PR ld/13311
[deliverable/binutils-gdb.git] / bfd / elf32-sh.c
CommitLineData
ef230218 1/* Renesas / SuperH SH specific support for 32-bit ELF
22d606e9 2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
7686d77d 3 2006, 2007, 2008, 2009, 2010, 2011 Free Software Foundation, Inc.
252b5132
RH
4 Contributed by Ian Lance Taylor, Cygnus Support.
5
571fe01f 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
571fe01f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
cd123cb7 10 the Free Software Foundation; either version 3 of the License, or
571fe01f 11 (at your option) any later version.
252b5132 12
571fe01f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
571fe01f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
cd123cb7
NC
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
252b5132 22
252b5132 23#include "sysdep.h"
3db64b00 24#include "bfd.h"
252b5132
RH
25#include "bfdlink.h"
26#include "libbfd.h"
27#include "elf-bfd.h"
55e6e397 28#include "elf-vxworks.h"
252b5132 29#include "elf/sh.h"
8e45593f 30#include "dwarf2.h"
f6f9408f 31#include "libiberty.h"
871ec896 32#include "../opcodes/sh-opc.h"
252b5132
RH
33
34static bfd_reloc_status_type sh_elf_reloc
09fd220b 35 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 36static bfd_reloc_status_type sh_elf_ignore_reloc
09fd220b 37 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
b34976b6 38static bfd_boolean sh_elf_relax_delete_bytes
09fd220b 39 (bfd *, asection *, bfd_vma, int);
b34976b6 40static bfd_boolean sh_elf_align_loads
09fd220b 41 (bfd *, asection *, Elf_Internal_Rela *, bfd_byte *, bfd_boolean *);
85fbca6a 42#ifndef SH64_ELF
b34976b6 43static bfd_boolean sh_elf_swap_insns
09fd220b 44 (bfd *, asection *, void *, bfd_byte *, bfd_vma);
85fbca6a 45#endif
3376eaf5 46static int sh_elf_optimized_tls_reloc
09fd220b 47 (struct bfd_link_info *, int, int);
3376eaf5 48static bfd_vma dtpoff_base
09fd220b 49 (struct bfd_link_info *);
267fb3c1 50static bfd_vma tpoff
09fd220b 51 (struct bfd_link_info *, bfd_vma);
37c644f2
AO
52
53/* The name of the dynamic interpreter. This is put in the .interp
54 section. */
55
56#define ELF_DYNAMIC_INTERPRETER "/usr/lib/libc.so.1"
252b5132 57
8e45593f
NC
58/* FDPIC binaries have a default 128K stack. */
59#define DEFAULT_STACK_SIZE 0x20000
60
55e6e397 61#define MINUS_ONE ((bfd_vma) 0 - 1)
8e45593f
NC
62
63/* Decide whether a reference to a symbol can be resolved locally or
64 not. If the symbol is protected, we want the local address, but
65 its function descriptor must be assigned by the dynamic linker. */
66#define SYMBOL_FUNCDESC_LOCAL(INFO, H) \
67 (SYMBOL_REFERENCES_LOCAL (INFO, H) \
68 || ! elf_hash_table (INFO)->dynamic_sections_created)
55e6e397
RS
69\f
70#define SH_PARTIAL32 TRUE
71#define SH_SRC_MASK32 0xffffffff
72#define SH_ELF_RELOC sh_elf_reloc
38b1a46c
NC
73static reloc_howto_type sh_elf_howto_table[] =
74{
55e6e397
RS
75#include "elf32-sh-relocs.h"
76};
fbca6ad9 77
55e6e397
RS
78#define SH_PARTIAL32 FALSE
79#define SH_SRC_MASK32 0
80#define SH_ELF_RELOC bfd_elf_generic_reloc
81static reloc_howto_type sh_vxworks_howto_table[] =
82{
83#include "elf32-sh-relocs.h"
84};
85\f
86/* Return true if OUTPUT_BFD is a VxWorks object. */
fbca6ad9 87
55e6e397 88static bfd_boolean
527a23b8 89vxworks_object_p (bfd *abfd ATTRIBUTE_UNUSED)
55e6e397 90{
527a23b8 91#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
55e6e397
RS
92 extern const bfd_target bfd_elf32_shlvxworks_vec;
93 extern const bfd_target bfd_elf32_shvxworks_vec;
fbca6ad9 94
55e6e397
RS
95 return (abfd->xvec == &bfd_elf32_shlvxworks_vec
96 || abfd->xvec == &bfd_elf32_shvxworks_vec);
527a23b8
NC
97#else
98 return FALSE;
99#endif
55e6e397 100}
fbca6ad9 101
8e45593f
NC
102/* Return true if OUTPUT_BFD is an FDPIC object. */
103
104static bfd_boolean
105fdpic_object_p (bfd *abfd ATTRIBUTE_UNUSED)
106{
107#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
108 extern const bfd_target bfd_elf32_shfd_vec;
109 extern const bfd_target bfd_elf32_shbfd_vec;
110
111 return (abfd->xvec == &bfd_elf32_shfd_vec
112 || abfd->xvec == &bfd_elf32_shbfd_vec);
113#else
114 return FALSE;
115#endif
116}
117
55e6e397 118/* Return the howto table for ABFD. */
fbca6ad9 119
55e6e397
RS
120static reloc_howto_type *
121get_howto_table (bfd *abfd)
122{
123 if (vxworks_object_p (abfd))
124 return sh_vxworks_howto_table;
125 return sh_elf_howto_table;
126}
252b5132 127
015551fc 128static bfd_reloc_status_type
09fd220b
KK
129sh_elf_reloc_loop (int r_type ATTRIBUTE_UNUSED, bfd *input_bfd,
130 asection *input_section, bfd_byte *contents,
131 bfd_vma addr, asection *symbol_section,
132 bfd_vma start, bfd_vma end)
015551fc
JR
133{
134 static bfd_vma last_addr;
00fdaf47 135 static asection *last_symbol_section;
015551fc
JR
136 bfd_byte *start_ptr, *ptr, *last_ptr;
137 int diff, cum_diff;
138 bfd_signed_vma x;
139 int insn;
140
141 /* Sanity check the address. */
07515404 142 if (addr > bfd_get_section_limit (input_bfd, input_section))
015551fc
JR
143 return bfd_reloc_outofrange;
144
145 /* We require the start and end relocations to be processed consecutively -
146 although we allow then to be processed forwards or backwards. */
147 if (! last_addr)
148 {
149 last_addr = addr;
150 last_symbol_section = symbol_section;
151 return bfd_reloc_ok;
152 }
153 if (last_addr != addr)
154 abort ();
155 last_addr = 0;
156
157 if (! symbol_section || last_symbol_section != symbol_section || end < start)
158 return bfd_reloc_outofrange;
159
160 /* Get the symbol_section contents. */
161 if (symbol_section != input_section)
162 {
163 if (elf_section_data (symbol_section)->this_hdr.contents != NULL)
164 contents = elf_section_data (symbol_section)->this_hdr.contents;
165 else
166 {
eea6121a
AM
167 if (!bfd_malloc_and_get_section (input_bfd, symbol_section,
168 &contents))
015551fc 169 {
eea6121a
AM
170 if (contents != NULL)
171 free (contents);
015551fc
JR
172 return bfd_reloc_outofrange;
173 }
174 }
175 }
176#define IS_PPI(PTR) ((bfd_get_16 (input_bfd, (PTR)) & 0xfc00) == 0xf800)
177 start_ptr = contents + start;
178 for (cum_diff = -6, ptr = contents + end; cum_diff < 0 && ptr > start_ptr;)
179 {
180 for (last_ptr = ptr, ptr -= 4; ptr >= start_ptr && IS_PPI (ptr);)
181 ptr -= 2;
182 ptr += 2;
61ff1804 183 diff = (last_ptr - ptr) >> 1;
015551fc
JR
184 cum_diff += diff & 1;
185 cum_diff += diff;
186 }
187 /* Calculate the start / end values to load into rs / re minus four -
188 so that will cancel out the four we would otherwise have to add to
189 addr to get the value to subtract in order to get relative addressing. */
190 if (cum_diff >= 0)
191 {
192 start -= 4;
193 end = (ptr + cum_diff * 2) - contents;
194 }
195 else
196 {
197 bfd_vma start0 = start - 4;
198
a0fc8ba1 199 while (start0 && IS_PPI (contents + start0))
015551fc
JR
200 start0 -= 2;
201 start0 = start - 2 - ((start - start0) & 2);
202 start = start0 - cum_diff - 2;
203 end = start0;
204 }
205
6cdc0ccc
AM
206 if (contents != NULL
207 && elf_section_data (symbol_section)->this_hdr.contents != contents)
208 free (contents);
015551fc
JR
209
210 insn = bfd_get_16 (input_bfd, contents + addr);
211
212 x = (insn & 0x200 ? end : start) - addr;
213 if (input_section != symbol_section)
214 x += ((symbol_section->output_section->vma + symbol_section->output_offset)
215 - (input_section->output_section->vma
216 + input_section->output_offset));
217 x >>= 1;
218 if (x < -128 || x > 127)
219 return bfd_reloc_overflow;
220
61ff1804 221 x = (insn & ~0xff) | (x & 0xff);
dc810e39 222 bfd_put_16 (input_bfd, (bfd_vma) x, contents + addr);
015551fc
JR
223
224 return bfd_reloc_ok;
225}
226
227/* This function is used for normal relocs. This used to be like the COFF
252b5132
RH
228 function, and is almost certainly incorrect for other ELF targets. */
229
230static bfd_reloc_status_type
09fd220b
KK
231sh_elf_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol_in,
232 void *data, asection *input_section, bfd *output_bfd,
233 char **error_message ATTRIBUTE_UNUSED)
252b5132
RH
234{
235 unsigned long insn;
236 bfd_vma sym_value;
237 enum elf_sh_reloc_type r_type;
238 bfd_vma addr = reloc_entry->address;
239 bfd_byte *hit_data = addr + (bfd_byte *) data;
240
241 r_type = (enum elf_sh_reloc_type) reloc_entry->howto->type;
242
243 if (output_bfd != NULL)
244 {
245 /* Partial linking--do nothing. */
246 reloc_entry->address += input_section->output_offset;
247 return bfd_reloc_ok;
248 }
249
250 /* Almost all relocs have to do with relaxing. If any work must be
251 done for them, it has been done in sh_relax_section. */
015551fc 252 if (r_type == R_SH_IND12W && (symbol_in->flags & BSF_LOCAL) != 0)
252b5132
RH
253 return bfd_reloc_ok;
254
255 if (symbol_in != NULL
256 && bfd_is_und_section (symbol_in->section))
257 return bfd_reloc_undefined;
258
259 if (bfd_is_com_section (symbol_in->section))
435b1e90
KH
260 sym_value = 0;
261 else
252b5132
RH
262 sym_value = (symbol_in->value +
263 symbol_in->section->output_section->vma +
264 symbol_in->section->output_offset);
265
266 switch (r_type)
267 {
268 case R_SH_DIR32:
269 insn = bfd_get_32 (abfd, hit_data);
270 insn += sym_value + reloc_entry->addend;
dc810e39 271 bfd_put_32 (abfd, (bfd_vma) insn, hit_data);
252b5132
RH
272 break;
273 case R_SH_IND12W:
274 insn = bfd_get_16 (abfd, hit_data);
275 sym_value += reloc_entry->addend;
276 sym_value -= (input_section->output_section->vma
277 + input_section->output_offset
278 + addr
279 + 4);
280 sym_value += (insn & 0xfff) << 1;
281 if (insn & 0x800)
282 sym_value -= 0x1000;
283 insn = (insn & 0xf000) | (sym_value & 0xfff);
dc810e39 284 bfd_put_16 (abfd, (bfd_vma) insn, hit_data);
252b5132
RH
285 if (sym_value < (bfd_vma) -0x1000 || sym_value >= 0x1000)
286 return bfd_reloc_overflow;
287 break;
288 default:
289 abort ();
290 break;
291 }
292
293 return bfd_reloc_ok;
294}
295
296/* This function is used for relocs which are only used for relaxing,
297 which the linker should otherwise ignore. */
298
299static bfd_reloc_status_type
09fd220b
KK
300sh_elf_ignore_reloc (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc_entry,
301 asymbol *symbol ATTRIBUTE_UNUSED,
302 void *data ATTRIBUTE_UNUSED, asection *input_section,
303 bfd *output_bfd,
304 char **error_message ATTRIBUTE_UNUSED)
252b5132
RH
305{
306 if (output_bfd != NULL)
307 reloc_entry->address += input_section->output_offset;
308 return bfd_reloc_ok;
309}
310
311/* This structure is used to map BFD reloc codes to SH ELF relocs. */
312
38b1a46c
NC
313struct elf_reloc_map
314{
252b5132
RH
315 bfd_reloc_code_real_type bfd_reloc_val;
316 unsigned char elf_reloc_val;
317};
318
319/* An array mapping BFD reloc codes to SH ELF relocs. */
320
38b1a46c
NC
321static const struct elf_reloc_map sh_reloc_map[] =
322{
252b5132
RH
323 { BFD_RELOC_NONE, R_SH_NONE },
324 { BFD_RELOC_32, R_SH_DIR32 },
d38eb334
DD
325 { BFD_RELOC_16, R_SH_DIR16 },
326 { BFD_RELOC_8, R_SH_DIR8 },
252b5132
RH
327 { BFD_RELOC_CTOR, R_SH_DIR32 },
328 { BFD_RELOC_32_PCREL, R_SH_REL32 },
329 { BFD_RELOC_SH_PCDISP8BY2, R_SH_DIR8WPN },
330 { BFD_RELOC_SH_PCDISP12BY2, R_SH_IND12W },
331 { BFD_RELOC_SH_PCRELIMM8BY2, R_SH_DIR8WPZ },
332 { BFD_RELOC_SH_PCRELIMM8BY4, R_SH_DIR8WPL },
333 { BFD_RELOC_8_PCREL, R_SH_SWITCH8 },
334 { BFD_RELOC_SH_SWITCH16, R_SH_SWITCH16 },
335 { BFD_RELOC_SH_SWITCH32, R_SH_SWITCH32 },
336 { BFD_RELOC_SH_USES, R_SH_USES },
337 { BFD_RELOC_SH_COUNT, R_SH_COUNT },
338 { BFD_RELOC_SH_ALIGN, R_SH_ALIGN },
339 { BFD_RELOC_SH_CODE, R_SH_CODE },
340 { BFD_RELOC_SH_DATA, R_SH_DATA },
341 { BFD_RELOC_SH_LABEL, R_SH_LABEL },
342 { BFD_RELOC_VTABLE_INHERIT, R_SH_GNU_VTINHERIT },
343 { BFD_RELOC_VTABLE_ENTRY, R_SH_GNU_VTENTRY },
015551fc
JR
344 { BFD_RELOC_SH_LOOP_START, R_SH_LOOP_START },
345 { BFD_RELOC_SH_LOOP_END, R_SH_LOOP_END },
3376eaf5
KK
346 { BFD_RELOC_SH_TLS_GD_32, R_SH_TLS_GD_32 },
347 { BFD_RELOC_SH_TLS_LD_32, R_SH_TLS_LD_32 },
348 { BFD_RELOC_SH_TLS_LDO_32, R_SH_TLS_LDO_32 },
349 { BFD_RELOC_SH_TLS_IE_32, R_SH_TLS_IE_32 },
350 { BFD_RELOC_SH_TLS_LE_32, R_SH_TLS_LE_32 },
351 { BFD_RELOC_SH_TLS_DTPMOD32, R_SH_TLS_DTPMOD32 },
352 { BFD_RELOC_SH_TLS_DTPOFF32, R_SH_TLS_DTPOFF32 },
353 { BFD_RELOC_SH_TLS_TPOFF32, R_SH_TLS_TPOFF32 },
37c644f2
AO
354 { BFD_RELOC_32_GOT_PCREL, R_SH_GOT32 },
355 { BFD_RELOC_32_PLT_PCREL, R_SH_PLT32 },
356 { BFD_RELOC_SH_COPY, R_SH_COPY },
357 { BFD_RELOC_SH_GLOB_DAT, R_SH_GLOB_DAT },
358 { BFD_RELOC_SH_JMP_SLOT, R_SH_JMP_SLOT },
359 { BFD_RELOC_SH_RELATIVE, R_SH_RELATIVE },
360 { BFD_RELOC_32_GOTOFF, R_SH_GOTOFF },
361 { BFD_RELOC_SH_GOTPC, R_SH_GOTPC },
fbca6ad9 362 { BFD_RELOC_SH_GOTPLT32, R_SH_GOTPLT32 },
8e45593f
NC
363 { BFD_RELOC_SH_GOT20, R_SH_GOT20 },
364 { BFD_RELOC_SH_GOTOFF20, R_SH_GOTOFF20 },
365 { BFD_RELOC_SH_GOTFUNCDESC, R_SH_GOTFUNCDESC },
366 { BFD_RELOC_SH_GOTFUNCDESC20, R_SH_GOTFUNCDESC20 },
367 { BFD_RELOC_SH_GOTOFFFUNCDESC, R_SH_GOTOFFFUNCDESC },
368 { BFD_RELOC_SH_GOTOFFFUNCDESC20, R_SH_GOTOFFFUNCDESC20 },
369 { BFD_RELOC_SH_FUNCDESC, R_SH_FUNCDESC },
fbca6ad9
AO
370#ifdef INCLUDE_SHMEDIA
371 { BFD_RELOC_SH_GOT_LOW16, R_SH_GOT_LOW16 },
372 { BFD_RELOC_SH_GOT_MEDLOW16, R_SH_GOT_MEDLOW16 },
373 { BFD_RELOC_SH_GOT_MEDHI16, R_SH_GOT_MEDHI16 },
374 { BFD_RELOC_SH_GOT_HI16, R_SH_GOT_HI16 },
375 { BFD_RELOC_SH_GOTPLT_LOW16, R_SH_GOTPLT_LOW16 },
376 { BFD_RELOC_SH_GOTPLT_MEDLOW16, R_SH_GOTPLT_MEDLOW16 },
377 { BFD_RELOC_SH_GOTPLT_MEDHI16, R_SH_GOTPLT_MEDHI16 },
378 { BFD_RELOC_SH_GOTPLT_HI16, R_SH_GOTPLT_HI16 },
379 { BFD_RELOC_SH_PLT_LOW16, R_SH_PLT_LOW16 },
380 { BFD_RELOC_SH_PLT_MEDLOW16, R_SH_PLT_MEDLOW16 },
381 { BFD_RELOC_SH_PLT_MEDHI16, R_SH_PLT_MEDHI16 },
382 { BFD_RELOC_SH_PLT_HI16, R_SH_PLT_HI16 },
383 { BFD_RELOC_SH_GOTOFF_LOW16, R_SH_GOTOFF_LOW16 },
384 { BFD_RELOC_SH_GOTOFF_MEDLOW16, R_SH_GOTOFF_MEDLOW16 },
385 { BFD_RELOC_SH_GOTOFF_MEDHI16, R_SH_GOTOFF_MEDHI16 },
386 { BFD_RELOC_SH_GOTOFF_HI16, R_SH_GOTOFF_HI16 },
387 { BFD_RELOC_SH_GOTPC_LOW16, R_SH_GOTPC_LOW16 },
388 { BFD_RELOC_SH_GOTPC_MEDLOW16, R_SH_GOTPC_MEDLOW16 },
389 { BFD_RELOC_SH_GOTPC_MEDHI16, R_SH_GOTPC_MEDHI16 },
390 { BFD_RELOC_SH_GOTPC_HI16, R_SH_GOTPC_HI16 },
391 { BFD_RELOC_SH_COPY64, R_SH_COPY64 },
392 { BFD_RELOC_SH_GLOB_DAT64, R_SH_GLOB_DAT64 },
393 { BFD_RELOC_SH_JMP_SLOT64, R_SH_JMP_SLOT64 },
394 { BFD_RELOC_SH_RELATIVE64, R_SH_RELATIVE64 },
395 { BFD_RELOC_SH_GOT10BY4, R_SH_GOT10BY4 },
396 { BFD_RELOC_SH_GOT10BY8, R_SH_GOT10BY8 },
397 { BFD_RELOC_SH_GOTPLT10BY4, R_SH_GOTPLT10BY4 },
398 { BFD_RELOC_SH_GOTPLT10BY8, R_SH_GOTPLT10BY8 },
399 { BFD_RELOC_SH_PT_16, R_SH_PT_16 },
400 { BFD_RELOC_SH_SHMEDIA_CODE, R_SH_SHMEDIA_CODE },
401 { BFD_RELOC_SH_IMMU5, R_SH_DIR5U },
402 { BFD_RELOC_SH_IMMS6, R_SH_DIR6S },
403 { BFD_RELOC_SH_IMMU6, R_SH_DIR6U },
404 { BFD_RELOC_SH_IMMS10, R_SH_DIR10S },
405 { BFD_RELOC_SH_IMMS10BY2, R_SH_DIR10SW },
406 { BFD_RELOC_SH_IMMS10BY4, R_SH_DIR10SL },
407 { BFD_RELOC_SH_IMMS10BY8, R_SH_DIR10SQ },
408 { BFD_RELOC_SH_IMMS16, R_SH_IMMS16 },
409 { BFD_RELOC_SH_IMMU16, R_SH_IMMU16 },
410 { BFD_RELOC_SH_IMM_LOW16, R_SH_IMM_LOW16 },
411 { BFD_RELOC_SH_IMM_LOW16_PCREL, R_SH_IMM_LOW16_PCREL },
412 { BFD_RELOC_SH_IMM_MEDLOW16, R_SH_IMM_MEDLOW16 },
413 { BFD_RELOC_SH_IMM_MEDLOW16_PCREL, R_SH_IMM_MEDLOW16_PCREL },
414 { BFD_RELOC_SH_IMM_MEDHI16, R_SH_IMM_MEDHI16 },
415 { BFD_RELOC_SH_IMM_MEDHI16_PCREL, R_SH_IMM_MEDHI16_PCREL },
416 { BFD_RELOC_SH_IMM_HI16, R_SH_IMM_HI16 },
417 { BFD_RELOC_SH_IMM_HI16_PCREL, R_SH_IMM_HI16_PCREL },
418 { BFD_RELOC_64, R_SH_64 },
419 { BFD_RELOC_64_PCREL, R_SH_64_PCREL },
420#endif /* not INCLUDE_SHMEDIA */
252b5132
RH
421};
422
423/* Given a BFD reloc code, return the howto structure for the
55e6e397 424 corresponding SH ELF reloc. */
252b5132
RH
425
426static reloc_howto_type *
55e6e397 427sh_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
252b5132
RH
428{
429 unsigned int i;
430
431 for (i = 0; i < sizeof (sh_reloc_map) / sizeof (struct elf_reloc_map); i++)
432 {
433 if (sh_reloc_map[i].bfd_reloc_val == code)
55e6e397 434 return get_howto_table (abfd) + (int) sh_reloc_map[i].elf_reloc_val;
252b5132
RH
435 }
436
437 return NULL;
438}
439
157090f7
AM
440static reloc_howto_type *
441sh_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
442{
443 unsigned int i;
444
445 if (vxworks_object_p (abfd))
446 {
447 for (i = 0;
448 i < (sizeof (sh_vxworks_howto_table)
449 / sizeof (sh_vxworks_howto_table[0]));
450 i++)
451 if (sh_vxworks_howto_table[i].name != NULL
452 && strcasecmp (sh_vxworks_howto_table[i].name, r_name) == 0)
453 return &sh_vxworks_howto_table[i];
454 }
455 else
456 {
457 for (i = 0;
458 i < (sizeof (sh_elf_howto_table)
459 / sizeof (sh_elf_howto_table[0]));
460 i++)
461 if (sh_elf_howto_table[i].name != NULL
462 && strcasecmp (sh_elf_howto_table[i].name, r_name) == 0)
463 return &sh_elf_howto_table[i];
464 }
465
466 return NULL;
467}
468
252b5132
RH
469/* Given an ELF reloc, fill in the howto field of a relent. */
470
471static void
55e6e397 472sh_elf_info_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
252b5132
RH
473{
474 unsigned int r;
475
476 r = ELF32_R_TYPE (dst->r_info);
477
478 BFD_ASSERT (r < (unsigned int) R_SH_max);
479 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC || r > R_SH_LAST_INVALID_RELOC);
06bb75c1 480 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_2 || r > R_SH_LAST_INVALID_RELOC_2);
fbca6ad9
AO
481 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_3 || r > R_SH_LAST_INVALID_RELOC_3);
482 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_4 || r > R_SH_LAST_INVALID_RELOC_4);
3376eaf5 483 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_5 || r > R_SH_LAST_INVALID_RELOC_5);
8e45593f 484 BFD_ASSERT (r < R_SH_FIRST_INVALID_RELOC_6 || r > R_SH_LAST_INVALID_RELOC_6);
252b5132 485
55e6e397 486 cache_ptr->howto = get_howto_table (abfd) + r;
252b5132
RH
487}
488\f
489/* This function handles relaxing for SH ELF. See the corresponding
490 function in coff-sh.c for a description of what this does. FIXME:
491 There is a lot of duplication here between this code and the COFF
492 specific code. The format of relocs and symbols is wound deeply
493 into this code, but it would still be better if the duplication
494 could be eliminated somehow. Note in particular that although both
495 functions use symbols like R_SH_CODE, those symbols have different
496 values; in coff-sh.c they come from include/coff/sh.h, whereas here
497 they come from enum elf_sh_reloc_type in include/elf/sh.h. */
498
b34976b6 499static bfd_boolean
09fd220b
KK
500sh_elf_relax_section (bfd *abfd, asection *sec,
501 struct bfd_link_info *link_info, bfd_boolean *again)
252b5132
RH
502{
503 Elf_Internal_Shdr *symtab_hdr;
504 Elf_Internal_Rela *internal_relocs;
b34976b6 505 bfd_boolean have_code;
252b5132
RH
506 Elf_Internal_Rela *irel, *irelend;
507 bfd_byte *contents = NULL;
6cdc0ccc 508 Elf_Internal_Sym *isymbuf = NULL;
252b5132 509
b34976b6 510 *again = FALSE;
252b5132 511
1049f94e 512 if (link_info->relocatable
252b5132
RH
513 || (sec->flags & SEC_RELOC) == 0
514 || sec->reloc_count == 0)
b34976b6 515 return TRUE;
252b5132 516
fbca6ad9
AO
517#ifdef INCLUDE_SHMEDIA
518 if (elf_section_data (sec)->this_hdr.sh_flags
519 & (SHF_SH5_ISA32 | SHF_SH5_ISA32_MIXED))
520 {
b34976b6 521 return TRUE;
fbca6ad9
AO
522 }
523#endif
524
0ffa91dd 525 symtab_hdr = &elf_symtab_hdr (abfd);
252b5132 526
45d6a902 527 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 528 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
252b5132
RH
529 link_info->keep_memory));
530 if (internal_relocs == NULL)
531 goto error_return;
252b5132 532
b34976b6 533 have_code = FALSE;
252b5132
RH
534
535 irelend = internal_relocs + sec->reloc_count;
536 for (irel = internal_relocs; irel < irelend; irel++)
537 {
538 bfd_vma laddr, paddr, symval;
539 unsigned short insn;
540 Elf_Internal_Rela *irelfn, *irelscan, *irelcount;
541 bfd_signed_vma foff;
542
543 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_CODE)
b34976b6 544 have_code = TRUE;
252b5132
RH
545
546 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_USES)
547 continue;
548
549 /* Get the section contents. */
550 if (contents == NULL)
551 {
552 if (elf_section_data (sec)->this_hdr.contents != NULL)
553 contents = elf_section_data (sec)->this_hdr.contents;
554 else
555 {
eea6121a 556 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
557 goto error_return;
558 }
559 }
560
561 /* The r_addend field of the R_SH_USES reloc will point us to
067653c5
AM
562 the register load. The 4 is because the r_addend field is
563 computed as though it were a jump offset, which are based
564 from 4 bytes after the jump instruction. */
252b5132 565 laddr = irel->r_offset + 4 + irel->r_addend;
eea6121a 566 if (laddr >= sec->size)
252b5132 567 {
d003868e
AM
568 (*_bfd_error_handler) (_("%B: 0x%lx: warning: bad R_SH_USES offset"),
569 abfd,
252b5132
RH
570 (unsigned long) irel->r_offset);
571 continue;
572 }
573 insn = bfd_get_16 (abfd, contents + laddr);
574
575 /* If the instruction is not mov.l NN,rN, we don't know what to
067653c5 576 do. */
252b5132
RH
577 if ((insn & 0xf000) != 0xd000)
578 {
579 ((*_bfd_error_handler)
d003868e
AM
580 (_("%B: 0x%lx: warning: R_SH_USES points to unrecognized insn 0x%x"),
581 abfd, (unsigned long) irel->r_offset, insn));
252b5132
RH
582 continue;
583 }
584
585 /* Get the address from which the register is being loaded. The
99e4ae17
AJ
586 displacement in the mov.l instruction is quadrupled. It is a
587 displacement from four bytes after the movl instruction, but,
588 before adding in the PC address, two least significant bits
589 of the PC are cleared. We assume that the section is aligned
590 on a four byte boundary. */
252b5132
RH
591 paddr = insn & 0xff;
592 paddr *= 4;
dc810e39 593 paddr += (laddr + 4) &~ (bfd_vma) 3;
eea6121a 594 if (paddr >= sec->size)
252b5132
RH
595 {
596 ((*_bfd_error_handler)
d003868e
AM
597 (_("%B: 0x%lx: warning: bad R_SH_USES load offset"),
598 abfd, (unsigned long) irel->r_offset));
252b5132
RH
599 continue;
600 }
601
602 /* Get the reloc for the address from which the register is
067653c5
AM
603 being loaded. This reloc will tell us which function is
604 actually being called. */
252b5132
RH
605 for (irelfn = internal_relocs; irelfn < irelend; irelfn++)
606 if (irelfn->r_offset == paddr
607 && ELF32_R_TYPE (irelfn->r_info) == (int) R_SH_DIR32)
608 break;
609 if (irelfn >= irelend)
610 {
611 ((*_bfd_error_handler)
d003868e
AM
612 (_("%B: 0x%lx: warning: could not find expected reloc"),
613 abfd, (unsigned long) paddr));
252b5132
RH
614 continue;
615 }
616
617 /* Read this BFD's symbols if we haven't done so already. */
6cdc0ccc 618 if (isymbuf == NULL && symtab_hdr->sh_info != 0)
252b5132 619 {
6cdc0ccc
AM
620 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
621 if (isymbuf == NULL)
622 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
623 symtab_hdr->sh_info, 0,
624 NULL, NULL, NULL);
625 if (isymbuf == NULL)
626 goto error_return;
252b5132
RH
627 }
628
629 /* Get the value of the symbol referred to by the reloc. */
630 if (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
631 {
9ad5cbcf 632 /* A local symbol. */
6cdc0ccc 633 Elf_Internal_Sym *isym;
252b5132 634
6cdc0ccc
AM
635 isym = isymbuf + ELF32_R_SYM (irelfn->r_info);
636 if (isym->st_shndx
d426c6b0 637 != (unsigned int) _bfd_elf_section_from_bfd_section (abfd, sec))
252b5132
RH
638 {
639 ((*_bfd_error_handler)
d003868e
AM
640 (_("%B: 0x%lx: warning: symbol in unexpected section"),
641 abfd, (unsigned long) paddr));
252b5132
RH
642 continue;
643 }
644
6cdc0ccc 645 symval = (isym->st_value
252b5132
RH
646 + sec->output_section->vma
647 + sec->output_offset);
648 }
649 else
650 {
651 unsigned long indx;
652 struct elf_link_hash_entry *h;
653
654 indx = ELF32_R_SYM (irelfn->r_info) - symtab_hdr->sh_info;
655 h = elf_sym_hashes (abfd)[indx];
656 BFD_ASSERT (h != NULL);
657 if (h->root.type != bfd_link_hash_defined
658 && h->root.type != bfd_link_hash_defweak)
659 {
660 /* This appears to be a reference to an undefined
067653c5
AM
661 symbol. Just ignore it--it will be caught by the
662 regular reloc processing. */
252b5132
RH
663 continue;
664 }
665
666 symval = (h->root.u.def.value
667 + h->root.u.def.section->output_section->vma
668 + h->root.u.def.section->output_offset);
669 }
670
55e6e397
RS
671 if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
672 symval += bfd_get_32 (abfd, contents + paddr);
673 else
674 symval += irelfn->r_addend;
252b5132
RH
675
676 /* See if this function call can be shortened. */
677 foff = (symval
678 - (irel->r_offset
679 + sec->output_section->vma
680 + sec->output_offset
681 + 4));
f725025b
DD
682 /* A branch to an address beyond ours might be increased by an
683 .align that doesn't move when bytes behind us are deleted.
684 So, we add some slop in this calculation to allow for
685 that. */
686 if (foff < -0x1000 || foff >= 0x1000 - 8)
252b5132
RH
687 {
688 /* After all that work, we can't shorten this function call. */
689 continue;
690 }
691
692 /* Shorten the function call. */
693
694 /* For simplicity of coding, we are going to modify the section
695 contents, the section relocs, and the BFD symbol table. We
696 must tell the rest of the code not to free up this
697 information. It would be possible to instead create a table
698 of changes which have to be made, as is done in coff-mips.c;
699 that would be more work, but would require less memory when
700 the linker is run. */
701
702 elf_section_data (sec)->relocs = internal_relocs;
252b5132 703 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 704 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
705
706 /* Replace the jsr with a bsr. */
707
708 /* Change the R_SH_USES reloc into an R_SH_IND12W reloc, and
067653c5 709 replace the jsr with a bsr. */
252b5132 710 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irelfn->r_info), R_SH_IND12W);
bdfaef52
JR
711 /* We used to test (ELF32_R_SYM (irelfn->r_info) < symtab_hdr->sh_info)
712 here, but that only checks if the symbol is an external symbol,
713 not if the symbol is in a different section. Besides, we need
714 a consistent meaning for the relocation, so we just assume here that
715 the value of the symbol is not available. */
0e71e495
BE
716
717 /* We can't fully resolve this yet, because the external
718 symbol value may be changed by future relaxing. We let
719 the final link phase handle it. */
720 bfd_put_16 (abfd, (bfd_vma) 0xb000, contents + irel->r_offset);
721
bdfaef52 722 irel->r_addend = -4;
252b5132 723
f725025b
DD
724 /* When we calculated the symbol "value" we had an offset in the
725 DIR32's word in memory (we read and add it above). However,
726 the jsr we create does NOT have this offset encoded, so we
727 have to add it to the addend to preserve it. */
728 irel->r_addend += bfd_get_32 (abfd, contents + paddr);
729
252b5132 730 /* See if there is another R_SH_USES reloc referring to the same
067653c5 731 register load. */
252b5132
RH
732 for (irelscan = internal_relocs; irelscan < irelend; irelscan++)
733 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_USES
734 && laddr == irelscan->r_offset + 4 + irelscan->r_addend)
735 break;
736 if (irelscan < irelend)
737 {
738 /* Some other function call depends upon this register load,
739 and we have not yet converted that function call.
