x86: Add VERIFY_PLT_ENTRY
[deliverable/binutils-gdb.git] / bfd / elf64-x86-64.c
CommitLineData
351f65ca 1/* X86-64 specific support for ELF
2571583a 2 Copyright (C) 2000-2017 Free Software Foundation, Inc.
8d88c4ca
NC
3 Contributed by Jan Hubicka <jh@suse.cz>.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
8d88c4ca 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
8d88c4ca 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
8d88c4ca 16
ae9a127f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
8d88c4ca 21
0afcef53 22#include "elfxx-x86.h"
5a68afcf 23#include "elf-nacl.h"
e41b3a13 24#include "dwarf2.h"
d7921315 25#include "libiberty.h"
8d88c4ca 26
56ceb5b5 27#include "opcode/i386.h"
8d88c4ca
NC
28#include "elf/x86-64.h"
29
8fd79e71
L
30#ifdef CORE_HEADER
31#include <stdarg.h>
32#include CORE_HEADER
33#endif
34
8d88c4ca
NC
35/* In case we're on a 32-bit machine, construct a 64-bit "-1" value. */
36#define MINUS_ONE (~ (bfd_vma) 0)
37
351f65ca
L
38/* Since both 32-bit and 64-bit x86-64 encode relocation type in the
39 identical manner, we use ELF32_R_TYPE instead of ELF64_R_TYPE to get
40 relocation type. We also use ELF_ST_TYPE instead of ELF64_ST_TYPE
41 since they are the same. */
42
8d88c4ca 43/* The relocation "howto" table. Order of fields:
7b81dfbb
AJ
44 type, rightshift, size, bitsize, pc_relative, bitpos, complain_on_overflow,
45 special_function, name, partial_inplace, src_mask, dst_mask, pcrel_offset. */
70256ad8
AJ
46static reloc_howto_type x86_64_elf_howto_table[] =
47{
6346d5ca 48 HOWTO(R_X86_64_NONE, 0, 3, 0, FALSE, 0, complain_overflow_dont,
b34976b6
AM
49 bfd_elf_generic_reloc, "R_X86_64_NONE", FALSE, 0x00000000, 0x00000000,
50 FALSE),
51 HOWTO(R_X86_64_64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
52 bfd_elf_generic_reloc, "R_X86_64_64", FALSE, MINUS_ONE, MINUS_ONE,
53 FALSE),
54 HOWTO(R_X86_64_PC32, 0, 2, 32, TRUE, 0, complain_overflow_signed,
55 bfd_elf_generic_reloc, "R_X86_64_PC32", FALSE, 0xffffffff, 0xffffffff,
56 TRUE),
57 HOWTO(R_X86_64_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_signed,
58 bfd_elf_generic_reloc, "R_X86_64_GOT32", FALSE, 0xffffffff, 0xffffffff,
59 FALSE),
60 HOWTO(R_X86_64_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_signed,
61 bfd_elf_generic_reloc, "R_X86_64_PLT32", FALSE, 0xffffffff, 0xffffffff,
62 TRUE),
63 HOWTO(R_X86_64_COPY, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
64 bfd_elf_generic_reloc, "R_X86_64_COPY", FALSE, 0xffffffff, 0xffffffff,
65 FALSE),
66 HOWTO(R_X86_64_GLOB_DAT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
67 bfd_elf_generic_reloc, "R_X86_64_GLOB_DAT", FALSE, MINUS_ONE,
68 MINUS_ONE, FALSE),
69 HOWTO(R_X86_64_JUMP_SLOT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
70 bfd_elf_generic_reloc, "R_X86_64_JUMP_SLOT", FALSE, MINUS_ONE,
71 MINUS_ONE, FALSE),
72 HOWTO(R_X86_64_RELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
73 bfd_elf_generic_reloc, "R_X86_64_RELATIVE", FALSE, MINUS_ONE,
74 MINUS_ONE, FALSE),
75 HOWTO(R_X86_64_GOTPCREL, 0, 2, 32, TRUE, 0, complain_overflow_signed,
76 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL", FALSE, 0xffffffff,
77 0xffffffff, TRUE),
78 HOWTO(R_X86_64_32, 0, 2, 32, FALSE, 0, complain_overflow_unsigned,
79 bfd_elf_generic_reloc, "R_X86_64_32", FALSE, 0xffffffff, 0xffffffff,
80 FALSE),
81 HOWTO(R_X86_64_32S, 0, 2, 32, FALSE, 0, complain_overflow_signed,
82 bfd_elf_generic_reloc, "R_X86_64_32S", FALSE, 0xffffffff, 0xffffffff,
83 FALSE),
84 HOWTO(R_X86_64_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_X86_64_16", FALSE, 0xffff, 0xffff, FALSE),
b0360d8c 86 HOWTO(R_X86_64_PC16,0, 1, 16, TRUE, 0, complain_overflow_bitfield,
b34976b6 87 bfd_elf_generic_reloc, "R_X86_64_PC16", FALSE, 0xffff, 0xffff, TRUE),
ac2aa337 88 HOWTO(R_X86_64_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
b34976b6
AM
89 bfd_elf_generic_reloc, "R_X86_64_8", FALSE, 0xff, 0xff, FALSE),
90 HOWTO(R_X86_64_PC8, 0, 0, 8, TRUE, 0, complain_overflow_signed,
91 bfd_elf_generic_reloc, "R_X86_64_PC8", FALSE, 0xff, 0xff, TRUE),
92 HOWTO(R_X86_64_DTPMOD64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
93 bfd_elf_generic_reloc, "R_X86_64_DTPMOD64", FALSE, MINUS_ONE,
94 MINUS_ONE, FALSE),
95 HOWTO(R_X86_64_DTPOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
96 bfd_elf_generic_reloc, "R_X86_64_DTPOFF64", FALSE, MINUS_ONE,
97 MINUS_ONE, FALSE),
98 HOWTO(R_X86_64_TPOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
99 bfd_elf_generic_reloc, "R_X86_64_TPOFF64", FALSE, MINUS_ONE,
100 MINUS_ONE, FALSE),
101 HOWTO(R_X86_64_TLSGD, 0, 2, 32, TRUE, 0, complain_overflow_signed,
102 bfd_elf_generic_reloc, "R_X86_64_TLSGD", FALSE, 0xffffffff,
103 0xffffffff, TRUE),
104 HOWTO(R_X86_64_TLSLD, 0, 2, 32, TRUE, 0, complain_overflow_signed,
105 bfd_elf_generic_reloc, "R_X86_64_TLSLD", FALSE, 0xffffffff,
106 0xffffffff, TRUE),
ac2aa337 107 HOWTO(R_X86_64_DTPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_signed,
b34976b6
AM
108 bfd_elf_generic_reloc, "R_X86_64_DTPOFF32", FALSE, 0xffffffff,
109 0xffffffff, FALSE),
110 HOWTO(R_X86_64_GOTTPOFF, 0, 2, 32, TRUE, 0, complain_overflow_signed,
111 bfd_elf_generic_reloc, "R_X86_64_GOTTPOFF", FALSE, 0xffffffff,
112 0xffffffff, TRUE),
113 HOWTO(R_X86_64_TPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_signed,
114 bfd_elf_generic_reloc, "R_X86_64_TPOFF32", FALSE, 0xffffffff,
115 0xffffffff, FALSE),
d6ab8113
JB
116 HOWTO(R_X86_64_PC64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
117 bfd_elf_generic_reloc, "R_X86_64_PC64", FALSE, MINUS_ONE, MINUS_ONE,
118 TRUE),
119 HOWTO(R_X86_64_GOTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
120 bfd_elf_generic_reloc, "R_X86_64_GOTOFF64",
121 FALSE, MINUS_ONE, MINUS_ONE, FALSE),
122 HOWTO(R_X86_64_GOTPC32, 0, 2, 32, TRUE, 0, complain_overflow_signed,
123 bfd_elf_generic_reloc, "R_X86_64_GOTPC32",
124 FALSE, 0xffffffff, 0xffffffff, TRUE),
7b81dfbb
AJ
125 HOWTO(R_X86_64_GOT64, 0, 4, 64, FALSE, 0, complain_overflow_signed,
126 bfd_elf_generic_reloc, "R_X86_64_GOT64", FALSE, MINUS_ONE, MINUS_ONE,
127 FALSE),
128 HOWTO(R_X86_64_GOTPCREL64, 0, 4, 64, TRUE, 0, complain_overflow_signed,
129 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL64", FALSE, MINUS_ONE,
130 MINUS_ONE, TRUE),
131 HOWTO(R_X86_64_GOTPC64, 0, 4, 64, TRUE, 0, complain_overflow_signed,
132 bfd_elf_generic_reloc, "R_X86_64_GOTPC64",
133 FALSE, MINUS_ONE, MINUS_ONE, TRUE),
134 HOWTO(R_X86_64_GOTPLT64, 0, 4, 64, FALSE, 0, complain_overflow_signed,
135 bfd_elf_generic_reloc, "R_X86_64_GOTPLT64", FALSE, MINUS_ONE,
136 MINUS_ONE, FALSE),
137 HOWTO(R_X86_64_PLTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_signed,
138 bfd_elf_generic_reloc, "R_X86_64_PLTOFF64", FALSE, MINUS_ONE,
139 MINUS_ONE, FALSE),
1788fc08
L
140 HOWTO(R_X86_64_SIZE32, 0, 2, 32, FALSE, 0, complain_overflow_unsigned,
141 bfd_elf_generic_reloc, "R_X86_64_SIZE32", FALSE, 0xffffffff, 0xffffffff,
142 FALSE),
143 HOWTO(R_X86_64_SIZE64, 0, 4, 64, FALSE, 0, complain_overflow_unsigned,
144 bfd_elf_generic_reloc, "R_X86_64_SIZE64", FALSE, MINUS_ONE, MINUS_ONE,
145 FALSE),
67a4f2b7
AO
146 HOWTO(R_X86_64_GOTPC32_TLSDESC, 0, 2, 32, TRUE, 0,
147 complain_overflow_bitfield, bfd_elf_generic_reloc,
148 "R_X86_64_GOTPC32_TLSDESC",
149 FALSE, 0xffffffff, 0xffffffff, TRUE),
150 HOWTO(R_X86_64_TLSDESC_CALL, 0, 0, 0, FALSE, 0,
151 complain_overflow_dont, bfd_elf_generic_reloc,
152 "R_X86_64_TLSDESC_CALL",
153 FALSE, 0, 0, FALSE),
154 HOWTO(R_X86_64_TLSDESC, 0, 4, 64, FALSE, 0,
155 complain_overflow_bitfield, bfd_elf_generic_reloc,
156 "R_X86_64_TLSDESC",
157 FALSE, MINUS_ONE, MINUS_ONE, FALSE),
cbe950e9
L
158 HOWTO(R_X86_64_IRELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
159 bfd_elf_generic_reloc, "R_X86_64_IRELATIVE", FALSE, MINUS_ONE,
160 MINUS_ONE, FALSE),
64d25c44
L
161 HOWTO(R_X86_64_RELATIVE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
162 bfd_elf_generic_reloc, "R_X86_64_RELATIVE64", FALSE, MINUS_ONE,
163 MINUS_ONE, FALSE),
c3320543
L
164 HOWTO(R_X86_64_PC32_BND, 0, 2, 32, TRUE, 0, complain_overflow_signed,
165 bfd_elf_generic_reloc, "R_X86_64_PC32_BND", FALSE, 0xffffffff, 0xffffffff,
166 TRUE),
167 HOWTO(R_X86_64_PLT32_BND, 0, 2, 32, TRUE, 0, complain_overflow_signed,
168 bfd_elf_generic_reloc, "R_X86_64_PLT32_BND", FALSE, 0xffffffff, 0xffffffff,
169 TRUE),
56ceb5b5
L
170 HOWTO(R_X86_64_GOTPCRELX, 0, 2, 32, TRUE, 0, complain_overflow_signed,
171 bfd_elf_generic_reloc, "R_X86_64_GOTPCRELX", FALSE, 0xffffffff,
172 0xffffffff, TRUE),
173 HOWTO(R_X86_64_REX_GOTPCRELX, 0, 2, 32, TRUE, 0, complain_overflow_signed,
174 bfd_elf_generic_reloc, "R_X86_64_REX_GOTPCRELX", FALSE, 0xffffffff,
175 0xffffffff, TRUE),
fe4770f4 176
a33d77bc
JB
177 /* We have a gap in the reloc numbers here.
178 R_X86_64_standard counts the number up to this point, and
179 R_X86_64_vt_offset is the value to subtract from a reloc type of
180 R_X86_64_GNU_VT* to form an index into this table. */
56ceb5b5 181#define R_X86_64_standard (R_X86_64_REX_GOTPCRELX + 1)
a33d77bc
JB
182#define R_X86_64_vt_offset (R_X86_64_GNU_VTINHERIT - R_X86_64_standard)
183
fe4770f4 184/* GNU extension to record C++ vtable hierarchy. */
b34976b6
AM
185 HOWTO (R_X86_64_GNU_VTINHERIT, 0, 4, 0, FALSE, 0, complain_overflow_dont,
186 NULL, "R_X86_64_GNU_VTINHERIT", FALSE, 0, 0, FALSE),
fe4770f4
AJ
187
188/* GNU extension to record C++ vtable member usage. */
b34976b6
AM
189 HOWTO (R_X86_64_GNU_VTENTRY, 0, 4, 0, FALSE, 0, complain_overflow_dont,
190 _bfd_elf_rel_vtable_reloc_fn, "R_X86_64_GNU_VTENTRY", FALSE, 0, 0,
d7921315
L
191 FALSE),
192
193/* Use complain_overflow_bitfield on R_X86_64_32 for x32. */
194 HOWTO(R_X86_64_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
195 bfd_elf_generic_reloc, "R_X86_64_32", FALSE, 0xffffffff, 0xffffffff,
196 FALSE)
8d88c4ca
NC
197};
198
78984959
L
199/* Set if a relocation is converted from a GOTPCREL relocation. */
200#define R_X86_64_converted_reloc_bit (1 << 7)
201
daf1c414 202#define X86_PCREL_TYPE_P(TYPE) \
d8045f23
NC
203 ( ((TYPE) == R_X86_64_PC8) \
204 || ((TYPE) == R_X86_64_PC16) \
205 || ((TYPE) == R_X86_64_PC32) \
c3320543 206 || ((TYPE) == R_X86_64_PC32_BND) \
d8045f23
NC
207 || ((TYPE) == R_X86_64_PC64))
208
aebcc8ff
L
209#define X86_SIZE_TYPE_P(TYPE) \
210 ((TYPE) == R_X86_64_SIZE32 || (TYPE) == R_X86_64_SIZE64)
211
8d88c4ca 212/* Map BFD relocs to the x86_64 elf relocs. */
70256ad8
AJ
213struct elf_reloc_map
214{
8d88c4ca
NC
215 bfd_reloc_code_real_type bfd_reloc_val;
216 unsigned char elf_reloc_val;
217};
218
dc810e39 219static const struct elf_reloc_map x86_64_reloc_map[] =
8d88c4ca 220{
70256ad8
AJ
221 { BFD_RELOC_NONE, R_X86_64_NONE, },
222 { BFD_RELOC_64, R_X86_64_64, },
223 { BFD_RELOC_32_PCREL, R_X86_64_PC32, },
224 { BFD_RELOC_X86_64_GOT32, R_X86_64_GOT32,},
225 { BFD_RELOC_X86_64_PLT32, R_X86_64_PLT32,},
226 { BFD_RELOC_X86_64_COPY, R_X86_64_COPY, },
227 { BFD_RELOC_X86_64_GLOB_DAT, R_X86_64_GLOB_DAT, },
228 { BFD_RELOC_X86_64_JUMP_SLOT, R_X86_64_JUMP_SLOT, },
229 { BFD_RELOC_X86_64_RELATIVE, R_X86_64_RELATIVE, },
230 { BFD_RELOC_X86_64_GOTPCREL, R_X86_64_GOTPCREL, },
231 { BFD_RELOC_32, R_X86_64_32, },
232 { BFD_RELOC_X86_64_32S, R_X86_64_32S, },
233 { BFD_RELOC_16, R_X86_64_16, },
234 { BFD_RELOC_16_PCREL, R_X86_64_PC16, },
235 { BFD_RELOC_8, R_X86_64_8, },
236 { BFD_RELOC_8_PCREL, R_X86_64_PC8, },
bffbf940
JJ
237 { BFD_RELOC_X86_64_DTPMOD64, R_X86_64_DTPMOD64, },
238 { BFD_RELOC_X86_64_DTPOFF64, R_X86_64_DTPOFF64, },
239 { BFD_RELOC_X86_64_TPOFF64, R_X86_64_TPOFF64, },
240 { BFD_RELOC_X86_64_TLSGD, R_X86_64_TLSGD, },
241 { BFD_RELOC_X86_64_TLSLD, R_X86_64_TLSLD, },
242 { BFD_RELOC_X86_64_DTPOFF32, R_X86_64_DTPOFF32, },
243 { BFD_RELOC_X86_64_GOTTPOFF, R_X86_64_GOTTPOFF, },
244 { BFD_RELOC_X86_64_TPOFF32, R_X86_64_TPOFF32, },
d6ab8113
JB
245 { BFD_RELOC_64_PCREL, R_X86_64_PC64, },
246 { BFD_RELOC_X86_64_GOTOFF64, R_X86_64_GOTOFF64, },
247 { BFD_RELOC_X86_64_GOTPC32, R_X86_64_GOTPC32, },
7b81dfbb
AJ
248 { BFD_RELOC_X86_64_GOT64, R_X86_64_GOT64, },
249 { BFD_RELOC_X86_64_GOTPCREL64,R_X86_64_GOTPCREL64, },
250 { BFD_RELOC_X86_64_GOTPC64, R_X86_64_GOTPC64, },
251 { BFD_RELOC_X86_64_GOTPLT64, R_X86_64_GOTPLT64, },
252 { BFD_RELOC_X86_64_PLTOFF64, R_X86_64_PLTOFF64, },
1788fc08
L
253 { BFD_RELOC_SIZE32, R_X86_64_SIZE32, },
254 { BFD_RELOC_SIZE64, R_X86_64_SIZE64, },
67a4f2b7
AO
255 { BFD_RELOC_X86_64_GOTPC32_TLSDESC, R_X86_64_GOTPC32_TLSDESC, },
256 { BFD_RELOC_X86_64_TLSDESC_CALL, R_X86_64_TLSDESC_CALL, },
257 { BFD_RELOC_X86_64_TLSDESC, R_X86_64_TLSDESC, },
cbe950e9 258 { BFD_RELOC_X86_64_IRELATIVE, R_X86_64_IRELATIVE, },
56ceb5b5
L
259 { BFD_RELOC_X86_64_PC32_BND, R_X86_64_PC32_BND, },
260 { BFD_RELOC_X86_64_PLT32_BND, R_X86_64_PLT32_BND, },
261 { BFD_RELOC_X86_64_GOTPCRELX, R_X86_64_GOTPCRELX, },
262 { BFD_RELOC_X86_64_REX_GOTPCRELX, R_X86_64_REX_GOTPCRELX, },
fe4770f4
AJ
263 { BFD_RELOC_VTABLE_INHERIT, R_X86_64_GNU_VTINHERIT, },
264 { BFD_RELOC_VTABLE_ENTRY, R_X86_64_GNU_VTENTRY, },
8d88c4ca
NC
265};
266
67a4f2b7 267static reloc_howto_type *
351f65ca 268elf_x86_64_rtype_to_howto (bfd *abfd, unsigned r_type)
67a4f2b7
AO
269{
270 unsigned i;
271
d7921315
L
272 if (r_type == (unsigned int) R_X86_64_32)
273 {
274 if (ABI_64_P (abfd))
275 i = r_type;
276 else
277 i = ARRAY_SIZE (x86_64_elf_howto_table) - 1;
278 }
279 else if (r_type < (unsigned int) R_X86_64_GNU_VTINHERIT
280 || r_type >= (unsigned int) R_X86_64_max)
67a4f2b7
AO
281 {
282 if (r_type >= (unsigned int) R_X86_64_standard)
283 {
695344c0 284 /* xgettext:c-format */
4eca0228
AM
285 _bfd_error_handler (_("%B: invalid relocation type %d"),
286 abfd, (int) r_type);
67a4f2b7
AO
287 r_type = R_X86_64_NONE;
288 }
289 i = r_type;
290 }
291 else
292 i = r_type - (unsigned int) R_X86_64_vt_offset;
293 BFD_ASSERT (x86_64_elf_howto_table[i].type == r_type);
294 return &x86_64_elf_howto_table[i];
295}
8d88c4ca
NC
296
297/* Given a BFD reloc type, return a HOWTO structure. */
298static reloc_howto_type *
351f65ca
L
299elf_x86_64_reloc_type_lookup (bfd *abfd,
300 bfd_reloc_code_real_type code)
8d88c4ca
NC
301{
302 unsigned int i;
27482721 303
8d88c4ca
NC
304 for (i = 0; i < sizeof (x86_64_reloc_map) / sizeof (struct elf_reloc_map);
305 i++)
306 {
307 if (x86_64_reloc_map[i].bfd_reloc_val == code)
351f65ca
L
308 return elf_x86_64_rtype_to_howto (abfd,
309 x86_64_reloc_map[i].elf_reloc_val);
8d88c4ca 310 }
5860e3f8 311 return NULL;
8d88c4ca
NC
312}
313
157090f7 314static reloc_howto_type *
d7921315 315elf_x86_64_reloc_name_lookup (bfd *abfd,
351f65ca 316 const char *r_name)
157090f7
AM
317{
318 unsigned int i;
319
d7921315
L
320 if (!ABI_64_P (abfd) && strcasecmp (r_name, "R_X86_64_32") == 0)
321 {
322 /* Get x32 R_X86_64_32. */
323 reloc_howto_type *reloc
324 = &x86_64_elf_howto_table[ARRAY_SIZE (x86_64_elf_howto_table) - 1];
325 BFD_ASSERT (reloc->type == (unsigned int) R_X86_64_32);
326 return reloc;
327 }
328
329 for (i = 0; i < ARRAY_SIZE (x86_64_elf_howto_table); i++)
157090f7
AM
330 if (x86_64_elf_howto_table[i].name != NULL
331 && strcasecmp (x86_64_elf_howto_table[i].name, r_name) == 0)
332 return &x86_64_elf_howto_table[i];
333
334 return NULL;
335}
336
8d88c4ca 337/* Given an x86_64 ELF reloc type, fill in an arelent structure. */
8da6118f 338
8d88c4ca 339static void
351f65ca
L
340elf_x86_64_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
341 Elf_Internal_Rela *dst)
8d88c4ca 342{
67a4f2b7 343 unsigned r_type;
8d88c4ca 344
351f65ca 345 r_type = ELF32_R_TYPE (dst->r_info);
78984959
L
346 if (r_type != (unsigned int) R_X86_64_GNU_VTINHERIT
347 && r_type != (unsigned int) R_X86_64_GNU_VTENTRY)
348 r_type &= ~R_X86_64_converted_reloc_bit;
351f65ca 349 cache_ptr->howto = elf_x86_64_rtype_to_howto (abfd, r_type);
262c0a87
NC
350
351 BFD_ASSERT (r_type == cache_ptr->howto->type || cache_ptr->howto->type == R_X86_64_NONE);
8d88c4ca 352}
70256ad8 353\f
3bab7989 354/* Support for core dump NOTE sections. */
b34976b6 355static bfd_boolean
351f65ca 356elf_x86_64_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3bab7989
ML
357{
358 int offset;
eea6121a 359 size_t size;
3bab7989
ML
360
361 switch (note->descsz)
362 {
363 default:
b34976b6 364 return FALSE;
3bab7989 365
bcd823f1
L
366 case 296: /* sizeof(istruct elf_prstatus) on Linux/x32 */
367 /* pr_cursig */
228e534f 368 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
bcd823f1
L
369
370 /* pr_pid */
228e534f 371 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
bcd823f1
L
372
373 /* pr_reg */
374 offset = 72;
375 size = 216;
376
377 break;
378
3bab7989
ML
379 case 336: /* sizeof(istruct elf_prstatus) on Linux/x86_64 */
380 /* pr_cursig */
228e534f 381 elf_tdata (abfd)->core->signal
3bab7989
ML
382 = bfd_get_16 (abfd, note->descdata + 12);
383
384 /* pr_pid */
228e534f 385 elf_tdata (abfd)->core->lwpid
3bab7989
ML
386 = bfd_get_32 (abfd, note->descdata + 32);
387
388 /* pr_reg */
389 offset = 112;
eea6121a 390 size = 216;
3bab7989
ML
391
392 break;
393 }
394
395 /* Make a ".reg/999" section. */
396 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 397 size, note->descpos + offset);
3bab7989
ML
398}
399
b34976b6 400static bfd_boolean
351f65ca 401elf_x86_64_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3bab7989
ML
402{
403 switch (note->descsz)
404 {
405 default:
b34976b6 406 return FALSE;
3bab7989 407
bcd823f1 408 case 124: /* sizeof(struct elf_prpsinfo) on Linux/x32 */
228e534f 409 elf_tdata (abfd)->core->pid
bcd823f1 410 = bfd_get_32 (abfd, note->descdata + 12);
228e534f 411 elf_tdata (abfd)->core->program
bcd823f1 412 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
228e534f 413 elf_tdata (abfd)->core->command
bcd823f1
L
414 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
415 break;
416
3bab7989 417 case 136: /* sizeof(struct elf_prpsinfo) on Linux/x86_64 */
228e534f 418 elf_tdata (abfd)->core->pid
261b8d08 419 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 420 elf_tdata (abfd)->core->program
3bab7989 421 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 422 elf_tdata (abfd)->core->command
3bab7989
ML
423 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
424 }
425
426 /* Note that for some reason, a spurious space is tacked
427 onto the end of the args in some (at least one anyway)
428 implementations, so strip it off if it exists. */
429
430 {
228e534f 431 char *command = elf_tdata (abfd)->core->command;
3bab7989
ML
432 int n = strlen (command);
433
434 if (0 < n && command[n - 1] == ' ')
435 command[n - 1] = '\0';
436 }
437
b34976b6 438 return TRUE;
3bab7989 439}
8fd79e71
L
440
441#ifdef CORE_HEADER
442static char *
443elf_x86_64_write_core_note (bfd *abfd, char *buf, int *bufsiz,
444 int note_type, ...)
445{
446 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8fd79e71
L
447 va_list ap;
448 const char *fname, *psargs;
449 long pid;
450 int cursig;
451 const void *gregs;
452
453 switch (note_type)
454 {
455 default:
456 return NULL;
457
458 case NT_PRPSINFO:
459 va_start (ap, note_type);
460 fname = va_arg (ap, const char *);
461 psargs = va_arg (ap, const char *);
462 va_end (ap);
463
464 if (bed->s->elfclass == ELFCLASS32)
465 {
466 prpsinfo32_t data;
467 memset (&data, 0, sizeof (data));
468 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
469 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
e85c6a70
JK
470 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
471 &data, sizeof (data));
8fd79e71
L
472 }
473 else
474 {
b1bd052d 475 prpsinfo64_t data;
8fd79e71
L
476 memset (&data, 0, sizeof (data));
477 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
478 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
e85c6a70
JK
479 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
480 &data, sizeof (data));
8fd79e71 481 }
e85c6a70 482 /* NOTREACHED */
8fd79e71
L
483
484 case NT_PRSTATUS:
485 va_start (ap, note_type);
486 pid = va_arg (ap, long);
487 cursig = va_arg (ap, int);
488 gregs = va_arg (ap, const void *);
489 va_end (ap);
490
491 if (bed->s->elfclass == ELFCLASS32)
492 {
493 if (bed->elf_machine_code == EM_X86_64)
494 {
495 prstatusx32_t prstat;
496 memset (&prstat, 0, sizeof (prstat));
497 prstat.pr_pid = pid;
498 prstat.pr_cursig = cursig;
499 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
e85c6a70
JK
500 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
501 &prstat, sizeof (prstat));
8fd79e71
L
502 }
503 else
504 {
505 prstatus32_t prstat;
506 memset (&prstat, 0, sizeof (prstat));
507 prstat.pr_pid = pid;
508 prstat.pr_cursig = cursig;
509 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
e85c6a70
JK
510 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
511 &prstat, sizeof (prstat));
8fd79e71
L
512 }
513 }
514 else
515 {
b1bd052d 516 prstatus64_t prstat;
8fd79e71
L
517 memset (&prstat, 0, sizeof (prstat));
518 prstat.pr_pid = pid;
519 prstat.pr_cursig = cursig;
520 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
e85c6a70
JK
521 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
522 &prstat, sizeof (prstat));
8fd79e71 523 }
8fd79e71 524 }
e85c6a70 525 /* NOTREACHED */
8fd79e71
L
526}
527#endif
3bab7989 528\f
407443a3 529/* Functions for the x86-64 ELF linker. */
70256ad8 530
70256ad8
AJ
531/* The size in bytes of an entry in the global offset table. */
532
533#define GOT_ENTRY_SIZE 8
8d88c4ca 534
38b12349 535/* The size in bytes of an entry in the lazy procedure linkage table. */
8d88c4ca 536
38b12349 537#define LAZY_PLT_ENTRY_SIZE 16
70256ad8 538
38b12349
L
539/* The size in bytes of an entry in the non-lazy procedure linkage
540 table. */
70256ad8 541
38b12349
L
542#define NON_LAZY_PLT_ENTRY_SIZE 8
543
544/* The first entry in a lazy procedure linkage table looks like this.
