1 /* X86-64 specific support for 64-bit ELF
2 Copyright 2000, 2001, 2002, 2003, 2004 Free Software Foundation, Inc.
3 Contributed by Jan Hubicka <jh@suse.cz>.
5 This file is part of BFD, the Binary File Descriptor library.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
27 #include "elf/x86-64.h"
29 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value. */
30 #define MINUS_ONE (~ (bfd_vma) 0)
32 /* The relocation "howto" table. Order of fields:
33 type, size, bitsize, pc_relative, complain_on_overflow,
34 special_function, name, partial_inplace, src_mask, dst_pack, pcrel_offset. */
35 static reloc_howto_type x86_64_elf_howto_table[] =
37 HOWTO(R_X86_64_NONE, 0, 0, 0, FALSE, 0, complain_overflow_dont,
38 bfd_elf_generic_reloc, "R_X86_64_NONE", FALSE, 0x00000000, 0x00000000,
40 HOWTO(R_X86_64_64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
41 bfd_elf_generic_reloc, "R_X86_64_64", FALSE, MINUS_ONE, MINUS_ONE,
43 HOWTO(R_X86_64_PC32, 0, 2, 32, TRUE, 0, complain_overflow_signed,
44 bfd_elf_generic_reloc, "R_X86_64_PC32", FALSE, 0xffffffff, 0xffffffff,
46 HOWTO(R_X86_64_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_signed,
47 bfd_elf_generic_reloc, "R_X86_64_GOT32", FALSE, 0xffffffff, 0xffffffff,
49 HOWTO(R_X86_64_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_signed,
50 bfd_elf_generic_reloc, "R_X86_64_PLT32", FALSE, 0xffffffff, 0xffffffff,
52 HOWTO(R_X86_64_COPY, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
53 bfd_elf_generic_reloc, "R_X86_64_COPY", FALSE, 0xffffffff, 0xffffffff,
55 HOWTO(R_X86_64_GLOB_DAT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
56 bfd_elf_generic_reloc, "R_X86_64_GLOB_DAT", FALSE, MINUS_ONE,
58 HOWTO(R_X86_64_JUMP_SLOT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
59 bfd_elf_generic_reloc, "R_X86_64_JUMP_SLOT", FALSE, MINUS_ONE,
61 HOWTO(R_X86_64_RELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
62 bfd_elf_generic_reloc, "R_X86_64_RELATIVE", FALSE, MINUS_ONE,
64 HOWTO(R_X86_64_GOTPCREL, 0, 2, 32, TRUE, 0, complain_overflow_signed,
65 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL", FALSE, 0xffffffff,
67 HOWTO(R_X86_64_32, 0, 2, 32, FALSE, 0, complain_overflow_unsigned,
68 bfd_elf_generic_reloc, "R_X86_64_32", FALSE, 0xffffffff, 0xffffffff,
70 HOWTO(R_X86_64_32S, 0, 2, 32, FALSE, 0, complain_overflow_signed,
71 bfd_elf_generic_reloc, "R_X86_64_32S", FALSE, 0xffffffff, 0xffffffff,
73 HOWTO(R_X86_64_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
74 bfd_elf_generic_reloc, "R_X86_64_16", FALSE, 0xffff, 0xffff, FALSE),
75 HOWTO(R_X86_64_PC16,0, 1, 16, TRUE, 0, complain_overflow_bitfield,
76 bfd_elf_generic_reloc, "R_X86_64_PC16", FALSE, 0xffff, 0xffff, TRUE),
77 HOWTO(R_X86_64_8, 0, 0, 8, FALSE, 0, complain_overflow_signed,
78 bfd_elf_generic_reloc, "R_X86_64_8", FALSE, 0xff, 0xff, FALSE),
79 HOWTO(R_X86_64_PC8, 0, 0, 8, TRUE, 0, complain_overflow_signed,
80 bfd_elf_generic_reloc, "R_X86_64_PC8", FALSE, 0xff, 0xff, TRUE),
81 HOWTO(R_X86_64_DTPMOD64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
82 bfd_elf_generic_reloc, "R_X86_64_DTPMOD64", FALSE, MINUS_ONE,
84 HOWTO(R_X86_64_DTPOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_X86_64_DTPOFF64", FALSE, MINUS_ONE,
87 HOWTO(R_X86_64_TPOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
88 bfd_elf_generic_reloc, "R_X86_64_TPOFF64", FALSE, MINUS_ONE,
90 HOWTO(R_X86_64_TLSGD, 0, 2, 32, TRUE, 0, complain_overflow_signed,
91 bfd_elf_generic_reloc, "R_X86_64_TLSGD", FALSE, 0xffffffff,
93 HOWTO(R_X86_64_TLSLD, 0, 2, 32, TRUE, 0, complain_overflow_signed,
94 bfd_elf_generic_reloc, "R_X86_64_TLSLD", FALSE, 0xffffffff,
96 HOWTO(R_X86_64_DTPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
97 bfd_elf_generic_reloc, "R_X86_64_DTPOFF32", FALSE, 0xffffffff,
99 HOWTO(R_X86_64_GOTTPOFF, 0, 2, 32, TRUE, 0, complain_overflow_signed,
100 bfd_elf_generic_reloc, "R_X86_64_GOTTPOFF", FALSE, 0xffffffff,
102 HOWTO(R_X86_64_TPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_signed,
103 bfd_elf_generic_reloc, "R_X86_64_TPOFF32", FALSE, 0xffffffff,
106 /* GNU extension to record C++ vtable hierarchy. */
107 HOWTO (R_X86_64_GNU_VTINHERIT, 0, 4, 0, FALSE, 0, complain_overflow_dont,
108 NULL, "R_X86_64_GNU_VTINHERIT", FALSE, 0, 0, FALSE),
110 /* GNU extension to record C++ vtable member usage. */
111 HOWTO (R_X86_64_GNU_VTENTRY, 0, 4, 0, FALSE, 0, complain_overflow_dont,
112 _bfd_elf_rel_vtable_reloc_fn, "R_X86_64_GNU_VTENTRY", FALSE, 0, 0,
116 /* Map BFD relocs to the x86_64 elf relocs. */
119 bfd_reloc_code_real_type bfd_reloc_val;
120 unsigned char elf_reloc_val;
123 static const struct elf_reloc_map x86_64_reloc_map[] =
125 { BFD_RELOC_NONE, R_X86_64_NONE, },
126 { BFD_RELOC_64, R_X86_64_64, },
127 { BFD_RELOC_32_PCREL, R_X86_64_PC32, },
128 { BFD_RELOC_X86_64_GOT32, R_X86_64_GOT32,},
129 { BFD_RELOC_X86_64_PLT32, R_X86_64_PLT32,},
130 { BFD_RELOC_X86_64_COPY, R_X86_64_COPY, },
131 { BFD_RELOC_X86_64_GLOB_DAT, R_X86_64_GLOB_DAT, },
132 { BFD_RELOC_X86_64_JUMP_SLOT, R_X86_64_JUMP_SLOT, },
133 { BFD_RELOC_X86_64_RELATIVE, R_X86_64_RELATIVE, },
134 { BFD_RELOC_X86_64_GOTPCREL, R_X86_64_GOTPCREL, },
135 { BFD_RELOC_32, R_X86_64_32, },
136 { BFD_RELOC_X86_64_32S, R_X86_64_32S, },
137 { BFD_RELOC_16, R_X86_64_16, },
138 { BFD_RELOC_16_PCREL, R_X86_64_PC16, },
139 { BFD_RELOC_8, R_X86_64_8, },
140 { BFD_RELOC_8_PCREL, R_X86_64_PC8, },
141 { BFD_RELOC_X86_64_DTPMOD64, R_X86_64_DTPMOD64, },
142 { BFD_RELOC_X86_64_DTPOFF64, R_X86_64_DTPOFF64, },
143 { BFD_RELOC_X86_64_TPOFF64, R_X86_64_TPOFF64, },
144 { BFD_RELOC_X86_64_TLSGD, R_X86_64_TLSGD, },
145 { BFD_RELOC_X86_64_TLSLD, R_X86_64_TLSLD, },
146 { BFD_RELOC_X86_64_DTPOFF32, R_X86_64_DTPOFF32, },
147 { BFD_RELOC_X86_64_GOTTPOFF, R_X86_64_GOTTPOFF, },
148 { BFD_RELOC_X86_64_TPOFF32, R_X86_64_TPOFF32, },
149 { BFD_RELOC_VTABLE_INHERIT, R_X86_64_GNU_VTINHERIT, },
150 { BFD_RELOC_VTABLE_ENTRY, R_X86_64_GNU_VTENTRY, },
154 /* Given a BFD reloc type, return a HOWTO structure. */
155 static reloc_howto_type *
156 elf64_x86_64_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
157 bfd_reloc_code_real_type code)
161 for (i = 0; i < sizeof (x86_64_reloc_map) / sizeof (struct elf_reloc_map);
164 if (x86_64_reloc_map[i].bfd_reloc_val == code)
165 return &x86_64_elf_howto_table[i];
170 /* Given an x86_64 ELF reloc type, fill in an arelent structure. */
173 elf64_x86_64_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
174 Elf_Internal_Rela *dst)
178 r_type = ELF64_R_TYPE (dst->r_info);
179 if (r_type < (unsigned int) R_X86_64_GNU_VTINHERIT)
181 BFD_ASSERT (r_type <= (unsigned int) R_X86_64_TPOFF32);
186 BFD_ASSERT (r_type < (unsigned int) R_X86_64_max);
187 i = r_type - ((unsigned int) R_X86_64_GNU_VTINHERIT - R_X86_64_TPOFF32 - 1);
189 cache_ptr->howto = &x86_64_elf_howto_table[i];
190 BFD_ASSERT (r_type == cache_ptr->howto->type);
193 /* Support for core dump NOTE sections. */
195 elf64_x86_64_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
200 switch (note->descsz)
205 case 336: /* sizeof(istruct elf_prstatus) on Linux/x86_64 */
207 elf_tdata (abfd)->core_signal
208 = bfd_get_16 (abfd, note->descdata + 12);
211 elf_tdata (abfd)->core_pid
212 = bfd_get_32 (abfd, note->descdata + 32);
221 /* Make a ".reg/999" section. */
222 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
223 size, note->descpos + offset);
227 elf64_x86_64_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
229 switch (note->descsz)
234 case 136: /* sizeof(struct elf_prpsinfo) on Linux/x86_64 */
235 elf_tdata (abfd)->core_program
236 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
237 elf_tdata (abfd)->core_command
238 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
241 /* Note that for some reason, a spurious space is tacked
242 onto the end of the args in some (at least one anyway)
243 implementations, so strip it off if it exists. */
246 char *command = elf_tdata (abfd)->core_command;
247 int n = strlen (command);
249 if (0 < n && command[n - 1] == ' ')
250 command[n - 1] = '\0';
256 /* Functions for the x86-64 ELF linker. */
258 /* The name of the dynamic interpreter. This is put in the .interp
261 #define ELF_DYNAMIC_INTERPRETER "/lib/ld64.so.1"
263 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
264 copying dynamic variables from a shared lib into an app's dynbss
265 section, and instead use a dynamic relocation to point into the
267 #define ELIMINATE_COPY_RELOCS 1
269 /* The size in bytes of an entry in the global offset table. */
271 #define GOT_ENTRY_SIZE 8
273 /* The size in bytes of an entry in the procedure linkage table. */
275 #define PLT_ENTRY_SIZE 16
277 /* The first entry in a procedure linkage table looks like this. See the
278 SVR4 ABI i386 supplement and the x86-64 ABI to see how this works. */
280 static const bfd_byte elf64_x86_64_plt0_entry[PLT_ENTRY_SIZE] =
282 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
283 0xff, 0x25, 16, 0, 0, 0, /* jmpq *GOT+16(%rip) */
284 0x90, 0x90, 0x90, 0x90 /* pad out to 16 bytes with nops. */
287 /* Subsequent entries in a procedure linkage table look like this. */
289 static const bfd_byte elf64_x86_64_plt_entry[PLT_ENTRY_SIZE] =
291 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
292 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
293 0x68, /* pushq immediate */
294 0, 0, 0, 0, /* replaced with index into relocation table. */
295 0xe9, /* jmp relative */
296 0, 0, 0, 0 /* replaced with offset to start of .plt0. */
299 /* The x86-64 linker needs to keep track of the number of relocs that
300 it decides to copy as dynamic relocs in check_relocs for each symbol.
