Include MI command in remotelog.
[deliverable/binutils-gdb.git] / bfd / elf32-cris.c
CommitLineData
06c15ad7 1/* CRIS-specific support for 32-bit ELF.
9dbe8890 2 Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009
3eb128b2 3 Free Software Foundation, Inc.
06c15ad7
HPN
4 Contributed by Axis Communications AB.
5 Written by Hans-Peter Nilsson, based on elf32-fr30.c
915e5146 6 PIC and shlib bits based primarily on elf32-m68k.c and elf32-i386.c.
06c15ad7 7
ae9a127f 8 This file is part of BFD, the Binary File Descriptor library.
06c15ad7 9
ae9a127f
NC
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
cd123cb7 12 the Free Software Foundation; either version 3 of the License, or
ae9a127f 13 (at your option) any later version.
06c15ad7 14
ae9a127f
NC
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
06c15ad7 19
ae9a127f
NC
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
cd123cb7
NC
22 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
23 MA 02110-1301, USA. */
06c15ad7 24
06c15ad7 25#include "sysdep.h"
3db64b00 26#include "bfd.h"
06c15ad7
HPN
27#include "libbfd.h"
28#include "elf-bfd.h"
29#include "elf/cris.h"
100382c7 30#include <limits.h>
06c15ad7
HPN
31
32/* Forward declarations. */
33static reloc_howto_type * cris_reloc_type_lookup
34 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
35
a7c10850 36static void cris_info_to_howto_rela
947216bf 37 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
06c15ad7 38
bac23f82
HPN
39static bfd_reloc_status_type cris_elf_pcrel_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
41
b34976b6 42static bfd_boolean cris_elf_grok_prstatus
72209a1f
HPN
43 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
44
b34976b6 45static bfd_boolean cris_elf_grok_psinfo
72209a1f
HPN
46 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
47
b34976b6 48static bfd_boolean cris_elf_relocate_section
06c15ad7
HPN
49 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
50 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
51
52static bfd_reloc_status_type cris_final_link_relocate
53 PARAMS ((reloc_howto_type *, bfd *, asection *, bfd_byte *,
54 Elf_Internal_Rela *, bfd_vma));
55
b34976b6 56static bfd_boolean cris_elf_object_p PARAMS ((bfd *));
4da81684 57
b34976b6 58static void cris_elf_final_write_processing PARAMS ((bfd *, bfd_boolean));
4da81684 59
bac23f82
HPN
60static bfd_boolean cris_elf_set_mach_from_flags
61 PARAMS ((bfd *, unsigned long int));
62
b34976b6 63static bfd_boolean cris_elf_print_private_bfd_data PARAMS ((bfd *, PTR));
4da81684 64
b34976b6 65static bfd_boolean cris_elf_merge_private_bfd_data PARAMS ((bfd *, bfd *));
bac23f82 66static bfd_boolean cris_elf_copy_private_bfd_data PARAMS ((bfd *, bfd *));
4da81684 67
915e5146 68struct elf_cris_link_hash_entry;
b34976b6 69static bfd_boolean elf_cris_discard_excess_dso_dynamics
4d96d128 70 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 71static bfd_boolean elf_cris_discard_excess_program_dynamics
915e5146 72 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 73static bfd_boolean elf_cris_adjust_gotplt_to_got
915e5146 74 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 75static bfd_boolean elf_cris_try_fold_plt_to_got
915e5146
HPN
76 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
77static struct bfd_hash_entry *elf_cris_link_hash_newfunc
78 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
79static struct bfd_link_hash_table *elf_cris_link_hash_table_create
80 PARAMS ((bfd *));
b34976b6 81static bfd_boolean elf_cris_adjust_dynamic_symbol
915e5146 82 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
b34976b6 83static bfd_boolean cris_elf_check_relocs
99c79b2e
AJ
84 PARAMS ((bfd *, struct bfd_link_info *, asection *,
85 const Elf_Internal_Rela *));
86
b34976b6 87static bfd_boolean elf_cris_size_dynamic_sections
915e5146 88 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 89static bfd_boolean elf_cris_finish_dynamic_symbol
915e5146
HPN
90 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
91 Elf_Internal_Sym *));
b34976b6 92static bfd_boolean elf_cris_finish_dynamic_sections
915e5146
HPN
93 PARAMS ((bfd *, struct bfd_link_info *));
94static void elf_cris_hide_symbol
b34976b6 95 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
99e4ae17 96static enum elf_reloc_type_class elf_cris_reloc_type_class
f51e552e 97 PARAMS ((const Elf_Internal_Rela *));
915e5146 98
06c15ad7
HPN
99static reloc_howto_type cris_elf_howto_table [] =
100{
101 /* This reloc does nothing. */
102 HOWTO (R_CRIS_NONE, /* type */
103 0, /* rightshift */
104 2, /* size (0 = byte, 1 = short, 2 = long) */
105 32, /* bitsize */
b34976b6 106 FALSE, /* pc_relative */
06c15ad7
HPN
107 0, /* bitpos */
108 complain_overflow_bitfield, /* complain_on_overflow */
109 bfd_elf_generic_reloc, /* special_function */
110 "R_CRIS_NONE", /* name */
b34976b6 111 FALSE, /* partial_inplace */
06c15ad7
HPN
112 0, /* src_mask */
113 0, /* dst_mask */
b34976b6 114 FALSE), /* pcrel_offset */
06c15ad7
HPN
115
116 /* An 8 bit absolute relocation. */
117 HOWTO (R_CRIS_8, /* type */
118 0, /* rightshift */
119 0, /* size (0 = byte, 1 = short, 2 = long) */
120 8, /* bitsize */
b34976b6 121 FALSE, /* pc_relative */
06c15ad7
HPN
122 0, /* bitpos */
123 complain_overflow_bitfield, /* complain_on_overflow */
124 bfd_elf_generic_reloc, /* special_function */
125 "R_CRIS_8", /* name */
b34976b6 126 FALSE, /* partial_inplace */
06c15ad7
HPN
127 0x0000, /* src_mask */
128 0x00ff, /* dst_mask */
b34976b6 129 FALSE), /* pcrel_offset */
06c15ad7
HPN
130
131 /* A 16 bit absolute relocation. */
132 HOWTO (R_CRIS_16, /* type */
133 0, /* rightshift */
134 1, /* size (0 = byte, 1 = short, 2 = long) */
135 16, /* bitsize */
b34976b6 136 FALSE, /* pc_relative */
06c15ad7
HPN
137 0, /* bitpos */
138 complain_overflow_bitfield, /* complain_on_overflow */
139 bfd_elf_generic_reloc, /* special_function */
140 "R_CRIS_16", /* name */
b34976b6 141 FALSE, /* partial_inplace */
06c15ad7
HPN
142 0x00000000, /* src_mask */
143 0x0000ffff, /* dst_mask */
b34976b6 144 FALSE), /* pcrel_offset */
06c15ad7
HPN
145
146 /* A 32 bit absolute relocation. */
147 HOWTO (R_CRIS_32, /* type */
148 0, /* rightshift */
149 2, /* size (0 = byte, 1 = short, 2 = long) */
150 32, /* bitsize */
b34976b6 151 FALSE, /* pc_relative */
06c15ad7 152 0, /* bitpos */
b2efcd36
HPN
153 /* We don't want overflow complaints for 64-bit vma builds
154 for e.g. sym+0x40000000 (or actually sym-0xc0000000 in
155 32-bit ELF) where sym=0xc0001234.
156 Don't do this for the PIC relocs, as we don't expect to
157 see them with large offsets. */
158 complain_overflow_dont, /* complain_on_overflow */
06c15ad7
HPN
159 bfd_elf_generic_reloc, /* special_function */
160 "R_CRIS_32", /* name */
b34976b6 161 FALSE, /* partial_inplace */
06c15ad7
HPN
162 0x00000000, /* src_mask */
163 0xffffffff, /* dst_mask */
b34976b6 164 FALSE), /* pcrel_offset */
06c15ad7 165
915e5146 166 /* An 8 bit PC-relative relocation. */
06c15ad7
HPN
167 HOWTO (R_CRIS_8_PCREL, /* type */
168 0, /* rightshift */
169 0, /* size (0 = byte, 1 = short, 2 = long) */
170 8, /* bitsize */
b34976b6 171 TRUE, /* pc_relative */
06c15ad7
HPN
172 0, /* bitpos */
173 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 174 cris_elf_pcrel_reloc, /* special_function */
06c15ad7 175 "R_CRIS_8_PCREL", /* name */
b34976b6 176 FALSE, /* partial_inplace */
06c15ad7
HPN
177 0x0000, /* src_mask */
178 0x00ff, /* dst_mask */
b34976b6 179 TRUE), /* pcrel_offset */
06c15ad7 180
915e5146 181 /* A 16 bit PC-relative relocation. */
06c15ad7
HPN
182 HOWTO (R_CRIS_16_PCREL, /* type */
183 0, /* rightshift */
184 1, /* size (0 = byte, 1 = short, 2 = long) */
185 16, /* bitsize */
b34976b6 186 TRUE, /* pc_relative */
06c15ad7
HPN
187 0, /* bitpos */
188 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 189 cris_elf_pcrel_reloc, /* special_function */
44aa49bb 190 "R_CRIS_16_PCREL", /* name */
b34976b6 191 FALSE, /* partial_inplace */
06c15ad7
HPN
192 0x00000000, /* src_mask */
193 0x0000ffff, /* dst_mask */
b34976b6 194 TRUE), /* pcrel_offset */
06c15ad7 195
915e5146 196 /* A 32 bit PC-relative relocation. */
06c15ad7
HPN
197 HOWTO (R_CRIS_32_PCREL, /* type */
198 0, /* rightshift */
199 2, /* size (0 = byte, 1 = short, 2 = long) */
200 32, /* bitsize */
b34976b6 201 TRUE, /* pc_relative */
06c15ad7
HPN
202 0, /* bitpos */
203 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 204 cris_elf_pcrel_reloc, /* special_function */
44aa49bb 205 "R_CRIS_32_PCREL", /* name */
b34976b6 206 FALSE, /* partial_inplace */
06c15ad7
HPN
207 0x00000000, /* src_mask */
208 0xffffffff, /* dst_mask */
b34976b6 209 TRUE), /* pcrel_offset */
06c15ad7 210
915e5146
HPN
211 /* GNU extension to record C++ vtable hierarchy. */
212 HOWTO (R_CRIS_GNU_VTINHERIT, /* type */
06c15ad7
HPN
213 0, /* rightshift */
214 2, /* size (0 = byte, 1 = short, 2 = long) */
215 0, /* bitsize */
b34976b6 216 FALSE, /* pc_relative */
06c15ad7
HPN
217 0, /* bitpos */
218 complain_overflow_dont, /* complain_on_overflow */
219 NULL, /* special_function */
220 "R_CRIS_GNU_VTINHERIT", /* name */
b34976b6 221 FALSE, /* partial_inplace */
06c15ad7
HPN
222 0, /* src_mask */
223 0, /* dst_mask */
b34976b6 224 FALSE), /* pcrel_offset */
06c15ad7 225
915e5146
HPN
226 /* GNU extension to record C++ vtable member usage. */
227 HOWTO (R_CRIS_GNU_VTENTRY, /* type */
06c15ad7
HPN
228 0, /* rightshift */
229 2, /* size (0 = byte, 1 = short, 2 = long) */
230 0, /* bitsize */
b34976b6 231 FALSE, /* pc_relative */
06c15ad7
HPN
232 0, /* bitpos */
233 complain_overflow_dont, /* complain_on_overflow */
234 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
235 "R_CRIS_GNU_VTENTRY", /* name */
b34976b6 236 FALSE, /* partial_inplace */
06c15ad7
HPN
237 0, /* src_mask */
238 0, /* dst_mask */
b34976b6 239 FALSE), /* pcrel_offset */
915e5146
HPN
240
241 /* This is used only by the dynamic linker. The symbol should exist
242 both in the object being run and in some shared library. The
243 dynamic linker copies the data addressed by the symbol from the
244 shared library into the object, because the object being
245 run has to have the data at some particular address. */
246 HOWTO (R_CRIS_COPY, /* type */
247 0, /* rightshift */
248 2, /* size (0 = byte, 1 = short, 2 = long) */
249 32, /* bitsize */
b34976b6 250 FALSE, /* pc_relative */
915e5146
HPN
251 0, /* bitpos */
252 complain_overflow_bitfield, /* complain_on_overflow */
253 bfd_elf_generic_reloc, /* special_function */
254 "R_CRIS_COPY", /* name */
b34976b6 255 FALSE, /* partial_inplace */
915e5146
HPN
256 0, /* src_mask */
257 0, /* dst_mask */
b34976b6 258 FALSE), /* pcrel_offset */
915e5146
HPN
259
260 /* Like R_CRIS_32, but used when setting global offset table entries. */
261 HOWTO (R_CRIS_GLOB_DAT, /* type */
262 0, /* rightshift */
263 2, /* size (0 = byte, 1 = short, 2 = long) */
264 32, /* bitsize */
b34976b6 265 FALSE, /* pc_relative */
915e5146
HPN
266 0, /* bitpos */
267 complain_overflow_bitfield, /* complain_on_overflow */
268 bfd_elf_generic_reloc, /* special_function */
269 "R_CRIS_GLOB_DAT", /* name */
b34976b6 270 FALSE, /* partial_inplace */
915e5146
HPN
271 0, /* src_mask */
272 0xffffffff, /* dst_mask */
b34976b6 273 FALSE), /* pcrel_offset */
915e5146
HPN
274
275 /* Marks a procedure linkage table entry for a symbol. */
276 HOWTO (R_CRIS_JUMP_SLOT, /* type */
277 0, /* rightshift */
278 2, /* size (0 = byte, 1 = short, 2 = long) */
279 32, /* bitsize */
b34976b6 280 FALSE, /* pc_relative */
915e5146
HPN
281 0, /* bitpos */
282 complain_overflow_bitfield, /* complain_on_overflow */
283 bfd_elf_generic_reloc, /* special_function */
284 "R_CRIS_JUMP_SLOT", /* name */
b34976b6 285 FALSE, /* partial_inplace */
915e5146
HPN
286 0, /* src_mask */
287 0, /* dst_mask */
b34976b6 288 FALSE), /* pcrel_offset */
915e5146
HPN
289
290 /* Used only by the dynamic linker. When the object is run, this
291 longword is set to the load address of the object, plus the
292 addend. */
293 HOWTO (R_CRIS_RELATIVE, /* type */
294 0, /* rightshift */
295 2, /* size (0 = byte, 1 = short, 2 = long) */
296 32, /* bitsize */
b34976b6 297 FALSE, /* pc_relative */
915e5146
HPN
298 0, /* bitpos */
299 complain_overflow_bitfield, /* complain_on_overflow */
300 bfd_elf_generic_reloc, /* special_function */
301 "R_CRIS_RELATIVE", /* name */
b34976b6 302 FALSE, /* partial_inplace */
915e5146
HPN
303 0, /* src_mask */
304 0xffffffff, /* dst_mask */
b34976b6 305 FALSE), /* pcrel_offset */
915e5146
HPN
306
307 /* Like R_CRIS_32, but referring to the GOT table entry for the symbol. */
308 HOWTO (R_CRIS_16_GOT, /* type */
309 0, /* rightshift */
310 1, /* size (0 = byte, 1 = short, 2 = long) */
311 16, /* bitsize */
b34976b6 312 FALSE, /* pc_relative */
915e5146
HPN
313 0, /* bitpos */
314 complain_overflow_bitfield, /* complain_on_overflow */
315 bfd_elf_generic_reloc, /* special_function */
316 "R_CRIS_16_GOT", /* name */
b34976b6 317 FALSE, /* partial_inplace */
915e5146
HPN
318 0, /* src_mask */
319 0xffff, /* dst_mask */
b34976b6 320 FALSE), /* pcrel_offset */
915e5146
HPN
321
322 HOWTO (R_CRIS_32_GOT, /* type */
323 0, /* rightshift */
324 2, /* size (0 = byte, 1 = short, 2 = long) */
325 32, /* bitsize */
b34976b6 326 FALSE, /* pc_relative */
915e5146
HPN
327 0, /* bitpos */
328 complain_overflow_bitfield, /* complain_on_overflow */
329 bfd_elf_generic_reloc, /* special_function */
330 "R_CRIS_32_GOT", /* name */
b34976b6 331 FALSE, /* partial_inplace */
915e5146
HPN
332 0, /* src_mask */
333 0xffffffff, /* dst_mask */
b34976b6 334 FALSE), /* pcrel_offset */
915e5146
HPN
335
336 /* Like R_CRIS_32_GOT, but referring to (and requesting a) PLT part of
337 the GOT table for the symbol. */
338 HOWTO (R_CRIS_16_GOTPLT, /* type */
339 0, /* rightshift */
340 1, /* size (0 = byte, 1 = short, 2 = long) */
341 16, /* bitsize */
b34976b6 342 FALSE, /* pc_relative */
915e5146
HPN
343 0, /* bitpos */
344 complain_overflow_bitfield, /* complain_on_overflow */
345 bfd_elf_generic_reloc, /* special_function */
346 "R_CRIS_16_GOTPLT", /* name */
b34976b6 347 FALSE, /* partial_inplace */
915e5146
HPN
348 0, /* src_mask */
349 0xffff, /* dst_mask */
b34976b6 350 FALSE), /* pcrel_offset */
915e5146
HPN
351
352 HOWTO (R_CRIS_32_GOTPLT, /* type */
353 0, /* rightshift */
354 2, /* size (0 = byte, 1 = short, 2 = long) */
355 32, /* bitsize */
b34976b6 356 FALSE, /* pc_relative */
915e5146
HPN
357 0, /* bitpos */
358 complain_overflow_bitfield, /* complain_on_overflow */
359 bfd_elf_generic_reloc, /* special_function */
360 "R_CRIS_32_GOTPLT", /* name */
b34976b6 361 FALSE, /* partial_inplace */
915e5146
HPN
362 0, /* src_mask */
363 0xffffffff, /* dst_mask */
b34976b6 364 FALSE), /* pcrel_offset */
915e5146
HPN
365
366 /* A 32-bit offset from GOT to (local const) symbol: no GOT entry should
367 be necessary. */
368 HOWTO (R_CRIS_32_GOTREL, /* type */
369 0, /* rightshift */
370 2, /* size (0 = byte, 1 = short, 2 = long) */
371 32, /* bitsize */
b34976b6 372 FALSE, /* pc_relative */
915e5146
HPN
373 0, /* bitpos */
374 complain_overflow_bitfield, /* complain_on_overflow */
375 bfd_elf_generic_reloc, /* special_function */
376 "R_CRIS_32_GOTREL", /* name */
b34976b6 377 FALSE, /* partial_inplace */
915e5146
HPN
378 0, /* src_mask */
379 0xffffffff, /* dst_mask */
b34976b6 380 FALSE), /* pcrel_offset */
915e5146
HPN
381
382 /* A 32-bit offset from GOT to entry for this symbol in PLT and request
383 to create PLT entry for symbol. */
384 HOWTO (R_CRIS_32_PLT_GOTREL, /* type */
385 0, /* rightshift */
386 2, /* size (0 = byte, 1 = short, 2 = long) */
387 32, /* bitsize */
b34976b6 388 FALSE, /* pc_relative */
915e5146
HPN
389 0, /* bitpos */
390 complain_overflow_bitfield, /* complain_on_overflow */
391 bfd_elf_generic_reloc, /* special_function */
392 "R_CRIS_32_PLT_GOTREL", /* name */
b34976b6 393 FALSE, /* partial_inplace */
915e5146
HPN
394 0, /* src_mask */
395 0xffffffff, /* dst_mask */
b34976b6 396 FALSE), /* pcrel_offset */
915e5146
HPN
397
398 /* A 32-bit offset from PC (location after the relocation) + addend to
399 entry for this symbol in PLT and request to create PLT entry for
400 symbol. */
401 HOWTO (R_CRIS_32_PLT_PCREL, /* type */
402 0, /* rightshift */
403 2, /* size (0 = byte, 1 = short, 2 = long) */
404 32, /* bitsize */
b34976b6 405 TRUE, /* pc_relative */
915e5146
HPN
406 0, /* bitpos */
407 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 408 cris_elf_pcrel_reloc, /* special_function */
915e5146 409 "R_CRIS_32_PLT_PCREL", /* name */
b34976b6 410 FALSE, /* partial_inplace */
915e5146
HPN
411 0, /* src_mask */
412 0xffffffff, /* dst_mask */
3926fc54
HPN
413 TRUE), /* pcrel_offset */
414
415 /* We don't handle these in any special manner and cross-format
416 linking is not supported; just recognize them enough to pass them
417 around. FIXME: do the same for most PIC relocs and add sanity
418 tests to actually refuse gracefully to handle these and PIC
419 relocs for cross-format linking. */
420#define TLSHOWTO32(name) \
421 HOWTO (name, 0, 2, 32, FALSE, 0, complain_overflow_bitfield, \
422 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffffffff, FALSE)
100382c7
HPN
423#define TLSHOWTO16X(name, X) \
424 HOWTO (name, 0, 1, 16, FALSE, 0, complain_overflow_ ## X, \
3926fc54 425 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffff, FALSE)
100382c7
HPN
426#define TLSHOWTO16(name) TLSHOWTO16X(name, unsigned)
427#define TLSHOWTO16S(name) TLSHOWTO16X(name, signed)
3926fc54
HPN
428
429 TLSHOWTO32 (R_CRIS_32_GOT_GD),
430 TLSHOWTO16 (R_CRIS_16_GOT_GD),
431 TLSHOWTO32 (R_CRIS_32_GD),
432 TLSHOWTO32 (R_CRIS_DTP),
433 TLSHOWTO32 (R_CRIS_32_DTPREL),
100382c7 434 TLSHOWTO16S (R_CRIS_16_DTPREL),
3926fc54 435 TLSHOWTO32 (R_CRIS_32_GOT_TPREL),
100382c7 436 TLSHOWTO16S (R_CRIS_16_GOT_TPREL),
3926fc54 437 TLSHOWTO32 (R_CRIS_32_TPREL),
100382c7 438 TLSHOWTO16S (R_CRIS_16_TPREL),
75f500d7
HPN
439 TLSHOWTO32 (R_CRIS_DTPMOD),
440 TLSHOWTO32 (R_CRIS_32_IE)
06c15ad7
HPN
441};
442\f
443/* Map BFD reloc types to CRIS ELF reloc types. */
444
445struct cris_reloc_map
446{
447 bfd_reloc_code_real_type bfd_reloc_val;
448 unsigned int cris_reloc_val;
449};
450
451static const struct cris_reloc_map cris_reloc_map [] =
452{
453 { BFD_RELOC_NONE, R_CRIS_NONE },
454 { BFD_RELOC_8, R_CRIS_8 },
455 { BFD_RELOC_16, R_CRIS_16 },
456 { BFD_RELOC_32, R_CRIS_32 },
457 { BFD_RELOC_8_PCREL, R_CRIS_8_PCREL },
458 { BFD_RELOC_16_PCREL, R_CRIS_16_PCREL },
459 { BFD_RELOC_32_PCREL, R_CRIS_32_PCREL },
460 { BFD_RELOC_VTABLE_INHERIT, R_CRIS_GNU_VTINHERIT },
915e5146
HPN
461 { BFD_RELOC_VTABLE_ENTRY, R_CRIS_GNU_VTENTRY },
462 { BFD_RELOC_CRIS_COPY, R_CRIS_COPY },
463 { BFD_RELOC_CRIS_GLOB_DAT, R_CRIS_GLOB_DAT },
464 { BFD_RELOC_CRIS_JUMP_SLOT, R_CRIS_JUMP_SLOT },
465 { BFD_RELOC_CRIS_RELATIVE, R_CRIS_RELATIVE },
466 { BFD_RELOC_CRIS_16_GOT, R_CRIS_16_GOT },
467 { BFD_RELOC_CRIS_32_GOT, R_CRIS_32_GOT },
468 { BFD_RELOC_CRIS_16_GOTPLT, R_CRIS_16_GOTPLT },
469 { BFD_RELOC_CRIS_32_GOTPLT, R_CRIS_32_GOTPLT },
470 { BFD_RELOC_CRIS_32_GOTREL, R_CRIS_32_GOTREL },
471 { BFD_RELOC_CRIS_32_PLT_GOTREL, R_CRIS_32_PLT_GOTREL },
3926fc54
HPN
472 { BFD_RELOC_CRIS_32_PLT_PCREL, R_CRIS_32_PLT_PCREL },
473 { BFD_RELOC_CRIS_32_GOT_GD, R_CRIS_32_GOT_GD },
474 { BFD_RELOC_CRIS_16_GOT_GD, R_CRIS_16_GOT_GD },
475 { BFD_RELOC_CRIS_32_GD, R_CRIS_32_GD },
476 { BFD_RELOC_CRIS_DTP, R_CRIS_DTP },
477 { BFD_RELOC_CRIS_32_DTPREL, R_CRIS_32_DTPREL },
478 { BFD_RELOC_CRIS_16_DTPREL, R_CRIS_16_DTPREL },
479 { BFD_RELOC_CRIS_32_GOT_TPREL, R_CRIS_32_GOT_TPREL },
480 { BFD_RELOC_CRIS_16_GOT_TPREL, R_CRIS_16_GOT_TPREL },
481 { BFD_RELOC_CRIS_32_TPREL, R_CRIS_32_TPREL },
482 { BFD_RELOC_CRIS_16_TPREL, R_CRIS_16_TPREL },
75f500d7
HPN
483 { BFD_RELOC_CRIS_DTPMOD, R_CRIS_DTPMOD },
484 { BFD_RELOC_CRIS_32_IE, R_CRIS_32_IE }
06c15ad7
HPN
485};
486
487static reloc_howto_type *
488cris_reloc_type_lookup (abfd, code)
489 bfd * abfd ATTRIBUTE_UNUSED;
490 bfd_reloc_code_real_type code;
491{
908d94bf 492 unsigned int i;
06c15ad7 493
908d94bf 494 for (i = 0; i < sizeof (cris_reloc_map) / sizeof (cris_reloc_map[0]); i++)
06c15ad7
HPN
495 if (cris_reloc_map [i].bfd_reloc_val == code)
496 return & cris_elf_howto_table [cris_reloc_map[i].cris_reloc_val];
a7c10850 497
06c15ad7
HPN
498 return NULL;
499}
500
157090f7
AM
501static reloc_howto_type *
502cris_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, const char *r_name)
503{
504 unsigned int i;
505
506 for (i = 0;
507 i < sizeof (cris_elf_howto_table) / sizeof (cris_elf_howto_table[0]);
508 i++)
509 if (cris_elf_howto_table[i].name != NULL
510 && strcasecmp (cris_elf_howto_table[i].name, r_name) == 0)
511 return &cris_elf_howto_table[i];
512
513 return NULL;
514}
515
06c15ad7
HPN
516/* Set the howto pointer for an CRIS ELF reloc. */
517
518static void
519cris_info_to_howto_rela (abfd, cache_ptr, dst)
520 bfd * abfd ATTRIBUTE_UNUSED;
521 arelent * cache_ptr;
947216bf 522 Elf_Internal_Rela * dst;
06c15ad7 523{
100382c7 524 enum elf_cris_reloc_type r_type;
06c15ad7
HPN
525
526 r_type = ELF32_R_TYPE (dst->r_info);
527 BFD_ASSERT (r_type < (unsigned int) R_CRIS_max);
528 cache_ptr->howto = & cris_elf_howto_table [r_type];
529}
bac23f82
HPN
530
531bfd_reloc_status_type
532cris_elf_pcrel_reloc (abfd, reloc_entry, symbol, data, input_section,
533 output_bfd, error_message)
534 bfd *abfd ATTRIBUTE_UNUSED;
535 arelent *reloc_entry;
536 asymbol *symbol;
537 PTR data ATTRIBUTE_UNUSED;
538 asection *input_section;
539 bfd *output_bfd;
540 char **error_message ATTRIBUTE_UNUSED;
541{
542 /* By default (using only bfd_elf_generic_reloc when linking to
543 non-ELF formats) PC-relative relocs are relative to the beginning
544 of the reloc. CRIS PC-relative relocs are relative to the position
545 *after* the reloc because that's what pre-CRISv32 PC points to
546 after reading an insn field with that reloc. (For CRISv32, PC is
547 actually relative to the start of the insn, but we keep the old
548 definition.) Still, we use as much generic machinery as we can.
