2849 addr32 call ___tls_get_addr
2850 into:
2851 movl %gs:0, %eax; subl $foo@tpoff, %eax
2852 (6 byte form of subl). */
2853 roff = rel->r_offset + 6;
2854 }
2855 memcpy (contents + roff - 8,
2856 "\x65\xa1\0\0\0\0\x81\xe8\0\0\0", 12);
2857 bfd_put_32 (output_bfd, elf_i386_tpoff (info, relocation),
2858 contents + roff);
2859 /* Skip R_386_PC32, R_386_PLT32 and R_386_GOT32X. */
2860 rel++;
2861 wrel++;
2862 continue;
2863 }
2864 else if (r_type == R_386_TLS_GOTDESC)
2865 {
2866 /* GDesc -> LE transition.
2867 It's originally something like:
2868 leal x@tlsdesc(%ebx), %eax
2869
2870 leal x@ntpoff, %eax
2871
2872 Registers other than %eax may be set up here. */
2873
2874 unsigned int val;
2875 bfd_vma roff;
2876
2877 roff = rel->r_offset;
2878 val = bfd_get_8 (input_bfd, contents + roff - 1);
2879
2880 /* Now modify the instruction as appropriate. */
2881 /* aoliva FIXME: remove the above and xor the byte
2882 below with 0x86. */
2883 bfd_put_8 (output_bfd, val ^ 0x86,
2884 contents + roff - 1);
2885 bfd_put_32 (output_bfd, -elf_i386_tpoff (info, relocation),
2886 contents + roff);
2887 continue;
2888 }
2889 else if (r_type == R_386_TLS_DESC_CALL)
2890 {
2891 /* GDesc -> LE transition.
2892 It's originally:
2893 call *(%eax)
2894 Turn it into:
2895 xchg %ax,%ax */
2896
2897 bfd_vma roff;
2898
2899 roff = rel->r_offset;
2900 bfd_put_8 (output_bfd, 0x66, contents + roff);
2901 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
2902 continue;
2903 }
2904 else if (r_type == R_386_TLS_IE)
2905 {
2906 unsigned int val;
2907
2908 /* IE->LE transition:
2909 Originally it can be one of:
2910 movl foo, %eax
2911 movl foo, %reg
2912 addl foo, %reg
2913 We change it into:
2914 movl $foo, %eax
2915 movl $foo, %reg
2916 addl $foo, %reg. */
2917 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
2918 if (val == 0xa1)
2919 {
2920 /* movl foo, %eax. */
2921 bfd_put_8 (output_bfd, 0xb8,
2922 contents + rel->r_offset - 1);
2923 }
2924 else
2925 {
2926 unsigned int type;
2927
2928 type = bfd_get_8 (input_bfd,
2929 contents + rel->r_offset - 2);
2930 switch (type)
2931 {
2932 case 0x8b:
2933 /* movl */
2934 bfd_put_8 (output_bfd, 0xc7,
2935 contents + rel->r_offset - 2);
2936 bfd_put_8 (output_bfd,
2937 0xc0 | ((val >> 3) & 7),
2938 contents + rel->r_offset - 1);
2939 break;
2940 case 0x03:
2941 /* addl */
2942 bfd_put_8 (output_bfd, 0x81,
2943 contents + rel->r_offset - 2);
2944 bfd_put_8 (output_bfd,
2945 0xc0 | ((val >> 3) & 7),
2946 contents + rel->r_offset - 1);
2947 break;
2948 default:
2949 BFD_FAIL ();
2950 break;
2951 }
2952 }
2953 bfd_put_32 (output_bfd, -elf_i386_tpoff (info, relocation),
2954 contents + rel->r_offset);
2955 continue;
2956 }
2957 else
2958 {
2959 unsigned int val, type;
2960
2961 /* {IE_32,GOTIE}->LE transition:
2962 Originally it can be one of:
2963 subl foo(%reg1), %reg2
2964 movl foo(%reg1), %reg2
2965 addl foo(%reg1), %reg2
2966 We change it into:
2967 subl $foo, %reg2
2968 movl $foo, %reg2 (6 byte form)
2969 addl $foo, %reg2. */
2970 type = bfd_get_8 (input_bfd, contents + rel->r_offset - 2);
2971 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
2972 if (type == 0x8b)
2973 {
2974 /* movl */
2975 bfd_put_8 (output_bfd, 0xc7,
2976 contents + rel->r_offset - 2);
2977 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
2978 contents + rel->r_offset - 1);
2979 }
2980 else if (type == 0x2b)
2981 {
2982 /* subl */
2983 bfd_put_8 (output_bfd, 0x81,
2984 contents + rel->r_offset - 2);
2985 bfd_put_8 (output_bfd, 0xe8 | ((val >> 3) & 7),
2986 contents + rel->r_offset - 1);
2987 }
2988 else if (type == 0x03)
2989 {
2990 /* addl */
2991 bfd_put_8 (output_bfd, 0x81,
2992 contents + rel->r_offset - 2);
2993 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
2994 contents + rel->r_offset - 1);
2995 }
2996 else
2997 BFD_FAIL ();
2998 if (r_type == R_386_TLS_GOTIE)
2999 bfd_put_32 (output_bfd, -elf_i386_tpoff (info, relocation),
3000 contents + rel->r_offset);
3001 else
3002 bfd_put_32 (output_bfd, elf_i386_tpoff (info, relocation),
3003 contents + rel->r_offset);
3004 continue;
3005 }
3006 }
3007
3008 if (htab->elf.sgot == NULL)
3009 abort ();
3010
3011 if (h != NULL)
3012 {
3013 off = h->got.offset;
3014 offplt = elf_x86_hash_entry (h)->tlsdesc_got;
3015 }
3016 else
3017 {
3018 if (local_got_offsets == NULL)
3019 abort ();
3020
3021 off = local_got_offsets[r_symndx];
3022 offplt = local_tlsdesc_gotents[r_symndx];
3023 }
3024
3025 if ((off & 1) != 0)
3026 off &= ~1;
3027 else
3028 {
3029 Elf_Internal_Rela outrel;
3030 int dr_type;
3031 asection *sreloc;
3032
3033 if (htab->elf.srelgot == NULL)
3034 abort ();
3035
3036 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3037
3038 if (GOT_TLS_GDESC_P (tls_type))
3039 {
3040 bfd_byte *loc;
3041 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_DESC);
3042 BFD_ASSERT (htab->sgotplt_jump_table_size + offplt + 8
3043 <= htab->elf.sgotplt->size);
3044 outrel.r_offset = (htab->elf.sgotplt->output_section->vma
3045 + htab->elf.sgotplt->output_offset
3046 + offplt
3047 + htab->sgotplt_jump_table_size);
3048 sreloc = htab->elf.srelplt;
3049 loc = sreloc->contents;
3050 loc += (htab->next_tls_desc_index++
3051 * sizeof (Elf32_External_Rel));
3052 BFD_ASSERT (loc + sizeof (Elf32_External_Rel)
3053 <= sreloc->contents + sreloc->size);
3054 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
3055 if (indx == 0)
3056 {
3057 BFD_ASSERT (! unresolved_reloc);
3058 bfd_put_32 (output_bfd,
3059 relocation - _bfd_x86_elf_dtpoff_base (info),
3060 htab->elf.sgotplt->contents + offplt
3061 + htab->sgotplt_jump_table_size + 4);
3062 }
3063 else
3064 {
3065 bfd_put_32 (output_bfd, 0,
3066 htab->elf.sgotplt->contents + offplt
3067 + htab->sgotplt_jump_table_size + 4);
3068 }
3069 }
3070
3071 sreloc = htab->elf.srelgot;
3072
3073 outrel.r_offset = (htab->elf.sgot->output_section->vma
3074 + htab->elf.sgot->output_offset + off);
3075
3076 if (GOT_TLS_GD_P (tls_type))
3077 dr_type = R_386_TLS_DTPMOD32;
3078 else if (GOT_TLS_GDESC_P (tls_type))
3079 goto dr_done;
3080 else if (tls_type == GOT_TLS_IE_POS)
3081 dr_type = R_386_TLS_TPOFF;
3082 else
3083 dr_type = R_386_TLS_TPOFF32;
3084
3085 if (dr_type == R_386_TLS_TPOFF && indx == 0)
3086 bfd_put_32 (output_bfd,
3087 relocation - _bfd_x86_elf_dtpoff_base (info),
3088 htab->elf.sgot->contents + off);
3089 else if (dr_type == R_386_TLS_TPOFF32 && indx == 0)
3090 bfd_put_32 (output_bfd,
3091 _bfd_x86_elf_dtpoff_base (info) - relocation,
3092 htab->elf.sgot->contents + off);
3093 else if (dr_type != R_386_TLS_DESC)
3094 bfd_put_32 (output_bfd, 0,
3095 htab->elf.sgot->contents + off);
3096 outrel.r_info = ELF32_R_INFO (indx, dr_type);
3097
3098 elf_append_rel (output_bfd, sreloc, &outrel);
3099
3100 if (GOT_TLS_GD_P (tls_type))
3101 {
3102 if (indx == 0)
3103 {
3104 BFD_ASSERT (! unresolved_reloc);
3105 bfd_put_32 (output_bfd,
3106 relocation - _bfd_x86_elf_dtpoff_base (info),
3107 htab->elf.sgot->contents + off + 4);
3108 }
3109 else
3110 {
3111 bfd_put_32 (output_bfd, 0,
3112 htab->elf.sgot->contents + off + 4);
3113 outrel.r_info = ELF32_R_INFO (indx,
3114 R_386_TLS_DTPOFF32);
3115 outrel.r_offset += 4;
3116 elf_append_rel (output_bfd, sreloc, &outrel);
3117 }
3118 }
3119 else if (tls_type == GOT_TLS_IE_BOTH)
3120 {
3121 bfd_put_32 (output_bfd,
3122 (indx == 0
3123 ? relocation - _bfd_x86_elf_dtpoff_base (info)
3124 : 0),
3125 htab->elf.sgot->contents + off + 4);
3126 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF);
3127 outrel.r_offset += 4;
3128 elf_append_rel (output_bfd, sreloc, &outrel);
3129 }
3130
3131 dr_done:
3132 if (h != NULL)
3133 h->got.offset |= 1;
3134 else
3135 local_got_offsets[r_symndx] |= 1;
3136 }
3137
3138 if (off >= (bfd_vma) -2
3139 && ! GOT_TLS_GDESC_P (tls_type))
3140 abort ();
3141 if (r_type_tls == R_386_TLS_GOTDESC
3142 || r_type_tls == R_386_TLS_DESC_CALL)
3143 {
3144 relocation = htab->sgotplt_jump_table_size + offplt;
3145 unresolved_reloc = FALSE;
3146 }
3147 else if (r_type_tls == r_type)
3148 {
3149 bfd_vma g_o_t = htab->elf.sgotplt->output_section->vma
3150 + htab->elf.sgotplt->output_offset;
3151 relocation = htab->elf.sgot->output_section->vma