301 This is so that it can later discard them if they are found to be
302 unnecessary. We store the information in a field extending the
303 regular ELF linker hash table. */
305 struct elf64_x86_64_dyn_relocs
308 struct elf64_x86_64_dyn_relocs *next;
310 /* The input section of the reloc. */
313 /* Total number of relocs copied for the input section. */
316 /* Number of pc-relative relocs copied for the input section. */
317 bfd_size_type pc_count;
320 /* x86-64 ELF linker hash entry. */
322 struct elf64_x86_64_link_hash_entry
324 struct elf_link_hash_entry elf;
326 /* Track dynamic relocs copied for this symbol. */
327 struct elf64_x86_64_dyn_relocs *dyn_relocs;
329 #define GOT_UNKNOWN 0
333 unsigned char tls_type;
336 #define elf64_x86_64_hash_entry(ent) \
337 ((struct elf64_x86_64_link_hash_entry *)(ent))
339 struct elf64_x86_64_obj_tdata
341 struct elf_obj_tdata root;
343 /* tls_type for each local got entry. */
344 char *local_got_tls_type;
347 #define elf64_x86_64_tdata(abfd) \
348 ((struct elf64_x86_64_obj_tdata *) (abfd)->tdata.any)
350 #define elf64_x86_64_local_got_tls_type(abfd) \
351 (elf64_x86_64_tdata (abfd)->local_got_tls_type)
354 /* x86-64 ELF linker hash table. */
356 struct elf64_x86_64_link_hash_table
358 struct elf_link_hash_table elf;
360 /* Short-cuts to get to dynamic linker sections. */
370 bfd_signed_vma refcount;
374 /* Small local sym to section mapping cache. */
375 struct sym_sec_cache sym_sec;
378 /* Get the x86-64 ELF linker hash table from a link_info structure. */
380 #define elf64_x86_64_hash_table(p) \
381 ((struct elf64_x86_64_link_hash_table *) ((p)->hash))
383 /* Create an entry in an x86-64 ELF linker hash table. */
385 static struct bfd_hash_entry *
386 link_hash_newfunc (struct bfd_hash_entry *entry, struct bfd_hash_table *table,
389 /* Allocate the structure if it has not already been allocated by a
393 entry = bfd_hash_allocate (table,
394 sizeof (struct elf64_x86_64_link_hash_entry));
399 /* Call the allocation method of the superclass. */
400 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
403 struct elf64_x86_64_link_hash_entry *eh;
405 eh = (struct elf64_x86_64_link_hash_entry *) entry;
406 eh->dyn_relocs = NULL;
407 eh->tls_type = GOT_UNKNOWN;
413 /* Create an X86-64 ELF linker hash table. */
415 static struct bfd_link_hash_table *
416 elf64_x86_64_link_hash_table_create (bfd *abfd)
418 struct elf64_x86_64_link_hash_table *ret;
419 bfd_size_type amt = sizeof (struct elf64_x86_64_link_hash_table);
421 ret = (struct elf64_x86_64_link_hash_table *) bfd_malloc (amt);
425 if (! _bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc))
438 ret->sym_sec.abfd = NULL;
439 ret->tls_ld_got.refcount = 0;
441 return &ret->elf.root;
444 /* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
445 shortcuts to them in our hash table. */
448 create_got_section (bfd *dynobj, struct bfd_link_info *info)
450 struct elf64_x86_64_link_hash_table *htab;
452 if (! _bfd_elf_create_got_section (dynobj, info))
455 htab = elf64_x86_64_hash_table (info);
456 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
457 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
458 if (!htab->sgot || !htab->sgotplt)
461 htab->srelgot = bfd_make_section (dynobj, ".rela.got");
462 if (htab->srelgot == NULL
463 || ! bfd_set_section_flags (dynobj, htab->srelgot,
464 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
465 | SEC_IN_MEMORY | SEC_LINKER_CREATED
467 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 3))
472 /* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
473 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
477 elf64_x86_64_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
479 struct elf64_x86_64_link_hash_table *htab;
481 htab = elf64_x86_64_hash_table (info);
482 if (!htab->sgot && !create_got_section (dynobj, info))
485 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
488 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
489 htab->srelplt = bfd_get_section_by_name (dynobj, ".rela.plt");
490 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
492 htab->srelbss = bfd_get_section_by_name (dynobj, ".rela.bss");
494 if (!htab->splt || !htab->srelplt || !htab->sdynbss
495 || (!info->shared && !htab->srelbss))
501 /* Copy the extra info we tack onto an elf_link_hash_entry. */
504 elf64_x86_64_copy_indirect_symbol (const struct elf_backend_data *bed,
505 struct elf_link_hash_entry *dir,
506 struct elf_link_hash_entry *ind)
508 struct elf64_x86_64_link_hash_entry *edir, *eind;
510 edir = (struct elf64_x86_64_link_hash_entry *) dir;
511 eind = (struct elf64_x86_64_link_hash_entry *) ind;
513 if (eind->dyn_relocs != NULL)
515 if (edir->dyn_relocs != NULL)
517 struct elf64_x86_64_dyn_relocs **pp;
518 struct elf64_x86_64_dyn_relocs *p;
520 if (ind->root.type == bfd_link_hash_indirect)
523 /* Add reloc counts against the weak sym to the strong sym
524 list. Merge any entries against the same section. */
525 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
527 struct elf64_x86_64_dyn_relocs *q;
529 for (q = edir->dyn_relocs; q != NULL; q = q->next)
530 if (q->sec == p->sec)
532 q->pc_count += p->pc_count;
533 q->count += p->count;
540 *pp = edir->dyn_relocs;
543 edir->dyn_relocs = eind->dyn_relocs;
544 eind->dyn_relocs = NULL;
547 if (ind->root.type == bfd_link_hash_indirect
548 && dir->got.refcount <= 0)
550 edir->tls_type = eind->tls_type;
551 eind->tls_type = GOT_UNKNOWN;
554 if (ELIMINATE_COPY_RELOCS
555 && ind->root.type != bfd_link_hash_indirect
556 && (dir->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
557 /* If called to transfer flags for a weakdef during processing
558 of elf_adjust_dynamic_symbol, don't copy ELF_LINK_NON_GOT_REF.
