1 /* X86-64 specific support for 64-bit ELF
2 Copyright 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
3 Contributed by Jan Hubicka <jh@suse.cz>.
5 This file is part of BFD, the Binary File Descriptor library.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
27 #include "elf/x86-64.h"
29 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value. */
30 #define MINUS_ONE (~ (bfd_vma) 0)
32 /* The relocation "howto" table. Order of fields:
33 type, size, bitsize, pc_relative, complain_on_overflow,
34 special_function, name, partial_inplace, src_mask, dst_pack, pcrel_offset. */
35 static reloc_howto_type x86_64_elf_howto_table[] =
37 HOWTO(R_X86_64_NONE, 0, 0, 0, FALSE, 0, complain_overflow_dont,
38 bfd_elf_generic_reloc, "R_X86_64_NONE", FALSE, 0x00000000, 0x00000000,
40 HOWTO(R_X86_64_64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
41 bfd_elf_generic_reloc, "R_X86_64_64", FALSE, MINUS_ONE, MINUS_ONE,
43 HOWTO(R_X86_64_PC32, 0, 2, 32, TRUE, 0, complain_overflow_signed,
44 bfd_elf_generic_reloc, "R_X86_64_PC32", FALSE, 0xffffffff, 0xffffffff,
46 HOWTO(R_X86_64_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_signed,
47 bfd_elf_generic_reloc, "R_X86_64_GOT32", FALSE, 0xffffffff, 0xffffffff,
49 HOWTO(R_X86_64_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_signed,
50 bfd_elf_generic_reloc, "R_X86_64_PLT32", FALSE, 0xffffffff, 0xffffffff,
52 HOWTO(R_X86_64_COPY, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
53 bfd_elf_generic_reloc, "R_X86_64_COPY", FALSE, 0xffffffff, 0xffffffff,
55 HOWTO(R_X86_64_GLOB_DAT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
56 bfd_elf_generic_reloc, "R_X86_64_GLOB_DAT", FALSE, MINUS_ONE,
58 HOWTO(R_X86_64_JUMP_SLOT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
59 bfd_elf_generic_reloc, "R_X86_64_JUMP_SLOT", FALSE, MINUS_ONE,
61 HOWTO(R_X86_64_RELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
62 bfd_elf_generic_reloc, "R_X86_64_RELATIVE", FALSE, MINUS_ONE,
64 HOWTO(R_X86_64_GOTPCREL, 0, 2, 32, TRUE, 0, complain_overflow_signed,
65 bfd_elf_generic_reloc, "R_X86_64_GOTPCREL", FALSE, 0xffffffff,
67 HOWTO(R_X86_64_32, 0, 2, 32, FALSE, 0, complain_overflow_unsigned,
68 bfd_elf_generic_reloc, "R_X86_64_32", FALSE, 0xffffffff, 0xffffffff,
70 HOWTO(R_X86_64_32S, 0, 2, 32, FALSE, 0, complain_overflow_signed,
71 bfd_elf_generic_reloc, "R_X86_64_32S", FALSE, 0xffffffff, 0xffffffff,
73 HOWTO(R_X86_64_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
74 bfd_elf_generic_reloc, "R_X86_64_16", FALSE, 0xffff, 0xffff, FALSE),
75 HOWTO(R_X86_64_PC16,0, 1, 16, TRUE, 0, complain_overflow_bitfield,
76 bfd_elf_generic_reloc, "R_X86_64_PC16", FALSE, 0xffff, 0xffff, TRUE),
77 HOWTO(R_X86_64_8, 0, 0, 8, FALSE, 0, complain_overflow_signed,
78 bfd_elf_generic_reloc, "R_X86_64_8", FALSE, 0xff, 0xff, FALSE),
79 HOWTO(R_X86_64_PC8, 0, 0, 8, TRUE, 0, complain_overflow_signed,
80 bfd_elf_generic_reloc, "R_X86_64_PC8", FALSE, 0xff, 0xff, TRUE),
81 HOWTO(R_X86_64_DTPMOD64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
82 bfd_elf_generic_reloc, "R_X86_64_DTPMOD64", FALSE, MINUS_ONE,
84 HOWTO(R_X86_64_DTPOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_X86_64_DTPOFF64", FALSE, MINUS_ONE,
87 HOWTO(R_X86_64_TPOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
88 bfd_elf_generic_reloc, "R_X86_64_TPOFF64", FALSE, MINUS_ONE,
90 HOWTO(R_X86_64_TLSGD, 0, 2, 32, TRUE, 0, complain_overflow_signed,
91 bfd_elf_generic_reloc, "R_X86_64_TLSGD", FALSE, 0xffffffff,
93 HOWTO(R_X86_64_TLSLD, 0, 2, 32, TRUE, 0, complain_overflow_signed,
94 bfd_elf_generic_reloc, "R_X86_64_TLSLD", FALSE, 0xffffffff,
96 HOWTO(R_X86_64_DTPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
97 bfd_elf_generic_reloc, "R_X86_64_DTPOFF32", FALSE, 0xffffffff,
99 HOWTO(R_X86_64_GOTTPOFF, 0, 2, 32, TRUE, 0, complain_overflow_signed,
100 bfd_elf_generic_reloc, "R_X86_64_GOTTPOFF", FALSE, 0xffffffff,
102 HOWTO(R_X86_64_TPOFF32, 0, 2, 32, FALSE, 0, complain_overflow_signed,
103 bfd_elf_generic_reloc, "R_X86_64_TPOFF32", FALSE, 0xffffffff,
106 /* GNU extension to record C++ vtable hierarchy. */
107 HOWTO (R_X86_64_GNU_VTINHERIT, 0, 4, 0, FALSE, 0, complain_overflow_dont,
108 NULL, "R_X86_64_GNU_VTINHERIT", FALSE, 0, 0, FALSE),
110 /* GNU extension to record C++ vtable member usage. */
111 HOWTO (R_X86_64_GNU_VTENTRY, 0, 4, 0, FALSE, 0, complain_overflow_dont,
112 _bfd_elf_rel_vtable_reloc_fn, "R_X86_64_GNU_VTENTRY", FALSE, 0, 0,
116 /* Map BFD relocs to the x86_64 elf relocs. */
119 bfd_reloc_code_real_type bfd_reloc_val;
120 unsigned char elf_reloc_val;
123 static const struct elf_reloc_map x86_64_reloc_map[] =
125 { BFD_RELOC_NONE, R_X86_64_NONE, },
126 { BFD_RELOC_64, R_X86_64_64, },
127 { BFD_RELOC_32_PCREL, R_X86_64_PC32, },
128 { BFD_RELOC_X86_64_GOT32, R_X86_64_GOT32,},
129 { BFD_RELOC_X86_64_PLT32, R_X86_64_PLT32,},
130 { BFD_RELOC_X86_64_COPY, R_X86_64_COPY, },
131 { BFD_RELOC_X86_64_GLOB_DAT, R_X86_64_GLOB_DAT, },
132 { BFD_RELOC_X86_64_JUMP_SLOT, R_X86_64_JUMP_SLOT, },
133 { BFD_RELOC_X86_64_RELATIVE, R_X86_64_RELATIVE, },
134 { BFD_RELOC_X86_64_GOTPCREL, R_X86_64_GOTPCREL, },
135 { BFD_RELOC_32, R_X86_64_32, },
136 { BFD_RELOC_X86_64_32S, R_X86_64_32S, },
137 { BFD_RELOC_16, R_X86_64_16, },
138 { BFD_RELOC_16_PCREL, R_X86_64_PC16, },
139 { BFD_RELOC_8, R_X86_64_8, },
140 { BFD_RELOC_8_PCREL, R_X86_64_PC8, },
141 { BFD_RELOC_X86_64_DTPMOD64, R_X86_64_DTPMOD64, },
142 { BFD_RELOC_X86_64_DTPOFF64, R_X86_64_DTPOFF64, },
143 { BFD_RELOC_X86_64_TPOFF64, R_X86_64_TPOFF64, },
144 { BFD_RELOC_X86_64_TLSGD, R_X86_64_TLSGD, },
145 { BFD_RELOC_X86_64_TLSLD, R_X86_64_TLSLD, },
146 { BFD_RELOC_X86_64_DTPOFF32, R_X86_64_DTPOFF32, },
147 { BFD_RELOC_X86_64_GOTTPOFF, R_X86_64_GOTTPOFF, },
148 { BFD_RELOC_X86_64_TPOFF32, R_X86_64_TPOFF32, },
149 { BFD_RELOC_VTABLE_INHERIT, R_X86_64_GNU_VTINHERIT, },
150 { BFD_RELOC_VTABLE_ENTRY, R_X86_64_GNU_VTENTRY, },
154 /* Given a BFD reloc type, return a HOWTO structure. */
155 static reloc_howto_type *
156 elf64_x86_64_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
157 bfd_reloc_code_real_type code)
161 for (i = 0; i < sizeof (x86_64_reloc_map) / sizeof (struct elf_reloc_map);
164 if (x86_64_reloc_map[i].bfd_reloc_val == code)
165 return &x86_64_elf_howto_table[i];
170 /* Given an x86_64 ELF reloc type, fill in an arelent structure. */
173 elf64_x86_64_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
174 Elf_Internal_Rela *dst)
178 r_type = ELF64_R_TYPE (dst->r_info);
179 if (r_type < (unsigned int) R_X86_64_GNU_VTINHERIT)
181 BFD_ASSERT (r_type <= (unsigned int) R_X86_64_TPOFF32);
186 BFD_ASSERT (r_type < (unsigned int) R_X86_64_max);
187 i = r_type - ((unsigned int) R_X86_64_GNU_VTINHERIT - R_X86_64_TPOFF32 - 1);
189 cache_ptr->howto = &x86_64_elf_howto_table[i];
190 BFD_ASSERT (r_type == cache_ptr->howto->type);
193 /* Support for core dump NOTE sections. */
195 elf64_x86_64_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
200 switch (note->descsz)
205 case 336: /* sizeof(istruct elf_prstatus) on Linux/x86_64 */
207 elf_tdata (abfd)->core_signal
208 = bfd_get_16 (abfd, note->descdata + 12);
211 elf_tdata (abfd)->core_pid
212 = bfd_get_32 (abfd, note->descdata + 32);
221 /* Make a ".reg/999" section. */
222 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
223 raw_size, note->descpos + offset);
227 elf64_x86_64_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
229 switch (note->descsz)
234 case 136: /* sizeof(struct elf_prpsinfo) on Linux/x86_64 */
235 elf_tdata (abfd)->core_program
236 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
237 elf_tdata (abfd)->core_command
238 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
241 /* Note that for some reason, a spurious space is tacked
242 onto the end of the args in some (at least one anyway)
243 implementations, so strip it off if it exists. */
246 char *command = elf_tdata (abfd)->core_command;
247 int n = strlen (command);
249 if (0 < n && command[n - 1] == ' ')
250 command[n - 1] = '\0';
256 /* Functions for the x86-64 ELF linker. */
258 /* The name of the dynamic interpreter. This is put in the .interp
261 #define ELF_DYNAMIC_INTERPRETER "/lib/ld64.so.1"
263 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
264 copying dynamic variables from a shared lib into an app's dynbss
265 section, and instead use a dynamic relocation to point into the
267 #define ELIMINATE_COPY_RELOCS 1
269 /* The size in bytes of an entry in the global offset table. */
271 #define GOT_ENTRY_SIZE 8
273 /* The size in bytes of an entry in the procedure linkage table. */
275 #define PLT_ENTRY_SIZE 16
277 /* The first entry in a procedure linkage table looks like this. See the
278 SVR4 ABI i386 supplement and the x86-64 ABI to see how this works. */
280 static const bfd_byte elf64_x86_64_plt0_entry[PLT_ENTRY_SIZE] =
282 0xff, 0x35, 8, 0, 0, 0, /* pushq GOT+8(%rip) */
283 0xff, 0x25, 16, 0, 0, 0, /* jmpq *GOT+16(%rip) */
284 0x90, 0x90, 0x90, 0x90 /* pad out to 16 bytes with nops. */
287 /* Subsequent entries in a procedure linkage table look like this. */
289 static const bfd_byte elf64_x86_64_plt_entry[PLT_ENTRY_SIZE] =
291 0xff, 0x25, /* jmpq *name@GOTPC(%rip) */
292 0, 0, 0, 0, /* replaced with offset to this symbol in .got. */
293 0x68, /* pushq immediate */
294 0, 0, 0, 0, /* replaced with index into relocation table. */
295 0xe9, /* jmp relative */
296 0, 0, 0, 0 /* replaced with offset to start of .plt0. */
299 /* The x86-64 linker needs to keep track of the number of relocs that
300 it decides to copy as dynamic relocs in check_relocs for each symbol.