740 Indeed, we may never be able to convert it. There is
741 nothing else we can do at this point. */
742 continue;
743 }
744
745 /* Look for a R_SH_COUNT reloc on the location where the
067653c5
AM
746 function address is stored. Do this before deleting any
747 bytes, to avoid confusion about the address. */
252b5132
RH
748 for (irelcount = internal_relocs; irelcount < irelend; irelcount++)
749 if (irelcount->r_offset == paddr
750 && ELF32_R_TYPE (irelcount->r_info) == (int) R_SH_COUNT)
751 break;
752
753 /* Delete the register load. */
754 if (! sh_elf_relax_delete_bytes (abfd, sec, laddr, 2))
755 goto error_return;
756
757 /* That will change things, so, just in case it permits some
067653c5
AM
758 other function call to come within range, we should relax
759 again. Note that this is not required, and it may be slow. */
b34976b6 760 *again = TRUE;
252b5132
RH
761
762 /* Now check whether we got a COUNT reloc. */
763 if (irelcount >= irelend)
764 {
765 ((*_bfd_error_handler)
d003868e
AM
766 (_("%B: 0x%lx: warning: could not find expected COUNT reloc"),
767 abfd, (unsigned long) paddr));
252b5132
RH
768 continue;
769 }
770
771 /* The number of uses is stored in the r_addend field. We've
067653c5 772 just deleted one. */
252b5132
RH
773 if (irelcount->r_addend == 0)
774 {
d003868e
AM
775 ((*_bfd_error_handler) (_("%B: 0x%lx: warning: bad count"),
776 abfd,
252b5132
RH
777 (unsigned long) paddr));
778 continue;
779 }
780
781 --irelcount->r_addend;
782
783 /* If there are no more uses, we can delete the address. Reload
067653c5
AM
784 the address from irelfn, in case it was changed by the
785 previous call to sh_elf_relax_delete_bytes. */
252b5132
RH
786 if (irelcount->r_addend == 0)
787 {
788 if (! sh_elf_relax_delete_bytes (abfd, sec, irelfn->r_offset, 4))
789 goto error_return;
790 }
791
792 /* We've done all we can with that function call. */
793 }
794
795 /* Look for load and store instructions that we can align on four
796 byte boundaries. */
bdfaef52
JR
797 if ((elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK) != EF_SH4
798 && have_code)
252b5132 799 {
b34976b6 800 bfd_boolean swapped;
252b5132
RH
801
802 /* Get the section contents. */
803 if (contents == NULL)
804 {
805 if (elf_section_data (sec)->this_hdr.contents != NULL)
806 contents = elf_section_data (sec)->this_hdr.contents;
807 else
808 {
eea6121a 809 if (!bfd_malloc_and_get_section (abfd, sec, &contents))
252b5132
RH
810 goto error_return;
811 }
812 }
813
814 if (! sh_elf_align_loads (abfd, sec, internal_relocs, contents,
815 &swapped))
816 goto error_return;
817
818 if (swapped)
819 {
820 elf_section_data (sec)->relocs = internal_relocs;
252b5132 821 elf_section_data (sec)->this_hdr.contents = contents;
6cdc0ccc 822 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132
RH
823 }
824 }
825
6cdc0ccc
AM
826 if (isymbuf != NULL
827 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132
RH
828 {
829 if (! link_info->keep_memory)
6cdc0ccc 830 free (isymbuf);
252b5132
RH
831 else
832 {
6cdc0ccc
AM
833 /* Cache the symbols for elf_link_input_bfd. */
834 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 835 }
9ad5cbcf
AM
836 }
837
6cdc0ccc
AM
838 if (contents != NULL
839 && elf_section_data (sec)->this_hdr.contents != contents)
252b5132
RH
840 {
841 if (! link_info->keep_memory)
6cdc0ccc
AM
842 free (contents);
843 else
252b5132 844 {
6cdc0ccc
AM
845 /* Cache the section contents for elf_link_input_bfd. */
846 elf_section_data (sec)->this_hdr.contents = contents;
252b5132 847 }
252b5132
RH
848 }
849
6cdc0ccc
AM
850 if (internal_relocs != NULL
851 && elf_section_data (sec)->relocs != internal_relocs)
852 free (internal_relocs);
853
b34976b6 854 return TRUE;
252b5132
RH
855
856 error_return:
6cdc0ccc
AM
857 if (isymbuf != NULL
858 && symtab_hdr->contents != (unsigned char *) isymbuf)
859 free (isymbuf);
860 if (contents != NULL
861 && elf_section_data (sec)->this_hdr.contents != contents)
862 free (contents);
863 if (internal_relocs != NULL
864 && elf_section_data (sec)->relocs != internal_relocs)
865 free (internal_relocs);
9ad5cbcf 866
b34976b6 867 return FALSE;
252b5132
RH
868}
869
870/* Delete some bytes from a section while relaxing. FIXME: There is a
871 lot of duplication between this function and sh_relax_delete_bytes
872 in coff-sh.c. */
873
b34976b6 874static bfd_boolean
09fd220b
KK
875sh_elf_relax_delete_bytes (bfd *abfd, asection *sec, bfd_vma addr,
876 int count)
252b5132
RH
877{
878 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 879 unsigned int sec_shndx;
252b5132
RH
880 bfd_byte *contents;
881 Elf_Internal_Rela *irel, *irelend;
882 Elf_Internal_Rela *irelalign;
883 bfd_vma toaddr;
6cdc0ccc 884 Elf_Internal_Sym *isymbuf, *isym, *isymend;
9ad5cbcf
AM
885 struct elf_link_hash_entry **sym_hashes;
886 struct elf_link_hash_entry **end_hashes;
887 unsigned int symcount;
252b5132
RH
888 asection *o;
889
0ffa91dd 890 symtab_hdr = &elf_symtab_hdr (abfd);
6cdc0ccc 891 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
9ad5cbcf
AM
892
893 sec_shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132
RH
894
895 contents = elf_section_data (sec)->this_hdr.contents;
896
897 /* The deletion must stop at the next ALIGN reloc for an aligment
898 power larger than the number of bytes we are deleting. */
899
900 irelalign = NULL;
eea6121a 901 toaddr = sec->size;
252b5132
RH
902
903 irel = elf_section_data (sec)->relocs;
904 irelend = irel + sec->reloc_count;
905 for (; irel < irelend; irel++)
906 {
907 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
908 && irel->r_offset > addr
909 && count < (1 << irel->r_addend))
910 {
911 irelalign = irel;
912 toaddr = irel->r_offset;
913 break;
914 }
915 }
916
917 /* Actually delete the bytes. */
dc810e39
AM
918 memmove (contents + addr, contents + addr + count,
919 (size_t) (toaddr - addr - count));
252b5132 920 if (irelalign == NULL)
eea6121a 921 sec->size -= count;
252b5132
RH
922 else
923 {
924 int i;
925
926#define NOP_OPCODE (0x0009)
927
928 BFD_ASSERT ((count & 1) == 0);
929 for (i = 0; i < count; i += 2)
dc810e39 930 bfd_put_16 (abfd, (bfd_vma) NOP_OPCODE, contents + toaddr - count + i);
252b5132
RH
931 }
932
933 /* Adjust all the relocs. */
934 for (irel = elf_section_data (sec)->relocs; irel < irelend; irel++)
935 {
936 bfd_vma nraddr, stop;
937 bfd_vma start = 0;
938 int insn = 0;
252b5132
RH
939 int off, adjust, oinsn;
940 bfd_signed_vma voff = 0;
b34976b6 941 bfd_boolean overflow;
252b5132
RH
942
943 /* Get the new reloc address. */
944 nraddr = irel->r_offset;
945 if ((irel->r_offset > addr
946 && irel->r_offset < toaddr)
947 || (ELF32_R_TYPE (irel->r_info) == (int) R_SH_ALIGN
948 && irel->r_offset == toaddr))
949 nraddr -= count;
950
951 /* See if this reloc was for the bytes we have deleted, in which
952 case we no longer care about it. Don't delete relocs which
953 represent addresses, though. */
954 if (irel->r_offset >= addr
955 && irel->r_offset < addr + count
956 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_ALIGN
957 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE
958 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_DATA
959 && ELF32_R_TYPE (irel->r_info) != (int) R_SH_LABEL)
960 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
961 (int) R_SH_NONE);
962
963 /* If this is a PC relative reloc, see if the range it covers
067653c5 964 includes the bytes we have deleted. */
252b5132
RH
965 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
966 {
967 default:
968 break;
969
970 case R_SH_DIR8WPN:
971 case R_SH_IND12W:
972 case R_SH_DIR8WPZ:
973 case R_SH_DIR8WPL:
974 start = irel->r_offset;
975 insn = bfd_get_16 (abfd, contents + nraddr);
976 break;
977 }
978
979 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
980 {
981 default:
982 start = stop = addr;
983 break;
984
985 case R_SH_DIR32:
986 /* If this reloc is against a symbol defined in this
067653c5
AM
987 section, and the symbol will not be adjusted below, we
988 must check the addend to see it will put the value in
989 range to be adjusted, and hence must be changed. */
252b5132
RH
990 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
991 {
6cdc0ccc
AM
992 isym = isymbuf + ELF32_R_SYM (irel->r_info);
993 if (isym->st_shndx == sec_shndx
994 && (isym->st_value <= addr
995 || isym->st_value >= toaddr))
252b5132
RH
996 {
997 bfd_vma val;
998
55e6e397
RS
999 if (get_howto_table (abfd)[R_SH_DIR32].partial_inplace)
1000 {
1001 val = bfd_get_32 (abfd, contents + nraddr);
1002 val += isym->st_value;
1003 if (val > addr && val < toaddr)
1004 bfd_put_32 (abfd, val - count, contents + nraddr);
1005 }
1006 else
1007 {
1008 val = isym->st_value + irel->r_addend;
1009 if (val > addr && val < toaddr)
1010 irel->r_addend -= count;
1011 }
252b5132
RH
1012 }
1013 }
1014 start = stop = addr;
1015 break;
1016
1017 case R_SH_DIR8WPN:
1018 off = insn & 0xff;
1019 if (off & 0x80)
1020 off -= 0x100;
1021 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
1022 break;
1023
1024 case R_SH_IND12W:
bdfaef52
JR
1025 off = insn & 0xfff;
1026 if (! off)
1027 {
1028 /* This has been made by previous relaxation. Since the
1029 relocation will be against an external symbol, the
1030 final relocation will just do the right thing. */
1031 start = stop = addr;
1032 }
252b5132
RH
1033 else
1034 {
252b5132
RH
1035 if (off & 0x800)
1036 off -= 0x1000;
1037 stop = (bfd_vma) ((bfd_signed_vma) start + 4 + off * 2);
bdfaef52
JR
1038
1039 /* The addend will be against the section symbol, thus
1040 for adjusting the addend, the relevant start is the
1041 start of the section.
4cc11e76 1042 N.B. If we want to abandon in-place changes here and
bdfaef52
JR
1043 test directly using symbol + addend, we have to take into
1044 account that the addend has already been adjusted by -4. */
1045 if (stop > addr && stop < toaddr)
1046 irel->r_addend -= count;
252b5132
RH
1047 }
1048 break;
1049
1050 case R_SH_DIR8WPZ:
1051 off = insn & 0xff;
1052 stop = start + 4 + off * 2;
1053 break;
1054
1055 case R_SH_DIR8WPL:
1056 off = insn & 0xff;
435b1e90 1057 stop = (start & ~(bfd_vma) 3) + 4 + off * 4;
252b5132
RH
1058 break;
1059
1060 case R_SH_SWITCH8:
1061 case R_SH_SWITCH16:
1062 case R_SH_SWITCH32:
1063 /* These relocs types represent
1064 .word L2-L1
06e1ba78 1065 The r_addend field holds the difference between the reloc
252b5132
RH
1066 address and L1. That is the start of the reloc, and
1067 adding in the contents gives us the top. We must adjust
06e1ba78
JR
1068 both the r_offset field and the section contents.
1069 N.B. in gas / coff bfd, the elf bfd r_addend is called r_offset,
1070 and the elf bfd r_offset is called r_vaddr. */
252b5132 1071
06e1ba78
JR
1072 stop = irel->r_offset;
1073 start = (bfd_vma) ((bfd_signed_vma) stop - (long) irel->r_addend);
252b5132
RH
1074
1075 if (start > addr
1076 && start < toaddr
1077 && (stop <= addr || stop >= toaddr))
1078 irel->r_addend += count;
1079 else if (stop > addr
1080 && stop < toaddr
1081 && (start <= addr || start >= toaddr))
1082 irel->r_addend -= count;
1083
252b5132
RH
1084 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH16)
1085 voff = bfd_get_signed_16 (abfd, contents + nraddr);
1086 else if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_SWITCH8)
1087 voff = bfd_get_8 (abfd, contents + nraddr);
1088 else
1089 voff = bfd_get_signed_32 (abfd, contents + nraddr);
1090 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1091
1092 break;
1093
1094 case R_SH_USES:
1095 start = irel->r_offset;
1096 stop = (bfd_vma) ((bfd_signed_vma) start
1097 + (long) irel->r_addend
1098 + 4);
1099 break;
1100 }
1101
1102 if (start > addr
1103 && start < toaddr
1104 && (stop <= addr || stop >= toaddr))
1105 adjust = count;
1106 else if (stop > addr
1107 && stop < toaddr
1108 && (start <= addr || start >= toaddr))
1109 adjust = - count;
1110 else
1111 adjust = 0;
1112
1113 if (adjust != 0)
1114 {
1115 oinsn = insn;
b34976b6 1116 overflow = FALSE;
252b5132
RH
1117 switch ((enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info))
1118 {
1119 default:
1120 abort ();
1121 break;
1122
1123 case R_SH_DIR8WPN:
1124 case R_SH_DIR8WPZ:
1125 insn += adjust / 2;
1126 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1127 overflow = TRUE;
dc810e39 1128 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1129 break;
1130
1131 case R_SH_IND12W:
1132 insn += adjust / 2;
1133 if ((oinsn & 0xf000) != (insn & 0xf000))
b34976b6 1134 overflow = TRUE;
dc810e39 1135 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1136 break;
1137
1138 case R_SH_DIR8WPL:
1139 BFD_ASSERT (adjust == count || count >= 4);
1140 if (count >= 4)
1141 insn += adjust / 4;
1142 else
1143 {
1144 if ((irel->r_offset & 3) == 0)
1145 ++insn;
1146 }
1147 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1148 overflow = TRUE;
dc810e39 1149 bfd_put_16 (abfd, (bfd_vma) insn, contents + nraddr);
252b5132
RH
1150 break;
1151
851cde10
JR
1152 case R_SH_SWITCH8:
1153 voff += adjust;
1154 if (voff < 0 || voff >= 0xff)
b34976b6 1155 overflow = TRUE;
851cde10
JR
1156 bfd_put_8 (abfd, voff, contents + nraddr);
1157 break;
1158
252b5132
RH
1159 case R_SH_SWITCH16:
1160 voff += adjust;
1161 if (voff < - 0x8000 || voff >= 0x8000)
b34976b6 1162 overflow = TRUE;
dc810e39 1163 bfd_put_signed_16 (abfd, (bfd_vma) voff, contents + nraddr);
252b5132
RH
1164 break;
1165
1166 case R_SH_SWITCH32:
1167 voff += adjust;
dc810e39 1168 bfd_put_signed_32 (abfd, (bfd_vma) voff, contents + nraddr);
252b5132
RH
1169 break;
1170
1171 case R_SH_USES:
1172 irel->r_addend += adjust;
1173 break;
1174 }
1175
1176 if (overflow)
1177 {
1178 ((*_bfd_error_handler)
d003868e
AM
1179 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
1180 abfd, (unsigned long) irel->r_offset));
252b5132 1181 bfd_set_error (bfd_error_bad_value);
b34976b6 1182 return FALSE;
252b5132
RH
1183 }
1184 }
1185
1186 irel->r_offset = nraddr;
1187 }
1188
1189 /* Look through all the other sections. If there contain any IMM32
1190 relocs against internal symbols which we are not going to adjust
1191 below, we may need to adjust the addends. */
1192 for (o = abfd->sections; o != NULL; o = o->next)
1193 {
1194 Elf_Internal_Rela *internal_relocs;
1195 Elf_Internal_Rela *irelscan, *irelscanend;
1196 bfd_byte *ocontents;
1197
1198 if (o == sec
1199 || (o->flags & SEC_RELOC) == 0
1200 || o->reloc_count == 0)
1201 continue;
1202
1203 /* We always cache the relocs. Perhaps, if info->keep_memory is
b34976b6 1204 FALSE, we should free them, if we are permitted to, when we
067653c5 1205 leave sh_coff_relax_section. */
45d6a902 1206 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 1207 (abfd, o, NULL, (Elf_Internal_Rela *) NULL, TRUE));
252b5132 1208 if (internal_relocs == NULL)
b34976b6 1209 return FALSE;
252b5132
RH
1210
1211 ocontents = NULL;
1212 irelscanend = internal_relocs + o->reloc_count;
1213 for (irelscan = internal_relocs; irelscan < irelscanend; irelscan++)
1214 {
084aa3aa
JR
1215 /* Dwarf line numbers use R_SH_SWITCH32 relocs. */
1216 if (ELF32_R_TYPE (irelscan->r_info) == (int) R_SH_SWITCH32)
1217 {
1218 bfd_vma start, stop;
1219 bfd_signed_vma voff;
1220
1221 if (ocontents == NULL)
1222 {
1223 if (elf_section_data (o)->this_hdr.contents != NULL)
1224 ocontents = elf_section_data (o)->this_hdr.contents;
1225 else
1226 {
1227 /* We always cache the section contents.
b34976b6 1228 Perhaps, if info->keep_memory is FALSE, we
067653c5
AM
1229 should free them, if we are permitted to,
1230 when we leave sh_coff_relax_section. */
eea6121a
AM
1231 if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1232 {
1233 if (ocontents != NULL)
1234 free (ocontents);
1235 return FALSE;
1236 }
1237
084aa3aa
JR
1238 elf_section_data (o)->this_hdr.contents = ocontents;
1239 }
1240 }
1241
1242 stop = irelscan->r_offset;
1243 start
1244 = (bfd_vma) ((bfd_signed_vma) stop - (long) irelscan->r_addend);
1245
1246 /* STOP is in a different section, so it won't change. */
1247 if (start > addr && start < toaddr)
1248 irelscan->r_addend += count;
1249
1250 voff = bfd_get_signed_32 (abfd, ocontents + irelscan->r_offset);
1251 stop = (bfd_vma) ((bfd_signed_vma) start + voff);
1252
1253 if (start > addr
1254 && start < toaddr
1255 && (stop <= addr || stop >= toaddr))
dc810e39 1256 bfd_put_signed_32 (abfd, (bfd_vma) voff + count,
084aa3aa
JR
1257 ocontents + irelscan->r_offset);
1258 else if (stop > addr
1259 && stop < toaddr
1260 && (start <= addr || start >= toaddr))
dc810e39 1261 bfd_put_signed_32 (abfd, (bfd_vma) voff - count,
084aa3aa
JR
1262 ocontents + irelscan->r_offset);
1263 }
1264
252b5132
RH
1265 if (ELF32_R_TYPE (irelscan->r_info) != (int) R_SH_DIR32)
1266 continue;
1267
1268 if (ELF32_R_SYM (irelscan->r_info) >= symtab_hdr->sh_info)
1269 continue;
1270
252b5132 1271
6cdc0ccc
AM
1272 isym = isymbuf + ELF32_R_SYM (irelscan->r_info);
1273 if (isym->st_shndx == sec_shndx
1274 && (isym->st_value <= addr
1275 || isym->st_value >= toaddr))
252b5132
RH
1276 {
1277 bfd_vma val;
1278
1279 if (ocontents == NULL)
1280 {
1281 if (elf_section_data (o)->this_hdr.contents != NULL)
1282 ocontents = elf_section_data (o)->this_hdr.contents;
1283 else
1284 {
1285 /* We always cache the section contents.
b34976b6 1286 Perhaps, if info->keep_memory is FALSE, we
067653c5
AM
1287 should free them, if we are permitted to,
1288 when we leave sh_coff_relax_section. */
eea6121a
AM
1289 if (!bfd_malloc_and_get_section (abfd, o, &ocontents))
1290 {
1291 if (ocontents != NULL)
1292 free (ocontents);
1293 return FALSE;
1294 }
1295
252b5132
RH
1296 elf_section_data (o)->this_hdr.contents = ocontents;
1297 }
1298 }
1299
1300 val = bfd_get_32 (abfd, ocontents + irelscan->r_offset);
6cdc0ccc 1301 val += isym->st_value;
252b5132
RH
1302 if (val > addr && val < toaddr)
1303 bfd_put_32 (abfd, val - count,
1304 ocontents + irelscan->r_offset);
1305 }
1306 }
1307 }
1308
1309 /* Adjust the local symbols defined in this section. */
6cdc0ccc
AM
1310 isymend = isymbuf + symtab_hdr->sh_info;
1311 for (isym = isymbuf; isym < isymend; isym++)
252b5132 1312 {
6cdc0ccc
AM
1313 if (isym->st_shndx == sec_shndx
1314 && isym->st_value > addr
1315 && isym->st_value < toaddr)
1316 isym->st_value -= count;
252b5132
RH
1317 }
1318
1319 /* Now adjust the global symbols defined in this section. */
9ad5cbcf
AM
1320 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
1321 - symtab_hdr->sh_info);
1322 sym_hashes = elf_sym_hashes (abfd);
1323 end_hashes = sym_hashes + symcount;
1324 for (; sym_hashes < end_hashes; sym_hashes++)
252b5132 1325 {
9ad5cbcf
AM
1326 struct elf_link_hash_entry *sym_hash = *sym_hashes;
1327 if ((sym_hash->root.type == bfd_link_hash_defined
1328 || sym_hash->root.type == bfd_link_hash_defweak)
1329 && sym_hash->root.u.def.section == sec
1330 && sym_hash->root.u.def.value > addr
1331 && sym_hash->root.u.def.value < toaddr)
252b5132 1332 {
9ad5cbcf 1333 sym_hash->root.u.def.value -= count;
252b5132
RH
1334 }
1335 }
1336
1337 /* See if we can move the ALIGN reloc forward. We have adjusted
1338 r_offset for it already. */
1339 if (irelalign != NULL)
1340 {
1341 bfd_vma alignto, alignaddr;
1342
1343 alignto = BFD_ALIGN (toaddr, 1 << irelalign->r_addend);
1344 alignaddr = BFD_ALIGN (irelalign->r_offset,
1345 1 << irelalign->r_addend);
1346 if (alignto != alignaddr)
1347 {
1348 /* Tail recursion. */
1349 return sh_elf_relax_delete_bytes (abfd, sec, alignaddr,
dc810e39 1350 (int) (alignto - alignaddr));
252b5132
RH
1351 }
1352 }
1353
b34976b6 1354 return TRUE;
252b5132
RH
1355}
1356
1357/* Look for loads and stores which we can align to four byte
1358 boundaries. This is like sh_align_loads in coff-sh.c. */
1359
b34976b6 1360static bfd_boolean
09fd220b
KK
1361sh_elf_align_loads (bfd *abfd ATTRIBUTE_UNUSED, asection *sec,
1362 Elf_Internal_Rela *internal_relocs,
1363 bfd_byte *contents ATTRIBUTE_UNUSED,
1364 bfd_boolean *pswapped)
252b5132
RH
1365{
1366 Elf_Internal_Rela *irel, *irelend;
1367 bfd_vma *labels = NULL;
1368 bfd_vma *label, *label_end;
dc810e39 1369 bfd_size_type amt;
252b5132 1370
b34976b6 1371 *pswapped = FALSE;
252b5132
RH
1372
1373 irelend = internal_relocs + sec->reloc_count;
1374
1375 /* Get all the addresses with labels on them. */
dc810e39
AM
1376 amt = sec->reloc_count;
1377 amt *= sizeof (bfd_vma);
1378 labels = (bfd_vma *) bfd_malloc (amt);
252b5132
RH
1379 if (labels == NULL)
1380 goto error_return;
1381 label_end = labels;
1382 for (irel = internal_relocs; irel < irelend; irel++)
1383 {
1384 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_LABEL)
1385 {
1386 *label_end = irel->r_offset;
1387 ++label_end;
1388 }
1389 }
1390
1391 /* Note that the assembler currently always outputs relocs in
1392 address order. If that ever changes, this code will need to sort
1393 the label values and the relocs. */
1394
1395 label = labels;
1396
1397 for (irel = internal_relocs; irel < irelend; irel++)
1398 {
1399 bfd_vma start, stop;
1400
1401 if (ELF32_R_TYPE (irel->r_info) != (int) R_SH_CODE)
1402 continue;
1403
1404 start = irel->r_offset;
1405
1406 for (irel++; irel < irelend; irel++)
1407 if (ELF32_R_TYPE (irel->r_info) == (int) R_SH_DATA)
1408 break;
1409 if (irel < irelend)
1410 stop = irel->r_offset;
1411 else
eea6121a 1412 stop = sec->size;
252b5132
RH
1413
1414 if (! _bfd_sh_align_load_span (abfd, sec, contents, sh_elf_swap_insns,
09fd220b 1415 internal_relocs, &label,
252b5132
RH
1416 label_end, start, stop, pswapped))
1417 goto error_return;
1418 }
1419
1420 free (labels);
1421
b34976b6 1422 return TRUE;
252b5132
RH
1423
1424 error_return:
1425 if (labels != NULL)
1426 free (labels);
b34976b6 1427 return FALSE;
252b5132
RH
1428}
1429
85fbca6a 1430#ifndef SH64_ELF
252b5132
RH
1431/* Swap two SH instructions. This is like sh_swap_insns in coff-sh.c. */
1432
b34976b6 1433static bfd_boolean
09fd220b
KK
1434sh_elf_swap_insns (bfd *abfd, asection *sec, void *relocs,
1435 bfd_byte *contents, bfd_vma addr)
252b5132
RH
1436{
1437 Elf_Internal_Rela *internal_relocs = (Elf_Internal_Rela *) relocs;
1438 unsigned short i1, i2;
1439 Elf_Internal_Rela *irel, *irelend;
1440
1441 /* Swap the instructions themselves. */
1442 i1 = bfd_get_16 (abfd, contents + addr);
1443 i2 = bfd_get_16 (abfd, contents + addr + 2);
dc810e39
AM
1444 bfd_put_16 (abfd, (bfd_vma) i2, contents + addr);
1445 bfd_put_16 (abfd, (bfd_vma) i1, contents + addr + 2);
252b5132
RH
1446
1447 /* Adjust all reloc addresses. */
1448 irelend = internal_relocs + sec->reloc_count;
1449 for (irel = internal_relocs; irel < irelend; irel++)
1450 {
1451 enum elf_sh_reloc_type type;
1452 int add;
1453
1454 /* There are a few special types of relocs that we don't want to
067653c5
AM
1455 adjust. These relocs do not apply to the instruction itself,
1456 but are only associated with the address. */
252b5132
RH
1457 type = (enum elf_sh_reloc_type) ELF32_R_TYPE (irel->r_info);
1458 if (type == R_SH_ALIGN
1459 || type == R_SH_CODE
1460 || type == R_SH_DATA
1461 || type == R_SH_LABEL)
1462 continue;
1463
1464 /* If an R_SH_USES reloc points to one of the addresses being
067653c5
AM
1465 swapped, we must adjust it. It would be incorrect to do this
1466 for a jump, though, since we want to execute both
1467 instructions after the jump. (We have avoided swapping
1468 around a label, so the jump will not wind up executing an
1469 instruction it shouldn't). */
252b5132
RH
1470 if (type == R_SH_USES)
1471 {
1472 bfd_vma off;
1473
1474 off = irel->r_offset + 4 + irel->r_addend;
1475 if (off == addr)
1476 irel->r_offset += 2;
1477 else if (off == addr + 2)
1478 irel->r_offset -= 2;
1479 }
1480
1481 if (irel->r_offset == addr)
1482 {
1483 irel->r_offset += 2;
1484 add = -2;
1485 }
1486 else if (irel->r_offset == addr + 2)
1487 {
1488 irel->r_offset -= 2;
1489 add = 2;
1490 }
1491 else
1492 add = 0;
1493
1494 if (add != 0)
1495 {
1496 bfd_byte *loc;
1497 unsigned short insn, oinsn;
b34976b6 1498 bfd_boolean overflow;
252b5132
RH
1499
1500 loc = contents + irel->r_offset;
b34976b6 1501 overflow = FALSE;
252b5132
RH
1502 switch (type)
1503 {
1504 default:
1505 break;
1506
1507 case R_SH_DIR8WPN:
1508 case R_SH_DIR8WPZ:
1509 insn = bfd_get_16 (abfd, loc);
1510 oinsn = insn;
1511 insn += add / 2;
1512 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1513 overflow = TRUE;
dc810e39 1514 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1515 break;
1516
1517 case R_SH_IND12W:
1518 insn = bfd_get_16 (abfd, loc);
1519 oinsn = insn;
1520 insn += add / 2;
1521 if ((oinsn & 0xf000) != (insn & 0xf000))
b34976b6 1522 overflow = TRUE;
dc810e39 1523 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1524 break;
1525
1526 case R_SH_DIR8WPL:
1527 /* This reloc ignores the least significant 3 bits of
067653c5
AM
1528 the program counter before adding in the offset.
1529 This means that if ADDR is at an even address, the
1530 swap will not affect the offset. If ADDR is an at an
1531 odd address, then the instruction will be crossing a
1532 four byte boundary, and must be adjusted. */
252b5132
RH
1533 if ((addr & 3) != 0)
1534 {
1535 insn = bfd_get_16 (abfd, loc);
1536 oinsn = insn;
1537 insn += add / 2;
1538 if ((oinsn & 0xff00) != (insn & 0xff00))
b34976b6 1539 overflow = TRUE;
dc810e39 1540 bfd_put_16 (abfd, (bfd_vma) insn, loc);
252b5132
RH
1541 }
1542
1543 break;
1544 }
1545
1546 if (overflow)
1547 {
1548 ((*_bfd_error_handler)
d003868e
AM
1549 (_("%B: 0x%lx: fatal: reloc overflow while relaxing"),
1550 abfd, (unsigned long) irel->r_offset));
252b5132 1551 bfd_set_error (bfd_error_bad_value);
b34976b6 1552 return FALSE;
252b5132
RH
1553 }
1554 }
1555 }
1556
b34976b6 1557 return TRUE;
252b5132 1558}
85fbca6a 1559#endif /* defined SH64_ELF */
252b5132 1560\f
55e6e397
RS
1561/* Describes one of the various PLT styles. */
1562
1563struct elf_sh_plt_info
1564{
1565 /* The template for the first PLT entry, or NULL if there is no special
1566 first entry. */
1567 const bfd_byte *plt0_entry;
1568
1569 /* The size of PLT0_ENTRY in bytes, or 0 if PLT0_ENTRY is NULL. */
1570 bfd_vma plt0_entry_size;
1571
1572 /* Index I is the offset into PLT0_ENTRY of a pointer to
1573 _GLOBAL_OFFSET_TABLE_ + I * 4. The value is MINUS_ONE
1574 if there is no such pointer. */
1575 bfd_vma plt0_got_fields[3];
1576
1577 /* The template for a symbol's PLT entry. */
1578 const bfd_byte *symbol_entry;
1579
1580 /* The size of SYMBOL_ENTRY in bytes. */
1581 bfd_vma symbol_entry_size;
1582
1583 /* Byte offsets of fields in SYMBOL_ENTRY. Not all fields are used
1584 on all targets. The comments by each member indicate the value
1585 that the field must hold. */
1586 struct {
1587 bfd_vma got_entry; /* the address of the symbol's .got.plt entry */
1588 bfd_vma plt; /* .plt (or a branch to .plt on VxWorks) */
1589 bfd_vma reloc_offset; /* the offset of the symbol's JMP_SLOT reloc */
8e45593f
NC
1590 bfd_boolean got20; /* TRUE if got_entry points to a movi20
1591 instruction (instead of a constant pool
1592 entry). */
55e6e397
RS
1593 } symbol_fields;
1594
1595 /* The offset of the resolver stub from the start of SYMBOL_ENTRY. */
1596 bfd_vma symbol_resolve_offset;
8e45593f
NC
1597
1598 /* A different PLT layout which can be used for the first
1599 MAX_SHORT_PLT entries. It must share the same plt0. NULL in
1600 other cases. */
1601 const struct elf_sh_plt_info *short_plt;
55e6e397
RS
1602};
1603
fbca6ad9
AO
1604#ifdef INCLUDE_SHMEDIA
1605
1606/* The size in bytes of an entry in the procedure linkage table. */
1607
55e6e397 1608#define ELF_PLT_ENTRY_SIZE 64
fbca6ad9
AO
1609
1610/* First entry in an absolute procedure linkage table look like this. */
1611
55e6e397 1612static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1613{
1614 0xcc, 0x00, 0x01, 0x10, /* movi .got.plt >> 16, r17 */
1615 0xc8, 0x00, 0x01, 0x10, /* shori .got.plt & 65535, r17 */
1616 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
c8614e8e 1617 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
fbca6ad9
AO
1618 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
1619 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1620 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1621 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1622 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1623 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1624 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1625 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1626 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1627 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1628 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1629 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1630};
1631
55e6e397 1632static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1633{
1634 0x10, 0x01, 0x00, 0xcc, /* movi .got.plt >> 16, r17 */
1635 0x10, 0x01, 0x00, 0xc8, /* shori .got.plt & 65535, r17 */
1636 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
c8614e8e 1637 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
fbca6ad9
AO
1638 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
1639 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1640 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1641 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1642 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1643 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1644 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1645 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1646 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1647 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1648 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1649 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1650};
1651
1652/* Sebsequent entries in an absolute procedure linkage table look like
1653 this. */
1654
55e6e397 1655static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1656{
1657 0xcc, 0x00, 0x01, 0x90, /* movi nameN-in-GOT >> 16, r25 */
1658 0xc8, 0x00, 0x01, 0x90, /* shori nameN-in-GOT & 65535, r25 */
1659 0x89, 0x90, 0x01, 0x90, /* ld.l r25, 0, r25 */
1660 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1661 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1662 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1663 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1664 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1665 0xcc, 0x00, 0x01, 0x90, /* movi .PLT0 >> 16, r25 */
1666 0xc8, 0x00, 0x01, 0x90, /* shori .PLT0 & 65535, r25 */
1667 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1668 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
1669 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
1670 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1671 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1672 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1673};
1674
55e6e397 1675static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1676{
1677 0x90, 0x01, 0x00, 0xcc, /* movi nameN-in-GOT >> 16, r25 */
1678 0x90, 0x01, 0x00, 0xc8, /* shori nameN-in-GOT & 65535, r25 */
1679 0x90, 0x01, 0x90, 0x89, /* ld.l r25, 0, r25 */
1680 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1681 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1682 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1683 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1684 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1685 0x90, 0x01, 0x00, 0xcc, /* movi .PLT0 >> 16, r25 */
1686 0x90, 0x01, 0x00, 0xc8, /* shori .PLT0 & 65535, r25 */
1687 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1688 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
1689 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
1690 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1691 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1692 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1693};
1694
1695/* Entries in a PIC procedure linkage table look like this. */
1696
55e6e397 1697static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1698{
1699 0xcc, 0x00, 0x01, 0x90, /* movi nameN@GOT >> 16, r25 */
1700 0xc8, 0x00, 0x01, 0x90, /* shori nameN@GOT & 65535, r25 */
1701 0x40, 0xc2, 0x65, 0x90, /* ldx.l r12, r25, r25 */
1702 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1703 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1704 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1705 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1706 0x6f, 0xf0, 0xff, 0xf0, /* nop */
1707 0xce, 0x00, 0x01, 0x10, /* movi -GOT_BIAS, r17 */
0a4ef3f4 1708 0x00, 0xc8, 0x45, 0x10, /* add.l r12, r17, r17 */
fbca6ad9
AO
1709 0x89, 0x10, 0x09, 0x90, /* ld.l r17, 8, r25 */
1710 0x6b, 0xf1, 0x66, 0x00, /* ptabs r25, tr0 */
1711 0x89, 0x10, 0x05, 0x10, /* ld.l r17, 4, r17 */
1712 0xcc, 0x00, 0x01, 0x50, /* movi reloc-offset >> 16, r21 */
1713 0xc8, 0x00, 0x01, 0x50, /* shori reloc-offset & 65535, r21 */
1714 0x44, 0x01, 0xff, 0xf0, /* blink tr0, r63 */
1715};
1716
55e6e397 1717static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
fbca6ad9
AO
1718{
1719 0x90, 0x01, 0x00, 0xcc, /* movi nameN@GOT >> 16, r25 */
1720 0x90, 0x01, 0x00, 0xc8, /* shori nameN@GOT & 65535, r25 */
1721 0x90, 0x65, 0xc2, 0x40, /* ldx.l r12, r25, r25 */
1722 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1723 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1724 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1725 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1726 0xf0, 0xff, 0xf0, 0x6f, /* nop */
1727 0x10, 0x01, 0x00, 0xce, /* movi -GOT_BIAS, r17 */
0a4ef3f4 1728 0x10, 0x45, 0xc8, 0x00, /* add.l r12, r17, r17 */
fbca6ad9
AO
1729 0x90, 0x09, 0x10, 0x89, /* ld.l r17, 8, r25 */
1730 0x00, 0x66, 0xf1, 0x6b, /* ptabs r25, tr0 */
1731 0x10, 0x05, 0x10, 0x89, /* ld.l r17, 4, r17 */
1732 0x50, 0x01, 0x00, 0xcc, /* movi reloc-offset >> 16, r21 */
1733 0x50, 0x01, 0x00, 0xc8, /* shori reloc-offset & 65535, r21 */
1734 0xf0, 0xff, 0x01, 0x44, /* blink tr0, r63 */
1735};
1736
55e6e397
RS
1737static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1738 {
1739 {
1740 /* Big-endian non-PIC. */
1741 elf_sh_plt0_entry_be,
1742 ELF_PLT_ENTRY_SIZE,
1743 { 0, MINUS_ONE, MINUS_ONE },
1744 elf_sh_plt_entry_be,
1745 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1746 { 0, 32, 48, FALSE },
1747 33, /* includes ISA encoding */
1748 NULL
55e6e397
RS
1749 },
1750 {
1751 /* Little-endian non-PIC. */
1752 elf_sh_plt0_entry_le,
1753 ELF_PLT_ENTRY_SIZE,
1754 { 0, MINUS_ONE, MINUS_ONE },
1755 elf_sh_plt_entry_le,
1756 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1757 { 0, 32, 48, FALSE },
1758 33, /* includes ISA encoding */
1759 NULL
55e6e397
RS
1760 },
1761 },
1762 {
1763 {
1764 /* Big-endian PIC. */
1765 elf_sh_plt0_entry_be,
1766 ELF_PLT_ENTRY_SIZE,
1767 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1768 elf_sh_pic_plt_entry_be,
1769 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1770 { 0, MINUS_ONE, 52, FALSE },
1771 33, /* includes ISA encoding */
1772 NULL
55e6e397
RS
1773 },
1774 {
1775 /* Little-endian PIC. */
1776 elf_sh_plt0_entry_le,
1777 ELF_PLT_ENTRY_SIZE,
1778 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1779 elf_sh_pic_plt_entry_le,
1780 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1781 { 0, MINUS_ONE, 52, FALSE },
1782 33, /* includes ISA encoding */
1783 NULL
55e6e397
RS
1784 },
1785 }
1786};
fbca6ad9
AO
1787
1788/* Return offset of the linker in PLT0 entry. */
1789#define elf_sh_plt0_gotplt_offset(info) 0
1790
55e6e397
RS
1791/* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
1792 VALUE is the field's value and CODE_P is true if VALUE refers to code,
1793 not data.