3152 + htab->elf.sgot->output_offset + off - g_o_t;
3153 if ((r_type == R_386_TLS_IE || r_type == R_386_TLS_GOTIE)
3154 && tls_type == GOT_TLS_IE_BOTH)
3155 relocation += 4;
3156 if (r_type == R_386_TLS_IE)
3157 relocation += g_o_t;
3158 unresolved_reloc = FALSE;
3159 }
3160 else if (r_type == R_386_TLS_GD)
3161 {
3162 unsigned int val, type;
3163 bfd_vma roff;
3164
3165 /* GD->IE transition. */
3166 type = *(contents + rel->r_offset - 2);
3167 val = *(contents + rel->r_offset - 1);
3168 if (type == 0x04)
3169 {
3170 /* Change
3171 leal foo@tlsgd(,%ebx,1), %eax
3172 call ___tls_get_addr@PLT
3173 into:
3174 movl %gs:0, %eax
3175 subl $foo@gottpoff(%ebx), %eax. */
3176 val >>= 3;
3177 roff = rel->r_offset - 3;
3178 }
3179 else
3180 {
3181 /* Change
3182 leal foo@tlsgd(%ebx), %eax
3183 call ___tls_get_addr@PLT
3184 nop
3185 or
3186 leal foo@tlsgd(%reg), %eax
3187 call *___tls_get_addr@GOT(%reg)
3188 which may be converted to
3189 addr32 call ___tls_get_addr
3190 into:
3191 movl %gs:0, %eax;
3192 subl $foo@gottpoff(%reg), %eax. */
3193 roff = rel->r_offset - 2;
3194 }
3195 memcpy (contents + roff,
3196 "\x65\xa1\0\0\0\0\x2b\x80\0\0\0", 12);
3197 contents[roff + 7] = 0x80 | (val & 7);
3198 /* If foo is used only with foo@gotntpoff(%reg) and
3199 foo@indntpoff, but not with foo@gottpoff(%reg), change
3200 subl $foo@gottpoff(%reg), %eax
3201 into:
3202 addl $foo@gotntpoff(%reg), %eax. */
3203 if (tls_type == GOT_TLS_IE_POS)
3204 contents[roff + 6] = 0x03;
3205 bfd_put_32 (output_bfd,
3206 htab->elf.sgot->output_section->vma
3207 + htab->elf.sgot->output_offset + off
3208 - htab->elf.sgotplt->output_section->vma
3209 - htab->elf.sgotplt->output_offset,
3210 contents + roff + 8);
3211 /* Skip R_386_PLT32 and R_386_GOT32X. */
3212 rel++;
3213 wrel++;
3214 continue;
3215 }
3216 else if (r_type == R_386_TLS_GOTDESC)
3217 {
3218 /* GDesc -> IE transition.
3219 It's originally something like:
3220 leal x@tlsdesc(%ebx), %eax
3221
3222 Change it to:
3223 movl x@gotntpoff(%ebx), %eax # before xchg %ax,%ax
3224 or:
3225 movl x@gottpoff(%ebx), %eax # before negl %eax
3226
3227 Registers other than %eax may be set up here. */
3228
3229 bfd_vma roff;
3230
3231 /* First, make sure it's a leal adding ebx to a 32-bit
3232 offset into any register, although it's probably
3233 almost always going to be eax. */
3234 roff = rel->r_offset;
3235
3236 /* Now modify the instruction as appropriate. */
3237 /* To turn a leal into a movl in the form we use it, it
3238 suffices to change the first byte from 0x8d to 0x8b.
3239 aoliva FIXME: should we decide to keep the leal, all
3240 we have to do is remove the statement below, and
3241 adjust the relaxation of R_386_TLS_DESC_CALL. */
3242 bfd_put_8 (output_bfd, 0x8b, contents + roff - 2);
3243
3244 if (tls_type == GOT_TLS_IE_BOTH)
3245 off += 4;
3246
3247 bfd_put_32 (output_bfd,
3248 htab->elf.sgot->output_section->vma
3249 + htab->elf.sgot->output_offset + off
3250 - htab->elf.sgotplt->output_section->vma
3251 - htab->elf.sgotplt->output_offset,
3252 contents + roff);
3253 continue;
3254 }
3255 else if (r_type == R_386_TLS_DESC_CALL)
3256 {
3257 /* GDesc -> IE transition.
3258 It's originally:
3259 call *(%eax)
3260
3261 Change it to:
3262 xchg %ax,%ax
3263 or
3264 negl %eax
3265 depending on how we transformed the TLS_GOTDESC above.
3266 */
3267
3268 bfd_vma roff;
3269
3270 roff = rel->r_offset;
3271
3272 /* Now modify the instruction as appropriate. */
3273 if (tls_type != GOT_TLS_IE_NEG)
3274 {
3275 /* xchg %ax,%ax */
3276 bfd_put_8 (output_bfd, 0x66, contents + roff);
3277 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3278 }
3279 else
3280 {
3281 /* negl %eax */
3282 bfd_put_8 (output_bfd, 0xf7, contents + roff);
3283 bfd_put_8 (output_bfd, 0xd8, contents + roff + 1);
3284 }
3285
3286 continue;
3287 }
3288 else
3289 BFD_ASSERT (FALSE);
3290 break;
3291
3292 case R_386_TLS_LDM:
3293 if (! elf_i386_tls_transition (info, input_bfd,
3294 input_section, contents,
3295 symtab_hdr, sym_hashes,
3296 &r_type, GOT_UNKNOWN, rel,
3297 relend, h, r_symndx, TRUE))
3298 return FALSE;
3299
3300 if (r_type != R_386_TLS_LDM)
3301 {
3302 /* LD->LE transition. Change
3303 leal foo@tlsldm(%ebx) %eax
3304 call ___tls_get_addr@PLT
3305 into:
3306 movl %gs:0, %eax
3307 nop
3308 leal 0(%esi,1), %esi
3309 or change
3310 leal foo@tlsldm(%reg) %eax
3311 call *___tls_get_addr@GOT(%reg)
3312 which may be converted to
3313 addr32 call ___tls_get_addr
3314 into:
3315 movl %gs:0, %eax
3316 leal 0(%esi), %esi */
3317 BFD_ASSERT (r_type == R_386_TLS_LE_32);
3318 if (*(contents + rel->r_offset + 4) == 0xff
3319 || *(contents + rel->r_offset + 4) == 0x67)
3320 memcpy (contents + rel->r_offset - 2,
3321 "\x65\xa1\0\0\0\0\x8d\xb6\0\0\0", 12);
3322 else
3323 memcpy (contents + rel->r_offset - 2,
3324 "\x65\xa1\0\0\0\0\x90\x8d\x74\x26", 11);
3325 /* Skip R_386_PC32/R_386_PLT32. */
3326 rel++;
3327 wrel++;
3328 continue;
3329 }
3330
3331 if (htab->elf.sgot == NULL)
3332 abort ();
3333
3334 off = htab->tls_ld_or_ldm_got.offset;
3335 if (off & 1)
3336 off &= ~1;
3337 else
3338 {
3339 Elf_Internal_Rela outrel;
3340
3341 if (htab->elf.srelgot == NULL)
3342 abort ();
3343
3344 outrel.r_offset = (htab->elf.sgot->output_section->vma
3345 + htab->elf.sgot->output_offset + off);
3346
3347 bfd_put_32 (output_bfd, 0,
3348 htab->elf.sgot->contents + off);
3349 bfd_put_32 (output_bfd, 0,
3350 htab->elf.sgot->contents + off + 4);
3351 outrel.r_info = ELF32_R_INFO (0, R_386_TLS_DTPMOD32);
3352 elf_append_rel (output_bfd, htab->elf.srelgot, &outrel);
3353 htab->tls_ld_or_ldm_got.offset |= 1;
3354 }
3355 relocation = htab->elf.sgot->output_section->vma
3356 + htab->elf.sgot->output_offset + off
3357 - htab->elf.sgotplt->output_section->vma
3358 - htab->elf.sgotplt->output_offset;
3359 unresolved_reloc = FALSE;
3360 break;
3361
3362 case R_386_TLS_LDO_32:
3363 if (!bfd_link_executable (info)
3364 || (input_section->flags & SEC_CODE) == 0)
3365 relocation -= _bfd_x86_elf_dtpoff_base (info);
3366 else
3367 /* When converting LDO to LE, we must negate. */
3368 relocation = -elf_i386_tpoff (info, relocation);
3369 break;
3370
3371 case R_386_TLS_LE_32:
3372 case R_386_TLS_LE:
3373 if (!bfd_link_executable (info))
3374 {
3375 Elf_Internal_Rela outrel;
3376 asection *sreloc;
3377
3378 outrel.r_offset = rel->r_offset
3379 + input_section->output_section->vma
3380 + input_section->output_offset;
3381 if (h != NULL && h->dynindx != -1)
3382 indx = h->dynindx;
3383 else
3384 indx = 0;
3385 if (r_type == R_386_TLS_LE_32)
3386 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF32);
3387 else
3388 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF);
3389 sreloc = elf_section_data (input_section)->sreloc;
3390 if (sreloc == NULL)
3391 abort ();
3392 elf_append_rel (output_bfd, sreloc, &outrel);
3393 if (indx)
3394 continue;
3395 else if (r_type == R_386_TLS_LE_32)
3396 relocation = _bfd_x86_elf_dtpoff_base (info) - relocation;
3397 else
3398 relocation -= _bfd_x86_elf_dtpoff_base (info);
3399 }
3400 else if (r_type == R_386_TLS_LE_32)
3401 relocation = elf_i386_tpoff (info, relocation);
3402 else
3403 relocation = -elf_i386_tpoff (info, relocation);
3404 break;
3405
3406 default:
3407 break;
3408 }
3409
3410 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3411 because such sections are not SEC_ALLOC and thus ld.so will
3412 not process them. */
3413 if (unresolved_reloc
3414 && !((input_section->flags & SEC_DEBUGGING) != 0
3415 && h->def_dynamic)
3416 && _bfd_elf_section_offset (output_bfd, info, input_section,
3417 rel->r_offset) != (bfd_vma) -1)
3418 {
3419 _bfd_error_handler
3420 /* xgettext:c-format */
3421 (_("%pB(%pA+%#" PRIx64 "): unresolvable %s relocation against symbol `%s'"),
3422 input_bfd,
3423 input_section,
3424 (uint64_t) rel->r_offset,
3425 howto->name,
3426 h->root.root.string);
3427 return FALSE;
3428 }
3429
3430 do_relocation:
3431 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3432 contents, rel->r_offset,
3433 relocation, 0);
3434
3435 check_relocation_error:
3436 if (r != bfd_reloc_ok)
3437 {
3438 const char *name;
3439
3440 if (h != NULL)