301 This is so that it can later discard them if they are found to be
302 unnecessary. We store the information in a field extending the
303 regular ELF linker hash table. */
305 struct elf64_x86_64_dyn_relocs
308 struct elf64_x86_64_dyn_relocs *next;
310 /* The input section of the reloc. */
313 /* Total number of relocs copied for the input section. */
316 /* Number of pc-relative relocs copied for the input section. */
317 bfd_size_type pc_count;
320 /* x86-64 ELF linker hash entry. */
322 struct elf64_x86_64_link_hash_entry
324 struct elf_link_hash_entry elf;
326 /* Track dynamic relocs copied for this symbol. */
327 struct elf64_x86_64_dyn_relocs *dyn_relocs;
329 #define GOT_UNKNOWN 0
333 unsigned char tls_type;
336 #define elf64_x86_64_hash_entry(ent) \
337 ((struct elf64_x86_64_link_hash_entry *)(ent))
339 struct elf64_x86_64_obj_tdata
341 struct elf_obj_tdata root;
343 /* tls_type for each local got entry. */
344 char *local_got_tls_type;
347 #define elf64_x86_64_tdata(abfd) \
348 ((struct elf64_x86_64_obj_tdata *) (abfd)->tdata.any)
350 #define elf64_x86_64_local_got_tls_type(abfd) \
351 (elf64_x86_64_tdata (abfd)->local_got_tls_type)
354 /* x86-64 ELF linker hash table. */
356 struct elf64_x86_64_link_hash_table
358 struct elf_link_hash_table elf;
360 /* Short-cuts to get to dynamic linker sections. */
370 bfd_signed_vma refcount;
374 /* Small local sym to section mapping cache. */
375 struct sym_sec_cache sym_sec;
378 /* Get the x86-64 ELF linker hash table from a link_info structure. */
380 #define elf64_x86_64_hash_table(p) \
381 ((struct elf64_x86_64_link_hash_table *) ((p)->hash))
383 /* Create an entry in an x86-64 ELF linker hash table. */
385 static struct bfd_hash_entry *
386 link_hash_newfunc (struct bfd_hash_entry *entry, struct bfd_hash_table *table,
389 /* Allocate the structure if it has not already been allocated by a
393 entry = bfd_hash_allocate (table,
394 sizeof (struct elf64_x86_64_link_hash_entry));
399 /* Call the allocation method of the superclass. */
400 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
403 struct elf64_x86_64_link_hash_entry *eh;
405 eh = (struct elf64_x86_64_link_hash_entry *) entry;
406 eh->dyn_relocs = NULL;
407 eh->tls_type = GOT_UNKNOWN;
413 /* Create an X86-64 ELF linker hash table. */
415 static struct bfd_link_hash_table *
416 elf64_x86_64_link_hash_table_create (bfd *abfd)
418 struct elf64_x86_64_link_hash_table *ret;
419 bfd_size_type amt = sizeof (struct elf64_x86_64_link_hash_table);
421 ret = (struct elf64_x86_64_link_hash_table *) bfd_malloc (amt);
425 if (! _bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc))
438 ret->sym_sec.abfd = NULL;
439 ret->tls_ld_got.refcount = 0;
441 return &ret->elf.root;
444 /* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
445 shortcuts to them in our hash table. */
448 create_got_section (bfd *dynobj, struct bfd_link_info *info)
450 struct elf64_x86_64_link_hash_table *htab;
452 if (! _bfd_elf_create_got_section (dynobj, info))
455 htab = elf64_x86_64_hash_table (info);
456 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
457 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
458 if (!htab->sgot || !htab->sgotplt)
461 htab->srelgot = bfd_make_section (dynobj, ".rela.got");
462 if (htab->srelgot == NULL
463 || ! bfd_set_section_flags (dynobj, htab->srelgot,
464 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
465 | SEC_IN_MEMORY | SEC_LINKER_CREATED
467 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 3))
472 /* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
473 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
477 elf64_x86_64_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
479 struct elf64_x86_64_link_hash_table *htab;
481 htab = elf64_x86_64_hash_table (info);
482 if (!htab->sgot && !create_got_section (dynobj, info))
485 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
488 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
489 htab->srelplt = bfd_get_section_by_name (dynobj, ".rela.plt");
490 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
492 htab->srelbss = bfd_get_section_by_name (dynobj, ".rela.bss");
494 if (!htab->splt || !htab->srelplt || !htab->sdynbss
495 || (!info->shared && !htab->srelbss))
501 /* Copy the extra info we tack onto an elf_link_hash_entry. */
504 elf64_x86_64_copy_indirect_symbol (const struct elf_backend_data *bed,
505 struct elf_link_hash_entry *dir,
506 struct elf_link_hash_entry *ind)
508 struct elf64_x86_64_link_hash_entry *edir, *eind;
510 edir = (struct elf64_x86_64_link_hash_entry *) dir;
511 eind = (struct elf64_x86_64_link_hash_entry *) ind;
513 if (eind->dyn_relocs != NULL)
515 if (edir->dyn_relocs != NULL)
517 struct elf64_x86_64_dyn_relocs **pp;
518 struct elf64_x86_64_dyn_relocs *p;
520 if (ind->root.type == bfd_link_hash_indirect)
523 /* Add reloc counts against the weak sym to the strong sym
524 list. Merge any entries against the same section. */
525 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
527 struct elf64_x86_64_dyn_relocs *q;
529 for (q = edir->dyn_relocs; q != NULL; q = q->next)
530 if (q->sec == p->sec)
532 q->pc_count += p->pc_count;
533 q->count += p->count;
540 *pp = edir->dyn_relocs;
543 edir->dyn_relocs = eind->dyn_relocs;
544 eind->dyn_relocs = NULL;
547 if (ind->root.type == bfd_link_hash_indirect
548 && dir->got.refcount <= 0)
550 edir->tls_type = eind->tls_type;
551 eind->tls_type = GOT_UNKNOWN;
554 if (ELIMINATE_COPY_RELOCS
555 && ind->root.type != bfd_link_hash_indirect
556 && (dir->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
557 /* If called to transfer flags for a weakdef during processing
558 of elf_adjust_dynamic_symbol, don't copy ELF_LINK_NON_GOT_REF.