fbca6ad9 1794
55e6e397 1795 On SH64, each 32-bit field is loaded by a movi/shori pair. */
fbca6ad9
AO
1796
1797inline static void
55e6e397
RS
1798install_plt_field (bfd *output_bfd, bfd_boolean code_p,
1799 unsigned long value, bfd_byte *addr)
fbca6ad9 1800{
55e6e397 1801 value |= code_p;
fbca6ad9
AO
1802 bfd_put_32 (output_bfd,
1803 bfd_get_32 (output_bfd, addr)
1804 | ((value >> 6) & 0x3fffc00),
1805 addr);
1806 bfd_put_32 (output_bfd,
1807 bfd_get_32 (output_bfd, addr + 4)
1808 | ((value << 10) & 0x3fffc00),
1809 addr + 4);
1810}
1811
55e6e397
RS
1812/* Return the type of PLT associated with ABFD. PIC_P is true if
1813 the object is position-independent. */
1814
1815static const struct elf_sh_plt_info *
1816get_plt_info (bfd *abfd ATTRIBUTE_UNUSED, bfd_boolean pic_p)
1817{
1818 return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
1819}
fbca6ad9 1820#else
37c644f2 1821/* The size in bytes of an entry in the procedure linkage table. */
252b5132 1822
55e6e397 1823#define ELF_PLT_ENTRY_SIZE 28
37c644f2
AO
1824
1825/* First entry in an absolute procedure linkage table look like this. */
1826
6c426cf3 1827/* Note - this code has been "optimised" not to use r2. r2 is used by
4cc11e76 1828 GCC to return the address of large structures, so it should not be
6c426cf3
NC
1829 corrupted here. This does mean however, that this PLT does not conform
1830 to the SH PIC ABI. That spec says that r0 contains the type of the PLT
1831 and r2 contains the GOT id. This version stores the GOT id in r0 and
1832 ignores the type. Loaders can easily detect this difference however,
1833 since the type will always be 0 or 8, and the GOT ids will always be
1834 greater than or equal to 12. */
55e6e397 1835static const bfd_byte elf_sh_plt0_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1836{
1837 0xd0, 0x05, /* mov.l 2f,r0 */
1838 0x60, 0x02, /* mov.l @r0,r0 */
1839 0x2f, 0x06, /* mov.l r0,@-r15 */
1840 0xd0, 0x03, /* mov.l 1f,r0 */
1841 0x60, 0x02, /* mov.l @r0,r0 */
1842 0x40, 0x2b, /* jmp @r0 */
1843 0x60, 0xf6, /* mov.l @r15+,r0 */
1844 0x00, 0x09, /* nop */
1845 0x00, 0x09, /* nop */
1846 0x00, 0x09, /* nop */
1847 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
1848 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
1849};
1850
55e6e397 1851static const bfd_byte elf_sh_plt0_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1852{
1853 0x05, 0xd0, /* mov.l 2f,r0 */
1854 0x02, 0x60, /* mov.l @r0,r0 */
1855 0x06, 0x2f, /* mov.l r0,@-r15 */
1856 0x03, 0xd0, /* mov.l 1f,r0 */
1857 0x02, 0x60, /* mov.l @r0,r0 */
1858 0x2b, 0x40, /* jmp @r0 */
1859 0xf6, 0x60, /* mov.l @r15+,r0 */
1860 0x09, 0x00, /* nop */
1861 0x09, 0x00, /* nop */
1862 0x09, 0x00, /* nop */
1863 0, 0, 0, 0, /* 1: replaced with address of .got.plt + 8. */
1864 0, 0, 0, 0, /* 2: replaced with address of .got.plt + 4. */
1865};
1866
1867/* Sebsequent entries in an absolute procedure linkage table look like
1868 this. */
1869
55e6e397 1870static const bfd_byte elf_sh_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1871{
1872 0xd0, 0x04, /* mov.l 1f,r0 */
55e6e397 1873 0x60, 0x02, /* mov.l @(r0,r12),r0 */
6c426cf3
NC
1874 0xd1, 0x02, /* mov.l 0f,r1 */
1875 0x40, 0x2b, /* jmp @r0 */
1876 0x60, 0x13, /* mov r1,r0 */
1877 0xd1, 0x03, /* mov.l 2f,r1 */
1878 0x40, 0x2b, /* jmp @r0 */
1879 0x00, 0x09, /* nop */
1880 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
1881 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1882 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
1883};
1884
55e6e397 1885static const bfd_byte elf_sh_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1886{
1887 0x04, 0xd0, /* mov.l 1f,r0 */
1888 0x02, 0x60, /* mov.l @r0,r0 */
1889 0x02, 0xd1, /* mov.l 0f,r1 */
1890 0x2b, 0x40, /* jmp @r0 */
1891 0x13, 0x60, /* mov r1,r0 */
1892 0x03, 0xd1, /* mov.l 2f,r1 */
1893 0x2b, 0x40, /* jmp @r0 */
1894 0x09, 0x00, /* nop */
1895 0, 0, 0, 0, /* 0: replaced with address of .PLT0. */
1896 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1897 0, 0, 0, 0, /* 2: replaced with offset into relocation table. */
1898};
1899
1900/* Entries in a PIC procedure linkage table look like this. */
1901
55e6e397 1902static const bfd_byte elf_sh_pic_plt_entry_be[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1903{
1904 0xd0, 0x04, /* mov.l 1f,r0 */
1905 0x00, 0xce, /* mov.l @(r0,r12),r0 */
1906 0x40, 0x2b, /* jmp @r0 */
1907 0x00, 0x09, /* nop */
1908 0x50, 0xc2, /* mov.l @(8,r12),r0 */
1909 0xd1, 0x03, /* mov.l 2f,r1 */
1910 0x40, 0x2b, /* jmp @r0 */
1911 0x50, 0xc1, /* mov.l @(4,r12),r0 */
1912 0x00, 0x09, /* nop */
1913 0x00, 0x09, /* nop */
1914 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1915 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
1916};
1917
55e6e397 1918static const bfd_byte elf_sh_pic_plt_entry_le[ELF_PLT_ENTRY_SIZE] =
6c426cf3
NC
1919{
1920 0x04, 0xd0, /* mov.l 1f,r0 */
1921 0xce, 0x00, /* mov.l @(r0,r12),r0 */
1922 0x2b, 0x40, /* jmp @r0 */
1923 0x09, 0x00, /* nop */
1924 0xc2, 0x50, /* mov.l @(8,r12),r0 */
1925 0x03, 0xd1, /* mov.l 2f,r1 */
1926 0x2b, 0x40, /* jmp @r0 */
1927 0xc1, 0x50, /* mov.l @(4,r12),r0 */
1928 0x09, 0x00, /* nop */
1929 0x09, 0x00, /* nop */
1930 0, 0, 0, 0, /* 1: replaced with address of this symbol in .got. */
1931 0, 0, 0, 0 /* 2: replaced with offset into relocation table. */
1932};
1933
55e6e397
RS
1934static const struct elf_sh_plt_info elf_sh_plts[2][2] = {
1935 {
1936 {
1937 /* Big-endian non-PIC. */
1938 elf_sh_plt0_entry_be,
1939 ELF_PLT_ENTRY_SIZE,
1940 { MINUS_ONE, 24, 20 },
1941 elf_sh_plt_entry_be,
1942 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1943 { 20, 16, 24, FALSE },
1944 8,
1945 NULL
55e6e397
RS
1946 },
1947 {
1948 /* Little-endian non-PIC. */
1949 elf_sh_plt0_entry_le,
1950 ELF_PLT_ENTRY_SIZE,
1951 { MINUS_ONE, 24, 20 },
1952 elf_sh_plt_entry_le,
1953 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1954 { 20, 16, 24, FALSE },
1955 8,
1956 NULL
55e6e397
RS
1957 },
1958 },
1959 {
1960 {
1961 /* Big-endian PIC. */
1962 elf_sh_plt0_entry_be,
1963 ELF_PLT_ENTRY_SIZE,
1964 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1965 elf_sh_pic_plt_entry_be,
1966 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1967 { 20, MINUS_ONE, 24, FALSE },
1968 8,
1969 NULL
55e6e397
RS
1970 },
1971 {
1972 /* Little-endian PIC. */
1973 elf_sh_plt0_entry_le,
1974 ELF_PLT_ENTRY_SIZE,
1975 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
1976 elf_sh_pic_plt_entry_le,
1977 ELF_PLT_ENTRY_SIZE,
8e45593f
NC
1978 { 20, MINUS_ONE, 24, FALSE },
1979 8,
1980 NULL
55e6e397
RS
1981 },
1982 }
1983};
252b5132 1984
55e6e397
RS
1985#define VXWORKS_PLT_HEADER_SIZE 12
1986#define VXWORKS_PLT_ENTRY_SIZE 24
252b5132 1987
55e6e397
RS
1988static const bfd_byte vxworks_sh_plt0_entry_be[VXWORKS_PLT_HEADER_SIZE] =
1989{
1990 0xd1, 0x01, /* mov.l @(8,pc),r1 */
1991 0x61, 0x12, /* mov.l @r1,r1 */
1992 0x41, 0x2b, /* jmp @r1 */
1993 0x00, 0x09, /* nop */
1994 0, 0, 0, 0 /* 0: replaced with _GLOBAL_OFFSET_TABLE+8. */
1995};
252b5132 1996
55e6e397
RS
1997static const bfd_byte vxworks_sh_plt0_entry_le[VXWORKS_PLT_HEADER_SIZE] =
1998{
1999 0x01, 0xd1, /* mov.l @(8,pc),r1 */
2000 0x12, 0x61, /* mov.l @r1,r1 */
2001 0x2b, 0x41, /* jmp @r1 */
2002 0x09, 0x00, /* nop */
2003 0, 0, 0, 0 /* 0: replaced with _GLOBAL_OFFSET_TABLE+8. */
2004};
2005
2006static const bfd_byte vxworks_sh_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
2007{
2008 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2009 0x60, 0x02, /* mov.l @r0,r0 */
2010 0x40, 0x2b, /* jmp @r0 */
2011 0x00, 0x09, /* nop */
2012 0, 0, 0, 0, /* 0: replaced with address of this symbol in .got. */
2013 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2014 0xa0, 0x00, /* bra PLT (We need to fix the offset.) */
2015 0x00, 0x09, /* nop */
2016 0x00, 0x09, /* nop */
2017 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2018};
2019
2020static const bfd_byte vxworks_sh_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
2021{
2022 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2023 0x02, 0x60, /* mov.l @r0,r0 */
2024 0x2b, 0x40, /* jmp @r0 */
2025 0x09, 0x00, /* nop */
2026 0, 0, 0, 0, /* 0: replaced with address of this symbol in .got. */
2027 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2028 0x00, 0xa0, /* bra PLT (We need to fix the offset.) */
2029 0x09, 0x00, /* nop */
2030 0x09, 0x00, /* nop */
2031 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2032};
2033
2034static const bfd_byte vxworks_sh_pic_plt_entry_be[VXWORKS_PLT_ENTRY_SIZE] =
2035{
2036 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2037 0x00, 0xce, /* mov.l @(r0,r12),r0 */
2038 0x40, 0x2b, /* jmp @r0 */
2039 0x00, 0x09, /* nop */
2040 0, 0, 0, 0, /* 0: replaced with offset of this symbol in .got. */
2041 0xd0, 0x01, /* mov.l @(8,pc),r0 */
2042 0x51, 0xc2, /* mov.l @(8,r12),r1 */
2043 0x41, 0x2b, /* jmp @r1 */
2044 0x00, 0x09, /* nop */
2045 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2046};
2047
2048static const bfd_byte vxworks_sh_pic_plt_entry_le[VXWORKS_PLT_ENTRY_SIZE] =
2049{
2050 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2051 0xce, 0x00, /* mov.l @(r0,r12),r0 */
2052 0x2b, 0x40, /* jmp @r0 */
2053 0x09, 0x00, /* nop */
2054 0, 0, 0, 0, /* 0: replaced with offset of this symbol in .got. */
2055 0x01, 0xd0, /* mov.l @(8,pc),r0 */
2056 0xc2, 0x51, /* mov.l @(8,r12),r1 */
2057 0x2b, 0x41, /* jmp @r1 */
2058 0x09, 0x00, /* nop */
2059 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2060};
2061
2062static const struct elf_sh_plt_info vxworks_sh_plts[2][2] = {
2063 {
2064 {
2065 /* Big-endian non-PIC. */
2066 vxworks_sh_plt0_entry_be,
2067 VXWORKS_PLT_HEADER_SIZE,
2068 { MINUS_ONE, MINUS_ONE, 8 },
2069 vxworks_sh_plt_entry_be,
2070 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2071 { 8, 14, 20, FALSE },
2072 12,
2073 NULL
55e6e397
RS
2074 },
2075 {
2076 /* Little-endian non-PIC. */
2077 vxworks_sh_plt0_entry_le,
2078 VXWORKS_PLT_HEADER_SIZE,
2079 { MINUS_ONE, MINUS_ONE, 8 },
2080 vxworks_sh_plt_entry_le,
2081 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2082 { 8, 14, 20, FALSE },
2083 12,
2084 NULL
55e6e397
RS
2085 },
2086 },
2087 {
2088 {
2089 /* Big-endian PIC. */
2090 NULL,
2091 0,
2092 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2093 vxworks_sh_pic_plt_entry_be,
2094 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2095 { 8, MINUS_ONE, 20, FALSE },
2096 12,
2097 NULL
55e6e397
RS
2098 },
2099 {
2100 /* Little-endian PIC. */
2101 NULL,
2102 0,
2103 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2104 vxworks_sh_pic_plt_entry_le,
2105 VXWORKS_PLT_ENTRY_SIZE,
8e45593f
NC
2106 { 8, MINUS_ONE, 20, FALSE },
2107 12,
2108 NULL
55e6e397
RS
2109 },
2110 }
2111};
9bdafcce 2112
8e45593f
NC
2113/* FDPIC PLT entries. Two unimplemented optimizations for lazy
2114 binding are to omit the lazy binding stub when linking with -z now
2115 and to move lazy binding stubs into a separate region for better
2116 cache behavior. */
2117
2118#define FDPIC_PLT_ENTRY_SIZE 28
2119#define FDPIC_PLT_LAZY_OFFSET 20
2120
2121/* FIXME: The lazy binding stub requires a plt0 - which may need to be
2122 duplicated if it is out of range, or which can be inlined. So
2123 right now it is always inlined, which wastes a word per stub. It
2124 might be easier to handle the duplication if we put the lazy
2125 stubs separately. */
2126
2127static const bfd_byte fdpic_sh_plt_entry_be[FDPIC_PLT_ENTRY_SIZE] =
2128{
2129 0xd0, 0x02, /* mov.l @(12,pc),r0 */
2130 0x01, 0xce, /* mov.l @(r0,r12),r1 */
2131 0x70, 0x04, /* add #4, r0 */
2132 0x41, 0x2b, /* jmp @r1 */
2133 0x0c, 0xce, /* mov.l @(r0,r12),r12 */
2134 0x00, 0x09, /* nop */
2135 0, 0, 0, 0, /* 0: replaced with offset of this symbol's funcdesc */
2136 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2137 0x60, 0xc2, /* mov.l @r12,r0 */
2138 0x40, 0x2b, /* jmp @r0 */
2139 0x53, 0xc1, /* mov.l @(4,r12),r3 */
2140 0x00, 0x09, /* nop */
2141};
2142
2143static const bfd_byte fdpic_sh_plt_entry_le[FDPIC_PLT_ENTRY_SIZE] =
2144{
2145 0x02, 0xd0, /* mov.l @(12,pc),r0 */
2146 0xce, 0x01, /* mov.l @(r0,r12),r1 */
2147 0x04, 0x70, /* add #4, r0 */
2148 0x2b, 0x41, /* jmp @r1 */
2149 0xce, 0x0c, /* mov.l @(r0,r12),r12 */
2150 0x09, 0x00, /* nop */
2151 0, 0, 0, 0, /* 0: replaced with offset of this symbol's funcdesc */
2152 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2153 0xc2, 0x60, /* mov.l @r12,r0 */
2154 0x2b, 0x40, /* jmp @r0 */
2155 0xc1, 0x53, /* mov.l @(4,r12),r3 */
2156 0x09, 0x00, /* nop */
2157};
2158
2159static const struct elf_sh_plt_info fdpic_sh_plts[2] = {
2160 {
2161 /* Big-endian PIC. */
2162 NULL,
2163 0,
2164 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2165 fdpic_sh_plt_entry_be,
2166 FDPIC_PLT_ENTRY_SIZE,
2167 { 12, MINUS_ONE, 16, FALSE },
2168 FDPIC_PLT_LAZY_OFFSET,
2169 NULL
2170 },
2171 {
2172 /* Little-endian PIC. */
2173 NULL,
2174 0,
2175 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2176 fdpic_sh_plt_entry_le,
2177 FDPIC_PLT_ENTRY_SIZE,
2178 { 12, MINUS_ONE, 16, FALSE },
2179 FDPIC_PLT_LAZY_OFFSET,
2180 NULL
2181 },
2182};
2183
2184/* On SH2A, we can use the movi20 instruction to generate shorter PLT
2185 entries for the first 64K slots. We use the normal FDPIC PLT entry
2186 past that point; we could also use movi20s, which might be faster,
2187 but would not be any smaller. */
2188
2189#define FDPIC_SH2A_PLT_ENTRY_SIZE 24
2190#define FDPIC_SH2A_PLT_LAZY_OFFSET 16
2191
2192static const bfd_byte fdpic_sh2a_plt_entry_be[FDPIC_SH2A_PLT_ENTRY_SIZE] =
2193{
2194 0, 0, 0, 0, /* movi20 #gotofffuncdesc,r0 */
2195 0x01, 0xce, /* mov.l @(r0,r12),r1 */
2196 0x70, 0x04, /* add #4, r0 */
2197 0x41, 0x2b, /* jmp @r1 */
2198 0x0c, 0xce, /* mov.l @(r0,r12),r12 */
2199 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2200 0x60, 0xc2, /* mov.l @r12,r0 */
2201 0x40, 0x2b, /* jmp @r0 */
2202 0x53, 0xc1, /* mov.l @(4,r12),r3 */
2203 0x00, 0x09, /* nop */
2204};
2205
2206static const bfd_byte fdpic_sh2a_plt_entry_le[FDPIC_SH2A_PLT_ENTRY_SIZE] =
2207{
2208 0, 0, 0, 0, /* movi20 #gotofffuncdesc,r0 */
2209 0xce, 0x01, /* mov.l @(r0,r12),r1 */
2210 0x04, 0x70, /* add #4, r0 */
2211 0x2b, 0x41, /* jmp @r1 */
2212 0xce, 0x0c, /* mov.l @(r0,r12),r12 */
2213 0, 0, 0, 0, /* 1: replaced with offset into relocation table. */
2214 0xc2, 0x60, /* mov.l @r12,r0 */
2215 0x2b, 0x40, /* jmp @r0 */
2216 0xc1, 0x53, /* mov.l @(4,r12),r3 */
2217 0x09, 0x00, /* nop */
2218};
2219
2220static const struct elf_sh_plt_info fdpic_sh2a_short_plt_be = {
2221 /* Big-endian FDPIC, max index 64K. */
2222 NULL,
2223 0,
2224 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2225 fdpic_sh2a_plt_entry_be,
2226 FDPIC_SH2A_PLT_ENTRY_SIZE,
2227 { 0, MINUS_ONE, 12, TRUE },
2228 FDPIC_SH2A_PLT_LAZY_OFFSET,
2229 NULL
2230};
2231
2232static const struct elf_sh_plt_info fdpic_sh2a_short_plt_le = {
2233 /* Little-endian FDPIC, max index 64K. */
2234 NULL,
2235 0,
2236 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2237 fdpic_sh2a_plt_entry_le,
2238 FDPIC_SH2A_PLT_ENTRY_SIZE,
2239 { 0, MINUS_ONE, 12, TRUE },
2240 FDPIC_SH2A_PLT_LAZY_OFFSET,
2241 NULL
2242};
2243
2244static const struct elf_sh_plt_info fdpic_sh2a_plts[2] = {
2245 {
2246 /* Big-endian PIC. */
2247 NULL,
2248 0,
2249 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2250 fdpic_sh_plt_entry_be,
2251 FDPIC_PLT_ENTRY_SIZE,
2252 { 12, MINUS_ONE, 16, FALSE },
2253 FDPIC_PLT_LAZY_OFFSET,
2254 &fdpic_sh2a_short_plt_be
2255 },
2256 {
2257 /* Little-endian PIC. */
2258 NULL,
2259 0,
2260 { MINUS_ONE, MINUS_ONE, MINUS_ONE },
2261 fdpic_sh_plt_entry_le,
2262 FDPIC_PLT_ENTRY_SIZE,
2263 { 12, MINUS_ONE, 16, FALSE },
2264 FDPIC_PLT_LAZY_OFFSET,
2265 &fdpic_sh2a_short_plt_le
2266 },
2267};
2268
55e6e397
RS
2269/* Return the type of PLT associated with ABFD. PIC_P is true if
2270 the object is position-independent. */
9bdafcce 2271
55e6e397 2272static const struct elf_sh_plt_info *
8e45593f 2273get_plt_info (bfd *abfd, bfd_boolean pic_p)
55e6e397 2274{
8e45593f
NC
2275 if (fdpic_object_p (abfd))
2276 {
2277 /* If any input file requires SH2A we can use a shorter PLT
2278 sequence. */
2279 if (sh_get_arch_from_bfd_mach (bfd_get_mach (abfd)) & arch_sh2a_base)
2280 return &fdpic_sh2a_plts[!bfd_big_endian (abfd)];
2281 else
2282 return &fdpic_sh_plts[!bfd_big_endian (abfd)];
2283 }
55e6e397
RS
2284 if (vxworks_object_p (abfd))
2285 return &vxworks_sh_plts[pic_p][!bfd_big_endian (abfd)];
2286 return &elf_sh_plts[pic_p][!bfd_big_endian (abfd)];
2287}
9bdafcce 2288
55e6e397
RS
2289/* Install a 32-bit PLT field starting at ADDR, which occurs in OUTPUT_BFD.
2290 VALUE is the field's value and CODE_P is true if VALUE refers to code,
2291 not data. */
9bdafcce 2292
55e6e397
RS
2293inline static void
2294install_plt_field (bfd *output_bfd, bfd_boolean code_p ATTRIBUTE_UNUSED,
2295 unsigned long value, bfd_byte *addr)
2296{
2297 bfd_put_32 (output_bfd, value, addr);
2298}
fbca6ad9 2299#endif
015551fc 2300
8e45593f
NC
2301/* The number of PLT entries which can use a shorter PLT, if any.
2302 Currently always 64K, since only SH-2A FDPIC uses this; a
2303 20-bit movi20 can address that many function descriptors below
2304 _GLOBAL_OFFSET_TABLE_. */
2305#define MAX_SHORT_PLT 65536
2306
55e6e397
RS
2307/* Return the index of the PLT entry at byte offset OFFSET. */
2308
2309static bfd_vma
2310get_plt_index (const struct elf_sh_plt_info *info, bfd_vma offset)
2311{
8e45593f
NC
2312 bfd_vma plt_index = 0;
2313
2314 offset -= info->plt0_entry_size;
2315 if (info->short_plt != NULL)
2316 {
2317 if (offset > MAX_SHORT_PLT * info->short_plt->symbol_entry_size)
2318 {
2319 plt_index = MAX_SHORT_PLT;
2320 offset -= MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2321 }
2322 else
2323 info = info->short_plt;
2324 }
2325 return plt_index + offset / info->symbol_entry_size;
55e6e397
RS
2326}
2327
2328/* Do the inverse operation. */
2329
2330static bfd_vma
91d6fa6a 2331get_plt_offset (const struct elf_sh_plt_info *info, bfd_vma plt_index)
55e6e397 2332{
8e45593f
NC
2333 bfd_vma offset = 0;
2334
2335 if (info->short_plt != NULL)
2336 {
2337 if (plt_index > MAX_SHORT_PLT)
2338 {
2339 offset = MAX_SHORT_PLT * info->short_plt->symbol_entry_size;
2340 plt_index -= MAX_SHORT_PLT;
2341 }
2342 else
2343 info = info->short_plt;
2344 }
2345 return (offset + info->plt0_entry_size
2346 + (plt_index * info->symbol_entry_size));
55e6e397
RS
2347}
2348
37c644f2 2349/* The sh linker needs to keep track of the number of relocs that it
067653c5
AM
2350 decides to copy as dynamic relocs in check_relocs for each symbol.
2351 This is so that it can later discard them if they are found to be
2352 unnecessary. We store the information in a field extending the
2353 regular ELF linker hash table. */
252b5132 2354
067653c5 2355struct elf_sh_dyn_relocs
38b1a46c 2356{
067653c5
AM
2357 struct elf_sh_dyn_relocs *next;
2358
2359 /* The input section of the reloc. */
2360 asection *sec;
2361
2362 /* Total number of relocs copied for the input section. */
37c644f2 2363 bfd_size_type count;
067653c5
AM
2364
2365 /* Number of pc-relative relocs copied for the input section. */
2366 bfd_size_type pc_count;
37c644f2 2367};
252b5132 2368
8e45593f
NC
2369union gotref
2370{
2371 bfd_signed_vma refcount;
2372 bfd_vma offset;
2373};
2374
37c644f2
AO
2375/* sh ELF linker hash entry. */
2376
38b1a46c
NC
2377struct elf_sh_link_hash_entry
2378{
37c644f2
AO
2379 struct elf_link_hash_entry root;
2380
fbca6ad9 2381#ifdef INCLUDE_SHMEDIA
396a6083
SC
2382 union
2383 {
2384 bfd_signed_vma refcount;
2385 bfd_vma offset;
2386 } datalabel_got;
fbca6ad9
AO
2387#endif
2388
067653c5
AM
2389 /* Track dynamic relocs copied for this symbol. */
2390 struct elf_sh_dyn_relocs *dyn_relocs;
4989d792
SC
2391
2392 bfd_signed_vma gotplt_refcount;
3376eaf5 2393
8e45593f
NC
2394 /* A local function descriptor, for FDPIC. The refcount counts
2395 R_SH_FUNCDESC, R_SH_GOTOFFFUNCDESC, and R_SH_GOTOFFFUNCDESC20
2396 relocations; the PLT and GOT entry are accounted
2397 for separately. After adjust_dynamic_symbol, the offset is
2398 MINUS_ONE if there is no local descriptor (dynamic linker
2399 managed and no PLT entry, or undefined weak non-dynamic).
2400 During check_relocs we do not yet know whether the local
2401 descriptor will be canonical. */
2402 union gotref funcdesc;
2403
2404 /* How many of the above refcounted relocations were R_SH_FUNCDESC,
2405 and thus require fixups or relocations. */
2406 bfd_signed_vma abs_funcdesc_refcount;
2407
3376eaf5 2408 enum {
8e45593f
NC
2409 GOT_UNKNOWN = 0, GOT_NORMAL, GOT_TLS_GD, GOT_TLS_IE, GOT_FUNCDESC
2410 } got_type;
3376eaf5
KK
2411};
2412
2413#define sh_elf_hash_entry(ent) ((struct elf_sh_link_hash_entry *)(ent))
2414
2415struct sh_elf_obj_tdata
2416{
2417 struct elf_obj_tdata root;
2418
8e45593f
NC
2419 /* got_type for each local got entry. */
2420 char *local_got_type;
2421
2422 /* Function descriptor refcount and offset for each local symbol. */
2423 union gotref *local_funcdesc;
37c644f2
AO
2424};
2425
3376eaf5
KK
2426#define sh_elf_tdata(abfd) \
2427 ((struct sh_elf_obj_tdata *) (abfd)->tdata.any)
2428
8e45593f
NC
2429#define sh_elf_local_got_type(abfd) \
2430 (sh_elf_tdata (abfd)->local_got_type)
2431
2432#define sh_elf_local_funcdesc(abfd) \
2433 (sh_elf_tdata (abfd)->local_funcdesc)
3376eaf5 2434
0ffa91dd
NC
2435#define is_sh_elf(bfd) \
2436 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2437 && elf_tdata (bfd) != NULL \
4dfe6ac6 2438 && elf_object_id (bfd) == SH_ELF_DATA)
0ffa91dd 2439
3376eaf5
KK
2440/* Override the generic function because we need to store sh_elf_obj_tdata
2441 as the specific tdata. */
2442
b34976b6 2443static bfd_boolean
09fd220b 2444sh_elf_mkobject (bfd *abfd)
3376eaf5 2445{
0ffa91dd 2446 return bfd_elf_allocate_object (abfd, sizeof (struct sh_elf_obj_tdata),
4dfe6ac6 2447 SH_ELF_DATA);
3376eaf5 2448}
b34976b6 2449
37c644f2
AO
2450/* sh ELF linker hash table. */
2451
38b1a46c
NC
2452struct elf_sh_link_hash_table
2453{
37c644f2 2454 struct elf_link_hash_table root;
37c644f2 2455
067653c5
AM
2456 /* Short-cuts to get to dynamic linker sections. */
2457 asection *sgot;
2458 asection *sgotplt;
2459 asection *srelgot;
2460 asection *splt;
2461 asection *srelplt;
2462 asection *sdynbss;
2463 asection *srelbss;
8e45593f
NC
2464 asection *sfuncdesc;
2465 asection *srelfuncdesc;
2466 asection *srofixup;
37c644f2 2467
55e6e397
RS
2468 /* The (unloaded but important) VxWorks .rela.plt.unloaded section. */
2469 asection *srelplt2;
2470
87d72d41
AM
2471 /* Small local sym cache. */
2472 struct sym_cache sym_cache;
3376eaf5
KK
2473
2474 /* A counter or offset to track a TLS got entry. */
2475 union
2476 {
2477 bfd_signed_vma refcount;
2478 bfd_vma offset;
2479 } tls_ldm_got;
55e6e397
RS
2480
2481 /* The type of PLT to use. */
2482 const struct elf_sh_plt_info *plt_info;
2483
2484 /* True if the target system is VxWorks. */
2485 bfd_boolean vxworks_p;
8e45593f
NC
2486
2487 /* True if the target system uses FDPIC. */
2488 bfd_boolean fdpic_p;
067653c5 2489};
37c644f2
AO
2490
2491/* Traverse an sh ELF linker hash table. */
2492
2493#define sh_elf_link_hash_traverse(table, func, info) \
2494 (elf_link_hash_traverse \
2495 (&(table)->root, \
09fd220b 2496 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
37c644f2
AO
2497 (info)))
2498
2499/* Get the sh ELF linker hash table from a link_info structure. */
2500
2501#define sh_elf_hash_table(p) \
4dfe6ac6
NC
2502 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
2503 == SH_ELF_DATA ? ((struct elf_sh_link_hash_table *) ((p)->hash)) : NULL)
37c644f2
AO
2504
2505/* Create an entry in an sh ELF linker hash table. */
2506
2507static struct bfd_hash_entry *
09fd220b
KK
2508sh_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2509 struct bfd_hash_table *table,
2510 const char *string)
37c644f2
AO
2511{
2512 struct elf_sh_link_hash_entry *ret =
2513 (struct elf_sh_link_hash_entry *) entry;
2514
2515 /* Allocate the structure if it has not already been allocated by a
2516 subclass. */
2517 if (ret == (struct elf_sh_link_hash_entry *) NULL)
2518 ret = ((struct elf_sh_link_hash_entry *)
2519 bfd_hash_allocate (table,
2520 sizeof (struct elf_sh_link_hash_entry)));
2521 if (ret == (struct elf_sh_link_hash_entry *) NULL)
2522 return (struct bfd_hash_entry *) ret;
2523
2524 /* Call the allocation method of the superclass. */
2525 ret = ((struct elf_sh_link_hash_entry *)
2526 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
2527 table, string));
2528 if (ret != (struct elf_sh_link_hash_entry *) NULL)
2529 {
396a6083
SC
2530 ret->dyn_relocs = NULL;
2531 ret->gotplt_refcount = 0;
fbca6ad9 2532#ifdef INCLUDE_SHMEDIA
396a6083 2533 ret->datalabel_got.refcount = ret->root.got.refcount;
fbca6ad9 2534#endif
8e45593f
NC
2535 ret->funcdesc.refcount = 0;
2536 ret->abs_funcdesc_refcount = 0;
2537 ret->got_type = GOT_UNKNOWN;
37c644f2
AO
2538 }
2539
2540 return (struct bfd_hash_entry *) ret;
2541}
2542
2543/* Create an sh ELF linker hash table. */
2544
2545static struct bfd_link_hash_table *
09fd220b 2546sh_elf_link_hash_table_create (bfd *abfd)
37c644f2
AO
2547{
2548 struct elf_sh_link_hash_table *ret;
dc810e39 2549 bfd_size_type amt = sizeof (struct elf_sh_link_hash_table);
37c644f2 2550
e2d34d7d 2551 ret = (struct elf_sh_link_hash_table *) bfd_malloc (amt);
37c644f2
AO
2552 if (ret == (struct elf_sh_link_hash_table *) NULL)
2553 return NULL;
2554
66eb6687
AM
2555 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
2556 sh_elf_link_hash_newfunc,
4dfe6ac6
NC
2557 sizeof (struct elf_sh_link_hash_entry),
2558 SH_ELF_DATA))
37c644f2 2559 {
e2d34d7d 2560 free (ret);
37c644f2
AO
2561 return NULL;
2562 }
2563
067653c5
AM
2564 ret->sgot = NULL;
2565 ret->sgotplt = NULL;
2566 ret->srelgot = NULL;
2567 ret->splt = NULL;
2568 ret->srelplt = NULL;
2569 ret->sdynbss = NULL;
2570 ret->srelbss = NULL;
55e6e397 2571 ret->srelplt2 = NULL;
87d72d41 2572 ret->sym_cache.abfd = NULL;
3376eaf5 2573 ret->tls_ldm_got.refcount = 0;
55e6e397
RS
2574 ret->plt_info = NULL;
2575 ret->vxworks_p = vxworks_object_p (abfd);
8e45593f 2576 ret->fdpic_p = fdpic_object_p (abfd);
067653c5 2577
37c644f2
AO
2578 return &ret->root.root;
2579}
2580
8e45593f
NC
2581static bfd_boolean
2582sh_elf_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
2583 struct bfd_link_info *info, asection *p)
2584{
2585 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
2586
2587 /* Non-FDPIC binaries do not need dynamic symbols for sections. */
2588 if (!htab->fdpic_p)
2589 return TRUE;
2590
2591 /* We need dynamic symbols for every section, since segments can
2592 relocate independently. */
2593 switch (elf_section_data (p)->this_hdr.sh_type)
2594 {
2595 case SHT_PROGBITS:
2596 case SHT_NOBITS:
2597 /* If sh_type is yet undecided, assume it could be
2598 SHT_PROGBITS/SHT_NOBITS. */
2599 case SHT_NULL:
2600 return FALSE;
2601
2602 /* There shouldn't be section relative relocations
2603 against any other section. */
2604 default:
2605 return TRUE;
2606 }
2607}
2608
067653c5
AM
2609/* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
2610 shortcuts to them in our hash table. */
2611
b34976b6 2612static bfd_boolean
09fd220b 2613create_got_section (bfd *dynobj, struct bfd_link_info *info)
067653c5
AM
2614{
2615 struct elf_sh_link_hash_table *htab;
2616
2617 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 2618 return FALSE;
067653c5
AM
2619
2620 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2621 if (htab == NULL)
2622 return FALSE;
2623
067653c5
AM
2624 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
2625 htab->sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
64e77c6d
L
2626 htab->srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
2627 if (! htab->sgot || ! htab->sgotplt || ! htab->srelgot)
067653c5 2628 abort ();
8e45593f
NC
2629
2630 htab->sfuncdesc = bfd_make_section_with_flags (dynobj, ".got.funcdesc",
2631 (SEC_ALLOC | SEC_LOAD
2632 | SEC_HAS_CONTENTS
2633 | SEC_IN_MEMORY
2634 | SEC_LINKER_CREATED));
2635 if (htab->sfuncdesc == NULL
2636 || ! bfd_set_section_alignment (dynobj, htab->sfuncdesc, 2))
2637 return FALSE;
2638
2639 htab->srelfuncdesc = bfd_make_section_with_flags (dynobj,
2640 ".rela.got.funcdesc",
2641 (SEC_ALLOC | SEC_LOAD
2642 | SEC_HAS_CONTENTS
2643 | SEC_IN_MEMORY
2644 | SEC_LINKER_CREATED
2645 | SEC_READONLY));
2646 if (htab->srelfuncdesc == NULL
2647 || ! bfd_set_section_alignment (dynobj, htab->srelfuncdesc, 2))
2648 return FALSE;
2649
2650 /* Also create .rofixup. */
2651 htab->srofixup = bfd_make_section_with_flags (dynobj, ".rofixup",
2652 (SEC_ALLOC | SEC_LOAD
2653 | SEC_HAS_CONTENTS
2654 | SEC_IN_MEMORY
2655 | SEC_LINKER_CREATED
2656 | SEC_READONLY));
2657 if (htab->srofixup == NULL
2658 || ! bfd_set_section_alignment (dynobj, htab->srofixup, 2))
2659 return FALSE;
2660
b34976b6 2661 return TRUE;
067653c5
AM
2662}
2663
37c644f2
AO
2664/* Create dynamic sections when linking against a dynamic object. */
2665
b34976b6 2666static bfd_boolean
09fd220b 2667sh_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
37c644f2 2668{
067653c5 2669 struct elf_sh_link_hash_table *htab;
37c644f2 2670 flagword flags, pltflags;
91d6fa6a 2671 asection *s;
9c5bfbb7 2672 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
37c644f2
AO
2673 int ptralign = 0;
2674
2675 switch (bed->s->arch_size)
2676 {
2677 case 32:
2678 ptralign = 2;
2679 break;
2680
2681 case 64:
2682 ptralign = 3;
2683 break;
2684
2685 default:
2686 bfd_set_error (bfd_error_bad_value);
b34976b6 2687 return FALSE;
37c644f2
AO
2688 }
2689
067653c5 2690 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2691 if (htab == NULL)
2692 return FALSE;
2693
35cad4c4
KK
2694 if (htab->root.dynamic_sections_created)
2695 return TRUE;
067653c5 2696
37c644f2
AO
2697 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
2698 .rel[a].bss sections. */
2699
2700 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2701 | SEC_LINKER_CREATED);
2702
2703 pltflags = flags;
2704 pltflags |= SEC_CODE;
2705 if (bed->plt_not_loaded)
2706 pltflags &= ~ (SEC_LOAD | SEC_HAS_CONTENTS);
2707 if (bed->plt_readonly)
2708 pltflags |= SEC_READONLY;
2709
3496cb2a 2710 s = bfd_make_section_with_flags (abfd, ".plt", pltflags);
35cad4c4
KK
2711 htab->splt = s;
2712 if (s == NULL
35cad4c4
KK
2713 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
2714 return FALSE;
37c644f2
AO
2715
2716 if (bed->want_plt_sym)
2717 {
2718 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
2719 .plt section. */
14a793b2
AM
2720 struct elf_link_hash_entry *h;
2721 struct bfd_link_hash_entry *bh = NULL;
2722
37c644f2
AO
2723 if (! (_bfd_generic_link_add_one_symbol
2724 (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s,
b34976b6 2725 (bfd_vma) 0, (const char *) NULL, FALSE,
14a793b2 2726 get_elf_backend_data (abfd)->collect, &bh)))
b34976b6 2727 return FALSE;
14a793b2
AM
2728
2729 h = (struct elf_link_hash_entry *) bh;
f5385ebf 2730 h->def_regular = 1;
37c644f2 2731 h->type = STT_OBJECT;
7325306f 2732 htab->root.hplt = h;
37c644f2
AO
2733
2734 if (info->shared
c152c796 2735 && ! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 2736 return FALSE;
37c644f2
AO
2737 }
2738
3496cb2a
L
2739 s = bfd_make_section_with_flags (abfd,
2740 bed->default_use_rela_p ? ".rela.plt" : ".rel.plt",
2741 flags | SEC_READONLY);
35cad4c4
KK
2742 htab->srelplt = s;
2743 if (s == NULL
35cad4c4
KK
2744 || ! bfd_set_section_alignment (abfd, s, ptralign))
2745 return FALSE;
37c644f2 2746
2293c499
AM
2747 if (htab->sgot == NULL
2748 && !create_got_section (abfd, info))
b34976b6 2749 return FALSE;
37c644f2
AO
2750
2751 {
2752 const char *secname;
2753 char *relname;
2754 flagword secflags;
2755 asection *sec;
2756
2757 for (sec = abfd->sections; sec; sec = sec->next)
2758 {
2759 secflags = bfd_get_section_flags (abfd, sec);
2760 if ((secflags & (SEC_DATA | SEC_LINKER_CREATED))
2761 || ((secflags & SEC_HAS_CONTENTS) != SEC_HAS_CONTENTS))
2762 continue;
2763 secname = bfd_get_section_name (abfd, sec);
dc810e39 2764 relname = (char *) bfd_malloc ((bfd_size_type) strlen (secname) + 6);
37c644f2
AO
2765 strcpy (relname, ".rela");
2766 strcat (relname, secname);
03151a5a
KK
2767 if (bfd_get_section_by_name (abfd, secname))
2768 continue;
3496cb2a
L
2769 s = bfd_make_section_with_flags (abfd, relname,
2770 flags | SEC_READONLY);
37c644f2 2771 if (s == NULL
37c644f2 2772 || ! bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 2773 return FALSE;
37c644f2
AO
2774 }
2775 }
2776
2777 if (bed->want_dynbss)
2778 {
2779 /* The .dynbss section is a place to put symbols which are defined
2780 by dynamic objects, are referenced by regular objects, and are
2781 not functions. We must allocate space for them in the process
2782 image and use a R_*_COPY reloc to tell the dynamic linker to
2783 initialize them at run time. The linker script puts the .dynbss
2784 section into the .bss section of the final image. */
3496cb2a
L
2785 s = bfd_make_section_with_flags (abfd, ".dynbss",
2786 SEC_ALLOC | SEC_LINKER_CREATED);
35cad4c4 2787 htab->sdynbss = s;
3496cb2a 2788 if (s == NULL)
35cad4c4 2789 return FALSE;
37c644f2
AO
2790
2791 /* The .rel[a].bss section holds copy relocs. This section is not
2792 normally needed. We need to create it here, though, so that the
2793 linker will map it to an output section. We can't just create it
2794 only if we need it, because we will not know whether we need it
2795 until we have seen all the input files, and the first time the
2796 main linker code calls BFD after examining all the input files
2797 (size_dynamic_sections) the input sections have already been
2798 mapped to the output sections. If the section turns out not to
2799 be needed, we can discard it later. We will never need this
2800 section when generating a shared object, since they do not use
2801 copy relocs. */
35cad4c4 2802 if (! info->shared)
37c644f2 2803 {
3496cb2a
L
2804 s = bfd_make_section_with_flags (abfd,
2805 (bed->default_use_rela_p
2806 ? ".rela.bss" : ".rel.bss"),
2807 flags | SEC_READONLY);
067653c5 2808 htab->srelbss = s;
37c644f2 2809 if (s == NULL
37c644f2 2810 || ! bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 2811 return FALSE;
37c644f2
AO
2812 }
2813 }
2814
55e6e397
RS
2815 if (htab->vxworks_p)
2816 {
2817 if (!elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2818 return FALSE;
2819 }
2820
b34976b6 2821 return TRUE;
37c644f2
AO
2822}
2823\f
37c644f2
AO
2824/* Adjust a symbol defined by a dynamic object and referenced by a
2825 regular object. The current definition is in some section of the
2826 dynamic object, but we're not including those sections. We have to
2827 change the definition to something the rest of the link can
2828 understand. */
2829
b34976b6 2830static bfd_boolean
09fd220b
KK
2831sh_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
2832 struct elf_link_hash_entry *h)
37c644f2 2833{
067653c5
AM
2834 struct elf_sh_link_hash_table *htab;
2835 struct elf_sh_link_hash_entry *eh;
2836 struct elf_sh_dyn_relocs *p;
37c644f2 2837 asection *s;
37c644f2 2838
2293c499 2839 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2840 if (htab == NULL)
2841 return FALSE;
37c644f2
AO
2842
2843 /* Make sure we know what is going on here. */
2293c499 2844 BFD_ASSERT (htab->root.dynobj != NULL
f5385ebf 2845 && (h->needs_plt
f6e332e6 2846 || h->u.weakdef != NULL
f5385ebf
AM
2847 || (h->def_dynamic
2848 && h->ref_regular
2849 && !h->def_regular)));
37c644f2
AO
2850
2851 /* If this is a function, put it in the procedure linkage table. We
2852 will fill in the contents of the procedure linkage table later,
2853 when we know the address of the .got section. */
2854 if (h->type == STT_FUNC
f5385ebf 2855 || h->needs_plt)
37c644f2 2856 {
067653c5 2857 if (h->plt.refcount <= 0
3d85aebe
KK
2858 || SYMBOL_CALLS_LOCAL (info, h)
2859 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
2860 && h->root.type == bfd_link_hash_undefweak))
37c644f2
AO
2861 {
2862 /* This case can occur if we saw a PLT reloc in an input
2863 file, but the symbol was never referred to by a dynamic
2864 object. In such a case, we don't actually need to build
2865 a procedure linkage table, and we can just do a REL32
2866 reloc instead. */
067653c5 2867 h->plt.offset = (bfd_vma) -1;
f5385ebf 2868 h->needs_plt = 0;
37c644f2
AO
2869 }
2870
b34976b6 2871 return TRUE;
37c644f2 2872 }
067653c5
AM
2873 else
2874 h->plt.offset = (bfd_vma) -1;
37c644f2
AO
2875
2876 /* If this is a weak symbol, and there is a real definition, the
2877 processor independent code will have arranged for us to see the
2878 real definition first, and we can just use the same value. */
f6e332e6 2879 if (h->u.weakdef != NULL)
37c644f2 2880 {
f6e332e6
AM
2881 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2882 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2883 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2884 h->root.u.def.value = h->u.weakdef->root.u.def.value;
04e534c3 2885 if (info->nocopyreloc)
f6e332e6 2886 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 2887 return TRUE;
37c644f2
AO
2888 }
2889
2890 /* This is a reference to a symbol defined by a dynamic object which
2891 is not a function. */
2892
2893 /* If we are creating a shared library, we must presume that the
2894 only references to the symbol are via the global offset table.