3441 name = h->root.root.string;
3442 else
3443 {
3444 name = bfd_elf_string_from_elf_section (input_bfd,
3445 symtab_hdr->sh_link,
3446 sym->st_name);
3447 if (name == NULL)
3448 return FALSE;
3449 if (*name == '\0')
3450 name = bfd_section_name (sec);
3451 }
3452
3453 if (r == bfd_reloc_overflow)
3454 (*info->callbacks->reloc_overflow)
3455 (info, (h ? &h->root : NULL), name, howto->name,
3456 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3457 else
3458 {
3459 _bfd_error_handler
3460 /* xgettext:c-format */
3461 (_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
3462 input_bfd, input_section,
3463 (uint64_t) rel->r_offset, name, (int) r);
3464 return FALSE;
3465 }
3466 }
3467
3468 if (wrel != rel)
3469 *wrel = *rel;
3470 }
3471
3472 if (wrel != rel)
3473 {
3474 Elf_Internal_Shdr *rel_hdr;
3475 size_t deleted = rel - wrel;
3476
3477 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
3478 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
3479 if (rel_hdr->sh_size == 0)
3480 {
3481 /* It is too late to remove an empty reloc section. Leave
3482 one NONE reloc.
3483 ??? What is wrong with an empty section??? */
3484 rel_hdr->sh_size = rel_hdr->sh_entsize;
3485 deleted -= 1;
3486 }
3487 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
3488 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
3489 input_section->reloc_count -= deleted;
3490 }
3491
3492 return TRUE;
3493 }
3494
3495 /* Finish up dynamic symbol handling. We set the contents of various
3496 dynamic sections here. */
3497
3498 static bfd_boolean
3499 elf_i386_finish_dynamic_symbol (bfd *output_bfd,
3500 struct bfd_link_info *info,
3501 struct elf_link_hash_entry *h,
3502 Elf_Internal_Sym *sym)
3503 {
3504 struct elf_x86_link_hash_table *htab;
3505 unsigned plt_entry_size;
3506 struct elf_x86_link_hash_entry *eh;
3507 bfd_boolean local_undefweak;
3508 bfd_boolean use_plt_second;
3509
3510 htab = elf_x86_hash_table (info, I386_ELF_DATA);
3511 if (htab == NULL)
3512 return FALSE;
3513
3514 plt_entry_size = htab->plt.plt_entry_size;
3515
3516 /* Use the second PLT section only if there is .plt section. */
3517 use_plt_second = htab->elf.splt != NULL && htab->plt_second != NULL;
3518
3519 eh = (struct elf_x86_link_hash_entry *) h;
3520 if (eh->no_finish_dynamic_symbol)
3521 abort ();
3522
3523 /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for
3524 resolved undefined weak symbols in executable so that their
3525 references have value 0 at run-time. */
3526 local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh);
3527
3528 if (h->plt.offset != (bfd_vma) -1)
3529 {
3530 bfd_vma plt_index, plt_offset;
3531 bfd_vma got_offset;
3532 Elf_Internal_Rela rel;
3533 bfd_byte *loc;
3534 asection *plt, *resolved_plt, *gotplt, *relplt;
3535
3536 /* When building a static executable, use .iplt, .igot.plt and
3537 .rel.iplt sections for STT_GNU_IFUNC symbols. */
3538 if (htab->elf.splt != NULL)
3539 {
3540 plt = htab->elf.splt;
3541 gotplt = htab->elf.sgotplt;
3542 relplt = htab->elf.srelplt;
3543 }
3544 else
3545 {
3546 plt = htab->elf.iplt;
3547 gotplt = htab->elf.igotplt;
3548 relplt = htab->elf.irelplt;
3549 }
3550
3551 VERIFY_PLT_ENTRY (info, h, plt, gotplt, relplt, local_undefweak)
3552
3553 /* Get the index in the procedure linkage table which
3554 corresponds to this symbol. This is the index of this symbol
3555 in all the symbols for which we are making plt entries. The
3556 first entry in the procedure linkage table is reserved.
3557
3558 Get the offset into the .got table of the entry that
3559 corresponds to this function. Each .got entry is 4 bytes.
3560 The first three are reserved.
3561
3562 For static executables, we don't reserve anything. */
3563
3564 if (plt == htab->elf.splt)
3565 {
3566 got_offset = (h->plt.offset / plt_entry_size
3567 - htab->plt.has_plt0);
3568 got_offset = (got_offset + 3) * 4;
3569 }
3570 else
3571 {
3572 got_offset = h->plt.offset / plt_entry_size;
3573 got_offset = got_offset * 4;
3574 }
3575
3576 /* Fill in the entry in the procedure linkage table and update
3577 the first slot. */
3578 memcpy (plt->contents + h->plt.offset, htab->plt.plt_entry,
3579 plt_entry_size);
3580
3581 if (use_plt_second)
3582 {
3583 const bfd_byte *plt_entry;
3584 if (bfd_link_pic (info))
3585 plt_entry = htab->non_lazy_plt->pic_plt_entry;
3586 else
3587 plt_entry = htab->non_lazy_plt->plt_entry;
3588 memcpy (htab->plt_second->contents + eh->plt_second.offset,
3589 plt_entry, htab->non_lazy_plt->plt_entry_size);
3590
3591 resolved_plt = htab->plt_second;
3592 plt_offset = eh->plt_second.offset;
3593 }
3594 else
3595 {
3596 resolved_plt = plt;
3597 plt_offset = h->plt.offset;
3598 }
3599
3600 if (! bfd_link_pic (info))
3601 {
3602 bfd_put_32 (output_bfd,
3603 (gotplt->output_section->vma
3604 + gotplt->output_offset
3605 + got_offset),
3606 resolved_plt->contents + plt_offset
3607 + htab->plt.plt_got_offset);
3608
3609 if (htab->target_os == is_vxworks)
3610 {
3611 int s, k, reloc_index;
3612
3613 /* Create the R_386_32 relocation referencing the GOT
3614 for this PLT entry. */
3615
3616 /* S: Current slot number (zero-based). */
3617 s = ((h->plt.offset - htab->plt.plt_entry_size)
3618 / htab->plt.plt_entry_size);
3619 /* K: Number of relocations for PLTResolve. */
3620 if (bfd_link_pic (info))
3621 k = PLTRESOLVE_RELOCS_SHLIB;
3622 else
3623 k = PLTRESOLVE_RELOCS;
3624 /* Skip the PLTresolve relocations, and the relocations for
3625 the other PLT slots. */
3626 reloc_index = k + s * PLT_NON_JUMP_SLOT_RELOCS;
3627 loc = (htab->srelplt2->contents + reloc_index
3628 * sizeof (Elf32_External_Rel));
3629
3630 rel.r_offset = (plt->output_section->vma
3631 + plt->output_offset
3632 + h->plt.offset + 2),
3633 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_386_32);
3634 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
3635
3636 /* Create the R_386_32 relocation referencing the beginning of
3637 the PLT for this GOT entry. */
3638 rel.r_offset = (htab->elf.sgotplt->output_section->vma
3639 + htab->elf.sgotplt->output_offset
3640 + got_offset);
3641 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_386_32);
3642 bfd_elf32_swap_reloc_out (output_bfd, &rel,
3643 loc + sizeof (Elf32_External_Rel));
3644 }
3645 }
3646 else
3647 {
3648 bfd_put_32 (output_bfd, got_offset,
3649 resolved_plt->contents + plt_offset
3650 + htab->plt.plt_got_offset);
3651 }
3652
3653 /* Fill in the entry in the global offset table. Leave the entry
3654 as zero for undefined weak symbol in PIE. No PLT relocation
3655 against undefined weak symbol in PIE. */
3656 if (!local_undefweak)
3657 {
3658 if (htab->plt.has_plt0)
3659 bfd_put_32 (output_bfd,
3660 (plt->output_section->vma
3661 + plt->output_offset
3662 + h->plt.offset
3663 + htab->lazy_plt->plt_lazy_offset),
3664 gotplt->contents + got_offset);
3665
3666 /* Fill in the entry in the .rel.plt section. */
3667 rel.r_offset = (gotplt->output_section->vma
3668 + gotplt->output_offset
3669 + got_offset);
3670 if (PLT_LOCAL_IFUNC_P (info, h))
3671 {
3672 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
3673 h->root.root.string,
3674 h->root.u.def.section->owner);
3675
3676 /* If an STT_GNU_IFUNC symbol is locally defined, generate
3677 R_386_IRELATIVE instead of R_386_JUMP_SLOT. Store addend
3678 in the .got.plt section. */
3679 bfd_put_32 (output_bfd,
3680 (h->root.u.def.value
3681 + h->root.u.def.section->output_section->vma
3682 + h->root.u.def.section->output_offset),
3683 gotplt->contents + got_offset);
3684 rel.r_info = ELF32_R_INFO (0, R_386_IRELATIVE);
3685 /* R_386_IRELATIVE comes last. */
3686 plt_index = htab->next_irelative_index--;
3687 }
3688 else
3689 {
3690 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_JUMP_SLOT);
3691 plt_index = htab->next_jump_slot_index++;
3692 }
3693
3694 loc = relplt->contents + plt_index * sizeof (Elf32_External_Rel);
3695 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
3696
3697 /* Don't fill the second and third slots in PLT entry for
3698 static executables nor without PLT0. */
3699 if (plt == htab->elf.splt && htab->plt.has_plt0)
3700 {
3701 bfd_put_32 (output_bfd,