559 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
560 dir->elf_link_hash_flags |=
561 (ind->elf_link_hash_flags & (ELF_LINK_HASH_REF_DYNAMIC
562 | ELF_LINK_HASH_REF_REGULAR
563 | ELF_LINK_HASH_REF_REGULAR_NONWEAK));
565 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
569 elf64_x86_64_mkobject (bfd *abfd)
571 bfd_size_type amt = sizeof (struct elf64_x86_64_obj_tdata);
572 abfd->tdata.any = bfd_zalloc (abfd, amt);
573 if (abfd->tdata.any == NULL)
579 elf64_x86_64_elf_object_p (bfd *abfd)
581 /* Allocate our special target data. */
582 struct elf64_x86_64_obj_tdata *new_tdata;
583 bfd_size_type amt = sizeof (struct elf64_x86_64_obj_tdata);
584 new_tdata = bfd_zalloc (abfd, amt);
585 if (new_tdata == NULL)
587 new_tdata->root = *abfd->tdata.elf_obj_data;
588 abfd->tdata.any = new_tdata;
589 /* Set the right machine number for an x86-64 elf64 file. */
590 bfd_default_set_arch_mach (abfd, bfd_arch_i386, bfd_mach_x86_64);
595 elf64_x86_64_tls_transition (struct bfd_link_info *info, int r_type, int is_local)
603 case R_X86_64_GOTTPOFF:
605 return R_X86_64_TPOFF32;
606 return R_X86_64_GOTTPOFF;
608 return R_X86_64_TPOFF32;
614 /* Look through the relocs for a section during the first phase, and
615 calculate needed space in the global offset table, procedure
616 linkage table, and dynamic reloc sections. */
619 elf64_x86_64_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
620 const Elf_Internal_Rela *relocs)
622 struct elf64_x86_64_link_hash_table *htab;
623 Elf_Internal_Shdr *symtab_hdr;
624 struct elf_link_hash_entry **sym_hashes;
625 const Elf_Internal_Rela *rel;
626 const Elf_Internal_Rela *rel_end;
629 if (info->relocatable)
632 htab = elf64_x86_64_hash_table (info);
633 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
634 sym_hashes = elf_sym_hashes (abfd);
638 rel_end = relocs + sec->reloc_count;
639 for (rel = relocs; rel < rel_end; rel++)
642 unsigned long r_symndx;
643 struct elf_link_hash_entry *h;
645 r_symndx = ELF64_R_SYM (rel->r_info);
646 r_type = ELF64_R_TYPE (rel->r_info);
648 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
650 (*_bfd_error_handler) (_("%s: bad symbol index: %d"),
651 bfd_archive_filename (abfd),
656 if (r_symndx < symtab_hdr->sh_info)
659 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
661 r_type = elf64_x86_64_tls_transition (info, r_type, h == NULL);
665 htab->tls_ld_got.refcount += 1;
668 case R_X86_64_TPOFF32:
671 (*_bfd_error_handler)
672 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
673 bfd_archive_filename (abfd),
674 x86_64_elf_howto_table[r_type].name);
675 bfd_set_error (bfd_error_bad_value);
680 case R_X86_64_GOTTPOFF:
682 info->flags |= DF_STATIC_TLS;
686 case R_X86_64_GOTPCREL:
688 /* This symbol requires a global offset table entry. */
690 int tls_type, old_tls_type;
694 default: tls_type = GOT_NORMAL; break;
695 case R_X86_64_TLSGD: tls_type = GOT_TLS_GD; break;
696 case R_X86_64_GOTTPOFF: tls_type = GOT_TLS_IE; break;
701 h->got.refcount += 1;
702 old_tls_type = elf64_x86_64_hash_entry (h)->tls_type;
706 bfd_signed_vma *local_got_refcounts;
708 /* This is a global offset table entry for a local symbol. */
709 local_got_refcounts = elf_local_got_refcounts (abfd);
710 if (local_got_refcounts == NULL)
714 size = symtab_hdr->sh_info;
715 size *= sizeof (bfd_signed_vma) + sizeof (char);
716 local_got_refcounts = ((bfd_signed_vma *)
717 bfd_zalloc (abfd, size));
718 if (local_got_refcounts == NULL)
720 elf_local_got_refcounts (abfd) = local_got_refcounts;
721 elf64_x86_64_local_got_tls_type (abfd)
722 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
724 local_got_refcounts[r_symndx] += 1;
726 = elf64_x86_64_local_got_tls_type (abfd) [r_symndx];
729 /* If a TLS symbol is accessed using IE at least once,
730 there is no point to use dynamic model for it. */
731 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN
732 && (old_tls_type != GOT_TLS_GD || tls_type != GOT_TLS_IE))
734 if (old_tls_type == GOT_TLS_IE && tls_type == GOT_TLS_GD)
735 tls_type = old_tls_type;
738 (*_bfd_error_handler)
739 (_("%s: %s' accessed both as normal and thread local symbol"),
740 bfd_archive_filename (abfd),
741 h ? h->root.root.string : "<local>");
746 if (old_tls_type != tls_type)
749 elf64_x86_64_hash_entry (h)->tls_type = tls_type;
751 elf64_x86_64_local_got_tls_type (abfd) [r_symndx] = tls_type;
756 //case R_X86_64_GOTPCREL:
758 if (htab->sgot == NULL)
760 if (htab->elf.dynobj == NULL)
761 htab->elf.dynobj = abfd;
762 if (!create_got_section (htab->elf.dynobj, info))
768 /* This symbol requires a procedure linkage table entry. We
769 actually build the entry in adjust_dynamic_symbol,
770 because this might be a case of linking PIC code which is
771 never referenced by a dynamic object, in which case we
772 don't need to generate a procedure linkage table entry
775 /* If this is a local symbol, we resolve it directly without
776 creating a procedure linkage table entry. */
780 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
781 h->plt.refcount += 1;
788 /* Let's help debug shared library creation. These relocs
789 cannot be used in shared libs. Don't error out for
790 sections we don't care about, such as debug sections or
791 non-constant sections. */
793 && (sec->flags & SEC_ALLOC) != 0
794 && (sec->flags & SEC_READONLY) != 0)
796 (*_bfd_error_handler)
797 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
798 bfd_archive_filename (abfd),
799 x86_64_elf_howto_table[r_type].name);
800 bfd_set_error (bfd_error_bad_value);
809 if (h != NULL && !info->shared)
811 /* If this reloc is in a read-only section, we might
812 need a copy reloc. We can't check reliably at this
813 stage whether the section is read-only, as input
814 sections have not yet been mapped to output sections.
815 Tentatively set the flag for now, and correct in
816 adjust_dynamic_symbol. */
817 h->elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
819 /* We may need a .plt entry if the function this reloc
820 refers to is in a shared lib. */
821 h->plt.refcount += 1;
824 /* If we are creating a shared library, and this is a reloc
825 against a global symbol, or a non PC relative reloc
826 against a local symbol, then we need to copy the reloc
827 into the shared library. However, if we are linking with
828 -Bsymbolic, we do not need to copy a reloc against a
829 global symbol which is defined in an object we are
830 including in the link (i.e., DEF_REGULAR is set). At
831 this point we have not seen all the input files, so it is
832 possible that DEF_REGULAR is not set now but will be set
833 later (it is never cleared). In case of a weak definition,
834 DEF_REGULAR may be cleared later by a strong definition in
835 a shared library. We account for that possibility below by
836 storing information in the relocs_copied field of the hash
837 table entry. A similar situation occurs when creating
838 shared libraries and symbol visibility changes render the
841 If on the other hand, we are creating an executable, we
842 may need to keep relocations for symbols satisfied by a
843 dynamic library if we manage to avoid copy relocs for the
846 && (sec->flags & SEC_ALLOC) != 0
847 && (((r_type != R_X86_64_PC8)
848 && (r_type != R_X86_64_PC16)
849 && (r_type != R_X86_64_PC32))
852 || h->root.type == bfd_link_hash_defweak
853 || (h->elf_link_hash_flags
854 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
855 || (ELIMINATE_COPY_RELOCS
857 && (sec->flags & SEC_ALLOC) != 0
859 && (h->root.type == bfd_link_hash_defweak
860 || (h->elf_link_hash_flags
861 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
863 struct elf64_x86_64_dyn_relocs *p;
864 struct elf64_x86_64_dyn_relocs **head;
866 /* We must copy these reloc types into the output file.
867 Create a reloc section in dynobj and make room for
874 name = (bfd_elf_string_from_elf_section
876 elf_elfheader (abfd)->e_shstrndx,
877 elf_section_data (sec)->rel_hdr.sh_name));
881 if (strncmp (name, ".rela", 5) != 0
882 || strcmp (bfd_get_section_name (abfd, sec),
885 (*_bfd_error_handler)
886 (_("%s: bad relocation section name `%s\'"),
887 bfd_archive_filename (abfd), name);
890 if (htab->elf.dynobj == NULL)
891 htab->elf.dynobj = abfd;
893 dynobj = htab->elf.dynobj;
895 sreloc = bfd_get_section_by_name (dynobj, name);
900 sreloc = bfd_make_section (dynobj, name);
901 flags = (SEC_HAS_CONTENTS | SEC_READONLY
902 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
903 if ((sec->flags & SEC_ALLOC) != 0)
904 flags |= SEC_ALLOC | SEC_LOAD;
906 || ! bfd_set_section_flags (dynobj, sreloc, flags)
907 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
910 elf_section_data (sec)->sreloc = sreloc;
913 /* If this is a global symbol, we count the number of
914 relocations we need for this symbol. */
917 head = &((struct elf64_x86_64_link_hash_entry *) h)->dyn_relocs;
921 /* Track dynamic relocs needed for local syms too.
922 We really need local syms available to do this
926 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
931 head = ((struct elf64_x86_64_dyn_relocs **)
932 &elf_section_data (s)->local_dynrel);
936 if (p == NULL || p->sec != sec)
938 bfd_size_type amt = sizeof *p;
939 p = ((struct elf64_x86_64_dyn_relocs *)
940 bfd_alloc (htab->elf.dynobj, amt));
951 if (r_type == R_X86_64_PC8
952 || r_type == R_X86_64_PC16
953 || r_type == R_X86_64_PC32)
958 /* This relocation describes the C++ object vtable hierarchy.
