PR ld/13311
[deliverable/binutils-gdb.git] / bfd / elf32-cris.c
CommitLineData
06c15ad7 1/* CRIS-specific support for 32-bit ELF.
4dfe6ac6 2 Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
7686d77d 3 2010, 2011 Free Software Foundation, Inc.
06c15ad7
HPN
4 Contributed by Axis Communications AB.
5 Written by Hans-Peter Nilsson, based on elf32-fr30.c
915e5146 6 PIC and shlib bits based primarily on elf32-m68k.c and elf32-i386.c.
06c15ad7 7
ae9a127f 8 This file is part of BFD, the Binary File Descriptor library.
06c15ad7 9
ae9a127f
NC
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
cd123cb7 12 the Free Software Foundation; either version 3 of the License, or
ae9a127f 13 (at your option) any later version.
06c15ad7 14
ae9a127f
NC
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
06c15ad7 19
ae9a127f
NC
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
cd123cb7
NC
22 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
23 MA 02110-1301, USA. */
06c15ad7 24
06c15ad7 25#include "sysdep.h"
3db64b00 26#include "bfd.h"
06c15ad7
HPN
27#include "libbfd.h"
28#include "elf-bfd.h"
29#include "elf/cris.h"
100382c7 30#include <limits.h>
06c15ad7
HPN
31
32/* Forward declarations. */
33static reloc_howto_type * cris_reloc_type_lookup
34 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
35
a7c10850 36static void cris_info_to_howto_rela
947216bf 37 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
06c15ad7 38
bac23f82
HPN
39static bfd_reloc_status_type cris_elf_pcrel_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
41
b34976b6 42static bfd_boolean cris_elf_grok_prstatus
72209a1f
HPN
43 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
44
b34976b6 45static bfd_boolean cris_elf_grok_psinfo
72209a1f
HPN
46 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
47
b34976b6 48static bfd_boolean cris_elf_relocate_section
06c15ad7
HPN
49 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
50 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
51
52static bfd_reloc_status_type cris_final_link_relocate
53 PARAMS ((reloc_howto_type *, bfd *, asection *, bfd_byte *,
54 Elf_Internal_Rela *, bfd_vma));
55
b34976b6 56static bfd_boolean cris_elf_object_p PARAMS ((bfd *));
4da81684 57
b34976b6 58static void cris_elf_final_write_processing PARAMS ((bfd *, bfd_boolean));
4da81684 59
bac23f82
HPN
60static bfd_boolean cris_elf_set_mach_from_flags
61 PARAMS ((bfd *, unsigned long int));
62
b34976b6 63static bfd_boolean cris_elf_print_private_bfd_data PARAMS ((bfd *, PTR));
4da81684 64
b34976b6 65static bfd_boolean cris_elf_merge_private_bfd_data PARAMS ((bfd *, bfd *));
bac23f82 66static bfd_boolean cris_elf_copy_private_bfd_data PARAMS ((bfd *, bfd *));
4da81684 67
915e5146 68struct elf_cris_link_hash_entry;
b34976b6 69static bfd_boolean elf_cris_discard_excess_dso_dynamics
4d96d128 70 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 71static bfd_boolean elf_cris_discard_excess_program_dynamics
915e5146 72 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 73static bfd_boolean elf_cris_adjust_gotplt_to_got
915e5146 74 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 75static bfd_boolean elf_cris_try_fold_plt_to_got
915e5146
HPN
76 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
77static struct bfd_hash_entry *elf_cris_link_hash_newfunc
78 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
79static struct bfd_link_hash_table *elf_cris_link_hash_table_create
80 PARAMS ((bfd *));
b34976b6 81static bfd_boolean elf_cris_adjust_dynamic_symbol
915e5146 82 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
b34976b6 83static bfd_boolean cris_elf_check_relocs
99c79b2e
AJ
84 PARAMS ((bfd *, struct bfd_link_info *, asection *,
85 const Elf_Internal_Rela *));
86
b34976b6 87static bfd_boolean elf_cris_size_dynamic_sections
915e5146 88 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 89static bfd_boolean elf_cris_finish_dynamic_symbol
915e5146
HPN
90 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
91 Elf_Internal_Sym *));
b34976b6 92static bfd_boolean elf_cris_finish_dynamic_sections
915e5146
HPN
93 PARAMS ((bfd *, struct bfd_link_info *));
94static void elf_cris_hide_symbol
b34976b6 95 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
99e4ae17 96static enum elf_reloc_type_class elf_cris_reloc_type_class
f51e552e 97 PARAMS ((const Elf_Internal_Rela *));
915e5146 98
06c15ad7
HPN
99static reloc_howto_type cris_elf_howto_table [] =
100{
101 /* This reloc does nothing. */
102 HOWTO (R_CRIS_NONE, /* type */
103 0, /* rightshift */
104 2, /* size (0 = byte, 1 = short, 2 = long) */
105 32, /* bitsize */
b34976b6 106 FALSE, /* pc_relative */
06c15ad7
HPN
107 0, /* bitpos */
108 complain_overflow_bitfield, /* complain_on_overflow */
109 bfd_elf_generic_reloc, /* special_function */
110 "R_CRIS_NONE", /* name */
b34976b6 111 FALSE, /* partial_inplace */
06c15ad7
HPN
112 0, /* src_mask */
113 0, /* dst_mask */
b34976b6 114 FALSE), /* pcrel_offset */
06c15ad7
HPN
115
116 /* An 8 bit absolute relocation. */
117 HOWTO (R_CRIS_8, /* type */
118 0, /* rightshift */
119 0, /* size (0 = byte, 1 = short, 2 = long) */
120 8, /* bitsize */
b34976b6 121 FALSE, /* pc_relative */
06c15ad7
HPN
122 0, /* bitpos */
123 complain_overflow_bitfield, /* complain_on_overflow */
124 bfd_elf_generic_reloc, /* special_function */
125 "R_CRIS_8", /* name */
b34976b6 126 FALSE, /* partial_inplace */
06c15ad7
HPN
127 0x0000, /* src_mask */
128 0x00ff, /* dst_mask */
b34976b6 129 FALSE), /* pcrel_offset */
06c15ad7
HPN
130
131 /* A 16 bit absolute relocation. */
132 HOWTO (R_CRIS_16, /* type */
133 0, /* rightshift */
134 1, /* size (0 = byte, 1 = short, 2 = long) */
135 16, /* bitsize */
b34976b6 136 FALSE, /* pc_relative */
06c15ad7
HPN
137 0, /* bitpos */
138 complain_overflow_bitfield, /* complain_on_overflow */
139 bfd_elf_generic_reloc, /* special_function */
140 "R_CRIS_16", /* name */
b34976b6 141 FALSE, /* partial_inplace */
06c15ad7
HPN
142 0x00000000, /* src_mask */
143 0x0000ffff, /* dst_mask */
b34976b6 144 FALSE), /* pcrel_offset */
06c15ad7
HPN
145
146 /* A 32 bit absolute relocation. */
147 HOWTO (R_CRIS_32, /* type */
148 0, /* rightshift */
149 2, /* size (0 = byte, 1 = short, 2 = long) */
150 32, /* bitsize */
b34976b6 151 FALSE, /* pc_relative */
06c15ad7 152 0, /* bitpos */
b2efcd36
HPN
153 /* We don't want overflow complaints for 64-bit vma builds
154 for e.g. sym+0x40000000 (or actually sym-0xc0000000 in
155 32-bit ELF) where sym=0xc0001234.
156 Don't do this for the PIC relocs, as we don't expect to
157 see them with large offsets. */
158 complain_overflow_dont, /* complain_on_overflow */
06c15ad7
HPN
159 bfd_elf_generic_reloc, /* special_function */
160 "R_CRIS_32", /* name */
b34976b6 161 FALSE, /* partial_inplace */
06c15ad7
HPN
162 0x00000000, /* src_mask */
163 0xffffffff, /* dst_mask */
b34976b6 164 FALSE), /* pcrel_offset */
06c15ad7 165
915e5146 166 /* An 8 bit PC-relative relocation. */
06c15ad7
HPN
167 HOWTO (R_CRIS_8_PCREL, /* type */
168 0, /* rightshift */
169 0, /* size (0 = byte, 1 = short, 2 = long) */
170 8, /* bitsize */
b34976b6 171 TRUE, /* pc_relative */
06c15ad7
HPN
172 0, /* bitpos */
173 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 174 cris_elf_pcrel_reloc, /* special_function */
06c15ad7 175 "R_CRIS_8_PCREL", /* name */
b34976b6 176 FALSE, /* partial_inplace */
06c15ad7
HPN
177 0x0000, /* src_mask */
178 0x00ff, /* dst_mask */
b34976b6 179 TRUE), /* pcrel_offset */
06c15ad7 180
915e5146 181 /* A 16 bit PC-relative relocation. */
06c15ad7
HPN
182 HOWTO (R_CRIS_16_PCREL, /* type */
183 0, /* rightshift */
184 1, /* size (0 = byte, 1 = short, 2 = long) */
185 16, /* bitsize */
b34976b6 186 TRUE, /* pc_relative */
06c15ad7
HPN
187 0, /* bitpos */
188 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 189 cris_elf_pcrel_reloc, /* special_function */
44aa49bb 190 "R_CRIS_16_PCREL", /* name */
b34976b6 191 FALSE, /* partial_inplace */
06c15ad7
HPN
192 0x00000000, /* src_mask */
193 0x0000ffff, /* dst_mask */
b34976b6 194 TRUE), /* pcrel_offset */
06c15ad7 195
915e5146 196 /* A 32 bit PC-relative relocation. */
06c15ad7
HPN
197 HOWTO (R_CRIS_32_PCREL, /* type */
198 0, /* rightshift */
199 2, /* size (0 = byte, 1 = short, 2 = long) */
200 32, /* bitsize */
b34976b6 201 TRUE, /* pc_relative */
06c15ad7
HPN
202 0, /* bitpos */
203 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 204 cris_elf_pcrel_reloc, /* special_function */
44aa49bb 205 "R_CRIS_32_PCREL", /* name */
b34976b6 206 FALSE, /* partial_inplace */
06c15ad7
HPN
207 0x00000000, /* src_mask */
208 0xffffffff, /* dst_mask */
b34976b6 209 TRUE), /* pcrel_offset */
06c15ad7 210
915e5146
HPN
211 /* GNU extension to record C++ vtable hierarchy. */
212 HOWTO (R_CRIS_GNU_VTINHERIT, /* type */
06c15ad7
HPN
213 0, /* rightshift */
214 2, /* size (0 = byte, 1 = short, 2 = long) */
215 0, /* bitsize */
b34976b6 216 FALSE, /* pc_relative */
06c15ad7
HPN
217 0, /* bitpos */
218 complain_overflow_dont, /* complain_on_overflow */
219 NULL, /* special_function */
220 "R_CRIS_GNU_VTINHERIT", /* name */
b34976b6 221 FALSE, /* partial_inplace */
06c15ad7
HPN
222 0, /* src_mask */
223 0, /* dst_mask */
b34976b6 224 FALSE), /* pcrel_offset */
06c15ad7 225
915e5146
HPN
226 /* GNU extension to record C++ vtable member usage. */
227 HOWTO (R_CRIS_GNU_VTENTRY, /* type */
06c15ad7
HPN
228 0, /* rightshift */
229 2, /* size (0 = byte, 1 = short, 2 = long) */
230 0, /* bitsize */
b34976b6 231 FALSE, /* pc_relative */
06c15ad7
HPN
232 0, /* bitpos */
233 complain_overflow_dont, /* complain_on_overflow */
234 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
235 "R_CRIS_GNU_VTENTRY", /* name */
b34976b6 236 FALSE, /* partial_inplace */
06c15ad7
HPN
237 0, /* src_mask */
238 0, /* dst_mask */
b34976b6 239 FALSE), /* pcrel_offset */
915e5146
HPN
240
241 /* This is used only by the dynamic linker. The symbol should exist
242 both in the object being run and in some shared library. The
243 dynamic linker copies the data addressed by the symbol from the
244 shared library into the object, because the object being
245 run has to have the data at some particular address. */
246 HOWTO (R_CRIS_COPY, /* type */
247 0, /* rightshift */
248 2, /* size (0 = byte, 1 = short, 2 = long) */
249 32, /* bitsize */
b34976b6 250 FALSE, /* pc_relative */
915e5146
HPN
251 0, /* bitpos */
252 complain_overflow_bitfield, /* complain_on_overflow */
253 bfd_elf_generic_reloc, /* special_function */
254 "R_CRIS_COPY", /* name */
b34976b6 255 FALSE, /* partial_inplace */
915e5146
HPN
256 0, /* src_mask */
257 0, /* dst_mask */
b34976b6 258 FALSE), /* pcrel_offset */
915e5146
HPN
259
260 /* Like R_CRIS_32, but used when setting global offset table entries. */
261 HOWTO (R_CRIS_GLOB_DAT, /* type */
262 0, /* rightshift */
263 2, /* size (0 = byte, 1 = short, 2 = long) */
264 32, /* bitsize */
b34976b6 265 FALSE, /* pc_relative */
915e5146
HPN
266 0, /* bitpos */
267 complain_overflow_bitfield, /* complain_on_overflow */
268 bfd_elf_generic_reloc, /* special_function */
269 "R_CRIS_GLOB_DAT", /* name */
b34976b6 270 FALSE, /* partial_inplace */
915e5146
HPN
271 0, /* src_mask */
272 0xffffffff, /* dst_mask */
b34976b6 273 FALSE), /* pcrel_offset */
915e5146
HPN
274
275 /* Marks a procedure linkage table entry for a symbol. */
276 HOWTO (R_CRIS_JUMP_SLOT, /* type */
277 0, /* rightshift */
278 2, /* size (0 = byte, 1 = short, 2 = long) */
279 32, /* bitsize */
b34976b6 280 FALSE, /* pc_relative */
915e5146
HPN
281 0, /* bitpos */
282 complain_overflow_bitfield, /* complain_on_overflow */
283 bfd_elf_generic_reloc, /* special_function */
284 "R_CRIS_JUMP_SLOT", /* name */
b34976b6 285 FALSE, /* partial_inplace */
915e5146
HPN
286 0, /* src_mask */
287 0, /* dst_mask */
b34976b6 288 FALSE), /* pcrel_offset */
915e5146
HPN
289
290 /* Used only by the dynamic linker. When the object is run, this
291 longword is set to the load address of the object, plus the
292 addend. */
293 HOWTO (R_CRIS_RELATIVE, /* type */
294 0, /* rightshift */
295 2, /* size (0 = byte, 1 = short, 2 = long) */
296 32, /* bitsize */
b34976b6 297 FALSE, /* pc_relative */
915e5146
HPN
298 0, /* bitpos */
299 complain_overflow_bitfield, /* complain_on_overflow */
300 bfd_elf_generic_reloc, /* special_function */
301 "R_CRIS_RELATIVE", /* name */
b34976b6 302 FALSE, /* partial_inplace */
915e5146
HPN
303 0, /* src_mask */
304 0xffffffff, /* dst_mask */
b34976b6 305 FALSE), /* pcrel_offset */
915e5146
HPN
306
307 /* Like R_CRIS_32, but referring to the GOT table entry for the symbol. */
308 HOWTO (R_CRIS_16_GOT, /* type */
309 0, /* rightshift */
310 1, /* size (0 = byte, 1 = short, 2 = long) */
311 16, /* bitsize */
b34976b6 312 FALSE, /* pc_relative */
915e5146
HPN
313 0, /* bitpos */
314 complain_overflow_bitfield, /* complain_on_overflow */
315 bfd_elf_generic_reloc, /* special_function */
316 "R_CRIS_16_GOT", /* name */
b34976b6 317 FALSE, /* partial_inplace */
915e5146
HPN
318 0, /* src_mask */
319 0xffff, /* dst_mask */
b34976b6 320 FALSE), /* pcrel_offset */
915e5146
HPN
321
322 HOWTO (R_CRIS_32_GOT, /* type */
323 0, /* rightshift */
324 2, /* size (0 = byte, 1 = short, 2 = long) */
325 32, /* bitsize */
b34976b6 326 FALSE, /* pc_relative */
915e5146
HPN
327 0, /* bitpos */
328 complain_overflow_bitfield, /* complain_on_overflow */
329 bfd_elf_generic_reloc, /* special_function */
330 "R_CRIS_32_GOT", /* name */
b34976b6 331 FALSE, /* partial_inplace */
915e5146
HPN
332 0, /* src_mask */
333 0xffffffff, /* dst_mask */
b34976b6 334 FALSE), /* pcrel_offset */
915e5146
HPN
335
336 /* Like R_CRIS_32_GOT, but referring to (and requesting a) PLT part of
337 the GOT table for the symbol. */
338 HOWTO (R_CRIS_16_GOTPLT, /* type */
339 0, /* rightshift */
340 1, /* size (0 = byte, 1 = short, 2 = long) */
341 16, /* bitsize */
b34976b6 342 FALSE, /* pc_relative */
915e5146
HPN
343 0, /* bitpos */
344 complain_overflow_bitfield, /* complain_on_overflow */
345 bfd_elf_generic_reloc, /* special_function */
346 "R_CRIS_16_GOTPLT", /* name */
b34976b6 347 FALSE, /* partial_inplace */
915e5146
HPN
348 0, /* src_mask */
349 0xffff, /* dst_mask */
b34976b6 350 FALSE), /* pcrel_offset */
915e5146
HPN
351
352 HOWTO (R_CRIS_32_GOTPLT, /* type */
353 0, /* rightshift */
354 2, /* size (0 = byte, 1 = short, 2 = long) */
355 32, /* bitsize */
b34976b6 356 FALSE, /* pc_relative */
915e5146
HPN
357 0, /* bitpos */
358 complain_overflow_bitfield, /* complain_on_overflow */
359 bfd_elf_generic_reloc, /* special_function */
360 "R_CRIS_32_GOTPLT", /* name */
b34976b6 361 FALSE, /* partial_inplace */
915e5146
HPN
362 0, /* src_mask */
363 0xffffffff, /* dst_mask */
b34976b6 364 FALSE), /* pcrel_offset */
915e5146
HPN
365
366 /* A 32-bit offset from GOT to (local const) symbol: no GOT entry should
367 be necessary. */
368 HOWTO (R_CRIS_32_GOTREL, /* type */
369 0, /* rightshift */
370 2, /* size (0 = byte, 1 = short, 2 = long) */
371 32, /* bitsize */
b34976b6 372 FALSE, /* pc_relative */
915e5146
HPN
373 0, /* bitpos */
374 complain_overflow_bitfield, /* complain_on_overflow */
375 bfd_elf_generic_reloc, /* special_function */
376 "R_CRIS_32_GOTREL", /* name */
b34976b6 377 FALSE, /* partial_inplace */
915e5146
HPN
378 0, /* src_mask */
379 0xffffffff, /* dst_mask */
b34976b6 380 FALSE), /* pcrel_offset */
915e5146
HPN
381
382 /* A 32-bit offset from GOT to entry for this symbol in PLT and request
383 to create PLT entry for symbol. */
384 HOWTO (R_CRIS_32_PLT_GOTREL, /* type */
385 0, /* rightshift */
386 2, /* size (0 = byte, 1 = short, 2 = long) */
387 32, /* bitsize */
b34976b6 388 FALSE, /* pc_relative */
915e5146
HPN
389 0, /* bitpos */
390 complain_overflow_bitfield, /* complain_on_overflow */
391 bfd_elf_generic_reloc, /* special_function */
392 "R_CRIS_32_PLT_GOTREL", /* name */
b34976b6 393 FALSE, /* partial_inplace */
915e5146
HPN
394 0, /* src_mask */
395 0xffffffff, /* dst_mask */
b34976b6 396 FALSE), /* pcrel_offset */
915e5146
HPN
397
398 /* A 32-bit offset from PC (location after the relocation) + addend to
399 entry for this symbol in PLT and request to create PLT entry for
400 symbol. */
401 HOWTO (R_CRIS_32_PLT_PCREL, /* type */
402 0, /* rightshift */
403 2, /* size (0 = byte, 1 = short, 2 = long) */
404 32, /* bitsize */
b34976b6 405 TRUE, /* pc_relative */
915e5146
HPN
406 0, /* bitpos */
407 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 408 cris_elf_pcrel_reloc, /* special_function */
915e5146 409 "R_CRIS_32_PLT_PCREL", /* name */
b34976b6 410 FALSE, /* partial_inplace */
915e5146
HPN
411 0, /* src_mask */
412 0xffffffff, /* dst_mask */
3926fc54
HPN
413 TRUE), /* pcrel_offset */
414
415 /* We don't handle these in any special manner and cross-format
416 linking is not supported; just recognize them enough to pass them
417 around. FIXME: do the same for most PIC relocs and add sanity
418 tests to actually refuse gracefully to handle these and PIC
419 relocs for cross-format linking. */
420#define TLSHOWTO32(name) \
421 HOWTO (name, 0, 2, 32, FALSE, 0, complain_overflow_bitfield, \
422 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffffffff, FALSE)
100382c7
HPN
423#define TLSHOWTO16X(name, X) \
424 HOWTO (name, 0, 1, 16, FALSE, 0, complain_overflow_ ## X, \
3926fc54 425 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffff, FALSE)
100382c7
HPN
426#define TLSHOWTO16(name) TLSHOWTO16X(name, unsigned)
427#define TLSHOWTO16S(name) TLSHOWTO16X(name, signed)
3926fc54
HPN
428
429 TLSHOWTO32 (R_CRIS_32_GOT_GD),
430 TLSHOWTO16 (R_CRIS_16_GOT_GD),
431 TLSHOWTO32 (R_CRIS_32_GD),
432 TLSHOWTO32 (R_CRIS_DTP),
433 TLSHOWTO32 (R_CRIS_32_DTPREL),
100382c7 434 TLSHOWTO16S (R_CRIS_16_DTPREL),
3926fc54 435 TLSHOWTO32 (R_CRIS_32_GOT_TPREL),
100382c7 436 TLSHOWTO16S (R_CRIS_16_GOT_TPREL),
3926fc54 437 TLSHOWTO32 (R_CRIS_32_TPREL),
100382c7 438 TLSHOWTO16S (R_CRIS_16_TPREL),
75f500d7
HPN
439 TLSHOWTO32 (R_CRIS_DTPMOD),
440 TLSHOWTO32 (R_CRIS_32_IE)
06c15ad7
HPN
441};
442\f
443/* Map BFD reloc types to CRIS ELF reloc types. */
444
445struct cris_reloc_map
446{
447 bfd_reloc_code_real_type bfd_reloc_val;
448 unsigned int cris_reloc_val;
449};
450
451static const struct cris_reloc_map cris_reloc_map [] =
452{
453 { BFD_RELOC_NONE, R_CRIS_NONE },
454 { BFD_RELOC_8, R_CRIS_8 },
455 { BFD_RELOC_16, R_CRIS_16 },
456 { BFD_RELOC_32, R_CRIS_32 },
457 { BFD_RELOC_8_PCREL, R_CRIS_8_PCREL },
458 { BFD_RELOC_16_PCREL, R_CRIS_16_PCREL },
459 { BFD_RELOC_32_PCREL, R_CRIS_32_PCREL },
460 { BFD_RELOC_VTABLE_INHERIT, R_CRIS_GNU_VTINHERIT },
915e5146
HPN
461 { BFD_RELOC_VTABLE_ENTRY, R_CRIS_GNU_VTENTRY },
462 { BFD_RELOC_CRIS_COPY, R_CRIS_COPY },
463 { BFD_RELOC_CRIS_GLOB_DAT, R_CRIS_GLOB_DAT },
464 { BFD_RELOC_CRIS_JUMP_SLOT, R_CRIS_JUMP_SLOT },
465 { BFD_RELOC_CRIS_RELATIVE, R_CRIS_RELATIVE },
466 { BFD_RELOC_CRIS_16_GOT, R_CRIS_16_GOT },
467 { BFD_RELOC_CRIS_32_GOT, R_CRIS_32_GOT },
468 { BFD_RELOC_CRIS_16_GOTPLT, R_CRIS_16_GOTPLT },
469 { BFD_RELOC_CRIS_32_GOTPLT, R_CRIS_32_GOTPLT },
470 { BFD_RELOC_CRIS_32_GOTREL, R_CRIS_32_GOTREL },
471 { BFD_RELOC_CRIS_32_PLT_GOTREL, R_CRIS_32_PLT_GOTREL },
3926fc54
HPN
472 { BFD_RELOC_CRIS_32_PLT_PCREL, R_CRIS_32_PLT_PCREL },
473 { BFD_RELOC_CRIS_32_GOT_GD, R_CRIS_32_GOT_GD },
474 { BFD_RELOC_CRIS_16_GOT_GD, R_CRIS_16_GOT_GD },
475 { BFD_RELOC_CRIS_32_GD, R_CRIS_32_GD },
476 { BFD_RELOC_CRIS_DTP, R_CRIS_DTP },
477 { BFD_RELOC_CRIS_32_DTPREL, R_CRIS_32_DTPREL },
478 { BFD_RELOC_CRIS_16_DTPREL, R_CRIS_16_DTPREL },
479 { BFD_RELOC_CRIS_32_GOT_TPREL, R_CRIS_32_GOT_TPREL },
480 { BFD_RELOC_CRIS_16_GOT_TPREL, R_CRIS_16_GOT_TPREL },
481 { BFD_RELOC_CRIS_32_TPREL, R_CRIS_32_TPREL },
482 { BFD_RELOC_CRIS_16_TPREL, R_CRIS_16_TPREL },
75f500d7
HPN
483 { BFD_RELOC_CRIS_DTPMOD, R_CRIS_DTPMOD },
484 { BFD_RELOC_CRIS_32_IE, R_CRIS_32_IE }
06c15ad7
HPN
485};
486
487static reloc_howto_type *
488cris_reloc_type_lookup (abfd, code)
489 bfd * abfd ATTRIBUTE_UNUSED;
490 bfd_reloc_code_real_type code;
491{
908d94bf 492 unsigned int i;
06c15ad7 493
908d94bf 494 for (i = 0; i < sizeof (cris_reloc_map) / sizeof (cris_reloc_map[0]); i++)
06c15ad7
HPN
495 if (cris_reloc_map [i].bfd_reloc_val == code)
496 return & cris_elf_howto_table [cris_reloc_map[i].cris_reloc_val];
a7c10850 497
06c15ad7
HPN
498 return NULL;
499}
500
157090f7
AM
501static reloc_howto_type *
502cris_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, const char *r_name)
503{
504 unsigned int i;
505
506 for (i = 0;
507 i < sizeof (cris_elf_howto_table) / sizeof (cris_elf_howto_table[0]);
508 i++)
509 if (cris_elf_howto_table[i].name != NULL
510 && strcasecmp (cris_elf_howto_table[i].name, r_name) == 0)
511 return &cris_elf_howto_table[i];
512
513 return NULL;
514}
515
06c15ad7
HPN
516/* Set the howto pointer for an CRIS ELF reloc. */
517
518static void
519cris_info_to_howto_rela (abfd, cache_ptr, dst)
520 bfd * abfd ATTRIBUTE_UNUSED;
521 arelent * cache_ptr;
947216bf 522 Elf_Internal_Rela * dst;
06c15ad7 523{
100382c7 524 enum elf_cris_reloc_type r_type;
06c15ad7
HPN
525
526 r_type = ELF32_R_TYPE (dst->r_info);
527 BFD_ASSERT (r_type < (unsigned int) R_CRIS_max);
528 cache_ptr->howto = & cris_elf_howto_table [r_type];
529}
bac23f82
HPN
530
531bfd_reloc_status_type
532cris_elf_pcrel_reloc (abfd, reloc_entry, symbol, data, input_section,
533 output_bfd, error_message)
534 bfd *abfd ATTRIBUTE_UNUSED;
535 arelent *reloc_entry;
536 asymbol *symbol;
537 PTR data ATTRIBUTE_UNUSED;
538 asection *input_section;
539 bfd *output_bfd;
540 char **error_message ATTRIBUTE_UNUSED;
541{
542 /* By default (using only bfd_elf_generic_reloc when linking to
543 non-ELF formats) PC-relative relocs are relative to the beginning
544 of the reloc. CRIS PC-relative relocs are relative to the position
545 *after* the reloc because that's what pre-CRISv32 PC points to
546 after reading an insn field with that reloc. (For CRISv32, PC is
547 actually relative to the start of the insn, but we keep the old
548 definition.) Still, we use as much generic machinery as we can.
