*** empty log message ***
[deliverable/binutils-gdb.git] / bfd / elf32-cris.c
CommitLineData
06c15ad7 1/* CRIS-specific support for 32-bit ELF.
4dfe6ac6 2 Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
7686d77d 3 2010, 2011 Free Software Foundation, Inc.
06c15ad7
HPN
4 Contributed by Axis Communications AB.
5 Written by Hans-Peter Nilsson, based on elf32-fr30.c
915e5146 6 PIC and shlib bits based primarily on elf32-m68k.c and elf32-i386.c.
06c15ad7 7
ae9a127f 8 This file is part of BFD, the Binary File Descriptor library.
06c15ad7 9
ae9a127f
NC
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
cd123cb7 12 the Free Software Foundation; either version 3 of the License, or
ae9a127f 13 (at your option) any later version.
06c15ad7 14
ae9a127f
NC
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
06c15ad7 19
ae9a127f
NC
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
cd123cb7
NC
22 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
23 MA 02110-1301, USA. */
06c15ad7 24
06c15ad7 25#include "sysdep.h"
3db64b00 26#include "bfd.h"
06c15ad7
HPN
27#include "libbfd.h"
28#include "elf-bfd.h"
29#include "elf/cris.h"
100382c7 30#include <limits.h>
06c15ad7
HPN
31
32/* Forward declarations. */
33static reloc_howto_type * cris_reloc_type_lookup
34 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
35
a7c10850 36static void cris_info_to_howto_rela
947216bf 37 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
06c15ad7 38
bac23f82
HPN
39static bfd_reloc_status_type cris_elf_pcrel_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
41
b34976b6 42static bfd_boolean cris_elf_grok_prstatus
72209a1f
HPN
43 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
44
b34976b6 45static bfd_boolean cris_elf_grok_psinfo
72209a1f
HPN
46 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
47
b34976b6 48static bfd_boolean cris_elf_relocate_section
06c15ad7
HPN
49 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
50 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
51
52static bfd_reloc_status_type cris_final_link_relocate
53 PARAMS ((reloc_howto_type *, bfd *, asection *, bfd_byte *,
54 Elf_Internal_Rela *, bfd_vma));
55
b34976b6 56static bfd_boolean cris_elf_object_p PARAMS ((bfd *));
4da81684 57
b34976b6 58static void cris_elf_final_write_processing PARAMS ((bfd *, bfd_boolean));
4da81684 59
bac23f82
HPN
60static bfd_boolean cris_elf_set_mach_from_flags
61 PARAMS ((bfd *, unsigned long int));
62
b34976b6 63static bfd_boolean cris_elf_print_private_bfd_data PARAMS ((bfd *, PTR));
4da81684 64
b34976b6 65static bfd_boolean cris_elf_merge_private_bfd_data PARAMS ((bfd *, bfd *));
bac23f82 66static bfd_boolean cris_elf_copy_private_bfd_data PARAMS ((bfd *, bfd *));
4da81684 67
915e5146 68struct elf_cris_link_hash_entry;
b34976b6 69static bfd_boolean elf_cris_discard_excess_dso_dynamics
4d96d128 70 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 71static bfd_boolean elf_cris_discard_excess_program_dynamics
915e5146 72 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 73static bfd_boolean elf_cris_adjust_gotplt_to_got
915e5146 74 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
b34976b6 75static bfd_boolean elf_cris_try_fold_plt_to_got
915e5146
HPN
76 PARAMS ((struct elf_cris_link_hash_entry *, PTR));
77static struct bfd_hash_entry *elf_cris_link_hash_newfunc
78 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
79static struct bfd_link_hash_table *elf_cris_link_hash_table_create
80 PARAMS ((bfd *));
b34976b6 81static bfd_boolean elf_cris_adjust_dynamic_symbol
915e5146 82 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
b34976b6 83static bfd_boolean cris_elf_check_relocs
99c79b2e
AJ
84 PARAMS ((bfd *, struct bfd_link_info *, asection *,
85 const Elf_Internal_Rela *));
86
b34976b6 87static bfd_boolean elf_cris_size_dynamic_sections
915e5146 88 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 89static bfd_boolean elf_cris_finish_dynamic_symbol
915e5146
HPN
90 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
91 Elf_Internal_Sym *));
b34976b6 92static bfd_boolean elf_cris_finish_dynamic_sections
915e5146
HPN
93 PARAMS ((bfd *, struct bfd_link_info *));
94static void elf_cris_hide_symbol
b34976b6 95 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
99e4ae17 96static enum elf_reloc_type_class elf_cris_reloc_type_class
f51e552e 97 PARAMS ((const Elf_Internal_Rela *));
915e5146 98
06c15ad7
HPN
99static reloc_howto_type cris_elf_howto_table [] =
100{
101 /* This reloc does nothing. */
102 HOWTO (R_CRIS_NONE, /* type */
103 0, /* rightshift */
104 2, /* size (0 = byte, 1 = short, 2 = long) */
105 32, /* bitsize */
b34976b6 106 FALSE, /* pc_relative */
06c15ad7
HPN
107 0, /* bitpos */
108 complain_overflow_bitfield, /* complain_on_overflow */
109 bfd_elf_generic_reloc, /* special_function */
110 "R_CRIS_NONE", /* name */
b34976b6 111 FALSE, /* partial_inplace */
06c15ad7
HPN
112 0, /* src_mask */
113 0, /* dst_mask */
b34976b6 114 FALSE), /* pcrel_offset */
06c15ad7
HPN
115
116 /* An 8 bit absolute relocation. */
117 HOWTO (R_CRIS_8, /* type */
118 0, /* rightshift */
119 0, /* size (0 = byte, 1 = short, 2 = long) */
120 8, /* bitsize */
b34976b6 121 FALSE, /* pc_relative */
06c15ad7
HPN
122 0, /* bitpos */
123 complain_overflow_bitfield, /* complain_on_overflow */
124 bfd_elf_generic_reloc, /* special_function */
125 "R_CRIS_8", /* name */
b34976b6 126 FALSE, /* partial_inplace */
06c15ad7
HPN
127 0x0000, /* src_mask */
128 0x00ff, /* dst_mask */
b34976b6 129 FALSE), /* pcrel_offset */
06c15ad7
HPN
130
131 /* A 16 bit absolute relocation. */
132 HOWTO (R_CRIS_16, /* type */
133 0, /* rightshift */
134 1, /* size (0 = byte, 1 = short, 2 = long) */
135 16, /* bitsize */
b34976b6 136 FALSE, /* pc_relative */
06c15ad7
HPN
137 0, /* bitpos */
138 complain_overflow_bitfield, /* complain_on_overflow */
139 bfd_elf_generic_reloc, /* special_function */
140 "R_CRIS_16", /* name */
b34976b6 141 FALSE, /* partial_inplace */
06c15ad7
HPN
142 0x00000000, /* src_mask */
143 0x0000ffff, /* dst_mask */
b34976b6 144 FALSE), /* pcrel_offset */
06c15ad7
HPN
145
146 /* A 32 bit absolute relocation. */
147 HOWTO (R_CRIS_32, /* type */
148 0, /* rightshift */
149 2, /* size (0 = byte, 1 = short, 2 = long) */
150 32, /* bitsize */
b34976b6 151 FALSE, /* pc_relative */
06c15ad7 152 0, /* bitpos */
b2efcd36
HPN
153 /* We don't want overflow complaints for 64-bit vma builds
154 for e.g. sym+0x40000000 (or actually sym-0xc0000000 in
155 32-bit ELF) where sym=0xc0001234.
156 Don't do this for the PIC relocs, as we don't expect to
157 see them with large offsets. */
158 complain_overflow_dont, /* complain_on_overflow */
06c15ad7
HPN
159 bfd_elf_generic_reloc, /* special_function */
160 "R_CRIS_32", /* name */
b34976b6 161 FALSE, /* partial_inplace */
06c15ad7
HPN
162 0x00000000, /* src_mask */
163 0xffffffff, /* dst_mask */
b34976b6 164 FALSE), /* pcrel_offset */
06c15ad7 165
915e5146 166 /* An 8 bit PC-relative relocation. */
06c15ad7
HPN
167 HOWTO (R_CRIS_8_PCREL, /* type */
168 0, /* rightshift */
169 0, /* size (0 = byte, 1 = short, 2 = long) */
170 8, /* bitsize */
b34976b6 171 TRUE, /* pc_relative */
06c15ad7
HPN
172 0, /* bitpos */
173 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 174 cris_elf_pcrel_reloc, /* special_function */
06c15ad7 175 "R_CRIS_8_PCREL", /* name */
b34976b6 176 FALSE, /* partial_inplace */
06c15ad7
HPN
177 0x0000, /* src_mask */
178 0x00ff, /* dst_mask */
b34976b6 179 TRUE), /* pcrel_offset */
06c15ad7 180
915e5146 181 /* A 16 bit PC-relative relocation. */
06c15ad7
HPN
182 HOWTO (R_CRIS_16_PCREL, /* type */
183 0, /* rightshift */
184 1, /* size (0 = byte, 1 = short, 2 = long) */
185 16, /* bitsize */
b34976b6 186 TRUE, /* pc_relative */
06c15ad7
HPN
187 0, /* bitpos */
188 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 189 cris_elf_pcrel_reloc, /* special_function */
44aa49bb 190 "R_CRIS_16_PCREL", /* name */
b34976b6 191 FALSE, /* partial_inplace */
06c15ad7
HPN
192 0x00000000, /* src_mask */
193 0x0000ffff, /* dst_mask */
b34976b6 194 TRUE), /* pcrel_offset */
06c15ad7 195
915e5146 196 /* A 32 bit PC-relative relocation. */
06c15ad7
HPN
197 HOWTO (R_CRIS_32_PCREL, /* type */
198 0, /* rightshift */
199 2, /* size (0 = byte, 1 = short, 2 = long) */
200 32, /* bitsize */
b34976b6 201 TRUE, /* pc_relative */
06c15ad7
HPN
202 0, /* bitpos */
203 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 204 cris_elf_pcrel_reloc, /* special_function */
44aa49bb 205 "R_CRIS_32_PCREL", /* name */
b34976b6 206 FALSE, /* partial_inplace */
06c15ad7
HPN
207 0x00000000, /* src_mask */
208 0xffffffff, /* dst_mask */
b34976b6 209 TRUE), /* pcrel_offset */
06c15ad7 210
915e5146
HPN
211 /* GNU extension to record C++ vtable hierarchy. */
212 HOWTO (R_CRIS_GNU_VTINHERIT, /* type */
06c15ad7
HPN
213 0, /* rightshift */
214 2, /* size (0 = byte, 1 = short, 2 = long) */
215 0, /* bitsize */
b34976b6 216 FALSE, /* pc_relative */
06c15ad7
HPN
217 0, /* bitpos */
218 complain_overflow_dont, /* complain_on_overflow */
219 NULL, /* special_function */
220 "R_CRIS_GNU_VTINHERIT", /* name */
b34976b6 221 FALSE, /* partial_inplace */
06c15ad7
HPN
222 0, /* src_mask */
223 0, /* dst_mask */
b34976b6 224 FALSE), /* pcrel_offset */
06c15ad7 225
915e5146
HPN
226 /* GNU extension to record C++ vtable member usage. */
227 HOWTO (R_CRIS_GNU_VTENTRY, /* type */
06c15ad7
HPN
228 0, /* rightshift */
229 2, /* size (0 = byte, 1 = short, 2 = long) */
230 0, /* bitsize */
b34976b6 231 FALSE, /* pc_relative */
06c15ad7
HPN
232 0, /* bitpos */
233 complain_overflow_dont, /* complain_on_overflow */
234 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
235 "R_CRIS_GNU_VTENTRY", /* name */
b34976b6 236 FALSE, /* partial_inplace */
06c15ad7
HPN
237 0, /* src_mask */
238 0, /* dst_mask */
b34976b6 239 FALSE), /* pcrel_offset */
915e5146
HPN
240
241 /* This is used only by the dynamic linker. The symbol should exist
242 both in the object being run and in some shared library. The
243 dynamic linker copies the data addressed by the symbol from the
244 shared library into the object, because the object being
245 run has to have the data at some particular address. */
246 HOWTO (R_CRIS_COPY, /* type */
247 0, /* rightshift */
248 2, /* size (0 = byte, 1 = short, 2 = long) */
249 32, /* bitsize */
b34976b6 250 FALSE, /* pc_relative */
915e5146
HPN
251 0, /* bitpos */
252 complain_overflow_bitfield, /* complain_on_overflow */
253 bfd_elf_generic_reloc, /* special_function */
254 "R_CRIS_COPY", /* name */
b34976b6 255 FALSE, /* partial_inplace */
915e5146
HPN
256 0, /* src_mask */
257 0, /* dst_mask */
b34976b6 258 FALSE), /* pcrel_offset */
915e5146
HPN
259
260 /* Like R_CRIS_32, but used when setting global offset table entries. */
261 HOWTO (R_CRIS_GLOB_DAT, /* type */
262 0, /* rightshift */
263 2, /* size (0 = byte, 1 = short, 2 = long) */
264 32, /* bitsize */
b34976b6 265 FALSE, /* pc_relative */
915e5146
HPN
266 0, /* bitpos */
267 complain_overflow_bitfield, /* complain_on_overflow */
268 bfd_elf_generic_reloc, /* special_function */
269 "R_CRIS_GLOB_DAT", /* name */
b34976b6 270 FALSE, /* partial_inplace */
915e5146
HPN
271 0, /* src_mask */
272 0xffffffff, /* dst_mask */
b34976b6 273 FALSE), /* pcrel_offset */
915e5146
HPN
274
275 /* Marks a procedure linkage table entry for a symbol. */
276 HOWTO (R_CRIS_JUMP_SLOT, /* type */
277 0, /* rightshift */
278 2, /* size (0 = byte, 1 = short, 2 = long) */
279 32, /* bitsize */
b34976b6 280 FALSE, /* pc_relative */
915e5146
HPN
281 0, /* bitpos */
282 complain_overflow_bitfield, /* complain_on_overflow */
283 bfd_elf_generic_reloc, /* special_function */
284 "R_CRIS_JUMP_SLOT", /* name */
b34976b6 285 FALSE, /* partial_inplace */
915e5146
HPN
286 0, /* src_mask */
287 0, /* dst_mask */
b34976b6 288 FALSE), /* pcrel_offset */
915e5146
HPN
289
290 /* Used only by the dynamic linker. When the object is run, this
291 longword is set to the load address of the object, plus the
292 addend. */
293 HOWTO (R_CRIS_RELATIVE, /* type */
294 0, /* rightshift */
295 2, /* size (0 = byte, 1 = short, 2 = long) */
296 32, /* bitsize */
b34976b6 297 FALSE, /* pc_relative */
915e5146
HPN
298 0, /* bitpos */
299 complain_overflow_bitfield, /* complain_on_overflow */
300 bfd_elf_generic_reloc, /* special_function */
301 "R_CRIS_RELATIVE", /* name */
b34976b6 302 FALSE, /* partial_inplace */
915e5146
HPN
303 0, /* src_mask */
304 0xffffffff, /* dst_mask */
b34976b6 305 FALSE), /* pcrel_offset */
915e5146
HPN
306
307 /* Like R_CRIS_32, but referring to the GOT table entry for the symbol. */
308 HOWTO (R_CRIS_16_GOT, /* type */
309 0, /* rightshift */
310 1, /* size (0 = byte, 1 = short, 2 = long) */
311 16, /* bitsize */
b34976b6 312 FALSE, /* pc_relative */
915e5146
HPN
313 0, /* bitpos */
314 complain_overflow_bitfield, /* complain_on_overflow */
315 bfd_elf_generic_reloc, /* special_function */
316 "R_CRIS_16_GOT", /* name */
b34976b6 317 FALSE, /* partial_inplace */
915e5146
HPN
318 0, /* src_mask */
319 0xffff, /* dst_mask */
b34976b6 320 FALSE), /* pcrel_offset */
915e5146
HPN
321
322 HOWTO (R_CRIS_32_GOT, /* type */
323 0, /* rightshift */
324 2, /* size (0 = byte, 1 = short, 2 = long) */
325 32, /* bitsize */
b34976b6 326 FALSE, /* pc_relative */
915e5146
HPN
327 0, /* bitpos */
328 complain_overflow_bitfield, /* complain_on_overflow */
329 bfd_elf_generic_reloc, /* special_function */
330 "R_CRIS_32_GOT", /* name */
b34976b6 331 FALSE, /* partial_inplace */
915e5146
HPN
332 0, /* src_mask */
333 0xffffffff, /* dst_mask */
b34976b6 334 FALSE), /* pcrel_offset */
915e5146
HPN
335
336 /* Like R_CRIS_32_GOT, but referring to (and requesting a) PLT part of
337 the GOT table for the symbol. */
338 HOWTO (R_CRIS_16_GOTPLT, /* type */
339 0, /* rightshift */
340 1, /* size (0 = byte, 1 = short, 2 = long) */
341 16, /* bitsize */
b34976b6 342 FALSE, /* pc_relative */
915e5146
HPN
343 0, /* bitpos */
344 complain_overflow_bitfield, /* complain_on_overflow */
345 bfd_elf_generic_reloc, /* special_function */
346 "R_CRIS_16_GOTPLT", /* name */
b34976b6 347 FALSE, /* partial_inplace */
915e5146
HPN
348 0, /* src_mask */
349 0xffff, /* dst_mask */
b34976b6 350 FALSE), /* pcrel_offset */
915e5146
HPN
351
352 HOWTO (R_CRIS_32_GOTPLT, /* type */
353 0, /* rightshift */
354 2, /* size (0 = byte, 1 = short, 2 = long) */
355 32, /* bitsize */
b34976b6 356 FALSE, /* pc_relative */
915e5146
HPN
357 0, /* bitpos */
358 complain_overflow_bitfield, /* complain_on_overflow */
359 bfd_elf_generic_reloc, /* special_function */
360 "R_CRIS_32_GOTPLT", /* name */
b34976b6 361 FALSE, /* partial_inplace */
915e5146
HPN
362 0, /* src_mask */
363 0xffffffff, /* dst_mask */
b34976b6 364 FALSE), /* pcrel_offset */
915e5146
HPN
365
366 /* A 32-bit offset from GOT to (local const) symbol: no GOT entry should
367 be necessary. */
368 HOWTO (R_CRIS_32_GOTREL, /* type */
369 0, /* rightshift */
370 2, /* size (0 = byte, 1 = short, 2 = long) */
371 32, /* bitsize */
b34976b6 372 FALSE, /* pc_relative */
915e5146
HPN
373 0, /* bitpos */
374 complain_overflow_bitfield, /* complain_on_overflow */
375 bfd_elf_generic_reloc, /* special_function */
376 "R_CRIS_32_GOTREL", /* name */
b34976b6 377 FALSE, /* partial_inplace */
915e5146
HPN
378 0, /* src_mask */
379 0xffffffff, /* dst_mask */
b34976b6 380 FALSE), /* pcrel_offset */
915e5146
HPN
381
382 /* A 32-bit offset from GOT to entry for this symbol in PLT and request
383 to create PLT entry for symbol. */
384 HOWTO (R_CRIS_32_PLT_GOTREL, /* type */
385 0, /* rightshift */
386 2, /* size (0 = byte, 1 = short, 2 = long) */
387 32, /* bitsize */
b34976b6 388 FALSE, /* pc_relative */
915e5146
HPN
389 0, /* bitpos */
390 complain_overflow_bitfield, /* complain_on_overflow */
391 bfd_elf_generic_reloc, /* special_function */
392 "R_CRIS_32_PLT_GOTREL", /* name */
b34976b6 393 FALSE, /* partial_inplace */
915e5146
HPN
394 0, /* src_mask */
395 0xffffffff, /* dst_mask */
b34976b6 396 FALSE), /* pcrel_offset */
915e5146
HPN
397
398 /* A 32-bit offset from PC (location after the relocation) + addend to
399 entry for this symbol in PLT and request to create PLT entry for
400 symbol. */
401 HOWTO (R_CRIS_32_PLT_PCREL, /* type */
402 0, /* rightshift */
403 2, /* size (0 = byte, 1 = short, 2 = long) */
404 32, /* bitsize */
b34976b6 405 TRUE, /* pc_relative */
915e5146
HPN
406 0, /* bitpos */
407 complain_overflow_bitfield, /* complain_on_overflow */
bac23f82 408 cris_elf_pcrel_reloc, /* special_function */
915e5146 409 "R_CRIS_32_PLT_PCREL", /* name */
b34976b6 410 FALSE, /* partial_inplace */
915e5146
HPN
411 0, /* src_mask */
412 0xffffffff, /* dst_mask */
3926fc54
HPN
413 TRUE), /* pcrel_offset */
414
415 /* We don't handle these in any special manner and cross-format
416 linking is not supported; just recognize them enough to pass them
417 around. FIXME: do the same for most PIC relocs and add sanity
418 tests to actually refuse gracefully to handle these and PIC
419 relocs for cross-format linking. */
420#define TLSHOWTO32(name) \
421 HOWTO (name, 0, 2, 32, FALSE, 0, complain_overflow_bitfield, \
422 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffffffff, FALSE)
100382c7
HPN
423#define TLSHOWTO16X(name, X) \
424 HOWTO (name, 0, 1, 16, FALSE, 0, complain_overflow_ ## X, \
3926fc54 425 bfd_elf_generic_reloc, #name, FALSE, 0, 0xffff, FALSE)
100382c7
HPN
426#define TLSHOWTO16(name) TLSHOWTO16X(name, unsigned)
427#define TLSHOWTO16S(name) TLSHOWTO16X(name, signed)
3926fc54
HPN
428
429 TLSHOWTO32 (R_CRIS_32_GOT_GD),
430 TLSHOWTO16 (R_CRIS_16_GOT_GD),
431 TLSHOWTO32 (R_CRIS_32_GD),
432 TLSHOWTO32 (R_CRIS_DTP),
433 TLSHOWTO32 (R_CRIS_32_DTPREL),
100382c7 434 TLSHOWTO16S (R_CRIS_16_DTPREL),
3926fc54 435 TLSHOWTO32 (R_CRIS_32_GOT_TPREL),
100382c7 436 TLSHOWTO16S (R_CRIS_16_GOT_TPREL),
3926fc54 437 TLSHOWTO32 (R_CRIS_32_TPREL),
100382c7 438 TLSHOWTO16S (R_CRIS_16_TPREL),
75f500d7
HPN
439 TLSHOWTO32 (R_CRIS_DTPMOD),
440 TLSHOWTO32 (R_CRIS_32_IE)
06c15ad7
HPN
441};
442\f
443/* Map BFD reloc types to CRIS ELF reloc types. */
444
445struct cris_reloc_map
446{
447 bfd_reloc_code_real_type bfd_reloc_val;
448 unsigned int cris_reloc_val;
449};
450
451static const struct cris_reloc_map cris_reloc_map [] =
452{
453 { BFD_RELOC_NONE, R_CRIS_NONE },
454 { BFD_RELOC_8, R_CRIS_8 },
455 { BFD_RELOC_16, R_CRIS_16 },
456 { BFD_RELOC_32, R_CRIS_32 },
457 { BFD_RELOC_8_PCREL, R_CRIS_8_PCREL },
458 { BFD_RELOC_16_PCREL, R_CRIS_16_PCREL },
459 { BFD_RELOC_32_PCREL, R_CRIS_32_PCREL },
460 { BFD_RELOC_VTABLE_INHERIT, R_CRIS_GNU_VTINHERIT },
915e5146
HPN
461 { BFD_RELOC_VTABLE_ENTRY, R_CRIS_GNU_VTENTRY },
462 { BFD_RELOC_CRIS_COPY, R_CRIS_COPY },
463 { BFD_RELOC_CRIS_GLOB_DAT, R_CRIS_GLOB_DAT },
464 { BFD_RELOC_CRIS_JUMP_SLOT, R_CRIS_JUMP_SLOT },
465 { BFD_RELOC_CRIS_RELATIVE, R_CRIS_RELATIVE },
466 { BFD_RELOC_CRIS_16_GOT, R_CRIS_16_GOT },
467 { BFD_RELOC_CRIS_32_GOT, R_CRIS_32_GOT },
468 { BFD_RELOC_CRIS_16_GOTPLT, R_CRIS_16_GOTPLT },
469 { BFD_RELOC_CRIS_32_GOTPLT, R_CRIS_32_GOTPLT },
470 { BFD_RELOC_CRIS_32_GOTREL, R_CRIS_32_GOTREL },
471 { BFD_RELOC_CRIS_32_PLT_GOTREL, R_CRIS_32_PLT_GOTREL },
3926fc54
HPN
472 { BFD_RELOC_CRIS_32_PLT_PCREL, R_CRIS_32_PLT_PCREL },
473 { BFD_RELOC_CRIS_32_GOT_GD, R_CRIS_32_GOT_GD },
474 { BFD_RELOC_CRIS_16_GOT_GD, R_CRIS_16_GOT_GD },
475 { BFD_RELOC_CRIS_32_GD, R_CRIS_32_GD },
476 { BFD_RELOC_CRIS_DTP, R_CRIS_DTP },
477 { BFD_RELOC_CRIS_32_DTPREL, R_CRIS_32_DTPREL },
478 { BFD_RELOC_CRIS_16_DTPREL, R_CRIS_16_DTPREL },
479 { BFD_RELOC_CRIS_32_GOT_TPREL, R_CRIS_32_GOT_TPREL },
480 { BFD_RELOC_CRIS_16_GOT_TPREL, R_CRIS_16_GOT_TPREL },
481 { BFD_RELOC_CRIS_32_TPREL, R_CRIS_32_TPREL },
482 { BFD_RELOC_CRIS_16_TPREL, R_CRIS_16_TPREL },
75f500d7
HPN
483 { BFD_RELOC_CRIS_DTPMOD, R_CRIS_DTPMOD },
484 { BFD_RELOC_CRIS_32_IE, R_CRIS_32_IE }
06c15ad7
HPN
485};
486
487static reloc_howto_type *
488cris_reloc_type_lookup (abfd, code)
489 bfd * abfd ATTRIBUTE_UNUSED;
490 bfd_reloc_code_real_type code;
491{
908d94bf 492 unsigned int i;
06c15ad7 493
908d94bf 494 for (i = 0; i < sizeof (cris_reloc_map) / sizeof (cris_reloc_map[0]); i++)
06c15ad7
HPN
495 if (cris_reloc_map [i].bfd_reloc_val == code)
496 return & cris_elf_howto_table [cris_reloc_map[i].cris_reloc_val];
a7c10850 497
06c15ad7
HPN
498 return NULL;
499}
500
157090f7
AM
501static reloc_howto_type *
502cris_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, const char *r_name)
503{
504 unsigned int i;
505
506 for (i = 0;
507 i < sizeof (cris_elf_howto_table) / sizeof (cris_elf_howto_table[0]);
508 i++)
509 if (cris_elf_howto_table[i].name != NULL
510 && strcasecmp (cris_elf_howto_table[i].name, r_name) == 0)
511 return &cris_elf_howto_table[i];
512
513 return NULL;
514}
515
06c15ad7
HPN
516/* Set the howto pointer for an CRIS ELF reloc. */
517
518static void
519cris_info_to_howto_rela (abfd, cache_ptr, dst)
520 bfd * abfd ATTRIBUTE_UNUSED;
521 arelent * cache_ptr;
947216bf 522 Elf_Internal_Rela * dst;
06c15ad7 523{
100382c7 524 enum elf_cris_reloc_type r_type;
06c15ad7
HPN
525
526 r_type = ELF32_R_TYPE (dst->r_info);
527 BFD_ASSERT (r_type < (unsigned int) R_CRIS_max);
528 cache_ptr->howto = & cris_elf_howto_table [r_type];
529}
bac23f82
HPN
530
531bfd_reloc_status_type
532cris_elf_pcrel_reloc (abfd, reloc_entry, symbol, data, input_section,
533 output_bfd, error_message)
534 bfd *abfd ATTRIBUTE_UNUSED;
535 arelent *reloc_entry;
536 asymbol *symbol;
537 PTR data ATTRIBUTE_UNUSED;
538 asection *input_section;
539 bfd *output_bfd;
540 char **error_message ATTRIBUTE_UNUSED;
541{
542 /* By default (using only bfd_elf_generic_reloc when linking to
543 non-ELF formats) PC-relative relocs are relative to the beginning
544 of the reloc. CRIS PC-relative relocs are relative to the position
545 *after* the reloc because that's what pre-CRISv32 PC points to
546 after reading an insn field with that reloc. (For CRISv32, PC is
547 actually relative to the start of the insn, but we keep the old
548 definition.) Still, we use as much generic machinery as we can.