559 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
560 dir->elf_link_hash_flags |=
561 (ind->elf_link_hash_flags & (ELF_LINK_HASH_REF_DYNAMIC
562 | ELF_LINK_HASH_REF_REGULAR
563 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
564 | ELF_LINK_HASH_NEEDS_PLT
565 | ELF_LINK_POINTER_EQUALITY_NEEDED));
567 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
571 elf64_x86_64_mkobject (bfd *abfd)
573 bfd_size_type amt = sizeof (struct elf64_x86_64_obj_tdata);
574 abfd->tdata.any = bfd_zalloc (abfd, amt);
575 if (abfd->tdata.any == NULL)
581 elf64_x86_64_elf_object_p (bfd *abfd)
583 /* Set the right machine number for an x86-64 elf64 file. */
584 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x86_64);
589 elf64_x86_64_tls_transition (struct bfd_link_info *info, int r_type, int is_local)
597 case R_X86_64_GOTTPOFF:
599 return R_X86_64_TPOFF32;
600 return R_X86_64_GOTTPOFF;
602 return R_X86_64_TPOFF32;
608 /* Look through the relocs for a section during the first phase, and
609 calculate needed space in the global offset table, procedure
610 linkage table, and dynamic reloc sections. */
613 elf64_x86_64_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
614 const Elf_Internal_Rela *relocs)
616 struct elf64_x86_64_link_hash_table *htab;
617 Elf_Internal_Shdr *symtab_hdr;
618 struct elf_link_hash_entry **sym_hashes;
619 const Elf_Internal_Rela *rel;
620 const Elf_Internal_Rela *rel_end;
623 if (info->relocatable)
626 htab = elf64_x86_64_hash_table (info);
627 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
628 sym_hashes = elf_sym_hashes (abfd);
632 rel_end = relocs + sec->reloc_count;
633 for (rel = relocs; rel < rel_end; rel++)
636 unsigned long r_symndx;
637 struct elf_link_hash_entry *h;
639 r_symndx = ELF64_R_SYM (rel->r_info);
640 r_type = ELF64_R_TYPE (rel->r_info);
642 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
644 (*_bfd_error_handler) (_("%s: bad symbol index: %d"),
645 bfd_archive_filename (abfd),
650 if (r_symndx < symtab_hdr->sh_info)
653 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
655 r_type = elf64_x86_64_tls_transition (info, r_type, h == NULL);
659 htab->tls_ld_got.refcount += 1;
662 case R_X86_64_TPOFF32:
665 (*_bfd_error_handler)
666 (_("%s: relocation %s against `%s' can not be used when making a shared object; recompile with -fPIC"),
667 bfd_archive_filename (abfd),
668 x86_64_elf_howto_table[r_type].name,
669 (h) ? h->root.root.string : "a local symbol");
670 bfd_set_error (bfd_error_bad_value);
675 case R_X86_64_GOTTPOFF:
677 info->flags |= DF_STATIC_TLS;
681 case R_X86_64_GOTPCREL:
683 /* This symbol requires a global offset table entry. */
685 int tls_type, old_tls_type;
689 default: tls_type = GOT_NORMAL; break;
690 case R_X86_64_TLSGD: tls_type = GOT_TLS_GD; break;
691 case R_X86_64_GOTTPOFF: tls_type = GOT_TLS_IE; break;
696 h->got.refcount += 1;
697 old_tls_type = elf64_x86_64_hash_entry (h)->tls_type;
701 bfd_signed_vma *local_got_refcounts;
703 /* This is a global offset table entry for a local symbol. */
704 local_got_refcounts = elf_local_got_refcounts (abfd);
705 if (local_got_refcounts == NULL)
709 size = symtab_hdr->sh_info;
710 size *= sizeof (bfd_signed_vma) + sizeof (char);
711 local_got_refcounts = ((bfd_signed_vma *)
712 bfd_zalloc (abfd, size));
713 if (local_got_refcounts == NULL)
715 elf_local_got_refcounts (abfd) = local_got_refcounts;
716 elf64_x86_64_local_got_tls_type (abfd)
717 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
719 local_got_refcounts[r_symndx] += 1;
721 = elf64_x86_64_local_got_tls_type (abfd) [r_symndx];
724 /* If a TLS symbol is accessed using IE at least once,
725 there is no point to use dynamic model for it. */
726 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
727 && (old_tls_type != GOT_TLS_GD || tls_type != GOT_TLS_IE))
729 if (old_tls_type == GOT_TLS_IE && tls_type == GOT_TLS_GD)
730 tls_type = old_tls_type;
733 (*_bfd_error_handler)
734 (_("%s: %s' accessed both as normal and thread local symbol"),
735 bfd_archive_filename (abfd),
736 h ? h->root.root.string : "<local>");
741 if (old_tls_type != tls_type)
744 elf64_x86_64_hash_entry (h)->tls_type = tls_type;
746 elf64_x86_64_local_got_tls_type (abfd) [r_symndx] = tls_type;
751 //case R_X86_64_GOTPCREL:
753 if (htab->sgot == NULL)
755 if (htab->elf.dynobj == NULL)
756 htab->elf.dynobj = abfd;
757 if (!create_got_section (htab->elf.dynobj, info))
763 /* This symbol requires a procedure linkage table entry. We
764 actually build the entry in adjust_dynamic_symbol,
765 because this might be a case of linking PIC code which is
766 never referenced by a dynamic object, in which case we
767 don't need to generate a procedure linkage table entry
770 /* If this is a local symbol, we resolve it directly without
771 creating a procedure linkage table entry. */
775 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
776 h->plt.refcount += 1;
783 /* Let's help debug shared library creation. These relocs
784 cannot be used in shared libs. Don't error out for
785 sections we don't care about, such as debug sections or
786 non-constant sections. */
788 && (sec->flags & SEC_ALLOC) != 0
789 && (sec->flags & SEC_READONLY) != 0)
791 (*_bfd_error_handler)
792 (_("%s: relocation %s against `%s' can not be used when making a shared object; recompile with -fPIC"),
793 bfd_archive_filename (abfd),
794 x86_64_elf_howto_table[r_type].name,
795 (h) ? h->root.root.string : "a local symbol");
796 bfd_set_error (bfd_error_bad_value);
805 if (h != NULL && !info->shared)
807 /* If this reloc is in a read-only section, we might
808 need a copy reloc. We can't check reliably at this
809 stage whether the section is read-only, as input
810 sections have not yet been mapped to output sections.
811 Tentatively set the flag for now, and correct in
812 adjust_dynamic_symbol. */
813 h->elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
815 /* We may need a .plt entry if the function this reloc
816 refers to is in a shared lib. */
817 h->plt.refcount += 1;
818 if (r_type != R_X86_64_PC32)
819 h->elf_link_hash_flags |= ELF_LINK_POINTER_EQUALITY_NEEDED;
822 /* If we are creating a shared library, and this is a reloc
823 against a global symbol, or a non PC relative reloc
824 against a local symbol, then we need to copy the reloc
825 into the shared library. However, if we are linking with
826 -Bsymbolic, we do not need to copy a reloc against a
827 global symbol which is defined in an object we are
828 including in the link (i.e., DEF_REGULAR is set). At
829 this point we have not seen all the input files, so it is
830 possible that DEF_REGULAR is not set now but will be set
831 later (it is never cleared). In case of a weak definition,
832 DEF_REGULAR may be cleared later by a strong definition in
833 a shared library. We account for that possibility below by
834 storing information in the relocs_copied field of the hash
835 table entry. A similar situation occurs when creating
836 shared libraries and symbol visibility changes render the
839 If on the other hand, we are creating an executable, we
840 may need to keep relocations for symbols satisfied by a
841 dynamic library if we manage to avoid copy relocs for the
844 && (sec->flags & SEC_ALLOC) != 0
845 && (((r_type != R_X86_64_PC8)
846 && (r_type != R_X86_64_PC16)
847 && (r_type != R_X86_64_PC32))
850 || h->root.type == bfd_link_hash_defweak
851 || (h->elf_link_hash_flags
852 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
853 || (ELIMINATE_COPY_RELOCS
855 && (sec->flags & SEC_ALLOC) != 0
857 && (h->root.type == bfd_link_hash_defweak
858 || (h->elf_link_hash_flags
859 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
861 struct elf64_x86_64_dyn_relocs *p;
862 struct elf64_x86_64_dyn_relocs **head;
864 /* We must copy these reloc types into the output file.
865 Create a reloc section in dynobj and make room for
872 name = (bfd_elf_string_from_elf_section
874 elf_elfheader (abfd)->e_shstrndx,
875 elf_section_data (sec)->rel_hdr.sh_name));
879 if (strncmp (name, ".rela", 5) != 0
880 || strcmp (bfd_get_section_name (abfd, sec),
883 (*_bfd_error_handler)
884 (_("%s: bad relocation section name `%s\'"),
885 bfd_archive_filename (abfd), name);
888 if (htab->elf.dynobj == NULL)
889 htab->elf.dynobj = abfd;
891 dynobj = htab->elf.dynobj;
893 sreloc = bfd_get_section_by_name (dynobj, name);
898 sreloc = bfd_make_section (dynobj, name);
899 flags = (SEC_HAS_CONTENTS | SEC_READONLY
900 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
901 if ((sec->flags & SEC_ALLOC) != 0)
902 flags |= SEC_ALLOC | SEC_LOAD;
904 || ! bfd_set_section_flags (dynobj, sreloc, flags)
905 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
908 elf_section_data (sec)->sreloc = sreloc;
911 /* If this is a global symbol, we count the number of
912 relocations we need for this symbol. */
915 head = &((struct elf64_x86_64_link_hash_entry *) h)->dyn_relocs;
919 /* Track dynamic relocs needed for local syms too.
920 We really need local syms available to do this
924 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
929 head = ((struct elf64_x86_64_dyn_relocs **)
930 &elf_section_data (s)->local_dynrel);
934 if (p == NULL || p->sec != sec)
936 bfd_size_type amt = sizeof *p;
937 p = ((struct elf64_x86_64_dyn_relocs *)
938 bfd_alloc (htab->elf.dynobj, amt));
949 if (r_type == R_X86_64_PC8
950 || r_type == R_X86_64_PC16
951 || r_type == R_X86_64_PC32)
956 /* This relocation describes the C++ object vtable hierarchy.
