*** empty log message ***
[deliverable/binutils-gdb.git] / bfd / elf32-arm.c
CommitLineData
252b5132 1/* 32-bit ELF support for ARM
d1f161ea
NC
2 Copyright 1998, 1999, 2000, 2001, 2002, 2003, 2004
3 Free Software Foundation, Inc.
252b5132
RH
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
7f266840
DJ
21#include "elf/arm.h"
22#include "bfd.h"
23#include "sysdep.h"
24#include "libbfd.h"
25#include "elf-bfd.h"
26
27#ifndef NUM_ELEM
28#define NUM_ELEM(a) (sizeof (a) / (sizeof (a)[0]))
29#endif
30
31#define USE_REL 1
32
33#define elf_info_to_howto 0
34#define elf_info_to_howto_rel elf32_arm_info_to_howto
35
36#define ARM_ELF_ABI_VERSION 0
37#define ARM_ELF_OS_ABI_VERSION ELFOSABI_ARM
38
39static reloc_howto_type * elf32_arm_reloc_type_lookup
40 PARAMS ((bfd * abfd, bfd_reloc_code_real_type code));
41static bfd_boolean elf32_arm_nabi_grok_prstatus
42 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
43static bfd_boolean elf32_arm_nabi_grok_psinfo
44 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
45
46/* Note: code such as elf32_arm_reloc_type_lookup expect to use e.g.
47 R_ARM_PC24 as an index into this, and find the R_ARM_PC24 HOWTO
48 in that slot. */
49
50static reloc_howto_type elf32_arm_howto_table[] =
51{
52 /* No relocation */
53 HOWTO (R_ARM_NONE, /* type */
54 0, /* rightshift */
55 0, /* size (0 = byte, 1 = short, 2 = long) */
56 0, /* bitsize */
57 FALSE, /* pc_relative */
58 0, /* bitpos */
59 complain_overflow_dont,/* complain_on_overflow */
60 bfd_elf_generic_reloc, /* special_function */
61 "R_ARM_NONE", /* name */
62 FALSE, /* partial_inplace */
63 0, /* src_mask */
64 0, /* dst_mask */
65 FALSE), /* pcrel_offset */
66
67 HOWTO (R_ARM_PC24, /* type */
68 2, /* rightshift */
69 2, /* size (0 = byte, 1 = short, 2 = long) */
70 24, /* bitsize */
71 TRUE, /* pc_relative */
72 0, /* bitpos */
73 complain_overflow_signed,/* complain_on_overflow */
74 bfd_elf_generic_reloc, /* special_function */
75 "R_ARM_PC24", /* name */
76 FALSE, /* partial_inplace */
77 0x00ffffff, /* src_mask */
78 0x00ffffff, /* dst_mask */
79 TRUE), /* pcrel_offset */
80
81 /* 32 bit absolute */
82 HOWTO (R_ARM_ABS32, /* type */
83 0, /* rightshift */
84 2, /* size (0 = byte, 1 = short, 2 = long) */
85 32, /* bitsize */
86 FALSE, /* pc_relative */
87 0, /* bitpos */
88 complain_overflow_bitfield,/* complain_on_overflow */
89 bfd_elf_generic_reloc, /* special_function */
90 "R_ARM_ABS32", /* name */
91 FALSE, /* partial_inplace */
92 0xffffffff, /* src_mask */
93 0xffffffff, /* dst_mask */
94 FALSE), /* pcrel_offset */
95
96 /* standard 32bit pc-relative reloc */
97 HOWTO (R_ARM_REL32, /* type */
98 0, /* rightshift */
99 2, /* size (0 = byte, 1 = short, 2 = long) */
100 32, /* bitsize */
101 TRUE, /* pc_relative */
102 0, /* bitpos */
103 complain_overflow_bitfield,/* complain_on_overflow */
104 bfd_elf_generic_reloc, /* special_function */
105 "R_ARM_REL32", /* name */
106 FALSE, /* partial_inplace */
107 0xffffffff, /* src_mask */
108 0xffffffff, /* dst_mask */
109 TRUE), /* pcrel_offset */
110
111 /* 8 bit absolute */
112 HOWTO (R_ARM_PC13, /* type */
113 0, /* rightshift */
114 0, /* size (0 = byte, 1 = short, 2 = long) */
115 8, /* bitsize */
116 FALSE, /* pc_relative */
117 0, /* bitpos */
118 complain_overflow_bitfield,/* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_ARM_PC13", /* name */
121 FALSE, /* partial_inplace */
122 0x000000ff, /* src_mask */
123 0x000000ff, /* dst_mask */
124 FALSE), /* pcrel_offset */
125
126 /* 16 bit absolute */
127 HOWTO (R_ARM_ABS16, /* type */
128 0, /* rightshift */
129 1, /* size (0 = byte, 1 = short, 2 = long) */
130 16, /* bitsize */
131 FALSE, /* pc_relative */
132 0, /* bitpos */
133 complain_overflow_bitfield,/* complain_on_overflow */
134 bfd_elf_generic_reloc, /* special_function */
135 "R_ARM_ABS16", /* name */
136 FALSE, /* partial_inplace */
137 0x0000ffff, /* src_mask */
138 0x0000ffff, /* dst_mask */
139 FALSE), /* pcrel_offset */
140
141 /* 12 bit absolute */
142 HOWTO (R_ARM_ABS12, /* type */
143 0, /* rightshift */
144 2, /* size (0 = byte, 1 = short, 2 = long) */
145 12, /* bitsize */
146 FALSE, /* pc_relative */
147 0, /* bitpos */
148 complain_overflow_bitfield,/* complain_on_overflow */
149 bfd_elf_generic_reloc, /* special_function */
150 "R_ARM_ABS12", /* name */
151 FALSE, /* partial_inplace */
152 0x000008ff, /* src_mask */
153 0x000008ff, /* dst_mask */
154 FALSE), /* pcrel_offset */
155
156 HOWTO (R_ARM_THM_ABS5, /* type */
157 6, /* rightshift */
158 1, /* size (0 = byte, 1 = short, 2 = long) */
159 5, /* bitsize */
160 FALSE, /* pc_relative */
161 0, /* bitpos */
162 complain_overflow_bitfield,/* complain_on_overflow */
163 bfd_elf_generic_reloc, /* special_function */
164 "R_ARM_THM_ABS5", /* name */
165 FALSE, /* partial_inplace */
166 0x000007e0, /* src_mask */
167 0x000007e0, /* dst_mask */
168 FALSE), /* pcrel_offset */
169
170 /* 8 bit absolute */
171 HOWTO (R_ARM_ABS8, /* type */
172 0, /* rightshift */
173 0, /* size (0 = byte, 1 = short, 2 = long) */
174 8, /* bitsize */
175 FALSE, /* pc_relative */
176 0, /* bitpos */
177 complain_overflow_bitfield,/* complain_on_overflow */
178 bfd_elf_generic_reloc, /* special_function */
179 "R_ARM_ABS8", /* name */
180 FALSE, /* partial_inplace */
181 0x000000ff, /* src_mask */
182 0x000000ff, /* dst_mask */
183 FALSE), /* pcrel_offset */
184
185 HOWTO (R_ARM_SBREL32, /* type */
186 0, /* rightshift */
187 2, /* size (0 = byte, 1 = short, 2 = long) */
188 32, /* bitsize */
189 FALSE, /* pc_relative */
190 0, /* bitpos */
191 complain_overflow_dont,/* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_ARM_SBREL32", /* name */
194 FALSE, /* partial_inplace */
195 0xffffffff, /* src_mask */
196 0xffffffff, /* dst_mask */
197 FALSE), /* pcrel_offset */
198
199 HOWTO (R_ARM_THM_PC22, /* type */
200 1, /* rightshift */
201 2, /* size (0 = byte, 1 = short, 2 = long) */
202 23, /* bitsize */
203 TRUE, /* pc_relative */
204 0, /* bitpos */
205 complain_overflow_signed,/* complain_on_overflow */
206 bfd_elf_generic_reloc, /* special_function */
207 "R_ARM_THM_PC22", /* name */
208 FALSE, /* partial_inplace */
209 0x07ff07ff, /* src_mask */
210 0x07ff07ff, /* dst_mask */
211 TRUE), /* pcrel_offset */
212
213 HOWTO (R_ARM_THM_PC8, /* type */
214 1, /* rightshift */
215 1, /* size (0 = byte, 1 = short, 2 = long) */
216 8, /* bitsize */
217 TRUE, /* pc_relative */
218 0, /* bitpos */
219 complain_overflow_signed,/* complain_on_overflow */
220 bfd_elf_generic_reloc, /* special_function */
221 "R_ARM_THM_PC8", /* name */
222 FALSE, /* partial_inplace */
223 0x000000ff, /* src_mask */
224 0x000000ff, /* dst_mask */
225 TRUE), /* pcrel_offset */
226
227 HOWTO (R_ARM_AMP_VCALL9, /* type */
228 1, /* rightshift */
229 1, /* size (0 = byte, 1 = short, 2 = long) */
230 8, /* bitsize */
231 TRUE, /* pc_relative */
232 0, /* bitpos */
233 complain_overflow_signed,/* complain_on_overflow */
234 bfd_elf_generic_reloc, /* special_function */
235 "R_ARM_AMP_VCALL9", /* name */
236 FALSE, /* partial_inplace */
237 0x000000ff, /* src_mask */
238 0x000000ff, /* dst_mask */
239 TRUE), /* pcrel_offset */
240
241 HOWTO (R_ARM_SWI24, /* type */
242 0, /* rightshift */
243 0, /* size (0 = byte, 1 = short, 2 = long) */
244 0, /* bitsize */
245 FALSE, /* pc_relative */
246 0, /* bitpos */
247 complain_overflow_signed,/* complain_on_overflow */
248 bfd_elf_generic_reloc, /* special_function */
249 "R_ARM_SWI24", /* name */
250 FALSE, /* partial_inplace */
251 0x00000000, /* src_mask */
252 0x00000000, /* dst_mask */
253 FALSE), /* pcrel_offset */
254
255 HOWTO (R_ARM_THM_SWI8, /* type */
256 0, /* rightshift */
257 0, /* size (0 = byte, 1 = short, 2 = long) */
258 0, /* bitsize */
259 FALSE, /* pc_relative */
260 0, /* bitpos */
261 complain_overflow_signed,/* complain_on_overflow */
262 bfd_elf_generic_reloc, /* special_function */
263 "R_ARM_SWI8", /* name */
264 FALSE, /* partial_inplace */
265 0x00000000, /* src_mask */
266 0x00000000, /* dst_mask */
267 FALSE), /* pcrel_offset */
268
269 /* BLX instruction for the ARM. */
270 HOWTO (R_ARM_XPC25, /* type */
271 2, /* rightshift */
272 2, /* size (0 = byte, 1 = short, 2 = long) */
273 25, /* bitsize */
274 TRUE, /* pc_relative */
275 0, /* bitpos */
276 complain_overflow_signed,/* complain_on_overflow */
277 bfd_elf_generic_reloc, /* special_function */
278 "R_ARM_XPC25", /* name */
279 FALSE, /* partial_inplace */
280 0x00ffffff, /* src_mask */
281 0x00ffffff, /* dst_mask */
282 TRUE), /* pcrel_offset */
283
284 /* BLX instruction for the Thumb. */
285 HOWTO (R_ARM_THM_XPC22, /* type */
286 2, /* rightshift */
287 2, /* size (0 = byte, 1 = short, 2 = long) */
288 22, /* bitsize */
289 TRUE, /* pc_relative */
290 0, /* bitpos */
291 complain_overflow_signed,/* complain_on_overflow */
292 bfd_elf_generic_reloc, /* special_function */
293 "R_ARM_THM_XPC22", /* name */
294 FALSE, /* partial_inplace */
295 0x07ff07ff, /* src_mask */
296 0x07ff07ff, /* dst_mask */
297 TRUE), /* pcrel_offset */
298
299 /* These next three relocs are not defined, but we need to fill the space. */
300
301 HOWTO (R_ARM_NONE, /* type */
302 0, /* rightshift */
303 0, /* size (0 = byte, 1 = short, 2 = long) */
304 0, /* bitsize */
305 FALSE, /* pc_relative */
306 0, /* bitpos */
307 complain_overflow_dont,/* complain_on_overflow */
308 bfd_elf_generic_reloc, /* special_function */
309 "R_ARM_unknown_17", /* name */
310 FALSE, /* partial_inplace */
311 0, /* src_mask */
312 0, /* dst_mask */
313 FALSE), /* pcrel_offset */
314
315 HOWTO (R_ARM_NONE, /* type */
316 0, /* rightshift */
317 0, /* size (0 = byte, 1 = short, 2 = long) */
318 0, /* bitsize */
319 FALSE, /* pc_relative */
320 0, /* bitpos */
321 complain_overflow_dont,/* complain_on_overflow */
322 bfd_elf_generic_reloc, /* special_function */
323 "R_ARM_unknown_18", /* name */
324 FALSE, /* partial_inplace */
325 0, /* src_mask */
326 0, /* dst_mask */
327 FALSE), /* pcrel_offset */
328
329 HOWTO (R_ARM_NONE, /* type */
330 0, /* rightshift */
331 0, /* size (0 = byte, 1 = short, 2 = long) */
332 0, /* bitsize */
333 FALSE, /* pc_relative */
334 0, /* bitpos */
335 complain_overflow_dont,/* complain_on_overflow */
336 bfd_elf_generic_reloc, /* special_function */
337 "R_ARM_unknown_19", /* name */
338 FALSE, /* partial_inplace */
339 0, /* src_mask */
340 0, /* dst_mask */
341 FALSE), /* pcrel_offset */
342
343 /* Relocs used in ARM Linux */
344
345 HOWTO (R_ARM_COPY, /* type */
346 0, /* rightshift */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
348 32, /* bitsize */
349 FALSE, /* pc_relative */
350 0, /* bitpos */
351 complain_overflow_bitfield,/* complain_on_overflow */
352 bfd_elf_generic_reloc, /* special_function */
353 "R_ARM_COPY", /* name */
354 TRUE, /* partial_inplace */
355 0xffffffff, /* src_mask */
356 0xffffffff, /* dst_mask */
357 FALSE), /* pcrel_offset */
358
359 HOWTO (R_ARM_GLOB_DAT, /* type */
360 0, /* rightshift */
361 2, /* size (0 = byte, 1 = short, 2 = long) */
362 32, /* bitsize */
363 FALSE, /* pc_relative */
364 0, /* bitpos */
365 complain_overflow_bitfield,/* complain_on_overflow */
366 bfd_elf_generic_reloc, /* special_function */
367 "R_ARM_GLOB_DAT", /* name */
368 TRUE, /* partial_inplace */
369 0xffffffff, /* src_mask */
370 0xffffffff, /* dst_mask */
371 FALSE), /* pcrel_offset */
372
373 HOWTO (R_ARM_JUMP_SLOT, /* type */
374 0, /* rightshift */
375 2, /* size (0 = byte, 1 = short, 2 = long) */
376 32, /* bitsize */
377 FALSE, /* pc_relative */
378 0, /* bitpos */
379 complain_overflow_bitfield,/* complain_on_overflow */
380 bfd_elf_generic_reloc, /* special_function */
381 "R_ARM_JUMP_SLOT", /* name */
382 TRUE, /* partial_inplace */
383 0xffffffff, /* src_mask */
384 0xffffffff, /* dst_mask */
385 FALSE), /* pcrel_offset */
386
387 HOWTO (R_ARM_RELATIVE, /* type */
388 0, /* rightshift */
389 2, /* size (0 = byte, 1 = short, 2 = long) */
390 32, /* bitsize */
391 FALSE, /* pc_relative */
392 0, /* bitpos */
393 complain_overflow_bitfield,/* complain_on_overflow */
394 bfd_elf_generic_reloc, /* special_function */
395 "R_ARM_RELATIVE", /* name */
396 TRUE, /* partial_inplace */
397 0xffffffff, /* src_mask */
398 0xffffffff, /* dst_mask */
399 FALSE), /* pcrel_offset */
400
401 HOWTO (R_ARM_GOTOFF, /* type */
402 0, /* rightshift */
403 2, /* size (0 = byte, 1 = short, 2 = long) */
404 32, /* bitsize */
405 FALSE, /* pc_relative */
406 0, /* bitpos */
407 complain_overflow_bitfield,/* complain_on_overflow */
408 bfd_elf_generic_reloc, /* special_function */
409 "R_ARM_GOTOFF", /* name */
410 TRUE, /* partial_inplace */
411 0xffffffff, /* src_mask */
412 0xffffffff, /* dst_mask */
413 FALSE), /* pcrel_offset */
414
415 HOWTO (R_ARM_GOTPC, /* type */
416 0, /* rightshift */
417 2, /* size (0 = byte, 1 = short, 2 = long) */
418 32, /* bitsize */
419 TRUE, /* pc_relative */
420 0, /* bitpos */
421 complain_overflow_bitfield,/* complain_on_overflow */
422 bfd_elf_generic_reloc, /* special_function */
423 "R_ARM_GOTPC", /* name */
424 TRUE, /* partial_inplace */
425 0xffffffff, /* src_mask */
426 0xffffffff, /* dst_mask */
427 TRUE), /* pcrel_offset */
428
429 HOWTO (R_ARM_GOT32, /* type */
430 0, /* rightshift */
431 2, /* size (0 = byte, 1 = short, 2 = long) */
432 32, /* bitsize */
433 FALSE, /* pc_relative */
434 0, /* bitpos */
435 complain_overflow_bitfield,/* complain_on_overflow */
436 bfd_elf_generic_reloc, /* special_function */
437 "R_ARM_GOT32", /* name */
438 TRUE, /* partial_inplace */
439 0xffffffff, /* src_mask */
440 0xffffffff, /* dst_mask */
441 FALSE), /* pcrel_offset */
442
443 HOWTO (R_ARM_PLT32, /* type */
444 2, /* rightshift */
445 2, /* size (0 = byte, 1 = short, 2 = long) */
446 26, /* bitsize */
447 TRUE, /* pc_relative */
448 0, /* bitpos */
449 complain_overflow_bitfield,/* complain_on_overflow */
450 bfd_elf_generic_reloc, /* special_function */
451 "R_ARM_PLT32", /* name */
452 TRUE, /* partial_inplace */
453 0x00ffffff, /* src_mask */
454 0x00ffffff, /* dst_mask */
455 TRUE), /* pcrel_offset */
456
457 HOWTO (R_ARM_CALL, /* type */
458 2, /* rightshift */
459 2, /* size (0 = byte, 1 = short, 2 = long) */
460 24, /* bitsize */
461 TRUE, /* pc_relative */
462 0, /* bitpos */
463 complain_overflow_signed,/* complain_on_overflow */
464 bfd_elf_generic_reloc, /* special_function */
465 "R_ARM_CALL", /* name */
466 FALSE, /* partial_inplace */
467 0x00ffffff, /* src_mask */
468 0x00ffffff, /* dst_mask */
469 TRUE), /* pcrel_offset */
470
471 HOWTO (R_ARM_JUMP24, /* type */
472 2, /* rightshift */
473 2, /* size (0 = byte, 1 = short, 2 = long) */
474 24, /* bitsize */
475 TRUE, /* pc_relative */
476 0, /* bitpos */
477 complain_overflow_signed,/* complain_on_overflow */
478 bfd_elf_generic_reloc, /* special_function */
479 "R_ARM_JUMP24", /* name */
480 FALSE, /* partial_inplace */
481 0x00ffffff, /* src_mask */
482 0x00ffffff, /* dst_mask */
483 TRUE), /* pcrel_offset */
484
485 HOWTO (R_ARM_NONE, /* type */
486 0, /* rightshift */
487 0, /* size (0 = byte, 1 = short, 2 = long) */
488 0, /* bitsize */
489 FALSE, /* pc_relative */
490 0, /* bitpos */
491 complain_overflow_dont,/* complain_on_overflow */
492 bfd_elf_generic_reloc, /* special_function */
493 "R_ARM_unknown_30", /* name */
494 FALSE, /* partial_inplace */
495 0, /* src_mask */
496 0, /* dst_mask */
497 FALSE), /* pcrel_offset */
498
499 HOWTO (R_ARM_NONE, /* type */
500 0, /* rightshift */
501 0, /* size (0 = byte, 1 = short, 2 = long) */
502 0, /* bitsize */
503 FALSE, /* pc_relative */
504 0, /* bitpos */
505 complain_overflow_dont,/* complain_on_overflow */
506 bfd_elf_generic_reloc, /* special_function */
507 "R_ARM_unknown_31", /* name */
508 FALSE, /* partial_inplace */
509 0, /* src_mask */
510 0, /* dst_mask */
511 FALSE), /* pcrel_offset */
512
513 HOWTO (R_ARM_ALU_PCREL7_0, /* type */
514 0, /* rightshift */
515 2, /* size (0 = byte, 1 = short, 2 = long) */
516 12, /* bitsize */
517 TRUE, /* pc_relative */
518 0, /* bitpos */
519 complain_overflow_dont,/* complain_on_overflow */
520 bfd_elf_generic_reloc, /* special_function */
521 "R_ARM_ALU_PCREL_7_0", /* name */
522 FALSE, /* partial_inplace */
523 0x00000fff, /* src_mask */
524 0x00000fff, /* dst_mask */
525 TRUE), /* pcrel_offset */
526
527 HOWTO (R_ARM_ALU_PCREL15_8, /* type */
528 0, /* rightshift */
529 2, /* size (0 = byte, 1 = short, 2 = long) */
530 12, /* bitsize */
531 TRUE, /* pc_relative */
532 8, /* bitpos */
533 complain_overflow_dont,/* complain_on_overflow */
534 bfd_elf_generic_reloc, /* special_function */
535 "R_ARM_ALU_PCREL_15_8",/* name */
536 FALSE, /* partial_inplace */
537 0x00000fff, /* src_mask */
538 0x00000fff, /* dst_mask */
539 TRUE), /* pcrel_offset */
540
541 HOWTO (R_ARM_ALU_PCREL23_15, /* type */
542 0, /* rightshift */
543 2, /* size (0 = byte, 1 = short, 2 = long) */
544 12, /* bitsize */
545 TRUE, /* pc_relative */
546 16, /* bitpos */
547 complain_overflow_dont,/* complain_on_overflow */
548 bfd_elf_generic_reloc, /* special_function */
549 "R_ARM_ALU_PCREL_23_15",/* name */
550 FALSE, /* partial_inplace */
551 0x00000fff, /* src_mask */
552 0x00000fff, /* dst_mask */
553 TRUE), /* pcrel_offset */
554
555 HOWTO (R_ARM_LDR_SBREL_11_0, /* type */
556 0, /* rightshift */
557 2, /* size (0 = byte, 1 = short, 2 = long) */
558 12, /* bitsize */
559 FALSE, /* pc_relative */
560 0, /* bitpos */
561 complain_overflow_dont,/* complain_on_overflow */
562 bfd_elf_generic_reloc, /* special_function */
563 "R_ARM_LDR_SBREL_11_0",/* name */
564 FALSE, /* partial_inplace */
565 0x00000fff, /* src_mask */
566 0x00000fff, /* dst_mask */
567 FALSE), /* pcrel_offset */
568
569 HOWTO (R_ARM_ALU_SBREL_19_12, /* type */
570 0, /* rightshift */
571 2, /* size (0 = byte, 1 = short, 2 = long) */
572 8, /* bitsize */
573 FALSE, /* pc_relative */
574 12, /* bitpos */
575 complain_overflow_dont,/* complain_on_overflow */
576 bfd_elf_generic_reloc, /* special_function */
577 "R_ARM_ALU_SBREL_19_12",/* name */
578 FALSE, /* partial_inplace */
579 0x000ff000, /* src_mask */
580 0x000ff000, /* dst_mask */
581 FALSE), /* pcrel_offset */
582
583 HOWTO (R_ARM_ALU_SBREL_27_20, /* type */
584 0, /* rightshift */
585 2, /* size (0 = byte, 1 = short, 2 = long) */
586 8, /* bitsize */
587 FALSE, /* pc_relative */
588 20, /* bitpos */
589 complain_overflow_dont,/* complain_on_overflow */
590 bfd_elf_generic_reloc, /* special_function */
591 "R_ARM_ALU_SBREL_27_20",/* name */
592 FALSE, /* partial_inplace */
593 0x0ff00000, /* src_mask */
594 0x0ff00000, /* dst_mask */
595 FALSE), /* pcrel_offset */
596
597 HOWTO (R_ARM_TARGET1, /* type */
598 0, /* rightshift */
599 2, /* size (0 = byte, 1 = short, 2 = long) */
600 32, /* bitsize */
601 FALSE, /* pc_relative */
602 0, /* bitpos */
603 complain_overflow_dont,/* complain_on_overflow */
604 bfd_elf_generic_reloc, /* special_function */
605 "R_ARM_TARGET1", /* name */
606 FALSE, /* partial_inplace */
607 0xffffffff, /* src_mask */
608 0xffffffff, /* dst_mask */
609 FALSE), /* pcrel_offset */
610
611 HOWTO (R_ARM_ROSEGREL32, /* type */
612 0, /* rightshift */
613 2, /* size (0 = byte, 1 = short, 2 = long) */
614 32, /* bitsize */
615 FALSE, /* pc_relative */
616 0, /* bitpos */
617 complain_overflow_dont,/* complain_on_overflow */
618 bfd_elf_generic_reloc, /* special_function */
619 "R_ARM_ROSEGREL32", /* name */
620 FALSE, /* partial_inplace */
621 0xffffffff, /* src_mask */
622 0xffffffff, /* dst_mask */
623 FALSE), /* pcrel_offset */
624
625 HOWTO (R_ARM_V4BX, /* type */
626 0, /* rightshift */
627 2, /* size (0 = byte, 1 = short, 2 = long) */
628 32, /* bitsize */
629 FALSE, /* pc_relative */
630 0, /* bitpos */
631 complain_overflow_dont,/* complain_on_overflow */
632 bfd_elf_generic_reloc, /* special_function */
633 "R_ARM_V4BX", /* name */
634 FALSE, /* partial_inplace */
635 0xffffffff, /* src_mask */
636 0xffffffff, /* dst_mask */
637 FALSE), /* pcrel_offset */
638
639 HOWTO (R_ARM_TARGET2, /* type */
640 0, /* rightshift */
641 2, /* size (0 = byte, 1 = short, 2 = long) */
642 32, /* bitsize */
643 FALSE, /* pc_relative */
644 0, /* bitpos */
645 complain_overflow_signed,/* complain_on_overflow */
646 bfd_elf_generic_reloc, /* special_function */
647 "R_ARM_TARGET2", /* name */
648 FALSE, /* partial_inplace */
649 0xffffffff, /* src_mask */
650 0xffffffff, /* dst_mask */
651 TRUE), /* pcrel_offset */
652
653 HOWTO (R_ARM_PREL31, /* type */
654 0, /* rightshift */
655 2, /* size (0 = byte, 1 = short, 2 = long) */
656 31, /* bitsize */
657 TRUE, /* pc_relative */
658 0, /* bitpos */
659 complain_overflow_signed,/* complain_on_overflow */
660 bfd_elf_generic_reloc, /* special_function */
661 "R_ARM_PREL31", /* name */
662 FALSE, /* partial_inplace */
663 0x7fffffff, /* src_mask */
664 0x7fffffff, /* dst_mask */
665 TRUE), /* pcrel_offset */
666};
667
668 /* GNU extension to record C++ vtable hierarchy */
669static reloc_howto_type elf32_arm_vtinherit_howto =
670 HOWTO (R_ARM_GNU_VTINHERIT, /* type */
671 0, /* rightshift */
672 2, /* size (0 = byte, 1 = short, 2 = long) */
673 0, /* bitsize */
674 FALSE, /* pc_relative */
675 0, /* bitpos */
676 complain_overflow_dont, /* complain_on_overflow */
677 NULL, /* special_function */
678 "R_ARM_GNU_VTINHERIT", /* name */
679 FALSE, /* partial_inplace */
680 0, /* src_mask */
681 0, /* dst_mask */
682 FALSE); /* pcrel_offset */
683
684 /* GNU extension to record C++ vtable member usage */
685static reloc_howto_type elf32_arm_vtentry_howto =
686 HOWTO (R_ARM_GNU_VTENTRY, /* type */
687 0, /* rightshift */
688 2, /* size (0 = byte, 1 = short, 2 = long) */
689 0, /* bitsize */
690 FALSE, /* pc_relative */
691 0, /* bitpos */
692 complain_overflow_dont, /* complain_on_overflow */
693 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
694 "R_ARM_GNU_VTENTRY", /* name */
695 FALSE, /* partial_inplace */
696 0, /* src_mask */
697 0, /* dst_mask */
698 FALSE); /* pcrel_offset */
699
700 /* 12 bit pc relative */
701static reloc_howto_type elf32_arm_thm_pc11_howto =
702 HOWTO (R_ARM_THM_PC11, /* type */
703 1, /* rightshift */
704 1, /* size (0 = byte, 1 = short, 2 = long) */
705 11, /* bitsize */
706 TRUE, /* pc_relative */
707 0, /* bitpos */
708 complain_overflow_signed, /* complain_on_overflow */
709 bfd_elf_generic_reloc, /* special_function */
710 "R_ARM_THM_PC11", /* name */
711 FALSE, /* partial_inplace */
712 0x000007ff, /* src_mask */
713 0x000007ff, /* dst_mask */
714 TRUE); /* pcrel_offset */
715
716 /* 12 bit pc relative */
717static reloc_howto_type elf32_arm_thm_pc9_howto =
718 HOWTO (R_ARM_THM_PC9, /* type */
719 1, /* rightshift */
720 1, /* size (0 = byte, 1 = short, 2 = long) */
721 8, /* bitsize */
722 TRUE, /* pc_relative */
723 0, /* bitpos */
724 complain_overflow_signed, /* complain_on_overflow */
725 bfd_elf_generic_reloc, /* special_function */
726 "R_ARM_THM_PC9", /* name */
727 FALSE, /* partial_inplace */
728 0x000000ff, /* src_mask */
729 0x000000ff, /* dst_mask */
730 TRUE); /* pcrel_offset */
731
732/* Place relative GOT-indirect. */
733static reloc_howto_type elf32_arm_got_prel =
734 HOWTO (R_ARM_GOT_PREL, /* type */
735 0, /* rightshift */
736 2, /* size (0 = byte, 1 = short, 2 = long) */
737 32, /* bitsize */
738 TRUE, /* pc_relative */
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
741 bfd_elf_generic_reloc, /* special_function */
742 "R_ARM_GOT_PREL", /* name */
743 FALSE, /* partial_inplace */
744 0xffffffff, /* src_mask */
745 0xffffffff, /* dst_mask */
746 TRUE); /* pcrel_offset */
747
748/* Currently unused relocations. */
749static reloc_howto_type elf32_arm_r_howto[4] =
750{
751 HOWTO (R_ARM_RREL32, /* type */
752 0, /* rightshift */
753 0, /* size (0 = byte, 1 = short, 2 = long) */
754 0, /* bitsize */
755 FALSE, /* pc_relative */
756 0, /* bitpos */
757 complain_overflow_dont,/* complain_on_overflow */
758 bfd_elf_generic_reloc, /* special_function */
759 "R_ARM_RREL32", /* name */
760 FALSE, /* partial_inplace */
761 0, /* src_mask */
762 0, /* dst_mask */
763 FALSE), /* pcrel_offset */
764
765 HOWTO (R_ARM_RABS32, /* type */
766 0, /* rightshift */
767 0, /* size (0 = byte, 1 = short, 2 = long) */
768 0, /* bitsize */
769 FALSE, /* pc_relative */
770 0, /* bitpos */
771 complain_overflow_dont,/* complain_on_overflow */
772 bfd_elf_generic_reloc, /* special_function */
773 "R_ARM_RABS32", /* name */
774 FALSE, /* partial_inplace */
775 0, /* src_mask */