549
550 Only adjust when doing a final link. */
551 if (output_bfd == (bfd *) NULL)
552 reloc_entry->addend -= 1 << reloc_entry->howto->size;
553
554 return
555 bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
556 input_section, output_bfd, error_message);
557}
06c15ad7 558\f
bac23f82
HPN
559/* Support for core dump NOTE sections.
560 The slightly unintuitive code layout is an attempt to keep at least
561 some similarities with other ports, hoping to simplify general
562 changes, while still keeping Linux/CRIS and Linux/CRISv32 code apart. */
72209a1f 563
b34976b6 564static bfd_boolean
72209a1f
HPN
565cris_elf_grok_prstatus (abfd, note)
566 bfd *abfd;
567 Elf_Internal_Note *note;
568{
569 int offset;
eea6121a 570 size_t size;
72209a1f 571
bac23f82
HPN
572 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
573 switch (note->descsz)
574 {
575 default:
576 return FALSE;
577
578 case 202: /* Linux/CRISv32 */
579 /* pr_cursig */
580 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
581
582 /* pr_pid */
261b8d08 583 elf_tdata (abfd)->core_lwpid = bfd_get_32 (abfd, note->descdata + 22);
bac23f82
HPN
584
585 /* pr_reg */
586 offset = 70;
587 size = 128;
588
589 break;
590 }
591 else
592 switch (note->descsz)
593 {
72209a1f 594 default:
b34976b6 595 return FALSE;
72209a1f 596
bc0d28ee 597 case 214: /* Linux/CRIS */
72209a1f
HPN
598 /* pr_cursig */
599 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
600
601 /* pr_pid */
261b8d08 602 elf_tdata (abfd)->core_lwpid = bfd_get_32 (abfd, note->descdata + 22);
72209a1f
HPN
603
604 /* pr_reg */
605 offset = 70;
eea6121a 606 size = 140;
72209a1f
HPN
607
608 break;
bac23f82 609 }
72209a1f
HPN
610
611 /* Make a ".reg/999" section. */
612 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 613 size, note->descpos + offset);
72209a1f
HPN
614}
615
b34976b6 616static bfd_boolean
72209a1f
HPN
617cris_elf_grok_psinfo (abfd, note)
618 bfd *abfd;
619 Elf_Internal_Note *note;
620{
bac23f82
HPN
621 if (bfd_get_mach (abfd) == bfd_mach_cris_v32)
622 switch (note->descsz)
623 {
624 default:
625 return FALSE;
626
627 case 124: /* Linux/CRISv32 elf_prpsinfo */
628 elf_tdata (abfd)->core_program
629 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
630 elf_tdata (abfd)->core_command
631 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
632 }
633 else
634 switch (note->descsz)
635 {
72209a1f 636 default:
b34976b6 637 return FALSE;
72209a1f
HPN
638
639 case 124: /* Linux/CRIS elf_prpsinfo */
640 elf_tdata (abfd)->core_program
bac23f82 641 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
72209a1f 642 elf_tdata (abfd)->core_command
bac23f82
HPN
643 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
644 }
72209a1f
HPN
645
646 /* Note that for some reason, a spurious space is tacked
647 onto the end of the args in some (at least one anyway)
648 implementations, so strip it off if it exists. */
649
650 {
651 char *command = elf_tdata (abfd)->core_command;
652 int n = strlen (command);
653
654 if (0 < n && command[n - 1] == ' ')
655 command[n - 1] = '\0';
656 }
657
b34976b6 658 return TRUE;
72209a1f
HPN
659}
660\f
915e5146
HPN
661/* The name of the dynamic interpreter. This is put in the .interp
662 section. */
663
664#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
665
666/* The size in bytes of an entry in the procedure linkage table. */
667
668#define PLT_ENTRY_SIZE 20
bac23f82 669#define PLT_ENTRY_SIZE_V32 26
915e5146
HPN
670
671/* The first entry in an absolute procedure linkage table looks like this. */
672
673static const bfd_byte elf_cris_plt0_entry[PLT_ENTRY_SIZE] =
674{
675 0xfc, 0xe1,
cedb70c5 676 0x7e, 0x7e, /* push mof. */
915e5146
HPN
677 0x7f, 0x0d, /* (dip [pc+]) */
678 0, 0, 0, 0, /* Replaced with address of .got + 4. */
679 0x30, 0x7a, /* move [...],mof */
680 0x7f, 0x0d, /* (dip [pc+]) */
681 0, 0, 0, 0, /* Replaced with address of .got + 8. */
bac23f82
HPN
682 0x30, 0x09 /* jump [...] */
683};
684
685static const bfd_byte elf_cris_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
686{
687 0x84, 0xe2, /* subq 4,$sp */
688 0x6f, 0xfe, /* move.d 0,$acr */
689 0, 0, 0, 0, /* Replaced by address of .got + 4. */
690 0x7e, 0x7a, /* move $mof,[$sp] */
691 0x3f, 0x7a, /* move [$acr],$mof */
692 0x04, 0xf2, /* addq 4,acr */
693 0x6f, 0xfa, /* move.d [$acr],$acr */
694 0xbf, 0x09, /* jump $acr */
695 0xb0, 0x05, /* nop */
696 0, 0 /* Pad out to 26 bytes. */
915e5146
HPN
697};
698
699/* Subsequent entries in an absolute procedure linkage table look like
700 this. */
701
702static const bfd_byte elf_cris_plt_entry[PLT_ENTRY_SIZE] =
703{
704 0x7f, 0x0d, /* (dip [pc+]) */
705 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
706 0x30, 0x09, /* jump [...] */
707 0x3f, 0x7e, /* move [pc+],mof */
708 0, 0, 0, 0, /* Replaced with offset into relocation table. */
709 0x2f, 0xfe, /* add.d [pc+],pc */
710 0xec, 0xff,
711 0xff, 0xff /* Replaced with offset to start of .plt. */
712};
713
bac23f82
HPN
714static const bfd_byte elf_cris_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
715{
716 0x6f, 0xfe, /* move.d 0,$acr */
717 0, 0, 0, 0, /* Replaced with address of this symbol in .got. */
718 0x6f, 0xfa, /* move.d [$acr],$acr */
719 0xbf, 0x09, /* jump $acr */
720 0xb0, 0x05, /* nop */
721 0x3f, 0x7e, /* move 0,mof */
722 0, 0, 0, 0, /* Replaced with offset into relocation table. */
723 0xbf, 0x0e, /* ba start_of_plt0_entry */
724 0, 0, 0, 0, /* Replaced with offset to plt0 entry. */
725 0xb0, 0x05 /* nop */
726};
727
915e5146
HPN
728/* The first entry in a PIC procedure linkage table looks like this. */
729
730static const bfd_byte elf_cris_pic_plt0_entry[PLT_ENTRY_SIZE] =
731{
732 0xfc, 0xe1, 0x7e, 0x7e, /* push mof */
733 0x04, 0x01, 0x30, 0x7a, /* move [r0+4],mof */
734 0x08, 0x01, 0x30, 0x09, /* jump [r0+8] */
735 0, 0, 0, 0, 0, 0, 0, 0, /* Pad out to 20 bytes. */
736};
737
bac23f82
HPN
738static const bfd_byte elf_cris_pic_plt0_entry_v32[PLT_ENTRY_SIZE_V32] =
739{
740 0x84, 0xe2, /* subq 4,$sp */
741 0x04, 0x01, /* addoq 4,$r0,$acr */
742 0x7e, 0x7a, /* move $mof,[$sp] */
743 0x3f, 0x7a, /* move [$acr],$mof */
744 0x04, 0xf2, /* addq 4,$acr */
745 0x6f, 0xfa, /* move.d [$acr],$acr */
746 0xbf, 0x09, /* jump $acr */
747 0xb0, 0x05, /* nop */
748 0, 0, /* Pad out to 26 bytes. */
749 0, 0, 0, 0,
750 0, 0, 0, 0
751};
752
915e5146
HPN
753/* Subsequent entries in a PIC procedure linkage table look like this. */
754
755static const bfd_byte elf_cris_pic_plt_entry[PLT_ENTRY_SIZE] =
756{
757 0x6f, 0x0d, /* (bdap [pc+].d,r0) */
758 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
759 0x30, 0x09, /* jump [...] */
760 0x3f, 0x7e, /* move [pc+],mof */
761 0, 0, 0, 0, /* Replaced with offset into relocation table. */
762 0x2f, 0xfe, /* add.d [pc+],pc */
763 0xec, 0xff, /* Replaced with offset to start of .plt. */
764 0xff, 0xff
765};
bac23f82
HPN
766
767static const bfd_byte elf_cris_pic_plt_entry_v32[PLT_ENTRY_SIZE_V32] =
768{
769 0x6f, 0x0d, /* addo.d 0,$r0,$acr */
770 0, 0, 0, 0, /* Replaced with offset of this symbol in .got. */
771 0x6f, 0xfa, /* move.d [$acr],$acr */
772 0xbf, 0x09, /* jump $acr */
773 0xb0, 0x05, /* nop */
774 0x3f, 0x7e, /* move relocoffs,$mof */
775 0, 0, 0, 0, /* Replaced with offset into relocation table. */
776 0xbf, 0x0e, /* ba start_of_plt */
777 0, 0, 0, 0, /* Replaced with offset to start of .plt. */
778 0xb0, 0x05 /* nop */
779};
915e5146
HPN
780\f
781/* We copy elf32-m68k.c and elf32-i386.c for the basic linker hash bits
782 (and most other PIC/shlib stuff). Check that we don't drift away
783 without reason.
784
785 The CRIS linker, like the m68k and i386 linkers (and probably the rest
786 too) needs to keep track of the number of relocs that it decides to
787 copy in check_relocs for each symbol. This is so that it can discard
788 PC relative relocs if it doesn't need them when linking with
789 -Bsymbolic. We store the information in a field extending the regular
790 ELF linker hash table. */
791
792/* This structure keeps track of the number of PC relative relocs we have
793 copied for a given symbol. */
794
795struct elf_cris_pcrel_relocs_copied
796{
797 /* Next section. */
798 struct elf_cris_pcrel_relocs_copied *next;
0d08de41 799
915e5146
HPN
800 /* A section in dynobj. */
801 asection *section;
0d08de41 802
915e5146
HPN
803 /* Number of relocs copied in this section. */
804 bfd_size_type count;
0d08de41
HPN
805
806 /* Example of reloc being copied, for message. */
807 enum elf_cris_reloc_type r_type;
915e5146
HPN
808};
809
810/* CRIS ELF linker hash entry. */
811
812struct elf_cris_link_hash_entry
813{
814 struct elf_link_hash_entry root;
815
816 /* Number of PC relative relocs copied for this symbol. */
817 struct elf_cris_pcrel_relocs_copied *pcrel_relocs_copied;
818
819 /* The GOTPLT references are CRIS-specific; the goal is to avoid having
820 both a general GOT and a PLT-specific GOT entry for the same symbol,
821 when it is referenced both as a function and as a function pointer.
822
823 Number of GOTPLT references for a function. */
824 bfd_signed_vma gotplt_refcount;
825
826 /* Actual GOTPLT index for this symbol, if applicable, or zero if not
827 (zero is never used as an index). FIXME: We should be able to fold
828 this with gotplt_refcount in a union, like the got and plt unions in
829 elf_link_hash_entry. */
830 bfd_size_type gotplt_offset;
100382c7
HPN
831
832 /* The root.got.refcount is the sum of the regular reference counts
833 (this) and those members below. We have to keep a separate count
834 to track when we've found the first (or last) reference to a
835 regular got entry. The offset is in root.got.offset. */
836 bfd_signed_vma reg_got_refcount;
837
838 /* Similar to the above, the number of reloc references to this
839 symbols that need a R_CRIS_32_TPREL slot. The offset is in
840 root.got.offset, because this and .dtp_refcount can't validly
841 happen when there's also a regular GOT entry; that's invalid
842 input for which an error is emitted. */
843 bfd_signed_vma tprel_refcount;
844
845 /* Similar to the above, the number of reloc references to this
846 symbols that need a R_CRIS_DTP slot. The offset is in
847 root.got.offset; plus 4 if .tprel_refcount > 0. */
848 bfd_signed_vma dtp_refcount;
915e5146
HPN
849};
850
100382c7
HPN
851/* The local_got_refcounts and local_got_offsets are a multiple of
852 LSNUM in size, namely LGOT_ALLOC_NELTS_FOR(LSNUM) (plus one for the
853 refcount for GOT itself, see code), with the summary / group offset
854 for local symbols located at offset N, reference counts for
855 ordinary (address) relocs at offset N + LSNUM, for R_CRIS_DTP
856 relocs at offset N + 2*LSNUM, and for R_CRIS_32_TPREL relocs at N +
857 3*LSNUM. */
858
859#define LGOT_REG_NDX(x) ((x) + symtab_hdr->sh_info)
860#define LGOT_DTP_NDX(x) ((x) + 2 * symtab_hdr->sh_info)
861#define LGOT_TPREL_NDX(x) ((x) + 3 * symtab_hdr->sh_info)
862#define LGOT_ALLOC_NELTS_FOR(x) ((x) * 4)
863
915e5146
HPN
864/* CRIS ELF linker hash table. */
865
866struct elf_cris_link_hash_table
867{
868 struct elf_link_hash_table root;
869
870 /* We can't use the PLT offset and calculate to get the GOTPLT offset,
871 since we try and avoid creating GOTPLT:s when there's already a GOT.