549
550 Only adjust when doing a final link. */
551 if (output_bfd == (bfd *) NULL)
552 reloc_entry->addend -= 1 << reloc_entry->howto->size;
553
554 return
555 bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
556 input_section, output_bfd, error_message);
557}
06c15ad7 558\f
bac23f82
HPN
559/* Support for core dump NOTE sections.
560 The slightly unintuitive code layout is an attempt to keep at least
561 some similarities with other ports, hoping to simplify general
562 changes, while still keeping Linux/CRIS and Linux/CRISv32 code apart. */
72209a1f 563
b34976b6 564static bfd_boolean
72209a1f
HPN
565cris_elf_grok_prstatus (abfd, note)
566 bfd *abfd;
567 Elf_Internal_Note *note;
568{
569 int offset;
eea6121a 570 size_t size;
72209a1f 571
bac23f82
HPN
572 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
573 switch (note->descsz)
574 {
575 default:
576 return FALSE;
577
578 case 202: /* Linux/CRISv32 */
579 /* pr_cursig */
580 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
581
582 /* pr_pid */
261b8d08 583 elf_tdata (abfd)->core_lwpid = bfd_get_32 (abfd, note->descdata + 22);
bac23f82
HPN
584
585 /* pr_reg */
586 offset = 70;
587 size = 128;
588
589 break;
590 }
591 else
592 switch (note->descsz)
593 {
72209a1f 594 default:
b34976b6 595 return FALSE;
72209a1f 596
bc0d28ee 597 case 214: /* Linux/CRIS */
72209a1f
HPN
598 /* pr_cursig */
599 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
600
601 /* pr_pid */
261b8d08 602 elf_tdata (abfd)->core_lwpid = bfd_get_32 (abfd, note->descdata + 22);
72209a1f
HPN
603
604 /* pr_reg */
605 offset = 70;
eea6121a 606 size = 140;
72209a1f
HPN
607
608 break;
bac23f82 609 }
72209a1f
HPN
610
611 /* Make a ".reg/999" section. */
612 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 613 size, note->descpos + offset);
72209a1f
HPN
614}
615
b34976b6 616static bfd_boolean
72209a1f
HPN
617cris_elf_grok_psinfo (abfd, note)
618 bfd *abfd;
619 Elf_Internal_Note *note;
620{
bac23f82
HPN
621 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
622 switch (note->descsz)
623 {
624 default:
625 return FALSE;
626
627 case 124: /* Linux/CRISv32 elf_prpsinfo */
628 elf_tdata (abfd)->core_program
629 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
630 elf_tdata (abfd)->core_command
631 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
632 }
633 else
634 switch (note->descsz)
635 {
72209a1f 636 default:
b34976b6 637 return FALSE;
72209a1f
HPN
638
639 case 124: /* Linux/CRIS elf_prpsinfo */
640 elf_tdata (abfd)->core_program
bac23f82 641 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
72209a1f 642 elf_tdata (abfd)->core_command
bac23f82
HPN
643 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
644 }
72209a1f
HPN
645
646 /* Note that for some reason, a spurious space is tacked
647 onto the end of the args in some (at least one anyway)
648 implementations, so strip it off if it exists. */
649
650 {
651 char *command = elf_tdata (abfd)->core_command;
652 int n = strlen (command);
653
654 if (0 < n && command[n - 1] == ' ')
655 command[n - 1] = '\0';
656 }
657
b34976b6 658 return TRUE;
72209a1f
HPN
659}
660\f
915e5146
HPN
661/* The name of the dynamic interpreter. This is put in the .interp
662 section. */
663
664#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
665
666/* The size in bytes of an entry in the procedure linkage table. */
667
668#define PLT_ENTRY_SIZE 20
bac23f82 669#define PLT_ENTRY_SIZE_V32 26
915e5146
HPN
670
671/* The first entry in an absolute procedure linkage table looks like this. */
672
673static const bfd_byte elf_cris_plt0_entry[PLT_ENTRY_SIZE] =
674{
675 0xfc, 0xe1,
cedb70c5 676 0x7e, 0x7e, /* push mof. */
915e5146
HPN
677 0x7f, 0x0d, /* (dip [pc+]) */
678 0, 0, 0, 0, /* Replaced with address of .got + 4. */
679 0x30, 0x7a, /* move [...],mof */
680 0x7f, 0x0d, /* (dip [pc+]) */
681 0, 0, 0, 0, /* Replaced with address of .got + 8. */
bac23f82
HPN
682 0x30, 0x09 /* jump [...] */
683};
684
685static const bfd_byte elf_cris_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
686{
687 0x84, 0xe2, /* subq 4,$sp */
688 0x6f, 0xfe, /* move.d 0,$acr */
689 0, 0, 0, 0, /* Replaced by address of .got + 4. */
690 0x7e, 0x7a, /* move $mof,[$sp] */
691 0x3f, 0x7a, /* move [$acr],$mof */
692 0x04, 0xf2, /* addq 4,acr */
693 0x6f, 0xfa, /* move.d [$acr],$acr */
694 0xbf, 0x09, /* jump $acr */
695 0xb0, 0x05, /* nop */
696 0, 0 /* Pad out to 26 bytes. */
915e5146
HPN
697};
698
699/* Subsequent entries in an absolute procedure linkage table look like
700 this. */
701
702static const bfd_byte elf_cris_plt_entry[PLT_ENTRY_SIZE] =
703{
704 0x7f, 0x0d, /* (dip [pc+]) */
705 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
706 0x30, 0x09, /* jump [...] */
707 0x3f, 0x7e, /* move [pc+],mof */
708 0, 0, 0, 0, /* Replaced with offset into relocation table. */
709 0x2f, 0xfe, /* add.d [pc+],pc */
710 0xec, 0xff,
711 0xff, 0xff /* Replaced with offset to start of .plt. */
712};
713
bac23f82
HPN
714static const bfd_byte elf_cris_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
715{
716 0x6f, 0xfe, /* move.d 0,$acr */
717 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
718 0x6f, 0xfa, /* move.d [$acr],$acr */
719 0xbf, 0x09, /* jump $acr */
720 0xb0, 0x05, /* nop */
721 0x3f, 0x7e, /* move 0,mof */
722 0, 0, 0, 0, /* Replaced with offset into relocation table. */
723 0xbf, 0x0e, /* ba start_of_plt0_entry */
724 0, 0, 0, 0, /* Replaced with offset to plt0 entry. */
725 0xb0, 0x05 /* nop */
726};
727
915e5146
HPN
728/* The first entry in a PIC procedure linkage table looks like this. */
729
730static const bfd_byte elf_cris_pic_plt0_entry[PLT_ENTRY_SIZE] =
731{
732 0xfc, 0xe1, 0x7e, 0x7e, /* push mof */
733 0x04, 0x01, 0x30, 0x7a, /* move [r0+4],mof */
734 0x08, 0x01, 0x30, 0x09, /* jump [r0+8] */
735 0, 0, 0, 0, 0, 0, 0, 0, /* Pad out to 20 bytes. */
736};
737
bac23f82
HPN
738static const bfd_byte elf_cris_pic_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
739{
740 0x84, 0xe2, /* subq 4,$sp */
741 0x04, 0x01, /* addoq 4,$r0,$acr */
742 0x7e, 0x7a, /* move $mof,[$sp] */
743 0x3f, 0x7a, /* move [$acr],$mof */
744 0x04, 0xf2, /* addq 4,$acr */
745 0x6f, 0xfa, /* move.d [$acr],$acr */
746 0xbf, 0x09, /* jump $acr */
747 0xb0, 0x05, /* nop */
748 0, 0, /* Pad out to 26 bytes. */
749 0, 0, 0, 0,
750 0, 0, 0, 0
751};
752
915e5146
HPN
753/* Subsequent entries in a PIC procedure linkage table look like this. */
754
755static const bfd_byte elf_cris_pic_plt_entry[PLT_ENTRY_SIZE] =
756{
757 0x6f, 0x0d, /* (bdap [pc+].d,r0) */
758 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
759 0x30, 0x09, /* jump [...] */
760 0x3f, 0x7e, /* move [pc+],mof */
761 0, 0, 0, 0, /* Replaced with offset into relocation table. */
762 0x2f, 0xfe, /* add.d [pc+],pc */
763 0xec, 0xff, /* Replaced with offset to start of .plt. */
764 0xff, 0xff
765};
bac23f82
HPN
766
767static const bfd_byte elf_cris_pic_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
768{
769 0x6f, 0x0d, /* addo.d 0,$r0,$acr */
770 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
771 0x6f, 0xfa, /* move.d [$acr],$acr */
772 0xbf, 0x09, /* jump $acr */
773 0xb0, 0x05, /* nop */
774 0x3f, 0x7e, /* move relocoffs,$mof */
775 0, 0, 0, 0, /* Replaced with offset into relocation table. */
776 0xbf, 0x0e, /* ba start_of_plt */
777 0, 0, 0, 0, /* Replaced with offset to start of .plt. */
778 0xb0, 0x05 /* nop */
779};
915e5146
HPN
780\f
781/* We copy elf32-m68k.c and elf32-i386.c for the basic linker hash bits
782 (and most other PIC/shlib stuff). Check that we don't drift away
783 without reason.
784
785 The CRIS linker, like the m68k and i386 linkers (and probably the rest
786 too) needs to keep track of the number of relocs that it decides to
787 copy in check_relocs for each symbol. This is so that it can discard
788 PC relative relocs if it doesn't need them when linking with
789 -Bsymbolic. We store the information in a field extending the regular
790 ELF linker hash table. */
791
792/* This structure keeps track of the number of PC relative relocs we have
793 copied for a given symbol. */
794
795struct elf_cris_pcrel_relocs_copied
796{
797 /* Next section. */
798 struct elf_cris_pcrel_relocs_copied *next;
0d08de41 799
915e5146
HPN
800 /* A section in dynobj. */
801 asection *section;
0d08de41 802
915e5146
HPN
803 /* Number of relocs copied in this section. */
804 bfd_size_type count;
0d08de41
HPN
805
806 /* Example of reloc being copied, for message. */
807 enum elf_cris_reloc_type r_type;
915e5146
HPN
808};
809
810/* CRIS ELF linker hash entry. */
811
812struct elf_cris_link_hash_entry
813{
814 struct elf_link_hash_entry root;
815
816 /* Number of PC relative relocs copied for this symbol. */
817 struct elf_cris_pcrel_relocs_copied *pcrel_relocs_copied;
818
819 /* The GOTPLT references are CRIS-specific; the goal is to avoid having
820 both a general GOT and a PLT-specific GOT entry for the same symbol,
821 when it is referenced both as a function and as a function pointer.
822
823 Number of GOTPLT references for a function. */
824 bfd_signed_vma gotplt_refcount;
825
826 /* Actual GOTPLT index for this symbol, if applicable, or zero if not
827 (zero is never used as an index). FIXME: We should be able to fold
828 this with gotplt_refcount in a union, like the got and plt unions in
829 elf_link_hash_entry. */
830 bfd_size_type gotplt_offset;
100382c7
HPN
831
832 /* The root.got.refcount is the sum of the regular reference counts
833 (this) and those members below. We have to keep a separate count
834 to track when we've found the first (or last) reference to a
835 regular got entry. The offset is in root.got.offset. */
836 bfd_signed_vma reg_got_refcount;
837
838 /* Similar to the above, the number of reloc references to this
839 symbols that need a R_CRIS_32_TPREL slot. The offset is in
840 root.got.offset, because this and .dtp_refcount can't validly
841 happen when there's also a regular GOT entry; that's invalid
842 input for which an error is emitted. */
843 bfd_signed_vma tprel_refcount;
844
845 /* Similar to the above, the number of reloc references to this
846 symbols that need a R_CRIS_DTP slot. The offset is in
847 root.got.offset; plus 4 if .tprel_refcount > 0. */
848 bfd_signed_vma dtp_refcount;
915e5146
HPN
849};
850
100382c7
HPN
851/* The local_got_refcounts and local_got_offsets are a multiple of
852 LSNUM in size, namely LGOT_ALLOC_NELTS_FOR(LSNUM) (plus one for the
853 refcount for GOT itself, see code), with the summary / group offset
854 for local symbols located at offset N, reference counts for
855 ordinary (address) relocs at offset N + LSNUM, for R_CRIS_DTP
856 relocs at offset N + 2*LSNUM, and for R_CRIS_32_TPREL relocs at N +
857 3*LSNUM. */
858
859#define LGOT_REG_NDX(x) ((x) + symtab_hdr->sh_info)
860#define LGOT_DTP_NDX(x) ((x) + 2 * symtab_hdr->sh_info)
861#define LGOT_TPREL_NDX(x) ((x) + 3 * symtab_hdr->sh_info)
862#define LGOT_ALLOC_NELTS_FOR(x) ((x) * 4)
863
915e5146
HPN
864/* CRIS ELF linker hash table. */
865
866struct elf_cris_link_hash_table
867{
868 struct elf_link_hash_table root;
869
870 /* We can't use the PLT offset and calculate to get the GOTPLT offset,
871 since we try and avoid creating GOTPLT:s when there's already a GOT.