957 Reconstruct it for later use during GC. */
958 case R_X86_64_GNU_VTINHERIT:
959 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
963 /* This relocation describes which C++ vtable entries are actually
964 used. Record for later use during GC. */
965 case R_X86_64_GNU_VTENTRY:
966 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
978 /* Return the section that should be marked against GC for a given
982 elf64_x86_64_gc_mark_hook (asection *sec,
983 struct bfd_link_info *info ATTRIBUTE_UNUSED,
984 Elf_Internal_Rela *rel,
985 struct elf_link_hash_entry *h,
986 Elf_Internal_Sym *sym)
990 switch (ELF64_R_TYPE (rel->r_info))
992 case R_X86_64_GNU_VTINHERIT:
993 case R_X86_64_GNU_VTENTRY:
997 switch (h->root.type)
999 case bfd_link_hash_defined:
1000 case bfd_link_hash_defweak:
1001 return h->root.u.def.section;
1003 case bfd_link_hash_common:
1004 return h->root.u.c.p->section;
1012 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
1017 /* Update the got entry reference counts for the section being removed. */
1020 elf64_x86_64_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
1021 asection *sec, const Elf_Internal_Rela *relocs)
1023 Elf_Internal_Shdr *symtab_hdr;
1024 struct elf_link_hash_entry **sym_hashes;
1025 bfd_signed_vma *local_got_refcounts;
1026 const Elf_Internal_Rela *rel, *relend;
1028 elf_section_data (sec)->local_dynrel = NULL;
1030 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1031 sym_hashes = elf_sym_hashes (abfd);
1032 local_got_refcounts = elf_local_got_refcounts (abfd);
1034 relend = relocs + sec->reloc_count;
1035 for (rel = relocs; rel < relend; rel++)
1037 unsigned long r_symndx;
1038 unsigned int r_type;
1039 struct elf_link_hash_entry *h = NULL;
1041 r_symndx = ELF64_R_SYM (rel->r_info);
1042 if (r_symndx >= symtab_hdr->sh_info)
1044 struct elf64_x86_64_link_hash_entry *eh;
1045 struct elf64_x86_64_dyn_relocs **pp;
1046 struct elf64_x86_64_dyn_relocs *p;
1048 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1049 eh = (struct elf64_x86_64_link_hash_entry *) h;
1051 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1054 /* Everything must go for SEC. */
1060 r_type = ELF64_R_TYPE (rel->r_info);
1061 r_type = elf64_x86_64_tls_transition (info, r_type, h != NULL);
1064 case R_X86_64_TLSLD:
1065 if (elf64_x86_64_hash_table (info)->tls_ld_got.refcount > 0)
1066 elf64_x86_64_hash_table (info)->tls_ld_got.refcount -= 1;
1069 case R_X86_64_TLSGD:
1070 case R_X86_64_GOTTPOFF:
1071 case R_X86_64_GOT32:
1072 case R_X86_64_GOTPCREL:
1075 if (h->got.refcount > 0)
1076 h->got.refcount -= 1;
1078 else if (local_got_refcounts != NULL)
1080 if (local_got_refcounts[r_symndx] > 0)
1081 local_got_refcounts[r_symndx] -= 1;
1097 case R_X86_64_PLT32:
1100 if (h->plt.refcount > 0)
1101 h->plt.refcount -= 1;
1113 /* Adjust a symbol defined by a dynamic object and referenced by a
1114 regular object. The current definition is in some section of the
1115 dynamic object, but we're not including those sections. We have to
1116 change the definition to something the rest of the link can
1120 elf64_x86_64_adjust_dynamic_symbol (struct bfd_link_info *info,
1121 struct elf_link_hash_entry *h)
1123 struct elf64_x86_64_link_hash_table *htab;
1125 unsigned int power_of_two;
1127 /* If this is a function, put it in the procedure linkage table. We
1128 will fill in the contents of the procedure linkage table later,
1129 when we know the address of the .got section. */
1130 if (h->type == STT_FUNC
1131 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1133 if (h->plt.refcount <= 0
1134 || SYMBOL_CALLS_LOCAL (info, h)
1135 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1136 && h->root.type == bfd_link_hash_undefweak))
1138 /* This case can occur if we saw a PLT32 reloc in an input
1139 file, but the symbol was never referred to by a dynamic
1140 object, or if all references were garbage collected. In
1141 such a case, we don't actually need to build a procedure
1142 linkage table, and we can just do a PC32 reloc instead. */
1143 h->plt.offset = (bfd_vma) -1;
1144 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1150 /* It's possible that we incorrectly decided a .plt reloc was
1151 needed for an R_X86_64_PC32 reloc to a non-function sym in
1152 check_relocs. We can't decide accurately between function and
1153 non-function syms in check-relocs; Objects loaded later in
1154 the link may change h->type. So fix it now. */
1155 h->plt.offset = (bfd_vma) -1;
1157 /* If this is a weak symbol, and there is a real definition, the
1158 processor independent code will have arranged for us to see the
1159 real definition first, and we can just use the same value. */
1160 if (h->weakdef != NULL)
1162 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1163 || h->weakdef->root.type == bfd_link_hash_defweak);
1164 h->root.u.def.section = h->weakdef->root.u.def.section;
1165 h->root.u.def.value = h->weakdef->root.u.def.value;
1166 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1167 h->elf_link_hash_flags
1168 = ((h->elf_link_hash_flags & ~ELF_LINK_NON_GOT_REF)
1169 | (h->weakdef->elf_link_hash_flags & ELF_LINK_NON_GOT_REF));
1173 /* This is a reference to a symbol defined by a dynamic object which
1174 is not a function. */
1176 /* If we are creating a shared library, we must presume that the
1177 only references to the symbol are via the global offset table.
1178 For such cases we need not do anything here; the relocations will
1179 be handled correctly by relocate_section. */
1183 /* If there are no references to this symbol that do not use the
1184 GOT, we don't need to generate a copy reloc. */
1185 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
1188 /* If -z nocopyreloc was given, we won't generate them either. */
1189 if (info->nocopyreloc)
1191 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1195 if (ELIMINATE_COPY_RELOCS)
1197 struct elf64_x86_64_link_hash_entry * eh;
1198 struct elf64_x86_64_dyn_relocs *p;
1200 eh = (struct elf64_x86_64_link_hash_entry *) h;
1201 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1203 s = p->sec->output_section;
1204 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1208 /* If we didn't find any dynamic relocs in read-only sections, then
1209 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1212 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1217 /* We must allocate the symbol in our .dynbss section, which will
1218 become part of the .bss section of the executable. There will be
1219 an entry for this symbol in the .dynsym section. The dynamic
1220 object will contain position independent code, so all references
1221 from the dynamic object to this symbol will go through the global
1222 offset table. The dynamic linker will use the .dynsym entry to
1223 determine the address it must put in the global offset table, so
1224 both the dynamic object and the regular object will refer to the
1225 same memory location for the variable. */
1227 htab = elf64_x86_64_hash_table (info);
1229 /* We must generate a R_X86_64_COPY reloc to tell the dynamic linker
1230 to copy the initial value out of the dynamic object and into the
1231 runtime process image. */
1232 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1234 htab->srelbss->size += sizeof (Elf64_External_Rela);
1235 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
1238 /* We need to figure out the alignment required for this symbol. I
1239 have no idea how ELF linkers handle this. 16-bytes is the size
1240 of the largest type that requires hard alignment -- long double. */
1241 /* FIXME: This is VERY ugly. Should be fixed for all architectures using
1243 power_of_two = bfd_log2 (h->size);
1244 if (power_of_two > 4)
1247 /* Apply the required alignment. */
1249 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
1250 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1252 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
1256 /* Define the symbol as being at this point in the section. */
1257 h->root.u.def.section = s;
1258 h->root.u.def.value = s->size;
1260 /* Increment the section size to make room for the symbol. */
1266 /* Allocate space in .plt, .got and associated reloc sections for
1270 allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1272 struct bfd_link_info *info;
1273 struct elf64_x86_64_link_hash_table *htab;
1274 struct elf64_x86_64_link_hash_entry *eh;
1275 struct elf64_x86_64_dyn_relocs *p;
1277 if (h->root.type == bfd_link_hash_indirect)
1280 if (h->root.type == bfd_link_hash_warning)
1281 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1283 info = (struct bfd_link_info *) inf;
1284 htab = elf64_x86_64_hash_table (info);
1286 if (htab->elf.dynamic_sections_created
1287 && h->plt.refcount > 0)
1289 /* Make sure this symbol is output as a dynamic symbol.
1290 Undefined weak syms won't yet be marked as dynamic. */
1291 if (h->dynindx == -1
1292 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
1294 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1299 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1301 asection *s = htab->splt;
1303 /* If this is the first .plt entry, make room for the special
1306 s->size += PLT_ENTRY_SIZE;
1308 h->plt.offset = s->size;
1310 /* If this symbol is not defined in a regular file, and we are
1311 not generating a shared library, then set the symbol to this
1312 location in the .plt. This is required to make function
1313 pointers compare as equal between the normal executable and
1314 the shared library. */
1316 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1318 h->root.u.def.section = s;
1319 h->root.u.def.value = h->plt.offset;
1322 /* Make room for this entry. */
1323 s->size += PLT_ENTRY_SIZE;
1325 /* We also need to make an entry in the .got.plt section, which
1326 will be placed in the .got section by the linker script. */
1327 htab->sgotplt->size += GOT_ENTRY_SIZE;
1329 /* We also need to make an entry in the .rela.plt section. */
1330 htab->srelplt->size += sizeof (Elf64_External_Rela);
1334 h->plt.offset = (bfd_vma) -1;
1335 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1340 h->plt.offset = (bfd_vma) -1;
1341 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1344 /* If R_X86_64_GOTTPOFF symbol is now local to the binary,
1345 make it a R_X86_64_TPOFF32 requiring no GOT entry. */
1346 if (h->got.refcount > 0
1349 && elf64_x86_64_hash_entry (h)->tls_type == GOT_TLS_IE)
1350 h->got.offset = (bfd_vma) -1;
1351 else if (h->got.refcount > 0)
1355 int tls_type = elf64_x86_64_hash_entry (h)->tls_type;
1357 /* Make sure this symbol is output as a dynamic symbol.
1358 Undefined weak syms won't yet be marked as dynamic. */
1359 if (h->dynindx == -1
1360 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
1362 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1367 h->got.offset = s->size;
1368 s->size += GOT_ENTRY_SIZE;
1369 /* R_X86_64_TLSGD needs 2 consecutive GOT slots. */
1370 if (tls_type == GOT_TLS_GD)
1371 s->size += GOT_ENTRY_SIZE;
1372 dyn = htab->elf.dynamic_sections_created;
1373 /* R_X86_64_TLSGD needs one dynamic relocation if local symbol
1375 R_X86_64_GOTTPOFF needs one dynamic relocation. */
1376 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1377 || tls_type == GOT_TLS_IE)
1378 htab->srelgot->size += sizeof (Elf64_External_Rela);
1379 else if (tls_type == GOT_TLS_GD)
1380 htab->srelgot->size += 2 * sizeof (Elf64_External_Rela);
1381 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1382 || h->root.type != bfd_link_hash_undefweak)
1384 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1385 htab->srelgot->size += sizeof (Elf64_External_Rela);
1388 h->got.offset = (bfd_vma) -1;
1390 eh = (struct elf64_x86_64_link_hash_entry *) h;
1391 if (eh->dyn_relocs == NULL)
1394 /* In the shared -Bsymbolic case, discard space allocated for
1395 dynamic pc-relative relocs against symbols which turn out to be
1396 defined in regular objects. For the normal shared case, discard
1397 space for pc-relative relocs that have become local due to symbol
1398 visibility changes. */
1402 /* Relocs that use pc_count are those that appear on a call
1403 insn, or certain REL relocs that can generated via assembly.