872 Instead, we keep and update the next available index here. */
873 bfd_size_type next_gotplt_entry;
100382c7
HPN
874
875 /* The number of R_CRIS_32_DTPREL and R_CRIS_16_DTPREL that have
876 been seen for any input; if != 0, then the constant-offset
877 R_CRIS_DTPMOD is needed for this DSO/executable. This turns
878 negative at relocation, so that we don't need an extra flag for
879 when the reloc is output. */
880 bfd_signed_vma dtpmod_refcount;
915e5146
HPN
881};
882
883/* Traverse a CRIS ELF linker hash table. */
884
885#define elf_cris_link_hash_traverse(table, func, info) \
886 (elf_link_hash_traverse \
887 (&(table)->root, \
4dfe6ac6 888 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
915e5146
HPN
889 (info)))
890
891/* Get the CRIS ELF linker hash table from a link_info structure. */
892
893#define elf_cris_hash_table(p) \
4dfe6ac6
NC
894 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
895 == CRIS_ELF_DATA ? ((struct elf_cris_link_hash_table *) ((p)->hash)) : NULL)
915e5146 896
100382c7
HPN
897/* Get the CRIS ELF linker hash entry from a regular hash entry (the
898 "parent class"). The .root reference is just a simple type
899 check on the argument. */
900
901#define elf_cris_hash_entry(p) \
902 ((struct elf_cris_link_hash_entry *) (&(p)->root))
903
915e5146
HPN
904/* Create an entry in a CRIS ELF linker hash table. */
905
906static struct bfd_hash_entry *
4dfe6ac6
NC
907elf_cris_link_hash_newfunc (struct bfd_hash_entry *entry,
908 struct bfd_hash_table *table,
909 const char *string)
915e5146
HPN
910{
911 struct elf_cris_link_hash_entry *ret =
912 (struct elf_cris_link_hash_entry *) entry;
913
914 /* Allocate the structure if it has not already been allocated by a
915 subclass. */
916 if (ret == (struct elf_cris_link_hash_entry *) NULL)
917 ret = ((struct elf_cris_link_hash_entry *)
918 bfd_hash_allocate (table,
919 sizeof (struct elf_cris_link_hash_entry)));
920 if (ret == (struct elf_cris_link_hash_entry *) NULL)
921 return (struct bfd_hash_entry *) ret;
922
923 /* Call the allocation method of the superclass. */
924 ret = ((struct elf_cris_link_hash_entry *)
925 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
926 table, string));
927 if (ret != (struct elf_cris_link_hash_entry *) NULL)
928 {
929 ret->pcrel_relocs_copied = NULL;
930 ret->gotplt_refcount = 0;
931 ret->gotplt_offset = 0;
100382c7
HPN
932 ret->dtp_refcount = 0;
933 ret->tprel_refcount = 0;
934 ret->reg_got_refcount = 0;
915e5146
HPN
935 }
936
937 return (struct bfd_hash_entry *) ret;
938}
939
940/* Create a CRIS ELF linker hash table. */
941
942static struct bfd_link_hash_table *
4dfe6ac6 943elf_cris_link_hash_table_create (bfd *abfd)
915e5146
HPN
944{
945 struct elf_cris_link_hash_table *ret;
dc810e39 946 bfd_size_type amt = sizeof (struct elf_cris_link_hash_table);
915e5146 947
e2d34d7d 948 ret = ((struct elf_cris_link_hash_table *) bfd_malloc (amt));
915e5146
HPN
949 if (ret == (struct elf_cris_link_hash_table *) NULL)
950 return NULL;
951
66eb6687
AM
952 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
953 elf_cris_link_hash_newfunc,
4dfe6ac6
NC
954 sizeof (struct elf_cris_link_hash_entry),
955 CRIS_ELF_DATA))
915e5146 956 {
e2d34d7d 957 free (ret);
915e5146
HPN
958 return NULL;
959 }
960
961 /* Initialize to skip over the first three entries in the gotplt; they
962 are used for run-time symbol evaluation. */
963 ret->next_gotplt_entry = 12;
964
100382c7
HPN
965 /* We haven't seen any R_CRIS_nn_GOT_TPREL initially. */
966 ret->dtpmod_refcount = 0;
967
915e5146
HPN
968 return &ret->root.root;
969}
970\f
06c15ad7 971/* Perform a single relocation. By default we use the standard BFD
915e5146 972 routines, with a few tweaks. */
06c15ad7
HPN
973
974static bfd_reloc_status_type
975cris_final_link_relocate (howto, input_bfd, input_section, contents, rel,
976 relocation)
977 reloc_howto_type * howto;
978 bfd * input_bfd;
979 asection * input_section;
980 bfd_byte * contents;
981 Elf_Internal_Rela * rel;
982 bfd_vma relocation;
983{
915e5146 984 bfd_reloc_status_type r;
100382c7 985 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
915e5146
HPN
986
987 /* PC-relative relocations are relative to the position *after*
988 the reloc. Note that for R_CRIS_8_PCREL the adjustment is
989 not a single byte, since PC must be 16-bit-aligned. */
100382c7 990 switch (r_type)
915e5146
HPN
991 {
992 /* Check that the 16-bit GOT relocs are positive. */
993 case R_CRIS_16_GOTPLT:
994 case R_CRIS_16_GOT:
995 if ((bfd_signed_vma) relocation < 0)
996 return bfd_reloc_overflow;
997 break;
998
999 case R_CRIS_32_PLT_PCREL:
1000 case R_CRIS_32_PCREL:
1001 relocation -= 2;
1002 /* Fall through. */
1003 case R_CRIS_8_PCREL:
1004 case R_CRIS_16_PCREL:
1005 relocation -= 2;
1006 break;
1007
1008 default:
1009 break;
1010 }
1011
1012 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
06c15ad7
HPN
1013 contents, rel->r_offset,
1014 relocation, rel->r_addend);
1015 return r;
1016}
1017\f
100382c7
HPN
1018
1019/* The number of errors left before we stop outputting reloc-specific
1020 explanatory messages. By coincidence, this works nicely together
1021 with the default number of messages you'll get from LD about
1022 "relocation truncated to fit" messages before you get an
1023 "additional relocation overflows omitted from the output". */
1024static int additional_relocation_error_msg_count = 10;
1025
06c15ad7
HPN
1026/* Relocate an CRIS ELF section. See elf32-fr30.c, from where this was
1027 copied, for further comments. */
1028
b34976b6 1029static bfd_boolean
4dfe6ac6
NC
1030cris_elf_relocate_section (bfd *output_bfd ATTRIBUTE_UNUSED,
1031 struct bfd_link_info *info,
1032 bfd *input_bfd,
1033 asection *input_section,
1034 bfd_byte *contents,
1035 Elf_Internal_Rela *relocs,
1036 Elf_Internal_Sym *local_syms,
1037 asection **local_sections)
06c15ad7 1038{
4dfe6ac6 1039 struct elf_cris_link_hash_table * htab;
915e5146 1040 bfd *dynobj;
b34976b6
AM
1041 Elf_Internal_Shdr *symtab_hdr;
1042 struct elf_link_hash_entry **sym_hashes;
915e5146
HPN
1043 bfd_vma *local_got_offsets;
1044 asection *sgot;
1045 asection *splt;
1046 asection *sreloc;
b34976b6
AM
1047 Elf_Internal_Rela *rel;
1048 Elf_Internal_Rela *relend;
100382c7 1049 asection *srelgot;
06c15ad7 1050
4dfe6ac6
NC
1051 htab = elf_cris_hash_table (info);
1052 if (htab == NULL)
1053 return FALSE;
1054
915e5146
HPN
1055 dynobj = elf_hash_table (info)->dynobj;
1056 local_got_offsets = elf_local_got_offsets (input_bfd);
06c15ad7
HPN
1057 symtab_hdr = & elf_tdata (input_bfd)->symtab_hdr;
1058 sym_hashes = elf_sym_hashes (input_bfd);
1059 relend = relocs + input_section->reloc_count;
1060
915e5146
HPN
1061 sgot = NULL;
1062 splt = NULL;
1063 sreloc = NULL;
100382c7 1064 srelgot = NULL;
915e5146
HPN
1065
1066 if (dynobj != NULL)
1067 {
1068 splt = bfd_get_section_by_name (dynobj, ".plt");
1069 sgot = bfd_get_section_by_name (dynobj, ".got");
1070 }
1071
06c15ad7
HPN
1072 for (rel = relocs; rel < relend; rel ++)
1073 {
b34976b6
AM
1074 reloc_howto_type *howto;
1075 unsigned long r_symndx;
1076 Elf_Internal_Sym *sym;
1077 asection *sec;
1078 struct elf_link_hash_entry *h;
1079 bfd_vma relocation;
1080 bfd_reloc_status_type r;
1081 const char *symname = NULL;
100382c7 1082 enum elf_cris_reloc_type r_type;
a7c10850 1083
06c15ad7 1084 r_type = ELF32_R_TYPE (rel->r_info);
a7c10850 1085
06c15ad7
HPN
1086 if ( r_type == R_CRIS_GNU_VTINHERIT
1087 || r_type == R_CRIS_GNU_VTENTRY)
1088 continue;
a7c10850 1089
f0fe0e16 1090 r_symndx = ELF32_R_SYM (rel->r_info);
915e5146 1091 howto = cris_elf_howto_table + r_type;
06c15ad7
HPN
1092 h = NULL;
1093 sym = NULL;
1094 sec = NULL;
a7c10850 1095
06c15ad7
HPN
1096 if (r_symndx < symtab_hdr->sh_info)
1097 {
1098 sym = local_syms + r_symndx;
1099 sec = local_sections [r_symndx];
8517fae7 1100 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
a7c10850 1101
dc810e39
AM
1102 symname = (bfd_elf_string_from_elf_section
1103 (input_bfd, symtab_hdr->sh_link, sym->st_name));
1104 if (symname == NULL)
1105 symname = bfd_section_name (input_bfd, sec);
06c15ad7
HPN
1106 }
1107 else
1108 {
560e09e9
NC
1109 bfd_boolean warned;
1110 bfd_boolean unresolved_reloc;
0a4787a0 1111
b2a8e766
AM
1112 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1113 r_symndx, symtab_hdr, sym_hashes,
1114 h, sec, relocation,
1115 unresolved_reloc, warned);
915e5146 1116
100382c7
HPN
1117 symname = h->root.root.string;
1118
560e09e9 1119 if (unresolved_reloc
915e5146
HPN
1120 /* Perhaps we should detect the cases that
1121 sec->output_section is expected to be NULL like i386 and
1122 m68k, but apparently (and according to elfxx-ia64.c) all
1123 valid cases are where the symbol is defined in a shared
1124 object which we link dynamically against. This includes
1125 PLT relocs for which we've created a PLT entry and other
1126 relocs for which we're prepared to create dynamic
1127 relocations.
1128
1129 For now, new situations cause us to just err when
1130 sec->output_offset is NULL but the object with the symbol
1131 is *not* dynamically linked against. Thus this will
1132 automatically remind us so we can see if there are other
1133 valid cases we need to revisit. */
560e09e9
NC
1134 && (sec->owner->flags & DYNAMIC) != 0)
1135 relocation = 0;
1136
1137 else if (h->root.type == bfd_link_hash_defined
1138 || h->root.type == bfd_link_hash_defweak)
1139 {
1140 /* Here follow the cases where the relocation value must
1141 be zero (or when further handling is simplified when
1142 zero). I can't claim to understand the various
1143 conditions and they weren't described in the files
1144 where I copied them from (elf32-m68k.c and
1145 elf32-i386.c), but let's mention examples of where
1146 they happen. FIXME: Perhaps define and use a
1147 dynamic_symbol_p function like ia64.
1148
1149 - When creating a shared library, we can have an
1150 ordinary relocation for a symbol defined in a shared
1151 library (perhaps the one we create). We then make
1152 the relocation value zero, as the value seen now will
1153 be added into the relocation addend in this shared
1154 library, but must be handled only at dynamic-link
1155 time. FIXME: Not sure this example covers the
1156 h->elf_link_hash_flags test, though it's there in
1157 other targets. */
1158 if (info->shared
1159 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1160 || !h->def_regular)
560e09e9
NC
1161 && (input_section->flags & SEC_ALLOC) != 0
1162 && (r_type == R_CRIS_8
1163 || r_type == R_CRIS_16
1164 || r_type == R_CRIS_32
1165 || r_type == R_CRIS_8_PCREL
1166 || r_type == R_CRIS_16_PCREL
1167 || r_type == R_CRIS_32_PCREL))
915e5146 1168 relocation = 0;
1d5316ab
AM
1169 else if (!info->relocatable && unresolved_reloc
1170 && (_bfd_elf_section_offset (output_bfd, info,
1171 input_section,
1172 rel->r_offset)
1173 != (bfd_vma) -1))
915e5146 1174 {
560e09e9 1175 _bfd_error_handler
bac23f82 1176 (_("%B, section %A: unresolvable relocation %s against symbol `%s'"),
d003868e
AM
1177 input_bfd,
1178 input_section,
8f615d07 1179 cris_elf_howto_table[r_type].name,
d003868e 1180 symname);
915e5146 1181 bfd_set_error (bfd_error_bad_value);
b34976b6 1182 return FALSE;
915e5146 1183 }
06c15ad7 1184 }
06c15ad7 1185 }
a7c10850 1186
ab96bf03 1187 if (sec != NULL && elf_discarded_section (sec))
e4067dbb
DJ
1188 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1189 rel, relend, howto, contents);
ab96bf03
AM
1190
1191 if (info->relocatable)
1192 continue;
1193
915e5146 1194 switch (r_type)
06c15ad7 1195 {
915e5146
HPN
1196 case R_CRIS_16_GOTPLT:
1197 case R_CRIS_32_GOTPLT:
1198 /* This is like the case for R_CRIS_32_GOT and R_CRIS_16_GOT,
1199 but we require a PLT, and the PLT handling will take care of
1200 filling in the PLT-specific GOT entry. For the GOT offset,
1201 calculate it as we do when filling it in for the .got.plt
1202 section. If we don't have a PLT, punt to GOT handling. */
1203 if (h != NULL
1204 && ((struct elf_cris_link_hash_entry *) h)->gotplt_offset != 0)
06c15ad7 1205 {
915e5146
HPN
1206 asection *sgotplt
1207 = bfd_get_section_by_name (dynobj, ".got.plt");
1208 bfd_vma got_offset;
a7c10850 1209
915e5146
HPN
1210 BFD_ASSERT (h->dynindx != -1);
1211 BFD_ASSERT (sgotplt != NULL);
a7c10850 1212
915e5146
HPN
1213 got_offset
1214 = ((struct elf_cris_link_hash_entry *) h)->gotplt_offset;
06c15ad7 1215
915e5146 1216 relocation = got_offset;
06c15ad7 1217 break;
915e5146 1218 }
06c15ad7 1219
4d96d128 1220 /* We didn't make a PLT entry for this symbol. Maybe everything is
915e5146
HPN
1221 folded into the GOT. Other than folding, this happens when
1222 statically linking PIC code, or when using -Bsymbolic. Check
1223 that we instead have a GOT entry as done for us by
1224 elf_cris_adjust_dynamic_symbol, and drop through into the
e4a2175c
HPN
1225 ordinary GOT cases. This must not happen for the
1226 executable, because any reference it does to a function
1227 that is satisfied by a DSO must generate a PLT. We assume
1228 these call-specific relocs don't address non-functions. */
1229 if (h != NULL
1230 && (h->got.offset == (bfd_vma) -1
1231 || (!info->shared
f5385ebf
AM
1232 && !(h->def_regular
1233 || (!h->def_dynamic
1234 && h->root.type == bfd_link_hash_undefweak)))))
915e5146
HPN
1235 {
1236 (*_bfd_error_handler)
e4a2175c 1237 ((h->got.offset == (bfd_vma) -1)
bac23f82 1238 ? _("%B, section %A: No PLT nor GOT for relocation %s"
d003868e 1239 " against symbol `%s'")
bac23f82 1240 : _("%B, section %A: No PLT for relocation %s"
d003868e
AM
1241 " against symbol `%s'"),
1242 input_bfd,
1243 input_section,
915e5146 1244 cris_elf_howto_table[r_type].name,
ada1953e
HPN
1245 (symname != NULL && symname[0] != '\0'
1246 ? symname : _("[whose name is lost]")));
915e5146
HPN
1247
1248 /* FIXME: Perhaps blaming input is not the right thing to
1249 do; this is probably an internal error. But it is true
1250 that we didn't like that particular input. */
1251 bfd_set_error (bfd_error_bad_value);
b34976b6 1252 return FALSE;
915e5146
HPN
1253 }
1254 /* Fall through. */
1255
1256 /* The size of the actual relocation is not used here; we only
1257 fill in the GOT table here. */
1258 case R_CRIS_16_GOT:
1259 case R_CRIS_32_GOT:
1260 {
1261 bfd_vma off;
1262
1263 /* Note that despite using RELA relocations, the .got contents
1264 is always filled in with the link-relative relocation
1265 value; the addend. */
1266
1267 if (h != NULL)
1268 {
1269 off = h->got.offset;
1270 BFD_ASSERT (off != (bfd_vma) -1);
1271
1272 if (!elf_hash_table (info)->dynamic_sections_created
205cfeb0 1273 || (! info->shared
f5385ebf 1274 && (h->def_regular
e4a2175c 1275 || h->type == STT_FUNC
f5385ebf 1276 || h->needs_plt))
915e5146
HPN
1277 || (info->shared
1278 && (info->symbolic || h->dynindx == -1)
f5385ebf 1279 && h->def_regular))
915e5146 1280 {
4d96d128 1281 /* This wasn't checked above for ! info->shared, but
e4a2175c
HPN
1282 must hold there if we get here; the symbol must
1283 be defined in the regular program or be undefweak
1284 or be a function or otherwise need a PLT. */
6849c52f
HPN
1285 BFD_ASSERT (!elf_hash_table (info)->dynamic_sections_created
1286 || info->shared
f5385ebf 1287 || h->def_regular
e4a2175c 1288 || h->type == STT_FUNC
f5385ebf 1289 || h->needs_plt
6849c52f 1290 || h->root.type == bfd_link_hash_undefweak);
4d96d128 1291
915e5146 1292 /* This is actually a static link, or it is a
6849c52f
HPN
1293 -Bsymbolic link and the symbol is defined locally,
1294 or is undefweak, or the symbol was forced to be
1295 local because of a version file, or we're not
1296 creating a dynamic object. We must initialize this
1297 entry in the global offset table. Since the offset
1298 must always be a multiple of 4, we use the least
1299 significant bit to record whether we have
1300 initialized it already.
1301
1302 If this GOT entry should be runtime-initialized, we
1303 will create a .rela.got relocation entry to
1304 initialize the value. This is done in the
1305 finish_dynamic_symbol routine. */
915e5146
HPN
1306 if ((off & 1) != 0)
1307 off &= ~1;
1308 else
1309 {
1310 bfd_put_32 (output_bfd, relocation,
1311 sgot->contents + off);
1312 h->got.offset |= 1;
1313 }
1314 }
1315 }
1316 else
1317 {
1318 BFD_ASSERT (local_got_offsets != NULL
1319 && local_got_offsets[r_symndx] != (bfd_vma) -1);
1320
1321 off = local_got_offsets[r_symndx];
1322
1323 /* The offset must always be a multiple of 4. We use
1324 the least significant bit to record whether we have
1325 already generated the necessary reloc. */
1326 if ((off & 1) != 0)
1327 off &= ~1;
1328 else
1329 {
1330 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1331
1332 if (info->shared)
1333 {
915e5146 1334 Elf_Internal_Rela outrel;
947216bf 1335 bfd_byte *loc;
915e5146 1336
100382c7
HPN
1337 if (srelgot == NULL)
1338 srelgot
1339 = bfd_get_section_by_name (dynobj, ".rela.got");
1340 BFD_ASSERT (srelgot != NULL);
915e5146
HPN
1341
1342 outrel.r_offset = (sgot->output_section->vma
1343 + sgot->output_offset
1344 + off);
1345 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
1346 outrel.r_addend = relocation;
100382c7
HPN
1347 loc = srelgot->contents;
1348 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 1349 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
915e5146
HPN
1350 }
1351
1352 local_got_offsets[r_symndx] |= 1;
1353 }
1354 }
1355
1356 relocation = sgot->output_offset + off;
1357 if (rel->r_addend != 0)
1358 {
1359 /* We can't do anything for a relocation which is against
1360 a symbol *plus offset*. GOT holds relocations for
1361 symbols. Make this an error; the compiler isn't
1362 allowed to pass us these kinds of things. */
1363 if (h == NULL)
1364 (*_bfd_error_handler)
bac23f82 1365 (_("%B, section %A: relocation %s with non-zero addend %d"
d003868e
AM
1366 " against local symbol"),
1367 input_bfd,
1368 input_section,
915e5146 1369 cris_elf_howto_table[r_type].name,
d003868e 1370 rel->r_addend);
915e5146
HPN
1371 else
1372 (*_bfd_error_handler)
bac23f82 1373 (_("%B, section %A: relocation %s with non-zero addend %d"
d003868e
AM
1374 " against symbol `%s'"),
1375 input_bfd,
1376 input_section,
915e5146
HPN
1377 cris_elf_howto_table[r_type].name,
1378 rel->r_addend,
d003868e 1379 symname[0] != '\0' ? symname : _("[whose name is lost]"));
915e5146
HPN
1380
1381 bfd_set_error (bfd_error_bad_value);
b34976b6 1382 return FALSE;
915e5146
HPN
1383 }
1384 }
1385 break;
06c15ad7 1386
915e5146 1387 case R_CRIS_32_GOTREL:
3dab95d3
HPN
1388 /* This relocation must only be performed against local symbols.
1389 It's also ok when we link a program and the symbol is either
1390 defined in an ordinary (non-DSO) object or is undefined weak. */
1391 if (h != NULL
1392 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1393 && !(!info->shared
f5385ebf
AM
1394 && (h->def_regular
1395 || (!h->def_dynamic
3dab95d3 1396 && h->root.type == bfd_link_hash_undefweak))))
915e5146
HPN
1397 {
1398 (*_bfd_error_handler)
bac23f82
HPN
1399 (_("%B, section %A: relocation %s is"
1400 " not allowed for global symbol: `%s'"),
d003868e
AM
1401 input_bfd,
1402 input_section,
915e5146 1403 cris_elf_howto_table[r_type].name,
d003868e 1404 symname);
915e5146 1405 bfd_set_error (bfd_error_bad_value);
b34976b6 1406 return FALSE;
06c15ad7
HPN
1407 }
1408
58255df3
HPN
1409 /* This can happen if we get a link error with the input ELF
1410 variant mismatching the output variant. Emit an error so
1411 it's noticed if it happens elsewhere. */
1412 if (sgot == NULL)
1413 {
1414 (*_bfd_error_handler)
bac23f82 1415 (_("%B, section %A: relocation %s with no GOT created"),
d003868e
AM
1416 input_bfd,
1417 input_section,
1418 cris_elf_howto_table[r_type].name);
58255df3 1419 bfd_set_error (bfd_error_bad_value);
b34976b6 1420 return FALSE;
58255df3
HPN
1421 }
1422
915e5146
HPN
1423 /* This relocation is like a PC-relative one, except the
1424 reference point is the location of GOT. Note that
1425 sgot->output_offset is not involved in this calculation. We
1426 always want the start of entire .got section, not the
1427 position after the reserved header. */
1428 relocation -= sgot->output_section->vma;
1429 break;
06c15ad7 1430
915e5146
HPN
1431 case R_CRIS_32_PLT_PCREL:
1432 /* Relocation is to the entry for this symbol in the
1433 procedure linkage table. */
06c15ad7 1434
915e5146
HPN
1435 /* Resolve a PLT_PCREL reloc against a local symbol directly,
1436 without using the procedure linkage table. */
0a4787a0 1437 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
915e5146
HPN
1438 break;
1439
1440 if (h->plt.offset == (bfd_vma) -1
1441 || splt == NULL)
1442 {
1443 /* We didn't make a PLT entry for this symbol. This
1444 happens when statically linking PIC code, or when
1445 using -Bsymbolic. */
1446 break;
1447 }
1448
1449 relocation = (splt->output_section->vma
1450 + splt->output_offset
1451 + h->plt.offset);
1452 break;
1453
1454 case R_CRIS_32_PLT_GOTREL:
1455 /* Like R_CRIS_32_PLT_PCREL, but the reference point is the
1456 start of the .got section. See also comment at
1457 R_CRIS_32_GOT. */
1458 relocation -= sgot->output_section->vma;
1459
1460 /* Resolve a PLT_GOTREL reloc against a local symbol directly,
1461 without using the procedure linkage table. */
0a4787a0 1462 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
915e5146
HPN
1463 break;
1464
1465 if (h->plt.offset == (bfd_vma) -1
1466 || splt == NULL)
1467 {
1468 /* We didn't make a PLT entry for this symbol. This
1469 happens when statically linking PIC code, or when
1470 using -Bsymbolic. */
1471 break;
1472 }
1473
1474 relocation = (splt->output_section->vma
1475 + splt->output_offset
1476 + h->plt.offset
1477 - sgot->output_section->vma);
1478 break;
1479
1480 case R_CRIS_8_PCREL:
1481 case R_CRIS_16_PCREL:
1482 case R_CRIS_32_PCREL:
1483 /* If the symbol was local, we need no shlib-specific handling. */
0d08de41
HPN
1484 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1485 || h->dynindx == -1)
915e5146
HPN
1486 break;
1487
1488 /* Fall through. */
1489 case R_CRIS_8:
1490 case R_CRIS_16:
1491 case R_CRIS_32:
1492 if (info->shared
cf35638d 1493 && r_symndx != STN_UNDEF
915e5146
HPN
1494 && (input_section->flags & SEC_ALLOC) != 0
1495 && ((r_type != R_CRIS_8_PCREL
1496 && r_type != R_CRIS_16_PCREL
1497 && r_type != R_CRIS_32_PCREL)
1498 || (!info->symbolic
02865b8e 1499 || (h != NULL && !h->def_regular))))
915e5146
HPN
1500 {
1501 Elf_Internal_Rela outrel;
947216bf 1502 bfd_byte *loc;
b34976b6 1503 bfd_boolean skip, relocate;
915e5146
HPN
1504
1505 /* When generating a shared object, these relocations
1506 are copied into the output file to be resolved at run
1507 time. */
1508
1509 if (sreloc == NULL)
1510 {
83bac4b0 1511 sreloc = _bfd_elf_get_dynamic_reloc_section
e236b51d 1512 (dynobj, input_section, /*rela?*/ TRUE);
83bac4b0
NC
1513 /* The section should have been created in cris_elf_check_relocs,
1514 but that function will not be called for objects which fail in
915e5146
HPN
1515 cris_elf_merge_private_bfd_data. */
1516 if (sreloc == NULL)
1517 {
915e5146 1518 bfd_set_error (bfd_error_bad_value);
b34976b6 1519 return FALSE;
915e5146
HPN
1520 }
1521 }
1522
b34976b6
AM
1523 skip = FALSE;
1524 relocate = FALSE;
915e5146 1525
c629eae0
JJ
1526 outrel.r_offset =
1527 _bfd_elf_section_offset (output_bfd, info, input_section,
1528 rel->r_offset);
1529 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1530 skip = TRUE;
b3bf42d8
HPN
1531 else if (outrel.r_offset == (bfd_vma) -2
1532 /* For now, undefined weak symbols with non-default
1533 visibility (yielding 0), like exception info for
1534 discarded sections, will get a R_CRIS_NONE
1535 relocation rather than no relocation, because we
1536 notice too late that the symbol doesn't need a
1537 relocation. */
1538 || (h != NULL
1539 && h->root.type == bfd_link_hash_undefweak
1540 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT))
b34976b6 1541 skip = TRUE, relocate = TRUE;
915e5146
HPN
1542 outrel.r_offset += (input_section->output_section->vma
1543 + input_section->output_offset);
1544
1545 if (skip)
0bb2d96a 1546 memset (&outrel, 0, sizeof outrel);
915e5146
HPN
1547 /* h->dynindx may be -1 if the symbol was marked to
1548 become local. */
1549 else if (h != NULL
1550 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1551 || !h->def_regular))
915e5146
HPN
1552 {
1553 BFD_ASSERT (h->dynindx != -1);
915e5146
HPN
1554 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1555 outrel.r_addend = relocation + rel->r_addend;
1556 }
1557 else
1558 {
74541ad4
AM
1559 outrel.r_addend = relocation + rel->r_addend;
1560
915e5146
HPN
1561 if (r_type == R_CRIS_32)
1562 {
b34976b6 1563 relocate = TRUE;
915e5146 1564 outrel.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
915e5146
HPN
1565 }
1566 else
1567 {
1568 long indx;
1569
8517fae7 1570 if (bfd_is_abs_section (sec))
915e5146
HPN
1571 indx = 0;
1572 else if (sec == NULL || sec->owner == NULL)
1573 {
1574 bfd_set_error (bfd_error_bad_value);
b34976b6 1575 return FALSE;
915e5146
HPN
1576 }
1577 else
1578 {
1579 asection *osec;
1580
74541ad4
AM
1581 /* We are turning this relocation into one
1582 against a section symbol. It would be
1583 proper to subtract the symbol's value,
1584 osec->vma, from the emitted reloc addend,
1585 but ld.so expects buggy relocs. */
915e5146
HPN
1586 osec = sec->output_section;
1587 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1588 if (indx == 0)
1589 {
74541ad4
AM
1590 osec = htab->root.text_index_section;
1591 indx = elf_section_data (osec)->dynindx;
1592 }
1593 BFD_ASSERT (indx != 0);
915e5146
HPN
1594 }
1595
915e5146 1596 outrel.r_info = ELF32_R_INFO (indx, r_type);
915e5146
HPN
1597 }
1598 }
1599
947216bf
AM
1600 loc = sreloc->contents;
1601 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1602 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
915e5146
HPN
1603
1604 /* This reloc will be computed at runtime, so there's no
1605 need to do anything now, except for R_CRIS_32 relocations
1606 that have been turned into R_CRIS_RELATIVE. */
1607 if (!relocate)
1608 continue;
1609 }
1610
1611 break;
100382c7
HPN
1612
1613 case R_CRIS_16_DTPREL:
1614 case R_CRIS_32_DTPREL:
1615 /* This relocation must only be performed against local
6718f446
HPN
1616 symbols, or to sections that are not loadable. It's also
1617 ok when we link a program and the symbol is defined in an
1618 ordinary (non-DSO) object (if it's undefined there, we've
1619 already seen an error). */
100382c7 1620 if (h != NULL
6718f446 1621 && (input_section->flags & SEC_ALLOC) != 0
100382c7
HPN
1622 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1623 && (info->shared
1624 || (!h->def_regular
1625 && h->root.type != bfd_link_hash_undefined)))
1626 {
1627 (*_bfd_error_handler)
1628 ((h->root.type == bfd_link_hash_undefined)
1629 /* We shouldn't get here for GCC-emitted code. */
1630 ? _("%B, section %A: relocation %s has an undefined"
1631 " reference to `%s', perhaps a declaration mixup?")