545 See the SVR4 ABI i386 supplement and the x86-64 ABI to see how this
546 works. */
547
548static const bfd_byte elf_x86_64_lazy_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
70256ad8 549{
653165cc
AJ
550 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
551 0xff, 0x25, 16, 0, 0, 0, /* jmpq *GOT+16(%rip) */
10efb593 552 0x0f, 0x1f, 0x40, 0x00 /* nopl 0(%rax) */
70256ad8
AJ
553};
554
38b12349 555/* Subsequent entries in a lazy procedure linkage table look like this. */
70256ad8 556
38b12349 557static const bfd_byte elf_x86_64_lazy_plt_entry[LAZY_PLT_ENTRY_SIZE] =
70256ad8 558{
653165cc 559 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
407443a3 560 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
653165cc 561 0x68, /* pushq immediate */
70256ad8
AJ
562 0, 0, 0, 0, /* replaced with index into relocation table. */
563 0xe9, /* jmp relative */
564 0, 0, 0, 0 /* replaced with offset to start of .plt0. */
565};
566
38b12349 567/* The first entry in a lazy procedure linkage table with BND prefix
0ff2b86e
L
568 like this. */
569
38b12349 570static const bfd_byte elf_x86_64_lazy_bnd_plt0_entry[LAZY_PLT_ENTRY_SIZE] =
0ff2b86e
L
571{
572 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
573 0xf2, 0xff, 0x25, 16, 0, 0, 0, /* bnd jmpq *GOT+16(%rip) */
574 0x0f, 0x1f, 0 /* nopl (%rax) */
575};
576
38b12349
L
577/* Subsequent entries for branches with BND prefx in a lazy procedure
578 linkage table look like this. */
0ff2b86e 579
38b12349 580static const bfd_byte elf_x86_64_lazy_bnd_plt_entry[LAZY_PLT_ENTRY_SIZE] =
0ff2b86e
L
581{
582 0x68, 0, 0, 0, 0, /* pushq immediate */
583 0xf2, 0xe9, 0, 0, 0, 0, /* bnd jmpq relative */
584 0x0f, 0x1f, 0x44, 0, 0 /* nopl 0(%rax,%rax,1) */
585};
586
ee2fdd6f
L
587/* The first entry in the IBT-enabled lazy procedure linkage table is the
588 the same as the lazy PLT with BND prefix so that bound registers are
589 preserved when control is passed to dynamic linker. Subsequent
590 entries for a IBT-enabled lazy procedure linkage table look like
591 this. */
592
593static const bfd_byte elf_x86_64_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
594{
595 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
596 0x68, 0, 0, 0, 0, /* pushq immediate */
597 0xf2, 0xe9, 0, 0, 0, 0, /* bnd jmpq relative */
598 0x90 /* nop */
599};
600
601/* The first entry in the x32 IBT-enabled lazy procedure linkage table
de194d85 602 is the same as the normal lazy PLT. Subsequent entries for an
ee2fdd6f
L
603 x32 IBT-enabled lazy procedure linkage table look like this. */
604
605static const bfd_byte elf_x32_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
606{
607 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
608 0x68, 0, 0, 0, 0, /* pushq immediate */
609 0xe9, 0, 0, 0, 0, /* jmpq relative */
610 0x66, 0x90 /* xchg %ax,%ax */
611};
612
38b12349 613/* Entries in the non-lazey procedure linkage table look like this. */
0ff2b86e 614
38b12349 615static const bfd_byte elf_x86_64_non_lazy_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
0ff2b86e 616{
38b12349
L
617 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
618 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
619 0x66, 0x90 /* xchg %ax,%ax */
0ff2b86e
L
620};
621
38b12349
L
622/* Entries for branches with BND prefix in the non-lazey procedure
623 linkage table look like this. */
0ff2b86e 624
38b12349 625static const bfd_byte elf_x86_64_non_lazy_bnd_plt_entry[NON_LAZY_PLT_ENTRY_SIZE] =
0ff2b86e 626{
38b12349
L
627 0xf2, 0xff, 0x25, /* bnd jmpq *name@GOTPC(%rip) */
628 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
629 0x90 /* nop */
0ff2b86e
L
630};
631
ee2fdd6f
L
632/* Entries for branches with IBT-enabled in the non-lazey procedure
633 linkage table look like this. They have the same size as the lazy
634 PLT entry. */
635
636static const bfd_byte elf_x86_64_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
637{
638 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
639 0xf2, 0xff, 0x25, /* bnd jmpq *name@GOTPC(%rip) */
640 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
641 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopl 0x0(%rax,%rax,1) */
642};
643
644/* Entries for branches with IBT-enabled in the x32 non-lazey procedure
645 linkage table look like this. They have the same size as the lazy
646 PLT entry. */
647
648static const bfd_byte elf_x32_non_lazy_ibt_plt_entry[LAZY_PLT_ENTRY_SIZE] =
649{
650 0xf3, 0x0f, 0x1e, 0xfa, /* endbr64 */
651 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
652 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
653 0x66, 0x0f, 0x1f, 0x44, 0x00, 0x00 /* nopw 0x0(%rax,%rax,1) */
654};
655
38b12349 656/* .eh_frame covering the lazy .plt section. */
e41b3a13 657
38b12349 658static const bfd_byte elf_x86_64_eh_frame_lazy_plt[] =
e41b3a13 659{
e41b3a13
JJ
660 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
661 0, 0, 0, 0, /* CIE ID */
662 1, /* CIE version */
663 'z', 'R', 0, /* Augmentation string */
664 1, /* Code alignment factor */
665 0x78, /* Data alignment factor */
666 16, /* Return address column */
667 1, /* Augmentation size */
668 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
669 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
670 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
671 DW_CFA_nop, DW_CFA_nop,
672
673 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
674 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
675 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
676 0, 0, 0, 0, /* .plt size goes here */
677 0, /* Augmentation size */
678 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
679 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
680 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
681 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
682 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
683 11, /* Block length */
684 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
685 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
686 DW_OP_lit15, DW_OP_and, DW_OP_lit11, DW_OP_ge,
687 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
688 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
689};
690
38b12349 691/* .eh_frame covering the lazy BND .plt section. */
9e659176 692
38b12349 693static const bfd_byte elf_x86_64_eh_frame_lazy_bnd_plt[] =
9e659176
L
694{
695 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
696 0, 0, 0, 0, /* CIE ID */
697 1, /* CIE version */
698 'z', 'R', 0, /* Augmentation string */
699 1, /* Code alignment factor */
700 0x78, /* Data alignment factor */
701 16, /* Return address column */
702 1, /* Augmentation size */
703 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
704 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
705 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
706 DW_CFA_nop, DW_CFA_nop,
707
708 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
709 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
710 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
711 0, 0, 0, 0, /* .plt size goes here */
712 0, /* Augmentation size */
713 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
714 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
715 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
716 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
717 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
718 11, /* Block length */
719 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
720 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
721 DW_OP_lit15, DW_OP_and, DW_OP_lit5, DW_OP_ge,
722 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
723 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
724};
725
ee2fdd6f
L
726/* .eh_frame covering the lazy .plt section with IBT-enabled. */
727
728static const bfd_byte elf_x86_64_eh_frame_lazy_ibt_plt[] =
729{
730 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
731 0, 0, 0, 0, /* CIE ID */
732 1, /* CIE version */
733 'z', 'R', 0, /* Augmentation string */
734 1, /* Code alignment factor */
735 0x78, /* Data alignment factor */
736 16, /* Return address column */
737 1, /* Augmentation size */
738 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
739 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
740 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
741 DW_CFA_nop, DW_CFA_nop,
742
743 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
744 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
745 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
746 0, 0, 0, 0, /* .plt size goes here */
747 0, /* Augmentation size */
748 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
749 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
750 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
751 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
752 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
753 11, /* Block length */
754 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
755 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
756 DW_OP_lit15, DW_OP_and, DW_OP_lit10, DW_OP_ge,
757 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
758 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
759};
760
761/* .eh_frame covering the x32 lazy .plt section with IBT-enabled. */
762
763static const bfd_byte elf_x32_eh_frame_lazy_ibt_plt[] =
764{
765 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
766 0, 0, 0, 0, /* CIE ID */
767 1, /* CIE version */
768 'z', 'R', 0, /* Augmentation string */
769 1, /* Code alignment factor */
770 0x78, /* Data alignment factor */
771 16, /* Return address column */
772 1, /* Augmentation size */
773 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
774 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
775 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
776 DW_CFA_nop, DW_CFA_nop,
777
778 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
779 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
780 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
781 0, 0, 0, 0, /* .plt size goes here */
782 0, /* Augmentation size */
783 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
784 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
785 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
786 DW_CFA_advance_loc + 10, /* DW_CFA_advance_loc: 10 to __PLT__+16 */
787 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
788 11, /* Block length */
789 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
790 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
791 DW_OP_lit15, DW_OP_and, DW_OP_lit9, DW_OP_ge,
792 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
793 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
794};
795
38b12349 796/* .eh_frame covering the non-lazy .plt section. */
fff53dae 797
38b12349 798static const bfd_byte elf_x86_64_eh_frame_non_lazy_plt[] =
fff53dae
L
799{
800#define PLT_GOT_FDE_LENGTH 20
801 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
802 0, 0, 0, 0, /* CIE ID */
803 1, /* CIE version */
804 'z', 'R', 0, /* Augmentation string */
805 1, /* Code alignment factor */
806 0x78, /* Data alignment factor */
807 16, /* Return address column */
808 1, /* Augmentation size */
809 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
810 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
811 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
812 DW_CFA_nop, DW_CFA_nop,
813
814 PLT_GOT_FDE_LENGTH, 0, 0, 0, /* FDE length */
815 PLT_CIE_LENGTH + 8, 0, 0, 0, /* CIE pointer */
38b12349
L
816 0, 0, 0, 0, /* the start of non-lazy .plt goes here */
817 0, 0, 0, 0, /* non-lazy .plt size goes here */
fff53dae
L
818 0, /* Augmentation size */
819 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop, DW_CFA_nop,
820 DW_CFA_nop, DW_CFA_nop, DW_CFA_nop
821};
822
38b12349
L
823/* Architecture-specific backend data for x86-64. */
824
825struct elf_x86_64_backend_data
826{
827 /* Target system. */
828 enum
829 {
830 is_normal,
831 is_nacl
832 } os;
eed180f8
RM
833};
834
f8222080
L
835#define get_elf_x86_64_arch_data(bed) \
836 ((const struct elf_x86_64_backend_data *) (bed)->arch_data)
837
eed180f8 838#define get_elf_x86_64_backend_data(abfd) \
f8222080 839 get_elf_x86_64_arch_data (get_elf_backend_data (abfd))
eed180f8 840
eed180f8 841/* These are the standard parameters. */
765e526c 842static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_plt =
eed180f8 843 {
38b12349 844 elf_x86_64_lazy_plt0_entry, /* plt0_entry */
765e526c 845 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
38b12349
L
846 elf_x86_64_lazy_plt_entry, /* plt_entry */
847 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
eed180f8
RM
848 2, /* plt0_got1_offset */
849 8, /* plt0_got2_offset */
850 12, /* plt0_got2_insn_end */
851 2, /* plt_got_offset */
852 7, /* plt_reloc_offset */
853 12, /* plt_plt_offset */
854 6, /* plt_got_insn_size */
38b12349 855 LAZY_PLT_ENTRY_SIZE, /* plt_plt_insn_end */
eed180f8 856 6, /* plt_lazy_offset */
a6798bab
L
857 elf_x86_64_lazy_plt0_entry, /* pic_plt0_entry */
858 elf_x86_64_lazy_plt_entry, /* pic_plt_entry */
38b12349
L
859 elf_x86_64_eh_frame_lazy_plt, /* eh_frame_plt */
860 sizeof (elf_x86_64_eh_frame_lazy_plt) /* eh_frame_plt_size */
861 };
862
765e526c 863static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_plt =
38b12349
L
864 {
865 elf_x86_64_non_lazy_plt_entry, /* plt_entry */
a6798bab 866 elf_x86_64_non_lazy_plt_entry, /* pic_plt_entry */
38b12349
L
867 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
868 2, /* plt_got_offset */
869 6, /* plt_got_insn_size */
870 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
871 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
eed180f8
RM
872 };
873
765e526c 874static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_bnd_plt =
0ff2b86e 875 {
38b12349 876 elf_x86_64_lazy_bnd_plt0_entry, /* plt0_entry */
765e526c 877 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
38b12349
L
878 elf_x86_64_lazy_bnd_plt_entry, /* plt_entry */
879 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
0ff2b86e
L
880 2, /* plt0_got1_offset */
881 1+8, /* plt0_got2_offset */
882 1+12, /* plt0_got2_insn_end */
883 1+2, /* plt_got_offset */
884 1, /* plt_reloc_offset */
885 7, /* plt_plt_offset */
886 1+6, /* plt_got_insn_size */
887 11, /* plt_plt_insn_end */
888 0, /* plt_lazy_offset */
a6798bab
L
889 elf_x86_64_lazy_bnd_plt0_entry, /* pic_plt0_entry */
890 elf_x86_64_lazy_bnd_plt_entry, /* pic_plt_entry */
38b12349
L
891 elf_x86_64_eh_frame_lazy_bnd_plt, /* eh_frame_plt */
892 sizeof (elf_x86_64_eh_frame_lazy_bnd_plt) /* eh_frame_plt_size */
893 };
894
765e526c 895static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_bnd_plt =
38b12349
L
896 {
897 elf_x86_64_non_lazy_bnd_plt_entry, /* plt_entry */
a6798bab 898 elf_x86_64_non_lazy_bnd_plt_entry, /* pic_plt_entry */
38b12349
L
899 NON_LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
900 1+2, /* plt_got_offset */
901 1+6, /* plt_got_insn_size */
902 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
903 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
904 };
905
765e526c 906static const struct elf_x86_lazy_plt_layout elf_x86_64_lazy_ibt_plt =
ee2fdd6f
L
907 {
908 elf_x86_64_lazy_bnd_plt0_entry, /* plt0_entry */
765e526c 909 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
ee2fdd6f
L
910 elf_x86_64_lazy_ibt_plt_entry, /* plt_entry */
911 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
912 2, /* plt0_got1_offset */
913 1+8, /* plt0_got2_offset */
914 1+12, /* plt0_got2_insn_end */
915 4+1+2, /* plt_got_offset */
916 4+1, /* plt_reloc_offset */
917 4+1+6, /* plt_plt_offset */
918 4+1+6, /* plt_got_insn_size */
919 4+1+5+5, /* plt_plt_insn_end */
920 0, /* plt_lazy_offset */
a6798bab
L
921 elf_x86_64_lazy_bnd_plt0_entry, /* pic_plt0_entry */
922 elf_x86_64_lazy_ibt_plt_entry, /* pic_plt_entry */
ee2fdd6f
L
923 elf_x86_64_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
924 sizeof (elf_x86_64_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
925 };
926
765e526c 927static const struct elf_x86_lazy_plt_layout elf_x32_lazy_ibt_plt =
ee2fdd6f
L
928 {
929 elf_x86_64_lazy_plt0_entry, /* plt0_entry */
765e526c 930 LAZY_PLT_ENTRY_SIZE, /* plt0_entry_size */
ee2fdd6f
L
931 elf_x32_lazy_ibt_plt_entry, /* plt_entry */
932 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
933 2, /* plt0_got1_offset */
934 8, /* plt0_got2_offset */
935 12, /* plt0_got2_insn_end */
936 4+2, /* plt_got_offset */
937 4+1, /* plt_reloc_offset */
938 4+6, /* plt_plt_offset */
939 4+6, /* plt_got_insn_size */
940 4+5+5, /* plt_plt_insn_end */
941 0, /* plt_lazy_offset */
a6798bab
L
942 elf_x86_64_lazy_plt0_entry, /* pic_plt0_entry */
943 elf_x32_lazy_ibt_plt_entry, /* pic_plt_entry */
ee2fdd6f
L
944 elf_x32_eh_frame_lazy_ibt_plt, /* eh_frame_plt */
945 sizeof (elf_x32_eh_frame_lazy_ibt_plt) /* eh_frame_plt_size */
946 };
947
765e526c 948static const struct elf_x86_non_lazy_plt_layout elf_x86_64_non_lazy_ibt_plt =
ee2fdd6f
L
949 {
950 elf_x86_64_non_lazy_ibt_plt_entry, /* plt_entry */
a6798bab 951 elf_x86_64_non_lazy_ibt_plt_entry, /* pic_plt_entry */
ee2fdd6f
L
952 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
953 4+1+2, /* plt_got_offset */
954 4+1+6, /* plt_got_insn_size */
955 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
956 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
957 };
958
765e526c 959static const struct elf_x86_non_lazy_plt_layout elf_x32_non_lazy_ibt_plt =
ee2fdd6f
L
960 {
961 elf_x32_non_lazy_ibt_plt_entry, /* plt_entry */
a6798bab 962 elf_x32_non_lazy_ibt_plt_entry, /* pic_plt_entry */
ee2fdd6f
L
963 LAZY_PLT_ENTRY_SIZE, /* plt_entry_size */
964 4+2, /* plt_got_offset */
965 4+6, /* plt_got_insn_size */
966 elf_x86_64_eh_frame_non_lazy_plt, /* eh_frame_plt */
967 sizeof (elf_x86_64_eh_frame_non_lazy_plt) /* eh_frame_plt_size */
968 };
969
38b12349
L
970static const struct elf_x86_64_backend_data elf_x86_64_arch_bed =
971 {
972 is_normal /* os */
0ff2b86e
L
973 };
974
eed180f8
RM
975#define elf_backend_arch_data &elf_x86_64_arch_bed
976
b34976b6 977static bfd_boolean
27482721 978elf64_x86_64_elf_object_p (bfd *abfd)
bffbf940 979{
8d88c4ca
NC
980 /* Set the right machine number for an x86-64 elf64 file. */
981 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x86_64);
b34976b6 982 return TRUE;
8d88c4ca
NC
983}
984
8059fb19
RM
985static bfd_boolean
986elf32_x86_64_elf_object_p (bfd *abfd)
987{
988 /* Set the right machine number for an x86-64 elf32 file. */
989 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x64_32);
990 return TRUE;
991}
992
142411ca
L
993/* Return TRUE if the TLS access code sequence support transition
994 from R_TYPE. */
995
996static bfd_boolean
351f65ca
L
997elf_x86_64_check_tls_transition (bfd *abfd,
998 struct bfd_link_info *info,
999 asection *sec,
1000 bfd_byte *contents,
1001 Elf_Internal_Shdr *symtab_hdr,
1002 struct elf_link_hash_entry **sym_hashes,
1003 unsigned int r_type,
1004 const Elf_Internal_Rela *rel,
1005 const Elf_Internal_Rela *relend)
bffbf940 1006{
142411ca
L
1007 unsigned int val;
1008 unsigned long r_symndx;
5c98a14e 1009 bfd_boolean largepic = FALSE;
142411ca
L
1010 struct elf_link_hash_entry *h;
1011 bfd_vma offset;
0afcef53 1012 struct elf_x86_link_hash_table *htab;
e2cbcd91 1013 bfd_byte *call;
1d4af308 1014 bfd_boolean indirect_call;
142411ca 1015
0afcef53 1016 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
142411ca 1017 offset = rel->r_offset;
bffbf940 1018 switch (r_type)
142411ca
L
1019 {
1020 case R_X86_64_TLSGD:
1021 case R_X86_64_TLSLD:
1022 if ((rel + 1) >= relend)
1023 return FALSE;
1024
1025 if (r_type == R_X86_64_TLSGD)
1026 {
52bc799a 1027 /* Check transition from GD access model. For 64bit, only
142411ca 1028 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
e2cbcd91
L
1029 .word 0x6666; rex64; call __tls_get_addr@PLT
1030 or
1031 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
1032 .byte 0x66; rex64
1033 call *__tls_get_addr@GOTPCREL(%rip)
1034 which may be converted to
1035 addr32 call __tls_get_addr
52bc799a
L
1036 can transit to different access model. For 32bit, only
1037 leaq foo@tlsgd(%rip), %rdi
e2cbcd91
L
1038 .word 0x6666; rex64; call __tls_get_addr@PLT
1039 or
1040 leaq foo@tlsgd(%rip), %rdi
1041 .byte 0x66; rex64
1042 call *__tls_get_addr@GOTPCREL(%rip)
1043 which may be converted to
1044 addr32 call __tls_get_addr
1045 can transit to different access model. For largepic,
5c98a14e 1046 we also support:
e2cbcd91
L
1047 leaq foo@tlsgd(%rip), %rdi
1048 movabsq $__tls_get_addr@pltoff, %rax
1049 addq $r15, %rax
1050 call *%rax
1051 or
5c98a14e
JJ
1052 leaq foo@tlsgd(%rip), %rdi
1053 movabsq $__tls_get_addr@pltoff, %rax
1054 addq $rbx, %rax
e2cbcd91 1055 call *%rax */
142411ca 1056
fa289a5f
AM
1057 static const unsigned char leaq[] = { 0x66, 0x48, 0x8d, 0x3d };
1058
5c98a14e 1059 if ((offset + 12) > sec->size)
142411ca 1060 return FALSE;
52bc799a 1061
e2cbcd91
L
1062 call = contents + offset + 4;
1063 if (call[0] != 0x66
1064 || !((call[1] == 0x48
1065 && call[2] == 0xff
1066 && call[3] == 0x15)
1067 || (call[1] == 0x48
1068 && call[2] == 0x67
1069 && call[3] == 0xe8)
1070 || (call[1] == 0x66
1071 && call[2] == 0x48
1072 && call[3] == 0xe8)))
5c98a14e
JJ
1073 {
1074 if (!ABI_64_P (abfd)
1075 || (offset + 19) > sec->size
1076 || offset < 3
e2cbcd91
L
1077 || memcmp (call - 7, leaq + 1, 3) != 0
1078 || memcmp (call, "\x48\xb8", 2) != 0
1079 || call[11] != 0x01
1080 || call[13] != 0xff
1081 || call[14] != 0xd0
1082 || !((call[10] == 0x48 && call[12] == 0xd8)
1083 || (call[10] == 0x4c && call[12] == 0xf8)))
5c98a14e
JJ
1084 return FALSE;
1085 largepic = TRUE;
1086 }
1087 else if (ABI_64_P (abfd))
52bc799a 1088 {
52bc799a 1089 if (offset < 4
fa289a5f 1090 || memcmp (contents + offset - 4, leaq, 4) != 0)
52bc799a
L
1091 return FALSE;
1092 }
1093 else
1094 {
52bc799a 1095 if (offset < 3
fa289a5f 1096 || memcmp (contents + offset - 3, leaq + 1, 3) != 0)
52bc799a
L
1097 return FALSE;
1098 }
e2cbcd91 1099 indirect_call = call[2] == 0xff;
142411ca
L
1100 }
1101 else
1102 {
1103 /* Check transition from LD access model. Only
1104 leaq foo@tlsld(%rip), %rdi;
e2cbcd91
L
1105 call __tls_get_addr@PLT
1106 or
1107 leaq foo@tlsld(%rip), %rdi;
1108 call *__tls_get_addr@GOTPCREL(%rip)
1109 which may be converted to
1110 addr32 call __tls_get_addr
5c98a14e
JJ
1111 can transit to different access model. For largepic
1112 we also support:
e2cbcd91
L
1113 leaq foo@tlsld(%rip), %rdi
1114 movabsq $__tls_get_addr@pltoff, %rax
1115 addq $r15, %rax
1116 call *%rax
1117 or
5c98a14e
JJ
1118 leaq foo@tlsld(%rip), %rdi
1119 movabsq $__tls_get_addr@pltoff, %rax
1120 addq $rbx, %rax
e2cbcd91 1121 call *%rax */
142411ca 1122
fa289a5f 1123 static const unsigned char lea[] = { 0x48, 0x8d, 0x3d };
142411ca
L
1124
1125 if (offset < 3 || (offset + 9) > sec->size)
1126 return FALSE;
1127
5c98a14e 1128 if (memcmp (contents + offset - 3, lea, 3) != 0)
142411ca 1129 return FALSE;
5c98a14e 1130
e2cbcd91
L
1131 call = contents + offset + 4;
1132 if (!(call[0] == 0xe8
1133 || (call[0] == 0xff && call[1] == 0x15)
1134 || (call[0] == 0x67 && call[1] == 0xe8)))
5c98a14e
JJ
1135 {
1136 if (!ABI_64_P (abfd)
1137 || (offset + 19) > sec->size
e2cbcd91
L
1138 || memcmp (call, "\x48\xb8", 2) != 0
1139 || call[11] != 0x01
1140 || call[13] != 0xff
1141 || call[14] != 0xd0
1142 || !((call[10] == 0x48 && call[12] == 0xd8)
1143 || (call[10] == 0x4c && call[12] == 0xf8)))
5c98a14e
JJ
1144 return FALSE;
1145 largepic = TRUE;
1146 }
e2cbcd91 1147 indirect_call = call[0] == 0xff;
142411ca
L
1148 }
1149
351f65ca 1150 r_symndx = htab->r_sym (rel[1].r_info);
142411ca
L
1151 if (r_symndx < symtab_hdr->sh_info)
1152 return FALSE;
1153
1154 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1d4af308 1155 if (h == NULL
0afcef53 1156 || !((struct elf_x86_link_hash_entry *) h)->tls_get_addr)
e2cbcd91 1157 return FALSE;
e2cbcd91 1158 else
78984959
L
1159 {
1160 r_type = (ELF32_R_TYPE (rel[1].r_info)
1161 & ~R_X86_64_converted_reloc_bit);
1162 if (largepic)
1163 return r_type == R_X86_64_PLTOFF64;
1164 else if (indirect_call)
1165 return r_type == R_X86_64_GOTPCRELX;
1166 else
1167 return (r_type == R_X86_64_PC32 || r_type == R_X86_64_PLT32);
1168 }
142411ca
L
1169
1170 case R_X86_64_GOTTPOFF:
1171 /* Check transition from IE access model:
4a4c5f25
L
1172 mov foo@gottpoff(%rip), %reg
1173 add foo@gottpoff(%rip), %reg
142411ca
L
1174 */
1175
4a4c5f25
L
1176 /* Check REX prefix first. */
1177 if (offset >= 3 && (offset + 4) <= sec->size)
1178 {
1179 val = bfd_get_8 (abfd, contents + offset - 3);
1180 if (val != 0x48 && val != 0x4c)
1181 {
1182 /* X32 may have 0x44 REX prefix or no REX prefix. */
1183 if (ABI_64_P (abfd))
1184 return FALSE;
1185 }
1186 }
1187 else
1188 {
1189 /* X32 may not have any REX prefix. */
1190 if (ABI_64_P (abfd))
1191 return FALSE;
1192 if (offset < 2 || (offset + 3) > sec->size)
1193 return FALSE;
1194 }
142411ca
L
1195
1196 val = bfd_get_8 (abfd, contents + offset - 2);
1197 if (val != 0x8b && val != 0x03)
1198 return FALSE;
1199
1200 val = bfd_get_8 (abfd, contents + offset - 1);
1201 return (val & 0xc7) == 5;
1202
1203 case R_X86_64_GOTPC32_TLSDESC:
1204 /* Check transition from GDesc access model:
1205 leaq x@tlsdesc(%rip), %rax
1206
1207 Make sure it's a leaq adding rip to a 32-bit offset
1208 into any register, although it's probably almost always
1209 going to be rax. */
1210
1211 if (offset < 3 || (offset + 4) > sec->size)
1212 return FALSE;
1213
1214 val = bfd_get_8 (abfd, contents + offset - 3);
1215 if ((val & 0xfb) != 0x48)
1216 return FALSE;
1217
1218 if (bfd_get_8 (abfd, contents + offset - 2) != 0x8d)
1219 return FALSE;
1220
1221 val = bfd_get_8 (abfd, contents + offset - 1);
1222 return (val & 0xc7) == 0x05;
1223
1224 case R_X86_64_TLSDESC_CALL:
1225 /* Check transition from GDesc access model:
1226 call *x@tlsdesc(%rax)
1227 */
1228 if (offset + 2 <= sec->size)
1229 {
1230 /* Make sure that it's a call *x@tlsdesc(%rax). */
e2cbcd91
L
1231 call = contents + offset;
1232 return call[0] == 0xff && call[1] == 0x10;
142411ca
L
1233 }
1234
1235 return FALSE;
1236
1237 default:
1238 abort ();
1239 }
1240}
1241
1242/* Return TRUE if the TLS access transition is OK or no transition
1243 will be performed. Update R_TYPE if there is a transition. */
1244
1245static bfd_boolean
351f65ca
L
1246elf_x86_64_tls_transition (struct bfd_link_info *info, bfd *abfd,
1247 asection *sec, bfd_byte *contents,
1248 Elf_Internal_Shdr *symtab_hdr,
1249 struct elf_link_hash_entry **sym_hashes,
1250 unsigned int *r_type, int tls_type,
1251 const Elf_Internal_Rela *rel,
1252 const Elf_Internal_Rela *relend,
1253 struct elf_link_hash_entry *h,
bedfd056
L
1254 unsigned long r_symndx,
1255 bfd_boolean from_relocate_section)
142411ca
L
1256{
1257 unsigned int from_type = *r_type;
1258 unsigned int to_type = from_type;
1259 bfd_boolean check = TRUE;
1260
bb1cb422
L
1261 /* Skip TLS transition for functions. */
1262 if (h != NULL
1263 && (h->type == STT_FUNC
1264 || h->type == STT_GNU_IFUNC))
1265 return TRUE;
1266
142411ca 1267 switch (from_type)
bffbf940
JJ
1268 {
1269 case R_X86_64_TLSGD:
67a4f2b7
AO
1270 case R_X86_64_GOTPC32_TLSDESC:
1271 case R_X86_64_TLSDESC_CALL:
bffbf940 1272 case R_X86_64_GOTTPOFF:
0e1862bb 1273 if (bfd_link_executable (info))
142411ca
L
1274 {
1275 if (h == NULL)
1276 to_type = R_X86_64_TPOFF32;
1277 else
1278 to_type = R_X86_64_GOTTPOFF;
1279 }
1280
bedfd056
L
1281 /* When we are called from elf_x86_64_relocate_section, there may
1282 be additional transitions based on TLS_TYPE. */
1283 if (from_relocate_section)
142411ca
L
1284 {
1285 unsigned int new_to_type = to_type;
1286
51537393 1287 if (TLS_TRANSITION_IE_TO_LE_P (info, h, tls_type))
142411ca
L
1288 new_to_type = R_X86_64_TPOFF32;
1289
1290 if (to_type == R_X86_64_TLSGD
1291 || to_type == R_X86_64_GOTPC32_TLSDESC
1292 || to_type == R_X86_64_TLSDESC_CALL)
1293 {
1294 if (tls_type == GOT_TLS_IE)
1295 new_to_type = R_X86_64_GOTTPOFF;
1296 }
1297
1298 /* We checked the transition before when we were called from
351f65ca 1299 elf_x86_64_check_relocs. We only want to check the new
142411ca
L
1300 transition which hasn't been checked before. */
1301 check = new_to_type != to_type && from_type == to_type;
1302 to_type = new_to_type;
1303 }
1304
1305 break;
1306
bffbf940 1307 case R_X86_64_TLSLD:
0e1862bb 1308 if (bfd_link_executable (info))
142411ca
L
1309 to_type = R_X86_64_TPOFF32;
1310 break;
1311
1312 default:
1313 return TRUE;
bffbf940
JJ
1314 }
1315
142411ca
L
1316 /* Return TRUE if there is no transition. */
1317 if (from_type == to_type)
1318 return TRUE;
1319
1320 /* Check if the transition can be performed. */
1321 if (check
351f65ca
L
1322 && ! elf_x86_64_check_tls_transition (abfd, info, sec, contents,
1323 symtab_hdr, sym_hashes,
1324 from_type, rel, relend))
142411ca 1325 {
2f629d23 1326 reloc_howto_type *from, *to;
4c544807 1327 const char *name;
142411ca 1328
351f65ca
L
1329 from = elf_x86_64_rtype_to_howto (abfd, from_type);
1330 to = elf_x86_64_rtype_to_howto (abfd, to_type);
142411ca 1331
4c544807
L
1332 if (h)
1333 name = h->root.root.string;
1334 else
1335 {
0afcef53 1336 struct elf_x86_link_hash_table *htab;
4dfe6ac6 1337
0afcef53 1338 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
4dfe6ac6
NC
1339 if (htab == NULL)
1340 name = "*unknown*";
1341 else
1342 {
1343 Elf_Internal_Sym *isym;
1344
1345 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1346 abfd, r_symndx);
1347 name = bfd_elf_sym_name (abfd, symtab_hdr, isym, NULL);
1348 }
4c544807
L
1349 }
1350
4eca0228 1351 _bfd_error_handler
695344c0 1352 /* xgettext:c-format */
d42c267e 1353 (_("%B: TLS transition from %s to %s against `%s' at %#Lx "
142411ca 1354 "in section `%A' failed"),
d42c267e 1355 abfd, from->name, to->name, name, rel->r_offset, sec);
142411ca
L
1356 bfd_set_error (bfd_error_bad_value);
1357 return FALSE;
1358 }
1359
1360 *r_type = to_type;
1361 return TRUE;
bffbf940
JJ
1362}
1363
c1d11331
L
1364/* Rename some of the generic section flags to better document how they
1365 are used here. */
6999821f 1366#define check_relocs_failed sec_flg0
338c190a
L
1367
1368static bfd_boolean
aab921ad
L
1369elf_x86_64_need_pic (struct bfd_link_info *info,
1370 bfd *input_bfd, asection *sec,
338c190a
L
1371 struct elf_link_hash_entry *h,
1372 Elf_Internal_Shdr *symtab_hdr,
1373 Elf_Internal_Sym *isym,
1374 reloc_howto_type *howto)
1375{
1376 const char *v = "";
1377 const char *und = "";
1378 const char *pic = "";
aab921ad 1379 const char *object;
338c190a
L
1380
1381 const char *name;
1382 if (h)
1383 {
1384 name = h->root.root.string;
1385 switch (ELF_ST_VISIBILITY (h->other))
1386 {
1387 case STV_HIDDEN:
1388 v = _("hidden symbol ");
1389 break;
1390 case STV_INTERNAL:
1391 v = _("internal symbol ");
1392 break;
1393 case STV_PROTECTED:
1394 v = _("protected symbol ");
1395 break;
1396 default:
0afcef53 1397 if (((struct elf_x86_link_hash_entry *) h)->def_protected)
a5b4ee94
L
1398 v = _("protected symbol ");
1399 else
1400 v = _("symbol ");
338c190a
L
1401 pic = _("; recompile with -fPIC");
1402 break;
1403 }
1404
1405 if (!h->def_regular && !h->def_dynamic)
1406 und = _("undefined ");
1407 }
1408 else
1409 {
1410 name = bfd_elf_sym_name (input_bfd, symtab_hdr, isym, NULL);
1411 pic = _("; recompile with -fPIC");
1412 }
1413
aab921ad
L
1414 if (bfd_link_dll (info))
1415 object = _("a shared object");
1416 else if (bfd_link_pie (info))
1417 object = _("a PIE object");
1418 else
1419 object = _("a PDE object");
1420
695344c0 1421 /* xgettext:c-format */
4eca0228 1422 _bfd_error_handler (_("%B: relocation %s against %s%s`%s' can "
aab921ad
L
1423 "not be used when making %s%s"),
1424 input_bfd, howto->name, und, v, name,
1425 object, pic);
338c190a
L
1426 bfd_set_error (bfd_error_bad_value);
1427 sec->check_relocs_failed = 1;
1428 return FALSE;
1429}
c1d11331 1430
c175a657
L
1431/* With the local symbol, foo, we convert
1432 mov foo@GOTPCREL(%rip), %reg
1433 to
1434 lea foo(%rip), %reg
1435 and convert
1436 call/jmp *foo@GOTPCREL(%rip)
1437 to
1438 nop call foo/jmp foo nop
1439 When PIC is false, convert
1440 test %reg, foo@GOTPCREL(%rip)
1441 to
1442 test $foo, %reg
1443 and convert
1444 binop foo@GOTPCREL(%rip), %reg
1445 to
1446 binop $foo, %reg
1447 where binop is one of adc, add, and, cmp, or, sbb, sub, xor
1448 instructions. */
1449
1450static bfd_boolean
8b43e456 1451elf_x86_64_convert_load_reloc (bfd *abfd,
c175a657 1452 bfd_byte *contents,
6999821f 1453 unsigned int *r_type_p,
c175a657
L
1454 Elf_Internal_Rela *irel,
1455 struct elf_link_hash_entry *h,
1456 bfd_boolean *converted,
1457 struct bfd_link_info *link_info)
1458{
0afcef53 1459 struct elf_x86_link_hash_table *htab;
c175a657 1460 bfd_boolean is_pic;
8b43e456 1461 bfd_boolean no_overflow;
c175a657
L
1462 bfd_boolean relocx;
1463 bfd_boolean to_reloc_pc32;
1464 asection *tsec;
c175a657
L
1465 bfd_signed_vma raddend;
1466 unsigned int opcode;
1467 unsigned int modrm;
6999821f 1468 unsigned int r_type = *r_type_p;
c175a657 1469 unsigned int r_symndx;
c175a657
L
1470 bfd_vma roff = irel->r_offset;
1471
1472 if (roff < (r_type == R_X86_64_REX_GOTPCRELX ? 3 : 2))
1473 return TRUE;
1474
1475 raddend = irel->r_addend;
1476 /* Addend for 32-bit PC-relative relocation must be -4. */
1477 if (raddend != -4)
1478 return TRUE;
1479
0afcef53 1480 htab = elf_x86_hash_table (link_info, X86_64_ELF_DATA);
c175a657
L
1481 is_pic = bfd_link_pic (link_info);
1482
1483 relocx = (r_type == R_X86_64_GOTPCRELX
1484 || r_type == R_X86_64_REX_GOTPCRELX);
1485
8b43e456
L
1486 /* TRUE if --no-relax is used. */
1487 no_overflow = link_info->disable_target_specific_optimizations > 1;
c175a657
L
1488
1489 r_symndx = htab->r_sym (irel->r_info);
1490
1491 opcode = bfd_get_8 (abfd, contents + roff - 2);
1492
1493 /* Convert mov to lea since it has been done for a while. */
1494 if (opcode != 0x8b)
1495 {
1496 /* Only convert R_X86_64_GOTPCRELX and R_X86_64_REX_GOTPCRELX
1497 for call, jmp or one of adc, add, and, cmp, or, sbb, sub,
1498 test, xor instructions. */
1499 if (!relocx)
1500 return TRUE;
1501 }
1502
1503 /* We convert only to R_X86_64_PC32:
1504 1. Branch.
