* elf32-i386.c (elf_i386_finish_dynamic_sections): Add output_offset
[deliverable/binutils-gdb.git] / bfd / elf32-i386.c
CommitLineData
252b5132 1/* Intel 80386/80486-specific support for 32-bit ELF
e92d460e 2 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002
638632bd 3 Free Software Foundation, Inc.
252b5132
RH
4
5This file is part of BFD, the Binary File Descriptor library.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
19Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
21#include "bfd.h"
22#include "sysdep.h"
23#include "bfdlink.h"
24#include "libbfd.h"
25#include "elf-bfd.h"
26
27static reloc_howto_type *elf_i386_reloc_type_lookup
28 PARAMS ((bfd *, bfd_reloc_code_real_type));
29static void elf_i386_info_to_howto
947216bf 30 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
252b5132 31static void elf_i386_info_to_howto_rel
947216bf 32 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
b34976b6 33static bfd_boolean elf_i386_is_local_label_name
ebe50bae 34 PARAMS ((bfd *, const char *));
b34976b6 35static bfd_boolean elf_i386_grok_prstatus
38701953 36 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
b34976b6 37static bfd_boolean elf_i386_grok_psinfo
38701953
AM
38 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
39static struct bfd_hash_entry *link_hash_newfunc
252b5132
RH
40 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
41static struct bfd_link_hash_table *elf_i386_link_hash_table_create
42 PARAMS ((bfd *));
b34976b6 43static bfd_boolean create_got_section
ebe50bae 44 PARAMS((bfd *, struct bfd_link_info *));
b34976b6 45static bfd_boolean elf_i386_create_dynamic_sections
6725bdbf 46 PARAMS((bfd *, struct bfd_link_info *));
51b64d56 47static void elf_i386_copy_indirect_symbol
b48fa14c
AM
48 PARAMS ((struct elf_backend_data *, struct elf_link_hash_entry *,
49 struct elf_link_hash_entry *));
13ae64f3
JJ
50static int elf_i386_tls_transition
51 PARAMS ((struct bfd_link_info *, int, int));
52
b34976b6 53static bfd_boolean elf_i386_mkobject
13ae64f3 54 PARAMS((bfd *));
b34976b6 55static bfd_boolean elf_i386_object_p
13ae64f3 56 PARAMS((bfd *));
b34976b6 57static bfd_boolean elf_i386_check_relocs
252b5132
RH
58 PARAMS ((bfd *, struct bfd_link_info *, asection *,
59 const Elf_Internal_Rela *));
a7b97311 60static asection *elf_i386_gc_mark_hook
1e2f5b6e 61 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
a7b97311 62 struct elf_link_hash_entry *, Elf_Internal_Sym *));
b34976b6 63static bfd_boolean elf_i386_gc_sweep_hook
a7b97311
AM
64 PARAMS ((bfd *, struct bfd_link_info *, asection *,
65 const Elf_Internal_Rela *));
b34976b6 66static bfd_boolean elf_i386_adjust_dynamic_symbol
252b5132 67 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
b34976b6 68static bfd_boolean allocate_dynrelocs
0c715baa 69 PARAMS ((struct elf_link_hash_entry *, PTR));
b34976b6 70static bfd_boolean readonly_dynrelocs
6725bdbf 71 PARAMS ((struct elf_link_hash_entry *, PTR));
b34976b6 72static bfd_boolean elf_i386_fake_sections
947216bf 73 PARAMS ((bfd *, Elf_Internal_Shdr *, asection *));
b34976b6 74static bfd_boolean elf_i386_size_dynamic_sections
252b5132 75 PARAMS ((bfd *, struct bfd_link_info *));
13ae64f3
JJ
76static bfd_vma dtpoff_base
77 PARAMS ((struct bfd_link_info *));
78static bfd_vma tpoff
79 PARAMS ((struct bfd_link_info *, bfd_vma));
b34976b6 80static bfd_boolean elf_i386_relocate_section
252b5132
RH
81 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
82 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
b34976b6 83static bfd_boolean elf_i386_finish_dynamic_symbol
252b5132
RH
84 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
85 Elf_Internal_Sym *));
f51e552e
AM
86static enum elf_reloc_type_class elf_i386_reloc_type_class
87 PARAMS ((const Elf_Internal_Rela *));
b34976b6 88static bfd_boolean elf_i386_finish_dynamic_sections
38701953 89 PARAMS ((bfd *, struct bfd_link_info *));
252b5132
RH
90
91#define USE_REL 1 /* 386 uses REL relocations instead of RELA */
92
93#include "elf/i386.h"
94
95static reloc_howto_type elf_howto_table[]=
96{
b34976b6 97 HOWTO(R_386_NONE, 0, 0, 0, FALSE, 0, complain_overflow_bitfield,
1b452ec6 98 bfd_elf_generic_reloc, "R_386_NONE",
b34976b6
AM
99 TRUE, 0x00000000, 0x00000000, FALSE),
100 HOWTO(R_386_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 101 bfd_elf_generic_reloc, "R_386_32",
b34976b6
AM
102 TRUE, 0xffffffff, 0xffffffff, FALSE),
103 HOWTO(R_386_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
1b452ec6 104 bfd_elf_generic_reloc, "R_386_PC32",
b34976b6
AM
105 TRUE, 0xffffffff, 0xffffffff, TRUE),
106 HOWTO(R_386_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 107 bfd_elf_generic_reloc, "R_386_GOT32",
b34976b6
AM
108 TRUE, 0xffffffff, 0xffffffff, FALSE),
109 HOWTO(R_386_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
1b452ec6 110 bfd_elf_generic_reloc, "R_386_PLT32",
b34976b6
AM
111 TRUE, 0xffffffff, 0xffffffff, TRUE),
112 HOWTO(R_386_COPY, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 113 bfd_elf_generic_reloc, "R_386_COPY",
b34976b6
AM
114 TRUE, 0xffffffff, 0xffffffff, FALSE),
115 HOWTO(R_386_GLOB_DAT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 116 bfd_elf_generic_reloc, "R_386_GLOB_DAT",
b34976b6
AM
117 TRUE, 0xffffffff, 0xffffffff, FALSE),
118 HOWTO(R_386_JUMP_SLOT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 119 bfd_elf_generic_reloc, "R_386_JUMP_SLOT",
b34976b6
AM
120 TRUE, 0xffffffff, 0xffffffff, FALSE),
121 HOWTO(R_386_RELATIVE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 122 bfd_elf_generic_reloc, "R_386_RELATIVE",
b34976b6
AM
123 TRUE, 0xffffffff, 0xffffffff, FALSE),
124 HOWTO(R_386_GOTOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
1b452ec6 125 bfd_elf_generic_reloc, "R_386_GOTOFF",
b34976b6
AM
126 TRUE, 0xffffffff, 0xffffffff, FALSE),
127 HOWTO(R_386_GOTPC, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
1b452ec6 128 bfd_elf_generic_reloc, "R_386_GOTPC",
b34976b6 129 TRUE, 0xffffffff, 0xffffffff, TRUE),
1b452ec6 130
dc47f327
AM
131 /* We have a gap in the reloc numbers here.
132 R_386_standard counts the number up to this point, and
133 R_386_ext_offset is the value to subtract from a reloc type of
134 R_386_16 thru R_386_PC8 to form an index into this table. */
1b452ec6 135#define R_386_standard ((unsigned int) R_386_GOTPC + 1)
37e55690 136#define R_386_ext_offset ((unsigned int) R_386_TLS_TPOFF - R_386_standard)
1b452ec6 137
37e55690 138 /* These relocs are a GNU extension. */
b34976b6 139 HOWTO(R_386_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
37e55690 140 bfd_elf_generic_reloc, "R_386_TLS_TPOFF",
b34976b6
AM
141 TRUE, 0xffffffff, 0xffffffff, FALSE),
142 HOWTO(R_386_TLS_IE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
37e55690 143 bfd_elf_generic_reloc, "R_386_TLS_IE",
b34976b6
AM
144 TRUE, 0xffffffff, 0xffffffff, FALSE),
145 HOWTO(R_386_TLS_GOTIE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
37e55690 146 bfd_elf_generic_reloc, "R_386_TLS_GOTIE",
b34976b6
AM
147 TRUE, 0xffffffff, 0xffffffff, FALSE),
148 HOWTO(R_386_TLS_LE, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 149 bfd_elf_generic_reloc, "R_386_TLS_LE",
b34976b6
AM
150 TRUE, 0xffffffff, 0xffffffff, FALSE),
151 HOWTO(R_386_TLS_GD, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 152 bfd_elf_generic_reloc, "R_386_TLS_GD",
b34976b6
AM
153 TRUE, 0xffffffff, 0xffffffff, FALSE),
154 HOWTO(R_386_TLS_LDM, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 155 bfd_elf_generic_reloc, "R_386_TLS_LDM",
b34976b6
AM
156 TRUE, 0xffffffff, 0xffffffff, FALSE),
157 HOWTO(R_386_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
1b452ec6 158 bfd_elf_generic_reloc, "R_386_16",
b34976b6
AM
159 TRUE, 0xffff, 0xffff, FALSE),
160 HOWTO(R_386_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
1b452ec6 161 bfd_elf_generic_reloc, "R_386_PC16",
b34976b6
AM
162 TRUE, 0xffff, 0xffff, TRUE),
163 HOWTO(R_386_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
1b452ec6 164 bfd_elf_generic_reloc, "R_386_8",
b34976b6
AM
165 TRUE, 0xff, 0xff, FALSE),
166 HOWTO(R_386_PC8, 0, 0, 8, TRUE, 0, complain_overflow_signed,
1b452ec6 167 bfd_elf_generic_reloc, "R_386_PC8",
b34976b6 168 TRUE, 0xff, 0xff, TRUE),
dc47f327 169
dc47f327 170#define R_386_ext ((unsigned int) R_386_PC8 + 1 - R_386_ext_offset)
13ae64f3
JJ
171#define R_386_tls_offset ((unsigned int) R_386_TLS_LDO_32 - R_386_ext)
172 /* These are common with Solaris TLS implementation. */
b34976b6 173 HOWTO(R_386_TLS_LDO_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 174 bfd_elf_generic_reloc, "R_386_TLS_LDO_32",
b34976b6
AM
175 TRUE, 0xffffffff, 0xffffffff, FALSE),
176 HOWTO(R_386_TLS_IE_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 177 bfd_elf_generic_reloc, "R_386_TLS_IE_32",
b34976b6
AM
178 TRUE, 0xffffffff, 0xffffffff, FALSE),
179 HOWTO(R_386_TLS_LE_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 180 bfd_elf_generic_reloc, "R_386_TLS_LE_32",
b34976b6
AM
181 TRUE, 0xffffffff, 0xffffffff, FALSE),
182 HOWTO(R_386_TLS_DTPMOD32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 183 bfd_elf_generic_reloc, "R_386_TLS_DTPMOD32",
b34976b6
AM
184 TRUE, 0xffffffff, 0xffffffff, FALSE),
185 HOWTO(R_386_TLS_DTPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 186 bfd_elf_generic_reloc, "R_386_TLS_DTPOFF32",
b34976b6
AM
187 TRUE, 0xffffffff, 0xffffffff, FALSE),
188 HOWTO(R_386_TLS_TPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
13ae64f3 189 bfd_elf_generic_reloc, "R_386_TLS_TPOFF32",
b34976b6 190 TRUE, 0xffffffff, 0xffffffff, FALSE),
13ae64f3
JJ
191
192 /* Another gap. */
193#define R_386_tls ((unsigned int) R_386_TLS_TPOFF32 + 1 - R_386_tls_offset)
194#define R_386_vt_offset ((unsigned int) R_386_GNU_VTINHERIT - R_386_tls)
252b5132
RH
195
196/* GNU extension to record C++ vtable hierarchy. */
252b5132
RH
197 HOWTO (R_386_GNU_VTINHERIT, /* type */
198 0, /* rightshift */
199 2, /* size (0 = byte, 1 = short, 2 = long) */
200 0, /* bitsize */
b34976b6 201 FALSE, /* pc_relative */
252b5132
RH
202 0, /* bitpos */
203 complain_overflow_dont, /* complain_on_overflow */
204 NULL, /* special_function */
205 "R_386_GNU_VTINHERIT", /* name */
b34976b6 206 FALSE, /* partial_inplace */
252b5132
RH
207 0, /* src_mask */
208 0, /* dst_mask */
b34976b6 209 FALSE), /* pcrel_offset */
252b5132
RH
210
211/* GNU extension to record C++ vtable member usage. */
252b5132
RH
212 HOWTO (R_386_GNU_VTENTRY, /* type */
213 0, /* rightshift */
214 2, /* size (0 = byte, 1 = short, 2 = long) */
215 0, /* bitsize */
b34976b6 216 FALSE, /* pc_relative */
252b5132
RH
217 0, /* bitpos */
218 complain_overflow_dont, /* complain_on_overflow */
219 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
220 "R_386_GNU_VTENTRY", /* name */
b34976b6 221 FALSE, /* partial_inplace */
252b5132
RH
222 0, /* src_mask */
223 0, /* dst_mask */
b34976b6 224 FALSE) /* pcrel_offset */
dc47f327
AM
225
226#define R_386_vt ((unsigned int) R_386_GNU_VTENTRY + 1 - R_386_vt_offset)
227
228};
229
252b5132
RH
230#ifdef DEBUG_GEN_RELOC
231#define TRACE(str) fprintf (stderr, "i386 bfd reloc lookup %d (%s)\n", code, str)
232#else
233#define TRACE(str)
234#endif
235
236static reloc_howto_type *
237elf_i386_reloc_type_lookup (abfd, code)
7442e600 238 bfd *abfd ATTRIBUTE_UNUSED;
252b5132
RH
239 bfd_reloc_code_real_type code;
240{
241 switch (code)
242 {
243 case BFD_RELOC_NONE:
244 TRACE ("BFD_RELOC_NONE");
1b452ec6 245 return &elf_howto_table[(unsigned int) R_386_NONE ];
252b5132
RH
246
247 case BFD_RELOC_32:
248 TRACE ("BFD_RELOC_32");
1b452ec6 249 return &elf_howto_table[(unsigned int) R_386_32 ];
252b5132
RH
250
251 case BFD_RELOC_CTOR:
252 TRACE ("BFD_RELOC_CTOR");
1b452ec6 253 return &elf_howto_table[(unsigned int) R_386_32 ];
252b5132
RH
254
255 case BFD_RELOC_32_PCREL:
256 TRACE ("BFD_RELOC_PC32");
1b452ec6 257 return &elf_howto_table[(unsigned int) R_386_PC32 ];
252b5132
RH
258
259 case BFD_RELOC_386_GOT32:
260 TRACE ("BFD_RELOC_386_GOT32");
1b452ec6 261 return &elf_howto_table[(unsigned int) R_386_GOT32 ];
252b5132
RH
262
263 case BFD_RELOC_386_PLT32:
264 TRACE ("BFD_RELOC_386_PLT32");
1b452ec6 265 return &elf_howto_table[(unsigned int) R_386_PLT32 ];
252b5132
RH
266
267 case BFD_RELOC_386_COPY:
268 TRACE ("BFD_RELOC_386_COPY");
1b452ec6 269 return &elf_howto_table[(unsigned int) R_386_COPY ];
252b5132
RH
270
271 case BFD_RELOC_386_GLOB_DAT:
272 TRACE ("BFD_RELOC_386_GLOB_DAT");
1b452ec6 273 return &elf_howto_table[(unsigned int) R_386_GLOB_DAT ];
252b5132
RH
274
275 case BFD_RELOC_386_JUMP_SLOT:
276 TRACE ("BFD_RELOC_386_JUMP_SLOT");
1b452ec6 277 return &elf_howto_table[(unsigned int) R_386_JUMP_SLOT ];
252b5132
RH
278
279 case BFD_RELOC_386_RELATIVE:
280 TRACE ("BFD_RELOC_386_RELATIVE");
1b452ec6 281 return &elf_howto_table[(unsigned int) R_386_RELATIVE ];
252b5132
RH
282
283 case BFD_RELOC_386_GOTOFF:
284 TRACE ("BFD_RELOC_386_GOTOFF");
1b452ec6 285 return &elf_howto_table[(unsigned int) R_386_GOTOFF ];
252b5132
RH
286
287 case BFD_RELOC_386_GOTPC:
288 TRACE ("BFD_RELOC_386_GOTPC");
1b452ec6 289 return &elf_howto_table[(unsigned int) R_386_GOTPC ];
252b5132 290
37e55690
JJ
291 /* These relocs are a GNU extension. */
292 case BFD_RELOC_386_TLS_TPOFF:
293 TRACE ("BFD_RELOC_386_TLS_TPOFF");
294 return &elf_howto_table[(unsigned int) R_386_TLS_TPOFF - R_386_ext_offset];
295
296 case BFD_RELOC_386_TLS_IE:
297 TRACE ("BFD_RELOC_386_TLS_IE");
298 return &elf_howto_table[(unsigned int) R_386_TLS_IE - R_386_ext_offset];
299
300 case BFD_RELOC_386_TLS_GOTIE:
301 TRACE ("BFD_RELOC_386_TLS_GOTIE");
302 return &elf_howto_table[(unsigned int) R_386_TLS_GOTIE - R_386_ext_offset];
303
13ae64f3
JJ
304 case BFD_RELOC_386_TLS_LE:
305 TRACE ("BFD_RELOC_386_TLS_LE");
306 return &elf_howto_table[(unsigned int) R_386_TLS_LE - R_386_ext_offset];
307
308 case BFD_RELOC_386_TLS_GD:
309 TRACE ("BFD_RELOC_386_TLS_GD");
310 return &elf_howto_table[(unsigned int) R_386_TLS_GD - R_386_ext_offset];
311
312 case BFD_RELOC_386_TLS_LDM:
313 TRACE ("BFD_RELOC_386_TLS_LDM");
314 return &elf_howto_table[(unsigned int) R_386_TLS_LDM - R_386_ext_offset];
315
252b5132
RH
316 case BFD_RELOC_16:
317 TRACE ("BFD_RELOC_16");
1b452ec6 318 return &elf_howto_table[(unsigned int) R_386_16 - R_386_ext_offset];
252b5132
RH
319
320 case BFD_RELOC_16_PCREL:
321 TRACE ("BFD_RELOC_16_PCREL");
1b452ec6 322 return &elf_howto_table[(unsigned int) R_386_PC16 - R_386_ext_offset];
252b5132
RH
323
324 case BFD_RELOC_8:
325 TRACE ("BFD_RELOC_8");
1b452ec6 326 return &elf_howto_table[(unsigned int) R_386_8 - R_386_ext_offset];
252b5132
RH
327
328 case BFD_RELOC_8_PCREL:
329 TRACE ("BFD_RELOC_8_PCREL");
1b452ec6 330 return &elf_howto_table[(unsigned int) R_386_PC8 - R_386_ext_offset];
252b5132 331
13ae64f3
JJ
332 /* Common with Sun TLS implementation. */
333 case BFD_RELOC_386_TLS_LDO_32:
334 TRACE ("BFD_RELOC_386_TLS_LDO_32");
335 return &elf_howto_table[(unsigned int) R_386_TLS_LDO_32 - R_386_tls_offset];
336
337 case BFD_RELOC_386_TLS_IE_32:
338 TRACE ("BFD_RELOC_386_TLS_IE_32");
339 return &elf_howto_table[(unsigned int) R_386_TLS_IE_32 - R_386_tls_offset];
340
341 case BFD_RELOC_386_TLS_LE_32:
342 TRACE ("BFD_RELOC_386_TLS_LE_32");
343 return &elf_howto_table[(unsigned int) R_386_TLS_LE_32 - R_386_tls_offset];
344
345 case BFD_RELOC_386_TLS_DTPMOD32:
346 TRACE ("BFD_RELOC_386_TLS_DTPMOD32");
347 return &elf_howto_table[(unsigned int) R_386_TLS_DTPMOD32 - R_386_tls_offset];
348
349 case BFD_RELOC_386_TLS_DTPOFF32:
350 TRACE ("BFD_RELOC_386_TLS_DTPOFF32");
351 return &elf_howto_table[(unsigned int) R_386_TLS_DTPOFF32 - R_386_tls_offset];
352
353 case BFD_RELOC_386_TLS_TPOFF32:
354 TRACE ("BFD_RELOC_386_TLS_TPOFF32");
355 return &elf_howto_table[(unsigned int) R_386_TLS_TPOFF32 - R_386_tls_offset];
356
252b5132
RH
357 case BFD_RELOC_VTABLE_INHERIT:
358 TRACE ("BFD_RELOC_VTABLE_INHERIT");
dc47f327
AM
359 return &elf_howto_table[(unsigned int) R_386_GNU_VTINHERIT
360 - R_386_vt_offset];
252b5132
RH
361
362 case BFD_RELOC_VTABLE_ENTRY:
363 TRACE ("BFD_RELOC_VTABLE_ENTRY");
dc47f327
AM
364 return &elf_howto_table[(unsigned int) R_386_GNU_VTENTRY
365 - R_386_vt_offset];
252b5132
RH
366
367 default:
368 break;
369 }
370
371 TRACE ("Unknown");
372 return 0;
373}
374
375static void
376elf_i386_info_to_howto (abfd, cache_ptr, dst)
947216bf
AM
377 bfd *abfd ATTRIBUTE_UNUSED;
378 arelent *cache_ptr ATTRIBUTE_UNUSED;
379 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED;
252b5132
RH
380{
381 abort ();
382}
383
384static void
385elf_i386_info_to_howto_rel (abfd, cache_ptr, dst)
7442e600 386 bfd *abfd ATTRIBUTE_UNUSED;
252b5132 387 arelent *cache_ptr;
947216bf 388 Elf_Internal_Rela *dst;
252b5132 389{
dc47f327
AM
390 unsigned int r_type = ELF32_R_TYPE (dst->r_info);
391 unsigned int indx;
392
393 if ((indx = r_type) >= R_386_standard
394 && ((indx = r_type - R_386_ext_offset) - R_386_standard
395 >= R_386_ext - R_386_standard)
13ae64f3
JJ
396 && ((indx = r_type - R_386_tls_offset) - R_386_ext
397 >= R_386_tls - R_386_ext)
398 && ((indx = r_type - R_386_vt_offset) - R_386_tls
399 >= R_386_vt - R_386_tls))
252b5132 400 {
dc47f327 401 (*_bfd_error_handler) (_("%s: invalid relocation type %d"),
8f615d07 402 bfd_archive_filename (abfd), (int) r_type);
dc47f327 403 indx = (unsigned int) R_386_NONE;
252b5132 404 }
dc47f327 405 cache_ptr->howto = &elf_howto_table[indx];
252b5132
RH
406}
407
408/* Return whether a symbol name implies a local label. The UnixWare
409 2.1 cc generates temporary symbols that start with .X, so we
410 recognize them here. FIXME: do other SVR4 compilers also use .X?.