2895 For such cases we need not do anything here; the relocations will
2896 be handled correctly by relocate_section. */
2897 if (info->shared)
b34976b6 2898 return TRUE;
37c644f2
AO
2899
2900 /* If there are no references to this symbol that do not use the
2901 GOT, we don't need to generate a copy reloc. */
f5385ebf 2902 if (!h->non_got_ref)
b34976b6 2903 return TRUE;
37c644f2 2904
067653c5
AM
2905 /* If -z nocopyreloc was given, we won't generate them either. */
2906 if (info->nocopyreloc)
2907 {
f5385ebf 2908 h->non_got_ref = 0;
b34976b6 2909 return TRUE;
067653c5
AM
2910 }
2911
2912 eh = (struct elf_sh_link_hash_entry *) h;
2913 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2914 {
2915 s = p->sec->output_section;
2916 if (s != NULL && (s->flags & (SEC_READONLY | SEC_HAS_CONTENTS)) != 0)
2917 break;
2918 }
2919
2920 /* If we didn't find any dynamic relocs in sections which needs the
2921 copy reloc, then we'll be keeping the dynamic relocs and avoiding
2922 the copy reloc. */
2923 if (p == NULL)
2924 {
f5385ebf 2925 h->non_got_ref = 0;
b34976b6 2926 return TRUE;
067653c5
AM
2927 }
2928
909272ee
AM
2929 if (h->size == 0)
2930 {
2931 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
2932 h->root.root.string);
2933 return TRUE;
2934 }
2935
37c644f2
AO
2936 /* We must allocate the symbol in our .dynbss section, which will
2937 become part of the .bss section of the executable. There will be
2938 an entry for this symbol in the .dynsym section. The dynamic
2939 object will contain position independent code, so all references
2940 from the dynamic object to this symbol will go through the global
2941 offset table. The dynamic linker will use the .dynsym entry to
2942 determine the address it must put in the global offset table, so
2943 both the dynamic object and the regular object will refer to the
2944 same memory location for the variable. */
2945
067653c5 2946 s = htab->sdynbss;
37c644f2
AO
2947 BFD_ASSERT (s != NULL);
2948
2949 /* We must generate a R_SH_COPY reloc to tell the dynamic linker to
2950 copy the initial value out of the dynamic object and into the
2951 runtime process image. We need to remember the offset into the
2952 .rela.bss section we are going to use. */
2953 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
2954 {
2955 asection *srel;
2956
067653c5 2957 srel = htab->srelbss;
37c644f2 2958 BFD_ASSERT (srel != NULL);
eea6121a 2959 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 2960 h->needs_copy = 1;
37c644f2
AO
2961 }
2962
027297b7 2963 return _bfd_elf_adjust_dynamic_copy (h, s);
37c644f2
AO
2964}
2965
067653c5
AM
2966/* Allocate space in .plt, .got and associated reloc sections for
2967 dynamic relocs. */
2968
b34976b6 2969static bfd_boolean
09fd220b 2970allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
067653c5
AM
2971{
2972 struct bfd_link_info *info;
2973 struct elf_sh_link_hash_table *htab;
2974 struct elf_sh_link_hash_entry *eh;
2975 struct elf_sh_dyn_relocs *p;
2976
2977 if (h->root.type == bfd_link_hash_indirect)
b34976b6 2978 return TRUE;
067653c5 2979
067653c5
AM
2980 info = (struct bfd_link_info *) inf;
2981 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
2982 if (htab == NULL)
2983 return FALSE;
067653c5 2984
4989d792
SC
2985 eh = (struct elf_sh_link_hash_entry *) h;
2986 if ((h->got.refcount > 0
f5385ebf 2987 || h->forced_local)
4989d792
SC
2988 && eh->gotplt_refcount > 0)
2989 {
2990 /* The symbol has been forced local, or we have some direct got refs,
26e41594 2991 so treat all the gotplt refs as got refs. */
4989d792
SC
2992 h->got.refcount += eh->gotplt_refcount;
2993 if (h->plt.refcount >= eh->gotplt_refcount)
2994 h->plt.refcount -= eh->gotplt_refcount;
2995 }
2996
067653c5 2997 if (htab->root.dynamic_sections_created
04e534c3
KK
2998 && h->plt.refcount > 0
2999 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3000 || h->root.type != bfd_link_hash_undefweak))
067653c5
AM
3001 {
3002 /* Make sure this symbol is output as a dynamic symbol.
3003 Undefined weak syms won't yet be marked as dynamic. */
3004 if (h->dynindx == -1
f5385ebf 3005 && !h->forced_local)
067653c5 3006 {
c152c796 3007 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3008 return FALSE;
067653c5
AM
3009 }
3010
267fb3c1
KK
3011 if (info->shared
3012 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
067653c5
AM
3013 {
3014 asection *s = htab->splt;
8e45593f 3015 const struct elf_sh_plt_info *plt_info;
067653c5
AM
3016
3017 /* If this is the first .plt entry, make room for the special
3018 first entry. */
eea6121a 3019 if (s->size == 0)
55e6e397 3020 s->size += htab->plt_info->plt0_entry_size;
067653c5 3021
eea6121a 3022 h->plt.offset = s->size;
067653c5
AM
3023
3024 /* If this symbol is not defined in a regular file, and we are
3025 not generating a shared library, then set the symbol to this
3026 location in the .plt. This is required to make function
3027 pointers compare as equal between the normal executable and
8e45593f
NC
3028 the shared library. Skip this for FDPIC, since the
3029 function's address will be the address of the canonical
3030 function descriptor. */
3031 if (!htab->fdpic_p && !info->shared && !h->def_regular)
067653c5
AM
3032 {
3033 h->root.u.def.section = s;
3034 h->root.u.def.value = h->plt.offset;
3035 }
3036
3037 /* Make room for this entry. */
8e45593f
NC
3038 plt_info = htab->plt_info;
3039 if (plt_info->short_plt != NULL
3040 && (get_plt_index (plt_info->short_plt, s->size) < MAX_SHORT_PLT))
3041 plt_info = plt_info->short_plt;
3042 s->size += plt_info->symbol_entry_size;
067653c5
AM
3043
3044 /* We also need to make an entry in the .got.plt section, which
3045 will be placed in the .got section by the linker script. */
8e45593f
NC
3046 if (!htab->fdpic_p)
3047 htab->sgotplt->size += 4;
3048 else
3049 htab->sgotplt->size += 8;
067653c5
AM
3050
3051 /* We also need to make an entry in the .rel.plt section. */
eea6121a 3052 htab->srelplt->size += sizeof (Elf32_External_Rela);
55e6e397
RS
3053
3054 if (htab->vxworks_p && !info->shared)
3055 {
3056 /* VxWorks executables have a second set of relocations
3057 for each PLT entry. They go in a separate relocation
3058 section, which is processed by the kernel loader. */
3059
3060 /* There is a relocation for the initial PLT entry:
3061 an R_SH_DIR32 relocation for _GLOBAL_OFFSET_TABLE_. */
3062 if (h->plt.offset == htab->plt_info->plt0_entry_size)
3063 htab->srelplt2->size += sizeof (Elf32_External_Rela);
3064
3065 /* There are two extra relocations for each subsequent
3066 PLT entry: an R_SH_DIR32 relocation for the GOT entry,
3067 and an R_SH_DIR32 relocation for the PLT entry. */
3068 htab->srelplt2->size += sizeof (Elf32_External_Rela) * 2;
3069 }
067653c5
AM
3070 }
3071 else
3072 {
3073 h->plt.offset = (bfd_vma) -1;
f5385ebf 3074 h->needs_plt = 0;
067653c5
AM
3075 }
3076 }
3077 else
3078 {
3079 h->plt.offset = (bfd_vma) -1;
f5385ebf 3080 h->needs_plt = 0;
067653c5
AM
3081 }
3082
3083 if (h->got.refcount > 0)
3084 {
3085 asection *s;
b34976b6 3086 bfd_boolean dyn;
8e45593f 3087 int got_type = sh_elf_hash_entry (h)->got_type;
067653c5
AM
3088
3089 /* Make sure this symbol is output as a dynamic symbol.
3090 Undefined weak syms won't yet be marked as dynamic. */
3091 if (h->dynindx == -1
f5385ebf 3092 && !h->forced_local)
067653c5 3093 {
c152c796 3094 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3095 return FALSE;
067653c5
AM
3096 }
3097
3098 s = htab->sgot;
eea6121a
AM
3099 h->got.offset = s->size;
3100 s->size += 4;
3376eaf5 3101 /* R_SH_TLS_GD needs 2 consecutive GOT slots. */
8e45593f 3102 if (got_type == GOT_TLS_GD)
eea6121a 3103 s->size += 4;
067653c5 3104 dyn = htab->root.dynamic_sections_created;
8e45593f
NC
3105 if (!dyn)
3106 {
3107 /* No dynamic relocations required. */
3108 if (htab->fdpic_p && !info->shared
3109 && h->root.type != bfd_link_hash_undefweak
3110 && (got_type == GOT_NORMAL || got_type == GOT_FUNCDESC))
3111 htab->srofixup->size += 4;
3112 }
267fb3c1 3113 /* R_SH_TLS_IE_32 needs one dynamic relocation if dynamic,
3376eaf5 3114 R_SH_TLS_GD needs one if local symbol and two if global. */
8e45593f
NC
3115 else if ((got_type == GOT_TLS_GD && h->dynindx == -1)
3116 || got_type == GOT_TLS_IE)
eea6121a 3117 htab->srelgot->size += sizeof (Elf32_External_Rela);
8e45593f 3118 else if (got_type == GOT_TLS_GD)
eea6121a 3119 htab->srelgot->size += 2 * sizeof (Elf32_External_Rela);
8e45593f
NC
3120 else if (got_type == GOT_FUNCDESC)
3121 {
3122 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
3123 htab->srofixup->size += 4;
3124 else
3125 htab->srelgot->size += sizeof (Elf32_External_Rela);
3126 }
04e534c3
KK
3127 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3128 || h->root.type != bfd_link_hash_undefweak)
3129 && (info->shared
3130 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
eea6121a 3131 htab->srelgot->size += sizeof (Elf32_External_Rela);
8e45593f
NC
3132 else if (htab->fdpic_p && !info->shared && got_type == GOT_NORMAL
3133 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
3134 || h->root.type != bfd_link_hash_undefweak))
3135 htab->srofixup->size += 4;
067653c5
AM
3136 }
3137 else
3138 h->got.offset = (bfd_vma) -1;
3139
396a6083
SC
3140#ifdef INCLUDE_SHMEDIA
3141 if (eh->datalabel_got.refcount > 0)
3142 {
3143 asection *s;
b34976b6 3144 bfd_boolean dyn;
396a6083
SC
3145
3146 /* Make sure this symbol is output as a dynamic symbol.
3147 Undefined weak syms won't yet be marked as dynamic. */
3148 if (h->dynindx == -1
f5385ebf 3149 && !h->forced_local)
396a6083 3150 {
c152c796 3151 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3152 return FALSE;
396a6083
SC
3153 }
3154
3155 s = htab->sgot;
eea6121a
AM
3156 eh->datalabel_got.offset = s->size;
3157 s->size += 4;
396a6083 3158 dyn = htab->root.dynamic_sections_created;
267fb3c1 3159 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h))
eea6121a 3160 htab->srelgot->size += sizeof (Elf32_External_Rela);
396a6083
SC
3161 }
3162 else
3163 eh->datalabel_got.offset = (bfd_vma) -1;
3164#endif
3165
8e45593f
NC
3166 /* Allocate space for any dynamic relocations to function
3167 descriptors, canonical or otherwise. We need to relocate the
3168 reference unless it resolves to zero, which only happens for
3169 undefined weak symbols (either non-default visibility, or when
3170 static linking). Any GOT slot is accounted for elsewhere. */
3171 if (eh->abs_funcdesc_refcount > 0
3172 && (h->root.type != bfd_link_hash_undefweak
3173 || (htab->root.dynamic_sections_created
3174 && ! SYMBOL_CALLS_LOCAL (info, h))))
3175 {
3176 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
3177 htab->srofixup->size += eh->abs_funcdesc_refcount * 4;
3178 else
3179 htab->srelgot->size
3180 += eh->abs_funcdesc_refcount * sizeof (Elf32_External_Rela);
3181 }
3182
3183 /* We must allocate a function descriptor if there are references to
3184 a canonical descriptor (R_SH_GOTFUNCDESC or R_SH_FUNCDESC) and
3185 the dynamic linker isn't going to allocate it. None of this
3186 applies if we already created one in .got.plt, but if the
3187 canonical function descriptor can be in this object, there
3188 won't be a PLT entry at all. */
3189 if ((eh->funcdesc.refcount > 0
3190 || (h->got.offset != MINUS_ONE && eh->got_type == GOT_FUNCDESC))
3191 && h->root.type != bfd_link_hash_undefweak
3192 && SYMBOL_FUNCDESC_LOCAL (info, h))
3193 {
3194 /* Make room for this function descriptor. */
3195 eh->funcdesc.offset = htab->sfuncdesc->size;
3196 htab->sfuncdesc->size += 8;
3197
3198 /* We will need a relocation or two fixups to initialize the
3199 function descriptor, so allocate those too. */
3200 if (!info->shared && SYMBOL_CALLS_LOCAL (info, h))
3201 htab->srofixup->size += 8;
3202 else
3203 htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3204 }
3205
067653c5 3206 if (eh->dyn_relocs == NULL)
b34976b6 3207 return TRUE;
067653c5
AM
3208
3209 /* In the shared -Bsymbolic case, discard space allocated for
3210 dynamic pc-relative relocs against symbols which turn out to be
3211 defined in regular objects. For the normal shared case, discard
3212 space for pc-relative relocs that have become local due to symbol
3213 visibility changes. */
3214
3215 if (info->shared)
3216 {
3d85aebe 3217 if (SYMBOL_CALLS_LOCAL (info, h))
067653c5
AM
3218 {
3219 struct elf_sh_dyn_relocs **pp;
3220
3221 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
3222 {
3223 p->count -= p->pc_count;
3224 p->pc_count = 0;
3225 if (p->count == 0)
3226 *pp = p->next;
3227 else
3228 pp = &p->next;
3229 }
3230 }
04e534c3 3231
3348747a
NS
3232 if (htab->vxworks_p)
3233 {
3234 struct elf_sh_dyn_relocs **pp;
3235
3236 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
3237 {
3238 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
3239 *pp = p->next;
3240 else
3241 pp = &p->next;
3242 }
3243 }
3244
04e534c3
KK
3245 /* Also discard relocs on undefined weak syms with non-default
3246 visibility. */
22d606e9 3247 if (eh->dyn_relocs != NULL
04e534c3 3248 && h->root.type == bfd_link_hash_undefweak)
22d606e9
AM
3249 {
3250 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3251 eh->dyn_relocs = NULL;
3252
3253 /* Make sure undefined weak symbols are output as a dynamic
3254 symbol in PIEs. */
3255 else if (h->dynindx == -1
3256 && !h->forced_local)
3257 {
3258 if (! bfd_elf_link_record_dynamic_symbol (info, h))
3259 return FALSE;
3260 }
3261 }
067653c5
AM
3262 }
3263 else
3264 {
3265 /* For the non-shared case, discard space for relocs against
3266 symbols which turn out to need copy relocs or are not
3267 dynamic. */
3268
f5385ebf
AM
3269 if (!h->non_got_ref
3270 && ((h->def_dynamic
3271 && !h->def_regular)
067653c5
AM
3272 || (htab->root.dynamic_sections_created
3273 && (h->root.type == bfd_link_hash_undefweak
3274 || h->root.type == bfd_link_hash_undefined))))
3275 {
3276 /* Make sure this symbol is output as a dynamic symbol.
3277 Undefined weak syms won't yet be marked as dynamic. */
3278 if (h->dynindx == -1
f5385ebf 3279 && !h->forced_local)
067653c5 3280 {
c152c796 3281 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 3282 return FALSE;
067653c5
AM
3283 }
3284
3285 /* If that succeeded, we know we'll be keeping all the
3286 relocs. */
3287 if (h->dynindx != -1)
3288 goto keep;
3289 }
3290
3291 eh->dyn_relocs = NULL;
3292
3293 keep: ;
3294 }
3295
3296 /* Finally, allocate space. */
3297 for (p = eh->dyn_relocs; p != NULL; p = p->next)
3298 {
3299 asection *sreloc = elf_section_data (p->sec)->sreloc;
eea6121a 3300 sreloc->size += p->count * sizeof (Elf32_External_Rela);
8e45593f
NC
3301
3302 /* If we need relocations, we do not need fixups. */
3303 if (htab->fdpic_p && !info->shared)
3304 htab->srofixup->size -= 4 * (p->count - p->pc_count);
067653c5
AM
3305 }
3306
b34976b6 3307 return TRUE;
067653c5
AM
3308}
3309
3310/* Find any dynamic relocs that apply to read-only sections. */
3311
b34976b6 3312static bfd_boolean
09fd220b 3313readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
067653c5
AM
3314{
3315 struct elf_sh_link_hash_entry *eh;
3316 struct elf_sh_dyn_relocs *p;
3317
067653c5
AM
3318 eh = (struct elf_sh_link_hash_entry *) h;
3319 for (p = eh->dyn_relocs; p != NULL; p = p->next)
3320 {
3321 asection *s = p->sec->output_section;
3322
3323 if (s != NULL && (s->flags & SEC_READONLY) != 0)
3324 {
3325 struct bfd_link_info *info = (struct bfd_link_info *) inf;
3326
3327 info->flags |= DF_TEXTREL;
3328
3329 /* Not an error, just cut short the traversal. */
b34976b6 3330 return FALSE;
067653c5
AM
3331 }
3332 }
b34976b6 3333 return TRUE;
067653c5
AM
3334}
3335
55e6e397
RS
3336/* This function is called after all the input files have been read,
3337 and the input sections have been assigned to output sections.
3338 It's a convenient place to determine the PLT style. */
3339
3340static bfd_boolean
3341sh_elf_always_size_sections (bfd *output_bfd, struct bfd_link_info *info)
3342{
3343 sh_elf_hash_table (info)->plt_info = get_plt_info (output_bfd, info->shared);
8e45593f
NC
3344
3345 if (sh_elf_hash_table (info)->fdpic_p && !info->relocatable)
3346 {
3347 struct elf_link_hash_entry *h;
3348
3349 /* Force a PT_GNU_STACK segment to be created. */
3350 if (! elf_tdata (output_bfd)->stack_flags)
3351 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | PF_X;
3352
3353 /* Define __stacksize if it's not defined yet. */
3354 h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
3355 FALSE, FALSE, FALSE);
3356 if (! h || h->root.type != bfd_link_hash_defined
3357 || h->type != STT_OBJECT
3358 || !h->def_regular)
3359 {
3360 struct bfd_link_hash_entry *bh = NULL;
3361
3362 if (!(_bfd_generic_link_add_one_symbol
3363 (info, output_bfd, "__stacksize",
3364 BSF_GLOBAL, bfd_abs_section_ptr, DEFAULT_STACK_SIZE,
3365 (const char *) NULL, FALSE,
3366 get_elf_backend_data (output_bfd)->collect, &bh)))
3367 return FALSE;
3368
3369 h = (struct elf_link_hash_entry *) bh;
3370 h->def_regular = 1;
3371 h->type = STT_OBJECT;
3372 }
3373 }
3374 return TRUE;
3375}
3376
3377#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
3378
3379static bfd_boolean
3380sh_elf_modify_program_headers (bfd *output_bfd, struct bfd_link_info *info)
3381{
3382 struct elf_obj_tdata *tdata = elf_tdata (output_bfd);
3383 struct elf_segment_map *m;
3384 Elf_Internal_Phdr *p;
3385
3386 /* objcopy and strip preserve what's already there using
3387 sh_elf_copy_private_bfd_data (). */
3388 if (! info)
3389 return TRUE;
3390
3391 for (p = tdata->phdr, m = tdata->segment_map; m != NULL; m = m->next, p++)
3392 if (m->p_type == PT_GNU_STACK)
3393 break;
3394
3395 if (m)
3396 {
3397 struct elf_link_hash_entry *h;
3398
3399 /* Obtain the pointer to the __stacksize symbol. */
3400 h = elf_link_hash_lookup (elf_hash_table (info), "__stacksize",
3401 FALSE, FALSE, FALSE);
3402 if (h)
3403 {
3404 while (h->root.type == bfd_link_hash_indirect
3405 || h->root.type == bfd_link_hash_warning)
3406 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3407 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
3408 }
3409
3410 /* Set the header p_memsz from the symbol value. We
3411 intentionally ignore the symbol section. */
3412 if (h && h->root.type == bfd_link_hash_defined)
3413 p->p_memsz = h->root.u.def.value;
3414 else
3415 p->p_memsz = DEFAULT_STACK_SIZE;
3416
3417 p->p_align = 8;
3418 }
3419
55e6e397
RS
3420 return TRUE;
3421}
3422
8e45593f
NC
3423#endif
3424
37c644f2
AO
3425/* Set the sizes of the dynamic sections. */
3426
b34976b6 3427static bfd_boolean
09fd220b
KK
3428sh_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
3429 struct bfd_link_info *info)
37c644f2 3430{
067653c5 3431 struct elf_sh_link_hash_table *htab;
37c644f2
AO
3432 bfd *dynobj;
3433 asection *s;
b34976b6 3434 bfd_boolean relocs;
067653c5 3435 bfd *ibfd;
37c644f2 3436
067653c5 3437 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
3438 if (htab == NULL)
3439 return FALSE;
3440
067653c5 3441 dynobj = htab->root.dynobj;
37c644f2
AO
3442 BFD_ASSERT (dynobj != NULL);
3443
067653c5 3444 if (htab->root.dynamic_sections_created)
37c644f2
AO
3445 {
3446 /* Set the contents of the .interp section to the interpreter. */
2558b9a9 3447 if (info->executable)
37c644f2
AO
3448 {
3449 s = bfd_get_section_by_name (dynobj, ".interp");
3450 BFD_ASSERT (s != NULL);
eea6121a 3451 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
37c644f2
AO
3452 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
3453 }
3454 }
37c644f2 3455
067653c5
AM
3456 /* Set up .got offsets for local syms, and space for local dynamic
3457 relocs. */
3458 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
37c644f2 3459 {
067653c5
AM
3460 bfd_signed_vma *local_got;
3461 bfd_signed_vma *end_local_got;
8e45593f
NC
3462 union gotref *local_funcdesc, *end_local_funcdesc;
3463 char *local_got_type;
067653c5
AM
3464 bfd_size_type locsymcount;
3465 Elf_Internal_Shdr *symtab_hdr;
3466 asection *srel;
37c644f2 3467
0ffa91dd 3468 if (! is_sh_elf (ibfd))
37c644f2
AO
3469 continue;
3470
067653c5 3471 for (s = ibfd->sections; s != NULL; s = s->next)
37c644f2 3472 {
067653c5
AM
3473 struct elf_sh_dyn_relocs *p;
3474
3475 for (p = ((struct elf_sh_dyn_relocs *)
3476 elf_section_data (s)->local_dynrel);
3477 p != NULL;
3478 p = p->next)
37c644f2 3479 {
067653c5
AM
3480 if (! bfd_is_abs_section (p->sec)
3481 && bfd_is_abs_section (p->sec->output_section))
3482 {
3483 /* Input section has been discarded, either because
3484 it is a copy of a linkonce section or due to
3485 linker script /DISCARD/, so we'll be discarding
3486 the relocs too. */
3487 }
3348747a
NS
3488 else if (htab->vxworks_p
3489 && strcmp (p->sec->output_section->name,
3490 ".tls_vars") == 0)
3491 {
3492 /* Relocations in vxworks .tls_vars sections are
3493 handled specially by the loader. */
3494 }
067653c5
AM
3495 else if (p->count != 0)
3496 {
3497 srel = elf_section_data (p->sec)->sreloc;
eea6121a 3498 srel->size += p->count * sizeof (Elf32_External_Rela);
067653c5
AM
3499 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
3500 info->flags |= DF_TEXTREL;
8e45593f
NC
3501
3502 /* If we need relocations, we do not need fixups. */
3503 if (htab->fdpic_p && !info->shared)
3504 htab->srofixup->size -= 4 * (p->count - p->pc_count);
067653c5 3505 }
37c644f2
AO
3506 }
3507 }
067653c5 3508
0ffa91dd 3509 symtab_hdr = &elf_symtab_hdr (ibfd);
067653c5
AM
3510 locsymcount = symtab_hdr->sh_info;
3511#ifdef INCLUDE_SHMEDIA
3512 /* Count datalabel local GOT. */
3513 locsymcount *= 2;
3514#endif
067653c5
AM
3515 s = htab->sgot;
3516 srel = htab->srelgot;
8e45593f
NC
3517
3518 local_got = elf_local_got_refcounts (ibfd);
3519 if (local_got)
37c644f2 3520 {
8e45593f
NC
3521 end_local_got = local_got + locsymcount;
3522 local_got_type = sh_elf_local_got_type (ibfd);
3523 local_funcdesc = sh_elf_local_funcdesc (ibfd);
3524 for (; local_got < end_local_got; ++local_got)
37c644f2 3525 {
8e45593f
NC
3526 if (*local_got > 0)
3527 {
3528 *local_got = s->size;
3529 s->size += 4;
3530 if (*local_got_type == GOT_TLS_GD)
3531 s->size += 4;
3532 if (info->shared)
3533 srel->size += sizeof (Elf32_External_Rela);
3534 else
3535 htab->srofixup->size += 4;
3536
3537 if (*local_got_type == GOT_FUNCDESC)
3538 {
3539 if (local_funcdesc == NULL)
3540 {
3541 bfd_size_type size;
3542
3543 size = locsymcount * sizeof (union gotref);
3544 local_funcdesc = (union gotref *) bfd_zalloc (ibfd,
3545 size);
3546 if (local_funcdesc == NULL)
3547 return FALSE;
3548 sh_elf_local_funcdesc (ibfd) = local_funcdesc;
3549 local_funcdesc += (local_got
3550 - elf_local_got_refcounts (ibfd));
3551 }
3552 local_funcdesc->refcount++;
3553 ++local_funcdesc;
3554 }
3555 }
3556 else
3557 *local_got = (bfd_vma) -1;
3558 ++local_got_type;
3559 }
3560 }
3561
3562 local_funcdesc = sh_elf_local_funcdesc (ibfd);
3563 if (local_funcdesc)
3564 {
3565 end_local_funcdesc = local_funcdesc + locsymcount;
3566
3567 for (; local_funcdesc < end_local_funcdesc; ++local_funcdesc)
3568 {
3569 if (local_funcdesc->refcount > 0)
3570 {
3571 local_funcdesc->offset = htab->sfuncdesc->size;
3572 htab->sfuncdesc->size += 8;
3573 if (!info->shared)
3574 htab->srofixup->size += 8;
3575 else
3576 htab->srelfuncdesc->size += sizeof (Elf32_External_Rela);
3577 }
3578 else
3579 local_funcdesc->offset = MINUS_ONE;
37c644f2 3580 }
37c644f2 3581 }
8e45593f 3582
067653c5
AM
3583 }
3584
3376eaf5
KK
3585 if (htab->tls_ldm_got.refcount > 0)
3586 {
3587 /* Allocate 2 got entries and 1 dynamic reloc for R_SH_TLS_LD_32
3588 relocs. */
eea6121a
AM
3589 htab->tls_ldm_got.offset = htab->sgot->size;
3590 htab->sgot->size += 8;
3591 htab->srelgot->size += sizeof (Elf32_External_Rela);
3376eaf5
KK
3592 }
3593 else
3594 htab->tls_ldm_got.offset = -1;
3595
8e45593f
NC
3596 /* Only the reserved entries should be present. For FDPIC, they go at
3597 the end of .got.plt. */
3598 if (htab->fdpic_p)
3599 {
3600 BFD_ASSERT (htab->sgotplt && htab->sgotplt->size == 12);
3601 htab->sgotplt->size = 0;
3602 }
3603
067653c5
AM
3604 /* Allocate global sym .plt and .got entries, and space for global
3605 sym dynamic relocs. */
09fd220b 3606 elf_link_hash_traverse (&htab->root, allocate_dynrelocs, info);
067653c5 3607
8e45593f
NC
3608 /* Move the reserved entries and the _GLOBAL_OFFSET_TABLE_ symbol to the
3609 end of the FDPIC .got.plt. */
3610 if (htab->fdpic_p)
3611 {
3612 htab->root.hgot->root.u.def.value = htab->sgotplt->size;
3613 htab->sgotplt->size += 12;
3614 }
3615
3616 /* At the very end of the .rofixup section is a pointer to the GOT. */
3617 if (htab->fdpic_p && htab->srofixup != NULL)
3618 htab->srofixup->size += 4;
3619
067653c5
AM
3620 /* We now have determined the sizes of the various dynamic sections.
3621 Allocate memory for them. */
b34976b6 3622 relocs = FALSE;
067653c5
AM
3623 for (s = dynobj->sections; s != NULL; s = s->next)
3624 {
3625 if ((s->flags & SEC_LINKER_CREATED) == 0)
3626 continue;
3627
3628 if (s == htab->splt
3629 || s == htab->sgot
c456f082 3630 || s == htab->sgotplt
8e45593f
NC
3631 || s == htab->sfuncdesc
3632 || s == htab->srofixup
c456f082 3633 || s == htab->sdynbss)
067653c5
AM
3634 {
3635 /* Strip this section if we don't need it; see the
3636 comment below. */
3637 }
0112cd26 3638 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
067653c5 3639 {
55e6e397 3640 if (s->size != 0 && s != htab->srelplt && s != htab->srelplt2)
b34976b6 3641 relocs = TRUE;
067653c5
AM
3642
3643 /* We use the reloc_count field as a counter if we need
3644 to copy relocs into the output file. */
3645 s->reloc_count = 0;
3646 }
3647 else
37c644f2
AO
3648 {
3649 /* It's not one of our sections, so don't allocate space. */
3650 continue;
3651 }
3652
eea6121a 3653 if (s->size == 0)
37c644f2 3654 {
067653c5
AM
3655 /* If we don't need this section, strip it from the
3656 output file. This is mostly to handle .rela.bss and
3657 .rela.plt. We must create both sections in
3658 create_dynamic_sections, because they must be created
3659 before the linker maps input sections to output
3660 sections. The linker does that before
3661 adjust_dynamic_symbol is called, and it is that
3662 function which decides whether anything needs to go
3663 into these sections. */
3664
8423293d 3665 s->flags |= SEC_EXCLUDE;
37c644f2
AO
3666 continue;
3667 }
3668
c456f082
AM
3669 if ((s->flags & SEC_HAS_CONTENTS) == 0)
3670 continue;
3671
067653c5
AM
3672 /* Allocate memory for the section contents. We use bfd_zalloc
3673 here in case unused entries are not reclaimed before the
3674 section's contents are written out. This should not happen,
3675 but this way if it does, we get a R_SH_NONE reloc instead
3676 of garbage. */
eea6121a 3677 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
067653c5 3678 if (s->contents == NULL)
b34976b6 3679 return FALSE;
37c644f2
AO
3680 }
3681
067653c5 3682 if (htab->root.dynamic_sections_created)
37c644f2
AO
3683 {
3684 /* Add some entries to the .dynamic section. We fill in the
3685 values later, in sh_elf_finish_dynamic_sections, but we
3686 must add the entries now so that we get the correct size for
3687 the .dynamic section. The DT_DEBUG entry is filled in by the
3688 dynamic linker and used by the debugger. */
dc810e39 3689#define add_dynamic_entry(TAG, VAL) \
5a580b3a 3690 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 3691
2558b9a9 3692 if (info->executable)
37c644f2 3693 {
067653c5 3694 if (! add_dynamic_entry (DT_DEBUG, 0))
b34976b6 3695 return FALSE;
37c644f2
AO
3696 }
3697
eea6121a 3698 if (htab->splt->size != 0)
37c644f2 3699 {
067653c5
AM
3700 if (! add_dynamic_entry (DT_PLTGOT, 0)
3701 || ! add_dynamic_entry (DT_PLTRELSZ, 0)
3702 || ! add_dynamic_entry (DT_PLTREL, DT_RELA)
3703 || ! add_dynamic_entry (DT_JMPREL, 0))
b34976b6 3704 return FALSE;
37c644f2 3705 }
8e45593f
NC
3706 else if ((elf_elfheader (output_bfd)->e_flags & EF_SH_FDPIC)
3707 && htab->sgot->size != 0)
3708 {
3709 if (! add_dynamic_entry (DT_PLTGOT, 0))
3710 return FALSE;
3711 }
37c644f2
AO
3712
3713 if (relocs)
3714 {
067653c5
AM
3715 if (! add_dynamic_entry (DT_RELA, 0)
3716 || ! add_dynamic_entry (DT_RELASZ, 0)
3717 || ! add_dynamic_entry (DT_RELAENT,
3718 sizeof (Elf32_External_Rela)))
b34976b6 3719 return FALSE;
37c644f2 3720
067653c5
AM
3721 /* If any dynamic relocs apply to a read-only section,
3722 then we need a DT_TEXTREL entry. */
3723 if ((info->flags & DF_TEXTREL) == 0)
09fd220b 3724 elf_link_hash_traverse (&htab->root, readonly_dynrelocs, info);
067653c5
AM
3725
3726 if ((info->flags & DF_TEXTREL) != 0)
3727 {
3728 if (! add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3729 return FALSE;
067653c5 3730 }
37c644f2 3731 }
7a2b07ff
NS
3732 if (htab->vxworks_p
3733 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
3734 return FALSE;
37c644f2 3735 }
dc810e39 3736#undef add_dynamic_entry
37c644f2 3737
b34976b6 3738 return TRUE;
37c644f2 3739}
37c644f2 3740\f
8e45593f 3741/* Add a dynamic relocation to the SRELOC section. */
37c644f2 3742
8e45593f
NC
3743inline static bfd_vma
3744sh_elf_add_dyn_reloc (bfd *output_bfd, asection *sreloc, bfd_vma offset,
3745 int reloc_type, long dynindx, bfd_vma addend)
37c644f2 3746{
8e45593f
NC
3747 Elf_Internal_Rela outrel;
3748 bfd_vma reloc_offset;
37c644f2 3749
8e45593f
NC
3750 outrel.r_offset = offset;
3751 outrel.r_info = ELF32_R_INFO (dynindx, reloc_type);
3752 outrel.r_addend = addend;
0ffa91dd 3753
8e45593f
NC
3754 reloc_offset = sreloc->reloc_count * sizeof (Elf32_External_Rela);
3755 BFD_ASSERT (reloc_offset < sreloc->size);
3756 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
3757 sreloc->contents + reloc_offset);
3758 sreloc->reloc_count++;
37c644f2 3759
8e45593f
NC
3760 return reloc_offset;
3761}
37c644f2 3762
8e45593f 3763/* Add an FDPIC read-only fixup. */
37c644f2 3764
8e45593f
NC
3765inline static void
3766sh_elf_add_rofixup (bfd *output_bfd, asection *srofixup, bfd_vma offset)
3767{
3768 bfd_vma fixup_offset;
3769
3770 fixup_offset = srofixup->reloc_count++ * 4;
3771 BFD_ASSERT (fixup_offset < srofixup->size);
3772 bfd_put_32 (output_bfd, offset, srofixup->contents + fixup_offset);
3773}
3774
3775/* Return the offset of the generated .got section from the
3776 _GLOBAL_OFFSET_TABLE_ symbol. */
3777
3778static bfd_signed_vma
3779sh_elf_got_offset (struct elf_sh_link_hash_table *htab)
3780{
3781 return (htab->sgot->output_offset - htab->sgotplt->output_offset
3782 - htab->root.hgot->root.u.def.value);
3783}
3784
3785/* Find the segment number in which OSEC, and output section, is
3786 located. */
3787
3788static unsigned
3789sh_elf_osec_to_segment (bfd *output_bfd, asection *osec)
3790{
3791 Elf_Internal_Phdr *p = _bfd_elf_find_segment_containing_section (output_bfd,
3792 osec);
3793
3794 /* FIXME: Nothing ever says what this index is relative to. The kernel
3795 supplies data in terms of the number of load segments but this is
3796 a phdr index and the first phdr may not be a load segment. */
3797 return (p != NULL) ? p - elf_tdata (output_bfd)->phdr : -1;
3798}
3799
3800static bfd_boolean
3801sh_elf_osec_readonly_p (bfd *output_bfd, asection *osec)
3802{
3803 unsigned seg = sh_elf_osec_to_segment (output_bfd, osec);
3804
3805 return ! (elf_tdata (output_bfd)->phdr[seg].p_flags & PF_W);
3806}
3807
3808/* Generate the initial contents of a local function descriptor, along
3809 with any relocations or fixups required. */
3810static bfd_boolean
3811sh_elf_initialize_funcdesc (bfd *output_bfd,
3812 struct bfd_link_info *info,
3813 struct elf_link_hash_entry *h,
3814 bfd_vma offset,
3815 asection *section,
3816 bfd_vma value)
3817{
3818 struct elf_sh_link_hash_table *htab;
3819 int dynindx;
3820 bfd_vma addr, seg;
3821
3822 htab = sh_elf_hash_table (info);
3823
3824 /* FIXME: The ABI says that the offset to the function goes in the
3825 descriptor, along with the segment index. We're RELA, so it could
3826 go in the reloc instead... */
3827
3828 if (h != NULL && SYMBOL_CALLS_LOCAL (info, h))
3829 {
3830 section = h->root.u.def.section;
3831 value = h->root.u.def.value;
3832 }
3833
3834 if (h == NULL || SYMBOL_CALLS_LOCAL (info, h))
3835 {
3836 dynindx = elf_section_data (section->output_section)->dynindx;
3837 addr = value + section->output_offset;
3838 seg = sh_elf_osec_to_segment (output_bfd, section->output_section);
3839 }
3840 else
3841 {
3842 BFD_ASSERT (h->dynindx != -1);
3843 dynindx = h->dynindx;
3844 addr = seg = 0;
3845 }
3846
3847 if (!info->shared && SYMBOL_CALLS_LOCAL (info, h))
3848 {
3849 if (h == NULL || h->root.type != bfd_link_hash_undefweak)
3850 {
3851 sh_elf_add_rofixup (output_bfd, htab->srofixup,
3852 offset
3853 + htab->sfuncdesc->output_section->vma
3854 + htab->sfuncdesc->output_offset);
3855 sh_elf_add_rofixup (output_bfd, htab->srofixup,
3856 offset + 4
3857 + htab->sfuncdesc->output_section->vma
3858 + htab->sfuncdesc->output_offset);
3859 }
3860
3861 /* There are no dynamic relocations so fill in the final
3862 address and gp value (barring fixups). */
3863 addr += section->output_section->vma;
3864 seg = htab->root.hgot->root.u.def.value
3865 + htab->root.hgot->root.u.def.section->output_section->vma
3866 + htab->root.hgot->root.u.def.section->output_offset;
3867 }
3868 else
3869 sh_elf_add_dyn_reloc (output_bfd, htab->srelfuncdesc,
3870 offset
3871 + htab->sfuncdesc->output_section->vma
3872 + htab->sfuncdesc->output_offset,
3873 R_SH_FUNCDESC_VALUE, dynindx, 0);
3874
3875 bfd_put_32 (output_bfd, addr, htab->sfuncdesc->contents + offset);
3876 bfd_put_32 (output_bfd, seg, htab->sfuncdesc->contents + offset + 4);
3877
3878 return TRUE;
3879}
3880
3881/* Install a 20-bit movi20 field starting at ADDR, which occurs in OUTPUT_BFD.