959 Reconstruct it for later use during GC. */
960 case R_X86_64_GNU_VTINHERIT:
961 if (!_bfd_elf64_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
965 /* This relocation describes which C++ vtable entries are actually
966 used. Record for later use during GC. */
967 case R_X86_64_GNU_VTENTRY:
968 if (!_bfd_elf64_gc_record_vtentry (abfd, sec, h, rel->r_addend))
980 /* Return the section that should be marked against GC for a given
984 elf64_x86_64_gc_mark_hook (asection *sec,
985 struct bfd_link_info *info ATTRIBUTE_UNUSED,
986 Elf_Internal_Rela *rel,
987 struct elf_link_hash_entry *h,
988 Elf_Internal_Sym *sym)
992 switch (ELF64_R_TYPE (rel->r_info))
994 case R_X86_64_GNU_VTINHERIT:
995 case R_X86_64_GNU_VTENTRY:
999 switch (h->root.type)
1001 case bfd_link_hash_defined:
1002 case bfd_link_hash_defweak:
1003 return h->root.u.def.section;
1005 case bfd_link_hash_common:
1006 return h->root.u.c.p->section;
1014 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
1019 /* Update the got entry reference counts for the section being removed. */
1022 elf64_x86_64_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
1023 asection *sec, const Elf_Internal_Rela *relocs)
1025 Elf_Internal_Shdr *symtab_hdr;
1026 struct elf_link_hash_entry **sym_hashes;
1027 bfd_signed_vma *local_got_refcounts;
1028 const Elf_Internal_Rela *rel, *relend;
1030 elf_section_data (sec)->local_dynrel = NULL;
1032 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1033 sym_hashes = elf_sym_hashes (abfd);
1034 local_got_refcounts = elf_local_got_refcounts (abfd);
1036 relend = relocs + sec->reloc_count;
1037 for (rel = relocs; rel < relend; rel++)
1039 unsigned long r_symndx;
1040 unsigned int r_type;
1041 struct elf_link_hash_entry *h = NULL;
1043 r_symndx = ELF64_R_SYM (rel->r_info);
1044 if (r_symndx >= symtab_hdr->sh_info)
1046 struct elf64_x86_64_link_hash_entry *eh;
1047 struct elf64_x86_64_dyn_relocs **pp;
1048 struct elf64_x86_64_dyn_relocs *p;
1050 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1051 eh = (struct elf64_x86_64_link_hash_entry *) h;
1053 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1056 /* Everything must go for SEC. */
1062 r_type = ELF64_R_TYPE (rel->r_info);
1063 r_type = elf64_x86_64_tls_transition (info, r_type, h != NULL);
1066 case R_X86_64_TLSLD:
1067 if (elf64_x86_64_hash_table (info)->tls_ld_got.refcount > 0)
1068 elf64_x86_64_hash_table (info)->tls_ld_got.refcount -= 1;
1071 case R_X86_64_TLSGD:
1072 case R_X86_64_GOTTPOFF:
1073 case R_X86_64_GOT32:
1074 case R_X86_64_GOTPCREL:
1077 if (h->got.refcount > 0)
1078 h->got.refcount -= 1;
1080 else if (local_got_refcounts != NULL)
1082 if (local_got_refcounts[r_symndx] > 0)
1083 local_got_refcounts[r_symndx] -= 1;
1099 case R_X86_64_PLT32:
1102 if (h->plt.refcount > 0)
1103 h->plt.refcount -= 1;
1115 /* Adjust a symbol defined by a dynamic object and referenced by a
1116 regular object. The current definition is in some section of the
1117 dynamic object, but we're not including those sections. We have to
1118 change the definition to something the rest of the link can
1122 elf64_x86_64_adjust_dynamic_symbol (struct bfd_link_info *info,
1123 struct elf_link_hash_entry *h)
1125 struct elf64_x86_64_link_hash_table *htab;
1127 unsigned int power_of_two;
1129 /* If this is a function, put it in the procedure linkage table. We
1130 will fill in the contents of the procedure linkage table later,
1131 when we know the address of the .got section. */
1132 if (h->type == STT_FUNC
1133 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1135 if (h->plt.refcount <= 0
1136 || SYMBOL_CALLS_LOCAL (info, h)
1137 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1138 && h->root.type == bfd_link_hash_undefweak))
1140 /* This case can occur if we saw a PLT32 reloc in an input
1141 file, but the symbol was never referred to by a dynamic
1142 object, or if all references were garbage collected. In
1143 such a case, we don't actually need to build a procedure
1144 linkage table, and we can just do a PC32 reloc instead. */
1145 h->plt.offset = (bfd_vma) -1;
1146 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1152 /* It's possible that we incorrectly decided a .plt reloc was
1153 needed for an R_X86_64_PC32 reloc to a non-function sym in
1154 check_relocs. We can't decide accurately between function and
1155 non-function syms in check-relocs; Objects loaded later in
1156 the link may change h->type. So fix it now. */
1157 h->plt.offset = (bfd_vma) -1;
1159 /* If this is a weak symbol, and there is a real definition, the
1160 processor independent code will have arranged for us to see the
1161 real definition first, and we can just use the same value. */
1162 if (h->weakdef != NULL)
1164 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1165 || h->weakdef->root.type == bfd_link_hash_defweak);
1166 h->root.u.def.section = h->weakdef->root.u.def.section;
1167 h->root.u.def.value = h->weakdef->root.u.def.value;
1168 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1169 h->elf_link_hash_flags
1170 = ((h->elf_link_hash_flags & ~ELF_LINK_NON_GOT_REF)
1171 | (h->weakdef->elf_link_hash_flags & ELF_LINK_NON_GOT_REF));
1175 /* This is a reference to a symbol defined by a dynamic object which
1176 is not a function. */
1178 /* If we are creating a shared library, we must presume that the
1179 only references to the symbol are via the global offset table.
1180 For such cases we need not do anything here; the relocations will
1181 be handled correctly by relocate_section. */
1185 /* If there are no references to this symbol that do not use the
1186 GOT, we don't need to generate a copy reloc. */
1187 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
1190 /* If -z nocopyreloc was given, we won't generate them either. */
1191 if (info->nocopyreloc)
1193 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1197 if (ELIMINATE_COPY_RELOCS)
1199 struct elf64_x86_64_link_hash_entry * eh;
1200 struct elf64_x86_64_dyn_relocs *p;
1202 eh = (struct elf64_x86_64_link_hash_entry *) h;
1203 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1205 s = p->sec->output_section;
1206 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1210 /* If we didn't find any dynamic relocs in read-only sections, then
1211 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1214 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1219 /* We must allocate the symbol in our .dynbss section, which will
1220 become part of the .bss section of the executable. There will be
1221 an entry for this symbol in the .dynsym section. The dynamic
1222 object will contain position independent code, so all references
1223 from the dynamic object to this symbol will go through the global
1224 offset table. The dynamic linker will use the .dynsym entry to
1225 determine the address it must put in the global offset table, so
1226 both the dynamic object and the regular object will refer to the
1227 same memory location for the variable. */
1229 htab = elf64_x86_64_hash_table (info);
1231 /* We must generate a R_X86_64_COPY reloc to tell the dynamic linker
1232 to copy the initial value out of the dynamic object and into the
1233 runtime process image. */
1234 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1236 htab->srelbss->_raw_size += sizeof (Elf64_External_Rela);
1237 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
1240 /* We need to figure out the alignment required for this symbol. I
1241 have no idea how ELF linkers handle this. 16-bytes is the size
1242 of the largest type that requires hard alignment -- long double. */
1243 /* FIXME: This is VERY ugly. Should be fixed for all architectures using
1245 power_of_two = bfd_log2 (h->size);
1246 if (power_of_two > 4)
1249 /* Apply the required alignment. */
1251 s->_raw_size = BFD_ALIGN (s->_raw_size, (bfd_size_type) (1 << power_of_two));
1252 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1254 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
1258 /* Define the symbol as being at this point in the section. */
1259 h->root.u.def.section = s;
1260 h->root.u.def.value = s->_raw_size;
1262 /* Increment the section size to make room for the symbol. */
1263 s->_raw_size += h->size;
1268 /* This is the condition under which elf64_x86_64_finish_dynamic_symbol
1269 will be called from elflink.h. If elflink.h doesn't call our
1270 finish_dynamic_symbol routine, we'll need to do something about
1271 initializing any .plt and .got entries in elf64_x86_64_relocate_section. */
1272 #define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, SHARED, H) \
1275 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1276 && ((H)->dynindx != -1 \
1277 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1279 /* Allocate space in .plt, .got and associated reloc sections for
1283 allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1285 struct bfd_link_info *info;
1286 struct elf64_x86_64_link_hash_table *htab;
1287 struct elf64_x86_64_link_hash_entry *eh;
1288 struct elf64_x86_64_dyn_relocs *p;
1290 if (h->root.type == bfd_link_hash_indirect)
1293 if (h->root.type == bfd_link_hash_warning)
1294 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1296 info = (struct bfd_link_info *) inf;
1297 htab = elf64_x86_64_hash_table (info);
1299 if (htab->elf.dynamic_sections_created
1300 && h->plt.refcount > 0)
1302 /* Make sure this symbol is output as a dynamic symbol.
1303 Undefined weak syms won't yet be marked as dynamic. */
1304 if (h->dynindx == -1
1305 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
1307 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
1312 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1314 asection *s = htab->splt;
1316 /* If this is the first .plt entry, make room for the special
1318 if (s->_raw_size == 0)
1319 s->_raw_size += PLT_ENTRY_SIZE;
1321 h->plt.offset = s->_raw_size;
1323 /* If this symbol is not defined in a regular file, and we are
1324 not generating a shared library, then set the symbol to this
1325 location in the .plt. This is required to make function
1326 pointers compare as equal between the normal executable and
1327 the shared library. */
1329 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1331 h->root.u.def.section = s;
1332 h->root.u.def.value = h->plt.offset;
1335 /* Make room for this entry. */
1336 s->_raw_size += PLT_ENTRY_SIZE;
1338 /* We also need to make an entry in the .got.plt section, which
1339 will be placed in the .got section by the linker script. */
1340 htab->sgotplt->_raw_size += GOT_ENTRY_SIZE;
1342 /* We also need to make an entry in the .rela.plt section. */
1343 htab->srelplt->_raw_size += sizeof (Elf64_External_Rela);
1347 h->plt.offset = (bfd_vma) -1;
1348 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1353 h->plt.offset = (bfd_vma) -1;
1354 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1357 /* If R_X86_64_GOTTPOFF symbol is now local to the binary,
1358 make it a R_X86_64_TPOFF32 requiring no GOT entry. */
1359 if (h->got.refcount > 0
1362 && elf64_x86_64_hash_entry (h)->tls_type == GOT_TLS_IE)
1363 h->got.offset = (bfd_vma) -1;
1364 else if (h->got.refcount > 0)
1368 int tls_type = elf64_x86_64_hash_entry (h)->tls_type;
1370 /* Make sure this symbol is output as a dynamic symbol.
1371 Undefined weak syms won't yet be marked as dynamic. */
1372 if (h->dynindx == -1
1373 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
1375 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
1380 h->got.offset = s->_raw_size;
1381 s->_raw_size += GOT_ENTRY_SIZE;
1382 /* R_X86_64_TLSGD needs 2 consecutive GOT slots. */
1383 if (tls_type == GOT_TLS_GD)
1384 s->_raw_size += GOT_ENTRY_SIZE;
1385 dyn = htab->elf.dynamic_sections_created;
1386 /* R_X86_64_TLSGD needs one dynamic relocation if local symbol
1388 R_X86_64_GOTTPOFF needs one dynamic relocation. */
1389 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1390 || tls_type == GOT_TLS_IE)
1391 htab->srelgot->_raw_size += sizeof (Elf64_External_Rela);
1392 else if (tls_type == GOT_TLS_GD)
1393 htab->srelgot->_raw_size += 2 * sizeof (Elf64_External_Rela);
1394 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1395 || h->root.type != bfd_link_hash_undefweak)
1397 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1398 htab->srelgot->_raw_size += sizeof (Elf64_External_Rela);
1401 h->got.offset = (bfd_vma) -1;
1403 eh = (struct elf64_x86_64_link_hash_entry *) h;
1404 if (eh->dyn_relocs == NULL)
1407 /* In the shared -Bsymbolic case, discard space allocated for
1408 dynamic pc-relative relocs against symbols which turn out to be
1409 defined in regular objects. For the normal shared case, discard
1410 space for pc-relative relocs that have become local due to symbol
1411 visibility changes. */
1415 /* Relocs that use pc_count are those that appear on a call
1416 insn, or certain REL relocs that can generated via assembly.