872 Instead, we keep and update the next available index here. */
873 bfd_size_type next_gotplt_entry;
100382c7
HPN
874
875 /* The number of R_CRIS_32_DTPREL and R_CRIS_16_DTPREL that have
876 been seen for any input; if != 0, then the constant-offset
877 R_CRIS_DTPMOD is needed for this DSO/executable. This turns
878 negative at relocation, so that we don't need an extra flag for
879 when the reloc is output. */
880 bfd_signed_vma dtpmod_refcount;
915e5146
HPN
881};
882
883/* Traverse a CRIS ELF linker hash table. */
884
885#define elf_cris_link_hash_traverse(table, func, info) \
886 (elf_link_hash_traverse \
887 (&(table)->root, \
4dfe6ac6 888 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
915e5146
HPN
889 (info)))
890
891/* Get the CRIS ELF linker hash table from a link_info structure. */
892
893#define elf_cris_hash_table(p) \
4dfe6ac6
NC
894 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
895 == CRIS_ELF_DATA ? ((struct elf_cris_link_hash_table *) ((p)->hash)) : NULL)
915e5146 896
100382c7
HPN
897/* Get the CRIS ELF linker hash entry from a regular hash entry (the
898 "parent class"). The .root reference is just a simple type
899 check on the argument. */
900
901#define elf_cris_hash_entry(p) \
902 ((struct elf_cris_link_hash_entry *) (&(p)->root))
903
915e5146
HPN
904/* Create an entry in a CRIS ELF linker hash table. */
905
906static struct bfd_hash_entry *
4dfe6ac6
NC
907elf_cris_link_hash_newfunc (struct bfd_hash_entry *entry,
908 struct bfd_hash_table *table,
909 const char *string)
915e5146
HPN
910{
911 struct elf_cris_link_hash_entry *ret =
912 (struct elf_cris_link_hash_entry *) entry;
913
914 /* Allocate the structure if it has not already been allocated by a
915 subclass. */
916 if (ret == (struct elf_cris_link_hash_entry *) NULL)
917 ret = ((struct elf_cris_link_hash_entry *)
918 bfd_hash_allocate (table,
919 sizeof (struct elf_cris_link_hash_entry)));
920 if (ret == (struct elf_cris_link_hash_entry *) NULL)
921 return (struct bfd_hash_entry *) ret;
922
923 /* Call the allocation method of the superclass. */
924 ret = ((struct elf_cris_link_hash_entry *)
925 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
926 table, string));
927 if (ret != (struct elf_cris_link_hash_entry *) NULL)
928 {
929 ret->pcrel_relocs_copied = NULL;
930 ret->gotplt_refcount = 0;
931 ret->gotplt_offset = 0;
100382c7
HPN
932 ret->dtp_refcount = 0;
933 ret->tprel_refcount = 0;
934 ret->reg_got_refcount = 0;
915e5146
HPN
935 }
936
937 return (struct bfd_hash_entry *) ret;
938}
939
940/* Create a CRIS ELF linker hash table. */
941
942static struct bfd_link_hash_table *
4dfe6ac6 943elf_cris_link_hash_table_create (bfd *abfd)
915e5146
HPN
944{
945 struct elf_cris_link_hash_table *ret;
dc810e39 946 bfd_size_type amt = sizeof (struct elf_cris_link_hash_table);
915e5146 947
e2d34d7d 948 ret = ((struct elf_cris_link_hash_table *) bfd_malloc (amt));
915e5146
HPN
949 if (ret == (struct elf_cris_link_hash_table *) NULL)
950 return NULL;
951
66eb6687
AM
952 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
953 elf_cris_link_hash_newfunc,
4dfe6ac6
NC
954 sizeof (struct elf_cris_link_hash_entry),
955 CRIS_ELF_DATA))
915e5146 956 {
e2d34d7d 957 free (ret);
915e5146
HPN
958 return NULL;
959 }
960
961 /* Initialize to skip over the first three entries in the gotplt; they
962 are used for run-time symbol evaluation. */
963 ret->next_gotplt_entry = 12;
964
100382c7
HPN
965 /* We haven't seen any R_CRIS_nn_GOT_TPREL initially. */
966 ret->dtpmod_refcount = 0;
967
915e5146
HPN
968 return &ret->root.root;
969}
970\f
06c15ad7 971/* Perform a single relocation. By default we use the standard BFD
915e5146 972 routines, with a few tweaks. */
06c15ad7
HPN
973
974static bfd_reloc_status_type
975cris_final_link_relocate (howto, input_bfd, input_section, contents, rel,
976 relocation)
977 reloc_howto_type * howto;
978 bfd * input_bfd;
979 asection * input_section;
980 bfd_byte * contents;
981 Elf_Internal_Rela * rel;
982 bfd_vma relocation;
983{
915e5146 984 bfd_reloc_status_type r;
100382c7 985 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
915e5146
HPN
986
987 /* PC-relative relocations are relative to the position *after*
988 the reloc. Note that for R_CRIS_8_PCREL the adjustment is
989 not a single byte, since PC must be 16-bit-aligned. */
100382c7 990 switch (r_type)
915e5146
HPN
991 {
992 /* Check that the 16-bit GOT relocs are positive. */
993 case R_CRIS_16_GOTPLT:
994 case R_CRIS_16_GOT:
995 if ((bfd_signed_vma) relocation < 0)
996 return bfd_reloc_overflow;
997 break;
998
999 case R_CRIS_32_PLT_PCREL:
1000 case R_CRIS_32_PCREL:
1001 relocation -= 2;
1002 /* Fall through. */
1003 case R_CRIS_8_PCREL:
1004 case R_CRIS_16_PCREL:
1005 relocation -= 2;
1006 break;
1007
1008 default:
1009 break;
1010 }
1011
1012 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
06c15ad7
HPN
1013 contents, rel->r_offset,
1014 relocation, rel->r_addend);
1015 return r;
1016}
1017\f
100382c7
HPN
1018
1019/* The number of errors left before we stop outputting reloc-specific
1020 explanatory messages. By coincidence, this works nicely together
1021 with the default number of messages you'll get from LD about
1022 "relocation truncated to fit" messages before you get an
1023 "additional relocation overflows omitted from the output". */
1024static int additional_relocation_error_msg_count = 10;
1025
06c15ad7
HPN
1026/* Relocate an CRIS ELF section. See elf32-fr30.c, from where this was
1027 copied, for further comments. */
1028
b34976b6 1029static bfd_boolean
4dfe6ac6
NC
1030cris_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED,
1031 struct bfd_link_info *info,
1032 bfd *input_bfd,
1033 asection *input_section,
1034 bfd_byte *contents,
1035 Elf_Internal_Rela *relocs,
1036 Elf_Internal_Sym *local_syms,
1037 asection **local_sections)
06c15ad7 1038{
4dfe6ac6 1039 struct elf_cris_link_hash_table * htab;
915e5146 1040 bfd *dynobj;
b34976b6
AM
1041 Elf_Internal_Shdr *symtab_hdr;
1042 struct elf_link_hash_entry **sym_hashes;
915e5146
HPN
1043 bfd_vma *local_got_offsets;
1044 asection *sgot;
1045 asection *splt;
1046 asection *sreloc;
b34976b6
AM
1047 Elf_Internal_Rela *rel;
1048 Elf_Internal_Rela *relend;
100382c7 1049 asection *srelgot;
06c15ad7 1050
4dfe6ac6
NC
1051 htab = elf_cris_hash_table (info);
1052 if (htab == NULL)
1053 return FALSE;
1054
915e5146
HPN
1055 dynobj = elf_hash_table (info)->dynobj;
1056 local_got_offsets = elf_local_got_offsets (input_bfd);
06c15ad7
HPN
1057 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
1058 sym_hashes = elf_sym_hashes (input_bfd);
1059 relend = relocs + input_section->reloc_count;
1060
915e5146
HPN
1061 sgot = NULL;
1062 splt = NULL;
1063 sreloc = NULL;
100382c7 1064 srelgot = NULL;
915e5146
HPN
1065
1066 if (dynobj != NULL)
1067 {
1068 splt = bfd_get_section_by_name (dynobj, ".plt");
1069 sgot = bfd_get_section_by_name (dynobj, ".got");
1070 }
1071
06c15ad7
HPN
1072 for (rel = relocs; rel < relend; rel ++)
1073 {
b34976b6
AM
1074 reloc_howto_type *howto;
1075 unsigned long r_symndx;
1076 Elf_Internal_Sym *sym;
1077 asection *sec;
1078 struct elf_link_hash_entry *h;
1079 bfd_vma relocation;
1080 bfd_reloc_status_type r;
1081 const char *symname = NULL;
100382c7 1082 enum elf_cris_reloc_type r_type;
a7c10850 1083
06c15ad7 1084 r_type = ELF32_R_TYPE (rel->r_info);
a7c10850 1085
06c15ad7
HPN
1086 if ( r_type == R_CRIS_GNU_VTINHERIT
1087 || r_type == R_CRIS_GNU_VTENTRY)
1088 continue;
a7c10850 1089
f0fe0e16 1090 r_symndx = ELF32_R_SYM (rel->r_info);
915e5146 1091 howto = cris_elf_howto_table + r_type;
06c15ad7
HPN
1092 h = NULL;
1093 sym = NULL;
1094 sec = NULL;
a7c10850 1095
06c15ad7
HPN
1096 if (r_symndx < symtab_hdr->sh_info)
1097 {
1098 sym = local_syms + r_symndx;
1099 sec = local_sections [r_symndx];
8517fae7 1100 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
a7c10850 1101
dc810e39
AM
1102 symname = (bfd_elf_string_from_elf_section
1103 (input_bfd, symtab_hdr->sh_link, sym->st_name));
1104 if (symname == NULL)
1105 symname = bfd_section_name (input_bfd, sec);
06c15ad7
HPN
1106 }
1107 else
1108 {
560e09e9
NC
1109 bfd_boolean warned;
1110 bfd_boolean unresolved_reloc;
0a4787a0 1111
b2a8e766
AM
1112 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1113 r_symndx, symtab_hdr, sym_hashes,
1114 h, sec, relocation,
1115 unresolved_reloc, warned);
915e5146 1116
100382c7
HPN
1117 symname = h->root.root.string;
1118
560e09e9 1119 if (unresolved_reloc
915e5146
HPN
1120 /* Perhaps we should detect the cases that
1121 sec->output_section is expected to be NULL like i386 and
1122 m68k, but apparently (and according to elfxx-ia64.c) all
1123 valid cases are where the symbol is defined in a shared
1124 object which we link dynamically against. This includes
1125 PLT relocs for which we've created a PLT entry and other
1126 relocs for which we're prepared to create dynamic
1127 relocations.
1128
1129 For now, new situations cause us to just err when
1130 sec->output_offset is NULL but the object with the symbol
1131 is *not* dynamically linked against. Thus this will
1132 automatically remind us so we can see if there are other
1133 valid cases we need to revisit. */
560e09e9
NC
1134 && (sec->owner->flags & DYNAMIC) != 0)
1135 relocation = 0;
1136
1137 else if (h->root.type == bfd_link_hash_defined
1138 || h->root.type == bfd_link_hash_defweak)
1139 {
1140 /* Here follow the cases where the relocation value must
1141 be zero (or when further handling is simplified when
1142 zero). I can't claim to understand the various
1143 conditions and they weren't described in the files
1144 where I copied them from (elf32-m68k.c and
1145 elf32-i386.c), but let's mention examples of where
1146 they happen. FIXME: Perhaps define and use a
1147 dynamic_symbol_p function like ia64.
1148
1149 - When creating a shared library, we can have an
1150 ordinary relocation for a symbol defined in a shared
1151 library (perhaps the one we create). We then make
1152 the relocation value zero, as the value seen now will
1153 be added into the relocation addend in this shared
1154 library, but must be handled only at dynamic-link
1155 time. FIXME: Not sure this example covers the
1156 h->elf_link_hash_flags test, though it's there in
1157 other targets. */
1158 if (info->shared
1159 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1160 || !h->def_regular)
560e09e9
NC
1161 && (input_section->flags & SEC_ALLOC) != 0
1162 && (r_type == R_CRIS_8
1163 || r_type == R_CRIS_16
1164 || r_type == R_CRIS_32
1165 || r_type == R_CRIS_8_PCREL
1166 || r_type == R_CRIS_16_PCREL
1167 || r_type == R_CRIS_32_PCREL))
915e5146 1168 relocation = 0;
ab96bf03 1169 else if (!info->relocatable && unresolved_reloc)
915e5146 1170 {
560e09e9 1171 _bfd_error_handler
bac23f82 1172 (_("%B, section %A: unresolvable relocation %s against symbol `%s'"),
d003868e
AM
1173 input_bfd,
1174 input_section,
8f615d07 1175 cris_elf_howto_table[r_type].name,
d003868e 1176 symname);
915e5146 1177 bfd_set_error (bfd_error_bad_value);
b34976b6 1178 return FALSE;
915e5146 1179 }
06c15ad7 1180 }
06c15ad7 1181 }
a7c10850 1182
ab96bf03 1183 if (sec != NULL && elf_discarded_section (sec))
e4067dbb
DJ
1184 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1185 rel, relend, howto, contents);
ab96bf03
AM
1186
1187 if (info->relocatable)
1188 continue;
1189
915e5146 1190 switch (r_type)
06c15ad7 1191 {
915e5146
HPN
1192 case R_CRIS_16_GOTPLT:
1193 case R_CRIS_32_GOTPLT:
1194 /* This is like the case for R_CRIS_32_GOT and R_CRIS_16_GOT,
1195 but we require a PLT, and the PLT handling will take care of
1196 filling in the PLT-specific GOT entry. For the GOT offset,
1197 calculate it as we do when filling it in for the .got.plt
1198 section. If we don't have a PLT, punt to GOT handling. */
1199 if (h != NULL
1200 && ((struct elf_cris_link_hash_entry *) h)->gotplt_offset != 0)
06c15ad7 1201 {
915e5146
HPN
1202 asection *sgotplt
1203 = bfd_get_section_by_name (dynobj, ".got.plt");
1204 bfd_vma got_offset;
a7c10850 1205
915e5146
HPN
1206 BFD_ASSERT (h->dynindx != -1);
1207 BFD_ASSERT (sgotplt != NULL);
a7c10850 1208
915e5146
HPN
1209 got_offset
1210 = ((struct elf_cris_link_hash_entry *) h)->gotplt_offset;
06c15ad7 1211
915e5146 1212 relocation = got_offset;
06c15ad7 1213 break;
915e5146 1214 }
06c15ad7 1215
4d96d128 1216 /* We didn't make a PLT entry for this symbol. Maybe everything is
915e5146
HPN
1217 folded into the GOT. Other than folding, this happens when
1218 statically linking PIC code, or when using -Bsymbolic. Check
1219 that we instead have a GOT entry as done for us by
1220 elf_cris_adjust_dynamic_symbol, and drop through into the
e4a2175c
HPN
1221 ordinary GOT cases. This must not happen for the
1222 executable, because any reference it does to a function
1223 that is satisfied by a DSO must generate a PLT. We assume
1224 these call-specific relocs don't address non-functions. */
1225 if (h != NULL
1226 && (h->got.offset == (bfd_vma) -1
1227 || (!info->shared
f5385ebf
AM
1228 && !(h->def_regular
1229 || (!h->def_dynamic
1230 && h->root.type == bfd_link_hash_undefweak)))))
915e5146
HPN
1231 {
1232 (*_bfd_error_handler)
e4a2175c 1233 ((h->got.offset == (bfd_vma) -1)
bac23f82 1234 ? _("%B, section %A: No PLT nor GOT for relocation %s"
d003868e 1235 " against symbol `%s'")
bac23f82 1236 : _("%B, section %A: No PLT for relocation %s"
d003868e
AM
1237 " against symbol `%s'"),
1238 input_bfd,
1239 input_section,
915e5146 1240 cris_elf_howto_table[r_type].name,
ada1953e
HPN
1241 (symname != NULL && symname[0] != '\0'
1242 ? symname : _("[whose name is lost]")));
915e5146
HPN
1243
1244 /* FIXME: Perhaps blaming input is not the right thing to
1245 do; this is probably an internal error. But it is true
1246 that we didn't like that particular input. */
1247 bfd_set_error (bfd_error_bad_value);
b34976b6 1248 return FALSE;
915e5146
HPN
1249 }
1250 /* Fall through. */
1251
1252 /* The size of the actual relocation is not used here; we only
1253 fill in the GOT table here. */
1254 case R_CRIS_16_GOT:
1255 case R_CRIS_32_GOT:
1256 {
1257 bfd_vma off;
1258
1259 /* Note that despite using RELA relocations, the .got contents
1260 is always filled in with the link-relative relocation
1261 value; the addend. */
1262
1263 if (h != NULL)
1264 {
1265 off = h->got.offset;
1266 BFD_ASSERT (off != (bfd_vma) -1);
1267
1268 if (!elf_hash_table (info)->dynamic_sections_created
205cfeb0 1269 || (! info->shared
f5385ebf 1270 && (h->def_regular
e4a2175c 1271 || h->type == STT_FUNC
f5385ebf 1272 || h->needs_plt))
915e5146
HPN
1273 || (info->shared
1274 && (info->symbolic || h->dynindx == -1)
f5385ebf 1275 && h->def_regular))
915e5146 1276 {
4d96d128 1277 /* This wasn't checked above for ! info->shared, but
e4a2175c
HPN
1278 must hold there if we get here; the symbol must
1279 be defined in the regular program or be undefweak
1280 or be a function or otherwise need a PLT. */
6849c52f
HPN
1281 BFD_ASSERT (!elf_hash_table (info)->dynamic_sections_created
1282 || info->shared
f5385ebf 1283 || h->def_regular
e4a2175c 1284 || h->type == STT_FUNC
f5385ebf 1285 || h->needs_plt
6849c52f 1286 || h->root.type == bfd_link_hash_undefweak);
4d96d128 1287
915e5146 1288 /* This is actually a static link, or it is a
6849c52f
HPN
1289 -Bsymbolic link and the symbol is defined locally,
1290 or is undefweak, or the symbol was forced to be
1291 local because of a version file, or we're not
1292 creating a dynamic object. We must initialize this
1293 entry in the global offset table. Since the offset
1294 must always be a multiple of 4, we use the least
1295 significant bit to record whether we have
1296 initialized it already.
1297
1298 If this GOT entry should be runtime-initialized, we
1299 will create a .rela.got relocation entry to
1300 initialize the value. This is done in the
1301 finish_dynamic_symbol routine. */
915e5146
HPN
1302 if ((off & 1) != 0)
1303 off &= ~1;
1304 else
1305 {
1306 bfd_put_32 (output_bfd, relocation,
1307 sgot->contents + off);
1308 h->got.offset |= 1;
1309 }
1310 }
1311 }
1312 else
1313 {
1314 BFD_ASSERT (local_got_offsets != NULL
1315 && local_got_offsets[r_symndx] != (bfd_vma) -1);
1316
1317 off = local_got_offsets[r_symndx];
1318
1319 /* The offset must always be a multiple of 4. We use
1320 the least significant bit to record whether we have
1321 already generated the necessary reloc. */
1322 if ((off & 1) != 0)
1323 off &= ~1;
1324 else
1325 {
1326 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1327
1328 if (info->shared)
1329 {
915e5146 1330 Elf_Internal_Rela outrel;
947216bf 1331 bfd_byte *loc;
915e5146 1332
100382c7
HPN
1333 if (srelgot == NULL)
1334 srelgot
1335 = bfd_get_section_by_name (dynobj, ".rela.got");
1336 BFD_ASSERT (srelgot != NULL);
915e5146
HPN
1337
1338 outrel.r_offset = (sgot->output_section->vma
1339 + sgot->output_offset
1340 + off);
1341 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
1342 outrel.r_addend = relocation;
100382c7
HPN
1343 loc = srelgot->contents;
1344 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 1345 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
915e5146
HPN
1346 }
1347
1348 local_got_offsets[r_symndx] |= 1;
1349 }
1350 }
1351
1352 relocation = sgot->output_offset + off;
1353 if (rel->r_addend != 0)
1354 {
1355 /* We can't do anything for a relocation which is against
1356 a symbol *plus offset*. GOT holds relocations for
1357 symbols. Make this an error; the compiler isn't
1358 allowed to pass us these kinds of things. */
1359 if (h == NULL)
1360 (*_bfd_error_handler)
bac23f82 1361 (_("%B, section %A: relocation %s with non-zero addend %d"
d003868e
AM
1362 " against local symbol"),
1363 input_bfd,
1364 input_section,
915e5146 1365 cris_elf_howto_table[r_type].name,
d003868e 1366 rel->r_addend);
915e5146
HPN
1367 else
1368 (*_bfd_error_handler)
bac23f82 1369 (_("%B, section %A: relocation %s with non-zero addend %d"
d003868e
AM
1370 " against symbol `%s'"),
1371 input_bfd,
1372 input_section,
915e5146
HPN
1373 cris_elf_howto_table[r_type].name,
1374 rel->r_addend,
d003868e 1375 symname[0] != '\0' ? symname : _("[whose name is lost]"));
915e5146
HPN
1376
1377 bfd_set_error (bfd_error_bad_value);
b34976b6 1378 return FALSE;
915e5146
HPN
1379 }
1380 }
1381 break;
06c15ad7 1382
915e5146 1383 case R_CRIS_32_GOTREL:
3dab95d3
HPN
1384 /* This relocation must only be performed against local symbols.
1385 It's also ok when we link a program and the symbol is either
1386 defined in an ordinary (non-DSO) object or is undefined weak. */
1387 if (h != NULL
1388 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1389 && !(!info->shared
f5385ebf
AM
1390 && (h->def_regular
1391 || (!h->def_dynamic
3dab95d3 1392 && h->root.type == bfd_link_hash_undefweak))))
915e5146
HPN
1393 {
1394 (*_bfd_error_handler)
bac23f82
HPN
1395 (_("%B, section %A: relocation %s is"
1396 " not allowed for global symbol: `%s'"),
d003868e
AM
1397 input_bfd,
1398 input_section,
915e5146 1399 cris_elf_howto_table[r_type].name,
d003868e 1400 symname);
915e5146 1401 bfd_set_error (bfd_error_bad_value);
b34976b6 1402 return FALSE;
06c15ad7
HPN
1403 }
1404
58255df3
HPN
1405 /* This can happen if we get a link error with the input ELF
1406 variant mismatching the output variant. Emit an error so
1407 it's noticed if it happens elsewhere. */
1408 if (sgot == NULL)
1409 {
1410 (*_bfd_error_handler)
bac23f82 1411 (_("%B, section %A: relocation %s with no GOT created"),
d003868e
AM
1412 input_bfd,
1413 input_section,
1414 cris_elf_howto_table[r_type].name);
58255df3 1415 bfd_set_error (bfd_error_bad_value);
b34976b6 1416 return FALSE;
58255df3
HPN
1417 }
1418
915e5146
HPN
1419 /* This relocation is like a PC-relative one, except the
1420 reference point is the location of GOT. Note that
1421 sgot->output_offset is not involved in this calculation. We
1422 always want the start of entire .got section, not the
1423 position after the reserved header. */
1424 relocation -= sgot->output_section->vma;
1425 break;
06c15ad7 1426
915e5146
HPN
1427 case R_CRIS_32_PLT_PCREL:
1428 /* Relocation is to the entry for this symbol in the
1429 procedure linkage table. */
06c15ad7 1430
915e5146
HPN
1431 /* Resolve a PLT_PCREL reloc against a local symbol directly,
1432 without using the procedure linkage table. */
0a4787a0 1433 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
915e5146
HPN
1434 break;
1435
1436 if (h->plt.offset == (bfd_vma) -1
1437 || splt == NULL)
1438 {
1439 /* We didn't make a PLT entry for this symbol. This
1440 happens when statically linking PIC code, or when
1441 using -Bsymbolic. */
1442 break;
1443 }
1444
1445 relocation = (splt->output_section->vma
1446 + splt->output_offset
1447 + h->plt.offset);
1448 break;
1449
1450 case R_CRIS_32_PLT_GOTREL:
1451 /* Like R_CRIS_32_PLT_PCREL, but the reference point is the
1452 start of the .got section. See also comment at
1453 R_CRIS_32_GOT. */
1454 relocation -= sgot->output_section->vma;
1455
1456 /* Resolve a PLT_GOTREL reloc against a local symbol directly,
1457 without using the procedure linkage table. */
0a4787a0 1458 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
915e5146
HPN
1459 break;
1460
1461 if (h->plt.offset == (bfd_vma) -1
1462 || splt == NULL)
1463 {
1464 /* We didn't make a PLT entry for this symbol. This
1465 happens when statically linking PIC code, or when
1466 using -Bsymbolic. */
1467 break;
1468 }
1469
1470 relocation = (splt->output_section->vma
1471 + splt->output_offset
1472 + h->plt.offset
1473 - sgot->output_section->vma);
1474 break;
1475
1476 case R_CRIS_8_PCREL:
1477 case R_CRIS_16_PCREL:
1478 case R_CRIS_32_PCREL:
1479 /* If the symbol was local, we need no shlib-specific handling. */
0d08de41
HPN
1480 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1481 || h->dynindx == -1)
915e5146
HPN
1482 break;
1483
1484 /* Fall through. */
1485 case R_CRIS_8:
1486 case R_CRIS_16:
1487 case R_CRIS_32:
1488 if (info->shared
cf35638d 1489 && r_symndx != STN_UNDEF
915e5146
HPN
1490 && (input_section->flags & SEC_ALLOC) != 0
1491 && ((r_type != R_CRIS_8_PCREL
1492 && r_type != R_CRIS_16_PCREL
1493 && r_type != R_CRIS_32_PCREL)
1494 || (!info->symbolic
02865b8e 1495 || (h != NULL && !h->def_regular))))
915e5146
HPN
1496 {
1497 Elf_Internal_Rela outrel;
947216bf 1498 bfd_byte *loc;
b34976b6 1499 bfd_boolean skip, relocate;
915e5146
HPN
1500
1501 /* When generating a shared object, these relocations
1502 are copied into the output file to be resolved at run
1503 time. */
1504
1505 if (sreloc == NULL)
1506 {
83bac4b0 1507 sreloc = _bfd_elf_get_dynamic_reloc_section
e236b51d 1508 (dynobj, input_section, /*rela?*/ TRUE);
83bac4b0
NC
1509 /* The section should have been created in cris_elf_check_relocs,
1510 but that function will not be called for objects which fail in
915e5146
HPN
1511 cris_elf_merge_private_bfd_data. */
1512 if (sreloc == NULL)
1513 {
915e5146 1514 bfd_set_error (bfd_error_bad_value);
b34976b6 1515 return FALSE;
915e5146
HPN
1516 }
1517 }
1518
b34976b6
AM
1519 skip = FALSE;
1520 relocate = FALSE;
915e5146 1521
c629eae0
JJ
1522 outrel.r_offset =
1523 _bfd_elf_section_offset (output_bfd, info, input_section,
1524 rel->r_offset);
1525 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1526 skip = TRUE;
b3bf42d8
HPN
1527 else if (outrel.r_offset == (bfd_vma) -2
1528 /* For now, undefined weak symbols with non-default
1529 visibility (yielding 0), like exception info for
1530 discarded sections, will get a R_CRIS_NONE
1531 relocation rather than no relocation, because we
1532 notice too late that the symbol doesn't need a
1533 relocation. */
1534 || (h != NULL
1535 && h->root.type == bfd_link_hash_undefweak
1536 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT))
b34976b6 1537 skip = TRUE, relocate = TRUE;
915e5146
HPN
1538 outrel.r_offset += (input_section->output_section->vma
1539 + input_section->output_offset);
1540
1541 if (skip)
0bb2d96a 1542 memset (&outrel, 0, sizeof outrel);
915e5146
HPN
1543 /* h->dynindx may be -1 if the symbol was marked to
1544 become local. */
1545 else if (h != NULL
1546 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1547 || !h->def_regular))
915e5146
HPN
1548 {
1549 BFD_ASSERT (h->dynindx != -1);
915e5146
HPN
1550 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1551 outrel.r_addend = relocation + rel->r_addend;
1552 }
1553 else
1554 {
74541ad4
AM
1555 outrel.r_addend = relocation + rel->r_addend;
1556
915e5146
HPN
1557 if (r_type == R_CRIS_32)
1558 {
b34976b6 1559 relocate = TRUE;
915e5146 1560 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
915e5146
HPN
1561 }
1562 else
1563 {
1564 long indx;
1565
8517fae7 1566 if (bfd_is_abs_section (sec))
915e5146
HPN
1567 indx = 0;
1568 else if (sec == NULL || sec->owner == NULL)
1569 {
1570 bfd_set_error (bfd_error_bad_value);
b34976b6 1571 return FALSE;
915e5146
HPN
1572 }
1573 else
1574 {
1575 asection *osec;
1576
74541ad4
AM
1577 /* We are turning this relocation into one
1578 against a section symbol. It would be
1579 proper to subtract the symbol's value,
1580 osec->vma, from the emitted reloc addend,
1581 but ld.so expects buggy relocs. */
915e5146
HPN
1582 osec = sec->output_section;
1583 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1584 if (indx == 0)
1585 {
74541ad4
AM
1586 osec = htab->root.text_index_section;
1587 indx = elf_section_data (osec)->dynindx;
1588 }
1589 BFD_ASSERT (indx != 0);
915e5146
HPN
1590 }
1591
915e5146 1592 outrel.r_info = ELF32_R_INFO (indx, r_type);
915e5146
HPN
1593 }
1594 }
1595
947216bf
AM
1596 loc = sreloc->contents;
1597 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1598 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
915e5146
HPN
1599
1600 /* This reloc will be computed at runtime, so there's no
1601 need to do anything now, except for R_CRIS_32 relocations
1602 that have been turned into R_CRIS_RELATIVE. */
1603 if (!relocate)
1604 continue;
1605 }
1606
1607 break;
100382c7
HPN
1608
1609 case R_CRIS_16_DTPREL:
1610 case R_CRIS_32_DTPREL:
1611 /* This relocation must only be performed against local
6718f446
HPN
1612 symbols, or to sections that are not loadable. It's also
1613 ok when we link a program and the symbol is defined in an
1614 ordinary (non-DSO) object (if it's undefined there, we've
1615 already seen an error). */
100382c7 1616 if (h != NULL
6718f446 1617 && (input_section->flags & SEC_ALLOC) != 0
100382c7
HPN
1618 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1619 && (info->shared
1620 || (!h->def_regular
1621 && h->root.type != bfd_link_hash_undefined)))
1622 {
1623 (*_bfd_error_handler)
1624 ((h->root.type == bfd_link_hash_undefined)
1625 /* We shouldn't get here for GCC-emitted code. */
1626 ? _("%B, section %A: relocation %s has an undefined"
1627 " reference to `%s', perhaps a declaration mixup?")