3882 VALUE is the field's value. Return bfd_reloc_ok if successful or an error
3883 otherwise. */
3884
3885static bfd_reloc_status_type
3886install_movi20_field (bfd *output_bfd, unsigned long relocation,
3887 bfd *input_bfd, asection *input_section,
3888 bfd_byte *contents, bfd_vma offset)
3889{
3890 unsigned long cur_val;
3891 bfd_byte *addr;
3892 bfd_reloc_status_type r;
3893
3894 if (offset > bfd_get_section_limit (input_bfd, input_section))
3895 return bfd_reloc_outofrange;
3896
3897 r = bfd_check_overflow (complain_overflow_signed, 20, 0,
3898 bfd_arch_bits_per_address (input_bfd), relocation);
3899 if (r != bfd_reloc_ok)
3900 return r;
3901
3902 addr = contents + offset;
3903 cur_val = bfd_get_16 (output_bfd, addr);
3904 bfd_put_16 (output_bfd, cur_val | ((relocation & 0xf0000) >> 12), addr);
3905 bfd_put_16 (output_bfd, relocation & 0xffff, addr + 2);
3906
3907 return bfd_reloc_ok;
3908}
3909
3910/* Relocate an SH ELF section. */
3911
3912static bfd_boolean
3913sh_elf_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
3914 bfd *input_bfd, asection *input_section,
3915 bfd_byte *contents, Elf_Internal_Rela *relocs,
3916 Elf_Internal_Sym *local_syms,
3917 asection **local_sections)
3918{
3919 struct elf_sh_link_hash_table *htab;
3920 Elf_Internal_Shdr *symtab_hdr;
3921 struct elf_link_hash_entry **sym_hashes;
3922 Elf_Internal_Rela *rel, *relend;
e0af1f53 3923 bfd *dynobj = NULL;
8e45593f 3924 bfd_vma *local_got_offsets;
e0af1f53
MR
3925 asection *sgot = NULL;
3926 asection *sgotplt = NULL;
3927 asection *splt = NULL;
3928 asection *sreloc = NULL;
3929 asection *srelgot = NULL;
8e45593f
NC
3930 bfd_boolean is_vxworks_tls;
3931 unsigned isec_segment, got_segment, plt_segment, check_segment[2];
e0af1f53 3932 bfd_boolean fdpic_p = FALSE;
8e45593f
NC
3933
3934 BFD_ASSERT (is_sh_elf (input_bfd));
3935
3936 htab = sh_elf_hash_table (info);
e0af1f53
MR
3937 if (htab != NULL)
3938 {
3939 dynobj = htab->root.dynobj;
3940 sgot = htab->sgot;
3941 sgotplt = htab->sgotplt;
3942 splt = htab->splt;
3943 fdpic_p = htab->fdpic_p;
3944 }
8e45593f
NC
3945 symtab_hdr = &elf_symtab_hdr (input_bfd);
3946 sym_hashes = elf_sym_hashes (input_bfd);
8e45593f
NC
3947 local_got_offsets = elf_local_got_offsets (input_bfd);
3948
3949 isec_segment = sh_elf_osec_to_segment (output_bfd,
3950 input_section->output_section);
e0af1f53 3951 if (fdpic_p && sgot)
8e45593f 3952 got_segment = sh_elf_osec_to_segment (output_bfd,
e0af1f53 3953 sgot->output_section);
8e45593f
NC
3954 else
3955 got_segment = -1;
e0af1f53 3956 if (fdpic_p && splt)
8e45593f 3957 plt_segment = sh_elf_osec_to_segment (output_bfd,
e0af1f53 3958 splt->output_section);
8e45593f
NC
3959 else
3960 plt_segment = -1;
3961
8e45593f
NC
3962 /* We have to handle relocations in vxworks .tls_vars sections
3963 specially, because the dynamic loader is 'weird'. */
e0af1f53 3964 is_vxworks_tls = (htab && htab->vxworks_p && info->shared
8e45593f
NC
3965 && !strcmp (input_section->output_section->name,
3966 ".tls_vars"));
3967
3968 rel = relocs;
3969 relend = relocs + input_section->reloc_count;
3970 for (; rel < relend; rel++)
3971 {
3972 int r_type;
3973 reloc_howto_type *howto;
3974 unsigned long r_symndx;
3975 Elf_Internal_Sym *sym;
3976 asection *sec;
3977 struct elf_link_hash_entry *h;
3978 bfd_vma relocation;
3979 bfd_vma addend = (bfd_vma) 0;
3980 bfd_reloc_status_type r;
3981 int seen_stt_datalabel = 0;
3982 bfd_vma off;
3983 int got_type;
3984 const char *symname = NULL;
3985
3986 r_symndx = ELF32_R_SYM (rel->r_info);
37c644f2 3987
37c644f2
AO
3988 r_type = ELF32_R_TYPE (rel->r_info);
3989
3990 /* Many of the relocs are only used for relaxing, and are
067653c5 3991 handled entirely by the relaxation code. */
d38eb334
DD
3992 if (r_type >= (int) R_SH_GNU_VTINHERIT
3993 && r_type <= (int) R_SH_LABEL)
37c644f2 3994 continue;
c5aeb40f
AO
3995 if (r_type == (int) R_SH_NONE)
3996 continue;
37c644f2
AO
3997
3998 if (r_type < 0
3999 || r_type >= R_SH_max
4000 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC
06bb75c1 4001 && r_type <= (int) R_SH_LAST_INVALID_RELOC)
8e45593f
NC
4002 || (r_type >= (int) R_SH_FIRST_INVALID_RELOC_2
4003 && r_type <= (int) R_SH_LAST_INVALID_RELOC_2)
fbca6ad9
AO
4004 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_3
4005 && r_type <= (int) R_SH_LAST_INVALID_RELOC_3)
4006 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_4
4007 && r_type <= (int) R_SH_LAST_INVALID_RELOC_4)
3376eaf5
KK
4008 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_5
4009 && r_type <= (int) R_SH_LAST_INVALID_RELOC_5)
8e45593f
NC
4010 || ( r_type >= (int) R_SH_FIRST_INVALID_RELOC_6
4011 && r_type <= (int) R_SH_LAST_INVALID_RELOC_6))
37c644f2
AO
4012 {
4013 bfd_set_error (bfd_error_bad_value);
b34976b6 4014 return FALSE;
37c644f2
AO
4015 }
4016
55e6e397 4017 howto = get_howto_table (output_bfd) + r_type;
37c644f2 4018
146be91a 4019 /* For relocs that aren't partial_inplace, we get the addend from
067653c5 4020 the relocation. */
146be91a
HPN
4021 if (! howto->partial_inplace)
4022 addend = rel->r_addend;
4023
37c644f2
AO
4024 h = NULL;
4025 sym = NULL;
4026 sec = NULL;
8e45593f
NC
4027 check_segment[0] = -1;
4028 check_segment[1] = -1;
37c644f2
AO
4029 if (r_symndx < symtab_hdr->sh_info)
4030 {
4031 sym = local_syms + r_symndx;
4032 sec = local_sections[r_symndx];
8e45593f
NC
4033
4034 symname = bfd_elf_string_from_elf_section
4035 (input_bfd, symtab_hdr->sh_link, sym->st_name);
4036 if (symname == NULL || *symname == '\0')
4037 symname = bfd_section_name (input_bfd, sec);
4038
37c644f2
AO
4039 relocation = (sec->output_section->vma
4040 + sec->output_offset
4041 + sym->st_value);
fbca6ad9
AO
4042 /* A local symbol never has STO_SH5_ISA32, so we don't need
4043 datalabel processing here. Make sure this does not change
4044 without notice. */
4045 if ((sym->st_other & STO_SH5_ISA32) != 0)
4046 ((*info->callbacks->reloc_dangerous)
4047 (info,
4048 _("Unexpected STO_SH5_ISA32 on local symbol is not handled"),
4049 input_bfd, input_section, rel->r_offset));
ab96bf03
AM
4050
4051 if (sec != NULL && elf_discarded_section (sec))
4052 /* Handled below. */
4053 ;
4054 else if (info->relocatable)
8a3975e6 4055 {
1049f94e 4056 /* This is a relocatable link. We don't have to change
8a3975e6
AO
4057 anything, unless the reloc is against a section symbol,
4058 in which case we have to adjust according to where the
4059 section symbol winds up in the output section. */
8a3975e6 4060 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
146be91a
HPN
4061 {
4062 if (! howto->partial_inplace)
4063 {
4064 /* For relocations with the addend in the
4065 relocation, we need just to update the addend.
4066 All real relocs are of type partial_inplace; this
4067 code is mostly for completeness. */
ab96bf03 4068 rel->r_addend += sec->output_offset;
146be91a
HPN
4069
4070 continue;
4071 }
4072
4073 /* Relocs of type partial_inplace need to pick up the
4074 contents in the contents and add the offset resulting
4075 from the changed location of the section symbol.
4076 Using _bfd_final_link_relocate (e.g. goto
4077 final_link_relocate) here would be wrong, because
4078 relocations marked pc_relative would get the current
4079 location subtracted, and we must only do that at the
4080 final link. */
4081 r = _bfd_relocate_contents (howto, input_bfd,
4082 sec->output_offset
4083 + sym->st_value,
4084 contents + rel->r_offset);
4085 goto relocation_done;
4086 }
8a3975e6
AO
4087
4088 continue;
4089 }
f8df10f4
JJ
4090 else if (! howto->partial_inplace)
4091 {
8517fae7 4092 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
f8df10f4
JJ
4093 addend = rel->r_addend;
4094 }
4095 else if ((sec->flags & SEC_MERGE)
4096 && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4097 {
4098 asection *msec;
4099
4100 if (howto->rightshift || howto->src_mask != 0xffffffff)
4101 {
4102 (*_bfd_error_handler)
d003868e
AM
4103 (_("%B(%A+0x%lx): %s relocation against SEC_MERGE section"),
4104 input_bfd, input_section,
f8df10f4 4105 (long) rel->r_offset, howto->name);
b34976b6 4106 return FALSE;
f8df10f4
JJ
4107 }
4108
067653c5
AM
4109 addend = bfd_get_32 (input_bfd, contents + rel->r_offset);
4110 msec = sec;
4111 addend =
c629eae0 4112 _bfd_elf_rel_local_sym (output_bfd, sym, &msec, addend)
f8df10f4
JJ
4113 - relocation;
4114 addend += msec->output_section->vma + msec->output_offset;
4115 bfd_put_32 (input_bfd, addend, contents + rel->r_offset);
4116 addend = 0;
4117 }
37c644f2
AO
4118 }
4119 else
4120 {
560e09e9
NC
4121 /* FIXME: Ought to make use of the RELOC_FOR_GLOBAL_SYMBOL macro. */
4122
ab96bf03 4123 relocation = 0;
37c644f2 4124 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
8e45593f 4125 symname = h->root.root.string;
37c644f2
AO
4126 while (h->root.type == bfd_link_hash_indirect
4127 || h->root.type == bfd_link_hash_warning)
fbca6ad9
AO
4128 {
4129#ifdef INCLUDE_SHMEDIA
4130 /* If the reference passes a symbol marked with
4131 STT_DATALABEL, then any STO_SH5_ISA32 on the final value
4132 doesn't count. */
4133 seen_stt_datalabel |= h->type == STT_DATALABEL;
4134#endif
4135 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4136 }
37c644f2
AO
4137 if (h->root.type == bfd_link_hash_defined
4138 || h->root.type == bfd_link_hash_defweak)
4139 {
b34976b6 4140 bfd_boolean dyn;
067653c5 4141
e0af1f53 4142 dyn = htab ? htab->root.dynamic_sections_created : FALSE;
37c644f2
AO
4143 sec = h->root.u.def.section;
4144 /* In these cases, we don't need the relocation value.
4145 We check specially because in some obscure cases
435b1e90 4146 sec->output_section will be NULL. */
37c644f2 4147 if (r_type == R_SH_GOTPC
fbca6ad9
AO
4148 || r_type == R_SH_GOTPC_LOW16
4149 || r_type == R_SH_GOTPC_MEDLOW16
4150 || r_type == R_SH_GOTPC_MEDHI16
4151 || r_type == R_SH_GOTPC_HI16
4152 || ((r_type == R_SH_PLT32
4153 || r_type == R_SH_PLT_LOW16
4154 || r_type == R_SH_PLT_MEDLOW16
4155 || r_type == R_SH_PLT_MEDHI16
4156 || r_type == R_SH_PLT_HI16)
37c644f2 4157 && h->plt.offset != (bfd_vma) -1)
fbca6ad9 4158 || ((r_type == R_SH_GOT32
8e45593f
NC
4159 || r_type == R_SH_GOT20
4160 || r_type == R_SH_GOTFUNCDESC
4161 || r_type == R_SH_GOTFUNCDESC20
4162 || r_type == R_SH_GOTOFFFUNCDESC
4163 || r_type == R_SH_GOTOFFFUNCDESC20
4164 || r_type == R_SH_FUNCDESC
fbca6ad9
AO
4165 || r_type == R_SH_GOT_LOW16
4166 || r_type == R_SH_GOT_MEDLOW16
4167 || r_type == R_SH_GOT_MEDHI16
4168 || r_type == R_SH_GOT_HI16)
267fb3c1 4169 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
37c644f2
AO
4170 && (! info->shared
4171 || (! info->symbolic && h->dynindx != -1)
f5385ebf 4172 || !h->def_regular))
37c644f2
AO
4173 /* The cases above are those in which relocation is
4174 overwritten in the switch block below. The cases
4175 below are those in which we must defer relocation
4176 to run-time, because we can't resolve absolute
4177 addresses when creating a shared library. */
4178 || (info->shared
4179 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 4180 || !h->def_regular)
37c644f2 4181 && ((r_type == R_SH_DIR32
f5385ebf 4182 && !h->forced_local)
f50ad433
KK
4183 || (r_type == R_SH_REL32
4184 && !SYMBOL_CALLS_LOCAL (info, h)))
37c644f2
AO
4185 && ((input_section->flags & SEC_ALLOC) != 0
4186 /* DWARF will emit R_SH_DIR32 relocations in its
4187 sections against symbols defined externally
4188 in shared libraries. We can't do anything
4189 with them here. */
067653c5 4190 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 4191 && h->def_dynamic)))
1448fa32
KK
4192 /* Dynamic relocs are not propagated for SEC_DEBUGGING
4193 sections because such sections are not SEC_ALLOC and
4194 thus ld.so will not process them. */
4195 || (sec->output_section == NULL
4196 && ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 4197 && h->def_dynamic))
3376eaf5 4198 || (sec->output_section == NULL
8e45593f
NC
4199 && (sh_elf_hash_entry (h)->got_type == GOT_TLS_IE
4200 || sh_elf_hash_entry (h)->got_type == GOT_TLS_GD)))
ab96bf03
AM
4201 ;
4202 else if (sec->output_section != NULL)
4203 relocation = ((h->root.u.def.value
4204 + sec->output_section->vma
4205 + sec->output_offset)
4206 /* A STO_SH5_ISA32 causes a "bitor 1" to the
4207 symbol value, unless we've seen
4208 STT_DATALABEL on the way to it. */
4209 | ((h->other & STO_SH5_ISA32) != 0
4210 && ! seen_stt_datalabel));
4211 else if (!info->relocatable)
37c644f2
AO
4212 {
4213 (*_bfd_error_handler)
843fe662
L
4214 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
4215 input_bfd,
4216 input_section,
4217 (long) rel->r_offset,
4218 howto->name,
4219 h->root.root.string);
b34976b6 4220 return FALSE;
37c644f2 4221 }
37c644f2
AO
4222 }
4223 else if (h->root.type == bfd_link_hash_undefweak)
ab96bf03 4224 ;
59c2e50f 4225 else if (info->unresolved_syms_in_objects == RM_IGNORE
067653c5 4226 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
ab96bf03
AM
4227 ;
4228 else if (!info->relocatable)
37c644f2 4229 {
560e09e9
NC
4230 if (! info->callbacks->undefined_symbol
4231 (info, h->root.root.string, input_bfd,
4232 input_section, rel->r_offset,
59c2e50f 4233 (info->unresolved_syms_in_objects == RM_GENERATE_ERROR
560e09e9 4234 || ELF_ST_VISIBILITY (h->other))))
b34976b6 4235 return FALSE;
37c644f2
AO
4236 }
4237 }
4238
ab96bf03 4239 if (sec != NULL && elf_discarded_section (sec))
e4067dbb
DJ
4240 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
4241 rel, relend, howto, contents);
ab96bf03
AM
4242
4243 if (info->relocatable)
4244 continue;
4245
8e45593f
NC
4246 /* Check for inter-segment relocations in FDPIC files. Most
4247 relocations connect the relocation site to the location of
4248 the target symbol, but there are some exceptions below. */
4249 check_segment[0] = isec_segment;
4250 if (sec != NULL)
4251 check_segment[1] = sh_elf_osec_to_segment (output_bfd,
4252 sec->output_section);
4253 else
4254 check_segment[1] = -1;
4255
435b1e90 4256 switch ((int) r_type)
37c644f2
AO
4257 {
4258 final_link_relocate:
4259 /* COFF relocs don't use the addend. The addend is used for
435b1e90 4260 R_SH_DIR32 to be compatible with other compilers. */
37c644f2
AO
4261 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
4262 contents, rel->r_offset,
4263 relocation, addend);
4264 break;
4265
4266 case R_SH_IND12W:
cd6ec716
DD
4267 goto final_link_relocate;
4268
37c644f2
AO
4269 case R_SH_DIR8WPN:
4270 case R_SH_DIR8WPZ:
4271 case R_SH_DIR8WPL:
cd6ec716
DD
4272 /* If the reloc is against the start of this section, then
4273 the assembler has already taken care of it and the reloc
4274 is here only to assist in relaxing. If the reloc is not
4275 against the start of this section, then it's against an
4276 external symbol and we must deal with it ourselves. */
4277 if (input_section->output_section->vma + input_section->output_offset
4278 != relocation)
4279 {
4280 int disp = (relocation
4281 - input_section->output_section->vma
4282 - input_section->output_offset
4283 - rel->r_offset);
4284 int mask = 0;
4285 switch (r_type)
4286 {
4287 case R_SH_DIR8WPN:
4288 case R_SH_DIR8WPZ: mask = 1; break;
4289 case R_SH_DIR8WPL: mask = 3; break;
4290 default: mask = 0; break;
4291 }
4292 if (disp & mask)
4293 {
4294 ((*_bfd_error_handler)
d003868e
AM
4295 (_("%B: 0x%lx: fatal: unaligned branch target for relax-support relocation"),
4296 input_section->owner,
cd6ec716
DD
4297 (unsigned long) rel->r_offset));
4298 bfd_set_error (bfd_error_bad_value);
b34976b6 4299 return FALSE;
cd6ec716
DD
4300 }
4301 relocation -= 4;
4302 goto final_link_relocate;
4303 }
4304 r = bfd_reloc_ok;
4305 break;
37c644f2
AO
4306
4307 default:
fbca6ad9
AO
4308#ifdef INCLUDE_SHMEDIA
4309 if (shmedia_prepare_reloc (info, input_bfd, input_section,
4310 contents, rel, &relocation))
4311 goto final_link_relocate;
4312#endif
37c644f2 4313 bfd_set_error (bfd_error_bad_value);
b34976b6 4314 return FALSE;
37c644f2 4315
d38eb334
DD
4316 case R_SH_DIR16:
4317 case R_SH_DIR8:
4318 case R_SH_DIR8U:
4319 case R_SH_DIR8S:
4320 case R_SH_DIR4U:
4321 goto final_link_relocate;
4322
4323 case R_SH_DIR8UL:
4324 case R_SH_DIR4UL:
4325 if (relocation & 3)
4326 {
4327 ((*_bfd_error_handler)
d003868e
AM
4328 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4329 input_section->owner,
d38eb334 4330 (unsigned long) rel->r_offset, howto->name,
d003868e 4331 (unsigned long) relocation));
d38eb334
DD
4332 bfd_set_error (bfd_error_bad_value);
4333 return FALSE;
4334 }
4335 goto final_link_relocate;
4336
4337 case R_SH_DIR8UW:
4338 case R_SH_DIR8SW:
4339 case R_SH_DIR4UW:
4340 if (relocation & 1)
4341 {
4342 ((*_bfd_error_handler)
d003868e
AM
4343 (_("%B: 0x%lx: fatal: unaligned %s relocation 0x%lx"),
4344 input_section->owner,
d38eb334 4345 (unsigned long) rel->r_offset, howto->name,
d003868e 4346 (unsigned long) relocation));
d38eb334
DD
4347 bfd_set_error (bfd_error_bad_value);
4348 return FALSE;
4349 }
4350 goto final_link_relocate;
4351
4352 case R_SH_PSHA:
4353 if ((signed int)relocation < -32
4354 || (signed int)relocation > 32)
4355 {
4356 ((*_bfd_error_handler)
d003868e
AM
4357 (_("%B: 0x%lx: fatal: R_SH_PSHA relocation %d not in range -32..32"),
4358 input_section->owner,
d38eb334 4359 (unsigned long) rel->r_offset,
d003868e 4360 (unsigned long) relocation));
d38eb334
DD
4361 bfd_set_error (bfd_error_bad_value);
4362 return FALSE;
4363 }
4364 goto final_link_relocate;
4365
4366 case R_SH_PSHL:
4367 if ((signed int)relocation < -16
4368 || (signed int)relocation > 16)
4369 {
4370 ((*_bfd_error_handler)
d003868e
AM
4371 (_("%B: 0x%lx: fatal: R_SH_PSHL relocation %d not in range -32..32"),
4372 input_section->owner,
d38eb334 4373 (unsigned long) rel->r_offset,
d003868e 4374 (unsigned long) relocation));
d38eb334
DD
4375 bfd_set_error (bfd_error_bad_value);
4376 return FALSE;
4377 }
4378 goto final_link_relocate;
4379
37c644f2
AO
4380 case R_SH_DIR32:
4381 case R_SH_REL32:
46e993b9
KK
4382#ifdef INCLUDE_SHMEDIA
4383 case R_SH_IMM_LOW16_PCREL:
4384 case R_SH_IMM_MEDLOW16_PCREL:
4385 case R_SH_IMM_MEDHI16_PCREL:
4386 case R_SH_IMM_HI16_PCREL:
4387#endif
37c644f2 4388 if (info->shared
04e534c3
KK
4389 && (h == NULL
4390 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4391 || h->root.type != bfd_link_hash_undefweak)
cf35638d 4392 && r_symndx != STN_UNDEF
37c644f2 4393 && (input_section->flags & SEC_ALLOC) != 0
3348747a 4394 && !is_vxworks_tls
46e993b9 4395 && (r_type == R_SH_DIR32
3d85aebe 4396 || !SYMBOL_CALLS_LOCAL (info, h)))
37c644f2
AO
4397 {
4398 Elf_Internal_Rela outrel;
947216bf 4399 bfd_byte *loc;
b34976b6 4400 bfd_boolean skip, relocate;
37c644f2
AO
4401
4402 /* When generating a shared object, these relocations
4403 are copied into the output file to be resolved at run
4404 time. */
4405
4406 if (sreloc == NULL)
4407 {
83bac4b0
NC
4408 sreloc = _bfd_elf_get_dynamic_reloc_section
4409 (input_bfd, input_section, /*rela?*/ TRUE);
4410 if (sreloc == NULL)
b34976b6 4411 return FALSE;
37c644f2
AO
4412 }
4413
b34976b6
AM
4414 skip = FALSE;
4415 relocate = FALSE;
37c644f2 4416
c629eae0
JJ
4417 outrel.r_offset =
4418 _bfd_elf_section_offset (output_bfd, info, input_section,
4419 rel->r_offset);
4420 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 4421 skip = TRUE;
0bb2d96a 4422 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 4423 skip = TRUE, relocate = TRUE;
37c644f2
AO
4424 outrel.r_offset += (input_section->output_section->vma
4425 + input_section->output_offset);
4426
4427 if (skip)
0bb2d96a 4428 memset (&outrel, 0, sizeof outrel);
37c644f2
AO
4429 else if (r_type == R_SH_REL32)
4430 {
4431 BFD_ASSERT (h != NULL && h->dynindx != -1);
37c644f2 4432 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_REL32);
146be91a 4433 outrel.r_addend
55e6e397
RS
4434 = (howto->partial_inplace
4435 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4436 : addend);
37c644f2 4437 }
46e993b9
KK
4438#ifdef INCLUDE_SHMEDIA
4439 else if (r_type == R_SH_IMM_LOW16_PCREL
4440 || r_type == R_SH_IMM_MEDLOW16_PCREL
4441 || r_type == R_SH_IMM_MEDHI16_PCREL
4442 || r_type == R_SH_IMM_HI16_PCREL)
4443 {
4444 BFD_ASSERT (h != NULL && h->dynindx != -1);
4445 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
4446 outrel.r_addend = addend;
4447 }
4448#endif
e0af1f53 4449 else if (fdpic_p
8e45593f
NC
4450 && (h == NULL
4451 || ((info->symbolic || h->dynindx == -1)
4452 && h->def_regular)))
4453 {
4454 int dynindx;
4455
4456 BFD_ASSERT (sec != NULL);
4457 BFD_ASSERT (sec->output_section != NULL);
4458 dynindx = elf_section_data (sec->output_section)->dynindx;
4459 outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4460 outrel.r_addend = relocation;
4461 outrel.r_addend
4462 += (howto->partial_inplace
4463 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4464 : addend);
4465 outrel.r_addend -= sec->output_section->vma;
4466 }
37c644f2
AO
4467 else
4468 {
4469 /* h->dynindx may be -1 if this symbol was marked to
4470 become local. */
4471 if (h == NULL
4472 || ((info->symbolic || h->dynindx == -1)
f5385ebf 4473 && h->def_regular))
37c644f2 4474 {
55e6e397 4475 relocate = howto->partial_inplace;
37c644f2 4476 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
37c644f2
AO
4477 }
4478 else
4479 {
4480 BFD_ASSERT (h->dynindx != -1);
37c644f2 4481 outrel.r_info = ELF32_R_INFO (h->dynindx, R_SH_DIR32);
37c644f2 4482 }
55e6e397
RS
4483 outrel.r_addend = relocation;
4484 outrel.r_addend
4485 += (howto->partial_inplace
4486 ? bfd_get_32 (input_bfd, contents + rel->r_offset)
4487 : addend);
37c644f2
AO
4488 }
4489
947216bf
AM
4490 loc = sreloc->contents;
4491 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
4492 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
37c644f2 4493
8e45593f
NC
4494 check_segment[0] = check_segment[1] = -1;
4495
37c644f2
AO
4496 /* If this reloc is against an external symbol, we do
4497 not want to fiddle with the addend. Otherwise, we
4498 need to include the symbol value so that it becomes
4499 an addend for the dynamic reloc. */
4500 if (! relocate)
4501 continue;
4502 }
e0af1f53 4503 else if (fdpic_p && !info->shared
8e45593f
NC
4504 && r_type == R_SH_DIR32
4505 && (input_section->flags & SEC_ALLOC) != 0)
4506 {
4507 bfd_vma offset;
4508
e0af1f53
MR
4509 BFD_ASSERT (htab);
4510
8e45593f
NC
4511 if (sh_elf_osec_readonly_p (output_bfd,
4512 input_section->output_section))
4513 {
4514 (*_bfd_error_handler)
4515 (_("%B(%A+0x%lx): cannot emit fixup to `%s' in read-only section"),
4516 input_bfd,
4517 input_section,
4518 (long) rel->r_offset,
4519 symname);
4520 return FALSE;
4521 }
4522
4523 offset = _bfd_elf_section_offset (output_bfd, info,
4524 input_section, rel->r_offset);
4525 if (offset != (bfd_vma)-1)
4526 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4527 input_section->output_section->vma
4528 + input_section->output_offset
4529 + rel->r_offset);
4530
4531 check_segment[0] = check_segment[1] = -1;
4532 }
37c644f2
AO
4533 goto final_link_relocate;
4534
fbca6ad9
AO
4535 case R_SH_GOTPLT32:
4536#ifdef INCLUDE_SHMEDIA
4537 case R_SH_GOTPLT_LOW16:
4538 case R_SH_GOTPLT_MEDLOW16:
4539 case R_SH_GOTPLT_MEDHI16:
4540 case R_SH_GOTPLT_HI16:
4541 case R_SH_GOTPLT10BY4:
4542 case R_SH_GOTPLT10BY8:
4543#endif
4544 /* Relocation is to the entry for this symbol in the
4545 procedure linkage table. */
4546
4547 if (h == NULL
f5385ebf 4548 || h->forced_local
fbca6ad9
AO
4549 || ! info->shared
4550 || info->symbolic
4551 || h->dynindx == -1
4552 || h->plt.offset == (bfd_vma) -1
4553 || h->got.offset != (bfd_vma) -1)
4554 goto force_got;
4555
4556 /* Relocation is to the entry for this symbol in the global
4557 offset table extension for the procedure linkage table. */
fbca6ad9 4558
e0af1f53 4559 BFD_ASSERT (htab);
067653c5 4560 BFD_ASSERT (sgotplt != NULL);
fbca6ad9 4561 relocation = (sgotplt->output_offset
55e6e397
RS
4562 + (get_plt_index (htab->plt_info, h->plt.offset)
4563 + 3) * 4);
fbca6ad9
AO
4564
4565#ifdef GOT_BIAS
4566 relocation -= GOT_BIAS;
4567#endif
4568
4569 goto final_link_relocate;
4570
4571 force_got:
37c644f2 4572 case R_SH_GOT32:
8e45593f 4573 case R_SH_GOT20:
fbca6ad9
AO
4574#ifdef INCLUDE_SHMEDIA
4575 case R_SH_GOT_LOW16:
4576 case R_SH_GOT_MEDLOW16:
4577 case R_SH_GOT_MEDHI16:
4578 case R_SH_GOT_HI16:
4579 case R_SH_GOT10BY4:
4580 case R_SH_GOT10BY8:
4581#endif
37c644f2
AO
4582 /* Relocation is to the entry for this symbol in the global
4583 offset table. */
067653c5 4584
e0af1f53 4585 BFD_ASSERT (htab);
067653c5 4586 BFD_ASSERT (sgot != NULL);
8e45593f 4587 check_segment[0] = check_segment[1] = -1;
37c644f2
AO
4588
4589 if (h != NULL)
4590 {
b34976b6 4591 bfd_boolean dyn;
37c644f2
AO
4592
4593 off = h->got.offset;
fbca6ad9
AO
4594#ifdef INCLUDE_SHMEDIA
4595 if (seen_stt_datalabel)
4596 {
4597 struct elf_sh_link_hash_entry *hsh;
4598
4599 hsh = (struct elf_sh_link_hash_entry *)h;
396a6083 4600 off = hsh->datalabel_got.offset;
fbca6ad9
AO
4601 }
4602#endif
37c644f2
AO
4603 BFD_ASSERT (off != (bfd_vma) -1);
4604
067653c5 4605 dyn = htab->root.dynamic_sections_created;
267fb3c1 4606 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
37c644f2 4607 || (info->shared
3d85aebe 4608 && SYMBOL_REFERENCES_LOCAL (info, h))
04e534c3
KK
4609 || (ELF_ST_VISIBILITY (h->other)
4610 && h->root.type == bfd_link_hash_undefweak))
37c644f2
AO
4611 {
4612 /* This is actually a static link, or it is a
4613 -Bsymbolic link and the symbol is defined
4614 locally, or the symbol was forced to be local
4615 because of a version file. We must initialize
4616 this entry in the global offset table. Since the
4617 offset must always be a multiple of 4, we use the
4618 least significant bit to record whether we have
4619 initialized it already.