549
550 Only adjust when doing a final link. */
551 if (output_bfd == (bfd *) NULL)
552 reloc_entry->addend -= 1 << reloc_entry->howto->size;
553
554 return
555 bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
556 input_section, output_bfd, error_message);
557}
06c15ad7 558\f
bac23f82
HPN
559/* Support for core dump NOTE sections.
560 The slightly unintuitive code layout is an attempt to keep at least
561 some similarities with other ports, hoping to simplify general
562 changes, while still keeping Linux/CRIS and Linux/CRISv32 code apart. */
72209a1f 563
b34976b6 564static bfd_boolean
72209a1f
HPN
565cris_elf_grok_prstatus (abfd, note)
566 bfd *abfd;
567 Elf_Internal_Note *note;
568{
569 int offset;
eea6121a 570 size_t size;
72209a1f 571
bac23f82
HPN
572 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
573 switch (note->descsz)
574 {
575 default:
576 return FALSE;
577
578 case 202: /* Linux/CRISv32 */
579 /* pr_cursig */
580 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
581
582 /* pr_pid */
583 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 22);
584
585 /* pr_reg */
586 offset = 70;
587 size = 128;
588
589 break;
590 }
591 else
592 switch (note->descsz)
593 {
72209a1f 594 default:
b34976b6 595 return FALSE;
72209a1f 596
bc0d28ee 597 case 214: /* Linux/CRIS */
72209a1f
HPN
598 /* pr_cursig */
599 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
600
601 /* pr_pid */
602 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 22);
603
604 /* pr_reg */
605 offset = 70;
eea6121a 606 size = 140;
72209a1f
HPN
607
608 break;
bac23f82 609 }
72209a1f
HPN
610
611 /* Make a ".reg/999" section. */
612 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 613 size, note->descpos + offset);
72209a1f
HPN
614}
615
b34976b6 616static bfd_boolean
72209a1f
HPN
617cris_elf_grok_psinfo (abfd, note)
618 bfd *abfd;
619 Elf_Internal_Note *note;
620{
bac23f82
HPN
621 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
622 switch (note->descsz)
623 {
624 default:
625 return FALSE;
626
627 case 124: /* Linux/CRISv32 elf_prpsinfo */
628 elf_tdata (abfd)->core_program
629 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
630 elf_tdata (abfd)->core_command
631 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
632 }
633 else
634 switch (note->descsz)
635 {
72209a1f 636 default:
b34976b6 637 return FALSE;
72209a1f
HPN
638
639 case 124: /* Linux/CRIS elf_prpsinfo */
640 elf_tdata (abfd)->core_program
bac23f82 641 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
72209a1f 642 elf_tdata (abfd)->core_command
bac23f82
HPN
643 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
644 }
72209a1f
HPN
645
646 /* Note that for some reason, a spurious space is tacked
647 onto the end of the args in some (at least one anyway)
648 implementations, so strip it off if it exists. */
649
650 {
651 char *command = elf_tdata (abfd)->core_command;
652 int n = strlen (command);
653
654 if (0 < n && command[n - 1] == ' ')
655 command[n - 1] = '\0';
656 }
657
b34976b6 658 return TRUE;
72209a1f
HPN
659}
660\f
915e5146
HPN
661/* The name of the dynamic interpreter. This is put in the .interp
662 section. */
663
664#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
665
666/* The size in bytes of an entry in the procedure linkage table. */
667
668#define PLT_ENTRY_SIZE 20
bac23f82 669#define PLT_ENTRY_SIZE_V32 26
915e5146
HPN
670
671/* The first entry in an absolute procedure linkage table looks like this. */
672
673static const bfd_byte elf_cris_plt0_entry[PLT_ENTRY_SIZE] =
674{
675 0xfc, 0xe1,
cedb70c5 676 0x7e, 0x7e, /* push mof. */
915e5146
HPN
677 0x7f, 0x0d, /* (dip [pc+]) */
678 0, 0, 0, 0, /* Replaced with address of .got + 4. */
679 0x30, 0x7a, /* move [...],mof */
680 0x7f, 0x0d, /* (dip [pc+]) */
681 0, 0, 0, 0, /* Replaced with address of .got + 8. */
bac23f82
HPN
682 0x30, 0x09 /* jump [...] */
683};
684
685static const bfd_byte elf_cris_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
686{
687 0x84, 0xe2, /* subq 4,$sp */
688 0x6f, 0xfe, /* move.d 0,$acr */
689 0, 0, 0, 0, /* Replaced by address of .got + 4. */
690 0x7e, 0x7a, /* move $mof,[$sp] */
691 0x3f, 0x7a, /* move [$acr],$mof */
692 0x04, 0xf2, /* addq 4,acr */
693 0x6f, 0xfa, /* move.d [$acr],$acr */
694 0xbf, 0x09, /* jump $acr */
695 0xb0, 0x05, /* nop */
696 0, 0 /* Pad out to 26 bytes. */
915e5146
HPN
697};
698
699/* Subsequent entries in an absolute procedure linkage table look like
700 this. */
701
702static const bfd_byte elf_cris_plt_entry[PLT_ENTRY_SIZE] =
703{
704 0x7f, 0x0d, /* (dip [pc+]) */
705 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
706 0x30, 0x09, /* jump [...] */
707 0x3f, 0x7e, /* move [pc+],mof */
708 0, 0, 0, 0, /* Replaced with offset into relocation table. */
709 0x2f, 0xfe, /* add.d [pc+],pc */
710 0xec, 0xff,
711 0xff, 0xff /* Replaced with offset to start of .plt. */
712};
713
bac23f82
HPN
714static const bfd_byte elf_cris_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
715{
716 0x6f, 0xfe, /* move.d 0,$acr */
717 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
718 0x6f, 0xfa, /* move.d [$acr],$acr */
719 0xbf, 0x09, /* jump $acr */
720 0xb0, 0x05, /* nop */
721 0x3f, 0x7e, /* move 0,mof */
722 0, 0, 0, 0, /* Replaced with offset into relocation table. */
723 0xbf, 0x0e, /* ba start_of_plt0_entry */
724 0, 0, 0, 0, /* Replaced with offset to plt0 entry. */
725 0xb0, 0x05 /* nop */
726};
727
915e5146
HPN
728/* The first entry in a PIC procedure linkage table looks like this. */
729
730static const bfd_byte elf_cris_pic_plt0_entry[PLT_ENTRY_SIZE] =
731{
732 0xfc, 0xe1, 0x7e, 0x7e, /* push mof */
733 0x04, 0x01, 0x30, 0x7a, /* move [r0+4],mof */
734 0x08, 0x01, 0x30, 0x09, /* jump [r0+8] */
735 0, 0, 0, 0, 0, 0, 0, 0, /* Pad out to 20 bytes. */
736};
737
bac23f82
HPN
738static const bfd_byte elf_cris_pic_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
739{
740 0x84, 0xe2, /* subq 4,$sp */
741 0x04, 0x01, /* addoq 4,$r0,$acr */
742 0x7e, 0x7a, /* move $mof,[$sp] */
743 0x3f, 0x7a, /* move [$acr],$mof */
744 0x04, 0xf2, /* addq 4,$acr */
745 0x6f, 0xfa, /* move.d [$acr],$acr */
746 0xbf, 0x09, /* jump $acr */
747 0xb0, 0x05, /* nop */
748 0, 0, /* Pad out to 26 bytes. */
749 0, 0, 0, 0,
750 0, 0, 0, 0
751};
752
915e5146
HPN
753/* Subsequent entries in a PIC procedure linkage table look like this. */
754
755static const bfd_byte elf_cris_pic_plt_entry[PLT_ENTRY_SIZE] =
756{
757 0x6f, 0x0d, /* (bdap [pc+].d,r0) */
758 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
759 0x30, 0x09, /* jump [...] */
760 0x3f, 0x7e, /* move [pc+],mof */
761 0, 0, 0, 0, /* Replaced with offset into relocation table. */
762 0x2f, 0xfe, /* add.d [pc+],pc */
763 0xec, 0xff, /* Replaced with offset to start of .plt. */
764 0xff, 0xff
765};
bac23f82
HPN
766
767static const bfd_byte elf_cris_pic_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
768{
769 0x6f, 0x0d, /* addo.d 0,$r0,$acr */
770 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
771 0x6f, 0xfa, /* move.d [$acr],$acr */
772 0xbf, 0x09, /* jump $acr */
773 0xb0, 0x05, /* nop */
774 0x3f, 0x7e, /* move relocoffs,$mof */
775 0, 0, 0, 0, /* Replaced with offset into relocation table. */
776 0xbf, 0x0e, /* ba start_of_plt */
777 0, 0, 0, 0, /* Replaced with offset to start of .plt. */
778 0xb0, 0x05 /* nop */
779};
915e5146
HPN
780\f
781/* We copy elf32-m68k.c and elf32-i386.c for the basic linker hash bits
782 (and most other PIC/shlib stuff). Check that we don't drift away
783 without reason.
784
785 The CRIS linker, like the m68k and i386 linkers (and probably the rest
786 too) needs to keep track of the number of relocs that it decides to
787 copy in check_relocs for each symbol. This is so that it can discard
788 PC relative relocs if it doesn't need them when linking with
789 -Bsymbolic. We store the information in a field extending the regular
790 ELF linker hash table. */
791
792/* This structure keeps track of the number of PC relative relocs we have
793 copied for a given symbol. */
794
795struct elf_cris_pcrel_relocs_copied
796{
797 /* Next section. */
798 struct elf_cris_pcrel_relocs_copied *next;
0d08de41 799
915e5146
HPN
800 /* A section in dynobj. */
801 asection *section;
0d08de41 802
915e5146
HPN
803 /* Number of relocs copied in this section. */
804 bfd_size_type count;
0d08de41
HPN
805
806 /* Example of reloc being copied, for message. */
807 enum elf_cris_reloc_type r_type;
915e5146
HPN
808};
809
810/* CRIS ELF linker hash entry. */
811
812struct elf_cris_link_hash_entry
813{
814 struct elf_link_hash_entry root;
815
816 /* Number of PC relative relocs copied for this symbol. */
817 struct elf_cris_pcrel_relocs_copied *pcrel_relocs_copied;
818
819 /* The GOTPLT references are CRIS-specific; the goal is to avoid having
820 both a general GOT and a PLT-specific GOT entry for the same symbol,
821 when it is referenced both as a function and as a function pointer.
822
823 Number of GOTPLT references for a function. */
824 bfd_signed_vma gotplt_refcount;
825
826 /* Actual GOTPLT index for this symbol, if applicable, or zero if not
827 (zero is never used as an index). FIXME: We should be able to fold
828 this with gotplt_refcount in a union, like the got and plt unions in
829 elf_link_hash_entry. */
830 bfd_size_type gotplt_offset;
100382c7
HPN
831
832 /* The root.got.refcount is the sum of the regular reference counts
833 (this) and those members below. We have to keep a separate count
834 to track when we've found the first (or last) reference to a
835 regular got entry. The offset is in root.got.offset. */
836 bfd_signed_vma reg_got_refcount;
837
838 /* Similar to the above, the number of reloc references to this
839 symbols that need a R_CRIS_32_TPREL slot. The offset is in
840 root.got.offset, because this and .dtp_refcount can't validly
841 happen when there's also a regular GOT entry; that's invalid
842 input for which an error is emitted. */
843 bfd_signed_vma tprel_refcount;
844
845 /* Similar to the above, the number of reloc references to this
846 symbols that need a R_CRIS_DTP slot. The offset is in
847 root.got.offset; plus 4 if .tprel_refcount > 0. */
848 bfd_signed_vma dtp_refcount;
915e5146
HPN
849};
850
100382c7
HPN
851/* The local_got_refcounts and local_got_offsets are a multiple of
852 LSNUM in size, namely LGOT_ALLOC_NELTS_FOR(LSNUM) (plus one for the
853 refcount for GOT itself, see code), with the summary / group offset
854 for local symbols located at offset N, reference counts for
855 ordinary (address) relocs at offset N + LSNUM, for R_CRIS_DTP
856 relocs at offset N + 2*LSNUM, and for R_CRIS_32_TPREL relocs at N +
857 3*LSNUM. */
858
859#define LGOT_REG_NDX(x) ((x) + symtab_hdr->sh_info)
860#define LGOT_DTP_NDX(x) ((x) + 2 * symtab_hdr->sh_info)
861#define LGOT_TPREL_NDX(x) ((x) + 3 * symtab_hdr->sh_info)
862#define LGOT_ALLOC_NELTS_FOR(x) ((x) * 4)
863
915e5146
HPN
864/* CRIS ELF linker hash table. */
865
866struct elf_cris_link_hash_table
867{
868 struct elf_link_hash_table root;
869
870 /* We can't use the PLT offset and calculate to get the GOTPLT offset,
871 since we try and avoid creating GOTPLT:s when there's already a GOT.