1417 We want calls to protected symbols to resolve directly to the
1418 function rather than going via the plt. If people want
1419 function pointer comparisons to work as expected then they
1420 should avoid writing weird assembly. */
1421 if (SYMBOL_CALLS_LOCAL (info, h))
1423 struct elf64_x86_64_dyn_relocs **pp;
1425 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1427 p->count -= p->pc_count;
1436 /* Also discard relocs on undefined weak syms with non-default
1438 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1439 && h->root.type == bfd_link_hash_undefweak)
1440 eh->dyn_relocs = NULL;
1442 else if (ELIMINATE_COPY_RELOCS)
1444 /* For the non-shared case, discard space for relocs against
1445 symbols which turn out to need copy relocs or are not
1448 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
1449 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
1450 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1451 || (htab->elf.dynamic_sections_created
1452 && (h->root.type == bfd_link_hash_undefweak
1453 || h->root.type == bfd_link_hash_undefined))))
1455 /* Make sure this symbol is output as a dynamic symbol.
1456 Undefined weak syms won't yet be marked as dynamic. */
1457 if (h->dynindx == -1
1458 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
1460 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
1464 /* If that succeeded, we know we'll be keeping all the
1466 if (h->dynindx != -1)
1470 eh->dyn_relocs = NULL;
1475 /* Finally, allocate space. */
1476 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1478 asection *sreloc = elf_section_data (p->sec)->sreloc;
1479 sreloc->_raw_size += p->count * sizeof (Elf64_External_Rela);
1485 /* Find any dynamic relocs that apply to read-only sections. */
1488 readonly_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1490 struct elf64_x86_64_link_hash_entry *eh;
1491 struct elf64_x86_64_dyn_relocs *p;
1493 if (h->root.type == bfd_link_hash_warning)
1494 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1496 eh = (struct elf64_x86_64_link_hash_entry *) h;
1497 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1499 asection *s = p->sec->output_section;
1501 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1503 struct bfd_link_info *info = (struct bfd_link_info *) inf;
1505 info->flags |= DF_TEXTREL;
1507 /* Not an error, just cut short the traversal. */
1514 /* Set the sizes of the dynamic sections. */
1517 elf64_x86_64_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1518 struct bfd_link_info *info)
1520 struct elf64_x86_64_link_hash_table *htab;
1526 htab = elf64_x86_64_hash_table (info);
1527 dynobj = htab->elf.dynobj;
1531 if (htab->elf.dynamic_sections_created)
1533 /* Set the contents of the .interp section to the interpreter. */
1534 if (info->executable)
1536 s = bfd_get_section_by_name (dynobj, ".interp");
1539 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
1540 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1544 /* Set up .got offsets for local syms, and space for local dynamic
1546 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1548 bfd_signed_vma *local_got;
1549 bfd_signed_vma *end_local_got;
1550 char *local_tls_type;
1551 bfd_size_type locsymcount;
1552 Elf_Internal_Shdr *symtab_hdr;
1555 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
1558 for (s = ibfd->sections; s != NULL; s = s->next)
1560 struct elf64_x86_64_dyn_relocs *p;
1562 for (p = *((struct elf64_x86_64_dyn_relocs **)
1563 &elf_section_data (s)->local_dynrel);
1567 if (!bfd_is_abs_section (p->sec)
1568 && bfd_is_abs_section (p->sec->output_section))
1570 /* Input section has been discarded, either because
1571 it is a copy of a linkonce section or due to
1572 linker script /DISCARD/, so we'll be discarding
1575 else if (p->count != 0)
1577 srel = elf_section_data (p->sec)->sreloc;
1578 srel->_raw_size += p->count * sizeof (Elf64_External_Rela);
1579 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1580 info->flags |= DF_TEXTREL;
1586 local_got = elf_local_got_refcounts (ibfd);
1590 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
1591 locsymcount = symtab_hdr->sh_info;
1592 end_local_got = local_got + locsymcount;
1593 local_tls_type = elf64_x86_64_local_got_tls_type (ibfd);
1595 srel = htab->srelgot;
1596 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1600 *local_got = s->_raw_size;
1601 s->_raw_size += GOT_ENTRY_SIZE;
1602 if (*local_tls_type == GOT_TLS_GD)
1603 s->_raw_size += GOT_ENTRY_SIZE;
1605 || *local_tls_type == GOT_TLS_GD
1606 || *local_tls_type == GOT_TLS_IE)
1607 srel->_raw_size += sizeof (Elf64_External_Rela);
1610 *local_got = (bfd_vma) -1;
1614 if (htab->tls_ld_got.refcount > 0)
1616 /* Allocate 2 got entries and 1 dynamic reloc for R_X86_64_TLSLD
1618 htab->tls_ld_got.offset = htab->sgot->_raw_size;
1619 htab->sgot->_raw_size += 2 * GOT_ENTRY_SIZE;
1620 htab->srelgot->_raw_size += sizeof (Elf64_External_Rela);
1623 htab->tls_ld_got.offset = -1;
1625 /* Allocate global sym .plt and .got entries, and space for global
1626 sym dynamic relocs. */
1627 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
1629 /* We now have determined the sizes of the various dynamic sections.
1630 Allocate memory for them. */
1632 for (s = dynobj->sections; s != NULL; s = s->next)
1634 if ((s->flags & SEC_LINKER_CREATED) == 0)
1639 || s == htab->sgotplt)
1641 /* Strip this section if we don't need it; see the
1644 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
1646 if (s->_raw_size != 0 && s != htab->srelplt)
1649 /* We use the reloc_count field as a counter if we need
1650 to copy relocs into the output file. */
1655 /* It's not one of our sections, so don't allocate space. */
1659 if (s->_raw_size == 0)
1661 /* If we don't need this section, strip it from the
1662 output file. This is mostly to handle .rela.bss and
1663 .rela.plt. We must create both sections in
1664 create_dynamic_sections, because they must be created
1665 before the linker maps input sections to output
1666 sections. The linker does that before
1667 adjust_dynamic_symbol is called, and it is that
1668 function which decides whether anything needs to go
1669 into these sections. */
1671 _bfd_strip_section_from_output (info, s);
1675 /* Allocate memory for the section contents. We use bfd_zalloc
1676 here in case unused entries are not reclaimed before the
1677 section's contents are written out. This should not happen,
1678 but this way if it does, we get a R_X86_64_NONE reloc instead
1680 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
1681 if (s->contents == NULL)
1685 if (htab->elf.dynamic_sections_created)
1687 /* Add some entries to the .dynamic section. We fill in the
1688 values later, in elf64_x86_64_finish_dynamic_sections, but we
1689 must add the entries now so that we get the correct size for
1690 the .dynamic section. The DT_DEBUG entry is filled in by the
1691 dynamic linker and used by the debugger. */
1692 #define add_dynamic_entry(TAG, VAL) \
1693 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
1695 if (info->executable)
1697 if (!add_dynamic_entry (DT_DEBUG, 0))
1701 if (htab->splt->_raw_size != 0)
1703 if (!add_dynamic_entry (DT_PLTGOT, 0)
1704 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1705 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1706 || !add_dynamic_entry (DT_JMPREL, 0))
1712 if (!add_dynamic_entry (DT_RELA, 0)
1713 || !add_dynamic_entry (DT_RELASZ, 0)
1714 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
1717 /* If any dynamic relocs apply to a read-only section,
1718 then we need a DT_TEXTREL entry. */
1719 if ((info->flags & DF_TEXTREL) == 0)
1720 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
1723 if ((info->flags & DF_TEXTREL) != 0)
1725 if (!add_dynamic_entry (DT_TEXTREL, 0))
1730 #undef add_dynamic_entry
1735 /* Return the base VMA address which should be subtracted from real addresses
1736 when resolving @dtpoff relocation.