1632 : ("%B, section %A: relocation %s is"
1633 " not allowed for `%s', a global symbol with default"
1634 " visibility, perhaps a declaration mixup?"),
1635 input_bfd,
1636 input_section,
1637 cris_elf_howto_table[r_type].name,
1638 symname != NULL && symname[0] != '\0'
1639 ? symname : _("[whose name is lost]"));
1640 bfd_set_error (bfd_error_bad_value);
1641 return FALSE;
1642 }
1643
6718f446 1644 BFD_ASSERT ((input_section->flags & SEC_ALLOC) == 0
4dfe6ac6 1645 || htab->dtpmod_refcount != 0);
100382c7
HPN
1646
1647 /* Fill in a R_CRIS_DTPMOD reloc at offset 3 if we haven't
1648 already done so. Note that we do this in .got.plt, not
1649 in .got, as .got.plt contains the first part, still the
1650 reloc is against .got, because the linker script directs
1651 (is required to direct) them both into .got. */
4dfe6ac6 1652 if (htab->dtpmod_refcount > 0
6718f446 1653 && (input_section->flags & SEC_ALLOC) != 0)
100382c7
HPN
1654 {
1655 asection *sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1656 BFD_ASSERT (sgotplt != NULL);
1657
1658 if (info->shared)
1659 {
1660 Elf_Internal_Rela outrel;
1661 bfd_byte *loc;
1662
1663 if (srelgot == NULL)
1664 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1665 BFD_ASSERT (srelgot != NULL);
1666 loc = srelgot->contents;
1667 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1668
1669 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 12);
1670 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1671 outrel.r_offset = (sgotplt->output_section->vma
1672 + sgotplt->output_offset
1673 + 12);
1674 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTPMOD);
1675 outrel.r_addend = 0;
1676 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1677 }
1678 else
1679 {
1680 /* For an executable, the GOT entry contents is known. */
1681 bfd_put_32 (output_bfd, (bfd_vma) 1, sgotplt->contents + 12);
1682 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 16);
1683 }
1684
1685 /* Reverse the sign to mark that we've emitted the
1686 required GOT entry. */
4dfe6ac6 1687 htab->dtpmod_refcount = - htab->dtpmod_refcount;
100382c7
HPN
1688 }
1689
ebf275e3
HPN
1690 /* The relocation is the offset from the start of the module
1691 TLS block to the (local) symbol. */
100382c7 1692 relocation -= elf_hash_table (info)->tls_sec == NULL
ebf275e3 1693 ? 0 : elf_hash_table (info)->tls_sec->vma;
100382c7
HPN
1694 break;
1695
1696 case R_CRIS_32_GD:
1697 if (info->shared)
1698 {
1699 bfd_set_error (bfd_error_invalid_operation);
1700
1701 /* We've already informed in cris_elf_check_relocs that
1702 this is an error. */
1703 return FALSE;
1704 }
1705 /* Fall through. */
1706
1707 case R_CRIS_16_GOT_GD:
1708 case R_CRIS_32_GOT_GD:
1709 if (rel->r_addend != 0)
1710 {
1711 /* We can't do anything for a relocation which is against a
1712 symbol *plus offset*. The GOT holds relocations for
1713 symbols. Make this an error; the compiler isn't allowed
1714 to pass us these kinds of things. */
1715 (*_bfd_error_handler)
1716 (_("%B, section %A: relocation %s with non-zero addend %d"
1717 " against symbol `%s'"),
1718 input_bfd,
1719 input_section,
1720 cris_elf_howto_table[r_type].name,
1721 rel->r_addend,
1722 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1723
1724 bfd_set_error (bfd_error_bad_value);
1725 return FALSE;
1726 }
1727
34d3d6b9
HPN
1728 if (!info->shared
1729 && (h == NULL || h->def_regular || ELF_COMMON_DEF_P (h)))
100382c7
HPN
1730 {
1731 /* Known contents of the GOT. */
1732 bfd_vma off;
1733
1734 /* The symbol is defined in the program, so just write
019c5a2e 1735 (1, known_tpoffset) into the GOT. */
100382c7
HPN
1736 relocation -= elf_hash_table (info)->tls_sec->vma;
1737
1738 if (h != NULL)
1739 {
1740 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1741 ? h->got.offset + 4 : h->got.offset;
1742 }
1743 else
1744 {
1745 off = local_got_offsets[r_symndx];
1746 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1747 off += 4;
1748 }
1749
1750 /* We use bit 1 of the offset as a flag for GOT entry with
1751 the R_CRIS_DTP reloc, setting it when we've emitted the
1752 GOT entry and reloc. Bit 0 is used for R_CRIS_32_TPREL
1753 relocs. */
1754 if ((off & 2) == 0)
1755 {
1756 off &= ~3;
1757
1758 if (h != NULL)
1759 h->got.offset |= 2;
1760 else
1761 local_got_offsets[r_symndx] |= 2;
1762
1763 bfd_put_32 (output_bfd, 1, sgot->contents + off);
1764 bfd_put_32 (output_bfd, relocation, sgot->contents + off + 4);
1765 }
1766 else
1767 off &= ~3;
1768
1769 relocation = sgot->output_offset + off
1770 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1771 }
1772 else
1773 {
1774 /* Not all parts of the GOT entry are known; emit a real
1775 relocation. */
1776 bfd_vma off;
1777
1778 if (h != NULL)
1779 off = elf_cris_hash_entry (h)->tprel_refcount > 0
1780 ? h->got.offset + 4 : h->got.offset;
1781 else
1782 {
1783 off = local_got_offsets[r_symndx];
1784 if (local_got_offsets[LGOT_TPREL_NDX (r_symndx)])
1785 off += 4;
1786 }
1787
1788 /* See above re bit 1 and bit 0 usage. */
1789 if ((off & 2) == 0)
1790 {
1791 Elf_Internal_Rela outrel;
1792 bfd_byte *loc;
1793
1794 off &= ~3;
1795
1796 if (h != NULL)
1797 h->got.offset |= 2;
1798 else
1799 local_got_offsets[r_symndx] |= 2;
1800
1801 /* Clear the target contents of the GOT (just as a
1802 gesture; it's already cleared on allocation): this
1803 relocation is not like the other dynrelocs. */
1804 bfd_put_32 (output_bfd, 0, sgot->contents + off);
1805 bfd_put_32 (output_bfd, 0, sgot->contents + off + 4);
1806
1807 if (srelgot == NULL)
1808 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1809 BFD_ASSERT (srelgot != NULL);
1810
1811 if (h != NULL && h->dynindx != -1)
1812 {
1813 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_DTP);
1814 relocation = 0;
1815 }
1816 else
1817 {
1818 outrel.r_info = ELF32_R_INFO (0, R_CRIS_DTP);
1819
1820 /* NULL if we had an error. */
1821 relocation -= elf_hash_table (info)->tls_sec == NULL
1822 ? 0 : elf_hash_table (info)->tls_sec->vma;
1823 }
1824
1825 outrel.r_offset = (sgot->output_section->vma
1826 + sgot->output_offset
1827 + off);
1828 outrel.r_addend = relocation;
1829 loc = srelgot->contents;
1830 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1831
1832 /* NULL if we had an error. */
1833 if (srelgot->contents != NULL)
1834 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1835 }
1836 else
1837 off &= ~3;
1838
1839 relocation = sgot->output_offset + off
1840 + (r_type == R_CRIS_32_GD ? sgot->output_section->vma : 0);
1841 }
1842
1843 /* The GOT-relative offset to the GOT entry is the
1844 relocation, or for R_CRIS_32_GD, the actual address of
1845 the GOT entry. */
1846 break;
1847
75f500d7
HPN
1848 case R_CRIS_32_IE:
1849 if (info->shared)
1850 {
1851 bfd_set_error (bfd_error_invalid_operation);
1852
1853 /* We've already informed in cris_elf_check_relocs that
1854 this is an error. */
1855 return FALSE;
1856 }
1857 /* Fall through. */
1858
100382c7
HPN
1859 case R_CRIS_32_GOT_TPREL:
1860 case R_CRIS_16_GOT_TPREL:
1861 if (rel->r_addend != 0)
1862 {
1863 /* We can't do anything for a relocation which is
1864 against a symbol *plus offset*. GOT holds
1865 relocations for symbols. Make this an error; the
1866 compiler isn't allowed to pass us these kinds of
1867 things. */
1868 (*_bfd_error_handler)
1869 (_("%B, section %A: relocation %s with non-zero addend %d"
1870 " against symbol `%s'"),
1871 input_bfd,
1872 input_section,
1873 cris_elf_howto_table[r_type].name,
1874 rel->r_addend,
1875 symname[0] != '\0' ? symname : _("[whose name is lost]"));
1876 bfd_set_error (bfd_error_bad_value);
1877 return FALSE;
1878 }
1879
1880 if (!info->shared && (h == NULL || h->def_regular))
1881 {
1882 /* Known contents of the GOT. */
1883 bfd_vma off;
1884
1885 /* The symbol is defined in the program, so just write
1bc86aea 1886 the -prog_tls_size+known_tpoffset into the GOT. */
100382c7 1887 relocation -= elf_hash_table (info)->tls_sec->vma;
f6f05983 1888 relocation -= elf_hash_table (info)->tls_size;
100382c7
HPN
1889
1890 if (h != NULL)
1891 off = h->got.offset;
1892 else
1893 off = local_got_offsets[r_symndx];
1894
1895 /* Bit 0 is used to mark whether we've emitted the required
1896 entry (and if needed R_CRIS_32_TPREL reloc). Bit 1
1897 is used similarly for R_CRIS_DTP, see above. */
1898 if ((off & 1) == 0)
1899 {
1900 off &= ~3;
1901
1902 if (h != NULL)
1903 h->got.offset |= 1;
1904 else
1905 local_got_offsets[r_symndx] |= 1;
1906
1907 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1908 }
1909 else
1910 off &= ~3;
1911
75f500d7
HPN
1912 relocation = sgot->output_offset + off
1913 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
100382c7
HPN
1914 }
1915 else
1916 {
1917 /* Emit a real relocation. */
1918 bfd_vma off;
1919
1920 if (h != NULL)
1921 off = h->got.offset;
1922 else
1923 off = local_got_offsets[r_symndx];
1924
1925 /* See above re usage of bit 0 and 1. */
1926 if ((off & 1) == 0)
1927 {
1928 Elf_Internal_Rela outrel;
1929 bfd_byte *loc;
1930
1931 off &= ~3;
1932
1933 if (h != NULL)
1934 h->got.offset |= 1;
1935 else
1936 local_got_offsets[r_symndx] |= 1;
1937
1938 if (srelgot == NULL)
1939 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1940 BFD_ASSERT (srelgot != NULL);
1941
1942 if (h != NULL && h->dynindx != -1)
1943 {
1944 outrel.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_32_TPREL);
1945 relocation = 0;
1946 }
1947 else
1948 {
1949 outrel.r_info = ELF32_R_INFO (0, R_CRIS_32_TPREL);
1950
1951 /* NULL if we had an error. */
1952 relocation -= elf_hash_table (info)->tls_sec == NULL
1953 ? 0 : elf_hash_table (info)->tls_sec->vma;
1954 }
1955
1956 /* Just "define" the initial contents in some
1957 semi-logical way. */
1958 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
1959
1960 outrel.r_offset = (sgot->output_section->vma
1961 + sgot->output_offset
1962 + off);
1963 outrel.r_addend = relocation;
1964 loc = srelgot->contents;
1965 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
1966 /* NULL if we had an error. */
1967 if (srelgot->contents != NULL)
1968 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1969 }
1970 else
1971 off &= ~3;
1972
75f500d7
HPN
1973 relocation = sgot->output_offset + off
1974 + (r_type == R_CRIS_32_IE ? sgot->output_section->vma : 0);
100382c7
HPN
1975 }
1976
75f500d7
HPN
1977 /* The GOT-relative offset to the GOT entry is the relocation,
1978 or for R_CRIS_32_GD, the actual address of the GOT entry. */
100382c7
HPN
1979 break;
1980
1981 case R_CRIS_16_TPREL:
1982 case R_CRIS_32_TPREL:
1983 /* This relocation must only be performed against symbols
1984 defined in an ordinary (non-DSO) object. */
1985 if (info->shared)
1986 {
1987 bfd_set_error (bfd_error_invalid_operation);
1988
1989 /* We've already informed in cris_elf_check_relocs that
1990 this is an error. */
1991 return FALSE;
1992 }
1993
1994 if (h != NULL
1995 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
34d3d6b9 1996 && !(h->def_regular || ELF_COMMON_DEF_P (h))
100382c7
HPN
1997 /* If it's undefined, then an error message has already
1998 been emitted. */
1999 && h->root.type != bfd_link_hash_undefined)
2000 {
2001 (*_bfd_error_handler)
2002 (_("%B, section %A: relocation %s is"
2003 " not allowed for symbol: `%s'"
2004 " which is defined outside the program,"
2005 " perhaps a declaration mixup?"),
2006 input_bfd,
2007 input_section,
2008 cris_elf_howto_table[r_type].name,
2009 symname);
2010 bfd_set_error (bfd_error_bad_value);
2011 return FALSE;
2012 }
2013
2014 /* NULL if we had an error. */
2015 relocation -= elf_hash_table (info)->tls_sec == NULL
1bc86aea
HPN
2016 ? 0
2017 : (elf_hash_table (info)->tls_sec->vma
f6f05983 2018 + elf_hash_table (info)->tls_size);
100382c7
HPN
2019
2020 /* The TLS-relative offset is the relocation. */
2021 break;
2022
2023 default:
2024 BFD_FAIL ();
2025 return FALSE;
915e5146
HPN
2026 }
2027
2028 r = cris_final_link_relocate (howto, input_bfd, input_section,
2029 contents, rel, relocation);
2030
2031 if (r != bfd_reloc_ok)
2032 {
2033 const char * msg = (const char *) NULL;
2034
2035 switch (r)
2036 {
2037 case bfd_reloc_overflow:
2038 r = info->callbacks->reloc_overflow
dfeffb9f
L
2039 (info, (h ? &h->root : NULL), symname, howto->name,
2040 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
100382c7
HPN
2041 if (additional_relocation_error_msg_count > 0)
2042 {
2043 additional_relocation_error_msg_count--;
2044 switch (r_type)
2045 {
2046 case R_CRIS_16_GOTPLT:
2047 case R_CRIS_16_GOT:
2048
2049 /* Not just TLS is involved here, so we make
2050 generation and message depend on -fPIC/-fpic
2051 only. */
2052 case R_CRIS_16_GOT_TPREL:
2053 case R_CRIS_16_GOT_GD:
2054 (*_bfd_error_handler)
2055 (_("(too many global variables for -fpic:"
2056 " recompile with -fPIC)"));
2057 break;
2058
2059 case R_CRIS_16_TPREL:
2060 case R_CRIS_16_DTPREL:
2061 (*_bfd_error_handler)
2062 (_("(thread-local data too big for -fpic or"
2063 " -msmall-tls: recompile with -fPIC or"
2064 " -mno-small-tls)"));
2065 break;
2066
2067 /* No known cause for overflow for other relocs. */
2068 default:
2069 break;
2070 }
2071 }
915e5146
HPN
2072 break;
2073
2074 case bfd_reloc_undefined:
2075 r = info->callbacks->undefined_symbol
dc810e39 2076 (info, symname, input_bfd, input_section, rel->r_offset,
b34976b6 2077 TRUE);
915e5146
HPN
2078 break;
2079
2080 case bfd_reloc_outofrange:
2081 msg = _("internal error: out of range error");
2082 break;
2083
2084 case bfd_reloc_notsupported:
2085 msg = _("internal error: unsupported relocation error");
2086 break;
2087
2088 case bfd_reloc_dangerous:
2089 msg = _("internal error: dangerous relocation");
2090 break;
2091
2092 default:
2093 msg = _("internal error: unknown error");
2094 break;
2095 }
2096
2097 if (msg)
2098 r = info->callbacks->warning
dc810e39 2099 (info, msg, symname, input_bfd, input_section, rel->r_offset);
915e5146
HPN
2100
2101 if (! r)
b34976b6 2102 return FALSE;
915e5146
HPN
2103 }
2104 }
2105
b34976b6 2106 return TRUE;
915e5146
HPN
2107}
2108\f
2109/* Finish up dynamic symbol handling. We set the contents of various
2110 dynamic sections here. */
2111
b34976b6 2112static bfd_boolean
4dfe6ac6
NC
2113elf_cris_finish_dynamic_symbol (bfd *output_bfd,
2114 struct bfd_link_info *info,
2115 struct elf_link_hash_entry *h,
2116 Elf_Internal_Sym *sym)
915e5146 2117{
4dfe6ac6 2118 struct elf_cris_link_hash_table * htab;
915e5146 2119 bfd *dynobj;
bac23f82
HPN
2120
2121 /* Where in the plt entry to put values. */
915e5146
HPN
2122 int plt_off1 = 2, plt_off2 = 10, plt_off3 = 16;
2123
bac23f82
HPN
2124 /* What offset to add to the distance to the first PLT entry for the
2125 value at plt_off3. */
2126 int plt_off3_value_bias = 4;
2127
2128 /* Where in the PLT entry the call-dynlink-stub is (happens to be same
2129 for PIC and non-PIC for v32 and pre-v32). */
2130 int plt_stub_offset = 8;
2131 int plt_entry_size = PLT_ENTRY_SIZE;
2132 const bfd_byte *plt_entry = elf_cris_plt_entry;
2133 const bfd_byte *plt_pic_entry = elf_cris_pic_plt_entry;
2134
4dfe6ac6
NC
2135 htab = elf_cris_hash_table (info);
2136 if (htab == NULL)
2137 return FALSE;
2138
bac23f82
HPN
2139 /* Adjust the various PLT entry offsets. */
2140 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2141 {
2142 plt_off2 = 14;
2143 plt_off3 = 20;
2144 plt_off3_value_bias = -2;
2145 plt_stub_offset = 12;
2146 plt_entry_size = PLT_ENTRY_SIZE_V32;
2147 plt_entry = elf_cris_plt_entry_v32;
2148 plt_pic_entry = elf_cris_pic_plt_entry_v32;
2149 }
2150
915e5146
HPN
2151 dynobj = elf_hash_table (info)->dynobj;
2152
2153 if (h->plt.offset != (bfd_vma) -1)
2154 {
2155 asection *splt;
2156 asection *sgotplt;
915e5146
HPN
2157 asection *srela;
2158 bfd_vma got_base;
2159
2160 bfd_vma gotplt_offset
100382c7 2161 = elf_cris_hash_entry (h)->gotplt_offset;
915e5146 2162 Elf_Internal_Rela rela;
947216bf 2163 bfd_byte *loc;
b34976b6 2164 bfd_boolean has_gotplt = gotplt_offset != 0;
915e5146 2165
0bdf8d40
HPN
2166 /* Get the index in the .rela.plt relocations for the .got.plt
2167 entry that corresponds to this symbol.
2168 We have to count backwards here, and the result is only valid
2169 as an index into .rela.plt. We also have to undo the effect
2170 of the R_CRIS_DTPMOD entry at .got index 3 (offset 12 into
2171 .got.plt) for which gotplt_offset is adjusted, because while
2172 that entry goes into .got.plt, its relocation goes into
2173 .rela.got, not .rela.plt. (It's not PLT-specific; not to be
2174 processed as part of the runtime lazy .rela.plt relocation).