411 If so, we should move the .X recognition into
412 _bfd_elf_is_local_label_name. */
413
b34976b6 414static bfd_boolean
252b5132
RH
415elf_i386_is_local_label_name (abfd, name)
416 bfd *abfd;
417 const char *name;
418{
419 if (name[0] == '.' && name[1] == 'X')
b34976b6 420 return TRUE;
252b5132
RH
421
422 return _bfd_elf_is_local_label_name (abfd, name);
423}
424\f
38701953 425/* Support for core dump NOTE sections. */
b34976b6 426static bfd_boolean
38701953
AM
427elf_i386_grok_prstatus (abfd, note)
428 bfd *abfd;
429 Elf_Internal_Note *note;
430{
431 int offset;
432 size_t raw_size;
433
434 switch (note->descsz)
435 {
436 default:
b34976b6 437 return FALSE;
38701953
AM
438
439 case 144: /* Linux/i386 */
440 /* pr_cursig */
441 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
442
443 /* pr_pid */
444 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
445
446 /* pr_reg */
447 offset = 72;
448 raw_size = 68;
449
450 break;
451 }
452
453 /* Make a ".reg/999" section. */
454 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
455 raw_size, note->descpos + offset);
456}
457
b34976b6 458static bfd_boolean
38701953
AM
459elf_i386_grok_psinfo (abfd, note)
460 bfd *abfd;
461 Elf_Internal_Note *note;
462{
463 switch (note->descsz)
464 {
465 default:
b34976b6 466 return FALSE;
38701953 467
fd29389c 468 case 124: /* Linux/i386 elf_prpsinfo */
38701953
AM
469 elf_tdata (abfd)->core_program
470 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
471 elf_tdata (abfd)->core_command
472 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
473 }
474
475 /* Note that for some reason, a spurious space is tacked
476 onto the end of the args in some (at least one anyway)
477 implementations, so strip it off if it exists. */
478
479 {
480 char *command = elf_tdata (abfd)->core_command;
481 int n = strlen (command);
482
483 if (0 < n && command[n - 1] == ' ')
484 command[n - 1] = '\0';
485 }
486
b34976b6 487 return TRUE;
38701953
AM
488}
489\f
490/* Functions for the i386 ELF linker.
491
492 In order to gain some understanding of code in this file without
493 knowing all the intricate details of the linker, note the
494 following:
495
496 Functions named elf_i386_* are called by external routines, other
497 functions are only called locally. elf_i386_* functions appear
498 in this file more or less in the order in which they are called
499 from external routines. eg. elf_i386_check_relocs is called
500 early in the link process, elf_i386_finish_dynamic_sections is
501 one of the last functions. */
502
252b5132
RH
503
504/* The name of the dynamic interpreter. This is put in the .interp
505 section. */
506
507#define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
508
509/* The size in bytes of an entry in the procedure linkage table. */
510
511#define PLT_ENTRY_SIZE 16
512
513/* The first entry in an absolute procedure linkage table looks like
514 this. See the SVR4 ABI i386 supplement to see how this works. */
515
516static const bfd_byte elf_i386_plt0_entry[PLT_ENTRY_SIZE] =
517{
518 0xff, 0x35, /* pushl contents of address */
519 0, 0, 0, 0, /* replaced with address of .got + 4. */
520 0xff, 0x25, /* jmp indirect */
521 0, 0, 0, 0, /* replaced with address of .got + 8. */
522 0, 0, 0, 0 /* pad out to 16 bytes. */
523};
524
525/* Subsequent entries in an absolute procedure linkage table look like
526 this. */
527
528static const bfd_byte elf_i386_plt_entry[PLT_ENTRY_SIZE] =
529{
530 0xff, 0x25, /* jmp indirect */
531 0, 0, 0, 0, /* replaced with address of this symbol in .got. */
532 0x68, /* pushl immediate */
533 0, 0, 0, 0, /* replaced with offset into relocation table. */
534 0xe9, /* jmp relative */
535 0, 0, 0, 0 /* replaced with offset to start of .plt. */
536};
537
538/* The first entry in a PIC procedure linkage table look like this. */
539
540static const bfd_byte elf_i386_pic_plt0_entry[PLT_ENTRY_SIZE] =
541{
542 0xff, 0xb3, 4, 0, 0, 0, /* pushl 4(%ebx) */
543 0xff, 0xa3, 8, 0, 0, 0, /* jmp *8(%ebx) */
544 0, 0, 0, 0 /* pad out to 16 bytes. */
545};
546
547/* Subsequent entries in a PIC procedure linkage table look like this. */
548
549static const bfd_byte elf_i386_pic_plt_entry[PLT_ENTRY_SIZE] =
550{
551 0xff, 0xa3, /* jmp *offset(%ebx) */
552 0, 0, 0, 0, /* replaced with offset of this symbol in .got. */
553 0x68, /* pushl immediate */
554 0, 0, 0, 0, /* replaced with offset into relocation table. */
555 0xe9, /* jmp relative */
556 0, 0, 0, 0 /* replaced with offset to start of .plt. */
557};
558
559/* The i386 linker needs to keep track of the number of relocs that it
ffb2e45b
AM
560 decides to copy as dynamic relocs in check_relocs for each symbol.
561 This is so that it can later discard them if they are found to be
562 unnecessary. We store the information in a field extending the
563 regular ELF linker hash table. */
252b5132 564
ffb2e45b 565struct elf_i386_dyn_relocs
252b5132 566{
ffb2e45b 567 struct elf_i386_dyn_relocs *next;
0c715baa
AM
568
569 /* The input section of the reloc. */
570 asection *sec;
571
572 /* Total number of relocs copied for the input section. */
252b5132 573 bfd_size_type count;
0c715baa
AM
574
575 /* Number of pc-relative relocs copied for the input section. */
576 bfd_size_type pc_count;
252b5132
RH
577};
578
579/* i386 ELF linker hash entry. */
580
581struct elf_i386_link_hash_entry
582{
ebe50bae 583 struct elf_link_hash_entry elf;
252b5132 584
0c715baa 585 /* Track dynamic relocs copied for this symbol. */
ffb2e45b 586 struct elf_i386_dyn_relocs *dyn_relocs;
13ae64f3 587
37e55690
JJ
588#define GOT_UNKNOWN 0
589#define GOT_NORMAL 1
590#define GOT_TLS_GD 2
591#define GOT_TLS_IE 4
592#define GOT_TLS_IE_POS 5
593#define GOT_TLS_IE_NEG 6
594#define GOT_TLS_IE_BOTH 7
595 unsigned char tls_type;
13ae64f3
JJ
596};
597
598#define elf_i386_hash_entry(ent) ((struct elf_i386_link_hash_entry *)(ent))
599
600struct elf_i386_obj_tdata
601{
602 struct elf_obj_tdata root;
603
604 /* tls_type for each local got entry. */
605 char *local_got_tls_type;
252b5132
RH
606};
607
13ae64f3
JJ
608#define elf_i386_tdata(abfd) \
609 ((struct elf_i386_obj_tdata *) (abfd)->tdata.any)
610
611#define elf_i386_local_got_tls_type(abfd) \
612 (elf_i386_tdata (abfd)->local_got_tls_type)
613
b34976b6 614static bfd_boolean
13ae64f3
JJ
615elf_i386_mkobject (abfd)
616 bfd *abfd;
617{
618 bfd_size_type amt = sizeof (struct elf_i386_obj_tdata);
619 abfd->tdata.any = bfd_zalloc (abfd, amt);
620 if (abfd->tdata.any == NULL)
b34976b6
AM
621 return FALSE;
622 return TRUE;
13ae64f3 623}
cedb70c5 624
b34976b6 625static bfd_boolean
13ae64f3
JJ
626elf_i386_object_p (abfd)
627 bfd *abfd;
628{
629 /* Allocate our special target data. */
630 struct elf_i386_obj_tdata *new_tdata;
631 bfd_size_type amt = sizeof (struct elf_i386_obj_tdata);
632 new_tdata = bfd_zalloc (abfd, amt);
633 if (new_tdata == NULL)
b34976b6 634 return FALSE;
13ae64f3
JJ
635 new_tdata->root = *abfd->tdata.elf_obj_data;
636 abfd->tdata.any = new_tdata;
b34976b6 637 return TRUE;
13ae64f3
JJ
638}
639
252b5132
RH
640/* i386 ELF linker hash table. */
641
642struct elf_i386_link_hash_table
643{
ebe50bae 644 struct elf_link_hash_table elf;
252b5132 645
6725bdbf
AM
646 /* Short-cuts to get to dynamic linker sections. */
647 asection *sgot;
648 asection *sgotplt;
649 asection *srelgot;
650 asection *splt;
651 asection *srelplt;
652 asection *sdynbss;
653 asection *srelbss;
ec338859 654
13ae64f3
JJ
655 union {
656 bfd_signed_vma refcount;
657 bfd_vma offset;
658 } tls_ldm_got;
659
ec338859
AM
660 /* Small local sym to section mapping cache. */
661 struct sym_sec_cache sym_sec;
6725bdbf 662};
252b5132
RH
663
664/* Get the i386 ELF linker hash table from a link_info structure. */
665
666#define elf_i386_hash_table(p) \
667 ((struct elf_i386_link_hash_table *) ((p)->hash))
668
669/* Create an entry in an i386 ELF linker hash table. */
670
671static struct bfd_hash_entry *
38701953 672link_hash_newfunc (entry, table, string)
252b5132
RH
673 struct bfd_hash_entry *entry;
674 struct bfd_hash_table *table;
675 const char *string;
676{
252b5132
RH
677 /* Allocate the structure if it has not already been allocated by a
678 subclass. */
ebe50bae
AM
679 if (entry == NULL)
680 {
681 entry = bfd_hash_allocate (table,
682 sizeof (struct elf_i386_link_hash_entry));
683 if (entry == NULL)
684 return entry;
685 }
252b5132
RH
686
687 /* Call the allocation method of the superclass. */
ebe50bae
AM
688 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
689 if (entry != NULL)
252b5132 690 {
ebe50bae
AM
691 struct elf_i386_link_hash_entry *eh;
692
693 eh = (struct elf_i386_link_hash_entry *) entry;
694 eh->dyn_relocs = NULL;
13ae64f3 695 eh->tls_type = GOT_UNKNOWN;
252b5132
RH
696 }
697
ebe50bae 698 return entry;
252b5132
RH
699}
700
701/* Create an i386 ELF linker hash table. */
702
703static struct bfd_link_hash_table *
704elf_i386_link_hash_table_create (abfd)
705 bfd *abfd;
706{
707 struct elf_i386_link_hash_table *ret;
dc810e39 708 bfd_size_type amt = sizeof (struct elf_i386_link_hash_table);
252b5132 709
e2d34d7d 710 ret = (struct elf_i386_link_hash_table *) bfd_malloc (amt);
ebe50bae 711 if (ret == NULL)
252b5132
RH
712 return NULL;
713
ebe50bae 714 if (! _bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc))
252b5132 715 {
e2d34d7d 716 free (ret);
252b5132
RH
717 return NULL;
718 }
719
6725bdbf
AM
720 ret->sgot = NULL;
721 ret->sgotplt = NULL;
722 ret->srelgot = NULL;
723 ret->splt = NULL;
724 ret->srelplt = NULL;
725 ret->sdynbss = NULL;
726 ret->srelbss = NULL;
7a624474 727 ret->tls_ldm_got.refcount = 0;
ec338859 728 ret->sym_sec.abfd = NULL;
6725bdbf 729
ebe50bae 730 return &ret->elf.root;
252b5132
RH
731}
732
6725bdbf
AM
733/* Create .got, .gotplt, and .rel.got sections in DYNOBJ, and set up
734 shortcuts to them in our hash table. */
735
b34976b6 736static bfd_boolean
6725bdbf
AM
737create_got_section (dynobj, info)
738 bfd *dynobj;
739 struct bfd_link_info *info;
740{
741 struct elf_i386_link_hash_table *htab;
742
743 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 744 return FALSE;
6725bdbf
AM
745
746 htab = elf_i386_hash_table (info);
747 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
748 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
749 if (!htab->sgot || !htab->sgotplt)
750 abort ();
751
752 htab->srelgot = bfd_make_section (dynobj, ".rel.got");
753 if (htab->srelgot == NULL
754 || ! bfd_set_section_flags (dynobj, htab->srelgot,
755 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
756 | SEC_IN_MEMORY | SEC_LINKER_CREATED
757 | SEC_READONLY))
758 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 2))
b34976b6
AM
759 return FALSE;
760 return TRUE;
6725bdbf
AM
761}
762
763/* Create .plt, .rel.plt, .got, .got.plt, .rel.got, .dynbss, and
764 .rel.bss sections in DYNOBJ, and set up shortcuts to them in our
765 hash table. */
766
b34976b6 767static bfd_boolean
6725bdbf
AM
768elf_i386_create_dynamic_sections (dynobj, info)
769 bfd *dynobj;
770 struct bfd_link_info *info;
771{
772 struct elf_i386_link_hash_table *htab;
773
774 htab = elf_i386_hash_table (info);
775 if (!htab->sgot && !create_got_section (dynobj, info))
b34976b6 776 return FALSE;
6725bdbf
AM
777
778 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 779 return FALSE;
6725bdbf
AM
780
781 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
782 htab->srelplt = bfd_get_section_by_name (dynobj, ".rel.plt");
783 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
784 if (!info->shared)
785 htab->srelbss = bfd_get_section_by_name (dynobj, ".rel.bss");
786
787 if (!htab->splt || !htab->srelplt || !htab->sdynbss
788 || (!info->shared && !htab->srelbss))
789 abort ();
790
b34976b6 791 return TRUE;
6725bdbf
AM
792}
793
ebe50bae
AM
794/* Copy the extra info we tack onto an elf_link_hash_entry. */
795
51b64d56 796static void
b48fa14c
AM
797elf_i386_copy_indirect_symbol (bed, dir, ind)
798 struct elf_backend_data *bed;
ebe50bae
AM
799 struct elf_link_hash_entry *dir, *ind;
800{
801 struct elf_i386_link_hash_entry *edir, *eind;
802
803 edir = (struct elf_i386_link_hash_entry *) dir;
804 eind = (struct elf_i386_link_hash_entry *) ind;
805
bbd7ec4a 806 if (eind->dyn_relocs != NULL)
ebe50bae 807 {
bbd7ec4a
AM
808 if (edir->dyn_relocs != NULL)
809 {
810 struct elf_i386_dyn_relocs **pp;
811 struct elf_i386_dyn_relocs *p;
812
1e370bd2 813 if (ind->root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
814 abort ();
815
816 /* Add reloc counts against the weak sym to the strong sym
817 list. Merge any entries against the same section. */