4620
4621 When doing a dynamic link, we create a .rela.got
4622 relocation entry to initialize the value. This
4623 is done in the finish_dynamic_symbol routine. */
4624 if ((off & 1) != 0)
4625 off &= ~1;
4626 else
4627 {
4628 bfd_put_32 (output_bfd, relocation,
4629 sgot->contents + off);
fbca6ad9
AO
4630#ifdef INCLUDE_SHMEDIA
4631 if (seen_stt_datalabel)
4632 {
4633 struct elf_sh_link_hash_entry *hsh;
4634
4635 hsh = (struct elf_sh_link_hash_entry *)h;
396a6083 4636 hsh->datalabel_got.offset |= 1;
fbca6ad9
AO
4637 }
4638 else
4639#endif
4640 h->got.offset |= 1;
8e45593f
NC
4641
4642 /* If we initialize the GOT entry here with a valid
4643 symbol address, also add a fixup. */
e0af1f53 4644 if (fdpic_p && !info->shared
8e45593f
NC
4645 && sh_elf_hash_entry (h)->got_type == GOT_NORMAL
4646 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4647 || h->root.type != bfd_link_hash_undefweak))
4648 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4649 sgot->output_section->vma
4650 + sgot->output_offset
4651 + off);
37c644f2
AO
4652 }
4653 }
4654
8e45593f 4655 relocation = sh_elf_got_offset (htab) + off;
37c644f2
AO
4656 }
4657 else
4658 {
fbca6ad9
AO
4659#ifdef INCLUDE_SHMEDIA
4660 if (rel->r_addend)
4661 {
4662 BFD_ASSERT (local_got_offsets != NULL
4663 && (local_got_offsets[symtab_hdr->sh_info
4664 + r_symndx]
4665 != (bfd_vma) -1));
4666
4667 off = local_got_offsets[symtab_hdr->sh_info
4668 + r_symndx];
4669 }
4670 else
4671 {
4672#endif
37c644f2
AO
4673 BFD_ASSERT (local_got_offsets != NULL
4674 && local_got_offsets[r_symndx] != (bfd_vma) -1);
4675
4676 off = local_got_offsets[r_symndx];
fbca6ad9
AO
4677#ifdef INCLUDE_SHMEDIA
4678 }
4679#endif
37c644f2
AO
4680
4681 /* The offset must always be a multiple of 4. We use
4682 the least significant bit to record whether we have
4683 already generated the necessary reloc. */
4684 if ((off & 1) != 0)
4685 off &= ~1;
4686 else
4687 {
4688 bfd_put_32 (output_bfd, relocation, sgot->contents + off);
4689
4690 if (info->shared)
4691 {
37c644f2 4692 Elf_Internal_Rela outrel;
947216bf 4693 bfd_byte *loc;
37c644f2 4694
3376eaf5
KK
4695 if (srelgot == NULL)
4696 {
4697 srelgot = bfd_get_section_by_name (dynobj,
4698 ".rela.got");
4699 BFD_ASSERT (srelgot != NULL);
4700 }
37c644f2
AO
4701
4702 outrel.r_offset = (sgot->output_section->vma
4703 + sgot->output_offset
4704 + off);
e0af1f53 4705 if (fdpic_p)
8e45593f
NC
4706 {
4707 int dynindx
4708 = elf_section_data (sec->output_section)->dynindx;
4709 outrel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
4710 outrel.r_addend = relocation;
4711 outrel.r_addend -= sec->output_section->vma;
4712 }
4713 else
4714 {
4715 outrel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
4716 outrel.r_addend = relocation;
4717 }
947216bf
AM
4718 loc = srelgot->contents;
4719 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4720 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
37c644f2 4721 }
e0af1f53 4722 else if (fdpic_p
8e45593f
NC
4723 && (sh_elf_local_got_type (input_bfd) [r_symndx]
4724 == GOT_NORMAL))
4725 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4726 sgot->output_section->vma
4727 + sgot->output_offset
4728 + off);
37c644f2 4729
fbca6ad9
AO
4730#ifdef INCLUDE_SHMEDIA
4731 if (rel->r_addend)
4732 local_got_offsets[symtab_hdr->sh_info + r_symndx] |= 1;
4733 else
4734#endif
4735 local_got_offsets[r_symndx] |= 1;
37c644f2
AO
4736 }
4737
8e45593f 4738 relocation = sh_elf_got_offset (htab) + off;
37c644f2
AO
4739 }
4740
fbca6ad9 4741#ifdef GOT_BIAS
067653c5 4742 relocation -= GOT_BIAS;
fbca6ad9
AO
4743#endif
4744
8e45593f
NC
4745 if (r_type == R_SH_GOT20)
4746 {
4747 r = install_movi20_field (output_bfd, relocation + addend,
4748 input_bfd, input_section, contents,
4749 rel->r_offset);
4750 break;
4751 }
4752 else
4753 goto final_link_relocate;
37c644f2
AO
4754
4755 case R_SH_GOTOFF:
8e45593f 4756 case R_SH_GOTOFF20:
fbca6ad9
AO
4757#ifdef INCLUDE_SHMEDIA
4758 case R_SH_GOTOFF_LOW16:
4759 case R_SH_GOTOFF_MEDLOW16:
4760 case R_SH_GOTOFF_MEDHI16:
4761 case R_SH_GOTOFF_HI16:
4762#endif
8e45593f
NC
4763 /* GOTOFF relocations are relative to _GLOBAL_OFFSET_TABLE_, which
4764 we place at the start of the .got.plt section. This is the same
4765 as the start of the output .got section, unless there are function
4766 descriptors in front of it. */
e0af1f53 4767 BFD_ASSERT (htab);
8e45593f
NC
4768 BFD_ASSERT (sgotplt != NULL);
4769 check_segment[0] = got_segment;
4770 relocation -= sgotplt->output_section->vma + sgotplt->output_offset
4771 + htab->root.hgot->root.u.def.value;
37c644f2 4772
fbca6ad9
AO
4773#ifdef GOT_BIAS
4774 relocation -= GOT_BIAS;
4775#endif
4776
4777 addend = rel->r_addend;
4778
8e45593f
NC
4779 if (r_type == R_SH_GOTOFF20)
4780 {
4781 r = install_movi20_field (output_bfd, relocation + addend,
4782 input_bfd, input_section, contents,
4783 rel->r_offset);
4784 break;
4785 }
4786 else
4787 goto final_link_relocate;
37c644f2
AO
4788
4789 case R_SH_GOTPC:
fbca6ad9
AO
4790#ifdef INCLUDE_SHMEDIA
4791 case R_SH_GOTPC_LOW16:
4792 case R_SH_GOTPC_MEDLOW16:
4793 case R_SH_GOTPC_MEDHI16:
4794 case R_SH_GOTPC_HI16:
4795#endif
37c644f2
AO
4796 /* Use global offset table as symbol value. */
4797
8e45593f
NC
4798 BFD_ASSERT (sgotplt != NULL);
4799 relocation = sgotplt->output_section->vma + sgotplt->output_offset;
37c644f2 4800
fbca6ad9
AO
4801#ifdef GOT_BIAS
4802 relocation += GOT_BIAS;
4803#endif
4804
4805 addend = rel->r_addend;
4806
37c644f2
AO
4807 goto final_link_relocate;
4808
4809 case R_SH_PLT32:
fbca6ad9
AO
4810#ifdef INCLUDE_SHMEDIA
4811 case R_SH_PLT_LOW16:
4812 case R_SH_PLT_MEDLOW16:
4813 case R_SH_PLT_MEDHI16:
4814 case R_SH_PLT_HI16:
4815#endif
37c644f2
AO
4816 /* Relocation is to the entry for this symbol in the
4817 procedure linkage table. */
4818
4819 /* Resolve a PLT reloc against a local symbol directly,
4820 without using the procedure linkage table. */
4821 if (h == NULL)
4822 goto final_link_relocate;
4823
8e45593f
NC
4824 /* We don't want to warn on calls to undefined weak symbols,
4825 as calls to them must be protected by non-NULL tests
4826 anyway, and unprotected calls would invoke undefined
4827 behavior. */
4828 if (h->root.type == bfd_link_hash_undefweak)
4829 check_segment[0] = check_segment[1] = -1;
4830
f5385ebf 4831 if (h->forced_local)
37c644f2
AO
4832 goto final_link_relocate;
4833
4834 if (h->plt.offset == (bfd_vma) -1)
4835 {
4836 /* We didn't make a PLT entry for this symbol. This
4837 happens when statically linking PIC code, or when
4838 using -Bsymbolic. */
4839 goto final_link_relocate;
4840 }
4841
067653c5 4842 BFD_ASSERT (splt != NULL);
8e45593f 4843 check_segment[1] = plt_segment;
37c644f2
AO
4844 relocation = (splt->output_section->vma
4845 + splt->output_offset
4846 + h->plt.offset);
4847
fbca6ad9
AO
4848#ifdef INCLUDE_SHMEDIA
4849 relocation++;
4850#endif
4851
4852 addend = rel->r_addend;
4853
37c644f2
AO
4854 goto final_link_relocate;
4855
8e45593f
NC
4856 /* Relocation is to the canonical function descriptor for this
4857 symbol, possibly via the GOT. Initialize the GOT
4858 entry and function descriptor if necessary. */
4859 case R_SH_GOTFUNCDESC:
4860 case R_SH_GOTFUNCDESC20:
4861 case R_SH_FUNCDESC:
4862 {
4863 int dynindx = -1;
4864 asection *reloc_section;
4865 bfd_vma reloc_offset;
4866 int reloc_type = R_SH_FUNCDESC;
4867
e0af1f53
MR
4868 BFD_ASSERT (htab);
4869
8e45593f
NC
4870 check_segment[0] = check_segment[1] = -1;
4871
4872 /* FIXME: See what FRV does for global symbols in the
4873 executable, with --export-dynamic. Do they need ld.so
4874 to allocate official descriptors? See what this code
4875 does. */
4876
4877 relocation = 0;
4878 addend = 0;
4879
4880 if (r_type == R_SH_FUNCDESC)
4881 {
4882 reloc_section = input_section;
4883 reloc_offset = rel->r_offset;
4884 }
4885 else
4886 {
e0af1f53 4887 reloc_section = sgot;
8e45593f
NC
4888
4889 if (h != NULL)
4890 reloc_offset = h->got.offset;
4891 else
4892 {
4893 BFD_ASSERT (local_got_offsets != NULL);
4894 reloc_offset = local_got_offsets[r_symndx];
4895 }
4896 BFD_ASSERT (reloc_offset != MINUS_ONE);
4897
4898 if (reloc_offset & 1)
4899 {
4900 reloc_offset &= ~1;
4901 goto funcdesc_done_got;
4902 }
4903 }
4904
4905 if (h && h->root.type == bfd_link_hash_undefweak
4906 && (SYMBOL_CALLS_LOCAL (info, h)
4907 || !htab->root.dynamic_sections_created))
4908 /* Undefined weak symbol which will not be dynamically
4909 resolved later; leave it at zero. */
4910 goto funcdesc_leave_zero;
4911 else if (SYMBOL_CALLS_LOCAL (info, h)
4912 && ! SYMBOL_FUNCDESC_LOCAL (info, h))
4913 {
4914 /* If the symbol needs a non-local function descriptor
4915 but binds locally (i.e., its visibility is
4916 protected), emit a dynamic relocation decayed to
4917 section+offset. This is an optimization; the dynamic
4918 linker would resolve our function descriptor request
4919 to our copy of the function anyway. */
4920 dynindx = elf_section_data (h->root.u.def.section
4921 ->output_section)->dynindx;
4922 relocation += h->root.u.def.section->output_offset
4923 + h->root.u.def.value;
4924 }
4925 else if (! SYMBOL_FUNCDESC_LOCAL (info, h))
4926 {
4927 /* If the symbol is dynamic and there will be dynamic
4928 symbol resolution because we are or are linked with a
4929 shared library, emit a FUNCDESC relocation such that
4930 the dynamic linker will allocate the function
4931 descriptor. */
4932 BFD_ASSERT (h->dynindx != -1);
4933 dynindx = h->dynindx;
4934 }
4935 else
4936 {
4937 bfd_vma offset;
4938
4939 /* Otherwise, we know we have a private function
4940 descriptor, so reference it directly. */
4941 reloc_type = R_SH_DIR32;
4942 dynindx = elf_section_data (htab->sfuncdesc
4943 ->output_section)->dynindx;
4944
4945 if (h)
4946 {
4947 offset = sh_elf_hash_entry (h)->funcdesc.offset;
4948 BFD_ASSERT (offset != MINUS_ONE);
4949 if ((offset & 1) == 0)
4950 {
4951 if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
4952 offset, NULL, 0))
4953 return FALSE;
4954 sh_elf_hash_entry (h)->funcdesc.offset |= 1;
4955 }
4956 }
4957 else
4958 {
4959 union gotref *local_funcdesc;
4960
4961 local_funcdesc = sh_elf_local_funcdesc (input_bfd);
4962 offset = local_funcdesc[r_symndx].offset;
4963 BFD_ASSERT (offset != MINUS_ONE);
4964 if ((offset & 1) == 0)
4965 {
4966 if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
4967 offset, sec,
4968 sym->st_value))
4969 return FALSE;
4970 local_funcdesc[r_symndx].offset |= 1;
4971 }
4972 }
4973
4974 relocation = htab->sfuncdesc->output_offset + (offset & ~1);
4975 }
4976
4977 if (!info->shared && SYMBOL_FUNCDESC_LOCAL (info, h))
4978 {
4979 bfd_vma offset;
4980
4981 if (sh_elf_osec_readonly_p (output_bfd,
4982 reloc_section->output_section))
4983 {
4984 (*_bfd_error_handler)
4985 (_("%B(%A+0x%lx): cannot emit fixup to `%s' in read-only section"),
4986 input_bfd,
4987 input_section,
4988 (long) rel->r_offset,
4989 symname);
4990 return FALSE;
4991 }
4992
4993 offset = _bfd_elf_section_offset (output_bfd, info,
4994 reloc_section, reloc_offset);
4995
4996 if (offset != (bfd_vma)-1)
4997 sh_elf_add_rofixup (output_bfd, htab->srofixup,
4998 offset
4999 + reloc_section->output_section->vma
5000 + reloc_section->output_offset);
5001 }
5002 else if ((reloc_section->output_section->flags
5003 & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
5004 {
5005 bfd_vma offset;
5006
5007 if (sh_elf_osec_readonly_p (output_bfd,
5008 reloc_section->output_section))
5009 {
5010 info->callbacks->warning
5011 (info,
5012 _("cannot emit dynamic relocations in read-only section"),
5013 symname, input_bfd, reloc_section, reloc_offset);
5014 return FALSE;
5015 }
5016
5017 if (srelgot == NULL)
5018 {
5019 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
5020 BFD_ASSERT (srelgot != NULL);
5021 }
5022
5023 offset = _bfd_elf_section_offset (output_bfd, info,
5024 reloc_section, reloc_offset);
5025
5026 if (offset != (bfd_vma)-1)
5027 sh_elf_add_dyn_reloc (output_bfd, srelgot,
5028 offset
5029 + reloc_section->output_section->vma
5030 + reloc_section->output_offset,
5031 reloc_type, dynindx, relocation);
5032
5033 if (r_type == R_SH_FUNCDESC)
5034 {
5035 r = bfd_reloc_ok;
5036 break;
5037 }
5038 else
5039 {
5040 relocation = 0;
5041 goto funcdesc_leave_zero;
5042 }
5043 }
5044
5045 if (SYMBOL_FUNCDESC_LOCAL (info, h))
5046 relocation += htab->sfuncdesc->output_section->vma;
5047 funcdesc_leave_zero:
5048 if (r_type != R_SH_FUNCDESC)
5049 {
5050 bfd_put_32 (output_bfd, relocation,
5051 reloc_section->contents + reloc_offset);
5052 if (h != NULL)
5053 h->got.offset |= 1;
5054 else
5055 local_got_offsets[r_symndx] |= 1;
5056
5057 funcdesc_done_got:
5058
5059 relocation = sh_elf_got_offset (htab) + reloc_offset;
5060#ifdef GOT_BIAS
5061 relocation -= GOT_BIAS;
5062#endif
5063 }
5064 if (r_type == R_SH_GOTFUNCDESC20)
5065 {
5066 r = install_movi20_field (output_bfd, relocation + addend,
5067 input_bfd, input_section, contents,
5068 rel->r_offset);
5069 break;
5070 }
5071 else
5072 goto final_link_relocate;
5073 }
5074 break;
5075
5076 case R_SH_GOTOFFFUNCDESC:
5077 case R_SH_GOTOFFFUNCDESC20:
5078 /* FIXME: See R_SH_FUNCDESC comment about global symbols in the
5079 executable and --export-dynamic. If such symbols get
5080 ld.so-allocated descriptors we can not use R_SH_GOTOFFFUNCDESC
5081 for them. */
e0af1f53 5082 BFD_ASSERT (htab);
8e45593f
NC
5083
5084 check_segment[0] = check_segment[1] = -1;
5085 relocation = 0;
5086 addend = rel->r_addend;
5087
5088 if (h && (h->root.type == bfd_link_hash_undefweak
5089 || !SYMBOL_FUNCDESC_LOCAL (info, h)))
5090 {
5091 _bfd_error_handler
5092 (_("%B(%A+0x%lx): %s relocation against external symbol \"%s\""),
5093 input_bfd, input_section, (long) rel->r_offset, howto->name,
5094 h->root.root.string);
5095 return FALSE;
5096 }
5097 else
5098 {
5099 bfd_vma offset;
5100
5101 /* Otherwise, we know we have a private function
5102 descriptor, so reference it directly. */
5103 if (h)
5104 {
5105 offset = sh_elf_hash_entry (h)->funcdesc.offset;
5106 BFD_ASSERT (offset != MINUS_ONE);
5107 if ((offset & 1) == 0)
5108 {
5109 if (!sh_elf_initialize_funcdesc (output_bfd, info, h,
5110 offset, NULL, 0))
5111 return FALSE;
5112 sh_elf_hash_entry (h)->funcdesc.offset |= 1;
5113 }
5114 }
5115 else
5116 {
5117 union gotref *local_funcdesc;
5118
5119 local_funcdesc = sh_elf_local_funcdesc (input_bfd);
5120 offset = local_funcdesc[r_symndx].offset;
5121 BFD_ASSERT (offset != MINUS_ONE);
5122 if ((offset & 1) == 0)
5123 {
5124 if (!sh_elf_initialize_funcdesc (output_bfd, info, NULL,
5125 offset, sec,
5126 sym->st_value))
5127 return FALSE;
5128 local_funcdesc[r_symndx].offset |= 1;
5129 }
5130 }
5131
5132 relocation = htab->sfuncdesc->output_offset + (offset & ~1);
5133 }
5134
e0af1f53
MR
5135 relocation -= (htab->root.hgot->root.u.def.value
5136 + sgotplt->output_offset);
8e45593f
NC
5137#ifdef GOT_BIAS
5138 relocation -= GOT_BIAS;
5139#endif
5140
5141 if (r_type == R_SH_GOTOFFFUNCDESC20)
5142 {
5143 r = install_movi20_field (output_bfd, relocation + addend,
5144 input_bfd, input_section, contents,
5145 rel->r_offset);
5146 break;
5147 }
5148 else
5149 goto final_link_relocate;
5150
37c644f2
AO
5151 case R_SH_LOOP_START:
5152 {
5153 static bfd_vma start, end;
5154
5155 start = (relocation + rel->r_addend
5156 - (sec->output_section->vma + sec->output_offset));
5157 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5158 rel->r_offset, sec, start, end);
5159 break;
5160
5161 case R_SH_LOOP_END:
5162 end = (relocation + rel->r_addend
5163 - (sec->output_section->vma + sec->output_offset));
5164 r = sh_elf_reloc_loop (r_type, input_bfd, input_section, contents,
5165 rel->r_offset, sec, start, end);
5166 break;
5167 }
3376eaf5
KK
5168
5169 case R_SH_TLS_GD_32:
5170 case R_SH_TLS_IE_32:
e0af1f53 5171 BFD_ASSERT (htab);
8e45593f 5172 check_segment[0] = check_segment[1] = -1;
3376eaf5 5173 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
8e45593f 5174 got_type = GOT_UNKNOWN;
3376eaf5 5175 if (h == NULL && local_got_offsets)
8e45593f 5176 got_type = sh_elf_local_got_type (input_bfd) [r_symndx];
3376eaf5
KK
5177 else if (h != NULL)
5178 {
8e45593f 5179 got_type = sh_elf_hash_entry (h)->got_type;
3376eaf5
KK
5180 if (! info->shared
5181 && (h->dynindx == -1
f5385ebf 5182 || h->def_regular))
267fb3c1 5183 r_type = R_SH_TLS_LE_32;
3376eaf5
KK
5184 }
5185
8e45593f 5186 if (r_type == R_SH_TLS_GD_32 && got_type == GOT_TLS_IE)
3376eaf5
KK
5187 r_type = R_SH_TLS_IE_32;
5188
5189 if (r_type == R_SH_TLS_LE_32)
5190 {
5191 bfd_vma offset;
5192 unsigned short insn;
3376eaf5
KK
5193
5194 if (ELF32_R_TYPE (rel->r_info) == R_SH_TLS_GD_32)
5195 {
5196 /* GD->LE transition:
5197 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
b34976b6 5198 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
3376eaf5
KK
5199 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5200 We change it into:
5201 mov.l 1f,r4; stc gbr,r0; add r4,r0; nop;
5202 nop; nop; ...
5203 1: .long x@TPOFF; 2: .long __tls_get_addr@PLT; 3:. */
5204
5205 offset = rel->r_offset;
5206 BFD_ASSERT (offset >= 16);
5207 /* Size of GD instructions is 16 or 18. */
5208 offset -= 16;
5209 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5210 if ((insn & 0xff00) == 0xc700)
5211 {
5212 BFD_ASSERT (offset >= 2);
5213 offset -= 2;
5214 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5215 }
5216
5217 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5218 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5219 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5220 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5221 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5222 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5223 BFD_ASSERT (insn == 0x310c);
5224 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5225 BFD_ASSERT (insn == 0x410b);
5226 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5227 BFD_ASSERT (insn == 0x34cc);
5228
5229 bfd_put_16 (output_bfd, 0x0012, contents + offset + 2);
5230 bfd_put_16 (output_bfd, 0x304c, contents + offset + 4);
5231 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5232 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5233 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5234 }
5235 else
5236 {
91d6fa6a 5237 int target;
3376eaf5
KK
5238
5239 /* IE->LE transition:
5240 mov.l 1f,r0; stc gbr,rN; mov.l @(r0,r12),rM;
5241 bra 2f; add ...; .align 2; 1: x@GOTTPOFF; 2:
5242 We change it into:
5243 mov.l .Ln,rM; stc gbr,rN; nop; ...;
5244 1: x@TPOFF; 2:. */
5245
5246 offset = rel->r_offset;
5247 BFD_ASSERT (offset >= 16);
5248 /* Size of IE instructions is 10 or 12. */
5249 offset -= 10;
5250 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5251 if ((insn & 0xf0ff) == 0x0012)
5252 {
5253 BFD_ASSERT (offset >= 2);
5254 offset -= 2;
5255 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5256 }
5257
5258 BFD_ASSERT ((insn & 0xff00) == 0xd000);
91d6fa6a 5259 target = insn & 0x00ff;
3376eaf5
KK
5260 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5261 BFD_ASSERT ((insn & 0xf0ff) == 0x0012);
5262 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5263 BFD_ASSERT ((insn & 0xf0ff) == 0x00ce);
91d6fa6a 5264 insn = 0xd000 | (insn & 0x0f00) | target;
3376eaf5
KK
5265 bfd_put_16 (output_bfd, insn, contents + offset + 0);
5266 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5267 }
5268
267fb3c1
KK
5269 bfd_put_32 (output_bfd, tpoff (info, relocation),
5270 contents + rel->r_offset);
3376eaf5
KK
5271 continue;
5272 }
5273
8e45593f 5274 if (sgot == NULL || sgotplt == NULL)
3376eaf5
KK
5275 abort ();
5276
5277 if (h != NULL)
5278 off = h->got.offset;
5279 else
5280 {
5281 if (local_got_offsets == NULL)
5282 abort ();
5283
5284 off = local_got_offsets[r_symndx];
5285 }
5286
267fb3c1
KK
5287 /* Relocate R_SH_TLS_IE_32 directly when statically linking. */
5288 if (r_type == R_SH_TLS_IE_32
5289 && ! htab->root.dynamic_sections_created)
5290 {
5291 off &= ~1;
5292 bfd_put_32 (output_bfd, tpoff (info, relocation),
5293 sgot->contents + off);
8e45593f 5294 bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
267fb3c1
KK
5295 contents + rel->r_offset);
5296 continue;
5297 }
5298
3376eaf5
KK
5299 if ((off & 1) != 0)
5300 off &= ~1;
26e41594 5301 else
3376eaf5
KK
5302 {
5303 Elf_Internal_Rela outrel;
947216bf 5304 bfd_byte *loc;
3376eaf5
KK
5305 int dr_type, indx;
5306
5307 if (srelgot == NULL)
5308 {
5309 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
5310 BFD_ASSERT (srelgot != NULL);
5311 }
5312
5313 outrel.r_offset = (sgot->output_section->vma
5314 + sgot->output_offset + off);
5315
267fb3c1 5316 if (h == NULL || h->dynindx == -1)
c95b8a7a
KK
5317 indx = 0;
5318 else
5319 indx = h->dynindx;
267fb3c1 5320
3376eaf5
KK
5321 dr_type = (r_type == R_SH_TLS_GD_32 ? R_SH_TLS_DTPMOD32 :
5322 R_SH_TLS_TPOFF32);
5323 if (dr_type == R_SH_TLS_TPOFF32 && indx == 0)
5324 outrel.r_addend = relocation - dtpoff_base (info);
5325 else
5326 outrel.r_addend = 0;
5327 outrel.r_info = ELF32_R_INFO (indx, dr_type);
947216bf
AM
5328 loc = srelgot->contents;
5329 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3376eaf5
KK
5330 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5331
5332 if (r_type == R_SH_TLS_GD_32)
5333 {
5334 if (indx == 0)
5335 {
5336 bfd_put_32 (output_bfd,
5337 relocation - dtpoff_base (info),
5338 sgot->contents + off + 4);
5339 }
5340 else
5341 {
5342 outrel.r_info = ELF32_R_INFO (indx,
5343 R_SH_TLS_DTPOFF32);
5344 outrel.r_offset += 4;
5345 outrel.r_addend = 0;
5346 srelgot->reloc_count++;
947216bf
AM
5347 loc += sizeof (Elf32_External_Rela);
5348 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3376eaf5
KK
5349 }
5350 }
5351
5352 if (h != NULL)
5353 h->got.offset |= 1;
5354 else
5355 local_got_offsets[r_symndx] |= 1;
5356 }
5357
5358 if (off >= (bfd_vma) -2)
5359 abort ();
5360
5361 if (r_type == (int) ELF32_R_TYPE (rel->r_info))
8e45593f 5362 relocation = sh_elf_got_offset (htab) + off;
3376eaf5
KK
5363 else
5364 {
5365 bfd_vma offset;
5366 unsigned short insn;
5367
5368 /* GD->IE transition:
5369 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5370 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5371 1: .long x$TLSGD; 2: .long __tls_get_addr@PLT; 3:
5372 We change it into:
5373 mov.l 1f,r0; stc gbr,r4; mov.l @(r0,r12),r0; add r4,r0;
5374 nop; nop; bra 3f; nop; .align 2;
5375 1: .long x@TPOFF; 2:...; 3:. */
5376
5377 offset = rel->r_offset;
5378 BFD_ASSERT (offset >= 16);
5379 /* Size of GD instructions is 16 or 18. */
5380 offset -= 16;
5381 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5382 if ((insn & 0xff00) == 0xc700)
5383 {
5384 BFD_ASSERT (offset >= 2);
5385 offset -= 2;
5386 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5387 }
5388
5389 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5390
5391 /* Replace mov.l 1f,R4 with mov.l 1f,r0. */
5392 bfd_put_16 (output_bfd, insn & 0xf0ff, contents + offset);
5393
5394 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5395 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5396 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5397 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5398 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5399 BFD_ASSERT (insn == 0x310c);
5400 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5401 BFD_ASSERT (insn == 0x410b);
5402 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5403 BFD_ASSERT (insn == 0x34cc);
5404
5405 bfd_put_16 (output_bfd, 0x0412, contents + offset + 2);
5406 bfd_put_16 (output_bfd, 0x00ce, contents + offset + 4);
5407 bfd_put_16 (output_bfd, 0x304c, contents + offset + 6);
5408 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5409 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5410
8e45593f 5411 bfd_put_32 (output_bfd, sh_elf_got_offset (htab) + off,
3376eaf5
KK
5412 contents + rel->r_offset);
5413
5414 continue;
5415 }
5416
5417 addend = rel->r_addend;
5418
5419 goto final_link_relocate;
5420
5421 case R_SH_TLS_LD_32:
e0af1f53 5422 BFD_ASSERT (htab);
8e45593f 5423 check_segment[0] = check_segment[1] = -1;
3376eaf5
KK
5424 if (! info->shared)
5425 {
5426 bfd_vma offset;
5427 unsigned short insn;
5428
5429 /* LD->LE transition:
5430 mov.l 1f,r4; mova 2f,r0; mov.l 2f,r1; add r0,r1;
5431 jsr @r1; add r12,r4; bra 3f; nop; .align 2;
5432 1: .long x$TLSLD; 2: .long __tls_get_addr@PLT; 3:
5433 We change it into:
5434 stc gbr,r0; nop; nop; nop;
5435 nop; nop; bra 3f; ...; 3:. */
5436
5437 offset = rel->r_offset;
5438 BFD_ASSERT (offset >= 16);
5439 /* Size of LD instructions is 16 or 18. */
5440 offset -= 16;
5441 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5442 if ((insn & 0xff00) == 0xc700)
5443 {
5444 BFD_ASSERT (offset >= 2);
5445 offset -= 2;
5446 insn = bfd_get_16 (input_bfd, contents + offset + 0);
5447 }
5448
5449 BFD_ASSERT ((insn & 0xff00) == 0xd400);
5450 insn = bfd_get_16 (input_bfd, contents + offset + 2);
5451 BFD_ASSERT ((insn & 0xff00) == 0xc700);
5452 insn = bfd_get_16 (input_bfd, contents + offset + 4);
5453 BFD_ASSERT ((insn & 0xff00) == 0xd100);
5454 insn = bfd_get_16 (input_bfd, contents + offset + 6);
5455 BFD_ASSERT (insn == 0x310c);
5456 insn = bfd_get_16 (input_bfd, contents + offset + 8);
5457 BFD_ASSERT (insn == 0x410b);
5458 insn = bfd_get_16 (input_bfd, contents + offset + 10);
5459 BFD_ASSERT (insn == 0x34cc);
5460
5461 bfd_put_16 (output_bfd, 0x0012, contents + offset + 0);
5462 bfd_put_16 (output_bfd, 0x0009, contents + offset + 2);
5463 bfd_put_16 (output_bfd, 0x0009, contents + offset + 4);
5464 bfd_put_16 (output_bfd, 0x0009, contents + offset + 6);
5465 bfd_put_16 (output_bfd, 0x0009, contents + offset + 8);
5466 bfd_put_16 (output_bfd, 0x0009, contents + offset + 10);
5467
5468 continue;
5469 }
5470
8e45593f 5471 if (sgot == NULL || sgotplt == NULL)
3376eaf5
KK
5472 abort ();
5473
5474 off = htab->tls_ldm_got.offset;
5475 if (off & 1)
5476 off &= ~1;
5477 else
5478 {
5479 Elf_Internal_Rela outrel;
947216bf 5480 bfd_byte *loc;
3376eaf5
KK
5481
5482 srelgot = htab->srelgot;
5483 if (srelgot == NULL)
5484 abort ();
5485
5486 outrel.r_offset = (sgot->output_section->vma
5487 + sgot->output_offset + off);
5488 outrel.r_addend = 0;
5489 outrel.r_info = ELF32_R_INFO (0, R_SH_TLS_DTPMOD32);
947216bf
AM
5490 loc = srelgot->contents;
5491 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3376eaf5
KK
5492 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
5493 htab->tls_ldm_got.offset |= 1;
5494 }
5495
8e45593f 5496 relocation = sh_elf_got_offset (htab) + off;
3376eaf5
KK
5497 addend = rel->r_addend;
5498
5499 goto final_link_relocate;
5500
5501 case R_SH_TLS_LDO_32:
8e45593f 5502 check_segment[0] = check_segment[1] = -1;
3376eaf5 5503 if (! info->shared)
267fb3c1 5504 relocation = tpoff (info, relocation);
3376eaf5
KK
5505 else
5506 relocation -= dtpoff_base (info);
5507
5508 addend = rel->r_addend;
5509 goto final_link_relocate;
5510
5511 case R_SH_TLS_LE_32:
5512 {
5513 int indx;
5514 Elf_Internal_Rela outrel;
947216bf 5515 bfd_byte *loc;
3376eaf5 5516
8e45593f
NC
5517 check_segment[0] = check_segment[1] = -1;
5518
b68593b9 5519 if (! info->shared || info->pie)
267fb3c1
KK
5520 {
5521 relocation = tpoff (info, relocation);
5522 addend = rel->r_addend;
5523 goto final_link_relocate;
5524 }
5525
3376eaf5
KK
5526 if (sreloc == NULL)
5527 {
83bac4b0
NC
5528 sreloc = _bfd_elf_get_dynamic_reloc_section
5529 (input_bfd, input_section, /*rela?*/ TRUE);
5530 if (sreloc == NULL)
b34976b6 5531 return FALSE;
3376eaf5
KK
5532 }
5533
267fb3c1
KK
5534 if (h == NULL || h->dynindx == -1)
5535 indx = 0;
5536 else
5537 indx = h->dynindx;
5538
3376eaf5
KK
5539 outrel.r_offset = (input_section->output_section->vma
5540 + input_section->output_offset
5541 + rel->r_offset);
5542 outrel.r_info = ELF32_R_INFO (indx, R_SH_TLS_TPOFF32);
5543 if (indx == 0)
5544 outrel.r_addend = relocation - dtpoff_base (info);
5545 else
5546 outrel.r_addend = 0;
3376eaf5 5547
947216bf
AM
5548 loc = sreloc->contents;
5549 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
5550 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3376eaf5
KK
5551 continue;
5552 }
37c644f2
AO
5553 }
5554
146be91a 5555 relocation_done:
e0af1f53 5556 if (fdpic_p && check_segment[0] != (unsigned) -1
8e45593f
NC
5557 && check_segment[0] != check_segment[1])
5558 {
5559 /* We don't want duplicate errors for undefined symbols. */
5560 if (!h || h->root.type != bfd_link_hash_undefined)
5561 {
5562 if (info->shared)
5563 {
5564 info->callbacks->einfo
5565 (_("%X%C: relocation to \"%s\" references a different segment\n"),
5566 input_bfd, input_section, rel->r_offset, symname);
5567 return FALSE;
5568 }
5569 else
5570 info->callbacks->einfo
5571 (_("%C: warning: relocation to \"%s\" references a different segment\n"),
5572 input_bfd, input_section, rel->r_offset, symname);
5573 }
5574
5575 elf_elfheader (output_bfd)->e_flags &= ~EF_SH_PIC;
5576 }
5577
37c644f2
AO
5578 if (r != bfd_reloc_ok)
5579 {
5580 switch (r)
5581 {
5582 default:
5583 case bfd_reloc_outofrange:
5584 abort ();
5585 case bfd_reloc_overflow:
5586 {
5587 const char *name;
5588
5589 if (h != NULL)
dfeffb9f 5590 name = NULL;
37c644f2
AO
5591 else
5592 {
252b5132
RH
5593 name = (bfd_elf_string_from_elf_section
5594 (input_bfd, symtab_hdr->sh_link, sym->st_name));
5595 if (name == NULL)
b34976b6 5596 return FALSE;
252b5132
RH
5597 if (*name == '\0')
5598 name = bfd_section_name (input_bfd, sec);
5599 }
5600 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
5601 (info, (h ? &h->root : NULL), name, howto->name,
5602 (bfd_vma) 0, input_bfd, input_section,
5603 rel->r_offset)))
b34976b6 5604 return FALSE;
252b5132
RH
5605 }
5606 break;
5607 }
5608 }
5609 }
5610
b34976b6 5611 return TRUE;
252b5132
RH
5612}
5613
5614/* This is a version of bfd_generic_get_relocated_section_contents
5615 which uses sh_elf_relocate_section. */
5616
5617static bfd_byte *
09fd220b
KK
5618sh_elf_get_relocated_section_contents (bfd *output_bfd,
5619 struct bfd_link_info *link_info,
5620 struct bfd_link_order *link_order,
5621 bfd_byte *data,
5622 bfd_boolean relocatable,
5623 asymbol **symbols)
252b5132
RH
5624{
5625 Elf_Internal_Shdr *symtab_hdr;
5626 asection *input_section = link_order->u.indirect.section;
5627 bfd *input_bfd = input_section->owner;
5628 asection **sections = NULL;
5629 Elf_Internal_Rela *internal_relocs = NULL;
6cdc0ccc 5630 Elf_Internal_Sym *isymbuf = NULL;
252b5132
RH
5631
5632 /* We only need to handle the case of relaxing, or of having a
5633 particular set of section contents, specially. */
1049f94e 5634 if (relocatable
252b5132
RH
5635 || elf_section_data (input_section)->this_hdr.contents == NULL)
5636 return bfd_generic_get_relocated_section_contents (output_bfd, link_info,
5637 link_order, data,
1049f94e 5638 relocatable,
252b5132
RH
5639 symbols);
5640
0ffa91dd 5641 symtab_hdr = &elf_symtab_hdr (input_bfd);
252b5132
RH
5642
5643 memcpy (data, elf_section_data (input_section)->this_hdr.contents,
eea6121a 5644 (size_t) input_section->size);
252b5132
RH
5645
5646 if ((input_section->flags & SEC_RELOC) != 0
5647 && input_section->reloc_count > 0)
5648 {
252b5132 5649 asection **secpp;
6cdc0ccc 5650 Elf_Internal_Sym *isym, *isymend;
9ad5cbcf 5651 bfd_size_type amt;
252b5132 5652
45d6a902 5653 internal_relocs = (_bfd_elf_link_read_relocs
09fd220b 5654 (input_bfd, input_section, NULL,
b34976b6 5655 (Elf_Internal_Rela *) NULL, FALSE));
252b5132
RH
5656 if (internal_relocs == NULL)
5657 goto error_return;
5658
6cdc0ccc
AM
5659 if (symtab_hdr->sh_info != 0)
5660 {
5661 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5662 if (isymbuf == NULL)
5663 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
5664 symtab_hdr->sh_info, 0,
5665 NULL, NULL, NULL);
5666 if (isymbuf == NULL)
5667 goto error_return;
5668 }
252b5132 5669
9ad5cbcf
AM
5670 amt = symtab_hdr->sh_info;
5671 amt *= sizeof (asection *);
5672 sections = (asection **) bfd_malloc (amt);
5673 if (sections == NULL && amt != 0)
252b5132
RH
5674 goto error_return;
5675
6cdc0ccc
AM
5676 isymend = isymbuf + symtab_hdr->sh_info;
5677 for (isym = isymbuf, secpp = sections; isym < isymend; ++isym, ++secpp)
252b5132
RH
5678 {
5679 asection *isec;
5680
6cdc0ccc 5681 if (isym->st_shndx == SHN_UNDEF)
252b5132 5682 isec = bfd_und_section_ptr;
6cdc0ccc 5683 else if (isym->st_shndx == SHN_ABS)
252b5132 5684 isec = bfd_abs_section_ptr;
6cdc0ccc 5685 else if (isym->st_shndx == SHN_COMMON)
252b5132
RH
5686 isec = bfd_com_section_ptr;
5687 else
6cdc0ccc 5688 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
252b5132
RH
5689
5690 *secpp = isec;
5691 }
5692
5693 if (! sh_elf_relocate_section (output_bfd, link_info, input_bfd,
5694 input_section, data, internal_relocs,
6cdc0ccc 5695 isymbuf, sections))
252b5132
RH
5696 goto error_return;
5697
5698 if (sections != NULL)
5699 free (sections);
6cdc0ccc
AM
5700 if (isymbuf != NULL
5701 && symtab_hdr->contents != (unsigned char *) isymbuf)
5702 free (isymbuf);
5703 if (elf_section_data (input_section)->relocs != internal_relocs)
252b5132 5704 free (internal_relocs);
252b5132
RH
5705 }
5706
5707 return data;
5708
5709 error_return:
252b5132
RH
5710 if (sections != NULL)
5711 free (sections);
6cdc0ccc
AM
5712 if (isymbuf != NULL
5713 && symtab_hdr->contents != (unsigned char *) isymbuf)
5714 free (isymbuf);
5715 if (internal_relocs != NULL
5716 && elf_section_data (input_section)->relocs != internal_relocs)
5717 free (internal_relocs);
252b5132
RH
5718 return NULL;
5719}
917583ad 5720
3376eaf5
KK
5721/* Return the base VMA address which should be subtracted from real addresses
5722 when resolving @dtpoff relocation.