1628 : ("%B, section %A: relocation %s is"
1629 " not allowed for `%s', a global symbol with default"
1630 " visibility, perhaps a declaration mixup?"),
1631 input_bfd,
1632 input_section,
1633 cris_elf_howto_table[r_type].name,
1634 symname != NULL && symname[0] != '\0'
1635 ? symname : _("[whose name is lost]"));
1636 bfd_set_error (bfd_error_bad_value);
1637 return FALSE;
1638 }
1639
6718f446 1640 BFD_ASSERT ((input_section->flags & SEC_ALLOC) == 0
4dfe6ac6 1641 || htab->dtpmod_refcount != 0);
100382c7
HPN
1642
1643 /* Fill in a R_CRIS_DTPMOD reloc at offset 3 if we haven't
1644 already done so. Note that we do this in .got.plt, not
1645 in .got, as .got.plt contains the first part, still the
1646 reloc is against .got, because the linker script directs
1647 (is required to direct) them both into .got. */
4dfe6ac6 1648 if (htab->dtpmod_refcount > 0
6718f446 1649 && (input_section->flags & SEC_ALLOC) != 0)
100382c7
HPN
1650 {
1651 asection *sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1652 BFD_ASSERT (sgotplt != NULL);
1653
1654 if (info->shared)
1655 {
1656 Elf_Internal_Rela outrel;
1657 bfd_byte *loc;
1658
1659 if (srelgot == NULL)
1660 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1661 BFD_ASSERT (srelgot != NULL);
1662 loc = srelgot->contents;
1663 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1664
1665 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 12);
1666 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1667 outrel.r_offset = (sgotplt->output_section->vma
1668 + sgotplt->output_offset
1669 + 12);
1670 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTPMOD);
1671 outrel.r_addend = 0;
1672 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1673 }
1674 else
1675 {
1676 /* For an executable, the GOT entry contents is known. */
1677 bfd_put_32 (output_bfd, (bfd_vma) 1, sgotplt->contents + 12);
1678 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1679 }
1680
1681 /* Reverse the sign to mark that we've emitted the
1682 required GOT entry. */
4dfe6ac6 1683 htab->dtpmod_refcount = - htab->dtpmod_refcount;
100382c7
HPN
1684 }
1685
ebf275e3
HPN
1686 /* The relocation is the offset from the start of the module
1687 TLS block to the (local) symbol. */
100382c7 1688 relocation -= elf_hash_table (info)->tls_sec == NULL
ebf275e3 1689 ? 0 : elf_hash_table (info)->tls_sec->vma;
100382c7
HPN
1690 break;
1691
1692 case R_CRIS_32_GD:
1693 if (info->shared)
1694 {
1695 bfd_set_error (bfd_error_invalid_operation);
1696
1697 /* We've already informed in cris_elf_check_relocs that
1698 this is an error. */
1699 return FALSE;
1700 }
1701 /* Fall through. */
1702
1703 case R_CRIS_16_GOT_GD:
1704 case R_CRIS_32_GOT_GD:
1705 if (rel->r_addend != 0)
1706 {
1707 /* We can't do anything for a relocation which is against a
1708 symbol *plus offset*. The GOT holds relocations for
1709 symbols. Make this an error; the compiler isn't allowed
1710 to pass us these kinds of things. */
1711 (*_bfd_error_handler)
1712 (_("%B, section %A: relocation %s with non-zero addend %d"
1713 " against symbol `%s'"),
1714 input_bfd,
1715 input_section,
1716 cris_elf_howto_table[r_type].name,
1717 rel->r_addend,
1718 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1719
1720 bfd_set_error (bfd_error_bad_value);
1721 return FALSE;
1722 }
1723
34d3d6b9
HPN
1724 if (!info->shared
1725 && (h == NULL || h->def_regular || ELF_COMMON_DEF_P (h)))
100382c7
HPN
1726 {
1727 /* Known contents of the GOT. */
1728 bfd_vma off;
1729
1730 /* The symbol is defined in the program, so just write
019c5a2e 1731 (1, known_tpoffset) into the GOT. */
100382c7
HPN
1732 relocation -= elf_hash_table (info)->tls_sec->vma;
1733
1734 if (h != NULL)
1735 {
1736 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1737 ? h->got.offset + 4 : h->got.offset;
1738 }
1739 else
1740 {
1741 off = local_got_offsets[r_symndx];
1742 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1743 off += 4;
1744 }
1745
1746 /* We use bit 1 of the offset as a flag for GOT entry with
1747 the R_CRIS_DTP reloc, setting it when we've emitted the
1748 GOT entry and reloc. Bit 0 is used for R_CRIS_32_TPREL
1749 relocs. */
1750 if ((off & 2) == 0)
1751 {
1752 off &= ~3;
1753
1754 if (h != NULL)
1755 h->got.offset |= 2;
1756 else
1757 local_got_offsets[r_symndx] |= 2;
1758
1759 bfd_put_32 (output_bfd, 1, sgot->contents + off);
1760 bfd_put_32 (output_bfd, relocation, sgot->contents + off + 4);
1761 }
1762 else
1763 off &= ~3;
1764
1765 relocation = sgot->output_offset + off
1766 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1767 }
1768 else
1769 {
1770 /* Not all parts of the GOT entry are known; emit a real
1771 relocation. */
1772 bfd_vma off;
1773
1774 if (h != NULL)
1775 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1776 ? h->got.offset + 4 : h->got.offset;
1777 else
1778 {
1779 off = local_got_offsets[r_symndx];
1780 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1781 off += 4;
1782 }
1783
1784 /* See above re bit 1 and bit 0 usage. */
1785 if ((off & 2) == 0)
1786 {
1787 Elf_Internal_Rela outrel;
1788 bfd_byte *loc;
1789
1790 off &= ~3;
1791
1792 if (h != NULL)
1793 h->got.offset |= 2;
1794 else
1795 local_got_offsets[r_symndx] |= 2;
1796
1797 /* Clear the target contents of the GOT (just as a
1798 gesture; it's already cleared on allocation): this
1799 relocation is not like the other dynrelocs. */
1800 bfd_put_32 (output_bfd, 0, sgot->contents + off);
1801 bfd_put_32 (output_bfd, 0, sgot->contents + off + 4);
1802
1803 if (srelgot == NULL)
1804 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1805 BFD_ASSERT (srelgot != NULL);
1806
1807 if (h != NULL && h->dynindx != -1)
1808 {
1809 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_DTP);
1810 relocation = 0;
1811 }
1812 else
1813 {
1814 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTP);
1815
1816 /* NULL if we had an error. */
1817 relocation -= elf_hash_table (info)->tls_sec == NULL
1818 ? 0 : elf_hash_table (info)->tls_sec->vma;
1819 }
1820
1821 outrel.r_offset = (sgot->output_section->vma
1822 + sgot->output_offset
1823 + off);
1824 outrel.r_addend = relocation;
1825 loc = srelgot->contents;
1826 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1827
1828 /* NULL if we had an error. */
1829 if (srelgot->contents != NULL)
1830 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1831 }
1832 else
1833 off &= ~3;
1834
1835 relocation = sgot->output_offset + off
1836 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1837 }
1838
1839 /* The GOT-relative offset to the GOT entry is the
1840 relocation, or for R_CRIS_32_GD, the actual address of
1841 the GOT entry. */
1842 break;
1843
75f500d7
HPN
1844 case R_CRIS_32_IE:
1845 if (info->shared)
1846 {
1847 bfd_set_error (bfd_error_invalid_operation);
1848
1849 /* We've already informed in cris_elf_check_relocs that
1850 this is an error. */
1851 return FALSE;
1852 }
1853 /* Fall through. */
1854
100382c7
HPN
1855 case R_CRIS_32_GOT_TPREL:
1856 case R_CRIS_16_GOT_TPREL:
1857 if (rel->r_addend != 0)
1858 {
1859 /* We can't do anything for a relocation which is
1860 against a symbol *plus offset*. GOT holds
1861 relocations for symbols. Make this an error; the
1862 compiler isn't allowed to pass us these kinds of
1863 things. */
1864 (*_bfd_error_handler)
1865 (_("%B, section %A: relocation %s with non-zero addend %d"
1866 " against symbol `%s'"),
1867 input_bfd,
1868 input_section,
1869 cris_elf_howto_table[r_type].name,
1870 rel->r_addend,
1871 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1872 bfd_set_error (bfd_error_bad_value);
1873 return FALSE;
1874 }
1875
1876 if (!info->shared && (h == NULL || h->def_regular))
1877 {
1878 /* Known contents of the GOT. */
1879 bfd_vma off;
1880
1881 /* The symbol is defined in the program, so just write
1bc86aea 1882 the -prog_tls_size+known_tpoffset into the GOT. */
100382c7 1883 relocation -= elf_hash_table (info)->tls_sec->vma;
f6f05983 1884 relocation -= elf_hash_table (info)->tls_size;
100382c7
HPN
1885
1886 if (h != NULL)
1887 off = h->got.offset;
1888 else
1889 off = local_got_offsets[r_symndx];
1890
1891 /* Bit 0 is used to mark whether we've emitted the required
1892 entry (and if needed R_CRIS_32_TPREL reloc). Bit 1
1893 is used similarly for R_CRIS_DTP, see above. */
1894 if ((off & 1) == 0)
1895 {
1896 off &= ~3;
1897
1898 if (h != NULL)
1899 h->got.offset |= 1;
1900 else
1901 local_got_offsets[r_symndx] |= 1;
1902
1903 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1904 }
1905 else
1906 off &= ~3;
1907
75f500d7
HPN
1908 relocation = sgot->output_offset + off
1909 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
100382c7
HPN
1910 }
1911 else
1912 {
1913 /* Emit a real relocation. */
1914 bfd_vma off;
1915
1916 if (h != NULL)
1917 off = h->got.offset;
1918 else
1919 off = local_got_offsets[r_symndx];
1920
1921 /* See above re usage of bit 0 and 1. */
1922 if ((off & 1) == 0)
1923 {
1924 Elf_Internal_Rela outrel;
1925 bfd_byte *loc;
1926
1927 off &= ~3;
1928
1929 if (h != NULL)
1930 h->got.offset |= 1;
1931 else
1932 local_got_offsets[r_symndx] |= 1;
1933
1934 if (srelgot == NULL)
1935 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1936 BFD_ASSERT (srelgot != NULL);
1937
1938 if (h != NULL && h->dynindx != -1)
1939 {
1940 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_32_TPREL);
1941 relocation = 0;
1942 }
1943 else
1944 {
1945 outrel.r_info = ELF32_R_INFO (0, R_CRIS_32_TPREL);
1946
1947 /* NULL if we had an error. */
1948 relocation -= elf_hash_table (info)->tls_sec == NULL
1949 ? 0 : elf_hash_table (info)->tls_sec->vma;
1950 }
1951
1952 /* Just "define" the initial contents in some
1953 semi-logical way. */
1954 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1955
1956 outrel.r_offset = (sgot->output_section->vma
1957 + sgot->output_offset
1958 + off);
1959 outrel.r_addend = relocation;
1960 loc = srelgot->contents;
1961 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1962 /* NULL if we had an error. */
1963 if (srelgot->contents != NULL)
1964 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1965 }
1966 else
1967 off &= ~3;
1968
75f500d7
HPN
1969 relocation = sgot->output_offset + off
1970 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
100382c7
HPN
1971 }
1972
75f500d7
HPN
1973 /* The GOT-relative offset to the GOT entry is the relocation,
1974 or for R_CRIS_32_GD, the actual address of the GOT entry. */
100382c7
HPN
1975 break;
1976
1977 case R_CRIS_16_TPREL:
1978 case R_CRIS_32_TPREL:
1979 /* This relocation must only be performed against symbols
1980 defined in an ordinary (non-DSO) object. */
1981 if (info->shared)
1982 {
1983 bfd_set_error (bfd_error_invalid_operation);
1984
1985 /* We've already informed in cris_elf_check_relocs that
1986 this is an error. */
1987 return FALSE;
1988 }
1989
1990 if (h != NULL
1991 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
34d3d6b9 1992 && !(h->def_regular || ELF_COMMON_DEF_P (h))
100382c7
HPN
1993 /* If it's undefined, then an error message has already
1994 been emitted. */
1995 && h->root.type != bfd_link_hash_undefined)
1996 {
1997 (*_bfd_error_handler)
1998 (_("%B, section %A: relocation %s is"
1999 " not allowed for symbol: `%s'"
2000 " which is defined outside the program,"
2001 " perhaps a declaration mixup?"),
2002 input_bfd,
2003 input_section,
2004 cris_elf_howto_table[r_type].name,
2005 symname);
2006 bfd_set_error (bfd_error_bad_value);
2007 return FALSE;
2008 }
2009
2010 /* NULL if we had an error. */
2011 relocation -= elf_hash_table (info)->tls_sec == NULL
1bc86aea
HPN
2012 ? 0
2013 : (elf_hash_table (info)->tls_sec->vma
f6f05983 2014 + elf_hash_table (info)->tls_size);
100382c7
HPN
2015
2016 /* The TLS-relative offset is the relocation. */
2017 break;
2018
2019 default:
2020 BFD_FAIL ();
2021 return FALSE;
915e5146
HPN
2022 }
2023
2024 r = cris_final_link_relocate (howto, input_bfd, input_section,
2025 contents, rel, relocation);
2026
2027 if (r != bfd_reloc_ok)
2028 {
2029 const char * msg = (const char *) NULL;
2030
2031 switch (r)
2032 {
2033 case bfd_reloc_overflow:
2034 r = info->callbacks->reloc_overflow
dfeffb9f
L
2035 (info, (h ? &h->root : NULL), symname, howto->name,
2036 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
100382c7
HPN
2037 if (additional_relocation_error_msg_count > 0)
2038 {
2039 additional_relocation_error_msg_count--;
2040 switch (r_type)
2041 {
2042 case R_CRIS_16_GOTPLT:
2043 case R_CRIS_16_GOT:
2044
2045 /* Not just TLS is involved here, so we make
2046 generation and message depend on -fPIC/-fpic
2047 only. */
2048 case R_CRIS_16_GOT_TPREL:
2049 case R_CRIS_16_GOT_GD:
2050 (*_bfd_error_handler)
2051 (_("(too many global variables for -fpic:"
2052 " recompile with -fPIC)"));
2053 break;
2054
2055 case R_CRIS_16_TPREL:
2056 case R_CRIS_16_DTPREL:
2057 (*_bfd_error_handler)
2058 (_("(thread-local data too big for -fpic or"
2059 " -msmall-tls: recompile with -fPIC or"
2060 " -mno-small-tls)"));
2061 break;
2062
2063 /* No known cause for overflow for other relocs. */
2064 default:
2065 break;
2066 }
2067 }
915e5146
HPN
2068 break;
2069
2070 case bfd_reloc_undefined:
2071 r = info->callbacks->undefined_symbol
dc810e39 2072 (info, symname, input_bfd, input_section, rel->r_offset,
b34976b6 2073 TRUE);
915e5146
HPN
2074 break;
2075
2076 case bfd_reloc_outofrange:
2077 msg = _("internal error: out of range error");
2078 break;
2079
2080 case bfd_reloc_notsupported:
2081 msg = _("internal error: unsupported relocation error");
2082 break;
2083
2084 case bfd_reloc_dangerous:
2085 msg = _("internal error: dangerous relocation");
2086 break;
2087
2088 default:
2089 msg = _("internal error: unknown error");
2090 break;
2091 }
2092
2093 if (msg)
2094 r = info->callbacks->warning
dc810e39 2095 (info, msg, symname, input_bfd, input_section, rel->r_offset);
915e5146
HPN
2096
2097 if (! r)
b34976b6 2098 return FALSE;
915e5146
HPN
2099 }
2100 }
2101
b34976b6 2102 return TRUE;
915e5146
HPN
2103}
2104\f
2105/* Finish up dynamic symbol handling. We set the contents of various
2106 dynamic sections here. */
2107
b34976b6 2108static bfd_boolean
4dfe6ac6
NC
2109elf_cris_finish_dynamic_symbol (bfd *output_bfd,
2110 struct bfd_link_info *info,
2111 struct elf_link_hash_entry *h,
2112 Elf_Internal_Sym *sym)
915e5146 2113{
4dfe6ac6 2114 struct elf_cris_link_hash_table * htab;
915e5146 2115 bfd *dynobj;
bac23f82
HPN
2116
2117 /* Where in the plt entry to put values. */
915e5146
HPN
2118 int plt_off1 = 2, plt_off2 = 10, plt_off3 = 16;
2119
bac23f82
HPN
2120 /* What offset to add to the distance to the first PLT entry for the
2121 value at plt_off3. */
2122 int plt_off3_value_bias = 4;
2123
2124 /* Where in the PLT entry the call-dynlink-stub is (happens to be same
2125 for PIC and non-PIC for v32 and pre-v32). */
2126 int plt_stub_offset = 8;
2127 int plt_entry_size = PLT_ENTRY_SIZE;
2128 const bfd_byte *plt_entry = elf_cris_plt_entry;
2129 const bfd_byte *plt_pic_entry = elf_cris_pic_plt_entry;
2130
4dfe6ac6
NC
2131 htab = elf_cris_hash_table (info);
2132 if (htab == NULL)
2133 return FALSE;
2134
bac23f82
HPN
2135 /* Adjust the various PLT entry offsets. */
2136 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2137 {
2138 plt_off2 = 14;
2139 plt_off3 = 20;
2140 plt_off3_value_bias = -2;
2141 plt_stub_offset = 12;
2142 plt_entry_size = PLT_ENTRY_SIZE_V32;
2143 plt_entry = elf_cris_plt_entry_v32;
2144 plt_pic_entry = elf_cris_pic_plt_entry_v32;
2145 }
2146
915e5146
HPN
2147 dynobj = elf_hash_table (info)->dynobj;
2148
2149 if (h->plt.offset != (bfd_vma) -1)
2150 {
2151 asection *splt;
2152 asection *sgotplt;
915e5146
HPN
2153 asection *srela;
2154 bfd_vma got_base;
2155
2156 bfd_vma gotplt_offset
100382c7 2157 = elf_cris_hash_entry (h)->gotplt_offset;
915e5146 2158 Elf_Internal_Rela rela;
947216bf 2159 bfd_byte *loc;
b34976b6 2160 bfd_boolean has_gotplt = gotplt_offset != 0;
915e5146 2161
0bdf8d40
HPN
2162 /* Get the index in the .rela.plt relocations for the .got.plt
2163 entry that corresponds to this symbol.
2164 We have to count backwards here, and the result is only valid
2165 as an index into .rela.plt. We also have to undo the effect
2166 of the R_CRIS_DTPMOD entry at .got index 3 (offset 12 into
2167 .got.plt) for which gotplt_offset is adjusted, because while
2168 that entry goes into .got.plt, its relocation goes into
2169 .rela.got, not .rela.plt. (It's not PLT-specific; not to be
2170 processed as part of the runtime lazy .rela.plt relocation).