818 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
819 {
820 struct elf_i386_dyn_relocs *q;
821
822 for (q = edir->dyn_relocs; q != NULL; q = q->next)
823 if (q->sec == p->sec)
824 {
825 q->pc_count += p->pc_count;
826 q->count += p->count;
827 *pp = p->next;
828 break;
829 }
830 if (q == NULL)
831 pp = &p->next;
832 }
833 *pp = edir->dyn_relocs;
834 }
835
ebe50bae
AM
836 edir->dyn_relocs = eind->dyn_relocs;
837 eind->dyn_relocs = NULL;
838 }
ebe50bae 839
cd67d266
JJ
840 if (ind->root.type == bfd_link_hash_indirect
841 && dir->got.refcount <= 0)
842 {
843 edir->tls_type = eind->tls_type;
844 eind->tls_type = GOT_UNKNOWN;
845 }
b48fa14c 846 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
ebe50bae
AM
847}
848
13ae64f3
JJ
849static int
850elf_i386_tls_transition (info, r_type, is_local)
851 struct bfd_link_info *info;
852 int r_type;
853 int is_local;
854{
855 if (info->shared)
856 return r_type;
857
858 switch (r_type)
859 {
860 case R_386_TLS_GD:
861 case R_386_TLS_IE_32:
862 if (is_local)
863 return R_386_TLS_LE_32;
864 return R_386_TLS_IE_32;
37e55690
JJ
865 case R_386_TLS_IE:
866 case R_386_TLS_GOTIE:
867 if (is_local)
868 return R_386_TLS_LE_32;
869 return r_type;
13ae64f3
JJ
870 case R_386_TLS_LDM:
871 return R_386_TLS_LE_32;
872 }
873
874 return r_type;
875}
876
252b5132 877/* Look through the relocs for a section during the first phase, and
0ac8d2ca
AM
878 calculate needed space in the global offset table, procedure linkage
879 table, and dynamic reloc sections. */
252b5132 880
b34976b6 881static bfd_boolean
252b5132
RH
882elf_i386_check_relocs (abfd, info, sec, relocs)
883 bfd *abfd;
884 struct bfd_link_info *info;
885 asection *sec;
886 const Elf_Internal_Rela *relocs;
887{
6725bdbf 888 struct elf_i386_link_hash_table *htab;
252b5132
RH
889 Elf_Internal_Shdr *symtab_hdr;
890 struct elf_link_hash_entry **sym_hashes;
252b5132
RH
891 const Elf_Internal_Rela *rel;
892 const Elf_Internal_Rela *rel_end;
252b5132
RH
893 asection *sreloc;
894
895 if (info->relocateable)
b34976b6 896 return TRUE;
252b5132 897
6725bdbf 898 htab = elf_i386_hash_table (info);
252b5132
RH
899 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
900 sym_hashes = elf_sym_hashes (abfd);
252b5132 901
252b5132
RH
902 sreloc = NULL;
903
904 rel_end = relocs + sec->reloc_count;
905 for (rel = relocs; rel < rel_end; rel++)
906 {
13ae64f3 907 unsigned int r_type;
252b5132
RH
908 unsigned long r_symndx;
909 struct elf_link_hash_entry *h;
910
911 r_symndx = ELF32_R_SYM (rel->r_info);
13ae64f3 912 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 913
d9bc7a44 914 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
f5f31454 915 {
8f615d07
AM
916 (*_bfd_error_handler) (_("%s: bad symbol index: %d"),
917 bfd_archive_filename (abfd),
918 r_symndx);
b34976b6 919 return FALSE;
f5f31454
L
920 }
921
252b5132
RH
922 if (r_symndx < symtab_hdr->sh_info)
923 h = NULL;
924 else
925 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
926
13ae64f3
JJ
927 r_type = elf_i386_tls_transition (info, r_type, h == NULL);
928
929 switch (r_type)
252b5132 930 {
37e55690
JJ
931 case R_386_TLS_LDM:
932 htab->tls_ldm_got.refcount += 1;
933 goto create_got;
934
935 case R_386_PLT32:
936 /* This symbol requires a procedure linkage table entry. We
937 actually build the entry in adjust_dynamic_symbol,
938 because this might be a case of linking PIC code which is
939 never referenced by a dynamic object, in which case we
940 don't need to generate a procedure linkage table entry
941 after all. */
942
943 /* If this is a local symbol, we resolve it directly without
944 creating a procedure linkage table entry. */
945 if (h == NULL)
946 continue;
947
948 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
949 h->plt.refcount += 1;
950 break;
951
13ae64f3 952 case R_386_TLS_IE_32:
37e55690
JJ
953 case R_386_TLS_IE:
954 case R_386_TLS_GOTIE:
13ae64f3
JJ
955 if (info->shared)
956 info->flags |= DF_STATIC_TLS;
37e55690
JJ
957 /* Fall through */
958
252b5132 959 case R_386_GOT32:
13ae64f3 960 case R_386_TLS_GD:
252b5132 961 /* This symbol requires a global offset table entry. */
13ae64f3
JJ
962 {
963 int tls_type, old_tls_type;
964
965 switch (r_type)
966 {
967 default:
968 case R_386_GOT32: tls_type = GOT_NORMAL; break;
969 case R_386_TLS_GD: tls_type = GOT_TLS_GD; break;
37e55690
JJ
970 case R_386_TLS_IE_32:
971 if (ELF32_R_TYPE (rel->r_info) == r_type)
972 tls_type = GOT_TLS_IE_NEG;
973 else
974 /* If this is a GD->IE transition, we may use either of
975 R_386_TLS_TPOFF and R_386_TLS_TPOFF32. */
976 tls_type = GOT_TLS_IE;
977 break;
978 case R_386_TLS_IE:
979 case R_386_TLS_GOTIE:
980 tls_type = GOT_TLS_IE_POS; break;
13ae64f3
JJ
981 }
982
983 if (h != NULL)
984 {
985 h->got.refcount += 1;
986 old_tls_type = elf_i386_hash_entry(h)->tls_type;
987 }
988 else
989 {
990 bfd_signed_vma *local_got_refcounts;
991
992 /* This is a global offset table entry for a local symbol. */
993 local_got_refcounts = elf_local_got_refcounts (abfd);
994 if (local_got_refcounts == NULL)
995 {
996 bfd_size_type size;
997
998 size = symtab_hdr->sh_info;
999 size *= (sizeof (bfd_signed_vma) + sizeof(char));
1000 local_got_refcounts = ((bfd_signed_vma *)
1001 bfd_zalloc (abfd, size));
1002 if (local_got_refcounts == NULL)
b34976b6 1003 return FALSE;
13ae64f3
JJ
1004 elf_local_got_refcounts (abfd) = local_got_refcounts;
1005 elf_i386_local_got_tls_type (abfd)
1006 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
1007 }
1008 local_got_refcounts[r_symndx] += 1;
1009 old_tls_type = elf_i386_local_got_tls_type (abfd) [r_symndx];
1010 }
1011
37e55690
JJ
1012 if ((old_tls_type & GOT_TLS_IE) && (tls_type & GOT_TLS_IE))
1013 tls_type |= old_tls_type;
13ae64f3
JJ
1014 /* If a TLS symbol is accessed using IE at least once,
1015 there is no point to use dynamic model for it. */
37e55690
JJ
1016 else if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
1017 && (old_tls_type != GOT_TLS_GD
1018 || (tls_type & GOT_TLS_IE) == 0))
13ae64f3 1019 {
37e55690
JJ
1020 if ((old_tls_type & GOT_TLS_IE) && tls_type == GOT_TLS_GD)
1021 tls_type = old_tls_type;
13ae64f3
JJ
1022 else
1023 {
1024 (*_bfd_error_handler)
1025 (_("%s: `%s' accessed both as normal and thread local symbol"),
37e55690
JJ
1026 bfd_archive_filename (abfd),
1027 h ? h->root.root.string : "<local>");
b34976b6 1028 return FALSE;
13ae64f3
JJ
1029 }
1030 }
1031
1032 if (old_tls_type != tls_type)
1033 {
1034 if (h != NULL)
1035 elf_i386_hash_entry (h)->tls_type = tls_type;
1036 else
1037 elf_i386_local_got_tls_type (abfd) [r_symndx] = tls_type;
1038 }
1039 }
0ac8d2ca
AM
1040 /* Fall through */
1041
1042 case R_386_GOTOFF:
1043 case R_386_GOTPC:
13ae64f3 1044 create_got:
0ac8d2ca
AM
1045 if (htab->sgot == NULL)
1046 {
1047 if (htab->elf.dynobj == NULL)
1048 htab->elf.dynobj = abfd;
1049 if (!create_got_section (htab->elf.dynobj, info))
b34976b6 1050 return FALSE;
0ac8d2ca 1051 }
37e55690
JJ
1052 if (r_type != R_386_TLS_IE)
1053 break;
1054 /* Fall through */
252b5132 1055
37e55690
JJ
1056 case R_386_TLS_LE_32:
1057 case R_386_TLS_LE:
1058 if (!info->shared)
1059 break;
bffbf940 1060 info->flags |= DF_STATIC_TLS;
b34976b6 1061 /* Fall through */
252b5132
RH
1062
1063 case R_386_32:
1064 case R_386_PC32:
12d0ee4a 1065 if (h != NULL && !info->shared)
6725bdbf 1066 {
12d0ee4a 1067 /* If this reloc is in a read-only section, we might
ebe50bae
AM
1068 need a copy reloc. We can't check reliably at this
1069 stage whether the section is read-only, as input
1070 sections have not yet been mapped to output sections.
1071 Tentatively set the flag for now, and correct in
1072 adjust_dynamic_symbol. */
1073 h->elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
12d0ee4a
AM
1074
1075 /* We may need a .plt entry if the function this reloc
1076 refers to is in a shared lib. */
51b64d56 1077 h->plt.refcount += 1;
6725bdbf 1078 }
7843f00e 1079
252b5132 1080 /* If we are creating a shared library, and this is a reloc
f69da49f
AM
1081 against a global symbol, or a non PC relative reloc
1082 against a local symbol, then we need to copy the reloc
1083 into the shared library. However, if we are linking with
1084 -Bsymbolic, we do not need to copy a reloc against a
1085 global symbol which is defined in an object we are
1086 including in the link (i.e., DEF_REGULAR is set). At
1087 this point we have not seen all the input files, so it is
1088 possible that DEF_REGULAR is not set now but will be set
1f655a09
L
1089 later (it is never cleared). In case of a weak definition,
1090 DEF_REGULAR may be cleared later by a strong definition in
ebe50bae 1091 a shared library. We account for that possibility below by
1f655a09
L
1092 storing information in the relocs_copied field of the hash
1093 table entry. A similar situation occurs when creating
1094 shared libraries and symbol visibility changes render the
12d0ee4a 1095 symbol local.
56882138 1096
12d0ee4a
AM
1097 If on the other hand, we are creating an executable, we
1098 may need to keep relocations for symbols satisfied by a
1099 dynamic library if we manage to avoid copy relocs for the
1100 symbol. */
1101 if ((info->shared
1102 && (sec->flags & SEC_ALLOC) != 0
13ae64f3 1103 && (r_type != R_386_PC32
12d0ee4a
AM
1104 || (h != NULL
1105 && (! info->symbolic
1106 || h->root.type == bfd_link_hash_defweak
1107 || (h->elf_link_hash_flags
1108 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
1109 || (!info->shared
1110 && (sec->flags & SEC_ALLOC) != 0
1111 && h != NULL
12d0ee4a
AM
1112 && (h->root.type == bfd_link_hash_defweak
1113 || (h->elf_link_hash_flags
1114 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
252b5132 1115 {
ec338859
AM
1116 struct elf_i386_dyn_relocs *p;
1117 struct elf_i386_dyn_relocs **head;
1118
12d0ee4a
AM
1119 /* We must copy these reloc types into the output file.
1120 Create a reloc section in dynobj and make room for
1121 this reloc. */
252b5132
RH
1122 if (sreloc == NULL)
1123 {
1124 const char *name;
0ac8d2ca 1125 bfd *dynobj;
e92d460e
AM
1126 unsigned int strndx = elf_elfheader (abfd)->e_shstrndx;
1127 unsigned int shnam = elf_section_data (sec)->rel_hdr.sh_name;
252b5132 1128
e92d460e 1129 name = bfd_elf_string_from_elf_section (abfd, strndx, shnam);
252b5132 1130 if (name == NULL)
b34976b6 1131 return FALSE;
252b5132 1132
c8492176
L
1133 if (strncmp (name, ".rel", 4) != 0
1134 || strcmp (bfd_get_section_name (abfd, sec),
1135 name + 4) != 0)
1136 {
0c715baa
AM
1137 (*_bfd_error_handler)
1138 (_("%s: bad relocation section name `%s\'"),
1139 bfd_archive_filename (abfd), name);
f5f31454 1140 }
252b5132 1141
0ac8d2ca
AM
1142 if (htab->elf.dynobj == NULL)
1143 htab->elf.dynobj = abfd;
1144
1145 dynobj = htab->elf.dynobj;
252b5132
RH
1146 sreloc = bfd_get_section_by_name (dynobj, name);
1147 if (sreloc == NULL)
1148 {
1149 flagword flags;
1150
1151 sreloc = bfd_make_section (dynobj, name);
1152 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1153 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1154 if ((sec->flags & SEC_ALLOC) != 0)
1155 flags |= SEC_ALLOC | SEC_LOAD;
1156 if (sreloc == NULL
1157 || ! bfd_set_section_flags (dynobj, sreloc, flags)
1158 || ! bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 1159 return FALSE;
252b5132 1160 }
0c715baa 1161 elf_section_data (sec)->sreloc = sreloc;
252b5132
RH
1162 }
1163
0c715baa
AM
1164 /* If this is a global symbol, we count the number of
1165 relocations we need for this symbol. */
1166 if (h != NULL)
252b5132 1167 {
ec338859 1168 head = &((struct elf_i386_link_hash_entry *) h)->dyn_relocs;
0c715baa
AM
1169 }
1170 else
1171 {
ec338859
AM
1172 /* Track dynamic relocs needed for local syms too.
1173 We really need local syms available to do this
1174 easily. Oh well. */
1175
1176 asection *s;
1177 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
1178 sec, r_symndx);
1179 if (s == NULL)
b34976b6 1180 return FALSE;
ec338859
AM
1181
1182 head = ((struct elf_i386_dyn_relocs **)
1183 &elf_section_data (s)->local_dynrel);
1184 }
1185
1186 p = *head;
1187 if (p == NULL || p->sec != sec)
1188 {
1189 bfd_size_type amt = sizeof *p;
1190 p = ((struct elf_i386_dyn_relocs *)
1191 bfd_alloc (htab->elf.dynobj, amt));
1192 if (p == NULL)
b34976b6 1193 return FALSE;
ec338859
AM
1194 p->next = *head;
1195 *head = p;
1196 p->sec = sec;
1197 p->count = 0;
1198 p->pc_count = 0;
252b5132 1199 }
ec338859
AM
1200
1201 p->count += 1;
13ae64f3 1202 if (r_type == R_386_PC32)
ec338859 1203 p->pc_count += 1;
252b5132 1204 }
252b5132
RH
1205 break;
1206
1207 /* This relocation describes the C++ object vtable hierarchy.