776 0, /* dst_mask */
777 FALSE), /* pcrel_offset */
778
779 HOWTO (R_ARM_RPC24, /* type */
780 0, /* rightshift */
781 0, /* size (0 = byte, 1 = short, 2 = long) */
782 0, /* bitsize */
783 FALSE, /* pc_relative */
784 0, /* bitpos */
785 complain_overflow_dont,/* complain_on_overflow */
786 bfd_elf_generic_reloc, /* special_function */
787 "R_ARM_RPC24", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
793 HOWTO (R_ARM_RBASE, /* type */
794 0, /* rightshift */
795 0, /* size (0 = byte, 1 = short, 2 = long) */
796 0, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont,/* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_ARM_RBASE", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE) /* pcrel_offset */
806};
807
808static reloc_howto_type *
809elf32_arm_howto_from_type (unsigned int r_type)
810{
811 if (r_type < NUM_ELEM (elf32_arm_howto_table))
812 return &elf32_arm_howto_table[r_type];
813
814 switch (r_type)
815 {
816 case R_ARM_GOT_PREL:
817 return &elf32_arm_got_prel;
818
819 case R_ARM_GNU_VTINHERIT:
820 return &elf32_arm_vtinherit_howto;
821
822 case R_ARM_GNU_VTENTRY:
823 return &elf32_arm_vtentry_howto;
824
825 case R_ARM_THM_PC11:
826 return &elf32_arm_thm_pc11_howto;
827
828 case R_ARM_THM_PC9:
829 return &elf32_arm_thm_pc9_howto;
830
831 case R_ARM_RREL32:
832 case R_ARM_RABS32:
833 case R_ARM_RPC24:
834 case R_ARM_RBASE:
835 return &elf32_arm_r_howto[r_type - R_ARM_RREL32];
836
837 default:
838 return NULL;
839 }
840}
841
842static void
843elf32_arm_info_to_howto (bfd * abfd ATTRIBUTE_UNUSED, arelent * bfd_reloc,
844 Elf_Internal_Rela * elf_reloc)
845{
846 unsigned int r_type;
847
848 r_type = ELF32_R_TYPE (elf_reloc->r_info);
849 bfd_reloc->howto = elf32_arm_howto_from_type (r_type);
850}
851
852struct elf32_arm_reloc_map
853 {
854 bfd_reloc_code_real_type bfd_reloc_val;
855 unsigned char elf_reloc_val;
856 };
857
858/* All entries in this list must also be present in elf32_arm_howto_table. */
859static const struct elf32_arm_reloc_map elf32_arm_reloc_map[] =
860 {
861 {BFD_RELOC_NONE, R_ARM_NONE},
862 {BFD_RELOC_ARM_PCREL_BRANCH, R_ARM_PC24},
863 {BFD_RELOC_ARM_PCREL_BLX, R_ARM_XPC25},
864 {BFD_RELOC_THUMB_PCREL_BLX, R_ARM_THM_XPC22},
865 {BFD_RELOC_32, R_ARM_ABS32},
866 {BFD_RELOC_32_PCREL, R_ARM_REL32},
867 {BFD_RELOC_8, R_ARM_ABS8},
868 {BFD_RELOC_16, R_ARM_ABS16},
869 {BFD_RELOC_ARM_OFFSET_IMM, R_ARM_ABS12},
870 {BFD_RELOC_ARM_THUMB_OFFSET, R_ARM_THM_ABS5},
871 {BFD_RELOC_THUMB_PCREL_BRANCH23, R_ARM_THM_PC22},
872 {BFD_RELOC_ARM_COPY, R_ARM_COPY},
873 {BFD_RELOC_ARM_GLOB_DAT, R_ARM_GLOB_DAT},
874 {BFD_RELOC_ARM_JUMP_SLOT, R_ARM_JUMP_SLOT},
875 {BFD_RELOC_ARM_RELATIVE, R_ARM_RELATIVE},
876 {BFD_RELOC_ARM_GOTOFF, R_ARM_GOTOFF},
877 {BFD_RELOC_ARM_GOTPC, R_ARM_GOTPC},
878 {BFD_RELOC_ARM_GOT32, R_ARM_GOT32},
879 {BFD_RELOC_ARM_PLT32, R_ARM_PLT32},
880 {BFD_RELOC_ARM_TARGET1, R_ARM_TARGET1},
881 {BFD_RELOC_ARM_ROSEGREL32, R_ARM_ROSEGREL32},
882 {BFD_RELOC_ARM_SBREL32, R_ARM_SBREL32},
883 {BFD_RELOC_ARM_PREL31, R_ARM_PREL31},
884 {BFD_RELOC_ARM_TARGET2, R_ARM_TARGET2}
885 };
886
887static reloc_howto_type *
888elf32_arm_reloc_type_lookup (abfd, code)
889 bfd *abfd ATTRIBUTE_UNUSED;
890 bfd_reloc_code_real_type code;
891{
892 unsigned int i;
893
894 switch (code)
895 {
896 case BFD_RELOC_VTABLE_INHERIT:
897 return & elf32_arm_vtinherit_howto;
898
899 case BFD_RELOC_VTABLE_ENTRY:
900 return & elf32_arm_vtentry_howto;
901
902 case BFD_RELOC_THUMB_PCREL_BRANCH12:
903 return & elf32_arm_thm_pc11_howto;
904
905 case BFD_RELOC_THUMB_PCREL_BRANCH9:
906 return & elf32_arm_thm_pc9_howto;
907
908 default:
909 for (i = 0; i < NUM_ELEM (elf32_arm_reloc_map); i ++)
910 if (elf32_arm_reloc_map[i].bfd_reloc_val == code)
911 return & elf32_arm_howto_table[elf32_arm_reloc_map[i].elf_reloc_val];
912
913 return NULL;
914 }
915}
916
917/* Support for core dump NOTE sections */
918static bfd_boolean
919elf32_arm_nabi_grok_prstatus (abfd, note)
920 bfd *abfd;
921 Elf_Internal_Note *note;
922{
923 int offset;
924 size_t size;
925
926 switch (note->descsz)
927 {
928 default:
929 return FALSE;
930
931 case 148: /* Linux/ARM 32-bit*/
932 /* pr_cursig */
933 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
934
935 /* pr_pid */
936 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
937
938 /* pr_reg */
939 offset = 72;
940 size = 72;
941
942 break;
943 }
944
945 /* Make a ".reg/999" section. */
946 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
947 size, note->descpos + offset);
948}
949
950static bfd_boolean
951elf32_arm_nabi_grok_psinfo (abfd, note)
952 bfd *abfd;
953 Elf_Internal_Note *note;
954{
955 switch (note->descsz)
956 {
957 default:
958 return FALSE;
959
960 case 124: /* Linux/ARM elf_prpsinfo */
961 elf_tdata (abfd)->core_program
962 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
963 elf_tdata (abfd)->core_command
964 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
965 }
966
967 /* Note that for some reason, a spurious space is tacked
968 onto the end of the args in some (at least one anyway)
969 implementations, so strip it off if it exists. */
970
971 {
972 char *command = elf_tdata (abfd)->core_command;
973 int n = strlen (command);
974
975 if (0 < n && command[n - 1] == ' ')
976 command[n - 1] = '\0';
977 }
978
979 return TRUE;
980}
981
982#define TARGET_LITTLE_SYM bfd_elf32_littlearm_vec
983#define TARGET_LITTLE_NAME "elf32-littlearm"
984#define TARGET_BIG_SYM bfd_elf32_bigarm_vec
985#define TARGET_BIG_NAME "elf32-bigarm"
986
987#define elf_backend_grok_prstatus elf32_arm_nabi_grok_prstatus
988#define elf_backend_grok_psinfo elf32_arm_nabi_grok_psinfo
989
acf8aed4
AM
990#ifndef USE_REL
991#define USE_REL 0
992#endif
993
252b5132
RH
994typedef unsigned long int insn32;
995typedef unsigned short int insn16;
996
8cb51566 997/* In lieu of proper flags, assume all EABIv4 objects are interworkable. */
57e8b36a 998#define INTERWORK_FLAG(abfd) \
8cb51566 999 (EF_ARM_EABI_VERSION (elf_elfheader (abfd)->e_flags) == EF_ARM_EABI_VER4 \
85a84e7a 1000 || (elf_elfheader (abfd)->e_flags & EF_ARM_INTERWORK))
9b485d32 1001
252b5132
RH
1002/* The linker script knows the section names for placement.
1003 The entry_names are used to do simple name mangling on the stubs.
1004 Given a function name, and its type, the stub can be found. The
9b485d32 1005 name can be changed. The only requirement is the %s be present. */
252b5132
RH
1006#define THUMB2ARM_GLUE_SECTION_NAME ".glue_7t"
1007#define THUMB2ARM_GLUE_ENTRY_NAME "__%s_from_thumb"
1008
1009#define ARM2THUMB_GLUE_SECTION_NAME ".glue_7"
1010#define ARM2THUMB_GLUE_ENTRY_NAME "__%s_from_arm"
1011
1012/* The name of the dynamic interpreter. This is put in the .interp
1013 section. */
1014#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
1015
5e681ec4
PB
1016#ifdef FOUR_WORD_PLT
1017
252b5132
RH
1018/* The first entry in a procedure linkage table looks like
1019 this. It is set up so that any shared library function that is
59f2c4e7 1020 called before the relocation has been set up calls the dynamic
9b485d32 1021 linker first. */
e5a52504 1022static const bfd_vma elf32_arm_plt0_entry [] =
5e681ec4
PB
1023 {
1024 0xe52de004, /* str lr, [sp, #-4]! */
1025 0xe59fe010, /* ldr lr, [pc, #16] */
1026 0xe08fe00e, /* add lr, pc, lr */
1027 0xe5bef008, /* ldr pc, [lr, #8]! */
1028 };
1029
1030/* Subsequent entries in a procedure linkage table look like
1031 this. */
e5a52504 1032static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
1033 {
1034 0xe28fc600, /* add ip, pc, #NN */
1035 0xe28cca00, /* add ip, ip, #NN */
1036 0xe5bcf000, /* ldr pc, [ip, #NN]! */
1037 0x00000000, /* unused */
1038 };
1039
1040#else
1041
5e681ec4
PB
1042/* The first entry in a procedure linkage table looks like
1043 this. It is set up so that any shared library function that is
1044 called before the relocation has been set up calls the dynamic
1045 linker first. */
e5a52504 1046static const bfd_vma elf32_arm_plt0_entry [] =
917583ad 1047 {
5e681ec4
PB
1048 0xe52de004, /* str lr, [sp, #-4]! */
1049 0xe59fe004, /* ldr lr, [pc, #4] */
1050 0xe08fe00e, /* add lr, pc, lr */
1051 0xe5bef008, /* ldr pc, [lr, #8]! */
1052 0x00000000, /* &GOT[0] - . */
917583ad 1053 };
252b5132
RH
1054
1055/* Subsequent entries in a procedure linkage table look like
1056 this. */
e5a52504 1057static const bfd_vma elf32_arm_plt_entry [] =
5e681ec4
PB
1058 {
1059 0xe28fc600, /* add ip, pc, #0xNN00000 */
1060 0xe28cca00, /* add ip, ip, #0xNN000 */
1061 0xe5bcf000, /* ldr pc, [ip, #0xNNN]! */
1062 };
1063
1064#endif
252b5132 1065
e5a52504
MM
1066/* The entries in a PLT when using a DLL-based target with multiple
1067 address spaces. */
1068static const bfd_vma elf32_arm_symbian_plt_entry [] =
1069 {
1070 0xe51ff004, /* ldr pr, [pc, #-4] */
1071 0x00000000, /* dcd R_ARM_GLOB_DAT(X) */
1072 };
1073
e489d0ae
PB
1074/* Used to build a map of a section. This is required for mixed-endian
1075 code/data. */
1076
1077typedef struct elf32_elf_section_map
1078{
1079 bfd_vma vma;
1080 char type;
1081}
1082elf32_arm_section_map;
1083
1084struct _arm_elf_section_data
1085{
1086 struct bfd_elf_section_data elf;
1087 int mapcount;
1088 elf32_arm_section_map *map;
1089};
1090
1091#define elf32_arm_section_data(sec) \
1092 ((struct _arm_elf_section_data *) elf_section_data (sec))
1093
252b5132
RH
1094/* The ARM linker needs to keep track of the number of relocs that it
1095 decides to copy in check_relocs for each symbol. This is so that
1096 it can discard PC relative relocs if it doesn't need them when
1097 linking with -Bsymbolic. We store the information in a field
1098 extending the regular ELF linker hash table. */
1099
1100/* This structure keeps track of the number of PC relative relocs we
1101 have copied for a given symbol. */
5e681ec4 1102struct elf32_arm_relocs_copied
917583ad
NC
1103 {
1104 /* Next section. */
5e681ec4 1105 struct elf32_arm_relocs_copied * next;
917583ad
NC
1106 /* A section in dynobj. */
1107 asection * section;
1108 /* Number of relocs copied in this section. */
1109 bfd_size_type count;
1110 };
252b5132 1111
ba96a88f 1112/* Arm ELF linker hash entry. */
252b5132 1113struct elf32_arm_link_hash_entry
917583ad
NC
1114 {
1115 struct elf_link_hash_entry root;
252b5132 1116
917583ad 1117 /* Number of PC relative relocs copied for this symbol. */
5e681ec4 1118 struct elf32_arm_relocs_copied * relocs_copied;
917583ad 1119 };
252b5132 1120
252b5132 1121/* Traverse an arm ELF linker hash table. */
252b5132
RH
1122#define elf32_arm_link_hash_traverse(table, func, info) \
1123 (elf_link_hash_traverse \
1124 (&(table)->root, \
57e8b36a 1125 (bfd_boolean (*) (struct elf_link_hash_entry *, void *))) (func), \
252b5132
RH
1126 (info)))
1127
1128/* Get the ARM elf linker hash table from a link_info structure. */
1129#define elf32_arm_hash_table(info) \
1130 ((struct elf32_arm_link_hash_table *) ((info)->hash))
1131
9b485d32 1132/* ARM ELF linker hash table. */
252b5132 1133struct elf32_arm_link_hash_table
917583ad
NC
1134 {
1135 /* The main hash table. */
1136 struct elf_link_hash_table root;
252b5132 1137
4cc11e76 1138 /* The size in bytes of the section containing the Thumb-to-ARM glue. */
dc810e39 1139 bfd_size_type thumb_glue_size;
252b5132 1140
4cc11e76 1141 /* The size in bytes of the section containing the ARM-to-Thumb glue. */
dc810e39 1142 bfd_size_type arm_glue_size;
252b5132 1143
4cc11e76 1144 /* An arbitrary input BFD chosen to hold the glue sections. */
917583ad 1145 bfd * bfd_of_glue_owner;
ba96a88f 1146
917583ad
NC
1147 /* A boolean indicating whether knowledge of the ARM's pipeline
1148 length should be applied by the linker. */
1149 int no_pipeline_knowledge;
5e681ec4 1150
e489d0ae
PB
1151 /* Nonzero to output a BE8 image. */
1152 int byteswap_code;
1153
9c504268
PB
1154 /* Zero if R_ARM_TARGET1 means R_ARM_ABS32.
1155 Nonzero if R_ARM_TARGET1 means R_ARM_ABS32. */
1156 int target1_is_rel;
1157
eb043451
PB
1158 /* The relocation to use for R_ARM_TARGET2 relocations. */
1159 int target2_reloc;
1160
e5a52504
MM
1161 /* The number of bytes in the initial entry in the PLT. */
1162 bfd_size_type plt_header_size;
1163
1164 /* The number of bytes in the subsequent PLT etries. */
1165 bfd_size_type plt_entry_size;
1166
1167 /* True if the target system is Symbian OS. */
1168 int symbian_p;
1169
5e681ec4
PB
1170 /* Short-cuts to get to dynamic linker sections. */
1171 asection *sgot;
1172 asection *sgotplt;
1173 asection *srelgot;
1174 asection *splt;
1175 asection *srelplt;
1176 asection *sdynbss;
1177 asection *srelbss;
1178
1179 /* Small local sym to section mapping cache. */
1180 struct sym_sec_cache sym_sec;
917583ad 1181 };
252b5132 1182
780a67af
NC
1183/* Create an entry in an ARM ELF linker hash table. */
1184
1185static struct bfd_hash_entry *
57e8b36a
NC
1186elf32_arm_link_hash_newfunc (struct bfd_hash_entry * entry,
1187 struct bfd_hash_table * table,
1188 const char * string)
780a67af
NC
1189{
1190 struct elf32_arm_link_hash_entry * ret =
1191 (struct elf32_arm_link_hash_entry *) entry;
1192
1193 /* Allocate the structure if it has not already been allocated by a
1194 subclass. */
1195 if (ret == (struct elf32_arm_link_hash_entry *) NULL)
57e8b36a
NC
1196 ret = bfd_hash_allocate (table, sizeof (struct elf32_arm_link_hash_entry));
1197 if (ret == NULL)
780a67af
NC
1198 return (struct bfd_hash_entry *) ret;
1199
1200 /* Call the allocation method of the superclass. */
1201 ret = ((struct elf32_arm_link_hash_entry *)
1202 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
1203 table, string));
57e8b36a 1204 if (ret != NULL)
5e681ec4 1205 ret->relocs_copied = NULL;
780a67af
NC
1206
1207 return (struct bfd_hash_entry *) ret;
1208}
1209
5e681ec4
PB
1210/* Create .got, .gotplt, and .rel.got sections in DYNOBJ, and set up
1211 shortcuts to them in our hash table. */
1212
1213static bfd_boolean
57e8b36a 1214create_got_section (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
1215{
1216 struct elf32_arm_link_hash_table *htab;
1217
e5a52504
MM
1218 htab = elf32_arm_hash_table (info);
1219 /* BPABI objects never have a GOT, or associated sections. */
1220 if (htab->symbian_p)
1221 return TRUE;
1222
5e681ec4
PB
1223 if (! _bfd_elf_create_got_section (dynobj, info))
1224 return FALSE;
1225
5e681ec4
PB
1226 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
1227 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1228 if (!htab->sgot || !htab->sgotplt)
1229 abort ();
1230
1231 htab->srelgot = bfd_make_section (dynobj, ".rel.got");
1232 if (htab->srelgot == NULL
1233 || ! bfd_set_section_flags (dynobj, htab->srelgot,
1234 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
1235 | SEC_IN_MEMORY | SEC_LINKER_CREATED
1236 | SEC_READONLY))
1237 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 2))
1238 return FALSE;
1239 return TRUE;
1240}
1241
1242/* Create .plt, .rel.plt, .got, .got.plt, .rel.got, .dynbss, and
1243 .rel.bss sections in DYNOBJ, and set up shortcuts to them in our
1244 hash table. */
1245
1246static bfd_boolean
57e8b36a 1247elf32_arm_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
5e681ec4
PB
1248{
1249 struct elf32_arm_link_hash_table *htab;
1250
1251 htab = elf32_arm_hash_table (info);
1252 if (!htab->sgot && !create_got_section (dynobj, info))
1253 return FALSE;
1254
1255 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
1256 return FALSE;
1257
1258 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
1259 htab->srelplt = bfd_get_section_by_name (dynobj, ".rel.plt");
1260 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
1261 if (!info->shared)
1262 htab->srelbss = bfd_get_section_by_name (dynobj, ".rel.bss");
1263
e5a52504
MM
1264 if (!htab->splt
1265 || !htab->srelplt
1266 || !htab->sdynbss
5e681ec4
PB
1267 || (!info->shared && !htab->srelbss))
1268 abort ();
1269
1270 return TRUE;
1271}
1272
1273/* Copy the extra info we tack onto an elf_link_hash_entry. */
1274
1275static void
1276elf32_arm_copy_indirect_symbol (const struct elf_backend_data *bed,
1277 struct elf_link_hash_entry *dir,
1278 struct elf_link_hash_entry *ind)
1279{
1280 struct elf32_arm_link_hash_entry *edir, *eind;
1281
1282 edir = (struct elf32_arm_link_hash_entry *) dir;
1283 eind = (struct elf32_arm_link_hash_entry *) ind;
1284
1285 if (eind->relocs_copied != NULL)
1286 {
1287 if (edir->relocs_copied != NULL)
1288 {
1289 struct elf32_arm_relocs_copied **pp;
1290 struct elf32_arm_relocs_copied *p;
1291
1292 if (ind->root.type == bfd_link_hash_indirect)
1293 abort ();
1294
1295 /* Add reloc counts against the weak sym to the strong sym
1296 list. Merge any entries against the same section. */
1297 for (pp = &eind->relocs_copied; (p = *pp) != NULL; )
1298 {
1299 struct elf32_arm_relocs_copied *q;
1300
1301 for (q = edir->relocs_copied; q != NULL; q = q->next)
1302 if (q->section == p->section)
1303 {
5e681ec4
PB
1304 q->count += p->count;
1305 *pp = p->next;
1306 break;
1307 }
1308 if (q == NULL)
1309 pp = &p->next;
1310 }
1311 *pp = edir->relocs_copied;
1312 }
1313
1314 edir->relocs_copied = eind->relocs_copied;
1315 eind->relocs_copied = NULL;
1316 }
1317
1318 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
1319}
1320
9b485d32 1321/* Create an ARM elf linker hash table. */
252b5132
RH
1322
1323static struct bfd_link_hash_table *
57e8b36a 1324elf32_arm_link_hash_table_create (bfd *abfd)
252b5132
RH
1325{
1326 struct elf32_arm_link_hash_table *ret;
dc810e39 1327 bfd_size_type amt = sizeof (struct elf32_arm_link_hash_table);
252b5132 1328
57e8b36a
NC
1329 ret = bfd_malloc (amt);
1330 if (ret == NULL)
252b5132
RH
1331 return NULL;
1332
57e8b36a 1333 if (!_bfd_elf_link_hash_table_init (& ret->root, abfd,
780a67af 1334 elf32_arm_link_hash_newfunc))
252b5132 1335 {
e2d34d7d 1336 free (ret);
252b5132
RH
1337 return NULL;
1338 }
1339
5e681ec4
PB
1340 ret->sgot = NULL;
1341 ret->sgotplt = NULL;
1342 ret->srelgot = NULL;
1343 ret->splt = NULL;
1344 ret->srelplt = NULL;
1345 ret->sdynbss = NULL;
1346 ret->srelbss = NULL;
252b5132
RH
1347 ret->thumb_glue_size = 0;
1348 ret->arm_glue_size = 0;
1349 ret->bfd_of_glue_owner = NULL;
ba96a88f 1350 ret->no_pipeline_knowledge = 0;
e489d0ae 1351 ret->byteswap_code = 0;
9c504268 1352 ret->target1_is_rel = 0;
eb043451 1353 ret->target2_reloc = R_ARM_NONE;
e5a52504
MM
1354#ifdef FOUR_WORD_PLT
1355 ret->plt_header_size = 16;
1356 ret->plt_entry_size = 16;
1357#else
1358 ret->plt_header_size = 20;
1359 ret->plt_entry_size = 12;
1360#endif
1361 ret->symbian_p = 0;
5e681ec4 1362 ret->sym_sec.abfd = NULL;
252b5132
RH
1363
1364 return &ret->root.root;
1365}
1366
9b485d32
NC
1367/* Locate the Thumb encoded calling stub for NAME. */
1368
252b5132 1369static struct elf_link_hash_entry *
57e8b36a
NC
1370find_thumb_glue (struct bfd_link_info *link_info,
1371 const char *name,
1372 bfd *input_bfd)
252b5132
RH
1373{
1374 char *tmp_name;
1375 struct elf_link_hash_entry *hash;
1376 struct elf32_arm_link_hash_table *hash_table;
1377
1378 /* We need a pointer to the armelf specific hash table. */
1379 hash_table = elf32_arm_hash_table (link_info);
1380
57e8b36a
NC
1381 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1382 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1383
1384 BFD_ASSERT (tmp_name);
1385
1386 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
1387
1388 hash = elf_link_hash_lookup
b34976b6 1389 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1390
1391 if (hash == NULL)
1392 /* xgettext:c-format */
d003868e
AM
1393 (*_bfd_error_handler) (_("%B: unable to find THUMB glue '%s' for `%s'"),
1394 input_bfd, tmp_name, name);
252b5132
RH
1395
1396 free (tmp_name);
1397
1398 return hash;
1399}
1400
9b485d32
NC
1401/* Locate the ARM encoded calling stub for NAME. */
1402
252b5132 1403static struct elf_link_hash_entry *
57e8b36a
NC
1404find_arm_glue (struct bfd_link_info *link_info,
1405 const char *name,
1406 bfd *input_bfd)
252b5132
RH
1407{
1408 char *tmp_name;
1409 struct elf_link_hash_entry *myh;
1410 struct elf32_arm_link_hash_table *hash_table;
1411
1412 /* We need a pointer to the elfarm specific hash table. */
1413 hash_table = elf32_arm_hash_table (link_info);
1414
57e8b36a
NC
1415 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1416 + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1417
1418 BFD_ASSERT (tmp_name);
1419
1420 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
1421
1422 myh = elf_link_hash_lookup
b34976b6 1423 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1424
1425 if (myh == NULL)
1426 /* xgettext:c-format */
d003868e
AM
1427 (*_bfd_error_handler) (_("%B: unable to find ARM glue '%s' for `%s'"),
1428 input_bfd, tmp_name, name);
252b5132
RH
1429
1430 free (tmp_name);
1431
1432 return myh;
1433}
1434
9b485d32 1435/* ARM->Thumb glue:
252b5132
RH
1436
1437 .arm
1438 __func_from_arm:
1439 ldr r12, __func_addr
1440 bx r12
1441 __func_addr:
9b485d32 1442 .word func @ behave as if you saw a ARM_32 reloc. */
252b5132
RH
1443
1444#define ARM2THUMB_GLUE_SIZE 12
1445static const insn32 a2t1_ldr_insn = 0xe59fc000;
1446static const insn32 a2t2_bx_r12_insn = 0xe12fff1c;
1447static const insn32 a2t3_func_addr_insn = 0x00000001;
1448
9b485d32 1449/* Thumb->ARM: Thumb->(non-interworking aware) ARM
252b5132
RH
1450
1451 .thumb .thumb
1452 .align 2 .align 2
1453 __func_from_thumb: __func_from_thumb:
1454 bx pc push {r6, lr}
1455 nop ldr r6, __func_addr
1456 .arm mov lr, pc
1457 __func_change_to_arm: bx r6
1458 b func .arm
1459 __func_back_to_thumb:
1460 ldmia r13! {r6, lr}
1461 bx lr
1462 __func_addr:
9b485d32 1463 .word func */
252b5132
RH
1464
1465#define THUMB2ARM_GLUE_SIZE 8
1466static const insn16 t2a1_bx_pc_insn = 0x4778;
1467static const insn16 t2a2_noop_insn = 0x46c0;
1468static const insn32 t2a3_b_insn = 0xea000000;
1469
7e392df6 1470#ifndef ELFARM_NABI_C_INCLUDED
b34976b6 1471bfd_boolean
57e8b36a 1472bfd_elf32_arm_allocate_interworking_sections (struct bfd_link_info * info)
252b5132
RH
1473{
1474 asection * s;
1475 bfd_byte * foo;
1476 struct elf32_arm_link_hash_table * globals;
1477
1478 globals = elf32_arm_hash_table (info);
1479
1480 BFD_ASSERT (globals != NULL);
1481
1482 if (globals->arm_glue_size != 0)
1483 {
1484 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1485
dc810e39
AM
1486 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
1487 ARM2THUMB_GLUE_SECTION_NAME);
252b5132
RH
1488
1489 BFD_ASSERT (s != NULL);
1490
57e8b36a 1491 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->arm_glue_size);
252b5132 1492
eea6121a 1493 s->size = globals->arm_glue_size;
252b5132
RH
1494 s->contents = foo;
1495 }
1496
1497 if (globals->thumb_glue_size != 0)
1498 {
1499 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1500
1501 s = bfd_get_section_by_name
1502 (globals->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
1503
1504 BFD_ASSERT (s != NULL);
1505
57e8b36a 1506 foo = bfd_alloc (globals->bfd_of_glue_owner, globals->thumb_glue_size);
252b5132 1507
eea6121a 1508 s->size = globals->thumb_glue_size;
252b5132
RH
1509 s->contents = foo;
1510 }
1511
b34976b6 1512 return TRUE;
252b5132
RH
1513}
1514
1515static void
57e8b36a
NC
1516record_arm_to_thumb_glue (struct bfd_link_info * link_info,
1517 struct elf_link_hash_entry * h)
252b5132
RH
1518{
1519 const char * name = h->root.root.string;
63b0f745 1520 asection * s;
252b5132
RH
1521 char * tmp_name;
1522 struct elf_link_hash_entry * myh;
14a793b2 1523 struct bfd_link_hash_entry * bh;
252b5132 1524 struct elf32_arm_link_hash_table * globals;
dc810e39 1525 bfd_vma val;
252b5132
RH
1526
1527 globals = elf32_arm_hash_table (link_info);
1528
1529 BFD_ASSERT (globals != NULL);
1530 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1531
1532 s = bfd_get_section_by_name
1533 (globals->bfd_of_glue_owner, ARM2THUMB_GLUE_SECTION_NAME);
1534
252b5132
RH
1535 BFD_ASSERT (s != NULL);
1536
57e8b36a 1537 tmp_name = bfd_malloc ((bfd_size_type) strlen (name) + strlen (ARM2THUMB_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1538
1539 BFD_ASSERT (tmp_name);
1540
1541 sprintf (tmp_name, ARM2THUMB_GLUE_ENTRY_NAME, name);
1542
1543 myh = elf_link_hash_lookup
b34976b6 1544 (&(globals)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1545
1546 if (myh != NULL)
1547 {
9b485d32 1548 /* We've already seen this guy. */
252b5132 1549 free (tmp_name);
9b485d32 1550 return;
252b5132
RH
1551 }
1552
57e8b36a
NC
1553 /* The only trick here is using hash_table->arm_glue_size as the value.