1505 2. R_X86_64_GOTPCREL since we can't modify REX byte.
8b43e456 1506 3. no_overflow is true.
c175a657
L
1507 4. PIC.
1508 */
1509 to_reloc_pc32 = (opcode == 0xff
1510 || !relocx
8b43e456 1511 || no_overflow
c175a657
L
1512 || is_pic);
1513
1514 /* Get the symbol referred to by the reloc. */
1515 if (h == NULL)
1516 {
1517 Elf_Internal_Sym *isym
1518 = bfd_sym_from_r_symndx (&htab->sym_cache, abfd, r_symndx);
1519
1520 /* Skip relocation against undefined symbols. */
1521 if (isym->st_shndx == SHN_UNDEF)
1522 return TRUE;
1523
c175a657
L
1524 if (isym->st_shndx == SHN_ABS)
1525 tsec = bfd_abs_section_ptr;
1526 else if (isym->st_shndx == SHN_COMMON)
1527 tsec = bfd_com_section_ptr;
1528 else if (isym->st_shndx == SHN_X86_64_LCOMMON)
1529 tsec = &_bfd_elf_large_com_section;
1530 else
1531 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
c175a657
L
1532 }
1533 else
1534 {
1535 /* Undefined weak symbol is only bound locally in executable
1536 and its reference is resolved as 0 without relocation
1537 overflow. We can only perform this optimization for
1538 GOTPCRELX relocations since we need to modify REX byte.
1539 It is OK convert mov with R_X86_64_GOTPCREL to
1540 R_X86_64_PC32. */
0a27fed7
L
1541 bfd_boolean local_ref;
1542 struct elf_x86_link_hash_entry *eh = elf_x86_hash_entry (h);
1543
1544 /* NB: Also set linker_def via SYMBOL_REFERENCES_LOCAL_P. */
1545 local_ref = SYMBOL_REFERENCES_LOCAL_P (link_info, h);
c175a657 1546 if ((relocx || opcode == 0x8b)
0a27fed7
L
1547 && (h->root.type == bfd_link_hash_undefweak
1548 && !eh->linker_def
1549 && local_ref))
c175a657
L
1550 {
1551 if (opcode == 0xff)
1552 {
1553 /* Skip for branch instructions since R_X86_64_PC32
1554 may overflow. */
8b43e456 1555 if (no_overflow)
c175a657
L
1556 return TRUE;
1557 }
1558 else if (relocx)
1559 {
1560 /* For non-branch instructions, we can convert to
1561 R_X86_64_32/R_X86_64_32S since we know if there
1562 is a REX byte. */
1563 to_reloc_pc32 = FALSE;
1564 }
1565
1566 /* Since we don't know the current PC when PIC is true,
1567 we can't convert to R_X86_64_PC32. */
1568 if (to_reloc_pc32 && is_pic)
1569 return TRUE;
1570
1571 goto convert;
1572 }
1573 /* Avoid optimizing GOTPCREL relocations againt _DYNAMIC since
1574 ld.so may use its link-time address. */
cbd0eecf 1575 else if (h->start_stop
0a27fed7 1576 || eh->linker_def
cbd0eecf
L
1577 || ((h->def_regular
1578 || h->root.type == bfd_link_hash_defined
1579 || h->root.type == bfd_link_hash_defweak)
1580 && h != htab->elf.hdynamic
0a27fed7 1581 && local_ref))
c175a657
L
1582 {
1583 /* bfd_link_hash_new or bfd_link_hash_undefined is
1584 set by an assignment in a linker script in
cbd0eecf
L
1585 bfd_elf_record_link_assignment. start_stop is set
1586 on __start_SECNAME/__stop_SECNAME which mark section
1587 SECNAME. */
1588 if (h->start_stop
0a27fed7 1589 || eh->linker_def
cbd0eecf
L
1590 || (h->def_regular
1591 && (h->root.type == bfd_link_hash_new
1592 || h->root.type == bfd_link_hash_undefined
1593 || ((h->root.type == bfd_link_hash_defined
1594 || h->root.type == bfd_link_hash_defweak)
1595 && h->root.u.def.section == bfd_und_section_ptr))))
c175a657
L
1596 {
1597 /* Skip since R_X86_64_32/R_X86_64_32S may overflow. */
8b43e456 1598 if (no_overflow)
c175a657
L
1599 return TRUE;
1600 goto convert;
1601 }
1602 tsec = h->root.u.def.section;
c175a657
L
1603 }
1604 else
1605 return TRUE;
1606 }
1607
2168b268
L
1608 /* Don't convert GOTPCREL relocation against large section. */
1609 if (elf_section_data (tsec) != NULL
1610 && (elf_section_flags (tsec) & SHF_X86_64_LARGE) != 0)
1611 return TRUE;
1612
8b43e456
L
1613 /* Skip since R_X86_64_PC32/R_X86_64_32/R_X86_64_32S may overflow. */
1614 if (no_overflow)
1615 return TRUE;
c175a657 1616
dc089072 1617convert:
c175a657
L
1618 if (opcode == 0xff)
1619 {
1620 /* We have "call/jmp *foo@GOTPCREL(%rip)". */
1621 unsigned int nop;
1622 unsigned int disp;
1623 bfd_vma nop_offset;
1624
1625 /* Convert R_X86_64_GOTPCRELX and R_X86_64_REX_GOTPCRELX to
1626 R_X86_64_PC32. */
1627 modrm = bfd_get_8 (abfd, contents + roff - 1);
1628 if (modrm == 0x25)
1629 {
1630 /* Convert to "jmp foo nop". */
1631 modrm = 0xe9;
1632 nop = NOP_OPCODE;
1633 nop_offset = irel->r_offset + 3;
1634 disp = bfd_get_32 (abfd, contents + irel->r_offset);
1635 irel->r_offset -= 1;
1636 bfd_put_32 (abfd, disp, contents + irel->r_offset);
1637 }
1638 else
1639 {
0afcef53
L
1640 struct elf_x86_link_hash_entry *eh
1641 = (struct elf_x86_link_hash_entry *) h;
e2cbcd91 1642
c175a657
L
1643 /* Convert to "nop call foo". ADDR_PREFIX_OPCODE
1644 is a nop prefix. */
1645 modrm = 0xe8;
e2cbcd91
L
1646 /* To support TLS optimization, always use addr32 prefix for
1647 "call *__tls_get_addr@GOTPCREL(%rip)". */
1d4af308 1648 if (eh && eh->tls_get_addr)
c175a657 1649 {
e2cbcd91
L
1650 nop = 0x67;
1651 nop_offset = irel->r_offset - 2;
c175a657
L
1652 }
1653 else
e2cbcd91
L
1654 {
1655 nop = link_info->call_nop_byte;
1656 if (link_info->call_nop_as_suffix)
1657 {
1658 nop_offset = irel->r_offset + 3;
1659 disp = bfd_get_32 (abfd, contents + irel->r_offset);
1660 irel->r_offset -= 1;
1661 bfd_put_32 (abfd, disp, contents + irel->r_offset);
1662 }
1663 else
1664 nop_offset = irel->r_offset - 2;
1665 }
c175a657
L
1666 }
1667 bfd_put_8 (abfd, nop, contents + nop_offset);
1668 bfd_put_8 (abfd, modrm, contents + irel->r_offset - 1);
1669 r_type = R_X86_64_PC32;
1670 }
1671 else
1672 {
1673 unsigned int rex;
1674 unsigned int rex_mask = REX_R;
1675
1676 if (r_type == R_X86_64_REX_GOTPCRELX)
1677 rex = bfd_get_8 (abfd, contents + roff - 3);
1678 else
1679 rex = 0;
1680
1681 if (opcode == 0x8b)
1682 {
1683 if (to_reloc_pc32)
1684 {
1685 /* Convert "mov foo@GOTPCREL(%rip), %reg" to
1686 "lea foo(%rip), %reg". */
1687 opcode = 0x8d;
1688 r_type = R_X86_64_PC32;
1689 }
1690 else
1691 {
1692 /* Convert "mov foo@GOTPCREL(%rip), %reg" to
1693 "mov $foo, %reg". */
1694 opcode = 0xc7;
1695 modrm = bfd_get_8 (abfd, contents + roff - 1);
1696 modrm = 0xc0 | (modrm & 0x38) >> 3;
1697 if ((rex & REX_W) != 0
1698 && ABI_64_P (link_info->output_bfd))
1699 {
1700 /* Keep the REX_W bit in REX byte for LP64. */
1701 r_type = R_X86_64_32S;
1702 goto rewrite_modrm_rex;
1703 }
1704 else
1705 {
1706 /* If the REX_W bit in REX byte isn't needed,
1707 use R_X86_64_32 and clear the W bit to avoid
1708 sign-extend imm32 to imm64. */
1709 r_type = R_X86_64_32;
1710 /* Clear the W bit in REX byte. */
1711 rex_mask |= REX_W;
1712 goto rewrite_modrm_rex;
1713 }
1714 }
1715 }
1716 else
1717 {
1718 /* R_X86_64_PC32 isn't supported. */
1719 if (to_reloc_pc32)
1720 return TRUE;
1721
1722 modrm = bfd_get_8 (abfd, contents + roff - 1);
1723 if (opcode == 0x85)
1724 {
1725 /* Convert "test %reg, foo@GOTPCREL(%rip)" to
1726 "test $foo, %reg". */
1727 modrm = 0xc0 | (modrm & 0x38) >> 3;
1728 opcode = 0xf7;
1729 }
1730 else
1731 {
1732 /* Convert "binop foo@GOTPCREL(%rip), %reg" to
1733 "binop $foo, %reg". */
1734 modrm = 0xc0 | (modrm & 0x38) >> 3 | (opcode & 0x3c);
1735 opcode = 0x81;
1736 }
1737
1738 /* Use R_X86_64_32 with 32-bit operand to avoid relocation
1739 overflow when sign-extending imm32 to imm64. */
1740 r_type = (rex & REX_W) != 0 ? R_X86_64_32S : R_X86_64_32;
1741
1742rewrite_modrm_rex:
1743 bfd_put_8 (abfd, modrm, contents + roff - 1);
1744
1745 if (rex)
1746 {
1747 /* Move the R bit to the B bit in REX byte. */
1748 rex = (rex & ~rex_mask) | (rex & REX_R) >> 2;
1749 bfd_put_8 (abfd, rex, contents + roff - 3);
1750 }
1751
1752 /* No addend for R_X86_64_32/R_X86_64_32S relocations. */
1753 irel->r_addend = 0;
1754 }
1755
1756 bfd_put_8 (abfd, opcode, contents + roff - 2);
1757 }
1758
6999821f 1759 *r_type_p = r_type;
78984959
L
1760 irel->r_info = htab->r_info (r_symndx,
1761 r_type | R_X86_64_converted_reloc_bit);
c175a657
L
1762
1763 *converted = TRUE;
1764
1765 return TRUE;
1766}
1767
70256ad8 1768/* Look through the relocs for a section during the first phase, and
c434dee6
AJ
1769 calculate needed space in the global offset table, procedure
1770 linkage table, and dynamic reloc sections. */
70256ad8 1771
b34976b6 1772static bfd_boolean
351f65ca
L
1773elf_x86_64_check_relocs (bfd *abfd, struct bfd_link_info *info,
1774 asection *sec,
1775 const Elf_Internal_Rela *relocs)
70256ad8 1776{
0afcef53 1777 struct elf_x86_link_hash_table *htab;
70256ad8
AJ
1778 Elf_Internal_Shdr *symtab_hdr;
1779 struct elf_link_hash_entry **sym_hashes;
70256ad8
AJ
1780 const Elf_Internal_Rela *rel;
1781 const Elf_Internal_Rela *rel_end;
70256ad8 1782 asection *sreloc;
bedfd056 1783 bfd_byte *contents;
5e5e02ae 1784 bfd_boolean converted;
70256ad8 1785
0e1862bb 1786 if (bfd_link_relocatable (info))
b34976b6 1787 return TRUE;
70256ad8 1788
081b1afe
L
1789 /* Don't do anything special with non-loaded, non-alloced sections.
1790 In particular, any relocs in such sections should not affect GOT
1791 and PLT reference counting (ie. we don't allow them to create GOT
1792 or PLT entries), there's no possibility or desire to optimize TLS
1793 relocs, and there's not much point in propagating relocs to shared
1794 libs that the dynamic linker won't relocate. */
1795 if ((sec->flags & SEC_ALLOC) == 0)
1796 return TRUE;
1797
0afcef53 1798 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
4dfe6ac6 1799 if (htab == NULL)
afd9acee
L
1800 {
1801 sec->check_relocs_failed = 1;
1802 return FALSE;
1803 }
4dfe6ac6 1804
fe53b4a4
L
1805 BFD_ASSERT (is_x86_elf (abfd, htab));
1806
bedfd056
L
1807 /* Get the section contents. */
1808 if (elf_section_data (sec)->this_hdr.contents != NULL)
1809 contents = elf_section_data (sec)->this_hdr.contents;
1810 else if (!bfd_malloc_and_get_section (abfd, sec, &contents))
1811 {
1812 sec->check_relocs_failed = 1;
1813 return FALSE;
1814 }
1815
0ffa91dd 1816 symtab_hdr = &elf_symtab_hdr (abfd);
70256ad8 1817 sym_hashes = elf_sym_hashes (abfd);
70256ad8 1818
5e5e02ae
L
1819 converted = FALSE;
1820
c434dee6 1821 sreloc = NULL;
cbe950e9 1822
70256ad8
AJ
1823 rel_end = relocs + sec->reloc_count;
1824 for (rel = relocs; rel < rel_end; rel++)
1825 {
bffbf940 1826 unsigned int r_type;
d42c267e 1827 unsigned int r_symndx;
70256ad8 1828 struct elf_link_hash_entry *h;
0afcef53 1829 struct elf_x86_link_hash_entry *eh;
4c544807
L
1830 Elf_Internal_Sym *isym;
1831 const char *name;
06a6a421 1832 bfd_boolean size_reloc;
6999821f 1833 bfd_boolean converted_reloc;
70256ad8 1834
351f65ca
L
1835 r_symndx = htab->r_sym (rel->r_info);
1836 r_type = ELF32_R_TYPE (rel->r_info);
c434dee6
AJ
1837
1838 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
1839 {
695344c0 1840 /* xgettext:c-format */
4eca0228
AM
1841 _bfd_error_handler (_("%B: bad symbol index: %d"),
1842 abfd, r_symndx);
afd9acee 1843 goto error_return;
c434dee6
AJ
1844 }
1845
70256ad8 1846 if (r_symndx < symtab_hdr->sh_info)
c25bc9fc
L
1847 {
1848 /* A local symbol. */
c2e61a4e
L
1849 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1850 abfd, r_symndx);
1851 if (isym == NULL)
afd9acee 1852 goto error_return;
c25bc9fc
L
1853
1854 /* Check relocation against local STT_GNU_IFUNC symbol. */
351f65ca 1855 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
c25bc9fc 1856 {
0afcef53
L
1857 h = _bfd_elf_x86_get_local_sym_hash (htab, abfd, rel,
1858 TRUE);
c25bc9fc 1859 if (h == NULL)
afd9acee 1860 goto error_return;
6bbec505 1861
c25bc9fc 1862 /* Fake a STT_GNU_IFUNC symbol. */
6322e5c5
L
1863 h->root.root.string = bfd_elf_sym_name (abfd, symtab_hdr,
1864 isym, NULL);
c25bc9fc
L
1865 h->type = STT_GNU_IFUNC;
1866 h->def_regular = 1;
1867 h->ref_regular = 1;
1868 h->forced_local = 1;
1869 h->root.type = bfd_link_hash_defined;
1870 }
1871 else
1872 h = NULL;
1873 }
70256ad8 1874 else
71cb9464 1875 {
4c544807 1876 isym = NULL;
71cb9464
L
1877 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1878 while (h->root.type == bfd_link_hash_indirect
1879 || h->root.type == bfd_link_hash_warning)
1880 h = (struct elf_link_hash_entry *) h->root.u.i.link;
c25bc9fc 1881 }
cbe950e9 1882
d1534d16
L
1883 /* Check invalid x32 relocations. */
1884 if (!ABI_64_P (abfd))
1885 switch (r_type)
1886 {
1887 default:
1888 break;
1889
d1534d16
L
1890 case R_X86_64_DTPOFF64:
1891 case R_X86_64_TPOFF64:
1892 case R_X86_64_PC64:
1893 case R_X86_64_GOTOFF64:
1894 case R_X86_64_GOT64:
1895 case R_X86_64_GOTPCREL64:
1896 case R_X86_64_GOTPC64:
1897 case R_X86_64_GOTPLT64:
1898 case R_X86_64_PLTOFF64:
1899 {
1900 if (h)
1901 name = h->root.root.string;
1902 else
1903 name = bfd_elf_sym_name (abfd, symtab_hdr, isym,
1904 NULL);
4eca0228 1905 _bfd_error_handler
695344c0 1906 /* xgettext:c-format */
d1534d16
L
1907 (_("%B: relocation %s against symbol `%s' isn't "
1908 "supported in x32 mode"), abfd,
1909 x86_64_elf_howto_table[r_type].name, name);
1910 bfd_set_error (bfd_error_bad_value);
afd9acee 1911 goto error_return;
d1534d16
L
1912 }
1913 break;
1914 }
1915
c25bc9fc
L
1916 if (h != NULL)
1917 {
ad1e85de
L
1918 /* It is referenced by a non-shared object. */
1919 h->ref_regular = 1;
bc4e12de 1920 h->root.non_ir_ref_regular = 1;
13a2df29
L
1921
1922 if (h->type == STT_GNU_IFUNC)
1923 elf_tdata (info->output_bfd)->has_gnu_symbols
1924 |= elf_gnu_symbol_ifunc;
71cb9464 1925 }
70256ad8 1926
6999821f
L
1927 converted_reloc = FALSE;
1928 if ((r_type == R_X86_64_GOTPCREL
1929 || r_type == R_X86_64_GOTPCRELX
1930 || r_type == R_X86_64_REX_GOTPCRELX)
1931 && (h == NULL || h->type != STT_GNU_IFUNC))
1932 {
1933 Elf_Internal_Rela *irel = (Elf_Internal_Rela *) rel;
1934 if (!elf_x86_64_convert_load_reloc (abfd, contents, &r_type,
1935 irel, h, &converted_reloc,
1936 info))
1937 goto error_return;
5e5e02ae
L
1938
1939 if (converted_reloc)
1940 converted = TRUE;
6999821f
L
1941 }
1942
bedfd056 1943 if (! elf_x86_64_tls_transition (info, abfd, sec, contents,
351f65ca
L
1944 symtab_hdr, sym_hashes,
1945 &r_type, GOT_UNKNOWN,
bedfd056 1946 rel, rel_end, h, r_symndx, FALSE))
afd9acee 1947 goto error_return;
142411ca 1948
0afcef53 1949 eh = (struct elf_x86_link_hash_entry *) h;
bffbf940 1950 switch (r_type)
70256ad8 1951 {
bffbf940 1952 case R_X86_64_TLSLD:
0afcef53 1953 htab->tls_ld_or_ldm_got.refcount += 1;
bffbf940
JJ
1954 goto create_got;
1955
1956 case R_X86_64_TPOFF32:
0e1862bb 1957 if (!bfd_link_executable (info) && ABI_64_P (abfd))
aab921ad 1958 return elf_x86_64_need_pic (info, abfd, sec, h, symtab_hdr, isym,
338c190a 1959 &x86_64_elf_howto_table[r_type]);
aec6b87e
L
1960 if (eh != NULL)
1961 eh->has_got_reloc = 1;
bffbf940 1962 break;
c434dee6 1963
bffbf940 1964 case R_X86_64_GOTTPOFF:
0e1862bb 1965 if (!bfd_link_executable (info))
bffbf940
JJ
1966 info->flags |= DF_STATIC_TLS;
1967 /* Fall through */
70256ad8 1968
bffbf940
JJ
1969 case R_X86_64_GOT32:
1970 case R_X86_64_GOTPCREL:
56ceb5b5
L
1971 case R_X86_64_GOTPCRELX:
1972 case R_X86_64_REX_GOTPCRELX:
bffbf940 1973 case R_X86_64_TLSGD:
7b81dfbb
AJ
1974 case R_X86_64_GOT64:
1975 case R_X86_64_GOTPCREL64:
1976 case R_X86_64_GOTPLT64:
67a4f2b7
AO
1977 case R_X86_64_GOTPC32_TLSDESC:
1978 case R_X86_64_TLSDESC_CALL:
bffbf940
JJ
1979 /* This symbol requires a global offset table entry. */
1980 {
1981 int tls_type, old_tls_type;
1982
1983 switch (r_type)
1984 {
1985 default: tls_type = GOT_NORMAL; break;
1986 case R_X86_64_TLSGD: tls_type = GOT_TLS_GD; break;
1987 case R_X86_64_GOTTPOFF: tls_type = GOT_TLS_IE; break;
67a4f2b7
AO
1988 case R_X86_64_GOTPC32_TLSDESC:
1989 case R_X86_64_TLSDESC_CALL:
1990 tls_type = GOT_TLS_GDESC; break;
bffbf940
JJ
1991 }
1992
1993 if (h != NULL)
1994 {
1995 h->got.refcount += 1;
aec6b87e 1996 old_tls_type = eh->tls_type;
bffbf940
JJ
1997 }
1998 else
1999 {
2000 bfd_signed_vma *local_got_refcounts;
2001
2002 /* This is a global offset table entry for a local symbol. */
2003 local_got_refcounts = elf_local_got_refcounts (abfd);
2004 if (local_got_refcounts == NULL)
2005 {
2006 bfd_size_type size;
2007
2008 size = symtab_hdr->sh_info;
67a4f2b7
AO
2009 size *= sizeof (bfd_signed_vma)
2010 + sizeof (bfd_vma) + sizeof (char);
bffbf940
JJ
2011 local_got_refcounts = ((bfd_signed_vma *)
2012 bfd_zalloc (abfd, size));
2013 if (local_got_refcounts == NULL)
afd9acee 2014 goto error_return;
bffbf940 2015 elf_local_got_refcounts (abfd) = local_got_refcounts;
0afcef53 2016 elf_x86_local_tlsdesc_gotent (abfd)
67a4f2b7 2017 = (bfd_vma *) (local_got_refcounts + symtab_hdr->sh_info);
0afcef53 2018 elf_x86_local_got_tls_type (abfd)
67a4f2b7 2019 = (char *) (local_got_refcounts + 2 * symtab_hdr->sh_info);
bffbf940
JJ
2020 }
2021 local_got_refcounts[r_symndx] += 1;
2022 old_tls_type
0afcef53 2023 = elf_x86_local_got_tls_type (abfd) [r_symndx];
bffbf940
JJ
2024 }
2025
2026 /* If a TLS symbol is accessed using IE at least once,
2027 there is no point to use dynamic model for it. */
2028 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
67a4f2b7
AO
2029 && (! GOT_TLS_GD_ANY_P (old_tls_type)
2030 || tls_type != GOT_TLS_IE))
bffbf940 2031 {
67a4f2b7 2032 if (old_tls_type == GOT_TLS_IE && GOT_TLS_GD_ANY_P (tls_type))
bffbf940 2033 tls_type = old_tls_type;
67a4f2b7
AO
2034 else if (GOT_TLS_GD_ANY_P (old_tls_type)
2035 && GOT_TLS_GD_ANY_P (tls_type))
2036 tls_type |= old_tls_type;
bffbf940
JJ
2037 else
2038 {
09a24cbf 2039 if (h)
4c544807
L
2040 name = h->root.root.string;
2041 else
2042 name = bfd_elf_sym_name (abfd, symtab_hdr,
2043 isym, NULL);
4eca0228 2044 _bfd_error_handler
695344c0 2045 /* xgettext:c-format */
63a5468a
AM
2046 (_("%B: '%s' accessed both as normal and"
2047 " thread local symbol"),
4c544807 2048 abfd, name);
68c4a57e 2049 bfd_set_error (bfd_error_bad_value);
afd9acee 2050 goto error_return;
bffbf940
JJ
2051 }
2052 }
2053
2054 if (old_tls_type != tls_type)
2055 {
aec6b87e
L
2056 if (eh != NULL)
2057 eh->tls_type = tls_type;
bffbf940 2058 else
0afcef53 2059 elf_x86_local_got_tls_type (abfd) [r_symndx] = tls_type;
bffbf940
JJ
2060 }
2061 }
c434dee6
AJ
2062 /* Fall through */
2063
d6ab8113
JB
2064 case R_X86_64_GOTOFF64:
2065 case R_X86_64_GOTPC32:
7b81dfbb 2066 case R_X86_64_GOTPC64:
bffbf940 2067 create_got:
aec6b87e
L
2068 if (eh != NULL)
2069 eh->has_got_reloc = 1;
70256ad8
AJ
2070 break;
2071
2072 case R_X86_64_PLT32:
c3320543 2073 case R_X86_64_PLT32_BND:
70256ad8 2074 /* This symbol requires a procedure linkage table entry. We
407443a3
AJ
2075 actually build the entry in adjust_dynamic_symbol,
2076 because this might be a case of linking PIC code which is
2077 never referenced by a dynamic object, in which case we
2078 don't need to generate a procedure linkage table entry
2079 after all. */
70256ad8
AJ
2080
2081 /* If this is a local symbol, we resolve it directly without
407443a3 2082 creating a procedure linkage table entry. */
70256ad8
AJ
2083 if (h == NULL)
2084 continue;
2085
aec6b87e 2086 eh->has_got_reloc = 1;
f5385ebf 2087 h->needs_plt = 1;
51b64d56 2088 h->plt.refcount += 1;
70256ad8
AJ
2089 break;
2090
7b81dfbb
AJ
2091 case R_X86_64_PLTOFF64:
2092 /* This tries to form the 'address' of a function relative
2093 to GOT. For global symbols we need a PLT entry. */
2094 if (h != NULL)
2095 {
2096 h->needs_plt = 1;
2097 h->plt.refcount += 1;
2098 }
2099 goto create_got;
2100
6a3e1bae
L
2101 case R_X86_64_SIZE32:
2102 case R_X86_64_SIZE64:
06a6a421 2103 size_reloc = TRUE;
6a3e1bae
L
2104 goto do_size;
2105
248775ba
L
2106 case R_X86_64_32:
2107 if (!ABI_64_P (abfd))
2108 goto pointer;
1a0670f3 2109 /* Fall through. */
cc78d0af
AJ
2110 case R_X86_64_8:
2111 case R_X86_64_16:
70256ad8 2112 case R_X86_64_32S:
338c190a
L
2113 /* Check relocation overflow as these relocs may lead to
2114 run-time relocation overflow. Don't error out for
1b71fb54 2115 sections we don't care about, such as debug sections or
338c190a 2116 when relocation overflow check is disabled. */
4c10bbaa 2117 if (!info->no_reloc_overflow_check
6999821f 2118 && !converted_reloc
338c190a
L
2119 && (bfd_link_pic (info)
2120 || (bfd_link_executable (info)
2121 && h != NULL
2122 && !h->def_regular
2123 && h->def_dynamic
081b1afe 2124 && (sec->flags & SEC_READONLY) == 0)))
aab921ad 2125 return elf_x86_64_need_pic (info, abfd, sec, h, symtab_hdr, isym,
338c190a 2126 &x86_64_elf_howto_table[r_type]);
1b71fb54
AJ
2127 /* Fall through. */
2128
c434dee6
AJ
2129 case R_X86_64_PC8:
2130 case R_X86_64_PC16:
70256ad8 2131 case R_X86_64_PC32:
c3320543 2132 case R_X86_64_PC32_BND:
d6ab8113 2133 case R_X86_64_PC64:
1b71fb54 2134 case R_X86_64_64:
248775ba 2135pointer:
aec6b87e
L
2136 if (eh != NULL && (sec->flags & SEC_CODE) != 0)
2137 eh->has_non_got_reloc = 1;
bf52d7c7
L
2138 /* We are called after all symbols have been resolved. Only
2139 relocation against STT_GNU_IFUNC symbol must go through
2140 PLT. */
d1ed1c7d
L
2141 if (h != NULL
2142 && (bfd_link_executable (info)
bf52d7c7 2143 || h->type == STT_GNU_IFUNC))
c434dee6
AJ
2144 {
2145 /* If this reloc is in a read-only section, we might
2146 need a copy reloc. We can't check reliably at this
2147 stage whether the section is read-only, as input
2148 sections have not yet been mapped to output sections.