2171 FIXME: There be literal constants here... */
2172 bfd_vma rela_plt_index
4dfe6ac6 2173 = (htab->dtpmod_refcount != 0
0bdf8d40 2174 ? gotplt_offset/4 - 2 - 3 : gotplt_offset/4 - 3);
915e5146
HPN
2175
2176 /* Get the offset into the .got table of the entry that corresponds
2177 to this function. Note that we embed knowledge that "incoming"
2178 .got goes after .got.plt in the output without padding (pointer
2179 aligned). However, that knowledge is present in several other
c152c796 2180 places too. */
915e5146
HPN
2181 bfd_vma got_offset
2182 = (has_gotplt
2183 ? gotplt_offset
4dfe6ac6 2184 : h->got.offset + htab->next_gotplt_entry);
915e5146
HPN
2185
2186 /* This symbol has an entry in the procedure linkage table. Set it
2187 up. */
2188
2189 BFD_ASSERT (h->dynindx != -1);
2190
2191 splt = bfd_get_section_by_name (dynobj, ".plt");
915e5146
HPN
2192 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
2193 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
2194 BFD_ASSERT (splt != NULL && sgotplt != NULL
2195 && (! has_gotplt || srela != NULL));
2196
2197 got_base = sgotplt->output_section->vma + sgotplt->output_offset;
2198
2199 /* Fill in the entry in the procedure linkage table. */
2200 if (! info->shared)
2201 {
bac23f82
HPN
2202 memcpy (splt->contents + h->plt.offset, plt_entry,
2203 plt_entry_size);
915e5146
HPN
2204
2205 /* We need to enter the absolute address of the GOT entry here. */
2206 bfd_put_32 (output_bfd, got_base + got_offset,
2207 splt->contents + h->plt.offset + plt_off1);
2208 }
2209 else
2210 {
bac23f82
HPN
2211 memcpy (splt->contents + h->plt.offset, plt_pic_entry,
2212 plt_entry_size);
915e5146
HPN
2213 bfd_put_32 (output_bfd, got_offset,
2214 splt->contents + h->plt.offset + plt_off1);
2215 }
2216
2217 /* Fill in the plt entry and make a relocation, if this is a "real"
2218 PLT entry. */
2219 if (has_gotplt)
2220 {
bac23f82 2221 /* Fill in the offset to the reloc table. */
915e5146 2222 bfd_put_32 (output_bfd,
0bdf8d40 2223 rela_plt_index * sizeof (Elf32_External_Rela),
915e5146
HPN
2224 splt->contents + h->plt.offset + plt_off2);
2225
2226 /* Fill in the offset to the first PLT entry, where to "jump". */
bac23f82
HPN
2227 bfd_put_32 (output_bfd,
2228 - (h->plt.offset + plt_off3 + plt_off3_value_bias),
915e5146
HPN
2229 splt->contents + h->plt.offset + plt_off3);
2230
2231 /* Fill in the entry in the global offset table with the address of
2232 the relocating stub. */
2233 bfd_put_32 (output_bfd,
2234 (splt->output_section->vma
2235 + splt->output_offset
2236 + h->plt.offset
bac23f82 2237 + plt_stub_offset),
915e5146
HPN
2238 sgotplt->contents + got_offset);
2239
2240 /* Fill in the entry in the .rela.plt section. */
2241 rela.r_offset = (sgotplt->output_section->vma
2242 + sgotplt->output_offset
2243 + got_offset);
2244 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_JUMP_SLOT);
2245 rela.r_addend = 0;
0bdf8d40 2246 loc = srela->contents + rela_plt_index * sizeof (Elf32_External_Rela);
947216bf 2247 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2248 }
2249
f5385ebf 2250 if (!h->def_regular)
915e5146
HPN
2251 {
2252 /* Mark the symbol as undefined, rather than as defined in
2253 the .plt section. Leave the value alone. */
2254 sym->st_shndx = SHN_UNDEF;
2255
2256 /* FIXME: From elf32-sparc.c 2001-02-19 (1.18). I still don't
2257 know whether resetting the value is significant; if it really
2258 is, rather than a quirk or bug in the sparc port, then I
2259 believe we'd see this elsewhere. */
2260 /* If the symbol is weak, we do need to clear the value.
2261 Otherwise, the PLT entry would provide a definition for
2262 the symbol even if the symbol wasn't defined anywhere,
2263 and so the symbol would never be NULL. */
f5385ebf 2264 if (!h->ref_regular_nonweak)
915e5146
HPN
2265 sym->st_value = 0;
2266 }
2267 }
2268
e4a2175c
HPN
2269 /* For an ordinary program, we emit .got relocs only for symbols that
2270 are in the dynamic-symbols table and are either defined by the
2271 program or are undefined weak symbols, or are function symbols
2272 where we do not output a PLT: the PLT reloc was output above and all
2273 references to the function symbol are redirected to the PLT. */
4d96d128 2274 if (h->got.offset != (bfd_vma) -1
100382c7 2275 && (elf_cris_hash_entry (h)->reg_got_refcount > 0)
6849c52f
HPN
2276 && (info->shared
2277 || (h->dynindx != -1
e4a2175c 2278 && h->plt.offset == (bfd_vma) -1
f5385ebf 2279 && !h->def_regular
6849c52f 2280 && h->root.type != bfd_link_hash_undefweak)))
915e5146
HPN
2281 {
2282 asection *sgot;
2283 asection *srela;
2284 Elf_Internal_Rela rela;
947216bf 2285 bfd_byte *loc;
dc810e39 2286 bfd_byte *where;
915e5146
HPN
2287
2288 /* This symbol has an entry in the global offset table. Set it up. */
2289
2290 sgot = bfd_get_section_by_name (dynobj, ".got");
2291 srela = bfd_get_section_by_name (dynobj, ".rela.got");
2292 BFD_ASSERT (sgot != NULL && srela != NULL);
2293
2294 rela.r_offset = (sgot->output_section->vma
2295 + sgot->output_offset
dc810e39 2296 + (h->got.offset &~ (bfd_vma) 1));
915e5146
HPN
2297
2298 /* If this is a static link, or it is a -Bsymbolic link and the
2299 symbol is defined locally or was forced to be local because
2300 of a version file, we just want to emit a RELATIVE reloc.
2301 The entry in the global offset table will already have been
2302 initialized in the relocate_section function. */
dc810e39 2303 where = sgot->contents + (h->got.offset &~ (bfd_vma) 1);
915e5146
HPN
2304 if (! elf_hash_table (info)->dynamic_sections_created
2305 || (info->shared
2306 && (info->symbolic || h->dynindx == -1)
f5385ebf 2307 && h->def_regular))
915e5146
HPN
2308 {
2309 rela.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
dc810e39 2310 rela.r_addend = bfd_get_signed_32 (output_bfd, where);
915e5146
HPN
2311 }
2312 else
2313 {
dc810e39 2314 bfd_put_32 (output_bfd, (bfd_vma) 0, where);
915e5146
HPN
2315 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_GLOB_DAT);
2316 rela.r_addend = 0;
2317 }
2318
947216bf
AM
2319 loc = srela->contents;
2320 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
2321 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2322 }
2323
f5385ebf 2324 if (h->needs_copy)
915e5146
HPN
2325 {
2326 asection *s;
2327 Elf_Internal_Rela rela;
947216bf 2328 bfd_byte *loc;
915e5146
HPN
2329
2330 /* This symbol needs a copy reloc. Set it up. */
2331
2332 BFD_ASSERT (h->dynindx != -1
2333 && (h->root.type == bfd_link_hash_defined
2334 || h->root.type == bfd_link_hash_defweak));
2335
2336 s = bfd_get_section_by_name (h->root.u.def.section->owner,
2337 ".rela.bss");
2338 BFD_ASSERT (s != NULL);
2339
2340 rela.r_offset = (h->root.u.def.value
2341 + h->root.u.def.section->output_section->vma
2342 + h->root.u.def.section->output_offset);
2343 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_COPY);
2344 rela.r_addend = 0;
947216bf
AM
2345 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2346 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2347 }
2348
2349 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2350 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 2351 || h == elf_hash_table (info)->hgot)
915e5146
HPN
2352 sym->st_shndx = SHN_ABS;
2353
b34976b6 2354 return TRUE;
915e5146
HPN
2355}
2356\f
100382c7
HPN
2357/* Finish up the dynamic sections. Do *not* emit relocs here, as their
2358 offsets were changed, as part of -z combreloc handling, from those we
2359 computed. */
915e5146 2360
b34976b6 2361static bfd_boolean
915e5146
HPN
2362elf_cris_finish_dynamic_sections (output_bfd, info)
2363 bfd *output_bfd;
2364 struct bfd_link_info *info;
2365{
2366 bfd *dynobj;
2367 asection *sgot;
2368 asection *sdyn;
2369
2370 dynobj = elf_hash_table (info)->dynobj;
2371
2372 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
2373 BFD_ASSERT (sgot != NULL);
2374 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2375
2376 if (elf_hash_table (info)->dynamic_sections_created)
2377 {
2378 asection *splt;
2379 Elf32_External_Dyn *dyncon, *dynconend;
2380
2381 splt = bfd_get_section_by_name (dynobj, ".plt");
2382 BFD_ASSERT (splt != NULL && sdyn != NULL);
2383
2384 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 2385 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
915e5146
HPN
2386 for (; dyncon < dynconend; dyncon++)
2387 {
2388 Elf_Internal_Dyn dyn;
2389 asection *s;
2390
2391 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2392
2393 switch (dyn.d_tag)
2394 {
2395 default:
2396 break;
2397
2398 case DT_PLTGOT:
2399 s = bfd_get_section_by_name (output_bfd, ".got");
2400 BFD_ASSERT (s != NULL);
2401 dyn.d_un.d_ptr = s->vma;
2402 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2403 break;
2404
2405 case DT_JMPREL:
2406 /* Yes, we *can* have a .plt and no .plt.rela, for instance
2407 if all symbols are found in the .got (not .got.plt). */
2408 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2409 dyn.d_un.d_ptr = s != NULL ? s->vma : 0;
2410 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2411 break;
2412
2413 case DT_PLTRELSZ:
2414 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2415 if (s == NULL)
2416 dyn.d_un.d_val = 0;
915e5146 2417 else
eea6121a 2418 dyn.d_un.d_val = s->size;
915e5146
HPN
2419 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2420 break;
2421
2422 case DT_RELASZ:
2423 /* The procedure linkage table relocs (DT_JMPREL) should
2424 not be included in the overall relocs (DT_RELA).
2425 Therefore, we override the DT_RELASZ entry here to
2426 make it not include the JMPREL relocs. Since the
2427 linker script arranges for .rela.plt to follow all
2428 other relocation sections, we don't have to worry
2429 about changing the DT_RELA entry. */
2430 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2431 if (s != NULL)
eea6121a 2432 dyn.d_un.d_val -= s->size;
915e5146
HPN
2433 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2434 break;
2435 }
2436 }
2437
2438 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2439 if (splt->size > 0)
915e5146 2440 {
bac23f82
HPN
2441 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2442 {
2443 if (info->shared)
2444 memcpy (splt->contents, elf_cris_pic_plt0_entry_v32,
2445 PLT_ENTRY_SIZE_V32);
2446 else
2447 {
2448 memcpy (splt->contents, elf_cris_plt0_entry_v32,
2449 PLT_ENTRY_SIZE_V32);
2450 bfd_put_32 (output_bfd,
2451 sgot->output_section->vma
2452 + sgot->output_offset + 4,
2453 splt->contents + 4);
2454
2455 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2456 = PLT_ENTRY_SIZE_V32;
2457 }
2458 }
915e5146 2459 else
bac23f82
HPN
2460 {
2461 if (info->shared)
2462 memcpy (splt->contents, elf_cris_pic_plt0_entry,
2463 PLT_ENTRY_SIZE);
2464 else
2465 {
2466 memcpy (splt->contents, elf_cris_plt0_entry,
2467 PLT_ENTRY_SIZE);
2468 bfd_put_32 (output_bfd,
2469 sgot->output_section->vma
2470 + sgot->output_offset + 4,
2471 splt->contents + 6);
2472 bfd_put_32 (output_bfd,
2473 sgot->output_section->vma
2474 + sgot->output_offset + 8,
2475 splt->contents + 14);
2476
2477 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2478 = PLT_ENTRY_SIZE;
2479 }
915e5146
HPN
2480 }
2481 }
2482 }
2483
2484 /* Fill in the first three entries in the global offset table. */
eea6121a 2485 if (sgot->size > 0)
915e5146
HPN
2486 {
2487 if (sdyn == NULL)
2488 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2489 else
2490 bfd_put_32 (output_bfd,
2491 sdyn->output_section->vma + sdyn->output_offset,
2492 sgot->contents);
2493 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2494 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2495 }
2496
2497 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2498
b34976b6 2499 return TRUE;
06c15ad7
HPN
2500}
2501\f
2502/* Return the section that should be marked against GC for a given
2503 relocation. */
2504
2505static asection *
07adf181
AM
2506cris_elf_gc_mark_hook (asection *sec,
2507 struct bfd_link_info *info,
2508 Elf_Internal_Rela *rel,
2509 struct elf_link_hash_entry *h,
2510 Elf_Internal_Sym *sym)
06c15ad7 2511{
100382c7 2512 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
06c15ad7 2513 if (h != NULL)
100382c7 2514 switch (r_type)
07adf181
AM
2515 {
2516 case R_CRIS_GNU_VTINHERIT:
2517 case R_CRIS_GNU_VTENTRY:
2518 return NULL;
100382c7
HPN
2519
2520 default:
2521 break;
07adf181 2522 }
06c15ad7 2523
07adf181 2524 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
06c15ad7
HPN
2525}
2526
2527/* Update the got entry reference counts for the section being removed. */
2528
b34976b6 2529static bfd_boolean
07adf181
AM
2530cris_elf_gc_sweep_hook (bfd *abfd,
2531 struct bfd_link_info *info,
2532 asection *sec,
2533 const Elf_Internal_Rela *relocs)
06c15ad7 2534{
4dfe6ac6 2535 struct elf_cris_link_hash_table * htab;
915e5146
HPN
2536 Elf_Internal_Shdr *symtab_hdr;
2537 struct elf_link_hash_entry **sym_hashes;
2538 bfd_signed_vma *local_got_refcounts;
2539 const Elf_Internal_Rela *rel, *relend;
915e5146
HPN
2540 bfd *dynobj;
2541 asection *sgot;
2542 asection *srelgot;
2543
7dda2462
TG
2544 if (info->relocatable)
2545 return TRUE;
2546
915e5146
HPN
2547 dynobj = elf_hash_table (info)->dynobj;
2548 if (dynobj == NULL)
b34976b6 2549 return TRUE;
915e5146 2550
4dfe6ac6
NC
2551 htab = elf_cris_hash_table (info);
2552 if (htab == NULL)
2553 return FALSE;
2554
babfd660
KH
2555 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2556 sym_hashes = elf_sym_hashes (abfd);
2557 local_got_refcounts = elf_local_got_refcounts (abfd);
2558
915e5146
HPN
2559 sgot = bfd_get_section_by_name (dynobj, ".got");
2560 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
2561
2562 relend = relocs + sec->reloc_count;
2563 for (rel = relocs; rel < relend; rel++)
2564 {
babfd660 2565 unsigned long r_symndx;
3eb128b2 2566 struct elf_link_hash_entry *h = NULL;
100382c7
HPN
2567 bfd_signed_vma got_element_size = 4;
2568 bfd_signed_vma *specific_refcount = NULL;
2569 enum elf_cris_reloc_type r_type;
3eb128b2
AM
2570
2571 r_symndx = ELF32_R_SYM (rel->r_info);
2572 if (r_symndx >= symtab_hdr->sh_info)
2573 {
2574 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2575 while (h->root.type == bfd_link_hash_indirect
2576 || h->root.type == bfd_link_hash_warning)
2577 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2578 }
babfd660 2579
100382c7
HPN
2580 r_type = ELF32_R_TYPE (rel->r_info);
2581 switch (r_type)
2582 {
2583 case R_CRIS_32_GOT:
2584 case R_CRIS_16_GOT:
2585 case R_CRIS_16_GOTPLT:
2586 case R_CRIS_32_GOTPLT:
2587 specific_refcount = h != NULL
2588 ? &((struct elf_cris_link_hash_entry *) h)->reg_got_refcount
2589 : &local_got_refcounts[LGOT_REG_NDX (r_symndx)];
2590 break;
2591
2592 case R_CRIS_32_GD:
2593 case R_CRIS_32_GOT_GD:
2594 case R_CRIS_16_GOT_GD:
2595 got_element_size = 8;
2596 specific_refcount = h != NULL
2597 ? &((struct elf_cris_link_hash_entry *) h)->dtp_refcount
2598 : &local_got_refcounts[LGOT_DTP_NDX (r_symndx)];
2599 break;
2600
75f500d7 2601 case R_CRIS_32_IE:
100382c7
HPN
2602 case R_CRIS_16_GOT_TPREL:
2603 case R_CRIS_32_GOT_TPREL:
2604 specific_refcount = h != NULL
2605 ? &((struct elf_cris_link_hash_entry *) h)->tprel_refcount
2606 : &local_got_refcounts[LGOT_TPREL_NDX (r_symndx)];
2607 break;
2608
2609 default:
2610 break;
2611 }
2612
2613 switch (r_type)
915e5146 2614 {
75f500d7 2615 case R_CRIS_32_IE:
100382c7
HPN
2616 case R_CRIS_32_GD:
2617 case R_CRIS_16_GOT_TPREL:
2618 case R_CRIS_32_GOT_TPREL:
2619 case R_CRIS_32_GOT_GD:
2620 case R_CRIS_16_GOT_GD:
915e5146
HPN
2621 case R_CRIS_16_GOT:
2622 case R_CRIS_32_GOT:
3eb128b2 2623 if (h != NULL)
915e5146 2624 {
100382c7
HPN
2625 /* If the counters are 0 when we got here, we've
2626 miscounted somehow somewhere, an internal error. */
2627 BFD_ASSERT (h->got.refcount > 0);
2628 --h->got.refcount;
2629
2630 BFD_ASSERT (*specific_refcount > 0);
2631 --*specific_refcount;
2632 if (*specific_refcount == 0)
915e5146 2633 {
100382c7
HPN
2634 /* We don't need the .got entry any more. */
2635 sgot->size -= got_element_size;
2636 srelgot->size -= sizeof (Elf32_External_Rela);
915e5146
HPN
2637 }
2638 break;
2639 }
2640
2641 local_got_reloc:
2642 if (local_got_refcounts != NULL)
2643 {
100382c7
HPN
2644 /* If the counters are 0 when we got here, we've
2645 miscounted somehow somewhere, an internal error. */
2646 BFD_ASSERT (local_got_refcounts[r_symndx] > 0);
2647 --local_got_refcounts[r_symndx];
2648
2649 BFD_ASSERT (*specific_refcount > 0);
2650 --*specific_refcount;
2651 if (*specific_refcount == 0)
915e5146 2652 {
100382c7
HPN
2653 /* We don't need the .got entry any more. */
2654 sgot->size -= got_element_size;
2655 if (info->shared)
2656 srelgot->size -= sizeof (Elf32_External_Rela);
915e5146
HPN
2657 }
2658 }
2659 break;
2660
2661 case R_CRIS_16_GOTPLT:
2662 case R_CRIS_32_GOTPLT:
2663 /* For local symbols, treat these like GOT relocs. */
3eb128b2 2664 if (h == NULL)
915e5146 2665 goto local_got_reloc;
970d488d
HPN
2666 else
2667 /* For global symbols, adjust the reloc-specific refcount. */
2668 elf_cris_hash_entry (h)->gotplt_refcount--;
e4a2175c 2669 /* Fall through. */
3eb128b2 2670
915e5146
HPN
2671 case R_CRIS_32_PLT_GOTREL:
2672 /* FIXME: We don't garbage-collect away the .got section. */
2673 if (local_got_refcounts != NULL)
2674 local_got_refcounts[-1]--;
2675 /* Fall through. */
3eb128b2 2676
970d488d
HPN
2677 case R_CRIS_8:
2678 case R_CRIS_16:
2679 case R_CRIS_32:
915e5146
HPN
2680 case R_CRIS_8_PCREL:
2681 case R_CRIS_16_PCREL:
2682 case R_CRIS_32_PCREL:
2683 case R_CRIS_32_PLT_PCREL:
970d488d 2684 /* Negate the increment we did in cris_elf_check_relocs. */
3eb128b2 2685 if (h != NULL)
915e5146 2686 {
0a4787a0
HPN
2687 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2688 && h->plt.refcount > 0)
915e5146
HPN
2689 --h->plt.refcount;
2690 }
2691 break;
2692
100382c7 2693 case R_CRIS_32_DTPREL:
6718f446
HPN
2694 /* This'd be a .dtpreld entry in e.g. debug info. */
2695 if ((sec->flags & SEC_ALLOC) == 0)
2696 break;
2697 /* Fall through. */
100382c7 2698 case R_CRIS_16_DTPREL:
4dfe6ac6
NC
2699 htab->dtpmod_refcount--;
2700 if (htab->dtpmod_refcount == 0)
2701 htab->next_gotplt_entry -= 8;
100382c7
HPN
2702 BFD_ASSERT (local_got_refcounts != NULL);
2703 local_got_refcounts[-1]--;
2704 break;
2705
915e5146
HPN
2706 default:
2707 break;
2708 }
2709 }
2710
b34976b6 2711 return TRUE;
06c15ad7
HPN
2712}
2713
5d5a918a
HPN
2714/* The elf_backend_plt_sym_val hook function. */
2715
2716static bfd_vma
2717cris_elf_plt_sym_val (bfd_vma i, const asection *plt,
2718 const arelent *rel ATTRIBUTE_UNUSED)
2719{
2720 bfd_size_type plt_entry_size;
2721
2722 plt_entry_size
2723 = (bfd_get_mach (plt->owner) == bfd_mach_cris_v32
2724 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2725
2726 return plt->vma + (i + 1) * plt_entry_size;
2727}
2728
915e5146
HPN
2729/* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
2730 entry but we found we will not create any. Called when we find we will
4d96d128
HPN
2731 not have any PLT for this symbol, by for example
2732 elf_cris_adjust_dynamic_symbol when we're doing a proper dynamic link,
2733 or elf_cris_size_dynamic_sections if no dynamic sections will be
2734 created (we're only linking static objects). */
915e5146 2735
b34976b6 2736static bfd_boolean
915e5146
HPN
2737elf_cris_adjust_gotplt_to_got (h, p)
2738 struct elf_cris_link_hash_entry *h;
2739 PTR p;
2740{
2741 struct bfd_link_info *info = (struct bfd_link_info *) p;
915e5146 2742
970d488d
HPN
2743 /* A GOTPLT reloc, when activated, is supposed to be included into
2744 the PLT refcount. */
2745 BFD_ASSERT (h->gotplt_refcount == 0
2746 || h->gotplt_refcount <= h->root.plt.refcount);
2747
915e5146
HPN
2748 /* If nobody wanted a GOTPLT with this symbol, we're done. */
2749 if (h->gotplt_refcount <= 0)
b34976b6 2750 return TRUE;
915e5146 2751
100382c7 2752 if (h->reg_got_refcount > 0)
915e5146 2753 {
100382c7
HPN
2754 /* There's a GOT entry for this symbol. Just adjust the refcounts.
2755 Probably not necessary at this stage, but keeping them accurate
915e5146
HPN
2756 helps avoiding surprises later. */
2757 h->root.got.refcount += h->gotplt_refcount;
100382c7 2758 h->reg_got_refcount += h->gotplt_refcount;
5e0f5ae3 2759 h->gotplt_refcount = 0;
915e5146
HPN
2760 }
2761 else
2762 {
4d96d128 2763 /* No GOT entry for this symbol. We need to create one. */
8d1d654f
AM
2764 bfd *dynobj = elf_hash_table (info)->dynobj;
2765 asection *sgot;
2766 asection *srelgot;
2767
2768 BFD_ASSERT (dynobj != NULL);
2769 sgot = bfd_get_section_by_name (dynobj, ".got");
2770 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
915e5146 2771
100382c7
HPN
2772 /* Put accurate refcounts there. */
2773 h->root.got.refcount += h->gotplt_refcount;
2774 h->reg_got_refcount = h->gotplt_refcount;
915e5146 2775
5e0f5ae3 2776 h->gotplt_refcount = 0;
915e5146 2777
44aa49bb
HPN
2778 /* We always have a .got and a .rela.got section if there were
2779 GOTPLT relocs in input. */
2780 BFD_ASSERT (sgot != NULL && srelgot != NULL);
915e5146
HPN
2781
2782 /* Allocate space in the .got section. */
eea6121a 2783 sgot->size += 4;
915e5146
HPN
2784
2785 /* Allocate relocation space. */
eea6121a 2786 srelgot->size += sizeof (Elf32_External_Rela);
915e5146
HPN
2787 }
2788
b34976b6 2789 return TRUE;
915e5146
HPN
2790}
2791
2792/* Try to fold PLT entries with GOT entries. There are two cases when we
2793 want to do this:
2794
2795 - When all PLT references are GOTPLT references, and there are GOT
e4a2175c
HPN
2796 references, and this is not the executable. We don't have to
2797 generate a PLT at all.