2175 FIXME: There be literal constants here... */
2176 bfd_vma rela_plt_index
4dfe6ac6 2177 = (htab->dtpmod_refcount != 0
0bdf8d40 2178 ? gotplt_offset/4 - 2 - 3 : gotplt_offset/4 - 3);
915e5146
HPN
2179
2180 /* Get the offset into the .got table of the entry that corresponds
2181 to this function. Note that we embed knowledge that "incoming"
2182 .got goes after .got.plt in the output without padding (pointer
2183 aligned). However, that knowledge is present in several other
c152c796 2184 places too. */
915e5146
HPN
2185 bfd_vma got_offset
2186 = (has_gotplt
2187 ? gotplt_offset
4dfe6ac6 2188 : h->got.offset + htab->next_gotplt_entry);
915e5146
HPN
2189
2190 /* This symbol has an entry in the procedure linkage table. Set it
2191 up. */
2192
2193 BFD_ASSERT (h->dynindx != -1);
2194
2195 splt = bfd_get_section_by_name (dynobj, ".plt");
915e5146
HPN
2196 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
2197 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
2198 BFD_ASSERT (splt != NULL && sgotplt != NULL
2199 && (! has_gotplt || srela != NULL));
2200
2201 got_base = sgotplt->output_section->vma + sgotplt->output_offset;
2202
2203 /* Fill in the entry in the procedure linkage table. */
2204 if (! info->shared)
2205 {
bac23f82
HPN
2206 memcpy (splt->contents + h->plt.offset, plt_entry,
2207 plt_entry_size);
915e5146
HPN
2208
2209 /* We need to enter the absolute address of the GOT entry here. */
2210 bfd_put_32 (output_bfd, got_base + got_offset,
2211 splt->contents + h->plt.offset + plt_off1);
2212 }
2213 else
2214 {
bac23f82
HPN
2215 memcpy (splt->contents + h->plt.offset, plt_pic_entry,
2216 plt_entry_size);
915e5146
HPN
2217 bfd_put_32 (output_bfd, got_offset,
2218 splt->contents + h->plt.offset + plt_off1);
2219 }
2220
2221 /* Fill in the plt entry and make a relocation, if this is a "real"
2222 PLT entry. */
2223 if (has_gotplt)
2224 {
bac23f82 2225 /* Fill in the offset to the reloc table. */
915e5146 2226 bfd_put_32 (output_bfd,
0bdf8d40 2227 rela_plt_index * sizeof (Elf32_External_Rela),
915e5146
HPN
2228 splt->contents + h->plt.offset + plt_off2);
2229
2230 /* Fill in the offset to the first PLT entry, where to "jump". */
bac23f82
HPN
2231 bfd_put_32 (output_bfd,
2232 - (h->plt.offset + plt_off3 + plt_off3_value_bias),
915e5146
HPN
2233 splt->contents + h->plt.offset + plt_off3);
2234
2235 /* Fill in the entry in the global offset table with the address of
2236 the relocating stub. */
2237 bfd_put_32 (output_bfd,
2238 (splt->output_section->vma
2239 + splt->output_offset
2240 + h->plt.offset
bac23f82 2241 + plt_stub_offset),
915e5146
HPN
2242 sgotplt->contents + got_offset);
2243
2244 /* Fill in the entry in the .rela.plt section. */
2245 rela.r_offset = (sgotplt->output_section->vma
2246 + sgotplt->output_offset
2247 + got_offset);
2248 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_JUMP_SLOT);
2249 rela.r_addend = 0;
0bdf8d40 2250 loc = srela->contents + rela_plt_index * sizeof (Elf32_External_Rela);
947216bf 2251 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2252 }
2253
f5385ebf 2254 if (!h->def_regular)
915e5146
HPN
2255 {
2256 /* Mark the symbol as undefined, rather than as defined in
2257 the .plt section. Leave the value alone. */
2258 sym->st_shndx = SHN_UNDEF;
2259
2260 /* FIXME: From elf32-sparc.c 2001-02-19 (1.18). I still don't
2261 know whether resetting the value is significant; if it really
2262 is, rather than a quirk or bug in the sparc port, then I
2263 believe we'd see this elsewhere. */
2264 /* If the symbol is weak, we do need to clear the value.
2265 Otherwise, the PLT entry would provide a definition for
2266 the symbol even if the symbol wasn't defined anywhere,
2267 and so the symbol would never be NULL. */
f5385ebf 2268 if (!h->ref_regular_nonweak)
915e5146
HPN
2269 sym->st_value = 0;
2270 }
2271 }
2272
e4a2175c
HPN
2273 /* For an ordinary program, we emit .got relocs only for symbols that
2274 are in the dynamic-symbols table and are either defined by the
2275 program or are undefined weak symbols, or are function symbols
2276 where we do not output a PLT: the PLT reloc was output above and all
2277 references to the function symbol are redirected to the PLT. */
4d96d128 2278 if (h->got.offset != (bfd_vma) -1
100382c7 2279 && (elf_cris_hash_entry (h)->reg_got_refcount > 0)
6849c52f
HPN
2280 && (info->shared
2281 || (h->dynindx != -1
e4a2175c 2282 && h->plt.offset == (bfd_vma) -1
f5385ebf 2283 && !h->def_regular
6849c52f 2284 && h->root.type != bfd_link_hash_undefweak)))
915e5146
HPN
2285 {
2286 asection *sgot;
2287 asection *srela;
2288 Elf_Internal_Rela rela;
947216bf 2289 bfd_byte *loc;
dc810e39 2290 bfd_byte *where;
915e5146
HPN
2291
2292 /* This symbol has an entry in the global offset table. Set it up. */
2293
2294 sgot = bfd_get_section_by_name (dynobj, ".got");
2295 srela = bfd_get_section_by_name (dynobj, ".rela.got");
2296 BFD_ASSERT (sgot != NULL && srela != NULL);
2297
2298 rela.r_offset = (sgot->output_section->vma
2299 + sgot->output_offset
dc810e39 2300 + (h->got.offset &~ (bfd_vma) 1));
915e5146
HPN
2301
2302 /* If this is a static link, or it is a -Bsymbolic link and the
2303 symbol is defined locally or was forced to be local because
2304 of a version file, we just want to emit a RELATIVE reloc.
2305 The entry in the global offset table will already have been
2306 initialized in the relocate_section function. */
dc810e39 2307 where = sgot->contents + (h->got.offset &~ (bfd_vma) 1);
915e5146
HPN
2308 if (! elf_hash_table (info)->dynamic_sections_created
2309 || (info->shared
2310 && (info->symbolic || h->dynindx == -1)
f5385ebf 2311 && h->def_regular))
915e5146
HPN
2312 {
2313 rela.r_info = ELF32_R_INFO (0, R_CRIS_RELATIVE);
dc810e39 2314 rela.r_addend = bfd_get_signed_32 (output_bfd, where);
915e5146
HPN
2315 }
2316 else
2317 {
dc810e39 2318 bfd_put_32 (output_bfd, (bfd_vma) 0, where);
915e5146
HPN
2319 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_GLOB_DAT);
2320 rela.r_addend = 0;
2321 }
2322
947216bf
AM
2323 loc = srela->contents;
2324 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
2325 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2326 }
2327
f5385ebf 2328 if (h->needs_copy)
915e5146
HPN
2329 {
2330 asection *s;
2331 Elf_Internal_Rela rela;
947216bf 2332 bfd_byte *loc;
915e5146
HPN
2333
2334 /* This symbol needs a copy reloc. Set it up. */
2335
2336 BFD_ASSERT (h->dynindx != -1
2337 && (h->root.type == bfd_link_hash_defined
2338 || h->root.type == bfd_link_hash_defweak));
2339
2340 s = bfd_get_section_by_name (h->root.u.def.section->owner,
2341 ".rela.bss");
2342 BFD_ASSERT (s != NULL);
2343
2344 rela.r_offset = (h->root.u.def.value
2345 + h->root.u.def.section->output_section->vma
2346 + h->root.u.def.section->output_offset);
2347 rela.r_info = ELF32_R_INFO (h->dynindx, R_CRIS_COPY);
2348 rela.r_addend = 0;
947216bf
AM
2349 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2350 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
915e5146
HPN
2351 }
2352
2353 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2354 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 2355 || h == elf_hash_table (info)->hgot)
915e5146
HPN
2356 sym->st_shndx = SHN_ABS;
2357
b34976b6 2358 return TRUE;
915e5146
HPN
2359}
2360\f
100382c7
HPN
2361/* Finish up the dynamic sections. Do *not* emit relocs here, as their
2362 offsets were changed, as part of -z combreloc handling, from those we
2363 computed. */
915e5146 2364
b34976b6 2365static bfd_boolean
915e5146
HPN
2366elf_cris_finish_dynamic_sections (output_bfd, info)
2367 bfd *output_bfd;
2368 struct bfd_link_info *info;
2369{
2370 bfd *dynobj;
2371 asection *sgot;
2372 asection *sdyn;
2373
2374 dynobj = elf_hash_table (info)->dynobj;
2375
2376 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
2377 BFD_ASSERT (sgot != NULL);
2378 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2379
2380 if (elf_hash_table (info)->dynamic_sections_created)
2381 {
2382 asection *splt;
2383 Elf32_External_Dyn *dyncon, *dynconend;
2384
2385 splt = bfd_get_section_by_name (dynobj, ".plt");
2386 BFD_ASSERT (splt != NULL && sdyn != NULL);
2387
2388 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 2389 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
915e5146
HPN
2390 for (; dyncon < dynconend; dyncon++)
2391 {
2392 Elf_Internal_Dyn dyn;
2393 asection *s;
2394
2395 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2396
2397 switch (dyn.d_tag)
2398 {
2399 default:
2400 break;
2401
2402 case DT_PLTGOT:
2403 s = bfd_get_section_by_name (output_bfd, ".got");
2404 BFD_ASSERT (s != NULL);
2405 dyn.d_un.d_ptr = s->vma;
2406 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2407 break;
2408
2409 case DT_JMPREL:
2410 /* Yes, we *can* have a .plt and no .plt.rela, for instance
2411 if all symbols are found in the .got (not .got.plt). */
2412 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2413 dyn.d_un.d_ptr = s != NULL ? s->vma : 0;
2414 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2415 break;
2416
2417 case DT_PLTRELSZ:
2418 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2419 if (s == NULL)
2420 dyn.d_un.d_val = 0;
915e5146 2421 else
eea6121a 2422 dyn.d_un.d_val = s->size;
915e5146
HPN
2423 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2424 break;
2425
2426 case DT_RELASZ:
2427 /* The procedure linkage table relocs (DT_JMPREL) should
2428 not be included in the overall relocs (DT_RELA).
2429 Therefore, we override the DT_RELASZ entry here to
2430 make it not include the JMPREL relocs. Since the
2431 linker script arranges for .rela.plt to follow all
2432 other relocation sections, we don't have to worry
2433 about changing the DT_RELA entry. */
2434 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2435 if (s != NULL)
eea6121a 2436 dyn.d_un.d_val -= s->size;
915e5146
HPN
2437 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2438 break;
2439 }
2440 }
2441
2442 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2443 if (splt->size > 0)
915e5146 2444 {
bac23f82
HPN
2445 if (bfd_get_mach (output_bfd) == bfd_mach_cris_v32)
2446 {
2447 if (info->shared)
2448 memcpy (splt->contents, elf_cris_pic_plt0_entry_v32,
2449 PLT_ENTRY_SIZE_V32);
2450 else
2451 {
2452 memcpy (splt->contents, elf_cris_plt0_entry_v32,
2453 PLT_ENTRY_SIZE_V32);
2454 bfd_put_32 (output_bfd,
2455 sgot->output_section->vma
2456 + sgot->output_offset + 4,
2457 splt->contents + 4);
2458
2459 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2460 = PLT_ENTRY_SIZE_V32;
2461 }
2462 }
915e5146 2463 else
bac23f82
HPN
2464 {
2465 if (info->shared)
2466 memcpy (splt->contents, elf_cris_pic_plt0_entry,
2467 PLT_ENTRY_SIZE);
2468 else
2469 {
2470 memcpy (splt->contents, elf_cris_plt0_entry,
2471 PLT_ENTRY_SIZE);
2472 bfd_put_32 (output_bfd,
2473 sgot->output_section->vma
2474 + sgot->output_offset + 4,
2475 splt->contents + 6);
2476 bfd_put_32 (output_bfd,
2477 sgot->output_section->vma
2478 + sgot->output_offset + 8,
2479 splt->contents + 14);
2480
2481 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2482 = PLT_ENTRY_SIZE;
2483 }
915e5146
HPN
2484 }
2485 }
2486 }
2487
2488 /* Fill in the first three entries in the global offset table. */
eea6121a 2489 if (sgot->size > 0)
915e5146
HPN
2490 {
2491 if (sdyn == NULL)
2492 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2493 else
2494 bfd_put_32 (output_bfd,
2495 sdyn->output_section->vma + sdyn->output_offset,
2496 sgot->contents);
2497 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2498 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2499 }
2500
2501 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2502
b34976b6 2503 return TRUE;
06c15ad7
HPN
2504}
2505\f
2506/* Return the section that should be marked against GC for a given
2507 relocation. */
2508
2509static asection *
07adf181
AM
2510cris_elf_gc_mark_hook (asection *sec,
2511 struct bfd_link_info *info,
2512 Elf_Internal_Rela *rel,
2513 struct elf_link_hash_entry *h,
2514 Elf_Internal_Sym *sym)
06c15ad7 2515{
100382c7 2516 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
06c15ad7 2517 if (h != NULL)
100382c7 2518 switch (r_type)
07adf181
AM
2519 {
2520 case R_CRIS_GNU_VTINHERIT:
2521 case R_CRIS_GNU_VTENTRY:
2522 return NULL;
100382c7
HPN
2523
2524 default:
2525 break;
07adf181 2526 }
06c15ad7 2527
07adf181 2528 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
06c15ad7
HPN
2529}
2530
2531/* Update the got entry reference counts for the section being removed. */
2532
b34976b6 2533static bfd_boolean
07adf181
AM
2534cris_elf_gc_sweep_hook (bfd *abfd,
2535 struct bfd_link_info *info,
2536 asection *sec,
2537 const Elf_Internal_Rela *relocs)
06c15ad7 2538{
4dfe6ac6 2539 struct elf_cris_link_hash_table * htab;
915e5146
HPN
2540 Elf_Internal_Shdr *symtab_hdr;
2541 struct elf_link_hash_entry **sym_hashes;
2542 bfd_signed_vma *local_got_refcounts;
2543 const Elf_Internal_Rela *rel, *relend;
915e5146
HPN
2544 bfd *dynobj;
2545 asection *sgot;
2546 asection *srelgot;
2547
7dda2462
TG
2548 if (info->relocatable)
2549 return TRUE;
2550
915e5146
HPN
2551 dynobj = elf_hash_table (info)->dynobj;
2552 if (dynobj == NULL)
b34976b6 2553 return TRUE;
915e5146 2554
4dfe6ac6
NC
2555 htab = elf_cris_hash_table (info);
2556 if (htab == NULL)
2557 return FALSE;
2558
babfd660
KH
2559 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2560 sym_hashes = elf_sym_hashes (abfd);
2561 local_got_refcounts = elf_local_got_refcounts (abfd);
2562
915e5146
HPN
2563 sgot = bfd_get_section_by_name (dynobj, ".got");
2564 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
2565
2566 relend = relocs + sec->reloc_count;
2567 for (rel = relocs; rel < relend; rel++)
2568 {
babfd660 2569 unsigned long r_symndx;
3eb128b2 2570 struct elf_link_hash_entry *h = NULL;
100382c7
HPN
2571 bfd_signed_vma got_element_size = 4;
2572 bfd_signed_vma *specific_refcount = NULL;
2573 enum elf_cris_reloc_type r_type;
3eb128b2
AM
2574
2575 r_symndx = ELF32_R_SYM (rel->r_info);
2576 if (r_symndx >= symtab_hdr->sh_info)
2577 {
2578 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2579 while (h->root.type == bfd_link_hash_indirect
2580 || h->root.type == bfd_link_hash_warning)
2581 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2582 }
babfd660 2583
100382c7
HPN
2584 r_type = ELF32_R_TYPE (rel->r_info);
2585 switch (r_type)
2586 {
2587 case R_CRIS_32_GOT:
2588 case R_CRIS_16_GOT:
2589 case R_CRIS_16_GOTPLT:
2590 case R_CRIS_32_GOTPLT:
2591 specific_refcount = h != NULL
2592 ? &((struct elf_cris_link_hash_entry *) h)->reg_got_refcount
2593 : &local_got_refcounts[LGOT_REG_NDX (r_symndx)];
2594 break;
2595
2596 case R_CRIS_32_GD:
2597 case R_CRIS_32_GOT_GD:
2598 case R_CRIS_16_GOT_GD:
2599 got_element_size = 8;
2600 specific_refcount = h != NULL
2601 ? &((struct elf_cris_link_hash_entry *) h)->dtp_refcount
2602 : &local_got_refcounts[LGOT_DTP_NDX (r_symndx)];
2603 break;
2604
75f500d7 2605 case R_CRIS_32_IE:
100382c7
HPN
2606 case R_CRIS_16_GOT_TPREL:
2607 case R_CRIS_32_GOT_TPREL:
2608 specific_refcount = h != NULL
2609 ? &((struct elf_cris_link_hash_entry *) h)->tprel_refcount
2610 : &local_got_refcounts[LGOT_TPREL_NDX (r_symndx)];
2611 break;
2612
2613 default:
2614 break;
2615 }
2616
2617 switch (r_type)
915e5146 2618 {
75f500d7 2619 case R_CRIS_32_IE:
100382c7
HPN
2620 case R_CRIS_32_GD:
2621 case R_CRIS_16_GOT_TPREL:
2622 case R_CRIS_32_GOT_TPREL:
2623 case R_CRIS_32_GOT_GD:
2624 case R_CRIS_16_GOT_GD:
915e5146
HPN
2625 case R_CRIS_16_GOT:
2626 case R_CRIS_32_GOT:
3eb128b2 2627 if (h != NULL)
915e5146 2628 {
100382c7
HPN
2629 /* If the counters are 0 when we got here, we've
2630 miscounted somehow somewhere, an internal error. */
2631 BFD_ASSERT (h->got.refcount > 0);
2632 --h->got.refcount;
2633
2634 BFD_ASSERT (*specific_refcount > 0);
2635 --*specific_refcount;
2636 if (*specific_refcount == 0)
915e5146 2637 {
100382c7
HPN
2638 /* We don't need the .got entry any more. */
2639 sgot->size -= got_element_size;
2640 srelgot->size -= sizeof (Elf32_External_Rela);
915e5146
HPN
2641 }
2642 break;
2643 }
2644
2645 local_got_reloc:
2646 if (local_got_refcounts != NULL)
2647 {
100382c7
HPN
2648 /* If the counters are 0 when we got here, we've
2649 miscounted somehow somewhere, an internal error. */
2650 BFD_ASSERT (local_got_refcounts[r_symndx] > 0);
2651 --local_got_refcounts[r_symndx];
2652
2653 BFD_ASSERT (*specific_refcount > 0);
2654 --*specific_refcount;
2655 if (*specific_refcount == 0)
915e5146 2656 {
100382c7
HPN
2657 /* We don't need the .got entry any more. */
2658 sgot->size -= got_element_size;
2659 if (info->shared)
2660 srelgot->size -= sizeof (Elf32_External_Rela);
915e5146
HPN
2661 }
2662 }
2663 break;
2664
2665 case R_CRIS_16_GOTPLT:
2666 case R_CRIS_32_GOTPLT:
2667 /* For local symbols, treat these like GOT relocs. */
3eb128b2 2668 if (h == NULL)
915e5146 2669 goto local_got_reloc;
970d488d
HPN
2670 else
2671 /* For global symbols, adjust the reloc-specific refcount. */
2672 elf_cris_hash_entry (h)->gotplt_refcount--;
e4a2175c 2673 /* Fall through. */
3eb128b2 2674
915e5146
HPN
2675 case R_CRIS_32_PLT_GOTREL:
2676 /* FIXME: We don't garbage-collect away the .got section. */
2677 if (local_got_refcounts != NULL)
2678 local_got_refcounts[-1]--;
2679 /* Fall through. */
3eb128b2 2680
970d488d
HPN
2681 case R_CRIS_8:
2682 case R_CRIS_16:
2683 case R_CRIS_32:
915e5146
HPN
2684 case R_CRIS_8_PCREL:
2685 case R_CRIS_16_PCREL:
2686 case R_CRIS_32_PCREL:
2687 case R_CRIS_32_PLT_PCREL:
970d488d 2688 /* Negate the increment we did in cris_elf_check_relocs. */
3eb128b2 2689 if (h != NULL)
915e5146 2690 {
0a4787a0
HPN
2691 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2692 && h->plt.refcount > 0)
915e5146
HPN
2693 --h->plt.refcount;
2694 }
2695 break;
2696
100382c7 2697 case R_CRIS_32_DTPREL:
6718f446
HPN
2698 /* This'd be a .dtpreld entry in e.g. debug info. */
2699 if ((sec->flags & SEC_ALLOC) == 0)
2700 break;
2701 /* Fall through. */
100382c7 2702 case R_CRIS_16_DTPREL:
4dfe6ac6
NC
2703 htab->dtpmod_refcount--;
2704 if (htab->dtpmod_refcount == 0)
2705 htab->next_gotplt_entry -= 8;
100382c7
HPN
2706 BFD_ASSERT (local_got_refcounts != NULL);
2707 local_got_refcounts[-1]--;
2708 break;
2709
915e5146
HPN
2710 default:
2711 break;
2712 }
2713 }
2714
b34976b6 2715 return TRUE;
06c15ad7
HPN
2716}
2717
5d5a918a
HPN
2718/* The elf_backend_plt_sym_val hook function. */
2719
2720static bfd_vma
2721cris_elf_plt_sym_val (bfd_vma i, const asection *plt,
2722 const arelent *rel ATTRIBUTE_UNUSED)
2723{
2724 bfd_size_type plt_entry_size;
2725
2726 plt_entry_size
2727 = (bfd_get_mach (plt->owner) == bfd_mach_cris_v32
2728 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2729
2730 return plt->vma + (i + 1) * plt_entry_size;
2731}
2732
915e5146
HPN
2733/* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
2734 entry but we found we will not create any. Called when we find we will
4d96d128
HPN
2735 not have any PLT for this symbol, by for example
2736 elf_cris_adjust_dynamic_symbol when we're doing a proper dynamic link,
2737 or elf_cris_size_dynamic_sections if no dynamic sections will be
2738 created (we're only linking static objects). */
915e5146 2739
b34976b6 2740static bfd_boolean
915e5146
HPN
2741elf_cris_adjust_gotplt_to_got (h, p)
2742 struct elf_cris_link_hash_entry *h;
2743 PTR p;
2744{
2745 struct bfd_link_info *info = (struct bfd_link_info *) p;
915e5146 2746
970d488d
HPN
2747 /* A GOTPLT reloc, when activated, is supposed to be included into
2748 the PLT refcount. */
2749 BFD_ASSERT (h->gotplt_refcount == 0
2750 || h->gotplt_refcount <= h->root.plt.refcount);
2751
915e5146
HPN
2752 /* If nobody wanted a GOTPLT with this symbol, we're done. */
2753 if (h->gotplt_refcount <= 0)
b34976b6 2754 return TRUE;
915e5146 2755
100382c7 2756 if (h->reg_got_refcount > 0)
915e5146 2757 {
100382c7
HPN
2758 /* There's a GOT entry for this symbol. Just adjust the refcounts.