1737 This is PT_TLS segment p_vaddr. */
1740 dtpoff_base (struct bfd_link_info *info)
1742 /* If tls_sec is NULL, we should have signalled an error already. */
1743 if (elf_hash_table (info)->tls_sec == NULL)
1745 return elf_hash_table (info)->tls_sec->vma;
1748 /* Return the relocation value for @tpoff relocation
1749 if STT_TLS virtual address is ADDRESS. */
1752 tpoff (struct bfd_link_info *info, bfd_vma address)
1754 struct elf_link_hash_table *htab = elf_hash_table (info);
1756 /* If tls_segment is NULL, we should have signalled an error already. */
1757 if (htab->tls_sec == NULL)
1759 return address - htab->tls_size - htab->tls_sec->vma;
1762 /* Relocate an x86_64 ELF section. */
1765 elf64_x86_64_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
1766 bfd *input_bfd, asection *input_section,
1767 bfd_byte *contents, Elf_Internal_Rela *relocs,
1768 Elf_Internal_Sym *local_syms,
1769 asection **local_sections)
1771 struct elf64_x86_64_link_hash_table *htab;
1772 Elf_Internal_Shdr *symtab_hdr;
1773 struct elf_link_hash_entry **sym_hashes;
1774 bfd_vma *local_got_offsets;
1775 Elf_Internal_Rela *rel;
1776 Elf_Internal_Rela *relend;
1778 if (info->relocatable)
1781 htab = elf64_x86_64_hash_table (info);
1782 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1783 sym_hashes = elf_sym_hashes (input_bfd);
1784 local_got_offsets = elf_local_got_offsets (input_bfd);
1787 relend = relocs + input_section->reloc_count;
1788 for (; rel < relend; rel++)
1790 unsigned int r_type;
1791 reloc_howto_type *howto;
1792 unsigned long r_symndx;
1793 struct elf_link_hash_entry *h;
1794 Elf_Internal_Sym *sym;
1798 bfd_boolean unresolved_reloc;
1799 bfd_reloc_status_type r;
1802 r_type = ELF64_R_TYPE (rel->r_info);
1803 if (r_type == (int) R_X86_64_GNU_VTINHERIT
1804 || r_type == (int) R_X86_64_GNU_VTENTRY)
1807 if (r_type >= R_X86_64_max)
1809 bfd_set_error (bfd_error_bad_value);
1813 howto = x86_64_elf_howto_table + r_type;
1814 r_symndx = ELF64_R_SYM (rel->r_info);
1818 unresolved_reloc = FALSE;
1819 if (r_symndx < symtab_hdr->sh_info)
1821 sym = local_syms + r_symndx;
1822 sec = local_sections[r_symndx];
1824 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
1830 RELOC_FOR_GLOBAL_SYMBOL (h, sym_hashes, r_symndx,
1831 symtab_hdr, relocation, sec,
1832 unresolved_reloc, info,
1835 /* When generating a shared object, the relocations handled here are
1836 copied into the output file to be resolved at run time. */
1839 case R_X86_64_GOT32:
1840 /* Relocation is to the entry for this symbol in the global
1842 case R_X86_64_GOTPCREL:
1843 /* Use global offset table as symbol value. */
1844 if (htab->sgot == NULL)
1851 off = h->got.offset;
1852 dyn = htab->elf.dynamic_sections_created;
1854 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
1856 && SYMBOL_REFERENCES_LOCAL (info, h))
1857 || (ELF_ST_VISIBILITY (h->other)
1858 && h->root.type == bfd_link_hash_undefweak))
1860 /* This is actually a static link, or it is a -Bsymbolic
1861 link and the symbol is defined locally, or the symbol
1862 was forced to be local because of a version file. We
1863 must initialize this entry in the global offset table.
1864 Since the offset must always be a multiple of 8, we
1865 use the least significant bit to record whether we
1866 have initialized it already.
1868 When doing a dynamic link, we create a .rela.got
1869 relocation entry to initialize the value. This is
1870 done in the finish_dynamic_symbol routine. */
1875 bfd_put_64 (output_bfd, relocation,
1876 htab->sgot->contents + off);
1881 unresolved_reloc = FALSE;
1885 if (local_got_offsets == NULL)
1888 off = local_got_offsets[r_symndx];
1890 /* The offset must always be a multiple of 8. We use
1891 the least significant bit to record whether we have
1892 already generated the necessary reloc. */
1897 bfd_put_64 (output_bfd, relocation,
1898 htab->sgot->contents + off);
1903 Elf_Internal_Rela outrel;
1906 /* We need to generate a R_X86_64_RELATIVE reloc
1907 for the dynamic linker. */
1912 outrel.r_offset = (htab->sgot->output_section->vma
1913 + htab->sgot->output_offset
1915 outrel.r_info = ELF64_R_INFO (0, R_X86_64_RELATIVE);
1916 outrel.r_addend = relocation;
1918 loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
1919 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
1922 local_got_offsets[r_symndx] |= 1;
1926 if (off >= (bfd_vma) -2)
1929 relocation = htab->sgot->output_offset + off;
1930 if (r_type == R_X86_64_GOTPCREL)
1931 relocation += htab->sgot->output_section->vma;
1935 case R_X86_64_PLT32:
1936 /* Relocation is to the entry for this symbol in the
1937 procedure linkage table. */
1939 /* Resolve a PLT32 reloc against a local symbol directly,
1940 without using the procedure linkage table. */
1944 if (h->plt.offset == (bfd_vma) -1
1945 || htab->splt == NULL)
1947 /* We didn't make a PLT entry for this symbol. This
1948 happens when statically linking PIC code, or when
1949 using -Bsymbolic. */
1953 relocation = (htab->splt->output_section->vma
1954 + htab->splt->output_offset
1956 unresolved_reloc = FALSE;
1966 /* FIXME: The ABI says the linker should make sure the value is
1967 the same when it's zeroextended to 64 bit. */
1969 /* r_symndx will be zero only for relocs against symbols
1970 from removed linkonce sections, or sections discarded by
1973 || (input_section->flags & SEC_ALLOC) == 0)
1978 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1979 || h->root.type != bfd_link_hash_undefweak)
1980 && ((r_type != R_X86_64_PC8
1981 && r_type != R_X86_64_PC16
1982 && r_type != R_X86_64_PC32)
1983 || !SYMBOL_CALLS_LOCAL (info, h)))
1984 || (ELIMINATE_COPY_RELOCS
1988 && (h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
1989 && (((h->elf_link_hash_flags
1990 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
1991 && (h->elf_link_hash_flags
1992 & ELF_LINK_HASH_DEF_REGULAR) == 0)
1993 || h->root.type == bfd_link_hash_undefweak
1994 || h->root.type == bfd_link_hash_undefined)))
1996 Elf_Internal_Rela outrel;
1998 bfd_boolean skip, relocate;
2001 /* When generating a shared object, these relocations
2002 are copied into the output file to be resolved at run
2008 _bfd_elf_section_offset (output_bfd, info, input_section,
2010 if (outrel.r_offset == (bfd_vma) -1)
2012 else if (outrel.r_offset == (bfd_vma) -2)
2013 skip = TRUE, relocate = TRUE;
2015 outrel.r_offset += (input_section->output_section->vma
2016 + input_section->output_offset);
2019 memset (&outrel, 0, sizeof outrel);
2021 /* h->dynindx may be -1 if this symbol was marked to
2025 && (r_type == R_X86_64_PC8
2026 || r_type == R_X86_64_PC16
2027 || r_type == R_X86_64_PC32
2030 || (h->elf_link_hash_flags
2031 & ELF_LINK_HASH_DEF_REGULAR) == 0))
2033 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2034 outrel.r_addend = rel->r_addend;
2038 /* This symbol is local, or marked to become local. */
2039 if (r_type == R_X86_64_64)
2042 outrel.r_info = ELF64_R_INFO (0, R_X86_64_RELATIVE);
2043 outrel.r_addend = relocation + rel->r_addend;
2050 sec = local_sections[r_symndx];
2053 BFD_ASSERT (h->root.type == bfd_link_hash_defined
2055 == bfd_link_hash_defweak));
2056 sec = h->root.u.def.section;
2058 if (sec != NULL && bfd_is_abs_section (sec))
2060 else if (sec == NULL || sec->owner == NULL)
2062 bfd_set_error (bfd_error_bad_value);
2069 osec = sec->output_section;
2070 sindx = elf_section_data (osec)->dynindx;
2071 BFD_ASSERT (sindx > 0);
2074 outrel.r_info = ELF64_R_INFO (sindx, r_type);
2075 outrel.r_addend = relocation + rel->r_addend;
2079 sreloc = elf_section_data (input_section)->sreloc;
2083 loc = sreloc->contents;
2084 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2085 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2087 /* If this reloc is against an external symbol, we do
2088 not want to fiddle with the addend. Otherwise, we
2089 need to include the symbol value so that it becomes
2090 an addend for the dynamic reloc. */
2097 case R_X86_64_TLSGD:
2098 case R_X86_64_GOTTPOFF:
2099 r_type = elf64_x86_64_tls_transition (info, r_type, h == NULL);
2100 tls_type = GOT_UNKNOWN;
2101 if (h == NULL && local_got_offsets)
2102 tls_type = elf64_x86_64_local_got_tls_type (input_bfd) [r_symndx];
2105 tls_type = elf64_x86_64_hash_entry (h)->tls_type;
2106 if (!info->shared && h->dynindx == -1 && tls_type == GOT_TLS_IE)
2107 r_type = R_X86_64_TPOFF32;
2109 if (r_type == R_X86_64_TLSGD)
2111 if (tls_type == GOT_TLS_IE)
2112 r_type = R_X86_64_GOTTPOFF;
2115 if (r_type == R_X86_64_TPOFF32)
2117 BFD_ASSERT (! unresolved_reloc);
2118 if (ELF64_R_TYPE (rel->r_info) == R_X86_64_TLSGD)
2121 static unsigned char tlsgd[8]
2122 = { 0x66, 0x48, 0x8d, 0x3d, 0x66, 0x66, 0x48, 0xe8 };
2124 /* GD->LE transition.