872 Instead, we keep and update the next available index here. */
873 bfd_size_type next_gotplt_entry;
100382c7
HPN
874
875 /* The number of R_CRIS_32_DTPREL and R_CRIS_16_DTPREL that have
876 been seen for any input; if != 0, then the constant-offset
877 R_CRIS_DTPMOD is needed for this DSO/executable. This turns
878 negative at relocation, so that we don't need an extra flag for
879 when the reloc is output. */
880 bfd_signed_vma dtpmod_refcount;
915e5146
HPN
881};
882
883/* Traverse a CRIS ELF linker hash table. */
884
885#define elf_cris_link_hash_traverse(table, func, info) \
886 (elf_link_hash_traverse \
887 (&(table)->root, \
b34976b6 888 (bfd_boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
915e5146
HPN
889 (info)))
890
891/* Get the CRIS ELF linker hash table from a link_info structure. */
892
893#define elf_cris_hash_table(p) \
894 ((struct elf_cris_link_hash_table *) (p)->hash)
895
100382c7
HPN
896/* Get the CRIS ELF linker hash entry from a regular hash entry (the
897 "parent class"). The .root reference is just a simple type
898 check on the argument. */
899
900#define elf_cris_hash_entry(p) \
901 ((struct elf_cris_link_hash_entry *) (&(p)->root))
902
915e5146
HPN
903/* Create an entry in a CRIS ELF linker hash table. */
904
905static struct bfd_hash_entry *
906elf_cris_link_hash_newfunc (entry, table, string)
907 struct bfd_hash_entry *entry;
908 struct bfd_hash_table *table;
909 const char *string;
910{
911 struct elf_cris_link_hash_entry *ret =
912 (struct elf_cris_link_hash_entry *) entry;
913
914 /* Allocate the structure if it has not already been allocated by a
915 subclass. */
916 if (ret == (struct elf_cris_link_hash_entry *) NULL)
917 ret = ((struct elf_cris_link_hash_entry *)
918 bfd_hash_allocate (table,
919 sizeof (struct elf_cris_link_hash_entry)));
920 if (ret == (struct elf_cris_link_hash_entry *) NULL)
921 return (struct bfd_hash_entry *) ret;
922
923 /* Call the allocation method of the superclass. */
924 ret = ((struct elf_cris_link_hash_entry *)
925 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
926 table, string));
927 if (ret != (struct elf_cris_link_hash_entry *) NULL)
928 {
929 ret->pcrel_relocs_copied = NULL;
930 ret->gotplt_refcount = 0;
931 ret->gotplt_offset = 0;
100382c7
HPN
932 ret->dtp_refcount = 0;
933 ret->tprel_refcount = 0;
934 ret->reg_got_refcount = 0;
915e5146
HPN
935 }
936
937 return (struct bfd_hash_entry *) ret;
938}
939
940/* Create a CRIS ELF linker hash table. */
941
942static struct bfd_link_hash_table *
943elf_cris_link_hash_table_create (abfd)
944 bfd *abfd;
945{
946 struct elf_cris_link_hash_table *ret;
dc810e39 947 bfd_size_type amt = sizeof (struct elf_cris_link_hash_table);
915e5146 948
e2d34d7d 949 ret = ((struct elf_cris_link_hash_table *) bfd_malloc (amt));
915e5146
HPN
950 if (ret == (struct elf_cris_link_hash_table *) NULL)
951 return NULL;
952
66eb6687
AM
953 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
954 elf_cris_link_hash_newfunc,
955 sizeof (struct elf_cris_link_hash_entry)))
915e5146 956 {
e2d34d7d 957 free (ret);
915e5146
HPN
958 return NULL;
959 }
960
961 /* Initialize to skip over the first three entries in the gotplt; they
962 are used for run-time symbol evaluation. */
963 ret->next_gotplt_entry = 12;
964
100382c7
HPN
965 /* We haven't seen any R_CRIS_nn_GOT_TPREL initially. */
966 ret->dtpmod_refcount = 0;
967
915e5146
HPN
968 return &ret->root.root;
969}
970\f
06c15ad7 971/* Perform a single relocation. By default we use the standard BFD
915e5146 972 routines, with a few tweaks. */
06c15ad7
HPN
973
974static bfd_reloc_status_type
975cris_final_link_relocate (howto, input_bfd, input_section, contents, rel,
976 relocation)
977 reloc_howto_type * howto;
978 bfd * input_bfd;
979 asection * input_section;
980 bfd_byte * contents;
981 Elf_Internal_Rela * rel;
982 bfd_vma relocation;
983{
915e5146 984 bfd_reloc_status_type r;
100382c7 985 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
915e5146
HPN
986
987 /* PC-relative relocations are relative to the position *after*
988 the reloc. Note that for R_CRIS_8_PCREL the adjustment is
989 not a single byte, since PC must be 16-bit-aligned. */
100382c7 990 switch (r_type)
915e5146
HPN
991 {
992 /* Check that the 16-bit GOT relocs are positive. */
993 case R_CRIS_16_GOTPLT:
994 case R_CRIS_16_GOT:
995 if ((bfd_signed_vma) relocation < 0)
996 return bfd_reloc_overflow;
997 break;
998
999 case R_CRIS_32_PLT_PCREL:
1000 case R_CRIS_32_PCREL:
1001 relocation -= 2;
1002 /* Fall through. */
1003 case R_CRIS_8_PCREL:
1004 case R_CRIS_16_PCREL:
1005 relocation -= 2;
1006 break;
1007
1008 default:
1009 break;
1010 }
1011
1012 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
06c15ad7
HPN
1013 contents, rel->r_offset,
1014 relocation, rel->r_addend);
1015 return r;
1016}
1017\f
100382c7
HPN
1018
1019/* The number of errors left before we stop outputting reloc-specific
1020 explanatory messages. By coincidence, this works nicely together
1021 with the default number of messages you'll get from LD about
1022 "relocation truncated to fit" messages before you get an
1023 "additional relocation overflows omitted from the output". */
1024static int additional_relocation_error_msg_count = 10;
1025
06c15ad7
HPN
1026/* Relocate an CRIS ELF section. See elf32-fr30.c, from where this was
1027 copied, for further comments. */
1028
b34976b6 1029static bfd_boolean
06c15ad7
HPN
1030cris_elf_relocate_section (output_bfd, info, input_bfd, input_section,
1031 contents, relocs, local_syms, local_sections)
b34976b6
AM
1032 bfd *output_bfd ATTRIBUTE_UNUSED;
1033 struct bfd_link_info *info;
1034 bfd *input_bfd;
1035 asection *input_section;
1036 bfd_byte *contents;
1037 Elf_Internal_Rela *relocs;
1038 Elf_Internal_Sym *local_syms;
1039 asection **local_sections;
06c15ad7 1040{
915e5146 1041 bfd *dynobj;
b34976b6
AM
1042 Elf_Internal_Shdr *symtab_hdr;
1043 struct elf_link_hash_entry **sym_hashes;
915e5146
HPN
1044 bfd_vma *local_got_offsets;
1045 asection *sgot;
1046 asection *splt;
1047 asection *sreloc;
b34976b6
AM
1048 Elf_Internal_Rela *rel;
1049 Elf_Internal_Rela *relend;
100382c7 1050 asection *srelgot;
06c15ad7 1051
915e5146
HPN
1052 dynobj = elf_hash_table (info)->dynobj;
1053 local_got_offsets = elf_local_got_offsets (input_bfd);
06c15ad7
HPN
1054 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
1055 sym_hashes = elf_sym_hashes (input_bfd);
1056 relend = relocs + input_section->reloc_count;
1057
915e5146
HPN
1058 sgot = NULL;
1059 splt = NULL;
1060 sreloc = NULL;
100382c7 1061 srelgot = NULL;
915e5146
HPN
1062
1063 if (dynobj != NULL)
1064 {
1065 splt = bfd_get_section_by_name (dynobj, ".plt");
1066 sgot = bfd_get_section_by_name (dynobj, ".got");
1067 }
1068
06c15ad7
HPN
1069 for (rel = relocs; rel < relend; rel ++)
1070 {
b34976b6
AM
1071 reloc_howto_type *howto;
1072 unsigned long r_symndx;
1073 Elf_Internal_Sym *sym;
1074 asection *sec;
1075 struct elf_link_hash_entry *h;
1076 bfd_vma relocation;
1077 bfd_reloc_status_type r;
1078 const char *symname = NULL;
100382c7 1079 enum elf_cris_reloc_type r_type;
a7c10850 1080
06c15ad7 1081 r_type = ELF32_R_TYPE (rel->r_info);
a7c10850 1082
06c15ad7
HPN
1083 if ( r_type == R_CRIS_GNU_VTINHERIT
1084 || r_type == R_CRIS_GNU_VTENTRY)
1085 continue;
a7c10850 1086
f0fe0e16 1087 r_symndx = ELF32_R_SYM (rel->r_info);
915e5146 1088 howto = cris_elf_howto_table + r_type;
06c15ad7
HPN
1089 h = NULL;
1090 sym = NULL;
1091 sec = NULL;
a7c10850 1092
06c15ad7
HPN
1093 if (r_symndx < symtab_hdr->sh_info)
1094 {
1095 sym = local_syms + r_symndx;
1096 sec = local_sections [r_symndx];
8517fae7 1097 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
a7c10850 1098
dc810e39
AM
1099 symname = (bfd_elf_string_from_elf_section
1100 (input_bfd, symtab_hdr->sh_link, sym->st_name));
1101 if (symname == NULL)
1102 symname = bfd_section_name (input_bfd, sec);
06c15ad7
HPN
1103 }
1104 else
1105 {
560e09e9
NC
1106 bfd_boolean warned;
1107 bfd_boolean unresolved_reloc;
0a4787a0 1108
b2a8e766
AM
1109 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1110 r_symndx, symtab_hdr, sym_hashes,
1111 h, sec, relocation,
1112 unresolved_reloc, warned);
915e5146 1113
100382c7
HPN
1114 symname = h->root.root.string;
1115
560e09e9 1116 if (unresolved_reloc
915e5146
HPN
1117 /* Perhaps we should detect the cases that
1118 sec->output_section is expected to be NULL like i386 and
1119 m68k, but apparently (and according to elfxx-ia64.c) all
1120 valid cases are where the symbol is defined in a shared
1121 object which we link dynamically against. This includes
1122 PLT relocs for which we've created a PLT entry and other
1123 relocs for which we're prepared to create dynamic
1124 relocations.
1125
1126 For now, new situations cause us to just err when
1127 sec->output_offset is NULL but the object with the symbol
1128 is *not* dynamically linked against. Thus this will
1129 automatically remind us so we can see if there are other
1130 valid cases we need to revisit. */
560e09e9
NC
1131 && (sec->owner->flags & DYNAMIC) != 0)
1132 relocation = 0;
1133
1134 else if (h->root.type == bfd_link_hash_defined
1135 || h->root.type == bfd_link_hash_defweak)
1136 {
1137 /* Here follow the cases where the relocation value must
1138 be zero (or when further handling is simplified when
1139 zero). I can't claim to understand the various
1140 conditions and they weren't described in the files
1141 where I copied them from (elf32-m68k.c and
1142 elf32-i386.c), but let's mention examples of where
1143 they happen. FIXME: Perhaps define and use a
1144 dynamic_symbol_p function like ia64.
1145
1146 - When creating a shared library, we can have an
1147 ordinary relocation for a symbol defined in a shared
1148 library (perhaps the one we create). We then make
1149 the relocation value zero, as the value seen now will
1150 be added into the relocation addend in this shared
1151 library, but must be handled only at dynamic-link
1152 time. FIXME: Not sure this example covers the
1153 h->elf_link_hash_flags test, though it's there in
1154 other targets. */
1155 if (info->shared
1156 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1157 || !h->def_regular)
560e09e9
NC
1158 && (input_section->flags & SEC_ALLOC) != 0
1159 && (r_type == R_CRIS_8
1160 || r_type == R_CRIS_16
1161 || r_type == R_CRIS_32
1162 || r_type == R_CRIS_8_PCREL
1163 || r_type == R_CRIS_16_PCREL
1164 || r_type == R_CRIS_32_PCREL))
915e5146 1165 relocation = 0;
ab96bf03 1166 else if (!info->relocatable && unresolved_reloc)
915e5146 1167 {
560e09e9 1168 _bfd_error_handler
bac23f82 1169 (_("%B, section %A: unresolvable relocation %s against symbol `%s'"),
d003868e
AM
1170 input_bfd,
1171 input_section,
8f615d07 1172 cris_elf_howto_table[r_type].name,
d003868e 1173 symname);
915e5146 1174 bfd_set_error (bfd_error_bad_value);
b34976b6 1175 return FALSE;
915e5146 1176 }
06c15ad7 1177 }
06c15ad7 1178 }
a7c10850 1179
ab96bf03
AM
1180 if (sec != NULL && elf_discarded_section (sec))
1181 {
1182 /* For relocs against symbols from removed linkonce sections,
1183 or sections discarded by a linker script, we just want the
1184 section contents zeroed. Avoid any special processing. */
1185 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
1186 rel->r_info = 0;
1187 rel->r_addend = 0;
1188 continue;
1189 }
1190
1191 if (info->relocatable)
1192 continue;
1193
915e5146 1194 switch (r_type)
06c15ad7 1195 {
915e5146
HPN
1196 case R_CRIS_16_GOTPLT:
1197 case R_CRIS_32_GOTPLT:
1198 /* This is like the case for R_CRIS_32_GOT and R_CRIS_16_GOT,
1199 but we require a PLT, and the PLT handling will take care of
1200 filling in the PLT-specific GOT entry. For the GOT offset,
1201 calculate it as we do when filling it in for the .got.plt
1202 section. If we don't have a PLT, punt to GOT handling. */
1203 if (h != NULL
1204 && ((struct elf_cris_link_hash_entry *) h)->gotplt_offset != 0)
06c15ad7 1205 {
915e5146
HPN
1206 asection *sgotplt
1207 = bfd_get_section_by_name (dynobj, ".got.plt");
1208 bfd_vma got_offset;
a7c10850 1209
915e5146
HPN
1210 BFD_ASSERT (h->dynindx != -1);
1211 BFD_ASSERT (sgotplt != NULL);
a7c10850 1212
915e5146
HPN
1213 got_offset
1214 = ((struct elf_cris_link_hash_entry *) h)->gotplt_offset;
06c15ad7 1215
915e5146 1216 relocation = got_offset;
06c15ad7 1217 break;
915e5146 1218 }
06c15ad7 1219
4d96d128 1220 /* We didn't make a PLT entry for this symbol. Maybe everything is
915e5146
HPN
1221 folded into the GOT. Other than folding, this happens when
1222 statically linking PIC code, or when using -Bsymbolic. Check
1223 that we instead have a GOT entry as done for us by
1224 elf_cris_adjust_dynamic_symbol, and drop through into the
e4a2175c
HPN
1225 ordinary GOT cases. This must not happen for the
1226 executable, because any reference it does to a function
1227 that is satisfied by a DSO must generate a PLT. We assume
1228 these call-specific relocs don't address non-functions. */
1229 if (h != NULL
1230 && (h->got.offset == (bfd_vma) -1
1231 || (!info->shared
f5385ebf
AM
1232 && !(h->def_regular
1233 || (!h->def_dynamic
1234 && h->root.type == bfd_link_hash_undefweak)))))
915e5146
HPN
1235 {
1236 (*_bfd_error_handler)
e4a2175c 1237 ((h->got.offset == (bfd_vma) -1)
bac23f82 1238 ? _("%B, section %A: No PLT nor GOT for relocation %s"
d003868e 1239 " against symbol `%s'")
bac23f82 1240 : _("%B, section %A: No PLT for relocation %s"
d003868e
AM
1241 " against symbol `%s'"),
1242 input_bfd,
1243 input_section,
915e5146 1244 cris_elf_howto_table[r_type].name,
ada1953e
HPN
1245 (symname != NULL && symname[0] != '\0'
1246 ? symname : _("[whose name is lost]")));
915e5146
HPN
1247
1248 /* FIXME: Perhaps blaming input is not the right thing to
1249 do; this is probably an internal error. But it is true
1250 that we didn't like that particular input. */
1251 bfd_set_error (bfd_error_bad_value);
b34976b6 1252 return FALSE;
915e5146
HPN
1253 }
1254 /* Fall through. */
1255
1256 /* The size of the actual relocation is not used here; we only
1257 fill in the GOT table here. */
1258 case R_CRIS_16_GOT:
1259 case R_CRIS_32_GOT:
1260 {
1261 bfd_vma off;
1262
1263 /* Note that despite using RELA relocations, the .got contents
1264 is always filled in with the link-relative relocation
1265 value; the addend. */
1266
1267 if (h != NULL)
1268 {
1269 off = h->got.offset;
1270 BFD_ASSERT (off != (bfd_vma) -1);
1271
1272 if (!elf_hash_table (info)->dynamic_sections_created
205cfeb0 1273 || (! info->shared
f5385ebf 1274 && (h->def_regular
e4a2175c 1275 || h->type == STT_FUNC
f5385ebf 1276 || h->needs_plt))
915e5146
HPN
1277 || (info->shared
1278 && (info->symbolic || h->dynindx == -1)
f5385ebf 1279 && h->def_regular))
915e5146 1280 {
4d96d128 1281 /* This wasn't checked above for ! info->shared, but
e4a2175c
HPN
1282 must hold there if we get here; the symbol must
1283 be defined in the regular program or be undefweak
1284 or be a function or otherwise need a PLT. */
6849c52f
HPN
1285 BFD_ASSERT (!elf_hash_table (info)->dynamic_sections_created
1286 || info->shared
f5385ebf 1287 || h->def_regular
e4a2175c 1288 || h->type == STT_FUNC
f5385ebf 1289 || h->needs_plt
6849c52f 1290 || h->root.type == bfd_link_hash_undefweak);
4d96d128 1291
915e5146 1292 /* This is actually a static link, or it is a
6849c52f
HPN
1293 -Bsymbolic link and the symbol is defined locally,
1294 or is undefweak, or the symbol was forced to be
1295 local because of a version file, or we're not
1296 creating a dynamic object. We must initialize this
1297 entry in the global offset table. Since the offset
1298 must always be a multiple of 4, we use the least
1299 significant bit to record whether we have
1300 initialized it already.
1301
1302 If this GOT entry should be runtime-initialized, we
1303 will create a .rela.got relocation entry to
1304 initialize the value. This is done in the
1305 finish_dynamic_symbol routine. */
915e5146
HPN
1306 if ((off & 1) != 0)
1307 off &= ~1;
1308 else
1309 {
1310 bfd_put_32 (output_bfd, relocation,
1311 sgot->contents + off);
1312 h->got.offset |= 1;
1313 }
1314 }
1315 }
1316 else
1317 {
1318 BFD_ASSERT (local_got_offsets != NULL
1319 && local_got_offsets[r_symndx] != (bfd_vma) -1);
1320
1321 off = local_got_offsets[r_symndx];
1322
1323 /* The offset must always be a multiple of 4. We use
1324 the least significant bit to record whether we have
1325 already generated the necessary reloc. */
1326 if ((off & 1) != 0)
1327 off &= ~1;
1328 else
1329 {
1330 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1331
1332 if (info->shared)
1333 {
915e5146 1334 Elf_Internal_Rela outrel;
947216bf 1335 bfd_byte *loc;
915e5146 1336
100382c7
HPN
1337 if (srelgot == NULL)
1338 srelgot
1339 = bfd_get_section_by_name (dynobj, ".rela.got");
1340 BFD_ASSERT (srelgot != NULL);
915e5146
HPN
1341
1342 outrel.r_offset = (sgot->output_section->vma
1343 + sgot->output_offset
1344 + off);
1345 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
1346 outrel.r_addend = relocation;
100382c7
HPN
1347 loc = srelgot->contents;
1348 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 1349 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
915e5146
HPN
1350 }
1351
1352 local_got_offsets[r_symndx] |= 1;
1353 }
1354 }
1355
1356 relocation = sgot->output_offset + off;
1357 if (rel->r_addend != 0)
1358 {
1359 /* We can't do anything for a relocation which is against
1360 a symbol *plus offset*. GOT holds relocations for
1361 symbols. Make this an error; the compiler isn't
1362 allowed to pass us these kinds of things. */
1363 if (h == NULL)
1364 (*_bfd_error_handler)
bac23f82 1365 (_("%B, section %A: relocation %s with non-zero addend %d"
d003868e
AM
1366 " against local symbol"),
1367 input_bfd,
1368 input_section,
915e5146 1369 cris_elf_howto_table[r_type].name,
d003868e 1370 rel->r_addend);
915e5146
HPN
1371 else
1372 (*_bfd_error_handler)
bac23f82 1373 (_("%B, section %A: relocation %s with non-zero addend %d"
d003868e
AM
1374 " against symbol `%s'"),
1375 input_bfd,
1376 input_section,
915e5146
HPN
1377 cris_elf_howto_table[r_type].name,
1378 rel->r_addend,
d003868e 1379 symname[0] != '\0' ? symname : _("[whose name is lost]"));
915e5146
HPN
1380
1381 bfd_set_error (bfd_error_bad_value);
b34976b6 1382 return FALSE;
915e5146
HPN
1383 }
1384 }
1385 break;
06c15ad7 1386
915e5146 1387 case R_CRIS_32_GOTREL:
3dab95d3
HPN
1388 /* This relocation must only be performed against local symbols.
1389 It's also ok when we link a program and the symbol is either
1390 defined in an ordinary (non-DSO) object or is undefined weak. */
1391 if (h != NULL
1392 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1393 && !(!info->shared
f5385ebf
AM
1394 && (h->def_regular
1395 || (!h->def_dynamic
3dab95d3 1396 && h->root.type == bfd_link_hash_undefweak))))
915e5146
HPN
1397 {
1398 (*_bfd_error_handler)
bac23f82
HPN
1399 (_("%B, section %A: relocation %s is"
1400 " not allowed for global symbol: `%s'"),
d003868e
AM
1401 input_bfd,
1402 input_section,
915e5146 1403 cris_elf_howto_table[r_type].name,
d003868e 1404 symname);
915e5146 1405 bfd_set_error (bfd_error_bad_value);
b34976b6 1406 return FALSE;
06c15ad7
HPN
1407 }
1408
58255df3
HPN
1409 /* This can happen if we get a link error with the input ELF
1410 variant mismatching the output variant. Emit an error so
1411 it's noticed if it happens elsewhere. */
1412 if (sgot == NULL)
1413 {
1414 (*_bfd_error_handler)
bac23f82 1415 (_("%B, section %A: relocation %s with no GOT created"),
d003868e
AM
1416 input_bfd,
1417 input_section,
1418 cris_elf_howto_table[r_type].name);
58255df3 1419 bfd_set_error (bfd_error_bad_value);
b34976b6 1420 return FALSE;
58255df3
HPN
1421 }
1422
915e5146
HPN
1423 /* This relocation is like a PC-relative one, except the
1424 reference point is the location of GOT. Note that
1425 sgot->output_offset is not involved in this calculation. We
1426 always want the start of entire .got section, not the
1427 position after the reserved header. */
1428 relocation -= sgot->output_section->vma;
1429 break;
06c15ad7 1430
915e5146
HPN
1431 case R_CRIS_32_PLT_PCREL:
1432 /* Relocation is to the entry for this symbol in the
1433 procedure linkage table. */
06c15ad7 1434
915e5146
HPN
1435 /* Resolve a PLT_PCREL reloc against a local symbol directly,
1436 without using the procedure linkage table. */
0a4787a0 1437 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
915e5146
HPN
1438 break;
1439
1440 if (h->plt.offset == (bfd_vma) -1
1441 || splt == NULL)
1442 {
1443 /* We didn't make a PLT entry for this symbol. This
1444 happens when statically linking PIC code, or when
1445 using -Bsymbolic. */
1446 break;
1447 }
1448
1449 relocation = (splt->output_section->vma
1450 + splt->output_offset
1451 + h->plt.offset);
1452 break;
1453
1454 case R_CRIS_32_PLT_GOTREL:
1455 /* Like R_CRIS_32_PLT_PCREL, but the reference point is the
1456 start of the .got section. See also comment at
1457 R_CRIS_32_GOT. */
1458 relocation -= sgot->output_section->vma;
1459
1460 /* Resolve a PLT_GOTREL reloc against a local symbol directly,
1461 without using the procedure linkage table. */
0a4787a0 1462 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
915e5146
HPN
1463 break;
1464
1465 if (h->plt.offset == (bfd_vma) -1
1466 || splt == NULL)
1467 {
1468 /* We didn't make a PLT entry for this symbol. This
1469 happens when statically linking PIC code, or when
1470 using -Bsymbolic. */
1471 break;
1472 }
1473
1474 relocation = (splt->output_section->vma
1475 + splt->output_offset
1476 + h->plt.offset
1477 - sgot->output_section->vma);
1478 break;
1479
1480 case R_CRIS_8_PCREL:
1481 case R_CRIS_16_PCREL:
1482 case R_CRIS_32_PCREL:
1483 /* If the symbol was local, we need no shlib-specific handling. */
0d08de41
HPN
1484 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1485 || h->dynindx == -1)
915e5146
HPN
1486 break;
1487
1488 /* Fall through. */
1489 case R_CRIS_8:
1490 case R_CRIS_16:
1491 case R_CRIS_32:
1492 if (info->shared
ec338859 1493 && r_symndx != 0
915e5146
HPN
1494 && (input_section->flags & SEC_ALLOC) != 0
1495 && ((r_type != R_CRIS_8_PCREL
1496 && r_type != R_CRIS_16_PCREL
1497 && r_type != R_CRIS_32_PCREL)
1498 || (!info->symbolic
02865b8e 1499 || (h != NULL && !h->def_regular))))
915e5146
HPN
1500 {
1501 Elf_Internal_Rela outrel;
947216bf 1502 bfd_byte *loc;
b34976b6 1503 bfd_boolean skip, relocate;
915e5146
HPN
1504
1505 /* When generating a shared object, these relocations
1506 are copied into the output file to be resolved at run
1507 time. */
1508
1509 if (sreloc == NULL)
1510 {
83bac4b0
NC
1511 sreloc = _bfd_elf_get_dynamic_reloc_section
1512 (input_bfd, input_section, /*rela?*/ TRUE);
1513 /* The section should have been created in cris_elf_check_relocs,
1514 but that function will not be called for objects which fail in
915e5146
HPN
1515 cris_elf_merge_private_bfd_data. */
1516 if (sreloc == NULL)
1517 {
915e5146 1518 bfd_set_error (bfd_error_bad_value);
b34976b6 1519 return FALSE;
915e5146
HPN
1520 }
1521 }
1522
b34976b6
AM
1523 skip = FALSE;
1524 relocate = FALSE;
915e5146 1525
c629eae0
JJ
1526 outrel.r_offset =
1527 _bfd_elf_section_offset (output_bfd, info, input_section,
1528 rel->r_offset);
1529 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1530 skip = TRUE;
b3bf42d8
HPN
1531 else if (outrel.r_offset == (bfd_vma) -2
1532 /* For now, undefined weak symbols with non-default
1533 visibility (yielding 0), like exception info for
1534 discarded sections, will get a R_CRIS_NONE
1535 relocation rather than no relocation, because we
1536 notice too late that the symbol doesn't need a
1537 relocation. */
1538 || (h != NULL
1539 && h->root.type == bfd_link_hash_undefweak
1540 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT))
b34976b6 1541 skip = TRUE, relocate = TRUE;
915e5146
HPN
1542 outrel.r_offset += (input_section->output_section->vma
1543 + input_section->output_offset);
1544
1545 if (skip)
0bb2d96a 1546 memset (&outrel, 0, sizeof outrel);
915e5146
HPN
1547 /* h->dynindx may be -1 if the symbol was marked to
1548 become local. */
1549 else if (h != NULL
1550 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1551 || !h->def_regular))
915e5146
HPN
1552 {
1553 BFD_ASSERT (h->dynindx != -1);
915e5146
HPN
1554 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1555 outrel.r_addend = relocation + rel->r_addend;
1556 }
1557 else
1558 {
74541ad4
AM
1559 outrel.r_addend = relocation + rel->r_addend;
1560
915e5146
HPN
1561 if (r_type == R_CRIS_32)
1562 {
b34976b6 1563 relocate = TRUE;
915e5146 1564 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
915e5146
HPN
1565 }
1566 else
1567 {
1568 long indx;
1569
8517fae7 1570 if (bfd_is_abs_section (sec))
915e5146
HPN
1571 indx = 0;
1572 else if (sec == NULL || sec->owner == NULL)
1573 {
1574 bfd_set_error (bfd_error_bad_value);
b34976b6 1575 return FALSE;
915e5146
HPN
1576 }
1577 else
1578 {
1579 asection *osec;
1580
74541ad4
AM
1581 /* We are turning this relocation into one
1582 against a section symbol. It would be
1583 proper to subtract the symbol's value,
1584 osec->vma, from the emitted reloc addend,
1585 but ld.so expects buggy relocs. */
915e5146
HPN
1586 osec = sec->output_section;
1587 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1588 if (indx == 0)
1589 {
1590 struct elf_cris_link_hash_table *htab;
1591 htab = elf_cris_hash_table (info);
1592 osec = htab->root.text_index_section;
1593 indx = elf_section_data (osec)->dynindx;
1594 }
1595 BFD_ASSERT (indx != 0);
915e5146
HPN
1596 }
1597
915e5146 1598 outrel.r_info = ELF32_R_INFO (indx, r_type);
915e5146
HPN
1599 }
1600 }
1601
947216bf
AM
1602 loc = sreloc->contents;
1603 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1604 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
915e5146
HPN
1605
1606 /* This reloc will be computed at runtime, so there's no
1607 need to do anything now, except for R_CRIS_32 relocations
1608 that have been turned into R_CRIS_RELATIVE. */
1609 if (!relocate)
1610 continue;
1611 }
1612
1613 break;
100382c7
HPN
1614
1615 case R_CRIS_16_DTPREL:
1616 case R_CRIS_32_DTPREL:
1617 /* This relocation must only be performed against local
6718f446
HPN
1618 symbols, or to sections that are not loadable. It's also
1619 ok when we link a program and the symbol is defined in an
1620 ordinary (non-DSO) object (if it's undefined there, we've
1621 already seen an error). */
100382c7 1622 if (h != NULL
6718f446 1623 && (input_section->flags & SEC_ALLOC) != 0
100382c7
HPN
1624 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1625 && (info->shared
1626 || (!h->def_regular
1627 && h->root.type != bfd_link_hash_undefined)))
1628 {
1629 (*_bfd_error_handler)
1630 ((h->root.type == bfd_link_hash_undefined)
1631 /* We shouldn't get here for GCC-emitted code. */
1632 ? _("%B, section %A: relocation %s has an undefined"
1633 " reference to `%s', perhaps a declaration mixup?")