1404 We want calls to protected symbols to resolve directly to the
1405 function rather than going via the plt. If people want
1406 function pointer comparisons to work as expected then they
1407 should avoid writing weird assembly. */
1408 if (SYMBOL_CALLS_LOCAL (info, h))
1410 struct elf64_x86_64_dyn_relocs **pp;
1412 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1414 p->count -= p->pc_count;
1423 /* Also discard relocs on undefined weak syms with non-default
1425 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1426 && h->root.type == bfd_link_hash_undefweak)
1427 eh->dyn_relocs = NULL;
1429 else if (ELIMINATE_COPY_RELOCS)
1431 /* For the non-shared case, discard space for relocs against
1432 symbols which turn out to need copy relocs or are not
1435 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
1436 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
1437 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1438 || (htab->elf.dynamic_sections_created
1439 && (h->root.type == bfd_link_hash_undefweak
1440 || h->root.type == bfd_link_hash_undefined))))
1442 /* Make sure this symbol is output as a dynamic symbol.
1443 Undefined weak syms won't yet be marked as dynamic. */
1444 if (h->dynindx == -1
1445 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
1447 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1451 /* If that succeeded, we know we'll be keeping all the
1453 if (h->dynindx != -1)
1457 eh->dyn_relocs = NULL;
1462 /* Finally, allocate space. */
1463 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1465 asection *sreloc = elf_section_data (p->sec)->sreloc;
1466 sreloc->size += p->count * sizeof (Elf64_External_Rela);
1472 /* Find any dynamic relocs that apply to read-only sections. */
1475 readonly_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1477 struct elf64_x86_64_link_hash_entry *eh;
1478 struct elf64_x86_64_dyn_relocs *p;
1480 if (h->root.type == bfd_link_hash_warning)
1481 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1483 eh = (struct elf64_x86_64_link_hash_entry *) h;
1484 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1486 asection *s = p->sec->output_section;
1488 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1490 struct bfd_link_info *info = (struct bfd_link_info *) inf;
1492 info->flags |= DF_TEXTREL;
1494 /* Not an error, just cut short the traversal. */
1501 /* Set the sizes of the dynamic sections. */
1504 elf64_x86_64_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1505 struct bfd_link_info *info)
1507 struct elf64_x86_64_link_hash_table *htab;
1513 htab = elf64_x86_64_hash_table (info);
1514 dynobj = htab->elf.dynobj;
1518 if (htab->elf.dynamic_sections_created)
1520 /* Set the contents of the .interp section to the interpreter. */
1521 if (info->executable)
1523 s = bfd_get_section_by_name (dynobj, ".interp");
1526 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1527 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1531 /* Set up .got offsets for local syms, and space for local dynamic
1533 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1535 bfd_signed_vma *local_got;
1536 bfd_signed_vma *end_local_got;
1537 char *local_tls_type;
1538 bfd_size_type locsymcount;
1539 Elf_Internal_Shdr *symtab_hdr;
1542 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
1545 for (s = ibfd->sections; s != NULL; s = s->next)
1547 struct elf64_x86_64_dyn_relocs *p;
1549 for (p = *((struct elf64_x86_64_dyn_relocs **)
1550 &elf_section_data (s)->local_dynrel);
1554 if (!bfd_is_abs_section (p->sec)
1555 && bfd_is_abs_section (p->sec->output_section))
1557 /* Input section has been discarded, either because
1558 it is a copy of a linkonce section or due to
1559 linker script /DISCARD/, so we'll be discarding
1562 else if (p->count != 0)
1564 srel = elf_section_data (p->sec)->sreloc;
1565 srel->size += p->count * sizeof (Elf64_External_Rela);
1566 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1567 info->flags |= DF_TEXTREL;
1573 local_got = elf_local_got_refcounts (ibfd);
1577 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
1578 locsymcount = symtab_hdr->sh_info;
1579 end_local_got = local_got + locsymcount;
1580 local_tls_type = elf64_x86_64_local_got_tls_type (ibfd);
1582 srel = htab->srelgot;
1583 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1587 *local_got = s->size;
1588 s->size += GOT_ENTRY_SIZE;
1589 if (*local_tls_type == GOT_TLS_GD)
1590 s->size += GOT_ENTRY_SIZE;
1592 || *local_tls_type == GOT_TLS_GD
1593 || *local_tls_type == GOT_TLS_IE)
1594 srel->size += sizeof (Elf64_External_Rela);
1597 *local_got = (bfd_vma) -1;
1601 if (htab->tls_ld_got.refcount > 0)
1603 /* Allocate 2 got entries and 1 dynamic reloc for R_X86_64_TLSLD
1605 htab->tls_ld_got.offset = htab->sgot->size;
1606 htab->sgot->size += 2 * GOT_ENTRY_SIZE;
1607 htab->srelgot->size += sizeof (Elf64_External_Rela);
1610 htab->tls_ld_got.offset = -1;
1612 /* Allocate global sym .plt and .got entries, and space for global
1613 sym dynamic relocs. */
1614 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
1616 /* We now have determined the sizes of the various dynamic sections.
1617 Allocate memory for them. */
1619 for (s = dynobj->sections; s != NULL; s = s->next)
1621 if ((s->flags & SEC_LINKER_CREATED) == 0)
1626 || s == htab->sgotplt)
1628 /* Strip this section if we don't need it; see the
1631 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
1633 if (s->size != 0 && s != htab->srelplt)
1636 /* We use the reloc_count field as a counter if we need
1637 to copy relocs into the output file. */
1642 /* It's not one of our sections, so don't allocate space. */
1648 /* If we don't need this section, strip it from the
1649 output file. This is mostly to handle .rela.bss and
1650 .rela.plt. We must create both sections in
1651 create_dynamic_sections, because they must be created
1652 before the linker maps input sections to output
1653 sections. The linker does that before
1654 adjust_dynamic_symbol is called, and it is that
1655 function which decides whether anything needs to go
1656 into these sections. */
1658 _bfd_strip_section_from_output (info, s);
1662 /* Allocate memory for the section contents. We use bfd_zalloc
1663 here in case unused entries are not reclaimed before the
1664 section's contents are written out. This should not happen,
1665 but this way if it does, we get a R_X86_64_NONE reloc instead
1667 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1668 if (s->contents == NULL)
1672 if (htab->elf.dynamic_sections_created)
1674 /* Add some entries to the .dynamic section. We fill in the
1675 values later, in elf64_x86_64_finish_dynamic_sections, but we
1676 must add the entries now so that we get the correct size for
1677 the .dynamic section. The DT_DEBUG entry is filled in by the
1678 dynamic linker and used by the debugger. */
1679 #define add_dynamic_entry(TAG, VAL) \
1680 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1682 if (info->executable)
1684 if (!add_dynamic_entry (DT_DEBUG, 0))
1688 if (htab->splt->size != 0)
1690 if (!add_dynamic_entry (DT_PLTGOT, 0)
1691 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1692 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1693 || !add_dynamic_entry (DT_JMPREL, 0))
1699 if (!add_dynamic_entry (DT_RELA, 0)
1700 || !add_dynamic_entry (DT_RELASZ, 0)
1701 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
1704 /* If any dynamic relocs apply to a read-only section,
1705 then we need a DT_TEXTREL entry. */
1706 if ((info->flags & DF_TEXTREL) == 0)
1707 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
1710 if ((info->flags & DF_TEXTREL) != 0)
1712 if (!add_dynamic_entry (DT_TEXTREL, 0))
1717 #undef add_dynamic_entry
1722 /* Return the base VMA address which should be subtracted from real addresses
1723 when resolving @dtpoff relocation.
1724 This is PT_TLS segment p_vaddr. */
1727 dtpoff_base (struct bfd_link_info *info)
1729 /* If tls_sec is NULL, we should have signalled an error already. */
1730 if (elf_hash_table (info)->tls_sec == NULL)
1732 return elf_hash_table (info)->tls_sec->vma;
1735 /* Return the relocation value for @tpoff relocation
1736 if STT_TLS virtual address is ADDRESS. */
1739 tpoff (struct bfd_link_info *info, bfd_vma address)
1741 struct elf_link_hash_table *htab = elf_hash_table (info);
1743 /* If tls_segment is NULL, we should have signalled an error already. */
1744 if (htab->tls_sec == NULL)
1746 return address - htab->tls_size - htab->tls_sec->vma;
1749 /* Relocate an x86_64 ELF section. */
1752 elf64_x86_64_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
1753 bfd *input_bfd, asection *input_section,
1754 bfd_byte *contents, Elf_Internal_Rela *relocs,
1755 Elf_Internal_Sym *local_syms,
1756 asection **local_sections)
1758 struct elf64_x86_64_link_hash_table *htab;
1759 Elf_Internal_Shdr *symtab_hdr;
1760 struct elf_link_hash_entry **sym_hashes;
1761 bfd_vma *local_got_offsets;
1762 Elf_Internal_Rela *rel;
1763 Elf_Internal_Rela *relend;
1765 if (info->relocatable)
1768 htab = elf64_x86_64_hash_table (info);
1769 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1770 sym_hashes = elf_sym_hashes (input_bfd);
1771 local_got_offsets = elf_local_got_offsets (input_bfd);
1774 relend = relocs + input_section->reloc_count;
1775 for (; rel < relend; rel++)
1777 unsigned int r_type;
1778 reloc_howto_type *howto;
1779 unsigned long r_symndx;
1780 struct elf_link_hash_entry *h;
1781 Elf_Internal_Sym *sym;
1785 bfd_boolean unresolved_reloc;
1786 bfd_reloc_status_type r;
1789 r_type = ELF64_R_TYPE (rel->r_info);
1790 if (r_type == (int) R_X86_64_GNU_VTINHERIT
1791 || r_type == (int) R_X86_64_GNU_VTENTRY)
1794 if (r_type >= R_X86_64_max)
1796 bfd_set_error (bfd_error_bad_value);
1800 howto = x86_64_elf_howto_table + r_type;
1801 r_symndx = ELF64_R_SYM (rel->r_info);
1805 unresolved_reloc = FALSE;
1806 if (r_symndx < symtab_hdr->sh_info)
1808 sym = local_syms + r_symndx;
1809 sec = local_sections[r_symndx];
1811 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1817 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1818 r_symndx, symtab_hdr, sym_hashes,
1820 unresolved_reloc, warned);
1822 /* When generating a shared object, the relocations handled here are
1823 copied into the output file to be resolved at run time. */
1826 case R_X86_64_GOT32:
1827 /* Relocation is to the entry for this symbol in the global
1829 case R_X86_64_GOTPCREL:
1830 /* Use global offset table as symbol value. */
1831 if (htab->sgot == NULL)
1838 off = h->got.offset;
1839 dyn = htab->elf.dynamic_sections_created;
1841 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
1843 && SYMBOL_REFERENCES_LOCAL (info, h))
1844 || (ELF_ST_VISIBILITY (h->other)
1845 && h->root.type == bfd_link_hash_undefweak))
1847 /* This is actually a static link, or it is a -Bsymbolic
1848 link and the symbol is defined locally, or the symbol
1849 was forced to be local because of a version file. We
1850 must initialize this entry in the global offset table.