1208 Reconstruct it for later use during GC. */
1209 case R_386_GNU_VTINHERIT:
1210 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 1211 return FALSE;
252b5132
RH
1212 break;
1213
1214 /* This relocation describes which C++ vtable entries are actually
1215 used. Record for later use during GC. */
1216 case R_386_GNU_VTENTRY:
1217 if (!_bfd_elf32_gc_record_vtentry (abfd, sec, h, rel->r_offset))
b34976b6 1218 return FALSE;
252b5132
RH
1219 break;
1220
1221 default:
1222 break;
1223 }
1224 }
1225
b34976b6 1226 return TRUE;
252b5132
RH
1227}
1228
1229/* Return the section that should be marked against GC for a given
1230 relocation. */
1231
1232static asection *
1e2f5b6e
AM
1233elf_i386_gc_mark_hook (sec, info, rel, h, sym)
1234 asection *sec;
7442e600 1235 struct bfd_link_info *info ATTRIBUTE_UNUSED;
252b5132
RH
1236 Elf_Internal_Rela *rel;
1237 struct elf_link_hash_entry *h;
1238 Elf_Internal_Sym *sym;
1239{
1240 if (h != NULL)
1241 {
1242 switch (ELF32_R_TYPE (rel->r_info))
1243 {
1244 case R_386_GNU_VTINHERIT:
1245 case R_386_GNU_VTENTRY:
1246 break;
1247
1248 default:
1249 switch (h->root.type)
1250 {
1251 case bfd_link_hash_defined:
1252 case bfd_link_hash_defweak:
1253 return h->root.u.def.section;
1254
1255 case bfd_link_hash_common:
1256 return h->root.u.c.p->section;
1257
1258 default:
1259 break;
1260 }
1261 }
1262 }
1263 else
1e2f5b6e 1264 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
252b5132
RH
1265
1266 return NULL;
1267}
1268
1269/* Update the got entry reference counts for the section being removed. */
1270
b34976b6 1271static bfd_boolean
252b5132 1272elf_i386_gc_sweep_hook (abfd, info, sec, relocs)
dd5724d5 1273 bfd *abfd;
6725bdbf 1274 struct bfd_link_info *info;
dd5724d5
AM
1275 asection *sec;
1276 const Elf_Internal_Rela *relocs;
252b5132 1277{
dd5724d5
AM
1278 Elf_Internal_Shdr *symtab_hdr;
1279 struct elf_link_hash_entry **sym_hashes;
1280 bfd_signed_vma *local_got_refcounts;
1281 const Elf_Internal_Rela *rel, *relend;
1282 unsigned long r_symndx;
37e55690 1283 int r_type;
dd5724d5 1284 struct elf_link_hash_entry *h;
dd5724d5 1285
ec338859 1286 elf_section_data (sec)->local_dynrel = NULL;
dd5724d5 1287
6725bdbf
AM
1288 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1289 sym_hashes = elf_sym_hashes (abfd);
1290 local_got_refcounts = elf_local_got_refcounts (abfd);
dd5724d5
AM
1291
1292 relend = relocs + sec->reloc_count;
1293 for (rel = relocs; rel < relend; rel++)
37e55690
JJ
1294 switch ((r_type = elf_i386_tls_transition (info,
1295 ELF32_R_TYPE (rel->r_info),
1296 ELF32_R_SYM (rel->r_info)
1297 >= symtab_hdr->sh_info)))
dd5724d5 1298 {
13ae64f3
JJ
1299 case R_386_TLS_LDM:
1300 if (elf_i386_hash_table (info)->tls_ldm_got.refcount > 0)
1301 elf_i386_hash_table (info)->tls_ldm_got.refcount -= 1;
1302 break;
1303
1304 case R_386_TLS_GD:
1305 case R_386_TLS_IE_32:
37e55690
JJ
1306 case R_386_TLS_IE:
1307 case R_386_TLS_GOTIE:
dd5724d5 1308 case R_386_GOT32:
dd5724d5
AM
1309 r_symndx = ELF32_R_SYM (rel->r_info);
1310 if (r_symndx >= symtab_hdr->sh_info)
1311 {
1312 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1313 if (h->got.refcount > 0)
6725bdbf 1314 h->got.refcount -= 1;
dd5724d5
AM
1315 }
1316 else if (local_got_refcounts != NULL)
1317 {
1318 if (local_got_refcounts[r_symndx] > 0)
6725bdbf 1319 local_got_refcounts[r_symndx] -= 1;
dd5724d5 1320 }
37e55690
JJ
1321 if (r_type != R_386_TLS_IE)
1322 break;
1323 /* Fall through */
1324
1325 case R_386_TLS_LE_32:
1326 case R_386_TLS_LE:
1327 if (!info->shared)
1328 break;
1329 /* Fall through */
dd5724d5 1330
6725bdbf
AM
1331 case R_386_32:
1332 case R_386_PC32:
0c715baa
AM
1333 r_symndx = ELF32_R_SYM (rel->r_info);
1334 if (r_symndx >= symtab_hdr->sh_info)
1335 {
1336 struct elf_i386_link_hash_entry *eh;
1337 struct elf_i386_dyn_relocs **pp;
1338 struct elf_i386_dyn_relocs *p;
1339
1340 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1341
1342 if (!info->shared && h->plt.refcount > 0)
1343 h->plt.refcount -= 1;
1344
1345 eh = (struct elf_i386_link_hash_entry *) h;
1346
1347 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1348 if (p->sec == sec)
1349 {
1350 if (ELF32_R_TYPE (rel->r_info) == R_386_PC32)
1351 p->pc_count -= 1;
1352 p->count -= 1;
1353 if (p->count == 0)
1354 *pp = p->next;
1355 break;
1356 }
1357 }
1358 break;
6725bdbf 1359
dd5724d5
AM
1360 case R_386_PLT32:
1361 r_symndx = ELF32_R_SYM (rel->r_info);
1362 if (r_symndx >= symtab_hdr->sh_info)
1363 {
1364 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1365 if (h->plt.refcount > 0)
1366 h->plt.refcount -= 1;
1367 }
1368 break;
1369
1370 default:
1371 break;
1372 }
252b5132 1373
b34976b6 1374 return TRUE;
252b5132
RH
1375}
1376
1377/* Adjust a symbol defined by a dynamic object and referenced by a
1378 regular object. The current definition is in some section of the
1379 dynamic object, but we're not including those sections. We have to
1380 change the definition to something the rest of the link can
1381 understand. */
1382
b34976b6 1383static bfd_boolean
252b5132
RH
1384elf_i386_adjust_dynamic_symbol (info, h)
1385 struct bfd_link_info *info;
1386 struct elf_link_hash_entry *h;
1387{
6725bdbf 1388 struct elf_i386_link_hash_table *htab;
ebe50bae
AM
1389 struct elf_i386_link_hash_entry * eh;
1390 struct elf_i386_dyn_relocs *p;
252b5132
RH
1391 asection *s;
1392 unsigned int power_of_two;
1393
252b5132
RH
1394 /* If this is a function, put it in the procedure linkage table. We
1395 will fill in the contents of the procedure linkage table later,
1396 when we know the address of the .got section. */
1397 if (h->type == STT_FUNC
1398 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1399 {
6725bdbf
AM
1400 if (h->plt.refcount <= 0
1401 || (! info->shared
1402 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
f9cd9119
MS
1403 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0
1404 && h->root.type != bfd_link_hash_undefweak
1405 && h->root.type != bfd_link_hash_undefined))
252b5132
RH
1406 {
1407 /* This case can occur if we saw a PLT32 reloc in an input
dd5724d5
AM
1408 file, but the symbol was never referred to by a dynamic
1409 object, or if all references were garbage collected. In
1410 such a case, we don't actually need to build a procedure
1411 linkage table, and we can just do a PC32 reloc instead. */
bbd7ec4a 1412 h->plt.offset = (bfd_vma) -1;
dd5724d5 1413 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
252b5132
RH
1414 }
1415
b34976b6 1416 return TRUE;
252b5132 1417 }
6725bdbf
AM
1418 else
1419 /* It's possible that we incorrectly decided a .plt reloc was
1420 needed for an R_386_PC32 reloc to a non-function sym in
1421 check_relocs. We can't decide accurately between function and
1422 non-function syms in check-relocs; Objects loaded later in
1423 the link may change h->type. So fix it now. */
bbd7ec4a 1424 h->plt.offset = (bfd_vma) -1;
252b5132
RH
1425
1426 /* If this is a weak symbol, and there is a real definition, the
1427 processor independent code will have arranged for us to see the
1428 real definition first, and we can just use the same value. */
1429 if (h->weakdef != NULL)
1430 {
1431 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1432 || h->weakdef->root.type == bfd_link_hash_defweak);
1433 h->root.u.def.section = h->weakdef->root.u.def.section;
1434 h->root.u.def.value = h->weakdef->root.u.def.value;
b34976b6 1435 return TRUE;
252b5132
RH
1436 }
1437
1438 /* This is a reference to a symbol defined by a dynamic object which
1439 is not a function. */
1440
1441 /* If we are creating a shared library, we must presume that the
1442 only references to the symbol are via the global offset table.
1443 For such cases we need not do anything here; the relocations will
1444 be handled correctly by relocate_section. */
1445 if (info->shared)
b34976b6 1446 return TRUE;
252b5132 1447
7843f00e
ILT
1448 /* If there are no references to this symbol that do not use the
1449 GOT, we don't need to generate a copy reloc. */
1450 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
b34976b6 1451 return TRUE;
7843f00e 1452
8bd621d8
AM
1453 /* If -z nocopyreloc was given, we won't generate them either. */
1454 if (info->nocopyreloc)
1455 {
1456 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
b34976b6 1457 return TRUE;
8bd621d8
AM
1458 }
1459
ebe50bae
AM
1460 eh = (struct elf_i386_link_hash_entry *) h;
1461 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1462 {
1463 s = p->sec->output_section;
1464 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1465 break;
1466 }
1467
1468 /* If we didn't find any dynamic relocs in read-only sections, then
cedb70c5 1469 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
ebe50bae
AM
1470 if (p == NULL)
1471 {
1472 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
b34976b6 1473 return TRUE;
ebe50bae
AM
1474 }
1475
252b5132
RH
1476 /* We must allocate the symbol in our .dynbss section, which will
1477 become part of the .bss section of the executable. There will be
1478 an entry for this symbol in the .dynsym section. The dynamic
1479 object will contain position independent code, so all references
1480 from the dynamic object to this symbol will go through the global
1481 offset table. The dynamic linker will use the .dynsym entry to
1482 determine the address it must put in the global offset table, so
1483 both the dynamic object and the regular object will refer to the
1484 same memory location for the variable. */
1485
0ac8d2ca 1486 htab = elf_i386_hash_table (info);
252b5132
RH
1487
1488 /* We must generate a R_386_COPY reloc to tell the dynamic linker to
1489 copy the initial value out of the dynamic object and into the
0ac8d2ca 1490 runtime process image. */
252b5132
RH
1491 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1492 {
0ac8d2ca 1493 htab->srelbss->_raw_size += sizeof (Elf32_External_Rel);
252b5132
RH
1494 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
1495 }
1496
1497 /* We need to figure out the alignment required for this symbol. I
1498 have no idea how ELF linkers handle this. */
1499 power_of_two = bfd_log2 (h->size);
1500 if (power_of_two > 3)
1501 power_of_two = 3;
1502
1503 /* Apply the required alignment. */
0ac8d2ca
AM
1504 s = htab->sdynbss;
1505 s->_raw_size = BFD_ALIGN (s->_raw_size, (bfd_size_type) (1 << power_of_two));
1506 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
252b5132 1507 {
0ac8d2ca 1508 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
b34976b6 1509 return FALSE;
252b5132
RH
1510 }
1511
1512 /* Define the symbol as being at this point in the section. */
1513 h->root.u.def.section = s;
1514 h->root.u.def.value = s->_raw_size;
1515
1516 /* Increment the section size to make room for the symbol. */
1517 s->_raw_size += h->size;
1518
b34976b6 1519 return TRUE;
252b5132
RH
1520}
1521
6725bdbf
AM
1522/* This is the condition under which elf_i386_finish_dynamic_symbol
1523 will be called from elflink.h. If elflink.h doesn't call our
1524 finish_dynamic_symbol routine, we'll need to do something about
1525 initializing any .plt and .got entries in elf_i386_relocate_section. */
1526#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1527 ((DYN) \
1528 && ((INFO)->shared \
1529 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1530 && ((H)->dynindx != -1 \
1531 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1532
1533/* Allocate space in .plt, .got and associated reloc sections for
0c715baa 1534 dynamic relocs. */
6725bdbf 1535
b34976b6 1536static bfd_boolean
0c715baa 1537allocate_dynrelocs (h, inf)
6725bdbf
AM
1538 struct elf_link_hash_entry *h;
1539 PTR inf;
1540{
1541 struct bfd_link_info *info;
1542 struct elf_i386_link_hash_table *htab;
5a15f56f 1543 struct elf_i386_link_hash_entry *eh;
0c715baa 1544 struct elf_i386_dyn_relocs *p;
6725bdbf 1545
e92d460e 1546 if (h->root.type == bfd_link_hash_indirect)
b34976b6 1547 return TRUE;
6725bdbf 1548
e92d460e
AM
1549 if (h->root.type == bfd_link_hash_warning)
1550 /* When warning symbols are created, they **replace** the "real"
1551 entry in the hash table, thus we never get to see the real
1552 symbol in a hash traversal. So look at it now. */
1553 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1554
6725bdbf
AM
1555 info = (struct bfd_link_info *) inf;
1556 htab = elf_i386_hash_table (info);
1557
ebe50bae 1558 if (htab->elf.dynamic_sections_created
6725bdbf
AM
1559 && h->plt.refcount > 0)
1560 {
5a15f56f
AM
1561 /* Make sure this symbol is output as a dynamic symbol.
1562 Undefined weak syms won't yet be marked as dynamic. */
1563 if (h->dynindx == -1
1564 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
1565 {
1566 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 1567 return FALSE;
5a15f56f
AM
1568 }
1569
ced53ee5
AM
1570 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
1571 {
0ac8d2ca 1572 asection *s = htab->splt;
6725bdbf 1573
ced53ee5
AM
1574 /* If this is the first .plt entry, make room for the special
1575 first entry. */
1576 if (s->_raw_size == 0)
1577 s->_raw_size += PLT_ENTRY_SIZE;
6725bdbf 1578
ced53ee5 1579 h->plt.offset = s->_raw_size;
6725bdbf 1580
ced53ee5
AM
1581 /* If this symbol is not defined in a regular file, and we are
1582 not generating a shared library, then set the symbol to this
1583 location in the .plt. This is required to make function
1584 pointers compare as equal between the normal executable and
1585 the shared library. */
1586 if (! info->shared
1587 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1588 {
1589 h->root.u.def.section = s;
1590 h->root.u.def.value = h->plt.offset;
1591 }
6725bdbf 1592
ced53ee5
AM
1593 /* Make room for this entry. */
1594 s->_raw_size += PLT_ENTRY_SIZE;
6725bdbf 1595
ced53ee5
AM
1596 /* We also need to make an entry in the .got.plt section, which
1597 will be placed in the .got section by the linker script. */
0ac8d2ca 1598 htab->sgotplt->_raw_size += 4;
6725bdbf 1599
6725bdbf 1600 /* We also need to make an entry in the .rel.plt section. */
0ac8d2ca 1601 htab->srelplt->_raw_size += sizeof (Elf32_External_Rel);
6725bdbf 1602 }
ced53ee5
AM
1603 else
1604 {
51b64d56 1605 h->plt.offset = (bfd_vma) -1;
ced53ee5
AM
1606 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1607 }
6725bdbf
AM
1608 }
1609 else
1610 {
51b64d56 1611 h->plt.offset = (bfd_vma) -1;
6725bdbf
AM
1612 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1613 }
1614
37e55690 1615 /* If R_386_TLS_{IE_32,IE,GOTIE} symbol is now local to the binary,
13ae64f3
JJ
1616 make it a R_386_TLS_LE_32 requiring no TLS entry. */
1617 if (h->got.refcount > 0
1618 && !info->shared
1619 && h->dynindx == -1
37e55690 1620 && (elf_i386_hash_entry(h)->tls_type & GOT_TLS_IE))
cedb70c5 1621 h->got.offset = (bfd_vma) -1;
13ae64f3 1622 else if (h->got.refcount > 0)
6725bdbf 1623 {
0ac8d2ca 1624 asection *s;
b34976b6 1625 bfd_boolean dyn;
13ae64f3 1626 int tls_type = elf_i386_hash_entry(h)->tls_type;
6725bdbf 1627
5a15f56f
AM
1628 /* Make sure this symbol is output as a dynamic symbol.
1629 Undefined weak syms won't yet be marked as dynamic. */
1630 if (h->dynindx == -1
1631 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
1632 {
1633 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 1634 return FALSE;
5a15f56f
AM
1635 }
1636
6725bdbf
AM
1637 s = htab->sgot;
1638 h->got.offset = s->_raw_size;
1639 s->_raw_size += 4;
13ae64f3 1640 /* R_386_TLS_GD needs 2 consecutive GOT slots. */
37e55690 1641 if (tls_type == GOT_TLS_GD || tls_type == GOT_TLS_IE_BOTH)
13ae64f3 1642 s->_raw_size += 4;
ebe50bae 1643 dyn = htab->elf.dynamic_sections_created;
13ae64f3 1644 /* R_386_TLS_IE_32 needs one dynamic relocation,
37e55690
JJ
1645 R_386_TLS_IE resp. R_386_TLS_GOTIE needs one dynamic relocation,
1646 (but if both R_386_TLS_IE_32 and R_386_TLS_IE is present, we
1647 need two), R_386_TLS_GD needs one if local symbol and two if
1648 global. */
1649 if (tls_type == GOT_TLS_IE_BOTH)
1650 htab->srelgot->_raw_size += 2 * sizeof (Elf32_External_Rel);
1651 else if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1652 || (tls_type & GOT_TLS_IE))
13ae64f3
JJ
1653 htab->srelgot->_raw_size += sizeof (Elf32_External_Rel);
1654 else if (tls_type == GOT_TLS_GD)
1655 htab->srelgot->_raw_size += 2 * sizeof (Elf32_External_Rel);
1656 else if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h))
6725bdbf
AM
1657 htab->srelgot->_raw_size += sizeof (Elf32_External_Rel);
1658 }
1659 else
51b64d56 1660 h->got.offset = (bfd_vma) -1;
6725bdbf 1661
5a15f56f
AM
1662 eh = (struct elf_i386_link_hash_entry *) h;
1663 if (eh->dyn_relocs == NULL)
b34976b6 1664 return TRUE;
5a15f56f 1665
0c715baa
AM
1666 /* In the shared -Bsymbolic case, discard space allocated for
1667 dynamic pc-relative relocs against symbols which turn out to be
1668 defined in regular objects. For the normal shared case, discard
0ac8d2ca
AM
1669 space for pc-relative relocs that have become local due to symbol
1670 visibility changes. */
0c715baa
AM
1671
1672 if (info->shared)
5a15f56f 1673 {
0c715baa
AM
1674 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1675 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
1676 || info->symbolic))
5a15f56f 1677 {
0c715baa
AM
1678 struct elf_i386_dyn_relocs **pp;
1679
1680 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1681 {
1682 p->count -= p->pc_count;
1683 p->pc_count = 0;
1684 if (p->count == 0)
1685 *pp = p->next;
1686 else
1687 pp = &p->next;
1688 }
5a15f56f 1689 }
0c715baa
AM
1690 }
1691 else
1692 {
1693 /* For the non-shared case, discard space for relocs against
1694 symbols which turn out to need copy relocs or are not
1695 dynamic. */
1696
1697 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
1698 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
1699 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 1700 || (htab->elf.dynamic_sections_created
0c715baa
AM
1701 && (h->root.type == bfd_link_hash_undefweak
1702 || h->root.type == bfd_link_hash_undefined))))
1703 {
1704 /* Make sure this symbol is output as a dynamic symbol.