1634 : ("%B, section %A: relocation %s is"
1635 " not allowed for `%s', a global symbol with default"
1636 " visibility, perhaps a declaration mixup?"),
1637 input_bfd,
1638 input_section,
1639 cris_elf_howto_table[r_type].name,
1640 symname != NULL && symname[0] != '\0'
1641 ? symname : _("[whose name is lost]"));
1642 bfd_set_error (bfd_error_bad_value);
1643 return FALSE;
1644 }
1645
6718f446
HPN
1646 BFD_ASSERT ((input_section->flags & SEC_ALLOC) == 0
1647 || elf_cris_hash_table (info)->dtpmod_refcount != 0);
100382c7
HPN
1648
1649 /* Fill in a R_CRIS_DTPMOD reloc at offset 3 if we haven't
1650 already done so. Note that we do this in .got.plt, not
1651 in .got, as .got.plt contains the first part, still the
1652 reloc is against .got, because the linker script directs
1653 (is required to direct) them both into .got. */
6718f446
HPN
1654 if (elf_cris_hash_table (info)->dtpmod_refcount > 0
1655 && (input_section->flags & SEC_ALLOC) != 0)
100382c7
HPN
1656 {
1657 asection *sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1658 BFD_ASSERT (sgotplt != NULL);
1659
1660 if (info->shared)
1661 {
1662 Elf_Internal_Rela outrel;
1663 bfd_byte *loc;
1664
1665 if (srelgot == NULL)
1666 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1667 BFD_ASSERT (srelgot != NULL);
1668 loc = srelgot->contents;
1669 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1670
1671 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 12);
1672 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1673 outrel.r_offset = (sgotplt->output_section->vma
1674 + sgotplt->output_offset
1675 + 12);
1676 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTPMOD);
1677 outrel.r_addend = 0;
1678 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1679 }
1680 else
1681 {
1682 /* For an executable, the GOT entry contents is known. */
1683 bfd_put_32 (output_bfd, (bfd_vma) 1, sgotplt->contents + 12);
1684 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1685 }
1686
1687 /* Reverse the sign to mark that we've emitted the
1688 required GOT entry. */
1689 elf_cris_hash_table (info)->dtpmod_refcount
1690 = -elf_cris_hash_table (info)->dtpmod_refcount;
1691 }
1692
ebf275e3
HPN
1693 /* The relocation is the offset from the start of the module
1694 TLS block to the (local) symbol. */
100382c7 1695 relocation -= elf_hash_table (info)->tls_sec == NULL
ebf275e3 1696 ? 0 : elf_hash_table (info)->tls_sec->vma;
100382c7
HPN
1697 break;
1698
1699 case R_CRIS_32_GD:
1700 if (info->shared)
1701 {
1702 bfd_set_error (bfd_error_invalid_operation);
1703
1704 /* We've already informed in cris_elf_check_relocs that
1705 this is an error. */
1706 return FALSE;
1707 }
1708 /* Fall through. */
1709
1710 case R_CRIS_16_GOT_GD:
1711 case R_CRIS_32_GOT_GD:
1712 if (rel->r_addend != 0)
1713 {
1714 /* We can't do anything for a relocation which is against a
1715 symbol *plus offset*. The GOT holds relocations for
1716 symbols. Make this an error; the compiler isn't allowed
1717 to pass us these kinds of things. */
1718 (*_bfd_error_handler)
1719 (_("%B, section %A: relocation %s with non-zero addend %d"
1720 " against symbol `%s'"),
1721 input_bfd,
1722 input_section,
1723 cris_elf_howto_table[r_type].name,
1724 rel->r_addend,
1725 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1726
1727 bfd_set_error (bfd_error_bad_value);
1728 return FALSE;
1729 }
1730
34d3d6b9
HPN
1731 if (!info->shared
1732 && (h == NULL || h->def_regular || ELF_COMMON_DEF_P (h)))
100382c7
HPN
1733 {
1734 /* Known contents of the GOT. */
1735 bfd_vma off;
1736
1737 /* The symbol is defined in the program, so just write
019c5a2e 1738 (1, known_tpoffset) into the GOT. */
100382c7
HPN
1739 relocation -= elf_hash_table (info)->tls_sec->vma;
1740
1741 if (h != NULL)
1742 {
1743 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1744 ? h->got.offset + 4 : h->got.offset;
1745 }
1746 else
1747 {
1748 off = local_got_offsets[r_symndx];
1749 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1750 off += 4;
1751 }
1752
1753 /* We use bit 1 of the offset as a flag for GOT entry with
1754 the R_CRIS_DTP reloc, setting it when we've emitted the
1755 GOT entry and reloc. Bit 0 is used for R_CRIS_32_TPREL
1756 relocs. */
1757 if ((off & 2) == 0)
1758 {
1759 off &= ~3;
1760
1761 if (h != NULL)
1762 h->got.offset |= 2;
1763 else
1764 local_got_offsets[r_symndx] |= 2;
1765
1766 bfd_put_32 (output_bfd, 1, sgot->contents + off);
1767 bfd_put_32 (output_bfd, relocation, sgot->contents + off + 4);
1768 }
1769 else
1770 off &= ~3;
1771
1772 relocation = sgot->output_offset + off
1773 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1774 }
1775 else
1776 {
1777 /* Not all parts of the GOT entry are known; emit a real
1778 relocation. */
1779 bfd_vma off;
1780
1781 if (h != NULL)
1782 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1783 ? h->got.offset + 4 : h->got.offset;
1784 else
1785 {
1786 off = local_got_offsets[r_symndx];
1787 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1788 off += 4;
1789 }
1790
1791 /* See above re bit 1 and bit 0 usage. */
1792 if ((off & 2) == 0)
1793 {
1794 Elf_Internal_Rela outrel;
1795 bfd_byte *loc;
1796
1797 off &= ~3;
1798
1799 if (h != NULL)
1800 h->got.offset |= 2;
1801 else
1802 local_got_offsets[r_symndx] |= 2;
1803
1804 /* Clear the target contents of the GOT (just as a
1805 gesture; it's already cleared on allocation): this
1806 relocation is not like the other dynrelocs. */
1807 bfd_put_32 (output_bfd, 0, sgot->contents + off);
1808 bfd_put_32 (output_bfd, 0, sgot->contents + off + 4);
1809
1810 if (srelgot == NULL)
1811 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1812 BFD_ASSERT (srelgot != NULL);
1813
1814 if (h != NULL && h->dynindx != -1)
1815 {
1816 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_DTP);
1817 relocation = 0;
1818 }
1819 else
1820 {
1821 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTP);
1822
1823 /* NULL if we had an error. */
1824 relocation -= elf_hash_table (info)->tls_sec == NULL
1825 ? 0 : elf_hash_table (info)->tls_sec->vma;
1826 }
1827
1828 outrel.r_offset = (sgot->output_section->vma
1829 + sgot->output_offset
1830 + off);
1831 outrel.r_addend = relocation;
1832 loc = srelgot->contents;
1833 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1834
1835 /* NULL if we had an error. */
1836 if (srelgot->contents != NULL)
1837 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1838 }
1839 else
1840 off &= ~3;
1841
1842 relocation = sgot->output_offset + off
1843 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1844 }
1845
1846 /* The GOT-relative offset to the GOT entry is the
1847 relocation, or for R_CRIS_32_GD, the actual address of
1848 the GOT entry. */
1849 break;
1850
75f500d7
HPN
1851 case R_CRIS_32_IE:
1852 if (info->shared)
1853 {
1854 bfd_set_error (bfd_error_invalid_operation);
1855
1856 /* We've already informed in cris_elf_check_relocs that
1857 this is an error. */
1858 return FALSE;
1859 }
1860 /* Fall through. */
1861
100382c7
HPN
1862 case R_CRIS_32_GOT_TPREL:
1863 case R_CRIS_16_GOT_TPREL:
1864 if (rel->r_addend != 0)
1865 {
1866 /* We can't do anything for a relocation which is
1867 against a symbol *plus offset*. GOT holds
1868 relocations for symbols. Make this an error; the
1869 compiler isn't allowed to pass us these kinds of
1870 things. */
1871 (*_bfd_error_handler)
1872 (_("%B, section %A: relocation %s with non-zero addend %d"
1873 " against symbol `%s'"),
1874 input_bfd,
1875 input_section,
1876 cris_elf_howto_table[r_type].name,
1877 rel->r_addend,
1878 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1879 bfd_set_error (bfd_error_bad_value);
1880 return FALSE;
1881 }
1882
1883 if (!info->shared && (h == NULL || h->def_regular))
1884 {
1885 /* Known contents of the GOT. */
1886 bfd_vma off;
1887
1888 /* The symbol is defined in the program, so just write
1bc86aea 1889 the -prog_tls_size+known_tpoffset into the GOT. */
100382c7 1890 relocation -= elf_hash_table (info)->tls_sec->vma;
f6f05983 1891 relocation -= elf_hash_table (info)->tls_size;
100382c7
HPN
1892
1893 if (h != NULL)
1894 off = h->got.offset;
1895 else
1896 off = local_got_offsets[r_symndx];
1897
1898 /* Bit 0 is used to mark whether we've emitted the required
1899 entry (and if needed R_CRIS_32_TPREL reloc). Bit 1
1900 is used similarly for R_CRIS_DTP, see above. */
1901 if ((off & 1) == 0)
1902 {
1903 off &= ~3;
1904
1905 if (h != NULL)
1906 h->got.offset |= 1;
1907 else
1908 local_got_offsets[r_symndx] |= 1;
1909
1910 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1911 }
1912 else
1913 off &= ~3;
1914
75f500d7
HPN
1915 relocation = sgot->output_offset + off
1916 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
100382c7
HPN
1917 }
1918 else
1919 {
1920 /* Emit a real relocation. */
1921 bfd_vma off;
1922
1923 if (h != NULL)
1924 off = h->got.offset;
1925 else
1926 off = local_got_offsets[r_symndx];
1927
1928 /* See above re usage of bit 0 and 1. */
1929 if ((off & 1) == 0)
1930 {
1931 Elf_Internal_Rela outrel;
1932 bfd_byte *loc;
1933
1934 off &= ~3;
1935
1936 if (h != NULL)
1937 h->got.offset |= 1;
1938 else
1939 local_got_offsets[r_symndx] |= 1;
1940
1941 if (srelgot == NULL)
1942 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1943 BFD_ASSERT (srelgot != NULL);
1944
1945 if (h != NULL && h->dynindx != -1)
1946 {
1947 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_32_TPREL);
1948 relocation = 0;
1949 }
1950 else
1951 {
1952 outrel.r_info = ELF32_R_INFO (0, R_CRIS_32_TPREL);
1953
1954 /* NULL if we had an error. */
1955 relocation -= elf_hash_table (info)->tls_sec == NULL
1956 ? 0 : elf_hash_table (info)->tls_sec->vma;
1957 }
1958
1959 /* Just "define" the initial contents in some
1960 semi-logical way. */
1961 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1962
1963 outrel.r_offset = (sgot->output_section->vma
1964 + sgot->output_offset
1965 + off);
1966 outrel.r_addend = relocation;
1967 loc = srelgot->contents;
1968 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1969 /* NULL if we had an error. */
1970 if (srelgot->contents != NULL)
1971 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1972 }
1973 else
1974 off &= ~3;
1975
75f500d7
HPN
1976 relocation = sgot->output_offset + off
1977 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
100382c7
HPN
1978 }
1979
75f500d7
HPN
1980 /* The GOT-relative offset to the GOT entry is the relocation,
1981 or for R_CRIS_32_GD, the actual address of the GOT entry. */
100382c7
HPN
1982 break;
1983
1984 case R_CRIS_16_TPREL:
1985 case R_CRIS_32_TPREL:
1986 /* This relocation must only be performed against symbols
1987 defined in an ordinary (non-DSO) object. */
1988 if (info->shared)
1989 {
1990 bfd_set_error (bfd_error_invalid_operation);
1991
1992 /* We've already informed in cris_elf_check_relocs that
1993 this is an error. */
1994 return FALSE;
1995 }
1996
1997 if (h != NULL
1998 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
34d3d6b9 1999 && !(h->def_regular || ELF_COMMON_DEF_P (h))
100382c7
HPN
2000 /* If it's undefined, then an error message has already
2001 been emitted. */
2002 && h->root.type != bfd_link_hash_undefined)
2003 {
2004 (*_bfd_error_handler)
2005 (_("%B, section %A: relocation %s is"
2006 " not allowed for symbol: `%s'"
2007 " which is defined outside the program,"
2008 " perhaps a declaration mixup?"),
2009 input_bfd,
2010 input_section,
2011 cris_elf_howto_table[r_type].name,
2012 symname);
2013 bfd_set_error (bfd_error_bad_value);
2014 return FALSE;
2015 }
2016
2017 /* NULL if we had an error. */
2018 relocation -= elf_hash_table (info)->tls_sec == NULL
1bc86aea
HPN
2019 ? 0
2020 : (elf_hash_table (info)->tls_sec->vma
f6f05983 2021 + elf_hash_table (info)->tls_size);
100382c7
HPN
2022
2023 /* The TLS-relative offset is the relocation. */
2024 break;
2025
2026 default:
2027 BFD_FAIL ();
2028 return FALSE;
915e5146
HPN
2029 }
2030
2031 r = cris_final_link_relocate (howto, input_bfd, input_section,
2032 contents, rel, relocation);
2033
2034 if (r != bfd_reloc_ok)
2035 {
2036 const char * msg = (const char *) NULL;
2037
2038 switch (r)
2039 {
2040 case bfd_reloc_overflow:
2041 r = info->callbacks->reloc_overflow
dfeffb9f
L
2042 (info, (h ? &h->root : NULL), symname, howto->name,
2043 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
100382c7
HPN
2044 if (additional_relocation_error_msg_count > 0)
2045 {
2046 additional_relocation_error_msg_count--;
2047 switch (r_type)
2048 {
2049 case R_CRIS_16_GOTPLT:
2050 case R_CRIS_16_GOT:
2051
2052 /* Not just TLS is involved here, so we make
2053 generation and message depend on -fPIC/-fpic
2054 only. */
2055 case R_CRIS_16_GOT_TPREL:
2056 case R_CRIS_16_GOT_GD:
2057 (*_bfd_error_handler)
2058 (_("(too many global variables for -fpic:"
2059 " recompile with -fPIC)"));
2060 break;
2061
2062 case R_CRIS_16_TPREL:
2063 case R_CRIS_16_DTPREL:
2064 (*_bfd_error_handler)
2065 (_("(thread-local data too big for -fpic or"
2066 " -msmall-tls: recompile with -fPIC or"
2067 " -mno-small-tls)"));
2068 break;
2069
2070 /* No known cause for overflow for other relocs. */
2071 default:
2072 break;
2073 }
2074 }
915e5146
HPN
2075 break;
2076
2077 case bfd_reloc_undefined:
2078 r = info->callbacks->undefined_symbol
dc810e39 2079 (info, symname, input_bfd, input_section, rel->r_offset,
b34976b6 2080 TRUE);
915e5146
HPN
2081 break;
2082
2083 case bfd_reloc_outofrange:
2084 msg = _("internal error: out of range error");
2085 break;
2086
2087 case bfd_reloc_notsupported:
2088 msg = _("internal error: unsupported relocation error");
2089 break;
2090
2091 case bfd_reloc_dangerous:
2092 msg = _("internal error: dangerous relocation");
2093 break;
2094
2095 default:
2096 msg = _("internal error: unknown error");
2097 break;
2098 }
2099
2100 if (msg)
2101 r = info->callbacks->warning
dc810e39 2102 (info, msg, symname, input_bfd, input_section, rel->r_offset);
915e5146
HPN
2103
2104 if (! r)
b34976b6 2105 return FALSE;
915e5146
HPN
2106 }
2107 }
2108
b34976b6 2109 return TRUE;
915e5146
HPN
2110}
2111\f
2112/* Finish up dynamic symbol handling. We set the contents of various
2113 dynamic sections here. */
2114
b34976b6 2115static bfd_boolean
915e5146
HPN
2116elf_cris_finish_dynamic_symbol (output_bfd, info, h, sym)
2117 bfd *output_bfd;
2118 struct bfd_link_info *info;
2119 struct elf_link_hash_entry *h;
2120 Elf_Internal_Sym *sym;
2121{
2122 bfd *dynobj;
bac23f82
HPN
2123
2124 /* Where in the plt entry to put values. */
915e5146
HPN
2125 int plt_off1 = 2, plt_off2 = 10, plt_off3 = 16;
2126
bac23f82
HPN
2127 /* What offset to add to the distance to the first PLT entry for the
2128 value at plt_off3. */
2129 int plt_off3_value_bias = 4;
2130
2131 /* Where in the PLT entry the call-dynlink-stub is (happens to be same
2132 for PIC and non-PIC for v32 and pre-v32). */
2133 int plt_stub_offset = 8;
2134 int plt_entry_size = PLT_ENTRY_SIZE;
2135 const bfd_byte *plt_entry = elf_cris_plt_entry;
2136 const bfd_byte *plt_pic_entry = elf_cris_pic_plt_entry;
2137
2138 /* Adjust the various PLT entry offsets. */
2139 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2140 {
2141 plt_off2 = 14;
2142 plt_off3 = 20;
2143 plt_off3_value_bias = -2;
2144 plt_stub_offset = 12;
2145 plt_entry_size = PLT_ENTRY_SIZE_V32;
2146 plt_entry = elf_cris_plt_entry_v32;
2147 plt_pic_entry = elf_cris_pic_plt_entry_v32;
2148 }
2149
915e5146
HPN
2150 dynobj = elf_hash_table (info)->dynobj;
2151
2152 if (h->plt.offset != (bfd_vma) -1)
2153 {
2154 asection *splt;
2155 asection *sgotplt;
2156 asection *sgot;
2157 asection *srela;
2158 bfd_vma got_base;
2159
2160 bfd_vma gotplt_offset
100382c7 2161 = elf_cris_hash_entry (h)->gotplt_offset;
915e5146 2162 Elf_Internal_Rela rela;
947216bf 2163 bfd_byte *loc;
b34976b6 2164 bfd_boolean has_gotplt = gotplt_offset != 0;
915e5146 2165
0bdf8d40
HPN
2166 /* Get the index in the .rela.plt relocations for the .got.plt
2167 entry that corresponds to this symbol.
2168 We have to count backwards here, and the result is only valid
2169 as an index into .rela.plt. We also have to undo the effect
2170 of the R_CRIS_DTPMOD entry at .got index 3 (offset 12 into
2171 .got.plt) for which gotplt_offset is adjusted, because while
2172 that entry goes into .got.plt, its relocation goes into
2173 .rela.got, not .rela.plt. (It's not PLT-specific; not to be
2174 processed as part of the runtime lazy .rela.plt relocation).