2149 Tentatively set the flag for now, and correct in
2150 adjust_dynamic_symbol. */
f5385ebf 2151 h->non_got_ref = 1;
c434dee6 2152
233cc9c1
L
2153 /* We may need a .plt entry if the symbol is a function
2154 defined in a shared lib or is a STT_GNU_IFUNC function
2155 referenced from the code or read-only section. */
34bb2571
L
2156 if (!h->def_regular
2157 || (sec->flags & (SEC_CODE | SEC_READONLY)) != 0)
233cc9c1
L
2158 h->plt.refcount += 1;
2159
5db4f0d3
L
2160 if (r_type == R_X86_64_PC32)
2161 {
2162 /* Since something like ".long foo - ." may be used
2163 as pointer, make sure that PLT is used if foo is
2164 a function defined in a shared library. */
2165 if ((sec->flags & SEC_CODE) == 0)
2166 h->pointer_equality_needed = 1;
2167 }
2168 else if (r_type != R_X86_64_PC32_BND
2169 && r_type != R_X86_64_PC64)
04ebc307
L
2170 {
2171 h->pointer_equality_needed = 1;
2172 /* At run-time, R_X86_64_64 can be resolved for both
2173 x86-64 and x32. But R_X86_64_32 and R_X86_64_32S
2174 can only be resolved for x32. */
2175 if ((sec->flags & SEC_READONLY) == 0
2176 && (r_type == R_X86_64_64
2177 || (!ABI_64_P (abfd)
2178 && (r_type == R_X86_64_32
2179 || r_type == R_X86_64_32S))))
aec6b87e 2180 eh->func_pointer_refcount += 1;
04ebc307 2181 }
c434dee6 2182 }
70256ad8 2183
06a6a421 2184 size_reloc = FALSE;
6a3e1bae 2185do_size:
daf1c414
L
2186 if (NEED_DYNAMIC_RELOCATION_P (info, h, sec, r_type,
2187 htab->pointer_r_type))
70256ad8 2188 {
e03a8ed8
L
2189 struct elf_dyn_relocs *p;
2190 struct elf_dyn_relocs **head;
c434dee6
AJ
2191
2192 /* We must copy these reloc types into the output file.
2193 Create a reloc section in dynobj and make room for
2194 this reloc. */
70256ad8
AJ
2195 if (sreloc == NULL)
2196 {
83bac4b0 2197 sreloc = _bfd_elf_make_dynamic_reloc_section
82e96e07
L
2198 (sec, htab->elf.dynobj, ABI_64_P (abfd) ? 3 : 2,
2199 abfd, /*rela?*/ TRUE);
70256ad8 2200
70256ad8 2201 if (sreloc == NULL)
afd9acee 2202 goto error_return;
70256ad8
AJ
2203 }
2204
c434dee6
AJ
2205 /* If this is a global symbol, we count the number of
2206 relocations we need for this symbol. */
2207 if (h != NULL)
aec6b87e 2208 head = &eh->dyn_relocs;
c434dee6
AJ
2209 else
2210 {
2211 /* Track dynamic relocs needed for local syms too.
2212 We really need local syms available to do this
2213 easily. Oh well. */
c434dee6 2214 asection *s;
87d72d41 2215 void **vpp;
87d72d41
AM
2216
2217 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
2218 abfd, r_symndx);
2219 if (isym == NULL)
afd9acee 2220 goto error_return;
87d72d41
AM
2221
2222 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
c434dee6 2223 if (s == NULL)
87d72d41 2224 s = sec;
70256ad8 2225
e81d3500
DD
2226 /* Beware of type punned pointers vs strict aliasing
2227 rules. */
2228 vpp = &(elf_section_data (s)->local_dynrel);
e03a8ed8 2229 head = (struct elf_dyn_relocs **)vpp;
c434dee6 2230 }
70256ad8 2231
c434dee6
AJ
2232 p = *head;
2233 if (p == NULL || p->sec != sec)
2234 {
2235 bfd_size_type amt = sizeof *p;
d8045f23 2236
e03a8ed8 2237 p = ((struct elf_dyn_relocs *)
c434dee6 2238 bfd_alloc (htab->elf.dynobj, amt));
70256ad8 2239 if (p == NULL)
afd9acee 2240 goto error_return;
c434dee6
AJ
2241 p->next = *head;
2242 *head = p;
2243 p->sec = sec;
2244 p->count = 0;
2245 p->pc_count = 0;
70256ad8 2246 }
c434dee6
AJ
2247
2248 p->count += 1;
06a6a421 2249 /* Count size relocation as PC-relative relocation. */
daf1c414 2250 if (X86_PCREL_TYPE_P (r_type) || size_reloc)
c434dee6 2251 p->pc_count += 1;
70256ad8
AJ
2252 }
2253 break;
fe4770f4
AJ
2254
2255 /* This relocation describes the C++ object vtable hierarchy.
2256 Reconstruct it for later use during GC. */
2257 case R_X86_64_GNU_VTINHERIT:
c152c796 2258 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
afd9acee 2259 goto error_return;
fe4770f4
AJ
2260 break;
2261
2262 /* This relocation describes which C++ vtable entries are actually
2263 used. Record for later use during GC. */
2264 case R_X86_64_GNU_VTENTRY:
d17e0c6e
JB
2265 BFD_ASSERT (h != NULL);
2266 if (h != NULL
2267 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
afd9acee 2268 goto error_return;
fe4770f4 2269 break;
c434dee6
AJ
2270
2271 default:
2272 break;
70256ad8
AJ
2273 }
2274 }
2275
bedfd056
L
2276 if (elf_section_data (sec)->this_hdr.contents != contents)
2277 {
5e5e02ae 2278 if (!converted && !info->keep_memory)
bedfd056
L
2279 free (contents);
2280 else
2281 {
5e5e02ae
L
2282 /* Cache the section contents for elf_link_input_bfd if any
2283 load is converted or --no-keep-memory isn't used. */
bedfd056
L
2284 elf_section_data (sec)->this_hdr.contents = contents;
2285 }
2286 }
2287
5e5e02ae
L
2288 /* Cache relocations if any load is converted. */
2289 if (elf_section_data (sec)->relocs != relocs && converted)
2290 elf_section_data (sec)->relocs = (Elf_Internal_Rela *) relocs;
2291
b34976b6 2292 return TRUE;
afd9acee
L
2293
2294error_return:
bedfd056
L
2295 if (elf_section_data (sec)->this_hdr.contents != contents)
2296 free (contents);
afd9acee
L
2297 sec->check_relocs_failed = 1;
2298 return FALSE;
70256ad8
AJ
2299}
2300
bffbf940
JJ
2301/* Return the relocation value for @tpoff relocation
2302 if STT_TLS virtual address is ADDRESS. */
2303
2304static bfd_vma
351f65ca 2305elf_x86_64_tpoff (struct bfd_link_info *info, bfd_vma address)
bffbf940 2306{
e1918d23 2307 struct elf_link_hash_table *htab = elf_hash_table (info);
7dc98aea
RO
2308 const struct elf_backend_data *bed = get_elf_backend_data (info->output_bfd);
2309 bfd_vma static_tls_size;
bffbf940
JJ
2310
2311 /* If tls_segment is NULL, we should have signalled an error already. */
e1918d23 2312 if (htab->tls_sec == NULL)
bffbf940 2313 return 0;
7dc98aea
RO
2314
2315 /* Consider special static TLS alignment requirements. */
2316 static_tls_size = BFD_ALIGN (htab->tls_size, bed->static_tls_alignment);
2317 return address - static_tls_size - htab->tls_sec->vma;
bffbf940
JJ
2318}
2319
90f487df
L
2320/* Is the instruction before OFFSET in CONTENTS a 32bit relative
2321 branch? */
2322
2323static bfd_boolean
2324is_32bit_relative_branch (bfd_byte *contents, bfd_vma offset)
2325{
2326 /* Opcode Instruction
2327 0xe8 call
2328 0xe9 jump
2329 0x0f 0x8x conditional jump */
2330 return ((offset > 0
2331 && (contents [offset - 1] == 0xe8
2332 || contents [offset - 1] == 0xe9))
2333 || (offset > 1
2334 && contents [offset - 2] == 0x0f
2335 && (contents [offset - 1] & 0xf0) == 0x80));
2336}
2337
8d88c4ca
NC
2338/* Relocate an x86_64 ELF section. */
2339
b34976b6 2340static bfd_boolean
351f65ca
L
2341elf_x86_64_relocate_section (bfd *output_bfd,
2342 struct bfd_link_info *info,
2343 bfd *input_bfd,
2344 asection *input_section,
2345 bfd_byte *contents,
2346 Elf_Internal_Rela *relocs,
2347 Elf_Internal_Sym *local_syms,
2348 asection **local_sections)
8d88c4ca 2349{
0afcef53 2350 struct elf_x86_link_hash_table *htab;
8d88c4ca
NC
2351 Elf_Internal_Shdr *symtab_hdr;
2352 struct elf_link_hash_entry **sym_hashes;
2353 bfd_vma *local_got_offsets;
67a4f2b7 2354 bfd_vma *local_tlsdesc_gotents;
c434dee6 2355 Elf_Internal_Rela *rel;
60f2e42e 2356 Elf_Internal_Rela *wrel;
8d88c4ca 2357 Elf_Internal_Rela *relend;
38b12349 2358 unsigned int plt_entry_size;
8d88c4ca 2359
338c190a
L
2360 /* Skip if check_relocs failed. */
2361 if (input_section->check_relocs_failed)
2362 return FALSE;
2363
0afcef53 2364 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
4dfe6ac6
NC
2365 if (htab == NULL)
2366 return FALSE;
fe53b4a4
L
2367
2368 BFD_ASSERT (is_x86_elf (input_bfd, htab));
2369
765e526c 2370 plt_entry_size = htab->plt.plt_entry_size;
0ffa91dd 2371 symtab_hdr = &elf_symtab_hdr (input_bfd);
8d88c4ca
NC
2372 sym_hashes = elf_sym_hashes (input_bfd);
2373 local_got_offsets = elf_local_got_offsets (input_bfd);
0afcef53 2374 local_tlsdesc_gotents = elf_x86_local_tlsdesc_gotent (input_bfd);
8d88c4ca 2375
0afcef53 2376 _bfd_x86_elf_set_tls_module_base (info);
9f03412a 2377
60f2e42e 2378 rel = wrel = relocs;
8d88c4ca 2379 relend = relocs + input_section->reloc_count;
60f2e42e 2380 for (; rel < relend; wrel++, rel++)
8d88c4ca 2381 {
419414ea 2382 unsigned int r_type, r_type_tls;
8d88c4ca
NC
2383 reloc_howto_type *howto;
2384 unsigned long r_symndx;
2385 struct elf_link_hash_entry *h;
0afcef53 2386 struct elf_x86_link_hash_entry *eh;
8d88c4ca
NC
2387 Elf_Internal_Sym *sym;
2388 asection *sec;
0ff2b86e 2389 bfd_vma off, offplt, plt_offset;
8d88c4ca 2390 bfd_vma relocation;
b34976b6 2391 bfd_boolean unresolved_reloc;
8d88c4ca 2392 bfd_reloc_status_type r;
bffbf940 2393 int tls_type;
0ff2b86e 2394 asection *base_got, *resolved_plt;
1788fc08 2395 bfd_vma st_size;
aec6b87e 2396 bfd_boolean resolved_to_zero;
9e9821dd 2397 bfd_boolean relative_reloc;
78984959 2398 bfd_boolean converted_reloc;
aebcc8ff 2399 bfd_boolean need_copy_reloc_in_pie;
8d88c4ca 2400
351f65ca 2401 r_type = ELF32_R_TYPE (rel->r_info);
fe4770f4
AJ
2402 if (r_type == (int) R_X86_64_GNU_VTINHERIT
2403 || r_type == (int) R_X86_64_GNU_VTENTRY)
18954b29
L
2404 {
2405 if (wrel != rel)
2406 *wrel = *rel;
2407 continue;
2408 }
8d88c4ca 2409
78984959
L
2410 converted_reloc = (r_type & R_X86_64_converted_reloc_bit) != 0;
2411 r_type &= ~R_X86_64_converted_reloc_bit;
2412
9911c0fc 2413 if (r_type >= (int) R_X86_64_standard)
47aeb64c 2414 return _bfd_unrecognized_reloc (input_bfd, input_section, r_type);
8d88c4ca 2415
d7921315 2416 if (r_type != (int) R_X86_64_32
eed180f8 2417 || ABI_64_P (output_bfd))
d7921315
L
2418 howto = x86_64_elf_howto_table + r_type;
2419 else
2420 howto = (x86_64_elf_howto_table
2421 + ARRAY_SIZE (x86_64_elf_howto_table) - 1);
351f65ca 2422 r_symndx = htab->r_sym (rel->r_info);
8d88c4ca
NC
2423 h = NULL;
2424 sym = NULL;
2425 sec = NULL;
b34976b6 2426 unresolved_reloc = FALSE;
8d88c4ca 2427 if (r_symndx < symtab_hdr->sh_info)
8da6118f
KH
2428 {
2429 sym = local_syms + r_symndx;
2430 sec = local_sections[r_symndx];
c434dee6 2431
c25bc9fc
L
2432 relocation = _bfd_elf_rela_local_sym (output_bfd, sym,
2433 &sec, rel);
1788fc08 2434 st_size = sym->st_size;
c25bc9fc
L
2435
2436 /* Relocate against local STT_GNU_IFUNC symbol. */
0e1862bb 2437 if (!bfd_link_relocatable (info)
351f65ca 2438 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
c25bc9fc 2439 {
0afcef53
L
2440 h = _bfd_elf_x86_get_local_sym_hash (htab, input_bfd,
2441 rel, FALSE);
c25bc9fc
L
2442 if (h == NULL)
2443 abort ();
2444
eed180f8 2445 /* Set STT_GNU_IFUNC symbol value. */
c25bc9fc
L
2446 h->root.u.def.value = sym->st_value;
2447 h->root.u.def.section = sec;
2448 }
8da6118f 2449 }
8d88c4ca 2450 else
8da6118f 2451 {
c9736ba0 2452 bfd_boolean warned ATTRIBUTE_UNUSED;
62d887d4 2453 bfd_boolean ignored ATTRIBUTE_UNUSED;
c434dee6 2454
b2a8e766
AM
2455 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2456 r_symndx, symtab_hdr, sym_hashes,
2457 h, sec, relocation,
62d887d4 2458 unresolved_reloc, warned, ignored);
1788fc08 2459 st_size = h->size;
8da6118f 2460 }
ab96bf03 2461
dbaa2011 2462 if (sec != NULL && discarded_section (sec))
60f2e42e
L
2463 {
2464 _bfd_clear_contents (howto, input_bfd, input_section,
2465 contents + rel->r_offset);
2466 wrel->r_offset = rel->r_offset;
2467 wrel->r_info = 0;
2468 wrel->r_addend = 0;
2469
2470 /* For ld -r, remove relocations in debug sections against
2471 sections defined in discarded sections. Not done for
2472 eh_frame editing code expects to be present. */
2473 if (bfd_link_relocatable (info)
2474 && (input_section->flags & SEC_DEBUGGING))
2475 wrel--;
2476
2477 continue;
2478 }
ab96bf03 2479
0e1862bb 2480 if (bfd_link_relocatable (info))
2d5da473
L
2481 {
2482 if (wrel != rel)
2483 *wrel = *rel;
2484 continue;
2485 }
ab96bf03 2486
1788fc08 2487 if (rel->r_addend == 0 && !ABI_64_P (output_bfd))
64d25c44 2488 {
1788fc08
L
2489 if (r_type == R_X86_64_64)
2490 {
2491 /* For x32, treat R_X86_64_64 like R_X86_64_32 and
2492 zero-extend it to 64bit if addend is zero. */
2493 r_type = R_X86_64_32;
2494 memset (contents + rel->r_offset + 4, 0, 4);
2495 }
2496 else if (r_type == R_X86_64_SIZE64)
2497 {
2498 /* For x32, treat R_X86_64_SIZE64 like R_X86_64_SIZE32 and
2499 zero-extend it to 64bit if addend is zero. */
2500 r_type = R_X86_64_SIZE32;
2501 memset (contents + rel->r_offset + 4, 0, 4);
2502 }
64d25c44
L
2503 }
2504
0afcef53 2505 eh = (struct elf_x86_link_hash_entry *) h;
0ff2b86e 2506
cbe950e9
L
2507 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle
2508 it here if it is defined in a non-shared object. */
2509 if (h != NULL
2510 && h->type == STT_GNU_IFUNC
2511 && h->def_regular)
2512 {
cbe950e9 2513 bfd_vma plt_index;
4c544807 2514 const char *name;
cbe950e9 2515
97dc35c8
L
2516 if ((input_section->flags & SEC_ALLOC) == 0)
2517 {
2518 /* Dynamic relocs are not propagated for SEC_DEBUGGING
2519 sections because such sections are not SEC_ALLOC and
2520 thus ld.so will not process them. */
2521 if ((input_section->flags & SEC_DEBUGGING) != 0)
0eace210 2522 continue;
97dc35c8
L
2523 abort ();
2524 }
233cc9c1
L
2525
2526 switch (r_type)
2527 {
2528 default:
2529 break;
2530
2531 case R_X86_64_GOTPCREL:
2532 case R_X86_64_GOTPCRELX:
2533 case R_X86_64_REX_GOTPCRELX:
2534 case R_X86_64_GOTPCREL64:
2535 base_got = htab->elf.sgot;
2536 off = h->got.offset;
2537
2538 if (base_got == NULL)
2539 abort ();
2540
2541 if (off == (bfd_vma) -1)
2542 {
2543 /* We can't use h->got.offset here to save state, or
2544 even just remember the offset, as finish_dynamic_symbol
2545 would use that as offset into .got. */
2546
2547 if (h->plt.offset == (bfd_vma) -1)
2548 abort ();
2549
2550 if (htab->elf.splt != NULL)
2551 {
38b12349 2552 plt_index = (h->plt.offset / plt_entry_size
765e526c 2553 - htab->plt.has_plt0);
233cc9c1
L
2554 off = (plt_index + 3) * GOT_ENTRY_SIZE;
2555 base_got = htab->elf.sgotplt;
2556 }
2557 else
2558 {
2559 plt_index = h->plt.offset / plt_entry_size;
2560 off = plt_index * GOT_ENTRY_SIZE;
2561 base_got = htab->elf.igotplt;
2562 }
2563
2564 if (h->dynindx == -1
2565 || h->forced_local
2566 || info->symbolic)
2567 {
2568 /* This references the local defitionion. We must
2569 initialize this entry in the global offset table.
2570 Since the offset must always be a multiple of 8,
2571 we use the least significant bit to record
2572 whether we have initialized it already.
2573
2574 When doing a dynamic link, we create a .rela.got
2575 relocation entry to initialize the value. This
2576 is done in the finish_dynamic_symbol routine. */
2577 if ((off & 1) != 0)
2578 off &= ~1;
2579 else
2580 {
2581 bfd_put_64 (output_bfd, relocation,
2582 base_got->contents + off);
2583 /* Note that this is harmless for the GOTPLT64
2584 case, as -1 | 1 still is -1. */
2585 h->got.offset |= 1;
2586 }
2587 }
2588 }
2589
2590 relocation = (base_got->output_section->vma
2591 + base_got->output_offset + off);
2592
2593 goto do_relocation;
2594 }
2595
2596 if (h->plt.offset == (bfd_vma) -1)
2597 {
2598 /* Handle static pointers of STT_GNU_IFUNC symbols. */
2599 if (r_type == htab->pointer_r_type
2600 && (input_section->flags & SEC_CODE) == 0)
2601 goto do_ifunc_pointer;
2602 goto bad_ifunc_reloc;
2603 }
cbe950e9
L
2604
2605 /* STT_GNU_IFUNC symbol must go through PLT. */
0ff2b86e
L
2606 if (htab->elf.splt != NULL)
2607 {
f2c29a16 2608 if (htab->plt_second != NULL)
0ff2b86e 2609 {
f2c29a16
L
2610 resolved_plt = htab->plt_second;
2611 plt_offset = eh->plt_second.offset;
0ff2b86e
L
2612 }
2613 else
2614 {
2615 resolved_plt = htab->elf.splt;
2616 plt_offset = h->plt.offset;
2617 }
2618 }
2619 else
2620 {
2621 resolved_plt = htab->elf.iplt;
2622 plt_offset = h->plt.offset;
2623 }
2624
2625 relocation = (resolved_plt->output_section->vma
2626 + resolved_plt->output_offset + plt_offset);
cbe950e9
L
2627
2628 switch (r_type)
2629 {
2630 default:
233cc9c1 2631bad_ifunc_reloc:
4c544807
L
2632 if (h->root.root.string)
2633 name = h->root.root.string;
2634 else
2635 name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym,
2636 NULL);
4eca0228 2637 _bfd_error_handler
695344c0 2638 /* xgettext:c-format */
cbe950e9 2639 (_("%B: relocation %s against STT_GNU_IFUNC "
233cc9c1
L
2640 "symbol `%s' isn't supported"), input_bfd,
2641 howto->name, name);
cbe950e9
L
2642 bfd_set_error (bfd_error_bad_value);
2643 return FALSE;
2644
2645 case R_X86_64_32S:
0e1862bb 2646 if (bfd_link_pic (info))
cbe950e9 2647 abort ();
710ab287
L
2648 goto do_relocation;
2649
248775ba
L
2650 case R_X86_64_32:
2651 if (ABI_64_P (output_bfd))
2652 goto do_relocation;
17672001 2653 /* FALLTHROUGH */
eed180f8 2654 case R_X86_64_64:
233cc9c1 2655do_ifunc_pointer:
710ab287
L
2656 if (rel->r_addend != 0)
2657 {
4c544807
L
2658 if (h->root.root.string)
2659 name = h->root.root.string;
2660 else
2661 name = bfd_elf_sym_name (input_bfd, symtab_hdr,
2662 sym, NULL);
4eca0228 2663 _bfd_error_handler
695344c0 2664 /* xgettext:c-format */
710ab287 2665 (_("%B: relocation %s against STT_GNU_IFUNC "
d42c267e 2666 "symbol `%s' has non-zero addend: %Ld"),
ef77d6af 2667 input_bfd, howto->name, name, rel->r_addend);
710ab287
L
2668 bfd_set_error (bfd_error_bad_value);
2669 return FALSE;
2670 }
2671
2672 /* Generate dynamic relcoation only when there is a
233cc9c1
L
2673 non-GOT reference in a shared object or there is no
2674 PLT. */
2675 if ((bfd_link_pic (info) && h->non_got_ref)
2676 || h->plt.offset == (bfd_vma) -1)
710ab287
L
2677 {
2678 Elf_Internal_Rela outrel;
710ab287
L
2679 asection *sreloc;
2680
c25bc9fc
L
2681 /* Need a dynamic relocation to get the real function
2682 address. */
710ab287
L
2683 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2684 info,
2685 input_section,
2686 rel->r_offset);
2687 if (outrel.r_offset == (bfd_vma) -1
2688 || outrel.r_offset == (bfd_vma) -2)
2689 abort ();
2690
2691 outrel.r_offset += (input_section->output_section->vma
2692 + input_section->output_offset);
2693
cf1070f1 2694 if (POINTER_LOCAL_IFUNC_P (info, h))
710ab287 2695 {
6322e5c5
L
2696 info->callbacks->minfo (_("Local IFUNC function `%s' in %B\n"),
2697 h->root.root.string,
2698 h->root.u.def.section->owner);
2699
710ab287 2700 /* This symbol is resolved locally. */
56b8aada
L
2701 outrel.r_info = htab->r_info (0, R_X86_64_IRELATIVE);
2702 outrel.r_addend = (h->root.u.def.value
2703 + h->root.u.def.section->output_section->vma
2704 + h->root.u.def.section->output_offset);
710ab287
L
2705 }
2706 else
2707 {
351f65ca 2708 outrel.r_info = htab->r_info (h->dynindx, r_type);
710ab287
L
2709 outrel.r_addend = 0;
2710 }
2711
233cc9c1
L
2712 /* Dynamic relocations are stored in
2713 1. .rela.ifunc section in PIC object.
2714 2. .rela.got section in dynamic executable.
2715 3. .rela.iplt section in static executable. */
2716 if (bfd_link_pic (info))
2717 sreloc = htab->elf.irelifunc;
2718 else if (htab->elf.splt != NULL)
2719 sreloc = htab->elf.srelgot;
2720 else
2721 sreloc = htab->elf.irelplt;
351f65ca 2722 elf_append_rela (output_bfd, sreloc, &outrel);
710ab287
L
2723
2724 /* If this reloc is against an external symbol, we
2725 do not want to fiddle with the addend. Otherwise,
2726 we need to include the symbol value so that it
2727 becomes an addend for the dynamic reloc. For an
2728 internal symbol, we have updated addend. */
56b8aada 2729 continue;
710ab287 2730 }
17672001 2731 /* FALLTHROUGH */
cbe950e9 2732 case R_X86_64_PC32:
c3320543 2733 case R_X86_64_PC32_BND:
cbe950e9
L
2734 case R_X86_64_PC64:
2735 case R_X86_64_PLT32:
c3320543 2736 case R_X86_64_PLT32_BND:
cbe950e9 2737 goto do_relocation;
cbe950e9
L
2738 }
2739 }
2740
aec6b87e 2741 resolved_to_zero = (eh != NULL
c5bce5c6 2742 && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh));
aec6b87e 2743
70256ad8
AJ
2744 /* When generating a shared object, the relocations handled here are
2745 copied into the output file to be resolved at run time. */
2746 switch (r_type)
2747 {
2748 case R_X86_64_GOT32:
7b81dfbb 2749 case R_X86_64_GOT64:
70256ad8
AJ
2750 /* Relocation is to the entry for this symbol in the global
2751 offset table. */
70256ad8 2752 case R_X86_64_GOTPCREL:
56ceb5b5
L
2753 case R_X86_64_GOTPCRELX:
2754 case R_X86_64_REX_GOTPCRELX:
7b81dfbb
AJ
2755 case R_X86_64_GOTPCREL64:
2756 /* Use global offset table entry as symbol value. */
2757 case R_X86_64_GOTPLT64:
de194d85 2758 /* This is obsolete and treated the same as GOT64. */
6de2ae4a 2759 base_got = htab->elf.sgot;
7b81dfbb 2760
6de2ae4a 2761 if (htab->elf.sgot == NULL)
c434dee6 2762 abort ();
053579d7 2763
9e9821dd 2764 relative_reloc = FALSE;
51e0a107 2765 if (h != NULL)
70256ad8 2766 {
c434dee6 2767 off = h->got.offset;
7b81dfbb 2768 if (h->needs_plt
eed180f8 2769 && h->plt.offset != (bfd_vma)-1
7b81dfbb
AJ
2770 && off == (bfd_vma)-1)
2771 {
2772 /* We can't use h->got.offset here to save
2773 state, or even just remember the offset, as
2774 finish_dynamic_symbol would use that as offset into
2775 .got. */
38b12349 2776 bfd_vma plt_index = (h->plt.offset / plt_entry_size
765e526c 2777 - htab->plt.has_plt0);
7b81dfbb 2778 off = (plt_index + 3) * GOT_ENTRY_SIZE;
6de2ae4a 2779 base_got = htab->elf.sgotplt;
7b81dfbb
AJ
2780 }
2781
2eba97c2 2782 if (RESOLVED_LOCALLY_P (info, h, htab))
51e0a107 2783 {
2eba97c2
L
2784 /* We must initialize this entry in the global offset
2785 table. Since the offset must always be a multiple
2786 of 8, we use the least significant bit to record
2787 whether we have initialized it already.