1705 Undefined weak syms won't yet be marked as dynamic. */
1706 if (h->dynindx == -1
1707 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
1708 {
1709 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 1710 return FALSE;
0c715baa 1711 }
5a15f56f 1712
0c715baa
AM
1713 /* If that succeeded, we know we'll be keeping all the
1714 relocs. */
1715 if (h->dynindx != -1)
1716 goto keep;
1717 }
1718
1719 eh->dyn_relocs = NULL;
1720
ec338859 1721 keep: ;
5a15f56f
AM
1722 }
1723
0c715baa
AM
1724 /* Finally, allocate space. */
1725 for (p = eh->dyn_relocs; p != NULL; p = p->next)
12d0ee4a 1726 {
0c715baa
AM
1727 asection *sreloc = elf_section_data (p->sec)->sreloc;
1728 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rel);
12d0ee4a
AM
1729 }
1730
b34976b6 1731 return TRUE;
6725bdbf
AM
1732}
1733
0c715baa
AM
1734/* Find any dynamic relocs that apply to read-only sections. */
1735
b34976b6 1736static bfd_boolean
0c715baa
AM
1737readonly_dynrelocs (h, inf)
1738 struct elf_link_hash_entry *h;
1739 PTR inf;
1740{
1741 struct elf_i386_link_hash_entry *eh;
1742 struct elf_i386_dyn_relocs *p;
1743
e92d460e
AM
1744 if (h->root.type == bfd_link_hash_warning)
1745 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1746
0c715baa
AM
1747 eh = (struct elf_i386_link_hash_entry *) h;
1748 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1749 {
1750 asection *s = p->sec->output_section;
1751
1752 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1753 {
1754 struct bfd_link_info *info = (struct bfd_link_info *) inf;
1755
1756 info->flags |= DF_TEXTREL;
1757
1758 /* Not an error, just cut short the traversal. */
b34976b6 1759 return FALSE;
0c715baa
AM
1760 }
1761 }
b34976b6 1762 return TRUE;
0c715baa
AM
1763}
1764
252b5132
RH
1765/* Set the sizes of the dynamic sections. */
1766
b34976b6 1767static bfd_boolean
252b5132 1768elf_i386_size_dynamic_sections (output_bfd, info)
db6751f2 1769 bfd *output_bfd ATTRIBUTE_UNUSED;
252b5132
RH
1770 struct bfd_link_info *info;
1771{
6725bdbf 1772 struct elf_i386_link_hash_table *htab;
252b5132
RH
1773 bfd *dynobj;
1774 asection *s;
b34976b6 1775 bfd_boolean relocs;
0c715baa 1776 bfd *ibfd;
252b5132 1777
6725bdbf 1778 htab = elf_i386_hash_table (info);
ebe50bae 1779 dynobj = htab->elf.dynobj;
ffb2e45b
AM
1780 if (dynobj == NULL)
1781 abort ();
252b5132 1782
ebe50bae 1783 if (htab->elf.dynamic_sections_created)
252b5132
RH
1784 {
1785 /* Set the contents of the .interp section to the interpreter. */
1786 if (! info->shared)
1787 {
1788 s = bfd_get_section_by_name (dynobj, ".interp");
ffb2e45b
AM
1789 if (s == NULL)
1790 abort ();
252b5132
RH
1791 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
1792 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1793 }
161d71a6 1794 }
6725bdbf 1795
0c715baa
AM
1796 /* Set up .got offsets for local syms, and space for local dynamic
1797 relocs. */
1798 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
161d71a6
L
1799 {
1800 bfd_signed_vma *local_got;
1801 bfd_signed_vma *end_local_got;
13ae64f3 1802 char *local_tls_type;
161d71a6
L
1803 bfd_size_type locsymcount;
1804 Elf_Internal_Shdr *symtab_hdr;
1805 asection *srel;
6725bdbf 1806
0c715baa 1807 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
161d71a6 1808 continue;
6725bdbf 1809
0c715baa
AM
1810 for (s = ibfd->sections; s != NULL; s = s->next)
1811 {
ec338859 1812 struct elf_i386_dyn_relocs *p;
0c715baa 1813
ec338859
AM
1814 for (p = *((struct elf_i386_dyn_relocs **)
1815 &elf_section_data (s)->local_dynrel);
1816 p != NULL;
1817 p = p->next)
0c715baa 1818 {
ec338859
AM
1819 if (!bfd_is_abs_section (p->sec)
1820 && bfd_is_abs_section (p->sec->output_section))
1821 {
1822 /* Input section has been discarded, either because
1823 it is a copy of a linkonce section or due to
1824 linker script /DISCARD/, so we'll be discarding
1825 the relocs too. */
1826 }
248866a8 1827 else if (p->count != 0)
ec338859
AM
1828 {
1829 srel = elf_section_data (p->sec)->sreloc;
1830 srel->_raw_size += p->count * sizeof (Elf32_External_Rel);
248866a8
AM
1831 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1832 info->flags |= DF_TEXTREL;
ec338859 1833 }
0c715baa
AM
1834 }
1835 }
1836
1837 local_got = elf_local_got_refcounts (ibfd);
161d71a6
L
1838 if (!local_got)
1839 continue;
6725bdbf 1840
0c715baa 1841 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
161d71a6
L
1842 locsymcount = symtab_hdr->sh_info;
1843 end_local_got = local_got + locsymcount;
13ae64f3 1844 local_tls_type = elf_i386_local_got_tls_type (ibfd);
161d71a6
L
1845 s = htab->sgot;
1846 srel = htab->srelgot;
13ae64f3 1847 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
161d71a6
L
1848 {
1849 if (*local_got > 0)
6725bdbf 1850 {
161d71a6
L
1851 *local_got = s->_raw_size;
1852 s->_raw_size += 4;
37e55690
JJ
1853 if (*local_tls_type == GOT_TLS_GD
1854 || *local_tls_type == GOT_TLS_IE_BOTH)
13ae64f3
JJ
1855 s->_raw_size += 4;
1856 if (info->shared
1857 || *local_tls_type == GOT_TLS_GD
37e55690
JJ
1858 || (*local_tls_type & GOT_TLS_IE))
1859 {
1860 if (*local_tls_type == GOT_TLS_IE_BOTH)
1861 srel->_raw_size += 2 * sizeof (Elf32_External_Rel);
1862 else
1863 srel->_raw_size += sizeof (Elf32_External_Rel);
1864 }
6725bdbf 1865 }
161d71a6
L
1866 else
1867 *local_got = (bfd_vma) -1;
6725bdbf 1868 }
252b5132 1869 }
6725bdbf 1870
13ae64f3
JJ
1871 if (htab->tls_ldm_got.refcount > 0)
1872 {
1873 /* Allocate 2 got entries and 1 dynamic reloc for R_386_TLS_LDM
1874 relocs. */
1875 htab->tls_ldm_got.offset = htab->sgot->_raw_size;
1876 htab->sgot->_raw_size += 8;
1877 htab->srelgot->_raw_size += sizeof (Elf32_External_Rel);
1878 }
1879 else
1880 htab->tls_ldm_got.offset = -1;
1881
0c715baa
AM
1882 /* Allocate global sym .plt and .got entries, and space for global
1883 sym dynamic relocs. */
ebe50bae 1884 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
252b5132 1885
5a15f56f
AM
1886 /* We now have determined the sizes of the various dynamic sections.
1887 Allocate memory for them. */
b34976b6 1888 relocs = FALSE;
252b5132
RH
1889 for (s = dynobj->sections; s != NULL; s = s->next)
1890 {
252b5132
RH
1891 if ((s->flags & SEC_LINKER_CREATED) == 0)
1892 continue;
1893
6725bdbf
AM
1894 if (s == htab->splt
1895 || s == htab->sgot
1896 || s == htab->sgotplt)
252b5132 1897 {
6725bdbf
AM
1898 /* Strip this section if we don't need it; see the
1899 comment below. */
252b5132 1900 }
6725bdbf 1901 else if (strncmp (bfd_get_section_name (dynobj, s), ".rel", 4) == 0)
252b5132 1902 {
0ac8d2ca 1903 if (s->_raw_size != 0 && s != htab->srelplt)
b34976b6 1904 relocs = TRUE;
252b5132 1905
0ac8d2ca
AM
1906 /* We use the reloc_count field as a counter if we need
1907 to copy relocs into the output file. */
1908 s->reloc_count = 0;
252b5132 1909 }
6725bdbf 1910 else
252b5132
RH
1911 {
1912 /* It's not one of our sections, so don't allocate space. */
1913 continue;
1914 }
1915
6725bdbf 1916 if (s->_raw_size == 0)
252b5132 1917 {
0ac8d2ca
AM
1918 /* If we don't need this section, strip it from the
1919 output file. This is mostly to handle .rel.bss and
1920 .rel.plt. We must create both sections in
1921 create_dynamic_sections, because they must be created
1922 before the linker maps input sections to output
1923 sections. The linker does that before
1924 adjust_dynamic_symbol is called, and it is that
1925 function which decides whether anything needs to go
1926 into these sections. */
1927
7f8d5fc9 1928 _bfd_strip_section_from_output (info, s);
252b5132
RH
1929 continue;
1930 }
1931
f69da49f
AM
1932 /* Allocate memory for the section contents. We use bfd_zalloc
1933 here in case unused entries are not reclaimed before the
1934 section's contents are written out. This should not happen,
1935 but this way if it does, we get a R_386_NONE reloc instead
1936 of garbage. */
7a9af8c4 1937 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
6725bdbf 1938 if (s->contents == NULL)
b34976b6 1939 return FALSE;
252b5132
RH
1940 }
1941
ebe50bae 1942 if (htab->elf.dynamic_sections_created)
252b5132
RH
1943 {
1944 /* Add some entries to the .dynamic section. We fill in the
1945 values later, in elf_i386_finish_dynamic_sections, but we
1946 must add the entries now so that we get the correct size for
1947 the .dynamic section. The DT_DEBUG entry is filled in by the
1948 dynamic linker and used by the debugger. */
dc810e39
AM
1949#define add_dynamic_entry(TAG, VAL) \
1950 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
1951
252b5132
RH
1952 if (! info->shared)
1953 {
dc810e39 1954 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1955 return FALSE;
252b5132
RH
1956 }
1957
6725bdbf 1958 if (htab->splt->_raw_size != 0)
252b5132 1959 {
dc810e39
AM
1960 if (!add_dynamic_entry (DT_PLTGOT, 0)
1961 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1962 || !add_dynamic_entry (DT_PLTREL, DT_REL)
1963 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1964 return FALSE;
252b5132
RH
1965 }
1966
1967 if (relocs)
1968 {
dc810e39
AM
1969 if (!add_dynamic_entry (DT_REL, 0)
1970 || !add_dynamic_entry (DT_RELSZ, 0)
1971 || !add_dynamic_entry (DT_RELENT, sizeof (Elf32_External_Rel)))
b34976b6 1972 return FALSE;
252b5132 1973
0c715baa
AM
1974 /* If any dynamic relocs apply to a read-only section,
1975 then we need a DT_TEXTREL entry. */
248866a8
AM
1976 if ((info->flags & DF_TEXTREL) == 0)
1977 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
1978 (PTR) info);
0c715baa
AM
1979
1980 if ((info->flags & DF_TEXTREL) != 0)
1981 {
1982 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1983 return FALSE;
0c715baa 1984 }
252b5132
RH
1985 }
1986 }
dc810e39 1987#undef add_dynamic_entry
252b5132 1988
b34976b6 1989 return TRUE;
252b5132
RH
1990}
1991
38701953
AM
1992/* Set the correct type for an x86 ELF section. We do this by the
1993 section name, which is a hack, but ought to work. */
1994
b34976b6 1995static bfd_boolean
38701953
AM
1996elf_i386_fake_sections (abfd, hdr, sec)
1997 bfd *abfd ATTRIBUTE_UNUSED;
947216bf 1998 Elf_Internal_Shdr *hdr;
38701953
AM
1999 asection *sec;
2000{
2001 register const char *name;
2002
2003 name = bfd_get_section_name (abfd, sec);
2004
2005 /* This is an ugly, but unfortunately necessary hack that is
2006 needed when producing EFI binaries on x86. It tells
2007 elf.c:elf_fake_sections() not to consider ".reloc" as a section
2008 containing ELF relocation info. We need this hack in order to
2009 be able to generate ELF binaries that can be translated into
2010 EFI applications (which are essentially COFF objects). Those
2011 files contain a COFF ".reloc" section inside an ELFNN object,
2012 which would normally cause BFD to segfault because it would
2013 attempt to interpret this section as containing relocation
2014 entries for section "oc". With this hack enabled, ".reloc"
2015 will be treated as a normal data section, which will avoid the
2016 segfault. However, you won't be able to create an ELFNN binary
2017 with a section named "oc" that needs relocations, but that's
2018 the kind of ugly side-effects you get when detecting section
2019 types based on their names... In practice, this limitation is
2020 unlikely to bite. */
2021 if (strcmp (name, ".reloc") == 0)
2022 hdr->sh_type = SHT_PROGBITS;
2023
b34976b6 2024 return TRUE;
38701953
AM
2025}
2026
13ae64f3
JJ
2027/* Return the base VMA address which should be subtracted from real addresses
2028 when resolving @dtpoff relocation.