2175 FIXME: There be literal constants here... */
2176 bfd_vma rela_plt_index
2177 = (elf_cris_hash_table (info)->dtpmod_refcount != 0
2178 ? gotplt_offset/4 - 2 - 3 : gotplt_offset/4 - 3);
915e5146
HPN
2179
2180 /* Get the offset into the .got table of the entry that corresponds
2181 to this function. Note that we embed knowledge that "incoming"
2182 .got goes after .got.plt in the output without padding (pointer
2183 aligned). However, that knowledge is present in several other
c152c796 2184 places too. */
915e5146
HPN
2185 bfd_vma got_offset
2186 = (has_gotplt
2187 ? gotplt_offset
2188 : h->got.offset + elf_cris_hash_table(info)->next_gotplt_entry);
2189
2190 /* This symbol has an entry in the procedure linkage table. Set it
2191 up. */
2192
2193 BFD_ASSERT (h->dynindx != -1);
2194
2195 splt = bfd_get_section_by_name (dynobj, ".plt");
2196 sgot = bfd_get_section_by_name (dynobj, ".got");
2197 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
2198 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
2199 BFD_ASSERT (splt != NULL && sgotplt != NULL
2200 && (! has_gotplt || srela != NULL));
2201
2202 got_base = sgotplt->output_section->vma + sgotplt->output_offset;
2203
2204 /* Fill in the entry in the procedure linkage table. */
2205 if (! info->shared)
2206 {
bac23f82
HPN
2207 memcpy (splt->contents + h->plt.offset, plt_entry,
2208 plt_entry_size);
915e5146
HPN
2209
2210 /* We need to enter the absolute address of the GOT entry here. */
2211 bfd_put_32 (output_bfd, got_base + got_offset,
2212 splt->contents + h->plt.offset + plt_off1);
2213 }
2214 else
2215 {
bac23f82
HPN
2216 memcpy (splt->contents + h->plt.offset, plt_pic_entry,
2217 plt_entry_size);
915e5146
HPN
2218 bfd_put_32 (output_bfd, got_offset,
2219 splt->contents + h->plt.offset + plt_off1);
2220 }
2221
2222 /* Fill in the plt entry and make a relocation, if this is a "real"
2223 PLT entry. */
2224 if (has_gotplt)
2225 {
bac23f82 2226 /* Fill in the offset to the reloc table. */
915e5146 2227 bfd_put_32 (output_bfd,
0bdf8d40 2228 rela_plt_index * sizeof (Elf32_External_Rela),
915e5146
HPN
2229 splt->contents + h->plt.offset + plt_off2);
2230
2231 /* Fill in the offset to the first PLT entry, where to "jump". */
bac23f82
HPN
2232 bfd_put_32 (output_bfd,
2233 - (h->plt.offset + plt_off3 + plt_off3_value_bias),
915e5146
HPN
2234 splt->contents + h->plt.offset + plt_off3);
2235
2236 /* Fill in the entry in the global offset table with the address of
2237 the relocating stub. */
2238 bfd_put_32 (output_bfd,
2239 (splt->output_section->vma
2240 + splt->output_offset
2241 + h->plt.offset
bac23f82 2242 + plt_stub_offset),
915e5146
HPN
2243 sgotplt->contents + got_offset);
2244
2245 /* Fill in the entry in the .rela.plt section. */
2246 rela.r_offset = (sgotplt->output_section->vma
2247 + sgotplt->output_offset
2248 + got_offset);
2249 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_JUMP_SLOT);
2250 rela.r_addend = 0;
0bdf8d40 2251 loc = srela->contents + rela_plt_index * sizeof (Elf32_External_Rela);
947216bf 2252 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2253 }
2254
f5385ebf 2255 if (!h->def_regular)
915e5146
HPN
2256 {
2257 /* Mark the symbol as undefined, rather than as defined in
2258 the .plt section. Leave the value alone. */
2259 sym->st_shndx = SHN_UNDEF;
2260
2261 /* FIXME: From elf32-sparc.c 2001-02-19 (1.18). I still don't
2262 know whether resetting the value is significant; if it really
2263 is, rather than a quirk or bug in the sparc port, then I
2264 believe we'd see this elsewhere. */
2265 /* If the symbol is weak, we do need to clear the value.
2266 Otherwise, the PLT entry would provide a definition for
2267 the symbol even if the symbol wasn't defined anywhere,
2268 and so the symbol would never be NULL. */
f5385ebf 2269 if (!h->ref_regular_nonweak)
915e5146
HPN
2270 sym->st_value = 0;
2271 }
2272 }
2273
e4a2175c
HPN
2274 /* For an ordinary program, we emit .got relocs only for symbols that
2275 are in the dynamic-symbols table and are either defined by the
2276 program or are undefined weak symbols, or are function symbols
2277 where we do not output a PLT: the PLT reloc was output above and all
2278 references to the function symbol are redirected to the PLT. */
4d96d128 2279 if (h->got.offset != (bfd_vma) -1
100382c7 2280 && (elf_cris_hash_entry (h)->reg_got_refcount > 0)
6849c52f
HPN
2281 && (info->shared
2282 || (h->dynindx != -1
e4a2175c 2283 && h->plt.offset == (bfd_vma) -1
f5385ebf 2284 && !h->def_regular
6849c52f 2285 && h->root.type != bfd_link_hash_undefweak)))
915e5146
HPN
2286 {
2287 asection *sgot;
2288 asection *srela;
2289 Elf_Internal_Rela rela;
947216bf 2290 bfd_byte *loc;
dc810e39 2291 bfd_byte *where;
915e5146
HPN
2292
2293 /* This symbol has an entry in the global offset table. Set it up. */
2294
2295 sgot = bfd_get_section_by_name (dynobj, ".got");
2296 srela = bfd_get_section_by_name (dynobj, ".rela.got");
2297 BFD_ASSERT (sgot != NULL && srela != NULL);
2298
2299 rela.r_offset = (sgot->output_section->vma
2300 + sgot->output_offset
dc810e39 2301 + (h->got.offset &~ (bfd_vma) 1));
915e5146
HPN
2302
2303 /* If this is a static link, or it is a -Bsymbolic link and the
2304 symbol is defined locally or was forced to be local because
2305 of a version file, we just want to emit a RELATIVE reloc.
2306 The entry in the global offset table will already have been
2307 initialized in the relocate_section function. */
dc810e39 2308 where = sgot->contents + (h->got.offset &~ (bfd_vma) 1);
915e5146
HPN
2309 if (! elf_hash_table (info)->dynamic_sections_created
2310 || (info->shared
2311 && (info->symbolic || h->dynindx == -1)
f5385ebf 2312 && h->def_regular))
915e5146
HPN
2313 {
2314 rela.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
dc810e39 2315 rela.r_addend = bfd_get_signed_32 (output_bfd, where);
915e5146
HPN
2316 }
2317 else
2318 {
dc810e39 2319 bfd_put_32 (output_bfd, (bfd_vma) 0, where);
915e5146
HPN
2320 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_GLOB_DAT);
2321 rela.r_addend = 0;
2322 }
2323
947216bf
AM
2324 loc = srela->contents;
2325 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
2326 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2327 }
2328
f5385ebf 2329 if (h->needs_copy)
915e5146
HPN
2330 {
2331 asection *s;
2332 Elf_Internal_Rela rela;
947216bf 2333 bfd_byte *loc;
915e5146
HPN
2334
2335 /* This symbol needs a copy reloc. Set it up. */
2336
2337 BFD_ASSERT (h->dynindx != -1
2338 && (h->root.type == bfd_link_hash_defined
2339 || h->root.type == bfd_link_hash_defweak));
2340
2341 s = bfd_get_section_by_name (h->root.u.def.section->owner,
2342 ".rela.bss");
2343 BFD_ASSERT (s != NULL);
2344
2345 rela.r_offset = (h->root.u.def.value
2346 + h->root.u.def.section->output_section->vma
2347 + h->root.u.def.section->output_offset);
2348 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_COPY);
2349 rela.r_addend = 0;
947216bf
AM
2350 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2351 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2352 }
2353
2354 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2355 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 2356 || h == elf_hash_table (info)->hgot)
915e5146
HPN
2357 sym->st_shndx = SHN_ABS;
2358
b34976b6 2359 return TRUE;
915e5146
HPN
2360}
2361\f
100382c7
HPN
2362/* Finish up the dynamic sections. Do *not* emit relocs here, as their
2363 offsets were changed, as part of -z combreloc handling, from those we
2364 computed. */
915e5146 2365
b34976b6 2366static bfd_boolean
915e5146
HPN
2367elf_cris_finish_dynamic_sections (output_bfd, info)
2368 bfd *output_bfd;
2369 struct bfd_link_info *info;
2370{
2371 bfd *dynobj;
2372 asection *sgot;
2373 asection *sdyn;
2374
2375 dynobj = elf_hash_table (info)->dynobj;
2376
2377 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
2378 BFD_ASSERT (sgot != NULL);
2379 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2380
2381 if (elf_hash_table (info)->dynamic_sections_created)
2382 {
2383 asection *splt;
2384 Elf32_External_Dyn *dyncon, *dynconend;
2385
2386 splt = bfd_get_section_by_name (dynobj, ".plt");
2387 BFD_ASSERT (splt != NULL && sdyn != NULL);
2388
2389 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 2390 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
915e5146
HPN
2391 for (; dyncon < dynconend; dyncon++)
2392 {
2393 Elf_Internal_Dyn dyn;
2394 asection *s;
2395
2396 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2397
2398 switch (dyn.d_tag)
2399 {
2400 default:
2401 break;
2402
2403 case DT_PLTGOT:
2404 s = bfd_get_section_by_name (output_bfd, ".got");
2405 BFD_ASSERT (s != NULL);
2406 dyn.d_un.d_ptr = s->vma;
2407 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2408 break;
2409
2410 case DT_JMPREL:
2411 /* Yes, we *can* have a .plt and no .plt.rela, for instance
2412 if all symbols are found in the .got (not .got.plt). */
2413 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2414 dyn.d_un.d_ptr = s != NULL ? s->vma : 0;
2415 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2416 break;
2417
2418 case DT_PLTRELSZ:
2419 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2420 if (s == NULL)
2421 dyn.d_un.d_val = 0;
915e5146 2422 else
eea6121a 2423 dyn.d_un.d_val = s->size;
915e5146
HPN
2424 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2425 break;
2426
2427 case DT_RELASZ:
2428 /* The procedure linkage table relocs (DT_JMPREL) should
2429 not be included in the overall relocs (DT_RELA).
2430 Therefore, we override the DT_RELASZ entry here to
2431 make it not include the JMPREL relocs. Since the
2432 linker script arranges for .rela.plt to follow all
2433 other relocation sections, we don't have to worry
2434 about changing the DT_RELA entry. */
2435 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2436 if (s != NULL)
eea6121a 2437 dyn.d_un.d_val -= s->size;
915e5146
HPN
2438 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2439 break;
2440 }
2441 }
2442
2443 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2444 if (splt->size > 0)
915e5146 2445 {
bac23f82
HPN
2446 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2447 {
2448 if (info->shared)
2449 memcpy (splt->contents, elf_cris_pic_plt0_entry_v32,
2450 PLT_ENTRY_SIZE_V32);
2451 else
2452 {
2453 memcpy (splt->contents, elf_cris_plt0_entry_v32,
2454 PLT_ENTRY_SIZE_V32);
2455 bfd_put_32 (output_bfd,
2456 sgot->output_section->vma
2457 + sgot->output_offset + 4,
2458 splt->contents + 4);
2459
2460 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2461 = PLT_ENTRY_SIZE_V32;
2462 }
2463 }
915e5146 2464 else
bac23f82
HPN
2465 {
2466 if (info->shared)
2467 memcpy (splt->contents, elf_cris_pic_plt0_entry,
2468 PLT_ENTRY_SIZE);
2469 else
2470 {
2471 memcpy (splt->contents, elf_cris_plt0_entry,
2472 PLT_ENTRY_SIZE);
2473 bfd_put_32 (output_bfd,
2474 sgot->output_section->vma
2475 + sgot->output_offset + 4,
2476 splt->contents + 6);
2477 bfd_put_32 (output_bfd,
2478 sgot->output_section->vma
2479 + sgot->output_offset + 8,
2480 splt->contents + 14);
2481
2482 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2483 = PLT_ENTRY_SIZE;
2484 }
915e5146
HPN
2485 }
2486 }
2487 }
2488
2489 /* Fill in the first three entries in the global offset table. */
eea6121a 2490 if (sgot->size > 0)
915e5146
HPN
2491 {
2492 if (sdyn == NULL)
2493 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2494 else
2495 bfd_put_32 (output_bfd,
2496 sdyn->output_section->vma + sdyn->output_offset,
2497 sgot->contents);
2498 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2499 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2500 }
2501
2502 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2503
b34976b6 2504 return TRUE;
06c15ad7
HPN
2505}
2506\f
2507/* Return the section that should be marked against GC for a given
2508 relocation. */
2509
2510static asection *
07adf181
AM
2511cris_elf_gc_mark_hook (asection *sec,
2512 struct bfd_link_info *info,
2513 Elf_Internal_Rela *rel,
2514 struct elf_link_hash_entry *h,
2515 Elf_Internal_Sym *sym)
06c15ad7 2516{
100382c7 2517 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
06c15ad7 2518 if (h != NULL)
100382c7 2519 switch (r_type)
07adf181
AM
2520 {
2521 case R_CRIS_GNU_VTINHERIT:
2522 case R_CRIS_GNU_VTENTRY:
2523 return NULL;
100382c7
HPN
2524
2525 default:
2526 break;
07adf181 2527 }
06c15ad7 2528
07adf181 2529 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
06c15ad7
HPN
2530}
2531
2532/* Update the got entry reference counts for the section being removed. */
2533
b34976b6 2534static bfd_boolean
07adf181
AM
2535cris_elf_gc_sweep_hook (bfd *abfd,
2536 struct bfd_link_info *info,
2537 asection *sec,
2538 const Elf_Internal_Rela *relocs)
06c15ad7 2539{
915e5146
HPN
2540 Elf_Internal_Shdr *symtab_hdr;
2541 struct elf_link_hash_entry **sym_hashes;
2542 bfd_signed_vma *local_got_refcounts;
2543 const Elf_Internal_Rela *rel, *relend;
915e5146
HPN
2544 bfd *dynobj;
2545 asection *sgot;
2546 asection *srelgot;
2547
7dda2462
TG
2548 if (info->relocatable)
2549 return TRUE;
2550
915e5146
HPN
2551 dynobj = elf_hash_table (info)->dynobj;
2552 if (dynobj == NULL)
b34976b6 2553 return TRUE;
915e5146 2554
babfd660
KH
2555 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2556 sym_hashes = elf_sym_hashes (abfd);
2557 local_got_refcounts = elf_local_got_refcounts (abfd);
2558
915e5146
HPN
2559 sgot = bfd_get_section_by_name (dynobj, ".got");
2560 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
2561
2562 relend = relocs + sec->reloc_count;
2563 for (rel = relocs; rel < relend; rel++)
2564 {
babfd660 2565 unsigned long r_symndx;
3eb128b2 2566 struct elf_link_hash_entry *h = NULL;
100382c7
HPN
2567 bfd_signed_vma got_element_size = 4;
2568 bfd_signed_vma *specific_refcount = NULL;
2569 enum elf_cris_reloc_type r_type;
3eb128b2
AM
2570
2571 r_symndx = ELF32_R_SYM (rel->r_info);
2572 if (r_symndx >= symtab_hdr->sh_info)
2573 {
2574 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2575 while (h->root.type == bfd_link_hash_indirect
2576 || h->root.type == bfd_link_hash_warning)
2577 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2578 }
babfd660 2579
100382c7
HPN
2580 r_type = ELF32_R_TYPE (rel->r_info);
2581 switch (r_type)
2582 {
2583 case R_CRIS_32_GOT:
2584 case R_CRIS_16_GOT:
2585 case R_CRIS_16_GOTPLT:
2586 case R_CRIS_32_GOTPLT:
2587 specific_refcount = h != NULL
2588 ? &((struct elf_cris_link_hash_entry *) h)->reg_got_refcount
2589 : &local_got_refcounts[LGOT_REG_NDX (r_symndx)];
2590 break;
2591
2592 case R_CRIS_32_GD:
2593 case R_CRIS_32_GOT_GD:
2594 case R_CRIS_16_GOT_GD:
2595 got_element_size = 8;
2596 specific_refcount = h != NULL
2597 ? &((struct elf_cris_link_hash_entry *) h)->dtp_refcount
2598 : &local_got_refcounts[LGOT_DTP_NDX (r_symndx)];
2599 break;
2600
75f500d7 2601 case R_CRIS_32_IE:
100382c7
HPN
2602 case R_CRIS_16_GOT_TPREL:
2603 case R_CRIS_32_GOT_TPREL:
2604 specific_refcount = h != NULL
2605 ? &((struct elf_cris_link_hash_entry *) h)->tprel_refcount
2606 : &local_got_refcounts[LGOT_TPREL_NDX (r_symndx)];
2607 break;
2608
2609 default:
2610 break;
2611 }
2612
2613 switch (r_type)
915e5146 2614 {
75f500d7 2615 case R_CRIS_32_IE:
100382c7
HPN
2616 case R_CRIS_32_GD:
2617 case R_CRIS_16_GOT_TPREL:
2618 case R_CRIS_32_GOT_TPREL:
2619 case R_CRIS_32_GOT_GD:
2620 case R_CRIS_16_GOT_GD:
915e5146
HPN
2621 case R_CRIS_16_GOT:
2622 case R_CRIS_32_GOT:
3eb128b2 2623 if (h != NULL)
915e5146 2624 {
100382c7
HPN
2625 /* If the counters are 0 when we got here, we've
2626 miscounted somehow somewhere, an internal error. */
2627 BFD_ASSERT (h->got.refcount > 0);
2628 --h->got.refcount;
2629
2630 BFD_ASSERT (*specific_refcount > 0);
2631 --*specific_refcount;
2632 if (*specific_refcount == 0)
915e5146 2633 {
100382c7
HPN
2634 /* We don't need the .got entry any more. */
2635 sgot->size -= got_element_size;
2636 srelgot->size -= sizeof (Elf32_External_Rela);
915e5146
HPN
2637 }
2638 break;
2639 }
2640
2641 local_got_reloc:
2642 if (local_got_refcounts != NULL)
2643 {
100382c7
HPN
2644 /* If the counters are 0 when we got here, we've
2645 miscounted somehow somewhere, an internal error. */
2646 BFD_ASSERT (local_got_refcounts[r_symndx] > 0);
2647 --local_got_refcounts[r_symndx];
2648
2649 BFD_ASSERT (*specific_refcount > 0);
2650 --*specific_refcount;
2651 if (*specific_refcount == 0)
915e5146 2652 {
100382c7
HPN
2653 /* We don't need the .got entry any more. */
2654 sgot->size -= got_element_size;
2655 if (info->shared)
2656 srelgot->size -= sizeof (Elf32_External_Rela);
915e5146
HPN
2657 }
2658 }
2659 break;
2660
2661 case R_CRIS_16_GOTPLT:
2662 case R_CRIS_32_GOTPLT:
2663 /* For local symbols, treat these like GOT relocs. */
3eb128b2 2664 if (h == NULL)
915e5146 2665 goto local_got_reloc;
e4a2175c 2666 /* Fall through. */
3eb128b2 2667
915e5146
HPN
2668 case R_CRIS_32_PLT_GOTREL:
2669 /* FIXME: We don't garbage-collect away the .got section. */
2670 if (local_got_refcounts != NULL)
2671 local_got_refcounts[-1]--;
2672 /* Fall through. */
3eb128b2 2673
915e5146
HPN
2674 case R_CRIS_8_PCREL:
2675 case R_CRIS_16_PCREL:
2676 case R_CRIS_32_PCREL:
2677 case R_CRIS_32_PLT_PCREL:
3eb128b2 2678 if (h != NULL)
915e5146 2679 {
0a4787a0
HPN
2680 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2681 && h->plt.refcount > 0)
915e5146
HPN
2682 --h->plt.refcount;
2683 }
2684 break;
2685
100382c7 2686 case R_CRIS_32_DTPREL:
6718f446
HPN
2687 /* This'd be a .dtpreld entry in e.g. debug info. */
2688 if ((sec->flags & SEC_ALLOC) == 0)
2689 break;
2690 /* Fall through. */
100382c7
HPN
2691 case R_CRIS_16_DTPREL:
2692 elf_cris_hash_table (info)->dtpmod_refcount--;
2693 if (elf_cris_hash_table (info)->dtpmod_refcount == 0)
2694 elf_cris_hash_table (info)->next_gotplt_entry -= 8;
2695 BFD_ASSERT (local_got_refcounts != NULL);
2696 local_got_refcounts[-1]--;
2697 break;
2698
915e5146
HPN
2699 default:
2700 break;
2701 }
2702 }
2703
b34976b6 2704 return TRUE;
06c15ad7
HPN
2705}
2706
5d5a918a
HPN
2707/* The elf_backend_plt_sym_val hook function. */
2708
2709static bfd_vma
2710cris_elf_plt_sym_val (bfd_vma i, const asection *plt,
2711 const arelent *rel ATTRIBUTE_UNUSED)
2712{
2713 bfd_size_type plt_entry_size;
2714
2715 plt_entry_size
2716 = (bfd_get_mach (plt->owner) == bfd_mach_cris_v32
2717 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2718
2719 return plt->vma + (i + 1) * plt_entry_size;
2720}
2721
915e5146
HPN
2722/* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
2723 entry but we found we will not create any. Called when we find we will
4d96d128
HPN
2724 not have any PLT for this symbol, by for example
2725 elf_cris_adjust_dynamic_symbol when we're doing a proper dynamic link,
2726 or elf_cris_size_dynamic_sections if no dynamic sections will be
2727 created (we're only linking static objects). */
915e5146 2728
b34976b6 2729static bfd_boolean
915e5146
HPN
2730elf_cris_adjust_gotplt_to_got (h, p)
2731 struct elf_cris_link_hash_entry *h;
2732 PTR p;
2733{
2734 struct bfd_link_info *info = (struct bfd_link_info *) p;
915e5146 2735
e92d460e
AM
2736 if (h->root.root.type == bfd_link_hash_warning)
2737 h = (struct elf_cris_link_hash_entry *) h->root.root.u.i.link;
2738
915e5146
HPN
2739 /* If nobody wanted a GOTPLT with this symbol, we're done. */
2740 if (h->gotplt_refcount <= 0)
b34976b6 2741 return TRUE;
915e5146 2742
100382c7 2743 if (h->reg_got_refcount > 0)
915e5146 2744 {
100382c7
HPN
2745 /* There's a GOT entry for this symbol. Just adjust the refcounts.