3702 plt_index * sizeof (Elf32_External_Rel),
3703 plt->contents + h->plt.offset
3704 + htab->lazy_plt->plt_reloc_offset);
3705 bfd_put_32 (output_bfd,
3706 - (h->plt.offset
3707 + htab->lazy_plt->plt_plt_offset + 4),
3708 (plt->contents + h->plt.offset
3709 + htab->lazy_plt->plt_plt_offset));
3710 }
3711 }
3712 }
3713 else if (eh->plt_got.offset != (bfd_vma) -1)
3714 {
3715 bfd_vma got_offset, plt_offset;
3716 asection *plt, *got, *gotplt;
3717 const bfd_byte *got_plt_entry;
3718
3719 /* Set the entry in the GOT procedure linkage table. */
3720 plt = htab->plt_got;
3721 got = htab->elf.sgot;
3722 gotplt = htab->elf.sgotplt;
3723 got_offset = h->got.offset;
3724
3725 if (got_offset == (bfd_vma) -1
3726 || plt == NULL
3727 || got == NULL
3728 || gotplt == NULL)
3729 abort ();
3730
3731 /* Fill in the entry in the GOT procedure linkage table. */
3732 if (! bfd_link_pic (info))
3733 {
3734 got_plt_entry = htab->non_lazy_plt->plt_entry;
3735 got_offset += got->output_section->vma + got->output_offset;
3736 }
3737 else
3738 {
3739 got_plt_entry = htab->non_lazy_plt->pic_plt_entry;
3740 got_offset += (got->output_section->vma
3741 + got->output_offset
3742 - gotplt->output_section->vma
3743 - gotplt->output_offset);
3744 }
3745
3746 plt_offset = eh->plt_got.offset;
3747 memcpy (plt->contents + plt_offset, got_plt_entry,
3748 htab->non_lazy_plt->plt_entry_size);
3749 bfd_put_32 (output_bfd, got_offset,
3750 (plt->contents + plt_offset
3751 + htab->non_lazy_plt->plt_got_offset));
3752 }
3753
3754 if (!local_undefweak
3755 && !h->def_regular
3756 && (h->plt.offset != (bfd_vma) -1
3757 || eh->plt_got.offset != (bfd_vma) -1))
3758 {
3759 /* Mark the symbol as undefined, rather than as defined in
3760 the .plt section. Leave the value if there were any
3761 relocations where pointer equality matters (this is a clue
3762 for the dynamic linker, to make function pointer
3763 comparisons work between an application and shared
3764 library), otherwise set it to zero. If a function is only
3765 called from a binary, there is no need to slow down
3766 shared libraries because of that. */
3767 sym->st_shndx = SHN_UNDEF;
3768 if (!h->pointer_equality_needed)
3769 sym->st_value = 0;
3770 }
3771
3772 _bfd_x86_elf_link_fixup_ifunc_symbol (info, htab, h, sym);
3773
3774 /* Don't generate dynamic GOT relocation against undefined weak
3775 symbol in executable. */
3776 if (h->got.offset != (bfd_vma) -1
3777 && ! GOT_TLS_GD_ANY_P (elf_x86_hash_entry(h)->tls_type)
3778 && (elf_x86_hash_entry(h)->tls_type & GOT_TLS_IE) == 0
3779 && !local_undefweak)
3780 {
3781 Elf_Internal_Rela rel;
3782 asection *relgot = htab->elf.srelgot;
3783
3784 /* This symbol has an entry in the global offset table. Set it
3785 up. */
3786
3787 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3788 abort ();
3789
3790 rel.r_offset = (htab->elf.sgot->output_section->vma
3791 + htab->elf.sgot->output_offset
3792 + (h->got.offset & ~(bfd_vma) 1));
3793
3794 /* If this is a static link, or it is a -Bsymbolic link and the
3795 symbol is defined locally or was forced to be local because
3796 of a version file, we just want to emit a RELATIVE reloc.
3797 The entry in the global offset table will already have been
3798 initialized in the relocate_section function. */
3799 if (h->def_regular
3800 && h->type == STT_GNU_IFUNC)
3801 {
3802 if (h->plt.offset == (bfd_vma) -1)
3803 {
3804 /* STT_GNU_IFUNC is referenced without PLT. */
3805 if (htab->elf.splt == NULL)
3806 {
3807 /* use .rel[a].iplt section to store .got relocations
3808 in static executable. */
3809 relgot = htab->elf.irelplt;
3810 }
3811 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
3812 {
3813 info->callbacks->minfo (_("Local IFUNC function `%s' in %pB\n"),
3814 h->root.root.string,
3815 h->root.u.def.section->owner);
3816
3817 bfd_put_32 (output_bfd,
3818 (h->root.u.def.value
3819 + h->root.u.def.section->output_section->vma
3820 + h->root.u.def.section->output_offset),
3821 htab->elf.sgot->contents + h->got.offset);
3822 rel.r_info = ELF32_R_INFO (0, R_386_IRELATIVE);
3823 }
3824 else
3825 goto do_glob_dat;
3826 }
3827 else if (bfd_link_pic (info))
3828 {
3829 /* Generate R_386_GLOB_DAT. */
3830 goto do_glob_dat;
3831 }
3832 else
3833 {
3834 asection *plt;
3835 bfd_vma plt_offset;
3836
3837 if (!h->pointer_equality_needed)
3838 abort ();
3839
3840 /* For non-shared object, we can't use .got.plt, which
3841 contains the real function addres if we need pointer
3842 equality. We load the GOT entry with the PLT entry. */
3843 if (htab->plt_second != NULL)
3844 {
3845 plt = htab->plt_second;
3846 plt_offset = eh->plt_second.offset;
3847 }
3848 else
3849 {
3850 plt = htab->elf.splt ? htab->elf.splt : htab->elf.iplt;
3851 plt_offset = h->plt.offset;
3852 }
3853 bfd_put_32 (output_bfd,
3854 (plt->output_section->vma
3855 + plt->output_offset + plt_offset),
3856 htab->elf.sgot->contents + h->got.offset);
3857 return TRUE;
3858 }
3859 }
3860 else if (bfd_link_pic (info)
3861 && SYMBOL_REFERENCES_LOCAL_P (info, h))
3862 {
3863 BFD_ASSERT((h->got.offset & 1) != 0);
3864 rel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
3865 }
3866 else
3867 {
3868 BFD_ASSERT((h->got.offset & 1) == 0);
3869 do_glob_dat:
3870 bfd_put_32 (output_bfd, (bfd_vma) 0,
3871 htab->elf.sgot->contents + h->got.offset);
3872 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_GLOB_DAT);
3873 }
3874
3875 elf_append_rel (output_bfd, relgot, &rel);
3876 }
3877
3878 if (h->needs_copy)
3879 {
3880 Elf_Internal_Rela rel;
3881 asection *s;
3882
3883 /* This symbol needs a copy reloc. Set it up. */
3884 VERIFY_COPY_RELOC (h, htab)
3885
3886 rel.r_offset = (h->root.u.def.value
3887 + h->root.u.def.section->output_section->vma
3888 + h->root.u.def.section->output_offset);
3889 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_COPY);
3890 if (h->root.u.def.section == htab->elf.sdynrelro)
3891 s = htab->elf.sreldynrelro;
3892 else
3893 s = htab->elf.srelbss;
3894 elf_append_rel (output_bfd, s, &rel);
3895 }
3896
3897 return TRUE;
3898 }
3899
3900 /* Finish up local dynamic symbol handling. We set the contents of
3901 various dynamic sections here. */
3902
3903 static bfd_boolean
3904 elf_i386_finish_local_dynamic_symbol (void **slot, void *inf)
3905 {
3906 struct elf_link_hash_entry *h
3907 = (struct elf_link_hash_entry *) *slot;
3908 struct bfd_link_info *info
3909 = (struct bfd_link_info *) inf;
3910
3911 return elf_i386_finish_dynamic_symbol (info->output_bfd, info,
3912 h, NULL);
3913 }
3914
3915 /* Finish up undefined weak symbol handling in PIE. Fill its PLT entry
3916 here since undefined weak symbol may not be dynamic and may not be
3917 called for elf_i386_finish_dynamic_symbol. */
3918
3919 static bfd_boolean
3920 elf_i386_pie_finish_undefweak_symbol (struct bfd_hash_entry *bh,
3921 void *inf)
3922 {
3923 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) bh;
3924 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3925
3926 if (h->root.type != bfd_link_hash_undefweak
3927 || h->dynindx != -1)
3928 return TRUE;
3929
3930 return elf_i386_finish_dynamic_symbol (info->output_bfd,
3931 info, h, NULL);
3932 }
3933
3934 /* Used to decide how to sort relocs in an optimal manner for the
3935 dynamic linker, before writing them out. */
3936
3937 static enum elf_reloc_type_class
3938 elf_i386_reloc_type_class (const struct bfd_link_info *info,
3939 const asection *rel_sec ATTRIBUTE_UNUSED,
3940 const Elf_Internal_Rela *rela)
3941 {
3942 bfd *abfd = info->output_bfd;
3943 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3944 struct elf_link_hash_table *htab = elf_hash_table (info);
3945
3946 if (htab->dynsym != NULL
3947 && htab->dynsym->contents != NULL)
3948 {
3949 /* Check relocation against STT_GNU_IFUNC symbol if there are
3950 dynamic symbols. */
3951 unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
3952 if (r_symndx != STN_UNDEF)
3953 {
3954 Elf_Internal_Sym sym;
3955 if (!bed->s->swap_symbol_in (abfd,
3956 (htab->dynsym->contents
3957 + r_symndx * sizeof (Elf32_External_Sym)),
3958 0, &sym))
3959 abort ();
3960
3961 if (ELF32_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3962 return reloc_class_ifunc;