1554 Even though the section isn't allocated yet, this is where we will be
1555 putting it. */
14a793b2 1556 bh = NULL;
dc810e39
AM
1557 val = globals->arm_glue_size + 1;
1558 _bfd_generic_link_add_one_symbol (link_info, globals->bfd_of_glue_owner,
1559 tmp_name, BSF_GLOBAL, s, val,
b34976b6 1560 NULL, TRUE, FALSE, &bh);
252b5132
RH
1561
1562 free (tmp_name);
1563
1564 globals->arm_glue_size += ARM2THUMB_GLUE_SIZE;
1565
1566 return;
1567}
1568
1569static void
57e8b36a
NC
1570record_thumb_to_arm_glue (struct bfd_link_info *link_info,
1571 struct elf_link_hash_entry *h)
252b5132
RH
1572{
1573 const char *name = h->root.root.string;
63b0f745 1574 asection *s;
252b5132
RH
1575 char *tmp_name;
1576 struct elf_link_hash_entry *myh;
14a793b2 1577 struct bfd_link_hash_entry *bh;
252b5132
RH
1578 struct elf32_arm_link_hash_table *hash_table;
1579 char bind;
dc810e39 1580 bfd_vma val;
252b5132
RH
1581
1582 hash_table = elf32_arm_hash_table (link_info);
1583
1584 BFD_ASSERT (hash_table != NULL);
1585 BFD_ASSERT (hash_table->bfd_of_glue_owner != NULL);
1586
1587 s = bfd_get_section_by_name
1588 (hash_table->bfd_of_glue_owner, THUMB2ARM_GLUE_SECTION_NAME);
1589
1590 BFD_ASSERT (s != NULL);
1591
57e8b36a
NC
1592 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1593 + strlen (THUMB2ARM_GLUE_ENTRY_NAME) + 1);
252b5132
RH
1594
1595 BFD_ASSERT (tmp_name);
1596
1597 sprintf (tmp_name, THUMB2ARM_GLUE_ENTRY_NAME, name);
1598
1599 myh = elf_link_hash_lookup
b34976b6 1600 (&(hash_table)->root, tmp_name, FALSE, FALSE, TRUE);
252b5132
RH
1601
1602 if (myh != NULL)
1603 {
9b485d32 1604 /* We've already seen this guy. */
252b5132 1605 free (tmp_name);
9b485d32 1606 return;
252b5132
RH
1607 }
1608
14a793b2 1609 bh = NULL;
dc810e39
AM
1610 val = hash_table->thumb_glue_size + 1;
1611 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
1612 tmp_name, BSF_GLOBAL, s, val,
b34976b6 1613 NULL, TRUE, FALSE, &bh);
252b5132 1614
9b485d32 1615 /* If we mark it 'Thumb', the disassembler will do a better job. */
14a793b2 1616 myh = (struct elf_link_hash_entry *) bh;
252b5132
RH
1617 bind = ELF_ST_BIND (myh->type);
1618 myh->type = ELF_ST_INFO (bind, STT_ARM_TFUNC);
1619
1620 free (tmp_name);
1621
252b5132
RH
1622#define CHANGE_TO_ARM "__%s_change_to_arm"
1623#define BACK_FROM_ARM "__%s_back_from_arm"
1624
9b485d32 1625 /* Allocate another symbol to mark where we switch to Arm mode. */
57e8b36a
NC
1626 tmp_name = bfd_malloc ((bfd_size_type) strlen (name)
1627 + strlen (CHANGE_TO_ARM) + 1);
252b5132
RH
1628
1629 BFD_ASSERT (tmp_name);
1630
1631 sprintf (tmp_name, CHANGE_TO_ARM, name);
1632
14a793b2 1633 bh = NULL;
dc810e39
AM
1634 val = hash_table->thumb_glue_size + 4,
1635 _bfd_generic_link_add_one_symbol (link_info, hash_table->bfd_of_glue_owner,
1636 tmp_name, BSF_LOCAL, s, val,
b34976b6 1637 NULL, TRUE, FALSE, &bh);
252b5132
RH
1638
1639 free (tmp_name);
1640
1641 hash_table->thumb_glue_size += THUMB2ARM_GLUE_SIZE;
1642
1643 return;
1644}
1645
8afb0e02
NC
1646/* Add the glue sections to ABFD. This function is called from the
1647 linker scripts in ld/emultempl/{armelf}.em. */
9b485d32 1648
b34976b6 1649bfd_boolean
57e8b36a
NC
1650bfd_elf32_arm_add_glue_sections_to_bfd (bfd *abfd,
1651 struct bfd_link_info *info)
252b5132 1652{
252b5132
RH
1653 flagword flags;
1654 asection *sec;
1655
8afb0e02
NC
1656 /* If we are only performing a partial
1657 link do not bother adding the glue. */
1049f94e 1658 if (info->relocatable)
b34976b6 1659 return TRUE;
252b5132 1660
252b5132
RH
1661 sec = bfd_get_section_by_name (abfd, ARM2THUMB_GLUE_SECTION_NAME);
1662
1663 if (sec == NULL)
1664 {
57db232e
NC
1665 /* Note: we do not include the flag SEC_LINKER_CREATED, as this
1666 will prevent elf_link_input_bfd() from processing the contents
1667 of this section. */
811b4bf6 1668 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_CODE | SEC_READONLY;
252b5132
RH
1669
1670 sec = bfd_make_section (abfd, ARM2THUMB_GLUE_SECTION_NAME);
1671
1672 if (sec == NULL
1673 || !bfd_set_section_flags (abfd, sec, flags)
1674 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 1675 return FALSE;
9a5aca8c 1676
57db232e
NC
1677 /* Set the gc mark to prevent the section from being removed by garbage
1678 collection, despite the fact that no relocs refer to this section. */
1679 sec->gc_mark = 1;
252b5132
RH
1680 }
1681
1682 sec = bfd_get_section_by_name (abfd, THUMB2ARM_GLUE_SECTION_NAME);
1683
1684 if (sec == NULL)
1685 {
57e8b36a
NC
1686 flags = SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1687 | SEC_CODE | SEC_READONLY;
252b5132
RH
1688
1689 sec = bfd_make_section (abfd, THUMB2ARM_GLUE_SECTION_NAME);
1690
1691 if (sec == NULL
1692 || !bfd_set_section_flags (abfd, sec, flags)
1693 || !bfd_set_section_alignment (abfd, sec, 2))
b34976b6 1694 return FALSE;
9a5aca8c 1695
57db232e 1696 sec->gc_mark = 1;
252b5132
RH
1697 }
1698
b34976b6 1699 return TRUE;
8afb0e02
NC
1700}
1701
1702/* Select a BFD to be used to hold the sections used by the glue code.
1703 This function is called from the linker scripts in ld/emultempl/
1704 {armelf/pe}.em */
1705
b34976b6 1706bfd_boolean
57e8b36a 1707bfd_elf32_arm_get_bfd_for_interworking (bfd *abfd, struct bfd_link_info *info)
8afb0e02
NC
1708{
1709 struct elf32_arm_link_hash_table *globals;
1710
1711 /* If we are only performing a partial link
1712 do not bother getting a bfd to hold the glue. */
1049f94e 1713 if (info->relocatable)
b34976b6 1714 return TRUE;
8afb0e02
NC
1715
1716 globals = elf32_arm_hash_table (info);
1717
1718 BFD_ASSERT (globals != NULL);
1719
1720 if (globals->bfd_of_glue_owner != NULL)
b34976b6 1721 return TRUE;
8afb0e02 1722
252b5132
RH
1723 /* Save the bfd for later use. */
1724 globals->bfd_of_glue_owner = abfd;
cedb70c5 1725
b34976b6 1726 return TRUE;
252b5132
RH
1727}
1728
b34976b6 1729bfd_boolean
57e8b36a
NC
1730bfd_elf32_arm_process_before_allocation (bfd *abfd,
1731 struct bfd_link_info *link_info,
1732 int no_pipeline_knowledge,
eb043451 1733 int byteswap_code)
252b5132
RH
1734{
1735 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 1736 Elf_Internal_Rela *internal_relocs = NULL;
252b5132
RH
1737 Elf_Internal_Rela *irel, *irelend;
1738 bfd_byte *contents = NULL;
252b5132
RH
1739
1740 asection *sec;
1741 struct elf32_arm_link_hash_table *globals;
1742
1743 /* If we are only performing a partial link do not bother
1744 to construct any glue. */
1049f94e 1745 if (link_info->relocatable)
b34976b6 1746 return TRUE;
252b5132
RH
1747
1748 /* Here we have a bfd that is to be included on the link. We have a hook
1749 to do reloc rummaging, before section sizes are nailed down. */
252b5132
RH
1750 globals = elf32_arm_hash_table (link_info);
1751
1752 BFD_ASSERT (globals != NULL);
1753 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
1754
ba96a88f 1755 globals->no_pipeline_knowledge = no_pipeline_knowledge;
eb043451 1756
e489d0ae
PB
1757 if (byteswap_code && !bfd_big_endian (abfd))
1758 {
d003868e
AM
1759 _bfd_error_handler (_("%B: BE8 images only valid in big-endian mode."),
1760 abfd);
e489d0ae
PB
1761 return FALSE;
1762 }
1763 globals->byteswap_code = byteswap_code;
f21f3fe0 1764
252b5132
RH
1765 /* Rummage around all the relocs and map the glue vectors. */
1766 sec = abfd->sections;
1767
1768 if (sec == NULL)
b34976b6 1769 return TRUE;
252b5132
RH
1770
1771 for (; sec != NULL; sec = sec->next)
1772 {
1773 if (sec->reloc_count == 0)
1774 continue;
1775
1776 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
252b5132 1777
9b485d32 1778 /* Load the relocs. */
6cdc0ccc 1779 internal_relocs
57e8b36a 1780 = _bfd_elf_link_read_relocs (abfd, sec, (void *) NULL,
45d6a902 1781 (Elf_Internal_Rela *) NULL, FALSE);
252b5132 1782
6cdc0ccc
AM
1783 if (internal_relocs == NULL)
1784 goto error_return;
252b5132 1785
6cdc0ccc
AM
1786 irelend = internal_relocs + sec->reloc_count;
1787 for (irel = internal_relocs; irel < irelend; irel++)
252b5132
RH
1788 {
1789 long r_type;
1790 unsigned long r_index;
252b5132
RH
1791
1792 struct elf_link_hash_entry *h;
1793
1794 r_type = ELF32_R_TYPE (irel->r_info);
1795 r_index = ELF32_R_SYM (irel->r_info);
1796
9b485d32 1797 /* These are the only relocation types we care about. */
ba96a88f 1798 if ( r_type != R_ARM_PC24
5b5bb741
PB
1799#ifndef OLD_ARM_ABI
1800 && r_type != R_ARM_CALL
1801 && r_type != R_ARM_JUMP24
1802#endif
252b5132
RH
1803 && r_type != R_ARM_THM_PC22)
1804 continue;
1805
1806 /* Get the section contents if we haven't done so already. */
1807 if (contents == NULL)
1808 {
1809 /* Get cached copy if it exists. */
1810 if (elf_section_data (sec)->this_hdr.contents != NULL)
1811 contents = elf_section_data (sec)->this_hdr.contents;
1812 else
1813 {
1814 /* Go get them off disk. */
57e8b36a 1815 if (! bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
1816 goto error_return;
1817 }
1818 }
1819
a7c10850 1820 /* If the relocation is not against a symbol it cannot concern us. */
252b5132
RH
1821 h = NULL;
1822
9b485d32 1823 /* We don't care about local symbols. */
252b5132
RH
1824 if (r_index < symtab_hdr->sh_info)
1825 continue;
1826
9b485d32 1827 /* This is an external symbol. */
252b5132
RH
1828 r_index -= symtab_hdr->sh_info;
1829 h = (struct elf_link_hash_entry *)
1830 elf_sym_hashes (abfd)[r_index];
1831
1832 /* If the relocation is against a static symbol it must be within
1833 the current section and so cannot be a cross ARM/Thumb relocation. */
1834 if (h == NULL)
1835 continue;
1836
1837 switch (r_type)
1838 {
1839 case R_ARM_PC24:
5b5bb741
PB
1840#ifndef OLD_ARM_ABI
1841 case R_ARM_CALL:
1842 case R_ARM_JUMP24:
1843#endif
252b5132 1844 /* This one is a call from arm code. We need to look up
2f0ca46a 1845 the target of the call. If it is a thumb target, we
252b5132 1846 insert glue. */
252b5132
RH
1847 if (ELF_ST_TYPE(h->type) == STT_ARM_TFUNC)
1848 record_arm_to_thumb_glue (link_info, h);
1849 break;
1850
1851 case R_ARM_THM_PC22:
f21f3fe0 1852 /* This one is a call from thumb code. We look
2f0ca46a 1853 up the target of the call. If it is not a thumb
bcbdc74c 1854 target, we insert glue. */
252b5132
RH
1855 if (ELF_ST_TYPE (h->type) != STT_ARM_TFUNC)
1856 record_thumb_to_arm_glue (link_info, h);
1857 break;
1858
1859 default:
1860 break;
1861 }
1862 }
6cdc0ccc
AM
1863
1864 if (contents != NULL
1865 && elf_section_data (sec)->this_hdr.contents != contents)
1866 free (contents);
1867 contents = NULL;
1868
1869 if (internal_relocs != NULL
1870 && elf_section_data (sec)->relocs != internal_relocs)
1871 free (internal_relocs);
1872 internal_relocs = NULL;
252b5132
RH
1873 }
1874
b34976b6 1875 return TRUE;
9a5aca8c 1876
252b5132 1877error_return:
6cdc0ccc
AM
1878 if (contents != NULL
1879 && elf_section_data (sec)->this_hdr.contents != contents)
1880 free (contents);
1881 if (internal_relocs != NULL
1882 && elf_section_data (sec)->relocs != internal_relocs)
1883 free (internal_relocs);
9a5aca8c 1884
b34976b6 1885 return FALSE;
252b5132 1886}
7e392df6 1887#endif
252b5132 1888
eb043451
PB
1889
1890#ifndef OLD_ARM_ABI
1891/* Set target relocation values needed during linking. */
1892
1893void
1894bfd_elf32_arm_set_target_relocs (struct bfd_link_info *link_info,
1895 int target1_is_rel,
1896 char * target2_type)
1897{
1898 struct elf32_arm_link_hash_table *globals;
1899
1900 globals = elf32_arm_hash_table (link_info);
1901
1902 globals->target1_is_rel = target1_is_rel;
1903 if (strcmp (target2_type, "rel") == 0)
1904 globals->target2_reloc = R_ARM_REL32;
eeac373a
PB
1905 else if (strcmp (target2_type, "abs") == 0)
1906 globals->target2_reloc = R_ARM_ABS32;
eb043451
PB
1907 else if (strcmp (target2_type, "got-rel") == 0)
1908 globals->target2_reloc = R_ARM_GOT_PREL;
1909 else
1910 {
1911 _bfd_error_handler (_("Invalid TARGET2 relocation type '%s'."),
1912 target2_type);
1913 }
1914}
1915#endif
1916
252b5132
RH
1917/* The thumb form of a long branch is a bit finicky, because the offset
1918 encoding is split over two fields, each in it's own instruction. They
f21f3fe0 1919 can occur in any order. So given a thumb form of long branch, and an
252b5132 1920 offset, insert the offset into the thumb branch and return finished
f21f3fe0 1921 instruction.
252b5132 1922
f21f3fe0 1923 It takes two thumb instructions to encode the target address. Each has
4cc11e76 1924 11 bits to invest. The upper 11 bits are stored in one (identified by
f21f3fe0
UD
1925 H-0.. see below), the lower 11 bits are stored in the other (identified
1926 by H-1).
252b5132 1927
f21f3fe0 1928 Combine together and shifted left by 1 (it's a half word address) and
252b5132
RH
1929 there you have it.
1930
1931 Op: 1111 = F,
1932 H-0, upper address-0 = 000
1933 Op: 1111 = F,
1934 H-1, lower address-0 = 800
1935
f21f3fe0 1936 They can be ordered either way, but the arm tools I've seen always put
252b5132
RH
1937 the lower one first. It probably doesn't matter. krk@cygnus.com
1938
1939 XXX: Actually the order does matter. The second instruction (H-1)
1940 moves the computed address into the PC, so it must be the second one
1941 in the sequence. The problem, however is that whilst little endian code
1942 stores the instructions in HI then LOW order, big endian code does the
dfc5f959 1943 reverse. nickc@cygnus.com. */
252b5132 1944
dfc5f959
NC
1945#define LOW_HI_ORDER 0xF800F000
1946#define HI_LOW_ORDER 0xF000F800
252b5132
RH
1947
1948static insn32
57e8b36a 1949insert_thumb_branch (insn32 br_insn, int rel_off)
252b5132
RH
1950{
1951 unsigned int low_bits;
1952 unsigned int high_bits;
1953
252b5132
RH
1954 BFD_ASSERT ((rel_off & 1) != 1);
1955
dfc5f959
NC
1956 rel_off >>= 1; /* Half word aligned address. */
1957 low_bits = rel_off & 0x000007FF; /* The bottom 11 bits. */
1958 high_bits = (rel_off >> 11) & 0x000007FF; /* The top 11 bits. */
252b5132
RH
1959
1960 if ((br_insn & LOW_HI_ORDER) == LOW_HI_ORDER)
1961 br_insn = LOW_HI_ORDER | (low_bits << 16) | high_bits;
1962 else if ((br_insn & HI_LOW_ORDER) == HI_LOW_ORDER)
1963 br_insn = HI_LOW_ORDER | (high_bits << 16) | low_bits;
1964 else
9b485d32 1965 /* FIXME: abort is probably not the right call. krk@cygnus.com */
57e8b36a 1966 abort (); /* Error - not a valid branch instruction form. */
252b5132 1967
252b5132
RH
1968 return br_insn;
1969}
1970
9b485d32
NC
1971/* Thumb code calling an ARM function. */
1972
252b5132 1973static int
57e8b36a
NC
1974elf32_thumb_to_arm_stub (struct bfd_link_info * info,
1975 const char * name,
1976 bfd * input_bfd,
1977 bfd * output_bfd,
1978 asection * input_section,
1979 bfd_byte * hit_data,
1980 asection * sym_sec,
1981 bfd_vma offset,
1982 bfd_signed_vma addend,
1983 bfd_vma val)
252b5132 1984{
bcbdc74c 1985 asection * s = 0;
dc810e39 1986 bfd_vma my_offset;
252b5132
RH
1987 unsigned long int tmp;
1988 long int ret_offset;
bcbdc74c
NC
1989 struct elf_link_hash_entry * myh;
1990 struct elf32_arm_link_hash_table * globals;
252b5132
RH
1991
1992 myh = find_thumb_glue (info, name, input_bfd);
1993 if (myh == NULL)
b34976b6 1994 return FALSE;
252b5132
RH
1995
1996 globals = elf32_arm_hash_table (info);
1997
1998 BFD_ASSERT (globals != NULL);
1999 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
2000
2001 my_offset = myh->root.u.def.value;
2002
2003 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
2004 THUMB2ARM_GLUE_SECTION_NAME);
2005
2006 BFD_ASSERT (s != NULL);
2007 BFD_ASSERT (s->contents != NULL);
2008 BFD_ASSERT (s->output_section != NULL);
2009
2010 if ((my_offset & 0x01) == 0x01)
2011 {
2012 if (sym_sec != NULL
2013 && sym_sec->owner != NULL
2014 && !INTERWORK_FLAG (sym_sec->owner))
2015 {
8f615d07 2016 (*_bfd_error_handler)
d003868e
AM
2017 (_("%B(%s): warning: interworking not enabled.\n"
2018 " first occurrence: %B: thumb call to arm"),
2019 sym_sec->owner, input_bfd, name);
252b5132 2020
b34976b6 2021 return FALSE;
252b5132
RH
2022 }
2023
2024 --my_offset;
2025 myh->root.u.def.value = my_offset;
2026
dc810e39 2027 bfd_put_16 (output_bfd, (bfd_vma) t2a1_bx_pc_insn,
252b5132
RH
2028 s->contents + my_offset);
2029
dc810e39 2030 bfd_put_16 (output_bfd, (bfd_vma) t2a2_noop_insn,
252b5132
RH
2031 s->contents + my_offset + 2);
2032
2033 ret_offset =
9b485d32
NC
2034 /* Address of destination of the stub. */
2035 ((bfd_signed_vma) val)
252b5132 2036 - ((bfd_signed_vma)
57e8b36a
NC
2037 /* Offset from the start of the current section
2038 to the start of the stubs. */
9b485d32
NC
2039 (s->output_offset
2040 /* Offset of the start of this stub from the start of the stubs. */
2041 + my_offset
2042 /* Address of the start of the current section. */
2043 + s->output_section->vma)
2044 /* The branch instruction is 4 bytes into the stub. */
2045 + 4
2046 /* ARM branches work from the pc of the instruction + 8. */
2047 + 8);
252b5132
RH
2048
2049 bfd_put_32 (output_bfd,
dc810e39 2050 (bfd_vma) t2a3_b_insn | ((ret_offset >> 2) & 0x00FFFFFF),
252b5132
RH
2051 s->contents + my_offset + 4);
2052 }
2053
2054 BFD_ASSERT (my_offset <= globals->thumb_glue_size);
2055
427bfd90
NC
2056 /* Now go back and fix up the original BL insn to point to here. */
2057 ret_offset =
2058 /* Address of where the stub is located. */
2059 (s->output_section->vma + s->output_offset + my_offset)
2060 /* Address of where the BL is located. */
57e8b36a
NC
2061 - (input_section->output_section->vma + input_section->output_offset
2062 + offset)
427bfd90
NC
2063 /* Addend in the relocation. */
2064 - addend
2065 /* Biassing for PC-relative addressing. */
2066 - 8;
252b5132
RH
2067
2068 tmp = bfd_get_32 (input_bfd, hit_data
2069 - input_section->vma);
2070
2071 bfd_put_32 (output_bfd,
dc810e39 2072 (bfd_vma) insert_thumb_branch (tmp, ret_offset),
252b5132
RH
2073 hit_data - input_section->vma);
2074
b34976b6 2075 return TRUE;
252b5132
RH
2076}
2077
9b485d32
NC
2078/* Arm code calling a Thumb function. */
2079
252b5132 2080static int
57e8b36a
NC
2081elf32_arm_to_thumb_stub (struct bfd_link_info * info,
2082 const char * name,
2083 bfd * input_bfd,
2084 bfd * output_bfd,
2085 asection * input_section,
2086 bfd_byte * hit_data,
2087 asection * sym_sec,
2088 bfd_vma offset,
2089 bfd_signed_vma addend,
2090 bfd_vma val)
252b5132
RH
2091{
2092 unsigned long int tmp;
dc810e39 2093 bfd_vma my_offset;
bcbdc74c 2094 asection * s;
252b5132 2095 long int ret_offset;
bcbdc74c
NC
2096 struct elf_link_hash_entry * myh;
2097 struct elf32_arm_link_hash_table * globals;
252b5132
RH
2098
2099 myh = find_arm_glue (info, name, input_bfd);
2100 if (myh == NULL)
b34976b6 2101 return FALSE;
252b5132
RH
2102
2103 globals = elf32_arm_hash_table (info);
2104
2105 BFD_ASSERT (globals != NULL);
2106 BFD_ASSERT (globals->bfd_of_glue_owner != NULL);
2107
2108 my_offset = myh->root.u.def.value;
2109 s = bfd_get_section_by_name (globals->bfd_of_glue_owner,
2110 ARM2THUMB_GLUE_SECTION_NAME);
2111 BFD_ASSERT (s != NULL);
2112 BFD_ASSERT (s->contents != NULL);
2113 BFD_ASSERT (s->output_section != NULL);
2114
2115 if ((my_offset & 0x01) == 0x01)
2116 {
2117 if (sym_sec != NULL
2118 && sym_sec->owner != NULL
2119 && !INTERWORK_FLAG (sym_sec->owner))
2120 {
8f615d07 2121 (*_bfd_error_handler)
d003868e
AM
2122 (_("%B(%s): warning: interworking not enabled.\n"
2123 " first occurrence: %B: arm call to thumb"),
2124 sym_sec->owner, input_bfd, name);
252b5132 2125 }
9b485d32 2126
252b5132
RH
2127 --my_offset;
2128 myh->root.u.def.value = my_offset;
2129
dc810e39 2130 bfd_put_32 (output_bfd, (bfd_vma) a2t1_ldr_insn,
252b5132
RH
2131 s->contents + my_offset);
2132
dc810e39 2133 bfd_put_32 (output_bfd, (bfd_vma) a2t2_bx_r12_insn,
252b5132
RH
2134 s->contents + my_offset + 4);
2135
2136 /* It's a thumb address. Add the low order bit. */
2137 bfd_put_32 (output_bfd, val | a2t3_func_addr_insn,
2138 s->contents + my_offset + 8);
2139 }
2140
2141 BFD_ASSERT (my_offset <= globals->arm_glue_size);
2142
2143 tmp = bfd_get_32 (input_bfd, hit_data);
2144 tmp = tmp & 0xFF000000;
2145
9b485d32 2146 /* Somehow these are both 4 too far, so subtract 8. */
dc810e39
AM
2147 ret_offset = (s->output_offset
2148 + my_offset
2149 + s->output_section->vma
2150 - (input_section->output_offset
2151 + input_section->output_section->vma
2152 + offset + addend)
2153 - 8);
9a5aca8c 2154
252b5132
RH
2155 tmp = tmp | ((ret_offset >> 2) & 0x00FFFFFF);
2156
dc810e39 2157 bfd_put_32 (output_bfd, (bfd_vma) tmp, hit_data - input_section->vma);
252b5132 2158
b34976b6 2159 return TRUE;
252b5132
RH
2160}
2161
eb043451
PB
2162
2163#ifndef OLD_ARM_ABI
2164/* Some relocations map to different relocations depending on the
2165 target. Return the real relocation. */
2166static int
2167arm_real_reloc_type (struct elf32_arm_link_hash_table * globals,
2168 int r_type)
2169{
2170 switch (r_type)
2171 {
2172 case R_ARM_TARGET1:
2173 if (globals->target1_is_rel)
2174 return R_ARM_REL32;
2175 else
2176 return R_ARM_ABS32;
2177
2178 case R_ARM_TARGET2:
2179 return globals->target2_reloc;
2180
2181 default:
2182 return r_type;
2183 }
2184}
2185#endif /* OLD_ARM_ABI */
2186
2187
252b5132 2188/* Perform a relocation as part of a final link. */
9b485d32 2189
252b5132 2190static bfd_reloc_status_type
57e8b36a
NC
2191elf32_arm_final_link_relocate (reloc_howto_type * howto,
2192 bfd * input_bfd,
2193 bfd * output_bfd,
2194 asection * input_section,
2195 bfd_byte * contents,
2196 Elf_Internal_Rela * rel,
2197 bfd_vma value,
2198 struct bfd_link_info * info,
2199 asection * sym_sec,
2200 const char * sym_name,
2201 int sym_flags,
2202 struct elf_link_hash_entry * h)
252b5132
RH
2203{
2204 unsigned long r_type = howto->type;
2205 unsigned long r_symndx;
2206 bfd_byte * hit_data = contents + rel->r_offset;
2207 bfd * dynobj = NULL;
2208 Elf_Internal_Shdr * symtab_hdr;
2209 struct elf_link_hash_entry ** sym_hashes;
2210 bfd_vma * local_got_offsets;
2211 asection * sgot = NULL;
2212 asection * splt = NULL;
2213 asection * sreloc = NULL;
252b5132 2214 bfd_vma addend;
ba96a88f
NC
2215 bfd_signed_vma signed_addend;
2216 struct elf32_arm_link_hash_table * globals;
f21f3fe0 2217
9c504268
PB
2218 globals = elf32_arm_hash_table (info);
2219
2220#ifndef OLD_ARM_ABI
2221 /* Some relocation type map to different relocations depending on the
2222 target. We pick the right one here. */
eb043451
PB
2223 r_type = arm_real_reloc_type (globals, r_type);
2224 if (r_type != howto->type)
2225 howto = elf32_arm_howto_from_type (r_type);
9c504268
PB
2226#endif /* OLD_ARM_ABI */
2227
cac15327
NC
2228 /* If the start address has been set, then set the EF_ARM_HASENTRY
2229 flag. Setting this more than once is redundant, but the cost is
2230 not too high, and it keeps the code simple.