2746 Probably not necessary at this stage, but keeping them accurate
915e5146
HPN
2747 helps avoiding surprises later. */
2748 h->root.got.refcount += h->gotplt_refcount;
100382c7 2749 h->reg_got_refcount += h->gotplt_refcount;
5e0f5ae3 2750 h->gotplt_refcount = 0;
915e5146
HPN
2751 }
2752 else
2753 {
4d96d128 2754 /* No GOT entry for this symbol. We need to create one. */
8d1d654f
AM
2755 bfd *dynobj = elf_hash_table (info)->dynobj;
2756 asection *sgot;
2757 asection *srelgot;
2758
2759 BFD_ASSERT (dynobj != NULL);
2760 sgot = bfd_get_section_by_name (dynobj, ".got");
2761 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
915e5146 2762
100382c7
HPN
2763 /* Put accurate refcounts there. */
2764 h->root.got.refcount += h->gotplt_refcount;
2765 h->reg_got_refcount = h->gotplt_refcount;
915e5146 2766
5e0f5ae3 2767 h->gotplt_refcount = 0;
915e5146 2768
44aa49bb
HPN
2769 /* We always have a .got and a .rela.got section if there were
2770 GOTPLT relocs in input. */
2771 BFD_ASSERT (sgot != NULL && srelgot != NULL);
915e5146
HPN
2772
2773 /* Allocate space in the .got section. */
eea6121a 2774 sgot->size += 4;
915e5146
HPN
2775
2776 /* Allocate relocation space. */
eea6121a 2777 srelgot->size += sizeof (Elf32_External_Rela);
915e5146
HPN
2778 }
2779
b34976b6 2780 return TRUE;
915e5146
HPN
2781}
2782
2783/* Try to fold PLT entries with GOT entries. There are two cases when we
2784 want to do this:
2785
2786 - When all PLT references are GOTPLT references, and there are GOT
e4a2175c
HPN
2787 references, and this is not the executable. We don't have to
2788 generate a PLT at all.
915e5146 2789
e4a2175c
HPN
2790 - When there are both (ordinary) PLT references and GOT references,
2791 and this isn't the executable.
915e5146 2792 We want to make the PLT reference use the ordinary GOT entry rather
e4a2175c
HPN
2793 than R_CRIS_JUMP_SLOT, a run-time dynamically resolved GOTPLT entry,
2794 since the GOT entry will have to be resolved at startup anyway.
915e5146
HPN
2795
2796 Though the latter case is handled when room for the PLT is allocated,
2797 not here.
2798
e4a2175c
HPN
2799 By folding into the GOT, we may need a round-trip to a PLT in the
2800 executable for calls, a loss in performance. Still, losing a
2801 reloc is a win in size and at least in start-up time.
2802
915e5146
HPN
2803 Note that this function is called before symbols are forced local by
2804 version scripts. The differing cases are handled by
2805 elf_cris_hide_symbol. */
2806
b34976b6 2807static bfd_boolean
915e5146
HPN
2808elf_cris_try_fold_plt_to_got (h, p)
2809 struct elf_cris_link_hash_entry *h;
2810 PTR p;
2811{
2812 struct bfd_link_info *info = (struct bfd_link_info *) p;
2813
2814 /* If there are no GOT references for this symbol, we can't fold any
2815 other reference so there's nothing to do. Likewise if there are no
2816 PLT references; GOTPLT references included. */
2817 if (h->root.got.refcount <= 0 || h->root.plt.refcount <= 0)
b34976b6 2818 return TRUE;
915e5146
HPN
2819
2820 /* GOTPLT relocs are supposed to be included into the PLT refcount. */
2821 BFD_ASSERT (h->gotplt_refcount <= h->root.plt.refcount);
2822
2823 if (h->gotplt_refcount == h->root.plt.refcount)
2824 {
4d96d128 2825 /* The only PLT references are GOTPLT references, and there are GOT
915e5146
HPN
2826 references. Convert PLT to GOT references. */
2827 if (! elf_cris_adjust_gotplt_to_got (h, info))
b34976b6 2828 return FALSE;
915e5146
HPN
2829
2830 /* Clear the PLT references, so no PLT will be created. */
2831 h->root.plt.offset = (bfd_vma) -1;
2832 }
2833
b34976b6 2834 return TRUE;
915e5146
HPN
2835}
2836
2837/* Our own version of hide_symbol, so that we can adjust a GOTPLT reloc
2838 to use a GOT entry (and create one) rather than requiring a GOTPLT
2839 entry. */
2840
2841static void
e5094212 2842elf_cris_hide_symbol (info, h, force_local)
915e5146
HPN
2843 struct bfd_link_info *info;
2844 struct elf_link_hash_entry *h;
b34976b6 2845 bfd_boolean force_local;
915e5146
HPN
2846{
2847 elf_cris_adjust_gotplt_to_got ((struct elf_cris_link_hash_entry *) h, info);
2848
e5094212 2849 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
915e5146
HPN
2850}
2851
2852/* Adjust a symbol defined by a dynamic object and referenced by a
2853 regular object. The current definition is in some section of the
2854 dynamic object, but we're not including those sections. We have to
2855 change the definition to something the rest of the link can
2856 understand. */
2857
b34976b6 2858static bfd_boolean
915e5146
HPN
2859elf_cris_adjust_dynamic_symbol (info, h)
2860 struct bfd_link_info *info;
2861 struct elf_link_hash_entry *h;
2862{
2863 bfd *dynobj;
2864 asection *s;
bac23f82 2865 bfd_size_type plt_entry_size;
915e5146
HPN
2866
2867 dynobj = elf_hash_table (info)->dynobj;
2868
2869 /* Make sure we know what is going on here. */
2870 BFD_ASSERT (dynobj != NULL
f5385ebf 2871 && (h->needs_plt
f6e332e6 2872 || h->u.weakdef != NULL
f5385ebf
AM
2873 || (h->def_dynamic
2874 && h->ref_regular
2875 && !h->def_regular)));
915e5146 2876
bac23f82
HPN
2877 plt_entry_size
2878 = (bfd_get_mach (dynobj) == bfd_mach_cris_v32
2879 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2880
915e5146
HPN
2881 /* If this is a function, put it in the procedure linkage table. We
2882 will fill in the contents of the procedure linkage table later,
2883 when we know the address of the .got section. */
2884 if (h->type == STT_FUNC
f5385ebf 2885 || h->needs_plt)
915e5146 2886 {
6849c52f
HPN
2887 /* If we link a program (not a DSO), we'll get rid of unnecessary
2888 PLT entries; we point to the actual symbols -- even for pic
2889 relocs, because a program built with -fpic should have the same
2890 result as one built without -fpic, specifically considering weak
2891 symbols.
2892 FIXME: m68k and i386 differ here, for unclear reasons. */
915e5146 2893 if (! info->shared
f5385ebf 2894 && !h->def_dynamic)
915e5146
HPN
2895 {
2896 /* This case can occur if we saw a PLT reloc in an input file,
6849c52f
HPN
2897 but the symbol was not defined by a dynamic object. In such
2898 a case, we don't actually need to build a procedure linkage
2899 table, and we can just do an absolute or PC reloc instead, or
4d96d128 2900 change a .got.plt index to a .got index for GOTPLT relocs. */
f5385ebf
AM
2901 BFD_ASSERT (h->needs_plt);
2902 h->needs_plt = 0;
915e5146 2903 h->plt.offset = (bfd_vma) -1;
915e5146
HPN
2904 return
2905 elf_cris_adjust_gotplt_to_got ((struct
2906 elf_cris_link_hash_entry *) h,
2907 info);
2908 }
2909
e4a2175c
HPN
2910 /* If we had a R_CRIS_GLOB_DAT that didn't have to point to a PLT;
2911 where a pointer-equivalent symbol was unimportant (i.e. more
2912 like R_CRIS_JUMP_SLOT after symbol evaluation) we could get rid
2913 of the PLT. We can't for the executable, because the GOT
2914 entries will point to the PLT there (and be constant). */
2915 if (info->shared
2916 && !elf_cris_try_fold_plt_to_got ((struct elf_cris_link_hash_entry*)
2917 h, info))
b34976b6 2918 return FALSE;
915e5146
HPN
2919
2920 /* GC or folding may have rendered this entry unused. */
2921 if (h->plt.refcount <= 0)
2922 {
f5385ebf 2923 h->needs_plt = 0;
915e5146 2924 h->plt.offset = (bfd_vma) -1;
b34976b6 2925 return TRUE;
915e5146
HPN
2926 }
2927
2928 /* Make sure this symbol is output as a dynamic symbol. */
2929 if (h->dynindx == -1)
2930 {
c152c796 2931 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2932 return FALSE;
915e5146
HPN
2933 }
2934
2935 s = bfd_get_section_by_name (dynobj, ".plt");
2936 BFD_ASSERT (s != NULL);
2937
2938 /* If this is the first .plt entry, make room for the special
2939 first entry. */
eea6121a 2940 if (s->size == 0)
bac23f82 2941 s->size += plt_entry_size;
915e5146
HPN
2942
2943 /* If this symbol is not defined in a regular file, and we are
2944 not generating a shared library, then set the symbol to this
6849c52f 2945 location in the .plt. */
915e5146 2946 if (!info->shared
f5385ebf 2947 && !h->def_regular)
915e5146
HPN
2948 {
2949 h->root.u.def.section = s;
eea6121a 2950 h->root.u.def.value = s->size;
915e5146
HPN
2951 }
2952
4d96d128
HPN
2953 /* If there's already a GOT entry, use that, not a .got.plt. A
2954 GOT field still has a reference count when we get here; it's
e4a2175c
HPN
2955 not yet changed to an offset. We can't do this for an
2956 executable, because then the reloc associated with the PLT
2957 would get a non-PLT reloc pointing to the PLT. FIXME: Move
2958 this to elf_cris_try_fold_plt_to_got. */
2959 if (info->shared && h->got.refcount > 0)
915e5146
HPN
2960 {
2961 h->got.refcount += h->plt.refcount;
2962
2963 /* Mark the PLT offset to use the GOT entry by setting the low
2964 bit in the plt offset; it is always a multiple of
bac23f82
HPN
2965 plt_entry_size (which is at least a multiple of 2). */
2966 BFD_ASSERT ((s->size % plt_entry_size) == 0);
915e5146
HPN
2967
2968 /* Change the PLT refcount to an offset. */
eea6121a 2969 h->plt.offset = s->size;
915e5146
HPN
2970
2971 /* By not setting gotplt_offset (i.e. it remains at 0), we signal
2972 that the got entry should be used instead. */
2973 BFD_ASSERT (((struct elf_cris_link_hash_entry *)
2974 h)->gotplt_offset == 0);
2975
2976 /* Make room for this entry. */
bac23f82 2977 s->size += plt_entry_size;
915e5146 2978
b34976b6 2979 return TRUE;
915e5146
HPN
2980 }
2981
2982 /* No GOT reference for this symbol; prepare for an ordinary PLT. */
eea6121a 2983 h->plt.offset = s->size;
915e5146
HPN
2984
2985 /* Make room for this entry. */
bac23f82 2986 s->size += plt_entry_size;
915e5146
HPN
2987
2988 /* We also need to make an entry in the .got.plt section, which
2989 will be placed in the .got section by the linker script. */
2990 ((struct elf_cris_link_hash_entry *) h)->gotplt_offset
2991 = elf_cris_hash_table (info)->next_gotplt_entry;
2992 elf_cris_hash_table (info)->next_gotplt_entry += 4;
2993
2994 s = bfd_get_section_by_name (dynobj, ".got.plt");
2995 BFD_ASSERT (s != NULL);
eea6121a 2996 s->size += 4;
915e5146
HPN
2997
2998 /* We also need to make an entry in the .rela.plt section. */
2999
3000 s = bfd_get_section_by_name (dynobj, ".rela.plt");
3001 BFD_ASSERT (s != NULL);
eea6121a 3002 s->size += sizeof (Elf32_External_Rela);
915e5146 3003
b34976b6 3004 return TRUE;
915e5146
HPN
3005 }
3006
3007 /* Reinitialize the plt offset now that it is not used as a reference
3008 count any more. */
3009 h->plt.offset = (bfd_vma) -1;
3010
3011 /* If this is a weak symbol, and there is a real definition, the
3012 processor independent code will have arranged for us to see the
3013 real definition first, and we can just use the same value. */
f6e332e6 3014 if (h->u.weakdef != NULL)
915e5146 3015 {
f6e332e6
AM
3016 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
3017 || h->u.weakdef->root.type == bfd_link_hash_defweak);
3018 h->root.u.def.section = h->u.weakdef->root.u.def.section;
3019 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 3020 return TRUE;
915e5146
HPN
3021 }
3022
3023 /* This is a reference to a symbol defined by a dynamic object which
3024 is not a function. */
3025
3026 /* If we are creating a shared library, we must presume that the
3027 only references to the symbol are via the global offset table.
3028 For such cases we need not do anything here; the relocations will
3029 be handled correctly by relocate_section. */
3030 if (info->shared)
b34976b6 3031 return TRUE;
915e5146
HPN
3032
3033 /* If there are no references to this symbol that do not use the
3034 GOT, we don't need to generate a copy reloc. */
f5385ebf 3035 if (!h->non_got_ref)
b34976b6 3036 return TRUE;
915e5146 3037
909272ee
AM
3038 if (h->size == 0)
3039 {
3040 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
3041 h->root.root.string);
3042 return TRUE;
3043 }
3044
915e5146
HPN
3045 /* We must allocate the symbol in our .dynbss section, which will
3046 become part of the .bss section of the executable. There will be
3047 an entry for this symbol in the .dynsym section. The dynamic
3048 object will contain position independent code, so all references
3049 from the dynamic object to this symbol will go through the global
3050 offset table. The dynamic linker will use the .dynsym entry to
3051 determine the address it must put in the global offset table, so
3052 both the dynamic object and the regular object will refer to the
3053 same memory location for the variable. */
3054
3055 s = bfd_get_section_by_name (dynobj, ".dynbss");
3056 BFD_ASSERT (s != NULL);
3057
3058 /* We must generate a R_CRIS_COPY reloc to tell the dynamic linker to
3059 copy the initial value out of the dynamic object and into the
3060 runtime process image. We need to remember the offset into the
3061 .rela.bss section we are going to use. */
3062 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
3063 {
3064 asection *srel;
3065
3066 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
3067 BFD_ASSERT (srel != NULL);
eea6121a 3068 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 3069 h->needs_copy = 1;
915e5146
HPN
3070 }
3071
027297b7 3072 return _bfd_elf_adjust_dynamic_copy (h, s);
915e5146
HPN
3073}
3074
237bc7f0
HPN
3075/* Adjust our "subclass" elements for an indirect symbol. */
3076
3077static void
3078elf_cris_copy_indirect_symbol (struct bfd_link_info *info,
3079 struct elf_link_hash_entry *dir,
3080 struct elf_link_hash_entry *ind)
3081{
3082 struct elf_cris_link_hash_entry *edir, *eind;
3083
3084 edir = (struct elf_cris_link_hash_entry *) dir;
3085 eind = (struct elf_cris_link_hash_entry *) ind;
3086
867ea5fd
HPN
3087 /* Only indirect symbols are replaced; we're not interested in
3088 updating any of EIND's fields for other symbols. */
3089 if (eind->root.root.type != bfd_link_hash_indirect)
451ffe63
HPN
3090 {
3091 /* Still, we need to copy flags for e.g. weak definitions. */
3092 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3093 return;
3094 }
867ea5fd 3095
237bc7f0
HPN
3096 BFD_ASSERT (edir->pcrel_relocs_copied == NULL);
3097 BFD_ASSERT (edir->gotplt_offset == 0 || eind->gotplt_offset == 0);
3098
3099#define XMOVOPZ(F, OP, Z) edir->F OP eind->F; eind->F = Z
3100#define XMOVE(F) XMOVOPZ (F, +=, 0)
3101 XMOVOPZ (pcrel_relocs_copied, =, NULL);
3102 XMOVE (gotplt_refcount);
3103 XMOVE (gotplt_offset);
3104 XMOVE (reg_got_refcount);
3105 XMOVE (tprel_refcount);
3106 XMOVE (dtp_refcount);
3107#undef XMOVE
3108#undef XMOVOPZ
3109
3110 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3111}
3112
915e5146 3113/* Look through the relocs for a section during the first phase. */
a7c10850 3114
b34976b6 3115static bfd_boolean
06c15ad7
HPN
3116cris_elf_check_relocs (abfd, info, sec, relocs)
3117 bfd *abfd;
3118 struct bfd_link_info *info;
3119 asection *sec;
3120 const Elf_Internal_Rela *relocs;
3121{
915e5146 3122 bfd *dynobj;
06c15ad7 3123 Elf_Internal_Shdr *symtab_hdr;
5582a088 3124 struct elf_link_hash_entry **sym_hashes;
915e5146 3125 bfd_signed_vma *local_got_refcounts;
06c15ad7
HPN
3126 const Elf_Internal_Rela *rel;
3127 const Elf_Internal_Rela *rel_end;
915e5146
HPN
3128 asection *sgot;
3129 asection *srelgot;
3130 asection *sreloc;
a7c10850 3131
1049f94e 3132 if (info->relocatable)
b34976b6 3133 return TRUE;
a7c10850 3134
915e5146 3135 dynobj = elf_hash_table (info)->dynobj;
06c15ad7
HPN
3136 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3137 sym_hashes = elf_sym_hashes (abfd);
915e5146
HPN
3138 local_got_refcounts = elf_local_got_refcounts (abfd);
3139
3140 sgot = NULL;
3141 srelgot = NULL;
3142 sreloc = NULL;
3143
06c15ad7
HPN
3144 rel_end = relocs + sec->reloc_count;
3145 for (rel = relocs; rel < rel_end; rel++)
3146 {
3147 struct elf_link_hash_entry *h;
3148 unsigned long r_symndx;
915e5146 3149 enum elf_cris_reloc_type r_type;
100382c7
HPN
3150 bfd_signed_vma got_element_size = 4;
3151 unsigned long r_symndx_lgot = INT_MAX;
a7c10850 3152
06c15ad7
HPN
3153 r_symndx = ELF32_R_SYM (rel->r_info);
3154 if (r_symndx < symtab_hdr->sh_info)
100382c7
HPN
3155 {
3156 h = NULL;
3157 r_symndx_lgot = LGOT_REG_NDX (r_symndx);
3158 }
06c15ad7 3159 else
973a3492
L
3160 {
3161 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3162 while (h->root.type == bfd_link_hash_indirect
3163 || h->root.type == bfd_link_hash_warning)
3164 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3165 }
a7c10850 3166
915e5146
HPN
3167 r_type = ELF32_R_TYPE (rel->r_info);
3168
3169 /* Some relocs require linker-created sections; we need to hang them
3170 on the first input bfd we found that contained dynamic relocs. */
3171 switch (r_type)
3172 {
100382c7 3173 case R_CRIS_32_DTPREL:
6718f446
HPN
3174 if ((sec->flags & SEC_ALLOC) == 0)
3175 /* This'd be a .dtpreld entry in e.g. debug info. We have
3176 several different switch statements below, but none of
3177 that is needed; we need no preparations for resolving
3178 R_CRIS_32_DTPREL into a non-allocated section (debug
3179 info), so let's just move on to the next
3180 relocation. */
3181 continue;
3182 /* Fall through. */
3183 case R_CRIS_16_DTPREL:
100382c7
HPN
3184 /* The first .got.plt entry is right after the R_CRIS_DTPMOD
3185 entry at index 3. */
3186 if (elf_cris_hash_table (info)->dtpmod_refcount == 0)
3187 elf_cris_hash_table (info)->next_gotplt_entry += 8;
3188 elf_cris_hash_table (info)->dtpmod_refcount++;
3189 /* Fall through. */
3190
75f500d7 3191 case R_CRIS_32_IE:
100382c7
HPN
3192 case R_CRIS_32_GD:
3193 case R_CRIS_16_GOT_GD:
3194 case R_CRIS_32_GOT_GD:
3195 case R_CRIS_32_GOT_TPREL:
3196 case R_CRIS_16_GOT_TPREL:
915e5146
HPN
3197 case R_CRIS_16_GOT:
3198 case R_CRIS_32_GOT:
3199 case R_CRIS_32_GOTREL:
3200 case R_CRIS_32_PLT_GOTREL:
3201 case R_CRIS_32_PLT_PCREL:
3202 case R_CRIS_16_GOTPLT:
3203 case R_CRIS_32_GOTPLT:
3204 if (dynobj == NULL)
3205 {
3206 elf_hash_table (info)->dynobj = dynobj = abfd;
3207
bac23f82
HPN
3208 /* We could handle this if we can get a handle on the
3209 output bfd in elf_cris_adjust_dynamic_symbol. Failing
3210 that, we must insist on dynobj being a specific mach. */
3211 if (bfd_get_mach (dynobj) == bfd_mach_cris_v10_v32)
3212 {
3213 (*_bfd_error_handler)
3214 (_("%B, section %A:\n v10/v32 compatible object %s"