3963 }
3964 }
3965
3966 switch (ELF32_R_TYPE (rela->r_info))
3967 {
3968 case R_386_IRELATIVE:
3969 return reloc_class_ifunc;
3970 case R_386_RELATIVE:
3971 return reloc_class_relative;
3972 case R_386_JUMP_SLOT:
3973 return reloc_class_plt;
3974 case R_386_COPY:
3975 return reloc_class_copy;
3976 default:
3977 return reloc_class_normal;
3978 }
3979 }
3980
3981 /* Finish up the dynamic sections. */
3982
3983 static bfd_boolean
3984 elf_i386_finish_dynamic_sections (bfd *output_bfd,
3985 struct bfd_link_info *info)
3986 {
3987 struct elf_x86_link_hash_table *htab;
3988
3989 htab = _bfd_x86_elf_finish_dynamic_sections (output_bfd, info);
3990 if (htab == NULL)
3991 return FALSE;
3992
3993 if (!htab->elf.dynamic_sections_created)
3994 return TRUE;
3995
3996 if (htab->elf.splt && htab->elf.splt->size > 0)
3997 {
3998 /* UnixWare sets the entsize of .plt to 4, although that doesn't
3999 really seem like the right value. */
4000 elf_section_data (htab->elf.splt->output_section)
4001 ->this_hdr.sh_entsize = 4;
4002
4003 if (htab->plt.has_plt0)
4004 {
4005 /* Fill in the special first entry in the procedure linkage
4006 table. */
4007 memcpy (htab->elf.splt->contents, htab->plt.plt0_entry,
4008 htab->lazy_plt->plt0_entry_size);
4009 memset (htab->elf.splt->contents + htab->lazy_plt->plt0_entry_size,
4010 htab->plt0_pad_byte,
4011 htab->plt.plt_entry_size - htab->lazy_plt->plt0_entry_size);
4012 if (!bfd_link_pic (info))
4013 {
4014 bfd_put_32 (output_bfd,
4015 (htab->elf.sgotplt->output_section->vma
4016 + htab->elf.sgotplt->output_offset
4017 + 4),
4018 htab->elf.splt->contents
4019 + htab->lazy_plt->plt0_got1_offset);
4020 bfd_put_32 (output_bfd,
4021 (htab->elf.sgotplt->output_section->vma
4022 + htab->elf.sgotplt->output_offset
4023 + 8),
4024 htab->elf.splt->contents
4025 + htab->lazy_plt->plt0_got2_offset);
4026
4027 if (htab->target_os == is_vxworks)
4028 {
4029 Elf_Internal_Rela rel;
4030 int num_plts = (htab->elf.splt->size
4031 / htab->plt.plt_entry_size) - 1;
4032 unsigned char *p;
4033 asection *srelplt2 = htab->srelplt2;
4034
4035 /* Generate a relocation for _GLOBAL_OFFSET_TABLE_
4036 + 4. On IA32 we use REL relocations so the
4037 addend goes in the PLT directly. */
4038 rel.r_offset = (htab->elf.splt->output_section->vma
4039 + htab->elf.splt->output_offset
4040 + htab->lazy_plt->plt0_got1_offset);
4041 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
4042 R_386_32);
4043 bfd_elf32_swap_reloc_out (output_bfd, &rel,
4044 srelplt2->contents);
4045 /* Generate a relocation for _GLOBAL_OFFSET_TABLE_
4046 + 8. */
4047 rel.r_offset = (htab->elf.splt->output_section->vma
4048 + htab->elf.splt->output_offset
4049 + htab->lazy_plt->plt0_got2_offset);
4050 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
4051 R_386_32);
4052 bfd_elf32_swap_reloc_out (output_bfd, &rel,
4053 srelplt2->contents +
4054 sizeof (Elf32_External_Rel));
4055 /* Correct the .rel.plt.unloaded relocations. */
4056 p = srelplt2->contents;
4057 if (bfd_link_pic (info))
4058 p += PLTRESOLVE_RELOCS_SHLIB * sizeof (Elf32_External_Rel);
4059 else
4060 p += PLTRESOLVE_RELOCS * sizeof (Elf32_External_Rel);
4061
4062 for (; num_plts; num_plts--)
4063 {
4064 bfd_elf32_swap_reloc_in (output_bfd, p, &rel);
4065 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
4066 R_386_32);
4067 bfd_elf32_swap_reloc_out (output_bfd, &rel, p);
4068 p += sizeof (Elf32_External_Rel);
4069
4070 bfd_elf32_swap_reloc_in (output_bfd, p, &rel);
4071 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
4072 R_386_32);
4073 bfd_elf32_swap_reloc_out (output_bfd, &rel, p);
4074 p += sizeof (Elf32_External_Rel);
4075 }
4076 }
4077 }
4078 }
4079 }
4080
4081 /* Fill PLT entries for undefined weak symbols in PIE. */
4082 if (bfd_link_pie (info))
4083 bfd_hash_traverse (&info->hash->table,
4084 elf_i386_pie_finish_undefweak_symbol,
4085 info);
4086
4087 return TRUE;
4088 }
4089
4090 /* Fill PLT/GOT entries and allocate dynamic relocations for local
4091 STT_GNU_IFUNC symbols, which aren't in the ELF linker hash table.
4092 It has to be done before elf_link_sort_relocs is called so that
4093 dynamic relocations are properly sorted. */
4094
4095 static bfd_boolean
4096 elf_i386_output_arch_local_syms
4097 (bfd *output_bfd ATTRIBUTE_UNUSED,
4098 struct bfd_link_info *info,
4099 void *flaginfo ATTRIBUTE_UNUSED,
4100 int (*func) (void *, const char *,
4101 Elf_Internal_Sym *,
4102 asection *,
4103 struct elf_link_hash_entry *) ATTRIBUTE_UNUSED)
4104 {
4105 struct elf_x86_link_hash_table *htab
4106 = elf_x86_hash_table (info, I386_ELF_DATA);
4107 if (htab == NULL)
4108 return FALSE;
4109
4110 /* Fill PLT and GOT entries for local STT_GNU_IFUNC symbols. */
4111 htab_traverse (htab->loc_hash_table,
4112 elf_i386_finish_local_dynamic_symbol,
4113 info);
4114
4115 return TRUE;
4116 }
4117
4118 /* Forward declaration. */
4119 static const struct elf_x86_lazy_plt_layout elf_i386_nacl_plt;
4120
4121 /* Similar to _bfd_elf_get_synthetic_symtab. Support PLTs with all
4122 dynamic relocations. */
4123
4124 static long
4125 elf_i386_get_synthetic_symtab (bfd *abfd,
4126 long symcount ATTRIBUTE_UNUSED,
4127 asymbol **syms ATTRIBUTE_UNUSED,
4128 long dynsymcount,
4129 asymbol **dynsyms,
4130 asymbol **ret)
4131 {
4132 long count, i, n;
4133 int j;
4134 bfd_byte *plt_contents;
4135 long relsize;
4136 const struct elf_x86_lazy_plt_layout *lazy_plt;
4137 const struct elf_x86_non_lazy_plt_layout *non_lazy_plt;
4138 const struct elf_x86_lazy_plt_layout *lazy_ibt_plt;
4139 const struct elf_x86_non_lazy_plt_layout *non_lazy_ibt_plt;
4140 asection *plt;
4141 bfd_vma got_addr;
4142 enum elf_x86_plt_type plt_type;
4143 struct elf_x86_plt plts[] =
4144 {
4145 { ".plt", NULL, NULL, plt_unknown, 0, 0, 0, 0 },
4146 { ".plt.got", NULL, NULL, plt_non_lazy, 0, 0, 0, 0 },
4147 { ".plt.sec", NULL, NULL, plt_second, 0, 0, 0, 0 },
4148 { NULL, NULL, NULL, plt_non_lazy, 0, 0, 0, 0 }
4149 };
4150
4151 *ret = NULL;
4152
4153 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
4154 return 0;
4155
4156 if (dynsymcount <= 0)
4157 return 0;
4158
4159 relsize = bfd_get_dynamic_reloc_upper_bound (abfd);
4160 if (relsize <= 0)
4161 return -1;
4162
4163 non_lazy_plt = NULL;
4164 /* Silence GCC 6. */
4165 lazy_plt = NULL;
4166 non_lazy_ibt_plt = NULL;
4167 lazy_ibt_plt = NULL;
4168 switch (get_elf_x86_backend_data (abfd)->target_os)
4169 {
4170 case is_normal:
4171 case is_solaris:
4172 non_lazy_plt = &elf_i386_non_lazy_plt;
4173 lazy_ibt_plt = &elf_i386_lazy_ibt_plt;
4174 non_lazy_ibt_plt = &elf_i386_non_lazy_ibt_plt;
4175 /* Fall through */
4176 case is_vxworks:
4177 lazy_plt = &elf_i386_lazy_plt;
4178 break;
4179 case is_nacl:
4180 lazy_plt = &elf_i386_nacl_plt;
4181 break;
4182 }
4183
4184 got_addr = 0;
4185
4186 count = 0;
4187 for (j = 0; plts[j].name != NULL; j++)
4188 {
4189 plt = bfd_get_section_by_name (abfd, plts[j].name);
4190 if (plt == NULL || plt->size == 0)
4191 continue;
4192
4193 /* Get the PLT section contents. */
4194 plt_contents = (bfd_byte *) bfd_malloc (plt->size);
4195 if (plt_contents == NULL)
4196 break;
4197 if (!bfd_get_section_contents (abfd, (asection *) plt,
4198 plt_contents, 0, plt->size))
4199 {
4200 free (plt_contents);
4201 break;
4202 }
4203
4204 /* Check what kind of PLT it is. */
4205 plt_type = plt_unknown;
4206 if (plts[j].type == plt_unknown
4207 && (plt->size >= (lazy_plt->plt0_entry_size
4208 + lazy_plt->plt_entry_size)))
4209 {
4210 /* Match lazy PLT first. */
4211 if (memcmp (plt_contents, lazy_plt->plt0_entry,
4212 lazy_plt->plt0_got1_offset) == 0)
4213 {
4214 /* The fist entry in the lazy IBT PLT is the same as the
4215 normal lazy PLT. */
4216 if (lazy_ibt_plt != NULL
4217 && (memcmp (plt_contents + lazy_ibt_plt->plt0_entry_size,
4218 lazy_ibt_plt->plt_entry,
4219 lazy_ibt_plt->plt_got_offset) == 0))
4220 plt_type = plt_lazy | plt_second;
4221 else
4222 plt_type = plt_lazy;
4223 }
4224 else if (memcmp (plt_contents, lazy_plt->pic_plt0_entry,
4225 lazy_plt->plt0_got1_offset) == 0)
4226 {
4227 /* The fist entry in the PIC lazy IBT PLT is the same as
4228 the normal PIC lazy PLT. */