99e4ae17 2231
cac15327
NC
2232 The test is done here, rather than somewhere else, because the
2233 start address is only set just before the final link commences.
2234
2235 Note - if the user deliberately sets a start address of 0, the
2236 flag will not be set. */
2237 if (bfd_get_start_address (output_bfd) != 0)
2238 elf_elfheader (output_bfd)->e_flags |= EF_ARM_HASENTRY;
99e4ae17 2239
252b5132
RH
2240 dynobj = elf_hash_table (info)->dynobj;
2241 if (dynobj)
2242 {
2243 sgot = bfd_get_section_by_name (dynobj, ".got");
2244 splt = bfd_get_section_by_name (dynobj, ".plt");
2245 }
2246 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
2247 sym_hashes = elf_sym_hashes (input_bfd);
2248 local_got_offsets = elf_local_got_offsets (input_bfd);
2249 r_symndx = ELF32_R_SYM (rel->r_info);
2250
acf8aed4 2251#if USE_REL
ba96a88f
NC
2252 addend = bfd_get_32 (input_bfd, hit_data) & howto->src_mask;
2253
2254 if (addend & ((howto->src_mask + 1) >> 1))
2255 {
2256 signed_addend = -1;
2257 signed_addend &= ~ howto->src_mask;
2258 signed_addend |= addend;
2259 }
2260 else
2261 signed_addend = addend;
252b5132 2262#else
ba96a88f 2263 addend = signed_addend = rel->r_addend;
252b5132 2264#endif
f21f3fe0 2265
252b5132
RH
2266 switch (r_type)
2267 {
2268 case R_ARM_NONE:
2269 return bfd_reloc_ok;
2270
2271 case R_ARM_PC24:
2272 case R_ARM_ABS32:
2273 case R_ARM_REL32:
dfc5f959 2274#ifndef OLD_ARM_ABI
5b5bb741
PB
2275 case R_ARM_CALL:
2276 case R_ARM_JUMP24:
dfc5f959 2277 case R_ARM_XPC25:
eb043451 2278 case R_ARM_PREL31:
dfc5f959 2279#endif
7359ea65 2280 case R_ARM_PLT32:
5e681ec4
PB
2281 /* r_symndx will be zero only for relocs against symbols
2282 from removed linkonce sections, or sections discarded by
2283 a linker script. */
2284 if (r_symndx == 0)
2285 return bfd_reloc_ok;
2286
7359ea65
DJ
2287 /* Handle relocations which should use the PLT entry. ABS32/REL32
2288 will use the symbol's value, which may point to a PLT entry, but we
2289 don't need to handle that here. If we created a PLT entry, all
2290 branches in this object should go to it. */
eb043451
PB
2291 if ((r_type != R_ARM_ABS32 && r_type != R_ARM_REL32
2292#ifndef OLD_ARM_ABI
2293 && r_type != R_ARM_PREL31
2294#endif
2295 )
7359ea65 2296 && h != NULL
c84cd8ee 2297 && splt != NULL
7359ea65
DJ
2298 && h->plt.offset != (bfd_vma) -1)
2299 {
c84cd8ee
DJ
2300 /* If we've created a .plt section, and assigned a PLT entry to
2301 this function, it should not be known to bind locally. If
2302 it were, we would have cleared the PLT entry. */
7359ea65
DJ
2303 BFD_ASSERT (!SYMBOL_CALLS_LOCAL (info, h));
2304
2305 value = (splt->output_section->vma
2306 + splt->output_offset
2307 + h->plt.offset);
2308 return _bfd_final_link_relocate (howto, input_bfd, input_section,
2309 contents, rel->r_offset, value,
2310 (bfd_vma) 0);
2311 }
2312
252b5132 2313 /* When generating a shared object, these relocations are copied
9b485d32 2314 into the output file to be resolved at run time. */
7359ea65
DJ
2315 if (info->shared
2316 && (input_section->flags & SEC_ALLOC)
eb043451
PB
2317 && ((r_type != R_ARM_REL32
2318#ifndef OLD_ARM_ABI
2319 && r_type != R_ARM_PREL31
2320#endif
2321 ) || !SYMBOL_CALLS_LOCAL (info, h))
7359ea65
DJ
2322 && (h == NULL
2323 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2324 || h->root.type != bfd_link_hash_undefweak)
2325 && r_type != R_ARM_PC24
5b5bb741
PB
2326#ifndef OLD_ARM_ABI
2327 && r_type != R_ARM_CALL
2328 && r_type != R_ARM_JUMP24
2329#endif
7359ea65 2330 && r_type != R_ARM_PLT32)
252b5132 2331 {
947216bf
AM
2332 Elf_Internal_Rela outrel;
2333 bfd_byte *loc;
b34976b6 2334 bfd_boolean skip, relocate;
f21f3fe0 2335
252b5132
RH
2336 if (sreloc == NULL)
2337 {
2338 const char * name;
f21f3fe0 2339
252b5132
RH
2340 name = (bfd_elf_string_from_elf_section
2341 (input_bfd,
2342 elf_elfheader (input_bfd)->e_shstrndx,
2343 elf_section_data (input_section)->rel_hdr.sh_name));
2344 if (name == NULL)
2345 return bfd_reloc_notsupported;
f21f3fe0 2346
252b5132
RH
2347 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
2348 && strcmp (bfd_get_section_name (input_bfd,
2349 input_section),
2350 name + 4) == 0);
f21f3fe0 2351
252b5132
RH
2352 sreloc = bfd_get_section_by_name (dynobj, name);
2353 BFD_ASSERT (sreloc != NULL);
2354 }
f21f3fe0 2355
b34976b6
AM
2356 skip = FALSE;
2357 relocate = FALSE;
f21f3fe0 2358
c629eae0
JJ
2359 outrel.r_offset =
2360 _bfd_elf_section_offset (output_bfd, info, input_section,
2361 rel->r_offset);
2362 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2363 skip = TRUE;
0bb2d96a 2364 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2365 skip = TRUE, relocate = TRUE;
252b5132
RH
2366 outrel.r_offset += (input_section->output_section->vma
2367 + input_section->output_offset);
f21f3fe0 2368
252b5132 2369 if (skip)
0bb2d96a 2370 memset (&outrel, 0, sizeof outrel);
5e681ec4
PB
2371 else if (h != NULL
2372 && h->dynindx != -1
7359ea65 2373 && (!info->shared
5e681ec4 2374 || !info->symbolic
f5385ebf 2375 || !h->def_regular))
5e681ec4 2376 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
252b5132
RH
2377 else
2378 {
a16385dc
MM
2379 int symbol;
2380
5e681ec4
PB
2381 /* This symbol is local, or marked to become local. */
2382 relocate = TRUE;
a16385dc
MM
2383 if (globals->symbian_p)
2384 /* On Symbian OS, the data segment and text segement
2385 can be relocated independently. Therefore, we must
2386 indicate the segment to which this relocation is
2387 relative. The BPABI allows us to use any symbol in
2388 the right segment; we just use the section symbol
2389 as it is convenient. (We cannot use the symbol
2390 given by "h" directly as it will not appear in the
2391 dynamic symbol table.) */
2392 symbol = input_section->output_section->target_index;
2393 else
2394 /* On SVR4-ish systems, the dynamic loader cannot
2395 relocate the text and data segments independently,
2396 so the symbol does not matter. */
2397 symbol = 0;
2398 outrel.r_info = ELF32_R_INFO (symbol, R_ARM_RELATIVE);
252b5132 2399 }
f21f3fe0 2400
947216bf
AM
2401 loc = sreloc->contents;
2402 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rel);
2403 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
9a5aca8c 2404
f21f3fe0 2405 /* If this reloc is against an external symbol, we do not want to
252b5132 2406 fiddle with the addend. Otherwise, we need to include the symbol
9b485d32 2407 value so that it becomes an addend for the dynamic reloc. */
252b5132
RH
2408 if (! relocate)
2409 return bfd_reloc_ok;
9a5aca8c 2410
f21f3fe0 2411 return _bfd_final_link_relocate (howto, input_bfd, input_section,
252b5132
RH
2412 contents, rel->r_offset, value,
2413 (bfd_vma) 0);
2414 }
2415 else switch (r_type)
2416 {
dfc5f959
NC
2417#ifndef OLD_ARM_ABI
2418 case R_ARM_XPC25: /* Arm BLX instruction. */
5b5bb741
PB
2419 case R_ARM_CALL:
2420 case R_ARM_JUMP24:
dfc5f959
NC
2421#endif
2422 case R_ARM_PC24: /* Arm B/BL instruction */
7359ea65 2423 case R_ARM_PLT32:
dfc5f959
NC
2424#ifndef OLD_ARM_ABI
2425 if (r_type == R_ARM_XPC25)
252b5132 2426 {
dfc5f959
NC
2427 /* Check for Arm calling Arm function. */
2428 /* FIXME: Should we translate the instruction into a BL
2429 instruction instead ? */
2430 if (sym_flags != STT_ARM_TFUNC)
d003868e
AM
2431 (*_bfd_error_handler)
2432 (_("\%B: Warning: Arm BLX instruction targets Arm function '%s'."),
2433 input_bfd,
2434 h ? h->root.root.string : "(local)");
dfc5f959
NC
2435 }
2436 else
2437#endif
2438 {
2439 /* Check for Arm calling Thumb function. */
2440 if (sym_flags == STT_ARM_TFUNC)
2441 {
57e8b36a
NC
2442 elf32_arm_to_thumb_stub (info, sym_name, input_bfd,
2443 output_bfd, input_section,
2444 hit_data, sym_sec, rel->r_offset,
dfc5f959
NC
2445 signed_addend, value);
2446 return bfd_reloc_ok;
2447 }
252b5132 2448 }
ba96a88f
NC
2449
2450 if ( strcmp (bfd_get_target (input_bfd), "elf32-littlearm-oabi") == 0
2451 || strcmp (bfd_get_target (input_bfd), "elf32-bigarm-oabi") == 0)
2452 {
2453 /* The old way of doing things. Trearing the addend as a
2454 byte sized field and adding in the pipeline offset. */
ba96a88f
NC
2455 value -= (input_section->output_section->vma
2456 + input_section->output_offset);
2457 value -= rel->r_offset;
2458 value += addend;
f21f3fe0 2459
ba96a88f
NC
2460 if (! globals->no_pipeline_knowledge)
2461 value -= 8;
2462 }
2463 else
2464 {
2465 /* The ARM ELF ABI says that this reloc is computed as: S - P + A
2466 where:
2467 S is the address of the symbol in the relocation.
2468 P is address of the instruction being relocated.
2469 A is the addend (extracted from the instruction) in bytes.
f21f3fe0 2470
ba96a88f 2471 S is held in 'value'.
57e8b36a
NC
2472 P is the base address of the section containing the
2473 instruction plus the offset of the reloc into that
2474 section, ie:
ba96a88f
NC
2475 (input_section->output_section->vma +
2476 input_section->output_offset +
2477 rel->r_offset).
2478 A is the addend, converted into bytes, ie:
2479 (signed_addend * 4)
2480
2481 Note: None of these operations have knowledge of the pipeline
57e8b36a
NC
2482 size of the processor, thus it is up to the assembler to
2483 encode this information into the addend. */
ba96a88f
NC
2484 value -= (input_section->output_section->vma
2485 + input_section->output_offset);
2486 value -= rel->r_offset;
2487 value += (signed_addend << howto->size);
f21f3fe0 2488
57e8b36a
NC
2489 /* Previous versions of this code also used to add in the
2490 pipeline offset here. This is wrong because the linker is
2491 not supposed to know about such things, and one day it might
2492 change. In order to support old binaries that need the old
2493 behaviour however, so we attempt to detect which ABI was
2494 used to create the reloc. */
ba96a88f 2495 if (! globals->no_pipeline_knowledge)
f21f3fe0 2496 {
ba96a88f 2497 Elf_Internal_Ehdr * i_ehdrp; /* Elf file header, internal form */
f21f3fe0 2498
ba96a88f 2499 i_ehdrp = elf_elfheader (input_bfd);
f21f3fe0 2500
ba96a88f
NC
2501 if (i_ehdrp->e_ident[EI_OSABI] == 0)
2502 value -= 8;
2503 }
2504 }
23080146 2505
dcb5e6e6
NC
2506 signed_addend = value;
2507 signed_addend >>= howto->rightshift;
9a5aca8c 2508
59f2c4e7
NC
2509 /* It is not an error for an undefined weak reference to be
2510 out of range. Any program that branches to such a symbol
9a5aca8c
AM
2511 is going to crash anyway, so there is no point worrying
2512 about getting the destination exactly right. */
59f2c4e7
NC
2513 if (! h || h->root.type != bfd_link_hash_undefweak)
2514 {
9b485d32 2515 /* Perform a signed range check. */
dcb5e6e6 2516 if ( signed_addend > ((bfd_signed_vma) (howto->dst_mask >> 1))
59f2c4e7
NC
2517 || signed_addend < - ((bfd_signed_vma) ((howto->dst_mask + 1) >> 1)))
2518 return bfd_reloc_overflow;
2519 }
9a5aca8c 2520
dcb5e6e6
NC
2521#ifndef OLD_ARM_ABI
2522 /* If necessary set the H bit in the BLX instruction. */
2523 if (r_type == R_ARM_XPC25 && ((value & 2) == 2))
2524 value = (signed_addend & howto->dst_mask)
2525 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask))
2526 | (1 << 24);
2527 else
2528#endif
2529 value = (signed_addend & howto->dst_mask)
2530 | (bfd_get_32 (input_bfd, hit_data) & (~ howto->dst_mask));
252b5132 2531 break;
f21f3fe0 2532
252b5132
RH
2533 case R_ARM_ABS32:
2534 value += addend;
2535 if (sym_flags == STT_ARM_TFUNC)
2536 value |= 1;
2537 break;
f21f3fe0 2538
252b5132
RH
2539 case R_ARM_REL32:
2540 value -= (input_section->output_section->vma
62efb346 2541 + input_section->output_offset + rel->r_offset);
252b5132
RH
2542 value += addend;
2543 break;
eb043451
PB
2544
2545#ifndef OLD_ARM_ABI
2546 case R_ARM_PREL31:
2547 value -= (input_section->output_section->vma
2548 + input_section->output_offset + rel->r_offset);
2549 value += signed_addend;
2550 if (! h || h->root.type != bfd_link_hash_undefweak)
2551 {
2552 /* Check for overflow */
2553 if ((value ^ (value >> 1)) & (1 << 30))
2554 return bfd_reloc_overflow;
2555 }
2556 value &= 0x7fffffff;
2557 value |= (bfd_get_32 (input_bfd, hit_data) & 0x80000000);
2558 if (sym_flags == STT_ARM_TFUNC)
2559 value |= 1;
2560 break;
2561#endif
252b5132 2562 }
f21f3fe0 2563
252b5132
RH
2564 bfd_put_32 (input_bfd, value, hit_data);
2565 return bfd_reloc_ok;
2566
2567 case R_ARM_ABS8:
2568 value += addend;
2569 if ((long) value > 0x7f || (long) value < -0x80)
2570 return bfd_reloc_overflow;
2571
2572 bfd_put_8 (input_bfd, value, hit_data);
2573 return bfd_reloc_ok;
2574
2575 case R_ARM_ABS16:
2576 value += addend;
2577
2578 if ((long) value > 0x7fff || (long) value < -0x8000)
2579 return bfd_reloc_overflow;
2580
2581 bfd_put_16 (input_bfd, value, hit_data);
2582 return bfd_reloc_ok;
2583
2584 case R_ARM_ABS12:
2585 /* Support ldr and str instruction for the arm */
2586 /* Also thumb b (unconditional branch). ??? Really? */
2587 value += addend;
2588
2589 if ((long) value > 0x7ff || (long) value < -0x800)
2590 return bfd_reloc_overflow;
2591
2592 value |= (bfd_get_32 (input_bfd, hit_data) & 0xfffff000);
2593 bfd_put_32 (input_bfd, value, hit_data);
2594 return bfd_reloc_ok;
2595
2596 case R_ARM_THM_ABS5:
9b485d32 2597 /* Support ldr and str instructions for the thumb. */
acf8aed4 2598#if USE_REL
252b5132
RH
2599 /* Need to refetch addend. */
2600 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
2601 /* ??? Need to determine shift amount from operand size. */
2602 addend >>= howto->rightshift;
2603#endif
2604 value += addend;
2605
2606 /* ??? Isn't value unsigned? */
2607 if ((long) value > 0x1f || (long) value < -0x10)
2608 return bfd_reloc_overflow;
2609
2610 /* ??? Value needs to be properly shifted into place first. */
2611 value |= bfd_get_16 (input_bfd, hit_data) & 0xf83f;
2612 bfd_put_16 (input_bfd, value, hit_data);
2613 return bfd_reloc_ok;
2614
dfc5f959
NC
2615#ifndef OLD_ARM_ABI
2616 case R_ARM_THM_XPC22:
2617#endif
252b5132 2618 case R_ARM_THM_PC22:
dfc5f959 2619 /* Thumb BL (branch long instruction). */
252b5132 2620 {
b34976b6
AM
2621 bfd_vma relocation;
2622 bfd_boolean overflow = FALSE;
2623 bfd_vma upper_insn = bfd_get_16 (input_bfd, hit_data);
2624 bfd_vma lower_insn = bfd_get_16 (input_bfd, hit_data + 2);
df212a7e 2625 bfd_signed_vma reloc_signed_max = ((1 << (howto->bitsize - 1)) - 1) >> howto->rightshift;
ba96a88f 2626 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
b34976b6 2627 bfd_vma check;
252b5132 2628 bfd_signed_vma signed_check;
252b5132 2629
acf8aed4 2630#if USE_REL
252b5132
RH
2631 /* Need to refetch the addend and squish the two 11 bit pieces
2632 together. */
2633 {
ba96a88f
NC
2634 bfd_vma upper = upper_insn & 0x7ff;
2635 bfd_vma lower = lower_insn & 0x7ff;
9b485d32 2636 upper = (upper ^ 0x400) - 0x400; /* Sign extend. */
252b5132 2637 addend = (upper << 12) | (lower << 1);
ba96a88f 2638 signed_addend = addend;
252b5132
RH
2639 }
2640#endif
dfc5f959
NC
2641#ifndef OLD_ARM_ABI
2642 if (r_type == R_ARM_THM_XPC22)
2643 {
2644 /* Check for Thumb to Thumb call. */
2645 /* FIXME: Should we translate the instruction into a BL
2646 instruction instead ? */
2647 if (sym_flags == STT_ARM_TFUNC)
d003868e
AM
2648 (*_bfd_error_handler)
2649 (_("%B: Warning: Thumb BLX instruction targets thumb function '%s'."),
2650 input_bfd,
2651 h ? h->root.root.string : "(local)");
dfc5f959
NC
2652 }
2653 else
2654#endif
252b5132 2655 {
dfc5f959
NC
2656 /* If it is not a call to Thumb, assume call to Arm.
2657 If it is a call relative to a section name, then it is not a
2658 function call at all, but rather a long jump. */
2659 if (sym_flags != STT_ARM_TFUNC && sym_flags != STT_SECTION)
2660 {
2661 if (elf32_thumb_to_arm_stub
2662 (info, sym_name, input_bfd, output_bfd, input_section,
2663 hit_data, sym_sec, rel->r_offset, signed_addend, value))
2664 return bfd_reloc_ok;
2665 else
2666 return bfd_reloc_dangerous;
2667 }
252b5132 2668 }
f21f3fe0 2669
ba96a88f 2670 relocation = value + signed_addend;
f21f3fe0 2671
252b5132 2672 relocation -= (input_section->output_section->vma
ba96a88f
NC
2673 + input_section->output_offset
2674 + rel->r_offset);
9a5aca8c 2675
ba96a88f
NC
2676 if (! globals->no_pipeline_knowledge)
2677 {
9b485d32 2678 Elf_Internal_Ehdr * i_ehdrp; /* Elf file header, internal form. */
9a5aca8c 2679
ba96a88f 2680 i_ehdrp = elf_elfheader (input_bfd);
f21f3fe0 2681
ba96a88f
NC
2682 /* Previous versions of this code also used to add in the pipline
2683 offset here. This is wrong because the linker is not supposed
2684 to know about such things, and one day it might change. In order
2685 to support old binaries that need the old behaviour however, so
2686 we attempt to detect which ABI was used to create the reloc. */
2687 if ( strcmp (bfd_get_target (input_bfd), "elf32-littlearm-oabi") == 0
2688 || strcmp (bfd_get_target (input_bfd), "elf32-bigarm-oabi") == 0
2689 || i_ehdrp->e_ident[EI_OSABI] == 0)
2690 relocation += 4;
2691 }
f21f3fe0 2692
252b5132
RH
2693 check = relocation >> howto->rightshift;
2694
2695 /* If this is a signed value, the rightshift just dropped
2696 leading 1 bits (assuming twos complement). */
2697 if ((bfd_signed_vma) relocation >= 0)
2698 signed_check = check;
2699 else
2700 signed_check = check | ~((bfd_vma) -1 >> howto->rightshift);
2701
252b5132 2702 /* Assumes two's complement. */
ba96a88f 2703 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
b34976b6 2704 overflow = TRUE;
252b5132 2705
df425bc0 2706#ifndef OLD_ARM_ABI
4f3c3dbb
NC
2707 if (r_type == R_ARM_THM_XPC22
2708 && ((lower_insn & 0x1800) == 0x0800))
c62e1cc3
NC
2709 /* For a BLX instruction, make sure that the relocation is rounded up
2710 to a word boundary. This follows the semantics of the instruction
2711 which specifies that bit 1 of the target address will come from bit
2712 1 of the base address. */
2713 relocation = (relocation + 2) & ~ 3;
99e4ae17 2714#endif
c62e1cc3
NC
2715 /* Put RELOCATION back into the insn. */
2716 upper_insn = (upper_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 12) & 0x7ff);
2717 lower_insn = (lower_insn & ~(bfd_vma) 0x7ff) | ((relocation >> 1) & 0x7ff);
2718
252b5132
RH
2719 /* Put the relocated value back in the object file: */
2720 bfd_put_16 (input_bfd, upper_insn, hit_data);
2721 bfd_put_16 (input_bfd, lower_insn, hit_data + 2);
2722
2723 return (overflow ? bfd_reloc_overflow : bfd_reloc_ok);
2724 }
2725 break;
2726
51c5503b
NC
2727 case R_ARM_THM_PC11:
2728 /* Thumb B (branch) instruction). */
2729 {
6cf9e9fe 2730 bfd_signed_vma relocation;
51c5503b
NC
2731 bfd_signed_vma reloc_signed_max = (1 << (howto->bitsize - 1)) - 1;
2732 bfd_signed_vma reloc_signed_min = ~ reloc_signed_max;
51c5503b
NC
2733 bfd_signed_vma signed_check;
2734
acf8aed4 2735#if USE_REL
51c5503b
NC
2736 /* Need to refetch addend. */
2737 addend = bfd_get_16 (input_bfd, hit_data) & howto->src_mask;
6cf9e9fe
NC
2738 if (addend & ((howto->src_mask + 1) >> 1))
2739 {
2740 signed_addend = -1;
2741 signed_addend &= ~ howto->src_mask;
2742 signed_addend |= addend;
2743 }
2744 else
2745 signed_addend = addend;
2746 /* The value in the insn has been right shifted. We need to
2747 undo this, so that we can perform the address calculation
2748 in terms of bytes. */
2749 signed_addend <<= howto->rightshift;
51c5503b 2750#endif
6cf9e9fe 2751 relocation = value + signed_addend;
51c5503b
NC
2752
2753 relocation -= (input_section->output_section->vma
2754 + input_section->output_offset
2755 + rel->r_offset);
2756
6cf9e9fe
NC
2757 relocation >>= howto->rightshift;
2758 signed_check = relocation;
2759 relocation &= howto->dst_mask;
51c5503b 2760 relocation |= (bfd_get_16 (input_bfd, hit_data) & (~ howto->dst_mask));
cedb70c5 2761
51c5503b
NC
2762 bfd_put_16 (input_bfd, relocation, hit_data);
2763
2764 /* Assumes two's complement. */
2765 if (signed_check > reloc_signed_max || signed_check < reloc_signed_min)
2766 return bfd_reloc_overflow;
2767
2768 return bfd_reloc_ok;
2769 }
cedb70c5 2770
1f433d93 2771#ifndef OLD_ARM_ABI
8375c36b
PB
2772 case R_ARM_ALU_PCREL7_0:
2773 case R_ARM_ALU_PCREL15_8:
2774 case R_ARM_ALU_PCREL23_15:
2775 {
2776 bfd_vma insn;
2777 bfd_vma relocation;
2778
2779 insn = bfd_get_32 (input_bfd, hit_data);
2780#if USE_REL
2781 /* Extract the addend. */
2782 addend = (insn & 0xff) << ((insn & 0xf00) >> 7);
2783 signed_addend = addend;
2784#endif
2785 relocation = value + signed_addend;
2786
2787 relocation -= (input_section->output_section->vma
2788 + input_section->output_offset
2789 + rel->r_offset);
2790 insn = (insn & ~0xfff)
2791 | ((howto->bitpos << 7) & 0xf00)
2792 | ((relocation >> howto->bitpos) & 0xff);
2793 bfd_put_32 (input_bfd, value, hit_data);
2794 }
2795 return bfd_reloc_ok;
1f433d93 2796#endif
8375c36b 2797
252b5132
RH
2798 case R_ARM_GNU_VTINHERIT:
2799 case R_ARM_GNU_VTENTRY:
2800 return bfd_reloc_ok;
2801
2802 case R_ARM_COPY:
2803 return bfd_reloc_notsupported;
2804
2805 case R_ARM_GLOB_DAT:
2806 return bfd_reloc_notsupported;
2807
2808 case R_ARM_JUMP_SLOT:
2809 return bfd_reloc_notsupported;
2810
2811 case R_ARM_RELATIVE:
2812 return bfd_reloc_notsupported;
2813
2814 case R_ARM_GOTOFF:
2815 /* Relocation is relative to the start of the
2816 global offset table. */
2817
2818 BFD_ASSERT (sgot != NULL);
2819 if (sgot == NULL)
2820 return bfd_reloc_notsupported;
9a5aca8c 2821
cedb70c5 2822 /* If we are addressing a Thumb function, we need to adjust the
ee29b9fb
RE
2823 address by one, so that attempts to call the function pointer will
2824 correctly interpret it as Thumb code. */
2825 if (sym_flags == STT_ARM_TFUNC)
2826 value += 1;
2827
252b5132
RH
2828 /* Note that sgot->output_offset is not involved in this
2829 calculation. We always want the start of .got. If we
2830 define _GLOBAL_OFFSET_TABLE in a different way, as is
2831 permitted by the ABI, we might have to change this
9b485d32 2832 calculation. */
252b5132 2833 value -= sgot->output_section->vma;
f21f3fe0 2834 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2835 contents, rel->r_offset, value,
2836 (bfd_vma) 0);
252b5132
RH
2837
2838 case R_ARM_GOTPC:
a7c10850 2839 /* Use global offset table as symbol value. */
252b5132 2840 BFD_ASSERT (sgot != NULL);
f21f3fe0 2841
252b5132
RH
2842 if (sgot == NULL)
2843 return bfd_reloc_notsupported;
2844
2845 value = sgot->output_section->vma;
f21f3fe0 2846 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2847 contents, rel->r_offset, value,
2848 (bfd_vma) 0);
f21f3fe0 2849
252b5132 2850 case R_ARM_GOT32:
eb043451
PB
2851#ifndef OLD_ARM_ABI
2852 case R_ARM_GOT_PREL:
2853#endif
252b5132 2854 /* Relocation is to the entry for this symbol in the
9b485d32 2855 global offset table. */
252b5132
RH
2856 if (sgot == NULL)
2857 return bfd_reloc_notsupported;
f21f3fe0 2858
252b5132
RH
2859 if (h != NULL)
2860 {
2861 bfd_vma off;
5e681ec4 2862 bfd_boolean dyn;
f21f3fe0 2863
252b5132
RH
2864 off = h->got.offset;
2865 BFD_ASSERT (off != (bfd_vma) -1);
5e681ec4 2866 dyn = globals->root.dynamic_sections_created;
f21f3fe0 2867
5e681ec4 2868 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
50d6c878 2869 || (info->shared
5e681ec4
PB
2870 && SYMBOL_REFERENCES_LOCAL (info, h))
2871 || (ELF_ST_VISIBILITY (h->other)
2872 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
2873 {
2874 /* This is actually a static link, or it is a -Bsymbolic link
2875 and the symbol is defined locally. We must initialize this
2876 entry in the global offset table. Since the offset must
2877 always be a multiple of 4, we use the least significant bit
2878 to record whether we have initialized it already.