3215 " must not contain a PIC relocation"),
3216 abfd, sec);
3217 return FALSE;
3218 }
3219
915e5146
HPN
3220 /* Create the .got section, so we can assume it's always
3221 present whenever there's a dynobj. */
3222 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 3223 return FALSE;
915e5146 3224 }
100382c7
HPN
3225
3226 if (sgot == NULL)
3227 sgot = bfd_get_section_by_name (dynobj, ".got");
3228
3229 if (local_got_refcounts == NULL)
3230 {
3231 bfd_size_type amt;
3232
3233 /* We use index local_got_refcounts[-1] to count all
3234 GOT-relative relocations that do not have explicit
3235 GOT entries. */
3236 amt = LGOT_ALLOC_NELTS_FOR (symtab_hdr->sh_info) + 1;
3237 amt *= sizeof (bfd_signed_vma);
3238 local_got_refcounts = ((bfd_signed_vma *) bfd_zalloc (abfd, amt));
3239 if (local_got_refcounts == NULL)
3240 return FALSE;
3241
3242 local_got_refcounts++;
3243 elf_local_got_refcounts (abfd) = local_got_refcounts;
3244 }
915e5146
HPN
3245 break;
3246
3247 default:
3248 break;
3249 }
3250
3251 /* Some relocs require a global offset table (but perhaps not a
3252 specific GOT entry). */
4d96d128 3253 switch (r_type)
915e5146 3254 {
100382c7
HPN
3255 case R_CRIS_16_DTPREL:
3256 case R_CRIS_32_DTPREL:
3257 /* Not requesting .got.rela for an executable: the contents
3258 of the first entry is constant there. For a shared
3259 library, we need .got.rela for the R_CRIS_DTPMOD
3260 relocation at index 3. */
3261 if (!info->shared)
3262 break;
3263 /* Fall through. */
3264
75f500d7 3265 case R_CRIS_32_IE:
100382c7
HPN
3266 case R_CRIS_32_GD:
3267 case R_CRIS_16_GOT_GD:
3268 case R_CRIS_32_GOT_GD:
3269 case R_CRIS_32_GOT_TPREL:
3270 case R_CRIS_16_GOT_TPREL:
3271 /* Fall through. */
3272
44aa49bb
HPN
3273 /* For R_CRIS_16_GOTPLT and R_CRIS_32_GOTPLT, we need a GOT
3274 entry only for local symbols. Unfortunately, we don't know
3275 until later on if there's a version script that forces the
3276 symbol local. We must have the .rela.got section in place
3277 before we know if the symbol looks global now, so we need
3278 to treat the reloc just like for R_CRIS_16_GOT and
3279 R_CRIS_32_GOT. */
3280 case R_CRIS_16_GOTPLT:
3281 case R_CRIS_32_GOTPLT:
915e5146
HPN
3282 case R_CRIS_16_GOT:
3283 case R_CRIS_32_GOT:
44aa49bb
HPN
3284 if (srelgot == NULL
3285 && (h != NULL || info->shared))
3286 {
3287 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3288 if (srelgot == NULL)
3289 {
3496cb2a
L
3290 srelgot = bfd_make_section_with_flags (dynobj,
3291 ".rela.got",
3292 (SEC_ALLOC
3293 | SEC_LOAD
3294 | SEC_HAS_CONTENTS
3295 | SEC_IN_MEMORY
3296 | SEC_LINKER_CREATED
3297 | SEC_READONLY));
44aa49bb 3298 if (srelgot == NULL
44aa49bb 3299 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 3300 return FALSE;
44aa49bb
HPN
3301 }
3302 }
100382c7 3303 break;
44aa49bb 3304
100382c7
HPN
3305 default:
3306 break;
3307 }
915e5146 3308
100382c7
HPN
3309 /* Warn and error for invalid input. */
3310 switch (r_type)
3311 {
75f500d7 3312 case R_CRIS_32_IE:
100382c7
HPN
3313 case R_CRIS_32_TPREL:
3314 case R_CRIS_16_TPREL:
3315 case R_CRIS_32_GD:
3316 if (info->shared)
915e5146 3317 {
100382c7
HPN
3318 (*_bfd_error_handler)
3319 (_("%B, section %A:\n relocation %s not valid"
3320 " in a shared object;"
3321 " typically an option mixup, recompile with -fPIC"),
3322 abfd,
3323 sec,
3324 cris_elf_howto_table[r_type].name);
3325 /* Don't return FALSE here; we want messages for all of
3326 these and the error behavior is ungraceful
3327 anyway. */
3328 }
3329 default:
3330 break;
3331 }
915e5146 3332
100382c7
HPN
3333 switch (r_type)
3334 {
3335 case R_CRIS_32_GD:
3336 case R_CRIS_16_GOT_GD:
3337 case R_CRIS_32_GOT_GD:
3338 /* These are requests for tls_index entries, run-time R_CRIS_DTP. */
3339 got_element_size = 8;
3340 r_symndx_lgot = LGOT_DTP_NDX (r_symndx);
3341 break;
915e5146 3342
100382c7
HPN
3343 case R_CRIS_16_DTPREL:
3344 case R_CRIS_32_DTPREL:
3345 /* These two just request for the constant-index
3346 module-local tls_index-sized GOT entry, which we add
3347 elsewhere. */
915e5146
HPN
3348 break;
3349
75f500d7 3350 case R_CRIS_32_IE:
100382c7
HPN
3351 case R_CRIS_32_GOT_TPREL:
3352 case R_CRIS_16_GOT_TPREL:
3353 r_symndx_lgot = LGOT_TPREL_NDX (r_symndx);
3354
75f500d7 3355 /* Those relocs also require that a DSO is of type
100382c7
HPN
3356 Initial Exec. Like other targets, we don't reset this
3357 flag even if the relocs are GC:ed away. */
3358 if (info->shared)
3359 info->flags |= DF_STATIC_TLS;
3360 break;
3361
3362 /* Let's list the other assembler-generated TLS-relocs too,
3363 just to show that they're not forgotten. */
3364 case R_CRIS_16_TPREL:
3365 case R_CRIS_32_TPREL:
915e5146
HPN
3366 default:
3367 break;
3368 }
3369
4d96d128 3370 switch (r_type)
06c15ad7 3371 {
915e5146
HPN
3372 case R_CRIS_16_GOTPLT:
3373 case R_CRIS_32_GOTPLT:
3374 /* Mark that we need a GOT entry if the PLT entry (and its GOT
3375 entry) is eliminated. We can only do this for a non-local
3376 symbol. */
3377 if (h != NULL)
3378 {
100382c7 3379 elf_cris_hash_entry (h)->gotplt_refcount++;
915e5146
HPN
3380 goto handle_gotplt_reloc;
3381 }
3382 /* If h is NULL then this is a local symbol, and we must make a
3383 GOT entry for it, so handle it like a GOT reloc. */
3384 /* Fall through. */
3385
75f500d7 3386 case R_CRIS_32_IE:
100382c7
HPN
3387 case R_CRIS_32_GD:
3388 case R_CRIS_16_GOT_GD:
3389 case R_CRIS_32_GOT_GD:
3390 case R_CRIS_32_GOT_TPREL:
3391 case R_CRIS_16_GOT_TPREL:
915e5146
HPN
3392 case R_CRIS_16_GOT:
3393 case R_CRIS_32_GOT:
3394 /* This symbol requires a global offset table entry. */
915e5146
HPN
3395 if (h != NULL)
3396 {
51b64d56 3397 if (h->got.refcount == 0)
915e5146 3398 {
915e5146
HPN
3399 /* Make sure this symbol is output as a dynamic symbol. */
3400 if (h->dynindx == -1)
3401 {
c152c796 3402 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3403 return FALSE;
915e5146 3404 }
915e5146 3405 }
100382c7
HPN
3406
3407 /* Update the sum of reloc counts for this symbol. */
51b64d56 3408 h->got.refcount++;
100382c7
HPN
3409
3410 switch (r_type)
3411 {
3412 case R_CRIS_16_GOT:
3413 case R_CRIS_32_GOT:
3414 if (elf_cris_hash_entry (h)->reg_got_refcount == 0)
3415 {
3416 /* Allocate space in the .got section. */
3417 sgot->size += got_element_size;
3418 /* Allocate relocation space. */
3419 srelgot->size += sizeof (Elf32_External_Rela);
3420 }
3421 elf_cris_hash_entry (h)->reg_got_refcount++;
3422 break;
3423
3424 case R_CRIS_32_GD:
3425 case R_CRIS_16_GOT_GD:
3426 case R_CRIS_32_GOT_GD:
3427 if (elf_cris_hash_entry (h)->dtp_refcount == 0)
3428 {
3429 /* Allocate space in the .got section. */
3430 sgot->size += got_element_size;
3431 /* Allocate relocation space. */
3432 srelgot->size += sizeof (Elf32_External_Rela);
3433 }
3434 elf_cris_hash_entry (h)->dtp_refcount++;
3435 break;
3436
75f500d7 3437 case R_CRIS_32_IE:
100382c7
HPN
3438 case R_CRIS_32_GOT_TPREL:
3439 case R_CRIS_16_GOT_TPREL:
3440 if (elf_cris_hash_entry (h)->tprel_refcount == 0)
3441 {
3442 /* Allocate space in the .got section. */
3443 sgot->size += got_element_size;
3444 /* Allocate relocation space. */
3445 srelgot->size += sizeof (Elf32_External_Rela);
3446 }
3447 elf_cris_hash_entry (h)->tprel_refcount++;
3448 break;
3449
3450 default:
3451 BFD_FAIL ();
3452 break;
3453 }
915e5146
HPN
3454 }
3455 else
3456 {
3457 /* This is a global offset table entry for a local symbol. */
100382c7 3458 if (local_got_refcounts[r_symndx_lgot] == 0)
915e5146 3459 {
100382c7 3460 sgot->size += got_element_size;
915e5146
HPN
3461 if (info->shared)
3462 {
100382c7
HPN
3463 /* If we are generating a shared object, we need
3464 to output a R_CRIS_RELATIVE reloc so that the
3465 dynamic linker can adjust this GOT entry.
3466 Similarly for non-regular got entries. */
eea6121a 3467 srelgot->size += sizeof (Elf32_External_Rela);
915e5146
HPN
3468 }
3469 }
100382c7
HPN
3470 /* Update the reloc-specific count. */
3471 local_got_refcounts[r_symndx_lgot]++;
3472
3473 /* This one is the sum of all the others. */
51b64d56 3474 local_got_refcounts[r_symndx]++;
915e5146
HPN
3475 }
3476 break;
3477
100382c7
HPN
3478 case R_CRIS_16_DTPREL:
3479 case R_CRIS_32_DTPREL:
915e5146
HPN
3480 case R_CRIS_32_GOTREL:
3481 /* This reference requires a global offset table.
3482 FIXME: The actual refcount isn't used currently; the .got
3483 section can't be removed if there were any references in the
3484 input. */
3485 local_got_refcounts[-1]++;
3486 break;
3487
3488 handle_gotplt_reloc:
3489
3490 case R_CRIS_32_PLT_GOTREL:
3491 /* This reference requires a global offset table. */
3492 local_got_refcounts[-1]++;
3493 /* Fall through. */
3494
3495 case R_CRIS_32_PLT_PCREL:
3496 /* This symbol requires a procedure linkage table entry. We
3497 actually build the entry in adjust_dynamic_symbol,
3498 because this might be a case of linking PIC code which is
3499 never referenced by a dynamic object, in which case we
3500 don't need to generate a procedure linkage table entry
3501 after all. */
3502
ada1953e
HPN
3503 /* Beware: if we'd check for visibility of the symbol here
3504 (and not marking the need for a PLT when non-visible), we'd
3505 get into trouble with keeping handling consistent with
3506 regards to relocs found before definition and GOTPLT
3507 handling. Eliminable PLT entries will be dealt with later
3508 anyway. */
3509 if (h == NULL)
915e5146
HPN
3510 continue;
3511
f5385ebf 3512 h->needs_plt = 1;
51b64d56 3513 h->plt.refcount++;
915e5146
HPN
3514 break;
3515
3516 case R_CRIS_8:
3517 case R_CRIS_16:
3518 case R_CRIS_32:
3519 /* Let's help debug shared library creation. Any of these
0d08de41
HPN
3520 relocs *can* be used in shared libs, but pages containing
3521 them cannot be shared, so they're not appropriate for
3522 common use. Don't warn for sections we don't care about,
3523 such as debug sections or non-constant sections. We
3524 can't help tables of (global) function pointers, for
3525 example, though they must be emitted in a (writable) data
3526 section to avoid having impure text sections. */
915e5146
HPN
3527 if (info->shared
3528 && (sec->flags & SEC_ALLOC) != 0
3529 && (sec->flags & SEC_READONLY) != 0)
3530 {
3531 /* FIXME: How do we make this optionally a warning only? */
8f615d07 3532 (*_bfd_error_handler)
bac23f82
HPN
3533 (_("%B, section %A:\n relocation %s should not"
3534 " be used in a shared object; recompile with -fPIC"),
d003868e
AM
3535 abfd,
3536 sec,
8f615d07 3537 cris_elf_howto_table[r_type].name);
915e5146 3538 }
0d08de41
HPN
3539 if (h != NULL)
3540 {
3541 h->non_got_ref = 1;
100382c7 3542
0d08de41
HPN
3543 /* Make sure a plt entry is created for this symbol if it
3544 turns out to be a function defined by a dynamic object. */
3545 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3546 h->plt.refcount++;
3547 }
3548
3549 /* If we are creating a shared library and this is not a local
3550 symbol, we need to copy the reloc into the shared library.
3551 However when linking with -Bsymbolic and this is a global
3552 symbol which is defined in an object we are including in the
3553 link (i.e., DEF_REGULAR is set), then we can resolve the
3554 reloc directly. At this point we have not seen all the input
3555 files, so it is possible that DEF_REGULAR is not set now but
3556 will be set later (it is never cleared). In case of a weak
3557 definition, DEF_REGULAR may be cleared later by a strong
3558 definition in a shared library. We account for that
3559 possibility below by storing information in the relocs_copied
3560 field of the hash table entry. A similar situation occurs
3561 when creating shared libraries and symbol visibility changes
3562 render the symbol local. */
3563
3564 /* No need to do anything if we're not creating a shared object. */
3565 if (! info->shared)
3566 break;
3567
3568 /* We don't need to handle relocs into sections not going into
3569 the "real" output. */
3570 if ((sec->flags & SEC_ALLOC) == 0)
3571 break;
3572
3573 /* We may need to create a reloc section in the dynobj and made room
3574 for this reloc. */
3575 if (sreloc == NULL)
3576 {
3577 sreloc = _bfd_elf_make_dynamic_reloc_section
3578 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
3579
3580 if (sreloc == NULL)
3581 return FALSE;
3582 }
3583
3584 if (sec->flags & SEC_READONLY)
3585 info->flags |= DF_TEXTREL;
3586
3587 sreloc->size += sizeof (Elf32_External_Rela);
3588 break;
915e5146
HPN
3589
3590 case R_CRIS_8_PCREL:
3591 case R_CRIS_16_PCREL:
3592 case R_CRIS_32_PCREL:
3593 if (h != NULL)
3594 {
f5385ebf 3595 h->non_got_ref = 1;
915e5146
HPN
3596
3597 /* Make sure a plt entry is created for this symbol if it
3598 turns out to be a function defined by a dynamic object. */
0a4787a0
HPN
3599 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3600 h->plt.refcount++;
915e5146
HPN
3601 }
3602
3603 /* If we are creating a shared library and this is not a local
3604 symbol, we need to copy the reloc into the shared library.
3605 However when linking with -Bsymbolic and this is a global
3606 symbol which is defined in an object we are including in the
3607 link (i.e., DEF_REGULAR is set), then we can resolve the
3608 reloc directly. At this point we have not seen all the input
3609 files, so it is possible that DEF_REGULAR is not set now but
3610 will be set later (it is never cleared). In case of a weak
3611 definition, DEF_REGULAR may be cleared later by a strong
3612 definition in a shared library. We account for that
3613 possibility below by storing information in the relocs_copied
3614 field of the hash table entry. A similar situation occurs
3615 when creating shared libraries and symbol visibility changes
3616 render the symbol local. */
3617
3618 /* No need to do anything if we're not creating a shared object. */
3619 if (! info->shared)
3620 break;
3621
3622 /* We don't need to handle relocs into sections not going into
3623 the "real" output. */
3624 if ((sec->flags & SEC_ALLOC) == 0)
3625 break;
3626
0d08de41
HPN
3627 /* If the symbol is local, then we know already we can
3628 eliminate the reloc. */
3629 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3630 break;
bac23f82 3631
0d08de41
HPN
3632 /* If this is with -Bsymbolic and the symbol isn't weak, and
3633 is defined by an ordinary object (the ones we include in
3634 this shared library) then we can also eliminate the
3635 reloc. See comment above for more eliminable cases which
3636 we can't identify at this time. */
3637 if (info->symbolic
3638 && h->root.type != bfd_link_hash_defweak
3639 && h->def_regular)
3640 break;
915e5146 3641
83bac4b0
NC
3642 /* We may need to create a reloc section in the dynobj and made room
3643 for this reloc. */
915e5146
HPN
3644 if (sreloc == NULL)
3645 {
83bac4b0
NC
3646 sreloc = _bfd_elf_make_dynamic_reloc_section
3647 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
915e5146 3648
83bac4b0 3649 if (sreloc == NULL)
b34976b6 3650 return FALSE;
915e5146
HPN
3651 }
3652
eea6121a 3653 sreloc->size += sizeof (Elf32_External_Rela);
915e5146 3654
0d08de41
HPN
3655 /* We count the number of PC relative relocations we have
3656 entered for this symbol, so that we can discard them
3657 again if the symbol is later defined by a regular object.
3658 We know that h is really a pointer to an
915e5146 3659 elf_cris_link_hash_entry. */
0d08de41
HPN
3660 {
3661 struct elf_cris_link_hash_entry *eh;
3662 struct elf_cris_pcrel_relocs_copied *p;
915e5146 3663
0d08de41 3664 eh = elf_cris_hash_entry (h);
915e5146 3665
0d08de41
HPN
3666 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
3667 if (p->section == sreloc)
3668 break;
915e5146 3669
0d08de41
HPN
3670 if (p == NULL)
3671 {
3672 p = ((struct elf_cris_pcrel_relocs_copied *)
3673 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
3674 if (p == NULL)
3675 return FALSE;
3676 p->next = eh->pcrel_relocs_copied;
3677 eh->pcrel_relocs_copied = p;
3678 p->section = sreloc;
3679 p->count = 0;
3680 p->r_type = r_type;
3681 }
915e5146 3682
0d08de41
HPN
3683 ++p->count;
3684 }
915e5146
HPN
3685 break;
3686
06c15ad7
HPN
3687 /* This relocation describes the C++ object vtable hierarchy.
3688 Reconstruct it for later use during GC. */
3689 case R_CRIS_GNU_VTINHERIT:
c152c796 3690 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 3691 return FALSE;
06c15ad7 3692 break;
a7c10850 3693
06c15ad7
HPN
3694 /* This relocation describes which C++ vtable entries are actually
3695 used. Record for later use during GC. */
3696 case R_CRIS_GNU_VTENTRY:
d17e0c6e
JB
3697 BFD_ASSERT (h != NULL);
3698 if (h != NULL
3699 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 3700 return FALSE;
06c15ad7 3701 break;
4d96d128 3702
100382c7
HPN
3703 case R_CRIS_16_TPREL:
3704 case R_CRIS_32_TPREL:
3705 /* Already warned above, when necessary. */
3706 break;
3707
4d96d128
HPN
3708 default:
3709 /* Other relocs do not appear here. */
3710 bfd_set_error (bfd_error_bad_value);
b34976b6 3711 return FALSE;
06c15ad7
HPN
3712 }
3713 }
a7c10850 3714
b34976b6 3715 return TRUE;
06c15ad7 3716}
4da81684 3717
915e5146
HPN
3718/* Set the sizes of the dynamic sections. */
3719
b34976b6 3720static bfd_boolean
915e5146 3721elf_cris_size_dynamic_sections (output_bfd, info)
99e4ae17 3722 bfd *output_bfd ATTRIBUTE_UNUSED;
915e5146
HPN
3723 struct bfd_link_info *info;
3724{
3725 bfd *dynobj;
3726 asection *s;
b34976b6
AM
3727 bfd_boolean plt;
3728 bfd_boolean relocs;
915e5146
HPN
3729
3730 dynobj = elf_hash_table (info)->dynobj;
3731 BFD_ASSERT (dynobj != NULL);
3732
3733 if (elf_hash_table (info)->dynamic_sections_created)
3734 {
3735 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 3736 if (info->executable)
915e5146
HPN
3737 {
3738 s = bfd_get_section_by_name (dynobj, ".interp");
3739 BFD_ASSERT (s != NULL);
eea6121a 3740 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
915e5146
HPN
3741 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3742 }
3743 }
3744 else
3745 {
3746 /* Adjust all expected GOTPLT uses to use a GOT entry instead. */
3747 elf_cris_link_hash_traverse (elf_cris_hash_table (info),
3748 elf_cris_adjust_gotplt_to_got,
3749 (PTR) info);
3750
3751 /* We may have created entries in the .rela.got section.