4229 if (lazy_ibt_plt != NULL
4230 && (memcmp (plt_contents + lazy_ibt_plt->plt0_entry_size,
4231 lazy_ibt_plt->pic_plt_entry,
4232 lazy_ibt_plt->plt_got_offset) == 0))
4233 plt_type = plt_lazy | plt_pic | plt_second;
4234 else
4235 plt_type = plt_lazy | plt_pic;
4236 }
4237 }
4238
4239 if (non_lazy_plt != NULL
4240 && (plt_type == plt_unknown || plt_type == plt_non_lazy)
4241 && plt->size >= non_lazy_plt->plt_entry_size)
4242 {
4243 /* Match non-lazy PLT. */
4244 if (memcmp (plt_contents, non_lazy_plt->plt_entry,
4245 non_lazy_plt->plt_got_offset) == 0)
4246 plt_type = plt_non_lazy;
4247 else if (memcmp (plt_contents, non_lazy_plt->pic_plt_entry,
4248 non_lazy_plt->plt_got_offset) == 0)
4249 plt_type = plt_pic;
4250 }
4251
4252 if ((non_lazy_ibt_plt != NULL)
4253 && (plt_type == plt_unknown || plt_type == plt_second)
4254 && plt->size >= non_lazy_ibt_plt->plt_entry_size)
4255 {
4256 if (memcmp (plt_contents,
4257 non_lazy_ibt_plt->plt_entry,
4258 non_lazy_ibt_plt->plt_got_offset) == 0)
4259 {
4260 /* Match IBT PLT. */
4261 plt_type = plt_second;
4262 non_lazy_plt = non_lazy_ibt_plt;
4263 }
4264 else if (memcmp (plt_contents,
4265 non_lazy_ibt_plt->pic_plt_entry,
4266 non_lazy_ibt_plt->plt_got_offset) == 0)
4267 {
4268 /* Match PIC IBT PLT. */
4269 plt_type = plt_second | plt_pic;
4270 non_lazy_plt = non_lazy_ibt_plt;
4271 }
4272 }
4273
4274 if (plt_type == plt_unknown)
4275 {
4276 free (plt_contents);
4277 continue;
4278 }
4279
4280 plts[j].sec = plt;
4281 plts[j].type = plt_type;
4282
4283 if ((plt_type & plt_lazy))
4284 {
4285 plts[j].plt_got_offset = lazy_plt->plt_got_offset;
4286 plts[j].plt_entry_size = lazy_plt->plt_entry_size;
4287 /* Skip PLT0 in lazy PLT. */
4288 i = 1;
4289 }
4290 else
4291 {
4292 plts[j].plt_got_offset = non_lazy_plt->plt_got_offset;
4293 plts[j].plt_entry_size = non_lazy_plt->plt_entry_size;
4294 i = 0;
4295 }
4296
4297 /* Skip lazy PLT when the second PLT is used. */
4298 if ((plt_type & (plt_lazy | plt_second))
4299 == (plt_lazy | plt_second))
4300 plts[j].count = 0;
4301 else
4302 {
4303 n = plt->size / plts[j].plt_entry_size;
4304 plts[j].count = n;
4305 count += n - i;
4306 }
4307
4308 plts[j].contents = plt_contents;
4309
4310 /* The _GLOBAL_OFFSET_TABLE_ address is needed. */
4311 if ((plt_type & plt_pic))
4312 got_addr = (bfd_vma) -1;
4313 }
4314
4315 return _bfd_x86_elf_get_synthetic_symtab (abfd, count, relsize,
4316 got_addr, plts, dynsyms,
4317 ret);
4318 }
4319
4320 /* Set up i386 GNU properties. Return the first relocatable ELF input
4321 with GNU properties if found. Otherwise, return NULL. */
4322
4323 static bfd *
4324 elf_i386_link_setup_gnu_properties (struct bfd_link_info *info)
4325 {
4326 struct elf_x86_init_table init_table;
4327
4328 switch (get_elf_x86_backend_data (info->output_bfd)->target_os)
4329 {
4330 case is_normal:
4331 case is_solaris:
4332 init_table.plt0_pad_byte = 0x0;
4333 init_table.lazy_plt = &elf_i386_lazy_plt;
4334 init_table.non_lazy_plt = &elf_i386_non_lazy_plt;
4335 init_table.lazy_ibt_plt = &elf_i386_lazy_ibt_plt;
4336 init_table.non_lazy_ibt_plt = &elf_i386_non_lazy_ibt_plt;
4337 break;
4338 case is_vxworks:
4339 init_table.plt0_pad_byte = 0x90;
4340 init_table.lazy_plt = &elf_i386_lazy_plt;
4341 init_table.non_lazy_plt = NULL;
4342 init_table.lazy_ibt_plt = NULL;
4343 init_table.non_lazy_ibt_plt = NULL;
4344 break;
4345 case is_nacl:
4346 init_table.plt0_pad_byte = 0x90;
4347 init_table.lazy_plt = &elf_i386_nacl_plt;
4348 init_table.non_lazy_plt = NULL;
4349 init_table.lazy_ibt_plt = NULL;
4350 init_table.non_lazy_ibt_plt = NULL;
4351 break;
4352 }
4353
4354 init_table.r_info = elf32_r_info;
4355 init_table.r_sym = elf32_r_sym;
4356
4357 return _bfd_x86_elf_link_setup_gnu_properties (info, &init_table);
4358 }
4359
4360 #define TARGET_LITTLE_SYM i386_elf32_vec
4361 #define TARGET_LITTLE_NAME "elf32-i386"
4362 #define ELF_ARCH bfd_arch_i386
4363 #define ELF_TARGET_ID I386_ELF_DATA
4364 #define ELF_MACHINE_CODE EM_386
4365 #define ELF_MAXPAGESIZE 0x1000
4366
4367 #define elf_backend_can_gc_sections 1
4368 #define elf_backend_can_refcount 1
4369 #define elf_backend_want_got_plt 1
4370 #define elf_backend_plt_readonly 1
4371 #define elf_backend_want_plt_sym 0
4372 #define elf_backend_got_header_size 12
4373 #define elf_backend_plt_alignment 4
4374 #define elf_backend_dtrel_excludes_plt 1
4375 #define elf_backend_extern_protected_data 1
4376 #define elf_backend_caches_rawsize 1
4377 #define elf_backend_want_dynrelro 1
4378
4379 /* Support RELA for objdump of prelink objects. */
4380 #define elf_info_to_howto elf_i386_info_to_howto_rel
4381 #define elf_info_to_howto_rel elf_i386_info_to_howto_rel
4382
4383 #define bfd_elf32_bfd_is_local_label_name elf_i386_is_local_label_name
4384 #define bfd_elf32_bfd_reloc_type_lookup elf_i386_reloc_type_lookup
4385 #define bfd_elf32_bfd_reloc_name_lookup elf_i386_reloc_name_lookup
4386 #define bfd_elf32_get_synthetic_symtab elf_i386_get_synthetic_symtab
4387
4388 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
4389 #define elf_backend_check_relocs elf_i386_check_relocs
4390 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
4391 #define elf_backend_fake_sections elf_i386_fake_sections
4392 #define elf_backend_finish_dynamic_sections elf_i386_finish_dynamic_sections
4393 #define elf_backend_finish_dynamic_symbol elf_i386_finish_dynamic_symbol
4394 #define elf_backend_output_arch_local_syms elf_i386_output_arch_local_syms
4395 #define elf_backend_grok_prstatus elf_i386_grok_prstatus
4396 #define elf_backend_grok_psinfo elf_i386_grok_psinfo
4397 #define elf_backend_reloc_type_class elf_i386_reloc_type_class
4398 #define elf_backend_relocate_section elf_i386_relocate_section
4399 #define elf_backend_setup_gnu_properties elf_i386_link_setup_gnu_properties
4400 #define elf_backend_hide_symbol _bfd_x86_elf_hide_symbol
4401
4402 #define elf_backend_linux_prpsinfo32_ugid16 TRUE
4403
4404 #define elf32_bed elf32_i386_bed
4405
4406 #include "elf32-target.h"
4407
4408 /* FreeBSD support. */
4409
4410 #undef TARGET_LITTLE_SYM
4411 #define TARGET_LITTLE_SYM i386_elf32_fbsd_vec
4412 #undef TARGET_LITTLE_NAME
4413 #define TARGET_LITTLE_NAME "elf32-i386-freebsd"
4414 #undef ELF_OSABI
4415 #define ELF_OSABI ELFOSABI_FREEBSD
4416
4417 /* The kernel recognizes executables as valid only if they carry a
4418 "FreeBSD" label in the ELF header. So we put this label on all
4419 executables and (for simplicity) also all other object files. */
4420
4421 static bfd_boolean
4422 elf_i386_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
4423 {
4424 if (!_bfd_elf_init_file_header (abfd, info))
4425 return FALSE;
4426
4427 #ifdef OLD_FREEBSD_ABI_LABEL
4428 {
4429 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
4430 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
4431 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
4432 }
4433 #endif
4434 return TRUE;
4435 }
4436
4437 #undef elf_backend_init_file_header
4438 #define elf_backend_init_file_header elf_i386_fbsd_init_file_header
4439 #undef elf32_bed
4440 #define elf32_bed elf32_i386_fbsd_bed
4441
4442 #undef elf_backend_add_symbol_hook
4443
4444 #include "elf32-target.h"
4445
4446 #undef elf_backend_init_file_header
4447
4448 /* Solaris 2. */
4449
4450 #undef TARGET_LITTLE_SYM
4451 #define TARGET_LITTLE_SYM i386_elf32_sol2_vec
4452 #undef TARGET_LITTLE_NAME
4453 #define TARGET_LITTLE_NAME "elf32-i386-sol2"
4454
4455 static const struct elf_x86_backend_data elf_i386_solaris_arch_bed =
4456 {
4457 is_solaris /* os */
4458 };
4459
4460 #undef elf_backend_arch_data
4461 #define elf_backend_arch_data &elf_i386_solaris_arch_bed
4462
4463 /* Restore default: we cannot use ELFOSABI_SOLARIS, otherwise ELFOSABI_NONE
4464 objects won't be recognized. */
4465 #undef ELF_OSABI
4466
4467 #undef elf32_bed
4468 #define elf32_bed elf32_i386_sol2_bed
4469
4470 /* The 32-bit static TLS arena size is rounded to the nearest 8-byte
4471 boundary. */
4472 #undef elf_backend_static_tls_alignment
4473 #define elf_backend_static_tls_alignment 8
4474
4475 /* The Solaris 2 ABI requires a plt symbol on all platforms.