f21f3fe0 2879
252b5132 2880 When doing a dynamic link, we create a .rel.got relocation
f21f3fe0 2881 entry to initialize the value. This is done in the
9b485d32 2882 finish_dynamic_symbol routine. */
252b5132
RH
2883 if ((off & 1) != 0)
2884 off &= ~1;
2885 else
2886 {
ee29b9fb
RE
2887 /* If we are addressing a Thumb function, we need to
2888 adjust the address by one, so that attempts to
2889 call the function pointer will correctly
2890 interpret it as Thumb code. */
2891 if (sym_flags == STT_ARM_TFUNC)
2892 value |= 1;
2893
252b5132
RH
2894 bfd_put_32 (output_bfd, value, sgot->contents + off);
2895 h->got.offset |= 1;
2896 }
2897 }
f21f3fe0 2898
252b5132
RH
2899 value = sgot->output_offset + off;
2900 }
2901 else
2902 {
2903 bfd_vma off;
f21f3fe0 2904
252b5132
RH
2905 BFD_ASSERT (local_got_offsets != NULL &&
2906 local_got_offsets[r_symndx] != (bfd_vma) -1);
f21f3fe0 2907
252b5132 2908 off = local_got_offsets[r_symndx];
f21f3fe0 2909
252b5132
RH
2910 /* The offset must always be a multiple of 4. We use the
2911 least significant bit to record whether we have already
9b485d32 2912 generated the necessary reloc. */
252b5132
RH
2913 if ((off & 1) != 0)
2914 off &= ~1;
2915 else
2916 {
2917 bfd_put_32 (output_bfd, value, sgot->contents + off);
f21f3fe0 2918
252b5132
RH
2919 if (info->shared)
2920 {
2921 asection * srelgot;
947216bf
AM
2922 Elf_Internal_Rela outrel;
2923 bfd_byte *loc;
f21f3fe0 2924
252b5132
RH
2925 srelgot = bfd_get_section_by_name (dynobj, ".rel.got");
2926 BFD_ASSERT (srelgot != NULL);
f21f3fe0 2927
252b5132 2928 outrel.r_offset = (sgot->output_section->vma
f21f3fe0 2929 + sgot->output_offset
252b5132
RH
2930 + off);
2931 outrel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
947216bf
AM
2932 loc = srelgot->contents;
2933 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rel);
2934 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
252b5132 2935 }
f21f3fe0 2936
252b5132
RH
2937 local_got_offsets[r_symndx] |= 1;
2938 }
f21f3fe0 2939
252b5132
RH
2940 value = sgot->output_offset + off;
2941 }
eb043451
PB
2942 if (r_type != R_ARM_GOT32)
2943 value += sgot->output_section->vma;
9a5aca8c 2944
f21f3fe0 2945 return _bfd_final_link_relocate (howto, input_bfd, input_section,
99e4ae17
AJ
2946 contents, rel->r_offset, value,
2947 (bfd_vma) 0);
f21f3fe0 2948
252b5132
RH
2949 case R_ARM_SBREL32:
2950 return bfd_reloc_notsupported;
2951
2952 case R_ARM_AMP_VCALL9:
2953 return bfd_reloc_notsupported;
2954
2955 case R_ARM_RSBREL32:
2956 return bfd_reloc_notsupported;
2957
2958 case R_ARM_THM_RPC22:
2959 return bfd_reloc_notsupported;
2960
2961 case R_ARM_RREL32:
2962 return bfd_reloc_notsupported;
2963
2964 case R_ARM_RABS32:
2965 return bfd_reloc_notsupported;
2966
2967 case R_ARM_RPC24:
2968 return bfd_reloc_notsupported;
2969
2970 case R_ARM_RBASE:
2971 return bfd_reloc_notsupported;
2972
2973 default:
2974 return bfd_reloc_notsupported;
2975 }
2976}
2977
acf8aed4 2978#if USE_REL
98c1d4aa
NC
2979/* Add INCREMENT to the reloc (of type HOWTO) at ADDRESS. */
2980static void
57e8b36a
NC
2981arm_add_to_rel (bfd * abfd,
2982 bfd_byte * address,
2983 reloc_howto_type * howto,
2984 bfd_signed_vma increment)
98c1d4aa 2985{
98c1d4aa
NC
2986 bfd_signed_vma addend;
2987
9a5aca8c 2988 if (howto->type == R_ARM_THM_PC22)
98c1d4aa 2989 {
9a5aca8c
AM
2990 int upper_insn, lower_insn;
2991 int upper, lower;
98c1d4aa 2992
9a5aca8c
AM
2993 upper_insn = bfd_get_16 (abfd, address);
2994 lower_insn = bfd_get_16 (abfd, address + 2);
2995 upper = upper_insn & 0x7ff;
2996 lower = lower_insn & 0x7ff;
2997
2998 addend = (upper << 12) | (lower << 1);
ddda4409 2999 addend += increment;
9a5aca8c 3000 addend >>= 1;
98c1d4aa 3001
9a5aca8c
AM
3002 upper_insn = (upper_insn & 0xf800) | ((addend >> 11) & 0x7ff);
3003 lower_insn = (lower_insn & 0xf800) | (addend & 0x7ff);
3004
dc810e39
AM
3005 bfd_put_16 (abfd, (bfd_vma) upper_insn, address);
3006 bfd_put_16 (abfd, (bfd_vma) lower_insn, address + 2);
9a5aca8c
AM
3007 }
3008 else
3009 {
3010 bfd_vma contents;
3011
3012 contents = bfd_get_32 (abfd, address);
3013
3014 /* Get the (signed) value from the instruction. */
3015 addend = contents & howto->src_mask;
3016 if (addend & ((howto->src_mask + 1) >> 1))
3017 {
3018 bfd_signed_vma mask;
3019
3020 mask = -1;
3021 mask &= ~ howto->src_mask;
3022 addend |= mask;
3023 }
3024
3025 /* Add in the increment, (which is a byte value). */
3026 switch (howto->type)
3027 {
3028 default:
3029 addend += increment;
3030 break;
3031
3032 case R_ARM_PC24:
5b5bb741
PB
3033#ifndef OLD_ARM_ABI
3034 case R_ARM_CALL:
3035 case R_ARM_JUMP24:
3036#endif
9a5aca8c 3037 addend <<= howto->size;
dc810e39 3038 addend += increment;
9a5aca8c
AM
3039
3040 /* Should we check for overflow here ? */
3041
3042 /* Drop any undesired bits. */
3043 addend >>= howto->rightshift;
3044 break;
3045 }
3046
3047 contents = (contents & ~ howto->dst_mask) | (addend & howto->dst_mask);
3048
3049 bfd_put_32 (abfd, contents, address);
ddda4409 3050 }
98c1d4aa
NC
3051}
3052#endif /* USE_REL */
252b5132
RH
3053
3054/* Relocate an ARM ELF section. */
b34976b6 3055static bfd_boolean
57e8b36a
NC
3056elf32_arm_relocate_section (bfd * output_bfd,
3057 struct bfd_link_info * info,
3058 bfd * input_bfd,
3059 asection * input_section,
3060 bfd_byte * contents,
3061 Elf_Internal_Rela * relocs,
3062 Elf_Internal_Sym * local_syms,
3063 asection ** local_sections)
252b5132 3064{
b34976b6
AM
3065 Elf_Internal_Shdr *symtab_hdr;
3066 struct elf_link_hash_entry **sym_hashes;
3067 Elf_Internal_Rela *rel;
3068 Elf_Internal_Rela *relend;
3069 const char *name;
252b5132 3070
acf8aed4 3071#if !USE_REL
1049f94e 3072 if (info->relocatable)
b34976b6 3073 return TRUE;
b491616a
AM
3074#endif
3075
252b5132
RH
3076 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
3077 sym_hashes = elf_sym_hashes (input_bfd);
3078
3079 rel = relocs;
3080 relend = relocs + input_section->reloc_count;
3081 for (; rel < relend; rel++)
3082 {
ba96a88f
NC
3083 int r_type;
3084 reloc_howto_type * howto;
3085 unsigned long r_symndx;
3086 Elf_Internal_Sym * sym;
3087 asection * sec;
252b5132 3088 struct elf_link_hash_entry * h;
ba96a88f
NC
3089 bfd_vma relocation;
3090 bfd_reloc_status_type r;
3091 arelent bfd_reloc;
f21f3fe0 3092
252b5132 3093 r_symndx = ELF32_R_SYM (rel->r_info);
ba96a88f 3094 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 3095
ba96a88f
NC
3096 if ( r_type == R_ARM_GNU_VTENTRY
3097 || r_type == R_ARM_GNU_VTINHERIT)
252b5132
RH
3098 continue;
3099
dc810e39 3100 elf32_arm_info_to_howto (input_bfd, & bfd_reloc, rel);
ba96a88f 3101 howto = bfd_reloc.howto;
252b5132 3102
acf8aed4 3103#if USE_REL
1049f94e 3104 if (info->relocatable)
252b5132 3105 {
1049f94e 3106 /* This is a relocatable link. We don't have to change
252b5132
RH
3107 anything, unless the reloc is against a section symbol,
3108 in which case we have to adjust according to where the
3109 section symbol winds up in the output section. */
3110 if (r_symndx < symtab_hdr->sh_info)
3111 {
3112 sym = local_syms + r_symndx;
3113 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3114 {
3115 sec = local_sections[r_symndx];
98c1d4aa 3116 arm_add_to_rel (input_bfd, contents + rel->r_offset,
dc810e39
AM
3117 howto,
3118 (bfd_signed_vma) (sec->output_offset
3119 + sym->st_value));
252b5132
RH
3120 }
3121 }
3122
3123 continue;
3124 }
b491616a 3125#endif
252b5132
RH
3126
3127 /* This is a final link. */
3128 h = NULL;
3129 sym = NULL;
3130 sec = NULL;
9b485d32 3131
252b5132
RH
3132 if (r_symndx < symtab_hdr->sh_info)
3133 {
3134 sym = local_syms + r_symndx;
3135 sec = local_sections[r_symndx];
acf8aed4 3136#if USE_REL
252b5132
RH
3137 relocation = (sec->output_section->vma
3138 + sec->output_offset
3139 + sym->st_value);
f8df10f4
JJ
3140 if ((sec->flags & SEC_MERGE)
3141 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3142 {
3143 asection *msec;
3144 bfd_vma addend, value;
3145
3146 if (howto->rightshift)
3147 {
3148 (*_bfd_error_handler)
d003868e
AM
3149 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
3150 input_bfd, input_section,
f8df10f4 3151 (long) rel->r_offset, howto->name);
b34976b6 3152 return FALSE;
f8df10f4
JJ
3153 }
3154
3155 value = bfd_get_32 (input_bfd, contents + rel->r_offset);
3156
3157 /* Get the (signed) value from the instruction. */
3158 addend = value & howto->src_mask;
3159 if (addend & ((howto->src_mask + 1) >> 1))
3160 {
3161 bfd_signed_vma mask;
3162
3163 mask = -1;
3164 mask &= ~ howto->src_mask;
3165 addend |= mask;
3166 }
3167 msec = sec;
3168 addend =
c629eae0 3169 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
f8df10f4
JJ
3170 - relocation;
3171 addend += msec->output_section->vma + msec->output_offset;
3172 value = (value & ~ howto->dst_mask) | (addend & howto->dst_mask);
3173 bfd_put_32 (input_bfd, value, contents + rel->r_offset);
3174 }
3175#else
8517fae7 3176 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
f8df10f4 3177#endif
252b5132
RH
3178 }
3179 else
3180 {
560e09e9
NC
3181 bfd_boolean warned;
3182 bfd_boolean unresolved_reloc;
3183
b2a8e766
AM
3184 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
3185 r_symndx, symtab_hdr, sym_hashes,
3186 h, sec, relocation,
3187 unresolved_reloc, warned);
57e8b36a 3188
560e09e9 3189 if (unresolved_reloc || relocation != 0)
252b5132 3190 {
252b5132 3191 /* In these cases, we don't need the relocation value.
f21f3fe0 3192 We check specially because in some obscure cases
9b485d32 3193 sec->output_section will be NULL. */
252b5132
RH
3194 switch (r_type)
3195 {
3196 case R_ARM_PC24:
5b5bb741
PB
3197#ifndef OLD_ARM_ABI
3198 case R_ARM_CALL:
3199 case R_ARM_JUMP24:
3200#endif
252b5132 3201 case R_ARM_ABS32:
6a360bf4 3202 case R_ARM_THM_PC22:
ecb2d096
DJ
3203 case R_ARM_PLT32:
3204
252b5132 3205 if (info->shared
f5385ebf
AM
3206 && ((!info->symbolic && h->dynindx != -1)
3207 || !h->def_regular)
5e681ec4 3208 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
05924f36
PB
3209 && ((input_section->flags & SEC_ALLOC) != 0
3210 /* DWARF will emit R_ARM_ABS32 relocations in its
3211 sections against symbols defined externally
3212 in shared libraries. We can't do anything
3213 with them here. */
3214 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 3215 && h->def_dynamic))
252b5132 3216 )
560e09e9 3217 relocation = 0;
252b5132 3218 break;
f21f3fe0 3219
252b5132 3220 case R_ARM_GOTPC:
560e09e9 3221 relocation = 0;
252b5132 3222 break;
f21f3fe0 3223
252b5132 3224 case R_ARM_GOT32:
eb043451
PB
3225#ifndef OLD_ARM_ABI
3226 case R_ARM_GOT_PREL:
3227#endif
50d6c878 3228 if ((WILL_CALL_FINISH_DYNAMIC_SYMBOL
560e09e9 3229 (elf_hash_table (info)->dynamic_sections_created,
50d6c878
DJ
3230 info->shared, h))
3231 && (!info->shared
252b5132 3232 || (!info->symbolic && h->dynindx != -1)
f5385ebf 3233 || !h->def_regular))
560e09e9 3234 relocation = 0;
252b5132 3235 break;
f21f3fe0 3236
252b5132 3237 default:
560e09e9
NC
3238 if (unresolved_reloc)
3239 _bfd_error_handler
d003868e
AM
3240 (_("%B(%A): warning: unresolvable relocation %d against symbol `%s'"),
3241 input_bfd, input_section,
560e09e9 3242 r_type,
d003868e 3243 h->root.root.string);
560e09e9 3244 break;
252b5132 3245 }
252b5132
RH
3246 }
3247 }
3248
3249 if (h != NULL)
3250 name = h->root.root.string;
3251 else
3252 {
3253 name = (bfd_elf_string_from_elf_section
3254 (input_bfd, symtab_hdr->sh_link, sym->st_name));
3255 if (name == NULL || *name == '\0')
3256 name = bfd_section_name (input_bfd, sec);
3257 }
f21f3fe0 3258
252b5132
RH
3259 r = elf32_arm_final_link_relocate (howto, input_bfd, output_bfd,
3260 input_section, contents, rel,
3261 relocation, info, sec, name,
3262 (h ? ELF_ST_TYPE (h->type) :
780a67af 3263 ELF_ST_TYPE (sym->st_info)), h);
252b5132
RH
3264
3265 if (r != bfd_reloc_ok)
3266 {
3267 const char * msg = (const char *) 0;
3268
3269 switch (r)
3270 {
3271 case bfd_reloc_overflow:
cf919dfd
PB
3272 /* If the overflowing reloc was to an undefined symbol,
3273 we have already printed one error message and there
3274 is no point complaining again. */
3275 if ((! h ||
3276 h->root.type != bfd_link_hash_undefined)
3277 && (!((*info->callbacks->reloc_overflow)
dfeffb9f
L
3278 (info, (h ? &h->root : NULL), name, howto->name,
3279 (bfd_vma) 0, input_bfd, input_section,
3280 rel->r_offset))))
b34976b6 3281 return FALSE;
252b5132
RH
3282 break;
3283
3284 case bfd_reloc_undefined:
3285 if (!((*info->callbacks->undefined_symbol)
3286 (info, name, input_bfd, input_section,
b34976b6
AM
3287 rel->r_offset, TRUE)))
3288 return FALSE;
252b5132
RH
3289 break;
3290
3291 case bfd_reloc_outofrange:
9b485d32 3292 msg = _("internal error: out of range error");
252b5132
RH
3293 goto common_error;
3294
3295 case bfd_reloc_notsupported:
9b485d32 3296 msg = _("internal error: unsupported relocation error");
252b5132
RH
3297 goto common_error;
3298
3299 case bfd_reloc_dangerous:
9b485d32 3300 msg = _("internal error: dangerous error");
252b5132
RH
3301 goto common_error;
3302
3303 default:
9b485d32 3304 msg = _("internal error: unknown error");
252b5132
RH
3305 /* fall through */
3306
3307 common_error:
3308 if (!((*info->callbacks->warning)
3309 (info, msg, name, input_bfd, input_section,
3310 rel->r_offset)))
b34976b6 3311 return FALSE;
252b5132
RH
3312 break;
3313 }
3314 }
3315 }
3316
b34976b6 3317 return TRUE;
252b5132
RH
3318}
3319
c178919b
NC
3320/* Set the right machine number. */
3321
3322static bfd_boolean
57e8b36a 3323elf32_arm_object_p (bfd *abfd)
c178919b 3324{
5a6c6817 3325 unsigned int mach;
57e8b36a 3326
5a6c6817 3327 mach = bfd_arm_get_mach_from_notes (abfd, ARM_NOTE_SECTION);
c178919b 3328
5a6c6817
NC
3329 if (mach != bfd_mach_arm_unknown)
3330 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
3331
3332 else if (elf_elfheader (abfd)->e_flags & EF_ARM_MAVERICK_FLOAT)
3333 bfd_default_set_arch_mach (abfd, bfd_arch_arm, bfd_mach_arm_ep9312);
e16bb312 3334
e16bb312 3335 else
5a6c6817 3336 bfd_default_set_arch_mach (abfd, bfd_arch_arm, mach);
c178919b
NC
3337
3338 return TRUE;
3339}
3340
fc830a83 3341/* Function to keep ARM specific flags in the ELF header. */
3c9458e9 3342
b34976b6 3343static bfd_boolean
57e8b36a 3344elf32_arm_set_private_flags (bfd *abfd, flagword flags)
252b5132
RH
3345{
3346 if (elf_flags_init (abfd)
3347 && elf_elfheader (abfd)->e_flags != flags)
3348 {
fc830a83
NC
3349 if (EF_ARM_EABI_VERSION (flags) == EF_ARM_EABI_UNKNOWN)
3350 {
fd2ec330 3351 if (flags & EF_ARM_INTERWORK)
d003868e
AM
3352 (*_bfd_error_handler)
3353 (_("Warning: Not setting interworking flag of %B since it has already been specified as non-interworking"),
3354 abfd);
fc830a83 3355 else
d003868e
AM
3356 _bfd_error_handler
3357 (_("Warning: Clearing the interworking flag of %B due to outside request"),
3358 abfd);
fc830a83 3359 }
252b5132
RH
3360 }
3361 else
3362 {
3363 elf_elfheader (abfd)->e_flags = flags;
b34976b6 3364 elf_flags_init (abfd) = TRUE;
252b5132
RH
3365 }
3366
b34976b6 3367 return TRUE;
252b5132
RH
3368}
3369
fc830a83 3370/* Copy backend specific data from one object module to another. */
9b485d32 3371
b34976b6 3372static bfd_boolean
57e8b36a 3373elf32_arm_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132
RH
3374{
3375 flagword in_flags;
3376 flagword out_flags;
3377
fc830a83 3378 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 3379 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 3380 return TRUE;
252b5132 3381
fc830a83 3382 in_flags = elf_elfheader (ibfd)->e_flags;
252b5132
RH
3383 out_flags = elf_elfheader (obfd)->e_flags;
3384
fc830a83
NC
3385 if (elf_flags_init (obfd)
3386 && EF_ARM_EABI_VERSION (out_flags) == EF_ARM_EABI_UNKNOWN
3387 && in_flags != out_flags)
252b5132 3388 {
252b5132 3389 /* Cannot mix APCS26 and APCS32 code. */
fd2ec330 3390 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
b34976b6 3391 return FALSE;
252b5132
RH
3392
3393 /* Cannot mix float APCS and non-float APCS code. */
fd2ec330 3394 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
b34976b6 3395 return FALSE;
252b5132
RH
3396
3397 /* If the src and dest have different interworking flags
3398 then turn off the interworking bit. */
fd2ec330 3399 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
252b5132 3400 {
fd2ec330 3401 if (out_flags & EF_ARM_INTERWORK)
d003868e
AM
3402 _bfd_error_handler
3403 (_("Warning: Clearing the interworking flag of %B because non-interworking code in %B has been linked with it"),
3404 obfd, ibfd);
252b5132 3405
fd2ec330 3406 in_flags &= ~EF_ARM_INTERWORK;
252b5132 3407 }
1006ba19
PB
3408
3409 /* Likewise for PIC, though don't warn for this case. */
fd2ec330
PB
3410 if ((in_flags & EF_ARM_PIC) != (out_flags & EF_ARM_PIC))
3411 in_flags &= ~EF_ARM_PIC;
252b5132
RH
3412 }
3413
3414 elf_elfheader (obfd)->e_flags = in_flags;
b34976b6 3415 elf_flags_init (obfd) = TRUE;
252b5132 3416
b34976b6 3417 return TRUE;
252b5132
RH
3418}
3419
3420/* Merge backend specific data from an object file to the output
3421 object file when linking. */
9b485d32 3422
b34976b6 3423static bfd_boolean
57e8b36a 3424elf32_arm_merge_private_bfd_data (bfd * ibfd, bfd * obfd)
252b5132
RH
3425{
3426 flagword out_flags;
3427 flagword in_flags;
b34976b6 3428 bfd_boolean flags_compatible = TRUE;
cf919dfd 3429 asection *sec;
252b5132 3430
9b485d32 3431 /* Check if we have the same endianess. */
82e51918 3432 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 3433 return FALSE;
1fe494a5 3434
252b5132
RH
3435 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3436 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 3437 return TRUE;
252b5132 3438
252b5132
RH
3439 /* The input BFD must have had its flags initialised. */
3440 /* The following seems bogus to me -- The flags are initialized in
3441 the assembler but I don't think an elf_flags_init field is
9b485d32 3442 written into the object. */
252b5132
RH
3443 /* BFD_ASSERT (elf_flags_init (ibfd)); */
3444
3445 in_flags = elf_elfheader (ibfd)->e_flags;
3446 out_flags = elf_elfheader (obfd)->e_flags;
3447
3448 if (!elf_flags_init (obfd))
3449 {
fe077fa6
NC
3450 /* If the input is the default architecture and had the default
3451 flags then do not bother setting the flags for the output
3452 architecture, instead allow future merges to do this. If no
3453 future merges ever set these flags then they will retain their
3454 uninitialised values, which surprise surprise, correspond
252b5132 3455 to the default values. */
fe077fa6
NC
3456 if (bfd_get_arch_info (ibfd)->the_default
3457 && elf_elfheader (ibfd)->e_flags == 0)
b34976b6 3458 return TRUE;
252b5132 3459
b34976b6 3460 elf_flags_init (obfd) = TRUE;
252b5132
RH
3461 elf_elfheader (obfd)->e_flags = in_flags;
3462
3463 if (bfd_get_arch (obfd) == bfd_get_arch (ibfd)
3464 && bfd_get_arch_info (obfd)->the_default)
3465 return bfd_set_arch_mach (obfd, bfd_get_arch (ibfd), bfd_get_mach (ibfd));
3466
b34976b6 3467 return TRUE;
252b5132
RH
3468 }
3469
5a6c6817
NC
3470 /* Determine what should happen if the input ARM architecture
3471 does not match the output ARM architecture. */
3472 if (! bfd_arm_merge_machines (ibfd, obfd))
3473 return FALSE;
e16bb312 3474
1006ba19 3475 /* Identical flags must be compatible. */
252b5132 3476 if (in_flags == out_flags)
b34976b6 3477 return TRUE;
252b5132 3478
35a0f415
DJ
3479 /* Check to see if the input BFD actually contains any sections. If
3480 not, its flags may not have been initialised either, but it
3481 cannot actually cause any incompatibility. Do not short-circuit
3482 dynamic objects; their section list may be emptied by
d1f161ea 3483 elf_link_add_object_symbols.