5723 This is PT_TLS segment p_vaddr. */
5724
5725static bfd_vma
09fd220b 5726dtpoff_base (struct bfd_link_info *info)
3376eaf5 5727{
e1918d23
AM
5728 /* If tls_sec is NULL, we should have signalled an error already. */
5729 if (elf_hash_table (info)->tls_sec == NULL)
267fb3c1 5730 return 0;
e1918d23 5731 return elf_hash_table (info)->tls_sec->vma;
3376eaf5
KK
5732}
5733
267fb3c1
KK
5734/* Return the relocation value for R_SH_TLS_TPOFF32.. */
5735
5736static bfd_vma
09fd220b 5737tpoff (struct bfd_link_info *info, bfd_vma address)
267fb3c1 5738{
e1918d23
AM
5739 /* If tls_sec is NULL, we should have signalled an error already. */
5740 if (elf_hash_table (info)->tls_sec == NULL)
267fb3c1
KK
5741 return 0;
5742 /* SH TLS ABI is variant I and static TLS block start just after tcbhead
5743 structure which has 2 pointer fields. */
044ad7e3
KK
5744 return (address - elf_hash_table (info)->tls_sec->vma
5745 + align_power ((bfd_vma) 8,
5746 elf_hash_table (info)->tls_sec->alignment_power));
267fb3c1
KK
5747}
5748
252b5132 5749static asection *
09fd220b 5750sh_elf_gc_mark_hook (asection *sec,
07adf181
AM
5751 struct bfd_link_info *info,
5752 Elf_Internal_Rela *rel,
5753 struct elf_link_hash_entry *h,
09fd220b 5754 Elf_Internal_Sym *sym)
252b5132
RH
5755{
5756 if (h != NULL)
07adf181
AM
5757 switch (ELF32_R_TYPE (rel->r_info))
5758 {
5759 case R_SH_GNU_VTINHERIT:
5760 case R_SH_GNU_VTENTRY:
5761 return NULL;
5762 }
9ad5cbcf 5763
07adf181 5764 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
252b5132
RH
5765}
5766
37c644f2
AO
5767/* Update the got entry reference counts for the section being removed. */
5768
b34976b6 5769static bfd_boolean
09fd220b
KK
5770sh_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
5771 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 5772{
067653c5
AM
5773 Elf_Internal_Shdr *symtab_hdr;
5774 struct elf_link_hash_entry **sym_hashes;
5775 bfd_signed_vma *local_got_refcounts;
8e45593f 5776 union gotref *local_funcdesc;
067653c5 5777 const Elf_Internal_Rela *rel, *relend;
067653c5 5778
7dda2462
TG
5779 if (info->relocatable)
5780 return TRUE;
5781
067653c5
AM
5782 elf_section_data (sec)->local_dynrel = NULL;
5783
0ffa91dd 5784 symtab_hdr = &elf_symtab_hdr (abfd);
067653c5
AM
5785 sym_hashes = elf_sym_hashes (abfd);
5786 local_got_refcounts = elf_local_got_refcounts (abfd);
8e45593f 5787 local_funcdesc = sh_elf_local_funcdesc (abfd);
067653c5
AM
5788
5789 relend = relocs + sec->reloc_count;
5790 for (rel = relocs; rel < relend; rel++)
396a6083 5791 {
26e41594
AM
5792 unsigned long r_symndx;
5793 unsigned int r_type;
5794 struct elf_link_hash_entry *h = NULL;
396a6083
SC
5795#ifdef INCLUDE_SHMEDIA
5796 int seen_stt_datalabel = 0;
5797#endif
3376eaf5 5798
396a6083 5799 r_symndx = ELF32_R_SYM (rel->r_info);
26e41594 5800 if (r_symndx >= symtab_hdr->sh_info)
396a6083 5801 {
26e41594
AM
5802 struct elf_sh_link_hash_entry *eh;
5803 struct elf_sh_dyn_relocs **pp;
5804 struct elf_sh_dyn_relocs *p;
5805
396a6083 5806 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
396a6083
SC
5807 while (h->root.type == bfd_link_hash_indirect
5808 || h->root.type == bfd_link_hash_warning)
5809 {
3eb128b2 5810#ifdef INCLUDE_SHMEDIA
396a6083 5811 seen_stt_datalabel |= h->type == STT_DATALABEL;
3eb128b2 5812#endif
396a6083
SC
5813 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5814 }
26e41594
AM
5815 eh = (struct elf_sh_link_hash_entry *) h;
5816 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
5817 if (p->sec == sec)
5818 {
5819 /* Everything must go for SEC. */
5820 *pp = p->next;
5821 break;
5822 }
396a6083 5823 }
067653c5 5824
26e41594
AM
5825 r_type = ELF32_R_TYPE (rel->r_info);
5826 switch (sh_elf_optimized_tls_reloc (info, r_type, h != NULL))
396a6083
SC
5827 {
5828 case R_SH_TLS_LD_32:
5829 if (sh_elf_hash_table (info)->tls_ldm_got.refcount > 0)
5830 sh_elf_hash_table (info)->tls_ldm_got.refcount -= 1;
5831 break;
5832
5833 case R_SH_GOT32:
8e45593f 5834 case R_SH_GOT20:
396a6083 5835 case R_SH_GOTOFF:
8e45593f 5836 case R_SH_GOTOFF20:
396a6083
SC
5837 case R_SH_GOTPC:
5838#ifdef INCLUDE_SHMEDIA
5839 case R_SH_GOT_LOW16:
5840 case R_SH_GOT_MEDLOW16:
5841 case R_SH_GOT_MEDHI16:
5842 case R_SH_GOT_HI16:
5843 case R_SH_GOT10BY4:
5844 case R_SH_GOT10BY8:
5845 case R_SH_GOTOFF_LOW16:
5846 case R_SH_GOTOFF_MEDLOW16:
5847 case R_SH_GOTOFF_MEDHI16:
5848 case R_SH_GOTOFF_HI16:
5849 case R_SH_GOTPC_LOW16:
5850 case R_SH_GOTPC_MEDLOW16:
5851 case R_SH_GOTPC_MEDHI16:
5852 case R_SH_GOTPC_HI16:
5853#endif
5854 case R_SH_TLS_GD_32:
5855 case R_SH_TLS_IE_32:
8e45593f
NC
5856 case R_SH_GOTFUNCDESC:
5857 case R_SH_GOTFUNCDESC20:
396a6083
SC
5858 if (h != NULL)
5859 {
5860#ifdef INCLUDE_SHMEDIA
5861 if (seen_stt_datalabel)
5862 {
26e41594
AM
5863 struct elf_sh_link_hash_entry *eh;
5864 eh = (struct elf_sh_link_hash_entry *) h;
396a6083
SC
5865 if (eh->datalabel_got.refcount > 0)
5866 eh->datalabel_got.refcount -= 1;
5867 }
5868 else
5869#endif
5870 if (h->got.refcount > 0)
5871 h->got.refcount -= 1;
5872 }
5873 else if (local_got_refcounts != NULL)
5874 {
5875#ifdef INCLUDE_SHMEDIA
5876 if (rel->r_addend & 1)
5877 {
5878 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
5879 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
5880 }
5881 else
5882#endif
5883 if (local_got_refcounts[r_symndx] > 0)
5884 local_got_refcounts[r_symndx] -= 1;
5885 }
5886 break;
5887
8e45593f
NC
5888 case R_SH_FUNCDESC:
5889 if (h != NULL)
5890 sh_elf_hash_entry (h)->abs_funcdesc_refcount -= 1;
5891 else if (sh_elf_hash_table (info)->fdpic_p && !info->shared)
5892 sh_elf_hash_table (info)->srofixup->size -= 4;
5893
5894 /* Fall through. */
5895
5896 case R_SH_GOTOFFFUNCDESC:
5897 case R_SH_GOTOFFFUNCDESC20:
5898 if (h != NULL)
5899 sh_elf_hash_entry (h)->funcdesc.refcount -= 1;
5900 else
5901 local_funcdesc[r_symndx].refcount -= 1;
5902 break;
5903
396a6083 5904 case R_SH_DIR32:
8e45593f
NC
5905 if (sh_elf_hash_table (info)->fdpic_p && !info->shared
5906 && (sec->flags & SEC_ALLOC) != 0)
5907 sh_elf_hash_table (info)->srofixup->size -= 4;
5908 /* Fall thru */
5909
396a6083 5910 case R_SH_REL32:
26e41594
AM
5911 if (info->shared)
5912 break;
5913 /* Fall thru */
396a6083
SC
5914
5915 case R_SH_PLT32:
5916#ifdef INCLUDE_SHMEDIA
5917 case R_SH_PLT_LOW16:
5918 case R_SH_PLT_MEDLOW16:
5919 case R_SH_PLT_MEDHI16:
5920 case R_SH_PLT_HI16:
5921#endif
5922 if (h != NULL)
5923 {
5924 if (h->plt.refcount > 0)
5925 h->plt.refcount -= 1;
5926 }
5927 break;
067653c5 5928
396a6083
SC
5929 case R_SH_GOTPLT32:
5930#ifdef INCLUDE_SHMEDIA
5931 case R_SH_GOTPLT_LOW16:
5932 case R_SH_GOTPLT_MEDLOW16:
5933 case R_SH_GOTPLT_MEDHI16:
5934 case R_SH_GOTPLT_HI16:
5935 case R_SH_GOTPLT10BY4:
5936 case R_SH_GOTPLT10BY8:
5937#endif
5938 if (h != NULL)
5939 {
26e41594
AM
5940 struct elf_sh_link_hash_entry *eh;
5941 eh = (struct elf_sh_link_hash_entry *) h;
396a6083 5942 if (eh->gotplt_refcount > 0)
067653c5 5943 {
396a6083
SC
5944 eh->gotplt_refcount -= 1;
5945 if (h->plt.refcount > 0)
5946 h->plt.refcount -= 1;
067653c5 5947 }
067653c5 5948#ifdef INCLUDE_SHMEDIA
396a6083
SC
5949 else if (seen_stt_datalabel)
5950 {
5951 if (eh->datalabel_got.refcount > 0)
5952 eh->datalabel_got.refcount -= 1;
5953 }
067653c5 5954#endif
396a6083
SC
5955 else if (h->got.refcount > 0)
5956 h->got.refcount -= 1;
5957 }
5958 else if (local_got_refcounts != NULL)
5959 {
067653c5 5960#ifdef INCLUDE_SHMEDIA
396a6083
SC
5961 if (rel->r_addend & 1)
5962 {
5963 if (local_got_refcounts[symtab_hdr->sh_info + r_symndx] > 0)
5964 local_got_refcounts[symtab_hdr->sh_info + r_symndx] -= 1;
5965 }
5966 else
067653c5 5967#endif
396a6083
SC
5968 if (local_got_refcounts[r_symndx] > 0)
5969 local_got_refcounts[r_symndx] -= 1;
5970 }
5971 break;
067653c5 5972
396a6083
SC
5973 default:
5974 break;
5975 }
5976 }
067653c5 5977
b34976b6 5978 return TRUE;
252b5132
RH
5979}
5980
067653c5
AM
5981/* Copy the extra info we tack onto an elf_link_hash_entry. */
5982
5983static void
fcfa13d2 5984sh_elf_copy_indirect_symbol (struct bfd_link_info *info,
09fd220b
KK
5985 struct elf_link_hash_entry *dir,
5986 struct elf_link_hash_entry *ind)
067653c5
AM
5987{
5988 struct elf_sh_link_hash_entry *edir, *eind;
5989
5990 edir = (struct elf_sh_link_hash_entry *) dir;
5991 eind = (struct elf_sh_link_hash_entry *) ind;
5992
5993 if (eind->dyn_relocs != NULL)
5994 {
5995 if (edir->dyn_relocs != NULL)
5996 {
5997 struct elf_sh_dyn_relocs **pp;
5998 struct elf_sh_dyn_relocs *p;
5999
fcfa13d2 6000 /* Add reloc counts against the indirect sym to the direct sym
067653c5
AM
6001 list. Merge any entries against the same section. */
6002 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
6003 {
6004 struct elf_sh_dyn_relocs *q;
6005
6006 for (q = edir->dyn_relocs; q != NULL; q = q->next)
6007 if (q->sec == p->sec)
6008 {
6009 q->pc_count += p->pc_count;
6010 q->count += p->count;
6011 *pp = p->next;
6012 break;
6013 }
6014 if (q == NULL)
6015 pp = &p->next;
6016 }
6017 *pp = edir->dyn_relocs;
6018 }
6019
6020 edir->dyn_relocs = eind->dyn_relocs;
6021 eind->dyn_relocs = NULL;
6022 }
4989d792
SC
6023 edir->gotplt_refcount = eind->gotplt_refcount;
6024 eind->gotplt_refcount = 0;
396a6083 6025#ifdef INCLUDE_SHMEDIA
fcfa13d2
AM
6026 edir->datalabel_got.refcount += eind->datalabel_got.refcount;
6027 eind->datalabel_got.refcount = 0;
396a6083 6028#endif
8e45593f
NC
6029 edir->funcdesc.refcount += eind->funcdesc.refcount;
6030 eind->funcdesc.refcount = 0;
6031 edir->abs_funcdesc_refcount += eind->abs_funcdesc_refcount;
6032 eind->abs_funcdesc_refcount = 0;
067653c5 6033
3376eaf5
KK
6034 if (ind->root.type == bfd_link_hash_indirect
6035 && dir->got.refcount <= 0)
6036 {
8e45593f
NC
6037 edir->got_type = eind->got_type;
6038 eind->got_type = GOT_UNKNOWN;
3376eaf5
KK
6039 }
6040
04e534c3 6041 if (ind->root.type != bfd_link_hash_indirect
f5385ebf
AM
6042 && dir->dynamic_adjusted)
6043 {
6044 /* If called to transfer flags for a weakdef during processing
6045 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
6046 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
6047 dir->ref_dynamic |= ind->ref_dynamic;
6048 dir->ref_regular |= ind->ref_regular;
6049 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
6050 dir->needs_plt |= ind->needs_plt;
6051 }
04e534c3 6052 else
fcfa13d2 6053 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
067653c5
AM
6054}
6055
3376eaf5 6056static int
09fd220b
KK
6057sh_elf_optimized_tls_reloc (struct bfd_link_info *info, int r_type,
6058 int is_local)
3376eaf5
KK
6059{
6060 if (info->shared)
6061 return r_type;
6062
6063 switch (r_type)
6064 {
6065 case R_SH_TLS_GD_32:
6066 case R_SH_TLS_IE_32:
6067 if (is_local)
6068 return R_SH_TLS_LE_32;
6069 return R_SH_TLS_IE_32;
6070 case R_SH_TLS_LD_32:
6071 return R_SH_TLS_LE_32;
6072 }
6073
6074 return r_type;
6075}
6076
252b5132
RH
6077/* Look through the relocs for a section during the first phase.
6078 Since we don't do .gots or .plts, we just need to consider the
6079 virtual table relocs for gc. */
435b1e90 6080
b34976b6 6081static bfd_boolean
09fd220b
KK
6082sh_elf_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
6083 const Elf_Internal_Rela *relocs)
252b5132
RH
6084{
6085 Elf_Internal_Shdr *symtab_hdr;
5582a088 6086 struct elf_link_hash_entry **sym_hashes;
067653c5 6087 struct elf_sh_link_hash_table *htab;
252b5132
RH
6088 const Elf_Internal_Rela *rel;
6089 const Elf_Internal_Rela *rel_end;
37c644f2 6090 asection *sreloc;
3376eaf5 6091 unsigned int r_type;
8e45593f 6092 int got_type, old_got_type;
435b1e90 6093
37c644f2
AO
6094 sreloc = NULL;
6095
1049f94e 6096 if (info->relocatable)
b34976b6 6097 return TRUE;
435b1e90 6098
0ffa91dd
NC
6099 BFD_ASSERT (is_sh_elf (abfd));
6100
6101 symtab_hdr = &elf_symtab_hdr (abfd);
252b5132 6102 sym_hashes = elf_sym_hashes (abfd);
435b1e90 6103
067653c5 6104 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
6105 if (htab == NULL)
6106 return FALSE;
6107
252b5132
RH
6108 rel_end = relocs + sec->reloc_count;
6109 for (rel = relocs; rel < rel_end; rel++)
6110 {
6111 struct elf_link_hash_entry *h;
6112 unsigned long r_symndx;
396a6083
SC
6113#ifdef INCLUDE_SHMEDIA
6114 int seen_stt_datalabel = 0;
6115#endif
435b1e90 6116
252b5132 6117 r_symndx = ELF32_R_SYM (rel->r_info);
3376eaf5
KK
6118 r_type = ELF32_R_TYPE (rel->r_info);
6119
252b5132 6120 if (r_symndx < symtab_hdr->sh_info)
435b1e90 6121 h = NULL;
252b5132 6122 else
396a6083
SC
6123 {
6124 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
396a6083
SC
6125 while (h->root.type == bfd_link_hash_indirect
6126 || h->root.type == bfd_link_hash_warning)
6127 {
973a3492 6128#ifdef INCLUDE_SHMEDIA
396a6083 6129 seen_stt_datalabel |= h->type == STT_DATALABEL;
973a3492 6130#endif
396a6083
SC
6131 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6132 }
396a6083 6133 }
435b1e90 6134
3376eaf5
KK
6135 r_type = sh_elf_optimized_tls_reloc (info, r_type, h == NULL);
6136 if (! info->shared
6137 && r_type == R_SH_TLS_IE_32
6138 && h != NULL
6139 && h->root.type != bfd_link_hash_undefined
6140 && h->root.type != bfd_link_hash_undefweak
6141 && (h->dynindx == -1
f5385ebf 6142 || h->def_regular))
3376eaf5
KK
6143 r_type = R_SH_TLS_LE_32;
6144
8e45593f
NC
6145 if (htab->fdpic_p)
6146 switch (r_type)
6147 {
6148 case R_SH_GOTOFFFUNCDESC:
6149 case R_SH_GOTOFFFUNCDESC20:
6150 case R_SH_FUNCDESC:
6151 case R_SH_GOTFUNCDESC:
6152 case R_SH_GOTFUNCDESC20:
6153 if (h != NULL)
6154 {
6155 if (h->dynindx == -1)
6156 switch (ELF_ST_VISIBILITY (h->other))
6157 {
6158 case STV_INTERNAL:
6159 case STV_HIDDEN:
6160 break;
6161 default:
6162 bfd_elf_link_record_dynamic_symbol (info, h);
6163 break;
6164 }
6165 }
6166 break;
6167 }
6168
37c644f2 6169 /* Some relocs require a global offset table. */
067653c5 6170 if (htab->sgot == NULL)
37c644f2 6171 {
3376eaf5 6172 switch (r_type)
37c644f2 6173 {
8e45593f
NC
6174 case R_SH_DIR32:
6175 /* This may require an rofixup. */
6176 if (!htab->fdpic_p)
6177 break;
fbca6ad9 6178 case R_SH_GOTPLT32:
37c644f2 6179 case R_SH_GOT32:
8e45593f 6180 case R_SH_GOT20:
37c644f2 6181 case R_SH_GOTOFF:
8e45593f
NC
6182 case R_SH_GOTOFF20:
6183 case R_SH_FUNCDESC:
6184 case R_SH_GOTFUNCDESC:
6185 case R_SH_GOTFUNCDESC20:
6186 case R_SH_GOTOFFFUNCDESC:
6187 case R_SH_GOTOFFFUNCDESC20:
37c644f2 6188 case R_SH_GOTPC:
fbca6ad9
AO
6189#ifdef INCLUDE_SHMEDIA
6190 case R_SH_GOTPLT_LOW16:
6191 case R_SH_GOTPLT_MEDLOW16:
6192 case R_SH_GOTPLT_MEDHI16:
6193 case R_SH_GOTPLT_HI16:
6194 case R_SH_GOTPLT10BY4:
6195 case R_SH_GOTPLT10BY8:
6196 case R_SH_GOT_LOW16:
6197 case R_SH_GOT_MEDLOW16:
6198 case R_SH_GOT_MEDHI16:
6199 case R_SH_GOT_HI16:
6200 case R_SH_GOT10BY4:
6201 case R_SH_GOT10BY8:
6202 case R_SH_GOTOFF_LOW16:
6203 case R_SH_GOTOFF_MEDLOW16:
6204 case R_SH_GOTOFF_MEDHI16:
6205 case R_SH_GOTOFF_HI16:
6206 case R_SH_GOTPC_LOW16:
6207 case R_SH_GOTPC_MEDLOW16:
6208 case R_SH_GOTPC_MEDHI16:
6209 case R_SH_GOTPC_HI16:
6210#endif
3376eaf5
KK
6211 case R_SH_TLS_GD_32:
6212 case R_SH_TLS_LD_32:
6213 case R_SH_TLS_IE_32:
8e45593f
NC
6214 if (htab->root.dynobj == NULL)
6215 htab->root.dynobj = abfd;
6216 if (!create_got_section (htab->root.dynobj, info))
6217 return FALSE;
37c644f2
AO
6218 break;
6219
6220 default:
6221 break;
6222 }
6223 }
6224
3376eaf5 6225 switch (r_type)
067653c5
AM
6226 {
6227 /* This relocation describes the C++ object vtable hierarchy.
6228 Reconstruct it for later use during GC. */
435b1e90 6229 case R_SH_GNU_VTINHERIT:
c152c796 6230 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 6231 return FALSE;
435b1e90
KH
6232 break;
6233
067653c5
AM
6234 /* This relocation describes which C++ vtable entries are actually
6235 used. Record for later use during GC. */
435b1e90 6236 case R_SH_GNU_VTENTRY:
d17e0c6e
JB
6237 BFD_ASSERT (h != NULL);
6238 if (h != NULL
6239 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 6240 return FALSE;
435b1e90 6241 break;
37c644f2 6242
3376eaf5
KK
6243 case R_SH_TLS_IE_32:
6244 if (info->shared)
6245 info->flags |= DF_STATIC_TLS;
6246
6247 /* FALLTHROUGH */
267fb3c1 6248 force_got:
3376eaf5 6249 case R_SH_TLS_GD_32:
37c644f2 6250 case R_SH_GOT32:
8e45593f 6251 case R_SH_GOT20:
fbca6ad9
AO
6252#ifdef INCLUDE_SHMEDIA
6253 case R_SH_GOT_LOW16:
6254 case R_SH_GOT_MEDLOW16:
6255 case R_SH_GOT_MEDHI16:
6256 case R_SH_GOT_HI16:
6257 case R_SH_GOT10BY4:
6258 case R_SH_GOT10BY8:
6259#endif
8e45593f
NC
6260 case R_SH_GOTFUNCDESC:
6261 case R_SH_GOTFUNCDESC20:
3376eaf5
KK
6262 switch (r_type)
6263 {
6264 default:
8e45593f 6265 got_type = GOT_NORMAL;
3376eaf5
KK
6266 break;
6267 case R_SH_TLS_GD_32:
8e45593f 6268 got_type = GOT_TLS_GD;
3376eaf5
KK
6269 break;
6270 case R_SH_TLS_IE_32:
8e45593f
NC
6271 got_type = GOT_TLS_IE;
6272 break;
6273 case R_SH_GOTFUNCDESC:
6274 case R_SH_GOTFUNCDESC20:
6275 got_type = GOT_FUNCDESC;
3376eaf5
KK
6276 break;
6277 }
6278
37c644f2 6279 if (h != NULL)
3376eaf5 6280 {
396a6083
SC
6281#ifdef INCLUDE_SHMEDIA
6282 if (seen_stt_datalabel)
6283 {
b34976b6
AM
6284 struct elf_sh_link_hash_entry *eh
6285 = (struct elf_sh_link_hash_entry *) h;
396a6083
SC
6286
6287 eh->datalabel_got.refcount += 1;
6288 }
6289 else
6290#endif
6291 h->got.refcount += 1;
8e45593f 6292 old_got_type = sh_elf_hash_entry (h)->got_type;
3376eaf5 6293 }
37c644f2
AO
6294 else
6295 {
067653c5
AM
6296 bfd_signed_vma *local_got_refcounts;
6297
435b1e90 6298 /* This is a global offset table entry for a local
067653c5
AM
6299 symbol. */
6300 local_got_refcounts = elf_local_got_refcounts (abfd);
6301 if (local_got_refcounts == NULL)
37c644f2 6302 {
dc810e39 6303 bfd_size_type size;
37c644f2 6304
dc810e39 6305 size = symtab_hdr->sh_info;
067653c5 6306 size *= sizeof (bfd_signed_vma);
fbca6ad9
AO
6307#ifdef INCLUDE_SHMEDIA
6308 /* Reserve space for both the datalabel and
6309 codelabel local GOT offsets. */
6310 size *= 2;
6311#endif
3376eaf5 6312 size += symtab_hdr->sh_info;
067653c5
AM
6313 local_got_refcounts = ((bfd_signed_vma *)
6314 bfd_zalloc (abfd, size));
6315 if (local_got_refcounts == NULL)
b34976b6 6316 return FALSE;
067653c5 6317 elf_local_got_refcounts (abfd) = local_got_refcounts;
3376eaf5
KK
6318#ifdef INCLUDE_SHMEDIA
6319 /* Take care of both the datalabel and codelabel local
6320 GOT offsets. */
8e45593f 6321 sh_elf_local_got_type (abfd)
3376eaf5
KK
6322 = (char *) (local_got_refcounts + 2 * symtab_hdr->sh_info);
6323#else
8e45593f 6324 sh_elf_local_got_type (abfd)
3376eaf5
KK
6325 = (char *) (local_got_refcounts + symtab_hdr->sh_info);
6326#endif
37c644f2 6327 }
396a6083
SC
6328#ifdef INCLUDE_SHMEDIA
6329 if (rel->r_addend & 1)
6330 local_got_refcounts[symtab_hdr->sh_info + r_symndx] += 1;
6331 else
6332#endif
6333 local_got_refcounts[r_symndx] += 1;
8e45593f 6334 old_got_type = sh_elf_local_got_type (abfd) [r_symndx];
3376eaf5
KK
6335 }
6336
6337 /* If a TLS symbol is accessed using IE at least once,
6338 there is no point to use dynamic model for it. */
8e45593f
NC
6339 if (old_got_type != got_type && old_got_type != GOT_UNKNOWN
6340 && (old_got_type != GOT_TLS_GD || got_type != GOT_TLS_IE))
3376eaf5 6341 {
8e45593f
NC
6342 if (old_got_type == GOT_TLS_IE && got_type == GOT_TLS_GD)
6343 got_type = GOT_TLS_IE;
3376eaf5
KK
6344 else
6345 {
8e45593f
NC
6346 if ((old_got_type == GOT_FUNCDESC || got_type == GOT_FUNCDESC)
6347 && (old_got_type == GOT_NORMAL || got_type == GOT_NORMAL))
6348 (*_bfd_error_handler)
6349 (_("%B: `%s' accessed both as normal and FDPIC symbol"),
6350 abfd, h->root.root.string);
6351 else if (old_got_type == GOT_FUNCDESC
6352 || got_type == GOT_FUNCDESC)
6353 (*_bfd_error_handler)
6354 (_("%B: `%s' accessed both as FDPIC and thread local symbol"),
6355 abfd, h->root.root.string);
6356 else
6357 (*_bfd_error_handler)
d003868e
AM
6358 (_("%B: `%s' accessed both as normal and thread local symbol"),
6359 abfd, h->root.root.string);
b34976b6 6360 return FALSE;
3376eaf5
KK
6361 }
6362 }
6363
8e45593f 6364 if (old_got_type != got_type)
3376eaf5
KK
6365 {
6366 if (h != NULL)
8e45593f 6367 sh_elf_hash_entry (h)->got_type = got_type;
3376eaf5 6368 else
8e45593f 6369 sh_elf_local_got_type (abfd) [r_symndx] = got_type;
37c644f2 6370 }
3376eaf5
KK
6371
6372 break;
6373
6374 case R_SH_TLS_LD_32:
6375 sh_elf_hash_table(info)->tls_ldm_got.refcount += 1;
37c644f2
AO
6376 break;
6377
8e45593f
NC
6378 case R_SH_FUNCDESC:
6379 case R_SH_GOTOFFFUNCDESC:
6380 case R_SH_GOTOFFFUNCDESC20:
6381 if (rel->r_addend)
6382 {
6383 (*_bfd_error_handler)
6384 (_("%B: Function descriptor relocation with non-zero addend"),
6385 abfd);
6386 return FALSE;
6387 }
6388
6389 if (h == NULL)
6390 {
6391 union gotref *local_funcdesc;
6392
6393 /* We need a function descriptor for a local symbol. */
6394 local_funcdesc = sh_elf_local_funcdesc (abfd);
6395 if (local_funcdesc == NULL)
6396 {
6397 bfd_size_type size;
6398
6399 size = symtab_hdr->sh_info * sizeof (union gotref);
6400#ifdef INCLUDE_SHMEDIA
6401 /* Count datalabel local GOT. */
6402 size *= 2;
6403#endif
6404 local_funcdesc = (union gotref *) bfd_zalloc (abfd, size);
6405 if (local_funcdesc == NULL)
6406 return FALSE;
6407 sh_elf_local_funcdesc (abfd) = local_funcdesc;
6408 }
6409 local_funcdesc[r_symndx].refcount += 1;
6410
6411 if (r_type == R_SH_FUNCDESC)
6412 {
6413 if (!info->shared)
6414 htab->srofixup->size += 4;
6415 else
6416 htab->srelgot->size += sizeof (Elf32_External_Rela);
6417 }
6418 }
6419 else
6420 {
6421 sh_elf_hash_entry (h)->funcdesc.refcount++;
6422 if (r_type == R_SH_FUNCDESC)
6423 sh_elf_hash_entry (h)->abs_funcdesc_refcount++;
6424
6425 /* If there is a function descriptor reference, then
6426 there should not be any non-FDPIC references. */
6427 old_got_type = sh_elf_hash_entry (h)->got_type;
6428 if (old_got_type != GOT_FUNCDESC && old_got_type != GOT_UNKNOWN)
6429 {
6430 if (old_got_type == GOT_NORMAL)
6431 (*_bfd_error_handler)
6432 (_("%B: `%s' accessed both as normal and FDPIC symbol"),
6433 abfd, h->root.root.string);
6434 else
6435 (*_bfd_error_handler)
6436 (_("%B: `%s' accessed both as FDPIC and thread local symbol"),
6437 abfd, h->root.root.string);
6438 }
6439 }
6440 break;
6441
fbca6ad9
AO
6442 case R_SH_GOTPLT32:
6443#ifdef INCLUDE_SHMEDIA
6444 case R_SH_GOTPLT_LOW16:
6445 case R_SH_GOTPLT_MEDLOW16:
6446 case R_SH_GOTPLT_MEDHI16:
6447 case R_SH_GOTPLT_HI16:
6448 case R_SH_GOTPLT10BY4:
6449 case R_SH_GOTPLT10BY8:
6450#endif
6451 /* If this is a local symbol, we resolve it directly without
6452 creating a procedure linkage table entry. */
6453
6454 if (h == NULL
f5385ebf 6455 || h->forced_local
fbca6ad9
AO
6456 || ! info->shared
6457 || info->symbolic
067653c5 6458 || h->dynindx == -1)
fbca6ad9
AO
6459 goto force_got;
6460
f5385ebf 6461 h->needs_plt = 1;
067653c5 6462 h->plt.refcount += 1;
4989d792 6463 ((struct elf_sh_link_hash_entry *) h)->gotplt_refcount += 1;
fbca6ad9
AO
6464
6465 break;
6466
37c644f2 6467 case R_SH_PLT32:
fbca6ad9
AO
6468#ifdef INCLUDE_SHMEDIA
6469 case R_SH_PLT_LOW16:
6470 case R_SH_PLT_MEDLOW16:
6471 case R_SH_PLT_MEDHI16:
6472 case R_SH_PLT_HI16:
6473#endif
37c644f2
AO
6474 /* This symbol requires a procedure linkage table entry. We
6475 actually build the entry in adjust_dynamic_symbol,
6476 because this might be a case of linking PIC code which is
6477 never referenced by a dynamic object, in which case we
6478 don't need to generate a procedure linkage table entry
6479 after all. */
6480
6481 /* If this is a local symbol, we resolve it directly without
6482 creating a procedure linkage table entry. */
6483 if (h == NULL)
6484 continue;
6485
f5385ebf 6486 if (h->forced_local)
37c644f2
AO
6487 break;
6488
f5385ebf 6489 h->needs_plt = 1;
067653c5 6490 h->plt.refcount += 1;
37c644f2
AO
6491 break;
6492
6493 case R_SH_DIR32:
6494 case R_SH_REL32:
46e993b9
KK
6495#ifdef INCLUDE_SHMEDIA
6496 case R_SH_IMM_LOW16_PCREL:
6497 case R_SH_IMM_MEDLOW16_PCREL:
6498 case R_SH_IMM_MEDHI16_PCREL:
6499 case R_SH_IMM_HI16_PCREL:
6500#endif
067653c5
AM
6501 if (h != NULL && ! info->shared)
6502 {
f5385ebf 6503 h->non_got_ref = 1;
067653c5
AM
6504 h->plt.refcount += 1;
6505 }
37c644f2
AO
6506
6507 /* If we are creating a shared library, and this is a reloc
6508 against a global symbol, or a non PC relative reloc
6509 against a local symbol, then we need to copy the reloc
6510 into the shared library. However, if we are linking with
6511 -Bsymbolic, we do not need to copy a reloc against a
6512 global symbol which is defined in an object we are
6513 including in the link (i.e., DEF_REGULAR is set). At
6514 this point we have not seen all the input files, so it is
6515 possible that DEF_REGULAR is not set now but will be set
6516 later (it is never cleared). We account for that
6517 possibility below by storing information in the
067653c5
AM
6518 dyn_relocs field of the hash table entry. A similar
6519 situation occurs when creating shared libraries and symbol
6520 visibility changes render the symbol local.
6521
6522 If on the other hand, we are creating an executable, we
6523 may need to keep relocations for symbols satisfied by a
6524 dynamic library if we manage to avoid copy relocs for the
6525 symbol. */
6526 if ((info->shared
6527 && (sec->flags & SEC_ALLOC) != 0
3376eaf5 6528 && (r_type != R_SH_REL32
067653c5
AM
6529 || (h != NULL
6530 && (! info->symbolic
6531 || h->root.type == bfd_link_hash_defweak
f5385ebf 6532 || !h->def_regular))))
067653c5
AM
6533 || (! info->shared
6534 && (sec->flags & SEC_ALLOC) != 0
6535 && h != NULL
6536 && (h->root.type == bfd_link_hash_defweak
f5385ebf 6537 || !h->def_regular)))
37c644f2 6538 {
067653c5
AM
6539 struct elf_sh_dyn_relocs *p;
6540 struct elf_sh_dyn_relocs **head;
6541
2293c499
AM
6542 if (htab->root.dynobj == NULL)
6543 htab->root.dynobj = abfd;
067653c5 6544
37c644f2
AO
6545 /* When creating a shared object, we must copy these
6546 reloc types into the output file. We create a reloc
6547 section in dynobj and make room for this reloc. */
6548 if (sreloc == NULL)
6549 {
83bac4b0
NC
6550 sreloc = _bfd_elf_make_dynamic_reloc_section
6551 (sec, htab->root.dynobj, 2, abfd, /*rela?*/ TRUE);
37c644f2 6552
37c644f2 6553 if (sreloc == NULL)
83bac4b0 6554 return FALSE;
37c644f2
AO
6555 }
6556
067653c5
AM
6557 /* If this is a global symbol, we count the number of
6558 relocations we need for this symbol. */
6559 if (h != NULL)
6560 head = &((struct elf_sh_link_hash_entry *) h)->dyn_relocs;
6561 else
37c644f2 6562 {
87d72d41 6563 /* Track dynamic relocs needed for local syms too. */
067653c5 6564 asection *s;
6edfbbad 6565 void *vpp;
87d72d41 6566 Elf_Internal_Sym *isym;
37c644f2 6567
87d72d41
AM
6568 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
6569 abfd, r_symndx);
6570 if (isym == NULL)
b34976b6 6571 return FALSE;
37c644f2 6572
87d72d41
AM
6573 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
6574 if (s == NULL)
6575 s = sec;
6576
6edfbbad
DJ
6577 vpp = &elf_section_data (s)->local_dynrel;
6578 head = (struct elf_sh_dyn_relocs **) vpp;
067653c5 6579 }
37c644f2 6580
067653c5
AM
6581 p = *head;
6582 if (p == NULL || p->sec != sec)
6583 {
6584 bfd_size_type amt = sizeof (*p);
2293c499 6585 p = bfd_alloc (htab->root.dynobj, amt);
37c644f2 6586 if (p == NULL)
b34976b6 6587 return FALSE;
067653c5
AM
6588 p->next = *head;
6589 *head = p;
6590 p->sec = sec;
6591 p->count = 0;
6592 p->pc_count = 0;
37c644f2 6593 }
067653c5
AM
6594
6595 p->count += 1;
46e993b9
KK
6596 if (r_type == R_SH_REL32
6597#ifdef INCLUDE_SHMEDIA
6598 || r_type == R_SH_IMM_LOW16_PCREL
6599 || r_type == R_SH_IMM_MEDLOW16_PCREL
6600 || r_type == R_SH_IMM_MEDHI16_PCREL
6601 || r_type == R_SH_IMM_HI16_PCREL
6602#endif
6603 )
067653c5 6604 p->pc_count += 1;
37c644f2
AO
6605 }
6606
8e45593f
NC
6607 /* Allocate the fixup regardless of whether we need a relocation.
6608 If we end up generating the relocation, we'll unallocate the
6609 fixup. */
6610 if (htab->fdpic_p && !info->shared
6611 && r_type == R_SH_DIR32
6612 && (sec->flags & SEC_ALLOC) != 0)
6613 htab->srofixup->size += 4;
37c644f2 6614 break;
3376eaf5
KK
6615
6616 case R_SH_TLS_LE_32:
b68593b9 6617 if (info->shared && !info->pie)
3376eaf5 6618 {
d003868e
AM
6619 (*_bfd_error_handler)
6620 (_("%B: TLS local exec code cannot be linked into shared objects"),
6621 abfd);
b34976b6 6622 return FALSE;
3376eaf5
KK
6623 }
6624
267fb3c1 6625 break;
3376eaf5 6626
3376eaf5 6627 case R_SH_TLS_LDO_32:
267fb3c1 6628 /* Nothing to do. */
3376eaf5
KK
6629 break;
6630
6631 default:
6632 break;
435b1e90 6633 }
252b5132 6634 }
435b1e90 6635
b34976b6 6636 return TRUE;
252b5132
RH
6637}
6638
fbca6ad9 6639#ifndef sh_elf_set_mach_from_flags
f6f9408f
JR
6640static unsigned int sh_ef_bfd_table[] = { EF_SH_BFD_TABLE };
6641
b34976b6 6642static bfd_boolean
09fd220b 6643sh_elf_set_mach_from_flags (bfd *abfd)
d4845d57 6644{
f6f9408f
JR
6645 flagword flags = elf_elfheader (abfd)->e_flags & EF_SH_MACH_MASK;
6646
6647 if (flags >= sizeof(sh_ef_bfd_table))
6648 return FALSE;
6649
6650 if (sh_ef_bfd_table[flags] == 0)
6651 return FALSE;
6652
6653 bfd_default_set_arch_mach (abfd, bfd_arch_sh, sh_ef_bfd_table[flags]);
d4845d57 6654
b34976b6 6655 return TRUE;
d4845d57 6656}
f6f9408f
JR
6657
6658
6659/* Reverse table lookup for sh_ef_bfd_table[].
6660 Given a bfd MACH value from archures.c
6661 return the equivalent ELF flags from the table.