4476
4477 Cf. Linker and Libraries Guide, Ch. 2, Link-Editor, Generating the Output
4478 File, p.63. */
4479 #undef elf_backend_want_plt_sym
4480 #define elf_backend_want_plt_sym 1
4481
4482 #undef elf_backend_strtab_flags
4483 #define elf_backend_strtab_flags SHF_STRINGS
4484
4485 /* Called to set the sh_flags, sh_link and sh_info fields of OSECTION which
4486 has a type >= SHT_LOOS. Returns TRUE if these fields were initialised
4487 FALSE otherwise. ISECTION is the best guess matching section from the
4488 input bfd IBFD, but it might be NULL. */
4489
4490 static bfd_boolean
4491 elf32_i386_copy_solaris_special_section_fields (const bfd *ibfd ATTRIBUTE_UNUSED,
4492 bfd *obfd ATTRIBUTE_UNUSED,
4493 const Elf_Internal_Shdr *isection ATTRIBUTE_UNUSED,
4494 Elf_Internal_Shdr *osection ATTRIBUTE_UNUSED)
4495 {
4496 /* PR 19938: FIXME: Need to add code for setting the sh_info
4497 and sh_link fields of Solaris specific section types. */
4498 return FALSE;
4499
4500 /* Based upon Oracle Solaris 11.3 Linkers and Libraries Guide, Ch. 13,
4501 Object File Format, Table 13-9 ELF sh_link and sh_info Interpretation:
4502
4503 http://docs.oracle.com/cd/E53394_01/html/E54813/chapter6-94076.html#scrolltoc
4504
4505 The following values should be set:
4506
4507 Type Link Info
4508 -----------------------------------------------------------------------------
4509 SHT_SUNW_ancillary The section header index of 0
4510 [0x6fffffee] the associated string table.
4511
4512 SHT_SUNW_capinfo The section header index of For a dynamic object, the
4513 [0x6ffffff0] the associated symbol table. section header index of
4514 the associated
4515 SHT_SUNW_capchain table,
4516 otherwise 0.
4517
4518 SHT_SUNW_symsort The section header index of 0
4519 [0x6ffffff1] the associated symbol table.
4520
4521 SHT_SUNW_tlssort The section header index of 0
4522 [0x6ffffff2] the associated symbol table.
4523
4524 SHT_SUNW_LDYNSYM The section header index of One greater than the
4525 [0x6ffffff3] the associated string table. symbol table index of the
4526 This index is the same string last local symbol,
4527 table used by the SHT_DYNSYM STB_LOCAL. Since
4528 section. SHT_SUNW_LDYNSYM only
4529 contains local symbols,
4530 sh_info is equivalent to
4531 the number of symbols in
4532 the table.
4533
4534 SHT_SUNW_cap If symbol capabilities exist, If any capabilities refer
4535 [0x6ffffff5] the section header index of to named strings, the
4536 the associated section header index of
4537 SHT_SUNW_capinfo table, the associated string
4538 otherwise 0. table, otherwise 0.
4539
4540 SHT_SUNW_move The section header index of 0
4541 [0x6ffffffa] the associated symbol table.
4542
4543 SHT_SUNW_COMDAT 0 0
4544 [0x6ffffffb]
4545
4546 SHT_SUNW_syminfo The section header index of The section header index
4547 [0x6ffffffc] the associated symbol table. of the associated
4548 .dynamic section.
4549
4550 SHT_SUNW_verdef The section header index of The number of version
4551 [0x6ffffffd] the associated string table. definitions within the
4552 section.
4553
4554 SHT_SUNW_verneed The section header index of The number of version
4555 [0x6ffffffe] the associated string table. dependencies within the
4556 section.
4557
4558 SHT_SUNW_versym The section header index of 0
4559 [0x6fffffff] the associated symbol table. */
4560 }
4561
4562 #undef elf_backend_copy_special_section_fields
4563 #define elf_backend_copy_special_section_fields elf32_i386_copy_solaris_special_section_fields
4564
4565 #include "elf32-target.h"
4566
4567 /* Intel MCU support. */
4568
4569 static bfd_boolean
4570 elf32_iamcu_elf_object_p (bfd *abfd)
4571 {
4572 /* Set the right machine number for an IAMCU elf32 file. */
4573 bfd_default_set_arch_mach (abfd, bfd_arch_iamcu, bfd_mach_i386_iamcu);
4574 return TRUE;
4575 }
4576
4577 #undef TARGET_LITTLE_SYM
4578 #define TARGET_LITTLE_SYM iamcu_elf32_vec
4579 #undef TARGET_LITTLE_NAME
4580 #define TARGET_LITTLE_NAME "elf32-iamcu"
4581 #undef ELF_ARCH
4582 #define ELF_ARCH bfd_arch_iamcu
4583
4584 #undef ELF_MACHINE_CODE
4585 #define ELF_MACHINE_CODE EM_IAMCU
4586
4587 #undef elf_backend_arch_data
4588 #define elf_backend_arch_data &elf_i386_arch_bed
4589
4590 #undef ELF_OSABI
4591
4592 #undef elf32_bed
4593 #define elf32_bed elf32_iamcu_bed
4594
4595 #undef elf_backend_object_p
4596 #define elf_backend_object_p elf32_iamcu_elf_object_p
4597
4598 #undef elf_backend_static_tls_alignment
4599
4600 #undef elf_backend_want_plt_sym
4601 #define elf_backend_want_plt_sym 0
4602
4603 #undef elf_backend_strtab_flags
4604 #undef elf_backend_copy_special_section_fields
4605
4606 #include "elf32-target.h"
4607
4608 /* Restore defaults. */
4609 #undef ELF_ARCH
4610 #define ELF_ARCH bfd_arch_i386
4611 #undef ELF_MACHINE_CODE
4612 #define ELF_MACHINE_CODE EM_386
4613
4614 /* Native Client support. */
4615
4616 #undef TARGET_LITTLE_SYM
4617 #define TARGET_LITTLE_SYM i386_elf32_nacl_vec
4618 #undef TARGET_LITTLE_NAME
4619 #define TARGET_LITTLE_NAME "elf32-i386-nacl"
4620 #undef elf32_bed
4621 #define elf32_bed elf32_i386_nacl_bed
4622
4623 #undef ELF_MAXPAGESIZE
4624 #define ELF_MAXPAGESIZE 0x10000
4625
4626 /* Restore defaults. */
4627 #undef ELF_OSABI
4628 #undef elf_backend_want_plt_sym
4629 #define elf_backend_want_plt_sym 0
4630 #undef elf_backend_static_tls_alignment
4631
4632 /* NaCl uses substantially different PLT entries for the same effects. */
4633
4634 #undef elf_backend_plt_alignment
4635 #define elf_backend_plt_alignment 5
4636 #define NACL_PLT_ENTRY_SIZE 64
4637 #define NACLMASK 0xe0 /* 32-byte alignment mask. */
4638
4639 static const bfd_byte elf_i386_nacl_plt0_entry[] =
4640 {
4641 0xff, 0x35, /* pushl contents of address */
4642 0, 0, 0, 0, /* replaced with address of .got + 4. */
4643 0x8b, 0x0d, /* movl contents of address, %ecx */
4644 0, 0, 0, 0, /* replaced with address of .got + 8. */
4645 0x83, 0xe1, NACLMASK, /* andl $NACLMASK, %ecx */
4646 0xff, 0xe1 /* jmp *%ecx */
4647 };
4648
4649 static const bfd_byte elf_i386_nacl_plt_entry[NACL_PLT_ENTRY_SIZE] =
4650 {
4651 0x8b, 0x0d, /* movl contents of address, %ecx */
4652 0, 0, 0, 0, /* replaced with GOT slot address. */
4653 0x83, 0xe1, NACLMASK, /* andl $NACLMASK, %ecx */
4654 0xff, 0xe1, /* jmp *%ecx */
4655
4656 /* Pad to the next 32-byte boundary with nop instructions. */
4657 0x90,
4658 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4659 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4660
4661 /* Lazy GOT entries point here (32-byte aligned). */
4662 0x68, /* pushl immediate */
4663 0, 0, 0, 0, /* replaced with reloc offset. */
4664 0xe9, /* jmp relative */
4665 0, 0, 0, 0, /* replaced with offset to .plt. */
4666
4667 /* Pad to the next 32-byte boundary with nop instructions. */
4668 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4669 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4670 0x90, 0x90