51e0a107
JH
2788
2789 When doing a dynamic link, we create a .rela.got
407443a3
AJ
2790 relocation entry to initialize the value. This is
2791 done in the finish_dynamic_symbol routine. */
51e0a107
JH
2792 if ((off & 1) != 0)
2793 off &= ~1;
2794 else
2795 {
2796 bfd_put_64 (output_bfd, relocation,
7b81dfbb
AJ
2797 base_got->contents + off);
2798 /* Note that this is harmless for the GOTPLT64 case,
eed180f8 2799 as -1 | 1 still is -1. */
51e0a107 2800 h->got.offset |= 1;
9e9821dd 2801
f70656b2 2802 if (GENERATE_RELATIVE_RELOC_P (info, h))
9e9821dd
L
2803 {
2804 /* If this symbol isn't dynamic in PIC,
2805 generate R_X86_64_RELATIVE here. */
2806 eh->no_finish_dynamic_symbol = 1;
2807 relative_reloc = TRUE;
2808 }
51e0a107
JH
2809 }
2810 }
053579d7 2811 else
b34976b6 2812 unresolved_reloc = FALSE;
70256ad8 2813 }
51e0a107
JH
2814 else
2815 {
c434dee6
AJ
2816 if (local_got_offsets == NULL)
2817 abort ();
51e0a107
JH
2818
2819 off = local_got_offsets[r_symndx];
2820
2821 /* The offset must always be a multiple of 8. We use
407443a3
AJ
2822 the least significant bit to record whether we have
2823 already generated the necessary reloc. */
51e0a107
JH
2824 if ((off & 1) != 0)
2825 off &= ~1;
2826 else
2827 {
c434dee6 2828 bfd_put_64 (output_bfd, relocation,
7b81dfbb 2829 base_got->contents + off);
9e9821dd 2830 local_got_offsets[r_symndx] |= 1;
51e0a107 2831
0e1862bb 2832 if (bfd_link_pic (info))
9e9821dd 2833 relative_reloc = TRUE;
51e0a107 2834 }
51e0a107 2835 }
6a2bda3f 2836
9e9821dd
L
2837 if (relative_reloc)
2838 {
2839 asection *s;
2840 Elf_Internal_Rela outrel;
2841
2842 /* We need to generate a R_X86_64_RELATIVE reloc
2843 for the dynamic linker. */
2844 s = htab->elf.srelgot;
2845 if (s == NULL)
2846 abort ();
2847
2848 outrel.r_offset = (base_got->output_section->vma
2849 + base_got->output_offset
2850 + off);
2851 outrel.r_info = htab->r_info (0, R_X86_64_RELATIVE);
2852 outrel.r_addend = relocation;
2853 elf_append_rela (output_bfd, s, &outrel);
2854 }
2855
c434dee6
AJ
2856 if (off >= (bfd_vma) -2)
2857 abort ();
2858
7b81dfbb
AJ
2859 relocation = base_got->output_section->vma
2860 + base_got->output_offset + off;
56ceb5b5
L
2861 if (r_type != R_X86_64_GOTPCREL
2862 && r_type != R_X86_64_GOTPCRELX
2863 && r_type != R_X86_64_REX_GOTPCRELX
2864 && r_type != R_X86_64_GOTPCREL64)
6de2ae4a
L
2865 relocation -= htab->elf.sgotplt->output_section->vma
2866 - htab->elf.sgotplt->output_offset;
c434dee6 2867
70256ad8
AJ
2868 break;
2869
d6ab8113
JB
2870 case R_X86_64_GOTOFF64:
2871 /* Relocation is relative to the start of the global offset
2872 table. */
2873
3d949995
L
2874 /* Check to make sure it isn't a protected function or data
2875 symbol for shared library since it may not be local when
e3c0e327
L
2876 used as function address or with copy relocation. We also
2877 need to make sure that a symbol is referenced locally. */
0e1862bb 2878 if (bfd_link_pic (info) && h)
d6ab8113 2879 {
e3c0e327
L
2880 if (!h->def_regular)
2881 {
2882 const char *v;
2883
2884 switch (ELF_ST_VISIBILITY (h->other))
2885 {
2886 case STV_HIDDEN:
2887 v = _("hidden symbol");
2888 break;
2889 case STV_INTERNAL:
2890 v = _("internal symbol");
2891 break;
2892 case STV_PROTECTED:
2893 v = _("protected symbol");
2894 break;
2895 default:
2896 v = _("symbol");
2897 break;
2898 }
2899
4eca0228 2900 _bfd_error_handler
695344c0 2901 /* xgettext:c-format */
63a5468a
AM
2902 (_("%B: relocation R_X86_64_GOTOFF64 against undefined %s"
2903 " `%s' can not be used when making a shared object"),
e3c0e327
L
2904 input_bfd, v, h->root.root.string);
2905 bfd_set_error (bfd_error_bad_value);
2906 return FALSE;
2907 }
0e1862bb 2908 else if (!bfd_link_executable (info)
6999821f 2909 && !SYMBOL_REFERENCES_LOCAL_P (info, h)
e3c0e327
L
2910 && (h->type == STT_FUNC
2911 || h->type == STT_OBJECT)
2912 && ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
2913 {
4eca0228 2914 _bfd_error_handler
695344c0 2915 /* xgettext:c-format */
63a5468a
AM
2916 (_("%B: relocation R_X86_64_GOTOFF64 against protected %s"
2917 " `%s' can not be used when making a shared object"),
e3c0e327
L
2918 input_bfd,
2919 h->type == STT_FUNC ? "function" : "data",
2920 h->root.root.string);
2921 bfd_set_error (bfd_error_bad_value);
d6ab8113 2922 return FALSE;
e3c0e327 2923 }
d6ab8113
JB
2924 }
2925
2926 /* Note that sgot is not involved in this
2927 calculation. We always want the start of .got.plt. If we
2928 defined _GLOBAL_OFFSET_TABLE_ in a different way, as is
2929 permitted by the ABI, we might have to change this
2930 calculation. */
6de2ae4a
L
2931 relocation -= htab->elf.sgotplt->output_section->vma
2932 + htab->elf.sgotplt->output_offset;
d6ab8113
JB
2933 break;
2934
2935 case R_X86_64_GOTPC32:
7b81dfbb 2936 case R_X86_64_GOTPC64:
d6ab8113 2937 /* Use global offset table as symbol value. */
6de2ae4a
L
2938 relocation = htab->elf.sgotplt->output_section->vma
2939 + htab->elf.sgotplt->output_offset;
d6ab8113
JB
2940 unresolved_reloc = FALSE;
2941 break;
7b81dfbb
AJ
2942
2943 case R_X86_64_PLTOFF64:
2944 /* Relocation is PLT entry relative to GOT. For local
2945 symbols it's the symbol itself relative to GOT. */
eed180f8 2946 if (h != NULL
7b81dfbb 2947 /* See PLT32 handling. */
9d734efa
L
2948 && (h->plt.offset != (bfd_vma) -1
2949 || eh->plt_got.offset != (bfd_vma) -1)
6de2ae4a 2950 && htab->elf.splt != NULL)
7b81dfbb 2951 {
9d734efa
L
2952 if (eh->plt_got.offset != (bfd_vma) -1)
2953 {
2954 /* Use the GOT PLT. */
2955 resolved_plt = htab->plt_got;
2956 plt_offset = eh->plt_got.offset;
2957 }
f2c29a16 2958 else if (htab->plt_second != NULL)
0ff2b86e 2959 {
f2c29a16
L
2960 resolved_plt = htab->plt_second;
2961 plt_offset = eh->plt_second.offset;
0ff2b86e
L
2962 }
2963 else
2964 {
2965 resolved_plt = htab->elf.splt;
2966 plt_offset = h->plt.offset;
2967 }
2968
2969 relocation = (resolved_plt->output_section->vma
2970 + resolved_plt->output_offset
2971 + plt_offset);
7b81dfbb
AJ
2972 unresolved_reloc = FALSE;
2973 }
2974
6de2ae4a
L
2975 relocation -= htab->elf.sgotplt->output_section->vma
2976 + htab->elf.sgotplt->output_offset;
7b81dfbb 2977 break;
d6ab8113 2978
70256ad8 2979 case R_X86_64_PLT32:
c3320543 2980 case R_X86_64_PLT32_BND:
70256ad8
AJ
2981 /* Relocation is to the entry for this symbol in the
2982 procedure linkage table. */
2983
2984 /* Resolve a PLT32 reloc against a local symbol directly,
407443a3 2985 without using the procedure linkage table. */
70256ad8
AJ
2986 if (h == NULL)
2987 break;
2988
dd7e64d4
L
2989 if ((h->plt.offset == (bfd_vma) -1
2990 && eh->plt_got.offset == (bfd_vma) -1)
6de2ae4a 2991 || htab->elf.splt == NULL)
70256ad8
AJ
2992 {
2993 /* We didn't make a PLT entry for this symbol. This
407443a3
AJ
2994 happens when statically linking PIC code, or when
2995 using -Bsymbolic. */
70256ad8
AJ
2996 break;
2997 }
2998
dd7e64d4 2999 if (h->plt.offset != (bfd_vma) -1)
0ff2b86e 3000 {
f2c29a16 3001 if (htab->plt_second != NULL)
dd7e64d4 3002 {
f2c29a16
L
3003 resolved_plt = htab->plt_second;
3004 plt_offset = eh->plt_second.offset;
dd7e64d4
L
3005 }
3006 else
3007 {
3008 resolved_plt = htab->elf.splt;
3009 plt_offset = h->plt.offset;
3010 }
0ff2b86e
L
3011 }
3012 else
3013 {
dd7e64d4
L
3014 /* Use the GOT PLT. */
3015 resolved_plt = htab->plt_got;
3016 plt_offset = eh->plt_got.offset;
0ff2b86e
L
3017 }
3018
3019 relocation = (resolved_plt->output_section->vma
3020 + resolved_plt->output_offset
3021 + plt_offset);
b34976b6 3022 unresolved_reloc = FALSE;
70256ad8
AJ
3023 break;
3024
1788fc08
L
3025 case R_X86_64_SIZE32:
3026 case R_X86_64_SIZE64:
1788fc08
L
3027 /* Set to symbol size. */
3028 relocation = st_size;
3029 goto direct;
3030
fd8ab9e5
AJ
3031 case R_X86_64_PC8:
3032 case R_X86_64_PC16:
3033 case R_X86_64_PC32:
c3320543 3034 case R_X86_64_PC32_BND:
6333bc0d 3035 /* Don't complain about -fPIC if the symbol is undefined when
7073b5b9
L
3036 building executable unless it is unresolved weak symbol or
3037 -z nocopyreloc is used. */
aec6b87e 3038 if ((input_section->flags & SEC_ALLOC) != 0
90f487df 3039 && (input_section->flags & SEC_READONLY) != 0
6333bc0d 3040 && h != NULL
aec6b87e 3041 && ((bfd_link_executable (info)
7073b5b9
L
3042 && ((h->root.type == bfd_link_hash_undefweak
3043 && !resolved_to_zero)
a5b4ee94
L
3044 || ((info->nocopyreloc
3045 || (eh->def_protected
3046 && elf_has_no_copy_on_protected (h->root.u.def.section->owner)))
7073b5b9
L
3047 && h->def_dynamic
3048 && !(h->root.u.def.section->flags & SEC_CODE))))
c5bb8910 3049 || bfd_link_dll (info)))
6610a52d 3050 {
41bed6dd
L
3051 bfd_boolean fail = FALSE;
3052 bfd_boolean branch
c3320543
L
3053 = ((r_type == R_X86_64_PC32
3054 || r_type == R_X86_64_PC32_BND)
41bed6dd
L
3055 && is_32bit_relative_branch (contents, rel->r_offset));
3056
6999821f 3057 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
41bed6dd
L
3058 {
3059 /* Symbol is referenced locally. Make sure it is
3060 defined locally or for a branch. */
8170f769
L
3061 fail = (!(h->def_regular || ELF_COMMON_DEF_P (h))
3062 && !branch);
41bed6dd 3063 }
aec6b87e 3064 else if (!(bfd_link_pie (info)
bc696fd5 3065 && (h->needs_copy || eh->needs_copy)))
41bed6dd 3066 {
9a926d55
L
3067 /* Symbol doesn't need copy reloc and isn't referenced
3068 locally. We only allow branch to symbol with
3069 non-default visibility. */
41bed6dd
L
3070 fail = (!branch
3071 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT);
3072 }
3073
3074 if (fail)
aab921ad 3075 return elf_x86_64_need_pic (info, input_bfd, input_section,
338c190a 3076 h, NULL, NULL, howto);
6610a52d
L
3077 }
3078 /* Fall through. */
3079
70256ad8
AJ
3080 case R_X86_64_8:
3081 case R_X86_64_16:
3082 case R_X86_64_32:
d6ab8113 3083 case R_X86_64_PC64:
6b3db546 3084 case R_X86_64_64:
80643fbc 3085 /* FIXME: The ABI says the linker should make sure the value is
407443a3 3086 the same when it's zeroextended to 64 bit. */
c434dee6 3087
1788fc08 3088direct:
b1e24c02 3089 if ((input_section->flags & SEC_ALLOC) == 0)
c434dee6
AJ
3090 break;
3091
aebcc8ff
L
3092 need_copy_reloc_in_pie = (bfd_link_pie (info)
3093 && h != NULL
3094 && (h->needs_copy
3095 || eh->needs_copy
3096 || (h->root.type
3097 == bfd_link_hash_undefined))
3098 && (X86_PCREL_TYPE_P (r_type)
3099 || X86_SIZE_TYPE_P (r_type)));
3100
3101 if (GENERATE_DYNAMIC_RELOCATION_P (info, eh, r_type,
3102 need_copy_reloc_in_pie,
3103 resolved_to_zero, FALSE))
70256ad8
AJ
3104 {
3105 Elf_Internal_Rela outrel;
b34976b6 3106 bfd_boolean skip, relocate;
c434dee6 3107 asection *sreloc;
70256ad8
AJ
3108
3109 /* When generating a shared object, these relocations
3110 are copied into the output file to be resolved at run
407443a3 3111 time. */
b34976b6
AM
3112 skip = FALSE;
3113 relocate = FALSE;
70256ad8 3114
c629eae0
JJ
3115 outrel.r_offset =
3116 _bfd_elf_section_offset (output_bfd, info, input_section,
c434dee6 3117 rel->r_offset);
c629eae0 3118 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 3119 skip = TRUE;
0fb19cbc 3120 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 3121 skip = TRUE, relocate = TRUE;
70256ad8
AJ
3122
3123 outrel.r_offset += (input_section->output_section->vma
3124 + input_section->output_offset);
3125
3126 if (skip)
0bb2d96a 3127 memset (&outrel, 0, sizeof outrel);
c434dee6 3128
e74399c4 3129 else if (COPY_INPUT_RELOC_P (info, h, r_type))
70256ad8 3130 {
351f65ca 3131 outrel.r_info = htab->r_info (h->dynindx, r_type);
c434dee6 3132 outrel.r_addend = rel->r_addend;
70256ad8
AJ
3133 }
3134 else
3135 {
4c10bbaa
L
3136 /* This symbol is local, or marked to become local.
3137 When relocation overflow check is disabled, we
3138 convert R_X86_64_32 to dynamic R_X86_64_RELATIVE. */
3139 if (r_type == htab->pointer_r_type
3140 || (r_type == R_X86_64_32
3141 && info->no_reloc_overflow_check))
607c0e09 3142 {
b34976b6 3143 relocate = TRUE;
351f65ca 3144 outrel.r_info = htab->r_info (0, R_X86_64_RELATIVE);
607c0e09
AS
3145 outrel.r_addend = relocation + rel->r_addend;
3146 }
64d25c44
L
3147 else if (r_type == R_X86_64_64
3148 && !ABI_64_P (output_bfd))
3149 {
3150 relocate = TRUE;
3151 outrel.r_info = htab->r_info (0,
3152 R_X86_64_RELATIVE64);
3153 outrel.r_addend = relocation + rel->r_addend;
8cf0d2dd
L
3154 /* Check addend overflow. */
3155 if ((outrel.r_addend & 0x80000000)
3156 != (rel->r_addend & 0x80000000))
3157 {
3158 const char *name;
268a8d3a 3159 int addend = rel->r_addend;
8cf0d2dd
L
3160 if (h && h->root.root.string)
3161 name = h->root.root.string;
3162 else
3163 name = bfd_elf_sym_name (input_bfd, symtab_hdr,
3164 sym, NULL);
d42c267e
AM
3165 _bfd_error_handler
3166 /* xgettext:c-format */
3167 (_("%B: addend %s%#x in relocation %s against "
3168 "symbol `%s' at %#Lx in section `%A' is "
3169 "out of range"),
3170 input_bfd, addend < 0 ? "-" : "", addend,
3171 howto->name, name, rel->r_offset, input_section);
8cf0d2dd
L
3172 bfd_set_error (bfd_error_bad_value);
3173 return FALSE;
3174 }
64d25c44 3175 }
607c0e09
AS
3176 else
3177 {
3178 long sindx;
3179
8517fae7 3180 if (bfd_is_abs_section (sec))
607c0e09
AS
3181 sindx = 0;
3182 else if (sec == NULL || sec->owner == NULL)
3183 {
3184 bfd_set_error (bfd_error_bad_value);
b34976b6 3185 return FALSE;
607c0e09
AS
3186 }
3187 else
3188 {
3189 asection *osec;
3190
74541ad4
AM
3191 /* We are turning this relocation into one
3192 against a section symbol. It would be
3193 proper to subtract the symbol's value,
3194 osec->vma, from the emitted reloc addend,
3195 but ld.so expects buggy relocs. */
607c0e09
AS
3196 osec = sec->output_section;
3197 sindx = elf_section_data (osec)->dynindx;
74541ad4
AM
3198 if (sindx == 0)
3199 {
3200 asection *oi = htab->elf.text_index_section;
3201 sindx = elf_section_data (oi)->dynindx;
3202 }
3203 BFD_ASSERT (sindx != 0);
607c0e09
AS
3204 }
3205
351f65ca 3206 outrel.r_info = htab->r_info (sindx, r_type);
607c0e09
AS
3207 outrel.r_addend = relocation + rel->r_addend;
3208 }
70256ad8
AJ
3209 }
3210
cbe950e9 3211 sreloc = elf_section_data (input_section)->sreloc;
d8045f23 3212
62d78908
L
3213 if (sreloc == NULL || sreloc->contents == NULL)
3214 {
3215 r = bfd_reloc_notsupported;
3216 goto check_relocation_error;
3217 }
c434dee6 3218
351f65ca 3219 elf_append_rela (output_bfd, sreloc, &outrel);
70256ad8
AJ
3220
3221 /* If this reloc is against an external symbol, we do
3222 not want to fiddle with the addend. Otherwise, we
3223 need to include the symbol value so that it becomes
3224 an addend for the dynamic reloc. */
0f88be7a 3225 if (! relocate)
70256ad8
AJ
3226 continue;
3227 }
3228
3229 break;
3230
bffbf940 3231 case R_X86_64_TLSGD:
67a4f2b7
AO
3232 case R_X86_64_GOTPC32_TLSDESC:
3233 case R_X86_64_TLSDESC_CALL:
bffbf940 3234 case R_X86_64_GOTTPOFF:
bffbf940
JJ
3235 tls_type = GOT_UNKNOWN;
3236 if (h == NULL && local_got_offsets)
0afcef53 3237 tls_type = elf_x86_local_got_tls_type (input_bfd) [r_symndx];
bffbf940 3238 else if (h != NULL)
0afcef53 3239 tls_type = elf_x86_hash_entry (h)->tls_type;
142411ca 3240
419414ea 3241 r_type_tls = r_type;
351f65ca
L
3242 if (! elf_x86_64_tls_transition (info, input_bfd,
3243 input_section, contents,
3244 symtab_hdr, sym_hashes,
419414ea 3245 &r_type_tls, tls_type, rel,
bedfd056 3246 relend, h, r_symndx, TRUE))
534a31f6 3247 return FALSE;
bffbf940 3248
419414ea 3249 if (r_type_tls == R_X86_64_TPOFF32)
bffbf940 3250 {
142411ca
L
3251 bfd_vma roff = rel->r_offset;
3252
bffbf940 3253 BFD_ASSERT (! unresolved_reloc);
142411ca 3254
419414ea 3255 if (r_type == R_X86_64_TLSGD)
bffbf940 3256 {
52bc799a 3257 /* GD->LE transition. For 64bit, change
e2cbcd91
L
3258 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3259 .word 0x6666; rex64; call __tls_get_addr@PLT
3260 or
3261 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3262 .byte 0x66; rex64
3263 call *__tls_get_addr@GOTPCREL(%rip)
3264 which may be converted to
3265 addr32 call __tls_get_addr
52bc799a 3266 into:
e2cbcd91
L
3267 movq %fs:0, %rax
3268 leaq foo@tpoff(%rax), %rax
52bc799a 3269 For 32bit, change
e2cbcd91
L
3270 leaq foo@tlsgd(%rip), %rdi
3271 .word 0x6666; rex64; call __tls_get_addr@PLT
3272 or
3273 leaq foo@tlsgd(%rip), %rdi
3274 .byte 0x66; rex64
3275 call *__tls_get_addr@GOTPCREL(%rip)
3276 which may be converted to
3277 addr32 call __tls_get_addr
52bc799a 3278 into:
e2cbcd91
L
3279 movl %fs:0, %eax
3280 leaq foo@tpoff(%rax), %rax
5c98a14e 3281 For largepic, change:
e2cbcd91
L
3282 leaq foo@tlsgd(%rip), %rdi
3283 movabsq $__tls_get_addr@pltoff, %rax
3284 addq %r15, %rax
3285 call *%rax
5c98a14e 3286 into:
e2cbcd91
L
3287 movq %fs:0, %rax
3288 leaq foo@tpoff(%rax), %rax
3289 nopw 0x0(%rax,%rax,1) */
5c98a14e 3290 int largepic = 0;
e2cbcd91 3291 if (ABI_64_P (output_bfd))
5c98a14e 3292 {
e2cbcd91
L
3293 if (contents[roff + 5] == 0xb8)
3294 {
3295 memcpy (contents + roff - 3,
3296 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80"
3297 "\0\0\0\0\x66\x0f\x1f\x44\0", 22);
3298 largepic = 1;
3299 }
3300 else
3301 memcpy (contents + roff - 4,
3302 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
3303 16);
5c98a14e 3304 }
52bc799a
L
3305 else
3306 memcpy (contents + roff - 3,
3307 "\x64\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
3308 15);
eb4ff4d6 3309 bfd_put_32 (output_bfd,
351f65ca 3310 elf_x86_64_tpoff (info, relocation),
5c98a14e 3311 contents + roff + 8 + largepic);
e2cbcd91
L
3312 /* Skip R_X86_64_PC32, R_X86_64_PLT32,
3313 R_X86_64_GOTPCRELX and R_X86_64_PLTOFF64. */
bffbf940 3314 rel++;
60f2e42e 3315 wrel++;
bffbf940
JJ
3316 continue;
3317 }
419414ea 3318 else if (r_type == R_X86_64_GOTPC32_TLSDESC)
67a4f2b7
AO
3319 {
3320 /* GDesc -> LE transition.
3321 It's originally something like:
3322 leaq x@tlsdesc(%rip), %rax
3323
3324 Change it to:
c9736ba0 3325 movl $x@tpoff, %rax. */
67a4f2b7 3326
c9736ba0 3327 unsigned int val, type;
67a4f2b7 3328
67a4f2b7 3329 type = bfd_get_8 (input_bfd, contents + roff - 3);
67a4f2b7 3330 val = bfd_get_8 (input_bfd, contents + roff - 1);
67a4f2b7
AO
3331 bfd_put_8 (output_bfd, 0x48 | ((type >> 2) & 1),
3332 contents + roff - 3);
3333 bfd_put_8 (output_bfd, 0xc7, contents + roff - 2);
3334 bfd_put_8 (output_bfd, 0xc0 | ((val >> 3) & 7),
3335 contents + roff - 1);
eb4ff4d6 3336 bfd_put_32 (output_bfd,
351f65ca 3337 elf_x86_64_tpoff (info, relocation),
67a4f2b7
AO
3338 contents + roff);
3339 continue;
3340 }
419414ea 3341 else if (r_type == R_X86_64_TLSDESC_CALL)
67a4f2b7
AO
3342 {
3343 /* GDesc -> LE transition.
3344 It's originally:
3345 call *(%rax)
3346 Turn it into:
142411ca 3347 xchg %ax,%ax. */
10efb593 3348 bfd_put_8 (output_bfd, 0x66, contents + roff);
67a4f2b7
AO
3349 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3350 continue;
3351 }
419414ea 3352 else if (r_type == R_X86_64_GOTTPOFF)
bffbf940 3353 {
bffbf940 3354 /* IE->LE transition:
cf61b747 3355 For 64bit, originally it can be one of:
bffbf940
JJ
3356 movq foo@gottpoff(%rip), %reg
3357 addq foo@gottpoff(%rip), %reg
3358 We change it into:
3359 movq $foo, %reg
3360 leaq foo(%reg), %reg
cf61b747
L
3361 addq $foo, %reg.
3362 For 32bit, originally it can be one of:
3363 movq foo@gottpoff(%rip), %reg
3364 addl foo@gottpoff(%rip), %reg
3365 We change it into:
3366 movq $foo, %reg
3367 leal foo(%reg), %reg
3368 addl $foo, %reg. */
142411ca
L
3369
3370 unsigned int val, type, reg;
3371
cf61b747
L
3372 if (roff >= 3)
3373 val = bfd_get_8 (input_bfd, contents + roff - 3);
3374 else
3375 val = 0;
142411ca
L
3376 type = bfd_get_8 (input_bfd, contents + roff - 2);
3377 reg = bfd_get_8 (input_bfd, contents + roff - 1);
bffbf940 3378 reg >>= 3;
bffbf940
JJ
3379 if (type == 0x8b)
3380 {
3381 /* movq */
3382 if (val == 0x4c)
3383 bfd_put_8 (output_bfd, 0x49,
142411ca 3384 contents + roff - 3);
4a4c5f25
L
3385 else if (!ABI_64_P (output_bfd) && val == 0x44)
3386 bfd_put_8 (output_bfd, 0x41,
3387 contents + roff - 3);
bffbf940 3388 bfd_put_8 (output_bfd, 0xc7,
142411ca 3389 contents + roff - 2);
bffbf940 3390 bfd_put_8 (output_bfd, 0xc0 | reg,
142411ca 3391 contents + roff - 1);
bffbf940
JJ
3392 }
3393 else if (reg == 4)
3394 {
cf61b747
L
3395 /* addq/addl -> addq/addl - addressing with %rsp/%r12
3396 is special */
bffbf940
JJ
3397 if (val == 0x4c)
3398 bfd_put_8 (output_bfd, 0x49,
142411ca 3399 contents + roff - 3);
4a4c5f25
L
3400 else if (!ABI_64_P (output_bfd) && val == 0x44)
3401 bfd_put_8 (output_bfd, 0x41,
3402 contents + roff - 3);
bffbf940 3403 bfd_put_8 (output_bfd, 0x81,
142411ca 3404 contents + roff - 2);
bffbf940 3405 bfd_put_8 (output_bfd, 0xc0 | reg,
142411ca 3406 contents + roff - 1);
bffbf940
JJ
3407 }
3408 else
3409 {
cf61b747 3410 /* addq/addl -> leaq/leal */
bffbf940
JJ
3411 if (val == 0x4c)
3412 bfd_put_8 (output_bfd, 0x4d,
142411ca 3413 contents + roff - 3);
4a4c5f25
L
3414 else if (!ABI_64_P (output_bfd) && val == 0x44)
3415 bfd_put_8 (output_bfd, 0x45,
3416 contents + roff - 3);
bffbf940 3417 bfd_put_8 (output_bfd, 0x8d,
142411ca 3418 contents + roff - 2);
bffbf940 3419 bfd_put_8 (output_bfd, 0x80 | reg | (reg << 3),
142411ca 3420 contents + roff - 1);
bffbf940 3421 }
eb4ff4d6 3422 bfd_put_32 (output_bfd,
351f65ca 3423 elf_x86_64_tpoff (info, relocation),
142411ca 3424 contents + roff);
bffbf940
JJ
3425 continue;
3426 }
142411ca
L
3427 else
3428 BFD_ASSERT (FALSE);
bffbf940
JJ
3429 }
3430
6de2ae4a 3431 if (htab->elf.sgot == NULL)
bffbf940
JJ
3432 abort ();
3433
3434 if (h != NULL)
67a4f2b7
AO
3435 {
3436 off = h->got.offset;
0afcef53 3437 offplt = elf_x86_hash_entry (h)->tlsdesc_got;
67a4f2b7 3438 }
bffbf940
JJ
3439 else
3440 {
3441 if (local_got_offsets == NULL)
3442 abort ();
3443
3444 off = local_got_offsets[r_symndx];
67a4f2b7 3445 offplt = local_tlsdesc_gotents[r_symndx];
bffbf940
JJ
3446 }
3447
3448 if ((off & 1) != 0)
3449 off &= ~1;
26e41594 3450 else
bffbf940
JJ
3451 {
3452 Elf_Internal_Rela outrel;
bffbf940 3453 int dr_type, indx;
67a4f2b7 3454 asection *sreloc;
bffbf940 3455
6de2ae4a 3456 if (htab->elf.srelgot == NULL)
bffbf940
JJ
3457 abort ();
3458
67a4f2b7
AO
3459 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3460
3461 if (GOT_TLS_GDESC_P (tls_type))
3462 {
351f65ca 3463 outrel.r_info = htab->r_info (indx, R_X86_64_TLSDESC);
67a4f2b7 3464 BFD_ASSERT (htab->sgotplt_jump_table_size + offplt
6de2ae4a
L
3465 + 2 * GOT_ENTRY_SIZE <= htab->elf.sgotplt->size);
3466 outrel.r_offset = (htab->elf.sgotplt->output_section->vma
3467 + htab->elf.sgotplt->output_offset
67a4f2b7
AO
3468 + offplt
3469 + htab->sgotplt_jump_table_size);
6de2ae4a 3470 sreloc = htab->elf.srelplt;
67a4f2b7 3471 if (indx == 0)
0afcef53 3472 outrel.r_addend = relocation - _bfd_x86_elf_dtpoff_base (info);
67a4f2b7
AO
3473 else
3474 outrel.r_addend = 0;
351f65ca 3475 elf_append_rela (output_bfd, sreloc, &outrel);
67a4f2b7
AO
3476 }
3477
6de2ae4a 3478 sreloc = htab->elf.srelgot;
67a4f2b7 3479
6de2ae4a
L
3480 outrel.r_offset = (htab->elf.sgot->output_section->vma
3481 + htab->elf.sgot->output_offset + off);
bffbf940 3482
67a4f2b7 3483 if (GOT_TLS_GD_P (tls_type))
bffbf940 3484 dr_type = R_X86_64_DTPMOD64;
67a4f2b7
AO
3485 else if (GOT_TLS_GDESC_P (tls_type))
3486 goto dr_done;
bffbf940
JJ
3487 else
3488 dr_type = R_X86_64_TPOFF64;
3489
6de2ae4a 3490 bfd_put_64 (output_bfd, 0, htab->elf.sgot->contents + off);
bffbf940 3491 outrel.r_addend = 0;
67a4f2b7
AO
3492 if ((dr_type == R_X86_64_TPOFF64
3493 || dr_type == R_X86_64_TLSDESC) && indx == 0)
0afcef53 3494 outrel.r_addend = relocation - _bfd_x86_elf_dtpoff_base (info);
351f65ca 3495 outrel.r_info = htab->r_info (indx, dr_type);
bffbf940 3496
351f65ca 3497 elf_append_rela (output_bfd, sreloc, &outrel);
bffbf940 3498
67a4f2b7 3499 if (GOT_TLS_GD_P (tls_type))
bffbf940
JJ
3500 {
3501 if (indx == 0)
3502 {
d40d037c 3503 BFD_ASSERT (! unresolved_reloc);
bffbf940 3504 bfd_put_64 (output_bfd,
0afcef53 3505 relocation - _bfd_x86_elf_dtpoff_base (info),
6de2ae4a 3506 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
bffbf940
JJ
3507 }
3508 else
3509 {
3510 bfd_put_64 (output_bfd, 0,
6de2ae4a 3511 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
351f65ca 3512 outrel.r_info = htab->r_info (indx,
bffbf940
JJ
3513 R_X86_64_DTPOFF64);
3514 outrel.r_offset += GOT_ENTRY_SIZE;
351f65ca 3515 elf_append_rela (output_bfd, sreloc,
464d3bd4 3516 &outrel);
bffbf940
JJ
3517 }
3518 }
3519
67a4f2b7 3520 dr_done:
bffbf940
JJ
3521 if (h != NULL)
3522 h->got.offset |= 1;
3523 else
3524 local_got_offsets[r_symndx] |= 1;
3525 }
3526
67a4f2b7
AO
3527 if (off >= (bfd_vma) -2
3528 && ! GOT_TLS_GDESC_P (tls_type))
bffbf940 3529 abort ();
419414ea 3530 if (r_type_tls == r_type)
bffbf940 3531 {
67a4f2b7
AO
3532 if (r_type == R_X86_64_GOTPC32_TLSDESC
3533 || r_type == R_X86_64_TLSDESC_CALL)
6de2ae4a
L
3534 relocation = htab->elf.sgotplt->output_section->vma
3535 + htab->elf.sgotplt->output_offset
67a4f2b7
AO
3536 + offplt + htab->sgotplt_jump_table_size;
3537 else
6de2ae4a
L
3538 relocation = htab->elf.sgot->output_section->vma
3539 + htab->elf.sgot->output_offset + off;
b34976b6 3540 unresolved_reloc = FALSE;
bffbf940 3541 }
142411ca 3542 else
67a4f2b7 3543 {
142411ca 3544 bfd_vma roff = rel->r_offset;
67a4f2b7 3545
419414ea 3546 if (r_type == R_X86_64_TLSGD)
142411ca 3547 {
52bc799a 3548 /* GD->IE transition. For 64bit, change
e2cbcd91
L
3549 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3550 .word 0x6666; rex64; call __tls_get_addr@PLT
3551 or
3552 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
3553 .byte 0x66; rex64
3554 call *__tls_get_addr@GOTPCREL(%rip
3555 which may be converted to
3556 addr32 call __tls_get_addr
52bc799a 3557 into:
e2cbcd91
L
3558 movq %fs:0, %rax
3559 addq foo@gottpoff(%rip), %rax
52bc799a 3560 For 32bit, change
e2cbcd91
L
3561 leaq foo@tlsgd(%rip), %rdi
3562 .word 0x6666; rex64; call __tls_get_addr@PLT
3563 or
3564 leaq foo@tlsgd(%rip), %rdi
3565 .byte 0x66; rex64;
3566 call *__tls_get_addr@GOTPCREL(%rip)
3567 which may be converted to
3568 addr32 call __tls_get_addr
52bc799a 3569 into:
e2cbcd91
L
3570 movl %fs:0, %eax
3571 addq foo@gottpoff(%rip), %rax
5c98a14e 3572 For largepic, change:
e2cbcd91
L
3573 leaq foo@tlsgd(%rip), %rdi
3574 movabsq $__tls_get_addr@pltoff, %rax
3575 addq %r15, %rax
3576 call *%rax
5c98a14e 3577 into:
e2cbcd91
L
3578 movq %fs:0, %rax
3579 addq foo@gottpoff(%rax), %rax
3580 nopw 0x0(%rax,%rax,1) */
5c98a14e 3581 int largepic = 0;
e2cbcd91 3582 if (ABI_64_P (output_bfd))
5c98a14e 3583 {
e2cbcd91
L
3584 if (contents[roff + 5] == 0xb8)
3585 {
3586 memcpy (contents + roff - 3,
3587 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05"
3588 "\0\0\0\0\x66\x0f\x1f\x44\0", 22);
3589 largepic = 1;
3590 }
3591 else
3592 memcpy (contents + roff - 4,
3593 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
3594 16);
5c98a14e 3595 }
52bc799a
L
3596 else
3597 memcpy (contents + roff - 3,
3598 "\x64\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
3599 15);
142411ca 3600
6de2ae4a
L
3601 relocation = (htab->elf.sgot->output_section->vma
3602 + htab->elf.sgot->output_offset + off
142411ca 3603 - roff
5c98a14e 3604 - largepic
142411ca
L
3605 - input_section->output_section->vma
3606 - input_section->output_offset
3607 - 12);
3608 bfd_put_32 (output_bfd, relocation,
5c98a14e
JJ
3609 contents + roff + 8 + largepic);
3610 /* Skip R_X86_64_PLT32/R_X86_64_PLTOFF64. */
142411ca 3611 rel++;
60f2e42e 3612 wrel++;
142411ca
L
3613 continue;
3614 }
419414ea 3615 else if (r_type == R_X86_64_GOTPC32_TLSDESC)
142411ca
L
3616 {
3617 /* GDesc -> IE transition.