2029 This is PT_TLS segment p_vaddr. */
2030
2031static bfd_vma
2032dtpoff_base (info)
2033 struct bfd_link_info *info;
2034{
6a30718d
JJ
2035 /* If tls_segment is NULL, we should have signalled an error already. */
2036 if (elf_hash_table (info)->tls_segment == NULL)
2037 return 0;
13ae64f3
JJ
2038 return elf_hash_table (info)->tls_segment->start;
2039}
2040
2041/* Return the relocation value for @tpoff relocation
2042 if STT_TLS virtual address is ADDRESS. */
2043
2044static bfd_vma
2045tpoff (info, address)
2046 struct bfd_link_info *info;
2047 bfd_vma address;
2048{
2049 struct elf_link_tls_segment *tls_segment
2050 = elf_hash_table (info)->tls_segment;
2051
6a30718d
JJ
2052 /* If tls_segment is NULL, we should have signalled an error already. */
2053 if (tls_segment == NULL)
2054 return 0;
13ae64f3
JJ
2055 return (align_power (tls_segment->size, tls_segment->align)
2056 + tls_segment->start - address);
2057}
2058
252b5132
RH
2059/* Relocate an i386 ELF section. */
2060
b34976b6 2061static bfd_boolean
252b5132
RH
2062elf_i386_relocate_section (output_bfd, info, input_bfd, input_section,
2063 contents, relocs, local_syms, local_sections)
2064 bfd *output_bfd;
2065 struct bfd_link_info *info;
2066 bfd *input_bfd;
2067 asection *input_section;
2068 bfd_byte *contents;
2069 Elf_Internal_Rela *relocs;
2070 Elf_Internal_Sym *local_syms;
2071 asection **local_sections;
2072{
6725bdbf 2073 struct elf_i386_link_hash_table *htab;
252b5132
RH
2074 Elf_Internal_Shdr *symtab_hdr;
2075 struct elf_link_hash_entry **sym_hashes;
2076 bfd_vma *local_got_offsets;
252b5132
RH
2077 Elf_Internal_Rela *rel;
2078 Elf_Internal_Rela *relend;
2079
6725bdbf 2080 htab = elf_i386_hash_table (info);
252b5132
RH
2081 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2082 sym_hashes = elf_sym_hashes (input_bfd);
2083 local_got_offsets = elf_local_got_offsets (input_bfd);
2084
252b5132
RH
2085 rel = relocs;
2086 relend = relocs + input_section->reloc_count;
2087 for (; rel < relend; rel++)
2088 {
13ae64f3 2089 unsigned int r_type;
252b5132
RH
2090 reloc_howto_type *howto;
2091 unsigned long r_symndx;
2092 struct elf_link_hash_entry *h;
2093 Elf_Internal_Sym *sym;
2094 asection *sec;
ffb2e45b 2095 bfd_vma off;
252b5132 2096 bfd_vma relocation;
b34976b6 2097 bfd_boolean unresolved_reloc;
252b5132 2098 bfd_reloc_status_type r;
1b452ec6 2099 unsigned int indx;
13ae64f3 2100 int tls_type;
252b5132
RH
2101
2102 r_type = ELF32_R_TYPE (rel->r_info);
dc47f327
AM
2103 if (r_type == (int) R_386_GNU_VTINHERIT
2104 || r_type == (int) R_386_GNU_VTENTRY)
252b5132 2105 continue;
dc47f327 2106
1b452ec6 2107 if ((indx = (unsigned) r_type) >= R_386_standard
13ae64f3
JJ
2108 && ((indx = r_type - R_386_ext_offset) - R_386_standard
2109 >= R_386_ext - R_386_standard)
2110 && ((indx = r_type - R_386_tls_offset) - R_386_ext
2111 >= R_386_tls - R_386_ext))
252b5132
RH
2112 {
2113 bfd_set_error (bfd_error_bad_value);
b34976b6 2114 return FALSE;
252b5132 2115 }
1b452ec6 2116 howto = elf_howto_table + indx;
252b5132
RH
2117
2118 r_symndx = ELF32_R_SYM (rel->r_info);
2119
2120 if (info->relocateable)
2121 {
4a335f3d 2122 bfd_vma val;
4a335f3d
AM
2123 bfd_byte *where;
2124
0ac8d2ca 2125 /* This is a relocatable link. We don't have to change
252b5132
RH
2126 anything, unless the reloc is against a section symbol,
2127 in which case we have to adjust according to where the
2128 section symbol winds up in the output section. */
4a335f3d
AM
2129 if (r_symndx >= symtab_hdr->sh_info)
2130 continue;
2131
2132 sym = local_syms + r_symndx;
2133 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2134 continue;
2135
2136 sec = local_sections[r_symndx];
2137 val = sec->output_offset;
2138 if (val == 0)
2139 continue;
2140
2141 where = contents + rel->r_offset;
2142 switch (howto->size)
252b5132 2143 {
16a10388 2144 /* FIXME: overflow checks. */
4a335f3d 2145 case 0:
16a10388 2146 val += bfd_get_8 (input_bfd, where);
4a335f3d 2147 bfd_put_8 (input_bfd, val, where);
4a335f3d
AM
2148 break;
2149 case 1:
16a10388 2150 val += bfd_get_16 (input_bfd, where);
4a335f3d 2151 bfd_put_16 (input_bfd, val, where);
4a335f3d
AM
2152 break;
2153 case 2:
2154 val += bfd_get_32 (input_bfd, where);
2155 bfd_put_32 (input_bfd, val, where);
2156 break;
2157 default:
2158 abort ();
252b5132 2159 }
252b5132
RH
2160 continue;
2161 }
2162
2163 /* This is a final link. */
2164 h = NULL;
2165 sym = NULL;
2166 sec = NULL;
b34976b6 2167 unresolved_reloc = FALSE;
252b5132
RH
2168 if (r_symndx < symtab_hdr->sh_info)
2169 {
2170 sym = local_syms + r_symndx;
2171 sec = local_sections[r_symndx];
2172 relocation = (sec->output_section->vma
2173 + sec->output_offset
2174 + sym->st_value);
f8df10f4
JJ
2175 if ((sec->flags & SEC_MERGE)
2176 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
2177 {
2178 asection *msec;
2179 bfd_vma addend;
4a335f3d 2180 bfd_byte *where = contents + rel->r_offset;
f8df10f4 2181
4a335f3d 2182 switch (howto->size)
f8df10f4 2183 {
4a335f3d
AM
2184 case 0:
2185 addend = bfd_get_8 (input_bfd, where);
2186 if (howto->pc_relative)
2187 {
2188 addend = (addend ^ 0x80) - 0x80;
2189 addend += 1;
2190 }
2191 break;
2192 case 1:
2193 addend = bfd_get_16 (input_bfd, where);
2194 if (howto->pc_relative)
2195 {
2196 addend = (addend ^ 0x8000) - 0x8000;
2197 addend += 2;
2198 }
2199 break;
2200 case 2:
2201 addend = bfd_get_32 (input_bfd, where);
2202 if (howto->pc_relative)
2203 {
2204 addend = (addend ^ 0x80000000) - 0x80000000;
2205 addend += 4;
2206 }
2207 break;
2208 default:
2209 abort ();
f8df10f4
JJ
2210 }
2211
f8df10f4 2212 msec = sec;
4a335f3d
AM
2213 addend = _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend);
2214 addend -= relocation;
f8df10f4 2215 addend += msec->output_section->vma + msec->output_offset;
4a335f3d
AM
2216
2217 switch (howto->size)
2218 {
2219 case 0:
16a10388 2220 /* FIXME: overflow checks. */
4a335f3d
AM
2221 if (howto->pc_relative)
2222 addend -= 1;
2223 bfd_put_8 (input_bfd, addend, where);
4a335f3d
AM
2224 break;
2225 case 1:
2226 if (howto->pc_relative)
2227 addend -= 2;
2228 bfd_put_16 (input_bfd, addend, where);
4a335f3d
AM
2229 break;
2230 case 2:
2231 if (howto->pc_relative)
2232 addend -= 4;
2233 bfd_put_32 (input_bfd, addend, where);
2234 break;
2235 }
f8df10f4 2236 }
252b5132
RH
2237 }
2238 else
2239 {
2240 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2241 while (h->root.type == bfd_link_hash_indirect
2242 || h->root.type == bfd_link_hash_warning)
2243 h = (struct elf_link_hash_entry *) h->root.u.i.link;
ffb2e45b 2244
6725bdbf 2245 relocation = 0;
252b5132
RH
2246 if (h->root.type == bfd_link_hash_defined
2247 || h->root.type == bfd_link_hash_defweak)
2248 {
2249 sec = h->root.u.def.section;
83be169b
AM
2250 if (sec->output_section == NULL)
2251 /* Set a flag that will be cleared later if we find a
2252 relocation value for this symbol. output_section
2253 is typically NULL for symbols satisfied by a shared
2254 library. */
b34976b6 2255 unresolved_reloc = TRUE;
252b5132
RH
2256 else
2257 relocation = (h->root.u.def.value
2258 + sec->output_section->vma
2259 + sec->output_offset);
2260 }
2261 else if (h->root.type == bfd_link_hash_undefweak)
6725bdbf 2262 ;
671bae9c
NC
2263 else if (info->shared
2264 && (!info->symbolic || info->allow_shlib_undefined)
3a27a730
L
2265 && !info->no_undefined
2266 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
6725bdbf 2267 ;
252b5132
RH
2268 else
2269 {
2270 if (! ((*info->callbacks->undefined_symbol)
2271 (info, h->root.root.string, input_bfd,
5cc7c785 2272 input_section, rel->r_offset,
3a27a730
L
2273 (!info->shared || info->no_undefined
2274 || ELF_ST_VISIBILITY (h->other)))))
b34976b6 2275 return FALSE;
252b5132
RH
2276 }
2277 }
2278
2279 switch (r_type)
2280 {
2281 case R_386_GOT32:
2282 /* Relocation is to the entry for this symbol in the global
2283 offset table. */
ffb2e45b
AM
2284 if (htab->sgot == NULL)
2285 abort ();
252b5132
RH
2286
2287 if (h != NULL)
2288 {
b34976b6 2289 bfd_boolean dyn;
252b5132
RH
2290
2291 off = h->got.offset;
ebe50bae 2292 dyn = htab->elf.dynamic_sections_created;
6725bdbf 2293 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h)
252b5132 2294 || (info->shared
6725bdbf
AM
2295 && (info->symbolic
2296 || h->dynindx == -1
2297 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL))
252b5132
RH
2298 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
2299 {
2300 /* This is actually a static link, or it is a
2301 -Bsymbolic link and the symbol is defined
2302 locally, or the symbol was forced to be local
2303 because of a version file. We must initialize
2304 this entry in the global offset table. Since the
2305 offset must always be a multiple of 4, we use the
2306 least significant bit to record whether we have
2307 initialized it already.
2308
2309 When doing a dynamic link, we create a .rel.got
2310 relocation entry to initialize the value. This
2311 is done in the finish_dynamic_symbol routine. */
2312 if ((off & 1) != 0)
2313 off &= ~1;
2314 else
2315 {
2316 bfd_put_32 (output_bfd, relocation,
6725bdbf 2317 htab->sgot->contents + off);
252b5132
RH
2318 h->got.offset |= 1;
2319 }
2320 }
8c694914 2321 else
b34976b6 2322 unresolved_reloc = FALSE;
252b5132
RH
2323 }
2324 else
2325 {
ffb2e45b
AM
2326 if (local_got_offsets == NULL)
2327 abort ();
252b5132
RH
2328
2329 off = local_got_offsets[r_symndx];
2330
2331 /* The offset must always be a multiple of 4. We use
83be169b
AM
2332 the least significant bit to record whether we have
2333 already generated the necessary reloc. */
252b5132
RH
2334 if ((off & 1) != 0)
2335 off &= ~1;
2336 else
2337 {
6725bdbf
AM
2338 bfd_put_32 (output_bfd, relocation,
2339 htab->sgot->contents + off);
252b5132
RH
2340
2341 if (info->shared)
2342 {
947216bf
AM
2343 asection *s;
2344 Elf_Internal_Rela outrel;
2345 bfd_byte *loc;
252b5132 2346
947216bf
AM
2347 s = htab->srelgot;
2348 if (s == NULL)
ffb2e45b 2349 abort ();
252b5132 2350
6725bdbf
AM
2351 outrel.r_offset = (htab->sgot->output_section->vma
2352 + htab->sgot->output_offset
252b5132
RH
2353 + off);
2354 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
947216bf
AM
2355 loc = s->contents;
2356 loc += s->reloc_count++ * sizeof (Elf32_External_Rel);
0ac8d2ca 2357 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
252b5132
RH
2358 }
2359
2360 local_got_offsets[r_symndx] |= 1;
2361 }
252b5132
RH
2362 }
2363
ffb2e45b
AM
2364 if (off >= (bfd_vma) -2)
2365 abort ();
2366
2367 relocation = htab->sgot->output_offset + off;
252b5132
RH
2368 break;
2369
2370 case R_386_GOTOFF:
2371 /* Relocation is relative to the start of the global offset
2372 table. */
2373
252b5132
RH
2374 /* Note that sgot->output_offset is not involved in this
2375 calculation. We always want the start of .got. If we
2376 defined _GLOBAL_OFFSET_TABLE in a different way, as is
2377 permitted by the ABI, we might have to change this
2378 calculation. */
6725bdbf 2379 relocation -= htab->sgot->output_section->vma;
252b5132
RH
2380 break;
2381
2382 case R_386_GOTPC:
2383 /* Use global offset table as symbol value. */
6725bdbf 2384 relocation = htab->sgot->output_section->vma;
b34976b6 2385 unresolved_reloc = FALSE;
252b5132
RH
2386 break;
2387
2388 case R_386_PLT32:
2389 /* Relocation is to the entry for this symbol in the
2390 procedure linkage table. */
2391
dd5724d5 2392 /* Resolve a PLT32 reloc against a local symbol directly,
83be169b 2393 without using the procedure linkage table. */
252b5132
RH
2394 if (h == NULL)
2395 break;
2396
dd5724d5 2397 if (h->plt.offset == (bfd_vma) -1
6725bdbf 2398 || htab->splt == NULL)
252b5132
RH
2399 {
2400 /* We didn't make a PLT entry for this symbol. This
83be169b
AM
2401 happens when statically linking PIC code, or when
2402 using -Bsymbolic. */
252b5132
RH
2403 break;
2404 }
2405
6725bdbf
AM
2406 relocation = (htab->splt->output_section->vma
2407 + htab->splt->output_offset
252b5132 2408 + h->plt.offset);
b34976b6 2409 unresolved_reloc = FALSE;
252b5132
RH
2410 break;
2411
2412 case R_386_32:
2413 case R_386_PC32:
ec338859
AM
2414 /* r_symndx will be zero only for relocs against symbols
2415 from removed linkonce sections, or sections discarded by
2416 a linker script. */
2417 if (r_symndx == 0
2418 || (input_section->flags & SEC_ALLOC) == 0)
2419 break;
2420
12d0ee4a 2421 if ((info->shared
12d0ee4a
AM
2422 && (r_type != R_386_PC32
2423 || (h != NULL
2424 && h->dynindx != -1
2425 && (! info->symbolic
2426 || (h->elf_link_hash_flags
2427 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
2428 || (!info->shared
12d0ee4a
AM
2429 && h != NULL
2430 && h->dynindx != -1
2431 && (h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
56882138
AM
2432 && (((h->elf_link_hash_flags
2433 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2434 && (h->elf_link_hash_flags
2435 & ELF_LINK_HASH_DEF_REGULAR) == 0)
28d0b90e
AM
2436 || h->root.type == bfd_link_hash_undefweak
2437 || h->root.type == bfd_link_hash_undefined)))
252b5132 2438 {
947216bf
AM
2439 Elf_Internal_Rela outrel;
2440 bfd_byte *loc;
b34976b6 2441 bfd_boolean skip, relocate;
0c715baa 2442 asection *sreloc;
252b5132
RH
2443
2444 /* When generating a shared object, these relocations
2445 are copied into the output file to be resolved at run
2446 time. */
2447
b34976b6
AM
2448 skip = FALSE;
2449 relocate = FALSE;
252b5132 2450
c629eae0
JJ
2451 outrel.r_offset =
2452 _bfd_elf_section_offset (output_bfd, info, input_section,
2453 rel->r_offset);
2454 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2455 skip = TRUE;
0bb2d96a 2456 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2457 skip = TRUE, relocate = TRUE;
252b5132
RH
2458 outrel.r_offset += (input_section->output_section->vma
2459 + input_section->output_offset);
2460
2461 if (skip)
0bb2d96a 2462 memset (&outrel, 0, sizeof outrel);
5a15f56f
AM
2463 else if (h != NULL
2464 && h->dynindx != -1
2465 && (r_type == R_386_PC32
2466 || !info->shared
2467 || !info->symbolic
2468 || (h->elf_link_hash_flags
2469 & ELF_LINK_HASH_DEF_REGULAR) == 0))
0bb2d96a 2470 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
252b5132
RH
2471 else
2472 {
5a15f56f 2473 /* This symbol is local, or marked to become local. */
b34976b6 2474 relocate = TRUE;
5a15f56f 2475 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
252b5132
RH
2476 }
2477
0c715baa
AM
2478 sreloc = elf_section_data (input_section)->sreloc;
2479 if (sreloc == NULL)
2480 abort ();
2481
947216bf
AM
2482 loc = sreloc->contents;
2483 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rel);
0c715baa 2484 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
252b5132
RH
2485
2486 /* If this reloc is against an external symbol, we do
2487 not want to fiddle with the addend. Otherwise, we
2488 need to include the symbol value so that it becomes
2489 an addend for the dynamic reloc. */
2490 if (! relocate)
2491 continue;
2492 }
252b5132
RH
2493 break;
2494
37e55690
JJ
2495 case R_386_TLS_IE:
2496 if (info->shared)
2497 {
947216bf
AM
2498 Elf_Internal_Rela outrel;
2499 bfd_byte *loc;
37e55690 2500 asection *sreloc;
37e55690
JJ
2501
2502 outrel.r_offset = rel->r_offset
2503 + input_section->output_section->vma
2504 + input_section->output_offset;
2505 outrel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
2506 sreloc = elf_section_data (input_section)->sreloc;
2507 if (sreloc == NULL)
2508 abort ();
947216bf
AM
2509 loc = sreloc->contents;
2510 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rel);
37e55690
JJ
2511 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2512 }
2513 /* Fall through */
2514
13ae64f3
JJ
2515 case R_386_TLS_GD:
2516 case R_386_TLS_IE_32:
37e55690 2517 case R_386_TLS_GOTIE:
13ae64f3
JJ
2518 r_type = elf_i386_tls_transition (info, r_type, h == NULL);
2519 tls_type = GOT_UNKNOWN;
2520 if (h == NULL && local_got_offsets)
2521 tls_type = elf_i386_local_got_tls_type (input_bfd) [r_symndx];
2522 else if (h != NULL)
2523 {
2524 tls_type = elf_i386_hash_entry(h)->tls_type;
37e55690 2525 if (!info->shared && h->dynindx == -1 && (tls_type & GOT_TLS_IE))
13ae64f3
JJ
2526 r_type = R_386_TLS_LE_32;
2527 }
37e55690
JJ
2528 if (tls_type == GOT_TLS_IE)
2529 tls_type = GOT_TLS_IE_NEG;
2530 if (r_type == R_386_TLS_GD)
2531 {
2532 if (tls_type == GOT_TLS_IE_POS)
2533 r_type = R_386_TLS_GOTIE;
2534 else if (tls_type & GOT_TLS_IE)
2535 r_type = R_386_TLS_IE_32;
2536 }
13ae64f3
JJ
2537
2538 if (r_type == R_386_TLS_LE_32)
2539 {
82e51918 2540 BFD_ASSERT (! unresolved_reloc);
13ae64f3
JJ
2541 if (ELF32_R_TYPE (rel->r_info) == R_386_TLS_GD)
2542 {
2543 unsigned int val, type;
2544 bfd_vma roff;
2545
2546 /* GD->LE transition. */
2547 BFD_ASSERT (rel->r_offset >= 2);
2548 type = bfd_get_8 (input_bfd, contents + rel->r_offset - 2);