1851 Since the offset must always be a multiple of 8, we
1852 use the least significant bit to record whether we
1853 have initialized it already.
1855 When doing a dynamic link, we create a .rela.got
1856 relocation entry to initialize the value. This is
1857 done in the finish_dynamic_symbol routine. */
1862 bfd_put_64 (output_bfd, relocation,
1863 htab->sgot->contents + off);
1868 unresolved_reloc = FALSE;
1872 if (local_got_offsets == NULL)
1875 off = local_got_offsets[r_symndx];
1877 /* The offset must always be a multiple of 8. We use
1878 the least significant bit to record whether we have
1879 already generated the necessary reloc. */
1884 bfd_put_64 (output_bfd, relocation,
1885 htab->sgot->contents + off);
1890 Elf_Internal_Rela outrel;
1893 /* We need to generate a R_X86_64_RELATIVE reloc
1894 for the dynamic linker. */
1899 outrel.r_offset = (htab->sgot->output_section->vma
1900 + htab->sgot->output_offset
1902 outrel.r_info = ELF64_R_INFO (0, R_X86_64_RELATIVE);
1903 outrel.r_addend = relocation;
1905 loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
1906 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
1909 local_got_offsets[r_symndx] |= 1;
1913 if (off >= (bfd_vma) -2)
1916 relocation = htab->sgot->output_section->vma
1917 + htab->sgot->output_offset + off;
1918 if (r_type != R_X86_64_GOTPCREL)
1919 relocation -= htab->sgotplt->output_section->vma
1920 - htab->sgotplt->output_offset;
1924 case R_X86_64_PLT32:
1925 /* Relocation is to the entry for this symbol in the
1926 procedure linkage table. */
1928 /* Resolve a PLT32 reloc against a local symbol directly,
1929 without using the procedure linkage table. */
1933 if (h->plt.offset == (bfd_vma) -1
1934 || htab->splt == NULL)
1936 /* We didn't make a PLT entry for this symbol. This
1937 happens when statically linking PIC code, or when
1938 using -Bsymbolic. */
1942 relocation = (htab->splt->output_section->vma
1943 + htab->splt->output_offset
1945 unresolved_reloc = FALSE;
1952 && !SYMBOL_REFERENCES_LOCAL (info, h)
1953 && (input_section->flags & SEC_ALLOC) != 0
1954 && (input_section->flags & SEC_READONLY) != 0)
1956 (*_bfd_error_handler)
1957 (_("%s: relocation %s against `%s' can not be used when making a shared object; recompile with -fPIC"),
1958 bfd_archive_filename (input_bfd),
1959 x86_64_elf_howto_table[r_type].name,
1960 (h) ? h->root.root.string : "a local symbol");
1961 bfd_set_error (bfd_error_bad_value);
1970 /* FIXME: The ABI says the linker should make sure the value is
1971 the same when it's zeroextended to 64 bit. */
1973 /* r_symndx will be zero only for relocs against symbols
1974 from removed linkonce sections, or sections discarded by
1977 || (input_section->flags & SEC_ALLOC) == 0)
1982 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1983 || h->root.type != bfd_link_hash_undefweak)
1984 && ((r_type != R_X86_64_PC8
1985 && r_type != R_X86_64_PC16
1986 && r_type != R_X86_64_PC32)
1987 || !SYMBOL_CALLS_LOCAL (info, h)))
1988 || (ELIMINATE_COPY_RELOCS
1992 && (h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
1993 && (((h->elf_link_hash_flags
1994 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
1995 && (h->elf_link_hash_flags
1996 & ELF_LINK_HASH_DEF_REGULAR) == 0)
1997 || h->root.type == bfd_link_hash_undefweak
1998 || h->root.type == bfd_link_hash_undefined)))
2000 Elf_Internal_Rela outrel;
2002 bfd_boolean skip, relocate;
2005 /* When generating a shared object, these relocations
2006 are copied into the output file to be resolved at run
2012 _bfd_elf_section_offset (output_bfd, info, input_section,
2014 if (outrel.r_offset == (bfd_vma) -1)
2016 else if (outrel.r_offset == (bfd_vma) -2)
2017 skip = TRUE, relocate = TRUE;
2019 outrel.r_offset += (input_section->output_section->vma
2020 + input_section->output_offset);
2023 memset (&outrel, 0, sizeof outrel);
2025 /* h->dynindx may be -1 if this symbol was marked to
2029 && (r_type == R_X86_64_PC8
2030 || r_type == R_X86_64_PC16
2031 || r_type == R_X86_64_PC32
2034 || (h->elf_link_hash_flags
2035 & ELF_LINK_HASH_DEF_REGULAR) == 0))
2037 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2038 outrel.r_addend = rel->r_addend;
2042 /* This symbol is local, or marked to become local. */
2043 if (r_type == R_X86_64_64)
2046 outrel.r_info = ELF64_R_INFO (0, R_X86_64_RELATIVE);
2047 outrel.r_addend = relocation + rel->r_addend;
2053 if (bfd_is_abs_section (sec))
2055 else if (sec == NULL || sec->owner == NULL)
2057 bfd_set_error (bfd_error_bad_value);
2064 osec = sec->output_section;
2065 sindx = elf_section_data (osec)->dynindx;
2066 BFD_ASSERT (sindx > 0);
2069 outrel.r_info = ELF64_R_INFO (sindx, r_type);
2070 outrel.r_addend = relocation + rel->r_addend;
2074 sreloc = elf_section_data (input_section)->sreloc;
2078 loc = sreloc->contents;
2079 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2080 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2082 /* If this reloc is against an external symbol, we do
2083 not want to fiddle with the addend. Otherwise, we
2084 need to include the symbol value so that it becomes
2085 an addend for the dynamic reloc. */
2092 case R_X86_64_TLSGD:
2093 case R_X86_64_GOTTPOFF:
2094 r_type = elf64_x86_64_tls_transition (info, r_type, h == NULL);
2095 tls_type = GOT_UNKNOWN;
2096 if (h == NULL && local_got_offsets)
2097 tls_type = elf64_x86_64_local_got_tls_type (input_bfd) [r_symndx];
2100 tls_type = elf64_x86_64_hash_entry (h)->tls_type;
2101 if (!info->shared && h->dynindx == -1 && tls_type == GOT_TLS_IE)
2102 r_type = R_X86_64_TPOFF32;
2104 if (r_type == R_X86_64_TLSGD)
2106 if (tls_type == GOT_TLS_IE)
2107 r_type = R_X86_64_GOTTPOFF;
2110 if (r_type == R_X86_64_TPOFF32)
2112 BFD_ASSERT (! unresolved_reloc);
2113 if (ELF64_R_TYPE (rel->r_info) == R_X86_64_TLSGD)
2116 static unsigned char tlsgd[8]
2117 = { 0x66, 0x48, 0x8d, 0x3d, 0x66, 0x66, 0x48, 0xe8 };
2119 /* GD->LE transition.