2759 Probably not necessary at this stage, but keeping them accurate
915e5146
HPN
2760 helps avoiding surprises later. */
2761 h->root.got.refcount += h->gotplt_refcount;
100382c7 2762 h->reg_got_refcount += h->gotplt_refcount;
5e0f5ae3 2763 h->gotplt_refcount = 0;
915e5146
HPN
2764 }
2765 else
2766 {
4d96d128 2767 /* No GOT entry for this symbol. We need to create one. */
8d1d654f
AM
2768 bfd *dynobj = elf_hash_table (info)->dynobj;
2769 asection *sgot;
2770 asection *srelgot;
2771
2772 BFD_ASSERT (dynobj != NULL);
2773 sgot = bfd_get_section_by_name (dynobj, ".got");
2774 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
915e5146 2775
100382c7
HPN
2776 /* Put accurate refcounts there. */
2777 h->root.got.refcount += h->gotplt_refcount;
2778 h->reg_got_refcount = h->gotplt_refcount;
915e5146 2779
5e0f5ae3 2780 h->gotplt_refcount = 0;
915e5146 2781
44aa49bb
HPN
2782 /* We always have a .got and a .rela.got section if there were
2783 GOTPLT relocs in input. */
2784 BFD_ASSERT (sgot != NULL && srelgot != NULL);
915e5146
HPN
2785
2786 /* Allocate space in the .got section. */
eea6121a 2787 sgot->size += 4;
915e5146
HPN
2788
2789 /* Allocate relocation space. */
eea6121a 2790 srelgot->size += sizeof (Elf32_External_Rela);
915e5146
HPN
2791 }
2792
b34976b6 2793 return TRUE;
915e5146
HPN
2794}
2795
2796/* Try to fold PLT entries with GOT entries. There are two cases when we
2797 want to do this:
2798
2799 - When all PLT references are GOTPLT references, and there are GOT
e4a2175c
HPN
2800 references, and this is not the executable. We don't have to
2801 generate a PLT at all.
915e5146 2802
e4a2175c
HPN
2803 - When there are both (ordinary) PLT references and GOT references,
2804 and this isn't the executable.
915e5146 2805 We want to make the PLT reference use the ordinary GOT entry rather
e4a2175c
HPN
2806 than R_CRIS_JUMP_SLOT, a run-time dynamically resolved GOTPLT entry,
2807 since the GOT entry will have to be resolved at startup anyway.
915e5146
HPN
2808
2809 Though the latter case is handled when room for the PLT is allocated,
2810 not here.
2811
e4a2175c
HPN
2812 By folding into the GOT, we may need a round-trip to a PLT in the
2813 executable for calls, a loss in performance. Still, losing a
2814 reloc is a win in size and at least in start-up time.
2815
915e5146
HPN
2816 Note that this function is called before symbols are forced local by
2817 version scripts. The differing cases are handled by
2818 elf_cris_hide_symbol. */
2819
b34976b6 2820static bfd_boolean
915e5146
HPN
2821elf_cris_try_fold_plt_to_got (h, p)
2822 struct elf_cris_link_hash_entry *h;
2823 PTR p;
2824{
2825 struct bfd_link_info *info = (struct bfd_link_info *) p;
2826
2827 /* If there are no GOT references for this symbol, we can't fold any
2828 other reference so there's nothing to do. Likewise if there are no
2829 PLT references; GOTPLT references included. */
2830 if (h->root.got.refcount <= 0 || h->root.plt.refcount <= 0)
b34976b6 2831 return TRUE;
915e5146
HPN
2832
2833 /* GOTPLT relocs are supposed to be included into the PLT refcount. */
2834 BFD_ASSERT (h->gotplt_refcount <= h->root.plt.refcount);
2835
2836 if (h->gotplt_refcount == h->root.plt.refcount)
2837 {
4d96d128 2838 /* The only PLT references are GOTPLT references, and there are GOT
915e5146
HPN
2839 references. Convert PLT to GOT references. */
2840 if (! elf_cris_adjust_gotplt_to_got (h, info))
b34976b6 2841 return FALSE;
915e5146
HPN
2842
2843 /* Clear the PLT references, so no PLT will be created. */
2844 h->root.plt.offset = (bfd_vma) -1;
2845 }
2846
b34976b6 2847 return TRUE;
915e5146
HPN
2848}
2849
2850/* Our own version of hide_symbol, so that we can adjust a GOTPLT reloc
2851 to use a GOT entry (and create one) rather than requiring a GOTPLT
2852 entry. */
2853
2854static void
e5094212 2855elf_cris_hide_symbol (info, h, force_local)
915e5146
HPN
2856 struct bfd_link_info *info;
2857 struct elf_link_hash_entry *h;
b34976b6 2858 bfd_boolean force_local;
915e5146
HPN
2859{
2860 elf_cris_adjust_gotplt_to_got ((struct elf_cris_link_hash_entry *) h, info);
2861
e5094212 2862 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
915e5146
HPN
2863}
2864
2865/* Adjust a symbol defined by a dynamic object and referenced by a
2866 regular object. The current definition is in some section of the
2867 dynamic object, but we're not including those sections. We have to
2868 change the definition to something the rest of the link can
2869 understand. */
2870
b34976b6 2871static bfd_boolean
4dfe6ac6
NC
2872elf_cris_adjust_dynamic_symbol (struct bfd_link_info *info,
2873 struct elf_link_hash_entry *h)
915e5146 2874{
4dfe6ac6 2875 struct elf_cris_link_hash_table * htab;
915e5146
HPN
2876 bfd *dynobj;
2877 asection *s;
bac23f82 2878 bfd_size_type plt_entry_size;
915e5146 2879
4dfe6ac6
NC
2880 htab = elf_cris_hash_table (info);
2881 if (htab == NULL)
2882 return FALSE;
2883
915e5146
HPN
2884 dynobj = elf_hash_table (info)->dynobj;
2885
2886 /* Make sure we know what is going on here. */
2887 BFD_ASSERT (dynobj != NULL
f5385ebf 2888 && (h->needs_plt
f6e332e6 2889 || h->u.weakdef != NULL
f5385ebf
AM
2890 || (h->def_dynamic
2891 && h->ref_regular
2892 && !h->def_regular)));
915e5146 2893
bac23f82
HPN
2894 plt_entry_size
2895 = (bfd_get_mach (dynobj) == bfd_mach_cris_v32
2896 ? PLT_ENTRY_SIZE_V32 : PLT_ENTRY_SIZE);
2897
915e5146
HPN
2898 /* If this is a function, put it in the procedure linkage table. We
2899 will fill in the contents of the procedure linkage table later,
2900 when we know the address of the .got section. */
2901 if (h->type == STT_FUNC
f5385ebf 2902 || h->needs_plt)
915e5146 2903 {
6849c52f
HPN
2904 /* If we link a program (not a DSO), we'll get rid of unnecessary
2905 PLT entries; we point to the actual symbols -- even for pic
2906 relocs, because a program built with -fpic should have the same
2907 result as one built without -fpic, specifically considering weak
2908 symbols.
2909 FIXME: m68k and i386 differ here, for unclear reasons. */
915e5146 2910 if (! info->shared
f5385ebf 2911 && !h->def_dynamic)
915e5146
HPN
2912 {
2913 /* This case can occur if we saw a PLT reloc in an input file,
6849c52f
HPN
2914 but the symbol was not defined by a dynamic object. In such
2915 a case, we don't actually need to build a procedure linkage
2916 table, and we can just do an absolute or PC reloc instead, or
4d96d128 2917 change a .got.plt index to a .got index for GOTPLT relocs. */
f5385ebf
AM
2918 BFD_ASSERT (h->needs_plt);
2919 h->needs_plt = 0;
915e5146 2920 h->plt.offset = (bfd_vma) -1;
915e5146
HPN
2921 return
2922 elf_cris_adjust_gotplt_to_got ((struct
2923 elf_cris_link_hash_entry *) h,
2924 info);
2925 }
2926
e4a2175c
HPN
2927 /* If we had a R_CRIS_GLOB_DAT that didn't have to point to a PLT;
2928 where a pointer-equivalent symbol was unimportant (i.e. more
2929 like R_CRIS_JUMP_SLOT after symbol evaluation) we could get rid
2930 of the PLT. We can't for the executable, because the GOT
2931 entries will point to the PLT there (and be constant). */
2932 if (info->shared
2933 && !elf_cris_try_fold_plt_to_got ((struct elf_cris_link_hash_entry*)
2934 h, info))
b34976b6 2935 return FALSE;
915e5146
HPN
2936
2937 /* GC or folding may have rendered this entry unused. */
2938 if (h->plt.refcount <= 0)
2939 {
f5385ebf 2940 h->needs_plt = 0;
915e5146 2941 h->plt.offset = (bfd_vma) -1;
b34976b6 2942 return TRUE;
915e5146
HPN
2943 }
2944
2945 /* Make sure this symbol is output as a dynamic symbol. */
2946 if (h->dynindx == -1)
2947 {
c152c796 2948 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2949 return FALSE;
915e5146
HPN
2950 }
2951
2952 s = bfd_get_section_by_name (dynobj, ".plt");
2953 BFD_ASSERT (s != NULL);
2954
2955 /* If this is the first .plt entry, make room for the special
2956 first entry. */
eea6121a 2957 if (s->size == 0)
bac23f82 2958 s->size += plt_entry_size;
915e5146
HPN
2959
2960 /* If this symbol is not defined in a regular file, and we are
2961 not generating a shared library, then set the symbol to this
6849c52f 2962 location in the .plt. */
915e5146 2963 if (!info->shared
f5385ebf 2964 && !h->def_regular)
915e5146
HPN
2965 {
2966 h->root.u.def.section = s;
eea6121a 2967 h->root.u.def.value = s->size;
915e5146
HPN
2968 }
2969
4d96d128
HPN
2970 /* If there's already a GOT entry, use that, not a .got.plt. A
2971 GOT field still has a reference count when we get here; it's
e4a2175c
HPN
2972 not yet changed to an offset. We can't do this for an
2973 executable, because then the reloc associated with the PLT
2974 would get a non-PLT reloc pointing to the PLT. FIXME: Move
2975 this to elf_cris_try_fold_plt_to_got. */
2976 if (info->shared && h->got.refcount > 0)
915e5146
HPN
2977 {
2978 h->got.refcount += h->plt.refcount;
2979
2980 /* Mark the PLT offset to use the GOT entry by setting the low
2981 bit in the plt offset; it is always a multiple of
bac23f82
HPN
2982 plt_entry_size (which is at least a multiple of 2). */
2983 BFD_ASSERT ((s->size % plt_entry_size) == 0);
915e5146
HPN
2984
2985 /* Change the PLT refcount to an offset. */
eea6121a 2986 h->plt.offset = s->size;
915e5146
HPN
2987
2988 /* By not setting gotplt_offset (i.e. it remains at 0), we signal
2989 that the got entry should be used instead. */
2990 BFD_ASSERT (((struct elf_cris_link_hash_entry *)
2991 h)->gotplt_offset == 0);
2992
2993 /* Make room for this entry. */
bac23f82 2994 s->size += plt_entry_size;
915e5146 2995
b34976b6 2996 return TRUE;
915e5146
HPN
2997 }
2998
2999 /* No GOT reference for this symbol; prepare for an ordinary PLT. */
eea6121a 3000 h->plt.offset = s->size;
915e5146
HPN
3001
3002 /* Make room for this entry. */
bac23f82 3003 s->size += plt_entry_size;
915e5146
HPN
3004
3005 /* We also need to make an entry in the .got.plt section, which
3006 will be placed in the .got section by the linker script. */
3007 ((struct elf_cris_link_hash_entry *) h)->gotplt_offset
4dfe6ac6
NC
3008 = htab->next_gotplt_entry;
3009 htab->next_gotplt_entry += 4;
915e5146
HPN
3010
3011 s = bfd_get_section_by_name (dynobj, ".got.plt");
3012 BFD_ASSERT (s != NULL);
eea6121a 3013 s->size += 4;
915e5146
HPN
3014
3015 /* We also need to make an entry in the .rela.plt section. */
3016
3017 s = bfd_get_section_by_name (dynobj, ".rela.plt");
3018 BFD_ASSERT (s != NULL);
eea6121a 3019 s->size += sizeof (Elf32_External_Rela);
915e5146 3020
b34976b6 3021 return TRUE;
915e5146
HPN
3022 }
3023
3024 /* Reinitialize the plt offset now that it is not used as a reference
3025 count any more. */
3026 h->plt.offset = (bfd_vma) -1;
3027
3028 /* If this is a weak symbol, and there is a real definition, the
3029 processor independent code will have arranged for us to see the
3030 real definition first, and we can just use the same value. */
f6e332e6 3031 if (h->u.weakdef != NULL)
915e5146 3032 {
f6e332e6
AM
3033 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
3034 || h->u.weakdef->root.type == bfd_link_hash_defweak);
3035 h->root.u.def.section = h->u.weakdef->root.u.def.section;
3036 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 3037 return TRUE;
915e5146
HPN
3038 }
3039
3040 /* This is a reference to a symbol defined by a dynamic object which
3041 is not a function. */
3042
3043 /* If we are creating a shared library, we must presume that the
3044 only references to the symbol are via the global offset table.
3045 For such cases we need not do anything here; the relocations will
3046 be handled correctly by relocate_section. */
3047 if (info->shared)
b34976b6 3048 return TRUE;
915e5146
HPN
3049
3050 /* If there are no references to this symbol that do not use the
3051 GOT, we don't need to generate a copy reloc. */
f5385ebf 3052 if (!h->non_got_ref)
b34976b6 3053 return TRUE;
915e5146 3054
909272ee
AM
3055 if (h->size == 0)
3056 {
3057 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
3058 h->root.root.string);
3059 return TRUE;
3060 }
3061
915e5146
HPN
3062 /* We must allocate the symbol in our .dynbss section, which will
3063 become part of the .bss section of the executable. There will be
3064 an entry for this symbol in the .dynsym section. The dynamic
3065 object will contain position independent code, so all references
3066 from the dynamic object to this symbol will go through the global
3067 offset table. The dynamic linker will use the .dynsym entry to
3068 determine the address it must put in the global offset table, so
3069 both the dynamic object and the regular object will refer to the
3070 same memory location for the variable. */
3071
3072 s = bfd_get_section_by_name (dynobj, ".dynbss");
3073 BFD_ASSERT (s != NULL);
3074
3075 /* We must generate a R_CRIS_COPY reloc to tell the dynamic linker to
3076 copy the initial value out of the dynamic object and into the
3077 runtime process image. We need to remember the offset into the
3078 .rela.bss section we are going to use. */
3079 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
3080 {
3081 asection *srel;
3082
3083 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
3084 BFD_ASSERT (srel != NULL);
eea6121a 3085 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 3086 h->needs_copy = 1;
915e5146
HPN
3087 }
3088
027297b7 3089 return _bfd_elf_adjust_dynamic_copy (h, s);
915e5146
HPN
3090}
3091
237bc7f0
HPN
3092/* Adjust our "subclass" elements for an indirect symbol. */
3093
3094static void
3095elf_cris_copy_indirect_symbol (struct bfd_link_info *info,
3096 struct elf_link_hash_entry *dir,
3097 struct elf_link_hash_entry *ind)
3098{
3099 struct elf_cris_link_hash_entry *edir, *eind;
3100
3101 edir = (struct elf_cris_link_hash_entry *) dir;
3102 eind = (struct elf_cris_link_hash_entry *) ind;
3103
867ea5fd
HPN
3104 /* Only indirect symbols are replaced; we're not interested in
3105 updating any of EIND's fields for other symbols. */
3106 if (eind->root.root.type != bfd_link_hash_indirect)
451ffe63
HPN
3107 {
3108 /* Still, we need to copy flags for e.g. weak definitions. */
3109 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3110 return;
3111 }
867ea5fd 3112
237bc7f0
HPN
3113 BFD_ASSERT (edir->gotplt_offset == 0 || eind->gotplt_offset == 0);
3114
3115#define XMOVOPZ(F, OP, Z) edir->F OP eind->F; eind->F = Z
3116#define XMOVE(F) XMOVOPZ (F, +=, 0)
bfbff9eb
HPN
3117 if (eind->pcrel_relocs_copied != NULL)
3118 {
3119 if (edir->pcrel_relocs_copied != NULL)
3120 {
3121 struct elf_cris_pcrel_relocs_copied **pp;
3122 struct elf_cris_pcrel_relocs_copied *p;
3123
3124 /* Add reloc counts against the indirect sym to the direct sym
3125 list. Merge any entries against the same section. */
3126 for (pp = &eind->pcrel_relocs_copied; *pp != NULL;)
3127 {
3128 struct elf_cris_pcrel_relocs_copied *q;
3129 p = *pp;
3130 for (q = edir->pcrel_relocs_copied; q != NULL; q = q->next)
3131 if (q->section == p->section)
3132 {
3133 q->count += p->count;
3134 *pp = p->next;
3135 break;
3136 }
3137 if (q == NULL)
3138 pp = &p->next;
3139 }
3140 *pp = edir->pcrel_relocs_copied;
3141 }
3142 XMOVOPZ (pcrel_relocs_copied, =, NULL);
3143 }
237bc7f0
HPN
3144 XMOVE (gotplt_refcount);
3145 XMOVE (gotplt_offset);
3146 XMOVE (reg_got_refcount);
3147 XMOVE (tprel_refcount);
3148 XMOVE (dtp_refcount);
3149#undef XMOVE
3150#undef XMOVOPZ
3151
3152 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
3153}
3154
915e5146 3155/* Look through the relocs for a section during the first phase. */
a7c10850 3156
b34976b6 3157static bfd_boolean
4dfe6ac6
NC
3158cris_elf_check_relocs (bfd *abfd,
3159 struct bfd_link_info *info,
3160 asection *sec,
3161 const Elf_Internal_Rela *relocs)
06c15ad7 3162{
4dfe6ac6 3163 struct elf_cris_link_hash_table * htab;
915e5146 3164 bfd *dynobj;
06c15ad7 3165 Elf_Internal_Shdr *symtab_hdr;
5582a088 3166 struct elf_link_hash_entry **sym_hashes;
915e5146 3167 bfd_signed_vma *local_got_refcounts;
06c15ad7
HPN
3168 const Elf_Internal_Rela *rel;
3169 const Elf_Internal_Rela *rel_end;
915e5146
HPN
3170 asection *sgot;
3171 asection *srelgot;
3172 asection *sreloc;
a7c10850 3173
1049f94e 3174 if (info->relocatable)
b34976b6 3175 return TRUE;
a7c10850 3176
4dfe6ac6
NC
3177 htab = elf_cris_hash_table (info);
3178 if (htab == NULL)
3179 return FALSE;
3180
915e5146 3181 dynobj = elf_hash_table (info)->dynobj;
06c15ad7
HPN
3182 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3183 sym_hashes = elf_sym_hashes (abfd);
915e5146
HPN
3184 local_got_refcounts = elf_local_got_refcounts (abfd);
3185
3186 sgot = NULL;
3187 srelgot = NULL;
3188 sreloc = NULL;
3189
06c15ad7
HPN
3190 rel_end = relocs + sec->reloc_count;
3191 for (rel = relocs; rel < rel_end; rel++)
3192 {
3193 struct elf_link_hash_entry *h;
3194 unsigned long r_symndx;
915e5146 3195 enum elf_cris_reloc_type r_type;
100382c7
HPN
3196 bfd_signed_vma got_element_size = 4;
3197 unsigned long r_symndx_lgot = INT_MAX;
a7c10850 3198
06c15ad7
HPN
3199 r_symndx = ELF32_R_SYM (rel->r_info);
3200 if (r_symndx < symtab_hdr->sh_info)
100382c7
HPN
3201 {
3202 h = NULL;
3203 r_symndx_lgot = LGOT_REG_NDX (r_symndx);
3204 }
06c15ad7 3205 else
973a3492
L
3206 {
3207 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3208 while (h->root.type == bfd_link_hash_indirect
3209 || h->root.type == bfd_link_hash_warning)
3210 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3211 }
a7c10850 3212
915e5146
HPN
3213 r_type = ELF32_R_TYPE (rel->r_info);
3214
3215 /* Some relocs require linker-created sections; we need to hang them
3216 on the first input bfd we found that contained dynamic relocs. */
3217 switch (r_type)
3218 {
100382c7 3219 case R_CRIS_32_DTPREL:
6718f446
HPN
3220 if ((sec->flags & SEC_ALLOC) == 0)
3221 /* This'd be a .dtpreld entry in e.g. debug info. We have
3222 several different switch statements below, but none of
3223 that is needed; we need no preparations for resolving
3224 R_CRIS_32_DTPREL into a non-allocated section (debug
3225 info), so let's just move on to the next
3226 relocation. */
3227 continue;
3228 /* Fall through. */
3229 case R_CRIS_16_DTPREL:
100382c7
HPN
3230 /* The first .got.plt entry is right after the R_CRIS_DTPMOD
3231 entry at index 3. */
4dfe6ac6
NC
3232 if (htab->dtpmod_refcount == 0)
3233 htab->next_gotplt_entry += 8;
3234
3235 htab->dtpmod_refcount++;
100382c7
HPN
3236 /* Fall through. */
3237
75f500d7 3238 case R_CRIS_32_IE:
100382c7
HPN
3239 case R_CRIS_32_GD:
3240 case R_CRIS_16_GOT_GD:
3241 case R_CRIS_32_GOT_GD:
3242 case R_CRIS_32_GOT_TPREL:
3243 case R_CRIS_16_GOT_TPREL:
915e5146
HPN
3244 case R_CRIS_16_GOT:
3245 case R_CRIS_32_GOT:
3246 case R_CRIS_32_GOTREL:
3247 case R_CRIS_32_PLT_GOTREL:
3248 case R_CRIS_32_PLT_PCREL:
3249 case R_CRIS_16_GOTPLT:
3250 case R_CRIS_32_GOTPLT:
3251 if (dynobj == NULL)
3252 {