35a0f415 3484
d1f161ea
NC
3485 Also check to see if there are no code sections in the input.
3486 In this case there is no need to check for code specific flags.
3487 XXX - do we need to worry about floating-point format compatability
3488 in data sections ? */
35a0f415 3489 if (!(ibfd->flags & DYNAMIC))
cf919dfd 3490 {
35a0f415 3491 bfd_boolean null_input_bfd = TRUE;
d1f161ea 3492 bfd_boolean only_data_sections = TRUE;
35a0f415
DJ
3493
3494 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
cf919dfd 3495 {
35a0f415
DJ
3496 /* Ignore synthetic glue sections. */
3497 if (strcmp (sec->name, ".glue_7")
3498 && strcmp (sec->name, ".glue_7t"))
3499 {
d1f161ea
NC
3500 if ((bfd_get_section_flags (ibfd, sec)
3501 & (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3502 == (SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS))
3503 only_data_sections = FALSE;
3504
35a0f415
DJ
3505 null_input_bfd = FALSE;
3506 break;
3507 }
cf919dfd 3508 }
d1f161ea
NC
3509
3510 if (null_input_bfd || only_data_sections)
35a0f415 3511 return TRUE;
cf919dfd 3512 }
cf919dfd 3513
252b5132 3514 /* Complain about various flag mismatches. */
fc830a83
NC
3515 if (EF_ARM_EABI_VERSION (in_flags) != EF_ARM_EABI_VERSION (out_flags))
3516 {
d003868e 3517 _bfd_error_handler
3656d5e3 3518 (_("ERROR: Source object %B has EABI version %d, but target %B has EABI version %d"),
d003868e
AM
3519 ibfd, obfd,
3520 (in_flags & EF_ARM_EABIMASK) >> 24,
3521 (out_flags & EF_ARM_EABIMASK) >> 24);
b34976b6 3522 return FALSE;
fc830a83 3523 }
252b5132 3524
1006ba19
PB
3525 /* Not sure what needs to be checked for EABI versions >= 1. */
3526 if (EF_ARM_EABI_VERSION (in_flags) == EF_ARM_EABI_UNKNOWN)
3527 {
fd2ec330 3528 if ((in_flags & EF_ARM_APCS_26) != (out_flags & EF_ARM_APCS_26))
1006ba19 3529 {
d003868e
AM
3530 _bfd_error_handler
3531 (_("ERROR: %B is compiled for APCS-%d, whereas target %B uses APCS-%d"),
3532 ibfd, obfd,
3533 in_flags & EF_ARM_APCS_26 ? 26 : 32,
3534 out_flags & EF_ARM_APCS_26 ? 26 : 32);
b34976b6 3535 flags_compatible = FALSE;
1006ba19 3536 }
252b5132 3537
fd2ec330 3538 if ((in_flags & EF_ARM_APCS_FLOAT) != (out_flags & EF_ARM_APCS_FLOAT))
1006ba19 3539 {
5eefb65f 3540 if (in_flags & EF_ARM_APCS_FLOAT)
d003868e
AM
3541 _bfd_error_handler
3542 (_("ERROR: %B passes floats in float registers, whereas %B passes them in integer registers"),
3543 ibfd, obfd);
5eefb65f 3544 else
d003868e
AM
3545 _bfd_error_handler
3546 (_("ERROR: %B passes floats in integer registers, whereas %B passes them in float registers"),
3547 ibfd, obfd);
63b0f745 3548
b34976b6 3549 flags_compatible = FALSE;
1006ba19 3550 }
252b5132 3551
96a846ea 3552 if ((in_flags & EF_ARM_VFP_FLOAT) != (out_flags & EF_ARM_VFP_FLOAT))
1006ba19 3553 {
96a846ea 3554 if (in_flags & EF_ARM_VFP_FLOAT)
d003868e
AM
3555 _bfd_error_handler
3556 (_("ERROR: %B uses VFP instructions, whereas %B does not"),
3557 ibfd, obfd);
5eefb65f 3558 else
d003868e
AM
3559 _bfd_error_handler
3560 (_("ERROR: %B uses FPA instructions, whereas %B does not"),
3561 ibfd, obfd);
fde78edd
NC
3562
3563 flags_compatible = FALSE;
3564 }
3565
3566 if ((in_flags & EF_ARM_MAVERICK_FLOAT) != (out_flags & EF_ARM_MAVERICK_FLOAT))
3567 {
3568 if (in_flags & EF_ARM_MAVERICK_FLOAT)
d003868e
AM
3569 _bfd_error_handler
3570 (_("ERROR: %B uses Maverick instructions, whereas %B does not"),
3571 ibfd, obfd);
fde78edd 3572 else
d003868e
AM
3573 _bfd_error_handler
3574 (_("ERROR: %B does not use Maverick instructions, whereas %B does"),
3575 ibfd, obfd);
63b0f745 3576
b34976b6 3577 flags_compatible = FALSE;
1006ba19 3578 }
96a846ea
RE
3579
3580#ifdef EF_ARM_SOFT_FLOAT
3581 if ((in_flags & EF_ARM_SOFT_FLOAT) != (out_flags & EF_ARM_SOFT_FLOAT))
3582 {
3583 /* We can allow interworking between code that is VFP format
3584 layout, and uses either soft float or integer regs for
3585 passing floating point arguments and results. We already
3586 know that the APCS_FLOAT flags match; similarly for VFP
3587 flags. */
3588 if ((in_flags & EF_ARM_APCS_FLOAT) != 0
3589 || (in_flags & EF_ARM_VFP_FLOAT) == 0)
3590 {
3591 if (in_flags & EF_ARM_SOFT_FLOAT)
d003868e
AM
3592 _bfd_error_handler
3593 (_("ERROR: %B uses software FP, whereas %B uses hardware FP"),
3594 ibfd, obfd);
96a846ea 3595 else
d003868e
AM
3596 _bfd_error_handler
3597 (_("ERROR: %B uses hardware FP, whereas %B uses software FP"),
3598 ibfd, obfd);
96a846ea 3599
b34976b6 3600 flags_compatible = FALSE;
96a846ea
RE
3601 }
3602 }
ee43f35e 3603#endif
252b5132 3604
1006ba19 3605 /* Interworking mismatch is only a warning. */
fd2ec330 3606 if ((in_flags & EF_ARM_INTERWORK) != (out_flags & EF_ARM_INTERWORK))
8f615d07 3607 {
e3c8793a
NC
3608 if (in_flags & EF_ARM_INTERWORK)
3609 {
d003868e
AM
3610 _bfd_error_handler
3611 (_("Warning: %B supports interworking, whereas %B does not"),
3612 ibfd, obfd);
e3c8793a
NC
3613 }
3614 else
3615 {
d003868e
AM
3616 _bfd_error_handler
3617 (_("Warning: %B does not support interworking, whereas %B does"),
3618 ibfd, obfd);
e3c8793a 3619 }
8f615d07 3620 }
252b5132 3621 }
63b0f745 3622
1006ba19 3623 return flags_compatible;
252b5132
RH
3624}
3625
9b485d32
NC
3626/* Display the flags field. */
3627
b34976b6 3628static bfd_boolean
57e8b36a 3629elf32_arm_print_private_bfd_data (bfd *abfd, void * ptr)
252b5132 3630{
fc830a83
NC
3631 FILE * file = (FILE *) ptr;
3632 unsigned long flags;
252b5132
RH
3633
3634 BFD_ASSERT (abfd != NULL && ptr != NULL);
3635
3636 /* Print normal ELF private data. */
3637 _bfd_elf_print_private_bfd_data (abfd, ptr);
3638
fc830a83 3639 flags = elf_elfheader (abfd)->e_flags;
9b485d32
NC
3640 /* Ignore init flag - it may not be set, despite the flags field
3641 containing valid data. */
252b5132
RH
3642
3643 /* xgettext:c-format */
9b485d32 3644 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
252b5132 3645
fc830a83
NC
3646 switch (EF_ARM_EABI_VERSION (flags))
3647 {
3648 case EF_ARM_EABI_UNKNOWN:
4cc11e76 3649 /* The following flag bits are GNU extensions and not part of the
fc830a83
NC
3650 official ARM ELF extended ABI. Hence they are only decoded if
3651 the EABI version is not set. */
fd2ec330 3652 if (flags & EF_ARM_INTERWORK)
9b485d32 3653 fprintf (file, _(" [interworking enabled]"));
9a5aca8c 3654
fd2ec330 3655 if (flags & EF_ARM_APCS_26)
6c571f00 3656 fprintf (file, " [APCS-26]");
fc830a83 3657 else
6c571f00 3658 fprintf (file, " [APCS-32]");
9a5aca8c 3659
96a846ea
RE
3660 if (flags & EF_ARM_VFP_FLOAT)
3661 fprintf (file, _(" [VFP float format]"));
fde78edd
NC
3662 else if (flags & EF_ARM_MAVERICK_FLOAT)
3663 fprintf (file, _(" [Maverick float format]"));
96a846ea
RE
3664 else
3665 fprintf (file, _(" [FPA float format]"));
3666
fd2ec330 3667 if (flags & EF_ARM_APCS_FLOAT)
9b485d32 3668 fprintf (file, _(" [floats passed in float registers]"));
9a5aca8c 3669
fd2ec330 3670 if (flags & EF_ARM_PIC)
9b485d32 3671 fprintf (file, _(" [position independent]"));
fc830a83 3672
fd2ec330 3673 if (flags & EF_ARM_NEW_ABI)
9b485d32 3674 fprintf (file, _(" [new ABI]"));
9a5aca8c 3675
fd2ec330 3676 if (flags & EF_ARM_OLD_ABI)
9b485d32 3677 fprintf (file, _(" [old ABI]"));
9a5aca8c 3678
fd2ec330 3679 if (flags & EF_ARM_SOFT_FLOAT)
9b485d32 3680 fprintf (file, _(" [software FP]"));
9a5aca8c 3681
96a846ea
RE
3682 flags &= ~(EF_ARM_INTERWORK | EF_ARM_APCS_26 | EF_ARM_APCS_FLOAT
3683 | EF_ARM_PIC | EF_ARM_NEW_ABI | EF_ARM_OLD_ABI
fde78edd
NC
3684 | EF_ARM_SOFT_FLOAT | EF_ARM_VFP_FLOAT
3685 | EF_ARM_MAVERICK_FLOAT);
fc830a83 3686 break;
9a5aca8c 3687
fc830a83 3688 case EF_ARM_EABI_VER1:
9b485d32 3689 fprintf (file, _(" [Version1 EABI]"));
9a5aca8c 3690
fc830a83 3691 if (flags & EF_ARM_SYMSARESORTED)
9b485d32 3692 fprintf (file, _(" [sorted symbol table]"));
fc830a83 3693 else
9b485d32 3694 fprintf (file, _(" [unsorted symbol table]"));
9a5aca8c 3695
fc830a83
NC
3696 flags &= ~ EF_ARM_SYMSARESORTED;
3697 break;
9a5aca8c 3698
fd2ec330
PB
3699 case EF_ARM_EABI_VER2:
3700 fprintf (file, _(" [Version2 EABI]"));
3701
3702 if (flags & EF_ARM_SYMSARESORTED)
3703 fprintf (file, _(" [sorted symbol table]"));
3704 else
3705 fprintf (file, _(" [unsorted symbol table]"));
3706
3707 if (flags & EF_ARM_DYNSYMSUSESEGIDX)
3708 fprintf (file, _(" [dynamic symbols use segment index]"));
3709
3710 if (flags & EF_ARM_MAPSYMSFIRST)
3711 fprintf (file, _(" [mapping symbols precede others]"));
3712
99e4ae17 3713 flags &= ~(EF_ARM_SYMSARESORTED | EF_ARM_DYNSYMSUSESEGIDX
fd2ec330
PB
3714 | EF_ARM_MAPSYMSFIRST);
3715 break;
3716
d507cf36
PB
3717 case EF_ARM_EABI_VER3:
3718 fprintf (file, _(" [Version3 EABI]"));
8cb51566
PB
3719 break;
3720
3721 case EF_ARM_EABI_VER4:
3722 fprintf (file, _(" [Version4 EABI]"));
d507cf36
PB
3723
3724 if (flags & EF_ARM_BE8)
3725 fprintf (file, _(" [BE8]"));
3726
3727 if (flags & EF_ARM_LE8)
3728 fprintf (file, _(" [LE8]"));
3729
3730 flags &= ~(EF_ARM_LE8 | EF_ARM_BE8);
3731 break;
3732
fc830a83 3733 default:
9b485d32 3734 fprintf (file, _(" <EABI version unrecognised>"));
fc830a83
NC
3735 break;
3736 }
252b5132 3737
fc830a83 3738 flags &= ~ EF_ARM_EABIMASK;
252b5132 3739
fc830a83 3740 if (flags & EF_ARM_RELEXEC)
9b485d32 3741 fprintf (file, _(" [relocatable executable]"));
252b5132 3742
fc830a83 3743 if (flags & EF_ARM_HASENTRY)
9b485d32 3744 fprintf (file, _(" [has entry point]"));
252b5132 3745
fc830a83
NC
3746 flags &= ~ (EF_ARM_RELEXEC | EF_ARM_HASENTRY);
3747
3748 if (flags)
9b485d32 3749 fprintf (file, _("<Unrecognised flag bits set>"));
9a5aca8c 3750
252b5132
RH
3751 fputc ('\n', file);
3752
b34976b6 3753 return TRUE;
252b5132
RH
3754}
3755
3756static int
57e8b36a 3757elf32_arm_get_symbol_type (Elf_Internal_Sym * elf_sym, int type)
252b5132 3758{
2f0ca46a
NC
3759 switch (ELF_ST_TYPE (elf_sym->st_info))
3760 {
3761 case STT_ARM_TFUNC:
3762 return ELF_ST_TYPE (elf_sym->st_info);
ce855c42 3763
2f0ca46a
NC
3764 case STT_ARM_16BIT:
3765 /* If the symbol is not an object, return the STT_ARM_16BIT flag.
3766 This allows us to distinguish between data used by Thumb instructions
3767 and non-data (which is probably code) inside Thumb regions of an
3768 executable. */
3769 if (type != STT_OBJECT)
3770 return ELF_ST_TYPE (elf_sym->st_info);
3771 break;
9a5aca8c 3772
ce855c42
NC
3773 default:
3774 break;
2f0ca46a
NC
3775 }
3776
3777 return type;
252b5132 3778}
f21f3fe0 3779
252b5132 3780static asection *
57e8b36a
NC
3781elf32_arm_gc_mark_hook (asection * sec,
3782 struct bfd_link_info * info ATTRIBUTE_UNUSED,
3783 Elf_Internal_Rela * rel,
3784 struct elf_link_hash_entry * h,
3785 Elf_Internal_Sym * sym)
252b5132
RH
3786{
3787 if (h != NULL)
3788 {
3789 switch (ELF32_R_TYPE (rel->r_info))
3790 {
3791 case R_ARM_GNU_VTINHERIT:
3792 case R_ARM_GNU_VTENTRY:
3793 break;
3794
3795 default:
3796 switch (h->root.type)
3797 {
3798 case bfd_link_hash_defined:
3799 case bfd_link_hash_defweak:
3800 return h->root.u.def.section;
3801
3802 case bfd_link_hash_common:
3803 return h->root.u.c.p->section;
e049a0de
ILT
3804
3805 default:
3806 break;
252b5132
RH
3807 }
3808 }
3809 }
3810 else
1e2f5b6e 3811 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
9ad5cbcf 3812
252b5132
RH
3813 return NULL;
3814}
3815
780a67af
NC
3816/* Update the got entry reference counts for the section being removed. */
3817
b34976b6 3818static bfd_boolean
57e8b36a
NC
3819elf32_arm_gc_sweep_hook (bfd * abfd ATTRIBUTE_UNUSED,
3820 struct bfd_link_info * info ATTRIBUTE_UNUSED,
3821 asection * sec ATTRIBUTE_UNUSED,
3822 const Elf_Internal_Rela * relocs ATTRIBUTE_UNUSED)
252b5132 3823{
5e681ec4
PB
3824 Elf_Internal_Shdr *symtab_hdr;
3825 struct elf_link_hash_entry **sym_hashes;
3826 bfd_signed_vma *local_got_refcounts;
3827 const Elf_Internal_Rela *rel, *relend;
3828 unsigned long r_symndx;
3829 struct elf_link_hash_entry *h;
eb043451
PB
3830 struct elf32_arm_link_hash_table * globals;
3831
3832 globals = elf32_arm_hash_table (info);
5e681ec4
PB
3833
3834 elf_section_data (sec)->local_dynrel = NULL;
3835
3836 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3837 sym_hashes = elf_sym_hashes (abfd);
3838 local_got_refcounts = elf_local_got_refcounts (abfd);
3839
3840 relend = relocs + sec->reloc_count;
3841 for (rel = relocs; rel < relend; rel++)
eb043451
PB
3842 {
3843 int r_type;
5e681ec4 3844
eb043451 3845 r_type = ELF32_R_TYPE (rel->r_info);
b6ee372a 3846#ifndef OLD_ARM_ABI
eb043451 3847 r_type = arm_real_reloc_type (globals, r_type);
b6ee372a 3848#endif
eb043451
PB
3849 switch (r_type)
3850 {
3851 case R_ARM_GOT32:
3852#ifndef OLD_ARM_ABI
3853 case R_ARM_GOT_PREL:
3854#endif
3855 r_symndx = ELF32_R_SYM (rel->r_info);
3856 if (r_symndx >= symtab_hdr->sh_info)
3857 {
3858 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3859 if (h->got.refcount > 0)
3860 h->got.refcount -= 1;
3861 }
3862 else if (local_got_refcounts != NULL)
3863 {
3864 if (local_got_refcounts[r_symndx] > 0)
3865 local_got_refcounts[r_symndx] -= 1;
3866 }
3867 break;
3868
3869 case R_ARM_ABS32:
3870 case R_ARM_REL32:
3871 case R_ARM_PC24:
3872 case R_ARM_PLT32:
3873#ifndef OLD_ARM_ABI
5b5bb741
PB
3874 case R_ARM_CALL:
3875 case R_ARM_JUMP24:
eb043451
PB
3876 case R_ARM_PREL31:
3877#endif
3878 r_symndx = ELF32_R_SYM (rel->r_info);
3879 if (r_symndx >= symtab_hdr->sh_info)
3880 {
3881 struct elf32_arm_link_hash_entry *eh;
3882 struct elf32_arm_relocs_copied **pp;
3883 struct elf32_arm_relocs_copied *p;
5e681ec4 3884
eb043451 3885 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5e681ec4 3886
eb043451
PB
3887 if (h->plt.refcount > 0)
3888 h->plt.refcount -= 1;
5e681ec4 3889
eb043451 3890 if (r_type == R_ARM_ABS32
b6ee372a 3891#ifndef OLD_ARM_ABI
eb043451 3892 || r_type == R_ARM_PREL31
b6ee372a 3893#endif
eb043451
PB
3894 || r_type == R_ARM_REL32)
3895 {
3896 eh = (struct elf32_arm_link_hash_entry *) h;
3897
3898 for (pp = &eh->relocs_copied; (p = *pp) != NULL;
3899 pp = &p->next)
3900 if (p->section == sec)
3901 {
3902 p->count -= 1;
3903 if (p->count == 0)
3904 *pp = p->next;
3905 break;
3906 }
3907 }
3908 }
3909 break;
5e681ec4 3910
eb043451
PB
3911 default:
3912 break;
3913 }
3914 }
5e681ec4 3915
b34976b6 3916 return TRUE;
252b5132
RH
3917}
3918
780a67af
NC
3919/* Look through the relocs for a section during the first phase. */
3920
b34976b6 3921static bfd_boolean
57e8b36a
NC
3922elf32_arm_check_relocs (bfd *abfd, struct bfd_link_info *info,
3923 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 3924{
b34976b6
AM
3925 Elf_Internal_Shdr *symtab_hdr;
3926 struct elf_link_hash_entry **sym_hashes;
3927 struct elf_link_hash_entry **sym_hashes_end;
3928 const Elf_Internal_Rela *rel;
3929 const Elf_Internal_Rela *rel_end;
3930 bfd *dynobj;
5e681ec4 3931 asection *sreloc;
b34976b6 3932 bfd_vma *local_got_offsets;
5e681ec4 3933 struct elf32_arm_link_hash_table *htab;
9a5aca8c 3934
1049f94e 3935 if (info->relocatable)
b34976b6 3936 return TRUE;
9a5aca8c 3937
5e681ec4
PB
3938 htab = elf32_arm_hash_table (info);
3939 sreloc = NULL;
9a5aca8c 3940
252b5132
RH
3941 dynobj = elf_hash_table (info)->dynobj;
3942 local_got_offsets = elf_local_got_offsets (abfd);
f21f3fe0 3943
252b5132
RH
3944 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3945 sym_hashes = elf_sym_hashes (abfd);
9b485d32
NC
3946 sym_hashes_end = sym_hashes
3947 + symtab_hdr->sh_size / sizeof (Elf32_External_Sym);
3948
252b5132
RH
3949 if (!elf_bad_symtab (abfd))
3950 sym_hashes_end -= symtab_hdr->sh_info;
9b485d32 3951
252b5132
RH
3952 rel_end = relocs + sec->reloc_count;
3953 for (rel = relocs; rel < rel_end; rel++)
3954 {
3955 struct elf_link_hash_entry *h;
3956 unsigned long r_symndx;
eb043451 3957 int r_type;
9a5aca8c 3958
252b5132 3959 r_symndx = ELF32_R_SYM (rel->r_info);
eb043451
PB
3960 r_type = ELF32_R_TYPE (rel->r_info);
3961#ifndef OLD_ARM_ABI
3962 r_type = arm_real_reloc_type (htab, r_type);
3963#endif
252b5132
RH
3964 if (r_symndx < symtab_hdr->sh_info)
3965 h = NULL;
3966 else
3967 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
9a5aca8c 3968
eb043451 3969 switch (r_type)
252b5132 3970 {
5e681ec4 3971 case R_ARM_GOT32:
eb043451
PB
3972#ifndef OLD_ARM_ABI
3973 case R_ARM_GOT_PREL:
3974#endif
5e681ec4 3975 /* This symbol requires a global offset table entry. */
252b5132
RH
3976 if (h != NULL)
3977 {
5e681ec4 3978 h->got.refcount++;
252b5132
RH
3979 }
3980 else
3981 {
5e681ec4
PB
3982 bfd_signed_vma *local_got_refcounts;
3983
3984 /* This is a global offset table entry for a local symbol. */
3985 local_got_refcounts = elf_local_got_refcounts (abfd);
3986 if (local_got_refcounts == NULL)
252b5132 3987 {
dc810e39 3988 bfd_size_type size;
252b5132 3989
dc810e39 3990 size = symtab_hdr->sh_info;
57e8b36a
NC
3991 size *= (sizeof (bfd_signed_vma) + sizeof (char));
3992 local_got_refcounts = bfd_zalloc (abfd, size);
5e681ec4 3993 if (local_got_refcounts == NULL)
b34976b6 3994 return FALSE;
5e681ec4 3995 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 3996 }
5e681ec4 3997 local_got_refcounts[r_symndx] += 1;
252b5132 3998 }
eb043451
PB
3999 if (r_type == R_ARM_GOT32)
4000 break;
4001 /* Fall through. */
252b5132 4002
5e681ec4
PB
4003 case R_ARM_GOTOFF:
4004 case R_ARM_GOTPC:
4005 if (htab->sgot == NULL)
4006 {
4007 if (htab->root.dynobj == NULL)
4008 htab->root.dynobj = abfd;
4009 if (!create_got_section (htab->root.dynobj, info))
4010 return FALSE;
4011 }
252b5132
RH
4012 break;
4013
4014 case R_ARM_ABS32:
4015 case R_ARM_REL32:
4016 case R_ARM_PC24:
7359ea65 4017 case R_ARM_PLT32:
eb043451 4018#ifndef OLD_ARM_ABI
5b5bb741
PB
4019 case R_ARM_CALL:
4020 case R_ARM_JUMP24:
eb043451
PB
4021 case R_ARM_PREL31:
4022#endif
7359ea65 4023 if (h != NULL)
5e681ec4
PB
4024 {
4025 /* If this reloc is in a read-only section, we might
4026 need a copy reloc. We can't check reliably at this
4027 stage whether the section is read-only, as input
4028 sections have not yet been mapped to output sections.
4029 Tentatively set the flag for now, and correct in
4030 adjust_dynamic_symbol. */
7359ea65 4031 if (!info->shared)
f5385ebf 4032 h->non_got_ref = 1;
7359ea65 4033
5e681ec4 4034 /* We may need a .plt entry if the function this reloc
c84cd8ee
DJ
4035 refers to is in a different object. We can't tell for
4036 sure yet, because something later might force the
4037 symbol local. */
eb043451 4038 if (r_type == R_ARM_PC24
5b5bb741
PB
4039#ifndef OLD_ARM_ABI
4040 || r_type == R_ARM_CALL
4041 || r_type == R_ARM_JUMP24
4042#endif
eb043451 4043 || r_type == R_ARM_PLT32)
f5385ebf 4044 h->needs_plt = 1;
4f199be3
DJ
4045
4046 /* If we create a PLT entry, this relocation will reference
4047 it, even if it's an ABS32 relocation. */
4048 h->plt.refcount += 1;
5e681ec4
PB
4049 }
4050
252b5132
RH
4051 /* If we are creating a shared library, and this is a reloc
4052 against a global symbol, or a non PC relative reloc
4053 against a local symbol, then we need to copy the reloc
4054 into the shared library. However, if we are linking with
4055 -Bsymbolic, we do not need to copy a reloc against a
4056 global symbol which is defined in an object we are
4057 including in the link (i.e., DEF_REGULAR is set). At
4058 this point we have not seen all the input files, so it is
4059 possible that DEF_REGULAR is not set now but will be set
4060 later (it is never cleared). We account for that
4061 possibility below by storing information in the
5e681ec4 4062 relocs_copied field of the hash table entry. */
252b5132 4063 if (info->shared
5e681ec4 4064 && (sec->flags & SEC_ALLOC) != 0
eb043451
PB
4065 && ((r_type != R_ARM_PC24
4066 && r_type != R_ARM_PLT32
b6ee372a 4067#ifndef OLD_ARM_ABI
5b5bb741
PB
4068 && r_type != R_ARM_CALL
4069 && r_type != R_ARM_JUMP24
eb043451 4070 && r_type != R_ARM_PREL31
b6ee372a 4071#endif
eb043451 4072 && r_type != R_ARM_REL32)
5e681ec4
PB
4073 || (h != NULL
4074 && (! info->symbolic
f5385ebf 4075 || !h->def_regular))))
252b5132 4076 {
5e681ec4
PB
4077 struct elf32_arm_relocs_copied *p, **head;
4078
252b5132
RH
4079 /* When creating a shared object, we must copy these
4080 reloc types into the output file. We create a reloc
4081 section in dynobj and make room for this reloc. */
4082 if (sreloc == NULL)
4083 {
4084 const char * name;
4085
4086 name = (bfd_elf_string_from_elf_section
4087 (abfd,
4088 elf_elfheader (abfd)->e_shstrndx,
4089 elf_section_data (sec)->rel_hdr.sh_name));
4090 if (name == NULL)
b34976b6 4091 return FALSE;
252b5132
RH
4092
4093 BFD_ASSERT (strncmp (name, ".rel", 4) == 0
99e4ae17 4094 && strcmp (bfd_get_section_name (abfd, sec),
252b5132
RH
4095 name + 4) == 0);
4096
4097 sreloc = bfd_get_section_by_name (dynobj, name);
4098 if (sreloc == NULL)
4099 {
4100 flagword flags;
4101
4102 sreloc = bfd_make_section (dynobj, name);
4103 flags = (SEC_HAS_CONTENTS | SEC_READONLY
4104 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
e5a52504
MM
4105 if ((sec->flags & SEC_ALLOC) != 0
4106 /* BPABI objects never have dynamic
4107 relocations mapped. */
4108 && !htab->symbian_p)
252b5132
RH
4109 flags |= SEC_ALLOC | SEC_LOAD;
4110 if (sreloc == NULL
4111 || ! bfd_set_section_flags (dynobj, sreloc, flags)
4112 || ! bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 4113 return FALSE;
252b5132 4114 }
5e681ec4
PB
4115
4116 elf_section_data (sec)->sreloc = sreloc;
252b5132
RH
4117 }
4118
5e681ec4
PB
4119 /* If this is a global symbol, we count the number of
4120 relocations we need for this symbol. */
4121 if (h != NULL)
252b5132 4122 {
5e681ec4
PB
4123 head = &((struct elf32_arm_link_hash_entry *) h)->relocs_copied;
4124 }
4125 else
4126 {
4127 /* Track dynamic relocs needed for local syms too.
4128 We really need local syms available to do this
4129 easily. Oh well. */
57e8b36a 4130
5e681ec4
PB
4131 asection *s;
4132 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4133 sec, r_symndx);
4134 if (s == NULL)
4135 return FALSE;
57e8b36a 4136
5e681ec4
PB
4137 head = ((struct elf32_arm_relocs_copied **)
4138 &elf_section_data (s)->local_dynrel);
4139 }
57e8b36a 4140
5e681ec4
PB
4141 p = *head;
4142 if (p == NULL || p->section != sec)
4143 {
4144 bfd_size_type amt = sizeof *p;
57e8b36a 4145
5e681ec4 4146 p = bfd_alloc (htab->root.dynobj, amt);
252b5132 4147 if (p == NULL)
5e681ec4
PB
4148 return FALSE;
4149 p->next = *head;
4150 *head = p;
4151 p->section = sec;
4152 p->count = 0;
252b5132 4153 }
57e8b36a 4154
eb043451 4155 if (r_type == R_ARM_ABS32
b6ee372a 4156#ifndef OLD_ARM_ABI
eb043451 4157 || r_type == R_ARM_PREL31
b6ee372a 4158#endif
eb043451 4159 || r_type == R_ARM_REL32)
7359ea65 4160 p->count += 1;
252b5132
RH
4161 }
4162 break;
4163
4164 /* This relocation describes the C++ object vtable hierarchy.