2549 BFD_ASSERT (type == 0x8d || type == 0x04);
2550 BFD_ASSERT (rel->r_offset + 9 <= input_section->_raw_size);
2551 BFD_ASSERT (bfd_get_8 (input_bfd,
2552 contents + rel->r_offset + 4)
2553 == 0xe8);
2554 BFD_ASSERT (rel + 1 < relend);
2555 BFD_ASSERT (ELF32_R_TYPE (rel[1].r_info) == R_386_PLT32);
2556 roff = rel->r_offset + 5;
2557 val = bfd_get_8 (input_bfd,
2558 contents + rel->r_offset - 1);
2559 if (type == 0x04)
2560 {
2561 /* leal foo(,%reg,1), %eax; call ___tls_get_addr
2562 Change it into:
2563 movl %gs:0, %eax; subl $foo@tpoff, %eax
2564 (6 byte form of subl). */
2565 BFD_ASSERT (rel->r_offset >= 3);
2566 BFD_ASSERT (bfd_get_8 (input_bfd,
2567 contents + rel->r_offset - 3)
2568 == 0x8d);
2569 BFD_ASSERT ((val & 0xc7) == 0x05 && val != (4 << 3));
2570 memcpy (contents + rel->r_offset - 3,
2571 "\x65\xa1\0\0\0\0\x81\xe8\0\0\0", 12);
2572 }
2573 else
2574 {
2575 BFD_ASSERT ((val & 0xf8) == 0x80 && (val & 7) != 4);
2576 if (rel->r_offset + 10 <= input_section->_raw_size
2577 && bfd_get_8 (input_bfd,
2578 contents + rel->r_offset + 9) == 0x90)
2579 {
2580 /* leal foo(%reg), %eax; call ___tls_get_addr; nop
2581 Change it into:
2582 movl %gs:0, %eax; subl $foo@tpoff, %eax
2583 (6 byte form of subl). */
2584 memcpy (contents + rel->r_offset - 2,
2585 "\x65\xa1\0\0\0\0\x81\xe8\0\0\0", 12);
2586 roff = rel->r_offset + 6;
2587 }
2588 else
2589 {
2590 /* leal foo(%reg), %eax; call ___tls_get_addr
2591 Change it into:
2592 movl %gs:0, %eax; subl $foo@tpoff, %eax
2593 (5 byte form of subl). */
2594 memcpy (contents + rel->r_offset - 2,
2595 "\x65\xa1\0\0\0\0\x2d\0\0\0", 11);
2596 }
2597 }
2598 bfd_put_32 (output_bfd, tpoff (info, relocation),
2599 contents + roff);
2600 /* Skip R_386_PLT32. */
2601 rel++;
2602 continue;
2603 }
37e55690 2604 else if (ELF32_R_TYPE (rel->r_info) == R_386_TLS_IE)
13ae64f3
JJ
2605 {
2606 unsigned int val, type;
2607
2608 /* IE->LE transition:
37e55690
JJ
2609 Originally it can be one of:
2610 movl foo, %eax
2611 movl foo, %reg
2612 addl foo, %reg
2613 We change it into:
2614 movl $foo, %eax
2615 movl $foo, %reg
2616 addl $foo, %reg. */
2617 BFD_ASSERT (rel->r_offset >= 1);
2618 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
2619 BFD_ASSERT (rel->r_offset + 4 <= input_section->_raw_size);
37e55690
JJ
2620 if (val == 0xa1)
2621 {
2622 /* movl foo, %eax. */
7c445aa3 2623 bfd_put_8 (output_bfd, 0xb8, contents + rel->r_offset - 1);
37e55690 2624 }
299bf759 2625 else
37e55690 2626 {
299bf759
L
2627 BFD_ASSERT (rel->r_offset >= 2);
2628 type = bfd_get_8 (input_bfd, contents + rel->r_offset - 2);
2629 switch (type)
2630 {
2631 case 0x8b:
2632 /* movl */
2633 BFD_ASSERT ((val & 0xc7) == 0x05);
2634 bfd_put_8 (output_bfd, 0xc7,
2635 contents + rel->r_offset - 2);
2636 bfd_put_8 (output_bfd,
2637 0xc0 | ((val >> 3) & 7),
2638 contents + rel->r_offset - 1);
2639 break;
2640 case 0x03:
2641 /* addl */
2642 BFD_ASSERT ((val & 0xc7) == 0x05);
2643 bfd_put_8 (output_bfd, 0x81,
2644 contents + rel->r_offset - 2);
2645 bfd_put_8 (output_bfd,
2646 0xc0 | ((val >> 3) & 7),
2647 contents + rel->r_offset - 1);
2648 break;
2649 default:
2650 BFD_FAIL ();
2651 break;
2652 }
37e55690 2653 }
37e55690
JJ
2654 bfd_put_32 (output_bfd, -tpoff (info, relocation),
2655 contents + rel->r_offset);
2656 continue;
2657 }
2658 else
2659 {
2660 unsigned int val, type;
2661
2662 /* {IE_32,GOTIE}->LE transition:
2663 Originally it can be one of:
13ae64f3 2664 subl foo(%reg1), %reg2
13ae64f3 2665 movl foo(%reg1), %reg2
37e55690 2666 addl foo(%reg1), %reg2
13ae64f3
JJ
2667 We change it into:
2668 subl $foo, %reg2
37e55690
JJ
2669 movl $foo, %reg2 (6 byte form)
2670 addl $foo, %reg2. */
13ae64f3
JJ
2671 BFD_ASSERT (rel->r_offset >= 2);
2672 type = bfd_get_8 (input_bfd, contents + rel->r_offset - 2);
2673 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
2674 BFD_ASSERT (rel->r_offset + 4 <= input_section->_raw_size);
37e55690 2675 BFD_ASSERT ((val & 0xc0) == 0x80 && (val & 7) != 4);
13ae64f3
JJ
2676 if (type == 0x8b)
2677 {
2678 /* movl */
13ae64f3
JJ
2679 bfd_put_8 (output_bfd, 0xc7,
2680 contents + rel->r_offset - 2);
2681 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
2682 contents + rel->r_offset - 1);
2683 }
2684 else if (type == 0x2b)
2685 {
2686 /* subl */
13ae64f3
JJ
2687 bfd_put_8 (output_bfd, 0x81,
2688 contents + rel->r_offset - 2);
2689 bfd_put_8 (output_bfd, 0xe8 | ((val >> 3) & 7),
2690 contents + rel->r_offset - 1);
2691 }
37e55690
JJ
2692 else if (type == 0x03)
2693 {
2694 /* addl */
2695 bfd_put_8 (output_bfd, 0x81,
2696 contents + rel->r_offset - 2);
2697 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
2698 contents + rel->r_offset - 1);
2699 }
13ae64f3
JJ
2700 else
2701 BFD_FAIL ();
37e55690
JJ
2702 if (ELF32_R_TYPE (rel->r_info) == R_386_TLS_GOTIE)
2703 bfd_put_32 (output_bfd, -tpoff (info, relocation),
2704 contents + rel->r_offset);
2705 else
2706 bfd_put_32 (output_bfd, tpoff (info, relocation),
2707 contents + rel->r_offset);
13ae64f3
JJ
2708 continue;
2709 }
2710 }
2711
2712 if (htab->sgot == NULL)
2713 abort ();
2714
2715 if (h != NULL)
2716 off = h->got.offset;
2717 else
2718 {
2719 if (local_got_offsets == NULL)
2720 abort ();
2721
2722 off = local_got_offsets[r_symndx];
2723 }
2724
2725 if ((off & 1) != 0)
2726 off &= ~1;
2727 else
2728 {
947216bf
AM
2729 Elf_Internal_Rela outrel;
2730 bfd_byte *loc;
13ae64f3
JJ
2731 int dr_type, indx;
2732
2733 if (htab->srelgot == NULL)
2734 abort ();
2735
2736 outrel.r_offset = (htab->sgot->output_section->vma
2737 + htab->sgot->output_offset + off);
2738
13ae64f3
JJ
2739 indx = h && h->dynindx != -1 ? h->dynindx : 0;
2740 if (r_type == R_386_TLS_GD)
2741 dr_type = R_386_TLS_DTPMOD32;
37e55690
JJ
2742 else if (tls_type == GOT_TLS_IE_POS)
2743 dr_type = R_386_TLS_TPOFF;
13ae64f3
JJ
2744 else
2745 dr_type = R_386_TLS_TPOFF32;
37e55690
JJ
2746 if (dr_type == R_386_TLS_TPOFF && indx == 0)
2747 bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
2748 htab->sgot->contents + off);
2749 else if (dr_type == R_386_TLS_TPOFF32 && indx == 0)
c5c1f40c 2750 bfd_put_32 (output_bfd, dtpoff_base (info) - relocation,
c366c25e
JJ
2751 htab->sgot->contents + off);
2752 else
2753 bfd_put_32 (output_bfd, 0,
2754 htab->sgot->contents + off);
13ae64f3 2755 outrel.r_info = ELF32_R_INFO (indx, dr_type);
947216bf
AM
2756 loc = htab->srelgot->contents;
2757 loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rel);
13ae64f3
JJ
2758 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2759
2760 if (r_type == R_386_TLS_GD)
2761 {
2762 if (indx == 0)
2763 {
82e51918 2764 BFD_ASSERT (! unresolved_reloc);
13ae64f3
JJ
2765 bfd_put_32 (output_bfd,
2766 relocation - dtpoff_base (info),
2767 htab->sgot->contents + off + 4);
2768 }
2769 else
2770 {
2771 bfd_put_32 (output_bfd, 0,
2772 htab->sgot->contents + off + 4);
2773 outrel.r_info = ELF32_R_INFO (indx,
2774 R_386_TLS_DTPOFF32);
2775 outrel.r_offset += 4;
2776 htab->srelgot->reloc_count++;
947216bf
AM
2777 loc += sizeof (Elf32_External_Rel);
2778 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
13ae64f3
JJ
2779 }
2780 }
37e55690
JJ
2781 else if (tls_type == GOT_TLS_IE_BOTH)
2782 {
2783 bfd_put_32 (output_bfd,
2784 indx == 0 ? relocation - dtpoff_base (info) : 0,
2785 htab->sgot->contents + off + 4);
2786 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF);
2787 outrel.r_offset += 4;
2788 htab->srelgot->reloc_count++;
947216bf 2789 loc += sizeof (Elf32_External_Rel);
37e55690
JJ
2790 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2791 }
13ae64f3
JJ
2792
2793 if (h != NULL)
2794 h->got.offset |= 1;
2795 else
2796 local_got_offsets[r_symndx] |= 1;
2797 }
2798
2799 if (off >= (bfd_vma) -2)
2800 abort ();
2801 if (r_type == ELF32_R_TYPE (rel->r_info))
2802 {
2803 relocation = htab->sgot->output_offset + off;
37e55690
JJ
2804 if ((r_type == R_386_TLS_IE || r_type == R_386_TLS_GOTIE)
2805 && tls_type == GOT_TLS_IE_BOTH)
2806 relocation += 4;
2807 if (r_type == R_386_TLS_IE)
2808 relocation += htab->sgot->output_section->vma;
b34976b6 2809 unresolved_reloc = FALSE;
13ae64f3
JJ
2810 }
2811 else
2812 {
2813 unsigned int val, type;
2814 bfd_vma roff;
2815
2816 /* GD->IE transition. */
2817 BFD_ASSERT (rel->r_offset >= 2);
2818 type = bfd_get_8 (input_bfd, contents + rel->r_offset - 2);
2819 BFD_ASSERT (type == 0x8d || type == 0x04);
2820 BFD_ASSERT (rel->r_offset + 9 <= input_section->_raw_size);
2821 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset + 4)
2822 == 0xe8);
2823 BFD_ASSERT (rel + 1 < relend);
2824 BFD_ASSERT (ELF32_R_TYPE (rel[1].r_info) == R_386_PLT32);
2825 roff = rel->r_offset - 3;
2826 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
2827 if (type == 0x04)
2828 {
2829 /* leal foo(,%reg,1), %eax; call ___tls_get_addr
2830 Change it into:
2831 movl %gs:0, %eax; subl $foo@gottpoff(%reg), %eax. */
2832 BFD_ASSERT (rel->r_offset >= 3);
2833 BFD_ASSERT (bfd_get_8 (input_bfd,
2834 contents + rel->r_offset - 3)
2835 == 0x8d);
2836 BFD_ASSERT ((val & 0xc7) == 0x05 && val != (4 << 3));
2837 val >>= 3;
2838 }
2839 else
2840 {
2841 /* leal foo(%reg), %eax; call ___tls_get_addr; nop
2842 Change it into:
2843 movl %gs:0, %eax; subl $foo@gottpoff(%reg), %eax. */
2844 BFD_ASSERT (rel->r_offset + 10 <= input_section->_raw_size);
2845 BFD_ASSERT ((val & 0xf8) == 0x80 && (val & 7) != 4);
2846 BFD_ASSERT (bfd_get_8 (input_bfd,
2847 contents + rel->r_offset + 9)
2848 == 0x90);
2849 roff = rel->r_offset - 2;
2850 }
2851 memcpy (contents + roff,
2852 "\x65\xa1\0\0\0\0\x2b\x80\0\0\0", 12);
2853 contents[roff + 7] = 0x80 | (val & 7);
37e55690
JJ
2854 /* If foo is used only with foo@gotntpoff(%reg) and
2855 foo@indntpoff, but not with foo@gottpoff(%reg), change
2856 subl $foo@gottpoff(%reg), %eax
2857 into:
2858 addl $foo@gotntpoff(%reg), %eax. */
2859 if (r_type == R_386_TLS_GOTIE)
2860 {
2861 contents[roff + 6] = 0x03;
2862 if (tls_type == GOT_TLS_IE_BOTH)
2863 off += 4;
2864 }
13ae64f3
JJ
2865 bfd_put_32 (output_bfd, htab->sgot->output_offset + off,
2866 contents + roff + 8);
2867 /* Skip R_386_PLT32. */
2868 rel++;
2869 continue;
2870 }
2871 break;
2872
2873 case R_386_TLS_LDM:
2874 if (! info->shared)
2875 {
2876 unsigned int val;
2877
2878 /* LD->LE transition:
2879 Ensure it is:
2880 leal foo(%reg), %eax; call ___tls_get_addr.
2881 We change it into:
2882 movl %gs:0, %eax; nop; leal 0(%esi,1), %esi. */
2883 BFD_ASSERT (rel->r_offset >= 2);
2884 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset - 2)
2885 == 0x8d);
2886 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
2887 BFD_ASSERT ((val & 0xf8) == 0x80 && (val & 7) != 4);
2888 BFD_ASSERT (rel->r_offset + 9 <= input_section->_raw_size);
2889 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset + 4)
2890 == 0xe8);
2891 BFD_ASSERT (rel + 1 < relend);
2892 BFD_ASSERT (ELF32_R_TYPE (rel[1].r_info) == R_386_PLT32);
2893 memcpy (contents + rel->r_offset - 2,
2894 "\x65\xa1\0\0\0\0\x90\x8d\x74\x26", 11);
2895 /* Skip R_386_PLT32. */
2896 rel++;
2897 continue;
2898 }
2899
2900 if (htab->sgot == NULL)
2901 abort ();
2902
2903 off = htab->tls_ldm_got.offset;
2904 if (off & 1)
2905 off &= ~1;
2906 else
2907 {
947216bf
AM
2908 Elf_Internal_Rela outrel;
2909 bfd_byte *loc;
13ae64f3
JJ
2910
2911 if (htab->srelgot == NULL)
2912 abort ();
2913
2914 outrel.r_offset = (htab->sgot->output_section->vma
2915 + htab->sgot->output_offset + off);
2916
2917 bfd_put_32 (output_bfd, 0,
2918 htab->sgot->contents + off);
2919 bfd_put_32 (output_bfd, 0,
2920 htab->sgot->contents + off + 4);
2921 outrel.r_info = ELF32_R_INFO (0, R_386_TLS_DTPMOD32);
947216bf
AM
2922 loc = htab->srelgot->contents;
2923 loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rel);
13ae64f3
JJ
2924 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2925 htab->tls_ldm_got.offset |= 1;
2926 }
2927 relocation = htab->sgot->output_offset + off;
b34976b6 2928 unresolved_reloc = FALSE;
13ae64f3
JJ
2929 break;
2930
2931 case R_386_TLS_LDO_32:
a45bb67d 2932 if (info->shared || (input_section->flags & SEC_CODE) == 0)
13ae64f3
JJ
2933 relocation -= dtpoff_base (info);
2934 else
2935 /* When converting LDO to LE, we must negate. */
2936 relocation = -tpoff (info, relocation);
2937 break;
2938
2939 case R_386_TLS_LE_32:
13ae64f3 2940 case R_386_TLS_LE:
37e55690
JJ
2941 if (info->shared)
2942 {
947216bf 2943 Elf_Internal_Rela outrel;
37e55690 2944 asection *sreloc;
947216bf 2945 bfd_byte *loc;
37e55690
JJ
2946 int indx;
2947
2948 outrel.r_offset = rel->r_offset
2949 + input_section->output_section->vma
2950 + input_section->output_offset;
2951 if (h != NULL && h->dynindx != -1)
2952 indx = h->dynindx;
2953 else
2954 indx = 0;
2955 if (r_type == R_386_TLS_LE_32)
2956 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF32);
2957 else
2958 outrel.r_info = ELF32_R_INFO (indx, R_386_TLS_TPOFF);
2959 sreloc = elf_section_data (input_section)->sreloc;
2960 if (sreloc == NULL)
2961 abort ();
947216bf
AM
2962 loc = sreloc->contents;
2963 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rel);
37e55690
JJ
2964 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2965 if (indx)
2966 continue;
2967 else if (r_type == R_386_TLS_LE_32)
2968 relocation = dtpoff_base (info) - relocation;
2969 else
2970 relocation -= dtpoff_base (info);
2971 }
2972 else if (r_type == R_386_TLS_LE_32)
2973 relocation = tpoff (info, relocation);
2974 else
2975 relocation = -tpoff (info, relocation);
13ae64f3
JJ
2976 break;
2977
252b5132
RH
2978 default:
2979 break;
2980 }
2981
239e1f3a
AM
2982 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
2983 because such sections are not SEC_ALLOC and thus ld.so will
2984 not process them. */
8c694914 2985 if (unresolved_reloc
239e1f3a 2986 && !((input_section->flags & SEC_DEBUGGING) != 0
8c694914 2987 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
6a30718d
JJ
2988 {
2989 (*_bfd_error_handler)
2990 (_("%s(%s+0x%lx): unresolvable relocation against symbol `%s'"),
2991 bfd_archive_filename (input_bfd),
2992 bfd_get_section_name (input_bfd, input_section),
2993 (long) rel->r_offset,
2994 h->root.root.string);
b34976b6 2995 return FALSE;
6a30718d 2996 }
83be169b 2997
252b5132
RH
2998 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
2999 contents, rel->r_offset,
3000 relocation, (bfd_vma) 0);
3001
cf5c0c5b 3002 if (r != bfd_reloc_ok)
252b5132 3003 {
cf5c0c5b 3004 const char *name;
ffb2e45b 3005
cf5c0c5b
AM
3006 if (h != NULL)
3007 name = h->root.root.string;
3008 else
3009 {
3010 name = bfd_elf_string_from_elf_section (input_bfd,
3011 symtab_hdr->sh_link,
3012 sym->st_name);
3013 if (name == NULL)
b34976b6 3014 return FALSE;
cf5c0c5b
AM
3015 if (*name == '\0')
3016 name = bfd_section_name (input_bfd, sec);
3017 }
ffb2e45b 3018
cf5c0c5b
AM
3019 if (r == bfd_reloc_overflow)
3020 {
cf5c0c5b
AM
3021 if (! ((*info->callbacks->reloc_overflow)
3022 (info, name, howto->name, (bfd_vma) 0,
3023 input_bfd, input_section, rel->r_offset)))
b34976b6 3024 return FALSE;
cf5c0c5b
AM
3025 }
3026 else
3027 {
3028 (*_bfd_error_handler)
3029 (_("%s(%s+0x%lx): reloc against `%s': error %d"),
3030 bfd_archive_filename (input_bfd),
3031 bfd_get_section_name (input_bfd, input_section),
3032 (long) rel->r_offset, name, (int) r);
b34976b6 3033 return FALSE;
cf5c0c5b 3034 }
252b5132
RH
3035 }
3036 }
3037
b34976b6 3038 return TRUE;
252b5132
RH
3039}
3040
3041/* Finish up dynamic symbol handling. We set the contents of various
3042 dynamic sections here. */
3043
b34976b6 3044static bfd_boolean
252b5132
RH
3045elf_i386_finish_dynamic_symbol (output_bfd, info, h, sym)
3046 bfd *output_bfd;
3047 struct bfd_link_info *info;
3048 struct elf_link_hash_entry *h;
3049 Elf_Internal_Sym *sym;
3050{
6725bdbf 3051 struct elf_i386_link_hash_table *htab;
252b5132 3052
6725bdbf 3053 htab = elf_i386_hash_table (info);
252b5132
RH
3054
3055 if (h->plt.offset != (bfd_vma) -1)
3056 {
252b5132
RH
3057 bfd_vma plt_index;
3058 bfd_vma got_offset;
947216bf
AM
3059 Elf_Internal_Rela rel;
3060 bfd_byte *loc;
252b5132
RH
3061
3062 /* This symbol has an entry in the procedure linkage table. Set
3063 it up. */
3064
ffb2e45b
AM
3065 if (h->dynindx == -1
3066 || htab->splt == NULL
3067 || htab->sgotplt == NULL
3068 || htab->srelplt == NULL)
3069 abort ();
252b5132
RH
3070
3071 /* Get the index in the procedure linkage table which
3072 corresponds to this symbol. This is the index of this symbol
3073 in all the symbols for which we are making plt entries. The
3074 first entry in the procedure linkage table is reserved. */
3075 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
3076
3077 /* Get the offset into the .got table of the entry that
3078 corresponds to this function. Each .got entry is 4 bytes.