915e5146 2798
e4a2175c
HPN
2799 - When there are both (ordinary) PLT references and GOT references,
2800 and this isn't the executable.
915e5146 2801 We want to make the PLT reference use the ordinary GOT entry rather
e4a2175c
HPN
2802 than R_CRIS_JUMP_SLOT, a run-time dynamically resolved GOTPLT entry,
2803 since the GOT entry will have to be resolved at startup anyway.
915e5146
HPN
2804
2805 Though the latter case is handled when room for the PLT is allocated,
2806 not here.
2807
e4a2175c
HPN
2808 By folding into the GOT, we may need a round-trip to a PLT in the
2809 executable for calls, a loss in performance. Still, losing a
2810 reloc is a win in size and at least in start-up time.
2811
915e5146
HPN
2812 Note that this function is called before symbols are forced local by
2813 version scripts. The differing cases are handled by
2814 elf_cris_hide_symbol. */
2815
b34976b6 2816static bfd_boolean
915e5146
HPN
2817elf_cris_try_fold_plt_to_got (h, p)
2818 struct elf_cris_link_hash_entry *h;
2819 PTR p;
2820{
2821 struct bfd_link_info *info = (struct bfd_link_info *) p;
2822
2823 /* If there are no GOT references for this symbol, we can't fold any
2824 other reference so there's nothing to do. Likewise if there are no
2825 PLT references; GOTPLT references included. */
2826 if (h->root.got.refcount <= 0 || h->root.plt.refcount <= 0)
b34976b6 2827 return TRUE;
915e5146
HPN
2828
2829 /* GOTPLT relocs are supposed to be included into the PLT refcount. */
2830 BFD_ASSERT (h->gotplt_refcount <= h->root.plt.refcount);
2831
2832 if (h->gotplt_refcount == h->root.plt.refcount)
2833 {
4d96d128 2834 /* The only PLT references are GOTPLT references, and there are GOT
915e5146
HPN
2835 references. Convert PLT to GOT references. */
2836 if (! elf_cris_adjust_gotplt_to_got (h, info))
b34976b6 2837 return FALSE;
915e5146
HPN
2838
2839 /* Clear the PLT references, so no PLT will be created. */
2840 h->root.plt.offset = (bfd_vma) -1;
2841 }
2842
b34976b6 2843 return TRUE;
915e5146
HPN
2844}
2845
2846/* Our own version of hide_symbol, so that we can adjust a GOTPLT reloc
2847 to use a GOT entry (and create one) rather than requiring a GOTPLT
2848 entry. */
2849
2850static void
e5094212 2851elf_cris_hide_symbol (info, h, force_local)
915e5146
HPN
2852 struct bfd_link_info *info;
2853 struct elf_link_hash_entry *h;
b34976b6 2854 bfd_boolean force_local;
915e5146
HPN
2855{
2856 elf_cris_adjust_gotplt_to_got ((struct elf_cris_link_hash_entry *) h, info);
2857
e5094212 2858 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
915e5146
HPN
2859}
2860
2861/* Adjust a symbol defined by a dynamic object and referenced by a
2862 regular object. The current definition is in some section of the
2863 dynamic object, but we're not including those sections. We have to
2864 change the definition to something the rest of the link can
2865 understand. */
2866
b34976b6 2867static bfd_boolean
4dfe6ac6
NC
2868elf_cris_adjust_dynamic_symbol (struct bfd_link_info *info,
2869 struct elf_link_hash_entry *h)
915e5146 2870{
4dfe6ac6 2871 struct elf_cris_link_hash_table * htab;
915e5146
HPN
2872 bfd *dynobj;
2873 asection *s;
bac23f82 2874 bfd_size_type plt_entry_size;
915e5146 2875
4dfe6ac6
NC
2876 htab = elf_cris_hash_table (info);
2877 if (htab == NULL)
2878 return FALSE;
2879
915e5146
HPN
2880 dynobj = elf_hash_table (info)->dynobj;
2881
2882 /* Make sure we know what is going on here. */
2883 BFD_ASSERT (dynobj != NULL
f5385ebf 2884 && (h->needs_plt
f6e332e6 2885 || h->u.weakdef != NULL
f5385ebf
AM
2886 || (h->def_dynamic
2887 && h->ref_regular
2888 && !h->def_regular)));
915e5146 2889
bac23f82
HPN
2890 plt_entry_size
2891 = (bfd_get_mach (dynobj) == bfd_mach_cris_v32
2892 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2893
915e5146
HPN
2894 /* If this is a function, put it in the procedure linkage table. We
2895 will fill in the contents of the procedure linkage table later,
2896 when we know the address of the .got section. */
2897 if (h->type == STT_FUNC
f5385ebf 2898 || h->needs_plt)
915e5146 2899 {
6849c52f
HPN
2900 /* If we link a program (not a DSO), we'll get rid of unnecessary
2901 PLT entries; we point to the actual symbols -- even for pic
2902 relocs, because a program built with -fpic should have the same
2903 result as one built without -fpic, specifically considering weak
2904 symbols.
2905 FIXME: m68k and i386 differ here, for unclear reasons. */
915e5146 2906 if (! info->shared
f5385ebf 2907 && !h->def_dynamic)
915e5146
HPN
2908 {
2909 /* This case can occur if we saw a PLT reloc in an input file,
6849c52f
HPN
2910 but the symbol was not defined by a dynamic object. In such
2911 a case, we don't actually need to build a procedure linkage
2912 table, and we can just do an absolute or PC reloc instead, or
4d96d128 2913 change a .got.plt index to a .got index for GOTPLT relocs. */
f5385ebf
AM
2914 BFD_ASSERT (h->needs_plt);
2915 h->needs_plt = 0;
915e5146 2916 h->plt.offset = (bfd_vma) -1;
915e5146
HPN
2917 return
2918 elf_cris_adjust_gotplt_to_got ((struct
2919 elf_cris_link_hash_entry *) h,
2920 info);
2921 }
2922
e4a2175c
HPN
2923 /* If we had a R_CRIS_GLOB_DAT that didn't have to point to a PLT;
2924 where a pointer-equivalent symbol was unimportant (i.e. more
2925 like R_CRIS_JUMP_SLOT after symbol evaluation) we could get rid
2926 of the PLT. We can't for the executable, because the GOT
2927 entries will point to the PLT there (and be constant). */
2928 if (info->shared
2929 && !elf_cris_try_fold_plt_to_got ((struct elf_cris_link_hash_entry*)
2930 h, info))
b34976b6 2931 return FALSE;
915e5146
HPN
2932
2933 /* GC or folding may have rendered this entry unused. */
2934 if (h->plt.refcount <= 0)
2935 {
f5385ebf 2936 h->needs_plt = 0;
915e5146 2937 h->plt.offset = (bfd_vma) -1;
b34976b6 2938 return TRUE;
915e5146
HPN
2939 }
2940
2941 /* Make sure this symbol is output as a dynamic symbol. */
2942 if (h->dynindx == -1)
2943 {
c152c796 2944 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2945 return FALSE;
915e5146
HPN
2946 }
2947
2948 s = bfd_get_section_by_name (dynobj, ".plt");
2949 BFD_ASSERT (s != NULL);
2950
2951 /* If this is the first .plt entry, make room for the special
2952 first entry. */
eea6121a 2953 if (s->size == 0)
bac23f82 2954 s->size += plt_entry_size;
915e5146
HPN
2955
2956 /* If this symbol is not defined in a regular file, and we are
2957 not generating a shared library, then set the symbol to this
6849c52f 2958 location in the .plt. */
915e5146 2959 if (!info->shared
f5385ebf 2960 && !h->def_regular)
915e5146
HPN
2961 {
2962 h->root.u.def.section = s;
eea6121a 2963 h->root.u.def.value = s->size;
915e5146
HPN
2964 }
2965
4d96d128
HPN
2966 /* If there's already a GOT entry, use that, not a .got.plt. A
2967 GOT field still has a reference count when we get here; it's
e4a2175c
HPN
2968 not yet changed to an offset. We can't do this for an
2969 executable, because then the reloc associated with the PLT
2970 would get a non-PLT reloc pointing to the PLT. FIXME: Move
2971 this to elf_cris_try_fold_plt_to_got. */
2972 if (info->shared && h->got.refcount > 0)
915e5146
HPN
2973 {
2974 h->got.refcount += h->plt.refcount;
2975
2976 /* Mark the PLT offset to use the GOT entry by setting the low
2977 bit in the plt offset; it is always a multiple of
bac23f82
HPN
2978 plt_entry_size (which is at least a multiple of 2). */
2979 BFD_ASSERT ((s->size % plt_entry_size) == 0);
915e5146
HPN
2980
2981 /* Change the PLT refcount to an offset. */
eea6121a 2982 h->plt.offset = s->size;
915e5146
HPN
2983
2984 /* By not setting gotplt_offset (i.e. it remains at 0), we signal
2985 that the got entry should be used instead. */
2986 BFD_ASSERT (((struct elf_cris_link_hash_entry *)
2987 h)->gotplt_offset == 0);
2988
2989 /* Make room for this entry. */
bac23f82 2990 s->size += plt_entry_size;
915e5146 2991
b34976b6 2992 return TRUE;
915e5146
HPN
2993 }
2994
2995 /* No GOT reference for this symbol; prepare for an ordinary PLT. */
eea6121a 2996 h->plt.offset = s->size;
915e5146
HPN
2997
2998 /* Make room for this entry. */
bac23f82 2999 s->size += plt_entry_size;
915e5146
HPN
3000
3001 /* We also need to make an entry in the .got.plt section, which
3002 will be placed in the .got section by the linker script. */
3003 ((struct elf_cris_link_hash_entry *) h)->gotplt_offset
4dfe6ac6
NC
3004 = htab->next_gotplt_entry;
3005 htab->next_gotplt_entry += 4;
915e5146
HPN
3006
3007 s = bfd_get_section_by_name (dynobj, ".got.plt");
3008 BFD_ASSERT (s != NULL);
eea6121a 3009 s->size += 4;
915e5146
HPN
3010
3011 /* We also need to make an entry in the .rela.plt section. */
3012
3013 s = bfd_get_section_by_name (dynobj, ".rela.plt");
3014 BFD_ASSERT (s != NULL);
eea6121a 3015 s->size += sizeof (Elf32_External_Rela);
915e5146 3016
b34976b6 3017 return TRUE;
915e5146
HPN
3018 }
3019
3020 /* Reinitialize the plt offset now that it is not used as a reference
3021 count any more. */
3022 h->plt.offset = (bfd_vma) -1;
3023
3024 /* If this is a weak symbol, and there is a real definition, the
3025 processor independent code will have arranged for us to see the
3026 real definition first, and we can just use the same value. */
f6e332e6 3027 if (h->u.weakdef != NULL)
915e5146 3028 {
f6e332e6
AM
3029 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
3030 || h->u.weakdef->root.type == bfd_link_hash_defweak);
3031 h->root.u.def.section = h->u.weakdef->root.u.def.section;
3032 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 3033 return TRUE;
915e5146
HPN
3034 }
3035
3036 /* This is a reference to a symbol defined by a dynamic object which
3037 is not a function. */
3038
3039 /* If we are creating a shared library, we must presume that the
3040 only references to the symbol are via the global offset table.
3041 For such cases we need not do anything here; the relocations will
3042 be handled correctly by relocate_section. */
3043 if (info->shared)
b34976b6 3044 return TRUE;
915e5146
HPN
3045
3046 /* If there are no references to this symbol that do not use the
3047 GOT, we don't need to generate a copy reloc. */
f5385ebf 3048 if (!h->non_got_ref)
b34976b6 3049 return TRUE;
915e5146 3050
909272ee
AM
3051 if (h->size == 0)
3052 {
3053 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
3054 h->root.root.string);
3055 return TRUE;
3056 }
3057
915e5146
HPN
3058 /* We must allocate the symbol in our .dynbss section, which will
3059 become part of the .bss section of the executable. There will be
3060 an entry for this symbol in the .dynsym section. The dynamic
3061 object will contain position independent code, so all references
3062 from the dynamic object to this symbol will go through the global
3063 offset table. The dynamic linker will use the .dynsym entry to
3064 determine the address it must put in the global offset table, so
3065 both the dynamic object and the regular object will refer to the
3066 same memory location for the variable. */
3067
3068 s = bfd_get_section_by_name (dynobj, ".dynbss");
3069 BFD_ASSERT (s != NULL);
3070
3071 /* We must generate a R_CRIS_COPY reloc to tell the dynamic linker to
3072 copy the initial value out of the dynamic object and into the
3073 runtime process image. We need to remember the offset into the
3074 .rela.bss section we are going to use. */
3075 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
3076 {
3077 asection *srel;
3078
3079 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
3080 BFD_ASSERT (srel != NULL);
eea6121a 3081 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 3082 h->needs_copy = 1;
915e5146
HPN
3083 }
3084
027297b7 3085 return _bfd_elf_adjust_dynamic_copy (h, s);
915e5146
HPN
3086}
3087
237bc7f0
HPN
3088/* Adjust our "subclass" elements for an indirect symbol. */
3089
3090static void
3091elf_cris_copy_indirect_symbol (struct bfd_link_info *info,
3092 struct elf_link_hash_entry *dir,
3093 struct elf_link_hash_entry *ind)
3094{
3095 struct elf_cris_link_hash_entry *edir, *eind;
3096
3097 edir = (struct elf_cris_link_hash_entry *) dir;
3098 eind = (struct elf_cris_link_hash_entry *) ind;
3099
867ea5fd
HPN
3100 /* Only indirect symbols are replaced; we're not interested in
3101 updating any of EIND's fields for other symbols. */
3102 if (eind->root.root.type != bfd_link_hash_indirect)
451ffe63
HPN
3103 {
3104 /* Still, we need to copy flags for e.g. weak definitions. */
3105 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3106 return;
3107 }
867ea5fd 3108
237bc7f0
HPN
3109 BFD_ASSERT (edir->gotplt_offset == 0 || eind->gotplt_offset == 0);
3110
3111#define XMOVOPZ(F, OP, Z) edir->F OP eind->F; eind->F = Z
3112#define XMOVE(F) XMOVOPZ (F, +=, 0)
bfbff9eb
HPN
3113 if (eind->pcrel_relocs_copied != NULL)
3114 {
3115 if (edir->pcrel_relocs_copied != NULL)
3116 {
3117 struct elf_cris_pcrel_relocs_copied **pp;
3118 struct elf_cris_pcrel_relocs_copied *p;
3119
3120 /* Add reloc counts against the indirect sym to the direct sym
3121 list. Merge any entries against the same section. */
3122 for (pp = &eind->pcrel_relocs_copied; *pp != NULL;)
3123 {
3124 struct elf_cris_pcrel_relocs_copied *q;
3125 p = *pp;
3126 for (q = edir->pcrel_relocs_copied; q != NULL; q = q->next)
3127 if (q->section == p->section)
3128 {
3129 q->count += p->count;
3130 *pp = p->next;
3131 break;
3132 }
3133 if (q == NULL)
3134 pp = &p->next;
3135 }
3136 *pp = edir->pcrel_relocs_copied;
3137 }
3138 XMOVOPZ (pcrel_relocs_copied, =, NULL);
3139 }
237bc7f0
HPN
3140 XMOVE (gotplt_refcount);
3141 XMOVE (gotplt_offset);
3142 XMOVE (reg_got_refcount);
3143 XMOVE (tprel_refcount);
3144 XMOVE (dtp_refcount);
3145#undef XMOVE
3146#undef XMOVOPZ
3147
3148 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3149}
3150
915e5146 3151/* Look through the relocs for a section during the first phase. */
a7c10850 3152
b34976b6 3153static bfd_boolean
4dfe6ac6
NC
3154cris_elf_check_relocs (bfd *abfd,
3155 struct bfd_link_info *info,
3156 asection *sec,
3157 const Elf_Internal_Rela *relocs)
06c15ad7 3158{
4dfe6ac6 3159 struct elf_cris_link_hash_table * htab;
915e5146 3160 bfd *dynobj;
06c15ad7 3161 Elf_Internal_Shdr *symtab_hdr;
5582a088 3162 struct elf_link_hash_entry **sym_hashes;
915e5146 3163 bfd_signed_vma *local_got_refcounts;
06c15ad7
HPN
3164 const Elf_Internal_Rela *rel;
3165 const Elf_Internal_Rela *rel_end;
915e5146
HPN
3166 asection *sgot;
3167 asection *srelgot;
3168 asection *sreloc;
a7c10850 3169
1049f94e 3170 if (info->relocatable)
b34976b6 3171 return TRUE;
a7c10850 3172
4dfe6ac6
NC
3173 htab = elf_cris_hash_table (info);
3174 if (htab == NULL)
3175 return FALSE;
3176
915e5146 3177 dynobj = elf_hash_table (info)->dynobj;
06c15ad7
HPN
3178 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3179 sym_hashes = elf_sym_hashes (abfd);
915e5146
HPN
3180 local_got_refcounts = elf_local_got_refcounts (abfd);
3181
3182 sgot = NULL;
3183 srelgot = NULL;
3184 sreloc = NULL;
3185
06c15ad7
HPN
3186 rel_end = relocs + sec->reloc_count;
3187 for (rel = relocs; rel < rel_end; rel++)
3188 {
3189 struct elf_link_hash_entry *h;
3190 unsigned long r_symndx;
915e5146 3191 enum elf_cris_reloc_type r_type;
100382c7
HPN
3192 bfd_signed_vma got_element_size = 4;
3193 unsigned long r_symndx_lgot = INT_MAX;
a7c10850 3194
06c15ad7
HPN
3195 r_symndx = ELF32_R_SYM (rel->r_info);
3196 if (r_symndx < symtab_hdr->sh_info)
100382c7
HPN
3197 {
3198 h = NULL;
3199 r_symndx_lgot = LGOT_REG_NDX (r_symndx);
3200 }
06c15ad7 3201 else
973a3492
L
3202 {
3203 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3204 while (h->root.type == bfd_link_hash_indirect
3205 || h->root.type == bfd_link_hash_warning)
3206 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3207 }
a7c10850 3208
915e5146
HPN
3209 r_type = ELF32_R_TYPE (rel->r_info);
3210
3211 /* Some relocs require linker-created sections; we need to hang them
3212 on the first input bfd we found that contained dynamic relocs. */
3213 switch (r_type)
3214 {
100382c7 3215 case R_CRIS_32_DTPREL:
6718f446
HPN
3216 if ((sec->flags & SEC_ALLOC) == 0)
3217 /* This'd be a .dtpreld entry in e.g. debug info. We have
3218 several different switch statements below, but none of
3219 that is needed; we need no preparations for resolving
3220 R_CRIS_32_DTPREL into a non-allocated section (debug
3221 info), so let's just move on to the next
3222 relocation. */
3223 continue;
3224 /* Fall through. */
3225 case R_CRIS_16_DTPREL:
100382c7
HPN
3226 /* The first .got.plt entry is right after the R_CRIS_DTPMOD
3227 entry at index 3. */
4dfe6ac6
NC
3228 if (htab->dtpmod_refcount == 0)
3229 htab->next_gotplt_entry += 8;
3230
3231 htab->dtpmod_refcount++;
100382c7
HPN
3232 /* Fall through. */
3233
75f500d7 3234 case R_CRIS_32_IE:
100382c7
HPN
3235 case R_CRIS_32_GD:
3236 case R_CRIS_16_GOT_GD:
3237 case R_CRIS_32_GOT_GD:
3238 case R_CRIS_32_GOT_TPREL:
3239 case R_CRIS_16_GOT_TPREL:
915e5146
HPN
3240 case R_CRIS_16_GOT:
3241 case R_CRIS_32_GOT:
3242 case R_CRIS_32_GOTREL:
3243 case R_CRIS_32_PLT_GOTREL:
3244 case R_CRIS_32_PLT_PCREL:
3245 case R_CRIS_16_GOTPLT:
3246 case R_CRIS_32_GOTPLT:
3247 if (dynobj == NULL)
3248 {
3249 elf_hash_table (info)->dynobj = dynobj = abfd;
3250
bac23f82
HPN
3251 /* We could handle this if we can get a handle on the
3252 output bfd in elf_cris_adjust_dynamic_symbol. Failing
3253 that, we must insist on dynobj being a specific mach. */
3254 if (bfd_get_mach (dynobj) == bfd_mach_cris_v10_v32)
3255 {
3256 (*_bfd_error_handler)
3257 (_("%B, section %A:\n v10/v32 compatible object %s"
3258 " must not contain a PIC relocation"),
3259 abfd, sec);
3260 return FALSE;
3261 }
3262
915e5146
HPN
3263 /* Create the .got section, so we can assume it's always
3264 present whenever there's a dynobj. */
3265 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 3266 return FALSE;
915e5146 3267 }
100382c7
HPN
3268
3269 if (sgot == NULL)
3270 sgot = bfd_get_section_by_name (dynobj, ".got");
3271