4671 };
4672
4673 static const bfd_byte
4674 elf_i386_nacl_pic_plt0_entry[sizeof (elf_i386_nacl_plt0_entry)] =
4675 {
4676 0xff, 0x73, 0x04, /* pushl 4(%ebx) */
4677 0x8b, 0x4b, 0x08, /* mov 0x8(%ebx), %ecx */
4678 0x83, 0xe1, 0xe0, /* and $NACLMASK, %ecx */
4679 0xff, 0xe1, /* jmp *%ecx */
4680
4681 /* This is expected to be the same size as elf_i386_nacl_plt0_entry,
4682 so pad to that size with nop instructions. */
4683 0x90, 0x90, 0x90, 0x90, 0x90, 0x90
4684 };
4685
4686 static const bfd_byte elf_i386_nacl_pic_plt_entry[NACL_PLT_ENTRY_SIZE] =
4687 {
4688 0x8b, 0x8b, /* movl offset(%ebx), %ecx */
4689 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
4690 0x83, 0xe1, 0xe0, /* andl $NACLMASK, %ecx */
4691 0xff, 0xe1, /* jmp *%ecx */
4692
4693 /* Pad to the next 32-byte boundary with nop instructions. */
4694 0x90,
4695 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4696 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4697
4698 /* Lazy GOT entries point here (32-byte aligned). */
4699 0x68, /* pushl immediate */
4700 0, 0, 0, 0, /* replaced with offset into relocation table. */
4701 0xe9, /* jmp relative */
4702 0, 0, 0, 0, /* replaced with offset to start of .plt. */
4703
4704 /* Pad to the next 32-byte boundary with nop instructions. */
4705 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4706 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90, 0x90,
4707 0x90, 0x90
4708 };
4709
4710 static const bfd_byte elf_i386_nacl_eh_frame_plt[] =
4711 {
4712 #if (PLT_CIE_LENGTH != 20 \
4713 || PLT_FDE_LENGTH != 36 \
4714 || PLT_FDE_START_OFFSET != 4 + PLT_CIE_LENGTH + 8 \
4715 || PLT_FDE_LEN_OFFSET != 4 + PLT_CIE_LENGTH + 12)
4716 # error "Need elf_x86_backend_data parameters for eh_frame_plt offsets!"
4717 #endif
4718 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
4719 0, 0, 0, 0, /* CIE ID */
4720 1, /* CIE version */
4721 'z', 'R', 0, /* Augmentation string */
4722 1, /* Code alignment factor */
4723 0x7c, /* Data alignment factor: -4 */
4724 8, /* Return address column */
4725 1, /* Augmentation size */
4726 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
4727 DW_CFA_def_cfa, 4, 4, /* DW_CFA_def_cfa: r4 (esp) ofs 4 */
4728 DW_CFA_offset + 8, 1, /* DW_CFA_offset: r8 (eip) at cfa-4 */
4729 DW_CFA_nop, DW_CFA_nop,
4730
4731 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
4732 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
4733 0, 0, 0, 0, /* R_386_PC32 .plt goes here */
4734 0, 0, 0, 0, /* .plt size goes here */
4735 0, /* Augmentation size */
4736 DW_CFA_def_cfa_offset, 8, /* DW_CFA_def_cfa_offset: 8 */
4737 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
4738 DW_CFA_def_cfa_offset, 12, /* DW_CFA_def_cfa_offset: 12 */
4739 DW_CFA_advance_loc + 58, /* DW_CFA_advance_loc: 58 to __PLT__+64 */
4740 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
4741 13, /* Block length */
4742 DW_OP_breg4, 4, /* DW_OP_breg4 (esp): 4 */
4743 DW_OP_breg8, 0, /* DW_OP_breg8 (eip): 0 */
4744 DW_OP_const1u, 63, DW_OP_and, DW_OP_const1u, 37, DW_OP_ge,
4745 DW_OP_lit2, DW_OP_shl, DW_OP_plus,
4746 DW_CFA_nop, DW_CFA_nop
4747 };
4748
4749 static const struct elf_x86_lazy_plt_layout elf_i386_nacl_plt =
4750 {
4751 elf_i386_nacl_plt0_entry, /* plt0_entry */
4752 sizeof (elf_i386_nacl_plt0_entry), /* plt0_entry_size */
4753 elf_i386_nacl_plt_entry, /* plt_entry */
4754 NACL_PLT_ENTRY_SIZE, /* plt_entry_size */
4755 NULL, /* plt_tlsdesc_entry */
4756 0, /* plt_tlsdesc_entry_size*/
4757 0, /* plt_tlsdesc_got1_offset */
4758 0, /* plt_tlsdesc_got2_offset */
4759 0, /* plt_tlsdesc_got1_insn_end */
4760 0, /* plt_tlsdesc_got2_insn_end */
4761 2, /* plt0_got1_offset */
4762 8, /* plt0_got2_offset */
4763 0, /* plt0_got2_insn_end */
4764 2, /* plt_got_offset */
4765 33, /* plt_reloc_offset */
4766 38, /* plt_plt_offset */
4767 0, /* plt_got_insn_size */
4768 0, /* plt_plt_insn_end */
4769 32, /* plt_lazy_offset */
4770 elf_i386_nacl_pic_plt0_entry, /* pic_plt0_entry */
4771 elf_i386_nacl_pic_plt_entry, /* pic_plt_entry */
4772 elf_i386_nacl_eh_frame_plt, /* eh_frame_plt */
4773 sizeof (elf_i386_nacl_eh_frame_plt) /* eh_frame_plt_size */
4774 };
4775
4776 static const struct elf_x86_backend_data elf_i386_nacl_arch_bed =
4777 {
4778 is_nacl /* os */
4779 };
4780
4781 static bfd_boolean
4782 elf32_i386_nacl_elf_object_p (bfd *abfd)
4783 {
4784 /* Set the right machine number for a NaCl i386 ELF32 file. */
4785 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_i386_i386_nacl);
4786 return TRUE;
4787 }
4788
4789 #undef elf_backend_arch_data
4790 #define elf_backend_arch_data &elf_i386_nacl_arch_bed
4791
4792 #undef elf_backend_object_p
4793 #define elf_backend_object_p elf32_i386_nacl_elf_object_p
4794 #undef elf_backend_modify_segment_map
4795 #define elf_backend_modify_segment_map nacl_modify_segment_map
4796 #undef elf_backend_modify_headers
4797 #define elf_backend_modify_headers nacl_modify_headers
4798 #undef elf_backend_final_write_processing
4799 #define elf_backend_final_write_processing nacl_final_write_processing
4800
4801 #include "elf32-target.h"
4802
4803 /* Restore defaults. */
4804 #undef elf_backend_object_p
4805 #undef elf_backend_modify_segment_map
4806 #undef elf_backend_modify_headers
4807 #undef elf_backend_final_write_processing
4808
4809 /* VxWorks support. */
4810
4811 #undef TARGET_LITTLE_SYM
4812 #define TARGET_LITTLE_SYM i386_elf32_vxworks_vec
4813 #undef TARGET_LITTLE_NAME
4814 #define TARGET_LITTLE_NAME "elf32-i386-vxworks"
4815 #undef ELF_OSABI
4816 #undef ELF_MAXPAGESIZE
4817 #define ELF_MAXPAGESIZE 0x1000
4818 #undef elf_backend_plt_alignment
4819 #define elf_backend_plt_alignment 4
4820
4821 static const struct elf_x86_backend_data elf_i386_vxworks_arch_bed =
4822 {
4823 is_vxworks /* os */
4824 };
4825
4826 #undef elf_backend_arch_data
4827 #define elf_backend_arch_data &elf_i386_vxworks_arch_bed
4828
4829 #undef elf_backend_relocs_compatible
4830 #undef elf_backend_add_symbol_hook
4831 #define elf_backend_add_symbol_hook \
4832 elf_vxworks_add_symbol_hook
4833 #undef elf_backend_link_output_symbol_hook
4834 #define elf_backend_link_output_symbol_hook \
4835 elf_vxworks_link_output_symbol_hook
4836 #undef elf_backend_emit_relocs
4837 #define elf_backend_emit_relocs elf_vxworks_emit_relocs
4838 #undef elf_backend_final_write_processing
4839 #define elf_backend_final_write_processing \
4840 elf_vxworks_final_write_processing
4841 #undef elf_backend_static_tls_alignment
4842
4843 /* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
4844 define it. */
4845 #undef elf_backend_want_plt_sym
4846 #define elf_backend_want_plt_sym 1
4847
4848 #undef elf32_bed
4849 #define elf32_bed elf32_i386_vxworks_bed
4850
4851 #include "elf32-target.h"
This page took 0.147944 seconds and 4 git commands to generate.