3253 elf_hash_table (info)->dynobj = dynobj = abfd;
3254
bac23f82
HPN
3255 /* We could handle this if we can get a handle on the
3256 output bfd in elf_cris_adjust_dynamic_symbol. Failing
3257 that, we must insist on dynobj being a specific mach. */
3258 if (bfd_get_mach (dynobj) == bfd_mach_cris_v10_v32)
3259 {
3260 (*_bfd_error_handler)
3261 (_("%B, section %A:\n v10/v32 compatible object %s"
3262 " must not contain a PIC relocation"),
3263 abfd, sec);
3264 return FALSE;
3265 }
3266
915e5146
HPN
3267 /* Create the .got section, so we can assume it's always
3268 present whenever there's a dynobj. */
3269 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 3270 return FALSE;
915e5146 3271 }
100382c7
HPN
3272
3273 if (sgot == NULL)
3274 sgot = bfd_get_section_by_name (dynobj, ".got");
3275
3276 if (local_got_refcounts == NULL)
3277 {
3278 bfd_size_type amt;
3279
3280 /* We use index local_got_refcounts[-1] to count all
3281 GOT-relative relocations that do not have explicit
3282 GOT entries. */
3283 amt = LGOT_ALLOC_NELTS_FOR (symtab_hdr->sh_info) + 1;
3284 amt *= sizeof (bfd_signed_vma);
3285 local_got_refcounts = ((bfd_signed_vma *) bfd_zalloc (abfd, amt));
3286 if (local_got_refcounts == NULL)
3287 return FALSE;
3288
3289 local_got_refcounts++;
3290 elf_local_got_refcounts (abfd) = local_got_refcounts;
3291 }
915e5146
HPN
3292 break;
3293
3294 default:
3295 break;
3296 }
3297
3298 /* Some relocs require a global offset table (but perhaps not a
3299 specific GOT entry). */
4d96d128 3300 switch (r_type)
915e5146 3301 {
100382c7
HPN
3302 case R_CRIS_16_DTPREL:
3303 case R_CRIS_32_DTPREL:
3304 /* Not requesting .got.rela for an executable: the contents
3305 of the first entry is constant there. For a shared
3306 library, we need .got.rela for the R_CRIS_DTPMOD
3307 relocation at index 3. */
3308 if (!info->shared)
3309 break;
3310 /* Fall through. */
3311
75f500d7 3312 case R_CRIS_32_IE:
100382c7
HPN
3313 case R_CRIS_32_GD:
3314 case R_CRIS_16_GOT_GD:
3315 case R_CRIS_32_GOT_GD:
3316 case R_CRIS_32_GOT_TPREL:
3317 case R_CRIS_16_GOT_TPREL:
3318 /* Fall through. */
3319
44aa49bb
HPN
3320 /* For R_CRIS_16_GOTPLT and R_CRIS_32_GOTPLT, we need a GOT
3321 entry only for local symbols. Unfortunately, we don't know
3322 until later on if there's a version script that forces the
3323 symbol local. We must have the .rela.got section in place
3324 before we know if the symbol looks global now, so we need
3325 to treat the reloc just like for R_CRIS_16_GOT and
3326 R_CRIS_32_GOT. */
3327 case R_CRIS_16_GOTPLT:
3328 case R_CRIS_32_GOTPLT:
915e5146
HPN
3329 case R_CRIS_16_GOT:
3330 case R_CRIS_32_GOT:
44aa49bb
HPN
3331 if (srelgot == NULL
3332 && (h != NULL || info->shared))
3333 {
3334 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
3335 if (srelgot == NULL)
3336 {
3496cb2a
L
3337 srelgot = bfd_make_section_with_flags (dynobj,
3338 ".rela.got",
3339 (SEC_ALLOC
3340 | SEC_LOAD
3341 | SEC_HAS_CONTENTS
3342 | SEC_IN_MEMORY
3343 | SEC_LINKER_CREATED
3344 | SEC_READONLY));
44aa49bb 3345 if (srelgot == NULL
44aa49bb 3346 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 3347 return FALSE;
44aa49bb
HPN
3348 }
3349 }
100382c7 3350 break;
44aa49bb 3351
100382c7
HPN
3352 default:
3353 break;
3354 }
915e5146 3355
100382c7
HPN
3356 /* Warn and error for invalid input. */
3357 switch (r_type)
3358 {
75f500d7 3359 case R_CRIS_32_IE:
100382c7
HPN
3360 case R_CRIS_32_TPREL:
3361 case R_CRIS_16_TPREL:
3362 case R_CRIS_32_GD:
3363 if (info->shared)
915e5146 3364 {
100382c7
HPN
3365 (*_bfd_error_handler)
3366 (_("%B, section %A:\n relocation %s not valid"
3367 " in a shared object;"
3368 " typically an option mixup, recompile with -fPIC"),
3369 abfd,
3370 sec,
3371 cris_elf_howto_table[r_type].name);
3372 /* Don't return FALSE here; we want messages for all of
3373 these and the error behavior is ungraceful
3374 anyway. */
3375 }
3376 default:
3377 break;
3378 }
915e5146 3379
100382c7
HPN
3380 switch (r_type)
3381 {
3382 case R_CRIS_32_GD:
3383 case R_CRIS_16_GOT_GD:
3384 case R_CRIS_32_GOT_GD:
3385 /* These are requests for tls_index entries, run-time R_CRIS_DTP. */
3386 got_element_size = 8;
3387 r_symndx_lgot = LGOT_DTP_NDX (r_symndx);
3388 break;
915e5146 3389
100382c7
HPN
3390 case R_CRIS_16_DTPREL:
3391 case R_CRIS_32_DTPREL:
3392 /* These two just request for the constant-index
3393 module-local tls_index-sized GOT entry, which we add
3394 elsewhere. */
915e5146
HPN
3395 break;
3396
75f500d7 3397 case R_CRIS_32_IE:
100382c7
HPN
3398 case R_CRIS_32_GOT_TPREL:
3399 case R_CRIS_16_GOT_TPREL:
3400 r_symndx_lgot = LGOT_TPREL_NDX (r_symndx);
3401
75f500d7 3402 /* Those relocs also require that a DSO is of type
100382c7
HPN
3403 Initial Exec. Like other targets, we don't reset this
3404 flag even if the relocs are GC:ed away. */
3405 if (info->shared)
3406 info->flags |= DF_STATIC_TLS;
3407 break;
3408
3409 /* Let's list the other assembler-generated TLS-relocs too,
3410 just to show that they're not forgotten. */
3411 case R_CRIS_16_TPREL:
3412 case R_CRIS_32_TPREL:
915e5146
HPN
3413 default:
3414 break;
3415 }
3416
4d96d128 3417 switch (r_type)
06c15ad7 3418 {
915e5146
HPN
3419 case R_CRIS_16_GOTPLT:
3420 case R_CRIS_32_GOTPLT:
3421 /* Mark that we need a GOT entry if the PLT entry (and its GOT
3422 entry) is eliminated. We can only do this for a non-local
3423 symbol. */
3424 if (h != NULL)
3425 {
100382c7 3426 elf_cris_hash_entry (h)->gotplt_refcount++;
915e5146
HPN
3427 goto handle_gotplt_reloc;
3428 }
3429 /* If h is NULL then this is a local symbol, and we must make a
3430 GOT entry for it, so handle it like a GOT reloc. */
3431 /* Fall through. */
3432
75f500d7 3433 case R_CRIS_32_IE:
100382c7
HPN
3434 case R_CRIS_32_GD:
3435 case R_CRIS_16_GOT_GD:
3436 case R_CRIS_32_GOT_GD:
3437 case R_CRIS_32_GOT_TPREL:
3438 case R_CRIS_16_GOT_TPREL:
915e5146
HPN
3439 case R_CRIS_16_GOT:
3440 case R_CRIS_32_GOT:
3441 /* This symbol requires a global offset table entry. */
915e5146
HPN
3442 if (h != NULL)
3443 {
51b64d56 3444 if (h->got.refcount == 0)
915e5146 3445 {
915e5146
HPN
3446 /* Make sure this symbol is output as a dynamic symbol. */
3447 if (h->dynindx == -1)
3448 {
c152c796 3449 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3450 return FALSE;
915e5146 3451 }
915e5146 3452 }
100382c7
HPN
3453
3454 /* Update the sum of reloc counts for this symbol. */
51b64d56 3455 h->got.refcount++;
100382c7
HPN
3456
3457 switch (r_type)
3458 {
3459 case R_CRIS_16_GOT:
3460 case R_CRIS_32_GOT:
3461 if (elf_cris_hash_entry (h)->reg_got_refcount == 0)
3462 {
3463 /* Allocate space in the .got section. */
3464 sgot->size += got_element_size;
3465 /* Allocate relocation space. */
3466 srelgot->size += sizeof (Elf32_External_Rela);
3467 }
3468 elf_cris_hash_entry (h)->reg_got_refcount++;
3469 break;
3470
3471 case R_CRIS_32_GD:
3472 case R_CRIS_16_GOT_GD:
3473 case R_CRIS_32_GOT_GD:
3474 if (elf_cris_hash_entry (h)->dtp_refcount == 0)
3475 {
3476 /* Allocate space in the .got section. */
3477 sgot->size += got_element_size;
3478 /* Allocate relocation space. */
3479 srelgot->size += sizeof (Elf32_External_Rela);
3480 }
3481 elf_cris_hash_entry (h)->dtp_refcount++;
3482 break;
3483
75f500d7 3484 case R_CRIS_32_IE:
100382c7
HPN
3485 case R_CRIS_32_GOT_TPREL:
3486 case R_CRIS_16_GOT_TPREL:
3487 if (elf_cris_hash_entry (h)->tprel_refcount == 0)
3488 {
3489 /* Allocate space in the .got section. */
3490 sgot->size += got_element_size;
3491 /* Allocate relocation space. */
3492 srelgot->size += sizeof (Elf32_External_Rela);
3493 }
3494 elf_cris_hash_entry (h)->tprel_refcount++;
3495 break;
3496
3497 default:
3498 BFD_FAIL ();
3499 break;
3500 }
915e5146
HPN
3501 }
3502 else
3503 {
3504 /* This is a global offset table entry for a local symbol. */
100382c7 3505 if (local_got_refcounts[r_symndx_lgot] == 0)
915e5146 3506 {
100382c7 3507 sgot->size += got_element_size;
915e5146
HPN
3508 if (info->shared)
3509 {
100382c7
HPN
3510 /* If we are generating a shared object, we need
3511 to output a R_CRIS_RELATIVE reloc so that the
3512 dynamic linker can adjust this GOT entry.
3513 Similarly for non-regular got entries. */
eea6121a 3514 srelgot->size += sizeof (Elf32_External_Rela);
915e5146
HPN
3515 }
3516 }
100382c7
HPN
3517 /* Update the reloc-specific count. */
3518 local_got_refcounts[r_symndx_lgot]++;
3519
3520 /* This one is the sum of all the others. */
51b64d56 3521 local_got_refcounts[r_symndx]++;
915e5146
HPN
3522 }
3523 break;
3524
100382c7
HPN
3525 case R_CRIS_16_DTPREL:
3526 case R_CRIS_32_DTPREL:
915e5146
HPN
3527 case R_CRIS_32_GOTREL:
3528 /* This reference requires a global offset table.
3529 FIXME: The actual refcount isn't used currently; the .got
3530 section can't be removed if there were any references in the
3531 input. */
3532 local_got_refcounts[-1]++;
3533 break;
3534
3535 handle_gotplt_reloc:
3536
3537 case R_CRIS_32_PLT_GOTREL:
3538 /* This reference requires a global offset table. */
3539 local_got_refcounts[-1]++;
3540 /* Fall through. */
3541
3542 case R_CRIS_32_PLT_PCREL:
3543 /* This symbol requires a procedure linkage table entry. We
3544 actually build the entry in adjust_dynamic_symbol,
3545 because this might be a case of linking PIC code which is
3546 never referenced by a dynamic object, in which case we
3547 don't need to generate a procedure linkage table entry
3548 after all. */
3549
ada1953e
HPN
3550 /* Beware: if we'd check for visibility of the symbol here
3551 (and not marking the need for a PLT when non-visible), we'd
3552 get into trouble with keeping handling consistent with
3553 regards to relocs found before definition and GOTPLT
3554 handling. Eliminable PLT entries will be dealt with later
3555 anyway. */
3556 if (h == NULL)
915e5146
HPN
3557 continue;
3558
f5385ebf 3559 h->needs_plt = 1;
51b64d56 3560 h->plt.refcount++;
915e5146
HPN
3561 break;
3562
3563 case R_CRIS_8:
3564 case R_CRIS_16:
3565 case R_CRIS_32:
3566 /* Let's help debug shared library creation. Any of these
0d08de41
HPN
3567 relocs *can* be used in shared libs, but pages containing
3568 them cannot be shared, so they're not appropriate for
3569 common use. Don't warn for sections we don't care about,
3570 such as debug sections or non-constant sections. We
3571 can't help tables of (global) function pointers, for
3572 example, though they must be emitted in a (writable) data
3573 section to avoid having impure text sections. */
915e5146
HPN
3574 if (info->shared
3575 && (sec->flags & SEC_ALLOC) != 0
3576 && (sec->flags & SEC_READONLY) != 0)
3577 {
3578 /* FIXME: How do we make this optionally a warning only? */
8f615d07 3579 (*_bfd_error_handler)
bac23f82
HPN
3580 (_("%B, section %A:\n relocation %s should not"
3581 " be used in a shared object; recompile with -fPIC"),
d003868e
AM
3582 abfd,
3583 sec,
8f615d07 3584 cris_elf_howto_table[r_type].name);
915e5146 3585 }
0d08de41
HPN
3586 if (h != NULL)
3587 {
3588 h->non_got_ref = 1;
100382c7 3589
0d08de41
HPN
3590 /* Make sure a plt entry is created for this symbol if it
3591 turns out to be a function defined by a dynamic object. */
3592 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3593 h->plt.refcount++;
3594 }
3595
3596 /* If we are creating a shared library and this is not a local
3597 symbol, we need to copy the reloc into the shared library.
3598 However when linking with -Bsymbolic and this is a global
3599 symbol which is defined in an object we are including in the
3600 link (i.e., DEF_REGULAR is set), then we can resolve the
3601 reloc directly. At this point we have not seen all the input
3602 files, so it is possible that DEF_REGULAR is not set now but
3603 will be set later (it is never cleared). In case of a weak
3604 definition, DEF_REGULAR may be cleared later by a strong
3605 definition in a shared library. We account for that
3606 possibility below by storing information in the relocs_copied
3607 field of the hash table entry. A similar situation occurs
3608 when creating shared libraries and symbol visibility changes
3609 render the symbol local. */
3610
3611 /* No need to do anything if we're not creating a shared object. */
3612 if (! info->shared)
3613 break;
3614
3615 /* We don't need to handle relocs into sections not going into
3616 the "real" output. */
3617 if ((sec->flags & SEC_ALLOC) == 0)
3618 break;
3619
3620 /* We may need to create a reloc section in the dynobj and made room
3621 for this reloc. */
3622 if (sreloc == NULL)
3623 {
3624 sreloc = _bfd_elf_make_dynamic_reloc_section
3625 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
3626
3627 if (sreloc == NULL)
3628 return FALSE;
3629 }
3630
3631 if (sec->flags & SEC_READONLY)
3632 info->flags |= DF_TEXTREL;
3633
3634 sreloc->size += sizeof (Elf32_External_Rela);
3635 break;
915e5146
HPN
3636
3637 case R_CRIS_8_PCREL:
3638 case R_CRIS_16_PCREL:
3639 case R_CRIS_32_PCREL:
3640 if (h != NULL)
3641 {
f5385ebf 3642 h->non_got_ref = 1;
915e5146
HPN
3643
3644 /* Make sure a plt entry is created for this symbol if it
3645 turns out to be a function defined by a dynamic object. */
0a4787a0
HPN
3646 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
3647 h->plt.refcount++;
915e5146
HPN
3648 }
3649
3650 /* If we are creating a shared library and this is not a local
3651 symbol, we need to copy the reloc into the shared library.
3652 However when linking with -Bsymbolic and this is a global
3653 symbol which is defined in an object we are including in the
3654 link (i.e., DEF_REGULAR is set), then we can resolve the
3655 reloc directly. At this point we have not seen all the input
3656 files, so it is possible that DEF_REGULAR is not set now but
3657 will be set later (it is never cleared). In case of a weak
3658 definition, DEF_REGULAR may be cleared later by a strong
3659 definition in a shared library. We account for that
3660 possibility below by storing information in the relocs_copied
3661 field of the hash table entry. A similar situation occurs
3662 when creating shared libraries and symbol visibility changes
3663 render the symbol local. */
3664
3665 /* No need to do anything if we're not creating a shared object. */
3666 if (! info->shared)
3667 break;
3668
3669 /* We don't need to handle relocs into sections not going into
3670 the "real" output. */
3671 if ((sec->flags & SEC_ALLOC) == 0)
3672 break;
3673
0d08de41
HPN
3674 /* If the symbol is local, then we know already we can
3675 eliminate the reloc. */
3676 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3677 break;
bac23f82 3678
0d08de41
HPN
3679 /* If this is with -Bsymbolic and the symbol isn't weak, and
3680 is defined by an ordinary object (the ones we include in
3681 this shared library) then we can also eliminate the
3682 reloc. See comment above for more eliminable cases which
3683 we can't identify at this time. */
3684 if (info->symbolic
3685 && h->root.type != bfd_link_hash_defweak
3686 && h->def_regular)
3687 break;
915e5146 3688
83bac4b0
NC
3689 /* We may need to create a reloc section in the dynobj and made room
3690 for this reloc. */
915e5146
HPN
3691 if (sreloc == NULL)
3692 {
83bac4b0
NC
3693 sreloc = _bfd_elf_make_dynamic_reloc_section
3694 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
915e5146 3695
83bac4b0 3696 if (sreloc == NULL)
b34976b6 3697 return FALSE;
915e5146
HPN
3698 }
3699
eea6121a 3700 sreloc->size += sizeof (Elf32_External_Rela);
915e5146 3701
0d08de41
HPN
3702 /* We count the number of PC relative relocations we have
3703 entered for this symbol, so that we can discard them
3704 again if the symbol is later defined by a regular object.
3705 We know that h is really a pointer to an
915e5146 3706 elf_cris_link_hash_entry. */
0d08de41
HPN
3707 {
3708 struct elf_cris_link_hash_entry *eh;
3709 struct elf_cris_pcrel_relocs_copied *p;
915e5146 3710
0d08de41 3711 eh = elf_cris_hash_entry (h);
915e5146 3712
0d08de41 3713 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
bfbff9eb 3714 if (p->section == sec)
0d08de41 3715 break;
915e5146 3716
0d08de41
HPN
3717 if (p == NULL)
3718 {
3719 p = ((struct elf_cris_pcrel_relocs_copied *)
3720 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
3721 if (p == NULL)
3722 return FALSE;
3723 p->next = eh->pcrel_relocs_copied;
3724 eh->pcrel_relocs_copied = p;
bfbff9eb 3725 p->section = sec;
0d08de41
HPN
3726 p->count = 0;
3727 p->r_type = r_type;
3728 }
915e5146 3729
0d08de41
HPN
3730 ++p->count;
3731 }
915e5146
HPN
3732 break;
3733
06c15ad7
HPN
3734 /* This relocation describes the C++ object vtable hierarchy.
3735 Reconstruct it for later use during GC. */
3736 case R_CRIS_GNU_VTINHERIT:
c152c796 3737 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 3738 return FALSE;
06c15ad7 3739 break;
a7c10850 3740
06c15ad7
HPN
3741 /* This relocation describes which C++ vtable entries are actually
3742 used. Record for later use during GC. */
3743 case R_CRIS_GNU_VTENTRY:
d17e0c6e
JB
3744 BFD_ASSERT (h != NULL);
3745 if (h != NULL
3746 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 3747 return FALSE;
06c15ad7 3748 break;
4d96d128 3749
100382c7
HPN
3750 case R_CRIS_16_TPREL:
3751 case R_CRIS_32_TPREL:
3752 /* Already warned above, when necessary. */
3753 break;
3754
4d96d128
HPN
3755 default:
3756 /* Other relocs do not appear here. */
3757 bfd_set_error (bfd_error_bad_value);
b34976b6 3758 return FALSE;
06c15ad7
HPN
3759 }
3760 }
a7c10850 3761
b34976b6 3762 return TRUE;
06c15ad7 3763}
4da81684 3764
915e5146
HPN
3765/* Set the sizes of the dynamic sections. */
3766
b34976b6 3767static bfd_boolean
4dfe6ac6
NC
3768elf_cris_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
3769 struct bfd_link_info *info)
915e5146 3770{
4dfe6ac6 3771 struct elf_cris_link_hash_table * htab;
915e5146
HPN
3772 bfd *dynobj;
3773 asection *s;
b34976b6
AM
3774 bfd_boolean plt;
3775 bfd_boolean relocs;
915e5146 3776
4dfe6ac6
NC
3777 htab = elf_cris_hash_table (info);
3778 if (htab == NULL)
3779 return FALSE;
3780
915e5146
HPN
3781 dynobj = elf_hash_table (info)->dynobj;
3782 BFD_ASSERT (dynobj != NULL);
3783
3784 if (elf_hash_table (info)->dynamic_sections_created)
3785 {
3786 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 3787 if (info->executable)
915e5146
HPN
3788 {
3789 s = bfd_get_section_by_name (dynobj, ".interp");
3790 BFD_ASSERT (s != NULL);
eea6121a 3791 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
915e5146
HPN
3792 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3793 }
3794 }
3795 else
3796 {
3797 /* Adjust all expected GOTPLT uses to use a GOT entry instead. */
4dfe6ac6
NC
3798 elf_cris_link_hash_traverse (htab, elf_cris_adjust_gotplt_to_got,
3799 info);
915e5146
HPN
3800
3801 /* We may have created entries in the .rela.got section.