3618 It's originally something like:
3619 leaq x@tlsdesc(%rip), %rax
67a4f2b7 3620
142411ca 3621 Change it to:
c9736ba0 3622 movq x@gottpoff(%rip), %rax # before xchg %ax,%ax. */
67a4f2b7 3623
142411ca
L
3624 /* Now modify the instruction as appropriate. To
3625 turn a leaq into a movq in the form we use it, it
3626 suffices to change the second byte from 0x8d to
3627 0x8b. */
3628 bfd_put_8 (output_bfd, 0x8b, contents + roff - 2);
3629
3630 bfd_put_32 (output_bfd,
6de2ae4a
L
3631 htab->elf.sgot->output_section->vma
3632 + htab->elf.sgot->output_offset + off
142411ca
L
3633 - rel->r_offset
3634 - input_section->output_section->vma
3635 - input_section->output_offset
3636 - 4,
3637 contents + roff);
3638 continue;
3639 }
419414ea 3640 else if (r_type == R_X86_64_TLSDESC_CALL)
142411ca
L
3641 {
3642 /* GDesc -> IE transition.
3643 It's originally:
3644 call *(%rax)
3645
3646 Change it to:
c9736ba0 3647 xchg %ax, %ax. */
142411ca 3648
142411ca
L
3649 bfd_put_8 (output_bfd, 0x66, contents + roff);
3650 bfd_put_8 (output_bfd, 0x90, contents + roff + 1);
3651 continue;
3652 }
3653 else
3654 BFD_ASSERT (FALSE);
67a4f2b7 3655 }
bffbf940
JJ
3656 break;
3657
3658 case R_X86_64_TLSLD:
351f65ca
L
3659 if (! elf_x86_64_tls_transition (info, input_bfd,
3660 input_section, contents,
3661 symtab_hdr, sym_hashes,
bedfd056
L
3662 &r_type, GOT_UNKNOWN, rel,
3663 relend, h, r_symndx, TRUE))
142411ca 3664 return FALSE;
a3fadc9a 3665
142411ca
L
3666 if (r_type != R_X86_64_TLSLD)
3667 {
bffbf940 3668 /* LD->LE transition:
e2cbcd91
L
3669 leaq foo@tlsld(%rip), %rdi
3670 call __tls_get_addr@PLT
3671 For 64bit, we change it into:
3672 .word 0x6666; .byte 0x66; movq %fs:0, %rax
3673 For 32bit, we change it into:
3674 nopl 0x0(%rax); movl %fs:0, %eax
3675 Or
3676 leaq foo@tlsld(%rip), %rdi;
3677 call *__tls_get_addr@GOTPCREL(%rip)
3678 which may be converted to
3679 addr32 call __tls_get_addr
52bc799a 3680 For 64bit, we change it into:
e2cbcd91 3681 .word 0x6666; .word 0x6666; movq %fs:0, %rax
52bc799a 3682 For 32bit, we change it into:
e2cbcd91 3683 nopw 0x0(%rax); movl %fs:0, %eax
5c98a14e 3684 For largepic, change:
e2cbcd91
L
3685 leaq foo@tlsgd(%rip), %rdi
3686 movabsq $__tls_get_addr@pltoff, %rax
3687 addq %rbx, %rax
3688 call *%rax
3689 into
3690 data16 data16 data16 nopw %cs:0x0(%rax,%rax,1)
3691 movq %fs:0, %eax */
142411ca
L
3692
3693 BFD_ASSERT (r_type == R_X86_64_TPOFF32);
e2cbcd91
L
3694 if (ABI_64_P (output_bfd))
3695 {
3696 if (contents[rel->r_offset + 5] == 0xb8)
3697 memcpy (contents + rel->r_offset - 3,
3698 "\x66\x66\x66\x66\x2e\x0f\x1f\x84\0\0\0\0\0"
3699 "\x64\x48\x8b\x04\x25\0\0\0", 22);
3700 else if (contents[rel->r_offset + 4] == 0xff
3701 || contents[rel->r_offset + 4] == 0x67)
3702 memcpy (contents + rel->r_offset - 3,
3703 "\x66\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0",
3704 13);
3705 else
3706 memcpy (contents + rel->r_offset - 3,
3707 "\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0", 12);
3708 }
52bc799a 3709 else
e2cbcd91
L
3710 {
3711 if (contents[rel->r_offset + 4] == 0xff)
3712 memcpy (contents + rel->r_offset - 3,
3713 "\x66\x0f\x1f\x40\x00\x64\x8b\x04\x25\0\0\0",
3714 13);
3715 else
3716 memcpy (contents + rel->r_offset - 3,
3717 "\x0f\x1f\x40\x00\x64\x8b\x04\x25\0\0\0", 12);
3718 }
3719 /* Skip R_X86_64_PC32, R_X86_64_PLT32, R_X86_64_GOTPCRELX
3720 and R_X86_64_PLTOFF64. */
bffbf940 3721 rel++;
60f2e42e 3722 wrel++;
bffbf940
JJ
3723 continue;
3724 }
3725
6de2ae4a 3726 if (htab->elf.sgot == NULL)
bffbf940
JJ
3727 abort ();
3728
0afcef53 3729 off = htab->tls_ld_or_ldm_got.offset;
bffbf940
JJ
3730 if (off & 1)
3731 off &= ~1;
3732 else
3733 {
3734 Elf_Internal_Rela outrel;
bffbf940 3735
6de2ae4a 3736 if (htab->elf.srelgot == NULL)
bffbf940
JJ
3737 abort ();
3738
6de2ae4a
L
3739 outrel.r_offset = (htab->elf.sgot->output_section->vma
3740 + htab->elf.sgot->output_offset + off);
bffbf940
JJ
3741
3742 bfd_put_64 (output_bfd, 0,
6de2ae4a 3743 htab->elf.sgot->contents + off);
bffbf940 3744 bfd_put_64 (output_bfd, 0,
6de2ae4a 3745 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
351f65ca 3746 outrel.r_info = htab->r_info (0, R_X86_64_DTPMOD64);
bffbf940 3747 outrel.r_addend = 0;
351f65ca 3748 elf_append_rela (output_bfd, htab->elf.srelgot,
464d3bd4 3749 &outrel);
0afcef53 3750 htab->tls_ld_or_ldm_got.offset |= 1;
bffbf940 3751 }
6de2ae4a
L
3752 relocation = htab->elf.sgot->output_section->vma
3753 + htab->elf.sgot->output_offset + off;
b34976b6 3754 unresolved_reloc = FALSE;
bffbf940
JJ
3755 break;
3756
3757 case R_X86_64_DTPOFF32:
0e1862bb
L
3758 if (!bfd_link_executable (info)
3759 || (input_section->flags & SEC_CODE) == 0)
0afcef53 3760 relocation -= _bfd_x86_elf_dtpoff_base (info);
bffbf940 3761 else
351f65ca 3762 relocation = elf_x86_64_tpoff (info, relocation);
bffbf940
JJ
3763 break;
3764
3765 case R_X86_64_TPOFF32:
6769d501 3766 case R_X86_64_TPOFF64:
0e1862bb 3767 BFD_ASSERT (bfd_link_executable (info));
351f65ca 3768 relocation = elf_x86_64_tpoff (info, relocation);
bffbf940
JJ
3769 break;
3770
a69ed7f7
L
3771 case R_X86_64_DTPOFF64:
3772 BFD_ASSERT ((input_section->flags & SEC_CODE) == 0);
0afcef53 3773 relocation -= _bfd_x86_elf_dtpoff_base (info);
a69ed7f7
L
3774 break;
3775
70256ad8
AJ
3776 default:
3777 break;
3778 }
8d88c4ca 3779
239e1f3a
AM
3780 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3781 because such sections are not SEC_ALLOC and thus ld.so will
3782 not process them. */
c434dee6 3783 if (unresolved_reloc
239e1f3a 3784 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
3785 && h->def_dynamic)
3786 && _bfd_elf_section_offset (output_bfd, info, input_section,
3787 rel->r_offset) != (bfd_vma) -1)
a040981f 3788 {
7073b5b9
L
3789 switch (r_type)
3790 {
3791 case R_X86_64_32S:
a5b4ee94
L
3792 sec = h->root.u.def.section;
3793 if ((info->nocopyreloc
3794 || (eh->def_protected
3795 && elf_has_no_copy_on_protected (h->root.u.def.section->owner)))
7073b5b9
L
3796 && !(h->root.u.def.section->flags & SEC_CODE))
3797 return elf_x86_64_need_pic (info, input_bfd, input_section,
3798 h, NULL, NULL, howto);
3799 /* Fall through. */
3800
3801 default:
3802 _bfd_error_handler
3803 /* xgettext:c-format */
3804 (_("%B(%A+%#Lx): unresolvable %s relocation against symbol `%s'"),
3805 input_bfd,
3806 input_section,
3807 rel->r_offset,
3808 howto->name,
3809 h->root.root.string);
3810 return FALSE;
3811 }
a040981f 3812 }
c434dee6 3813
cbe950e9 3814do_relocation:
8d88c4ca 3815 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
c434dee6
AJ
3816 contents, rel->r_offset,
3817 relocation, rel->r_addend);
8d88c4ca 3818
62d78908 3819check_relocation_error:
8d88c4ca 3820 if (r != bfd_reloc_ok)
8da6118f 3821 {
c434dee6
AJ
3822 const char *name;
3823
3824 if (h != NULL)
3825 name = h->root.root.string;
3826 else
8da6118f 3827 {
c434dee6
AJ
3828 name = bfd_elf_string_from_elf_section (input_bfd,
3829 symtab_hdr->sh_link,
3830 sym->st_name);
3831 if (name == NULL)
b34976b6 3832 return FALSE;
c434dee6
AJ
3833 if (*name == '\0')
3834 name = bfd_section_name (input_bfd, sec);
3835 }
3836
3837 if (r == bfd_reloc_overflow)
8b43e456 3838 {
78984959 3839 if (converted_reloc)
8b43e456
L
3840 {
3841 info->callbacks->einfo
3842 (_("%F%P: failed to convert GOTPCREL relocation; relink with --no-relax\n"));
3843 return FALSE;
3844 }
3845 (*info->callbacks->reloc_overflow)
3846 (info, (h ? &h->root : NULL), name, howto->name,
3847 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3848 }
c434dee6
AJ
3849 else
3850 {
4eca0228 3851 _bfd_error_handler
695344c0 3852 /* xgettext:c-format */
d42c267e 3853 (_("%B(%A+%#Lx): reloc against `%s': error %d"),
d003868e 3854 input_bfd, input_section,
d42c267e 3855 rel->r_offset, name, (int) r);
b34976b6 3856 return FALSE;
8da6118f
KH
3857 }
3858 }
60f2e42e
L
3859
3860 if (wrel != rel)
3861 *wrel = *rel;
3862 }
3863
3864 if (wrel != rel)
3865 {
3866 Elf_Internal_Shdr *rel_hdr;
3867 size_t deleted = rel - wrel;
3868
3869 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
3870 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
3871 if (rel_hdr->sh_size == 0)
3872 {
3873 /* It is too late to remove an empty reloc section. Leave
3874 one NONE reloc.
3875 ??? What is wrong with an empty section??? */
3876 rel_hdr->sh_size = rel_hdr->sh_entsize;
3877 deleted -= 1;
3878 }
3879 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
3880 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
3881 input_section->reloc_count -= deleted;
8d88c4ca 3882 }
70256ad8 3883
b34976b6 3884 return TRUE;
70256ad8
AJ
3885}
3886
3887/* Finish up dynamic symbol handling. We set the contents of various
3888 dynamic sections here. */
3889
b34976b6 3890static bfd_boolean
351f65ca
L
3891elf_x86_64_finish_dynamic_symbol (bfd *output_bfd,
3892 struct bfd_link_info *info,
3893 struct elf_link_hash_entry *h,
aec6b87e 3894 Elf_Internal_Sym *sym)
70256ad8 3895{
0afcef53 3896 struct elf_x86_link_hash_table *htab;
f2c29a16 3897 bfd_boolean use_plt_second;
0afcef53 3898 struct elf_x86_link_hash_entry *eh;
aec6b87e 3899 bfd_boolean local_undefweak;
70256ad8 3900
0afcef53 3901 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
4dfe6ac6
NC
3902 if (htab == NULL)
3903 return FALSE;
70256ad8 3904
f2c29a16
L
3905 /* Use the second PLT section only if there is .plt section. */
3906 use_plt_second = htab->elf.splt != NULL && htab->plt_second != NULL;
0ff2b86e 3907
0afcef53 3908 eh = (struct elf_x86_link_hash_entry *) h;
9e9821dd
L
3909 if (eh->no_finish_dynamic_symbol)
3910 abort ();
dd7e64d4 3911
aec6b87e
L
3912 /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for
3913 resolved undefined weak symbols in executable so that their
3914 references have value 0 at run-time. */
c5bce5c6 3915 local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh);
aec6b87e 3916
70256ad8
AJ
3917 if (h->plt.offset != (bfd_vma) -1)
3918 {
70256ad8 3919 bfd_vma plt_index;
38b12349 3920 bfd_vma got_offset, plt_offset;
70256ad8 3921 Elf_Internal_Rela rela;
947216bf 3922 bfd_byte *loc;
0ff2b86e 3923 asection *plt, *gotplt, *relplt, *resolved_plt;
351f65ca 3924 const struct elf_backend_data *bed;
5974eba6 3925 bfd_vma plt_got_pcrel_offset;
cbe950e9
L
3926
3927 /* When building a static executable, use .iplt, .igot.plt and
3928 .rela.iplt sections for STT_GNU_IFUNC symbols. */
6de2ae4a 3929 if (htab->elf.splt != NULL)
cbe950e9 3930 {
6de2ae4a
L
3931 plt = htab->elf.splt;
3932 gotplt = htab->elf.sgotplt;
3933 relplt = htab->elf.srelplt;
cbe950e9
L
3934 }
3935 else
3936 {
6de2ae4a
L
3937 plt = htab->elf.iplt;
3938 gotplt = htab->elf.igotplt;
3939 relplt = htab->elf.irelplt;
cbe950e9 3940 }
70256ad8 3941
f3180fa9 3942 VERIFY_PLT_ENTRY (info, h, plt, gotplt, relplt, local_undefweak)
70256ad8
AJ
3943
3944 /* Get the index in the procedure linkage table which
3945 corresponds to this symbol. This is the index of this symbol
3946 in all the symbols for which we are making plt entries. The
cbe950e9 3947 first entry in the procedure linkage table is reserved.
6bbec505 3948
cbe950e9 3949 Get the offset into the .got table of the entry that
407443a3 3950 corresponds to this function. Each .got entry is GOT_ENTRY_SIZE
cbe950e9
L
3951 bytes. The first three are reserved for the dynamic linker.
3952
3953 For static executables, we don't reserve anything. */
3954
6de2ae4a 3955 if (plt == htab->elf.splt)
cbe950e9 3956 {
765e526c
L
3957 got_offset = (h->plt.offset / htab->plt.plt_entry_size
3958 - htab->plt.has_plt0);
e1f98742 3959 got_offset = (got_offset + 3) * GOT_ENTRY_SIZE;
cbe950e9
L
3960 }
3961 else
3962 {
765e526c 3963 got_offset = h->plt.offset / htab->plt.plt_entry_size;
e1f98742 3964 got_offset = got_offset * GOT_ENTRY_SIZE;
cbe950e9 3965 }
70256ad8 3966
38b12349 3967 /* Fill in the entry in the procedure linkage table. */
765e526c
L
3968 memcpy (plt->contents + h->plt.offset, htab->plt.plt_entry,
3969 htab->plt.plt_entry_size);
f2c29a16 3970 if (use_plt_second)
0ff2b86e 3971 {
f2c29a16 3972 memcpy (htab->plt_second->contents + eh->plt_second.offset,
765e526c
L
3973 htab->non_lazy_plt->plt_entry,
3974 htab->non_lazy_plt->plt_entry_size);
0ff2b86e 3975
f2c29a16
L
3976 resolved_plt = htab->plt_second;
3977 plt_offset = eh->plt_second.offset;
0ff2b86e
L
3978 }
3979 else
3980 {
0ff2b86e
L
3981 resolved_plt = plt;
3982 plt_offset = h->plt.offset;
3983 }
eed180f8
RM
3984
3985 /* Insert the relocation positions of the plt section. */
3986
3987 /* Put offset the PC-relative instruction referring to the GOT entry,
3988 subtracting the size of that instruction. */
ab7fede8
L
3989 plt_got_pcrel_offset = (gotplt->output_section->vma
3990 + gotplt->output_offset
3991 + got_offset
3992 - resolved_plt->output_section->vma
3993 - resolved_plt->output_offset
3994 - plt_offset
765e526c 3995 - htab->plt.plt_got_insn_size);
ab7fede8
L
3996
3997 /* Check PC-relative offset overflow in PLT entry. */
5974eba6 3998 if ((plt_got_pcrel_offset + 0x80000000) > 0xffffffff)
695344c0 3999 /* xgettext:c-format */
ab7fede8
L
4000 info->callbacks->einfo (_("%F%B: PC-relative offset overflow in PLT entry for `%s'\n"),
4001 output_bfd, h->root.root.string);
4002
4003 bfd_put_32 (output_bfd, plt_got_pcrel_offset,
38b12349 4004 (resolved_plt->contents + plt_offset
765e526c 4005 + htab->plt.plt_got_offset));
cbe950e9 4006
653165cc 4007 /* Fill in the entry in the global offset table, initially this
aec6b87e
L
4008 points to the second part of the PLT entry. Leave the entry
4009 as zero for undefined weak symbol in PIE. No PLT relocation
4010 against undefined weak symbol in PIE. */
4011 if (!local_undefweak)
cbe950e9 4012 {
765e526c 4013 if (htab->plt.has_plt0)
38b12349
L
4014 bfd_put_64 (output_bfd, (plt->output_section->vma
4015 + plt->output_offset
4016 + h->plt.offset
765e526c 4017 + htab->lazy_plt->plt_lazy_offset),
38b12349 4018 gotplt->contents + got_offset);
aec6b87e
L
4019
4020 /* Fill in the entry in the .rela.plt section. */
4021 rela.r_offset = (gotplt->output_section->vma
4022 + gotplt->output_offset
4023 + got_offset);
cf1070f1 4024 if (PLT_LOCAL_IFUNC_P (info, h))
aec6b87e 4025 {
6322e5c5
L
4026 info->callbacks->minfo (_("Local IFUNC function `%s' in %B\n"),
4027 h->root.root.string,
4028 h->root.u.def.section->owner);
4029
aec6b87e
L
4030 /* If an STT_GNU_IFUNC symbol is locally defined, generate
4031 R_X86_64_IRELATIVE instead of R_X86_64_JUMP_SLOT. */
4032 rela.r_info = htab->r_info (0, R_X86_64_IRELATIVE);
4033 rela.r_addend = (h->root.u.def.value
4034 + h->root.u.def.section->output_section->vma
4035 + h->root.u.def.section->output_offset);
4036 /* R_X86_64_IRELATIVE comes last. */
4037 plt_index = htab->next_irelative_index--;
4038 }
4039 else
4040 {
4041 rela.r_info = htab->r_info (h->dynindx, R_X86_64_JUMP_SLOT);
4042 rela.r_addend = 0;
4043 plt_index = htab->next_jump_slot_index++;
4044 }
e1f98742 4045
38b12349
L
4046 /* Don't fill the second and third slots in PLT entry for
4047 static executables nor without PLT0. */
765e526c 4048 if (plt == htab->elf.splt && htab->plt.has_plt0)
aec6b87e 4049 {
38b12349 4050 bfd_vma plt0_offset
765e526c 4051 = h->plt.offset + htab->lazy_plt->plt_plt_insn_end;
aec6b87e
L
4052
4053 /* Put relocation index. */
4054 bfd_put_32 (output_bfd, plt_index,
4055 (plt->contents + h->plt.offset
765e526c 4056 + htab->lazy_plt->plt_reloc_offset));
aec6b87e
L
4057
4058 /* Put offset for jmp .PLT0 and check for overflow. We don't
4059 check relocation index for overflow since branch displacement
4060 will overflow first. */
4061 if (plt0_offset > 0x80000000)
695344c0 4062 /* xgettext:c-format */
aec6b87e
L
4063 info->callbacks->einfo (_("%F%B: branch displacement overflow in PLT entry for `%s'\n"),
4064 output_bfd, h->root.root.string);
4065 bfd_put_32 (output_bfd, - plt0_offset,
38b12349 4066 (plt->contents + h->plt.offset
765e526c 4067 + htab->lazy_plt->plt_plt_offset));
aec6b87e 4068 }
351f65ca 4069
aec6b87e
L
4070 bed = get_elf_backend_data (output_bfd);
4071 loc = relplt->contents + plt_index * bed->s->sizeof_rela;
4072 bed->s->swap_reloca_out (output_bfd, &rela, loc);
4073 }
dd7e64d4
L
4074 }
4075 else if (eh->plt_got.offset != (bfd_vma) -1)
4076 {
38b12349 4077 bfd_vma got_offset, plt_offset;
dd7e64d4
L
4078 asection *plt, *got;
4079 bfd_boolean got_after_plt;
4080 int32_t got_pcrel_offset;
dd7e64d4
L
4081
4082 /* Set the entry in the GOT procedure linkage table. */
4083 plt = htab->plt_got;
4084 got = htab->elf.sgot;
4085 got_offset = h->got.offset;
4086
4087 if (got_offset == (bfd_vma) -1
e492d2f8 4088 || (h->type == STT_GNU_IFUNC && h->def_regular)
dd7e64d4
L
4089 || plt == NULL
4090 || got == NULL)
4091 abort ();
70256ad8 4092
38b12349 4093 /* Use the non-lazy PLT entry template for the GOT PLT since they
dd7e64d4 4094 are the identical. */
dd7e64d4
L
4095 /* Fill in the entry in the GOT procedure linkage table. */
4096 plt_offset = eh->plt_got.offset;
4097 memcpy (plt->contents + plt_offset,
765e526c
L
4098 htab->non_lazy_plt->plt_entry,
4099 htab->non_lazy_plt->plt_entry_size);
dd7e64d4
L
4100
4101 /* Put offset the PC-relative instruction referring to the GOT
4102 entry, subtracting the size of that instruction. */
4103 got_pcrel_offset = (got->output_section->vma
4104 + got->output_offset
4105 + got_offset
4106 - plt->output_section->vma
4107 - plt->output_offset
4108 - plt_offset
765e526c 4109 - htab->non_lazy_plt->plt_got_insn_size);
dd7e64d4
L
4110
4111 /* Check PC-relative offset overflow in GOT PLT entry. */
4112 got_after_plt = got->output_section->vma > plt->output_section->vma;
4113 if ((got_after_plt && got_pcrel_offset < 0)
4114 || (!got_after_plt && got_pcrel_offset > 0))
695344c0 4115 /* xgettext:c-format */
dd7e64d4
L
4116 info->callbacks->einfo (_("%F%B: PC-relative offset overflow in GOT PLT entry for `%s'\n"),
4117 output_bfd, h->root.root.string);
4118
4119 bfd_put_32 (output_bfd, got_pcrel_offset,
38b12349 4120 (plt->contents + plt_offset
765e526c 4121 + htab->non_lazy_plt->plt_got_offset));
dd7e64d4
L
4122 }
4123
aec6b87e
L
4124 if (!local_undefweak
4125 && !h->def_regular
dd7e64d4
L
4126 && (h->plt.offset != (bfd_vma) -1
4127 || eh->plt_got.offset != (bfd_vma) -1))
4128 {
4129 /* Mark the symbol as undefined, rather than as defined in
4130 the .plt section. Leave the value if there were any
4131 relocations where pointer equality matters (this is a clue
4132 for the dynamic linker, to make function pointer
4133 comparisons work between an application and shared
4134 library), otherwise set it to zero. If a function is only
4135 called from a binary, there is no need to slow down
4136 shared libraries because of that. */
4137 sym->st_shndx = SHN_UNDEF;
4138 if (!h->pointer_equality_needed)
4139 sym->st_value = 0;
70256ad8
AJ
4140 }
4141
aec6b87e
L
4142 /* Don't generate dynamic GOT relocation against undefined weak
4143 symbol in executable. */
bffbf940 4144 if (h->got.offset != (bfd_vma) -1
0afcef53
L
4145 && ! GOT_TLS_GD_ANY_P (elf_x86_hash_entry (h)->tls_type)
4146 && elf_x86_hash_entry (h)->tls_type != GOT_TLS_IE
aec6b87e 4147 && !local_undefweak)
053579d7 4148 {
053579d7 4149 Elf_Internal_Rela rela;
233cc9c1 4150 asection *relgot = htab->elf.srelgot;
053579d7
AJ
4151
4152 /* This symbol has an entry in the global offset table. Set it
bffbf940 4153 up. */
6de2ae4a 4154 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
c434dee6 4155 abort ();
053579d7 4156
6de2ae4a
L
4157 rela.r_offset = (htab->elf.sgot->output_section->vma
4158 + htab->elf.sgot->output_offset
dc810e39 4159 + (h->got.offset &~ (bfd_vma) 1));
053579d7
AJ
4160
4161 /* If this is a static link, or it is a -Bsymbolic link and the
4162 symbol is defined locally or was forced to be local because
4163 of a version file, we just want to emit a RELATIVE reloc.