2125 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
2126 .word 0x6666; rex64; call __tls_get_addr@plt
2129 leaq foo@tpoff(%rax), %rax */
2130 BFD_ASSERT (rel->r_offset >= 4);
2131 for (i = 0; i < 4; i++)
2132 BFD_ASSERT (bfd_get_8 (input_bfd,
2133 contents + rel->r_offset - 4 + i)
2135 BFD_ASSERT (rel->r_offset + 12 <= input_section->_raw_size);
2136 for (i = 0; i < 4; i++)
2137 BFD_ASSERT (bfd_get_8 (input_bfd,
2138 contents + rel->r_offset + 4 + i)
2140 BFD_ASSERT (rel + 1 < relend);
2141 BFD_ASSERT (ELF64_R_TYPE (rel[1].r_info) == R_X86_64_PLT32);
2142 memcpy (contents + rel->r_offset - 4,
2143 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x8d\x80\0\0\0",
2145 bfd_put_32 (output_bfd, tpoff (info, relocation),
2146 contents + rel->r_offset + 8);
2147 /* Skip R_X86_64_PLT32. */
2153 unsigned int val, type, reg;
2155 /* IE->LE transition:
2156 Originally it can be one of:
2157 movq foo@gottpoff(%rip), %reg
2158 addq foo@gottpoff(%rip), %reg
2161 leaq foo(%reg), %reg
2163 BFD_ASSERT (rel->r_offset >= 3);
2164 val = bfd_get_8 (input_bfd, contents + rel->r_offset - 3);
2165 BFD_ASSERT (val == 0x48 || val == 0x4c);
2166 type = bfd_get_8 (input_bfd, contents + rel->r_offset - 2);
2167 BFD_ASSERT (type == 0x8b || type == 0x03);
2168 reg = bfd_get_8 (input_bfd, contents + rel->r_offset - 1);
2169 BFD_ASSERT ((reg & 0xc7) == 5);
2171 BFD_ASSERT (rel->r_offset + 4 <= input_section->_raw_size);
2176 bfd_put_8 (output_bfd, 0x49,
2177 contents + rel->r_offset - 3);
2178 bfd_put_8 (output_bfd, 0xc7,
2179 contents + rel->r_offset - 2);
2180 bfd_put_8 (output_bfd, 0xc0 | reg,
2181 contents + rel->r_offset - 1);
2185 /* addq -> addq - addressing with %rsp/%r12 is
2188 bfd_put_8 (output_bfd, 0x49,
2189 contents + rel->r_offset - 3);
2190 bfd_put_8 (output_bfd, 0x81,
2191 contents + rel->r_offset - 2);
2192 bfd_put_8 (output_bfd, 0xc0 | reg,
2193 contents + rel->r_offset - 1);
2199 bfd_put_8 (output_bfd, 0x4d,
2200 contents + rel->r_offset - 3);
2201 bfd_put_8 (output_bfd, 0x8d,
2202 contents + rel->r_offset - 2);
2203 bfd_put_8 (output_bfd, 0x80 | reg | (reg << 3),
2204 contents + rel->r_offset - 1);
2206 bfd_put_32 (output_bfd, tpoff (info, relocation),
2207 contents + rel->r_offset);
2212 if (htab->sgot == NULL)
2216 off = h->got.offset;
2219 if (local_got_offsets == NULL)
2222 off = local_got_offsets[r_symndx];
2229 Elf_Internal_Rela outrel;
2233 if (htab->srelgot == NULL)
2236 outrel.r_offset = (htab->sgot->output_section->vma
2237 + htab->sgot->output_offset + off);
2239 indx = h && h->dynindx != -1 ? h->dynindx : 0;
2240 if (r_type == R_X86_64_TLSGD)
2241 dr_type = R_X86_64_DTPMOD64;
2243 dr_type = R_X86_64_TPOFF64;
2245 bfd_put_64 (output_bfd, 0, htab->sgot->contents + off);
2246 outrel.r_addend = 0;
2247 if (dr_type == R_X86_64_TPOFF64 && indx == 0)
2248 outrel.r_addend = relocation - dtpoff_base (info);
2249 outrel.r_info = ELF64_R_INFO (indx, dr_type);
2251 loc = htab->srelgot->contents;
2252 loc += htab->srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
2253 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2255 if (r_type == R_X86_64_TLSGD)
2259 BFD_ASSERT (! unresolved_reloc);
2260 bfd_put_64 (output_bfd,
2261 relocation - dtpoff_base (info),
2262 htab->sgot->contents + off + GOT_ENTRY_SIZE);
2266 bfd_put_64 (output_bfd, 0,
2267 htab->sgot->contents + off + GOT_ENTRY_SIZE);
2268 outrel.r_info = ELF64_R_INFO (indx,
2270 outrel.r_offset += GOT_ENTRY_SIZE;
2271 htab->srelgot->reloc_count++;
2272 loc += sizeof (Elf64_External_Rela);
2273 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2280 local_got_offsets[r_symndx] |= 1;
2283 if (off >= (bfd_vma) -2)
2285 if (r_type == ELF64_R_TYPE (rel->r_info))
2287 relocation = htab->sgot->output_section->vma
2288 + htab->sgot->output_offset + off;
2289 unresolved_reloc = FALSE;
2294 static unsigned char tlsgd[8]
2295 = { 0x66, 0x48, 0x8d, 0x3d, 0x66, 0x66, 0x48, 0xe8 };
2297 /* GD->IE transition.
2298 .byte 0x66; leaq foo@tlsgd(%rip), %rdi
2299 .word 0x6666; rex64; call __tls_get_addr@plt
2302 addq foo@gottpoff(%rip), %rax */
2303 BFD_ASSERT (rel->r_offset >= 4);
2304 for (i = 0; i < 4; i++)
2305 BFD_ASSERT (bfd_get_8 (input_bfd,
2306 contents + rel->r_offset - 4 + i)
2308 BFD_ASSERT (rel->r_offset + 12 <= input_section->_raw_size);
2309 for (i = 0; i < 4; i++)
2310 BFD_ASSERT (bfd_get_8 (input_bfd,
2311 contents + rel->r_offset + 4 + i)
2313 BFD_ASSERT (rel + 1 < relend);
2314 BFD_ASSERT (ELF64_R_TYPE (rel[1].r_info) == R_X86_64_PLT32);
2315 memcpy (contents + rel->r_offset - 4,
2316 "\x64\x48\x8b\x04\x25\0\0\0\0\x48\x03\x05\0\0\0",
2319 relocation = (htab->sgot->output_section->vma
2320 + htab->sgot->output_offset + off
2322 - input_section->output_section->vma
2323 - input_section->output_offset
2325 bfd_put_32 (output_bfd, relocation,
2326 contents + rel->r_offset + 8);
2327 /* Skip R_X86_64_PLT32. */
2333 case R_X86_64_TLSLD:
2336 /* LD->LE transition:
2338 leaq foo@tlsld(%rip), %rdi; call __tls_get_addr@plt.
2340 .word 0x6666; .byte 0x66; movl %fs:0, %rax. */
2341 BFD_ASSERT (rel->r_offset >= 3);
2342 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset - 3)
2344 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset - 2)
2346 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset - 1)
2348 BFD_ASSERT (rel->r_offset + 9 <= input_section->_raw_size);
2349 BFD_ASSERT (bfd_get_8 (input_bfd, contents + rel->r_offset + 4)
2351 BFD_ASSERT (rel + 1 < relend);
2352 BFD_ASSERT (ELF64_R_TYPE (rel[1].r_info) == R_X86_64_PLT32);
2353 memcpy (contents + rel->r_offset - 3,
2354 "\x66\x66\x66\x64\x48\x8b\x04\x25\0\0\0", 12);
2355 /* Skip R_X86_64_PLT32. */
2360 if (htab->sgot == NULL)
2363 off = htab->tls_ld_got.offset;
2368 Elf_Internal_Rela outrel;
2371 if (htab->srelgot == NULL)
2374 outrel.r_offset = (htab->sgot->output_section->vma
2375 + htab->sgot->output_offset + off);
2377 bfd_put_64 (output_bfd, 0,
2378 htab->sgot->contents + off);
2379 bfd_put_64 (output_bfd, 0,
2380 htab->sgot->contents + off + GOT_ENTRY_SIZE);
2381 outrel.r_info = ELF64_R_INFO (0, R_X86_64_DTPMOD64);
2382 outrel.r_addend = 0;
2383 loc = htab->srelgot->contents;
2384 loc += htab->srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
2385 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2386 htab->tls_ld_got.offset |= 1;
2388 relocation = htab->sgot->output_section->vma
2389 + htab->sgot->output_offset + off;
2390 unresolved_reloc = FALSE;
2393 case R_X86_64_DTPOFF32:
2394 if (info->shared || (input_section->flags & SEC_CODE) == 0)
2395 relocation -= dtpoff_base (info);
2397 relocation = tpoff (info, relocation);
2400 case R_X86_64_TPOFF32:
2401 BFD_ASSERT (! info->shared);
2402 relocation = tpoff (info, relocation);
2409 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
2410 because such sections are not SEC_ALLOC and thus ld.so will
2411 not process them. */
2412 if (unresolved_reloc
2413 && !((input_section->flags & SEC_DEBUGGING) != 0
2414 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
2415 (*_bfd_error_handler)
2416 (_("%s(%s+0x%lx): unresolvable relocation against symbol `%s'"),
2417 bfd_archive_filename (input_bfd),
2418 bfd_get_section_name (input_bfd, input_section),
2419 (long) rel->r_offset,
2420 h->root.root.string);
2422 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
2423 contents, rel->r_offset,
2424 relocation, rel->r_addend);
2426 if (r != bfd_reloc_ok)
2431 name = h->root.root.string;
2434 name = bfd_elf_string_from_elf_section (input_bfd,
2435 symtab_hdr->sh_link,
2440 name = bfd_section_name (input_bfd, sec);
2443 if (r == bfd_reloc_overflow)
2446 if (! ((*info->callbacks->reloc_overflow)
2447 (info, name, howto->name, (bfd_vma) 0,
2448 input_bfd, input_section, rel->r_offset)))
2453 (*_bfd_error_handler)
2454 (_("%s(%s+0x%lx): reloc against `%s': error %d"),
2455 bfd_archive_filename (input_bfd),
2456 bfd_get_section_name (input_bfd, input_section),
2457 (long) rel->r_offset, name, (int) r);
2466 /* Finish up dynamic symbol handling. We set the contents of various
2467 dynamic sections here. */
2470 elf64_x86_64_finish_dynamic_symbol (bfd *output_bfd,
2471 struct bfd_link_info *info,
2472 struct elf_link_hash_entry *h,
2473 Elf_Internal_Sym *sym)
2475 struct elf64_x86_64_link_hash_table *htab;
2477 htab = elf64_x86_64_hash_table (info);
2479 if (h->plt.offset != (bfd_vma) -1)
2483 Elf_Internal_Rela rela;
2486 /* This symbol has an entry in the procedure linkage table. Set
2488 if (h->dynindx == -1
2489 || htab->splt == NULL
2490 || htab->sgotplt == NULL
2491 || htab->srelplt == NULL)
2494 /* Get the index in the procedure linkage table which
2495 corresponds to this symbol. This is the index of this symbol
2496 in all the symbols for which we are making plt entries. The
2497 first entry in the procedure linkage table is reserved. */
2498 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
2500 /* Get the offset into the .got table of the entry that
2501 corresponds to this function. Each .got entry is GOT_ENTRY_SIZE
2502 bytes. The first three are reserved for the dynamic linker. */
2503 got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
2505 /* Fill in the entry in the procedure linkage table. */
2506 memcpy (htab->splt->contents + h->plt.offset, elf64_x86_64_plt_entry,
2509 /* Insert the relocation positions of the plt section. The magic
2510 numbers at the end of the statements are the positions of the
2511 relocations in the plt section. */
2512 /* Put offset for jmp *name@GOTPCREL(%rip), since the
2513 instruction uses 6 bytes, subtract this value. */
2514 bfd_put_32 (output_bfd,
2515 (htab->sgotplt->output_section->vma
2516 + htab->sgotplt->output_offset
2518 - htab->splt->output_section->vma
2519 - htab->splt->output_offset
2522 htab->splt->contents + h->plt.offset + 2);
2523 /* Put relocation index. */
2524 bfd_put_32 (output_bfd, plt_index,
2525 htab->splt->contents + h->plt.offset + 7);
2526 /* Put offset for jmp .PLT0. */
2527 bfd_put_32 (output_bfd, - (h->plt.offset + PLT_ENTRY_SIZE),
2528 htab->splt->contents + h->plt.offset + 12);
2530 /* Fill in the entry in the global offset table, initially this
2531 points to the pushq instruction in the PLT which is at offset 6. */
2532 bfd_put_64 (output_bfd, (htab->splt->output_section->vma
2533 + htab->splt->output_offset
2534 + h->plt.offset + 6),
2535 htab->sgotplt->contents + got_offset);
2537 /* Fill in the entry in the .rela.plt section. */
2538 rela.r_offset = (htab->sgotplt->output_section->vma
2539 + htab->sgotplt->output_offset
2541 rela.r_info = ELF64_R_INFO (h->dynindx, R_X86_64_JUMP_SLOT);
2543 loc = htab->srelplt->contents + plt_index * sizeof (Elf64_External_Rela);
2544 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
2546 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2548 /* Mark the symbol as undefined, rather than as defined in
2549 the .plt section. Leave the value alone. This is a clue
2550 for the dynamic linker, to make function pointer
2551 comparisons work between an application and shared
2553 sym->st_shndx = SHN_UNDEF;
2557 if (h->got.offset != (bfd_vma) -1
2558 && elf64_x86_64_hash_entry (h)->tls_type != GOT_TLS_GD
2559 && elf64_x86_64_hash_entry (h)->tls_type != GOT_TLS_IE)
2561 Elf_Internal_Rela rela;
2564 /* This symbol has an entry in the global offset table. Set it
2566 if (htab->sgot == NULL || htab->srelgot == NULL)
2569 rela.r_offset = (htab->sgot->output_section->vma
2570 + htab->sgot->output_offset
2571 + (h->got.offset &~ (bfd_vma) 1));
2573 /* If this is a static link, or it is a -Bsymbolic link and the
2574 symbol is defined locally or was forced to be local because
2575 of a version file, we just want to emit a RELATIVE reloc.