4165 Reconstruct it for later use during GC. */
4166 case R_ARM_GNU_VTINHERIT:
c152c796 4167 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4168 return FALSE;
252b5132 4169 break;
9a5aca8c 4170
252b5132
RH
4171 /* This relocation describes which C++ vtable entries are actually
4172 used. Record for later use during GC. */
4173 case R_ARM_GNU_VTENTRY:
c152c796 4174 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_offset))
b34976b6 4175 return FALSE;
252b5132
RH
4176 break;
4177 }
4178 }
f21f3fe0 4179
b34976b6 4180 return TRUE;
252b5132
RH
4181}
4182
b34976b6 4183static bfd_boolean
0367ecfb 4184is_arm_mapping_symbol_name (const char * name)
252b5132 4185{
0367ecfb
NC
4186 return (name != NULL)
4187 && (name[0] == '$')
4188 && ((name[1] == 'a') || (name[1] == 't') || (name[1] == 'd'))
4189 && (name[2] == 0);
4190}
f21f3fe0 4191
3c9458e9
NC
4192/* Treat mapping symbols as special target symbols. */
4193
4194static bfd_boolean
4195elf32_arm_is_target_special_symbol (bfd * abfd ATTRIBUTE_UNUSED, asymbol * sym)
4196{
4197 return is_arm_mapping_symbol_name (sym->name);
4198}
4199
0367ecfb
NC
4200/* This is a copy of elf_find_function() from elf.c except that
4201 ARM mapping symbols are ignored when looking for function names
4202 and STT_ARM_TFUNC is considered to a function type. */
252b5132 4203
0367ecfb
NC
4204static bfd_boolean
4205arm_elf_find_function (bfd * abfd ATTRIBUTE_UNUSED,
4206 asection * section,
4207 asymbol ** symbols,
4208 bfd_vma offset,
4209 const char ** filename_ptr,
4210 const char ** functionname_ptr)
4211{
4212 const char * filename = NULL;
4213 asymbol * func = NULL;
4214 bfd_vma low_func = 0;
4215 asymbol ** p;
252b5132
RH
4216
4217 for (p = symbols; *p != NULL; p++)
4218 {
4219 elf_symbol_type *q;
4220
4221 q = (elf_symbol_type *) *p;
4222
252b5132
RH
4223 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
4224 {
4225 default:
4226 break;
4227 case STT_FILE:
4228 filename = bfd_asymbol_name (&q->symbol);
4229 break;
252b5132
RH
4230 case STT_FUNC:
4231 case STT_ARM_TFUNC:
0367ecfb
NC
4232 /* Skip $a and $t symbols. */
4233 if ((q->symbol.flags & BSF_LOCAL)
4234 && is_arm_mapping_symbol_name (q->symbol.name))
4235 continue;
4236 /* Fall through. */
4237 case STT_NOTYPE:
6b40fcba 4238 if (bfd_get_section (&q->symbol) == section
252b5132
RH
4239 && q->symbol.value >= low_func
4240 && q->symbol.value <= offset)
4241 {
4242 func = (asymbol *) q;
4243 low_func = q->symbol.value;
4244 }
4245 break;
4246 }
4247 }
4248
4249 if (func == NULL)
b34976b6 4250 return FALSE;
252b5132 4251
0367ecfb
NC
4252 if (filename_ptr)
4253 *filename_ptr = filename;
4254 if (functionname_ptr)
4255 *functionname_ptr = bfd_asymbol_name (func);
4256
4257 return TRUE;
4258}
4259
4260
4261/* Find the nearest line to a particular section and offset, for error
4262 reporting. This code is a duplicate of the code in elf.c, except
4263 that it uses arm_elf_find_function. */
4264
4265static bfd_boolean
4266elf32_arm_find_nearest_line (bfd * abfd,
4267 asection * section,
4268 asymbol ** symbols,
4269 bfd_vma offset,
4270 const char ** filename_ptr,
4271 const char ** functionname_ptr,
4272 unsigned int * line_ptr)
4273{
4274 bfd_boolean found = FALSE;
4275
4276 /* We skip _bfd_dwarf1_find_nearest_line since no known ARM toolchain uses it. */
4277
4278 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4279 filename_ptr, functionname_ptr,
4280 line_ptr, 0,
4281 & elf_tdata (abfd)->dwarf2_find_line_info))
4282 {
4283 if (!*functionname_ptr)
4284 arm_elf_find_function (abfd, section, symbols, offset,
4285 *filename_ptr ? NULL : filename_ptr,
4286 functionname_ptr);
f21f3fe0 4287
0367ecfb
NC
4288 return TRUE;
4289 }
4290
4291 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4292 & found, filename_ptr,
4293 functionname_ptr, line_ptr,
4294 & elf_tdata (abfd)->line_info))
4295 return FALSE;
4296
4297 if (found && (*functionname_ptr || *line_ptr))
4298 return TRUE;
4299
4300 if (symbols == NULL)
4301 return FALSE;
4302
4303 if (! arm_elf_find_function (abfd, section, symbols, offset,
4304 filename_ptr, functionname_ptr))
4305 return FALSE;
4306
4307 *line_ptr = 0;
b34976b6 4308 return TRUE;
252b5132
RH
4309}
4310
4311/* Adjust a symbol defined by a dynamic object and referenced by a
4312 regular object. The current definition is in some section of the
4313 dynamic object, but we're not including those sections. We have to
4314 change the definition to something the rest of the link can
4315 understand. */
4316
b34976b6 4317static bfd_boolean
57e8b36a
NC
4318elf32_arm_adjust_dynamic_symbol (struct bfd_link_info * info,
4319 struct elf_link_hash_entry * h)
252b5132
RH
4320{
4321 bfd * dynobj;
4322 asection * s;
4323 unsigned int power_of_two;
4324
4325 dynobj = elf_hash_table (info)->dynobj;
4326
4327 /* Make sure we know what is going on here. */
4328 BFD_ASSERT (dynobj != NULL
f5385ebf 4329 && (h->needs_plt
f6e332e6 4330 || h->u.weakdef != NULL
f5385ebf
AM
4331 || (h->def_dynamic
4332 && h->ref_regular
4333 && !h->def_regular)));
252b5132
RH
4334
4335 /* If this is a function, put it in the procedure linkage table. We
4336 will fill in the contents of the procedure linkage table later,
4337 when we know the address of the .got section. */
24a1ba0f 4338 if (h->type == STT_FUNC
f5385ebf 4339 || h->needs_plt)
252b5132 4340 {
5e681ec4
PB
4341 if (h->plt.refcount <= 0
4342 || SYMBOL_CALLS_LOCAL (info, h)
4343 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4344 && h->root.type == bfd_link_hash_undefweak))
252b5132
RH
4345 {
4346 /* This case can occur if we saw a PLT32 reloc in an input
5e681ec4
PB
4347 file, but the symbol was never referred to by a dynamic
4348 object, or if all references were garbage collected. In
4349 such a case, we don't actually need to build a procedure
4350 linkage table, and we can just do a PC24 reloc instead. */
4351 h->plt.offset = (bfd_vma) -1;
f5385ebf 4352 h->needs_plt = 0;
252b5132
RH
4353 }
4354
b34976b6 4355 return TRUE;
252b5132 4356 }
5e681ec4
PB
4357 else
4358 /* It's possible that we incorrectly decided a .plt reloc was
5b5bb741
PB
4359 needed for an R_ARM_PC24 or similar reloc to a non-function sym
4360 in check_relocs. We can't decide accurately between function
4361 and non-function syms in check-relocs; Objects loaded later in
5e681ec4
PB
4362 the link may change h->type. So fix it now. */
4363 h->plt.offset = (bfd_vma) -1;
252b5132
RH
4364
4365 /* If this is a weak symbol, and there is a real definition, the
4366 processor independent code will have arranged for us to see the
4367 real definition first, and we can just use the same value. */
f6e332e6 4368 if (h->u.weakdef != NULL)
252b5132 4369 {
f6e332e6
AM
4370 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
4371 || h->u.weakdef->root.type == bfd_link_hash_defweak);
4372 h->root.u.def.section = h->u.weakdef->root.u.def.section;
4373 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 4374 return TRUE;
252b5132
RH
4375 }
4376
4377 /* This is a reference to a symbol defined by a dynamic object which
4378 is not a function. */
4379
4380 /* If we are creating a shared library, we must presume that the
4381 only references to the symbol are via the global offset table.
4382 For such cases we need not do anything here; the relocations will
4383 be handled correctly by relocate_section. */
4384 if (info->shared)
b34976b6 4385 return TRUE;
252b5132
RH
4386
4387 /* We must allocate the symbol in our .dynbss section, which will
4388 become part of the .bss section of the executable. There will be
4389 an entry for this symbol in the .dynsym section. The dynamic
4390 object will contain position independent code, so all references
4391 from the dynamic object to this symbol will go through the global
4392 offset table. The dynamic linker will use the .dynsym entry to
4393 determine the address it must put in the global offset table, so
4394 both the dynamic object and the regular object will refer to the
4395 same memory location for the variable. */
252b5132
RH
4396 s = bfd_get_section_by_name (dynobj, ".dynbss");
4397 BFD_ASSERT (s != NULL);
4398
4399 /* We must generate a R_ARM_COPY reloc to tell the dynamic linker to
4400 copy the initial value out of the dynamic object and into the
4401 runtime process image. We need to remember the offset into the
4402 .rel.bss section we are going to use. */
4403 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4404 {
4405 asection *srel;
4406
4407 srel = bfd_get_section_by_name (dynobj, ".rel.bss");
4408 BFD_ASSERT (srel != NULL);
eea6121a 4409 srel->size += sizeof (Elf32_External_Rel);
f5385ebf 4410 h->needs_copy = 1;
252b5132
RH
4411 }
4412
4413 /* We need to figure out the alignment required for this symbol. I
4414 have no idea how ELF linkers handle this. */
4415 power_of_two = bfd_log2 (h->size);
4416 if (power_of_two > 3)
4417 power_of_two = 3;
4418
4419 /* Apply the required alignment. */
eea6121a 4420 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
252b5132
RH
4421 if (power_of_two > bfd_get_section_alignment (dynobj, s))
4422 {
4423 if (! bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 4424 return FALSE;
252b5132
RH
4425 }
4426
4427 /* Define the symbol as being at this point in the section. */
4428 h->root.u.def.section = s;
eea6121a 4429 h->root.u.def.value = s->size;
252b5132
RH
4430
4431 /* Increment the section size to make room for the symbol. */
eea6121a 4432 s->size += h->size;
252b5132 4433
b34976b6 4434 return TRUE;
252b5132
RH
4435}
4436
5e681ec4
PB
4437/* Allocate space in .plt, .got and associated reloc sections for
4438 dynamic relocs. */
4439
4440static bfd_boolean
57e8b36a 4441allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
5e681ec4
PB
4442{
4443 struct bfd_link_info *info;
4444 struct elf32_arm_link_hash_table *htab;
4445 struct elf32_arm_link_hash_entry *eh;
4446 struct elf32_arm_relocs_copied *p;
4447
4448 if (h->root.type == bfd_link_hash_indirect)
4449 return TRUE;
4450
4451 if (h->root.type == bfd_link_hash_warning)
4452 /* When warning symbols are created, they **replace** the "real"
4453 entry in the hash table, thus we never get to see the real
4454 symbol in a hash traversal. So look at it now. */
4455 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4456
4457 info = (struct bfd_link_info *) inf;
4458 htab = elf32_arm_hash_table (info);
4459
4460 if (htab->root.dynamic_sections_created
4461 && h->plt.refcount > 0)
4462 {
4463 /* Make sure this symbol is output as a dynamic symbol.
4464 Undefined weak syms won't yet be marked as dynamic. */
4465 if (h->dynindx == -1
f5385ebf 4466 && !h->forced_local)
5e681ec4 4467 {
c152c796 4468 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4469 return FALSE;
4470 }
4471
4472 if (info->shared
7359ea65 4473 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
5e681ec4
PB
4474 {
4475 asection *s = htab->splt;
4476
4477 /* If this is the first .plt entry, make room for the special
4478 first entry. */
eea6121a 4479 if (s->size == 0)
e5a52504 4480 s->size += htab->plt_header_size;
5e681ec4 4481
eea6121a 4482 h->plt.offset = s->size;
5e681ec4
PB
4483
4484 /* If this symbol is not defined in a regular file, and we are
4485 not generating a shared library, then set the symbol to this
4486 location in the .plt. This is required to make function
4487 pointers compare as equal between the normal executable and
4488 the shared library. */
4489 if (! info->shared
f5385ebf 4490 && !h->def_regular)
5e681ec4
PB
4491 {
4492 h->root.u.def.section = s;
4493 h->root.u.def.value = h->plt.offset;
4494 }
4495
4496 /* Make room for this entry. */
e5a52504 4497 s->size += htab->plt_entry_size;
5e681ec4 4498
e5a52504
MM
4499 if (!htab->symbian_p)
4500 /* We also need to make an entry in the .got.plt section, which
4501 will be placed in the .got section by the linker script. */
4502 htab->sgotplt->size += 4;
5e681ec4
PB
4503
4504 /* We also need to make an entry in the .rel.plt section. */
eea6121a 4505 htab->srelplt->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
4506 }
4507 else
4508 {
4509 h->plt.offset = (bfd_vma) -1;
f5385ebf 4510 h->needs_plt = 0;
5e681ec4
PB
4511 }
4512 }
4513 else
4514 {
4515 h->plt.offset = (bfd_vma) -1;
f5385ebf 4516 h->needs_plt = 0;
5e681ec4
PB
4517 }
4518
4519 if (h->got.refcount > 0)
4520 {
4521 asection *s;
4522 bfd_boolean dyn;
4523
4524 /* Make sure this symbol is output as a dynamic symbol.
4525 Undefined weak syms won't yet be marked as dynamic. */
4526 if (h->dynindx == -1
f5385ebf 4527 && !h->forced_local)
5e681ec4 4528 {
c152c796 4529 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4530 return FALSE;
4531 }
4532
e5a52504
MM
4533 if (!htab->symbian_p)
4534 {
4535 s = htab->sgot;
4536 h->got.offset = s->size;
4537 s->size += 4;
4538 dyn = htab->root.dynamic_sections_created;
4539 if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4540 || h->root.type != bfd_link_hash_undefweak)
4541 && (info->shared
4542 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
4543 htab->srelgot->size += sizeof (Elf32_External_Rel);
4544 }
5e681ec4
PB
4545 }
4546 else
4547 h->got.offset = (bfd_vma) -1;
4548
4549 eh = (struct elf32_arm_link_hash_entry *) h;
4550 if (eh->relocs_copied == NULL)
4551 return TRUE;
4552
4553 /* In the shared -Bsymbolic case, discard space allocated for
4554 dynamic pc-relative relocs against symbols which turn out to be
4555 defined in regular objects. For the normal shared case, discard
4556 space for pc-relative relocs that have become local due to symbol
4557 visibility changes. */
4558
4559 if (info->shared)
4560 {
7359ea65
DJ
4561 /* Discard relocs on undefined weak syms with non-default
4562 visibility. */
5e681ec4
PB
4563 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4564 && h->root.type == bfd_link_hash_undefweak)
4565 eh->relocs_copied = NULL;
4566 }
4567 else
4568 {
4569 /* For the non-shared case, discard space for relocs against
4570 symbols which turn out to need copy relocs or are not
4571 dynamic. */
4572
f5385ebf
AM
4573 if (!h->non_got_ref
4574 && ((h->def_dynamic
4575 && !h->def_regular)
5e681ec4
PB
4576 || (htab->root.dynamic_sections_created
4577 && (h->root.type == bfd_link_hash_undefweak
4578 || h->root.type == bfd_link_hash_undefined))))
4579 {
4580 /* Make sure this symbol is output as a dynamic symbol.
4581 Undefined weak syms won't yet be marked as dynamic. */
4582 if (h->dynindx == -1
f5385ebf 4583 && !h->forced_local)
5e681ec4 4584 {
c152c796 4585 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5e681ec4
PB
4586 return FALSE;
4587 }
4588
4589 /* If that succeeded, we know we'll be keeping all the
4590 relocs. */
4591 if (h->dynindx != -1)
4592 goto keep;
4593 }
4594
4595 eh->relocs_copied = NULL;
4596
4597 keep: ;
4598 }
4599
4600 /* Finally, allocate space. */
4601 for (p = eh->relocs_copied; p != NULL; p = p->next)
4602 {
4603 asection *sreloc = elf_section_data (p->section)->sreloc;
eea6121a 4604 sreloc->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
4605 }
4606
4607 return TRUE;
4608}
4609
08d1f311
DJ
4610/* Find any dynamic relocs that apply to read-only sections. */
4611
4612static bfd_boolean
4613elf32_arm_readonly_dynrelocs (struct elf_link_hash_entry *h, PTR inf)
4614{
4615 struct elf32_arm_link_hash_entry *eh;
4616 struct elf32_arm_relocs_copied *p;
4617
4618 if (h->root.type == bfd_link_hash_warning)
4619 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4620
4621 eh = (struct elf32_arm_link_hash_entry *) h;
4622 for (p = eh->relocs_copied; p != NULL; p = p->next)
4623 {
4624 asection *s = p->section;
4625
4626 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4627 {
4628 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4629
4630 info->flags |= DF_TEXTREL;
4631
4632 /* Not an error, just cut short the traversal. */
4633 return FALSE;
4634 }
4635 }
4636 return TRUE;
4637}
4638
252b5132
RH
4639/* Set the sizes of the dynamic sections. */
4640
b34976b6 4641static bfd_boolean
57e8b36a
NC
4642elf32_arm_size_dynamic_sections (bfd * output_bfd ATTRIBUTE_UNUSED,
4643 struct bfd_link_info * info)
252b5132
RH
4644{
4645 bfd * dynobj;
4646 asection * s;
b34976b6
AM
4647 bfd_boolean plt;
4648 bfd_boolean relocs;
5e681ec4
PB
4649 bfd *ibfd;
4650 struct elf32_arm_link_hash_table *htab;
252b5132 4651
5e681ec4 4652 htab = elf32_arm_hash_table (info);
252b5132
RH
4653 dynobj = elf_hash_table (info)->dynobj;
4654 BFD_ASSERT (dynobj != NULL);
4655
4656 if (elf_hash_table (info)->dynamic_sections_created)
4657 {
4658 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 4659 if (info->executable)
252b5132
RH
4660 {
4661 s = bfd_get_section_by_name (dynobj, ".interp");
4662 BFD_ASSERT (s != NULL);
eea6121a 4663 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
252b5132
RH
4664 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
4665 }
4666 }
5e681ec4
PB
4667
4668 /* Set up .got offsets for local syms, and space for local dynamic
4669 relocs. */
4670 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
252b5132 4671 {
5e681ec4
PB
4672 bfd_signed_vma *local_got;
4673 bfd_signed_vma *end_local_got;
4674 char *local_tls_type;
4675 bfd_size_type locsymcount;
4676 Elf_Internal_Shdr *symtab_hdr;
4677 asection *srel;
4678
4679 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
4680 continue;
4681
4682 for (s = ibfd->sections; s != NULL; s = s->next)
4683 {
4684 struct elf32_arm_relocs_copied *p;
4685
4686 for (p = *((struct elf32_arm_relocs_copied **)
4687 &elf_section_data (s)->local_dynrel);
4688 p != NULL;
4689 p = p->next)
4690 {
4691 if (!bfd_is_abs_section (p->section)
4692 && bfd_is_abs_section (p->section->output_section))
4693 {
4694 /* Input section has been discarded, either because
4695 it is a copy of a linkonce section or due to
4696 linker script /DISCARD/, so we'll be discarding
4697 the relocs too. */
4698 }
4699 else if (p->count != 0)
4700 {
4701 srel = elf_section_data (p->section)->sreloc;
eea6121a 4702 srel->size += p->count * sizeof (Elf32_External_Rel);
5e681ec4
PB
4703 if ((p->section->output_section->flags & SEC_READONLY) != 0)
4704 info->flags |= DF_TEXTREL;
4705 }
4706 }
4707 }
4708
4709 local_got = elf_local_got_refcounts (ibfd);
4710 if (!local_got)
4711 continue;
4712
4713 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4714 locsymcount = symtab_hdr->sh_info;
4715 end_local_got = local_got + locsymcount;
4716 s = htab->sgot;
4717 srel = htab->srelgot;
4718 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
4719 {
4720 if (*local_got > 0)
4721 {
eea6121a
AM
4722 *local_got = s->size;
4723 s->size += 4;
5e681ec4 4724 if (info->shared)
eea6121a 4725 srel->size += sizeof (Elf32_External_Rel);
5e681ec4
PB
4726 }
4727 else
4728 *local_got = (bfd_vma) -1;
4729 }
252b5132
RH
4730 }
4731
5e681ec4
PB
4732 /* Allocate global sym .plt and .got entries, and space for global
4733 sym dynamic relocs. */
57e8b36a 4734 elf_link_hash_traverse (& htab->root, allocate_dynrelocs, info);
252b5132
RH
4735
4736 /* The check_relocs and adjust_dynamic_symbol entry points have
4737 determined the sizes of the various dynamic sections. Allocate
4738 memory for them. */
b34976b6
AM
4739 plt = FALSE;
4740 relocs = FALSE;
252b5132
RH
4741 for (s = dynobj->sections; s != NULL; s = s->next)
4742 {
4743 const char * name;
b34976b6 4744 bfd_boolean strip;
252b5132
RH
4745
4746 if ((s->flags & SEC_LINKER_CREATED) == 0)
4747 continue;
4748
4749 /* It's OK to base decisions on the section name, because none
4750 of the dynobj section names depend upon the input files. */
4751 name = bfd_get_section_name (dynobj, s);
4752
b34976b6 4753 strip = FALSE;
252b5132 4754
24a1ba0f 4755 if (strcmp (name, ".plt") == 0)
252b5132 4756 {
eea6121a 4757 if (s->size == 0)
252b5132
RH
4758 {
4759 /* Strip this section if we don't need it; see the
4760 comment below. */
b34976b6 4761 strip = TRUE;
252b5132
RH
4762 }
4763 else
4764 {
4765 /* Remember whether there is a PLT. */
b34976b6 4766 plt = TRUE;
252b5132
RH
4767 }
4768 }
4769 else if (strncmp (name, ".rel", 4) == 0)
4770 {
eea6121a 4771 if (s->size == 0)
252b5132
RH
4772 {
4773 /* If we don't need this section, strip it from the
4774 output file. This is mostly to handle .rel.bss and
4775 .rel.plt. We must create both sections in
4776 create_dynamic_sections, because they must be created
4777 before the linker maps input sections to output
4778 sections. The linker does that before
4779 adjust_dynamic_symbol is called, and it is that
4780 function which decides whether anything needs to go
4781 into these sections. */
b34976b6 4782 strip = TRUE;
252b5132
RH
4783 }
4784 else
4785 {
252b5132
RH
4786 /* Remember whether there are any reloc sections other
4787 than .rel.plt. */
4788 if (strcmp (name, ".rel.plt") != 0)
b34976b6 4789 relocs = TRUE;
252b5132
RH
4790
4791 /* We use the reloc_count field as a counter if we need
4792 to copy relocs into the output file. */
4793 s->reloc_count = 0;
4794 }
4795 }
4796 else if (strncmp (name, ".got", 4) != 0)
4797 {
4798 /* It's not one of our sections, so don't allocate space. */
4799 continue;
4800 }
4801
4802 if (strip)
4803 {
52585bb8 4804 _bfd_strip_section_from_output (info, s);
252b5132
RH
4805 continue;
4806 }
4807
4808 /* Allocate memory for the section contents. */
eea6121a
AM
4809 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
4810 if (s->contents == NULL && s->size != 0)
b34976b6 4811 return FALSE;
252b5132
RH
4812 }
4813
4814 if (elf_hash_table (info)->dynamic_sections_created)
4815 {
4816 /* Add some entries to the .dynamic section. We fill in the
4817 values later, in elf32_arm_finish_dynamic_sections, but we
4818 must add the entries now so that we get the correct size for
4819 the .dynamic section. The DT_DEBUG entry is filled in by the
4820 dynamic linker and used by the debugger. */
dc810e39 4821#define add_dynamic_entry(TAG, VAL) \
5a580b3a 4822 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39
AM
4823
4824 if (!info->shared)
252b5132 4825 {
dc810e39 4826 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 4827 return FALSE;
252b5132
RH
4828 }
4829
4830 if (plt)
4831 {
dc810e39
AM
4832 if ( !add_dynamic_entry (DT_PLTGOT, 0)
4833 || !add_dynamic_entry (DT_PLTRELSZ, 0)
4834 || !add_dynamic_entry (DT_PLTREL, DT_REL)
4835 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 4836 return FALSE;
252b5132
RH
4837 }
4838
4839 if (relocs)
4840 {
dc810e39
AM
4841 if ( !add_dynamic_entry (DT_REL, 0)
4842 || !add_dynamic_entry (DT_RELSZ, 0)
4843 || !add_dynamic_entry (DT_RELENT, sizeof (Elf32_External_Rel)))
b34976b6 4844 return FALSE;
252b5132
RH
4845 }
4846
08d1f311
DJ
4847 /* If any dynamic relocs apply to a read-only section,
4848 then we need a DT_TEXTREL entry. */
4849 if ((info->flags & DF_TEXTREL) == 0)
4850 elf_link_hash_traverse (&htab->root, elf32_arm_readonly_dynrelocs,
4851 (PTR) info);
4852
99e4ae17 4853 if ((info->flags & DF_TEXTREL) != 0)
252b5132 4854 {
dc810e39 4855 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 4856 return FALSE;
d6cf2879 4857 info->flags |= DF_TEXTREL;
252b5132
RH
4858 }
4859 }
dc810e39 4860#undef add_synamic_entry
252b5132 4861
b34976b6 4862 return TRUE;
252b5132
RH
4863}
4864
252b5132
RH
4865/* Finish up dynamic symbol handling. We set the contents of various
4866 dynamic sections here. */
4867
b34976b6 4868static bfd_boolean
57e8b36a
NC
4869elf32_arm_finish_dynamic_symbol (bfd * output_bfd, struct bfd_link_info * info,
4870 struct elf_link_hash_entry * h, Elf_Internal_Sym * sym)
252b5132
RH
4871{
4872 bfd * dynobj;
e5a52504 4873 struct elf32_arm_link_hash_table *htab;
252b5132
RH
4874
4875 dynobj = elf_hash_table (info)->dynobj;
e5a52504 4876 htab = elf32_arm_hash_table (info);
252b5132
RH
4877
4878 if (h->plt.offset != (bfd_vma) -1)
4879 {
4880 asection * splt;
252b5132 4881 asection * srel;
e5a52504 4882 bfd_byte *loc;
24a1ba0f 4883 bfd_vma plt_index;
947216bf 4884 Elf_Internal_Rela rel;
252b5132
RH
4885
4886 /* This symbol has an entry in the procedure linkage table. Set
4887 it up. */
4888
4889 BFD_ASSERT (h->dynindx != -1);
4890
4891 splt = bfd_get_section_by_name (dynobj, ".plt");
252b5132 4892 srel = bfd_get_section_by_name (dynobj, ".rel.plt");
e5a52504 4893 BFD_ASSERT (splt != NULL && srel != NULL);
252b5132 4894
24a1ba0f
NC
4895 /* Get the index in the procedure linkage table which
4896 corresponds to this symbol. This is the index of this symbol
4897 in all the symbols for which we are making plt entries. The
4898 first entry in the procedure linkage table is reserved. */
e5a52504
MM
4899 plt_index = ((h->plt.offset - htab->plt_header_size)
4900 / htab->plt_entry_size);
252b5132 4901
e5a52504
MM
4902 /* Fill in the entry in the procedure linkage table. */
4903 if (htab->symbian_p)
4904 {
4905 unsigned i;
4906 for (i = 0; i < htab->plt_entry_size / 4; ++i)
4907 bfd_put_32 (output_bfd,
4908 elf32_arm_symbian_plt_entry[i],
4909 splt->contents + h->plt.offset + 4 * i);
4910
4911 /* Fill in the entry in the .rel.plt section. */
2a1b9a48
MM
4912 rel.r_offset = (splt->output_section->vma
4913 + splt->output_offset
e5a52504
MM
4914 + h->plt.offset + 4 * (i - 1));
4915 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
4916 }
4917 else
4918 {
4919 bfd_vma got_offset;
4920 bfd_vma got_displacement;
4921 asection * sgot;
4922
4923 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
4924 BFD_ASSERT (sgot != NULL);
4925
4926 /* Get the offset into the .got table of the entry that
4927 corresponds to this function. Each .got entry is 4 bytes.
4928 The first three are reserved. */
4929 got_offset = (plt_index + 3) * 4;
4930
4931 /* Calculate the displacement between the PLT slot and the
4932 entry in the GOT. */
4933 got_displacement = (sgot->output_section->vma
4934 + sgot->output_offset
4935 + got_offset
4936 - splt->output_section->vma
4937 - splt->output_offset
4938 - h->plt.offset
4939 - 8);
5e681ec4 4940
e5a52504 4941 BFD_ASSERT ((got_displacement & 0xf0000000) == 0);
5e681ec4 4942
e5a52504
MM
4943 bfd_put_32 (output_bfd, elf32_arm_plt_entry[0] | ((got_displacement & 0x0ff00000) >> 20),
4944 splt->contents + h->plt.offset + 0);
4945 bfd_put_32 (output_bfd, elf32_arm_plt_entry[1] | ((got_displacement & 0x000ff000) >> 12),
4946 splt->contents + h->plt.offset + 4);
4947 bfd_put_32 (output_bfd, elf32_arm_plt_entry[2] | (got_displacement & 0x00000fff),
4948 splt->contents + h->plt.offset + 8);
5e681ec4 4949#ifdef FOUR_WORD_PLT
e5a52504
MM
4950 bfd_put_32 (output_bfd, elf32_arm_plt_entry[3],
4951 splt->contents + h->plt.offset + 12);
5e681ec4 4952#endif
252b5132 4953
e5a52504
MM
4954 /* Fill in the entry in the global offset table. */
4955 bfd_put_32 (output_bfd,
4956 (splt->output_section->vma
4957 + splt->output_offset),
4958 sgot->contents + got_offset);
4959
4960 /* Fill in the entry in the .rel.plt section. */
4961 rel.r_offset = (sgot->output_section->vma
4962 + sgot->output_offset
4963 + got_offset);
4964 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_JUMP_SLOT);
4965 }
57e8b36a 4966
947216bf
AM
4967 loc = srel->contents + plt_index * sizeof (Elf32_External_Rel);
4968 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132 4969
f5385ebf 4970 if (!h->def_regular)
252b5132
RH
4971 {
4972 /* Mark the symbol as undefined, rather than as defined in
4973 the .plt section. Leave the value alone. */
4974 sym->st_shndx = SHN_UNDEF;
d982ba73
PB
4975 /* If the symbol is weak, we do need to clear the value.