3752 However, if we are not creating the dynamic sections, we will
3753 not actually use these entries. Reset the size of .rela.got,
3754 which will cause it to get stripped from the output file
3755 below. */
3756 s = bfd_get_section_by_name (dynobj, ".rela.got");
3757 if (s != NULL)
eea6121a 3758 s->size = 0;
915e5146
HPN
3759 }
3760
3761 /* If this is a -Bsymbolic shared link, then we need to discard all PC
3762 relative relocs against symbols defined in a regular object. We
3763 allocated space for them in the check_relocs routine, but we will not
3764 fill them in in the relocate_section routine. We also discard space
3765 for relocs that have become for local symbols due to symbol
4d96d128
HPN
3766 visibility changes. For programs, we discard space for relocs for
3767 symbols not referenced by any dynamic object. */
915e5146
HPN
3768 if (info->shared)
3769 elf_cris_link_hash_traverse (elf_cris_hash_table (info),
4d96d128
HPN
3770 elf_cris_discard_excess_dso_dynamics,
3771 (PTR) info);
3772 else
3773 elf_cris_link_hash_traverse (elf_cris_hash_table (info),
3774 elf_cris_discard_excess_program_dynamics,
915e5146
HPN
3775 (PTR) info);
3776
3777 /* The check_relocs and adjust_dynamic_symbol entry points have
3778 determined the sizes of the various dynamic sections. Allocate
3779 memory for them. */
b34976b6
AM
3780 plt = FALSE;
3781 relocs = FALSE;
915e5146
HPN
3782 for (s = dynobj->sections; s != NULL; s = s->next)
3783 {
3784 const char *name;
915e5146
HPN
3785
3786 if ((s->flags & SEC_LINKER_CREATED) == 0)
3787 continue;
3788
3789 /* It's OK to base decisions on the section name, because none
3790 of the dynobj section names depend upon the input files. */
3791 name = bfd_get_section_name (dynobj, s);
3792
915e5146
HPN
3793 if (strcmp (name, ".plt") == 0)
3794 {
c456f082
AM
3795 /* Remember whether there is a PLT. */
3796 plt = s->size != 0;
915e5146 3797 }
100382c7
HPN
3798 else if (strcmp (name, ".got.plt") == 0)
3799 {
3800 /* The .got.plt contains the .got header as well as the
3801 actual .got.plt contents. The .got header may contain a
3802 R_CRIS_DTPMOD entry at index 3. */
3803 s->size += elf_cris_hash_table (info)->dtpmod_refcount != 0
3804 ? 8 : 0;
3805 }
0112cd26 3806 else if (CONST_STRNEQ (name, ".rela"))
915e5146 3807 {
100382c7
HPN
3808 if (strcmp (name, ".rela.got") == 0
3809 && elf_cris_hash_table (info)->dtpmod_refcount != 0
3810 && info->shared)
3811 s->size += sizeof (Elf32_External_Rela);
3812
c456f082 3813 if (s->size != 0)
915e5146 3814 {
915e5146
HPN
3815 /* Remember whether there are any reloc sections other
3816 than .rela.plt. */
3817 if (strcmp (name, ".rela.plt") != 0)
b34976b6 3818 relocs = TRUE;
915e5146 3819
915e5146
HPN
3820 /* We use the reloc_count field as a counter if we need
3821 to copy relocs into the output file. */
3822 s->reloc_count = 0;
3823 }
3824 }
0112cd26 3825 else if (! CONST_STRNEQ (name, ".got")
c456f082 3826 && strcmp (name, ".dynbss") != 0)
915e5146
HPN
3827 {
3828 /* It's not one of our sections, so don't allocate space. */
3829 continue;
3830 }
3831
c456f082 3832 if (s->size == 0)
915e5146 3833 {
c456f082
AM
3834 /* If we don't need this section, strip it from the
3835 output file. This is mostly to handle .rela.bss and
3836 .rela.plt. We must create both sections in
3837 create_dynamic_sections, because they must be created
3838 before the linker maps input sections to output
3839 sections. The linker does that before
3840 adjust_dynamic_symbol is called, and it is that
3841 function which decides whether anything needs to go
3842 into these sections. */
8423293d 3843 s->flags |= SEC_EXCLUDE;
915e5146
HPN
3844 continue;
3845 }
3846
c456f082
AM
3847 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3848 continue;
3849
915e5146
HPN
3850 /* Allocate memory for the section contents. We use bfd_zalloc here
3851 in case unused entries are not reclaimed before the section's
3852 contents are written out. This should not happen, but this way
3853 if it does, we will not write out garbage. For reloc sections,
3854 this will make entries have the type R_CRIS_NONE. */
eea6121a 3855 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 3856 if (s->contents == NULL)
b34976b6 3857 return FALSE;
915e5146
HPN
3858 }
3859
3860 if (elf_hash_table (info)->dynamic_sections_created)
3861 {
3862 /* Add some entries to the .dynamic section. We fill in the
3863 values later, in elf_cris_finish_dynamic_sections, but we
3864 must add the entries now so that we get the correct size for
3865 the .dynamic section. The DT_DEBUG entry is filled in by the
3866 dynamic linker and used by the debugger. */
dc810e39 3867#define add_dynamic_entry(TAG, VAL) \
5a580b3a 3868 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 3869
915e5146
HPN
3870 if (!info->shared)
3871 {
dc810e39 3872 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 3873 return FALSE;
915e5146
HPN
3874 }
3875
3876 if (plt)
3877 {
dc810e39
AM
3878 if (!add_dynamic_entry (DT_PLTGOT, 0)
3879 || !add_dynamic_entry (DT_PLTRELSZ, 0)
3880 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
3881 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 3882 return FALSE;
915e5146
HPN
3883 }
3884
3885 if (relocs)
3886 {
dc810e39
AM
3887 if (!add_dynamic_entry (DT_RELA, 0)
3888 || !add_dynamic_entry (DT_RELASZ, 0)
3889 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 3890 return FALSE;
915e5146
HPN
3891 }
3892
99e4ae17 3893 if ((info->flags & DF_TEXTREL) != 0)
915e5146 3894 {
dc810e39 3895 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3896 return FALSE;
915e5146
HPN
3897 info->flags |= DF_TEXTREL;
3898 }
3899 }
dc810e39 3900#undef add_dynamic_entry
915e5146 3901
b34976b6 3902 return TRUE;
915e5146
HPN
3903}
3904
3905/* This function is called via elf_cris_link_hash_traverse if we are
3906 creating a shared object. In the -Bsymbolic case, it discards the
3907 space allocated to copy PC relative relocs against symbols which
3908 are defined in regular objects. For the normal non-symbolic case,
3909 we also discard space for relocs that have become local due to
3910 symbol visibility changes. We allocated space for them in the
3911 check_relocs routine, but we won't fill them in in the
3912 relocate_section routine. */
3913
b34976b6 3914static bfd_boolean
4d96d128 3915elf_cris_discard_excess_dso_dynamics (h, inf)
915e5146
HPN
3916 struct elf_cris_link_hash_entry *h;
3917 PTR inf;
3918{
3919 struct elf_cris_pcrel_relocs_copied *s;
3920 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3921
e92d460e
AM
3922 if (h->root.root.type == bfd_link_hash_warning)
3923 h = (struct elf_cris_link_hash_entry *) h->root.root.u.i.link;
3924
915e5146
HPN
3925 /* If a symbol has been forced local or we have found a regular
3926 definition for the symbolic link case, then we won't be needing
3927 any relocs. */
f5385ebf
AM
3928 if (h->root.def_regular
3929 && (h->root.forced_local
915e5146
HPN
3930 || info->symbolic))
3931 {
3932 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 3933 s->section->size -= s->count * sizeof (Elf32_External_Rela);
0d08de41
HPN
3934
3935 return TRUE;
3936 }
3937
3938 /* If we have accounted for PC-relative relocs for read-only
3939 sections, now is the time to warn for them. We can't do it in
3940 cris_elf_check_relocs, because we don't know the status of all
3941 symbols at that time (and it's common to force symbols local
3942 late). */
3943
3944 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
3945 {
3946 BFD_ASSERT ((s->section->flags & SEC_READONLY) != 0);
3947
3948 /* FIXME: How do we make this optionally a warning only? */
3949 (*_bfd_error_handler)
3950 (_("%B, section `%A', to symbol `%s':\n"
3951 " relocation %s should not be used"
3952 " in a shared object; recompile with -fPIC"),
3953 s->section->owner,
3954 s->section,
3955 h->root.root.root.string,
3956 cris_elf_howto_table[s->r_type].name);
3957
3958 info->flags |= DF_TEXTREL;
4d96d128
HPN
3959 }
3960
b34976b6 3961 return TRUE;
4d96d128
HPN
3962}
3963
3964/* This function is called via elf_cris_link_hash_traverse if we are *not*
3965 creating a shared object. We discard space for relocs for symbols put
3966 in the .got, but which we found we do not have to resolve at run-time. */
3967
b34976b6 3968static bfd_boolean
4d96d128
HPN
3969elf_cris_discard_excess_program_dynamics (h, inf)
3970 struct elf_cris_link_hash_entry *h;
3971 PTR inf;
3972{
3973 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3974
e92d460e
AM
3975 if (h->root.root.type == bfd_link_hash_warning)
3976 h = (struct elf_cris_link_hash_entry *) h->root.root.u.i.link;
3977
4d96d128
HPN
3978 /* If we're not creating a shared library and have a symbol which is
3979 referred to by .got references, but the symbol is defined locally,
e4a2175c
HPN
3980 (or rather, not defined by a DSO) then lose the reloc for the .got
3981 (don't allocate room for it). Likewise for relocs for something
3982 for which we create a PLT. */
f5385ebf 3983 if (!h->root.def_dynamic
e4a2175c 3984 || h->root.plt.refcount > 0)
4d96d128 3985 {
100382c7 3986 if (h->reg_got_refcount > 0
4d96d128
HPN
3987 /* The size of this section is only valid and in sync with the
3988 various reference counts if we do dynamic; don't decrement it
3989 otherwise. */
3990 && elf_hash_table (info)->dynamic_sections_created)
3991 {
3992 bfd *dynobj = elf_hash_table (info)->dynobj;
3993 asection *srelgot;
3994
3995 BFD_ASSERT (dynobj != NULL);
99c79b2e 3996
4d96d128
HPN
3997 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3998
3999 BFD_ASSERT (srelgot != NULL);
4000
eea6121a 4001 srelgot->size -= sizeof (Elf32_External_Rela);
4d96d128
HPN
4002 }
4003
4004 /* If the locally-defined symbol isn't used by a DSO, then we don't
4005 have to export it as a dynamic symbol. This was already done for
4006 functions; doing this for all symbols would presumably not
e5dfef09
HPN
4007 introduce new problems. Of course we don't do this if we're
4008 exporting all dynamic symbols. */
0741c7be 4009 if (! info->export_dynamic
77cfaee6 4010 && h->root.dynindx != -1
f5385ebf
AM
4011 && !h->root.def_dynamic
4012 && !h->root.ref_dynamic)
e5dfef09
HPN
4013 {
4014 h->root.dynindx = -1;
4015 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4016 h->root.dynstr_index);
4017 }
915e5146
HPN
4018 }
4019
b34976b6 4020 return TRUE;
915e5146
HPN
4021}
4022
4023/* Reject a file depending on presence and expectation of prefixed
4024 underscores on symbols. */
4da81684 4025
b34976b6 4026static bfd_boolean
4da81684
HPN
4027cris_elf_object_p (abfd)
4028 bfd *abfd;
4029{
bac23f82
HPN
4030 if (! cris_elf_set_mach_from_flags (abfd, elf_elfheader (abfd)->e_flags))
4031 return FALSE;
4032
4da81684
HPN
4033 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE))
4034 return (bfd_get_symbol_leading_char (abfd) == '_');
4035 else
4036 return (bfd_get_symbol_leading_char (abfd) == 0);
4037}
4038
bac23f82
HPN
4039/* Mark presence or absence of leading underscore. Set machine type
4040 flags from mach type. */
4da81684
HPN
4041
4042static void
4043cris_elf_final_write_processing (abfd, linker)
4044 bfd *abfd;
b34976b6 4045 bfd_boolean linker ATTRIBUTE_UNUSED;
4da81684 4046{
bac23f82
HPN
4047 unsigned long e_flags = elf_elfheader (abfd)->e_flags;
4048
4049 e_flags &= ~EF_CRIS_UNDERSCORE;
4da81684 4050 if (bfd_get_symbol_leading_char (abfd) == '_')
bac23f82
HPN
4051 e_flags |= EF_CRIS_UNDERSCORE;
4052
4053 switch (bfd_get_mach (abfd))
4054 {
4055 case bfd_mach_cris_v0_v10:
4056 e_flags |= EF_CRIS_VARIANT_ANY_V0_V10;
4057 break;
4058
4059 case bfd_mach_cris_v10_v32:
4060 e_flags |= EF_CRIS_VARIANT_COMMON_V10_V32;
4061 break;
4062
4063 case bfd_mach_cris_v32:
4064 e_flags |= EF_CRIS_VARIANT_V32;
4065 break;
4066
4067 default:
4068 _bfd_abort (__FILE__, __LINE__,
4069 _("Unexpected machine number"));
4070 }
4071
4072 elf_elfheader (abfd)->e_flags = e_flags;
4073}
4074
4075/* Set the mach type from e_flags value. */
4076
4077static bfd_boolean
4078cris_elf_set_mach_from_flags (abfd, flags)
4079 bfd *abfd;
4080 unsigned long flags;
4081{
4082 switch (flags & EF_CRIS_VARIANT_MASK)
4083 {
4084 case EF_CRIS_VARIANT_ANY_V0_V10:
4085 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v0_v10);
4086 break;
4087
4088 case EF_CRIS_VARIANT_V32:
4089 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v32);
4090 break;
4091
4092 case EF_CRIS_VARIANT_COMMON_V10_V32:
4093 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v10_v32);
4094 break;
4095
4096 default:
4097 /* Since we don't recognize them, we obviously can't support them
4098 with this code; we'd have to require that all future handling
4099 would be optional. */
4100 bfd_set_error (bfd_error_wrong_format);
4101 return FALSE;
4102 }
4103
4104 return TRUE;
4da81684
HPN
4105}
4106
4107/* Display the flags field. */
4108
b34976b6 4109static bfd_boolean
4da81684
HPN
4110cris_elf_print_private_bfd_data (abfd, ptr)
4111 bfd *abfd;
4112 PTR ptr;
4113{
4114 FILE *file = (FILE *) ptr;
4115
f12123c0 4116 BFD_ASSERT (abfd != NULL && ptr != NULL);
4da81684
HPN
4117
4118 _bfd_elf_print_private_bfd_data (abfd, ptr);
4119
4120 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
4121
4122 if (elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE)
4123 fprintf (file, _(" [symbols have a _ prefix]"));
bac23f82
HPN
4124 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4125 == EF_CRIS_VARIANT_COMMON_V10_V32)
4126 fprintf (file, _(" [v10 and v32]"));
4127 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4128 == EF_CRIS_VARIANT_V32)
4129 fprintf (file, _(" [v32]"));
4da81684
HPN
4130
4131 fputc ('\n', file);
b34976b6 4132 return TRUE;
4da81684
HPN
4133}
4134
4135/* Don't mix files with and without a leading underscore. */
4136
b34976b6 4137static bfd_boolean
4da81684
HPN
4138cris_elf_merge_private_bfd_data (ibfd, obfd)
4139 bfd *ibfd;
4140 bfd *obfd;
4141{
bac23f82 4142 int imach, omach;
4da81684 4143
82e51918 4144 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 4145 return FALSE;
4da81684
HPN
4146
4147 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4148 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 4149 return TRUE;
4da81684 4150
bac23f82
HPN
4151 imach = bfd_get_mach (ibfd);
4152
4da81684
HPN
4153 if (! elf_flags_init (obfd))
4154 {
4155 /* This happens when ld starts out with a 'blank' output file. */
b34976b6 4156 elf_flags_init (obfd) = TRUE;
4da81684 4157
bac23f82
HPN
4158 /* We ignore the linker-set mach, and instead set it according to
4159 the first input file. This would also happen if we could
4160 somehow filter out the OUTPUT_ARCH () setting from elf.sc.
4161 This allows us to keep the same linker config across
4162 cris(v0..v10) and crisv32. The drawback is that we can't force
4163 the output type, which might be a sane thing to do for a
4164 v10+v32 compatibility object. */
4165 if (! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4166 return FALSE;
4da81684
HPN
4167 }
4168
bac23f82
HPN
4169 if (bfd_get_symbol_leading_char (ibfd)
4170 != bfd_get_symbol_leading_char (obfd))
4da81684
HPN
4171 {
4172 (*_bfd_error_handler)
bac23f82 4173 (bfd_get_symbol_leading_char (ibfd) == '_'
d003868e
AM
4174 ? _("%B: uses _-prefixed symbols, but writing file with non-prefixed symbols")
4175 : _("%B: uses non-prefixed symbols, but writing file with _-prefixed symbols"),
4176 ibfd);
4da81684 4177 bfd_set_error (bfd_error_bad_value);
b34976b6 4178 return FALSE;
4da81684
HPN
4179 }
4180
bac23f82
HPN
4181 omach = bfd_get_mach (obfd);
4182
4183 if (imach != omach)
4184 {
4185 /* We can get an incompatible combination only if either is
4186 bfd_mach_cris_v32, and the other one isn't compatible. */
4187 if ((imach == bfd_mach_cris_v32
4188 && omach != bfd_mach_cris_v10_v32)
4189 || (omach == bfd_mach_cris_v32
4190 && imach != bfd_mach_cris_v10_v32))
4191 {
4192 (*_bfd_error_handler)
4193 ((imach == bfd_mach_cris_v32)
4194 ? _("%B contains CRIS v32 code, incompatible"
4195 " with previous objects")
4196 : _("%B contains non-CRIS-v32 code, incompatible"
4197 " with previous objects"),
4198 ibfd);
4199 bfd_set_error (bfd_error_bad_value);
4200 return FALSE;
4201 }
4202
4203 /* We don't have to check the case where the input is compatible
4204 with v10 and v32, because the output is already known to be set
4205 to the other (compatible) mach. */
4206 if (omach == bfd_mach_cris_v10_v32
4207 && ! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4208 return FALSE;
4209 }
4210
b34976b6 4211 return TRUE;
4da81684 4212}
99e4ae17 4213
bac23f82
HPN
4214/* Do side-effects of e_flags copying to obfd. */
4215
4216static bfd_boolean
4217cris_elf_copy_private_bfd_data (ibfd, obfd)
4218 bfd *ibfd;
4219 bfd *obfd;
4220{
4221 /* Call the base function. */
4222 if (!_bfd_elf_copy_private_bfd_data (ibfd, obfd))
4223 return FALSE;
4224
4225 /* If output is big-endian for some obscure reason, stop here. */
4226 if (_bfd_generic_verify_endian_match (ibfd, obfd) == FALSE)
4227 return FALSE;
4228
4229 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4230 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4231 return TRUE;
4232
4233 /* Do what we really came here for. */
4234 return bfd_set_arch_mach (obfd, bfd_arch_cris, bfd_get_mach (ibfd));
4235}
99e4ae17
AJ
4236
4237static enum elf_reloc_type_class
f51e552e
AM
4238elf_cris_reloc_type_class (rela)
4239 const Elf_Internal_Rela *rela;
99e4ae17 4240{
100382c7
HPN
4241 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rela->r_info);
4242 switch (r_type)
99e4ae17
AJ
4243 {
4244 case R_CRIS_RELATIVE:
4245 return reloc_class_relative;
4246 case R_CRIS_JUMP_SLOT:
4247 return reloc_class_plt;
4248 case R_CRIS_COPY:
4249 return reloc_class_copy;
4250 default:
4251 return reloc_class_normal;
4252 }
4253}
100382c7
HPN
4254
4255/* The elf_backend_got_elt_size worker. For one symbol, we can have up to
4256 two GOT entries from three types with two different sizes. We handle
4257 it as a single entry, so we can use the regular offset-calculation
4258 machinery. */
4259
4260static bfd_vma
4261elf_cris_got_elt_size (bfd *abfd ATTRIBUTE_UNUSED,
4262 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4263 struct elf_link_hash_entry *hr,
4264 bfd *ibfd,
4265 unsigned long symndx)
4266{
4267 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) hr;
100382c7
HPN
4268 bfd_vma eltsiz = 0;
4269
4270 /* We may have one regular GOT entry or up to two TLS GOT
4271 entries. */
4272 if (h == NULL)
4273 {
b2e254f9 4274 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
100382c7
HPN
4275 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (ibfd);
4276
4277 BFD_ASSERT (local_got_refcounts != NULL);
4278
4279 if (local_got_refcounts[LGOT_REG_NDX (symndx)] > 0)
4280 {
4281 /* We can't have a variable referred to both as a regular
4282 variable and through TLS relocs. */
4283 BFD_ASSERT (local_got_refcounts[LGOT_DTP_NDX (symndx)] == 0
4284 && local_got_refcounts[LGOT_TPREL_NDX (symndx)] == 0);
4285 return 4;
4286 }
4287
4288 if (local_got_refcounts[LGOT_DTP_NDX (symndx)] > 0)
4289 eltsiz += 8;
4290
4291 if (local_got_refcounts[LGOT_TPREL_NDX (symndx)] > 0)
4292 eltsiz += 4;
4293 }
4294 else
4295 {
4296 struct elf_cris_link_hash_entry *hh = elf_cris_hash_entry (h);
4297 if (hh->reg_got_refcount > 0)
4298 {
4299 /* The actual error-on-input is emitted elsewhere. */
4300 BFD_ASSERT (hh->dtp_refcount == 0 && hh->tprel_refcount == 0);
4301 return 4;
4302 }
4303
4304 if (hh->dtp_refcount > 0)
4305 eltsiz += 8;
4306
4307 if (hh->tprel_refcount > 0)
4308 eltsiz += 4;
4309 }
4310
b2e254f9
HPN
4311 /* We're only called when h->got.refcount is non-zero, so we must
4312 have a non-zero size. */
4313 BFD_ASSERT (eltsiz != 0);
100382c7
HPN
4314 return eltsiz;
4315}
06c15ad7
HPN
4316\f
4317#define ELF_ARCH bfd_arch_cris
4318#define ELF_MACHINE_CODE EM_CRIS
4319#define ELF_MAXPAGESIZE 0x2000
4320
4321#define TARGET_LITTLE_SYM bfd_elf32_cris_vec
4322#define TARGET_LITTLE_NAME "elf32-cris"
4da81684 4323#define elf_symbol_leading_char 0
06c15ad7
HPN
4324
4325#define elf_info_to_howto_rel NULL
4326#define elf_info_to_howto cris_info_to_howto_rela
4327#define elf_backend_relocate_section cris_elf_relocate_section
4328#define elf_backend_gc_mark_hook cris_elf_gc_mark_hook
4329#define elf_backend_gc_sweep_hook cris_elf_gc_sweep_hook
5d5a918a 4330#define elf_backend_plt_sym_val cris_elf_plt_sym_val
06c15ad7 4331#define elf_backend_check_relocs cris_elf_check_relocs
72209a1f
HPN
4332#define elf_backend_grok_prstatus cris_elf_grok_prstatus
4333#define elf_backend_grok_psinfo cris_elf_grok_psinfo
06c15ad7
HPN
4334
4335#define elf_backend_can_gc_sections 1
51b64d56 4336#define elf_backend_can_refcount 1
06c15ad7 4337
4da81684
HPN
4338#define elf_backend_object_p cris_elf_object_p
4339#define elf_backend_final_write_processing \
4340 cris_elf_final_write_processing
4341#define bfd_elf32_bfd_print_private_bfd_data \
4342 cris_elf_print_private_bfd_data
4343#define bfd_elf32_bfd_merge_private_bfd_data \
4344 cris_elf_merge_private_bfd_data
bac23f82
HPN
4345#define bfd_elf32_bfd_copy_private_bfd_data \
4346 cris_elf_copy_private_bfd_data
4da81684 4347
06c15ad7 4348#define bfd_elf32_bfd_reloc_type_lookup cris_reloc_type_lookup
157090f7 4349#define bfd_elf32_bfd_reloc_name_lookup cris_reloc_name_lookup
06c15ad7 4350
915e5146
HPN
4351#define bfd_elf32_bfd_link_hash_table_create \
4352 elf_cris_link_hash_table_create
4353#define elf_backend_adjust_dynamic_symbol \
4354 elf_cris_adjust_dynamic_symbol
237bc7f0
HPN
4355#define elf_backend_copy_indirect_symbol \
4356 elf_cris_copy_indirect_symbol
915e5146
HPN
4357#define elf_backend_size_dynamic_sections \
4358 elf_cris_size_dynamic_sections
74541ad4 4359#define elf_backend_init_index_section _bfd_elf_init_1_index_section
915e5146
HPN
4360#define elf_backend_finish_dynamic_symbol \
4361 elf_cris_finish_dynamic_symbol
4362#define elf_backend_finish_dynamic_sections \
4363 elf_cris_finish_dynamic_sections
4364#define elf_backend_create_dynamic_sections \
4365 _bfd_elf_create_dynamic_sections
4366#define bfd_elf32_bfd_final_link \
c152c796 4367 bfd_elf_gc_common_final_link
915e5146 4368#define elf_backend_hide_symbol elf_cris_hide_symbol
99e4ae17 4369#define elf_backend_reloc_type_class elf_cris_reloc_type_class
915e5146
HPN
4370
4371#define elf_backend_want_got_plt 1
4372#define elf_backend_plt_readonly 1
4373#define elf_backend_want_plt_sym 0
4374#define elf_backend_got_header_size 12
100382c7 4375#define elf_backend_got_elt_size elf_cris_got_elt_size
915e5146 4376
06c15ad7
HPN
4377/* Later, we my want to optimize RELA entries into REL entries for dynamic
4378 linking and libraries (if it's a win of any significance). Until then,
4379 take the easy route. */
4380#define elf_backend_may_use_rel_p 0
4381#define elf_backend_may_use_rela_p 1
f0fe0e16 4382#define elf_backend_rela_normal 1
06c15ad7
HPN
4383
4384#include "elf32-target.h"
4da81684 4385
4da81684
HPN
4386#undef TARGET_LITTLE_SYM
4387#undef TARGET_LITTLE_NAME
4388#undef elf_symbol_leading_char
4389
4390#define TARGET_LITTLE_SYM bfd_elf32_us_cris_vec
4391#define TARGET_LITTLE_NAME "elf32-us-cris"
4392#define elf_symbol_leading_char '_'
16cecee5
L
4393#undef elf32_bed
4394#define elf32_bed elf32_us_cris_bed
4da81684
HPN
4395
4396#include "elf32-target.h"
This page took 0.701467 seconds and 4 git commands to generate.