3272 if (local_got_refcounts == NULL)
3273 {
3274 bfd_size_type amt;
3275
3276 /* We use index local_got_refcounts[-1] to count all
3277 GOT-relative relocations that do not have explicit
3278 GOT entries. */
3279 amt = LGOT_ALLOC_NELTS_FOR (symtab_hdr->sh_info) + 1;
3280 amt *= sizeof (bfd_signed_vma);
3281 local_got_refcounts = ((bfd_signed_vma *) bfd_zalloc (abfd, amt));
3282 if (local_got_refcounts == NULL)
3283 return FALSE;
3284
3285 local_got_refcounts++;
3286 elf_local_got_refcounts (abfd) = local_got_refcounts;
3287 }
915e5146
HPN
3288 break;
3289
3290 default:
3291 break;
3292 }
3293
3294 /* Some relocs require a global offset table (but perhaps not a
3295 specific GOT entry). */
4d96d128 3296 switch (r_type)
915e5146 3297 {
100382c7
HPN
3298 case R_CRIS_16_DTPREL:
3299 case R_CRIS_32_DTPREL:
3300 /* Not requesting .got.rela for an executable: the contents
3301 of the first entry is constant there. For a shared
3302 library, we need .got.rela for the R_CRIS_DTPMOD
3303 relocation at index 3. */
3304 if (!info->shared)
3305 break;
3306 /* Fall through. */
3307
75f500d7 3308 case R_CRIS_32_IE:
100382c7
HPN
3309 case R_CRIS_32_GD:
3310 case R_CRIS_16_GOT_GD:
3311 case R_CRIS_32_GOT_GD:
3312 case R_CRIS_32_GOT_TPREL:
3313 case R_CRIS_16_GOT_TPREL:
3314 /* Fall through. */
3315
44aa49bb
HPN
3316 /* For R_CRIS_16_GOTPLT and R_CRIS_32_GOTPLT, we need a GOT
3317 entry only for local symbols. Unfortunately, we don't know
3318 until later on if there's a version script that forces the
3319 symbol local. We must have the .rela.got section in place
3320 before we know if the symbol looks global now, so we need
3321 to treat the reloc just like for R_CRIS_16_GOT and
3322 R_CRIS_32_GOT. */
3323 case R_CRIS_16_GOTPLT:
3324 case R_CRIS_32_GOTPLT:
915e5146
HPN
3325 case R_CRIS_16_GOT:
3326 case R_CRIS_32_GOT:
44aa49bb
HPN
3327 if (srelgot == NULL
3328 && (h != NULL || info->shared))
3329 {
3330 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3331 if (srelgot == NULL)
3332 {
3496cb2a
L
3333 srelgot = bfd_make_section_with_flags (dynobj,
3334 ".rela.got",
3335 (SEC_ALLOC
3336 | SEC_LOAD
3337 | SEC_HAS_CONTENTS
3338 | SEC_IN_MEMORY
3339 | SEC_LINKER_CREATED
3340 | SEC_READONLY));
44aa49bb 3341 if (srelgot == NULL
44aa49bb 3342 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 3343 return FALSE;
44aa49bb
HPN
3344 }
3345 }
100382c7 3346 break;
44aa49bb 3347
100382c7
HPN
3348 default:
3349 break;
3350 }
915e5146 3351
100382c7
HPN
3352 /* Warn and error for invalid input. */
3353 switch (r_type)
3354 {
75f500d7 3355 case R_CRIS_32_IE:
100382c7
HPN
3356 case R_CRIS_32_TPREL:
3357 case R_CRIS_16_TPREL:
3358 case R_CRIS_32_GD:
3359 if (info->shared)
915e5146 3360 {
100382c7
HPN
3361 (*_bfd_error_handler)
3362 (_("%B, section %A:\n relocation %s not valid"
3363 " in a shared object;"
3364 " typically an option mixup, recompile with -fPIC"),
3365 abfd,
3366 sec,
3367 cris_elf_howto_table[r_type].name);
3368 /* Don't return FALSE here; we want messages for all of
3369 these and the error behavior is ungraceful
3370 anyway. */
3371 }
3372 default:
3373 break;
3374 }
915e5146 3375
100382c7
HPN
3376 switch (r_type)
3377 {
3378 case R_CRIS_32_GD:
3379 case R_CRIS_16_GOT_GD:
3380 case R_CRIS_32_GOT_GD:
3381 /* These are requests for tls_index entries, run-time R_CRIS_DTP. */
3382 got_element_size = 8;
3383 r_symndx_lgot = LGOT_DTP_NDX (r_symndx);
3384 break;
915e5146 3385
100382c7
HPN
3386 case R_CRIS_16_DTPREL:
3387 case R_CRIS_32_DTPREL:
3388 /* These two just request for the constant-index
3389 module-local tls_index-sized GOT entry, which we add
3390 elsewhere. */
915e5146
HPN
3391 break;
3392
75f500d7 3393 case R_CRIS_32_IE:
100382c7
HPN
3394 case R_CRIS_32_GOT_TPREL:
3395 case R_CRIS_16_GOT_TPREL:
3396 r_symndx_lgot = LGOT_TPREL_NDX (r_symndx);
3397
75f500d7 3398 /* Those relocs also require that a DSO is of type
100382c7
HPN
3399 Initial Exec. Like other targets, we don't reset this
3400 flag even if the relocs are GC:ed away. */
3401 if (info->shared)
3402 info->flags |= DF_STATIC_TLS;
3403 break;
3404
3405 /* Let's list the other assembler-generated TLS-relocs too,
3406 just to show that they're not forgotten. */
3407 case R_CRIS_16_TPREL:
3408 case R_CRIS_32_TPREL:
915e5146
HPN
3409 default:
3410 break;
3411 }
3412
4d96d128 3413 switch (r_type)
06c15ad7 3414 {
915e5146
HPN
3415 case R_CRIS_16_GOTPLT:
3416 case R_CRIS_32_GOTPLT:
3417 /* Mark that we need a GOT entry if the PLT entry (and its GOT
3418 entry) is eliminated. We can only do this for a non-local
3419 symbol. */
3420 if (h != NULL)
3421 {
100382c7 3422 elf_cris_hash_entry (h)->gotplt_refcount++;
915e5146
HPN
3423 goto handle_gotplt_reloc;
3424 }
3425 /* If h is NULL then this is a local symbol, and we must make a
3426 GOT entry for it, so handle it like a GOT reloc. */
3427 /* Fall through. */
3428
75f500d7 3429 case R_CRIS_32_IE:
100382c7
HPN
3430 case R_CRIS_32_GD:
3431 case R_CRIS_16_GOT_GD:
3432 case R_CRIS_32_GOT_GD:
3433 case R_CRIS_32_GOT_TPREL:
3434 case R_CRIS_16_GOT_TPREL:
915e5146
HPN
3435 case R_CRIS_16_GOT:
3436 case R_CRIS_32_GOT:
3437 /* This symbol requires a global offset table entry. */
915e5146
HPN
3438 if (h != NULL)
3439 {
51b64d56 3440 if (h->got.refcount == 0)
915e5146 3441 {
915e5146
HPN
3442 /* Make sure this symbol is output as a dynamic symbol. */
3443 if (h->dynindx == -1)
3444 {
c152c796 3445 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3446 return FALSE;
915e5146 3447 }
915e5146 3448 }
100382c7
HPN
3449
3450 /* Update the sum of reloc counts for this symbol. */
51b64d56 3451 h->got.refcount++;
100382c7
HPN
3452
3453 switch (r_type)
3454 {
3455 case R_CRIS_16_GOT:
3456 case R_CRIS_32_GOT:
3457 if (elf_cris_hash_entry (h)->reg_got_refcount == 0)
3458 {
3459 /* Allocate space in the .got section. */
3460 sgot->size += got_element_size;
3461 /* Allocate relocation space. */
3462 srelgot->size += sizeof (Elf32_External_Rela);
3463 }
3464 elf_cris_hash_entry (h)->reg_got_refcount++;
3465 break;
3466
3467 case R_CRIS_32_GD:
3468 case R_CRIS_16_GOT_GD:
3469 case R_CRIS_32_GOT_GD:
3470 if (elf_cris_hash_entry (h)->dtp_refcount == 0)
3471 {
3472 /* Allocate space in the .got section. */
3473 sgot->size += got_element_size;
3474 /* Allocate relocation space. */
3475 srelgot->size += sizeof (Elf32_External_Rela);
3476 }
3477 elf_cris_hash_entry (h)->dtp_refcount++;
3478 break;
3479
75f500d7 3480 case R_CRIS_32_IE:
100382c7
HPN
3481 case R_CRIS_32_GOT_TPREL:
3482 case R_CRIS_16_GOT_TPREL:
3483 if (elf_cris_hash_entry (h)->tprel_refcount == 0)
3484 {
3485 /* Allocate space in the .got section. */
3486 sgot->size += got_element_size;
3487 /* Allocate relocation space. */
3488 srelgot->size += sizeof (Elf32_External_Rela);
3489 }
3490 elf_cris_hash_entry (h)->tprel_refcount++;
3491 break;
3492
3493 default:
3494 BFD_FAIL ();
3495 break;
3496 }
915e5146
HPN
3497 }
3498 else
3499 {
3500 /* This is a global offset table entry for a local symbol. */
100382c7 3501 if (local_got_refcounts[r_symndx_lgot] == 0)
915e5146 3502 {
100382c7 3503 sgot->size += got_element_size;
915e5146
HPN
3504 if (info->shared)
3505 {
100382c7
HPN
3506 /* If we are generating a shared object, we need
3507 to output a R_CRIS_RELATIVE reloc so that the
3508 dynamic linker can adjust this GOT entry.
3509 Similarly for non-regular got entries. */
eea6121a 3510 srelgot->size += sizeof (Elf32_External_Rela);
915e5146
HPN
3511 }
3512 }
100382c7
HPN
3513 /* Update the reloc-specific count. */
3514 local_got_refcounts[r_symndx_lgot]++;
3515
3516 /* This one is the sum of all the others. */
51b64d56 3517 local_got_refcounts[r_symndx]++;
915e5146
HPN
3518 }
3519 break;
3520
100382c7
HPN
3521 case R_CRIS_16_DTPREL:
3522 case R_CRIS_32_DTPREL:
915e5146
HPN
3523 case R_CRIS_32_GOTREL:
3524 /* This reference requires a global offset table.
3525 FIXME: The actual refcount isn't used currently; the .got
3526 section can't be removed if there were any references in the
3527 input. */
3528 local_got_refcounts[-1]++;
3529 break;
3530
3531 handle_gotplt_reloc:
3532
3533 case R_CRIS_32_PLT_GOTREL:
3534 /* This reference requires a global offset table. */
3535 local_got_refcounts[-1]++;
3536 /* Fall through. */
3537
3538 case R_CRIS_32_PLT_PCREL:
3539 /* This symbol requires a procedure linkage table entry. We
3540 actually build the entry in adjust_dynamic_symbol,
3541 because this might be a case of linking PIC code which is
3542 never referenced by a dynamic object, in which case we
3543 don't need to generate a procedure linkage table entry
3544 after all. */
3545
ada1953e
HPN
3546 /* Beware: if we'd check for visibility of the symbol here
3547 (and not marking the need for a PLT when non-visible), we'd
3548 get into trouble with keeping handling consistent with
3549 regards to relocs found before definition and GOTPLT
3550 handling. Eliminable PLT entries will be dealt with later
3551 anyway. */
3552 if (h == NULL)
915e5146
HPN
3553 continue;
3554
f5385ebf 3555 h->needs_plt = 1;
51b64d56 3556 h->plt.refcount++;
915e5146
HPN
3557 break;
3558
3559 case R_CRIS_8:
3560 case R_CRIS_16:
3561 case R_CRIS_32:
3562 /* Let's help debug shared library creation. Any of these
0d08de41
HPN
3563 relocs *can* be used in shared libs, but pages containing
3564 them cannot be shared, so they're not appropriate for
3565 common use. Don't warn for sections we don't care about,
3566 such as debug sections or non-constant sections. We
3567 can't help tables of (global) function pointers, for
3568 example, though they must be emitted in a (writable) data
3569 section to avoid having impure text sections. */
915e5146
HPN
3570 if (info->shared
3571 && (sec->flags & SEC_ALLOC) != 0
3572 && (sec->flags & SEC_READONLY) != 0)
3573 {
3574 /* FIXME: How do we make this optionally a warning only? */
8f615d07 3575 (*_bfd_error_handler)
bac23f82
HPN
3576 (_("%B, section %A:\n relocation %s should not"
3577 " be used in a shared object; recompile with -fPIC"),
d003868e
AM
3578 abfd,
3579 sec,
8f615d07 3580 cris_elf_howto_table[r_type].name);
915e5146 3581 }
0d08de41
HPN
3582 if (h != NULL)
3583 {
3584 h->non_got_ref = 1;
100382c7 3585
0d08de41
HPN
3586 /* Make sure a plt entry is created for this symbol if it
3587 turns out to be a function defined by a dynamic object. */
3588 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3589 h->plt.refcount++;
3590 }
3591
3592 /* If we are creating a shared library and this is not a local
3593 symbol, we need to copy the reloc into the shared library.
3594 However when linking with -Bsymbolic and this is a global
3595 symbol which is defined in an object we are including in the
3596 link (i.e., DEF_REGULAR is set), then we can resolve the
3597 reloc directly. At this point we have not seen all the input
3598 files, so it is possible that DEF_REGULAR is not set now but
3599 will be set later (it is never cleared). In case of a weak
3600 definition, DEF_REGULAR may be cleared later by a strong
3601 definition in a shared library. We account for that
3602 possibility below by storing information in the relocs_copied
3603 field of the hash table entry. A similar situation occurs
3604 when creating shared libraries and symbol visibility changes
3605 render the symbol local. */
3606
3607 /* No need to do anything if we're not creating a shared object. */
3608 if (! info->shared)
3609 break;
3610
3611 /* We don't need to handle relocs into sections not going into
3612 the "real" output. */
3613 if ((sec->flags & SEC_ALLOC) == 0)
3614 break;
3615
3616 /* We may need to create a reloc section in the dynobj and made room
3617 for this reloc. */
3618 if (sreloc == NULL)
3619 {
3620 sreloc = _bfd_elf_make_dynamic_reloc_section
3621 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
3622
3623 if (sreloc == NULL)
3624 return FALSE;
3625 }
3626
3627 if (sec->flags & SEC_READONLY)
3628 info->flags |= DF_TEXTREL;
3629
3630 sreloc->size += sizeof (Elf32_External_Rela);
3631 break;
915e5146
HPN
3632
3633 case R_CRIS_8_PCREL:
3634 case R_CRIS_16_PCREL:
3635 case R_CRIS_32_PCREL:
3636 if (h != NULL)
3637 {
f5385ebf 3638 h->non_got_ref = 1;
915e5146
HPN
3639
3640 /* Make sure a plt entry is created for this symbol if it
3641 turns out to be a function defined by a dynamic object. */
0a4787a0
HPN
3642 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3643 h->plt.refcount++;
915e5146
HPN
3644 }
3645
3646 /* If we are creating a shared library and this is not a local
3647 symbol, we need to copy the reloc into the shared library.
3648 However when linking with -Bsymbolic and this is a global
3649 symbol which is defined in an object we are including in the
3650 link (i.e., DEF_REGULAR is set), then we can resolve the
3651 reloc directly. At this point we have not seen all the input
3652 files, so it is possible that DEF_REGULAR is not set now but
3653 will be set later (it is never cleared). In case of a weak
3654 definition, DEF_REGULAR may be cleared later by a strong
3655 definition in a shared library. We account for that
3656 possibility below by storing information in the relocs_copied
3657 field of the hash table entry. A similar situation occurs
3658 when creating shared libraries and symbol visibility changes
3659 render the symbol local. */
3660
3661 /* No need to do anything if we're not creating a shared object. */
3662 if (! info->shared)
3663 break;
3664
3665 /* We don't need to handle relocs into sections not going into
3666 the "real" output. */
3667 if ((sec->flags & SEC_ALLOC) == 0)
3668 break;
3669
0d08de41
HPN
3670 /* If the symbol is local, then we know already we can
3671 eliminate the reloc. */
3672 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3673 break;
bac23f82 3674
0d08de41
HPN
3675 /* If this is with -Bsymbolic and the symbol isn't weak, and
3676 is defined by an ordinary object (the ones we include in
3677 this shared library) then we can also eliminate the
3678 reloc. See comment above for more eliminable cases which
3679 we can't identify at this time. */
3680 if (info->symbolic
3681 && h->root.type != bfd_link_hash_defweak
3682 && h->def_regular)
3683 break;
915e5146 3684
83bac4b0
NC
3685 /* We may need to create a reloc section in the dynobj and made room
3686 for this reloc. */
915e5146
HPN
3687 if (sreloc == NULL)
3688 {
83bac4b0
NC
3689 sreloc = _bfd_elf_make_dynamic_reloc_section
3690 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
915e5146 3691
83bac4b0 3692 if (sreloc == NULL)
b34976b6 3693 return FALSE;
915e5146
HPN
3694 }
3695
eea6121a 3696 sreloc->size += sizeof (Elf32_External_Rela);
915e5146 3697
0d08de41
HPN
3698 /* We count the number of PC relative relocations we have
3699 entered for this symbol, so that we can discard them
3700 again if the symbol is later defined by a regular object.
3701 We know that h is really a pointer to an
915e5146 3702 elf_cris_link_hash_entry. */
0d08de41
HPN
3703 {
3704 struct elf_cris_link_hash_entry *eh;
3705 struct elf_cris_pcrel_relocs_copied *p;
915e5146 3706
0d08de41 3707 eh = elf_cris_hash_entry (h);
915e5146 3708
0d08de41 3709 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
bfbff9eb 3710 if (p->section == sec)
0d08de41 3711 break;
915e5146 3712
0d08de41
HPN
3713 if (p == NULL)
3714 {
3715 p = ((struct elf_cris_pcrel_relocs_copied *)
3716 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
3717 if (p == NULL)
3718 return FALSE;
3719 p->next = eh->pcrel_relocs_copied;
3720 eh->pcrel_relocs_copied = p;
bfbff9eb 3721 p->section = sec;
0d08de41
HPN
3722 p->count = 0;
3723 p->r_type = r_type;
3724 }
915e5146 3725
0d08de41
HPN
3726 ++p->count;
3727 }
915e5146
HPN
3728 break;
3729
06c15ad7
HPN
3730 /* This relocation describes the C++ object vtable hierarchy.
3731 Reconstruct it for later use during GC. */
3732 case R_CRIS_GNU_VTINHERIT:
c152c796 3733 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 3734 return FALSE;
06c15ad7 3735 break;
a7c10850 3736
06c15ad7
HPN
3737 /* This relocation describes which C++ vtable entries are actually
3738 used. Record for later use during GC. */
3739 case R_CRIS_GNU_VTENTRY:
d17e0c6e
JB
3740 BFD_ASSERT (h != NULL);
3741 if (h != NULL
3742 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 3743 return FALSE;
06c15ad7 3744 break;
4d96d128 3745
100382c7
HPN
3746 case R_CRIS_16_TPREL:
3747 case R_CRIS_32_TPREL:
3748 /* Already warned above, when necessary. */
3749 break;
3750
4d96d128
HPN
3751 default:
3752 /* Other relocs do not appear here. */
3753 bfd_set_error (bfd_error_bad_value);
b34976b6 3754 return FALSE;
06c15ad7
HPN
3755 }
3756 }
a7c10850 3757
b34976b6 3758 return TRUE;
06c15ad7 3759}
4da81684 3760
915e5146
HPN
3761/* Set the sizes of the dynamic sections. */
3762
b34976b6 3763static bfd_boolean
4dfe6ac6
NC
3764elf_cris_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
3765 struct bfd_link_info *info)
915e5146 3766{
4dfe6ac6 3767 struct elf_cris_link_hash_table * htab;
915e5146
HPN
3768 bfd *dynobj;
3769 asection *s;
b34976b6
AM
3770 bfd_boolean plt;
3771 bfd_boolean relocs;
915e5146 3772
4dfe6ac6
NC
3773 htab = elf_cris_hash_table (info);
3774 if (htab == NULL)
3775 return FALSE;
3776
915e5146
HPN
3777 dynobj = elf_hash_table (info)->dynobj;
3778 BFD_ASSERT (dynobj != NULL);
3779
3780 if (elf_hash_table (info)->dynamic_sections_created)
3781 {
3782 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 3783 if (info->executable)
915e5146
HPN
3784 {
3785 s = bfd_get_section_by_name (dynobj, ".interp");
3786 BFD_ASSERT (s != NULL);
eea6121a 3787 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
915e5146
HPN
3788 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3789 }
3790 }
3791 else
3792 {
3793 /* Adjust all expected GOTPLT uses to use a GOT entry instead. */
4dfe6ac6
NC
3794 elf_cris_link_hash_traverse (htab, elf_cris_adjust_gotplt_to_got,
3795 info);
915e5146
HPN
3796
3797 /* We may have created entries in the .rela.got section.