3079 The first three are reserved. */
3080 got_offset = (plt_index + 3) * 4;
3081
3082 /* Fill in the entry in the procedure linkage table. */
3083 if (! info->shared)
3084 {
6725bdbf 3085 memcpy (htab->splt->contents + h->plt.offset, elf_i386_plt_entry,
252b5132
RH
3086 PLT_ENTRY_SIZE);
3087 bfd_put_32 (output_bfd,
6725bdbf
AM
3088 (htab->sgotplt->output_section->vma
3089 + htab->sgotplt->output_offset
252b5132 3090 + got_offset),
6725bdbf 3091 htab->splt->contents + h->plt.offset + 2);
252b5132
RH
3092 }
3093 else
3094 {
6725bdbf 3095 memcpy (htab->splt->contents + h->plt.offset, elf_i386_pic_plt_entry,
252b5132
RH
3096 PLT_ENTRY_SIZE);
3097 bfd_put_32 (output_bfd, got_offset,
6725bdbf 3098 htab->splt->contents + h->plt.offset + 2);
252b5132
RH
3099 }
3100
3101 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rel),
6725bdbf 3102 htab->splt->contents + h->plt.offset + 7);
252b5132 3103 bfd_put_32 (output_bfd, - (h->plt.offset + PLT_ENTRY_SIZE),
6725bdbf 3104 htab->splt->contents + h->plt.offset + 12);
252b5132
RH
3105
3106 /* Fill in the entry in the global offset table. */
3107 bfd_put_32 (output_bfd,
6725bdbf
AM
3108 (htab->splt->output_section->vma
3109 + htab->splt->output_offset
252b5132
RH
3110 + h->plt.offset
3111 + 6),
6725bdbf 3112 htab->sgotplt->contents + got_offset);
252b5132
RH
3113
3114 /* Fill in the entry in the .rel.plt section. */
6725bdbf
AM
3115 rel.r_offset = (htab->sgotplt->output_section->vma
3116 + htab->sgotplt->output_offset
252b5132
RH
3117 + got_offset);
3118 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_JUMP_SLOT);
947216bf 3119 loc = htab->srelplt->contents + plt_index * sizeof (Elf32_External_Rel);
0ac8d2ca 3120 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
3121
3122 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
3123 {
3124 /* Mark the symbol as undefined, rather than as defined in
51b64d56
AM
3125 the .plt section. Leave the value alone. This is a clue
3126 for the dynamic linker, to make function pointer
3127 comparisons work between an application and shared
cedb70c5 3128 library. */
252b5132
RH
3129 sym->st_shndx = SHN_UNDEF;
3130 }
3131 }
3132
13ae64f3
JJ
3133 if (h->got.offset != (bfd_vma) -1
3134 && elf_i386_hash_entry(h)->tls_type != GOT_TLS_GD
37e55690 3135 && (elf_i386_hash_entry(h)->tls_type & GOT_TLS_IE) == 0)
252b5132 3136 {
947216bf
AM
3137 Elf_Internal_Rela rel;
3138 bfd_byte *loc;
252b5132
RH
3139
3140 /* This symbol has an entry in the global offset table. Set it
3141 up. */
3142
ffb2e45b
AM
3143 if (htab->sgot == NULL || htab->srelgot == NULL)
3144 abort ();
252b5132 3145
6725bdbf
AM
3146 rel.r_offset = (htab->sgot->output_section->vma
3147 + htab->sgot->output_offset
dc810e39 3148 + (h->got.offset & ~(bfd_vma) 1));
252b5132 3149
dd5724d5
AM
3150 /* If this is a static link, or it is a -Bsymbolic link and the
3151 symbol is defined locally or was forced to be local because
3152 of a version file, we just want to emit a RELATIVE reloc.
252b5132
RH
3153 The entry in the global offset table will already have been
3154 initialized in the relocate_section function. */
6725bdbf
AM
3155 if (info->shared
3156 && (info->symbolic
3157 || h->dynindx == -1
3158 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL))
3159 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
dd5724d5 3160 {
6725bdbf 3161 BFD_ASSERT((h->got.offset & 1) != 0);
dd5724d5
AM
3162 rel.r_info = ELF32_R_INFO (0, R_386_RELATIVE);
3163 }
252b5132
RH
3164 else
3165 {
dd5724d5 3166 BFD_ASSERT((h->got.offset & 1) == 0);
6725bdbf
AM
3167 bfd_put_32 (output_bfd, (bfd_vma) 0,
3168 htab->sgot->contents + h->got.offset);
252b5132
RH
3169 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_GLOB_DAT);
3170 }
3171
947216bf
AM
3172 loc = htab->srelgot->contents;
3173 loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rel);
0ac8d2ca 3174 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
3175 }
3176
791987af 3177 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
252b5132 3178 {
947216bf
AM
3179 Elf_Internal_Rela rel;
3180 bfd_byte *loc;
252b5132
RH
3181
3182 /* This symbol needs a copy reloc. Set it up. */
3183
ffb2e45b
AM
3184 if (h->dynindx == -1
3185 || (h->root.type != bfd_link_hash_defined
3186 && h->root.type != bfd_link_hash_defweak)
3187 || htab->srelbss == NULL)
3188 abort ();
252b5132
RH
3189
3190 rel.r_offset = (h->root.u.def.value
3191 + h->root.u.def.section->output_section->vma
3192 + h->root.u.def.section->output_offset);
3193 rel.r_info = ELF32_R_INFO (h->dynindx, R_386_COPY);
947216bf
AM
3194 loc = htab->srelbss->contents;
3195 loc += htab->srelbss->reloc_count++ * sizeof (Elf32_External_Rel);
0ac8d2ca 3196 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
3197 }
3198
3199 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3200 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
3201 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
3202 sym->st_shndx = SHN_ABS;
3203
b34976b6 3204 return TRUE;
252b5132
RH
3205}
3206
38701953
AM
3207/* Used to decide how to sort relocs in an optimal manner for the
3208 dynamic linker, before writing them out. */
3209
3210static enum elf_reloc_type_class
3211elf_i386_reloc_type_class (rela)
3212 const Elf_Internal_Rela *rela;
3213{
3214 switch ((int) ELF32_R_TYPE (rela->r_info))
3215 {
3216 case R_386_RELATIVE:
3217 return reloc_class_relative;
3218 case R_386_JUMP_SLOT:
3219 return reloc_class_plt;
3220 case R_386_COPY:
3221 return reloc_class_copy;
3222 default:
3223 return reloc_class_normal;
3224 }
3225}
3226
252b5132
RH
3227/* Finish up the dynamic sections. */
3228
b34976b6 3229static bfd_boolean
252b5132
RH
3230elf_i386_finish_dynamic_sections (output_bfd, info)
3231 bfd *output_bfd;
3232 struct bfd_link_info *info;
3233{
6725bdbf 3234 struct elf_i386_link_hash_table *htab;
252b5132 3235 bfd *dynobj;
252b5132
RH
3236 asection *sdyn;
3237
6725bdbf 3238 htab = elf_i386_hash_table (info);
ebe50bae 3239 dynobj = htab->elf.dynobj;
252b5132
RH
3240 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
3241
ebe50bae 3242 if (htab->elf.dynamic_sections_created)
252b5132 3243 {
252b5132
RH
3244 Elf32_External_Dyn *dyncon, *dynconend;
3245
ffb2e45b
AM
3246 if (sdyn == NULL || htab->sgot == NULL)
3247 abort ();
252b5132
RH
3248
3249 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3250 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
3251 for (; dyncon < dynconend; dyncon++)
3252 {
3253 Elf_Internal_Dyn dyn;
51b64d56 3254 asection *s;
252b5132
RH
3255
3256 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3257
3258 switch (dyn.d_tag)
3259 {
3260 default:
0ac8d2ca 3261 continue;
252b5132
RH
3262
3263 case DT_PLTGOT:
6725bdbf 3264 dyn.d_un.d_ptr = htab->sgot->output_section->vma;
6725bdbf
AM
3265 break;
3266
252b5132 3267 case DT_JMPREL:
6348e046
AM
3268 s = htab->srelplt;
3269 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
252b5132
RH
3270 break;
3271
3272 case DT_PLTRELSZ:
6348e046
AM
3273 s = htab->srelplt;
3274 dyn.d_un.d_val = s->_raw_size;
252b5132
RH
3275 break;
3276
3277 case DT_RELSZ:
3278 /* My reading of the SVR4 ABI indicates that the
3279 procedure linkage table relocs (DT_JMPREL) should be
3280 included in the overall relocs (DT_REL). This is
3281 what Solaris does. However, UnixWare can not handle
3282 that case. Therefore, we override the DT_RELSZ entry
6348e046
AM
3283 here to make it not include the JMPREL relocs. */
3284 s = htab->srelplt;
3285 if (s == NULL)
3286 continue;
3287 dyn.d_un.d_val -= s->_raw_size;
3288 break;
3289
3290 case DT_REL:
3291 /* We may not be using the standard ELF linker script.
3292 If .rel.plt is the first .rel section, we adjust
3293 DT_REL to not include it. */
3294 s = htab->srelplt;
3295 if (s == NULL)
3296 continue;
3297 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
3298 continue;
3299 dyn.d_un.d_ptr += s->_raw_size;
252b5132
RH
3300 break;
3301 }
0ac8d2ca
AM
3302
3303 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
252b5132
RH
3304 }
3305
3306 /* Fill in the first entry in the procedure linkage table. */
6725bdbf 3307 if (htab->splt && htab->splt->_raw_size > 0)
252b5132
RH
3308 {
3309 if (info->shared)
6725bdbf
AM
3310 memcpy (htab->splt->contents,
3311 elf_i386_pic_plt0_entry, PLT_ENTRY_SIZE);
252b5132
RH
3312 else
3313 {
6725bdbf
AM
3314 memcpy (htab->splt->contents,
3315 elf_i386_plt0_entry, PLT_ENTRY_SIZE);
252b5132 3316 bfd_put_32 (output_bfd,
6725bdbf
AM
3317 (htab->sgotplt->output_section->vma
3318 + htab->sgotplt->output_offset
3319 + 4),
3320 htab->splt->contents + 2);
252b5132 3321 bfd_put_32 (output_bfd,
6725bdbf
AM
3322 (htab->sgotplt->output_section->vma
3323 + htab->sgotplt->output_offset
3324 + 8),
3325 htab->splt->contents + 8);
252b5132
RH
3326 }
3327
3328 /* UnixWare sets the entsize of .plt to 4, although that doesn't
3329 really seem like the right value. */
6725bdbf
AM
3330 elf_section_data (htab->splt->output_section)
3331 ->this_hdr.sh_entsize = 4;
252b5132
RH
3332 }
3333 }
3334
12d0ee4a 3335 if (htab->sgotplt)
252b5132 3336 {
12d0ee4a
AM
3337 /* Fill in the first three entries in the global offset table. */
3338 if (htab->sgotplt->_raw_size > 0)
3339 {
3340 bfd_put_32 (output_bfd,
3341 (sdyn == NULL ? (bfd_vma) 0
3342 : sdyn->output_section->vma + sdyn->output_offset),
3343 htab->sgotplt->contents);
3344 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->sgotplt->contents + 4);
3345 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->sgotplt->contents + 8);
3346 }
252b5132 3347
12d0ee4a
AM
3348 elf_section_data (htab->sgotplt->output_section)->this_hdr.sh_entsize = 4;
3349 }
b34976b6 3350 return TRUE;
252b5132
RH
3351}
3352
3353#define TARGET_LITTLE_SYM bfd_elf32_i386_vec
3354#define TARGET_LITTLE_NAME "elf32-i386"
3355#define ELF_ARCH bfd_arch_i386
3356#define ELF_MACHINE_CODE EM_386
3357#define ELF_MAXPAGESIZE 0x1000
252b5132
RH
3358
3359#define elf_backend_can_gc_sections 1
51b64d56 3360#define elf_backend_can_refcount 1
252b5132
RH
3361#define elf_backend_want_got_plt 1
3362#define elf_backend_plt_readonly 1
3363#define elf_backend_want_plt_sym 0
3364#define elf_backend_got_header_size 12
3365#define elf_backend_plt_header_size PLT_ENTRY_SIZE
3366
dd5724d5
AM
3367#define elf_info_to_howto elf_i386_info_to_howto
3368#define elf_info_to_howto_rel elf_i386_info_to_howto_rel
3369
13ae64f3
JJ
3370#define bfd_elf32_mkobject elf_i386_mkobject
3371#define elf_backend_object_p elf_i386_object_p
3372
dd5724d5
AM
3373#define bfd_elf32_bfd_is_local_label_name elf_i386_is_local_label_name
3374#define bfd_elf32_bfd_link_hash_table_create elf_i386_link_hash_table_create
3375#define bfd_elf32_bfd_reloc_type_lookup elf_i386_reloc_type_lookup
3376
3377#define elf_backend_adjust_dynamic_symbol elf_i386_adjust_dynamic_symbol
3378#define elf_backend_check_relocs elf_i386_check_relocs
0ac8d2ca 3379#define elf_backend_copy_indirect_symbol elf_i386_copy_indirect_symbol
6725bdbf 3380#define elf_backend_create_dynamic_sections elf_i386_create_dynamic_sections
0ac8d2ca 3381#define elf_backend_fake_sections elf_i386_fake_sections
dd5724d5
AM
3382#define elf_backend_finish_dynamic_sections elf_i386_finish_dynamic_sections
3383#define elf_backend_finish_dynamic_symbol elf_i386_finish_dynamic_symbol
3384#define elf_backend_gc_mark_hook elf_i386_gc_mark_hook
3385#define elf_backend_gc_sweep_hook elf_i386_gc_sweep_hook
c5fccbec
DJ
3386#define elf_backend_grok_prstatus elf_i386_grok_prstatus
3387#define elf_backend_grok_psinfo elf_i386_grok_psinfo
db6751f2 3388#define elf_backend_reloc_type_class elf_i386_reloc_type_class
0ac8d2ca
AM
3389#define elf_backend_relocate_section elf_i386_relocate_section
3390#define elf_backend_size_dynamic_sections elf_i386_size_dynamic_sections
dd5724d5 3391
252b5132 3392#include "elf32-target.h"
2bc3c89a
AM
3393
3394/* FreeBSD support. */
3395
3396#undef TARGET_LITTLE_SYM
3397#define TARGET_LITTLE_SYM bfd_elf32_i386_freebsd_vec
3398#undef TARGET_LITTLE_NAME
3399#define TARGET_LITTLE_NAME "elf32-i386-freebsd"
3400
3401/* The kernel recognizes executables as valid only if they carry a
3402 "FreeBSD" label in the ELF header. So we put this label on all
3403 executables and (for simplicity) also all other object files. */
3404
3405static void elf_i386_post_process_headers
3406 PARAMS ((bfd *, struct bfd_link_info *));
3407
3408static void
3409elf_i386_post_process_headers (abfd, link_info)
3410 bfd *abfd;
3411 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
3412{
3413 Elf_Internal_Ehdr *i_ehdrp;
3414
3415 i_ehdrp = elf_elfheader (abfd);
3416
3417 /* Put an ABI label supported by FreeBSD >= 4.1. */
3418 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_FREEBSD;
3419#ifdef OLD_FREEBSD_ABI_LABEL
3420 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
3421 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
caf47ea6 3422#endif
2bc3c89a
AM
3423}
3424
3425#undef elf_backend_post_process_headers
3426#define elf_backend_post_process_headers elf_i386_post_process_headers
3427
3428#define elf32_bed elf32_i386_fbsd_bed
3429
3430#include "elf32-target.h"
3431
3432#undef elf_backend_post_process_headers
3433#undef elf32_bed
This page took 0.361112 seconds and 4 git commands to generate.