2120 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
2121 .word 0x6666; rex64; call __tls_get_addr@plt
2124 leaq foo@tpoff(%rax), %rax */
2125 BFD_ASSERT (rel->r_offset >= 4);
2126 for (i = 0; i < 4; i++)
2127 BFD_ASSERT (bfd_get_8 (input_bfd,
2128 contents + rel->r_offset - 4 + i)
2130 BFD_ASSERT (rel->r_offset + 12 <= input_section->size);
2131 for (i = 0; i < 4; i++)
2132 BFD_ASSERT (bfd_get_8 (input_bfd,
2133 contents + rel->r_offset + 4 + i)
2135 BFD_ASSERT (rel + 1 < relend);
2136 BFD_ASSERT (ELF64_R_TYPE (rel[1].r_info) == R_X86_64_PLT32);
2137 memcpy (contents + rel->r_offset - 4,
2138 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
2140 bfd_put_32 (output_bfd, tpoff (info, relocation),
2141 contents + rel->r_offset + 8);
2142 /* Skip R_X86_64_PLT32. */
2148 unsigned int val, type, reg;
2150 /* IE->LE transition:
2151 Originally it can be one of:
2152 movq foo@gottpoff(%rip), %reg
2153 addq foo@gottpoff(%rip), %reg
2156 leaq foo(%reg), %reg
2158 BFD_ASSERT (rel->r_offset >= 3);
2159 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 3);
2160 BFD_ASSERT (val == 0x48 || val == 0x4c);
2161 type = bfd_get_8 (input_bfd, contents + rel->r_offset - 2);
2162 BFD_ASSERT (type == 0x8b || type == 0x03);
2163 reg = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
2164 BFD_ASSERT ((reg & 0xc7) == 5);
2166 BFD_ASSERT (rel->r_offset + 4 <= input_section->size);
2171 bfd_put_8 (output_bfd, 0x49,
2172 contents + rel->r_offset - 3);
2173 bfd_put_8 (output_bfd, 0xc7,
2174 contents + rel->r_offset - 2);
2175 bfd_put_8 (output_bfd, 0xc0 | reg,
2176 contents + rel->r_offset - 1);
2180 /* addq -> addq - addressing with %rsp/%r12 is
2183 bfd_put_8 (output_bfd, 0x49,
2184 contents + rel->r_offset - 3);
2185 bfd_put_8 (output_bfd, 0x81,
2186 contents + rel->r_offset - 2);
2187 bfd_put_8 (output_bfd, 0xc0 | reg,
2188 contents + rel->r_offset - 1);
2194 bfd_put_8 (output_bfd, 0x4d,
2195 contents + rel->r_offset - 3);
2196 bfd_put_8 (output_bfd, 0x8d,
2197 contents + rel->r_offset - 2);
2198 bfd_put_8 (output_bfd, 0x80 | reg | (reg << 3),
2199 contents + rel->r_offset - 1);
2201 bfd_put_32 (output_bfd, tpoff (info, relocation),
2202 contents + rel->r_offset);
2207 if (htab->sgot == NULL)
2211 off = h->got.offset;
2214 if (local_got_offsets == NULL)
2217 off = local_got_offsets[r_symndx];
2224 Elf_Internal_Rela outrel;
2228 if (htab->srelgot == NULL)
2231 outrel.r_offset = (htab->sgot->output_section->vma
2232 + htab->sgot->output_offset + off);
2234 indx = h && h->dynindx != -1 ? h->dynindx : 0;
2235 if (r_type == R_X86_64_TLSGD)
2236 dr_type = R_X86_64_DTPMOD64;
2238 dr_type = R_X86_64_TPOFF64;
2240 bfd_put_64 (output_bfd, 0, htab->sgot->contents + off);
2241 outrel.r_addend = 0;
2242 if (dr_type == R_X86_64_TPOFF64 && indx == 0)
2243 outrel.r_addend = relocation - dtpoff_base (info);
2244 outrel.r_info = ELF64_R_INFO (indx, dr_type);
2246 loc = htab->srelgot->contents;
2247 loc += htab->srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
2248 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2250 if (r_type == R_X86_64_TLSGD)
2254 BFD_ASSERT (! unresolved_reloc);
2255 bfd_put_64 (output_bfd,
2256 relocation - dtpoff_base (info),
2257 htab->sgot->contents + off + GOT_ENTRY_SIZE);
2261 bfd_put_64 (output_bfd, 0,
2262 htab->sgot->contents + off + GOT_ENTRY_SIZE);
2263 outrel.r_info = ELF64_R_INFO (indx,
2265 outrel.r_offset += GOT_ENTRY_SIZE;
2266 htab->srelgot->reloc_count++;
2267 loc += sizeof (Elf64_External_Rela);
2268 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2275 local_got_offsets[r_symndx] |= 1;
2278 if (off >= (bfd_vma) -2)
2280 if (r_type == ELF64_R_TYPE (rel->r_info))
2282 relocation = htab->sgot->output_section->vma
2283 + htab->sgot->output_offset + off;
2284 unresolved_reloc = FALSE;
2289 static unsigned char tlsgd[8]
2290 = { 0x66, 0x48, 0x8d, 0x3d, 0x66, 0x66, 0x48, 0xe8 };
2292 /* GD->IE transition.
2293 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
2294 .word 0x6666; rex64; call __tls_get_addr@plt
2297 addq foo@gottpoff(%rip), %rax */
2298 BFD_ASSERT (rel->r_offset >= 4);
2299 for (i = 0; i < 4; i++)
2300 BFD_ASSERT (bfd_get_8 (input_bfd,
2301 contents + rel->r_offset - 4 + i)
2303 BFD_ASSERT (rel->r_offset + 12 <= input_section->size);
2304 for (i = 0; i < 4; i++)
2305 BFD_ASSERT (bfd_get_8 (input_bfd,
2306 contents + rel->r_offset + 4 + i)
2308 BFD_ASSERT (rel + 1 < relend);
2309 BFD_ASSERT (ELF64_R_TYPE (rel[1].r_info) == R_X86_64_PLT32);
2310 memcpy (contents + rel->r_offset - 4,
2311 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
2314 relocation = (htab->sgot->output_section->vma
2315 + htab->sgot->output_offset + off
2317 - input_section->output_section->vma
2318 - input_section->output_offset
2320 bfd_put_32 (output_bfd, relocation,
2321 contents + rel->r_offset + 8);
2322 /* Skip R_X86_64_PLT32. */
2328 case R_X86_64_TLSLD:
2331 /* LD->LE transition:
2333 leaq foo@tlsld(%rip), %rdi; call __tls_get_addr@plt.
2335 .word 0x6666; .byte 0x66; movl %fs:0, %rax. */
2336 BFD_ASSERT (rel->r_offset >= 3);
2337 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset - 3)
2339 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset - 2)
2341 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset - 1)
2343 BFD_ASSERT (rel->r_offset + 9 <= input_section->size);
2344 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset + 4)
2346 BFD_ASSERT (rel + 1 < relend);
2347 BFD_ASSERT (ELF64_R_TYPE (rel[1].r_info) == R_X86_64_PLT32);
2348 memcpy (contents + rel->r_offset - 3,
2349 "\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0", 12);
2350 /* Skip R_X86_64_PLT32. */
2355 if (htab->sgot == NULL)
2358 off = htab->tls_ld_got.offset;
2363 Elf_Internal_Rela outrel;
2366 if (htab->srelgot == NULL)
2369 outrel.r_offset = (htab->sgot->output_section->vma
2370 + htab->sgot->output_offset + off);
2372 bfd_put_64 (output_bfd, 0,
2373 htab->sgot->contents + off);
2374 bfd_put_64 (output_bfd, 0,
2375 htab->sgot->contents + off + GOT_ENTRY_SIZE);
2376 outrel.r_info = ELF64_R_INFO (0, R_X86_64_DTPMOD64);
2377 outrel.r_addend = 0;
2378 loc = htab->srelgot->contents;
2379 loc += htab->srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
2380 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2381 htab->tls_ld_got.offset |= 1;
2383 relocation = htab->sgot->output_section->vma
2384 + htab->sgot->output_offset + off;
2385 unresolved_reloc = FALSE;
2388 case R_X86_64_DTPOFF32:
2389 if (info->shared || (input_section->flags & SEC_CODE) == 0)
2390 relocation -= dtpoff_base (info);
2392 relocation = tpoff (info, relocation);
2395 case R_X86_64_TPOFF32:
2396 BFD_ASSERT (! info->shared);
2397 relocation = tpoff (info, relocation);
2404 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
2405 because such sections are not SEC_ALLOC and thus ld.so will
2406 not process them. */
2407 if (unresolved_reloc
2408 && !((input_section->flags & SEC_DEBUGGING) != 0
2409 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
2410 (*_bfd_error_handler)
2411 (_("%s(%s+0x%lx): unresolvable relocation against symbol `%s'"),
2412 bfd_archive_filename (input_bfd),
2413 bfd_get_section_name (input_bfd, input_section),
2414 (long) rel->r_offset,
2415 h->root.root.string);
2417 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
2418 contents, rel->r_offset,
2419 relocation, rel->r_addend);
2421 if (r != bfd_reloc_ok)
2426 name = h->root.root.string;
2429 name = bfd_elf_string_from_elf_section (input_bfd,
2430 symtab_hdr->sh_link,
2435 name = bfd_section_name (input_bfd, sec);
2438 if (r == bfd_reloc_overflow)
2441 && h->root.type == bfd_link_hash_undefweak
2442 && howto->pc_relative)
2443 /* Ignore reloc overflow on branches to undefweak syms. */
2446 if (! ((*info->callbacks->reloc_overflow)
2447 (info, name, howto->name, (bfd_vma) 0,
2448 input_bfd, input_section, rel->r_offset)))
2453 (*_bfd_error_handler)
2454 (_("%s(%s+0x%lx): reloc against `%s': error %d"),
2455 bfd_archive_filename (input_bfd),
2456 bfd_get_section_name (input_bfd, input_section),
2457 (long) rel->r_offset, name, (int) r);
2466 /* Finish up dynamic symbol handling. We set the contents of various
2467 dynamic sections here. */
2470 elf64_x86_64_finish_dynamic_symbol (bfd *output_bfd,
2471 struct bfd_link_info *info,
2472 struct elf_link_hash_entry *h,
2473 Elf_Internal_Sym *sym)
2475 struct elf64_x86_64_link_hash_table *htab;
2477 htab = elf64_x86_64_hash_table (info);
2479 if (h->plt.offset != (bfd_vma) -1)
2483 Elf_Internal_Rela rela;
2486 /* This symbol has an entry in the procedure linkage table. Set
2488 if (h->dynindx == -1
2489 || htab->splt == NULL
2490 || htab->sgotplt == NULL
2491 || htab->srelplt == NULL)
2494 /* Get the index in the procedure linkage table which
2495 corresponds to this symbol. This is the index of this symbol
2496 in all the symbols for which we are making plt entries. The
2497 first entry in the procedure linkage table is reserved. */
2498 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
2500 /* Get the offset into the .got table of the entry that
2501 corresponds to this function. Each .got entry is GOT_ENTRY_SIZE
2502 bytes. The first three are reserved for the dynamic linker. */
2503 got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
2505 /* Fill in the entry in the procedure linkage table. */
2506 memcpy (htab->splt->contents + h->plt.offset, elf64_x86_64_plt_entry,
2509 /* Insert the relocation positions of the plt section. The magic
2510 numbers at the end of the statements are the positions of the
2511 relocations in the plt section. */
2512 /* Put offset for jmp *name@GOTPCREL(%rip), since the
2513 instruction uses 6 bytes, subtract this value. */
2514 bfd_put_32 (output_bfd,
2515 (htab->sgotplt->output_section->vma
2516 + htab->sgotplt->output_offset
2518 - htab->splt->output_section->vma
2519 - htab->splt->output_offset
2522 htab->splt->contents + h->plt.offset + 2);
2523 /* Put relocation index. */
2524 bfd_put_32 (output_bfd, plt_index,
2525 htab->splt->contents + h->plt.offset + 7);
2526 /* Put offset for jmp .PLT0. */
2527 bfd_put_32 (output_bfd, - (h->plt.offset + PLT_ENTRY_SIZE),
2528 htab->splt->contents + h->plt.offset + 12);
2530 /* Fill in the entry in the global offset table, initially this
2531 points to the pushq instruction in the PLT which is at offset 6. */
2532 bfd_put_64 (output_bfd, (htab->splt->output_section->vma
2533 + htab->splt->output_offset
2534 + h->plt.offset + 6),
2535 htab->sgotplt->contents + got_offset);
2537 /* Fill in the entry in the .rela.plt section. */
2538 rela.r_offset = (htab->sgotplt->output_section->vma
2539 + htab->sgotplt->output_offset
2541 rela.r_info = ELF64_R_INFO (h->dynindx, R_X86_64_JUMP_SLOT);
2543 loc = htab->srelplt->contents + plt_index * sizeof (Elf64_External_Rela);
2544 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
2546 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2548 /* Mark the symbol as undefined, rather than as defined in
2549 the .plt section. Leave the value if there were any
2550 relocations where pointer equality matters (this is a clue
2551 for the dynamic linker, to make function pointer
2552 comparisons work between an application and shared
2553 library), otherwise set it to zero. If a function is only
2554 called from a binary, there is no need to slow down
2555 shared libraries because of that. */
2556 sym->st_shndx = SHN_UNDEF;
2557 if ((h->elf_link_hash_flags & ELF_LINK_POINTER_EQUALITY_NEEDED) == 0)
2562 if (h->got.offset != (bfd_vma) -1
2563 && elf64_x86_64_hash_entry (h)->tls_type != GOT_TLS_GD
2564 && elf64_x86_64_hash_entry (h)->tls_type != GOT_TLS_IE)
2566 Elf_Internal_Rela rela;
2569 /* This symbol has an entry in the global offset table. Set it
2571 if (htab->sgot == NULL || htab->srelgot == NULL)
2574 rela.r_offset = (htab->sgot->output_section->vma
2575 + htab->sgot->output_offset
2576 + (h->got.offset &~ (bfd_vma) 1));
2578 /* If this is a static link, or it is a -Bsymbolic link and the
2579 symbol is defined locally or was forced to be local because
2580 of a version file, we just want to emit a RELATIVE reloc.