4164 The entry in the global offset table will already have been
4165 initialized in the relocate_section function. */
710ab287 4166 if (h->def_regular
0018b0a3
L
4167 && h->type == STT_GNU_IFUNC)
4168 {
233cc9c1
L
4169 if (h->plt.offset == (bfd_vma) -1)
4170 {
4171 /* STT_GNU_IFUNC is referenced without PLT. */
4172 if (htab->elf.splt == NULL)
4173 {
4174 /* use .rel[a].iplt section to store .got relocations
4175 in static executable. */
4176 relgot = htab->elf.irelplt;
4177 }
6999821f 4178 if (SYMBOL_REFERENCES_LOCAL_P (info, h))
233cc9c1 4179 {
6322e5c5 4180 info->callbacks->minfo (_("Local IFUNC function `%s' in %B\n"),
6322e5c5
L
4181 h->root.root.string,
4182 h->root.u.def.section->owner);
4183
233cc9c1
L
4184 rela.r_info = htab->r_info (0,
4185 R_X86_64_IRELATIVE);
4186 rela.r_addend = (h->root.u.def.value
4187 + h->root.u.def.section->output_section->vma
4188 + h->root.u.def.section->output_offset);
4189 }
4190 else
4191 goto do_glob_dat;
4192 }
4193 else if (bfd_link_pic (info))
710ab287
L
4194 {
4195 /* Generate R_X86_64_GLOB_DAT. */
4196 goto do_glob_dat;
4197 }
4198 else
4199 {
90d60710 4200 asection *plt;
aab82f4c 4201 bfd_vma plt_offset;
90d60710 4202
710ab287
L
4203 if (!h->pointer_equality_needed)
4204 abort ();
4205
4206 /* For non-shared object, we can't use .got.plt, which
4207 contains the real function addres if we need pointer
4208 equality. We load the GOT entry with the PLT entry. */
f2c29a16 4209 if (htab->plt_second != NULL)
aab82f4c 4210 {
f2c29a16
L
4211 plt = htab->plt_second;
4212 plt_offset = eh->plt_second.offset;
aab82f4c
L
4213 }
4214 else
4215 {
4216 plt = htab->elf.splt ? htab->elf.splt : htab->elf.iplt;
4217 plt_offset = h->plt.offset;
4218 }
710ab287
L
4219 bfd_put_64 (output_bfd, (plt->output_section->vma
4220 + plt->output_offset
aab82f4c 4221 + plt_offset),
6de2ae4a 4222 htab->elf.sgot->contents + h->got.offset);
710ab287
L
4223 return TRUE;
4224 }
0018b0a3 4225 }
0e1862bb 4226 else if (bfd_link_pic (info)
6999821f 4227 && SYMBOL_REFERENCES_LOCAL_P (info, h))
053579d7 4228 {
ad71ce8d 4229 if (!(h->def_regular || ELF_COMMON_DEF_P (h)))
41bed6dd 4230 return FALSE;
cc78d0af 4231 BFD_ASSERT((h->got.offset & 1) != 0);
351f65ca 4232 rela.r_info = htab->r_info (0, R_X86_64_RELATIVE);
053579d7
AJ
4233 rela.r_addend = (h->root.u.def.value
4234 + h->root.u.def.section->output_section->vma
4235 + h->root.u.def.section->output_offset);
4236 }
4237 else
4238 {
4239 BFD_ASSERT((h->got.offset & 1) == 0);
710ab287 4240do_glob_dat:
c434dee6 4241 bfd_put_64 (output_bfd, (bfd_vma) 0,
6de2ae4a 4242 htab->elf.sgot->contents + h->got.offset);
351f65ca 4243 rela.r_info = htab->r_info (h->dynindx, R_X86_64_GLOB_DAT);
053579d7
AJ
4244 rela.r_addend = 0;
4245 }
4246
233cc9c1 4247 elf_append_rela (output_bfd, relgot, &rela);
053579d7
AJ
4248 }
4249
f5385ebf 4250 if (h->needs_copy)
70256ad8 4251 {
70256ad8 4252 Elf_Internal_Rela rela;
5474d94f 4253 asection *s;
70256ad8
AJ
4254
4255 /* This symbol needs a copy reloc. Set it up. */
4256
c434dee6
AJ
4257 if (h->dynindx == -1
4258 || (h->root.type != bfd_link_hash_defined
4259 && h->root.type != bfd_link_hash_defweak)
5474d94f
AM
4260 || htab->elf.srelbss == NULL
4261 || htab->elf.sreldynrelro == NULL)
c434dee6 4262 abort ();
70256ad8
AJ
4263
4264 rela.r_offset = (h->root.u.def.value
4265 + h->root.u.def.section->output_section->vma
4266 + h->root.u.def.section->output_offset);
351f65ca 4267 rela.r_info = htab->r_info (h->dynindx, R_X86_64_COPY);
70256ad8 4268 rela.r_addend = 0;
afbf7e8e 4269 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
4270 s = htab->elf.sreldynrelro;
4271 else
4272 s = htab->elf.srelbss;
4273 elf_append_rela (output_bfd, s, &rela);
70256ad8
AJ
4274 }
4275
b34976b6 4276 return TRUE;
70256ad8
AJ
4277}
4278
c25bc9fc
L
4279/* Finish up local dynamic symbol handling. We set the contents of
4280 various dynamic sections here. */
4281
4282static bfd_boolean
351f65ca 4283elf_x86_64_finish_local_dynamic_symbol (void **slot, void *inf)
c25bc9fc
L
4284{
4285 struct elf_link_hash_entry *h
4286 = (struct elf_link_hash_entry *) *slot;
4287 struct bfd_link_info *info
eed180f8 4288 = (struct bfd_link_info *) inf;
c25bc9fc 4289
351f65ca 4290 return elf_x86_64_finish_dynamic_symbol (info->output_bfd,
5f0f0847 4291 info, h, NULL);
c25bc9fc
L
4292}
4293
aec6b87e
L
4294/* Finish up undefined weak symbol handling in PIE. Fill its PLT entry
4295 here since undefined weak symbol may not be dynamic and may not be
4296 called for elf_x86_64_finish_dynamic_symbol. */
4297
4298static bfd_boolean
4299elf_x86_64_pie_finish_undefweak_symbol (struct bfd_hash_entry *bh,
4300 void *inf)
4301{
4302 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) bh;
4303 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4304
4305 if (h->root.type != bfd_link_hash_undefweak
4306 || h->dynindx != -1)
4307 return TRUE;
4308
4309 return elf_x86_64_finish_dynamic_symbol (info->output_bfd,
5f0f0847 4310 info, h, NULL);
aec6b87e
L
4311}
4312
c434dee6
AJ
4313/* Used to decide how to sort relocs in an optimal manner for the
4314 dynamic linker, before writing them out. */
4315
4316static enum elf_reloc_type_class
cae1fbbb 4317elf_x86_64_reloc_type_class (const struct bfd_link_info *info,
7e612e98
AM
4318 const asection *rel_sec ATTRIBUTE_UNUSED,
4319 const Elf_Internal_Rela *rela)
c434dee6 4320{
cae1fbbb
L
4321 bfd *abfd = info->output_bfd;
4322 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0afcef53
L
4323 struct elf_x86_link_hash_table *htab
4324 = elf_x86_hash_table (info, X86_64_ELF_DATA);
cae1fbbb 4325
d9e3b590
L
4326 if (htab->elf.dynsym != NULL
4327 && htab->elf.dynsym->contents != NULL)
4328 {
4329 /* Check relocation against STT_GNU_IFUNC symbol if there are
4330 dynamic symbols. */
4331 unsigned long r_symndx = htab->r_sym (rela->r_info);
897463b1
L
4332 if (r_symndx != STN_UNDEF)
4333 {
4334 Elf_Internal_Sym sym;
4335 if (!bed->s->swap_symbol_in (abfd,
4336 (htab->elf.dynsym->contents
4337 + r_symndx * bed->s->sizeof_sym),
4338 0, &sym))
4339 abort ();
d9e3b590 4340
897463b1
L
4341 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
4342 return reloc_class_ifunc;
4343 }
d9e3b590 4344 }
cae1fbbb 4345
351f65ca 4346 switch ((int) ELF32_R_TYPE (rela->r_info))
c434dee6 4347 {
c428ce9d
L
4348 case R_X86_64_IRELATIVE:
4349 return reloc_class_ifunc;
c434dee6 4350 case R_X86_64_RELATIVE:
1da80baa 4351 case R_X86_64_RELATIVE64:
c434dee6
AJ
4352 return reloc_class_relative;
4353 case R_X86_64_JUMP_SLOT:
4354 return reloc_class_plt;
4355 case R_X86_64_COPY:
4356 return reloc_class_copy;
4357 default:
4358 return reloc_class_normal;
4359 }
4360}
4361
70256ad8
AJ
4362/* Finish up the dynamic sections. */
4363
b34976b6 4364static bfd_boolean
351f65ca
L
4365elf_x86_64_finish_dynamic_sections (bfd *output_bfd,
4366 struct bfd_link_info *info)
70256ad8 4367{
0afcef53 4368 struct elf_x86_link_hash_table *htab;
70256ad8
AJ
4369 bfd *dynobj;
4370 asection *sdyn;
70256ad8 4371
0afcef53 4372 htab = elf_x86_hash_table (info, X86_64_ELF_DATA);
4dfe6ac6
NC
4373 if (htab == NULL)
4374 return FALSE;
4375
c434dee6 4376 dynobj = htab->elf.dynobj;
3d4d4302 4377 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
70256ad8 4378
c434dee6 4379 if (htab->elf.dynamic_sections_created)
70256ad8 4380 {
82e96e07
L
4381 bfd_byte *dyncon, *dynconend;
4382 const struct elf_backend_data *bed;
4383 bfd_size_type sizeof_dyn;
70256ad8 4384
6de2ae4a 4385 if (sdyn == NULL || htab->elf.sgot == NULL)
c434dee6 4386 abort ();
70256ad8 4387
82e96e07
L
4388 bed = get_elf_backend_data (dynobj);
4389 sizeof_dyn = bed->s->sizeof_dyn;
4390 dyncon = sdyn->contents;
4391 dynconend = sdyn->contents + sdyn->size;
4392 for (; dyncon < dynconend; dyncon += sizeof_dyn)
70256ad8
AJ
4393 {
4394 Elf_Internal_Dyn dyn;
70256ad8
AJ
4395 asection *s;
4396
82e96e07 4397 (*bed->s->swap_dyn_in) (dynobj, dyncon, &dyn);
70256ad8
AJ
4398
4399 switch (dyn.d_tag)
4400 {
4401 default:
053579d7 4402 continue;
70256ad8
AJ
4403
4404 case DT_PLTGOT:
6de2ae4a 4405 s = htab->elf.sgotplt;
8c37241b 4406 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
c434dee6 4407 break;
70256ad8
AJ
4408
4409 case DT_JMPREL:
6de2ae4a 4410 dyn.d_un.d_ptr = htab->elf.srelplt->output_section->vma;
c434dee6 4411 break;
70256ad8 4412
c434dee6 4413 case DT_PLTRELSZ:
6de2ae4a 4414 s = htab->elf.srelplt->output_section;
eea6121a 4415 dyn.d_un.d_val = s->size;
70256ad8
AJ
4416 break;
4417
67a4f2b7 4418 case DT_TLSDESC_PLT:
6de2ae4a 4419 s = htab->elf.splt;
67a4f2b7
AO
4420 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset
4421 + htab->tlsdesc_plt;
4422 break;
4423
4424 case DT_TLSDESC_GOT:
6de2ae4a 4425 s = htab->elf.sgot;
67a4f2b7
AO
4426 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset
4427 + htab->tlsdesc_got;
4428 break;
70256ad8 4429 }
c434dee6 4430
82e96e07 4431 (*bed->s->swap_dyn_out) (output_bfd, &dyn, dyncon);
70256ad8
AJ
4432 }
4433
6de2ae4a 4434 if (htab->elf.splt && htab->elf.splt->size > 0)
70256ad8 4435 {
eed180f8 4436 elf_section_data (htab->elf.splt->output_section)
765e526c 4437 ->this_hdr.sh_entsize = htab->plt.plt_entry_size;
67a4f2b7 4438
765e526c 4439 if (htab->plt.has_plt0)
67a4f2b7 4440 {
38b12349
L
4441 /* Fill in the special first entry in the procedure linkage
4442 table. */
4443 memcpy (htab->elf.splt->contents,
765e526c
L
4444 htab->lazy_plt->plt0_entry,
4445 htab->lazy_plt->plt0_entry_size);
38b12349
L
4446 /* Add offset for pushq GOT+8(%rip), since the instruction
4447 uses 6 bytes subtract this value. */
67a4f2b7 4448 bfd_put_32 (output_bfd,
6de2ae4a
L
4449 (htab->elf.sgotplt->output_section->vma
4450 + htab->elf.sgotplt->output_offset
67a4f2b7 4451 + 8
6de2ae4a
L
4452 - htab->elf.splt->output_section->vma
4453 - htab->elf.splt->output_offset
67a4f2b7 4454 - 6),
38b12349 4455 (htab->elf.splt->contents
765e526c 4456 + htab->lazy_plt->plt0_got1_offset));
38b12349
L
4457 /* Add offset for the PC-relative instruction accessing
4458 GOT+16, subtracting the offset to the end of that
4459 instruction. */
67a4f2b7 4460 bfd_put_32 (output_bfd,
38b12349
L
4461 (htab->elf.sgotplt->output_section->vma
4462 + htab->elf.sgotplt->output_offset
4463 + 16
6de2ae4a
L
4464 - htab->elf.splt->output_section->vma
4465 - htab->elf.splt->output_offset
765e526c 4466 - htab->lazy_plt->plt0_got2_insn_end),
38b12349 4467 (htab->elf.splt->contents
765e526c 4468 + htab->lazy_plt->plt0_got2_offset));
38b12349
L
4469
4470 if (htab->tlsdesc_plt)
4471 {
4472 bfd_put_64 (output_bfd, (bfd_vma) 0,
4473 htab->elf.sgot->contents + htab->tlsdesc_got);
4474
4475 memcpy (htab->elf.splt->contents + htab->tlsdesc_plt,
765e526c
L
4476 htab->lazy_plt->plt0_entry,
4477 htab->lazy_plt->plt0_entry_size);
38b12349
L
4478
4479 /* Add offset for pushq GOT+8(%rip), since the
4480 instruction uses 6 bytes subtract this value. */
4481 bfd_put_32 (output_bfd,
4482 (htab->elf.sgotplt->output_section->vma
4483 + htab->elf.sgotplt->output_offset
4484 + 8
4485 - htab->elf.splt->output_section->vma
4486 - htab->elf.splt->output_offset
4487 - htab->tlsdesc_plt
4488 - 6),
4489 (htab->elf.splt->contents
4490 + htab->tlsdesc_plt
765e526c 4491 + htab->lazy_plt->plt0_got1_offset));
38b12349
L
4492 /* Add offset for the PC-relative instruction accessing
4493 GOT+TDG, where TDG stands for htab->tlsdesc_got,
4494 subtracting the offset to the end of that
4495 instruction. */
4496 bfd_put_32 (output_bfd,
4497 (htab->elf.sgot->output_section->vma
4498 + htab->elf.sgot->output_offset
4499 + htab->tlsdesc_got
4500 - htab->elf.splt->output_section->vma
4501 - htab->elf.splt->output_offset
4502 - htab->tlsdesc_plt
765e526c 4503 - htab->lazy_plt->plt0_got2_insn_end),
38b12349
L
4504 (htab->elf.splt->contents
4505 + htab->tlsdesc_plt
765e526c 4506 + htab->lazy_plt->plt0_got2_offset));
38b12349 4507 }
67a4f2b7 4508 }
70256ad8 4509 }
70256ad8 4510
0afcef53
L
4511 if (htab->plt_got != NULL && htab->plt_got->size > 0)
4512 elf_section_data (htab->plt_got->output_section)
765e526c 4513 ->this_hdr.sh_entsize = htab->non_lazy_plt->plt_entry_size;
38b12349 4514
0afcef53
L
4515 if (htab->plt_second != NULL && htab->plt_second->size > 0)
4516 elf_section_data (htab->plt_second->output_section)
765e526c 4517 ->this_hdr.sh_entsize = htab->non_lazy_plt->plt_entry_size;
0afcef53 4518 }
0ff2b86e 4519
38b12349
L
4520 /* GOT is always created in setup_gnu_properties. But it may not be
4521 needed. */
4522 if (htab->elf.sgotplt && htab->elf.sgotplt->size > 0)
70256ad8 4523 {
56d4289c
L
4524 if (bfd_is_abs_section (htab->elf.sgotplt->output_section))
4525 {
4eca0228 4526 _bfd_error_handler
56d4289c
L
4527 (_("discarded output section: `%A'"), htab->elf.sgotplt);
4528 return FALSE;
4529 }
4530
38b12349
L
4531 /* Set the first entry in the global offset table to the address of
4532 the dynamic section. */
4533 if (sdyn == NULL)
4534 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents);
4535 else
4536 bfd_put_64 (output_bfd,
4537 sdyn->output_section->vma + sdyn->output_offset,
4538 htab->elf.sgotplt->contents);
4539 /* Write GOT[1] and GOT[2], needed for the dynamic linker. */
4540 bfd_put_64 (output_bfd, (bfd_vma) 0,
4541 htab->elf.sgotplt->contents + GOT_ENTRY_SIZE);
4542 bfd_put_64 (output_bfd, (bfd_vma) 0,
4543 htab->elf.sgotplt->contents + GOT_ENTRY_SIZE*2);
4544
4545 elf_section_data (htab->elf.sgotplt->output_section)->this_hdr.sh_entsize
4546 = GOT_ENTRY_SIZE;
c434dee6 4547 }
70256ad8 4548
e41b3a13 4549 /* Adjust .eh_frame for .plt section. */
9a2a56cc
AM
4550 if (htab->plt_eh_frame != NULL
4551 && htab->plt_eh_frame->contents != NULL)
e41b3a13
JJ
4552 {
4553 if (htab->elf.splt != NULL
4554 && htab->elf.splt->size != 0
4555 && (htab->elf.splt->flags & SEC_EXCLUDE) == 0
4556 && htab->elf.splt->output_section != NULL
4557 && htab->plt_eh_frame->output_section != NULL)
4558 {
4559 bfd_vma plt_start = htab->elf.splt->output_section->vma;
4560 bfd_vma eh_frame_start = htab->plt_eh_frame->output_section->vma
4561 + htab->plt_eh_frame->output_offset
4562 + PLT_FDE_START_OFFSET;
4563 bfd_put_signed_32 (dynobj, plt_start - eh_frame_start,
4564 htab->plt_eh_frame->contents
4565 + PLT_FDE_START_OFFSET);
4566 }
dbaa2011 4567 if (htab->plt_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME)
e41b3a13
JJ
4568 {
4569 if (! _bfd_elf_write_section_eh_frame (output_bfd, info,
4570 htab->plt_eh_frame,
4571 htab->plt_eh_frame->contents))
4572 return FALSE;
4573 }
4574 }
4575
fff53dae
L
4576 /* Adjust .eh_frame for .plt.got section. */
4577 if (htab->plt_got_eh_frame != NULL
4578 && htab->plt_got_eh_frame->contents != NULL)
4579 {
4580 if (htab->plt_got != NULL
4581 && htab->plt_got->size != 0
4582 && (htab->plt_got->flags & SEC_EXCLUDE) == 0
4583 && htab->plt_got->output_section != NULL
4584 && htab->plt_got_eh_frame->output_section != NULL)
4585 {
4586 bfd_vma plt_start = htab->plt_got->output_section->vma;
4587 bfd_vma eh_frame_start = htab->plt_got_eh_frame->output_section->vma
4588 + htab->plt_got_eh_frame->output_offset
4589 + PLT_FDE_START_OFFSET;
4590 bfd_put_signed_32 (dynobj, plt_start - eh_frame_start,
4591 htab->plt_got_eh_frame->contents
4592 + PLT_FDE_START_OFFSET);
4593 }
4594 if (htab->plt_got_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME)
4595 {
4596 if (! _bfd_elf_write_section_eh_frame (output_bfd, info,
4597 htab->plt_got_eh_frame,
4598 htab->plt_got_eh_frame->contents))
4599 return FALSE;
4600 }
4601 }
4602
f2c29a16
L
4603 /* Adjust .eh_frame for the second PLT section. */
4604 if (htab->plt_second_eh_frame != NULL
4605 && htab->plt_second_eh_frame->contents != NULL)
8361ed4d 4606 {
f2c29a16
L
4607 if (htab->plt_second != NULL
4608 && htab->plt_second->size != 0
4609 && (htab->plt_second->flags & SEC_EXCLUDE) == 0
4610 && htab->plt_second->output_section != NULL
4611 && htab->plt_second_eh_frame->output_section != NULL)
8361ed4d 4612 {
f2c29a16
L
4613 bfd_vma plt_start = htab->plt_second->output_section->vma;
4614 bfd_vma eh_frame_start
4615 = (htab->plt_second_eh_frame->output_section->vma
4616 + htab->plt_second_eh_frame->output_offset
4617 + PLT_FDE_START_OFFSET);
8361ed4d 4618 bfd_put_signed_32 (dynobj, plt_start - eh_frame_start,
f2c29a16 4619 htab->plt_second_eh_frame->contents
8361ed4d
L
4620 + PLT_FDE_START_OFFSET);
4621 }
f2c29a16
L
4622 if (htab->plt_second_eh_frame->sec_info_type
4623 == SEC_INFO_TYPE_EH_FRAME)
8361ed4d
L
4624 {
4625 if (! _bfd_elf_write_section_eh_frame (output_bfd, info,
f2c29a16
L
4626 htab->plt_second_eh_frame,
4627 htab->plt_second_eh_frame->contents))
8361ed4d
L
4628 return FALSE;
4629 }
4630 }
4631
6de2ae4a
L
4632 if (htab->elf.sgot && htab->elf.sgot->size > 0)
4633 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
8c37241b
JJ
4634 = GOT_ENTRY_SIZE;
4635
aec6b87e
L
4636 /* Fill PLT entries for undefined weak symbols in PIE. */
4637 if (bfd_link_pie (info))
4638 bfd_hash_traverse (&info->hash->table,
4639 elf_x86_64_pie_finish_undefweak_symbol,
4640 info);
4641
b34976b6 4642 return TRUE;
8d88c4ca
NC
4643}
4644
233cc9c1
L
4645/* Fill PLT/GOT entries and allocate dynamic relocations for local
4646 STT_GNU_IFUNC symbols, which aren't in the ELF linker hash table.
4647 It has to be done before elf_link_sort_relocs is called so that
4648 dynamic relocations are properly sorted. */
4649
4650static bfd_boolean
4651elf_x86_64_output_arch_local_syms
4652 (bfd *output_bfd ATTRIBUTE_UNUSED,
4653 struct bfd_link_info *info,
4654 void *flaginfo ATTRIBUTE_UNUSED,
4655 int (*func) (void *, const char *,
4656 Elf_Internal_Sym *,
4657 asection *,
4658 struct elf_link_hash_entry *) ATTRIBUTE_UNUSED)
4659{
0afcef53
L
4660 struct elf_x86_link_hash_table *htab
4661 = elf_x86_hash_table (info, X86_64_ELF_DATA);
233cc9c1
L
4662 if (htab == NULL)
4663 return FALSE;
4664
4665 /* Fill PLT and GOT entries for local STT_GNU_IFUNC symbols. */
4666 htab_traverse (htab->loc_hash_table,
4667 elf_x86_64_finish_local_dynamic_symbol,
4668 info);
4669
4670 return TRUE;
4671}
4672
38b12349 4673/* Forward declaration. */
765e526c 4674static const struct elf_x86_lazy_plt_layout elf_x86_64_nacl_plt;
38b12349
L
4675
4676/* Similar to _bfd_elf_get_synthetic_symtab. Support PLTs with all
4677 dynamic relocations. */
4678
4679static long
4680elf_x86_64_get_synthetic_symtab (bfd *abfd,
4681 long symcount ATTRIBUTE_UNUSED,
4682 asymbol **syms ATTRIBUTE_UNUSED,
4683 long dynsymcount,
4684 asymbol **dynsyms,
4685 asymbol **ret)
4686{
f493882d 4687 long count, i, n;
38b12349 4688 int j;
38b12349 4689 bfd_byte *plt_contents;
f493882d 4690 long relsize;
765e526c
L
4691 const struct elf_x86_lazy_plt_layout *lazy_plt;
4692 const struct elf_x86_non_lazy_plt_layout *non_lazy_plt;
4693 const struct elf_x86_lazy_plt_layout *lazy_bnd_plt;
4694 const struct elf_x86_non_lazy_plt_layout *non_lazy_bnd_plt;
4695 const struct elf_x86_lazy_plt_layout *lazy_ibt_plt;
4696 const struct elf_x86_non_lazy_plt_layout *non_lazy_ibt_plt;
38b12349 4697 asection *plt;
f493882d
L
4698 enum elf_x86_plt_type plt_type;
4699 struct elf_x86_plt plts[] =
144bed8d 4700 {
38b12349
L
4701 { ".plt", NULL, NULL, plt_unknown, 0, 0, 0, 0 },
4702 { ".plt.got", NULL, NULL, plt_non_lazy, 0, 0, 0, 0 },
f2c29a16
L
4703 { ".plt.sec", NULL, NULL, plt_second, 0, 0, 0, 0 },
4704 { ".plt.bnd", NULL, NULL, plt_second, 0, 0, 0, 0 },
dd9e66ee 4705 { NULL, NULL, NULL, plt_non_lazy, 0, 0, 0, 0 }
38b12349 4706 };
144bed8d 4707
38b12349 4708 *ret = NULL;
144bed8d 4709
38b12349
L
4710 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
4711 return 0;
144bed8d 4712
38b12349
L
4713 if (dynsymcount <= 0)
4714 return 0;
cca5b8b6 4715
38b12349
L
4716 relsize = bfd_get_dynamic_reloc_upper_bound (abfd);
4717 if (relsize <= 0)
4718 return -1;
4719
38b12349 4720 if (get_elf_x86_64_backend_data (abfd)->os == is_normal)
144bed8d 4721 {
38b12349
L
4722 lazy_plt = &elf_x86_64_lazy_plt;
4723 non_lazy_plt = &elf_x86_64_non_lazy_plt;
4724 lazy_bnd_plt = &elf_x86_64_lazy_bnd_plt;
4725 non_lazy_bnd_plt = &elf_x86_64_non_lazy_bnd_plt;
ee2fdd6f
L
4726 if (ABI_64_P (abfd))
4727 {
4728 lazy_ibt_plt = &elf_x86_64_lazy_ibt_plt;
4729 non_lazy_ibt_plt = &elf_x86_64_non_lazy_ibt_plt;
4730 }
4731 else
4732 {
4733 lazy_ibt_plt = &elf_x32_lazy_ibt_plt;
4734 non_lazy_ibt_plt = &elf_x32_non_lazy_ibt_plt;
4735 }
38b12349
L
4736 }
4737 else
4738 {
4739 lazy_plt = &elf_x86_64_nacl_plt;
4740 non_lazy_plt = NULL;
4741 lazy_bnd_plt = NULL;
4742 non_lazy_bnd_plt = NULL;
ee2fdd6f
L
4743 lazy_ibt_plt = NULL;
4744 non_lazy_ibt_plt = NULL;
38b12349 4745 }
144bed8d 4746
38b12349
L
4747 count = 0;
4748 for (j = 0; plts[j].name != NULL; j++)
4749 {
4750 plt = bfd_get_section_by_name (abfd, plts[j].name);
90efb642 4751 if (plt == NULL || plt->size == 0)
6f25f223 4752 continue;
533d0af0 4753
38b12349
L
4754 /* Get the PLT section contents. */
4755 plt_contents = (bfd_byte *) bfd_malloc (plt->size);
4756 if (plt_contents == NULL)
4757 break;
4758 if (!bfd_get_section_contents (abfd, (asection *) plt,
4759 plt_contents, 0, plt->size))
4760 {
4761 free (plt_contents);
4762 break;
4763 }
144bed8d 4764
38b12349
L
4765 /* Check what kind of PLT it is. */
4766 plt_type = plt_unknown;
90efb642
L
4767 if (plts[j].type == plt_unknown
4768 && (plt->size >= (lazy_plt->plt_entry_size
4769 + lazy_plt->plt_entry_size)))
144bed8d 4770 {
38b12349
L
4771 /* Match lazy PLT first. Need to check the first two
4772 instructions. */
4773 if ((memcmp (plt_contents, lazy_plt->plt0_entry,
4774 lazy_plt->plt0_got1_offset) == 0)
4775 && (memcmp (plt_contents + 6, lazy_plt->plt0_entry + 6,
4776 2) == 0))
4777 plt_type = plt_lazy;
4778 else if (lazy_bnd_plt != NULL
4779 && (memcmp (plt_contents, lazy_bnd_plt->plt0_entry,
4780 lazy_bnd_plt->plt0_got1_offset) == 0)
4781 && (memcmp (plt_contents + 6,
4782 lazy_bnd_plt->plt0_entry + 6, 3) == 0))
ec1f73bb 4783 {
f2c29a16 4784 plt_type = plt_lazy | plt_second;
ee2fdd6f
L
4785 /* The fist entry in the lazy IBT PLT is the same as the
4786 lazy BND PLT. */
4787 if ((memcmp (plt_contents + lazy_ibt_plt->plt_entry_size,
4788 lazy_ibt_plt->plt_entry,
4789 lazy_ibt_plt->plt_got_offset) == 0))
4790 lazy_plt = lazy_ibt_plt;
4791 else
4792 lazy_plt = lazy_bnd_plt;
ec1f73bb 4793 }
144bed8d 4794 }
fca6ae69 4795
38b12349 4796 if (non_lazy_plt != NULL
90efb642
L
4797 && (plt_type == plt_unknown || plt_type == plt_non_lazy)
4798 && plt->size >= non_lazy_plt->plt_entry_size)
38b12349
L
4799 {
4800 /* Match non-lazy PLT. */
4801 if (memcmp (plt_contents, non_lazy_plt->plt_entry,
4802 non_lazy_plt->plt_got_offset) == 0)
4803 plt_type = plt_non_lazy;
4804 }
4805
ee2fdd6f 4806 if (plt_type == plt_unknown || plt_type == plt_second)
38b12349 4807 {
ee2fdd6f 4808 if (non_lazy_bnd_plt != NULL
90efb642 4809 && plt->size >= non_lazy_bnd_plt->plt_entry_size
ee2fdd6f
L
4810 && (memcmp (plt_contents, non_lazy_bnd_plt->plt_entry,
4811 non_lazy_bnd_plt->plt_got_offset) == 0))
38b12349 4812 {
ee2fdd6f 4813 /* Match BND PLT. */
f2c29a16 4814 plt_type = plt_second;
38b12349
L
4815 non_lazy_plt = non_lazy_bnd_plt;
4816 }
ee2fdd6f 4817 else if (non_lazy_ibt_plt != NULL
90efb642 4818 && plt->size >= non_lazy_ibt_plt->plt_entry_size
ee2fdd6f
L
4819 && (memcmp (plt_contents,
4820 non_lazy_ibt_plt->plt_entry,
4821 non_lazy_ibt_plt->plt_got_offset) == 0))
4822 {
4823 /* Match IBT PLT. */
4824 plt_type = plt_second;
4825 non_lazy_plt = non_lazy_ibt_plt;
4826 }
38b12349
L
4827 }
4828
4829 if (plt_type == plt_unknown)
37c0b6ee
L
4830 {
4831 free (plt_contents);
4832 continue;
4833 }
38b12349
L
4834
4835 plts[j].sec = plt;
4836 plts[j].type = plt_type;
4837
4838 if ((plt_type & plt_lazy))
4839 {
4840 plts[j].plt_got_offset = lazy_plt->plt_got_offset;
4841 plts[j].plt_got_insn_size = lazy_plt->plt_got_insn_size;
4842 plts[j].plt_entry_size = lazy_plt->plt_entry_size;
4843 /* Skip PLT0 in lazy PLT. */
4844 i = 1;
4845 }
4846 else
4847 {
4848 plts[j].plt_got_offset = non_lazy_plt->plt_got_offset;
4849 plts[j].plt_got_insn_size = non_lazy_plt->plt_got_insn_size;
4850 plts[j].plt_entry_size = non_lazy_plt->plt_entry_size;
4851 i = 0;
4852 }
4853
f2c29a16
L
4854 /* Skip lazy PLT when the second PLT is used. */
4855 if (plt_type == (plt_lazy | plt_second))
38b12349
L
4856 plts[j].count = 0;
4857 else
4858 {
4859 n = plt->size / plts[j].plt_entry_size;
4860 plts[j].count = n;
4861 count += n - i;
4862 }
4863
4864 plts[j].contents = plt_contents;
144bed8d
L
4865 }
4866
f493882d
L
4867 return _bfd_x86_elf_get_synthetic_symtab (abfd, count, relsize,
4868 (bfd_vma) 0, plts, dynsyms,
4869 ret);
0ff2b86e
L
4870}
4871
d2b2c203
DJ
4872/* Handle an x86-64 specific section when reading an object file. This
4873 is called when elfcode.h finds a section with an unknown type. */
4874
4875static bfd_boolean
0c723101
L
4876elf_x86_64_section_from_shdr (bfd *abfd, Elf_Internal_Shdr *hdr,
4877 const char *name, int shindex)
d2b2c203
DJ
4878{
4879 if (hdr->sh_type != SHT_X86_64_UNWIND)
4880 return FALSE;
4881
6dc132d9 4882 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
d2b2c203
DJ
4883 return FALSE;
4884
4885 return TRUE;
4886}
4887
3b22753a
L
4888/* Hook called by the linker routine which adds symbols from an object
4889 file. We use it to put SHN_X86_64_LCOMMON items in .lbss, instead
4890 of .bss. */
4891
4892static bfd_boolean
351f65ca 4893elf_x86_64_add_symbol_hook (bfd *abfd,
a43942db 4894 struct bfd_link_info *info ATTRIBUTE_UNUSED,
351f65ca
L
4895 Elf_Internal_Sym *sym,
4896 const char **namep ATTRIBUTE_UNUSED,
4897 flagword *flagsp ATTRIBUTE_UNUSED,
4898 asection **secp,
4899 bfd_vma *valp)
3b22753a
L
4900{
4901 asection *lcomm;
4902
4903 switch (sym->st_shndx)
4904 {
4905 case SHN_X86_64_LCOMMON:
4906 lcomm = bfd_get_section_by_name (abfd, "LARGE_COMMON");
4907 if (lcomm == NULL)
4908 {
4909 lcomm = bfd_make_section_with_flags (abfd,
4910 "LARGE_COMMON",
4911 (SEC_ALLOC
4912 | SEC_IS_COMMON