2576 The entry in the global offset table will already have been
2577 initialized in the relocate_section function. */
2579 && SYMBOL_REFERENCES_LOCAL (info, h))
2581 BFD_ASSERT((h->got.offset & 1) != 0);
2582 rela.r_info = ELF64_R_INFO (0, R_X86_64_RELATIVE);
2583 rela.r_addend = (h->root.u.def.value
2584 + h->root.u.def.section->output_section->vma
2585 + h->root.u.def.section->output_offset);
2589 BFD_ASSERT((h->got.offset & 1) == 0);
2590 bfd_put_64 (output_bfd, (bfd_vma) 0,
2591 htab->sgot->contents + h->got.offset);
2592 rela.r_info = ELF64_R_INFO (h->dynindx, R_X86_64_GLOB_DAT);
2596 loc = htab->srelgot->contents;
2597 loc += htab->srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
2598 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
2601 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
2603 Elf_Internal_Rela rela;
2606 /* This symbol needs a copy reloc. Set it up. */
2608 if (h->dynindx == -1
2609 || (h->root.type != bfd_link_hash_defined
2610 && h->root.type != bfd_link_hash_defweak)
2611 || htab->srelbss == NULL)
2614 rela.r_offset = (h->root.u.def.value
2615 + h->root.u.def.section->output_section->vma
2616 + h->root.u.def.section->output_offset);
2617 rela.r_info = ELF64_R_INFO (h->dynindx, R_X86_64_COPY);
2619 loc = htab->srelbss->contents;
2620 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
2621 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
2624 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2625 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2626 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2627 sym->st_shndx = SHN_ABS;
2632 /* Used to decide how to sort relocs in an optimal manner for the
2633 dynamic linker, before writing them out. */
2635 static enum elf_reloc_type_class
2636 elf64_x86_64_reloc_type_class (const Elf_Internal_Rela *rela)
2638 switch ((int) ELF64_R_TYPE (rela->r_info))
2640 case R_X86_64_RELATIVE:
2641 return reloc_class_relative;
2642 case R_X86_64_JUMP_SLOT:
2643 return reloc_class_plt;
2645 return reloc_class_copy;
2647 return reloc_class_normal;
2651 /* Finish up the dynamic sections. */
2654 elf64_x86_64_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
2656 struct elf64_x86_64_link_hash_table *htab;
2660 htab = elf64_x86_64_hash_table (info);
2661 dynobj = htab->elf.dynobj;
2662 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2664 if (htab->elf.dynamic_sections_created)
2666 Elf64_External_Dyn *dyncon, *dynconend;
2668 if (sdyn == NULL || htab->sgot == NULL)
2671 dyncon = (Elf64_External_Dyn *) sdyn->contents;
2672 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
2673 for (; dyncon < dynconend; dyncon++)
2675 Elf_Internal_Dyn dyn;
2678 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
2686 dyn.d_un.d_ptr = htab->sgot->output_section->vma;
2690 dyn.d_un.d_ptr = htab->srelplt->output_section->vma;
2694 s = htab->srelplt->output_section;
2695 if (s->_cooked_size != 0)
2696 dyn.d_un.d_val = s->_cooked_size;
2698 dyn.d_un.d_val = s->_raw_size;
2702 /* The procedure linkage table relocs (DT_JMPREL) should
2703 not be included in the overall relocs (DT_RELA).
2704 Therefore, we override the DT_RELASZ entry here to
2705 make it not include the JMPREL relocs. Since the
2706 linker script arranges for .rela.plt to follow all
2707 other relocation sections, we don't have to worry
2708 about changing the DT_RELA entry. */
2709 if (htab->srelplt != NULL)
2711 s = htab->srelplt->output_section;
2712 if (s->_cooked_size != 0)
2713 dyn.d_un.d_val -= s->_cooked_size;
2715 dyn.d_un.d_val -= s->_raw_size;
2720 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2723 /* Fill in the special first entry in the procedure linkage table. */
2724 if (htab->splt && htab->splt->_raw_size > 0)
2726 /* Fill in the first entry in the procedure linkage table. */
2727 memcpy (htab->splt->contents, elf64_x86_64_plt0_entry,
2729 /* Add offset for pushq GOT+8(%rip), since the instruction
2730 uses 6 bytes subtract this value. */
2731 bfd_put_32 (output_bfd,
2732 (htab->sgotplt->output_section->vma
2733 + htab->sgotplt->output_offset
2735 - htab->splt->output_section->vma
2736 - htab->splt->output_offset
2738 htab->splt->contents + 2);
2739 /* Add offset for jmp *GOT+16(%rip). The 12 is the offset to
2740 the end of the instruction. */
2741 bfd_put_32 (output_bfd,
2742 (htab->sgotplt->output_section->vma
2743 + htab->sgotplt->output_offset
2745 - htab->splt->output_section->vma
2746 - htab->splt->output_offset
2748 htab->splt->contents + 8);
2750 elf_section_data (htab->splt->output_section)->this_hdr.sh_entsize =
2757 /* Fill in the first three entries in the global offset table. */
2758 if (htab->sgotplt->_raw_size > 0)
2760 /* Set the first entry in the global offset table to the address of
2761 the dynamic section. */
2763 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->sgotplt->contents);
2765 bfd_put_64 (output_bfd,
2766 sdyn->output_section->vma + sdyn->output_offset,
2767 htab->sgotplt->contents);
2768 /* Write GOT[1] and GOT[2], needed for the dynamic linker. */
2769 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->sgotplt->contents + GOT_ENTRY_SIZE);
2770 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->sgotplt->contents + GOT_ENTRY_SIZE*2);
2773 elf_section_data (htab->sgotplt->output_section)->this_hdr.sh_entsize =
2781 #define TARGET_LITTLE_SYM bfd_elf64_x86_64_vec
2782 #define TARGET_LITTLE_NAME "elf64-x86-64"
2783 #define ELF_ARCH bfd_arch_i386
2784 #define ELF_MACHINE_CODE EM_X86_64
2785 #define ELF_MAXPAGESIZE 0x100000
2787 #define elf_backend_can_gc_sections 1
2788 #define elf_backend_can_refcount 1
2789 #define elf_backend_want_got_plt 1
2790 #define elf_backend_plt_readonly 1
2791 #define elf_backend_want_plt_sym 0
2792 #define elf_backend_got_header_size (GOT_ENTRY_SIZE*3)
2793 #define elf_backend_rela_normal 1
2795 #define elf_info_to_howto elf64_x86_64_info_to_howto
2797 #define bfd_elf64_bfd_link_hash_table_create \
2798 elf64_x86_64_link_hash_table_create
2799 #define bfd_elf64_bfd_reloc_type_lookup elf64_x86_64_reloc_type_lookup
2801 #define elf_backend_adjust_dynamic_symbol elf64_x86_64_adjust_dynamic_symbol
2802 #define elf_backend_check_relocs elf64_x86_64_check_relocs
2803 #define elf_backend_copy_indirect_symbol elf64_x86_64_copy_indirect_symbol
2804 #define elf_backend_create_dynamic_sections elf64_x86_64_create_dynamic_sections
2805 #define elf_backend_finish_dynamic_sections elf64_x86_64_finish_dynamic_sections
2806 #define elf_backend_finish_dynamic_symbol elf64_x86_64_finish_dynamic_symbol
2807 #define elf_backend_gc_mark_hook elf64_x86_64_gc_mark_hook
2808 #define elf_backend_gc_sweep_hook elf64_x86_64_gc_sweep_hook
2809 #define elf_backend_grok_prstatus elf64_x86_64_grok_prstatus
2810 #define elf_backend_grok_psinfo elf64_x86_64_grok_psinfo
2811 #define elf_backend_reloc_type_class elf64_x86_64_reloc_type_class
2812 #define elf_backend_relocate_section elf64_x86_64_relocate_section
2813 #define elf_backend_size_dynamic_sections elf64_x86_64_size_dynamic_sections
2814 #define elf_backend_object_p elf64_x86_64_elf_object_p
2815 #define bfd_elf64_mkobject elf64_x86_64_mkobject
2817 #include "elf64-target.h"