3802 However, if we are not creating the dynamic sections, we will
3803 not actually use these entries. Reset the size of .rela.got,
3804 which will cause it to get stripped from the output file
3805 below. */
3806 s = bfd_get_section_by_name (dynobj, ".rela.got");
3807 if (s != NULL)
eea6121a 3808 s->size = 0;
915e5146
HPN
3809 }
3810
3811 /* If this is a -Bsymbolic shared link, then we need to discard all PC
3812 relative relocs against symbols defined in a regular object. We
3813 allocated space for them in the check_relocs routine, but we will not
3814 fill them in in the relocate_section routine. We also discard space
3815 for relocs that have become for local symbols due to symbol
4d96d128
HPN
3816 visibility changes. For programs, we discard space for relocs for
3817 symbols not referenced by any dynamic object. */
915e5146 3818 if (info->shared)
4dfe6ac6 3819 elf_cris_link_hash_traverse (htab,
4d96d128 3820 elf_cris_discard_excess_dso_dynamics,
4dfe6ac6 3821 info);
4d96d128 3822 else
4dfe6ac6 3823 elf_cris_link_hash_traverse (htab,
4d96d128 3824 elf_cris_discard_excess_program_dynamics,
4dfe6ac6 3825 info);
915e5146
HPN
3826
3827 /* The check_relocs and adjust_dynamic_symbol entry points have
3828 determined the sizes of the various dynamic sections. Allocate
3829 memory for them. */
b34976b6
AM
3830 plt = FALSE;
3831 relocs = FALSE;
915e5146
HPN
3832 for (s = dynobj->sections; s != NULL; s = s->next)
3833 {
3834 const char *name;
915e5146
HPN
3835
3836 if ((s->flags & SEC_LINKER_CREATED) == 0)
3837 continue;
3838
3839 /* It's OK to base decisions on the section name, because none
3840 of the dynobj section names depend upon the input files. */
3841 name = bfd_get_section_name (dynobj, s);
3842
915e5146
HPN
3843 if (strcmp (name, ".plt") == 0)
3844 {
c456f082
AM
3845 /* Remember whether there is a PLT. */
3846 plt = s->size != 0;
915e5146 3847 }
100382c7
HPN
3848 else if (strcmp (name, ".got.plt") == 0)
3849 {
3850 /* The .got.plt contains the .got header as well as the
3851 actual .got.plt contents. The .got header may contain a
3852 R_CRIS_DTPMOD entry at index 3. */
4dfe6ac6 3853 s->size += htab->dtpmod_refcount != 0
100382c7
HPN
3854 ? 8 : 0;
3855 }
0112cd26 3856 else if (CONST_STRNEQ (name, ".rela"))
915e5146 3857 {
100382c7 3858 if (strcmp (name, ".rela.got") == 0
4dfe6ac6 3859 && htab->dtpmod_refcount != 0
100382c7
HPN
3860 && info->shared)
3861 s->size += sizeof (Elf32_External_Rela);
3862
c456f082 3863 if (s->size != 0)
915e5146 3864 {
915e5146
HPN
3865 /* Remember whether there are any reloc sections other
3866 than .rela.plt. */
3867 if (strcmp (name, ".rela.plt") != 0)
b34976b6 3868 relocs = TRUE;
915e5146 3869
915e5146
HPN
3870 /* We use the reloc_count field as a counter if we need
3871 to copy relocs into the output file. */
3872 s->reloc_count = 0;
3873 }
3874 }
0112cd26 3875 else if (! CONST_STRNEQ (name, ".got")
c456f082 3876 && strcmp (name, ".dynbss") != 0)
915e5146
HPN
3877 {
3878 /* It's not one of our sections, so don't allocate space. */
3879 continue;
3880 }
3881
c456f082 3882 if (s->size == 0)
915e5146 3883 {
c456f082
AM
3884 /* If we don't need this section, strip it from the
3885 output file. This is mostly to handle .rela.bss and
3886 .rela.plt. We must create both sections in
3887 create_dynamic_sections, because they must be created
3888 before the linker maps input sections to output
3889 sections. The linker does that before
3890 adjust_dynamic_symbol is called, and it is that
3891 function which decides whether anything needs to go
3892 into these sections. */
8423293d 3893 s->flags |= SEC_EXCLUDE;
915e5146
HPN
3894 continue;
3895 }
3896
c456f082
AM
3897 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3898 continue;
3899
915e5146
HPN
3900 /* Allocate memory for the section contents. We use bfd_zalloc here
3901 in case unused entries are not reclaimed before the section's
3902 contents are written out. This should not happen, but this way
3903 if it does, we will not write out garbage. For reloc sections,
3904 this will make entries have the type R_CRIS_NONE. */
eea6121a 3905 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 3906 if (s->contents == NULL)
b34976b6 3907 return FALSE;
915e5146
HPN
3908 }
3909
3910 if (elf_hash_table (info)->dynamic_sections_created)
3911 {
3912 /* Add some entries to the .dynamic section. We fill in the
3913 values later, in elf_cris_finish_dynamic_sections, but we
3914 must add the entries now so that we get the correct size for
3915 the .dynamic section. The DT_DEBUG entry is filled in by the
3916 dynamic linker and used by the debugger. */
dc810e39 3917#define add_dynamic_entry(TAG, VAL) \
5a580b3a 3918 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 3919
915e5146
HPN
3920 if (!info->shared)
3921 {
dc810e39 3922 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 3923 return FALSE;
915e5146
HPN
3924 }
3925
3926 if (plt)
3927 {
dc810e39
AM
3928 if (!add_dynamic_entry (DT_PLTGOT, 0)
3929 || !add_dynamic_entry (DT_PLTRELSZ, 0)
3930 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
3931 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 3932 return FALSE;
915e5146
HPN
3933 }
3934
3935 if (relocs)
3936 {
dc810e39
AM
3937 if (!add_dynamic_entry (DT_RELA, 0)
3938 || !add_dynamic_entry (DT_RELASZ, 0)
3939 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 3940 return FALSE;
915e5146
HPN
3941 }
3942
99e4ae17 3943 if ((info->flags & DF_TEXTREL) != 0)
915e5146 3944 {
dc810e39 3945 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3946 return FALSE;
915e5146
HPN
3947 info->flags |= DF_TEXTREL;
3948 }
3949 }
dc810e39 3950#undef add_dynamic_entry
915e5146 3951
b34976b6 3952 return TRUE;
915e5146
HPN
3953}
3954
3955/* This function is called via elf_cris_link_hash_traverse if we are
3956 creating a shared object. In the -Bsymbolic case, it discards the
3957 space allocated to copy PC relative relocs against symbols which
3958 are defined in regular objects. For the normal non-symbolic case,
3959 we also discard space for relocs that have become local due to
3960 symbol visibility changes. We allocated space for them in the
3961 check_relocs routine, but we won't fill them in in the
3962 relocate_section routine. */
3963
b34976b6 3964static bfd_boolean
4d96d128 3965elf_cris_discard_excess_dso_dynamics (h, inf)
915e5146
HPN
3966 struct elf_cris_link_hash_entry *h;
3967 PTR inf;
3968{
3969 struct elf_cris_pcrel_relocs_copied *s;
3970 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3971
3972 /* If a symbol has been forced local or we have found a regular
3973 definition for the symbolic link case, then we won't be needing
3974 any relocs. */
f5385ebf
AM
3975 if (h->root.def_regular
3976 && (h->root.forced_local
915e5146
HPN
3977 || info->symbolic))
3978 {
3979 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
bfbff9eb
HPN
3980 {
3981 asection *sreloc
e236b51d
HPN
3982 = _bfd_elf_get_dynamic_reloc_section (elf_hash_table (info)
3983 ->dynobj,
bfbff9eb
HPN
3984 s->section,
3985 /*rela?*/ TRUE);
3986 sreloc->size -= s->count * sizeof (Elf32_External_Rela);
3987 }
0d08de41
HPN
3988 return TRUE;
3989 }
3990
3991 /* If we have accounted for PC-relative relocs for read-only
3992 sections, now is the time to warn for them. We can't do it in
3993 cris_elf_check_relocs, because we don't know the status of all
3994 symbols at that time (and it's common to force symbols local
3995 late). */
3996
3997 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
bfbff9eb
HPN
3998 if ((s->section->flags & SEC_READONLY) != 0)
3999 {
4000 /* FIXME: How do we make this optionally a warning only? */
4001 (*_bfd_error_handler)
4002 (_("%B, section `%A', to symbol `%s':\n"
4003 " relocation %s should not be used"
4004 " in a shared object; recompile with -fPIC"),
4005 s->section->owner,
4006 s->section,
4007 h->root.root.root.string,
4008 cris_elf_howto_table[s->r_type].name);
4009
4010 info->flags |= DF_TEXTREL;
4011 }
4d96d128 4012
b34976b6 4013 return TRUE;
4d96d128
HPN
4014}
4015
4016/* This function is called via elf_cris_link_hash_traverse if we are *not*
4017 creating a shared object. We discard space for relocs for symbols put
4018 in the .got, but which we found we do not have to resolve at run-time. */
4019
b34976b6 4020static bfd_boolean
4d96d128
HPN
4021elf_cris_discard_excess_program_dynamics (h, inf)
4022 struct elf_cris_link_hash_entry *h;
4023 PTR inf;
4024{
4025 struct bfd_link_info *info = (struct bfd_link_info *) inf;
4026
4027 /* If we're not creating a shared library and have a symbol which is
4028 referred to by .got references, but the symbol is defined locally,
e4a2175c
HPN
4029 (or rather, not defined by a DSO) then lose the reloc for the .got
4030 (don't allocate room for it). Likewise for relocs for something
4031 for which we create a PLT. */
f5385ebf 4032 if (!h->root.def_dynamic
e4a2175c 4033 || h->root.plt.refcount > 0)
4d96d128 4034 {
100382c7 4035 if (h->reg_got_refcount > 0
4d96d128
HPN
4036 /* The size of this section is only valid and in sync with the
4037 various reference counts if we do dynamic; don't decrement it
4038 otherwise. */
4039 && elf_hash_table (info)->dynamic_sections_created)
4040 {
4041 bfd *dynobj = elf_hash_table (info)->dynobj;
4042 asection *srelgot;
4043
4044 BFD_ASSERT (dynobj != NULL);
99c79b2e 4045
4d96d128
HPN
4046 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
4047
4048 BFD_ASSERT (srelgot != NULL);
4049
eea6121a 4050 srelgot->size -= sizeof (Elf32_External_Rela);
4d96d128
HPN
4051 }
4052
4053 /* If the locally-defined symbol isn't used by a DSO, then we don't
4054 have to export it as a dynamic symbol. This was already done for
4055 functions; doing this for all symbols would presumably not
e5dfef09
HPN
4056 introduce new problems. Of course we don't do this if we're
4057 exporting all dynamic symbols. */
0741c7be 4058 if (! info->export_dynamic
77cfaee6 4059 && h->root.dynindx != -1
f5385ebf
AM
4060 && !h->root.def_dynamic
4061 && !h->root.ref_dynamic)
e5dfef09
HPN
4062 {
4063 h->root.dynindx = -1;
4064 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4065 h->root.dynstr_index);
4066 }
915e5146
HPN
4067 }
4068
b34976b6 4069 return TRUE;
915e5146
HPN
4070}
4071
4072/* Reject a file depending on presence and expectation of prefixed
4073 underscores on symbols. */
4da81684 4074
b34976b6 4075static bfd_boolean
4da81684
HPN
4076cris_elf_object_p (abfd)
4077 bfd *abfd;
4078{
bac23f82
HPN
4079 if (! cris_elf_set_mach_from_flags (abfd, elf_elfheader (abfd)->e_flags))
4080 return FALSE;
4081
4da81684
HPN
4082 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE))
4083 return (bfd_get_symbol_leading_char (abfd) == '_');
4084 else
4085 return (bfd_get_symbol_leading_char (abfd) == 0);
4086}
4087
bac23f82
HPN
4088/* Mark presence or absence of leading underscore. Set machine type
4089 flags from mach type. */
4da81684
HPN
4090
4091static void
4092cris_elf_final_write_processing (abfd, linker)
4093 bfd *abfd;
b34976b6 4094 bfd_boolean linker ATTRIBUTE_UNUSED;
4da81684 4095{
bac23f82
HPN
4096 unsigned long e_flags = elf_elfheader (abfd)->e_flags;
4097
4098 e_flags &= ~EF_CRIS_UNDERSCORE;
4da81684 4099 if (bfd_get_symbol_leading_char (abfd) == '_')
bac23f82
HPN
4100 e_flags |= EF_CRIS_UNDERSCORE;
4101
4102 switch (bfd_get_mach (abfd))
4103 {
4104 case bfd_mach_cris_v0_v10:
4105 e_flags |= EF_CRIS_VARIANT_ANY_V0_V10;
4106 break;
4107
4108 case bfd_mach_cris_v10_v32:
4109 e_flags |= EF_CRIS_VARIANT_COMMON_V10_V32;
4110 break;
4111
4112 case bfd_mach_cris_v32:
4113 e_flags |= EF_CRIS_VARIANT_V32;
4114 break;
4115
4116 default:
4117 _bfd_abort (__FILE__, __LINE__,
4118 _("Unexpected machine number"));
4119 }
4120
4121 elf_elfheader (abfd)->e_flags = e_flags;
4122}
4123
4124/* Set the mach type from e_flags value. */
4125
4126static bfd_boolean
4127cris_elf_set_mach_from_flags (abfd, flags)
4128 bfd *abfd;
4129 unsigned long flags;
4130{
4131 switch (flags & EF_CRIS_VARIANT_MASK)
4132 {
4133 case EF_CRIS_VARIANT_ANY_V0_V10:
4134 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v0_v10);
4135 break;
4136
4137 case EF_CRIS_VARIANT_V32:
4138 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v32);
4139 break;
4140
4141 case EF_CRIS_VARIANT_COMMON_V10_V32:
4142 bfd_default_set_arch_mach (abfd, bfd_arch_cris, bfd_mach_cris_v10_v32);
4143 break;
4144
4145 default:
4146 /* Since we don't recognize them, we obviously can't support them
4147 with this code; we'd have to require that all future handling
4148 would be optional. */
4149 bfd_set_error (bfd_error_wrong_format);
4150 return FALSE;
4151 }
4152
4153 return TRUE;
4da81684
HPN
4154}
4155
4156/* Display the flags field. */
4157
b34976b6 4158static bfd_boolean
4da81684
HPN
4159cris_elf_print_private_bfd_data (abfd, ptr)
4160 bfd *abfd;
4161 PTR ptr;
4162{
4163 FILE *file = (FILE *) ptr;
4164
f12123c0 4165 BFD_ASSERT (abfd != NULL && ptr != NULL);
4da81684
HPN
4166
4167 _bfd_elf_print_private_bfd_data (abfd, ptr);
4168
4169 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
4170
4171 if (elf_elfheader (abfd)->e_flags & EF_CRIS_UNDERSCORE)
4172 fprintf (file, _(" [symbols have a _ prefix]"));
bac23f82
HPN
4173 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4174 == EF_CRIS_VARIANT_COMMON_V10_V32)
4175 fprintf (file, _(" [v10 and v32]"));
4176 if ((elf_elfheader (abfd)->e_flags & EF_CRIS_VARIANT_MASK)
4177 == EF_CRIS_VARIANT_V32)
4178 fprintf (file, _(" [v32]"));
4da81684
HPN
4179
4180 fputc ('\n', file);
b34976b6 4181 return TRUE;
4da81684
HPN
4182}
4183
4184/* Don't mix files with and without a leading underscore. */
4185
b34976b6 4186static bfd_boolean
4da81684
HPN
4187cris_elf_merge_private_bfd_data (ibfd, obfd)
4188 bfd *ibfd;
4189 bfd *obfd;
4190{
bac23f82 4191 int imach, omach;
4da81684 4192
82e51918 4193 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 4194 return FALSE;
4da81684
HPN
4195
4196 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4197 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 4198 return TRUE;
4da81684 4199
bac23f82
HPN
4200 imach = bfd_get_mach (ibfd);
4201
4da81684
HPN
4202 if (! elf_flags_init (obfd))
4203 {
4204 /* This happens when ld starts out with a 'blank' output file. */
b34976b6 4205 elf_flags_init (obfd) = TRUE;
4da81684 4206
bac23f82
HPN
4207 /* We ignore the linker-set mach, and instead set it according to
4208 the first input file. This would also happen if we could
4209 somehow filter out the OUTPUT_ARCH () setting from elf.sc.
4210 This allows us to keep the same linker config across
4211 cris(v0..v10) and crisv32. The drawback is that we can't force
4212 the output type, which might be a sane thing to do for a
4213 v10+v32 compatibility object. */
4214 if (! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4215 return FALSE;
4da81684
HPN
4216 }
4217
bac23f82
HPN
4218 if (bfd_get_symbol_leading_char (ibfd)
4219 != bfd_get_symbol_leading_char (obfd))
4da81684
HPN
4220 {
4221 (*_bfd_error_handler)
bac23f82 4222 (bfd_get_symbol_leading_char (ibfd) == '_'
d003868e
AM
4223 ? _("%B: uses _-prefixed symbols, but writing file with non-prefixed symbols")
4224 : _("%B: uses non-prefixed symbols, but writing file with _-prefixed symbols"),
4225 ibfd);
4da81684 4226 bfd_set_error (bfd_error_bad_value);
b34976b6 4227 return FALSE;
4da81684
HPN
4228 }
4229
bac23f82
HPN
4230 omach = bfd_get_mach (obfd);
4231
4232 if (imach != omach)
4233 {
4234 /* We can get an incompatible combination only if either is
4235 bfd_mach_cris_v32, and the other one isn't compatible. */
4236 if ((imach == bfd_mach_cris_v32
4237 && omach != bfd_mach_cris_v10_v32)
4238 || (omach == bfd_mach_cris_v32
4239 && imach != bfd_mach_cris_v10_v32))
4240 {
4241 (*_bfd_error_handler)
4242 ((imach == bfd_mach_cris_v32)
4243 ? _("%B contains CRIS v32 code, incompatible"
4244 " with previous objects")
4245 : _("%B contains non-CRIS-v32 code, incompatible"
4246 " with previous objects"),
4247 ibfd);
4248 bfd_set_error (bfd_error_bad_value);
4249 return FALSE;
4250 }
4251
4252 /* We don't have to check the case where the input is compatible
4253 with v10 and v32, because the output is already known to be set
4254 to the other (compatible) mach. */
4255 if (omach == bfd_mach_cris_v10_v32
4256 && ! bfd_set_arch_mach (obfd, bfd_arch_cris, imach))
4257 return FALSE;
4258 }
4259
b34976b6 4260 return TRUE;
4da81684 4261}
99e4ae17 4262
bac23f82
HPN
4263/* Do side-effects of e_flags copying to obfd. */
4264
4265static bfd_boolean
4266cris_elf_copy_private_bfd_data (ibfd, obfd)
4267 bfd *ibfd;
4268 bfd *obfd;
4269{
4270 /* Call the base function. */
4271 if (!_bfd_elf_copy_private_bfd_data (ibfd, obfd))
4272 return FALSE;
4273
4274 /* If output is big-endian for some obscure reason, stop here. */
4275 if (_bfd_generic_verify_endian_match (ibfd, obfd) == FALSE)
4276 return FALSE;
4277
4278 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
4279 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
4280 return TRUE;
4281
4282 /* Do what we really came here for. */
4283 return bfd_set_arch_mach (obfd, bfd_arch_cris, bfd_get_mach (ibfd));
4284}
99e4ae17
AJ
4285
4286static enum elf_reloc_type_class
f51e552e
AM
4287elf_cris_reloc_type_class (rela)
4288 const Elf_Internal_Rela *rela;
99e4ae17 4289{
100382c7
HPN
4290 enum elf_cris_reloc_type r_type = ELF32_R_TYPE (rela->r_info);
4291 switch (r_type)
99e4ae17
AJ
4292 {
4293 case R_CRIS_RELATIVE:
4294 return reloc_class_relative;
4295 case R_CRIS_JUMP_SLOT:
4296 return reloc_class_plt;
4297 case R_CRIS_COPY:
4298 return reloc_class_copy;
4299 default:
4300 return reloc_class_normal;
4301 }
4302}
100382c7
HPN
4303
4304/* The elf_backend_got_elt_size worker. For one symbol, we can have up to
4305 two GOT entries from three types with two different sizes. We handle
4306 it as a single entry, so we can use the regular offset-calculation
4307 machinery. */
4308
4309static bfd_vma
4310elf_cris_got_elt_size (bfd *abfd ATTRIBUTE_UNUSED,
4311 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4312 struct elf_link_hash_entry *hr,
4313 bfd *ibfd,
4314 unsigned long symndx)
4315{
4316 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *) hr;
100382c7
HPN
4317 bfd_vma eltsiz = 0;
4318
4319 /* We may have one regular GOT entry or up to two TLS GOT
4320 entries. */
4321 if (h == NULL)
4322 {
b2e254f9 4323 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
100382c7
HPN
4324 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (ibfd);
4325
4326 BFD_ASSERT (local_got_refcounts != NULL);
4327
4328 if (local_got_refcounts[LGOT_REG_NDX (symndx)] > 0)
4329 {
4330 /* We can't have a variable referred to both as a regular
4331 variable and through TLS relocs. */
4332 BFD_ASSERT (local_got_refcounts[LGOT_DTP_NDX (symndx)] == 0
4333 && local_got_refcounts[LGOT_TPREL_NDX (symndx)] == 0);
4334 return 4;
4335 }
4336
4337 if (local_got_refcounts[LGOT_DTP_NDX (symndx)] > 0)
4338 eltsiz += 8;
4339
4340 if (local_got_refcounts[LGOT_TPREL_NDX (symndx)] > 0)
4341 eltsiz += 4;
4342 }
4343 else
4344 {
4345 struct elf_cris_link_hash_entry *hh = elf_cris_hash_entry (h);
4346 if (hh->reg_got_refcount > 0)
4347 {
4348 /* The actual error-on-input is emitted elsewhere. */
4349 BFD_ASSERT (hh->dtp_refcount == 0 && hh->tprel_refcount == 0);
4350 return 4;
4351 }
4352
4353 if (hh->dtp_refcount > 0)
4354 eltsiz += 8;
4355
4356 if (hh->tprel_refcount > 0)
4357 eltsiz += 4;
4358 }
4359
b2e254f9
HPN
4360 /* We're only called when h->got.refcount is non-zero, so we must
4361 have a non-zero size. */
4362 BFD_ASSERT (eltsiz != 0);
100382c7
HPN
4363 return eltsiz;
4364}
06c15ad7
HPN
4365\f
4366#define ELF_ARCH bfd_arch_cris
ae95ffa6 4367#define ELF_TARGET_ID CRIS_ELF_DATA
06c15ad7
HPN
4368#define ELF_MACHINE_CODE EM_CRIS
4369#define ELF_MAXPAGESIZE 0x2000
4370
4371#define TARGET_LITTLE_SYM bfd_elf32_cris_vec
4372#define TARGET_LITTLE_NAME "elf32-cris"
4da81684 4373#define elf_symbol_leading_char 0
06c15ad7
HPN
4374
4375#define elf_info_to_howto_rel NULL
4376#define elf_info_to_howto cris_info_to_howto_rela
4377#define elf_backend_relocate_section cris_elf_relocate_section
4378#define elf_backend_gc_mark_hook cris_elf_gc_mark_hook
4379#define elf_backend_gc_sweep_hook cris_elf_gc_sweep_hook
5d5a918a 4380#define elf_backend_plt_sym_val cris_elf_plt_sym_val
06c15ad7 4381#define elf_backend_check_relocs cris_elf_check_relocs
72209a1f
HPN
4382#define elf_backend_grok_prstatus cris_elf_grok_prstatus
4383#define elf_backend_grok_psinfo cris_elf_grok_psinfo
06c15ad7
HPN
4384
4385#define elf_backend_can_gc_sections 1
51b64d56 4386#define elf_backend_can_refcount 1
06c15ad7 4387
4da81684
HPN
4388#define elf_backend_object_p cris_elf_object_p
4389#define elf_backend_final_write_processing \
4390 cris_elf_final_write_processing
4391#define bfd_elf32_bfd_print_private_bfd_data \
4392 cris_elf_print_private_bfd_data
4393#define bfd_elf32_bfd_merge_private_bfd_data \
4394 cris_elf_merge_private_bfd_data
bac23f82
HPN
4395#define bfd_elf32_bfd_copy_private_bfd_data \
4396 cris_elf_copy_private_bfd_data
4da81684 4397
06c15ad7 4398#define bfd_elf32_bfd_reloc_type_lookup cris_reloc_type_lookup
157090f7 4399#define bfd_elf32_bfd_reloc_name_lookup cris_reloc_name_lookup
06c15ad7 4400
915e5146
HPN
4401#define bfd_elf32_bfd_link_hash_table_create \
4402 elf_cris_link_hash_table_create
4403#define elf_backend_adjust_dynamic_symbol \
4404 elf_cris_adjust_dynamic_symbol
237bc7f0
HPN
4405#define elf_backend_copy_indirect_symbol \
4406 elf_cris_copy_indirect_symbol
915e5146
HPN
4407#define elf_backend_size_dynamic_sections \
4408 elf_cris_size_dynamic_sections
74541ad4 4409#define elf_backend_init_index_section _bfd_elf_init_1_index_section
915e5146
HPN
4410#define elf_backend_finish_dynamic_symbol \
4411 elf_cris_finish_dynamic_symbol
4412#define elf_backend_finish_dynamic_sections \
4413 elf_cris_finish_dynamic_sections
4414#define elf_backend_create_dynamic_sections \
4415 _bfd_elf_create_dynamic_sections
4416#define bfd_elf32_bfd_final_link \
c152c796 4417 bfd_elf_gc_common_final_link
915e5146 4418#define elf_backend_hide_symbol elf_cris_hide_symbol
99e4ae17 4419#define elf_backend_reloc_type_class elf_cris_reloc_type_class
915e5146
HPN
4420
4421#define elf_backend_want_got_plt 1
4422#define elf_backend_plt_readonly 1
4423#define elf_backend_want_plt_sym 0
4424#define elf_backend_got_header_size 12
100382c7 4425#define elf_backend_got_elt_size elf_cris_got_elt_size
915e5146 4426
06c15ad7
HPN
4427/* Later, we my want to optimize RELA entries into REL entries for dynamic
4428 linking and libraries (if it's a win of any significance). Until then,
4429 take the easy route. */
4430#define elf_backend_may_use_rel_p 0
4431#define elf_backend_may_use_rela_p 1
f0fe0e16 4432#define elf_backend_rela_normal 1
06c15ad7
HPN
4433
4434#include "elf32-target.h"
4da81684 4435
4da81684
HPN
4436#undef TARGET_LITTLE_SYM
4437#undef TARGET_LITTLE_NAME
4438#undef elf_symbol_leading_char
4439
4440#define TARGET_LITTLE_SYM bfd_elf32_us_cris_vec
4441#define TARGET_LITTLE_NAME "elf32-us-cris"
4442#define elf_symbol_leading_char '_'
16cecee5
L
4443#undef elf32_bed
4444#define elf32_bed elf32_us_cris_bed
4da81684
HPN
4445
4446#include "elf32-target.h"
This page took 0.811593 seconds and 4 git commands to generate.