4976 Otherwise, the PLT entry would provide a definition for
4977 the symbol even if the symbol wasn't defined anywhere,
4978 and so the symbol would never be NULL. */
f5385ebf 4979 if (!h->ref_regular_nonweak)
d982ba73 4980 sym->st_value = 0;
252b5132
RH
4981 }
4982 }
4983
4984 if (h->got.offset != (bfd_vma) -1)
4985 {
4986 asection * sgot;
4987 asection * srel;
947216bf
AM
4988 Elf_Internal_Rela rel;
4989 bfd_byte *loc;
252b5132
RH
4990
4991 /* This symbol has an entry in the global offset table. Set it
4992 up. */
252b5132
RH
4993 sgot = bfd_get_section_by_name (dynobj, ".got");
4994 srel = bfd_get_section_by_name (dynobj, ".rel.got");
4995 BFD_ASSERT (sgot != NULL && srel != NULL);
4996
4997 rel.r_offset = (sgot->output_section->vma
4998 + sgot->output_offset
dc810e39 4999 + (h->got.offset &~ (bfd_vma) 1));
252b5132 5000
5e681ec4
PB
5001 /* If this is a static link, or it is a -Bsymbolic link and the
5002 symbol is defined locally or was forced to be local because
5003 of a version file, we just want to emit a RELATIVE reloc.
5004 The entry in the global offset table will already have been
5005 initialized in the relocate_section function. */
252b5132 5006 if (info->shared
5e681ec4
PB
5007 && SYMBOL_REFERENCES_LOCAL (info, h))
5008 {
5009 BFD_ASSERT((h->got.offset & 1) != 0);
5010 rel.r_info = ELF32_R_INFO (0, R_ARM_RELATIVE);
5011 }
252b5132
RH
5012 else
5013 {
5e681ec4 5014 BFD_ASSERT((h->got.offset & 1) == 0);
252b5132
RH
5015 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
5016 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_GLOB_DAT);
5017 }
5018
947216bf
AM
5019 loc = srel->contents + srel->reloc_count++ * sizeof (Elf32_External_Rel);
5020 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
5021 }
5022
f5385ebf 5023 if (h->needs_copy)
252b5132
RH
5024 {
5025 asection * s;
947216bf
AM
5026 Elf_Internal_Rela rel;
5027 bfd_byte *loc;
252b5132
RH
5028
5029 /* This symbol needs a copy reloc. Set it up. */
252b5132
RH
5030 BFD_ASSERT (h->dynindx != -1
5031 && (h->root.type == bfd_link_hash_defined
5032 || h->root.type == bfd_link_hash_defweak));
5033
5034 s = bfd_get_section_by_name (h->root.u.def.section->owner,
5035 ".rel.bss");
5036 BFD_ASSERT (s != NULL);
5037
5038 rel.r_offset = (h->root.u.def.value
5039 + h->root.u.def.section->output_section->vma
5040 + h->root.u.def.section->output_offset);
5041 rel.r_info = ELF32_R_INFO (h->dynindx, R_ARM_COPY);
947216bf
AM
5042 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rel);
5043 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
252b5132
RH
5044 }
5045
5046 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
5047 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
5048 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
5049 sym->st_shndx = SHN_ABS;
5050
b34976b6 5051 return TRUE;
252b5132
RH
5052}
5053
5054/* Finish up the dynamic sections. */
5055
b34976b6 5056static bfd_boolean
57e8b36a 5057elf32_arm_finish_dynamic_sections (bfd * output_bfd, struct bfd_link_info * info)
252b5132
RH
5058{
5059 bfd * dynobj;
5060 asection * sgot;
5061 asection * sdyn;
5062
5063 dynobj = elf_hash_table (info)->dynobj;
5064
5065 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
229fcec5 5066 BFD_ASSERT (elf32_arm_hash_table (info)->symbian_p || sgot != NULL);
252b5132
RH
5067 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
5068
5069 if (elf_hash_table (info)->dynamic_sections_created)
5070 {
5071 asection *splt;
5072 Elf32_External_Dyn *dyncon, *dynconend;
229fcec5 5073 struct elf32_arm_link_hash_table *htab;
252b5132 5074
229fcec5 5075 htab = elf32_arm_hash_table (info);
252b5132 5076 splt = bfd_get_section_by_name (dynobj, ".plt");
24a1ba0f 5077 BFD_ASSERT (splt != NULL && sdyn != NULL);
252b5132
RH
5078
5079 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 5080 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9b485d32 5081
252b5132
RH
5082 for (; dyncon < dynconend; dyncon++)
5083 {
5084 Elf_Internal_Dyn dyn;
5085 const char * name;
5086 asection * s;
5087
5088 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
5089
5090 switch (dyn.d_tag)
5091 {
229fcec5
MM
5092 unsigned int type;
5093
252b5132
RH
5094 default:
5095 break;
5096
229fcec5
MM
5097 case DT_HASH:
5098 name = ".hash";
5099 goto get_vma_if_bpabi;
5100 case DT_STRTAB:
5101 name = ".dynstr";
5102 goto get_vma_if_bpabi;
5103 case DT_SYMTAB:
5104 name = ".dynsym";
5105 goto get_vma_if_bpabi;
c0042f5d
MM
5106 case DT_VERSYM:
5107 name = ".gnu.version";
5108 goto get_vma_if_bpabi;
5109 case DT_VERDEF:
5110 name = ".gnu.version_d";
5111 goto get_vma_if_bpabi;
5112 case DT_VERNEED:
5113 name = ".gnu.version_r";
5114 goto get_vma_if_bpabi;
5115
252b5132
RH
5116 case DT_PLTGOT:
5117 name = ".got";
5118 goto get_vma;
5119 case DT_JMPREL:
5120 name = ".rel.plt";
5121 get_vma:
5122 s = bfd_get_section_by_name (output_bfd, name);
5123 BFD_ASSERT (s != NULL);
229fcec5
MM
5124 if (!htab->symbian_p)
5125 dyn.d_un.d_ptr = s->vma;
5126 else
5127 /* In the BPABI, tags in the PT_DYNAMIC section point
5128 at the file offset, not the memory address, for the
5129 convenience of the post linker. */
5130 dyn.d_un.d_ptr = s->filepos;
252b5132
RH
5131 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5132 break;
5133
229fcec5
MM
5134 get_vma_if_bpabi:
5135 if (htab->symbian_p)
5136 goto get_vma;
5137 break;
5138
252b5132
RH
5139 case DT_PLTRELSZ:
5140 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
5141 BFD_ASSERT (s != NULL);
eea6121a 5142 dyn.d_un.d_val = s->size;
252b5132
RH
5143 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5144 break;
229fcec5 5145
252b5132 5146 case DT_RELSZ:
229fcec5
MM
5147 if (!htab->symbian_p)
5148 {
5149 /* My reading of the SVR4 ABI indicates that the
5150 procedure linkage table relocs (DT_JMPREL) should be
5151 included in the overall relocs (DT_REL). This is
5152 what Solaris does. However, UnixWare can not handle
5153 that case. Therefore, we override the DT_RELSZ entry
5154 here to make it not include the JMPREL relocs. Since
5155 the linker script arranges for .rel.plt to follow all
5156 other relocation sections, we don't have to worry
5157 about changing the DT_REL entry. */
5158 s = bfd_get_section_by_name (output_bfd, ".rel.plt");
5159 if (s != NULL)
5160 dyn.d_un.d_val -= s->size;
5161 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5162 break;
5163 }
5164 /* Fall through */
5165
5166 case DT_REL:
5167 case DT_RELA:
5168 case DT_RELASZ:
5169 /* In the BPABI, the DT_REL tag must point at the file
5170 offset, not the VMA, of the first relocation
5171 section. So, we use code similar to that in
5172 elflink.c, but do not check for SHF_ALLOC on the
5173 relcoation section, since relocations sections are
5174 never allocated under the BPABI. The comments above
5175 about Unixware notwithstanding, we include all of the
5176 relocations here. */
5177 if (htab->symbian_p)
5178 {
5179 unsigned int i;
5180 type = ((dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
5181 ? SHT_REL : SHT_RELA);
5182 dyn.d_un.d_val = 0;
5183 for (i = 1; i < elf_numsections (output_bfd); i++)
5184 {
5185 Elf_Internal_Shdr *hdr
5186 = elf_elfsections (output_bfd)[i];
5187 if (hdr->sh_type == type)
5188 {
5189 if (dyn.d_tag == DT_RELSZ
5190 || dyn.d_tag == DT_RELASZ)
5191 dyn.d_un.d_val += hdr->sh_size;
5192 else if (dyn.d_un.d_val == 0
5193 || hdr->sh_offset < dyn.d_un.d_val)
5194 dyn.d_un.d_val = hdr->sh_offset;
5195 }
5196 }
5197 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
5198 }
252b5132 5199 break;
88f7bcd5
NC
5200
5201 /* Set the bottom bit of DT_INIT/FINI if the
5202 corresponding function is Thumb. */
5203 case DT_INIT:
5204 name = info->init_function;
5205 goto get_sym;
5206 case DT_FINI:
5207 name = info->fini_function;
5208 get_sym:
5209 /* If it wasn't set by elf_bfd_final_link
4cc11e76 5210 then there is nothing to adjust. */
88f7bcd5
NC
5211 if (dyn.d_un.d_val != 0)
5212 {
5213 struct elf_link_hash_entry * eh;
5214
5215 eh = elf_link_hash_lookup (elf_hash_table (info), name,
b34976b6 5216 FALSE, FALSE, TRUE);
88f7bcd5
NC
5217 if (eh != (struct elf_link_hash_entry *) NULL
5218 && ELF_ST_TYPE (eh->type) == STT_ARM_TFUNC)
5219 {
5220 dyn.d_un.d_val |= 1;
b34976b6 5221 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
88f7bcd5
NC
5222 }
5223 }
5224 break;
252b5132
RH
5225 }
5226 }
5227
24a1ba0f 5228 /* Fill in the first entry in the procedure linkage table. */
e5a52504 5229 if (splt->size > 0 && elf32_arm_hash_table (info)->plt_header_size)
f7a74f8c 5230 {
5e681ec4
PB
5231 bfd_vma got_displacement;
5232
5233 /* Calculate the displacement between the PLT slot and &GOT[0]. */
5234 got_displacement = (sgot->output_section->vma
5235 + sgot->output_offset
5236 - splt->output_section->vma
5237 - splt->output_offset
5238 - 16);
5239
f7a74f8c
NC
5240 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[0], splt->contents + 0);
5241 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[1], splt->contents + 4);
5242 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[2], splt->contents + 8);
5243 bfd_put_32 (output_bfd, elf32_arm_plt0_entry[3], splt->contents + 12);
5e681ec4
PB
5244#ifdef FOUR_WORD_PLT
5245 /* The displacement value goes in the otherwise-unused last word of
5246 the second entry. */
5247 bfd_put_32 (output_bfd, got_displacement, splt->contents + 28);
5248#else
5249 bfd_put_32 (output_bfd, got_displacement, splt->contents + 16);
5250#endif
f7a74f8c 5251 }
252b5132
RH
5252
5253 /* UnixWare sets the entsize of .plt to 4, although that doesn't
5254 really seem like the right value. */
5255 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
5256 }
5257
5258 /* Fill in the first three entries in the global offset table. */
229fcec5 5259 if (sgot)
252b5132 5260 {
229fcec5
MM
5261 if (sgot->size > 0)
5262 {
5263 if (sdyn == NULL)
5264 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
5265 else
5266 bfd_put_32 (output_bfd,
5267 sdyn->output_section->vma + sdyn->output_offset,
5268 sgot->contents);
5269 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
5270 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
5271 }
252b5132 5272
229fcec5
MM
5273 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
5274 }
252b5132 5275
b34976b6 5276 return TRUE;
252b5132
RH
5277}
5278
ba96a88f 5279static void
57e8b36a 5280elf32_arm_post_process_headers (bfd * abfd, struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
ba96a88f 5281{
9b485d32 5282 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
e489d0ae 5283 struct elf32_arm_link_hash_table *globals;
ba96a88f
NC
5284
5285 i_ehdrp = elf_elfheader (abfd);
5286
5287 i_ehdrp->e_ident[EI_OSABI] = ARM_ELF_OS_ABI_VERSION;
5288 i_ehdrp->e_ident[EI_ABIVERSION] = ARM_ELF_ABI_VERSION;
e489d0ae 5289
93204d3a
PB
5290 if (link_info)
5291 {
5292 globals = elf32_arm_hash_table (link_info);
5293 if (globals->byteswap_code)
5294 i_ehdrp->e_flags |= EF_ARM_BE8;
5295 }
ba96a88f
NC
5296}
5297
99e4ae17 5298static enum elf_reloc_type_class
57e8b36a 5299elf32_arm_reloc_type_class (const Elf_Internal_Rela *rela)
99e4ae17 5300{
f51e552e 5301 switch ((int) ELF32_R_TYPE (rela->r_info))
99e4ae17
AJ
5302 {
5303 case R_ARM_RELATIVE:
5304 return reloc_class_relative;
5305 case R_ARM_JUMP_SLOT:
5306 return reloc_class_plt;
5307 case R_ARM_COPY:
5308 return reloc_class_copy;
5309 default:
5310 return reloc_class_normal;
5311 }
5312}
5313
e16bb312
NC
5314/* Set the right machine number for an Arm ELF file. */
5315
5316static bfd_boolean
57e8b36a 5317elf32_arm_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
e16bb312
NC
5318{
5319 if (hdr->sh_type == SHT_NOTE)
5320 *flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_SAME_CONTENTS;
5321
5322 return TRUE;
5323}
5324
e489d0ae 5325static void
57e8b36a 5326elf32_arm_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
e16bb312 5327{
5a6c6817 5328 bfd_arm_update_notes (abfd, ARM_NOTE_SECTION);
e16bb312
NC
5329}
5330
40a18ebd
NC
5331/* Return TRUE if this is an unwinding table entry. */
5332
5333static bfd_boolean
5334is_arm_elf_unwind_section_name (bfd * abfd ATTRIBUTE_UNUSED, const char * name)
5335{
5336 size_t len1, len2;
5337
5338 len1 = sizeof (ELF_STRING_ARM_unwind) - 1;
5339 len2 = sizeof (ELF_STRING_ARM_unwind_once) - 1;
5340 return (strncmp (name, ELF_STRING_ARM_unwind, len1) == 0
5341 || strncmp (name, ELF_STRING_ARM_unwind_once, len2) == 0);
5342}
5343
5344
5345/* Set the type and flags for an ARM section. We do this by
5346 the section name, which is a hack, but ought to work. */
5347
5348static bfd_boolean
5349elf32_arm_fake_sections (bfd * abfd, Elf_Internal_Shdr * hdr, asection * sec)
5350{
5351 const char * name;
5352
5353 name = bfd_get_section_name (abfd, sec);
5354
5355 if (is_arm_elf_unwind_section_name (abfd, name))
5356 {
5357 hdr->sh_type = SHT_ARM_EXIDX;
5358 hdr->sh_flags |= SHF_LINK_ORDER;
5359 }
5360 return TRUE;
5361}
5362
5363/* Handle an ARM specific section when reading an object file.
5364 This is called when elf.c finds a section with an unknown type. */
5365
5366static bfd_boolean
5367elf32_arm_section_from_shdr (bfd *abfd,
5368 Elf_Internal_Shdr * hdr,
5369 const char *name)
5370{
5371 /* There ought to be a place to keep ELF backend specific flags, but
5372 at the moment there isn't one. We just keep track of the
5373 sections by their name, instead. Fortunately, the ABI gives
5374 names for all the ARM specific sections, so we will probably get
5375 away with this. */
5376 switch (hdr->sh_type)
5377 {
5378 case SHT_ARM_EXIDX:
5379 break;
5380
5381 default:
5382 return FALSE;
5383 }
5384
5385 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
5386 return FALSE;
5387
5388 return TRUE;
5389}
e489d0ae
PB
5390
5391/* Called for each symbol. Builds a section map based on mapping symbols.
5392 Does not alter any of the symbols. */
5393
5394static bfd_boolean
5395elf32_arm_output_symbol_hook (struct bfd_link_info *info,
5396 const char *name,
5397 Elf_Internal_Sym *elfsym,
5398 asection *input_sec,
5399 struct elf_link_hash_entry *h ATTRIBUTE_UNUSED)
5400{
5401 int mapcount;
5402 elf32_arm_section_map *map;
5403 struct elf32_arm_link_hash_table *globals;
5404
5405 /* Only do this on final link. */
5406 if (info->relocatable)
5407 return TRUE;
5408
5409 /* Only build a map if we need to byteswap code. */
5410 globals = elf32_arm_hash_table (info);
5411 if (!globals->byteswap_code)
5412 return TRUE;
5413
5414 /* We only want mapping symbols. */
0367ecfb 5415 if (! is_arm_mapping_symbol_name (name))
e489d0ae
PB
5416 return TRUE;
5417
5418 mapcount = ++(elf32_arm_section_data (input_sec)->mapcount);
5419 map = elf32_arm_section_data (input_sec)->map;
5420 /* TODO: This may be inefficient, but we probably don't usually have many
5421 mapping symbols per section. */
5422 map = bfd_realloc (map, mapcount * sizeof (elf32_arm_section_map));
5423 elf32_arm_section_data (input_sec)->map = map;
57e8b36a 5424
e489d0ae
PB
5425 map[mapcount - 1].vma = elfsym->st_value;
5426 map[mapcount - 1].type = name[1];
5427 return TRUE;
5428}
5429
5430
5431/* Allocate target specific section data. */
5432
5433static bfd_boolean
5434elf32_arm_new_section_hook (bfd *abfd, asection *sec)
5435{
5436 struct _arm_elf_section_data *sdata;
5437 bfd_size_type amt = sizeof (*sdata);
5438
5439 sdata = bfd_zalloc (abfd, amt);
5440 if (sdata == NULL)
5441 return FALSE;
5442 sec->used_by_bfd = sdata;
5443
5444 return _bfd_elf_new_section_hook (abfd, sec);
5445}
5446
5447
5448/* Used to order a list of mapping symbols by address. */
5449
5450static int
5451elf32_arm_compare_mapping (const void * a, const void * b)
5452{
5453 return ((const elf32_arm_section_map *) a)->vma
5454 > ((const elf32_arm_section_map *) b)->vma;
5455}
5456
5457
5458/* Do code byteswapping. Return FALSE afterwards so that the section is
5459 written out as normal. */
5460
5461static bfd_boolean
5462elf32_arm_write_section (bfd *output_bfd ATTRIBUTE_UNUSED, asection *sec,
5463 bfd_byte *contents)
5464{
5465 int mapcount;
5466 elf32_arm_section_map *map;
5467 bfd_vma ptr;
5468 bfd_vma end;
5469 bfd_vma offset;
5470 bfd_byte tmp;
5471 int i;
57e8b36a 5472
e489d0ae
PB
5473 mapcount = elf32_arm_section_data (sec)->mapcount;
5474 map = elf32_arm_section_data (sec)->map;
5475
5476 if (mapcount == 0)
5477 return FALSE;
5478
5479 qsort (map, mapcount, sizeof (elf32_arm_section_map),
5480 elf32_arm_compare_mapping);
5481
5482 offset = sec->output_section->vma + sec->output_offset;
5483 ptr = map[0].vma - offset;
5484 for (i = 0; i < mapcount; i++)
5485 {
5486 if (i == mapcount - 1)
eea6121a 5487 end = sec->size;
e489d0ae
PB
5488 else
5489 end = map[i + 1].vma - offset;
57e8b36a 5490
e489d0ae
PB
5491 switch (map[i].type)
5492 {
5493 case 'a':
5494 /* Byte swap code words. */
5495 while (ptr + 3 < end)
5496 {
5497 tmp = contents[ptr];
5498 contents[ptr] = contents[ptr + 3];
5499 contents[ptr + 3] = tmp;
5500 tmp = contents[ptr + 1];
5501 contents[ptr + 1] = contents[ptr + 2];
5502 contents[ptr + 2] = tmp;
5503 ptr += 4;
5504 }
5505 break;
5506
5507 case 't':
5508 /* Byte swap code halfwords. */
5509 while (ptr + 1 < end)
5510 {
5511 tmp = contents[ptr];
5512 contents[ptr] = contents[ptr + 1];
5513 contents[ptr + 1] = tmp;
5514 ptr += 2;
5515 }
5516 break;
5517
5518 case 'd':
5519 /* Leave data alone. */
5520 break;
5521 }
5522 ptr = end;
5523 }
93204d3a 5524 free (map);
e489d0ae
PB
5525 return FALSE;
5526}
5527
252b5132
RH
5528#define ELF_ARCH bfd_arch_arm
5529#define ELF_MACHINE_CODE EM_ARM
d0facd1b
NC
5530#ifdef __QNXTARGET__
5531#define ELF_MAXPAGESIZE 0x1000
5532#else
f21f3fe0 5533#define ELF_MAXPAGESIZE 0x8000
d0facd1b 5534#endif
252b5132 5535
99e4ae17
AJ
5536#define bfd_elf32_bfd_copy_private_bfd_data elf32_arm_copy_private_bfd_data
5537#define bfd_elf32_bfd_merge_private_bfd_data elf32_arm_merge_private_bfd_data
252b5132
RH
5538#define bfd_elf32_bfd_set_private_flags elf32_arm_set_private_flags
5539#define bfd_elf32_bfd_print_private_bfd_data elf32_arm_print_private_bfd_data
5540#define bfd_elf32_bfd_link_hash_table_create elf32_arm_link_hash_table_create
dc810e39 5541#define bfd_elf32_bfd_reloc_type_lookup elf32_arm_reloc_type_lookup
252b5132 5542#define bfd_elf32_find_nearest_line elf32_arm_find_nearest_line
e489d0ae 5543#define bfd_elf32_new_section_hook elf32_arm_new_section_hook
3c9458e9 5544#define bfd_elf32_bfd_is_target_special_symbol elf32_arm_is_target_special_symbol
252b5132
RH
5545
5546#define elf_backend_get_symbol_type elf32_arm_get_symbol_type
5547#define elf_backend_gc_mark_hook elf32_arm_gc_mark_hook
5548#define elf_backend_gc_sweep_hook elf32_arm_gc_sweep_hook
5549#define elf_backend_check_relocs elf32_arm_check_relocs
dc810e39 5550#define elf_backend_relocate_section elf32_arm_relocate_section
e489d0ae 5551#define elf_backend_write_section elf32_arm_write_section
252b5132 5552#define elf_backend_adjust_dynamic_symbol elf32_arm_adjust_dynamic_symbol
5e681ec4 5553#define elf_backend_create_dynamic_sections elf32_arm_create_dynamic_sections
252b5132
RH
5554#define elf_backend_finish_dynamic_symbol elf32_arm_finish_dynamic_symbol
5555#define elf_backend_finish_dynamic_sections elf32_arm_finish_dynamic_sections
e489d0ae 5556#define elf_backend_link_output_symbol_hook elf32_arm_output_symbol_hook
252b5132 5557#define elf_backend_size_dynamic_sections elf32_arm_size_dynamic_sections
ba96a88f 5558#define elf_backend_post_process_headers elf32_arm_post_process_headers
99e4ae17 5559#define elf_backend_reloc_type_class elf32_arm_reloc_type_class
c178919b 5560#define elf_backend_object_p elf32_arm_object_p
e16bb312 5561#define elf_backend_section_flags elf32_arm_section_flags
40a18ebd
NC
5562#define elf_backend_fake_sections elf32_arm_fake_sections
5563#define elf_backend_section_from_shdr elf32_arm_section_from_shdr
e16bb312 5564#define elf_backend_final_write_processing elf32_arm_final_write_processing
5e681ec4 5565#define elf_backend_copy_indirect_symbol elf32_arm_copy_indirect_symbol
252b5132 5566
5e681ec4 5567#define elf_backend_can_refcount 1
252b5132
RH
5568#define elf_backend_can_gc_sections 1
5569#define elf_backend_plt_readonly 1
5570#define elf_backend_want_got_plt 1
5571#define elf_backend_want_plt_sym 0
acf8aed4 5572#if !USE_REL
b491616a
AM
5573#define elf_backend_rela_normal 1
5574#endif
252b5132 5575
04f7c78d 5576#define elf_backend_got_header_size 12
04f7c78d 5577
252b5132 5578#include "elf32-target.h"
7f266840
DJ
5579
5580/* Symbian OS Targets */
5581
5582#undef TARGET_LITTLE_SYM
5583#define TARGET_LITTLE_SYM bfd_elf32_littlearm_symbian_vec
5584#undef TARGET_LITTLE_NAME
5585#define TARGET_LITTLE_NAME "elf32-littlearm-symbian"
5586#undef TARGET_BIG_SYM
5587#define TARGET_BIG_SYM bfd_elf32_bigarm_symbian_vec
5588#undef TARGET_BIG_NAME
5589#define TARGET_BIG_NAME "elf32-bigarm-symbian"
5590
5591/* Like elf32_arm_link_hash_table_create -- but overrides
5592 appropriately for Symbian OS. */
5593static struct bfd_link_hash_table *
5594elf32_arm_symbian_link_hash_table_create (bfd *abfd)
5595{
5596 struct bfd_link_hash_table *ret;
5597
5598 ret = elf32_arm_link_hash_table_create (abfd);
5599 if (ret)
5600 {
5601 struct elf32_arm_link_hash_table *htab
5602 = (struct elf32_arm_link_hash_table *)ret;
5603 /* There is no PLT header for Symbian OS. */
5604 htab->plt_header_size = 0;
5605 /* The PLT entries are each three instructions. */
5606 htab->plt_entry_size = 4 * NUM_ELEM (elf32_arm_symbian_plt_entry);
5607 htab->symbian_p = 1;
5608 }
5609 return ret;
5610}
5611
5612/* In a BPABI executable, the dynamic linking sections do not go in
5613 the loadable read-only segment. The post-linker may wish to refer
5614 to these sections, but they are not part of the final program
5615 image. */
5616static struct bfd_elf_special_section const
5617 elf32_arm_symbian_special_sections[]=
5618{
5619 { ".dynamic", 8, 0, SHT_DYNAMIC, 0 },
5620 { ".dynstr", 7, 0, SHT_STRTAB, 0 },
5621 { ".dynsym", 7, 0, SHT_DYNSYM, 0 },
5622 { ".got", 4, 0, SHT_PROGBITS, 0 },
5623 { ".hash", 5, 0, SHT_HASH, 0 },
5624 { NULL, 0, 0, 0, 0 }
5625};
5626
c3c76620 5627static void
b34af79c
MM
5628elf32_arm_symbian_begin_write_processing (bfd *abfd,
5629 struct bfd_link_info *link_info
5630 ATTRIBUTE_UNUSED)
c3c76620
MM
5631{
5632 /* BPABI objects are never loaded directly by an OS kernel; they are
5633 processed by a postlinker first, into an OS-specific format. If
5634 the D_PAGED bit is set on the file, BFD will align segments on
5635 page boundaries, so that an OS can directly map the file. With
5636 BPABI objects, that just results in wasted space. In addition,
5637 because we clear the D_PAGED bit, map_sections_to_segments will
5638 recognize that the program headers should not be mapped into any
5639 loadable segment. */
5640 abfd->flags &= ~D_PAGED;
5641}
7f266840
DJ
5642
5643static bfd_boolean
b34af79c
MM
5644elf32_arm_symbian_modify_segment_map (bfd *abfd,
5645 struct bfd_link_info *info
5646 ATTRIBUTE_UNUSED)
7f266840
DJ
5647{
5648 struct elf_segment_map *m;
5649 asection *dynsec;
5650
7f266840
DJ
5651 /* BPABI shared libraries and executables should have a PT_DYNAMIC
5652 segment. However, because the .dynamic section is not marked
5653 with SEC_LOAD, the generic ELF code will not create such a
5654 segment. */
5655 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
5656 if (dynsec)
5657 {
5658 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
5659 m->next = elf_tdata (abfd)->segment_map;
5660 elf_tdata (abfd)->segment_map = m;
5661 }
5662
5663 return TRUE;
5664}
5665
5666#undef elf32_bed
5667#define elf32_bed elf32_arm_symbian_bed
5668
5669/* The dynamic sections are not allocated on SymbianOS; the postlinker
5670 will process them and then discard them. */
5671#undef ELF_DYNAMIC_SEC_FLAGS
5672#define ELF_DYNAMIC_SEC_FLAGS \
5673 (SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED)
5674
5675#undef bfd_elf32_bfd_link_hash_table_create
5676#define bfd_elf32_bfd_link_hash_table_create \
5677 elf32_arm_symbian_link_hash_table_create
5678
5679#undef elf_backend_special_sections
5680#define elf_backend_special_sections elf32_arm_symbian_special_sections
5681
c3c76620
MM
5682#undef elf_backend_begin_write_processing
5683#define elf_backend_begin_write_processing \
5684 elf32_arm_symbian_begin_write_processing
5685
7f266840
DJ
5686#undef elf_backend_modify_segment_map
5687#define elf_backend_modify_segment_map elf32_arm_symbian_modify_segment_map
5688
5689/* There is no .got section for BPABI objects, and hence no header. */
5690#undef elf_backend_got_header_size
5691#define elf_backend_got_header_size 0
5692
5693/* Similarly, there is no .got.plt section. */
5694#undef elf_backend_want_got_plt
5695#define elf_backend_want_got_plt 0
5696
5697#include "elf32-target.h"
5698
This page took 0.719443 seconds and 4 git commands to generate.