6662 Return -1 if no match is found. */
6663
6664int
6665sh_elf_get_flags_from_mach (unsigned long mach)
6666{
4195f552 6667 int i = ARRAY_SIZE (sh_ef_bfd_table) - 1;
f6f9408f
JR
6668
6669 for (; i>0; i--)
6670 if (sh_ef_bfd_table[i] == mach)
6671 return i;
6672
6673 /* shouldn't get here */
6674 BFD_FAIL();
6675
6676 return -1;
6677}
fbca6ad9 6678#endif /* not sh_elf_set_mach_from_flags */
d4845d57 6679
fbca6ad9 6680#ifndef sh_elf_set_private_flags
435b1e90
KH
6681/* Function to keep SH specific file flags. */
6682
b34976b6 6683static bfd_boolean
09fd220b 6684sh_elf_set_private_flags (bfd *abfd, flagword flags)
d4845d57
JR
6685{
6686 BFD_ASSERT (! elf_flags_init (abfd)
6687 || elf_elfheader (abfd)->e_flags == flags);
6688
6689 elf_elfheader (abfd)->e_flags = flags;
b34976b6 6690 elf_flags_init (abfd) = TRUE;
d4845d57
JR
6691 return sh_elf_set_mach_from_flags (abfd);
6692}
fbca6ad9 6693#endif /* not sh_elf_set_private_flags */
d4845d57 6694
fbca6ad9 6695#ifndef sh_elf_copy_private_data
d4845d57 6696/* Copy backend specific data from one object module to another */
435b1e90 6697
b34976b6 6698static bfd_boolean
09fd220b 6699sh_elf_copy_private_data (bfd * ibfd, bfd * obfd)
d4845d57 6700{
104d59d1
JM
6701 /* Copy object attributes. */
6702 _bfd_elf_copy_obj_attributes (ibfd, obfd);
6703
0ffa91dd
NC
6704 if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
6705 return TRUE;
6706
8e45593f
NC
6707 /* Copy the stack size. */
6708 if (elf_tdata (ibfd)->phdr && elf_tdata (obfd)->phdr
6709 && fdpic_object_p (ibfd) && fdpic_object_p (obfd))
6710 {
6711 unsigned i;
6712
6713 for (i = 0; i < elf_elfheader (ibfd)->e_phnum; i++)
6714 if (elf_tdata (ibfd)->phdr[i].p_type == PT_GNU_STACK)
6715 {
6716 Elf_Internal_Phdr *iphdr = &elf_tdata (ibfd)->phdr[i];
6717
6718 for (i = 0; i < elf_elfheader (obfd)->e_phnum; i++)
6719 if (elf_tdata (obfd)->phdr[i].p_type == PT_GNU_STACK)
6720 {
6721 memcpy (&elf_tdata (obfd)->phdr[i], iphdr, sizeof (*iphdr));
6722
6723 /* Rewrite the phdrs, since we're only called after they
6724 were first written. */
6725 if (bfd_seek (obfd,
6726 (bfd_signed_vma) get_elf_backend_data (obfd)
6727 ->s->sizeof_ehdr, SEEK_SET) != 0
6728 || get_elf_backend_data (obfd)->s
6729 ->write_out_phdrs (obfd, elf_tdata (obfd)->phdr,
6730 elf_elfheader (obfd)->e_phnum) != 0)
6731 return FALSE;
6732 break;
6733 }
6734
6735 break;
6736 }
6737 }
6738
d4845d57
JR
6739 return sh_elf_set_private_flags (obfd, elf_elfheader (ibfd)->e_flags);
6740}
fbca6ad9 6741#endif /* not sh_elf_copy_private_data */
d4845d57 6742
fbca6ad9 6743#ifndef sh_elf_merge_private_data
d4845d57 6744
f6f9408f
JR
6745/* This function returns the ELF architecture number that
6746 corresponds to the given arch_sh* flags. */
85fbca6a 6747
f6f9408f
JR
6748int
6749sh_find_elf_flags (unsigned int arch_set)
d4845d57 6750{
85fbca6a 6751 extern unsigned long sh_get_bfd_mach_from_arch_set (unsigned int);
f6f9408f 6752 unsigned long bfd_mach = sh_get_bfd_mach_from_arch_set (arch_set);
d4845d57 6753
f6f9408f
JR
6754 return sh_elf_get_flags_from_mach (bfd_mach);
6755}
f6f9408f
JR
6756
6757/* This routine initialises the elf flags when required and
6758 calls sh_merge_bfd_arch() to check dsp/fpu compatibility. */
d4845d57 6759
f6f9408f
JR
6760static bfd_boolean
6761sh_elf_merge_private_data (bfd *ibfd, bfd *obfd)
6762{
85fbca6a
NC
6763 extern bfd_boolean sh_merge_bfd_arch (bfd *, bfd *);
6764
0ffa91dd 6765 if (! is_sh_elf (ibfd) || ! is_sh_elf (obfd))
b34976b6 6766 return TRUE;
d4845d57
JR
6767
6768 if (! elf_flags_init (obfd))
6769 {
a39b79b9 6770 /* This happens when ld starts out with a 'blank' output file. */
b34976b6 6771 elf_flags_init (obfd) = TRUE;
8e45593f 6772 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
f6f9408f 6773 sh_elf_set_mach_from_flags (obfd);
8e45593f
NC
6774 if (elf_elfheader (obfd)->e_flags & EF_SH_FDPIC)
6775 elf_elfheader (obfd)->e_flags |= EF_SH_PIC;
d4845d57 6776 }
d4845d57 6777
85fbca6a 6778 if (! sh_merge_bfd_arch (ibfd, obfd))
1d70c7fb 6779 {
d003868e 6780 _bfd_error_handler ("%B: uses instructions which are incompatible "
1d70c7fb 6781 "with instructions used in previous modules",
d003868e 6782 ibfd);
1d70c7fb
AO
6783 bfd_set_error (bfd_error_bad_value);
6784 return FALSE;
6785 }
f6f9408f 6786
8e45593f
NC
6787 elf_elfheader (obfd)->e_flags &= ~EF_SH_MACH_MASK;
6788 elf_elfheader (obfd)->e_flags |=
f6f9408f 6789 sh_elf_get_flags_from_mach (bfd_get_mach (obfd));
8e45593f
NC
6790
6791 if (fdpic_object_p (ibfd) != fdpic_object_p (obfd))
6792 {
6793 _bfd_error_handler ("%B: attempt to mix FDPIC and non-FDPIC objects",
6794 ibfd);
6795 bfd_set_error (bfd_error_bad_value);
6796 return FALSE;
6797 }
6798
f6f9408f 6799 return TRUE;
d4845d57 6800}
fbca6ad9 6801#endif /* not sh_elf_merge_private_data */
d4845d57 6802
3376eaf5
KK
6803/* Override the generic function because we need to store sh_elf_obj_tdata
6804 as the specific tdata. We set also the machine architecture from flags
6805 here. */
6806
b34976b6 6807static bfd_boolean
09fd220b 6808sh_elf_object_p (bfd *abfd)
3376eaf5 6809{
8e45593f
NC
6810 if (! sh_elf_set_mach_from_flags (abfd))
6811 return FALSE;
6812
6813 return (((elf_elfheader (abfd)->e_flags & EF_SH_FDPIC) != 0)
6814 == fdpic_object_p (abfd));
3376eaf5
KK
6815}
6816
37c644f2
AO
6817/* Finish up dynamic symbol handling. We set the contents of various
6818 dynamic sections here. */
6819
b34976b6 6820static bfd_boolean
09fd220b
KK
6821sh_elf_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
6822 struct elf_link_hash_entry *h,
6823 Elf_Internal_Sym *sym)
37c644f2 6824{
067653c5 6825 struct elf_sh_link_hash_table *htab;
37c644f2 6826
067653c5 6827 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
6828 if (htab == NULL)
6829 return FALSE;
37c644f2
AO
6830
6831 if (h->plt.offset != (bfd_vma) -1)
6832 {
6833 asection *splt;
8e45593f
NC
6834 asection *sgotplt;
6835 asection *srelplt;
37c644f2
AO
6836
6837 bfd_vma plt_index;
6838 bfd_vma got_offset;
6839 Elf_Internal_Rela rel;
947216bf 6840 bfd_byte *loc;
8e45593f 6841 const struct elf_sh_plt_info *plt_info;
37c644f2
AO
6842
6843 /* This symbol has an entry in the procedure linkage table. Set
6844 it up. */
6845
6846 BFD_ASSERT (h->dynindx != -1);
6847
067653c5 6848 splt = htab->splt;
8e45593f
NC
6849 sgotplt = htab->sgotplt;
6850 srelplt = htab->srelplt;
6851 BFD_ASSERT (splt != NULL && sgotplt != NULL && srelplt != NULL);
37c644f2
AO
6852
6853 /* Get the index in the procedure linkage table which
6854 corresponds to this symbol. This is the index of this symbol
6855 in all the symbols for which we are making plt entries. The
6856 first entry in the procedure linkage table is reserved. */
55e6e397 6857 plt_index = get_plt_index (htab->plt_info, h->plt.offset);
37c644f2 6858
8e45593f
NC
6859 plt_info = htab->plt_info;
6860 if (plt_info->short_plt != NULL && plt_index <= MAX_SHORT_PLT)
6861 plt_info = plt_info->short_plt;
6862
37c644f2 6863 /* Get the offset into the .got table of the entry that
8e45593f
NC
6864 corresponds to this function. */
6865 if (htab->fdpic_p)
6866 /* The offset must be relative to the GOT symbol, twelve bytes
6867 before the end of .got.plt. Each descriptor is eight
6868 bytes. */
6869 got_offset = plt_index * 8 + 12 - sgotplt->size;
6870 else
6871 /* Each .got entry is 4 bytes. The first three are
6872 reserved. */
6873 got_offset = (plt_index + 3) * 4;
37c644f2 6874
fbca6ad9 6875#ifdef GOT_BIAS
c8614e8e
AM
6876 if (info->shared)
6877 got_offset -= GOT_BIAS;
fbca6ad9
AO
6878#endif
6879
37c644f2 6880 /* Fill in the entry in the procedure linkage table. */
55e6e397 6881 memcpy (splt->contents + h->plt.offset,
8e45593f
NC
6882 plt_info->symbol_entry,
6883 plt_info->symbol_entry_size);
55e6e397 6884
8e45593f
NC
6885 if (info->shared || htab->fdpic_p)
6886 {
6887 if (plt_info->symbol_fields.got20)
6888 {
6889 bfd_reloc_status_type r;
6890 r = install_movi20_field (output_bfd, got_offset,
6891 splt->owner, splt, splt->contents,
6892 h->plt.offset
6893 + plt_info->symbol_fields.got_entry);
6894 BFD_ASSERT (r == bfd_reloc_ok);
6895 }
6896 else
6897 install_plt_field (output_bfd, FALSE, got_offset,
6898 (splt->contents
6899 + h->plt.offset
6900 + plt_info->symbol_fields.got_entry));
6901 }
55e6e397 6902 else
37c644f2 6903 {
8e45593f
NC
6904 BFD_ASSERT (!plt_info->symbol_fields.got20);
6905
55e6e397 6906 install_plt_field (output_bfd, FALSE,
8e45593f
NC
6907 (sgotplt->output_section->vma
6908 + sgotplt->output_offset
fbca6ad9 6909 + got_offset),
55e6e397
RS
6910 (splt->contents
6911 + h->plt.offset
8e45593f 6912 + plt_info->symbol_fields.got_entry));
55e6e397 6913 if (htab->vxworks_p)
37c644f2 6914 {
55e6e397
RS
6915 unsigned int reachable_plts, plts_per_4k;
6916 int distance;
6917
6918 /* Divide the PLT into groups. The first group contains
6919 REACHABLE_PLTS entries and the other groups contain
6920 PLTS_PER_4K entries. Entries in the first group can
6921 branch directly to .plt; those in later groups branch
6922 to the last element of the previous group. */
6923 /* ??? It would be better to create multiple copies of
6924 the common resolver stub. */
6925 reachable_plts = ((4096
8e45593f
NC
6926 - plt_info->plt0_entry_size
6927 - (plt_info->symbol_fields.plt + 4))
6928 / plt_info->symbol_entry_size) + 1;
6929 plts_per_4k = (4096 / plt_info->symbol_entry_size);
55e6e397
RS
6930 if (plt_index < reachable_plts)
6931 distance = -(h->plt.offset
8e45593f 6932 + plt_info->symbol_fields.plt);
55e6e397
RS
6933 else
6934 distance = -(((plt_index - reachable_plts) % plts_per_4k + 1)
8e45593f 6935 * plt_info->symbol_entry_size);
55e6e397
RS
6936
6937 /* Install the 'bra' with this offset. */
6938 bfd_put_16 (output_bfd,
6939 0xa000 | (0x0fff & ((distance - 4) / 2)),
6940 (splt->contents
6941 + h->plt.offset
8e45593f 6942 + plt_info->symbol_fields.plt));
37c644f2 6943 }
55e6e397
RS
6944 else
6945 install_plt_field (output_bfd, TRUE,
6946 splt->output_section->vma + splt->output_offset,
6947 (splt->contents
6948 + h->plt.offset
8e45593f 6949 + plt_info->symbol_fields.plt));
37c644f2
AO
6950 }
6951
8e45593f 6952 /* Make got_offset relative to the start of .got.plt. */
fbca6ad9 6953#ifdef GOT_BIAS
c8614e8e
AM
6954 if (info->shared)
6955 got_offset += GOT_BIAS;
fbca6ad9 6956#endif
8e45593f
NC
6957 if (htab->fdpic_p)
6958 got_offset = plt_index * 8;
fbca6ad9 6959
8e45593f
NC
6960 if (plt_info->symbol_fields.reloc_offset != MINUS_ONE)
6961 install_plt_field (output_bfd, FALSE,
6962 plt_index * sizeof (Elf32_External_Rela),
6963 (splt->contents
6964 + h->plt.offset
6965 + plt_info->symbol_fields.reloc_offset));
37c644f2
AO
6966
6967 /* Fill in the entry in the global offset table. */
6968 bfd_put_32 (output_bfd,
6969 (splt->output_section->vma
6970 + splt->output_offset
6971 + h->plt.offset
8e45593f
NC
6972 + plt_info->symbol_resolve_offset),
6973 sgotplt->contents + got_offset);
6974 if (htab->fdpic_p)
6975 bfd_put_32 (output_bfd,
6976 sh_elf_osec_to_segment (output_bfd,
6977 htab->splt->output_section),
6978 sgotplt->contents + got_offset + 4);
37c644f2
AO
6979
6980 /* Fill in the entry in the .rela.plt section. */
8e45593f
NC
6981 rel.r_offset = (sgotplt->output_section->vma
6982 + sgotplt->output_offset
37c644f2 6983 + got_offset);
8e45593f
NC
6984 if (htab->fdpic_p)
6985 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_FUNCDESC_VALUE);
6986 else
6987 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_JMP_SLOT);
37c644f2 6988 rel.r_addend = 0;
fbca6ad9
AO
6989#ifdef GOT_BIAS
6990 rel.r_addend = GOT_BIAS;
6991#endif
8e45593f 6992 loc = srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
947216bf 6993 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2 6994
55e6e397
RS
6995 if (htab->vxworks_p && !info->shared)
6996 {
6997 /* Create the .rela.plt.unloaded relocations for this PLT entry.
6998 Begin by pointing LOC to the first such relocation. */
6999 loc = (htab->srelplt2->contents
7000 + (plt_index * 2 + 1) * sizeof (Elf32_External_Rela));
7001
7002 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation
7003 for the PLT entry's pointer to the .got.plt entry. */
7004 rel.r_offset = (htab->splt->output_section->vma
7005 + htab->splt->output_offset
7006 + h->plt.offset
8e45593f 7007 + plt_info->symbol_fields.got_entry);
55e6e397
RS
7008 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
7009 rel.r_addend = got_offset;
7010 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
7011 loc += sizeof (Elf32_External_Rela);
7012
7013 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for
7014 the .got.plt entry, which initially points to .plt. */
8e45593f
NC
7015 rel.r_offset = (sgotplt->output_section->vma
7016 + sgotplt->output_offset
55e6e397
RS
7017 + got_offset);
7018 rel.r_info = ELF32_R_INFO (htab->root.hplt->indx, R_SH_DIR32);
7019 rel.r_addend = 0;
7020 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7021 }
7022
f5385ebf 7023 if (!h->def_regular)
37c644f2
AO
7024 {
7025 /* Mark the symbol as undefined, rather than as defined in
7026 the .plt section. Leave the value alone. */
7027 sym->st_shndx = SHN_UNDEF;
7028 }
7029 }
7030
3376eaf5 7031 if (h->got.offset != (bfd_vma) -1
8e45593f
NC
7032 && sh_elf_hash_entry (h)->got_type != GOT_TLS_GD
7033 && sh_elf_hash_entry (h)->got_type != GOT_TLS_IE
7034 && sh_elf_hash_entry (h)->got_type != GOT_FUNCDESC)
37c644f2
AO
7035 {
7036 asection *sgot;
8e45593f 7037 asection *srelgot;
37c644f2 7038 Elf_Internal_Rela rel;
947216bf 7039 bfd_byte *loc;
37c644f2
AO
7040
7041 /* This symbol has an entry in the global offset table. Set it
7042 up. */
7043
067653c5 7044 sgot = htab->sgot;
8e45593f
NC
7045 srelgot = htab->srelgot;
7046 BFD_ASSERT (sgot != NULL && srelgot != NULL);
37c644f2
AO
7047
7048 rel.r_offset = (sgot->output_section->vma
7049 + sgot->output_offset
dc810e39 7050 + (h->got.offset &~ (bfd_vma) 1));
37c644f2 7051
067653c5
AM
7052 /* If this is a static link, or it is a -Bsymbolic link and the
7053 symbol is defined locally or was forced to be local because
7054 of a version file, we just want to emit a RELATIVE reloc.
37c644f2
AO
7055 The entry in the global offset table will already have been
7056 initialized in the relocate_section function. */
7057 if (info->shared
3d85aebe 7058 && SYMBOL_REFERENCES_LOCAL (info, h))
37c644f2 7059 {
8e45593f
NC
7060 if (htab->fdpic_p)
7061 {
7062 asection *sec = h->root.u.def.section;
7063 int dynindx
7064 = elf_section_data (sec->output_section)->dynindx;
7065
7066 rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
7067 rel.r_addend = (h->root.u.def.value
7068 + h->root.u.def.section->output_offset);
7069 }
7070 else
7071 {
7072 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
7073 rel.r_addend = (h->root.u.def.value
7074 + h->root.u.def.section->output_section->vma
7075 + h->root.u.def.section->output_offset);
7076 }
37c644f2
AO
7077 }
7078 else
7079 {
7080 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + h->got.offset);
7081 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
7082 rel.r_addend = 0;
7083 }
7084
8e45593f
NC
7085 loc = srelgot->contents;
7086 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 7087 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2
AO
7088 }
7089
396a6083
SC
7090#ifdef INCLUDE_SHMEDIA
7091 {
7092 struct elf_sh_link_hash_entry *eh;
7093
7094 eh = (struct elf_sh_link_hash_entry *) h;
7095 if (eh->datalabel_got.offset != (bfd_vma) -1)
7096 {
7097 asection *sgot;
8e45593f 7098 asection *srelgot;
396a6083 7099 Elf_Internal_Rela rel;
947216bf 7100 bfd_byte *loc;
396a6083
SC
7101
7102 /* This symbol has a datalabel entry in the global offset table.
7103 Set it up. */
7104
7105 sgot = htab->sgot;
8e45593f
NC
7106 srelgot = htab->srelgot;
7107 BFD_ASSERT (sgot != NULL && srelgot != NULL);
396a6083
SC
7108
7109 rel.r_offset = (sgot->output_section->vma
7110 + sgot->output_offset
7111 + (eh->datalabel_got.offset &~ (bfd_vma) 1));
7112
7113 /* If this is a static link, or it is a -Bsymbolic link and the
7114 symbol is defined locally or was forced to be local because
7115 of a version file, we just want to emit a RELATIVE reloc.
7116 The entry in the global offset table will already have been
7117 initialized in the relocate_section function. */
7118 if (info->shared
3d85aebe 7119 && SYMBOL_REFERENCES_LOCAL (info, h))
396a6083 7120 {
8e45593f
NC
7121 if (htab->fdpic_p)
7122 {
7123 asection *sec = h->root.u.def.section;
7124 int dynindx
7125 = elf_section_data (sec->output_section)->dynindx;
7126
7127 rel.r_info = ELF32_R_INFO (dynindx, R_SH_DIR32);
7128 rel.r_addend = (h->root.u.def.value
7129 + h->root.u.def.section->output_offset);
7130 }
7131 else
7132 {
7133 rel.r_info = ELF32_R_INFO (0, R_SH_RELATIVE);
7134 rel.r_addend = (h->root.u.def.value
7135 + h->root.u.def.section->output_section->vma
7136 + h->root.u.def.section->output_offset);
7137 }
396a6083
SC
7138 }
7139 else
7140 {
7141 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents
7142 + eh->datalabel_got.offset);
7143 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_GLOB_DAT);
7144 rel.r_addend = 0;
7145 }
7146
8e45593f
NC
7147 loc = srelgot->contents;
7148 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
947216bf 7149 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
396a6083
SC
7150 }
7151 }
7152#endif
7153
f5385ebf 7154 if (h->needs_copy)
37c644f2
AO
7155 {
7156 asection *s;
7157 Elf_Internal_Rela rel;
947216bf 7158 bfd_byte *loc;
37c644f2
AO
7159
7160 /* This symbol needs a copy reloc. Set it up. */
7161
7162 BFD_ASSERT (h->dynindx != -1
7163 && (h->root.type == bfd_link_hash_defined
7164 || h->root.type == bfd_link_hash_defweak));
7165
7166 s = bfd_get_section_by_name (h->root.u.def.section->owner,
7167 ".rela.bss");
7168 BFD_ASSERT (s != NULL);
7169
7170 rel.r_offset = (h->root.u.def.value
7171 + h->root.u.def.section->output_section->vma
7172 + h->root.u.def.section->output_offset);
7173 rel.r_info = ELF32_R_INFO (h->dynindx, R_SH_COPY);
7174 rel.r_addend = 0;
947216bf
AM
7175 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
7176 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
37c644f2
AO
7177 }
7178
55e6e397
RS
7179 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. On VxWorks,
7180 _GLOBAL_OFFSET_TABLE_ is not absolute: it is relative to the
7181 ".got" section. */
37c644f2 7182 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
55e6e397 7183 || (!htab->vxworks_p && h == htab->root.hgot))
37c644f2
AO
7184 sym->st_shndx = SHN_ABS;
7185
b34976b6 7186 return TRUE;
37c644f2
AO
7187}
7188
7189/* Finish up the dynamic sections. */
7190
b34976b6 7191static bfd_boolean
09fd220b 7192sh_elf_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
37c644f2 7193{
067653c5 7194 struct elf_sh_link_hash_table *htab;
8e45593f 7195 asection *sgotplt;
37c644f2
AO
7196 asection *sdyn;
7197
067653c5 7198 htab = sh_elf_hash_table (info);
4dfe6ac6
NC
7199 if (htab == NULL)
7200 return FALSE;
7201
8e45593f 7202 sgotplt = htab->sgotplt;
2293c499 7203 sdyn = bfd_get_section_by_name (htab->root.dynobj, ".dynamic");
37c644f2 7204
067653c5 7205 if (htab->root.dynamic_sections_created)
37c644f2
AO
7206 {
7207 asection *splt;
7208 Elf32_External_Dyn *dyncon, *dynconend;
7209
8e45593f 7210 BFD_ASSERT (sgotplt != NULL && sdyn != NULL);
37c644f2
AO
7211
7212 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 7213 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
37c644f2
AO
7214 for (; dyncon < dynconend; dyncon++)
7215 {
7216 Elf_Internal_Dyn dyn;
37c644f2 7217 asection *s;
067653c5
AM
7218#ifdef INCLUDE_SHMEDIA
7219 const char *name;
7220#endif
37c644f2 7221
2293c499 7222 bfd_elf32_swap_dyn_in (htab->root.dynobj, dyncon, &dyn);
37c644f2
AO
7223
7224 switch (dyn.d_tag)
7225 {
7226 default:
7a2b07ff
NS
7227 if (htab->vxworks_p
7228 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
7229 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
37c644f2
AO
7230 break;
7231
3b587c71
AM
7232#ifdef INCLUDE_SHMEDIA
7233 case DT_INIT:
7234 name = info->init_function;
7235 goto get_sym;
7236
7237 case DT_FINI:
7238 name = info->fini_function;
7239 get_sym:
7240 if (dyn.d_un.d_val != 0)
7241 {
067653c5
AM
7242 struct elf_link_hash_entry *h;
7243
7244 h = elf_link_hash_lookup (&htab->root, name,
b34976b6 7245 FALSE, FALSE, TRUE);
3b587c71
AM
7246 if (h != NULL && (h->other & STO_SH5_ISA32))
7247 {
7248 dyn.d_un.d_val |= 1;
7249 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7250 }
7251 }
7252 break;
7253#endif
7254
37c644f2 7255 case DT_PLTGOT:
8e45593f
NC
7256 BFD_ASSERT (htab->root.hgot != NULL);
7257 s = htab->root.hgot->root.u.def.section;
7258 dyn.d_un.d_ptr = htab->root.hgot->root.u.def.value
7259 + s->output_section->vma + s->output_offset;
7260 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7261 break;
37c644f2
AO
7262
7263 case DT_JMPREL:
067653c5 7264 s = htab->srelplt->output_section;
37c644f2
AO
7265 BFD_ASSERT (s != NULL);
7266 dyn.d_un.d_ptr = s->vma;
7267 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7268 break;
7269
7270 case DT_PLTRELSZ:
067653c5 7271 s = htab->srelplt->output_section;
37c644f2 7272 BFD_ASSERT (s != NULL);
eea6121a 7273 dyn.d_un.d_val = s->size;
37c644f2
AO
7274 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7275 break;
7276
7277 case DT_RELASZ:
7278 /* My reading of the SVR4 ABI indicates that the
7279 procedure linkage table relocs (DT_JMPREL) should be
7280 included in the overall relocs (DT_RELA). This is
7281 what Solaris does. However, UnixWare can not handle
7282 that case. Therefore, we override the DT_RELASZ entry
7283 here to make it not include the JMPREL relocs. Since
7284 the linker script arranges for .rela.plt to follow all
7285 other relocation sections, we don't have to worry
7286 about changing the DT_RELA entry. */
067653c5 7287 if (htab->srelplt != NULL)
37c644f2 7288 {
067653c5 7289 s = htab->srelplt->output_section;
eea6121a 7290 dyn.d_un.d_val -= s->size;
37c644f2
AO
7291 }
7292 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7293 break;
7294 }
7295 }
7296
7297 /* Fill in the first entry in the procedure linkage table. */
067653c5 7298 splt = htab->splt;
55e6e397 7299 if (splt && splt->size > 0 && htab->plt_info->plt0_entry)
37c644f2 7300 {
55e6e397
RS
7301 unsigned int i;
7302
7303 memcpy (splt->contents,
7304 htab->plt_info->plt0_entry,
7305 htab->plt_info->plt0_entry_size);
7306 for (i = 0; i < ARRAY_SIZE (htab->plt_info->plt0_got_fields); i++)
7307 if (htab->plt_info->plt0_got_fields[i] != MINUS_ONE)
7308 install_plt_field (output_bfd, FALSE,
8e45593f
NC
7309 (sgotplt->output_section->vma
7310 + sgotplt->output_offset
55e6e397
RS
7311 + (i * 4)),
7312 (splt->contents
7313 + htab->plt_info->plt0_got_fields[i]));
7314
7315 if (htab->vxworks_p)
37c644f2 7316 {
55e6e397
RS
7317 /* Finalize the .rela.plt.unloaded contents. */
7318 Elf_Internal_Rela rel;
7319 bfd_byte *loc;
7320
7321 /* Create a .rela.plt.unloaded R_SH_DIR32 relocation for the
7322 first PLT entry's pointer to _GLOBAL_OFFSET_TABLE_ + 8. */
7323 loc = htab->srelplt2->contents;
7324 rel.r_offset = (splt->output_section->vma
7325 + splt->output_offset
7326 + htab->plt_info->plt0_got_fields[2]);
7327 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx, R_SH_DIR32);
7328 rel.r_addend = 8;
7329 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
7330 loc += sizeof (Elf32_External_Rela);
7331
7332 /* Fix up the remaining .rela.plt.unloaded relocations.
7333 They may have the wrong symbol index for _G_O_T_ or
7334 _P_L_T_ depending on the order in which symbols were
7335 output. */
7336 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
37c644f2 7337 {
55e6e397
RS
7338 /* The PLT entry's pointer to the .got.plt slot. */
7339 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7340 rel.r_info = ELF32_R_INFO (htab->root.hgot->indx,
7341 R_SH_DIR32);
7342 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7343 loc += sizeof (Elf32_External_Rela);
7344
7345 /* The .got.plt slot's pointer to .plt. */
7346 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7347 rel.r_info = ELF32_R_INFO (htab->root.hplt->indx,
7348 R_SH_DIR32);
7349 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7350 loc += sizeof (Elf32_External_Rela);
37c644f2 7351 }
37c644f2
AO
7352 }
7353
7354 /* UnixWare sets the entsize of .plt to 4, although that doesn't
7355 really seem like the right value. */
7356 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 4;
7357 }
7358 }
7359
7360 /* Fill in the first three entries in the global offset table. */
8e45593f 7361 if (sgotplt && sgotplt->size > 0 && !htab->fdpic_p)
37c644f2
AO
7362 {
7363 if (sdyn == NULL)
8e45593f 7364 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents);
37c644f2
AO
7365 else
7366 bfd_put_32 (output_bfd,
7367 sdyn->output_section->vma + sdyn->output_offset,
8e45593f
NC
7368 sgotplt->contents);
7369 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 4);
7370 bfd_put_32 (output_bfd, (bfd_vma) 0, sgotplt->contents + 8);
7371 }
37c644f2 7372
8e45593f
NC
7373 if (sgotplt && sgotplt->size > 0)
7374 elf_section_data (sgotplt->output_section)->this_hdr.sh_entsize = 4;
7375
7376 /* At the very end of the .rofixup section is a pointer to the GOT. */
7377 if (htab->fdpic_p && htab->srofixup != NULL)
7378 {
7379 struct elf_link_hash_entry *hgot = htab->root.hgot;
7380 bfd_vma got_value = hgot->root.u.def.value
7381 + hgot->root.u.def.section->output_section->vma
7382 + hgot->root.u.def.section->output_offset;
7383
7384 sh_elf_add_rofixup (output_bfd, htab->srofixup, got_value);
7385
7386 /* Make sure we allocated and generated the same number of fixups. */
7387 BFD_ASSERT (htab->srofixup->reloc_count * 4 == htab->srofixup->size);
067653c5 7388 }
37c644f2 7389
8e45593f
NC
7390 if (htab->srelfuncdesc)
7391 BFD_ASSERT (htab->srelfuncdesc->reloc_count * sizeof (Elf32_External_Rela)
7392 == htab->srelfuncdesc->size);
7393
7394 if (htab->srelgot)
7395 BFD_ASSERT (htab->srelgot->reloc_count * sizeof (Elf32_External_Rela)
7396 == htab->srelgot->size);
7397
b34976b6 7398 return TRUE;
37c644f2
AO
7399}
7400
99e4ae17 7401static enum elf_reloc_type_class
09fd220b 7402sh_elf_reloc_type_class (const Elf_Internal_Rela *rela)
99e4ae17 7403{
f51e552e 7404 switch ((int) ELF32_R_TYPE (rela->r_info))
99e4ae17
AJ
7405 {
7406 case R_SH_RELATIVE:
7407 return reloc_class_relative;
7408 case R_SH_JMP_SLOT:
7409 return reloc_class_plt;
7410 case R_SH_COPY:
7411 return reloc_class_copy;
7412 default:
7413 return reloc_class_normal;
7414 }
7415}
7416
85fbca6a 7417#if !defined SH_TARGET_ALREADY_DEFINED
571fe01f 7418/* Support for Linux core dump NOTE sections. */
85fbca6a 7419
b34976b6 7420static bfd_boolean
09fd220b 7421elf32_shlin_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2bc3c89a
AM
7422{
7423 int offset;
eea6121a 7424 unsigned int size;
2bc3c89a
AM
7425
7426 switch (note->descsz)
7427 {
7428 default:
b34976b6 7429 return FALSE;
2bc3c89a
AM
7430
7431 case 168: /* Linux/SH */
7432 /* pr_cursig */
7433 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
7434
7435 /* pr_pid */
261b8d08 7436 elf_tdata (abfd)->core_lwpid = bfd_get_32 (abfd, note->descdata + 24);
2bc3c89a
AM
7437
7438 /* pr_reg */
7439 offset = 72;
eea6121a 7440 size = 92;
2bc3c89a
AM
7441
7442 break;
7443 }
7444
7445 /* Make a ".reg/999" section. */
7446 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7447 size, note->descpos + offset);
2bc3c89a
AM
7448}
7449
b34976b6 7450static bfd_boolean
09fd220b 7451elf32_shlin_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2bc3c89a
AM
7452{
7453 switch (note->descsz)
7454 {
7455 default:
b34976b6 7456 return FALSE;
2bc3c89a
AM
7457
7458 case 124: /* Linux/SH elf_prpsinfo */
7459 elf_tdata (abfd)->core_program
7460 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
7461 elf_tdata (abfd)->core_command
7462 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
7463 }
7464
7465 /* Note that for some reason, a spurious space is tacked
7466 onto the end of the args in some (at least one anyway)
7467 implementations, so strip it off if it exists. */
7468
7469 {
7470 char *command = elf_tdata (abfd)->core_command;
7471 int n = strlen (command);
7472
7473 if (0 < n && command[n - 1] == ' ')
7474 command[n - 1] = '\0';
7475 }
7476
b34976b6 7477 return TRUE;
2bc3c89a 7478}
85fbca6a 7479#endif /* not SH_TARGET_ALREADY_DEFINED */
2bc3c89a 7480
1f1799d5
KK
7481
7482/* Return address for Ith PLT stub in section PLT, for relocation REL
7483 or (bfd_vma) -1 if it should not be included. */
7484
7485static bfd_vma
7486sh_elf_plt_sym_val (bfd_vma i, const asection *plt,
7487 const arelent *rel ATTRIBUTE_UNUSED)
7488{
55e6e397
RS
7489 const struct elf_sh_plt_info *plt_info;
7490
7491 plt_info = get_plt_info (plt->owner, (plt->owner->flags & DYNAMIC) != 0);
7492 return plt->vma + get_plt_offset (plt_info, i);
1f1799d5
KK
7493}
7494
8e45593f
NC
7495/* Decide whether to attempt to turn absptr or lsda encodings in
7496 shared libraries into pcrel within the given input section. */
7497
7498static bfd_boolean
7499sh_elf_use_relative_eh_frame (bfd *input_bfd ATTRIBUTE_UNUSED,
7500 struct bfd_link_info *info,
7501 asection *eh_frame_section ATTRIBUTE_UNUSED)
7502{
7503 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
7504
7505 /* We can't use PC-relative encodings in FDPIC binaries, in general. */
7506 if (htab->fdpic_p)
7507 return FALSE;
7508
7509 return TRUE;
7510}
7511
7512/* Adjust the contents of an eh_frame_hdr section before they're output. */
7513
7514static bfd_byte
7515sh_elf_encode_eh_address (bfd *abfd,
7516 struct bfd_link_info *info,
7517 asection *osec, bfd_vma offset,
7518 asection *loc_sec, bfd_vma loc_offset,
7519 bfd_vma *encoded)
7520{
7521 struct elf_sh_link_hash_table *htab = sh_elf_hash_table (info);
7522 struct elf_link_hash_entry *h;
7523
7524 if (!htab->fdpic_p)
7525 return _bfd_elf_encode_eh_address (abfd, info, osec, offset, loc_sec,
7526 loc_offset, encoded);
7527
7528 h = htab->root.hgot;
7529 BFD_ASSERT (h && h->root.type == bfd_link_hash_defined);
7530
7531 if (! h || (sh_elf_osec_to_segment (abfd, osec)
7532 == sh_elf_osec_to_segment (abfd, loc_sec->output_section)))
7533 return _bfd_elf_encode_eh_address (abfd, info, osec, offset,
7534 loc_sec, loc_offset, encoded);
7535
7536 BFD_ASSERT (sh_elf_osec_to_segment (abfd, osec)
7537 == (sh_elf_osec_to_segment
7538 (abfd, h->root.u.def.section->output_section)));
7539
7540 *encoded = osec->vma + offset
7541 - (h->root.u.def.value
7542 + h->root.u.def.section->output_section->vma
7543 + h->root.u.def.section->output_offset);
7544
7545 return DW_EH_PE_datarel | DW_EH_PE_sdata4;
7546}
7547
85fbca6a 7548#if !defined SH_TARGET_ALREADY_DEFINED
252b5132
RH
7549#define TARGET_BIG_SYM bfd_elf32_sh_vec
7550#define TARGET_BIG_NAME "elf32-sh"
7551#define TARGET_LITTLE_SYM bfd_elf32_shl_vec
7552#define TARGET_LITTLE_NAME "elf32-shl"
85fbca6a
NC
7553#endif
7554
252b5132 7555#define ELF_ARCH bfd_arch_sh
ae95ffa6 7556#define ELF_TARGET_ID SH_ELF_DATA
252b5132 7557#define ELF_MACHINE_CODE EM_SH
d0facd1b
NC
7558#ifdef __QNXTARGET__
7559#define ELF_MAXPAGESIZE 0x1000
7560#else
7561#define ELF_MAXPAGESIZE 0x80
7562#endif
252b5132
RH
7563
7564#define elf_symbol_leading_char '_'
7565
7566#define bfd_elf32_bfd_reloc_type_lookup sh_elf_reloc_type_lookup
157090f7
AM
7567#define bfd_elf32_bfd_reloc_name_lookup \
7568 sh_elf_reloc_name_lookup
252b5132
RH
7569#define elf_info_to_howto sh_elf_info_to_howto
7570#define bfd_elf32_bfd_relax_section sh_elf_relax_section
7571#define elf_backend_relocate_section sh_elf_relocate_section
7572#define bfd_elf32_bfd_get_relocated_section_contents \
7573 sh_elf_get_relocated_section_contents
3376eaf5
KK
7574#define bfd_elf32_mkobject sh_elf_mkobject
7575#define elf_backend_object_p sh_elf_object_p
d4845d57
JR
7576#define bfd_elf32_bfd_set_private_bfd_flags \
7577 sh_elf_set_private_flags
7578#define bfd_elf32_bfd_copy_private_bfd_data \
7579 sh_elf_copy_private_data
875f7f69 7580#define bfd_elf32_bfd_merge_private_bfd_data \
d4845d57 7581 sh_elf_merge_private_data
252b5132 7582
067653c5
AM
7583#define elf_backend_gc_mark_hook sh_elf_gc_mark_hook
7584#define elf_backend_gc_sweep_hook sh_elf_gc_sweep_hook
7585#define elf_backend_check_relocs sh_elf_check_relocs
7586#define elf_backend_copy_indirect_symbol \
7587 sh_elf_copy_indirect_symbol
37c644f2
AO
7588#define elf_backend_create_dynamic_sections \
7589 sh_elf_create_dynamic_sections
7590#define bfd_elf32_bfd_link_hash_table_create \
7591 sh_elf_link_hash_table_create
7592#define elf_backend_adjust_dynamic_symbol \
7593 sh_elf_adjust_dynamic_symbol
55e6e397
RS
7594#define elf_backend_always_size_sections \
7595 sh_elf_always_size_sections
37c644f2
AO
7596#define elf_backend_size_dynamic_sections \
7597 sh_elf_size_dynamic_sections
8e45593f 7598#define elf_backend_omit_section_dynsym sh_elf_omit_section_dynsym
37c644f2
AO
7599#define elf_backend_finish_dynamic_symbol \
7600 sh_elf_finish_dynamic_symbol
7601#define elf_backend_finish_dynamic_sections \
7602 sh_elf_finish_dynamic_sections
99e4ae17 7603#define elf_backend_reloc_type_class sh_elf_reloc_type_class
1f1799d5 7604#define elf_backend_plt_sym_val sh_elf_plt_sym_val
8e45593f
NC
7605#define elf_backend_can_make_relative_eh_frame \
7606 sh_elf_use_relative_eh_frame
7607#define elf_backend_can_make_lsda_relative_eh_frame \
7608 sh_elf_use_relative_eh_frame
7609#define elf_backend_encode_eh_address \
7610 sh_elf_encode_eh_address
37c644f2 7611
067653c5
AM
7612#define elf_backend_can_gc_sections 1
7613#define elf_backend_can_refcount 1
37c644f2
AO
7614#define elf_backend_want_got_plt 1
7615#define elf_backend_plt_readonly 1
7616#define elf_backend_want_plt_sym 0
7617#define elf_backend_got_header_size 12
ed71e111 7618
85fbca6a 7619#if !defined INCLUDE_SHMEDIA && !defined SH_TARGET_ALREADY_DEFINED
2bc3c89a 7620
252b5132 7621#include "elf32-target.h"
ed71e111 7622
2bc3c89a
AM
7623/* NetBSD support. */
7624#undef TARGET_BIG_SYM
7625#define TARGET_BIG_SYM bfd_elf32_shnbsd_vec
7626#undef TARGET_BIG_NAME
7627#define TARGET_BIG_NAME "elf32-sh-nbsd"
7628#undef TARGET_LITTLE_SYM
7629#define TARGET_LITTLE_SYM bfd_elf32_shlnbsd_vec
7630#undef TARGET_LITTLE_NAME
7631#define TARGET_LITTLE_NAME "elf32-shl-nbsd"
7632#undef ELF_MAXPAGESIZE
7633#define ELF_MAXPAGESIZE 0x10000
24718e3b 7634#undef ELF_COMMONPAGESIZE
2bc3c89a
AM
7635#undef elf_symbol_leading_char
7636#define elf_symbol_leading_char 0
571fe01f 7637#undef elf32_bed
2bc3c89a
AM
7638#define elf32_bed elf32_sh_nbsd_bed
7639
7640#include "elf32-target.h"
7641
2bc3c89a
AM
7642
7643/* Linux support. */
7644#undef TARGET_BIG_SYM
7645#define TARGET_BIG_SYM bfd_elf32_shblin_vec
7646#undef TARGET_BIG_NAME
7647#define TARGET_BIG_NAME "elf32-shbig-linux"
7648#undef TARGET_LITTLE_SYM
7649#define TARGET_LITTLE_SYM bfd_elf32_shlin_vec
7650#undef TARGET_LITTLE_NAME
7651#define TARGET_LITTLE_NAME "elf32-sh-linux"
24718e3b
L
7652#undef ELF_COMMONPAGESIZE
7653#define ELF_COMMONPAGESIZE 0x1000
2bc3c89a
AM
7654
7655#undef elf_backend_grok_prstatus
7656#define elf_backend_grok_prstatus elf32_shlin_grok_prstatus
7657#undef elf_backend_grok_psinfo
7658#define elf_backend_grok_psinfo elf32_shlin_grok_psinfo
571fe01f 7659#undef elf32_bed
2bc3c89a
AM
7660#define elf32_bed elf32_sh_lin_bed
7661
7662#include "elf32-target.h"
7663
8e45593f
NC
7664
7665/* FDPIC support. */
7666#undef TARGET_BIG_SYM
7667#define TARGET_BIG_SYM bfd_elf32_shbfd_vec
7668#undef TARGET_BIG_NAME
7669#define TARGET_BIG_NAME "elf32-shbig-fdpic"
7670#undef TARGET_LITTLE_SYM
7671#define TARGET_LITTLE_SYM bfd_elf32_shfd_vec
7672#undef TARGET_LITTLE_NAME
7673#define TARGET_LITTLE_NAME "elf32-sh-fdpic"
7674#undef elf_backend_modify_program_headers
7675#define elf_backend_modify_program_headers \
7676 sh_elf_modify_program_headers
7677
7678#undef elf32_bed
7679#define elf32_bed elf32_sh_fd_bed
7680
7681#include "elf32-target.h"
7682
7683#undef elf_backend_modify_program_headers
7684
7685/* VxWorks support. */
55e6e397
RS
7686#undef TARGET_BIG_SYM
7687#define TARGET_BIG_SYM bfd_elf32_shvxworks_vec
7688#undef TARGET_BIG_NAME
7689#define TARGET_BIG_NAME "elf32-sh-vxworks"
7690#undef TARGET_LITTLE_SYM
7691#define TARGET_LITTLE_SYM bfd_elf32_shlvxworks_vec
7692#undef TARGET_LITTLE_NAME
7693#define TARGET_LITTLE_NAME "elf32-shl-vxworks"
7694#undef elf32_bed
7695#define elf32_bed elf32_sh_vxworks_bed
7696
7697#undef elf_backend_want_plt_sym
7698#define elf_backend_want_plt_sym 1
7699#undef elf_symbol_leading_char
7700#define elf_symbol_leading_char '_'
7701#define elf_backend_want_got_underscore 1
7702#undef elf_backend_grok_prstatus
7703#undef elf_backend_grok_psinfo
7704#undef elf_backend_add_symbol_hook
7705#define elf_backend_add_symbol_hook elf_vxworks_add_symbol_hook
7706#undef elf_backend_link_output_symbol_hook
7707#define elf_backend_link_output_symbol_hook \
7708 elf_vxworks_link_output_symbol_hook
7709#undef elf_backend_emit_relocs
7710#define elf_backend_emit_relocs elf_vxworks_emit_relocs
7711#undef elf_backend_final_write_processing
7712#define elf_backend_final_write_processing \
7713 elf_vxworks_final_write_processing
7714#undef ELF_MAXPAGESIZE
7715#define ELF_MAXPAGESIZE 0x1000
7716#undef ELF_COMMONPAGESIZE
7717
7718#include "elf32-target.h"
7719
85fbca6a 7720#endif /* neither INCLUDE_SHMEDIA nor SH_TARGET_ALREADY_DEFINED */
This page took 1.075347 seconds and 4 git commands to generate.