3798 However, if we are not creating the dynamic sections, we will
3799 not actually use these entries. Reset the size of .rela.got,
3800 which will cause it to get stripped from the output file
3801 below. */
3802 s = bfd_get_section_by_name (dynobj, ".rela.got");
3803 if (s != NULL)
eea6121a 3804 s->size = 0;
915e5146
HPN
3805 }
3806
3807 /* If this is a -Bsymbolic shared link, then we need to discard all PC
3808 relative relocs against symbols defined in a regular object. We
3809 allocated space for them in the check_relocs routine, but we will not
3810 fill them in in the relocate_section routine. We also discard space
3811 for relocs that have become for local symbols due to symbol
4d96d128
HPN
3812 visibility changes. For programs, we discard space for relocs for
3813 symbols not referenced by any dynamic object. */
915e5146 3814 if (info->shared)
4dfe6ac6 3815 elf_cris_link_hash_traverse (htab,
4d96d128 3816 elf_cris_discard_excess_dso_dynamics,
4dfe6ac6 3817 info);
4d96d128 3818 else
4dfe6ac6 3819 elf_cris_link_hash_traverse (htab,
4d96d128 3820 elf_cris_discard_excess_program_dynamics,
4dfe6ac6 3821 info);
915e5146
HPN
3822
3823 /* The check_relocs and adjust_dynamic_symbol entry points have
3824 determined the sizes of the various dynamic sections. Allocate
3825 memory for them. */
b34976b6
AM
3826 plt = FALSE;
3827 relocs = FALSE;
915e5146
HPN
3828 for (s = dynobj->sections; s != NULL; s = s->next)
3829 {
3830 const char *name;
915e5146
HPN
3831
3832 if ((s->flags & SEC_LINKER_CREATED) == 0)
3833 continue;
3834
3835 /* It's OK to base decisions on the section name, because none
3836 of the dynobj section names depend upon the input files. */
3837 name = bfd_get_section_name (dynobj, s);
3838
915e5146
HPN
3839 if (strcmp (name, ".plt") == 0)
3840 {
c456f082
AM
3841 /* Remember whether there is a PLT. */
3842 plt = s->size != 0;
915e5146 3843 }
100382c7
HPN
3844 else if (strcmp (name, ".got.plt") == 0)
3845 {
3846 /* The .got.plt contains the .got header as well as the
3847 actual .got.plt contents. The .got header may contain a
3848 R_CRIS_DTPMOD entry at index 3. */
4dfe6ac6 3849 s->size += htab->dtpmod_refcount != 0
100382c7
HPN
3850 ? 8 : 0;
3851 }
0112cd26 3852 else if (CONST_STRNEQ (name, ".rela"))
915e5146 3853 {
100382c7 3854 if (strcmp (name, ".rela.got") == 0
4dfe6ac6 3855 && htab->dtpmod_refcount != 0
100382c7
HPN
3856 && info->shared)
3857 s->size += sizeof (Elf32_External_Rela);
3858
c456f082 3859 if (s->size != 0)
915e5146 3860 {
915e5146
HPN
3861 /* Remember whether there are any reloc sections other
3862 than .rela.plt. */
3863 if (strcmp (name, ".rela.plt") != 0)
b34976b6 3864 relocs = TRUE;
915e5146 3865
915e5146
HPN
3866 /* We use the reloc_count field as a counter if we need
3867 to copy relocs into the output file. */
3868 s->reloc_count = 0;
3869 }
3870 }
0112cd26 3871 else if (! CONST_STRNEQ (name, ".got")
c456f082 3872 && strcmp (name, ".dynbss") != 0)
915e5146
HPN
3873 {
3874 /* It's not one of our sections, so don't allocate space. */
3875 continue;
3876 }
3877
c456f082 3878 if (s->size == 0)
915e5146 3879 {
c456f082
AM
3880 /* If we don't need this section, strip it from the
3881 output file. This is mostly to handle .rela.bss and
3882 .rela.plt. We must create both sections in
3883 create_dynamic_sections, because they must be created
3884 before the linker maps input sections to output
3885 sections. The linker does that before
3886 adjust_dynamic_symbol is called, and it is that
3887 function which decides whether anything needs to go
3888 into these sections. */
8423293d 3889 s->flags |= SEC_EXCLUDE;
915e5146
HPN
3890 continue;
3891 }
3892
c456f082
AM
3893 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3894 continue;
3895
915e5146
HPN
3896 /* Allocate memory for the section contents. We use bfd_zalloc here
3897 in case unused entries are not reclaimed before the section's
3898 contents are written out. This should not happen, but this way
3899 if it does, we will not write out garbage. For reloc sections,
3900 this will make entries have the type R_CRIS_NONE. */
eea6121a 3901 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 3902 if (s->contents == NULL)
b34976b6 3903 return FALSE;
915e5146
HPN
3904 }
3905
3906 if (elf_hash_table (info)->dynamic_sections_created)
3907 {
3908 /* Add some entries to the .dynamic section. We fill in the
3909 values later, in elf_cris_finish_dynamic_sections, but we
3910 must add the entries now so that we get the correct size for
3911 the .dynamic section. The DT_DEBUG entry is filled in by the
3912 dynamic linker and used by the debugger. */
dc810e39 3913#define add_dynamic_entry(TAG, VAL) \
5a580b3a 3914 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 3915
915e5146
HPN
3916 if (!info->shared)
3917 {
dc810e39 3918 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 3919 return FALSE;
915e5146
HPN
3920 }
3921
3922 if (plt)
3923 {
dc810e39
AM
3924 if (!add_dynamic_entry (DT_PLTGOT, 0)
3925 || !add_dynamic_entry (DT_PLTRELSZ, 0)
3926 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
3927 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 3928 return FALSE;
915e5146
HPN
3929 }
3930
3931 if (relocs)
3932 {
dc810e39
AM
3933 if (!add_dynamic_entry (DT_RELA, 0)
3934 || !add_dynamic_entry (DT_RELASZ, 0)
3935 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 3936 return FALSE;
915e5146
HPN
3937 }
3938
99e4ae17 3939 if ((info->flags & DF_TEXTREL) != 0)
915e5146 3940 {
dc810e39 3941 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3942 return FALSE;
915e5146
HPN
3943 info->flags |= DF_TEXTREL;
3944 }
3945 }
dc810e39 3946#undef add_dynamic_entry
915e5146 3947
b34976b6 3948 return TRUE;
915e5146
HPN
3949}
3950
3951/* This function is called via elf_cris_link_hash_traverse if we are
3952 creating a shared object. In the -Bsymbolic case, it discards the
3953 space allocated to copy PC relative relocs against symbols which
3954 are defined in regular objects. For the normal non-symbolic case,
3955 we also discard space for relocs that have become local due to
3956 symbol visibility changes. We allocated space for them in the
3957 check_relocs routine, but we won't fill them in in the
3958 relocate_section routine. */
3959
b34976b6 3960static bfd_boolean
4d96d128 3961elf_cris_discard_excess_dso_dynamics (h, inf)
915e5146
HPN
3962 struct elf_cris_link_hash_entry *h;
3963 PTR inf;
3964{
3965 struct elf_cris_pcrel_relocs_copied *s;
3966 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3967
3968 /* If a symbol has been forced local or we have found a regular
3969 definition for the symbolic link case, then we won't be needing
3970 any relocs. */
f5385ebf
AM
3971 if (h->root.def_regular
3972 && (h->root.forced_local
915e5146
HPN
3973 || info->symbolic))
3974 {
3975 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
bfbff9eb
HPN
3976 {
3977 asection *sreloc
e236b51d
HPN
3978 = _bfd_elf_get_dynamic_reloc_section (elf_hash_table (info)
3979 ->dynobj,
bfbff9eb
HPN
3980 s->section,
3981 /*rela?*/ TRUE);
3982 sreloc->size -= s->count * sizeof (Elf32_External_Rela);
3983 }
0d08de41
HPN
3984 return TRUE;
3985 }
3986
3987 /* If we have accounted for PC-relative relocs for read-only
3988 sections, now is the time to warn for them. We can't do it in
3989 cris_elf_check_relocs, because we don't know the status of all
3990 symbols at that time (and it's common to force symbols local
3991 late). */
3992
3993 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
bfbff9eb
HPN
3994 if ((s->section->flags & SEC_READONLY) != 0)
3995 {
3996 /* FIXME: How do we make this optionally a warning only? */
3997 (*_bfd_error_handler)
3998 (_("%B, section `%A', to symbol `%s':\n"
3999 " relocation %s should not be used"
4000 " in a shared object; recompile with -fPIC"),
4001 s->section->owner,
4002 s->section,
4003 h->root.root.root.string,
4004 cris_elf_howto_table[s->r_type].name);
4005
4006 info->flags |= DF_TEXTREL;
4007 }
4d96d128 4008
b34976b6 4009 return TRUE;
4d96d128
HPN
4010}
4011
4012/* This function is called via elf_cris_link_hash_traverse if we are *not*
4013 creating a shared object. We discard space for relocs for symbols put
4014 in the .got, but which we found we do not have to resolve at run-time. */
4015
b34976b6 4016static bfd_boolean
4d96d128
HPN
4017elf_cris_discard_excess_program_dynamics (h, inf)
4018 struct elf_cris_link_hash_entry *h;
4019 PTR inf;
4020{
4021 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4022
4023 /* If we're not creating a shared library and have a symbol which is
4024 referred to by .got references, but the symbol is defined locally,
e4a2175c
HPN
4025 (or rather, not defined by a DSO) then lose the reloc for the .got
4026 (don't allocate room for it). Likewise for relocs for something
4027 for which we create a PLT. */
f5385ebf 4028 if (!h->root.def_dynamic
e4a2175c 4029 || h->root.plt.refcount > 0)
4d96d128 4030 {
100382c7 4031 if (h->reg_got_refcount > 0
4d96d128
HPN
4032 /* The size of this section is only valid and in sync with the
4033 various reference counts if we do dynamic; don't decrement it
4034 otherwise. */
4035 && elf_hash_table (info)->dynamic_sections_created)
4036 {
4037 bfd *dynobj = elf_hash_table (info)->dynobj;
4038 asection *srelgot;
4039
4040 BFD_ASSERT (dynobj != NULL);
99c79b2e 4041
4d96d128
HPN
4042 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
4043
4044 BFD_ASSERT (srelgot != NULL);
4045
eea6121a 4046 srelgot->size -= sizeof (Elf32_External_Rela);
4d96d128
HPN
4047 }
4048
4049 /* If the locally-defined symbol isn't used by a DSO, then we don't
4050 have to export it as a dynamic symbol. This was already done for
4051 functions; doing this for all symbols would presumably not
e5dfef09
HPN
4052 introduce new problems. Of course we don't do this if we're
4053 exporting all dynamic symbols. */
0741c7be 4054 if (! info->export_dynamic
77cfaee6 4055 && h->root.dynindx != -1
f5385ebf
AM
4056 && !h->root.def_dynamic
4057 && !h->root.ref_dynamic)
e5dfef09
HPN
4058 {
4059 h->root.dynindx = -1;
4060 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4061 h->root.dynstr_index);
4062 }
915e5146
HPN
4063 }
4064
b34976b6 4065 return TRUE;
915e5146
HPN
4066}
4067
4068/* Reject a file depending on presence and expectation of prefixed
4069 underscores on symbols. */
4da81684 4070
b34976b6 4071static bfd_boolean
4da81684
HPN
4072cris_elf_object_p (abfd)
4073 bfd *abfd;
4074{
bac23f82
HPN
4075 if (! cris_elf_set_mach_from_flags (abfd, elf_elfheader (abfd)->e_flags))
4076 return FALSE;
4077
4da81684
HPN
4078 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE))
4079 return (bfd_get_symbol_leading_char (abfd) == '_');
4080 else
4081 return (bfd_get_symbol_leading_char (abfd) == 0);
4082}
4083
bac23f82
HPN
4084/* Mark presence or absence of leading underscore. Set machine type
4085 flags from mach type. */
4da81684
HPN
4086
4087static void
4088cris_elf_final_write_processing (abfd, linker)
4089 bfd *abfd;
b34976b6 4090 bfd_boolean linker ATTRIBUTE_UNUSED;
4da81684 4091{
bac23f82
HPN
4092 unsigned long e_flags = elf_elfheader (abfd)->e_flags;
4093
4094 e_flags &= ~EF_CRIS_UNDERSCORE;
4da81684 4095 if (bfd_get_symbol_leading_char (abfd) == '_')
bac23f82
HPN
4096 e_flags |= EF_CRIS_UNDERSCORE;
4097
4098 switch (bfd_get_mach (abfd))
4099 {
4100 case bfd_mach_cris_v0_v10:
4101 e_flags |= EF_CRIS_VARIANT_ANY_V0_V10;
4102 break;
4103
4104 case bfd_mach_cris_v10_v32:
4105 e_flags |= EF_CRIS_VARIANT_COMMON_V10_V32;
4106 break;
4107
4108 case bfd_mach_cris_v32:
4109 e_flags |= EF_CRIS_VARIANT_V32;
4110 break;
4111
4112 default:
4113 _bfd_abort (__FILE__, __LINE__,
4114 _("Unexpected machine number"));
4115 }
4116
4117 elf_elfheader (abfd)->e_flags = e_flags;
4118}
4119
4120/* Set the mach type from e_flags value. */
4121
4122static bfd_boolean
4123cris_elf_set_mach_from_flags (abfd, flags)
4124 bfd *abfd;
4125 unsigned long flags;
4126{
4127 switch (flags & EF_CRIS_VARIANT_MASK)
4128 {
4129 case EF_CRIS_VARIANT_ANY_V0_V10:
4130 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v0_v10);
4131 break;
4132
4133 case EF_CRIS_VARIANT_V32:
4134 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v32);
4135 break;
4136
4137 case EF_CRIS_VARIANT_COMMON_V10_V32:
4138 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v10_v32);
4139 break;
4140
4141 default:
4142 /* Since we don't recognize them, we obviously can't support them
4143 with this code; we'd have to require that all future handling
4144 would be optional. */
4145 bfd_set_error (bfd_error_wrong_format);
4146 return FALSE;
4147 }
4148
4149 return TRUE;
4da81684
HPN
4150}
4151
4152/* Display the flags field. */
4153
b34976b6 4154static bfd_boolean
4da81684
HPN
4155cris_elf_print_private_bfd_data (abfd, ptr)
4156 bfd *abfd;
4157 PTR ptr;
4158{
4159 FILE *file = (FILE *) ptr;
4160
f12123c0 4161 BFD_ASSERT (abfd != NULL && ptr != NULL);
4da81684
HPN
4162
4163 _bfd_elf_print_private_bfd_data (abfd, ptr);
4164
4165 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
4166
4167 if (elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE)
4168 fprintf (file, _(" [symbols have a _ prefix]"));
bac23f82
HPN
4169 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4170 == EF_CRIS_VARIANT_COMMON_V10_V32)
4171 fprintf (file, _(" [v10 and v32]"));
4172 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4173 == EF_CRIS_VARIANT_V32)
4174 fprintf (file, _(" [v32]"));
4da81684
HPN
4175
4176 fputc ('\n', file);
b34976b6 4177 return TRUE;
4da81684
HPN
4178}
4179
4180/* Don't mix files with and without a leading underscore. */
4181
b34976b6 4182static bfd_boolean
4da81684
HPN
4183cris_elf_merge_private_bfd_data (ibfd, obfd)
4184 bfd *ibfd;
4185 bfd *obfd;
4186{
bac23f82 4187 int imach, omach;
4da81684 4188
82e51918 4189 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 4190 return FALSE;
4da81684
HPN
4191
4192 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4193 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 4194 return TRUE;
4da81684 4195
bac23f82
HPN
4196 imach = bfd_get_mach (ibfd);
4197
4da81684
HPN
4198 if (! elf_flags_init (obfd))
4199 {
4200 /* This happens when ld starts out with a 'blank' output file. */
b34976b6 4201 elf_flags_init (obfd) = TRUE;
4da81684 4202
bac23f82
HPN
4203 /* We ignore the linker-set mach, and instead set it according to
4204 the first input file. This would also happen if we could
4205 somehow filter out the OUTPUT_ARCH () setting from elf.sc.
4206 This allows us to keep the same linker config across
4207 cris(v0..v10) and crisv32. The drawback is that we can't force
4208 the output type, which might be a sane thing to do for a
4209 v10+v32 compatibility object. */
4210 if (! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4211 return FALSE;
4da81684
HPN
4212 }
4213
bac23f82
HPN
4214 if (bfd_get_symbol_leading_char (ibfd)
4215 != bfd_get_symbol_leading_char (obfd))
4da81684
HPN
4216 {
4217 (*_bfd_error_handler)
bac23f82 4218 (bfd_get_symbol_leading_char (ibfd) == '_'
d003868e
AM
4219 ? _("%B: uses _-prefixed symbols, but writing file with non-prefixed symbols")
4220 : _("%B: uses non-prefixed symbols, but writing file with _-prefixed symbols"),
4221 ibfd);
4da81684 4222 bfd_set_error (bfd_error_bad_value);
b34976b6 4223 return FALSE;
4da81684
HPN
4224 }
4225
bac23f82
HPN
4226 omach = bfd_get_mach (obfd);
4227
4228 if (imach != omach)
4229 {
4230 /* We can get an incompatible combination only if either is
4231 bfd_mach_cris_v32, and the other one isn't compatible. */
4232 if ((imach == bfd_mach_cris_v32
4233 && omach != bfd_mach_cris_v10_v32)
4234 || (omach == bfd_mach_cris_v32
4235 && imach != bfd_mach_cris_v10_v32))
4236 {
4237 (*_bfd_error_handler)
4238 ((imach == bfd_mach_cris_v32)
4239 ? _("%B contains CRIS v32 code, incompatible"
4240 " with previous objects")
4241 : _("%B contains non-CRIS-v32 code, incompatible"
4242 " with previous objects"),
4243 ibfd);
4244 bfd_set_error (bfd_error_bad_value);
4245 return FALSE;
4246 }
4247
4248 /* We don't have to check the case where the input is compatible
4249 with v10 and v32, because the output is already known to be set
4250 to the other (compatible) mach. */
4251 if (omach == bfd_mach_cris_v10_v32
4252 && ! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4253 return FALSE;
4254 }
4255
b34976b6 4256 return TRUE;
4da81684 4257}
99e4ae17 4258
bac23f82
HPN
4259/* Do side-effects of e_flags copying to obfd. */
4260
4261static bfd_boolean
4262cris_elf_copy_private_bfd_data (ibfd, obfd)
4263 bfd *ibfd;
4264 bfd *obfd;
4265{
4266 /* Call the base function. */
4267 if (!_bfd_elf_copy_private_bfd_data (ibfd, obfd))
4268 return FALSE;
4269
4270 /* If output is big-endian for some obscure reason, stop here. */
4271 if (_bfd_generic_verify_endian_match (ibfd, obfd) == FALSE)
4272 return FALSE;
4273
4274 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4275 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4276 return TRUE;
4277
4278 /* Do what we really came here for. */
4279 return bfd_set_arch_mach (obfd, bfd_arch_cris, bfd_get_mach (ibfd));
4280}
99e4ae17
AJ
4281
4282static enum elf_reloc_type_class
f51e552e
AM
4283elf_cris_reloc_type_class (rela)
4284 const Elf_Internal_Rela *rela;
99e4ae17 4285{
100382c7
HPN
4286 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rela->r_info);
4287 switch (r_type)
99e4ae17
AJ
4288 {
4289 case R_CRIS_RELATIVE:
4290 return reloc_class_relative;
4291 case R_CRIS_JUMP_SLOT:
4292 return reloc_class_plt;
4293 case R_CRIS_COPY:
4294 return reloc_class_copy;
4295 default:
4296 return reloc_class_normal;
4297 }
4298}
100382c7
HPN
4299
4300/* The elf_backend_got_elt_size worker. For one symbol, we can have up to
4301 two GOT entries from three types with two different sizes. We handle
4302 it as a single entry, so we can use the regular offset-calculation
4303 machinery. */
4304
4305static bfd_vma
4306elf_cris_got_elt_size (bfd *abfd ATTRIBUTE_UNUSED,
4307 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4308 struct elf_link_hash_entry *hr,
4309 bfd *ibfd,
4310 unsigned long symndx)
4311{
4312 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) hr;
100382c7
HPN
4313 bfd_vma eltsiz = 0;
4314
4315 /* We may have one regular GOT entry or up to two TLS GOT
4316 entries. */
4317 if (h == NULL)
4318 {
b2e254f9 4319 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
100382c7
HPN
4320 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (ibfd);
4321
4322 BFD_ASSERT (local_got_refcounts != NULL);
4323
4324 if (local_got_refcounts[LGOT_REG_NDX (symndx)] > 0)
4325 {
4326 /* We can't have a variable referred to both as a regular
4327 variable and through TLS relocs. */
4328 BFD_ASSERT (local_got_refcounts[LGOT_DTP_NDX (symndx)] == 0
4329 && local_got_refcounts[LGOT_TPREL_NDX (symndx)] == 0);
4330 return 4;
4331 }
4332
4333 if (local_got_refcounts[LGOT_DTP_NDX (symndx)] > 0)
4334 eltsiz += 8;
4335
4336 if (local_got_refcounts[LGOT_TPREL_NDX (symndx)] > 0)
4337 eltsiz += 4;
4338 }
4339 else
4340 {
4341 struct elf_cris_link_hash_entry *hh = elf_cris_hash_entry (h);
4342 if (hh->reg_got_refcount > 0)
4343 {
4344 /* The actual error-on-input is emitted elsewhere. */
4345 BFD_ASSERT (hh->dtp_refcount == 0 && hh->tprel_refcount == 0);
4346 return 4;
4347 }
4348
4349 if (hh->dtp_refcount > 0)
4350 eltsiz += 8;
4351
4352 if (hh->tprel_refcount > 0)
4353 eltsiz += 4;
4354 }
4355
b2e254f9
HPN
4356 /* We're only called when h->got.refcount is non-zero, so we must
4357 have a non-zero size. */
4358 BFD_ASSERT (eltsiz != 0);
100382c7
HPN
4359 return eltsiz;
4360}
06c15ad7
HPN
4361\f
4362#define ELF_ARCH bfd_arch_cris
ae95ffa6 4363#define ELF_TARGET_ID CRIS_ELF_DATA
06c15ad7
HPN
4364#define ELF_MACHINE_CODE EM_CRIS
4365#define ELF_MAXPAGESIZE 0x2000
4366
4367#define TARGET_LITTLE_SYM bfd_elf32_cris_vec
4368#define TARGET_LITTLE_NAME "elf32-cris"
4da81684 4369#define elf_symbol_leading_char 0
06c15ad7
HPN
4370
4371#define elf_info_to_howto_rel NULL
4372#define elf_info_to_howto cris_info_to_howto_rela
4373#define elf_backend_relocate_section cris_elf_relocate_section
4374#define elf_backend_gc_mark_hook cris_elf_gc_mark_hook
4375#define elf_backend_gc_sweep_hook cris_elf_gc_sweep_hook
5d5a918a 4376#define elf_backend_plt_sym_val cris_elf_plt_sym_val
06c15ad7 4377#define elf_backend_check_relocs cris_elf_check_relocs
72209a1f
HPN
4378#define elf_backend_grok_prstatus cris_elf_grok_prstatus
4379#define elf_backend_grok_psinfo cris_elf_grok_psinfo
06c15ad7
HPN
4380
4381#define elf_backend_can_gc_sections 1
51b64d56 4382#define elf_backend_can_refcount 1
06c15ad7 4383
4da81684
HPN
4384#define elf_backend_object_p cris_elf_object_p
4385#define elf_backend_final_write_processing \
4386 cris_elf_final_write_processing
4387#define bfd_elf32_bfd_print_private_bfd_data \
4388 cris_elf_print_private_bfd_data
4389#define bfd_elf32_bfd_merge_private_bfd_data \
4390 cris_elf_merge_private_bfd_data
bac23f82
HPN
4391#define bfd_elf32_bfd_copy_private_bfd_data \
4392 cris_elf_copy_private_bfd_data
4da81684 4393
06c15ad7 4394#define bfd_elf32_bfd_reloc_type_lookup cris_reloc_type_lookup
157090f7 4395#define bfd_elf32_bfd_reloc_name_lookup cris_reloc_name_lookup
06c15ad7 4396
915e5146
HPN
4397#define bfd_elf32_bfd_link_hash_table_create \
4398 elf_cris_link_hash_table_create
4399#define elf_backend_adjust_dynamic_symbol \
4400 elf_cris_adjust_dynamic_symbol
237bc7f0
HPN
4401#define elf_backend_copy_indirect_symbol \
4402 elf_cris_copy_indirect_symbol
915e5146
HPN
4403#define elf_backend_size_dynamic_sections \
4404 elf_cris_size_dynamic_sections
74541ad4 4405#define elf_backend_init_index_section _bfd_elf_init_1_index_section
915e5146
HPN
4406#define elf_backend_finish_dynamic_symbol \
4407 elf_cris_finish_dynamic_symbol
4408#define elf_backend_finish_dynamic_sections \
4409 elf_cris_finish_dynamic_sections
4410#define elf_backend_create_dynamic_sections \
4411 _bfd_elf_create_dynamic_sections
4412#define bfd_elf32_bfd_final_link \
c152c796 4413 bfd_elf_gc_common_final_link
915e5146 4414#define elf_backend_hide_symbol elf_cris_hide_symbol
99e4ae17 4415#define elf_backend_reloc_type_class elf_cris_reloc_type_class
915e5146
HPN
4416
4417#define elf_backend_want_got_plt 1
4418#define elf_backend_plt_readonly 1
4419#define elf_backend_want_plt_sym 0
4420#define elf_backend_got_header_size 12
100382c7 4421#define elf_backend_got_elt_size elf_cris_got_elt_size
915e5146 4422
06c15ad7
HPN
4423/* Later, we my want to optimize RELA entries into REL entries for dynamic
4424 linking and libraries (if it's a win of any significance). Until then,
4425 take the easy route. */
4426#define elf_backend_may_use_rel_p 0
4427#define elf_backend_may_use_rela_p 1
f0fe0e16 4428#define elf_backend_rela_normal 1
06c15ad7
HPN
4429
4430#include "elf32-target.h"
4da81684 4431
4da81684
HPN
4432#undef TARGET_LITTLE_SYM
4433#undef TARGET_LITTLE_NAME
4434#undef elf_symbol_leading_char
4435
4436#define TARGET_LITTLE_SYM bfd_elf32_us_cris_vec
4437#define TARGET_LITTLE_NAME "elf32-us-cris"
4438#define elf_symbol_leading_char '_'
16cecee5
L
4439#undef elf32_bed
4440#define elf32_bed elf32_us_cris_bed
4da81684
HPN
4441
4442#include "elf32-target.h"
This page took 1.200264 seconds and 4 git commands to generate.