4913 | SEC_LINKER_CREATED));
4914 if (lcomm == NULL)
4915 return FALSE;
4916 elf_section_flags (lcomm) |= SHF_X86_64_LARGE;
4917 }
4918 *secp = lcomm;
4919 *valp = sym->st_size;
c35bdf6e 4920 return TRUE;
3b22753a 4921 }
d8045f23 4922
3b22753a
L
4923 return TRUE;
4924}
4925
4926
4927/* Given a BFD section, try to locate the corresponding ELF section
4928 index. */
4929
4930static bfd_boolean
351f65ca
L
4931elf_x86_64_elf_section_from_bfd_section (bfd *abfd ATTRIBUTE_UNUSED,
4932 asection *sec, int *index_return)
3b22753a
L
4933{
4934 if (sec == &_bfd_elf_large_com_section)
4935 {
91d6fa6a 4936 *index_return = SHN_X86_64_LCOMMON;
3b22753a
L
4937 return TRUE;
4938 }
4939 return FALSE;
4940}
4941
4942/* Process a symbol. */
4943
4944static void
351f65ca
L
4945elf_x86_64_symbol_processing (bfd *abfd ATTRIBUTE_UNUSED,
4946 asymbol *asym)
3b22753a
L
4947{
4948 elf_symbol_type *elfsym = (elf_symbol_type *) asym;
4949
4950 switch (elfsym->internal_elf_sym.st_shndx)
4951 {
4952 case SHN_X86_64_LCOMMON:
4953 asym->section = &_bfd_elf_large_com_section;
4954 asym->value = elfsym->internal_elf_sym.st_size;
4955 /* Common symbol doesn't set BSF_GLOBAL. */
4956 asym->flags &= ~BSF_GLOBAL;
4957 break;
4958 }
4959}
4960
4961static bfd_boolean
351f65ca 4962elf_x86_64_common_definition (Elf_Internal_Sym *sym)
3b22753a
L
4963{
4964 return (sym->st_shndx == SHN_COMMON
4965 || sym->st_shndx == SHN_X86_64_LCOMMON);
4966}
4967
4968static unsigned int
351f65ca 4969elf_x86_64_common_section_index (asection *sec)
3b22753a
L
4970{
4971 if ((elf_section_flags (sec) & SHF_X86_64_LARGE) == 0)
4972 return SHN_COMMON;
4973 else
4974 return SHN_X86_64_LCOMMON;
4975}
4976
4977static asection *
351f65ca 4978elf_x86_64_common_section (asection *sec)
3b22753a
L
4979{
4980 if ((elf_section_flags (sec) & SHF_X86_64_LARGE) == 0)
4981 return bfd_com_section_ptr;
4982 else
4983 return &_bfd_elf_large_com_section;
4984}
4985
4986static bfd_boolean
5d13b3b3
AM
4987elf_x86_64_merge_symbol (struct elf_link_hash_entry *h,
4988 const Elf_Internal_Sym *sym,
351f65ca 4989 asection **psec,
5d13b3b3
AM
4990 bfd_boolean newdef,
4991 bfd_boolean olddef,
351f65ca 4992 bfd *oldbfd,
5d13b3b3 4993 const asection *oldsec)
3b22753a
L
4994{
4995 /* A normal common symbol and a large common symbol result in a
00492999
L
4996 normal common symbol. We turn the large common symbol into a
4997 normal one. */
5d13b3b3 4998 if (!olddef
3b22753a 4999 && h->root.type == bfd_link_hash_common
5d13b3b3
AM
5000 && !newdef
5001 && bfd_is_com_section (*psec)
5002 && oldsec != *psec)
3b22753a 5003 {
00492999 5004 if (sym->st_shndx == SHN_COMMON
5d13b3b3 5005 && (elf_section_flags (oldsec) & SHF_X86_64_LARGE) != 0)
00492999
L
5006 {
5007 h->root.u.c.p->section
5008 = bfd_make_section_old_way (oldbfd, "COMMON");
5009 h->root.u.c.p->section->flags = SEC_ALLOC;
5010 }
5011 else if (sym->st_shndx == SHN_X86_64_LCOMMON
5d13b3b3
AM
5012 && (elf_section_flags (oldsec) & SHF_X86_64_LARGE) == 0)
5013 *psec = bfd_com_section_ptr;
3b22753a
L
5014 }
5015
5016 return TRUE;
5017}
5018
5019static int
351f65ca
L
5020elf_x86_64_additional_program_headers (bfd *abfd,
5021 struct bfd_link_info *info ATTRIBUTE_UNUSED)
3b22753a
L
5022{
5023 asection *s;
9a2e389a 5024 int count = 0;
3b22753a
L
5025
5026 /* Check to see if we need a large readonly segment. */
5027 s = bfd_get_section_by_name (abfd, ".lrodata");
5028 if (s && (s->flags & SEC_LOAD))
5029 count++;
5030
5031 /* Check to see if we need a large data segment. Since .lbss sections
5032 is placed right after the .bss section, there should be no need for
5033 a large data segment just because of .lbss. */
5034 s = bfd_get_section_by_name (abfd, ".ldata");
5035 if (s && (s->flags & SEC_LOAD))
5036 count++;
5037
5038 return count;
5039}
5040
c543bf9a
L
5041/* Return TRUE iff relocations for INPUT are compatible with OUTPUT. */
5042
5043static bfd_boolean
5044elf_x86_64_relocs_compatible (const bfd_target *input,
5045 const bfd_target *output)
5046{
5047 return ((xvec_get_elf_backend_data (input)->s->elfclass
5048 == xvec_get_elf_backend_data (output)->s->elfclass)
5049 && _bfd_elf_relocs_compatible (input, output));
5050}
5051
38b12349
L
5052/* Set up x86-64 GNU properties. Return the first relocatable ELF input
5053 with GNU properties if found. Otherwise, return NULL. */
5054
5055static bfd *
5056elf_x86_64_link_setup_gnu_properties (struct bfd_link_info *info)
5057{
1de031c8 5058 struct elf_x86_init_table init_table;
ee2fdd6f 5059
78984959
L
5060 if ((int) R_X86_64_standard >= (int) R_X86_64_converted_reloc_bit
5061 || (int) R_X86_64_max <= (int) R_X86_64_converted_reloc_bit
5062 || ((int) (R_X86_64_GNU_VTINHERIT | R_X86_64_converted_reloc_bit)
5063 != (int) R_X86_64_GNU_VTINHERIT)
5064 || ((int) (R_X86_64_GNU_VTENTRY | R_X86_64_converted_reloc_bit)
5065 != (int) R_X86_64_GNU_VTENTRY))
5066 abort ();
5067
1de031c8 5068 init_table.is_vxworks = FALSE;
a6798bab 5069 if (get_elf_x86_64_backend_data (info->output_bfd)->os == is_normal)
73784fa5 5070 {
a6798bab 5071 if (info->bndplt)
ee2fdd6f 5072 {
1de031c8
L
5073 init_table.lazy_plt = &elf_x86_64_lazy_bnd_plt;
5074 init_table.non_lazy_plt = &elf_x86_64_non_lazy_bnd_plt;
ee2fdd6f
L
5075 }
5076 else
5077 {
1de031c8
L
5078 init_table.lazy_plt = &elf_x86_64_lazy_plt;
5079 init_table.non_lazy_plt = &elf_x86_64_non_lazy_plt;
ee2fdd6f 5080 }
38b12349 5081
a6798bab 5082 if (ABI_64_P (info->output_bfd))
38b12349 5083 {
1de031c8
L
5084 init_table.lazy_ibt_plt = &elf_x86_64_lazy_ibt_plt;
5085 init_table.non_lazy_ibt_plt = &elf_x86_64_non_lazy_ibt_plt;
38b12349
L
5086 }
5087 else
5088 {
1de031c8
L
5089 init_table.lazy_ibt_plt = &elf_x32_lazy_ibt_plt;
5090 init_table.non_lazy_ibt_plt = &elf_x32_non_lazy_ibt_plt;
38b12349 5091 }
1de031c8 5092 init_table.normal_target = TRUE;
38b12349
L
5093 }
5094 else
5095 {
1de031c8
L
5096 init_table.lazy_plt = &elf_x86_64_nacl_plt;
5097 init_table.non_lazy_plt = NULL;
5098 init_table.lazy_ibt_plt = NULL;
5099 init_table.non_lazy_ibt_plt = NULL;
5100 init_table.normal_target = FALSE;
38b12349
L
5101 }
5102
7a382c1c
L
5103 if (ABI_64_P (info->output_bfd))
5104 {
1de031c8
L
5105 init_table.r_info = elf64_r_info;
5106 init_table.r_sym = elf64_r_sym;
7a382c1c
L
5107 }
5108 else
5109 {
1de031c8
L
5110 init_table.r_info = elf32_r_info;
5111 init_table.r_sym = elf32_r_sym;
7a382c1c
L
5112 }
5113
1de031c8 5114 return _bfd_x86_elf_link_setup_gnu_properties (info, &init_table);
38b12349
L
5115}
5116
9a2e389a 5117static const struct bfd_elf_special_section
46bed679 5118elf_x86_64_special_sections[]=
3b22753a 5119{
0112cd26
NC
5120 { STRING_COMMA_LEN (".gnu.linkonce.lb"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5121 { STRING_COMMA_LEN (".gnu.linkonce.lr"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_X86_64_LARGE},
5122 { STRING_COMMA_LEN (".gnu.linkonce.lt"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR + SHF_X86_64_LARGE},
5123 { STRING_COMMA_LEN (".lbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5124 { STRING_COMMA_LEN (".ldata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_X86_64_LARGE},
5125 { STRING_COMMA_LEN (".lrodata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_X86_64_LARGE},
5126 { NULL, 0, 0, 0, 0 }
3b22753a
L
5127};
5128
6d00b590 5129#define TARGET_LITTLE_SYM x86_64_elf64_vec
70256ad8
AJ
5130#define TARGET_LITTLE_NAME "elf64-x86-64"
5131#define ELF_ARCH bfd_arch_i386
ae95ffa6 5132#define ELF_TARGET_ID X86_64_ELF_DATA
70256ad8 5133#define ELF_MACHINE_CODE EM_X86_64
f7661549 5134#define ELF_MAXPAGESIZE 0x200000
2043964e 5135#define ELF_MINPAGESIZE 0x1000
24718e3b 5136#define ELF_COMMONPAGESIZE 0x1000
70256ad8
AJ
5137
5138#define elf_backend_can_gc_sections 1
51b64d56 5139#define elf_backend_can_refcount 1
70256ad8
AJ
5140#define elf_backend_want_got_plt 1
5141#define elf_backend_plt_readonly 1
5142#define elf_backend_want_plt_sym 0
5143#define elf_backend_got_header_size (GOT_ENTRY_SIZE*3)
b491616a 5144#define elf_backend_rela_normal 1
e41b3a13 5145#define elf_backend_plt_alignment 4
f7483970 5146#define elf_backend_extern_protected_data 1
bedfd056 5147#define elf_backend_caches_rawsize 1
64f52338 5148#define elf_backend_dtrel_excludes_plt 1
5474d94f 5149#define elf_backend_want_dynrelro 1
70256ad8 5150
351f65ca 5151#define elf_info_to_howto elf_x86_64_info_to_howto
70256ad8 5152
351f65ca 5153#define bfd_elf64_bfd_reloc_type_lookup elf_x86_64_reloc_type_lookup
157090f7 5154#define bfd_elf64_bfd_reloc_name_lookup \
351f65ca 5155 elf_x86_64_reloc_name_lookup
70256ad8 5156
c543bf9a 5157#define elf_backend_relocs_compatible elf_x86_64_relocs_compatible
351f65ca 5158#define elf_backend_check_relocs elf_x86_64_check_relocs
38b12349 5159#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
351f65ca
L
5160#define elf_backend_finish_dynamic_sections elf_x86_64_finish_dynamic_sections
5161#define elf_backend_finish_dynamic_symbol elf_x86_64_finish_dynamic_symbol
233cc9c1 5162#define elf_backend_output_arch_local_syms elf_x86_64_output_arch_local_syms
351f65ca
L
5163#define elf_backend_grok_prstatus elf_x86_64_grok_prstatus
5164#define elf_backend_grok_psinfo elf_x86_64_grok_psinfo
8fd79e71
L
5165#ifdef CORE_HEADER
5166#define elf_backend_write_core_note elf_x86_64_write_core_note
5167#endif
351f65ca
L
5168#define elf_backend_reloc_type_class elf_x86_64_reloc_type_class
5169#define elf_backend_relocate_section elf_x86_64_relocate_section
74541ad4 5170#define elf_backend_init_index_section _bfd_elf_init_1_index_section
407443a3 5171#define elf_backend_object_p elf64_x86_64_elf_object_p
0ff2b86e 5172#define bfd_elf64_get_synthetic_symtab elf_x86_64_get_synthetic_symtab
8d88c4ca 5173
d2b2c203 5174#define elf_backend_section_from_shdr \
351f65ca 5175 elf_x86_64_section_from_shdr
d2b2c203 5176
3b22753a 5177#define elf_backend_section_from_bfd_section \
351f65ca 5178 elf_x86_64_elf_section_from_bfd_section
3b22753a 5179#define elf_backend_add_symbol_hook \
351f65ca 5180 elf_x86_64_add_symbol_hook
3b22753a 5181#define elf_backend_symbol_processing \
351f65ca 5182 elf_x86_64_symbol_processing
3b22753a 5183#define elf_backend_common_section_index \
351f65ca 5184 elf_x86_64_common_section_index
3b22753a 5185#define elf_backend_common_section \
351f65ca 5186 elf_x86_64_common_section
3b22753a 5187#define elf_backend_common_definition \
351f65ca 5188 elf_x86_64_common_definition
3b22753a 5189#define elf_backend_merge_symbol \
351f65ca 5190 elf_x86_64_merge_symbol
3b22753a 5191#define elf_backend_special_sections \
351f65ca 5192 elf_x86_64_special_sections
3b22753a 5193#define elf_backend_additional_program_headers \
351f65ca 5194 elf_x86_64_additional_program_headers
38b12349
L
5195#define elf_backend_setup_gnu_properties \
5196 elf_x86_64_link_setup_gnu_properties
3b22753a 5197
8d88c4ca 5198#include "elf64-target.h"
9d7cbccd 5199
6036f486
ES
5200/* CloudABI support. */
5201
5202#undef TARGET_LITTLE_SYM
5203#define TARGET_LITTLE_SYM x86_64_elf64_cloudabi_vec
5204#undef TARGET_LITTLE_NAME
5205#define TARGET_LITTLE_NAME "elf64-x86-64-cloudabi"
5206
5207#undef ELF_OSABI
5208#define ELF_OSABI ELFOSABI_CLOUDABI
5209
5210#undef elf64_bed
5211#define elf64_bed elf64_x86_64_cloudabi_bed
5212
5213#include "elf64-target.h"
5214
9d7cbccd
NC
5215/* FreeBSD support. */
5216
5217#undef TARGET_LITTLE_SYM
6d00b590 5218#define TARGET_LITTLE_SYM x86_64_elf64_fbsd_vec
9d7cbccd
NC
5219#undef TARGET_LITTLE_NAME
5220#define TARGET_LITTLE_NAME "elf64-x86-64-freebsd"
5221
d1036acb
L
5222#undef ELF_OSABI
5223#define ELF_OSABI ELFOSABI_FREEBSD
9d7cbccd 5224
9d7cbccd
NC
5225#undef elf64_bed
5226#define elf64_bed elf64_x86_64_fbsd_bed
5227
5228#include "elf64-target.h"
8a9036a4 5229
a6cc6b3b
RO
5230/* Solaris 2 support. */
5231
5232#undef TARGET_LITTLE_SYM
6d00b590 5233#define TARGET_LITTLE_SYM x86_64_elf64_sol2_vec
a6cc6b3b
RO
5234#undef TARGET_LITTLE_NAME
5235#define TARGET_LITTLE_NAME "elf64-x86-64-sol2"
5236
5237/* Restore default: we cannot use ELFOSABI_SOLARIS, otherwise ELFOSABI_NONE
5238 objects won't be recognized. */
5239#undef ELF_OSABI
5240
5241#undef elf64_bed
5242#define elf64_bed elf64_x86_64_sol2_bed
5243
7dc98aea
RO
5244/* The 64-bit static TLS arena size is rounded to the nearest 16-byte
5245 boundary. */
84865015 5246#undef elf_backend_static_tls_alignment
7dc98aea
RO
5247#define elf_backend_static_tls_alignment 16
5248
a6cc6b3b
RO
5249/* The Solaris 2 ABI requires a plt symbol on all platforms.
5250
5251 Cf. Linker and Libraries Guide, Ch. 2, Link-Editor, Generating the Output
5252 File, p.63. */
84865015 5253#undef elf_backend_want_plt_sym
a6cc6b3b
RO
5254#define elf_backend_want_plt_sym 1
5255
84865015
NC
5256#undef elf_backend_strtab_flags
5257#define elf_backend_strtab_flags SHF_STRINGS
5258
5259static bfd_boolean
5522f910
NC
5260elf64_x86_64_copy_solaris_special_section_fields (const bfd *ibfd ATTRIBUTE_UNUSED,
5261 bfd *obfd ATTRIBUTE_UNUSED,
5262 const Elf_Internal_Shdr *isection ATTRIBUTE_UNUSED,
5263 Elf_Internal_Shdr *osection ATTRIBUTE_UNUSED)
84865015
NC
5264{
5265 /* PR 19938: FIXME: Need to add code for setting the sh_info
5266 and sh_link fields of Solaris specific section types. */
5267 return FALSE;
5268}
5269
5522f910
NC
5270#undef elf_backend_copy_special_section_fields
5271#define elf_backend_copy_special_section_fields elf64_x86_64_copy_solaris_special_section_fields
84865015 5272
a6cc6b3b
RO
5273#include "elf64-target.h"
5274
8059fb19
RM
5275/* Native Client support. */
5276
64b384e1
RM
5277static bfd_boolean
5278elf64_x86_64_nacl_elf_object_p (bfd *abfd)
5279{
5280 /* Set the right machine number for a NaCl x86-64 ELF64 file. */
5281 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x86_64_nacl);
5282 return TRUE;
5283}
5284
8059fb19 5285#undef TARGET_LITTLE_SYM
6d00b590 5286#define TARGET_LITTLE_SYM x86_64_elf64_nacl_vec
8059fb19
RM
5287#undef TARGET_LITTLE_NAME
5288#define TARGET_LITTLE_NAME "elf64-x86-64-nacl"
5289#undef elf64_bed
5290#define elf64_bed elf64_x86_64_nacl_bed
5291
5292#undef ELF_MAXPAGESIZE
5293#undef ELF_MINPAGESIZE
5294#undef ELF_COMMONPAGESIZE
5295#define ELF_MAXPAGESIZE 0x10000
5296#define ELF_MINPAGESIZE 0x10000
5297#define ELF_COMMONPAGESIZE 0x10000
5298
5299/* Restore defaults. */
5300#undef ELF_OSABI
5301#undef elf_backend_static_tls_alignment
5302#undef elf_backend_want_plt_sym
5303#define elf_backend_want_plt_sym 0
84865015 5304#undef elf_backend_strtab_flags
5522f910 5305#undef elf_backend_copy_special_section_fields
8059fb19
RM
5306
5307/* NaCl uses substantially different PLT entries for the same effects. */
5308
5309#undef elf_backend_plt_alignment
5310#define elf_backend_plt_alignment 5
5311#define NACL_PLT_ENTRY_SIZE 64
5312#define NACLMASK 0xe0 /* 32-byte alignment mask. */
5313
5314static const bfd_byte elf_x86_64_nacl_plt0_entry[NACL_PLT_ENTRY_SIZE] =
5315 {
5316 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
5317 0x4c, 0x8b, 0x1d, 16, 0, 0, 0, /* mov GOT+16(%rip), %r11 */
5318 0x41, 0x83, 0xe3, NACLMASK, /* and $-32, %r11d */
5319 0x4d, 0x01, 0xfb, /* add %r15, %r11 */
5320 0x41, 0xff, 0xe3, /* jmpq *%r11 */
5321
ea2d813e 5322 /* 9-byte nop sequence to pad out to the next 32-byte boundary. */
70cc877f 5323 0x66, 0x0f, 0x1f, 0x84, 0, 0, 0, 0, 0, /* nopw 0x0(%rax,%rax,1) */
ea2d813e
RM
5324
5325 /* 32 bytes of nop to pad out to the standard size. */
3ddf1bdd 5326 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, /* excess data16 prefixes */
8059fb19 5327 0x2e, 0x0f, 0x1f, 0x84, 0, 0, 0, 0, 0, /* nopw %cs:0x0(%rax,%rax,1) */
3ddf1bdd 5328 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, /* excess data16 prefixes */
8059fb19 5329 0x2e, 0x0f, 0x1f, 0x84, 0, 0, 0, 0, 0, /* nopw %cs:0x0(%rax,%rax,1) */
3ddf1bdd 5330 0x66, /* excess data16 prefix */
ea2d813e 5331 0x90 /* nop */
8059fb19
RM
5332 };
5333
5334static const bfd_byte elf_x86_64_nacl_plt_entry[NACL_PLT_ENTRY_SIZE] =
5335 {
5336 0x4c, 0x8b, 0x1d, 0, 0, 0, 0, /* mov name@GOTPCREL(%rip),%r11 */
5337 0x41, 0x83, 0xe3, NACLMASK, /* and $-32, %r11d */
5338 0x4d, 0x01, 0xfb, /* add %r15, %r11 */
5339 0x41, 0xff, 0xe3, /* jmpq *%r11 */
5340
5341 /* 15-byte nop sequence to pad out to the next 32-byte boundary. */
3ddf1bdd 5342 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, /* excess data16 prefixes */
8059fb19
RM
5343 0x2e, 0x0f, 0x1f, 0x84, 0, 0, 0, 0, 0, /* nopw %cs:0x0(%rax,%rax,1) */
5344
5345 /* Lazy GOT entries point here (32-byte aligned). */
5346 0x68, /* pushq immediate */
5347 0, 0, 0, 0, /* replaced with index into relocation table. */
5348 0xe9, /* jmp relative */
5349 0, 0, 0, 0, /* replaced with offset to start of .plt0. */
5350
5351 /* 22 bytes of nop to pad out to the standard size. */
3ddf1bdd 5352 0x66, 0x66, 0x66, 0x66, 0x66, 0x66, /* excess data16 prefixes */
8059fb19
RM
5353 0x2e, 0x0f, 0x1f, 0x84, 0, 0, 0, 0, 0, /* nopw %cs:0x0(%rax,%rax,1) */
5354 0x0f, 0x1f, 0x80, 0, 0, 0, 0, /* nopl 0x0(%rax) */
5355 };
5356
5357/* .eh_frame covering the .plt section. */
5358
5359static const bfd_byte elf_x86_64_nacl_eh_frame_plt[] =
5360 {
5361#if (PLT_CIE_LENGTH != 20 \
5362 || PLT_FDE_LENGTH != 36 \
5363 || PLT_FDE_START_OFFSET != 4 + PLT_CIE_LENGTH + 8 \
5364 || PLT_FDE_LEN_OFFSET != 4 + PLT_CIE_LENGTH + 12)
5365# error "Need elf_x86_64_backend_data parameters for eh_frame_plt offsets!"
5366#endif
5367 PLT_CIE_LENGTH, 0, 0, 0, /* CIE length */
5368 0, 0, 0, 0, /* CIE ID */
5369 1, /* CIE version */
5370 'z', 'R', 0, /* Augmentation string */
5371 1, /* Code alignment factor */
5372 0x78, /* Data alignment factor */
5373 16, /* Return address column */
5374 1, /* Augmentation size */
5375 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding */
5376 DW_CFA_def_cfa, 7, 8, /* DW_CFA_def_cfa: r7 (rsp) ofs 8 */
5377 DW_CFA_offset + 16, 1, /* DW_CFA_offset: r16 (rip) at cfa-8 */
5378 DW_CFA_nop, DW_CFA_nop,
5379
5380 PLT_FDE_LENGTH, 0, 0, 0, /* FDE length */
5381 PLT_CIE_LENGTH + 8, 0, 0, 0,/* CIE pointer */
5382 0, 0, 0, 0, /* R_X86_64_PC32 .plt goes here */
5383 0, 0, 0, 0, /* .plt size goes here */
5384 0, /* Augmentation size */
5385 DW_CFA_def_cfa_offset, 16, /* DW_CFA_def_cfa_offset: 16 */
5386 DW_CFA_advance_loc + 6, /* DW_CFA_advance_loc: 6 to __PLT__+6 */
5387 DW_CFA_def_cfa_offset, 24, /* DW_CFA_def_cfa_offset: 24 */
5388 DW_CFA_advance_loc + 58, /* DW_CFA_advance_loc: 58 to __PLT__+64 */
5389 DW_CFA_def_cfa_expression, /* DW_CFA_def_cfa_expression */
5390 13, /* Block length */
5391 DW_OP_breg7, 8, /* DW_OP_breg7 (rsp): 8 */
5392 DW_OP_breg16, 0, /* DW_OP_breg16 (rip): 0 */
5393 DW_OP_const1u, 63, DW_OP_and, DW_OP_const1u, 37, DW_OP_ge,
5394 DW_OP_lit3, DW_OP_shl, DW_OP_plus,
5395 DW_CFA_nop, DW_CFA_nop
5396 };
5397
765e526c 5398static const struct elf_x86_lazy_plt_layout elf_x86_64_nacl_plt =
8059fb19
RM
5399 {
5400 elf_x86_64_nacl_plt0_entry, /* plt0_entry */
765e526c 5401 NACL_PLT_ENTRY_SIZE, /* plt0_entry_size */
8059fb19
RM
5402 elf_x86_64_nacl_plt_entry, /* plt_entry */
5403 NACL_PLT_ENTRY_SIZE, /* plt_entry_size */
5404 2, /* plt0_got1_offset */
5405 9, /* plt0_got2_offset */
5406 13, /* plt0_got2_insn_end */
5407 3, /* plt_got_offset */
5408 33, /* plt_reloc_offset */
5409 38, /* plt_plt_offset */
5410 7, /* plt_got_insn_size */
5411 42, /* plt_plt_insn_end */
5412 32, /* plt_lazy_offset */
a6798bab
L
5413 elf_x86_64_nacl_plt0_entry, /* pic_plt0_entry */
5414 elf_x86_64_nacl_plt_entry, /* pic_plt_entry */
8059fb19 5415 elf_x86_64_nacl_eh_frame_plt, /* eh_frame_plt */
38b12349
L
5416 sizeof (elf_x86_64_nacl_eh_frame_plt) /* eh_frame_plt_size */
5417 };
5418
5419static const struct elf_x86_64_backend_data elf_x86_64_nacl_arch_bed =
5420 {
5421 is_nacl /* os */
8059fb19
RM
5422 };
5423
5424#undef elf_backend_arch_data
5425#define elf_backend_arch_data &elf_x86_64_nacl_arch_bed
5426
64b384e1
RM
5427#undef elf_backend_object_p
5428#define elf_backend_object_p elf64_x86_64_nacl_elf_object_p
5a68afcf
RM
5429#undef elf_backend_modify_segment_map
5430#define elf_backend_modify_segment_map nacl_modify_segment_map
5431#undef elf_backend_modify_program_headers
5432#define elf_backend_modify_program_headers nacl_modify_program_headers
887badb3
RM
5433#undef elf_backend_final_write_processing
5434#define elf_backend_final_write_processing nacl_final_write_processing
5a68afcf 5435
8059fb19
RM
5436#include "elf64-target.h"
5437
5438/* Native Client x32 support. */
5439
64b384e1
RM
5440static bfd_boolean
5441elf32_x86_64_nacl_elf_object_p (bfd *abfd)
5442{
5443 /* Set the right machine number for a NaCl x86-64 ELF32 file. */
5444 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x64_32_nacl);
5445 return TRUE;
5446}
5447
8059fb19 5448#undef TARGET_LITTLE_SYM
6d00b590 5449#define TARGET_LITTLE_SYM x86_64_elf32_nacl_vec
8059fb19
RM
5450#undef TARGET_LITTLE_NAME
5451#define TARGET_LITTLE_NAME "elf32-x86-64-nacl"
5452#undef elf32_bed
5453#define elf32_bed elf32_x86_64_nacl_bed
5454
8059fb19
RM
5455#define bfd_elf32_bfd_reloc_type_lookup \
5456 elf_x86_64_reloc_type_lookup
5457#define bfd_elf32_bfd_reloc_name_lookup \
5458 elf_x86_64_reloc_name_lookup
b7365e5d
L
5459#define bfd_elf32_get_synthetic_symtab \
5460 elf_x86_64_get_synthetic_symtab
8059fb19
RM
5461
5462#undef elf_backend_object_p
5463#define elf_backend_object_p \
64b384e1 5464 elf32_x86_64_nacl_elf_object_p
8059fb19
RM
5465
5466#undef elf_backend_bfd_from_remote_memory
5467#define elf_backend_bfd_from_remote_memory \
5468 _bfd_elf32_bfd_from_remote_memory
5469
5470#undef elf_backend_size_info
5471#define elf_backend_size_info \
5472 _bfd_elf32_size_info
5473
5474#include "elf32-target.h"
5475
5476/* Restore defaults. */
5a68afcf 5477#undef elf_backend_object_p
8059fb19 5478#define elf_backend_object_p elf64_x86_64_elf_object_p
5a68afcf
RM
5479#undef elf_backend_bfd_from_remote_memory
5480#undef elf_backend_size_info
5481#undef elf_backend_modify_segment_map
5482#undef elf_backend_modify_program_headers
887badb3 5483#undef elf_backend_final_write_processing
8059fb19 5484
8a9036a4
L
5485/* Intel L1OM support. */
5486
5487static bfd_boolean
5488elf64_l1om_elf_object_p (bfd *abfd)
5489{
5490 /* Set the right machine number for an L1OM elf64 file. */
5491 bfd_default_set_arch_mach (abfd, bfd_arch_l1om, bfd_mach_l1om);
5492 return TRUE;
5493}
5494
5495#undef TARGET_LITTLE_SYM
6d00b590 5496#define TARGET_LITTLE_SYM l1om_elf64_vec
8a9036a4
L
5497#undef TARGET_LITTLE_NAME
5498#define TARGET_LITTLE_NAME "elf64-l1om"
5499#undef ELF_ARCH
5500#define ELF_ARCH bfd_arch_l1om
5501
5502#undef ELF_MACHINE_CODE
5503#define ELF_MACHINE_CODE EM_L1OM
5504
5505#undef ELF_OSABI
5506
5507#undef elf64_bed
5508#define elf64_bed elf64_l1om_bed
5509
5510#undef elf_backend_object_p
5511#define elf_backend_object_p elf64_l1om_elf_object_p
5512
8059fb19
RM
5513/* Restore defaults. */
5514#undef ELF_MAXPAGESIZE
5515#undef ELF_MINPAGESIZE
5516#undef ELF_COMMONPAGESIZE
5517#define ELF_MAXPAGESIZE 0x200000
5518#define ELF_MINPAGESIZE 0x1000
5519#define ELF_COMMONPAGESIZE 0x1000
5520#undef elf_backend_plt_alignment
5521#define elf_backend_plt_alignment 4
5522#undef elf_backend_arch_data
5523#define elf_backend_arch_data &elf_x86_64_arch_bed
1a0c107f 5524
8a9036a4
L
5525#include "elf64-target.h"
5526
5527/* FreeBSD L1OM support. */
5528
5529#undef TARGET_LITTLE_SYM
6d00b590 5530#define TARGET_LITTLE_SYM l1om_elf64_fbsd_vec
8a9036a4
L
5531#undef TARGET_LITTLE_NAME
5532#define TARGET_LITTLE_NAME "elf64-l1om-freebsd"
5533
5534#undef ELF_OSABI
5535#define ELF_OSABI ELFOSABI_FREEBSD
5536
5537#undef elf64_bed
5538#define elf64_bed elf64_l1om_fbsd_bed
5539
8a9036a4 5540#include "elf64-target.h"
351f65ca 5541
7a9068fe
L
5542/* Intel K1OM support. */
5543
5544static bfd_boolean
5545elf64_k1om_elf_object_p (bfd *abfd)
5546{
5547 /* Set the right machine number for an K1OM elf64 file. */
5548 bfd_default_set_arch_mach (abfd, bfd_arch_k1om, bfd_mach_k1om);
5549 return TRUE;
5550}
5551
5552#undef TARGET_LITTLE_SYM
6d00b590 5553#define TARGET_LITTLE_SYM k1om_elf64_vec
7a9068fe
L
5554#undef TARGET_LITTLE_NAME
5555#define TARGET_LITTLE_NAME "elf64-k1om"
5556#undef ELF_ARCH
5557#define ELF_ARCH bfd_arch_k1om
5558
5559#undef ELF_MACHINE_CODE
5560#define ELF_MACHINE_CODE EM_K1OM
5561
5562#undef ELF_OSABI
5563
5564#undef elf64_bed
5565#define elf64_bed elf64_k1om_bed
5566
5567#undef elf_backend_object_p
5568#define elf_backend_object_p elf64_k1om_elf_object_p
5569
5570#undef elf_backend_static_tls_alignment
5571
5572#undef elf_backend_want_plt_sym
5573#define elf_backend_want_plt_sym 0
5574
5575#include "elf64-target.h"
5576
5577/* FreeBSD K1OM support. */
5578
5579#undef TARGET_LITTLE_SYM
6d00b590 5580#define TARGET_LITTLE_SYM k1om_elf64_fbsd_vec
7a9068fe
L
5581#undef TARGET_LITTLE_NAME
5582#define TARGET_LITTLE_NAME "elf64-k1om-freebsd"
5583
5584#undef ELF_OSABI
5585#define ELF_OSABI ELFOSABI_FREEBSD
5586
5587#undef elf64_bed
5588#define elf64_bed elf64_k1om_fbsd_bed
5589
5590#include "elf64-target.h"
5591
351f65ca
L
5592/* 32bit x86-64 support. */
5593
351f65ca 5594#undef TARGET_LITTLE_SYM
6d00b590 5595#define TARGET_LITTLE_SYM x86_64_elf32_vec
351f65ca
L
5596#undef TARGET_LITTLE_NAME
5597#define TARGET_LITTLE_NAME "elf32-x86-64"
8059fb19 5598#undef elf32_bed
351f65ca
L
5599
5600#undef ELF_ARCH
5601#define ELF_ARCH bfd_arch_i386
5602
5603#undef ELF_MACHINE_CODE
5604#define ELF_MACHINE_CODE EM_X86_64
5605
351f65ca
L
5606#undef ELF_OSABI
5607
351f65ca
L
5608#undef elf_backend_object_p
5609#define elf_backend_object_p \
5610 elf32_x86_64_elf_object_p
5611
5612#undef elf_backend_bfd_from_remote_memory
5613#define elf_backend_bfd_from_remote_memory \
5614 _bfd_elf32_bfd_from_remote_memory
5615
5616#undef elf_backend_size_info
5617#define elf_backend_size_info \
5618 _bfd_elf32_size_info
5619
5620#include "elf32-target.h"
This page took 1.448592 seconds and 4 git commands to generate.