2581 The entry in the global offset table will already have been
2582 initialized in the relocate_section function. */
2584 && SYMBOL_REFERENCES_LOCAL (info, h))
2586 BFD_ASSERT((h->got.offset & 1) != 0);
2587 rela.r_info = ELF64_R_INFO (0, R_X86_64_RELATIVE);
2588 rela.r_addend = (h->root.u.def.value
2589 + h->root.u.def.section->output_section->vma
2590 + h->root.u.def.section->output_offset);
2594 BFD_ASSERT((h->got.offset & 1) == 0);
2595 bfd_put_64 (output_bfd, (bfd_vma) 0,
2596 htab->sgot->contents + h->got.offset);
2597 rela.r_info = ELF64_R_INFO (h->dynindx, R_X86_64_GLOB_DAT);
2601 loc = htab->srelgot->contents;
2602 loc += htab->srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
2603 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
2606 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
2608 Elf_Internal_Rela rela;
2611 /* This symbol needs a copy reloc. Set it up. */
2613 if (h->dynindx == -1
2614 || (h->root.type != bfd_link_hash_defined
2615 && h->root.type != bfd_link_hash_defweak)
2616 || htab->srelbss == NULL)
2619 rela.r_offset = (h->root.u.def.value
2620 + h->root.u.def.section->output_section->vma
2621 + h->root.u.def.section->output_offset);
2622 rela.r_info = ELF64_R_INFO (h->dynindx, R_X86_64_COPY);
2624 loc = htab->srelbss->contents;
2625 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
2626 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
2629 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2630 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2631 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2632 sym->st_shndx = SHN_ABS;
2637 /* Used to decide how to sort relocs in an optimal manner for the
2638 dynamic linker, before writing them out. */
2640 static enum elf_reloc_type_class
2641 elf64_x86_64_reloc_type_class (const Elf_Internal_Rela *rela)
2643 switch ((int) ELF64_R_TYPE (rela->r_info))
2645 case R_X86_64_RELATIVE:
2646 return reloc_class_relative;
2647 case R_X86_64_JUMP_SLOT:
2648 return reloc_class_plt;
2650 return reloc_class_copy;
2652 return reloc_class_normal;
2656 /* Finish up the dynamic sections. */
2659 elf64_x86_64_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
2661 struct elf64_x86_64_link_hash_table *htab;
2665 htab = elf64_x86_64_hash_table (info);
2666 dynobj = htab->elf.dynobj;
2667 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2669 if (htab->elf.dynamic_sections_created)
2671 Elf64_External_Dyn *dyncon, *dynconend;
2673 if (sdyn == NULL || htab->sgot == NULL)
2676 dyncon = (Elf64_External_Dyn *) sdyn->contents;
2677 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
2678 for (; dyncon < dynconend; dyncon++)
2680 Elf_Internal_Dyn dyn;
2683 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
2692 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
2696 dyn.d_un.d_ptr = htab->srelplt->output_section->vma;
2700 s = htab->srelplt->output_section;
2701 dyn.d_un.d_val = s->size;
2705 /* The procedure linkage table relocs (DT_JMPREL) should
2706 not be included in the overall relocs (DT_RELA).
2707 Therefore, we override the DT_RELASZ entry here to
2708 make it not include the JMPREL relocs. Since the
2709 linker script arranges for .rela.plt to follow all
2710 other relocation sections, we don't have to worry
2711 about changing the DT_RELA entry. */
2712 if (htab->srelplt != NULL)
2714 s = htab->srelplt->output_section;
2715 dyn.d_un.d_val -= s->size;
2720 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2723 /* Fill in the special first entry in the procedure linkage table. */
2724 if (htab->splt && htab->splt->size > 0)
2726 /* Fill in the first entry in the procedure linkage table. */
2727 memcpy (htab->splt->contents, elf64_x86_64_plt0_entry,
2729 /* Add offset for pushq GOT+8(%rip), since the instruction
2730 uses 6 bytes subtract this value. */
2731 bfd_put_32 (output_bfd,
2732 (htab->sgotplt->output_section->vma
2733 + htab->sgotplt->output_offset
2735 - htab->splt->output_section->vma
2736 - htab->splt->output_offset
2738 htab->splt->contents + 2);
2739 /* Add offset for jmp *GOT+16(%rip). The 12 is the offset to
2740 the end of the instruction. */
2741 bfd_put_32 (output_bfd,
2742 (htab->sgotplt->output_section->vma
2743 + htab->sgotplt->output_offset
2745 - htab->splt->output_section->vma
2746 - htab->splt->output_offset
2748 htab->splt->contents + 8);
2750 elf_section_data (htab->splt->output_section)->this_hdr.sh_entsize =
2757 /* Fill in the first three entries in the global offset table. */
2758 if (htab->sgotplt->size > 0)
2760 /* Set the first entry in the global offset table to the address of
2761 the dynamic section. */
2763 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->sgotplt->contents);
2765 bfd_put_64 (output_bfd,
2766 sdyn->output_section->vma + sdyn->output_offset,
2767 htab->sgotplt->contents);
2768 /* Write GOT[1] and GOT[2], needed for the dynamic linker. */
2769 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->sgotplt->contents + GOT_ENTRY_SIZE);
2770 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->sgotplt->contents + GOT_ENTRY_SIZE*2);
2773 elf_section_data (htab->sgotplt->output_section)->this_hdr.sh_entsize =
2777 if (htab->sgot && htab->sgot->size > 0)
2778 elf_section_data (htab->sgot->output_section)->this_hdr.sh_entsize
2784 /* Return address for Ith PLT stub in section PLT, for relocation REL
2785 or (bfd_vma) -1 if it should not be included. */
2788 elf64_x86_64_plt_sym_val (bfd_vma i, const asection *plt,
2789 const arelent *rel ATTRIBUTE_UNUSED)
2791 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
2794 #define TARGET_LITTLE_SYM bfd_elf64_x86_64_vec
2795 #define TARGET_LITTLE_NAME "elf64-x86-64"
2796 #define ELF_ARCH bfd_arch_i386
2797 #define ELF_MACHINE_CODE EM_X86_64
2798 #define ELF_MAXPAGESIZE 0x100000
2800 #define elf_backend_can_gc_sections 1
2801 #define elf_backend_can_refcount 1
2802 #define elf_backend_want_got_plt 1
2803 #define elf_backend_plt_readonly 1
2804 #define elf_backend_want_plt_sym 0
2805 #define elf_backend_got_header_size (GOT_ENTRY_SIZE*3)
2806 #define elf_backend_rela_normal 1
2808 #define elf_info_to_howto elf64_x86_64_info_to_howto
2810 #define bfd_elf64_bfd_link_hash_table_create \
2811 elf64_x86_64_link_hash_table_create
2812 #define bfd_elf64_bfd_reloc_type_lookup elf64_x86_64_reloc_type_lookup
2814 #define elf_backend_adjust_dynamic_symbol elf64_x86_64_adjust_dynamic_symbol
2815 #define elf_backend_check_relocs elf64_x86_64_check_relocs
2816 #define elf_backend_copy_indirect_symbol elf64_x86_64_copy_indirect_symbol
2817 #define elf_backend_create_dynamic_sections elf64_x86_64_create_dynamic_sections
2818 #define elf_backend_finish_dynamic_sections elf64_x86_64_finish_dynamic_sections
2819 #define elf_backend_finish_dynamic_symbol elf64_x86_64_finish_dynamic_symbol
2820 #define elf_backend_gc_mark_hook elf64_x86_64_gc_mark_hook
2821 #define elf_backend_gc_sweep_hook elf64_x86_64_gc_sweep_hook
2822 #define elf_backend_grok_prstatus elf64_x86_64_grok_prstatus
2823 #define elf_backend_grok_psinfo elf64_x86_64_grok_psinfo
2824 #define elf_backend_reloc_type_class elf64_x86_64_reloc_type_class
2825 #define elf_backend_relocate_section elf64_x86_64_relocate_section
2826 #define elf_backend_size_dynamic_sections elf64_x86_64_size_dynamic_sections
2827 #define elf_backend_plt_sym_val elf64_x86_64_plt_sym_val
2828 #define elf_backend_object_p elf64_x86_64_elf_object_p
2829 #define bfd_elf64_mkobject elf64_x86_64_mkobject
2831 #include "elf64-target.h"